12mecc101 applied mathematics intended outcomes…kahedu.edu.in/wp-content/uploads/2013/pdf/cse...

Download 12MECC101 APPLIED MATHEMATICS INTENDED OUTCOMES…kahedu.edu.in/wp-content/uploads/2013/pdf/Cse Dept/ME (Information... · Schaums outline Series, McGraw Hill, New York. ... RIPEMD

If you can't read please download the document

Upload: trinhliem

Post on 06-Feb-2018

224 views

Category:

Documents


4 download

TRANSCRIPT

  • 12MECC101 APPLIED MATHEMATICS

    INTENDED OUTCOMES:

    To develop analytical skills for solving different engineering problems

    To solve problems using Matrices and Random processes.

    To solve problems by applying differential calculus.

    UNIT I ADVANCED MATRIX THEORY

    Matrix norms Jordan canonical form Generalized eigenvectors Singular value decomposition

    Pseudo inverse Least square approximations QR algorithm.

    UNIT II CALCULUS OF VARIATIONS

    Variation and its properties Eulers equation Functional dependent on first and higher order

    derivatives Functional dependent on functions of several independent variables Some applications

    Direct methods Ritz and Kantorovich methods.

    UNIT III LINEAR PROGRAMMING

    Basic concepts Graphical and Simplex methods Transportation problem Assignment problem.

    UNIT IV Z TRANSFORMS

    Transform of standard functions Convolution Initial and Final value problems Shifting Theorem

    Inverse transform (Using Partial Fraction Residues) Solution of difference Equations using Z

    Transform.

    UNIT V RANDOM PROCESSES

    Classification Stationary random processes Auto Correlation Cross Correlations Power spectral

    density Linear system with random input Gaussian Process.

  • TEXT BOOKS:

    S.NO Author(s) Name Title of the book Publisher Year of publication

    1 Venkataraman M.K Higher Mathematics for Engineering &

    Science (3rd

    Edition)

    National Publishing

    Company, New

    Delhi

    2004

    2 Gupta, P.K.and Hira, D.S.

    Operations Research (2

    nd Edition)

    S.Chand & Co.,

    New Delhi 2005

    3 T.Veerarajan Mathematics III (2

    nd Edition)

    Tata McGraw Hill,

    New Delhi 2000

    REFERENCES BOOKS:

    S.NO Author(s) Name Title of the book Publisher Year of

    publication

    1 Bronson, R Matrix Operations

    (2nd

    Edition)

    Schaums outline

    Series, McGraw

    Hill, New York.

    2005

    2 Elsgoltis Differential Equations

    and Calculus of

    Variations (3rd

    Edition)

    MIR Publishers,

    Moscow.

    2004

    3 Gupta.A.S Calculus of Variations

    with Applications (4th

    Edition)

    Prentice Hall of

    India, New Delhi.

    2005

    WEBSITES:

    http://en.wikipedia.org/wiki/Matrix_(mathematics)

    http://en.wikipedia.org/wiki/Z-transform

    http://www.purplemath.com/modules/linprog.htm

    http://en.wikipedia.org/wiki/Linear_programming

    http://en.wikipedia.org/wiki/Autocorrelation

  • 12MEIS101 COMPUTER NETWORKS

    INTENDED OUTCOMES:

    To introduce the concepts, terminologies and technologies used in modern

    days data communication and computer networking To solve problems using Matrices and Random processes.

    To understand the concepts of data communications.

    To study the functions of different layers.

    To introduce IEEE standards employed in computer networking.

    To make the students to get familiarized with different protocols and

    network components

    UNIT I NETWORK ARCHITECTURE

    Layering and protocols OSI Architecture Internet Architecture Link and Medium Access

    protocols Framing Error Detection reliable Transmission IEEE 802 Standards Ethernet

    Token Rings Wireless Network Adapters.

    UNIT II NETWORK LAYER

    Circuit Switching Packet Switching Switching and Forwarding Bridges and LAN Switches

    Cell Switching Inter networking Routing Global Internet Multicast.

    UNIT III TRANSPORT LAYER

    UDP TCP Remote Procedure Call Performance Congestion Control and Resource

    Allocation TCP Congestion Control Congestion Avoidance Mechanisms Quality of Service

    Bandwidth Delay Jitter.

    UNIT IV NETWORK SECURITY AND APPLICATION

    Cryptographic Algorithms DES RSA MD5 Security Mechanisms Fire Walls Name

    Service Traditional Applications SMTP HTTP Multimedia Application RTP RTCP

    SCTP.

    UNIT V NETWORK MANAGEMENT

    Introduction Network Monitoring Network Control SNMPV I Network Management

    Concepts Information Standard MIBS.

  • TEXT BOOKS:

    S.NO. Author(s) Name Title of the book Publisher Year of publication

    1 Larry L.Peterson and Brule S.Davie

    Computer Networks

    A System Approach

    (2nd

    Edition)

    MarGankangmann

    Harcourt Asia, 2002

    2 William Stallings SNMP, SNMP V2, SNMPV3, RMON 1

    and 2 (3rd Editio)

    Addison Wesley 2002

    REFERENCE BOOKS:

    S.NO Author(s) Name Title of the book Publisher Year of Publications

    1 Kurose J.F and K.W. Ross

    Computer Networking

    A top down

    approach featuring the

    internet (2nd

    Edition)

    Addison Wesley,

    New York.

    2001

    2 William Stallings Data & Computer Communication (6th Edition)

    Pearson Education,

    New York.

    2002

    3 Mani Subramanian Network Management Principles and Practice

    (3rd

    Edition)

    Addison Wesley,

    New York.

    2004

    WEBSITES:

    http://www.mcmcse.com/cisco/guides/osi.shtml

    http://f1tutorials.com/Tutorials/Network/computer_network.html

    http://www.cse.iitk.ac.in/users/dheeraj/cs425/

    http://en.wikipedia.org/wiki/IEEE_802

    http://en.wikipedia.org/wiki/Network_management

    http://f1tutorials.com/Tutorials/Network/computer_network.htmlhttp://www.cse.iitk.ac.in/users/dheeraj/cs425/http://en.wikipedia.org/wiki/IEEE_802http://en.wikipedia.org/wiki/Network_management

  • 12MEIS102 CRYPTOGRAPHY

    INTENDED OUTCOMES:

    To understand the principles of encryption algorithms; conventional and

    public key cryptography. To have a detailed knowledge about

    authentication, hash functions and application level security mechanisms.

    To know the methods of conventional encryption.

    To understand the concepts of public key encryption and number theory

    To understand authentication and Hash functions.

    To know the network security tools and applications.

    To understand the system level security used.

    UNIT -I INTRODUCTION

    OSI Security Architecture - Classical Encryption techniques Cipher Principles Data Encryption

    Standard Block Cipher Design Principles and Modes of Operation - Evaluation criteria for AES AES

    Cipher Triple DES Placement of Encryption Function Traffic Confidentiality

    UNIT- II PUBLIC KEY CRYPTOGRAPHY

    Key Management - Diffie-Hellman key Exchange Elliptic Curve Architecture and Cryptography -

    Introduction to Number Theory Confidentiality using Symmetric Encryption Public Key

    Cryptography and RSA.

    UNIT- III AUTHENTICATION AND HASH FUNCTION

    Authentication requirements Authentication functions Message Authentication Codes Hash

    Functions Security of Hash Functions and MACs MD5 message Digest algorithm - Secure Hash

    Algorithm RIPEMD HMAC Digital Signatures Authentication Protocols Digital Signature

    Standard

    UNIT -IV NETWORK SECURITY

    Authentication Applications: Kerberos X.509 Authentication Service Electronic Mail Security PGP

    S/MIME - IP Security Web Security.

    UNIT- V SYSTEM LEVEL SECURITY

    Intrusion detection password management Viruses and related Threats Virus Counter measures

    Firewall Design Principles Trusted Systems.

  • REFERENCE BOOKS:

    S.NO Author(s) Name Title of the book Publisher Year of Publication

    1 Atul Kahate Cryptography and Network Security

    Tata McGraw-Hill

    2003

    2 Bruce Schneier Applied Cryptography John Wiley & Sons Inc

    2001

    3 Charles B. Pfleeger, Shari Lawrence

    Pfleeger

    Security in Computing Pearson Education 2003

    4 William Stallings Cryptography And Network Security Principles and

    Practices

    Prentice Hall of

    India 2003

    5 Man Young Rhee Internet Security Wiley, New York 2003 6 Pfleeger & Pfleeger Security in Computing Pearson Education,

    Asia. 2003

  • 12MEIS103 ADHOC NETWORKS

    INTENDED OUTCOMES:

    To have a detailed knowledge about Adhoc Networks and its protocols.

    To know the different Adhoc Network protocol..

    To understand the concepts of multicast routing in Adhoc Networks

    UNIT I INTRODUCTION

    Introduction Fundamentals of Wireless Communication Technology The Electromagnetic Spectrum

    Radio Propagation Mechanisms Characteristics of the Wireless Channel IEEE 802.11a,b Standard

    Origin Of Ad hoc Packet Radio Networks Technical Challenges Architecture of PRNETs

    Components of Packet Radios Ad hoc Wireless Networks Heterogeneity in Mobile Devices

    Wireless Sensor Networks Traffic Profiles Types of Ad hoc Mobile Communications

    UNIT II AD HOC ROUTING PROTOCOLS

    Introduction Issues in Designing a Routing Protocol for Ad Hoc Wireless Networks Classifications of

    Routing Protocols Driven Routing Protocols Destination Sequenced Distance Vector (DSDV)

    Wireless Routing Protocol (WRP) Cluster Switch Gateway Routing (CSGR) Source Initiated On

    Demand Approaches Ad Hoc On Temporally Ordered Routing Algorithm (TORA) Signal Stability

    Routing (SSR) Location Aided Routing (LAR) Power Aware Routing (PAR) Zone Routing

    Protocol (ZRP).

    UNIT III MULTICASTROUTING IN AD HOC NETWORKS

    Introduction Issues in Designing a Multicast Routing Protocol Operation of Multicast Routing

    Protocols An Architecture Reference Model for Multicast Routing Protocols Classifications of

    Multicast Routing Protocols Tree Based Multicast Routing Protocols Mesh Based Multicast

    Routing Protocols Summary of Tree and Mesh Based Protocols Energy Efficient Multicasting

    Multicasting with Quality of Service Guarantees Application Dependent Multicast Routing

    Comparisons of Multicast Routing Protocols.

