Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
[as approved in the 11th Meeting of the Academic Council held on 25.3.06]
The programmes typically may also include mini projects / seminars / assignments / practical / industryorientation/communication skill classes, etc. The focus during the program is to: Impart Scientific, Engineering and Managerial Skills for becoming a Software Professional Deal with recommended Knowledge Areas in Software Engineering. Develop Software Systems Design Competency and Problem Solving Skills Apply Software Engineering Methodologies in industry and real-life application scenarios ii. Programme Specific Electives A candidate may be permitted by Dean of the School to choose the Programme Specific Electives Courses to specialize in a particular knowledge area. A candidate in his/her the third of year of study may be permitted by Dean of the School to choose B.Tech. (CSE)/B.Tech. (IT) Programme Specific Elective Courses. Similarly, a candidate in his/her the fourth and fifth years of study may be permitted by Dean of the School to choose M.Tech. (CSE)/M.Tech. (IT) Programme Specific Elective Courses iii. University Elective Courses and Cafeteria Courses A candidate may be permitted by the Dean of the School to choose the University Elective Courses and Cafeteria Courses during the period of study. A candidate in his/her the third of year of study may be permitted by Dean of the School to choose B.Tech. Elective Courses. Similarly, a candidate in his/her the fourth and fifth years of study may be permitted by Dean of the School to choose M.Tech. Elective Courses iv. Project work/Thesis Project work shall be carried out during VII & X Semesters (2 full-time projects) under the supervision of a faculty member in the School. A candidate may however be permitted to work on the project in the reputed industry and R&D organizations on the recommendation and approval of the Dean of School. In such cases, there will be an external supervisor, who usually will be the engineer from the industry and R&D organizations where the project work is proposed to be carried out. The project in VII semester will be a team-based project preferably in the industry or real-life application scenarios. The project in X semester will be an individual project focusing on high-end research topics typically to be carried out at VIT University or in any reputed research centers of the industry and academia. 4. Eligibility for the Degree: A candidate shall be eligible for the award of M.S. (Software Engineering) degree if the candidate has earned a minimum number of 220 credits. 5. Semester Pattern: An academic year will have two Semesters. Normally the FALL Semester will be from June to November and the WINTER Semester from December to April, with sixteen weeks of class work in each semester. Courses can be offered during summer term, Course to the availability of faculty members and other resources. 6. Attendance Requirements: A candidate will be permitted to appear for the University Semester final examination in any Semester only if; (i) (ii) The candidate has attended at least 75% of the classes in each of the courses registered by him / her. The candidates conduct and academic progress are satisfactory.
Attendance of 75% is compulsory to appear for examination. Total of Sick / Medical Leave and other leaves for paper presentation & cultural activities should not exceed 25%. Students with less than 75% attendance shall not be permitted to write the examination. 7. Scheme of Assessment (Evaluation & Examination) The following are the rules and regulations related to evaluation and examinations.
2
Learning Assessment of the Students at VIT has basically two components. a. Continuous Assessment Tests (CAT) for 50 marks. b. Term End (TEE) Examination for 50 marks Continuous Assessment Tests for Theory Course: The CAT Examinations are conducted twice in a semester as per the notification in the academic calendar. Each exam will be conducted for 90 minutes with maximum marks of 50. However the marks scored by students are reduced to a maximum of fifteen. CAT I
15 Marks 15 Marks 20 Marks (Number/Type of assignments and distribution of marks may be decided by the faculty member concerned) 50 marks
Term End Examination for Theory Courses There will be a term end examination at the end of each semester for three hours for each course for a maximum mark of 100. The detailed dates of exam will be announced by the Controller of Examination (COE), six weeks before hand. These marks will be reduced to fifty. Evaluation for Laboratory Courses For the laboratory courses, the distributions of marks may be decide the faculty members concerned in the CAT examinations and by the examiners in case of the Term End Examinations: The final laboratory exam will be for a minimum of 3 hours. Pass Criteria for Courses A candidate is declared to have passed in a course (theory / practical), if he / she has secured a minimum of 20 marks out of 50 in TEE and a total of 50 marks (Sum of CAT + TEE) out of 100 marks. There is no minimum mark requirement in CAT for a pass in a course. . 8. Procedure in case of Failure If a candidate fails to obtain the minimum grade in a particular course (theory/lab), the candidate is required to reappear for the course in the supplementary examination which will be conducted few days after the declaration of results. If he/she fails to get minimum grade in the supplementary examination for the course, the candidate is required to re-register for the course in the subsequent semesters as and when it is offered. If the candidate fails to get minimum grade in the supplementary exam of the elective course and if he/she desires can drop the course and choose any other elective course with the approval of Dean of the School. Normally the supplementary examination is conducted only for the failed candidates. The fact that the student has taken the supplementary examination will be reflected in the mark sheet by a mark * against the Course. Under extraordinary circumstances, if a student is not able to appear for the regular examinations due to hospitalization or death in the family, he / she will be allowed to write supplementary exams if he / she has obtained prior permission from Dean of the School and COE, applying in the prescribed format before the commencement of regular exam. For such candidates, it will be treated as first attempt. Supplementary Examinations The university will conduct supplementary examination within 10 days from the date of declaration of results. Such of those failed candidates who wish to take up supplementary exams need to register for the same by paying prescribed examination fees.
3
9. Perusal / Revaluation of Evaluated Answer Scripts: CAT Exam answer scripts will be handed over to students by the respective faculty members after valuation. Any discrepancy will be corrected then and there. If any one wants to improve the CAT marks, it can be done only by re-registering for the course. After the results are published, students desirous of seeing their TEE answer scripts have to apply for the same within a week from the date of publication of results by paying the prescribed fee. Similarly for revaluation of answer scripts, they have to apply with prescribed fees within a week from the date of publication of results. There is no provision for revaluation in Labs / Practical exams and Project Works examinations. 10. Grading System Based on the performance, each student will be awarded finally a letter grade at the end of the semester for each course. The letter grades and the corresponding grade points are as follows: Letter Grade S A B C D E F (Fail) AAA (Absent) Grade Point 10 9 8 7 6 5 Zero --
11. Relative Grading The letter grade assigned to a student in a course is based on Relative Grading system applicable in the university from time to time. 12. Calculation of Grade Point Average The credits earned from the I Semester onwards will be accounted for calculation of CGPA. The Grade Point Average (GPA) for each semester and Cumulative Grade Point Average (CGPA) for all the semesters are calculated as follows: For each course passed, the grade point is multiplied by the credit for that Course. The total of all such credit earned is calculated. This grand total is divided by the credits earned (passed). The result thus calculated is the semester Grade Point Average. Similarly Cumulative Grade Point Average CGPA is calculated for more than one semester or for the programme. i.e.
CGPA =
( C i GP ) iCi
Where Ci is the credit for the course GP is the grade point earned for that course C is the sum of credits of all courses appeared in all semesters including those in which the student has F grade (If it is the case).
i i
13. Registration for Examinations All the students who have registered for a particular course in the prescribed format will be assumed to be taking the examination for that course at the end of the semester, provided he/she is declared not eligible due to 1. Shortage of attendance 2. Acts of indiscipline 3. Withdrawal of course
4
14. Absence in the Term End Examination A candidate who is absent in the Term End Examination of a course / project work, after having registered for the same, without submitting withdrawal form, will be assumed to have got zero in the examination. If the candidate has appeared in CAT examination(s), an F (Fail) grade entry will be made in the grade sheet. If the candidate has been absent in both the CAT and Term End Examinations, a AAA (Absent) entry will be made in the grade sheet. 15. Withdrawal System If a candidate fails to secure good marks in the Continuous Assessment Examinations and if, he/she so desirous, can withdraw from writing the Term End Examination. If a candidate withdraws, entry will not be made in the grade sheet. Withdrawal should be made in the prescribed format at least 10 days before the commencement of the first Term End Examination. But if he/she appears for the Term End Examination and fails, he/she will be given an opportunity to attend the supplementary examination. After writing the supplementary examination, he/she fails to get passing grade, re-registration can be done in the subsequent semesters. 16. Re-Registration Re-registration in subsequent semesters by students who have failed in a course or courses in a semester is permitted. The following is the procedure to be adopted for re-registration by students:1. Re-registration in a course or courses can be done in subsequent semesters for the same course offered by the parent School or for a similar course offered by any other School, Course to the approval of Dean of School. 2. The student will submit a letter to the respective Dean requesting for cancellation of the course (already undergone and failed or withdrawn) and indicating the course for which he/she wants to re-register in the subsequent semester. 3. The re-registration can be done for a course offered in subsequent semester or during Summer Term Courses. 4. Such students are required to apply in the prescribed format and to pay the prescribed Re-registration fees. 5. The student is required to attend the classes in the course for which he / she has re-registered along with other students and after earning the required percentage of attendance can appear for Continuous Assessment Examinations I & II and Term End Examination. 17. Time Limit for Passing The students are required to earn the total number of credits necessary within THREE years after completion of the prescribed period of study. A candidate may be permitted to temporarily break the study for valid reasons such as accident or hospitalization due to prolonged ill health, for a maximum period of one year. In such cases the time limit will be extended by the period of break of study. If any student is debarred / suspended for want of attendance or acts of indiscipline, it shall not be considered as break of study. 18. Award of M.S. (Software Engineering) Degree After successful completion of the M.S. (Software Engineering) Programme and earning the required number of credits, a Provisional Degree Certificate will be issued to the eligible students. The M.S. (Software Engineering) Degree will be awarded during the Convocation. 19. Copying / Malpractice If a student indulges in copying or any malpractice in the CAT Examinations or in the Term End Examinations of the University, he will not be permitted to write any further examinations during the semester and all the examinations written in that semester will deemed to have been cancelled and zero marks will be awarded. The candidate will not be allowed to write the following supplementary examinations too.
