This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
UNIT 1Introduction: An Overview of Database Management System, Database System Vs
File System, Database System Concepts and Architecture, Data Models Schema and
Instances, Data Independence and Data Base Language and Interfaces, Data Definitions
Language, DML, Overall Database Structure.
Data Modeling Using the Entity Relationship Model:
ER Model Concepts, Notation for ER Diagram, Mapping Constraints, Keys, Concepts of
Super Key, Candidate Key, Primary Key, Generalization, Aggregation, Reduction of anER Diagrams to Tables, Extended ER Model, Relationships of Higher Degree.
UNIT 2
Relational Data Model and Language: Relational Data Model Concepts, IntegrityConstraints: Entity Integrity, Referential Integrity, Keys Constraints, Domain Constraints,
Relational Algebra, Relational Calculus, Tuple and Domain Calculus,
Introduction to SQL: Characteristics of SQL. Advantage of SQL. SQL Data Types and
Literals. Types of SQL Commands. SQL Operators and Their Procedure. Tables, Viewsand Indexes. Queries and Sub Queries. Aggregate Functions. Insert, Update and Delete
Operations. Joins, Unions, Intersection, Minus, Cursors in SQL.
UNIT 3
Data Base Design & Normalization:
Functional Dependencies, Normal Forms, First, Second, Third Normal Forms, BCNF,
Inclusion Dependences, Loss Less Join Decompositions, Normalization using FD, MVD,and JDs, Alternative Approaches to Database Design.
Storage and File Structure, Overview of Physical Storage Media, File Organization,
Organization of Records in File, Data Dictionary Storage.
UNIT 4
Indexing & Hashing: Basic Concepts, B+ Tree Index Files, B- Tree Index Files, StaticHashing, Dynamic Hashing.
Transaction Processing Concepts: Transaction System, Testing of Serializability,
Serializability of Schedules, Conflict & View Serializable Schedule, Recoverability,Recovery from Transaction Failures, Log Based Recovery, Checkpoints, Deadlock
Handling.
UNIT 5
Concurrency Control Techniques: Concurrency Control, Locking Techniques for
Concurrency Control, Time Stamping Protocols for Concurrency Control, Validation
Based Protocol, Multiple Granularity, Multi Version Schemes, Recovery with ConcurrentTransaction.
UNIT 1Introduction: Algorithms, Analysis of Algorithms, Growth of Functions: Asymptotic
Notations, Standard Notations and Common Functions; Recurrence Methods:
Substitutions Method, Iteration Method, Master Method, Proof of Master’s Theorem;
Designing of Algorithms- Divide & Conquer: Binary Search, Finding Maximum &Minimum; Sorting and Order Statistics: Heap Sort, Quick Sort, Sorting in Linear Time,
Medians and Order Statistics.
UNIT 2
Advanced Data Structure: Red-Black Trees, Augmenting Data Structure, Binomial
Heaps, Fibonacci Heaps, Data Structure for Disjoint Sets.
UNIT 3
Advanced Design and Analysis Techniques: Greedy Algorithms: Knapsack Problem,Job Sequencing with Deadline, Minimum Cost Spanning Trees Algorithm, Optimal
Storage on Tapes; Dynamic Programming: Multistage Graph, Single Source Shortest
Similarity and Differences from Convential Engineering Processes.
Software Development Life Cycle Models: Build and Fix Models, Waterfall
Model, Prototyping Model, RAD Model Iterative Enhancement Model, Evolutionary
Development Model and Spiral Model, WINWIN Spiral Model, Fourth GenerationTechniques.
UNIT 2
Planning a Software: Process Planning, Effort Estimation:Uncertainities in EffortEstimation, Building Effort Estimation Models, A Bottom-Up Estimation Approach,
Version Control, Change Control & Configuration Audit, Risk Management: Reactive
and Proactive Risk Strategies, Software Risks, Risk Analysis, Identification, Projection,Assessment, Monitoring and Managing the Risk, RMMM Plan.
UNIT 3
Software Requirements Analysis and Specification: Software Requirements: Need forSRS, Requirement Process, Problem Analysis: Informal Approach, Data Flow Modeling,
of an SRS, Components of SRS, Specification Language, Structure of RequirementDocument, IEEE Standards for SRS, Validation, Metrics.
Designing and Coding: Designing: Function Oriented Design: Design Principles:
Problem Partitioning and Hierarchy, Abstraction, Modularity, Top Down and Bottom-UpStrategies, Module Level Concepts: Coupling, Cohesion; Structure Design Methodology,
Verification, Introduction to Object Oriented Design & User Interface Design, Software
Measurement Metrics: Various Size Oriented Measures- Halestead’s Software Science,Function Point (FP) Based Measures, Cyclomatic Complexity Measures: Control Flow
Graphs.
UNIT 4
Coding: Programming Principles and Guidelines: Common Coding Errors, Structured
Programming, Information Hiding, Programming Practices, Coding Standards,
Testing Fundamentals: Error Fault and Failure, Test Oracles, Test Cases and
Test Criteria, Test Case Execution and Analysis, Unit Testing, Integration Testing,Acceptance Testing, Regression Testing, Testing for Functionality and Testing for
Performance. Testing Strategies: Top Down and Bottom up Integration; Testing
Techniques: White Box, Black Box Testing, Alpha and Beta Testing, and Maintenance.
