37
NOORUL ISLAM CENTRE FOR HIGHER EDUCATION NOORUL ISLAM UNIVERSITY, KUMARACOIL M.Sc. COMPUTER SCIENCE CURRICULUM & SYLLABUS SEMESTER I SL. NO. SUBJECT CODE SUBJECT L T P C THEORY 1. MA1504 Discrete Structures 3 1 0 4 2. CS1701 Cryptography 4 0 0 4 3. CS1702 Advanced JAVA Programming 3 1 0 4 4. CS1703 Advanced DBMS 4 0 0 4 5. CS1704 Image Processing 4 0 0 4 PRACTICAL 6. CS1772 JAVA Programming Lab 0 0 4 2 7. CS1773 RDBMS Lab 0 0 4 2 TOTAL CREDITS 18 2 8 24

CS1704 Image Processing CS1772 JAVA Programming … Introduction- Cryptography-Secure Socket Layer-Security Policy Definition and Enforcement- Java Authentication and Authorization

  • Upload
    ngodiep

  • View
    242

  • Download
    5

Embed Size (px)

Citation preview

NOORUL ISLAM CENTRE FOR HIGHER EDUCATION

NOORUL ISLAM UNIVERSITY, KUMARACOIL

M.Sc. COMPUTER SCIENCE

CURRICULUM & SYLLABUS

SEMESTER – I

SL.

NO.

SUBJECT

CODESUBJECT L T P C

THEORY

1. MA1504 Discrete Structures 3 1 0 4

2. CS1701 Cryptography 4 0 0 4

3. CS1702 Advanced JAVA Programming 3 1 0 4

4. CS1703 Advanced DBMS 4 0 0 4

5. CS1704 Image Processing 4 0 0 4

PRACTICAL

6. CS1772 JAVA Programming Lab 0 0 4 2

7. CS1773 RDBMS Lab 0 0 4 2

TOTAL CREDITS 18 2 8 24

MA1504 DISCRETE STRUCTURES 3 1 0 4

AIM:To have a fundamental knowledge of the concepts needed to test the logic of a

program, the applications in database and graphical structures.

OBJECTIVE:This course introduces most of the basic terminologies used in computer science

and applications of computation and graph theory.

UNIT I LOGIC 9Propositional logic – Logical connectives – Truth tables – Normal forms –Consistency –Predicate Logic – Universal and Existential quantifiers – Proof techniques – direct andindirect methods.

UNIT II SETS AND RELATIONS 9Set theory: - Types of sets – Operations on sets- Set identities –Principles of inclusionand exclusion-Relations: - Binary relations –Types of relations and their properties.Relational matrix and the graph of a relation-Partitions– Equivalence relations.- Partialordering –Poset- Hasse diagram.

UNIT III FUNCTIONS 9Definitions of functions- Classifications of functions-Types of functions-Examples-Compositions of functions- Inverse of functions- Binary operations - Characteristicfunction of a set- Permutation function.

UNIT IV GRAPH THEORY 9Basic definitions and examples – Graph terminology –Sub graphs – Operations onGraphs- Graph Isomorphism – Connectivity- Eulerian and Hamiltonian graphs - MatrixRepresentation of graphs.

UNIT V LANGUAGES AND FINITE STATE AUTOMATA 9Formal languages – Classes of Grammars - Type 0 – Context Sensitive – Context – Free– Regular Grammars – Ambiguity-Finite state automata – Deterministic Finite stateAutomata (DFA) – Non - Deterministic Finite state Automata (NFA) – Equivalence ofDFA and NFA.

L: 45 + T: 15, TOTAL: 60 PERIODS

REFERENCES:

1. J.P.Trembley and R.Manohar, “Discrete Mathematical Structure withApplications to computer science”, Tata McGraw-Hill Book Co.2008.

2. Kenneth H. Rosen, “Discrete Mathematics and its Applications” Fifth Edition,Tata McGraw-Hill Book Co. , 2003.

3. M.K. Venkataraman, N. Sridharan and N.Chandarasekaran,” DiscreteMathematics” The National publishing company,2003.

4. Narsingh Deo,“Graph Theory with applications to Engineering and ComputerScience” , Prentice Hall of India – New Delhi,2000.

UNIT I –Introduction 12Security goals- Cryptographic attacks-Services and Mechanisms-Techniques-Mathematics of Cryptography-Integer Arithmetic-Modular Arithmetic-Matrices-LinearCongruence.

UNIT II- Symmetric Key Encipherment 12Traditional Symmetric key ciphers-Substitution cipher-Transposition cipher-Stream andblock ciphers-Mathematics of Symmetric key cryptography-Algebraic key structures-GF(2n) Fields-Modern symmetric ciphers-Modern block ciphers-Modern stream ciphers.

UNIT III- Symmetric Key Encipherment 12Data Encryption Standard-Introduction-DES structure-DES Analysis-Security of DES-Multiple DES-Advanced Encryption Standard-Introduction-Transformations-KeyExpansions-AES Ciphers-Examples-Use of modern block ciphers-Use of Stream ciphers.

UNIT IV-Asymmetric key Encipherment 12Mathematics of Asymmetric key cryptography-Primes-Primality testing-Factorization-Chinese Remainder theorem-Quadratic Congruence-Exponentiation and Logarithm.Asymmetric key cryptography-RSA Cryptosystem-Rabin Cryptosystem-El GamelCryptosystem-Elliptic Curve Cryptosystem.

UNIT V-Integrity, Authentication and Key Management 12Message Integrity-Random Oracle model-Message authentication-Digital signature-comparison-process-services-attacks-digital signature schemes-Entity authentication-passwords-challenge response-zero knowledge-Bio Metrics. Key management-Symmetric key distribution-Kerberos-Key agreement-Public key distribution-Hijacking.

TOTAL: 60 PERIODSTEXT BOOK

1. Behrouz.A.Forozoun,Debdeep Mukhopadhaya,”Cryptography and NetworkSecurity”, 2010,Mc-Graw Hill.

2. William Stallings,”Cryptography and Network Security-Principles andpractice”,2011,Pearson Education.

REFERENCES1. C.K.Shyamala,N.Harini,Dr.T.R.Padmanabhan,”Cryptograph and Network

Security”,2011,Wiley India.2. Abhijit Das,C.E.Veni Madhavan,”Public key cryptography-Theory and

practice”,2009,Pearson Education.

CS1701 CRYPTOGRAPHY L T P C4 0 0 4

CS1702 ADVANCED JAVA PROGRAMMING L T P C3 1 0 4

UNIT-IThe Applet Class – Elements of Graphical User Interfaces-Introduction-Features andTerminology of a GUI-Java Foundation Classes-Event Model- Layout Managers-Events-Painting-Components and facilities for Rich Graphical User Interfaces. Java Beans-Introduction-Component Model-Makes a class a Bean- Bean development Environment-Sun Bean Box-Java Bean Class-Java Bean Properties-Java Bean Class with Events-BeanInfo Classes. 9UNIT-IIJDBC: JDBC Architecture - Installing the ODBC Driver - Connecting to a Database -Structured Query language. JDBC programming concept: Database URL - Executing theaction commands - Query with JDBC - Populating a Database - Executing Queries -Metadata - Scrollable and Updatable Result Sets. 9UNIT-IIINetwork Programming-Introduction-Working with URLs-Working with Sockets-RemoteMethod Invocation-Remote class of Objects-RMI Server Class-RMI Client Class-JNDI-CORBA, RMI-IIOP and IDL. Security- Introduction- Cryptography-Secure SocketLayer-Security Policy Definition and Enforcement- Java Authentication andAuthorization service. 9UNIT-IVBuilding Web Applications-Introduction-Web Technology of the Web-J2EE WebApplication Packaging-Servlets-The Life Cycle of a Servlet-Simple Servlet-Servlet API-Building a Web App With Continutity-Java Server Pages-JSP Tags an API-Java Codingin JSPs-Building Robust Web APPs. 9

UNIT-VEnterprise JavaBeans-Introduction-Enterprise Java Beans-Session EJBs-EJB Clients-Entity EJBs-EJB to Database Schema Mapping-Container Managed Persistence-Container Managed Relationships-EJB Query Language-Bean Managed Persistence-Message_Driven Beans-EJB Transactional Characteristics-EJB Security. 9

L: 45 + T: 15, TOTAL: 60 PERIODSTEXT BOOKS

1. Y.Daniel Liang, “Introduction to Java Programming Comprehensive Version”,Prentice Hall Inc., 10th Edition, 2013.

2. Andrew Lee Rubinger and Bill Burke,- “Enterprise Java Beans 3.1” O’REILLYPublishing, Sixth Edition, 2010.

3. Joe Wiggles Worth and Paula Mc Millan-“JavaTM Programming AdvancedTopics”- Thomson Learning Inc. Third Edition,2007

REFERENCES1. Herbert Schildt – “The Complete Reference Java” - Tata McGraw Hill Publishing

Company Limited, 7th Edition 2007.2. Deitel Paul , Deitel Harvey, “Java How to Program”, Prentice Hall, 9th Edition,

2012.

