me_cse_ - from iii sem

Upload: priya-srihari

Post on 06-Apr-2018

224 views

Category:

Documents


0 download

TRANSCRIPT

  • 8/3/2019 ME_CSE_ - from III Sem

    1/40

    ANNA UNIVERSITY COIMBATORE

    M.E.COMPUTER SCIENCE AND ENGINEERING

    CURRICULUM 2007 - FULL TIME MODE

    SEMESTER II

    Code No. Course Title L T P M C

    TheoryDatabase Technology 3 0 0 100 3Compiler Design 3 1 0 100 4Object Oriented System Design 3 0 2 100 5Web Technology 3 0 0 100 3Information Security 3 0 0 100 3

    Elective I 3 0 0 100 3Practical

    Database Technology Lab 0 0 3 100 1.5

    Web Technology Lab 0 0 3 100 1.5

    SEMESTER III

    Code No. Course Title L T P M C

    TheoryElective II 3 0 0 100 3Elective III 3 0 0 100 3

    Elective IV 3 0 0 100 3Research Methodologies 3 0 0 100 3

    PracticalProject Phase - I 0 0 3 100 1.5

    Technical Seminar 0 0 3 100 1.5

    SEMESTER IV

    Code No. Course Title L T P M

    Project Phase - II 0 0 12 600

  • 8/3/2019 ME_CSE_ - from III Sem

    2/40

    LIST OF ELECTIVES

    M.E.COMPUTER SCIENCE AND ENGINEERING

    Code No. Course Title

    Advanced JAVA ProgrammingTheory of ComputationAgent Based Intelligent SystemsDigital ImagingData Warehousing and Data MiningMobile ComputingReal Time Embedded SystemsDigital Image ProcessingSoft ComputingDistributed ComputingGrid Computing

    Network SecurityBio InformaticsSoftware Quality AssuranceAd hoc NetworksMultimedia SystemsPerformance Evaluation of Computer Systems and NetworksXML and Web ServicesVisualization TechniquesAdvanced DatabasesSoftware Project ManagementComponent Based TechnologyAdvanced AlgorithmsCreative ThinkingNeural Networks, Architecture and ApplicationsAdvanced NetworksE Commerce TechnologyMicroprocessor Based System DesignAdvanced Network SecuritySemantic WebNatural Language ProcessingWireless Sensor Networks

    Hi Speed NetworksInformation RetrievalPervasive ComputingOpen Source SystemsService Oriented Architecture

  • 8/3/2019 ME_CSE_ - from III Sem

    3/40

    DATA BASE TECHNOLOGY 3 0 0 100 3

    1. DATA BASE SYSTEM CONCEPT 10

    File systems - Database systems - Database systems architecture - Data models -Relational model Hierarchical model - Network model - Entity-Relationship model -Data Dictionary - Database Administration and control.

    2. RELATIONAL DATABASES 9

    Codd's rules - Base tables - Views - Domains and key concept - Integrity rules -

    Relational Algebra Relational calculus - Commercial query languages - EmbeddedSQL - Normalization and database design.

    3. DATABASE SYSTEM DESIGN 8

    File and storage structures - Indexing and Hashing - Query processing - Database

    recovery - Concurrency control - Transaction processing - Security and Integrity -Triggers.

    4. DISTRIBUTED DATABASES 9

    Centralized versus distributed databases - Fragmentation - Distributed database

    architecture - Client / Server databases - Distributed transactions - Locking and Commitprotocols - Distributed concurrency Control Security and reliability - Parallel databases.

    5. ADVANCED DATABASES 9

    The World Wide Web - Object oriented database - Object Relational database - XML,

    XML/QL - Data Analysis and OLAP - Data mining - Data warehousing.

    Total No of periods: 45REFERENCE BOOKS:

    1. Abraham Silberschatz, Henry. F. Korth, S.Sudharsan, Database System Concepts,5

    thEdition, Tata McGraw Hill, 2005.

    2. Ramez Elmasri, Shamkant B. Navathe, Fundamentals of Database Systems, 5rdEdition, Addison Wesley, 2006.

    3. Jim Buyens, Step by Step Web Database Development, PHI, 2001.4. Stefano Ceri & Giuesppe Pelagatti, Distributed Databases - Principles and

    Systems, McGraw Hill Book Company, 1987.5. C.J.Date, An Introduction to Database system, Pearson Education, 7th Edition,

    2003

  • 8/3/2019 ME_CSE_ - from III Sem

    4/40

    COMPILER DESIGN 3 1 0 100 4

    1. INTRODUCTION 9

    Basic concepts - Grammar - Language - Parts of a compiler Grouping of phases -Compiler construction tools.

    2. LEXICAL ANALYZER 9

    Role of a lexical analyzer Input buffering - Specification and recognition of tokens -Finite automata - Regular expression to finite automation Optimization of DFA-based

    pattern matchers-Use of a tool for generating lexical analyzer.

    3. SYNTAX ANALYZER 9

    Role of a parser - Context-free grammars - Top-down parsing - Bottom-up parsing - Useof a tool to generate parsers.

    4. INTERMEDIATE CODE GENERATION 9

    Intermediate languages - Declaration - Assignment statements - Boolean expressions -

    Flow control statements Back patching.

    5. CODE GENERATION 9

    Introduction to optimization techniques - Issues in the design of a code generator - Run-time storage management - Design of a simple code generator.

    Total No of periods: 45

    REFERENCE BOOKS:

    1. A.V. Aho, Ravi Sethi, J.D. Ullman, Compilers - Principles, Techniques andTools, Addison- Wesley, 2003.

    2. Fischer Leblanc, Crafting Compiler, Benjamin Cummings, Menlo Park, 1988.3. Kennath C.Louden, Compiler Construction Principles and Practice, Vikas

    publishing House, 2004.4. Allen I. Holub, Compiler Design in C, Prentice Hall of India, 2001.

  • 8/3/2019 ME_CSE_ - from III Sem

    5/40

    OBJECT ORIENTED SYSTEM DESIGN

    3 0 2 100 5

    1. OBJECT ORIENTED DESIGN FUNDAMENTALS 9

    The Object Model Classes And Objects - Complexity Of Software Classification Notation Process Pragmatics Binary And Entity Relationship Object Types

    Object State OOSD Life Cycle.

    2. OBJECT ORIENTED METHODOLOGIES AND UML 9

    Object Oriented Methodology: Rumbaugh, Booch, Jacobson, Shaler/Mellor,Coad/Yardon Patterns Frame Works The Unified Approach UML

    3. OBJECT ORIENTED ANALYSIS 9

    Identify Use Cases Use Case Model Documentation Classification Identifying

    Classes Noun Phrases Approach Common Class Pattern Approach Use Case DrivenApproach Identifying Object Relationship, Attributes And Models.

    4. OBJECT ORIENTED DESIGN 9

    Design Process Design Axioms Designing Classes Access Layer Design ViewLayer Design.

    5. MANAGING OBJECT ORIENTED DEVELOPMENT 9

    Managing Analysis And Design Evaluation Testing Coding Maintenance Metrics

    Case Study: Foundation Class Library Client/Server Computing.

    Total No. Of Periods: 45

    REFERENCE BOOKS:1. Ali Bahrami, Object Oriented System Development, Mc Graw Hill International

    Edition, 1999.2. Larman, Applying UML & Patterns: An Introduction to Object Oriented Analysis

    and Design, Pearson Education, 2nd

    Edition, 2003.3. Bernd Bruegge, Allen H. Dutoit, Object Oriented Software Engineering using

    UML, Patterns and Java, Pearson Education 2nd

    Edition 2004.

  • 8/3/2019 ME_CSE_ - from III Sem

    6/40

    WEB TECHNOLOGY 3 0 0 100 3

    1. INTRODUCTION 9

    Introduction Network concepts Web concepts Internet addresses - Retrieving Datawith URL HTML DHTML: Cascading Style Sheets - Scripting Languages: Javascript

    Vbscript.

    2. COMMON GATEWAY INTERFACE 9

    Common Gateway Interface: Programming CGI Scripts HTML Forms CustomDatabase Query Scripts Server Side Includes Server security issues XML.

    3. JAVA PROGRAMMING 9

    Java fundamentals: Classes Inheritance Packages Interfaces Exceptions Handling

    Multi threading - Applets

    4. SERVER SIDE PROGRAMMING 9

    Server side Programming Active server pages Java server pages Java Servlets:Servlet container Exceptions Sessions and Session Tracking Using Servlet context

    Dynamic Content Generation Servlet Chaining and Communications.

    5. APPLICATIONS 9

    Simple applications Internet Commerce Database connectivity Online databases EDI Applications in Business Plug-ins Firewalls

    Total No. of Periods: 45

    REFERENCE BOOKS:

    1. Deitel, Deitel and Neito, INTERNET and WORLD WIDE WEB How to

    program, Pearson education asia, 2002

    2. D.Norton and H. Schildt, Java 2: The complete Reference, Fifth Edition,TMH.

    3. Elliotte Rusty Herold , Java Network Programming, OReilly Publications, 3rd

    Edition, 2004.

    4. Eric Ladd and Jim ODonnell, et al, USING HTML 4, XML, and JAVA1.2, PHI

    publications, 2003.