    UNIT IV TRANSPORT LAYER, SECURITY PROTOCOLS

    Introduction Issues in Designing a Transport Layer Protocol for Ad Hoc Wireless Networks Design

    Goals of a Transport Layer Protocol for Ad Hoc Wireless Networks Classification of Transport Layer

    Solutions TCP Over Ad Hoc Wireless Networks Other Transport Layer Protocols for Ad Hoc

    Wireless Networks Security in Ad Hoc Wireless Networks Network Security Requirements Issues

    and Challenges in Security Provisioning Network Security Attacks Key Management Secure

    Routing in Ad Hoc Wireless Networks.

    UNIT V QoS AND ENERGY MANAGEMENT

    Introduction Issues and Challenges in Providing QoS in Ad Hoc Wireless Networks Classifications of

    QoS Solutions MAC Layer Solutions Network Layer Solutions QoS Frameworks for Ad Hoc

    Wireless Networks Energy Management in Ad Hoc Wireless Networks Introduction Need for Energy

  • Management in Ad Hoc Wireless Networks Classification of Energy Management Schemes Battery

    Management Schemes Transmission Power Management Schemes System Power Management

    Schemes.

    TEXT BOOKS:

    S.NO Author(s) Name Title of the book Publisher Year of Publication

    1 Siva Ram Murthy C. and Manoj.B.S

    Ad Hoc Wireless Networks

    Architectures and Protocols (2

    nd Edition)

    Prentice Hall PTR,

    New Delhi 2004

    REFERENCE BOOKS:

    S.NO Author(s) Name Title of the book Publisher Year of Publication

    1 Toh C.K Ad Hoc Mobile Wireless Networks Protocols and

    Systems (3rd

    Edition)

    Prentice Hall PTR,

    New Delhi. 2001

    2 Charles E. Perkins Ad Hoc Networking (3rd Edition)

    Addison Wesley,

    New York 2002

  • 12MEIS104 BIO INFORMATICS

    INTENDED OUTCOMES:

    To study the importance of Bio Informatics among the students

    To study the relationship between Data mining with Bio informatics

    To simulate the Biological tools using softwares.

    UNIT I INTRODUCTION

    The Central Dogma Killer Application Parallel Universes Watsons Definition Top Down Vs

    Bottom Up Approach Information Flow Conversance Communications.

    UNIT II DATABASE AND NETWORKS

    Definition Data Management Data Life Cycle Database Technology Interfaces Implementation

    Networks Communication Models Transmission Technology Protocols Bandwidth Topology

    Contents Security Ownership Implementation.

    UNIT III SEARCH ENGINES AND DATA VISUALIZATION

    Search Process Technologies Searching And Information Theory Computational Methods

    Knowledge Management Sequence Visualizations Structure Visualizations User Interfaces

    Animation Vs Simulation.

    UNIT IV STATISTICS, DATA MINING AND PATTERN MATCHING

    Statistical Concepts Micro Arrays Imperfect Data Basics Quantifying Randomness Data

    Analysis Tools Selection Alignment Clustering Classification Data Mining Methods

    Technology Infrastructure Pattern Recognition Discovery Machine Learning Text Mining

    Pattern Matching Fundamentals Dot Matrix Analysis Substitution Matrix Dynamic Programming

    Word Method Bayesian Method Multiple Sequence Alignment Tools.

    UNIT V MODELING SIMULATION AND COLLABORATION

    Drug Discovery Fundamentals Protein Structure System Biology Tools Collaboration And

    Communication Standards Issues Case Study.

  • TEXT BOOKS:

    S.NO Author(s) Name Title of the book Publisher Year of Publication

    1 Bryan Bergeron Bio Informatics Computing (2

    nd Edition)

    Prentice Hall,

    New York 2003

    REFERENCE BOOKS:

    S.NO Author(s) Name Title of the book Publisher Year of Publication

    1 Affward T.K. ,D.J. Parry Smith

    Introduction to Bio

    Informatics (4

    th Edition)

    Pearson

    Education, Asia.

    2001

    2 Pierre Baldi, Soren Brunak

    Bio Informatics

    The Machine

    Learning Approach

    (2nd Edition)

    First East West

    Press, Moscow 2003

  • 12MEIS111 NETWORKS LAB

    LIST OF EXPERIMENTS

    1. Simulation of ARP / RARP. 2. Write a program that takes a binary file as input and performs bit stuffing and CRC

    Computation.

    3. Develop an application for transferring files over RS232. 4. Simulation of Sliding-Window protocol. 5. Simulation of BGP / OSPF routing protocol. 6. Develop a Client Server application for chat. 7. Develop a Client that contacts a given DNS Server to resolve a given host name. 8. Write a Client to download a file from a HTTP Server. 9. Study of Network Simulators like NS2/Glomosim / OPNET . 10. Write a program mail using mailserver.

  • SEMESTER II

    12MEIS201 DATABASE TECHNOLOGY

    INTENDED OUTCOMES:

    Advanced database aims at developing computer application with different kinds of data models. It is also deals with the Transaction management of these

    different databases.

    To study the needs of different databases.

    To understand about different data models that can be used for these databases.

    To make the students to get familiarise the transaction management of the database

    To develop in-depth knowledge about web and intelligent database.

    To provide an introductory concept about the way in which data can be stored in geographical information systems etc.,

    UNIT I DATA BASE SYSTEM CONCEPT

    File systems Database systems Database systems architecture Data models Relational model

    Hierarchical model Network model Entity-Relationship model Data Dictionary Database

    Administration and control.

    UNIT II RELATIONAL DATABASES

    Codd's rules Base tables Views Domains and key concept Integrity rules Relational Algebra

    Relational calculus Commercial query languages Embedded SQL Normalization and database

    design.

    UNIT III DATABASE SYSTEM DESIGN

    File and storage structures Indexing and Hashing Query processing Database recovery

    Concurrency control Transaction processing Security and Integrity Triggers.

    UNIT IV DISTRIBUTED DATABASES

    Centralized versus distributed databases Fragmentation Distributed database architecture Client /

    Server databases Distributed transactions Locking and Commit protocols Distributed concurrency

    Control Security and reliability Parallel databases.

    UNIT V ADVANCED DATABASES

    The World Wide Web Object oriented database Object Relational database XML, XML/QL Data

    Analysis and OLAP Data mining Data warehousing.

  • TEXT BOOKS:

    S.NO. Author(s) Name Title of the book Publisher Year of publication

    1 Abraham Silberschatz,

    Henry.F.Korth,

    Sudharsan.S

    Database System

    Concepts (4th Edition) Tata McGraw

    Hill, New Delhi 2002

    2 Ramez Elmasri, Shamkant B. Navathe

    Fundamentals of

    Database Systems (3rd

    Edition)

    Addison Wesley,

    New York 2004

    REFERENCE BOOKS:

    S.NO. Author(s) Name Title of the book Publisher Year of publication

    1 Jim Buyens Step by Step Web Database

    Development (3

    rd Edition)

    PHI, Asia 2005

    2 Stefano Ceri & Giuesppe Pelagatti

    Distributed Databases

    - Principles and

    Systems (2nd

    Edition)

    McGraw Hill Book

    Company, New

    Delhi.

    2004

    3 C.J.Date An Introduction to Database system (7th Edition)

    Pearson Education,

    New York.

    2003

    WEBSITES:

    http://en.wikipedia.org/wiki/Database#Database_concept

    http://www.cse.iitb.ac.in/~sudarsha/db-book/slide-dir/

    http://www.classle.net/sites/default/files/text/7539/DBMS_Korth_4edition_sol.pdf

    http://www.mediafire.com/?ondtsi8om71tock

    http://en.wikipedia.org/wiki/Database#Database_concepthttp://www.cse.iitb.ac.in/~sudarsha/db-book/slide-dir/http://www.classle.net/sites/default/files/text/7539/DBMS_Korth_4edition_sol.pdf

  • 12MEIS202 INFORMATION SECURITY

    INTENDED OUTCOMES:

    To study the critical need for ensuring Information Security in Organizations

    To understand the basics of Information Security

    To know the legal, ethical and professional issues in Information Security

    To know the aspects of risk management

    UNIT -1 INTRODUCTION

    History, Critical Characteristics of Information, NSTISSC Security Model, Components of an

    Information System, Securing the Components, Balancing Security and Access, The SDLC, The Security

    SDLC

    UNIT- II SECURITY INVESTIGATION

    Need for Security, Business Needs, Threats, Attacks, Legal, Ethical and Professional Issues

    UNIT- III SECURITY ANALYSIS

    Risk Management: Identifying and Assessing Risk, Assessing and Controlling Risk

    UNIT- IV LOGICAL DESIGN

    Blueprint for Security, Information Security Poicy, Standards and Practices, ISO 17799/BS 7799, NIST

    Models, VISA International Security Model, Design of Security Architecture, Planning for Continuity

    UNIT- V PHYSICAL DESIGN

    Security Technology, IDS, Scanning and Analysis Tools, Cryptography, Access Control Devices,

    Physical Security, Security and Personnel

  • REFERENCE BOOKS:

    S.NO Author(s) Name Title of the book Publisher Year of Publications

    1 Micki Krause, Harold F. Tipton

    Handbook of

    Information Security

    Management

    2004

    2 Stuart Mc Clure, Joel Scrambray,

    George Kurtz

    Hacking Exposed Tata McGraw Hill, Osborne

    3 Matt Bishop Computer Security Art and Science.

    Computer Security

    Art and Science.

    2002

    4 Michael E Whitman and

    Herbert J Mattord

    Principles of

    Information Security Vikas Publishing

    House, New Delhi

    2003

  • 12MEIS203 INFORMATION STORAGE AND MANAGEMENT

    INTENDED OUTCOMES:

    To understand the content and successfully complete this course, a student must have an understanding of computers, operating systems, networking, and

    databases. Experience in specific segments of storage infrastructure would also be

    helpful to fully assimilate the course material.

