You are on page 1of 10

Name of Department:- Computer Science and Engineering

Advanced Computer
1. Subject Code: TCS-704 Course Title:
Architecture
2. Contact Hours: L: 3 T: 1 P: 0
3. Semester: III

4. Objective: This course provides students with a solid understanding of fundamental


architectural techniques used to build today's high-performance processors and
systems. To become familiar in following topics:

How Computer Systems work & its basic principles

How to analyze the system performance.

Concepts behind advanced pipelining techniques.

The current state of art in memory system design

To provide the knowledge on Instruction Level Parallelism

To impart the knowledge on parallel programming

5. Learning Outcomes : A student who successfully fulfills the course requirements will be
able:
To apply the knowledge of performance metrics to find the performance of systems.

To deal with different types of computers

To identify high performance architecture design

To identify the problems in components of computer.

To develop independent learning skills and be able to learn more about different
computer architectures and hardware.

To learn & use the new technologies in computers.

To use the knowledge of parallel programming in the field of parallel computer


architecture and multithreaded architecture.

6. Details of the Course:-

Sl. No. Contents Contact Hours


Introduction: review of basic computer architecture, quantitative
techniques in computer design, measuring and reporting performance.
8
CISC and RISC processors.
Unit I

Pipelining: Basic concepts, instruction and arithmetic pipeline, data 9


hazards, control hazards, and structural hazards, techniques for
Unit II handling hazards. Exception handling. Pipeline optimization
techniques. Compiler techniques for improving performance.

Unit III Instruction-level parallelism: basic concepts, techniques for increasing 9


ILP, superscalar, superpipelined and VLIW processor architectures.
Array and vector processors.

Hierarchical memory technology: Inclusion, Coherence and locality


properties; Cache memory organizations, Techniques for reducing
Unit IV 9
cache misses; Virtual memory organization, mapping and management
techniques, memory replacement policies.

Unit V Multiprocessor architecture: taxonomy of parallel architectures.


Centralized shared-memory architecture: synchronization, memory
9
consistency, interconnection networks. Distributed shared-memory
architecture. Cluster computers. Non von Neumann architectures: data
flow computers, reduction computer architectures.

Total 44

Text Books

1. Computer Architecture: A Quantitative Approach by John L. Hennessy, David A.


Patterson, 5th edition, Morgan Kaufmann
2. Advanced Computer Architecture by Kai Hwang, McGrawHill Publishing
Name of Department:- Computer Science and Engineering

Artificial Intelligence
1. Subject Code: TCS-706 Course Title:

2. Contact Hours: L: 3 T: 1 P: 0
3. Semester: III

4. Objective: This course will familiarize students with Artificial Intelligence techniques for
building well-engineered and efficient intelligent systems. Pattern-directed inference
systems and different types of truth maintenance systems will be discussed in length
from both theoretical and applied point of view. Some cutting edge applications of these
systems will also be discussed. Introduction to Artificial Intelligence Programming using
LISP and PROLOG will be provided to help students with the programming part of the
course.

5. Learning Outcomes : A student who successfully fulfills the course requirements will be
able to
1. Describe some concepts or problems in cognitive science
2. Describe the computationalrepresentational understanding of mind
3. Distinguish classes of agent environments
4. Describe a reflex agent within the rational-agent model of AI
5. Contrast connectionist and automata-based models of computation.

6. Details of the Course:-

Sl. No. Contents Contact Hours


Introduction
Introduction to Artificial Intelligence, Simulation of sophisticated &
Unit I Intelligent Behavior in 8
different area, problem solving in games, natural language,
automated reasoning visual
perception, heuristic algorithm versus solution guaranteed
algorithms.

Understanding Natural Languages 9


Parsing techniques, context free and transformational grammars,
Unit II transition nets, augmented
transition nets, Fillmore’s grammars, Shanks Conceptual
Dependency, grammar free
analyzers, sentence generation, and translation.

Unit III Knowledge Representation 9


First order predicate calculus, Horn Clauses, Introduction to
PROLOG, Semantic Nets
Partitioned Nets, Minskey frames, Case Grammar Theory,
Production Rules Knowledge
Base, The Inference System, Forward & Backward Deduction.
Expert System
Existing Systems (DENDRAL, MYCIN), domain exploration, Meta
Unit IV Knowledge, Expertise 9
Transfer, Self Explaining System.

