Documente Academic
Documente Profesional
Documente Cultură
4 0
:
COST ACCOUNTING Cost classification Types of costs - Inventory Records & Procedures - Significance of overhead Cost - Preparation of Cost sheet & Machine Hour Rate Calculation - Concept of cost volume profit analysis - Concept of variance - Cost control Techniques - Principles of Job Costing, batch costing , Process costing , operating costing and Activity Based Costing. (12) FINANCIAL ACCOUNTING: Concepts and Conventions- Double Entry Book keeping -- Books of Accounts- Preparation of Journals, Ledger, Trial Balance, Profit and Loss Account and Balance sheet - simple problems - Methods of depreciation- An outline of Accounts of Non-Profit making organizations. (15) FINANCIAL RATIO ANALYSIS: Uses and Nature - preparation of Liquidity Ratios - coverage Ratios and profitability Ratios from profit & Loss Account and Balance sheet. (8) GOALS AND FUNCTIONS OF FINANCIAL MANAGEMENT: Finance function - objectives of Financial Management organisation of the finance function Various sources of Finance Dividend Determinants of Dividend Policy. (4) PRINCIPLES OF CAPITAL BUDGETING: Kinds of capital Budgeting Decisions - Evaluation of proposals from the given cash inflows Payback and discounted cash Flow Techniques Problems. (6) WORKING CAPITAL MANAGEMENT: Definition and importance of working capital - factors affecting working capital Inventory management - simple problems - Receivables Management - cash Budget Preparation - working capital Estimation. (6) INTERNATIONAL FINANCE: International Business methods Exchange Rate Mechanism Interest Rate Parity (IRP) and Purchasing Power Parity (PPP) Exchange Rate Risks Currency Derivatives - Simple Problems. (5) L: 56 REFERENCES 1. 2. 3. 4. 5. Pandey I.M , Financial Management Vikas Publishing, 1999. Pandey I.M. , Management Accounting Vikas Publishing, 2000. Sharma R.K and Shashi V. K.Gupta , Management Accounting Principles of Practice, Kalyani Publishers, 2000 Gupta R.L and V.K.Gupta , Financial Accounting Sultan Chand & Sons, 2001. Jeff Madura, International Financial Management South - Western College Publishing, 2001. Total : 56
08MX12
INTRODUCTION: Characteristics of programming Languages Factors influencing the evolution of programming language, developments in programming methodologies, desirable features and design issues .Programming language processors: Structure and operations of translators, software simulated computer, syntax, semantics, structure, virtual computers, binding and binding time. Operating and Programming Environment: Batch Processing Environments, Embedded system requirements Programming language paradigms. (10) IMPERATIVE PARADIGMS AND C I: Elementary and Structured Data Types: Data object variables, constants, data types, elementary data types, declaration, assignment and initialization, enumeration, characters, strings. Structured data type and objects: Specification of data structured types, vectors and arrays, records, variable size data structure, pointers and programmer constructed data structure, Sets, files. Sub Program and programmer defined data types: Evolution of data types, abstractions, encapsulations, information hiding, sub programmes, abstract data types. (18) IMPERATIVE PARADIGMS AND C II Sequence Control; Implicit and Explicit sequence control, sequence control with within expression and statements, recursive sub programmes, exception handling, co routines, Scheduled sub programmes, concurrent execution. Data control referencing environments, static and dynamic scope, local data local data referencing environment, shared data: Explicit common environment dynamic scope parameter passing mechanism. Storage Management: Major run time requirements, storage management phases, static storage management, stack based, heap based storage management. (20) INTERNET LANGUAGE PARADIGMS: Markup and Script Languages - Multi- Paradigm Domain specific Languages. Case study Script Languages. (8)
L : 56 Total: 56
REFERENCES 1. Terrence W .Pratt, Marvin V.Selkowitz and T.V.Gopal Programming Languages Design and Implementation, Pearson Education, 2006. 2. Robert W. Sebesta, Concepts of Programming Languages, Addison Wesley Longman, 2005. 3. Kernighan B.W. and Ritchie D.M., C Programming Language (ANSI C), Prentice Hall , 1994. 4. Ravi Sethi, Programming Languages Concepts and Constructs , Pearson Education, 2006. 5. Al Kelley and Ira Pohl, A Book on C Pearson Education, 2005.
08MX14
DATA STRUCTURES
4 0 0 4
INTRODUCTION: Data structures - Abstract data Types - Primitive data structures - Analysis of algorithms - Notation. (6) ARRAYS: Operations - implementation of one, two, three and multi dimensioned arrays - Different types of Array Applications (5) STRINGS: Implementation - operations - Applications. SETS: Operations on sets - implementation of sets. RECORDS: Implementation of variant records. (4)
STACKS: primitive operations - sequential implementation - Applications: Recursion : definition, process and implementation using stacks; Parentheses matching; Evaluation of expressions. (7) QUEUES: primitive operations - sequential implementation - Priority Queues - Dequeues - Applications. (5)
LISTS: Insertion and deletion of nodes - Singly linked lists, Doubly linked lists, Circular lists, Multiply linked lists Applications: Addition of Polynomials; Sparse Matrix representation ,Linked stacks - Linked queues - Linked Priority queues. (10)
TREES: Terminologies - Implementation - BINARY TREE: Properties - sequential and linked representation - binary tree operations - traversals - Expression trees - Threaded trees . (7) SORTING: Insertion Sort, Selection Sort, Shell Sort, Bubble Sort, Quick Sort, Heap Sort, Merge Sort, Radix Sort Algorithms - Analysis. (8) TABLE : Introduction - Operations - Implementation. Hash Table: Hash function, Internal Hashing : Open Addressing, Coalesced Hashing, Separate Chaining, External Hashing : Dynamic Hashing, Extendible Hashing, Linear Hashing Analysis: Probes for successful search, unsuccessful search. (4) L : 56 Total: 56 REFERENCES 1. Aaron M Tanenbaum, Moshe J Augenstein and Yedidyah Langsam, "Data structures using C and C++", Pearson Education,2004. 2. Sahni Sartaj, "Data Structures, Algorithms and Applications in C++", WCB / Mc Graw Hill, 2000. 3. Kakde OK, Despande, Data Structures and Algorithms, ISTE, 2001. 4. Nell Dale, C++ Plus Data Structures, Narosa Publishing House , 1999. 5. Mark Allen Weiss , Data Structures and Algorithm Analysis in C, Pearson Education, 2003. 6. Robert L Kruse , Bruce P Leung and Clovin L Tondo , Data Structures and Program Design in C, Pearson Education, 2004.. 7. Angela B. Shiflet, Elementary Data Structures with Pascal, West Publishing company, 1990.
-Binary, Octal, Hexa-decimalBCD Alphanumeric representation (3) Tri-state buffers - Arithmetic, (5)
REGISTER TRANSFER AND MICRO - OPERATIONS : Bus and Memory Transfer Logic, Shift Micro-operations - Basic Computer Organisation and Design.
Stored Program Organisation - Timing and Control : Instruction Cycle - Memory Reference, Instruction - Input / Output configuration and interrupt cycle Design of basic computer Introduction to Microprogrammed control unit (10) CPU ORGANISATION : General Register Organisation Stack Organisation - Instruction formats - Introduction to RISC Parallel Processing Array Processors. (6) INPUT AND OUTPUT ORGRANISATION : Input and Output interface Asynchronous Data transfer Modes of Transfer DMA I/O processor. (4) MEMORY ORGANISATION : Memory Hierarchy- Main Memory- Associative Memory - Cache Memory - Virtual Memory. (9) L: 56 Total: 56 REFERENCES 1. 2. 3. 4. Morris Mano M, Computer System Architecture, Prentice Hall of India Pvt Ltd.,2003. Malvino A.P and Donald P.Leach, Digital Principles and Applications, Tata McGrawHill, 2002.. John P. Hayes, Computer Architecture and Organization, McGraw Hill, 2003. William Stallings, Computer Organisation and Architecture : Designing for Performance, Prentice Hall , 2001.
08MX16
1. Simple programs to understand the concepts of data types. 2. Familiarizing conditional, control and repetition statements 3. Usage of single and double dimensional arrays including storage operation 4. Implementation of functions, recursive functions 5.Defining and handling structures, array of structures and union 6.Implementation of pointers, operation on pointers dynamic storage allocation 7. Creating and processing data files. P: 28 Total: 28
COBOL: 1. 2. 3. 4. 5. 6. 7. Implementation of simple and multiple table handling operations using PERFORM verb. Indexing a table and perform search operation using SET AND SEARCH verb. Sorting tables. Creation and processing of simple sequential files (fixed length records). MERGE AND SORT sequential files. Creating and processing indexed sequential and relative files. Defining and calling COBOL subroutines.
