06-Computer Science Engieering
06-Computer Science Engieering
2009-2010 Batch
PAPER-I
PAPER-II
S.No Subject name CODE
1 ADHOC AND SENSOR NETWORKS R90651
2 DATA WAREHOUSING AND MINING R90652
3 DISTRIBUTED DATA BASES R90653
4 GRID COMPUTING R90654
5 INFORMATION RETRIEVAL SYSTEMS R90655
6 NATURAL LANGUAGE PROCESSING R90656
7 PARALLEL ALGORITHMS R90657
8 REMOTE SENSING & GIS R90658
9 ROBOTICS AND MACHINE VISION R90659
SOFTWARE ARCHITECTURE AND DESIGN R90660
10 PATTERNS
SOFTWARE PROCESS AND PROJECT R90661
11 MANAGEMENT
12 WEB DATA MINING R90662
13 WEB SECURITY R90663
14 WIRELESS NETWORKS R90664
WIRELESS SECURITY R90665
15
Syllabi for Pre.PhD/Pre M.Phil/Pre MS. W.e.f. 2009-2010 Batch
UNIT I : Overview of Compilation: Phases of Compilation – Lexical Analysis, Regular Grammar and
regular expression for common programming language features, pass and Phases of translation,
interpretation, bootstrapping, data structures in compilation – LEX lexical analyzer generator.
UNIT II : Parsing: Context free grammars, Top down parsing – Backtracking, LL (1), recursive descent
parsing, Predictive parsing, Preprocessing steps required for predictive parsing.
Bottom up parsing: - Shift Reduce parsing, LR and LALR parsing, Error recovery in parsing , handling
ambiguous grammar, YACC – automatic parser generator.
UNIT III : Semantic analysis: Intermediate forms of source Programs – abstract syntax tree, Attributed
grammars, Syntax directed translation, Conversion of popular Programming languages language
Constructs into Intermediate code forms, Type checker.
Symbol Tables: Symbol table format, organization for block structured languages, hashing, tree structures
representation of scope information. Block structures and non block structure storage allocation: static,
Runtime stack and heap storage allocation, storage allocation for arrays, strings and records.
UNIT IV : Code Generation- Processing the intermediate Code- Interpretation, Code generation, Simple
code generation, code generation for basic blocks, BURS Code generation and dynamic programming,
Register allocation by graph coloring, Evaluation of code generation techniques Preprocessing the
intermediate code, post processing the target code, machine code generation.
Code optimization: Consideration for Optimization, Machine dependent and machine independent code
optimization, Scope of Optimization, local optimization, loop optimization, frequency reduction, folding,
DAG representation.
UNIT V : Data flow analysis: Dataflow Analysis, Intermediate representation for flow analysis ,
Various dataflow analyses , Transformations using dataflow analysis Speeding up dataflow analysis , Alias
analysis.
Loop Optimizations – Dominators, Loop-invariant computations, Induction variables, Array bounds
checks, Loop unrolling
TEXT BOOKS :
1. Principles of compiler design -A.V. Aho . J.D.Ullman; Pearson Education
2. Modern Compiler Design- Dick Grune, Henry E. Bal, Cariel T. H. Jacobs, Wiley dreamtech.
REFERENCE BOOKS :
1. Advanced Compiler Design Implementation,S.S.Muchnick,Elsevier.
2. Compilers principles, techniques and tools A.V.Aho,Ravi Sethi& J.D. Ullman; Pearson ed.,
3. lex &yacc – John R. Levine, Tony Mason, Doug Brown, O’reilly
4. Modern Compiler Implementation in C- Andrew N. Appel, Cambridge University Press.
5. Engineering a Compiler-Cooper & Linda, Elsevier.
6. Compiler Construction, Louden, Thomson.
*****
Syllabi for Pre.PhD/Pre M.Phil/Pre MS. W.e.f. 2009-2010 Batch
UNIT I
Fundamentals of Computer design, Changing faces of computing and task of computer designer,
Technology trends, Cost price and their trends, measuring and reporting performance, quantitative
principles of computer design, Amdahl’s law.
(ch: 1.2, 1.3 , 1.4,1.5, 1.6)
Instruction set principles and examples- Introduction, classifying instruction set- memory addressing- type
and size of operands, operations in the instruction set.
(ch: 2.1,2.2,2.3,2.5,2.7)
UNIT II
Pipelines : Introduction ,basic RISC instruction set ,Simple implementation of RISC instruction set,
Classic five stage pipe line for RISC processor, Basic performance issues in pipelining , Pipeline hazards,
Reducing pipeline branch penalties. (ch :A.1, A.2)
Memory hierarchy design : Introduction, review of ABC of cache, Cache performance , Reducing
cache miss penalty, Virtual memory. (ch :5 .2,5.3, 5.4,5.10)
UNIT III
Instruction level parallelism the hardware approach - Instruction-level parallelism, Dynamic
scheduling, Dynamic scheduling using Tomasulo’s approach, Branch prediction,high performance
instruction delivery- hardware based speculation. (ch :3.1,3.2, 3.3, 3.4, 3.7) ILP software approach-
Basic compiler level techniques, static branch predection, VLIW approach, Exploiting ILP, Parallelism at
compile time, Cross cutting issues -Hardware verses Software. (ch : 4.1, 4.2, 4.3,4.4, 4.5,4.6)
UNIT IV
Multi Processors and Thread level Parallelism- Introduction, Charctersitics of application domain,
Systematic shared memory architecture, Distributed shared – memory architecture, Synchronization.
(ch : 6.1, 6.2, 6.3, 6.5 ,6.7)
UNIT V
Inter connection and networks – Introduction, Interconnection network media, Practical issues in
interconnecting networks, Examples of inter connection, Cluster , Designing of clusters. (ch:
8.1,8.3,8.6,8.7,8.10,8.11)
Intel architecture : intel IA- 64 ILP in embedded and mobile markets Fallacies and pit falls (ch: 4.7,
4.8, 4.9)
TEXT BOOKS :
1. John L. Hennessy, David A. Patterson, Computer Architecture: A Quantitative Approach, 3rd
Edition, An Imprint of Elsevier.
REFERENCE BOOKS :
1. John P. Shen and Miikko H. Lipasti, Modern Processor Design : Fundamentals of Super Scalar
Processors,Mc Graw Hill.
2. Computer Architecture and Parallel Processing ,Kai Hwang, Faye A.Brigs., Mc Graw Hill.,
3. Advanced Computer Architecture - A Design Space Approach, Dezso Sima, Terence Fountain, Peter
Kacsuk ,Pearson ed.
