This action might not be possible to undo. Are you sure you want to continue?
No Theory Course Title Discrete Mathematics PC Hardware and Trouble Shooting Software Engineering Formal Languages and Automata Theory Java Programming Computer Networks Practical Software Engineering Lab Java Programming Lab Computer Networks Lab Semester – VI Code. No Theory Course Title Theory of Computation Open Source Software Object Oriented System Design Numerical Methods Computer Graphics Elective – I Practical Open Source Lab Object Oriented Systems Lab Computer Graphics Lab 0 0 0 0 0 0 3 3 3 2 2 2 L 3 3 3 3 3 3 T 1 0 0 1 0 0 P 0 0 0 0 0 0 C 4 3 3 4 3 3 0 0 0 0 0 0 3 3 3 2 2 2 L 3 3 3 3 3 3 T 1 0 0 1 0 0 P 0 0 0 0 0 0 4 3 3 4 3 3 C
Semester – VII Code. No Theory Course Title Artificial Intelligence Cryptography and Network Security Internet Programming Principles of Compiler Design Elective – II Elective - III Practical Compiler Design Lab Internet Programming Lab System Software Lab Semester – VIII Code. No Theory Elective – IV Elective – V Project 1 Project Work Elective – I Code. No VLSI Design Visual Programming Optimization Techniques Professional Ethics Mobile Computing Management Information Systems Middleware Technology Course Title Embedded System L 3 3 3 3 3 3 3 3 T 0 0 0 0 0 0 0 0 P 0 0 0 0 0 0 0 0 3 3 3 3 3 3 3 3 M 0 0 6 12 Course Title Open Source Tools and Components L 3 3 3 T 0 0 0 P 0 0 0 3 3 3 C 0 0 1 0 0 0 3 3 3 2 2 3 L 3 3 3 3 3 3 T 1 1 0 0 0 0 P 0 0 0 0 0 0 4 4 3 3 3 3 C
Elective – II, III Code. No Course Title Software Testing Software Project Management Grid Computing Distributed Computing Parallel Processing Soft Computing ADHOC and Sensor Networks Data Warehousing and Data Mining Client Server Computing Real Time Systems Total Quality Management Elective – IV, V Code. No Course Title Digital Image Processing Natural Language Processing System Modeling And Simulation Software Quality Management High Speed Networks C # And .Net Framework Network Programming And Management Enterprise Resource Planning Information Security Cloud computing Real Time Systems Semantic Web Service Oriented Architecture Disaster Management L 3 3 3 3 3 3 3 3 3 3 3 3 3 3 T 0 0 0 0 0 0 0 0 0 0 0 0 0 0 P 0 0 0 0 0 0 0 0 0 0 0 0 0 0 C 3 3 3 3 3 3 3 3 3 3 3 3 3 3 L 3 3 3 3 3 3 3 3 3 3 3 T 0 0 0 0 0 0 0 0 0 0 0 P 0 0 0 0 0 0 0 0 0 0 0 C 3 3 3 3 3 3 3 3 3 3 3
Pearson Education Asia. Delhi. “Discrete and Combinatorial Mathematics: An Applied Introduction”.Cosets and Lagrange’s theorem – Normal subgroups – Normal algebraic system with two binary operations . UNIT V GROUPS 9+3 Algebraic systems – Definitions – Examples – Properties – Semigroups – Monoids – Homomorphism – Sub semigroups and Submonoids .Error recovery in group codes.Validity of arguments. TUTORIAL 15 TOTAL : 60 Text Book: 1. Ralph. UNIT III SET THEORY 10 + 3 Basic concepts – Notations – Subset – Algebra of sets – The power set – Ordered pairs and Cartesian product – Relations on sets –Types of relations and their properties – Relational matrix and the graph of relation – Partitions – Equivalence relations – Partial ordering – Poset – Hasse diagram – Lattices and their properties – Sublattices – Boolean algebra – Homomorphism. Co. New Delhi. UNIT II PREDICATE CALCULUS 9+3 Predicates – Statement function – Variables – Free and bound variables – Quantifiers – Universe of discourse – Logical equivalences and implications for quantified statements – Theory of inference – The rules of universal specification and generalization – Validity of arguments.DISCRETE MATHEMATICS L 3 UNIT I PROPOSITIONAL CALCULUS T P M 1 0 100 C 4 10 + 3 Propositions – Logical connectives – Compound propositions – Conditional and biconditional propositions – Truth tables – Tautologies and contradictions – Contrapositive – Logical equivalences and implications – DeMorgan’s Laws – Normal forms – Principal conjunctive and disjunctive normal forms – Rules of inference – Arguments . Fourth Edition. 2002. 2003.P and Manohar R. Grimaldi. . 2.Codes and group codes – Basic notions of error correction .Examples – Composition of functions – Inverse functions – Binary and n-ary operations – Characteristic function of a set – Hashing functions – Recursive functions – Permutation functions. UNIT IV FUNCTIONS 7+3 Definitions of functions – Classification of functions –Type of functions . Trembly J. P. Ltd. Tata McGraw–Hill Pub. “Discrete Mathematical Structures with Applications to Computer Science”.
“Discrete Mathematics and its Applications”. Co. Sixth Edition. Tata McGraw – Hill Pub. New Delhi. “Discrete Mathematical Structures”. Ltd. Busby.Rosen. Robert C.References: 1.. Pearson Education Pvt Ltd. New Delhi.. 2003. Fourth Indian reprint. 2. 2006 . Sharan Cutler Ross. Kenneth H. Bernard Kolman.
Govindarajalu. CD ROM Problems. “Repairing PC's”. B. Unit – IV Installation and Preventive Maintenance 9 Introduction – system configuration – pre installation planning – Installation practice – routine checks – PC Assembling and integration – BIOS setup – Engineering versions and compatibility – preventive maintenance – DOS – Virus – Data Recovery.PC HARDWARE AND TROUBLE SHOOTING L 3 Unit – I Introduction T P M 0 0 100 9 C 3 Introduction . Niyaz Nizamuddin. “IMB PC Assembly Language and Programming”. PHI.Computer Organization – Number Systems and Codes – Memory – ALU – CU – Instruction prefetch – Interrupts – I/O Techniques – Device Controllers . Peter Abel. Troubleshooting and Maintenance”. Scott Mueller. Unit – III PC Hardware Overview 9 Introduction – Hardware BIOS DOS Interaction – The PC family – PC hardware – Inside the System Box – Motherboard Logic – Memory Space – Peripheral Interfaces and Controllers – Keyboard Interface – CRT Display interface – FDC – HDC. 2/E. Pearson Education. Unit – V Troubleshooting 9 Introduction – computer faults – Nature of faults – Types of faults – Diagnostic programs and tools – Microprocessor and Firmware – Programmable LSI’s – Bus Faults – Faults Elimination process – Systematic Troubleshooting – Symptoms observation and analysis – fault diagnosis – fault rectification – Troubleshooting levels – FDD. Total : 45 Text Book: 1. 2002. HDD. TMH. [ References: 1.1992 . “IBM PC Clones Hardware. 2007 2.Error Detection Techniques – Microprocessor – Personal Computer Concepts – Advanced System Concepts – Microcomputer Concepts – OS – Multitasking and Multiprogramming – Virtual Memory – Cache Memory – Modern PC and User. Unit – II Peripheral Devices 9 Introduction – Keyboard – CRT Display Monitor – Printer – Magnetic Storage Devices – FDD – HDD – Special Types of Disk Drives – Mouse and Trackball – Modem – Fax Modem – CD ROM Drive – Scanner – Digital Camera – DVD – Special Peripherals.
Measuring Requirements –choosing a specification Technique.Modeling Notations.Information system Example.Requirements Elicitation-Types of RequirementsCharacteristic of Requirements.A systems Approach.Real.Tools and Techniques for Process Modeling.Representing OO:An Example using UML-OO System Desing-OO Program Desingn-OO Measurement-Information systems Example-Real-Time Example Unit IV 9 Writing the programs Programming standards and procedures-Programming Guidelines-Documentation-The Programming process-Information systems Example-Real-Time Example Testing the programs Software faults and failures-Testing Issues-unit Testing Integration Testing-Testing Object-Oriented Systems-Test Planning-Automated Testing Tools-When to stop Testing-Information’s Systems Example-Real-Time Example .SOFTWARE ENGINEERING L 3 UNIT I Introduction to Software Engineering T P M 0 0 100 9 C 3 Introduction to Software Engineering .decomposition and Modularity-Architectural styles and Strategies-Issues in Design Creation-Characteristics of Good Design-Techniques of Improving Design-Design Evaluation and Validation-Documenting the DesignInformation system Example-Real-Time Example Considering objects What is OO-the OO Development process –use cases.How Has Software Engineering changed?Information Systems Example.Practical process modeling.Time Example Modeling the process and Life cycle The meaning of process –Software process Models.Time Example Unit II 9 Planning and Managing the project Tracking progress-project personnel-Effort Estimation-Risk Management-The project Plan-Process Models and Project Management-Information System Example.An Engineering ApproachMembers of the Development Team. Unit III 9 Designing the System Introduction to Design.Real Time Example Capturing the Requirements The Requirements Process.Requirements and Specification Languages-Prototyping Requirements-requirements Documentation-Validation and Verification.Real.
Joanne M.A Practitioners Approach. Object-Oriented Software Engineering Using UML.Dutoit. Third Edition.Allen H. Pressman.Atlee. Pearson Education. Maintaining the system The changing system-The nature of maintenance-Maintenance Problems-Measuring Maintenance characteristics-Maintenance Techniques and Tools-Software RejuventionInformation Systems Example-Real-Time Example. and Java. Software Engineering. 2006 2. Total : 45 Text Book: 1. 2006 3. McGraw-Hill International Edition. Patterns. Roger S. 2009 . Shari Lwarence Pfleeger.Unit V 9 Testing the Systems Principles of system testing -function testing-performance Testing-Reliability. Availability and Maintainability-Acceptance Testing-Installation Testing-Automated system TestingTest Documentation-Testing safety-Critical systems-Information systems Example. Pearson Edition.Bernd Bruegge. Software Engineering Theory and Practice. Second Editon. Seventh Edition.
Automata Theory and Computation”.GNF) for Context Free Grammars . B. Kamala Krithivasan. Hopcroft.Deterministic Finite Automata . “An Introduction to formal Languages and Automata”. Rajeev Motwani. Ullman. John E.Pumping lemma for CFL’s .Ambiguity in Grammars and languages – Applications of Context Free Grammars . 2. Pearson. 2006. 2009. 2009 2.Nondeterministic Finite Automata – Equivalence of DFA and NFA – Finite Automata with Epsilon transitions . 2006. Sanguine Publishers. UNIT II 9 Regular languages: Regular Expressions – Finite Automata and Regular Expressions – Applications of Regular Expressions .Application of FA. Languages and Computation”. N.UNIT I FORMAL LANGUAGES AND AUTOMATA THEORY L T P M 3 1 0 100 9 C 4 Mathematical preliminaries and notations – Central concepts of automata theory – Finite automata . “Introduction to Automata Theory.Regular Grammars. . Jeffrey D.Closure properties of CFL – Decision properties of CFL’s. Pearson Education. Total : 45 Text Book: 1. Jones & Bartlett Pub.Equivalence of PDA’s and CFG’s UNIT V 9 Properties of Context Free Languages: Normal Forms(CNF. “Introduction to Formal Languages. 3/E. Srinivasa Murthy. 4/ E. UNIT IV 9 Context Free languages: Context Free Grammars – Parse Trees . “Formal Languages and Automata Theory”. Dr. Rama R. References: 1. Peter Linz.Pushdown automata (PDA) – Languages of a PDA . UNIT III 9 Properties of regular languages: Pumping lemma for regular languages – Closure properties of regular languages – Decision properties of Regular languages Equivalence and Minimization of Finite Automata.
Thread Model – Character Streams.Arrays-Operators . 2002 (Re print 2009) .Super keyword.Files UNIT IV 10 Applet Architecture – Skeleton.Method overriding Abstract Classes – Using Final with Inheritance. TMH.Delegation Event Model – Event Classes.access control – static.Nested classes – Inner classes. C++-Tokens – Keywords – Identifiers and constants – Data types – Type Conversions and Casting .returning objects. “Java 2 the complete Reference Fifth edition”.Invoking Constructors.Serialization.final keyword.Norton and H.AudioClip and AppletStub Interface . Class fundamentals – Declaring Objects.Legacy Classes and Interfaces UNIT V 10 String Tokenizer – BitSet – Calendar – Gregorian – TimeZone – Locale – RandomCurrency.Control statements in java. D.garbage Collection – finalize () method – overloading methods. Schildt.Interfaces-Special String Operations – Character Extraction – String Comparison – Modifying a String –String Buffer.throws.Debugging the application – Testing the application.Comparators.HTML APPLET tag – Passing Parameters to the Applet.Stream I/O.Multilevel Hierarchy.Using Exceptions.Assigning Object Reference Variables – introducing methods.constructors – this keyword.Java vs.Packages.JAVA PROGRAMMING L 3 UNIT I T P M 0 0 100 8 C 3 A look at procedure oriented programming – Object oriented programming paradigm – Basic concepts of object oriented programming – Benefits of OOP –What is java? Simple java program.Simple Applet Display Methods.finally – Built in Exceptions. Collection Interfaces – Collection Classes – Using Iterator – Maps. TOTAL = 45 Text Book: 1.Case studies – Real time application development.classes with command line arguments UNIT II 8 Basics.objects as parameters.Access Protection – Importing a Packages. UNIT III 9 Exception Types – Uncaught Exceptions – Using Try Catch – Multiple Catch – Nested Try – throw.
References: 1. Second Edition. Second Edition O’Reily Media 2002. O'Reilly Media. O’Reilly Publishers. 2010. M. Harvey M Deitel. Bert Bates. “Head First Java”. Paul Deitel . Pearson. 5. “Java Cook Book”. 2005 2. . 3. Prentice Hall Publications. 4.Deitel and Deitel. Java for Programmers. Elliote Rusty Harold. “Java How To Program” 7/e. By Kathy Sierra. “Java Network Programming” Third Edition.