Visual Basic : List of Packages : 1. Office automation 2. Hospital Management System 3. Library Management System 4. Student Information System 5. Production Planning System L: 14 P: 56 Total : 70
08MX21
EVOLUTION OF MICROPROCESSORS: 8 bit, 16 bit, 32 bit, 64 bit processors salient features Example of microprocessor based system. CPU STRUCTURE AND FUNCTION : Processor Organisation Instruction cycle instruction pipelining. (2)
INTERNAL AND EXTERNAL ORGANISATION OF 8086 CPU : BIU , EU Purpose of various signals Construction of Machine code . Memory design for 8086 and 8088 microprocessors. (4) ASSEMBLY LANGUAGE PROGRAMMING : Format Assembler Directives Instruction - Classification of instructions Programs to implement arithmetics (6) STRING MANIPULATION : Instructions Illustrative Examples Subroutines-Macros and procedures - Interrupt Handling ISR TSR programs (12)
INPUT/OUTPUT SECTION ISSUES: I/O mapped I/O, Memory mapped I/O Interrupt driven I/O Direct Memory Access controllers Programmable Interrupt Controller. (6) PROGRAMMABLE PERIPHERAL INTERFACE : Interfacing of D/A&A/D convertersMatrix Keyboard interface. PENTIUM MICROPROCESSORS: Introduction Special Pentium Registers Salient features of Pentium. (3) (3)
RISC PROCESSORS: Instruction characteristics RISC pipelining RISC versus CISC Superscalar processors Overview Power PC - Salient features of Power PC. (5) L: 42 REFERENCES
1.
Total : 42
Barry B. Brey, The Intel Microprocessors 8086/8088,8.186/80188,80286, 80386, 80486 and Pentium,Pentium II, Pentium III, Pentium IV Architecture, programming and interfacing based personal computers, Prentice Hall of India, 2005. 2. Douglas V.Hall, Microprocessors and interface Programming and Hardware, Tata McGraw Hill, 2002. 3 Peter Abel, IBM PC Assembly Language & Programming , Prentice Hall, 2006. 4. Barry B. Brey, Programming the 80286, 80386, 80486 and Pentium based Computers, Prentice Hall of India, 2004.
Definition searching insertion and deletion of elements algorithms and their time (4) (3)
MULTIWAY SEARCH TREES : Indexed Sequential Access m-way search trees B-Tree searching, insertion and deletion - B+ trees - Tries. (6) GRAPHS : Definition representations, Adjacency matrix, packed adjacency list and linked adjacency list, network representation Graph search methods, Breadth first Search and Depth first Search. (4) DIVIDE AND CONQUER : Method examples Merge sort, Quick sort, Binary Search. (4)
GREEDY METHOD : Optimization problems method examples Minimum cost spanning tree, Kruskals and prims algorithms, Topological sorting, optimal storage on tapes. (6) DYNAMIC PROGRAMMING: Method examples All pairs shortest path problem Traveling salesman problem. BACK TRACKING: Method Examples Eight queens problem, Hamiltonian Cycles Analysis. BRANCH & BOUND : Method Example 0/1 knapsack Analysis. (4) (4) (4)
NP-HARD, NP-COMPLETE CLASSES : Basic concepts Non deterministic algorithms satisfiability problem NPhard and NP-complete Problems Cooks theorem (informal proof). (4) L: 56 Total : 56 REFERENCES
1.
2. 3.
4. 5. 6.
Thomas H.Cormen, Charles E. Leiserson, and Ronald L.Rivest Introduction to Algorithms , Mc Graw Hill, 2002. Mark Allen Weiss, Data Structures and Algorithm Analysis in C++, Pearson Education, 2002. Adam Drozdek, Data Structures and Algorithms in C++, Vikas Publishing House Pvt.Ltd., 2002. Sahni Sartaj, Data Structures, Algorithms and Application in C++, WCB / Mc Graw Hill, 2000. Ellis Horowitz and Sahni Sartaj, Fundamental of Computer Algorithms, Galgotia publications Pvt.Ltd, 2002. Robert L Kruse, Clovis L Tondo, Bruce P Leung, Data Structures and Program design in C Pearsons Education, 2004.
08MX25
ELEMENTARY PROBABILITY: Events - Probability Axioms - Conditional probability - Independent events - Baye's formula. (5) RANDOM VARIABLES : Distribution functions - Marginal distributions - Conditional distributions - Stochastic independence. Expectation - conditional expectation and conditional variance. Moment generating functions. (7) PROBABILITY DISTRIBUTIONS: Binomial, Poisson, Geometric, Uniform, Exponential, Normal, Gamma, Moment generating function, mean, variance. (11) CORRELATON : Types of Correlation - Regression - Multiple and Partial Correlation and Regression. (5)
ESTIMATION: Point Estimation-characteristics of estimation - interval estimation -interval estimates of mean, standard deviation, proportion, difference in means and ratios of standard deviations. (5) TESTING OF HYPOTHESIS: Probability density function and Properties of t, F, Chi- square distributions - Test for means, variances and attributes using the above distributions. Large sample tests - tests for means, variances and proportions. (8) ANALYSIS OF VARIANCE : One way and Two way classifications - Completely Randomized Block - Randomized Block design and Latin Square design (only problems). (5) TIME SERIES ANALYSIS : Trend and seasonal variations - Components of Time series - Measurement of trend Linear and second degree parabola. (5) STATISTICAL QUALITY CONTROL: Statistical basis for control charts - control limits control charts for variables X, R charts, charts for defective - p, np charts - charts for defects - C charts. (5) L: 56 Total : 56 REFERENCES 1. Trivedi K.S., Probability & Statistics with Reliability, Queueing and Computer Applications, Prentice Hall, 2003. 2. Arnold O. Allen, Probability, Statistics and Queueing Theory with Computer Science Applications, Academic press, 1990. 3. Sheldon M.Ross, Probability Models, Harcourt Asia Pvt Ltd, Academic Press, 2001. 4. Douglas C. Montgomery Lynwood A. Johnson , Forecasting and Time Series Analysis, McGraw Hill, 1990. 5. Daleh Bester Field, Quality Control, Prentice-Hall, 1986. 6. Johnson R.A., Probability and Statistics for Engineers Prentice Hall , 2000. 7. Ronald E.Walpole, Raymond H.Myers, Sharon L.Myers and Keying Ye, Probability & Statistics for Engineers & Scientists, Pearson Education, 2002.
08MX26
1. 2. 3. 4. 5. 6. 7. 8. 9.
Arithmetic operations using array of objects and dynamic data members. Creation of a class having read-only member function and processing the objects of that class. Creation of a class which keeps track of the member of its instances. Usage of static data member, constructor and destructor to maintain updated information about active objects. Illustration of a data structure using dynamic objects. Usage of static member to count the number of instances of a class. Illustration for the need of default arguments. Usage of a function to perform the same operation on more than one data type. Creation of a class with generic data member. Overloading the operators to do arithmetic operations on objects.
10. Acquisition of the features of an existing class and creation of a new class with added features in it.
11. Implementation of run time polymorphism. 12. Overloading stream operators and creation of user manipulators. 13. Designing a function to alarm, when an error occurs. 14. Implementation of derived class which has direct access to both its own members and the public members of the base class. 15. 16. 17. Implementation of Streams to store and maintain Library system, with the features of Book Issue and Book Return. Implementation of console application for getting inputs from keyboard. Conversion checking from one data type to another data type.
18. Implementation of Notepad with all basic features of Text Editor. 19. Implementation of delayed threads. P: 70 Total: 70
(d) Seminar (e) Mock interview (f) Speech based on a situation (g) Extemporaneous speech Practice will also be given in conducting a meeting - welcoming a gathering, presiding over a function and proposing vote of thanks. (17) Total : 28 REFERENCES 1. 2. 3. Pillai G.Radhakrishnan, Rajeevan, K and Bhaskaran Nair P, Written English for You, Emerald Academic Press, Madras, 1991. Leech Geoffrey and Jan Svartvik, A communicative Grammar of English, Longman Singapore Publishers (Pvt.) Ltd., Singapore, 1991 (ELBS). Houp Kenneth W and Thomas E Pearsall, Reporting Technical Information, Wadsworth Publishing Company Inc., Belmont, 1962.
