39
ANNA UNIVERSITY OF TECHNOLOGY MADURAI MADURAI 625 002 REGULATIONS 2010 CURRICULUM AND SYLLABI M.E. COMPUTER SCIENCE AND ENGINEERING SEMESTER III SEMESTER IV S.NO COURSE CODE COURSE TITLE L T P C THEORY 1 10244CS201 Advanced Distributed Computing 3 0 0 3 2 10244CS202 Soft Computing and Simulators 3 0 0 3 3 10244CS203 Computer Network Security 3 0 0 3 PRACTICAL 4 10244CS208 Soft Computing & Network Security Laboratory 0 0 3 2 S.NO COURSE CODE COURSE TITLE L T P C THEORY 1 10244CS204 Compiler Design 3 0 0 3 2 E02 Elective II 3 0 0 3 3 E03 Elective III 3 0 0 3 PRACTICAL 4 10244CS207 Compiler Laboratory 0 0 3 2

ANNA UNIVERSITY OF TECHNOLOGY MADURAI ...autmdu.ac.in/syllabus/COMPUTERSCIENCEENGINEERINGPT.pdfRole of a Parser – Context Free Grammars – Top:Down Parsing – Bottom:Up Parsing

  • Upload
    vodung

  • View
    222

  • Download
    0

Embed Size (px)

Citation preview

Page 1: ANNA UNIVERSITY OF TECHNOLOGY MADURAI ...autmdu.ac.in/syllabus/COMPUTERSCIENCEENGINEERINGPT.pdfRole of a Parser – Context Free Grammars – Top:Down Parsing – Bottom:Up Parsing

ANNA UNIVERSITY OF TECHNOLOGY MADURAI MADURAI 625 002

REGULATIONS 2010

CURRICULUM AND SYLLABI

M.E. – COMPUTER SCIENCE AND ENGINEERING

SEMESTER III

SEMESTER IV

S.NO COURSE

CODE COURSE TITLE L T P

C

THEORY

1 10244CS201 Advanced Distributed Computing 3 0 0 3

2 10244CS202 Soft Computing and Simulators 3 0 0 3

3 10244CS203 Computer Network Security 3 0 0 3

PRACTICAL

4 10244CS208 Soft Computing & Network Security Laboratory

0 0 3 2

S.NO COURSE

CODE COURSE TITLE L T P

C

THEORY

1 10244CS204 Compiler Design 3 0 0 3

2 E02 Elective II 3 0 0 3

3 E03 Elective III 3 0 0 3

PRACTICAL

4 10244CS207 Compiler Laboratory 0 0 3 2

Page 2: ANNA UNIVERSITY OF TECHNOLOGY MADURAI ...autmdu.ac.in/syllabus/COMPUTERSCIENCEENGINEERINGPT.pdfRole of a Parser – Context Free Grammars – Top:Down Parsing – Bottom:Up Parsing

SEMESTER V

SEMESTER VI

S.NO COURSE

CODE COURSE TITLE L T P

C

1 10244CS301 Virtualization and Cloud

Computing 3 0 0 3

2 E04 Elective IV 3 0 0 3

3 E05 Elective V 3 0 0 3

PRACTICAL

4 10244CS304 Project Thesis – Phase I 0 0 0 5

TOTAL 14

S.NO COURSE

CODE COURSE TITLE L T P

C

PRACTICAL 1 10244CS401 Project Thesis – Phase II 0 0 0 12

TOTAL 12

Page 3: ANNA UNIVERSITY OF TECHNOLOGY MADURAI ...autmdu.ac.in/syllabus/COMPUTERSCIENCEENGINEERINGPT.pdfRole of a Parser – Context Free Grammars – Top:Down Parsing – Bottom:Up Parsing

List of Electives

S.NO COURSE

CODE COURSE TITLE L T P

C

ELECTIVE II (E02)

10244CSE21 Open Source Systems 3 0 0 3

10244CSE22 Software Project Management 3 0 0 3

10244CSE23 XML & Web Services 3 0 0 3

10244CSE24 Middleware technologies 3 0 0 3

10244CSE25 Parallel computing and Multicore

technologies 3 0 0 3

ELECTIVE III (E03)

10244CSE31 Mobile Technologies 3 0 0 3

10244CSE32 Software reliability and project

management 3 0 0 3

10244CSE33 E:Commerce 3 0 0 3

10244CSE34 Real time systems 3 0 0 3

10244CSE35 Network System Design Using

Network Processor 3 0 0 3

ELECTIVE IV (E04)

10244CSE41 Embedded Systems 3 0 0 3

10244CSE42 Operation research 3 0 0 3

10244CSE43 Adhoc Networks 3 0 0 3

10244CSE44 Bioinformatics 3 0 0 3

10244CSE45 Recent trends in Mobile computing

3 0 0 3

10244CSE46 Semantic Web 3 0 0 3

ELECTIVE V (E05)

10244CSE51 Data Warehousing and Data

Mining 3 0 0 3

10244CSE52 Agent based intelligent Systems 3 0 0 3

10244CSE53 High speed networks 3 0 0 3

10244CSE54 Decision support systems 3 0 0 3

10244CSE55 Fault tolerant systems 3 0 0 3

10244CSE56 Grid Computing 3 0 0 3

10244CSE57 Wireless Sensor networks 3 0 0 3

Page 4: ANNA UNIVERSITY OF TECHNOLOGY MADURAI ...autmdu.ac.in/syllabus/COMPUTERSCIENCEENGINEERINGPT.pdfRole of a Parser – Context Free Grammars – Top:Down Parsing – Bottom:Up Parsing

10244CS201 ADVANCED DISTRIBUTED COMPUTING

L T P C

3 0 0 3

UNIT I FUNDAMENTALS 9

Characterization of Distributed Systems – Examples – Resource Sharing and the Web –

Challenges – System Models – Architectural and Fundamental Models –Interprocess

Communication – The API for the Internet Protocols – External Data Representation and

Marshalling – Client–Server Communication – Group Communication – Case Study –

Distributed Objects and Remote Invocation – Communication between Distributed Objects –

Remote Procedure Call – Events and Notifications – Java RMI – Case Study.

UNIT II OPERATING SYSTEM ISSUES I 9

The OS Layer – Protection – Processes and Threads – Communication and Invocation – OS

Architecture – Security – Overview – Cryptographic Algorithms – Digital Signatures –

Cryptography Pragmatics – Case Studies – Distributed File Systems – File Service Architecture–

Sun Network File System – The Andrew File System.

UNIT III OPERATING SYSTEM ISSUES II 9

Name Services – Domain Name System – Directory and Discovery Services – Global Name

Service – X.500 Directory Service – Clocks – Events and Process States – Synchronizing

Physical Clocks – Logical Time and Logical Clocks – Global States – Distributed Debugging –

Distributed Mutual Exclusion – Elections – Multicast Communication Related Problems.

UNIT IV DISTRIBUTED TRANSACTION PROCESSING 9

Transactions – Nested Transactions – Locks – Optimistic Concurrency Control – Timestamp

Ordering – Comparison – Flat and Nested Distributed Transactions – Atomic Commit Protocols

–Concurrency Control in Distributed Transactions – Distributed Deadlocks – Transaction

Recovery –Overview of Replication and Distributed Multimedia Systems.

UNIT V PARALLEL PROGRAMMING USING MPI 9

Parallel Architectures : Parallel Algorithm Design : Message:Passing Programming :

Shared:memory Programming : Combining MPI and OpenMP : Matrix Multiplication

Total: 45

REFERENCES:

1. George Coulouris, Jean Dollimore and Tim Kindberg, ―Distributed Systems Concepts

and Design‖, Pearson Education, 3rd Edition, 2002.

2. Sape Mullender, ―Distributed Systems‖, Addison Wesley, 2nd Edition, 1993.

3. Albert Fleishman, ―Distributed Systems Software Design and Implementation‖, Springer

Verlag, 1994.

4. M. L .Liu, ―Distributed Computing Principles and Applications‖, Pearson Education,

2004.

Page 5: ANNA UNIVERSITY OF TECHNOLOGY MADURAI ...autmdu.ac.in/syllabus/COMPUTERSCIENCEENGINEERINGPT.pdfRole of a Parser – Context Free Grammars – Top:Down Parsing – Bottom:Up Parsing

5. Andrew S Tanenbaum, Maartenvan Steen, ―Distributed Systems, Principles and

Pardigms‖, Pearson Education, 2002.

6. Mukesh Singhal, Niranjan G Shivaratri, ―Advanced Concepts in Operating Systems‖,

Tata McGraw Hill Edition, 2001.

7. Michael Quinn, ―Parallel Programming In C With Mpi And Open Mp‖, Tata Mcgraw

Hill, 2003

10244CS202 SOFT COMPUTING AND SIMULATORS

L T P C

3 0 0 3

UNIT I INTRODUCTION TO SOFT COMPUTING AND NEURAL NETWORKS 9

Evolution of Computing : Soft Computing Constituents – From Conventional AI to Computational Intelligence : Machine Learning Basics

UNIT II FUZZY LOGIC 9

Fuzzy Sets – Operations on Fuzzy Sets – Fuzzy Relations – Membership Functions: Fuzzy Rules

and Fuzzy Reasoning – Fuzzy Inference Systems – Fuzzy Expert Systems – Fuzzy Decision Making.

UNIT III NEURAL NETWORKS 9

Machine Learning Using Neural Network, Adaptive Networks – Feed forward Networks –

Supervised Learning Neural Networks – Radial Basis Function Networks : Reinforcement

Learning – Unsupervised Learning Neural Networks – Adaptive Resonance architectures –

Advances in Neural networks.

UNIT IV GENETIC ALGORITHMS 9

Introduction to Genetic Algorithms (GA) – Applications of GA in Machine Learning : Machine

Learning Approach to Knowledge Acquisition.

UNIT V MATLAB 9

Introduction to Matlab – Matlab Workspace – Arrays and array operations – Functions and Files

– Study of neural network toolbox and fuzzy logic toolbox – Simple implementation of Artificial Neural Network and Fuzzy Logic.

TOTAL : 45

Page 6: ANNA UNIVERSITY OF TECHNOLOGY MADURAI ...autmdu.ac.in/syllabus/COMPUTERSCIENCEENGINEERINGPT.pdfRole of a Parser – Context Free Grammars – Top:Down Parsing – Bottom:Up Parsing

REFERENCES:

1. Jyh:Shing Roger Jang, Chuen:Tsai Sun, Eiji Mizutani, ―Neuro:Fuzzy and Soft

Computing‖, Prentice:Hall of India, 2003.

2. George J. Klir and Bo Yuan, ―Fuzzy Sets and Fuzzy Logic:Theory and Applications‖,

Prentice Hall, 1995.

3. James A. Freeman and David M. Skapura, ―Neural Networks Algorithms, Applications,

and Programming Techniques‖, Pearson Edn., 2003.

4. Melanie Mitchell, ‘An introduction to Genetic Algorithm‘, Prentice:Hall of India, New

Delhi, Edition: 2004

5. S.Rajasekaran and G.A Vijayalakshmi Pai,‘Neural Networks, Fuzzy logic and Genetic

Algorithms, Synthesis and Applications‘, Prentice Hall of India, New Delhi:2003.