Distance vector routing. Choke packets. Sixth Edition. 2003. UDP. . Controlled Access. Overlay network. Networks Components and Categories. “Data Communications and Networks”. TCP.” Computer Networks: A systems approach” . Load Shedding. Application Layer: DNS. Flow based routing. HTTP. 2. Token bucket algorithm. Jitter Control. Flow Control and Error control protocols (stop and wait – go back-N ARQ – selective repeat ARQ. Sockets. Unit III 9 Network Layer: IP addressing methods – Subnetting. Larry L. FDDI. Bridges: Spanning tree .11 a/b/g/n Unit II 8 Data Link Layer: Error Detection and Correction (Parity – LRC – CRC – Hamming code). LAN: Token Ring. Unit V 10 Introduction: Storage Area Network. Multiplexing and Demultiplexing. References: 1. optical Network. Davie . Hierarchical routing. Forth edition. Peer to Peer network.Fast Ethernet. and Direction of Data flow. Morgan Kaufmann Publishers. Sensor network. Forouzan. Unit IV 10 Transport Layer: Duties of transport layer. Multiple Access: Random Access. 4/E. Total: 45 Text Book: 1. 2006. 2002. Pearson Education. Behrouz A. Peterson and Bruce S. types of Connections. Ethernet. FTP. and Reference models: OSI and TCP/IP. Congestion prevention Policies: Traffic shaping.COMPUTER NETWORKS L 3 Unit I T P M 0 0 100 8 C 3 Uses of Computer Networks. S. William Stallings . 2002. SMTP. 3. HDLC. Tanenbaum. Components. Link state routing. Wireless LANs: IEEE 802. Gigabit Ethernet.sliding window). Topologies. Routing Algorithms: Shortest path Algorithm. Flooding. Tata McGraw Hill Publication. 2. Andrew. “Computer Networks”.”Data & Computer Communications”. Third Edition. Pearson Education Asia. Congestion Control Techniques: Leaky bucket algorithm. Wireless network: Adhoc.
cost estimation. 1. Event handling using applets 5.SOFTWARE ENGINEERING LAB L 0 T P M 0 3 100 C 2 Solving Simple problems using CASE tools for Planning. Abstract classes 2. Data grams 4. IPv6 dual stack configuration) . Network topology configuration with hubs/ switches 2. On line shopping ( Web based) 3. TCP 5. Implementation of any two congestion control algorithms 8. Online voting system 6. Library automation system (Flash message generation of new arrivals for all the users via sms / mail alerts) JAVA PROGRAMMING LAB L 0 Solving Simple problems using. Swings 7. Socket programming 3. FTP 7. detection and pay master report generation) 2. SMTP 6. Inheritance 3. Database applications (JDBC) T P M 0 3 100 C 2 COMPUTER NETWORKS LAB L 0 T 0 P M 3 100 C 2 Implementing the following programs 1. Study of various IP Address classes practically(IPv4 . Payroll system (pay slip generation. Banking system (with debit and credit ledger report creation) 4. Text editor 5. Interfaces 4. File handling and I/O handling 8. Threads(single and multiple) 6. Modeling the requirements and configuration management 1.
Introduction to Automata Theory. N. Introduction to the Theory of Computation. Intractability: Hierarchy Theorems – Relativization – Circuit Complexity. Dr. Rama R. Jones & Bartlett Pub. Pearson Education. Srinivasa Murthy. 4/ E. Introduction to Formal Languages. Thomson Brook/cole. UNIT II 9 Reducibility: Undecidable problems from Language theory – A simple Undecidable problem – Mapping Reducibility. Rajeev Motwani. Jeffrey D. UNIT III 9 Time Complexity: Measuring Complexity – The Class P – The class NP – NPcompleteness – Additional NP-complete Problems. Languages and Computation. 2006. Decidability: Decidable languages – Halting problem. B. John E. 3/E. 2009 3. . 2006. Michael Sipser. Hopcroft. 1997. UNIT IV 9 Space Complexity: Savitch’s Theorem – The Class PSPACE – PSPACE-completeness – The classes L and NL – NL-completeness – NL equals coNL. 2009. Automata Theory and Computation. Ullman. Sanguine Publishers.THEORY OF COMPUTATION L T P M 3 1 0 100 C 4 UNIT I 9 Church-Turing thesis: Turing machines – Variants of Turing Machines – Hilbert’s problems. 2 Kamala Krithivasan. An Introduction to formal Languages and Automata. Pearson. UNIT V 9 Advanced topics in complexity theory: Approximation Algorithms – Probabilistic Algorithms – Alternation – Interactive Proof Systems – Parallel Computation – Cryptography TUTORIAL 15 TOTAL : 60 TEXT BOOKS: 1. REFERENCES 1. Peter Linz. Advanced topics in Computability Theory: The Recursion Theorem – Decidability of logical theories – Turing Reducibility. Formal Languages and Automata Theory.(2006) 2.
“The Linux Kernel Book”. Chun. 5. Tata McGraw-Hill Publishing Company Limited. 2nd Edition. Wiley Publications. Tata McGrawHill Publishing Company Limited. Wesley J. “MySQL Bible”. Steven Holzner. Indian Reprint 2009. UNIT II OPEN SOURCE DATABASE 9 MySQL: Introduction – Setting up account – Starting. “Perl: The Complete Reference”. 2nd Edition. UNIT III OPEN SOURCE PROGRAMMING LANGUAGES 9 PHP: Introduction – Programming in web environment – variables – constants – data. 2001 3. UNIT V PERL 9 Perl backgrounder – Perl overview – Perl parsing rules – Variables and Data – Statements and Control structures – Subroutines. . 4. Indian Reprint 2009. O’Reilly. and Modules. Packages.Working with Files –Data Manipulation. “Programming PHP”. John Wiley. . Indian Reprint 2009.types – operators – Statements – Functions – Arrays – OOP – String Manipulation and regular expression – File handling and data storage – PHP and SQL database – PHP and LDAP – PHP Connectivity – Sending and receiving E-mails – Debugging and error handling – Security – Templates. “PHP: The Complete Reference”. 2nd Edition. “Core Phython Programming”. Tata McGraw-Hill Publishing Company Limited. Rasmus Lerdorf and Levin Tatroe. 2002 2. Brown. Vikram Vaswani.OPEN SOURCE SOFTWARE L 3 UNIT I INTRODUCTION T P M 0 0 100 9 C 3 Introduction to Open sources – Need of Open Sources – Advantages of Open Sources– Application of Open Sources. Prentice Hall. 2003 2. 2002 References: 1. Remy Card. Eric Dumas and Frank Mevel. Open source operating systems: LINUX: Introduction – General Overview – Kernel Mode and user mode – Process – Advanced Concepts – Scheduling – Personalities – Cloning – Signals – Development with Linux. “MYSQL: The Complete Reference”. Total: 45 Text Books: 1. terminating and writing your ownSQL programs – Record selection Technology – Working with strings – Date and Time– Sorting Query Results – Generating Summary – Working with metadata – Usingsequences – MySQL and Web. UNIT IV PYTHON 9 Syntax and Style – Python Objects – Numbers – Sequences – Strings – Lists and Tuples – Dictionaries – Conditionals and Loops – Files – Input and Output – Errors and Exceptions – Functions – Modules – Classes and OOP – Execution Environment. Martin C. Steve Suchring.
special constructs for Activity Models-Class Model-State Model-Interaction Model Unit III 9 Analysis Process Overview-Development stages-Development Lifecycle-System conceptiondevising a system concept-Elaborating a concept-preparing a problem statementDomain analysis-overview of analysis-Domain class model-Domain state model-Domain Interaction Model-Iterating the analysis-Application Interaction Model-Application Class Model-Application state Model-Adding operations Unit IV 9 Design Overview of system Design-Estimating performance.Themes-Evidence for Usefulness of OO Development-OO Modeling Modeling Concepts Modeling-Abstraction-The Three Models-Class Modeling-Object and Class ConceptsLink and Association Concepts-Generalization and Inheritance-A Sample Class ModelNavigation of Class Models-Practical Tips Unit II 9 Advanced Class Modeling Advanced Object and Class Concepts-Association Ends-N-ary AssocationsAggregation-Abstract Classes-Multiple Inheritance-metadata-Reification-ConstraintsDerived Data-Packages.Use Case RelationshipsProcedural Sequence Models.Development .Relation of class and state models Interaction Modeling Use case Models-Sequence Models.Making a reuse plan-Breaking a system into sub systems-identifying concurrency-Allocation of subsystemsManagement of Data Storage-Handling Global Resources-Choosing a software control strategy-handling boundary conditions-setting Trade-off Priorities-common architectural styles-Architecture of the ATM System .OBJECT ORIENTED SYSTEM DESIGN L T P M 3 0 0 100 Unit I 9 C 3 Introduction Introduction to Object Orientation .Activity Models.A sample state Model.Practical Tips State Modeling Events-states-Transitions and Conditions-State diagrams-state diagrams behaviorpractical tips-Advanced state Modeling-Nested State Diagrams-Nested States-Signal Generalization-concurrency.
Pattens. 2. and Java second Edition Bernd Bruegge. Object Oriented System Development. Ali Bahrami. Object-Oriented Software Engineering using UML.2004. Addison-Wesley Publishing company.1994 .programming in large Total : 45 TEXT BOOKS 1. Second Edition.Class Design Overview of class Design-Bridging the gap-Realizing use cases-Designing AlogrithmsRecursing Downward-Refactoring-Design optimization-Reification of behavioradjustment of inheritance-organizing a class design-ATM Example Unit V 9 \Implementation Implementation Modeling-overview of implementation-Fine-tuning classes-fine tuning generalizations-realizing associations-oo languages-introduction abbreviated ATM Model-implementing structure-implementing functionality-practical tips Database Introduction-Abbreviated ATM Model-Implementing structure-Implementing structure Implementing structure for the ATM Example-Implementing Functionality-Object oriented Databases Programming style Object-oriented style-reusability-extensibility – robustness . Pearson Education. Object-Oriented Software Engineering using UML. Michael Blaha. Booch G. McGraw-Hill International Edition. Pattens. Object-Oriented Modeling and Design with UML. James Rumbaugh. Allen H. Object Oriented analysis and Design.Dutoit(200x?) References 1.1999 2. Robert S 3. and Java second Edition Bernd Bruegge.
. “Numerical Methods”. Pearson Education Asia.Co. K. Gerald. R. 1999. T. 2002. Kandasamy.. 2. P.Iterative methods: Gauss Jacobi and Gauss-Seidel methods. K. UNIT III NUMERICAL DIFFERENTIATION AND INTEGRATION 9+ 3 Derivatives from difference tables – Divided differences and finite differences – Numerical integration by trapezoidal and Simpson’s 1/3 and 3/8 rules – Romberg’s method – Two and Three point Gaussian quadrature formulas – Double integrals using trapezoidal and Simpson’s rules. Thilagavathy. E. Balagurusamy.D.F. New Delhi.. UNIT II INTERPOLATION AND APPROXIMATION 9+ 3 Lagrangian Polynomials – Divided differences – Interpolating with a cubic spline – Newton’s forward and backward difference formulas. 2. Sixth Edition. New Delhi. P.Chand Co. C. New Delhi. “Numerical Analysis”. TUTORIAL 15 TOTAL : 60 TEXT BOOKS 1.NUMERICAL METHODS L T P M 3 1 0 100 UNIT I SOLUTION OF EQUATIONS AND EIGENVALUE PROBLEMS 9+3 C 4 Linear interpolation methods (method of false position) – Newton’s method – Statement of Fixed Point Theorem – Fixed point iteration: x=g(x) method – Solution of linear system by Gaussian elimination and Gauss-Jordon methods. 2003. and Wheatley. REFERENCES 1.Ltd.. “Numerical Methods”. Burden. Seventh Edition. UNIT IV INITIAL VALUE PROBLEMS FOR ORDINARY DIFFERENTIAL EQUATIONS 9+ 3 Single step methods: Taylor series method – Euler and modified Euler methods – Fourth order Runge – Kutta method for solving first and second order equations – Multistep methods: Milne’s and Adam’s predictor and corrector methods. ..L and Faires. Singapore.. Tata McGraw-Hill Pub. “Applied Numerical Analysis”. Ltd. Ltd. Thomson Asia Pvt.Inverse of a matrix by Gauss Jordon method – Eigenvalue of a matrix by power method. and Gunavathy. UNIT V BOUNDARY VALUE PROBLEMS IN ORDINARY AND PARTIAL DIFFERENTIAL EQUATIONS 9+ 3 Finite difference solution of second order ordinary differential equation – Finite difference solution of one dimensional heat equation by explicit and implicit methods – One dimensional wave equation.O. S. 2002.
. LCD displays. B-Reps. Techniques for Generating Perspective Views. UNIT-III Three-Dimensional Transformations 9 Introduction. Oblique Projections. Multiple Transformation. Three-Dimensional Translation. Constructive Solid Geometry. Display Technologies. Combined Transformation. end-point ordering and clipping lines. Categories of algorithms. Orthographic Projections. Filling Polygons. Comparison of Representations. Spatial-Partitioning Representations . Techniques for efficient Visible-Surface Algorithms. Scan Converting Ellipses. Regularized Boolean Set Operations. Mid-point criteria.COMPUTER GRAPHICS L 3 UNIT. Transformation of The Unit Square. Color CRT Raster Scan Basics. Three-Dimensional Reflection. Axonometric Projections. Calligraphic Refresh Graphics Displays. Computer Graphics Application and Software. Scan-line method. Painter’s algorithms (depth sorting). Sweep Representations. Transformation of Points. View volumes for projections. Video Basics. Area sub-division method. Back face removal. Three-Dimensional Scaling. Perspective Transformations. Primitive Instancing. Raster Refresh (Raster-Scan) Graphics Displays. Scaling. Translations and Homogeneous Coordinates. Reflection through an Arbitrary Plane.Octree representation.I Introduction to Computer Graphics & Scan conversion T P M C 0 0 100 3 10 Overview of Computer Graphics. Visible-Surface Ray Tracing. comparison of the methods. Affine and Perspective Geometry. UNIT-IV Solid Modeling & Visible-Surface Determination 9 Representing Solids. Random-Scan Display Processor. Reflection through an Arbitrary Line. Homogeneous Coordinates and Matrix Representation of 2D Transformations. Cathode Ray Tube Basics. Rotation About an Arbitrary Point. Transformation Conventions. Scan Converting Circles. problem with multiple components. A Geometric Interpretation of Homogeneous Coordinates. ThreeDimensional Rotation. edge data structure. Rotation about an Arbitrary Axis in Space. Vanishing Points. Storage Tube Graphics Displays. Three-Dimensional Shearing. the Perspective Geometry and camera models. The z-Buffer Algorithm. Clipping Lines algorithms– Cyrus-Beck. The Windowto-Viewport Transformations. Problems of Aliasing. BSP trees. Cohen-Sutherland and Liang-Barsky. UNIT-II Two-Dimensional Transformations 8 Transformations and Matrices. Clipping Polygons. Composition of 3D Transformations. Reflection. Scan Converting Lines. Rotation. Matrix Representation of 3D Transformations. 2D Transformations. The Video Controller. Solid Body Transformations.
