2010-2012 Catalog
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Prairie State College
PRAIRIE ST A TE COLLEGE 2 0 0 6 - 2 0 0 8 2006–2008 CA PRAIRIE STATE COLLEGE 2006-2008 CATALOG A comprehensive community college 202 South Halsted Street Chicago Heights, IL 60411 T (708) 709-3500 ALOG START NEAR. GO FAR. www.prairiestate.edu ACADEMIC CALENDAR KEY PHONE NUMBERS 2006-2007 2007-2008 AREA CODE 708 College Switchboard . 709-3500 FALL 2006 FALL 2007 Admissions, Records & Registration . 709-3516 Term begins August 15 Term begins August 14 Adult Education . 709-3548 Classes begin August 21 Classes begin August 20 Bookstore . 709-3587 Labor Day (College closed) September 4 Labor Day (College closed) September 3 Business Office. 709-3577 Late Start classes begin September 18 Late Start classes begin September 19 Campus Safety . 709-3756 First Eight-Week classes end October 16 First Eight-Week classes end October 15 Career Development Services . 709-3755 Mid-Term October 17 Mid-Term October 16 Children’s Learning Center Second Eight-Week classes begin October 17 Second Eight-Week classes begin October 16 (Child Care) . 709-3725 Thanksgiving recess (College closed) November 23-26 Thanksgiving recess (College closed) November 22-25 Corporate Education & Training . 709-3941 Last day of classes December 7 Last day of classes December 6 Counseling & Academic Advising. 709-3506 Final exams December 8-14 Final exams December 7-13 Dental Clinic . 709-3707 End of term December 15 End of term December 14 Disability Services . 709-3603 Holiday Break (College closed) To be announced Holiday Break (College closed) To be announced English as a Second Language . 709-3790 Financial Aid & Veterans Affairs . -
BOUNDARY LAYERS with FLOW REVERSAL John F. Nush
NASA CONTRACTOR REPORT FURTHER STUDIES OF UNSTEADY BOUNDARY LAYERS WITH FLOW REVERSAL John F. Nush Prepared by SYBUCON, INC. Atlanta, Ga. 303 39 for Ames Research Center TECH LIBRARY KAFB, NU NASA CR-2767 I I 4. Title nd Subtitle I 5. Report Date "Further Studies of Unsteady Boundary Layers with . December 1976 Flow Reversalll Organization 6. Performing Code 7. Author($) 8. Performing Orgnization Report No. John F. Nash 10. Work Unit No. 9. Performing Orpmization Nama and Address Sybucon, Inc. 11.Contract or GrantNo. 9 960) Perimeter Place,N.W. (Suite 2-8771 Atlanta, Georgia 30339 - NAS 13.Type of Report andPeriod Covered 12. Sponsoring myName md Address 6 Contractor Report- National Aeronautics Space Administration 14.Sponsorirg Aqmcy Code Washington, D. C. 20546 I 15.Supplementary Notas 16. Abstract Further computational experiments have been conducted to study the charac- teristics of flow reversal and separation in unsteady boundary layers. One set of calculations was performed using thefirst-order, time-dependent turbulent boundary-layer equations, and extended earlier work by Nash and Pate1 to a wider rangeof flows. Another set of calculations was performed for laminar flow using the time-dependent Navier-Stokesequati.ons. 1 The results of the calculations confirm previous conclusions concerning the existence of a regime of unseparated flow, containing an embedded regionof reversal, which is accessible to first-order boundary-layer theory.However certain doubts are caston the precise natureof the events which accompany the eventual breakdownof the theory due to singularity onset.The earlier view that the singularity appearsas the final event in a sequence involving rapid thickeningof the boundary layer and the formationof a localized region of steep gradients, is called into questionby the present results. -
("DSCC") Files This Complaint Seeking an Immediate Investigation by the 7
COMPLAINT BEFORE THE FEDERAL ELECTION CBHMISSIOAl INTRODUCTXON - 1 The Democratic Senatorial Campaign Committee ("DSCC") 7-_. J _j. c files this complaint seeking an immediate investigation by the 7 c; a > Federal Election Commission into the illegal spending A* practices of the National Republican Senatorial Campaign Committee (WRSCIt). As the public record shows, and an investigation will confirm, the NRSC and a series of ostensibly nonprofit, nonpartisan groups have undertaken a significant and sustained effort to funnel "soft money101 into federal elections in violation of the Federal Election Campaign Act of 1971, as amended or "the Act"), 2 U.S.C. 5s 431 et seq., and the Federal Election Commission (peFECt)Regulations, 11 C.F.R. 85 100.1 & sea. 'The term "aoft money" as ueed in this Complaint means funds,that would not be lawful for use in connection with any federal election (e.g., corporate or labor organization treasury funds, contributions in excess of the relevant contribution limit for federal elections). THE FACTS IN TBIS CABE On November 24, 1992, the state of Georgia held a unique runoff election for the office of United States Senator. Georgia law provided for a runoff if no candidate in the regularly scheduled November 3 general election received in excess of 50 percent of the vote. The 1992 runoff in Georg a was a hotly contested race between the Democratic incumbent Wyche Fowler, and his Republican opponent, Paul Coverdell. The Republicans presented this election as a %ust-win81 election. Exhibit 1. The Republicans were so intent on victory that Senator Dole announced he was willing to give up his seat on the Senate Agriculture Committee for Coverdell, if necessary. -
