This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
COURSE STRUCTURE (M.TECH (CS.) Effective From 2014-15
SEMESTER I
SEMESTER II
SEMESTER III
SLNO. PAPER SUBJECT UNIVERSITY MARK
INTERNAL MARK
CREDITS
1 MCS11 Computer Architecture 40 10 04
2 MCS12 Data Structure & Algorithm 40 10 04
3 MCS13 Advance Database Management System 40 10 04
Instruction set principles: Classification of instruction Set Architecture, Addressing modes, The MIPs architecture instruction level parallelism. Data hazards, Overcoming Data Hazards with dynamic scheduling; Dynamic scheduling algorithms.
Unit-11
Memory Hierarchy Design: Cache performance, Reducing Cache Miss penalty, Reducing Miss rate, Reducing Cache Miss penalty via Parallelism, Reducing Hit time, Memory technology, virtual Memory, protection and examples virtual memory, symmetric shared memory architecture, performance of symmetric shared memory multiprocessor, Distributed shared memory architecture performance, synchronization.
Unit-111
Storage system: Types of storage devices, buses-connecting I/O device CPU/ Memory Raid, Errors and failures in Real systems, I/O Performance asures, A little queuing theory, Benchmarks of storage performance, Asynchronous I/O and operating system.
Unit-1V
Interconnection Networks, clusters and pipelining: A simple network, or Connection network media, connecting more than two computers, Network logy, practical issues, examples, Inter Networking, Clusters, Designing a, pipeline Hazards, Implementation of Pipeline, A simple Implementation RISC instruction Set, The Classic Five-Stage pipeline for RISC processor, Basic line for MIPS.
Reference Books:
1. Computer Architecture: A quantitative approach: John L. Nnessy and David a. Patterson, Elsevier publication, 5th Edition.
2. Computer Architecture and Organization: John P. Hayes, C. Graw Hill international Edition- 6th Edition. 3. Computer Organization and Architecture: Designing for performance, stalling Pearson Education, 5th
Edition. 4. Computer System Architecture, M. Mano, Pearson Education, 5th Edition
Unit-1 Linear Data Structures and Algorithm Analysis
Review of arrays, stacks, queues, linked lists, linked stacks and linked queues, efficiency of algorithms, asymptotic notations, time complexity of an algorithm using O notation, average-best and worst case complexities.
Unit-2 Non Linear Data Structures and Hash Tables
Introduction-definition and basic terminologies of trees and binary trees, representation of trees and binary trees, binary tree traversals, threaded binary tree, binary search tree, AVL tree, B-tree, Red Black tree, Splay tree, graphs-basic concepts, graph traversal, topological sorting, hashing.
Unit-3 Divide and Conquer & Greedy Method
General method, binary search, finding maximum and minimum, quick sort, merge sort, strassen’s matrix multiplication, greedy method-general method, minimum cost spanning trees, single source shortest path, knapsack problem.
Unit-4 Dynamic Programming and Backtracking
General method, matrix chain multiplication, Travelling salesperson, 0/1 knapsack, Backtracking-general method, 4-Queens problem, sum of subsets problem.
Text Books:
1. R. Kruse, C.L. Tondo, B. Leung, S. Mogalla, “Data Structures & Program Design in C”, Pearson Education 2. G.A.V Pai, “Data Structures and Algorithms-Concepts, Techniques and Applications”, Tata McGraw Hill 3. T.H. Cormen et al., “Introduction to Algorithms”, PHI 4. S.K. Basu, “Design Methods and Analysis of Algorithms”, PHI
Reference Books:
1. R.F. Gilberg, B.A. Forouzan, “Data Structures: A Pseudo Code Approach with C”, Thomson Publication 2. E. Horowitz, S. Sahni, S. Rajasekharan, “Fundamentals of Computer Algorithms”, University Press
Advanced Database Management System MCS-13
4 Hours/Week
UNIT I-Introduction to Databases and Transactions
Database system, purpose of database system, view of data, relational, databases, database architecture, transaction management, The importance of data models, Basic building blocks, Business rules, The evolution of data models, Degrees of data abstraction. Theoretical concepts, Relational model conformity and Integrity, Advanced SQL programming, PL/SQL – Introduction to PL/SQL – Declare, begin statements, Variables, Control Structure, PL/SQL Transactions ,Query optimization, Concurrency control and Transaction management, Database performance tuning, Distributed relational systems and Data Replication, Security considerations . Definition of Transaction and ACID properties. Transaction Processing.
