iIII-r (., Regular M_Tech. in Computer Science & Engineering ...

36
0::;"- •••. / i II I -r (., Regular M_Tech. in Computer Science & Engineering and lnformation-' Technology First Semester Course CS/IT 11 Foundations of Computer Sci erice . Section A: Discrete Mathematical StructUI:·es 1511[s Algebraic Structures: Semigroups, Monoids, Groups, SubstTuctures and Morphisrns. Rings, Fields, Lattices, distributive, modular and complemented lattice, Boolean Algebras. Forma I Logics: -Proposili(ma!:-10~ic Predicate logic; limitations of predicate <logic, universal and existential quantification: modus ponens and .modustollens. Proof techniqyes: Notions of implication. converse, inverse, contrupositivc.-ncgations and contradiction. Introduction LoCCJ.unling: Hasic counting techniques, principles of inclusion .arid exclusion, permutations, combiuatiuns. summations, probability, Rec(lrrenC~ Relations. Generating Functions. Introduction to Graph: Craphs and their basic properties, Eulerian and. Hamiltonian 'walk, graph culouring, planar graph, enumeration, vector graph. Books and References: Kenneth Rosen, Discrete Mathematics and its applications, TMH C.L.Liu, Elements of Discrete mathematics, TMH D.B.West, Introduction to Graph Theory, PHI l.P.Trembley and KManohar, Discrete Mathematical Structures with Applications to computer science, TMH Section 13: Data Structures and Algorithms 15lns Ale,Oli:jp.Jl .uul Complexity, Notutions of complexity. SurLinlj and Divide lInd C()n'-ll!~'r Strategy: Merge-Sort, Quick Sorl with averae,e case analysis. Heaps and heap sort. Lower bound on comparison-based sorting. Advanced search Structures: Representation, Insertion and Deletion operations on I~('d- mack trees, 13-Trees, Hashing. Dynamic programming, matrix multiplications, longest cornmon subsequence, Greedy method, Knapsack Problem, B qllcen Problem. Backtrncking. branch and bou nd, Fibonacci Heap Graph Algorithms: Grarh~i and their represenlations. I3FS, DFS, Minimum spLll1ninj; trees, ~;ll()rlcst pi1ths, l(ru"ka I and Pri m' s algori th ms. Connected cornpollcn ts Bool:« and [~c!t'/,(~/lct's.: COrCIIICI/, Lciscrsou and Riucsi, Algorifltllls, MIT Press. E. Hunnuitltz IIlId 5.5111I11i. Fiuukuucntals O{GJlllplltcr /\lsoritl11l1, Calxofitl OOl/tlld Knuth: Tlte Art a/ConTputer Progmlllllllfli; s: Vol. i alld.3, Pearson ~.

Transcript of iIII-r (., Regular M_Tech. in Computer Science & Engineering ...

0::;"- •••.

/iIII-r (., Regular M_Tech. in Computer Science & Engineering and lnformation-'

Technology First Semester Course

CS/IT 11 Foundations of Computer Sci erice. Section A: Discrete Mathematical StructUI:·es

1511[sAlgebraic Structures:Semigroups, Monoids, Groups, SubstTuctures and Morphisrns. Rings, Fields, Lattices,distributive, modular and complemented lattice, Boolean Algebras.

Forma I Logics:-Proposili(ma!:-10~ic Predicate logic; limitations of predicate <logic, universal andexistential quantification: modus ponens and .modustollens. Proof techniqyes: Notionsof implication. converse, inverse, contrupositivc.-ncgations and contradiction.

Introduction LoCCJ.unling:Hasic counting techniques, principles of inclusion .arid exclusion, permutations,combiuatiuns. summations, probability, Rec(lrrenC~ Relations. Generating Functions.

Introduction to Graph:Craphs and their basic properties, Eulerian and. Hamiltonian 'walk, graph culouring,planar graph, enumeration, vector graph.

Books and References:• Kenneth Rosen, Discrete Mathematics and its applications, TMH• C.L.Liu, Elements of Discrete mathematics, TMH• D.B.West, Introduction to Graph Theory, PHI• l.P.Trembley and KManohar, Discrete Mathematical Structures with

Applications to computer science, TMH

Section 13: Data Structures and Algorithms15lns

Ale,Oli:jp.Jl .uul Complexity, Notutions of complexity. SurLinlj and Divide lInd C()n'-ll!~'rStrategy: Merge-Sort, Quick Sorl with averae,e case analysis. Heaps and heap sort.Lower bound on comparison-based sorting.i·Advanced search Structures: Representation, Insertion and Deletion operations on I~('d-mack trees, 13-Trees, Hashing.

Dynamic programming, matrix multiplications, longest cornmon subsequence, Greedymethod, Knapsack Problem, B qllcen Problem. Backtrncking. branch and bou nd,Fibonacci Heap

Graph Algorithms:Grarh~i and their represenlations. I3FS, DFS, Minimum spLll1ninj; trees, ~;ll()rlcst pi1ths,l(ru"ka I and Pri m' s algori th ms. Connected cornpollcn ts

Bool:« and [~c!t'/,(~/lct's.:

COrCIIICI/, Lciscrsou and Riucsi, Algorifltllls, MIT Press.E. Hunnuitltz IIlId 5.5111I11i. Fiuukuucntals O{GJlllplltcr /\lsoritl11l1, Calxofitl

• OOl/tlld Knuth: Tlte Art a/ConTputer Progmlllllllfli; s: Vol. i alld.3, Pearson

~.

UPTU Regular M.Tech. ill Computer Science 8:. Engineering and Information.'Technology First Semester Course

• V.AIIO, J.E.HoperoJl and f.D.Ullmail Design and /lIInlysis oj Computer AIgoriUIIII,Addisiou WesleyK.Mcllwrn. Data Structures and Algorithms VallI, Springer Verlag•

Section C: Theory of Computation15 Ius

Regular languages:Alphabet., Languages and grammars. Regular grammars, regular expressions and finite: ...automata, deterministic and nondeterministic. Closure and decision properties of ;regular sets. Pumping lemma of regular set's. Minirnizafion of finite automata.

Context free Languages:Context free gramm(lrs and pushdown automata. Chomsky and Griebach norma) forms.Cook, younger and Kasami Algorithm, Ambiguity and properties of context freelanguages pumping lemma. Deterministic pushdown automata. Closure properties ofdeterministic context free languages.

Turing Machine:Turing machines and variation of Turing machine model, Halting problem, Universalturing machine, Type 0 Languages. Linear bounded automata and context sensitive,languages. Turing Computable functions, Church Turing hypothesis. Recursive andrecursively enumerable sets, Universal Turing machine and undecidable problems,Rice's theorems for RE sets, Undecidablity of Post correspondence problem. Valid andinvalid computations of Turing machines, undecidable properties of context freebllgll<1~e problems, Basics of Recursive function theory.

Books and References:• C.Papadimitrou and C.t..Lewis. Elements of Theory of Computation, PHI• j.E.Hopcroft and J.D.Ulltn<1n. Introduction to Automata Theory, Languages of

Computations, Addison-Wesley

' .

. "

",

~:

~':

==:/ -~

/~

, .' h .C~('<'r~~~-"-'~~'"". PTU Regular M.Tech. in Computer Science & Engineering and Information Tecl~hl(ogy~F;irst .

Semester Course .

CS/iT 12 Computer OrganiL'ltion &Architccturc

Computer OrganizationUnit:l 10 hrs

Basic Computer Orgnniration and design: Instruction set Principles: ClassifyingInstruction .Set Architectures, Memory Addressing, Type and size of operands,Operations in the instruction set; Instruction Codes, Computer Register, Register TransferLanguage, Time and Control, Instruction Cycle, Memory reference instructions, Input-Output and Interrupt. Design of Basic Computer and Arithmetic and Logic Unit.Micro programmed Control: Control Memory, Address Sequencing, Design of controlunit.Central Processing Unit: General Register Organization, Stack Organization, InstructionFormats, Data Transfer and Manipulations program control.

Ullit:2 8 hrs• Computer Arithmetic: Addition, Subtraction, Multiplication and Division algorithms .

.: '.Floating-point arithmetic operations, IEEE 754, Decimal arithmetic unit and DecimalArithmetic operations.

