M.Tech CSE
M.Tech CSE
MASTER OF TECHNOLOGY
COMPUTER SCIENCE AND ENGINEERING
Note: The regulations hereunder are subject to amendments as may be made by the Academic
Council of the College from time to time. Any or all such amendments will be effective from such date
and to such batches of candidates (including those already pursuing the program) as may be decided
by the Academic Council.
UNIT I
Algorithms, Performance analysis- time complexity and space complexity, Asymptotic
Notation-Big Oh, Omega and Theta notations, Complexity Analysis Examples. Data
structures-Linear and non linear data structures, ADT concept, Linear List ADT, Array
representation, Linked representation, Vector representation, singly linked lists -insertion,
deletion, search operations, doubly linked lists-insertion, deletion operations, circular lists.
Representation of single, two dimensional arrays, Sparse matrices and their representation.
UNIT II
Stack and Queue ADTs, array and linked list representations, infix to postfix conversion using
stack, implementation of recursion, Circular queue-insertion and deletion, Dequeue ADT,
array and linked list representations, Priority queue ADT, implementation using Heaps,
Insertion into a Max Heap, Deletion from a Max Heap, java.util package-ArrayList, Linked
List, Vector classes, Stacks and Queues in java.util, Iterators in java.util.
UNIT III
Searching–Linear and binary search methods, Hashing-Hash functions, Collision Resolution
methods-Open Addressing, Chaining, Hashing in java.util-HashMap, HashSet, Hashtable.
Sorting –Bubble sort, Insertion sort, Quick sort, Merge sort, Heap sort, Radix sort,
comparison of sorting methods.
UNIT IV
Trees- Ordinary and Binary trees terminology, Properties of Binary trees, Binary tree ADT,
representations, recursive and non recursive traversals, Java code for traversals, Threaded
binary trees. Graphs- Graphs terminology, Graph ADT, representations, graph
traversals/search methods-dfs and bfs, Java code for graph traversals, Applications of
Graphs-Minimum cost spanning tree using Kruskal’s algorithm, Dijkstra’s algorithm for
Single Source Shortest Path Problem.
UNIT V
Search trees- Binary search tree-Binary search tree ADT, insertion, deletion and searching
operations, Balanced search trees, AVL trees-Definition and examples only, Red Black trees
– Definition and examples only, B-Trees-definition, insertion and searching operations,
Trees in java.util- TreeSet, Tree Map Classes, Tries(examples only),Comparison of Search
trees. Text compression-Huffman coding and decoding, Pattern matching-KMP algorithm.
TEXT BOOKS:
1. Data structures, Algorithms and Applications in Java, S.Sahni, Universities Press.
2. Data structures and Algorithms in Java, Adam Drozdek, 3rd edition, Cengage
Learning.
3. Data structures and Algorithm Analysis in Java, M.A.Weiss, 2nd edition,
4. Addison-Wesley (Pearson Education).
REFERENCE BOOKS:
1. Java for Programmers, Deitel and Deitel, Pearson education.
2. Data structures and Algorithms in Java, R.Lafore, Pearson education.
3. Java: The Complete Reference, 8th editon, Herbert Schildt, TMH.
4. Data structures and Algorithms in Java, M.T.Goodrich, R.Tomassia, 3rd edition, Wiley
India Edition.
5. Data structures and the Java Collection Frame work,W.J.Collins, Mc Graw Hill.
6. Classic Data structures in Java, T.Budd, Addison-Wesley (Pearson Education).
7. Data structures with Java, Ford and Topp, Pearson Education.
8. Data structures using Java, D.S.Malik and P.S.Nair, Cengage learning.
9. Data structures with Java, J.R.Hubbard and A.Huray, PHI Pvt. Ltd.
10. Data structures and Software Development in an Object-Oriented Domain,
J.P.Tremblay and G.A.Cheston, Java edition, Pearson Education.
UNIT I
Real-time operating systems: Design issues, principles and case study.
UNIT II
Distributed operating system: Design issues, features and principles of working, case study.
UNIT III
Network operating system: Design issues, working principles and characteristic features,
case study.
UNIT IV
Kernel development: Issues and development principles, case study.
UNIT V
Protection, privacy, access control and security issues, solutions.
TEXT BOOKS:
1. A.Silberschatz - Applied Operating System Concepts, Wiley, 2000.
2. Lubemir F Bic and Alan C. Shaw - Operating System Principles, Pearson Education,
2003.
REFERENCE BOOKS:
1. Operating Systems : Internal and Design Principles - Stallings, 6th ed., PE.
2. Modern Operating Systems, Andrew S Tanenbaum 3rd ed., PE.
3. Operating System Principles- Abraham Silberchatz, Peter B. Galvin, Greg Gagne, 7th
ed.,, John Wiley
4. UNIX User Guide – Ritchie & Yates.
5. UNIX Network Programming - W.Richard Stevens ,1998, PHI.
6. The UNIX Programming Environment – Kernighan & Pike, PE.
UNIT I
Computer structure – hardware, software, system software, Von-Neumann architecture –
case study. IA -32 Pentium: registers and addressing, instructions, assembly language,
program flow control, logic and shift/rotate instructions, multiply, divide MMX, SIMD
instructions, I/O operations, subroutines.
Input/output organization, interrupts, DMA, Buses, Interface circuits, I/O interfaces, device
drivers in windows, interrupt handlers
UNIT II
Processing Unit: Execution of a complete instruction, multiple bus organization, hardwired
control, micro programmed control.
Pipelining: data hazards, instruction hazards, influence on instruction sets, data path &
control consideration, and RISC architecture introduction.
UNIT – III
Memory: types and hierarchy, model level organization, cache memory, performance
considerations, mapping, virtual memory, swapping, paging, segmentation, replacement
policies.
UNIT – IV
Processes and Threads: processes, threads, inter process communication, classical IPC
problems, Deadlocks.
UNIT – V
File system: Files, directories, Implementation, Unix file system
Security: Threats, intruders, accident data loss, basics of cryptography, user authentication.
TEXT BOOKS:
1. Computer Organization – Car Hamacher, Zvonks Vranesic, SafeaZaky, Vth Edition,
McGraw Hill.
2. Modern Operating Systems, Andrew S Tanenbaum 2nd edition Pearson/PHI
REFERENCE BOOKS:
1. Computer Organization and Architecture – William Stallings Sixth Edition, Pearson
/PHI
2. Morris Mano- Computer System Architecture –3rd Edition-Pearson Education.
3. Operating System Principles- Abraham Silberchatz, Peter B. Galvin, Greg Gagne 7th
Edition, John Wiley
4. Operating Systems – Internals and Design Principles Stallings, Fifth Edition–2005,
Pearson Education/PHI
UNIT I
Software Process Maturity
Software maturity Framework, Principles of Software Process Change, Software Process
Assessment, The Initial Process, The Repeatable Process, The Defined Process, The Managed
Process, The Optimizing Process.
Process Reference Models
Capability Maturity Model (CMM), CMMI, PCMM, PSP, TSP.
UNIT II
Software Project Management Renaissance
Conventional Software Management, Evolution of Software Economics, Improving Software
Economics, The old way and the new way.
Life-Cycle Phases and Process artifacts
Engineering and Production stages, inception phase, elaboration phase, construction phase,
transition phase, artifact sets, management artifacts, engineering artifacts and pragmatic
artifacts, model based software architectures.
UNIT III
Workflows and Checkpoints of process
Software process workflows, Iteration workflows, Major milestones, Minor milestones,
Periodic status assessments.
Process Planning
Work breakdown structures, Planning guidelines, cost and schedule estimating process,
iteration planning process, Pragmatic planning.
UNIT IV
Project Organizations
Line-of- business organizations, project organizations, evolution of organizations, process
automation.
UNIT V
CCPDS-R Case Study and Future Software Project Management Practices
Modern Project Profiles, Next-Generation software Economics, Modern Process Transitions.
TEXT BOOKS:
1. Managing the Software Process, Watts S. Humphrey, Pearson Education.
2. Software Project Management, Walker Royce, Pearson Education.
REFERENCE BOOKS:
1. Effective Project Management: Traditional, Agile, Extreme, Robert Wysocki, Sixth
edition, Wiley India, rp2011.
2. An Introduction to the Team Software Process, Watts S. Humphrey, Pearson
Education, 2000
3. Process Improvement essentials, James R. Persse, O’Reilly, 2006
4. Software Project Management, Bob Hughes & Mike Cotterell, fourth edition, TMH,
2006
5. Applied Software Project Management, Andrew Stellman & Jennifer Greene,
O’Reilly, 2006.
6. Head First PMP, Jennifer Greene & Andrew Stellman, O’Reilly, 2007
7. Software Engineering Project Managent, Richard H. Thayer & Edward Yourdon, 2nd
edition, Wiley India, 2004.
8. The Art of Project Management, Scott Berkun, SPD, O’Reilly, 2011.
9. Applied Software Project Management, Andrew Stellman & Jennifer Greene, SPD,
O’Reilly, rp2011.
10. Agile Project Management, Jim Highsmith, Pearson education, 2004.
UNIT-I
Principles of Parallel and Distributed Computing, Introduction to cloud computing, Cloud
computing Architecture, cloud concepts and technologies, cloud services and platforms,
Cloud models, cloud as a service, cloud solutions, cloud offerings, introduction to Hadoop
and Mapreduce.
UNIT –II
Cloud Platforms for Industry, Healthcare and education, Cloud Platforms in the Industry,
cloud applications. Virtualization, cloud virtualization technology, deep dive: cloud
virtualization, Migrating in to cloud computing, Virtual Machines Provisioning and Virtual
Machine Migration Services, On the Management of Virtual Machines for cloud
Infrastructure, Comet cloud, T-Systems,
UNIT-III
Cloud computing Applications: Industry, Health, Education, Scientific Applications, Business
and Consumer Applications, Understanding Scientific Applications for Cloud Environments,
Impact of Cloud computing on the role of corporate IT. Enterprise cloud computing
Paradigm, Federated cloud computing Architecture, SLA Management in Cloud
Computing, Developing the cloud: cloud application Design.