*****
Syllabi for Pre.PhD/Pre M.Phil/Pre MS. W.e.f. 2009-2010 Batch
Subject Code: R90603
UNIT II
The Link Layer and Local Area Networks: Link Layer: Introduction and Services, Error-Detection and
Error-Correction techniques, Multiple Access Protocols, Link Layer Addressing, Ethernet,
Interconnections: Hubs and Switches, PPP: The Point-to-Point Protocol, Link Virtualization - Routing
and Internetworking: Network–Layer Routing, Least-Cost-Path algorithms, Non-Least-Cost-Path
algorithms, Intradomain Routing Protocols, Interdomain Routing Protocols, Congestion Control at
Network Layer
UNIT III
Logical Addressing: IPv4 Addresses, IPv6 Addresses - Internet Protocol: Internetworking, IPv4, IPv6,
Transition from IPv4 to IPv6 – Multicasting Techniques and Protocols: Basic Definitions and
Techniques, Intradomain Multicast Protocols, Interdomain Multicast Protocols, Node-Level Multicast
algorithms - Transport and End-to-End Protocols: Transport Layer, Transmission Control Protocol
(TCP), User Datagram Protocol (UDP), Mobile Transport Protocols, TCP Congestion Control –
Application Layer: Principles of Network Applications, The Web and HTTP, File Transfer: FTP,
Electronic Mail in the Internet, Domain Name System (DNS), P2P File Sharing, Socket Programming with
TCP and UDP, Building a Simple Web Server
UNIT IV
Wireless Networks and Mobile IP: Infrastructure of Wireless Networks, Wireless LAN Technologies,
IEEE 802.11 Wireless Standard, Cellular Networks, Mobile IP, Wireless Mesh Networks (WMNs) -
Optical Networks and WDM Systems: Overview of Optical Networks, Basic Optical Networking
Devices, Large-Scale Optical Switches, Optical Routers, Wavelength Allocation in Networks, Case Study:
An All-Optical Switch
UNIT V
VPNs, Tunneling and Overlay Networks: Virtual Private Networks (VPNs), Multiprotocol Label
Switching (MPLS), Overlay Networks – VoIP and Multimedia Networking: Overview of IP Telephony,
VoIP Signaling Protocols, Real-Time Media Transport Protocols, Distributed Multimedia Networking,
Stream Control Transmission Protocol - Mobile A-Hoc Networks: Overview of Wireless Ad-Hoc
Networks, Routing in Ad-Hoc Networks, Routing Protocols for Ad-Hoc Networks – Wireless Sensor
Networks: Sensor Networks and Protocol Structures, Communication Energy Model, Clustering
Protocols, Routing Protocols
TEXT BOOKS:
1. Computer Networking: A Top-Down Approach Featuring the Internet, James F. Kurose, Keith
W.Ross, Third Edition, Pearson Education, 2007
2. Computer and Communication Networks, Nader F. Mir, Pearson Education, 2007
REFERENCES:
1. Data Communications and Networking, Behrouz A. Forouzan, Fourth Edition, Tata McGraw Hill,
2007
2. Guide to Networking Essentials, Greg Tomsho,Ed Tittel, David Johnson,Fifth Edition, Thomson.
3. An Engineering Approach to Computer Networking , S.Keshav, Pearson Education.
4. Campus Network Design Fundamentals, Diane Teare, Catherine Paquet, Pearson
Education (CISCO Press)
5. Computer Networks, Andrew S. Tanenbaum, Fourth Edition, Prentice Hall.
6. The Internet and Its Protocols, A. Farrel, Elsevier.
*****
Syllabi for Pre.PhD/Pre M.Phil/Pre MS. W.e.f. 2009-2010 Batch
*****
Syllabi for Pre.PhD/Pre M.Phil/Pre MS. W.e.f. 2009-2010 Batch
Subject Code: R90605
UNIT II
LEARNING PROCESS 2: Competitive, Boltzmann learning, Credit Asssignment Problem, Memory,
Adaption, Statistical nature of the learning process, (p. no’s 50 –116)
SINGLE LAYER PERCEPTRONS – Adaptive filtering problem, Unconstrained Organization
Techniques, Linear least square filters, least mean square algorithm, learning curves, Learning rate
annealing techniques, perceptron –convergence theorem, Relation between perceptron and Bayes classifier
for a Gaussian Environment (p. no’s 117 –155)
UNIT III
MULTILAYER PERCEPTRON – Back propagation algorithm XOR problem, Heuristics, Output
representation and decision rule, Comuter experiment, feature detection, (p. no’s 156 –201)
BACK PROPAGATION - back propagation and differentiation, Hessian matrix, Generalization, Cross
validation, Network pruning Techniques, Virtues and limitations of back propagation learning, Accelerated
convergence, supervised learning. (p. no’s 202 –234)
UNIT IV
SELF ORGANIZATION MAPS – Two basic feature mapping models, Self organization map, SOM
algorithm, properties of feature map, computer simulations, learning vector quantization, Adaptive patter
classification, Hierechel Vector quantilizer, contexmel Maps (p. no’s 443 –469, 9.1 –9.8 )
UNIT V
NEURO DYNAMICS – Dynamical systems, stavility of equilibrium states, attractors, neurodynamical
models , manipulation of attarctors as a recurrent network paradigm (p. no’s 664 –680, 14.1 –14.6 )
HOPFIELD MODELS – Hopfield models, computer experiment I (p. no’s 680-701, 14.7 –14.8)
TEXT BOOKS:
1. Neural networks A comprehensive foundations, Simon Hhaykin, Pearson Education 2nd Edition 2004
REFERENCE BOOKS
1. Artifical neural networks - B.Vegnanarayana Prentice Halll of India P Ltd 2005
2. Neural networks in Computer intelligence, Li Min Fu TMH 2003
3. Neural networks James A Freeman David M S kapura pearson education 2004
*****
Syllabi for Pre.PhD/Pre M.Phil/Pre MS. W.e.f. 2009-2010 Batch
UNIT-II
Local search Algorithms, Hill climbing, simulated, annealing search, local beam search, genetical
algorithms. Constrain satisfaction problems: Backtracking search for CSPs local search for constraint
satisfaction problems.
Game Playing: Adversial search, Games, minimax, algorithm, optimal decisions in multiplayer games,
Alpha-Beta pruning, Evaluation functions, cutting of search.
UNIT-III
Knowledge Representation & Reasons logical Agents, Knowledge – Based Agents, the Wumpus world,
logic, propositional logic, Resolution patterns in propos ional logic, Resolution, Forward & Backward.
Chaining.
First order logic. Inference in first order logic, propositional Vs. first order inference, unification & lifts
forward chaining, Backward chaining, Resolution.
UNIT-IV
Planning – Classical planning problem, Language of planning problems,
Expressiveness and extension, planning with state – space search, Forward states spare search, Backward
states space search, Heuristics for stats space search. Planning search, planning with state space search,
partial order planning Graphs.
UNIT-V
Learning – Forms of learning, Induction learning, Learning Decision Tree, Statistical learning methods,
learning with complex data, learning with Hidden variables – The EM Algorithm, Instance Based learning,
Neural Networks.
TEXT BOOKS:
1. Artificial Intelligence – A Modern Approach. Second Edition, Stuart Russel,
Peter Norvig, PHI/Pearson Education.
2. Artificial Intelligence, 3rd Edition, Patrick Henry Winston., Pearson Edition,
REFERENCE:
1. Artificial Intelligence , 2nd Edition, E.Rich and K.Knight (TMH).
2. Artificial Intelligence and Expert Systems – Patterson PHI
3. Expert Systems: Principles and Programming- Fourth Edn, Giarrantana/ Riley, Thomson
4. PROLOG Programming for Artificial Intelligence. Ivan Bratka- Third Edition – Pearson Education.
*****
Syllabi for Pre.PhD/Pre M.Phil/Pre MS. W.e.f. 2009-2010 Batch
UNIT II
Statistical and spatial operations, Grey level transformations, histogram equalization, smoothing &
sharpening-spatial filters, frequency domain filters, homomorphic filtering, image filtering & restoration.
Inverse and weiner filtering. FIR weiner filter.
Filtering using image transforms, smoothing splines and interpolation.
UNIT III
Morphological and other area operations, basic morphological operations, opening and closing operations,
dilation erosion, Hit or Miss transform, morphological algorithms, extension to grey scale images.
Segmentation and Edge detection region operations, basic edge detection, second order detection, crack
edge detection, gradient operators, compass and laplace operators, edge linking and boundary detection,
thresholding, region based segmentation, segmentation by morphological watersheds.
UNIT IV
Image compression: Types and requirements, statistical compression, spatial compression, contour
coding, quantizing compression, image data compression-predictive technique, pixel coding, transfer
coding theory, lossy and lossless predictive type coding.
Basics of color image processing, pseudocolor image processing, color transformation, color smoothing
and sharpening, color segmentation, color image compression, compression standards.
UNIT V
Image Transforms - Fourier, DFT, DCT, DST, Haar, Hotelling, Karhunen -Loeve, Walsh, Hadamard,
Slant. Representation and Description - Chain codes, Polygonal approximation, Signatures Boundary
Segments, Skeltons, Boundary Descriptors, Regional Descriptors, Relational Descriptors, PCA.
