This action might not be possible to undo. Are you sure you want to continue?
from October 2011 onwards
Page 1 of 20
BHARATHIAR UNIVERSITY: COIMBATORE 641046 M. Phil. / Ph.D. – COMPUTER SCIENCE Part I – Syllabus [From October 2011 batch onwards] PAPER I PAPER II PAPER III RESEARCH METHODOLOGY ADVANCED TECHNOLOGIES IN COMPUTER SCIENCE 1. 2. 3. 4. 5. 6. 7. 8. 9. 10. 11. 12. 13. 14. 15. Data Warehousing and Mining. Digital Image Processing. Advanced Networking. Natural Language Processing. Data Compression. Agent Based Computing. Soft Computing. Software Testing and Quality Assurance. Knowledge Management and Business Intelligence. Grid and Cloud Computing. Mobile Computing. Bioinspired Computing. Concurrent Engineering Information System. Speech Processing. Information Security.
M. Phil. / Ph .D. Comp. Sci. from October 2011 onwards
Page 2 of 20
PAPER I - RESEARCH METHODOLOGY UNIT – I RESEARCH METHODS Meaning of Research- Objectives of Research- Motivation in Research- Types of ResearchResearch Approaches- Significance of Research-research methods versus MethodologyResearch and Scientific Method- Importance of Knowing How Research is done- Research Process –Criteria of good Research –Problem Encountered by Researchers in India- What is Research Problem? Selecting the Problem- Necessity of Defining the Problem- Technique involved in Defining the Problem- Meaning of Research Design- Need for Research DesignFeatures of a Good Design- Important Concepts Relating to Research Design- Different research design- Basic principles of Experimental Designs- Significance of Report Writing- Different Steps in writing Report- Layout of the Research Report- Types of Reports- Oral Presentation Mechanics of Writing a Research Report- Precautions for Writing Research Reports. UNIT – II ALGORITHMS AND ANALYSIS Elementary data Structures, Greedy method: Knapsack problem-job sequencing with deadlinesOptimal merge patterns, Dynamic Programming: Multistage graphs-Optimal binary search trees0/1 knapsack- Reliability design- The traveling salesperson problem- Flow shop scheduling, Basics search and traversal techniques: The techniques Code Optimization- Biconnected components and depth- first search. Backtracking: The 8 – Queer s problem- Sum of subsets – Hamiltonian cycles-Knapsack Problem. UNIT – III COMPILER DESIGN Introduction to compiling- The Phases o f a Compiler- Lexical Analysis- The role of the lexical analyser-Specification &Recognition of tokens- Finite Automata-Conversion of Regular Expression to NFA – Syntax Analysis- The Role of the Parser-Context Free Grammar- Topflown Parsing: Predictive Parser- Bottom- Up Parsing: SLR Parser Syntax- Directed Translation Construction of Syntax trees- Bottom-Up evaluation of S- attributed definition and inherited attributes- L- attributed definition-Type Checking- Specification of a simple type checker -Type Conversion- An algorithm for Unification- Symbol tables- Intermediate Code Generation-Code Generation- Issues in the design of code generator- Basic Blocks and Flow Graphs- A simple code generator- Register allocation and assignment-Dynamic programming code generation algorithm- Code Optimization- The Principal sources of optimization-optimization of basic blocks-Loops in flow graphs. UNIT – IV OBJECT ORIENTED ANALYSIS, DESIGN AND DEVELOPMENT Object Oriented Design Fundamentals: The Object Model - Classes and Objects - Complexity Classification - Notation - Process - Pragmatics – binary and entity relationship - object types object state - OOSD life cycle. Object Oriented Analysis: Overview of object analysis Shatter/Mellor, Coad/Yourdon, Rumbaugh, Booch - UML – Use case model– Conceptual model - behavior - class - analysis patterns - overview - diagrams - aggregation. Object Oriented Design Methods: UML - diagrams - collaboration - sequence - class - design patterns and frameworks comparison with other design methods. Managing Object Oriented Development: Managing analysis and design - Evaluation testing - coding - Maintenance - Metrics. Object Oriented Development: Design of Foundation class libraries - Object Oriented Databases - Client/Server Computing - Middleware.
Specification .I 1. " Software Engineerin". International Student Edition.Analysis modeling . 3. Alfre V. Alfre V.Effective modular design -Cohesion and Coupling . Requirements Analysis and Design: Prototyping .Programming tools . McGraw Hill International Edition. “Design Patterns ".Empirical estimation models .Rajammal P. Jeffrey D. Programming languages and coding . UNIT . Sartaj Sahini.Code documentation – Code efficiency . Devadas.design patterns. Addison. 1993. Grady Booch. 1999. 2.” The Unified Modeling Language User Guide ". Prentice Hall. Paul G. Tremblay. " Software Engineering : A Practitioner's Approach ".Projects management. 1985. Prentice Hall of India 1991.. Phil. 3rd Edition. Addison Wesley. tools . Jean Paul. 1997. / Ph . 2000. 4. Comp. James Rumbaugh.. C.”A. I. Addison Wesley. User interface design .Software project scheduling. 1999. GrawHill Inc. Ellis Harowitz. Dino Mandrioli “Fundamental of Software Engineering ".Language classes .Kothari.analysis and design tools ." Compiler Principles. Hcpcroft.Software Configuration Management – real time systemsReverse Engineering and Re-engineering-CASE tools . Galgotia Publications (P) Ltd. Erich Gamma.R.Sommerville.Risk analysis . 2. Roger Pressman.Human Computer Interface design .Software Architecture . UNIT . TEXT BOOKS: UNIT . .”Research Methodology Methods & Techniques” 2nd Edition. “Software Engineering ". 2.Abstraction . 2. Mehdi Jazayari. 1996. McGraw Hill. Ullman. P Fleeger. Sci. Dr.D. Aho. John E. “Applying UML and patterns ". Sorenson. Carlo Ghezzi." Data structures and Algorithms”. Ali Bahrami. UNIT .V 1. Addison Wesley Publishing Co. “Object Oriented System Development ". Aho. UNIT . “The Theory and Practices of Compiler Writing" Mc. 1987.M.planning .5th Edition. Ravi Sethi and Jeffrey D.Software design . 4.Wesley Publishing Company. Techniques and Tools".III 1. 3.Data flow oriented design. Ivar Jacobson.Modularity . 1999.integration and testing tools – clean room software engineering.Project management . Handbook on Methodology of Research-Sri Ramakrishna Mission Vidyalaya College of Rural Higher Education”. Addison-Wesley Long man.Interface design . Wishwa Prakashan Publishers.Architecture design and Procedural design .II 1.1986.IV 1. 1994. Craig Larman. 2.S. from October 2011 onwards Page 3 of 20 UNIT – V SOFTWARE ENGINEERING Software Engineering Process paradigms . “Compute Algorithms”. Addison Wesley.Interface standards.Process and Project Metrics – software estimation . Ullman.