    5. Jeffy Dwight, Michael Erwin and Robert Nikes USING CGI, PHI Publications,

    1997

  • 8/3/2019 ME_CSE_ - from III Sem

    7/40

    INFORMATION SECURITY 3 0 0 100 3

    UNIT 1 INTRODUCTION 9

    History, What is Information Security?, Critical Characteristics of Information, NSTISSCSecurity Model, Components of an Information System, Securing the Components,Balancing Security and Access, The SDLC, The Security SDLC

    UNIT II SECURITY INVESTIGATION 9

    Need for Security, Business Needs, Threats, Attacks, Legal, Ethical and ProfessionalIssues

    UNIT III SECURITY ANALYSIS 9

    Risk Management: Identifying and Assessing Risk, Assessing and Controlling Risk

    UNIT IV LOGICAL DESIGN 9Blueprint for Security, Information Security Poicy, Standards and Practices, ISO

    17799/BS 7799, NIST Models, VISA International Security Model, Design of SecurityArchitecture, Planning for Continuity

    UNIT V PHYSICAL DESIGN 9

    Security Technology, IDS, Scanning and Analysis Tools, Cryptography, Access ControlDevices, Physical Security, Security and Personnel

    TOTAL : 45

    REFERENCE BOOKS1. Michael E Whitman and Herbert J Mattord, Principles of Information Security,

    Vikas Publishing House, New Delhi, 20042. Micki Krause, Harold F. Tipton, Handbook of Information Security

    Management, Vol 1-3 CRC Press LLC, 2004.3. Stuart Mc Clure, Joel Scrambray, George Kurtz, Hacking Exposed, Tata

    McGraw-Hill, 20034. Matt Bishop, Computer Security Art and Science, Pearson/PHI, 2005.

  • 8/3/2019 ME_CSE_ - from III Sem

    8/40

    DATABASE AND WEB TECHNOLOGY LAB 3 0 0 100 3

    1. Study of all SQL commands

    2. Implement the concept of Normalization

    3. Implement the inventory control system with a reorder level

    4. Develop a package for a bank to maintain its customer details

    5. Develop a package for the payroll of a company

    6. Web Page Creation using HTML and DHTM and Client side Scripting

    Languages

    7. Write a application/GUI program in java for getting time and data information

    from the server using TCP/UDP

    8. Write a program in java to implement Database Connectivity

    9. Write a JSP program for order processing

    10.Write a Servlet, bean program to access information from databases

    11.Write a ASP program using the components

  • 8/3/2019 ME_CSE_ - from III Sem

    9/40

    ELECTIVES

    ADVANCED JAVA PROGRAMMING 3 0 0 100 3

    UNIT I JAVA FUNDAMENTALS 9

    Java I/O streaming - filter and pipe streams - Byte Code interpretation - reflection -

    Dynamic Reflexive Classes - Threading - Java Native Interfaces- Swing.

    UNIT II NETWORK PROGRAMMING IN JAVA 9

    Sockets - secure sockets - custom sockets - UDP datagrams - multicast sockets - URLclasses - Reading Data from the server - writing data - configuring the connection -

    Reading the header - telnet application - Java Messaging services

    UNIT III APPLICATIONS IN DISTRIBUTED ENVIRONMENT 9

    Remote method Invocation - activation models - RMI custom sockets - ObjectSerialization - RMI - IIOP implementation - CORBA - IDL technology - NamingServices - CORBA programming Models - JAR file creation

    UNIT IV MULTI-TIER APPLICATION DEVELOPMENT 9

    Server side programming - servlets - Java Server Pages - Applet to Applet

    communication - applet to Servlet communication - JDBC - Using BLOB and CLOBobjects - storing Multimedia data into databases - Multimedia streaming applications -

    Java Media Framework.

    UNIT V ENTERPRISE APPLICATIONS 9Server Side Component Architecture - Introduction to J2EE - Session Beans - Entity

    Beans - Persistent Entity Beans - Transactions.

    TOTAL : 45

    REFERENCE BOOKS

    1. Elliotte Rusty Harold, Java Network Programming, OReilly publishers,

    3rd

    Edition, 2004. (UNIT II)

    2. Ed Roman, Mastering Enterprise Java Beans, John Wiley & Sons Inc., 2001.(UNIT III and UNIT V)

    3. Hortsmann & Cornell, CORE JAVA 2 ADVANCED FEATURES, VOL II,Pearson Education, 2002. (UNIT I and UNIT IV)

    4. Web reference: http://java.sun.com.5. Patrick Naughton, COMPLETE REFERENCE: JAVA2, Tata McGraw-Hill,

    2003.

  • 8/3/2019 ME_CSE_ - from III Sem

    10/40

    THEORY OF COMPUTATION 3 0 0 100 3

    1. FINITE AUTOMATA AND REGULAR LANGUAGES 9

    Finite Automata and Regular languages - Regular expressions and Regular languages

    non determinism and Kleenes theorem, Equivalence of DFA and NFA, FiniteAutomation with e-moves, equivalence of regular expression and NFA with e-moves pumping lemma for regular sets.

    2. CONTEXT FREE LANGUAGES 9

    Context free languages, Derivation and languages, Relationship between derivation andderivation trees, Simplification of context free grammars Normal forms for context free

    grammars, CNF, and GNF.

    3. PUSH DOWN AUTOMATA (PDA) 9Acceptance by PDA, Pushdown automata and Context free languages, Pumping lemma

    for CFL, deterministic Context free languages and Deterministic pushdown automata.

    4. TURING MACHINE 9Context sensitive languages and LBA, Turing machine (Definition and examples),

    Computable languages and functions, Church Turing hypothesis, Universal Turingmachine, P and NP problems, NP-complete.

    5. UNSOLVABLE PROBLEMS 9

    Unsolvable problems - Rice Theorem - Post's correspondence Problem, Recursive andrecursively enumerable languages.

    Total No of periods: 45

    REFERENCE BOOKS:1. Hopcroft and Ullman, Introduction to Automata, Languages and Computation,

    Pearson Education, 2nd

    Edition, 20062. A. M. Natarajan, A. Tamilarasi & P. Balasubramani, Theory of

    Computation, New age International publishers, 20023. John.C.Martin, Introduction to languages and the Theory of Computation, 2nd

    Edition, McGraw Hill,19974. K.L.P.Mishra, N.Chandrasekaran, Theory of Computation, EEE, Prentice Hall

    of India, 3rd

    Edition, 2007.5. Peter Linz, An Introduction to formal languages and Automata, Narosa

    Publishing House, 3rd

    Edition, 2001.6. Harry R. Lewis, Christos H. Papadimitriou, Elements of Theory of

    Computation, Prentice Hall, 2002.

  • 8/3/2019 ME_CSE_ - from III Sem

    11/40

    SOFT COMPUTING 3 0 0 100 3

    1. NEURAL NETWORK 11Fundamentals Basic Concepts Backpropogation Network: Architecture, Learning,

    Illustration, Applications, Effects of tuning parameter, Selection of parameters Variations

    of Standard Backpropagation Algorithm -Research Directions Associative Memory:Autocorrelators - Heterocorrelators: Kosko's Discrete BAM - Wang et al.'s MultipleTraining Encoding Strategy - Exponential BAM - Associative Memory for Real-coded

    Pattern Pairs - Applications Recent Trends Adaptive Resonance Theory - Introduction ART 1 and 2- Application Sensitiveness of ordering data

    2. FUZZY LOGIC 7

    Fuzzy Set Theory : Fuzzy versus Crisp - Crisp sets - Fuzzy Sets - Crisp Relations - FuzzyRelations Fuzzy Systems - Crisp Logic - Predicate Logic - Fuzzy Logic - Fuzzy Rule

    based System - Defuzzification Methods Applications

    3. GENETIC ALGORITHMS 9Genetic Algorithms: History - Basic Concepts - Creation of Offspring - Working

    Principle - Encoding -Fitness Function -Reproduction Genetic Modeling: InheritanceOperators Cross Over - Inversion and Deletion - Mutation Operator - Bit-wise Operators

    - Applications Multilevel Optimization - Real Life Problem - Differences andSimilarities between GA and Other Traditional Methods Advances in GA

    4. HYBRID SYSTEMS I 9Hybrid Systems - Neural Networks, Fuzzy Logic and Genetic Algorithms Hybrids -

    Preview of the Hybrid Systems to be Discussed GA Based BPN - GA Based WeightDetermination - Applications Fuzzy - LR-type Fuzzy Architecture - Learning -

    Inference -Applications Simplified Fuzzy ARTMAP - Introduction -Working Application- Recent Trends

    5. HYBRID SYSTEMS II 9FAM: Introduction - Single Association FAM - Fuzzy Hebb FAMs -FAM Involving a

    Rule Base - FAM Rules with Multiple Antecedents/Consequents -Applications FuzzyLogic Controlled GA - Soft Computing Tools - Problem Description of Optimum Design

    Fuzzy Constraints - Illustrations - GA in Fuzzy Logic Controller Design

    Total No. of Periods: 45

    REFERENCES:

    1. S.Rajasekaran and G.A.V.Pai,Neural Networks, Fuzzy Logic and GeneticAlgorithms,PHI,2004.

    2. J.S.R.Jang, C.T.Sun and E.Mizutani, Neuro-Fuzzy and Soft Computing, PHI,Pearson Education 2004.

    3. Timothy J.Ross,Fuzzy Logic with Engineering Application , McGraw Hill,2000.

    4. Davis E.Goldberg,Genetic Algorithms:Search, Optimization and MachineLearningAddison Wesley, N.Y.,2003.

    5. R.Eberhart, P.simpson and R.Dobbins,Computional Intelligence PC Tools,APProfessional,Boston 1996.

  • 8/3/2019 ME_CSE_ - from III Sem

    12/40

    MOBILE COMPUTING

    3 0 0 100 3

    1. INTRODUCTION 9

    Medium Access Control : Motivation for Specialized MAC- SDMA- FDMA- TDMA-

    CDMA- Comparison of Access mechanisms Tele communications : GSM- DECT-TETRA UMTS- IMT-200 Satellite Systems: Basics- Routing- Localization-

    Handover- Broadcast Systems: Overview Cyclic Repetition of Data- Digital AudioBroadcasting Digital Video Broadcasting

    2. WIRELESS NETWORKS 9

    Wireless LAN: Infrared Vs Radio Transmission Infrastructure Networks- Ad hoc

    Networks- IEEE 802.11 HIPERLAN Bluetooth- Wireless ATM: Working Group-

    Services- Reference Model Functions Radio Access Layer Handover- LocationManagement- Addressing Mobile Quality of Service- Access Point Control Protocol

    3. MOBILE NETWORK LAYER 9

    Mobile IP : Goals Assumptions and Requirement Entities IP packet Delivery-Agent Advertisement and Discovery Registration Tunneling and Encapsulation

    Optimization Reverse Tunneling IPv6 DHCP- Ad hoc Networks

    4. MOBILE TRANSPORT LAYER 9

    Traditional TCP- Indirect TCP- Snooping TCP- Mobile TCP- Fast retransmit/ FastRecovery- Transmission/ Timeout Freezing Selective Retransmission- Transaction

    Oriented TCP

    5. WAP 9

    Architecture Datagram Protocol- Transport Layer Security- Transaction Protocol-Session Protocol- Application Environment-Wireless Telephony Application

    Total No of Periods: 45

    REFERENCE BOOKS

    1. J.Schiller, Mobile Communication, Addison Wesley, 2000.2. William Stallings, Wireless Communication and Networks, Pearson Education, 2003.3. Singhal, WAP-Wireless Application Protocol, Pearson Education, 20034. Lother Merk, Martin. S. Nicklaus and Thomas Stober, Principles of Mobile

    Computing, Second Edition, Springer, 2003.

    5. William C.Y.Lee, Mobile Communication Design Fundamentals, John Wiley, 1993.

  • 8/3/2019 ME_CSE_ - from III Sem

    13/40

    DISTRIBUTED COMPUTING 3 0 0 100 3

    1. INTRODUCTION 9

    Characterization of Distributed Systems - Examples - Resource Sharing and the Web -

    Challenges - System Models - Architectural and Fundamental Models - Networking andInternetworking - Types of Networks - Network Principles - Internet Protocols - CaseStudies.

    2. PROCESSES AND DISTRIBUTED OBJECTS 9

    Interprocess Communication - The API for the Internet Protocols - External DataRepresentation and Marshalling - Client-Server Communication - Group Communication

    - Case Study - Distributed Objects and Remote Invocation - Communication BetweenDistributed Objects - Remote Procedure Call - Events and Notifications - Java RMI -

    Case Study.

    3. OPERATING SYSTEM ISSUES I 9The OS Layer - Protection - Processes and Threads - Communication and Invocation

    OS Architecture - Security - Overview - Cryptographic Algorithms - Digital Signatures -Cryptography Pragmatics - Case Studies - Distributed File Systems - File Service

    Architecture - Sun Network File System - The Andrew File System

    4. OPERATING SYSTEM ISSUES II 9Name Services -Domain Name System - Directory and Discovery Services - Global

    Name Service - X.500 Directory Service - Clocks, Events and Process States -Synchronizing Physical Clocks - Logical Time And Logical Clocks - Global States -

    Distributed Debugging - Distributed Mutual Exclusion Elections MulticastCommunication Related Problems.

    5. DISTRIBUTED TRANSACTION PROCESSING 9

    Transactions - Nested Transactions - Locks - Optimistic Concurrency Control -Timestamp Ordering - Comparison - Flat and Nested Distributed Transactions - Atomic

    Commit Protocols - Concurrency Control in Distributed Transactions - DistributedDeadlocks - Transaction Recovery - Overview of Replication And Distributed

    Multimedia SystemsTotal No of Periods: 45

    REFERENCE BOOKS:1. George Coulouris, Jean Dollimore and Tim Kindberg, Distributed Systems Concepts and

    Design, Pearson Education, 3rd Edition, 2002.

    2. Sape Mullender, Distributed Systems, Addison Wesley, 2nd Edition, 1993.3. Albert Fleishman, Distributes Systems- Software Design and Implementation, Springer-

    Verlag, 1994

    4. M.L.Liu, Distributed Computing Principles and Applications, Pearson Education, 2004.5. Andrew S Tanenbaum , Maartenvan Steen,Distibuted Systems Principles and

    Pardigms,Pearson Education, 2002

    6. Mugesh Singhal,Niranjan G Shivaratri,Advanced Concepts in Operating Systems,TataMcGraw Hill Edition, 2001

  • 8/3/2019 ME_CSE_ - from III Sem

    14/40

    MULTIMEDIA SYSTEMS 3 0 0 100 3

    1. INTRODUCTION AND QOS 9

    Introduction-QOS Requirements and Constraints-Concepts-Resources- EstablishmentPhase-Run-Time Phase-Management Architectures.

    2. OPERATING SYSTEMS 9

    Real-Time Processing-Scheduling-Interprocess Communication-Memory andManagement-Server Architecture-Disk Management.

    3. FILE SYSTEMS AND NETWORKS 9

    Traditional and Multimedia File Systems-Caching Policy-Batching-Piggy backing-

    Ethernet-Gigabit Ethernet-Token Ring-100VG AnyLAN-Fiber Distributed Data Interface(FDDI)- ATM Networks-MAN-WAN.

    4. COMMUNICATION 9

    Transport Subsystem-Protocol Support for QOS-Transport of Multimedia-Computer

    Supported Cooperative Work-Architecture-Session Management-MBone Applications.

    5. SYNCHRONIZATION 9

    Synchronization in Multimedia Systems-Presentation-Synchronization Types-MultimediaSynchronization Methods-Case Studies-MHEG-MODE-ACME.

    Total No of periods: 45

    REFERENCE BOOKS:

    1. Ralf Steinmetz and Klara Nahrstedt, Multimedia Systems, Springer, I Edition 2004.2. Ralf Steinmetz and Klara Nahrstedt , Media Coding and Content Processing, Prentice

    hall, 2002.3. Vaughan T, Multimedia, Tata McGraw Hill, 1999.4. Mark J.B., Sandra K.M., Multimedia Applications Development using DVI

    technology, McGraw Hill, 1992.

    5. K. R. Rao, Zoran S. Bojkovic, Dragorad A. Milovacovic, D. A. Milovacovic ,Multimedia Communication Systems: Techniques, Standards, and Networks, Prentice

    Hall, 1st

    Edition, 20026. Ze-Nian Li and Mark S. Drew, Fundamentals of Multimedia, Pearson, 2004.

  • 8/3/2019 ME_CSE_ - from III Sem

    15/40

    XML AND WEB SERVICES 3 0 0 100 3

    1. INTRODUCTION 9

    Role Of XML XML and The Web XML Language Basics SOAP Web Services

    Revolutions Of XML Service Oriented Architecture (SOA).

    2. XML TECHNOLOGY 9

    XML Name Spaces Structuring With Schemas and DTD Presentation Techniques

    Transformation XML Infrastructure.

    3. SOAP 9

    Overview Of SOAP HTTP XML-RPC SOAP: Protocol Message Structure Intermediaries Actors Design Patterns And Faults SOAP With Attachments.

    4. WEB SERVICES 9

    Overview Architecture Key Technologies - UDDI WSDL ebXML SOAP AndWeb Services In E-Com Overview Of .NET And J2EE.

    5. XML SECURITY 9

    Security Overview Canonicalization XML Security Framework XML Encryption

    XML Digital Signature XKMS Structure Guidelines For Signing XML Documents XML In Practice.

    Total No. of Periods: 45

    REFERENCE BOOKS:1. Frank. P. Coyle, XML, Web Services And The Data Revolution, Pearson Education,

    2002.2. Ramesh Nagappan , Robert Skoczylas and Rima Patel Sriganesh, Developing Java

    Web Services, Wiley Publishing Inc., 2004.3. Sandeep Chatterjee, James Webber, Developing Enterprise Web Services, Pearson

    Education, 2004.4. McGovern, et al., Java Web Services Architecture, Morgan Kaufmann

    Publishers,2005.