Adams.UNIT-V llumination and Shading & Graphics Programming using OPENGL 9 Illumination and Shading Models for Polygons. J. Van Dam. Hearn and M. Pearson Education. 2nd Edition. OpenGL operations. TOTAL :45 Text books : 1. McGraw-Hill International Edition. Pearson Education.. a few examples and demos of OpenGL programs. Ambient. A. Hughes. D. Reflectance properties of surfaces. some examples. D. F. Pauline Baker. Gouraud shading. K. GLU & GLUT. Computer Graphics (C Version). Pearson Education. Feiner and J. . References: 1. 1990. 2. Atmospheric attenutation. S. viewing matrix specifications. 2003. Mathematical Elements for Computer Graphics. 2003. F. Phong’s model. Computer Graphics using OpenGL. 2004. A. Specular and Diffuse reflections. Second Edition in C. D. Foley. Computer Graphics Principles and Practice. Abstractions in OpenGL – GL. 3D viewing pipeline. Features in OpenGL. 2. Rogers and J. 2nd Edition. Hill Jr. S. F. Why OpenGL.
Implementation of Bresenham’s Algorithm Line Circle Ellipse 2. 5. testing with structure analysis and design method and object oriented analysis and design method i) SRS DOCUMENT (IEEE Standard) ii) Design document iii) Implementation iv) Test case generation and test document preparation 1. 3. Payroll system Online shopping Online voting system Banking system COMPUTER GRAPHICS LAB LTPC 0 0 3 2 1. 3. Server ) MySQL installation Apache installation PHP with Database connectivity PHYTON programming Perl script and CGI Network simulator (NS2) installation and simple tcl scripts OBJECT ORIENTED SYSTEM DESIGN LAB LTPC 0 0 3 2 Solving Simple problems using CASE tools for design. Installation in different modes (user mode. GUI. Cohen Sutherland 2D clipping and windowing . 4. 4. 2. 7. Single user.OPEN SOURCE LAB LTPC 0 0 3 2 1. 6. 2. 2D and 3D transformation Translation Rotation Scaling Reflection Shearing of objects 3.
“Artificial Intelligence: A new Synthesis”. UNIT V Applications 9 Communication –Communication as action -A formal grammar for a fragment of English – Syntactic Analysis – Augmented Grammars – Semantic Interpretation – Ambiguity and Disambiguation – Discourse Understanding – Grammar Induction. “Artificial Intelligence – A Modern Approach”. DFS.Inference in First-Order-Logic. Nils J. .-Problem Solving Agent .ARTIFICIAL INTELLIGENCE L 3 UNIT I Introduction and Problem Solving I T P M 1 0 100 9 C 4 Artificial Intelligence: Definition-Turing Test-Relation with other Disciplines-History of AIApplications . Harcourt Asia Pvt. Total:45 TEXT BOOKS: 1. Ltd. Bidirectional Search comparison of uninformed search strategies. UNIT III Knowledge Representation 9 First-Order Logic-Syntax and Semantics of First-Order-Logic-Using First-Order-LogicKnowledge Engineering in First-Order-Logic. Nilsson. 2003.A Logical Formulation of Learning-Knowledge in Learning-Explanation Based Learning-Learning using Relevance Information-Inductive Logic Programming. Peter Norvig. 3rd Edition.Nature of EnvironmentsStructure of Agent. DLS. 2.Inference rules-Unification and Lifting-Forward Chaining-Backward Chaining-Resolution.. Pearson Education / Prentice Hall of India 2010(yet to be published).Agent: Intelligent Agent-Rational Agent . Perception –Image Formation –Early Image Processing Operations – Extracting Three Dimensional Information – Object Recognition – Using Vision for Manipulation and Navigation. IDS. UNIT II Problem Solving II: 9 Informed Search Strategies-Greedy best-first search-A* search-Heuristic functionsLocal search Algorithms and Optimization problems .Forms of Learning-Learning Decision –Ensemble Learning .Problems: Toy Problems and Real-world Problems-Uninformed Search Strategies: BFS.Online Search Agent-Constraint Satisfaction Problems-Backtracking Search for CSP’s –Local Search for Constraint Satisfaction Problems-Structure of Problems -Adversarial Search-Optimal Decision in Games-Alpha-Beta Pruning-Imperfect Real Time Decisions-Games that Include an Element of Chance. UNIT IV Learning 9 Learning from Observations. Stuart Russell.
REFERENCES: 1. Elaine Rich and Kevin Knight, “Artificial Intelligence”, 2nd Edition, Tata McGrawHill, 2003. 2. Patrick Henry Winston, “Artificial Intelligence”, Pearson Education / PHI, 2004.
CRYPTOGRAPHY AND NETWORK SECURITY L T P M 3 1 0 100 UNIT-I Introduction 8 C 4
Introduction -Motivating examples-Basic concepts: confidentiality, integrity, availability, security policies, security mechanisms, assurance- Basic cryptography Historical background Transposition/Substitution, Caesar Cipher Introduction to Symmetric crypto primitives, Asymmetric crypto primitives. Unit-II Symmetric Ciphers 8
Traditional Symmetric ciphers- Substitution ciphers-Transposition ciphers-stream and block ciphers. Modern Symmetric key ciphers-Modern block and Stream ciphers-Data Encryption Standard-DES analysis-Structure-Multiple DES- Advanced data Encryption Standard-Transformation-Key Expansion-Analysis. Modern Block Ciphers-Stream Ciphers-other issues. UNIT-III Asymmetric Ciphers 8
Mathematics of cryptography-Primality testing-factorization –Chinese remainder theorem-Quadratic congruence- exponentiation and logarithm-RSA CryptosystemRabin Cryptosystem-Elgamal Cryptosystem-Elliptic cryptosystem. UNIT-IV Message integrity and Message authentication 12
Message integrity and Message authentication –Cryptographic hash functions-Digital signature- Key management – private and public -distribution –Kerberos- PGP-Security at application layer-Transport layer-Network layer-IKE-ISAKMP UNIT-V Advanced Network Security 9
Wireless Application protocol (WAP) security- Security in GSM- Security in 3G- Security in java- .Net-Operating Systems- Network Security- firewalls and VPN- Case studies – Single Sign On (SSO)-Denial of service (DOS)-Cross site scripting vulnerability CSSV. Total : 45 TEXT BOOKS: 1. Behrouz A.Forouzan “Cryptography and Network Secuity”, The McGraw-Hill Companies, 2007. 2. Cryptography and Network security, Atul Kahate, Tata McGraw-Hill Pub company Ltd., 2 edition, New Delhi 2009. REFERENCES 1. William Stallings, “Cryptography and Network security”, Pearson Education, New Delhi 2007 2. Network Security: The Complete Reference by Roberta Bragg, Mark PhodesOusley, Keith Strassberg Tata McGraw-Hill, 2008. 3. Charlie Kaufman, Radia Perlman, and Mike Speciner, “Network Security: PRIVATE Communication in a PUBLIC World “, Prentice Hall. 2007
INTERNET PROGRAMMING L T P M 3 0 0 100 UNIT I XHTML 8 C 3
Introduction to XHTML: Headers -Linking - Images–Unordered Lists -Nested and Ordered Lists forms -Tables–Form- frames– Cascading style sheets . UNIT II DHTML and Java 10
Object model and collections -event model - filters and transition. Java Basics: Data types, variables, Array, Operator, Control statements, I/O operation, Exception handling, file handling. UNIT III Data Binding, ActiveX and Java Script 8
Servlet: Introduction , Architecture, Lifecycle -Working with servlet- Handling HTTP get Requests - Handling HTTP get Requests Containing Data - Handling HTTP post Requests - Redirecting Requests to Other Resources - Multi-Tier Application (JDBC) UNIT V Java Network Programming 9
Looking up Internet Address - Socket programming – client/server programs – E-mail client – SMTP - POP3 programs – web page retrieval – protocol handlers – content handlers. Security Issues in Internet programming TOTAL: 45 TEXT BOOKS: 1. Deitel Deitel Goldberg, “Internet and World Wide Web – How to program”, Third Edition, Prentice hall Publishers,2004. 2. Elliotte Rusty Harold, “Java Network Programming”, Third Edition , O’Reilly Publishers.
REFERENCE BOOKS 1. Thomno A. Powell, “The Complete Reference HTML and XHTML”, fourth edition, Tata McGraw Hill, 2003. 2. Herbert Schildt, “The Complete Reference – Java2”, Tata McGraw-Hill, Fifth edition, 2002 3. Black Book, “ Java Server Programming “, Dreamtech Press, 2008 4. Ivan Bayross,Vaishali Shah,Sharanam Shah,Cynthia Bayross ,”Java Server Programming for Professionals: Covers Java EE 5”, Second Edition, Shroff Publishers
P. 3. 2004. “Crafting a compiler with C”.A simple Code generator . PHI. Jeffrey D Ullman. Henk Alblas and Albert Nymeyer.Bottom-up parsing .Declarations .Phases of a compiler .Procedure calls. UNIT V CODE GENERATION AND CODE OPTIMIZATION 9 Issues in the design of code generator . “Compiler Construction: Principles and Practice”.Compiler construction tools UNIT II LEXICAL ANALYSIS 9 Role of Lexical Analyzer .Input Buffering . Kenneth C.Boolean Expressions – Flow control statements .Operator Precedence Parsing . “Introduction to Compiler Techniques”.Assignment Statements . Ravi Sethi. 2003. 2. Case Study : One Pass Compiler. Holub “Compiler Design in C”. UNIT IV INTERMEDIATE CODE GENERATION 9 Intermediate languages .DAG representation of Basic Blocks – Introduction to optimization . LeBlanc. “Compilers: Principles. N. 2003 .Basic Blocks and Flow Graphs . Tata McGraw-Hill.LALR Parser-Tool for parser. C. Second Edition. “Practice and Principles of Compiler Building with C”. Pearson Education Asia.Back patching .The target machine . 2001. Allen I. Benjamin Cummings. TOTAL: 45 TEXT BOOKS: 1.Specification and recognition of Tokens Finite automata – Regular expression to finite automata – Optimization of DFA-based pattern matchers – Tool for generating lexical analyzer. UNIT III SYNTAX ANALYSIS 9 Role of the parser -Writing Grammars -Context-Free Grammars .Cousins of the Compiler . Fischer and R. J.Analysis of the source program .Top Down parsing Recursive Descent Parsing . 2.Canonical LR Parser . 2003.LR Parsers .Grouping of Phases .Shift Reduce Parsing .Predictive Parsing .Optimization of basic Blocks Peephole Optimization. J. 2003. Bennet.SLR Parser . REFERENCES 1.Principal Sources of Optimization . 4. Prentice Hall of India. Alfred Aho.PRINCIPLES OF COMPILER DESIGN UNIT I INTRODUCTION TO COMPILING 9 Compilers . Louden. Techniques and Tools”. Thompson Learning.
1. Implement pass two of a direct-linking loader. Implement a macro processor. modify. 5. Construction of minimized DFA from a given regular expression 3. Implement a single pass assembler. 2. search. 4. 2. 7. Implement pass two of a two pass assembler. implementation of symbol table 5. (For loader exercises. 4. 3. exercise on lexical analysis using LEX 4. Implement pass one of a two pass assembler. Generation of code for a given intermediate code 10. output the snap shot of the main memory as it would be. . and display.COMPILER DESIGN LAB LTPC 0032 1. Implement a relocating loader. 3. construction of LR parsing table 9. Exercise on syntax analysis using YACC 7. Implementation of shift reduced parsing algorithms 8. 8. 9. word. 6. Implement pass one of a direct-linking loader. Construction of NFA 2. insert. 10. sentence. construction of operator precedence parse table 6. implementation of code optimization techniques SYSTEM SOFTWARE LAB LTPC 1033 (Using C or C++) Implement a symbol table with functions to create. after the loading has taken place) INTERNET PROGRAMMING LAB LTPC 0032 DHMTL based web design for tourism information system for your local city USING Java script develop an online portal for distributed library information system Using servlet design a system for employee information system (JDBC.use do get and do post method) Create an instant messenger (with file transfer and message transfer) 1. Implement an absolute loader. Implement a simple text editor with features like insertion / deletion of a character.
Advantages of Free Software and GNU/Linux. Using source code versioning and management tools -. using NFS ( file services for gnu/Linux /Unix networks) .constructing make files and using make. network cards. using autoconf and autogen to automatically generate make files tailored for different development environments . squirrel mail (web mail services) Setting up file services -.using CVS to manage source code revisions.logging in. FOSS usage . Understanding build systems -. modems.Using netfilter and ip tables. User and group management. Qt Programming. patch & diff.using postfix (SMTP services). playing music. viewing file contents. assembler (gas) . CD writers .detect hardware.Configuring networking.sound cards. Ethernet.using samba ( file and authentication services for windows networks).using squid ( http / ftp / https proxy services) . Understanding the OS boot up process.OPEN SOURCE TOOLS AND COMPONENTS L 3 UNIT I T P M 0 0 100 10 C 3 Overview of Free/Open Source Software-. Using the GNU Compiler Collection – GNU compiler tools . Programming GUI applications with localization support . Setting up email servers-. configure disk partitions & file systems and install a GNU/Linux distribution . editing documents and spreadsheets. Performing every day tasks using gnu/Linux -. editing files.Definition of FOSS & GNU. Introduction to common system configuration files & log files . file ownerships and permissions. courier (IMAP & POP3 services). GNU/Linux OS installation-. Unit IV 10 Web Server: Apache Web server – Working with Web Server – Configuring and Using apache web services MDA: Introduction to MDA – Genesis of MDA – Meta Object Facility – UML – UML Profiles – MDA Applications. Gtk+ Programming. X Window system configuration and utilities -. listing files. Unit V 10 Basics of the X Windows server architecture. displays & display cards. sending and receiving email. playing games. copy files from disks and over the network. the C compiler (gcc) and the C++ compiler (g++). writing CDs . DSL. trends and potential—global and Indian. Basic shell commands . copying/moving files. Setting up proxy services -. foomatic (printer database) Unit III 10 Setting up a firewall . USB drives. History of GNU/Linux and the Free Software Movement .accessing the Internet. leased line). changing file modes and permissions. basics of TCP/IP networking and routing. PAM authentication . process management .configure X windows. Unit II 10 Configuring additional hardware . detect display devices . Installing software – from source code as well as using binary packages. connecting to the Internet (through dialup. Setting up printer services using CUPS (print spooler). the C preprocessor (cpp).
org/cookbook/cookbook_toc. Stephen Stafford. 3 Carla Schroder. January 1999. Using GCC. Richard Stallman et al. URL: http://dsl. 2005. URL: http://www. 2004 ON-LINE MATERIAL 1.com/ 8.2002. URL: http://www. Lars Wirzenius. O'Reilly Publishers. Linux Cookbook.redhat.html GTK+/GNOME Application Development. First Edition. An Introduction to GCC. 2001.com/catalog/opensources/book/toc.org/guides. and Alex Weeks. Open Sources: Voices from the Open Source Revolution. URL:http://www.com/autobook/ 7.red-bean.org/guides. B. 5. 2002. 2 Matt Welsh.REFERENCE BOOKS 1. Joanna Oja. Marc Balces. Matthias Kalle Dalheimer. “Executable UMS: A foundation for MDA”. Fourth Edition. 3. Third Edition. ISBN: 1-56592-582-3. Advanced Bash Scripting Guide. co.gnu.html 3. URL:http://developer.networktheory. URL: http://www.html 2. N. Tom Tromey and Ian Lance Taylor. Venkateshwarlu (Ed).B S Publishers. Karl Fogel and Moshe Bar. December 2003. June 2005. Ben Elliston. The Linux System Administrators' Guide.html 5. Michael Stutz.html 4. Linux.org/doc/GGAD .uk/docs/gccintro/ 6. The Linux Cookbook: Tips and Techniques for Everyday Use.tldp. Brian Gough.org/doc/using.oreilly. GNU Autoconf. Vaughan. First Edition. Open Source Development with CVS.tldp. Introduction to Linux: Installation and Programming. 2. Terry Dawson. O'Reilly Cookbooks Series. First Edition. Automake and Libtool. URL: http://cvsbook. and Lar Kaufman. Havoc Pennington. Running 4. URL: http://sources. Addison. Mellor. URL: http://www. Gary V. Mendel Cooper.gnome. Stephen J.