UNIT 5
Computer Aided Software Engineering (CASE): CASE Tools, Scope, Benefits of
CASE Tool, support in Software Life Cycle, Architecture of CASE Environment, Typesof CASE Tools, Software Reliability and Quality Management: -Software Quality
Expression, NFA & DFA, Construction of DFA from NFA & Optimization, Two Way
Finite Automata, Finite Automata with Output: Moore Machine, Mealy Machine &
Equivalence of Moore and Mealy Machine; Applications and Limitations of FiniteAutomata.
UNIT 2
Chomsky Hierarchy: Introduction to Chomsky Hierarchy, Regular Grammars,
Unrestricted Grammars, Context Sensitive Language, Relation between Classes of
Languages. Properties of Regular Sets: Pumping Lemma, Closure Properties, Decision
Algorithm, Context Free Grammar: Ambiguity, Derivation Trees, Simplification ofContext Free Grammar, Normal Forms for CFGs;
UNIT 3
Properties of CFLS: Pumping Lemma, Closure Properties and Decision Algorithms for
CFL; Ambiguous to Unambiguous CFG; Decidability of CFGs.Push Down Automata: Description and Definition, Working of PDA, Acceptance of a
String by PDA, Relationships between PDA and Context Free Grammar, Introduction to
Auxiliary PDA and Two Stack PDA.
UNIT 4
Turing Machines: The Turing Machine Model, Definition and Representation, Language
acceptance by TM, TM & Type- 0 Grammar, Halting Problem of TM, Modificationsin TM, Universal TM, Properties of Recursive and Recursively Enumerable Languages,
Unsolvable Decision Problem, Post Correspondence Problem,
REFERENCES
1. Hopcroft and Ullman, "Introduction to Automata Theory Languages and
Computation",Addison Wesley.2. Mishra & Chandrasekhar, "Theory of Computer Sciences", PHI.
3. Martin, "Introduction to Languages & Theory of Computation", TMH.
4. E V Krishanmoorthy, "Theory of Computer Science", East West Publishing.5. Korral, "Theory of Computer Sciences".
6. Kohan, "Theory of Computer Sciences”, John Wiley.
7. Avi Kohavi, "Switching & Finite Automata Theory", TMH.
UNIT 1Foundation of Information Systems: Introduction to Information System in Business,
Fundamentals of Information Systems, Types of Information Systems, Solving Business
Problems with Information Systems, Effectiveness and Efficiency Criteria.
UNIT 2
System Development: System Analysis and Design functions, CASE Tools, Project
Feasibility, Information Requirement and Decision Analysis, Preparing System Proposal,Input/Output design, Procedures & Control Design, Testing and Quality Assurance,
Implementation, Evaluation and Maintenance, Hardware and Software selection.
UNIT 3Business Application of Information Systems: Internet and Electronic Commerce,
Intranet, Extranet and Enterprise Solutions, Information Systems for BusinessOperations, Information Systems for Strategic Advantages.
UNIT 4
Managing Information Technology: Enterprise and Global Management, Security &
Introduction: History of Web. Growth of the Web, Internet and www, HTML Basicsand Tags, Web Applications, Creating Websites for Individual and Corporate World,
Introduction to Cyber Laws of India. International Cyber Laws. Web Development
Strategies: Web Projects, Writing Web Project, Identification of Objects, Target Users,
Web Team, Planning & Process Development, Early Planning, Contents, Technical &Production Planning, Communication Issues, Browsers, URL, File on the Web,
Transmission, Compression. [10]
UNIT 2
Communication with Clients, Communication Breakdowns, Development of Multi-
Departmental & Large Scale Sites, Quality Assurance & Testing, Study of Technological
Advances and Impact of Web Teams. Design Strategies for E- commerce SiteDevelopments:- Basic Foundation in E-commerce System, Creating Forms. Managing
Data Base through Web, HTML, XML, and Scripting: Lists, Tables, Images, Forms,Frames, XML Schemes, Presenting XML Processes. Introduction to Java Script,
Dynamic HTML with Java Script. [8]
UNIT 3
Java Programming: Introduction, Operator, Control Statements, Arrays, Data type,
Variables, Methods and Classes, Multi threaded Programming, I/O. [8]
Introduction to AWT, Working with Window, Graphics, AWT Controls, LayoutManager and Menus, Images, Additional Packages, Introduction to Java Beans, Java
Instruction Set, Instruction Templates, Assembly Language Programming: Procedure,
Macros, Interrupt and Interrupt Service Routine.
UNIT 3
Interfacing with Peripheral Devices and Memory: Types of Transmission, 8257(DMA),
8255(PPI), Serial Data Transfer (USART 8251), Keyboard- Display Controller ( 8279),
Priority Interrupt Controller( 8259).
UNIT 4
Interfacing with Timers and its Applications: Programmable Interval Timer/Counter
(8253/8254): Introduction, Modes, Interfacing of 8253, Applications, ADC and DAC:Introduction, ADC Converters, Types of ADC, ADC IC (0808/0809), DAC and ADC,
Interfacing and Application.