Identifying Open Research Problems in Cryptography by Surveying Cryptographic Functions and Operations 1
International Journal of Grid and Distributed Computing Vol. 10, No. 11 (2017), pp.79-98 http://dx.doi.org/10.14257/ijgdc.2017.10.11.08 Identifying Open Research Problems in Cryptography by Surveying Cryptographic Functions and Operations 1 Rahul Saha1, G. Geetha2, Gulshan Kumar3 and Hye-Jim Kim4 1,3School of Computer Science and Engineering, Lovely Professional University, Punjab, India 2Division of Research and Development, Lovely Professional University, Punjab, India 4Business Administration Research Institute, Sungshin W. University, 2 Bomun-ro 34da gil, Seongbuk-gu, Seoul, Republic of Korea Abstract Cryptography has always been a core component of security domain. Different security services such as confidentiality, integrity, availability, authentication, non-repudiation and access control, are provided by a number of cryptographic algorithms including block ciphers, stream ciphers and hash functions. Though the algorithms are public and cryptographic strength depends on the usage of the keys, the ciphertext analysis using different functions and operations used in the algorithms can lead to the path of revealing a key completely or partially. It is hard to find any survey till date which identifies different operations and functions used in cryptography. In this paper, we have categorized our survey of cryptographic functions and operations in the algorithms in three categories: block ciphers, stream ciphers and cryptanalysis attacks which are executable in different parts of the algorithms. This survey will help the budding researchers in the society of crypto for identifying different operations and functions in cryptographic algorithms. Keywords: cryptography; block; stream; cipher; plaintext; ciphertext; functions; research problems 1. Introduction Cryptography [1] in the previous time was analogous to encryption where the main task was to convert the readable message to an unreadable format. -
A President's Legacy a President’S
THE MAGAZINE OF FALL 2015 A President’s Dear Readers of the Lewis University Magazine: and the limited financial support that their families can provide. We are firmly committed I believe that you will find this particular to help as many as possible to remain in school Magazine of Lewis University to be very and to pursue their vitally needed college interesting and encouraging to read. Moreover, degrees. More than 80% of the top jobs in there are dozens of wonderful photos of America now require a college diploma and people and happenings from throughout the that percentage is steadily increasing. Without fall semester. It has been a very good year for having graduated from college, many citizens the University and especially for our students will have to settle for minimally satisfying or and faculty engaged daily in our ever-more undercompensated careers. distinctive educational programs. Finally, there is an article here that speaks Throughout the Magazine, you will find about the legacy of nearly three decades write-ups regarding a multitude of fine during which I have been privileged to accomplishments, especially by our students serve as the President of this very special and faculty. For instance, the Flight Team came PRESIDENT’S University. It is thoughtfully written and in second place in the regional tournament PERSPECTIVE quite complimentary in its content. I am which we hosted in October and will once delighted that Lewis is becoming an ever- again be going to the national championship more distinguished University, especially in contest in the spring. Our science students will read about some of the very effective such distinctive academic programs as STEM continue to be involved in challenging and assistance they are providing to various (the natural sciences, technology, engineering worthwhile research projects, and increasingly schools. -
Encryption Block Cipher
10/29/2007 Encryption Encryption Block Cipher Dr.Talal Alkharobi 2 Block Cipher A symmetric key cipher which operates on fixed-length groups of bits, termed blocks, with an unvarying transformation. When encrypting, a block cipher take n-bit block of plaintext as input, and output a corresponding n-bit block of ciphertext. The exact transformation is controlled using a secret key. Decryption is similar: the decryption algorithm takes n-bit block of ciphertext together with the secret key, and yields the original n-bit block of plaintext. Mode of operation is used to encrypt messages longer than the block size. 1 Dr.Talal Alkharobi 10/29/2007 Encryption 3 Encryption 4 Decryption 2 Dr.Talal Alkharobi 10/29/2007 Encryption 5 Block Cipher Consists of two algorithms, encryption, E, and decryption, D. Both require two inputs: n-bits block of data and key of size k bits, The output is an n-bit block. Decryption is the inverse function of encryption: D(E(B,K),K) = B For each key K, E is a permutation over the set of input blocks. n Each key K selects one permutation from the possible set of 2 !. 6 Block Cipher The block size, n, is typically 64 or 128 bits, although some ciphers have a variable block size. 64 bits was the most common length until the mid-1990s, when new designs began to switch to 128-bit. Padding scheme is used to allow plaintexts of arbitrary lengths to be encrypted. Typical key sizes (k) include 40, 56, 64, 80, 128, 192 and 256 bits. -
