54
ANNA UNIVERSITY COIMBATORE Curriculum & Syllabi - Regulations 2007 Four Year BE Programme B.E. (Computer Science and Engineering) Semester VII S. No. Course Title L T P C THEORY 1 Principles of Compiler Design 3 1 0 4 2 Object Oriented Analysis and Design 3 1 0 4 3 Principles of Management 3 0 0 3 4 Elective II 3 0 0 3 5 Elective III 3 0 0 3 PRACTICAL 1 CASE Tools Lab 0 0 3 1.5 2 Compiler Design Lab 0 0 3 1.5 Semester VIII S. No. Course Title L T P C THEORY 1 Mobile Computing 3 0 0 3 2 Elective IV 3 0 0 3 3 Elective V 3 0 0 3 PRACTICAL 1 Project Work 0 0 12 12 SEMESTER VII (Elective – II , III) Code No. Course Title L T P M 1 Advanced Operating Systems 3 0 0 3 2 Real Time Systems 3 0 0 3 3 TCP/IP Design and Implementation 3 0 0 3 4 C# and .NET Framework 3 0 0 3 5 Pervasive Computing 3 0 0 3 6 Cryptography and Network Security 3 1 0 4 7 Natural Language Processing 3 0 0 3 8 Advanced Computer Architecture 3 0 0 3 9 Service Oriented Architecture 3 0 0 3 10 Graph Theory 3 0 0 3 11 Total Quality Management 3 0 0 3 12 Software Testing 3 0 0 3 13 Cyber Forensics 3 0 0 3 SEMESTER VIII (Elective – IV , V)

Copy of Syllabus

Embed Size (px)

Citation preview

Page 1: Copy of Syllabus

ANNA UNIVERSITY COIMBATORECurriculum & Syllabi - Regulations 2007Four Year BE ProgrammeB.E. (Computer Science and Engineering)Semester VIIS. No. Course Title L T P CTHEORY1 Principles of Compiler Design 3 1 0 42 Object Oriented Analysis and Design 3 1 0 43 Principles of Management 3 0 0 34 Elective II 3 0 0 35 Elective III 3 0 0 3PRACTICAL1 CASE Tools Lab 0 0 3 1.52 Compiler Design Lab 0 0 3 1.5Semester VIIIS. No. Course Title L T P CTHEORY1 Mobile Computing 3 0 0 32 Elective IV 3 0 0 33 Elective V 3 0 0 3PRACTICAL1 Project Work 0 0 12 12SEMESTER VII (Elective – II , III)Code No. Course Title L T P M1 Advanced Operating Systems 3 0 0 32 Real Time Systems 3 0 0 33 TCP/IP Design and Implementation 3 0 0 34 C# and .NET Framework 3 0 0 35 Pervasive Computing 3 0 0 36 Cryptography and Network Security 3 1 0 47 Natural Language Processing 3 0 0 38 Advanced Computer Architecture 3 0 0 39 Service Oriented Architecture 3 0 0 310 Graph Theory 3 0 0 311 Total Quality Management 3 0 0 312 Software Testing 3 0 0 313 Cyber Forensics 3 0 0 3SEMESTER VIII (Elective – IV , V)S No. Course Title L T P M1 Information Security 3 0 0 32 Parallel Computing 3 0 0 33 Soft Computing 3 0 0 34 High Speed Networks 3 0 0 35 Digital Image Processing 3 0 0 36 Robotics 3 0 0 3

Page 2: Copy of Syllabus

7 Component Based Technology 3 0 0 38 Software Quality Management 3 0 0 39 Quantum Computing 3 0 0 310 Multi – core Architecture and Programming 3 0 0 311 Grid Computing 3 0 0 312 Bio Informatics 3 0 0 313 Professional Ethics 3 0 0 314 Semantic Web 3 0 0 315 Advanced JAVA Programming 3 0 0 3SEMESTER VIIPRINCIPLES OF COMPILER DESIGNL T P M C3 1 0 100 4UNIT I INTRODUCTION TO COMPILING 9Compilers – Analysis of the source program – Phases of a compiler – Cousins of theCompiler – Grouping of Phases – Compiler construction tools – Lexical Analysis – Roleof Lexical Analyzer – Input Buffering – Specification of Tokens.UNIT II SYNTAX ANALYSIS 9Role of the parser –Writing Grammars –Context-Free Grammars – Top Down parsing –Recursive Descent Parsing – Predictive Parsing – Bottom-up parsing – Shift ReduceParsing – Operator Precedent Parsing – LR Parsers – SLR Parser – Canonical LRParser – LALR Parser.UNIT III INTERMEDIATE CODE GENERATION 9Intermediate languages – Declarations – Assignment Statements – BooleanExpressions – Case Statements – Back patching – Procedure calls.UNIT IV CODE GENERATION 9Issues in the design of code generator – The target machine – Runtime Storagemanagement – Basic Blocks and Flow Graphs – Next-use Information – A simple Codegenerator – DAG representation of Basic Blocks – Peephole Optimization.UNIT V CODE OPTIMIZATION AND RUN TIME ENVIRONMENTS 9Introduction– Principal Sources of Optimization – Optimization of basic Blocks –Introduction to Global Data Flow Analysis – Runtime Environments – Source Languageissues – Storage Organization – Storage Allocation strategies – Access to non-localnames – Parameter Passing.TUTORIAL : 15TOTAL : 45 + 15 = 60REFERENCE BOOKS

Page 3: Copy of Syllabus

1. Alfred Aho, Ravi Sethi, Jeffrey D Ullman, “Compilers Principles, Techniques andTools”,Pearson Education Asia, 2003.2. Allen I. Holub “Compiler Design in C”, Prentice Hall of India, 2003.3. C. N. Fischer and R. J. LeBlanc, “Crafting a compiler with C”, BenjaminCummings,2003.4. J.P. Bennet, “Introduction to Compiler Techniques”, Second Edition, TataMcGraw-Hill, 2003.OBJECT ORIENTED ANALYSIS AND DESIGNL T P M C3 1 0 100 3UNIT I INTRODUCTION 8An Overview of Object Oriented Systems Development - Object Basics – ObjectOriented Systems Development Life Cycle.UNIT II OBJECT ORIENTED METHODOLOGIES 12Rumbaugh Methodology - Booch Methodology - Jacobson Methodology - Patterns –Frameworks – Unified Approach – Unified Modeling Language – Use case - classdiagram - Interactive Diagram - Package Diagram - Collaboration Diagram - StateDiagram - Activity Diagram.UNIT III OBJECT ORIENTED ANALYSIS 9Identifying use cases - Object Analysis - Classification – Identifying Object relationships- Attributes and Methods.UNIT IV OBJECT ORIENTED DESIGN 8Design axioms - Designing Classes – Access Layer - Object Storage - ObjectInteroperability.UNIT V SOFTWARE QUALITY AND USABILITY 8Designing Interface Objects – Software Quality Assurance – System Usability -Measuring User SatisfactionTUTORIAL 15TOTAL : 60REFERENCE BOOKS1. Ali Bahrami, “Object Oriented Systems Development”, Tata McGraw-Hill, 19992. Martin Fowler, “UML Distilled”, Second Edition, PHI/Pearson Education, 2002.3. Stephen R. Schach, “Introduction to Object Oriented Analysis and Design”, TataMcGraw-Hill, 2003.4. James Rumbaugh, Ivar Jacobson, Grady Booch “The Unified ModelingLanguage Reference Manual”, Addison Wesley, 1999.PRINCIPLES OF MANAGEMENT3 0 0 100 3Unit I. HISTORICAL DEVELOPMENT 9Definition of Management – Science or Art – Management and Administration –

Page 4: Copy of Syllabus

Development of Management Thought – Contribution of Taylor and Fayol – Functions ofManagement – Types of Business Organisation.Unit II. PLANNING 9Nature & Purpose – Steps involved in Planning – Objectives – Setting Objectives –Process of Managing by Objectives – Strategies, Policies & Planning Premises-Forecasting – Decision-making.Unit III. ORGANISING 9Nature and Purpose – Formal and informal organization – Organization Chart –Structure and Process – Departmentation by difference strategies – Line and Staffauthority – Benefits and Limitations – De-Centralization and Delegation of Authority –Staffing – Selection Process - Techniques – HRD – Managerial Effectiveness.Unit IV. DIRECTING 9Scope – Human Factors – Creativity and Innovation – Harmonizing Objectives –Leadership – Types of Leadership Motivation – Hierarchy of needs – Motivation theories– Motivational Techniques – Job Enrichment – Communication – Process ofCommunication – Barriers and Breakdown – Effective Communication – Electronicmedia in Communication.Unit V. CONTROLLING 9System and process of Controlling – Requirements for effective control – The Budget asControl Technique – Information Technology in Controlling – Use of computers inhandling the information – Productivity – Problems and Management – Control ofOverall Performance – Direct and Preventive Control – Reporting – The GlobalEnvironment – Globalization and Liberalization – International Management and Globaltheory of Management.TOTAL : 45REFERENCE BOOKS1. Harold Koontz & Heinz Weihrich “Essentials of Management”, Tata McGraw-Hill, 1998.2. Joseph L Massie “Essentials of Management”, Prentice Hall of India,(Pearson) Fourth Edition, 2003.3. Tripathy PC And Reddy PN, “Principles of Management”, Tata McGraw-Hill,1999.4. Decenzo David, Robbin Stephen A, ”Personnel and Human ReasonsManagement”, Prentice Hall of India, 1996COMPILER DESIGN LABL T P M C0 0 3 100 1.51 & 2 Implement a lexical analyzer in “C”.

