Me - Cse III (Full Time)

June 3, 2016 | Author: saravancse | Category: Types, Brochures
Share Embed Donate


Short Description

Download Me - Cse III (Full Time)...

Description

ANNA UNIVERSITY: COIMBATORE M.E.COMPUTER SCIENCE AND ENGINEERING CURRICULUM 2007 - FULL TIME MODE SEMESTER – II Code No. Theory

Course Title

L

T

P

M

Database Technology Compiler Design Object Oriented System Design Web Technology Information Security Elective – I

3 3 3 3 3 3

0 1 0 0 0 0

0 0 2 0 0 0

100 100 100 100 100 100

Database Technology Lab Web Technology Lab

0 0

0 0

3 3

100 100

Course Title

L

T

P

M

Elective – II Elective – III Elective – IV Research Methodologies

3 3 3 3

0 0 0 0

0 0 0 0

100 100 100 100

Project Phase - I Technical Seminar

0 0

0 0

3 3

100 100

Course Title

L

T

P

M

Project Phase - II

0

0

12

600

Practical

SEMESTER – III Code No. Theory

Practical

SEMESTER – IV Code No.

Code No.

LIST OF ELECTIVES M.E.COMPUTER SCIENCE AND ENGINEERING Code Course Title Course Title No. Advanced JAVA Programming Theory of Computation Agent Based Intelligent Systems Digital Imaging Data Warehousing and Data Mining Mobile Computing Real Time Embedded Systems Digital Image Processing Soft Computing Distributed Computing Grid Computing Network Security Bio Informatics Software Quality Assurance Ad hoc Networks Multimedia Systems Performance Evaluation of Computer Systems and Networks XML and Web Services Visualization Techniques Advanced Databases Software Project Management Component Based Technology Advanced Algorithms Creative Thinking Neural Networks, Architecture and Applications Advanced Networks E – Commerce Technology Microprocessor Based System Design Advanced Network Security Semantic Web Natural Language Processing Wireless Sensor Networks Hi – Speed Networks Information Retrieval Pervasive Computing Open Source Systems Service Oriented Architecture

DATA BASE TECHNOLOGY 1. DATA BASE SYSTEM CONCEPT

3 0 2 100 10

File systems - Database systems - Database systems architecture - Data models Relational model – Hierarchical model - Network model - Entity-Relationship model Data Dictionary - Database Administration and control. 2. RELATIONAL DATABASES

9

Codd's rules - Base tables - Views - Domains and key concept - Integrity rules Relational Algebra – Relational calculus - Commercial query languages - Embedded SQL - Normalization and database design. 3. DATABASE SYSTEM DESIGN 8 File and storage structures - Indexing and Hashing - Query processing - Database recovery - Concurrency control - Transaction processing - Security and Integrity Triggers. 4. DISTRIBUTED DATABASES

9

Centralized versus distributed databases - Fragmentation - Distributed database architecture - Client / Server databases - Distributed transactions - Locking and Commit protocols - Distributed concurrency Control – Security and reliability - Parallel databases. 5. ADVANCED DATABASES

9

The World Wide Web - Object oriented database - Object Relational database - XML, XML/QL - Data Analysis and OLAP - Data mining - Data warehousing. Total No of periods: 45 REFERENCE BOOKS: 1. Abraham Silberschatz, Henry. F. Korth, S.Sudharsan, Database System Concepts, 5th Edition, Tata McGraw Hill, 2005. 2. Ramez Elmasri, Shamkant B. Navathe, Fundamentals of Database Systems, 5rd Edition, Addison Wesley, 2006. 3. Jim Buyens, Step by Step Web Database Development, PHI, 2001. 4. Stefano Ceri & Giuesppe Pelagatti, Distributed Databases - Principles and Systems, McGraw Hill Book Company, 1987. 5. C.J.Date, “An Introduction to Database system”, Pearson Education, 7th Edition, 2003

COMPILER DESIGN

3 1 0 100

1. INTRODUCTION

9

Basic concepts - Grammar - Language - Parts of a compiler – Grouping of phases Compiler construction tools. 2. LEXICAL ANALYZER

9

Role of a lexical analyzer – Input buffering - Specification and recognition of tokens Finite automata - Regular expression to finite automation – Optimization of DFA-based pattern matchers-Use of a tool for generating lexical analyzer. 3. SYNTAX ANALYZER

9

Role of a parser - Context-free grammars - Top-down parsing - Bottom-up parsing - Use of a tool to generate parsers. 4. INTERMEDIATE CODE GENERATION

9

Intermediate languages - Declaration - Assignment statements - Boolean expressions Flow control statements –Back patching. 5. CODE GENERATION

9

Introduction to optimization techniques - Issues in the design of a code generator - Runtime storage management - Design of a simple code generator. Total No of periods: 45 REFERENCE BOOKS: 1. A.V. Aho, Ravi Sethi, J.D. Ullman, Compilers - Principles, Techniques and Tools, Addison- Wesley, 2003. 2. Fischer Leblanc, Crafting Compiler, Benjamin Cummings, Menlo Park, 1988. 3. Kennath C.Louden, Compiler Construction Principles and Practice, Vikas publishing House, 2004. 4. Allen I. Holub, Compiler Design in C, Prentice Hall of India, 2001.

OBJECT ORIENTED SYSTEM DESIGN

3 0 2 100

1. OBJECT ORIENTED DESIGN FUNDAMENTALS

9

The Object Model – Classes And Objects - Complexity Of Software – Classification – Notation – Process – Pragmatics – Binary And Entity Relationship – Object Types – Object State – OOSD Life Cycle. 2. OBJECT ORIENTED METHODOLOGIES AND UML Object Oriented Methodology: Rumbaugh, Booch, Jacobson, Coad/Yardon – Patterns – Frame Works – The Unified Approach – UML

9 Shaler/Mellor,

3. OBJECT ORIENTED ANALYSIS

9

Identify Use Cases – Use Case Model – Documentation – Classification – Identifying Classes – Noun Phrases Approach – Common Class Pattern Approach – Use Case Driven Approach – Identifying Object Relationship, Attributes And Models. 4. OBJECT ORIENTED DESIGN 9 Design Process – Design Axioms – Designing Classes – Access Layer Design – View Layer Design. 5. MANAGING OBJECT ORIENTED DEVELOPMENT

9

Managing Analysis And Design – Evaluation Testing – Coding – Maintenance – Metrics – Case Study: Foundation Class Library – Client/Server Computing. Total No. Of Periods: 45 REFERENCE BOOKS: 1. Ali Bahrami, Object Oriented System Development, Mc Graw Hill International Edition, 1999. 2. Larman, Applying UML & Patterns: An Introduction to Object Oriented Analysis and Design, Pearson Education, 2nd Edition, 2003. 3. Bernd Bruegge, Allen H. Dutoit, “Object Oriented Software Engineering using UML, Patterns and Java”, Pearson Education 2nd Edition 2004.

WEB TECHNOLOGY

3 0 0 100

1. INTRODUCTION

9

Introduction – Network concepts – Web concepts – Internet addresses - Retrieving Data with URL – HTML – DHTML: Cascading Style Sheets - Scripting Languages: Javascript – Vbscript. 2. COMMON GATEWAY INTERFACE

9

Common Gateway Interface: Programming CGI Scripts – HTML Forms – Custom Database Query Scripts – Server Side Includes – Server security issues – XML. 3. JAVA PROGRAMMING

9

Java fundamentals: Classes – Inheritance – Packages – Interfaces – Exceptions Handling – Multi threading - Applets 4. SERVER SIDE PROGRAMMING

9

Server side Programming – Active server pages – Java server pages – Java Servlets: Servlet container – Exceptions – Sessions and Session Tracking – Using Servlet context – Dynamic Content Generation – Servlet Chaining and Communications. 5. APPLICATIONS

9

Simple applications – Internet Commerce – Database connectivity – Online databases – EDI Applications in Business – Plug-ins – Firewalls Total No. of Periods: 45 REFERENCE BOOKS: 1. Deitel, Deitel and Neito, “INTERNET and WORLD WIDE WEB – How to program”, Pearson education asia, 2002 2. D.Norton and H. Schildt, “Java 2: The complete Reference”, Fifth Edition, TMH. 3. Elliotte Rusty Herold , “Java Network Programming”, O’Reilly Publications, 3rd Edition, 2004. 4. Eric Ladd and Jim O’Donnell, et al, “USING HTML 4, XML, and JAVA1.2”, PHI publications, 2003.