Phil.Web Services. CORBA style-OMG's object management architectureCORBA 2.Remoting. UNIT . “TCP/IP Protocol Suite”. . .Base Class Libraries-Interoperability-Networking. UNIT – IV ADAPTIVE WEB TECHNOLOGY J2EE: Overview-Multi-tier Architecture-The Enterprise Application-Clients-Sessions management-Web Tier-EJB Tier-J2EE Web Services. UNIT – III CLIENT/SERVER TECHNOLOGY Client/Server Computing-What is Client/Server-Types of Servers-SQL Database server-The fundamentals of SQL and relational databases -What does a database server do-Stored Procedures. Overview of XML. “Principles of Multimedia”. UNIT – V DISTRIBUTED COMPUTING Distributed Systems: Fully distributed processing systems – Networks and Interconnection structures – Designing a distributed processing system – Distributed databases. Tata McGraw –Hill.II Behrouz A. Object Style-CORBA-Distributed Objects.I Ranjan Parekh. 2008 UNIT .III Robert Orfali.NET Framework -Common Language Runtime. Fourth Reprint. from October 2011 onwards Page 4 of 20 PAPER II . . / Ph .Object Services-CORBA common facilities –CORBA business objects. 3rd Edition. Galgotia Publications.ADVANCED TECHNOLOGIES IN COMPUTER SCIENCE UNIT – I MULTIMEDIA & ITS APPLICATIONS Multimedia . Dan Harkey. Jerry. Edwards. “The Essential Client/Server Survival Guide".D.An Overview – Text – Image – Audio – Video – Animation – Multimedia Architecture – Multimedia Documents – Multimedia Application Development.0-CORBA. Forouzan.Security. 2008. Triggers and rules. Building Web applications. Sci. TEXT BOOKS: UNIT .M. New Delhi.challenge of distributed data – loading factors – managing the distributed resources – division of responsibilities. Comp. Tata McGraw-Hill Publishing Company Limited.SQL Middleware and federated databases-SQL middlewareWill the real SQL API Please stand up? Open SQL gateways-data warehouses-Distributed Objects and components-From Distributed Objects to components-3Tier Client Server.Path Vector Routing – Multicast Routing – BOOTP – DHCP – DNS – Remote Login and Telnet – FTP and TFTP – Electronic Mail – Network Management – IPV6. UNIT – II TCP/IP TCP/IP Protocol suite – Addressing – Classful addressing – Addressing issues – Subnetting and Supernetting – Variable length blocks – Packet delivery – Forwarding – Routing – ARP and RARP – Internet Protocol – ICMP – IGMP – UDP – TCP – Flow Control – Error Control – Congestion Control – Intra and Inter Domain Routing – Distance Vector Routing – Link State Routing.
msdn.M. 2. Wiley Publishing Inc. Prentice Hall. www. 2. Jim Keogh. “Data Communications & Distributed Networks”. 2003. Uyless D. / Ph . 4. Sci.D.4 Bible".microsoft. from October 2011 onwards Page 5 of 20 UNIT . 2002.Microsoft Manual. 3." The Complete Reference J2EE". UNIT . New York. Blackwell Scientific Publications. 4. Ginseppe Pelagatti.V 1. Sharp. James McGovern et al. “Introduction to Distributed & Parallel Computing”. Phil...Net Walkthroughs.com/netframework. Crichllow. 1997.IV 1. 1988. Prentice Hall."J2EE1 . Tata McGraw-Hill Edition. Comp. “Distributed Databases Principles and systems”. 1987. . 1985. John A. Black. Visual studio . Stefans Ceri. 3. McGraw Hill Book Co. Joel M. “An Introduction to Distributed and Parallel Processing”.