UNIT-IV
Python Basics, Python for cloud, cloud application development in python, Cloud
Application Development in Python. Programming Google App Engine with Python: A first
real cloud Application, Managing Data in the cloud, Google app engine Services for Login
Authentication, Optimizing UI and Logic, Making the UI Pretty: Templates and CSS, Getting
Interactive. Map Reduce Programming Model and Implementations.
UNIT-V
Cloud management, Organizational Readiness and change management in the cloud age,
Cloud Security, Data security in the cloud, Legal Issues in the Cloud , Achieving Production
Readiness for the cloud Services
TEXT BOOKS:
1. Cloud Computing: Raj Kumar Buyya , James Broberg, andrzej Goscinski, 2013 Wiley
2. Mastering Cloud Computing: Raj Kumar buyya, Christian Vecchiola,selvi-2013.
3. Cloud Computing: Arshdeep Bahga, Vijay Madisetti, 2014, University Press.
4. Cloud computing: Dr Kumar Saurab Wiley India 2011.
REFERENCES;
1. Code in the Cloud: Mark C.Chu-Carroll 2011, SPD.( Second part of IV UNIT)
2. Essentials of cloud computing : K Chandrasekharan CRC Press.
3. Cloud Computing: John W. Rittinghouse, James Ransome, CRC Press.
4. Virtualization Security: Dave shackleford 2013. SYBEX a wiley Brand.
5. Cloud computing and Software Services: Ahson , Ilyas.2011.
6. Cloud Computing Bible: Sosinsky 2012. Wiley India .
7. Cloud Computing: Dan C. Marinescu-2013, Morgan Kaufmann.
8. Distributed and Cloud Computing, Kai Hwang, Geoffery C.Fox, Jack J.Dongarra, Elsevier,
2012.
9. Fundamentals of Python Kenneth A.Lambert | B.L.Juneja
Unit I:
Introduction to Android Operating System:
Android OS design and Features – Android development framework, SDK features, Installing
and running applications on Eclipse platform, Creating AVDs, Types of Android applications,
Best practices in Android programming, Android tools
Android application components – Android Manifest file, Externalizing resources like values,
themes, layouts, Menus etc, Resources for different devices and languages, Runtime
Configuration Changes
Android Application Lifecycle – Activities, Activity lifecycle, activity states, monitoring state
changes
Unit II:
Android User Interface:
Measurements – Device and pixel density independent measuring units
Layouts – Linear, Relative, Grid and Table Layouts
User Interface (UI) Components – Editable and non editable TextViews, Buttons, Radio and
Toggle Buttons, Checkboxes, Spinners, Dialog and pickers
Event Handling – Handling clicks or changes of various UI components
Fragments – Creating fragments, Lifecycle of fragments, Fragment states, Adding fragments
to Activity, adding, removing and replacing fragments with fragment transactions,
interfacing between fragments and Activities, Multiscreen Activities
Unit III
Intents and Broadcasts:
Intent – Using intents to launch Activities, Explicitly starting new Activity, Implicit Intents,
Passing data to Intents, Getting results from Activities, Native Actions, using Intent to dial a
number or to send SMS
Broadcast Receivers – Using Intent filters to service implicit Intents, Resolving Intent filters,
finding and using Intents received within an Activity
Notifications – Creating and Displaying notifications, Displaying Toasts
Unit IV
Persistent Storage:
Files – Using application specific folders and files, creating files, reading data from files,
listing contents of a directory
Shared Preferences – Creating shared preferences, saving and retrieving data using Shared
Preference
Database – Introduction to SQLite database, creating and opening a database, creating
tables, inserting retrieving and
deleting data, Registering Content Providers, Using content Providers (insert, delete,
retrieve and update)
Unit V
Advanced Topics: Alarms – Creating and using alarms
Using Internet Resources – Connecting to internet resource, using download manager
Location Based Services – Finding Current Location and showing location on the Map,
updating location
TEXT BOOKS:
1. Professional Android 4 Application Development, Reto Meier, Wiley India, (Wrox) , 2012
2. Android Application Development for Java Programmers, James C Sheusi, Cengage
Learning, 2013
REFERENCES:
1. Beginning Android 4 Application Development, Wei-Meng Lee, Wiley India (Wrox), 2013
UNIT I
INTRODUCTION - Well-posed learning problems, Designing a learning system, Perspectives
and issues in machine learning
Concept learning and the general to specific ordering – Introduction, A concept learning
task, Concept learning as search, Find-S: finding a maximally specific hypothesis, Version
spaces and the candidate elimination algorithm, Remarks on version spaces and candidate
elimination, Inductive bias
UNIT II
Decision Tree learning – Introduction, Decision tree representation, Appropriate problems
for decision tree learning, The basic decision tree learning algorithm, Hypothesis space
search in decision tree learning, Inductive bias in decision tree learning, Issues in decision
tree learning
Artificial Neural Networks – Introduction, Neural network representation, Appropriate
problems for neural network learning, Perceptions, Multilayer networks and the back
propagation algorithm, Remarks on the back propagation algorithm, An illustrative example
face recognition Advanced topics in artificial neural networks
Evaluation Hypotheses – Motivation, Estimation hypothesis accuracy, Basics of sampling
theory, A general approach for deriving confidence intervals, Difference in error of two
hypotheses, Comparing learning algorithms
UNIT III
Bayesian learning – Introduction, Bayes theorem, Bayes theorem and concept learning,
Maximum likelihood and least squared error hypotheses, Maximum likelihood hypotheses
for predicting probabilities, Minimum description length principle, Bayes optimal classifier,
Gibs algorithm, Naïve Bayes classifier, An example learning to classify text, Bayesian belief
networks The EM algorithm
Computational learning theory – Introduction, Probability learning an approximately
correct hypothesis, Sample complexity for Finite Hypothesis Space, Sample Complexity for
infinite Hypothesis Spaces, The mistake bound model of learning - Instance-Based Learning-
Introduction, k -Nearest Neighbour Learning, Locally Weighted Regression, Radial Basis
Functions, Case-Based Reasoning, Remarks on Lazy and Eager Learning
Genetic Algorithms – Motivation, Genetic Algorithms, An illustrative Example, Hypothesis
Space Search, Genetic Programming, Models of Evolution and Learning, Parallelizing Genetic
Algorithms
UNIT IV
Learning Sets of Rules – Introduction, Sequential Covering Algorithms, Learning Rule Sets:
Summary, Learning First Order Rules, Learning Sets of First Order Rules: FOIL, Induction as
Inverted Deduction, Inverting Resolution
Analytical Learning - Introduction, Learning with Perfect Domain Theories: Prolog-EBG
Remarks on Explanation-Based Learning, Explanation-Based Learning of Search Control
Knowledge
UNIT V
Combining Inductive and Analytical Learning – Motivation, Inductive-Analytical Approaches
to Learning, Using Prior Knowledge to Initialize the Hypothesis, Using Prior Knowledge to
Alter the Search Objective, Using Prior Knowledge to Augment Search Operators,
Reinforcement Learning – Introduction, The Learning Task, Q Learning, Non-Deterministic,
Rewards and Actions, Temporal Difference Learning, Generalizing from Examples,
Relationship to Dynamic Programming
TEXT BOOKS:
1. Machine Learning – Tom M. Mitchell, - MGH
2. Machine Learning: An Algorithmic Perspective, Stephen Marsland, Taylor & Francis
(CRC)
REFERENCE BOOKS:
1. Machine Learning Methods in the Environmental Sciences, Neural Networks, William
W Hsieh, Cambridge Univ Press.
2. Richard o. Duda, Peter E. Hart and David G. Stork, pattern classification, John Wiley
& Sons Inc., 2001
3. Chris Bishop, Neural Networks for Pattern Recognition, Oxford University Press, 1995
UNIT I
Envisioning Architecture
The Architecture Business Cycle, What is Software Architecture, Architectural patterns,
reference models, reference architectures, architectural structures and views.
Creating an Architecture
Quality Attributes, Achieving qualities, Architectural styles and patterns, designing the
Architecture, Documenting software architectures, Reconstructing Software Architecture.
UNIT II
Analyzing Architectures
Architecture Evaluation, Architecture design decision making, ATAM, CBAM.
Moving from one system to many
Software Product Lines, Building systems from off the shelf components, Software
architecture infuture.
UNIT III
Patterns
Pattern Description, Organizing catalogs, role in solving design problems, Selection and
usage.
Creational and Structural patterns
Abstract factory, builder, factory method, prototype, singleton, adapter, bridge, composite,
façade, flyweight.
UNIT IV
Behavioral patterns
Chain of responsibility, command, Interpreter, iterator, mediator, memento, observer,
state, strategy, template method, visitor.
UNIT V
Case Studies
A-7E – A case study in utilizing architectural structures, The World Wide Web - a case study
in interoperability, Air Traffic Control – a case study in designing for high availability, Celsius
Tech – acase study in product line development,
TEXT BOOKS:
1. Software Architecture in Practice, second edition, Len Bass, Paul Clements & Rick
Kazman, Pearson Education, 2003.
2. Design Patterns, Erich Gamma, Pearson Education, 1995.
REFERENCE BOOKS:
1. Beyond Software architecture, Luke Hohmann, Addison wesley, 2003.
2. Software architecture, David M. Dikel, David Kane and James R. Wilson, Prentice Hall
1. PTR, 2001
2. Software Design, David Budgen, second edition, Pearson education, 2003
3. Head First Design patterns, Eric Freeman & Elisabeth Freeman, O’REILLY, 2007.
4. Design Patterns in Java, Steven John Metsker & William C. Wake, Pearson education,
2006
5. J2EE Patterns, Deepak Alur, John Crupi & Dan Malks, Pearson education, 2003.
6. Design Patterns in C#, Steven John metsker, Pearson education, 2004.
7. Pattern Oriented Software Architecture, F.Buschmann & others, John Wiley & Sons.
Objectives:
To learn parallel and distributed algorithms development techniques for shared
memory and message passing models.
To study the main classes of parallel algorithms.
To study the complexity and correctness models for parallel algorithms.
UNIT-I
Basic Techniques, Parallel Computers for increase Computation speed, Parallel & Cluster
Computing
UNIT-II
Message Passing Technique- Evaluating Parallel programs and debugging, Portioning and
Divide and Conquer strategies examples
UNIT-III
Pipelining- Techniques computing platform, pipeline programs examples
UNIT-IV
Synchronous Computations, load balancing, distributed termination examples,
programming with shared memory, shared memory multiprocessor constructs for specifying
parallelist sharing data parallel programming languages and constructs, open MP
UNIT-V
Distributed shared memory systems and programming achieving constant memory
distributed shared memory programming primitives, algorithms – sorting and numerical
algorithms.
