M.sc. Computer Science
M.sc. Computer Science
Academic Council
held on 26.03.2018
APPENDIX - Q
MADURAI KAMARAJ UNIVERSITY
(University with Potential for Excellence)
M.Sc. Computer Science (Semester)
(With effect from 2018-19 onwards)
CHOICE BASED CREDIT SYSTEM
REVISED SYLLABUS
REGULATIONS SCHEME OF EXAMINATIONS AND SYLLABUS
1. Course Objective:
To prepare the students to manage the software components in a computer
independently and to be a Programmer/Project Leader. To motivate the
students to take up Academic Research in Computer Science and other
streams.
2. Eligibility for Admission:
Students who studied B.Sc.(CS) and BCA.
3. Duration of the Course:
The students shall undergo the prescribed course of study for a period
of not less than two academic years ( Four semesters).
4. Medium of Instruction : English
5. Subjects/ Structure of Course Study : See Appendix – PCS1
6. Scheme of Examinations/ Structure of Question Paper: : See Appendix - PCS2
7. Detailed Syllabus: See Appendix – PCS3
8. Eligibility for the Degree:
i) A Candidate shall be eligible for the award of the degree on
completion of the prescribed course of study and passing all the
prescribed external examinations.
ii) Attendance progress, internal examinations, conduct certificate
from the Head of the Institution shall be required for taking the
external examination.
iii) The passing minimum and the ranking are as per the existing
rule of the Choice Based Credit System for the affiliated college
of the University.
602
Appendix – PCS1 (Subject/Structure of Course Study)
Abbreviations:
() – Number of Hours [] – Number
of Credits CS - Core Subject NME - Non
Major Elective ES - Elective Subject CP -
Course Project
I SEMESTER
S CODE Subject Hours Credits Internal External
No Marks Marks
1 CS 11 Discrete Mathematical Structures 5 4 25 75
2 CS 12 Advanced JAVA Programming 5 4 25 75
3 CS 13 Data Structures and Algorithms 5 4 25 75
Data Communication and Computer
4 CS 14 Networks 5 4 25 75
Lab 1: Advanced JAVA Programming
5 CS 15 Lab 5 3 40 60
6 CS 16 Lab 2: Data Structures and Algorithms 5 3 40 60
Lab
30 22
603
II SEMESTER
1 CS 21 Python Programming 5 4 25 75
2 CS 22 Compiler Design 5 4 25 75
3 CS 23 Operating System Design Principles 5 4 25 75
4 ES1 1. Embedded Systems 5 4 25 75
2. Advanced Software Engineering
3.Distributed Systems
5 CS 24 Lab 3: Python Programming Lab 5 3 40 60
6 CS 25 Lab 4: Operating System Lab 5 3 40 60
30 22
III SEMESTER
604
IV SEMESTER
Part – B
Answer all the questions (5*7=35)
Five Questions, one question set from each Unit: Either …Or… type
Part – C
Answer any three questions (3*10=30)
The following list of parameters taken into account for the evaluation of the Practical
examination and Project work.
605
For Practical Subjects:
Parameters:
Note: The External Examiner can fix other exercises also, other than those
found in the list (Syllabus) in consultation with the Internal Examiner
without violating the scope of the prescribed syllabus.
Unit I:
Appendix – PCS3
(Detailed Syllabus)
CS 11: DISCRETE MATHEMATICAL STRUCTURES
(5 Hours – 4 Credits)
Unit II:
Relations and Ordering: Relations – Properties of Binary Relations in a Set –
Relation Matrix and the Graph of a Relation – Partition and Covering of a Set –
Equivalence Relations
– Compatibility Relations – Composition of Binary Relations – Partial Ordering
– Partially Ordered Set: Representation and Associated Terminology.
Unit III:
Lattices and Boolean Algebra: Lattices as Partially Ordered Sets – Definition and
Examples
– Some Properties of Lattices – Lattices as Algebraic Systems – Sublattices,
Direct Product, and Homomorphism – Some Special Lattices – Boolean Algebra
– Definitions and Examples
– Subalgebra, Direct Product and Homomorphism – Boolean Functions – Boolean Forms
and
Free Boolean Algebras – Values of Boolean Expressions and Boolean Functions
– Representation and Minimization of Boolean Functions – Representation of
Boolean Functions – Minimization of Boolean Functions.
Unit IV:
Graph Theory: Basic Concepts of Graph Theory – Basic Definitions, Paths,
Reachability and Connectedness – Matrix Representation of Graphs, Trees -
Storage Representation and Manipulation of Graphs – Trees-Their
Representation and Operations – List Structures and Graphs.
Unit V:
607
Text Book:
Discrete Mathematical Structures with Applications to Computer Science, J.P.
Tremblay and R.Manohar, McGraw Hill Book Company, New York, 1988.
Reference Books:
1. Discrete Mathematics for Computer Scientists – John Truss – II Edition -
Addison Wesley – 2000.
2. Introduction to Automata Theory, Languages and Computation – John
E.HopCroft R.Motwani, Jeffery D.Ullman – III Edition Pearson
Education – 2008.
3. Discrete Mathematics with Graph Theory – GoodaireParmenter –
Prentice Hall Inc., 1998.
4. Discrete and Combinational Mathematics – Ralph P.Grimaldi – Fourth
Edition Pearson Education – 1999.
5. Discrete Mathematics and Graph Theory – Satyanarayana – PHI Pvt. Ltd., - 2009.
Unit II :
Networking: Basics - Networking in Java -Socket Programming using TCP/IP –
Socket Programming using UDP – URL and InetAddress Classes
608
Unit III :
Servlets : - Basics – Advantages - Servlet alternatives – strengths - Architecture
- Servlet Life Cycle - Generic Servlet - HTTP Servlet- Passing parameters –
Retrieving parameters
– server side include - Cookies –Filters
Unit IV :
Java Server Pages : Overview - JSP and HTTP – JSP Engines - Working of
JSP – Anatomy of JSP – JSP Syntax – Creating simple JSP page -
Components of JSP -Implicit Objects
Unit V :
Web Programming – Client Side Programming: Client Side Programming
technologies
– Form design with HTML and CSS – Client side Validation using JavaScript
- Content Structuring using XML – Adding interactivity with AJAX
Reference Books:
609
Unit II :
Hashing: Introduction – Static hashing – Dynamic hashing – Bloom filters.
Priority Queues: Single- and Double ended priority queues – Leftist Trees –
Binomial Heaps – Fibonacci Heaps – Pairing Heaps – Symmetric Min-Max
Heaps – Interval Heaps.
Unit III :
Efficient binary search trees: Optimal Binary Search Trees – AVL Trees –
Red-Black Trees – Splay Trees.
Multiway Search Trees: m-way Search Trees – B-Trees – B+-Trees.
Unit IV :
Dynamic Programming: The General Method – Multistage graphs – All-pairs
shortest paths – Single-source shortest paths – Optimal binary search trees –
string editing – 0/1 knapsack – reliability design – The Travelling Salesperson
problem – flow shop scheduling.