Stephen J. Pang-Ning Tan. Industry . from October 2011 onwards Page 6 of 20 PAPER III – 1. . John Wiley & Sons. Data Warehouse technology – Hardware and operating systemWarehousing Software – Extraction tools – Transformation tools – Data quality tools – Data loaders – Data Access and retrieval tools – Data Modelling tools – Fact tables and dimensions Data warehousing case studies : Data warehousing in Government . UNIT . Data Mining & OLAP “. Comp. 4. DATA WAREHOUSING AND MINING UNIT . University press . UNIT . Jaiwei Han.V Web Mining: Introduction –Web content mining – Web structure mining –Web usage mining – Text mining –Text clustering. 2004.II Data Mining definition – DM Techniques – current trends in data mining . Data: Types of data . C S R Prabhu.Measures of similarity and dissimilarity. Genomics data. Tourism. 6. Tir ku Acharaya . Neural Networks: Introduction – Use of NN – Working of NN Genetic Algorithm: Introduction –Working of GA. Gordon Linoff.IV Clustering Techniques: Introduction – Clustering Paradigms – Partitioning Algorithms – K means & K Mediod algorithms – CLARA – CLARANS – Hierarchical clustering – DBSCAN – BIRCH – Categorical Clustering algorithms – STIRR – ROCK – CACTUS.Data Preprocessing . Transformation. 2002. Integration. 2000. cleaning. Exploration: Summary statistics – Visualization. “Data Mining : Concepts and Techniques” 3. Classification: Decision Tree classification – Bayesian Classification – Classification by Back Propagation. Arun K Pujari .Sushmita mitra.M. Tata McGrawhill 7.D. Rapidminer and Matlab). “Introduction to Data Mining”. Michal J A Berry. Michelinne Kamber .Smith .Softcomputing & Bioinformatics”. 2nd Edition. 5. T. Edition 2001. 2. Vipin Kumar. Sci.Different forms of Knowledge – Data selection. / Ph . Wiley Interscience publications . Reduction and Enrichment. techniques and applications “. TEXT BOOKS: 1. “Mastering Data Mining”. Phil. UNIT . UNIT – III Association rules: Introduction – Methods to discover association rule – Apriori algorithm Partition Algorithm – Pincher search algorithm – Dynamic Item set algorithm – FP Tree growth algorithm.I Data Warehousing Introduction – Definition-Architecture-Warehouse Schema-Warehouse server-OLAP operations. “Data Mining Multimedia.Data Quality . 2007. Alex Berson . Introduction to machine learning – Supervised learning – Unsupervised learning – Machine learning and data mining. “Data Warehousing . Michael Steinbach. “Data Mining Techniques”. Temporal mining -Spatial mining –Visual data mining – Knowledge mining – Various tools and techniques for implementation using (weka. “Data Warehousing – concepts. Prentice Hall of India.
UNIT . UNIT – III Image Restoration.M. Rafael C. Sci. Inverse Filtering. Geometric Mean Filter. Line and Edge Detection. TEXT BOOKS: 1. Light and the Electromagnetic Spectrum. “Digital Image Processing”. Color Transformation. Thresholding. Mathematical Tools used in Digital Image Processing. Wavelet Transforms in Two Dimensions. Smoothing Spatial Filter. 2. Basic Relationships between Pixels. Noise Models. Position-Invariant Degradations. Comp.IV Color Image Processing: Color Fundamentals.D.Jain. Image Segmentation Based on Color. Selective Filtering. Fuzzy techniques for Intensity Transformation and Spatial Filtering. Color Models. Reconstruction and Image Segmentation: Image Degradation/Restoration process. Gray-Scale Morphology. Gonzalez. A. Segmentation Using Morphological Watersheds. The Fast Wavelet Transforms. Full Color Image Processing. Restoration in the presence of Noise only-Spatial Filtering.V Morphological Image Processing: Erosion and Dilation. Filtering in the Frequency Domain. Object Recognition: Patterns and Pattern Classes. Wiener Square Error Filtering. Digital Image Fundamentals: Elements of Visual Perception. Wavelet Packets. Basic Morphological Algorithms. Properties of the 2-D DFT. Periodic Noise Reduction by Frequency Domain Filtering. Filtering in the Frequency Domain: Preliminary Concepts. 3 rd Edition. DIGITAL IMAGE PROCESSING UNIT – I Digital Image Processing: Origins of Digital Image Processing. from October 2011 onwards Page 7 of 20 PAPER III – 2. Richard E. 2002. Sampling and the Fourier Transforms of Sampled Functions. Woods. Image Reconstruction from Projections. Linear. Smoothing and Sharpening. Region-Based Segmentation. Wavelets and Multiresolution Processing: Multiresolution Expansion. Image Smoothing and Sharpening using Frequency Domain Filters. Pseudocolor Image Processing.2 nd Edition. Use of Motion in Segmentation. Image Sensing and Acquisition. Histogram Processing. . Prentice Hall of India. Fundamentals of Spatial Filtering. Image Sampling and Quantization. Recognition Based on Decision-Theoretic Methods. Richard E. / Ph . The Discrete Fourier Transform (DFT). 3. UNIT . Constrained Least Square Filtering. UNIT – II Image Transformation & Filters: Basic Intensity Transformation Functions. Prentice Hall of India. Image Segmentation: Point. Basic Compression Methods. Rafael C. Opening and Closing. Wavelet Transforms in One Dimension. Noise in Color Images. Estimating the Degradation Functions. Steps in Digital Image Processing.”Fundamentals of Digital Image Processing”. Combining Spatial Enhancement methods. The Hit-Or-Miss Transformation. Phil. “Digital Image Processing using MATLAB”. Sharpening Spatial Filters. Woods. Pearson Education. Gonzalez. 2008. Image Compression: Fundamentals. Structural Methods. Digital Image Watermarking.
