Post on 03-Apr-2018
STUDY & EVALUATION SCHEME
M.Tech. (Computer Science & Engineering)
Part Time
Course and Scheme of Examination
S.
No
Course
Code
Subject
Hours/Week
Cre
dit
s
Evaluation (Marks)
Total
Marks
Exam. Marks Sessional
Lec
ture
Tu
tori
al
Pra
cti
ca
l Th
eory
Pra
ctic
al
Tu
tori
al
Pra
ctic
al
Semester -I
1. CSP-101 Advanced Computer
Networks
03 01 - 04 100 - 50 - 150
2. CSP-102 Advanced Software
Engineering
03 01 - 04 100 - 50 - 150
3. CSP-154 Advanced Computer
Networks Lab
- - 03 02 - 50 - 25 75
Total 10 375
Semester –II
1. CSP-201 Cryptography &
Networks Security
03 01 - 04 100 - 50 - 150
2. CSP-202 Software Testing and
Quality Management
03 01 - 04 100 - 50 - 150
3. CSP-254 Software Engineering
Lab
- - 03 02 - 50 - 25 75
Total 10 375
Semester –III
1. CSP-301 Advanced Computer
Architecture
03 01 - 04 100 - 50 - 150
2. CSP-302 Advanced Operating
System and
Distributed
Computing
03 01 - 04 100 - 50 - 150
3. CSP-354 Seminar - - 03 02 - - 50 - 50
Total 10 350
Semester –IV
1. CSP-401 Advanced Database
Design
03 01 - 04 100 - 50 - 150
2. CSP-402 Advanced Artificial
Intelligence
03 01 - 04 100 - 50 - 150
3. Elective-1 03 01 - 04 100 - 50 - 150
Total 12 450
Semester –V
1. Elective-2 03 01 - 04 100 - 50 - 150
2. CSP-599 Thesis/Dissertation - - 08 08 - - - 150 150
Total 12 300
Semester –VI
1. CSP-599 Thesis/Dissertation - - 12 12 - 200 - 200 400
Total 12 400
Grand Total 2250
LIST OF ELECTIVE
Elective-1
1. Digital Image Processing (CSP-041)
2. Mobile Computing (CSP-042)
3. Data Warehousing & Data Mining (CSP-043)
Elective-2
1. Parallel Algorithm (CSP-051)
2. Adhoc Sensor Networks (CSP-052)
3. Embedded System (CSP-053)
4. Advanced Mobile Computing (CSP-054)
ADVANCED COMPUTER NETWORKS
CSP- 101
L T P
3 1 0
UNIT-1
Need & Comparison of network models (ISO-OSI and TCP/IP), IEEE Standards-DQDB,
Wireless LAN.
Introduction to flow control, Error Control, Error detection and correction, IP Addressing,
multiplexing.
HDLC-Configurations and transfer modes, frames, Control Field, Segment format, Features &
comparison of IP V4, IPV6. [10]
UNIT-2
Network layer - connection devices, routing algorithms and protocols, direct versus indirect
delivery, forwarding techniques, Unicast routing protocols -optimization, intra and inter –
domain routing, distance vector routing, link state routing, path vector routing.
Multicast routing protocols - Applications, Multicast Routing, IP routing, dynamic routing
protocols.
[8]
UNIT-3
Transport layer-User datagram protocol (UDP)-segment format, Well-known port for UDP,
checksum, UDP Operation, Use of UDP.
TCP - TCP Segment format, TCP Services, TCP features, TCP connection Establishment &
release, TCP half close, TCP simultaneous close, TCP timers, TCP data flow, TCP timeout and
retransmission.
SCTP- SCTP services, SCTP Feature, Packet format, and SCTP Association.
[10]
UNIT-4
Congestion control - data traffic descriptor, traffic profile, congestion - network performance,
open-loop& close loop congestion control.
Quality of services - flow characteristics, flow classes, techniques to improve QoS-Scheduling,
Traffic Shaping, Resource reservation Admission control, RSVP, ARP, RARP, ICMP, and
IGMP.
Security-services - message confidentiality, message authentication, message Non-repudiation,
message confidentiality-confidentiality with symmetric – key cryptography.
Confidentiality with asymmetric-key cryptography, message and message digest, hash function
criteria.
[8]
UNIT 5
Application layer- Segment format and working of DNS, BOOTP, DHCP, FTP, TELNET,
TFTP, streaming live audio/video, real – time interactive audio/video – characteristics, RTP –
RTP Packets Format, RTCP – Sender Report, Receiver, Source Description Message, Bye
Message. Application- Specification Message, Case study of voice over IP – SIP. [8]
References:
1. Forouzen,”Data Communication and Networking”,TMH
2. A.S.Tanenbaum,”Computer Networks”,3rd
Edition,Prentice Hall India,1997.
3. W.Stallings,”Data and Computer Communication”,Macmillan Press,1989.
4. W. Richard stevens, “ TCP/IP Illustrated Vol 1 “, Addition Wesley.
5. J Martin, “TCP/IP Networking Architecture, Administration and programming”, Prentice
Hall 1994.
6. D.E. Comer, “Internetworking with TCP/IP, Vol 1, Principles, Protocols, and
architecture.