  • 8/3/2019 ME_CSE_ - from III Sem

    16/40

    BIO INFORMATICS 3 0 0 100 3

    1. INTRODUCTION 7

    The Central Dogma Killer Application Parallel Universes Watsons Definition Top Down Vs Bottom Up Approach Information Flow Conversance Communications.

    2. DATABASE AND NETWORKS 9

    Definition Data Management Data Life Cycle Database Technology Interfaces

    Implementation Networks: Communication Models Transmission Technology Protocols Bandwidth Topology Contents Security Ownership Implementation.

    3. SEARCH ENGINES AND DATA VISUALIZATION 10

    Search Process Technologies Searching And Information Theory Computational

    Methods Knowledge Management Sequence Visualizations StructureVisualizations User Interfaces Animation Vs Simulation

    4. STATISTICS, DATA MINING AND PATTERN MATCHING 11

    Statistical Concepts Micro Arrays Imperfect Data Basics Quantifying

    Randomness Data Analysis Tools Selection Alignment Clustering Classification Data Mining Methods Technology Infrastructure Pattern Recognition Discovery

    Machine Learning Text Mining Pattern Matching Fundamentals Dot MatrixAnalysis Substitution Matrix Dynamic Programming Word Method Bayesian

    Method Multiple Sequence Alignment Tools.

    5. MODELING SIMULATION AND COLLABORATION 8

    Drug Discovery Fundamentals Protein Structure System Biology Tools Collaboration And Communication Standards Issues Case Study.

    Total No. Of Periods: 45

    REFERENCE BOOKS:1. Bryan Bergeron, Bio Informatics Computing, Prentice Hall, 2003.2. T.K. Affward, D.J. Parry Smith, Introduction to Bio Informatics, Pearson

    Education, 2001.

    3. Pierre Baldi, Soren Brunak, Bio Informatics The Machine Learning Approach,2

    ndEdition, First East West Press, 2003

  • 8/3/2019 ME_CSE_ - from III Sem

    17/40

    GRID COMPUTING 3 0 0 100 3

    1. GRID COMPUTING 9

    Introduction - Definition - Scope of grid computing

    2. GRID COMPUTING INITIATIVES 9

    Grid Computing Organizations and their roles Grid Computing analog GridComputing road map.

    3. GRID COMPUTING APPLICATIONS 9

    Merging the Grid sources Architecture with the Web Devices Architecture.

    4. TECHNOLOGIES 9

    OGSA Sample use cases OGSA platform components OGSI OGSA Basic

    Services.

    5. GRID COMPUTING TOOL KITS 9

    Globus Toolkit Architecture, Programming model, High level services OGSI .Netmiddleware Solutions.

    Total no. periods: 45

    REFERENCE BOOKS:

    1. Joshy Joseph & Craig Fellenstein, Grid Computing, PHI, PTR-2003.2. Ahmar Abbas, Grid Computing: A Practical Guide to technology and Applications,

    Charles River media 2003.

  • 8/3/2019 ME_CSE_ - from III Sem

    18/40

    NETWORK SECURITY 3 0 0 100 3

    1. INTRODUCTION 9

    Attacks - Services - Mechanisms - Conventional Encryption - Classical And ModernTechniques Encryption Algorithms - Confidentiality.

    2. PUBLIC KEY ENCRYPTION 9

    RSA - Elliptic Curve Cryptography - Number Theory Concepts

    3. MESSAGE AUTHENTICATION 9

    Hash Functions - Digest Functions - Digital Signatures - Authentication Protocols.

    4. NETWORK SECURITY PRACTICE 9

    Authentication, Applications - Electronic Mail Security - IP Security - Web Security.

    5. SYSTEM SECURITY 9

    Intruders Viruses Worms Firewalls Design Principles Trusted Systems.

    Total No. of Periods: 45

    REFERENCE BOOKS:

    1. Stallings, Cryptography & Network Security - Principles & Practice, PrenticeHall, 3

    rdEdition 2002.

    2. Bruce, Schneier, Applied Cryptography, 2nd Edition, Toha Wiley & Sons, 1996.3. Man Young Rhee, Internet Security, Wiley, 2003.4. Pfleeger & Pfleeger, Security in Computing, Pearson Education, 3rd Edition,

    2003.

  • 8/3/2019 ME_CSE_ - from III Sem

    19/40

    EMBEDDED SYSTEMS 3 0 0 100 3

    1. INTRODUCTION TO EMBEDDED SYSTEMS 9

    Definition and Classification Overview of Processors and hardware units in an

    embedded system Software embedded into the system Exemplary Embedded Systems Embedded Systems on a Chip (SoC) and the use of VLSI designed circuits

    2. DEVICES AND BUSES FOR DEVICES NETWORK 9I/O Devices - Device I/O Types and Examples Synchronous - Iso-synchronous and

    Asynchronous Communications from Serial Devices - Examples of Internal Serial-Communication Devices - UART and HDLC - Parallel Port Devices - Sophisticated

    interfacing features in Devices/Ports- Timer and Counting Devices - 12C, USB,CAN and advanced I/O Serial high speed buses- ISA, PCI, PCI-X, cPCI and advanced

    buses.

    3. EMBEDDED PROGRAMMING 9Programming in assembly language (ALP) vs. High Level Language - C Program

    Elements, Macros and functions -Use of Pointers - NULL Pointers - Use of FunctionCalls Multiple function calls in a Cyclic Order in the Main Function Pointers

    Function Queues and Interrupt Service Routines Queues Pointers Concepts ofEMBEDDED PROGRAMMING in C++ - Objected Oriented Programming Embedded

    Programming in C++, C Program compilers Cross compiler Optimization ofmemory codes.

    4. REAL TIME OPERATING SYSTEMS PART - 1 9

    OS Services Interrupt Routines Handling, Task scheduling models - Handling of taskscheduling and latency and deadlines as performance metrics - Inter Process

    Communication And Synchronisation Shared data problem Use of Semaphore(s) Priority Inversion Problem and Deadlock Situations Inter Process Communications

    using Signals Semaphore Flag or mutex as Resource key Message Queues Mailboxes Pipes Virtual (Logical) Sockets RPCs.

    5. REAL TIME OPERATING SYSTEMS PART - 2 9

    Study of RTOS, VxWorks - Basic Features - Task Management Library at the System -Library Header File - VxWorks System Functions and System Tasks - Inter Process

    (Task) Communication Functions - Case Study of Coding for Sending Application LayerByte Streams on a TCP/IP Network Using RTOS Vxworks

    Total No. of Periods: 45

    REFERENCE BOOKS:1. Rajkamal, Embedded Systems Architecture, Programming and Design, TATA

    McGraw Hill, First reprint 20032. David E.Simon, An Embedded Software Primer, Pearson Education Asia, First

    Indian Reprint 2000.

  • 8/3/2019 ME_CSE_ - from III Sem

    20/40

    DIGITAL IMAGE PROCESSING 3 0 0 100 3

    1. DIGITAL IMAGE FUNDAMENTALS 9

    Image formation, Image transforms Fourier transforms, Walsh, Hadamard, Discretecosine, Hotelling transforms.

    2. IMAGE ENHANCEMENT & RESTORATION 9

    Histogram modification techniques - Image smoothening - Image Sharpening - ImageRestoration - Degradation Model Noise models - Spatial filtering Frequency domain

    filtering.

    3. IMAGE COMPRESSION & SEGMENTATION 9

    Compression Models - Elements of information theory - Error free Compression -Imagesegmentation Detection of discontinuities - Edge linking and boundary detection -

    Thresholding Region based segmentation - Morphology.

    4. REPRESENTATION AND DESCRIPTION 9

    Representation schemes- Boundary descriptors- Regional descriptors - RelationalDescriptors

    5. OBJECT RECOGNITION AND INTERPRETATION 9

    Patterns and pattern classes - Decision-Theoretic methods - Structural methods.

    Total No of periods: 45

    REFERENCE BOOKS:

    1. Gonzalez.R.C & Woods. R.E., Digital Image Processing, 2nd Edition, PearsonEducation, 2002.

    2. Anil Jain.K, Fundamentals of Digital image Processing, Prentice Hall of India, 1989.3. Sid Ahmed, Image Processing, McGraw Hill, New York, 1995.

  • 8/3/2019 ME_CSE_ - from III Sem

    21/40

    SOFTWARE QUALITY ASSURANCE 3 0 0 100 3

    1. CONCEPTS 9

    Concepts of Quality Control, Quality Assurance, Quality Management - Total QualityManagement; Cost of Quality; QC tools - 7 QC Tools and Modern Tools; Other relatedtopics - Business Process Re-engineering Zero Defect, Six Sigma, Quality Function

    Deployment, Benchmarking, Statistical process control.

    2. SOFTWARE ENGINEERING CONCEPTS 9

    Software Engineering Principles, Software Project Management, Software Process,Project and Product Metrics, Risk Management, Software Quality Assurance; Statistical

    Quality Assurance - Software Reliability, Muse Model; Software ConfigurationManagement; Software Testing; CASE (Computer Aided Software Engineering).

    3. QUALITY ASSURANCE MODELS 9

    Models for Quality Assurance-ISO-9000 - Series, CMM, SPICE, Malcolm Baldrige

    Award.

