Anda di halaman 1dari 48

SCHOOL OF ENGINEERING & TECHNOLOGY

SRI PADMAVATI MAHILA VISVAVIDYALAYAM


(Women’s University)
TIRUPATI – 517 502, ANDHRA PRADESH

M.TECH (CSE) DEGREE SYLLABUS BOOK


Effective from 2016-17 under CBCS

EAMCET CODE: SPMUSF

PGECET / GATE CODE: SPME1

Website: www.spmvv.ac.in
Mail.ID: director.spmusf@gmail.com

Phone.No: 0877-2284571, 9848907111


SCHOOL OF ENGINEERING AND TECHNOLOGY
SCHOOL OF ENGINEERING AND TECHNOLOGY
COMPUTER SCIENCE AND ENGINEERING I YEAR- I SEMESTER
SCHEME OF INSTRUCTION AND EVALUATION OF 2 YEARS M.TECH DEGREE
(CBCS 2016)

Credits
Course No. Course Title Instruction Evaluation Total
hours Marks
per week
Internal External
Examination Examination
Max Duration Max
Duration
L P Marks Hrs Mark
Hrs
s
MCST01 Advanced Data Structures 4 - 4 2 30 3 70 100
MCST02 Advanced Computer Architecture 4 - 4 2 30 3 70 100
Experimental Methods in Computer
MCST03 4 - 4 2 30 3 70 100
Science
MCST04 Advanced Computer Networks 4 - 4 2 30 3 70 100
E-I Elective-I(from Group-A) 4 - 4 2 30 3 70 100
E-II Elective –II(from Group-B) 4 - 4 2 30 3 70 100
PRACTICALS
Advanced Data Structures and Experimental
MCSP01 - 2 1 2 40 3 60 100
Methods in Computer Science Laboratory
MCSP02 Advanced Computer Networks Laboratory - 2 1 2 40 3 60 100
MCSS01 Seminar cum Comprehensive Viva - 2 1 2 40 3 60 100
TOTAL 24 6 27 900
SCHOOL OF ENGINEERING AND TECHNOLOGY

COMPUTER SCIENCE AND ENGINEERING I YEAR- I SEMESTER


SCHEME OF INSTRUCTION AND EVALUATION OF 2 YEARS M.TECH DEGREE
(CBCS 2016)

LIST OF ELECTIVES

Group-A Group-B

Course Code Course Title Course Code Course Title


MCST05 Software Project Management MCST09 Natural Language Processing
MCST06 Enterprise Resource Planning MECT25 Digital Image Processing
MCST07 Information retrieval system MCST10 Mobile Application Development
MCST08 Cyber Physical Systems MECT26 Embedded Systems
SCHOOL OF ENGINEERING AND TECHNOLOGY
COMPUTER SCIENCE AND ENGINEERING I YEAR- II SEMESTER
SCHEME OF INSTRUCTION AND EVALUATION OF 2 YEARS M.TECH DEGREE
(CBCS 2016)

Instruction Evaluation
hours
Internal External

Credits
Course No. per week Total
Course Title Examination Examination Marks
Max Duratio Max
Duration
L P Marks n Hrs Mark
Hrs
s
MCST11 Advanced Operating Systems 4 - 4 2 30 3 70 100
Advanced Database
MCST12 4 - 4 2 30 3 70 100
Management System
Cryptography and Network
MCST13 4 - 4 2 30 3 70 100
Security
MCST14 Cloud Computing 4 - 4 2 30 3 70 100
E-III Elective-III (from Group-C) 4 - 4 2 30 3 70 100
E-IV Elective –IV (from Group-D) 4 - 4 2 30 3 70 100
PRACTICALS
Advanced Operating Systems
MCSP03 and Cryptography and - 2 1 2 40 3 60 100
Network Security Laboratory
Advanced Database
MCSP04 Management Systems - 2 1 2 40 3 60 100
Laboratory
Seminar cum Comprehensive
MCSS02 - 2 1 2 40 3 60 100
Viva
TOTAL 24 6 27 900

COMPUTER SCIENCE AND ENGINEERING I YEAR- II SEMESTER


SCHOOL OF ENGINEERING AND TECHNOLOGY
SCHEME OF INSTRUCTION AND EVALUATION OF 2 YEARS M.TECH DEGREE
(CBCS 2016)

LIST OF ELECTIVES

Group-C Group-D

Course Code Course Title Course Code Course Title

MCST15 Mobile Computing MCST19 Internet of Things


MCST16 Cloud Based Gaming MCST20 Software Architecture
MCST17 Big Data Analytics MCST21 Advanced Web Technologies
MCST18 Cyber Security MCST22 Software Testing
SCHOOL OF ENGINEERING AND TECHNOLOGY

COMPUTER SCIENCE AND ENGINEERING II YEAR


III & IV SEMESTERS
SCHEME OF INSTRUCTION AND EVALUATION OF 2 YEARS M.TECH DEGREE
(CBCS 2016)

Instruction Evaluation

Practical

Credits
Theory
Internal Assessment University
S.N Course Name of the Course Examination
o Number Internal Assessment External VIVA Total
Guide Internal Dissertation Marks
Review
Committee
1. MCSJ01 Project Work - - 16 20 20 30 30 100
Total - - 16 20 20 30 30 100
SCHOOL OF ENGINEERING AND TECHNOLOGY

COMPUTER SCIENCE AND ENGINEERING


SCHEME OF INSTRUCTION AND EVALUATION OF 2 YEARS M.TECH DEGREE
(CBCS 2016)
LIST OF COURSES OFFERED

COURSE
S.NO COURSE TITLE CREDITS PREPREQUISITES
CODE
1 Advanced Computer CST08: Computer
MCST02 4
Architecture Organization
2 Experimental Methods in BST08: Probability and
MCST03 4
Computer Science Statistics
3 Advanced Computer
CST06: Data
MCST04 4 Communication, CST16:
Networks Computer Networks
4 Software Project CST13: Software
MCST05 4
Engineering
Management
5 CST13: Software
MCST06 Enterprise Resource Engineering,
4
Planning BST11: Industrial
Management Science
6 MCST07 Information retrieval CST05: DataBase
4
system Management Systesms
7 CST06: Data
MCST08 Cyber Physical Systems 4 Communication, CST16:
Computer Networks
8 Advanced Operating
MCST11 4 CST09: Operating Systems
Systems
9 Advanced Database CST05: DataBase
MCST12 4
Management System Management Systesms
10 Cryptography and
CST06: Data
MCST13 4 Communication, CST16:
Network Security Computer Networks
11 MCST14 Cloud Computing 4
12 CST06: Data
MCST15 Mobile Computing 4 Communication, CST16:
Computer Networks
13 MCST16 CST20: Artificial
Cloud Based Gaming 4
Intelligence
14 CST05: DataBase
MCST17 Management Systems
Big Data Analytics 4
CST14: Data Mining

15 CST06: Data
MCST18 Cyber Security 4 Communication, CST16:
Computer Networks
SCHOOL OF ENGINEERING AND TECHNOLOGY

COURSE
S.NO COURSE TITLE CREDITS PREPREQUISITES
CODE
Advanced Data Structures CST02:Data Structures
CST01:Problem Solving
and Experimental Methods
16 MCSP01 1 and Computer Programming
in Computer Science MMET10:Operations
Laboratory Research
CST16:Computer Networks
CST04:Java Programming
Advanced Computer
17 MCSP02 1 CST01:Problem Solving
Networks Laboratory and Computer Programming

CST09:Operating Systems
Advanced Operating CST04:Java Programming
Systems and Cryptography CST01:Problem Solving
18 MCSP03 1
and Network Security and Computer Programming
Laboratory

Advanced Database
CST05: Database
19 MCSP04 Management Systems 1
Management System
Laboratory
SCHOOL OF ENGINEERING AND TECHNOLOGY

M.TECH I YEAR I SEMESTER SYLLABUS

MCST01: ADVANCED DATA STRUCTURES

Internal Marks: 30
Credits: 4 University Marks:70
__________________________________________________________________________________

UNIT I
Trees: Binary tree -ADT, Traversals, Copying, Testing; Thread binary trees, Heaps, Binary
Search tree-insertion & Deletion of nodes, Joining and Splitting; Selection trees, Forests,
Representation of disjoint sets, Counting Binary Trees.
Graphs: Introduction, Minimum cost spanning Trees-Kruskal’s Prism’s .SoVin’s algorithm:
Shortest Paths and Transitive Closure. Activity Networks.

UNIT II
External Sorting: k-way Merge ,Buffer Handlingfor parallel Operation ,Run
Generation,Optimal Merging of Runs Hashing: Static Hashing –Hash Tables, Hash
Functions.Over flow Handling Dynamic Hashing : Dynamic Hashing using Directories
,Directoryless Dynamic Hashing Bloom Filters – Differential Files ,Bloom Filter Design.