Parallel Port Devices . ‘USB’.Device I/O Types and Examples – Synchronous .‘12C’. REAL TIME OPERATING SYSTEMS : RTOS Task scheduling models .Goals – Structures.Sophisticated interfacing features in Devices/Ports. PCI-X. 9 Programming in assembly language (ALP) vs. tasks and threads – Clear cut distinction between functions – ISRs and tasks by their characteristics – Operating System Services.NULL Pointers . UNIT V REAL TIME OPERATING SYSTEMS – PART . cPCI and advanced buses.2 9 Study of Micro C/OS-II or Vx Works or Any other popular RTOS – RTOS System Level Functions – Task Service Functions – Time Delay Functions – Memory Allocation .Iso-synchronous and Asynchronous Communications from Serial Devices . ‘C’ Program compilers – Cross compiler – Optimization of memory codes.1 9 Definitions of process.Kernel . Macros and functions -Use of Pointers .Examples of Internal SerialCommunication Devices .C Program Elements.Objected Oriented Programming – Embedded Programming in C++.Use of Function Calls – Multiple function calls in a Cyclic Order in the Main Function Pointers – Function Queues and Interrupt Service Routines Queues Pointers – Concepts of EMBEDDED PROGRAMMING in C++ . ‘CAN’ and advanced I/O Serial high speed buses. UNIT III C++ PROGRAMMING CONCEPTS AND EMBEDDED PROGRAMMING IN C.ISA.Handling of task scheduling and latency and deadlines as performance metrics – Co-operative Round Robin Scheduling – Cyclic Scheduling with Time Slicing (Rate Monotonics Co-operative Scheduling) – Preemptive Scheduling Model strategy by a Scheduler – Critical Section Service by a Preemptive Scheduler – Fixed (Static) Real time scheduling of tasks . PCI.Timer and Counting Devices . High Level Language .UART and HDLC . UNIT IV REAL TIME OPERATING SYSTEMS – PART .EMBEDDED SYSTEMS L 3 UNIT I INTRODUCTION TO EMBEDDED SYSTEMS T P M 0 0 100 9 C 3 Definition and Classification – Overview of Processors and hardware units in an embedded system – Software embedded into the system – Exemplary Embedded Systems – Embedded Systems on a Chip (SoC) and the use of VLSI designed circuits UNIT II DEVICES AND BUSES FOR DEVICES NETWORK 9 I/O Devices .INTER PROCESS COMMUNICATION AND SYNCHRONISATION – Shared data problem – Use of Semaphore(s) – Priority Inversion Problem and Deadlock Situations – Inter Process Communications using Signals – Semaphore Flag or mutex as Resource key – Message Queues – Mailboxes – Pipes – Virtual (Logical) Sockets – Remote Procedure Calls (RPCs).Process Management – Memory Management – Device Management – File System Organisation and Implementation – I/O Subsystems – Interrupt Routines Handling in RTOS.
First Indian Reprint 2000. 2002.Related Functions – Semaphore Related Functions – Mailbox Related Functions – Queue Related Functions – Case Studies of Programming with RTOS – Understanding Case Definition – Multiple Tasks and their functions – Creating a list of tasks – Functions and IPCs – Exemplary Coding Steps. Frank Vahid and Tony Givargis. First reprint Oct. Newnes. Embedded Systems Architecture. REFRENCE BOOKS: 1. TOTAL: 45 TEXT BOOKS 1. Rajkamal. An Embedded Software Primer. Computers as Components. First Indian Reprint 2001 3. Principles of Embedded Computing System Design – Harcourt India. Second Edition-2003. . Pearson Education Asia. Steve Heath.Simon. Morgan Kaufman Publishers. Embedded Systems Design. John Wiley. David E. Programming and Design. Embedded Systems Design – A unified Hardware / Software Introduction. TATA McGraw-Hill. 2003 2. Wayne Wolf. 2.
D. Multiplexers / Demltiplexers). ‘Principles of CMOS VLSI Design’. Charles H. PMOS. 2. NOR-NOR and AOI logic) – EXOR structure – Multiplexer structures – Barrel shifter. Unit V VHDL PROGRAMMING 9 RTL Design – combinational logic – Types – Operators – Packages – Sequential circuit – Sub programs – Test benches. FSM. ‘VHDL Programming By Example’. K. ‘Fundamentals of Logic Design’. 4. Unit IV LOGIC DESIGN OF COMBINATIONAL ELEMENTS & REGULAR ARRAY 9 NMOS PLA – Programmable Logic Devices . Tata McGraw Hill. BiCMOS) Technology – NMOS transistor current equation – second order effects – MOS Transistor Model.Pucknell. Unit III SUB SYSTEM DESIGN & LAYOUT 9 Structured design of combinational circuits – Dynamic CMOS & clocking – Tally circuits – (NAND-NAND. ‘Basic VLSI Design’. Pearson Education. N. counters. 1998.1992. 3rd Edition. 3rd Edition. 1990. Prentice Hall of India. . India. Tata McGraw Hill. ‘VHDL Analysis and Modelling of Digital Systems’. 2nd Edition.Weste. Zainalatsedin Navabi. ‘Introduction to VLSI Design’. Tata McGraw Hill. Eugene D. CMOS. 3. Jaico Publishing House. REFERENCES 1. 2002.Fabricius. Unit II NMOS & CMOS INVERTER AND GATES 9 NMOS & CMOS inverter – Determination of pull up / pull down ratios – stick diagram – lamda based rules – super buffers – BiCMOS & steering logic. Douglas Perry.Eshraghian. flipflops. (Examples: address. Total = 45 TEXT BOOKS: 1. 2003. 2.Finite State Machine PLA – Introduction to FPGA. New Delhi.Roth.A.VLSI DESIGN L 3 Unit I BASIC MOS TRANSISTOR T P M 0 0 100 9 C 3 Enhancement mode & Depletion mode – Fabrication (NMOS.H.
Graphics Device Interface. Colors and fonts – modal and modeless dialog – windows common controls – bitmaps UNIT IV THE DOCUMENT AND VIEW ARCHITECTURE 9 Menus – Keyboard Accelerators – Rich Edit Control – Tool bars – Status bars – A reusable Frame Window Base Class . “Windows Programming”. Indian Reprint. UNIT V APPLICATIONS OF VISUAL PROGRAMMING 9 Dynamic link library – ActiveX controls Vs. David Kruglirski. Visual C++ 6 From the grounded up . Microsoft press. 2008. Charles Petzold.Reading and writing documents .Object linking and embedding – Data Base Management with Microsoft ODBC. 2nd Edition by John Mueller.Accessing databases with data control . Ordinary Windows Controls – Installing ActiveX controls – Calendar Control – ActiveX control container programming – create ActiveX control at runtime -Component Object Model .0 Programming. 2001. Tata McGraw-Hill Publishing Company Limited. 2008. Visual Basic 6. Francesco Balena. Total: 45 TEXT BOOKS: 1. Fifth Edition.SDI and MDI environments – splitter windows and multiple views. . REFERENCES 1. Content Development Group. 2. Microsoft press. and a Scrolling View . Mapping modes.Displaying the window . 2. Indian Reprint.Visual C++ components – Microsoft foundation classes Library Application Framework – Getting Started with AppWizard – Basic Event handling. UNIT III VISUAL C++ PROGRAMMING 9 Windows Programming Model . 1996. “Programming Microsoft Visual Basic6. McGraw – HILL INTERNATIONAL EDITION. 3. “Programming Microsoft Visual C++”.Classes and Objects – ADO Object Model.message Loop – windows procedure-WM_PAINT message WM_DESTROY message – An Introduction to GDI -– device context – basic drawing – child window controls UNIT II VISUAL BASIC PROGRAMMING 9 IDE – First Visual Basic Program .Threading. 1998. Microsoft press.0”. Indian Reprint.Introduction to Forms –Intrinsic Controls –working with Files .J.VISUAL PROGRAMMING L 3 UNIT I INTRODUCTION TO WINDOWS PROGRAMMING T P M 0 0 100 9 C 3 GUI Concepts – Overview of Windows programming – Creating the window .
OPTIMIZATION TECHNIQUES L 3 UNIT I INTRODUCTION T P M 0 0 100 9 C 3 Statement of an optimization problems – classification of optimization problem – classical optimization techniques. TEXT BOOKS: 1. UNIT V DECISIOIN MAKING 9 Decisions under uncertainty. simplex method. “Operations Research – An introduction”. Simplex Multipliers – Dual and Primal – Dual Simplex Method – Sensitivity Analysis – Transportation problem and its solution – Assignment problem and its solution – Assignment problem and its solution by Hungarian method – Karmakar’s method – statement. 2004. Pearson Education . UNIT IV DYNAMIC PROGRAMMING 9 Introduction – multistage decision processes – Principles of optimality – Computation procedures. NON LINEAR PROGRAMMING – (CONSTRAINED OPTIMIZATION): Introduction – Characteristics of the problem – Random search method – Conjugate gradient method. Prentice Hall. under certainty and under risk – Decision trees – Expected value of perfect information and imperfect information. 2002. No constraints. 2. inequality constraints. Kalynamoy Deb. Single variable optimizations.Introduction – Random search method – Uni variate method – Pattern search methods – Hooke and jeeves method. Alogorithms and Examples”. . NON LINEAR PROGRAMMING : (UNCONSTRAINED OPRIMIZATION): . equality constrainst. Multi variable optimization. Hamdy A Taha.Gradient of a function – steepest descent method – Conjugate gradient method. Conversion of the Linear Programming problem into the required form. UNIT III NON LINEAR PROGRAMMING 9 NON LINEAR PROGRAMMING (ONE DIMENSIONAL MINIMIZATION: Introduction – Unrestricted search – Exhaustive search – interval halving method – Fibonacci method. “Optimization for Engineering Design. Algorithm. UNIT II LINEAR PROGRAMMING 9 Graphical method for two dimensional problems – central problems of Linear Programming – Definitions – Simples – Algorithm – Phase I and II of simplex Method – Revised Simplex Method.
. Singiresu S Rao. MacMillian Press Ltd. “Introduction to Operations Research”. New Age International. 1996. “Engineering optimization Theory and Practice”. 2002. “Mathematical Programming Techniques”. Kambo N S.. Mik Misniewski. 1991. 2. Hillier / Lieberman.REFERENCES: 1. 3. 1994. 4. Affiliated East – West press. Tata McGraw Hill Publishing company Ltd. “Quantitative Methods for Decision makers”.
McGraw-Hill.PROFESSIONAL ETHICS L T P M 3 0 0 100 UNIT I. Govindarajan M. New Delhi.moral dilemmas .occupational crime . 2. Mike Martin and Roland Schinzinger.employee rights Intellectual Property Rights (IPR) .respect for authority . Indian Institute of Materials Management.risk benefit analysis and reducing risk the three mile island and chernobyl case studies. TOTAL : 45 TEXT BOOK: 1. HUMAN VALUES 10 C 3 Morals.Kohlberg's theory .codes of ethics . 2004.confidentiality conflicts of interest . Institution of Engineers (India).Environmental ethics .discrimination. RESPONSIBILITIES AND RIGHTS 9 Safety and risk . “Ethics in Engineering”. ASCE.engineers as managers-consulting engineers-engineers as expert witnesses and advisors -moral leadership-sample code of Ethics like ASME.assessment of safety and risk .uses of ethical theories.computer ethics . New York 1996.collective bargaining . Institution of electronics and telecommunication engineers (IETE).weapons development . etc. UNIT V GLOBAL ISSUES 8 Multinational corporations .Gilligan's theory .consensus and controversy – Models of Professional Roles .India.theories about right action . Natarajan S.professional rights . IEEE.Self-interest customs and religion . . Prentice Hall of India. Values and Ethics – Integrity – Work Ethic – Service Learning – Civic Virtue – Respect for Others – Living Peacefully – caring – Sharing – Honesty – Courage – Valuing Time – Co-operation – Commitment – Empathy – Self-Confidence – Character – Spirituality UNIT II Engineering Ethics 9 Senses of 'Engineering Ethics' .types of inquiry .engineers as responsible experimenters .the challenger case study UNIT IV SAFETY.a balanced outlook on law . UNIT III ENGINEERING AS SOCIAL EXPERIMENTATION 9 Engineering as experimentation .moral autonomy . Senthil Kumar V.variety of moral issued . “Engineering Ethics”. Collegiality and loyalty . S.
Protchard and Michael J Rabins. United States. 2001. “Fundamentals of Ethics for Scientists and Engineers”. “Ethics and the Conduct of Business”. Pearson Education / Prentice Hall.REFERENCES 1. 2004 (Indian Reprint) 2. John R Boatright. Michael S. Edmund G Seebauer and Robert L Barry. “Engineering Ethics – Concepts and Cases”. 4. New Jersey. 2003. Oxford University Press. Fleddermann. “Engineering Ethics”. Charles D. . Pearson Education. 2000 (Indian Reprint now available) 3. Oxford. New Delhi. Wadsworth Thompson Learning. Charles E Harris.