5.speed LANs . Jon C. C. UNIT . Jean Pjilippe Vasseur. 2006. Jochen Schiller. 2. B. / Ph . 2007. Mobile Communication. 2009. 2010. VPNs and Ipsec”.Intruders – Malicious Software – Firewalls. .V Network Security and System Security: Introduction to Network Security – Symmetric Encryption and Message Confidentiality – Public-key Cryptography and Message Authentication – Authentication Application – Electronic Mail Security – IP Security – Web Security – Network Management Security . “Interconnections”. Manoj. UNIT .Congestion control in data networks and Internets – Link-level flow and error control – TCP traffic control – Integrated and differential services – protocols for Qos support.D. from October 2011 onwards PAPER III – 3.Wireless LAN – Mobile IP. Mario Pickavet. Sci. Adhoc Wireless Networks: Adhoc Wireless Networks – MAC Protocol – Routing Protocols – Multicast Routing QOS – Wireless Sensor Networks – Energy Management. Radia Perlman. “High Speed Networks and Internets”. Pearson.II Framerelay – ATM – High. 4. Pearson.S. “Adhoc Wireless Networks”. “Network Management”. Pearson. Pearson. 3.III VPN . 6. William Stallings. UNIT .I Interconnections: Digital Data Communication Techniques – Data Link control protocol – Multiplexing – Spread spectrum – Circuit switching and packet switching – routing in switched networks. 2005. 2000. ADVANCED NETWORKING Page 8 of 20 UNIT . Comp.SDH and SONET networks – Operational aspects – evolution of the optical network – optical transport network – MPLS traffic engineering. Data Link Layer issues – Transparent and Source routing bridges – Network interface – generic connectionless service – network layer address – connectionless data packet formats – routing algorithm concepts – Fast packet forwarding. Demeester. 8. Phil. 2nd Edition. Pearson. 7. Elsevier. 2004. 2006. Pearsons. Network Management: SNMP Basic Foundation – SNMPv2 – SNMPv3 –RMON. UNIT .IV Mobile Communication: Wireless Transmission – Medium Access Control – Telecommunication Systems – Broadcast Systems .Snader. “Network Recovery”. “Data and Computer Communications”. Pearson.Siva Ram Murthy. William Stallings. Mani Subramanian.M. TEXT BOOKS: 1.” VPNs Illustrated Tunnels.
Natural Language Understanding. Pearson Education. UNIT .D. Phil.IV Lexical functional grammar – active passive and dative constructions – WH movements in questions – LFG formalism – well formedness conditions – handling WH movements in questions – computational aspects – features and feature structures – unification – other constraints – CFG and Indian languages – functional specification – lexicalized grammars and locality – lexicalized tree substitution grammar – lexicalized tree adjoining grammar – feature structures – mathematical aspects. Vineet Chaitanya. UNIT . UNIT . 2. 2005.II Paninian grammar – semantic model – free word order and vibhakti – paninian theory – karaka relations – active passive – control – karaka to vibhakti mapping – karaka sharing.III Machine translation – survey – is MT possible? – Possible approaches – current status – anusaraka or language accessor – cutting the Gordian knot – structure of anusaraka systems – user interface – linguistic area – anusaraka output – language bridges. TEXT BOOKS: 1. from October 2011 onwards Page 9 of 20 PAPER III – 4. James Allen. “Natural Language Processing – A Paninian Prespective”.M. Prentice Hall of India. Comp. Sci.V Comparing TAG with PG – similarities between TAG and PG – differences between TAG and PG – Government and binding – GB modules – X-bar theory – theta theory – Government – Case theory – bounding theory – empty category principle (ECP) – binding theory – constraints on movement – GB parsing – comparing GB with PG. / Ph . UNIT .I Natural Language Processing (NLP) – open problems – major goal – language structure – language analyzer – morphological analyzer – local world grouper (LWG) – core parser – requirements of computational grammars – computational aspect – system aspect – large system aspect – morphological analysis – morphological generation using paradigms – morphological analysis using paradigms – speeding up morphological analysis by compilation – morphological analyzer – additional issues – local word grouping – verb groups – noun groups – strategy for grammar development – semantics in stages. Rajeev Sangal. NATURAL LANGUAGE PROCESSING UNIT . 2000. . Akshar Bharati. 3rd Edition.
Binary Tree predictive coding. Phil. Statistical Methods : Information theory concepts. Springer publications. MPEG and H. LZ78. New Delhi. ARC and PKZIP. LZ 77. Harcout India(P) Ltd. Block Matching. The Human Auditory System. Image Transforms. David salomon .III Intuitive Methods. Markov Models and composite source models.LZW. Digital Audio. Mathematical modeling for Lossy compression – physical models. Wavelet methods: Fourier Image compression. compression Arithmetic coding and Adaptive. Sci. UNIT . Data compression patterns. Block Decomposition.” The Data compression Book”. from October 2011 onwards Page 10 of 20 PAPER III – 5. Mark Nelson and Jean-Loup Gailly. µ -Law and A-Law companding. DATA COMPRESSION UNIT .I Compression Techniques – Lossy compression & Lossless compression. RLE image compression and scalar quantization. LZSS. Arithmetic coding and Text compression. Unix compression. Composite and Components Video. 2nd Edition. Quad Trees and Finite Automata Methods. ADPCM Audio compression and MPEPG-1 Audio Layers. Digital Video.M.2nd Edition.II Basic Techniques: Run length encoding. UNIT . . Adaptive Huffman coding facsimile. / Ph .V Sound.D.”Data compression – The complete Reference”. UNIT . Khalid Sayood. 3. Video compression. GIF image. Probability and linear systems models. RLE Text compression. “Introduction to Data Compression”. Context Tree weighting.261. 2. Dictionary methods: String compression. Huffman coding. TEXT BOOKS: 1. modeling and compression Mathematical modeling for Lossless compression.Physical models. Comp. UNIT . Progressive Image compression. Vector quantization. Block Truncation coding. BPB publications. probability models. Multi Resolution decomposition and JPEG 2000.IV Analog Video. JPEG. Adaptive Vector Quantization.