7. R. Stevens, “Unix Networking Programming”, PHI 1998.
ADVANCED SOFTWARE ENGINEERING
CSP -102
L T P
3 1 0
UNIT-I
Software Engineering: Review of Software Engineering ,Key Concepts, Classical SDLC model
of software engineering , COTS, RUP ,Rapid Application Development, Agile methods, Extreme
programming. Advanced concepts of software engineering: Clean Room Software
Engineering, Component Based Software Engineering, Aspect oriented software engineering,
Service oriented software engineering, Object Oriented Software Engineering. [8]
UNIT -II Software Project Management: Introduction to Software project management, Project
Managers Roles and Responsibilities, Project Planning, Project Evaluation, Project Monitoring
and Control, Effort Estimation, Human Resource Management, Risk Management, Software
Project Management Tools. [8]
UNIT-III
Requirement Engineering: Introduction, Importance, Challenges, Success factors of
Requirement Engineering, Requirement Engineering Framework, Characteristics of
Requirements, Issues and problems in Requirement Elicitation, Trends and challenges of
Requirement Elicitation ,Techniques and approaches of Requirement Elicitation ,Role of Soft
Skills in Requirement analysis ,Requirement Reuse, Requirement Verification & Validation.
Specification of Requirement models: Characteristics of SRS, Components of SRS,
Specification Language, Structure of Requirement Document, Guidelines for writing SRS. [10]
UNIT –IV
Requirement Prioritization: Aspects of Prioritization, Prioritization Techniques, Requirement
Negotiation, Ambiguity in Requirement engineering, Requirement Management: Change
Management, Activities, Traceability, Measurement & Metrics, Software Requirements and Risk
Management, Requirement Engineering for Agile Methods, Introduction to Object Oriented
Requirement, Requirement Engineering for Web Based Information System ,Distributed
Requirement Engineering ,Future directions in Requirement Engineering Research. [8]
UNIT-V
Software Design: Design Principles, Software Design Process, Design Qualities, Design
Patterns.
Design Practices: Incremental Design, Structured Analysis and Structured Design, Jacksons
Structured Programming, Introduction to Object Oriented Design. [10]
REFERENCES
1. Sommerville “Software Engineering” , Pearson
2. Bob Hughes, ”Software project Management” ,TMH
3. Aybüke Aurum, Claes Wohlin “Engineering and Managing Software Requirements”
Springer.
4. Karl E. Weigers “Software Requirements” WP Publishers & Distributors
5. Brian Berenbach “Software & Systems Requirements Engineering ” TMH
6. David Budgen, “Software Design” Pearson, 2003
ADVANCED COMPUTER NETWORKS LAB
CSP-154
L T P
0 0 3
SECTION – A (Study of LAN Trainer Kit)
(A) MAC LAYER
1. Simulate ALOHA protocol for packet transmission between a no. of Nodes connected to a
common bus.
2. Simulate CSMA protocol for packet transmission between a no. of Nodes connected to a
common bus.
3. Simulate CSMA/CD protocol for packet transmission between a no. of Nodes connected to
a common bus.
4. Simulate TOKEN BUS for bus LAN.
5. Simulate TOKEN BUS for ring LAN.
(B) DATA LINK LAYER
1. Simulate PACKET TRANMISION from one Node to another Node.
2. Simulate SLIDING WINDOW protocol to provide reliable data transfer between two
nodes over an unreliable Network.
3. Simulate STOP & WAIT protocol for packet transmission between a no. of nodes.
(C) APPLICATION LAYER
1. Simulate FILE TRANSFER protocol to check transfer of file and deceiving of file
between two nodes.
SECTION – B (Study of Network Simulator)
(A) LAN EXPRIMENTS
1. Simulation of network based on Pure Aloha protocol using netsim.
2. Simulation of network based on Slotted Aloha protocol using netsim.
Simulation of network based on Ethernet protocol using netsim.
3. Simulation of network based on Token Bus protocol using netsim.
4. Simulation of network based on Token Ring protocol using netsim.
(B) WAN EXPRIMENTS
1. Simulation of network based on Router using netsim.
2. Simulation of network based on Frame relay using netsim.
3. Simulation of network based on X.25 using netsim.
4. Simulation of network based on TCP (Transfer Control Protocol) using netsim.
5. Simulation of network based on UDP (User Datagram Protocol) using netsim.
6. Simulation of network based on ATM (Asynchronous Transfer Mode) using netsim.
(C) ‘C’ PROGRAMS
1. WAP to implement TOKEN RING protocol.
2. WAP to implement ALOHA protocol.
3. WAP to implement CSMA/CD protocol for a single channel.
4. WAP to implement CSMA/CD protocol for a double channel.
CRYPTOGRAPHY AND NETWORK SECURITY
CSP 201
L T P
3 1 0
UNIT 1
Introduction to OSI Security Architecture: Conventional Encryption: Conventional Encryption
Model, Classical Encryption Techniques - Substitution Ciphers: Transpositions Ciphers:
Cryptanalysis, Staganography; Modern Block Ciphers- Block Ciphers Principles: Stream &
Block Ciphers, Fiestal Cipher, Shannon's Theory of Confusion and Diffusion, Data Encryption
Standards (DES): DES Encryption and Decryption, Strength of DES, , Block Cipher Modes of
Operation [9]
UNIT 2 Triple DES: Double DES, TDES with Two Keys, TDES with Three Keys; Confidentiality Using
Conventional Encryption: Placement of Encryption Function, Traffic Confidentiality, Key
Distribution, Random Number Generation ,Introduction to Graph, Ring and Field, Prime and
Relative Prime Numbers, Modular Arithmetic,. Principles of Public Key Cryptosystems: RSA
Algorithm: Key Management, Diffie-Heilman Key Exchange Algorithm, And Introductory Idea
of Elliptic Curve Cryptography. [9]
UNIT 3
Message Authentication & Hash Functions: Authentication Requirements, Authentication
Functions, Message Authentication Codes, Hash Functions: Requirement for a Hash Function,
Simple Hash Functions, Block Chaining Techniques; Security of Hash Function & MACS, MD5
Message Digest Algorithm, Secure Hash Algorithm (SHA-1).. Digital Signatures: Requirements,
Direct & Arbitrated Digital Signature; Authentication Protocols: Mutual & One way
Authentication; Digital Signature Standard (DSS) [8]
UNIT 4
Network Security Application- Authentication Applications: Kerberos Version 4 & Difference
between Kerberos v4 & v5, Kerberos Realms; X.509 Authentication Service: Electronic Mail
Security - Pretty Good Privacy (PGP): IP Security: Architecture, Authentication Header,
Encapsulating Security Payloads. Web Security: Secure Socket Layer & Transport Layer
Security, Secure Electronic Transaction (SET); System Security: Intruders, Viruses and Related
Threats: Malicious Programs, The Nature of Viruses, Types of Viruses, Macro Viruses, Email
Viruses; Firewall: Firewall Design Principles, Trusted Systems. [9]
UNIT 5
Cyber Laws: Cyber laws for Cyberspace- Legal Identity and Private International Laws in
Cyberspace. IT Act 2000. IT Act 2000 in reference to Email, E-Commerce and Issues of Privacy.
