Anda di halaman 1dari 2

Desh Bhagat University, Mandi Gobindgarh

(Established Under Punjab Govt. Desh Bhagat University Act,2012)

Syllabus for M.Phil / Ph.D Course work Recent Trends in Computer Science & Computer Science Engineering Section A
Data warehousing Concepts: Architecture, Data flows, Tools & Technologies, Data Marts, Data streams. Introduction to Data mining and techniques, Web Mining: Web content Mining, Web structure Mining, Web usage Mining, Text Mining. Temporal and Spatial Data Mining: Basic concepts of temporal data Mining, The GSP algorithm, SPADE, SPIRIT, WUM.

Section B
Classical security Techniques and Computer Network Security Concepts. Confidentiality and Security, Security Policy and Operations Life Cycle, Security Syst em Development and Operations The Attack Process. Attacker Types. Vulnerability Types. Attack Results. Attack Taxonomy. Threats to Security: Physical security, Biometric systems, monitoring controls, and Data security and intrusion and detection systems. Conventional techniques, Modern techniques, DES, DES chaining, Triple DES, RSA algorithm, Key management. Message Authentication and Hash Algorithm, Authentication requirements and functions secure Hash Algorithm, Message digest algorithm, digital sign atures. AES Algorithms.

Section C
Cloud Computing History of Cloud Computing Cloud Architecture Cloud Storage Why Cloud Computing Matters Advantages of Cloud Computing Disadvantages of Cloud Computing Companies in the Cloud Today Cloud Services Web-Based Application Pros and Cons of Cloud Service Development Types of Cloud Service Development Software as a Service Platform as a Service Web Services OnDemand Computing Discovering Cloud Services Development Services and Too ls Amazon Ec2 Google App Engine IBM Clouds

Section D
Introduction Issues in Ad-Hoc Wireless Networks. MAC Protocols Issues, Classifications of MAC protocols, Multi channel MAC & Power control MAC protocol. Issues Classifications of routing protocols Hierarchical and Power aware. Multicast routing Classifications, Tree based, Mesh based. Ad Hoc Transport Layer Issues. TCP Over Ad Hoc Feedback based, TCP with explicit link, TCP -BuS, Ad Hoc TCP, and Split TCP. Introduction Sensor Network Architecture, Data dissemination, Gathering. MAC Protocols self-organizing, Hybrid TDMA/FDMA and CSMA based MAC Books: 1. 2. 3. 4. 5. 6. Data Warehousing Concepts, Techniques, products, application; Prabhu; PHI. Data Mining Techniques; A. K. Pujari; Universities Press. Data Warehousing, Data Mining and OLAP; Alex Berson and Stephen J Smith; TMH. Data Warehousing in the real world; Anahory; Pearson Education. Data Mining Introductory & Advanced Topic; Dunham; Pearson Education. Sean Convery, Network Security Archit ectures, Published by Cisco Press, First Ed. 2004 7. William Stalling Cryptography and Network Security Fourth Ed., Prentice Hall, 2006 8. Michael Miller, Cloud Computing: Web -Based Applications That Change the Way You Work and Collaborate Online, Que Publishi ng, August 2008. 9. Haley Beard, Cloud Computing Best Practices for Managing and Measuring Processes for On-demand Computing, Applications and Data Centers in the Cloud with SLAs, Emereo Pty Limited, July 2008. 10. C.Siva Ram Murthy and B.Smanoj, Ad Hoc Wireless Networks Architectures and Protocols, Pearson Education, 2004. 11. Feng Zhao and Leonidas Guibas, Wireless Sensor Networks, Morgan Kaufman Publishers, 2004. 12. C.K.Toh, Ad Hoc Mobile Wireless Networks, Pearson Education, 2002. 13. 4. Thomas Kra g and Sebastin Buettrich, Wireless Mesh Networking, OReilly Publishers, 2007.