Professional Documents
Culture Documents
Advanced Computer
1. Subject Code: TCS-704 Course Title:
Architecture
2. Contact Hours: L: 3 T: 1 P: 0
3. Semester: III
5. Learning Outcomes : A student who successfully fulfills the course requirements will be
able:
To apply the knowledge of performance metrics to find the performance of systems.
To develop independent learning skills and be able to learn more about different
computer architectures and hardware.
Total 44
Text Books
Artificial Intelligence
1. Subject Code: TCS-706 Course Title:
2. Contact Hours: L: 3 T: 1 P: 0
3. Semester: III
4. Objective: This course will familiarize students with Artificial Intelligence techniques for
building well-engineered and efficient intelligent systems. Pattern-directed inference
systems and different types of truth maintenance systems will be discussed in length
from both theoretical and applied point of view. Some cutting edge applications of these
systems will also be discussed. Introduction to Artificial Intelligence Programming using
LISP and PROLOG will be provided to help students with the programming part of the
course.
5. Learning Outcomes : A student who successfully fulfills the course requirements will be
able to
1. Describe some concepts or problems in cognitive science
2. Describe the computationalrepresentational understanding of mind
3. Distinguish classes of agent environments
4. Describe a reflex agent within the rational-agent model of AI
5. Contrast connectionist and automata-based models of computation.
Total 44
Books:
1. Charnick “Introduction to Artificial Intelligence.” Addision Wesley.
2. Rich & Knight, “Artificial Intelligence”.TMH
3. Winston, “LISP”, Addison Wesley.
4. Marcellous, “Expert Systems Programming”, PHI.
Name of Department:- Computer Science and Engineering
2. Contact Hours: L: 3 T: 1 P: 0
3. Semester: III
4. Objective: This course covers topics and technologies related to Cloud Infrastructure
Services. We will explore solutions and learn design principles for building large
network-based systems to support both compute and data intensive computing across
geographically distributed infrastructure.
5. Learning Outcomes : A student who successfully fulfills the course requirements will be
able to
1. Understand what Cloud Infrastructure Services is.
2. Describe the Public Cloud and its Models
3. Describe the Security concerns of Cloud Computing
4. Explain the various vendors of a secure Cloud model
5. Describe the Multi-Cloud management System
Unit III Cloud service delivery: Cloud service , Cloud service model 8
architectures, Infrastructure as a service (IaaS) architecture,
Infrastructure as a service (IaaS) details, Platform as a service (PaaS)
architecture, Platform as a service (PaaS) details, Platform as a service
(PaaS) , Examples of PaaS software, Software as a service (SaaS)
architecture, Software as a service (SaaS) details, Examples of SaaS
applications, Trade-off in cost to install versus , Common cloud
management platform reference architecture: Architecture overview
diagram, Common cloud management platform.
Total 40
Books
1. Raj Kumar Buyya, James Broberg, Andrezei M.Goscinski, Cloud Computing: Principles and
paradigms, 2011
3. Judith Hurwitz, Robin Bllor, Marcia Kaufman, Fern Halper, Cloud Computing for dummies, 2009.
Name of Department:- Computer Science and Engineering
Computer Networks-II
1. Subject Code: TCS-703 Course Title:
2. Contact Hours: L: 3 T: 1 P: 0
3. Semester: III
4. Objective: This course introduces students to the remaining part of Layered Architecture.
It explains Routing Algorithms in the Network Layer and then explain Data Link Layer.
This course also studies the basics of Network Security, Multimedia Networking and
Network Management,
5. Learning Outcomes : A student who successfully fulfills the course requirements will be
able to
1. Understand Routing Algorithms and how they work in the internet
2. Understand the data Link Layer in the TCP/Ip stack
3. Design a LAN
4. Understand the security issues of Computer Networks
5. Understand the goals of Security: Confidentiality, Authencation and Integrity
6. Undersatnd how protocols have shaped to the demands of multimedia data
7. Understand what Netwrok management is.
Link Layer and Local Area Networks: Introduction to Link Layer and 8
its services, Where Link Layer is implemented?, Error detection and
Unit II correction techniques: Parity checks, Checksumming, CRC; Multiple
Access protocols: Channel Partitioning, Random Access (Slotted
Aloha, Aloha, CSMA), Taking Turns; Link Layer Addressing: MAC
addresses, ARP, Ethernet, CSMA/CD, Ethernet Technologies, Link
Layer Switches, Switches vs Routers, VLANS
Total 40
Text Book:
1. Computer Networking A Top Down Approach, Kurose and Ross, 5th edition, Pearson
Name of Department:- Computer Science and Engineering
4. Objective: This course introduces students to the concepts and terms used in the object-
oriented approach to systems analysis and design. It highlights the importance of object-
oriented analysis and design and its limitations. It shows how we apply the process of
object-oriented analysis and design to software development.
5. Learning Outcomes : A student who successfully fulfills the course requirements will be
able to
1. Show the importance of systems analysis and design in solving complex problems.
2. Show how the object-oriented approach differs from the traditional approach to
systems analysis and design
3. Explain the importance of modeling and how the Unified Modeling Language (UML)
represents an object-oriented system using a number of modeling views.
4. Construct various UML models (including use case diagrams, class
diagrams,interaction diagrams, statechart diagrams, activity diagrams, and
implementation diagrams) using the appropriate notation
5. Recognize the difference between various object relationships: inheritance,
association, whole-part, and dependency relationships.
6. Show the role and function of each UML model in developing object-oriented
software.
7. Apply the Rational Software Suit for the construction of UML models and expressing
the appropriate notation associated with each model.
Total 40
TEXT BOOKS
1. Ali Bahrami, “Object Oriented Systems Development”, Tata McGraw-Hill
2. Martin Fowler, “UML Distilled”, Second Edition, PHI/Pearson Education. (UNIT II)
REFERENCES
1. Stephen R. Schach, “Introduction to Object Oriented Analysis and Design”, Tata McGraw-Hill,
2003.
2. James Rumbaugh, Ivar Jacobson, Grady Booch “The Unified Modeling Language Reference
Manual”, Addison Wesley
3. Hans-Erik Eriksson, Magnus Penker, Brain Lyons, David Fado, “UML Toolkit”, OMG Press
Wiley Publishing Inc., 2004.