You are on page 1of 27

Programme:108 - B Tech (Information Technology

Semester VII Course Code 308210 Course Title L 4 Contact hours P/T 2 Total 6 Evaluation weightage Cr TWA MST ESE 10 15 15 70 ESE (Theory) Hours 3

308220 308230 308240


Computer Simulation and Modeling Mobile Computing Image Processing Management Information Systems Elective-I

4 4 4

2 2 2

6 6 6

10 10 10

15 15 15

15 15 15

70 70 70

3 3 3

4 20

2 10

6 30

10 50

15 --

15 --

70 --

3 --


Elective I
Course Code 408010 408020 408030 408040 408050 408060 Course Title L 4 4 4 4 4 4 Contact hours P/T 2 2 2 2 2 2 Total 6 6 6 6 6 6 Cr 10 10 10 10 10 10 Evaluation weightage TWA MST ESE 15 15 70 15 15 15 15 15 15 15 15 15 15 70 70 70 70 70 ESE (Theory) Hours 3 3 3 3 3 3

Programming with components Pattern Recognition Speech Reorganization Embedded Systems Advanced Database System Advanced Computer Networks

Semester VIII Course Code 308250 Course Title L 4 Contact hours P/T 2 Total 6 Cr 10 Evaluation weightage TWA MST ESE 15 15 70 ESE (Theory) Hours 3

308260 308270 -

Data Warehousing and Mining. Multimedia Systems Project management Elective-II

4 4 4 16

2 2 2 8

6 6 6 24

10 10 10 40

15 15 15

15 15 15

70 70 70

3 3 3


B.Tech. (Information Technology) Sem. VII & VIII / 07-08


Elective II
Course Code 408110 408120 408130 Course Title L 4 4 4 Contact hours P/T 2 2 2 Total 6 6 6 Cr 10 10 10 Evaluation weightage TWA MST ESE 15 15 70 15 15 70 15 15 70 ESE (Theory) Hours 3 3 3


408150 408160

Robotics Computer Vision Geographical Information System Neural Networks and Fuzzy Systems Software Testing Information Security









4 4

2 2

6 6

10 10

15 15

15 15

70 70

3 3

Project: Sr. Course No. Code 1 408900 Course Title L P T Cr TW MS ESE ESE A T (Theory) Hrs 8 See note below


The project is evaluated in two stages. The first stage evaluation shall be done at the end of pre-final semester by a Committee of Institute faculty (at least two faculty members including project guide). The Project Guide along with an external examiner shall do the second stage evaluation at the end of final semester. The first stage assessment shall have 25% weightage. Another 25% weightage shall be given for the initiative, interest, effort and sincerity shown by the student during the entire project work. The second stage assessment shall have 50% weightage. The first stage evaluation is to be carried out after a minimum of 12 weeks of work. The project report should be submitted in the prescribed format at least three weeks prior to the end of final semester or by the prescribed date and second stage assessment can be done in the last week of semester. The project shall carry 08 credits. The grade for the project shall be declared only after second stage evaluation.

B.Tech. (Information Technology) Sem. VII & VIII / 07-08


8.(308210) COMPUTER SIMULATION AND MODELING Objective: In the last five decades digital computer simulation has developed from infancy to a full-fledged discipline. Techniques for generating random numbers. including modeling. Type of models. Statistical Models in Simulation: Useful statistical model. Acceptance rejection techniques 9. Calibration and Validation of models. Identifying the Distribution of data. Output analysis of terminating simulators. Verification. Measure of performance and their estimation. VII & VIII / 07-08 3/28 . input modeling. Tests for random numbers. Pre-Requisite: Probability and Statistics DETAILED SYLLABUS 1. Advantages and Disadvantages of simulation. Other examples of simulation.Tech. 4. 2. Type of systems. both in terms of extent to which simulation is used and the range of applications. Poisson process. Object oriented simulation. 3. Queueing Models: Characteristics of Queueing systems. Queueing notations. Simulation Software: History of simulation software. Generation of pseudo random numbers. Selection input model without data. Output Analysis for a Single Model: Types of simulations with respect to output analysis. Simulation Examples: Simulation of Queueing systems. Random Variate Generation: Inverse transform technique. Input Modeling: Data Collection. 6. Continuous distribution. This course gives a comprehensive and state of art treatment of all the important aspects of a simulation study. 7. Empirical distribution. Stochastic nature of output data. Steps in simulation study. General Principles: Concepts of discrete event simulation. (Information Technology) Sem. The field of modeling and simulation is as diverse as of man. Multivariate and Time series input models. 11. Verification and Validation of Simulation Model: Model building. Convolution method. Trends in simulation software. Random Number Generation: Properties of random numbers. and Validation. simulation software. Introduction to Simulation: System and System environment. model verification and validation. General-purpose simulation packages. Network of Queues. Output analysis for steady state simulation 12. List processing. Verification of simulation models. Steady state behavior of infinite population Markovian models. Steady state behavior finite population model. Long run measures of performance of Queueing systems. 5. 10. Comparison and Evaluation of Alternative System Design: Comparison of two B. Parameter estimation. Discrete distribution. Components of system. The application of simulation continues to expand. Goodness of fit tests. Desirable software features.

Jerry Banks. Averill Law. SDMA. Radio interface. with desktop browsing the exception. FDMA. UMTS and IMT-2000: B. Simulation of computer systems. VII & VIII / 07-08 4/28 . Handover. A short history of wireless communication 2. Inhibit sense multiple access. Randall Sadowski. current developments in mobile communication systems and wireless computer networks. TETRA. Deborah Sadowski. Cellular systems. Reservation TDMA. Multiplexing. Such predictions are based on the huge growth in the wireless phone market and the success of wireless data services. Signal propagation. PHI 4. “Simulation with Arena”. Introduction: Applications. Near and Far terminals. Body. David Nicol. Narsing Deo. Case Studies: Simulation of manufacturing systems. ubiquitous wireless networks has made mobile computing a reality. Multiple access with collision avoidance.system design. Academic Press Harcourt India 5. PHI 2. Slotted Aloha. “Discrete Event System Simulation” 2. Security. Pre-requisites: Computer Networks. “System Simulation with Digital Computer”. Medium Access Control: Motivation for a specialized MAC: Hidden and Exposed terminals. W David Kelton. Simulation of pert network BOOKS Text Books: 1. (Information Technology) Sem. it is widely predicted that within the next few years’ access to Internet services will be primarily from wireless devices. W. Optimization via simulation. “System Simulation”. Telecommunication Systems: GSM: Mobile services. Comparison of several system design. DECT: System architecture. Protocols. Barry Nelson. This course will help in understanding fundamental concepts. “Simulation Modeling and Analysis”. “Theory of Modeling and Simulation”. Geffery Gordon. 13. Antennas. Tag Gon Kim. Classical Aloha. Donald W. Wireless Transmission: Frequency for radio transmission. Protocol architecture. Bernard Zeigler. Demand assigned multiple access. New data services. Simulation of super market. “System Analysis and Modeling”. Localization And Calling. Meta modeling. Spread spectrum. Indeed. Academic Press 3. 4. Signals. Herbert Praehofer. 3. John Carson. CDMA: Spread Aloha multiple access. McGRAW-HILL References: 1.Tech. David Kelton. TDMA: Fixed TDM. (308220) MOBILE COMPUTING Objective: Recent developments in portable devices and high-bandwidth. Modulation. PRMA packet reservation multiple access. Carrier sense multiple access. DETAILED SYLLABUS 1. System architecture. McGRAW-HILL. Polling.