DECISION MAKING: Decisions under uncertainty, under certainty and under risk Decision trees Expected value of perfect information and imperfect information. (5) SIMULATION: Introduction to Simulation Simulation study Types of Simulation Limitations of Simulation Areas of Simulation Simulation of Queues, Networks and Inventory models. (6) GENETIC ALGORITHMS : Introduction Representation of Variables, Objective functions, Constraints Genetic operators. (4) L : 56 REFERENCES 1. 2. 3. 4. 5. 6. Hamdy A Taha , Operations Research An introduction, Pearson Education , 2002. Singiresu. S.Rao, Engineering Optimization Theory and Practice, New Age International,1996. Kambo N.S., Mathematical Programming Techniques, Affiliated East West Press, 1991. Hillier / Lieberman, Introduction to Operations Research, Tata McGraw Hill , 2005. Mik Misniewski, Quantitative Methods for Decision makers, MacMillian Press, 1994. Jerry Banks, John S.Carson, Barryz and Nelson David Nicop, Discrete Event System Simulation, Prentice Hall, 2004. Total: 56
10
(3) MEMORY ORGANIZATION: Fixed partitioning - Dynamic partitioning Buddy Systems Simple paging Multilevel paging Inverted paging Simple Segmentation segmentation and paging. (6) VIRTUAL MEMORY MANAGEMENT: Need for Virtual Memory management Demand Paging - Page Fault Routine Demand Segmentation Combined demand segmentation and paging - Operating systems policies. (6) PROCESS DESCRIPTION AND CONTROL: Process Creation - Process states Process Description Process Control. (5) PROCESS AND THREADS: Relationship between process and threads Thread State Thread Synchronization Types of Thread. (2) PROCESS SYNCHRONIZATION: Concurrent Process Principles of Concurrency Mutual Exclusion Software support Hardware Support Operating System Support -Deadlock - Deadlock Prevention, Avoidance and Detection and recovery. (5) PROCESS SCHEDULING: Types of Scheduling Scheduling Criteria Scheduling Algorithms. (4)
I/O MANAGEMENT AND DISK SCHEDULING: Organization of I/O function Evolution of I/O function Types of I/O devices Logical Structure of I/O functions I/O Buffering Disk I/O Disk Scheduling algorithms Disk Cache. (6) FILE MANAGEMENT: Files File management Systems File System Architecture Functions of File Management File Directories Secondary Storage Management File Allocation. (7) CASE STUDIES: Windows 2000, Linux, Unix and Solaris. L:56 REFERENCES 1. 2. 3. 4. 5. 6. 7. William Stallings, Operating Systems, Prentice-Hall, 2004. Silberschatz. A, Galvin. P and Gagne.G, Operating System Concepts John Wiley and Sons, 2002. Charles Crowely, Operating System a Design Oriented Approach, Tata McGraw Hill, 2000. D. M. Dhamdhere, Operating Systems- A Concept based Approach, Tata McGraw Hill, 2003. David A Solomon and Mark E Russinovich, Inside Microsoft Windows 2000 , WP Publishers and distributors, 2001. Uresh Vahalia, Unix Internals, Pearson Education, 2004. Jim Mauro and Richard McDougall, Solaris Internals, Sun Microsystems, 2001. (6) Total 56
11
7. 8.
John Hunt, The Unified Process for Practitioners , Springer, 2000. Hans-Erik Eriksson, Magnus Penker, Brain Lyons, David Fado, UML Toolkit, OMG Press Wiley Publishing Inc., 2004.
CHANNEL ALLOCATION METHODS: Frequency Division Multiplexing Time Division Multiplexing Inverse Multiplexing ALOHA Techniques Pure ALOHA Slotted ALOHA Reservation ALOHA Carrier Sense Multiple Access Techniques. (4) LOCAL AREA NETWORKS : Ethernet Token Bus Token Ring FDDI. (8)
SWITCHING Circuit Switching - Space Division Switches Time Division Switches - Space and Time Division Switch Combinations Packet switching Datagram Approach Virtual Circuit Approach Connection oriented Vs Connectionless Services. (4) X.25 AND ATM Packet Layer Protocol Data Packets and Control Packets Design goal of ATM ATM Protocol Architecture.- Introduction to MPLS Benefits of MPLS (5) ISDN: Services Bearer Services Tele services Supplementary Services Subscriber Access to ISDN B Channels D Channels H Channels ISDN Layers (3) L: 42 REFERENCES 1. Behrouz Forouzan Introduction to Data Communications and Networking, McGraw-Hill, 2007. 2. Andrew S.Tanenbaum, Computer networks, Prentice-Hall , 2007. 3. Alberto Leon Garcia, Indra Widjaja, Communication Networks: Key Concepts and Architecture, McGraw Hill 2000 4. Keshav S., An Engineering Approach to Computer Networking, Addison-Wesley, 2004. Total : 42
LEXICAL ANALYSIS : Role of a lexical analyzer finite automata regular expressions to finite automata minimizing the number of states of a deterministic finite automata implementation of a lexical analyzer. (8) PARSING TECHNIQUES : Context free grammars derivations and parse trees ambiguity capabilities of context free grammars. Top down and bottom up parsing handles shift reduce parsing operator precedence parsing recursive descent parsing predictive parsing. (10) Automatic Parsing Techniques LR parsers canonical collection of LR (0) items construction of SLR parsing tables.
12
(4) INTERMEDIATE CODE GENERATION: Postfix notation, Quadruples, triples , indirect triples Representing information in a symbol table introduction to code optimization basic blocks DAG representation error detection and recovery code generation. (7) L: 56 Total: 56 REFERENCES 1. John J. Donovan, Systems Programming, McGrawHill , 2001. 2. Dhamdhere D.M., Systems Programming, Tata McGrawHill, 2003. 3. Aho A.V.,Monica S, R.Sethi and Ullman J.D., Compilers : Principles, Techniques and Tools, Addison Wesley, Longman, 2006. 4. Dhamdhere D.M., Compiler Construction Principles and Practice, Macmillan Company, 2005. 5. Holub Allen I. Compiler Design in C, Prentice Hall , 2001.
CONTROLS: Push Buttons - Check Boxes - Radio Buttons - Edit Controls - List Boxes - Combo Boxes - Tree Controls Spin Buttons - Progress Bars. (2) GRAPHICAL DEVICE INTERFACE: Fundamentals - GDI Objects - Bitmaps - Drawing functions - Text functions. FILE PROCESSING: Archiving - C++ Serialization - CDocument - Common Dialogs. COLLECTIONS: Array of objects - List of Strings - List of Objects. DOCUMENT/VIEW ARCHITECTURE: Document Classes - View Classes - Multiple Views. (2) (2) (2) (2)
INTRODUCTION TO .NET PROGRAMMING: Common Language Runtime - .NET Framework Class Library - Microsoft Intermediate Languages - JIters - Unmanaged code - Win Forms - Text Box - Buttons - Message Box - List Box - Handling Events. (7) L:28 P: 42 Total : 70 REFERENCES 1. Jeff Prosise, Programming Windows with MFC, Second Edition, Microsoft Press, 1999. 2. Jeffrey Ritcher, CLR via C#, Second Edition, Microsoft Press, 2006. 3. Microsoft Corporation, MCAD/MCSD Self-Paced Training Kit: Developing Web Applications with Microsoft Visual Basic .NET and Microsoft Visual C# .NET, Microsoft Press, 2002. 4. Herbert Schildt, MFC Programming from the Ground up, Tata Mcgraw Hill Publishing Co. Ltd., 2000. 5. John E Swanke, VC++ MFC Extensions by Example, Group West Publishers, 1999. LAB EXERCISES 1. 2. Create a Simple Window - a simple MFC program with only CFrameWnd and CWinApp classes. Handling Message Maps. Create event handlers and monitor events. Add controls and handlers to a form at run time. Create and configure form menus and context menus in an application. Simple Paintbrush Application. File Handling - un-buffered, binary, text files. Dialog Box Handling. SDI and MDI applications
3. 4.
5. 6. 7. 8. 9.