UNIT 5
Advanced Microprocessors and Micro-Controller: Introduction to Intel 80186,
80286, 80386 and 80486 Microprocessor. Introduction to Embedded System andMicrocontrollers, 8051 Micro-controller: Introduction, Architecture, Instruction set.
REFERENCES:
1. R.S. Gaonkar: “ Microprocessor architecture, Programming and Applications
with
8085/8080”, Penram Publication.2. B.Ram : “ Fundamental of Microprocessor and Microcomputer”, Dhanpat Rai
Publication, 4th edition.
3. R. Singh and B.P. Singh: “ Microprocessor Interfacing and its application”, New
Age International Publishers, 2nd Edition.4. D.V. Hall: “ Microprocessor Interfacing”, TMH ( Revised 2nd Edition).
5. R. Singh and B.P. Singh: “ Advanced Microprocessor and Micro-controllers’,
Processing in R* System, Concurrency Control in Distributed Database System,Recovery in Distributed Database System, Distributed Deadlock Detection and
Resolution, Commit Protocols.
UNIT 4
Database Security: Database Security, Access Control and Grant & Revoke on Views and
Integrity Constraints, Discretionary Access Control, Role of DBA, Security in Statistical
Databases.
UNIT 5
Enhanced Data Model for Advanced Applications: Database Operating System,Introduction to Temporal Database Concepts, Spatial and Multimedia Databases, Data
Mining, Active Database System, Deductive Databases, Database Machines, Web
Databases, Advanced Transaction Models, Issues in Real Time Database Design.
Introduction, Large-Scale Molecular Biology Data Generation, Researchers Gain Access,The Quality of the Data. Private and Future Data Sources. Metadata: Summary and
Reference Systems, Finding New Types of Data Online, Likely Growth Areas.
Biological Bases for Bioinformatics: The Diversity of Life Forms, The Unifying Theme
[10]
UNIT 2
Nucleotide Sequence Data: Genomic Sequencing, Expressed Sequence Tags, GeneExpression, Transcription Factor Binding Sites and Single Nucleotide Polymorphisms.
Computational Representations of Molecular Biological Data Storage Techniques:
Databases: Flat, Relational and Object Oriented, Controlled Vocabularies. General Data
Retrieval Techniques: Indices, Boolean Search, Fuzzy Search and Neighboring. [8]
UNIT 3
Biological Data Types and Their Special Requirements: Sequences, Macromolecular
Structures, Chemical Compounds, Genetic Variability, and Connections to Clinical Data.Representations of Patterns and Relationships: Alignments, Regular Expressions,
Hierarchies, and Graphical Models: Markov Chains and Bays Notes. [7]
UNIT 4
Protein Structure Prediction: Secondary and Tertiary, Homology Modeling, ORF
Prediction, Gene Prediction, Microarray Data Analysis Visualization: Methods for
Presenting Large Quantities of Biological Data, Particularly Sequence Viewers, 3DStructure Viewers, Anatomical Visual at Ion and Database-Driven Web Sites. [8]
UNIT 5
Interoperability: The Challenges of Data Exchange of Data and Integration: On
Topologies, Interchange Languages and Standardization Efforts. XML, UMLS, CORBA,
PERL, PYTHON and OMG/Life Sciences. [7]
REFERENCES:
1. Developing Bioinformatics Computer Skill-O Reilly, 1st Indian Edition, SPD publication.
2. An Intro. To Genetic Analysis - Anthony J. F. Griffiths et al., 1st Ed.
3. Genomics Protocols-Michael Starkey and Ramnath Elaswarapu.
4. Bioinformatics-Methods and Protocols-Stephen Misner & Stephen Krawetz5. Lawrence Hunter-Artificial Intelligence & Molecular Biology, free on web
6. DNA & Protein Sequence Analysis- A Practical Approach, IRL Press at Ox
7. O’ 'Reilly; Developing Bioinformatics Computer Skill- 1st Indian Edition, SPD
publication
STORAGE TECHNOLOGY AND MANAGEMENT
OECS 013
L T P 3 1 0
UNIT 1
Introduction to Storage Technology
Data proliferation and the varying value of data with time & usage, Sources of data and Statesof data creation, Data center requirements and evolution to accommodate storage Needs,
Overview of basic storage management skills and activities, the five pillars of Technology,
Overview of storage infrastructure components, Evolution of storage, Information LifecycleManagement concept, Data categorization within an enterprise, Storage and Regulations.
UNIT 2
Storage Systems ArchitectureIntelligent disk subsystems overview, Contrast of integrated vs. modular arrays, Component
architecture of intelligent disk subsystems, Disk physical structure Components, properties, performance, and specifications, Logical partitioning of disks, RAID & parity algorithms, hot
sparing, Physical vs. logical disk organization, protection, and back end management, Array
caching properties and algorithms, Front end Connectivity and queuing properties, Front endto host storage provisioning, mapping, and operation, Interaction of file systems with storage,
Storage system connectivity Protocols.
UNIT 3
Introduction to Networked Storage
JBOD, DAS, SAN, NAS, & CAS evolution, Direct Attached Storage (DAS)Environments:
and management principles, Hybrid Storage solutions overview Including technologies likevirtualization & appliances.