Some approaches that might help wireless access. Basics: GEO. Examples 6. “Mobile Satellite Communication: Principles and Trends”. Transaction oriented TCP 11. Physical layer. “Mobile communications”. Generic reference model. Physical layer. Handover scenarios. Digital video broadcasting 7. Slow start. Destination sequence distance vector. Wireless transaction protocol. “Wireless Communications Principals and Practices” 2. Wireless LAN: Infrared vs. Examples. Wireless ATM: Motivation for WATM. Transmission/time-out freezing. Wiiliam Stallings. Networking. Jochen Schiller. HIPERLAN: Protocol architecture. Wireless ATM working group. Selective retransmission. Protocol architecture. Richharia . Snooping TCP. Mobile quality of service. Handover. Security. Future development. Medium access control Sublayer. (Information Technology) Sem. “Principles of Wireless Networks” 5. Registration. Applications. Radio access layer: Requirements. Examples Stacks with Wap. Ipv6. Entities and Terminology. Types of handover. World Wide Web: Hypertext transfer protocol. LEO. Dynamic host configuration protocol. Bluetooth: User scenarios. Mobile agents BOOKS Text Books: 1. Krishnamurthy . System architectures. Handover requirements. Mobile Network Layer: Mobile IP: Goals. Optimizations. Localization.UMTS Basic architecture. Cyclic repetition of data. John Wiley 3. YI Bing Lin . Nicopolitidis . Wireless transport layer security. Forward handover. UTRA FDD mode. MAC management. IP packet delivery. Wireless application protocol: Architecture. Wireless application environment. Physical layer. UTRA TDD mode 5. Broadcast Systems: Overview. Mobile TCP. Reverse tunneling. Access point control protocol 9. assumptions and requirements. IEEE 802. Fast retransmit/fast recovery. Mobile databases. Alternative metrics 10. K Pahlavan. Hierarchical algorithms. Infrastructure and Ad hoc Networks. WML script. Handover: Handover reference model. Dynamic source routing. Pearson Education B. “Wireless Networks”. MAC layer. VII & VIII / 07-08 5/28 . Channel access control.11: System architecture. Tunneling and Encapsulation . WATM services. Hypertext markup language. Link management. Reference model: Example configurations. MEO. Procedures and Entities. Indirect TCP. Pearson Education 2. Functions: Wireless mobile terminal side. Routing. Digital audio broadcasting: Multimedia object transfer protocol. Location management: Requirements for location management.Tech. Rappaort. “Wireless and Mobile Network Architectures”. Wireless session protocol. Fast retransmit/fast recovery. Backward handover. Wireless telephony application. 8. BRAN. Medium access control layer. Wireless datagram protocol. Mobile Transport Layer: Traditional TCP: Congestion control. P. Wireless markup language. Mobility supporting network side. Satellite Systems: History. John Wiley 4. “Wireless Communications and Networks” References : 1. P. Information bases And Networking. Sublayer. Ad hoc networks: Routing. Implications on mobility. Support for Mobility: File systems: Consistency. Addison wisely . Agent advertisement and discovery. M. Radio transmission. Addressing.

Subband coding. Series expansion.Tech. Discrete cosine transform. Morphological algorithm operations on gray-scale images 9. Opening. Regional descriptors B. Wavelet transforms in two dimensions 7. Storage. Image compression standards: Binary image and Continuous tone still image compression standards. IFFT. Image Enhancement in the Frequency Domain: Frequency domain filters: Smoothing and Sharpening filters. Histogram processing. Digital Image Processing Systems: Introduction. Slant transform. Closing. Image Representation and Description: Representation schemes. Erosion. Image sensing and acquisition. 4. Hadamard transform. Redundancies: Coding. Image compression models. Image Segmentation: Detection of discontinuities. (Information Technology) Sem. Haar transform. Walsh transform. Graphics primitives. Image Data Compression: Fundamentals. Error free compression. Wavelet functions. 8. Fidelity criteria. Processing. Psychovisual. Fast wavelet transform. Boundary descriptors. Scaling functions.(308230) IMAGE PROCESSING Objective: Digital Image Processing is a rapidly evolving field with growing applications in science and engineering. VII & VIII / 07-08 6/28 . FFT. Transformations 2. Edge linking and Boundary detection. Spatial filtering: Introduction. Brightness adaptation and discrimination. Optimum transform: Karhunen . Smoothing and sharpening filters 5. Introduction to Computer Graphics: Geometry and line generation.Loeve (Hotelling) transform. Image Enhancement in the Spatial Domain: Gray level transformations. Thresholding. Homomorphic filtering 6. Properties of 2-D DFT. Image formation in the human eye. Dilation. DFT and 2D DFT. Interpixel. Video compression standards. Morphological Image Processing: Introduction. Region based segmentation 10. Image Transforms (Implementation): Introduction to Fourier transform. Display. Lossy compression. Communication. Structure of human eye. Wavelets and Multiresolution Processing: Image pyramids. There is an abundance of image processing applications that can serve mankind with the available and anticipated technology in the near future. Arithmetic and logic operations. Hit-or-Miss transformation. Discrete wavelet transforms in one dimensions. Basic relationships between pixels 3. Image processing holds the possibility of developing the ultimate machine that could perform the visual functions of all living beings. Morphological algorithm operations on binary images. Image sampling and quantization. Pre-requisites: Digital Signal Processing DETAILED SYLLABUS 1.

Foundation of Information System: Introduction to Information System and MIS. “Digital Image Processing”. develop alternative conceptual design and select one document the system concept. systems approach. William Pratt. Pearson Education 2. Information Technology: A manager’s overview. “Image Processing. develop procedures for implementation. acquire floor space and plan space layouts. develop forms for data collection and information dissemination. DBMS. Dutta Majumder. evaluate the MIS control and B. develop the files test the system.Gonsales R. Conceptual System Design: Define the problems. train the operating personnel. Anil K.R. (Information Technology) Sem. computer hardware & software. define the sub systems. 2. 3. aim of detailed design. DBMS DETAILED SYLLABUS 1. managerial overviews. N Ahmed & K. “Fundamentals of Image Processing”. inform and involve the organization again. S. Decision support and decision making systems. RDBMS and Telecommunication. inputs outputs and processing. R.Woods.C. Detailed System Design: Inform and involve the organization. hardware and tools propose and organization to operate the system. prepare the conceptual design report. organize for implementation. B. “Orthogonal Transforms for Digital Signal Processing” Springer 4. computer related acquisitions. PHI References: 1. the systems view of business. sketch the detailed operating sub systems and information flow. Implementation Evaluation and Maintenance of the MIS: Plan the implementation. identify dominant and trade of criteria. Jain. cut-over. Harrrington. VII & VIII / 07-08 7/28 . determine the degree of automation of each operation. document the detailed design revisit the manager user. Roger Boyle. Chanda.BOOKS Text Books: 1. “Digital Image Processing”. 4. determine information needs determine information sources. D. document the system. McGraw Hill 3. Rao. Analysis. . early system testing. “Digital Image Processing and Analysis”. software. PHI (308240) MANAGEMENT INFORMATION SYSTEM Objectives: To enable students to understand the role and importance of information system Pre-requisites: Computer fundamentals. Second Edition.Vaclav Hlavac. set systems objective. Milan Sonka.E. project management of MIS detailed design . MIS organization within company. establish system constraints. Management information and the systems approach.Tech. “Computer Graphics”. and Machine Vision” Thomson Learning 3. 5. John Wiley 2.