Unit:3 10 hrse Input- Output Organization: Peripheral Devices, Input-Output Interface, Asynchronous

data transfer, Modes & transfer," priority interrupt, Direct Memory ,Access,' 'I/OPerformance Measures, Benchmarks of Storage Performance and Availability. .

• Memory Organization: Memory Hierarchy, Main Memory, Auxiliary Memory,Associative Memory, Shared Cache Memory...··· . ~.

Cache Memory and its performance, Reducing Cache Miss Penalty, Reducing MissRate, Reducing Cache Miss Penalty or Miss Rate via Parallelism, Reducjrig Hit Time,Virtual Memory. ' . ,,'

Computer Architecture.Unit: 4 10 hrs

• Principles of Scalable Performance: Performance metric and .measures, speedupperformance laws, scalability· analysis and approaches. Parallel processing andapplication.

• Advanced Processor Technology: Design space' of processors,' Instruction set .architectures, CISC, RISe.

• Pipelining: Linear and nonlinear pipeline processors, Instruction pipeline design,arithmetic pipeline design, super scalar and super pipelinedesign, Superscalar and Vectorprocessors

UnitrS 7 'iirs• Multiprocessor System Interconnects, Cache coherence and synchronization mechanisms,

message passing mechanism.• System Interconnect architecture: Network property and routing, static connection

networks and dynamic connection networks

Refdrellces:j

,j

~'J,

Lj-i:~i 'Yo

, .

'.--~

,

'UPTU Regular M.Tech. in Computer Science & Engineering and Information TechnologytSemester Course ..

• Mano M : Computer System Architecture - 3rd Ed. (PHI) .• Hennessy J L, Patterson D A: Computer Architecture: A Quantitative Approach - 3

rdEd."

(Elsevier)• Kai Hwang: Advanced Computer Architecture (TMH)• Hamacher V C, et al : Computer Organization - 4th Ed.(McGraw-Hill)

; '-...i .

. /

UPTU Regular M.Tech. in Computer Science & Engineering and InformationTechnology First Semester Course

CS/lT 13 Opernting Systems and Database Management Systems10 hrs

Unit-lOperating System: Structure, Components and Services. Time Sharing and Real Time System,Process Management, Concurrency Critical Section, Semaphores, Inter Process Communication,Process scheduling producer/consumer and reader writer problem. Concept of Distributed andReal-Time operating systems.

8 hrsUnit-2.CPU Scheduling: Concept and scheduling algorithm, multiprocessor scheduling, deadlock:prevention, avoidance and detection, recovery from deadlock.

Memory Management: Multiprogramming with fixed partition, multiprogramming with variablepartition, segmentation, virtual memory and demand paging. Page Replacement Policies-Thrashing and pre-paging

10 hrsUnit-31/0 Management, File System: File organization and access mechanism, file sharing and filedirectories, Case Study of Linux Kernel: - File Management, Memory Management and ProcessManagement

10 hrsUnit-4Overview of Database Management System, Data Models: - Relational Algebra, RelationalCalculus- Tuple.Relation Calculus and Domain Relation Calculus, Normal Forms

SQL, DOL, DCL, DML, PLlSQL7 hrs

Unit-5Deadlock: - Prevention and avoidance, Transaction and Data Recovery Methods. Introduction ofObject Oriented DBMS, Object Relational DBMS, Distributed DBMS and Data Mining.&Warehousing.

Refercnces:A.S. Tanenbaum: Modern operatingsystems, Prentice Hall, 1993.William Stalling: "Operating System" Maxwell Me MellonJ. Peterson, A. Silbcrschatz, and P. Galvin: Operating System Concepts, Addison Wesley, JrdEdition, 1989. .Milenkovic: Operating System Concepts, TMHKorth and Silberschatz: Database System Concepts, Second Edition, Tata McGraw Hill, 1991.S. Ceri and G. Pelaggati: Distributed Databases Principles and Systems, McGraw Hill, 1985.R. Elmasri and S. Navathe: Benjamin Cummings, Fundamentals of Database Systems, SecondEdition, 19~4. .Boveti et al : Understanding the Linux KernelJ,d Edition, O'ReillyC. J. Date: Database Management Systems.

UPTU Regular M.Tech. in Computer Science & Engineering and Information. Technology First Semester Course

CS/IT 14 Data Networks

Unit I: Overview of Wired and Wireless Data Networks 8 hrs

Review of Layered Network Architecture, ISO-OSI and TCP / IP Network ModelDatagram Networks and Virtual Circuit Networks .Point to Point and Point to Multipoint NetworksLayer 2 SwitchesIEEE 802.3u (Fast Ethernet) and IEEE 802.3z (Gigabit Ethernet)Virtual LANWireless LAN: IEEE 802.11, BluetoothBroadband Wireless LAN: 802.16, WIMAX

Unit II: Interrietwork ing 10 hrs

Review of IP Addressing and RoutingInternet Architecture: Layer 3 Switch, Edge Router and Core RouterOverview of Control Plane, Data Plane, Management PlaneInternet Routing Protocols: OSPF, BGPBroadcast and Multicast Routing: Flooding, Reverse Path Forwarding, Pruning,Core based Trees, PIMMobilitu Issues and Mobile IPAd hoc Routing: Dynamic Source Routing, Destination Sequenced DistanceVector Routing, Ad hoc On-Demand Distance Vector Routing, Fisheye StateRouting, Hierarchical Routing.Signalling: Introduction, ICMP, LDP and MPLS Architecture

Unit III: Transport Layer Protocols / 7 hrs

Process to Process DeliveryReview of UDP, TCPSCTP Protocol: Services, Features, Packet Format, Association, Error ControlWireless TCP and RTP, RTCPReal Time Ap plica.tion: Voice and Video over IP

/

;,j.

UPTU Regular M.Tech. in Computer Science & Engineering and InformationTechnology First Semester Course

Unit IV: Traffic Control and Quality of Service 12 hrs

Flow Controli Flow Model, Open Loop: Rate Control, LBAP, Closed Loop:Window scheme, TCP and SCTP Flow Control

Congestion . Control: Congestion Control in packetECN and RED Algoritlun, TCP and SCTP Congestion Control

networks,

Qualittj of Service: IP Traffic Models, Classes, and Subclasses,Scheduling: CPS, WRR, DRR, WFQ, PCPS, VC Algorithm: Integrated ServicesArchitecture, Differentiated Services Architecture, RSVP and RSVP-TE

Traffic Management Framework: Scheduling, Renegotiation, Signaling,Admission Control, Capacity Planning

Overview of SNMP3, MIB2, RMON2, NMS Architectures

Unit V: Network Security 8 hrs

Security Issues,Symmetric Encryption: DES, TtipleDES, Modes, AESPublic Key Encryption: RS.A,Diffie Hellman, Elliptic CurveHashing: MD5, SHA-l, DSAProtocols: Kerberos, SSL/TLS, IPSec.

j 0 1- :2.1 ~ 11~ '2> 4,

References:

1. Srinivasan Keshav "An Engineering Approach To ComputerNetworking", Pearson

2. W Richard Stevens, "TCP lIP Illustrated" - Vol. 1 , Pearson3. D Bertsekas, R Gallager; "Data Networks", PHI4. W Stallings, "High Speed Networks and Internels", Pearson5. W Stallings, "Wireless Communication and Networks", Pearson6. \'\' Stallings, "Cryptography and Network Security", Pearson7. A Tanenbaum, "Computer Networks", Pl~I

i.: ;

,. • L

1'0 \'.~"~!/IrCI.l/>l<'... - s,,:;;",,-------._-------- -·-5" hjcct -1-'-'X-a)-~-'~-Co-rO-f-r-- ----1-' rC-'-'c-q--'-,i-s1-' (-e-- '-"

/ I' Elective Subject

/ JZf Iji~l,ib"i~,-;!-;:S~'I)}-st~e--I/-IS--(;::t---Jt)--t-;:-ifs~tr-:j~b-~I-tc~d:-C-=--o-Ill-1P-lu-t-jI-Ig__ 'O_h~"-s-~:....:~:....:;:....:~-C_(-11------------- --..... -

<, I-- r r: I Mobile Computing 12 -~-=---------.---.--.._ ..---. --.-:/- Analysis & Design of Real- ---\-3---t--·------------

• ----- -. ...-------- ~i!~~~.x,_s_t_en_l._.,s,._--- --:-.-:-__ -11- _1 ... t-_-'D_e_d:....:i:..:c..:.:a:.:.tc~d=__=S):'slCIl1bcsi.~. 1:--:4,--_+ . _

VLSI Design. 15-----.------------:I-:---:--,--..,.:...;:O::.~ ....::::.::::::..:~-'-----:--l---:...:.---+------,---------l1---_.2.' .-' . ..' , /. '.