UNIT II-Database Design, ER-Diagram and Relational Algebra and Calculus
Database design and ER Model: Overview, ER-Model, Constraints, ER-Diagrams, ERD, Issues, weak entity sets, Codd’s rules, Relational Schemas, Relational database model: Logical view of data, keys, integrity rules. Relational Database design: features of good relational database design, atomic domain and Normalization (1NF, 2NF, 3NF, BCNF). Relational algebra: introduction, Selection and projection, set operations, renaming, Joins, Division, syntax, semantics. Operators, grouping and ungrouping, relational comparison. Calculus: Tuple relational calculus, Domain relational Calculus, calculus vs algebra, computational capabilities.
UNIT III-Constraints, Views and SQL
Constraints, types of constrain, Integrity constraints, Views: Introduction to views, data independence, security, updates on views, comparison between tables and views SQL: DDL,DML,DCL, data definition, aggregate function, Null Values, nested sub queries, Joined relations. Triggers.
UNIT IV-Data warehousing, OLAP and data mining
Introduction to Data Warehousing – Concepts, Benefits and Problems, DW Architecture , DW tools and technologies – Extraction, cleansing and transformation tools, DW DBMS, admin and management tools, data marts – reasons and issues,. Data Warehousing Design On-line Analytical Processing – OLAP Benchmarks, applications, benefits, tools, categories, extensions to SQL, Data mining – introduction, techniques, predictive modeling, tools. Data mining algorithms, Database security - Security and integrity threats, Defense mechanisms. Emerging Database Management System Technologies.
Text Books:
1. Elmasri and Navathe, Fundamentals of Database Systems, Pearson Education
2. Raghu Ramakrishnan, Johannes Gehrke, Database Management Systems, McGraw- Hill
3. Korth, Silberchatz, Sudarshan , Database System Concepts, McGraw-Hill.
4. Peter Rob and Coronel, Database Systems, Design, Implementation and Management, Thomson Learning.
5. C. J. Date & Longman, Introduction to Database Systems, Pearson Education
6. Bipin C Desai, An Introduction to Database System
Advanced Operating System
MCS-14
4 Hours/Week
Unit-1
Evolution and types of operating systems, Process Management, CPU scheduling algorithms, evaluation of scheduling algorithms, Inter process Communication & Synchronization, classic problems of synchronization.
Unit-2
Deadlocks: reusable and consumable resources, characterization of deadlock, prevention, avoidance, detection and recovery from deadlocks, Memory Management: Basic hardware, address binding, swapping, contiguous memory allocation, paging, segmentation, virtual memory management: demand paging, page replacement algorithms, Allocation of frames, Thrashing.
Unit-3
Device Management: The I/O system, direct I/O with Polling, Interrupt-driven I/O. Storage Management: File concepts, access methods, directory structure, file system implementation, directory implementation, disk space management, disk structure and disk scheduling algorithms.
1. Gary Nutt, Nabendu Chaki, Sarmistha Neogy, Operating Systems: 3rd Edition, Pearson Education, 2005. 2. Avi Silberschatz, Peter Baer Galvin and Greg Gagne, "Operating System Concepts", 8th Edn, Addition
Wesley.
Reference Books
1. Milan Milenkovic, “Operating Systems: Concept and Design”, 3rd Edn, McGraw Hill INC.
2. Andrew S.Tanenbaum, “Modern Operating Systems", 3rd Edn , Prentice Hall Professional Technical Ref.
ADBMS MCS-15 [Lab]
2Hours/Week LABORATORY ASSIGNMENTS
1. Creating database tables and using data types. • Create table • Modify table • Drop table
2. Practical Based on Data Manipulation. • Adding data with Insert • Modify data with Update • Deleting records with Delete
3. Practical Based on Implementing the Constraints. • NULL and NOT NULL, • Primary Key Constraint • Foreign Key Constraint • Unique Constraint • Check Constraint • Default Constraint
4. Practical for Retrieving Data Using following clauses. • Simple select clause • Accessing specific data with Where • Ordered By • Distinct • Group By
5. Practical Based on Aggregate Functions. • AVG • COUNT • MAX • MIN, • SUM • CUBE
6. Practical Based on implementing all String functions. 7. Practical Based on implementing Date and Time functions. 8. Practical Based on implementing use of UNION, ITERSECTION, SET, DIFFERENCE. 9. Implement Nested Queries & all types of JOIN operation. 10. Practical Based on performing different operations on a view. 11. Practical Based on implementing use of Procedures. 12. Practical. Based on implementing use of Triggers 13. Make Database connectivity with front and tools like VB, VC++, and D2K.