-o0o-
Subject Code 05MSE101 05MSE103 05MSE105 05MSE107 05MSE109 05MSE111 05MSE113L 05MSE115L
L 4 4 4 4 4 4 0 0
T 0 0 0 0 0 0 0 0
P 0 0 0 0 0 0 3 3
C 3 4 4 3 3 3 2 2 24
Subject Code 05MSE102 05MSE104 05MSE106 05MSE108 05MSE110 05MSE112 05MSE114L 05MSE116L
II SEMESTER Subject English for Engineers II Differential & Difference Equations Advanced Physics Digital Computer Fundamental Object Oriented Programming Environmental Studies Digital Computer Fundamentals Lab Object Oriented Programming Lab Total
L 4 4 4 4 4 4 0 0
T 0 0 0 0 0 0 0 0
P 0 0 0 0 0 0 0 3
C 3 4 3 3 3 3 2 2 23
Subject Code 05MSE201 05MSE203 05MSE205 05MSE207 05MSE209 05MSE211 05MSE213L 05MSE215L
III SEMESTER Subject Complex Variables and Partial Differential Equations Microprocessor and Assembly Language Programming Data Structures and Algorithms Computer Profession and Society Programming Practices and Coding Standards Management Information Systems Microprocessor and Assembly Language Programming Lab Data Structures and Algorithms Lab Total
L 4 4 4 4 4 4 0 0
T 0 0 0 0 0 0 0 0
P 0 0 0 0 0 0 0 3
C 3 3 3 3 3 3 2 2 22
Subject Code 05MSE202 05MSE204 05MSE206 05MSE208 05MSE210 05MSE212 05MSE214L 05MSE216L
IV SEMESTER Subject Probability Statistics and Reliability Computer Architecture and Organization System Programming Internet Programming Database Management Systems Theory of Computation Internet Programming Lab Database Management Systems Lab Total
L 4 4 4 4 4 4 0 0
T 0 0 0 0 0 0 0 0
P 0 0 0 0 0 0 3 3
C 3 3 3 3 3 3 2 2 22
Subject Code 05MSE301 05MSE303 05MSE305 05MSE307 05MSE309 05MSE311 05MSE313L 05MSE315L
V SEMESTER Subject Discrete Mathematical Structure Software Engineering Operating Systems Computer and Communication Networks Open Source Programming I Management in Engineering Computer and Communication Networks Lab Operating Systems Lab Total
7
L 4 4 4 4 4 4 0 0
T 0 0 0 0 0 0 0 0
P 0 0 0 0 0 0 0 3
C 3 3 3 3 3 3 2 2 22
VI SEMESTER Subject Code 05MSE302 05MSE304 05MSE306 05MSE308 05MSE310 05MSE312L 05MSE314L Subject Graph Theory and its Applications Networking Protocols and Standards Software Architecture and Design Requirements Engineering Compiler Design Elective I CASE Tools Lab - I Compiler Lab Total L 4 4 4 4 4 4 0 0 T 0 0 0 0 0 0 0 0 P 0 0 0 0 0 0 0 3 C 3 3 3 3 3 3 2 2 22
VIII SEMESTER Subject code 05MSE402 05MSE404 05MSE406 05MSE408 Operation Research Software Testing Software Configuration Management Open Source Programming - II Elective II Elective III 05MSE410L 05MSE412L Software Testing Lab Open Source Programming - II Total Subject L 4 4 4 4 4 4 0 T 0 0 0 0 0 0 0 P 0 0 0 0 0 0 3 3 C 3 3 3 3 3 3 2 2 22
IX SEMESTER Subject code 05MSE501 05MSE503 05MSE505 05MSE507 Design Patterns Software Inspection Software Measurements Software Quality and Process Improvement Elective IV Elective V 05MSE509L 05MSE511L CASE Tools Lab - II Software Measurements Lab Total Subject L 4 4 4 4 4 4 0 0 T 0 0 0 0 0 0 0 0 P 0 0 0 0 0 0 3 3 C 3 3 3 3 3 3 2 2 22
Electives
05MSE E0105MSE E0205MSE E0305MSE E0405MSE E0505MSE E0605MSE E0705MSE E0805MSE E0905MSE E1005MSE E1105MSE E1205MSE E1305MSE E1405MSE E1505MSE E1605MSE E1705MSE E1805MSE E1905MSE E2005MSE E2105MSE E2205MSE E2305MSE E2405MSE E25Data Warehousing & Data Mining Natural Language Processing E- Commerce Network Security Distributed Computing Web Services Image Processing Digital Signal Processing Computer Simulation and Modeling Mobile Communication Embedded Systems Neural Networks Multimedia Computing Intelligent Systems Sensor Networks Geographic Information System Software Reengineering Software Agents Decision Support System Enterprise Resource Planning Software Project Management Software Risk Management Clean Room Software Engineering Domain Engineering Principles of User Interface Design
9
NOTE: The syllabus will be same as English for Engineers-I course in the B.Tech.-CSE and B.Tech-IT Programmes
10
NOTE: The syllabus will be same as Multivariable Calculus & Differential EquationsI course in the B.Tech.-CSE and B.TechIT Programmes
11
NOTE: The syllabus will be same as Modern Physics course in the B.Tech.-CSE and B.Tech-IT Programmes
12
13
Aim The subject covers most of the basic devices and their functioning, application and selection of apt devices to achieve a particular circuit function. Objective The students would become aware of the ranges with respect to frequency, temperature, power ratings etc. The operational requirements such as proper heat sink arrangement etc. shall be provided. Semiconductor Basis Review of extrinsic semiconductor drift and diffusion currents thermal generation of minority carriers Hall Effect. Junction Diodes- Energy band diagram PN junction junction diode volt ampere characteristics ratings transition and diffusion capacitance varactor diode avalanche and Zener break down Zener diode tunnel diode PIN diode, clipper and clamper circuits. Transistor Principle of transistor action current components cutoff, active and saturation region input and output characteristics CE, CB, & CC Configurations small signal and large signal beta transistor breakdown ratings Thermal runaway problems Use of Heat sinks. FET And Other Devices Constructional features and characteristics of JFET and MOSFET depletion and enhancement modes VVR operation of FET handling precautions for MOSFET construction and characteristics of UJT, fabrication and characteristics of four layer devices such as SCR, Triac and Diac. Photo Electric Devices Photo emissivity-photo electric theory-Photo diodes Photo voltaic cell LED & LCD Photo multiplier circuit Light absorption and photo devices Photo conductive cell (LDR) Photo transistor PN junction LASER Solar energy converters. Electronic Circuits Half wave and full wave rectifier circuits performance characteristics of rectifier circuits filter consideration capacitor, inductor, L section, RC section filters Voltage regulators current regulators, IC voltage regulators protection circuits for dc power supplies switched mode power supplies. TEXT BOOK: 1. G.K. Mithal, Electronic Devices & Circuits, Khanna Publishers, New Delhi, 2001. REFERENCE BOOKS: 1. Ben.G. Streetman, Solid state electronic devices, Prentice Hall of India, 1999. 2. S.P. Mathur, D.C. Kulshreshtha and P.R. Chanda, Electronic Devices and Applications of Integrated Circuits, 1998. 3. J. Millman, C.C. Halkias, Electronic Devices and Integrated Circuits, McGraw Hill, 1997. Mode of Evaluation: By Assignment, Seminars and Written Examinations.
14
05MSE111- PROGRAMMING IN C
L 4 Aim To understand the basics of C Programming. Objective To know the basic C programming constructs like data types, operators, decision statements, Control statements, functions, arrays and pointers. Fundamentals of C Programming C fundamentals - character set - identifier and key works - data types - constants - variables - declarations expressions - statements - arithmetic, unary, relational and logical, assignment and conditional operators - liberty functions. Primitive structures in C Data input/output functions - simple C programs flow of control - control structures - switch, break and continue go to statements - comma operator Functions Functions - defining, accessing function - function prototypes - passing arguments - recursions - storage classes multi file programs. Arrays and Structures Arrays - defining and processing - passing array to functions - multidimensional arrays - arrays and string structures - passing structures to functions - self referencing structures - unions Pointers Pointers - declarations - passing pointers to function - operation in pointers - pointer and arrays of pointers structures and pointers - files: creating processing, opening and closing - bit wise operations. Text Book: 1. Kamthane - Programming with ANSI and Turbo C, Pearson Education, 2002. Reference Books 1. 2. 3. 4. Narain Gehani C Advanced Introduction Universities Press 2004. Noel Kalicharan C by Example Cambridge university Press-1996. Kamthane - Programming with ANSI and Turbo C 2002. Herberet Schildt The Complete Reference, TMH, 4th Edition, 2000. T P C 3
15
LIST OF EXPERIMENTS: 1. 2. 3. 4. 5. 6. 7. 8. 9. 10. 11. 12. 13. 14. 15. 16. 17. 18. Study of CRO and measurement of amplitude frequency time period and phase angle. Forward and reverse characteristics of PN junction diode. Characteristics of Zener diode and study of its power ratings. Input and output characteristics of BJT (CE CB CC) and graphical determination of h-parameters. Drain and transfer characteristics of JFET and graphical determination of transconductance. Static emitter characteristics of UJT and PUT. V-I characteristics of SCR and TRIAC. Switching characteristics of BJT SCR and MOSFET. V-I characteristics of tunnel diode and varactor diode. Study of Logic Gates (AND OR NAND NOT EXOR gates). Study of Flip flops (D T JK SR flip-flops). Design and testing of Half and Full adders. Design and testing of Half and Full sub tractor. Implementation and testing of 3 bit binary ripple counter. Implementation and. testing of code converters. Implementation and testing of Multiplexers. Implementation of shift registers using flip-flops. Study of decade counter using flip-flops.
16
LIST OF EXPERIMENTS 1. 2. 3. 4. 5. 6. 7. 8. 9. 10. 11. 12. 13. 14. Determining a given number is prime or not. Pascals Triangle. String Manipulation. Matrix Multiplications. Finding Determinant of a Matrix. Finding inverse of a Matrix. Checking for Tautologies and Contradictions. Euclideans Algorithms for finding GCD. Generating Permutations. Computing Combinations. Creating database for telephone numbers and related operations Use file concepts. Creating database for Mailing addresses and related operations Using Structures. Creating database for Web page addresses and related operations using pointers. File Processing.
17
L 4
T -
P -
C 3
NOTE: The syllabus will be same as English for Engineers-II course in the B.Tech.-CSE and B.Tech-IT Programmes
18
NOTE: The syllabus will be same as Differential & Difference Equations course in the B.Tech.-CSE and B.Tech.-IT Programmes .
19
Aim To enable the students to understand the nature of different types of materials namely Dielectrics, Magnetic, Semi conducting, Conducting and Superconducting materials. Objective To enable the students to understand the nature of different types of materials namely Dielectrics, Magnetic, Semi conducting, Conducting and Superconducting materials. Dielectrics Introduction Dielectric parameters various polarization mechanisms in dielectrics and their frequency and temperature dependence Lorentz field Clausius Mosotti relation dielectric loss dielectric strength dielectric break down different types of dielectric breakdown problems. Magnetic Materials Origin of magnetic moment Bohr magnetron properties of dia, para, ferro, antiferro and ferri magnetic materials Ferromagnetism Domain theory of ferromagnetism Hystersis soft and hand magnetic materials Antiferromagnetic materials floppy and magnetic disk drives magnetic memories ferrite core memory and bubble memory Semi conducting Materials Band theory of solids Semiconductors classification intrinsic, extrinsic-n type, p type-direct, indirect band gap - electron hole pair formation and recombination radiative and non radiative band to band recombination structure of Si and Ge Variation of Fermi level with carrier concentration and temperature in n type solar cell Problems. Conducting Materials Conducting Materials Free electron gas Drude Lorentz theory electrical conductivity relaxation time drift velocity thermal conductivity Wiedmann Franz law Matthiessens rule, Hall effect problems. Superconducting materials Zero resistance source of superconductivity properties effect of magnetic field Meissner effect critical current isotope effect type I and II superconductors BCS theory London equations (I&II) Josephson effect (AC & DC) application cryotron SQUIDS problems. Text books: 1. Physics for engineers Department of Physics, VIT 2005. 2. Materials Science and Engineering by V.Raghavan, Prentice Hall, 4th edition 2000. Mode of Evaluation: Written Examination, Assignments, Seminars and Mini projects.
20
Aim The subject aims to impart the knowledge about digital logic fundamentals, design steps involved in flip-flop, shift register, designing a simple computer which is capable of providing few arithmetic and logical operation. Objectives The students shall be able to understand Boolean laws, Boolean algebra, Boolean logic, logic gate fundamentals, function of flip-flop and shift register, arithmetic and Logic unit, understand the memory representation in ROM, RAM and CPU. Number System Number Systems and Boolean Algebra- Number systems converting number from one base to another complements algorithms for rs and r-ls complements sign. Floating point representation of Codes- Binary decimal, error detection reflection alphanumeric codes. Basic laws, theorems and properties of Boolean algebra Boolean functions canonical and standard forms logical operations logic gates Karnough map up to 6 variables SOP and POS simplification dont care condition tabulation method. Combinational Logic Combinational Logic Design-Adder sub tractor code conversion analyzing a combinational circuit multi level NAND and NOR circuits binary parallel adder decimal adder RCD adder Magnitude comparator decoders demultiplexer. Sequential Logic Sequential Logic Design - Flip flops triggering of flip flop analyzing a sequential circuit state reduction excitation tables counters design with state equation. Registers - shift registers ripple and synchronous counters. Processor Organization Processor Organization-Memory unit inter register transfer micro operations bus organization scratch pad memory ALU design of ALU - status register effect of o / p carry design of shifter processor unit design of accumulator. Control Logic Control Logic Design- Control organization PLA control micro program control hardwired control micro program sequencer micro programmed CPU organization. Computer Design Computer Design- Computer configuration instructions and date formats instruction sets timing and control execution of instruction design of computer design of control. TEXT BOOK: 1. Morris M. Mano, "Digital Design", Third Edition, Prentice Hall India, 2001
REFERENCE BOOKS: 1.Thomas C. Bartee, "Computer Architecture Logic Design", Tata McGraw Hill 1997. 2.A. P. Malvino and D. P. Leach, Digital Principles and Applications, 4th edition, McGraw Hill 1999. Mode of Evaluation: By Assignment, Seminars and Written Examinations
21
22
23
Design a Half adder and a Full adder using NAND gates only. Cascade them to implement a 2 bit binary adder. Design and implement Excess-3 to BCD code converter using logic gates. (Choice the student) Design and implement using NAND gates : 4:1 multiplexer 2:4 decoders Design and implement the following the following using 4-bit adder chip and gates. Excess-3 to BCD code converter BCD to Excess-3 code converter Design and implement a full adder using a multiplexer. Also implement a multiplexer tree using 3 multiplexes. Design and implement using decoder and other gates a. Full adder b. Full subtractor. Design and implement a 3 variable Boolean SOP expression using 2 numbers of 4:1 multiplexer IC. Design and implement a 3 stage asynchronous counter using J-K flip flops to count down from 7 to n (n>0). Display result on discrete LEDs and the waveform on CRO. Design and implement asynchronous counter using a Decade counter IC to count up from 0 to n (n<9). Display count value on 7 segment LED display using BCD to 7 segment code converter IC. Design and implement to display result suitably: a. Asynchronous counter using 4 bit binary counter IC to count up from 0 to n ( n<=15). b. Asynchronous counter to count up to FFH using 2 stages of such an IC. of Logic gates left to
4.