McGraw Hill. VII & VIII / 07-08 8/28 . Potter. Concept of distributed object systems. Overview of COM/DCOM and of an open doc. 7. “Information Systems”. OMG. Design of object oriented system architecture and component technology compound document. 6. Service sector BOOKS Text Books: 1. Pitfalls in MIS development . Applications: Applications of MIS in Manufacturing sector. K. Enterprise java beans. John Wiley 4. Gordon B. Separating interface and COM implementation. “Management Information System”. client-server system architecture. Interface in COM-DCOM: Introduction to interfaces. Steven Alter. Using COM interface pointers. “Management Information System”. Pre-requisites: C++. Jawadekar. Advanced Concepts in Information Systems: Enterprise Resources Management(ERP). Instead of providing a solution based on almost religious academic dogma of object oriented programming. TMH. Supply Chain Management. Component Object Model (COM) introduction: Com as better C++ software distribution. Anderson. W. Run time polymorphism. Turban.P. Interface and IDL. 4. 3. 2. J.maintain the system. Optimizing query interface. “Management Information System”. Aim of this subject to study and learn COM and use COM to deploy such systems successfully. (Information Technology) Sem. Laudon. “Management Information System”. Overview of java.V. “Management Information System” 3. Interface definition language (IDL). Object oriented system architecture. Davis and M. Overview of CORBA. O’Brien.S. G. J.C. Reasons to distribute for centralized objects. TMH. TMH. Introduction to object oriented systems: Preview of Object-orientation. Introduction to DCOM. Dynamic linking.H. “Management Information System”.P. Procurement Management System. Laudon. Overview of Object Web. Goyal. Macmillan 5. Java Programming. 6. Introduction to distributed objects: Computing standards. Pearson Education. Olson. “Introduction to Information Technology”. Post. (408010) PROGRAMMING WITH COMPONENTS (ELECTIVE-I) Objectives of the course: COM addresses software design in a very pragmatic way. Mapping objects to locations. multi tier system architectures. 2. 2. D. B.Tech. COM is mostly widely used object model for developing distributed and concurrent systems. D. Rainer. OOAD DETAILED SYLLABUS 1. COM’s design takes into account both human nature and capitalism. References: 1.L.A. C R M .

kn -Nearest-Neighbor B. 6. Normal density. economics. Booch. “COM and CORBA side by side”. Structure of CORBA IDL. Parzen windows. Transaction service features. architectural features. Event.Code sharing and reuse. 7. Design cycle. classification. References: Tom Valesky. psychology. Pearson Education (408020) PATTERN RECOGNITION (ELECTIVE-I) Objective: This course teaches the fundamentals of techniques for classifying multidimensional data. Discriminant functions for normal density. method invocations static and dynamic: IDL (Interface Definition Language) models and interfaces. manufacturing. concurrency control services. Pearson Education 2. to be utilized for problem-solving in a wide variety of applications. Class emulation.Tech. Prolems of dimentionality. Probability and Statistics DETAILED SYLLABUS Introduction: Machine perception. CORBA components. Jacobson. Query interface types and properties. “Enterprise Java Beans”. Classes and IDL. VC++. Optimizations. Object lifecycle. 11. Pattern recognition systems. image processing. Bayes Decision theory: discrete features Maximum-Likelihood and Bayesian Parameter Estimation: Maximum likelihood estimation. Enterprise Java Beans 10. CORBA: Introduction and concepts. BOOKS Text Books: 1. Pre-requisite: Linear Algebra. Don Box. 3. Minimumerror rate classification. Rambug. Classes and servers. persistent object service and CORBA security service. Pearson Education. Learning and Adaptation Bayesian Decision Theory: Bayesian decision theory: Continuous features. technical and medical diagnostics. Pearson Education. Bayesian parameter estimation: Gaussian caseand General theory. “Essential COM”. JAVA Interface: JNI interface with C++. CORBA interface repository. Classes and Objects in COM-DCOM: Introduction. Discriminant functions and Decision surfaces. Apartments: Cross-apartments access. (Information Technology) Sem. Bayesian estimation. Jason Pritchard. Hidden Markov Model Nonparametric Techniques: Density estimation. “Essential COM”. lifecycle management. such as engineering system design. CORBA Services: Services for object naming. VII & VIII / 07-08 9/28 . distributed objects in CORBA. Object Web: web technologies interfacing with distributed objects over client server and distribute architecture. Object services and dynamic composition. 5. 8. 9. CORBA’s self-describing data. Classifiers.

Design and implement digital filters to synthesize speech and code speech at a low bit rate. ID3. Estimating and comparing classifiers. Approaches to automatic speech recognition by machine. Use a spectrum analyzer to relate the acoustic speech signal to acoustical processes. Vector quantization. Speech Sounds and features. Hart. Resampling for estimating statistic. Data description and clustering criterion function for clustering. Bias and Variance. The Speech Signal: Production. Unsupervised Bayesian learning. Nearest-Neighbor rule. Representing speech in time and frequency domains. reception. Generalised linear discriminant functions. Ho-Kashyap procedures. 2-Category linearly separable case. Hierarchical clustering Applications of Pattern Recognition BOOKS Text Books: Duda. Brief history of speech recognition research. and Acoustic-phonetic characterization: The speech production system. using techniques such as class derivation. (Information Technology) Sem. and Stock.Tech. Resampling for classifier design. Signal Processing And Analysis Methods For Speech Recognition: The bank-of-filters front-end processor. Johnsonbaugh and Jost. Gose. “Pattern Classification”. VII & VIII / 07-08 10/28 . Matrics and Nearest-Neighbor classification Linear Discriminants Functions: Linear discriminant functions and decision surfaces. Multicategory generalizations Nonmetric Methods: Decision tree. Gramatical interfaces Algorithm Independent Machine Learning: Lack of inherent superiority of any classifier. Pre-requisites: Digital Signal Processing DETAILED SYLLABUS Fundamentals Of Speech Recognition: Introduction. PHI (408030) SPEECH RECOGNITION (ELECTIVE-I) Objectives: Develop an understanding of the relationship of vocal tract shapes and physical acoustics to the acoustic speech signal. Minimising the Perceptron criterion function. Distortion Measures-Perceptual Considerations. Pattern Comparison Techniques: Speech detection. Relaxation procedure. John Wiley and Sons. Application to normal mixtures. Spectral-Distortion B. out line. Auditory based Spectral analysis model. Combining classifiers Unsupervised Learning and Clustering: Mixture densities and Identifiability. Distortion Measures-Mathematical Considerations. “Pattern Recognition and Image analysis”. The paradigm for speech Recognition. the use of software objects as components in a larger software system. Linear predictive model for speech recognition. Non-separable behavior.5. Implement speech analysis and speech synthesis modules using object-oriented software programs. CART. C4. Maximum-Likelihood estimations. Minimum squared error procedure.estimation. Gramatical methods.