UNIT 4
introduction to Information Availability
Business Continuity and Disaster Recovery Basics, Local business continuity techniques,
Remote business continuity techniques, Disaster Recovery principles & techniques.
UNIT 5
Managing & Monitoring
Management philosophies (holistic vs. system & component), Industry managementStandards (SNMP, SMI-S, CIM), Standard framework applications, Key management Metrics
Top Down Parsing, Predictive Parsers, Automatic Construction of Efficient Parsers: LR
Parsers, the Canonical Collection of LR(0) Items, Constructing SLR Parsing Tables,Constructing Canonical LR Parsing Tables, Constructing LALR Parsing Tables, using
Ambiguous Grammars, an Automatic Parser Generator, Implementation of LR ParsingTables, Constructing LALR Sets of Items. [10]
UNIT 3
Syntax-Directed Translation: Syntax-Directed Translation Schemes, Implementation of
Syntax-Directed Translators, Intermediate Code, Postfix Notation, Parse Trees & Syntax
Trees, Three Address Code, Quadruple & Triples, Translation of Assignment Statements,
Boolean Expressions, Statements that Alter the Flow of Control, Postfix Translation,Translation with a Top Down Parser. More About Translation: Array References in
Arithmetic Expressions, Procedures Call, Declarations, Case Statements. [8]
UNIT 4
Symbol Tables: Data Structure for Symbols Tables, Representing Scope Information.
Run-Time Administration: Implementation of Simple Stack Allocation Scheme,Storage Allocation in Block Structured Language.
Introduction to Code Optimization: Loop Optimization, the DAG Representation ofBasic Blocks, Value Numbers and Algebraic Laws, Global Data-Flow Analysis.
SEARCHING TECHNIQUES: Informed Search and Exploration:- Informed (Heuristic)
Search Strategies, Heuristic Function, Local Search Algorithms and Optimization
Problems, Local Search in Continuous Spaces, Online Search Agents and Unknown
Environments; Introduction to Constraint Satisfaction Problems (CSP), AdversarialSearch:- Games, Optimal Decisions in Games, Alpha – Beta Pruning, Imperfect Real-
Time Decision, Games that Include an Element of Chance. [8]
UNIT 3
KNOWLEDGE AND REASONING: Introduction to logical Agents, First OrderLogic:– Representation, Syntax and Semantics for First Order Logic, Using First Order
Logic, Inference in First Order Logic:– Prepositional Versus First Order Inference,
Unification and Lifting, Forward Chaining, Backward Chaining, Resolution; Knowledge
Representation:- Ontological Engineering, Categories and Objects, Actions, Simulationand Events. [8]
UNIT 4
LEARNING: Learning from Observations:- Forms of Learning, Inductive Learning,
Learning Decision Trees, Knowledge in Learning:– Logical Formulation of Learning,
Explanation Based Learning, EM Algorithm, Instance Based Learning, Introduction to Neural Networks, Introduction to LISP and PROLOG, Facts, Rules and Queries of
PROLOG, Comparison of LISP and PROLOG, Implementation. [8]
UNIT 5
INTELLIGENT SYSTEMS: Expert System- Stages in the Development of an Expert
System, Difficulties in Developing Expert System, Application of Expert System.Other Intelligent Systems- Introduction to Genetic Algorithm and Evolutionary
UNIT 1CHARACTERIZATION OF DISTRIBUTED SYSTEMS: Introduction: Examples
of Distributed Systems, Resource Sharing and the Web Challenges. System Models
Architectural Models, Fundamental Models, Theoretical Foundation for Distributed
System: Limitation of Distributed System, Absence of Global Clock, Shared Memory,Logical Clocks, Lamports & Vectors Logical Clocks, Causal Ordering of Messages,
Global State, Termination Detection. Distributed Mutual Exclusion: Classification of
Distributed Mutual Exclusion, Requirement of Mutual Exclusion Theorem, Token Basedand Non Token Based Algorithms, Performance Metric for Distributed Mutual Exclusion
Algorithms.
UNIT 2DISTRIBUTED DEADLOCK DETECTION: System Model, Resource vs
Communication Deadlocks, Deadlock Prevention, Avoidance, Detection & Resolution,Centralized Dead Lock Detection, Distributed Dead Lock Detection, Path Pushing
Algorithms, Edge Chasing Algorithms. Agreement Protocols: Introduction, System
Models, Classification of Agreement Problem, Byzantine Agreement Problem,Consensus Problem, Interactive Consistency Problem, Solution to Byzantine Agreement
Problem, Application of Agreement Problem, Atomic Commit in Distributed Database
System.
UNIT 3
DISTRIBUTED OBJECTS AND REMOTE INVOCATION: Communication
Between Distributed Objects, Remote Procedure Call, Events and Notifications,Security:- Overview of Security Techniques, Cryptographic Algorithms, Cryptography
Pragmatics, Needham- Schroeder, Kerberos, SSL & Millicent, Replication: System
Model and Group Communication, Fault - Tolerant Services, Highly Available Services,Transactions with Replicated Data.