5. Jeffy Dwight, Michael Erwin and Robert Nikes “USING CGI”, PHI Publications, 1997

INFORMATION SECURITY

3 0 0 100

UNIT 1 INTRODUCTION 9 History, What is Information Security?, Critical Characteristics of Information, NSTISSC Security Model, Components of an Information System, Securing the Components, Balancing Security and Access, The SDLC, The Security SDLC UNIT II SECURITY INVESTIGATION 9 Need for Security, Business Needs, Threats, Attacks, Legal, Ethical and Professional Issues UNIT III SECURITY ANALYSIS 9 Risk Management: Identifying and Assessing Risk, Assessing and Controlling Risk UNIT IV LOGICAL DESIGN 9 Blueprint for Security, Information Security Poicy, Standards and Practices, ISO 17799/BS 7799, NIST Models, VISA International Security Model, Design of Security Architecture, Planning for Continuity UNIT V PHYSICAL DESIGN 9 Security Technology, IDS, Scanning and Analysis Tools, Cryptography, Access Control Devices, Physical Security, Security and Personnel TOTAL : 45 REFERENCE BOOKS 1. Michael E Whitman and Herbert J Mattord, “Principles of Information Security”, Vikas Publishing House, New Delhi, 2004 2. Micki Krause, Harold F. Tipton, “Handbook of Information Security Management”, Vol 1-3 CRC Press LLC, 2004. 3. Stuart Mc Clure, Joel Scrambray, George Kurtz, “Hacking Exposed”, Tata McGraw-Hill, 2003 4. Matt Bishop, “Computer Security Art and Science”, Pearson/PHI, 2005.

DATABASE AND WEB TECHNOLOGY LAB

0 0 3

100

1. Study of all SQL commands 2. Implement the concept of Normalization 3. Implement the inventory control system with a reorder level 4. Develop a package for a bank to maintain its customer details 5. Develop a package for the payroll of a company 6. Web Page Creation using HTML and DHTM and Client side Scripting Languages 7. Write a application/GUI program in java for getting time and data information from the server using TCP/UDP 8. Write a program in java to implement Database Connectivity 9. Write a JSP program for order processing 10. Write a Servlet, bean program to access information from databases 11. Write a ASP program using the components

ELECTIVES ADVANCED JAVA PROGRAMMING UNIT I

3 0 0 100

JAVA FUNDAMENTALS

9

Java I/O streaming - filter and pipe streams - Byte Code interpretation - reflection Dynamic Reflexive Classes - Threading - Java Native Interfaces- Swing. UNIT II

NETWORK PROGRAMMING IN JAVA

9

Sockets - secure sockets - custom sockets - UDP datagrams - multicast sockets - URL classes - Reading Data from the server - writing data - configuring the connection Reading the header - telnet application - Java Messaging services UNIT III

APPLICATIONS IN DISTRIBUTED ENVIRONMENT9

Remote method Invocation - activation models - RMI custom sockets - Object Serialization - RMI - IIOP implementation - CORBA - IDL technology - Naming Services - CORBA programming Models - JAR file creation UNIT IV

MULTI-TIER APPLICATION DEVELOPMENT

9

Server side programming - servlets - Java Server Pages - Applet to Applet communication - applet to Servlet communication - JDBC - Using BLOB and CLOB objects - storing Multimedia data into databases - Multimedia streaming applications Java Media Framework. UNIT V

ENTERPRISE APPLICATIONS

9

Server Side Component Architecture - Introduction to J2EE - Session Beans - Entity Beans - Persistent Entity Beans - Transactions. TOTAL : 45 REFERENCE BOOKS 1.

Elliotte Rusty Harold, “ Java Network Programming”, O’Reilly publishers, 3rd Edition, 2004. (UNIT II)

2. 3. 4. 5.

Ed Roman, “Mastering Enterprise Java Beans”, John Wiley & Sons Inc., 2001. (UNIT III and UNIT V) Hortsmann & Cornell, “CORE JAVA 2 ADVANCED FEATURES, VOL II”, Pearson Education, 2002. (UNIT I and UNIT IV) Web reference: http://java.sun.com. Patrick Naughton, “COMPLETE REFERENCE: JAVA2”, Tata McGraw-Hill, 2003.

THEORY OF COMPUTATION

3 0 0 100

1. FINITE AUTOMATA AND REGULAR LANGUAGES 9 Finite Automata and Regular languages - Regular expressions and Regular languages – non determinism and Kleenes theorem, Equivalence of DFA and NFA, Finite Automation with e-moves, equivalence of regular expression and NFA with e-moves – pumping lemma for regular sets. 2. CONTEXT FREE LANGUAGES 9 Context free languages, Derivation and languages, Relationship between derivation and derivation trees, Simplification of context free grammars – Normal forms for context free grammars, CNF, and GNF. 3. PUSH DOWN AUTOMATA (PDA) 9 Acceptance by PDA, Pushdown automata and Context free languages, Pumping lemma for CFL, deterministic Context free languages and Deterministic pushdown automata. 4. TURING MACHINE 9 Context sensitive languages and LBA, Turing machine (Definition and examples), Computable languages and functions, Church Turing hypothesis, Universal Turing machine, P and NP problems, NP-complete. 5. UNSOLVABLE PROBLEMS 9 Unsolvable problems - Rice Theorem - Post's correspondence Problem, Recursive and recursively enumerable languages. Total No of periods: 45 REFERENCE BOOKS: 1. Hopcroft and Ullman, Introduction to Automata, Languages and Computation, Pearson Education, 2nd Edition, 2006 2. A. M. Natarajan, A. Tamilarasi & P. Balasubramani, “Theory of Computation”, New age International publishers, 2002 3. John.C.Martin, Introduction to languages and the Theory of Computation, 2nd Edition, McGraw Hill,1997 4. K.L.P.Mishra, N.Chandrasekaran, Theory of Computation, EEE, Prentice Hall of India, 3rd Edition, 2007. 5. Peter Linz, “An Introduction to formal languages and Automata, Narosa Publishing House, 3rd Edition, 2001. 6. Harry R. Lewis, Christos H. Papadimitriou, “Elements of Theory of Computation, Prentice Hall, 2002.

SOFT COMPUTING

3 0 0 100

1. NEURAL NETWORK 11 Fundamentals Basic Concepts – Backpropogation Network: Architecture, Learning, Illustration, Applications, Effects of tuning parameter, Selection of parameters Variations of Standard Backpropagation Algorithm -Research Directions – Associative Memory: Autocorrelators - Heterocorrelators: Kosko's Discrete BAM - Wang et al.'s Multiple Training Encoding Strategy - Exponential BAM - Associative Memory for Real-coded Pattern Pairs - Applications – Recent Trends – Adaptive Resonance Theory - Introduction – ART 1 and 2- Application – Sensitiveness of ordering data 2. FUZZY LOGIC 7 Fuzzy Set Theory : Fuzzy versus Crisp - Crisp sets - Fuzzy Sets - Crisp Relations - Fuzzy Relations – Fuzzy Systems - Crisp Logic - Predicate Logic - Fuzzy Logic - Fuzzy Rule based System - Defuzzification Methods Applications 3. GENETIC ALGORITHMS 9 Genetic Algorithms: History - Basic Concepts - Creation of Offspring - Working Principle - Encoding -Fitness Function -Reproduction – Genetic Modeling: Inheritance Operators –Cross Over - Inversion and Deletion - Mutation Operator - Bit-wise Operators - Applications – Multilevel Optimization - Real Life Problem - Differences and Similarities between GA and Other Traditional Methods Advances in GA 4. HYBRID SYSTEMS – I 9 Hybrid Systems - Neural Networks, Fuzzy Logic and Genetic Algorithms Hybrids -Preview of the Hybrid Systems to be Discussed – GA Based BPN - GA Based Weight Determination - Applications – Fuzzy - LR-type Fuzzy Architecture - Learning -Inference -Applications – Simplified Fuzzy ARTMAP - Introduction -Working – ApplicationRecent Trends 5. HYBRID SYSTEMS – II 9 FAM: Introduction - Single Association FAM - Fuzzy Hebb FAMs -FAM Involving a Rule Base - FAM Rules with Multiple Antecedents/Consequents -Applications – Fuzzy Logic Controlled GA - Soft Computing Tools - Problem Description of Optimum Design –Fuzzy Constraints - Illustrations - GA in Fuzzy Logic Controller Design Total No. of Periods: 45 REFERENCES: 1. S.Rajasekaran and G.A.V.Pai,”Neural Networks, Fuzzy Logic and Genetic Algorithms”,PHI,2004. 2. J.S.R.Jang, C.T.Sun and E.Mizutani, “Neuro-Fuzzy and Soft Computing”, PHI, Pearson Education 2004. 3. Timothy J.Ross,”Fuzzy Logic with Engineering Application “, McGraw Hill, 2000. 4. Davis E.Goldberg,”Genetic Algorithms:Search, Optimization and Machine Learning”Addison Wesley, N.Y.,2003. 5. R.Eberhart, P.simpson and R.Dobbins,”Computional Intelligence” PC Tools”,AP Professional,Boston 1996.