6. MATLAB Toolkit Manual

10244CS203 COMPUTER NETWORK SECURITY

L T P C

3 0 0 3

UNIT I FUNDAMENTALS

Introduction – Services, Mechanisms and Attacks, OSI security Architecture – Classical

Encryption Techniques – Stegnography – Block Ciphers and Data Encryption Standard – Block

Cipher Principles : Advanced Encryption Standard – AES Cipher; Contemporary Symmetric

Ciphers: Triple DES, Blowfish, RC5, Characteristics of Advanced Symmetric Block Ciphers,

RC4 Stream Cipher; Confidentiality using Symmetric Encryption: Placement of Encryption

Function, Traffic Confidentiality, Key Distribution, and Random Number Generation.

UNIT II PUBLIC:KEY ENCRYPTION AND HASH FUNCTIONS

Public Key Cryptography and RSA: Principles of Public Key Cryptosystems, RSA Algorithm;

Key Management and other public key cryptosystems: Key Management, Diffie:Hellman Key

Exchange, Elliptic Curve arithmetic, Elliptic Curve Cryptography; Message Authentication and

Hash Functions: Authentication Requirements, Authentication Functions, Message

Authentication Codes, Hash Functions and MACs; Hash Algorithms: MD5 Message Digest

Algorithm; Secure Hash Algorithm, RIPEMD 160, HMAC; Digital Signatures and

Authentication Protocols: Digital Signatures, Authentication Protocols, Digital Signature

Standards.

UNIT III NETWORK SECURITY PRACTICE

Authentication Applications: Kerberos, X.509 Authentication Service; Electronic Mail Security:

Pretty Good Privacy, S/MIME; IP Security: IP Security Overview, IP Security Architecture,

Authentication Header, Encapsulating Security Payload, Combining Security Associations; Web

Security: Web Security Considerations, Secure Sockets Layer and Transport Layer Security,

Secure Electronic Transaction.

UNIT IV SYSTEM SECURITY

Page 7: ANNA UNIVERSITY OF TECHNOLOGY MADURAI ...autmdu.ac.in/syllabus/COMPUTERSCIENCEENGINEERINGPT.pdfRole of a Parser – Context Free Grammars – Top:Down Parsing – Bottom:Up Parsing

Intruders: Intruder Detection, Password Management; Malicious Software: Virus and Related

Threats, Virus Counter Measures; Firewalls: Firewall Design Principles, Trusted Systems.

UNIT V COMPUTER PRIVACY

Privacy at Risk – Privacy at Home – Privacy on the NET – Privacy at Work – Privacy in Public –

Privacy in the Future.

TOTAL:45

REFERENCES

1. William Stallings, ―Cryptography and Network Security‖, 3ed. Prentice Hall of India, New

Delhi ,2004

2. William Stallings, ―Network Security Essentials‖, 2 ed. Prentice Hall of India, New Delhi,

2004

3. Charlie Kaufman , ―Network Security: Private Communication in Public World‖, 2 ed.

Prentice Hall of India, New Delhi ,2004

4. Dan Tynan, Computer Privacy Annoyances, O‘Reilly Media, July 2005

10244CS204 COMPILER DESIGN

L T P C

3 0 0 3

UNIT I LEXICAL ANALYSIS

Compilers – Analysis of Source Program : Phases of Compiler – Compiler Construction Tools –

Role of a Lexical Analyzer – Specification and Recognition of Tokens – Finite Automata –

Regular Expression to Finite Automation.

UNIT II SYNTAX ANALYSIS

Role of a Parser – Context Free Grammars – Top:Down Parsing – Bottom:Up Parsing – LEX

and YACC.

UNIT III INTERMEDIATE CODE GENERATION

Intermediate Languages – Declaration – Assignment Statements – Boolean Expressions – Flow

Control Statements – Back Patching.

UNIT IV CODE OPTIMIZATION

Code Optimization – Principal Sources of Optimization – Basic Blocks and Flow Graphs

Optimization of Basic Blocks – Code Improving Transformations.

UNIT V CODE GENERATION

Issues in the Design of a Code Generator – Run:Time Storage Management – Next Use

Information – A Simple Code Generator – DAG Representation of Basic Blocks – Peephole

Optimization – Code Generation from DAG.

TOTAL:45

REFERENCES

Page 8: ANNA UNIVERSITY OF TECHNOLOGY MADURAI ...autmdu.ac.in/syllabus/COMPUTERSCIENCEENGINEERINGPT.pdfRole of a Parser – Context Free Grammars – Top:Down Parsing – Bottom:Up Parsing

1. A.V. Aho, Ravi Sethi, J. D. Ullman, ―Compilers : Principles, Techniques and Tools‖,

Addison:Wesley Publishing Company, 1988.

2. Allen I. Holub, ―Compiler Design in C‖, Prentice Hall of India, 1993.

3. Fischer Leblanc, ―Crafting Compiler‖, Benjamin Cummings, Menlo Park,1988

10244CS207 COMPILER LABORATORY

1. Implementation of a Lexical Analyser

2. Computation of FIRST and FOLLOW sets

3. Construction of Predictive Parsing Table

4. Implementation of Shift Reduce Parsing

5. Computation of Leading and Trailing Sets

6. Computation of LR(0) items

7. Construction of DAG

8. Intermediate Code Generation

9. Use YACC and LEX to implement a parser for the same grammar as given in problem

10. Implement a recursive descent parser for an expression grammar that generates arithmetic

expressions with digits, + and *. 11. Use LEX tool to implement a lexical analyzer.

12. Write semantic rules to the YACC program in problem 5 and implement a calculator

that takes an expression with digits, + and * and computes and prints its value.

13. Implement the front end of a compiler that generates the three address code for a simple

language with: one data type integer, arithmetic operators, relational operators, variable

declaration statement, one conditional construct, one iterative construct and assignment

statement.

14. Implement the back end of the compiler which takes the three address code generated

in problem 13, and produces the 8086 assembly language instructions that can be

assembled and run using a 8086 assembler. The target assembly instructions can be

simple move, add, sub, jump. Also simple addressing modes are used.

Note: Use ‘C’ compiler to implement 1 – 8 and Lex & Yacc tool for the rest.

10244CS208 SOFT COMPUTING & NETWORK SECURITY LAB

1. Implementation of any two Symmetric Key Algorithms

2. Implement RSA algorithm

3. Analyse the components of a Digital Certificate and Display it.

Page 9: ANNA UNIVERSITY OF TECHNOLOGY MADURAI ...autmdu.ac.in/syllabus/COMPUTERSCIENCEENGINEERINGPT.pdfRole of a Parser – Context Free Grammars – Top:Down Parsing – Bottom:Up Parsing

4. Capture and Analyze the Network traffic using Packet Analyser Tools.

5. Design and Simulate any one Arificial Neural Netwrok using MATLAB

6. Implementation of any one Real Time Problem using GA

7. Design and Simulate any one Real Time Problem using Fuzzy Based Systems.

Note: Use ‘Java / Dot NET’ compiler to implement 1 – 3 and MATLAB tool for 5 – 7

and Wire Shark or any tool for 4.

SEMESTER III

10244CS301 VIRTUALIZATION AND CLOUD COMPUTING

L T P C

3 0 0 3

UNIT I CLOUD COMPUTING

Understanding the Cloud Computing – Cloud Architecture – Cloud Storage – Advantages,

Disadvantages of Cloud Computing – Companies in the Cloud Today – Developing Cloud

Services – Web:Based Application – Pros and Cons of Cloud Service Development – Types of

Cloud Service Development – Software as a Service – Platform as a Service – Web Services –

On:Demand Computing – Discovering Cloud Services Development Services and Tools –

Amazon Ec2 – Google App Engine – IBM Clouds

UNIT II CLOUD COMPUTING FOR EVERYONE

Centralizing Email Communications – Collaborating on Schedules, To:Do Lists, Contact Lists

and Group Projects and Events – Cloud Computing for the Community and Corporation, Using

Cloud Services: Collaborating on Calendars, Schedules and Task Management – Exploring

Online Scheduling Applications, Online Planning and Task Management – Collaborating on

Event Management, Contact Management, Project Management, Word Processing and

Databases – Storing and Sharing Files

UNIT III VIRTUALIZATION & CLOUD COMPUTING *

Virtualization & Cloud Computing Overview – Case Study: Enterprise Virtualization & Cloud

Computing – Definitions – Hypervisor / Virtual Machine Monitor Architecture – CPU

Virtualization Extensions – Network and Storage Virtualization Architecture

UNIT IV VIRTUALIZED ENTERPRISE *

Smashing the Virtualized Stack – Case Study: Owning the Virtualized Enterprise – CPU &

Chipsets – VMM/Hypervisor/Host – VMs/Guest – Control & Management planes & APIs.

UNIT V CLOUD SECURITY AND PRIVACY

Page 10: ANNA UNIVERSITY OF TECHNOLOGY MADURAI ...autmdu.ac.in/syllabus/COMPUTERSCIENCEENGINEERINGPT.pdfRole of a Parser – Context Free Grammars – Top:Down Parsing – Bottom:Up Parsing

Infrastructure security – Data Security and Storage – Identity and access management – Security

management in the cloud – privacy – Security as a cloud service.

TOTAL:45

REFERENCES

1. Michael Miller, Cloud Computing: Web:Based Applications That Change the Way You

Work and Collaborate Online, Que Publishing, August 2008.

2. Christofer Hoff, Rich Mogull, Craig Balding, Hacking Exposed: Virtualization & Cloud

Computing: Secrets & Solutions [Paperback], McGraw:Hill Osborne (20 Jan 2012) *

3. Haley Beard, Cloud Computing Best Practices for Managing and Measuring Processes

for On:demand Computing, Applications and Data Centers in the Cloud with SLAs,

Emereo Pty Limited, July 2008.

4. Tim Mather, Subra Kumaraswamy, Shahed Latif, Cloud Security and Privacy – An

Enterprise Perspective on Risks and Compliance, By O'Reilly Media, 2009

10244CSE11 OBJECT ORIENTED SYSTEMS ENGINEERING

L T P C

3 0 0 3

UNIT I CLASSICAL PARADIGM

System Concepts – Project Organization – Communication – Project Management

UNIT II PROCESS MODELS

Life cycle models – Unified Process – Iterative and Incremental – Workflow – Agile Processes

UNIT III ANALYSIS

Requirements Elicitation – Use Cases – Unified Modeling Language, Tools – Analysis Object

Model (Domain Model) – Analysis Dynamic Models – Non:functional requirements – Analysis

Patterns

UNIT IV DESIGN

System Design, Architecture – Design Principles : Design Patterns – Dynamic Object Modeling

– Static Object Modeling – Interface Specification – Object Constraint Language

UNIT V IMPLEMENTATION, DEPLOYMENT AND MAINTENANCE

Mapping Design (Models) to Code – Testing : Usability – Deployment – Configuration

Management – Maintenance

Total: 45

REFERENCES

Page 11: ANNA UNIVERSITY OF TECHNOLOGY MADURAI ...autmdu.ac.in/syllabus/COMPUTERSCIENCEENGINEERINGPT.pdfRole of a Parser – Context Free Grammars – Top:Down Parsing – Bottom:Up Parsing

1. Bernd Bruegge, Alan H Dutoit, Object:Oriented Software Engineering, 2nd

ed, Pearson

Education, 2004.

2. Craig Larman, Applying UML and Patterns 3rd

ed, Pearson Education, 2005.

3. Stephen Schach, Software Engineering 7th ed, McGraw:Hill, 2007.

4. Ivar Jacobson, Grady Booch, James Rumbaugh, The Unified Software Development

Process, Pearson Education, 1999.