Data Structure & Algorithm MCS-15 [Lab]
2Hours/Week
DATA STRUCTURES LABORATORY ASSIGNMENTS
Following is a list of experiments to be coded in C/C++.. Understanding the use of arrays. Programming insertion, deletion, merging in arrays. Realization of various linked lists.; Simulating a stack.; Using stack for various conversions of expression like prefix etc.; Realizing a queue.; Performing various operations on queue. Simulate a tree and perform various tree traversals. Programming various sorting algorithms. Understanding the use of hashing.
Assignments provided below are guidelines only.
Week – 1 Write a programs to implement the Stack ADT using an array, Queue ADT
Week – 2 Write a programs to implement the Stack ADT and Queue ADT using a singly linkedlist
Week – 3 Write a program to implement the deque (double ended queue) ADT using a doubly linked list
Week – 4
Write a program to perform the following operations:
a) Insert an element into a binary search tree.
b) Delete an element from a binary search tree.
c) Search for a key element in a binary search tree.
Week – 5 Write a program that use recursive functions to traverse the the given binary tree in
a)preorder b)inorder c)post order.
Week – 6 Write a program that use non recursive functions to traverse the the given binary tree in a) preorder b)inorder c)post order.
Week – 7 Write programs for the implementation of BFS & DFS for a given graph
Week –8 Merge sort & Heap Sort
Week – 9 Insertion and deletion in B-Tree
Week – 10 Write a program to perform the following operations on AVL-trees:
a) Insertion.
Week – 11 Write a program to implement all the functions of a Dictionary ADT using Hashing.
Week - 12 Write a program to implement Knuth Morris Pattern Matching Algorithm.
Essential Reading:
1. S. Sahni, “Data structures, Algorithms, and Applications in C++ ”, University Press (India) Pvt. Ltd. , 2nd edition,
2. Michael T. Goodrich et al., “Data Structures and Algorithms in C++ ”, Wiley student edition, John Wiley and Sons.
5. End-to-End Protocols: Simple Demultiplexer (UDP), Reliable Byte Stream (TCP). 6. Congestion Control and Resource Allocation: Issues in resource allocation, Queuing disciplines, TCP
congestion control, Congestion-avoidance mechanisms, Quality of Service. 7. Applications: Name Service (DNS), Electronic Mail, World Wide Web, Real-time Transport Protocol,
Session control and call control, Overlay networks. 8. Network Management: Network monitoring and control, SNMP –V1, V2 & V3, RMON and RMONV2.
Text Books
1. Larry L. Peterson & Bruce S. Davie, Computer Networks – A Systems Approach, Morgan Kaufmann Publishers ,3rd Edition, 2003.
2. William Stallings, SNMP, SNMPV2, SNMPV3, RMON1 and 2, Addison Wesley, 3rd Edition, 1999. References
3. Mani Subramanian, Network Management: Principles and Practice, Addison Wesley, 2000. 4. James F. Kurose and Keith W. Ross, Computer Networking – A Top-down approach featuring the Internet,
Addison Wesley, 3rd Edition, 2004. 5. S. Keshav, An Engineering approach to Computer Networks, Addison Wesley, 1997. 6. R. Perlman, Interconnections – Bridges, Routers, Switches, and Internetworking Protocols, 2nd Edition,
Addison Wesley, 2000.
SOFTWARE ENGINEERING
MCS-22
4 Hours/Week
Unit-1
Phases and Models: Phases in S.E, life cycle model, Selection criteria of Models
2. Integrated Approach to Software Engineering: P. Jalote : NAROSA publication.
Reference
1. Software Engineering principles and practice, Jawadekar, JMH
2. Software Engineering a practitimers Approach, R.S.Pressman, Mc GrawHill international 8th
Edition.
Object Oriented Analysis & Design MCS-23
4 Hours/Week
1. Introduction to Object Orientation: Real-world Domains, Object oriented approach and technology, Objects Instances and Concepts. Objects and Classes of Objects Generalized Object-Oriented Software Development Cycle, Object oriented Programming language. Object-Oriented Analysis of a Real-World Domain Object Model. The Notion of Encapsulation and Information Hiding, Object Identity: Entity and Attributes, Data and Knowledge: The Notion of Inheritance, Relationships between Objects: Association, Generalization / Specialization, Aggregation , Objects and States. Dynamic Behavior of Objects.