TEXT BOOKS:
1. Digital Image Processing – by Rafael.C.Gonzalez & Richard E.Woods, 3rd edition, Pearson Education,
2008
2. Fundamentals of Digital Image Processing – by A.K. Jain, PHI
REFERENCES:
1. Digital Image Processing – William K, Part I - John Wiley edition.
2. Digital Image Processing using MATLAB – by Rafael.C.Gonzalez, Richard E.Woods, & Steven
L.Eddins, Pearson Education, 2006
3. Digital Image Processing, Kenneth R. Castleman, Pearson Education, 2007
*****
Syllabi for Pre.PhD/Pre M.Phil/Pre MS. W.e.f. 2009-2010 Batch
Subject Code: R90608
DISTRIBUTED SYSTEMS
UNIT I
Characterization of Distributed Systems. Design Issues, User Requirement, Network Technologies and
Protocols, IPC, Client-Server Communication, Group Communication, IPC in UNIX - Remote Procedure
Calling, Design issues, Implementation, Asynchronous RPC
UNIT II
Distributed OS, Its kernel, Processes and Threads, Naming and Protection, Communication and Invocation,
Virtual Memory, File Service components, Design issues, Interfaces, implementation techniques, SUN
network file systems
UNIT III
SNS – a name service model, its design issues, Synchronizing physical clocks, Logical time and logical
clocks, Distributed coordination. Replication and its architectural model, Consistency and request ordering,
Conversation between a client and a server, Transactions, Nested Transactions - Concurrency control,
Locks, Optimistic concurrency control, Timestamp ordering, Comparison of methods for concurrency
control.
UNIT IV
Distributed Transactions and Nested Transactions, Atomic commit protocols, Concurrency control in
distributed transactions, distributed Deadlocks, Transactions with replicated data, Transaction recovery,
Fault tolerance, Hierarchical and group masking of faults - Cryptography, Authentication and key
distribution, Logics of Authentication, Digital signatures.
UNIT V
Distributed shared memory, Design and Implementation issues, Sequential consistency and ivy, Release
consistency and Munin, Overview of Distributed Operating systems Mach, Chorus.
TEXT BOOKS:
1. Distributed Systems Concepts and Design, G Coulouris, J Dollimore and T Kindberg, Third Edition,
Pearson Education.
REFERENCES:
1 Advanced Concepts in Operating Systems, M Singhal, N G Shivarathri, Tata McGraw-Hill Edition.
Distributed Systems – Principles and Paradigms, A.S. Tanenbaum and M.V. Steen, Pearson Education.
*****
Syllabi for Pre.PhD/Pre M.Phil/Pre MS. W.e.f. 2009-2010 Batch
Subject Code: R90609
EMBEDDED SYSTEMS
UNIT I
Introduction to Embedded Systems: Embedded Systems, Processor Embedded into a System,
Embedded Hardware Units and Devices in a System, Embedded Software, Complex System Design,
Design Process in Embedded System, Formalization of System Design, Classification of Embedded
Systems
UNIT II
8051 and Advanced Processor Architecture: 8051 Architecture, 8051 Micro controller Hardware,
Input/Output Ports and Circuits, External Memory, Counter and Timers, Serial data Input/Output,
Interrupts, Introduction to Advanced Architectures, Real World Interfacing, Processor and Memory
organization - Devices and Communication Buses for Devices Network: Serial and parallel Devices &
ports, Wireless Devices, Timer and Counting Devices, Watchdog Timer, Real Time Clock, Networked
Embedded Systems, Internet Enabled Systems, Wireless and Mobile System protocols
UNIT III
Embedded Programming Concepts: Software programming in Assembly language and High Level
Language, Data types, Structures, Modifiers, Loops and Pointers, Macros and Functions, object oriented
Programming, Embedded Programming in C++ & JAVA
UNIT IV
Real – Time Operating Systems: OS Services, Process and Memory Management, Real – Time
Operating Systems, Basic Design Using an RTOS, Task Scheduling Models, Interrupt Latency, Response
of Task as Performance Metrics - RTOS Programming: Basic functions and Types of RTOSES, RTOS
VxWorks, Windows CE
UNIT V
Embedded Software Development Process and Tools: Introduction to Embedded Software Development
Process and Tools, Host and Target Machines, Linking and Locating Software, Getting Embedded
Software into the Target System, Issues in Hardware-Software Design and Co-Design - Testing,
Simulation and Debugging Techniques and Tools: Testing on Host Machine, Simulators, Laboratory
Tools
TEXT BOOKS:
1. Embedded Systems, Raj Kamal, Second Edition TMH.
REFERENCES:
1. Embedded/Real-Time Systems, Dr.K.V.K.K.Prasad, dreamTech press
2. The 8051 Microcontroller and Embedded Systems, Muhammad Ali Mazidi, Pearson.
3. The 8051 Microcontroller, Third Edition, Kenneth J.Ayala, Thomson.
4. An Embedded Software Primer, David E. Simon, Pearson Education.
5. Micro Controllers, Ajay V Deshmukhi, TMH.
6. Microcontrollers, Raj kamal, Pearson Education.
7. Introduction to Embedded Systems,Shibu K.V,TMH.
*****
Syllabi for Pre.PhD/Pre M.Phil/Pre MS. W.e.f. 2009-2010 Batch
Subject Code: R90610
INFORMATION SECURITY
UNIT I
Security Goals, Security Attacks (Interruption, Interception, Modification and Fabrication), Security
Services (Confidentiality, Authentication, Integrity, Non-repudiation, access Control and Availability) and
Mechanisms, A model for Internetwork security, Internet Standards and RFCs.
UNIT II
Conventional Encryption Principles & Algorithms(DES, AES, RC4), Block Cipher Modes of Operation,
Location of Encryption Devices, Key Distribution,
Public key cryptography principles, public key cryptography algorithms(RSA, RABIN, ELGAMAL,
Diffie-Hellman, ECC), Key Distribution.
UNIT III
Approaches of Message Authentication, Secure Hash Functions(SHA-512, WHIRLPOOL) and HMAC
Digital Signatures: Comparison, Process- Need for Keys, Signing the Digest, Services, Attacks on Digital
Signatutres, Kerberos, X.509 Directory Authentication Service.
UNIT IV
Email Security: Pretty Good Privacy (PGP) and S/MIME.
IP Security Overview, IP Security Architecture, Authentication Header, Encapsulating Security Payload,
Combining Security Associations and Key Management
Web Security Requirements, Secure Socket Layer (SSL) and Transport Layer Security (TLS), Secure
Electronic Transaction (SET).
UNIT V
Basic concepts of SNMP, SNMPv1 Community facility and SNMPv3, Intruders, Viruses and related
threats, Virus Countermeasures
Firewall Design principles, Trusted Systems, Intrusion Detection Systems
TEXT BOOKS :
1. Network Security Essentials (Applications and Standards) by William Stallings Pearson Education,
2008.
2.Cryptography & Network Security by Behrouz A. Forouzan, TMH 2007.
REFERENCE BOOKS :
1. Information Security by Mark Stamp, Wiley – India, 2006.
2. Information Systems Security,Godbole,Wiley Student Edition.
3. Cryptography and Network Security by William Stallings, Fourth Edition,Pearson Education 2007.
4. Fundamentals of Computer Security , Springer.
5. Network Security: The complete reference, Robert Bragg, Mark Rhodes, TMH
6. Computer Security Basics by Rick Lehtinen, Deborah Russell & G.T.Gangemi Sr., SPD O’REILLY
2006.
7. Modern Cryptography by Wenbo Mao, Pearson Education 2007.
8. Principles of Information Security, Whitman, Thomson.
*****
Syllabi for Pre.PhD/Pre M.Phil/Pre MS. W.e.f. 2009-2010 Batch
*****
Syllabi for Pre.PhD/Pre M.Phil/Pre MS. W.e.f. 2009-2010 Batch
Subject Code: R90612
MOBILE COMPUTING
UNIT I
Introduction to Network Technologies and Cellular Communications:
HIPERLAN: Protocol architecture, physical layer, Channel access control sub-layer, MAC sub-layer,
Information bases and networking
WLAN: Infrared vs. radio transmission, Infrastructure and ad hoc networks, IEEE 802.11. Bluetooth.:
User scenarios, Physical layer, MAC layer, Networking, Security, Link management
GSM: Mobile services, System architecture, Radio interface, Protocols, Localization
and calling, Handover, Security, and New data services.