08MX37 SOFTWARE ENGINEERING LAB 0 0 3 2 1. Implementation of requirement analysis process using the appropriate tool
2. Implement of Design using the rational tools
13
3. Generate use case diagram and related object oriented analysis representation using rational tools 4. Generation of code using appropriate tool 5. Implementation of debugging process using the appropriate tool 6. Testing the applications for unit testing 7. Testing the application for integrated testing 8. Testing application for load or volume testing 9. Using an appropriate tool for generate test cases/ test plan/ test documents 10. Using MS-Project for generating CP/M and PERT charts and finally preparation of project plan
08MX41
ENTERPRISE COMPUTING
3 0 0 3
ENTERPRISE FOUNDATIONS: Enterprise Architectural overview - object oriented software development for enterprise Component Based software development for enterprise. Java Enterprise System. (5) ENTERPRISE DATA ENABLING : Enterprise Data - Basis of JDBC, Drivers, Connection, Statement, Result Set, Advanced JDBC features. (10) DISTRIBUTED ENTERPRISE COMMUNICATIONS ENABLING : Distributed Enterprise Communications Basis - RMI Communication - CORBA communication - DCOM Communication. (10) ASYNCHRONOUS COMMUNICATIONS : Java Message Service, Point to Point messaging, Publish Subscribe messaging, Web Services using Java, AJAX. (10) ENTERPRISE WEB ENABLING : Web Browsers and Web Servers in Enterprise. Web Programming, XML. Java Servlets - Java Server pages, JavaServer Faces , JSTL, Struts. (10) MULTITIER ENTERPRISE COMPUTING: Java Beans, Enterprise Java Beans, Stateless Session Beans, Stateful Session Beans, Message Driven Beans, Entity, Accessing EJB in web services (11) L: 56 REFERENCES 1. Paul J Perrone, Venkata S.R. Krishna R and Chayanti, " Building Java Enterprise Systems with J2EE", Techmedia , 2000. 2. George Reese, Database programming, with JDBC and Java" Second Edition, OReiliy , 2000. 3. Dustin R. Callaway - "Inside Servlets " - Addison Wesley Longman Inc. - 2001. 4. Bill Burke and Richard Monson Haefel, Enterprise Java Beans 3.0 OReily, 2006. 5. Raghu R.Kodali, Jonathan R. Wetherbee, and Peter Zadrozny, Beginning EJB 3 Application Development, Apress, 2006. 6. Jason Hunter - "Java Servlet Programming " - O' Reily & Associates Inc. - 2001. 7. Kito D.Mann, JavaServer Faces in Action, Manning, 2005. 8. Dave Crane, Eric Pascarello and Darren Jame, Ajax in Action, Manning , 2006. 9. Eric Jendrock, Jennifer Ball, Debbie Carson, Ian Evans, Scott Fordin and Kim Haase The Java EE 5 Tutorial , Addison Wesley , 2006. Total : 56
14
(5) (2)
Total: 42
08MX43
INTODUCTION TO UNIX : File System - General Purpose Utilities - Bourne Shell - Simple Filters Advanced filters Process - Communication and Scheduling - Programming with Shell. (15) SYSTEM STRUCTURE : Kernel architecture - Kernel data structure - Buffer Cache - Structure of Buffer pool Scenarios for buffer retrieval - Reading and Writing disk blocks - Advantages and Disadvantages of buffer cache - Inode Structure of regular file - Conversion of a pathname to an inode - Inode assignment to a new file - allocation of disk blocks. (15) INTRODUCTION TO SYSTEM CALLS: Process states and transitions - Context of a process - Saving the context of a process - Manipulating Process address space - Process creation and termination - System Boot and INIT process Process Scheduling - Multithreads - Concurrency and parallelism. (13) MEMORY MANAGEMENT: Swapping - Demand Paging - allocation of swap space - Data structures of demand paging Page stealer Process -page aging and fault - Interprocess Communication (13) L: 56 Total: 56 REFERENCES 1. Sumithabha Das, "Unix System V.4 - Concepts and Applications", Tata McGraw Hill , 2003. 2. Maurice J. Bauch, "Design of the UNIX Operating System", Prentice Hall of India, 2007. 3. Uresh Vahalia, "UNIX Internals", Pearson Education, 2002.
15
4. Keith Haviland and Dina Gray Unix System Programming , Addison Wesley Longman , 1998 5. Sumitabha Das, Your Unix The Ultimate Guide, Tata McGraw Hill, 2005.
08MX44
DATA MINING
3 0 2 4
DATA WAREHOUSING : Introduction , Definition and description , Need for Data Ware Housing (DWH), Need for strategic information , Failures of past Decision Support Systems , OLTP vs DWH DWH Requirements Trends in DWH DWH Framework, Information Systems Framework (Zachman Framework) Applications of DWH. (4) DATA WAREHOUSING ARCHITECTURE : Reference Architecture , Components of Reference Architecture Data Ware House Building Blocks Implementation , Physical Design Process, DWH Deployment Process. (3) DATABASE DESIGN : Dimensional Modeling , Basics , STAR Schema, Star Schema keys , Advantages of STAR Schema. (4) DATA WAREHOUSE TECHNOLOGIES : Parallel Processing Copy Management Meta Data Management Data Quality factors. (4) DATA MINING : Data Mining Tasks Data Mining Vs KDD Issues in Data Mining DM Metrics Data Mining and Databases Data Mining Architecture Future Trends. (4) DATA PREPROCESSING : Data Cleaning Data Transformation Data Reduction. DATA MINING PRIMITIVES , LANGUAGES: Data Mining primitives Data Mining Query Languages. (3) (3)
ASSOCIATIONS : Association Rules Mining Single Dimensional Boolean Association Rules from Transactional Databases Mining Multi Dimensional Association from Data Ware Houses. (4) CLASSIFICATION AND PREDICTION : Issues regarding classification and prediction Decision Tree Bayesian Classification Classifier Accuracy. (4) CLUSTER ANALYSIS : Types of Data Partitioning Methods Hierarchical Methods. APPLICATIONS AND OTHER DM METHODS : Mining Event Sequences Visual DM Text Mining Web Mining. (3) (3)
CHALLENGES IN DATA MINING : Scaling DM Algorithms Extending to new data type Distributed DM algorithms Large Scale Optimization of DM Algorithms Ease of use of DM Methods Privacy / Security Issues. (3) L: 42 Total: 42 REFERENCES 1. Paulraj Ponniah, Data WareHousing Fundamentals , John Wiley & Sons , 2003. 2. Harjinder S.Gill, Prakash C.Rao, The Official Guide to Data Warehousing, Que Corporation , 2000. 3. Jiawei Han, Micheline Kamber, Data Mining Concepts and Techniques, Morgan Kaufmann Publishers, 2001. 4. Arun k Pujari , Data Mining Techniques, University Press, 2003. 5. Mehmed Kantardzic, Data Mining Concepts , Methods and Algorithms , John Wiley & Sons , 2003. 6. M.H.Dunham , Data Mining : Introductory and Advanced Topics, Prentice Hall , 2003.
16
Note : Two Problem Sheets will be issued : 1. Shell scripts 2. System Calls P: 42 Total : 42
Software Projects Software Projects Versus Other types of Projects-Problems with Software Projects An Overview of Project planning - Project Evaluation - Project Analysis and Technical Plan- Selection of an appropriate project approach (9) Software Estimation-Preparation of Estimation -COCOMO Model-Function Point Analysis Non development Overheads Activity Planning - Project Schedules Sequencing and scheduling projects- Network planning models. (9) Shortening project duration-Identifying Critical Activities - Risk Management-Resource Allocation Monitoring and controlManaging Contracts - Managing people and Organizing teams Planning for small projects-Software Configuration Management- Managing Contracts. (9) Software Quality-Testing and Quality Assurance- Unit Testing-Integration Testing-System & Acceptance Testing 9001 and software Quality CMM concepts. Introduction to Personal Software Process and Team Software Process Case studies. REFERENCES 1. 2. 3. 4. 5. 6. 7. Mike Cotterell and Bob Hughes, Software Project Management, International Thomas Computer Press, 2006 Boris Beizer, Software Testing Techniques, Dream Tech Press, 2006 Watts. S. Humphrey, Introduction to the Personal Software Process, Pearson Education, 2006 Mordechai Ben Menachem, Software Configuration Management Guidebook, McGraw Hill, 2005 Walker Royce, Software Project Management, Addison Wesley, 2002 Boris Beizer, Software System Testing and Quality Assurance, International Thomas Computer Press, 1996 Darrel Ince, H. Sharp and M. Woodman, Introduction to Software Project Management and Quality Assurance, McGraw Hill, 1993 -ISO (10) (5) L: 42 Total : 42
17
18
2000. 5. Jay Ramachandran, Designing Security Architecture Solutions Wiley Publications, 2002. 6. William Stallings, Cryptography and Network Security Principles and Practice, Prentice Hall, 2005. 7. Niels Ferguson, Bruce Schneier, Practical Cryptography, John Wiley & Sons, Inc. 2003.
08MX56
1. 2. 3. 4. 5.
Packages development using Business Process Execution Language. Package development using web services transaction. Package development using SOAP messages. Package development using web services security. Package development using web services reliable messaging. P: 70 Total : 70
S-DES (Key generation, Encryption, Decryption) DES (Data Encryption Standard) IDEA (International Data Encryption Algorithm) RC4 RSA (Rivest, Shamir, Adleman) Input numbers with at least 150 bits. ECC (Elliptic Curve Cryptosystem) Basic ElGamal Encryption. Merkle-Hellman Knapsack Encryption Diffie-Hellman key exchange algorithm
4.
5. 6.
7. 8. 9.
10. 12.
DSA (Digital Signature Algorithm) 11. MD5 13. 14. 15. 16.
17.
SHA-1 (Secure Hash Algorithm) Signature using RSA algorithm Simulation of Kerberos (Authentication Application) ANSI X9.17 generator RSA pseudorandom bit generator
LFSR (Linear Feedback Shift Registers) 18. Simulating SSL 19. The Integer Factorization Problem: (a) Pollards rho factoring algorithm 20. The Discrete Logarithm Problem (a) Baby-Step Giant-Step algorithm P: 42 Total : 42
PROJECT MANAGEMENT: Definition and objectives of Project Management Phases in Project Management Cycle-Project appraisal Techniques. (6) HUMAN RESOURCE MANAGEMENT: Importance objectives and its functions, Human Resources Development. (4) GROUP BEHAVIOUR: Group dynamics, conformity, sociometry group cohesiveness and leadership. (6)
CHANGE MANAGEMENT: Forces affecting the organization - Organisational Change Resistance to change Perspectives on organizational change. (5) Total 42
19
RFERENCES 1. 2. 3. 4.