UNIT III
Priority Queues: Single -and Double-Ended Priority Queues, Leftist Trees- height-
Baised,weight-Baised: Binomial Heaps - definition, insertion, Melding, Deletion; Fibonacci
Heaps -Definition, Deletion, Decrease key, Cascading cut, Analysis, Pairing Heaps -
Definition, Meld & insert, Decrease key,Deletion . Symmetric Min-Max Heaps-
Definition,Representation,Insertion,Deletion,IntervalHeaps:Definition,Insertion,Deletion

UNIT IV
Efficient Binary Search Trees: Optimal Binary Search Trees, AVL Trees, Red Black Trees-
Definition, Representation, Searching, Insertion, Deletion, Joining, Splitting; Splay Trees-
Bottom: Up, Top- Down. Multiway Search Trees: Search Trees: m- way Search Trees -
Definition, Properties, Searching; B-Trees- Definition, Properties, Insertion, Deletion; B+
Trees -Definition, Searching, Insertion, Deletion.

UNIT-V
Digital Search Structures: Digital Search Trees. Binary tries and patricia .Multiway Tries-
Definition,Representation ,searching,Insertion,Deletion. keys with different Length, Height
of Trie,Prefix Search and applications .Compressed Tries.Suffix Trees :
Representation,searching,Tries and Internet Packet Forwarding –IP Routing ,1-Bit
Tries,Fixed Stride Tries, Variable –Stride Tries.

Text Book:
1. Horowitz E, Sahni S, Mehta D, 'Fundamentals of Data structures in C++", 2nd edition
University Press, 2008.
2.S.Sahni ,”Data Structures,Algorithms and Applications in c++”,Second Edition Orient
Longman PvtLtd.
Reference Books:
1.Thomas H. Coreman Charles E, L.eiserson, Ronald L. Rivest and Clifford Stein,
"Introduction to Algorithms n, PHI, 3rd Edition, 2010.
SCHOOL OF ENGINEERING AND TECHNOLOGY

MCST02: ADVANCED COMPUTER ARCHITECTURE

Internal Marks: 30
Credits: 4 University Marks:70
__________________________________________________________________________________

UNIT-I

FUNDAMENTALS OF QUANTITATIVE DESIGN AND ANALYSIS, MEMORY


HIERARCHY DESIGN
Fundamentals of Quantitative Design and Analysis: Introduction, Classes of computers,
Defining Computer Architecture, Trends in technology, Trends in power and energy in ICs,
Trends in cost, Dependability, Quantitative Principles of Computer Design.
Memory Hierarchy Design: Introduction, Advanced optimizations of cache performance,
Memory technology and optimizations

UNIT-II

PARALLEL COMPUTER MODELS AND NETWORKS PROPERTIES


Parallel Computer Models: The state of computing, Multiprocessors and multi-computers,
Multi vector and SIMD computers.

Program and Networks Properties: Conditions of Parallelism, Program partitioning and


scheduling, Program flow mechanisms, System interconnect architectures.

Examples: Detection of Parallelism in a program using Bernstein’s conditions.

UNIT-III

PRINCIPLES OF SCALABLE PERFORMANCE AND MEMORY

Principles of Scalable Performance: Performance metrics and measures, Parallel


Processing applications, Speedup performance laws.
Bus, Cache and Shared memory: Bus systems, Cache memory organizations, Shared
memory organizations.

UNIT-IV

PIPELINING, MULTIPROCESSORS AND MULTICOMPUTERS


Pipelining: Linear pipeline processors, nonlinear pipeline processors, Instruction pipeline
design, Arithmetic pipeline design.
Multiprocessors and Multi-computers: Multiprocessor system interconnects, Cache
Coherence and synchronization mechanisms.

UNIT-V

MULTIVECTOR AND SIMD COMPUTERS, MULTICORE COMPUTERS


Multi-Vector and SIMD computers: Vector processing principles, Multi-vector
multiprocessors, SIMD computer organizations, The Evolution of Dataflow computers
SCHOOL OF ENGINEERING AND TECHNOLOGY

Computer Architecture of Warehouse–Scale Computers

Multi-Core computers: Multi-core organization. Example Architectures: Intel x86 Multi


core Organization
TEXT BOOKS:

1. Kai Hwang and Naresh Jotwani, “Advanced Computer Architecture,” Second Edition,
New Delhi, McGraw Hill, 2011.
2. John L. Hennessy and David A. Patterson, “Computer Architecture-A Quantitative
Approach,” Fifth Edition, Elsevier, 2012

REFERENCE BOOKS:

1. William Stallings, “Computer Organization and Architecture-Designing for


performance,” Ninth Edition, Pearson Education, 2014.
2. Kai Hwang “Advanced Computer Architecture,” First Edition, New Delhi, Tata McGraw
Hill, 2001.
SCHOOL OF ENGINEERING AND TECHNOLOGY

MCST03: EXPERIMENTAL METHODS IN COMPUTER SCIENCE

Internal Marks: 30
Credits: 4 University Marks:70
__________________________________________________________________________________

UNIT-I

Review of Basic Probability distributions: Commonly used distribution, examples; Review of


statistical methods; Review of Optimization techniques; Queueing models: introduction to
queueing theory, analysis of single queue, queueing networks.
UNIT-II
Simulation: Types of simulations, modelling complex systems & simulation examples,
discrete, continuous and combined simulation; Random number generation: properties of a
good generator, methods, testing random–number generators; Random variate generation:
Inverse transformation, rejection, composition, convolution and characterization .
UNIT-III
Analysis of simulation data: Input modelling: identifying and testing the distribution for
goodness-of-fit; Verification and Validation of simulation models: building model,
verification, calibration and validation; Output analysis for a single model: Terminating and
steady–state simulations; Comparison and evaluation of alternative system designs: Two
systems design, several systems designs, meta modelling and optimization via simulation.
UNIT-IV
Variance reduction techniques: Common random numbers, Antithetic variates, control
variants, indirect estimation and conditioning; Simulation software: classification, general-
purpose, Special-purpose simulation languages and packages; Applications: Simulation of
computer systems, computer networks, and manufacturing systems.
UNIT-V
Stochastic process, Markov chains, Markov models, Constructing and solving Markov
processes and Hidden Markov Models; Design of experiments: full and fractional factorial
designs, 2K factorial designs, 2K-P fractional factorial designs, One-factor and two –factor
experiments.
Reference Books:
1. Rao S S Engineering Optimization: Theory and practice, 3 rd enlarged edition new age
international Publishers, 2013
2. Banks J Carson J S Nelson B L and Nicol D M, Discrete – event Systems simulation,
5th edition, Pearson Education, 2014.
3. Law A M, Kelton W D, Simulation Modelling and analysis, 4 th edition, edition, Tata
McGraw-Hill, 2008.
4. Raj Jain, The Art of Computer System Performance Analysis: Techniques for
experimental Design, Measurement, Simulation and modelling, 4 th edition, Wiley
Professional Computing, 2014.
SCHOOL OF ENGINEERING AND TECHNOLOGY

MCST04: ADVANCED COMPUTER NETWORKS

Internal Marks: 30
Credits : 4 University Marks:70
__________________________________________________________________________________

UNIT I

Review of Computer Networks and the Internet: What is the Internet, The Network edge,
The Network core, Access Networks and Physical media, ISPs and Internet Backbones,
Delay and Loss in Packet-Switched Networks, History of Computer Networking and the
Internet - Foundation of Networking Protocols: 5-layer TCP/IP Model, 7-Layer OSI Model,
Internet Protocols and Addressing, Equal-Sized Packets Model: ATM

UNIT II

Networking Devices: Multiplexers, Modems and Internet Access Devices, Switching and
Routing Devices, Router Structure. The Link Layer and Local Area Networks: Link Layer:
Introduction and Services, Error-Detection and Error-Correction techniques, Multiple
Access Protocols, Link Layer Addressing, Ethernet, Interconnections: Hubs and Switches,
PPP: The Point-to-Point Protocol, Link Virtualization

UNIT III

Routing and Internetworking: Network–Layer Routing, Least-Cost-Path algorithms, Non-


Least-Cost-Path algorithms, Intradomain Routing Protocols, Interdomain Routing Protocols,
Congestion Control at Network Layer. Logical Addressing: IPv4

Addresses, IPv6 Addresses - Internet Protocol: Internetworking, IPv4, IPv6, Transition from
IPv4 to IPv6 – Multicasting Techniques and Protocols: Basic Definitions and Techniques,
Intradomain Multicast Protocols, Interdomain Multicast Protocols, Node- Level Multicast
algorithms

UNIT IV

Transport and End-to-End Protocols: Transport Layer, Transmission Control Protocol.


(TCP), User Datagram Protocol (UDP), Mobile Transport Protocols, TCP Congestion Control
Application Layer: Principles of Network Applications, The Web and HTTP, File Transfer:
FTP, Electronic Mail in the Internet, Domain Name System (DNS), P2P File Sharing, Socket
Programming with TCP and UDP, Building a Simple Web Server

UNIT V

Wireless Networks and Mobile IP: Infrastructure of Wireless Networks, Wireless LAN
Technologies, IEEE 802.11 Wireless Standard, Cellular Networks, Mobile IP, Wireless Mesh
Networks (WMNs).
SCHOOL OF ENGINEERING AND TECHNOLOGY

TEXT BOOKS:1. Computer Networking: A Top-Down Approach Featuring the Internet,


James F.Kurose, Keith W.Ross, Third Edition, Pearson Education, 2007
2. Computer and Communication Networks, Nader F. Mir, Pearson Education, 2007
REFERENCES:
1. Data Communications and Networking, Behrouz A. Forouzan, Fourth Edition,
Tata McGraw Hill, 2007
2. Guide to Networking Essentials, Greg Tomsho,Ed Tittel, David Johnson,Fifth
Edition, Thomson.
3. An Engineering Approach to Computer Networking , S.Keshav, Pearson
Education.
4. Campus Network Design Fundamentals, Diane Teare, Catherine Paquet, Pearson
Education (CISCO Press)
5. Computer Networks, Andrew S. Tanenbaum, Fourth Edition, Prentice Hall.
6. The Internet and Its Protocols,A.Farrel,Elsevier.
SCHOOL OF ENGINEERING AND TECHNOLOGY

MCST05: SOFTWARE PROJECT MANAGEMENT


Internal Marks: 30
Credits: 4 University Marks:70
________________________________________________________________________________

UNIT I
Project Management Concepts: The Management Spectrum – People, The Product, The
Process, The Project; The W5HH principle, Critical practices
Process and Project Metrics: Introduction, Software measurement, Software Quality
Metrics, Integrating Metrics within the software process, Metrics for small organization.