....,....-h Software EI/~illeerillg;.,,:.t! 'f ,', Engineering and .---. --21 ' .--- ..-"-

f :~---.- -~~-- ··.·~~~~i~;f!.~~:~1~1!~:·~;~.~~~~:;::~~_.((/_2.~~ -----~~~_-~.~=~~:--- » --.- -_' ',,~ ~_ ~!l~'.Ccrlllg Object Oriented 1 23 001'

____.... .~'if .. Systcllls _ ~_ .__ .. ___ _ .. __.... _. Multimcdia ~~t.ell~_.-, __. ~ __ . .__ .... _.

I' Internet Programniiug and 25__ .__ Wcb Sen;ice E'igil.!.~.!'i!..l.g ._ __.. __

I~!;;f;;;;;;;;f;:;;;;.i);;:;;;;,;~_ ~~~1-1;;d0TI~ ""J-l-·-_-_~'~~~~~~~~~:~~-~--~-~~------f-I-----.----.. /' RcqUlrclllcllts Engl\lcei'lnlL_ 32 ----.L~E:·Tr~S\.SS·~(~cMM.., -~:,_~.__.f--~-.,-,- . __ ' . .>-. ') " Method Enginecring . -._·----=-J-3~~~~-t---T- I.

~~ P E" HT 14 \ ._I~]'SS_. ,/.__.._f- , -!.--.:::. ~ ro<;.css. ·lIglU~r).1h:, . ._.,.-_--'1 ~_ - -,y .-CSi~ltioll and Mo.dding:--- 35· .__.._.~------,

-'" . -;:::>----_._--_._---------------- ------~-----...:....----~------'-- --------1-----'---.--'----- -.-

Data ft11111flgemefl( D~tribtitc(.1 DBMS 41- --------f---------.---- -- ..----..-

~ <, /l)ata Warchousing' • 42---~. --·---------...L-ji------'=--------J---'-·-- ---·---1 --- .-.-------- ---

Multimedia Databases ,1]-------- ----. ---- ----'--------;------/---------t------- -. -------\ ..•.•...1:;"••..------ -- - -- - ~-7"/'-----~------i---.-.--- --.--- --

------!!LL--- 0: 51 -f- .__. . _____ " . . __ .~ Data Minil1~ I. . 52 _I':L.,._ .. u _

______ ... __ r':KIlOwle,dgc BasedSystelll7 S3 1\1 ._._ .. . ..lhtur~'..!.J~~~Jagc Proccssing_ .. ~~. __ . __ ._. ~ . _Iv·

~>c~i·~Algoritlllns . ~ ~. -~ . ~-=-~lIt~omized Algorithms 62----------------I-'---------.J-i..-----+-------f--·---,--- -----.-------

A nprox illlatiOI1 Algorithms 63

1

---. --- .. -- --'---I~ol\lplcxity Theory. ,/ 64 ---t--------.-.--COI~lItational Geolllctr):' 65\ _ --=--~-..-'----:-I--- . '---I------t~--. _-_-_-_-_-:_-_-_~-_-__-_-_-_--_-_--_-

~

-~~eC((ri'l-'----f----~!i'EtOg~~x..~---- 7_1_. ..... _... _.___ Network allll Systcm Securitl. 72 Cryptography.

. . Digital forcnsic 73 .. ~.I?!2.gr~I~ _______ L-~~_-Y-

NOTE: Till: students arc required to select courses from at least three streams.CS students have to select at least one course each from Theoretical ('S '11:1(/ Ir.nuDistributed Svstcms.IT sti.dcnts have to select at least OIlC course C:ICit rr(\l~l ~;,)lh\;\lJ i~IIj',illct:ril1g,

IIlf'ortlt,l(io!1 Systems ,;11<1 I)a!:! t\i<ll1;Jgelllcllt.I ------..---_.

-,

-~ f./~.

Appendix U: Streams and their COUI-SCS .

1. Distt'ibuted Stream

Distributed Computing

Basic Concepts . <::6\I~III'S

Charllctcrization, RCSOlU"C~haring, Internet Implementations, Name ~soilition, D~S . \-r~- ~~Computation: Full ASYI~chronislll and pull Syuchrouism, Computation on Anonymous Systems, Events, Orders, _ .

Global St<1tes,COlllplexlty' ~ _--, -..,. .:

I)is-Irihll led Syncliron iza lion. ,.J /tr 1111111'S

Processes and Threads, IEEE POSI X. Ic

G'Mutual Excl~lsion: CI<1ssifi~ation, Algorithms, 1\~11 Exclusion in S!wrc!l Mel.runy; CI<?ck Synchronization, NT!' (J' 7' ., Distributed 6eadlock: Detection ·Methoc;s, Prevention Methods, AvoidaJl(;c Methods ~\~

I1 usn Sockeb H Hours

~ TCP/II' Model, I3SD Sockets Overview, TCP(SOckcts'and Client/Server, UDP Sockets' and.Clicm/Scrvcr, o:";~~__-1llJ.lIndD~;, [~aw So~ets, PING & TRJ\CEIZOOT.E Programs,Rolitirlg;-Multicasting'using UDP Soc~ets·. ~

.__ .'_' -_. --J- . --

rDistl'ibll~Cd OS -rr~------ < to 1I01ll-s; ~ -~I '. \

! Communication between distributed objects, IU'C Model and Implementation Issues: Sun RI'C, Events and J! Notifica~iolls, Java RMI and its Applications 1· _'. .._i taRIJA Architecturc: In(r~,.ducti()n an(L~atiol~

!Distributed File System De:.ign and C~ Studies: NFS; Coda, Google FS '(

.' '-I:-- - 1

Dislrilmlcd D<1lalJascs : 8 Hours .~/- ~ '\: . \

Introduction, Structure, D.i1ta Mod~ls, Qu~,y I'~)ccssin~, Transactions, Nested Transactions, Atomic. CommitProtocols, 'jtansaction Recovery, 1ransacuons With replicated data, Concurrency Control Methods. Distributed

! Dcadloc~ • ~ ~

I \.../ \ . I

I /i References:

,#0I. Tanenbaum, "Distributed Systems", Pearson2 W Richard Stevens, "UNIX Network Prcgramming Vo'l 1 & 2", Pearson

A:"3illha, "Distributed Operating SystCIl1S", Prentice j lall of India/ IEEE Press~3aruosa, "Distributed Algorithms", MIT Press

5. Ccri, P<1lgalli,"/)istril'uted Databases", McGraw-Ll il l

- .:'

!I

/'

i -~ I

--.------7-...:...---~- ----

(f) .•.,

-Mohile Computing

. 8 Hours

Basic Concepts, Principles or Ccltular Couununication, Overview of IG, 2G, J.5G, 3G. and 4G techl\(1iogi~s, GSMand COMb- Archilecture, Mobility Management, Mobile Devices: PDA, Mobile OS: Palm OS, Mobile L~~Ylllbi<ln. "

Process Mignltion 8 HOllrs

Kernel Support for Migration: Mobility Enhancement ill modern UNIX Systems, Transparent Process MigrationDesign Alternatives, Removing Process Migration Bottlenecks, Task Migration Issues

User Space support for Migration: Chcckpointing, Process Migration

Illlullrs

Workload Balancing Strategies in migration, Process lifetime distributions for dynamic load balancing, DiscouncctcdOpel atit'l\s ill Coda File System, Weak Connectivity for Mobile File Access, Weakly Connected Replicated StorageSystem. .

Mobile Data NctworJdlll! 8 11011rs

\ .Mobile IPv4 and Mobile ll'vG, Mobile lnteructworking Architecture, Internet. Mobility Issues, Route Optimization.Performance of Wireless -ref>, GPRS Services, IP over CDl\I/\

Mobile Agents !! Hours.Basic. Concepts, os support [or Mobile Agents, Java Aglet :'\1'1, AnENT TC)" Network Aware Mobile Programs,Mobile Objects and Agents, OMG MASlr. Framework, Mobile Agent. security Issues -,

/{cfcrences: •

/. Richa!"'dWheeler, "Mobility: Processes, Computers and Agents" () QJ2. Charles Perkins et.al.,"MolJilc II': Design Principles and Practices", PearsonYToll!asz Imielinski, "Mobile Computing", Springer Verlag (9 -'

t. _:'1,1 •• . .