Basic Traversal and Search Techniques: Techniques for Binary Trees –
Techniques for Graphs – Connected Components and Spanning Trees –
Biconnected Components and DFS.
Unit V :
Backtracking: The General Method – The 8-Queens Problem – Sum of subsets
– Graph coloring – Hamiltonian cycles – Knapsack problem.
Branch and Bound: The Method – 0/1 Knapsack problem – Traveling
Salesperson(*) – Efficiency considerations.
Text Books:
1. Fundamentals of Data Structures in C++ – Ellis Horowitz, Sartaj Sahni, Dinesh
Mehta
– University Press(India) Private Limited, Second Edition, Reprinted 2017.
610
1. Data Structures and Algorithms, Alfred V.Aho, John E.Hopcraft and
Jeffrey D.Ullman, Pearson Education, Fourteenth Impression, 2013.
2. Classic Data Structures in C++, Timothy A. Budd - Addison Wesley
Publishing Co., First Edition.,1994.
3. Data Structure and Algorithm Analysis in C, Mark Allen Weiss,
Second Edition, Addison Wesley Publishing Company, 1997.
4. Computer Algorithms – Introduction to Design & Analysis, Sara
Baase and Allen Van Gelder, Third Edition, Pearson Education, New
Delhi, 2000.
5. Data Structures, A. Chitra, P. T. Rajan, Vijay Nicol Imprints Pvt Ltd,
Mc Graw Hill Education of India Pvt. Ltd., 2006.
6. Design and Analysis of Algorithms – S.Sridhar, Oxford University Press, 2015
Transmission Media
Guided Transmission Media – Wireless Transmission - Wireless
Propagation – Line of Sight Transmission
Unit II:
Digital Data Communication Techniques- Asynchronous and Synchronous
Transmission – Types of Errors – Error Detection –Error Correction –Line
Configuration
Data Link Control Protocols – Flow Control – Error Control – High Level
Data Link Control
611
Unit III:
Wide Area Networks:
Circuit Switching and Packet Switching – Switched Communication Networks
– Circuit Switching Networks - Circuit Switching Concepts – Softswitch
Architecture – Packet Switching Principles – X .25 – Frame Relay
Asynchronous Transfer Mode – Protocol Architecture – ATM Logical
Connections –ATM Cells – Transmission of ATM Cells
Routing in Switched Networks – Routing in Packet switching Networks –
Examples : Routing in ARPANET- Least-Cost Algorithms
Unit IV:
Local Area Networks: Background – Topologies of Transmission Media – lan
Protocol Architecture – Bridges – Layer 2 and Layer 3 Switches
Internetwork Operation
Multicasting – Routing Protocols - Integrated Services Architecture – Differentiated
Services
– Service Level Agreements – IP Performance Metrics
Unit V:
Transport Protocols - Connection-Oriented Transport Protocol Mechanisms –
TCP –TCP Congestion Control – UDP
Internet Applications - Electronic Mail and Network Management -
Electronic Mail: SMTP and MIME – Network Management SNMP
Internet Applications – Internet Directory Service and World Wide Web –
Internet Directory Service DNS – Web Access HTTP
Text Book
Data and Computer Communication - William Stallings – 10th Edition – Pearson, 2013
Unit I : Chapters 1,2,4
Unit II : Chapters 6,7,8.1-8.4
Unit III : Chapters 10,11.1-11.4,12
Unit IV : Chapters 15,18.1-18.6,19
Unit V : Chapters 20,22,23
Reference Books
1. Computer Networks – Andrew S. Tanenbaum and David J Wetherall– 5th
Edition – Pearson , 2013
2. Data communications and Networking - Behrouz A. Forouzan – 4th
Edition - Mc Graw Hill, 2017.
3. Data Communication and Networks - Bhushan Trivedi , Oxford
University Press 2016.
612
CS 15: LAB 1- ADVANCED JAVA PROGRAMMING LAB
(5 Hours – 3 Credits)
1. Program to display life cycle of an applet
2. Program to display digital clock using applet
3. Program to display different graphical shapes in applet
4. Program to display graphical bar chart by passing parameters in applet
5. Write an Applet which will play two sound notes in a sequence
continuously use the play () methods available in the applet class and
the methods in the Audio clip interface.
6. Program to find factorial value of N using AWT high level event handling
7. Program to illustrate window closing using AWT low level event handling
8. Program to illustrate TCP based network communication
9. Program to illustrate UDP based network communication
10. Program to find sum of digits using RMI
11. Program to find length of the given string using RMI
12. Write a program in Java to implement a Client/Server application using RMI.
13. Program using HTML/Java script to find length of the given string
14. Program using HTML/Java script to find biggest element of an array
15. Program to compute factorial value of N using GenericServlet
16. Program to compute factorial value of N using HTTPServlet
17. Use JDBC connectivity and create Table, insert and update data.
18. Write a program in Java to create a Cookie and set the expiry time of the same.
19. Write a program in Java to create Servlet to count the number of
visitors to a web page.
20. Write a program in Java to create a form and validate a password using
Servlet.
21. Develop a Java Bean to demonstrate the use of the same.
22. Write a program in Java to convert an image in RGB to a Grayscale image.
23. Develop Chat Server using Java.
Reference Books
1. Java The Complete Reference - Herbert Schildt, McGraw Hill
Education, 10th Edition, New York, 2017
Note: The above are sample problems; Instructor can add more
exercises based on their requirements and the current technology
613
CS 16: LAB 2.DATA STRUCTURES AND ALGORITHMS LAB
(5 Hours – 3 Credits)
1. Implementation of Stack
a) Using Array
b) Using Linked List
2. Implementation of Queue
a) Using Array
b) Using Linked List
3. Implementation of Heap Tree.
4. Implementation of Tree Traversal.
5. Implementation of BFS.
6. Implementation of DFS.
7. Implementation of Merge Sort using Divide and Conquer.
8. Implementation of Knapsack Problem using Dynamic Programming.
9. Implementation of Warshall’s Algorithm using Dynamic Programming.
10. Implementation of Floyd’s Algorithm using Dynamic Programming.
11. Implementation of Dijkstra’s Algorithm using Greedy Technique.
12. Implementation of Prim’s Algorithm using Greedy Technique.
13. Implementation of n-queens Problem using Backtracking.
14. Implementation of Assignment Problem using Branch and bound.
Note: The above are sample problems; Instructor can add more exercises
on on their requirements and the current technology
Unit I :
CS 21: PYTHON PROGRAMMING
(5 Hours – 4 Credits)
Unit II :
Scope - Objects and Object ids, Scope of Objects and Names. Strings - Strings,
String Processing Examples, Pattern Matching. Mutable and Immutable
Objects – Lists, Sets, Tuples, Dictionary.