Page 5: Copy of Syllabus

3. Use LEX tool to implement a lexical analyzer.4. Implement a recursive descent parser for an expression grammar that generatesarithmetic expressions with digits, + and *.5. Use YACC and LEX to implement a parser for the same grammar as given inproblem6. Write semantic rules to the YACC program in problem 5 and implement a calculatorthat takes an expression with digits, + and * and computes and prints its value.7 & 8. Implement the front end of a compiler that generates the three address code for asimple language with: one data type integer, arithmetic operators, relationaloperators, variable declaration statement, one conditional construct, one iterativeconstruct and assignment statement.9 &10. Implement the back end of the compiler which takes the three address codegenerated in problems 7 and 8, and produces the 8086 assembly languageinstructions that can be assembled and run using a 8086 assembler. The targetassembly instructions can be simple move, add, sub, jump. Also simpleaddressing modes are used.CASE TOOLS LABL T P M C0 0 3 100 1.51. Prepare the following documents for two or three of the experiments listed belowand develop the software engineering methodology.2. Program Analysis and Project Planning.Thorough study of the problem – Identify project scope, Objectives,Infrastructure.3. Software requirement AnalysisDescribe the individual Phases / Modules of the project, Identifydeliverables.4. Data ModelingUse work products – Data dictionary, Use diagrams and activity diagrams,build and test lass diagrams, Sequence diagrams and add interface toclass diagrams.5. Software Development and Debugging6. Software TestingPrepare test plan, perform validation testing, Coverage analysis, memoryleaks, develop test case hierarchy, Site check and Site monitor.SUGGESTED LIST OF APPLICATIONS1. Student Marks Analyzing System2. Quiz System3. Online Ticket Reservation System4. Payroll System5. Course Registration System

Page 6: Copy of Syllabus

6. Expert Systems7. ATM Systems8. Stock Maintenance9. Real-Time Scheduler10. Remote Procedure Call ImplementationSEMESTER VIIIMOBILE COMPUTINGL T P M C3 0 0 100 3UNIT I WIRELESS COMMUNICATION FUNDAMENTALS 9Introduction – Wireless transmission – Frequencies for radio transmission – Signals –Antennas – Signal Propagation – Multiplexing – Modulations – Spread spectrum – MAC– SDMA – FDMA – TDMA – CDMA – Cellular Wireless Networks.UNIT II TELECOMMUNICATION NETWORKS 11Telecommunication systems – GSM – GPRS – DECT – UMTS – IMT-2000 – SatelliteNetworks - Basics – Parameters and Configurations – Capacity Allocation – FAMA andDAMA – Broadcast Systems – DAB - DVB.UNIT III WIRLESS LAN 9Wireless LAN – IEEE 802.11 - Architecture – services – MAC – Physical layer – IEEE802.11a - 802.11b standards – HIPERLAN – Blue Tooth.UNIT IV MOBILE NETWORK LAYER 9Mobile IP – Dynamic Host Configuration Protocol - Routing – DSDV – DSR – AlternativeMetrics.UNIT V TRANSPORT AND APPLICATION LAYERS 7Traditional TCP – Classical TCP improvements – WAP, WAP 2.0.TOTAL : 45REFERENCE BOOKS1. Jochen Schiller, “Mobile Communications”, PHI/Pearson Education, SecondEdition, 2003. (Unit I Chap 1,2 &3- Unit II chap 4,5 &6-Unit III Chap 7.Unit IVChap 8- Unit V Chap 9&10.)2. William Stallings, “Wireless Communications and Networks”, PHI/PearsonEducation, 2002. (Unit I Chapter – 7&10-Unit II Chap 9)3. Kaveh Pahlavan, Prasanth Krishnamoorthy, “Principles of Wireless Networks”,PHI/Pearson Education, 2003.4. Uwe Hansmann, Lothar Merk, Martin S. Nicklons and Thomas Stober, “Principlesof Mobile Computing”, Springer, New York, 2003.ADVANCED JAVA PROGRAMMINGL T P M C3 0 0 100 3

Page 7: Copy of Syllabus

UNIT I JAVA FUNDAMENTALS 9Java I/O streaming – filter and pipe streams – Byte Code interpretation - reflection –Dynamic Reflexive Classes – Threading – Java Native Interfaces- Swing.UNIT II NETWORK PROGRAMMING IN JAVA 9Sockets – secure sockets – custom sockets – UDP datagrams – multicast sockets –URL classes – Reading Data from the server – writing data – configuring the connection– Reading the header – telnet application – Java Messaging servicesUNIT III APPLICATIONS IN DISTRIBUTED ENVIRONMENT 9Remote method Invocation – activation models – RMI custom sockets – ObjectSerialization – RMI – IIOP implementation – CORBA – IDL technology – NamingServices – CORBA programming Models - JAR file creationUNIT IV MULTI-TIER APPLICATION DEVELOPMENT 9Server side programming – servlets – Java Server Pages - Applet to Appletcommunication – applet to Servlet communication - JDBC – Using BLOB and CLOBobjects – storing Multimedia data into databases – Multimedia streaming applications –Java Media Framework.UNIT V ENTERPRISE APPLICATIONS 9Server Side Component Architecture – Introduction to J2EE – Session Beans – EntityBeans – Persistent Entity Beans – Transactions.TOTAL : 45REFERENCE BOOKS1. Elliotte Rusty Harold, “ Java Network Programming”, O’Reilly publishers, 2000(UNIT II)2. Ed Roman, “Mastering Enterprise Java Beans”, John Wiley & Sons Inc., 1999.(UNIT III and UNIT V)3. Hortsmann & Cornell, “CORE JAVA 2 ADVANCED FEATURES, VOL II”,Pearson Education, 2002. (UNIT I and UNIT IV)4. Web reference: http://java.sun.com.5. Patrick Naughton, “COMPLETE REFERENCE: JAVA2”, Tata McGraw-Hill, 2003.SOFTWARE TESTINGL T P M C3 0 0 100 3UNIT I. Introduction 8Testing as an Engineering Activity – Testing as a Process – testing axioms - BasicDefinitions – Software Testing Principles – The Tester’s Role in a SoftwareDevelopment Organization – Origins of Defects – cost of defects - Defect Classes – The

Page 8: Copy of Syllabus

Defect Repository and Test Design – Defect Examples – Developer/Tester Support forDeveloping a Defect Repository – Defect Prevention StrategiesUNIT II. Test Case Design 11Test Case Design Strategies – Using Black Box Approach to Test Case Design -Random Testing – Requirements based testing – Boundary Value Analysis – Decisiontables - Equivalence Class Partitioning - State-based testing – Cause-effect graphing –Error guessing - Compatibility testing – User documentation testing – Domain testingUsing White Box Approach to Test design – Test Adequacy Criteria – static testing vs.structural testing – code functional testing - Coverage and Control Flow Graphs –Covering Code Logic – Paths – Their Role in White–box Based Test Design – codecomplexity testing – Evaluating Test Adequacy Criteria.UNIT III. Levels of Testing 9The Need for Levels of Testing – Unit Test – Unit Test Planning –Designing the UnitTests - The Test Harness – Running the Unit tests and Recording results – Integrationtests – Designing Integration Tests – Integration Test Planning – Scenario testing –Defect bash eliminationSystem Testing – Acceptance testing – Performance testing - Regression Testing –Internationalization testing – Ad-hoc testing - Alpha , Beta Tests – testing OO systems –Usability and Accessibility testing – Configuration testing - Compatibility testing –Testing the documentation – Website testingUNIT IV. Test Management 9People and organizational issues in testing – organization structures for testing teams –testing services - Test Planning – Test Plan Components – Test Plan Attachments –Locating Test Items – test management – test process - Reporting Test Results – Therole of three groups in Test Planning and Policy Development – Introducing the testspecialist – Skills needed by a test specialist – Building a Testing Group.UNIT V. Test Automation 8Software test automation – skills needed for automation – scope of automation – designand architecture for automation – requirements for a test tool – challenges inautomation - Test metrics and measurements –project, progress and productivity

Page 9: Copy of Syllabus

metricsTOTAL 45References:1. Srinivasan Desikan and Gopalaswamy Ramesh, “ Software Testing – Principlesand Practices”, Pearson education, 2006.2. Ilene Burnstein, “Practical Software Testing”, Springer International Edition,2003.3. Ron Patton, “ Software Testing”, Second Edition, Sams Publishing, Pearsoneducation, 20074. Renu Rajani, Pradeep Oak, “Software Testing – Effective Methods, Tools andTechniques”, Tata McGraw Hill, 20045. Aditya P. Mathur, “Foundations of Software Testing – Fundamental algorithmsand techniques”, Dorling Kindersley (India) Pvt. Ltd., Pearson Education, 2008CYBER FORENSICSL T P M C3 0 0 100 3Unit I 9Computer Forensics Fundamentals – Types of Computer Forensics Technology –Types of Vendor and Computer Forensics ServicesUnit II 9Data Recovery – Evidence Collection and Data Seizure – Duplication and Preservationof Digital Evidence – Computer Image Verification and AuthenticationUnit III 9Discover of Electronic Evidence – Identification of Data – Reconstructing Past Events –NetworksUnit IV 9Fighting against Macro Threats – Information Warfare Arsenal – Tactics of the Military –Tactics of Terrorist and Rogues – Tactics of Private CompaniesUnit V 9The Future – Arsenal – Surveillance Tools – Victims and Refugees – AdvancedComputer ForensicsReferences:1. John R. Vacca, “Computer Forensics”, Firewall Media, 2004.2. Chad Steel, “Windows Forensics”, Wiley India, 2006.3. Majid Yar, “Cybercrime and Society”, Sage Publications, 2006.4. Robert M Slade, “Software Forensics”, Tata McGrawHill, 2004.ADVANCED DATABASESL T P M C3 0 0 100 3UNIT I DISTRIBUTED DATABASES 9

