Affiliated Institutions
Affiliated Institutions
SEMESTER II
SL. COURSE
NO CODE COURSE TITLE L T P C
THEORY
1 CS9221 Data Base Technology 3 0 0 3
2 CS9222 Advanced Operating Systems 3 0 0 3
3 CS9223 Advanced System Software 3 0 0 3
4 CS9224 Information Security 3 0 0 3
5 CS9225 Web Technology 3 0 0 3
6 E1 Elective I 3 0 0 3
PRACTICAL
7 CS9227 Operating System Lab 0 0 3 2
8 CS9228 Web Technology Lab 0 0 3 2
TOTAL 18 0 6 22
SEMESTER III
SL. COURSE
NO CODE COURSE TITLE L T P C
THEORY
1 E2 Elective II 3 0 0 3
2 E3 Elective III 3 0 0 3
3 E4 Elective IV 3 0 0 3
PRACTICAL
4 CS9234 Project Work (Phase I) 0 0 12 6
TOTAL 9 0 12 15
1
SEMESTER IV
SL. COURSE
NO CODE COURSE TITLE L T P C
PRACTICAL
1 CS9241 Project Work (Phase II) 0 0 24 12
TOTAL 0 0 24 12
AFFILIATED INSTITUTIONS
ANNA UNIVERSITY CHENNAI : : CHENNAI 600 025
REGULATIONS - 2009
CURRICULUM I TO VI SEMESTERS (PART TIME)
M.E.COMPUTER SCIENCE AND ENGINEERING
SEMESTER I
SL. COURSE
NO CODE COURSE TITLE L T P C
THEORY
1 MA9219 Operations Research 3 1 0 4
2 CS9212 Data Structures and Algorithms 3 0 0 3
3 CS9213 Computer Networks and Management 3 0 0 3
PRACTICAL
4 CS 9215 Data Structures Lab 0 0 3 2
TOTAL 9 1 3 12
SEMESTER II
SL. COURSE
NO CODE COURSE TITLE L T P C
THEORY
1 CS9221 Data Base Technology 3 0 0 3
2 CS9222 Advanced Operating Systems 3 0 0 3
3 CS9223 Advanced System Software 3 0 0 3
PRACTICAL
4 CS9227 Operating System Lab 0 0 3 2
TOTAL 9 0 3 11
2
SEMESTER III
SL. COURSE
NO CODE COURSE TITLE L T P C
THEORY
1 CS9211 Computer Architecture 3 0 0 3
2 SE9213 Object Oriented Software Engineering 3 0 0 3
PRACTICAL
3 CS9216 Networking Lab 0 0 3 2
TOTAL 6 0 3 8
SEMESTER IV
SL. COURSE
NO CODE COURSE TITLE L T P C
THEORY
1 CS9224 Information Security 3 0 0 3
2 CS9225 Web Technology 3 0 0 3
3 E1 Elective I 3 0 0 3
PRACTICAL
4 CS9228 Web Technology Lab 0 0 3 2
TOTAL 9 0 3 11
SEMESTER V
SL. COURSE
NO CODE COURSE TITLE L T P C
THEORY
1 E2 Elective II 3 0 0 3
2 E3 Elective III 3 0 0 3
3 E4 Elective IV 3 0 0 3
PRACTICAL
4 CS9234 Project Work (phase I) 0 0 12 6
TOTAL 9 0 12 15
SEMESTER VI
SL. COURSE
NO CODE COURSE TITLE L T P C
PRACTICAL
1 CS9241 Project Work (Phase II) 0 0 24 12
TOTAL 0 0 24 12
3
LIST OF ELECTIVES FOR M.E.COMPUTER SCIENCE AND ENGINEERING*
SL. COURSE
NO CODE COURSE TITLE L T P C
1 CS9251 Mobile Computing 3 0 0 3
2 CS9252 Grid Computing 3 0 0 3
3 CS9253 Theory of Computation 3 0 0 3
4 CS9254 Soft Computing 3 0 0 3
5 CP9264 Distributed Computing 3 0 0 3
6 CS9256 Multimedia Systems 3 0 0 3
7 CS9257 XML and Web Services 3 0 0 3
8 CS9258 Bio Informatics 3 0 0 3
9 CS9259 Network Security 3 0 0 3
10 CS9260 Embedded Systems 3 0 0 3