2. Object oriented Analysis: OO Analysis an introduction, Techniques for information Gathering for RA, Use case - Driven OO Analysis, OO concepts and principles. Identifying the elements of an Object model. Management of OO software projects. Object oriented analysis, domain analysis, generic components of OO analysis model, object behavior model
3. Object-Oriented System Design: OO Design Introduction, System Design Concepts and the Object-Oriented Approach Conventional Vs OO approaches, Design issues, the generic components of the 00 design model, the system design process, the object design process, OOD landscape, Useful design Patterns, OO Design Process, Design patterns. UML and the System Design Introduction to the Unified Modeling Language (UML), The unified Approach, Unified Modeling Language, Static Class diagram, Use case Diagram, Behavior Diagram Relationships, Identifying Attributes and Methods
4. Object oriented testing: Testing OOA and OOD models, Object oriented testing strategies, Test case design for OO software, testing methods applicable at the class level, Interclass test case design.
5. Technical metrics for object oriented systems: The intent of OO metrics, the distinguishing characteristics, metrics for the OO design model, class oriented metrics, operation oriented metrics, metrics for object oriented testing, metrics for object oriented projects.
6. Object-Oriented Programming Paradigm: Object-Oriented Support of Software Qualities Data Abstraction and Encapsulation. Data Type and Abstract Data Type Object-Oriented Program Structure More about Inheritance Reusability and Support for Reuse Class Design Guidelines Morphism and Polymorphism. Binding, Overloading, Overriding Object-Life Cycle. Persistent Objects Introduction to Object-Oriented Databases Object-Oriented Programming Environments. Comparison between C++, Java and C#.
Text Books
1. J. Rumbauch, M. Blaha, W. Premeriani, F. Eddy, W. Lorensen, "Object-Oriented Modeling and Design", Prentice-Hall, 1991.
2. Jacobson, M. Christerson, P. Jousson, G. Overgaard: " Object-Oriented Software Engineering ". A Use Case Driven Approach, Addison-Wesley, 1992.
Reference Books
3. Roger S Pressman, "Software Engineering - A Practitioner's Approach", The McGraw Hill Publications V Edition
4. Waman S Jawadekar, "Software Engineering Principles and Practice", TMH, 2004.
Compiler Design - Tools & Techniques
MCS-24
4 Hours/Week
1. Introduction to Compilers, Overview of Compilers
Why Compilers? A Brief History, Program Related to Compilers, The Translation Process, Major data structures in a Compiler, Other issues in compiler structure, Bootstraping & Porting, Compiler Construction Tools
[ 1.1 to 1.6 of Text Book 1, 1.6 of Text Book 2]
2. Lexical Analysis
The role of the Lexical analyzer, The scanning process, Regular expressions, finite Automata, From Regular expressions to DFA’s , Design of a Lexical Analyzer generator, Use of Lex to generate a Scanner Automatically [2.1 to 2.4, 2.6 of Text Book 1]
3. Syntax Analysis
The role of the parser, The parsing process, Context- free grammars, Parse Tree & Abstract Syntax Trees, Ambiguity, External Notations, EBNF & Syntax diagrams, Formal properties of Context-freeLanguages, The Parser Generator [3.1 to 3.6 of Text Book 1]
4. Top- Down Parsing
Top –Down parsing by Recursive – Descent, LL(1) parsing, First & Follow sets, Error – Recovery in Top-Down Parsers [4.1 to 4.3, 4.5 of Text Book 1]
5. Bottom – Up Parsing
Overview of Bottom – Up parsing, Finite Automata of LR(0) Items & LR(0) Parsing, SLR(1) Parsing, General LR(1) and LALR(1) Parsing, YACC: An LALR(1) Parser Generator, Error
Recovery in Bottom-Up Parser [5.1 to 5.5, 5.7 of Text Book 1]
6. Semantic Analysis
Attributes and Attribute Grammars, Algorithms for Attribute Computation, The Symbol Table, Data Types checking [6.1 to 6.4 of Text Book 1]
7. Intermediate Code Generation
Intermediate Languages, Intermediate Code & Data Structures for code generation, Basic code generation techniques, code generation of data structure references, code generation of control statements & logical expressions, code generation of procedures & function calls [ 8.1 to 8.5 of Text Book 1]
8. Run Time Environment
Memory organization During Program Execution, Fully Static Run Time Environments, Stack-Based Runtime Environments, Dynamic memory, Parameter Passing Mechanisms[7.1 to 7.5 of Text Book 1]
9. Code Optimization
Introduction, The Principal sources of optimization, Optimization of basic blocks, code improving Transformations [10.1 to 10.3, 10.4, 10.5 of Text Book 2]
Text Books
1. Compiler Construction Principles & Practice By Kenneth C. Louden, International Student Edition, 2003, Vikas Publishing.
