Vous êtes sur la page 1sur 14

09NN01 OPTIMIZATION TECHNIQUES

3 1 0 4
LINEAR PROGRAMMING: Linear Programming: Graphical method, Simplex method, Revised simplex method, Duality in
linear programming (LP), Sensitivity analysis, other algorithms for solving LP prolems, !ransportation, assignment and
other applications"
(#)
NON-LINEAR PROGRAMMING: $on Linear Programming: %nconstrained optimi&ation techni'ues, Direct search
methods, Descent methods, constrained optimi&ation" (#)
INTEGER AND DYNAMIC PROGRAMMING: (ormulation of )nteger Programming Prolems, Gomory*s cutting plane
methods, +ranch and +ound !echni'ues, ,haracteristics of Dynamic programming, +ellman*s principle of optimality,
,oncepts of dynamic programming, !aular method of solution, ,alculus method of solution" (--)
PERT/CPM: $et.or/ ,onstruction0,omputation of earliest start time, latest start time, total, free and independent float
time 0,rashing 1 ,omputation of optimistic, most li/ely, pessimistic and expected time0 Resource analysis in $et.or/
scheduling" (2)

NON TRADITIONAL TECHNIQUES: Genetic 3lgorithm, Simulated 3nnealing, !au Search and $eural $et.or/s" (4)
Tota 4!
RE"ERENCES:
-" Rao S S, 56ngineering 7ptimi&ation: !heory and Practice8, $e. 3ge )nternational, $e. Delhi, 9::;"
9" !rivedi < S, 5Proaility and Statistics .ith Reliaility, =ueuing and ,omputer 3pplications8, Prentice >all, $e.
Delhi, 9::;"
?" !aha > 3, 57perations Research: 3n )ntroduction8, Pearson 6ducation, $e. Delhi, 9::;"
@" 3lerto Leon1Garcia, 5Proaility and Random Processes for 6lectrical 6ngineering8, Pearson 6ducation, $e.
Delhi, 9::A"
2" Bang B S R, Sun , ! and Ci&utani, 5$euro0(u&&y and Soft ,omputing: 3 ,omputational 3pproach to Learning and
Cachine )ntelligence8, Pearson 6ducation, $e. Delhi, 9::2"

09NN0! DATA STRUCTURES AND ALGORITHMS

3 1 0 4
INTRODUCTION: Primitive Data !ypes 0 3stract Data types 1 3lgorithm 3nalysis 1 !ime and Space ,omplexity" (?)

LISTS: 3rrays 1 Lin/ed Lists 1 Stac/s and =ueues 1 3pplications 1 )mplementation of Recursive (unctions" (2)

TREES: +inary !rees 1 !ree !raversals 1 +inary Search !rees 1 +alanced Search !rees 1 3DL 1 Red0+lac/ !rees 1
+inary >eap 1 >eap Sort 1 Priority =ueues" (4)

GRAPHS: Representation of Graphs, +readth (irst Search, Depth (irst Search, Strongly ,onnected ,omponents,
DiE/stra*s and +ellman (ord*s 3lgorithms 1 (loyd 0 FarshallGs 3ll Pair Shortest Paths 3lgorithm" (4)

SEARCHING: >ash !ales 1 ,ollision resolution 1 !ree Structures" (@)

ALGORITHM DESIGN METHODS: Greedy Cethod 0 Divide and ,on'uer 0 Dynamic Programming 0 +ac/trac/ing 0
+ranch and +ound" (-@)

Tota 4!
RE"ERENCES:
-" Feiss C 3, 5Data Structures H 3lgorithm analysis in ,II8, 3ddison Fesley, $e. Delhi, 9::;"
9" 6llis >oro.it& and Sarta& Sahni, 5(undamentals of ,omputer 3lgorithms8, ,omputer Science Press, Delhi, 9::4"
?" !homas > ,ormen, ,harles 6 Leiserson, Ronald L Rivest, 5)ntroduction to 3lgorithms8, Prentice >all, Delhi 9::-"
@" DiEayala/shmi Pai , 5Data Structures0,oncepts, !echni'ues and 3pplications8, !ata CcGra. >ill, $e. Delhi, 9::4"
09NN03 AD#ANCED COMPUTER ARCHITECTURE
4 0 0 4
RE#IE$ O" COMPUTER ARCHITECTURE: (undamentals of ,omputer design0 !echnology trends0 cost0 measuring
and reporting performance 0 )nstruction set principles0 addressing modes" (#)

4;
PIPELINING AND ILP: Pipelining 0 Design issues 0 )nstruction level parallelism ()LP) 0over coming data ha&ards 0
reducing ranch costs 1 high performance instruction delivery 0 hard.are ased speculation0 limitation of )LP 0 )LP
soft.are approach0compiler techni'ues0 static ranch protection0DL)F approach0 >ard.are and soft.are solutions" (#)

MEMORY: Cemory hierarchy design0 cache performance0 reducing cache misses penalty and miss rate 1 virtual
memory0 protection" (A)
STORAGE SYSTEMS: !ypes 1 +uses 0 R3)D0 errors and failures0 ench mar/ing a storage device0 designing a )J7
system" (4)

MULTIPROCESSORS: Cultiprocessors and thread level parallelism0 symmetric shared memory architectures0 distriuted
shared memory0 Synchroni&ation0multi threading" )nter connection net.or/s and clusters0 interconnection net.or/ media
1 practical issues in interconnecting net.or/s0 examples 1 clusters0 designing a cluster" (#)

Tota 4!
RE"ERENCES:
-" Patterson D 3 and >ennessy B L, 5,omputer 3rchitecture: 3 =uantitative 3pproach8, Corgan <aufmann 3msterdam,
9::;"
9" ,arl >amacher, Kvon/o Dranesic, Saf.at Ka/y, 5,omputer 7rgani&ation8, CcGra. >ill, $e. Lor/, 9::;"
?" Dincent ! >euring, Bordan > (, 5,omputer Systems Design and 3rchitecture8, 3ddison Fesley, $e.Delhi, 9::;"
@" <ai >.ang, 53dvanced ,omputer 3rchitecture, Parallelism, Scalaility, Programmaility8, CcGra. >ill,London, 9::?"
09NN04 OPERATING SYSTEM DESIGN
3 1 0 4
INTRODUCTION: )ntroduction 0 7perating Systems Services 1 !ypes of 7perating Systems and 7perating systems
structure" (2)

PROCESS MANAGEMENT: Processes 0 ,P% Scheduling 3pproaches 1 Process Synchroni&ation 1 Semaphores 1
Deadloc/s 1 >andling Deadloc/s 1Cultithreading 1 ,ase study: process management in Linux" (-:)

MEMORY MANAGEMENT: Cemory Canagement 1 Paging 1 Segmentation 1 Dirtual Cemory 1 Demand Paging 1
Replacement 3lgorithms 1 ,ase study: Cemory management in Linux" (#)

"ILE HANDLING: (ile ,oncepts 0 3ccess methods 0 Directory Structure 0 (ile Protection 0 (ile System )mplementation:
(ile System Structure and )mplementation 1 Directory )mplementation 1 3llocation methods, (ree Space Canagement 1
Recovery 0 Dis/ Structure 1 Dis/ Scheduling 1 ,ase study: )J7 management in Linux (#)

AD#ANCED OS: Design issues in Distriuted 7perating System0 $et.or/ 7perating Systems 1Symion 7S (#)