5. 6. 7. 8. 9. 10.
11 Design and implement Mod n (n<8) synchronous counter using flip flops. Display result suitably. 12 Design and implement a 3-stage up/down counter that counts from a preset value using Decade presettable counter ICs. Display result suitably. 13 Design and implement using 4-bit shift register IC: a. Johnson counter b. Ring counter 14 Design and implement the following: a. Oscillator for a given frequency using Schmitt trigger inverter and RC components. b. Crystal controlled clock using CMOS inverters.
24
25
Aim
To understand complex variables and partial differential equation
Objective
After completion the students will have a thorough knowledge in complex variables and partial differential equation. Functions of A Complex Variable Functions of a complex variable, limits and continuity, Cauchy Riemann equations, Analytic and Harmonic functions Complex potential Applications to flow around a corner and around a cylinder, Brach prints, branch cuts, linear transformations. (w = zA+B, w = z2 ,w= ez), Bilinear transformation, concept of conformal transformation Qualitative discussion on applications. Complex Integration Integration in the complex plane along a contour, the Cauchy-Goursat theorem, integral theorem Derivatives of analytic functions, Taylor and Laurent series(without proof's) singularities Zeros Poles, Residues, Cauchys Residue theorem Evaluation of integrals by the method of residues , Jordans lemma (without proof), Indented contour integral, Inversion contours for Laplace, Fourier and Z transforms. Partial Differential Equations Introduction Formation of PDEs Solution of PDE General, Particular and Complete integrals Lagranges Linear Equations Linear PDE of Higher order with Constant Coefficients Homogeneous and non homogeneous equation Solution of PDEs by the method of separation of variables. Applications of Partial Differential Equations Solution of Laplaces equations in Cartesian, Cylindrical and Spherical coordinates variable separable method: Potential flow over a sphere. Wave Equation-Vibrations of a Stretched string-Variable Separable Method- D Alembert s solution for the initial value problem, Vibrations of a circular membrane Diffusion equation in Cartesian and Cylindrical coordinates. Integral Transforms Difference Equations and Z-transforms: Difference Equations with constant coefficients -Complementary function, particular integral method of undetermined co-efficient, variation of parameters technique (without proof), application to ladder type electrical network. Z-transform definition relation between Z transform and Laplace transform, Z-transform of elementary functions, properties of Z-transforms (proofs not required) Initial and final value theorems- Inverse Ztransforms partial fraction expansion method, Inversion contour method-solution of difference equations by Ztransform method. Exponential Fourier series Fourier Integral Transforms Definition Fourier Integral Fourier sine and cosine transforms; - Properties of Fourier transforms Convolution theorem for Fourier transforms Parsevals identity for Fourier transforms (proof not required) -Application of Integral Transforms to Partial differential equations: (i) Heat flow in an infinite bar (ii) Wave propagation on a semi infinite string (iii) Steady state heat flow in a semiinfinite domain.
Text Books: 1. Erwin Kreyzsizig, Advanced Engineering Mathematics, 8th Edition, John Wilag & Sons (Wiley student Edison) (2004). 2. B. S. Grewal, Higher Engineering Mathematics, 38th Edition, Khanna Publications (2005). Reference Books: 1. J. W. Brown and R.V. Churchill, Complex variables and application, Mc Graw Hill International ed., 7th Edition (2004). 2. R. V. Churchill and J. W. Brown, Fourier series and Boundary value problems, International student edition (1978) . 3. Ian Sneddon, Elements of Partial Differentail equations, MC Graw Hill International edition (1985). 4. MichaelD. Greenberg, Advanced Engineering Mathematics, 2nd Edition, PearsonEducation (2002). Mode of Evaluation: By Assignment, Seminars and Written Examinations.
26
27
Aim This subject aims to impart knowledge about various types of data structures (standard and user defined) It covers algorithm analysis for the run time complexities and the space requirements. Objective To make the Students learn various types data structures algorithm analysis. The students would be able to implement various data structures and apply operations on them and also implement various sorting and searching techniques. Introduction Algorithm Analysis-Mathematical background model running time calculations complexity analysis abstract data types asymptotic notations. Stacks & Queues Stacks & Queues- Stack ADT stack model implementation of stacks applications of stacks infix, prefix and postfix expressions and their conversions, Queue ADT queue model array implementation of queues, List ADT simple array implementation of lists linked lists doubly & circular linked lists cursor implementation of linked lists polynomial addition and multiplication, Overview of Garbage collection & Compaction Trees Trees-Preliminaries implementations of trees tree traversals (inorder, preorder, postorder) binary trees implementation expression trees binary search trees threaded binary trees B trees B+-trees hashing hash function, depth first search & breadth first search shortest path algorithm. Sorting Insertion sort and its analysis, Shell sort, Heap sort and its analysis, merge sort and its analysis, quick sort and its analysis, bucket sort, selection sort, external sort. Algorithms Algorithm Design Techniques- Divide & Conquer Algorithm Strassens matrix multiplication and its analysis, Greedy Method- knapsack 01, Dynamic Programming- traveling salesman problem, Back Tracking- 8 queens problem, Branch and Bound- travelling salesperson problem algebraic manipulations, Lower Bound TheoryBasic concepts of NP-hard and NP-complete. TEXT BOOK: 1. Mark Allen Weiss, Data Structures & Algorithm Analysis in C++, Addison Wesley , 2004. REFERENCE BOOKS: 1. E. Horowitz, S. Sahni and S. Rajesekar, Computer Algorithms, Galgotia-1999. 2. Jean-Paul Tremblay and Paul. G. Sorenson, An Introduction to Data Structures with Applications, Tata McGraw Hill, 1991. Mode of Evaluation: By Assignment, Seminars and Written Examinations.
28
Deborah.G.Johnson, - Computer Ethics - Prentice Hall - 2nd Edition - 2002 Ernest A Kallman, John.P. Grillo - Ethical Decision making and Information Technology McGraw Hill - 2nd Edition - 1996. 3 Ronald B.Adler - Jeanne Marguardt Elmhorst - Communicating a work MCGraw Hill, 6th Edition - 1999. Reference Books 1. Deborah.G.Johnson, Helen Nissenbaum (eds) - Computers, Ethics, and Social Values - Prentice Hall - 1995. 2. Jonathan Price, Kenry Korman.- How to communicate Technical Information Addison- Wesley - 1993.
29
T -
P -
C 3
30
Aim The subject aims to introduce Role & Impact of MIS, Decision making, Enterprise management systems. Objectives The Students shall be able to understand role and impact of MIS, various steps in management, Organization structure and theory, Development of Business Strategies, Decision making concepts, methods of data collection, applications of MIS in Manufacturing, basic features Enterprise Management Systems and Role of MIS in Data Warehouse, Artificial Intelligence and Expert systems. Introduction Role & impact of MIS, Approaches to Management - Management as Control System - Management by Exception - Process of Management - Management Effectiveness - Planning- Organizing - Staffing - Coordinating and Directing - Controlling - MIS: A Tool for Management Process. Organization Structure and Theory - Basic Model of Organization Structure - Modifications to the Basic Model of Organization Structure - Organizational Behaviour - Organization as a System - MIS: Organization. Strategic Management of Business Corporate Planning Concepts Strategic Planning - Development of Business Strategies - Types of Strategies, Tools of Planning Decision Making Decision Making - Methods, Tools & Procedures - Organizational Decision Making - MIS & Decision Making Concepts - Information as a Quality Product - Classification of Information - Methods of Data Collection - Value of Information - System Concepts - Systems Control - Types of System - Post Implementation Problems, MIS Development- Determining Information Requirement - MIS Development & Implementation Application IT Strategic Decision - Design - Evaluation - Implementation Plan - Choice of IT and MIS, Applications of MIS in Manufacturing- Applications in Service Sector, Decision Support Systems, Deterministic Systems - Artificial Intelligence, Knowledge Based Expert System, MIS and the Role of DSS Enterprise Management System Enterprise Management Systems- Basic Features & Benefits, Selection and Implementation of ERP- Technology in MIS, Data Processing - Transaction Processing Application Processing - Information System Processing - TQM of Information Systems - User Interface - Real Time Systems & Design - Programming Languages - Case Tools, Business Process Re-engineering - Process Model of the Organization Data Warehouse Data Warehouse: Architecture to Implementation - Electronic Business Technology - Models of E-Business Intranet/Extranet - Internet - World Wide Web - Electronic Payment Systems - Security in E-Business - MIS and E-Business. Web: A Tool for Business Management - Internet and Web and Process of Management - Strategic Management under Web - Web Enabled Business Management - Application System Architecture in Web - MIS in Web Environment TEXT BOOK: 1. W.S. Jawadekar, "Management Information System", Tata McGraw Hill, 2nd Ed., 2002 REFERENCE BOOK: 1. James A.OBrien, Management Information Systems, Tata McGraw Hill, 2004. Mode of Evaluation: By Assignment, Seminars and Written Examinations.
31
Instructions to the students Unless the problem explicitly states otherwise you can assume that the input data/output data will be in memory location and can be examined using a suitable debugging utility (DEBUG, CodeView, TURBO DEBUG etc., ) and that the program itself is executed under the control of such a debugging utility. The board layout and the circuit diagram of the interface are to be provided to the student during the examination. The interfaces to be used are: Stepper Motor, Logic Controller, Dual DAC, Display and Keypad. These interfaces are the standard interfaces used with 8085 trainers also. A brief description of these interfaces will be provided separately. 1.a) Develop and execute an Assembly Language program to find the LCM of two 16-bit unsigned integers b) Develop and execute an Assembly Language program to drive a Stepper motor interface to rotate the motor in clockwise direction by N steps. (N specified by the examiner). Introduce suitable delay between successive steps. (The delay is not to be specified by the examiner. The student need not compute the delay. It can be any arbitrary value that just permits the steps of the motor rotation to be counted). 2.a) Develop and execute an Assembly Language program to find the GCD of two 16-bit unsigned integers b) Develop and execute an Assembly Language Program to drive a Stepper motor interface to rotate the motor in anticlockwise direction by N steps. (N is specified by the examiners) . Introduce suitable delay between successive steps, (The delay is not to be specified by the examiner. The student need not compute the delay. It can be any arbitrary value that just permits the steps of the motor rotation to be conducted.) 3.a) Develop and execute an assembly language program to sort a given set of 16-bit unsigned integers into ascending order using insertion sort algorithm. b) Develop and execute an Assembly language program to generate a rectangular pulse train using the DAC interface. (The output of the DAC is to be displayed on a CRO. The on/off times can be any arbitrary values. No need to compute these values. ) 4.a) Develop and execute an assembly language program to sort a given set of 8-bit unsigned integers into ascending order using Bubble sort algorithm b) Develop and execute an assembly language program to generate a triangular wave form using a DAC interface. (The output of the DACis to be displayed on a CRO. The slope can be any arbitrary value. No need to compute this value.) 5.a) Create an assembly language source file containing PUBLIC declarations for 100 bytes of data and PUBLIC code for a procedure READKB to read from keyword using INT 21H (Function code 6) leaving the result in AL.Create a second source file with EXTRN declaration for data and READKB procedure of the first source file and statements to read 10 bytes from keyboard and store the data in the data area declared as EXTRN. Assemble and link the above two files and execute the resulting file. b) Develop and execute an assembly language program to read the status of two inputs from the logic controller interface and to display the output of 2 Boolean expressions of the two inputs, using the same interface. (The two Boolean expressions are to be specified by the examiner.) 6.a) Create an assembly language source file containing two PUBLIC procedures called RDKEY and ECHO. RDKEY reads from keyboard using INT 21H (Function 6) leaving the ASCII code of key read in AL. The ECHO displays the ASCII character in AL on the screen using INT21H (Function 6) Assemble this file and place it in a library file. Develop and execute an assembly language program which uses the RDKEY and ECHO procedures once. b) Develop and execute an assembly language program to read the status of eight inputs from the logic controller interface, to complement those values and to display these complemented values using the same interface. 7.a) Develop and execute an assembly language program with the following features: It has a macro with one parameter called LOC. The macro reads the keyboard using INT21H (Function 6) and places the ASCII code of the key read in LOC. The macro defined above is used twice to read the keyboard twice and store the ASCII codes in two consecutive memory locations. b) Develop and execute an assembly language program to read the status of eight inputs from the logic controller interface, display FF if any input is high and display 00 otherwise. 8.a) Using conditional assembly, develop and execute an Assembly language program with the following features: It uses one input value, an unsigned 16-bit integer called x.