2020-2021 Nursing Admission Requirements | Elmhurst University
Requirements for Nursing 2021– 2022 More than ever, the healthcare profession depends on highly educated nurses to provide expert nursing care and management. At Elmhurst, you'll develop not only a full range of cutting-edge skills, but also the imagination, flexibility and compassion you'll need on the front lines of patient care. Elmhurst nursing graduates are awarded the Bachelor of Science degree in Nursing (BSN). They are then eligible to take the National Council Licensure Examination (NCLEX), which enables them to receive their licenses as registered nurses (RNs). The Elmhurst University Nursing program requires an application separate from that for admission to the university. This guide provides details on the application process and the program requirements. The prerequisite courses are listed in the back along with their course equivalencies at many of the area’s community colleges. For additional information about the transfer process please reach out to the Office of Admission. Office of Admission Department of Nursing 630-617-3400 and Health Sciences [email protected] Laura Brennan www.elmhurst.edu 630-617-3513 Elmhurst University [email protected] 190 Prospect Avenue Elmhurst, IL 60126 Admission Requirements for Nursing Program Students must meet the following criteria in order to be considered for admission to the nursing program: I. A cumulative grade-point average of 2.8 or higher II. Most of the 12 prerequisite courses completed A. A 2.8 or greater science combined grade-point average in the first four prerequisite science courses to be eligible for admission and maintain at least a 2.8 science combined grade-point average with the fifth required science course to continue in the nursing major (BIO 107, 108, 221, CHM 101 and 103); Students may only repeat one of these courses to remove a W or improve a grade of C or lower. -
A Brief Outlook at Block Ciphers
A Brief Outlook at Block Ciphers Pascal Junod Ecole¶ Polytechnique F¶ed¶eralede Lausanne, Suisse CSA'03, Rabat, Maroc, 10-09-2003 Content F Generic Concepts F DES / AES F Cryptanalysis of Block Ciphers F Provable Security CSA'03, 10 septembre 2003, Rabat, Maroc { i { Block Cipher P e d P C K K CSA'03, 10 septembre 2003, Rabat, Maroc { ii { Block Cipher (2) F Deterministic, invertible function: e : {0, 1}n × K → {0, 1}n d : {0, 1}n × K → {0, 1}n F The function is parametered by a key K. F Mapping an n-bit plaintext P to an n-bit ciphertext C: C = eK(P ) F The function must be a bijection for a ¯xed key. CSA'03, 10 septembre 2003, Rabat, Maroc { iii { Product Ciphers and Iterated Block Ciphers F A product cipher combines two or more transformations in a manner intending that the resulting cipher is (hopefully) more secure than the individual components. F An iterated block cipher is a block cipher involving the sequential repeti- tion of an internal function f called a round function. Parameters include the number of rounds r, the block bit size n and the bit size k of the input key K from which r subkeys ki (called round keys) are derived. For invertibility purposes, the round function f is a bijection on the round input for each value ki. CSA'03, 10 septembre 2003, Rabat, Maroc { iv { Product Ciphers and Iterated Block Ciphers (2) P K f k1 f k2 f kr C CSA'03, 10 septembre 2003, Rabat, Maroc { v { Good and Bad Block Ciphers F Flexibility F Throughput F Estimated Security Level CSA'03, 10 septembre 2003, Rabat, Maroc { vi { Data Encryption Standard (DES) F American standard from (1976 - 1998). -
Ninety-Eighth Commencement
Ninety-Eighth Commencement May 27, 2021 Bishop Noll Fieldhouse Hammond, Indiana Principal’s Greeting Dear Class of 2021, This year has easily been the most difficult year of our lifetime. We have been plagued by the COVID-19 virus, restrictions with social distancing, restrictions for masking, quarantine and isolation. This year has forced us to be alone and observe the school year through millions of emails, hundreds of Zooms, and all through a screen. You have endured graduating high school during a global pandemic that has taken the lives of over half a million Americans. When the year started, none of us knew how long school would remain open, what school would look like, or what challenges we would face. Through all of this you as a senior class were unsure of what to expect. Yet on the morning of August 12, you draped yourself in your BNI uniform, grabbed your bookbag, placed a mask on your face and entered the doors of what felt like a battle to graduation! This battle didn’t come without sacrifices. As a class you sacrificed Homecoming, games, events, and more for the health of others. You sacrificed activities you wanted and looked forward to. You sacrificed time with your classmates in an effort to support your neighbors and community. Although you have sacrificed a lot this year you’ve also gained so much as young adults. You learned the value of giving of yourself for others. You’ve realized the importance of family time and cherishing those you love. You’ve learned how to find balance and how important it is to keep a pulse on your mental wellness. -