UNIT II
Estimation for software Projects : Introduction, Project planning process, software scope
and feasibility, Resources, Software project estimation, Decomposition techniques, Empirical
estimation models, Estimation for object-oriented projects, Specialized estimation techniques,
The make/buy decision.

UNIT III
Project Scheduling: Basic concepts, Principles, Defining a task set for software project,
Defining a task network, Scheduling, Earned value analysis.
Risk Management: Reactive versus Proactive risk strategies, Software Risks, Risk
Identification, Risk Projection, Risk Refinement, Risk Mitigation, Monitoring and
Management, RMMM Plan.

UNIT VI
Maintainance and Reengineering: Software Maintainance, Software Supportability,
Reengineering, Business Process Reengineering, Software Reengineering, Reverse
Engineering, Restructuring, Forward Engineering, Economics of Reengineering.

UNIT V
Emerging Trends in Software Engineering: Technology Evolution, Software Engineering
Trends, Identifying Soft Trends, Technology Directions, Tools-related Trends.

Text Books:
1. Pressman R S, Software Engineering – A Practitioner’s Approach, 7 th edition McGraw Hill,
2010, (Quality Management - Chapters 24 to 32 ).

Reference Books:
1. Jacobson I, Christerson M, Jonsson P, Object Oriented Software Engineering: A Use Case
Driven Approach, Pearson, 1992.
2. Hughes B, Cotterell M, Mall R, Software Project Management, 5 th edition, Tata McGraw
Hill, 2011.
SCHOOL OF ENGINEERING AND TECHNOLOGY

3. Royce W, Software Project Management, Pearson, 1998.


MCST06: ENTERPRISE RESOURCE PLANNING
Internal Marks: 30
Credits: 4 University Marks:70
________________________________________________________________________________

UNIT I

RESOURCE PLANNING AND TECHNOLOGY


Introduction – Related Technologies – Business Intelligence – Ecommerce and EBusiness
– Business Process ,Reengineering – Data Warehousing – Data Mining – OLAP – Product
life Cycle management – SCM – CRM

UNIT II
ERP IMPLEMENTATION

Implementation Challenges – Strategies – Life Cycle – Pre implementation, Tasks –


Requirements Definition – Methodologies – Package selection – Project Teams – Process
Definitions – Vendors and Consultants – Data Migration – Project management – Post
Implementation Activities.

UNIT III
ERP IN ACTION & BUSINESS MODULES
Operation and Maintenance – Performance – Maximizing the ERP System – Business
Modules – Finance – Manufacturing –Human Resources – Plant maintenance – Materials
Management – Quality management – Marketing – Sales, Distribution and service.

UNIT IV
ERP MARKET
Marketplace – Dynamics – SAP AG – Oracle – PeopleSoft – JD Edwards – QAD Inc – SSA
Global – Lawson Software – Epicor – Intutive.

UNIT V
Enterprise Application Integration – ERP and EBusiness – ERP II – Total quality
management – Future Directions – Trends in ERP.

TEXT BOOKS:
1. Alexis Leon, “ERP DEMYSTIFIED”, Tata McGraw Hill, Second Edition, 2008.
2. Mary Sumner, “Enterprise Resource Planning”, Pearson Education, 2007.
REFERENCES:
1. Jim Mazzullo,”SAP R/3 for Everyone”, Pearson,2007.
2. Jose Antonio Fernandz, “ The SAP R /3 Handbook”, Tata McGraw Hill, 1998.
3. Biao Fu, “SAP BW: A StepbyStep
Guide”, First Edition, Pearson Education, 200UNIT III
SCHOOL OF ENGINEERING AND TECHNOLOGY

MCST07:INFORMATION RETRIEVAL SYSTEMS

Internal Marks: 30
Credits: 4 University Marks:70
________________________________________________________________________________

UNIT I
Introduction: Definition, Objectives, Functional Overview, Relationship to DBMS,
Digital libraries and Data Warehouses, Information Retrieval System Capabilities - Search,
Browse, Miscellaneous.

UNIT II
Cataloging and Indexing: Objectives, Indexing Process, Automatic Indexing, Information
Extraction, Data Structures: Introduction, Stemming Algorithms, Inverted file structures, N-
gram data structure, PAT data structure, Signature file structure, Hypertext data structure –

UNIT III
Automatic Indexing: Classes of automatic indexing, Statistical indexing, Natural language,
Concept indexing, Hypertext linkages
Document and Term Clustering: Introduction, Thesaurus generation, Item clustering,
Hierarchy of clusters

UNIT IV
User Search Techniques: Search statements and binding, Similarity measures and ranking,
Relevance feedback, Selective dissemination of information search, Weighted searches of
Boolean systems, Searching the Internet and hypertext,
Information Visualization: Introduction, Cognition and perception, Information
visualization technologies.

UNIT V
Text Search Algorithms: Introduction, Software text search algorithms, Hardware text
search systems. Information System Evaluation: Introduction, Measures used in system
evaluation, Measurement example – TREC results.

TEXT BOOKS:
1. Information Storage and Retrieval Systems: Theory and Implementation By
Kowalski, Gerald, Mark T Maybury Kluwer Academic Press, 2000.
2. Modern Information Retrival By Ricardo Baeza-Yates, Pearson Education, 2007.
3. Information Retrieval: Algorithms and Heuristics By David A Grossman and Ophir
Frieder, 2ndEdition, Springer International Edition, 2004.
REFERENCES :
1. Information Retrieval Data Structures and Algorithms By William B Frakes, Ricardo
Baeza-Yates, Pearson Education, 1992.
2. Information Storage & Retieval By Robert Korfhage – John Wiley & Sons.
3. Introduction to Information Retrieval By Christopher D. Manning and Prabhakar
Raghavan, Cambridge University Press, 2008.
SCHOOL OF ENGINEERING AND TECHNOLOGY

MCST08: CYBER PHYSICAL SYSTEMS

Internal Marks: 30
Credits : 4 University Marks:70
_______________________________________________________________________________

UNIT-I
Cyber Physical Systems (CPSs): Introduction, Background, Introduction to wireless cps’s,
Research trends, cps in the real world, CPS Architecture: Prototype architecture, Open data
service architecture, design for cps, Multilayer wireless networking, Heterogeneous cps
network architecture, Architecture for heterogeneous mobile computing, Barwan. Cyber
Physical system Introduction, Network control for cyber physical systems, Network latency
in cyber physical system, Design challenges in cyber physical system.

UNIT-II
Interconnection Issues in CPS :introduction, multicast problems in adhoc networks,
Introduction to coverage in wireless sensors, issues in IEEE 802.11,
Cyber Physical Internet: Introduction, fundamental limitations and important research
challenges protocol stack Architecture, cps interconnection protocol, transport protocol
services.
NETWORK QOS IN CPS: Introduction, possibilities and challenges in internet QOS

UNIT-III
CPS Security: Introduction, Security , Challenges,
Security Issues of CPS: Introduction, Securing cps, Attacks and its consequences,
Security problems in control systems, Control systems against malicious attacks.
Interoperability and Communication Issues in CPS: Heterogeneity, Synchronization
methods, Network, Heterogeneous Networking Issues: Introduction, An architectural
framework for heterogeneous networking network , Model survivable overlay networks
and services, Network reconstitution through heterogeneous replication service model.

UNIT-IV
Heterogeneous Mobile Computing Issues: Introduction, Overlay networking, Reliable
data transmission. Scalable Architecture for Heterogeneous Environment, Cluster-Based
Proxies, Generalized Proxies. Network Services: Introduction, Service discovery, Remote-
control Interface, Security issues.
UNIT-V
Cyber Physical Control Systems
Introduction, Adaptive and predictive methods, control system architectures, RCS
methodology Objectives, Cyber Physical Systems Management Introduction, Background,
Reliability, Tools and Techniques.

Text Books:
1. Challenges, Opportunities, and Dimensions of Cyber-Physical Systems by P. Venkata
Krishna , V. Saritha and H. P. Sultana in Novemeber 2014.