    To evaluate storage architectures, including storage subsystems, DAS, SAN, NAS, CAS

    To define backup, recovery, disaster recovery, business continuity, and replication

    To examine emerging technologies including IP-SAN

    To understand logical and physical components of a storage infrastructure

    To identify components of managing and monitoring the data center

    To define information security and identify different storage virtualization technologies

    UNIT I INTRODUCTION TO STORAGE TECHNOLOGY

    Review data creation and the amount of data being created and understand the value of data to a business

    challenges in data storage and data management Solutions available for data storage Core elements of a

    data center infrastructure role of each element in supporting business activities

    UNIT II STORAGE SYSTEMS ARCHITECTURE Hardware and software components of the host environment Key protocols and concepts used by each

    component Physical and logical components of a connectivity environment Major physical components

    of a disk drive and their function logical constructs of a physical disk access characteristics and

    performance Implications Concept of RAID and its components Different RAID levels and their

    suitability for different application environments

    UNIT III INTRODUCTION TO NETWORKED STORAGE Evolution of networked storage Architecture components and topologies of FC SAN NAS and IP

    SAN Benefits of the different networked storage options Understand the need for long term

    archiving solutions and describe how CAS fulfills the need Understand the appropriateness of the

    different networked storage options for different application environments

    UNIT IV INFORMATION AVAILABILITY & MONITORING & MANAGING

    DATACENTER List reasons for planned/unplanned outages and the impact of downtime Impact of downtime

    Differentiate between business continuity (BC) and disaster recovery (DR) RTO and RPO Identify

    single points of failure in a storage infrastructure and list solutions to mitigate these failures

    Architecture of backup/recovery and the different backup/recovery topologies Replication technologies

    and their role in ensuring information availability and business continuity

    UNIT V SECURING STORAGE AND STORAGE VIRTUALIZATION

  • Information security Critical security attributes for information systems Storage security domains List

    and analyzes the common threats in each domain Virtualization technologies block level and file

    level virtualization technologies and processes

    TEXT BOOKS:

    S.NO Author(s) Name Title of the book Publisher Year of Publications

    1 EMC Corporation Information Storage and Management (2

    nd Edition)

    Wiley, ISBN

    number

    04702942134, New

    York.

    2003

    2 Robert Spalding Storage Networks The Complete

    Reference (3

    rd Edition)

    Tata McGraw Hill,

    Osborne.

    2003

    REFERENCE BOOKS:

    S.NO Author(s) Name Title of the book Publisher Year of Publications

    1 Marc Farley Building Storage Networks (2

    nd Edition)

    Tata McGraw Hill,

    Osborne 2001

    2 Meeta Gupta Storage Area Network Fundamentals (3

    rd Edition)

    Pearson Education

    Limited, Asia.

    2002

  • 12MEIS204 CYBER SECURITY

    INTENDED OUTCOMES:

    To study the critical need for ensuring Information Security in Organizations

    To understand the basics of Cyber Security

    To know the legal, ethical and professional issues in Cyber Security

    To know the aspects of risk management

    UNIT I - SECURITY POLICIES AND MANAGEMENT

    Security Policy Design - Designing Security Procedures- Risk Assessment Techniques- Security

    standards -Security Models:Biba Model-Chinese Wall-Bell La Pedula Model

    UNIT II- PHYSICAL AND ENVIRONMENTAL SECURITY

    Server Room Design-Fire fighting equipment-Temperature/humidity Control-Application

    Security:Databases, Email and Internet

    UNIT III COMMUNICATIONS AND OPERATIONS MANAGEMENT

    Network Architecture-Network Operations- Security Devices :Firewalls, IDS/IPS, Antivirus-

    Routers/Switches-Access Control:Logical and Physical Access Control

    UNIT IV- SOFTWARE SECURITY

    Security in development methodology-Security testing-Segregation of duties-Information Security

    Standards-ISO 27001-PCI DSS

    UNIT V - CYBER FORENSICS

    Introduction to forensic tools- Evaluation of crime scene and evidence collection- Usage of tools for disk

    imaging and recovery processes-Compliance :IT Act,Copy Right Act, Patents.

  • REFERENCE BOOKS:

    S.NO Author(s) Name Title of the book Publisher Year of Publication

    1 Emmett Dulaney CompTIA Security+ Deluxe Study Guide

    Wiley Publishing

    Inc,Indiana.

    2009

    2 John Mallery Hardening Network Security

    Mcgraw Hill,USA 2005

    3 Eoghan Casey BS MA

    Evidence and Computer

    Crime Elsevier,Inc,USA

  • 12MEIS205 RADIO FREQUENCY IDENTIFICATION

    INTENDED OUTCOMES:

    To study the critical need for ensuring Authentication in Organizations

    To understand the basics of RFID

    To know professional issues in RFID

    UNIT I -INTRODUCTION

    Background and definitions- Automatic identification technology (Auto-ID)-Types of Auto-ID

    technology- Radio frequency identification- Serialization- Applications: Automobile toll

    collection,Hospital asset tracking using real-time location systems (RTLS)- Supply chain tracking- RFID

    bar code comparison

    UNIT II -RFID COMPONENTS

    Elements of an RFID system- Radio frequencies: LF, HF, UHF, and SHF Systems- Tag-reader

    communication: inductive versus radiative coupling - Powering RFID tags: Passive, semi-passive, and

    active- Real Time Location Systems.

    UNIT III - RFID READERS

    RFID Readers: Reader Forms- Reader Components- Reader Configurations-RFID communication:

    Elements of Communication System- Elements of speech: medium and modulation- Language: packet

    structure and commands - Access: medium access control (MAC)- Binary Tree Navigation- Slotted

    Aloha- Interpretation: Object ID, context, sensor information, and business rules RFID Protocols.

    UNIT IV - EPCGLOBAL DATA ARCHITECTURE

    Electronic product code (EPC)- RFID reader protocol- Application Level Events (ALE)- EPC

    Information Services (EPCIS)- Object Naming Service (ONS)- EPC Trust Services- EPC Discovery

    Services

    UNIT V - SECURING RFID DATA

    Potential attacks:Skimming and eavesdropping- Protocol-based security- Encryption and mutual

    authentication - Gen 2 standard: security measures - Frequencies and security- ePassports: standardized

    security protocols- Physical security- Safeguarding personal privacy: Potential threats to personal privacy-

    Regulatory measures.

  • REFERENCE BOOKS:

    S.NO Author(s) Name Title of the book Publisher Year of Publication

    1 Manish Bhuptani and

    Shahram

    Moradpour

    Deploying Radio

    Frequency Identification

    Systems

    Wiley Publishing

    Inc,Indiana.

    2005

    2 Bill Glover and Himanshu Bhatt

    Hardening Network

    Security O'Reilly

    Media,Inc.USA 2006

    3 Eoghan Casey BS MA

    Passive UHF RFID in

    Practice Elsevier,Inc,USA 2008

    http://www.amazon.com/s/ref=ntt_athr_dp_sr_2?_encoding=UTF8&sort=relevancerank&search-alias=books&field-author=Shahram%20Moradpourhttp://www.amazon.com/s/ref=ntt_athr_dp_sr_2?_encoding=UTF8&sort=relevancerank&search-alias=books&field-author=Shahram%20Moradpour

  • 12MEIS211 DATABASE TECHNOLGY LAB

    List of Experiments

    1. Library Management System 2. Quiz System 3. Payroll System 4. HR Management System 5. Inventory Control System 6. e -Book 7. Online Banking 8. Online Ticket Reservation System 9. Online Shopping 10. Online Tax Payment System

  • SEMESTER III

    12MEIS301 CYBER FORENSIC

    INTENDED OUTCOMES:

    To study the advance technologies in Cyber Forensic

    To understand the basics of Cyber Forensic

    To know the legal, ethical and professional issues in Cyber Security

    UNIT I - INTRODUCTION

    Basic Computer Terminology, Internet, Networking, Computer Storage, Cell Phone / Mobile Forensics,

    Computer Ethics and Application Programs-Introduction to Cyber Forensics, Storage Fundamentals, File

    System Concepts-Data Recovery, Operating System Software.Introduction to Encase Forensic Edition,

    Forensic Tool Kit (FTK) , Use computer forensics software tools to cross validate findings in computer

    evidence-related cases.

    UNIT II -DATA AND EVIDENCE RECOVERY

    Introduction to Deleted File Recovery, Formatted Partition Recovery, Data Recovery Tools, Data

    Recovery Procedures and Ethics, Preserve and safely handle original media, Document a "Chain of

    Custody", Complete time line analysis of computer files based on file creation, file modification and file

    access, Recover Internet Usage Data, Recover Swap Files/ Temporary Files/ Cache Files.

    UNIT III - CYBER CRIMES AND CYBER LAWS

    Introduction to IT laws & Cyber Crimes Internet, Hacking, Cracking, Viruses, Virus Attacks,

    Pornography, Software Piracy, Intellectual property, Legal System of Information Technology, Social

    Engineering, Mail Bombs, Bug Exploits, and Cyber Security.

    UNIT IV - CYBER FORENSICS INVESTIGATION Introduction to Cyber Forensic Investigation, Investigation Tools, eDiscovery, Digital Evidence

    Collection, Evidence Preservation, E-Mail Investigation, E-Mail Tracking, IP Tracking, E-Mail Recovery,

    Encryption and Decryption methods, Search and Seizure of Computers, Recovering deleted evidences,

    Password Cracking

    UNIT V - CYBER SECURITY

    Introduction to Cyber Security, Implementing Hardware Based Security, Software Based Firewalls,

    Security Standards, Assessing Threat Levels, Forming an Incident Response Team, Reporting Cyber

    crime, Operating System Attacks, Application Attacks, Reverse Engineering & Cracking Techniques and

    Financial Frauds

  • REFERENCE BOOKS:

    S.NO Author(s) Name Title of the book Publisher Year of Publication

    1 William L. Simon,Kevin D.

    Mitnick

    The Real Stories Behind the

    Exploits of Hackers,

    Intruders and Deceivers

    Wiley

    Publishing,Inc,Indi

    ana

    2005

    2 Jack Wiles,Johnny Long,Russ

    Rogers,Ron Green

    Techno Security's Guide to

    Managing Risks for IT

    Managers, Auditors and

    Investigators

    First

    Edition,Elsevier

    Inc,USA.