CS1703 ADVANCED DBMS L T P C4 0 0 4

UNIT I : INTROUCTIONNeed of database System-Advantages of database system-Application areas of databasesystem-DBMS Architecture and Data Independence-Data Base models-DBMSlanguages-Classification of DBMS. 12

UNIT II : DESIGN CONCEPTSOverview of the Design process-The Relational Database model-Entity Relationship(ER)modeling-Normalization of Database-Advanced Data modeling. 12

UNIT III : Advanced Design and ImplementationIntroduction to SQL-Advanced data definition commands-Data manipulation commands-Advanced SQL-Database design. 12

UNIT IV : Advanced Database ConceptsTransaction management and concurrency control-Database performance Tuning andQuery optimization-Distributed DBMS-Distributed processing and distributed databases-Characteristics of DDBMS-DDBMS components-Client/Server DDBMS-BusinessIntelligence and Data warehouses. 12

UNIT V : New Database applications and environmentsData warehousing and Data mining –Online Analytical processing(OLAP)- Databaseconnectivity-Mobility and personal databases-Multimedia databases. 12

TOTAL: 60 PERIODSTEXT BOOK:

1. Peter Rob,Carlos Coronel,”Database System Concepts”, Congage Learning,2010.

REFERENCES:1. Abraham SilberSchatz, Henry F.Korth and Sundarshan “Database system

concepts”,Fifth Edition,McGraw Hill.2006.2. Pearson, Introduction to Database systems,ITL Education Solution Ltd.

CS1704 IMAGE PROCESSING L T P C4 0 0 4

UNIT IIntroduction – Digital Image Processing – Origin – Examples of Fields – FundamentalSteps – Components - Digital Image Fundamentals – Elements of Visual Perception –

Light and Electromagnetic Spectrum – Image Sensing and Acquisition – Image Samplingand Quantization. 12

UNIT IISpatial Filtering – Histogram Processing – Smoothing Spatial Filters – SharpeningSpatial Filters – Filtering in Frequency Domain – Preliminary Concepts – SmoothingUsing Frequency Domain Filters – Sharpening using Frequency Domain Filters. 12

UNIT IIIImage Restoration and Reconstruction – Noise Models – Restoration by Spatial Filtering– Periodic Noise Reduction by Frequency Domain Filtering – Color Image Processing –Color Models – Color Transformations – Smoothing and Sharpening – ImageSegmentation based on Color. 12

UNIT IVWavelets and Multiresolution Processing – Background – Multiresolution Expansions –Image Compression – Fundamentals – Basic Compression Methods – Huffman Coding –Arithmetic Coding – LZW Coding – Run-Length Coding – Morphological ImageProcessing –Erosion and Dilation – Basic Morphological Algorithms. 12

UNIT VImage Segmentation – Point, Line and Edge Detection – Detection of Isolated Points –Line Detection – Edge Detection – Thresholding – Global Thresholding – MultipleThresholds – Variable Thresholding – Region-based Segmentation – WatershedSegmentation Algorithm – Representation and Description – Boundary Descriptors –Regional Descriptors – Object Recognition – Structural Methods. 12

TOTAL: 60 PERIODSTEXT BOOK:

1. Rafael C.Gonzalez, Richard E.Woods, “Digital Image Processing”, Third Edition,Pearson Education, 2011.

REFERENCES1. S.Jayaraman, S.Esakkirajan, T.Veerakumar, “Digital Image Processing”,

TataMcGrawHill Education Private Ltd,2011.2. Anil K.Jain, “Fundamentals of Digital Image Processing”, PHI Learning Private

Ltd, 2010.

CS1772 JAVA PROGRAMMING LAB L T P C0 1 2 2

1. Multithreading Using Priorities2. File & String Manipulations3. Write an Applet Program to use various Controls and perform Font Animation.4. Create a menu with submenu, popup menu, short cut keys, check box items and

separator.5. Implement calculator using Java AWT controls.6. Create a Student mark statement using JDBC control and display the information

using Table.7. Program to implement Client/Server technology.8. Write a Java program to create an Employee pay bill calculation using various

swing controls.

TOTAL: 45 PERIODS

CS1773 RDBMS LABL T P C

0 1 2 2

1. Data Definition, Manipulation of base Tables and views.2. High level programming language extensions.3. Front end tools.4. Forms – Triggers – Menu Design.5. Reports.6. Database Design and implementation.

TOTAL: 45 PERIODS

NOORUL ISLAM CENTRE FOR HIGHER EDUCATION

NOORUL ISLAM UNIVERSITY, KUMARACOIL

M.Sc. COMPUTER SCIENCE

CURRICULUM & SYLLABUS

SEMESTER – II

SL.

NO.

SUBJECT

CODESUBJECT L T P C

THEORY

1. CS1705 Web Technology and Web Services 4 0 0 4

2. CS1706 Object Oriented System Development 4 0 0 4

3. CS1707 Theory of Computation 4 0 0 4

4.CS1708 Information Security Management 4 0 0 4

5.xxEx1 Elective – I 3 0 0 3

6.xxEx2 Elective – II 3 0 0 3

PRACTICAL

7.CS1774 Web Technology Lab 0 0 4 2

8.CS1775 CASE Tools and UML Lab 0 0 4 2

TOTAL CREDITS 22 0 8 26

CS1705 WEB TECHNOLOGY AND WEBSERVICES

L T P C4 0 0 4

UNIT IInternet networking concepts – Devices – Repeaters – Bridges – Routers – Gateways –Topology Architecture of an ISP – IP Address – Transaction Control Protocol – Featuresof TECP –UDP – DNS – Email – FTP – HTTP – TELNET. 12UNIT IIE commerce and Web technology – Aspects and Types – E-procurement models –Supply chain management – Customer Relationship Management – Enabling e-commerce – Web page – Tier architecture – Concepts of Tier – Static Web pages –Dynamic Web pages – DHTML – CGI – Basics of ASP technology – Active Web pages.

12UNIT IIISecurity issues in Transaction Management – Sessions and session Management –Maintaining state information – TP monitors – ORB – Component transaction – monitor– E J B – cryptography – Digital signature and certificates – Secure Socket Layer (SSL) –Credit card Processing Models – Secure Electronic Transaction – 3D Secure Protocol –Electronic money. 12UNIT IVElectronic Data Interchange - XML and WAP – Overview of EDI – Data ExchangeStandards –EDI Architecture – EDI and the Internet – Basics of XML – XML Parsers –Need for a standard – Limitations of Mobile Devices – WAP Architecture – WAP stack.

12UNIT VOnline Applications - Online Shopping – Online databases – Emerging technologies -Monitoring user events – Need for .NET - Overview of .NET - . NET Framework – Webservices. 12

TOTAL: 60 PERIODSTEXT BOOK

1. Achyut.S.Godbole and Atul Kahate, “Web Technologies”, Tata McGraw Hill,Delhi, 2005.

REFERENCES1. Ellote Rusty Harold, “Java Network Programming”, O’Reilly Publications, 1997.2. Jason Hunter, William Crawford, “Java Servlet Programming”, O’Reilly

Publications,3. 1998.

CS1706OBJECT ORIENTED SYSTEM

DEVELOPMENTL T P C4 0 0 4

UNIT I: OBJECT BASISObject Oriented Philosophy - The concept of Object - Object fundamentals – Objectstate, behavior and method - Encapsulation and information hiding – Class relationships– Polymorphism - Aggregation - Object containment - Meta class. 12

UNIT II: OBJECT ORIENTED METHODOLOGIESJim Rumbaugh’s Object Model – Grady Booch methodology – Ivar Jacobsonmethodology - Patterns - Frame works - Unified approach – Basics of UML. 12

UNIT III: OBJECT ORIENTED ANALYSISObject oriented analysis the use case driven approach – Use case model – Approaches forObject oriented analysis – CRC cards – Noun phrase approach – Common class patternapproach - Identifying object relationships and methods – CASE Study. 12

UNIT IV: OBJECT ORIENTED DESIGNObject oriented design process – Design axioms – Design patterns – Class design - CASEstudy. 12

UNIT V: MODELLING WITH UMLUnified modeling language and UA - Diagrams in UML – Use Case diagram – Activitydiagram – Statechart diagram – Object diagram - Class diagram – Behaviour diagram-Component diagram – Deployment diagram - CASE study in the scenario Automating aVending Machine. 12

TOTAL: 60 PERIODSTEXT BOOK

1. Ali Bahrami - “Object Oriented Systems Development”, Irwin-McGraw Hill,New Delhi, International editions.

REFERENCES1. Grady Booch - “Object Oriented Analysis and Design with applications”, II

edition, Addison Wesley.2. Martin Fowler, Kendall Scott - “UML Distilled-Applying the standard Object

Modeling Language”, Addison Wesley.