Reference Books:
1. Cyber-Physical Systems: From Theory to Practice by Danda B. Rawat, Joel J.P.C.
Rodrigues, Ivan Stojmenovic.
2. Guide to computing fundamentals in cyber-physical systems by Deitmar P.F.Mollar.
SCHOOL OF ENGINEERING AND TECHNOLOGY

MCST09: NATURAL LANGUAGE PROCESSING

Internal Marks: 30
Credits: 4 University Marks: 70
___________________________________________________________________________

UNIT I

INTRODUCTION: Natural Language Processing - Linguistic Background- Spoken


language input and output Technologies - Written language Input - Mathematical
Methods - Statistical Modeling and Classification Finite State methods Grammar for
Natural Language Processing -Parsing - Semantic and Logic Form - Ambiguity
Resolution - Semantic Interpretation.

UNIT II

INFORMATION RETRIEVAL: Information Retrieval architecture - Indexing-


Storage -Compression Techniques - Retrieval Approaches - Evaluation - Search engines-
commercial search engine features- comparison- performance measures - Document
Processing - NLP based Information Retrieval - Information Extraction.

UNIT III
PHONETICS:
Speech Sounds and Phonetic Transcription, Articulatory Phonetics: The Vocal Organs,
Consonants: Place of Articulation, Consonants: Manner of Articulation, Vowels,
Syllables, Phonological Categories and Pronunciation Variation: Phonetic Features,
Predicting Phonetic Variation, Factors Influencing Phonetic Variation.

UNIT IV

GENERIC ISSUES : Multilinguality - Multilingual Information Retrieval and Speech


processing - Multimodality - Text and Images - Modality Integration - Transmission and
Storage - Speech coding- Evaluation of systems - Human Factors and user Acceptability.

UNIT V

APPLICATIONS : Machine Translation - Transfer Metaphor - lnterlingua and Statistical


Approaches - Discourse Processing - Dialog and Conversational Agents - Natural
Language Generation - Surface Realization and Discourse Planning.
SCHOOL OF ENGINEERING AND TECHNOLOGY

TEXT BOOKS
1. Daniel Jurafsky and James H. martin, " Speech and Language Processing" , 2000.
2. Ron Cole, J.Mariani, et.al "Survey of the State of the Art in Human Language
Technology", Cambridge University Press, 1997.
3. Michael W. Berry " Survey of Text Mining: Culstering, Classification and Retrieval",
Springer Verlag, 2003.

REFERENCES
1.James Allen " Natural Language Understanding ", Benjamin/ Cummings Publishing Co.
1995.
2.Gerald J. Kowalski and Mark.T. Maybury, "Information Storage and Retrieval
systems'', Kluwer academic Publishers, 2000.
3.Tomek Strzalkowski " Natural Language Information Retrieval ", Kluwer academic
Publishers, iManning and Hinrich Schutze, "Foundations of Statistical Natural
Language Processing ", MIT Press, 1999.
SCHOOL OF ENGINEERING AND TECHNOLOGY

MECT25: DIGITAL IMAGE PROCESSING

Internal Marks: 30
Credits: 4 University Marks:70
_________________________________________________________________________________

UNIT – I
Digital Image Fundamentals: Digital Image representation, Digital image
processing systems, Visual perception, sampling and quantization, Basic
relationships between pixels and imaging geometry.

UNIT – II
Image Transforms: Discrete Fourier Transform, Properities of 2 – D Fourier
transform, Fast Fourier transform, Walsh, Hadmard, and Discrete cosine
transform.

UNIT – III
Image Enhancement: Background enhancement by point processing
Histogram processing, Spatial filtering, Enhancement in frequency domain,
Image smoothing, Image sharpering, Colour image.

UNIT – IV
Image Restoration: Degradation model, Algebraic approach to restoration,
Inverse filtering, Least mean, Square filters, constrained least square restoration.

UNIT – V
Image Coding: Fidelity criteria, Encoding process, Error free coding, Image
coding relative to fidelity criterion, Image compression and decompression
techniques.

Text Books :
1. Digital Image Processing by R.G. Gonzales and R.E. Woods, Addison
Wesley 1985.
2. Fundamental of Digital Image Process, A.K. Jain, Prentice Hall, India,
New Delhi 1983.
SCHOOL OF ENGINEERING AND TECHNOLOGY

MCST10: MOBILE APPLICATION DEVELOPMENT

Internal Marks: 30
Credits: 4 University Marks:70
________________________________________________________________________________

UNIT-1

Introduction–Reasons to Build a Mobile App, Cost of development, importance of mobile


strategies in the business world, Reasons for Mobile apps development difficulty, Mobile
development today, Mobile myths, Third party frame works.
Diving into Mobile app or Mobile website-Mobile web presence, Mobile applications,
marketing, your app as a mobile app.
Creating Consumable Web Services For Mobile Devices: Introduction to Web services,
Web services languages, Creating an Example Web service, Debugging Web services.

UNIT-II
Mobile User Interface Design-Effective use of Screen Real Estate, Understanding Mobile
Application Users, Understanding Mobile Information Design, Understanding Mobile
Platforms, Using the tools of Mobile Interface Design.
Mobile Websites-Choosing a Mobile Web option, Adaptive Mobile websites, Dedicated
Mobile websites, Mobile Web Apps with HTML5.

UNIT-III
Introduction to Android Programming: What is Android, Obtaining the required Tools,
Activities, Linking Activities Using Intents, Fragments, Calling Built–in Applications using
Intents, Displaying Notifications
AndroidUserInterface:UnderstandingtheComponentsofaScreen,AdaptingtoDisplayOrientat
ion, Managing Changes to Screen Orientation, Utilizing the Action Bar,
ListeningforUINotifications.

UNIT-IV
Designing User Interface with Views: Basic Views, Picker Views, Using List Views to
Display Long Lists.
Displaying Pictures and Menus With Views: Image Views to display Pictures, Menus with
views.
Data Persistence: Saving and loading User Preferences, Persisting data to files, Creating and
using Databases

UNIT-V
Messaging: SMS Messaging, Sending Email
Location-Based Services: Displaying Maps, Getting Location data, Monitoring a location
Publishing Android Applications: Preparing for Publishing, Deploying APK files, Case
studies on Mobile Application Development.

Text Books:
1.”Professional Mobile Application Development” Authors: Jeff McWherter, Scott Gowell,
Published by John Wiley & Sons Inc.
2.”Begining Android 4 Application Development” Wei-Menf Lee Published by
JohnWiley&Sons.
SCHOOL OF ENGINEERING AND TECHNOLOGY

MECT26: EMBEDDED SYSTEMS

Internal Marks: 30
Credits : 4 University Marks:70
________________________________________________________________________________

UNIT – I

Introduction: Embedded systems overview, Design challenge, Processor technology, IC


technology, Design technology. RT-Level combinational logic, Sequential logic (RT-Level),
Custom single purpose processor design (RT-Level), Optimizing custom single purpose
processors.

UNIT – II

General Purpose Processors: Basic architecture, Development environment, Application


specific system depth, Set processors (ASIPs).

UNIT – III

DSP Architecture: Special architectural need for pipelining and parallelism, Need for more
functional units and buses, Harvard architecture, SIMD processors, Architectural features of a
specific processor ADSP 21065/TMS 32025.

UNIT – IV

State Machine and Concurrent Process Models: Introduction, Models Vs languages, Finite
State Machine with Data path model (FSMD), Using State Machines, Program State Machine
(PSM),Concurrent Process Model, Concurrent Processes, Communication among processors,
Synchronization among processes, Implementation, Data flow model, Real-Time Systems.

UNIT – V

Introduction Automation: The parallel evolution of complication and synthesis, Logic, RT,
Behavioral synthesis, System synthesis and hardware/software code sign, Verification of
hardware/software co-simulation, Reuse of intellectual property codes.

Text Books:
1. Embedded Systems Design – A unified Hardware/Software introduction by Frank
Vahid, Tony D. Givargis, John Wiley & Sons. Inc. 2002.
2. Analog Devices/Texas Intruments – DSP User manuals/Application Notes (Unit – III)
3. Introduction to embedded systems – by Raj Kamal, TMH, 2002.
4. Embedded Systems – by Raj Kamal, McGraw-Hill.
SCHOOL OF ENGINEERING AND TECHNOLOGY

MCSP01: ADVANCED DATA STRUCTURES AND EXPERIMENTAL METHODS IN


COMPUTER SCIENCE LAB

Internal Marks: 40
Credits: 1 University Marks: 60
__________________________________________________________________________________

LIST OF EXPERIMENTS

1. Write a program in Java to implement Priority Queues


2. Write a program in Java to implement Binary trees
3. Write a program in Java to implement Linear probing
4. Write a program in Java to implement Double hashing
5. Write a program in Java to implement Separate chaining
6. Write a program in Java to implement Heaps
7. Write a program in Java to implement Depth first search
8. Write a program in Java to implement Breadth first search
9. Write a program in Java to implement Minimum spanning tree
10.Write a program in Java to implement Minimum spanning
tree(Krushkal’s Algorithm)
11.Write a program in Java to implement Dijkstra’s algorithm
Note: Experimental Methods in Computer Science C or Java. C(“Turbo c”)
or java(“netbeans”)
1. Design and simulate Linear congruential method
2. Design and simulate Combined congruential method
3. Design and simulate Kolmogrov-smirnov test
4. Design and simulate Chi-square test
5. Design and simulate Auto-correlation test
6. Design and simulate Inverse transformation techniqueDirect
transformation technique
7. Design and simulate Simulation of a turnstile
8. Design and simulate Acceptance rejection technique
9. Design and simulate Simulation of a telephone system
10. Simulation of a banking system
SCHOOL OF ENGINEERING AND TECHNOLOGY

MCSP02: ADVANCED COMPUTER NETWORKS LAB

Internal Marks: 40
Credits: 1 University Marks: 60
________________________________________________________________________________

LIST OF EXPERIMENTS

1. Study of network devices in detail.


2. Study of network IP.
3. Connect the computers in Local Area Network.
4. Network socket programming.
5. ATM Networks .
6. Wireless Networks.
7. BGP Configuration.
8. Discovering IPv6 using Wireshark.
9. Setting Up Ad Hoc Wireless Network in Windows XP.
10.Study of Multi Protocol Label Switching (MPLS).
11.Configure a network topology using packet tracer software.
SCHOOL OF ENGINEERING AND TECHNOLOGY

M.TECH I YEAR II SEMESTER

MCST11: ADVANCED OPERATING SYSTEMS

Internal Marks: 30
Credits : 4 University Marks:70
________________________________________________________________________________

UNIT I
Introduction :
Processors, Memory, Disks, Tapes, I/O Devices,Buses,The Shell, System Call, Operating
System , Structure,Processes,Therads,InterProcess Communication, Scheduling, Classic IPC
Problems.