TEXT BOOK:
1. Parallel Programming, Barry Wilkinson, Michael Allen, Pearson Education, 2nd
Edition.
REFERENCE BOOK:
1. Introduction to Parallel algorithms by Jaja from Pearson, 1992.
TEXT BOOKS:
1. Essential Linux Device Drivers, Venkateswaran Sreekrishnan
2. Writing Linux Device Drivers: A Guide with Exercises, J. Cooperstein
3. Real Time Concepts for Embedded Systems – Qing Li, Elsevier
REFERENCES:
1. Embedded Systems Architecture Programming and Design: Raj Kamal, Tata McGraw Hill
2. Embedded/Real Time Systems Concepts, Design and Programming Black Book, Prasad,
KVK
3. Software Design for Real-Time Systems: Cooling, J E Proceedings of 17the IEEE Real-Time
Systems Symposium December 4-6, 1996 Washington, DC: IEEE Computer Society
4. Real-time Systems – Jane Liu, PH 2000
5. Real-Time Systems Design and Analysis : An Engineer's Handbook: Laplante, Phillip A
6. Structured Development for Real - Time Systems V1 : Introduction and Tools: Ward, Paul
T & Mellor, Stephen J
7. Structured Development for Real - Time Systems V2 : Essential Modeling Techniques:
Ward, Paul T & Mellor, Stephen J
8. Structured Development for Real - Time Systems V3 : Implementation Modeling
Techniques: Ward, Paul T & Mellor, Stephen J
9. Monitoring and Debugging of Distributed Real-Time Systems: TSAI, Jeffrey J P & Yang, J H
10. Embedded Software Primer: Simon, David E.
11. Embedded Systems Architecture Programming and Design: Raj Kamal, Tata McGraw
Hill
Objectives: The course demonstrates an in depth understanding of the tools and the
scripting languages necessary for design and development of applications dealing with Bio-
information/ Bio-data. The instructor is advised to discuss examples in the context of Bio-
data/ Bio-information application development.
UNIT I
Introduction to PERL and Scripting Scripts and Programs, Origin of Scripting , Scripting
Today, Characteristics of Scripting Languages, Web Scripting, and the universe of Scripting
Languages. PERL- Names and Values, Variables, Scalar Expressions, Control Structures,
arrays, list, hashes, strings, pattern and regular expressions, subroutines, advance perl -
finer points of looping, pack and unpack, filesystem, eval, data structures, packages,
modules, objects, interfacing to the operating system, Creating Internet ware applications,
Dirty Hands Internet Programming, security Issues.
UNIT II
PHP Basics- Features, Embedding PHP Code in your Web pages, Outputting the data to the
browser, Datatypes, Variables, Constants, expressions, string interpolation, control
structures, Function, Creating a Function, Function Libraries, Arrays, strings and Regular
Expressions.
UNIT III
Advanced PHP Programming Php and Web Forms, Files, PHP Authentication and
Methodologies -Hard Coded, File Based, Database Based, IP Based, Login Administration,
Uploading Files with PHP, Sending Email using PHP, PHP Encryption Functions, the Mcrypt
package, Building Web sites for the World – Translating Websites- Updating Web sites
Scripts, Creating the Localization Repository, Translating Files, text, Generate Binary Files,
Set the desired language within your scripts, Localizing Dates, Numbers and Times.
UNIT IV
TCL Structure, syntax, Variables and Data in TCL, Control Flow, Data Structures,
input/output, procedures, strings, patterns, files, Advance TCL- eval, source, exec and up
level commands, Name spaces, trapping errors, event driven programs, making applications
internet aware, Nuts and Bolts Internet Programming, Security Issues, C Interface. Tk- Visual
Tool Kits, Fundamental Concepts of Tk, Tk by example, Events and Binding , Perl-Tk.
UNIT V
Python Introduction to Python language, python-syntax, statements, functions, Built-in-
functions and Methods, Modules in python, Exception Handling, Integrated Web
Applications in Python – Building Small, Efficient Python Web Systems, Web Application
Framework.
TEXT BOOKS:
1. The World of Scripting Languages, David Barron, Wiley Publications.
2. Python Web Programming, Steve Holden and David Beazley, New Riders Publications.
3. Beginning PHP and MySQL, 3rd Edition, Jason Gilmore, Apress Publications (Dreamtech)
REFERENCE BOOKS:
1. Open Source Web Development with LAMP using Linux, Apache, MySQL, Perl and PHP,
J.Lee and B.Ware (Addison Wesley) Pearson Education.
2. Programming Python, M.Lutz, SPD.
3. PHP 6 Fast and Easy Web Development, Julie Meloni and Matt Telles, Cengage Learning
Publications.
4. PHP 5.1,I.Bayross and S.Shah, The X Team, SPD.
5. Core Python Programming, Chun, Pearson Education.
6. Guide to Programming with Python, M.Dawson, Cengage Learning.
7. Perl by Example, E.Quigley, Pearson Education.
8. Programming Perl, Larry Wall, T.Christiansen and J.Orwant, O’Reilly, SPD.
9. Tcl and the Tk Tool kit, Ousterhout, Pearson Education.
10. PHP and MySQL by Example, E.Quigley, Prentice Hall(Pearson).
11. Perl Power, J.P.Flynt, Cengage Learning.
12. PHP Programming solutions, V.Vaswani, TMH.
UNIT -II
Geothermal Energy: Structure of earth, Geothermal Regions, Hot springs. Hot Rocks, Hot
Aquifers. Analytical methods to estimate thermal potential. Harnessing techniques,
Electricity generating systems.
UNIT-III
Direct Energy Conversion: Nuclear Fusion, Fusion reaction, P-P cycle, Carbon cycle,
Deuterium cycle, Condition for controlled fusion, Fuel cells and photovoltaic, Thermionic
and Thermoelectric generation and MHD generator.
Hydrogen Gas as Fuel: Production methods, Properties, I.C. Engines applications, Utilization
strategy, Performances.
UNIT-IV
Bioenergy: Biomass energy sources. Plant productivity, Biomass wastes, aerobic and
anaerobic bioconversion processes, Raw material and properties of bio-gas, Bio-gas plant
technology and status, the energetic and economics of biomass systems, Biomass
gasification
UNIT-V
Wind Energy: Wind, Beaufort number, Characteristics, Wind energy conversion systems,
Types, Betz model. Interference factor. Power coefficient, Torque coefficient and Thrust
coefficient, Lift machines and Drag machines. Matching Electricity generation.
Energy from Oceans: Tidal energy, Tides, Diurnal and semi-diurnal nature, Power from tides,
Wave Energy, Waves, Theoretical energy available. Calculation of period and phase velocity
of waves, Wave power systems, submerged devices. Ocean thermal Energy, Principles, Heat
exchangers, Pumping requirements, Practical considerations.
TEXTBOOKS:
1.Non-conventional Energy Sources / GD Rai/Khanna publications.
2.Non-Conventional Energy Sources and Utilisation (Energy Engineering)/ R KRajput/
S.Chand.
3.Renewable Energy Sources /Twidell & Weir/Taylor and Francis/ 2nd special Indian
edition .
REFERENCE BOOKS:
1.Renewable Energy Resources- Basic Principles and Applications/ G.N.Tiwari and
M.K.GhosalNarosa Publications.
2.Renewable Energy Resources/ John Twidell & Tony Weir/Taylor & Francis/2 nd edition.
3.Non Conventional Energy / K.Mittal/ Wheeler.
TEXT BOOK:
1. The Nature of Mathematical Modeling, Neil Gershenfeld, Cambridge University
Press, 2006, ISBN 0-521-57095-6
REFERENCE BOOKS:
1. Mathematical Models in the Applied Sciences, A. C. Fowler, Cambridge University
Press, 1997, ISBN 0-521-46140-5
2. A First Course in Mathematical Modeling, F. R. Giordano, M.D. Weir and W.P. Fox,
2003, Thomson, Brooks/Cole Publishers
3. Applied Numerical Modeling for Engineers, Donald De Cogan, Anne De Cogan, Oxford
University Press, 1997
REFERENCE BOOKS:
1. Data Structures and Algorithms in java, 3rd edition, A.Drozdek, Cengage Learning.
2. Data Structures with Java, J.R.Hubbard, 2nd edition, Schaum’s Outlines, TMH.
3. Data Structures and algorithms in Java, 2nd Edition, R.Lafore, Pearson Education.
4. Data Structures using Java, D.S.Malik and P.S. Nair, Cengage Learning.
5. Data structures, Algorithms and Applications in java, 2nd Edition, S.Sahani,
Universities
Press.
6. Design and Analysis of Algorithms, P.H.Dave and H.B.Dave, Pearson education.
7. Data Structures and java collections frame work, W.J.Collins, Mc Graw Hill.
8. Java: the complete reference, 7th editon, Herbert Schildt, TMH.
9. Java for Programmers, P.J.Deitel and H.M.Deitel, Pearson education / Java: How to
Program P.J.Deitel and H.M.Deitel , 8th edition, PHI.
10. Java Programming, D.S.Malik,Cengage Learning.
A Practical Guide to Data Structures and Algorithms using Java, S.Goldman &
K.Goldman, Chapman & Hall/CRC, Taylor & Francis Group.
( Note: Use packages like java.io, java.util, etc)
UNIT - II
Files- File Concept, File types File System Structure, Inodes, File Attributes, file I/O in C using
system calls, kernel support for files, file status information-stat family, file and record
locking-lockf and fcntl functions, file permissions- chmod, fchmod, file ownership-chown,
lchown , fchown, linkssoft links and hard links – symlink, link, unlink. File and Directory
management – Directory contents, Scanning Directories- Directory file APIs. Process-
Process concept, Kernel support for process, process attributes. Process control – process
creation, replacing a process image, waiting for a process, process termination, zombie
process, orphan process.