CS1707 THEORY OF COMPUTATION L T P C4 0 0 4

UNIT I LANGUAGE AND FINITE AUTOMATAAlphabets and Languages – Finite representation of Languages – Deterministic andNondeterministic finite automata – NFA with ξ-Transitions- Equivalence of DFA andNDFA- Finite automata and regular expressions – Languages that are and are notregular. 12UNIT II CONTEXT – FREE LANGUAGESContext free grammars – Derivation - Derivation trees – Ambiguity – Simplification ofContext free grammars – Normal forms - Pushdown automata – Pushdown automata andcontext free grammars – Languages that are and are not context – free. 12

UNIT III TURING MACHINESThe definition of a Turing Machine – Design of Turing machine- Computable languagesand functions - Two way infinite tape- Power of Turing Machine – Random accessTuring machines – Universal Turing Machines. 12

UNIT IV UNDECIDABILITYConcept of undecidability – Recursive and Recursively Enumerable languages -Undecidability of Universal Languages – The halting Problem – Post’s Correspondenceproblem – Unsolvable problems about grammars. 12

UNIT V COMPLEXITY AND NP-COMPLETENESSThe Class P- The class NP – Properties of NP-complete and NP-hard problems – Vertexcover problem - Hamiltonian path problem – Travelling sales man problem – Partitionproblem. 12

TOTAL: 60 PERIODS

TEXT BOOK1. P.K.Srimani, Nasir S.F.B, “A Text book on Automata Theory”, Second Edition,

Foundation Books, 2014.2. Lewis, H.R. and Papadimitriou, C.H, “Elements of the Theory of Computation”,

Prentice Hall, Second Edition, 2005.

REFERENCES1. Martin. J, “Introduction to Languages and Theory of Computation”, McGraw Hill

Company, 3rd International Edition, 2003.2. A.M. Padma Reddy, “Finite Automata and Formal Languages, A Simple

Approach”, Pearson, 2011.3. Mishra, K.L.P and Chandrasekaran, “Theory of Computer Science”, 3rd Edition,

Printice Hall of India, New Delhi, 2003.

CS1708 INFORMATION SECURITY MANAGEMENT L T P C4 0 0 4

UNIT - 1: INTRODUCTIONHistory, What is Information Security?, Key Information Security Concepts, CriticalCharacteristics of Information, NSTISSC Security Model, Components of an InformationSystem, Securing the Components, Balancing Security and Access, The SDLC, TheSecurity SDLC 12

UNIT - 2: SECURITY INVESTIGATIONNeed for Security, Business Needs, Threats, Attacks, Secure Software Development,Legal, Ethical and Professional Issues, Ethics and Information Security, Codes of Ethicsand Professional Organizations. 12

UNIT - 3: SECURITY ANALYSISRisk Management: Overview, Risk Identification, Assessing Risk, Assessing andControlling Risk, Selecting Risk Control Strategies, Selecting a Risk control Strategy,Risk Management Discussion Points. 12

UNIT - 4: LOGICAL DESIGNBlueprint for Security, Information Security Policy, Standards and Practices, ISO17799/BS 7799, NIST Models, VISA International Security Model, Design of SecurityArchitecture, Planning for Continuity 12

UNIT - 5: PHYSICAL DESIGNSecurity Technology, IDS, Honey pots, Honey nets and Padded Cell Systems, Scanningand Analysis Tools, Biometric Access Control, Cryptography, Access Control Devices,Physical Security, Security and Personnel 12

TOTAL 60: PERIODS

TEXT BOOKS1. Michael E Whitman and Herbert J Mattord, "Principles of Information Security",

Vikas Publishing House, New Delhi, 2003

REFERENCES1. Micki Krause, Harold F. Tipton, “Handbook of Information Security

Management", Vol 1-3 CRC Press LLC, 2004.2. Stuart Mc Clure, Joel Scrambray, George Kurtz, "Hacking Exposed", TataMcGraw-Hill, 20033. Matt Bishop, “Computer Security Art and Science", Pearson/PHI, 2002.

CS1774 WEB TECHNOLOGY LABL T P C0 1 2 2

Creating applications using web development tools1. HTML & VB Script2. XML - DTD3. XML - XSL4. XML - CSS5. Translating EDIfact document to XML6. Active Server Pages7. Java Server Pages8. Java Servlets9. .NET Platform10. C# in .NET Platform

TOTAL: 45 PERIODS

CS1775CASE TOOLS AND UML LAB

L T P C

0 1 2 2

1. Familiarization of features of any one of the standard UML case tool.2. Capturing key functional requirements as Use cases and class diagram for online

ticket / hotel reservation systems, student information system, sales and marketingsystem, banking system and inventory tracking system.

3. Interacting diagrams, state chart diagrams etc for systems in 2.4. Implementation using any one of object oriented languages like Java, C++ for systems

in 2.5. Component diagrams, deployment diagrams for system in 2.6. Unit test case, integration test case for systems in 2.

TOTAL: 45 PERIODS

NOORUL ISLAM CENTRE FOR HIGHER EDUCATION

NOORUL ISLAM UNIVERSITY, KUMARACOIL

M.Sc. COMPUTER SCIENCE

CURRICULUM & SYLLABUS

SEMESTER – III

SL.

NO.

SUBJECT

CODESUBJECT L T P C

THEORY

1.CS1709 Virtualization and Cloud Computing 4 0 0 4

2.CS1710 Visual Programming 4 0 0 4

3.CS1711 Mobile Computing 4 0 0 4

4.xxEx3 Elective III 3 0 0 3

5. xxEx4 Elective IV 3 0 0 3

PRACTICAL

6. CS17P1 Mini Project Based on SoftwareDevelopment

0 0 12 6

TOTAL CREDITS 18 0 12 24

CS1709 VIRTUALIZATION AND CLOUD COMPUTING L T P C4 0 0 4

UNIT I CLOUD COMPUTINGUnderstanding the Cloud Computing – Cloud Architecture – Cloud Storage –Advantages, Disadvantages of Cloud Computing – Companies in the Cloud Today –Developing Cloud Services – Web:Based Application – Pros and Cons of Cloud ServiceDevelopment – Types of Cloud Service Development – Software as a Service – Platformas a Service – Web Services – On:Demand Computing – Discovering Cloud ServicesDevelopment Services and Tools – Amazon Ec2 – Google App Engine – IBM Clouds

12UNIT II CLOUD COMPUTING FOR EVERYONECentralizing Email Communications – Collaborating on Schedules, To:Do Lists, ContactLists and Group Projects and Events – Cloud Computing for the Community andCorporation, Using Cloud Services: Collaborating on Calendars, Schedules and TaskManagement – Exploring Online Scheduling Applications, Online Planning and TaskManagement – Collaborating on Event Management, Contact Management, ProjectManagement, Word Processing and Databases – Storing and Sharing Files 12

UNIT III VIRTUALIZATION & CLOUD COMPUTINGVirtualization & Cloud Computing Overview – Case Study: Enterprise Virtualization &Cloud Computing – Definitions – Hypervisor / Virtual Machine Monitor Architecture –CPU Virtualization Extensions – Network and Storage Virtualization Architecture

12

UNIT IV VIRTUALIZED ENTERPRISESmashing the Virtualized Stack – Case Study: Owning the Virtualized Enterprise – CPU& Chipsets – VMM/Hypervisor/Host – VMs/Guest – Control & Management planes &APIs. 12

UNIT V CLOUD SECURITY AND PRIVACYInfrastructure security – Data Security and Storage – Identity and access management –Security management in the cloud – privacy – Security as a cloud service. 12

TOTAL: 60 PERIODSTEXT BOOK

1. Michael Miller, Cloud Computing: Web:Based Applications That Change theWay You Work and Collaborate Online, Que Publishing, August 2008.

REFERENCES1. Christofer Hoff, Rich Mogull, Craig Balding, Hacking Exposed: Virtualization &

Cloud Computing: Secrets & Solutions [Paperback], McGraw:Hill Osborne .2. Haley Beard, Cloud Computing Best Practices for Managing and Measuring

Processes for On:demand Computing, Applications and Data Centers in the Cloudwith SLAs, Emereo Pty Limited, July 2008.

