M.E.COMPUTER SCIENCE AND ENGINEERING (PART TIME) CURRICULUM 2010 SEMESTER – I Code No.

Theory 10PMECC101 10PMECS101 10PMECS102 Practical 10PMECS111 Course Title Applied Mathematics Computer Architecture Data Structures and Algorithms Data Structures Lab L T P C 3 3 3 0 0 0 0 0 0 3 3 3 Marks CIA ESE Total 50 50 50 50 50 50 50 100 100 100 100

0 0 3 2 50 Total crédits : 11

SEMESTER – II Code No. Theory 10PMECS201 10PMECS202 10PMECS203 Practical 10PMECS211 Course Title Operating Systems Computer Networks Compiler Design Networks Lab L T 3 3 3 0 0 0 P C CIA 0 0 0 3 3 3 50 50 50 Marks ESE Total 50 50 50 50 100 100 100 100

0 0 3 2 50 Total crédits : 11

SEMESTER - III Code No. Theory Software Engineering Methodologies 10PMECS302 Object Oriented System Design 10PMECS303 Web Technology Practical 10PMECS311 Web Technology Lab 10PMECS301 3 3 3 0 0 0 0 0 0 3 3 3 50 50 50 50 50 50 50 100 100 100 100 Course Title L T P C Marks CIA ESE Total

0 0 3 2 50 Total crédits : 11

1

SEMESTER - IV Code No. Theory 10PMECS401 10PMECSE** 10PMECSE** Practical 10PMECS411 Course Title Data Base Technology Elective I Elective II Database Technology Lab L T P C CIA 3 3 3 0 0 0 0 0 0 3 3 3 50 50 50 Marks ESE Total 50 50 50 50 100 100 100 100

0 0 3 2 50 Total crédits : 11

SEMESTER - V Code No. Theory Research Methodology 10MECC501 Pedagogy & Communication Skills 10PMECSE** Elective III 10PMECSE** Elective IV Practical 10PMECS511 Project Phase I 3 3 3 0 0 0 0 0 0 0 0 3 3 3 50 50 50 50 50 50 100 100 100 100 Course Title L T P C Marks CIA ESE Total

1 6 100 2 Total crédits : 15

SEMESTER - VI Code No. Practical 10PMECS611 Project Phase II 2 1 4 2 Total crédits : 12 0 0 50 50 100 Course Title L T P C CIA Marks ESE Total

2

LIST OF ELECTIVES Code No. 10PMECSE01 10PMECSE02 10PMECSE03 10PMECSE04 10PMECSE05 10PMECSE06 10PMECSE07 10PMECSE08 10PMECSE09 10PMECSE10 10PMECSE11 10PMECSE12 10PMECSE13 10PMECSE14 10PMECSE15 10PMECSE16 10PMECSE17 10PMECSE18 10PMECSE19 10PMECSE20 10PMECSE21 10PMECSE22 10PMECSE23 Course Title Theory of Computation Soft Computing Mobile Computing Distributed Computing Multimedia Systems XML and Web Services Bio Informatics Grid Computing Network Security Embedded Systems Digital Imaging Software Quality Assurance Ad hoc Networks Data Warehousing and Data Mining Performance Evaluation of Computer Systems and Networks Agent Based Intelligent Systems Visualization Techniques Advanced Databases Software Project Management Component Based Technology Information Storage and Management Enterprise Java (J2EE) JSP and Servlet L T P C 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 Marks CA FE Total 50 50 100 50 50 100 50 50 100 50 50 100 50 50 100 50 50 100 50 50 100 50 50 100 50 50 100 50 50 100 50 50 100 50 50 100 50 50 100 50 50 100 50 50 50 50 50 50 50 50 50 50 50 50 50 50 50 50 50 50 100 100 100 100 100 100 100 100 100

3

10PMECC101

APPLIED MATHEMATICS

3 0 0 100

UNIT – I ADVANCED MATRIX THEORY Matrix norms – Jordan canonical form – Generalized eigenvectors – Singular value decomposition – Pseudo inverse – Least square approximations – QR algorithm. UNIT – II CALCULUS OF VARIATIONS Variation and its properties – Euler’s equation – Functionals dependent on first and higher order derivatives – Functionals dependent on functions of several independent variables – Some applications – Direct methods: Ritz and Kantorovich methods. UNIT III LINEAR PROGRAMMING Basic concepts – Graphical and Simplex methods –Transportation problem – Assignment problem. UNIT – IV Z – TRANSFORMS Transform of standard functions – Convolution – Initial and Final value problems – Shifting Theorem – Inverse transform (Using Partial Fraction – Residues) – Solution of difference Equations using Z – Transform. UNIT – V RANDOM PROCESSES Classification – Stationary random processes – Auto Correlation – Cross Correlations – Power spectral density – Linear system with random input – Gaussian Process. REFERENCES M.K.Venkataraman, “Higher Mathematics for Engineering & Science”, National Publishing Company, 2000. Bronson, R, “Matrix Operations “, Schaums outline Series, McGraw Hill, New York.1989. Elsgoltis, “Differential Equations and Calculus of Variations ", MIR Publishers, Moscow (1970) Gupta.A.S., “Calculus of Variations with Applications “, Prentice Hall of India, New Delhi, 1999. T.Veerarajan, “Probability, Statistics & Random Processes”, Tata McGraw Hill., 2000. Gupta, P.K.and Hira, D.S., “Operations Research ", S.Chand & Co., New Delhi, 1999. T.Veerarajan, “Mathematics – III”, Tata McGraw Hill., 2000.

4

Operations in the instruction set .Reducing hit time Main memory and performance .INSTRUCTION LEVEL PARALLELISM WITH SOFTWARE APPROACHES Compiler techniques for exposing ILP . Hennessey and David A. Patterson.Multiple issues .Reducing cache miss penalty and miss rate . REFERNCES Sima D.Multithreading.Dynamic Hardware prediction .INSTRUCTION LEVEL PARALLELISM Pipelining and Hazards .IA 64 and Itanium Processor.Jordan.Models of memory consistency . 2003. Morgan Kaufmann. availability and dependability .Encoding and instruction set .Instructions for control flow .Memory addressing – Addressing modes . Addison Wesley.Type and size of operands . UNIT V MULTIPROCESSORS AND THREAD LEVEL PARALLELISM Symmetric and distributed shared memory architectures . Kacsuk.Performance issues Synchronization .RAID . 2000. Vincent P. Types of storage devices – Buses .Operands and operations for media and signal processing .Advanced compiler support .Limitations of ILP – Case studies: lP6 Micro architecture UNIT III.Heuring. Mechanism . “ Computer System Design and Architecture” . Third Edition." Computer Architecture: A Quantitative Approach".10PMECS101 COMPUTER ARCHITECTURE 3 0 0 100 UNIT I -FUNDAMENTALS OF COMPUTER DESIGN Measuring and Reporting performance .MIPS and TM32. UNIT IV.Example Architecture .Static multiple issue : VLIW .Static branch prediction .Quantitative principles of computer Design Classifying instruction set Architecture .Hardware support for exposing parallelism Hardware Vs software speculation. Harry F.MEMORY AND I/O Cache performance . Kai Hwang " Advanced computer architecture Parallelism Scalability Programmability" Tata Mcgraw Hill Edition 2001. Addison Wesley .I/O performance measures Designing I/O system. 2nd Edition 2004. " Advanced Computer Architectures: A Design Space Approach". 5 .Reliability. TEXTBOOK John L.Dynamic scheduling . Fountain and P.Memory technology.Hardware based speculation .Concepts of ILP . UNIT II . T.

B-Trees – Implementations – Tree Traversals. 2002 6 .. 2002.Divide and Conquer – Dynamic Programming . “Computer Algorithms”.Buddy Systems – Storage Compaction UNIT V -SEARCHING. 2002. Galgotia.Garbage Collection Algorithms for Equal Sized Blocks . Hopcroft.Array. Implementation and Applications . Radix Sort – External Sorting – Merge Sort. Binary Search. Ullman. Prentice Hall of India. Multi-way Merge Sort.Trees – General. ”Data Structures using C & C++”. Binary. Expression Search. Aho. “Data Structures and Algorithm Analysis in C++”. Pearson Education.MEMORY MANAGEMENT Issues . Augestien M. Heap Sort. Pearson Education. Splay. REFERNCES Horowitz. Cursor Implementation UNIT II -BASIC DATA STRUCTURES Stacks and Queues – ADT. UNIT III -ADVANCED DATA STRUCTURES Set – Implementation – Basic operations on set – Priority Queue – Implementation Graphs – Directed Graphs – Shortest Path Problem .. Quick Sort.Storage Allocation for Objects with Mixed Sizes .S. Langram Y.J.Managing Equal Sized Blocks .Undirected Graph . SORTING AND DESIGN TECHNIQUES Searching Techniques. Pointer.Greedy Algorithm – Backtracking .Design Techniques . 2000 Tanenbaum A. “Data Structures and Algorithms”.List (Singly. AVL. Bin Sort. Sorting – Internal Sorting – Bubble Sort. Polyphase Sorting .Local Search Algorithms TEXTBOOKS Mark Allen Weiss. Insertion Sort. Rajasekaran.Spanning Trees – Graph Traversals UNIT IV.10MECS102 DATA STRUCTURES AND ALGORITHMS 3 0 0 100 UNIT I -INTRODUCTION Basic concepts of OOPs – Templates – Algorithm Analysis – ADT . Sahni. Doubly and Circular) Implementation .