UNIT II
Memory Management:
Virtual Memory, Page Replacement algorithms, Design Issues for Paging Systems,
Segmentation,Deadlocks: Resources ,OSTRICH Algorithm, Deadlock Detection and
Recovery, Deadlock Avoidance and Prevention.

UNIT III
Introduction to Distributed Systems: Goals, Hardware and Software concepts, Design
Issues. Communication in Distributed Systems: Layered Protocols, ATM Networks, the
Client-Server Model, Remote Procedure Call, Group Communication.

UNIT IV
Synchronization in Distributed Systems:
Clock Synchronization, Mutual Exclusion, Election Algorithm, Atomic Transaction,
Deadlock in Distributed Systems. Processes and Processors in Distributed Systems:
Threads, System Models, Processor Allocation, Scheduling in Distributed Systems, Fault
Tolerance, Real-Time Distributed Systems.

UNIT V
HISTORY OF UNIX AND LINUX, Overview of Linux, Processes in Linux, Memory
management in LINUX, Input/ Output in Linux, the Linux file system, Security in Linux,
ANDROID
TEXT Books:
1. Modern operating systems by Andrew S, Herbert BOS 4th Edition person edition.

Reference Book:
1.Sinha P, Distributed Operating Systems PHI Learning, 2009.
2.Garg S, Fundamentals of Distributed Operating System, S K Kataria &Sons,2010.
3.Chow R, Johnson T, Distributed Operating Systems and Algorithm Analysis, Pearson
Education 2009.
4.Open Source Foundation, Introduction To OSF DCE, Prentice Hall,1992
SCHOOL OF ENGINEERING AND TECHNOLOGY

MCST12: ADVANCED DATABASE MANAGEMENT SYSTEMS

Internal Marks: 30
Credits: 4 University Marks:70
________________________________________________________________________________

UNIT I

OVERVIEW
PL/SQL – Introduction to PL/SQL – Declare, begin statements, Variables, Control Structure,
PL/SQL Transactions – Save Point, Cursor, PL/SQL Database Objects – Procedures,
Functions, Packages, Triggers. Programmatic SQL – Embedded SQL, Dynamic SQL, and
ODBC Standard.

OBJECT AND OBJECT RELATIONAL DATABASES: Concepts for Object Databases:


Object Identity – Object structure – Type Constructors – Encapsulation of Operations –
Methods – Persistence – Type and Class Hierarchies – Inheritance – Complex Objects –
Object Database Standards, Languages and Design: ODMG Model – ODL – OQL – Object
Relational and Extended – Relational Systems: Object Relational features in SQL/Oracle –
Case Studies.

UNIT II

Physical Database Design and Tuning: Guidelines and Examples of Index Selection,
Clustering and Indexing, Tools to Assist in Index Selection, Overview of Database Tuning,
Choices in Tuning the Conceptual Schema, Choices in Tuning Queries and Views, Impact of
Concurrency, DBMS Benchmarking.
Security and Authorization: Access Control, Discretionary Access Control, Mandatory
Access Control, Security for Internet Applications - Encryption, Certifying Servers: The SSL
Protocol, Digital Signatures; Additional Issues Related to Security - Role of the Database
Administrator, Security in Statistical Databases.

UNIT III

Overview of Storage and Indexing: Data on External Storage, File Organization and
Indexing – Clustered Indexes, Primary and Secondary Indexes, Index data Structures – Hash
Based Indexing, Tree based Indexing Storing data: Disks and Files: -The Memory Hierarchy
– Redundant Arrays of Independent Disks. Tree Structured Indexing: Intuitions for tree
Indexes, Indexed Sequential Access Methods (ISAM) B+ Trees: A Dynamic Index Structure,
Search, Insert, and Delete. Hash Based Indexing: Static Hashing, Extendable hashing, Linear
Hashing, Extendable vs. Liner Hashing.

UNIT IV

Distributed Databases: Introduction to distributed databases, Distributed DBMS


architectures, Storing data in a distributed DBMS, Distributed catalog management,
Distributed query processing Updating distributed data, Distributed transactions, Distributed
concurrency control, Distributed recovery.
SCHOOL OF ENGINEERING AND TECHNOLOGY

OLAP and Data Mining :On-line Analytical Processing – OLAP Benchmarks, applications,
benefits,tools, categories, extensions to SQL, Data mining – introduction, techniques,
predictive modeling, tools. Data mining algorithms – Apriori, Decision tree, k-means,
Bayesian classifier.
UNIT V

Object-Database Systems: New Data Types, Structured Data Types, Operations on


Structured Data, Encapsulation and ADTs, Inheritance, Objects, OIDs, and Reference Types,
Database Design for an ORDBMS, ORDBMS Implementation Challenges, OODBMS,
Comparing RDBMS, OODBMS, and ORDBMS.

Database Security
Security and Integrity threats, Defence mechanisms, Statistical database auditing & control.
Security issue based on granting/revoking of privileges, Introduction to statistical database
security, PL/SQL Security – Locks – Implicit locking, types and levels of locks, explicit
locking, Oracles’ named Exception Handlers.

TEXT BOOKS:
1. Data base Management Systems, Raghu Ramakrishnan, Johannes Gehrke, TMH, 3rd
Edition, 2003.
2. Data base System Concepts, A.Silberschatz, H.F. Korth, S.Sudarshan, McGraw hill, VI
edition, 2006.
3. Fundamentals of Database Systems 5th edition. Ramez Elmasri, Shamkant B.Navathe,
Pearson Education, 2008.

REFERENCE BOOKS:
1. Introduction to Database Systems, C.J.Date,Pearson Education.
2. Database Management System Oracle SQL and PL/SQL, P.K.Das Gupta, PHI.
3. Database System Concepts, Peter Rob & Carlos Coronel, Cengage Learning, 2008.
4. Database Systems, A Practical approach to Design Implementation and Management
Fourth
edition, Thomas Connolly, Carolyn Begg, Pearson education.
5.Database-Principles, Programming, andPerformance, P.O’Neil&E.O’Neil, 2nd ed.,
ELSEVIER
6. Fundamentals of Relational Database Management Systems, S.Sumathi, S.Esakkirajan,
Springer.
7. Introduction to Database Management, M.L.Gillenson and others, Wiley Student Edition.
8. Database Development and Management, Lee Chao, Auerbach publications, Taylor &
Francis
Group.
9. Distributed Databases Principles & Systems, Stefano Ceri, Giuseppe Pelagatti, TMH.
10. Principles of Distributed Database Systems, M. Tamer Ozsu, Patrick Valduriez , Pearson
Education, 2nd Edition.
11. Distributed Database Systems, Chhanda Ray, Pearson.
12. Distributed Database Management Systems, S.K.Rahimi and F.S.Haug, Wile
SCHOOL OF ENGINEERING AND TECHNOLOGY

MCST13: CRYPTOGRAPHY AND NETWORK SECURITY

Internal Marks: 30
Credits : 4 University Marks:70
________________________________________________________________________________

UNIT I

Introduction, Mathematics of Cryptography,Traditional Symmetric-Key Ciphers,


Mathematics of Symmetric-Key Cryptography.
UNIT II

Introduction to Modern Symmetric–key Ciphers, Data Encryption Standard(DES), Advanced


Encryption Standard(AES),Encipherment Using Modern Symmetric-Key Ciphers.
UNIT III

Mathematics of Asymmetric key Cryptography, Asymmetric-key Cryptography,Message


Integrity and Message Authentication.
UNIT IV

Cryptographic Hash Functions, Digital Signature, Entity Authentication, Key Management.

UNIT V

Security at the Application Layer: PGP and S/MIME, Security at the Transport Layer: SSL
and TLS, Security at the Network Layer: IPSec, System Security.

Text Book:
Forouzan B A,Mukhopadhyay D,Cryptography and Network Security,2 nd edition,Tata
McGraw-Hill,2010.