5.
Hahold Koontz and ODonnel, Essentials of Management, McGraw Hill Publishing Co., 1990. Leap H and Cnino M D, Personnel Human Resource Management Macmillan Publishing Co. 1989. Tripathi P C, Personnal Management and Industrial Relations, Sultan Chand & Sons, 2002. Sapru R K, Project Management, Excel Books, 1997. Stephen P. Robbins, Organisational Behaviour, Prentice Hall of India , 2000.
PIPELINE PROCESSING : Principles and Implementation Arithmetic pipeline Instruction pipelines Pipeline Hazards Hazard Resolution Scheduling Theory Asynchronous Pipelines. (8) INTERCONNECTION NETWORKS AND RELATED ALGORITHMS : Interconnection networks: Hypercubes-Shuffle -Exchanges-Trees, Meshes and Butterfly networks -- Use of graph embedding techniques to compare different different network based parallel algorithms for linear algebra Sorting Fourier transforms in systolic arrays Message Routing on multidimensional meshes Butterfly networks Hypercubes and others Layout for standard interconnection networks Lower bound techniques. (8) VECTOR PROCESSING: Basic vector architecture Issues in vector processing Vector performance modelling Compiler technology for vector machines. (4) SHARED MEMORY MULTIPROCESSOR SYSTEMS: Shared bus/ cross bar/ multi port memory Overview of future bus VME bus and Multibus II Reflected memory systems PCI bus NUMA Memory contention and arbitration techniques Interprocessor communication Indivisible accesses for synchronization Scalable coherent interface Cache coherence and bus snooping. (11) L: 42 Total : 42
REFERENCES 1. Kai Hwang and Faye Briggs, Advanced Computer Architecture and Parallel Processing , Mc Graw Hill, 1985. 2. Hennessy, Computer Architecture a Quantitative approach, Prentice Hall ,1996.
20
Discrete event simulation - concepts in discrete-event simulation, manual simulation using event scheduling, single channel queue, two server queue, simulation of inventory problem. (7) Simulation languages - GPSS - SIMSCRIPT - SIMULA - SIMPLE_1, Programming for Discrete event systems in GPSS, SIMPLE_1 and C. (8) Case study. Simulation of LAN - Manufacturing system - Hospital system . (4) L: 42 Total : 42 REFERENCES 1. 2. 3. 4. 5. Jerry Banks and John S. Carson, II, Discrete Event System Simulation, Prentice Hall , 2001. Narsingh Deo , System simulation with digital Computer, Prentice Hall , 1979. Francis Neelamkovil, Computer Simulation and Modelling, John Wiley & sons, 1987. Ruth M. Davis and Robert M.O'Keefe , Simulation Modelling with Pascal, Prentice Hall, 1989. Averil M. Law and W. David Kelton - Simulation Modelling and Analysis, McGraw Hill International Editions, 1991.
ADVANCED DATABASE MODELS: Active Databases - Temporal Databases - Spatial Databases - Multimedia Databases - Deductive Databases - Inference Mechanisms. (10) DATABASE SECURITY: Integrity and Control - Security and Integrity Threats - Defense Mechanisms - Security Specification in SQL - Statistical Database - Crash Recovery. (5) CASE STUDY : Oracle Distributed queries Partitioning Strategies Procedural Replication Performance Tuning. (3) L : 42 REFERENCES 1. Carlo Zaniolo and Stefano ceri, etal., Advanced Database Systems, Morgan Kaufmann , 1997. 2. Abraham Silberschatz, Henry F.Korth and S.Sudarshan, Database System Concepts, McGraw Hill, 2002. 3. Michael Stonebraker and Paul Brown, Object Relational DBMSs, Morgan Kaufmann, 1999. 4. Thomas Connolly and Carolyn Begg, Database Systems, Pearsons Education, 2003. 5. Tamer O Zsu M and Patrick Valduriez, Principles of Distributed Database Systems, Pearson Education, 2004. Total : 42
21
MACHINE LEARNING Frame work for learning Inductive learning Supervised, Unsupervised learning Parallel distributed processing Genetic Algorithms. (5) L : 42 REFERENCES 1. 2. 3. 4. Stuart Russel and Peter Norvig, Artificial Intelligence a modern approach, Prentice Hall, 2003. Elaine Rich and Kevin Knight, Artificial Intelligence, Tata McGraw Hill, 2003. Patrick Henry Winston, Artificial Intelligence, Addison Wesley, 2000. Luger George F and Stubblefield William A, Artificial Intelligence : Structures and Strategies for Complex Problem Solving, Pearson Education, 2002. Total : 42
Classical predicate logic fuzzy logic approximate reasoning fuzzy tautologies , contradictions, equivalence inguistichedges rule based systems graphical techniques of inference. (8) L:42 Total : 42 REFERENCES 1. Simon Haykin, Neural Networks a Comprehensive Foundation, Pearson Education, 2001. 2. Laurene Fausett, Fundamentals of Neural Networks , Pearson Education, 2004.. 3. Klir George J. and Yuan Bo, Fuzzy sets and Fuzzy Logic : Theory and applications, Prentice Hall , 1997 4. Ross Timothy J., Fuzzy Logic with Engineering applications, McGraw Hill , 1997. 5. Rajasekaran S and Vijayalakshmi Pai G.A, Neural Networks, Fuzzy Logic and Genetic Algorithms, Prentice Hall,2003.
08MX07 BIOINFORMATICS
3 0 0 3 INTRODUCTION: Molecular Biology Finding Genes in Genomic DNA Phylogenetic trees Gene expression data Protein structure prediction (9) CONCEPTS AND APPLICATION: Introduction understanding &using Biological databases proteins structural profiles & properties Alignment of pairs of sequence Multiple sequence alignment and sequence motifs - Tools for sequence assignment phylogenetic analysis - Gene Mapping Mapping techniques: sequence assembly & gene expression problem solving in Bio-informatics. (18) BIOINFORMATICS COMPUTING : Databases Networks Search Engines Data visualization Data Mining Pattern Matching Modeling & Simulation. (9) PROGRAMMING LANGUAGE FOR BIOINFORMATICS : Perl on Linux Platform. (6) L : 42 Total: 42 REFERENCES 1. S.C.Rastogi, Namita Mendiratta and Parag Rastogi, Bioinformatics Concepts Skills & Applications, CBS Publishers & Distributors , 2003.
22
2. 3. 4.
Pierre Baldi & Suren Brunak, Bioinformatics The Machine learning Approach, MIT press, 2003. Bryan Bergeron, Bioinformatics Computing, Pearson Education, 2003. Bishop M.J and Rawlings C.J, Nucleic acid and protein sequence analysis a practical approach, IRL Press,1987. Saizberg Searis and Kasif, Computational methods in Molecular Biology, Elsevier, 1998.
08MX08
FOUNDATIONS: Introduction- human memory thinking and problem solving - text entry devices- display devices-human computer interaction- paradigms for interaction. (8) USER INTERFACE DESIGN: Principles - User Interface standards - specification of User interface appearance - web interfaces. (9) INTERACTIVE MULTIMEDIA TECHNOLOGY: Interaction and Interfaces- Semiotics-text-sound-still images. (8)
INTELLIGENT AGENTS: Introduction - overview of agents - agent architecture - agent communication-logic based agentsmulti-agent systems learning. (8) PATTERN RECOGNITION AND CLASSIFICATION: Pattern Recognition systems- elementary classifiers, Bayesian classifiers, K Nearest neighbour classifier - Multilayer Neural Network classifiers - Fuzzy clustering. (9) L: 42 Total : 42 REFERENCES 1. Gerhard Weiss, Multiagent systems: A modern approach to distributed Artificial Intelligence, MIT Press, 1999 2 .Ben Shneiderman, Designing the user interface, Addison Wesley, 1998. 3. Marl Elsom Cook, Principles of Interactive Multimedia, Mc Graw Hill, 2001. 4. Alan Dix, Janet Finlay, G D Abowd and Russel Beale, Human Computer Interaction, Pearson Education, 2004. 5. Marques de Sa, Pattern Recognition, Springer Verlag, 1999.