UNIT - III
Signals- Introduction to signals, Signal generation and handling, Kernel support for signals,
Signal function, unreliable signals, reliable signals, kill, raise , alarm, pause, abort, sleep
functions. Interprocess Communication - Introduction to IPC mechanisms, Pipes- creation,
IPC between related processes using unnamed pipes, FIFOs-creation, IPC between unrelated
processes using FIFOs(Named pipes), differences between unnamed and named pipes,
popen and pclose library functions, Introduction to message queues, semaphores and
shared memory. Message Queues- Kernel support for messages, UNIX system V APIs for
messages, client/server
example. Semaphores-Kernel support for semaphores, UNIX system V APIs for semaphores.
UNIT – IV
Shared Memory- Kernel support for shared memory, UNIX system V APIs for shared
memory, Client/Server Example. Network IPC - Introduction to Unix Sockets, IPC over a
network, Client-Server model, Address formats(Unix domain and Internet domain), Socket
system calls for Connection Oriented - Communication, Socket system calls for
Connectionless-Communication, Example-Client/Server Programs- Single Server-Client
connection, Multiple simultaneous clients, Socket options – setsockopt, getsockopt, fcntl.
UNIT-V
Network Programming in Java-Network basics, TCP sockets, UDP sockets (datagram
sockets), Server programs that can handle one connection at a time and multiple
connections (using multithreaded server), Remote Method Invocation (Java RMI)-Basic RMI
Process, Implementation details-Client-Server Application.
TEXT BOOKS:
1. Unix System Programming using C++, T.Chan, PHI.(Units II,III,IV)
2. Unix Concepts and Applications, 4th Edition, Sumitabha Das, TMH.(Unit I)
3. An Introduction to Network Programming with Java, Jan Graba, Springer, rp
2010.(Unit V)
4. Unix Network Programming ,W.R. Stevens, PHI.(Units II,III,IV)
5. Java Network Programming,3rd edition, E.R. Harold, SPD, O’Reilly.(Unit V)
REFERENCE BOOKS:
1. Linux System Programming, Robert Love, O’Reilly, SPD.
2. Advanced Programming in the UNIX environment, 2nd Edition, W.R.Stevens, Pearson
Education.
3. UNIX for programmers and users, 3rd Edition, Graham Glass, King Ables, Pearson
Education.
4. Beginning Linux Programming, 4th Edition, N.Matthew, R.Stones, Wrox, Wiley India
Edition.
5. Unix Network Programming The Sockets Networking API, Vol.-I,W.R.Stevens, Bill
Fenner, A.M.Rudoff, Pearson Education.
6. Unix Internals, U.Vahalia, Pearson Education.
7. Unix shell Programming, S.G.Kochan and P.Wood, 3rd edition, Pearson Education.
8. C Programming Language, Kernighan and Ritchie, PHI
Recovery related Structures, the Write-Ahead Log Protocol, Check pointing, recovering from
a System Crash, Media recovery
UNIT IV
Overview of Storage and Indexing: Data on External Storage, File Organization and Indexing
– Clustered Indexes, Primary and Secondary Indexes, Index data Structures – Hash Based
Indexing, Tree based Indexing Storing data: Disks and Files: -The Memory Hierarchy –
Redundant Arrays of Independent Disks. Tree Structured Indexing: Intuitions for tree
Indexes, Indexed Sequential Access Methods (ISAM) B+ Trees: A Dynamic Index Structure,
Search, Insert, Delete. Hash Based Indexing: Static Hashing, Extendable hashing, Linear
Hashing, Extendable vs. Linear Hashing.
UNIT V
Distributed databases: Introduction to distributed databases, Distributed DBMS
architectures,
Storing data in a distributed DBMS, Distributed catalog management, Distributed query
processing Updating distributed data, Distributed transactions, Distributed concurrency
control, Distributed recovery
TEXT BOOKS:
1. Data base Management Systems, Raghu Ramakrishnan, Johannes Gehrke, TMH, 3rd
Edition,2003.
2. Data base System Concepts, A.Silberschatz, H.F. Korth, S.Sudarshan, McGraw hill, VI
edition, 2006.
3. Fundamentals of Database Systems 5th edition. Ramez Elmasri, Shamkant
B.Navathe, Pearson Education, 2008.
REFERENCE BOOKS:
1. Introduction to Database Systems, C.J.Date,Pearson Education.
2. Database Management System Oracle SQL and PL/SQL, P.K.Das Gupta, PHI.
3. Database System Concepts, Peter Rob & Carlos Coronel, Cengage Learning, 2008.
4. Database Systems, A Practical approach to Design Implementation and
Management Fourth edition, Thomas Connolly, Carolyn Begg, Pearson education.
5. Database-Principles, Programming, andPerformance, P.O’Neil&E.O’Neil, 2nd ed.,
ELSEVIER
6. Fundamentals of Relational Database Management Systems, S.Sumathi,
S.Esakkirajan, Springer.
7. Introduction to Database Management, M.L.Gillenson and others, Wiley Student
Edition.
8. Database Development and Management, Lee Chao, Auerbach publications, Taylor
& Francis Group.
9. Distributed Databases Principles & Systems, Stefano Ceri, Giuseppe Pelagatti, TMH.
UNIT I
Client Side Technologies:
Overview of HTML - Common tags, XHTML, capabilities of HTML5 Cascading Style sheets,
CSS3 enhancements, linking to HTML Pages, Classes in CSS, Introduction to JavaScripts,
variables, arrays, methods and string manipulation, BOM/DOM
(Browser/Document Object Model), accessing elements by ID, Objects in JavaScript
Dynamic HTML with JavaScript and with CSS, form validation with JavaScript, Handling Timer
Events Simplifying scripting with JQuery, JASON for Information exchange.
UNIT II
Introduction to Java Servlets:
Introduction to Servlets: Lifecycle of a Servlet, Reading request and initialization
parameters, Writing output to response, MIME types in response, Session Tracking: Using
Cookies and Sessions Steps involved in Deploying an application Database Access with JDBC
and Connection Pooling Introduction to XML, XML Parsing with DOM and SAX Parsers in
Java
Ajax - Ajax programming with JSP/Servlets, creating XML Http Object for various browsers,
Sending request, Processing response data and displaying it. Introduction to Hibernate
UNIT III
Introduction to JSP:
JSP Application Development: Types of JSP Constructs (Directives, Declarations, Expressions,
Code Snippets), Generating Dynamic Content, Exception Handling, Implicit JSP Objects,
Conditional Processing, Sharing Data Between JSP pages, Sharing Session and Application
Data, Using user defined classes with jsp:useBean tag, Accessing a Database from a JSP
UNIT IV
Introduction to Struts Framework:
Introduction to MVC architecture, Anatomy of a simple struts2 application, struts
configuration file, Presentation layer with JSP, JSP bean, html and logic tag libraries, Struts
Controller class, Using form data in Actions, Page Forwarding, validation frame work,
Internationalization
UNIT V
Service Oriented Architecture and Web Services
Overview of Service Oriented Architecture – SOA concepts, Key Service Characteristics,
Technical Benefits of a SOA Introduction to Web Services– The definition of web services,
basic operational model of web services, basic steps of implementing web services.
Core fundamentals of SOAP – SOAP Message Structure, SOAP encoding, SOAP message
exchange models, Describing Web Services –Web Services life cycle, anatomy of WSDL
Introduction to Axis– Installing axis web service framework, deploying a java web service on
axis. Web Services Interoperability – Creating java and .Net client applications for an Axis
Web Service
(Note: The Reference Platform for the course will be open source products Apache Tomcat
Application Server, MySQL database, Hibernate and Axis)
TEXT BOOKS:
1. Web Programming, building internet applications, Chris Bates 3rd edition, WILEY
Dreamtech .
2. The complete Reference Java 7th Edition , Herbert Schildt., TMH.
3. Java Server Pages,Hans Bergsten, SPD, O’Reilly.
4. Professional Jakarta Struts - James Goodwill, Richard Hightower, Wrox Publishers.
5. Developing Java Web Services, R. Nagappan, R. Skoczylas, R.P. Sriganesh, Wiley India, rp –
2008.
6. Understanding SOA with Web Services, Eric Newcomer and Greg Lomow, Pearson Edition
– 2009
7. Java Web Service Architecture, James McGovern, Sameer Tyagi et al., Elsevier - 2009
REFERENCE BOOKS:
1. Programming the world wide web,4th edition,R.W.Sebesta,Pearson
2. Core SERVLETS ANDJAVASERVER PAGES VOLUME 1: CORE
3. TECHNOLOGIES , Marty Hall and Larry Brown Pearson
4. Internet and World Wide Web – How to program , Dietel and Nieto PHI/Pearson.
5. Jakarta Struts Cookbook , Bill Siggelkow, S P D O’Reilly.
6. Professional Java Server Programming,S.Allamaraju & othersApress(dreamtech).
7. Java Server Programming ,Ivan Bayross and others,The X Team,SPD
8. Web Warrior Guide to Web Programmming-Bai/Ekedaw-Cengage Learning.
9. Beginning Web Programming-Jon Duckett ,WROX.
UNIT-I
Data mining Overview and Advanced Pattern Mining
Data mining tasks – mining frequent patterns, associations and correlations, classification
and regression for predictive analysis, cluster analysis , outlier analysis; advanced pattern
mining in multilevel, multidimensional space – mining multilevel associations, mining
multidimensional associations, mining quantitative association rules, mining rare patterns
and negative patterns.
UNIT-II
Advance Classification
Classification by back propagation, support vector machines, classification using frequent
patterns, other classification methods – genetic algorithms, roughest approach, fuzz>set
approach;
UNIT-III
Advance Clustering
Density - based methods –DBSCAN, OPTICS, DENCLUE; Grid-Based methods – STING,
CLIQUE; Exception – maximization algorithm; clustering High- Dimensional Data; Clustering
Graph and Network Data.
UNIT-IV
Web and Text Mining
Introduction, web mining, web content mining, web structure mining, we usage mining,
Text mining – unstructured text, episode rule discovery for texts, hierarchy of categories,
text clustering.
UNIT-V
Temporal and Spatial Data Mining
Introduction; Temporal Data Mining – Temporal Association Rules, Sequence Mining, GSP
algorithm, SPADE, SPIRIT Episode Discovery, Time Series Analysis, Spatial Mining – Spatial
Mining Tasks, Spatial Clustering. Data Mining Applications.