    4. SOFTWARE QUALITY ASSURANCE RELATED TOPICS 9

    Software Process - Definition and implementation; internal Auditing and Assessments;Software testing -Concepts, Tools, Reviews, Inspections & Walkthroughts; P-CMM.

    5. FUTURE TRENDS 9

    PSP and TSP, CMMI, OO Methodology, Clean-room software engineering, Defect

    injection and prevention.

    Total No of periods: 45

    REFERENCE BOOKS:

    1. Watts Humphery, Managing Software Process ", Addison - Wesley, 1998.2. Philip B Crosby, " Quality is Free: The Art of Making Quality Certain ", Mass

    Market, 1992.3. Roger Pressman, Software Engineering ", Sixth Edition, McGraw Hill, 2005.

  • 8/3/2019 ME_CSE_ - from III Sem

    22/40

    AD HOC NETWORKS3 0 0 100 3

    1. INTRODUCTION 9

    Introduction-Fundamentals of Wireless Communication Technology - TheElectromagnetic Spectrum - Radio Propagation Mechanisms - Characteristics of theWireless Channel - IEEE 802.11a,b Standard Origin Of Ad hoc: Packet Radio

    Networks - Technical Challenges - Architecture of PRNETs - Components of PacketRadios Ad hoc Wireless Networks -What Is an Ad Hoc Network? Heterogeneity in

    Mobile Devices - Wireless Sensor Networks - Traffic Profiles - Types of Ad hoc MobileCommunications - Types of Mobile Host Movements - Challenges Facing Ad Hoc

    Mobile Networks-Ad hoc wireless Internet

    2. AD HOC ROUTING PROTOCOLS 9Introduction - Issues in Designing a Routing Protocol for Ad Hoc Wireless Networks -

    Classifications of Routing Protocols -Table-Driven Routing Protocols - DestinationSequenced Distance Vector (DSDV) - Wireless Routing Protocol (WRP) - Cluster Switch

    Gateway Routing (CSGR) - Source-Initiated On-Demand Approaches - Ad Hoc On-Demand Distance Vector Routing (AODV) - Dynamic Source Routing (DSR) -

    Temporally Ordered Routing Algorithm (TORA) - Signal Stability Routing (SSR) -Location-Aided Routing (LAR) - Power-Aware Routing (PAR) - Zone Routing Protocol

    (ZRP)

    3. MULTICASTROUTING IN AD HOC NETWORKS 9Introduction - Issues in Designing a Multicast Routing Protocol - Operation of Multicast

    Routing Protocols - An Architecture Reference Model for Multicast Routing Protocols -Classifications of Multicast Routing Protocols - Tree-Based Multicast Routing Protocols-

    Mesh-Based Multicast Routing Protocols - Summary of Tree-and Mesh-Based Protocols- Energy-Efficient Multicasting - Multicasting with Quality of Service Guarantees -

    Application-Dependent Multicast Routing - Comparisons of Multicast Routing Protocols

    4. TRANSPORT LAYER, SECURITY PROTOCOLS 9Introduction - Issues in Designing a Transport Layer Protocol for Ad Hoc Wireless

    Networks - Design Goals of a Transport Layer Protocol for Ad Hoc Wireless Networks -Classification of Transport Layer Solutions - TCP Over Ad Hoc Wireless Networks -

    Other Transport Layer Protocols for Ad Hoc Wireless Networks - Security in Ad HocWireless Networks - Network Security Requirements - Issues and Challenges in Security

    Provisioning - Network Security Attacks - Key Management - Secure Routing in Ad HocWireless Networks

    5. QoS AND ENERGY MANAGEMENT 9

    Introduction - Issues and Challenges in Providing QoS in Ad Hoc Wireless Networks -Classifications of QoS Solutions - MAC Layer Solutions - Network Layer Solutions -

    QoS Frameworks for Ad Hoc Wireless Networks Energy Management in Ad HocWireless Networks Introduction - Need for Energy Management in Ad Hoc Wireless

  • 8/3/2019 ME_CSE_ - from III Sem

    23/40

    Networks - Classification of Energy Management Schemes - Battery ManagementSchemes - Transmission Power Management Schemes - System Power Management

    Schemes

    REFERENCE BOOKS:

    1. C. Siva Ram Murthy and B.S. Manoj Ad Hoc Wireless Networks: Architectures andProtocols, Prentice Hall PTR,2004

    2. C.K. Toh, Ad Hoc Mobile Wireless Networks: Protocols and Systems, Prentice HallPTR ,2001

    3. Charles E. Perkins, Ad Hoc Networking, Addison Wesley, 2000

  • 8/3/2019 ME_CSE_ - from III Sem

    24/40

    DATA WAREHOUSING AND DATA MINING 3 0 0 100 3

    1. INTRODUCTION 9Relation To Statistics, Databases- Data Mining Functionalities-Steps In Data Mining

    Process-Architecture Of A Typical Data Mining Systems- Classification Of Data MiningSystems - Overview Of Data Mining Techniques.

    2. DATA PREPROCESSING AND ASSOCIATION RULES 9

    Data Preprocessing-Data Cleaning, Integration, Transformation, Reduction,Discretization Concept Hierarchies-Concept Description: Data Generalization And

    Summarization Based Characterization- Mining Association Rules In Large Databases.

    3. PREDICTIVE MODELING 9Classification And Prediction: Issues Regarding Classification And Prediction-

    Classification By Decision Tree Induction-Bayesian Classification-Other Classification

    Methods-Prediction-Clusters Analysis: Types Of Data In Cluster Analysis-Categorization Of Major Clustering Methods: Partitioning Methods HierarchicalMethods

    4. DATA WAREHOUSING 9

    Data Warehousing Components -Multi Dimensional Data Model- Data WarehouseArchitecture-Data Warehouse Implementation- -Mapping The Data Warehouse To

    Multiprocessor Architecture- OLAP.-Need- Categorization Of OLAP Tools.

    5. APPLICATIONS 9Applications of Data Mining-Social Impacts Of Data Mining-Tools-An Introduction To

    DB Miner-Case Studies-Mining WWW-Mining Text Database-Mining SpatialDatabases.

    Total No of Periods: 45

    REFERENCE BOOKS:

    1. Jiawei Han, Micheline Kamber, "Data Mining: Concepts and Techniques",Morgan Kaufmann Publishers, 2002.

    2. Alex Berson,Stephen J. Smith, Data Warehousing, Data Mining,& OLAP, TataMcgraw- Hill, 2004.

    3. Usama M.Fayyad, Gregory Piatetsky - Shapiro, Padhrai Smyth And Ramasamy

    Uthurusamy, "Advances In Knowledge Discovery And Data Mining", The M.I.TPress, 1996.

    4. Ralph Kimball, "The Data Warehouse Life Cycle Toolkit", John Wiley & SonsInc., 1998.

    5. Sean Kelly, "Data Warehousing In Action", John Wiley & Sons Inc., 1997..

  • 8/3/2019 ME_CSE_ - from III Sem

    25/40

    PERFORMANCE EVALUATION OF COMPUTER

    SYSTEMS AND NETWORKS

    3 0 0 100 3

    1. INTRODUCTION 9

    Need for performance evaluation Role of performance evaluation - performanceevaluation Methods Performance Metrics and Evaluation Criteria CPU and I/O

    Architectures Distributed and Network Architectures Secondary Storage Topologies Computer Architecture - Fundamental Concepts and Performance Measures.

    2. PROBABILITY AND STOCHASTIC PROCESSES 9

    Scheduling Algorithms Workloads Random Variables Probability Distributions

    Densities Expectation Stochastic Processes Poisson Process Birth-Death Process Markov Process.

    3. QUEUING THEORY 9

    Queuing Systems Networks of Queues - Estimating Parameters and Distributions

    Computational Methods Simulation Process Time Control Systems and Modeling.

    4. PETRI NETS AND SYSTEM PERFORMANCE 9

    Petri Nets Classical Petri Nets Timed Petri Nets Priority-based Petri Nets ColoredPetri Nets Generalized Petri Nets Tool Selection Validation of Results

    Performance Metrics Evaluation Multiple Server Computer System Analysis.

    5. ANALYSIS 9

    OS Components System Architecture Workloads Design Simulation Analysis -Database System Performance Computer Networks Components Simulation

    Modelling of LAN.

    Total No of periods: 45

    REFERENCE BOOKS:

    1. 1. Paul J. Fortier, Howard E. Michael, Computer Systems PerformanceEvaluation and Prediction, Elsvier Science (USA), 2003.

    2. Thomas G. Robertazzi, Computer Networks and Systems: Queing theory andPerformance Evaluation, 3

    rdEdition, Springer, 2000.

    3. Domenico Ferrari , Giuseppe Serazzi ,Alexandro Zeijher, Measurement & Tuningof Computer Systems Prentice Hall Inc, 1983.

    4. Michael F.Mories and Paul F.Roth,. Tools and techniques, Computer PerformanceEvaluation, Van Nostrand, New York, 1982.