7. Implementation of Circular Queue. Implementation of Searching Techniques 14. 9. Implementation of Heaps.Implementation of Sorting Techniques 7 . Implementation of Hash table. Implementation of Depth First Search Techniques. 3. Implementation of Prim’s Algorithm. Implementation of Breadth First Search Techniques. 8.Doubly and Circular linked list .10PMECS111 DATA STRUCTURES LABORATORY 0 0 3 100 1. 6. 10. Implementation of AVL Rotations. 5. Implementation of Kruskal’s Algorithm 13. 2. Implementation of Dijkstra’s Algorithm. Implementation of Binary Search trees. Implementation of Singly . Implementation of Multistack in a Single Array. 12. 11. 4.

Event Ordering-Mutual Exclusion.Page Replacement Thrashing.Threads: Multithreading Models – Process Synchronization: The Critical Section Problem – Synchronization Hardware Semaphores – classical problem of Synchronization – Monitors . “Modern Operating Systems”.Process Scheduling .Methods for handling Deadlocks .File Protection . 2nd Edition 2001 Achut S.Access methods .System calls – System Programs – System Design and Implementation . UNIT III -MEMORY MANAGEMENT Background – Swapping .Atomicity.Deadlock Prevention – Deadlock Avoidance .Sinha. TEXTBOOKS Silberschatz.II 10PMECS201 OPERATING SYSTEMS 3 0 0 100 UNIT I -INTRODUCTION Main frame Systems. Tata Mcgraw Hill. REFERENCES Andrew S. UNIT IV -FILE SYSTEMS File Concepts . “Operating Systems & Systems Programming ”. PHI 1998.File System Implementation: File System Structure and Implementation – Directory Implementation – Allocation methods Free Space Management – Recovery . Godbole and Kahate Atul .Co-Operating process Inter Process Communication .Virtual Memory: Demand paging . IEEE computer Society Press. 2003. Tanenbaum .Segmentation – Segmentation with paging .Paging . Operating Systems Structures: System Components – Operating System Services .Directory Structure . UNIT II -PROCESS MANAGEMENT Process Concepts .SEMESTER .Operation on Process .CPU scheduling: Basic Concepts – Scheduling Algorithms. Gagne “ Operating System Concepts” Sixth Edition. “ Distributed OS concepts and Design ”. Galvin. PHI .Disk Structure – Disk Scheduling.Deadlock: Deadlock Characterization . Desktop Systems – Multiprocessor Systems – Distributed Systems – Clustered Systems – Real Time systems – Hand held Systems.Deadlock Detection – Recovery from Deadlock. 8 . UNIT V -DISTRIBUTED OPERATING SYSTEM Design issues in distributed operating system-Distributed file systems .Concurrency ControlDeadlock Handling-Election Algorithms-Case Study-Linux.Naming and Transparency-Remote File Access-Stateful versus Stateless service – Distributed Coordination. 2003 Pradeep K.Contiguous Memory Allocation .

REFERENCES: Larry L. “Data & Computer Communication”. “Computer Networking –A top –down approach featuring the internet”.Peterson and Brule S.F and K. UNIT V. 6th Edition. 2001.W. 2002. II.NETWORK LAYER Circuit Switching – Packet Switching – Switching and Forwarding – Bridges and LAN Switches – Cell Switching – Inter networking – Routing – Global Internet – Multicast. “ Operating systems: A Design Oriented Approach”. Mani Subramanian. UNIT III. Addison Wesley.Davie. Tata McGraw Hill. “Network Management: Principles and Practice”. 6th Indian reprint 2002. 2000. Ross. Addison Wesley. Addison Wesley. 1999. SNMP V2. (Unit V) Kurose J. Pearson Education. “Computer Networks – A System Approach” MarGankangmann – Harcourt Asia.Network Adapters. UNIT IV. SNMPV3. 2002 (Unit I. “SNMP. UNIT II. 10PMECS202 COMPUTER NETWORKS 3 0 0 100 UNIT I -NETWORK ARCHITECTURE Layering and protocols – OSI Architecture – Internet Architecture – Link and Medium Access protocols – Framing – Error Detection – reliable Transmission – IEEE 802 Standards – Ethernet – Token Rings – Wireless . William Stallings.NETWORK SECURITY AND APPLICATION Cryptographic Algorithms – DES – RSA – MD5 – Security Mechanisms – Fire Walls – Name Service – Traditional Applications – SMTP – HTTP – Multimedia Application – RTP – RTCP – SCTP .Charles Crowley.NETWORK MANAGEMENT Introduction – Network Monitoring – Network Control – SNMPV I Network Management Concepts – Information – Standard MIBS. 3rd Edition. RMON 1 and 2”. 9 . III & IV) William Stallings. Second Edition.TRANSPORT LAYER UDP – TCP – Remote Procedure Call – Performance – Congestion Control and Resource Allocation – TCP Congestion Control – Congestion Avoidance Mechanisms – Quality of Service : Bandwidth – Delay – Jitter.

LEXICAL ANALYZER Role of a lexical analyzer – Input buffering . UNIT II.CODE GENERATION Introduction to optimization techniques . Menlo Park.Wesley.Issues in the design of a code generator . Compilers . 1988.Parts of a compiler – Grouping of phases Compiler construction tools.INTERMEDIATE CODE GENERATION Intermediate languages .D. Prentice Hall of India. Compiler Design in C. Fischer Leblanc.10PMECS203 COMPILER DESIGN 3 0 0 100 UNIT I -INTRODUCTION Basic concepts . Ravi Sethi.Boolean expressions Flow control statements –Back patching.Grammar . Addison.V.Context-free grammars .Language . 2003. Compiler Construction Principles and Practice.SYNTAX ANALYZER Role of a parser .Assignment statements . Ullman. 1988. Holub. 10 . UNIT III.Specification and recognition of tokens Finite automata . UNIT IV. Allen I.Bottom-up parsing – Use of a tool to generate parsers..Regular expression to finite automation – Optimization of DFA-based pattern matchers-Use of a tool for generating lexical analyzer. 2001. Vikas publishing House. Kennath C. REFERENCES: Aho A.un time storage management .Louden. J.Top-down parsing . Crafting Compiler. Techniques and Tools.Principles. UNIT V.Design of a simple code generator.Declaration . Benjamin Cummings.

Develop an application for transferring files over RS232. 5.Testing Tactics: White Box Testing.User Interface : Analysis And Design.SOFTWARE DESIGN Design Concepts – Design Models – Pattern Based Design – Architectural Design – Component Level Design – Class Based And Conventional Components Design – Real time System Design . Write a program that takes a binary file as input and performs bit stuffing and CRC Computation. Write a Client to download a file from a HTTP Server.SOFTWARE QUALITY ASSURANCE 11 . 3. Study of Network Simulators like NS2/Glomosim / OPNET . 7. 6. UNIT II -REQUIREMENT ANALYSIS System Engineering Hierarchy – Requirement Engineering: Tasks. UNIT V. 4. Simulation of BGP / OSPF routing protocol. Write a program mail using mailserver. Eliciting Requirements.10PMECS211 NETWORK LAB 0 0 3 2 100 LIST OF EXPERIMENTS 1.III 10PMECS301 SOFTWARE ENGINEERING METHODOLOGIES 3 0 0 100 UNIT I -PLANNING A Generic View Of Processes – Process Maturity – Process Models – Agile Process And Models – Software Cost Estimation –Risk Analysis – Software Project Planning & Scheduling. Initiating The Process. 10. SEMESTER . 8. 9. Basis Path Testing – Control Structure Testing – Black Box Testing – Object Oriented Testing – Testing GUI – Testing Client/Server – Test Documentation. 2. Develop a Client that contacts a given DNS Server to resolve a given host name. Develop a Client – Server application for chat. Developing Use Cases – Negotiating Requirements – Validating Requirements – Building The Analysis Models: Concepts – Object Oriented Analysis – Scenario Based Modeling – Data & Control Flow Oriented Model – Class Based Model – Behavioral Model. UNIT III. UNIT IV. Simulation of ARP / RARP. Simulation of Sliding-Window protocol.SOFTWARE TESTING Software Testing – Strategies – Issues – Test Strategies For Conventional And Object Oriented Software – Validation And System Testing .