Tota 4!
RE"ERENCES:
-" 3raham Silerschat&, Peter + Galvin, Gagne G, 57perating System ,oncepts8, Bohn Filey H Sons, $e. Lor/,
9::2"
9" ,harles ,ro.ley, 5 7perating systems: 3 Design 7riented 3pproach8, !ata CcGra. >ill, 9::@"
?" Dhamdhare, 57perating Systems0a concept ased approach8, !ata CcGra. >ill, 9::;"
@" !anenaum, 5Distriuted 7perating Systems8, Pearson 6ducation, $e. Delhi, 9::@"
2" Pradeep < Sinha, 5Distriuted 7S concepts and Design8, )666 computer Society Press, P>) 9::2"
09NN0% /09NE3% SO"T$ARE ENGINEERING METHODOLOGIES
3 0 0 3
INTRODUCTION: Definition of terms 1 Role of Soft.are 1 Soft.are characteristics 1 Soft.are classification 1 Soft.are
myths 1 Soft.are Life ,ycle Codels 0 Selection of process models for proEects" (4)

SO"T$ARE REQUIREMENT ANALYSIS: Soft.are Re'uirements elicitation 1 Re'uirement Specifications 1 Boint
3pplication development 1 3nalysis modeling" (4)


SO"T$ARE DESIGN: Design concepts 1 (unction 7riented Design 1 7Eect 7riented Design 1 %ser interface design 1
Soft.are 3rchitecture" (4)

PROGRAMMING STANDARDS: Structured programming 1 ,oding standards 1 Caintainaility of programs" (@)

SO"T$ARE TESTING: !esting fundamentals 1 !est cases 1 !esting !echni'ues 1 !esting strategies" (;)

4A
SO"T$ARE CON"IGURATION MANAGEMENT: S,C process 1 Dersion control 1 ,hange control 1 ,onfiguration audit
1 S,C Standards" (@)
SO"T$ARE MAINTENANCE: !ypes of changes 1 Caintenance issues 1 Ceasuring maintenance effort 1 Proactive,
Preventive and Perfective maintenance 1 Soft.are reEuvenation" (@)
Tota 4!
RE"ERENCES:
-" Roger Pressman S, 5Soft.are 6ngineering: 3 PractitionerMs 3pproach8, !ata CcGra. >ill, $e. Delhi, 9::2"
9" Sommerville ), 5Soft.are 6ngineering8, Pearson 6ducation, $e. Delhi, 9::A"
?" Shari La.rence Pfleeger, 5Soft.are 6ngineering: !heory and Practice8, Pearson 6ducation, $e. Delhi, 9::A"
09NN0& / 09NE!1 IN"ORMATION THEORY AND CODING TECHNIQUES
4 0 0 4
IN"ORMATION ENTROPY "UNDAMENTALS: Relation et.een information and proaility, mutual and self information,
information entropy, ShannonMs theorem, ,ode design, Shannon0(ano coding, >uffman coding, )mplementation of
>uffman code" (4)
DATA AND #OICE CODING: ,ontext dependent coding, arithmetic codes, overall efficiency consideration" Doice
coding, Delta Codulation and adaptive delta modulation, linear predictive coding, silence coding, su0and coding" (4)
IMAGE AND #IDEO COMPRESSION: Direct cosine transform, 'uanti&ation loss, loss estimation, BP6G components and
standards )nter frame, coding, motion compensation techni'ues, CP6G09 standards, )ntroduction to CP6G0@" (#)
ERROR CONTROL CODING :+ac/.ard error correction linear loc/ codes, +,> codes, Golay codes, efficiency of L+,,
performance of simple 3R= go ac/0n and selective repeat schemes for.ard correction codes0,onvolution coding
decoding algorithms, Diteri decoding optimum decoding performance measures" (#)
ENCRYPTION CODING: !ransposition and sustitution coding, Data 6ncryption Standards (D6S), /ey distriution
prolem, pulic /ey encryption, pulic /ey decryption and C)! algorithm" Direct se'uence ,DC3 ased encryption,
7rthogonal se'uences, R0S codes" (4)

Tota 4!
RE"ERENCES:
-" ,over ! C and !homas B 3, 56lements of )nformation theory8, 9nd edition, Bohn Filey H Sons, 9::;"
9" Roth R, 5)ntroduction to ,oding theory8, ,amridge %niversity Press, 9::;"
?" Peter S.eeney, 56rror ,ontrol ,oding: (rom !heory to Practice8, Bohn Filey H Sons, 9::9"
09NN0' / 09NE34 DATA(ASE TECHNOLOGY
3 0 0 3
INTRODUCTION: Data models, structure of relational dataases, component of management system 1 DDL, DCL,
dataase languages, S=L standard, dataase users and administrators" (#)


RELATIONAL D(MS: Design issues 0 asic normal forms and additional normal forms, !ransforming 60R diagram to
relations, )ntegrity constraints, =uery processing and optimi&ation" (#)

TRANSACTION PROCESSING: !ransaction concept, concurrent execution, isolation, testing for seriali&aility,
,oncurrency control, loc/ ased 0 time0stamp ased 0 validation ased protocols, multi0version schemes, deadloc/
handling" (#)

DATA(ASE ADMINISTRATION: (unctions of D+3, Data volume and usage analysis, security and authori&ation,
recovery and atomicity, uffer management, ac/up systems" (#)

AD#ANCED DATA(ASES: 7Eect oriented, parallel, distriuted, .e dataases" (;)

Tota 4!
RE"ERENCES:
-" 3raham Silerschat&, >anry ( <orth, Sudarshan S, 5Dataase Systems ,oncepts8, CcGra. >ill, 9::A"
9" Raghu Rama/rishnan, 5Dataase Canagement Systems8, CcGra. >ill , 9::?"
?" Cichael <ifer, 3rthur +ernstein, Philip C Le.is, Prain < Panigrahi, 5Dataase Systems 1 3n application
oriented approach5,Pearson 6ducation, 9::4"
@" Beffrey D %llman, 5 3 (irst ,ourse in Dataase Systems8, Pearson 6ducation, 9::A"
2" Date , B, 53n )ntroduction to Dataase Systems8, Pearson 6ducation, 9::?"
44
09NN0) NET$OR*ING TECHNOLOGY
3 0 ! 4
INTRODUCTION: $et.or/ing asics 0 L3$s and F3$s 0 $et.or/ hard.are components, Server0ased net.or/s 0 Peer0
to0peer net.or/s 0 Server0ased vs" peer0to0peer net.or/s 0 Speciali&ed servers 0 ,omination net.or/s 0 $et.or/
pac/ets 1 3ddressing pac/ets 1 Cultiplexing 0 Protocols 0 !he 7S) reference model 1 )nternet Protocol Stac/" (4)

DATA LIN* CONTROL: 3synchronous and Synchronous transmission 0 C3, protocolN ,ontrolled H contention0ased 0
)666 4:9"-- L3$s 1 System architecture, physical layer, Cedia 3ccess ,ontrol 1 C3, management 1 6rror Detection
and ,orrection !echni'ues 1 ,R, and Linear +loc/ ,odes 1 !ransmission Protocols 1 Retransmission techni'ues
0!o/en ring 1 (DD)" (#)
TRANSPORT LAYER: )ntroduction to !,P 1 pac/et format 1 sliding .indo. protocol 1 6stalishing and ,losing !,P
connection 1 Response to ,ongestion and variance in delay 1 !,P performance 1 Reserved and availale port
numers" (4)

NET$OR* PROTOCOLS: )P Layers and functions 0 ,ongestion control 0 O"92 0 )nternet.or/ing concepts and O"92
architectural models 1 $aming addressing and routing using )P 0 %nreliale connectionless delivery 0 Datagram*s 0
Routing )P datagram*s 1 ),CP" (#)