    2007

    3 Alan Calder, Steve Watkins

    Manager's Guide to Data

    Security fourth Edition,

    Kogan Page

    Ltd,USA

    2008

  • ELECTIVES

    12MEISE01 THEORY OF COMPUTATION

    INTENDED OUTCOMES:

    To have a introductory knowledge of automata, formal language theory and computability.

    To have an understanding of finite state and pushdown automata.

    To have a knowledge of regular languages and context free languages.

    To know the relation between regular language, context free language and corresponding recognizers.

    To study the Turing machine and classes of problems.

    UNIT I FINITE AUTOMATA AND REGULAR LANGUAGES

    Finite Automata and Regular languages Regular expressions and Regular languages non determinism

    and Kleenes theorem Equivalence of DFA and NFA Finite Automation with e-moves equivalence of

    regular expression and NFA with e-moves pumping lemma for regular sets.

    UNIT II CONTEXT FREE LANGUAGES

    Context free languages Derivation and languages Relationship between derivation and derivation tree

    Simplification of context free grammars Normal forms for context free grammars CNF and GNF.

    UNIT III PUSH DOWN AUTOMATA (PDA)

    Acceptance by PDA Pushdown automata and Context free languages Pumping lemma for CFL

    deterministic Context free languages and Deterministic pushdown automata.

    UNIT IV TURING MACHINE

    Context sensitive languages and LBA Turing machine (Definition and examples) Computable

    languages and functions Church Turing hypothesis Universal Turing machine P and NP problems

    NP-complete.

    UNIT V UNSOLVABLE PROBLEMS

    Unsolvable problems Rice Theorem Post's correspondence Problem Recursive and recursively

    enumerable languages.

  • TEXT BOOKS:

    S.NO Author(s) Name Title of the book Publisher Year of Publications

    1 Hopcroft and Ullman Introduction to Automata, Languages

    and Computation (2nd Edition)

    Narosa

    Publishers, New

    York.

    2001

    2 Peter Linz An Introduction to formal languages and

    Automata (4th Edition)

    Narosa

    Publishing

    House, New

    Delhi.

    2001

    REFERENCE BOOKS:

    S.NO Author(s) Name Title of the book Publisher Year of Publications

    1 Natarajan A.M., Tamilarasi.A &

    Balasubramani.B

    Theory of Computation (3

    rd Edition)

    New age

    International

    publishers, New

    Delhi

    2002

    2 Harry R. Lewis, Christos H.

    Papadimitriou

    Elements of Theory of

    Computation (4

    th Edition)

    Prentice Hall, New

    Delhi.

    2002

  • 12MEISE02 SOFT COMPUTING

    INTENDED OUTCOMES:

    To introduce the techniques of soft computing and adaptive neuro-fuzzy inferencing systems which differ from conventional AI and computing in terms of

    its tolerance to imprecision and uncertainty.

    To introduce the ideas of fuzzy sets, fuzzy logic and use of heuristics based on human experience

    To become familiar with neural networks that can learn from available examples and generalize to form appropriate rules for inferencing systems

    To provide the mathematical background for carrying out the optimization associated with neural network learning

    UNIT I FUZZY SET THEORY

    Introduction to Neuro Fuzzy and soft Computing Fuzzy Sets Basic Definition and Terminology

    Set-theoretic operations Member Function Formulation and parameterization Fuzzy Rules and Fuzzy

    Reasoning Extension principle and Fuzzy Relations Fuzzy If-Then Rules Fuzzy Reasoning Fuzzy

    Inference Systems Mamdani Fuzzy Models Sugeno Fuzzy Models Tsukamoto Fuzzy Models

    Input Space Partitioning and Fuzzy Modeling.

    UNIT II OPTIMIZATION

    Derivative-based Optimization Descent Methods The Method of steepest Descent Classical

    Newtons Method Step Size Determination Derivative-free Optimization Genetic Algorithms

    Simulated Annealing Random Search Downhill Simplex Search.

    UNIT III NEURAL NETWORKS

    Supervised Learning Neural Networks Perceptrons-Adaline Backpropagation Multilayer perceptrons

    Radial Basis Function Networks Unsupervised Learning and Other Neural Networks Competitive

    Learning Networks Kohonen Self Organizing Networks Learning Vector Quantization Hebbian

    Learning.

    UNIT IV NEURO FUZZY MODELING

    Adaptive Neuro-Fuzzy Inference Systems Architecture Hybrid Learning Algorithm learning

    Methods that Cross-fertilize ANFIS and RBFN Coactive Neuro-Fuzzy Modeling Framework

    Neuron Functions for Adaptive Networks Neuro Fuzzy Spectrum.

    UNIT V APPLICATION OF COMPUTATIONAL INTELLIGENCE

    Printed Character Recognition Inverse Kinematics Problems Automobile Fuel Efficiency prediction

    Soft Computing for Color Recipe Prediction.

  • TEXT BOOKS:

    S.NO Author(s) Name Title of the book Publisher Year of Publication

    1 Jang J.S.R., Sun.C.T and

    Mizutani.E

    Neuro-Fuzzy and Soft

    Computing (5th Edition)

    PHI, Pearson

    Education, Asia.

    2004

    2 Timothy J.Ross Fuzzy Logic with Engineering Application

    (2nd

    Edition)

    McGraw Hill, New

    Delhi.

    2004

    REFERENCE BOOKS:

    S.NO Author(s) Name Title of the book Publisher Year of Publication

    1 Davis E.Goldberg Genetic Algorithms Search, Optimization and

    Machine Learning (4

    th Edition)

    Addison Wesley,

    New York.

    2004

    2 Rajasekaran S. and G.A.V.Pai

    Neural Networks, Fuzzy

    Logic and Genetic

    Algorithms (5th Edition)

    PHI, New Delhi 2003

    3 Eberhart R. P.simpson and

    R.Dobbins

    Computational

    Intelligence PC Tools (3

    rd Edition)

    AP Professional,

    Boston.

    2003

  • 12MEISE03 MOBILE COMPUTING

    INTENDED OUTCOMES:

    To provide basics for various techniques in Mobile Communications and Mobile Content services.

    1. To learn the basics of Wireless voice and data communications technologies. 2. To build working knowledge on various telephone and satellite networks. 3. To study the working principles of wireless LAN and its standards. 4. To build knowledge on various Mobile Computing algorithms. 5. To build skills in working with Wireless application Protocols to develop mobile

    content applications

    UNIT I INTRODUCTION

    Medium Access Control Motivation for Specialized MAC SDMA FDMA DMACDMA

    Comparison of Access mechanisms Tele communications GSM DECTTETRA UMTS IMT-200

    Satellite Systems Basics Routing Localization Handover Broadcast Systems Overview Cyclic

    Repetition of Data Digital Audio Broadcasting Digital Video Broadcasting.

    UNIT II WIRELESS NETWORKS

    Wireless LAN Infrared Vs Radio Transmission Infrastructure Networks Ad hoc Networks IEEE

    802.11 HIPERLAN Bluetooth Wireless ATM Working Group Services Reference Model

    Functions Radio Access Layer Handover- Location Management Addressing Mobile Quality of

    Service Access Point Control Protocol.

    UNIT III MOBILE NETWORK LAYER

    Mobile IP Goals Assumptions and Requirement Entities IP packet Delivery Agent Advertisement

    and Discovery Registration Tunneling and Encapsulation Optimization Reverse Tunneling IPv6

    DHCP- Ad hoc Networks.

    UNIT IV MOBILE TRANSPORT LAYER

    Traditional TCP Indirect TCP Snooping TCP Mobile TCP Fast retransmit/ Fast Recovery

    Transmission/ Timeout Freezing Selective Retransmission Transaction Oriented TCP.

    UNIT V WAP

    Architecture Datagram Protocol Transport Layer Security Transaction Protocol Session Protocol

    Application Environment Wireless Telephony Application.

  • TEXT BOOKS:

    S.NO Author(s) Name Title of the book Publisher Year of Publication

    1 Schiller J Mobile Communication (5

    th Edition)

    Addison Wesley,

    New York 2003

    2 William Stallings Wireless Communication and

    Networks (3rd

    Edition)

    Pearson Education,

    Asia.

    2003

    3 Singhal WAP-Wireless Application Protocol

    (2nd

    Edition)

    Pearson Education,

    Asia.

    2003

    REFERENCE BOOKS:

    S.NO Author(s) Name Title of the book Publisher Year of Publication

    1 Lother Merk, Martin. S. Nicklaus and

    Thomas Stober

    Principles of Mobile Computing (2

    nd Edition)

    Springer, Asia 2003

    2 William C.Y.Lee Mobile Communication Design Fundamentals

    (4th Edition)

    John Wiley, New

    York.

    2003

  • 12MEISE04 DISTRIBUTED COMPUTING

    INTENDED OUTCOMES:

    To understand the basic concepts in distributing computing in operating systems

    To enable the students to involve in research activities in recent trends

    To make the students to get idea of distributed operating systems

    UNIT I INTRODUCTION

    Characterization of Distributed Systems Examples Resource Sharing and the Web Challenges

    System Models Architectural and Fundamental Models Networking and Internetworking Types of

    Networks Network Principles Internet Protocols Case Studies.

    UNIT II PROCESSES AND DISTRIBUTED OBJECTS

    Interprocess Communication The API for the Internet Protocols External Data Representation and

    Marshalling Client-Server Communication Group Communication Case Study Distributed Objects

    and Remote Invocation Communication Between Distributed Objects Remote Procedure Call

    Events and Notifications Java RMI Case Study.

    UNIT III OPERATING SYSTEM ISSUES I

    The OS Layer Protection Processes and Threads Communication and Invocation OS Architecture

    Security - Overview Cryptographic Algorithms Digital Signatures Cryptography Pragmatics

    Case Studies Distributed File Systems File Service Architecture Sun Network File System The

    Andrew File System.

    UNIT IV OPERATING SYSTEM ISSUES II

    Name Services Domain Name System Directory and Discovery Services Global Name Service

    X.500 Directory Service Clocks, Events and Process States Synchronizing Physical Clocks Logical

    Time And Logical Clocks Global States Distributed Debugging Distributed Mutual Exclusion

    Elections Multicast Communication Related Problems.