Phil. 1997. Sci. TEXT BOOKS: 1. 2000. 5. 3. UNIT . UNIT .M. 2003. 2003.Using JADE from Java. Michael J Wooldridge (Eds.Learned rule characterization.).Approaches to Knowledge base development-Disciple approach for building intelligent agents. Jeffrey M Bradshaw. Java Agent Development framework [JADE]: Creating multi-agent systems with JADE. Springer. Rule refinement: Rule refinement problem.Interaction protocols.Expert-Agent interactions during rule refinement process. “Software Agents”.Agent platform.Knowledge representation-Generalization-Problem solving methodsKnowledge elicitation. / Ph . AGENT BASED COMPUTING Page 11 of 20 UNIT ..Rule learning method. “Building Intelligent Agents”.Methodology for building Intelligent AgentsExpert-Agent interactions during knowledge elicitation process.Rule experimentation and verification-Refined rule characterization-Agent interactions. from October 2011 onwards PAPER III – 6.Agent Tasks and behaviors-Agent Communication Language . “Agent Technology – Foundations. AAAI Press/ The MIT Press. Daniel Kudenko.pdf.). Eduardo Alanso. Nicholas R Jennings. UNIT . 2. UNIT . Gheorghe Tecuci et al.II Intelligent Agent Learning. Applications and Markets”. .D.com/doc/programmersguide. Springer Publications.IV Disciple shell: Architecture of Disciple shell. “Adaptive Agents and MultiAgent Systems”. jade.Rule refinement method. 4.Expert-Agent interactions during rule learning process.V Case studies in building intelligent agents: Intelligent Agents in portfolio management-Intelligent Agents in financial services. Academic Press. Comp.III Rule learning: Rule learning problem.tilab. Dimitar Kazakov (Eds.I Introduction to Software Agents: What is a software agent? .Why software agents? Applications of Intelligent software agents-Practical design of intelligent agent systems.
” Genetic algorithms. Sivanandam. 2. properties and operations . reinsertion – a simple genetic algorithm – Theoretical foundation: schema. types of selection. setting of weights. “Principles of Soft Computing”. N.Types of membership functions . 3.0 “. types of crossover. Goldberg. defuzzification. 2006. Wiley-India.E. D.Feed Forward Networks: Back Propogation Network (BPN) and Radial Basis Function Network (RBFN) .Fuzzy relations. application procedure Feedback Networks: Hopfield Net and BAM . mutation. S.fuzzy rules: Takagi and Mamdani – fuzzy inference systems: fuzzification.N. Algorithm. Phil. S. UNIT .N.I Fundamentals of ANN: The Biological Neural Network.D. Deepa. from October 2011 onwards PAPER III – 7. operations and properties of fuzzy relations.Building Blocks of ANN and ANN terminologies: architecture. activation functions McCulloch-pitts Neuron Model.Self Organizing Feature Maps: SOM and LVQ. UNIT . S. S. inference. Delta learning rule. N. fundamental theorem of GA. 2008. Architecture. fuzzy composition.V Genetic Algorithm (GA): Biological terminology – elements of GA: encoding. TEXT BOOKS: 1. Comp.III Fuzzy Sets. Sumathi. S. building block hypothesis. Artificial Neural Networks .II Models of ANN: Single layer perception. optimization and machine learning”. UNIT . SOFT COMPUTING Page 12 of 20 UNIT . New Delhi. . Addison Wesley 2000. Sivanandam.IV Fuzzy variables . Hebbian Learning rule. “Introduction to Neural Networks using MATLAB 6. UNIT . Sci.M. Tata McGraw-Hill. rulebase. Perception learning rule. / Ph . cardinality. Deepa.
Design by Contract . 2000. “The Art of Software Testing”.. Tools and effectiveness – Condition Testing -Transaction Flow testing. “Software Testing Fundamentals”. UNIT . Robert V.S. Syntax Testing – Grammar for formats – Implementation.IV Automated Tools for Testing .Mutation testing – Fault based testing – Scenario based testing-penetration testing-Testing Approaches in Software Industry – testing metrics – function based metrics –Bang metrics – software quality metrics. UNIT .GUI Testing Capture/Playback – Stress Testing . 2nd Edition.Test case generators .State-based Testing . Marnie. “Software Engineering – A Practitioner’s Approach”. Addison Wesley.Weyuker's adequacy axioms – model for testing and consulting oracles – Is complete testing possible – The Consequence of bugs – Taxonomy of Bugs– Test case Design – Black Box Testing and White Box testing – Testing strategies . "Testing Object-Oriented Systems: Models Patterns and Tools ".Perry.Testing compilers and language processors . from October 2011 onwards Page 13 of 20 PAPER III – 8.Binder.Testing web enabled applications.Challenges – Test optimization. SOFTWARE TESTING AND QUALITY ASSURANCE UNIT .Message Sequence Specification.Unit testing – Integration Testing – Validation testing – System testing – The art of Debugging and debugging approaches. Post condition and Invariant Impact on inheritance – polymorphism. 5.J.M. 5th Edition. John Wiley & Sons.Precondition.Purpose of Software testing – SDLC and testing – Verification and validation .Built-in Test .Observability & Controllability .Static code analyzers . Sci. Boris Beizer.Testing Client -server applications . TEXT BOOKS: 1. 3. Dreamtech Press. Phil. / Ph .L.Graw Hill. Loop and Logic Based Testing – Decision tables – Path Expressions – KV Charts – Specifications – State transition Testing – identifying good & bad states – state testing Metrics and Complexity. Hutcheson.D.II Basis Path testing .” Software Testing Techniques”.Control flow and structure testing– Strategies – Applications. Myers. Comp. “Effective Methods for Software Testing ". Glenford. John-Wiley & Sons. UNIT . Wiley.1979. Roger. Mc.I Testing Objectives and principles . 4. 2003. 2.Pressman. Design for Testability . 2nd Edition.Class Modality . 2001. William E. 2007. 6.V Regression Testing . 2000. .III Graph based testing methods –Orthogonal Array testing –Performance Testing -Testing for Realtime Systems– issues – Testing in web applications – Testing in object oriented software Differences from testing non-OO Software – Testing OOA and OOD models -Class testing strategies .Data flow testing . UNIT .