TEXT BOOKS:
1. Data Mining Concepts and Techniques, Jiawei Hang Micheline Kamber, Jian pei, Morgan
Kaufmannn.
Differentiate between business continuity (BC) and disaster recovery (DR) ,RTO and RPO,
Identify single points of failure in a storage infrastructure and list solutions to mitigate these
failures, Architecture of backup/recovery and the different backup/recovery topologies ,
replication technologies and their role in ensuring information availability and business
continuity, Remote replication technologies and their role in providing disaster recovery and
business continuity capabilities Identify key areas to monitor in a data center, Industry
standards for data center monitoring and management, Key metrics to monitor for different
components in a storage infrastructure, Key management tasks in a data center
TEXT BOOK:
1. EMC Corporation, Information Storage and Management, Wiley.
REFERENCE BOOKS:
1. Robert Spalding, “Storage Networks: The Complete Reference“, Tata McGraw Hill,
Osborne, 2003.
2. Marc Farley, “Building Storage Networks”, Tata McGraw Hill ,Osborne, 2001.
3. Meeta Gupta, Storage Area Network Fundamentals, Pearson Education Limited,
2002.
UNIT I
Introduction and Overview What is Natural Language Processing, hands-on
demonstrations. Ambiguity and uncertainty in language. The Turing test.
Regular Expressions Chomsky hierarchy, regular languages, and their limitations. Finite-
state automata. Practical regular expressions for finding and counting language phenomena.
A little morphology. Exploring a large corpus with raged tools. Programming in Python An
introduction to programming in Python. Variables, numbers, strings, arrays, dictionaries,
conditionals, iteration. The NLTK (Natural Language Toolkit)
String Edit Distance and Alignment Key algorithmic tool: dynamic programming, a simple
example, use in optimal alignment of sequences. String edit operations, edit distance, and
examples of use in spelling correction, and machine translation.
UNIT II
Context Free Grammars Constituency, CFG definition, use and limitations. Chomsky Normal
Form. Top-down parsing, bottom-up parsing, and the problems with each. The desirability
of combining evidence from both directions
Non-probabilistic Parsing Efficient CFG parsing with CYK, another dynamic programming
algorithms. Early parser. Designing a little grammar, and parsing with it on some test data.
Probability Introduction to probability theory Joint and conditional probability, marginals,
independence, Bayes rule, combining evidence. Examples of applications in natural
language.
Information Theory The "Shannon game"--motivated by language! Entropy, cross entropy,
information gain. Its application to some language phenomena.
UNIT III
Language modeling and Naive Bayes
Probabilistic language modeling and its applications. Markov models. N-grams. Estimating
the probability of a word, and smoothing. Generative models of language. Part of Speech
Tagging and Hidden Markov Models, Viterbi Algorithm for Finding Most Likely HMM Path
Dynamic programming with Hidden Markov Models, and its use for part-of-speech tagging,
Chinese word segmentation, prosody, information extraction, etc.
UNIT IV
Probabilistic Context Free Grammars
Weighted context free grammars. Weighted CYK. Pruning and beam search.
Parsing with PCFGs
A tree bank and what it takes to create one. The probabilistic version of CYK. Also: How do
humans parse? Experiments with eye-tracking. Modern parsers.
Maximum Entropy Classifiers
The maximum entropy principle and its relation to maximum likelihood. Maximum entropy
classifiers and their application to document classification, sentence segmentation, and
other language tasks
UNIT V
Maximum Entropy Markov Models & Conditional Random Fields
Part-of-speech tagging, noun-phrase segmentation and information extraction models that
combine maximum entropy and finite-state machines. State-of-the-art models for NLP.
Lexical Semantics Mathematics of Multinomial and Dirichlet distributions, Dirichlet as a
smoothing for multinomial’s.
Information Extraction & Reference Resolution- Various methods, including HMMs. Models
of anaphora resolution. Machine learning methods for co reference.
TEXT BOOKS:
1. "Speech and Language Processing": Jurafsky and Martin, Prentice Hall
2. "Statistical Natural Language Processing"- Manning and Schutze, MIT Press
3. “Natural Language Understanding”. James Allen. The Benajmins/Cummings
Publishing Company
REFERENCES BOOKS:
1. Cover, T. M. and J. A. Thomas: Elements of Information Theory. Wiley.
2. Charniak, E.: Statistical Language Learning. The MIT Press.
3. Jelinek, F.: Statistical Methods for Speech Recognition. The MIT Press.
4. Lutz and Ascher - "Learning Python", O'Reilly
UNIT-I: AI Problems and Search: AI problems, Techniques, Problem Spaces and Search,
Heuristic Search Techniques- Generate and Test, Hill Climbing, Best First Search Problem
reduction, Constraint Satisfaction and Means End Analysis. Approaches to Knowledge
Representation- Using Predicate Logic and Rules.
UNIT-IV: Introduction to Classical Sets ( crisp Sets)and Fuzzy Sets- operations and Fuzzy sets.
Classical Relations-and Fuzzy Relations- Cardinality, Operations, Properties and composition.
Tolerance and equivalence relations. Membership functions- Features, Fuzzification,
membership value assignments, Defuzzification.
UNIT-V: Fuzzy Arithmetic and Fuzzy Measures, Fuzzy Rule Base and Approximate Reasoning
Fuzzy Decision making Fuzzy Logic Control Systems, Genetic Algorithm- Introduction and
basic operators and terminology. Applications: Optimization of TSP, Internet Search
Technique.
TEXT BOOKS:
1. Principles of Soft Computing- S N Sivanandam, S N Deepa, Wiley India, 2007
2. Soft Computing and Intelligent System Design -Fakhreddine O Karray, Clarence D Silva,.
Pearson Edition, 2004.
REFERENCE BOOKS:
1. Artificial Intelligence and SoftComputing- Behavioural and Cognitive Modeling of the
Human Brain- Amit Konar, CRC press, Taylor and Francis Group.
2. Artificial Intelligence – Elaine Rich and Kevin Knight, TMH, 1991, rp2008.
3. Artificial Intelligence – Patric Henry Winston – Third Edition, Pearson Education.
4. A first course in Fuzzy Logic-Hung T Nguyen and Elbert A Walker, CRC. Press Taylor and
Francis Group.
TEXT BOOKS:
1. Jochen Schiller, “Mobile Communications”, Pearson Education, Second Edition, 2008.
2. Dr. Sunilkumar, et al “Wireless and Mobile Networks: Concepts and Protocols”,
Wiley India.
3. Raj Kamal, “Mobile Computing”, OXFORD UNIVERSITY PRESS.
REFERENCE BOOKS:
1. Asoke K Talukder, et al, “Mobile Computing”, Tata McGraw Hill, 2008.
2. Matthew S.Gast, “802.11 Wireless Networks”, SPD O’REILLY.
3. Ivan Stojmenovic, “Handbook of Wireless Networks and Mobile Computing”, Wiley,
2007.
4. Kumkum Garg, “Mobile Computing”, Pearson.
5. Handbook of Security of Networks, Yang Xiao, Frank H Li, Hui Chen, World Scientific,
2011.
Unit I
Big Data Analytics : What is big data, History of Data Management ; Structuring Big Data ;
Elements of Big Data ; Big Data Analytics; Distributed and Parallel Computing for Big Data;
Big Data Analytics:What is Big Data Analytics, What Big Data Analytics Isn’t, Why this sudden
Hype Around Big Data Analytics, Classification of Analytics, Greatest Challenges that Prevent
Business from Capitalizing Big Data; Top Challenges Facing Big Data; Why Big Data Analytics
Important; Data Science; Data Scientist; Terminologies used in Big Data Environments;
Basically Available Soft State Eventual Consistency (BASE); Open source Analytics Tools;
Unit- II
Understanding Analytics and Big Data: Comparing Reporting and Analysis, Types of
Analytics; Points to Consider during Analysis; Developing an Analytic Team; Understanding
Text Analytics; Analytical Approach and Tools to Analyze Data: Analytical Approaches;
History of Analytical Tools; Introducing Popular Analytical Tools; Comparing Various
Analytical Tools.
Unit III
Understanding MapReduce Fundamentals and HBase : The MapReduce Framework;
Techniques to Optimize MapReduce Jobs; Uses of MapReduce; Role of HBase in Big Data
Processing; Storing Data in Hadoop : Introduction of HDFS, Architecture, HDFC Files, File
system types, commands, org.apache.hadoop.io package, HDF, HDFS High Availability;
Introducing HBase, Architecture, Storing Big Data with HBase , Interacting with the Hadoop
Ecosystem; HBase in Operations-Programming with HBase; Installation, Combining HBase
and HDFS;
Unit IV
Big Data Technology Landscape and Hadoop : NoSQL, Hadoop; RDBMS versus Hadoop;
Distributed Computing Challenges; History of Hadoop; Hadoop Overview; Use Case of
Hadoop; Hadoop Distributors; HDFC (Hadoop Distributed File System), HDFC Daemons,
read,write, Replica Processing of Data with Hadoop; Managing Resources and Applications
with Hadoop YARN.
Unit V
Social Media Analytics and Text Mining: Introducing Social Media; Key elements of Social
Media; Text mining; Understanding Text Mining Process; Sentiment Analysis, Performing
Social Media Analytics and Opinion Mining on Tweets; Mobile Analytics: Introducing Mobile
Analytics; Define Mobile Analytics; Mobile Analytics and Web Analytics; Types of Results
from Mobile Analytics; Types of Applications for Mobile Analytics; Introducing Mobile
Analytics Tools;
TEXT BOOKS:
1. BIG DATA and ANALYTICS, Seema Acharya, Subhasinin Chellappan, Wiley publications.
2. BIG DATA, Black BookTM , DreamTech Press, 2015 Edition.
3. BUSINESS ANALYTICS 5e , BY Albright |Winston
REFERENCE BOOKS:
1. Rajiv Sabherwal, Irma Becerra- Fernandez,” Business Intelligence –Practice,
Technologies and Management”, John Wiley 2011.
2. Lariss T. Moss,ShakuAtre, “ Business Intelligence Roadmap”, Addison-Wesley It Service.
3. Yuli Vasiliev, “ Oracle Business Intelligence : The Condensed Guide to Analysis and
Reporting”, SPD Shroff, 2012.