-.:"':": '.

6 Hours

Analysis and Design uf Real-Time. Systems

Basic Conccpts

IEEE Definition of Real-Time Systems, Characterization of Real-Time Systems, Process, IEEE POSIX.k Th.cads,Tasks and Priorities, Pre-emptive and Non-Preemptive Tasks, Soft and Hard Real-Time Syst-, -ns.Scheduling 10 HoJurs

Scheduling Paradigms: Priority Driven, Tillie Driven, and Share Driven

Priority Driven Scheduling of Periodic, Aperiodic and Sporadic tasks

Static Priority Scheduling: Ri.tc Monotonic Scheduling A lgoritlun ,(nd its exact an::\ysis nsiug Response Time Test

Dynamic Priority Scheduling: Analysis ofEDF and LLF Algorithms and their open i:;suL's

spccification and Vcrifie;ltioll i()lIo urx

Modsling Real-Time System, Rcquircn-ent Spcci fication, Assumptions, Design, Basic Duration Calculus,Specification of Scheduling Policies, Probabilist!c Duration Calculus, Applications of Duratir u Calculus

S flours

Introduction, Requirement of Real-Time Guarantees' in industrial applications, Soft anti Hard RTOS, Commcrr.ialRTOS Example-

IEEE POS!A.I b: Priority Schcdul ing, Real-Tunc Signals, Timers, IJ inury Semaphores, Counting Scmaphoi CS •

• I'vlUTEX operations and u:;age. Message I'a~;sing. Message Queues operations and usage, Shared Memory,Synchronous and Asynchronous I/O, Memory Locking

RTOS S.ervices, Case Studies or Real Time Capabilitics or Linux Kernel 2.6, R'TLinux and \x\\!()1 ks

A J1(llica (iolls (,II()II rs .

Real-Time Application Design, Real-Time /\ppliciltioll Interface (RTAI), Real-Time hV<I, Real-TimeConuuunications and Networking

References:

I. JW.S Liu, "Real-Time Systems", Pearson2. Mathai Joseph; "Real-Time Systems: Specification, Verification' and Synthesis", l'rcuticc-l lall3. Qing Li, "Real-Time Concepts lor Embedded Systems", eM!' Books.4. Krishna, Shin, "Real-Time Systems", TMt"15. Burns, Wcllings, "Real-Time Systems and Progranuuing Languages", Pcarsou

, .

(~IUf.

Dcdicated'Systam Dcsig n

8 Hours

. Algorithm and Algorithmic Notation, Timing, ·Synchronization_and Memory, Fixed and Floating point Arithmeticoperations, Arithmetic primitives, Sequential and Distributed Arithmetic,

Hardware Elements and Hardware Design using VHDL 8 Hours

Gates.Tilip-Flops, Registers, Synchronization Signals, Power Consumption and related design rules, Pulse generationand Interfacing, Chip Technology: Semiconductor Memories, -Proccssors and Configurablc Logic, Chip Level andBoard Level Design Considerations .

Hardware Design Languages, Simulation of Hardware Elements using VHDL, Timing Behavior and Simulation,Test Benches, Synthetic Aspects

SC~Jllcntial Control·Circuits and Processors 8 Hours

Mealy and Moore Automa~on, Designing the Control Automaton, Implementing Control flow and Synchronization

Designing for ALU efficiency, Memory Subsystems, Simple Programmable Processor Design, Interrupt Processingand Context Switching, Interfacing Techniques; Stun?ard Processor Architectures

. Systcm Level Design. 10 Hours

Aspects of System Design, Scalable System Architecture, Regular Processors, Network Architecture, IntegratedProcessor Networks, Static Application Mapping and Dynamic Resource Allocation, Resource Allocation onCrossbar Networks and FPOA' Chips; Cominunication Data and Control Information, rI(I'i)-ncts Language forHeterogeneous Programmable Systems

~" -,l Digit:! ISignal Processors 8 Hours

DSP Elements and Algorithms, Integrated DSP Chips, Floating Point Processors, DSl's 011 FI'GA, TypicalApplications

References:

I. Mayer, Lindenberg, "Dedicated Digital Processors", Wiley2. R Gupta, "Co-Synthesis of Hardware and Softwarefor Embedded Systems", Kluwcr3. "Digital SignalProcessing", IEEE Press

II

·,

VLS~ Design & Testing

M:lni(Jlllation of Boolean expressions 10 Hours

Two le~1 realizations with NAND or NOR gates, Standard fonn of Boolean functions, Minterrn & rnaxtermdesignation of functions, simplification of functions 011 Karnaugh Maps, Map minimization of product-of-sumsexpression, incompletely specified functions, logic Hazards, Elimination of Hazards.

Algorithms for optimization of combinational logic, impact of logic synthesis, cubical representation of Booleanfunctions, determination of prime implicants selection of optimum set-of prime implicates, multiple output circuit,programmedlogic array. minimization of multiple outputfunction, Tabular determination of prime irnplicats, fieldprogrammable logic arrays.

VLSI Realizations of Combinational Logic to HOIII'S

Introduction, pass transistor network realization, Steering of 0, I.X &. X to the output, tree networks, negative gatcrealization, logic design with CMOS standard cells, pre charged clocking or CMOS PLA.

Multilevel logic using complex (MSI) ports & cells:- The place for complex parts & cells, decoders, ROM as a logicelement, binary adder, design with multiplexers, more than two level realizations with basic primitives,combinational M'Sl parts & cells, multilevel logic manipulation & optimization.

Sequential circuits 8 Hours

Sequential activity, memory elements, general model for Sequential circuits, clock mode Sequential circuits.,Synthesis of clock mode Sequential circuits: Analysis of a sequential circuit, design procedure, synthesis of statediagrams, equivalent state & circuits, simplification by implication tables, state assignment & memory element input :, '

eqnations.' •

VLSI Realizatioll of Digital Systems 8 Hours

Alternati ve Structural descriptions, levels of descriptions, Standard cell CMOS layout & delay model, Timinganalysis &. simulation, Event driven gate level simulations, Switch level simulation, PLD & programmable gate<lrrays,

Tcst CCllcl'ariulI [01' VLSI 10 Hours

Fault detection & diagnosis, Stuck at fault model, test generation strategy, test generation by evaluation & .scarch,modeling CMOS, Stuck-open [;1I1\(S, fault simulation in sequential systems, boundary scan, built-in-self test. Fault i

Tolerant Design: Hardware redundancy, Information redundancy, time redundancy, software redundancy, system;level Fault Tolerance. Self-checking sequcntial circuit Design:. Faults in state machines, self checking state machincs 'dcslgnTcchniques.Bynthcsis of redundant fault-free state machines.

References:

I. Parag K. Lala , "Fault-Tolerant & Faull Testable Hardware" , D-S-l'ublicati~i1 IIydcrabad2. ParagK. Lala ,"Self checking & Fault-TolerantDigital Design", Morgan' Kaufman Publishers3. Frederick J. Hill and Gerald R. Peterson, "Computer Aided Logical Design \VitTi Emphasis 011 VLSI",

John Wiley &. SOilS Inc.,

. -1:::/~ , [0

jI

\.:. .,\-

.<:::.~!;r.".-;

2. Software Engineering Stream

Engincering and Testing Structured Systems

10 hours

Scope of Software Engineering, The Software Crisis, The functional approach. Structuring a problem. Notion ofanalysis. Design as synthesis.

TheYourdon method: need for Event Partitioning,.statement of purpose, Context Diagram, terminators, data stores,Event typology, converting from events to software system functions

14 hours

Data Flo.}vdiagrams, process, flow, data stores, Constraints across levels, Data Dictionary, Process specificationtechniques: structured English, constraint based, Data now design heuristics • .

Construction Design: Coupling and Cohesion. 7 Levels of cohesion, Afferent and Efferent modules, COliversion tomodular structure, Design Heuristics for Module Design .