MOBILE COMPUTING

3 0

0 100

1. INTRODUCTION

9

Medium Access Control : Motivation for Specialized MAC- SDMA- FDMA- TDMACDMA- Comparison of Access mechanisms – Tele communications : GSM- DECTTETRA – UMTS- IMT-200 – Satellite Systems: Basics- Routing- LocalizationHandover- Broadcast Systems: Overview – Cyclic Repetition of Data- Digital Audio Broadcasting – Digital Video Broadcasting 2. WIRELESS NETWORKS

9

Wireless LAN: Infrared Vs Radio Transmission – Infrastructure Networks- Ad hoc Networks- IEEE 802.11 – HIPERLAN – Bluetooth- Wireless ATM: Working GroupServices- Reference Model – Functions – Radio Access Layer – Handover- Location Management- Addressing Mobile Quality of Service- Access Point Control Protocol 3. MOBILE NETWORK LAYER

9

Mobile IP : Goals – Assumptions and Requirement – Entities – IP packet Delivery- Agent Advertisement and Discovery – Registration – Tunneling and Encapsulation – Optimization – Reverse Tunneling – IPv6 – DHCP- Ad hoc Networks 4. MOBILE TRANSPORT LAYER

9

Traditional TCP- Indirect TCP- Snooping TCP- Mobile TCP- Fast retransmit/ Fast Recovery- Transmission/ Timeout Freezing – Selective Retransmission- Transaction Oriented TCP 5. WAP

9

Architecture – Datagram Protocol- Transport Layer Security- Transaction ProtocolSession Protocol- Application Environment-Wireless Telephony Application Total No of Periods: 45 REFERENCE BOOKS 1. J.Schiller, Mobile Communication, Addison Wesley, 2000. 2. William Stallings, Wireless Communication and Networks, Pearson Education, 2003. 3. Singhal, WAP-Wireless Application Protocol, Pearson Education, 2003 4. Lother Merk, Martin. S. Nicklaus and Thomas Stober, Principles of Mobile Computing, Second Edition, Springer, 2003. 5. William C.Y.Lee, Mobile Communication Design Fundamentals, John Wiley, 1993.

DISTRIBUTED COMPUTING

3 0 0 100

1. INTRODUCTION 9 Characterization of Distributed Systems - Examples - Resource Sharing and the Web Challenges - System Models - Architectural and Fundamental Models - Networking and Internetworking - Types of Networks - Network Principles - Internet Protocols - Case Studies. 2. PROCESSES AND DISTRIBUTED OBJECTS 9 Interprocess Communication - The API for the Internet Protocols - External Data Representation and Marshalling - Client-Server Communication - Group Communication - Case Study - Distributed Objects and Remote Invocation - Communication Between Distributed Objects - Remote Procedure Call - Events and Notifications - Java RMI Case Study. 3. OPERATING SYSTEM ISSUES – I 9 The OS Layer - Protection - Processes and Threads - Communication and Invocation – OS Architecture - Security - Overview - Cryptographic Algorithms - Digital Signatures Cryptography Pragmatics - Case Studies - Distributed File Systems - File Service Architecture - Sun Network File System - The Andrew File System 4. OPERATING SYSTEM ISSUES – II 9 Name Services -Domain Name System - Directory and Discovery Services - Global Name Service - X.500 Directory Service - Clocks, Events and Process States Synchronizing Physical Clocks - Logical Time And Logical Clocks - Global States Distributed Debugging - Distributed Mutual Exclusion – Elections – Multicast Communication Related Problems. 5. DISTRIBUTED TRANSACTION PROCESSING 9 Transactions - Nested Transactions - Locks - Optimistic Concurrency Control Timestamp Ordering - Comparison - Flat and Nested Distributed Transactions - Atomic Commit Protocols - Concurrency Control in Distributed Transactions - Distributed Deadlocks - Transaction Recovery - Overview of Replication And Distributed Multimedia Systems Total No of Periods: 45 REFERENCE BOOKS: 1. George Coulouris, Jean Dollimore and Tim Kindberg, Distributed Systems Concepts and 2. 3. 4. 5. 6.

Design, Pearson Education, 3rd Edition, 2002. Sape Mullender, Distributed Systems, Addison Wesley, 2nd Edition, 1993. Albert Fleishman, Distributes Systems- Software Design and Implementation, SpringerVerlag, 1994 M.L.Liu, Distributed Computing Principles and Applications, Pearson Education, 2004. Andrew S Tanenbaum , Maartenvan Steen,Distibuted Systems –Principles and Pardigms,Pearson Education, 2002 Mugesh Singhal,Niranjan G Shivaratri,Advanced Concepts in Operating Systems,Tata McGraw Hill Edition, 2001

MULTIMEDIA SYSTEMS

3 0 0 100

1. INTRODUCTION AND QOS

9

Introduction-QOS Requirements and Constraints-Concepts-Resources- Establishment Phase-Run-Time Phase-Management Architectures. 2. OPERATING SYSTEMS Real-Time Processing-Scheduling-Interprocess Management-Server Architecture-Disk Management.

9 Communication-Memory

and

3. FILE SYSTEMS AND NETWORKS

9

Traditional and Multimedia File Systems-Caching Policy-Batching-Piggy backingEthernet-Gigabit Ethernet-Token Ring-100VG AnyLAN-Fiber Distributed Data Interface (FDDI)- ATM Networks-MAN-WAN. 4. COMMUNICATION

9

Transport Subsystem-Protocol Support for QOS-Transport of Multimedia-Computer Supported Cooperative Work-Architecture-Session Management-MBone Applications. 5. SYNCHRONIZATION

9

Synchronization in Multimedia Systems-Presentation-Synchronization Types-Multimedia Synchronization Methods-Case Studies-MHEG-MODE-ACME. Total No of periods: 45 REFERENCE BOOKS: 1. Ralf Steinmetz and Klara Nahrstedt, “Multimedia Systems”, Springer, I Edition 2004. 2. Ralf Steinmetz and Klara Nahrstedt , Media Coding and Content Processing, Prentice hall, 2002. 3. Vaughan T, Multimedia, Tata McGraw Hill, 1999. 4. Mark J.B., Sandra K.M., Multimedia Applications Development using DVI technology, McGraw Hill, 1992. 5. K. R. Rao, Zoran S. Bojkovic, Dragorad A. Milovacovic, D. A. Milovacovic , Multimedia Communication Systems: Techniques, Standards, and Networks, Prentice Hall, 1st Edition, 2002 6. Ze-Nian Li and Mark S. Drew, Fundamentals of Multimedia, Pearson, 2004.

XML AND WEB SERVICES 1. INTRODUCTION

3 0 0 100 9

Role Of XML – XML and The Web – XML Language Basics – SOAP – Web Services – Revolutions Of XML – Service Oriented Architecture (SOA). 2. XML TECHNOLOGY

9

XML – Name Spaces – Structuring With Schemas and DTD – Presentation Techniques – Transformation – XML Infrastructure. 3. SOAP

9

Overview Of SOAP – HTTP – XML-RPC – SOAP: Protocol – Message Structure – Intermediaries – Actors – Design Patterns And Faults – SOAP With Attachments. 4. WEB SERVICES

9

Overview – Architecture – Key Technologies - UDDI – WSDL – ebXML – SOAP And Web Services In E-Com – Overview Of .NET And J2EE. 5. XML SECURITY

9

Security Overview – Canonicalization – XML Security Framework – XML Encryption – XML Digital Signature – XKMS Structure – Guidelines For Signing XML Documents – XML In Practice. Total No. of Periods: 45 REFERENCE BOOKS: 1. Frank. P. Coyle, XML, Web Services And The Data Revolution, Pearson Education, 2002. 2. Ramesh Nagappan , Robert Skoczylas and Rima Patel Sriganesh, “ Developing Java Web Services”, Wiley Publishing Inc., 2004. 3. Sandeep Chatterjee, James Webber, “Developing Enterprise Web Services”, Pearson Education, 2004. 4. McGovern, et al., “Java Web Services Architecture”, Morgan Kaufmann Publishers,2005.