Page 10: Copy of Syllabus

Distributed DBMS Concepts and Design – Introduction – Functions and Architecture ofDDBMS – Distributed Relational Database Design – Transparency in DDBMS –Distributed Transaction Management – Concurrency control – Deadlock Management –Database recovery – The X/Open Distributed Transaction Processing Model –Replication servers – Distributed Query Optimisation - Distribution and Replication inOracle.UNIT II OBJECT ORIENTED DATABASES 9Object Oriented Databases – Introduction – Weakness of RDBMS – Object OrientedConcepts Storing Objects in Relational Databases – Next Generation DatabaseSystems – Object Oriented Data models – OODBMS Perspectives – Persistence –Issues in OODBMS – Object Oriented Database Management System Manifesto –Advantages and Disadvantages of OODBMS – Object Oriented Database Design –OODBMS Standards and Systems – Object Management Group – Object DatabaseStandard ODMG – Object Relational DBMS –Postgres - Comparison of ORDBMS andOODBMS.UNIT III WEB DATABASES 9Web Technology And DBMS – Introduction – The Web – The Web as a DatabaseApplication Platform – Scripting languages – Common Gateway Interface – HTTPCookies – Extending the Web Server – Java – Microsoft’s Web Solution Platform –Oracle Internet Platform – Semi structured Data and XML – XML Related Technologies– XML Query LanguagesUNIT IV INTELLIGENT DATABASES 9Enhanced Data Models For Advanced Applications – Active Database Concepts AndTriggers – Temporal Database Concepts – Deductive databases – KnowledgeDatabases.UNIT V CURRENT TRENDS 9Mobile Database – Geographic Information Systems – Genome Data Management –Multimedia Database – Parallel Database – Spatial Databases - Databaseadministration – Data Warehousing and Data Mining.TOTAL : 45REFERENCE BOOK

Page 11: Copy of Syllabus

1. Thomas M. Connolly, Carolyn E. Begg, “Database Systems - A PracticalApproach to Design , Implementation , and Management”, Third Edition ,Pearson Education, 20032. Ramez Elmasri & Shamkant B.Navathe, “Fundamentals of Database Systems”,Fourth Edition , Pearson Education , 2004.3. M.Tamer Ozsu , Patrick Ualduriel, “Principles of Distributed Database Systems”,Second Edition, Pearso nEducation, 2003.4. C.S.R.Prabhu, “Object Oriented Database Systems”, PHI, 2003.5. Peter Rob and Corlos Coronel, “Database Systems – Design, Implementationand Management”, Thompson Learning, Course Technology, 5th Edition, 2003.ADVANCED OPERATING SYSTEMSL T P M C3 0 0 100 3UNIT I 9Architectures of Distributed Systems - System Architecture types - issues in distributedoperating systems - communication networks – communication primitives. TheoreticalFoundations - inherent limitations of a distributed system – lamp ports logical clocks –vector clocks – casual ordering of messages – global state – cuts of a distributedcomputation – termination detection. Distributed Mutual Exclusion – introduction – theclassification of mutual exclusion and associated algorithms – a comparativeperformance analysis.UNIT II 9Distributed Deadlock Detection -Introduction - deadlock handling strategies indistributed systems – issues in deadlock detection and resolution – controlorganizations for distributed deadlock detection – centralized and distributed deadlockdetection algorithms –hierarchical deadlock detection algorithms. Agreement protocols– introduction-the system model, a classification of agreement problems, solutions tothe Byzantine agreement problem, applications of agreement algorithms. Distributedresource management: introduction-architecture – mechanism for building distributedfile systems – design issues – log structured file systems.UNIT III 9Distributed shared memory-Architecture– algorithms for implementing DSM – memorycoherence and protocols – design issues. Distributed Scheduling – introduction – issues

Page 12: Copy of Syllabus

in load distributing – components of a load distributing algorithm – stability – loaddistributing algorithm – performance comparison – selecting a suitable load sharingalgorithm – requirements for load distributing -task migration and associated issues.Failure Recovery and Fault tolerance: introduction– basic concepts – classification offailures – backward and forward error recovery, backward error recovery- recovery inconcurrent systems – consistent set of check points – synchronous and asynchronouscheck pointing and recovery – check pointing for distributed database systemsrecoveryin replicated distributed databases.UNIT IV 9Protection and security -preliminaries, the access matrix model and itsimplementations.-safety in matrix model- advanced models of protection. Data security– cryptography: Model of cryptography, conventional cryptography- moderncryptography, private key cryptography, data encryption standard- public keycryptography – multiple encryptions – authentication in distributed systems.UNIT-V 9Multiprocessor operating systems - basic multiprocessor system architectures – interconnection networks for multiprocessor systems – caching – hypercube architecture.Multiprocessor Operating System - structures of multiprocessor operating system,operating system design issues- threads- process synchronization and scheduling.Database Operating systems :Introduction- requirements of a database operatingsystem Concurrency control : theoretical aspects – introduction, database systems – aconcurrency control model of database systems- the problem of concurrency control –serializability theory- distributed database systems, concurrency control algorithms –introduction, basic synchronization primitives, lock based algorithms-timestamp basedalgorithms, optimistic algorithms – concurrency control algorithms, data replication.TOTAL : 45REFERENCE BOOKS1. Mukesh Singhal, Niranjan G.Shivaratri, "Advanced concepts in operatingsystems: Distributed, Database and multiprocessor operating systems", TMH,2001

Page 13: Copy of Syllabus

2. Andrew S.Tanenbaum, "Modern operating system", PHI, 20033. Pradeep K.Sinha, "Distributed operating system-Concepts and design", PHI,2003.4. Andrew S.Tanenbaum, "Distributed operating system", Pearson education, 2003REAL TIME SYSTEMSL T P M C3 0 0 100 3UNIT I BASIC REAL TIME CONCEPTS 9Basic computer architecture – some terminology - real time design issues – examplereal time systems – input and output – other devices – language features.UNIT II REAL TIME SPECIFICATION AND DESIGN TECHNIQUES 9Natural languages – mathematical specification – flow charts – structured charts –pseudocode and programming design languages – finite state automata – data flowdiagrams – petri nets – Warnier Orr notation – state charts – polled loop systems –phase / sate driven code – coroutines – interrupt – driven systems –foreground/background system – full featured real time operating systemsUNIT III INTERTASK COMMUNICATION AND SYNCHRONIZATION 9Buffering data – mailboxes – critical regions – semaphores – deadlock – process stackmanagement – dynamic allocation – static schemes – response time calculation –interrupt latency – time loading and its measurement – scheduling is NP complete –reducing response times and time loading – analysis of memory requirements –reducing memory loading – I/O performanceUNIT IV QUEUING MODELS 9Probability functions – discrete- basic buffering calculation – classical queuing theory –little's law – erlong's formula – faults, failures, bugs and effects – reliability-testing – faulttolerance – classification of architecture – distributing systems – Non Von NeumanarchitectureUNIT V HARDWARE/SOFTWARE INTEGRATION 9Goals of real time system integration – tools - methodology -software Heinsberguncertainity principle – real time applicationsTOTAL : 45REFERENCE BOOKS1. Philip A.Laplante, “Real time system design and analysis – an engineer'shandbook2. C.M.Krishna and Kang G Shin, "Real time systems", TMH, 1997

Page 14: Copy of Syllabus

3. Stuart Bennelt, "Real time computer control – and introduction", Pearsoneducation, 2003.4. Allen Burns, Andy Wellings, “Real Time Systems and Programming Languages”,Pearson Education, 2003.TCP / IP DESIGN AND IMPLEMENTATIONL T P M C3 0 0 100 3UNIT I INTRODUCTION 9Internetworking concepts and architectural model- classful Internet address – CIDRSubnettingand Supernetting –ARP- RARP- IP – IP Routing –ICMP – Ipv6UNIT II TCP 9Services – header – connection establishment and termination- interactive data flowbulkdata flow- timeout and retransmission – persist timer - keepalive timer- futures andperformanceUNIT III IP IMPLEMENTATION 9IP global software organization – routing table- routing algorithms-fragmentation andreassembly- error processing (ICMP) –Multicast Processing (IGMP)UNIT IV TCP IMPLEMENTATION I 9Data structure and input processing – transmission control blocks- segment formatcomparison-finite state machine implementation-Output processing- mutual exclusioncomputingthe TCP data lengthUNIT V TCP IMPLEMENTATION II 9Timers-events and messages- timer process- deleting and inserting timer event- flowcontrol and adaptive retransmission-congestion avoidance and control – urgent dataprocessing and push function.TOTAL : 45REFERENCE BOOKS1. Douglas E.Comer – “Internetworking with TCP/IP Principles, Protocols andArchitecture”, Vol. 1 & 2 fourth edition, Pearson Education Asia, 2003(Unit I in Comer Vol. I, Units II, IV & V – Comer Vol. II )2. W.Richard Stevens “TCP/IP illustrated” Volume 1 Pearson Education, 2003 (UnitII )3. TCP/IP protocol suite, Forouzan, 2nd edition, TMH, 20034. W.Richard Stevens “TCP/IP illustrated” Volume 2 Pearson Education 2003.C # AND . NET FRAMEWORKL T P M C

Page 15: Copy of Syllabus

3 0 0 100 3UNIT I INTRODUCTION TO C# 8Introducing C#, Understanding .NET, Overview of C#, Literals, Variables, Data Types,Operators, Expressions, Branching, Looping, Methods, Arrays, Strings, Structures,Enumerations.UNIT II OBJECT ORIENTED ASPECTS OF C# 9Classes, Objects, Inheritance, Polymorphism, Interfaces, Operator Overloading,Delegates, Events, Errors and Exceptions.UNIT III APPLICATION DEVELOPMENT ON .NET 8Building Windows Applications, Accessing Data with ADO.NET.UNIT IV WEB BASED APPLICATION DEVELOPMENT ON .NET 8Programming Web Applications with Web Forms, Programming Web Services.UNIT V THE CLR AND THE .NET FRAMEWORK 12Assemblies, Versioning, Attributes, Reflection, Viewing MetaData, Type Discovery,Reflecting on a Type, Marshaling, Remoting, Understanding Server Object Types,Specifying a Server with an Interface, Building a Server, Building the Client, UsingSingleCall, Threads.TOTAL : 45REFERENCE BOOKS1. E. Balagurusamy, “Programming in C#”, Tata McGraw-Hill, 2004. (Unit I, II)2. J. Liberty, “Programming C#”, 2nd ed., O’Reilly, 2002. (Unit III, IV, V)3. Herbert Schildt, “The Complete Reference: C#”, Tata McGraw-Hill, 2004.4. Robinson et al, “Professional C#”, 2nd ed., Wrox Press, 2002.5. Andrew Troelsen, “C# and the .NET Platform”, A! Press, 2003.6. S. Thamarai Selvi, R. Murugesan, “A Textbook on C#”, Pearson Education,2003.CRYPTOGRAPHY AND NETWORK SECURITYL T P M C3 0 0 100 3UNIT I INTRODUCTION 10OSI Security Architecture - Classical Encryption techniques – Cipher Principles – DataEncryption Standard – Block Cipher Design Principles and Modes of Operation -Evaluation criteria for AES – AES Cipher – Triple DES – Placement of EncryptionFunction – Traffic ConfidentialityUNIT II PUBLIC KEY CRYPTOGRAPHY 10Key Management - Diffie-Hellman key Exchange – Elliptic Curve Architecture andCryptography - Introduction to Number Theory – Confidentiality using SymmetricEncryption – Public Key Cryptography and RSA.UNIT III AUTHENTICATION AND HASH FUNCTION 9