614
Unit III :
Unit IV :
Classes I - Classes and Objects, Person: An Example of Class, Class as Abstract
Data Type, Date Class. Classes II - Polymorphism, Encapsulation, Data Hiding,
and Data Abstraction, Modifier and Accessor Methods, Static Method, Adding
Methods Dynamically, Composition, Inheritance, Built-in Functions for Classes.
Unit V :
Graphics - 2D Graphics, 3D Objects, Animation – Bouncing Ball. Applications
of Python - Collecting Information from Twitter, Sharing Data Using Sockets,
Managing Databases Using Structured Query Language (SQL), Developing
Mobile Application for Android, Integrating Java with Python, Python Chat
Application Using Kivy and Socket Programming.
Text Book:
Python Programming a Modular Approach with Graphics, Database, Mobile, and
Web Applications – Sheetal Taneja, Naveen Kumar – Pearson Publication, 2018.
3. Problem Solving using Python – E. Balagurusamy, Mc Graw Hill Education Ltd., 2017
Unit I:
Compilers and Translators-Why Do We Need Translators?-The Structure Of A
Compiler- Lexical Analysis-Syntax Analysis-Intermediate Code Generation-
Optimization-Code Generation-Book Keeping-Error Handling-Compiler-Writing
615
Tools-Getting started. The role of the lexical analyzer-Simple approach to design
of a lexical analyzer-Regular Expressions- Finite Automata-From regular
expression to finite automata-Minimizing the number of states of a DFA-A
language for specifying lexical analyzer-Implementing a lexical analyzer- The
scanner generator as Swiss army Knife.
Unit II:
The Syntactic Specification of Programming Languages-Derivation and Parse
Trees- Capability of context free Grammars. Parsers-Shift-reduce Parsing-
Operator-precedence parsing-Top-down parsing-Predictive Parsers.
Unit III:
LR parsers-The canonical collection of LR(0) items-constructing SLR parsing
tables – constructing canonical LR parsing tables-constructing SLR parsing tables-
constructing LALR parsing tables – Using Ambiguous grammars- An automatic
parse generator Implementation of LR parsing Tables – constructing LALR set of
items. Syntax directed translation schemes – Implementation if syntax directed
schemes-Intermediate Code-Parse Tree and Syntax Trees
–Three Address code, quadruples, and triples-Translation of assignment
statements-Boolean Expression-Statements that alter the flow of control-postfix
translations-Translation with a top-down parser.
Unit IV:
The contents of a symbol tables-Data structure for a symbol table-Representing
Scope information. Errors-Lexical-phase errors - syntactic-phase errors-Semantic
errors. The principal sources of optimization-Loop optimization -The DAG
representation of basic blocks-Value numbers and algebraic laws-Global data-
flow analysis.
Unit V:
Dominators-Reducible Flow graphs -Depth-first search-Loop-invariant
computations – Induction variable elimination-Some other loop optimization.
Code Generation-Object Programs- A machine Model- A simple code generator-
Register allocation and assignment- Code generation from DAG’s-Peephole
Optimization.
Text Book:
616
Reference Books:
Unit I:
CS 23: OPERATING SYSTEM DESIGN PRINCIPLES
(5 Hours – 4 Credits)
Computer system overview – basic elements - processor registers – instruction
execution – interrupts – memory hierarchy – cache memory – I/O communication
techniques. Operating system overview – operating system objectives and
functions – evolution of operating systems – major achievements – developments
leading to modern operating systems – Microsoft windows overview.
Unit II:
Process description and control – what is a process? – process states – process
description
– process control – execution of operating system – security issues. Threads,
SMP, Micro kernels –processes and threads – symmetric multiprocessing –
micro kernels – windows vista thread and SMP management. Concurrency:
Mutual exclusion and Synchronization - Principles of concurrency –mutual
exclusion: hardware support – semaphores – monitors – message passing –
reader/writer problem.
Unit III:
Concurrency: Deadlock and Starvation – principles of deadlock – deadlock
prevention – deadlock avoidance – deadlock detection – an integrated deadlock
strategy – dining philosophers problem – windows vista concurrency mechanisms.
Memory management – memory management requirements – memory partitioning –
paging – segmentation – security issues. Virtual memory –hardware and control
structures – operating system software– windows vista memory management.
Unit IV:
Uni processor scheduling – types of scheduling – scheduling algorithms.
Multiprocessor and Real time scheduling – multiprocessor scheduling – real time
scheduling – windows vista scheduling.
Unit V:
I/O management and Disk scheduling – I/O devices – organization of I/O
function – operating system design issues – I/O buffering – disk scheduling –
RAID – disk cache – windows vista I/O. File management – overview – file
617
organization and access – file directories – file sharing – record blocking –
secondary storage management – file system security – windows vista file
system.
Text book:
Operating Systems - Internals and Design Principles, William
Stallings, Sixth Edition, Pearson Education Ltd, 2014
Unit I : Chapter 1.1 to 1.7, 2.1 to 2.5
Unit II : Chapter 3.1 to 3.6, 4.1 to 4.4, 5.1 to 5.6
Unit III : Chapter 6.1 to 6.6, 6.10, 7.1 to 7.5, 8.1, 8.2, 8.5
Unit IV : Chapter 9.1, 9.2, 10.1, 10.2, 10.5
Unit V : Chapter 11.1 to 11.7, 11.10, 12.1 to 12.7, 12.10
Reference Books:
1. Operating System Concepts: Abraham Silberschatz, 8th Edition, Wiley
Student Edition 2009
2. Operating system – A Design Oriented Approach, Charles Crowley,
McGraw-Hill Education, 2009
3. Operating Systems: Concepts & Design: Milan Milenkovic, 2nd
Edition, Mc Graw- Hill Education,2001
Unit II:
8051 Instruction Set & Assembly Language Programming: Addressing
modes of 8051- instruction set- data move- arithmetic- logical- jump and call
Instructions- Program for data transfer- Memory operations- arithmetic- logical-
sorting.
Unit III:
Programming and Debugging Using KEIL C: Different types of Header files,
declaration of variables, operators, Macro declaration- inclusion of files- I/O
functions- String functions- Basic debugging concept- Logic analyzer
programming- Timer simulation- I/O port simulation and debug- Program for
RPM counting- Program for PWM.
618
Unit IV:
External Peripheral Interfacing: Interfacing switches- LEDs- Matrix
Keyboard- Seven Segment Displays- 16 x 2 LCD- pulse measurement- analog to
digital and digital to analog converters- interrupt programming- PC interfacing.
Unit V:
Real Time Software Development: Architecture: Study of different
architectures- simple Round Robin- Round Robin with Interrupt- Token passing
method- Semaphores- Interrupt Latency- RTOS- RTOS applications-VxWorks
RTOS study- RTC interfacing with RTOS- Selection procedure for
Microcontrollers- SPI mode of operation.
Text Book:
The 8051 Microcontroller Architecture Programming and Applications,
Kenneth J Ayala, Penram International Publishing Pvt. Ltd., 2005.