NET$OR* PER"ORMANCE MEASUREMENT AND MODELING: !raffic modeling and simulation 0 self0similar and
heavy0tailed models 0 +uffering 1 +loc/ing 0 (ast (or.arding )nternet traffic: self0similarity 0 6thernet traffic 0 Forld0Fide0
Fe traffic 0 )P S.itching 0 )P multicast 0 multicast routing" (4)
Tota 4!
RE"ERENCES:
-" (it&gerald and Dennis, 5+usiness Data ,ommunications and $et.or/ing8, Bohn Filey and Sons, Delhi, 9::2"
9" Filliam Stallings, 5Data and ,omputer ,ommunications8, 6ighth edition, Prentice >all, $e. Delhi, 9::;"
?" Bames ( <urose, et al, 5,omputer $et.or/ing: 3 !op0Do.n 3pproach (eaturing the )nternet8, (ourth edition,
3ddison Fesley, 9::4"
@" 3chyut S Godole, 5Data ,ommunications and $et.or/s8, !ata Cc0Gra. >ill, 9::9"
2" (erou&an, 5Data ,ommunications and $et.or/ing8, !ata Cc0Gra. >ill, 9::;"
09NN09 DISTRI(UTED COMPUTING SYSTEMS
3 0 0 3
INTRODUCTION: ,haracteri&ation of distriuted systems 1 System models 1 architectural models 1 (undamental models
1 $et.or/ing and )nternet.or/ing 1 $et.or/ principles 1 )nter0net.or/ protocols 1 )nter process communication 1 3P) for
the internet protocols 1 6xternal data representation and marshalling 1 clientJserver communication 1 group
communication 1 RP, communication" (;)

SYSTEM IN"RASTRUCTURE "OR DISTRI(UTED SYSTEMS: 7perating system support 1 security 1 Distriuted file
systems 1 sun $(S 1 Distriuted Shared Cemory: Design and implementation models 0 ,onsistency Codels" (#)

DISTRI(UTED ALGORITHMS: ,loc/s, 6vent and Process states 1 ,loc/ synchroni&ation 1 6vent ordering 1 Logical
time and logical cloc/s 1 Gloal States 1 Distriuted Cutual 6xclusion 1 election algorithms 1 ,onsensus prolems" (#)

DISTRI(UTED TRANSACTIONS: !ransactions and concurrency control 1 Distriuted transactions 1 flat and nested
distriuted transactions 1 concurrency control 1 distriuted deadloc/s 1 replication 1 fault tolerance" (#)
DISTRI(UTED O(+ECTS TECHNOLOGY: Distriuted oEects and remote invocation 1 Directory and discovery services
1 case study: sun RP, 1 D,6 RP, 1 CS RP, 1 ,7R+3 1 B3D3 RC) 1 ,7C 1 S73P 1 B966 and 6nterprise
,omputing 0 S73 and ,loud ,omputing" (#)

Tota 4!
RE"ERENCES:
-" George ,oulouris, Bean Dollimore, !im <inderg, 5Distriuted Systems ,oncepts and Design8, Pearson 6ducation,
$e. Delhi, 9::2"
9" Liu C L, 5Distriuted ,omputing Principles and 3pplications8, Pearson 6ducation, $e. Delhi, 9::2"
?" !anenaum 3 S, Dan Steen C, 5Distriuted Systems8, Pearson 6ducation, $e. Delhi, 9::;"
4#
ELECTI#ES
09NN!1/09NE!% SER#ICE ORIENTED ARCHITECTURE
3 0 0 3
SER#ICE ORIENTED ARCHITECTURE CONCEPTS: Service governance, processes, guidelines, principles, methods
and tools 1 <ey Service characteristics 1 !echnical enefits of a service0oriented architecture 1 Service0oriented
architecture 1 +enefits" (;)

QUALITY O" SER#ICE: Fe services orchestration 1 For/flo. and +usiness Process Canagement 1 +usiness
Process 6xecution Language 1 3,)D !ransactions 0 Fe services !ransactions 1 S73 Canagement 1 Systems
Canagement 1 3lerting 1 Provisioning 1 Leasing 1 Lifecycle management 1 Canagement 3rchitecture" (A)

SO"T$ARE ORIENTED ARCHITECTURE IN $E( SER#ICES: )ntroduction to OCL !echnologies 1 OCL 1 D!D 1 OSD
0 %niversal Description Discovery and )ntegration 1 Programming %DD) 1 %DD) Data Codel 1 %DD) S73P 3P)s 1
)n'uiry 3P)s 1 Pulisher 3P)s 1 Fe Service Definition Language 1 Defining Cessage data types 1 Defining 7perations
on Cessages 1 )mporting FSDL documents 1 6xtensions for inding to S73P 1 Simple 7Eect 3ccess Protocol 1 S73P
Specification 1 S73P Cessage processing 1 S73P use of $amespaces 1 S73P Cultipart C)C6 attachments" (-@)
SOA AND (USINESS PROCESS MANAGEMENT: +asic +usiness process management concepts 1 6xamples 1
,omining +PC, S73, and .e services 1 7rchestration and ,horeography specification 1 6xamples0 Fe services"0
!he simple approach to metadata management 1 Cetadata specification01 )mpact of .e services on transactions"
(A)
SER#ICES SECURITY: 7verarching concern 1 ,ore concepts 1 Summary of challenges, threats and remedies 1
Securing the communication layer 1 7vervie. of message0level security 1 Data0level security, Ris/ of loose coupling0
layers of S73 security0Solutions to S73 security" (4)
Tota 4!
RE"ERENCES:
-" !homas 6rl, 5 Service 7riented 3rchitecture (S73): ,oncepts, !echnology and Design8, Prentice >all, 9::2"
9" Greg Lomo., 6ric $e.comer, 5%nderstanding S73 .ith Fe Services8, Pearson 6ducation, $e. Delhi, 9::2"
?" 6ric $e. ,omer,8%nderstanding Fe Services: OCL, FSDL, S73P and %DD)8, 3ddison Fesley, 9::9"
@" ,hatterEee, Sandeep and Bames Feer, 5Developing 6nterprise Fe Services: 3n 3rchitect*s Guide8, Prentice >all
of )ndia, $e. Delhi, 9::2"
09NN!! DIGITAL IMAGE PROCESSING
3 0 0 3
DIGITAL IMAGE "UNDAMENTALS: 6lements of digital image processing system0)mage sensing and ac'uisition0
)mage sampling and 'uanti&ation 1 +asic relationship et.een pixels" (@)

IMAGE TRANS"ORMS: $eed for image transforms0 Discrete (ourier transform0 Discrete ,osine transform0Falsh
transform0 >adamard transform0 >otelling transform0 >aar transform0Radon transform" (@)
IMAGE ENHANCEMENT: Spatial domain methods0 (re'uency domain methods0 >istogram modification techni'ues0
$eighorhood averaging0median filtering0 Lo.pass filtering0 averaging of multiple images0 image sharpening y
differentiation0 high pass filtering"
(#)

IMAGE "ILTERING AND RESTORATION: )mage oservation models0 restoration in the presence of noise only0 spatial
filtering: mean filters, order statistics filters, adaptive filters0 )nverse filtering0 Fiener filtering 1 ,onstrained least s'uares
filtering0 lind deconvolution" (4)
IMAGE CODING: =uanti&ation: scalar =uanti&ation and vector =uanti&ation0code .ord assignment: uniform length and
variale length code.ord assignment 1 differential pulse code modulation, t.o channel coders, pyramid codingN hyrid
transform coding 1 .avelet coding" (#)
IMAGE SEGMENTATION AND REPRESENTATION: 6dge detection: Gradient operators 0 edge lin/ing and oundary
detection: Gloal processing via >ough transform, Graph theoretic techni'ues 0!hresholding: Gloal thresholding,
adaptive threshold0Representation: ,hain codes, Polygonal approximations, Signatures, oundary segments, s/eletons 0
+oundary descriptors: Shape numers, (ourier descriptors, Statistical moments 0 Regional descriptors: !exture 0
Relational descriptors" (4)
#:

Tota 4!
RE"ERENCES:
-" Gon&ale& R ,, Foods R 6, 8Digital )mage Processing8, Pearson 6ducation, Second

edition, 9::9"
9" Bain 3 <, 8(undamentals of Digital )mage Processing8, Prentice >all of )ndia,-#4#"
?" Bae S Lim, 8!.o0Dimensional Signal and )mage Processing8, Prentice >all,)nc", -##:"
@" <enneth R ,astleman, 8Digital )mage Processing8, Prentice >all )nternational,)nc", 9::-"
2" Cilan Son/a, Daclau>lavac, Roger +oyle, 5)mage Processing, 3nalysis, and Cachine Dision8, +roo/sJ,ole
Pulishing ,ompany, -###"
;" Filliam < Pratt, 5Digital )mage Processing8, Bohn Filey H Sons, 9::?"