3. Tim Mather, Subra Kumaraswamy, Shahed Latif, Cloud Security and Privacy –An Enterprise Perspective on Risks and Compliance, By O'Reilly Media, 2009

CS1710 VISUAL PROGRAMMING L T P C4 0 0 4

UNIT IIntroducing .NET – The .NET Framework – The Common Language Runtime – BuildingManaged Code – Compiling Managed Code – Organizing Managed Code – ExecutingManaged Code – Loading Assemblies – Compiling MSIL – Creating a Native Image –Securing Assemblies – Garbage Collection – Application Domains. 12

UNIT IIThe VB.NET Crash Course – What is VB.NET? – Hello World – Variables Constantsand Operators – Modularing your Code –Functions and Subroutines – Using Functions –Using Subroutines – Controlling Program Flow – Handling Errors and Exceptions –Unstructured Error Handling – Structured Exception Handling. 12

UNIT IIIThe VB.NET and Object Oriented programming – Class basics – Class Properties –Constructors and Destructors – Inheritance – Overridden Functions – Overloading –Polymorphism – Interfaces – Implementing Polymorphism – Multithreaded Programming– Threads Synchronization – Events and Thread Synchronization. 12

UNIT IVWorking with ASP.NET – Features – Anatomy of ASP.NET Pages – Introducing WebForms – Using HTML Controls – Using Web Controls – Web Control Properties – WebControls for Displaying and Formatting Data – Creating Buttons – Inputting Text –Selecting Choices – Creating Lists – Miscellaneous Basic Controls. 12

UNIT VCreating a Simple ASP.NET Application – ASP.NET Page Directives – ASP.NET RichControls – Calendar Control – AdRotator Control – Validation Controls – Data ListControls – Repeater Control – Data Grid Control – User Controls – Authoring a UserControl – ASP.NET Intrinsic Objects. 12

TOTAL: 60 PERIODSTEXT BOOK:

1. David Chappell, “Understanding .NET”, Second Edition, Pearson Education,2007.

2. Matt J.Crouch, “ASP.NET and VB.NET Web Programming”, Pearson Education,2008.

REFERENCES1. Peter Vogel, “Practical Code Generation in .NET”, Pearson Education, 2012.2. Andy Wigley, Stephen WheelWright, “.NET Compact Framework”,

TataMcGrawHill Publishing Ltd, 2003.

CS1711 MOBILE COMPUTING L T P C4 0 0 4

UNIT I INTRODUCTIONMobile and Wireless Devices – Simplified Reference Model – Need for MobileComputing – Wireless Transmissions – Multiplexing – Spread Spectrum and CellularSystems – Medium Access Control – Comparisons. 12

UNIT II TELECOMMUNICATION SYSTEMSTelecommunication Systems – GSM – Architecture – Sessions – Protocols – Hand Over -Security – DECT - TETRA – Satellite Systems – GEO – LEO - MEO. 12

UNIT III WIRELESS LANIEEE 802.11 – System Architecture – Protocol Architecture – Medium Access ControlLayer – MAC Management - Hiper LAN – Hiper LAN1 - WATM – BRAN - Bluetooth– Architecture - Radio layer – Baseband layer - Security - Link Manager Protocol. 12

UNIT IV MOBILE NETWORK LAYERMobile IP - Goals – Packet Delivery – Agent Discovery – Registration – Tunneling -Reverse Tunneling – DHCP - Mobile Adhoc Networks – Routing – Destination sequencedistance vector – Dynamic source routing 12

UNIT V WIRELESS APPLICATION PROTOCOLWWW – HTTP – HTML - WAP Architecture – Wireless Datagram Protocol – WirelessTransport Layer Security - Wireless Transaction Protocol - Wireless ApplicationEnvironment - Wireless Session Protocol – Wireless Markup Language - WML Script –Wireless Telephony Applications. 12

TOTAL: 60 PERIODSTEXT BOOK

1. Jochen Schiller, “Mobile Communications”, Pearson Education, Delhi, 2000.

REFERENCE1. Sandeep Singhal, Thomas Bridgman, Lalitha Suryanarayana, Danil Mouney, Jari

Alvinen, David Bevis, Jim Chan and Stetan Hild, “ The Wireless ApplicationProtocol : Writing Applications for the Mobile Internet”, Pearson EducationDelhi, 2001.

CS17P1 Mini Project based on SoftwareDevelopment

L T P C0 0 12 6

The Mini Project is not only a part of the coursework, but also a mechanism to

demonstrate the abilities and specialization. It gives more knowledge about the

database, programming languages, Scripting languages and web page design. It

provides the opportunity for the student to demonstrate originality, teamwork,

inspiration, planning and organization in a software project. The Mini Project is

important for a number of reasons. It provides students with:

Opportunity to specialize in specific areas of computer science and softwares;

Encourages integration of knowledge gained in the previous course units.

Mini Project work shall be carried out by a student under the guidance of a

faculty. It is mandatory that a Student should submit the document of the completed work

in the mid-semester and presentation before the project course committee during the

semester in which the mini project work is undertaken. The student should demonstrate

that he/she has acquired both analytical and practical skills in the field specialization. The

student should submit the mini project report at the end of the semester.

NOORUL ISLAM CENTRE FOR HIGHER EDUCATIONNOORUL ISLAM UNIVERSITY, KUMARACOIL

M.Sc. COMPUTER SCIENCE

CURRICULUM & SYLLABUS

SEMESTER – IV

SL.No. Course Code Course Title L T P C

1. CS17P5 Project Work 0 0 32 16

TOTAL 0 0 32 16

CS17P5 PROJECT WORK L T P C0 0 32 16The Project is not only a part of the coursework, but also a mechanism todemonstrate the abilities and specialization. It gives more knowledge about thedatabase, programming languages, Scripting languages and web page design. Itprovides the opportunity for the student to demonstrate originality, teamwork,inspiration, planning and organization in a software project, and to put intopractice some of the techniques that have been taught throughout the previouscourses. The Project is important for a number of reasons. It provides studentswith: Opportunity to specialize in specific areas of computer science andsoftware’s; Future employers will most likely ask about the project at interview; Opportunity to demonstrate a wide range of skills and knowledgelearned, and Encourages integration of knowledge gained in the previous course units.Project work shall be carried out by a student under the guidance of a faculty.It is mandatory that a Student should submit the document of the completed workin the mid-semester and presentation before the project course committee duringthe semester in which the mini project work is undertaken. The student shoulddemonstrate that he/she has acquired both analytical and practical skills in the fieldspecialization. The student should submit the project report at the end of thesemester. Before that he / she should attend 3 reviews, split their work in to 5phases.The project report should be documented with an engineering approach to thesolution of the problem. The project report should be prepared in order to solve theproblem in a methodical and professional manner, making due references toappropriate techniques, technologies and professional standards.

NOORUL ISLAM CENTRE FOR HIGHER EDUCATION

NOORUL ISLAM UNIVERSITY, KUMARACOIL

M.Sc. COMPUTER SCIENCE

CURRICULUM & SYLLABUS

LIST OF ELECTIVES

LIST OF ELECTIVES

1. CS17A1 Wireless Technology 3 0 0 3

2. CS17A2 Data Mining and Data Warehousing 3 0 0 3

3. CS17A3 Modeling and Simulation 3 0 0 3

4. CS17A4 Mobile Application Development 3 0 0 3

5. CS17A5 Soft Computing 3 0 0 3

6. CS17A6 Network Protocols 3 0 0 3

7. CS17A7 Software Project Management 3 0 0 3

8. CS17A8 Client Server Computing 3 0 0 3

9. CS17A9 Advanced Computer Networks 3 0 0 3

10. CS17B1 Distributed Operating System 3 0 0 3

11. CS17B2 Software Reliability 3 0 0 3

12. CS17B3 Advanced Compiler Design 3 0 0 3

13. CS17B4 Advanced Computer Graphics 3 0 0 3

14. CS71B5 Enterprise Resource Planning 3 0 0 3

15. CS17B6 Open Source System 3 0 0 3

CS17A1 WIRELESS TECHNOLOGY L T P C3 0 0 3

UNIT ICharacteristics of Wireless Medium - Introduction – Comparison of Wired and WirelessMedium – Radio Propagation Mechanisms – Path Loss Modeling and Signal Coverage –Channel Measurement and Modeling Techniques – What is dB?. 9

UNIT IIPhysical Layer Alternatives for Wireless Networks - Short Distance BasebandTransmission – Traditional Digital Cellular Transmission – Spread SpectrumTransmissions. 9

UNIT IIIFixed Assignment Access for Voice Oriented Networks – Random Access for DataOriented Networks – Network Planning – Introduction – Wireless Network Topologies –Cellular Topology. 9

UNIT IVGSM and TDMA Technology – What is GSM? – Services – Reference Architecture –CDMA Technology, IS95, IMT2000 – Introduction – Reference Architecture – IS634Standard – IS41 Standard – IMT2000. 9

UNIT V

IEEE 802.11 WLANs – Introduction – The PHY Layer – MAC Sublayer – AdhocNetworking – HomeRF – Bluetooth – Wireless Geo Location Systems – SystemArchitecture – Technologies for Wireless Geo Location. 9

TOTAL: 45 PERIODS

TEXT BOOK

1. Kaveh Pahlavan, Prashanth Kirishnamurthy, “Principles of WirelessNetworks – A Unified Approach”, PHI Learning Private Limited, 2009.