Reliability – Quality Standards – Software Quality Assurance Plan – Software Maintenance . Fairely. 2005. 2000. Mc Graw Hill International Edition. Booch. Coad/Yardon – Patterns – Frame Works – The Unified Approach – UML UNIT III. Shaler/Mellor. REFERENCES: Ali Bahrami. UNIT IV.Complexity Of Software – Classification – Notation – Process – Pragmatics – Binary And Entity Relationship – Object Types – Object State – OOSD Life Cycle UNIT II. Sommerville I. 1995 10PMECS302 OBJECT ORIENTED SYSTEM DESIGN 3 0 0 100 UNIT I -OBJECT ORIENTED DESIGN FUNDAMENTALS The Object Model – Classes And Objects . Springer Verlag.MANAGING OBJECT ORIENTED DEVELOPMENT Managing Analysis And Design – Evaluation Testing – Coding – Maintenance – Metrics – Case Study: Foundation Class Library – Client/Server Computing.OBJECT ORIENTED DESIGN Design Process – Design Axioms – Designing Classes – Access Layer Design – View Layer Design. 1997.Software Configuration Management – Reverse Engineering & Reengineering – Use of CASE Tools TEXTBOOKS Roger S. Software Engineering: A Practitioner’s Approach (Sixth Edition). “Software Engineering – An Engineering Approach”. V Edition: Addison Wesley. McGraw Hill. REFERNCES Pankaj Jalote. Jacobson.OBJECT ORIENTED ANALYSIS Identify Use Cases – Use Case Model – Documentation – Classification – Identifying Classes – Noun Phrases Approach – Common Class Pattern Approach – Use Case Driven Approach – Identifying Object Relationship. Attributes And Models. UNIT V.An Integrated Approach to Software Engineering. Pressman.. “Software Engineering Concepts”.. 1996. New Delhi. James F Peters and Witold Pedryez. Object Oriented System Development. 1999.Software Quality Concepts – Quality Assurance – Software Technical Reviews – Formal Approach To Software Quality Assurance .OBJECT ORIENTED METHODOLOGIES AND UML Object Oriented Methodology: Rumbaugh. John Wiley and Sons. 12 . McGraw Hill. Software Engineering.

UNIT III. 2003. and H. 2001 Norton D.Retrieving Data with URL – HTML – DHTML: Cascading Style Sheets . “INTERNET and WORLD WIDE WEB – How to program”. 2000. Applying UML & Patterns: An Introduction to Object Oriented Analysis and Design. XML.SERVER SIDE PROGRAMMING Server side Programming – Active server pages – Java server pages – Java Servlets: Servlet container – Exceptions – Sessions and Session Tracking – Using Servlet context – Dynamic Content Generation – Servlet Chaining and Communications.COMMON GATEWAY INTERFACE Common Gateway Interface: Programming CGI Scripts – HTML Forms – Custom Database Query Scripts – Server Side Includes – Server security issues – XML. Pearson Education 2nd Edition 2004. Jeffy Dwight.Larman. “Object Oriented Software Engineering using UML. “USING HTML 4. UNIT II. 2004. 2003. Schildt. Bernd Bruegge. UNIT V.2”. Eric Ladd and Jim O’Donnell. Allen H. “Java Network Programming”. Pearson education asia. 2nd Edition. Pearson Education. Dutoit. Michael Erwin and Robert Nikes “USING CGI”. “Java 2: The complete Reference”. 3rd Edition. Patterns and Java”. 10PMECS303 WEB TECHNOLOGY 3 0 0 100 UNIT I -INTRODUCTION Introduction – Network concepts – Web concepts – Internet addresses . and JAVA1. O’Reilly Publications. PHI Publications. et al.APPLICATIONS Simple applications – Internet Commerce – Database connectivity – Online databases – EDI Applications in Business – Plug-ins – Firewalls REFERENCES: Deitel. 1997 13 . TMH. Deitel and Neito. Elliotte Rusty Herold .Scripting Languages: Javascript – Vbscript.JAVA PROGRAMMING Java fundamentals: Classes – Inheritance – Packages – Interfaces – Exceptions Handling – Multi threading – Applets UNIT IV. PHI publications.

Write a ASP program using the components 14 . bean program to access information from databases 10. Implement the inventory control system with a reorder level 2. Write a Servlet. Develop a package for the payroll of a company 0 0 3 100 4.10PMECS311 WEB TECHNOLOGY LAB 1. Web Page Creation using HTML and DHTML and Sever side Scripting Languages 6. Write a program in java to implement Database Connectivity 8. Develop a package for a bank to maintain its customer details 3. Web Page Creation using HTML and DHTML and Client side Scripting Languages 5. Write a JSP program for order processing 9. Write a application/GUI program in java for getting time and data information from the server using TCP/UDP 7.

UNIT V. Jim Buyens.Date. 7th Edition.Fragmentation .Indexing and Hashing .Transaction processing . UNIT III.Query processing – Database recovery . Navathe. Ramez Elmasri.Distributed database architecture .Locking and Commit protocols . McGraw Hill Book Company. Database System Concepts. PHI.Entity-Relationship model Data Dictionary .Normalization and database design.Distributed transactions .Sudharsan.Integrity rules Relational Algebra – Relational calculus .Client / Server databases . 1987. Shamkant B.Domains and key concept . REFERENCES: Abraham Silberschatz. XML/QL . Henry. 3rd Edition. 2002. Pearson Education.Database systems architecture .DISTRIBUTED DATABASES Centralized versus distributed databases . 4th Edition. F.Distributed concurrency Control – Security and reliability .Data models Relational model – Hierarchical model .J. UNIT IV.XML.Commercial query languages – Embedded SQL .SEMESTER – IV 10PMECS401 DATA BASE TECHNOLOGY 3 0 0 100 UNIT I .Principles and Systems.RELATIONAL DATABASES Codd's rules . Tata McGraw Hill. 2003 15 . Step by Step Web Database Development. “An Introduction to Database system”. Fundamentals of Database Systems. 2001. Stefano Ceri & Giuesppe Pelagatti.Object oriented database . Distributed Databases . 2004. UNIT II. Addison Wesley. Korth.DATA BASE SYSTEM CONCEPT File systems .DATABASE SYSTEM DESIGN File and storage structures .Security and Integrity Triggers.Database systems .Data Analysis and OLAP . C.Network model .Database Administration and control.Data mining . S.Base tables .Data warehousing.Parallel databases.Views .ADVANCED DATABASES The World Wide Web .Object Relational database .Concurrency control .

e -Book 7. Online Ticket Reservation System 9. Payroll System 4. Online Tax Payment System 0 0 3 100 16 . Quiz System 3. Library Management System 2. Inventory Control System 6.10PMECS411 DATABASE TECHNOLOGY LAB 1. Online Shopping 10. HR Management System 5. Online Banking 8.

UNIT II RESEARCH PROCESSES AND METHODOLOGY Introduction to Research – Research strategies – Ethics – Code of conduct for Research – Health and Safety – IPR – Research Events – Networks – Outreach Activities – Best Research practices – Quality assurance for Research – Career Management for Researchers – Research seminars – Journal critiques -. case discussion and assignment…system approach in education. consumerism. campus demographics. UNIT IVTECHNIQUES OF TEACHING AND EVALUATION Large group techniques – lecture. UNIT V ESSENTIALS FOR EFFECTIVE COMMUNICATION IN ENGLISH Improving Vocabulary stock-general and technical vocabulary-British and American vocabulary-homophones & homonyms. symposium. Individualized techniques-CAI Keller plan – PSI and programmed learning-methods of evaluation-self evaluation and student evaluation in higher education. technological change. panel discussion-project approaches and workshop. Restructuring and new patterns of decision making. UNIT IIIEFFECTIVE RESEARCH SKILLS Data collection – Modeling – Simulation – Analysis – Prototyping – Presentation Skills – Data Presentation Skills – Research Writing skills (For Articles. changing demographics.. administrative focus. diagnostic testing and remedial teaching. question banking. idioms and phrases-Different grammatical 17 . role of higher education-social focus. seminar. Expectations by employers. demand of accountability. brain storming. rate of knowledge growth. Small Group techniques-group discussion simulation.SEMESTER . Journals and Thesis) – Creative Skills – Effective Interview Skills – Team Building Skills – Communication and Interpersonal Skills – knowledge Transfer skills – Vivo voce – Teaching and Information Skills – Effective use of Library – Survey Skills – Planning and Control Methods – Statistical Tools – Patents and Copyrights – Advanced Research Techniques and Tools. structuring of employment. the objectives of higher education. role playing-Buzz techniques. concern for community. curricular focus. drivers of change in higher educationglobalization.V 10PMECC501 RESEARCH METHODOLOGY PEDAGOGY& COMMUNICATION SKILLS 3 0 0 100 UNIT I HIGHER EDUCATION AN INTRODUCTION Historical perspectives. Reports.