09NN!3 ENTERPRISE RESOURCE PLANNING
3 0 0 3
INTRODUCTION: +usiness processes, asic differences et.een manufacturing and services, data )ntegration )ssues,
enefits of 6RP, rief history of 6RP and related technologies 1 +PR, data .arehousing, data Cining, 7L3P" (#)

ERP ARCHITECTURE: ,oncepts of 6RP0 maEor components and their functions in 6RP system" 6RP architecture 0
system control interfaces, services, presentation interface, dataase )nterface" )nterfaces .ith other systems, Culti0 client
server solution, 3pplication )ntegration 0 6RP and )nternet, 6RP and ,ommerce" (#)

IMPLEMENTATION ISSUES: pac/age selection, implementation methodology, 6RP Lifecycle, people )ssues, 6RP and
usinessJprocess drivers, office )ntegration, soft.are selection, proEect management, feasiility issues, proEect initiation,
ris/ )nvolved, hidden costs, user education" (#)

ERP MODULES: !he Development of 6nterprise Resource Planning Systems, +usiness Codules1 (inance,
Canufacturing, >uman Resources, Plant Caintenance, Caterials Canagement, =uality Canagement, Sales H
Distriution" (#)

ERP APPLICATIONS: Car/eting )nformation Systems and the Sales 7rder Process, Production and Supply ,hain
Canagement, >uman Resources management, Processes managementJ )mprovement" (;)


Tota 4!
RE"ERENCES:
-" Leon, 3lexis, 56RP Demystified8, Second edition, !ata CcGra. >ill, $e. Delhi, 9::A"
9" 7lson, David, 5Canagerial )ssues of 6nterprise Resource Planning Systems,8 !ata CcGra. >ill, $e. Delhi,
9::A"
?" Sumner, Cary, 56nterprise Resource Planning8, Prentice >all, $e. Bersey, 9::2"
@" 7*Leary, Daniel, 56nterprise Resource Planning Systems: Systems, Life ,ycle, 6lectronic ,ommerce and Ris/8,
,amridge %niversity Press, ,amridge, 9::9"
2" 6llen Con/, +ret Fagner,8 ,oncepts in 6nterprise Resource Planning8, !homson ,ourse !echnology, %S3,
9::;"

09NN!4/09NE!' ,ML AND $E( SER#ICES
3 0 0 3
,ML TECHNOLOGIES: OCL fundamentals 1 Document !ype Definitions 1 OCL Schema 1 +enefits 0 OCL Schema
Docaulary 0 ,onverting D!Ds to Schemas 0 Dalidating Documents against Schemas 0 +asics of $amespace 0 Declaring
$amespaces 0 Olin/ 1 Opointer 0 Opath 1 OSL 1 OSL!0 OCL as document format0 OCL on the Fe" Document 7Eect
Codel 1 concepts and 3P)" (#)

$E( SER#ICES TECHNOLOGIES: )ntroduction to S73P 1 Relation to OCL RP, 1 Cessage Syntax 1 6nvelope 1
>eader 1 +ody 0 S73P !ransport" FSDL 0 ,apailities 1 (ormat 1 Semantics 0 6ncoding 0 6ndpoint %DD) 0 " !he %DD)
data structures 0 Pulishing Services 0 !he Pulish 3P) 0 (inding Services 0 !he )n'uiry 3P) 0 )nvo/ing a service"
)ntroduction to "$6! 1 .e service architecture 1 RP, style .e services 1 Cessage Style Fe services" (#)

-.,ML: 7vervie. 0 ,ollaoration Protocol Profile and 3greement (,PP and ,P3) 0 ,ore components 0 +usiness
modeling 1 Registry 0 OCL .ith BSP JServlet 1 OCL and Cessaging services (BCS) 0 !ransactions 1 OCL and
Dataases" (4)


+!EE AND $E( SER#ICES: 6nterprise Fe services 0 +ac/ end service component 0 Fe application frame.or/ 0
Fe service front end 0 Fe service client 0 S9CL (Secure Services Car/up Language) 1 O3CL" (4)
#-
,ML AND CONTENT MANAGEMENT: Semantic Fe 1 Role of Ceta data in .e content 0 Resource Description
(rame.or/ 1 RD( schema 1 3rchitecture of semantic .e 1 content management .or/flo. 1 OL3$G 1 FS(L" (4)

Tota 4!
RE"ERENCES:
-" >arold and Ceans, 5OCL in a $utshell8, 7*Reilly Pulishers, 7rlando, 9::@"
9" Ron Schmel&er et al" 5OCL and Fe Services8, Pearson 6ducation, $e. Delhi,9::9"
?" Sandeep ,hatterEee and Bames Feer, 5Developing 6nterprise Fe Services: 3n 3rchitectMs Guide8, Prentice >all,
$e. Delhi, 9::@"
@" (ran/ P ,oyle, 5OCL, Fe Services and the Data Revolution8, Pearson 6ducation, $e. Delhi, 9::9"
09NN!% IN"ORMATION SECURITY
3 0 0 3
INTRODUCTION: Security 0 3ttac/s 0 ,omputer criminals 0 Cethod of defense 0 Program Security: Secure programs 0
$on0malicious program errors 0 Diruses and other malicious code 0 !argeted malicious code 0 ,ontrols against program
threats" (;)


OPERATING SYSTEM SECURITY: Protected oEects and methods of protection 1 Cemory address protection 0 ,ontrol
of access to general oEects 0 (ile protection mechanism 0 3uthentication: 3uthentication asics 1 Pass.ord 0 ,hallenge0
response" (4)

DATA(ASE SECURITY: Security re'uirements 0 Reliaility and integrity 0 Sensitive data 1 )nterface 0 Cultilevel dataase
0 Proposals for multilevel security" (;)

SECURITY IN NET$OR*S: !hreats in net.or/s 0 $et.or/ security control 1 (ire.alls 0 )ntrusion detection systems
0Secure e0mail 0 $et.or/s and cryptography 1 6xample protocols: P6C 1 SSL 1 )psec" (4)
ADMINISTRATING SECURITY: Security planning 0 Ris/ analysis 0 7rgani&ational security policies 0 Physical security" (;)

LEGAL/ PRI#ACY/ AND ETHICAL ISSUES IN COMPUTER SECURITY: Protecting programs and data 0 )nformation and
la. 0 Rights of employees and employers 0 Soft.are failures 0 ,omputer crime 1 Privacy 0 6thical issues in computer
society" (4)
Tota 4!
RE"ERENCES:
-" Fhitman C, Cattord >, 5Principles of )nformation Security8, !homson ,ole Pulishers, $e. Delhi, 9::4"
9" Pfleeger , P, Pfleeger S L, 5Security in ,omputing8, Pearson 6ducation, 9::;"
?" Filliam Stallings, 5,ryptography H $et.or/ Security8, Pearson 6ducation, $e. Delhi, 9::;"
@" Cic/i <rause, >arold ( !ipton, 5>andoo/ of )nformation Security Canagement8, Dol -0? ,R, Press LL,, 9::2"
2" Catt +ishop, 5,omputer Security: 3rt and Science8, Pearson 6ducation, 9::?"
09NN!& NEURAL NET$OR*S AND "UZZY SYSTEMS
? : : ?