CONCEPTUALIZING THE SYSTEM : Creating a Vision of the system Writing User stories Writing Acceptance Tests - One simple solution Watching our words. (13) PLANNING : Providing estimates Planning releases Planning Iterations Tactical Planning. (5)
DEVELOPMENT & DELIVERY : Pair Programming Test First Design Code with Intention Refactoring Relentless Integration - Delivering the system. (11) Adopting and Adapting XP - Scaling XP - the Future of XP. Case Studies REFERENCES 1. David Astels, Granville Miller and Miroslav Novak, A Practical Guide to Extreme Programming, The COAD series, Prentice Hall PTR, Pearson Education Inc., 2002. 2. Kent Beck and Martin Fowler ,Planning Extreme Programming, Pearson Education Inc., 2000. 3. Kent Beck, Extreme Programming Explained, Addison Wesley, 1999. 4. Ken Auer and Roy Miller, Extreme Programming Applied: Playing to Win, Addison Wesley, 2001. 5. William C. Wake Extreme Programming Explored, Addison Wesley, 2001. 6. James W. Newkirk and Robert C. Martin Extreme Programming in Practice, Prentice Hall Inc., 2001. (4) (4) L:42 Total : 42
23
TWO DIMENSIONAL GRAPHICS: Basic transformations - Matrix representation and homogeneous coordinates composite transformations - Line drawing algorithms: DDA and Bresenham's algorithms - Circle generation algorithms: Mid point circle algorithm - Point clipping - Line clipping: Cohen Sutherland algorithm - Polygon clipping: Sutherland Hodgeman algorithm - Line covering. (8) RASTER GRAPHICS: Fundamentals: generating a raster image, representing a raster image, scan converting a line drawing, display characteristics, speed of scan conversion, natural images - Solid area scan conversion: Scan conversion of polygons, Y-X algorithm, properties of scan conversion algorithms - Interactive raster graphics: painting model, moving parts of an image, feed back images. (8) CURVES AND SURFACES: Parametric representation of curves - Bezier curves - B-Spline curves - parametric representation of surfaces - Bezier surfaces - curved surfaces - ruled surfaces - quadric surfaces. (6) THREE DIMENSIONAL GRAPHICS: 3D transformations - viewing 3D graphical data - orthographic, oblique, perspective projections - hidden lines and hidden surface removal. (4) ANIMATION GRAPHICS: Design of Animation sequences - animation function - raster animation - key frame systems motion specification -morphing - tweening. (3) COMPUTER GRAPHICS REALISM: Tiling the plane - Recursively defined curves - Koch curves - C curves - Dragons space filling curves - fractals - Grammar based models - graftals - turtle graphics - ray tracing. (4) L: 42 REFERENCES 1. Donald Hearn and Pauline Baker M, " Computer Graphics", Prentice Hall , 1998. 2. Foley James D., Vandam Andries and Hughes John F., "Computer Graphics : Principles and Practice", AddisonWesley, 1999. 3. Gonalez R.C and Woods R.E, Digital Image Processing, Pearson Education, 2003. 4. William M. Newmann and Robert F. Sproull, "Principles of Interactive Computer Graphics", McGraw Hill, 1989. 5. Hill F.S. Jr., "Computer Graphics", Maxwell Macmillan , 1990. 6. Roy. A. Plastock and Gordon Kalley, "Theory and Problems of Computer Graphics", Schaum's outline series, McGraw Hill , 2000. Total : 42
08MX0B
INTRODUCTION TO EMBEDDED SYSTEMS: Definition Examples of Embedded systems Telegraph Cordless BarCode Scanner Laser Printer underground tank monitor Performance & Design issues Throughput Response Testability Debuggability Reliability Memory space Program Installation . power Consumption Processor Hogs Cost. (2) EMBEDDED SYSTEM HARDWARE FUNDAMENTALS : Microprocessors Direct Memory Access Universal Asynchronous Receiver/ Transmitter (UART) Programmable Array Logic (PAL) Application Specific Integrated Circuit (ASIC) Watch dog Timer. (4) INTERRUPTS : Interrupt Handler Saving and Restoring the content - Disabling Interrupts The Shareddata Problem SharedData bug Atomic and Critical sections Interrupt Latency. (5) EMBBEDDED SOFTWARE ARCHITECTURE : Round Robin Round Robin with interrupts A simple Bridge as an Example characteristics Functions Queue Scheduling - Architecture Real Time Operating System Architecture. (5) REAL TIME OPERATING SYSTEMS : Tasks and Task states Tasks and Data Shareddata problems Reentrancy Reentrancy Rules Semaphores and Shared-data RTOS Semaphores Initializing semaphores - Reentrancy and Semaphores Multiple semaphores - Semaphore problems variants. (7) REAL TIME OPERATING SYSTEM SERVICES: Message Queues, Mailboxes and Pipes Time functions - Events Memory Management Interrupt Routine in RTOS Environment. (6) DESIGN USING RTOS : Design Principles Short Interrupt Routines RTOS Tasks Tasks for Priority Tasks for Encapsulation Creating and Destroying tasks Avoidance - Tank Monitoring System Design as example - Hard Real Time Scheduling. (7) EMBEDDED SOFTWARE DEVELOPMENT TOOLS: Host and Target Machines Cross compilers Cross Assemblers Tool chains Link / locators for Embedded systems Getting Embedded software into target system PROM Programmers ROM Emulators - In Circuit Emulators Flash Memory - Monitors. (6) L: 42 Total : 42 REFERENCES
24
1. David E.Simon, An Embedded Software Primer, Pearson Education, 2005. 2. Frank Vahid and Tony Givargis, Embedded System Design: A Unified Hardware/Software Introduction, John-Wiley and sons Inc., 2002. 3. Jane W.S.Lin, Real Time Systems, Pearson Education , 2004 4. Bruce P.Douglass, Real-time UML : Advances in the UML for Real Time Systems, Pearson Education, 2004.
Medium access control - Hidden and exposed terminals - Near and far terminals - SDMA , FDMA ,TDMA , Fixed TDM , Classical Aloha , Slotted Aloha , Carrier sense multiple access - Reservation TDMA - Multiple access with collision avoidance - Polling - CDMA - Spread Aloha multiple access - Comparison of S/T/F/CDMA. (7) GSM - Mobile services - System architecture - Radio interface - Protocols - Localization and calling - Handover Security Location Management for Mobile Cellular Systems GPRS Mobile services System Architecture. (5) Recent technologies - Bluetooth EDGE - UMTS and IMT-2000. Wireless LAN - Infra red vs radio transmission - Infrastructure and ad-hoc network - IEEE 802.11 architecture - Protocol architecture - Physical layer - Medium access control layer - MAC management. (4) System (5)
Mobile network layer - Mobile IP - Goals, assumptions and requirements - Entities and terminology - packet delivery Agent discovery - Registration - Tunneling and encapsulation. (4) World wide web WAP - Architecture - Wireless datagram protocol , Wireless transport layer security , Wireless transaction protocol, Wireless session protocol , Wireless application environment , Wireless markup language , WML script - Mobile computing applications using J2ME. (5) L: 42 Total : 42 REFERENCES Jochen Schiller , Mobile Communications, Addison-Wesley, 2003. Matyn Mallick, Mobile and Wireless Design Essential, Wiley Publishing Inc., 2003. Steve Mann and Scoot Schibli, The Wireless Application Protocol, John Wiley & Sons, Inc., 2000. Steve Mann , Programming Applications with the Wireless Application Protocol, John Wiley & Sons, Inc., 2000.
08MX0D CRYPTOGRAPHY
3 0 0 3 INTRODUCTION: Encryption and Secrecy Objective of Cryptography Attacks Cryptographic Protocols Provable Security. (3) SYMMETRIC-KEY ENCRYPTION: Stream Ciphers Block Ciphers AES Modes of Operation (5)
PUBLIC-KEY CRYPTOGRAPHY: Concept of Public-Key Cryptography: RSA Digital Signatures Secure Application of RSA Encryption Attacks. Hash Functions: Merkles Meta Method Construction of Hash Functions Probabilistic Signatures. Discrete Logarithm: ElGamals Encryption ElGamals Signature Scheme Digital Signature Algorithm. (8) CRYPTOGRAPHIC PROTOCOLS: Key Exchange and Entity Authentication: Kerberos Diffie-Hellman Key Agreement Public Key Management Techniques. Identification Schemes: Interactive Proof Systems Zero-Knowledge FiatShamir Identification Scheme and Signature Scheme. Commitment Schemes: based on Quadratic Residues based on Discrete Logarithms. Electronic Elections: Secret Sharing Multi-Authority Election Scheme Proofs of Knowledge. Digital Cash: Blindly Issued Proofs A Fair Electronic Cash System. (12) PROBABILISTIC ALGORITHMS: Coin-Tossing Algorithms Monte Carlo and Las Vegas Algorithms. (3)
25
PROVABLY SECURE ENCRYPTION: Theoretic Security Perfect Secrecy and Probabilistic Attacks Public Key OneTime Pads Computationally Secret Encryption Schemes (4) PROVABLY SECURE DIGITAL SIGNATURES: Attacks and Levels of Security Claw-Free Pairs and CollisionResistant Hash Functions Tree-Based Signatures State-Free Signature Schemes. (4) ONE-WAY FUNCTION AND PSEUDORANDOMNESS: Computationally Perfect Pseudorandom Bit Generators Yaos Theorem. (3) L: 42 Total : 42 REFERENCES 1. 2. 3. 4. 5. Hans Delfs and Helmut Knebl, Introduction to Cryptography, Springer Verlag, 2002. Charles P. Pfleeger and Shari Pfleeger, Security in Computing, Pearson Education, 2002. Richard E.Smith, Internet Cryptography, Pearson Education, 2000. Bruce Schneier, Applied Cryptography, John Wiley & Sons, Inc.2000. Alfred J. Menezes, Paul C. Van Oorschot and Scott A. Vanstone, Handbook of Applied Cryptography, CRC Press, 2000. 6. Jay Ramachandran, Designing Security Architecture Solutions Wiley Publications, 2002. 7. Niels Ferguson and Bruce Schneier, Practical Cryptography, John Wiley & Sons, Inc. 2003.