12 Hours

Maturity levels of testing, Unit, Module, Sub-System and System Testing Intcraction., Top down and bottom uptesting, Constructing Stubs and Drivers. Notion of a test case; test design approach to software design

White box testing: Testing Hypotheses, Statement testing, branch testing, branch and statement testing, Path,predicate path, path interpretation, Cyclomatie complexity, condition testing, loop testing.

.5 Hours

Black box testing: Cause-effect technique, developing test cases from cause-effect graphsImplications of software systems on underlying IT infrastructure . .

(leferellces:

L Yourdon, "Modern Structured Analysis", l'carsou2. Belzer, "Software.Testing", Van Nostrand Reinhold CO.3. Prc1;sman, "Software engineering", McGraw-llill .4. Sommerville, "Software Engineering", Pearson

.~.

(.~:~.;~;.

Object -Oriented Prugr-amuring

10 11011 rs

The 00 manifesto for Programming Languages. Object as having space and behaviour, Object classes: definition,class as a factory, as a specification, constructor, destructor, coPY constructor and their defaults, public and privateprotection. ,-6). - ~?-

15 Hours, (0Complex Objects and complex classes, their constructors and destructors and policies [or these. Privacy for ~IexOt5jCttS:-·lnl1entari~ siinple, multiple, repeated. Resolving inheritance con fllcts. Ru·les [or constructors, destructors.Protection policies for Inheritance. ~ . 13 A-

10.\ lours.Notion of Late 13inding. Polymorphism universal and inheritance based, Abstract classes and their use, Meta-classesand templates.

@'(1) 5 Hours

<0Special language features like friend functions; type casting etc. Separation of spcc ificationObject-orientation for reuse and maintenance.

from implementation.

All the above to be introduced through C++., '.

>. References:

I. Bjarne Stroustrap, "The C++ Programming Language", Pearson2. Parirnala N. "Object orientation Through C"'''''', MacMif lam]~Lippll1iln, Lajoie, and Moo, "C'! -I- Primcr'', Addison Wesley4 ..Robert Laforc, "Object Orientation in C 1--1''', Galgotia

/

,. A L S.X o1f <dJ.{~.

~-~.•.

I;.

~,,,{-~ , .

,. J.,

q c- ~. '81~

:(2·• :; ••••-: ~ ~I.

4-

-

t. ,·:if ..}: •. t ..

/Enginecl"ing 00 Systems

.. 5 I-!OI rr:S

00 maniresto for 00 Analys is. Object (lloddillg uurl differcncc with data-or-ientcd, process-oriented and behaviourmodeling.

15 Ho urs

Object modeling: classes, complex object classes, illherit<lnce and overriding, Sub systems and systems in 00modeling. State of all object, State transition ui<lgr<lIl1S.

J 0 Hours

Dynamic Modeling: Modeling an event. Event typology, event <IS trigger, representing dynamics. Relationshi-p withstate transition diagrams. Relationship with object model.

10 Hours

Functional Modeling: Review of Structured techniques, oro and its notions

Using object oriented concepts in OOSE, OOA&O, OMT

cross model constraints and linkages. Conversion to 00 implementation, UML notation

References»

I. Rumbaugh et <1[,"Object Oriented Modeling and Design", Prentice Hall2. Odell and Martin, "Object Oriented Analysis and Design", Prentice Hall

..•

I

....:.~*"':" 1.7

;.

Multimedia Systems

IS Hours

Components of multimedia, multimedia and hypermedia, Multimedia authoring: metaphor, production, presentation,automatic authoring, VRML,

..•10 Hours

Graphics and Image data representation, Colour in IIllage and Video- colour science, colour models in image andvideo, Fundamentals of video: types of video signals, analog and digital video,

10 Hours

Basics of Digital Audio: digitization, quantization, MIDI, multimedia data compression: lossy compressions; Imagecompression standards, basic video compression techniques, MPEG videocoding, MPEG audio compression,

5 Hours

Multimedia communication: quality factors in multimedia transmission, multimedia over IP, video. delay in ATM,multimedia, across DSL •

References:

I. Ze-nian and Drew, "Fundamentals of Multimedia", Prentice Hall2. Rao, K.R. et at, "Multimedia Communication Systems. Techniques, Standards, and Networks", Pearsall3. Y. Ramcsh, "Multimedia Systems Concepts Standards and Practice, Kluwcr

..

..•

/1-

.~ .

.~

Multimedia Systems

15 Hours

Components of multimedia, multimedia and hypermedia, Multimedia authoring: metaphor, production, presentation,automatic authoring, VRML,

10 Hours

Graphics and Image data representation, Colour in Image and Video- ~olollr science, colour models in image andvideo, Fundamentals of video: types of video signals, analog and digital video,

10 Hours

Basics ofOigital Audio: digitization, quantization, MIDI, multimedia data compression: lossy compressions; Imagecompression standards, basic video compression techniques, MPEG videocoding, MPEG audio compression,

5 Hours

Multimedia communication: quality factors inmuitiruedia transmission, multimedia over IP, vidcodelay in ATM,multimedia, across DSL •

References:

I. Ze-nian and Drew, "Fundamentals of Multimedia", Prentice Hall2. Ra~, K.R. ct al., "Multimedia Conllnllnic.!<~tionSystems. Techniques, Standards, and Networks", Pearson3. Y. Ramesh, "Multimedia Systems Concepts Standards and Practice, Kluwer

..

I

/1- .=

-,d-N"

Intcrnct l'1"ogl"amming and Web Service Eugiucermg

10 HOIII·s

Notio~ of mark up. HTML and XHTML. Style sheets, Cascading style sheets. Javascript, Dynamic HTML.

15 Hours

SGML XML, OTO, XML schema. ASP.Net, I'erl/CGI and Python

\ 15 Hours

Notion ofa web service. Service Oriented Architecture, SOAP, UOOI, WSOL, WSQM. Issues in providing QoS_Elements of Service oriented soft ware cugincering,

..•

References:

I. Ocitel, Deitel and Goldberg, "Internet & WQrJd Wide Web How to Program", Pearson2. W3 SOAP Standard3. uoor Standard4. WSOL standard

" 3. {uro.'lllation Systcllls StI-Cjllll

Conceptual Modeling

12 Hours

Why conceptual modeling, ANSI/SPARe framework, 100 % principle, conceptualization principle, abstraction

12 Huur,

Data-oriented Models: class as an abstraction, ER: entity class, relationship class, weak and regular structures, binaryand n-ary relationships attributes, primary key, relationship cardinality; attribute functionality, Limitations,SlIM, SIIM+: hierarchical data abstraction, inheritance and aggregation, formal definitions; inheritance forms,

G Hours

Translation of data oriented conceptual model into relational schcmatartranslatiug entity class, relationship ~Iass,weak and regular classes, aggregate hierarchy, inherhance hierarchy.

10 Hours

Behaviour-oriented Models: Why these modclsv-Intcrprctations of an Event, event as state change, event operation,. "

entity cycles, handling time, pre and post conditions of an event, message, Remora model

Benefits of Conceptual Modeling

References:

l . Batini, Ccri, Navathc," Conceptual Database Design: An Entity-Relationship Approach", The Benjamin-Cunuuings Pub2" Loucopoulos and Zicari," Conceptual Modeling, Databases, and Case: An lntegrutcd View ofInformation Systems Development", John Wiley & Sons

lG

-- -----'--=-

..~~

,I

Rcqu ircmcuts Enginccring

10 Hours

Why requirements engineering? Difference between Conceptual Modeling and RE. Context Diagram and RE.Organizational versus Technical requirements

Preparing"] EEE SRS document

7 Hou rs

Stakeholders and their idcnti Iication. Types of stakeholders, Designing and conducting interviews, questionnaires,brainstorming sessions : .

7 HOIl rs

RE in functional systems: Types of goals, goal satisfaction and satisficing, Goal modeling and decomposition,AN D/OR goal structures, Goal opcrationalizing., the 1* model, limitat ions of goal based techniques.