E-Agreements and the Web Surfing, Cyber Pirates - Copyright, Digital Content right. Steps to
Protect the Contents on WWW, Software Patents, Domain Name System and Trademarks, Cyber
Trademarks Laws. IT Act and Issues of Copyright, Patent and Trademark. Crimes- Cyber Crimes
and Future Imperfect, Strategy to Combat Cyber Crimes, IT Act 2000 and Cyber Crimes.
Case Study of Sensor Network Security. [9]
REFERENCES:
1. William Stallings, "Cryptography and Network Security: Principles and Practice"
Prentice Hall, New Jersey.
2. Johannes. A. Buchmann, "Introduction to cryptography", Springer Verlag. Bruce
Schiener, "Applied Cryptography".
3. Sharma, Vakul, "Handbook of cyber Laws", Macmillan India Ltd, 2002.
4. Kernal Texpalan, " Communication network Management:, PHI, 1992.
SOFTWARE TESTING AND QUALITY MANAGEMENT
CSP- 202
L T P
3 1 0
UNIT -I
Introduction to Software Testing: Evolution, Myths, Facts, Goals, Psychology, Models,
Principles , Axiom of Testing, Study of Bugs: Classification, Priority, Severity and their tracking
.Software Testing: Terminology, Life cycle, Methodology, Types of Testing, Test planning:
Test Plan Specification, Leveled Test Plan, Development of Test Plan ,Master Test plan ,Phase
Wise Test Plan, Test management, Software Testing Guidelines, Defect Management, Analyzing
& Reporting Test. [8]
UNIT -II
Testing Technique: Static Testing: Inspection, Structured Walkthrough, Technical reviews,
Automated Techniques ,Black box testing, Types of Black box Testing: Requirement based
Testing, Positive & Negative Testing, Boundary Value Analysis, Compatibility Testing, Domain
Testing, Graph Based Testing, Robustness Testing , Syntax Testing, Finite State Testing, Cause-
Effect Graphing Based Testing. White Box Testing, Types of White box Testing: Basis Path
Testing, Control Structure Testing, Mutation Testing, and Gray Box Testing. Software
Testability, Software Test Automation, Test Metrics and its Measurements. [10]
UNIT -III
Software Testing Strategies: Model for Software Testing, Unit Testing, Integration, System &
Acceptance Testing: Alpha Testing, Beta Testing, Stress testing, Load testing, Reliability
Testing, Scalability Testing . Performance Testing, Regression Testing, Ad-hoc Testing,
Usability and Accessibility Testing, Object Oriented Testing: Object-Oriented Testing Model,
Object-oriented Software Test Strategy. [8]
UNIT -IV
Introduction to Software Quality: Concepts of quality, perspectives and expectations, Quality
Framework, Quality engineering: Activity and process, Quality planning, Quality assessment
and improvement. Quality assurance: Classification, Q.A activities, Q.A. Techniques, Defect
prevention and process improvement, Software Inspection, Formal Verification, Introduction to
Software Reliability Engineering, Software Quality Measurement & Metrics. [8]
UNIT –V
Quality Models: McCall’s model, Bohem’s model, Dromey’s model, FURPS Model,ISO-9126
Model, Cost Of Quality, Software Quality Factors, Quality Control , CMMI-Framework :
Process Area Components, Capability & Maturity Levels, Relationship Among Process Areas.
[10]
REFERENCES:
1. Software Testing : K.Mustafa,R.A. Khan ,Narosa
2. Software Testing : Srinivasan Desikan,Pearson
3. Software Testing : Naresh Chauhan , Oxford
4. Software Quality Engineering : Jeff Tian ,Wiley
5. Software Testing Fundamentals: Marnie L.Hutcheson,Wiley
6. Software Testing : Ron Patton, Pearson
SOFTWARE ENGINEERING LAB
CSP-254
L T P
0 0 3
1. Use a good SRS-document (available in Project Data Bank) and review this from
TESTABILITY perspective. Identify “un-testable requirements” in SRS and suggest
corrective measures – for making the requirements testable.
2. Research “Requirements Management Tools” currently available in the market (including
OPEN-SOURCE TOOLS as well) and provide comparative presentation – with
recommendations for your lab – if you were given a chance to make decision on tool
selection, what would you deploy and why?