HMM system for isolated word recognition Speech Recognition Based On Connected Words Models: General notations for the connected Word-Recognition problem. Introduction to IC technology. Template training methods. Models and languages for B. threads. Martin. The one pass algorithm. processes. Types of HMMs. An overview of embedded systems: Introduction to embedded systems. The level building algorithm. L. Jurafsky and J. Time Alignment and Normalization. John Wiley. It introduces unified view of hardware and software. Theory And Implementation Of Hidden Markov Models: Discrete time Markov processes. Speech recognition in adverse environment. (Information Technology) Sem. Pearson Education. Performance analysis and recognition enhancements. Grammar networks for connected digit recognition. “Fundamentals of Speech Recognition”. The two level dynamic programming algorithm. Hardware/Software co-design. “Digital Processing of Speech Signals”.Tech. The aim of this course is to make the students aware of the various applications of embedded systems. Challenges and issues related to embedded software development. L R Rabiner and RW Schafer. Gold and N. Extensions to hidden Markov Models. Embedded Software development: Concepts of concurrency. “Speech and Language Processing”. Pre-requisites: Microprocessors and C Programming DETAILED SYLLABUS 1. Segmental K-Means training procedure.Measures. Discriminative methods in speech recognition. Introduction to design technology 2. Juang. Categories and requirements of embedded systems. Implementation issues for HMMs. Template adoption to new talkers. 2. Large Vocabulary Continuous Speech Recognition. The three basic problems for HMMs. Pearson Education. Incorporation of spectral dynamic features into distortion measures. D.H. This course deals with various approaches to building embedded systems. References: B. Connected digit recognition implementation. “Speech and Audio Signal Processing”. Pearson Education. ( 408040) EMBEDDED SYSTEMS (ELECTIVE-I) Objective: Embedded system tools and products are evolving rapidly. Multiple candidate strings. mutual exclusion and inter-process communication. VII & VIII / 07-08 11/28 . Task Oriented Applications Of Automatic Speech Recognition BOOKS Text Books: 1. Rabiner and B. Speech Recognition System Design And Implementation Issues: Application of source coding techniques to recognition. Morgan.

Scheduling paradigms. Case Studies of: Digital Camera. TMH (408050) ADVANCED DATABASE SYSTEMS (ELECTIVE-I) Objectives: To study the further database techniques beyond which covered in the second year. and thus to acquaint the students with some relatively advanced issues. “Embedded Linux". functions. Myke Predko. O’Cull. Database. Scheduling algorithms. Tony Givargis. Frank Vahid.3. “Embedded System Design: A Unified Hardware/Software Introduction". Pearson Education 3. Process Control. Preprocessor directives. VII & VIII / 07-08 12/28 . Daniel Lewis. keypads and display units. Muhammad Ali Mazidi and Janice Gillispie Mazidi. Serial communication interface. Synchronous approach to embedded system design. Parallel I/O ports. “Embedded Systems”. David E. TMH 2. 4. Study of C compilers and IDE. familiarize with the data-warehousing and data-mining techniques and other advanced topics. Barnett. (Information Technology) Sem. Memory and high speed interfacing. Analog interfaces. Interfacing of data acquisition systems. Programming the target device Hardware for embedded systems: Various interface standards. Implementation of above concepts using C language. 5. Craig Hollabaugh. Standard I/O functions. “Fundamentals of Embedded Software”. Reset and interrupt . Pearson Education. Implementation of above concepts using C language Case studies and Applications of embedded systems: Applications to: Communication. “The 8051Microcontroller and Embedded Systems". Networking. Blind counting synchronization and Gadfly Busy waiting. Interfacing of controllers. Introduction to RTOS. John Wiley 2. “Embedded C Programming and the Atmel AVR ". 4. Pearson Education References: 1. At the end of the course students should be able to: gain an awareness of the basic issues in objected oriented data models. Simon. Raj Kamal. apply the knowledge acquired to solve simple problems B. “An Embedded Software Primer ". Various methods of interfacing. Timers/Counters. Cox. Implementation of above concepts using C language Study of ATMEL RISC Processor: Architecture. Parallel port interfacing with switches. Serial communication.Tech. Memory. Network Router. learn about the Web-DBMS integration technology and XML for Internet database applications. embedded software. “Programming and Customizing the 8051 Microcontroller”. RTLinux BOOKS Text Books: 1. Thomson Learning 5. Pearson Education 3. 6. Basic design using RTOS Embedded C Language: Real time methods. Parallel I/O interface. Mixing C and Assembly.

Specialization and Generalization. Mobile databases. Example of ODBMS Object Relational and Extended Relational Databases: Database design for an ORDBMS . B. Spatial databases. and Persistence. Parallel query evaluation. 2. User defined abstract data types and structured types. 2. Replication. (Information Technology) Sem. McGrawHill References: 1. BOOKS Text Books: 1. Implementation issues for extended type. C. Design. Type hierarchies and Inheritance. Distributed database concepts. Raghu Ramakrishnan. Elmasri and Navathe. Type extents and queries. Temporal database concepts..Pre-requisites: Database Systems. Implementation and Management”. Sorting. Object-Oriented Databases: Overview of Object-Oriented concepts. 5. and type constructors. Parallelizing individual operations. 6. Pearson Education 1. Sudarshan . Systems comparison of RDBMS. Concurrency control and Recovery in distributed databases. McGraw-Hill. and allocation techniques for distributed database design. OODBMS.J. OOAD. An overview of SQL3. OODBMS architecture and storage issues. “Database Systems. Indexes for text data Enhanced Data Models for Advanced Applications: Active database concepts. Concepts and architecture. Pearson Education 2.Nested relations and collections.Tech. VII & VIII / 07-08 13/28 . 3. Storage of XML data. Storage and access methods. Database schema design for OODBMS. Implementation issues. The semi structured data model. Joins. Inheritance.Date. Subclasses. “Database System Concepts”. An overview of Client-Server architecture Databases on the Web and Semi Structured Data: Web interfaces to the Web. Deductive databases and Query processing. Korth. Document schema. Object structure. Overview of XML. Encapsulation of operations. Query processing in distributed databases. Geographic information systems. Peter Rob and Coronel. Object identity. XML applications. Longman. “Database Management Systems”. Motivation for complex data types. ORDBMS Parallel and Distributed Databases and Client-Server Architecture: Architectures for parallel databases. Query processing and Optimization. Structure of XML data. Silberchatz. OQL. Relationship types of degree higher than two. Complex objects. Johannes Gehrke. Querying XML data. DETAILED SYLLABUS The Extended Entity Relationship Model and Object Model: The ER model revisited. 3. Transactions and Concurrency control. Super classes. “Fundamentals of Database Systems”. Data fragmentation. Persistent programming languages. Methods. Thomson Learning. 4. “Introduction To Database Systems”. Constraints and characteristics of specialization and Generalization.