Page 16: Copy of Syllabus

Authentication requirements – Authentication functions – Message AuthenticationCodes – Hash Functions – Security of Hash Functions and MACs – MD5 messageDigest algorithm - Secure Hash Algorithm – RIPEMD – HMAC Digital Signatures –Authentication Protocols – Digital Signature StandardUNIT IV NETWORK SECURITY 8Authentication Applications: Kerberos – X.509 Authentication Service – Electronic MailSecurity – PGP – S/MIME - IP Security – Web Security.UNIT V SYSTEM LEVEL SECURITY 8Intrusion detection – password management – Viruses and related Threats – VirusCounter measures – Firewall Design Principles – Trusted Systems.TOTAL : 45REFERENCE BOOKS1. William Stallings, “Cryptography And Network Security – Principles andPractices”, Prentice Hall of India, Third Edition, 2003.2. Bruce Schneier, “Applied Cryptography”, John Wiley & Sons Inc, 2001.3. Atul Kahate, “Cryptography and Network Security”, Tata McGraw-Hill, 2003.4. Charles B. Pfleeger, Shari Lawrence Pfleeger, “Security in Computing”, ThirdEdition, Pearson Education, 2003.NATURAL LANGUAGE PROCESSINGL T P M C3 0 0 100 3UNIT I INTRODUCTION 6Introduction: Knowledge in speech and language processing – Ambiguity – Models andAlgorithms – Language, Thought and Understanding. Regular Expressions andautomata: Regular expressions – Finite-State automata. Morphology and Finite-StateTransducers: Survey of English morphology – Finite-State Morphological parsing –Combining FST lexicon and rules – Lexicon-Free FSTs: The porter stammer – Humanmorphological processingUNIT II SYNTAX 10Word classes and part-of-speech tagging: English word classes – Tagsets for English –Part-of-speech tagging – Rule-based part-of-speech tagging – Stochastic part-ofspeechtagging – Transformation-based tagging – Other issues. Context-FreeGrammars for English: Constituency – Context-Free rules and trees – Sentence-levelconstructions – The noun phrase – Coordination – Agreement – The verb phase and

Page 17: Copy of Syllabus

sub categorization – Auxiliaries – Spoken language syntax – Grammars equivalenceand normal form – Finite-State and Context-Free grammars – Grammars and humanprocessing. Parsing with Context-Free Grammars: Parsing as search – A Basic Top-Down parser – Problems with the basic Top-Down parser – The early algorithm – Finite-State parsing methods.UNIT III ADVANCED FEATURES AND SYNTAX 11Features and Unification: Feature structures – Unification of feature structures –Features structures in the grammar – Implementing unification – Parsing with unificationconstraints – Types and Inheritance. Lexicalized and Probabilistic Parsing: Probabilisticcontext-free grammar – problems with PCFGs – Probabilistic lexicalized CFGs –Dependency Grammars – Human parsing.UNIT IV SEMANTIC 10Representing Meaning: Computational desiderata for representations – Meaningstructure of language – First order predicate calculus – Some linguistically relevantconcepts – Related representational approaches – Alternative approaches to meaning.Semantic Analysis: Syntax-Driven semantic analysis – Attachments for a fragment ofEnglish – Integrating semantic analysis into the early parser – Idioms andcompositionality – Robust semantic analysis. Lexical semantics: relational amonglexemes and their senses – WordNet: A database of lexical relations – The Internalstructure of words – Creativity and the lexicon.UNIT V APPLICATIONS 8Word Sense Disambiguation and Information Retrieval: Selectional restriction-baseddisambiguation – Robust word sense disambiguation – Information retrieval – otherinformation retrieval tasks. Natural Language Generation: Introduction to languagegeneration – Architecture for generation – Surface realization – Discourse planning –Other issues. Machine Translation: Language similarities and differences – The transfermetaphor – The interlingua idea: Using meaning – Direct translation – Using statisticaltechniques – Usability and system development.TOTAL : 45REFERENCE BOOKS

Page 18: Copy of Syllabus

1. Daniel Jurafsky & James H.Martin, “ Speech and Language Processing”,Pearson Education (Singapore) Pte. Ltd., 2002.2. James Allen, “Natural Language Understanding”, Pearson Education, 2003.ADVANCED COMPUTER ARCHITECTUREL T P M C3 0 0 100 3UNIT I INTRODUCTION 9Fundamentals of Computer Design – Measuring and reporting performance –Quantitative principles of computer design. Instruction set principles – Classifying ISA –Design issues. Pipelining – Basic concepts – Hazards – Implementation – Multicycleoperations.UNIT II INSTRUCTION LEVEL PARALLELISM WITH DYNAMIC APPROACHES 9Concepts – Dynamic Scheduling – Dynamic hardware prediction – Multiple issue –Hardware based speculation – Limitations of ILP.UNIT III NSTRUCTION LEVEL PARALLELISM WITH SOFTWARE APPROACHES 9Compiler techniques for exposing ILP – Static branch prediction – VLIW – Advancedcompiler support – Hardware support for exposing more parallelism – Hardware versussoftware speculation mechanisms.UNIT IV MEMORY AND I/O 9Cache performance – Reducing cache miss penalty and miss rate – Reducing hit time –Main memory and performance – Memory technology. Types of storage devices –Buses – RAID – Reliability, availability and dependability – I/O performance measures –Designing an I/O system.UNIT V MULTIPROCSSORS AND THREAD LEVEL PARALLELISM 9Symmetric and distributed shared memory architectures – Performance issues –Synchronization – Models of memory consistency – Multithreading.TOTAL : 45REFERENCE BOOKS1. John L. Hennessey and David A. Patterson, ”Computer Architecture: AQuantitative Approach”, Morgan Kaufmann, 2003, Third Edition.2. D.Sima, T.Fountain and P.Kacsuk, ”Advanced Computer Architectures: A DesignSpace Approach”, Addison Wesley, 2000.3. Kai Hwang and Zhi.Wei Xu, “Scalable Parallel Computing”, Tata McGraw-Hill,New Delhi, 2003.Service Oriented Architecture

Page 19: Copy of Syllabus

L T P M C3 0 0 100 3Unit I 9Introduction – Service Oriented Enterprise – Service Oriented Architecture (SOA) –SOA and Web Services – Multi-Channel Access – Business Process management –Extended Web Services Specifications – Overview of SOA – Concepts – Key ServiceCharacteristics – Technical Benefits – Business BenefitsUnit II 9SOA and Web Services – Web Services Platform – Service Contracts – Service-LevelData Model – Service Discovery – Service-Level Security – Service-Level Interactionpatterns – Atomic Services and Composite Services – Proxies and Skeletons –Communication – Integration Overview – XML and Web Services - .NET and J2EEInteroperability – Service-Enabling Legacy Systems – Enterprise Service Bus PatternUnit III 9Multi-Channel Access – Business Benefits – SOA for Multi Channel Access – Tiers –Business Process Management – Concepts – BPM, SOA and Web Services – WSBPEL– Web Services CompositionUnit IV 9Java Web Services – JAX APIs – JAXP – JAX-RPC – JAXM – JAXR – JAXBUnit V 9Metadata Management – Web Services Security – Advanced Messaging – TransactionManagementTOTAL : 45References:1. Eric Newcomer, Greg Lomow, “Understanding SOA with Web Services”, PearsonEducation, 20052. James McGovern, Sameer Tyagi, Michael E Stevens, Sunil Mathew, “Java WebServices Architecture”, Elsevier, 2003. (Unit 4)3. Thomas Erl, “Service Oriented Architecture”, Pearson Education, 20054. Frank Cohen, “FastSOA”, Elsevier, 2007.5. Jeff Davies, “The Definitive Guide to SOA”, Apress, 2007.6. Sandeep Chatterjee, James Webber, “Developing Enterprise Web Services”,Pearson Education, 2004.INFORMATION SECURITY