REFERENCES

1. Gary S. Rogers, John Edwards, “ An Introduction to Wireless Technology”,Pearson Education, 2009.

2. Lars Ahlin, Jens Zander, Ben Slimance, “Principles of WirelessCommunications”, OverSeas Press, 2008.

CS17A2 DATA MINING AND DATAWAREHOUSING

L T P C3 0 0 3

Unit IData mining: Introduction- Definitions- KDD Vs Data mining-DBMS vs. DM – OtherRelated Areas-DM Techniques –Other Mining Problems – Issues and Challenges in DM– DM Application Areas . 9

Unit IIAssociation Rules: Introduction-What is association rule- Methods to discoverassociations rule- A priori algorithm – Partition algorithm- Dynamic item set countingalgorithm-FP – tree growth algorithm- Eclat and dEclat – Rapid association rule mining– Association rule with item constraints 9

Unit IIIClustering Techniques: Introduction- clustering paradigms- Classical partitioningmethods: k-means and k-Medoids. - Hierarchical method: BIRTH-Density Basedmethod: DBSCAN- Outliers.Decision Tree: what is decision tree- Tree construction principle- Best Split- SplittingIndices- Splitting Criteria- Decision tree construction algorithm- ID3 9

Unit IVOther techniques :Web mining- Text mining- Spatial mining – Spatial clustering-Neural network- Leaning in neural network- Unsupervised learning- Genetic algorithm.

9Unit VData warehousing: Introduction- Definition- Multidimensional data model- OLAPoperations- Warehouse Schema- Data warehousing Architecture- Warehouse server-Meta data- Data Mart - Data Warehouse Back ended process. 9

TOTAL: 45 PERIODSTEXT BOOKS :

1. Arun K Pujari, “Data Mining Techniques” , University press,Second Edition2010.

2. Jiawei Han, Micheline Kamber, “Data Mining : Concept and Techniques” ,Morgan Kaufmann Publishers, second Edition.

REFERENCE BOOKS:1. Pang- Ning Tan, Micheal Steinbach, Vipin Kumar, “Introduction to Data

Mining”, 2007.

2. David Hand, Heikki Mannila, Padhraic Smyth, “Principles of Data Mining” TheMIT Press, Cambridge.

3. Mark Humphries , Micheal W Hawkins & Michelle C dy, “Data warehousingarchitecture and implementation” prentice hall of India, 1999.

CS17A3 MODELLING AND SIMULATIONL T P C

3 0 0 3Unit I INTRODUCTION

Advantages and Disadvantages, Systems - Components of a system - Types ofSystem -Model of a System – Steps in Simulation Study - Simulationexamples(Single server model, Able – Baker problem, News paper seller problem).

9

Unit II MODELS IN SIMULATIONStatistical Models – Discrete Distributions – Continuous Distributions – EmpiricalDistributions, Poisson Process, Queuing models – characteristics, Queuing notations,Simulation Techniques, Monte – Carlo Simulation. 9

Unit III RANDOM NUMBERSProperties of Random numbers, generation of random numbers, Techniques forgenerating random numbers, tests for random numbers, 2 test, Runs test, Poker test,Kolmogrov Simrnov test, Random Variate generation. 9

Unit IV SIMULATION LANGUAGESIntroduction to Network Simulator2 NS2 – Basic Architecture – Installation –Directories – Running NS2 Simulator – A Simulation Example. MATLAB: BasicFeatures – The MATLAB Workspace – Variables – Comments – Complex Numbers– Floating Point Arithmetic – Mathematical Functions – The MATLAB Desktop.Simulation using C++/GPSS/Arena. 9

Unit V ANALYSIS OF SIMULATION DATAInput Modeling – Data Collection, identifying distribution with data, parameterestimation, Goodness-Fit test, selecting input models without data, Multivariate andTime series input models. Verification and Validation of Input Models – ModelBuilding Verification and Validation. 9

TOTAL: 45 PERIODS

TEXT BOOK

1. Jerry Banks, John S. Carson, Barry L. Nelson, David M.Nicol, Discrete – EventSystem Simulation Prentice Hall of India, Delhi, 2008.

2. Duane Hanselman, Bruce Littlefield, “Mastering MATLAB”, Pearson Education,2011.

3. Teerawat Issariyakul, Ekram Hossain, “Introduction to Network Simulator NS2”,Springer, 2008.

REFERENCES

1. Geoffrey Gordon, System Simulation, Prentice Hall of India, Delhi, 20052. J. Sehriber, Simulation using GPSS-Thomas John Wiley, Singapore, 2001.

CS17A4 MOBILE APPLICATION DEVELOPMENT L T P C3 0 0 3

Unit I: Mobile Computing FundamentalsMobile Computing-Introduction, Architecture for Mobile Computing, Three-TierArchitecture, Design Considerations for Mobile Computing, Mobile Computingthrough Internet, Mobile Computing through Telephony. 9

Unit II: Getting started with MobilityMobility landscape, Mobile platforms, Mobile appsdevelopment, Overview ofAndroid platform, setting up the mobile app development environment along withan emulator, a case study on Mobile app development 6

Unit III: Building blocks of mobile appsApp user interface designing – mobile UI resources (Layout,UIelements,Draw-able, Menu), Activity- states and life cycle, interaction amongst activities.App functionality beyond user interface –Threads,Asynctask,Services – states andlifecycle, Notifications, Broadcastreceivers,Telephony and SMS APIsNative data handling – on-device file I/O, shared preferences, mobile databasessuch as SQLite, and enterprise data access (via Internet/Intranet) 15

Unit IV: Sprucing up mobile appsGraphics and animation – custom views, canvas, animation APIs, multimedia –audio/video playback and record, location awareness, and native hardware access(sensors such as accelerometer and gyroscope) 8

Unit V: Testing mobile apps and Taking apps to MarketDebugging mobile apps, White box testing, Black box testing, and test automationof mobile apps, Junit for Android, Robotium, MonkeyTalk, Versioning, signingand packaging mobile apps, distributing apps on mobile market place

TOTAL: 45 PERIODSText Book

1. AnubhavPradhan, Anil V Deshpande“ Mobile Apps Development” SAMS,Edition: I, 2013.

Reference Book1. Barry Burd, “Android Application Development All in one for Dummies”,

SAMS, Edition: I

2. Anil V Deshpande “Teach Yourself Android Application Development In 24Hours” SAMS, Edition: I

CS17A5 SOFT COMPUTING L T P C3 0 0 3

UNIT I INTRODUCTIONSoft computing paradigms – Neural network – Fuzzy type – Derivation free optimizationmethods of genetics algorithms – Soft computing characteristics. 9

UNIT II FUZZY LOGICSets – Properties – Arithmetics - Members function – Fuzzy relations – Relationequations – Fuzzy measures – Types of uncertainty – Members of uncertainties –Measures of fuzziness – Probabilities Possibility – Measures of fuzzy events. 9

UNIT III NEURAL COMPUTINGIntroduction – Basic Neuron - Neuron modeling – Modeling the single Neuron - Learningin Simple Neuron – Perception earning curve – A Vectorial perspective – The PerceptionLearning Rule - Proof – Limitations of perception. 9

UNIT IV NEURAL NETWORKSMulti-level perception – Algorithms – Visualizing network behaviour – B:PN – Selforganizing network – Kohenen algorithms – Hopfield network – Adaptive resonancetheory – Pattern classification. 9

UNIT V GENTIC ALGORITHMSIntroduction – Biological terminology – Search space and fitness landscapes – Elementsof genetic algorithms – A Simple Genetic Algorithms – Some Application of GeneticAlgorithms - Genetic algorithms in problem solving: Evolving Computer Programming– Data Analysis and Prediction. Genetic Algorithms in scientific Models – ModelingIntraction Between Learning and Evolution. 9

TOTAL: 45 PERIODSTEXT BOOKS

1. Devendra K. Chaturvedi, “Soft Computing”, Springer, 2008.2. Kauffmann. A., “Theory of Fuzzy Subsets”, Academic Press, 1989.3. R.BealeC.T.Jacson, “Neural Computing- An introdution”, Adam Hilger, 1990.4. Melanie Mitchell, “An Introduction to Genetic Algorithms”, Prentice Hall of

India, 1996.

REFERENCES1. J.S.Jang, C.T.Sun, E. Mizutani, “Neuro – Fuzzy and Soft Computing”,

MatlahCurriculamSeries, Prentice International, 1997.