  • 8/3/2019 ME_CSE_ - from III Sem

    26/40

    AGENT BASED INTELLIGENT SYSTEMS

    3 0 0 100 3

    1. INTRODUCTION 9

    Definitions - Foundations - History - Intelligent Agents-Problem Solving-Searching -Heuristics -Constraint Satisfaction Problems - Game playing.

    2. KNOWLEDGE REPRESENTATION AND REASONING 9

    Logical Agents-First order logic-First Order Inference-Unification-Chaining- Resolution

    Strategies-Knowledge Representation-Objects-Actions-Events

    3. PLANNING AGENTS 9

    Planning Problem-State Space Search-Partial Order Planning-Graphs-NondeterministicDomains-Conditional Planning-Continuous Planning-MultiAgent Planning.

    4. AGENTS AND UNCERTAINITY 9

    Acting under uncertainty Probability Notation-Bayes Rule and use - Bayesian

    Networks-Other Approaches-Time and Uncertainty-Temporal Models- Utility Theory -Decision Network Complex Decisions.

    5. HIGHER LEVEL AGENTS 9

    Knowledge in Learning-Relevance Information-Statistical Learning Methods-

    Reinforcement Learning-Communication-Formal Grammar-Augmented Grammars-Future of AI.

    Total No of periods: 45

    REFERENCE BOOKS:1. Stuart Russell and Peter Norvig, Artificial Intelligence - A Modern Approach,

    2nd

    Edition, Prentice Hall, 20022. Michael Wooldridge, An Introduction to Multi Agent System, John Wiley,

    2002.3. Patrick Henry Winston, Artificial Intelligence, III Edition, AW, 1999.4. Nils.J.Nilsson, Principles of Artificial Intelligence, Narosa Publishing House,

    1992.

  • 8/3/2019 ME_CSE_ - from III Sem

    27/40

    VISUALIZATION TECHNIQUES 3 0 0 100 3

    1. INTRODUCTION 9

    Introduction to Visualisation - Principles of 2D & 3D Computer Graphics - Models andSimulation strategies.

    2. POPULAR TECHNIQUES 9

    Surface Plots - City scopes - Fish eye views - Benediktine Space - Perspective walls -

    Cone trees and Cam trees - Sphere Visualisation - Rooms - Emotical icons.

    3. ADVANCED TECHNIQUES 9

    Self-Organising graphs - Spatial Data arrangements - Benediktine Cyberspace -Statistical Clustering and Proximity measures - Hyper Structures - Human Centered

    Approaches - Information Cube.

    4. VISUALIZATION SYSTEMS 9

    Database Visualisation - Populated Information Terrains - Legibility enhancement -Hyper structure Visualisation - Information Visualisation.

    5. SOFTWARE VISUALIZATION 9

    Rapid Prototyping - Models for user interaction - Formal Specification of Software -

    DFD Software Architecture.

    Total No of periods: 45

    REFERENCE BOOKS:

    1. Chaomei Chan, Information Visualisation and Virtual Environment, Springer -Verlag, 1999.

    2. Benedikt. M, Cyberspace: First Steps, MIT Press, 1991.3. Pauline Wills, Visualisation: A Beginner's Guide, Hodder & Stoughton, 1999.4. Sheryl A Sorby exal, 3D Visualisation for Engineering Graphics, Prentice Hall, 1998.

  • 8/3/2019 ME_CSE_ - from III Sem

    28/40

    ADVANCED DATABASES 3 0 0 100 3

    1. DATABASE MANAGEMENT 9

    Relational Data Model SQL - Database Design - Entity-Relationship Model Relational Normalization Embedded SQL Dynamic SQL JDBC ODBC.

    2. ADVANCED DATABASES 10

    Object Databases - Conceptual Object Data Model XML and Web Data XMLSchema Distributed Data bases OLAP and Data Mining ROLAP and MOLAP

    3. QUERY AND TRANSACTION PROCESSING 8

    Query Processing Basics Heuristic Optimization Cost, Size Estimation - Models of

    Transactions Architecture Transaction Processing in a Centralized and DistributedSystem TP Monitor.

    4. IMPLEMENTING AND ISOLATION 9

    Schedules Concurrency Control Objects and Semantic Commutativity Locking

    Crash, Abort and Media Failure Recovery Atomic Termination DistributedDeadlock Global Serialization Replicated Databases Distributed Transactions in

    Real World.

    5. DATABASE DESIGN ISSUES 9

    Security Encryption Digital Signatures Authorization Authenticated RPC -Integrity - Consistency - Database Tuning - Optimization and Research Issues.

    Total No of periods: 45

    REFERENCE BOOKS:1. Philip M. Lewis, Arthur Bernstein, Michael Kifer, Databases and Transaction

    Processing: An Application-Oriented Approach, Addison-Wesley, 20022. R. Elmasri and S.B. Navathe, Fundamentals of Database Systems, 3 rd Edition,

    Addison Wesley, 20043. Abraham Silberschatz, Henry. F. Korth, S.Sudharsan, Database System Concepts, 4 th

    Edition., Tata McGraw Hill, 20044. Raghu Ramakrishnan & Johannes Gehrke, Database Management Systems, 3rd

    Edition, TMH, 2003

  • 8/3/2019 ME_CSE_ - from III Sem

    29/40

    SOFTWARE PROJECT MANAGEMENT 3 0 0 100 3

    1. INTRODUCTION 9

    Conventional Software Management Evolution of Software Economics ImprovingSoftware Economics Conventional versus Modern Software Project Management

    2. SOFTWARE MANAGEMENT PROCESS FRAMEWORK 9

    Lifecycle Phases Artifacts of the Process Model Based Software Architectures

    Workflows of the Process Checkpoints of the Process

    3. SOFTWARE MANAGEMENT DISCIPLINES 9

    Iterative Process Planning - Organisation and Responsibilities Process Automation Process Control and Process Instrumentation Tailoring the Process

    4. MANAGED AND OPTIMIZED PROCESS 9

    Data Gathering and Analysis: Principles of Data Gathering, Data Gathering Process,

    Software Measures, Data Analysis - Managing Software Quality Defect Prevention

    5. CASE STUDIES 9

    COCOMO Cost Estimation Model Change Metrics CCPDS-R

    Total No of periods: 45

    REFERENCE BOOKS:1. Walker Royce Software Project Management A Unified Framework , Pearson

    Education, 2004 (Unit I, II, III & V)2. Humphrey, Watts: Managing the software process ", Addison Wesley, 1989. (Unit

    IV)3. Ramesh Gopalaswamy, Managing Global Projects, Tata McGraw Hill, 2001.4. Bob Hughes, Mikecotterell, Software Project Management,3rd Edition, Tata

    McGraw Hill, 2004.

  • 8/3/2019 ME_CSE_ - from III Sem

    30/40

    COMPONENT BASED TECHNOLOGY

    3 0 0 100 3

    1. INTRODUCTION 9

    Software Components objects fundamental properties of Component technology modules interfaces callbacks directory services component architecture

    components and middleware.

    2. JAVA COMPONENT TECHNOLOGIES 9

    Threads Java Beans Events and connections properties introspection JAR files

    reflection object serialization Enterprise Java Beans Distributed Object models RMI and RMI-IIOP.

    3. CORBA TECHNOLOGIES 9

    Java and CORBA Interface Definition language Object Request Broker system

    object model portable object adapter CORBA services CORBA component model containers Application server model driven architecture.

    4. COM AND .NET TECHNOLOGIES 9

    COM Distributed COM object reuse interfaces and versioning dispatch interfaces

    connectable objects OLE containers and servers Active X controls .NETcomponents - assemblies appdomains contexts reflection remoting.

    5. COMPONENT FRAMEWORKS AND DEVELOPMENT 9

    Connectors contexts EJB containers CLR contexts and channels Black Boxcomponent framework directory objects cross-development environment

    component-oriented programming Component design and implementation tools testing tools - assembly tools.

    Total No of periods: 45

    REFERENCE BOOKS:

    1. Clemens Szyperski, Component Software: Beyond Object-Oriented Programming,Addison Wesley, 2

    ndEdition 2002.

    2. Ed Roman, Enterprise Java Beans,3rd Edition, Wiley, 2004.3. Andreas Vogel, Keith Duddy, Java Programming with CORBA, John Wiley &

    Sons 1998

    4. Corry, Mayfield, Cadman, COM/DCOM Primer Plus, Tec media, 1st Edition, 1999

  • 8/3/2019 ME_CSE_ - from III Sem

    31/40

    EMBEDDED SYSTEMS 3 0 0 100 3

    UNIT I INTRODUCTION TO EMBEDDED SYSTEMS 9Definition and Classification - Overview of Processors and hardware units in an

    embedded system - Software embedded into the system - Exemplary Embedded Systems

    - Embedded Systems on a Chip (SoC) and the use of VLSI designed circuits

    UNIT II DEVICES AND BUSES FOR DEVICES NETWORK 9

    I/O Devices - Device I/O Types and Examples - Synchronous - Iso-synchronous andAsynchronous Communications from Serial Devices - Examples of Internal Serial-

    Communication Devices - UART and HDLC - Parallel Port Devices - Sophisticatedinterfacing features in Devices/Ports- Timer and Counting Devices - 12C, USB,

    CAN and advanced I/O Serial high speed buses- ISA, PCI, PCI-X, cPCI and advancedbuses.