Reference Books:
1.Stallings W,Cryptography and Network Security,5th edition,Pearson Eduction,2011.
2. Stinson D R, Cryptography Theory and Practice ,3rd edition, Chapman &Hall/CRC,2005.
3.Paar C, Pelzl J, Understanding Cryptography, Springer, 2010.
4.Kizza J M, Guide to Computer Network Security,2nd edition,Springer,2013.
SCHOOL OF ENGINEERING AND TECHNOLOGY

MCST14: CLOUD COMPUTING

Internal Marks: 30
Credits: 4 University Marks:70
________________________________________________________________________________

UNIT I

NEW COMPUTING PARADIGMS & SERVICES:Distributed computing, Grid


computing, Utility computing, , Cloud computing and its history and evolution
INTRODUCTION TO CLOUD COMPUTING:
Cloud Computing Architectural Framework, Cloud Deployment Models, private, public and
hybrid , Challenges in adapting a cloud in the context of i) Security issues ii) Bandwidth and
iii) Integration issues, Virtualization in Cloud Computing, Parallelization in Cloud
Computing, Security for Cloud Computing, Cloud Economics

UNIT II

CLOUD SERVICE MODELS: Software as a Service (SaaS), Infrastructure as a Service


(IaaS), Platform as a Service (PaaS), NIST Cloud Reference architectureWeb Services- On-
Demand Computing- Discovering Cloud Services Development Services and Tools, compute
and storage cloud services case studies

UNIT III

VIRTUALIZATION & SECURTIY:Virtual machine technology, virtualization applications


in enterprises, Pitfalls of virtualization Cloud computing security architecture: Architectural
Considerations- General Issues, Trusted Cloud computing, Secure Execution Environments
and Communications, Microarchitectures; Identity Management and Access control-Identity
management, Access control, Autonomic Security Cloud computing security challenges:
Virtualization security management- virtual threats, VM Security Recommendations, VM-
Specific Security techniques, Secure Execution Environments and Communications in cloud.

UNIT IV

USING CLOUD SERVICES:Collaborating on Calendars, Schedules and Task Management


- Exploring Online Scheduling Applications - Exploring Online Planning and Task
Management - Collaborating on Event Management - Collaborating on Contact Management
- Collaborating on Project Management - Collaborating on Word Processing - Collaborating
on Databases - Storing and Sharing Files

UNIT V

CLOUD COLLABORATION:Collaborating via Web-Based Communication Tools- Evaluating


Web Mail Services- Evaluating Web Conference Tools- Collaborating via Social Networks and
Groupware- Collaborating via Blogs and Wikis – Cloud simulation tools.
SCHOOL OF ENGINEERING AND TECHNOLOGY

Reference Books:
1. RajkumarBuyya, James Broberg, Andrzej M. Goscinski, Cloud Computing
Principles and Paradigms, Wiley, 2010
2. Michael Miller, Cloud Computing: Web-Based Applications That Change the Way
You Work and Collaborate Online, Que Publishing, 2009.
3. Ronald Krutz and Russell Dean Vines, Cloud Security: A Comprehensive Guide to
Secure Cloud Computing, Wiley Publishing, 2010.
4. Toby Velte, Anthony Velte, Robert Elsenpeter, Cloud Computing, A Practical
Approach, McGraw Hill, 2010.
5. Judith Hurwitz, Robin Bloor, Marcia Kaufman, Fern Helper, Cloud Computing For
Dummies, Wiley Publishing, 2010.
6. P. V. Krishna et al., “Principles of Grid Computing: Concepts & Applications” ANE
Books, 2010
7.Nick Antonopoulos, Lee Gillam, Cloud Computing: P
SCHOOL OF ENGINEERING AND TECHNOLOGY

MCST15 : MOBILE COMPUTING

Internal Marks: 30
Credits: 4 University Marks:70
_________________________________________________________________________________

UNIT – I

Introduction to Mobile Communications and Computing: Mobile Computing (MC) :


Introduction to MC, novel applications, limitations, and architecture. GSM: Mobile services,
System architecture, Radio interface, Protocols, Localization and calling, Handover, Security,
and New data services.
(Wireless) Medium Access Control: Motivation for a specialized MAC (Hidden and
exposed terminals, Near and far terminals), SDMA, FDMA, TDMA, CDMA.

UNIT – II

Mobile Network Layer: Mobile IP (Goals, assumptions, entities and terminology, IP packet
delivery, agent advertisement and discovery, registration, tunneling and encapsulation,
optimizations), Dynamic Host Configuration Protocol (DHCP).
Mobile Transport Layer : Traditional TCP, Indirect TCP, Snooping TCP, Mobile TCP, Fast
retransmit/fast recovery, Transmission /time-out freezing, Selective retransmission,
Transaction oriented TCP.

UNIT – III

Database Issues: Hoarding techniques, caching invalidation mechanisms, client server


computing with adaptation, power-aware and context-aware computing, transactional models,
query processing, recovery, and quality of service issues.

UNIT-IV

Data Dissemination: Communications asymmetry, classification of new data delivery


mechanisms, push based mechanisms, pull-based mechanisms, hybrid mechanisms, selective
tuning (indexing) techniques.
Mobile Ad hoc Networks (MANETs): Overview, Properties of a MANET, spectrum of
MANET applications, routing and various routing algorithms, security in MANETs.

UNIT – V

Protocols and Tools : Wireless Application Protocol-WAP. (Introduction, protocol


architecture, and treatment of protocols of all layers), Bluetooth (User scenarios, physical
layer, MAC layer, networking, security, link management) and J2ME.

TEXT BOOKS :
1. Jochen Schiller,“Mobile Communications”,Addison-Wesley. (Chapters 4,7,9,10,11),second
edition, 2004.
SCHOOL OF ENGINEERING AND TECHNOLOGY

2. Stojmenovic and Cacute, “Handbook of Wireless Networks and Mobile Computing”,


Wiley, 2002, ISBN 0471419028. (Chapters 11, 15, 17, 26 and 27).

REFERENCES :
1. Reza Behravanfar, “Mobile Computing Principles: Designing and Developing Mobile
Applications with UML and XML”, ISBN: 0521817331, Cambridge University Press,
October 2004,
2. Adelstein, Frank, Gupta, Sandeep KS, Richard III, Golden , Schwiebert, Loren,
“Fundamentals of Mobile and Pervasive Computing”, ISBN: 0071412379, McGraw-Hill
Professional, 2005.
3. Hansmann, Merk, Nicklous, Stober, “Principles of Mobile Computing”, Springer, second
edition, 2003.
4. Martyn Mallick, “Mobile and Wireless Design Essentials”, Wil
SCHOOL OF ENGINEERING AND TECHNOLOGY

MCST16: CLOUD BASED GAMING


Internal Marks: 30
Credits : 4 University Marks:70
________________________________________________________________________________

UNIT I

3D GRAPHICS FOR GAME PROGRAMMING


Coordinate Systems, Ray Tracing, Modeling in Game Production, Vertex
Processing,Rasterization, Fragment Processing and Output Merging, Illumination and
Shaders, Parametric Curves and Surfaces, Shader Models, Image Texturing, Bump Mapping,
Advanced Texturing,Character Animation, Physics-based Simulation

UNIT II
GAME DESIGN PRINCIPLES
Character development, Story Telling, Narration, Game Balancing, Core mechanics,
Principles of level design, Genres of Games, Collision Detection, Game Logic, Game AI,
Path Finding

UNIT III
GAMING ENGINE DESIGN
Renderers, Software Rendering, Hardware Rendering, and Controller based animation,
Spatial Sorting, Level of detail, collision detection, standard objects, and physics

UNIT IV

GAMING PLATFORMS AND FRAMEWORKS


Flash, DirectX, OpenGL, Java, Python, XNA with Visual Studio, Mobile Gaming for the
Android, iOS, Game engines - Adventure Game Studio, DXStudio, Unity

UNIT V
GAME DEVELOPMENT
Developing 2D and 3D interactive games using OpenGL, DirectX – Isometric and Tile Based
Games, Puzzle games, Single Player games, Multi Player games.

TEXT BOOKS:

1. David H. Eberly, “3D Game Engine Design, Second Edition: A Practical Approach to
Real-Time Computer Graphics” Morgan Kaufmann, 2 Edition, 2006.
2. JungHyun Han, “3D Graphics for Game Programming”, Chapman and Hall/CRC, 1 st
edition, 2011.
3. Mike McShaffrfy, “Game Coding Complete”, Third Edition, Charles River Media, 2009.
SCHOOL OF ENGINEERING AND TECHNOLOGY

4. Jonathan S. Harbour, “Beginning Game Programming”, Course Technology PTR, 3


edition, 2009.