1995.english4engineer. TataMcGraw Hill Co..1998. individual speeches and group discussions. .K. Voice. 2005. synopsis and summary writing. 1996. Websites: www.Effective technical communication.2005. circulars.H . Hubbuch.. project reports.Vikas publishing house (p) Ltd. 6. Kumar. formal and informal-letters. seminars.. M. Practical use of English – conversation.A. 1997.functions of the same word-Grammar-Tenses.com www. REFERENCE BOOKS 1.C. Error shooting for better use of English. reported speech. Writing Research Papers Across the Curriculum. e-learning and distance education. 3.. Educational technology.. 7. Thompson. Vedanayagam. spoken English structures. Aggarwal.com/language/engineer 18 . Technology.New age international (Pvt) Ltd. Modals.. Springer.N. Springer. Crow & Crow. 4. Essential of educational technology. New York. magazines and newspapers for comprehension.learn4good. 5th Edition. J. 1989. ‘The Craft of Scientific Writing’. 2003.. Susan M.. TEXT BOOKS 1. Michael. 2. 5. Erusia Publishing House New Delhi. 3rd Edition. Rout ledge. thesaurus and encyclopedia effectively.G Teaching technology for college teachers New Delhi Sterling publishers (Pvt) Ltd. ‘The Craft of Scientific Presentations”. Tony Bates. Reference skills-Using dictionary.Ltd. Listening skills for competitive exams-Reading skillsskimming and scanning – Reading journals. Alley. descriptions. Ashraf Rizvi .E.Educational Psychology”. New Delhi. Michael. Teaching Learning innovations in education-New Delhi. Alley. 2005. 2.

Prentice Hall of India. Relationship between derivation and derivation trees. “Elements of Theory of Computation.Rice Theorem . Theory of Computation. Languages and Computation. Introduction to Automata.C. Pumping lemma for CFL. Peter Linz. and GNF. Harry R. Universal Turing machine.Chandrasekaran. Papadimitriou. Lewis. 2002. CNF.Balasubramani.CONTEXT FREE LANGUAGES Context free languages. UNIT III.. equivalence of regular expression and NFA with e-moves – pumping lemma for regular sets. REFERENCES: Hopcroft and Ullman. Introduction to languages and the Theory of Computation.Martin. 2001.TURING MACHINE Context sensitive languages and LBA.FINITE AUTOMATA AND REGULAR LANGUAGES Finite Automata and Regular languages .L. 2nd Edition.UNSOLVABLE PROBLEMS Unsolvable problems . Turing machine (Definition and examples). 2000 Natarajan A. Finite Automation with e-moves. Narosa Publishers.ELECTIVES 10PMECSE01 THEORY OF COMPUTATION 3 0 0 100 UNIT I. Narosa Publishing House. EEE.Post's correspondence Problem. McGraw Hill. 2nd Edition.Regular expressions and Regular languages – non determinism and Kleenes theorem. Church Turing hypothesis. deterministic Context free languages and Deterministic pushdown automata. Computable languages and functions. UNIT V. P and NP problems. 19 .M. Simplification of context free grammars – Normal forms for context free grammars. UNIT IV. Tamilarasi & P.PUSH DOWN AUTOMATA (PDA) Acceptance by PDA. NP-complete. Equivalence of DFA and NFA. A. Christos H.P. 1998.” Theory of Computation” New age International publishers. “An Introduction to formal languages and Automata. 2002 John.1997 Mishra K. Derivation and languages. N. Recursive and recursively enumerable languages. Pushdown automata and Context free languages.2nd Edition. UNIT II. Prentice Hall.

P. UNIT V.OPTIMIZATION Derivative-based Optimization – Descent Methods – The Method of steepest Descent – Classical Newton’s Method – Step Size Determination – Derivative-free Optimization – Genetic Algorithms – Simulated Annealing – Random Search – Downhill Simplex Search.S.AP Professional.Mizutani.PHI.Extension principle and Fuzzy Relations – Fuzzy If-Then Rules – Fuzzy Reasoning – Fuzzy Inference Systems – Mamdani Fuzzy Models-Sugeno Fuzzy Models – Tsukamoto Fuzzy Models – Input Space Partitioning and Fuzzy Modeling.Pai. Davis E.. UNIT IV.Dobbins.1989.Boston 1996. Timothy J.10PMECSE02 SOFT COMPUTING 3 0 0 100 UNIT I .A. Optimization and Machine Learning” Addison Wesley.NEURO FUZZY MODELING Adaptive Neuro-Fuzzy Inference Systems – Architecture – Hybrid Learning Algorithm – learning Methods that Cross-fertilize ANFIS and RBFN – Coactive Neuro-Fuzzy Modeling – Framework – Neuron Functions for Adaptive Networks – Neuro Fuzzy Spectrum. N. UNIT II.”Computional Intelligence” PC Tools”. Rajasekaran S. REFERENCES: Jang J.”Genetic Algorithms:Search. 20 .FUZZY SET THEORY Introduction to Neuro – Fuzzy and soft Computing – Fuzzy Sets – Basic Definition and Terminology – Set-theoretic operations – Member Function Formulation and parameterization – Fuzzy Rules and Fuzzy Reasoning . 2003. C. McGraw Hill. 1977. UNIT III.Ross.Y.T.APPLICATION OF COMPUTATIONAL INTELLIGENCE Printed Character Recognition – Inverse Kinematics Problems – Automobile Fuel Efficiency prediction – Soft Computing for Color Recipe Prediction.”Fuzzy Logic with Engineering Application “. and G.simpson and R. Eberhart R..”Neural Networks.V.NEURAL NETWORKS Supervised Learning Neural Networks – Perceptrons-Adaline – Backpropagation Multilayer perceptrons – Radial Basis Function Networks – Unsupervised Learning and Other Neural Networks – Competitive Learning Networks – Kohonen Self – Organizing Networks – Learning Vector Quantization – Hebbian Learning. PHI.Sun and E.Goldberg.R. Pearson Education 2004. “Neuro-Fuzzy and Soft Computing”. Fuzzy Logic and Genetic Algorithms”.

. S. 2003.WAP Architecture – Datagram Protocol.Addressing Mobile Quality of Service.Ad hoc Networks. Pearson Education. Wireless Communication and Networks. 21 . Singhal. 2003.Broadcast Systems: Overview – Cyclic Repetition of Data.Application Environment-Wireless Telephony Application REFERENCE Schiller J. Mobile Communication Design Fundamentals. 1993.FDMATDMACDMA.Transmission/ Timeout Freezing – Selective Retransmission. 2000.Comparison of Access mechanisms – Tele communications : GSMDECTTETRA – UMTS. Second Edition.Wireless ATM: Working GroupServices. Pearson Education.Ad hoc Networks UNIT IV.Access Point Control Protocol UNIT III.10PMECSE03 MOBILE COMPUTING 3 0 0 100 UNIT I .WIRELESS NETWORKS Wireless LAN: Infrared Vs Radio Transmission – Infrastructure Networks.Reference Model – Functions – Radio Access Layer – Handover.INTRODUCTION Medium Access Control : Motivation for Specialized MAC.Snooping TCP.Transaction Oriented TCP UNIT V.Indirect TCP. WAP-Wireless Application Protocol.Fast retransmit/ FastRecovery. William Stallings.Y.Transaction ProtocolSession Protocol.MOBILE TRANSPORT LAYER Traditional TCP. William C. Principles of Mobile Computing. Mobile Communication. John Wiley.Transport Layer Security.LocalizationHandover.IMT-200 – Satellite Systems: Basics.Mobile TCP.11 – HIPERLAN – Bluetooth.SDMA.MOBILE NETWORK LAYER Mobile IP : Goals – Assumptions and Requirement – Entities – IP packet DeliveryAgent Advertisement and Discovery – Registration – Tunneling and Encapsulation – Optimization – Reverse Tunneling – IPv6 – DHCP.Digital Audio Broadcasting – Digital Video Broadcasting UNIT II.Location Management. Springer.Lee. 2003 Lother Merk. Nicklaus and Thomas Stober. Addison Wesley.IEEE 802.Routing. Martin.