Page 20: Copy of Syllabus

L T P M C3 0 0 100 3UNIT 1 INTRODUCTION 9History, What is Information Security?, Critical Characteristics of Information, NSTISSCSecurity Model, Components of an Information System, Securing the Components,Balancing Security and Access, The SDLC, The Security SDLCUNIT II SECURITY INVESTIGATION 9Need for Security, Business Needs, Threats, Attacks, Legal, Ethical and ProfessionalIssuesUNIT III SECURITY ANALYSIS 9Risk Management: Identifying and Assessing Risk, Assessing and Controlling RiskUNIT IV LOGICAL DESIGN 9Blueprint for Security, Information Security Poicy, Standards and Practices, ISO17799/BS 7799, NIST Models, VISA International Security Model, Design of SecurityArchitecture, Planning for ContinuityUNIT V PHYSICAL DESIGN 9Security Technology, IDS, Scanning and Analysis Tools, Cryptography, Access ControlDevices, Physical Security, Security and PersonnelTOTAL : 45REFERENCE BOOKS1. Michael E Whitman and Herbert J Mattord, “Principles of Information Security”,Vikas Publishing House, New Delhi, 20032. Micki Krause, Harold F. Tipton, “ Handbook of Information SecurityManagement”, Vol 1-3 CRC Press LLC, 2004.3. Stuart Mc Clure, Joel Scrambray, George Kurtz, “Hacking Exposed”, TataMcGraw-Hill, 20034. Matt Bishop, “ Computer Security Art and Science”, Pearson/PHI, 2002.USER INTERFACE DESIGNL T P M C3 0 0 100 3UNIT I 8Introduction-Importance-Human-Computer interface-characteristics of graphicsinterface-Direct manipulation graphical system - web user interface-popularitycharacteristic& principles.UNIT II 10User interface design process- obstacles-usability-human characteristics in design -Human interaction speed-business functions-requirement analysis-Direct-Indirectmethods-basic business functions-Design standards-system timings - Human

Page 21: Copy of Syllabus

consideration in screen design - structures of menus - functions of menus-contents ofmenu-formatting -phrasing the menu - selecting menu choice-navigating menusgraphicalmenus.UNIT III 9Windows: Characteristics-components-presentation styles-types-managementsorganizations-operations-web systems-device-based controls: characteristics-Screen -based controls: operate control - text boxes-selection control-combination controlcustomcontrol-presentation control.UNIT IV 9Text for web pages - effective feedback-guidance & assistance-Internationalizationaccesssibility-Icons-Image-Multimedia -coloring.UNIT V 9Windows layout-test :prototypes - kinds of tests - retest - Information search -visualization - Hypermedia - www - Software tools.TOTAL : 45REFERENCE BOOKS1. Wilbent. O. Galitz ,“The Essential Guide to User Interface Design”, John Wiley&Sons, 2001.2. Ben Sheiderman, “Design the User Interface”, Pearson Education, 1998.3. Alan Cooper, “The Essential of User Interface Design”, Wiley – Dream Tech Ltd.,2002.GRAPH THEORYL T P M C3 0 0 100 3UNIT I 9Graphs – Introduction – Isomorphism – Sub graphs – Walks, Paths, Circuits –Connectedness – Components – Euler Graphs – Hamiltonian Paths and Circuits –Trees – Properties of trees – Distance and Centers in Tree – Rooted and Binary Trees.UNIT II 9Spanning trees – Fundamental Circuits –Spanning Trees in a Weighted Graph – CutSets – Properties of Cut Set – All Cut Sets – Fundamental Circuits and Cut Sets –Connectivity and Separability – Network flows – 1-Isomorphism – 2-Isomorphism –Combinational and Geometric Graphs – Planer Graphs – Different Representation of a

Page 22: Copy of Syllabus

Planer Graph.UNIT III 9Incidence matrix – Submatrices – Circuit Matrix – Path Matrix – Adjacency Matrix –Chromatic Number – Chromatic partitioning – Chromatic polynomial - Matching -Covering – Four Color Problem – Directed Graphs – Types of Directed Graphs –Digraphs and Binary Relations – Directed Paths and Connectedness – Euler Graphs –Adjacency Matrix of a Digraph.UNIT IV 9Algorithms: Connectedness and Components – Spanning tree – Finding all SpanningTrees of a Graph –Set of Fundamental Circuits – Cut Vertices and Separability –Directed Circuits.UNIT V 9Algorithms: Shortest Path Algorithm – DFS – Planarity Testing – IsomorphismTOTAL : 45REFERENCE BOOK1. Narsingh Deo, “Graph Theory: With Application to Engineering and ComputerScience”, PHI, 2003.2. R.J. Wilson, “Introduction to Graph Theory”, Fourth Edition, Pearson Education,2003.PERVASIVE COMPUTINGL T P M C3 0 0 100 3UNIT I. Mobile Networks 9Media Access Control – SDMA, FDMA, TDMA, CDMA – GSM – Architecture, Protocols,Connection Establishment, Frequency Allocation , Localization, Handover, Security –GPRS.UNIT II. Wireless Networks 9Wireless LANs and PANs – IEEE 802.11 Standard – Architecture – Services –Network– HiperLAN – Blue Tooth- Wi-Fi – WiMAXUNIT III. Routing 9Mobile IP – DHCP – AdHoc– Proactive and Reactive Routing Protocols – MulticastRouting.UNIT IV. Transport and Application Layers 9Mobile TCP– WAP – Architecture – WWW Programming Model– WDP – WTLS – WTP– WSP – WAE – WTA Architecture – WML – WMLScripts.UNIT V.Pervasive computing 9Pervasive computing infrastructure-applications- Device Technology - Hardware,

Page 23: Copy of Syllabus

Human-machine Interfaces, Biometrics, and Operating systems– Device Connectivity –Protocols, Security, and Device Management- Pervasive Web Application architecture-Access from PCs and PDAs - Access via WAPTOTAL = 45REFERENCE BOOKS1. Jochen Schiller, “Mobile Communications”, PHI, Second Edition, 2003.2. Jochen Burkhardt, Pervasive Computing: Technology and Architecture of MobileInternet Applications, Addison-Wesley Professional; 3rd edition, 20073. Frank Adelstein, Sandeep KS Gupta, Golden Richard, Fundamentals of Mobileand Pervasive Computing, McGraw-Hill 20054. Debashis Saha, Networking Infrastructure for Pervasive Computing: EnablingTechnologies, Kluwer Academic Publisher, Springer; First edition, 20025. Introduction to Wireless and Mobile Systems by Agrawal and Zeng, Brooks/Cole (Thomson Learning), First edition, 20026. Uwe Hansmann, Lothar Merk, Martin S. Nicklons and Thomas Stober, Principlesof Mobile Computing, Springer, New York, 2003.PARALLEL COMPUTINGL T P M C3 0 0 100 3UNIT I SCALABILITY AND CLUSTERING 9Evolution of Computer Architecture – Dimensions of Scalability – Parallel ComputerModels – Basic Concepts Of Clustering – Scalable Design Principles – ParallelProgramming Overview – Processes, Tasks and Threads – Parallelism Issues –Interaction / Communication Issues – Semantic Issues In Parallel Programs.UNIT II ENABLING TECHNOLOGIES 9System Development Trends – Principles of Processor Design – MicroprocessorArchitecture Families – Hierarchical Memory Technology – Cache Coherence Protocols– Shared Memory Consistency – Distributed Cache Memory Architecture – LatencyTolerance Techniques – Multithreaded Latency Hiding.UNIT III SYSTEM INTERCONNECTS 9Basics of Interconnection Networks – Network Topologies and Properties – Buses,Crossbar and Multistage Switches, Software Multithreading – SynchronizationMechanisms.UNIT IV PARALLEL PROGRAMMING 9Paradigms And Programmability – Parallel Programming Models – Shared MemoryProgramming.UNIT V MESSAGE PASSING PROGRAMMING 9

Page 24: Copy of Syllabus

Message Passing Paradigm – Message Passing Interface – Parallel Virtual Machine.TOTAL : 45REFERENCE BOOKS1. Kai Hwang and Zhi.Wei Xu, “Scalable Parallel Computing”, Tata McGraw-Hill,New Delhi, 2003.2. David E. Culler & Jaswinder Pal Singh, “Parallel Computing Architecture: AHardware/Software Approach”, Morgan Kaufman Publishers, 1999.3. Michael J. Quinn, “Parallel Programming in C with MPI & OpenMP”, TataMcGraw-Hill, New Delhi, 2003.4. Kai Hwang, “Advanced Computer Architecture” Tata McGraw-Hill, New Delhi,2003.SOFT COMPUTINGL T P M C3 0 0 100 3UNIT I FUZZY SET THEORY 10Introduction to Neuro – Fuzzy and Soft Computing – Fuzzy Sets – Basic Definition andTerminology – Set-theoretic Operations – Member Function Formulation andParameterization – Fuzzy Rules and Fuzzy Reasoning – Extension Principle and FuzzyRelations – Fuzzy If-Then Rules – Fuzzy Reasoning – Fuzzy Inference Systems –Mamdani Fuzzy Models – Sugeno Fuzzy Models – Tsukamoto Fuzzy Models – InputSpace Partitioning and Fuzzy Modeling.UNIT II OPTIMIZATION 8Derivative-based Optimization – Descent Methods – The Method of Steepest Descent –Classical Newton’s Method – Step Size Determination – Derivative-free Optimization –Genetic Algorithms – Simulated Annealing – Random Search – Downhill SimplexSearch.UNIT III NEURAL NETWORKS 10Supervised Learning Neural Networks – Perceptrons - Adaline – BackpropagationMutilayer Perceptrons – Radial Basis Function Networks – Unsupervised LearningNeural Networks – Competitive Learning Networks – Kohonen Self-OrganizingNetworks – Learning Vector Quantization – Hebbian Learning.UNIT IV NEURO FUZZY MODELING 9Adaptive Neuro-Fuzzy Inference Systems – Architecture – Hybrid Learning Algorithm –Learning Methods that Cross-fertilize ANFIS and RBFN – Coactive Neuro FuzzyModeling – Framework Neuron Functions for Adaptive Networks – Neuro FuzzySpectrum.