3. Identify a real-life application and develop a test-plan, for this application.
4. Research currently available OPEN-SOURCE Testing Tools and identify one of them
(that you believe is most suitable), for deployment in the lab. Make a presentation for
End-to-End Deployment, for the TEST-Tool of your choice.
5. Write application programs in C-Language ( design multiple modules) – using various
constructs of C-Language and perform “WHITE-BOX TESTING” of: (a.) Individual
Modules (b.) Interfaces.
During the course of White-Box Testing, ensure (and provide evidence of) the following:
i. All independent paths within a module have been covered at least once
ii. Cover all logical decisions on their true and false sides
iii. Execute all loops at their boundaries and within their operational bounds
iv. Exercise internal data structures to ensure their validity
6. Identify a good SRS-document ( currently available in Project Data Bank) and prepare
UAT Test-Cases on the basis of the SRS-document.
7. Develop Test-Cases for End-to-End, Black-Box Testing of the application program of
exercise(5.). Execute the test-cases and retain detailed test-log and other artifacts of
testing. Present Test-Summary report and answer queries (with reference to test artifacts).
8. Study any Test Management Tool (like “TEST DIRECTOR” or any other tool of your
choice) in detail and provide a presentation/evaluation demo on this tool in the lab.
9. Research and Indentify a Test Tool for Automating Test Scripts. Compare the same with
WinRunner and provide your objective assessment comments.
10. Take a mini-project and handle the same using V-Process Model of SDLC. During life
cycle of this mini-project, create various Testing Documents and the Final Test Report, as
deliverables.
ADVANCED COMPUTER ARCHITECTURE
CSP 301
L T P
3 1 0
UNIT-1
Fundamentals of Computer design- Technology trends- cost- measuring and reporting
Performance quantitative principles of computer design. Flynn’s & other classification, pipeline
& parallism.
Instruction set principles and examples- classifying instruction set- memory addressing-
Type and size of operands- addressing modes for signal processing-operations in the instruction
set-
Instructions for control flow- encoding an instruction set.-the role of compiler [9]
UNIT- 2:
Instruction level parallelism (ILP)- over coming data hazards- reducing branch costs – high
performance instruction delivery- hardware based speculation- limitation of ILP ILP software
approach- compiler techniques- static branch prediction- VLIW approach- H.W support for more
ILP at compile time- H.W verses S.W solutions [9]
UNIT- 3
Memory hierarchy design- cache performance- r educing cache misses penalty and miss rate –
virtual memory- protection and examples of VM. Multiprocessors and thread level parallelism-
symmetric shared memory architectures- distributed shared memory- Synchronization- multi
threading. [8]
UNIT-4
Storage systems- Types – Buses - RAID- errors and failures- bench marking a storage device-
designing a I/O system.
Inter connection networks and clusters- interconnection network media – practical issues in inter
connecting networks - examples – cluster s- designing a cluster [8]
UNIT-5
Introduction to High Performance Computing: Overview, Pipeline vs Parallel Processing Parallel
Architectures: Classification and Performance. Pipeline Processing: Pipeline performance,
design of arithmetic pipelines, multifiction pipes, concept of reservation table, collision vector
and hazards. Instruction Processing Pipes: Instruction and data hazard, hazard detection and
resolution. [10]
Text Book:
1. Computer Architecture A quantitative approach 3rd edition John L. Hennessy & David
A. Patterson Morgan Kufmann (An Imprint of Elsevier)
2. “ Computer Architecture and parallel Processing” Kai Hwang and A. Briggs International
Edition McGraw-Hill.
3. Advanced Computer Architectures, Dezso Sima, Terence Fountain, Peter Kacsuk, Pear
son.
4. Advance computer architecture ,Kai Hwang, Tata Mc Graw hill
ADVANCED OPERATING SYSTEM AND DISTRIBUTED COMPUTING
CSP 302
UNIT 1:
Advanced Operating Systems: Overview and architecture, Distributed computing models and
their comparison, Distributed Computing Paradigms.
Client Server Models: addressing, architecture, implementation. Case Study: World Wide Web
1.0
Interprocess Communication: API for internet protocol, Marshalling. Client server
communication, group communication Case Study: CBCAST protocol in ISIS. [10]
UNIT 2:
Distributed objects and remote invocation: communication between Distributed objects, RPC,
events and notification Case Study: Java RMI
Operating System Support: Operating System layer. Protection, processes and threads,
operating system architecture
Distributed clock synchronization: physical clock, logical clock. [8]
UNIT 3:
Distributed File System: Models, service interface and directory interface design, DFS system
structure, Case Study: Google file system, SUN File System.
Security in distributed systems: problems and design issues,
Fault tolerance and recovery: basic concepts, fault models, agreement problems and its
applications, commit protocols, voting protocols, checkpointing and recovery. [8]
UNIT 4:
Distributed Multimedia systems: Characteristics of multimedia, multimedia data. Quality of
service management, resource management, stream adaptation.
Case Study: Tiger video file server.
Distributed shared memory: design and implementation issues, sequential consistency and Ivy.
Case Study: Munin [8]
UNIT 5:
Real time distributed operating system: Design issues, distributed communications in LAN
and WAN, scheduling: static and dynamic, scheduling algorithms, Case Study: MARS.
Emerging trends in distributed computing: Introduction, Grid computing-architecture
application, SOA overview, design, service oriented grid, advantages and future scope, Cloud
computing- feature and architecture. [8]
REFERENCE:
1. Distributed Systems – Coulouris [ Pearson Education]
2. Distributed Operating Systems- Tannenbaum [ Pearson Education]
3. Distributed Systems: Principles and Paradigms – Tannenbaum [ Pearson Education]
ADVANCED OPERATING SYSTEM AND DISTRIBUTED COMPUTING
CSP 302
L T P
3 1 0
UNIT 1
Introduction: Computer networks overview Operating System: Objectives and functions,
Structure, types, concept of multiprogramming Distributed systems: goals, features, distributed
operating system and design issues.