    UNIT V DISTRIBUTED TRANSACTION PROCESSING

    Transactions Nested Transactions Locks Optimistic Concurrency Control Timestamp Ordering

    Comparison Flat and Nested Distributed Transactions Atomic Commit Protocols Concurrency

    Control in Distributed Transactions Distributed Deadlocks Transaction Recovery Overview of

    Replication And Distributed Multimedia Systems.

  • TEXT BOOKS:

    S.NO Author(s) Name Title of the book Publisher Year of Publication

    1 George Coulouris, Jean Dollimore and Tim

    Kindberg

    Distributed Systems

    Concepts and Design

    (3rd Edition)

    Pearson Education,

    Asia 2002

    2 Sape Mullender Distributed Systems (2nd Edition)

    Addison Wesley,

    New York.

    REFERENCE BOOKS:

    S.NO Author(s) Name Title of the book Publisher Year of Publication

    1 Albert Fleishman Distributes Systems- Software Design and

    Implementation (2nd

    Edition)

    Springer, Verlag,

    New York 2004

    2 Liu M.L Distributed Computing Principles

    and Applications (3

    rd Edition)

    Pearson Education,

    Asia.

    2004

    3 Andrew S Tanenbaum, Maartenvan Steen

    Distributed Systems

    Principles and Paradigms (4

    th Edition)

    Pearson Education,

    Asia.

    2002

    4 Mugesh Singhal, Niranjan G Shivaratri

    Advanced Concepts

    in Operating Systems (5

    th Edition)

    Tata McGraw Hill,

    New Delhi. 2001

  • 12MEISE05 MULTIMEDIA SYSTEMS

    INTENDED OUTCOMES:

    To impart the fundamental concepts of Multimedia.

    To study the multimedia concepts and various Applications.

    To enable the students to develop their creativity

    UNIT I INTRODUCTION AND QOS

    Introduction QOS Requirements and Constraints Concepts Resources Establishment Phase

    Runtime Phase Management Architectures.

    UNIT II OPERATING SYSTEMS

    Real-Time Processing Scheduling Interprocess Communication Memory and Management Server

    Architecture Disk Management.

    UNIT III FILE SYSTEMS AND NETWORKS

    Traditional and Multimedia File Systems Caching Policy Batching Piggy backing Ethernet

    Gigabit Ethernet Token Ring 100VG AnyLAN Fiber Distributed Data Interface (FDDI) ATM

    Networks MAN WAN.

    UNIT IV COMMUNICATION

    Transport Subsystem Protocol Support for QOS Transport of Multimedia Computer

    Supported Cooperative Work Architecture Session Management MBone Applications.

    UNIT V SYNCHRONIZATION

    Synchronization in Multimedia Systems Presentation Synchronization Types Multimedia

    Synchronization Methods Case Studies MHEG MODE ACME.

  • TEXT BOOKS:

    S.NO Author(s) Name Title of the book Publisher Year of Publication

    1 Ralf Steinmetz and Klara Nahrstedt

    Multimedia Systems (1

    st Edition)

    Springer, New

    York. 2004

    2 Rao, K. R.; Bojkovic, Zoran S.;

    Milovanovic,

    Dragorad A.

    Multimedia

    Communication

    Systems Techniques,

    Standards, and

    Networks (3rd

    Edition)

    Prentice Hall, New

    Delhi.

    2002

    REFERENCE BOOKS:

    S.NO Author(s) Name Title of the book Publisher Year of Publication

    1 Ralf Steinmetz and Klara Nahrstedt

    Media Coding and

    Content Processing (3

    rd Edition)

    Prentice hall, New

    Delhi 2002

    2 Vaughan T Multimedia (2

    nd Edition)

    Tata McGraw Hill,

    New Delhi.

    2000

    3 Mark J.B., Sandra K.M

    Multimedia

    Applications

    Development using

    DVI Technology (4

    th Edition)

    Tata McGraw Hill,

    New Delhi 2004

    4 Rao K. R. , Zoran S. Bojkovic,

    Dragorad A.

    Milovacovic, D. A.

    Milovacovic , Ze Nian Li and

    Mark S. Drew

    Fundamentals of

    Multimedia (2

    nd Edition)

    Pearson education,

    Asia.

    2004

  • 12MEISE06 XML AND WEB SERVICES

    INTENDED OUTCOMES:

    To impart the basic concepts of web services.

    To study the XML techniques in real time application.

    To study the security feature in web application.

    UNIT I INTRODUCTION

    Role Of XML XML and The Web XML Language Basics SOAP Web Services Revolutions Of

    XML Service Oriented Architecture (SOA).

    UNIT II XML TECHNOLOGY

    XML Name Spaces Structuring With Schemas and DTD Presentation Techniques Transformation

    XML Infrastructure.

    UNIT III SOAP

    Overview Of SOAP HTTP XML RPC SOAP Protocol Message Structure Intermediaries

    Actors Design Patterns And Faults SOAP With Attachments.

    UNIT IV WEB SERVICES

    Overview Architecture Key Technologies UDDI WSDL ebXML SOAP And Web Services In

    E Com Overview Of .NET And J2EE.

    UNIT V XML SECURITY

    Security Overview Canonicalization XML Security Framework XML Encryption XML Digital

    Signature XKMS Structure Guidelines For Signing XML Documents XML In Practice.

  • TEXT BOOKS:

    S.NO Author(s) Name Title of the book Publisher Year of Publication

    1 Frank. P. Coyle XML, Web Services And The Data Revolution (2

    nd Edition)

    Pearson

    Education,

    Asia.

    2002

    REFERENCE BOOKS:

    S.NO Author(s) Name Title of the book Publisher Year of Publication

    1 Ramesh Nagappan, Robert Skoczylas

    and Rima Patel

    Sriganesh

    Developing Java Web

    Services (4th Edition)

    Wiley Publishing

    Inc, New York 2004

    2 Sandeep Chatterjee, James Webber

    Developing Enterprise Web

    Services (4th Edition)

    Pearson

    Education, Asia 2004

    3. McGovern, et al. Java Web Services Architecture (3

    rd Edition)

    Morgan

    Kaufmann

    Publishers, New

    Delhi.

    2005

  • 12MEISE07 PARALLEL COMPUTING

    INTENDED OUTCOMES:

    To study the scalability & clustering issues, understand the technologies

    used for parallel computation, study the different inter connection networks

    and the different software programming models.

    To study the scalability and clustering issues and the technology necessary

    for them.

    To understand the technologies enabling parallel computing.

    To study the different types of interconnection networks.

    To study the different parallel programming models.

    UNIT I SCALABILITY AND CLUSTERING

    Evolution of Computer Architecture Dimensions of Scalability Parallel Computer Models Basic

    Concepts Of Clustering Scalable Design Principles Parallel Programming Overview Processes,

    Tasks and Threads Parallelism Issues Interaction / Communication Issues Semantic Issues In

    Parallel Programs.

    UNIT- II ENABLING TECHNOLOGIES

    System Development Trends Principles of Processor Design Microprocessor Architecture Families

    Hierarchical Memory Technology Cache Coherence Protocols Shared Memory Consistency

    Distributed Cache Memory Architecture Latency Tolerance Techniques Multithreaded Latency

    Hiding.

    UNIT- III SYSTEM INTERCONNECTS

    Basics of Interconnection Networks Network Topologies and Properties Buses, Crossbar and

    Multistage Switches, Software Multithreading Synchronization Mechanisms.

    UNIT- IV PARALLEL PROGRAMMING

    Paradigms And Programmability Parallel Programming Models Shared Memory Programming.

    UNIT- V MESSAGE PASSING PROGRAMMING

    Message Passing Paradigm Message Passing Interface Parallel Virtual Machine.

  • TEXT BOOK

    Kai Hwang and Zhi.Wei Xu, 2003, Scalable Parallel Computing, Tata McGraw-Hill, New Delhi

    REFERENCE BOOKS:

    S.NO Author(s) Name Title of the book Publisher Year of Publication

    1 David E. Culler & Jaswinder Pal

    Singh

    Parallel Computing

    Architecture: A

    Hardware/Software

    Approach

    Morgan

    Kaufman

    Publishers

    2001

    2 Michael J. Quinn Parallel Programming in C with MPI & OpenMP

    McGraw-Hill,

    New Delhi 2003

    3. Kai Hwang Advanced Computer Architecture

    Tata McGraw-

    Hill, New Delhi 2003

  • 12MEISE08 GRID COMPUTING

    INTENDED OUTCOMES:

    To understand the technology application and tool kits for grid computing

    To understand the basic concepts of grid computing To know the application of grid computing To understanding the technology and tool kits to facilitated the grid computing

    UNIT I GRID COMPUTING

    Introduction Definition Scope of grid computing

    UNIT II GRID COMPUTING INITIATIVES

    Grid Computing Organizations and their roles Grid Computing analog Grid Computing road map.

    UNIT III GRID COMPUTING APPLICATIONS

    Merging the Grid sources Architecture with the Web Devices Architecture.

    UNIT IV TECHNOLOGIES

    OGSA Sample use cases OGSA platform components OGSI OGSA Basic Services.

    UNIT V GRID COMPUTING TOOL KITS

    Globus Toolkit Architecture, Programming model, High level services OGSI .Net middleware

    Solutions.

    TEXT BOOKS:

    S.NO Author(s) Name Title of the book Publisher Year of Publication

    1 Joshy Joseph & Craig Fellenstein

    Grid Computing (4

    th Edition)

    PHI, Asia 2003

    REFERENCE BOOKS:

    S.NO Author(s) Name Title of the book Publisher Year of Publication

    1 Ahmar Abbas Grid Computing A Practical Guide to

    technology and

    Applications (2nd

    Edition)

    Charles River

    media, New York.

    2003

  • 12MEISE09 ROBOTICS

    INTENDED OUTCOMES:

    Robots are slowly and steadily replacing human beings in many fields. The aim of this course is to introduce the students into this area so that they

    could use the same when they enter the industries.

    The mathematics associated with the same.

    Actuators and sensors necessary for the functioning of the robot.