(Information Technology) Sem. Standard protocols. Mature Packet Switched Protocol: ITU Recommendation X. 5. ATM protocol operation (ATM cell and Transmission). 7. In third part we should study Network Design. SMDS and IEEE 802. Application layer. 9. Protocols designs and analysis considering deterministic and non-deterministic approach. Availability. LLC and MAC sub layer protocol. Addressing and routing design. Standard computer architectures. Copper access technologies. Current forums. 3. Common WAN Protocol: ATM: Many faces of ATM. Not just SOCKETS but also protocols. Theory of Operation. Frame Relay: FR specification and design. Subscriber Interface and Access protocol. Addressing and Traffic control. ATM networking basics. 2. Fiber Access Technologies. Service aspects. Token Ring. Connectivity. 4. Control plane AAL. Traffic characteristics. 6. Management plane. 11. VoFR: Performance and Design considerations. Token Bus and FDDI. Layered reference models: The OSIRM. Traffic descriptors and parameters. Traffic contract and QoS. ATM layer and cell (Definition). Understanding the standards and their maker: Creating standards: players and Process. Traffic and Congestion control defined. Physical Layer Protocols and Access Technologies: Physical Layer Protocols and Interfaces. Introduction to Transmission Technologies: Hardware selection in the design process. Requirements Definition: User requirements. Switching in the LAN environment.25. Theory of operations. Traffic sizing. are to be considered.Tech. For example he should able to consider different constraints and assume suitable data and solve the problems. Cable Access Technologies. Advanced technologies like High speed Devices etc. 8. VII & VIII / 07-08 14/28 . Common Protocols and Interfaces in the LAN environment: Data link layers protocols. Ethernet. Drivers. switched multimegabit data service (SMDS). B. Performance and Design considerations. B-ISDN protocol reference model. Time and Delay considerations.75 Internetworking protocol. Bridge protocols. Second part Network programming is to be studied. Pre-requisites: Computer networks DETAILED SYLLABUS 1. Common Protocols and Interfaces in the Upper Layers(TCP/IP): Background (Routing protocols). Advantages and disadvantages of FR. Reliability and Maintainability. TCP/IP suite. Dense wavelength division multiplexing (DWDM). Simulation Programming. We expect natural thinking from student. X. 10. Network layer (Internetwork layer). Network layer functions. Protocols. Data Communications: Business Drivers and Networking Directions : Data communication Past and future. Sub-DS3 ATM. ATM layer (Protocol model). User connectivity. Accessing the Network. PHY layer. Transport layer. Budget constraints. Air Access Technologies.6. User plane overview.(408060) ADVANCED COMPUTER NETWORKS (ELECTIVE-I) Objectives: In first part. Optical Networking: SONET/SDH standards.. ATM public services. AAL Protocol model.

“Computer Networks”. Private verses public networking. B. Vol. Access Network Design: Network design layers. Morgan Kaufmann Y. “Data Network Design”.12. completing the access network design. 15. VII & VIII / 07-08 15/28 . McCabe . James D. Network performance modeling. Harcourt Asia. Business aspects of Packet-Frame and cell switching services. Access network capacity. Gallager. Pearson Education J. Topologies strategies. Designing for peaks. PHI References: W. Packet switching service aspects. Design tool.Walrand. P. Application performance needs. Harcourt Asia. Zheng. Components of design projects. Technology Comparisons: Circuits-message-packet and cell switching methods. Classes of design tool. Traffic Engineering and Capacity planning: Background (Throughput calculations) . “High Performance Communication Networks”.R. Availability and reliability. Tanenbaum. 14. Tuning the network. Generic packet switching network characteristics. “Networks for Computer Scientists and Engineers”. Public network service selection. Categories of tools. Varaiya. R. 13. Topologies. S.S. Oxford A. Access layer design. “Practical Computer Analysis and Design”. TMH D. “Data Networks”.Tech. BOOKS Text Books: Darren L Spohn. Creating the traffic matrix. Traffic engineering basics (Traffic characteristics).1. Akhtar. (Information Technology) Sem. Capacity planning and Network vision. Delay or Latency. Network capacities. network topology and hardware. Stevens. “Unix Network Programming”. Types of design projects. Queued data and packet switched traffic modeling. Bertsekas. High speed LAN protocols comparisons. Traditional Traffic engineering. “Computer Networks” Peterson & Davie. Backbone Network Design: Backbone requirements.

Advanced Topics: Spatial mining. Data Mining Primitives. Planning And Requirements: Project planning and management. in terms of data models. and System Architectures: Data mining primitives. John Wiley. OLAP in data warehouse. and storage techniques. Dimensional modeling advanced topics. conceptual design methodologies. Mining class comparisons: Discriminating between different classes. Pearson Education. VII & VIII / 07-08 16/28 . Data Design And Data Representation: Principles of dimensional modeling. Association rules. Trends in data warehousing. Additional themes in data mining. M. Data Mining Algorithms: Classification. Web Mining: Web Content Mining. Information Access And Delivery: Matching information to classes of users. 3. Architecture And Infrastructure: Architectural components. Languages. Implementation And Maintenance: Physical design process. Pre-requisites: DBMS DETAILED SYLLABUS Data Warehousing: 1. Paulraj Ponnian. transformation and loading. Knowledge Discovery : KDD Process 4.H. 2. Collecting the requirements. Introduction: Basics of data mining. 5.Tech. Clustering. Analytical characterization: analysis of attribute relevance. Data warehousing and the web. Query language. Web Usage mining. Data mining techniques. Designing GUI based on a data mining query language. query language. Dunham. Data Mining: 1. Trends in data mining BOOKS Text Books: 1. Temporal mining. 5. (Information Technology) Sem. to motivate. data extraction. Mining descriptive statistical measures in large databases 7. Application and Trends in Data Mining: Applications. Basic elements of data warehousing. data quality. 4. define and characterize data mining as process. growth and maintenance. define and characterize data mining applications. Web Structure Mining. “Data Warehousing Fundamentals”. 3.(308250) DATA WAREHOUSING AND MINING Objectives of the course: The data warehousing part of module aims to give students a good overview of the ideas and techniques which are behind recent development in the data warehousing and online analytical processing (OLAP) fields. 2. Systems products and research prototypes. data warehouse deployment. “Data Mining Introductory and Advanced Topics”. related concepts. Data mining part of the model aims to motivate. B. Visualisation : Data generalization and summarization-based characterization. 6. Overview And Concepts: Need for data warehousing. Architectures of data mining systems 8. 2. 6. Infrastructure and metadata.