2. Simon Havkin, “Neural Networks – A Comprehensive Foundation”, Prentice Hallof Inda, 1994.

3. David E. Gold Berg “Genetic Algorithms in Search, Optimization and MachineLanguage” Prentice Hall of India, 2006.

CS17A6 NETWORK PROTOCOLS L T P C3 0 0 3

UNIT IInternet Protocol : Routing IP Datagrams – Error and Control Messages (ICMP), ReliableStream Transport Service (TCP) : TCP State Machine, Response to congestion –congestion, Tail Drop and TCP – Random Early Discard, Routing : Exterior GatewayProtocols and Autonomous Systems (BGP) 9

UNIT IIInternet Multicasting: Hardware Broadcast- Hardware Organ of Multicast – Ethernetmulticast - IP multicast - The conceptual Process - IP Multicast Address - MulticastAddress semantics – Mapping IP Multicast – HOSt Multicast Delivery Multicast Scope -IGMP- IGMP Implementation- MSg Format - Multicast Slow and Routing inf - BasicMulticast Routing Paradigms –TRPF – Multicast Tree –Essence of Multicast Routing -Reverse Path Multicast- DVMRP- Mrouled Program –CBT-DIM.Mobile IP :– Mobility - Routing- Addressing - Mobile IP Character – Operation –Addressing Details - agent Respiration – Reg MSG Format – communicate with ForeignAgent - Datagram transmission – Reception – 2 crossy Problem – Communication withComputer an HM networks.Bootstrap And Auto configuration (BOOTP, DHCP): Need for Alternative to RARPUsing IP to determine IP Address - BOOTP Retransmission Policy- BOOTP Msg Format- 2 step BOOTP Procedure – Vendor Specific Field – Need for dynamic Configure -Dynamic Host Configuration - Dynamic IP Address Assignment - Obtaining MultipleAddress - Address Acquisition States - Early Lowest Termination - Lease Renewal State,DHCP Msg Format - DHCP Options and Msg Type- Option Overload- DCHP &DOMAIN Names. 9

UNIT IIIThe Domain Name System (DNS): Name for Machine-flat name space - HierarchicalName - Delegation of authority Subset Authority - Internet Domain names - Official andUnofficial Domain Names - Name Item and Syntax of Name - Mapping domain – nameto address - domain name resolution - Efficient translation - domain server msg forcompressed name format - Abbreviation of domain names - inverse mapping pointerqueries.Applications: Remote Login (TELNET, Rlogin) – Remote interactive computing,TELNET Protocols TELNET Options - TELNET Negotiation Rlogin.Transfer and Access (FTP, TFTP, NFS):- file access and Transfer –online shared Access-sharing by file transfer FTP- user view of FTP –Anonymous FTP Services TFTP-NFS –NFS Implementation –RPC 9

UNIT IVApplications: Electronic Mail (SMTP, POP, IMAP, MIME) – Email – Mailbox –Relationship of internetworking and mail - TCP/IP Standard for E-Mail Service. E-MailAddress - Retrieval Mailbox Protocol MIME Extension - MIME Multipart MSgWorld Wide Web (HTTP) – Importance of WEB – Architecture - Components URL –Hyper TEST Transfer Protocol - GET Request- Error MSG - Persistent Connection &Length – Data Length & PRM Output - Length Encoding And Header - ConditionRequests.

Video over IP (RTP):Audio Clip and Encoding Standards – Audio and Videotransmission and Reproduction - Jitter and Playback Delay – RTP – RTP Encapsulation –RTCP - RTCP Operation - IP Telephony and signaling – RSVP – COPS 9

UNIT VApplications: Internet Management (SNMP) – Level of management Protocol -Architectural Model - Protocol – The structure of Management information -Motherboard object Names – SNMP - Msg Format - Encode SNMP Msg - New FeaturesSNMPV3 Internet Security and Firewall Design (IP sec) – The Future of TCP / IP(IPV6). 9

TOTAL: 45 PERIODS

TEXT BOOK1. Douglas E.Comer, “Internetworking with TCP / IP – Principles, Protocols andArchitectures, Fourth Edition, Prentice – Hall of India, Delhi, 2002.

REFERENCES1. Uyless Black, ‘Computer Networks – Protocols, Standards and Interfaces”, SecondEdition, Prentice – Hall of India, Delhi, 2002.2. Udupa, “Network Management System essentials”, McGraw Hill, 1999.

CS17A7 SOFTWARE PROJECT MANAGEMENT L T P C3 0 0 3

Unit: IConventional Software Management: The Waterfall Model, Conventional SoftwareManagement Performance. Evolution of Software Economics: Software Economics,Pragmatic Software Cost Estimation. Improving Software Economics: ReducingSoftware Product Size, Improving Software Processes, Improving Team Effectiveness,Improving Automation through Software Environments, Achieving Required Quality,Peer Inspections- A Pragmatic View. The Old Way and the New: The Principles ofConventional Software Engineering, The Principles of Modern Software Management,and Transitioning to an Iterative Process. Life-Cycle Phases: Engineering and ProductionStages, Inception Phase, Elaboration Phase, Construction Phase, Transition Phase(Chapters 1 to 5) 9

Unit: IIArtifacts of the Process: The Artifact Sets, Management Artifacts, Engineering Artifacts,Pragmatic Artifacts. Model-Based Software Architectures: A Management Perspective, ATechnical Perspective. Workflows of the Process: Software Process Workflows, IterationWorkflows. Checkpoints of the Process: Major Milestones, Minor Milestones, PeriodicStatus Assessments. Iterative Process Planning: Work Breakdown Structures, PlanningGuidelines, The Cost and Schedule Estimating Process, The Iteration Planning Process,Pragmatic Planning. Project Organizations and Responsibilities: Line-of-BusinessOrganizations, Project Organizations, Evolution of Organizations. (Chapters 6 to 11) 9

Unit : IIIProcess Automation: Tools- Automation Building Blocks, The Project Environment.Project Control and Process Instrumentation: The Seven Core Metrics, ManagementIndicators, Quality Indicators, Life-Cycle Expectations, Pragmatic Software Metrics,Metrics Automation. Tailoring the Process: Process Discriminants, Example- Small-ScaleProject versus Large-Scale Project. Modern Project Profiles: Continuous Integration,Early Risk Resolution, Evolutionary Requirements, Teamwork among Stakeholders,Top10 Software Management Best Practices. Next-Generation Software Economics:Next-Generation Cost Models, Modern Software Economics. Modern ProcessTransitions: Culture Shifts, Denouement. (Chapters 12 to 17) 9

Unit : IVThe State of the Practice in Software Management, The COCOMO Cost EstimationModel:COCOMO, Ada COCOMO, COCOMO II. Change Metrics: Metrics Deviation,Pragmatic Change Metrics. Process Improvement and Mapping to the CMM: CMMOverview, Pragmatic Process Improvement, Maturity Questionnaire, Questions NotAsked by the Maturity Questionnaire, Overall Process Assessment. (Appendices A, B, C,E) 9

Unit : VCCPDS-R Case Study: Context for the Case Study, Common Subsystem Overview,Project. Organization, Common Subsystem, Product Overview, Process Overview,Demonstration-Based Assessment, Core Metrics, Other Metrics, People Factors,Conclusions. (Appendix D) 9

TOTAL: 45 PERIODSTEXT BOOK1. S.A. Kelkar, “Software Project Management – A Concise Study”, III Edition, PHILearning PV Ltd. 2013.2. Walker Royce, Software Project Management – A unified Framework, Addison-Wesley, 1998

REFERENCE BOOKS1. Mike Cotterell, Bob Hughes, ‘Software Project Management’. Inclination, ThomasComputer Press, 1995.

2. Darrel Ince, H. Sharp and M. Woodman, ‘Introduction to Software ProjectManagement and Quality Assurance’, Tata MacGraw Hill 1995.

CS17A8 CLIENT SERVER COMPUTING L T P C3 0 0 3

UNIT IBasic concepts of Client / Server – Upsizing Down sizing – Right sizing – Characteristics– File servers – Database servers – Transactions servers – Groupware servers – ObjectClient/Servers – Web Servers – Middleware.Client / Server building blocks – Operating System services – Base services – Externalservices – server scalability – Remote procedure calls – Multiservers. 9

UNIT IISQL Database servers – server architecture – Multithread architecture – Hybridarchitecture – stored Procedures – Triggers – Rules – Client / Server TransactionProcessing – Transaction models – Chained and nested transactions – Transactionprocessing monitors – Transaction Management Standards. 9

UNIT IIIDatabase Connectivity solutions : ODBC – The need for Database connectivity – Designoverview of ODBC – Architecture – components – Applications – Driver Managers –Drivers – Data sources – ODBC 2.5 and ODBC 3.0. 9

UNIT IVVisual C++: The Windows Programming Model – GDI – resource based programming –DLL and OLE Applications – Visual C++ components – frame work / MFC class Library– basic event handling – SDI – Appwizard – ClassWizard – Model and Models dialogues– other controls – Examples. 9UNIT VMultiple Document Interface – Data Management with Microsoft ODBC – OLE client –OLE server – Client / Server Data Exchange format – Dynamic Data Exchange. 9

TOTAL: 45 PERIODSTEXT BOOKS

1. Robert Orfali, Dan Harkey and Jerri Edwards, Essential Client / Server SurvialGuide, John Wiley and sons Inc. 2007.

2. Client/Server computing by Dewire, Tata MC Graw – Hill Education 2003.3. David J. Kruglinski, Inside Visual C++, Microsoft Press 1992.