    UNIT -I ROBOTIC MANIPULATION

    Robotic manipulation Automation and Robots Robot Classification Applications Robot

    Specifications Notation. Direct Kinematics: The ARM Equation Dot and Cross products Coordinate

    frames Rotations Homogeneous coordinates Link coordinates The arm equation A five-axis

    articulated robot (Rhino XR-3) A four-axis SCARA Robot (Adept One) A six-axis articulated Robot

    (Intelledex 660). Inverse Kinematics: Solving the arm equation The inverse kinematics problem

    General properties of solutions Tool configuration Inverse kinematics of a five-axis articulated robot

    (Rhino XR-3)

    UNIT- II DYNAMIC OF ROBOTS

    Workspace analysis and trajectory planning: Workspace analysis Work envelop of a five-axis

    articulated robot Work envelope of a four-axis SCARA robot Workspace fixtures The pick-and-

    place operation Continuous-path motion Interpolated motion Straight-line motion. Differential

    motion and statics: Manipulator Dynamics: Lagranges equation Kinetic and Potential energy

    Generalized force Lagrange -Euler dynamic model Dynamic model of a two-axis planar articulated

    robot - Dynamic model of a three-axis SCARA robot Direct and Inverse dynamics Recursive Newton-

    Euler formulation

    UNIT- III ROBOT CONTROL

    Robot control: The control problem State equation Constant solutions Linear feedback systems -

    Single-axis PID control PD-Gravity control Computed-Torque control Variable-Structure control

    Impedance control

    UNIT- IV SENSORS AND ACTUATOR

    Actuators - Introduction Characteristics of actuating systems Comparison of actuating systems

    Hydraulic devices Pneumatic devices Electric motors Microprocessor control of electric motors

    Magnetostricitve actuators Shape-memory type metals Speed reduction. Sensors Introduction

    Sensor characteristics Position sensors Velocity sensors Acceleration sensors Force and pressure

    sensors Torque sensors Microswitches Light and Infrared sensors Touch and Tactile sensors

    Proximity sensors Voice Recognition devices Voice synthesizers Remote center compliance device.

    UNIT- V VISION AND TASK PLANNING

    Robot vision Image representation Template matching Polyhedral objects Shape analysis

  • Segmentation Iterative processing Perspective Transformations Structured illumination Camera

    calibration. Task planning: Task-level programming Uncertainty Configuration space Gross-Motion

    planning Grasp planning Fine-Motion planning Simulation of planar motion A task-planning

    problem.

    REFERENCE BOOKS:

    S.NO Author(s) Name Title of the book Publisher Year of Publication

    1 Saeed B.Niku Introduction to Robotics Analysis, Systems,

    Applications

    , Prentice Hall of

    India Pvt. Ltd

    2003

    2 Robert J.Schilling Fundamentals of Robotics Analysis & Control

    Prentice Hall of

    India Pvt. Ltd.

    2002

  • 12MEISE10 EMBEDDED SYSTEMS INTENDED OUTCOMES:

    To give sufficient background for undertaking embedded systems design.

    To introduce students to the embedded systems, its hardware and software.

    To introduce devices and buses used for embedded networking.

    To explain programming concepts and embedded programming in C and C++.

    To explain real time operating systems, inter-task communication and an exemplary case of MUCOS IIRTOS.

    UNIT I INTRODUCTION TO EMBEDDED SYSTEMS

    Definition and Classification Overview of Processors and hardware units in an embedded system

    Software embedded into the system Exemplary Embedded Systems Embedded Systems on a Chip

    (SoC) and the use of VLSI designed circuits

    UNIT II DEVICES AND BUSES FOR DEVICES NETWORK

    I/O Devices Device I/O Types and Examples Synchronous Iso synchronous and Asynchronous

    Communications from Serial Devices Examples of Internal Serial Communication Devices UART

    and HDLC Parallel Port Devices Sophisticated interfacing features in Devices/Ports Timer and

    Counting Devices 12C, USB, CAN and advanced I/O Serial high speed buses ISA, PCI, PCI

    X, cPCI and advanced buses.

    UNIT III EMBEDDED PROGRAMMING

    Programming in assembly language (ALP) vs. High Level Language C Program Elements, Macros and

    functions Use of Pointers NULL Pointers Use of Function Calls Multiple function calls in a

    Cyclic Order in the Main Function Pointers Function Queues and Interrupt Service Routines Queues

    Pointers Concepts of EMBEDDED PROGRAMMING in C++ Objected Oriented Programming

    Embedded Programming in C++, C Program compilers Cross compiler Optimization of memory

    codes.

    UNIT IV REAL TIME OPERATING SYSTEMS PART 1

    OS Services Interrupt Routines Handling, Task scheduling models Handling of task scheduling and

    latency and deadlines as performance metrics Inter Process Communication And Synchronisation

    Shared data problem Use of Semaphore(s) Priority Inversion Problem and Deadlock Situations Inter

    Process Communications using Signals Semaphore Flag or mutex as Resource key Message Queues

    Mailboxes Pipes Virtual (Logical) Sockets RPCs.

    UNIT V REAL TIME OPERATING SYSTEMS PART 2

    Study of RTOS, VxWorks Basic Features Task Management Library at the System Library Header

    File VxWorks System Functions and System Tasks Inter Process (Task) Communication Functions

    Case Study of Coding for Sending Application Layer Byte Streams on a TCP/IP Network Using RTOS

    Vxworks

  • TEXT BOOKS:

    S.NO Author(s) Name Title of the book Publisher Year of Publication

    1 Rajkamal Embedded Systems Architecture, Programming

    and Design(2nd

    Edition)

    TATA McGraw

    Hill, New Delhi 2003

    REFERENCE BOOKS:

    S.NO Author(s) Name Title of the book Publisher Year of Publication

    1 David E.Simon An Embedded Software Primer (2

    nd Edition)

    Pearson Education

    Asia 2000

  • 12MEISE11 DIGITAL IMAGING

    INTENDED OUTCOMES:

    To understand the basic concepts of Digital image processing

    To enable the students to analyze the details of image compression ans segmentataion

    To make the students to understand image recognition and Interpretation

    UNIT I DIGITAL IMAGE FUNDAMENTALS

    Image formation, Image transforms fourier transforms, Walsh, Hadamard, Discrete cosine, Hotelling

    transforms.

    UNIT II IMAGE ENHANCEMENT & RESTORATION

    Histogram modification techniques Image smoothening Image Sharpening Image Restoration

    Degradation Model Noise models Spatial filtering Frequency domain filtering.

    UNIT III IMAGE COMPRESSION & SEGMENTATION

    Compression Models Elements of information theory Error free Compression Image segmentation

    Detection of discontinuities Edge linking and boundary detection Thresholding Region based

    segmentation Morphology.

    UNIT IV REPRESENTATION AND DESCRIPTION

    Representation schemes Boundary descriptors Regional descriptors Relational Descriptors

    UNIT V OBJECT RECOGNITION AND INTERPRETATION

    Patterns and pattern classes Decision Theoretic methods Structural methods.

  • TEXT BOOKS:

    S.NO Author(s) Name Title of the book Publisher Year of Publication

    1 Gonzalez.R.C & Woods. R.E

    Digital Image Processing

    (2nd Edition) Pearson Education, Asia.

    2002

    REFERENCE BOOKS:

    S.NO Author(s) Name Title of the book Publisher Year of Publication

    1 Anil Jain.K Fundamentals of Digital image Processing (2

    nd

    Edition)

    Prentice Hall of

    India, New Delhi 2002

    2 Sid Ahmed Image Processing (5th Edition)

    McGraw Hill, New

    York 2002

  • 12MEISE12 SOFTWARE QUALITY ASSURANCE

    INTENDED OUTCOMES:

    To introduce an integrated approach to software development incorporating quality assurance technologies.

    To study the Software quality models

    To study the Quality plan, implementation and documentation

    To understand the Quality measurement and metrics and CASE Tools

    UNIT I CONCEPTS

    Concepts of Quality Control, Quality Assurance, Quality Management Total Quality Management; Cost

    of Quality; QC tools 7 QC Tools and Modern Tools; Other related topics Business Process Re

    engineering Zero Defect, Six Sigma, Quality Function Deployment, Benchmarking, Statistical process

    control.

    UNIT II SOFTWARE ENGINEERING CONCEPTS

    Software Engineering Principles, Software Project Management, Software Process, Project and Product

    Metrics, Risk Management, Software Quality Assurance; Statistical Quality Assurance Software

    Reliability, Muse Model; Software Configuration Management; Software Testing; CASE (Computer

    Aided Software Engineering).

    UNIT III QUALITY ASSURANCE MODELS

    Models for Quality Assurance ISO 9000 Series, CMM, SPICE, Malcolm Baldrige Award.

    UNIT IV SOFTWARE QUALITY ASSURANCE RELATED TOPICS

    Software Process Definition and implementation; internal Auditing and Assessments; Software testing

    Concepts, Tools, Reviews, Inspections & Walkthroughts; P CMM.

    UNIT V FUTURE TRENDS

    PSP and TSP, CMMI, OO Methodology, Clean room software engineering, Defect injection and

    prevention.

  • TEXT BOOKS:

    S.NO Author(s) Name Title of the book Publisher Year of Publication

    1 Roger Pressman Software Engineering (6th Edition)

    McGraw Hill, New

    Delhi 2005

    2 Watts Humphery Managing Software Process (5

    th Edition)

    Addison Wesley,

    New York 2001

    REFERENCE BOOKS:

    S.NO Author(s) Name Title of the book Publisher Year of Publication

    1 Philip B Crosby Quality is Free The Art of Making Quality Certain (2

    nd

    Edition)

    Mass Market, New

    York 2002

  • 12MEISE13 HIGH SPEED NETWORKS

    INTENDED OUTCOMES:

    To highlight the features of different technologies involved in High Speed Networking and their performance.

    Students will get an introduction about ATM and Frame relay.

    Students will be provided with an up-to-date survey of developments in High Speed Networks.

    Enable the students to know techniques involved to support real-time traffic and congestion control.

    Students will be provided with different levels of quality of service (Q.S) to different applications.

    UNIT- I HIGH SPEED NETWORKS

    Frame Relay Networks Asynchronous transfer mode ATM Protocol Architecture, ATM logical

    Connection, ATM Cell ATM Service Categories AAL.