TEXT BOOKS:
1. 6LoWPAN: The Wireless Embedded Internet, Zach Shelby, Carsten Bormann, Wiley
2. Internet of Things: Converging Technologies for Smart Environments and Integrated
Ecosystems, Dr. Ovidiu Vermesan, Dr. Peter Friess, River Publishers
3. Interconnecting Smart Objects with IP: The Next Internet, Jean-Philippe Vasseur,
Adam Dunkels, Morgan Kuffmann
REFERENCES:
1. The Internet of Things: From RFID to the Next-Generation Pervasive Networked Lu
Yan, Yan Zhang, Laurence T. Yang, Huansheng Ning
2. Internet of Things (A Hands-on-Approach) , Vijay Madisetti , Arshdeep Bahga
3. Designing the Internet of Things , Adrian McEwen (Author), Hakim Cassimally
4. Asoke K Talukder and Roopa R Yavagal, “Mobile Computing,” Tata McGraw Hill, 2010.
5. Computer Networks; By: Tanenbaum, Andrew S; Pearson Education Pte. Ltd., Delhi, 4th
Edition
6. Data and Computer Communications; By: Stallings, William; Pearson Education Pte. Ltd.,
Delhi, 6th Edition
7. F. Adelstein and S.K.S. Gupta, “Fundamentals of Mobile and Pervasive Computing,”
McGraw Hill, 2009.
8. Cloud Computing Bible, Barrie Sosinsky, Wiley-India, 2010.
9. Cloud Security: A Comprehensive Guide to Secure Cloud Computing, Ronald L. Krutz,
Russell Dean Vines, Wiley-India, 2010
UNIT I
A model for Internetwork security, Conventional Encryption Principles & Algorithms (DES,
AES, RC4, Blowfish), Block Cipher Modes of Operation, Location of Encryption Devices, Key
Distribution.
Public key cryptography principles, public key cryptography algorithms (RSA, Diffie-Hellman,
ECC), public Key Distribution.
UNIT II
Approaches of Message Authentication, Secure Hash Functions (SHA-512, MD5) and HMAC,
Digital Signatures, Kerberos, X.509 Directory Authentication Service, Email Security: Pretty
Good Privacy (PGP)
IP Security: Overview, IP Security Architecture, Authentication Header, Encapsulating
Security Payload, Combining Security Associations and Key Management.
UNIT III
Web Security: Requirements, Secure Socket Layer (SSL) and Transport Layer Security (TLS),
Secure Electronic Transaction (SET). Firewalls: Firewall Design principles, Trusted Systems,
Intrusion Detection Systems
UNIT IV
Auditing For Security: Introduction, Basic Terms Related to Audits, Security audits, The Need
for Security Audits in Organization, Organizational Roles and Responsibilities for Security
Audit, Auditors Responsibility In Security Audits, Types Of Security Audits.
UNIT V
Auditing For Security: Approaches to Audits, Technology Based Audits Vulnerability Scanning
And Penetration Testing, Resistance to Security Audits, Phase in security audit, Security
audit Engagement Costs and other aspects, Budgeting for security audits, Selecting external
Security Consultants, Key Success factors for security audits.
TEXT BOOKS:
1. Cryptography and Network Security by William Stallings, Fourth Edition, Pearson
Education 2007.
2. Network Security Essentials (Applications and Standards) by William Stallings Pearson
Education, 2008.
REFERENCE BOOKS:
1. Information Security by Mark Stamp, Wiley – INDIA, 2006.
2. Fundamentals of Computer Security, Springer.
3. Network Security: The complete reference, Robert Bragg, Mark Rhodes, TMH
4. Computer Security Basics by Rick Lehtinen, Deborah Russell & G.T.Gangemi Sr., SPD
O’REILLY 2006.
5. Modern Cryptography by Wenbo Mao, Pearson Education 2007.
6. Principles of Information Security, Whitman, Thomson.
UNIT- I
Concepts of Management and Organisation - Functions of Management - Evolution of
Management Thought : Taylor's Scientific Management, Fayol's Principles of Management,
Douglas Mc-Gregor's Theory X and Theory Y, Mayo's Hawthorne Experiments, Hertzberg's
Two Factor Theory of Motivation, Maslow's Hierarchy of Human Needs - Systems Approach
to Management.
UNIT –II
Designing Organisational Structures : Basic concepts related to Organisation -
Departmentation and Decentralisation, Types of mechanistic and organic structures of
organisation (Line organization, Line and staff organization, functional organization,
Committee organization, matrix organization, Virtual Organisation, Cellular Organisation,
team structure, boundaryless organization, inverted pyramid structure, lean and flat
organization structure) and their merits, demerits and suitability.
UNIT –III
Plant location, definition, factors affecting the plant location, comparison of rural and urban
sites-methods for selection of plant- Matrix approach. Plant Layout - definition, objectives,
types of production, types of plant layout - various data analyzing forms-travel chart.
Work study - Definition, objectives, method study - definition, objectives, steps involved-
various types of associated charts-difference between micromotion and memomotion
studies. Work measurement- definition,time study, steps involved-equipment, different
methods of performance rating- allowances, standard time calculation. Work Sampling -
definition, steps involved, standard time calculations, differences with time study.
UNIT –IV
Materials Management-Objectives, Inventory - functions, types, associated costs, inventory
classification techniques-ABC and VED analysis. Inventory Control Systems-Continuous
review system-periodical review system. Stores Management and Stores Records. Purchase
management, duties of purchase of manager,associated forms.Introduction to PERT / CPM :
Project management, network modeling-probabilistic model, various types of activity times
estimation-programme evaluation review techniques- Critical Path-probability of
completing the project, deterministic model, critical path method (CPM)-critical path
calculation-crashing of simple of networks.
UNIT –V
Inspection and quality control, types of inspections - Statistical Quality Control-techniques-
variables and attributes-assignable and non assignable causes- variable control charts, and R
charts, attributes control charts, p charts and c charts. Acceptance sampling plan- single
sampling and double sampling plans-OC curves. Introduction to TQM-Quality Circles, ISO
9000 series procedures. Introduction to Human Resource Management, Functions of HRM,
Job Evaluation, different types of evaluation methods. Job description, Merit Rating.-
difference with job evaluation, different methods of merit ratings, wage incentives,
different types of wage incentive schemes. Marketing, marketing vs selling, marketing mix,
product life-cycle.
TEXT BOOKS:
1. Amrine, Manufacturing Organization and Management, Pearson, 2nd Edition, 2004.
2. Industrial Engineering and Management O.P. Khanna Dhanpat Rai.
3. A.R.Aryasri, Management Science , Tata McGraw-Hill, 2002.
REFERENCE BOOKS:
1. Panner Selvam, Production and Operations Management, PHI, 2004.
2. Dr. C. Nadha Muni Reddy and Dr. K. Vijaya Kumar Reddy, Reliability Engineering & Quality
Engineering, Galgotia Publications, Pvt., Limited.
3. Phillip Kotler, Marketing Management, Pearson, 2004.
UNIT - I
Introduction: Research objective and motivation, Types of research, Research approaches,
Significance, Research method vs. methodology, Research process.
UNIT - II
Formulating a research problem: Literature review, Formulation of objectives, Establishing
Operational definitions, Identifying variables, constructing hypotheses.
UNIT - III
Research design and Data Collection: Need and Characteristics, Types of research design,
Principles of Experimental research design, Method of data collection, Ethical issues in
collecting data.
UNIT - IV
Sampling and Analysis of data: Need of Sampling, Sampling distributions, Central limit
theorem, Estimation: mean and variance, Selection of sample size Statistics in research,
Measures of Central tendency, Dispersion, asymmetry and relationships, Correlation and
Regression analysis, Displaying data
UNIT - V
Hypothesis Testing: Procedure, Hypothesis testing for difference in mean, variance
limitations, Chi-square test, Analysis of variance (ANOVA), Basic principles and techniques
of writing a Research Proposal
Text Books:
1. R. C. Kothari, Research Methodology: Methods and Techniques, 2nd edition, New Age
International Publisher, 2009
2. Ranjit Kumar, Research Methodology: A Step-by-Step Guide for Beginners, 2nd Edition,
SAGE, 2005
References:
1. Trochim, William M. The Research Methods Knowledge Base, 2nd Edition. Internet
WWW page, at URL: <http://www.socialresearchmethods.net/kb/>
2. (Electronic Version): StatSoft, Inc. (2012). Electronic Statistics Textbook. Tulsa, OK:
StatSoft. WEB: http://www.statsoft.com/textbook/.(Printed Version): Hill, T. & Lewicki,
P. (2007). STATISTICS: Methods and Applications. StatSoft, Tulsa, OK.
Write a java swing application that takes a text file name as input and counts the characters,
words and lines in the file. Words are separated with white space characters and lines are
separated with new line character.
Write a simple calculator servlet that takes two numbers and an operator (+, -, /, * and %)
from an HTML page and returns the result page with the operation performed on the
operands. It should check in a database if the same expression is already computed and if
so, just return the value from database. Use MySQL or PostgreSQL.
Write an HTML page that contains a list of 5 countries. When the user selects a country, its
capital should be printed next to the list. Add CSS to customize the properties of the font of
the capital (color, bold and font size).
Write a servlet that takes name and age from an HTML page. If the age is less than 18, it
should send a page with “Hello <name>, you are not authorized to visit this site” message,
where <name> should be replaced with the entered name. Otherwise it should send
“Welcome <name> to this site” message.
Write a calculator program in HTML that performs basic arithmetic operations (+, -, /, * and
%). Use CSS to change the foreground and background color of the values, buttons and
result display area separately. Validate the input strings using JavaScript regular expressions.
Handle any special cases like division with zero reasonably. The screen may look similar to
the following:
Internet Technologies and Services
Write a Java program that creates a calculator GUI, as shown in figure. Extra components
may be added for convenience:
The Color Scheme may be Black on
White or Blue on Yellow (selectable)
and accordingly all components
colors must be changed. The values
can be either entered or increased
or decreased by a step of 10. The
operators are +, -, / and *
(selectable). Once any change
takes place, the result must be automatically computed by the program.