Degrees and Certificates
DEGREES AND CERTIFICATES 43 2014-2016 Catalog Academic Degrees and Certificates Illinois Articulation Initiative (IAI) www.itransfer.org Prairie State College offers associate degrees that prepare students for transfer to four-year institutions, associate degrees Prairie State College participates in the Illinois Articulation and certificates that prepare students for specific careers, and Initiative (IAI), a statewide transfer agreement among more an associate degree that recognizes completion of a broad than 100 participating colleges, universities, or community range of college-level courses. colleges in Illinois. IAI works best for students who know they are going to transfer but are undecided on the college or university that will grant their bachelor’s degree. All colleges Transfer Degrees and universities participating in the IAI agree to accept a The Associate in Arts degree (A.A.) includes the first two years “package” of IAI general education courses in lieu of their own of study for students who plan to pursue a bachelor’s degree in comparable lower-division general education requirements. It is liberal arts. important to keep in mind that the IAI General Education Core The Associate in Science degree (A.S.) covers the first two Curriculum transfers as a package. Course-to-course transfer years of study for students pursuing a bachelor’s degree in is not guaranteed. IAI also includes major recommendations engineering, mathematics, or science. for the first two years of college in several popular majors. The Associate in Fine Arts: Art degree (A.F.A.) is designed to Faculty panels, which have expertise in the major field of study, prepare students to transfer as juniors into a bachelor’s degree created these recommendations. -
Office of the President (708) 709-3500 • (708) 709-3774 Prairiestate.Edu
202 South Halsted Street Chicago Heights, IL 60411-8226 Office of the President (708) 709-3500 • (708) 709-3774 prairiestate.edu Terri L. Winfree, Ph.D. Preface President Welcome, Faculty Board of Trustees Jacqueline J. Agree On behalf of Prairie State College (PSC), I want to welcome you. Chair Whether this is your first semester teaching at PSC, or if you have been here Marc A. Wiley Vice Chair for many years, the work you do is appreciated and valued. We all play a role in helping our students achieve a successful outcome, and the role of faculty is Dr. Ronald J. White critical in helping our students achieve their educational goals. Secretary For students, faculty are the key to their educational success. Students don’t Christopher Baikauskas know whether their instructor is full or part-time. What matters to our students Brunetta Hill-Corley is the instructor’s knowledge of the subject matter, the care given to class preparation, fairness in grading, and genuine concern for student learning. Wendell D. Mosby Combining those elements with a commitment to helping every student succeed is winning formula for student success. Joelle Mulhearn Octavio Origel Jr. PSC has a reputation of academic excellence and a rigorous learning Student Trustee environment. That reputation is built on the excellent faculty we hire and the experiences our students have in the classroom. From personal experience, I know how important faculty are in a student’s education. I started my education at PSC as a part-time student. And the experience I had in a learning community changed my life and started me on my educational path. -
Directory Meeting Our People
2008-2010 CATALOG DIRECTORY MEETING OUR PEOPLE 175 2008-2010 CATALOG BOARD OF TRUSTEES A seven-member Board of Trustees is directly responsible for the governance of Prairie State College; they are elected from within the district for six-year terms. The student body annual- ly elects a student trustee, who has an advisory vote. Board officers are the Chair, Vice Chair, and Secretary; all are elected for one-year terms by their peers. MARK A. FAZZINI KATHLEEN M. DOYLE Homewood resident Chicago Heights resident Board member since 1993 Board member since 2003 A.A., Prairie State College B.S., Illinois State University B.S., Chicago State University M.S., Chicago State University M.S., Chicago State University C.A.S., National-Louis University Chief, College of DuPage Police Ed.D., National-Louis University Department Director of Educational Services, South Cook Intermediate Service Center JOHN J. MARKS MARY LEE JOHNSON Homewood resident Crete resident Board member since 2003 Board member since 1997 B.B.A., University of Oklahoma A.A., Waubonsee Community College President, Marks & Company B.A., Governors State University M.A., Governors State University Mental Health LCPC, LPHA, Crisis Therapist, Grand Prairie Services, Behavioral Healthcare JACQUELINE J.AGEE PHILLIP J. FASO Chicago Heights resident Homewood resident Board member since 2007 Board member since 2007 A.A., Moraine Valley Community College B.A., St. Joseph’s College B.S., Illinois State University Partner, Faso Excavating J.D., The John Marshall School of Law Attorney at Law MARGARET M. DONOHUE Park Forest resident Board member since 2005 B.A., Governors State University M.A., Governors State University DIRECTORY 176 2008-2010 CATALOG EXECUTIVE OFFICERS James M.