Processes: Process types, process description, process states and process control Concurrent
processes: Race condition, critical section, mutual exclusion, semaphore, applications of semaphore,
and monitors.
UNIT 2
Deadlock: system model, prevention, avoidance, detection & recovery and integrated approach
handling of deadlock in distributed system Interprocess Communication: Message passing system:
Features of message passing system, design issues, synchronization, buffering and process
addressing. Remote procedure call: RPC model, transparency, implementation mechanism.
UNIT 3
CPU Scheduling: Goals & policies, types of scheduler, performance criteria, algorithms,
multiprocessor systems and real time systems. Distributed system: process migration, Threads, load
balancing, load sharing and task assignment approach.
UNIT 4
Memory Management: Physical Memory: Memory management requirement, partitioning,
swapping, relocation segmentation, paging, selection of page size and other issues. Virtual Memory:
Concept & implementation (demand paging& segmentation and combined approach), design issues
and performance Distributed Shared Memory: concept, architecture, design issues and advantages
Input/output Management:
UNIT 5
I/O devices, organization of I/O functions, controllers and drivers. Magnetic disk: structure, free
space management, space allocation, address translation, arm scheduling, performance
enhancement ( RAID, disk cache, RAM cache etc) File Management: File system, structure,
organization, directory, file system reliability ( back-up & recovery and file system consistency
etc) Distributed file system: concept, desirable features, accessing, caching and replication.
Security: Authorization, authentication, access control matrix, access control list, capability list,
protection domain and cryptography.
REFERENCES:
1. Couloris, Dollimore, Kindberg,” Distributed systems: Concepts and Design”.
Pearson Education Asia, 3ed.
2. Singhal and Shivratri,” Advanced Concepts in Operating Systems”, Mc Graw Hill.
ADVANCED DATABASE DESIGN
CSP 401
L T P
3 1 0
UNIT 1
Query Processing- Measures of query cost, selection operations, Join operations, Evaluation of
expressions.
Query Optimization- catalog Information, . Clustering & Indexing, Transformation of relational
expression- equivalence rules, Choice of evaluation plans-cost based optimization, Heuristic
optimization. [8]
UNIT 2
Database Tuning- Database workload, Physical design and tuning decisions, Need for database
tuning, Index selection, Tuning Indexes, Tuning the conceptual schema, Tuning queries and
views, DBMS Benchmarks.
Object Oriented Database System- Object, Class, Structured types, Inheritance, Multiple
Inheritance, Object identity, Object containment, Nested Relational Model. [8]
UNIT 3
Distributed Database System- Homogeneous and heterogeneous databases, Data replication,
Data fragmentation, System structure, Commit protocols- Two Phase commit, Three- Phase
commit, Concurrency control in distributed databases, Deadlock handling, Distributed Query
Processing In R * System [8]
UNIT 4
Database Security- Database Security, Access Control and Grant & Revoke on Views and
Integrity Constraints, Discretionary Access Control, Role of DBA, Security in Statistical
Databases. [7]
UNIT 5
Enhanced Data Model for Advanced Applications- Active database concept and triggers and
their design and implementation issues, Temporal data base concepts, Spatial and multimedia
databases, Introduction to deductive databases, introduction to expert database system. [8]
REFERENCES
1. Majumdar & Bhattacharya, "Database Management System", TMH.
2. Korth, Silberchatz, Sudarshan, "Database Concepts", Addison Wesley.
3. Elmastri, Navathe, "Fundamentals of Database Systems", Addison Wesley.
4. Date C.J., "An Introduction to Database System", Addison Wesley.
5. Ramakrishnan, Hadzilacous, Goodman, "Concurrency Control & Recovery", Addiosn
Wesley.
6. Ceri & Palgatti, "Distributed Databases", McGraw Hill.
ADVANCED ARTIFICIAL INTELLIGENCE
CSP 402
L T P
3 1 0
UNIT 1 Overview of Artificial intelligence Problems of AI, AI technique, Problem Space & search,
Problem solving by search, state space.
Uninformed search: breath first search, depth first search, depth limiting search, iterative
deepening search, Comparison of BFS & DFS.
Informed Search: hill climbing search, best first search, A star, AO star.
Constraint satisfaction problem: Adversarial search: optimal decision in game (Min Max, Alpha Beta pruning), imperfect real
time decision, games that include element of chance. [08]
UNIT 2 Knowledge Representations: Prepositional Logic, First Order Predicate Logic, Resolution in
Predicate Logic, Unification, Strategies for Resolution by Refutation.
Weak slot and filler structure: semantic nets, frames.
Strong slot and filler structure: conceptual dependency, scripts. [10]
UNIT 3
Statistical reasoning: Probalistic reasoning, Bayes Theorem, Bayesian network, Dampster
Shafer theory.
Planning: plan space, partial order planning, planning graph, goal stack planning.
Introduction to Fuzzy Logic [08]
UNIT 4 Learning: forms of learning (rote learning, abduction, analogy, inductive learning, deductive
learning)
Inductive learning: concept learning, decision tree.
Expert systems: Fundamental blocks and architecture, concept of shells, certainty factors, and
rule based systems.
Case studies: MYCIN, DART [08]
UNIT 5 Introduction to evolutionary algorithms: genetic algorithms
Natural language processing: Natural language understanding, Morphological analysis,
semantic analysis, discourse analysis, pragmatic analysis, Problems of Ambiguity.