08MX0E
SOFTWARE TESTING
3 0 0 3
INTRODUCTION: Fundamental concepts of Testing Types of Testing Classification Unit Testing, Package Testing, Integration Testing, System and Acceptance Testing Examples. (5) DEVELOPING A TEST APPROACH: Addressing Software system business risk - Defining a software system testing strategy - Developing software system testing tactics - Testing tools. (7) TESTING A SOFTWARE USING A LIFE CYCLE METHODOLOGY : Requirements phase testing - Design phase testing - Program phase testing - Desk debugging and program peer view test tools - Evaluating test results - Installation phase testing - Acceptance testing. (7) TESTING OBJECT-ORIENTED SOFTWARE cases, Unit Testing of classes.
Testing the Software, System Testing Example, Test cases from use (4) (4)
TESTING WEB APPLICATIONS : Functionality and Usability Issues, Security Testing, Database Testing.
TESTING METHODOLOGY FOR SOFTWARE MAINTENANCE: Testing the correctness of the installing a software change - Testing the validity of a software cost estimate - Testing the progress of the software system - Inspecting test plan and test cases - Software Inspection - Costs & Benefits - Overview - The Inspection Process. (7) ASSESSING CLIENT-SERVER AND LAN RISKS: A testing strategy for a rapid prototyping - Testing techniques Testing tools. (4) TEST DOCUMENTATION: Reporting test results - Final test reporting - Evaluating test effectiveness - Use of testing metrics - Improving the test process. (4) L: 42 Total : 42 REFERENCES 1. 2. 3. 4. 5. 6. Elfriede Dustin, Effective Software Testing, Pearson Education, 2007 Louise Tamres, Introducing Software Testing, Pearson Education, 2006 Boris Beizer, Software Testing Techniques, Dream Tech Press, 2006 William Perry, Effective Methods for Software Testing, John-Wiley & Sons Inc, 2006 Ilene Burnstein, Practical Software Testing A Process oriented approach, Springer-Verlag, 2006 Boris Beizer, Black Box Testing, John Wiley & Sons, 1995
26
OPEN SOURCE DATABASE: MySQL: Introduction Setting up account Starting, terminating and writing your own SQL programs Record selection Technology Working with strings Date and Time Sorting Query Results Generating Summary Working with metadata Using sequences MySQL and Web. (5) OPEN SOURCE PROGRAMMING LANGUAGES: PHP: Introduction Programming in web environment variables constants data types operators Statements Functions Arrays OOP String Manipulation and regular expression File handling and data storage PHP and SQL database PHP and LDAP PHP Connectivity Sending and receiving E-mails Debugging and error handling Security Templates. (8) PYTHON: Syntax and Style Python Objects Numbers Sequences Strings Lists and Tuples Dictionaries Conditionals and Loops Files Input and Output Errors and Exceptions Functions Modules Classes and OOP Execution Environment. (7) OPEN SOURCE TOOLS AND TECHNOLOGIES: WEB SERVER: Apache Web server Working with Web Server Configuring and Using apache web services. (6) MDA: Introduction to MDA Genesis of MDA Meta Object Facility UML UML Profiles MDA Applications. (5)
L: 42 Total: 42 REFERENCES 1. 2. 3. 4. 5. 6. Remy Card, Eric Dumas and Frank Mevel, The Linux Kernel Book, Wiley Publications, 2003 Steve Suchring, MySQL Bible, John Wiley, 2002 Rasmus Lerdorf and Levin Tatroe, Programming PHP, OReilly, 2002 Wesley J. Chun, Core Phython Programming, Prentice Hall, 2001 Peter Wainwright, Professional Apache, Wrox Press, 2002 Stephen J. Mellor, Marc Balces, Executable UMS: A foundation for MDA, Addison Wesley, 2002
08MX0G
Introduction to XML Comparison with HTML XML documents Well-formed XML document Markup and character data Prolog and XML declaration Processing Instructions XML elements Types of elements Attributes Elements Vs Attributes CDATA sections - XML Namespaces. (6) Valid XML document Document Type Declarations and Document Type Definitions(DTDs) Internal and External DTDs Validating XML documents using DTD Entities and Attributes General and Parameter Entities. (6) XML Schemas Validating XML documents using XML Schema Comparison with DTD Creation of Simple Types Specifying attribute constraints and defaults Creation of Complex type Specifying different types of content using Complex type Specifying data types and restrictions in Schema. (7) Cascading Style Sheets Attaching Style sheets in XML documents Selecting Elements in Style Sheet Rules Creating Style rules Formal Style Property Specifications. (4) XSL Transformations XSLT style sheets in XML Documents Creating XSLT style sheets Matching Document structures to template rules Defining Template rules and Declarations XPath Operators and Expressions Branching and Control functions Variables and Parameters in XSLT Working with Strings , Booleans and Numbers Restructuring Input Documents and Manipulating Document Subsets. (7) DOM and SAX Comparison Creating a DOM parser Displaying and Filtering XML documents Working with SAX Displaying and Filtering XML documents. (5) XML Technologies XLINK , XPOINTERS, XQUERY, SVG, RDF. (7) L: 42 Total : 42 REFERENCES 1. William R.Stanek , XML Pocket Consultant , Prentice-Hall of India Pvt Ltd, 2002. 2. Sandra E.Eddy & John E.Schnyder Teach Yourself XML, IDG Books India (P) Ltd, 2000. 3. Heather Williamson, XML:The Complete Reference, McGraw-Hill, 2001.
08MX0H
SOFTWARE PATTERNS
3 0 0 3
INTRODUCTION: Reusable software Reusable Object Oriented software class libraries frameworks Design Patterns. Design Patterns Definition Overview and motivation categories Relationships between patterns. Descriptions of patterns patterns and software architecture pattern oriented analysis and Design. (13)
27
ARCHITECTURAL AND DESIGN PATTERNS: Introductions to architectural patterns layers pipes and filters. Black board distributed system brokers Interactive systems Adaptable systems. Introduction to design patterns structural decomposition Tactical and strategical patterns organizations of work Access control management communications. (14) PATTERNS SYSTEMS AND FUTURE: Classifications selections eoulation of patterns systems UML & Patterns. Pattern mining Pattern Organization and indexing methods and Tools , Algorithm, Data Structures and patterns Formalizing patterns. (8) CASE STUDIES : Developing applications using Patterns. Arrays and stacks - Thread specific Storage manager Sort Utility parsing Binary Tree Document Editor. (7) L: 42 REFERENCES 1. 2. 3. 4. 5.
6.
Total : 42
Frank Buschmann and Regine Meunier etal, Pattern Oriented Software Architecture A System of Patterns John Wiley & Sons, 2006 Erich Gamma, Richard Helm, Ralph Johnson and John Vlissides, Design Patterns : Elements of Reusable Object Oriented Software, Addison Wesley Professional Computing Series, 2006 James W. Cooper, Java Design Patterns A Tutorial, Addison Wesley, 2005 Alan Shalloway, James R. Trott, Design Patterns Explained : A New Perspective on Object Oriented Design Software Pattern Series, Addison Wesley, 2004 Ivar Jacobson and Griss Jacobson,Software Reuse, Addison Wesley, 2004 William Brown, McCormick and Scott Thomas, Anti Patterns in Project Management, John Wiley & Sons, 2003
08MX0I
INTRODUCTION TO MULTIMEDIA COMMUNICATIONS: Multimedia Communication Model Elements of Multimedia Systems User Requirements Network Requirements Packet Transfer Concept Multimedia Requirements and ATM Networks Multimedia Terminals. (6) DISTRIBUTED MULTIMEDIA SYSTEMS (DMS): Main Features of DMS. Resource Management of DMS Networking IP Networking IP Multicast Resource. Reservation Protocol (RSVP) Real-time Protocol (RTP) Real-time Control Protocol (RTCP). Integrated Management Architecture for IP-based Networks ATM Integration of IP and ATM Real-time Multimedia over ATM Multimedia Operating Systems Distributed Multimedia Applications: ITV Telecoperation Hybermedia Applications. (12) MULTIMEDIA COMMUNICATION STANDARDS: MPEG approach Coding of Moving Picture and Associated Audio (MPEG-1) Generic coding of Moving Picture and Associated Audio (MPEG-2) - IPv6 MPEG-4 Video Transport Across the Internet Introduction to JPEG 2000 standard Architecture of JPEG 2000. (12) MULTIMEDIA COMMUNICATIONS ACROSS NETWORKS: Packet Audio / Video in the Network Environment Packet Voice Packet Video Video Transport across Generic Networks Multimedia Transport across IP Networks IP Multicast overlay using ATM IP Multicast overlay using Routers Multimedia Across Wireless Mobile Networks Digital Television infrastructure. (12) L : 42 Total : 42 REFERENCES 1. Rao K.R , Zoran S.Boj kovic, Dragorad A.Milovanovic, and D.A.Milovanovic Multimedia Communication Systems: Techniques, Standards and Networks, Prentice- Hall of India, 2002. 2. Jane W.S . Liu, Real-time Systems, Pearson Education, 2001. 3. William Stallings, Data and Computer Communications, Pearson Education, 2000.