11 CS9261 Digital Imaging 3 0 0 3
12 CS9262 Software Quality Assurance 3 0 0 3
13 CS9263 Adhoc Networks 3 0 0 3
14 CS9264 Data Warehousing and Data Mining 3 0 0 3
15 CS9265 Performance Evaluation of Computer Systems 3 0 0 3
and Networks
16 CS9266 Agent Based Intelligent Systems 3 0 0 3
17 CS9267 Visualization Techniques 3 0 0 3
18 CS9268 Advanced Databases 3 0 0 3
19 CS9269 Software Project Management 3 0 0 3
20 CS9270 Component Based Technology 3 0 0 3
http://www.indiastudychannel.com/exams/26-Anna-University-question-papers.aspx
http://www.hongkiat.com/blog/20-best-websites-to-download-free-e-books/
4
MA9219 OPERATIONS RESEARCH
LTPC
3104
UNIT I QUEUEING MODELS 9
Poisson Process – Markovian Queues – Single and Multi-server Models – Little’s formula –
Machine Interference Model – Steady State analysis – Self Service Queue.
L + T: 45+15 =60
TEXT BOOKS:
REFERENCES:
1. Robertazzi. T.G. “Computer Networks and Systems – Queuing Theory and Performance
Evaluation”, Third Edition, Springer, 2002 Reprint.
2. Ross. S.M., “Probability Models for Computer Science”, Academic Press, 2002.
5
CS9211 COMPUTER ARCHITECTURE
LTPC
3003
UNIT I FUNDAMENTALS OF COMPUTER DESIGN AND PIPELINING 9
Fundamentals of Computer Design – Measuring and reporting performance – Quantitative
principles of computer design. Instruction set principles – Classifying ISA – Design issues.
Pipelining – Basic concepts – Hazards – Implementation – Multicycle operations.
REFERENCES:
6
CS9212 DATA STRUCTURES AND ALGORITHMS
LTPC
3003
UNIT I COMPLEXITY ANALYSIS & ELEMENTARY DATA STRUCTURES 9
Asymptotic notations – Properties of big oh notation – asymptotic notation with several
parameters – conditional asymptotic notation – amortized analysis – NP-completeness – NP-
hard – recurrence equations – solving recurrence equations – arrays – linked lists – trees.
TOTAL = 45
REFERENCES:
http://www.scribd.com/doc/21559809/Affiliated-Institutions
7
SE9213 OBJECT ORIENTED SOFTWARE ENGINEERING
LTPC
3003
UNIT I INTRODUCTION
System Concepts – Software Engineering Concepts – Development Activities – Managing
Software Development – Unified Modeling Language – Project Organization – Communication
UNIT II ANALYSIS
Requirements Elicitation – Concepts – Activities – Management – Analysis Object Model –
Analysis Dynamic Models
REFERENCES:
8
CS9213 COMPUTER NETWORKS AND MANAGEMENT
LTPC
3003
UNIT I HIGH SPEED NETWORKS 9
Frame Relay Networks – Asynchronous transfer mode – ATM Protocol Architecture, ATM
logical Connection, ATM Cell – ATM Service Categories – AAL. High Speed LAN’s: Fast
Ethernet, Gigabit Ethernet, Fibre Channel – Wireless LAN’s.