“The Data Warehouse Lifecycle toolkit”. “Building the Data Warehouses”. Compression and Decompression: Types of compression. 5. Virtual reality design. Kimpall. compressing. Multimedia Authoring and User Interface: Multimedia authoring systems. MIDI. Color. Cache management for storage system. Ralph Kimball. Streaming stored audio and video. E. Data and File Format Standards: Rich text format. Audio compression. Distributed application design issues. Mallach. Industrial applications. M Berry and G. Types of multimedia systems. Multimedia across wireless. Multimedia Systems Introduction: Multimedia application. Distributed object models 6. searching. Multimedia data interface standards 2. Digital Voice and Audio. Image and video databases: Indexing and Retrieval 5. R. Full motion video 4. John Wiley.Tech. application workflow design issues. “Mastering Data Mining”. (Information Technology) Sem. Image scanners. MPEG 3. processing. 3. Wiley Dreamtech. Han. Hierarchical storage management. Video image compression. 2. LAN/WAN connectivity. Scheduling and policing mechanisms. Fractal compression. Architectural and Telecommunications Considerations: Specialized computational processors. Integrated services. Educational applications and authoring. Memory systems. Multimedia Input/Output Technologies: Key technologies issues. Gray scale. 4. Multimedia transport across ATM networks. John Wiley. “Data Mining Concepts and Techniques”. Morgan Kaufmann References: 1. Multimedia Networking: Multimedia networking applications. and intelligently integrate multiple media on computers. Optical media. Videoon-demand. Kamber. RTP. JPEG. Printout technology. Inmon. Television. Computer Networks DETAILED SYLLABUS 1. Linoff. Multimedia system architecture. Applications like Interactive. “The Data Warehouse Toolkit”. VII & VIII / 07-08 17/28 . Storage and Retrieval Technologies: Magnetic media technology. TIFF. Pre-requisites: Operating Systems. Components of multimedia systems. “Decision Support and Data Warehouse systems”. RSVP 7. Binary image compression schemes. indexing. John Wiley.3. (308260) MULTIMEDIA SYSTEMS Objectives of the course: This course teaches students to collect. Organizing multimedia databases. storing. defining objects for multimedia systems. Students learn the issues involved in capturing.H. Video and Image display system. Multimedia Application Design: Multimedia application classes. TMH. and retrieving various kinds of continuous media in the text section. W. RIFF. Hyper media B. Video Conferencing. Multimedia board solutions. Multimedia archives and digital libraries 8. manipulating. Pen input. Still video image compression. AVI.G. Evolving technologies for multimedia systems.

Need. Object display/playback issues 9. Koegel Buford. Milovanovic. “Multimedia Computing. Hardcourt India 6. Pearson Education (308270) PROJECT MANAGEMENT Objectives: This course will help to identify key areas of concern and uses of measurement for project management. define indicators based upon what a project manager would want to know.application design considerations. “Multimedia Systems Design”. Hyper Media Messaging: Mobile messaging. Subrahmanian. Project proposals. Standards. Phase A: Conception. Content based navigation. Open hypermedia systems. Communications and Applications”. Kaufman 5. Free Halshall. Nahrstedt. Gibson. J. Distributed multimedia database. Organizations. Andheigh. Steimnetz. Implementation stage. 2. VII & VIII / 07-08 18/28 . Project Management: Introduction.W. “Multimedia Systems”. and System methodologies. Academic Press. Multimedia object servers. References : 1. Systems. “Multimedia Communications: Directions and Innovations”. Multimedia System Design: Methodology and considerations. Pearson Education. Pearson Education 3. M. Multi-server network topologies. Goals. K.Tech. J. “Multimedia Communications”. User interface design. “Multimedia Communication Systems: Techniques. Managing distributed objects 11. Ross. “Multimedia Database Systems”. Integrated document management. and Networks” 4. Phase D: Operation. Project contracting. Creating hypermedia messages. K. Project environments. Rao. Middle and Later stages: Phase B: definition. integrated multimedia message standards. Books Text Books: 1. understand where measurement is used from the perspective of a generic management process Pre-requisite: Software Engineering DETAILED SYLLABUS 1. Kiran Thakrar. Evolution. Prabhat K. D. use measurement to support decision making. The world-wide web. D. Hypermedia linking and embedding. System development in Industrial and B. “Computer Networking”. PHI John F. Distributed Multimedia Systems: Components of distributed multimedia systems. Systems Development Cycle: Early stages: Life cycle. 2. Phase c: Execution.F. 10.R. R. (Information Technology) Sem. Multimedia systems design examples. information access. Distributed client server operations. Hyper media message components. K. 2. Kurose. Pearson Education. Constraints in systems development. Development cycle.

Pearson Education B. 8. Computer based tools. J. liaison roles. 11. ISO 9126. Team work and conflict. External standards. Cost estimating and system development cycle. “IT Project Management”. PERT. Internal and external project control. Techniques to enhance software quality 10. Cost schedules and forecasts. Project roles. M. Formal organization structure. TMH 3. 7. John Wiley 2. K. BOOKS Text Books: 1. Crane. R. Representative Computer –based PMIS. Cost accounting systems for project control. R. Cotterell. Organization Behavior: Project Organization structure and integration: Organization structure. Quality function deployment. Systems and Procedures: Planning fundamentals: Planning steps. Budgeting using cost accounts. TMH References: 1. Computer –based PMIS. 4. “Project Management for Business and Technology”. Web based Project management. Scheduling. “Effective Project Management”. GERT. Jalote. 6. Response planning. Network scheduling and PDM: Logic diagram and network. Controlling changes. Software quality measures. B. Resource allocation. Wysocki. J. Hughes. Project organization structure and responsibilities. Project Management Information System: Functions of PMIS. Nicholas. PHI 2. and Teams.. Project reporting. 3. Importance. Risk Management: Basic concepts. Control problems.Tech. termination responsibilities. D. System development in large Government programs. Integration of subunits in projects. Termination: Terminating the project. Traditional cost control. 5. Project Control: Control process. Applying computer based PMS. Concurrent engineering.service Organization. Information monitoring. Organization design by differentiation and integration. Planning and scheduling charts. Cost estimating and budgeting: Cost estimating. Project evaluation. Responsibility and Authority. Scheduling and time based networks. Variance limits. Managing participation. Contract administration. Project management system. “Software Project Management”. Matrix organization.Beck Jr. Cost estimating process. Software Quality: Introduction. Closing and contracts. P. VII & VIII / 07-08 19/28 . Critical path. (Information Technology) Sem. management. Scope and work definition. Control emphasis. Project cost accounting and MIS. CPM. Phillips. Identification. Project 9. Task forces. Assessment. Performance analysis. “Software Project Management in Practice”.B. M. Project extension. Informal organization. Requirements of project organizations. Project master plan. PDM networks. Performance index monitoring. Project expeditors and co-coordinators. Management schedule reserve. Elements of budgets and estimates. Cost escalation.