2. Compilers Principles Techniques & Tools By A. V. Aho, Ravi Sethi & J. D. Ullman Addison Wesley 4th Edition, 2000
Reference Books
1. Engineering a compiler by Keith, D. Cooper & Linda Torezon, Margan Kafmann publishers, first Indian reprint 2004.
2. The essence of compilers by Robin Hunter, Pearson education, First Indian reprint 2004.
Compiler Design
MCS-25 [Lab]
2Hours/Week
COMPLIER DESIGN LABORATORY ASSIGNMENTS.
Details of each experiment are to be provided by the subject teacher. Programming with different compiler writing tools like lex and yacc, or Flex and Bison for object and non object oriented language. Understanding to the file structure, the tokens in which data is to be parsed, the tree in which parsed data is to be stored with lex and yacc. Compiling & running simple programs for specific problems (thermostat controller, finding the header files required for specific function used by programmers in program, designing a desk calculator, Implement an alternative grammars for infix expressions, Write a grammar for complete s-expressions; Programs relating to code generation, and register allocation: program to generate code for a specific assembler, program to identify specific control structures, inserting comments, identifying specific blocks for code partitioning. Build a lexical analyzer and a syntactic analyzer for EBNF( Students are encouraged to use something different like ANTLR and JAVACC); writing a simple HTML-to-TXT translator that reads from standard input text file and writes to standard output and write program that involves embellishing the parser so that it enforces some simple grammatical rules; Introduction to an Object Oriented version of YACC, Concepts to learn multiple instances of same parser which can be used concurrently or in parallel. Designing an XMLParser,Converting Lexacy Data to XML using a Lexer/Parser Generator, Using a Lexer/Parser Generator as a Multipurpose XML Tool Builder.
Assignments provided below are guidelines only.
Week – 1 Write a program converts regular expression to NFA.
Week – 2 Write a program to find first in context free grammar.
Week – 3 Write a program to find whether given string is keyword or not.
Week – 4 Write a program to find whether given string is identifier or not.
Week – 5 Write a program to find whether given string is constant or not.
Week – 6 Write a program to count blank space and count the no. of lines.
Week – 7 Write a program to generate tokens for the given grammar.
Week – 8 Write a program algo to convert NFA to DFA.
Week – 9 Write a program minimization the number of states of a DFA.
Week – 10 Write a program to check if string is in grammar or not.
Week - 11 Write a program to calculate leading of all the non terminals in given grammar.
Week - 12 Write a program to calculate trailing of all the non terminals in given grammar.
Essential Reading:
1. John E. Hopcraft & Jeffery D. Ullman, “Introduction to Automata Theory, Languages and
Computation”, Narosa Publishing House, New Delhi.
2. Alfred V. Aho, Ravi Sethi, Jeffrey D. Ullman, “Compilers - Principles, Techniques and Tools”,
Addison Wesley.
Software Engineering MCS-25 [Lab]
2Hours/Week LAB ASSIGNMENT FOR SOFTWARE ENGINEERING
Lab Assignment-1 Study Various phases of Software Engineering & types of Models used. Lab Assignment-2 Clarify the aspects Requirement Engineering with its types & concepts.
Lab Assignment-3 Make a points on Elicitation Techniques & Traceability table. Lab Assignment-4 Prepare SRS for Banking or On line book store domain problem (Case Study 1)* Lab Assignment-5 Describe the different software engineering standards (CMMI, ISO, SPICE
etc) Lab Assignment-6 Study UML diagrams using Rational rose software. (Case Study 2on Rational
Rose)*
Lab Assignment-7 Detail the characteristics of UML Diagram Approaches for you project
(Include all Diagrams of UML-11 for your Projects) Lab Assignment-8 Evaluate the Design process & concepts with its types & also visualize the
design metrics.
Lab Assignment-9 Analyze the multiple Architectural Views & Styles available for design
methodologies. Lab Assignment-10 Write about some Software Quality Attributes & methodologies. Lab Assignment-11 Accesses the difference between Measurement and Metrics. Lab Assignment-12 Identify the use of testing methodologies according to various testing
strategies. Lab Assignment-13 Design of the test cases for your Project. 2 Lab Assignment-14 Analyze the Risk related to the project and prepare RMMM plan Lab Assignment-15 Conclude the Software Engineering as a Practical Approach.
Unit I: Applications, history of mobile communication, introduction to GSM system, GSM background, GSM operational and technical requirements. cell layout and frequency planning, mobile station, base station systems, switching sub systems, home locations, register, Visiting Location Register (VLR), equipment identity register, echo canceller. GSM network structure, Recent Advances and application Standards in Mobile OS.