Group Communication .File Service Architecture . 3rd Edition.Case Studies .Examples .Concurrency Control in Distributed Transactions – Distributed Deadlocks .Transaction Recovery .Events and Notifications .Communication and Invocation – OS Architecture .10PMECSE04 DISTRIBUTED COMPUTING 3 0 0 100 UNIT I .Sun Network File System .DISTRIBUTED TRANSACTION PROCESSING Transactions . Jean Dollimore and Tim Kindberg.Optimistic Concurrency Control Timestamp Ordering .OPERATING SYSTEM ISSUES – II Name Services -Domain Name System .Network Principles .PROCESSES AND DISTRIBUTED OBJECTS Interprocess Communication .Locks .Software Design and Implementation.Pearson Education.Clocks.Digital Signatures Cryptography Pragmatics . Pearson Education. Maartenvan Steen.Distributed Objects and Remote Invocation . 2nd Edition. 2002 22 .INTRODUCTION Characterization of Distributed Systems .Architectural and Fundamental Models . Pearson Education. Springer-Verlag.Distributed File Systems .Protection .L.Security . Distributed Systems Concepts and Design. 2002. UNIT III.Overview .Cryptographic Algorithms . Addison Wesley..Nested Transactions .Comparison . UNIT II.Types of Networks .Flat and Nested Distributed Transactions – Atomic Commit Protocols .The Andrew File System UNIT IV. Albert Fleishman. Distributed Computing Principles and Applications.500 Directory Service . 2004.Distibuted Systems –Principles and Pardigms.System Models .Processes and Threads .Java RMI Case Study.Directory and Discovery Services – Global Name Service .OPERATING SYSTEM ISSUES – I The OS Layer . UNIT V.Distributed Mutual Exclusion – Elections – Multicast Communication Related Problems. Andrew S Tanenbaum . Distributes Systems.Internet Protocols CaseStudies.Client-Server Communication .The API for the Internet Protocols .Communication Between Distributed Objects .Remote Procedure Call .X.Resource Sharing and the Web -Challenges .Case Study .Overview of Replication And Distributed Multimedia Systems REFERENCES: George Coulouris.Networking and Internetworking . 1993. Sape Mullender. Events and Process States Synchronizing Physical Clocks .Logical Time And Logical Clocks .External Data Representation and Marshalling .Global States Distributed Debugging . Distributed Systems. 1994 Liu M.

Standards. Rao K. Tata McGraw Hill. I Edition 2004. Vaughan T.FILE SYSTEMS AND NETWORKS Traditional and Multimedia File Systems-Caching Policy-Batching-Piggy backingEthernet-Gigabit Ethernet-Token Ring-100VG AnyLAN-Fiber Distributed Data Interface (FDDI).SYNCHRONIZATION Synchronization in Multimedia Systems-Presentation-Synchronization Types-Multimedia Synchronization Methods-Case Studies-MHEG-MODE-ACME.Mugesh Singhal. Fundamentals of Multimedia. UNIT V.OPERATING SYSTEMS Real-Time Processing-Scheduling-Interprocess Management-Server Architecture-Disk Management. Prentice Hall. Zoran S.M.Niranjan G Shivaratri. Bojkovic. McGraw Hill. Dragorad A. Multimedia Communication Systems: Techniques. Multimedia Applications Development using DVI technology.ATM Networks-MAN-WAN. 2004. and Networks. Prentice hall. Sandra K..Advanced Concepts in Operating Systems. 23 . Media Coding and Content Processing.COMMUNICATION Transport Subsystem-Protocol Support for QOS-Transport of Multimedia-Computer Supported Cooperative Work-Architecture-Session Management-MBone Applications.B. Milovacovic. 1992. A. Ralf Steinmetz and Klara Nahrstedt . Mark J. UNIT II. 2002. ..INTRODUCTION AND QOS Introduction-QOS Requirements and Constraints-Concepts-Resources. Communication-Memory and UNIT III. Multimedia. D. 1st Edition. Milovacovic . R.Establishment Phase-Run-Time Phase-Management Architectures. 2001 10PMECSE05 MULTIMEDIA SYSTEMS 3 0 0 100 UNIT I . Springer. “Multimedia Systems”. Drew. UNIT IV. 1999.Tata McGraw Hill Edition. REFERENCES: Ralf Steinmetz and Klara Nahrstedt. Pearson. 2002 Ze-Nian Li and Mark S.

Web Services And The Data Revolution. Wiley Publishing Inc. 2004. Pearson Education. 2002.WEB SERVICES Overview – Architecture – Key Technologies . Pearson Education.. Robert Skoczylas and Rima Patel Sriganesh.XML SECURITY Security Overview – Canonicalization – XML Security Framework – XML Encryption – XML Digital Signature – XKMS Structure – Guidelines For Signing XML Documents – XML In Practice.XML TECHNOLOGY XML – Name Spaces – Structuring With Schemas and DTD – Presentation Techniques – Transformation – XML Infrastructure. 2004. Morgan Kaufmann Publishers. REFERENCES: Frank. P. XML. UNIT III.UDDI – WSDL – ebXML – SOAP And Web Services In E-Com – Overview Of . Ramesh Nagappan . Coyle.. “Java Web Services Architecture”.NET And J2EE.INTRODUCTION Role Of XML – XML and The Web – XML Language Basics – SOAP – Web Services – Revolutions Of XML – Service Oriented Architecture (SOA). et al. UNIT V. 24 . Sandeep Chatterjee. McGovern. UNIT II. “ Developing Java Web Services”. UNIT IV. “Developing Enterprise Web Services”. James Webber.2005.10PMECSE06 XML AND WEB SERVICES 3 0 0 100 UNIT I .SOAP Overview Of SOAP – HTTP – XML-RPC – SOAP: Protocol – Message Structure – Intermediaries – Actors – Design Patterns And Faults – SOAP With Attachments.

Pierre Baldi. 2001. “Bio Informatics – The Machine Learning Approach”. REFERENCES: Bryan Bergeron.10PMECSE07 BIO INFORMATICS 3 0 0 100 UNIT I -INTRODUCTION The Central Dogma – Killer Application – Parallel Universes – Watson’s Definition – Top Down Vs Bottom Up Approach – Information Flow – Conversance – Communications. Affward T. . First East West Press. UNIT III. 2nd Edition. Parry Smith.STATISTICS. “Bio Informatics Computing”. 2003 25 . UNIT V.DATABASE AND NETWORKS Definition – Data Management – Data Life Cycle – Database Technology – Interfaces – Implementation – Networks: Communication Models – Transmission Technology – Protocols – Bandwidth – Topology – Contents – Security – Ownership – Implementation. Pearson Education.J.SEARCH ENGINES AND DATA VISUALIZATION Search Process – Technologies – Searching And Information Theory – Computational Methods – Knowledge Management – Sequence Visualizations – Structure Visualizations – User Interfaces – Animation Vs Simulation UNIT IV. Soren Brunak. UNIT II.MODELING SIMULATION AND COLLABORATION Drug Discovery Fundamentals – Protein Structure – System Biology Tools – Collaboration And Communication – Standards – Issues – Case Study. DATA MINING AND PATTERN MATCHING Statistical Concepts – Micro Arrays – Imperfect Data – Basics – Quantifying – Randomness – Data Analysis – Tools Selection – Alignment – Clustering – Classification – Data Mining Methods – Technology – Infrastructure Pattern Recognition – Discovery – Machine Learning – Text Mining – Pattern Matching Fundamentals – Dot Matrix Analysis – Substitution Matrix – Dynamic Programming – Word Method – Bayesian Method – Multiple Sequence Alignment Tools. “Introduction to Bio Informatics”. 2003. Prentice Hall.D.K.

10PMECSE08 GRID COMPUTING UNIT I .Definition . High level services – OGSI . “Grid Computing: A Practical Guide to technology and Applications”. UNIT III.TECHNOLOGIES OGSA – Sample use cases – OGSA platform components – OGSI – OGSA Basic Services.GRID COMPUTING APPLICATIONS Merging the Grid sources – Architecture with the Web Devices Architecture.GRID COMPUTING INITIATIVES Grid Computing Organizations and their roles – Grid Computing analog – Grid Computing road map.GRID COMPUTING Introduction . 26 .Scope of grid computing 3 0 0 100 UNIT II. “Grid Computing”.Net middleware Solutions.GRID COMPUTING TOOL KITS Globus Toolkit – Architecture. PHI. Programming model. Charles River media – 2003. PTR-2003. UNIT V. UNIT IV. REFERENCE: Joshy Joseph & Craig Fellenstein. Ahmar Abbas.

Man Young Rhee.Conventional Encryption .Digital Signatures .PUBLIC KEY ENCRYPTION RSA . Applied Cryptography. 27 .Authentication Protocols.10PMECSE09 NETWORK SECURITY 3 0 0 100 UNIT I -INTRODUCTION Attacks .Principles & Practice. UNIT V-SYSTEM SECURITY Intruders – Viruses – Worms – Firewalls Design Principles – Trusted Systems.Services . Applications .Classical And Modern Techniques – Encryption Algorithms . “Security in Computing”. Pearson Education. Wiley. 2003. 2nd Edition.Web Security.IP Security . 1996. 3rd Edition 2002. Pfleeger & Pfleeger.Number Theory Concepts UNIT III. Schneier.Digest Functions .MESSAGE AUTHENTICATION Hash Functions . UNIT IV-NETWORK SECURITY PRACTICE Authentication. Bruce.Mechanisms . 2003. UNIT II. “Internet Security”. Cryptography & Network Security . REFERENCES: Stallings. 3rd Edition.Confidentiality.Elliptic Curve Cryptography .Electronic Mail Security . Toha Wiley & Sons. Prentice Hall.