Reference Books:
1. Douglas V Hall-Microprocessor and Interfacing- Tata McGraw Hill, 3rd
Edition, 2000.
2. The 8051 Microcontroller and Embedded system - Muhammad Ali
Mazidi and Mazidi & McKinlay, R.D, - Pearson Education, 2006
3. Raj Kamal, Microcontroller Architecture programming Interfacing and
system design, Pearson Education, 2005
Unit II :
Modeling: Principles that guide each framework activity – Understanding
Requirement: Requirement engineering – Eliciting requirements – Negotiating
requirements – Validating requirements. Requirement Modeling: Scenarios,
Information, and Analysis Classes: Requirement Analysis – Scenario-based
modeling – UML models that supplement the use case – Data modeling concepts
– Class-based modeling.
619
Unit III :
Design Concepts: The design process - Design concepts – Architectural
design: Software Architecture – Architecture design – Component level design:
What is component? Designing class based components - User Interface
design: User Interface analysis & design
– Interface Analysis – Interface Design steps.
Unit IV :
Quality Management: What is quality? Software quality – Achieving software quality
– Software quality assurance; Elements of software quality assurance – SQA tasks,
Goals & metrics - Software reliability.
Unit V :
Software Testing strategies: A strategic approach to software testing – Testing strategies
for conventional software – Test strategies for object- oriented software – Software
testing.
Software configuration Management-SCM.
Text book:
Reference Books:
1. Richard E. Fairley, Software Engineering – A practitioner’s
approach, McGraw Hill,2008
2. Martin L Shooman, Software Engineering – Design, Reliability and
Management McGraw Hill,1983
3. Software Engineering - Ian Sommerville Addison Wesley Publishing
company,2004.
4. An Integrated approach to Software Engineering Pankaj Jalote,
Third Edition, Springer Verlag,2005.
620
ES1. 3: DISTRIBUTED SYSTEMS
(5 Hours – 4 Credits)
Unit I:
Introduction to Distributed System: Goals, Hardware concepts, Software
concepts, and Client-Server model. Examples of distributed systems.
Unit II:
Processes: Threads, Clients, Servers, Code Migration, Software agent.
Naming: Naming entities, Locating mobile entities, Removing un-referenced entities.
Unit III:
Synchronization: Clock synchronization, Logical clocks, Global state, Election
algorithms, Mutual exclusion, Distributed transactions.
Unit IV:
Fault Tolerance: Introduction, Process resilience, Reliable client server
communication, Reliable group communication. Distributed commit, Recovery.
Security: Introduction, Secure channels, Access control, Security management.
Unit V:
Distributed File System: Sun network file system, CODA files system.
Text Book:
Distributed Systems: Principles and Paradigms A.S. Tanenbaum and
M. van Steen, Pearson/Prentice-Hall, 2nd Edition, 2007.
Unit I : Chapters 1,2 and 4
Unit II : Chapters 3 and 5
Unit III : Chapters 6 and 7
Unit IV : Chapters 8 and 9
Unit V : Chapters 11
Reference Books:
1. Distributed Systems: Concepts and Design G. Coulouris, J. Dollimore,
and T. Kindberg, 5th edition, Addison-Wesley, 2012.
2. Advanced Concepts in Operating Systems M. Singhal, N. Shivaratri, ,
McGraw-Hill Education (India) Pvt. Limited, 2001.
3. Distributed Operating Systems: Concepts and Design, Pradeep K Sinha,
Prentice Hall of India, 2007.
621
CS 24: LAB3.PYTHON PROGRAMMING LAB
(5 Hours – 3 Credits)
Section: A
Section: B
All the programs should be written using user defined functions, wherever possible.
1. Write a menu-driven program to create mathematical 3D objects
i. curve
ii. sphere
iii. cone
iv. arrow
v. ring
vi. cylinder
2. Write a Python program to read n integers and display them as a histogram.
3. Write a Python program to display sine, cosine, polynomial and exponential curves.
4. Write a Python program to plot a graph of people with pulse rate p vs. height
h. The values of p and h are to be entered by the user.
5. Write a Python program to calculate the mass m in a chemical reaction. The
mass m (in gms) disintegrates according to the formula m=60/(t+2), where t is
622
the time in hours. Sketch a graph for t vs. m, where t>=0.
6. Input initial velocity and acceleration, and plot the following graphs depicting
equations of motion: velocity wrt time (v=u+at)
i. distance wrt time ( s=u*t+0.5*a*t*t)
ii. distance wrt velocity ( s=(v*v-u*u)/2*a )
7) A website requires the users to input username and password to register.
Write a program to check the validity of password input by users.
Following are the criteria for checking the password:
1. At least 1 letter between [a-z]
2. At least 1 number between [0-9]
3. At least 1 letter between [A-Z]
4. At least 1 character from [$#@]
5. Minimum length of transaction password: 6
6. Maximum length of transaction password: 12
Your program should accept a sequence of comma separated passwords and
will check them according to the above criteria. Passwords that match the
criteria are to be printed, each separated by a comma.
8) Write a program to sort the (name, age, height) tuples by ascending order where name is
string, age and height are numbers. The tuples are input by console. The sort criteria is:
1: Sort based on name;
2: Then sort based on age; 3: Then sort by score.
The priority is that name > age > score.
If the following tuples are given as input to the program: Tom,19,80
Then, the output of the program should be:
[('John', '20', '90'), ('Jony', '17', '91'), ('Jony', '17', '93'), ('Json', '21', '85'), ('Tom', '19', '80')]
9) Define a class with a generator which can iterate the numbers, which are
divisible by 7, between a given range 0 and n.
10)_A robot moves in a plane starting from the original point (0,0). The robot
can move toward UP, DOWN, LEFT and RIGHT with a given steps. The
trace of robot movement is shown as the following:
UP 5
DOWN 3
LEFT 3
RIGHT 2
The numbers after the direction are steps. Write a program to compute the
distance from current position after a sequence of movement and original
point. If the distance is a float, then just print the nearest integer.
Example:
If the following tuples are given as input to
the program: UP 5
DOWN 3
LEFT 3
RIGHT 2
Then, the output of the
program should be: 2
11)Write a program to compute the frequency of the words from the input. The
623
output should output after sorting the key alphanumerically.
Suppose the following input is supplied to the program:
New to Python or choosing between Python 2 and Python 3? Read Python 2 or Python 3.
Then, the output should be:
2:2
3.:1
3?:1
New:1 Python:5 Read:1 and:1 between:1 choosing:1 or:2
to:1
Reference Books :
1. Problem solving and Python Prgoramming – s.A.Kulkarni, Yesdee Publisher, 2017
2. Python Programming a Modular Approach with Graphics, Database, Mobile,
and Web Applications – Sheetal Taneja, Naveen Kumar – Pearson Publication,
2018.