RFID and New BI Application Opportunities . . “Business Intelligence” 2nd Edition.”Knowledge Management”. Efraim Turban.II Knowledge Management System Life Cycle .Ghaziri. and Ethics . Elias M.Knowledge Transfer Transfer Methods .Role of Knowledge Developer – User Training. 2004.IV Changing Business Environments and Computerized Decision Support .III Knowledge Creation .Data.M.On-Demand BI . Privacy. UNIT .Understanding Knowledge – Definitions .Nonaka’s Model of Knowledge Creation and Transformation Knowledge Architecture . 2010.Role of Rapid Prototyping .Virtual Worlds . II and III). Dursun Delen and David King. 2.The Web 2.Online Social Networking: Basics and Examples . Pearson Education. and Knowledge .What is Knowledge Management? . Hassan M.NominalGroup Techniques(NGT) – Delphi method – Concept mapping Knowledge Codification Codification Tools and Procedures .0 Revolution . Sci.D.BI and Integration Implementation . from October 2011 onwards Page 14 of 20 PAPER III – 9. UNIT . / Ph .Intelligence Creation and Use and BI Governance . Ramesh Sharda.Issues of Legality.Transaction Processing versus Analytic Processing . KNOWLEDGE MANAGEMENT AND BUSINESS INTELLIGENCE UNIT .Expert Knowledge. (For Unit IV – Chapter 1.Connecting BI Systems to Databases and Other Enterprise Systems .KM System Life Cycle .Reality Mining.Major Tools and Techniques of Business Intelligence.Challenges in Building KM Systems Conventional Versus KM System Life Cycle .A Framework for Business Intelligence .V Implementing BI: An Overview .Legal Issues. UNIT .Key Challenges .Types of Knowledge . TEXT BOOKS: 1.Knowledge Owners .Emerging Topics in BI: An Overview .Capturing Tacit Knowledge – Evaluating the Expert – Developing a relationship with Expert – Interview as a tool – Brainstorming – Repertory Grid . (For Units I.Business Challenge .I Basics . UNIT . Unit – V -Chapter 6).Awad.KM Life Cycle . Phil.Knowledge Developers Skill Set .Social Networks and BI: Collaborative Decision Making .Successful BI Implementation . Information.System Justification . Comp.Cognition and Knowledge Management .Knowledge Portal Technologies Ethical and Legal Issues .Portals Basics .
IBM Press. GRID AND CLOUD COMPUTING Page 15 of 20 UNIT . “Cloud Computing –A Practical Approach”.I Introduction to Grid Computing. Toby J. . 2009. “Grid Computing”. / Ph . Carl Kesselman (eds.D. Morgan Kaufmann Publishers.Globus Toolkit – Services .II Service Oriented Architecture – Web Service Architecture – Grid Architecture – Implementing Grid Architecture. UNIT . Emereo Pvt. Joshy Joseph. Applications and Data Centers in the Cloud with SLAs”. Cloud Economics.Velte. Robert Elsenpeter.On Demand Computing – Discovering Cloud ServicesDevelopment Services and Tools. Michael Miller.V Operating System for the Cloud . 2004. Ltd. “Cloud Computing Best Practices for Managing and Measuring Processes for on demand computing. 3. from October 2011 onwards PAPER III – 10. Prof (Dr.Open Grid Services Architecture . UNIT . 7.Grid Scheduling with QoS – Data Management -Grid Security. “Grid Computing: A Practical Guide to Technology and Applications. Ian Foster.Velte. Pearson Education. Tata McGraw Hill Education Pvt.” Cloud Computing: Web based Applications that change the way you work and Collaborate online”. Ltd. 2010. “A Comparative Analysis of Cloud Computing Environments”. 6.IV Cloud hardware and infrastructure-clients-security-network-services-platforms-cloud storageCloud software architecture issues.III Cloud Computing – Overview – Applications-Intranets and the Cloud – Companies in the Cloud Today. Firewall Media”. Craig Fellenstein.Cloud Computing Services. 8.Anatomy and Physiology of Grid – Early Grid Activities – Current Grid Activities– Grid Standards . Phil. UNIT . August 2008.). UNIT .Classification of Cloud Implementations. Ahmar Abbas. TEXT BOOKS: 1.Grid Computing Organization and their roles.M.) Andreas Polze. Comp. Anthony T.Application Patterns and Architecture – Case Studies-Cloud Computing services available under various platforms. Sci. 2. 5.Grid Business Areas – Grid Challenges and Applications. Que Publishing.Grid Scheduling and Resource Management– Framework– Grid Resource Management Systems – Principles of Local Schedulers .”The Grid: Blueprint for a New Computing Infrastructure”. Haley Beard. 2004. July 2008. 4.
Thomas Schack. 2nd Edition. TEXT BOOKS: 1. Phil.Java card – GPRS – Mobile Computing through Telephony .M. 2009.Developing Mobile GUIs – VUIs and Mobile Applications – Multichannel and Multi modal user interfaces – Synchronization and replication of Mobile Data .S. Pearson Education.II Mobile computing through Internet.Middleware and gateways . “Pervasive Computing”.I Mobile computing: Components of wireless environment. C. Comp.SMS architecture . Roopa R Yavagal. 2005. UNIT . Fei Hu . Pearson. Xiaojun Cao.Horst Henn. Pearson Education. 3. Ashok K Talukder. Klaus Rintdoff.III Mobile Communication: Wireless Transmission – Medium Access Control – Telecommunication Systems – Satellite Systems – Broadcast system – Wireless LAN – Mobile IP – Mobile TCP. “Mobile Computing”.Design considerations for mobile computing-– Mobility and Location based services – Active transactions .Three-tier Architecture. UNIT . William Stallings.Mobile-enabled Applications .QOS – Energy Management.Context-aware applications.Siva Ram Murthy. . 4. UNIT . “ Wireless Sensor Networks Principles and Practice “ CRC Press. ”Ad Hoc Wireless Networks – Architectures and Protocols”. 2.D.Challenges in Mobile environmentMobile devices . B.Smart clients . 2005. MOBILE COMPUTING Page 16 of 20 UNIT .Device Technology – Device Connectivity – Voice technology – Personal digital assistant.V Wireless Sensor Network: Architecture and Design – Medium Access Control – Routing – Transport Layer – Energy model. Sci.”Wireless Communications & Networks”. Manoj.Synchronization protocol . from October 2011 onwards PAPER III – 11. Tata McGraw Hill. 2010. Jochen Burkhardt Dr.Wireless Internet . 5. UNIT . / Ph .IV ADHOC Wireless Network: Ad Hoc Wireless Network –MAC protocol – Routing protocols Transport Layer Protocol .