Mobile Computing (MC): Introduction to MC, novel applications, limitations, and architecture
UNIT II
(Wireless) Medium Access Control: Motivation for a specialized MAC (Hidden and exposed terminals,
Near and far terminals), SDMA, FDMA, TDMA, CDMA.
Mobile Network Layer: Mobile IP (Goals, assumptions, entities and terminology, IP packet delivery,
agent advertisement and discovery, registration, tunneling and encapsulation, optimizations), Dynamic
Host Configuration Protocol (DHCP).
UNIT III
Mobile Transport Layer: Traditional TCP, Indirect TCP, Snooping TCP, Mobile TCP, Fast
retransmit/fast recovery, Transmission /time-out freezing, Selective retransmission, Transaction oriented
TCP.
Database Issues: Hoarding techniques, caching invalidation mechanisms, client server computing with
adaptation, power-aware and context-aware computing, transactional models, query processing, recovery,
and quality of service issues.
UNIT IV
Data Dissemination: Communications asymmetry, classification of new data delivery mechanisms, push-
based mechanisms, pull-based mechanisms, hybrid mechanisms, selective tuning (indexing) techniques.
Mobile Ad hoc Networks (MANETs): Overview, Properties of a MANET, spectrum of MANET
applications, unicast and multicast routing algorithms, DSR,AoDV, OLSR, CEDAR, ODMRP
UNIT V
Protocols and Tools: security in MANETs, Wireless Application Protocol-WAP. (Introduction, protocol
architecture, and treatment of protocols of all layers), Bluetooth (User scenarios, physical layer, MAC
layer, networking, security, link management) and J2ME.
Text Books:
1. Jochen Schiller, “Mobile Communications”, Pearson Education., second edition, 2004.
2. “Raj kamal, “Mobile Computing”, OXFORD University Press
3. Asoke Talukder, Roopa Yavagal “Mobile Computing”, ISBN: 0070588074, tata McGraw Hill
Reference Books:
1. Reza Behravanfar, “Mobile Computing Principles: Designing and Developing
Mobile Applications with UML and XML”, ISBN: 0521817331, Cambridge
University Press, October 2004,
2. C. Siva Ram murthy, B.S. Manoj “Adhoc wireless networks, architectures and protocols” peason
education.
3. Stojmenovic and Cacute, “Handbook of Wireless Networks and Mobile Computing”, Wiley, 2002,
ISBN 0471419028
*****
Syllabi for Pre.PhD/Pre M.Phil/Pre MS. W.e.f. 2009-2010 Batch
*****
Syllabi for Pre.PhD/Pre M.Phil/Pre MS. W.e.f. 2009-2010 Batch
Subject Code: R90614
Unit V:
Building SOA(Technology and Design)
Service Oriented Design(Part I-Introduction)-Introduction to Service-Oriented design,WSDL related XML
Schema language basics,WSDL language basics,Service interface design tools. Service Oriented
Design(Part II-SOA Composition Guidelines)-SOA Composing steps,Considerations for choosing service
layers,Considerations for positioning core SOA standards,Considerations for choosing SOA extensions.
Service Oriented Design(Part III- Service Design)-Service Design overview,Entity-centric business Service
Design,Application Service Design,Task-centric business Service Design, Service Design guidelines.
Service Oriented Design(Part IV-Business Process Design)-WS-BPEL language basics,WS- Coordination
overview, Service Oriented Business process Design.Fundamental WS-* Extensions-WS-Addressing
language basics,WS-Reliable Messaging language basics,WS-Policy language basics,WS-
MetadataExchange language basics,WS-Security language basics. SOA Platforms-SOA platform
basics,SOA support in J2EE and .NET,Integration considerations.
TEXT BOOKS:
1. Service-Oriented Architecture-Concepts,Technology,and Design,Thomas Erl,Pearson
Education.
2. Understanding SOA with Web Services,Eric Newcomer,Greg Lomow,Pearson
Education.
REFERENCE BOOKS:
1. The Definitive guide to SOA,Jeff Davies&others,Apress,Dreamtech.
2. Java SOA Cook book,E.Hewitt,SPD.
3. SOA in Practice,N.M.Josuttis,SPD.
4. Applied SOA,M.Rosen and others,Wiley India pvt. Ltd.
5. Java Web Services Architecture,J.Mc Govern,and others,Morgan Kaufmann Publishers,Elsevier.
6. SOA for Enterprise Applications,Shankar.K,Wiley India Edition.
7. SOA-Based Enterprise Integration,W.Roshen,TMH.
8. SOA Security,K.Rama Rao,C.Prasad,dreamtech press.
*****
Syllabi for Pre.PhD/Pre M.Phil/Pre MS. W.e.f. 2009-2010 Batch
Subject Code: R90615
SOFTWARE DESIGN AND ENGINEERING
UNIT I
Introduction to Software Engineering: The evolving role of software, Changing Nature of Software,
legacy software, Software myths.A Generic view of process: Software engineering- A layered technology,
a process framework, The Capability Maturity Model Integration (CMMI), Process patterns, process
assessment, personal and team process models.Process models: The waterfall model, Incremental process
models, Evolutionary process models, Specialized process models, The Unified process.
Software Requirements: Functional and non-functional requirements, User requirements, System
requirements, Interface specification, the software requirements document.Requirements engineering
process: Feasibility studies, Requirements elicitation and analysis, Requirements validation, Requirements
management.
UNIT II
Role of Software Design
The nature of the design process, transferring design knowledge, constraints upon the design process and
product, recording design decisions, designing with others, context for design, economic factors, assessing
design qualities, quality attributes of the design product, assessing the design process.
Transferring Design Knowledge-Representing abstract ideas, design viewpoints, the architecture concept,
design methods, design patterns, Design representations, rationale for design methods.
Design Processes and Strategies: The role of strategy in design methods, describing the design process –
The D – Matrix, design by top-down decomposition, design by composition, organizational influences
upon design.
UNIT III
Designing with objects and components
Designing with objects: design practices for object-oriented paradigm, Object- oriented frame works,
Hierarchial object oriented design process and heuristics, the fusion method, the unified process.
Component – based design: The component concept, designing with components, designing components,
COTS.Performing User interface design-The Golden rules, Interface analysis and design models, user
and task analysis, analysis of display content and work environment, applying interface design steps, user
interface design issues, design evaluation.
UNIT IV
Project Management and Metrics
Project Management : The management spectrum: people, product, process and project, W5HH principle,
critical practices.
Metrics for Process and Projects: Process metrics, project metrics, size-oriented metrics, function-
oriented metrics, Object-oriented and use-case metrics, metrics for software quality, integrating metrics
with in the software process.
UNIT V
Project Scheduling and Risk Management
Project Scheduling: Basic concepts, project scheduling, defining a task set and task network, timeline
charts, tracking the schedule, tracking the progress for an OO project, Earned value analysis.
Risk Management: Reactive Vs. Proactive risk strategies, software risks, risk identification, risk
projection, risk refinement, risk mitigation and monitoring, the RMMM plan.
TEXT BOOKS :
1. Software design, David Budgen, second edition, Pearson education, 2003.
2. Software Engineering :A practitioner’s Approach, Roger S Pressman, seventh edition. McGrawHill
International Edition, 2009.
Cont---2
Syllabi for Pre.PhD/Pre M.Phil/Pre MS. W.e.f. 2009-2010 Batch
-2-
Subject Code: R90615
REFERENCE BOOKS :
1. Applying domain – driven design and patterns, Jimmy Nilsson, Pearson education,2006
2. Software Engineering, Ian Sommerville, seventh edition, Pearson education,2004.
3 Software Project Management, Bob Hughes & Mike Cotterell, fourth edition,Tata Mc-Graw Hill,2006
4. The art of Project management, Scott Berkun, O’Reilly, 2005.
5. Software Engineering Project Management, Richard H. Thayer & Edward Yourdon, second edition,
Wiley India, 2004.