Write a Java Application that will read an XML file that contains personal information
(Name, Mobile Number, age and place. It reads the information using SAX parser. After
reading the information, it shows two input Text Fields in a window, one for tag name and
the other for value. Once these two values are given, it should list all the records in the XML
file that match the value of the given field in a text area (result box). For example, if the two
text boxes are entered with “name” and “ABCD” then it should show all the records for
which name is “ABCD”? An Illustration is given below that takes a mobile number and lists
all the records that have the same mobile number.
Write a Java program that generates a key pair and encrypts a given file using RSA
algorithm.
Write an HTML page that gives 3 multiple choice (a,b,c and d) questions from a set of 5
preloaded questions randomly. After each question is answered change the color of the
question to either green or blue using CSS. Finally on clicking OK button that is provided, the
score should be displayed as a pop-up window. Use Java Script for dynamic content.
Write an HTML page that has 3 countries on the left side (“USA”, “UK” and “INDIA”) and on
the right side of each country, there is a pull-down menu that contains the following entries:
(“Select Answer”, “New Delhi”, “Washington” and “London”). The user will match the
Countries with their respective capitals by selecting an item from the menu. The user
chooses all the three answers (whether right or wrong). Then colors of the countries should
be changed either to green or to red depending on the answer. Use CSS for changing color.
Write an HTML Page that can be used for registering the candidates for an entrance test.
The fields are: name, age, qualifying examination (diploma or 10+2), stream in qualifying
examination. If qualifying examination is “diploma”, the stream can be “Electrical”,
“Mechanical” or “Civil”. If the qualifying examination is 10+2, the stream can be “MPC” or
“BPC”. Validate the name to accept only characters and spaces.
Write an HTML page that has two selection menus. The first menu contains the states (“AP”,
“TN” and “KN”) and depending on the selection the second menu should show the following
items: “Hyderabad”, “Vijayawada”, “Kurnool” for AP, “Chennai”, “Salem”, “Madurai” for TN
and “Bangalore”, “Bellary”, “Mysore” for KN.
Write an HTML page that has phone buttons 0 to 9 and a text box that shows the dialed
number. If 00 is pressed at the beginning, it should be replaced with a + symbol in the text
box. If the number is not a valid international number (+ followed by country code and 10
digit phone number) the color of the display should be red and it should turn to green when
the number is valid. Consider only “+91, +1 and +44 as valid country codes. Use CSS for
defining colors.
Write an HTML page that has a text box for phone number or Name. If a number is entered
in the box the name should be displayed next to the number. If 00 is pressed at the
beginning, it should be replaced with a + symbol in the text box. If a name is entered in the
text box, it should show the number next to the name. If the corresponding value is not
found, show it in red and show it in green otherwise. Use CSS for colors. Store at least 5
names and numbers in the script for testing.
A library consists of 10 titles and each title has a given number of books initially. A student
can take or return a book by entering his/her HTNo as user ID and a given password. If there
are at least two books, the book is issued and the balance is modified accordingly.
(a) Use RDBMS and implement it with JSP.
(b) Use XML File for data and Implement it with JSP
(c) Use RDBMS and implement it with Servlets
(d) Use XML File for data and Implement it with Servlets
A Bus Reservation System contains the details of a bus seat plan for 40 seats in 2x2 per row
arrangement, where the seats are numbered from 1 to 40 from first row to last row. The
customer can visit the website and can reserve a ticket of his choice if available by entering
his details (Name, Address, Gender and Age). The customer can cancel the ticket by entering
the seat number and his name as entered for reservation.
(a) Use RDBMS and implement it with JSP.
(b) Use XML File for data and Implement it with JSP
(c) Use RDBMS and implement it with Servlets
(d) Use XML File for data and Implement it with Servlets.
Develop a web application that takes user name and password as input and compares them
with those available in an xml user database. If they match, it should display the welcome
page that contains the user’s full name and last used date and time retrieved from a client
cookie. On logout it stores new time to the cookie and displays a goodbye page. If
authentication fails, it should store the attempt number to the client cookie and displays an
error page. Add necessary CSS that takes care of the font, color of foreground and
background.
database and if failed, show the login page along with a message saying “Login Name or
Password Mismatch” in Red color below the main heading and above the form. If successful,
show a welcome page with the user's full name (taken from database) and and a link to
Logout. On logout, a good bye page is displayed with the total time of usage (Logout time –
login time). Specify the Schema details of table and web.xml file contents.
Implement it using (a) JSP Pages (b) Servlets (c) Struts
Design a struts based web portal for an international conference with following
specifications:
The welcome page should give the details of the conference and a link to login. If login fails,
direct them back for re-login and also provide a link for registration. On successful
registration/login, the user will be directed to a page where s/he can see the status
(accepted/rejected) of their already submitted papers followed by a form for submitting a
doc file to the conference. Provide a logout button on all pages including the home page,
once the user logs in. Implement validation framework to check that the user name is in the
form of CCDDCC and password is in the form of (CCSDDD) (C for character, S for special
character (one of @, #, $, %, ^, & and !) and D for digit)., Database should be accessed
through Connection Pool for MySql for user information. Provide scope for
internationalization in future. Assume any missing information and mention it first.
COURSE COVERAGE
DATA STRUCTURES AND ALGORITHMS
Chapters Units /
TEXT BOOK
S.No SUBJECT in Text Topics AUTHOR PUBLISHERS EDITION
TITLE
Book Covered
Data
structures,
Algorithms Universities 2nd
2,3,4 II,III,IV S.Sahni
and Press
Applications
Data in Java
Structures Data
1 4th
and structures
Algorithms and Adam
1 I Cengage
Drozdek
Algorithms in
Java
Deitel
Java for Pearson ----
5 V and
Programmers education
Deitel
Note: Question paper Consists of 5 SECTIONS (One SECTION for each UNIT) and answer
FIVE Questions, Choosing ONE Question from each SECTION. Each Question
carries 15 marks.
******
SECTION - I
1. a. write a program to merge two linked list one at the end of the other 8M
b. write a program to transpose the matrix 7M
(Or)
2. a. Explain asymptotic notations 7M
b. write a program to multiply two matrices 8M
SECTION – II
SECTION – III
SECTION – IV
7. a. Draw the binary tree with node labels a, b, c, d, e, f and g for which the inorder and
postorder traversals result in the following sequences. inorder: a f b c d g e, postorder:
afcgedb
8M
b. Find the minimum cost spanning tree using kruskal’s algorithm for the given graph
7M
(Or)
8.
Consider the following directed graph. There are a multiple shortest paths between vertices S
and T. Which one will be reported by Dijkstra’s shortest path algorithm? Write the sequence
of vertices and cost of the shortest path from S to T. Assume that, in any iteration the shortest
path to a vertex v is updated only when a strictly shorter path to v is discovered.
15M
SECTION – V
9. Suppose eight characters have a distribution A(1), B(1), C(1), D(2), E(3), F(5), G(5),
H(10). Draw a Huffman tree and calculate average number of bits needed for each
character.
15M
(Or)
10. Construct a binary search tree by inserting in the following sequence of integers: 50, 15,
62, 5, 20, 58, 91, 3, 8, 37, 60 and 24. Check whether the BST is balanced or not and if not
balanced make it balanced. 15M
1. a. Discuss the asymptotic notations. How does one measure the efficiency of the
algorithm? 7M
b. How do you insert the data into and delete data from linked list without traversing the
list? Write down the code for the same. 8M
(Or)
2. write a program to construct singly linked list. Also include insertion, deletion and
searching operations on it. 15M
SECTION – II
3. a. Implement circular queue using array representation. 7M
b. Evaluate the postfix expression 6, 2, 3, +, -, 3, 8, 2, /, +, *, 2, ^, 3, + 8M
(Or)
4. a. construct max heap for the following sequence of input: 25 14 16 13 10 7 12. What is
the resultant max heap after 2nd delete. 8M
b. write a recursive function for finding GCD of two integer numbers 7M
SECTION – III
5. a. The Keys 12, 18, 13, 2, 3, 23, 5 and 15 are inserted into an initially empty hash table of length
10 using open addressing with hash function h(k ) = k mod 10 and linear probing. What is the
resultant hash table? 7M
b. write a program to sort the elements using Insertion sort 8M
(Or)
6. a. A natural bubble sort is to be used to sort the file of integers: 12, 30, 36, 9, 5, 7, 50, 40, 42, 90.
What is the order of the numbers after 3rd pass. 7M
b. write a program to sort the elements using merge sort 8M
SECTION – IV
7. Write and explain Kruskal’s algorithm for finding the minimum spanning tree. Also find the MST
for the following graph 15M
(Or)
8. a. Discuss the threaded binary tree. What are its applications, advantages and
disadvantages over binary tree. 7M
b. explain DFS and BFS with an example 8M
SECTION – V
9. a. Construct AVL tree for the following numbers 14, 8, 12, 36, 23, 5, 67, 78, 20. 8M
b. write a program to find maximum element in the Binary search tree. 7M
(Or)
10. a. What is B-tree? How do you construct the B-tree? Explain with example. 8M
b. Explain KMP Algorithm with example
COURSE COVERAGE
ADVANCED OPERATING SYSTEMS
Chapters Units /
TEXT BOOK
SUBJECT in Text Topics AUTHOR PUBLISHERS EDITION
S.No TITLE
Book Covered
Applied
Operating Wiley,
1,2,3,5,6 I,II A.Silberschatz 6th
System 2000
Concepts
Advance
Operating Lubemir F Bic 6th
1 Operating Pearson
Systems
System 3,45,6 III,IV and Alan C.
Education
Principles Shaw
Modern 3rd
Andrew S Pearson
Operating 5,6,7 V
Tanenbaum Education
Systems
1. (a) Differentiate between RTOS and LINUX with one example to each of the difference.
(b) Explain design issues for hard bound embedded systems?
(Or)
2. (a) List and explain any 4 different types of embedded OS in detail?.
(b) Explain how the process to process calls are handled in Vxworks?
SECTION – II
3. (a) What are the issues in implementing Inter Pipe Communication?
(b) Briefly explain features of embedded UNIX operating System.
(Or)
4. (a) What are the design issues to be addressed in the design of
Distributed operating systems? Give justification with your own example?.
(b) Explain features and principles of various buses used in recent systems design?
SECTION – III
5. (a) What is the importance of unmount service in MACH-OS?.
(b) What are the services provided by memory management unit of network operating
system?