Note: The above are sample problems; Instructor can add more exercises
based on their requirements and the current technology
624
10. Develop Application using Inter-Process-Communication (Using shared
memory, pipes or message queues).
11. Implement the Producer-Consumer problem using semaphores (Using
UNIX system calls)
12. Implement some Memory management schemes like Paging and Segmentation.
13. Implement some Memory management schemes like FIRST FIT, BEST
FIT & WORST FIT.
14. Implement any file allocation techniques(Contiguous, Linked or Indexed)
15. Write a shell script program to display the process attributes, to change
the priority of processes and to change the ownership of processes.
Unit II :
Distributed Databases and Decision Support: Preliminaries-The Objectives
and problems of Distributed Databases - Client/Server Systems – DBMS
Independence-SQL Facilities – Decision Support-Data Preparation-Data
Warehouses and Data Marts – Online Analytical Processing – Object Oriented
Databases: Introduction-Object Oriented Data Models-Object Oriented Database-
Object Oriented DBMS – Object Oriented Languages.
625
Unit III :
Temporal Databases: Introduction-Intervals-Packing and Unpacking relations-
Generalizing the relational operators – Database Design – Integrity Constraints –
Multimedia Databases: Multimedia Sources – Multimedia Database Queries –
Multimedia Database Applications.
Unit IV :
Spatial Databases: Spatial Data- Spatial Database Characteristics – Spatial Data
Model- Spatial Database Queries – Techniques of Special Database Query- Logic
based Databases: Introduction-Overview-Proportional calculus – Predicate
Calculus – Deductive Database Systems – Recursive Query Processing.
Unit V :
Emerging Database Technologies: Introduction – Internet Databases –
Multimedia Databases – Mobile Databases – MySQL : Introduction – An
Overview of MySQL – MySQL Database.
Text Book:
An Introduction to Database Systems - C.J.Date, A.Kannan,
S.Swamynathan -8th Edition-Pearson Education-2006.
Reference Books:
1. Database Systems: Concepts, Design and Applications -S.K. Singh-2nd
Edition, Pearson Education- 2008.
2. Database Management System Concepts - Abraham Silberschatz, Hentry
F.Korth and S.Sudarshan-McGraw Hill International Edition-2006.
3. Fundamentals of Database Systems - R. Elmasri, S.B. Navathe- Fifth Edition,
Pearson Education- 2006.
Unit 5 :
Introduction to Swarm Intelligence - Background of Swarm Intelligent
Systems, Ant Colony System, Working of Ant Colony Optimisation, Ant
Colony Optimisation Algorithm for TSP.
Text Book:
Soft computing with Pprogramming, N.P.Padhy, S.P.Simon, Oxford University
Press, First Edition, 2015
UNIT 1: Chapter 1 - 1.1 to 1.7 ( except 1.8)
UNIT 2: Chapter 2 - 2.1 to 2.5 ( except 2.6 to 2.8 ).
UNIT 3: Chapter 5 - 5.1 to 5.8 , chapter 6 ( 6.1, 6.2 )
UNIT 4: Chapter 7 - 7.1 to 7.5.
UNIT 5: Chapter 8 - 8.1 to 8.5.
REFERENCES:
1. Principles of Soft computing, S.N.Sivanandam and S.N.Deepa,
Wiley India Edition, 2nd Edition, 2013.
2. Neural Networks, Simon Haykin, Pearson Education, 2003.
3. Fuzzy Logic – Intelligence Control & Information , John Yen &
Reza Langari, Pearson Education, New Delhi, 2003
4. Artificial Intelligence and Intelligent Systems , N.P.Padhy,
Oxford University Press, 2013.
Unit I:
ES2.1: DATA MINING AND WAREHOUSING
(5 Hours – 4 Credits)
Introduction - Why Data Mining? - What is Data Mining? - What Kinds of Data
Can Be Mined? - What Kinds of Patterns Can Be Mined? - Which Technologies
Are Used? Which Kinds of Applications Are Targeted? Major Issues in Data
Mining. Getting to Know Your Data: Data Objects and Attribute Types - Basic
Statistical Descriptions of Data - Data Visualization –Measuring Data Similarity
and Dissimilarity.
627
Unit II:
Data Preprocessing : Data Preprocessing An Overview - Data Cleaning - Data
Integration - Data Reduction - Data Transformation and Data Discretization -
Data Warehousing and Online Analytical Processing: Data Warehouse: Basic
Concepts - Data Warehouse Modeling: Data Cube and OLAP - Data Warehouse
Design and Usage - Data Warehouse Implementation - Data Generalization by
Attribute - Oriented Induction.
Unit III:
Mining Frequent Patterns, Associations, and Correlations: Basic Concepts
and Methods - Frequent Item set Mining Methods - Which Pattern Are
Interesting? - Pattern Evaluation Methods. Advanced Pattern Mining : Pattern
Mining: A Road Map - Pattern Mining in Multilevel, Multidimensional Space -
Constraint - Based Frequent Pattern Mining - Mining High - Dimensional Data
and Colossal Patterns - Mining Compressed or Approximate Patterns - Pattern
Exploration and Application.
Unit IV:
Classification: Basic Concepts - Basic Concepts - Decision Tree Induction -
Bayes Classification Methods - Rule-Based Classification- Model Evaluation
and Selection - Techniques to Improve Classification Accuracy.
Unit V:
Cluster Analysis Basic Concepts and Methods: Cluster Analysis - Partitioning
Methods - Hierarchical Methods - Density Based Methods - Grid Based Methods
- Evaluation of Clustering.
Text Book:
Data Mining Concepts and Techniques - Third Edition, Jiawei Han, Micheline
Kamber, Jian Pei, Morgan Kaufmann Publisher, 2012.
Unit I : Chapters 1 and 2
Unit II : Chapters 3 and 4
Unit III : Chapters 6 and 7
Unit IV : Chapter 8
Unit V : Chapter 10
Reference Books:
1. Insight into Data mining Theory and Practice, K.P. Soman, Shyam Diwakar
and V. Ajay, Easter Economy Edition, Prentice Hall of India, 2006.
2. Introduction to Data Mining with Case Studies, G. K. Gupta, Easter Economy
Edition, Prentice Hall of India, 2006.
3. Introduction to Data Mining Pang-Ning Tan, Michael Steinbach and Vipin
Kumar, , Pearson Education, 2007.
4. Modern Data Warehousing, Mining and Visualization, Marakas, George M,
Pearson Education, 2011.
628
ES 2.2: CLOUD COMPUTING
(5 Hours – 4 Credits)
Unit I:
Cloud Architecture and Model: Technologies for Network-Based System –
System Models for Distributed and Cloud Computing –NIST Cloud Computing
Reference Architecture. Cloud Models:- Characteristics – Cloud Services –
Cloud models (IaaS, PaaS, SaaS) – Public vs Private Cloud –Cloud Solutions -
Cloud ecosystem – Service management – Computing on demand.