6. Software Engineering Foundations, Yingxu Wang, Auerbach Publications, 2008
7. Applied Software Project Management, Andrew Stellman & Jennifer Greene,O’Reilly, 2006.
8. Software Design,Eric Braude,John Wiley&Sons.
*****
Syllabi for Pre.PhD/Pre M.Phil/Pre MS. W.e.f. 2009-2010 Batch
UNIT I
Introduction to Ad Hoc Networks: Characteristics of MANETs, Applications of MANETs and
challenges of MANETs - Routing in MANETs: Criteria for classification, Taxonomy of MANET routing
algorithms, Topology based routing algorithms, Position based routing algorithms, Other routing
algorithms.
UNIT II
Data Transmission: Broadcast storm problem, Broadcasting, Multicasting and Geocasting - TCP over
Ad Hoc: TCP protocol overview, TCP and MANETs, Solutions for TCP over Ad hoc
UNIT III
Basics of Wireless, Sensors and Applications: Applications, Classification of sensor networks,
Architecture of sensor network, Physical layer, MAC layer, Link layer.
UNIT IV
Data Retrieval in Sensor Networks: Routing layer, Transport layer, High-level application layer support,
Adapting to the inherent dynamic nature of WSNs, Sensor Networks and mobile robots - Security:
Security in Ad Hoc networks, Key management, Secure routing, Cooperation in MANETs, Intrusion
Detection systems.
UNIT V
Sensor Network Platforms and Tools: Sensor Network Hardware, Berkeley motes, Sensor Network
Programming Challenges, Node-Level Software Platforms - Operating System: TinyOS - Imperative
Language: nesC, Dataflow style language: TinyGALS, Node-Level Simulators, ns-2 and its sensor
network extension, TOSSIM
TEXT BOOKS:
1. Ad Hoc and Sensor Networks – Theory and Applications, Carlos Corderio Dharma P.Aggarwal, World
Scientific Publications, March 2006, ISBN – 981-256-681-3
2. Wireless Sensor Networks: An Information Processing Approach, Feng Zhao, Leonidas Guibas, Elsevier
Science, ISBN – 978-1-55860-914-3 ( Morgan Kauffman)
*****
Syllabi for Pre.PhD/Pre M.Phil/Pre MS. W.e.f. 2009-2010 Batch
UNIT V
Mining Object, Spatial, Multimedia, Text and Web Data: Multidimensional Analysis and Descriptive
Mining of Complex Data Objects, Spatial Data Mining, Multimedia Data Mining, Text Mining, Mining the
World Wide Web. - Applications and Trends in Data Mining: Data Mining Applications, Data Mining
System Products and Research Prototypes, Additional Themes on Data Mining and Social Impacts of Data
Mining.
TEXT BOOKS:
1. Data Mining – Concepts and Techniques - Jiawei Han & Micheline Kamber, Morgan Kaufmann
Publishers, 2nd Edition, 2006.
2. Introduction to Data Mining – Pang-Ning Tan, Michael Steinbach and Vipin Kumar, Pearson
education.
REFERENCES:
1. Data Warehousing in the Real World – Sam Aanhory & Dennis Murray Pearson Edn Asia.
2. Data Warehousing Fundamentals – Paulraj Ponnaiah Wiley student Edition
3. The Data Warehouse Life cycle Tool kit – Ralph Kimball Wiley student edition
4. Building the Data Warehouse By William H Inmon, John Wiley & Sons Inc, 2005.
5. Data Mining Introductory and advanced topics –Margaret H Dunham, Pearson education
6. Data Mining Techniques – Arun K Pujari, University Press.
*****
Syllabi for Pre.PhD/Pre M.Phil/Pre MS. W.e.f. 2009-2010 Batch
DISTRIBUTED DATABASES
UNIT I
Features of Distributed versus Centralized Databases, Principles of Distributed Databases, Levels Of
Distribution Transparency, Reference Architecture for Distributed Databases, Types of Data
Fragmentation, Integrity Constraints in Distributed Databases, Distributed Database Design
UNIT II
Translation of Global Queries to Fragment Queries, Equivalence transformations for Queries,
Transforming Global Queries into Fragment Queries, Distributed Grouping and Aggregate Function
Evaluation, Parametric Queries.
Optimization of Access Strategies, A Framework for Query Optimization, Join Queries, General Queries
UNIT III
The Management of Distributed Transactions, A Framework for Transaction Management, Supporting
Atomicity of Distributed Transactions, Concurrency Control for Distributed Transactions, Architectural
Aspects of Distributed Transactions
Concurrency Control, Foundation of Distributed Concurrency Control, Distributed Deadlocks,
Concurrency Control based on Timestamps, Optimistic Methods for Distributed Concurrency Control.
UNIT IV
Reliability, Basic Concepts, Nonblocking Commitment Protocols, Reliability and concurrency Control,
Determining a Consistent View of the Network, Detection and Resolution of Inconsistency, Checkpoints
and Cold Restart, Distributed Database Administration, Catalog Management in Distributed Databases,
Authorization and Protection
UNIT V
Architectural Issues, Alternative Client/Server Architectures, Cache Consistency, Object Management,
Object Identifier Management, Pointer Swizzling, Object Migration, Distributed Object Storage, Object
Query Processing, Object Query Processor Architectures, Query Processing Issues, Query Execution,
Transaction Management, Transaction Management in Object DBMSs, Transactions as Objects
Database Integration, Scheme Translation, Scheme Integration, Query Processing Query Processing
Layers in Distributed Multi-DBMSs, Query Optimization Issues Transaction Management Transaction and
Computation Model, Multidatabase Concurrency Control, Multidatabase Recovery, Object Orientation and
Interoperability, Object Management Architecture CORBA and Database interoperability, Distributed
Component Object Model, COM/OLE and Database Interoperability, PUSH-Based Technologies
TEXT BOOKS:
1. Distributed Databases Principles & Systems, Stefano Ceri, Giuseppe Pelagatti,TMH.
2. Principles of Distributed Database Systems, M. Tamer Ozsu, Patrick Valduriez ,
Pearson Education, 2nd Edition.
*****
Syllabi for Pre.PhD/Pre M.Phil/Pre MS. W.e.f. 2009-2010 Batch
UNIT-II
TYPES OF GRIDS
Desktop Grids : Background – Definition – Challenges – Technology – Suitability – Grid server and
practical uses; Clusters and Cluster Grids; HPC Grids; Scientific in sight – application and Architecture –
HPC application development environment and HPC Grids; Data Grids; Alternatives to Data Grid – Data
Grid architecture.
UNIT-III
ARCHITECTURE AND MANAGEMENT
The open Grid services Architecture – Analogy – Evolution – Overview – Building on the OGSA platform
– implementing OGSA based Grids – Creating and Managing services – Services and the Grid – Service
Discovery – Tools and Toolkits – Universal Description Discovery and Integration (UDDI)
UNIT-IV
NATIVE PROGRAMMING AND SOFTWARE APPLICATIONS
Desktop supercomputing – parallel computing – parallel programming paradigms – problems of current
parallel programming paradigms – Desktop supercomputing programming paradigms – parallelizing
existing applications – Grid enabling software applications – Needs of the Grid users – methods of Grid
deployment – Requirements for Grid enabling software – Grid enabling software applications.
UNIT-V
APPLICATIONS , SERVICES AND ENVIRONMENTS
Application integration – application classification – Grid requirements – Integrating applications with
Middleware platforms – Grid enabling Network services – managing Grid environments – Managing Grids
– Management reporting – Monitoring – Data catalogs and replica management – portals – Different
application areas of Grid computing.