BIO INFORMATICS

3 0 0 100

1. INTRODUCTION 7 The Central Dogma – Killer Application – Parallel Universes – Watson’s Definition – Top Down Vs Bottom Up Approach – Information Flow – Conversance – Communications. 2. DATABASE AND NETWORKS

9

Definition – Data Management – Data Life Cycle – Database Technology – Interfaces – Implementation – Networks: Communication Models – Transmission Technology – Protocols – Bandwidth – Topology – Contents – Security – Ownership – Implementation. 3. SEARCH ENGINES AND DATA VISUALIZATION 10 Search Process – Technologies – Searching And Information Theory – Computational Methods – Knowledge Management – Sequence Visualizations – Structure Visualizations – User Interfaces – Animation Vs Simulation 4. STATISTICS, DATA MINING AND PATTERN MATCHING

11

Statistical Concepts – Micro Arrays – Imperfect Data – Basics – Quantifying – Randomness – Data Analysis – Tools Selection – Alignment – Clustering – Classification – Data Mining Methods – Technology – Infrastructure Pattern Recognition – Discovery – Machine Learning – Text Mining – Pattern Matching Fundamentals – Dot Matrix Analysis – Substitution Matrix – Dynamic Programming – Word Method – Bayesian Method – Multiple Sequence Alignment Tools. 5. MODELING SIMULATION AND COLLABORATION 8 Drug Discovery Fundamentals – Protein Structure – System Biology Tools – Collaboration And Communication – Standards – Issues – Case Study. Total No. Of Periods: 45 REFERENCE BOOKS: 1. Bryan Bergeron, “Bio Informatics Computing”, Prentice Hall, 2003. 2. T.K. Affward, D.J. Parry Smith, “Introduction to Bio Informatics”, Pearson Education, 2001.

3. Pierre Baldi, Soren Brunak, “Bio Informatics – The Machine Learning Approach”, 2nd Edition, First East West Press, 2003

GRID COMPUTING

3 0 0 100

1. GRID COMPUTING

9

Introduction - Definition - Scope of grid computing 2. GRID COMPUTING INITIATIVES

9

Grid Computing Organizations and their roles – Grid Computing analog – Grid Computing road map. 3. GRID COMPUTING APPLICATIONS

9

Merging the Grid sources – Architecture with the Web Devices Architecture. 4. TECHNOLOGIES

9

OGSA – Sample use cases – OGSA platform components – OGSI – OGSA Basic Services. 5. GRID COMPUTING TOOL KITS

9

Globus Toolkit – Architecture, Programming model, High level services – OGSI .Net middleware Solutions. Total no. periods: 45 REFERENCE BOOKS: 1.Joshy Joseph & Craig Fellenstein, “Grid Computing”, PHI, PTR-2003. 2.Ahmar Abbas, “Grid Computing: A Practical Guide to technology and Applications”, Charles River media – 2003.

NETWORK SECURITY

3 0 0 100

1. INTRODUCTION

9

Attacks - Services - Mechanisms - Conventional Encryption - Classical And Modern Techniques – Encryption Algorithms - Confidentiality. 2. PUBLIC KEY ENCRYPTION

9

RSA - Elliptic Curve Cryptography - Number Theory Concepts 3. MESSAGE AUTHENTICATION

9

Hash Functions - Digest Functions - Digital Signatures - Authentication Protocols. 4. NETWORK SECURITY PRACTICE

9

Authentication, Applications - Electronic Mail Security - IP Security - Web Security. 5. SYSTEM SECURITY

9

Intruders – Viruses – Worms – Firewalls Design Principles – Trusted Systems. Total No. of Periods: 45

REFERENCE BOOKS: 1.

Stallings, Cryptography & Network Security - Principles & Practice, Prentice Hall, 3rd Edition 2002. 2. Bruce, Schneier, Applied Cryptography, 2nd Edition, Toha Wiley & Sons, 1996. 3. Man Young Rhee, “Internet Security”, Wiley, 2003. 4. Pfleeger & Pfleeger, “Security in Computing”, Pearson Education, 3rd Edition, 2003.

EMBEDDED SYSTEMS

3 0 0 100

1. INTRODUCTION TO EMBEDDED SYSTEMS 9 Definition and Classification – Overview of Processors and hardware units in an embedded system – Software embedded into the system – Exemplary Embedded Systems – Embedded Systems on a Chip (SoC) and the use of VLSI designed circuits 2. DEVICES AND BUSES FOR DEVICES NETWORK 9 I/O Devices - Device I/O Types and Examples – Synchronous - Iso-synchronous and Asynchronous Communications from Serial Devices - Examples of Internal SerialCommunication Devices - UART and HDLC - Parallel Port Devices - Sophisticated interfacing features in Devices/Ports- Timer and Counting Devices - ‘12C’, ‘USB’, ‘CAN’ and advanced I/O Serial high speed buses- ISA, PCI, PCI-X, cPCI and advanced buses. 3. EMBEDDED PROGRAMMING 9 Programming in assembly language (ALP) vs. High Level Language - C Program Elements, Macros and functions -Use of Pointers - NULL Pointers - Use of Function Calls – Multiple function calls in a Cyclic Order in the Main Function Pointers – Function Queues and Interrupt Service Routines Queues Pointers – Concepts of EMBEDDED PROGRAMMING in C++ - Objected Oriented Programming – Embedded Programming in C++, ‘C’ Program compilers – Cross compiler – Optimization of memory codes. 4. REAL TIME OPERATING SYSTEMS – PART - 1 9 OS Services – Interrupt Routines Handling, Task scheduling models - Handling of task scheduling and latency and deadlines as performance metrics - Inter Process Communication And Synchronisation – Shared data problem – Use of Semaphore(s) – Priority Inversion Problem and Deadlock Situations – Inter Process Communications using Signals – Semaphore Flag or mutex as Resource key – Message Queues – Mailboxes – Pipes – Virtual (Logical) Sockets – RPCs. 5. REAL TIME OPERATING SYSTEMS – PART - 2 9 Study of RTOS, VxWorks - Basic Features - Task Management Library at the System Library Header File - VxWorks System Functions and System Tasks - Inter Process (Task) Communication Functions - Case Study of Coding for Sending Application Layer Byte Streams on a TCP/IP Network Using RTOS Vxworks Total No. of Periods: 45 REFERENCE BOOKS: 1. Rajkamal, Embedded Systems Architecture, Programming and Design, TATA McGraw Hill, First reprint 2003 2. David E.Simon, An Embedded Software Primer, Pearson Education Asia, First Indian Reprint 2000.

DIGITAL IMAGE PROCESSING

3 0 0 100

1. DIGITAL IMAGE FUNDAMENTALS

9

Image formation, Image transforms – Fourier transforms, Walsh, Hadamard, Discrete cosine, Hotelling transforms. 2. IMAGE ENHANCEMENT & RESTORATION

9

Histogram modification techniques - Image smoothening - Image Sharpening - Image Restoration - Degradation Model – Noise models - Spatial filtering – Frequency domain filtering. 3. IMAGE COMPRESSION & SEGMENTATION

9

Compression Models - Elements of information theory - Error free Compression -Image segmentation –Detection of discontinuities - Edge linking and boundary detection Thresholding – Region based segmentation - Morphology. 4. REPRESENTATION AND DESCRIPTION

9

Representation schemes- Boundary descriptors- Regional descriptors - Relational Descriptors 5. OBJECT RECOGNITION AND INTERPRETATION

9

Patterns and pattern classes - Decision-Theoretic methods - Structural methods. Total No of periods: 45 REFERENCE BOOKS: 1. Gonzalez.R.C & Woods. R.E., Digital Image Processing, 2nd Edition, Pearson Education, 2002. 2. Anil Jain.K, Fundamentals of Digital image Processing, Prentice Hall of India, 1989. 3. Sid Ahmed, Image Processing, McGraw Hill, New York, 1995.

SOFTWARE QUALITY ASSURANCE

3 0 0 100

1. CONCEPTS

9

Concepts of Quality Control, Quality Assurance, Quality Management - Total Quality Management; Cost of Quality; QC tools - 7 QC Tools and Modern Tools; Other related topics - Business Process Re-engineering –Zero Defect, Six Sigma, Quality Function Deployment, Benchmarking, Statistical process control. 2. SOFTWARE ENGINEERING CONCEPTS

9

Software Engineering Principles, Software Project Management, Software Process, Project and Product Metrics, Risk Management, Software Quality Assurance; Statistical Quality Assurance - Software Reliability, Muse Model; Software Configuration Management; Software Testing; CASE (Computer Aided Software Engineering). 3. QUALITY ASSURANCE MODELS

9

Models for Quality Assurance-ISO-9000 - Series, CMM, SPICE, Malcolm Baldrige Award. 4. SOFTWARE QUALITY ASSURANCE RELATED TOPICS

9

Software Process - Definition and implementation; internal Auditing and Assessments; Software testing -Concepts, Tools, Reviews, Inspections & Walkthroughts; P-CMM. 5. FUTURE TRENDS

9

PSP and TSP, CMMI, OO Methodology, Clean-room software engineering, Defect injection and prevention. Total No of periods: 45 REFERENCE BOOKS: 1. Watts Humphery, “Managing Software Process ", Addison - Wesley, 1998. 2. Philip B Crosby, " Quality is Free: The Art of Making Quality Certain ", Mass Market, 1992. 3. Roger Pressman, “Software Engineering ", Sixth Edition, McGraw Hill, 2005.