    High Speed LANs: Fast Ethernet, Gigabit Ethernet, Fibre Channel Wireless LANs: applications,

    requirements Architecture of 802.11

    UNIT II CONGESTION AND TRAFFIC MANAGEMENT

    Queuing Analysis- Queuing Models Single Server Queues Effects of Congestion Congestion

    Control Traffic Management Congestion Control in Packet Switching Networks Frame Relay

    Congestion Control.

    UNIT- III TCP AND ATM CONGESTION CONTROL

    TCP Flow control TCP Congestion Control Retransmission Timer Management Exponential RTO

    backoff KARNs Algorithm Window management Performance of TCP over ATM.Traffic and

    Congestion control in ATM Requirements Attributes Traffic Management Frame work, Traffic

    Control ABR traffic Management ABR rate control, RM cell formats, ABR Capacity allocations

    GFR traffic management.

    UNIT -IV INTEGRATED AND DIFFERENTIATED SERVICES

    Integrated Services Architecture Approach, Components, Services- Queuing Discipline, FQ, PS, BRFQ,

    GPS, WFQ Random Early Detection, Differentiated Services

    UNIT- V PROTOCOLS FOR QOS SUPPORT

    RSVP Goals & Characteristics, Data Flow, RSVP operations, Protocol Mechanisms Multiprotocol

    Label Switching Operations, Label Stacking, Protocol details RTP Protocol Architecture, Data

    Transfer Protocol, RTCP.

  • REFERENCE BOOKS:

    S.NO Author(s) Name Title of the book Publisher Year of Publication

    1 Warland & Pravin Varaiya

    High Performance

    Communication Networks Jean Harcourt Asia

    Pvt. Ltd

    2001

    2 Irvan Pepelnjk, Jim Guichard and Jeff

    Apcar

    MPLS and VPN

    architecture

    3 William Stallings High Speed Networks And Internet

    Pearson Education 2002

  • 12MEISE14 DATA WAREHOUSING AND DATA MINING

    INTENDED OUTCOMES:

    To serve as an introductory course to under graduate students with an emphasis on the design aspects of Data Mining and Data Warehousing

    To introduce the concept of data mining with in detail coverage of basic tasks, metrics, issues, and implication. Core topics like classification, clustering and

    association rules are exhaustively dealt with.

    To introduce the concept of data warehousing with special emphasis on architecture and design.

    UNIT I INTRODUCTION

    Relation To Statistics, Databases Data Mining Functionalities Steps In Data Mining Process

    Architecture Of A Typical Data Mining Systems Classification Of Data Mining Systems Overview

    Of Data Mining Techniques.

    UNIT II DATA PREPROCESSING AND ASSOCIATION RULES

    Data Preprocessing Data Cleaning, Integration, Transformation, Reduction, Discretization Concept

    Hierarchies Concept Description Data Generalization And Summarization Based Characterization

    Mining Association Rules In Large Databases.

    UNIT III PREDICTIVE MODELING

    Classification And Prediction Issues Regarding Classification And Prediction Classification By

    Decision Tree Induction Bayesian Classification Other Classification Methods Prediction Clusters

    Analysis Types Of Data In Cluster Analysis Categorization Of Major Clustering Methods Partitioning

    Methods Hierarchical Methods

    UNIT IV DATA WAREHOUSING

    Data Warehousing Components Multi Dimensional Data Model Data Warehouse Architecture

    Data Warehouse Implementation Mapping The Data Warehouse To Multiprocessor Architecture

    OLAP. Need Categorization Of OLAP Tools.

    UNIT V APPLICATIONS

    Applications of Data Mining Social Impacts Of Data Mining Tools An Introduction To DB Miner

    Case Studies Mining WWW Mining Text Database Mining Spatial Databases.

  • TEXT BOOKS:

    S.NO Author(s) Name Title of the book Publisher Year of Publication

    1 Jiawei Han, Micheline Kamber

    Data Mining Concepts and

    Techniques (4th Edition)

    Morgan Kaufmann

    Publishers, New

    York

    2002

    2 Alex Berson, Stephen J. Smith

    Data Warehousing, Data

    Mining,& OLAP (2nd

    Edition)

    Tata McGraw

    Hill, New Delhi.

    2004

    REFERENCE BOOKS:

    S.NO Author(s) Name Title of the book Publisher Year of Publication

    1 Usama M.Fayyad, Gregory Piatetsky

    Shapiro, Padhrai

    Smyth And

    Ramasamy Uthurusamy

    Advances In Knowledge

    Discovery And Data

    Mining(3rd

    Edition)

    The M.I.T Press,

    Calcutta 2004

    2 Ralph Kimball The Data Warehouse Life Cycle Toolkit (2

    nd Edition)

    John Wiley & Sons

    Inc, New York 2004

    3 Sean Kelly Data Warehousing In Action (4

    th Edition)

    John Wiley & Sons

    Inc., New York.

    2004

  • 12MEISE15 PERFORMANCE EVALUATION OF COMPUTER SYSTEMS

    AND

    NETWORKS

    INTENDED OUTCOMES:

    To understand the performance Evaluation Techniques

    To study the fundamentals ofprobability and Queuing theory used for evaluating the systems performance

    To study the algorithm used in analysis of network performance.

    UNIT I INTRODUCTION

    Need for performance evaluation Role of performance evaluation performance evaluation Methods

    Performance Metrics and Evaluation Criteria CPU and I/O Architectures Distributed and Network

    Architectures Secondary Storage Topologies Computer Architecture Fundamental Concepts and

    Performance Measures.

    UNIT II PROBABILITY AND STOCHASTIC PROCESSES

    Scheduling Algorithms Workloads Random Variables Probability Distributions Densities

    Expectation Stochastic Processes Poisson Process Birth Death Process Markov Process.

    UNIT III QUEUING THEORY

    Queuing Systems Networks of Queues Estimating Parameters and Distributions Computational

    Methods Simulation Process Time Control Systems and Modeling.

    UNIT IV PETRI NETS AND SYSTEM PERFORMANCE

    Petri Nets Classical Petri Nets Timed Petri Nets Priority based Petri Nets Colored Petri Nets

    Generalized Petri Nets Tool Selection Validation of Results Performance Metrics Evaluation

    Multiple Server Computer System Analysis.

    UNIT V ANALYSIS

    OS Components System Architecture Workloads Design Simulation Analysis Database

    System Performance Computer Networks Components Simulation Modelling of LAN.

  • TEXT BOOKS:

    S.NO Author(s) Name Title of the book Publisher Year of Publication

    1 Paul J. Fortier, Howard E. Michael

    Computer Systems

    Performance Evaluation

    and Prediction (4th Edition)

    Elsvier Science,

    USA.

    2003

    2 Thomas G. Robertazzi

    Computer Networks and

    Systems Queing theory and Performance Evaluation

    (3rd Edition)

    Springer, New

    York. 2003

    REFERENCE BOOKS:

    S.NO Author(s) Name Title of the book Publisher Year of Publication

    1 Domenico Ferrari, Giuseppe Serazzi,

    Alexandro Zeijher

    Measurement & Tuning of

    Computer Systems Prentice Hall Inc,

    New Delhi.

    2004

    2 Michael F.Mories and Paul F.Roth

    Tools and techniques,

    Computer Performance Evaluation (4

    th Edition)

    Van Nostrand, New

    York.

    2000

  • 12MEISE16 AGENT BASED INTELLIGENT SYSTEMS

    INTENDED OUTCOMES:

    Artificial Intelligence aims at developing computer applications, which encompasses perception, reasoning and learning and to provide an in-depth

    understanding of major techniques used to simulate intelligence.

    To provide a strong foundation of fundamental concepts in Artificial Intelligence

    To provide a basic exposition to the goals and methods of Artificial Intelligence

    To enable the student to apply these techniques in applications which involve perception, reasoning and learning.

    UNIT I INTRODUCTION

    Definitions Foundations History Intelligent Agents Problem Solving Searching Heuristics

    Constraint Satisfaction Problems Game playing.

    UNIT II KNOWLEDGE REPRESENTATION AND REASONING

    Logical Agents First order logic First Order Inference Unification Chaining Resolution

    Strategies Knowledge Representation Objects Actions Events

    UNIT III PLANNING AGENTS

    Planning Problem State Space Search Partial Order Planning Graphs Nondeterministic Domains

    Conditional Planning Continuous Planning MultiAgent Planning.

    UNIT IV AGENTS AND UNCERTAINITY

    Acting under uncertainty Probability Notation Bayes Rule and use Bayesian Networks Other

    Approaches Time and Uncertainty Temporal Models Utility Theory Decision Network

    Complex Decisions.

    UNIT V HIGHER LEVEL AGENTS

    Knowledge in Learning Relevance Information Statistical Learning Methods Reinforcement

    Learning Communication Formal Grammar Augmented Grammars Future of AI.

  • TEXT BOOKS:

    S.NO Author(s) Name Title of the book Publisher Year of Publication

    1 Stuart Russell and Peter Norvig

    Artificial Intelligence A

    Modern Approach (2nd

    Edition)

    Prentice Hall, New

    Delhi 2002

    2 Michael Wooldridge An Introduction to Multi Agent System (4

    th Edition)

    John Wiley, New

    York 2002

    REFERENCE BOOKS:

    S.NO Author(s) Name Title of the book Publisher Year of Publication

    1 Patrick Henry Winston

    Artificial Intelligence (3rd

    Edition) AW, New York 2002

    2 Nils.J.Nilsson Principles of Artificial Intelligence (2

    nd Edition)

    Narosa Publishing

    House, New Delhi 2000

  • 12MEISE17 VISUALIZATION TECHNIQUES

    INTENDED OUTCOMES:

    To understand the basic visualization techniques

    To study the basic principles of 2D and 3D Graphics

    To study the fundamental concepts of virtual realization systems design

    UNIT I INTRODUCTION

    Introduction to Visualisation Principles of 2D & 3D Computer Graphics Models and Simulation

    strategies.

    UNIT II POPULAR TECHNIQUES

    Surface Plots City scopes Fish eye views Benediktine Space Perspective walls Cone trees and

    Cam trees Sphere Visualisation Rooms Emotical icons.