UNIT 4
TRANSACTIONS AND CONCURRENCY CONTROL: Transactions, Nested
of Methods for Concurrency Control. Distributed Transactions: Flat and NestedDistributed Transactions, Atomic Commit Protocols, Concurrency Control in Distributed
Introduction to OSI Security Architecture: Security Attacks, Services and Mechanisms,Introduction to Cryptology. Conventional Encryption: Conventional Encryption
Model, Classical Encryption Techniques - Substitution Ciphers: Caesar Cipher,
Monoalphabetic Cipher, Playfair Cipher, Hill Cipher, Polyalphabetic Cipher, One-Time
Ciphers, Fiestal Cipher, Shannon's Theory of Confusion and Diffusion, Data Encryption
Standards (DES): DES Encryption and Decryption, Strength of DES, Differential &Linear Cryptanalysis of DES, Block Cipher Modes of Operation: ECB, CBC, CFB, OFB,
CTR.
UNIT 2Triple DES: Double DES, TDES with Two Keys, TDES with Three Keys; IDEA
Encryption & Decryption, Strength of IDEA.Confidentiality Using Conventional Encryption: Placement of Encryption Function,
Traffic Confidentiality, Key Distribution, Random Number Generation: Use of Random
Numbers, Pseudo Random Number Generators, Cryptographically Generated Random Numbers, Blum Blum Shub Generator.
Introduction to Graph, Ring and Field, Prime and Relative Prime Numbers, Modular
Functions, Message Authentication Codes, Hash Functions: Requirement for a HashFunction, Simple Hash Functions, Birthday Attacks, Block Chaining Techniques;
Security of Hash Function & MACS, MD5 Message Digest Algorithm, Secure Hash
Algorithm (SHA-1)..
UNIT 4
Digital Signatures: Requirements, Direct & Arbitrated Digital Signature; AuthenticationProtocols: Mutual & One way Authentication; Digital Signature Standard (DSS): DSS
Approach, Digital Signature Algorithm.
Network Security Application- Authentication Applications: Kerberos Version 4 &
Difference between Kerberos v4 & v5, Kerberos Realms; X.509 Authentication Service:Authentication Procedures, Directory Authentication Service; Electronic Mail Security
Introduction: What is E-Commerce, Forces behind E -Commerce, E-Commerce IndustryFramework, Brief History of E-Commerce. Inter Organizational E-Commerce, Intra
Organizational E-Commerce, and Consumer to Business Electronic Commerce,
Architectural framework. Network Infrastructure For E-Commerce Network
Infrastructure for E-Commerce, Market forces behind I-way, Component of I Way,Access Equipment, Global Information Distribution Network, Broad band
Telecommunication.
UNIT 2
Mobile Commerce: Introduction to Mobile Commerce, Mobile Computing Application,
Wireless Application Protocols, W AP Technology, Mobile Information Devices. Virtual
Private Network (VPN) , M commerce VS E commerce, M commerce payment methodsand issues, M Commerce limitations
UNIT 3
Introduction to Web security, Firewalls & Transaction Security, Client Server Network,
Emerging Client Server Security Threats, Electronic Payments: Overview of Electronics payments, Emerging financial Instruments, Home Banking, Online Banking, digital
signatures and authentications,
UNIT 4
Net Commerce: EDI, EDI Application in Business, Legal & ethical Issues in E-
Commerce, Identification and tracking tools of E Commerce, web based marketing,
Some sites of interests, E Commerce in India, Case Study of Online Banking.
REFERENCES:
1. Greenstein and Feinman "E-Commerce" TMH 2. Ravi Kalakota, Andrew
Whinston "Frontiers of Electronic Commerce" Addision Wesley
2. Denial Amor "The F-Business Revolution"3. Addision Wesley Sokol "From EDI to E-Commerce : A Business Initiative" TMH
DIWAN, Sharma "E-Commerce" Excel Asset
4. lnternational "Net Commerce" TMH5. Bajaj and Nag "E-Commerce : The Cutting Edge Business" TMH.
UNIT 1Introduction to ERP: Evolution of ERP, Reasons for the growth of ERP, Scenario andJustification of ERP in India, Evaluation of ERP, Various modules of ERP, Advantagesof ERP, An Overview of Enterprise: Integrated Management Information, BusinessModeling, ERP for Small Business. [8]
UNIT 2ERP and Related Technologies: Business Process Reengineering (BPR), DataMining, Data Warehousing, OLAP, Management Information System (MIS), ExecutiveInformation System (EIS), Decision Support System (DSS) ERP Modules: Introduction,
UNIT 3ERP Implementation Lifecycle: Issues in Implementing ERP packages, PreevaluationScreening, Package Evaluation, Project Planning Phase, Gap Analysis, Reengineering ,Configuration, Implementation, Team Training, Testing End- User Training Vendors,Consultants and Users: In-House Implementation -Pros and Cons, Vendors,Consultants, End- Users [8]
UNIT 4ERP Market Introduction: SAP AG , Baan Company, Oracle Corporation, PeoplesOft,JD Edwards World Solutions Company, System Software Associations (SSA) , QAD , AComparative Assessment and Selection of ERP Packages and Modules. [8]
UNIT 5Future Directions in ERP: New Markets, New Channels, Faster ImplementationMethodologies, Business Models and BAPIs, Convergence on Windows NT,Application Platforms, New Business Segments, More Features, Web Enabling, MarketSnapshot. [8]
REFERENCES:
1. Enterprise Resource Planning, Alex Leon, Tata McGraw Hill.2. ERP - A Managerial Perspective, S.Sadagopan , Tata McGraw Hill.