AD HOC NETWORKS

3 0 0 100

1. INTRODUCTION 9 Introduction-Fundamentals of Wireless Communication Technology - The Electromagnetic Spectrum - Radio Propagation Mechanisms - Characteristics of the Wireless Channel - IEEE 802.11a,b Standard – Origin Of Ad hoc: Packet Radio Networks - Technical Challenges - Architecture of PRNETs - Components of Packet Radios – Ad hoc Wireless Networks -What Is an Ad Hoc Network? Heterogeneity in Mobile Devices - Wireless Sensor Networks - Traffic Profiles - Types of Ad hoc Mobile Communications - Types of Mobile Host Movements - Challenges Facing Ad Hoc Mobile Networks-Ad hoc wireless Internet 2. AD HOC ROUTING PROTOCOLS 9 Introduction - Issues in Designing a Routing Protocol for Ad Hoc Wireless Networks Classifications of Routing Protocols -Table-Driven Routing Protocols - Destination Sequenced Distance Vector (DSDV) - Wireless Routing Protocol (WRP) - Cluster Switch Gateway Routing (CSGR) - Source-Initiated On-Demand Approaches - Ad Hoc OnDemand Distance Vector Routing (AODV) - Dynamic Source Routing (DSR) -Temporally Ordered Routing Algorithm (TORA) - Signal Stability Routing (SSR) -Location-Aided Routing (LAR) - Power-Aware Routing (PAR) - Zone Routing Protocol (ZRP) 3. MULTICASTROUTING IN AD HOC NETWORKS 9 Introduction - Issues in Designing a Multicast Routing Protocol - Operation of Multicast Routing Protocols - An Architecture Reference Model for Multicast Routing Protocols -Classifications of Multicast Routing Protocols - Tree-Based Multicast Routing Protocols- Mesh-Based Multicast Routing Protocols - Summary of Tree-and Mesh-Based Protocols - Energy-Efficient Multicasting - Multicasting with Quality of Service Guarantees - Application-Dependent Multicast Routing - Comparisons of Multicast Routing Protocols 4. TRANSPORT LAYER, SECURITY PROTOCOLS 9 Introduction - Issues in Designing a Transport Layer Protocol for Ad Hoc Wireless Networks - Design Goals of a Transport Layer Protocol for Ad Hoc Wireless Networks -Classification of Transport Layer Solutions - TCP Over Ad Hoc Wireless Networks -Other Transport Layer Protocols for Ad Hoc Wireless Networks - Security in Ad Hoc Wireless Networks - Network Security Requirements - Issues and Challenges in Security Provisioning - Network Security Attacks - Key Management - Secure Routing in Ad Hoc Wireless Networks 5. QoS AND ENERGY MANAGEMENT 9 Introduction - Issues and Challenges in Providing QoS in Ad Hoc Wireless Networks -Classifications of QoS Solutions - MAC Layer Solutions - Network Layer Solutions QoS Frameworks for Ad Hoc Wireless Networks Energy Management in Ad Hoc Wireless Networks –Introduction - Need for Energy Management in Ad Hoc Wireless Networks - Classification of Energy Management Schemes - Battery Management

Schemes - Transmission Power Management Schemes - System Power Management Schemes REFERENCE BOOKS: 1. C. Siva Ram Murthy and B.S. Manoj “Ad Hoc Wireless Networks: Architectures and Protocols”, Prentice Hall PTR,2004 2. C.K. Toh, Ad Hoc Mobile Wireless Networks: Protocols and Systems, Prentice Hall PTR ,2001 3. Charles E. Perkins, Ad Hoc Networking, Addison Wesley, 2000

DATA WAREHOUSING AND DATA MINING

3 0 0 100

1. INTRODUCTION 9 Relation To Statistics, Databases- Data Mining Functionalities-Steps In Data Mining Process-Architecture Of A Typical Data Mining Systems- Classification Of Data Mining Systems - Overview Of Data Mining Techniques. 2. DATA PREPROCESSING AND ASSOCIATION RULES 9 Data Preprocessing-Data Cleaning, Integration, Transformation, Reduction, Discretization Concept Hierarchies-Concept Description: Data Generalization And Summarization Based Characterization- Mining Association Rules In Large Databases. 3. PREDICTIVE MODELING 9 Classification And Prediction: Issues Regarding Classification And PredictionClassification By Decision Tree Induction-Bayesian Classification-Other Classification Methods-Prediction-Clusters Analysis: Types Of Data In Cluster Analysis- Categorization Of Major Clustering Methods: Partitioning Methods –Hierarchical Methods 4. DATA WAREHOUSING 9 Data Warehousing Components -Multi Dimensional Data Model- Data Warehouse Architecture-Data Warehouse Implementation- -Mapping The Data Warehouse To Multiprocessor Architecture- OLAP.-Need- Categorization Of OLAP Tools. 5. APPLICATIONS 9 Applications of Data Mining-Social Impacts Of Data Mining-Tools-An Introduction To DB Miner-Case Studies-Mining WWW-Mining Text Database-Mining Spatial Databases. Total No of Periods: 45 REFERENCE BOOKS: 1. Jiawei Han, Micheline Kamber, "Data Mining: Concepts and Techniques", Morgan Kaufmann Publishers, 2002. 2. Alex Berson,Stephen J. Smith, “Data Warehousing, Data Mining,& OLAP”, Tata Mcgraw- Hill, 2004. 3. Usama M.Fayyad, Gregory Piatetsky - Shapiro, Padhrai Smyth And Ramasamy Uthurusamy, "Advances In Knowledge Discovery And Data Mining", The M.I.T Press, 1996. 4. Ralph Kimball, "The Data Warehouse Life Cycle Toolkit", John Wiley & Sons Inc., 1998. 5. Sean Kelly, "Data Warehousing In Action", John Wiley & Sons Inc., 1997. .

PERFORMANCE EVALUATION OF COMPUTER SYSTEMS AND NETWORKS 3 0

0

100

1. INTRODUCTION

9

Need for performance evaluation – Role of performance evaluation - performance evaluation Methods – Performance Metrics and Evaluation Criteria – CPU and I/O Architectures – Distributed and Network Architectures– Secondary Storage – Topologies – Computer Architecture - Fundamental Concepts and Performance Measures. 2. PROBABILITY AND STOCHASTIC PROCESSES

9

Scheduling Algorithms – Workloads – Random Variables – Probability Distributions – Densities – Expectation – Stochastic Processes – Poisson Process – Birth-Death Process – Markov Process. 3. QUEUING THEORY

9

Queuing Systems – Networks of Queues - Estimating Parameters and Distributions – Computational Methods – Simulation Process – Time Control – Systems and Modeling. 4. PETRI NETS AND SYSTEM PERFORMANCE

9

Petri Nets – Classical Petri Nets – Timed Petri Nets – Priority-based Petri Nets – Colored Petri Nets – Generalized Petri Nets – Tool Selection – Validation of Results – Performance Metrics – Evaluation – Multiple Server Computer System Analysis. 5. ANALYSIS

9

OS Components – System Architecture – Workloads – Design – Simulation – Analysis Database System Performance – Computer Networks Components – Simulation Modelling of LAN. Total No of periods: 45 REFERENCE BOOKS: 1. 1. Paul J. Fortier, Howard E. Michael, “Computer Systems Performance Evaluation and Prediction”, Elsvier Science (USA), 2003. 2. Thomas G. Robertazzi, “Computer Networks and Systems: Queing theory and Performance Evaluation”, 3rd Edition, Springer, 2000. 3. Domenico Ferrari , Giuseppe Serazzi ,Alexandro Zeijher, Measurement & Tuning of Computer Systems –Prentice Hall Inc, 1983. 4. Michael F.Mories and Paul F.Roth,. Tools and techniques, Computer Performance Evaluation, Van Nostrand, New York, 1982.