32
b)
9.a) b) 10. a)
b)
14.a) b) 15.a)
If Eqn 1 is true, it assembles code which computes 3*x*x*x+4*x+5 and places the32 bit result in a double-word memory location. (Assume overflow will not occur); Otherwise, it assembles code which computes 7*x+8 and places the 32-bit result in a double-word memory location. Develop and execute an assembly language program to perform the following: Read the status of 3 inputs from the logic controller interface. Assuming that these three inputs represent a binary number x (0<=x<=7), display 2* x using the same interface. Develop and execute an assembly language program that implements Binary search algorithm. Assume that the data consists of sorted 16-bit unsigned integers. The search key is also a 16-bit unsigned integer. Develop and execute an assembly language program to scan a 4 x 4 keypad for key closure and to store the code of the key pressed in a memory location. Develop& execute an assembly language program to perform the following: Assuming a look up a table of 16 entries, each of which is 8-bit wide, & a 4-bit key value, look up the table to find the conversion value. Set up the table to permit BCD to 7-segment code conversion. Develop and execute an assembly language program to drive the Elevator interface in the following way: Assume that initially the elevator is at ground floor and all service requests are cleared. The elevator stays in the ground floor as long as there is no service request. When a service request is detected, the elevator moves to that floor. While it is traveling to that floor, if a service request is detected for any intermediate floor, it is also serviced (the floor request LED is turned off). After servicing the floor for which the request was first registered, the elevator returns to ground floor ignoring all further requests. The delays to simulate the elevator motion, the delay indicating the servicing of a request can be any arbitrary values. Examiner doesnt specify these values, nor is the student required to calculate them. Develop and execute an assembly language program to read a 4-digit hexadecimal number from the keyboard and store the corresponding 16-bit binary value in a word location. Develop and execute an assembly language program to display a 4 digit BCD number on the display interface. Develop and execute an Assembly language program to compute the factorial of a positive integer n using recursive procedure. The 16-bit binary result can be left in a memory word location. (Use a value for n which will ensure that n! can be stored as a 16- bit unsigned integer.) Develop and execute an assembly language program to scan a 4x4 keypad interface for key closure. The row number and column number of the key pressed are to be stored in memory locations. Develop and execute an assembly language program to compute nCr using recursive procedure. Assume n & r to be non-negative integers and leave the binary result in a memory word location. (Use values for n and r which will ensure that the can be stored as a 16-bit unsigned integer.). (b) Develop and execute an assembly language program to perform the following: Alternately, display two 4 digit messages on the display interface for suitable period of time. Ensure a flashing rate that makes it easy to read both the messages. (Examiner doesnt specify there delay values. Nor is it necessary for the student to compute these values). Develop and execute an assembly language program that determines if a given sub-string is present in a main string of characters. The result (1:present, 0:absent) can be left in a memory location Develop and execute an assembly language program to convert a 16 bit binary value (Assumed to be an unsigned integer) to BCD and to display it on the Display interface. (You can assume that the BCD equivalent will be less than or equal to 9999). Develop and execute an assembly language program to perform the following: Read the current time from the system (INT 21 H, Function 2CH), format it as HH:MM, and display it on the video screen (INT 21H, Function 2).
33
34
Aim To motivate the students to address the challenge of the relevance of Probability and Statistics Theory to Engineering problems. Objective To have an understanding of the Probability concepts, analyze the problems connected with statistics and reliability, to understand how to make the transition from a real problem to a probability model for that problem. Probability & Random Variables Axioms- Conditional Probability- Baye's Theorem- Independent Events-Random Variables-Distribution FunctionDensity Function (PDF)- Random Vector-Joint Distribution- Joint Density- Conditional Distribution and Density Functions- Independent Random Variables- Binomial, Poisson, Normal, Exponential, Gamma, Weilbull distributions. Statistical Parameters Mathematical Expectation- Variance- Moment Generating Function-Characteristic Function-Regression and Correlation- Partial and Multiple correlation. Tests of Statistical Hypothesis Large sample Tests - Procedure of Testing Hypothesis- small sample tests - Students t-distribution - F-test - Chisquare test- theory of estimation. Anova One way and Two way classifications- CRD-RBD-LSD. Statistical Quality Control Control Charts - Control Charts for Measurements - x -chart- R-chart- Control Charts for Attributes- p-chart- npchart- c-chart Reliability Terms related to Reliability- Hazard Models- System Reliability - Reliability Allocation - Maintainability and Availability. Queuing Theory Preliminary Ideas (Markov Chains) - Exponential Distribution- Little's formula - Pure Birth and Death Models. Text Book: 1. R.E.Walpole, R.H.Myers, S.L.Myers and K.Ye, Probability and statistics for Engineers and Scientists, 7th Edition, Pearson Education (2003). Reference Books: 1. Bhat, B.R.. Modern Probability Theory, 3rd ed. New Age International Pvt. Ltd., New Delhi (1999). 2. Freund, JE , Mathematical Statistics, Prentice Hall International (1998). 3. Rohatgi, V.K. and Ebsanes Saleh, A.K. Md., An introduction to Probability and Statistics, 2nd Ed., John Wiley & Sons, Inc., New York (2002). 4. Morris H. DeGroot, Probability and Statistics, 3rd Edition, Addison-Wesley (2002). 5. J.L.Devore, Probability and Statistics, 5th Edition, Thomsun (2000) Mode of Evaluation: By Assignment, Seminars and Written Examinations
35
Aim The subject aims at imparting the knowledge of Computer architecture, the design of computers, including the instruction sets, hardware components, and system organization, Memory Management and Networking. Objectives At the end of the course students should be able to understand basic principles such as locality of reference, coarse-grain parallelism, overlapping communication and computation, performance/power trade-offs, and reliability, also how the computer systems are organized and the characteristics of modern processors that affect system architecture. Introduction Nature of computing, Elements of Computers, Limitations of Computers; - the evolution of computersMechanical Era, Electronic Computers, The Later generation; the VLSI era- Integrated Circuits, Processor Architecture, System Architecture. Design Methodology- System design- System Representation, Design process, The Gate level; the Register level- Register - level components, programmable logic devices, and Register level design; the Processor Level- Processor Level Components, Processor level design. Processor Basisc Processor Basics- CPU organization: Fundamentals; Data Representation: Basic formats, Fixed Point Numbers, Floating point numbers; Instruction Sets: Instruction formats, Instruction Types, Programming Considerations. Arithmetic Data Path Design-Fixed point arithmetic-Addition and Subtraction, Multiplication, Division; Arithmetic Logic Units- Combinational ALUs, Sequential ALUs; Advanced Topics- Floating point Arithmetic, Pipeline Processing Memory Organization Memory Organization-Memory technology: Memory Device Characteristics, Random Access Memories, Serial Access Memories; memory systems: Multilevel memories, Address translations, Memory Allocation; Caches: Main features, address mapping, Structure versus performance. System Organization System Organization- Communication methods: Basic concepts, Bus control; IO And System Control: Programmed IO, DMA and Interrupts, IO processors, Operating Systems; Parallel Processing: Processor Level Parallelism, Multiprocessors, Fault Tolerance. TEXT BOOK: 1. John P. Hayes, Computer Architecture and Organization, 3rd Ed. McGraw Hill., 1998. REFERENCE BOOK: 1. John. L. Hennessy & David A. Patterson, Computer Architecture, 3rd Ed, 2003, Elsevier, India. Mode of Evaluation: By Assignment, Seminars and Written Examinations.
36
Aim The subject aims to introduce operations and functions of Assembler, Linker, Lexical analysis, parsing, Semantic analysis, Optimization and machine code generation. Objectives The student shall be understand the different steps involved in pass I and pass II of Assembler, the structure of compiler and the functions performed in different phases of compiler Assembler Assemblers elements of assembly language programming simple assembly scheme pass structure of assemblers. Design of a two-pass assembler. Relocation and linking concepts. Design of a linker, self-relocating program, linker for MS DOS, linking for overlays, loaders. Compiler Structure of compilers, lexical analysis, syntax analysis, immediate code generation, optimization code generation, book keeping, and error handling compiler writing tools programming languages. Lexical Analyzer Role of lexical analyzer design of lexical analyzer, regular expression, finite automation regular expression to finite automata, minimizing DFA, implementation to lexical analyzer context free grammar, derivations & parse trees capabilities of context free grammar Parser Parsers, shift-reduce parsing, operator precedence parsing, top down parsing, syntax directed translation scheme, implementation of syntax-directed translators, intermediate code, postfix notation, parse trees and syntax trees, three address code, quadruples, triples, translation of assignment statement, Boolean expression, errors, lexical phase errors, semantic-phase errors, semantic errors. Code Optimization Principles, sources of optimization, loop optimization, DAG representation of basic blocks, value numbers and algebraic laws, global data flow analysis, dominators, reducible flow graphs, depth-first search, loop-invariant computations, induction variable elimination, other loop optimization.
TEXT BOOK: 1.D. M. Dhamdhere, System Programming, Tata McGraw Hill, 2nd Edition, 2000. REFERENCE BOOK: 1. A. V. Aho, J.D. Ullman, Principles of Compiler Design, Narosa Publishing, 1996.
37
38
Relational Model The Relational data model Relational constraints Relational algebra Introduction to SQL Introduction PL/SQL Relational database standard ER to relational mapping E.F. Codd rules.
Normalization Functional dependencies Normalization for relational databases up to BCNF Query Optimization and Transaction Processing Query Processing Translating queries into relational algebra Using Heuristics in query optimization Introduction to Transactions Single user and multiuser system transactions Read and write operations DBMS buffers Transactions system concepts Serializability types. Concurrency, Recovery And Security 2PL Types of locks System lock tables deadlocks Timestamp ordering algorithm Recovery concepts ARIES recovery algorithm Introduction to database security issues Discretionary access control based on granting and revoking privileges. Concluding remarks including database design and implementation process.
TEXT BOOK: 1. Ramez Elmasri & B.Navathe: Fundamentals of Database Systems, IV Ed., Addison Wesley, 2005. REFERENCE BOOKS: 1. Raghu Ramakrishnan and Johannes Gehrke: Database Management Systems, III Edition, McGraw Hill. 2. Date C.J: Introduction to Database Systems, Sixth Edition, Addison-Wesley, 1995.
39
Aim The subject aims to introduce of Formal Languages, Automata Theory and Abstract models of Computation and Computability, Computational complexities and NP Completeness. Objectives The students would be able to understand universal Model of Computation in terms of both the current Platforms and the Philosophical ideas about the nature of Computation. They would be able to analyze the problems by determining whether a problem is solvable, efficiently solvable, and simply solvable or it cannot be solved. Introduction An overview of grammars and languages, Regular expressions and Regular languages Finite Automata and its minimization, Construction of NFA and DFA from Regular expressions, Conversion of NFA into DFA Normal Forms Chomsky hierarchy of language, Non determinism and kleenes theorem pumping lemma Decision problems. Normal Forms : Chomskys & Griebachs Normal Forms Automata Push down Automata and context free languages Context free grammars Derivation trees Ambiguity PDA& CFG Context Free and non-Context free languages. Turing Machine Turing machines Church Turing hypothesis Turing machine as language acceptors Partial function Non deterministic Turing Machine Universal Turing Machines Applications. Applications Unsolvable problems and computable functions Rice theorem Halting problem Posts correspondence Problem Primitive recursive functions Godel Numbering Recursive and recursively enumerable languages. TEXT BOOK: 1. John C. Martin, Introduction to Languages and the Theory of Computation, 3rd Edition, Tata McGraw Hill, 1997. REFERENCE BOOK: 1. K.L.P Mishra, N. Chandrasekaran, "Theory of Computation", Prentice Hall of India, 2nd Edition, 1998.