MIT Press. Daniel Merkle (Eds.ACO theoretical considerations and Convergence. Springer Verlag. / Ph .). UNIT . Oxford University press. Thomas Stutzle.Ant Colony Optimization Metaheuristic – Problem solving using ACOExtensions of Ant Systems – ACO and Local search methods . TEXT BOOKS: 1. Idea Group Inc.D.I Natural to Artificial Systems – Biological Inspirations in problem solving – Behavior of Social Insects: Foraging .Combinatorial Optimization . . UNIT . Fernando J Von Zuben. 3. Sci. 2.IV Swarm Intelligence: Biological foundations of Swarm Intelligence – Swarm Intelligence in Optimization – Particle Swarms for dynamic optimization problems. Eric Bonabeau. Guy Theraulaz. 2005.Cooperative transport. 2008. Christian Blum.Machine Learning Problems – ACO for Travelling Salesman problem. BIOINSPIRED COMPUTING Page 17 of 20 UNIT .Scheduling problems – Subset problems . UNIT . Marco Dorigo.II Ant Colony Optimization [ACO]: Ant Behavior . Comp.Task Allocation– Cemetery Organization and Brood Sorting – Nest Building.Division of Labor .V Biological Inspired computing to Natural Computing – Integration of Evolutionary Computation Components in Ant Colony Optimization – Particle Swarm Optimization based on Sociocognition.Routing problems-Assignment problems . 4.” Recent Developments in Biologically Inspired Computing”. “Ant Colony Optimization”.Towards Artificial Ants . Leandro N De Castro.III Ant Colony Optimization algorithms for NP-hard problems.. Marco Dorigo. Phil. from October 2011 onwards PAPER III – 15. 2000.M. 2004.”Swarm Intelligence: Introduction and Applications”. ”Swarm Intelligence: From Natural to Artificial Systems”. UNIT .
Enterprise Model-Class .The Need for Multiple Targets .Modes of Concurrency . and Simultaneous Engineering . .Modes of Cooperation . Structuring the Work: Phases.Product Model-Class . UNIT .I New Product Development And Management : Designing and Developing Products More Effectively .V Case Studies : Collaboration of Parametric Technology's a Failure Mode and Effect Analysis (FMEA) Method.Process Model. Concurrent Engineering Process Failure Risk Analysis Modeling (PFRA). CONCURRENT ENGINEERING INFORMATION SYSTEM UNIT . Using CORA (Component Oriented Requirements Analysis) Software Tool for PLM. Business One. Concurrent Engineering Methods and Tools. Advanced Integrated Product / Process Design Methods.IV Software Tools For Concurrent Engineering: Concurrent Engineering Customer Requirements Analysis Modeling. “Concurrent Engineering Fundamentals: Integrated Product and Process Organization” Volume I.The Lean Six Sigma Methodology . Stephen R.The Role of the Project Manager.D.Rapid Prototyping Methods. TEXT BOOKS: 1.Gate Reviews . Planning and Managing the Projects .Concurrency and Simultaneity .Cognitive Models . Prentice Hall. JIT (Just-in-Time). Concurrent Engineering Information System and Process Modeling . from October 2011 onwards Page 18 of 20 PAPER III – 13.Components of CE . 2. as Part of Collaborative Design in PLM.Merits and Demerits. Tools . Kanban.III Concurrent Engineering Information System And Process Modeling: Design For Quality. Networked TQM. ProEngineer Wildfire and Windchill Software Tools .The Practice of Simultaneous Engineering . Integration of Concurrent Engineering and Quality. Sci. Collaborative.Description of the NPI Process .Interactions among the Targets .Class . Biren Prasad. Phil.Concurrent Engineering. and Software Tool. / Ph . Illinois [Unit 1].Kaizen. and for Other Objective Functions (DFx).Gate Process.Setting the Target Levels under Different Situations . Rosenthal.Continuous Design Improvement Methods.Managing NPI Projects to Meet Cycle Time Targets .The Value of Operational Perspectives. a Failure Mode and Effect Analysis (FMEA) Method. 1995 [Unit 2]. Gates.Specification Model-Class .Modeling Methodology . UNIT .Benefits of Concurrent Engineering.Managing the Phase .II Concurrent Engineering And Information Modeling : Concurrent Engineering: Basic Principles of CE . Information Modeling: Introduction Information Modeling . and Lean Production Control Methods to Support the Integrated Design Processes and Flexible / Real-time Dynamic Supply Chains in PLM .M. UNIT .Complexity and Centrality .Foundation of Information Modeling Concurrent Engineering Process Invariant . Based on the QFD (Quality Function Deployment) Method. UNIT . Comp. “Effective product design and development: how to cut lead time and increase customer satisfaction”.