Unit II:
Virtualization: Basics of Virtualization - Types of Virtualization -
Implementation Levels of Virtualization - Virtualization Structures - Tools and
Mechanisms - Virtualization of CPU, Memory, I/O Devices - Virtual Clusters
and Resource management – Virtualization for Data- center Automation.
Unit III:
Cloud Infrastructure: Architectural Design of Compute and Storage Clouds –
Layered Cloud Architecture Development – Design Challenges - Inter Cloud
Resource Management – Resource Provisioning and Platform Deployment –
Global Exchange of Cloud Resources.
Unit IV:
Programming Model: Parallel and Distributed Programming Paradigms –
MapReduce , Twister and Iterative MapReduce – Hadoop Library from Apache –
Mapping Applications - Programming Support - Google App Engine, Amazon
AWS - Cloud Software Environments
-Eucalyptus, Open Nebula, OpenStack, Aneka, CloudSim.
Unit V:
Security in The Cloud: Security Overview – Cloud Security Challenges and
Risks – Software-as-a-Service Security – Security Governance – Risk
Management – Security Monitoring – Security Architecture Design – Data
Security – Application Security – Virtual Machine Security - Identity
Management and Access Control – Autonomic Security.
Text Book :
Distributed and Cloud Computing, From Parallel Processing to the Internet
of Things Kai Hwang, Geoffrey C Fox, Jack G Dongarra, Morgan Kaufmann
Publishers, 2012.
629
Reference Books:
Unit II:
IoT and M2M : Introduction : M2M – Difference between IoT and M2M –
SDN and NFV for IoT.
IoT System Management with NETCONF-YANG : Need for IoT Systems
Management – Simple Network Management Protocol (SNMP) – Network
Operator Requirements – NETCONF- YANG – IoT Systems Management with
NETCONF_YANG.
Unit III:
IoT Platforms Design Methodology: Introduction – IoT Design Methodology –
Case Study on IoT System for Weather Monitoring – Motivation for using
Python.
Unit IV:
IoT Physical Devices & Endpoints: What is an IoT Device – Exemplary
Device: Raspberry Pi – About the Board – Linux on Raspberry Pi – Raspberry Pi
Interfaces – Programming Raspberry Pi with Python – Other IoT devices.
Text Book:
1. Internet of Things, Arshdeep Bahga, Vijay Madisetti, Universities
Press (INDIA) Private Ltd., 2015.
Unit I : Chapters 1 and2
Unit II : Chapters 3 and 4
Unit III : Chapters 5 and 6
Unit IV : Chapters 7 and 8
Unit V : Chapters 9 and 10
Reference Books:
Unit I:
Introduction: The Internet – world wide web – Getting connected to web –
web Multimedia – Bandwidth – Information Technology introduction –
Information Systems.
Unit II:
What is Software – IT in Business and industry – IT in Education – IT in
Science – Engineering and Math – Computers in hiding – Global Positioning
System.
631
Unit III:
Input Output Devices – Modern Storage Device – User interfaces – Application
Programs
– Operating System – Introduction - Types
Unit IV:
Entering and Editing Documents – Formatting Documents – Database
Application – Principles of Data Storage – Network Application – Fax,
voice and information services
Unit V :
Multimedia – Introduction – Tools of Multimedia – Graphic effects and
techniques – Multimedia Authoring Tools – Multimedia on the Web.
Text Book:
Reference Books :
632
vectors R and S R =
0.7 0.5
0.8 0.4
S=
0.9 0.6 0.2
0.1 0.7 0.5
Using max–product and max-min method
R=
0.2 0.7 0.8 1
1 0.9 0.5 0.1
0 0.8 1 0.6
0. 0.4 1 0.3
8. Temperature control of the reactor where the error and change in error is
given to the controller. Here the temperature of the reactor is controlled
by the temperature bath around the reactor thus the temperature is
controlled by controlling the flow of the coolant into the reactor. Form
the membership function and the rule base using FIS editor.
9. Consider the water tank with following rules
a) IF (level is okay) THEN (valve is no_change) (1)
b) IF (level is low) THEN (valve is open_fast) (1)
c) IF (level is high) THEN (valve is close_fast) (1)
Using Mamdani method and max–min method for
fuzzification and method of centroid for defuzzification
method construct a FIS. Before editing that rules, membership
functions must be defined with membership function editor.
633
you type fuzzy in a window. Then use the fuzzy inference system and
membership function editors to define and tune your rules.
15. The data presented in the Table P4.17 show the weights of eye lenses of wild Australian
rabbits as a function of age. No simple analytical function can exactly interpolate these data,
because we do not have a single valued function. Instead, we have a nonlinear least squares
model of this data set, using a negative exponential, as described by Y = 2.33.846(1 – exp(-
an error term.
Using the back- propagation algorithm, design a multiplayer perceptron that provides a
nonlinear least-squares approximation to this data set. Compare your result against the least-
sequence model described.
Table P4.17 Weights of Eye Lenses of Wild Australian Rabbits
634
Ages Weights Ages Weights Ages Weights Ages Weights
(days) (mg) (days) (mg) (days) (mg) (days) (mg)
15 21.66 75 94.6 218 174.18 338 203.23
15 22.75 82 92.5 218 173.03 347 188.38
15 22.3 85 105 219 173.54 354 189.7
18 31.25 91 101.7 224 178.86 357 195.31
28 44.79 91 102.9 225 177.68 375 202.63
29 40.55 97 110 227 173.73 394 224.82
37 50.25 98 104.3 232 159.98 513 203.3
37 46.88 25 134.9 232 161.29 535 209.7
44 52.03 142 130.68 237 187.07 554 233.9
50 63.47 142 140.58 26 176.13 591 234.7
50 61.13 147 155.3 258 183.4 648 244.3
60 81 147 152.2 276 186.26 660 231
61 73.09 150 144.5 285 189.66 705 242.4
64 79.09 159 142.15 300 186.09 723 230.77
65 79.51 165 139.81 301 186.7 756 242.57
65 65.31 183 153.22 305 186.8 768 232.12
72 71.9 192 145.72 312 195.1 860 246.7
75 86.1 195 161.1 317 216.41
Note: The above are sample problems; Instructor can add more exercises
based on their requirements and current technology
635
CS 34: LAB 6. ADVANCED DATABASE LAB
(6 Hours – 3 Credits)
1. Creation of base tables and views.
2. Data Manipulation INSERT, DELETE and UPDATE in Tables. SELECT,
Sub Queries and JOIN
3. Data Control Commands
4. High level language extensions – PL/SQL. Or Transact SQL – Packages
5. Use of Cursors, Procedures and Functions
6. Embedded SQL or Database Connectivity.
7. Oracle or SQL Server Triggers – Block Level – Form Level Triggers
8. Working with Forms, Menus and Report Writers for a application
project in any domain
9. Front-end tools – Visual Basic.
Using R-Tool :