7110UI':;

Sccll;rio modeling. Defining a scenario, types of scenarios, Scenario classificatiol; based on its properties. Writingscenarios ill natural language, scenarios versus use cases, Goal-scenario coupling. Handling RE problems likeconflicts

9 Hours

1\1: in decisional systems: Organizariou versus Technical decisional requirements, diffcr cnccbctween transactionaland decisd ional systems, the changed role of RE. Notions of goals, decisions, and information. Difference betweenthem, the GDI model, Informational scenarios, tlleir fo;·m and usage

References:

I. Hull, Jackson, and Dick, "Requirements Engineering", Springer2. Macaulay: Requirements Engineering, SpringerJ. Jackson M., "son ware requirements & specifications: a lexicon of practice, principles and prejudices",i\CM Press/ Addison- Wesley

r '7- :

Mcthod Engincering

7 Hours

Notion of a method. Metl~od models, meta-models, and generic models. CAME, CASE, IIIctLl CASE and thcirdifferences. Method as artefact, process model,

H Hours

Product oriented meta-models: The OPRR model, notion of object, property, relationship and role. the GOPRRmodel, Product-Process meta-models: The fragment model. lnstantiatiing meta-model to yield methods

8 Hours

lntcgrntcdrneta-modcls: The contextual approach.inotion of context, tight coupling, the decisional approach, methodblock, types of methods, MRL

(, Hours

.The generic method model: dependency and its four forms, dependency graph as a a method, instantiating meta-

"models, instantiating methods, Engineering methods for diverse d~mains

10 Hours

Situational method engineering. SOLC for method cngineering. lntcutioual approach to method engineering. Methodengineering processes. ·Open Issues . . .

References:

I. Brinkkernpcr ct al, "Method Engineering", Chapman and I Iall, 19962. lolita R.et LlI, "Method Engineering", Springer, 2007). Research papers dealing with the fragment, contextual and decisional meta models.1\. Research papers on the generic method model .

1&

. S'ijij

/i

Process Enginccring

10 Hours

SDLC in S~W and IS engineering, Relationship of SDLC to process models, Classical.precess models: Code and Fix,Waterfall, Prototype, Spiral, V, Fountain. Iterativeand Incremental process models. .

12 Hours

Process meta-models: Zhy meta-models, limitations of classical models, Activity based models, lllIS, Contextualmodel, and Map model, Tracing, Backtracking, Guidance: passive, active

10 HOIII'S

The personal process and team process, Maturity models: the five levels of CMM, metrics to be collected for upwardmovement in levels, Introduction to ITIL, Six Sigma, IS09000. Differences between these, classes of problemshandled by these.

8 Hours

Business process models, business objects, relationships,' role, co-ordination activity. Workflow models, Formulatingbusiness process models, building situation ('pecific'b~siness 'models: intentions, architecture, organization •

. \rJ

lkJerellces:

I. Pressman, "Software Engtricerlng", Mcgraw-Hill2. Sommerville, !'Soflware Engineering", PearsonJ ~I'fleegar, "Software Engineering Theory and Practice"; Pearson4. Original research papers on the mentioned models.

t,

) "

- \.

i;

»:I\,

\...e:

;,

(

> '.

'. ,: ,"\

11.i·

(

~ Simulation and Modeling

10 Hours

, l3asic Simulation Modeling: The ~ure of simulation system, lIlod~ and simulation, discrete-~t simulation,~ ~ulation of a single-server queuing, alternative approaches to modeling and coding simulatIOns, networtz':' simulation, ~Iel and distributed simulation, simulation across the internet and web based simulation, steps in a

sound simulation study, other types of simulation: continuous simulation, combined discrete-continuous simulation,Monte Carlo simu laliQ!!., advantages, disadvantageS'1Ijld pitfalls of simulation.-. ===

, ..1. 7 Hours

Modeling Complex Systems: Introduction, list prycessing if! simulation. approaches to stering lists in a computerlinked storage allocation

:../1

Simulation examples using any simulationIanguagc: Single-server Queuing 'simulation with time-shared computermodel.job-shop model, and event-list manipulation .

'j'1it.~

~ Discrete System Modeling: Classification of simulation models the simulation process, system investigation~ . validation and translation, simulation' 'of complex discrete-event systel!!s with application in industrial and service" organization tactical planning and management aspects, Random variable generation and analysis.

~);

t

7 Hours

Simulation Software: ~)ariSOn of simulation packages with programming Ianguagcs classification of simulation .. s()flwar~, general-purpose simulation packages,object-oricnted simulation jbuilding valid, credible and appropriatCl ~l detailed simul~on lllodels'lexperill1cnt~t1. design, sensitivity analysis ancr'optilllization simulation of manu acturmg .

:f . systems. .

, .

;::",:J:::r!1b.cdded System Modeling: Embedded systems and system level design, models of computation, specification:;;.;~ia·ng~agcs, hardware/software code design, system partitioning, application specific processors and memory, low

.1,,) .

nCpower design.:.•..,j':. ...a..:. .

. ···.:RealjTilllc system modeling, Fixed Priority scheduling, Dynamic Priority Schcduling ',-~~Data'ColllllllHlication Network modeling, 11' network intradornain (e.g. o"SPF, IUP) routing simulation.

'.. /{e[erc/lces: .'

-:."""

I. Law Kclton.t'Simulation Modcling and Analysis;', McGra\':-J lill2. Geoffrey Gordon.t'Systcm Simulation", 1'111

4. Data Managcmcnt Sh'c<lm

Distributed DBMS

6 Hours

Review or computer networks and centralized DBMS, Why distributed databases, basic principles or DDBMS,distribution, heterogeneity, autonomy,

(, Hou rs

ODn nrchitccture: client-server, peer-to-peer, federated, multidatabasc,

15 Hours

DDB design and implementation: fragmentation, replication and allocation tcchniques,. .. .

Distributed query processing and optimization,

Distributed transaction management, concurrency control and reliability, DDI3 intcroperability

References:

I. Ccri and Pclagatti, "Distributed Data Base Systems", Addison2. Ozsu,Valduriez, "Distributed Data Base Systems", Pearson

..

. " ,, .~,<. ('.. .:.

.")/c::

Data Warehousing

-----~. ~ , to _~ 'I \. ., 14 I lours

&t'heorganizational perspective, the technical perspcctivc, Dimensional Modeling: facts, dimensions, slowly andrapiCJlych,mgmg dllllenslOns, Data Warehouse operations with their formal dellllitions and applications)<=onvcrtingER to data cube -. . ... _. . ,

. .•. .., .

8 Hours

Aggregation, their need a Ill! uelinitions, historical information, Query facility, aLAI' functions and Tools, DataMining interfaces"

\ 1.---

Relational representation, !taLAI', Multidimcnsional representation, MOLAP, Advantages, disadvantages, tradcoffswith ROLAP, Meta-data and CWM, OW process and architecture: ETL process, tradcoffs between automated ETLand tailor made ETL ~ .

. \.~(b \ P~~h,

81[011 rx

10 II o III'S

SOLe- of a Warehouse project: business process driven, Information systems product driven and goal drivenapproaches. ~.- A-- ,_ .;

Design approaches: data driven design, user driven design. Information Package, Diagram driven dcs ign,. ~ .;

!!.:" _.. .": . . ~ .r:··:. P~)ysical design:-:!ustering; \i~itiolling etc. Tradc-offs in physical design.

~:f:>.. r;~ -..-._,.References: - >

.. j

-

[

~lIIaih' "Data Warehouse Fundamentals", Wiley<:';1:. \. ~lIlon, "Building the Data Warehouse", Wilcy\.,' ,. J, Kimball and Ross, "The Data Warehouse Toolkit" Wilcy::~, ·4. Murray, "Data Warehousing in the Real World", Wiley

S. 1t1lhorrC.:"M~stcring Data Warehouse Destl~iley

~0(5~D'

.~r~.sO'"<',\ . /~.- ~QJ--

pnni~·L~~.

";."

~.

I,"

",~;

"",

Multi-media Databases

8 Hours

Relational versus multimedia databases, Ilamlling object data, Multidimensional structures: insertion, deletion,search ill 2-d trees, point quadtrees, M'Xvquadlrccs, and It-trees

(, HOllrs

Image d.uubascs: Raw and compressed image.", Discrete Fourier transform and Discrete Cosine transform,segmentation, similarity based and spatial layout retrieval, image representation in relation~ and R-trees

4 !lours

.Documqnt databases: precision and recall, Latent semantic indexing, operating on TV trees, inverted indices andsequent ial files.