11a . Prasanth Krishnamoorthy.Basics – Parameters and Configurations – Capacity Allocation – FAMA and DAMA – Broadcast Systems – DAB . 2003. 2003. TOTAL : 45 TEXT BOOKS: 1.Architecture – services – MAC – Physical layer – IEEE 802.Routing – DSDV – DSR – Alternative Metrics. “Wireless Communications and Networks”.HIPERLAN – Blue Tooth. 2002. 3. 2003. 2002. Kaveh Pahlavan. UNIT IV MOBILE NETWORK LAYER 9 Mobile IP – Dynamic Host Configuration Protocol . . Jochen Schiller. 2. PHI/Pearson Education. Lothar Merk. William Stallings.DVB. PHI/Pearson Education. “Principles of Mobile Computing”. Hazysztof Wesolowshi. UNIT V TRANSPORT AND APPLICATION LAYERS 7 Traditional TCP – Classical TCP improvements – WAP. “Principles of Wireless Networks”. PHI/Pearson Education. UNIT III WIRLESS LAN 9 Wireless LAN – IEEE 802. UNIT II TELECOMMUNICATION NETWORKS 11 Telecommunication systems – GSM – GPRS – DECT – Satellite Networks . Martin S. “Mobile Communication Systems”. “Mobile Communications”. 2.Introduction to 4G mobile networks.MOBILE COMPUTING L 3 T P M 0 0 100 C 3 UNIT I WIRELESS COMMUNICATION FUNDAMENTALS 9 Introduction – Wireless transmission – Frequencies for radio transmission – Signals – Antennas – Signal Propagation – Multiplexing – Modulations – Spread spectrum – MAC – SDMA – FDMA – TDMA – CDMA – Cellular Wireless Networks. Springer.Case study – Mobile multimedia networks. Nicklons and Thomas Stober. Uwe Hansmann. REFERENCES 1. John Wiley and Sons Ltd. Second Edition.11 . New York.
2. Laudon.P. Total : 45 TEXT BOOKS: 1.Pearson Education.”Management Information Systems-Organization and Technology in the Networked Enterprise”. UNIT V DEVELOPMENT AND MAINTANANCE OF INFORMATION SYSTEMS 9 Systems analysis and design – System development life cycle – Limitation – End user development – Managing End users of the shelf software packages – Outsourcing – Comparison of different methodologies.E.C.sixth Edition. Tree Diagram) – Information Flow – Process Flow – Methods and Heuristics – Decomposition and aggregation – Information architecture – Application of System Representation to Case Studies.2000. INFORMATION AND DECISION THEORY 9 Information theory – Information content and Redundancy – Classification and compression – Summarizing and Filtering – inferences and Uncertainty – Identifying information needed to support to decision Making – Human Factors – problem characteristics and information System Capabilities in Decision Making. M. UNIT IV INFORMATION SYSTEM APPLICATION 9 Transaction processing Application – Basic Accounting Application – Applications for Budgeting and planning – other use of information Technology: Automation – Word processing – Electronic Mail – Evaluation Remote Conferencing and Graphics – Systems and Selection – Cost Benefit – Centralized vs.”Management Information Systems:Managing the Digital Firm”. Laudon . Laudon . .Prentice Hall. UNIT IIREPRESENTATION AND ANALYSIS OF SYSTEM STRUCTURE 9 Models for Representing Systems Mathematical.J.2002.Brabaston. K. UNIT III SYSTEMS.J. Decentralized Allocation Mechanism.C.P. K.MANAGEMENT INFORMATION SYSTEMS L T P M 3 0 0 100 UNIT I INFORMATION SYSTEM AND ORGANIZATION 9 C 3 Matching the information system plane in to the organizational strategic plan – identifying key Organizational Objective and processes and Developing an information System Development – User role in Systems Development process – Maintainability and Recoverability in System Design. Graphical and Hierarchical (Organization Chart. Laudon.
Brabston.E.”Introduction to Information Technology”. 2.R.Turban.Joey F .F. K.REFERENCES 1.Potter. 3. Turban.R. Jeffrey A. Hoffer .third Edition. . ”Management Information Systems:Managing the Digital Firm”.K. George and Joseph S. Wiley and M.E.”Modern System analysis and Design”.2002.2004. E.C.Valachich.Pearson Education.
Web server . Addison Wesley.(Unit 2 & 3) 3. (Unit 1) 2. 2002. Tom Valesky. Galgotia Publications Pvt.NET – Overview of . O’Reilly Press.”Enterprise Java Beans”. “The Essential Client/Server Survival Guide”.Pearson Education. Jason Pritchard. “Programming C#”. Destruction – Comparison COM and CORBA – Introduction to . Total: 45 Text Books: 1.”COM and CORBA side by side”. (Unit 5) . Jesse Liberty. Database server. 2002. Robert Orfali.2000 (Unit 4 & 5) References : 4.Peer. Object server. Client / Server Building blocks – RPC – Messaging – Peer – to.. UNIT II EJB ARCHITECTURE 9 EJB – EJB Architecture – Overview of EJB software architecture – View of EJB – Conversation – Building and Deploying EJBs – Roles in EJB. Ltd. Invocation . UNIT V COM 9 COM – Data types – Interfaces – Proxy and Stub – Marshalling – Implementing Server / Client – Interface Pointers – Object Creation.Middleware – General middleware – Service specific middleware. Dan Harkey and Jeri Edwards.NET architecture – Marshalling – Remoting.MIDDLEWARE TECHNOLOGY L T P M 3 0 0 100 UNIT I CLIENT / SERVER CONCEPTS 9 C 3 Client – Server – File Server. 2nd Edition. UNIT IV CORBA 9 CORBA – Distributed Systems – Purpose – Exploring CORBA alternatives – Architecture overview – CORBA and networking model – CORBA object model – IDL – ORB – Building an application with CORBA. Group server. UNIT III EJB APPLICATIONS 9 EJB Session Beans – EJB entity beans – EJB clients – EJB Deployment – Building an application with EJB. 2002.
2nd edition. Second Edition (2007). 2. Boris Beizer . Tata McGraw..Hill. USA. NJ. INTEGRATION AND SYSTEM TESTING 9 Unit Testing. 2005. Jorgensen “Software Testing. Published by John Wiley & Sons Inc.Win Runner – Silk Test – Load Runner – Jmeter . Pradeep Oak.Some Dichotomies – A model for testing-The taxonomy of bugs: Synopsis – Consequence of bugs – taxonomy of bugs – Level of Testing – Test CasesExamples. CRC Press. Paul C. Tools and Techniques” Renu Rajani. J.Test Director Total: 45 Text Books: 1. 2. “Software Testing Effective methods. UNIT V DEBUGGING AND TESTING TOOLS 10 Debugging Process – Debugging Approach –Software Testing Tool: An Overview. UNIT IV OBJECT ORINTED TESTING 9 Issues in Object Oriented Testing – Class Testing – Object Oriented Integration Testing – GUI Testing – Object Oriented System Testing. DreamTech Press.“The Art of Software Testing”.Basis Path Testing .Integration Testing – System Testing – Interaction Testing – Verification and Validation – Extreme Testing.Data Flow Testing – Loop Testing .Myers . References: 1.Condition Testing. A Craftsman’s Approach”. UNIT II FUNCTIONAL AND STRUCTURAL TESTING 9 Boundary Value Testing – Equivalence Class Testing – Comparison Testing-Cause Effect Graphs.Structural Coverage.SOFTWARE TESTING L 3 UNIT I INTRODUCTION T P M 0 0 100 8 C 3 Purpose of testing. UNIT III UNIT.”Software Testing Techniques”. .
3. “Software Project Management”. Software estimation techniques.gov.Thater “Software Engineering Project Management. Estimating by analogy. Managing Risk. Tata McGraw. Reducing the Risk. Identify activity risks.” Software Project Management” PHI.ogc. References: 1.asp . cost monitoring. Resource Allocation: Scheduling resources. Basis of software estimation. expert Judgment. A. structured methods. projects and activities. UNIT II 9 Project Evaluation: Strategic Assessment. Risk Evaluation.SOFTWARE PROJECT MANAGEMENT L 3 UNIT I T P M 0 0 100 9 C 3 Introduction to Software Project Management. Comparison of project management software’s: dot Project.”: IEEE Computer Society 2. An Overview of Project Planning: Select Project. UNIT III 9 Software Effort Estimation: Problems with over and under estimations. formulating a network model. Selection of Appropriate Project approach: Choosing technologies. Bob Hughes & Mike Cotterell. Kelkar.Hill Pubs. External Standards. Monitoring and Control: Creating Framework. Fourth Edition 2006. http://www.org/wiki/Comparison_of_project_management_software 4.uk/methods_prince_2. UNIT V 9 Software Quality: defining software quality. project products and characteristics. cost-benefit evaluation techniques. Identifying Project scope and objectives. Estimate efforts. UNIT IV 9 Risk Management: Nature of Risk. Case study: PRINCE2 Text Books: 1. Risk Identification and Analysis. Technical Assessment. Activity Planning: Project schedules. and Allocate resources. cost-benefit analysis. Richard H. networks planning models. http://en. Critical Paths. choice of process models. . S. Cost scheduling. cash flow forecasting. ISO9126. sequencing and scheduling activities. infrastructure. openProj. prioritizing monitoring. Launch pad.wikipedia.
OGSA PLATFORM COMPONENTS: Native platform services-mechanisms-OGSA hosting Environment. & network requirements. OPEN GRID SERVICES INFRASTRUCTURE (OGSI): Introduction-Grid services.Grid service behavior implementation- .service programming model. Infrastructure.Architecture of data grid.security .Relationship between Web services & Grid services.Introduction to service data components. GRID COMPUTING ANATOMY: Grid problem –Grid Architecture. OGSA BASIC SERVICES: Common Management model (CMM)-service domainspolicy architecture.Organizations developing Grid Computing Toolkits & the framework Organizations building and using Grid base solutions to solve computing .Introduction-Architecture-Goals: SOME SAMPLE US CASES THAT DRIVE THE OGSA: Commercial Data center (CDC) National Fusion Collaborations (NFS)-Online Media & entertainment. GRID COMPUTING ORGANIZATIONS AND THEIR ROLES: Organizations developing Grid standards & best practice Guidelines . UNIT – IV SCHEDULING GRID SERVICES 9 Introduction .High-level introduction to OGSI.Grid scheduling algorithms and strategies.Mastering & Accounting.semantic grids.SOAP.GRID COMPUTING L 3 UNIT-I: INTRODUCTION: T P M 0 0 100 9 C 3 Grid activities . Architecture:Meta-schedulers Grid scheduling scenarios .security architecture.service oriented architecture.Grid fault tolerance.XML messages and Enveloping.framework .Service Oriented Architecture-Web Service Architecture.Techniques syntactic and semantic.Core Networking services-Security. GLOBUS GT3 TOOLKIT PROGRAMMING MODEL: Introduction.common distributed Logging.default server side . Case study: GSSIM: Grid Scheduling Simulator UNIT-V GLOBUS GT3 TOOLKIT 9 Architecture-GT3 software architecture model.Fault-tolerant techniques .system level services.Grid service: Naming & change management recommendations.data.Technical details. UNIT-III GRID COMPUTING TECHNOLOGICAL VIEWPOINTS: 9 Open Grid Service Architecture (OGSA) . UNIT-II THE GRID COMPUTING ROAD MAP: 9 Autonomic computing -Business on demand & infrastructure virtualization .Dynamic heuristics .Grid Business Areas – Applications .Scheduling algorithms and strategies: Static heuristics . Fault tolerant : Fault-tolerant algorithms . THE NEW GENERATION OF GRID COMPUTING APPLICATION: Merging the Grid service Architecture with Web service Architecture.Other information services and providers Data-intensive service scheduling : Algorithms .Service message description mechanism. Service discovery :Service directories . Resource information: Globus Toolkit information service .basic services.Metascheduling schemes.Infrastructure.
Ahmar Abbas. 5. 2004.” firewall publisher. 2.advanced service data concepts-operation providers – CASE STUDY: GridSIM: A Tool kit for Modeling and Simulating Grid Computing TOTAL – 45 Text Books: 1. 2.Grid service configuration. “Grid Computing”.com .configuration.custom query engines & evaluatorsGT3tools.security .basic service implementation. 2003. Frédéric Magoulès. Thi-Mai-Huong Nguyen. www.Pinedo. Joshy Joseph & Craig Fellenstein . Micheal L.Morgan Kaufmann. Wiley Interscience. Springer.factory call back mechanisms.Lei Yu “Grid Resource Management”.service activation & deactivation.advanced Grid services.(Unit IV) References: 1.Grid service life cycleManagement. 2003. Daniel Minoli. 3rd Edition. “Scheduling.”Grid Computing: A practical guide to Technology and Applications.simple client implementation. “A networking approach to Grid Computing”. 2004. theory algorithms and systems”.buyya. 3. CRC press. IBM Press. Ian Foster & Carl Kesselman – “The Grid2 Blueprint for a New Computing Infrastructure”.operation providers. 4.
George Coulouris.Overview . Sape Mullender.Nested Transactions . “Distributed Systems Concepts and Design”. 2002.Optimistic Concurrency Control Timestamp Ordering .Distributed Deadlocks . “ Distributed Systems”.DISTRIBUTED COMPUTING L 3 UNIT I INTRODUCTION T P M 0 0 100 9 C 3 Characterization of Distributed Systems .Client-Server Communication .Resource Sharing and the Web Challenges .Internet Protocols .Directory and Discovery Services .X. 3rd Edition.Logical Time And Logical Clocks .Locks . Jean Dollimore and Tim Kindberg.Communication and Invocation – OS Architecture .Events and Notifications . Events and Process States Synchronizing Physical Clocks .Communication Between Distributed Objects .Case Study .Comparison .The API for the Internet Protocols .Atomic Commit Protocols .Group Communication . UNIT V DISTRIBUTED TRANSACTION PROCESSING 9 Transactions .Clocks. UNIT III OPERATING SYSTEM ISSUES – I 9 The OS Layer .Overview of Replication And Distributed Multimedia Systems TOTAL : 45 Text Books: 1. Addison Wesley.Distributed File Systems .Transaction Recovery . 1993.Architectural and Fundamental Models .Global Name Service .Case Studies .System Models .Global States Distributed Debugging .External Data Representation and Marshalling .Protection . .Security .Types of Networks .Case Studies.Distributed Objects and Remote Invocation .Sun Network File System .Processes and Threads .Networking and Internetworking .The Andrew File System UNIT IV OPERATING SYSTEM ISSUES – II 9 Name Services -Domain Name System . 2nd Edition.Cryptographic Algorithms . UNIT II PROCESSES AND DISTRIBUTED OBJECTS 9 Interprocess Communication . Pearson Education.Java RMI Case Study.File Service Architecture .Concurrency Control in Distributed Transactions .Network Principles . 2.Digital Signatures Cryptography Pragmatics .Examples .Distributed Mutual Exclusion – Elections – Multicast Communication Related Problems.Remote Procedure Call .Flat and Nested Distributed Transactions .500 Directory Service .
Pearson Education. 3.Tata McGraw Hill Edition. 2004. 2002 4. “Distributed Computing Principles and Applications”. Andrew S Tanenbaum .References: 1. 1994 2.Software Design and Implementation”. Springer-Verlag.L.”Distibuted Systems –Principles and Pardigms”. “Distributes Systems. 2001 .”Advanced Concepts in Operating Systems”. Maartenvan Steen. Albert Fleishman.Liu.Niranjan G Shivaratri.Pearson Education. M. Mugesh Singhal.