40
1. Create the personal home page using HTML 2. Design a E-greetings page which has properly aligned paragraphs with images along with it. 3. Implement a Web site for Information Technology department Using a) Frameset b) Tables c) Internal Linking d) Headers e) List Items f) Hyperlink for mailing 4. Using STYLE SHEETS: 1 .Set the Background Image Fixed and Foreground Scrolling 2. Set the Background Image without tiles and at the center of the screen. 3. Set the Background Color for the text using all the 4 methods of Style sheets 5. Using JavaScript create a web page for Online Testing (Quantitative Aptitude) 6. Develop a JavaScript program to get Register Number as Input and print the Students total mark and grades. 7. Develop a VBScript code to perform the functions of a Calculator. 8. Using VBScript, develop a web site for online counseling. 9. Create a Text Editor using VBScript. 10. Write a function that takes an integer value and returns the number with its digits reversed. For Ex. Given the number 7631, the function should return 1367. Incorporate the function into a VBScript that reads a value from the user. Display the result in the status bar of the browser window. 11. Create a server-side include file containing the AdRotator code to display 4 advertisements. 12. Create an ASP application that allows the user to customize a web page. The application should consist of three ASP files: Ask the user name to login & read from a database to determine if the user is known. If the user is not known, second ASP file is loaded asking the user to choose their preference for foreground color, background color & image. Insert the new user & pREFERENCE to the database. Display the page customized according to the pREFERENCE selected. If the user is known at login, the customized page should be displayed. 13. Create an ASP application to display the students information from the Database Note: Only 5 students information per page should be displayed. Use Previous & Next to retrieve the rest of the information. 14. Create an ASP application for sending E-Mails using CDO. 15. Design a web page for registering the following information into Oracle Database using ASP. Name Reg. No, Date of Birth, Date of Admission, E-Mail (check for validation) Gender Address Branch & Year 16. Create a formatted business letter using XML & DTD. 17. Create a contact list database in XML using style sheets. 18. Develop a XML schema for the database document type. 19. Create a XML page for displaying staff details from the database 20. Connect to a database using XML & display its contents using HTML Page
41
4. Using Ex 3. 1. Drop unique constraint for item-name 2. Disable the constraint Nn-rate 3. Insert a record with NULL values for rate unit 4. Enable the constraint with NULL value existing on rate-unit 5. Create a table EMP mentioned above and test all the arithmetic functions and character functions 6. Add a field date-of-birth to EMP table and test all the date functions. 7. i) Modify EMP table adding a new field BONUS, update it using NVL ii) Retrieve the employees whose name starts with S. iii)Select all the employees who are working in IT department. 8. i) Using EMP table find the employee getting maximum salary ii) Find the employee whose salary is minimum iii) Find the sum of salaries of all the employees working in ACCOUNTS department.
42
9. Create a table DEPT with the following fields DNo. Primary Key DName Modify EMP table adding a foreign key constraint on DeptNo. i) ii) Insert 6 records into Dept. Implement the following Join operations a) Self Join b) Equi Join c) Non Equi Join d) Outer Join e) Natural Join
10. Using EMP and DEPT, implement all type of view techniques. a) Row subset view b) Column subset view c) Row column subset view d) Grouped view e) Joined view f) With check option 11. Using EMP and DEPT a) Create a sequence to insert the empno in EMP table b) Create a synonym for the above two tables
PART B 1. Create a cursor to update the salary of employees in EMP table 2. a) Write a PL/SQL program to raise an Exception i) When the bonus exceeds salary b) Write a PL/SQL program to test the built-in Exceptions 3. Write a procedure to insert a record into ORDER table by validating qty limit of the item and also check whether that item exists. 4. Write a function to find substring. 5. Create a trigger which checks whether employee with Emp_no is present in the Employee table before inserting into EMP.
43
Aim To address the challenge of the relevance of inference theory, Algebraic structures and graph theory to computer science and engineering problems. Objective To use inference theory in circuit models, and algebraic theory in computer science problems, graph theory in net work models and lattices & Boolean algebra in Boolean functions . Mathematical Logic Introduction -Statements and Notation - Connectives - Tautologies - Equivalence - Implications - Normal Forms - Principal Disjunctive Norm Forms - Principal Conjunctive Norm Forms. Inference Theory The Theory of Inference for the Statement Calculus -The Predicate Calculus - Inference Theory of the Predicate Calculus. Set Theory Basic Concepts of Set Theory- Relations and Ordering- Functions- Recursion Algebraic Structures Semigroups and Monoids - Grammars and Languages- Polish Expressions and Their Compilation - Groups - The Application of Residue Arithmetic to Computers - Group Codes. Lattices and Boolean Algebra Lattices as Partially Ordered Sets - Boolean Algebra - Boolean Functions - Representation and Minimization of Boolean Functions. Graph Theory Basic Concepts of Graph Theory - Matrix Representation of Graphs - Trees -Storage Representation and Manipulation of Graphs. Text Book: 1. J.P. Trembley and R. Manohar, Discrete Mathematical Structures with Applications to Computer Science, Tata McGraw Hill 13th reprint (2001). Reference Books: 1. Richard Johnsonbaugh, Discrete Mathematics, 5th Edition, Pearson Education (2001). 2. S. Lipschutz and M. Lipson, Discrete Mathematics, Tata McGraw Hill, 2nd Edition (2000).
44
Aim The subject aims to impart sound knowledge to design and implement an efficient software system and manage the resources . Objectives The students would be able to analyse software requirements, develop an efficient software system through group cohesiveness, use the testing tools and methods. Fundamentals Software Engineering Fundamentals, The system engineering process, Software process models, Process iteration, Software Specification, Software design and implementation, Software validation, Software evolution, Project management activities- Project planning, Project scheduling, Risk management, Software requirements- Functional and non-functional requirements, User requirements, System requirements, software requirements document. Engineering Process Requirements engineering processes - Feasibility studies, Requirements elicitation and analysis, Requirements validation, Requirements management, System Models- Context, Behavioural, Data and, Object models, CASE workbenches, Software prototyping- Prototyping in the software process, Rapid prototyping techniques, User interface prototyping, Formal Specification- Formal specification in the software process, Interface specification, Behavioural specification Architectural Architectural design- System structuring, Control models, Modular decomposition, Domain-specific architectures, Over view of design for Distributed systems, Object-oriented and Real-time software, Design with ReuseComponent-based development, Application families, Design patterns, User interface design - User interface design principles, User interaction, Information presentation, User support, Interface evaluation. Critical System Critical Systems- Over view of Dependability, System Specification, and System Development, Verification and validation- V&V planning, Software inspections, Automated static analysis, Clean room software development, Software testing- Defect testing, Integration testing, Object-oriented testing, Critical systems validation- Formal methods and critical systems, Reliability validation, Safety assurance, Security assessment. Managing Software Over view of managing software people, Software cost estimation- Productivity, Estimation techniques, Algorithmic cost modeling, Project duration and staffing, Overview of Quality management & Process Improvement, overview of Legacy Systems, Software change & re-engineering, Configuration managementplanning and managing change, version and release, Over view of SEI-CMM, ISO 9000, and Six Sigma, Over view of CASE tools. TEXT BOOK: 1. Ian Sommerville, "Software Engineering", Addison-Wesley, 2004. REFERENCE BOOK: 1. Roger S. Pressman, Software Engineering, McGraw Hill, 2004. Mode of Evaluation: By Assignment, Seminars and Written Examinations.
45
Aim This subject aims to introduce operating system concepts such as processes & threads, memory management, scheduling algorithms and distributed file systems Objectives The students would be able to understand and explain various OS concepts such as time-sharing, Multiprogramming, Parallel, Distributed systems, processes & Threads, CPU scheduling algorithms, Semaphores and Critical regions, Deadlock prevention, Memory Management, I/O systems and File Systems .They would be able to use Linux system, windows 2000. Introduction Introduction, Computer-System Structures, Operating-System Structures Process Processes, Threads, CPU Scheduling, Process Synchronization, Deadlocks Memory Management Memory Management, Virtual Memory, File-System Interface, File-System Implementation, I/O Systems, MassStorage Structure Distributed File Structure Distributed System Structures, Distributed File Systems, Distributed Coordination, Protection, Security Case Studies The Linux System, Windows 2000.
TEXT BOOK: 1. Abraham Silberschatz, Peter Baer Galvin, Greg Gagne, "Operating System Concepts", John Wiley & Sons, Inc. 6th Edition. REFERENCE BOOK: 1. Stallings William, "Operating Systems", Prentice Hall of India, Fourth Edition
46
Aim The subject aims to introduce basics of Networks, client/server systems, Network design approaches, Architecture of Networks, and also future Networking technology. Objectives Students shall be able to understand about working of Intranet, LAN, WAN, MAN setups, different topologies like Star, Mesh, etc., various functions of layers, different network architectures, different switching techniques, different protocol standards, congestion & traffic control, different internetworking devices like bridges, switches, routers, etc, security protocols & security algorithms. Network Services Networks and Services, Approaches to Network Design, The OSI Reference Model; Overview of TCP/IP Architecture, Application Protocols and TCP/IP Utilities. Peer-to-Peer Protocols and Service Models ARQ Protocols, Sliding Window Flow Control, Multiple Access Communications, LAN and access methods, Introduction to LAN Standards and LAN Bridges, Ethernet networking. Packet Switching Packet Switching Networks- Network Services and Internal Network Operation, Packet Network Topology, Routing in Packet Networks, Shortest Path Algorithms, and Introduction to traffic management & QoS. TCP/IP TCP/IP Architecture, The Internet Protocol, Limitations of IPv4 and Introduction to IPv6, User Datagram Protocol, Transmission Control Protocol, DHCP, Introduction to Internet Routing Protocols. Advanced Network Advanced Network Architectures and Security Protocols- Introduction to MPLS and Differentiated Services; RSVP; Security and Cryptographic Algorithms, Security Protocols, Cryptographic Algorithms TEXT BOOK: 1. A. Leon-Garcia, Indra Widjaja, "Communication Networks", Tata McGraw Hill, 2000 REFERENCE BOOKS: 1. William Stallings, " Data and Computer Communications", Pearson Education, 7th Edition 2. Andrew S. Tanenbaum, "Computer Networks", Prentice Hall India, 4th Edition, 2003. Mode of Evaluation: By Assignment, Seminars and Written Examinations.
47
Aim To create Software applications that can be accessed by all the people over the internet and to allow the users to customize the software based on their requirements. Objective On completion of this course the students will be able to create open source software applications and can publish it over the Internet. Introduction to LINUX The operating System; Compiling the Kernel; Introduction to the Kernel: Important data structures, Main algorithms, Implementing System Calls. LINUX Architecture-independent memory model, Virtual address space for a process, Block device caching, Pages under LINUX. IPC, File System IPC: Synchronization in the Kernel, Communication via files, Pipes, Debugging using ptrace, System V IPC, IPC with sockets. File System: Basic Principles, Representation of file system in the Kernel, The Proc file system and Ext2 file system. HTML AND FORMS HTML tags; sending data to the server; Designing applications using forms in HTML. Creating dynamic pages, CGI Examples with postscript. The gd graphics library. CGI Examples with gnuplot and pgperl. Animation. Advanced form applications- Guestbook, Survey/poll and pie graphs, quiz/test form application, Security. JavaScript - VB Script Introduction to JavaScript, VB Script - usage in Web Page develpment, sending an email - multipart message storing images - getting confirmation - Session tracking - Graphics Input Validators - cookies.
TEXT BOOKS 1. M. Bek et al : LINUX Kernel Internals, Addison-Wesley, 1997. (Chapters 1 to 9, Appendices A,B,C,D) 2. Remy Card et al: The LINUX Kernel book, John Wiley, 1998. REFERENCE BOOKS 1. Shishir Gundavaram - CGI Programming on the World Wide Web, O' Reilly and Associates - Shroff Publishers - 1996. (Chapters 1 to 7). 2. Core PHP programming, Leon Atkinson and Zeev Suraski, Pearson Education, Delhi, 2004. Mode of Evaluation: By Assignment, Seminars and Written Examinations.
48
49
1. Program to report the behavior of the OS to get the CPU type and model, kernal version. 2. Program to get the amount of memory configured into the computer, amount of memory currently available. 3. Implement the various process scheduling mechanisms such as FCFS, SJF, Priority, round robin. 4. Implement the solution for reader writers problem. 5. Implement the solution for dining philosophers problem. 6. Implement bankers algorithm. 7. Implement the first fit, best fit and worst fit file allocation strategy. 8. Write a program to create processes and threads. 9. Write a program that uses a wait able timer to stop itself K. Sec. After its started where K is a command line parameter.