Unit II: Time and Frequency Domains representations, structure of TDMA slot with frame; Time organization of signaling channels, frequency hopping.TDMA standards and Applications, Time Organization of signaling Channels. Unit III: Mobility Management, Signaling protocols, steps in formation of a call, location updates, MS-PSTN call, PSTN-MS call, MS-MS call, call handover. Functioning and types of PSTN networks. Security issues in mobile computing, Authentication, encryption, Characteristics of SIM, equipment identification. Security Application development for Mobile OS. Unit IV: Multiplexing issues in time and frequency domains, FDMA, TDMA, CDMA, Physical layer, data link layer, MAP Protocols, MTP3, SCCP, TCAP protocol, message formation, MAP protocol-MAP protocol for MM, MAP protocol for basic service support. Application layers RR-layer, MM-layer, CC-Layer, API’s for mobile application development. Text Books:
1. Asha Mehrotra, GSM System Engg., Artech House 2. William C.Y. Lee, Mobile Communication Design Fundamentals, Wily Series In Telecommunication Reference Books:
1. Jerry D. Gibson, The Mobile Communication Handbook, IEEE Press 2. Jochen Schiller, Mobile Communication, Pearson Education Asia 3. V. Garg and E.Joseph, Wilkes―Wireless and personal Communica ons Systems, Prentice Hall
4. Lauren Darcey and Shane Conder, Android: Wireless Application Development Developer’s Library, 2nd Edition, Addison Wesley.
Embedded & Real Time Systems
MCS-E-2
1. Introduction An Embedded System; Characteristics of Embedded Systems; Software embedded into a system; Real Time Definitions, Events and Determinism, Synchronous & Asynchronous Events, Determinism, Time-Loading, Real-Time Design Issues, Example Real Time Systems.
2. Embedded Microcontroller Cores and Architecture 8051 micro controller; Architecture; Instruction sets; Assembly language programming; I/O port programming; Timer / counter programming;,Serial Communication; Interrupts programming.
3. Real Time specifications and design technique: Mathemetical specifications, flow charts, structure charts, Finite state automata, data flow diagrams, Petri Nets, Warnier Orr Notation, State charts.
4. Processor And Memory Organization Structural Units in a Processor; Memory Devices, Memory selection for an embedded system; Direct Memory Access, DMA controllers; Interfacing Processor, Memory and I/O Devices; Interrupt servicing (handling) mechanism; Context and the periods for context-switching; Deadline and interrupt latency.
5. Language Features: Parameter passing, Recursion, Dynamic allocation, Typing, exception handling, abstract data typing.
6. Real Time Kernels: Real Time and Embedded Operating Systems; Interrupt Routines in RTOS environment; co routines, Interrupt driven systems, Foreground/background systems, Full-featured Real Time Operating Systems.
7. Inter-Process Communication and Synchronisation Of Processes Multiple processes in an application; Problem of sharing data by multiple tasks and routines; Inter Process Communication, Mailboxes, Critical Regions, Semaphores, Deadlock.
8. Programming Languages and Tools Desired language characteristics; Data typing; Control Structures; Packages; Exception Handling; Overloading; Multitasking; Task Scheduling; Timing specification; Programming environments; Runtime support.
9. System Performance Analysis and Optimisation: Response time calculations, Interrupt latency, Time-loading and its Measurement, Reducing response times and time loading, I/O performance
10. Fault Tolerance and Reliability Reliability definitions, Testing: unit and system level; Fault tolerance-N-version programming, built in test software, CPU and Memory testing.
Text Books
1. Rajkamal; “Embedded Systems Architecture; Programming and Design”; Tata McGraw Hill Publications.
2. Phillip A. Laplante .;: “ Real –Time Systems Design and Analysis” –-3rd Edition, Apr 2004. Wiley-IEEE Press References
1. C.M. Krishna; Kang G.Shin; “Real Time Systems”; McGraw-Hill; 1997. 2. Mohammed Ali Mazidi; Janice Gillispie Mazidi “The 8051 Microcontroller and Embedded Systems”;
Pearson Education Asia 2002. 3. David E Simon; An Embedded software primer; Addison Wesley; 2000. 4. Raymond J.A. Buhr; Donald L. Bailey; “An Introduction To Real Time Systems”; Prentice Hall International;
1999. 5. Rajkamal, “Microcontrollers: Architecture, Programming, Interfacing and System Design”, Pearson
Education.