REFERENCES:
1. Ernest Adams and Andrew Rollings, “Fundamentals of Game Design”, Prentice Hall 1 st
edition, 2006.
2. Roger E. Pedersen, “Game Design Foundations”, Edition 2, Jones & Bartlett Learning,
2009.
3. Scott Rogers, “Level Up!: The Guide to Great Video Game Design”, Wiley, 1st edition,
2010.
4. Jason Gregory, “Game Engine Architecture”, A K Peters, 2009.
5. Jeannie Novak, “Game Development Essentials”, 3rd Edition, Delmar Cengage
Learning, 2011.
6. Andy Harris, “Beginning Flash Game Programming For Dummies”, For
Dummies; Updated edition, 2005.
7. John Hattan, “Beginning Game Programming: A GameDev.net Collection”, Course
Technology PTR, 1 edition, 2009.
8. Eric Lengyel, “Mathematics for 3D Game Programming and Computer Graphics”, Third
Edition, Course Technology PTR, 3rd edition, 2011.
9. Dino Dini, “Essential 3D Game Programming”, Morgan Kaufmann, 1st edition 2012.
10. Jim Thompson, Barnaby Berbank-Green, and Nic Cusworth, “Game Design:
Principles,Practice, and Techniques - The Ultimate Guide for the Aspiring Game Designer”,
1st edition, Wiley, 2007.
SCHOOL OF ENGINEERING AND TECHNOLOGY

MCST17: BIG DATA ANALYTICS

Internal Marks: 30
Credits: 4 University Marks: 70
_________________________________________________________________________________

UNIT I
Big Data in the Enterprise: Sentiment analysis, Exploratory analytics, Operational analytics,
Opportunities from big data, Taming the big data.
The New Information Management Paradigm: Enterprise information system, New approach
to management of big data, Implications of big data to enterprise IT.

UNIT II
Big Data Implementations for Industry: Big data analytics for telecom, Big data analytics for
banking.
Emerging Database Landscape: Database evolution, Scale-out architecture, Database
workloads, Database technologies for managing the workloads, Columnar databases,
Requirements for next generation data warehouses, Polyglot Persistence-The next generation
database architecture.

UNIT III
Application Architecture for Big Data and Analytics: Big data warehouse and analytics, Big
data ware house requirements, Hybrid architectures, Enterprise data platform ecosystem-
BDW and EDW,
Introduction to Hadoop - Technical components, merits and demerits, Hadoop suitability test,
Additional considerations for Big Data Warehouse, Big data and Master Data Management,
Data quality implications for big data, A conceptual BDW architecture.
Data Modeling- Map-Reduce Patterns, Algorithms and Use Cases: Basic map-reduce
patterns, Distributed task execution, Advance map-reduce patterns.

UNIT-4
Data modeling: No sql data modeling techniques-types of no sql stores, choice of database
systems JSON column family databases, operations on column family databases,
understanding Cassandra data model , designing Cassandra data structures, schema
migration approach using FTL big data analytics methodology, analysis and evaluation
business use case, development of business hypotheses,.

UNIT-5
Extracting value from big data: In-memory computing technology, real time analytics, CAP
theorem use of in-memory, data grid, map-reduce and real-time processing, real-time analysis
machine generated data, building a recommendation system.
Data scientist: definition, big data flow, design principles for contextualizing big data, nature
of work of a data scientist

Text books:
SCHOOL OF ENGINEERING AND TECHNOLOGY

MohanthyS, Jagadeesh M, Srivatsa H, Big data imperatives: Enterprise big data warehouse, BI
implementations and analytics, a press/springer(india)2013.

Reference books:
Berman JJ, principles of Big Data: preparing, sharing &analyzing complex information Morgon
Kaufmann,2013.
MCST18: CYBER SECURITY

Internal Marks: 30
Credits : 4 University Marks:70
_________________________________________________________________________________

UNIT- I
SECURITY FUNDAMENTALS:
Network and Security Concepts, Basic Cryptography, Symmetric Encryption , Information
Assurance Fundamentals, Microsoft Windows Security Principles, Public Key Encryption,
The Domain Name System (DNS), Firewalls, Virtualization, Radio-Frequency Identification,
Microsoft Windows Security Principles.

UNIT- II

Attacker Techniques and Motivations:How hackers cover their tracks


(antiforensics),TunnelingTechniques:HTTP,DNS,ICMP,Intermediaries, Steganography, and
Other Concepts , Detection and Prevention Fraud Technique: Phishing, Smishing, Vishing,
and Mobile Malicious Code , Rogue Antivirus, Click Fraud , Threat Infrastructure.
UNIT-III
Exploitation: Techniques to Gain a Foothold: Shellcode, Integer Overflow
Vulnerabilities, Stack-Based Buffer Overflows , Format String Vulnerabilities , SQL
Injection, Malicious PDF files, Race condition, web exploit tools, DOS conditions,
Brute Force and Dictionary Attacks Misdirection, Reconnaissance, and Disruption
Methods.
UNIT-IV
Malicious Code:Self-replicating malicious code: worms, viruses, Evading detection
and elevating privileges, stealing information and exploitation, form grabbing,man-in-
the-middle attacks, DLL injection, Browser helper objects, security implications.
UNIT-V
Defense and Analysis Techniques: Memory forensic, Honeypots, Malicious code
naming, Automated malicious code analysis systems,Intrusion detection systems.
Textbooks:
1.James Graham, Richard Howard, Ryan Olson, CRC press “Cyber Security
Essentials” 2011.http://www.auerbach-publications.com
Reference books: Behrouz A.Forouzan, DebdeepMukhopadhyay “Cryptography and
Network Security 2nd
SCHOOL OF ENGINEERING AND TECHNOLOGY

MCST19: INTERNET OF THINGS

Internal Marks: 30
Credits: 4 University Marks: 70
_________________________________________________________________________________

UNIT I
Introduction to Internet of Things –Definition and Characteristics of IoT,
Physical Design of IoT – IoT Protocols, IoT communication models, Iot Communication
APIs IoT enabaled Technologies – Wireless Sensor Networks, Cloud Computing, Big data
analytics,Communication protocols, Embedded Systems, IoT Levels and Templates Domain
Specific IoTs – Home, City, Environment, Energy, Retail, Logistics, Agriculture, Industry,
health and Lifestyle.

UNIT II
IoT and M2M – Software defined networks, network function virtualization, difference
between SDN and NFV for IoT, Basics of IoT System Management with NETCOZF, YANG-
NETCONF, YANG, SNMP NETOPEER.

UNIT III
Introduction to Python - Language features of Python, Data types, data structures, Control of
flow, functions,modules, packaging, file handling, data/time operations, classes, Exception
handling,Python packages - JSON, XML, HTTPLib, URLLib, SMTPLib.

UNIT IV
IoT Physical Devices and Endpoints - Introduction to Raspberry PI-Interfaces (serial, SPI,
I2C)
Programming – Python program with Raspberry PI with focus of interfacing external
gadgets, controlling output, reading input from pins.

UNIT V
IoT Physical Servers and Cloud Offerings – Introduction to Cloud Storage models and
communication APIs,Webserver – Web server for IoT, Cloud for IoT, Python web application
framework,Designing a RESTful web API.

TEXT BOOK:
1.Internet of Things - A Hands-on Approach, Arshdeep Bahga and Vijay Madisetti,
Universities Press, 2015,ISBN: 9788173719547
2.Getting Started with Raspberry Pi, Matt Richardson & Shawn Wallace, O'Reilly (SPD),
2014,
ISBN:9789350239759
SCHOOL OF ENGINEERING AND TECHNOLOGY

MCST20: SOFTWARE ARCHITECTURE

Internal Marks: 30
Credits: 4 University Marks: 70
________________________________________________________________________________

UNIT-I
INTRODUCTION TO SOFTWARE ARCHITECTURE
Introduction to Software Architecture, Status of Software Architecture, Architecture Business
Cycle, Software Architectures Evolution. Software Processes and the Architecture Business
Cycle, Features of Good Architecture. Architecture Styles, Pipes and Filters, Data Abstraction
and Object Oriented organization, Even-based Implicit Invocation, Layered Systems,
Registers, Interpreters, Process Control, Other Familiar Architectures, Heterogeneous
Architectures.
UNIT-II
SHARED INFORMATION SYSTEMS
Database Integration, Interpretation in Software Development Environments, Architectural
Structures for Shared Information Systems, Architectural Design Guidance, Guidance for
User Interface Architectures, Case Study in Inter-operability: World Wide Web.
UNIT-III
PATTERN TYPES
Architectural Patterns, Structural Patterns, Patterns for Distribution, Patterns for Interactive
Systems, Formal Models and Specifications, Finalizing the Architectural of a Specific
System, Architectural Styles, Architectural Design Space, Case Study: CORBA.
UNIT-IV
ARCHITECTURAL DESCRIPTION LANGUAGES (ADL)
Contemporary, ADL’s today, Capturing Architectural Information in an ADL, Application of
ADL’s in system Development, Choosing an ADL, Example of ADL.
UNIT-V
REUSING ARCHITECTURAL ASSETS WITHIN AN ORGANIZATION
Creating Products and Evaluating a Product Line, Organizational Implications of a Product
Line, Component Based Systems. Software Architectures in Figure Legacy Systems.

TEXT BOOKS:
SCHOOL OF ENGINEERING AND TECHNOLOGY

1. Mary Show, David Garlan, S/W Arch. Perspective: on an Emerging Discipline, PHI,
1996.
2. Len Bass, Paul Elements, Rick Kazman, Software Architecture in Practice, PEA, 1998.