50
Aim To introduce the basics concepts of graph theory and its applications to computer net work models. Objective To know the basic concepts and notations in graphs. To give the combinatorial and matrix representation of graphs To explain the computer representation of graphs and its application to computer science. Introduction Definitions, importance, isomorphism, walk, paths, circuits, connected, disconnected graphs, operation on graphs operation on graphs, euler and hamiltonian graphs. Trees Properties, distance and centres, trees, spanning trees, fundamental circuits, minimal spanning tree. Cut Sets Properties, fundamental circuits and cut sets, connectivity, separatability, network flows, 1-2 isomorphism. Planar And Dual Graphs Combinatorial representation, planar graphs, kuratowski's graphs, detection of planarity, dual graphs. Matrix Representation of Graphs Incidence matrix, circuit matrix, cut set matrix, fundamental matrices, relationships amongst matrices, path matrix, adjacency matrix. Coloring, Covering And Partitioning Chromatic number, chromatic partitioning, matching, covering, four color problem. Directed Graphs Different types, directed paths and connectedness, Euler digraphs, trees-matrix representation, tournament. Graph Theoretic Algorithms Computer representation of graphs - input & output, algorithms for connectedness, spanning tree, fundamental circuits, cut vertices, directed circuits and shortest paths. Text Book: 1. Narasing Deo, Graph theory with application to engineering and computer science, Prentice Hall India, 1995. Reference Book 1. Tulasiraman And M.N.S. Swamy, Graph, Networks and Algorithms, John Wiley, 2. 1981. 3. F. Harary, Graph Theory, Addison Wesley / Narosa, 1998. 4. E.M.Reingold, J. Nievergelt, N. Deo, Combinatorial algorithms: Theory and 5. Practice, Prentice Hall, N.J. 1977. Mode of Evaluation: By Assignment, Seminars and Written Examinations.
51
Aim To design new methods for communication and data transfer that eliminates delay and improves data integrity. Objective On completion of this course the students will be able to know about various protocols and standards and the students can create new protocols for communication and data transfer. Networking Standards and Specification Networking standards and specifications, Need for standardization, ISO and the IEEE standards, The IEEE 802 Project. Addressing and Routing Network names and addresses, Physical layer addressing: the MAC address, Network layer addressing: The IP address, Network layer address: The IPX address. Overview of OSI and TCP/IP Protocol Suite: Converting network names to IP addresses, Resolving IP addresses to physical addresses, Addressing and routing. TCP/IP Protocol Suite TCP/IP Protocol Suite, TCP/IP Protocol Suite advantages, Internet Protocol (IP), Transport Layer Protocols TCP and UDP, File Transfer protocols - FTP and TFTP, Mail and news protocols - SMTP, POP3, NNTP and IMAP, Other Protocols Suite ICMP and ARP. Other networking protocols The IPX/SPX Protocol Suite, NetBEUI, AppleTalk Protocol, File sharing protocols - SMB, NCP, and NFS, Routing protocols - RIP, OSPF and BGP, Network Management Protocol SNMP and CIMP, Convergent Protocols H.323 and SIP. Text Book: 1. Behrouz A. Forouzan, TCP/IP Protocol Suite, Third Edition, Tata McGraw-Hill, 2005. Reference Book 1) W. Richard Stevens, TCP/IP Illustrated, The Protocols, Pearson Education, 2004. 2) D.E.Comer, Internetworking with TCP/IP Principles, Protocols and Architecture Vol - I, Pearson Education, 2001. 3) John Ray, Using TCP/IP, PHI 4) Karanjit. S. Siyan, Tim Parker, TCP/IP Unleashed, Pearson Education.
52
53
54
55
The Students have to form a team size of 3 or 4. Each team is assigned System Analyze, Coding, testing/.metrics tools like Code Comparison, Compiler-based Analysis, Complexity-based Metric, Modeling , Review, Volume testing, Stress Testing, Regression testing etc This tool has to be used for testing and taking various metrics. Estimation for some application Comparative Study of different tools have to be done The above facts has to be documented and a report has to be submitted at the end of the semester
56
57
Aim The main aim of the course Operational Research is introduce the main techniques, methods and approaches of operational research. It provides numerate skills covering mathematical modeling and optimization technique with application to practical problems arising in computer science. Objective To introduce the concepts and techniques in decision theory. To use the concepts in network analysis and inventory theory Decision Theory Decision Environments - Decision making under certainty - Decision making under risk - Decision making under uncertainty. Markovian Decision Process. Scope of the Markovian Decision Problem - Gardner example - Finite stage Dynamic Programming model Infinite stage model - Linear Programming solution. Deterministic and Probabilistic Dynamic Programming Recursive nature of computations in DP Selected DP Applications Problem of Dimensionality A Game of chance - Investment Problem Maximization of the event of Achieving a Goal. Network Analysis Network Definitions - Minimal spanning tree algorithm - Shortest route Problem - Maximum flow Model Minimum cost capacitated flow problem - Linear Programming formulation - Network Simplex method CPM and PERT. Inventory Theory Basic Elements of an Inventory model - Deterministic models of the following types: Single item static model with and without price breaks - Multiple item static models with storage limitation. Probabilistic Models: Continuous Review model - Single period models. Queuing Theory Basic elements of a queuing model - Role of Poisson and Exponential distributions - Pure Birth and Death models Specialized Poisson Queues M/G/1 queue - Pollaczek - Khintchine formula. Text Book: 1. Hamdy A. Taha , Operations Research ,Prentice - Hall of India Private Limited, New Delhi (2002). Reference Books: 1. F.S. Hiller and J.Lieberman -,Introduction to Operations Research ,7th Edition, Tata McGraw Hill Publishing Company, New Delhi, 2001. 2. Beightler. C, D.Phillips, B. Wilde ,Foundations of Optimization ,2nd Edition, Prentice Hall Pvt Ltd., New York, 1979 3. Bazaraa, M.S; J.J.Jarvis, H.D.Sharall ,Linear Programming and Network flow, John Wiley and sons, New York 1990. 5. Gross, D and C.M.Harris, Fundamentals of Queuing Theory, 3rd Edition, Wiley & Sons, New York, 1998. Mode of Evaluation: By Assignment, Seminars and Written Examinations.
58
59
60
Aim To create Software applications that can be accessed by all the people over the internet and to allow the users to customize the software based on their requirements. Objective On completion of this course the students will be able to create open source software applications and can publish it over the Internet. Introduction to PHP Open source Programming PHP, Apache, MySQL, Postgress, SQL and Perl- Overview of PHP Variables, operations, Constants, control structures arrays, Functions, classes Handling files. My SQL database programming Connecting table creation record insertion updation multiple database handling. E-mailing with PHP Sending an email multipart message storing images getting confirmation. Session tracking using PHP Graphics Input Validators cookies. Introduction to Perl / TCL / Python Numbers and Strings Control Statements Lists and Arrays Files Pattern matching Hashes Functions. Introduction to TCL/TK, Introduction to Python.
Text Books: 1. Beginning PHP, Apache, MySQL web development Michael K.glass, Rommn le Scouarnec, et al.Wiley Publishing, Inc, New Delhi, 2004 2. Core PHP programming, Leon Atkinson and Zeev Suraski, Pearson Education, Delhi, 2004. Reference Books: 1. PHP Professional Projects, Ashish Wilfred Meeta Gupta and Karticj Bhatnagar PHI, 2002 2. Teach Fourself perl, Clinton pierce, Techmedia, New Delhi, 2000. 3. Tom Christiansen and Nathan Torkington, Perl CookBook, OReilly, 2003
61
The Students have to form a team size of 3 or 4. Each team is assigned System Analyze, Coding, testing/.metrics tools like Code Comparison, Compiler-based Analysis, Complexity-based Metric, Modeling , Review, Volume testing, Stress Testing, Regression testing etc This tool has to be used for testing and taking various decisions. Comparative Study of different tools have to be done The above facts has to be documented and a report has to be submitted at the end of the semester
62
Aim To provide advanced concepts on software design and architecture. Objective To learn various architectural styles and Design Pattern. Introduction Introduction to patterns Pattern categories Relationship- pattern description patterns and S/W architectureDescription of architectural patterns-Design pattern an Introduction Description of design pattern. Design Pattern Catalog of Design Pattern Problem solving by Design Pattern Guidelines for selecting & using design pattern Creation of patterns Abstract factory Builder Factory methods prototype singleton Discussion Structural Pattern Structural Pattern Adapter Bridge Composite Decorator Faade Flyweight Proxy Discussion. Behavioral Pattern Behavioral Pattern Chain of responsibility Command Interpreter Iterator Mediator Memento- Observer - State Strategy Template method visitor discussion Future of Patterns Benefits of pattern in S/ W development expectation from design pattern A Case study. Text Book: Gamma & Helm et al, Design Patterns, Addison Wesley 1999. Reference Book: Frank Bushmann et al, Pattern Oriented S/W Architecture, John Wiley & sons -2001. Mode of Evaluation: By Assignment, Seminars and Written Examinations.
63
64
65
66
The Students have to form a team size of 3 or 4. Each team is assigned System Analyze, Coding, testing/.metrics tools like Code Comparison, Compiler-based Analysis, Complexity-based Metric, Modeling, Review, Volume testing, Stress Testing, Regression testing etc This tool has to be used for testing and taking various metrics. Estimation for some application Comparative Study of different tools have to be done The above fact has to be documented and a report has to be submitted at the end of the semester.
67
The Students have to form a team size of 3 or 4. Each team is assigned testing / metrics tools like Code Comparison, Compiler-based Analysis, Complexity-based Metric, Modeling , Review, Volume testing, Stress Testing, Regression testing etc This tool has to be used for testing and taking various metrics. Estimation for some Application Comparative Study of different tools have to be done The above facts has to be documented and a report has to be submitted at the end of the semester
68
Aim The subject aims to cover knowledge discovery process and to design and populate a business data warehouse. Objectives To make familiar with the various concepts of data warehousing like meta data, data mart, summary table, fact data and dimension data. To sail along with the various approaches in data mining. To familiarize with the various data warehousing and data mining tools Data Warehouse and OLAP Technology for Data mining Introduction to Data Warehouse- A multidimensional Data Model Data Warehouse architecture Data preprocessing- Data cleaning Data integration and Transformation. Data Mining Introduction Introduction to Data Mining Data Mining Functionalities Classification of Data Mining systems, Major issues in Data mining. Data Mining primitives, languages & system architecture Data mining primitives: Task relevant data kind of knowledge to be mined Background knowledge interestingness measures presentation & visualization of discovered pattern - Data Mining Query language Designing Graphical User interfaces based on DMQL - Architecture of Data mining. Association Rule Mining Basic concepts market basket analysis - Mining single dimensional Boolean association rules from transactional databases. Classification & prediction: Whats classification - issues regarding classification and prediction Bayesian classification prediction: linear non linear. UNIT V: Cluster analysis Types of Data applications. in cluster analysis - Major clustering methods. Data mining
Text Book: 1. Han J. & Kamber, M, Data Mining: Concepts and Techniques, Morgan Kaufmann, 2005. Reference Books: 1. Immon.W.H., Building the Data Warehouse, Wiley Dream Tech, 3rd Edition, 2003. 2. Anahory S., Murray, D, Data Warehousing in the Real World, Addison Wesley, 1st Edition, 1997.
69
Aim To introduce the fundamental techniques of natural language processing, to develop an understanding of the limits of those techniques and of current research issues, and to evaluate some current and potential applications Objective Students should be able to discuss the current and likely future performance of several NLP applications, such as machine translation and email response be able to describe briefly a fundamental technique for processing language for several subtasks, such as morphological analysis, parsing, word sense disambiguation etc. Understand how these techniques draw on and relate to other areas of (theoretical) computer science, such as formal language theory, formal semantics of programming languages, or theorem proving Introduction Introduction to the Morphology, Syntax, Semantics by linking the linguistics view (computational linguistics) with the artificial intelligence view (natural language processing). Morphology Analysis and generation of language on word level: e.g. problems with compounding and idiomatic phrases, homophonous strings as well as loan words and their processing using e.g. finite state automata as well as semantic networks. Ambiguities in words like pen and pipe, but will also discuss some complex strings. Syntax Analysis and generation of language on phrasal and sentence level: e.g. applications such as machine translation and grammar checking and the processing using phase structure grammars as well as unification based formalisms, and relating those formalisms to recursive transition networks (RTNs) as well as augmented transition networks (ATNs). Semantics Language ambiguities on the level of meaning: represented by case structures and conceptual dependency structures. We will look at famous utterances such as: Colourless green ideas sleep furiously. And will discuss why the machine runs into problems during analysis, and how these problems can be overcome. Applications of NLP Machine Translation, Grammar Checkers Dictation, Automatic Document Generation, NL Interfaces. Text Book: Daniel Jurafsky, James H. Martin Speech and Language Processing Prentice Hall, 2001. Reference Books: Chris Manning and Hinrich Schtze, Foundations of Statistical Natural Language Processing, MIT Press. Cambridge, MA: May 1999. Mode of Evaluation: By Assignment, Seminars and Written Examinations.