Unit V Pattern Recognition


Introduction to pattern Recognition, Structured Description,
Symbolic Description, Machine 9
perception, Line Finding, Interception, Semantic, & Model, Object
Identification, Speech
Recognition.
Programming Language: Introduction to programming Language,
LISP, PROLOG

Total 44

Books:
1. Charnick “Introduction to Artificial Intelligence.” Addision Wesley.
2. Rich & Knight, “Artificial Intelligence”.TMH
3. Winston, “LISP”, Addison Wesley.
4. Marcellous, “Expert Systems Programming”, PHI.
Name of Department:- Computer Science and Engineering

Cloud Infrastructure Services


1. Subject Code: TCS-761 Course Title:

2. Contact Hours: L: 3 T: 1 P: 0
3. Semester: III

4. Objective: This course covers topics and technologies related to Cloud Infrastructure
Services. We will explore solutions and learn design principles for building large
network-based systems to support both compute and data intensive computing across
geographically distributed infrastructure.

5. Learning Outcomes : A student who successfully fulfills the course requirements will be
able to
1. Understand what Cloud Infrastructure Services is.
2. Describe the Public Cloud and its Models
3. Describe the Security concerns of Cloud Computing
4. Explain the various vendors of a secure Cloud model
5. Describe the Multi-Cloud management System

6. Details of the Course:-

Sl. No. Contents Contact Hours


Overview of cloud computing : What is a cloud, Definition of cloud ,
Definition of cloud, characteristics of cloud ,Why use clouds, How
Unit I clouds are changing , How clouds are changing , Driving factors 8
towards cloud, Comparing grid with cloud and other computing
systems, workload patterns for the cloud, “Big Data”, IT as a service.
Cloud computing concepts: Concepts of cloud computing, Cloud 8
computing leverages the Internet, Positioning cloud to a grid
Unit II infrastructure, Elasticity and scalability, Virtualization, Characteristics
of virtualization, Benefits of virtualization, Virtualization in cloud
computing, Hypervisors, Multitenancy,classic data center,replica:types
and characterstics,virtualized data center.

Unit III Cloud service delivery: Cloud service , Cloud service model 8
architectures, Infrastructure as a service (IaaS) architecture,
Infrastructure as a service (IaaS) details, Platform as a service (PaaS)
architecture, Platform as a service (PaaS) details, Platform as a service
(PaaS) , Examples of PaaS software, Software as a service (SaaS)
architecture, Software as a service (SaaS) details, Examples of SaaS
applications, Trade-off in cost to install versus , Common cloud
management platform reference architecture: Architecture overview
diagram, Common cloud management platform.

Cloud deployment scenarios: Cloud deployment models, Public clouds,


Hybrid clouds, Community, Virtual private clouds, Vertical and special
Unit IV 8
purpose, Migration paths for cloud, Selection criteria for cloud
deployment.

Unit V Security in cloud computing : Cloud security reference model, How


security gets integrated , Cloud security , Understanding security risks,
8
Principal security dangers to cloud computing, Data corruption or loss,
User account and service hijacking, Steps to reduce cloud security
breaches, Steps to reduce cloud security breaches, Reducing cloud
security,
IBM Smart Cloud, Amazon Web Services, Google Cloud platform,
Windows Azure platform, A comparison of Cloud Computing
Platforms, Common building Blocks.

Total 40

Books

1. Raj Kumar Buyya, James Broberg, Andrezei M.Goscinski, Cloud Computing: Principles and
paradigms, 2011

2. Michael Miller, Cloud Computing, 2008.

3. Judith Hurwitz, Robin Bllor, Marcia Kaufman, Fern Halper, Cloud Computing for dummies, 2009.
Name of Department:- Computer Science and Engineering

Computer Networks-II
1. Subject Code: TCS-703 Course Title:

2. Contact Hours: L: 3 T: 1 P: 0
3. Semester: III

4. Objective: This course introduces students to the remaining part of Layered Architecture.
It explains Routing Algorithms in the Network Layer and then explain Data Link Layer.
This course also studies the basics of Network Security, Multimedia Networking and
Network Management,

5. Learning Outcomes : A student who successfully fulfills the course requirements will be
able to
1. Understand Routing Algorithms and how they work in the internet
2. Understand the data Link Layer in the TCP/Ip stack
3. Design a LAN
4. Understand the security issues of Computer Networks
5. Understand the goals of Security: Confidentiality, Authencation and Integrity
6. Undersatnd how protocols have shaped to the demands of multimedia data
7. Understand what Netwrok management is.