WEB TECHNOLOGIES
MCS-E-3
Unit-1
Web Essentials: clients, server and communication, basic internet protocols, the world wide web, http request message, response message, HTML: planning for designing web pages, model and structure for a website, developing websites, basic html using image links, lists, tables and forms, frames for designing a good interactive website
Unit-2
Style sheets: CSS-Introduction to cascading style sheets, features, core syntax, Style Sheets and HTML Style Rle Cascading and Inheritance, Text Properties, Box Model Normal Flow Box Layout, Beyond the Normal Flow. Client- Side Programming: The JavaScript Language, History and Versions Introduction JavaScript in Perspective, Syntax, Variables and Data Types, Statements, Operators, Literals, Functions, Objects, Arrays, Built-in Objects, JavaScript Debuggers.
Unit-3
Host Objects: Browsers and the DOM-Introduction to the Document Object Model DOM History and Levels, Intrinsic Event Handling, Modifying Element Style, The Document Tree, DOM Event Handling-Accommodating Noncompliant Browsers Properties of window. Server-Side Programming: Java Servlets, Architecture, Overview, A Servelet-Generating Dynamic Content, Life Cycle, Parameter Data, Sessions, Cookies, URL Rewriting, Other Capabilities, Data Storage servelets
Unit-4
Introduction to CGI, testing and debugging perl CGI script using scalar variables and operators in perl.
Text Books:
1. Don Gosselin et al., “Web warrior guide to web design technologies”, Cenage Learning. 2. Jeffrey C.Jackson, "Web Technologies--A Computer Science Perspective", Pearson Education
Reference Books:
1. Robert. W. Sebesta, "Programming the World Wide Web", Pearson Education 2. N.P. Gopalan, J. Akilandeswari, “ Web Technology: A Developer’s Perspective”, PHI
Pattern Classification MCS-E-4
4 Hours/Week
Introduction:
Machine Perception, Pattern Recognition Systems, the Design Cycle, Learning and Adaptation.
Bayesian Decision Theory:
Bayesian Decision Theory-Continuous Feature, Minimum – Error – Rate Classification, Classifiers, Discriminant Functions, and Decision Surfaces, The Normal Density, Discriminate Functions for the Normal Density, Error Probabilities and Integrals, Error Bounds for Normal Densities, Bayes Decision Theory – Discrete Features,
Maximum- likelihood and Bayesian Parameter Estimation:
Maximum- Likelihood Estimation, Bayesian Estimation, Bayesian parameter estimation, Gaussian Case, General Theory, Sufficient Statistics, Problems of Dimensionality, Component Analysis and Descriminats,
Non Parametric Techniques:
Density Estimation, Parzen Windows, Kn-Nearest- neighbor Estimation, the nearest neighbor Rule, Metrics and Nearest Neighbor Classification, Fuzzy Classification,
Linear Discriminant Functions:
Linear Discriminant Functions and Decision Surface, Generalized Linear Discriminant Functions, The Two Category Linearly Sufferable Case,
Unsupervised Learning and Clustering:
Mixture Densities and Identifiability, Maximum Likelihood Estimates, Applications to Normal Mixtures, Unsupervised Bayesian Learning, Data Discrimination and Clustering, Criterion Functions for Clustering, Iterative Optimization, Hierarchical Clustering, The Problem of Validity, Online Clustering, Graph Theoretic Methods, Component Analysis, Low Dimensional Representation and Multi-Dimensional Scaling.
Multilayer Neural Networks:
Feed Forward Operation and Classification, Back Propagation Algorithm, Error Surfaces, Back Propagation as Feature Mapping, Bayes Theory and Probability, Related Statistical Techniques, Practical Techniques for Improving Back Propagation, Second Order Methods, Additional Networks and Training Methods, Regularization, Complexity Adjustment and Pruning.
Introduction to Biometric Recognition:
Biometric Methodologies: Finger Prints, Hand Geometry, Facial Recognition, Iris Scanning, Retina Scanning. Identification Verification - The Distinction, Performance Criteria.
Text Books
1. Richard O. Duda, Peter E. Hart, David G. Stork; "Pattern Classification", A Wiley-Interscience Publication, John Wiley & Sons, Inc, 2000 Second Addition.
2. K. Jain, R. Bolle, S. Pankanti (Eds.), "Biometrics: Personal Identification in Networked Society", Kluwer Academic Publishers, 1999.