Text Books:
1. Ahmar Abbas, “ Grid Computing , A Practical Guide to Technology and Applications”, Firewall media ,
2004.
2. Joshy Joseph , Craig Fellenstein , “Grid Computing”, Pearson Education , 2004.
3. Fran Berman, Geoffrey Fox, Tony Hey, “Grid Computing-Making -The Global Infrastructure A
Reality”,John Wiley & Sons Ltd, 2003.
4. Rajkumar Buyya,High Performance Cluster Computing: Architectures and Systems, Vol. 1,PHI,1999
*****
Syllabi for Pre.PhD/Pre M.Phil/Pre MS. W.e.f. 2009-2010 Batch
UNIT I
Introduction: Definition, Objectives, Functional Overview, Relationship to DBMS, Digital libraries and
Data Warehouses, Information Retrieval System Capabilities - Search, Browse, Miscellaneous.
UNIT II
Cataloging and Indexing: Objectives, Indexing Process, Automatic Indexing, Information Extraction,
Data Structures: Introduction, Stemming Algorithms, Inverted file structures, N-gram data structure, PAT
data structure, Signature file structure, Hypertext data structure - Automatic Indexing: Classes of
automatic indexing, Statistical indexing, Natural language, Concept indexing, Hypertext linkages
UNIT III
Document and Term Clustering: Introduction, Thesaurus generation, Item clustering, Hierarchy of
clusters - User Search Techniques: Search statements and binding, Similarity measures and ranking,
Relevance feedback, Selective dissemination of information search, Weighted searches of Boolean
systems, Searching the Internet and hypertext - Information Visualization: Introduction, Cognition and
perception, Information visualization technologies.
UNIT IV
Text Search Algorithms: Introduction, Software text search algorithms, Hardware text search systems.
Information System Evaluation: Introduction, Measures used in system evaluation, Measurement
example – TREC results.
UNIT V
Multimedia Information Retrieval – Models and Languages – Data Modeling, Query Languages,
Indexing and Searching - Libraries and Bibliographical Systems – Online IR Systems, OPACs, Digital
Libraries.
TEXT BOOKS:
1. Information Storage and Retrieval Systems: Theory and Implementation By Kowalski, Gerald,
Mark T Maybury Kluwer Academic Press, 2000.
2. Modern Information Retrival By Ricardo Baeza-Yates, Pearson Education, 2007.
3. Information Retrieval: Algorithms and Heuristics By David A Grossman and Ophir Frieder, 2nd
Edition, Springer International Edition, 2004.
REFERENCES:
1. Information Retrieval Data Structures and Algorithms By William B Frakes, Ricardo Baeza-Yates,
Pearson Education, 1992.
2. Information Storage & Retieval By Robert Korfhage – John Wiley & Sons.
3. Introduction to Information Retrieval By Christopher D. Manning and Prabhakar Raghavan,
Cambridge University Press, 2008.
*****
Syllabi for Pre.PhD/Pre M.Phil/Pre MS. W.e.f. 2009-2010 Batch
Subject Code: R90656
NATURAL LANGUAGE PROCESSING
UNIT I
Introduction and Overview What is Natural Language Processing, hands-on demonstrations. Ambiguity
and uncertainty in language. The Turing test. Regular Expressions Chomsky hierarchy, regular
languages, and their limitations. Finite-state automata. Practical regular expressions for finding and
counting language phenomena. A little morphology. Exploring a large corpus with regex tools.
Programming in Python An introduction to programming in Python. Variables, numbers, strings,
arrays, dictionaries, conditionals, iteration. The NLTK (Natural Language Toolkit) String Edit Distance
and Alignment Key algorithmic tool: dynamic programming, a simple example, use in optimal
alignment of sequences. String edit operations, edit distance, and examples of use in spelling correction,
and machine translation.
UNIT II
Context Free Grammars Constituency, CFG definition, use and limitations. Chomsky Normal Form.
Top-down parsing, bottom-up parsing, and the problems with each. The desirability of combining evidence
from both directions Non-probabilistic Parsing Efficient CFG parsing with CYK, another dynamic
programming algorithms. Earley parser. Designing a little grammar, and parsing with it on some test
data.Probability Introduction to probability theory Joint and conditonal probability, marginals,
independence, Bayes rule, combining evidence. Examples of applications in natural language.
Information Theory The "Shannon game"--motivated by language! Entropy, cross-entropy, information
gain. Its application to some language phenomena.
UNIT III
Language modeling and Naive Bayes
Probabilistic language modeling and its applications. Markov models. N-grams. Estimating the probability
of a word, and smoothing. Generative models of language. Part of Speech Tagging and Hidden Markov
Models , Viterbi Algorithm for Finding Most Likely HMM Path , Dynamic programming with Hidden
Markov Models, and its use for part-of-speech tagging, Chinese word segmentation, prosody, information
extraction, etc.
UNIT IV
ProbabilisticContext Free Grammars
Weighted context free grammars. Weighted CYK. Pruning and beam search.
Parsing with PCFGs
A treebank and what it takes to create one. The probabilistic version of CYK. Also: How do humans parse?
Experiments with eye-tracking. Modern parsers.
Maximum Entropy Classifiers
The maximum entropy principle, and its relation to maximum likelihood. Maximum entropy classifiers
and their application to document classification, sentence segmentation, and other language tasks
UNIT V
Maximum Entropy Markov Models & Conditional Random Fields
Part-of-speech tagging, noun-phrase segmentation and information extraction models that combine
maximum entropy and finite-state machines. State-of-the-art models for NLP.
Lexical Semantics Mathematics of Multinomial and Dirichlet distributions, Dirichlet as a smoothing for
multinomials.
Information Extraction & Reference Resolution- Various methods, including HMMs. Models of
anaphora resolution. Machine learning methods for coreference.
Text Books:
1. "Speech and Language Processing": Jurafsky and Martin, Prentice Hall
2. "Statistical Natural Language Processing"- Manning and Schutze, MIT Press
3. “Natural Language Understanding”. James Allen. The Benajmins/Cummings Publishing Company
References Books:
1. Cover, T. M. and J. A. Thomas: Elements of Information Theory. Wiley.
2. Charniak, E.: Statistical Language Learning. The MIT Press.
3. Jelinek, F.: Statistical Methods for Speech Recognition. The MIT Press.
4. Lutz and Ascher - "Learning Python", O'Reilly
*****
Syllabi for Pre.PhD/Pre M.Phil/Pre MS. W.e.f. 2009-2010 Batch
Subject Code: R90657
PARALLEL ALGORITHMS
Unit-I:
Sequential model, need of alternative model, parallel computational models such as
PRAM, LMCC, Hypercube, Cube Connected Cycle, Butterfly, Perfect Shuffle
Computers, Tree model, Pyramid model, Fully Connected model, PRAM-CREW, EREW models,
simulation of one model from another one.
Unit-II:
Performance Measures of Parallel Algorithms, speed-up and efficiency of PA, Costoptimality, Example to
illustrate Cost-optimal algorithms- such as summation,
Min/Max on various models.
Unit-III:
Parallel Sorting Networks, Parallel Merging Algorithms on CREW/EREW/MCC/,
Parallel Sorting Networks on CREW/EREW/MCC/, linear array
Unit-IV:
Parallel Searching Algorithm, Kth element, Kth element in X+Y on PRAM, Parallel Matrix Transportation
and Multiplication Algorithm on PRAM, MCC, Vector-Matrix Multiplication, Solution of Linear Equation,
Root finding.
Unit-V:
Graph Algorithms - Connected Graphs, search and traversal, Combinatorial Algorithms- Permutation,
Combinations, Derrangements.
BOOK:
1. M.J. Quinn, “Designing Efficient Algorithms for Parallel Computer” by Mc Graw Hill.
*****
Syllabi for Pre.PhD/Pre M.Phil/Pre MS. W.e.f. 2009-2010 Batch
UNIT III
Raster and vector overlay method: point-in-polygon and polygon and polygon-on- polygon problems of
raster and vector overlays – spatial interpolation – GIS for surface analysis – network analysis: shortest
path problem, location – allocation of resources – route tracking.