Page 25: Copy of Syllabus

UNIT V APPLICATIONS OF COMPUTATIONAL INTELLIGENCE 8Printed Character Recognition – Inverse Kinematics Problems – Automobile FuelEfficiency Prediction – Soft Computing for Color Recipe Prediction.TOTAL : 45REFERENCE BOOKS1. J.S.R.Jang, C.T.Sun and E.Mizutani, “Neuro-Fuzzy and Soft Computing”, PHI,2004, Pearson Education 2004.2. Timothy J.Ross, “Fuzzy Logic with Engineering Applications”, McGraw-Hill, 1997.3. Davis E.Goldberg, “Genetic Algorithms: Search, Optimization and MachineLearning”, Addison Wesley, N.Y., 1989.4. S. Rajasekaran and G.A.V.Pai, “Neural Networks, Fuzzy Logic and GeneticAlgorithms”, PHI, 2003.5. R.Eberhart, P.Simpson and R.Dobbins, “Computational Intelligence - PC Tools”,AP Professional, Boston, 1996.HIGH SPEED NETWORKSL T P M C3 0 0 100 3UNIT I HIGH SPEED NETWORKS 8Frame Relay Networks – Asynchronous transfer mode – ATM Protocol Architecture,ATM logical Connection, ATM Cell – ATM Service Categories – AAL.High Speed LAN’s: Fast Ethernet, Gigabit Ethernet, Fibre Channel – Wireless LAN’s:applications, requirements – Architecture of 802.11UNIT II CONGESTION AND TRAFFIC MANAGEMENT 8Queuing Analysis- Queuing Models – Single Server Queues – Effects ofCongestion – Congestion Control – Traffic Management – Congestion Control in PacketSwitching Networks – Frame Relay Congestion Control.UNIT III TCP AND ATM CONGESTION CONTROL 12TCP Flow control – TCP Congestion Control – Retransmission – Timer Management –Exponential RTO backoff – KARN’s Algorithm – Window management – Performance ofTCP over ATM.Traffic and Congestion control in ATM – Requirements – Attributes – TrafficManagement Frame work, Traffic Control – ABR traffic Management – ABR rate control,RM cell formats, ABR Capacity allocations – GFR traffic management.UNIT IV INTEGRATED AND DIFFERENTIATED SERVICES 8Integrated Services Architecture – Approach, Components, Services- QueuingDiscipline, FQ, PS, BRFQ, GPS, WFQ – Random Early Detection, DifferentiatedServicesUNIT V PROTOCOLS FOR QOS SUPPORT 8

Page 26: Copy of Syllabus

RSVP – Goals & Characteristics, Data Flow, RSVP operations, Protocol Mechanisms –Multiprotocol Label Switching – Operations, Label Stacking, Protocol details – RTP –Protocol Architecture, Data Transfer Protocol, RTCP.TOTAL : 45REFERENCE BOOKS1. William Stallings, “HIGH SPEED NETWORKS AND INTERNET”, PearsonEducation, Second Edition, 2002. [Chapter – 4-6, 8, 10, 12, 13, 17,18]2. Warland & Pravin Varaiya, “HIGH PERFORMANCE COMMUNICATIONNETWORKS”, Jean Harcourt Asia Pvt. Ltd., II Edition, 2001.3. Irvan Pepelnjk, Jim Guichard and Jeff Apcar, “MPLS and VPN architecture”,Cisco Press, Volume 1 and 2, 2003DIGITAL IMAGE PROCESSINGL T P M C3 0 0 100 3UNIT I DIGITAL IMAGE FUNDAMENTALS AND TRANSFORMS 9Elements of visual perception – Image sampling and quantization Basic relationshipbetween pixels – Basic geometric transformations-Introduction to Fourier Transform andDFT – Properties of 2D Fourier Transform – FFT – Separable Image Transforms -Walsh– Hadamard – Discrete Cosine Transform, Haar, Slant – Karhunen – Loeve transforms.UNIT II IMAGE ENHANCEMENT TECHNIQUES 9Spatial Domain methods: Basic grey level transformation – Histogram equalization –Image subtraction – Image averaging –Spatial filtering: Smoothing, sharpening filters –Laplacian filters – Frequency domain filters : Smoothing – Sharpening filters –Homomorphic filtering.UNIT III IMAGE RESTORATION: 9Model of Image Degradation/restoration process – Noise models – Inverse filtering -Least mean square filtering – Constrained least mean square filtering – Blind imagerestoration – Pseudo inverse – Singular value decomposition.UNIT IV IMAGE COMPRESSION 9Lossless compression: Variable length coding – LZW coding – Bit plane codingpredictivecoding-DPCM.Lossy Compression: Transform coding – Wavelet coding – Basics of Imagecompression standards: JPEG, MPEG,Basics of Vector quantization.UNIT V IMAGE SEGMENTATION AND REPRESENTATION 9Edge detection –Thresholding - Region Based segmentation – Boundary

Page 27: Copy of Syllabus

representation: chair codes- Polygonal approximation –Boundary segments –boundarydescriptors: Simple descriptors-Fourier descriptors - Regional descriptors –Simpledescriptors- TextureTOTAL : 45REFERENCE BOOKS1. Rafael C Gonzalez, Richard E Woods 2nd Edition, Digital Image Processing -Pearson Education 2003.2. Jayaraman S, Veerakumar T, Esakkirajan S, “Digital Image Processing”, TMH,20093. William K Pratt, Digital Image Processing John Willey (2001)4. Image Processing Analysis and Machine Vision – Millman Sonka, Vaclav hlavac,Roger Boyle, Broos/colic, Thompson Learniy (1999).5. A.K. Jain, PHI, New Delhi (1995)-Fundamentals of Digital Image Processing.6. Chanda Dutta Magundar – Digital Image Processing and Applications, PrenticeHall of India, 2000ROBOTICSL T P M C3 0 0 100 3UNIT I ROBOTIC MANIPULATION 8Robotic manipulation – Automation and Robots – Robot Classification – Applications –Robot Specifications – Notation. Direct Kinematics: The ARM Equation – Dot and Crossproducts – Coordinate frames – Rotations – Homogeneous coordinates – Linkcoordinates – The arm equation – A five-axis articulated robot (Rhino XR-3) – A fouraxisSCARA Robot (Adept One) – A six-axis articulated Robot (Intelledex 660). InverseKinematics: Solving the arm equation – The inverse kinematics problem – Generalproperties of solutions – Tool configuration – Inverse kinematics of a five-axisarticulated robot (Rhino XR-3) – Inverse kinematics of a four-axis SCARA robot (Adeptone) - Inverse kinematics of a six-axis articulated robot (Intelledex 660) - Inversekinematics of a three-axis articulated robot – A robotic work cell.UNIT II DYNAMIC OF ROBOTS 12Workspace analysis and trajectory planning: Workspace analysis – Work envelop of afive-axis articulated robot – Work envelope of a four-axis SCARA robot – Workspacefixtures – The pick-and-place operation – Continuous-path motion – Interpolated motion

Page 28: Copy of Syllabus

– Straight-line motion. Differential motion and statics: The tool-configuration Jacobianmatrix – Joint-space singularities – Generalized Inverses – Resolved-Motion ratecontrol:n<=6 – Rate control of redundant robots:n>6 – rate control using {1}-inverses –The manipulator Jacobian – Induced joint torques and forces. Manipulator Dynamics:Lagrange’s equation – Kinetic and Potential energy – Generalized force – Lagrange -Euler dynamic model – Dynamic model of a two-axis planar articulated robot - Dynamicmodel of a three-axis SCARA robot – Direct and Inverse dynamics – Recursive Newton-Euler formulation – Dyamic model of a one-axis robot.UNIT III ROBOT CONTROL 6Robot control: The control problem – State equation – Constant solutions – Linearfeedback systems - Single-axis PID control – PD-Gravity control – Computed-Torquecontrol – Variable-Structure control – Impedance controlUNIT IV SENSORS AND ACTUATORS 9Actuators - Introduction – Characteristics of actuating systems – Comparison ofactuating systems – Hydraulic devices – Pneumatic devices – Electric motors –Microprocessor control of electric motors – Magnetostricitve actuators – Shape-memorytype metals – Speed reduction. Sensors – Introduction – Sensor characteristics –Position sensors – Velocity sensors – Acceleration sensors – Force and pressuresensors – Torque sensors – Microswitches – Light and Infrared sensors – Touch andTactile sensors – Proximity sensors – Range-finders – Sniff sensors – Vision systems –Voice Recognition devices – Voice synthesizers – Remote center compliance device.UNIT V VISION AND TASK PLANNING 9Robot vision – Image representation – Template matching – Polyhedral objects – Shapeanalysis – Segmentation – Iterative processing – Perspective Transformations –Structured illumination –Camera calibration. Task planning: Task-level programming –Uncertainty – Configuration space – Gross-Motion planning – Grasp planning – Fine-Motion planning – Simulation of planar motion – A task-planning problem.TOTAL : 45REFERENCE BOOKS1. Robert J.Schilling, “Fundamentals of Robotics – Analysis & Control”, PrenticeHall of India Pvt. Ltd., 2002. (Chapters 1 to 9 – Unit I, II, III, V)

Page 29: Copy of Syllabus

2. Saeed B.Niku, “Introduction to Robotics – Analysis, Systems, Applications”,Prentice Hall of India Pvt. Ltd., 2003. (Chapters 6 & 7 – Unit IV)COMPONENT BASED TECHNOLOGYL T P M C3 0 0 100 3UNIT I INTRODUCTION 9Software Components – objects – fundamental properties of Component technology –modules – interfaces – callbacks – directory services – component architecture –components and middlewareUNIT II JAVA BASED COMPONENT TECHNOLOGIES 9Threads – Java Beans – Events and connections – properties – introspection – JARfiles – reflection – object serialization – Enterprise Java Beans – Distributed Objectmodels – RMI and RMI-IIOPUNIT III CORBA COMPONENT TECHNOLOGIES 9Java and CORBA – Interface Definition language – Object Request Broker – systemobject model – portable object adapter – CORBA services – CORBA component model– containers – application server – model driven architectureUNIT IV . NET BASED COMPONENT TECHNOLOGIES 9COM – Distributed COM – object reuse – interfaces and versioning – dispatchinterfaces – connectable objects – OLE containers and servers – Active X controls –.NET components - assemblies – appdomains – contexts – reflection – remotingUNIT V COMPONENT FRAMEWORKS AND DEVELOPMENT 9Connectors – contexts – EJB containers – CLR contexts and channels – Black Boxcomponent framework – directory objects – cross-development environment –component-oriented programming – Component design and implementation tools –testing tools - assembly toolsTOTAL : 45REFERENCE BOOKS1. Clemens Szyperski, “Component Software: Beyond Object-OrientedProgramming”, Pearson Education publishers, 20032. Ed Roman, “Mastering Enterprise Java Beans”, John Wiley & Sons Inc., 1999.3. Mowbray, “Inside CORBA”, Pearson Education, 2003.4. Freeze, “Visual Basic Development Guide for COM & COM+”, BPB Publication,2001.5. Hortsamann, Cornell, “CORE JAVA Vol-II” Sun Press, 2002.SOFTWARE QUALITY MANAGEMENTL T P M C