Concept of Networking: FDDI, Ethernet 802.11a; Wireless Network and Mobile IP:Infrastructure of Wireless Networks, Wireless LAN Technology. Mobile IP; WAN:
GSM, GPRS, CDMA; Wireless PAN: Bluetooth Technology, Enhancement of Bluetooth,
Types of WPAN, Zigbee, RAN & MANET. [8]
UNIT 2
Client Server Model & Socket Interface: Client Server Model, Connectionless Iterative
Server, Connection Oriented Concurrent Server, Concurrency, Processes, Sockets, ByteOrdering, Address Transformation, Socket System Calls. Internet Security: Network
Attacks, Needs of Intrusion Monitoring & Detection, Intrusion Detection.
Firewall: Introduction, Types of Firewall, Design and Implementation Issues, Working of
Firewall. [10]
UNIT 3
Fundamentals of Cyber Law: Jurisprudence of Cyber Law, Object and Scope of the IT
Act, Introduction to Indian Cyber Law, International Cyber Law, UNICITRAL Model
Law on Electronic Transactions, ISP Guideline, Governance and IT Act 2000.E-commerce- Issues of privacy, E- agreement and the web surfing, cyber patents- copy
right, Protection of Web content, software patent.
Digital Signatures - Technical issues, legal issues, Electronic Records, Digital Contracts,
Government Control over electronic transaction, strategy to combat cyber crime. [10]
UNIT 4
Certifying Authorities: Need of certifying authority and Power, Appointment, function ofcontroller, generation, Suspension and Revocation.
Intellectual Property Issues & Cyberspace - Indian Perspective: Overview of Intellectual
Property related Legislation in India, Copyright law & Cyberspace, Law relating toSemiconductor Layout & Design
Domain name Disputes and Trademark Law: Concept of Domain name, Trademark,
Jurisprudence, cyber squatting, reverse hijacking, Meta tags, framing [8]
UNIT 5
The Cyber crime: Tampering computer documents, hacking with computer system,Obscene in electronic Document, offences: breach of confidentiality and privacy in
digital signature certification, Typology of Cyber Crimes, Cyber Crime & Evidence Act.
Cyber Crime in other countries, Cyber Crime Forensics, Case studies in Cyber Crime.
UNIT 1Overview & Concepts- The Compelling Need for Data Warehousing: Introduction to
Data Warehousing, Failures of Past Decision Support System, Data Warehousing- The
Only Viable Solution., Architecture: Understanding Data Warehouse Architecture,
Architectural Framework, Data Warehouses and Data Marts; Overview of Components,
UNIT 2
Technical Architecture: Introduction to Principles of Dimensional Modeling; DataExtraction, Transformation, and Loading, Data Quality: Why is data Quality Critical? ,
Data Quality Challenges; OLAP in the Data Warehouse: Demand for Online Analytical
Processing, Major Features and Functions, OLAP Models.
UNIT 3
Data Mining: Introduction, Data Mining Functionalities, Classification of Data MiningSystem; Major Issues in Data Mining, Data Preprocessing: Preprocess, Descriptive Data
Summarization, Data Cleaning, Data Integration & Transformation, Data Reduction,
Mining Frequent Patterns, Association, and Correlations, Basic Concept, Efficient &Scalable Frequent Itemset Mining Methods, Mining Various Kinds of Association Rules.
UNIT 4
Classification & Prediction: Issues, Classification by Decision Tree Induction, BayesianClassification, Classification by Back Propagation, Associative Classification, nearest
neighbor classified , Prediction, Cluster Analysis: What is Cluster Analysis, Types,
Categorization of Major Clustering Methods, Partitioning Methods, HierarchicalMethods- cure and chameleon , Density-Based Methods: DBSCAN & OPTICS, Wave
Cluster, CLIQUE, Mining Stream: Mining Data Stream, Spatial Data Mining,
Text Mining, Mining the WWW,
REFERENCES
1. “Data Warehousing Fundamental” by Paulraj Ponniah,John Wiley & Sons INC.2. Data Mining,Second Edition; Concepts & Techniques by Jiawei Han & Michline
Introduction and Overview: The Motivation for Internetworking, The TCP/IP Internet.The Need to Understand Details, Complexity of Interactions Among Protocols, Use of
TCP/IP, Designing Applications for a Distributed Environment Standard and
Nonstandard Application Protocols, Application Protocols and Software Complexity,
IP Addresses: Introduction: Address Space, Notation, Classful Addressing: RecognizingClasses, Netid and Hostid, Classes and Blocks, Network Addresses, Mask, Address
Depletion. Other Issues, Multihomed Devices, Location, Special Addresses, Private
Addresses, Unicast, Multicast and Broadcast, Addresses, Sub Netting, Super Netting,
Subnet Mask, Supernet Mask and Classless Addressing. [8]
UNIT 3
ARP and RARP: ARP Packet Format, Encapsulation, Operation, ARP Over ATM, Proxy
ARP, ARP Package, RARP-Packet Format, Encapsulation, Internet Control Message
Protocol( ICMP), Message Format, Checksum, ICMP Package, Internet GroupManagement Protocol (IGMP), IGMP Messages, IGMP Operation, Encapsulation, IGMP
Package, User Datagram Protocol(UDP), Process to Process Communication, Checksum,
UDP Operation, UDP Package. [8]
UNIT 4
Transmission Control Protocol (TCP): Process to Process Communication, TCP Services,
TCP Timers, Connection, TCP Operation, TELNET, Concept, Network VirtualTerminal(NVT), File Transfer Protocol(FTP), Trivial File Transfer Protocol (TFTP),
Messages, Connection, Data Transfer, Simple Mail Transfer Protocol (SMTP), User
Agent, Addresses, Mail Transfer Phases, Multipurpose Internet Mail Extensions(MIME), Mail Delivery, Mail Access Protocol.