H l lnurs

Video databases: organization or video content, querying content of video libraries, video segmentation, videostandards

4 Hours

Audio databases: general model, metadata, signal based audio content, discrete transformations for audio COil tent,indexing techniques

(, Hours

Multimedia databases: Principle of Uniformity, media abstractions, query languages, indexing, queryrelaxation/expansion

4 Hours

• Physical storage and retrieval: retrieving form disk, CJ)-ROM,,"~'apes: recording and placement methods, retrievaltechniques.

Open issues: security, compression for special data bases c..g. in medicine., .

References:

I. Subralunaniam VS, "Principles of Multimedia SyStcms", Morgan Kaufman2. Apcrs et al, "Multimedia Databases in Perspective, Springer3. Dunckley, "Multimedia Databases: AnObject Relational Approach", Holborn

.,"

:.": ~.:~.:.,:".1_, :3 \ ..,

--.; ..,...... ~~.,-Y""~-----._-.•....• --

8 Hours

Knowledge: Introduction, definition and importance, knowledge base system, representation. of knowledge,organization of knowledge, knowledgemanipulatioll, knowledge acquisition, introduction to PROLOG.

I

8 Hours

Formalized symbolic Logics, Syntax and Semantics for rOPL, Inference rules, The resolution principle, 1\'0dcductive inference methods, Bayesian probabilistic informer, Dimpstcr-Shafcr thcery, Heuristic RcasoningMethods.

8 Hours

Search and Control strategies: introduction, conccjus, uniformed or blind search, informal search, searchi Ig au.r-or" ra Jhs Matching techniques, structures used in retrieval techniques, integrating knowledge in memory, III :i~-o allIzalion system.

8 Hours

Fuzzy Logic: Basic concepts, Fuzzy sets, Membership Function, Types 'of-membership Function, Basic operations '.II

Fuzzy sets, Intersection & Union-Complementary, Subset hood, Properties of Fuzzy sets.

8 Hours

Expert System architectures: Rule-Based system- architectures, Non production system architecture, dealing .withuncertainty, knowledge organization and validation.

!Ii.'

"

5. AI STREAM

Artificial Intelligence

..•

References:

I. Dan W Patterson, "Introduction to Artificial Intelligence and Expert System". 1'111_ 2. Peter Jackson, "Introduction to Expert System", Pearson .

\~ b- Gouzalbz and D.Dankel, "The Engineering Knowledge Base System", PI-ell

. Vstuart Russell and Peter nerving, "Artificial Intelligence: A Modern approach", 1'111l· 10lUl Yell &·Keza Langan , "Fuzzy: Intelligence, Control and Infonnation'", Pearson

..

.2..-1-

;Learning Systems

·8.Hours

Introduction: Definition, Human Drain, Model of Ncuran, Feed hack, Network Architectures, KnowledgeRepresentation, AI & Neural Hctworks.

Learning Processes: Introduction, Error-correction Memory-Based Learning, Hcbbian Learning, CompetitiveLearning, Boltzmann Lear.ning, Learning with a teacher, Learning without a teacher, Memory Adaptation.

8 Hours

Single Layer Pcrccptrons: Concepts, Adaptive Filtcriug, Unconstrained optimization, Steepest Descent Method,Newton's Method, Pcrccptron, PcrccptronConvcrgcnce Theorem.

Multilayer Pcrccptrons: Prelim inarics, Back-propagation algorithm, activation function, Rate of learning.

811oUl·s

Neurodynamics: Introduction Associative Memory, Linear Associater, Dynamical Systcrr s, Stability of EquilibriumStates, Attractros, Hopficd models, Drain-state-in-a-box model.

8 Hours

Genetic Algorithms: Basics of genetic aigorirhms, binary GA implementation, Real coded GA, Design issues. in GA,Choice of encoding, selection probability, mutation an~ cross over probabilrity, fitness evaluation function.

, ,

References:

i. ~ill1on Haykin.v'Ncural Networks", Pe~rson .2. Mohamad lLf lassoun, "Fundamentals of Artificial Neural Networks", PIlI3. James t\. Anderson, "An Introduction to Neural Networks", PHI4. Melanic Mitchall, "An Introduction to Genetic Algoritlllll", I'~I!

r ,,

,..';:'

=

Data Mining

Overview, types of mining, Mining operations, introduction of statistical Datil Mining, Heuristic Mining,Introductiun of mining in data warehousing, Siages of OM process. Decision-Tree based c\assi Iicrs: infomationgain, decision tree learning. .

7 Hours

Data Mining Techniques: Association- Rule mining methodes, supervised neural nctworx , pcrceptron. backpropagation, haycsian methods, cross-validntion, Tillie scqllcllce discovery.

7 Hours

Clustering: Similarity and distance measures, hierarchical algorithms, pnrtitional algorithms, clustering largedatabases, clustering with categorical attributes. K - means.

10 Hours

~, Introduction to information retrieval, Query optimization, Unstructured and semi-structured text, Text encoding,Tokcnizatiou, Steaming, Lemmatization, Index Compression, Lexicon-Compression, 'Gap encoding, gamma codes,Index constructions, Dynamic indexing, Positional indexes, n-gralll indexes, real-world issues, Vector-SpaceScoring, Nearest neighbor. techniques. '

10 Hours

Introduction to information retrieval, Inverted indi~es and Boolean queries, Query optimization, Unconstrained andsemi constrained text, Tcxt encoding; Tokcuizatiou, Stemming, Lcnunnrizat ion, Tolerant retrieval: Spelling

• correction and syuonyrucs, permuterm indices, a-gram indices, Edit distance, Index compression, Lexiconcompression, Gap encoding, Gamma codes, Web structure.the user, search engine, optirnization/spam.wcbcharacteristic, web size measurement, near duplicate detection, crawling and web indexes, link analysis.

References:

I. M.H. Dunham, "Data mining: Introductory and Advanced Topics", Pearson2. J. I Ian and M. Kamber, "Data Mining: Concept and Techniques", Morgan Kaufman3. Mallach, "Datil Warehousing System", McGraw-Hili '4. Rechard J. Reiger and michal W. Grcatz, "Data Mining: A Tutorial based primer", Pearson5. Tom Mitchell, "Machine Learning", McG!'aw-i'lill

.~.

14 . ..1,) •..(X .....•."

Natural Language Processing

10 Hours..Context Free grammars, Lexical analysis, Introduction to par~ing, Context Sel.lsitive grammars

10 1I01l1·S

Linguistics of English: Review of English Grammar, Morphology, syntax, semantics, structure of discourse. Wordsand thc lexicon: word classes. .

12 Hours

• Semantic Grammars, TN, ATN, Case grammars, Paninian Grammars, Parsers of NL statements, Determiners andquantifiers, Noun-noun modification, pronoun resolution, relative clauses

8I1oUI·s

Deep structure, shallow structure, Differences between English and Hindi Application(a) MT .(b) ASR(c) IR(d) Q & A

References: ~I.Manning,CO, Schutzc H, "Foundations of statistical natural language processing", MIT press2.Jurafsby D. Martin J.H, "Speech and Iauguage processing" , PHI3 .Allen , J:, "Natural language understanding.", Benjamin! Cummins'Publishing4. Wall L et W, "l'rogranuniug PERL", O.'ReiIlY .

10 H OIII'S

6. SECURITY STREAM

Cryptogra phy

NuinlJer: Theo.·y

Prime numbers, Euler's Toticnt function, Fermat's and Eulers Theorem, Primality Testing, Chinese RemainderTheorem. Discrete Logarithms, Group, Rings, Fields, Modular Aritlunctic, Euclidean Algoritlun, Finite Fields of t.ie

• form GF(p), Polynomial Arithmetic, Fields of the form OF(2"), Random Number Generation and Testing

PulJlic Key Encryption 10 1111\1 rs

RSA System, Implementing RSA, Attacks on RSA, Rabin Crypto System, Factoring algorithms. The (p-I) method,Dixon's algorithm and Quadratic sieveElliptic Curve Cryptography: Elliptic curves over GF(p), Elliptic curves over GF(2"'), Elliptic curve cryptography,factoring with ECC: Key Management and Diffie Hellman Key Exchange,

Symmetric Encr.yption S I lours

Block'Cipher and DES, The strength of DES, Differential and' Linear Cryptanalysis 01" DES, Advanced EncryptionStandard, Stream Ciphers and RC4,

Hash Functions 8 !lOll rs

Hash functions, Security of hash functions, MD5, Secure Hash Algorithm, Whirlpool, HMAC, CMAC, The birthdayattack problem.Digital Signatures, Requirement, Authentication protocols, Digital Signature Standard, ECDSA

Finite Automata and Ciphers 6 Hours

Fjnite Automata and Ciphers, Structure of Ciphers, Selection of the Ma, II and g functions, Cipher Design uSIngAutomata

References:

I. Douglas R Stinson, "Cryptography Theory and practice", CRC Press2. William Stalli rigs, "Cryptography and Network Security 4e", Pearson3. Simon J Sliepherd, "Cryptography: Diffusing the Confusion", Research pr css studies

.2, \). I.