1. Find Sum, Mean and Product of Vector in R
2. R Program to sample from a Population
3. R Program to Sort a Vector.
4. To combine the matrix using rbind and cbind methods.
5. Use seq() to create sequence.
6. Write a program to convert the table data into data frame.
7. Calculate student mark list and output it in data frame.
8. R Program to Check Prime Number
9. R Program to Check for Leap Year.
10. R Program to Check if a Number is Odd or Even in R
636
11. R Program to Find the Sum of Natural Numbers
12. Convert Decimal into Binary using Recursion in R
13. R program to Find the Factorial of a Number Using Recursion
14. R Program to Make a Simple Calculator
15. Write a R Program to import CSV data into R.
16. Write a R Program to move the result data from R to CSV.
17. Draw the Line Graph for Student Data.
18. Draw the Pie-Chart for Employee Data.
19. Create a Table from the existing data set in R and draw the chart.
20. Apply K-Means Algorithm for IRIS data set and output it in graph
21. Get some input from mtcar data set and perform analysis.
Reference Book :
Note: The above are sample problems; Instructor can add more
exercises based on their requirements and the current technology
Unit I:
CS 41: DIGITAL IMAGE PROCESSING
(5 Hours – 4 Credits)
Unit IV:
Color Image Processing: Color Fundamentals, Color Models, Pseudocolor
Image Processing, Full Color Image Processing, Color Transformation,
Smoothing and Sharpening, Image Segmentation Based on Color, Noise in Color
Images. Wavelets and Multiresolution Processing: Background, Multiresolution
Expansion, Wavelet Transforms in One Dimension, The Fast Wavelet
Transform, Wavelet Transforms in Two Dimensions, Wavelet Packets. Image
Compression: Fundamentals, Basic Compression Methods, Digital Image
Watermarking.
Unit V:
Morphological Image Processing: Erosion and Dilation, Opening and Closing,
The Hit-Or- Miss Transformation, Basic Morphological Algorithms, Gray-Scale
Morphology. Object Recognition: Patterns and Pattern Classes, Recognition
Based on Decision-Theoretic Methods, Structural Methods.
Text Book:
Digital Image Processing, Rafael C. Gonzalez, Richard E. Woods, 3rd
Edition, Pearson Education, 2008.
Unit I : Chapter 1 and 2
Unit II : Chapter 3 and 4
Unit III : Chapter 5 and 10
Unit IV : Chapter 6,7 and 8
Unit V : Chapter 9 and 12
Reference Books:
1. Digital Image Processing using MATLAB, Rafael C. Gonzalez, Richard
E. Woods,2nd Edition, Prentice Hall of India, 2002.
2. Fundamentals of Digital Image Processing, A.Jain, Prentice Hall of India, 2010.
3. Digital Image Processing, Willliam K Pratt, John Willey, 2002.
638
CS 42: ADVANCED SYSTEM ARCHITECTURE
(5 Hours – 4 Credits)
Unit I:
Introduction to Advanced Computer Architecture and Parallel Processing :
Four Decades of Computing - Flynn’s Taxonomy of Computer Architecture -
SIMD Architecture - MIMD Architecture - Interconnection Networks
Multiprocessors Interconnection Networks : Interconnection Networks
Taxonomy - Bus-Based Dynamic Interconnection Networks - Switch-Based
Interconnection Networks - Static Interconnection Networks - Analysis and
Performance Metrics.
Unit II:
Shared Memory Architecture : Classification of Shared Memory Systems -
Bus-Based Symmetric Multiprocessors - Basic Cache Coherency Methods -
Snooping Protocols - Directory Based Protocols - Shared Memory Programming
Unit III:
Message Passing Architecture :Introduction to Message Passing - Routing in
Message Passing Networks - Switching Mechanisms in Message Passing -
Message Passing Programming Models - Processor Support for Message Passing
- Example Message Passing Architectures - Message Passing Versus Shared
Memory Architectures.
Unit IV:
Parallel Programming in the Parallel Virtual Machine : PVM Environment
and Application Structure - Task Creation - Task Groups - Communication
Among Tasks - Task Synchronization - 6 Reduction Operations - Message
Passing Interface (MPI) : Communicators - Virtual Topologies - Task
Communication - Synchronization - Collective Operations - Task Creation -
One-Sided Communication.
Unit V:
Scheduling and Task Allocation: The Scheduling Problem - Scheduling DAGs
without Considering Communication - Communication Models - Scheduling
DAGs with Communication - The NP-Completeness of the Scheduling Problem
- Heuristic Algorithms - Task Allocation - Scheduling in Heterogeneous
Environments.
639
Text Book:
Advanced Computer architecture and parallel processing, Hesham El-Rewini
and Mostafa Abo-El-Barr, , A John Wiley & sons, publication, 2005.
Unit I : Chapter 1.1, 1.2, 1.3, 1.4, 1.5 and Chapter 2.1,2.2,2.3,2.4, 2.5
Unit II : Chapter 4.1, 4.2, 4.3, 4.4, 4.5, 4.6
Unit III : Chapter 5.1, 5.2, 5.3, 5.4, 5.5, 5.6, 5.7
Unit IV : Chapter 8.1,8.2,8.3,8.4,8.5,8.6 and Chapter
9.1,9.2,9.3,9.4,9.5,9.6,9.7 Unit V : Chapter 10.1, 10.2, 10.3,
10.4, 10.5, 10.6, 10.7, 10.8
Reference Books:
1. Advanced Computer Architecture, Kai Hwang Kai Hwang & F. A.
Briggs, McGraw Hill, Third Edition, 2015.
2. Advanced Computer Architectures – A Design Space approach ,
DezsoSima, Terence Fountain, Peter Kacsuk, Pearson Education, 2009
3. Kai Hwang, Advanced Computer Architecture –
Parallelism, Scalability, Programmability, Tata McGraw-
Hill, 2008.
4. John L. Hennessey and David A. Patterson, Computer architecture – A
quantitative approach, Morgan Kaufmann / Elsevier Publishers, 5th
Edition.
Unit I:
ES 3.1: BIG DATA ANALYTICS
(5 Hours – 4 Credits)
Unit II:
Analytics Basics:Big Data Analytics: Where do we Begin? – What is Big Data
Analytics? – What Big Data Analytics Isn’t? – Why this Sudden Hype Around
Big Data Analytics? – Classification of Analytics – Greatest Challenges that
Prevent Business from capitalizing on Big Data – Top Challenges Facing Big
Data – why is Big Data Analytics Important? – What kind of Technologies are
640
we looking Toward to Help Meet the Challenges Posed by Big Data? – Data
Science – Data Scientist… Your New Best Friend – Terminologies Used in Big
Data Environments – Basically Available Soft State Eventual Consistency
(BASE) – Few Top Analytics Tools.
Unit III:
Big Data Technologies:The Big Data Technology Landscape: NoSQL (Not
Only SQL) – Hadoop, Introduction to Hadoop: Introducing Hadoop – Why
Hadoop? – Why not RDBMS?