5. Alistair Cockburn, Agile Software Development 2nd

ed, Pearson Education, 2007.

10244CSE12 MULTIMEDIA SYSTEMS

L T P C

3 0 0 3

UNIT I INTRODUCTION AND QOS 9

Introduction:QOS Requirements and Constraints:Concepts:Resources: Establishment

hase:Run:Time Phase:Management Architectures.

UNIT II OPERATING SYSTEMS 9

Real:Time Processing:Scheduling:Interprocess Communication:Memory and anagement:Server

Architecture:Disk Management.

UNIT III FILE SYSTEMS AND NETWORKS 9

Traditional and Multimedia File Systems:Caching Policy:Batching:Piggy backing

thernet:Gigabit Ethernet:Token Ring:100VG AnyLAN:Fiber Distributed Data Interface

(FDDI): ATM Networks:MAN:WAN.

UNIT IV COMMUNICATION 9

Transport Subsystem:Protocol Support for QOS:Transport of Multimedia:Computer upported

Cooperative Work:Architecture:Session Management:MBone Applications.

UNIT V SYNCHRONIZATION 9

Synchronization in Multimedia Systems:Presentation:Synchronization Types:Multimedia

ynchronization Methods:Case Studies:MHEG:MODE:ACME.

Total: 45

REFERENCES

1. Ralf Steinmetz and Klara Nahrstedt, ―Multimedia Systems‖, Springer, I Edition 2004.

2. Ralf Steinmetz and Klara Nahrstedt, Media Coding and Content Processing, Prentice hall,

2002.

3. Vaughan Taeltimedia, Tata McGraw Hill, 1999.

4. Mark J.B., Sandra K.M., Multimedia Applications Development using DVI echnology,

McGraw Hill, 1992.

Page 12: ANNA UNIVERSITY OF TECHNOLOGY MADURAI ...autmdu.ac.in/syllabus/COMPUTERSCIENCEENGINEERINGPT.pdfRole of a Parser – Context Free Grammars – Top:Down Parsing – Bottom:Up Parsing

5. K. R. Rao, Zoran S. Bojkovic, Dragorad A. Milovacovic, D. A. Milovacovic , ultimedia

Communication Systems: Techniques, Standards, and Networks, Prentice Hall, 1st

Edition, 2002

6. Ze:Nian Li and Mark S. Drew, Fundamentals of Multimedia, Pearson, 2004.

10244CSE13 ADVANCED JAVA TECHNOLOGY

L T P C

3 0 0 3

UNIT I JAVA FUNDAMENTALS 9

Java Virtual Machine – Reflection – I/O Streaming – Filter And Pipe Streams – Byte Codes –

Byte Code : Interpretation – Dynamic Reflexive Classes – Threading – Java Native Interfaces –

GUI Applications.

UNIT II NETWORK PROGRAMMING IN JAVA 9

Stream Customization – Sockets – Secure Sockets – Custom Sockets – UDP Datagrams –

Multicast Sockets – URL Classes – Reading Data From The Server – Writing Data –

Configuring The Connection – Reading The Header – Content Handlers – Telnet Application –

Java Messaging Services.

UNIT III DISTRIBUTED COMPUTING IN JAVA 9

Remote Method Invocation – Activation Models – RMI Custom Sockets – Object Serialization –

Call Back Model – RMI – IIOP Implementation – CORBA – IDL Technology – Naming

Services – CORBA Programming Models – JAR File Creation.

UNIT IV MULTI – TIER APPLICATION DEVELOPMENT 9

Server Side Programming – Servlets – Session Management – Cookies – HTTP Communication

– JDBC – Multimedia Data Handling – Java Media Framework – Enterprise Applications.

UNIT V MOBILE APPLICATION DEVELOPMENT 9

Mobile Information Device Profile – Deployment Of Mobile Objects – Foundation Profile –

RMI Profile For Mobile Devices – Development Of Midlets – Mobile Networking Applications.

TOTAL: 45

REFERENCES

1. Elliotte Rusty Harold, ―Java Network Programming‖, O‘Reilly Publishers, 2000.

2. Cay S.Horstmann, Gary Cornell, ―Core Java, Volume 1 And 2‖, 5th Edition, Pearson

Education Publishers, 2003.

3. Topley, ―J2ME In A Nutshell‖, O‘Reilly Publishers, 2002.

4. Hunt, ―Guide to J2EE Enterprise Java‖, Springer Publications, 2004.

Page 13: ANNA UNIVERSITY OF TECHNOLOGY MADURAI ...autmdu.ac.in/syllabus/COMPUTERSCIENCEENGINEERINGPT.pdfRole of a Parser – Context Free Grammars – Top:Down Parsing – Bottom:Up Parsing

5. Ed Roman, ―Enterprise Java Beans‖, Wiley Publishers, 1998.

6. Avstin, ―Advance Programming For The Java2 Platform‖ ‗Pearson Education, 2001.

10244CME13 DIGITAL IMAGE PROCESSING

L T P C

3 0 0 3

UNIT I DIGITAL IMAGE FUNDAMENTALS

Elements of digital image processing systems, Elements of visual perception, psycho visual

model, brightness, contrast, hue, saturation, mach band effect, Color image fundamentals

:RGB,HSI models, Image acquisition and sampling, Quantization, Image file formats,

Two:dimensional convolution, correlation, and frequency responses.

UNIT II IMAGE TRANSFORMS

1D DFT, 2D transforms – DFT, DCT, Discrete Sine, Walsh, Hadamard, Slant, Haar, KLT, SVD,

Radon, and Wavelet Transform.

UNIT III IMAGE ENHANCEMENT AND RESTORATION

Histogram modification and specification techniques, Noise distributions, Spatial averaging,

Directional Smoothing, Median, Geometric mean, Harmonic mean, Contra harmonic filters,

Homomorphic filtering, Color image enhancement. Image Restoration – degradation model,

Unconstrained and Constrained restoration, Inverse filtering, Wiener filtering, Geometric

transformations – spatial transformations, Gray: Level interpolation,

UNIT IV IMAGE SEGMENTATION AND RECOGNITION

Edge detection. Image segmentation by region growing, region splitting and merging, edge

linking, Morphological operators: dilation, erosion, opening, and closing. Image Recognition –

Patterns and pattern classes, matching by minimum distance classifier, Statistical Classifier.

Matching by correlation, Neural network application for image recognition.

UNIT V IMAGE COMPRESSION

Need for image compression, Huffman, Run Length Encoding, Arithmetic coding, Vector

Quantization, Block Truncation Coding. Transform Coding – DCT and Wavelet. Image

compression standards.

Total: 45

Page 14: ANNA UNIVERSITY OF TECHNOLOGY MADURAI ...autmdu.ac.in/syllabus/COMPUTERSCIENCEENGINEERINGPT.pdfRole of a Parser – Context Free Grammars – Top:Down Parsing – Bottom:Up Parsing

REFERENCES:

1. Rafael C. Gonzalez, Richard E.Woods, ‗Digital Image Processing‘, Pearson Education,

Inc., Second Edition, 2004.

2. Anil K. Jain, ‗Fundamentals of Digital Image Processing‘, Prentice Hall of India, 2002.

3. David Salomon : Data Compression – The Complete Reference, Springer Verlag New

York Inc., 2nd Edition, 2001

4. Rafael C. Gonzalez, Richard E.Woods, Steven Eddins, ‗ Digital Image Processing using

MATLAB‘, Pearson Education, Inc., 2004.

5. William K.Pratt, ‗ Digital Image Processing‘, John Wiley, NewYork, 2002.

6. Milman Sonka, Vaclav Hlavac, Roger Boyle, ‗Image Processing, Analysis, and Machine

Vision‘, Brooks/Cole, Vikas Publishing House, II ed., 1999.

7. Sid Ahmed, M.A., ‗Image Processing Theory, Algorithms and Architectures‘,

McGrawHill, 1995.

8. Lim, J.S., ‗Two Dimensional Signal and Image Processing‘, Prentice:Hall, New Jersey,

1990.

10244CSE15 UNIX INTERNALS

L T P C

3 0 0 3

UNIT I GENERAL OVERVIEW OF THE SYSTEM 9

History – System structure – User perspective – Operating system services – Assumptions about

hardware. Introduction to the Kernel : Architecture of the UNIX operating system – Introduction to system concepts – Kernel data structures – System administration – Summary and Preview.

UNIT II BUFFER CACHE 9

Buffer headers – Structure of the buffer pool – Advantages and disadvantages of the buffer

cache. Internal representation of files : Inodes – Structure of a regular file – Directories –

Conversion of a path name to an Inode – Super block – Other file types.

UNIT III SYSTEM CALLS FOR FILE SYSTEM 9

Open – Read – Write – File and record locking – Adjusting the position of file I/O –LSEEK –

Close – File creation – Creation of special files – Pipes – Dup – Mounting and unmounting file

systems

UNIT IV THE STRUCTURE OF PROCESSES 9

Process states and transitions – Layout of system memory – The context of a process – Saving

the context of a process. Process Control: Process creation – Signals – Process termination –

Awaiting process termination – Invoking other programs – The shell – System boot and the INIT

process.

Page 15: ANNA UNIVERSITY OF TECHNOLOGY MADURAI ...autmdu.ac.in/syllabus/COMPUTERSCIENCEENGINEERINGPT.pdfRole of a Parser – Context Free Grammars – Top:Down Parsing – Bottom:Up Parsing

UNIT V PROCESS SCHEDULING AND MEMORY MANAGEMENT POLICIES

9

Process Scheduling – Memory Management Policies: Swapping – A hybrid system with

swapping and demand paging. The I/O Subsystem: Driver Interfaces– Disk Drivers:Terminal

Drivers.

TOTAL:45

REFERENCES

1. Maurice J. Bach, ―The Design of the Unix Operating System‖, Prentice Hall of India,

2004.

2. Vahalia, ―Unix Internals: The New Frontiers‖, Pearson Education Inc, 2003.

10244CSE21 OPEN SOURCE SYSTEMS

L T P C

3 0 0 3

Unit –I 9

Overview of Free/Open Source Software:: Definition of FOSS & GNU, History of GNU/Linux

and the Free Software Movement , Advantages of Free Software and GNU/Linux, FOSS usage ,

trends and potential—global and Indian.GNU/Linux OS installation:: detect hardware, configure

disk partitions & file systems and install a GNU/Linux distribution ; Basic shell commands :

logging in, listing files, editing files, copying/moving files, viewing file contents, changing file

modes and permissions, process management ; User and group management, file ownerships and

permissions, PAM authentication ; Introduction to common system configuration files & log

files ;

Configuring networking, basics of TCP/IP networking and routing, connecting to the Internet

(through dialup, DSL, Ethernet, leased line).

Unit – II 9

Configuring additional hardware : sound cards, displays & display cards, network cards,

modems, USB drives, CD writers ; Understanding the OS boot up process; Performing every day

tasks using gnu/Linux :: accessing the Internet, playing music, editing documents and

spreadsheets, sending and receiving email, copy files from disks and over the network, playing

games, writing CDs ; X Window system configuration and utilities :: configure X windows,

detect display devices ; Installing software – from source code as well as using binary packages.