Network and System Sccur ity

Nctworl{ Security

AH and ESP Protocols, Security associations, Key management, Web security Considerations, secure socket layerand Transport layer security.

PKllllf,·;aSlructure 8 Hour's

Concept of an infrastructure, application enables secure single sign-oil, comprehensive security, defining PKI, LDAPand X5'OO.

Core 1'[(1 Services: Authentication, Integrity and confidentiality, Mechanism required. to create PKI enabled servicesX-509 certificate. . ,

8 Hours

System Security: Intrusion Detection, Password Management, Base Rate Fallacy.Malicious Software: Virus and related threats, virus countermeasures, Distributed Denial uf Service attacks,Firewalls: Qesign principles, Trusted Systems common criterion for IT security evaluatior .

as and Database Security 10 Hours

Structure of au as· ilIld application, application ;1I\d as security, security III Unix and Linux PluggableAuthentication Modules, Access Control Lists,.SELinux ..

Database Security: Database Security Evolution, Role-based an object-oriented encapsulation procedural extension toSQL, Security through Restrictive Clauses. .

!I;.

Seclire AllplicaliollS 8 Hours

I'GP and SMIME, Kcrbcros version IV and V, Security in Cellular Communication System, Secure ElectronicTransaction,

References:

l. William Stalling, "Cryptography and Netwo\·k Security. 4e", PHI2. C Adams, Steve Lloyd, "Understanding PKI", Addison WesleyJ. Jay Ram Chandran, "Designing Security Architecture", Wiley Computer Publishing4. C Kaufman, Radia Perlman andMike, "Network Security 2e", Pearson .

. .:.

Oigital Forcns ic

Transform Methods: Fourier Transformation, Fast Fourier Transformation, Discrete Cosine Transformation, Mellin-Fourier ••Transformation, Wavelets, Split Images in Perceptual Bands, Applications. of Transformation inSteganography.

8 Hou.rs •

Biometrics: Overview of Biometrics, Biometric Idcntification, Biomctric Verification, Biomctric EnroII meut,Biometric System Security.

Authentication and Biometrics: Secure Authentication Protocols, Access Control Security Services, Authcnt icaticnMethods, Authentication Protocols, Matching Hiomctr ic Samples, Verification by hUI11Hns.

Common biometrics: Finger Print Recognition, Face Recognition, Speaker Recognition, Iris Rccognition, HandGeometry, Signature Verification, Positive and Negative of Biometrics.

Matching: Two kinds (If errors, Score distribution, Estimating Errors from Data, Error Rate of Match Enginc!,Dcfirtition of F A'Rand 'FRR

Ii lIolI rs

kuroduction to Iuformation Hiding: Technical Steganography, Linguistic Steganography, Copy Right Enforcement.Wisdom from Cryptography .

Principles «If Sicganography: Framework for Secret Conuuunication, Security of Steganc graph)' System, InfurmationHiding in Noisy Data, Adaptive versus non-Adaptive Algorithms, Active and Malicious Attackers, Informationhiding' in Written Text.

H 1I01l1'S '

Survey of Stcganographic Techniques: Substitution systems and I3it Plane Tools, Transform Domain Techniques: - 'Spread Spectrum and Information hiding, Statistical Steganography, Distortion Techniques, Cover GenerationTechniques.

Stcganalysis: Looking for Signatures: - Extracting hidden Information, Disabling Hidden Iuformation.

IUllours

Waterma r kiug and Copyright l'rotcction: Basic Watermarking, Watermarking Applications, Requirements andA lgoritlun ic Design Issues, Evaluation and Benchmarking of Watermarking system.

References:

I. Karzendbisscr, Pctitcolas, " Information Hiding Techniques for Stcganography ami Digital Watcrmar k ing",Ar tcch House.

2. Peter Wayncr, "Djsappcaring Cryptography: Information II id illg, Steganography and \\'.\1<':1111;11 king 7./<.;",E1',':"V icr

3. Bulk, Couue ll ct. a l., "Guide to l Iiornctrics". Sprillger "

I-,o

7. THEORETICAL CS STREAM

Parnllcl Algo.-ithms

8 Ho ur-,

Sequential model, need of alteJ;,native model , .parallcl computational Ill~dcls such as Pi0-M I LMC~ , I-Iype~beCube Connected Cycle. ButCd·ny , Perfect Shuffle Computers , Trce modcl I Pyramid model. hilly Connectedmodcl , PRAM-CREW, EREW models. simulation.ofone I~dc/ from anothcr one. -

''2 J II ( 8 Hours

l'crfonnancc Measures of Parallel Algorithrus , speed-up and efficiency of 1'1\ , Cost-optimalityj An exan~illustrate G,ost-optimal algorithms- such as sumniation , Mill/Maxonvarrous lIIodels. • -

~ J,-----I) Hours

Parallel Sorting Networks. Parallel Merging Algorithllls on CREWII~IU~V/MCCICREW IEKEW l~il~ear-<llTay

PHilllcl SortingNetworks (III

H Iiours

Parallel Searching Algorithm , Kth clement • Kth clement in X+Y on PRAM, Parallel Matrix Transportation andMultiplication Algorithm on PRAM MCC. Vector-Matrix Multiplication, Solution 01" Linear Equation, Rootfinding. .

,------_ ...

R i lours

Graph Algorithms - Connected Graphs i search and traversalCombinations I Derrangcmcnts.

Combinatorial .<\ lgortthms- Pcnnutat ion ,

References:

I. M.J. Quinn, "Designing Efficien! Algorithms for Parallcl Computer" by Mc Graw Hill. \2. S.G. Akl, "Design and Analysis of Parallel Algorithms"3. 8.G. Akl, "Parallel Sorting Algoritlll11L' by Academic Press~ .

•.

fl' ~.:.,. . ",

r

@ Randomized Algorithms

Introduction: Basic .Probability Theory, Probability Spaces; Bayes' Rule; Independence; Expectation;Common Distributions, Randomized Algorithm: General concepts and definitions, Quicksort ,Partitions, Probabilistic recurrences , Randomized Complexity Classes: UP, PP, BPI'

Game Theoretic Techniques and Lower Bounds: Game theory concepts; Applications to lower bounds, Examples:Sort ing and Gallic tree evaluation

!! I-lours

Moments and Deviations: Random s;]lIIpling/blicketing, Tail bounds: Markov and Chebyshcv inequalities. Highconfidence selection, Pairwise independence, Applications: The stable mnrr iagc problem

Tail Inequalities : Chernoff bounds; Appf ications: Network routing and gate-array wiring,7 \lUl1/-S

Markov Chains and Random Walks: A 2-~0-T Example, Markov Chains, Random Walks on Graphs, GraphConnectivity, Expanders , Probability Amplification by Random Walks on Expanders

Algebraic methods: fingerprinting and Frcivald's technique, Verifying polynomial jdcntitics, Randomized patternmatch il1g

Data Structures: Random trcaps; Skip lists

Randoiuizcd Graph Algorithm: Shortest paths; Minimum spanning tree

6 l lou rs

7 11011 rs

Parallel and Distributed Algorithms: The I'ItAM Model, Sorting on- a "iZArvf,' Maximal Independent St:I:;, PerfectMatchings,

Number Theory and Aigcbra: Elementary number theory, Quadratic residues, l'rimality testing, H.SA cryptosysrcm

Referellces:

",. R_ Motwani and P. Raghavan, "Ual1~ol1lized Algorithms", Cambridge Uuiversity Press

2_ Michacl Mitzcumachcr, Eli Upfal , "Probability and Computing", Caillbrid{',c University Press,

~.:

I