"EED "OR$ARD NET$OR*S AND SUPER#ISED LEARNING: +iological $eural $et.or/s 0 3rtificial $euron0
3ctivation (unctions, Learning rules0 >e $et.or/0 Perceptron $et.or/s0 3daline0 Cadaline0+ac/ propagation
net.or/s0Learning factors0 Linear Separaility" (4)
SINGLE LAYER "EED(AC* NET$OR*S: >opfield $et.or/03ssociative Cemories0 Recurrent auto association memory
1+i0directional 3ssociative memory0+olt&mann machine" (;)
UNSUPER#ISED LEARNING NET$OR*S: $eural $et.or/ ased on competition 0 Caxnet 0>amming $et.or/0 Self0
7rgani&ing feature Caps0 Learning Dector =uanti&ation 0 3daptive Resonance !heory $et.or/ 1 ,ounter propagation
$et.or/" (4)

"UZZY SETS AND RELATIONS: ,risp Set0Dagueness0%ncertainty and )mpression0(u&&iness0+asic Definitions0+asic
set theoretic 7perations for (u&&y 1!ypes07perations0Properties0 ,risp and (u&&y relations0(u&&y relation0,ardinality
7perations, Properties0(u&&y ,artesian product and ,omposition0$on0)nteractive fu&&y sets0 !olerance and 6'uivalence
relations0(u&&y 7rdering relations0,omposition of fu&&y relations 1 ,risp to fu&&y conversion 1 memership function" (4)

"UZZY0TO0CRISP CON#ERSIONS: Lamda cuts for fu&&y sets and relations0Definitions0 Defu&&ification methods" (;)
APPLICATIONS O" NEURAL NET$OR*S AND "UZZY LOGIC: Pattern Recognition0)mage compression0 (u&&y
Pattern Recognition0 (u&&y )mage compression" (;)
Tota 4!
RE"ERENCES:
#9
-" Laurene (ausette, 5(undamentals of $eural $et.or/s8, Pearson 6ducation, $e. Delhi, 9::@"
9" !imothy Ross, 5(u&&y Logic .ith 6ngineering 3pplications8, CcGra. >ill, Singapore, 9:::"
?" Kimmermann > B, 5(u&&y set theory and its 3pplications8, 3llied Pulishers Ltd, $e. Delhi, -###"
@" RaEase/aran S and DiEayala/shmi Pai G 3, 5$eural $et.or/s, (u&&y Systems and Genetic 3lgorithms8, Prentice
>all of )ndia, $e. Delhi, 9::?"
2" >ay/ins, 5$eural $et.or/s 1 3 ,omprehensive foundation8, Prentice >all of )ndia, $e. Delhi, Second 6dition
9::?"
;" Limin (u, 5$eural $et.or/s in ,omputer )ntelligence8 !ata CcGra. >ill Pulishing ,ompany, $e. Delhi, 9::;"

:#$$9A/09NE31 E#OLUTIONARY COMPUTATION
? : : ?

INTRODUCTION TO E#OLUTIONARY COMPUTATION: +iological and 3rtificial evolution 0 6volutionary computation
and 3) 0 Different historical ranches of 6,0G3s0 6P0 6S0 GP 0 3 simple evolutionary algorithm" (A)
SEARCH AND SELECTION OPERATORS: RecominationJ,rossover for strings0 7ne0point0 multi0point0uniform
crossover operators 0 Cutation for strings0 +it flipping 0 RecominationJ,rossover and mutation rates 0 Recomination for
real0valued representations0 (itness proportional selection and fitness scaling 1 Ran/ing methods 1 !ournament
selection" (-:)
E#OLUTIONARY COM(INATORIAL OPTIMIZATION: !SP 0 6volutionary algorithms for !SPs 1 >yrid evolutionary and
local search algorithms" (;)
THEORETICAL ANALYSIS O" E#OLUTIONARY ALGORITHMS: Schema theorems 0 ,onvergence of 63s 0
,omputational time complexity of 63s 0 $o free lunch theorem" (;)
CONSTRAINT HANDLING: ,ommon techni'ues0 penalty methods0 repair methods 0 3nalysis 0Some examples" (A)
MULTIO(+ECTI#E E#OLUTIONARY OPTIMIZATION: Pareto optimality 1 Culti oEective evolutionary algorithms" (;)

Tota 4!
RE"ERENCES:
-" Golderg and David 6, 5Genetic 3lgorithms in Search" 7ptimi&ation and Cachine learning8, Pearson 6ducation, $e.
Delhi, 9::A"
9" <alyamoy De, 5CultioEective 7ptimi&ation using 6volutionary 3lgorithms8, Bohn Filey H Sons, %S3, 9::?"
?" <o&a, Bohn, Folfgang +an&haf, <umar ,hellapilla, <alyanmoy De, Carco Dorigo, David (ogel, Cax Gar&on, David
Golderg, >itoshi )a and Ric/ Riolo(6ds), 5Genetic Programming8, 3cademic Press Corgan <aufmann, %S3, -##4"
@" Bohn R <o&a, (orrest > +ennett ))), David 3ndre, Cartin 3 <eane, 5Genetic Programming ))):Dar.inian )nvention and
Prolem Solving8 Corgan <aufmann, %S3, -###"

09NN!)/09NE!9 GRID COMPUTING
3 0 0 3
INTRODUCTION: >igh Performance ,omputing, ,luster ,omputing, Ceta0computing, Peer0to0Peer ,omputing, )nternet
,omputing, Grid ,omputing 1 !ypes of grids 0 !he Grid: Past, Present, (uture 0 3 $e. )nfrastructure for 9-st ,entury
Science, Grid 3pplications" (;)

GRID COMPUTING TECHNOLOGY: !he 6volution of the Grid 0 Des/top Grids 0 ,luster Grids 1 >P, Grids 1
,omputational and Data Grids" (;)

THE ANATOMY O" THE GRID: Dirtual organi&ations, Grid architecture and its Relationship to other distriuted
technologies 1 autonomic computing 1 service on demand 1 S73 and the Grid 1 semantic grids 0 Service virtuali&ation 1
)nfrastructure and applications" (#)

THE OPEN GRID SER#ICES ARCHITECTURE 1 IN"RASTRUCTURE: 6volution to 7GS3, Physiology of the Grid:
7GS3 )nfrastructure 0 7GS3 +asic Services, ,reating and Canaging Grid Services, Canaging Grid 6nvironments 0 Grid0
6naling soft.are applications, Grid06naling net.or/ services, Grid Security, Grid Resource Canagement and
Scheduling 0 >igh0level )ntroduction to 7GS), !echnical details of 7GS) specification" (-9)
APPLICATION CASE STUDY: Glous !ool/it 1 3rchitecture, Programming model, Sample )mplementation, >igh Level
Services 1 Study of a cloud computing infrastructure" (#)