Models of spatial processes: natural and scale analogue models – conceptual models – mathematical model
– models of physical and environmental processes. Maps as output – alternative cartographic outputs – non
– cartographic outputs – spatial multimedia – delivery mechanism – GIS and spatial decision supports –
maps as decision tools.
UNIT V
Land use/land cover: Corp assessment, disease detection, forestry: types – species identification and
diseases detection.
Soils: soil mapping – soil moisture – soil erosion – reservoir station – soil salinity – soil conservation.
Water resources: surface water resources – water quality monitoring and mapping – water pollution,
identification of ground water potential recharge areas – integrated watershed development.
TEXT BOOKS:
1. Remote sensing and Image interpretation – Lilesand, TM John, Wiley.
REFERENCES:
1. An Introduction to Geographical Information Systems, Ian Heywood, Sarah Cornelius, Steve Carver,
Srinivasa Raju, Pearson Education, 2007
*****
Syllabi for Pre.PhD/Pre M.Phil/Pre MS. W.e.f. 2009-2010 Batch
UNIT I
Introduction evaluation of robots and robotics, classification of robots, robot anatomy, characteristics of
human arm, design and control issues; manipulation and control; sessions used in robot, robot
programming languages-characteristics of task level and robot level languages.
Robotation matrices, euler angles and RPY representation, homogeneous transformation matrices, Demerit
Huntenburg notation, direct and inverse kinematics for common types of robots for position and
orientation.
UNIT II
Manipulator defferential motion and statics: linear and angular velocity of a rigid body, transformation
matrix and angular velocity: celocity propagation along links: manipular jaobian, jacobian inverse,
jacobian singularities, Lgranzian mechanics. Lagranzian-Eular formulation of control of joints through
computed torques.
Control of manipulation: open and closed loop control, manipulation control problem, force control
strategies.
UNIT III
Advanced edge-Detection techniques: the canny and the shen-castan methods
The purpose edge detection, traditional approaches and theory, edge models: Marr-Hilderth edge detection,
the shen-castan(ISEF)edge detector, A comparison of two optimal edge detectors, Source code for the
Marr-Hilderth edge detector, Source code for the canny edge detector, Source code for shen –castan edge
detector.
TEXT BOOKS:
1. Robotics-control, sensing, Vision and intelligence – Fu.K.S. Gonzalez, R.C – Mc.GH edition.
2. Industrial Robotics – Groover, MP - MGH
REFERENCES:
1. Foundations of Robotics : Analysis & Control – Robert J.Schilling, Pearson Education
2. Foundations of Robotics – Analysis and control – I/O shikawa. T – PHI.
3. Computer Evidence:Collection & Preservation, Christopher L.T.Brown, Firewall Media
4. Network Security: The complete reference, Robert Bragg, Mark Rhodes, TMH
*****
Syllabi for Pre.PhD/Pre M.Phil/Pre MS. W.e.f. 2009-2010 Batch
Subject Code: R90660
UNIT I
Envisioning Architecture The Architecture Business Cycle, What is Software Architecture, Architectural
patterns, reference models, reference architectures, architectural structures and views.
Creating an Architecture : Quality Attributes, Achieving qualities, Architectural styles and patterns,
designing the Architecture, Documenting software architectures, Reconstructing Software Architecture.
UNIT II
Analyzing Architectures :Architecture Evaluation, Architecture design decision making, ATAM, CBAM.
UNIT III
Moving from one system to many :Software Product Lines, Building systems from off the shelf
components, Software architecture in future.
UNIT IV
Patterns : Pattern Description, Organizing catalogs, role in solving design problems, Selection and usage.
Creational and Structural patterns : Abstract factory, builder, factory method, prototype, singleton,
adapter, bridge, composite, façade, flyweight, Proxy.
UNIT V
Behavioral patterns : Chain of responsibility, command, Interpreter, iterator, mediator, memento,
observer, state, strategy, template method, visitor.
Case Studies : A-7E – A case study in utilizing architectural structures, The World Wide Web - a case
study in interoperability, Air Traffic Control – a case study in designing for high availability, Celsius Tech
– a case study in product line development
TEXT BOOKS:
1. Software Architecture in Practice, second edition, Len Bass,Paul Clements&Rick Kazman,
Pearson Education,2003.
2. Design Patterns, Erich Gamma, Pearson Education,1995.
REFERENCE BOOKS:
1. Beyond Software architecture, Luke Hohmann, Addison wesley, 2003.
2. Software architecture, David M. Dikel, David Kane and James R. Wilson, Prentice Hall, PTR,2001
3. Pattern Oriented Software Architecture,F.Buschmann&others,John Wiley&Sons.
4. Head First Design patterns, Eric Freeman & Elisabeth Freeman, O’REILLY, 2007.
5. Design Patterns in Java, Steven John Metsker & William C. Wake, Pearson education, 2006
6. J2EE Patterns, Deepak Alur, John Crupi & Dan Malks, Pearson education, 2003.
7. Design Patterns in C#, Steven John metsker, Pearson education, 2004.
8. Software Design, David Budgen, second edition, Pearson education,2003
*****
Syllabi for Pre.PhD/Pre M.Phil/Pre MS. W.e.f. 2009-2010 Batch
Subject Code: R9061
TEXT BOOKS:
1. Managing the Software Process,Watts S. Humphrey, Pearson Education,1999
2. Software Project Management,Walker Royce,Pearson Education,1998
REFERENCE BOOKS:
1. An Introduction to the Team Software Process, Watts S. Humphrey, Pearson Education,2000
2. Process Improvement essentials, James R. Persse, O’Reilly,2006
3. Software Project Management, Bob Hughes & Mike Cotterell, fourth edition,Tata Mc-Graw
Hill,2006
4. Applied Software Project Management, Andrew Stellman & Jennifer Greene, O’Reilly, 2006.
5. Head First PMP, Jennifer Greene & Andrew Stellman, O’Reilly,2007
6. Software Engineering Project Managent, Richard H. Thayer & Edward Yourdon, second edition,
Wiley India, 2004.
7. Agile Project Management, Jim Highsmith, Pearson education, 2004.
8. Quality Software Project Management,R.F.Futrell ,D.F.Shafer,L.I.Shafer,Pearson.
*****
Syllabi for Pre.PhD/Pre M.Phil/Pre MS. W.e.f. 2009-2010 Batch
Data Mining
Unit I Introduction to Web Data Mining and Data Mining Foundations
Introduction – World Wide Web(WWW), A Brief History of the Web and the Internet,Web Data Mining-
Data Mining, Web Mining.
Data Mining Foundations – Association Rules and Sequential Patterns – Basic Concepts of Association
Rules,Apriori Algorithm- Frequent Itemset Generation,Association Rule Generation, Data Formats for
Association Rule Mining, Mining with multiple minimum supports – Extended Model, Mining
Algorithm,Rule Generation, Mining Class Association Rules, Basic Concepts of Sequential Patterns,
Mining Sequential Patterns on GSP, Mining Sequential Patterns on PrefixSpan, Generating Rules from
Sequential Patterns.
Web Mining
Unit – III Information Retrieval and Web Search
Basic Concepts of Information Retrieval, Information Retrieval Methods - Boolean Model, Vector Space
Model and Statistical Language Model,Relevance Feedback, Evaluation Measures, Text and Web Page
Preprocessing – Stopword Removal, Stemming, Web Page Preprocessing, Duplicate Detection, Inverted
Index and Its Compression – Inverted Index, Search using Inverted Index, Index Construction, Index
Compression, Latent Semantic Indexing – Singular Value Decomposition, Query and Retrieval, Web
Search, Meta Search, Web Spamming.
Web Usage Mining - Data Collection and Preprocessing- Sources and Types of Data, Key Elements of
Web usage Data Preprocessing, Data Modeling for Web Usage Mining, Discovery and Analysis of Web
usage Patterns -Session and Visitor Analysis, Cluster Analysis and Visitor Segmentation, Association and
Correlation Analysis, Analysis of Sequential and Navigation Patterns.