TOTAL = 45
TEXT BOOKS:
REFERENCES:
9
CS9215 DATA STRUCTURES LAB
LTPC
0032
1. Min Heap
2. Deaps
3. Leftist Heap
4. AVL Tree
5. B-Tree
6. Tries
7. Quick Sort
8. Convex hull
9. 0/1 Knapsack using Dynamic Programming
10. Graph coloring using backtracking
1. Socket Programming
a. TCP Sockets
b. UDP Sockets
c. Applications using Sockets
2. Simulation of Sliding Window Protocol
3. Simulation of Routing Protocols
4. Development of applications such as DNS/ HTTP/ E – mail/ Multi - user Chat
5. Simulation of Network Management Protocols
6. Study of Network Simulator Packages – such as opnet, ns2, etc.
10
Rules - Knowledge Bases - Active And Deductive Databases - Parallel Databases – Multimedia
Databases – Image Databases – Text Database
TOTAL = 45
REFERENCES:
1. Elisa Bertino, Barbara Catania, Gian Piero Zarri, “Intelligent Database Systems”,
Addison-Wesley, 2001.
2. Carlo Zaniolo, Stefano Ceri, Christos Faloustsos, R.T.Snodgrass, V.S.Subrahmanian,
“Advanced Database Systems”, Morgan Kaufman, 1997.
3. N.Tamer Ozsu, Patrick Valduriez, “Principles Of Distributed Database Systems”,
Prentice Hal International Inc., 1999.
4. C.S.R Prabhu, “Object-Oriented Database Systems”, Prentice Hall Of India, 1998.
5. Abdullah Uz Tansel Et Al, “Temporal Databases: Theory, Design And Principles”,
Benjamin Cummings Publishers, 1993.
6. Raghu Ramakrishnan, Johannes Gehrke, “Database Management Systems”, Mcgraw
Hill, Third Edition 2004.
7. Henry F Korth, Abraham Silberschatz, S. Sudharshan, “Database System Concepts”,
Fourth Ediion, Mcgraw Hill, 2002.
8. R. Elmasri, S.B. Navathe, “Fundamentals Of Database Systems”, Pearson Education,
2004.
11
CS9222 ADVANCED OPERATING SYSTEMS
LTPC
3003
UNIT I INTRODUCTION 9
Overview - Functions of an Operating System – Design Approaches – Types of Advanced
Operating System - Synchronization Mechanisms – Concept of a Process, Concurrent
Processes – The Critical Section Problem, Other Synchronization Problems – Language
Mechanisms for Synchronization – Axiomatic Verification of Parallel Programs - Process
Deadlocks - Preliminaries – Models of Deadlocks, Resources, System State – Necessary and
Sufficient conditions for a Deadlock – Systems with Single-Unit Requests, Consumable
Resources, Reusable Resources.
TOTAL = 45
TEXT BOOKS:
REFERENCES: .
12
CS9223 ADVANCED SYSTEM SOFTWARE
LTPC
3003
UNIT I
Basic Compiler Functions – Grammars – Lexical Analysis – Syntactic Analysis – Code
Generation – Heap Management – Parameter Passing Methods – Semantics of Calls and
Returns – Implementing Subprograms – Stack Dynamic Local Variables – Dynamic binding of
method calls to methods – Overview of Memory Management, Virtual Memory, Process
Creation – Overview of I/O Systems, Device Drivers, System Boot
UNIT II 10
Introduction and Overview – Symbol table structure – Local and Global Symbol table
management Intermediate representation – Issues – High level, medium level, low level
intermediate languages – MIR, HIR, LIR – ICAN for Intermediate code – Optimization – Early
optimization – loop optimization
UNIT III 9
Procedure optimization – in-line expansion – leaf routine optimization and shrink wrapping –
register allocation and assignment – graph coloring – data flow analysis – constant propagation
– alias analysis – register allocation – global references – Optimization for memory hierarchy
-Code Scheduling – Instruction scheduling – Speculative scheduling – Software pipelining –
trace scheduling – Run-time support – Register usage – local stack frame – run-time stack –
Code sharing – position–independent code
UNIT IV 9
Introduction to Virtual Machines (VM) – Pascal P-Code VM – Object-Oriented VMs – Java VM
Architecture – Common Language Infrastructure – Dynamic Class Loading – Security –
Garbage Collection – Optimization
UNIT V 8
Emulation – Interpretation and Binary Translation – Instruction Set Issues – Process Virtual
Machines – Profiling – Migration – Grids – Examples of real world implementations of system
software
TEXT BOOKS:
13
REFERENCES:
1. Alfred V Aho, Ravi Sethi, Jeffrey D Ullman, “Compilers”, Pearson Education, 1986.
2. Terrance W Pratt, Marvin V Zelkowitz, T V Gopal, “Programming Languages”, 4 th ed.,
Pearson Education, 2006.
3. Carl Hamacher, Zvonko Vranesic, Safwat Zaky, “Computer Organization”, 5 th ed.,
McGraw Hill, 2002.
4. Silberschatz, Galvin, Gagne, “Operating System Concepts”, 6th ed., Wiley, 2003.
14
CS9224 INFORMATION SECURITY
LTPC
3003
UNIT I 9
An Overview of Computer Security, Access Control Matrix, Policy-Security policies,
Confidentiality policies, Integrity policies and Hybrid policies.
UNIT II 9
Cryptography- Key management – Session and Interchange keys, Key exchange and
generation, Cryptographic Key Infrastructure, Storing and Revoking Keys, Digital Signatures,
Cipher Techniques
UNIT III 9
Systems: Design Principles, Representing Identity, Access Control Mechanisms, Information
Flow and Confinement Problem.
UNIT IV 9
Malicious Logic, Vulnerability Analysis, Auditing and Intrusion Detection
UNIT V 9
Network Security, System Security, User Security and Program Security
TEXT BOOK:
1. Matt Bishop ,“Computer Security art and science ”, Second Edition, Pearson Education
REFERENCES:
1. Mark Merkow, James Breithaupt “ Information Security : Principles and Practices” First
Edition, Pearson Education,
3. William Stallings, “Cryptography and Network Security: Principles and Practices”, Third
Edition, Pearson Education.
15
UNIT II 9
Client side programming – Java script language – java script objects – host objects : Browsers
and the DOM
UNIT III 9
Server side programming – java servlets – basics – simple program – separating programming
and presentation – ASP/JSP - JSP basics ASP/JSP objects – simple ASP/JSP pages.
UNIT IV 9
Representing Web data – data base connectivity – JDBC – Dynamic Web pages – XML – DTD
– XML schema – DOM – SAX – Xquery.
UNIT V 9
Building Web applications - cookies – sessions – open source environment – PHP – MYSQL –
case studies.
TEXT BOOKS:
16
CS9227 OPERATING SYSTEM LAB 0 0 3 2
Examples
Consider a simulation with three smoker threads and one agent thread. Each smoker
continuously makes a cigarette and smokes it. But to make a cigarette, a smoker needs three
ingredients: tobacco, paper, and matches. One of the smoker threads has only paper, another
has only tobacco, and the third has only matches. The agent thread has an infinite supply of all
three materials. The three smoker threads are initially blocked. The agent places two randomly
chosen (different) ingredients on the table and unblocks the one smoker who has the remaining
ingredient. The agent then blocks. The unblocked smoker removes the two ingredients from the
table, makes a cigarette, and smokes it for a random amount of time, unblocking the agent on
completion of smoking the cigarette. The agent then puts out another random two of the three
ingredients, and the cycle repeats.
Write a multi-class multithreaded Java program that uses a monitor to synchronize the agent
thread and the three smoker threads. Do not mechanically translate semaphore code into
monitor code! The agent thread executes in an agent object created from an agent class. Each
smoker thread executes in a smoker object. All smoker objects are created from one smoker
class whose constructor is used to specify the ingredient possessed by the smoker object. A
driver class with a main method constructs the objects and starts the threads.