Unit I: Routing Cellular and Ad hoc wireless networks; Issues of MAC layer and outing; Proactive, Reactive and Hybrid Routing protocols; Multicast Routing; Tree based and Mesh based protocols; Multicast with Quality of Service Provision Quality of Service: Real-time traffic support; Issues and challenges in providing QoS; Classification of QoS Solutions; MAC layer classifications; QoS Aware Routing Protocols; Ticket based and Predictive location based Qos Routing Protocols.
Unit II: Energy Management Ad Hoc Networks: Need for Energy Management; Classification of Energy Management Schemes; Battery Management and Transmission Power Management Schemes; Network Layer and Data Link Layer Solutions; System power Management schemes Unit III: Mesh Networks: Necessity for Mesh Networks; MAC enhancements; IEEE 802.11s Architecture; Opportunistic Routing; Self Configuration and Auto Configuration; Capacity Models; Fairness; Heterogeneous Mesh Networks; Vehicular Mesh Networks Unit IV: Sensor Networks: Introduction to Sensor Network architecture; Data Dissemination; Data Gathering; MAC Protocols for sensor Networks; Location discovery; Quality of Sensor Networks; Evolving Standards. TEXT BOOK:
1. Siva Ram Murthy and B.S.Manoj, Ad hoc Wireless Networks – Architectures and Protocols, C., Pearson Education, 2004.
Reference Books:
1. Feng Zhao and Leonidas Guibas, Wireless Sensor Networks, Morgan Kaufman Publishers, 2004. 2. C.K.Toh , Adhoc Mobile Wireless Networks, Pearson Education, 2002. 3. Thomas Krag and Sebastin Buettrich , Wireless Mesh Networking , O’Reilly Publishers, 2007
SOFTWARE DEVELOPMENT USING UML
MCS-E-6
Unit-1
Importance of modeling, overview of UML, Building blocks of UML, object oriented design, classes, relationship,
Unit I : Introduction, Algorithms and Complexity: Biological Algorithms versus Computer Algorithms, Notations, Algorithm Design Techniques, Tractable versus Intractable Problems. Molecular Biology Primer: Genes, Molecules, Structure of DNA, Proteins, Analysis. Exhaustive Search: Restriction Mapping, Impractical Restriction Mapping Algorithms, A Practical Restriction Mapping Algorithm, Regulatory Motifs in DNA Sequences, Profiles, The Motif Finding Problem, Search Trees, Finding Motifs, Finding a Median String.
Unit II: Greedy Algorithms: Genome Rearrangements, Sorting by Reversals, Approximation Algorithms, Breakpoints: A Different Face of Greed, A Greedy Approach to Motif Finding. Dynamic Programming Algorithms: The Power of DNA Sequence Comparison, the Change Problem Revisited, the Manhattan Tourist Problem, Edit Distance and Alignments, Longest Common Subsequences. Unit III: Sequence Alignment: Global sequence alignment, the Needleman and Wunsch algorithm, Scoring Alignments, Local Sequence Alignment, the smith-waterman algorithm. Alignment with Gap Penalties, Multiple Alignment, Gene Prediction, Statistical Approaches to Gene Prediction, Similarity-Based Approaches to Gene Prediction, Spliced Alignment. Divide and Conquer Approach to Sorting, Space Efficient Sequence Alignment, Block Alignment. Unit IV: Graph Algorithms: Graphs and Genetics, DNA Sequencing, Shortest Superstring ,Problem, DNA Arrays as an Alternative Sequencing Technique, Sequencing by Hybridization, Fragment Assembly in DNA Sequencing, Protein Sequencing and Identification, The Peptide Sequencing Problem, Spectrum Graphs, Protein Identification via Database Search, Spectral Convolution, Spectral Alignment. Combinatorial Pattern Matching: Repeat Finding, Hash Tables, Exact Pattern Matching, Keyword Trees, Suffix Trees, Heuristic Similarity Search Algorithms, Approximate Pattern Matching, BLAST: Comparing a Sequence against a Database. Text Books:
1. Neil C. Jones and Pavel A. Pevzner, An Introduction to Bioinformatics Algorithms, MIT Press, 2004. 2. Ion Mandoiu and Alexander Zelikovsky, Bioinformatics Algorithms, Techniques & Applications, Wiley Inter-
Science, 2008 3. Wing-Kin Sung, Algorithms in Bioinformatics: A Practical Introduction, CRC Press (Taylor & Francis Group),
2009. Reference Books:
1. T.K. Attwood and Phukan Smith, Introduction to Bioinformatics, Pearson Education. 2. B. Bergeron, Bio-informatics Computing, Pearson Education.
J.M Claverie and C.N. Notredame, Bioinformatics- A beginners Guide, Wiley Pub.