28
specifications, Logical partitioning of disks, RAID & parity algorithms, hot sparing, Physical vs. logical disk organization, protection, and back end management, Array caching properties and algorithms, Front end connectivity and queuing properties, Front end to host storage provisioning, mapping, and operation, Interaction of file systems with storage, Storage system connectivity protocols (8) INTRODUCTION TO NETWORKED STORAGE: JBOD, DAS, SAN, NAS, & CAS evolution, Direct Attached Storage (DAS) environments: elements, connectivity, & management, Storage Area Networks (SAN): elements & connectivity, Fibre Channel principales, standards, & network management principales, SAN management principles, Network Attached Storage (NAS): elements, connectivity options, connectivity protocols (NFS, CIFS, ftp), & management principles, IP SAN elements, standards (iSCSI, FCIP, iFCP), connectivity principles, security, and management principles, Content Addressable Storage (CAS): elements, connectivity options, standards, and management principles, Hybrid Storage - solutions overview including technologies like virtualization & appliances. (9) INTRODUCTIONS TO INFORMATION AVAILABILITY: Business Continuity and Disaster Recovery Basics, Local business continuity techniques, Remote business continuity techniques, Disaster Recovery principles & techniques. (8) MANAGING & MONITORING: Management philosophies (holistic vs. system & component), Industry management standards (SNMP, SMI-S, CIM), Standard framework applications, Key management metrics (thresholds, availability, capacity, security, performance), Metric analysis methodologies & trend analysis, Reactive and pro-active management best practices, Provisioning & configuration change planning, Problem reporting, prioritization, and handling techniques, Management tools overview (6) SECURING STORAGE AND STORAGE VIRTUALIZATION: Define storage security. , List the critical security attributes for information systems, describe the elements of a shared storage model and security extensions, Define storage security domains, List and analyze the common threats in each domain, Identify different virtualization technologies, describe block-level and file level virtualization technologies and processes. (3) L: 42 Total: 42 REFERENCES 1. Marc Farley Osborne, Building Storage Networks, Tata Mac Graw Hill, 2001 2. Robert Spalding and Robert Spalding, Storage Networks: The Complete Reference, Tata McGraw Hill, 2003 3. Meeta Gupta, Storage Area Network Fundamentals, Pearson Education Ltd., 2002 4. Gerald J Kowalski and Mark T Maybury, Information Storage Retreival Systems theory & Implementation, BS Publications, 2000 5. Thejendra BS, Disaster Recovery & Business continuity, Shroff Publishers & Distributors, 2006
: The value of knowledge Knowledge Engineering and Knowledge Systems- Knowledge Engineering basics- Principles Model Suite Process Roles Terminology-Task and Organization Analysis - Steps - Organization Modeling Impact and Improvement Analysis - Task and Agent modelling Guidelines for the context Modeling Process.
(6)
KNOWLEDGE MANAGEMENT AND MODELS: Explicit and Tacit knowledge Knowledge Management Cycle Knowledge management and process - Components - Nature of knowledge Challenges Knowledge Management Model Domain Knowledge Inference Knowledge Task Knowledge Typographic Conventions Comparison with other analysis approaches - Template knowledge Models Reusing Knowledge Model Elements A small task Template catalog Classification Assessment Diagnosis- Monitoring Synthesis Configuration design Assignment Planning scheduling task type combinations Relation to Task and Organization models. (14) KNOWLEDGE MANAGEMENT CONSTRUCTION, MODELLING AND ELICITATION: Introduction stages Knowledge Identification Knowledge specification Knowledge Refinement Documenting the Knowledge Model. (4) Modelling Communication aspects- Role and Overview of the Communication model The Communication plan transactions between agents Detailing the Information Interchange validating and balancing the Communication model A structured process for Communication modeling - Advanced knowledge modelling: Introduction - Domain, Inference and Task Knowledge - Knowledge Elicitation - Introduction Characteristics- Techniques An Elicitation Scenario. (11) DESIGN , IMPLEMENTATION AND APPLICATION OF KNOWLEDGE SYSTEMS: Introduction - Overview of the design process- Steps Design of prototypes Distributed Architectures- Implementation in Prolog and Aion - Project Management - Project Planning Assessing risks Setting objectives through Model states Documentation. (7) L:42 REFERENCES Total : 42
29
1. Guss Schreiber, Hans Akkermans, Anjo Anjewierden, Robert de Hoog, Nigel Shadbolt, Walter Van de Velde and Bob Wielinga, Knowledge Engineering and Management Universities Press, 2001. 2. Stuart Barnes, Knowledge Management Systems: Theory And Practice, Thomas Learning, 2002 3. Jerry Honeycutt, Knowledge Management Strategies, Microsoft Press, 2000
30
2006 3. John Stark, Product Life Cycle Management, Springer, 2004 4. Antti Saaksvuori, Product Life Cycle Management, Springer, 2003.
Logic and Inference: Introduction - Example of Monotonic Rules: Family Relationships - Monotonic Rules: Syntax Monotonic Rules: Semantics - Nonmonotonic Rules: Motivation and Syntax - Example of Nonmonotonic Rules - Rule Markup in XML for Monotonic Rules - Rule Markup in XML for Nonmonotonic Rules. (8) APPLICATIONS: Horizontal Information Products - Data Integration - e-Learning - Web Services - Other Scenarios. (3) ONTOLOGY ENGINEERING: Constructing Ontologies Manually - Reusing Existing Ontologies - Using Semiautomatic Methods - On-To-Knowledge Semantic Web Architecture. (2) L:42 REFERENCES 1. 2. Grigoris Antoniou and Frank van Harmelen, A Semantic Web Primer,The MIT Press Cambridge, Massachusetts London, England, 2004. John Davies, Dieter Fensel & Frank van Harmelen, Towards the Semantic Web,Wiley , 2002. Total : 42
INTRODUCTION TO GRAPH MODELS: Basic definitions, walk, path, cycle and trees, bipartite graphs, cliques Graph modeling applications (4) CONNECTIVITY: Cuts and connectivity edge connectivity, blocks 2 connected graphs, connectivity of digraphs k connected and k edge connected graphs. (5) MATCHINGS AND FACTORS: Maximum bipartite matching, Weighted bipartite matching, Faster bipartite matching Independent set and covers Dominating sets. (5) PLANARITY OF GRAPHS: Planarity and non planarity extending planner drawings Kuratowskin theorem planarity algorithm. (4) GRAPH COLORING: Vertex colorings - Map colorings Edge colorings Application, Fast register allocation for computer programming. (4) DYNAMIC GRAPH ALGORITHMS: Dynamic problems on undirected graphs, general technique, connectivity, minimum spanning tree dynamic problems on directed graphs, general technique, dynamic transitive closure, dynamic shortest path. (5)
31
RANDOM GRAPHS: Existence and Expectation Properties of almost all graphs Threshold functions Connectivity, Cliques and coloring. (8) WEB GRAPH MODELS: Introduction Other real world self organizing network Random graph / Models for the web graph. (8) L: 42 Total: 42
REFERENCES 1. 2. 3. 4. 5. Douglas B. West, Introduction to Graph Theory, Pearson Education, 2002 Jonathan L. Gross and Jay Yellen, Graph Theory and its Applications, CRC press, 1999. Jonathan L. Gross and Jay Yellen, Hand book of Graph Theory, CRC press, 2004. B. Bollobas, W.Fulton, A.Katok, F.Kirwan and P.Sarnak, Random Graphs, Cambridge University press, 2001 Stefano leonardi, Algorithm & Models for the Web Graph, Proceedings of third International workshop WAW 2004, Springer verlag, 2004
32
CASE STUDIES: The MCNC Enterprise Grid SUN N1 Grid Engine LSF Suite - The NEESgrid cyper-infrastructure The Globus Toolkit 4 Service Container. (4) L:42 REFERENCES
1.
Total: 42
2.
Plaszczak P and R. Wellner, Grid Computing: The savvy Managers Guide, Elsevier, 2006. Joshy Joseph and Craig Fellenstein, Grid Computing, Pearson Education, 2007.
33