Parsing: augmented transition network, case grammar, conceptual parsing.
Neural network: Preliminary understanding of unsupervised learning, feed forward nets, back
propagation algorithms. [08]
References:
1. Artificial Intelligence by Rich, Knight and Nair
2. Artificial Intelligence: A Modern Approach by Russell, Norvig
3. Artificial Intelligence by Winston
4. A guide to expert systems by Waterman
DIGITAL IMAGE PROCESSING
CSP 041
L T P
3 1 0
UNIT 1:
Sensor and Imaging: Imaging Optics, Radiometry of Imaging, Illumination sources and
techniques, Camera Principles, Color Imaging, Single Sensor Color Imaging and Color
Demosaicing, Range Images, 3D Imaging. [8]
UNIT 2:
Signal Representation: Vector Space and Unitary Trasnsforms, Multi-Resolutional Signal
Representation, Wavelet Decomposition, Scale space and diffusion, Representation of color,
Retinex Processing, Markov Random Field Modellings of Images. [8]
UNIT 3:
Non-linear Image Processing: Median and Order Statistics Filters, Rank-Ordered-Mean Filters
and Signal Dependent Rank-Ordered-Mean Filters, Two Dimensional Teager Filters,
Applications of nonlinear filters in image enhancement, edge detections, noise removal etc.
[9]
UNIT 4:
Feature Estimation: Morphological Operations, Edge Detection, Edges in multichannel images,
Texture Analysis, Optical flow based motion estimation, Reflectance based shape recovery,
Depth from focus, Stereo matching and depth estimation. [9]
UNIT 5:
Image and Video Compression Standards: Lossy and lossless compression schemes: Transform
Based, Sub-band Decomposition, Entropy Encoding, JPEG, JPEG2000, MPEG-1, MPEG-4, and
MPEG-7. Object Analysis, Classification: Bayesian Classification, Fuzzy Classification, Neural
Network Classifiers, Shape Reconstruction from volumetric data, Knowledge-based
interpretation of images. [9]
References:
1. R.C Gonzalez and R.E. Woods, “ Digital Image Pr ocessing” , Addison Wesley, 1992.
2. A.K.J ain, “ Fundamentals of Digital Image Pr ocessing” , Pr entice Hall of India.
3. Digital Image Pr ocessing – M. Anji Reddy, BS Publications.
MOBILE COMPUTING
CSP 042
L T P
3 1 0
UNIT 1
Prerequisite: Modulation Techniques, Spread Spectrum, Multiple Access Control.
Introduction to Wireless Communication: History of Cellular Systems, Fundamentals of Cellular
Systems, Cellular Infrastructure, Cell Area, Cell Capacity, Frequency Reuse, Co-Channel
Interference, Cell Splitting, Cell Sectoring; Wireless Transmission: Frequency for Radio
Transmission, Signals, Antennas, Signal Propagation. [9]
UNIT 2
Channel Allocation: Fixed, Dynamic, Hybrid, Flexible; Wireless LAN: Infrared, Bluetooth
Architechture & Protocol Stack; Overview of the IEEE 802.11 Standard, IEEE 802.16/16a
Standard for WiMAX, 802.11a/b/g/n (Wi-Fi), ; Wireless Public Networks: Wi-Max. [8]
UNIT 3
Mobile Communication Systems: Architecture: Base Station Subsystem (BSS): Base
Transreceiver Station (BTS), Base Station Controller (BSC), Base Station, Mobile Station,
Network & Switching Subsystem (NSS): Mobile Switching Center (MSC), Registration,
Handoff Parameters, Roaming Support using System Backbone: Home Agents, Foreign Agents,
Mobile IP: Goals, Assumption & Requirements, IP Packet Delivery, Agent Discovery,
Registration, Tunneling & Encapsulation; Adaptive Clustering for mobile networks: Multi-
Cluster Architecture, Cluster Algorithm, Cluster Maintenance. [9]
UNIT 4
Advanced Mobile Phone Systems (AMPS): Characteristics, Operation & Working; Global
System for Mobile Communications(GSM): Frequency Bands & Channels, Frames in GSM,
Identity Number used in GSM, Layers, Planes & Interfaces; Satellite Systems: Types &
Characteristics of Satellite Systems, Satellite Systems Infrastructure; Global Positioning System
(GPS): Limitations & Beneficiaries; General Packet Radio Services (GPRS). [9]
UNIT 5
IMT & UMTS: Deployment and future development of IMT (International Mobile
Telecommunications)-2000/UMTS (Universal Mobile Telecommunication System), Overview
on IMT-2000 radio access technologies, UMTS specification series, UMTS Architecture;
Cellular Systems Generations: 1G, 2G, 2.5G / 2.75G, 3G (IMT 2000), 3.5G/4G; CDMA One /
IS 95 CDMA (2G), CDMA 2000, Migration from GSM to UMTS (WCDMA). [9]
Reference ::
1. William Stallings, “ Wireless Communications & Networks”, Pearson Education, 2nd
Edition 2009.
2. Jochen Schiller, “ Mobile Communications, Pearson Education, 2nd Edition, 2003.
3. Dharma Prakash Agrawal & Qing-An Zeng “ Introduction to Wireless & Mobile
Systems”, Thomson Brooks/Cole, 2nd Edition 2003.