J. Multivector and SIMD computers. Kai Hwang. superscalar and vector processors. speedup performance laws. Program flow mechanisms. Principles of scalable performance performance matrices and measures. . Parallel program development and environments. shared memory organisations. Multiprocessor and Multicomputers.PARALLEL PROCESSING L T P M 3 0 0 100 7 C 3 UNIT I INTRODUCTION TO PARALLELISM Parallel computer models . Architectural development tracks. UNIT V SOFTWARE AND PARALLEL PROGRAMMING 10 Parallel models. MACH and OSF/1 for parallel computers. Program partitioning and scheduling. PRAM and VLSI models. Program and network Properties UNIT II THEORY OF PARALLELISM 8 Conditions of parallelism. scalability analysis and approaches.backplane bus systems. Macmillan Publishing Company. 2. Multithreaded and data flow architectures. 1993. Multiprocessors and Multicomputers and Multivectors and SIMD computers. Quinn. Languages and compilers. UNIT III HARDWARE TECHNOLOGIES 10 Processor and memory hierarchy advanced processor technology. William Stallings. virtual memory technology. System interconnect architectures. sequential and weak consistency models. cache memory organisations. McGraw Hill International. Parallel processing applications. References: 1. "Designing Efficient Algorithms for Parallel Computers". McGraw Hill International. Total: 45 Text Books: 1. M. 1994.the state of computing. "Computer Organization and Architecture". UNIT IV PIPELINING AND SUPERSCLAR TECHNOLOGIES 10 Parallel and scalable architectures. Scalable. "Advanced Computer Architecture". 1990. bus cache and shared memory . UNIX. memory hierarchy technology.
S. Applications and Scope of Soft computing.SOFT COMPUTING L 3 UNIT -I Introduction T P M 0 0 100 9 C 3 Introduction to soft computing-Characteristics of Soft Computing.Image Processing.A. Fuzzy Logic and Genetic Algorithms”.applications of fuzzy systems.Sun and E. “Neural Networks.Robotics and SensorsInformation Retrieval Systems-Share Market Analysis-NaturalLanguageProcessing. and Genetic Algorithms: Types of Hybrid systems:Sequential.Supervised Learning Neural Networks: Perceptions-Adaptive Linear Neuron-Back propagation Multilayer Perceptron-Applications. 2003. J. Unsupervised Learning and other Neural Networks: Kohenen self-organizing Networks-Learning vector organization-Heibbian Learning-Hopfield-Network-Applications. Soft Computing Constituents and Conventional Artificial Intelligence.-Case Study: Implement various primitive Operations on Fuzzy Sets with Dynamic components and verify the laws associated with fuzzy set UNIT-IV Genetic Algorithms 9 Simple GA-Classification of Genetic Algorithm. Case Study: Implement Back propagation Networks for XOR function using Bipolar inputs and Binary Targets. UNIT-II Artificial neural networks 9 Basic Models and Terminologies of Artificial Neural Network. Fuzzy Logic. C. Case Study: Implement Genetic Algorithm concept for any one application.Mizutani. . Rajasekaran and G.Fuzzy-Genetic Hybrids-Genetic Algorithm based Back propagation Networks-Fuzzy Back propagation Networks-Simplified Fuzzy ARTMAPFuzzy Associative Memories-Fuzzy Logic controlled Genetic Algorithms-Applications. 2. UNIT-V Hybrid Systems 9 Integration of Neural Networks. Neuro-fuzzy systems: neuro-fuzzy modeling-neuro-fuzzycontrol.Learning from Reinforcement: Temporal Difference LearningArt of Dynamic Programming-Q-Learning-Applications. PHI. PHI.fuzzy clustering.T. 2004.Hybrid Systems.Advantages. S.introduction to: Biological and Artificial Neural Network-Fuzzy sets and Fuzzy logic systems-Genetic Algorithm.genetic algorithms in search and optimization.Pai.fuzzy reasoning.fuzzy inference systemsfuzzy control. UNIT-III Fuzzy Logic 9 Fuzzy systems and applications: fuzzy sets. Neuro-Fuzzy Hybrids Neuro-Genetic Hybrids .Biological Sequence Alignment and Drug Design.Jang. Total: 45 Text Books: 1.Auxiliary and Embedded Hybrid systems.R.V.Applications: Pattern Recognitions. “Neuro-Fuzzy and Soft Computing”.crossover and mutation. Pearson Education 2004.
.First Edition.Goldberg. Optimization and Machine Learning”.2007. Davis E. Addison Wesley. “Genetic Algorithms: Search. 1989.Deepa. McGraw-Hill.Ross. 1997. N.Wiley India(P) Ltd. S. Timothy J. .References: 1.S. “Fuzzy Logic with Engineering Applications”. 2.N.”Principles of Soft Computing”. 3.Sivanandam.Y.N.
UNIT IV SENSOR NETWORKS – INTRODUCTION 9 Unique constraints and challenges – Advantages of Sensor networks – Sensor network applications – Collaborative processing – Key Definitions of sensor networks – A tracking Scenario – problem formulation – inference of states – Tracking Multiple Objects – Sensor models – performance comparison and metrics.”Ad Hoc Mobile Wireless Systems”. UNIT V NETWORKING SENSORS AND INFRASTRUCTURE ESTABLISHMENT 9 Key Assumptions – Medium Access Control – General Issues – Geographic – Energy Aware Routing – Attribute Base Routing Topology Control – Clustering – Time Synchronization – Localization and Localization services – algorithms.Perkins. DSR. DSDV)-Multi-Cast routing protocol (ODMRP)-Multi clustering-Power Issues-ABR UNIT III TRANSPORT LAYER AND SECURITY ISSUES 9 TCP over Ad Hoc – Recent Issues – Recent Trends – Advanced Topics – Current Trends – Security.Proactive-Reactive and Hybrid routing protocol-Uni-Cast routing protocol (AODV.Prentice Hall.K. UNIT II ROUTING PROTOCOLS 9 Overview of routing methods.2001. C.”Wireless Sensor Networks – An Information Processing Approch”.ADHOC AND SENSOR NETWORKS L 3 UNIT I INTRODUCTION T P M 0 0 100 C 3 9 Model of Operation –Commercial Application-Technical and Market factors affecting Ad Hoc Networking. Text Books: 1.Leonidas Guibas.PTR.Toh. . REFERENCES: 1.Elseivier 2004.Addison-Wesley. feng Zhao.”ad Hoc Networking”.2002. 2. Charles E.
TOTAL : 45 Text Books: 1. Kamber. Lei Wang. “Data Mining: Concepts and Techniques”.DB Miner-WEKA.Auerbach Publications. 2006.Taylor and Francis Group.DATA WAREHOUSING AND DATA MINING L 3 UNIT I INTRODUCTION AND DATA WAREHOUSING T P M 0 0 100 8 C 3 Introduction-Data Warehouse-Multidimensional Data Model-Data Warehouse Architecture–Implementation-Further Development-Data Warehousing to Data Mining UNIT II DATA PREPROCESSING.Descriptive Statistical Measures. M. 2. Latifur Khan. CONCEPT DESCRIPTION 8 Preprocessing–Cleaning–Integration–Transformation-Reduction-Discretization & Concept Hierarchy Generation-Data Mining Primitives-Query Language-Graphical User Interfaces-Architectures-Concept Description-Data Generalization-CharacterizationsClass Comparisons. LANGUAGE.Awad. TOOLS AND APPLICATIONS 9 Multidimensional Analysis and Descriptive Mining of Complex Data Objects-Spatial Databases-Multimedia Databases-Time Series and Sequence Data-Text DatabasesWorld Wide Web-Data Mining for Intrusion detection-Web page surfing prediction-Image classification-Data mining tools. UNIT III ASSOCIATION RULES 8 Association Rule Mining-Single Dimensional Boolean Association Rules from Transactional Databases-Multi-Level Association Rules from Transaction Databases UNIT IV CLASSIFICATION AND CLUSTERING 12 Classification and Prediction-Issues-Decision Tree Induction-Bayesian ClassificationOther Classification Methods-Prediction-Classifier Accuracy-Cluster Analysis-Types of data-Categorization of methods.Partitioning methods-Hierarchical methods-Outlier Analysis. M. Bhavani.“Design and Implementation of Data Mining Tools”. UNIT V RECENT TRENDS.LLC . ARCHITECTURES. Han. Harcourt India / Morgan Kauffman. J.2009.
PHI 2006 2. “Building the Data Warehouse”.H. 3rd Edition. W.References: 1. Pearson Education 2003. David Hand. Dennis Murry. 2001. “Data Warehousing. “Data Mining: Introductory and Advanced Topics”. “Insight into DataMining:Theory and practice”.Dunham. 6. Wiley.Smith. Pearson Education 2004. 3. 4. V.P. Sam Anahory. 2003. K. PHI 2004. Stephen J. Padhraic Symth. “Principles of Data Mining”. Soman. Heikki Manila. Shyam Diwakar. “Data Warehousing in the real world”. Data Mining & OLAP”. Alex Bezon. 5. . McGraw-Hill Edition. Margaret H.Inmon. Ajay.
UNIT II 9 OPEN SYSTEM STANDARDS FOR CLIENT/SERVER COMPUTING: Understanding Client / Server computing – Dispelling the Myths – Obstacles – Upfront and Hidden – Standards setting organizations.Review of host & Non-distributed computing.CLIENT SERVER COMPUTING L 3 UNIT I INTRODUCTION T P M 0 0 100 9 C 3 The Business opportunity – Driving forces – Major issues in information Technology – Right sizing . TWO – TIER COMPUTING: Introduction client Tier – Hardware and Software requirements operating system services – Types of Client – Server Tier – Types of Server-Eight layers of Software. Basis of client / server computing – Componants. Total: 45 TEXT BOOKS 1. . UNIT IV 9 MULTI – TIER COMPUTING: Overview – Benefits – Disadvantages – Components – Tier separations and interaction THIN CLIENT COMPUTING: Introduction to computing models . Case Studies – Account and Financial system. “Client/Server Computing”. Sales automation and courseware system. Basis of Distributed computing – Decomposition approaches Layers vs Tiers. UNIT V 9 FRONT END TOOLS: Overview – The Client components – Essential features of a front end tools.Comparison – Components – environments. “Client/Server Computing”.Factors for success. New Delhi.Client side. server side and middleware side – Hardware and Software requirements – Transaction servers – TP lite Vs TP Heavy. 2003. MIDDLEWARE: Hardware and Software requirements – Netware connectivity – Types of Middleware – Data Base middleware – Standards. Client / server computing – Approaches – Applications development – Cost – implementation. Patrick Smith and Steve Guengesich. Tata McGraw-Hill Publishing Company Limited. Dawana Travis Dewire. 2002. Prentice Hall of India. New Delhi. UNIT III 9 THREE-TIER COMPUTING: Introduction and comparison of two and three tier. 2.
“3 tier Client/server at Work”. Galgotia Publications. “Building N-tier Applications with COM and VB 6. New Delhi. Mc Graw Hill inc.2001. 2001. 1997.REFERENCES: 1. 2. Dan Harkey and Jeri Edwards. 1999. Ashhofaiol Tomy Martin. 1999. USA. 1996. New Delhi.0”. Travis Derive D. Wiley Computer Publishing. USA. 5. “Understanding Thin Client/Server Computing”. 1995. “Second-generation Client/Server Computing” McGraw Hill. New Delhi. USA. Karen Watterson. . Jein Edwards. “Essential Client/Server Survival Guide”. Singapore. “Client/Server System Design and implementation”. Joel P Kaster. Wiley Computer Publishing. 3. Prentice Hall of India. 4. 7. 6. Larry J Vaughn. Robert Orfali. “Client/Server Technology for “Managers “ Addition-Wesley.
UNIT V EVALUATION TECHNIQUES 9 Reliability Evaluation Techniques-Obtaining Parameter Values-Reliability Models for Hardware Redundancy-Software Error models.1997.Krishna. UNIT IV COMMUNICATION 9 Real-Time Communication-Communications Media-Network Topologies Protocols-Fault Tolerant Routing –Fault Tolerance Techniques-Fault Types-Fault Detection-Fault Error containment Redundancy-data Diversity-Reversal Checks-Integrated Failure handling.Pearson Education.”Real-Time Systems”.Kang G Shin. UNIT III REAL TIME DATABASE 9 Real time Database-Basic Definition-Real Time Vs General Purpose Databases-Main Memory Databases-Transaction priorities-Transaction Aborts-Concurrency Control Issues-Disk Scheduling Algorithms-Two-phase Approach to improve PredictabilityMaintaining Serialization Consistency –Data-bases for Hard Real Time Systems. C.McGraw-Hill International Editions.1998. Stuart Bennett.”Real Time Computer Control –An Introduction”.REAL TIME SYTEMS L 3 UNIT I INTRODUCTION T P M 0 0 100 9 C 3 Introduction-Issues in Real Time Computing-Structure of a Real Time System-Task Classes-Performance Measures for Real Time Systems-Estimating Program Run Times-Task Assignment and Scheduling-Classical Uniprocessor scheduling algorithmsUniprocessor scheduling of IRIS Tasks-Task Assignment-Mode Changes-Fault Tolerant Scheduling.M. . 2. UNIT II PROGRAMMING LANGUAGES AND TOOLS 9 Programming Languages and Tools-Desired Language Characteristic-Data TypingControl Structures-Facilitating Hierarchical Decomposition-Packages-Run time (Exception) Error Handling-Overloading and Generics Multitasking –Low Level Programming-Task scheduling-Timing Specifications-Programming Environments-Runtime Support. Clock Synchronization-Clock-A No-faultTolerant Synchronization Algorithm-Impact of Faults-Fault Tolerant Synchronization in Hardware-Fault Tolerant Synchronization in Software Total: 45 TEXT BOOKS 1.
D. 3.First Edition.1998.Pearson Education. Peter D.A Buhur. R.bailey .McGraw Hill.Real Time Micro Computer System Design-An Introduction”.1999. Philip A.Prentice Hall.Laplante” Real-Time System Design Analysis”Third Edition.Macmillan.Pearson Education. S. R.2004.Lawrence.” Real-Time Systems”.REFERENCES: 1.”Inroduction To Real Time Software Design”. Lics.L.Zobel.T.2000 .N. 2.”An Introduction To Real-Time System”.Allworth. 4.J.1987. 5.Second Edition.