70
71
Aim The subject aims to cover the significance of security of computer systems and computer networks. It also covers the topics such as cryptography and various encryption algorithms. Objectives The students would be able to understand and use encryption algorithms such as RSA, Blow Fish etc; authentication techniques digital signatures and System-level security issues. Attacks, Service and Mechanism Attacks, Services & Mechanisms Security attacks Security services Network Security Model. Conventional Encryption: Classical Techniques: Conventional Encryption model - Stenography Classical Encryption Techniques- Modern Techniques: The Data Encryption Standard The Strength of DES Differential and Linear, Crypto-analysis. Public Key Cryptography Principles of public-key cryptosystems The RSA algorithm - Key management Diffie-Hellman key exchange Elliptic curve cryptography Message Authentication and Hash functions Authentication requirements Authentication functions Hash functions Security of hash functions and MACS. Hash Algorithm: MD5 Message Digest algorithm Secure Hash algorithm (SHA-1) HMAC. Digital Signatures and Authentication Protocols: Digital signatures Authentication protocols Digital signature standard. Electronic Mail Security Pretty Good Privacy PGP services Transmission and reception of PGP messages PGP message generation PGP message reception. IP Security: Overview Architecture Authentication header Web Security: A comparison of Threats on the Web Secure socket layer and transport layer security: SSL architecture SSL record protocol Handshake protocols. Intruders and Viruses, Worms Intruders Intrusion techniques Password protection Access control Password selection strategies -Intrusion detection- Different approaches of Intrusion detection - Audit records Viruses and related Threats Firewalls: Firewall design principles Firewall characteristics types of firewalls Firewall configurations. Text Book: William Stallings Cryptography and Network security Principles and Practice", 2nd edition, Pearson Education, 2002. Reference Book: Charlie Kaufman, Raja perlman, Mike speciner, Network Security 2nd edition, Prentice-Hall of India Pvt Ltd, 2002. Mode of Evaluation: By Assignment, Seminars and Written Examinations.
72
Aim The subject aims to cover parallel & distributed computing architecture, networked clusters of computers, utilization and management of the expensive resources that are remote to the users. Objectives The students would be able to understand and use different network models, security mechanisms and design methodologies of Distributed systems Introduction Introduction to distributed computing system, evolution different models, gaining popularity, definition, issues in design, DCE, message passing introduction, desirable features of a good message passing system, issues in IPC, synchronization, buffering, multigram messages, encoding and decoding of message data, process addressing, failure handling, group communication. Remote Procedure Call RPC-Introduction, model, transparency, implementation mechanism, stub generation, RPC messages, marshalling arguments and results, server management, parameter - passing semantics, call semantics, communication protocols for RPCs, client server binding, exception handling, security, mini project using Java RMI Distributed Shared Memory Distributed shared memory- general architecture of DSM systems, design and implementation issues of DSM systems, granularity, structure of shared memory space, consistency model, replacement strategy, thrashing, advantages of DSM, clock synchronization DFS and security- Desirable features of good DFS, file models, file accessing Models, file sharing semantics, file catching schemes, file replication, fault Tolerance, atomic transaction, potential attacks to computer system, cryptography, authentication, access control. Digital signatures, DCE security service. Parallel and Distributing Computing Overview of Parallel and Distributed Computing, Operating Systems, Client-Server Model, Distributed Database Systems, Parallel Programming Languages and Algorithms. Distributed Network Architectures- Managing Distributed Systems. Design Considerations Tools Methods and tools for development, implementation & evaluation of distributed information systems, workflow, software processes, transaction management, and data modeling, infrastructure e.g. middle-ware to glue heterogeneous, autonomous, and partly mobile/distributed data systems, such as e.g. client/server-, CORBA-, and Internet-technologies. Methods for building distributed applications. TEXT BOOK: 1. Pradeep K. Sinha, "Distributed Operating Systems: Concepts & Design", PHI, 2005. REFERENCE BOOKS: 1. Crichlow Joel M, "An Introduction to Distributed and Parallel Computing", PHI, 1997. 2. Black Uyless, "Data Communications and Distributed Networks", PHI, 5th Edition. Mode of Evaluation: By Assignment, Seminars and Written Examinations.
73
74
Aim This subject aims to introduce the concepts of image processing such as Representation of Image, Image Transform, Image Restoration using various approaches, Image segmentation and Image recognition and interpretation. Objectives The students would be able to understand and explain Fundamentals of Image processing, Image Transforms, Image restoration techniques, Image segmentation and Recognition & interpretation of Images. Digital Image representation Steps in image processing, Elements of Digital Image processing systems, Fundamentals: Elements of visual perception, sampling and quantization, basic relationship between pixels. Imaging Geometry some basic transforms, perspective transforms. Image Transform Fourier transform, Discrete Fourier transform, Fast Fourier transform, properties of 2 D Fourier transform, Image Enhancement Spatial domain methods, Frequency domain methods, Enhancement by point processing, spatial filtering, Enhancement in the Frequency domain. Image Restoration Degradation model, Algebraic approach to restoration, Inverse Filtering, Wiener Filter constraint least squares restoration, Restoration in the spatial domain, Image Compression- Redundancy, Compression models, Error free compression, Lossy compression, Image compression standards. Image Segmentation Detection of Detection of Discontinuity Edge linking and boundary detection, Thresholding Region oriented segmentation. Image representation Representation schemes, Boundary descriptors, Regional descriptors. Recognition and interpretation Elements of Image analysis, patterns and pattern classes, Decision and theoretic methods, structural methods, Interpretation.
Text Book: 1. Rafel C. Gonzalez & Richard E. Woods, Digital Image Processing, Pearson Education, 2005. Reference book: 1. Anil K. Jain, Fundamentals of digital Image processing, PHI, 1989.
75
76
Aim This subject aims to cover statistical models in simulation, Inventory systems, and Random numbers & variables, Input and output analysis Objectives The students would be able to understand and use discrete event simulation, simulation techniques, and statistical methods. Introduction Simulation-Advantages and disadvantages of simulation, areas of application, Systems and system environment, Components of a system, Discrete and continuous systems, Model of a system. Types of models, Discrete events system simulation, Steps in a simulation study. Simulation Examples, Simulation of queuing systems, Simulation of inventory systems, other examples of simulation, discrete event simulation, general principles and computer simulation languages. Concepts in DES, Programming languages for DESS: FORTRAN, GASP, SIMSCRIPT, GPSS, SLAM, Summary and comparison of simulations. Statistical Models in Simulation Review of terminology & concepts, Useful statistical models, Discrete distributions, Continuous distributions, Process, Empirical distributions. Queuing Models: Characteristics of queuing systems, queuing notation, Transient & steady state behavior of queuing notation, Transient & steady state behavior of queues, long run measures of performance of queuing systems, steady state behavior of finite population models. Inventory Systems Measures of effectiveness, Inventory policies, Deterministic systems, and probabilistic systems, Simulation in inventory analysis. Random Number Generation: Properties of random numbers, Generation of Pseudo random. Nos., techniques for generating random nos., tests for random nos. Random Variable Generation: Inverse transform technique, Direct Transformation for the normal distribution, Convolution method, AcceptanceRejection technique. Input Data Analysis Data collection, identifying the distribution, parameter estimation, goodness-of-fit tests. Verification and validation of simulation models: Model building, verification & validation, verification of simulation models, calibration & validation of models. Output Analysis Output Data analysis for a Single Model- Stochastic nature of O/I data, types of simulations with respect to O/P analysis, measures of performance and their estimation, O/p analysis for terminating simulations, O/P analysis for steady-state simulations. Comparison and evaluation of alternative system designs: Comparison of two and several system designs, statistical models for estimating the effect of design alternatives. Text Book : 1. Jerry Banks, John S. Carson, Discrete-event System Simulation, PHI, 3rd Edition REFERENCE BOOK: 1. Karian, Z.A. and Dvdewicz. E.J., Modern Statistical Systems and GPSS Simulation, Freeman, 1991. Mode of Evaluation: By Assignment, Seminars and Written Examinations
77
Aim The subject aims to impart the knowledge about the technologies like CDMA, GSM, GPRS and Wireless Application protocols Objectives The student would be able to understand the principles and practices of Mobile Communication, Satellite Communication, Medium Access Control techniques, Mobile Devices, Wireless Local Area Networks, HiperLAN and Bluetooth, Wireless ATM operations, mobile network layer and various wirelesses Application Protocol. Introduction Introduction-Wireless Transmission Frequencies for Radio transmission signals-Antennas Signal propagation multiplexing Modulation-Spread spectrum Cellular systems Communication Systems Communication Systems-Medium access control-Motivation for a specialized MAC SDMA-FDMA-TDMACDMA-comparison of S/T/F/CDMA. Telecommunication Systems GSM DECT TETRA - UMTS and IMT - 2000, Satellite Systems GEO139, LEO139, MEO140 Routing Localization Handover Broadcast systems-Overview Cyclic Repetition of Data Digital Audio Broadcasting Digital Video Broadcasting. Wireless Communication Wireless Communication-Wireless LAN-Infrared vs Radio transmission Infrastructure and ad hoc networks IEEE802.11-HIPERLAN Bluetooth. Wireless ATM-Motivation for WATM Wireless ATM working group WATM Services-Reference Model-Functions-Radio Access Layer Handover Location Management Addressing Mobile quality of service Access point control protocol. Mobile Network Layers Mobile network layer-Mobile IP-Dynamic host configuration protocol-Ad hoc networks. Mobile transport layerTraditional TCP292-Indirect TCP Snooping TCP, Mobile TCP-Fast Retransmit/Fast recoverytransmission/Timeout Freezing ,Selective Retransmission Transaction oriented TCPU File Systems Support for Mobility File Systems-Consistency World wide Web Hyper Text mark up language approaches that might help wireless access-System architecture Wireless Application Protocol Text Book: 1. Johchen schiller, Mobile Communication, Addison Wesley, 2000. Reference Book`: 1. Asoke K. Talukder, Roopa R.Yavagal, Mobile Computing-Technology, Applications and Service Creation, Tata Mcgraw Hill, 2005. Mode of Evaluation: By Assignment, Seminars and Written Examinations.
78
Aim The subject aims to cover the concepts of embedded systems, their design and applications, programming models and Inter process communication. Objectives The student would be able to understand and use in embedded systems, device drivers, software engineering practices in embedded systems development and Inter process communication. Introduction Introduction to Embedded Systems, Processor in the System Software Embedded into a system Exemplary Embedded Systems Embedded System-On-chip and in VLSI Circuit Processor and Memory Organization Structural Units in a Processor Processor Selection for an Embedded System Memory Devices Memory Selection for an Embedded System Allocation of Memory to Program Segments and Blocks and Memory Map of a System Direct Memory Access Interfacing Processor, Memories and I/O Devices. Devices and Buses Devices and Buses for Device Networks-I/O Devices Timer and Counting Devices Serial Communication Using the I2 C, CAN and Advanced I/O Buses between the Networked Multiple Devices Host System or Computer Parallel Communication between the Networked I/O Multiple Devices Using the ISA, PCI, PCI X and Advanced Buses. Device Drivers and Interrupts Device Drivers and Interrupts Servicing Mechanism- Device Drivers Parallel Port Device Drivers in a System Serial Port Device Drivers in a System Device Drivers for Internal Programmable Timing Devices Interrupt Servicing (Handling) Mechanism Context and the periods for Context Switching, Deadline and Interrupt Latency. Programming Concepts Program Modeling Concepts in Single and Multiprocessor Systems Software Development Process- Modeling Processes for Software Analysis Before Software Implementation Programming Models for Event Controlled or Response Time Constrained Real Time Programs Modeling of Multiprocessor Systems. Software Engineering in Embedded Software Engineering Practices in the Embedded Software Development Process-Software Algorithm Complexity Software Development Process Life Cycle and its Models Software Analysis Software Design Software Implementation Software Testing, Validating and Debugging Real Time Programming Issues during the Software Development Process Software Project Management Software Maintenance Unified Modelling Language (UML) Inter-Process Communication & Synchronisation of processes, Tasks & Threads-Multiple Processes in an Application Problems of Sharing Data by Multiple Tasks and Routines Inter process Communication. Text Book: 1. Rajkamal, Embedded Systems-Application, Practice & Design, Tata McGraw Hill. Reference Books: 1. Arnold S. Berger, Embedded Systems Design, CMP Books, 1997. Mode of Evaluation: By Assignment, Seminars and Written Examinations.