    UNIT III PROGRAMMING CONCEPTS AND EMBEDDED

    PROGRAMMING IN C, C++ 9

    Programming in assembly language (ALP) vs. High Level Language - C ProgramElements, Macros and functions -Use of Pointers - NULL Pointers - Use of Function

    Calls - Multiple function calls in a Cyclic Order in the Main Function Pointers - FunctionQueues and Interrupt Service Routines Queues Pointers - Concepts of EMBEDDED

    PROGRAMMING in C++ - Objected Oriented Programming - Embedded Programmingin C++, C Program compilers - Cross compiler - Optimization of memory codes.

    UNIT IV REAL TIME OPERATING SYSTEMS - PART - 1 9

    Definitions of process, tasks and threads - Clear cut distinction between functions - ISRsand tasks by their characteristics - Operating System Services- Goals - Structures- Kernel

    - Process Management - Memory Management - Device Management - File SystemOrganisation and Implementation - I/O Subsystems - Interrupt Routines Handling in

    RTOS, REAL TIME OPERATING SYSTEMS : RTOS Task scheduling models -Handling of task scheduling and latency and deadlines as performance metrics - Co-

    operative Round Robin Scheduling - Cyclic Scheduling with Time Slicing (RateMonotonics Co-operative Scheduling) - Preemptive Scheduling Model strategy by a

    Scheduler - Critical Section Service by a Preemptive Scheduler - Fixed (Static) Real timescheduling of tasks - INTER PROCESS COMMUNICATION AND

    SYNCHRONISATION - Shared data problem - Use of Semaphore(s) - Priority InversionProblem and Deadlock Situations - Inter Process Communications using Signals -

    Semaphore Flag or mutex as Resource key - Message Queues - Mailboxes - Pipes -Virtual (Logical) Sockets - Remote Procedure Calls (RPCs).

    UNIT V REAL TIME OPERATING SYSTEMS - PART - 2 9

    Study of Micro C/OS-II or Vx Works or Any other popular RTOS - RTOS System LevelFunctions - Task Service Functions - Time Delay Functions - Memory Allocation Related

    Functions - Semaphore Related Functions - Mailbox Related Functions - Queue RelatedFunctions - Case Studies of Programming with RTOS - Understanding Case Definition -

    Multiple Tasks and their functions - Creating a list of tasks - Functions and IPCs -Exemplary Coding Steps.

  • 8/3/2019 ME_CSE_ - from III Sem

    32/40

    TOTAL: 45

    REFERENCE BOOKS1. Rajkamal, Embedded Systems Architecture, Programming and Design, TATA

    McGraw-Hill, First reprint Oct. 2003

    2. Steve Heath, Embedded Systems Design, Second Edition-2003, Newnes,3. David E.Simon, An Embedded Software Primer, Pearson Education Asia, FirstIndian Reprint 2000.

    4. Wayne Wolf, Computers as Components; Principles of Embedded ComputingSystem Design - Harcourt India, Morgan Kaufman Publishers, First Indian

    Reprint 20015. Frank Vahid and Tony Givargis, Embedded Systems Design - A unified

    Hardware / Software Introduction, John Wiley, 2002.

  • 8/3/2019 ME_CSE_ - from III Sem

    33/40

    NATURAL LANGUAGE PROCESSING 3 0 0 100 3

    UNIT I INTRODUCTION 6

    Introduction: Knowledge in speech and language processing - Ambiguity - Models and

    Algorithms - Language, Thought and Understanding. Regular Expressions and automata:Regular expressions - Finite-State automata. Morphology and Finite-State Transducers:Survey of English morphology - Finite-State Morphological parsing - Combining FST

    lexicon and rules - Lexicon-Free FSTs: The porter stammer - Human morphologicalprocessing

    UNIT II SYNTAX 10

    Word classes and part-of-speech tagging: English word classes - Tagsets for English -Part-of-speech tagging - Rule-based part-of-speech tagging - Stochastic part-of-speech

    tagging - Transformation-based tagging - Other issues. Context-Free Grammars forEnglish: Constituency - Context-Free rules and trees - Sentence-level constructions - The

    noun phrase - Coordination - Agreement - The verb phase and sub categorization -Auxiliaries - Spoken language syntax - Grammars equivalence and normal form - Finite-

    State and Context-Free grammars - Grammars and human processing. Parsing withContext-Free Grammars: Parsing as search - A Basic Top-Down parser - Problems with

    the basic Top-Down parser - The early algorithm - Finite-State parsing methods.

    UNIT III ADVANCED FEATURES AND SYNTAX 11Features and Unification: Feature structures - Unification of feature structures - Features

    structures in the grammar - Implementing unification - Parsing with unificationconstraints - Types and Inheritance. Lexicalized and Probabilistic Parsing: Probabilistic

    context-free grammar - problems with PCFGs - Probabilistic lexicalized CFGs -Dependency Grammars - Human parsing.

    UNIT IV SEMANTIC 10

    Representing Meaning: Computational desiderata for representations - Meaning structureof language - First order predicate calculus - Some linguistically relevant concepts -

    Related representational approaches - Alternative approaches to meaning. SemanticAnalysis: Syntax-Driven semantic analysis - Attachments for a fragment of English -

    Integrating semantic analysis into the early parser - Idioms and compositionality - Robustsemantic analysis. Lexical semantics: relational among lexemes and their senses -

    WordNet: A database of lexical relations - The Internal structure of words - Creativityand the lexicon.

    UNIT V APPLICATIONS 8

    Word Sense Disambiguation and Information Retrieval: Selectional restriction-baseddisambiguation - Robust word sense disambiguation - Information retrieval - other

    information retrieval tasks. Natural Language Generation: Introduction to languagegeneration - Architecture for generation - Surface realization - Discourse planning - Other

    issues. Machine Translation: Language similarities and differences - The transfer

  • 8/3/2019 ME_CSE_ - from III Sem

    34/40

    metaphor - The interlingua idea: Using meaning - Direct translation - Using statisticaltechniques - Usability and system development.

    TOTAL : 45

    REFERENCE BOOKS

    1. Daniel Jurafsky & James H.Martin, Speech and Language Processing, Pearson

    Education (Singapore) Pte. Ltd., 2002.2. James Allen, Natural Language Understanding, Pearson Education, 2003.

  • 8/3/2019 ME_CSE_ - from III Sem

    35/40

    HIGH SPEED NETWORKS 3 0 0 100 3

    UNIT I HIGH SPEED NETWORKS 9

    Frame Relay Networks - Asynchronous transfer mode - ATM Protocol Architecture,ATM logical Connection, ATM Cell - ATM Service Categories - AAL. High SpeedLANs: Fast Ethernet, Gigabit Ethernet, Fibre Channel - Wireless LANs: applications,

    requirements - Architecture of 802.11

    UNIT II CONGESTION AND TRAFFIC MANAGEMENT 8Queuing Analysis- Queuing Models - Single Server Queues - Effects of Congestion

    - Congestion Control - Traffic Management - Congestion Control in Packet SwitchingNetworks - Frame Relay Congestion Control.

    UNIT III TCP AND ATM CONGESTION CONTROL 12

    TCP Flow control - TCP Congestion Control - Retransmission - Timer Management -Exponential RTO backoff - KARNs Algorithm - Window management - Performance of

    TCP over ATM. Traffic and Congestion control in ATM - Requirements - Attributes -Traffic Management Frame work, Traffic Control - ABR traffic Management - ABR rate

    control, RM cell formats, ABR Capacity allocations - GFR traffic management.

    UNIT IV INTEGRATED AND DIFFERENTIATED SERVICES 8Integrated Services Architecture - Approach, Components, Services- Queuing Discipline,

    FQ, PS, BRFQ, GPS, WFQ - Random Early Detection, Differentiated Services

    UNIT V PROTOCOLS FOR QOS SUPPORT 8RSVP - Goals & Characteristics, Data Flow, RSVP operations, Protocol Mechanisms -

    Multiprotocol Label Switching - Operations, Label Stacking, Protocol details - RTP -Protocol Architecture, Data Transfer Protocol, RTCP.

    TOTAL : 45

    REFERENCE BOOKS1. William Stallings, HIGH SPEED NETWORKS AND INTERNET, Pearson

    Education, Second Edition, 2002. [Chapter - 4-6, 8, 10, 12, 13, 17,18]2. Warland & Pravin Varaiya, HIGH PERFORMANCE COMMUNICATION

    NETWORKS, Jean Harcourt Asia Pvt. Ltd., II Edition, 2001.3. Irvan Pepelnjk, Jim Guichard and Jeff Apcar, MPLS and VPN architecture,

    Cisco Press, Volume 1 and 2, 2003

  • 8/3/2019 ME_CSE_ - from III Sem

    36/40

    DIGITAL SIGNAL PROCESSING 3 0 0 100 3

    UNIT I SIGNALS AND SYSTEMS 9

    Basic elements of digital signal Processing Concept of frequency in continuous time and

    discrete time signals Sampling theorem Discrete time signals. Discrete time systems Analysis of Linear time invariant systems Z transform Convolution and correlation.