Setting up email servers:: using postfix (SMTP services), courier (IMAP & POP3 services),

squirrel mail ( web mail services) ; Setting up web servers :: using apache ( HTTP services), php

(server:side scripting), perl ( CGI support) ; Setting up file services :: using samba ( file and

authentication services for windows networks), using NFS ( file services for gnu/Linux / Unix

Page 16: ANNA UNIVERSITY OF TECHNOLOGY MADURAI ...autmdu.ac.in/syllabus/COMPUTERSCIENCEENGINEERINGPT.pdfRole of a Parser – Context Free Grammars – Top:Down Parsing – Bottom:Up Parsing

networks) ; Setting up proxy services :: using squid ( http / ftp / https proxy services) ; Setting up

printer services : using CUPS (print spooler), foomatic (printer database)

Unit III 9

Setting up a firewall : Using netfilter and ip tables; Using the GNU Compiler Collection – GNU

compiler tools ; the C preprocessor (cpp), the C compiler (gcc) and the C++ compiler (g++),

assembler (gas) ; Understanding build systems :: constructing make files and using make, using

autoconf and autogen to automatically generate make files tailored for different development

environments ; Using source code versioning and management tools :: using CVS to manage

source code revisions, patch & diff.

Unit IV 9

Understanding the GNU Libc libraries and linker :: linking against object archives (.a libraries)

and dynamic shared object libraries (.so libraries), generating statically linked binaries and

libraries, generating dynamically linked libraries ; Using the GNU debugging tools :: gdb to

debug programs, graphical debuggers like ddd, memory debugging / profiling libraries mpatrol

and valgrind ; Review of common programming practices and guidelines for GNU/Linux and

FOSS ; Introduction to Bash, sed & awk scripting. Basics of the X Windows server architecture.

Unit V 9

Basics of the X Windows server architecture ; Qt Programming ; Gtk+ Programming ; Python

Programming ; Programming GUI applications with localization support.

TOTAL:45

REFERENCES:

1. N. B. Venkateshwarlu (Ed); Introduction to Linux: Installation and Programming, B S

Publishers; 2005.

2. Matt Welsh, Matthias Kalle Dalheimer, Terry Dawson, and Lar Kaufman, Running

Linux, Fourth Edition, O'Reilly Publishers, 2002.

3. Carla Schroder, Linux Cookbook, First Edition, O'Reilly Cookbooks Series, 2004

On:line material 1. Open Sources: Voices from the Open Source Revolution, First Edition, January 1999, ISBN:

1:56592:582:3. URL: http://www.oreilly.com/catalog/opensources/book/toc.html

2. The Linux Cookbook: Tips and Techniques for Everyday Use, First Edition, Michael Stutz,

2001. URL: http://dsl.org/cookbook/cookbook_toc.html

3. The Linux System Administrators' Guide, Lars Wirzenius, Joanna Oja, Stephen Stafford, and

Alex Weeks, December 2003. URL: http://www.tldp.org/guides.html

4. Using GCC, Richard Stallman et al. URL: http://www.gnu.org/doc/using.html

5. An Introduction to GCC, Brian Gough. URL: http://www.networktheory.co.uk/docs/gccintro/

6. GNU Autoconf, Automake and Libtool, Gary V. Vaughan, Ben Elliston, Tom Tromey and Ian

Lance Taylor. URL: http://sources.redhat.com/autobook/

7. Open Source Development with CVS, Third Edition, Karl Fogel and Moshe Bar.

URL: http://cvsbook.red:bean.com/

8. Advanced Bash Scripting Guide, Mendel Cooper, June 2005. URL:

Page 17: ANNA UNIVERSITY OF TECHNOLOGY MADURAI ...autmdu.ac.in/syllabus/COMPUTERSCIENCEENGINEERINGPT.pdfRole of a Parser – Context Free Grammars – Top:Down Parsing – Bottom:Up Parsing

http://www.tldp.org/guides.html

9. GTK+/GNOME Application Development, Havoc Pennington. URL:

http://developer.gnome.org/doc/GGAD

10. Python Tutorial, Guido van Rossum, Fred L. Drake, Jr., Editor. URL:

http://www.python.org/doc/current/tut/tut.html

10244CSE22 SOFTWARE PROJECT MANAGEMENT

L T P C

3 0 0 3

Unit 1 Introduction 9

Introduction to Software Project management and control –Scope of Project management:Project

Management Life cycle:Software Evolution and economics – Software Management Process

Framework:Disciplines of Software Management:Measures and Measurements

Unit 2 Software Cost Estimation 10

Software Estimation – Problems with estimation – Decomposition Techniques : Cost estimation

Process – Delphi Technique –SLIM: COCOMO II – Function Point Analysis – Estimation for

Agile and Web development – Activity Based Costing and Economic Value Added (EVA):

Balanced Score Card

Unit 3 Software Risk Management 9

Software Risks – Risk management Paradigm: Risk Categories – Risk Assessment :

Identification – Analysis : Prioritize – Ranking : Control – Risk Projection and Refinement –

FMEA

Unit 4 Software Metrics 10

Need of Software metrics – Software Metrics Classification – Product Metrics : Size : Function

Based – Quality : Source Code – Testing : Maintenance – Process metrics Empirical Models :

Statistical Models : Theory:based Models : Composite Models : Reliability Models.

Unit 5 Project Management 7

Management Spectrum : People – Product – Process – Project – Client Relationship management

Total : 45

Reference Books

1. McConnell, S. ―Software Project: Survival Guide‖, Microsoft Press, 1998. Royce, W.

―Software Project management: A Unified Framework‖, Addison Wesley, 1998

2. Cooper, R., ―The Rise of Activity:Based Costing: PartOne: What is an Activity:Based

Cost System?‖ Journal of Cost Management, Vol.2, No.2 (Summer 1988), pp.45 – 54

3. Roger S.Pressman., ―Software Engineering: A Practitioners approach‖, 6th

edition,McGraw Hill International Edition

Page 18: ANNA UNIVERSITY OF TECHNOLOGY MADURAI ...autmdu.ac.in/syllabus/COMPUTERSCIENCEENGINEERINGPT.pdfRole of a Parser – Context Free Grammars – Top:Down Parsing – Bottom:Up Parsing

4. Boehm, B. W. "Software Risk Management: Principles and Practices" in IEEE Software,

January 1991, pp32:41

5. Fenton, N.E., and Pfleeger, S.L.. ―Software Metrics: A Rigorous and Practical Approach,

Revised‖ Brooks Cole, 1998

6. Tom Demarco, Controlling Software Project Management, Measurement, Prentice Hall,

New Jersey

7. Demarco, T. and Lister, T. ―Peopleware: Productive Projects and Teams, 2nd

Ed.‖, Dorset

House, 1999

10244CSE23 XML AND WEB SERVICES

L T P C

3 0 0 3

1. INTRODUCTION 9

Role Of XML – XML and The Web – XML Language Basics – SOAP – Web Services –

Revolutions Of XML – Service Oriented Architecture (SOA).

2. XML TECHNOLOGY 9

XML – Name Spaces – Structuring With Schemas and DTD – Presentation Techniques –

Transformation – XML Infrastructure.

3. SOAP 9

Overview Of SOAP – HTTP – XML:RPC – SOAP: Protocol – Message Structure –

Intermediaries – Actors – Design Patterns And Faults – SOAP With Attachments.

4. WEB SERVICES 9

Overview – Architecture – Key Technologies : UDDI – WSDL – ebXML – SOAP And

Web Services In E:Com – Overview Of .NET And J2EE.

5. XML SECURITY 9

Security Overview – Canonicalization – XML Security Framework – XML Encryption –

XML Digital Signature – XKMS Structure – Guidelines For Signing XML Documents –

XML In Practice.

Total: 45

REFERENCE BOOKS:

1. Frank. P. Coyle, XML, Web Services And The Data Revolution, Pearson Education,

2002.

2. Ramesh Nagappan , Robert Skoczylas and Rima Patel Sriganesh, ― Developing Java Web

Services‖, Wiley Publishing Inc., 2004.

3. Sandeep Chatterjee, James Webber, ―Developing Enterprise Web Services‖, Pearson

Education, 2004.

4. McGovern, et al., ―Java Web Services Architecture‖, Morgan Kaufmann Publishers,

2005.

10244CSE24 MIDDLEWARE TECHNOLOGIES

Page 19: ANNA UNIVERSITY OF TECHNOLOGY MADURAI ...autmdu.ac.in/syllabus/COMPUTERSCIENCEENGINEERINGPT.pdfRole of a Parser – Context Free Grammars – Top:Down Parsing – Bottom:Up Parsing

L T P C

3 0 0 3

UNIT I CLIENT / SERVER CONCEPTS 9

Client:Server − File server − Database server − Group server − Object server − Web server −

Middleware − General middleware − Service specific middleware − Client / server building

blocks − RPC − Messaging − Peer:to:Peer.

UNIT II EJB ARCHITECTURE 9

EJB − EJB architecture − Overview of EJB software architecture − View of EJB − Conversation

− Building and Ddeploying EJBs − Roles in EJB.

UNIT III EJB APPLICATIONS 9

EJB session beans − EJB entity beans − EJB clients − EJB deployment − Building an application

with EJB.

UNIT IV CORBA 9

CORBA − Distributed systems − Purpose − Exploring CORBA alternatives − Architecture

overview − CORBA and networking Model − CORBA object model −IDL − ORB − Building an

application with CORBA.

UNIT V COM 9

COM − Data types − Interfaces − Proxy and stub − Marshalling − Implementing Server/Client −

Interface pointers − Object creation − Invocation − Destruction − Comparison COM and

CORBA − Introduction to .NET − Overview of .NET architecture − Marshalling − Remoting.

Total: 45

REFERENCES

1. Robert Orfali, Dan Harkey and Jeri Edwards, ―The Essential Client/Server

2. Survival Guide‖, Galgotia Publications Pvt. Ltd., 2002.

3. Tom Valesky, ―Enterprise Java Beans‖, Pearson Education, 2002

4. Jason Pritchard, ―COM and CORBA side by side‖, Addison Wesley, 2000

5. Jesse Liberty, ―Programming C#‖, 2nd Edition, O‘Reilly Press, 2002.

6. Mowbray, ―Inside CORBA‖, Pearson Education, 2002.

7. Puder, ―Distributed System Architecture – A Middleware Approach‖,Elsevier, 2008.

10244CSE25 PARALLEL COMPUTING AND MULTICORE TECHNOLOGIES

L T P C

3 0 0 3

UNIT I PIPELINING AND ILP 9

Page 20: ANNA UNIVERSITY OF TECHNOLOGY MADURAI ...autmdu.ac.in/syllabus/COMPUTERSCIENCEENGINEERINGPT.pdfRole of a Parser – Context Free Grammars – Top:Down Parsing – Bottom:Up Parsing

Fundamentals of Computer Design : Measuring and Reporting Performance : Instruction Level

Parallelism and Its Exploitation : Concepts and Challenges : Overcoming Data Hazards with

Dynamic Scheduling – Dynamic Branch Prediction : Speculation : Multiple Issue Processors –

Case Studies.

UNIT II ADVANCED TECHNIQUES FOR EXPLOITING ILP 9

Compiler Techniques for Exposing ILP : Limitations on ILP for Realizable Processors :

Hardware versus Software Speculation : Multithreading: Using ILP Support to Exploit

Thread:level Parallelism : Performance and Efficiency in Advanced Multiple Issue Processors :

Case Studies.