79
Introduction Human and computers, the structure of the brain, learning in machines, the differences. Pattern recognition in perspective, pattern recognition a definition, feature vectors and feature space, discriminate functions, classification techniques, linear classifiers, statistical techniques, pattern recognition a summary. Basic Neuron The Basic Neuron- Introduction modeling the single neuron, learning in simple neurons, the perception; a vectorial perspective, the perception learning rule, proof, limitations of perceptions. The Multi-Layer Perception- Introduction altering the perception model, the new model the new learning rule, the multilayer perception algorithm, the XOP problem reverted, visualizing network behaviour, multilayer perceptions as classifiers, generalization, fault tolerance, learning difficulties radial basis functions, applications. Self Organizing Networks Kohenen Self-Organizing Networks- Introduction, the kohenen algorithm, weight training, neighborhoods, reducing the neighborhood, learning vector quantisation, the phonetic typewriter. Hopfield Networks Hopfield Network - Hopfield model, the energy landscape, the Boltzman machine, constraint satisfaction, Adaptive resonance theory, architecture and operation, ART algorithm, training the ART network, clarification conclusion, summary of ART. Associative Memory Associative Memory -Standard computer memory, implement associative memory, implementation in RAMs, FAMS & N-tupling, Willshaws associative net, the ADAM system, kanevas sparse distributed memory, bidirectional associative memories. Hardware and software implementations, optional computing optical computing and neural networks. Text Book: 1. Neural Computing: An Introduction, R. Beale & T. Jackson, Adam Hilger, 1990. Reference Book: 1. Peo Y.H. Adaptive pattern recognition and neural networks, Addison Wesley, 1989.
80
Aim The subject aims to introduce multimedia computing & communications covering various building blocks such as hardware, software, operating systems and DBMS. Objectives At the end of the course students would be able to use multimedia computing hardware, software tools multimedia authoring and design process. Introduction Branch-overlapping Aspects of Multimedia, Content, Global Structure, Multimedia- Media and Data Streams, Medium, Main Properties of a Multimedia System, Traditional Data Stream Characteristics, Data Streams Characteristics for Continuous Media, Information Units. Sound /Audio Basic Sound Concepts, Music, Speech, Image and Graphics- Basic Concepts, Computer Image Processing, Introduction to Optical Storage Video and Animation Basic Concepts, Television, Computer-based Animation, Data Compression-Storage Space, Coding Requirements, Source, Entropy, and Hybrid Coding, Some Basic Compression Techniques-JPEG, H.261, MPEG, DVI Multimedia Operating Systems Introduction, Real-time, Resource Management, Process Management, File Systems, Additional Operating System Issues, System Architecture, Multimedia Communication Systems- Application Subsystem, Transport Subsystem, Quality of Service and Resource Management Multimedia Database Systems Data Analysis, Data Structure, Operations on Data, Integration in a Database Model, Introduction to Hypertext, Hypermedia, Document Architecture, SGML, ODA, MHEG, A Reference Model for Multimedia Synchronization, Multimedia Applications- Media Preparation. Media Composition, Media Integration, Media Communication, Media Consumption, Media Entertainment Text Book : 1. Ralf Steinmetz and Klara Mahrstedt, "Multimedia computing, communications and Applications", Pearson Education Asia, 1st reprint 2001. Reference Book: 1. K. Rao, "Multimedia Communication Systems: Techniques, Standards, and Networks", Prentice Hall, 2002. Mode of Evaluation: By Assignment, Seminars and Written Examinations.
81
82
Aim To introduce the fundamental techniques of sensor Networks, to develop an understanding of the limits of those techniques and of current research issues, and to evaluate some current and potential applications. Objective At the end of the course students should - Have a knowledge and understanding of wireless sensor networks and their principles. - Have deeper knowledge and understanding of sensor models for automotives, etc., - Be able to apply the available tools to perform various kinds of performance testing. Introduction to Sensors Communication Network, Ordinary Sensors Vs Networked Sensors, Use of Networked Sensors, Potential Problems with Networked Sensors, Canonical problems, Key definitions of sensor networks, Sensor network applications. Network sensors & Infrastructure establishment Key assumptions, MAC:- SMAC, IEEE 802.15.4 standard- Zigbee; Graphic, Energy-aware routing, attributebased routing; Infrastructure Establishment:- Topology control, clustering, Time synchronization , localization and localization services. Sensor tasking, Control and Data acquisition Task driven sensing, sensor nodes utilities, Information based sensor tasking, joint routing and information aggregation. Data Acquisition:- Sensor database challenges, Querying the physical environment, query interfaces, In-Network aggregation, data centric storage. Sensor network platforms & Tools Sensor Node hardware, Sensor network programming challenges, node level software platforms, node level simulators. Network Technologies RS-232 , RS-485 , Seriplex , AS-i , Interbus- CAN bus, HART , Profibus , Foundation Fieldbus, WorldFIP, LonWorks. Text Book Feng ZHAO, Leonidas GUIBAS Wireless Sensor Networks Elsevier. Reference Books 1. Cauligi S. Raghavendra, Krishna Sivalingam, Wireless Sensor Networks Springer, 2005. 2. Holger Karl, Andreas Willig, Protocols and Architectures for Wireless Sensor Networks, Wiley, 2005. Mode of evaluation: Written examination, Case Analysis, Assignments.
83
84
85
Aim The aim of this subject is to deal with the dynamic and distributed nature of both data and applications require that software not merely respond to requests for information but intelligently anticipate, adapt, and actively seek ways to support users. It covers various approaches to agent-to-agent communication and agent mobility, as well as the use of agents to provide intelligent interoperability between loosely coupled components of distributed systems. Objective The students would be able to describe and use software agents for enhance learning and providing intelligent assistance to users in situations where direct manipulation interfaces alone are insufficient. They would be able to select and use languages and tools for design and implementation of intelligent agents and multi-agent systems including mobile agents. They would also be able to comprehend the software agent applications in decision support systems, manufacturing system, information retrieval and knowledge discovery. Information Systems Internet - based Information systems - Adaptive (Customizable) Software Systems - Autonomous mobile and immobile robots - Data mining and Knowledge discovery - Smart Systems (Smart homes, Smart automobiles, etc.) - Decision Support Systems and Intelligent design and Manufacturing Systems. Foundations Theoretical Foundations for Software Agents - Design and Implementation of Intelligent Agents: Reactive Deliberative - Planning - Knowledge - Based - Logical - Rational - Commutating - Adaptive - Learning agents. Languages Languages and tools for design and implementation of intelligent agents and multi-agent systems, Introduction to mobile agents. Applications: Adaptive Information - Retrieval - Decision Support - Knowledge Discovery Computational Biology - Design and manufacturing - Smart Systems - Robots. Text Books: 1. Russell & Norvig, Artificial Intelligence:A Modern Approach, Prentice Hall, 1995. 2. Huhns and Singh(ed), Palo Alto, Readings in Agents, Morgan Kaufmann 1998. Reference Books 1) 2) 3) 4) Bradshaw (ed.), Software Agents, MA:MIT Press, 1997. Bigus & Bigus, Constructing Intelligent Agents with Java, John Wiley, 1999. Jeffrey Broadshaw, Software Agents, MIT press, 1997. James. E. White, Mobile Agents, General Magic, Inc. 1996.
86
87
88
T -
P -
C 3
Activity planning Activity planning-project schedules-sequencing and scheduling projects-network planning model-shortening project duration identifying critical activities.
Risk Management Risk Management-resource allocation-monitoring and control-managing people and organizing teams-planning for small projects. Software Configuration Management Software Configuration Management basic functions- responsibilities-standards-configuration managementprototyping models of prototyping. Software Maintenance Software Maintenance characteristics - maintenance tasks maintenance side effects maintenance issues source code metrics software reliability definition of software reliability concept of software repair and availability software error and faults estimating number of bugs in computer program reliability models availability models Text Books 1. Mike Cotterell, Bob Hughes - Software Project Management - Inclination/Thomas Computer Press - 1995. 2. Darel Ince, H.Sharp and M.Woodman - Introduction to Software Project Management and Quality Assurance - Tata McGraw Hill. Reference Books 3. Ramesh.Gopalaswamy - Managing Global Projects - Tata MCGraw Hill - 2001 4. Humphrey, Watts - Managing the software process - Addison Wesley - 1986 5. Pressman : Software Engineering - A Practitioners approach - McGraw Hill - 1997 6. DeMarco and Lister - Peopleware Mode of Evaluation: By Assignment, Seminars and Written Examinations.
89
90
Aim To learn the fundamental principles and practices concepts of cleanroom software engineering Objective To understand and apply cleanroom software engineering in a given real-life scenario. Cleanroom Software Engineering Fundamentals Cleanroom Overview. Economic Production of High-Quality Software. Cleanroom Foundations. Cleanroom Technologies. The Cleanroom Process. Relationship of Cleanroom to Other Practices. Cleanroom Project Experience. Cleanroom Management by Incremental Development Benefits of Incremental Development. Theoretical Foundations of Incremental Development. Increment Planning in Practice. Incremental Development in Practice. Cleanroom Software Specification Box Structures for Cleanroom Specification and Design. The Sequence-Based Specification Process. Cleanroom Software Development. Box Structure Development. Clear Box Development. Clear Box Verification. Example: The Security Alarm Clear Box. Cleanroom Software Certification Benefits of Statistical Testing Based on a Usage Model. Theoretical Foundations of Statistical Testing. Statistical Usage Testing in Practice. Example: Security Alarm. The Cleanroom Software Engineering Referen Model The Cleanroom Reference Model. An Introduction to the CRM. Cleanroom Process Definition Format. Common Cleanroom Process Elements. Cleanroom Management Processes. Project Planning Process. Project Management Process. Performance Improvement Process. Engineering Change Process. Cleanroom Specification Processes. Requirements Analysis Process. Function Specification Process. Usage Specification Process. Architecture Specification Process. Increment Planning Process. Cleanroom Development Processes. Software Reengineering Process. Increment Design Process. Correctness Verification Process. Cleanroom Certification Processes. Usage Modeling and Test Planning Process. Statistical Testing and Certification Process. Cleanroom and the Capability Maturity Model for Software. The CMM for Software. Cleanroom Process Mappings to CMM KPAs. Integrating CRM Technology and CMM Management. A CASE STUDY IN CLEANROOM SOFTWARE ENGINEERING. Satellite Control System Requirements. The Satellite Control System Case Study. TEXT BOOKS: 1. Stacey J. Prowell, Carmen J. Trammell, Richard C. Linger, and Jesse H. Poore - Cleanroom Software Engineering: Technology and Process Mode of Evaluation: By Assignment, Seminars and Written Examinations
91
05MSEE24 - DOMAIN ENGINEERING L 4 Aim To learn the fundamental principles of domain engineering Objective To understand and apply domain engineering in a given real-life scenario. Domain Engineering Basics: Domain Engineering Application Engineering System Life-Cycle Models Developing a Domain Architectural Model The Reusability Process: Domain Repositories Establishing a Reusable Repository Domain Specific Repository (DSR) Domain Repository and Application Development Domain Models: Domain Prototype Model Domain Functional Model Domain Dynamic Model Domain Object Model Domain information model Domain Data Dictionary (All models with case study). Domain Analysis Process: concepts- Benefits of Domain analysis Domain Analysis for Reusability KAPTUR Design Recovery Integrated Computer Aided Manufacturing (ICAM) Definition (IDEF) Process model Feature Oriented Domain Analysis (FODA): Concepts Modeling Techniques Product Parameterization Levels of Abstraction FODA Context Analysis FODA domain modeling FODA Architecture Modeling Joint Object Oriented Domain Analysis (JODA): JODA Context for Domain Analysis JODA Application Engineering JODA Process- JODA Products Domain Design Process: Domain Design The Object oriented Domain Design Methods The Object Oriented Method. Domain Implementation: Object Oriented Life Cycle Model ASSET Collection Selection Criteria for Reuse Assets Asset Submitting Schema Asset Certification Levels of Certification Assessing the Repository for an Asset The Reuse Asset Anomaly Process Collection of Metrics TEXT BOOKS: 1. Jag Sodhi, Prince Sodhi Software Reuse (Domain Analysis and Design Processes. 2. R. Glowinski , J. Perieaux , z- cshi Domain Decomposition Methods in Sciences and Engineering John Willionsons 1997. Mode of Evaluation: By Assignment, Seminars and Written Examinations T P C 3
92
T -
P -
C 3