Text Book -
1. Web Data Mining: Exploring Hyperlinks, Contents, and Usage Data by Bing Liu (Springer Publications)
References:
1. Data Mining: Concepts and Techniques, Second Edition Jiawei Han, Micheline Kamber (Elsevier
Publications)
2. Web Mining:: Applications and Techniques by Anthony Scime
*****
Syllabi for Pre.PhD/Pre M.Phil/Pre MS. W.e.f. 2009-2010 Batch
WEB SECURITY
UNIT-I
Introduction- A web security forensic lesson, Web languages, Introduction to different web attacks.
Overview of N-tier web applications, Web Servers: Apache, IIS, Database Servers.
UNIT-II
Review of computer security, Public Key cryptography, RSA.
Review of Cryptography Basics, On-line Shopping, Payment Gateways
UNIT-III
Web Hacking Basics HTTP & HTTPS URL, Web Under the Cover Overview of Java security Reading the
HTML source, Applet Security Servlets Security
Symmetric and Asymmetric Encryptions, Network security Basics, Firewalls & IDS
UNIT-IV
Digital Certificates, Hashing, Message Digest, & Digital Signatures
UNIT-V
Basics, Securing databases, Secure JDBC, Securing Large Applications, Cyber Graffiti
Text Books:
1.McClure, Stuart, Saumil Shah, and Shreeraj Shah. Web Hacking:attacks and defense. Addison
Wesley. 2003
2. Garms, Jess and Daniel Somerfield. Professional Java Security. Wrox. 2001.
Related Web Sites:
1.Collection of Cryptography Web Sites, Publications, FAQs, and References:
http://world.std.com/~franl/crypto.html
2.FAQ: What is TLS/SSL? http://www.mail.nih.gov/user/faq/tlsssl.htm
3.The Open SSL Project (SDKs for free download): http://www.openssl.org/
4.Windows & .NET security updates Web site: http://www.ntsecurity.net/
*****
Syllabi for Pre.PhD/Pre M.Phil/Pre MS. W.e.f. 2009-2010 Batch
WIRELESS NETWORKS
UNIT I
OVERVIEW OF WIRELESS NETWORKS: Introduction, Different generations of wireless networks -
CHARACTERISTICS OF THE WIRELESS MEDIUM: Introduction, radio propagation mechanisms,
path-loss modeling and signal coverage, effects of multi path and Doppler, channel measurement and
modeling techniques.
UNIT II
PHYSICAL LAYER ALTERNATIVES FOR WIRELESS NETWORKS: Introduction, applied
wireless transmission techniques, short distance base band transmission, UWB pulse transmission, Carrier
Modulated transmission, Broadband modems for higher speeds, Spread Spectrum transmissions, High-
speed Modems for Spread spectrum technology, Diversity and Smart Receiving Techniques, Comparison
of modulation schemes, Coding techniques for wireless communications - WIRELESS MEDIUM
ACCESS ALTERNATIVES: Introduction, fixed-assignment access for Voice-Oriented networks,
Random access for Data-Oriented Networks, Integration of Voice and Data Traffic
UNIT III
NETWORK PLANNING: Introduction, wireless network topologies, Cellular Topology, Cell
Fundamentals, Signal-to-interference ratio calculation, capacity Expansion Techniques, network planning
for CDMA systems - WIRELESS NETWORK OPERATION: Introduction, mobility management,
radio resources and power management, security in wireless networks
UNIT IV
WIRELESS APPLICATION PROTOCOL
Design and Principles of Operation, WAP Architecture & Components, WAE Overview, WAE Model,
WTA Architecture, WTA Framework Components, WSP Specification, WTP Specification, WTLS
Specification, WDP Specification
UNIT V
BLUETOOTH : Design and Principles of Operation, Transmitter Characteristics, Bluetooth Security,
Link Manager Protocol, Logical Link Control and Adaptation Layer Protocol, Alternatives to Bluetooth -
WIRELESS LANs: Benefits of WLANs, Design and principles of Operation, WLAN Configurations,
Microcells and Roaming, Types of WLANS, IEEE802.11, IEEE802.11a, IEEE802.11b
TEXT BOOKS:
1. Kaveh Pahlavan and Prashant Krishnamurthy,” Principles of Wireless Networks-a Unified
approach”, Pearson , 2004
2. Gary S.Rogers et al, “An Introduction to Wireless Technology”, Pearson, 2007
REFERENCES:
1. William Stallings,”Wireless communications and Networks”, Pearson education, 2005, ISBN 81-
7808-560-7
2. Jim Geier, “Wireless Networks first-step”, Pearson, 2005.
3. Sumit Kasera et al, “2.5G Mobile Networks: GPRS and EDGE”, TMH, 2008.
4. Matthew S.Gast, “802.11 Wireless Networks”, O’Reilly, Second Edition, 2006.
5. Theodore s. Rappaport,”Wireless Communications –principles and practice”, second edition, PHI,
2002
6. C.S.R.Prabhu et al, “Bluetooth Technology and its Applications with Java and J2ME”, PHI, 2007.
*****
Syllabi for Pre.PhD/Pre M.Phil/Pre MS. W.e.f. 2009-2010 Batch
WIRELESS SECURITY
UNIT I
Traditional Security Issues: Integrity, Confidentiality, Nonrepudiation, Availability, Mobile and Wireless
Security Issues: detectability, Resource Depletion/Exhaustion, physical Intercept Problems, Theft of
Service, War Driving/Walking/Chalking, Mobility, Problems in Adhoc Networks: Routing, Prekeying,
Reconfiguring, Hostile Environment
Additional Issues: Commerce – liability, Fear, Uncertainty, Doubt, Fraud, Big Bucks at Stake
UNIT II
Approaches to Security; Limit the Signal, Wire Integrity and Tapping, Physical Limitation, Encryption,
Public and Private key Encryption, Computational and Data Overhead, Integrity Codes, Checksum, Hash,
MAC, Payload vs Header, Traffic Analysis – IPSec: Authentication Header(AH), Encapsulating Security
Payload(ESP), Other Security-Related Mechanisms, Authentication Protocols, AAA, Special Hardware
UNIT III
Security in Wireless Personal Area Networks: Basic Idea, Bluetooth (Specifications, Network Terms,
Security Mechanisms), Bluetooth Security Modes, Bluetooth Security Mechanisms, Initialization Key,
Unit Key, Combination Key, Master Key, Encryption, Authentication, Limitations and Problems -
Security in Wireless Local Area Networks: Wireless Alphabet Soup, Wired Equivalent Privacy (WEP) –
goals, data frame, encryption, decryption, authentication, flaws, fixes
UNIT IV
Wi-Fi Protected Access (WPA), IEEE 802.11i, Encryption Protocols, Access Control via 802.1x, Fixes
and “Best Practices”, Anything is Better than Nothing, Know Thine Enemy, Use Whatever Wireless
Security Mechanisms are Present, End – To – End VPN, Firewall Protection -
Broadband Wireless Access, IEEE 802.16, IEEE 802.16 Security, Key Management, Security
Associations, Keying Material Lifetime, Subscriber Station(SS) Authorization, Encryption, problems and
limitations
UNIT V
Security in Wide Area Networks, basic idea, CDMA, GSM, GSM Authentication, GSM Encryption,
Problems with GSM Security, Session Life, Weak Encryption Algorithm, Encryption Between Mobile
Host and Base Station Only, Limits to the Secret Key
TEXT BOOKS:
1. Fundamentals of Mobile and Pervasive Computing, Frank Adelstein, K.S.Gupta et al, TMH 2005.
REFERENCES:
1. Wireless Security Models, Threats and Solutions, Randall k. Nichols, Panos C. Lekkas, TMH, 2006.
2. 802.11 Security, Bruce Potter & Bob Fleck, SPD O’REILLY 2005.
3. Guide to Wireless Network Security, Springer
*****