REFERENCES1. Boar, B.H., Implementing Client / Server Computing ; A Strategic Perspectre,

McGraw Hill, 1993.

2. Bouce Elbert, Client / Server Computing, Artech. Press, 1994.3. Alex Berson, Client / Server Architecture, McGraw Hill, 1996.

CS17A9 ADVANCED COMPUTER NETWORKS L T P C3 0 0 3

UNIT I- INTRODUCTIONFoundation-Applications-Requirements-Perspectives-Scalable connectivity-Costeffective resource sharing-Network Architecture-Layering and protocols-Internetarchitecture-Perspectives on connecting-classes of Links-Encoding(NRZ,NRZI,Manchester,4B/5B)-Framing-Error detection-Reliable Transmission-Ethernet and multiple access networks-Wireless. 9

UNIT II- INTERNETWORKINGSwitching and Bridging-Datagrams-Virtual Circuit switching-Source Routing-Bridgesand LAN switches-Basic Internetworking-Service model-Global Addresses-DatagramForwarding in IP-Subnetting and Classical addressing-Address Translation(ARP)-HostConfiguration-Error Reporting-Virtual networks and tunnels-Routing-Implementationand Performance. 9

UNIT III- ADVANCED INTERNETWORKINGThe Global Internet-Routing areas-Inter domain routing-IP Version 6-Multicast-Multicastaddresses-Multicast Routing-Simple Demultiplexer(UDP)-Reliable Byte Stream(TCP)-Remote Procedure Call- RPC fundamentals-RPC Implementations-Transport for Realtime Applications-Requirements-RTP Design-Control protocol. 9

UNIT IV –CONGESTION CONTROLIssues in Resource allocation-Network model-Taxonomy-Evaluation criteria-QueuingDisciplines-FIFO-Fair Queuing-TCP congestion control-Additive Increase/MultiplicativeDecrease-Slow start-Fast retransmit and Fast Recovery-Congestion avoidancemechanisms-DECbit-Random Early Detection-Source based Congestion control-Qualityof service. 9

UNIT V –NETWORK SECURITY AND APPLICATIONSCryptographic Building blocks-Principles of ciphers-Symmetric key ciphers-public keyciphers-authenticators-Authentication protocols-Traditional Applications-MultimediaApplications-Infrastructure services-Name service-Network management-Overlaynetworks-Routing overlays-peer to peer networks-content distribution networks. 9

TOTAL: 45 PERIODSTEXT BOOK

1. Larry.L.Peterson , Bruce.S.Davie, “ Computer Networks-A SystemsApproach”,5th Edition, ELSEVIER, 2011.

2. William Stallings, “Data and Computer Communications”, 8th Edition, PearsonEducation, 2007.

REFERENCES1. William Stallings, ”Computer Networking with Internet Protocols and

Technology”, 4th Edition,2009, Pearson Education.2. Douglas.E.Comer, ”Computer Networks and Internets”, 2nd Edition, 2002,

Pearson Education.

CS17B1 DISTRIBUTED OPERATING SYSTEMS L T P C3 0 0 3

UNIT IFundamentals – evolution – System Models – Distributed operating System – Issues –Distributed Computing environment Message passing – Introduction – Features – Issues– Synchronization – Buffering – Message – Encoding – Decoding – Process addressing –Failure Handling. 9

UNIT IIRemote Procedure calls – Introduction – Model – Transparency – Implementation – StubGeneration – Messages – Marshaling Arguments and results –server Management –Parameter passing Semantics - Call Semantics – Communication Protocols –Complicated RPC’s – Client – Server Binding – Exception handling – SecurityDistributed shared Memory – Introduction – Architecture – Issues – Granularity Structure– Consistency Models – Replacement Strategy – Thrashing. 9

UNIT IIISynchronization – Introduction – Clock Synchronization – Event ordering – MutualExclusion – Deadlock – Handling Deadlocks in Distributed System - ElectionAlgorithms- A Ring Algorithm. 9

UNIT IVResource Management – Introduction – Features – Task Assignment approach – Load-Balancing Approach - Load -Sharing Approach Process Management – Introduction –Process Migration – Threads. 9

UNIT VDistributed File Systems – Introduction – Features – File Models – Accessing Models –Sharing Semantics – Caching Schemes – File Replication – Fault Tolerance – AtomicTransactions – Design Principles Naming – Introduction – Features – Terminologies –Concepts. 9

TOTAL: 45 PERIODSTEXT BOOK

1. Pradeep K. Sinha, “Distributed Operating Systems, Concepts and Design”Prentice Hall of India, New Delhi, 2001.

REFERENCES1. Andrew S. Tanenbaum “Distributed Operating Systems”, Pearson Education,

Delhi, 2002.

2. Mukesh Singhal and Nirajan G.Shivaratri “Advanced Concepts in OperatingSystems”, Tata McGraw Hill Publishing Company, New Delhi, 2001.

CS17B2 SOFTWARE RELIABILITY L T P C3 0 0 3

UNIT I INTRODUCTION TO SOFTWARE RELIABILITYSoftware Reliability Definitions - software disasters - Errors - faults - failures - differentviews of software reliability – software requirements specification - Causes ofunreliability in software - Dependable systems: reliable, safe, secure, maintainable, andavailable – Software maintenance. 9

UNIT II SOFTWARE RELIABILITY IMPROVEMENTThe phases of a Software Project - Monitoring the development process – The softwarelife cycle models - software engineering - Structured Analysis and structured Design –Fault tolerance - Inspection - Software cost and schedule. 9

UNIT III SOFTWARE QUALITY MANAGEMENTSoftware quality modeling - Diverse approaches and sources of information - Faultavoidance, removal and tolerance - Process maturity levels (CMM) - Software qualityassurance (SQA) - Monitoring the quality of software - Total quality management (TQA)- Measuring Software Reliability - The statistical approach - Software reliability metrics.

9

UNIT IV SOFTWARE RELIABILITY TECHNIQUES AND TOOLSData Trends - Complete prediction Systems - overview of some software reliabilitymodels - The recalibration of the models - Analysis of model accuracy - Reliabilitygrowth models and trend analysis - Software Costs Models - Super models. 9

UNIT V SOFTWARE RELIABILITY ENGINEERING PRACTICETesting and maintaining more reliable software –logical testing – functional testing –algorithm testing – regression testing - fault tree analysis – failure mode effects andcritical analysis – reusability - case studies. 9

TOTAL: 45 PERIODSTEXT BOOKS

1. J.D. Musa, A. Iannino and K.Okumoto, Software Reliability, Measurement,Prediction, Application, McGraw Hill, 2010.

2. J.D. Musa, Software Reliability Engineering, McGraw Hill, 1998.

REFERENCES1. Michael R. Lyer, Handbook of Software Reliability Engineering, McGraw Hill,

1995.2. Xie, M., Software Reliability Modelling, World Scientific, London, 1991.

CS17B3 ADVANCED COMPILER DESIGN L T P C

3 0 0 3UNIT IIntroduction to Compiling – Compilers – Analysis of the Source Program – The Phasesof a Compiler – Cousins of a Compiler – The grouping of Phases – CompilerConstruction Tools – Lexical Analysis – Role – Input Buffering – Specification ofTokens – Recognition – Finite Automata – Regular expression to an NFA. 9

UNIT IISyntax Analysis – Role – Context – Free Grammars – Parse Tree and Derivation -Writing a Grammar – Top down parsing – Bottom –up parsing – Shift Reduce Parsing -Operator precedence parsing. 9

UNIT IIIRun-Time environments – Source language issues – Storage organization – Storage –Allocation Strategies – Stack and Heap Allocation - Access to non local names –Parameter passing – Symbol Tables – Hash Tables. 9

UNIT IVIntermediate Code Generation – Intermediate Languages – Declaration – AssignmentStatements – Type Conversions – Boolean Expression – Case Statements – BackPatching - Procedure Calls. 9

UNIT VCode Generation – Issues – Run-Time Storage Management – Basic blocks and flowgraphs - Next – use information - A simple code generator – Register allocation andassignment. Code optimization – Introduction – The Principal Sources of Optimization –Optimization of basic blocks – Loops in Flow Graphs. 9

TOTAL: 45 PERIODSTEXT BOOK

1. A.V.Aho, R.Sethi, J.D.Ullman, “Compilers – Principles, Techniques and Tools”Pearson Education Delhi, 2008.

2. A.A Puntambekar, “Compiler Design”, Technical Publication Pune, 2009.3. Sandeep Saxena, RajKumar Singh Rathore, “Compiler Design”, S Chand and Co

Ltd, 2013.

REFERENCES1. Allen Holub.I, “Compiler Design in C” Prentice Hall of India, Delhi, 2002.2. D.M.Dhamdhere, “Systems Programming and Operating Systems”, Tata McGraw

Hill Company, Delhi, 2002.