Tota 4!
#?
RE"ERENCES:
-" 3hmar 3as, 5Grid ,omputing Practical Guide to !echnology and 3pplications8, (ire.all Cedia, $e. Delhi, 9::4"
9" )an (oster, ,arl <esselman, 5!he Grid : +lueprint for a $e. ,omputing )nfrastructure8, Corgan <aufman, $e. Delhi,
9::;"
?" (ran +erman, Geoffrey (ox, 3nthony >ey B G, 5Grid ,omputing Ca/ing the Gloal )nfrastructure a Reality8, Filey,
%S3, 9::?"
@" Boshy Boseph, ,raig (allenstein, 5Grid ,omputing8, Pearson 6ducation, $e. Delhi, 9::@"
2" Prahu , S R, 5Grid and ,luster ,omputing8, P>) Pvt Ltd, $e. Delhi, 9::4"
;" Bana/iraman, 5Grid ,omputing0Codels, 3 Research Conograph8, !ata Cc Gra. >ill, 9::2"
09NN!9 PERVASIVE COMPUTING
3 0 0 3
CONTE,T-A$ARE COMPUTING: %i'uitousJPervasive ,omputing 1 ,ontext 0 !ypes of context0,ontext a.are
computing and applications 0 Ciddle.are support" (;)
INTRODUCTION TO MO(ILE MIDDLE$ARE: Coile middle.are 0 !he spectrum of adaptation0Resource monitoring 0
,haracteri&ing adaptation strategies 0 Coile agents 03gent architectures 0 Cigration strategies 0 ,ommunication
strategies" (4)
SER#ICE DISCO#ERY MIDDLE$ARE: ,ommon ground 1 Services 0 %niversally uni'ue identifiers 0 Standardi&ation 0
!extual Descriptions 0 )nterfaces for standardi&ation 0 Discovery and advertisement Protocols 0 %nicast discovery 0
Culticast discovery 0 Service catalogs 0 Garage collection 1 6venting 1 Security 0 )nteroperaility" (4)
INTRODUCTION TO ADHOC AND SENSOR NET$OR*S: 7vervie. 0 Properties of an 3dhoc net.or/ 1 %ni'ue
features of sensor net.or/s0Proposed applications 0 ,hallenges 1 ,onstrained resources 1 Security 1 Coility 1
Protocols 1 3uto configuration 0 6nergy efficient communication 0 Coility re'uirements" (4)
APPROACHES AND SOLUTIONS: Deployment and configuration 1 Routing 0 (ault tolerance and reliaility 0 6nergy
efficiency" (2)
PDA IN PER#ASI#E COMPUTING: )ntroduction 0 PD3 soft.are components 1 Standards 0 6merging trends 0 PD3
device characteristics 0 PD3 ased access architecture 1 %ser interface issues 1 3rchitecture 0 Smart card ased
authentication mechanisms 0 Fearale ,omputing 3rchitecture" (A)
Tota 4!
RE"ERENCES:
-" (ran/ 3delstein, Sandeep < S Gupta, Golden G Richard, Loren Sch.ieert, 5(undamentals of Coile and Pervasive
,omputing8, !ata Cc Gra. >ill , $e. Delhi, 9::2"
9" Bochen +ur/hardt, >orst >enn, Stefan >epper, !homas Schaec, <laus Rindtorff, 5Pervasive ,omputing !echnology
and 3rchitecture of Coile )nternet 3pplications8, 3ddison Fesley, $e. Delhi, 9::9"
?" %.e >ansman, Lothat Cer/, Cartin S $ic/lous, !homas Stoer, 5Pervasive ,omputing 0 >andoo/8, Springer0
Derlag, $e. Delhi, 9::?"
@" %.e >ansman, Lothat Cer/, Cartin S $ic/lous, !homas Stoer, 5Principles of Coile ,omputing8, Springer0
Derlag, $e. Delhi, 9::?"
09NN30/09NE22 MOBILE COMMUNICATION
3 0 0 3
INTRODUCTION: )ntroduction to Coile ,omputing, Coile ,omputing 3rchitecture, ,ellular Coile Fireless
$et.or/s: Systems and Design (undamentals, Propagation Codels, Description of cellular system, Propagation Codels
for Fireless $et.or/s, 7vervie. -G, 9G, 9"2G, ?G and @G technologies" (A)

$IRELESS ARCHITECTURES: Gloal System for Coile ,ommunication (GSC): System architecture,
Radio interface, Protocols, Locali&ation and calling, >andover, Security GPRS: GPRS System 3rchitecture and Protocol
layers" )ntroduction to 6DG6" 6merging .ireless net.or/s: %ltra .ide and(%F+)0 (ree space optics((S7)0Coile ad0
hoc net.or/(C3$6!)0Fireless sensor net.or/s07(DC and (lash 7(DC"
(#)

$IRELESS MAC: )nfrared vs" Radio transmission, )nfrastructure and 3d hoc $et.or/s, )666 4:9"-- FL3$: System
architecture, Physical layer, Cedium access control layer, C3, management >)P6RL3$: Protocol architecture, Physical
layer, ,hannel access control" Su layer, Cedium access control Su layer, )nformation ases 3nd $et.or/ingN
+L%6!77!>: %ser scenarios, Physical layer, C3, layer, $et.or/ing" Security, Lin/ Canagement" (#)

#@
MO(ILE NET$OR* LAYER: Coile )P: Goals, assumptions and re'uirements, 6ntities and !erminology, )P pac/et
delivery, 3gent advertisement and discovery, Registration, !unneling and 6ncapsulation, 7ptimi&ations, Reverse
tunneling, )pv;N Dynamic host configuration protocol, 3d hoc "net.or/s: Routing Destination se'uence distance vector,
Dynamic source routing, >ierarchical algorithms, and 3lternative metrics" (#)

MO(ILE DATA (ASE MANAGEMENT: Data ,aching, !ransaction Codels, =uery processing, Data recovery process,
)ssues relating to 'uality of service" F)R6L6SS )$!6R$6! 0 Fe services and moile .e services0Fireless
middle.are0.ireless gate.ay and moile application servers0Fireless 3ccess Protocol(F3P)0F3P protocol layers" (4)

Tota 4!
RE"ERENCES:
-" RaE <amal, 5Coile ,omputing8, 7xford %niversity Press, 9::A"
9" Bochen Schiller, 5Coile ,ommunications8, Pearson 6ducation Limited, 9::?"
?" 3so/e !alu/der, Roopa Lavagal, 5Coile ,omputing8, !ata Cc0Gra. >ill, 9::;"
@" 3mEad %mar/ 5Coile ,omputing and Fireless ,ommunications8, $G6 Solutions, 9::@"
2" Filliam , L Lee,5Coile ,ommunication 6ngineering8, !ata Cc0Gra. >ill, 9::4"
09NN31/09NE33 AGENT (ASED INTELLIGENT SYSTEMS
3 0 0 3
INTRODUCTION: +asic Definitions0 >istory 1 )ntelligent 3gents 1 3gents and 6nvironments 1 Structure of 3gents" (@)

PRO(LEM SOL#ING AGENTS: Searching for Solutions 1 %ninformed Search Strategies 1 )nformed Search strategies
1 online search agents and un/no.n environments 1 ,onstraint satisfaction prolems" (4)

*NO$LEDGE (ASED AGENTS: <no.ledge representation 0 logic 1 proposition 1 )nference 1 (irst order logic 1
)nference in (7L 0 3lgorithms 1 /no.ledge representation )ssues" (4)

PLANNING 1 PRO(A(LISTIC AGENTS: !he planning prolem 1 partial order planning 1 conditional planning 1 multi
agent planning 1 uncertainty and proailistic reasoning" (4)

LEARNING AGENTS: learning from oservations 1 learning decision trees 1 statistical learning methods 1 instance
ased learning 1 neural net.or/ techni'ues for learning" (-:)

AD#ANCED TOPICS: )ntroduction to communicative agents 1 proailistic agents 1 perception and rootics 1 3) future"
(@)

(@)