UNIT III MULTIPROCESSORS 9

Symmetric and distributed shared memory architectures – Cache coherence issues : Performance

Issues – Synchronization issues – Models of Memory Consistency : Interconnection networks –

Buses, crossbar and multi:stage switches.

UNIT IV MULTI:CORE ARCHITECTURES 9

Software and hardware multithreading – SMT and CMP architectures – Design issues – Case

studies – Intel Multi:core architecture – SUN CMP architecture – IBM cell architecture.: hp

architecture.

UNIT V MEMORY HIERARCHY DESIGN 9

Introduction : Optimizations of Cache Performance : Memory Technology and Optimizations :

Protection: Virtual Memory and Virtual Machines : Design of Memory Hierarchies : Case

Studies.

TOTAL : 45

REFERENCES

1. John L. Hennessey and David A. Patterson, ―Computer Architecture – A quantitative

approach‖, Morgan Kaufmann / Elsevier, 4th. Edition, 2007.

2. David E. Culler, Jaswinder Pal Singh, ―Parallel Computing Architecture: A hardware/

software approach‖, Morgan Kaufmann / Elsevier, 1997.

3. William Stallings, ―Computer Organization and Architecture – Designing for

Performance‖, Pearson Education, Seventh Edition, 2006.

10244CSE31 MOBILE TECHNOLOGIES

L T P C

3 0 0 3

Page 21: ANNA UNIVERSITY OF TECHNOLOGY MADURAI ...autmdu.ac.in/syllabus/COMPUTERSCIENCEENGINEERINGPT.pdfRole of a Parser – Context Free Grammars – Top:Down Parsing – Bottom:Up Parsing

UNIT I MOBILE DEVICE TECHNOLOGIES 9

Mobile Computing devices characteristics – Adaptation – Data dissemination and Management –

Heterogeneity – Interoperability – Context awareness – Language localization issues – User

Interfacedesign issues – Difference between UI design for mobile devices and conventional

systems – Mobile Agents :

UNIT II TERMINAL SOFTWARE PLATFORM TECHNOLOGIES 9

Introduction – Symbian OS: Introduction, Architecure,Applications for Symbion: Controls

and compound controls: Active objects: Localization: Security on the Symbion.–Palm OS,

Windows CE.NET– QUALCOMM, BREW, J2ME, – Pocket PC

UNIT III TELECOMMUNICATIONS: 9

GSM: DECTTETRA – UMTS: IMT:200 – Satellite Systems, CDMA and 3G: Introduction ,

SpreadSpectrum,Technology:IS 95:CDMA versus GSM:Wireless Data: third

GenetrationNetworks, Applications on 3G.

UNIT IV LOCAL AREA AND WIDE AREA WIRELESS TECHNOLOGIES 9

IEEE 802.11 technologies – Infrared technologies – Bluetooth networks (OBEX Protocol) –

Personal Area Networks – Mobility Management – Mobile IP – Establishing Wide area wireless

networks – Concept and structure of ‖cell‖ – Call establishment and maintenance – Channel

management – Frequency Assignment techniques.

UNIT V TRANSPORT AND APPLICATION LAYER: 9

Traditional TCP: Indirect TCP: Snooping TCP: Mobile TCP: Fast retransmit/ Fast Recovery:

Transmission/ Timeout Freezing – Selective Retransmission: Transaction Oriented TCP, WAP

Architecture – Datagram Protocol: Transport Layer Security: Transaction Protocol: Session

Protocol: Application Environment:Wireless Telephony Application.

Total: 45

References

1. F.Adelstein, S.K.S. Gupta, ―Fundamentals of Mobile and Pervasive Computing‖ Tata

McGraw Hill, 2005.

2. Ashoke Talukdar and Roopa Yavagal, ―Mobile Computing‖, Tata McGraw Hill, 2005

3. Next Generation Mobile Systems : 3G and Beyond:Wiely publications

4. 3G wireless Demystified: MCGraw Hill

5. 1. J.Schiller, Mobile Communication, Addison Wesley, 2000.

10244CSE32 SOFTWARE RELIABILITY AND PROJECT MANAGEMENT

L T P C

Page 22: ANNA UNIVERSITY OF TECHNOLOGY MADURAI ...autmdu.ac.in/syllabus/COMPUTERSCIENCEENGINEERINGPT.pdfRole of a Parser – Context Free Grammars – Top:Down Parsing – Bottom:Up Parsing

3 0 0 3

Unit 1 Introduction 7

Software Reliability – Ideas of Software Reliability – Ingredients of software reliability

:Challenges and difficulties in Software Reliability – Reliability Measurement :Computation of

Software reliability – Software Availability

Unit 2 Software Reliability Models 10

Classes of software reliability models : General procedure for reliability modeling : Time

Dependent Software Reliability Models: Time between failure reliability Models, Fault Counting

Reliability Models : Time Independent Software Reliability Models: Fault injection model of

Software Reliability, Input Domain Reliability Model, Orthogonal defect classification, Software

availability Models

Unit 3 Project Management 9

Software project management and control – Activities of Project Management – Project Planning

– Stepwise Project Planning:Project management Life cycle:Management process

framework:Software Risk Management:Risk Assessment:Risk Projection and Refinement

Unit 4 Metrics and Estimation 10

Software Metrics:Classification : Product Metrics : Function Based, Quality Metrics, Halsted‘s

Metrics – Process metrics : Empirical Models : Statistical Models and Reliability Models –

Software Estimation – Issues – Cost estimation method – COCOMO II: Software Project

Schedule

Unit 5 Team Management 9

Management Spectrum– Client Relationship management : Organizational Behaviour : Selecting

The RightPerson For The Job – Motivation – Hackman Job Characteristics Model – Working In

Groups – Becoming A Team –Decision Making – Leadership – organizational Structures –

Stress – Health And Safety– Case Studies.

Total : 45

References

1. Hoang Pham, ―Software Reliability‖, Springer Verlag, New York.

2. John D. Musa, ―Software Reliability Engineered Testing‖, Mc. Graw Hill, New York.

3. Bob Hughes, Mikecotterell, ―Software Project Management‖, Third Edition, Tata

McGraw Hill, 2004

4. Boehm, B. W. "Software Risk Management: Principles and Practices" in IEEE Software,

January 1991, pp32:41

5. Doron Reled, ―Software Reliability Methods‖, Springer Verlag, New York

6. R. Ramakumar, ―Reliability Engineering: Fundamentals and Applications‖, Prentice Hall,

New Delhi

7. McConnell, S. ―Software Project: Survival Guide‖, Microsoft Press, 1998. Royce, W.

―Software Project management: A Unified Framework‖, Addison Wesley, 1998

8. Roger S.Pressman., ―Software Engineering: A Practitioners approach‖, 6th

edition,McGraw Hill International Edition

10244CSE33 E:COMMERCE

Page 23: ANNA UNIVERSITY OF TECHNOLOGY MADURAI ...autmdu.ac.in/syllabus/COMPUTERSCIENCEENGINEERINGPT.pdfRole of a Parser – Context Free Grammars – Top:Down Parsing – Bottom:Up Parsing

L T P C

3 0 0 3

UNIT I INTRODUCTION 9

Infrastructure for Electronic Commerce : Networks : Packet Switched Networks : TCP/IP

Internet protocol : Domain name Services : Web Service Protocols : Internet applications :

Utility programs – Markup Languages : Web Clients and Servers : Intranets and Extranets :

Virtual private Network.

UNIT II CORE TECHNOLOGY 9

Electronic Commerce Models : Shopping Cart Technology : Data Mining : Intelligent Agents –

Internet Marketing : XML and E:Commerce

UNIT III ELECTRONIC PAYMENT SYSTEMS 9

Real world Payment Systems : Electronic Funds Transfer : Digital Payment :Internet Payment

Systems – Micro Payments : Credit Card Transactions : Case Studies.

UNIT IV SECURITY 9

Threats to Network Security : Public Key Cryptography : Secured Sockets Layer : Secure

Electronic Transaction : Network Security Solutions : Firewalls.

UNIT V INTER/INTRA ORGANIZATIONS ELECTRONIC COMMERCE 9

EDI : EDI application in business : legal, Security and Privacy issues : EDI and Electronic

commerce : Standards : Internal Information Systems : Macro forces : Internal commerce :

Workflow Automation and Coordination : Customization and Internal commerce : Supply chain

Management.

TOTAL: 45

REFERENCES

1. Ravi Kalakota and Andrew B Whinston , Frontiers of Electronic commerce, Addison

Wesley, 1996

2. Pete Loshin, Paul A Murphy , Electronic Commerce, 2nd Edition , Jaico Publishers,1996.

3. Joseph P T , S J,E:Commerce : An Indian Perspective, second edtion, Prentice Hall of

India.2006.

4. David Whiteley, e : Commerce : Strategy, Technologies and Applications : McGraw

Hill,2000

10244CSE34 REAL TIME SYSTEMS.

L T P C

3 0 0 3

UNIT I INTRODUCTION 9

Introduction : Issues in Real Time Computing, Structure of a Real Time System. Task Classes,

Performance Measures for Real Time Systems, Estimating Program Run times. Task Assignment

and Scheduling : Classical Uniprocessor scheduling algorithms, UniProcessor scheduling of IRIS

Tasks, Task Assignment, Mode Changes, and Fault Tolerant Scheduling.

Page 24: ANNA UNIVERSITY OF TECHNOLOGY MADURAI ...autmdu.ac.in/syllabus/COMPUTERSCIENCEENGINEERINGPT.pdfRole of a Parser – Context Free Grammars – Top:Down Parsing – Bottom:Up Parsing

UNIT II PROGRAMMING LANGUAGES AND TOOLS 9

Programming Language and Tools – Desired Language characteristics, Data Typing, Control

structures, Facilitating Hierarchical Decomposition, Packages, Run:time (Exception) Error

handling, Overloading and Generics, Multitasking, Low Level programming, Task scheduling,

Timing Specifications, Programming Environments, Run:time Support.

UNIT III REAL TIME DATABASES 9

Real time Databases : Basic Definition, Real time Vs General Purpose Databases, Main Memory

Databases, Transaction priorities, Transaction Aborts, Concurrency Control Issues, Disk

Scheduling Algorithms, Two:phase Approach to improve Predictability, Maintaining

Serialization Consistency, Databases for Hard Real Time systems.

UNIT IV COMMUNICATION 9

Real:Time Communication : Communications Media, Network Topologies Protocols, Fault

Tolerant Routing. Fault Tolerance Techniques : Fault Types, Fault Detection. Fault Error

containment Redundancy, Data Diversity, Reversal Checks, Integrated Failure handling.

UNIT V EVALUATION TECHNIQUES 9

Reliability Evaluation Techniques : Obtaining Parameter Values, Reliability Models for

Hardware Redundancy, Software Error models. Clock Synchronization : Clock, A

Nonfault:Tolerant Synchronization Algorithm, Impact of Faults, Fault Tolerant Synchronization

in Hardware, Fault Tolerant Synchronization in Software.

TOTAL : 45

REFERENCES:

1. C.M. Krishna, Kang G. Shin, ―Real:Time Systems‖, McGraw:Hill International Editions,

1997.

2. Stuart Bennett, ―Real Time Computer Control:An Introduction‖,Second edition, Prentice

Hall PTR, 1994.

3. Peter D. Lawrence, ―Real time Micro Computer System Design – An Introduction‖,

McGraw Hill, 1988.