6. Details of the Course:-

Sl. No. Contents Contact Hours


Routing Algorithms: Introduction, global vs decentralized routing, The
Link State(LS) Routing Algorithm, The Distance Vector (DV) Routing
Unit I Algorithm, Hierarchical Routing, Routing in the Internet: RIP, OSPF, 8
BGP; Introduction to Broadcast and Multicast Routing

Link Layer and Local Area Networks: Introduction to Link Layer and 8
its services, Where Link Layer is implemented?, Error detection and
Unit II correction techniques: Parity checks, Checksumming, CRC; Multiple
Access protocols: Channel Partitioning, Random Access (Slotted
Aloha, Aloha, CSMA), Taking Turns; Link Layer Addressing: MAC
addresses, ARP, Ethernet, CSMA/CD, Ethernet Technologies, Link
Layer Switches, Switches vs Routers, VLANS

Unit III Security in Computer Networks: What is Network Security, Principles 8


of Cryptography: Symmetric Key cryptography, Public Key
Encryption, RSA, Message Integrity, Digital Signatures, Public Key
certification, End-Point Authentication, Secure TCP connections:SSL;
Introduction to Firewalls and IDS
Multimedia Networking: Introduction, Streaming Stored Audio and
Video, Real Time Streaming Protocol(RTSP), Making the Best of the
Unit IV Best Effort Services, Protocols for Real Time Interactive Applications: 8
RTP, RTCP, SIP, H.323; Providing multiple classes of service.

Unit V Network Management: What it is, Infrastructure of Network


Management, The Internet standard Management Framework, SNMP
8

Total 40

Text Book:
1. Computer Networking A Top Down Approach, Kurose and Ross, 5th edition, Pearson
Name of Department:- Computer Science and Engineering

Object Oriented Analysis and


1. Subject Code: TCS-701 Course Title:
Design
2. Contact Hours: L: 3 T: 1 P: 0
3. Semester: III

4. Objective: This course introduces students to the concepts and terms used in the object-
oriented approach to systems analysis and design. It highlights the importance of object-
oriented analysis and design and its limitations. It shows how we apply the process of
object-oriented analysis and design to software development.

5. Learning Outcomes : A student who successfully fulfills the course requirements will be
able to
1. Show the importance of systems analysis and design in solving complex problems.
2. Show how the object-oriented approach differs from the traditional approach to
systems analysis and design
3. Explain the importance of modeling and how the Unified Modeling Language (UML)
represents an object-oriented system using a number of modeling views.
4. Construct various UML models (including use case diagrams, class
diagrams,interaction diagrams, statechart diagrams, activity diagrams, and
implementation diagrams) using the appropriate notation
5. Recognize the difference between various object relationships: inheritance,
association, whole-part, and dependency relationships.
6. Show the role and function of each UML model in developing object-oriented
software.
7. Apply the Rational Software Suit for the construction of UML models and expressing
the appropriate notation associated with each model.

6. Details of the Course:-

Sl. No. Contents Contact Hours


INTRODUCTION
An Overview of Object Oriented Systems Development - Object Basics
Unit I – Object Oriented Systems Development Life Cycle. 8

OBJECT ORIENTED METHODOLOGIES 8


Rumbaugh Methodology - Booch Methodology - Jacobson
Unit II Methodology - Patterns – Frameworks – Unified Approach – Unified
Modeling Language – Use case - class diagram - Interactive Diagram -
Package Diagram - Collaboration Diagram - State Diagram - Activity
Diagram.
Unit III OBJECT ORIENTED ANALYSIS 8
Identifying use cases - Object Analysis - Classification – Identifying
Object relationships - Attributes and Methods.

OBJECT ORIENTED DESIGN


Design axioms - Designing Classes – Access Layer - Object Storage -
Unit IV Object Interoperability. 8

Unit V SOFTWARE QUALITY AND USABILITY


Designing Interface Objects – Software Quality Assurance – System
Usability - Measuring User Satisfaction 8

Total 40

TEXT BOOKS
1. Ali Bahrami, “Object Oriented Systems Development”, Tata McGraw-Hill
2. Martin Fowler, “UML Distilled”, Second Edition, PHI/Pearson Education. (UNIT II)

REFERENCES
1. Stephen R. Schach, “Introduction to Object Oriented Analysis and Design”, Tata McGraw-Hill,
2003.
2. James Rumbaugh, Ivar Jacobson, Grady Booch “The Unified Modeling Language Reference
Manual”, Addison Wesley
3. Hans-Erik Eriksson, Magnus Penker, Brain Lyons, David Fado, “UML Toolkit”, OMG Press
Wiley Publishing Inc., 2004.

You might also like