AGENT BASED INTELLIGENT SYSTEMS

3 0 0 100

1. INTRODUCTION

9

Definitions - Foundations - History - Intelligent Agents-Problem Solving-Searching Heuristics -Constraint Satisfaction Problems - Game playing. 2. KNOWLEDGE REPRESENTATION AND REASONING

9

Logical Agents-First order logic-First Order Inference-Unification-Chaining- Resolution Strategies-Knowledge Representation-Objects-Actions-Events 3. PLANNING AGENTS

9

Planning Problem-State Space Search-Partial Order Planning-Graphs-Nondeterministic Domains-Conditional Planning-Continuous Planning-MultiAgent Planning. 4. AGENTS AND UNCERTAINITY

9

Acting under uncertainty – Probability Notation-Bayes Rule and use - Bayesian Networks-Other Approaches-Time and Uncertainty-Temporal Models- Utility Theory Decision Network – Complex Decisions. 5. HIGHER LEVEL AGENTS

9

Knowledge in Learning-Relevance Information-Statistical Learning MethodsReinforcement Learning-Communication-Formal Grammar-Augmented GrammarsFuture of AI. Total No of periods: 45 REFERENCE BOOKS: 1. Stuart Russell and Peter Norvig, “Artificial Intelligence - A Modern Approach”, 2nd Edition, Prentice Hall, 2002 2. Michael Wooldridge, “An Introduction to Multi Agent System”, John Wiley, 2002. 3. Patrick Henry Winston, Artificial Intelligence, III Edition, AW, 1999. 4. Nils.J.Nilsson, Principles of Artificial Intelligence, Narosa Publishing House, 1992.

VISUALIZATION TECHNIQUES

3 0 0 100

1. INTRODUCTION

9

Introduction to Visualisation - Principles of 2D & 3D Computer Graphics - Models and Simulation strategies. 2. POPULAR TECHNIQUES

9

Surface Plots - City scopes - Fish eye views - Benediktine Space - Perspective walls Cone trees and Cam trees - Sphere Visualisation - Rooms - Emotical icons. 3. ADVANCED TECHNIQUES

9

Self-Organising graphs - Spatial Data arrangements - Benediktine Cyberspace Statistical Clustering and Proximity measures - Hyper Structures - Human Centered Approaches - Information Cube. 4. VISUALIZATION SYSTEMS

9

Database Visualisation - Populated Information Terrains - Legibility enhancement Hyper structure Visualisation - Information Visualisation. 5. SOFTWARE VISUALIZATION

9

Rapid Prototyping - Models for user interaction - Formal Specification of Software DFD – Software Architecture. Total No of periods: 45 REFERENCE BOOKS: 1. Chaomei Chan, Information Visualisation and Virtual Environment, Springer - Verlag, 1999. 2. Benedikt. M, Cyberspace: First Steps, MIT Press, 1991. 3. Pauline Wills, Visualisation: A Beginner's Guide, Hodder & Stoughton, 1999. 4. Sheryl A Sorby exal, 3D Visualisation for Engineering Graphics, Prentice Hall, 1998.

ADVANCED DATABASES

3 0 0 100

1. DATABASE MANAGEMENT

9

Relational Data Model – SQL - Database Design - Entity-Relationship Model – Relational Normalization – Embedded SQL – Dynamic SQL – JDBC – ODBC. 2. ADVANCED DATABASES

10

Object Databases - Conceptual Object Data Model – XML and Web Data – XML Schema – Distributed Data bases – OLAP and Data Mining – ROLAP and MOLAP 3. QUERY AND TRANSACTION PROCESSING 8 Query Processing Basics – Heuristic Optimization – Cost, Size Estimation - Models of Transactions – Architecture – Transaction Processing in a Centralized and Distributed System – TP Monitor. 4. IMPLEMENTING AND ISOLATION

9

Schedules – Concurrency Control – Objects and Semantic Commutativity – Locking – Crash, Abort and Media Failure – Recovery – Atomic Termination – Distributed Deadlock – Global Serialization – Replicated Databases – Distributed Transactions in Real World. 5. DATABASE DESIGN ISSUES

9

Security – Encryption – Digital Signatures – Authorization – Authenticated RPC Integrity - Consistency - Database Tuning - Optimization and Research Issues. Total No of periods:

45

REFERENCE BOOKS: 1. Philip M. Lewis, Arthur Bernstein, Michael Kifer, “Databases and Transaction Processing: An Application-Oriented Approach”, Addison-Wesley, 2002 2. R. Elmasri and S.B. Navathe, Fundamentals of Database Systems, 3rd Edition, Addison Wesley, 2004 3. Abraham Silberschatz, Henry. F. Korth, S.Sudharsan, Database System Concepts, 4th Edition., Tata McGraw Hill, 2004 4. Raghu Ramakrishnan & Johannes Gehrke, “Database Management Systems”, 3rd Edition, TMH, 2003

SOFTWARE PROJECT MANAGEMENT

3 0 0 100

1. INTRODUCTION

9

Conventional Software Management – Evolution of Software Economics – Improving Software Economics – Conventional versus Modern Software Project Management 2. SOFTWARE MANAGEMENT PROCESS FRAMEWORK

9

Lifecycle Phases – Artifacts of the Process – Model Based Software Architectures – Workflows of the Process – Checkpoints of the Process 3. SOFTWARE MANAGEMENT DISCIPLINES

9

Iterative Process Planning - Organisation and Responsibilities – Process Automation – Process Control and Process Instrumentation – Tailoring the Process 4. MANAGED AND OPTIMIZED PROCESS

9

Data Gathering and Analysis: Principles of Data Gathering, Data Gathering Process, Software Measures, Data Analysis - Managing Software Quality – Defect Prevention 5. CASE STUDIES

9

COCOMO Cost Estimation Model – Change Metrics – CCPDS-R Total No of periods: 45 REFERENCE BOOKS: 1. Walker Royce “Software Project Management – A Unified Framework “, Pearson Education, 2004 (Unit I, II, III & V) 2. Humphrey, Watts: “Managing the software process ", Addison Wesley, 1989. (Unit IV) 3. Ramesh Gopalaswamy, “Managing Global Projects”, Tata McGraw Hill, 2001. 4. Bob Hughes, Mikecotterell, “Software Project Management”,3rd Edition, Tata McGraw Hill, 2004.

COMPONENT BASED TECHNOLOGY

3 0 0 100

1. INTRODUCTION

9

Software Components – objects – fundamental properties of Component technology – modules – interfaces – callbacks – directory services – component architecture – components and middleware. 2. JAVA COMPONENT TECHNOLOGIES

9

Threads – Java Beans – Events and connections – properties – introspection – JAR files – reflection – object serialization – Enterprise Java Beans – Distributed Object models – RMI and RMI-IIOP. 3. CORBA TECHNOLOGIES

9

Java and CORBA – Interface Definition language – Object Request Broker – system object model – portable object adapter – CORBA services – CORBA component model – containers – Application server – model driven architecture. 4. COM AND .NET TECHNOLOGIES

9

COM – Distributed COM – object reuse – interfaces and versioning – dispatch interfaces – connectable objects – OLE containers and servers – Active X controls – .NET components - assemblies – appdomains – contexts – reflection – remoting. 5. COMPONENT FRAMEWORKS AND DEVELOPMENT

9

Connectors – contexts – EJB containers – CLR contexts and channels – Black Box component framework – directory objects – cross-development environment – component-oriented programming – Component design and implementation tools – testing tools - assembly tools. Total No of periods: 45 REFERENCE BOOKS: 1.

Clemens Szyperski, “Component Software: Beyond Object-Oriented Programming”, Addison Wesley, 2nd Edition 2002. 2. Ed Roman, “Enterprise Java Beans”,3rd Edition, Wiley, 2004. 3. Andreas Vogel, Keith Duddy, “Java Programming with CORBA”, John Wiley & Sons 1998 4. Corry, Mayfield, Cadman, “COM/DCOM Primer Plus”, Tec media, 1st Edition, 1999