4. S.T. Allworth and R.N. Zobel, ―Introduction to real time software design‖, Macmillan, II

Edition, 1987.

5. R.J.A Buhur, D.L. Bailey, ― An Introduction to Real:Time Systems‖, Prentice:Hall

International, 1999.

6. Philip.A.Laplante ―Real Time System Design and Analysis‖ PHI , III Edition, April

2004.

10244CSE35 NETWORK SYSTEM DESIGN USING NETWORK PROCESSOR

L T P C

3 0 0 3

UNIT I INTRODUCTION : PROTOCOLS AND PACKET FORMATS

Network systems and the Internet, Applications, packet processing, protocols and layering, layer

1 and 2, layer 3, layer 4, protocol port numbers and de:multiplexing, Encapsulation and

transmission.

Page 25: ANNA UNIVERSITY OF TECHNOLOGY MADURAI ...autmdu.ac.in/syllabus/COMPUTERSCIENCEENGINEERINGPT.pdfRole of a Parser – Context Free Grammars – Top:Down Parsing – Bottom:Up Parsing

UNIT II PACKET PROCESSING

Introduction, packet buffer allocation, packet buffer size and copying, protocol layering and

copying, Heterogeneity and network byte order, IP datagram fragmentation and reassembly, IP

forwarding algorithm

UNIT III TCP ALGORITHM

TCP connection recognition algorithm, TCP splicing algorithm, Functions – Address lookup and

packet forwarding, error detection and correction, Fragmentation, segmentation and reassembly,

frame and protocol de:multiplexing, packet classification, queuing and packet discard,

Scheduling and timing, Authentication and privacy, traffic measurement and policing , traffic

shaping, timer management.

UNIT IV NETWORK PROCESSORS:

Introduction, motivation for embedded processors, RISC Vs CISC, need for custom silicon,

definition of NP, flexibility through programmability, instruction set, scalability with parallelism

and pipelining, cause and benefits of NP, NP functionality, packet processing functions, Ingress

and Egress processing, Parallel and distributed architecture, architectural roles of NP, NP

architectures – Introduction, architectural variety, primary architectural characteristics,

Architecture, packet flow and clock rates, software architecture, assigning functionality to the

process hierarchy, issues in scaling an NP.

UNIT V IXP2XXX

Introduction, IXP2xxx Architecture, Micro engines, Programming Models, Packet processing in

a single thread, Advanced programming, Applications: Switches, Routers, Firewall, and Active

Networks.

Total:45

REFERENCES:

1. Douglas E.Comer, ―Network Systems Design using Network Processors‖, Intel IXP

version,, Pearson Education. March 2003

2. Erik J. Johnson and Aaron Kunze, ―IXP 2400/2800 Programming‖, Intel Press, April

2003

3. Uday R. Naik and Prashant R. Chandra, ― Designing High Performance Networking

Applications – Essential Insights for Developers of IXP2XXX Network Processor Based

Systems‖, Intel Press, November 2004

4. Donald F. Hooper, ― Using IXP2400/2800 Development Tools – A Hands on Approach

to Network Processor Software Design‖, Intel Press, August 2004

5. Patrick Crowley, Peter Z. Onufryk, Mark A. Franklin, Haldun Hadimioglu, ―Network

Processors 2002: Design Principles and Practices‖, Vol 1, Morgan Kaufmann

Publications, September 2002.

6. Mark A. Franklin, Patrick Crowley, Haldun Hadimioglu, Peter Z. Onufryk ―Network

Processor Design: Issues and Practices‖, Vol 2, Academic Press, December 2003.

Page 26: ANNA UNIVERSITY OF TECHNOLOGY MADURAI ...autmdu.ac.in/syllabus/COMPUTERSCIENCEENGINEERINGPT.pdfRole of a Parser – Context Free Grammars – Top:Down Parsing – Bottom:Up Parsing

7. Panos C. Lekkas, ―Network Processors: Architectures, Protocols and Platforms (Telecom

Engineering‖), McGraw Hill, July 2003

10244CSE41 EMBEDDED SYSTEMS

L T P C

3 0 0 3

UNIT I EMBEDDED COMPUTING 9

Challenges of Embedded Systems – Embedded system design process. Embedded processors –

ARM processor – Architecture, ARM and Thumb Instruction sets

UNIT II EMBEDDED C PROGRAMMING 9

C:looping structures – Register allocation – Function calls – Pointer aliasing – structure

arrangement – bit fields – unaligned data and endianness – inline functions and inline assembly –

portability issues.

UNIT III OPTIMIZING ASSEMBLY CODE 9

Profiling and cycle counting – instruction scheduling – Register allocation – conditional

execution – looping constructs – bit manipulation – efficient switches – optimized primitives.

UNIT IV PROCESSES AND OPERATING SYSTEMS 9

Multiple tasks and processes – Context switching – Scheduling policies – Interprocess

communication mechanisms – Exception and interrupt handling : Performance issues.

UNIT V EMBEDDED SYSTEM DEVELOPMENT 9

Meeting real time constraints – Multi:state systems and function sequences. Embedded software

development tools – Emulators and debuggers. Design methodologies – Case studies – Complete

design of example embedded systems.

TOTAL : 45

REFERENCES

1. Andrew N Sloss, D. Symes, C. Wright,‖ ARM System Developers Guide‖, Morgan

Kaufmann / Elsevier, 2006.

2. Michael J. Pont, ―Embedded C‖, Pearson Education, 2007.

3. Wayne Wolf, ―Computers as Components: Principles of Embedded Computer System

Design‖, Morgan Kaufmann / Elsevier, 2nd. edition, 2008.

4. Steve Heath, ―Embedded System Design‖, Elsevier, 2nd. edition, 2003.

Page 27: ANNA UNIVERSITY OF TECHNOLOGY MADURAI ...autmdu.ac.in/syllabus/COMPUTERSCIENCEENGINEERINGPT.pdfRole of a Parser – Context Free Grammars – Top:Down Parsing – Bottom:Up Parsing

10244CSE42 OPERATIONS RESEARCH

L T P C

3 0 0 3

UNIT I QUEUEING MODELS 9

Poisson Process – Markovian Queues – Single and Multi:server Models – Little‘s formula –

Machine Interference Model – Steady State analysis – Self Service Queue.

UNIT II ADVANCED QUEUEING MODELS 9

Non: Markovian Queues – Pollaczek Khintchine Formula – Queues in Series – Open Queueing

Networks –Closed Queueing networks.

UNIT III SIMULATION 9

Discrete Even Simulation – Monte – Carlo Simulation – Stochastic Simulation – Applications to

Queueing systems.

UNIT IV LINEAR PROGRAMMING 9

Formulation – Graphical solution – Simplex method – Two phase method : Transportation and

Assignment Problems.

UNIT V NON:LINEAR PROGRAMMING 9

Lagrange multipliers – Equality constraints – Inequality constraints – Kuhn : Tucker conditions –

Quadratic Programming.

L: 45

REFERENCES:

1. Winston.W.L. ―Operations Research‖, Fourth Edition, Thomson – Brooks/Cole, 2003.

2. Taha, H.A. ―Operations Research: An Introduction‖, Ninth Edition, Pearson Education

Edition, Asia, New Delhi, 2002.

3. Robertazzi. T.G. ―Computer Networks and Systems – Queuing Theory and Performance

4. Evaluation‖, Third Edition, Springer, 2002 Reprint.

Page 28: ANNA UNIVERSITY OF TECHNOLOGY MADURAI ...autmdu.ac.in/syllabus/COMPUTERSCIENCEENGINEERINGPT.pdfRole of a Parser – Context Free Grammars – Top:Down Parsing – Bottom:Up Parsing

5. Ross. S.M., ―Probability Models for Computer Science‖, Academic Press, 2002.

Page 29: ANNA UNIVERSITY OF TECHNOLOGY MADURAI ...autmdu.ac.in/syllabus/COMPUTERSCIENCEENGINEERINGPT.pdfRole of a Parser – Context Free Grammars – Top:Down Parsing – Bottom:Up Parsing

10244CSE43 ADHOC NETWORKS

L T P C

3 0 0 3

Unit 1. INTRODUCTION

Introduction:Fundamentals of Wireless Communication Technology – The Electromagnetic

Spectrum : Radio Propagation Mechanisms : Characteristics of the Wireless Channel : IEEE

802.11a,b Standard – Origin Of Ad hoc: Packet Radio Networks : Technical Challenges :

Architecture of PRNETs : Components of Packet Radios – Ad hoc Wireless Networks :What Is

an Ad Hoc Network? Heterogeneity in Mobile Devices : Wireless Sensor Networks : Traffic

Profiles : Types of Ad hoc Mobile Communications : Types of Mobile Host Movements :

Challenges Facing Ad Hoc Mobile Networks:Ad hoc wireless Internet

Unit 2. AD HOC ROUTING PROTOCOLS

Introduction : Issues in Designing a Routing Protocol for Ad Hoc Wireless Networks :

Classifications of Routing Protocols :Table:Driven Routing Protocols – Destination Sequenced

Distance Vector : Wireless Routing Protocol : Cluster Switch Gateway Routing :

Source:Initiated On:Demand Approaches : Ad Hoc On: Demand Distance Vector Routing :

Dynamic Source Routing : Temporally Ordered Routing Algorithm : Signal Stability Routing :

Location:Aided Routing : Power:Aware Routing : Zone Routing Protocol.

Unit 3. MULTICAST ROUTING IN AD HOC NETWORKS

Introduction : Issues in Designing a Multicast Routing Protocol : Operation of Multicast Routing

Protocols : An Architecture Reference Model for Multicast Routing Protocols : Classifications of

Multicast Routing Protocols : Tree:Based Multicast Routing Protocols: Bandwidth Efficient

Multicast Routing Protocol, Multicast Routing based on Zone Routing, Associatively Based Ad

Hoc Multicast Routing, Weight Based Multicast Protocol, Multicast Ad Hoc On Demand

Distance Vector Routing Protocol, Ad Hoc Multicast Routing Protocol, Adaptive Shared Tree

Multicast Routing Protocol :Mesh:Based Multicast Routing Protocols : Energy:Efficient

Multicasting : Multicasting with Quality of Service Guarantees : Application:Dependent

Multicast Routing .