    UNIT II FAST FOURIER TRANSFORMS 9Introduction to DFT Efficient computation of DFT Properties of DFT FFT algorithms

    Radix-2 and Radix-4 FFT algorithms Decimation in Time Decimation in Frequencyalgorithms Use of FFT algorithms in Linear Filtering and correlation.

    UNIT III IIR FILTER DESIGN 9

    Structure of IIR System Design of Discrete time IIR filter from continuous time filter IIR filter design by Impulse Invariance. Bilinear transformation Approximation

    derivatives Design of IIR filter in the Frequency domain.

    UNIT IV FIR FILTER DESIGN 9Symmetric & Antisymteric FIR filters Linear phase filter Windowing technique

    Rectangular, Kaiser windows Frequency sampling techniques Structure for FIRsystems.

    UNIT V FINITE WORD LENGTH EFFECTS 9

    Quantization noise derivation for quantization noise power Fixed point and binaryfloating point number representation comparison over flow error truncation error

    co-efficient quantization error - limit cycle oscillation signal scaling analytical modelof sample and hold operations Application of DSP Model of Speech Wave Form

    Vocoder.

    TUTORIAL 15

    TOTAL : 60

    REFERENCE BOOKS

    1. John G Proakis and Dimtris G Manolakis, Digital Signal Processing Principles,Algorithms and Application, PHI/Pearson Education, 2000, 3rd Edition.

    2. Alan V Oppenheim, Ronald W Schafer and John R Buck, Discrete Time SignalProcessing, PHI/Pearson Education, 2000, 2nd Edition.

    3. Johny R.Johnson, Introduction to Digital Signal Processing, Prentice Hall ofIndia/Pearson Education, 2002.

    4. Sanjit K.Mitra, Digital Signal Processing: A Computer Based Approach, TataMcGraw-Hill, 2001, Second Edition.

  • 8/3/2019 ME_CSE_ - from III Sem

    37/40

    ADVANCED ALGORITHMS 3 0 0 100 3

    UNIT I INTRODUCTION 5

    Mathematical Background - Design and Analysis of algorithms - Basic concepts

    UNIT II SORTING AND ORDER STATISTICS 10

    Internal sort algorithms - Analysis - Worstcase - Average case - Sorting in Linear Time -Medians and order statistics - Augmenting Data Structures - Red Black Trees - Dynamic

    - Order Statistics - FFT - Algorithm - Implementation.

    UNIT III DESIGN TECHNIQUES 10Divide and Conquer - Dynamic Programming - Greedy method - Backtracking -- Branch

    & Bound Classical examples - Analysis.

    UNIT IV GRAPH AND PARALLEL ALGORITHMS 9Graphs - Representation - Traversals - Topological sort - Minimum spanning tree -

    Shortest paths Biconnected and strongly connected components - Parallel algorithms -Sorting Matrix multiplication - Numerical - Graph.

    UNIT V SELECTED TOPICS 11

    NP Completeness - Approximation alogorithms - Matrices - Transitive closure -Warshall's - Kronrod's algorithm - Computaional Geometry.

    REFERENCES BOOKS:

    1. T.H. Cormen, C.E. Leiserson, R.L. Rivest, Introduction to Algorithms, McGrawHill Book Company, 1994.

    2. Sara Baase, "Computer Algorithms : Introduction to Design and Analysis,Addison Wesley Publishing Company, 1998.

    3. M.J. Quinn, Designing Efficient Algorithms for Parallel Computers, McGraw HillBook Company, 1998.

  • 8/3/2019 ME_CSE_ - from III Sem

    38/40

    CREATIVE THINKING 3 0 0 100 3

    1. FUNDAMENTALS OF CREATIVITY 10

    Need for Creativity and Innovations - Challenges on the road to innovation - Quality

    Management in Creativity and Innovation - Mechanics of mind - Definition of Creativityand Innovation - Perception in Creative thinking -Memory in creative thinking -Judgement in creative thinking - Mental process.

    2. DIRECTED CREATIVITY 8

    Heuristics for creativity - Heuristics for Directed Creativity - Models for creative thinkingand innovation Tools for creative thinking - Basic Principles for the methods of creative

    thinking - Inventing methods for directed creativity.

    3. ANALYZING ORGANIZING CREATIVITY 10Directed Creativity cycle - Classification of tools - Pausing and Noticing - Refocusing a

    topic - Analyzing - Searching for analogies - Creating new world imagination - Activitiesand Heuristics - Tools for imagination - Brain storming - Analogies - Provoking

    Imagination - Combining concepts - Organizing and Displaying ideas.

    4. INNOVATION 8Activities and Heuristics related to Development and action - Models for organizational

    change - Tools for development and Action phases - Reengineering - Directed creativityfor redesign processes.

    5. QUALITY 9

    Quality management - Customer needs Analysis - Design of new products and services -Creative versus Analytical methods - Symptoms of struck thinking - Creative Thinking in

    Quality management.

    Total No of periods: 45

    REFERENCE BOOKS:1. Paul. E. Plsek. , Creativity, Innovation and Quality , PHI 2000.

    2. Harry Nystrom, Creativity and Innovation, John Wiley and Sons, 1979.3. Brain Twiss, Managing technological Innovation, Pitman Publishing Ltd., 1992.

  • 8/3/2019 ME_CSE_ - from III Sem

    39/40

    SEMANTIC WEB 3 0 0 100 3

    1. INTRODUCTION 8

    History Semantic Web Layers Semantic Web technologies Semantics in Semantic

    Web XML: Structuring Namespaces Addressing Querying Processing

    2. RDF 10

    RDF and Semantic Web Basic Ideas - RDF Specification RDF Syntax: XML andNon- XML - RDF elements RDF relationship: Reification, Container, and collaboration

    RDF Schema Editing, Parsing, and Browsing RDF/XML-RQL-RDQL

    3. ONTOLOGY 10Why Ontology Ontology movement OWL OWL Specification - OWL Elements

    OWL constructs: Simple and Complex Ontology Engineering : Introduction Constructing ontologies Reusing ontologies On-To-Knowledge Semantic Web

    architecture

    4. LOGIC AND INFERENCE 9Logic Description Logics - Rules Monotonic Rules: Syntax, Semantics and examples

    Non-Monotonic Rules Motivation, Syntax, and Examples Rule Markup in XML:Monotonic Rules, and Non-Monotonic Rules

    5. APPLICATIONS OF SEMANTIC WEB TECHNOLOGIES 8

    RDF Uses: Commercial and Non-Commercial use Sample Ontology e-Learning Web Services Web mining Horizontal information Data Integration Future of

    Semantic Web

    Total No. of Periods: 45

    REFERENCES1. Grigorous Antoniou and Van Hermelen - A Semantic Web Primer-The MIT

    Press 20042. Spinning the Semantic Web: Bringing the world wide web to its full potential

    The MIT Press 20043. Shelley Powers Practical RDF Oreilly publishers First Indian Reprint :

    2003

  • 8/3/2019 ME_CSE_ - from III Sem

    40/40

    RESEARCH METHODOLOGIES 3 0 0 100 3Unit I 9

    The nature of CS research - what is research? - Project planning, tools and techniques forplanning - Literature searches, information gathering.

    Unit II 9

    Reading and understanding research papers - Project implementation and IT projectmanagement. - Presentation skills, written and oral. - Time management, team working.

    Unit III 9

    Optimization Methods I Linear Programming: Simplex method DynamicProgramming Integer Programming - Hill climbing

    Unit IV 9Optimization Methods II - Simulated annealing - Quantum annealing - Geneticalgorithms - Ant colony optimization - Particle swarm optimization - Tabu search - Beam

    search

    Unit V 9Commercial and economic considerations in the IT industry - Review of Legal, Ethical,Social and Professional (LSEP) issues, such as data protection, hacking, etc. - Technical

    writing, referencing, bibliographies.TOTAL : 45

    References:

    1. C. W. Dawson., The Essence of Computer Projects: A Student Guide., PHI, 20062. A Letter to Research Students, by Duane A. Bailey, ftp: //cs.williams.edu/pub/bailey/research.ps

    3. Humdy Taha, Operation Research, PHI,2007 Prentice Hall4. S. Kirkpatrick and C. D. Gelatt and M. P. Vecchi, Optimization by Simulated

    Annealing, Science, Vol 220, Number 4598, pages 671-680, 1983.

    http://www.cs.virginia.edu/cs432/documents/sa-1983.pdf (or)http://citeseer.ist.psu.edu/kirkpatrick83optimization.html

    5. Apolloni B., N. Caravalho, D. De Falco "Quantum stochastic optimization",Stochastic Processes and their Applications, 33, 233-244(1989).

    6. David E. Goldberg, Genetic Algorithms in Search, Optimization, and Machine

    Learning,

    New Age.7. M. Dorigo, 2007. "Ant Colony Optimization", http:// www. scholarpedia.org/article/Ant_colony_optimization

    8. http://en.wikipedia.org/wiki/Particle_swarm_optimization (Particle SwarmOptimization)

    9. http://www.ifi.uio.no/infheur/Bakgrunn/Intro_to_TS_Gendreau.htm (TabuSearch)