4. Krzysztof Wesolowski, “Mobile Communication Systems “, John Wiley & Sons, Ltd.
5. Ron Olexa, “Implementing 802.11, 802.16 and 802.20 Wireless Networks, Elsevier
DATA WAREHOUSING AND DATA MINING
CSP 043
L T P
3 1 0
UNIT-1
Overview & Concepts- Introduction to Data Warehousing, Data Warehousing Features, Data
Warehouses and Data Marts; Difference between between Operational Database Systems and
Data Warehouses; Data Warehouse Implementation; Multidimensional Data Model, Data
Warehouse Implementation, Further Development of Data Cube Technology, Architecture:
Understanding Data Warehouse Architecture, Architectural Framework. [9]
UNIT-2
Technical Architecture: Introduction to Principles of Dimensional Modeling; Data Extraction,
Transformation, and Loading, OLAP in the Data Warehouse: Demand for Online Analytical
Processing, Major Features and Functions, OLAP Models; From Data Warehousing to Data
Mining,
Data Preprocessing: Needs Preprocessing the Data, Data Cleaning, Data Integration and
Transformation, Data Reduction, Discretization and Concept Hierarchy Generation [9]
UNIT-3
Data Mining: Introduction, Data Mining Functionalities, Classification of Data Mining System;
Data Mining Primitives, Languages, and System Architectures: Data Mining Primitives, Data
Mining Query Languages, Designing Graphical User Interfaces Based on a Data Mining Query
Language Architectures of Data Mining Systems
Concepts Description: Characterization and Comparison: Data Generalization and
Summarization-Based Characterization, Analytical Characterization: Analysis of Attribute
Relevance, Mining Class Comparisons: Discriminating between Different Classes, Mining
Descriptive Statistical Measures in Large Databases [9]
UNIT-4
Mining Association Rules in Large Databases: Association Rule Mining, Mining Single-
Dimensional Boolean Association Rules from Transactional Databases, Mining
Multidimensional Association Rules from Relational Databases and Data Warehouses
Classification and Prediction: Classification by Decision Tree Induction, Bayesian Classification,
Classification by Back propagation, Classification Based on Concepts from Association Rule
Mining [9]
UNIT-V
Cluster Analysis Introduction: Types of Data in Cluster Analysis, A Categorization of
Major Clustering Methods, Partitioning Methods, Density-Based Methods, Grid-Based
Methods, Model-Based Clustering Methods, Outlier Analysis.
Mining Complex Types of Data: Multidimensional Analysis and Descriptive Mining of
Complex, Data Objects, Mining Spatial Databases, Mining Multimedia Databases, Mining Time-
Ser ies and Sequence Data, Mining Text Databases, Mining the World Wide Web. [8]
REFERENCES:
1. Data Mining – Concepts and Techniques - JIAWEI HAN & MICHELINE KAMBER
Harcourt India.
2. Data Mining Techniques – ARUN K PUJ ARI, University Press
3. Building the DataWarehouse- W. H. Inmon, Wiley Dreamtech India Pvt. Ltd..
PARALLEL ALGORITHM
CSP 051
L T P
3 1 0
UNIT 1:
Parallel computing, massive parallel processing, granularity of parallism Computational
demands, advantages of parallel systems. Flynn s classification, controlled parallelism and
scalability. Topologies: Mesh, binary tree, Hyper tree, Cube Connected cycles, shuffle-
Connected Exchange; [8]
UNIT 2:
Uniform Memory Access (UMA & Non uniform Memory Access (NUMA) Multi processor
System. PARAM Model of Parallel Computation, PARAM Algorithms; Parallel Reductions,
Prefix sum, List Ranking, Merging of Two Sorted List. [8]
UNIT 3:
Mapping and Scheduling; mapping of Data from Topology to other (Ring to 2-D Mesh,
Binomial trees to 2-D mesh, Rings & mesh into 2-D Mesh, Ring & Mesh into Hypercube), Load
balancing, Static scheduling on UMA multi processor systems. [9]
UNIT 4:
Applications of parallel computing: Matrix Multiplication, Sorting (bitonic Merge sort, parallel
quick sort, hyper quick sort), Searching a Graph (P-depth search, Breadth-Depth Search, Breath
first search). [9]
UNIT 5:
Parallel Branch and bound algorithms. Graph algorithms, minimum cost spanning tree, single
source shortest paths, all pair’s shortest paths, and algorithms for sparse graphs. Mapping
matrices on processors, matrix transposition, matrix vector multiplication, and matrix
multiplication, solving systems of linear equations. [9]
REFERENCES: 1. Michel J. Quinn, Parallel Computing: Theory and Practice, McGraw-Hill
2. Kai Hwang, Advanced Computer Architecture, McGraw-Hill.
AD-HOC SENSOR NETWORKS
CSP-052
L T P
3 1 0
UNIT 1
Introduction of ad-hoc/sensor networks Key definitions of ad-hoc/sensor networks, Advantages of ad-hoc/sensor networks, Unique
constraints and characteristics of MANET, challenges & Performance parameters of Adhoc
networks, Types & Applications of MANETs, Introduction of sensor network, sensor networks
vs. ad-hoc networks, sensor network limitations, Design issues. [8]
UNIT 2
Routing in Ad Hoc Networks Introduction, Topology based routing protocol- Proactive routing- DSDV, WRP, TBRPF, OLSR,
multipoint relay, STAR, Reactive routing- DSR, AODV, TORA, Hybrid routing approach- ZRP,
FSR, LANMAR, CBRP, Position based routing- Location services- DREAM, quorum based
location service, GLS, home zone, forwarding strategies- greedy packet forwording, Restricted
Directional flooding- DREAM, LAR, RDMAR , Hierarchical routing, Other position based
routing protocols. [10]
UNIT 3
Wireless sensor networks Design Issues, Challenges of Wireless sensor network, Energy consumption, Clustering of
sensors- regularly placed sensor, randomly distributed sensors, Heterogeneous WSNs. Mobile
Sensors, attacks on sensor network routing- Spoofed, altered, or replayed routing information,
selective forwarding, sinkhole attacks, the Sybil attack, Wormholes, HELLO flood attacks,
Acknowledgement spoofing, application of sensor networks. [8]
UNIT 4
Data retrieval in sensor networks Introduction, Classification of WSNs- Architecture of sensor networks, network architecture,
Routing Layer- Network structure based- flat routing- Directed diffusion, sequential assignment
routing, MCFA, coherent and non-coherent processing, energy aware routing, Hierarchical
routing- CBRP, LEACH, PEGASIS, MECN, TEEN, APTEEN, routing in fixed size clusters,
sensor aggregates routing, Hierarchical power- Aware routing, flat versus Hierarchical. [8]
UNIT 5
Security Introduction, distributed system security, security in Ad- Hoc networks- requirements, security
solutions constraints, challenges.