Tools and Case Studies Within a Quality Green PLM.Rule based speech synthesis .Short-time energy and Zero crossing rate-Short-time auto correlation method – Short-time Fourier Transform –Speech spectrogram. 4.Discriminative approaches: Support Vector Machine(SVM) . R. 4. London.Hidden Markov Model-Vector Quantization – Support Vector Machine .Sampling speech signals.Neural network based approaches.Speech production: Mechanism of speech production. ISBN-10: 0471554928. Rabiner. CIMware USA.Language Model. B.cimwareukandusa. http://www. R.II Short-time analysis of speech. 1872631045. ISBN-13: 978-0471554929. (Product Lifecycle Management) Framework”. Douglas O’Shaughnessy.Types of speech recognition-Issues in speech recognition-Speech databases-Performance evaluation of SR systems-Applications Feature extraction methods. . Tools. “Digital Processing of Speech signals”. 5.Gaussian mixture model (GMM). “Concurrent Engineering: Automation. 2007. Chapman Hall. UNIT .Speech recognition methodologies: Acoustic-phonetic approachPattern recognition approach: Template based approach-Dynamic Time Warping. Mohan Sondhi.Basics of quantization.Prosodic processing UNIT . and Techniques.I Introduction to speech processing – History – Applications. Sci.Statistical Vs Dynamic features . H.Linear predictive analysis.Homomorphic speech analysis-Cepstrum and Complex Cepstrum-The short-time cepstrum-Computation of Cepstrum Mel Frequency Cepstrum Co-efficients .Text independent speaker recognition. Prentice Hall.com/CIMwMedia/IntroCE-PLM-eBook-Wobject. UNIT . Bin Wu. “Concurrent / Simultaneous Engineering Methods. 5]. “Fundamentals of speech recognition”.html [Units 3. Springer. ISBN-13: 978-1872631042. PAPER III – 14. Jacob Benesty. UNIT . M. 2000.M.Kernels.Text dependent speaker recognition . Richard G Ranky. from October 2011 onwards Page 19 of 20 3. 1978.Trigram language model –CMU SLM Toolkit. Juang. Prentice Hall.IV Speech Recognition: Speech recognition architecture.III Text to Speech Synthesis: Basic principles .Neural network approaches . Rabiner. 3. WileyInterscience”. WileyIEEE Press. Schaffer.R. W. SPEECH PROCESSING UNIT . 1992.D. TEXT BOOKS: 1. / Ph . Paul G Ranky. 4.Generative approaches: Rationale . Comp. L.Acoustic phonetics – Digital models for speech signals – Speech waveform representations.1993.Applications of speaker recognition . 2. 1999.Corpus based peech synthesis -Linguistic processing . L. “Speech Communications: Human and Machine”. Andrew Kusiak. Yiteng Huang “Springer handbook of speech Processing”.V Speaker Identification and Verification: Measuring speaker features. “Manufacturing systems design and analysis: context and techniques”.Constructing speaker models – Adaptation . Phil.Cepstral analysis – Similarity Vs Distance measures .
“Web Security”.M. Pornography Act and Evidence Act etc. from October 2011 onwards PAPER III – 15.V. 4.Rittinghouse. UNIT .Managing Access – Password management . Phil. 1st Edition.III System Security and Web Security: Intruders. 2004. 2007. 2nd Edition.Cox. Dr. Indian Penal Code. Jessica Fridrich. Charrles P. Elsevier. P. cyber pornography. Cyber forensic : Cyber criminals and their objectives. 5. Regulation of cyber crimes: Issues relating to investigation. Client Side Security : Using SSL – Active Content – Web Privacy. “Cryptography and Network Security”.Ton Kalker.Bloom.K. Elsevier.D. Miller Jeffrey A. K.Ravikumar. Prentice Hall of India. Kinds of cyber crimes – cyber stalking. . Relevant provisions under Information Technology Act. Reasons for commission of cyber crime. Pfleeger. forgery and fraud. UNIT .II Network Security Practice: Authentication Application – Electronic Mail Security – IP Security Program Security and System Security: Secure programs – Nonmalicious program errors – viruses and Worms – Memory and address protection – control access to general objects – File protection mechanism – user authentication – Trusted operating system design and assurance – Intrusion Detection system.“Digital Watermarking and Steganography”. computer vandalism. 2002. Digital Watermarking and Steganography: Models of Watermarking – Basic Message Coding – Watermark Security – Content Authentication – Steganography.IV Wireless Network Security: Mobile Security – Encryption Schemes in WLANs – Basic approach to WLAN security and Policy Development – WLAN intrusion process – WLAN security solutions.Tiwari. Issues relating to Jurisdiction. John W.I Conventional Encryption : Classical Technique – Modern technique – Algorithms. James F. crime related to IPRs. William Stallings. Elsevier.R. UNIT . Issues relating to Evidence . / Ph .Sastri. 2. Pearson. Classification of cyber crimes. Lincoln D. Matthew L. 2005. Public Key Cryptography : Public Key Cryptography – Introduction to Number Theory – Message Authentication and Hash Function – HASH and MAC Algorithm – Digital Signature and Authentication protocol. 5th Edition.V Cyber Crimes: Introduction – computer crime and cyber crimes. 7. Selective Publishers. “Wireless Operaional Security”. 6. INFORMATION SECURITY Page 20 of 20 UNIT . Comp. 1999. Cyber terrorism. Stein. Ron Ben Natan.– Firewall .”Implementing Database Security and Auditing”. 2000. Cyber crime and Related Concepts: Distinction between cyber crime and conventional crimes. Ingemar J. Database Security: The Database as a Networked Server – Securing database-to-database communication – Reliability and Integrity of database – sensitive data – inference – multilevel databases UNIT .Ransome.K.Web Security requirements – SSL and TLS – SET. Sci. Addison Wesley. “ Computer Crime and Computer Forensics”. TEXT BOOKS: 1. “Security in Computing”. Shari Lawrence Pfleegner. 3.
This action might not be possible to undo. Are you sure you want to continue?
We've moved you to where you read on your other device.
Get the full title to continue reading from where you left off, or restart the preview.