[8]
UNIT 5
IP Over ATM, ATM WANs, Carrying a Datagram in Cells, Routing the Cells, Mobile IP,
Addressing, Agents, Data Transfer, Real-Time Traffic Over the Internet, Characteristics,Internet Security, Introduction, Privacy, Digital Signature, Firewalls, Private Networks,
Virtual Private Networks(VPN), Network Address Transmission(NAT), IP Next
1. “TCP / IP Protocol Suite”, ‘Behrouz A. Forouzan’, TMH
2. “Internetworking with TCP/ IP- vol-I”, ‘Douglas E. Comer’, Third Edition, PHI3. Internetworking with TCP/ IP- vol-II”, ‘Douglas E. Comer’, Third Edition, PHI
Optimization Methods: Optimization Using Hopefield Networks, Introduction toSimulated Annealing and Ant Colony Optimization and Evolutionary Computation,
Introduction, Interface Definition Language, The CORBA 2 Standard, CORBA Services,
CORBA Facilities and CORBA Domains, Relationships with other Technologies, TheCORBA Migration Process, CORBA Migration Case Study.
UNIT 5
COM: Components, The Interface, Query interface, Reference Counting, DynamicLinking, Hresults, Guids, The Registry, The Class Factory, Component Reuse:
Containment and Aggregation, Client and Server Side Simplifications, Servers in Exes,
Dispatch Interfaces and Automation, Multiple Threads.
Introduction- Introduction to Real Time Systems, Structure of Real Time System,Various Classification of Real Time Systems, Embedded System, Characterizing Real
Time System & Task, Various Issues in Real Time System. [6]
Monotonic, EDF. Uniprocessor Scheduling of IRIS Tasks, Identical and Nononidentical
Linear & Concave Reward Function, 0/1 Reward Function. Task AssignmentAlgorithms- Utilization Balancing, A Next-Fit Algorithm for RM Scheduling, A Myopic
Offline Scheduling FAB Algorithm & Buddy Strategy. [10]
UNIT 3Real Time Database: Real Time vs. General purpose Database, Main Memory database,
Concurrency Control Issues , Real Time OS- Threads and Tasks, Kernel, Case Study ofQNX, VRTX, Vx Works.
[8]
UNIT 4
Fault Tolerance Techniques- Introduction Fault, Fault Detection and Error
Containment, Redundancy Data Diversity, Reversal Checks, Malicious & Integrated
Failure Handling. Clock Synchronization: Introduction Clocks, A Nonfault Tolerant
Synchronization Algorithms, Impact of Fault, Fault Tolerant Synchronization in H/W
and S/W. [8]
UNIT 5
Real Time Communication- Introduction, N/W Topologies, Protocols: Internet &
Resource Reservation Protocols, Real Time Protocol, Contention-Based Protocol.
[8]
REFERENCE
1. C.M. Krishna & Shin, "Real Time Systems", Mc Graw Hill 1985.2. Jane W.S. LIU, "Real Time Systems", Pearson Education".
3. Levi & Agarwal, "Real Time System", McGraw Hill.
Introduction to Multimedia: Evolution of Multimedia and its Objects, Scope ofMultimedia in Business & Work, Production and Planning of Multimedia Applications.
Multimedia Hardware, Memory & Storage Devices, Communication Devices,
Multimedia Software, Presentation and Object Generation Tools, Video, Sound, Image
Capturing, Authoring Tools, Card & Page Based Authoring Tools. [10]
UNIT 2
Production and Planning of Multimedia Building Blocks: Text, Sound (MIDI), DigitalAudio, Audio File Formats, MIDI Under Windows Environment, Audio & Video
Capture. [7]
UNIT 3Macromedia Products: Basic Drawing Techniques, Advance Animation Techniques,
Creating Multi Layer Combining Interactivity and Multiple Scenes, CreatingTransparency Effects using Text in Flash, Flash Animation.
Multimedia and the Internet: The Internet and how it Works - Tools for the World Wide
Web - Designing for the World Wide Web. [8]
UNIT 4
Digital Audio Concepts, Sampling Variables, Loss Less Compression of Sound, Lossy
Introduction and Fundamentals: Motivation and Perspective, Applications, Components of Image Processing System,
Element of Visual Perception, A Simple Image Model, Sampling and Quantization.