Page 30: Copy of Syllabus

3 0 0 100 3UNIT I INTRODUCTION TO SOFTWARE QUALITY 9Software Quality – Hierarchical models of Boehm and McCall – Quality measurement –Metrics measurement and analysis – Gilb’s approach – GQM ModelUNIT II SOFTWARE QUALITY ASSURANCE 9Quality tasks – SQA plan – Teams – Characteristics – Implementation – Documentation– Reviews and AuditsUNIT III QUALITY CONTROL AND RELIABILITY 9Tools for Quality – Ishikawa’s basic tools – CASE tools – Defect prevention and removal– Reliability models – Rayleigh model – Reliability growth models for qualityassessmentUNIT IV QUALITY MANAGEMENT SYSTEM 9Elements of QMS – Rayleigh model framework – Reliability Growth models for QMS –Complexity metrics and models – Customer satisfaction analysis.UNIT V QUALITY STANDARDS 9Need for standards – ISO 9000 Series – ISO 9000-3 for software development – CMMand CMMI – Six Sigma concepts.TOTAL : 45REFERENCE BOOKS1. Allan C. Gillies, “Software Quality: Theory and Management”, Thomson Learning,2003. (UI : Ch 1-4 ; UV : Ch 7-8)2. Stephen H. Kan, “Metrics and Models in Software Quality Engineering”, PearsonEducation (Singapore) Pte Ltd., 2002. (UI : Ch 3-4; UIII : Ch 5-8 ; UIV : Ch 9-11)3. Norman E. Fenton and Shari Lawrence Pfleeger, “Software Metrics” Thomson,20034. Mordechai Ben – Menachem and Garry S.Marliss, “Software Quality”, ThomsonAsia Pte Ltd, 2003.5. Mary Beth Chrissis, Mike Konrad and Sandy Shrum, “CMMI”, Pearson Education(Singapore) Pte Ltd, 2003.6. ISO 9000-3 “Notes for the application of the ISO 9001 Standard to softwaredevelopment”.QUANTUM COMPUTINGL T P M C3 0 0 100 3UNIT I FUNDAMENTAL CONCEPTS 9Global Perspectives, Quantum Bits, Quantum Computation, Quantum Algorithms,

Page 31: Copy of Syllabus

Quantum Information, Postulates of Quantum Mechanisms.UNIT II QUANTUM COMPUTATION 9Quantum Circuits – Quantum algorithms, Single Orbit operations, Control Operations,Measurement, Universal Quantum Gates, Simulation of Quantum Systems, QuantumFourier transform, Phase estimation, Applications, Quantum search algorithms –Quantum counting – Speeding up the solution of NP – complete problems – QuantumSearch for an unstructured database.UNIT III QUANTUM COMPUTERS 9Guiding Principles, Conditions for Quantum Computation, Harmonic Oscillator QuantumComputer, Optical Photon Quantum Computer – Optical cavity Quantumelectrodynamics, Ion traps, Nuclear Magnetic resonance.UNIT IV QUANTUM INFORMATIONS 9Quantum noise and Quantum Operations – Classical Noise and Markov Processes,Quantum Operations, Examples of Quantum noise and Quantum Operations –Applications of Quantum operations, Limitations of the Quantum operations formalism,Distance Measures for Quantum information.UNIT V QUANTUM ERROR CORRECTION 9Introduction, Shor code, Theory of Quantum Error –Correction, Constructing QuantumCodes, Stabilizer codes, Fault – Tolerant Quantum Computation, Entropy andinformation – Shannon Entropy, Basic properties of Entropy, Von Neumann, Strong SubAdditivity, Data Compression, Entanglement as a physical resource.TOTAL : 45REFERENCE BOOKS1. Micheal A. Nielsen. & Issac L. Chiang, “Quantum Computation and QuantumInformation”, Cambridge University Press, Fint South Asian edition, 2002.KNOWLEDGE BASED DECISION SUPPORT SYSTEML T P M C3 0 0 100 3UNIT I INTRODUCTION 9Decision making, Systems, Modeling, and support – Introduction and Definition –Systems – Models – Modeling process – Decision making: The intelligence phase – Thedesign phase - The choice phase – Evaluation: The implementation phase –AlternativeDecision – Making models – Decision support systems – Decision makers - Caseapplications.UNIT II DECISION SUPPORT SYSTEM DEVELOPMENT 9

Page 32: Copy of Syllabus

Decision Support System Development: Introduction - Life cycle – Methodologies –prototype – Technology Levels and Tools – Development platforms – Tool selection –Developing DSSEnterprise systems: Concepts and Definition – Evolution of information systems –Information needs – Characteristics and capabilities – Comparing and Integrating EISand DSS – EIS data access, Data Warehouse, OLAP, Multidimensional analysis,Presentation and the web – Including soft information enterprise on systems -Organizational DSS – supply and value chains and decision support – supply chainproblems and solutions – computerized systems MRP, ERP, SCM – frontline decisionsupport systems.UNIT III KNOWLEDGE MANAGEMENT 9Introduction – Organizational learning and memory – Knowledge management –Development –methods, Technologies, and Tools – success –Knowledge managementand Artificial intelligence – Electronic document management.Knowledge acquisition and validation: Knowledge engineering – Scope – Acquisitionmethods - Interviews – Tracking methods – Observation and other methods – Gridanalysis – Machine Learning: Rule induction, case-based reasoning – Neural computing– Intelligent agents – Selection of an appropriate knowledge acquisition methods –Multiple experts – Validation and verification of the knowledge base – Analysis, coding,documenting, and diagramming – Numeric and documented knowledge acquisition –Knowledge acquisition and the Internet/Intranets.Knowledge representation: Introduction – Representation in logic and other schemas –Semantic networks – Production rules – Frames – Multiple knowledge representation –Experimental knowledge representations - Representing uncertainty.UNIT IV INTELLIGENT SYSTEM DEVELOPMENT 9Inference Techniques: Reasoning in artificial intelligence – Inference with rules: TheInference tree – Inference with frames – Model-based and case-based reasoning -Explanation and Meta knowledge – Inference with uncertainty – Representing

Page 33: Copy of Syllabus

uncertainty – Probabilities and related approaches – Theory of certainty – Approximatereasoning using fuzzy logic.Intelligent Systems Development: Prototyping: Project Initialization – System analysisand design – Software classification: Building expert systems with tools – Shells andenvironments – Software selection – Hardware –Rapid prototyping and a demonstrationprototype - System development –Implementation – Post implementation.UNIT V MANAGEMENT SUPPORT SYSTEMS 9Implementing and integrating management support systems – Implementation: Themajor issues - Strategies – System integration – Generic models MSS, DSS, ES –Integrating EIS, DSS and ES, and global integration – Intelligent DSS – Intelligentmodeling and model management – Examples of integrated systems – Problems andissues in integration.Impacts of Management Support Systems – Introduction – overview – Organizationalstructure and related areas – MSS support to business process reengineering –Personnel management issues – Impact on individuals – Productivity, quality, andcompetitiveness – decision making and the manager manager’s job – Issues of legality,privacy, and ethics – Intelligent systems and employment levels – Internetcommunication – other societal impacts – managerial implications and socialresponsibilities –TOTAL : 45REFERENCE BOOKS1. Efrain Turban, Jay E.Aronson, “Decision Support Systems and IntelligentSystems” 6th Edition, Pearson Education, 2001.2. Ganesh Natarajan, Sandhya Shekhar, “Knowledge management – EnablingBusiness Growth”, Tata McGraw-Hill, 2002.3. George M.Marakas, “Decision Support System”, Prentice Hall, India, 2003.4. Efrem A.Mallach, “Decision Support and Data Warehouse Systems”, TataMcGraw-Hill, 2002.SEMANTIC WEB3 0 0 100 3UNIT I . Introduction 9Components – Types – Ontological Commitments – Ontological Categories –Philosophical Background - Knowledge Representation Ontologies – Top LevelOntologies – Linguistic Ontologies – Domain Ontologies – Semantic Web – Need –

Page 34: Copy of Syllabus

Foundation – Layers – Architecture.UNIT II. Languages for Semantic Web and Ontologies: 10Web Documents in XML – RDF - Schema – Web Resource Description using RDFRDFProperties – Topic Maps and RDF – Overview – Syntax Structure – Semantics –Pragmatics - Traditional Ontology Languages – LOOM- OKBC – OCML - FlogicOntology Markup Languages – SHOE – OIL - DAML + OIL- OWLUNIT III. Ontology Learning for Semantic Web 10Taxonomy for Ontology Learning – Layered Approach – Phases of Ontology Learning –Importing and Processing Ontologies and Documents – Ontology Learning Algorithms -EvaluationUNIT IV. Ontology Management and Tools 9Overview – need for management – development process – target ontology – ontologymapping – skills management system – ontological class – constraints – issues.Evolution – Development of Tools and Tool Suites – Ontology Merge Tools – Ontologybased Annotation Tools.UNIT V. Applications: 7Web Services – Semantic Web Services - Case Study for specific domain – Securityissues – current trends.TOTAL = 45References:1. Asuncion Gomez-Perez, Oscar Corcho, Mariano Fernandez-Lopez, “OntologicalEngineering: with examples from the areas of Knowledge Management, e-Commerce and the Semantic Web” Springer, 20042. Grigoris Antoniou, Frank van Harmelen, “A Semantic Web Primer (CooperativeInformation Systems)”, The MIT Press, 20043. Alexander Maedche, “Ontology Learning for the Semantic Web”, Springer; 1edition, 20024. John Davies, Dieter Fensel, Frank Van Harmelen, “Towards the Semantic Web:Ontology – Driven Knowledge Management”, John Wiley & Sons Ltd., 20035. Dieter Fensel (Editor), Wolfgang Wahlster, Henry Lieberman, James Hendler,“Spinning the Semantic Web: Bringing the World Wide Web to Its Full Potential”,The MIT Press, 20026. Michael C. Daconta, Leo J. Obrst, Kevin T. Smith, “The Semantic Web: A Guideto the Future of XML, Web Services, and Knowledge Management”, Wiley, 20037. Steffen Staab (Editor), Rudi Studer, “Handbook on Ontologies (InternationalHandbooks on Information Systems)”, Springer 1st edition, 2004