Source and goal scenes. Nagrath. Camera calibration). Straight-line motion. Gross motion. Pearson Education References: 1. Specification. Segmentation (Thresholding. Task planner simulation. “Introduction to Robotics”. Chmielewski.Tech. Space. Four axis robot. Workspace analysis and trajectory planning work envelop and examples. Fu. Gonzales and Lee. Pearson Education 5. “Robotics and Mecatronics”. 2. TMH. Staughard. Pick and place operations. 2. TMH B. Nagel. “Robotics and Control”. Oderey. McGraw Hill 3. Klafter. Co-ordinate frames. Exposure to programming in a high level language DETAILED SYLLABUS 1. PHI. Fine-motion Planning. Continuous path motion. J. Application. Notations. Interpolated motion. Structured Illumination. Task Planning: Task level programming. Perspective transformation. 4. Direct Kinematics: Dot and cross products. “Robotics”. Robot Vision: Image representation. Co-ordinates. “Introduction to Robotics”. Robotic Manipulation: Automation and Robots. (Information Technology) Sem. 2. BOOKS Text Books: 1. Six axis robot (Inverse kinematics). “Robot Engineering”. Inverse Kinematics: General properties of solutions tool configuration Five axis robots. Swell operators. Classification. 6. Simulation of Planer motion. Craig. 3. Shane analysis. Configuration. Negin.J. PHI 6. Six axis robot). 7. “Robotics and AI”. Rotations. Shrink operators. Euler numbers. “Fundamentals of Robotics-Analysis and control”. 5. Uncertainty. Template matching. (Five-axis robot. Principles of NC and CNC Machines.(408110) ROBOTICS (ELECTIVE-II) Objective: The goal of the course is to familiarize the students with the concepts and techniques in robot manipulator control. Link co-ordination arm equation. Mittal. Homogeneous. Niku. PHI. Grover. Three-Four axis. Grasp planning. region labeling. Polyhedral objects. Wiess. and incorporate robots in engineering systems. 4. Walfram Stdder. McGraw Hill 3. workspace fixtures. Robert Shilling. enough to evaluate. VII & VIII / 07-08 20/28 . Moments of Inertia. “Industrial Robotics”. 8. Pre-requisite: Exposure to linear algebra and matrix operations. Planning. chose.

AddisonWesley. Spatial moments. and B. BOOKS Text Books: 1. Area Extraction: Concepts. Matching. Global vs. R. “Image Processing. References: 1. Morphological operators. Data-structures. Line fitting. Analysis. Models database organization. Perspective Projective geometry. Shape numbers. II. Local features. Connected component labeling. Hierarchical image matching. Back-tracking. 12. Models database organization. methods and concepts which will enable the student to implement computer vision systems with emphasis on applications and problem solving Pre-requisite: Introduction to Image Processing. Roger Boyle. region shrinking. Binary Machine Vision: Thresholding. Vol I. Facet Model Recognition: Labeling lines. Control-strategies. Line-Linking. Grouping. 13. VII & VIII / 07-08 21/28 . (Information Technology) Sem. 15. Gradient based operators. Matching of 2D image. Spatial operators for edge detection. Forsyth. 1993. Spatial clustering. Segmentation. Curve fitting (Least-square fitting). Edge detection.Tech. Edge. “Computer Vision: A Modern Approach” 2.(408120)COMPUTER VISION (ELECTIVE-II) Objective: To introduce the student to computer vision algorithms. Hierarchal segmentation. Knowledge Based Vision: Knowledge representation. 14. Robert Haralick and Linda Shapiro. Mixed spatial gray-level moments. Milan Sonka. McGraw-Hill. Jain. Recognition of shapes. B. Classification of shapes by labeling of edges. “Machine Vision”. Region growing. Split & merge. G. Extracting. Labeling. Schunk. Labeling of connected components. 10. Motion-based segmentation. Boundary analysis: Signature properties. R. DETAILED SYLLABUS 9. General Frame Works For Matching: Distance relational approach. 17. Consisting labeling problem. 16. Kasturi. View class matching. Orderedstructural matching. Understanding line drawings.Vaclav Hlavac. View class matching. Information integration. Photogrammetry – from 2D to 3D. David A. Hough transform. Ordered –Structural matching. 11. “Computer and Robot Vision”. Rule-based Segmentation. Inverse perspective Projection. Object Models And Matching: 2D representation. External points. Image matching : Intensity matching of ID signals. and Machine Vision” Thomson Learning 2. General Frame Works: Distance –relational approach. Region Analysis: Region properties. Thinning. Recognition Methodology: Conditioning. Jean Ponce.

(Information Technology) Sem. VII & VIII / 07-08 22/28 . ORAL EXAMINATION An oral examination is to be conducted based on the above syllabus. B. Term work should consist of at least 10 practical experiments and two assignments covering the topics of the syllabus.TERM WORK 1.Tech.

TMH B. Albert K. Analysis And Visualization: Raster based GIS data processing. Database and Database management System. Evolution of GIS. Digital Representation Of Geographic Data: Technical issues to digital representation of data.Neighbor analysis. 5. PHI 2. System implementation. Spatial autocorrelation. Trend of GIS development. 6. “Introduction to Geographic Information Systems”. GIS application software design methodology. Spatial framework for mapping locations. Data processing. Yeung. Component of geographic data. 2. Computer programming concepts DETAILED SYLLABUS 1. Vector based GIS data processing. Data Modeling: Digital Terrain Modeling. Geographic data standards. Spatial data error management. Gravity models. C.W. GIS applications and GIS users. Kang-Tsung Chang. GIS Issues And Future Of GIS: Issues of implementing GIS. Introduction To GIS: Introduction. Approaches to digital terrain data modeling. “Concepts and Techniques of Geographic Information Systems”. Spatial modeling. 8.Tech. Vector geographic data representation.(408130) GEOGRAPHICAL INFORMATION SYSTEM (ELECTIVE-II) Objectives: This course is designed to provide an introduction to and an understanding of the basic concepts. Geographic data standards and GIS development.P. procedures and applications of the exciting and rapidly expanding field of Geographical Information Systems. Maps And GIS: Map scale. Human computer interaction and GIS. Classes of map. GIS project planning. Descriptive statics. Visualization of geographic information. System maintenance and support. GIS Data Processing. Map projection. Quadrat counts and Nearest. Component of GIS. Principles of Cartographic design in GIS. Raster geographic data representation. BOOKS Text Books: 1. Acquisition of digital terrain data. Geographic database design methodology. Relationship between Data representation and Data analysis. Object oriented geographic data representation. Trend surface analysis. Generation of information product. System analysis and study of user requirement. Analysis and visualization. 7. Data Quality And Standards: Concepts and definition of data quality. Coordinate systems. GIS Project Design And Management: Software engineering as applied to GIS. Lo. (Information Technology) Sem. Definition of GIS. 4. Topographic mapping. Attribute data for Thematic mapping 3. Data quality assessment. Mapping process. VII & VIII / 07-08 23/28 . Pre-requisites: Image processing.