Tota 4!
RE"ERENCES:
-" Stuart Russel, Peter $orvig, 53rtificial )ntelligence 1 3 Codern 3pproach8, Second edition, Pearson 6ducation, 9::;"
9" Padhy $ P, 53rtificial )ntelligence and )ntelligent Systems8, 7xford %niversity Press, $e. Delhi, 9::2"
?" $ils B $ilsson, 53rtificial )ntelligence 1 3 $e. Synthesis8, Corgan <aufmann, $e. Delhi, 9::A"
@" George ( Luger, 53rtificial )ntelligence 1 Structures and Strategies for ,omplex Prolem Solving8, Pearson
6ducation, $e. Delhi, 9::@"
09NN3! IN"ORMATION STORAGE MANAGEMENT
3 0 0 3
INTRODUCTION TO STORAGE TECHNOLOGY: ,oncepts of storage net.or/ing 0+usiness applications defined for
Storage 0 Sources of Data and states of data creation 0 Data center re'uirements and evolution 0 Canaging complexity 0
)J7 0 Storage infrastructure 0 6volution of storage 0 )nformation lifecycle management" (4)
STORAGE SYSTEMS ARCHITECTURE: Storage architectures0 Device overvie.s0 Peripheral connectivity0 ,omponents
and concepts0 Cagnetic dis/ storage0 Dis/ systems 1Dis/ arrays0 R3)D storage arrays0 Cagnetic tape storage0 Physical
vs" Logical dis/ organi&ation0 ,aching properties and algorithms connectivity options0 Differences in us and net.or/
architectures" (4)

INTRODUCTION TO NET$OR* STORAGE: Putting storage on the $et.or/0 !he $3S >ard.are0 Soft.are
architecture0 $et.or/ connectivity0 $3S as a Storage system0 $3S connectivity options0 ,onnectivity protocols0
Canagement principles0 Storage 3rea $et.or/s: 3rchitecture0 >ard.are devices0 >ost us adaptors0 ,onnectivity0
#2
,ontent 3ddressale Storage (,3S) : 6lements0 ,onnectivity options0 Standards and Canagement principles0 >yrid
storage solutions overvie." (-:)

INTRODUCTION TO IN"ORMATION A#AILA(ILITY: +usiness continuity and disaster recovery asics: Local usiness
continuity techni'ues0 Remote usiness continuity techni'ues0 Storage design and implementation of the +usiness
continuity plan0 Canaging availaility0 Disaster recovery principles H techni'ues" (4)

MANAGING AND STORAGE #IRTUALIZATION: Canaging 3vailaility: 3vailaility metrics implementing the plan finding
the holes maintaining serviceaility capacity planning0 Canagement tools overvie. information security virtuali&ation0
Different virtuali&ation technologies and processes including file and loc/ level virtuali&ation" (4)

Tota 4!
RE"ERENCES:
-" Roert Spalding, 5Storage $et.or/s: !he ,omplete Reference8 !ata CcGra. >ill Pulishing ,ompany, Delhi, 9::?"
9" Gerald B <o.als/i and Car/ ! Cayur/,8 )nformation storage and Retrieval Systems8, Springer, $e. Delhi, 9::;"
?" %lf !roppens, Rainer 6r/ens and Folfgang CPller, 5Storage $et.or/s 6xplained8 Filey H Sons, %S3, 9::@"
@" Carc (arley 7sorne, 5+uilding Storage $et.or/s8, !ata CcGra. >ill Pulishing ,ompany, $e. Delhi, 9:::"
09NN33 EM(EDDED SYSTEMS
3 0 0 3
INTRODUCTION: ,hallenges of 6medded Systems 1 (undamental ,omponents 1 6xamples of 6medded Systems 1
>ard.are (undamentals 1 Gates 1 !iming Diagrams 1Cemory 1 Direct Cemory 3ccess 1 +uses 1 )nterrupts 1
Schematics 1 +uild Process of 6medded Systems" (4)

MEMORY MANAGEMENT AND INTERRUPTS: Cemory 3ccess Procedure 1 !ypes of Cemory 1 Cemory Canagement
Cethods 1 Pointer Related )ssues 1 Polling Dersus )nterrupts 1 !ypes of )nterrupts 1 )nterrupt Latency 1 Reentrancy 1
)nterrupt Priority 1 Programmale )nterrupt ,ontrollers 1 )nterrupt Service Routines" (#)

REAL-TIME OPERATING SYSTEMS: Des/top 7perating Systems Dersus R!7S 1 $eed for +oard Support Pac/ages 1
!as/ Canagement 1 Race ,onditions 1 Priority )nversion 1 Scheduling 1 )nter !as/ ,ommunication 1 !imers 1
Semaphores 1 =ueues" (4)

DESIGN AND IMPLEMENTATION: Re'uirements of an 6medded System 1 3rchitecture Styles and Patterns 1 Design
Practices 1 )mplementation 3spects and ,hoices" >ard.are and Soft.are co0design" (4)
EM(EDDED SO"T$ARE DE#ELOPMENT TOOLS: >ost and !arget Cachines 1 ,ross ,ompilers 1 Lin/er and
Locators for 6medded Soft.are 1 3ddress Resolution 1 Locating Program ,omponents 1 )nitiali&ed Data and ,onstant
Strings 1 PR7C Programmers 1 R7C 6mulators 1(lash Cemory" (#)

Tota 4!
RE"ERENCES:
-" Sriram D )yer, Pan/aE Gupta, 56medded Real0!ime Systems Programming8, !ata CcGra. >ill, $e. Delhi, 9::A"
9" David 6 Simon, 83n 6medded Soft.are Primer8, Pearson 6ducation, $e. Delhi, 9::4"
?" (ran/ Dahid and !ony Givargis, 56medded System Design 1 3 %nified >ard.areJSoft.are )ntroduction8, Bohn Filey
and Sons, $e. Delhi, 9::2"
@" Fayne Folf, 5,omputer as ,omponents: Principles of 6medded ,omputing System Design8, Corgan <aufmann
Pulishers )nc, $e. Delhi, 9::;"
2" RaE/amal , 56medded Systems8, !ata CcGra. >ill, $e. Delhi, 9::4"
09NN34/09NE!& OPEN SOURCE SYSTEMS
3 0 0 3
INTRODUCTION: 7pen source system definition 0 Cerits and demerits of open source soft.are vs" closed source or
proprietary soft.are and free.are 1 soft.are licensing and intellectual property rights" (;)
OPEN SOURCE OPERATING SYSTEMS: 7penSolaris, 7penDar.in, C)$)O, >ai/u, Linux 1 General overvie. 1 <ernel
types 0 architectures 0 Supported file systems 0 net.or/ing technologies 0 Security features" (#)
OPEN SOURCE DATA(ASES: CyS=L, PostgreS=L, CaxD+, (ireird, )ngres 1 general properties 0 S=L standard
compliance 0 supported platforms 0 programming interfaces" (#)
OPEN SOURCE PROGRAMMING LANGUAGES: Perl, P>P, Python, Ruy 1 General features 0 Syntax and Style 0
6xecution 6nvironment 0 Programming in .e environment 1 (ile handling and data storage" (#)
OPEN SOURCE TOOLS AND TECHNOLOGIES: 3pache Fe server, Co&illa (irefox, Fi/ipedia, 6clipse soft.are
development platform" (#)
#;

Tota 4!
RE"ERENCES:
-" ,hris Di+ona, Car/ Stone, Danese ,ooper, 57pen Sources 9":, !he ,ontinuing 6volution8, 7MReilly Cedia, )nc",
9::4"
9" Greg <roa >artman, 5Linux <ernel in 3 $utshell8, Shroff Pulishers and Distriutors, 9::A"
?" !im ,onverse, Boyce Par/, ,lar/ Corgan, 5P>P 2 and CLS=L +ile8, Filey Dream !ech, 9::2"
@" Fesley B ,hun, 5,ore Phython Programming8, Second edition, Pearson 6ducation 3sia, 9::A"
2" Bames Lee, +rent Fare, 57pen Source Development .ith L3CP: %sing Linux, 3pache, CyS=L, Perl and P>P8,
3ddison 0 Fesley Professional, 9::4"
09NN3% SO"T$ARE TESTING AND QUALITY ASSURANCE
3 0 0 3
TESTING "UNDAMENTALS: Principles of testing 1 !est Plan 1 !est case development 1 !ypes of soft.are !esting 1
!esting 7Eect 7riented systems" (4)