Page 35: Copy of Syllabus

Multi-core Architecture and ProgrammingL T P M C3 0 0 100 3UNIT I Introduction to Multiprocessors and Scalability issues: 9Scalable design principles – Principles of processor design – Instruction LevelParallelism, Thread level parallelism. Parallel computer models –- Symmetric anddistributed shared memory architectures – Performance Issues – Multi-coreArchitectures - Software and hardware multithreading – SMT and CMP architectures –Design issues – Case studies – Intel Multi-core architecture – SUN CMP architecture.UNIT II Parallel Programming 9Fundamental concepts – Designing for threads. Threading and parallel programmingconstructs – Synchronization – Critical sections – Deadlock. Threading APIs.UNIT III OpenMP Programming 9OpenMP – Threading a loop – Thread overheads – Performance issues – Libraryfunctions. Solutions to parallel programming problems – Data races, deadlocks andlivelocks – Non-blocking algorithms – Memory and cache related issues.UNIT IV MPI programming 9MPI Model – collective communication – data decomposition – communicators andtopologies – point-to-point communication – MPI Library.UNIT V Multithreaded Application development: 9Algorithms, program development and performance tuning.Total : 45 hoursReferences :1. Shameem Akhter and Jason Roberts, “Multi-core Programming”, IntelPress, 2006.2. Michael J Quinn, Parallel programming in C with MPI and OpenMP, TataMacgraw Hill, 2003.3. John L. Hennessey and David A. Patterson, “ Computer architecture – Aquantitative approach”, Morgan Kaufmann/Elsevier Publishers, 4th. edition,20074. David E. Culler, Jaswinder Pal Singh, “Parallel computing architecture : Ahardware/ software approach” , Morgan Kaufmann/Elsevier Publishers,1999GRID COMPUTING3 0 0 100 3UNIT I GRID COMPUTING 9Introduction - Definition and Scope of grid computingUNIT II GRID COMPUTING INITIALIVES 9Grid Computing Organizations and their roles – Grid Computing analog – GridComputing road map.UNIT III GRID COMPUTING APPLICATIONS 9

Page 36: Copy of Syllabus

Merging the Grid sources – Architecture with the Web Devices Architecture.UNIT IV TECHNOLOGIES 9OGSA – Sample use cases – OGSA platform components – OGSI – OGSA BasicServices.UNIT V GRID COMPUTING TOOL KITS 9Globus GT 3 Toolkit – Architecture, Programming model, High level services – OGSI.Net middleware Solutions.TOTAL : 45REFERENCE BOOKS1. Joshy Joseph & Craig Fellenstein, “Grid Computing”, Pearson/PHI PTR-2003.2. Ahmar Abbas, “Grid Computing: A Practical Guide to technology andApplications”, Charles River media – 2003.3. D. Janakiram, “Grid Computing - A research Monograph”, TMH, 2007.BIO INFORMATICS3 0 0 100 3UNIT I. Introduction 9Need for Bioinformatics technologies – Overview of Bioinformatics technologies –Structural bioinformatics – Data format and processing – secondary resources andapplications – Role of Structural bioinformatics - Biological Data Integration System.UNIT II. Datawarehousing and Datamining in Bioinformatics 9Bioinformatics data – Datawarehousing architecture – data quality – Biomedical dataanalysis – DNA data analysis – Protein data analysis – Machine learning – Neuralnetwork architecture and applications in bioinformaticsUNIT III. Modeling for Bioinformatics 9Hidden markov modeling for biological data analysis – Sequence identification –Sequence classification – multiple alignment generation – Comparative modeling –Protein modeling – genomic modeling – Probabilistic modeling – Bayesian networks –Boolean networks - Molecular modeling – Computer programs for molecular modelingUNIT IV. Pattern Matching and Visualization 9Gene regulation – motif recognition – motif detection – strategies for motif detection –Visualization – Fractal analysis – DNA walk models – one dimension – two dimension –higher dimension – Game representation of Biological sequences – DNA, Protein,Amino acid sequencesUNIT V. Microarray analysis 9

Page 37: Copy of Syllabus

Microarray technology for genome expression study – image analysis for data extraction– preprocessing – segmentation – gridding – spot extraction – normalization, filtering –cluster analysis – gene network analysis – Compared Evaluation of Scientific DataManagement Systems – Cost Matrix – Evaluation model - Benchmark - TradeoffsTOTAL = 45References:1. Yi-Ping Phoebe Chen (Ed), “BioInformatics Technologies”, First Indian Reprint,Springer Verlag, 2007.2. Zoe lacroix and Terence Critchlow, “BioInformatics – Managing Scientific data”,First Indian Reprint, Elsevier, 20043. Zoe Lacroix and Terence Critchlow, “Bioinformatics – Managing Scientific Data”,First Edition, Elsevier, 20044. Arthur M Lesk, “Introduction to Bioinformatics”, Second Edition, Oxford UniversityPress, 2005TOTAL QUALITY MANAGEMENTL T P M C3 0 0 100 3Unit – I. INTRODUCTION 9Introduction - Need for quality - Evolution of quality - Definition of quality - Dimensions ofmanufacturing and service quality - Basic concepts of TQM - Definition of TQM – TQMFramework - Contributions of Deming, Juran and Crosby – Barriers to TQM.Unit – II. TQM PRINCIPLES 9Leadership – Strategic quality planning, Quality statements - Customer focus –Customer orientation, Customer satisfaction, Customer complaints, Customer retention- Employee involvement – Motivation, Empowerment, Team and Teamwork,Recognition and Reward, Performance appraisal - Continuous process improvement –PDSA cycle, 5s, Kaizen - Supplier partnership – Partnering, Supplier selection, SupplierRating.Unit – III. TQM TOOLS & TECHNIQUES I 9The seven traditional tools of quality – New management tools – Six-sigma: Concepts,methodology, applications to manufacturing, service sector including IT – Benchmarking – Reason to bench mark, Bench marking process – FMEA – Stages, Types.Unit – IV TQM TOOLS & TECHNIQUES II 9

Page 38: Copy of Syllabus

Quality circles – Quality Function Deployment (QFD) – Taguchi quality loss function –TPM – Concepts, improvement needs – Cost of Quality – Performance measures.Unit – V QUALITY SYSTEMS 9Need for ISO 9000- ISO 9000-2000 Quality System – Elements, Documentation, Qualityauditing- QS 9000 – ISO 14000 – Concepts, Requirements and Benefits – Case studiesof TQM implementation in manufacturing and service sectors including IT.Total : 45REFERENCE BOOKS1. Dale H.Besterfiled, et at., “Total Quality Management”, Pearson Education Asia,Third Edition, Indian Reprint (2006).2. James R. Evans and William M. Lindsay, “The Management and Control ofQuality”, (6th Edition), South-Western (Thomson Learning), 2005.3. Oakland, J.S. “TQM – Text with Cases”, Butterworth – Heinemann Ltd., Oxford,Third Edition (2003).4. Suganthi,L and Anand Samuel, “Total Quality Management”, Prentice Hall (India)Pvt. Ltd. (2006)5. Janakiraman,B and Gopal, R.K, “Total Quality Management – Text and Cases”,Prentice Hall (India) Pvt. Ltd. (2006)PROFESSIONAL ETHICS3 0 0 100 3Unit – I ENGINEERING ETHICS 9Senses of ‘engineering ethics’ – variety of moral issues – types of inquiry – moraldilemmas – moral autonomy – kohlberg’s theory – gilligan’s theory – consensus andcontroversy – professions and professionalism – professional ideals and virtues –theories about right action – self-interest – customs and religion – uses of ethicaltheories.Unit – II ENGINEERING AS SOCIAL EXPERIMENTATION 9Engineering as experimentation – engineers as responsible experimenters – codes ofethics – a balanced outlook on law – the challenger case study.Unit – III ENGINEER’S RESPONSIBILITY FOR SAFETY 9Safety and risk – assessment of safety and risk – risk benefit analysis – reducing risk –the three mile island and chernobyl case studies.Unit – IV RESPONSIBILITIES AND RIGHTS 9Collegiality and loyalty – respect for authority – collective bargaining – confidentiality –

Page 39: Copy of Syllabus

conflicts of interest – occupational crime – professional rights – employee rights –intellectual property rights (ipr) – discriminationUNIT – V GLOBAL ISSUES 9Multinational corporations – environmental ethics – computer ethics – weaponsdevelopment – engineers as managers – consulting engineers – engineers as expertwitnesses and advisors – moral leadership – sample code of conductTOTAL : 45REFERENCE BOOKS:1. Mike Martin and Roland Schinzinger, “Ethics in Engineering”, McGraw Hill, NewYork, 1996.2. Charles D Fleddermann, “Engineering Ethics”, prentice Hall, New Mexico, 1999.3. Laura Schlesinger, "How Could You Do That: The Abdication of Character,Courage, and Conscience", Harper Collins, New York, 1996.4. Stephen Carter, "Integrity", Basic Books, New York, 1996.5. Tom Rusk, "The Power of Ethical Persuasion: From Conflict to Partnership atWork and in Private Life", Viking, New York, 1993