Ross. Ian Heywood. Introduction: Biological neurons. K-means and LMS algorithms. Network architectures. The extension principle. Boltzmann learning rule. RBF learning strategies. “Principles of Geographical Information System”. spurious states. BOOKS Text Books: 1. Java.References: 1. R. Zurada J. Operations on fuzzy relations. Person Education 2. Oxford Press (408140) NEURAL NETWORKS & FUZZY SYSTEMS (ELECTIVE-II) Objective: This course covers basic concepts of artificial neural networks. 5. Its focus will be on the introduction of basic theory. 6. Learning process: Error-correction learning. Pearson Education 2. Radial Basis and Recurrent Neural Networks: RBF network structure. 2. Sarah Cornelius.. algorithm formulation and ways to apply these techniques to solve real world problems. Peter A Burrough. 3.M. (Information Technology) Sem. Simon Haykin. A. “An Introduction to Geographical Information System”. Steve Carver.least mean square algorithms. “Introduction to Artificial Neural Systems. Knowledge representation. Learning Rules. Bidirectional Associative Memory. Supervised learning. Multilayer Perceptron: Derivation of the back-propagation algorithm. 4. Single Layer Perceptron: Perceptron convergence theorem. C++ DETAILED SYLLABUS 1. Properties. Hopfield networks: energy function. C. McDonnell. Unsupervised learning. Types of activation function. “Introduction to Applied Fuzzy Electronics”. VII & VIII / 07-08 24/28 .Tech. Fuzzy controllers. Background in the following subjects desirable: numerical analysis (including optimization). Operations on fuzzy sets. theorem and the reparability of patterns. Ahmad Ibrahim. Thimothy J. Jaico publishers 3. error performance . Fuzzification and defuzzification methods. Fuzzy logic: Fuzzy sets. Membership functions. “Neural Network a . Simulated Annealing: The Boltzmann machine. Programming skills in one of the following would be desirable: Matlab. Fuzzy measures. fuzzy logic systems and their applications. “Fuzzy Logic with Engineering Applications”. McCulloch and Pitts models of neuron. Learning Factors. MathCad. and basic probability and statistics are required. Fuzzy relations. Pre-requisite: Knowledge of calculus. Method of steepest descent .Comprehensive Foundation”. comparison of RBF and MLP networks. McGraw Hill 4. PHI B.

Economics of testing. Functional and structural testing. Workbench skills 7. Appointing managers for testing tools 6. Off-the-self software.. Acceptance organizational issue. Data Warehouse 9. System documentation.. IEEE Press (408150) SOFTWARE TESTING (ELECTIVE-II) Objectives To improve your understanding of software testing . Norosa Publishing House 3. Design Phase Testing. “Artificial Neural Networks”. Multi platform environment. OOAD DETAILED SYLLABUS 1. Test Software Change. Workbench concept. Test analysis report documentation B. Testing methodology 3. “An Introduction to Fuzzy Control”. To learn standard terminology. Yegnanarayana B. Evaluate Test Effectiveness 8.Tech. Berkan R. Functional system testing techniques. Life cycle testing concept. Testing. Software Testing Process: Access Project Management Development Estimate and Status. Types. Unit testing techniques. Establishing a testing policy. “Fuzzy Systems Design Principles”. Test plan documentation. Test Plan. Software testing process. Structured approach to testing. Software Testing Process: Cost of computer testing. Economics of SDLC testing. Defect Vs failures. To provide a professional qualification widely recognized by employers. and Trubatch S. Establishing a Software Testing Methodology: Introduction.C. PHI 2. Process problems and defect rates. Considerations in developing testing methodologies 4. Program Phase Testing. & Reinfrank M.. customers and peers. Selecting techniques/tools. Verification and validation in the software development process. The business perspective for testing 2. Hellendoorn H.References: 1.L. Selecting and Installing Software Testing Tools: Testing tools-Hammers of testing. Execute Test and Record Results. Driankov D. (Information Technology) Sem. Pre-requisites: Software Engineering. RAD. Storage. VII & VIII / 07-08 25/28 . Requirements Phase Testing. Discover good sources of information. Test strategy. Common computer problems. To provide a complete picture of the test activities and processes from requirements review to system implementation. Security. Building a Software Testing Strategy: Computer system strategic risk. Testing Specialized Systems and Applications: Client/Server systems..its purpose and nature and raise your awareness of issues and constraints around testing. Building Test Document: Uses. Web based systems. Testing Software Installation. Introduction: Defect.. Responsibility. Report Test Result. Determining Software Testing Techniques: Testing techniques/tool selection process. Structural system testing techniques. Functional testing and analysis 5. Verification and validation. Selecting and using the test tools.

Controls against program threats 3. Pearson Education. Information and law. (Information Technology) Sem. Falk J. “Computer Security: Art and Science”. Targeted malicious code. and Ethical Issues in Computer Security: Protecting programs and data. W. References : 1. and S. C. Computer criminals. John Wiley. Operating system. Control of access to general objects. Software failures. Method of defense 2. Sensitive data. Multilevel database. “Effective Methods for Software Testing”. Administrating Security: Security planning. Pfleeger. Non-malicious program errors. P.E. Nguyen H. Kaner C. Understand what puts you at a risk and how to control it. Secure e-mail. Pearson Education. Intrusion detection systems. Privacy. Viruses and other malicious code. Pearson Education. Program Security: Secure programs. Eric Maiwald. Introduction: Security. IPsec 6. Attacks. Speciner. DETAILED SYLLABUS 1. Biometrics. Pre-requisites: Computer Networks. “Software Testing Techniques”. 7. SSL. Perlman. 4. VII & VIII / 07-08 26/28 . Network security control. John Wiley.. Boris Beizer.. Case studies of ethics Books Text Books: 1. Computer crime. Proposals for multilevel security 5.. Pfleeger. Physical security. Challenge-response. Memory address protection. Privacy. Rights of employees and employers. File protection mechanism. TMH B. Matt Bishop. Example protocols: PEM. Interface. Reliability and integrity. Perry. Controlling a risk is not eliminating the risk but to bring it to a tolerable level.Books Text Books: 3. Ethical issues in computer society. Password. Database Security: Security requirements. 2. “Security in Computing”. Organizational security policies. References : 1. Operating System Security: Protected objects and methods of protection. Legal.Tech. Authentication: Authentication basics. Risk analysis. Louise Tamres. “Introducing Software Testing”. 4. Networks and cryptography. Stallings. L. Firewalls. “Cryptography And Network Security: Principles and practice” 2. “Network Security” 3. Security in Networks: Threats in networks. Kaufman. “Testing Computer Software”. Dreamtech 2. “Network Security : A Beginner’s Guide”. (408160) INFORMATION SECURITY (ELECTIVE-II) Objectives of the course: Learn about the threats in computer security.

Pearson Education 5.Tech. (Information Technology) Sem.4. Whitman. “Principles of information security”. Macro Pistoia. “Java Network Security “. VII & VIII / 07-08 27/28 . Thomson B. Mattord.