10PMECSE10 EMBEDDED SYSTEMS 3 0 0 100 UNIT I -INTRODUCTION TO EMBEDDED SYSTEMS Definition and Classification – Overview of Processors and hardware units in an embedded system – Software embedded into the system – Exemplary Embedded Systems – Embedded Systems on a Chip (SoC) and the use of VLSI designed circuits UNIT II.Examples of Internal SerialCommunication Devices .2 Study of RTOS. VxWorks . ‘CAN’ and advanced I/O Serial high speed buses.VxWorks System Functions and System Tasks . UNIT IV-REAL TIME OPERATING SYSTEMS – PART . ‘C’ Program compilers – Cross compiler – Optimization of memory codes.Inter Process Communication And Synchronisation – Shared data problem – Use of Semaphore(s) – Priority Inversion Problem and Deadlock Situations – Inter Process Communications using Signals – Semaphore Flag or mutex as Resource key – Message Queues – Mailboxes – Pipes – Virtual (Logical) Sockets – RPCs. PCI. 28 .Use of Function Calls – Multiple function calls in a Cyclic Order in the Main Function Pointers – Function Queues and Interrupt Service Routines Queues Pointers – Concepts of EMBEDDED PROGRAMMING in C++ .Timer and Counting Devices . TATA McGraw Hill.ISA. ‘USB’. Embedded Systems Architecture. An Embedded Software Primer. PCI-X. First Indian Reprint 2000.UART and HDLC . cPCI and advanced buses. Task scheduling models .Case Study of Coding for Sending Application Layer Byte Streams on a TCP/IP Network Using RTOS Vxworks REFERENCE: Rajkamal. First reprint 2003 David E.‘12C’. UNIT V-REAL TIME OPERATING SYSTEMS – PART .NULL Pointers . Pearson Education Asia.Parallel Port Devices – Sophisticated interfacing features in Devices/Ports.1 OS Services – Interrupt Routines Handling.C Program Elements.Device I/O Types and Examples – Synchronous .Objected Oriented Programming – Embedded Programming in C++.Basic Features . UNIT III-EMBEDDED PROGRAMMING Programming in assembly language (ALP) vs.Handling of task scheduling and latency and deadlines as performance metrics . Macros and functions -Use of Pointers .Inter Process (Task) Communication Functions .Task Management Library at the System Library Header File . High Level Language .Iso-synchronous and Asynchronous Communications from Serial Devices .Simon.DEVICES AND BUSES FOR DEVICES NETWORK I/O Devices . Programming and Design.

Hotelling transforms. Prentice Hall of India. New York. 29 . 1995. UNIT IV. UNIT II.Regional descriptors – Relational Descriptors UNIT V.OBJECT RECOGNITION AND INTERPRETATION Patterns and pattern classes . Fundamentals of Digital image Processing. Digital Image Processing. Anil Jain.K. R.E. Discrete cosine. Pearson Education. McGraw Hill. Hadamard. REFERENCES: Gonzalez.IMAGE COMPRESSION & SEGMENTATION Compression Models . 1989.Boundary descriptors.. Image transforms – fourier transforms.REPRESENTATION AND DESCRIPTION Representation schemes.Morphology. 2nd Edition. UNIT III.Edge linking and boundary detection Thresholding – Region based segmentation . Walsh. Sid Ahmed.Image smoothening .R.Decision-Theoretic methods . Image Processing.Elements of information theory .10PMECSE11 DIGITAL IMAGING 3 0 0 100 UNIT I -DIGITAL IMAGE FUNDAMENTALS Image formation.Structural methods.Image Sharpening – Image Restoration .Degradation Model – Noise models . 2002.IMAGE ENHANCEMENT & RESTORATION Histogram modification techniques .Error free Compression -Image segmentation –Detection of discontinuities .C & Woods.Spatial filtering – Frequency domain filtering.

Other related topics . Cost of Quality. 2005. P-CMM. REFERENCES: Watts Humphery. " Quality is Free: The Art of Making Quality Certain ". Software Quality Assurance. Clean-room software engineering. 30 . CASE (Computer Aided Software Engineering). Tools.Wesley. Software Testing. “Managing Software Process ". QC tools . SPICE. Philip B Crosby. Risk Management. Quality Assurance. Software Project Management. UNIT V.SOFTWARE ENGINEERING CONCEPTS Software Engineering Principles. UNIT III. CMMI.QUALITY ASSURANCE MODELS Models for Quality Assurance-ISO-9000 . UNIT IV-SOFTWARE QUALITY ASSURANCE RELATED TOPICS Software Process .7 QC Tools and Modern Tools.Series. Software Configuration Management.Software Reliability. McGraw Hill. Roger Pressman.Definition and implementation. OO Methodology. Defect injection and prevention. 1998. Software Process. Quality Management . Malcolm Baldrige Award. “Software Engineering ".Total Quality Management. Quality Function Deployment. internal Auditing and Assessments. CMM. Inspections & Walkthroughts. Project and Product Metrics. Reviews. Software testing -Concepts. Benchmarking. Addison .CONCEPTS Concepts of Quality Control.Business Process Re-engineering –Zero Defect. Mass Market. UNIT II . Statistical Quality Assurance .10PMECSE12 SOFTWARE QUALITY ASSURANCE 3 0 0 100 UNIT I . Six Sigma. Muse Model. Sixth Edition. 1992.FUTURE TRENDS PSP and TSP. Statistical process control.

Characteristics of the Wireless Channel .Wireless Sensor Networks .Energy-Efficient Multicasting .Multicasting with Quality of Service Guarantees Application-Dependent Multicast Routing .Secure Routing in Ad Hoc Wireless Networks UNIT V-QoS AND ENERGY MANAGEMENT Introduction .MAC Layer Solutions .Comparisons of Multicast Routing Protocols UNIT IV.Technical Challenges .Design Goals of a Transport Layer Protocol for Ad Hoc Wireless Networks Classification of Transport Layer Solutions .Types of Ad hoc Mobile Communications .Network Security Requirements .Tree-Based Multicast Routing ProtocolsMesh-Based Multicast Routing Protocols .Network Layer Solutions QoS Frameworks for Ad Hoc Wireless Networks Energy Management in Ad Hoc Wireless Networks –Introduction .Issues in Designing a Routing Protocol for Ad Hoc Wireless Networks Classifications of Routing Protocols -Table-Driven Routing Protocols – Destination Sequenced Distance Vector (DSDV) .Signal Stability Routing (SSR) Location-Aided Routing (LAR) .Challenges Facing Ad Hoc Mobile Networks-Ad hoc wireless Internet UNIT II.Traffic Profiles .Radio Propagation Mechanisms .Power-Aware Routing (PAR) .Need for Energy Management in Ad Hoc Wireless 31 .Zone Routing Protocol (ZRP) UNIT III.Types of Mobile Host Movements .Components of Packet Radios – Ad hoc Wireless Networks -What Is an Ad Hoc Network? Heterogeneity in Mobile Devices .Issues in Designing a Multicast Routing Protocol .AD HOC ROUTING PROTOCOLS Introduction .An Architecture Reference Model for Multicast Routing Protocols Classifications of Multicast Routing Protocols .IEEE 802.Cluster Switch Gateway Routing (CSGR) .10PMECSE13 AD HOC NETWORKS 3 0 0 100 UNIT I -INTRODUCTION Introduction-Fundamentals of Wireless Communication Technology – The Electromagnetic Spectrum . SECURITY PROTOCOLS Introduction .TCP Over Ad Hoc Wireless Networks Other Transport Layer Protocols for Ad Hoc Wireless Networks .Issues in Designing a Transport Layer Protocol for Ad Hoc Wireless Networks .11a.Dynamic Source Routing (DSR) Temporally Ordered Routing Algorithm (TORA) .b Standard – Origin Of Ad hoc: Packet Radio Networks .TRANSPORT LAYER.Issues and Challenges in Security Provisioning .Wireless Routing Protocol (WRP) .Source-Initiated On-Demand Approaches .Key Management .Security in Ad Hoc Wireless Networks .MULTICASTROUTING IN AD HOC NETWORKS Introduction .Network Security Attacks .Issues and Challenges in Providing QoS in Ad Hoc Wireless Networks Classifications of QoS Solutions .Architecture of PRNETs .Summary of Tree-and Mesh-Based Protocols .Ad Hoc OnDemand Distance Vector Routing (AODV) .Operation of Multicast Routing Protocols .

. Ad Hoc Networking. Prentice Hall PTR . Ad Hoc Mobile Wireless Networks: Protocols and Systems. 2000 32 .Classification of Energy Management Schemes .Networks .S. Manoj “Ad Hoc Wireless Networks: Architectures and Protocols”. and B.Transmission Power Management Schemes . Prentice Hall PTR.System Power Management Schemes REFERENCES: Siva Ram Murthy C. Addison Wesley.2001 Charles E.Battery Management Schemes . Perkins.2004 Toh C.K.