REFERENCE BOOKS:
1. Garmus, Herros, Measuring the Software Process: A Practical Guide to Functional
Measure, PHI, 1996.
2. Florac, Carleton, Meas. Software Process: Stat. Proce. Cont. for Software process
Improvements, PEA, 1999.
3. W.Humphery, Introduction to Team Software Process, PEA, 2002.
4.Peters, Software Design: Methods and Techniques, Yourdon, 1981.5. Buschmann,
Pattern Oriented Software Architecture,
SCHOOL OF ENGINEERING AND TECHNOLOGY

MCST21: ADVANCED WEB TECHNOLOGIES

Internal Marks: 30
Credits: 4 University Marks:70
________________________________________________________________________________

UNIT-I

Fundamentals: Introduction to the Web, Web servers and Clients, Resources, URL and its
Anatomy,MessageFormat,PersistentandNonpersistentconnections,WebCaching,Proxy,JavaandtheN
et,Java,NetworkClassesandInterfaces,LookingupInternetAddress,Client/Serverprograms,Socketprog
ramming, e-mailclient, POP3programs, Remote method invocation,Example.

UNIT II

HTML:HTMLanditsFlavors,HTMLbasics,Elements, Attributesand Tags, Basic Tags,Advanced


Tags,Frames,Images,Metatag,PlanningofWebpage,ModelandStructureforaWebsite,DesigningWebp
ages,Multimediacontent.
Cascadingstylesheets: Advantages, AddingCSS, Browsercompatibility, CSS and page layout,
Selectors.

UNIT III

JavaScript:Introduction,Variables,Literals,Operators,Controlstructure,Conditionalstatements,Array
s,Functions,Objects,Predefinedobjects,Objecthierarchy,Accessingobjects,Events,Eventhandlers,Mul
tiplewindowsandFrames,FormobjectandElement,AdvancedJavaScriptandHTML,DataentryandValid
ation, Tables and Forms, DHTML withJavaScript.

UNIT IV

Serversideprogramming:Internetprogrammingparadigm,Seversideprogramming,LanguagesforCG
I,Applications,Serverenvironment,Environmentvariables,CGIbuildingblocks,CGIscriptingusingC,S
hellscript,WritingCGIprogram,CGIsecurity,AlternativesandEnhancementtoCGI,Server-sideJava,
Advantagesover Applets, Servlet alternatives, Servlet strengths,
Servletarchitecture,Servletlifecycle,GenericandHTTPServelet,FirstServlet,PassingparameterstoServ
lets,Retrievingparameters,Serversideinclude,Cookies,Filters,ProblemswithServlet,Securityissues,JS
PandHTTP,JSPEngines,HowJSPworks, JSPand Servlet, Anatomyofa JSPpage,JSP syntax,JSP
components.

UNIT V

Seversideprogramming:continued:Beans,Sessiontracking,Userspassingcontrolanddatabetweenpa
ges,Sharing sessionand Applicationdata,Databaseconnectivity,JDBCdrivers,Basic steps,Loading a
SCHOOL OF ENGINEERING AND TECHNOLOGY

driver,Making aconnection,ExecuteandSQLstatement,SQLstatements,Retrieving theresult,Getting


databaseinformation,Scrollableandupdatableresultset,Resultsetmetadata,IntroductiontoJavaBeans,B
eanbuilder,AdvantagesofJavaBeans,BDKintrospection,Properties,BeanInfointerface,Persistence,
Customizer,JavaBeans API, EJB,Introduction to Struts Framework.

TextBooks :
1. Web Technologies,Uttam K. Roy, 1stedition7thimpression, 2012, Oxford
HigherEducation
ReferenceBooks:
1. Java How to program, Pauldeitel, Harveydeital, PHI
2. Introduction toJavaProgramming, Y.DanielLiang, 6thEdition, Pearson Education,
2007
3. The J2EE Tutorial, Stephanie Bodoffetal,2ndEdition, Pearson Education, 2004.
4. Web Technologies,Roy, Oxford University Press
5. Web Technologies,Srinivasan, Pearson Education,2012
6. Java EE5for Beginners, Ivan Bayross, SharanamShah, Cynthia Bayrossand
VaishaliShai, SPD.
7. Programming the Worldwide Web, Ro
SCHOOL OF ENGINEERING AND TECHNOLOGY

MCST22: SOFTWARE TESTING

Internal Marks: 30
Credits: 4 University Marks: 70
________________________________________________________________________________

UNIT I
INTRODUCTION
Testing as an Engineering Activity – Testing as a Process – Testing axioms – Basic definitions
– Software Testing Principles – The Tester’s Role in a Software Development Organization –
Origins of Defects – Cost of defects – Defect Classes – The Defect Repository and Test
Design – Defect Examples – Developer/Tester Support of Developing a Defect Repository –
Defect Prevention strategies.

UNIT II
TEST CASE DESIGN
Test case Design Strategies – Using Black Bod Approach to Test Case Design – Random
Testing – Requirements based testing – Boundary Value Analysis – Equivalence Class
Partitioning – Statebased testing – Cause-effect graphing – Compatibility testing – user
documentation testing – domain testing – Using White Box Approach to Test design – Test
Adequacy Criteria – static testing vs. structural testing – code functional testing – Coverage
and Control Flow Graphs – Covering Code Logic – Paths – code complexity testing –
Evaluating Test Adequacy Criteria.

UNIT III
LEVELS OF TESTING
The need for Levers of Testing – Unit Test – Unit Test Planning – Designing the Unit Tests –
The Test Harness – Running the Unit tests and Recording results – Integration tests –
Designing Integration Tests – Integration Test Planning – Scenario testing – Defect bash
elimination System Testing – Acceptance testing – Performance testing – Regression Testing
– Internationalization testing – Ad-hoc testing – Alpha, Beta Tests – Testing OO systems –
Usability and Accessibility testing – Configuration testing – Compatibility testing – Testing
thedocumentation–Website testing.

UNIT IV
TEST MANAGEMENT
People and organizational issues in testing – Organization structures for testing teams –
testing services – Test Planning – Test Plan Components – Test Plan Attachments – Locating
Test Items – test management – test process – Reporting Test Results – The role of three
groups in Test Planning and Policy Development – Introducing the test specialist – Skills
needed by a test specialist – Building a Testing Group.

UNIT V
SCHOOL OF ENGINEERING AND TECHNOLOGY

TEST AUTOMATION
Software test automation – skill needed for automation – scope of automation – design and
architecture for automation – requirements for a test tool – challenges in automation – Test
metrics and measurements – project, progress and productivity metrics.

TEXT BOOKS:
1. Srinivasan Desikan and Gopalaswamy Ramesh, “Software Testing – Principles
and Practices”,
Pearson Education, 2006.
2. Ron Patton, “Software Testing”, Second Edition, Sams Publishing, Pearson Education,
2007.

REFERENCES:
1. Ilene Burnstein, “Practical Software Testing”, Springer International Edition, 2003.
2. Edward Kit,” Software Testing in the Real World – Improving the Process”, Pearson
Education, 1995.
3. Boris Beizer,” Software Testing Techniques” – 2nd Edition, Van Nostrand Reinhold, New

York, 1990.
4. Aditya P. Mathur, “Foundations of Software Testing _ Fundamental Algorithms
and Techniques”, Dorling Kindersley (India) Pvt. Ltd., Pearson Education, 2008.
SCHOOL OF ENGINEERING AND TECHNOLOGY

MCSP03: ADVANCED OPERATING SYSTEMS AND CRYPTOGRAPHY AND


NETWORK SECURITY LAB

Internal Marks: 40
Credits: 1 University Marks:60
______________________________________________________________________________

LIST OF EXPERIMENTS

1. Write a program in Java to implement Arithmetic operations on Large


Integers.
2. Write a program in Java to implement Prime Number Generation
3. Write a program in Java to implement Euclidean Algorithm
4. Write a program in Java to implement Shift Cipher
5. Write a program in Java to implement Ceaser Cipher
6. Write a program in Java to implement Substitution
Cipher(monoalphabetic)
7. Write a program in Java to implement Data Encryption Standard
8. Write a program in Java to implement Cipher Block Chaining in AES
9. Write a program in Java to implement Output Feedback in AES
10.Write a program in Java to implement Rivest Shamir Adleman(RSA
algorithm)
11.Write a program in Java to implement Elgamal Public Key CryptoSystem
12.Write a program in Java to implement Message Digest(MD5)
Note: Cryptography and Network Security Lab Software used “NETBEANS”
and programming language is “JAVA”
1. First Come First Serve Scheduling Algorithm
2. Priority Scheduling Algorithm
3. Round Robin
4. Shortest Job First
5. First In First Out
6. Least Recently Used Page Replacement
7. Client Server One-way Communication
8. Client Server two-way Communication
SCHOOL OF ENGINEERING AND TECHNOLOGY

MCSP04: ADVANCED DATABASE MANAGEMENT SYSTEMS LAB

Internal Marks: 40
Credits: 1 University Marks:60
__________________________________________________________________________________

LIST OF EXPERIMENTS

1.) Queries on DDL commands with key constraints.

2.) Queries on DML commands with key constraints.

3.) Queries on JOINS.

4.) Queries on Sequence.

5.) Queries on Triggers.

6.) Queries on Clusters

7.) Queries on Indexes

8.) PL/SQL program on DML commands.

9.) PL/SQL program on Procedures.

10.) PL/SQL program on cursors.

11.) Inserting Images into database using procedures.

12.) Inserting Audio,Video files into database using procedures.

13.) Designing a web pages using JDBC-ODBC connections.

NOTE:

 Oracle or MySql DataBases .


 HTML and PHP or Javasripts; NetBeans or Dreamweaver.
SCHOOL OF ENGINEERING AND TECHNOLOGY

Anda mungkin juga menyukai