Customer retention . Oakland. South-Western (Thomson Learning). TQM TOOLS & TECHNIQUES I 9 The seven traditional tools of quality – New management tools – Six-sigma: Concepts. J. “Total Quality Management”. Unit – IV TQM TOOLS & TECHNIQUES II 9 Quality circles – Quality Function Deployment (QFD) – Taguchi quality loss function – TPM – Concepts. 2. Kaizen . Prentice Hall (India) Pvt.Basic concepts of TQM . Bench marking process – FMEA – Stages. improvement needs – Cost of Quality – Performance measures.Definition of TQM – TQM Framework . Pearson Education Asia. (6th Edition). R.S. Documentation.L and Anand Samuel.Supplier partnership – Partnering. Unit – V QUALITY SYSTEMS 9 Need for ISO 9000.TOTAL QUALITY MANAGEMENT L 3 Unit – I. 2. Ltd. Lindsay. TQM PRINCIPLES 9 Leadership – Strategic quality planning. REFERENCE BOOKS 1. Recognition and Reward. “Total Quality Management – Text and Cases”. (2006) . Unit – II. Empowerment.Definition of quality . INTRODUCTION T P M 0 0 100 9 C 3 Introduction . Quality auditing. Dale H. Janakiraman. 2005.QS 9000 – ISO 14000 – Concepts. Evans and William M. Types.. Customer satisfaction. Third Edition. methodology.Customer focus – Customer orientation. “Total Quality Management”. applications to manufacturing. (2006) 3.Continuous process improvement – PDSA cycle.Contributions of Deming. Suganthi. Supplier Rating. Juran and Crosby – Barriers to TQM.Besterfiled. Unit – III.Need for quality . Quality statements .Evolution of quality .Employee involvement – Motivation. et at. “TQM – Text with Cases”. Ltd. James R. 5s. Butterworth – Heinemann Ltd. Third Edition (2003).B and Gopal. Requirements and Benefits – Case studies of TQM implementation in manufacturing and service sectors including IT. Performance appraisal .Dimensions of manufacturing and service quality .K. Team and Teamwork. Customer complaints.ISO 9000-2000 Quality System – Elements. Oxford. Prentice Hall (India) Pvt. Supplier selection. Total : 45 TEXT BOOKS 1.. Indian Reprint (2006). “The Management and Control of Quality”. service sector including IT – Bench marking – Reason to bench mark.
Haar.K. Thompson Learniy (1999). Slant – Karhunen – Loeve transforms. Jain. MPEG. 2. UNIT V IMAGE SEGMENTATION AND REPRESENTATION 9 Edge detection –Thresholding . UNIT IV IMAGE COMPRESSION 9 Lossless compression: Variable length coding – LZW coding – Bit plane codingpredictive coding-DPCM.DIGITAL IMAGE PROCESSING L 3 UNIT I DIGITAL IMAGE FUNDAMENTALS AND TRANSFORMS T P M 0 0 100 9 C 3 Elements of visual perception – Image sampling and quantization Basic relationship between pixels – Basic geometric transformations-Introduction to Fourier Transform and DFT – Properties of 2D Fourier Transform – FFT – Separable Image Transforms -Walsh – Hadamard – Discrete Cosine Transform.Regional descriptors –Simple descriptors. Digital Image Processing John Willey (2001) REFERENCES 1. Richard E Woods 2nd Edition. William K Pratt. Vaclav hlavac. 2. Prentice Hall of India.Region Based segmentation – Boundary representation: chair codes. New Delhi (1995)-Fundamentals of Digital Image Processing. A. Roger Boyle. Rafael C Gonzalez.Polygonal approximation –Boundary segments –boundary descriptors: Simple descriptors-Fourier descriptors . Image Processing Analysis and Machine Vision – Millman Sonka. Broos/colic. Digital Image Processing Pearson Education 2003. PHI. 3.Basics of Vector quantization.Texture TOTAL : 45 TEXT BOOKS 1. sharpening filters – Laplacian filters – Frequency domain filters : Smoothing – Sharpening filters – Homomorphic filtering. UNIT III IMAGE RESTORATION: 9 Model of Image Degradation/restoration process – Noise models – Inverse filtering Least mean square filtering – Constrained least mean square filtering – Blind image restoration – Pseudo inverse – Singular value decomposition. Lossy Compression: Transform coding – Wavelet coding – Basics of Image compression standards: JPEG. Chanda Dutta Magundar – Digital Image Processing and Applications. 2000 . UNIT II IMAGE ENHANCEMENT TECHNIQUES 9 Spatial Domain methods: Basic grey level transformation – Histogram equalization – Image subtraction – Image averaging –Spatial filtering: Smoothing.
Lexical semantics: relational among lexemes and their senses – WordNet: A database of lexical relations – The Internal structure of words – Creativity and the lexicon. Machine Translation: Language similarities and differences – The transfer . Lexicalized and Probabilistic Parsing: Probabilistic context-free grammar – problems with PCFGs – Probabilistic lexicalized CFGs – Dependency Grammars – Human parsing. Semantic Analysis: Syntax-Driven semantic analysis – Attachments for a fragment of English – Integrating semantic analysis into the early parser – Idioms and compositionality – Robust semantic analysis. UNIT IV SEMANTIC 10 Representing Meaning: Computational desiderata for representations – Meaning structure of language – First order predicate calculus – Some linguistically relevant concepts – Related representational approaches – Alternative approaches to meaning. Natural Language Generation: Introduction to language generation – Architecture for generation – Surface realization – Discourse planning – Other issues. Context-Free Grammars for English: Constituency – Context-Free rules and trees – Sentence-level constructions – The noun phrase – Coordination – Agreement – The verb phase and sub categorization – Auxiliaries – Spoken language syntax – Grammars equivalence and normal form – Finite-State and Context-Free grammars – Grammars and human processing. UNIT III ADVANCED FEATURES AND SYNTAX 11 Features and Unification: Feature structures – Unification of feature structures – Features structures in the grammar – Implementing unification – Parsing with unification constraints – Types and Inheritance. Parsing with Context-Free Grammars: Parsing as search – A Basic TopDown parser – Problems with the basic Top-Down parser – The early algorithm – FiniteState parsing methods.NATURAL LANGUAGE PROCESSING L 3 UNIT I INTRODUCTION T P M 0 0 100 6 C 3 Introduction: Knowledge in speech and language processing – Ambiguity – Models and Algorithms – Language. Morphology and Finite-State Transducers: Survey of English morphology – Finite-State Morphological parsing – Combining FST lexicon and rules – Lexicon-Free FSTs: The porter stammer – Human morphological processing UNIT II SYNTAX 10 Word classes and part-of-speech tagging: English word classes – Tagsets for English – Part-of-speech tagging – Rule-based part-of-speech tagging – Stochastic part-ofspeech tagging – Transformation-based tagging – Other issues. Regular Expressions and automata: Regular expressions – Finite-State automata. Thought and Understanding. UNIT V APPLICATIONS 8 Word Sense Disambiguation and Information Retrieval: Selectional restriction-based disambiguation – Robust word sense disambiguation – Information retrieval – other information retrieval tasks.
Pearson Education. Pearson Education (Singapore) Pte. 2002.metaphor – The interlingua idea: Using meaning – Direct translation – Using statistical techniques – Usability and system development. “ Speech and Language Processing”. 2003. 2. Ltd. Daniel Jurafsky & James H. TOTAL : 45 TEXT BOOKS 1.. .Martin. James Allen. “Natural Language Understanding”.
key variables. Prentice Hall. Jerry Banks and John S. Geoffrey Gordon. SIMULATION LANGUAGES 8 Comparison and selection of simulation languages. Inventory systems.E. 1975. Production systems. general systems theory. REFERENCES 1.Carson. CASE STUDIES 10 Development of simulation models using simulation language studied for systems like queuing systems.Nicol. Simulation using GPSS. 3. Systems simulation. The art and science. India. experimental design consideration. Barry L. 2. Prentice Hall. Unit IV. Schriber. run size. India. “Discrete Event System Simulation”. output analysis and interpretation validation. 2002. Unit V. Unit III. testing of random numbers.SYSTEM MODELING AND SIMULATION L 3 Unit I. Nelson. 1991. Simulation as a decision making tool. methods of generating random variables. discrete and continuous distributions. Concept of simulation. Prentice Hall. modeling. time flow mechanism. Narsingh Deo. INTRODUCTION T P M 0 0 100 C 3 8 Systems. R. “System Simulation”. . data collection and reduction. David M. study of anyone simulation language. India. 2. “System Simulation with Digital Computer. DESIGN OF SIMULATION EXPERIMENTS 10 Problem formulation. starting condition. logic flow chart. 2001. maintenance and replacement systems and Investment analysis. John Wiley. 3rd Edition. TOTAL : 45 TEXT BOOKS 1. Shannon. “Prentice Hall. Unit II. 2002. Thomas J. 2nd Edition. RANDOM NUMBERS 9 Pseudo random numbers. types of simulation.
2003. Gillies. “Software Quality”. 3. Pearson Education (Singapore) Pte Ltd. Thomson Learning.SOFTWARE QUALITY MANAGEMENT L 3 UNIT I INTRODUCTION TO SOFTWARE QUALITY T P M 0 0 100 9 C 3 Software Quality – Hierarchical models of Boehm and McCall – Quality measurement – Metrics measurement and analysis – Gilb’s approach – GQM Model UNIT II SOFTWARE QUALITY ASSURANCE 9 Quality tasks – SQA plan – Teams – Characteristics – Implementation – Documentation – Reviews and Audits UNIT III QUALITY CONTROL AND RELIABILITY 9 Tools for Quality – Ishikawa’s basic tools – CASE tools – Defect prevention and removal – Reliability models – Rayleigh model – Reliability growth models for quality assessment UNIT IV QUALITY MANAGEMENT SYSTEM 9 Elements of QMS – Rayleigh model framework – Reliability Growth models for QMS – Complexity metrics and models – Customer satisfaction analysis. 2003 2. ISO 9000-3 “Notes for the application of the ISO 9001 Standard to software development”. “Software Metrics” Thomson. Norman E. UV : Ch 7-8) 2. Fenton and Shari Lawrence Pfleeger. . 2003. Stephen H. 2003. Mordechai Ben – Menachem and Garry S. 4. Mike Konrad and Sandy Shrum. (UI : Ch 3-4.Marliss. 2002. “Metrics and Models in Software Quality Engineering”.. “CMMI”. “Software Quality: Theory and Management”. Thomson Asia Pte Ltd. (UI : Ch 1-4 . UIV : Ch 9-11) REFERENCES 1. UIII : Ch 5-8 . TOTAL : 45 TEXT BOOKS 1. UNIT V QUALITY STANDARDS 9 Need for standards – ISO 9000 Series – ISO 9000-3 for software development – CMM and CMMI – Six Sigma concepts. Pearson Education (Singapore) Pte Ltd. Mary Beth Chrissis. Kan. Allan C.
11. 4th edition.Queuing Models – Single Server Queues UNIT II CONGESTION AND TRAFFIC MANAGEMENT 10 Effects of Congestion – Congestion Control – Traffic Management – Congestion Control in Packet Switching Networks – Frame Relay Congestion Control . Fourth Edition. Fibre Channel – Wireless LAN’s: applications. requirements – Architecture of 802. End-to-end Congestion Control for High Speed Networks Based on Population Ecology Models TOTAL: 45 TEXT BOOKS: 1.Differentiated Services . ABR Capacity allocations – GFR traffic management. RM cell formats. “Data Communications and Networking”. 2. GPS. PS.Review of OSI/ISO model . 2005. Pearson Education. Forouzan. Traffic Control – ABR traffic Management – ABR rate control. Tata McGraw-Hill. Adaptive Quality of Service Based Power Management Algorithm in Wireless Transmission. ATM logical Connection. Peer to peer Networks . Traffic and Congestion control in ATM – Requirements – Attributes – Traffic Management Frame work. BRFQ. High Speed LAN’s: Fast Ethernet.Queuing Discipline. . UNIT IV PROTOCOLS FOR QOS SUPPORT 8 Integrated Services . Behrouz A. 2005. FQ.TCP/IP.RTSP UNIT V RECENT TRENDS IN HIGH SPEED NETWORKS 8 Enabling Differentiated Services Using Generalized Power Control Model in Optical Networks. ATM Cell – ATM Service Categories – AAL.HIGH SPEED NETWORKS L 3 UNIT I HIGH SPEED NETWORKS T P M 0 0 100 8 C 3 Introduction to Computer Networks . New Worm Exploiting IPV6 and IPV4-IPV6 Dual stack Networks. .Frame Relay Networks – Asynchronous transfer mode – ATM Protocol Architecture. “HIGH SPEED NETWORKS AND INTERNET”. WFQ UNIT III TCP AND ATM CONGESTION CONTROL 11 TCP Flow control – TCP Congestion Control – Retransmission – Timer Management – Exponential RTO backoff – KARN’s Algorithm – Window management – Performance of TCP over ATM.RSVP – MPLS – RTP – RTCP. Gigabit Ethernet. Queuing Analysis. William Stallings. Methodologies and Tools for Exploring Transport Protocols in the Context of Highspeed Networks.
Methodologies and Tools for Exploring Transport Protocols in the Context of High-speed Networks Eighth IEEE International Symposium on Cluster Computing and the Grid 2008 .. 2. September 2009 3. 2001. Sept 2009 4. Enabling Differentiated Services Using Generalized Power Control Model in Optical Networks IEEE transactions on communications Vol 57. A New Worm Exploiting IPV6 and IPV4-IPV6 Dual stack Networks: Experiment.REFERENCES: 1. II Edition. Warland & Pravin Varaiya. Simulation and Defense: IEEE networks September/October 2009 5. Jean Harcourt Asia Pvt. Modeling. Ltd. “HIGH PERFORMANCE COMMUNICATION NETWORKS”. No 9. No 3. An adaptive Quality of Service Based Power Management Algorithm in Wireless Transmission IJCA Vol 16.