Unit 4. TRANSPORT LAYER, SECURITY PROTOCOLS

Introduction : Issues in Designing a Transport Layer Protocol for Ad Hoc Wireless Networks :

Design Goals of a Transport Layer Protocol for Ad Hoc Wireless Networks :Classification of

Transport Layer Solutions : TCP Over Ad Hoc Wireless Networks : Other Transport Layer

Protocols for Ad Hoc Wireless Networks : Security in Ad Hoc Wireless Networks : Network

Security Requirements : Issues and Challenges in Security Provisioning : Network Security

Attacks : Key Management : Secure Routing in Ad Hoc Wireless Networks

Unit 5. QoS AND ENERGY MANAGEMENT

Introduction : Issues and Challenges in Providing QoS in Ad Hoc Wireless Networks

:Classifications of QoS Solutions : MAC Layer Solutions: Cluster TDMA, IEEE 802.11e :

Network Layer Solutions: Ticket Based QoS Routing Protocol, Predictive Location Based QoS

Routing Protocol, Bandwidth Routing Protocol, On Demand Link State Multipath QoS Routing

Protocol : QoS Frameworks for Ad Hoc Wireless Networks: QoS Models, QoS Resource

Reservation Signaling, INSIGNIA,SWAN: Energy Management in Ad Hoc Wireless Networks –

Introduction : Need for Energy Management in Ad Hoc Wireless Networks : Classification of

Energy Management Schemes : Battery Management Schemes : Transmission Power

Management Schemes : System Power Management Schemes

Page 30: ANNA UNIVERSITY OF TECHNOLOGY MADURAI ...autmdu.ac.in/syllabus/COMPUTERSCIENCEENGINEERINGPT.pdfRole of a Parser – Context Free Grammars – Top:Down Parsing – Bottom:Up Parsing

TOTAL:45

REFERENCE BOOKS:

1. C. Siva Ram Murthy and B.S. Manoj ―Ad Hoc Wireless Networks: Architectures and

Protocols‖, Prentice Hall PTR,2004

2. C.K. Toh, Ad Hoc Mobile Wireless Networks: Protocols and Systems, Prentice Hall

PTR, 2001

3. Charles E. Perkins, Ad Hoc Networking, Addison Wesley, 2000

10244CSE44 BIO INFORMATICS

L T P C

3 0 0 3

1. INTRODUCTION 7

The Central Dogma – Killer Application – Parallel Universes – Watson‘s Definition : Top Down

Vs Bottom Up Approach – Information Flow – Conversance:Communications.

2. DATABASE AND NETWORKS 9

Definition – Data Management – Data Life Cycle – Database Technology – Interfaces –

Implementation – Networks: Communication Models – Transmission Technology Protocols –

Bandwidth – Topology – Contents – Security – Ownership – Implementation.

3. SEARCH ENGINES AND DATA VISUALIZATION 10

Search Process – Technologies – Searching And Information Theory – Computational Methods –

Knowledge Management – Sequence Visualizations – Structure Visualizations – User Interfaces

– Animation Vs Simulation

4. STATISTICS, DATA MINING AND PATTERN MATCHING 11

Statistical Concepts – Micro Arrays – Imperfect Data – Basics – Quantifying –Randomness –

Data Analysis – Tools Selection – Alignment – Clustering – Classification

– Data Mining Methods – Technology – Infrastructure Pattern Recognition – Discovery –

Machine Learning – Text Mining – Pattern Matching Fundamentals – Dot Matrix Analysis –

Substitution Matrix – Dynamic Programming – Word Method – Bayesian Method – Multiple

Sequence Alignment Tools.

5. MODELING SIMULATION AND COLLABORATION 8

Drug Discovery Fundamentals – Protein Structure – System Biology Tools – Collaboration And

Communication – Standards – Issues – Case Study.

Total: 45

REFERENCE BOOKS:

1. Bryan Bergeron, ―Bio Informatics Computing‖, Prentice Hall, 2003.

2. T.K. Affward, D.J. Parry Smith, ―Introduction to Bio Informatics‖, Pearson Education,

2001.

3. Pierre Baldi, Soren Brunak, ―Bio Informatics – The Machine Learning Approach‖, 2nd

Edition, First East West Press, 2003

Page 31: ANNA UNIVERSITY OF TECHNOLOGY MADURAI ...autmdu.ac.in/syllabus/COMPUTERSCIENCEENGINEERINGPT.pdfRole of a Parser – Context Free Grammars – Top:Down Parsing – Bottom:Up Parsing

10244CSE45 RECENT TRENDS IN MOBILE COMPUTING

L T P C

3 0 0 3

Unit I. INTRODUCTION 9

Medium Access Control : Motivation for Specialized MAC: SDMA: FDMA: TDMACDMA:

Comparison of Access mechanisms – Tele communications : GSM: DECTTETRA – UMTS:

IMT:200 – Satellite Systems: Basics: Routing: Localization: Handover: Broadcast Systems:

Overview – Cyclic Repetition of Data: Digital Audio Broadcasting – Digital Video Broadcasting

Unit II. WIRELESS NETWORKS 9

Wireless LAN: Infrared Vs Radio Transmission – Infrastructure Networks: Ad hoc Networks:

IEEE 802.11 – HIPERLAN – Bluetooth: Wireless ATM: Working Group: Services: Reference

Model – Functions – Radio Access Layer – Handover: Location Management: Addressing

Mobile Quality of Service: Access Point Control Protocol

Unit III. MOBILE NETWORK LAYER 9

Mobile IP : Goals – Assumptions and Requirement – Entities – IP packet Delivery: Agent

Advertisement and Discovery – Registration – Tunneling and Encapsulation – Optimization –

Reverse Tunneling – IPv6 – DHCP: Ad hoc Networks , Mobile Transport Layer, Application

Layer

Unit IV. MOBILE TRANSPORT LAYER 9

Traditional TCP: Indirect TCP: Snooping TCP: Mobile TCP: Fast retransmit/ Fast Recovery:

Transmission/ Timeout Freezing – Selective Retransmission: Transaction Oriented TCP

Unit V. WAP 9

Architecture – Datagram Protocol: Transport Layer Security: Transaction Protocol: Session

Protocol: Application Environment:Wireless Telephony Application

TOTAL:45

REFERENCE BOOKS

1. J.Schiller, Mobile Communication, Addison Wesley, 2000.

2. William Stallings, Wireless Communication and Networks, Pearson Education, 2003.

3. Singhal, WAP:Wireless Application Protocol, Pearson Education, 2003

4. Lother Merk, Martin. S. Nicklaus and Thomas Stober, Principles of Mobile Computing,

Second Edition, Springer, 2003.

5. William C.Y.Lee, Mobile Communication Design Fundamentals, John Wiley, 1993.

10244CSE46 : SEMANTIC WEB

L T P C

3 0 0 3

Page 32: ANNA UNIVERSITY OF TECHNOLOGY MADURAI ...autmdu.ac.in/syllabus/COMPUTERSCIENCEENGINEERINGPT.pdfRole of a Parser – Context Free Grammars – Top:Down Parsing – Bottom:Up Parsing

1. INTRODUCTION 8

History – Semantic Web Layers –Semantic Web technologies – Semantics in Semantic

Web – XML: Structuring – Namespaces – Addressing – Querying – Processing

2. RDF 10

RDF and Semantic Web – Basic Ideas : RDF Specification – RDF Syntax: XML and

Non: XML : RDF elements – RDF relationship: Reification, Container, and collaboration

– RDF Schema – Editing, Parsing, and Browsing RDF/XML:RQL:RDQL

3. ONTOLOGY 10

Why Ontology – Ontology movement – OWL – OWL Specification : OWL Elements –

OWL constructs: Simple and Complex – Ontology Engineering : Introduction –

Constructing ontologies – Reusing ontologies – On:To:Knowledge Semantic Web

architecture

4. LOGIC AND INFERENCE 9

Logic – Description Logics : Rules – Monotonic Rules: Syntax, Semantics and examples

– Non:Monotonic Rules – Motivation, Syntax, and Examples – Rule Markup in XML:

Monotonic Rules, and Non:Monotonic Rules

5. APPLICATIONS OF SEMANTIC WEB TECHNOLOGIES 8

RDF Uses: Commercial and Non:Commercial use – Sample Ontology – e:Learning –

Web Services – Web mining – Horizontal information – Data Integration – Future of

Semantic Web

TOTAL: 45

REFERENCES

1. Grigorous Antoniou and Van Hermelen : ―A Semantic Web Primer‖:The MIT Press –

2004

2. ―Spinning the Semantic Web: Bringing the world wide web to its full potential‖ – The

MIT Press – 2004

3. Shelley Powers – ―Practical RDF‖ – O‘reilly publishers – First Indian Reprint : 2003

10244CSE51 DATA WAREHOUSING AND DATA MINING

L T P C

3 0 0 3

UNIT I DATA WAREHOUSING 9

Data Warehousing and Business Analysis : Data warehousing Components –Building a Data

warehouse – Mapping the Data Warehouse to a Multiprocessor Architecture – DBMS Schemas

for Decision Support – Online Analytical Processing (OLAP) – OLAP and Multidimensional

Data Analysis.

Page 33: ANNA UNIVERSITY OF TECHNOLOGY MADURAI ...autmdu.ac.in/syllabus/COMPUTERSCIENCEENGINEERINGPT.pdfRole of a Parser – Context Free Grammars – Top:Down Parsing – Bottom:Up Parsing

UNIT II DATAMINING : PREPROCESSING AND ASSOCIATION RULE

MINING 9

Data Mining : Data Mining Functionalities – Data Preprocessing – Data Cleaning – Data

Integration and Transformation – Data Reduction – Data Discretization and Concept Hierarchy

Generation. Association Rule Mining : Efficient and Scalable Frequent Item set Mining Methods

– Mining Various Kinds of Association Rules.

UNIT III CLASSIFICATION AND PREDICTION 9

Classification and Prediction : Issues Regarding Classification and Prediction – Classification by

Decision Tree Introduction – Bayesian Classification – Rule Based Classification –

Classification by Back propagation – Support Vector Machines – Associative Classification –

Other Classification Methods – Prediction – Accuracy and Error Measures – Evaluating the

Accuracy of a Classifier or Predictor

UNIT IV CLUSTERING 9

Cluster Analysis : Types of Data in Cluster Analysis – A Categorization of Major Clustering

Methods – Partitioning Methods – Hierarchical methods – Density:Based Methods – Grid:Based

Methods – Model:Based Clustering Methods – Clustering High:Dimensional Data – Constraint:

Based Cluster Analysis – Outlier Analysis.

UNIT V RECENT TRENDS 9

Mining Object, Spatial, Multimedia, Text and Web Data:

Multidimensional Analysis and Descriptive Mining of Complex Data Objects – Spatial Data

Mining – Multimedia Data Mining – Text Mining – Mining the World Wide Web.

Total : 45

REFERENCES

1. Jiawei Han and Micheline Kamber ―Data Mining Concepts and Techniques‖ Second

Edition, Elsevier, Reprinted 2008.

2. Alex Berson and Stephen J. Smith ―Data Warehousing, Data Mining & OLAP‖, Tata

McGraw – Hill Edition, Tenth Reprint 2007.

3. K.P. Soman, Shyam Diwakar and V. Ajay ―Insight into Data mining Theory and

Practice‖, Easter Economy Edition, Prentice Hall of India, 2006.

4. G. K. Gupta ―Introduction to Data Mining with Case Studies‖, Easter Economy Edition,

Prentice Hall of India, 2006.

5. Pang:Ning Tan, Michael Steinbach and Vipin Kumar ―Introduction to Data Mining‖,

Pearson Education, 2007.

10244CSE52 AGENT BASED INTELLIGENT SYSTEMS

L T P C

3 0 0 3

UNIT I INTRODUCTION 9

Definitions : Foundations : History : Intelligent Agents:Problem Solving:Searching : Heuristics :

Constraint Satisfaction Problems : Game playing.

Page 34: ANNA UNIVERSITY OF TECHNOLOGY MADURAI ...autmdu.ac.in/syllabus/COMPUTERSCIENCEENGINEERINGPT.pdfRole of a Parser – Context Free Grammars – Top:Down Parsing – Bottom:Up Parsing

UNIT II KNOWLEDGE REPRESENTATION AND REASONING 9

Logical Agents:First order logic:First Order Inference:Unification:Chaining: Resolution

Strategies:Knowledge Representation:Objects:Actions:Events

UNIT III PLANNING AGENTS 9

Planning Problem:State Space Search:Partial Order Planning:Graphs:Nondeterministic

Domains:Conditional Planning:Continuous Planning:MultiAgent Planning.