.Stephen J. Padhrai Smyth And Ramasamy Uthurusamy. Databases. 1998.& OLAP”.Overview Of Data Mining Techniques. UNIT V.DATA PREPROCESSING AND ASSOCIATION RULES Data Preprocessing-Data Cleaning.. Alex Berson. 1997. "Data Warehousing In Action". Integration.Mining Association Rules In Large Databases.OLAP. Tata Mcgraw.10PMECSE14 DATA WAREHOUSING AND DATA MINING 3 0 0 100 UNIT I . John Wiley & Sons Inc.INTRODUCTION Relation To Statistics.-Need. "The Data Warehouse Life Cycle Toolkit".Data Mining Functionalities-Steps In Data Mining Process-Architecture Of A Typical Data Mining Systems. Micheline Kamber.PREDICTIVE MODELING Classification And Prediction: Issues Regarding Classification And PredictionClassification By Decision Tree Induction-Bayesian Classification-Other Classification Methods-Prediction-Clusters Analysis: Types Of Data In Cluster AnalysisCategorization Of Major Clustering Methods: Partitioning Methods –Hierarchical Methods UNIT IV.Categorization Of OLAP Tools. "Data Mining: Concepts and Techniques". 2004.. Morgan Kaufmann Publishers.Shapiro. Reduction.I. Usama M. “Data Warehousing. The M.Hill. Ralph Kimball. Sean Kelly. UNIT II. 33 . "Advances In Knowledge Discovery And Data Mining". John Wiley & Sons Inc. Transformation.-Mapping The Data Warehouse To Multiprocessor Architecture.APPLICATIONS Applications of Data Mining-Social Impacts Of Data Mining-Tools-An Introduction To DB Miner-Case Studies-Mining WWW-Mining Text Database-Mining Spatial Databases.Classification Of Data Mining Systems . Smith. Discretization Concept Hierarchies-Concept Description: Data Generalization And Summarization Based Characterization.DATA WAREHOUSING Data Warehousing Components -Multi Dimensional Data Model. 1996.Data Warehouse Architecture-Data Warehouse Implementation. REFERENCES: Jiawei Han. UNIT III.T Press. Data Mining. 2002. Gregory Piatetsky .Fayyad.

ANALYSIS OS Components – System Architecture – Workloads – Design – Simulation – Analysis -Database System Performance – Computer Networks Components – Simulation Modelling of LAN. Robertazzi.Fundamental Concepts and Performance Measures. “Computer Systems Performance Evaluation and Prediction”. 3rd Edition. Domenico Ferrari . Measurement & Tuning of Computer Systems –Prentice Hall Inc. UNIT II.INTRODUCTION Need for performance evaluation – Role of performance evaluation – performance evaluation Methods – Performance Metrics and Evaluation Criteria – CPU and I/O Architectures – Distributed and Network Architectures– Secondary Storage – Topologies – Computer Architecture . Springer. New York. 2003. “Computer Networks and Systems: Queing theory and Performance Evaluation”.Estimating Parameters and Distributions – Computational Methods – Simulation Process – Time Control – Systems and Modeling. UNIT V.Mories and Paul F.PROBABILITY AND STOCHASTIC PROCESSES Scheduling Algorithms – Workloads – Random Variables – Probability Distributions – Densities – Expectation – Stochastic Processes – Poisson Process – Birth-Death Process – Markov Process. 1983. Howard E. 1982. 2000. Thomas G. UNIT IV -PETRI NETS AND SYSTEM PERFORMANCE Petri Nets – Classical Petri Nets – Timed Petri Nets – Priority-based Petri Nets – Colored Petri Nets – Generalized Petri Nets – Tool Selection – Validation of Results – Performance Metrics – Evaluation – Multiple Server Computer System Analysis. Fortier. UNIT III. Giuseppe Serazzi .10PMECSE15 PERFORMANCE EVALUATION OF COMPUTER SYSTEMS AND NETWORKS 3 0 0 100 UNIT I. 34 . Elsvier Science (USA). Michael..Roth.QUEUING THEORY Queuing Systems – Networks of Queues . REFERENCES: Paul J. Computer Performance Evaluation. Tools and techniques.Alexandro Zeijher. Van Nostrand. Michael F.

2002.Nilsson.Intelligent Agents-Problem Solving-Searching Heuristics -Constraint Satisfaction Problems . 1999. 2nd Edition. “An Introduction to Multi Agent System”. Patrick Henry Winston.Foundations .10PMECSE16 AGENT BASED INTELLIGENT SYSTEMS 3 0 0 100 UNIT I.A Modern Approach”. Prentice Hall.J. AW. 35 . Artificial Intelligence.PLANNING AGENTS Planning Problem-State Space Search-Partial Order Planning-Graphs-Nondeterministic Domains-Conditional Planning-Continuous Planning-MultiAgent Planning.History . John Wiley.KNOWLEDGE REPRESENTATION AND REASONING Logical Agents-First order logic-First Order Inference-Unification-Chaining. Nils. 1992. UNIT V-HIGHER LEVEL AGENTS Knowledge in Learning-Relevance Information-Statistical Learning MethodsReinforcement Learning-Communication-Formal Grammar-Augmented GrammarsFuture of AI. UNIT IV -AGENTS AND UNCERTAINITY Acting under uncertainty – Probability Notation-Bayes Rule and use – Bayesian Networks-Other Approaches-Time and Uncertainty-Temporal Models. UNIT II.Resolution Strategies-Knowledge Representation-Objects-Actions-Events UNIT III. Narosa Publishing House.INTRODUCTION Definitions . “Artificial Intelligence .Game playing. Principles of Artificial Intelligence. 2002 Michael Wooldridge. III Edition.Utility Theory Decision Network – Complex Decisions. REFERENCES: Stuart Russell and Peter Norvig.

Perspective walls Cone trees and Cam trees . 1999. Benedikt. MIT Press.Formal Specification of Software DFD – Software Architecture. Cyberspace: First Steps. M. 3D Visualisation for Engineering Graphics.Legibility enhancement Hyper structure Visualisation .Rooms . UNIT V-SOFTWARE VISUALIZATION Rapid Prototyping .10PMECSE17 VISUALIZATION TECHNIQUES 3 0 0 100 UNIT I.Populated Information Terrains . UNIT IV.Sphere Visualisation .Fish eye views . Information Visualisation and Virtual Environment. Pauline Wills.VISUALIZATION SYSTEMS Database Visualisation .Information Visualisation.Benediktine Cyberspace Statistical Clustering and Proximity measures . Springer Verlag.Principles of 2D & 3D Computer Graphics . Prentice Hall.Spatial Data arrangements .Information Cube. Sheryl A Sorby exal.Benediktine Space .Emotical icons.City scopes . REFERENCES: Chaomei Chan.Human Centered Approaches .Models for user interaction . Hodder & Stoughton. 1999. 1998.Models and Simulation strategies.Hyper Structures .INTRODUCTION Introduction to Visualisation . UNIT III-ADVANCED TECHNIQUES Self-Organising graphs . Visualisation: A Beginner's Guide. 36 .POPULAR TECHNIQUES Surface Plots . 1991. UNIT II.

DATABASE MANAGEMENT Relational Data Model – SQL . Henry. UNIT II. REFERENCES: Philip M. “Database Management Systems”.Sudharsan.Models of Transactions – Architecture – Transaction Processing in a Centralized and Distributed System – TP Monitor. Tata McGraw Hill.Database Design . and S. Fundamentals of Database Systems.Entity-Relationship Model – Relational Normalization – Embedded SQL – Dynamic SQL – JDBC – ODBC. UNIT IV.Optimization and Research Issues.B. TMH.ADVANCED DATABASES Object Databases .QUERY AND TRANSACTION PROCESSING Query Processing Basics – Heuristic Optimization – Cost. Lewis. 2003 37 .Conceptual Object Data Model – XML and Web Data – XML Schema – Distributed Data bases – OLAP and Data Mining – ROLAP and MOLAP UNIT III. Abort and Media Failure – Recovery – Atomic Termination – Distributed Deadlock – Global Serialization – Replicated Databases – Distributed Transactions in Real World. 3rd Edition. 2002 Elmasri R. Addison Wesley. UNIT V. Korth. Addison-Wesley. 2004 Raghu Ramakrishnan & Johannes Gehrke.IMPLEMENTING AND ISOLATION Schedules – Concurrency Control – Objects and Semantic Commutativity – Locking – Crash.Database Tuning .. 4th Edition. Michael Kifer. Arthur Bernstein. F. Size Estimation . “Databases and Transaction Processing: An Application-Oriented Approach”. Database System Concepts. 3rd Edition. S. 2004 Abraham Silberschatz.10PMECSE18 ADVANCED DATABASES 3 0 0 100 UNIT I.Consistency . Navathe.DATABASE DESIGN ISSUES Security – Encryption – Digital Signatures – Authorization – Authenticated RPC Integrity .