Delegates. Wrox Press.C # AND . J. Versioning. Enumerations. 2nd ed. Remoting. Thamarai Selvi.NET FRAMEWORK 12 Assemblies. Marshaling. Variables. 2004. Polymorphism. Literals. Reflection. Threads. Accessing Data with ADO. “Programming in C#”. Operator Overloading. IV. 3. UNIT III APPLICATION DEVELOPMENT ON . R. Liberty. E. Viewing MetaData. Balagurusamy. (Unit III. V) REFERENCES 1. 2002. 2002. UNIT IV WEB BASED APPLICATION DEVELOPMENT ON . II) 2. Herbert Schildt. Building a Server. Looping. 2. Interfaces.NET 8 Programming Web Applications with Web Forms. “The Complete Reference: C#”.NET 8 Building Windows Applications. Type Discovery. 2003. “C# and the . Methods. 4. Tata McGraw-Hill. O’Reilly. Reflecting on a Type. Using SingleCall. TOTAL : 45 TEXT BOOKS 1. A! Press. Pearson Education. Objects. Arrays. “Programming C#”. Structures. Overview of C#.NET. 2004. Building the Client. Events. Errors and Exceptions. Inheritance. Specifying a Server with an Interface.NET. Understanding . .NET FRAMEWORK L 3 UNIT I INTRODUCTION TO C# T P M 0 0 100 8 C 3 Introducing C#. “Professional C#”. 2nd ed. UNIT II OBJECT ORIENTED ASPECTS OF C# 9 Classes. Expressions. Robinson et al. Operators. Understanding Server Object Types. Programming Web Services. Data Types.NET Platform”. Tata McGraw-Hill. (Unit I. Branching.. Andrew Troelsen. UNIT V THE CLR AND THE . Strings. Attributes. “A Textbook on C#”.. Murugesan. 2003.
write. 1999. (Unit . read. (Units – I.E.) (Chapter – 1-10. II. “SNMP. UNIT V SIMPLE NETWORK MANAGEMENT 9 SNMP network management concepts – SNMP management information – standard MIB’s – SNMPv1 protocol and Practical issues – introduction to RMON. connect. second Edition. Richard Stevens. SNMPv3 and RMON 1 and 2”. . Server Crashes and reboots. 1998. accept. William Stallings. (BSD Sockets Version). listen. close functions – Iterative Server – Concurrent Server. TOTAL : 45 HRS TEXT BOOKS 1. Addison Wesley. SNMPv2. ELEMENTRY UDP SOCKETS 9 Socket options – getsocket and setsocket functions – generic socket options – IP socket options – ICMP socket options – TCP socket options – Elementary UDP sockets – UDP echo Server – UDP echo Client – Multiplexing TCP and UDP sockets – Domain name system – gethostbyname function – Ipv6 support in DNS – gethostbyadr function – getservbyname and getservbyport functions. 25) 2.V) (Chapter – 4-7) REFERENCES 1. 23. bind. Server Shutdown – I/O multiplexing – I/O Models – select function – shutdown function – TCP echo Server (with multiplexing) – poll function – TCP echo Client (with Multiplexing) UNIT III SOCKET OPTIONS. Server host Crashes.UNIT I NETWORK PROGRAMMING AND MANAGEMENT L T P M 3 0 0 100 ELEMENTARY TCP SOCKETS 9 C 3 Introduction to Socket Programming – Overview of TCP/IP Protocols –Introduction to Sockets – Socket address Structures – Byte ordering functions – address conversion functions – Elementary TCP Sockets – socket. UNIT IV ADVANCED SOCKETS 9 Ipv4 and Ipv6 interoperability – threaded servers – thread creation and termination – TCP echo server using threads – Mutexes – condition variables – raw sockets – raw socket creation – raw socket output – raw socket input – ping program – trace route program. “UNIX NETWORK PROGRAMMING Vol-I” Second Edition. Comer. SNMPv2 and SNMPv3. “Intrenetworking with TCP/IP Vol. Third Edition.III”. D. PHI / Pearson Education. 2003. W. PHI. III & IV. UNIT II APPLICATION DEVELOPMENT 9 TCP Echo Server – TCP Echo Client – Posix Signal handling – Server with multiple clients – boundary conditions: Server process Crashes.
Consultants and Users. JD Edwards. Benefits of ERP. Ellen F Monk. Contracts with Vendors. “Concepts in Enterprise Resource Planning”. Organizing the Implementation. SSA UNIT V ERP – PRESENT AND FUTURE 9 Turbo Charge the ERP System. REFERENCES 1. ERP and Related Technologies. USA. Human Resources. Implementation Methodology. Enterprise – An Overview. EIA. Thompson Course Technology. PHI. ERP and Internet. Vinod Kumar Garg and Venkitakrishnan N K. ERP and e-Commerce. Baan. QAD. 2001. Data Warehousing. OLAP. Future Directions TOTAL : 45 TEXT BOOKS 1. Plant Maintenance. SCM UNIT II ERP IMPLEMENTATION 9 ERP Implementation Lifecycle. Data Mining. Consultants and Employees. Materials Management. Oracle. 2000 2. 2003 . Joseph A Brady. Manufacturing. “Enterprise Resource Planning – Concepts and Practice”. Tata McGraw Hill. “ERP Demystified”. Sales and Distribution UNIT IV THE ERP MARKET 9 ERP Market Place. Vendors.ENTERPRISE RESOURCE PLANNING L 3 UNIT I INTRODUCTION T P M 0 0 100 9 C 3 ERP: An Overview. Bret Wagner. New Delhi. Alexis Leon. Project Management and Monitoring UNIT III THE BUSINESS MODULES 9 Business modules in an ERP Package. PeopleSoft. SAP AG. New Delhi. Business Process Reengineering (BPR). Hidden Costs. Finance. Quality Management.
The Security SDLC UNIT II SECURITY INVESTIGATION 9 Need for Security. Scanning and Analysis Tools. Information Security Policy. Securing the Components. Access Control Devices. Joel Scrambray. What is Information Security?. Cryptography. Attacks. Threats. ISO 17799/BS 7799. 2002. “Hacking Exposed”. Tipton. Pearson/PHI. Stuart Mc Clure. NIST Models. Micki Krause. New Delhi. Design of Security Architecture. Business Needs. Balancing Security and Access. Harold F. Critical Characteristics of Information. The SDLC. Physical Security. Standards and Practices. Ethical and Professional Issues UNIT III SECURITY ANALYSIS 9 Risk Management: Identifying and Assessing Risk. Tata McGrawHill. Vikas Publishing House. VISA International Security Model. Components of an Information System. Matt Bishop. “ Computer Security Art and Science”.INFORMATION SECURITY L 3 NIT 1 INTRODUCTION T P M 0 0 100 9 C 3 History. Planning for Continuity UNIT V PHYSICAL DESIGN 9 Security Technology. Security and Personnel TOTAL : 45 TEXT BOOKS 1. “Principles of Information Security”. 2003 2. “ Handbook of Information Security Management”. Michael E Whitman and Herbert J Mattord. 2003 2. Legal. . NSTISSC Security Model. Vol 1-3 CRC Press LLC. Assessing and Controlling Risk UNIT IV LOGICAL DESIGN 9 Blueprint for Security. 2004. George Kurtz. IDS. REFERENCES 1.
cloud computing for community. controlling it with web based desktops. Michael Miller. benefits. Applications and Data Centers in the Cloud with SLAs. collaborating on project management. 2. L 3 . exploring on line photo editing applications. and databases. presenting on road. Cloud Computing: Web-Based Applications That Change the Way You Work and Collaborate Online. Evaluating instant messaging. Haley Beard. Evaluating on line groupware. collaborating on group projects and events. mapping schedulesm managing projects. cloud computing for corporation. collaborating on schedules. TOTAL : 45 TEXT BOOK 1. “ Cloud Computing”. exploring on line scheduling and planning. UNIT – II CLOUD COMPUTING FOR EVERYONE 9 Centralizing email communications. Pearson Education. developing cloud computing services. Cloud Computing Best Practices for Managing and Measuring Processes for On-demand Computing. Evaluating web conference tools. Que Publishing.. collaborating via blogs and wikis UNIT – V STORING AND SHARING 9 Understanding cloud storage. UNIT – III USING CLOUD SERVICES 9 Collaborating on calendars. collaborating on word processing.CLOUD COMPUTING T P M C 0 0 100 3 UNIT – I INTRODUCTION 9 Cloud Computing Introduction. collaborating on event management. Schedules and task management. July 2008. evaluating on line file storage. Discovering Cloud Services Development Services and Tools – Amazon Ec2 – Google App Engine – IBM Clouds UNIT – IV OUTSIDE THE CLOUD 9 Evaluating web mail services. Emereo Pty Limited. Collaboration to cloud. spreadsheets. Cloud service development. 2009 REFERENCES 1. discovering cloud services. August 2008. Working of cloud computing. exploring on line book marking services. collaborating on contact management. Michael Miller. From. exploring photo sharing communities. pros and cons. New Delhi. creating groups on social networks.
2. UNIT V EVALUATION TECHNIQUES 9 Reliability Evaluation Techniques-Obtaining Parameter Values-Reliability Models for Hardware Redundancy-Software Error models. UNIT IV COMMUNICATION 9 Real-Time Communication-Communications Media-Network Topologies Protocols-Fault Tolerant Routing –Fault Tolerance Techniques-Fault Types-Fault Detection-Fault Error containment Redundancy-data Diversity-Reversal Checks-Integrated Failure handling. UNIT III REAL TIME DATABASE 9 Real time Database-Basic Definition-Real Time Vs General Purpose Databases-Main Memory Databases-Transaction priorities-Transaction Aborts-Concurrency Control Issues-Disk Scheduling Algorithms-Two-phase Approach to improve PredictabilityMaintaining Serialization Consistency –Data-bases for Hard Real Time Systems.1998.Kang G Shin. .M.”Real Time Computer Control –An Introduction”.1997.McGraw-Hill International Editions. Stuart Bennett.Pearson Education.”Real-Time Systems”. C.REAL TIME SYTEMS L T P M 3 0 0 100 UNIT I INTRODUCTION 9 C 3 Introduction-Issues in Real Time Computing-Structure of a Real Time System-Task Classes-Performance Measures for Real Time Systems-Estimating Program Run Times-Task Assignment and Scheduling-Classical Uniprocessor scheduling algorithmsUniprocessor scheduling of IRIS Tasks-Task Assignment-Mode Changes-Fault Tolerant Scheduling.Krishna. UNIT II PROGRAMMING LANGUAGES AND TOOLS 9 Programming Languages and Tools-Desired Language Characteristic-Data TypingControl Structures-Facilitating Hierarchical Decomposition-Packages-Run time (Exception) Error Handling-Overloading and Generics Multitasking –Low Level Programming-Task scheduling-Timing Specifications-Programming Environments-Runtime Support. Clock Synchronization-Clock-A No-faultTolerant Synchronization Algorithm-Impact of Faults-Fault Tolerant Synchronization in Hardware-Fault Tolerant Synchronization in Software Total: 45 TEXT BOOKS 1.
Macmillan.First Edition.2000 .J.Laplante” Real-Time System Design Analysis”Third Edition. D. S.” Real-Time Systems”. 5.1998. R.Prentice Hall.N.L. 3. R.A Buhur. 2.Zobel.Real Time Micro Computer System Design-An Introduction”.Pearson Education. 4.”Inroduction To Real Time Software Design”. Peter D.1987.T.2004.REFERENCES: 1.Pearson Education.bailey . Philip A.Allworth.McGraw Hill.1999.Lawrence.”An Introduction To Real-Time System”.Second Edition. Lics.
Ontology Learning for Semantic Web 10 Taxonomy for Ontology Learning – Layered Approach – Phases of Ontology Learning – Importing and Processing Ontologies and Documents – Ontology Learning Algorithms Evaluation Unit V.Schema – Web Resource Description using RDFRDF Properties – Topic Maps and RDF – Overview – Syntax Structure – Semantics – Pragmatics . TOTAL = 45 TEXT BOOKS 1.DAML + OIL. Evolution – Development of Tools and Tool Suites – Ontology Merge Tools – Ontology based Annotation Tools. 2004 2. Mariano Fernandez-Lopez. Ontology Management and Tools 9 Overview – need for management – development process – target ontology – ontology mapping – skills management system – ontological class – constraints – issues. “A Semantic Web Primer (Cooperative Information Systems)”. Oscar Corcho. Grigoris Antoniou.Case Study for specific domain – Security issues – current trends. Unit V.Knowledge Representation Ontologies – Top Level Ontologies – Linguistic Ontologies – Domain Ontologies – Semantic Web – Need – Foundation – Layers – Architecture. 2004 . Asuncion Gomez-Perez.OWL Unit III.OKBC – OCML . Applications: 7 Web Services – Semantic Web Services .SEMANTIC WEB L T P M 3 0 0 100 Unit I. The MIT Press. eCommerce and the Semantic Web” Springer. Unit II. Languages for Semantic Web and Ontologies: 10 Web Documents in XML – RDF .Flogic Ontology Markup Languages – SHOE – OIL . Frank van Harmelen. “Ontological Engineering: with examples from the areas of Knowledge Management.Traditional Ontology Languages – LOOM. Introduction 9 C 3 Components – Types – Ontological Commitments – Ontological Categories – Philosophical Background .
Smith. The MIT Press.. and Knowledge Management”. Daconta. Frank Van Harmelen. 2002 4. Springer.REFERENCES: 1. 2002 2. Leo J. John Wiley & Sons Ltd. Dieter Fensel (Editor). Steffen Staab (Editor). “Spinning the Semantic Web: Bringing the World Wide Web to Its Full Potential”. Obrst. Alexander Maedche. “The Semantic Web: A Guide to the Future of XML. Web Services. “Handbook on Ontologies (International Handbooks on Information Systems)”. James Hendler. 2003 5. Michael C. Henry Lieberman. Springer 1st edition. 2004 . Rudi Studer. Wolfgang Wahlster. Wiley. John Davies. 2003 3. Kevin T. 1 edition. Dieter Fensel. “Towards the Semantic Web: Ontology – Driven Knowledge Management”. “Ontology Learning for the Semantic Web”.
Sunil Mathew. “FastSOA”. 2003. Elsevier. Frank Cohen.NET and J2EE Interoperability – Service-Enabling Legacy Systems – Enterprise Service Bus Pattern Unit III 9 Multi-Channel Access – Business Benefits – SOA for Multi Channel Access – Tiers – Business Process Management – Concepts – BPM. Pearson Education. James Webber. “Developing Enterprise Web Services”. Eric Newcomer. Thomas Erl. 2005 2. Greg Lomow.. “Service Oriented Architecture”. Sameer Tyagi. 2004. “Understanding SOA with Web Services”. Michael E Stevens. Pearson Education. . 2007. (Unit 4) REFERENCES: 1. “The Definitive Guide to SOA”. Elsevier. 2005 2. Apress.SERVICE ORIENTED ARCHITECTURE L 3 Unit I T P M 0 0 100 9 C 3 Introduction – Service Oriented Enterprise – Service Oriented Architecture (SOA) – SOA and Web Services – Multi-Channel Access – Business Process management – Extended Web Services Specifications – Overview of SOA – Concepts – Key Service Characteristics – Technical Benefits – Business Benefits Unit II 9 SOA and Web Services – Web Services Platform – Service Contracts – Service-Level Data Model – Service Discovery – Service-Level Security – Service-Level Interaction patterns – Atomic Services and Composite Services – Proxies and Skeletons – Communication – Integration Overview – XML and Web Services . 2007. Jeff Davies. 3. James McGovern. Sandeep Chatterjee. Pearson Education. “Java Web Services Architecture”. SOA and Web Services – WSBPEL – Web Services Composition Unit IV Java Web Services – JAX APIs – JAXP – JAX-RPC – JAXM – JAXR – JAXB Unit V 9 9 Metadata Management – Web Services Security – Advanced Messaging – Transaction Management TOTAL : 45 TEXT BOOKS 1. 4.
This action might not be possible to undo. Are you sure you want to continue?