Image Enhancement in Frequency Domain: Fourier Transform and the Frequency
Domain, Basis of Filtering in Frequency Domain, Filters –Low-pass, High-pass;Correspondence between Filtering in Spatial and Frequency Domain; Smoothing
Frequency Domain Filters – Gaussian Low pass Filters; Sharpening Frequency Domain
Filters – Gaussian High pass Filters; Homomorphism Filtering.
Enhancement; Enhancement Using Arithmetic/Logic Operations – Image Subtraction,Image Averaging; Basics of Spatial Filtering; Smoothing - Mean filter, Ordered Statistic
Filter; Sharpening – The Laplacian.
UNIT-3
Image Restoration:
A Model of Restoration Process, Noise Models, Restoration in the presence of Noise
only-Spatial Filtering – Mean Filters: Arithmetic Mean filter, Geometric Mean Filter,Order Statistic Filters –Median Filter, Max and Min filters; Periodic Noise Reduction
by Frequency Domain Filtering –Band pass Filters; Minimum Mean-square Error
Restoration. Morphological Image Processing: Introduction, Logic Operations involvingBinary Images, Dilation and Erosion, Opening and Closing, Morphological Algorithms
– Boundary Extraction, Region Filling, Extraction of Connected Components, Convex
Hull, Thinning, Thickening
UNIT-4
Registration :Introduction, Geometric Transformation – Plane to Plane transformation,Mapping, Stereo Imaging –Algorithms to Establish Correspondence, Algorithms to
Recover Depth. Segmentation: Introduction, Region Extraction, Pixel-Based Approach,
Multi-level Threshold, Local Threshold, Region-based Approach, Edge and LineDetection: Edge Detection, Edge Operators, Pattern Fitting Approach, Edge Linking and
Edge Following, Edge Elements Extraction by Threshold, Edge Detector Performance,
Introduction, GIS Definition and Terminology, GIS Categories, Components of GIS,Fundamentals Operations of GIS, A Theoretical Framework for GIS. [8]
UNIT 2
Types of Data Representation: Data Collection and Input Overview, Data Input and DataOutput, Keyboard Entry and Coordinate Geometry Procedure, Manual Digitizing,
Issue in Mobile Computing, Digital Cellular Standard, IEEE 802.11, channelallocation in cellular system, GSM: air interface, channel structure, location
management, HLR VLR, hierarchical, Handoff, CDMA and GPRS.
[8]
UNIT 2
Mobile Computing Architecture: Peer to Peer architecture for mobile application, three
tier architecture, wireless networking, wireless LAN over MAC, wireless multipleAccess Protocol, TCP over wireless, WAP architecture, Protocol stack, application
environment. [8]
UNIT 3Mobility, Wireless Communication & Portability, Data Replication & Replication
Schemes, Adaptive Clustering for Mobile Wireless Network, Transaction Management,Mobile Transaction Processing, Mobile Database Research Directories, Security Fault
Tolerance for Mobile Network. [8]
UNIT 4
Emerging technology: Bluetooth, wireless broad band (Wi MAX), Internet Protocol
version6(IPV6), radio frequency identification, cellular digital packet data(CDPD)
standard, SMS: mobile computing over SMS, value added service through SMS. [8]
UNIT 5
Adhoc Network, Routing Protocol, Global State Routing (GSR), Dynamic State Routing(DSR), Fisheye State Routing (FSR). Adhoc On-demand Distance Vector Routing
Basic of the .Net framework: .Net architecture, managed code, assemblies, clr,
execution of assemblies code, il, jit, net framework class library, common type system,
common language specification, interoperability with unmanaged code.
Introduction to VB.Net and C#:
VB.Net : Net features, Data Types C# : Data Types, Operators, Garbage Collection,Jagged Array, Collection (Array list, Hash table), Indexer(One Dimension) and property,
Delegates and events(Multicasting , Multicasting Event), Exception Handling, Window
forms.
ADO.Net & Object Oriented Concepts (Using VB.Net Or C#): Basic window control,Architecture of ADO.Net, Comparison with ADO, .Net Data provider, Data Adapter,
Data Set, Data Row, Data Column, Data Relation, command, Data Reader, Data GridConstructor, Destructor, Abstraction, interface, polymorphism (Over loading and over
ridding).
Practical
1. A program of binary operator Over loading
2. A program using delegation in which addition and subtraction of two integervalue possible
3. A program-using Interface.
4. A program to display the caption, height of command button into label.5. A window program for list box give the facility for adding, removing and clearing
the list with conformation and store the deleted file in another list box.
6. Creating a window form through which user can enter details of employee:empid, empname, basic salary, sex, date of birth, date of joining, Designation,
total income, total deduction and gross salary will be calculated automatically.
7. Also in above program all details of employee will be appear in Grid and
depending upon selection particular actual record will be appear in form.
ASP.Net : Anatomy of ASP.NET Page, Server Controls : label, dropdown list box,
validation controls, list box, text box, radio button, check box, State Management :session, caching, Authentication (window,.Net Passport, Forms Based), Authorization,
Students will complete the project identified in previous semester, coding,implementation etc of the project should be done in this semester. At the end of the
semester, student will submit detail project report and soft copy of project work which
will be evaluated by the expert from the University.