EMBEDDED SYSTEMS

3 0 0 100

UNIT I INTRODUCTION TO EMBEDDED SYSTEMS 9 Definition and Classification - Overview of Processors and hardware units in an embedded system - Software embedded into the system - Exemplary Embedded Systems - Embedded Systems on a Chip (SoC) and the use of VLSI designed circuits UNIT II DEVICES AND BUSES FOR DEVICES NETWORK 9 I/O Devices - Device I/O Types and Examples - Synchronous - Iso-synchronous and Asynchronous Communications from Serial Devices - Examples of Internal SerialCommunication Devices - UART and HDLC - Parallel Port Devices - Sophisticated interfacing features in Devices/Ports- Timer and Counting Devices - ‘12C’, ‘USB’, ‘CAN’ and advanced I/O Serial high speed buses- ISA, PCI, PCI-X, cPCI and advanced buses. UNIT III PROGRAMMING CONCEPTS AND EMBEDDED PROGRAMMING IN C, C++ 9 Programming in assembly language (ALP) vs. High Level Language - C Program Elements, Macros and functions -Use of Pointers - NULL Pointers - Use of Function Calls - Multiple function calls in a Cyclic Order in the Main Function Pointers - Function Queues and Interrupt Service Routines Queues Pointers - Concepts of EMBEDDED PROGRAMMING in C++ - Objected Oriented Programming - Embedded Programming in C++, ‘C’ Program compilers - Cross compiler - Optimization of memory codes. UNIT IV REAL TIME OPERATING SYSTEMS - PART - 1 9 Definitions of process, tasks and threads - Clear cut distinction between functions - ISRs and tasks by their characteristics - Operating System Services- Goals - Structures- Kernel - Process Management - Memory Management - Device Management - File System Organisation and Implementation - I/O Subsystems - Interrupt Routines Handling in RTOS, REAL TIME OPERATING SYSTEMS : RTOS Task scheduling models Handling of task scheduling and latency and deadlines as performance metrics - Cooperative Round Robin Scheduling - Cyclic Scheduling with Time Slicing (Rate Monotonics Co-operative Scheduling) - Preemptive Scheduling Model strategy by a Scheduler - Critical Section Service by a Preemptive Scheduler - Fixed (Static) Real time scheduling of tasks INTER PROCESS COMMUNICATION AND SYNCHRONISATION - Shared data problem - Use of Semaphore(s) - Priority Inversion Problem and Deadlock Situations - Inter Process Communications using Signals Semaphore Flag or mutex as Resource key - Message Queues - Mailboxes - Pipes Virtual (Logical) Sockets - Remote Procedure Calls (RPCs). UNIT V REAL TIME OPERATING SYSTEMS - PART - 2 9 Study of Micro C/OS-II or Vx Works or Any other popular RTOS - RTOS System Level Functions - Task Service Functions - Time Delay Functions - Memory Allocation Related Functions - Semaphore Related Functions - Mailbox Related Functions - Queue Related Functions - Case Studies of Programming with RTOS - Understanding Case Definition -

Multiple Tasks and their functions - Creating a list of tasks - Functions and IPCs Exemplary Coding Steps. TOTAL: 45 REFERENCE BOOKS 1. Rajkamal, Embedded Systems Architecture, Programming and Design, TATA McGraw-Hill, First reprint Oct. 2003 2. Steve Heath, Embedded Systems Design, Second Edition-2003, Newnes, 3. David E.Simon, An Embedded Software Primer, Pearson Education Asia, First Indian Reprint 2000. 4. Wayne Wolf, Computers as Components; Principles of Embedded Computing System Design - Harcourt India, Morgan Kaufman Publishers, First Indian Reprint 2001 5. Frank Vahid and Tony Givargis, Embedded Systems Design - A unified Hardware / Software Introduction, John Wiley, 2002. NATURAL LANGUAGE PROCESSING

3 0 0 100

UNIT I INTRODUCTION 6 Introduction: Knowledge in speech and language processing - Ambiguity - Models and Algorithms - Language, Thought and Understanding. Regular Expressions and automata: Regular expressions - Finite-State automata. Morphology and Finite-State Transducers: Survey of English morphology - Finite-State Morphological parsing - Combining FST lexicon and rules - Lexicon-Free FSTs: The porter stammer - Human morphological processing UNIT II SYNTAX 10 Word classes and part-of-speech tagging: English word classes - Tagsets for English Part-of-speech tagging - Rule-based part-of-speech tagging - Stochastic part-of-speech tagging - Transformation-based tagging - Other issues. Context-Free Grammars for English: Constituency - Context-Free rules and trees - Sentence-level constructions - The noun phrase - Coordination - Agreement - The verb phase and sub categorization Auxiliaries - Spoken language syntax - Grammars equivalence and normal form - FiniteState and Context-Free grammars - Grammars and human processing. Parsing with Context-Free Grammars: Parsing as search - A Basic Top-Down parser - Problems with the basic Top-Down parser - The early algorithm - Finite-State parsing methods. UNIT III ADVANCED FEATURES AND SYNTAX 11 Features and Unification: Feature structures - Unification of feature structures - Features structures in the grammar - Implementing unification - Parsing with unification constraints - Types and Inheritance. Lexicalized and Probabilistic Parsing: Probabilistic context-free grammar - problems with PCFGs - Probabilistic lexicalized CFGs Dependency Grammars - Human parsing.

UNIT IV SEMANTIC 10 Representing Meaning: Computational desiderata for representations - Meaning structure of language - First order predicate calculus - Some linguistically relevant concepts Related representational approaches - Alternative approaches to meaning. Semantic Analysis: Syntax-Driven semantic analysis - Attachments for a fragment of English Integrating semantic analysis into the early parser - Idioms and compositionality - Robust semantic analysis. Lexical semantics: relational among lexemes and their senses WordNet: A database of lexical relations - The Internal structure of words - Creativity and the lexicon. UNIT V APPLICATIONS 8 Word Sense Disambiguation and Information Retrieval: Selectional restriction-based disambiguation - Robust word sense disambiguation - Information retrieval - other information retrieval tasks. Natural Language Generation: Introduction to language generation - Architecture for generation - Surface realization - Discourse planning - Other issues. Machine Translation: Language similarities and differences - The transfer metaphor - The interlingua idea: Using meaning - Direct translation - Using statistical techniques - Usability and system development. TOTAL : 45 REFERENCE BOOKS 1. Daniel Jurafsky & James H.Martin, “ Speech and Language Processing”, Pearson Education (Singapore) Pte. Ltd., 2002. 2. James Allen, “Natural Language Understanding”, Pearson Education, 2003. HIGH SPEED NETWORKS

3 0 0 100

UNIT I HIGH SPEED NETWORKS 9 Frame Relay Networks - Asynchronous transfer mode - ATM Protocol Architecture, ATM logical Connection, ATM Cell - ATM Service Categories - AAL. High Speed LAN’s: Fast Ethernet, Gigabit Ethernet, Fibre Channel - Wireless LAN’s: applications, requirements - Architecture of 802.11 UNIT II CONGESTION AND TRAFFIC MANAGEMENT 8 Queuing Analysis- Queuing Models - Single Server Queues Effects of Congestion - Congestion Control - Traffic Management - Congestion Control in Packet Switching Networks - Frame Relay Congestion Control. UNIT III TCP AND ATM CONGESTION CONTROL 12 TCP Flow control - TCP Congestion Control - Retransmission - Timer Management Exponential RTO backoff - KARN’s Algorithm - Window management - Performance of TCP over ATM. Traffic and Congestion control in ATM - Requirements - Attributes Traffic Management Frame work, Traffic Control - ABR traffic Management - ABR rate control, RM cell formats, ABR Capacity allocations - GFR traffic management. UNIT IV

INTEGRATED AND DIFFERENTIATED SERVICES

8

Integrated Services Architecture - Approach, Components, Services- Queuing Discipline, FQ, PS, BRFQ, GPS, WFQ - Random Early Detection, Differentiated Services UNIT V PROTOCOLS FOR QOS SUPPORT 8 RSVP - Goals & Characteristics, Data Flow, RSVP operations, Protocol Mechanisms Multiprotocol Label Switching - Operations, Label Stacking, Protocol details - RTP Protocol Architecture, Data Transfer Protocol, RTCP. TOTAL : 45 REFERENCE BOOKS 1. William Stallings, “HIGH SPEED NETWORKS AND INTERNET”, Pearson Education, Second Edition, 2002. [Chapter - 4-6, 8, 10, 12, 13, 17,18] 2. Warland & Pravin Varaiya, “HIGH PERFORMANCE COMMUNICATION NETWORKS”, Jean Harcourt Asia Pvt. Ltd., II Edition, 2001. 3. Irvan Pepelnjk, Jim Guichard and Jeff Apcar, “MPLS and VPN architecture”, Cisco Press, Volume 1 and 2, 2003 DIGITAL SIGNAL PROCESSING

