Sunteți pe pagina 1din 6

08.

801 SOFTWARE ENGINEERING AND PROJECT MANAGEMENT 2 1 0 Module I (13 hours)


Introduction to software engineering- scope of software engineering historical aspects, economic aspects, maintenance aspects, specification and design aspects, team programming aspects. Software engineering a layered technology processes, methods and tools. Software process models prototyping models, incremental models, spiral model, waterfall model. Capability maturity model (CMM), ISO 9000. Phases in Software development requirement analysis- requirements elicitation for software , analysis principles, software prototyping, specification.

Module II (13 hours)


Planning phase project planning objective, software scope, empirical estimation models- COCOMO, single variable model, staffing and personal planning. Design phase design process, principles, concepts, effective modular design, topdown, bottom up strategies, stepwise refinement. Coding programming practice, verification, size measures, complexity analysis, coding standards. Testing fundamentals, white box testing, control structure testing, black box testing, basis path testing, code walkthroughs and inspection, testing strategies-Issues, Unit testing, integration testing, Validation testing, System testing. Maintenance-Overview of maintenance process, types of maintenance. Risk management: software risks-risk identification-risk monitoring and management

Module III (13 hours)


Project Management concept: People Product-Process-Project. Project scheduling and tracking: Basic concepts-relation between people and effort-defining task set for the software project-selecting software engineering task Software configuration management: Basics and standards User interface design- rules. Computer aided software engineering tools - CASE building blocks, taxonomy of CASE tools, integrated CASE environment.

08.802 COMPUTER SYSTEM ARCHITECTURE 3 1 0 Module I (16 hours)


Parallel computer models - The state of computing, multi processors and multi computers, multi vector and SIMD computers, Parallel Random Access Machines and VLSI complexity model, Architectural development tracks. Program and network properties - conditions of parallelism, system interconnect architectures. Principles of scalable performance- scalability analysis and approaches.

Module II(18 hours)


Processors and memory hierarchy advanced processor technology, superscalar and vector processors, memory hierarchy technology, virtual memory technology. Bus and shared memory - backplane bus systems, shared memory organizations. Pipelining and superscalar techniques linear vs. nonlinear pipelining, instruction pipeline design, arithmetic pipeline design, superscalar and super pipeline design

Module III(18 hours)


Multiprocessors and multicomputers - multiprocessor system interconnects, cache coherence and synchronization mechanism, three generations of multicomputers, Intel Paragon system architecture. Multivector and SIMD computers - vector processing principles, multivector multiprocessors, SIMD computer organizations. Scalable, multithreaded and data flow architectures - latency hiding techniques, principles of multithreading, scalable and multithreaded architectures, data flow and hybrid architectures.

08.803 CRYPTOGRAPHY AND NETWORKS SECURITY 2 1 0 Module I (14 hours)


Symmetric Cipher Models- Substitution techniques- Transposition techniques- Rotor machinesSteganography- DES: Simplified DES- Block Cipher principals- The Data Encryption Standard. The Strength of DES- Differential and linear Cryptanalysis- Block Cipher Design principles- Block Cipher modes of operations- IDEA: Primitive operations- Key expansions- One round, Odd round, Even Round- Inverse keys for description. AES: Basic Structure- Primitive operation- Inverse Cipher- Key Expansion, Rounds, Inverse Rounds.

Module II (13 hours)


Public key Cryptography :- Principles of Public key Cryptography Systems, Number theory- Modular arithmetic, Prime numbers. RSA algorithms- Key Management - Diffie-Hellman Key Exchange, Elliptic curve cryptography- Authentication requirements- Authentication functions- Message authentication codesHash functions- SHA, MD5, Security of Hash functions and MACS- Digital signatures- Authentication protocols- Digital signature standards.

Module III (12 hours)


Network security: Electronic Mail Security: Pretty good privacy- S/MIME IP Security: Architecture- authentication Header- Encapsulating Security payload- Combining Security associations- Key management. Web Security: Web Security considerations- secure Socket Layer and Transport layer Security- Secure electronic transaction. Firewalls-Packet filters- Application Level GatewayEncrypted tunnels.

08.804 DISTRIBUTED SYSTEMS 2 1 0 Module I (12 hours)


Characteristics of distributed System: Examples of distributed systems resource sharing and web world wide web issues in the design of distributed system. System models: Architectural models and fundamental models. Networking and internetworking: Types of network network principles internet protocols

Module II (14 hours)


Interprocess communication : the API for internet protocol external data representation and marshalling client server communication - group communication- case study: inter process communication in Unix. Distributed objects and remote invocation: communication between distributed objects remote procedure call Events and notification. Operating system support: Operating system layer protection processes and threads- communication and invocation Operating system architecture security: Overview of security techniques

Module III (13 hours)


Distributed file system: File service architecture - network file system- Andrew file system-recent advances Transactions and concurrency control: nested transactions-locks-optimistic concurrency control-comparison of methods for concurrency control-flat and nested distributed transactions- distributed deadlockstransactions recovery. Replication System model and group communication- fault tolerant servicestransactions with replicated data

08.805 (1) FUZZY SET THEORY AND APPLICATIONS (ELECTIVE III) 3 1 0 Module I (18 hours)
Uncertainty and imprecision, Fuzzy sets and membership. Classical sets and Fuzzy sets, Operations, Properties. Classical relations and Fuzzy relations, Cartesian product, Crisp and Fuzzy relations, Tolerance and Equivalence relations, Cosine amplitude method, Max-Min method. Membership functions, Features, Various forms, Fuzzification, Membership value assignments, Intuition, Inference, Rank ordering, Inductive reasoning.

Module II (16 hours)


Defuzzification to Crisp sets, Lambda-Cuts ( -cuts) for Fuzzy sets and relations, Defuzzification methods. Classical Logic and Fuzzy Logic. Fuzzy systems, Natural language, Linguistic hedges. Fuzzy rule-based systems, Graphical techniques of inference.

Module III (18 hours)


Applications, Fuzzy Controllers (overview & example), Fuzzy Systems and Neural Networks, Fuzzy Neural Networks, Fuzzy Clustering, Fuzzy Pattern Recognition, Fuzzy Image Processing, Fuzzy Databases and Information retrieval systems.

08.806 (4) INTERNET TECHNOLOGY (ELECTIVE IV) 3 1 0 Module I (17 hours)


Introduction to Internet. Web Browsers, Web Servers Web Design. HTML. Java Script Simple Java Script. Variables, Objects, DOM. DHTML, XML Introduction, Key components, KTD and Schemas. PHP Control Loops, Arrays, Functions & Forms.

Module II (17 hours)


Proxy Server, Search Engines, Plug-ins and Helper Applications. Web Server hardware & software software for Web Server Website & internet utility program Web Server hardware E-commerce software basic function of E-commerce software payment system for e-commerce online payment basics payment cards electronic cash electronic wallets stored value cards.

Module III (18 hours)


NAT, VPN, DHCP.DNS Namespace, Internet Domain Names, Mapping Domain Names to Address, Domain Name Resolution. Remote Login & Desktop - Telnet, SSH File Transfer and Access - FTP, TFTP, NFS. Electronic Mail - SMTP, POP, IMAP, MIME, Worldwide Web, HTTP. Video over IP.

S-ar putea să vă placă și