3rd Edition.SOFTWARE MANAGEMENT PROCESS FRAMEWORK Lifecycle Phases – Artifacts of the Process – Model Based Software Architectures – Workflows of the Process – Checkpoints of the Process UNIT III. Data Analysis . Software Measures. “Managing Global Projects”. Bob Hughes.10PMECSE19 SOFTWARE PROJECT MANAGEMENT 3 0 0 100 UNIT I. Watts: “Managing the software process ". “Software Project Management”.SOFTWARE MANAGEMENT DISCIPLINES Iterative Process Planning . 2004 Humphrey. Data Gathering Process. 1989. Mikecotterell. Tata McGraw Hill. Ramesh Gopalaswamy. 2004. Tata McGraw Hill. 2001.Managing Software Quality – Defect Prevention UNIT V-CASE STUDIES COCOMO Cost Estimation Model – Change Metrics – CCPDS-R REFERENCES: Walker Royce “Software Project Management – A Unified Framework “. Addison Wesley.Organisation and Responsibilities – Process Automation – Process Control and Process Instrumentation – Tailoring the Process UNIT IV -MANAGED AND OPTIMIZED PROCESS Data Gathering and Analysis: Principles of Data Gathering. 38 . Pearson Education.INTRODUCTION Conventional Software Management – Evolution of Software Economics – Improving Software Economics – Conventional versus Modern Software Project Management UNIT II.

UNIT III.NET TECHNOLOGIES COM – Distributed COM – object reuse – interfaces and versioning – dispatch interfaces – connectable objects – OLE containers and servers – Active X controls – . Mayfield. John Wiley & Sons 1998 Corry.JAVA COMPONENT TECHNOLOGIES Threads – Java Beans – Events and connections – properties – introspection – JAR files – reflection – object serialization – Enterprise Java Beans – Distributed Object models – RMI and RMI-IIOP. 2nd Edition 2002.INTRODUCTION Software Components – objects – fundamental properties of Component technology – modules – interfaces – callbacks – directory services – component architecture – components and middleware. Solutions available for data storage. UNIT II. Tec media. Keith Duddy. Andreas Vogel. UNIT V. 1999 10PMECSE21 INFORMATION STORAGE AND MANAGEMENT UNIT I INTRODUCTION TO STORAGE TECHNOLOGY 3 0 0 100 Review data creation and the amount of data being created and understand the value of data to a business. “Enterprise Java Beans”.COMPONENT FRAMEWORKS AND DEVELOPMENT Connectors – contexts – EJB containers – CLR contexts and channels – Black Box component framework – directory objects – cross-development environment – component-oriented programming – Component design and implementation tools – testing tools . challenges in data storage and data management. Ed Roman.NET components .CORBA TECHNOLOGIES Java and CORBA – Interface Definition language – Object Request Broker – system object model – portable object adapter – CORBA services – CORBA component model – containers – Application server – model driven architecture. Role of each element in 39 . Core elements of a data center infrastructure.10PMECSE20 COMPONENT BASED TECHNOLOGY 3 0 0 100 UNIT I.assemblies – appdomains – contexts – reflection – remoting.3rd Edition. Wiley. REFERENCES: Clemens Szyperski.assembly tools. “COM/DCOM Primer Plus”. “Java Programming with CORBA”. 2004. Addison Wesley. UNIT IV -COM AND . 1st Edition. “Component Software: Beyond Object-Oriented Programming”. Cadman.

Understand the appropriateness of the different networked storage options for different application environments UNIT IV: INFORMATION AVAILABILITY & MONITORING & MANAGING DATACENTER List reasons for planned/unplanned outages and the impact of downtime. Concept of RAID and its components . NAS. 40 . replication technologies and their role in ensuring information availability and business continuity. components. RAID 0+1. Remote replication technologies and their role in providing disaster recovery and business continuity capabilities Identify key areas to monitor in a data center. RAID 5. and topologies of FC-SAN. Key management tasks in a data center UNIT V SECURING STORAGE AND STORAGE VIRTUALIZATION Information security. Virtualization technologies. Key metrics to monitor for different components in a storage infrastructure. Industry standards for data center monitoring and management.RTO and RPO. Different RAID levels and their suitability for different application environments: RAID 0. Identify single points of failure in a storage infrastructure and list solutions to mitigate these failures .Major physical components of a disk drive and their function. Impact of downtime.Physical and logical components of a connectivity environment . and IP-SAN .supporting business activities UNIT II STORAGE SYSTEMS ARCHITECTURE Hardware and software components of the host environment. Storage security domains. RAID 1+0.High-level architecture and working of an intelligent storage system UNIT III: INTRODUCTION TO NETWORKED STORAGE Evolution of networked storage. RAID 1. List and analyzes the common threats in each domain. Architecture. Information Storage and Management. RAID 6. RAID 3. and performance Implications. RAID 4. block-level and file-level virtualization technologies and processes Reference Books: EMC Corporation. Differentiate between business continuity (BC) and disaster recovery (DR) . ISBN number: 04702942134. access characteristics. Compare and contrast integrated and modular storage systems . Benefits of the different networked storage options. Wiley. Understand the need for long-term archiving solutions and describe how CAS fulfills the need . Key protocols and concepts used by each component . logical constructs of a physical disk. Architecture of backup/recovery and the different backup/recovery topologies . Critical security attributes for information systems.

Storage Area Network Fundamentals.Universal Description.The Birth of J2EE .Databases .Web Services Description Language (WSDL) Reference Book: Budi Kurniawan. 2002. Mc-Graw Hill. 41 . Meeta Gupta.The Java API for XML Registries (JAXR) . 2002.Java Interface Definition Language and CORBA. “J2EE . “Storage Networks: The Complete Reference“. JSP.The complete Reference”.Robert Spalding.Java servlets . Tata McGraw Hill .The Maturing of Java . Osborne. 2002 James Keogh.Java Beans and Java Message Service . Robert McGovern and Stuart Charlton. “Building Storage Networks”.Java Server Pages UNIT III JAVA INTERFACES Enterprise JavaBeans . and Integration (UDDI) Electronic Business XML . Discovery. Pearson Education Limited. “CodeNotes for J2EE: EJB. JDBC.Why J2EE? J2EE Multi-Tier Architecture .J2EE Best Practices J2EE Design Patterns and Frameworks UNIT II JAVA SERVER PAGES J2EE FOUNDATION . and EJB”.Java Naming and Directory Interface API UNIT V WEBSERVICES Web Services . UNIT IV JAVA RMI AND SECURITY Java Remote Method Invocation .Osborne. Tata McGraw Hill . 10PMECSE22 ENTERPRISE JAVA (J2EE) 3 0 0 100 UNIT I INTRODUCTION J2EE and J2SE . 2002.SOAP . 2003.” Java for the Web with Servlets. JSP. Random House. New Riders Publishing. 2001.Java Message Service – Security .JavaMail API . Marc Farley. and Servlets” .

and Servlets” .Working with XML Data – Working with Scripting Elements Reference Books: Marty Hall and Larry Brown.” Java for the Web with Servlets.Servlet Architecture – Simple Java servlet. Random House.Working with Cookies.Login System's Logic -Create a Registration Form -Validate Form Data -Store and Retrieve Session Data -Forward a User from One JSP Page to Another -Update a Database with User Data UNIT III PERSONALIZATION AND SESSION MANAGEMENT Plan a Personalization System -Store Data in a Cookie -Retrieve and Use Cookie Data -Test for Live Session Data -Destroy a Session.10PMECSE23 JSP AND SERVLET 3 0 0 100 UNIT I SERVLET BASICS HTTP Basics . and EJB”.Internationalization UNIT V ENTERPRISE JAVA BEANS Build a JavaBean that Creates a Database Connection.Setting up the JSP Environment .Build a JavaBean that Closes a Database Connection -Create a JavaBean that Updates the Database -Use JavaBean in JSP Page .Error Handling and Debugging UNIT IV DATABASE CONNECTION Plan the Display of Dynamic Content -Display Database Results in Manageable Groups -Enable Navigation for Long Record Sets.Tracking Sessions UNIT II JSP BASICS JSP Overview .Common Navigation Bar Dynamically Change the Display of Common Navigation Elements . 2002 Robert McGovern and Stuart Charlton. 2002. 42 .”Core Servlets and Java Server Pages”Prentice hall. JSP. “CodeNotes for J2EE: EJB.2004 Budi Kurniawan. New Riders Publishing. JDBC.Common Gateway Interface Programming –Servlet vs Common Gateway Interface . JSP.Reading HTTP Request Headers – Sending Data to a Client and writing the HTTP Response Header.Anatomy of Java servletDeployment Descriptor – Reading Data from a client.

43 .

Sign up to vote on this title
UsefulNot useful