UNIT IV AGENTS AND UNCERTAINITY 9

Acting under uncertainty – Probability Notation:Bayes Rule and use – Bayesian Networks:Other

Approaches:Time and Uncertainty:Temporal Models: Utility Theory : Decision Network –

Complex Decisions.

UNIT V HIGHER LEVEL AGENTS 9

Knowledge in Learning:Relevance Information:Statistical Learning Methods:Reinforcement

Learning:Communication:Formal Grammar:Augmented Grammars: Future of AI.

Total: 45

REFERENCES:

1. Stuart Russell and Peter Norvig, ―Artificial Intelligence : A Modern Approach‖, 2nd

Edition, Prentice Hall, 2002

2. Michael Wooldridge, ―An Introduction to Multi Agent System‖, John Wiley, 2002.

3. Patrick Henry Winston, Artificial Intelligence, III Edition, AW, 1999.

4. Nils.J.Nilsson, Principles of Artificial Intelligence, Narosa Publishing House, 1992.

10244CSE53 HIGH SPEED NETWORKS

L T P C

3 0 0 3

UNIT I HIGH SPEED NETWORKS 9

Frame Relay Networks – Asynchronous transfer mode – ATM Protocol Architecture, ATM

logical Connection, ATM Cell – ATM Service Categories – AAL. High Speed LAN‘s: Fast

Ethernet, Gigabit Ethernet, Fibre Channel – Wireless LAN‘s.

UNIT II CONGESTION AND TRAFFIC MANAGEMENT 9

Queuing Analysis: Queuing Models – Single Server Queues – Effects of Congestion –

Congestion Control – Traffic Management – Congestion Control in Packet Switching Networks

– Frame Relay Congestion Control.

UNIT III TCP AND ATM CONGESTION CONTROL 9

TCP Flow control – TCP Congestion Control – Retransmission – Timer Management –

Exponential RTO backoff – KARN‘s Algorithm – Window management – Performance of TCP

over ATM. Traffic and Congestion control in ATM – Requirements – Attributes – Traffic

Management Frame work, Traffic Control – ABR traffic Management – ABR rate control, RM

cell formats, ABR Capacity allocations – GFR traffic management.

UNIT IV INTEGRATED AND DIFFERENTIATED SERVICES 9

Integrated Services Architecture – Approach, Components, Services: Queuing Discipline, FQ,

PS, BRFQ, GPS, WFQ – Random Early Detection, Differentiated Services.

Page 35: ANNA UNIVERSITY OF TECHNOLOGY MADURAI ...autmdu.ac.in/syllabus/COMPUTERSCIENCEENGINEERINGPT.pdfRole of a Parser – Context Free Grammars – Top:Down Parsing – Bottom:Up Parsing

UNIT V PROTOCOLS FOR QOS SUPPORT 9

RSVP – Goals & Characteristics, Data Flow, RSVP operations, Protocol Mechanisms –

Multiprotocol Label Switching – Operations, Label Stacking, Protocol details – RTP – Protocol

Architecture, Data Transfer Protocol, RTCP.

L:45 T:15 Total:60

REFERENCES

1. William Stallings, ―High Speed Networks and Internet‖, Second Edition, Pearson

Education, 2002.

2. Warland, Pravin Varaiya, ―High Performance Communication Networks‖, Second

Edition, Jean Harcourt Asia Pvt. Ltd., 2001.

3. Irvan Pepelnjk, Jim Guichard, Jeff Apcar, ―MPLS and VPN Architecture‖, Cisco Press,

Volume 1 and 2, 2003.

10244CSE54 DECISION SUPPORT SYSTEMS

L T P C

3 0 0 3

UNIT:I INTRODUCTION

Introduction : DSS definition: characteristics: History of DSS: Components of DSS: Data and

Model Management:DSS knowledge base: user interfaces: DSS user: categories and classes of

DSS‘s: Decision and Decision Makers : Decision Makers: Decision styles: Decision

effectiveness: Hardness of Decisions

UNIT:II DECISION MAKING

Typology of Decisions: Decision theory: Rational Decision Making: Bounded

Rationality:Process of choice – Cognitive processes:Heuristics in Decision Making:

Effectiveness and efficiency: Decisions in the Organization: Understanding the Organization:

Organization culture: power and politics: organization Decision making

UNIT:III DECISION PROCESSES

Modeling Decision Processes: Problem definition and its structure – decision models: types of

probability and its forecasting techniques: sensitivity analysis: Group Decision Support : Group

Decision making: the problem with groups: concepts and definition of MDM technology –

MDM activities: virtual workplace:Executive Information system(EIS):history of

EIS:characteristics of executives: EIS components:making EIS workfuture of executive Decision

making and EIS.

UNIT:IV SYSTEM PERSPECTIVE OF DSS

Perspective of DSS: System – DSS in the context of information system: Information quality

issues in DSS design: DSS information system architecture: role of Internet in DSS development

and use: Designing and Building DSS: Strategies of DSS Analysis and Design: DSS

Developer:tools for DSS development: DSS user

Page 36: ANNA UNIVERSITY OF TECHNOLOGY MADURAI ...autmdu.ac.in/syllabus/COMPUTERSCIENCEENGINEERINGPT.pdfRole of a Parser – Context Free Grammars – Top:Down Parsing – Bottom:Up Parsing

Interface Issues

UNIT:V IMPLEMENTATION OF DSS

Implementing DSS: DSS Implementation: Patterns of Implementation: System

Evaluation:Importance of Integration:Creativity Decision making: Definition of creativity:

occurrence of creativity: creative problem solving techniques:introduction to intelligent DSS (AI,

Expert system and Knowledge based systems)– DSS in the 21st century:future of DSS, EIS and

DSS technologies

REFERENCES

1. George M .Marakas, "Decision Support Systems", 2nd Edition, Pearson Education, 2005.

2. Efraim Turban, Jay E.Aronson, Ting:Peng Liang, "Decision Support Systems and

Intelligent Systems", 7th Edition, Pearson Education, 2006.

10244CSE55 FAULT TOLERANT SYSTEMS

L T P C

3 0 0 3

UNIT – I Fundamental Concepts

Definitions of fault tolerance, fault classification, fault tolerant attributes and system structure.

Fault:Tolerant Design Techniques: Information redundancy, hardware redundancy, and time

redundancy.

UNIT – II Dependability Evaluation Techniques

Reliability and availability models: (Combinatorial techniques, Fault:Tree models, Markov

models), Performability Models. Architecture of Fault:Tolerant Computers (case study):

General:purpose systems, high:availability systems, long:life systems, critical systems.

UNIT – III Software Fault Tolerance

Software faults and their manifestation, design techniques, reliability models.

UNIT – IV Fault Tolerant Parallel/Distributed Architectures

Shared bus and shared memory architectures, fault tolerant networks.

UNIT – V Recent topics in fault tolerant systems

Security, fault tolerance in wireless/mobile networks and Internet.

TOTAL:45

REFERENCES

Page 37: ANNA UNIVERSITY OF TECHNOLOGY MADURAI ...autmdu.ac.in/syllabus/COMPUTERSCIENCEENGINEERINGPT.pdfRole of a Parser – Context Free Grammars – Top:Down Parsing – Bottom:Up Parsing

1. Fault:Tolerant Computer System Design D.K. Pradhan, 2003

2. Design and Analysis of Fault:Tolerant Digital Systems, B.W.Johnson, Addison:Wesley,

1989

3. Fault:Tolerant Computing, Theory and Techniques, Volumes I and II , D.K. Pradhan,

Prentice Hall, 1986

4. Reliable Computer Systems: Design and Evaluation, D.P.Siewiorek and R.S.Swartz,

Digital Press, 1992

5. Probability and Statistics with Reliability, Queueing and Computer Science Application,

K.S.Trivedi, Prentice Hall, 1982

10244CSE56 GRID COMPUTING

L T P C

3 0 0 3

1. GRID COMPUTING INITIATIVES

Introduction : Definition : Scope of grid computing – Grid Computing Organizations and their

roles – Grid Computing analog – Grid Computing road map.

2. GRID COMPUTING APPLICATIONS AND TECHNOLOGIES

Merging the Grid services Architecture with the Web Services Architecture – OGSA – Sample

use cases – OGSA platform components – OGSI – OGSA Basic Services.

3. GRID COMPUTING TOOL KITS

The Globus Toolkit 4 – GT4 Java WS core: state full webservice – Singleton, Multiple

Resources – Life Cycle Management – Persistent Resources – GT4 Security: GSI – The security

Descriptor – Authentication – Authorization – Resource level security.

4. GLOBUS TOOL KIT

Installing the Globus Toolkit 4 – WSDL Primer – Command Line Clients – Examples.

5. CASE STUDY

Case Study: GridSim: Installing the simulator – examples – Alchemi Toolkit: Owner, Manager

and Executor cluster – Prime number generation example. (Web References)

TOTAL:45

REFERENCE BOOKS:

1. Joshy Joseph & Craig Fellenstein, ―Grid Computing‖, PHI, PTR:2003.

2. Borja Sotomayor & Lisa Childers, Globus Toolkit® 4: Programming Java Services,

Morgan Kaufmann, 2006

Page 38: ANNA UNIVERSITY OF TECHNOLOGY MADURAI ...autmdu.ac.in/syllabus/COMPUTERSCIENCEENGINEERINGPT.pdfRole of a Parser – Context Free Grammars – Top:Down Parsing – Bottom:Up Parsing

3. Ahmar Abbas, ―Grid Computing: A Practical Guide to technology and Applications‖,

Charles River media – 2003.

10244CSE57 WIRELESS SENSOR NETWORKS

L T P C

3 0 0 3

UNIT I INTRODUCTION

Over view of sensor networks: Constraints and challenges – Advantages of sensor networks:

Applications: Collaborative processing – Key definitions in sensor networks – Tracking scenario

– Problem formulation – Distributed representation and interference of states – Tracking multiple

objects – sensor models: Performance comparison and metrics.

UNIT II NETWORKING SENSORS

Key assumption : Medium access control – S:MAC protocol – IEEE 802.15.4 standard and

ZigBee : General Issues : Geographic, Energy – Aware Routing : Attribute based routing.

Page 39: ANNA UNIVERSITY OF TECHNOLOGY MADURAI ...autmdu.ac.in/syllabus/COMPUTERSCIENCEENGINEERINGPT.pdfRole of a Parser – Context Free Grammars – Top:Down Parsing – Bottom:Up Parsing

UNIT III INFRASTRUCTURE ESTABLISHMENT

Topology control – Clustering :Time Synchronization – Localization – Task driven sensing –

Role of sensor nodes – Information based tasking : Routing and aggregation.

UNIT IV SENSOR NETWORK DATABASE

Sensor Database Challenges – Querying the physical environment – Interfaces – In:network

aggregation – Data centric storage – Data indices and range queries – Distributed Hierarchical

aggregation – Temporal data.

UNIT V SENSOR NETWOR PLATFORMS AND TOOLS

Sensor Node Hardware – Sensor network programming challenges – Node level software

platforms – Operating system TinyOS – Node level simulators – State centric programming –

Applications and future directions.

Total: 45

REFERENCE:

Feng Zhao, Leonidas Guibas, ―Wireless sensor networks an information processing approach‖,

Mogan kanufmann publishers, 2004.