Key Management- background, Diffie- Hellman key agreement, N- Party Diffie- Hellman Key
agreement, The tree based generalized Diffie-Hellman protocol, Cooperation in MANETS,
WSN security, Key distribution and management, Requirements for bootstrapping security in
sensor networks, key distribution techniques in sensor networks- using a single network-wide
key, using pair wise-shared keys, random key pre-distribution scheme, security protocols for
sensor network, general consideration of using public key method, SPINS: SNEP AND
µTELSA. [10]
REFERENCES:
1. AD HOC & SENSOR NETWORK “Theory and Application” by Carlos de Morais
Cordeiro, World scientific press.
2. “Wireless Ad Hoc and Sensor Networks” by Houda Labiod , Willy Publication
EMBEDDED SYSTEM
CSP 053
L T P
3 1 0
UNIT I
Introduction to embedded systems: embedded system, processors in the system, software
embedded into a system. Processor and memory organization: structural units, processor
selection, memory devices, memory selection, DMA Application areas and recent trends.
[9]
UNIT II
Devices and buses for device network: I/O devices, timer and counting devices, serial
communication. Device drivers and interrupts servicing mechanism: device drivers, parallel port
and serial port device drivers, interrupt servicing mechanism, context, context switching,
deadline and interrupt latency. [9]
UNIT III
Microcontroller 8051: hardware architecture, pin description. 8051 assembly language
programming: introduction, PC, ROM space, Flags, register banks and stacks. Jump, loop and
call instruction, time delay generation and calculations. I/O programming, bit manipulation.
Addressing modes and arithmetic instructions and programs. [9]
UNIT IV
8051 assembly language programming continued: logic instructions, rotate and swap, BCD and
ASCII application programs. Timer/counter programming in 8051. 8051 interrupts, timer
interrupts, external hardware interrupts, interrupt priority in the 8051. [9]
UNIT V
Inter process synchronization and communication, data sharing. Real time operating system,
RTOS task scheduling models. [8]
References:
1. Embedded systems - Raj Kamal
2. The 8051 microcontroller and embedded systems – Mazidi and Mazidi
3. Embedded system design – Frank Vahid & Tony Givargis
4. The 8051 microcontroller – Kenneth Ayala
ADVANCED CLOUD COMPUTING
CSP-054
L T P
3 1 0
Unit-I
Introduction to Cloud Computing : Definition(s) of Cloud Computing, Characteristics of
Cloud, Cloud Deployment Models, Cloud Service Models, Driving Factors and Challenges of
Cloud and Overview of Applications of Cloud.
Cloud Concepts & Technologies: Virtualization, Load Balancing, Scalability & Elasticity,
Deployment, Replication, Monitoring, MapReduce, Identity and Access Management, Service
Level Agreements and Billing
Unit-II
Cloud Services and Platforms : various types of cloud services including compute, storage,
database, application, analytics, network and deployment services.
Hadoop & MapReduce: Overview of Hadoop echosystem, MapReduce architecture,
MapReduce job execution flow and MapReduce schedulers.
Unit-III
Cloud Application Design: cloud application design considerations, cloud application reference
architectures, design methodologies such as SOA, CCM and MVC, data storage technologies
and cloud deployment approaches.
Big-Data Analytics: big data analytics approaches: approaches for clustering big data,
approaches for classification of big data and recommendation systems.
Unit-IV
Cloud Security: Cloud security challenges, approaches for authorization authentication, identify
& access management, data security, data integrity encryption & key management.
Cloud Application Benchmarking & Tuning: cloud application workload characteristics,
performance metrics for cloud applications, cloud application testing, performance testing tools
and a load test and bottleneck detection case study.
Unit-V
Cloud Computing Case-Studies: Review of Technical papers from Major journals (IEEE
Transactions) and major conferences (IEEE / Springer etc.) on Cloud
Computing / Software Engineering / Other Thrust Areas and Presentations by Students on their
understanding of the same, after reviewing the papers concerned.
Text-Book:
Cloud Computing A Hands-on Approach by A. Bagha & V. Madisetti [ ISBN: 978-81-
7371-923-3 ] Published by University Press, pp. 456, Printed in 2014.
Additional References:
Distributed and Cloud Computing From Parallel Processing to the Internet of Things by
K. Hwang, G.C. Fox, J.J. Dongarra [ISBN: 978-93-81269-23-7 ] Published by Elsevier
India Pvt. Ltd., pp. 648, Printed in 2013.
Cloud Computing: Principles, Systems and Applications, Editors: Nikos Antonopoulos,
Lee Gillam, Springer, 2012.