3 1 0 100

UNIT I SIGNALS AND SYSTEMS 9 Basic elements of digital signal Processing –Concept of frequency in continuous time and discrete time signals –Sampling theorem –Discrete time signals. Discrete time systems – Analysis of Linear time invariant systems –Z transform –Convolution and correlation. UNIT II FAST FOURIER TRANSFORMS 9 Introduction to DFT – Efficient computation of DFT Properties of DFT – FFT algorithms – Radix-2 and Radix-4 FFT algorithms – Decimation in Time – Decimation in Frequency algorithms – Use of FFT algorithms in Linear Filtering and correlation. UNIT III IIR FILTER DESIGN 9 Structure of IIR – System Design of Discrete time IIR filter from continuous time filter – IIR filter design by Impulse Invariance. Bilinear transformation – Approximation derivatives – Design of IIR filter in the Frequency domain. UNIT IV FIR FILTER DESIGN 9 Symmetric & Antisymteric FIR filters – Linear phase filter – Windowing technique – Rectangular, Kaiser windows – Frequency sampling techniques – Structure for FIR systems. UNIT V FINITE WORD LENGTH EFFECTS 9 Quantization noise – derivation for quantization noise power – Fixed point and binary floating point number representation – comparison – over flow error – truncation error – co-efficient quantization error - limit cycle oscillation – signal scaling – analytical model of sample and hold operations – Application of DSP – Model of Speech Wave Form – Vocoder. TUTORIAL 15

TOTAL : 60 REFERENCE BOOKS 1. John G Proakis and Dimtris G Manolakis, “Digital Signal Processing Principles, Algorithms and Application”, PHI/Pearson Education, 2000, 3rd Edition. 2. Alan V Oppenheim, Ronald W Schafer and John R Buck, “Discrete Time Signal Processing”, PHI/Pearson Education, 2000, 2nd Edition. 3. Johny R.Johnson, “Introduction to Digital Signal Processing”, Prentice Hall of India/Pearson Education, 2002. 4. Sanjit K.Mitra, “Digital Signal Processing: A Computer – Based Approach”, Tata McGraw-Hill, 2001, Second Edition.

ADVANCED ALGORITHMS

3 0 0 100

UNIT I INTRODUCTION 5 Mathematical Background - Design and Analysis of algorithms - Basic concepts UNIT II SORTING AND ORDER STATISTICS 10 Internal sort algorithms - Analysis - Worstcase - Average case - Sorting in Linear Time Medians and order statistics - Augmenting Data Structures - Red Black Trees - Dynamic Order Statistics - FFT - Algorithm - Implementation. UNIT III DESIGN TECHNIQUES 10 Divide and Conquer - Dynamic Programming - Greedy method - Backtracking -- Branch & Bound – Classical examples - Analysis. UNIT IV GRAPH AND PARALLEL ALGORITHMS 9 Graphs - Representation - Traversals - Topological sort - Minimum spanning tree Shortest paths – Biconnected and strongly connected components - Parallel algorithms Sorting – Matrix multiplication - Numerical - Graph. UNIT V SELECTED TOPICS NP Completeness - Approximation alogorithms - Matrices - Transitive closure Warshall's - Kronrod's algorithm - Computaional Geometry.

11

REFERENCES BOOKS: 1. T.H. Cormen, C.E. Leiserson, R.L. Rivest, Introduction to Algorithms, McGraw Hill Book Company, 1994. 2. Sara Baase, "Computer Algorithms : Introduction to Design and Analysis, Addison Wesley Publishing Company, 1998. 3. M.J. Quinn, Designing Efficient Algorithms for Parallel Computers, McGraw Hill Book Company, 1998.

CREATIVE THINKING

3 0 0 100

1. FUNDAMENTALS OF CREATIVITY 10 Need for Creativity and Innovations - Challenges on the road to innovation - Quality Management in Creativity and Innovation - Mechanics of mind - Definition of Creativity and Innovation - Perception in Creative thinking -Memory in creative thinking Judgement in creative thinking - Mental process. 2. DIRECTED CREATIVITY 8 Heuristics for creativity - Heuristics for Directed Creativity - Models for creative thinking and innovation – Tools for creative thinking - Basic Principles for the methods of creative thinking - Inventing methods for directed creativity. 3. ANALYZING ORGANIZING CREATIVITY 10 Directed Creativity cycle - Classification of tools - Pausing and Noticing - Refocusing a topic - Analyzing - Searching for analogies - Creating new world imagination - Activities and Heuristics - Tools for imagination - Brain storming - Analogies - Provoking Imagination - Combining concepts - Organizing and Displaying ideas. 4. INNOVATION 8 Activities and Heuristics related to Development and action - Models for organizational change - Tools for development and Action phases - Reengineering - Directed creativity for redesign processes. 5. QUALITY 9 Quality management - Customer needs Analysis - Design of new products and services Creative versus Analytical methods - Symptoms of struck thinking - Creative Thinking in Quality management. Total No of periods: 45 REFERENCE BOOKS: 1. Paul. E. Plsek. , Creativity, Innovation and Quality , PHI 2000. 2. Harry Nystrom, Creativity and Innovation, John Wiley and Sons, 1979. 3. Brain Twiss, Managing technological Innovation, Pitman Publishing Ltd., 1992.

SEMANTIC WEB

3 0 0 100

1. INTRODUCTION 8 History – Semantic Web Layers –Semantic Web technologies – Semantics in Semantic Web – XML: Structuring – Namespaces – Addressing – Querying – Processing 2. RDF 10 RDF and Semantic Web – Basic Ideas - RDF Specification – RDF Syntax: XML and Non- XML - RDF elements – RDF relationship: Reification, Container, and collaboration – RDF Schema – Editing, Parsing, and Browsing RDF/XML-RQL-RDQL 3. ONTOLOGY 10 Why Ontology – Ontology movement – OWL – OWL Specification - OWL Elements – OWL constructs: Simple and Complex – Ontology Engineering : Introduction – Constructing ontologies – Reusing ontologies – On-To-Knowledge Semantic Web architecture 4. LOGIC AND INFERENCE 9 Logic – Description Logics - Rules – Monotonic Rules: Syntax, Semantics and examples – Non-Monotonic Rules – Motivation, Syntax, and Examples – Rule Markup in XML: Monotonic Rules, and Non-Monotonic Rules 5. APPLICATIONS OF SEMANTIC WEB TECHNOLOGIES 8 RDF Uses: Commercial and Non-Commercial use – Sample Ontology – e-Learning – Web Services – Web mining – Horizontal information – Data Integration – Future of Semantic Web Total No. of Periods: 45 REFERENCES 1. Grigorous Antoniou and Van Hermelen - “A Semantic Web Primer”-The MIT Press –2004 2. “Spinning the Semantic Web: Bringing the world wide web to its full potential” – The MIT Press – 2004 3. Shelley Powers – “Practical RDF” – O’reilly publishers – First Indian Reprint : 2003 RESEARCH METHODOLOGIES

3

0

0

100

Unit – I 9 The nature of CS research - what is research? - Project planning, tools and techniques for planning - Literature searches, information gathering. Unit – II 9 Reading and understanding research papers - Project implementation and IT project management. - Presentation skills, written and oral. - Time management, team working. Unit – III

9

Optimization Methods I – Linear Programming: Simplex method – Dynamic Programming – Integer Programming - Hill climbing Unit – IV 9 Optimization Methods II - Simulated annealing - Quantum annealing - Genetic algorithms - Ant colony optimization - Particle swarm optimization - Tabu search - Beam search Unit – V 9 Commercial and economic considerations in the IT industry - Review of Legal, Ethical, Social and Professional (LSEP) issues, such as data protection, hacking, etc. - Technical writing, referencing, bibliographies. TOTAL : 45 References: 1. C. W. Dawson., The Essence of Computer Projects: A Student Guide., PHI, 2006 2. A Letter to Research Students, by Duane A. Bailey, ftp: //cs.williams.edu/pub /bailey/research.ps 3. Humdy Taha, Operation Research, PHI, 2007 Prentice Hall 4. S. Kirkpatrick and C. D. Gelatt and M. P. Vecchi, Optimization by Simulated Annealing, Science, Vol 220, Number 4598, pages 671-680, 1983. http://www.cs.virginia.edu/cs432/documents/sa-1983.pdf (or) http://citeseer.ist.psu.edu/kirkpatrick83optimization.html 5. Apolloni B., N. Caravalho, D. De Falco "Quantum stochastic optimization", Stochastic Processes and their Applications, 33, 233-244(1989). 6. David E. Goldberg, Genetic Algorithms in Search, Optimization, and Machine Learning, New Age. 7. M. Dorigo, 2007. "Ant Colony Optimization", http:// www. scholarpedia.org /article/Ant_colony_optimization 8. http://en.wikipedia.org/wiki/Particle_swarm_optimization (Particle Swarm Optimization) 9. http://www.ifi.uio.no/infheur/Bakgrunn/Intro_to_TS_Gendreau.htm (Tabu Search) 10. http://www.cs.washington.edu/homes/jhchen/cse573p1.pdf (Beam Search)

View more...

Comments

Copyright ©2017 KUPDF Inc.
SUPPORT KUPDF