– RDBMS versus Hadoop – Distributed Computing Challenges – History of
Hadoop – Hadoop Overview – Use Case of Hadoop – Hadoop Distributors –
HDFS(Hadoop Distributed File System) – Processing Data with Hadoop –
Managing Resources and Applications with Hadoop YARN(Yet another Resource
Negotiator) – Interacting with Hadoop Ecosystem.
Unit IV:
Introduction to MAPREDUCE Programming: Introduction – Mapper –
Reducer – Combiner – Partitioner – Searching – Sorting – Compression,
Introduction to Hive: What is Hive? – Hive Architecture – Hive Data Types –
Hive File Format – Hive Query Language (HQL) – RCFile Implementation –
SerDe – User – Defined Function (UDF).
Unit V:
Analytical Algorithms: Introduction to Machine Learning: Introduction to
Machine Learning – Machine Learning Algorithms.
Text Book:
Big Data and Analytics, SeemeAcharya, and Subhashini Chellappan, Wiley
India Pvt.Ltd. First Edition-2015.
Unit I : Chapters 1 and 2
Unit II : Chapter 3
Unit III : Chapters 4 and 5
Unit IV : Chapters 8 and 9
Unit V : Chapter 12
Reference Books:
1. Big Data – Principles and best practices of scalable real-time data
systems, Nathan Marz, and James Warren, Manning Publication CP.,
USA-2015.
2. Analytics in a Big Data World: The Essential Guide to Data Science and
its Applications, Bart Baesens, Wiley India Pvt.Ltd-2015.
3. Big Data, Data Mining and Machine Learning, Jared Deamn, Willey
India Pvt.Ltd- 2015.
Unit I:
ES 3.2: NETWORK SECURITY
(5 Hours – 4 Credits)
Introduction: Security Goals – Attacks – Services and Mechanism –
641
Techniques. Mathematics of Cryptography: Integer Arithmetic – Modular
Arithmetic – Matrices – Linear Congruence - Traditional Symmetric Key
Ciphers: Instruction – Substitution Ciphers
– Transposition Ciphers – Stream and Block Ciphers. Introduction to Modern
Symmetric Key Ciphers: Modern Block Ciphers – Modern Stream Ciphers.
Unit II:
Data Encryption Standard (DES): Introduction – DES Structure – DES
Analysis – Multiple DES – Security of DES. Advanced Encryption Standard
(AES): Introduction – Transformations – Key Expansion – Ciphers – Examples –
Analysis of AES.
Unit III :
Asymmetric Key Cryptography: Introduction – RSA Crypto System. Message
Integrity and Message Authentication: Message Integrity – Random Oracle
Model – Message Authentication.
Unit IV:
Cryptographic Hash Functions: Introduction – SHA – 512 – WHIRLPOOL.
Digital Signature: Comparison – Process – Services – Attacks on Digital
Signature – Digital Signature Schemes.
Unit V:
Entity Authentication: Introduction – Passwords – Challenge Response – Zero
Knowledge
– Bio Metrics. Key Management: Symmetric Key Distribution – Kerberos –
Symmetric Key Agreement – Public Key Distribution.
Text Book:
Cryptography and Network Security – Behrouz A. Forouzan, TheMcGraw Hill, 2011.
Reference Books:
Unit I : Chapters 1,2,3 and 5
Unit II : Chapters 6 and 7
Unit III : Chapters10 and 11
Unit IV : Chapters 12 and 13
Unit V : Chapters 14 and 15
1. Cryptography and Network Security – William Stallings, PHI, 2008.
2. Cryptography and Network Security – Atul Kahate, McGraw Hill Education, 2013.
3. Network Security The Complete Reference – Roberta Bragg, Mark
Rhodes Ousley and Strassberg – McGraw Hill Education, 2003.
642
Unit I :
ES 3.3: MOBILE COMPUTING
(5 Hours – 4 Credits)
Introduction: Mobility Of Bits And Bytes – Wireless: The Beginning - Mobile
Computing - Networks - Middleware And Gateways - Applications And Services
- Standard Bodies. Mobile computing Architecture: Architecture For Mobile
Computing - Three Tier Architecture. Emerging Technologies: Bluetooth -
Radio Frequency Identification (RFID) – Wireless Broadband (Wimax) - Mobile
IP - Internet Protocol Version 6(IPv6).
Unit II :
Global System For Mobile Communications (GSM): Global For Mobile
Communications
- GSM Architecture - GSM Entities - Call Routing In GSM. Short message
Service (SMS): Mobile computing over SMS – Short Message service – Value
added service through SMS. General Packet Radio Service: Introduction –
GPRS and Packet Data Network – GPRS network architecture - GPRS network
operations - Data services in GPRS - Applications for GPRS – Limitations for
GPRS – Billing and Charging in GPRS – Enhanced Data Rates for GSM
Evolution(EDGE).
Unit III :
Wireless Application Protocol (WAP): Introduction – WAP – MMS – GPRS
Application. - CDMA AND 3G: Third generation networks – Applications on
3G. Wireless LAN: Wireless LAN advantages - IEEE 802.11 standards -
wireless LAN architecture.
Unit IV :
Client Programming: Introduction - Moving Beyond The Desktop - A Peek
Under The Hood: Hardware Overview - Mobile Phones – Features of Mobile
Phones – PDA – Design Constraints In Applications For Handle Held Devices.
Programming for the palm OS: Palm OS Architecture. Wireless devices with
Symbian OS: Symbian Os Architecture. Wireless devices with windows CE:
Windows CE Architecture.
Unit V :
Multimedia: Networked Multimedia Application – Issues in Multimedia
delivery over the Internet – Multimedia Delivery over the Internet – Multimedia
Networking Protocols. IP Multimedia Subsystem: Introduction – IMS and its
Evolution – Benefits from IMS – Architecture of IMS Networks – Protocols used
in IMS – Building Blocks in IMS Networks. Security issues in mobile
computing: Introduction-Information Security-Security Techniques and
Algorithms-Security Protocols-Public Key Infrastructure.
643
Text Book:
Mobile Computing Technology,Applications and Service Creation -
Asoke.K.Talukder, Roopa.R.Yavagal, Hasan Ahmed -McGraw Hill
Publishing Company. , 2nd Edition, 2011.
Unit I : Chapter 1.1, 1.2, 1.3, 1.5, 1.6, 1.7, 1.11, 2.4, 2.5, 4.2, 4.3, 4.4, 4.5,
4.6
Unit II : Chapters 5.1, 5.2, 5.3, 5.4, 6.1, 6.2, 6.3, 7.1 to 7.9
Unit III : Chapters 8.1 to 8.4, 9.6, 9.7, 10.2, 10.3, 10.4
Unit IV : Chapters 12.1 to 12.7, 13.3, 14.2, 16.3
Unit V : Chapters 18.6 to 18.9, 19.1 to 19.6, 20.1 to 20.5
Reference Books:
644