TESTING STRATEGIES: Fhite0ox !esting 1 Statement coverage 1 +ranch coverage 1 Cutation testing 1 +lac/0ox
!esting 1 +oundary value 3nalysis 1 6'uivalence Partitioning 1 Levels of !esting 1 %nit, )ntegration and System !esting 1
Derification and Dalidation" (#)
TEST MANAGEMENT AND AUTOMATION: People and organi&ational issues 1 7rgani&ation structure for !esting teams
1 soft.are test automation 0 scope of automation 1 !est automation tools 1 Generic re'uirement for test toolJframe.or/ 1
Selecting a test tool 0 ,hallenges in automation" (#)

SO"T$ARE QUALITY ASSURANCE: Soft.are 'uality concepts 1 ,ost of 'uality 1 Soft.are =uality 3ssurance Group 1
(ormal technical revie.s 1 =uality standards" (4)

SO"T$ARE QUALITY MANAGEMENT: Soft.are =uality Cetrics 1 Product =uality 1 Process =uality 1 =uality
Canagement Codels 1 Rayleigh Codel 1 Prolem !rac/ing Report Codel 1 Reliaility Gro.th Codel 1 ,ase studies" (4)

Tota 4!
RE"ERENCES:
-" Gopalas.amy Ramesh, Srinivasan Desi/an, 5Soft.are !esting: Principles and Practices8, Pearson 6ducation, $e.
Delhi, 9::A"
9" $ina S Godole 5Soft.are =uality 3ssurance: Principles and Practice8, $arosa Pulishers, $e. Delhi, 9::@"
?" Stephen > <an, 5Cetrics and Codels in Soft.are =uality 6ngineering8, Pearson 6ducation, $e. Delhi, 9::9"
@" ,em <aner, Bac/ (al/, >ung =uoc $guyen, 5!esting ,omputer Soft.are8, ,omdex, $e. Delhi, 9::9"
2" Filliam 6 Perry, 56ffective Cethods for Soft.are !esting8, Filey, $e. Lor/, 9::A"
09NN3& DATA $AREHOUSING AND MINING
3 0 0 3
INTRODUCTION: Cotivation 1 Data Cining (unctionalities 1 ,lassification on data mining systems 1 !as/ Primitives 1
CaEor )ssues 0 Data Preprocessing" (@)

DATA $AREHOUSE AND OLAP: Data .arehouse 1 Cultidimensional data model 1 Data Farehouse architecture 1
7L3P !echnology 1 Data ,ue ,omputation" (4)

ASSOCIATION ANALYSIS: +asic ,oncepts 1 (re'uent )tem set mining methods 0 !ypes of association rules" (A)

CLASSI"ICATION: )ntroduction 1 Statistics and Proaility 0 Decision !ree )nduction 1 +ayesian ,lassification 1
,lassification y +ac/ propagation 1 Rule +ased ,lassification 1 Support Dector Cachines" (#)

CLUSTER ANALYSIS: Partitioning methods 1 >ierarchical Cethods 1 Density ased methods 0 $eural $et.or/ +ased
Cethods" (4)

AD#ANCED TOPICS: )ntroduction to spatial data mining 1 !ext Cining 1 Fe Cining" (;)
Tota 4!
RE"ERENCES:
-" Bai.ei >an, Cicheline <amer, 5Data Cining: ,oncepts and !echni'ues8, 6lsevier, 9::;"
9" RaEan ,hattamvelli, 5Data Cining Cethods8, $arosa, 9::#"
#A
?" Pang0$ing !an, Cichael Steinach, Q)ntroduction to Data CiningQ, 3ddision Fesley, 9::;"
@" Cargaret Dunham, 5Data Cining: )ntroductory and 3dvanced !opics8, Pearson 6ducation, $e. Delhi, 9::A"
2" 3lex +erson, 5Data Farehousing, Data Cining and 7L3P,8!ata Cc Gra. >ill , 9::@"
09NN3' SO"T$ARE ARCHITECTURE
3 0 0 3
DESIGN PRINCIPLES: Programming revie. and introduction to soft.are design 1 !he %nified Codeling Language 1
,orrectness and roustness of design 1 (lexiility, Reusaility and 6fficiency" (4)

DESIGN PATTERNS: )ntroduction to design Patterns 1 ,reational Design Patterns 1 Structural Design Patterns 1
+ehavioral Design Patterns" (-:)

EN#ISIONING ARCHITECTURE: 3rchitecture +usiness ,ycle 1 7vervie. of 3rchitecture 1 ,ase study" (;)

CREATING AN ARCHITECTURE: %nderstanding =uality 3ttriutes 1 3chieving =ualities 1 3rchitectural Design 1
Documenting Soft.are 3rchitecture 1 Reconstruction" (-:)


ANALYZING ARCHITECTURES: 3rchitecture 6valuation 1 Design Decision Ca/ing 1 )nteroperaility 1 ,ase study" (4)

Tota 4!
RE"ERENCES:
-" 6ric +raude, 5Soft.are Design 1 from Programming to 3rchitecture8, Bohn Filey H Sons, )nc, 9::2"
9" Len +ass, Paul ,lements, 5Soft.are 3rchitecture in Practice8, Pearson 6ducation, 9::;"
SEMINAR
09NN41 INDUSTRIAL #ISIT AND TECHNICAL SEMINAR
1 0 ! !
!he student .ill ma/e atleast t.o technical presentations on current topics related to the speciali&ation" !he same .ill e
assessed y a committee appointed y the department" !he students are expected to sumit a report at the end of the
semester covering the various aspects of hisJher presentation together .ith the oservation in industry visits" 3 'ui&
covering the aove .ill e held at the end of the semester"
PRACTICALS
09NN%1 DATA STRUCTURES LA(ORATORY
0 0 3 !
Students .ill e assigned .ith an application that employs the use of data structures in prolem solving" !ypical
applications includeN
-" Solving Ca&e Prolem 1 Stac/"
9" !raffic Signal Simulation 1 =ueue"
?" Sparse Catrix Canipulation 1 Lin/ed Lists"
@" ,reating 7ptimal +inary Search !rees 1 !rees"
2" P6R! 1 Graph"
;" Dictionary 3pplication 1 >ashing"
A" Simulation of various sorting techni'ues"
09NN%! RD(MS LA(ORATORY
0 0 3 !
-" )mplementation of DDL and DCL 'ueries in S=L"
9" ,reate an 6mployee dataase to set various constraints"
?" )mpose restrictions on 'ueries for security reasons"
@" %se Rollac/, ,ommit, save point, Grant and Revo/e commands"
2" Developing applications effectively using RD+CS concepts"
#4
09NN%3 DISTRI(UTED COMPUTING LA(ORATORY
0 0 3 !
-" Developing Distriuted applications using ,7R+3"
9" Programs in Distriuted 7Eect !echnology such as ,7C, D,7C and RC)"
?" 3pplication Development using B966"
@" Fe Services Programming"
2" Cini ProEect .or/ supporting distriuted programming concepts"
09NN%4 SO"T$ARE DE#ELOPMENT LA(ORATORY
0 0 3 !
3nalysis ,Design and )mplementation of Soft.are system involving an application domain"
Sample systems are:
-" ,ore +an/ing
9" >ealth ,are System
?" e0learning"
@" e0,ommerce"
2" 6nterprise Resource Planning Codules
;" Canagement )nformation System
##

Vous aimerez peut-être aussi