    UNIT III ADVANCED TECHNIQUES

    Self Organising graphs Spatial Data arrangements Benediktine Cyberspace Statistical Clustering

    and Proximity measures Hyper Structures Human Centered Approaches Information Cube.

    UNIT IV VISUALIZATION SYSTEMS

    Database Visualisation Populated Information Terrains Legibility enhancement Hyper structure

    Visualisation Information Visualisation.

    UNIT V SOFTWARE VISUALIZATION

    Rapid Prototyping Models for user interaction Formal Specification of Software DFD Software

    Architecture.

  • TEXT BOOKS:

    S.NO Author(s) Name Title of the book Publisher Year of Publication

    1 Chaomei Chan Information Visualisation and Virtual Environment

    (2nd

    Edition)

    Springer Verlag,

    New York 2002

    REFERENCE BOOKS:

    S.NO Author(s) Name Title of the book Publisher Year of Publication

    1 Benedikt.M Cyberspace First Steps (3rd Edition)

    MIT Press, New

    Delhi 2004

    2 Pauline Wills Visualisation A Beginner's Guide (5

    th Edition)

    Hodder &

    Stoughton, New

    Delhi.

    2002

    3 Sheryl A Sorby exal 3D Visualisation for Engineering Graphics (3

    rd

    Edition)

    Prentice Hall, New

    Delhi 2002

  • 12MEISE18 ADVANCED DATABASES

    INTENDED OUTCOMES:

    Advanced database aims at developing computer application with different kinds of data models. It is also deals with the Transaction management of these

    different databases.

    To study the needs of different databases.

    To understand about different data models that can be used for these databases.

    To make the students to get familiarized with transaction management of the database

    To develop in-depth knowledge about web and intelligent database.

    .

    UNIT I DATABASE MANAGEMENT

    Relational Data Model SQL Database Design Entity Relationship Model Relational

    Normalization Embedded SQL Dynamic SQL JDBC ODBC.

    UNIT II ADVANCED DATABASES

    Object Databases Conceptual Object Data Model XML and Web Data XML Schema Distributed

    Data bases OLAP and Data Mining ROLAP and MOLAP

    UNIT III QUERY AND TRANSACTION PROCESSING

    Query Processing Basics Heuristic Optimization Cost, Size Estimation Models of Transactions

    Architecture Transaction Processing in a Centralized and Distributed System TP Monitor.

    UNIT IV IMPLEMENTING AND ISOLATION

    Schedules Concurrency Control Objects and Semantic Commutativity Locking Crash, Abort and

    Media Failure Recovery Atomic Termination Distributed Deadlock Global Serialization

    Replicated Databases Distributed Transactions in Real World.

    UNIT V DATABASE DESIGN ISSUES

    Security Encryption Digital Signatures Authorization Authenticated RPC Integrity

    Consistency Database Tuning Optimization and Research Issues.

  • TEXT BOOKS:

    S.NO Author(s) Name Title of the book Publisher Year of Publication

    1 Elmasri R. and S.B. Navathe

    Fundamentals of Database

    Systems (3rd Edition) Addison Wesley,

    New York 2004

    2 Abraham Silberschatz, Henry.

    F. Korth,

    S.Sudharsan

    Database System Concepts (4thEdition)

    Tata McGraw Hill,

    New Delhi.

    2004

    REFERENCE BOOKS:

    S.NO Author(s) Name Title of the book Publisher Year of Publication

    1 Philip M. Lewis, Arthur Bernstein,

    Michael Kifer

    Databases and Transaction Processing An Application

    Oriented Approach(2nd

    Edition)

    Addison Wesley,

    New York 2002

    2 Raghu Ramakrishnan & Johannes Gehrke

    Database Management

    Systems (3rd Edition)

    TMH, New Delhi 2003

  • 12MEISE19 SOFTWARE PROJECT MANAGEMENT

    INTENDED OUTCOMES:

    To build knowledge on software project management

    To provide a strong foundation on concept of software process.

    To understand the software management disciplines.

    UNIT I INTRODUCTION

    Conventional Software Management Evolution of Software Economics Improving Software

    Economics Conventional versus Modern Software Project Management

    UNIT II SOFTWARE MANAGEMENT PROCESS FRAMEWORK

    Lifecycle Phases Artifacts of the Process Model Based Software Architectures Workflows of the

    Process Checkpoints of the Process

    UNIT III SOFTWARE MANAGEMENT DISCIPLINES

    Iterative Process Planning Organisation and Responsibilities Process Automation Process Control

    and Process Instrumentation Tailoring the Process

    UNIT IV MANAGED AND OPTIMIZED PROCESS

    Data Gathering and Analysis Principles of Data Gathering, Data Gathering Process, Software Measures,

    Data Analysis Managing Software Quality Defect Prevention

    UNIT V CASE STUDIES

    COCOMO Cost Estimation Model Change Metrics CCPDS R

  • TEXT BOOKS:

    S.NO Author(s) Name Title of the book Publisher Year of Publication

    1 Walker Royce Software Project Management A Unified

    Framework (5th Edition)

    Pearson Education,

    Asia. 2004

    2 Bob Hughes, Mikecotterell

    Software Project

    Management (3rd Edition) Tata McGraw Hill, New

    Delhi.

    2004

    REFERENCE BOOKS:

    S.NO Author(s) Name Title of the book Publisher Year of Publication

    1 Humphrey, Watts Managing the software process (3

    rd Edition)

    Addison Wesley,

    New York 2001

    2 Ramesh Gopalaswamy

    Managing Global Projects

    (3rd

    Edition) Tata McGraw Hill,

    New Delhi 2001

  • 12MEISE20 COMPONENT BASED TECHNOLOGY

    INTENDED OUTCOMES:

    To introduce different software components and their application.

    Introduces in depth JAVA, Corba and .Net Components

    Deals with Fundamental properties of components, technology and architecture and middleware.

    Component Frameworks and Development are covered in depth.

    UNIT I INTRODUCTION

    Software Components objects fundamental properties of Component technology modules

    interfaces callbacks directory services component architecture components and middleware.

    UNIT II JAVA COMPONENT TECHNOLOGIES

    Threads Java Beans Events and connections properties introspection JAR files reflection

    object serialization Enterprise Java Beans Distributed Object models RMI and RMI IIOP.

    UNIT III CORBA TECHNOLOGIES

    Java and CORBA Interface Definition language Object Request Broker system object model

    portable object adapter CORBA services CORBA component model containers Application server

    model driven architecture.

    UNIT IV COM AND .NET TECHNOLOGIES

    COM Distributed COM object reuse interfaces and versioning dispatch interfaces connectable

    objects OLE containers and servers Active X controls .NET components assemblies appdomains

    contexts reflection remoting.

    UNIT V COMPONENT FRAMEWORKS AND DEVELOPMENT

    Connectors contexts EJB containers CLR contexts and channels Black Box component framework

    directory objects cross development environment component oriented programming

    Component design and implementation tools testing tools assembly tools.

  • TEXT BOOKS:

    S.NO Author(s) Name Title of the book Publisher Year of Publication

    1 Clemens Szyperski Component Software Beyond Object Oriented

    Programming (2nd Edition)

    Addison Wesley,

    New York 2002

    REFERENCE BOOKS:

    S.NO Author(s) Name Title of the book Publisher Year of Publication

    1 Ed Roman Enterprise Java Beans (3rd Edition)

    Wiley, New York. 2004

    2 Andreas Vogel, Keith Duddy

    Java Programming with

    CORBA (3rd

    Edition) John Wiley &

    Sons, New York 2001

    3 Corry, Mayfield, Cadman

    COM/DCOM Primer Plus (1st Edition)

    Tec media, New

    Delhi 2004

  • 12MEISE021 QUANTUM COMPUTING

    INTENDED OUTCOMES:

    To understand the fundamental principles of quantum computing.

    To understand the building blocks of a quantum computer.

    To understand the principles, quantum information and limitation of quantum operations formalizing.

    UNIT -I FUNDAMENTAL CONCEPTS

    Global Perspectives, Quantum Bits, Quantum Computation, Quantum Algorithms, Quantum Information,

    Postulates of Quantum Mechanisms.

    UNIT- II QUANTUM COMPUTATION

    Quantum Circuits Quantum algorithms, Single Orbit operations, Control Operations, Measurement,

    Universal Quantum Gates, Simulation of Quantum Systems, Quantum Fourier transform, Phase

    estimation, Applications, Quantum search algorithms Quantum counting Speeding up the solution of

    NP complete problems Quantum Search for an unstructured database.

    UNIT- III QUANTUM COMPUTERS

    Guiding Principles, Conditions for Quantum Computation, Harmonic Oscillator Quantum Computer,

    Optical Photon Quantum Computer Optical cavity Quantum electrodynamics, Ion traps, Nuclear

    Magnetic resonance.

    UNIT- IV QUANTUM INFORMATIONS

    Quantum noise and Quantum Operations Classical Noise and Markov Processes, Quantum Operations,

    Examples of Quantum noise and Quantum Operations Applications of Quantum operations, Limitations

    of the Quantum operations formalism, Distance Measures for Quantum information.

    UNIT- V QUANTUM ERROR CORRECTION

    Introduction, Shor code, Theory of Quantum Error Correction, Constructing Quantum Codes, Stabilizer

    codes, Fault Tolerant Quantum Computation, Entropy and information Shannon Entropy, Basic

    properties of Entropy, Von Neumann, Strong Sub Additivity, Data Compression, Entanglement as a

    physical resource.

    REFERENCE BOOKS:

    S.NO Author(s) Name Title of the book Publisher Year of Publication

    1 Dan C. Marinescu,

    Gabriela M.

    Marinescu

    Approaching Quantum

    Computing 2005

    2 Micheal A. Nielsen. & Issac L. Chiang

    Quantum Computation and

    Quantum Information Cambridge

    University Press

    2002

  • 12MEISE22 ENTERPRISE JAVA (J2EE)

    INTENDED OUTCOMES:

    To provide fundamental ideas on Java required to implement Real Time Application

    To enable the students to understand the concepts in Enterprise Java

    By building sample applications, the student will get experience and be ready for large-scale projects

    UNIT I INTRODUCTION

    J2EE and J2SE The Birth of J2EE Databases The Maturing of Java Ja