CS17B4 ADVANCED COMPUTER GRAPHICS L T P C3 0 0 3

UNIT I 9Introduction to Computer Graphics – Definition – Uses –Elements of Pictures – GraphicsDisplay Devices – Graphics Input Primitives and Devices. Initial Steps in DrawingFigures – Making Pictures –OpenGL Basic Graphics Primitives – Line Drawings –Interaction with Mouse and Keyboard – Design and Use of Menus.

UNIT II 9Drawing Tools – World Windows and Viewports – Clipping Lines – Regular Polygons,Circles and Arcs – Parametric Form for a Curve. Vector Tools for Graphics –Introduction – Review of Vectors – The Dot Product – The Cross Product of TwoVectors – Representations of Key Geometric Objects – Coordinate Systems – AffineCombinations – Linear Interpolation – Bezier Curves – Representing Lines and Planes.

UNIT III 9Transformations of Objects – Introduction – Introduction to Transformations – 3D AffineTransformations – Changing Coordinate Systems – Affine Transformations Used in aProgram – Drawing 3D scenes interactively with OpenGL – Modeling Shapes withPolygonal Meshes – Introduction – Solid Modeling with Polygonal Meshes – Polyhedra –Extruded Shapes – Creating Prisms – Arrays of Extruded Prisms – Extrusions with aTwist – To Build Segmented Extrusions – Discretely Swept Surfaces of Revolution.

UNIT IV 9Three Dimensional Viewing – Introduction – Camera Properties – Specifying a Camerain a Program – Perspective Projections of 3D Objects – Producing Stereo Views –Taxonomy of Projections – Rendering Faces for Visual Realism – Introduction – ShadingModels – Flat Shading and Smooth Shading – Hidden Surface Removal – AddingTexture to Faces – Adding Shadows to Objects.

UNIT V 9Curve and Surface Design – Introduction – Describing Curves using Polynomials –Interactive Curve Design – Bezier Curves – Properties of Bezier Curves – Finding BetterBlending Functions – The B-Spline Basis Functions – Useful Properties of B-SplineCurves for Design. Color theory – Introduction – Color Description – The CIE Standard– Color Spaces – Indexed Color and the LUT – Color Quantization.

TOTAL: 45 PERIODSTEXT BOOK

1. F.S.Hill, Stephen M.Kelley,”Computer Graphics using OpenGL”, Third edition,PHI Learning Pvt Ltd,2011.

REFERENCES1. Donald Hearn,M.Pauline Baker, ”Computer Graphics C Version”, Second

Edition, Pearson Education,2009.2. James D.Foley, Andries Van Dam, Steven K.Feiner, F.Hughes John, ”Computer

Graphics Principles and Practice in C”, Second Edition, Pearson,2011.

CS17B5 ENTERPRISE RESOURCE PLANNING L T P C3 0 0 3

UNIT – I 9Enterprise – An overview ERP Introduction-Basic concepts- Risks of ERP-Benefits -ERPand related technologies- Business Process Reengineering - Conceptual Model of ERP,The Evolution of ERP, The Structure of ERP.

UNIT – II 9Data ware Housing - Data Mining - Online Analytical Processing(OLAP) - Product LifeCycle Management(PLM) –OLAP- Supply chain Management-Customer relationshipmanagement-Advanced Technology and ERP security.

UNIT – III 9ERP Implementation strategies- ERP Implementation Life Cycle methodologies -

vendors and Consultants-contracts with Vendors, consultants and Employees – Projectmanagement and monitoring.

UNIT – IV 9Business modules of ERP package – Finance – Manufacturing – Human Resources –Plant maintenance – Materials management – Quality management – Marketing – SalesDistribution and service.

UNIT – V 9ERP Marketplace and Marketplace Dynamics – SAP – ORACLE corporation – Turbocharge the ERP system – Enterprise Application Integration – ERP and E-Business –ERP, internet and WWW – Total Quality management – Future Direction and trends inERP.

TOTAL: 45 PERIODS

TEXT BOOKS1. Alexis Leon, “ERP Demystified”, second edition,Tata McGraw Hill publishing

company Ltd., 2008.2. Rahul V. Altekar “Enterprise Resource Planning”, Tata McGraw Hill, 2004

REFERENCE BOOKS1. Vinod Kumar Garg and Venkitakrishnan N K, “Enterprise Resource Planning –

Concepts and Practice”, PHI 2002.2. Joseph A Brady, Ellen F Monk, Bret Wagner, “Concepts in Enterprise Resource

Planning”, Thompson Course Technology.3. Mary Summer, “Enterprise Resource Planning”- Pearson Education.

CS17B6 OPEN SOURCE SYSTEMS L T P C3 0 0 3

UNIT IOverview of Free/Open Source Software-- Definition of FOSS & GNU, History ofGNU/Linux and the Free Software Movement , Advantages of Free Software andGNU/Linux, FOSS usage, trends and potential—global and Indian.GNU/Linux OSinstallation-- detect hardware, configure disk partitions & file systems and install aGNU/Linux distribution ; Basic shell commands - logging in, listing files, editing files,copying/moving files, viewing file contents, changing file modes and permissions,process management ; User and group management, file ownerships and permissions,PAM authentication ; Introduction to common system configuration files & log files ;Configuring networking, basics of TCP/IP networking and routing, connecting to theInternet (through dialup, DSL, Ethernet, leased line). 9

UNIT IIConfiguring additional hardware - sound cards, displays & display cards, network cards,modems, USB drives, CD writers ; Understanding the OS boot up process; Performingeveryday tasks using gnu/Linux -- accessing the Internet, playing music, editingdocuments and spreadsheets, sending and receiving email, copy files from disks and overthe network, playing games, writing CDs ; X Window system configuration and utilities -- configure X windows, detect display devices ; Installing software -- from source code aswell as using binary packages. Setting up email servers-- using postfix ( SMTP services),courier (IMAP & POP3 services), squirrel mail ( web mail services) ; Setting up webservers -- using apache ( HTTP services), php (server-side scripting), perl ( CGI support); Setting up file services -- using samba ( file and authentication services for windowsnetworks), using NFS ( file services for gnu/Linux / Unix networks) ; Setting up proxyservices -- using squid ( http / ftp / https proxy services) ; Setting up printer services -using CUPS (print spooler), foomatic (printer database) 9

UNIT IIISetting up a firewall - Using netfilter and ip tables; Using the GNU Compiler Collection–GNU compiler tools; the C preprocessor (cpp), the C compiler (gcc) and the C++compiler (g++), assembler (gas) ; Understanding build systems -- constructingmake files and using make, using autoconf and autogen to automatically generate makefiles tailored for different development environments ; Using source code versioning andmanagement tools -- using CVS to manage source code revisions, patch & diff. 9

UNIT IVUnderstanding the GNU Libc libraries and linker -- linking against object archives (.alibraries)and dynamic shared object libraries (.so libraries), generating statically linkedbinaries and libraries, generating dynamically linked libraries ; Using the GNUdebugging tools -- gdb to debug programs, graphical debuggers like ddd, memorydebugging / profiling libraries mpatrol andvalgrind ; Review of common programmingpractices and guidelines for GNU/Linux and FOSS ; Introduction to Bash, sed&awkscripting. Basics of the X Windows server architecture. 9

UNIT VBasics of the X Windows server architecture ;Qt Programming ; Gtk+ Programming ;Python Programming ; Programming GUI applications with localization support. 9

TOTAL: 45 PERIODSREFERENCES:

1. N. B. Venkateshwarlu (Ed); Introduction to Linux: Installation and Programming,B S Publishers; 2005.

2. Matt Welsh, Matthias KalleDalheimer, Terry Dawson, and Lar Kaufman,Running Linux, Fourth Edition, O'Reilly Publishers, 2002.

3. Carla Schroder, Linux Cookbook, First Edition, O'Reilly Cookbooks Series, 2004On-line material.

4. Open Sources: Voices from the Open Source Revolution, First Edition, January1999, ISBN: 1-56592-582-3. URL: http://www.oreilly.com/catalog /opensources/book /toc .html

5. The Linux Cookbook: Tips and Techniques for Everyday Use, First Edition,Michael Stutz, 2001. URL: http://dsl.org/cookbook/cookbook_toc.html

6. The Linux System Administrators' Guide, Lars Wirzenius, Joanna Oja, StephenStafford, and Alex Weeks, December 2003. URL:http://www.tldp.org/guides.html

7. Using GCC, Richard Stallman et al. URL: http://www.gnu.org/doc/using.html8. An Introduction to GCC, Brian Gough. URL: http://www.networktheory.

co.uk/docs/gccintro9. GNU Autoconf, Automake and Libtool, Gary V. Vaughan, Ben Elliston, Tom

Tromey and Ian Lance Taylor. URL: http://sources.redhat.com/autobook/10. Open Source Development with CVS, Third Edition, Karl Fogel and Moshe Bar.

URL: http://cvsbook.red-bean.com/