(Or)
6. (a) Differentiate between RTLinux and VXWORKS.
(b) List and explain features of IBM operating Systems.
SECTION – IV
7. (a) What are the design principles of UNIX kernel?
(b) Explain types of RTOS calls with example?
(Or)
8. (a) Explain various features of RTOS kernel with examples?
(b) Explain the life cycle of kernel development?
SECTION – V
9. (a) Explain Multiple Independent Levels of Security (MILS) architecture?
(b) What is kernel service? Write about its implementation methods
(Or)
10. (a) Explain about Real time scheduler?
(b) Explain how Real time scheduler helps for the protection of the data?
COURSE COVERAGE
COMPUTER SYSTEM DESIGN
Chapters Units /
TEXT BOOK
SUBJECT in Text Topics AUTHOR PUBLISHERS EDITION
S.No TITLE
Book Covered
Car
Hamacher,
Computer McGraw Vth
1,2 ,3,5 I,II Zvonks
Organization Hill Edition
Vranesic,
SafeaZaky
Computer
Modern 2nd
1 System Andrew S
Design
Operating 3,4,6,7 III,IV Weiley India edition
Tanenbaum
Systems
Computer
6th
Organization William
5 V Pearson
and Stallings
Architecture
3. Define Register Transfers. Explain execution of the following instruction with suitable
control sequence ADD (R3),R1.
(Or)
4. Explain about Data Hazards and Instruction Hazards.
SECTION – III
5. What is the need of Virtual Memory? Explain Address Translation concept with TLB.
(Or)
6. State and explain Page Replacement Algorithms with an example.
SECTION – IV
Note: Question paper Consists of 5 SECTIONS (One SECTION for each UNIT) and answer
FIVE Questions, Choosing ONE Question from each SECTION. Each Question
carries 15 marks.
******
SECTION - I
1. Write about IA – 32 Addressing modes with an example program.
(Or)
2. Discuss about Direct Memory Access transfer and Device drivers in windows
Operating System.
SECTION – II
3. Explain about Microprogram Sequencing and Wide Branch Addressing with a neat
sketch.
(Or)
4. Explain about Pipeline Performance and Superscalar operation.
SECTION – III
5. Write about Cache Memory mapping functions with an example.
(Or)
6. What is Segmentation? Explain Segmentation with paging scheme.
SECTION – IV
7. What is a Semaphore? Explain Producer – Consumer Problem using Semaphores.
(Or)
8. Discuss about Deadlock Detection and Recovery.
SECTION – V
9. Discuss about file system directory structures and UNIX file system.
(Or)
10. Explain in detail how cryptography is used as a security tool.
COURSE COVERAGE
SOFTWARE PROCESS AND PROJECT MANAGEMENT
Chapters Units /
TEXT BOOK
SUBJECT in Text Topics AUTHOR PUBLISHERS EDITION
S.No TITLE
Book Covered
Managing the
Watts S. 2nd
Software 1,6,13 I,II Pearson
Humphrey
Process
Software Software
Walker Pearson 2nd
Process And Project 6,7,8,9 III,IV
1 Royce Education
Project Management
Management Effective
Project Robert 6th
5 V Wiley India
Management: Wysocki
Traditional
Section-1
1. Explain the characteristics of process maturity levels.
Or
2. What is process assessment explain? What is the need for optimizing process?
Section-2
3. Discuss the model based Architectures
Or
4. What are the management and engineering artifacts? Explain.
Section-3
5. What is a process checkpoint? Explain about various checkpoints in detail
Or
6. Explain the work break down structure
Section-4
7. Explain the Tools for process automation of building blocks.
Or
8. Explain the roles and responsibilities of Line –of – business organizations in detail.
Section-5
Section-3
Or
6. Explain the process planning guidelines.
Section-4
Section-5
COURSE COVERAGE
CLOUD COMPUTING
S.no Subject Text Book Chapters Units /Topics Authors Publications Editions
Title in Text Covered
Book
Raj
Cloud
2,3,4 I,II Kumar wiley 2013
Computing
Buyya
Cloud Mastering Raj Christian
1
Computing Cloud 1,2,3 III,IV Kumar Vaccholia 2013
Computing Buyya selvi
Cloud Arshdeep University
5,6 V 2014
Computing Bhagya press
COURSE COVERAGE
ANDRIOD APPLICATION DEVELOPMENT
Chapters Units
Text Book
S.no Subject in Text /Topics Authors Publications Editions
Title
Book Covered
Professional
android Reto
2,3,5,6 I,II Wrox 2012
application 4 meier
development
Android
Android application
James C Cengage
1 application development 2,3,4 II,IV 2013
Shesui Learning
Development for java
programming
Beginning
Wei-
Android 4
3,4,5 V meng Wiley 2013
application
Lee
development
COURSE COVERAGE
SOFTWARE ARCHITECTURE AND DESIGN PATTERNS
Chapters Units /
TEXT BOOK
SUBJECT in Text Topics AUTHOR PUBLISHERS EDITION
S.No TITLE
Book Covered
Len Bass,
Software Paul
Pearson
Architecture I,II Clements 2003
2,3,4 Education
Software in Practice & Rick
Architecture Kazman
1
and Design Design Erich Pearson 1995
Pattern 3,4,6 III,IV
Patterns Gamma Education
Beyond
Luke , Addison 2003
Software 5,6,7 V
Hohmann wesley
architecture
1.What is meant by software architecture and what makes good software architecture?
Explain why software architecture is important?
(Or)
2.What is reconstructing software architecture? Explain various activities of it?
SECTION – II
3. What is architecture evaluation? Elaborate on ATAM in detail.
(Or)
4.What is meant by Software Product Lines? Explain briefly about software
architecture in future?
SECTION – III
5. What is a design pattern? Explain the role of them in solving design problem.
(Or)
6.Explain motivation, applicability, Structure, Participants, Collaborations, Consequences
and Implementation of Abstract Factory trend.
SECTION – IV
7.Explain any two behavioral patterns with some applications of them
(Or)
8.Write short notes on the following
Mediator pattern
Template method
Visitor
SECTION – V
9.Describe the three views of Celsius Tech architecture case study.
(Or)
10.Discuss the case study of the World Wide Web in interoperability.
COURSE COVERAGE
NETWORK PROGRAMMING
Chapters Units /
PUBLISHER EDITIO
SUBJECT TEXT BOOK TITLE in Text Topics AUTHOR
S N
Book Covered
Unix system programming
2,3,4 II,III,IV T Chan PHI 2nd
using in C++
Network
Unix concepts and 4th
Program 1 I Sumitabha das TMH
applications
ming
Java networking ----
5 V ER Harold,SPD O’Reilly
programming
1. Draw the OSI seven layred model along with the approximate mapping to the internet
protocol ?
3. Explain the TCP based client server programming using echo server/client example ?
4. write a program that print the default TCP,UDP, send and receive buffer server ?
6. a).write in detail in with example usage on getsocketopt and setsocketopt system call ?
b).write in details with the example usage on select and poll system call
8. Explain the how the terminal line disciplines are used in UNIX ?
COURSE COVERAGE
ADVANCE DATABASE
Units
/
Chapters
Topic
SUBJECT TEXT BOOK TITLE in Text AUTHOR PUBLISHERS EDITION
s
Book
Cove
red
Database management
1,2,3,5,6 I,II Raghuramakrishanan TMH 3rd
system
ADVANCE 6th
Database system A silberschartz,HF
DATABASES concepts 3,45,6 III,IV TMH
korth
Fundamentals of 8th
5,6,7 V Ramesh elmerts Pearson
database systems
COURSE COVERAGE
INTERNET TECHNOLOGIES AND SEVICES
Chapters Units
Text Book
S.no Subject in Text /Topics Authors Publications Editions
Title
Book Covered
Web
programming,
Chris Wiley
building 2,3,5,6 I,II 3rd
Bates Dreamtech
internet
INTERNET applications
1 TECHNOLOGIES The complete
Hertbert
AND SERVICES reference 2,3,4 II,IV TMH 7Th
Schildt
java
Professional James
jakartha 3,4,5 V good Wrox
Structs will
COURSE COVERAGE
DATA MINING
Chapters Units
Text Book
S.no Subject in Text /Topics Authors Publications Editions
Title
Book Covered
Data mining
Jiawai
techniques GSP
2,3,5,6 I,II hang 3rd
and algorithms
Micheline
concepts
DATA
1 Data mining Arun K University
MININING 2,3,4 II,IV, 7Th
Techniques Pujari press
Introduction
Pang-ning
to 3,4,5 V Pearson 3rd
Tan
Datamining
COURSE COVERAGE
STORAGE AREA NETWORKS
Units /
Chapters
Topics PUBLISHE
SUBJECT TEXT BOOK TITLE in Text AUTHOR EDITION
Covere RS
Book
d
Tata
Storage Networks: The
I,II Robert Spalding McGraw 2003
Complete Reference 2,3,4
Hill
STORAGE Tata
AREA Building Storage Networks 3,4,6 III,IV Marc Farley McGraw 2002
NETWORKS Hill
, Pearson
Storage Area Network
5,6,7 V Meeta Gupta Education 2001
Fundamentals
Limited
COURSE COVERAGE
SOFT COMPUTING
Chapters Units
Text Book
S.no Subject in Text /Topics Authors Publications Editions
Title
Book Covered
Principles
SN
of soft 2,3,5,6 I,II Wiley 2007
Sivanadam
computing
Soft
Computing
SOFT ang 2,3,4 II,IV, Fakhreddin Pearson 2004
1
COMPUTING intelligent
soft design
Artificial
intelligent
3,4,5 V Elaine ritch CRC Press 3rd
and soft
computing
COURSE COVERAGE
WIRELESS NETWORK AND MOBILE COMPUTING
Units /
Chapters
Topics
SUBJECT TEXT BOOK TITLE in Text AUTHOR PUBLISHERS EDITION
Covere
Book
d
Mobile Johen 2nd
1,6,13 I,II Pearson
WIRELESS communications schiller
NETWORK AND Wireless and Dr.sunil Wiley
6,7,8,9 III,IV ----
MOBILE mobile networks kumar india
COMPUTING Raj Tata Mcgraw
Mobile computing 5 V 2nd
kamal hill
3. Explain about wireless medium access methods for voice and data-oriented networks.