Use a single monitor object instantiated from a class Control for synchronization. Each of the
four threads invokes a synchronized monitor method for its synchronization. No semaphores are
allowed. No synchronized blocks are allowed, only synchronized methods. No busy waiting is
allowed. No calls to nap inside a synchronized method are allowed (do not nap while holding the
monitor object's lock, that is, while inside a synchronized method or while inside a method called
by a synchronized method).
17
PROGRAM 3 – Multiple sleeping barbers - Multiprocessor operating systems
Write a multi-class multithreaded Java program that simulates multiple sleeping barbers, all in
one barbershop that has a finite number of chairs in the waiting room. Each customer is
instantiated from a single Customer class, each barber is instantiated from a single Barber
class.
Establish a Lab setup for the following network operating systems based programs
based on the skills in networking on your own. E.g. for identifying networking hardware,
identifying different kinds of network cabling and network interface cards can be done.
Exercises
4. Sharing Resources
Clock with alarm functionality shall be implemented, It shall be possible to set the time, It shall
be possible to set the alarm time, the alarm shall be enabled when the alarm time is set, the
alarm shall be activated when the alarm is enabled, and when the current time is equal to the
alarm time, an activated alarm must be acknowledged. Acknowledgement of an alarm shall lead
to the alarm being disabled, the alarm is enabled again when a new alarm time is set, an alarm
which is not acknowledged shall be repeated every 10 seconds. The program shall
communicate with a graphical user interface, where the current time shall be displayed, and
where the alarm time shall be displayed when the alarm is enabled. It shall be possible to
terminate the program, using a command which is sent from the graphical user interface.
18
PROGRAM 6 – Transactions and Concurrency -Database operating systems
Exercises
Assume any application(e.g.banking) on your own and do the following exercises.
1. Investigate and implement the ObjectStore's concurrency options.
2. Implement the concurrency conflict that occurs between multiple client applications.
3. Observe and implement the implication of nested transactions.
1. Design a RMI Lottery application. Each time you run the client program -- “java
LotteryClient n”, the server program “LotteryServer” will generate n set of Lottery
numbers. Here n is a positive integer, representing the money you will spend on Lottery
in sterling pounds. Write this program in a proper engineering manner, i.e. there should
be specifications, design (flow chart, FD, or pseudo code), coding, test/debug, and
documentation.
2. Consider a distributed system that consists of two processes which communicate with
each other. Let P be a state predicate on the local state of one process and Q be a state
predicate on the local state of the other process. Assume that neither P nor Q are stable
(i.e. closed).
Design a superimposed computation which detects that there exists an interleaving
of underlying events in this system where at some state P ^Q holds. (A superposed
computation is one that does not a_ect the underlying system; it may \read" but not
\write" the state of the underlying system. Events in a superposed computation may
occur in at the same instant as the underlying events and/or at di_erent instants.) State
any assumptions you make.
[Hint: Use vector clocks.]
19
CS9251 MOBILE COMPUTING
LTPC
3003
UNIT I WIRELESS COMMUNICATION FUNDAMENTALS 9
Introduction – Wireless transmission – Frequencies for radio transmission – Signals – Antennas
– Signal Propagation – Multiplexing – Modulations – Spread spectrum – MAC – SDMA – FDMA
– TDMA – CDMA – Cellular Wireless Networks.
TOTAL = 45
TEXT BOOKS:
REFERENCES:
20
Introduction – The Grid – Past, Present and Future – Applications of grid computing
organizations and their roles.
TOTAL = 45
TEXT BOOKS:
REFERENCES:
1. Fran Berman, Geoffrey Fox, Anthony J.G. Hey, “Grid Computing: Making the Global
Infrastructure a reality “, John Wiley and sons,2003.
2. Ahmar Abbas, “Grid Computing: A Practical Guide to Technology and Applications”,
Charles River media, 2003.
21
Introduction to formal proof – Additional forms of Proof – Inductive Proofs –Finite Automata –
Deterministic Finite Automata – No deterministic Finite Automata – Finite Automata with Epsilon
Transitions.
UNIT V INDECIDABILITY 9
A Language That Is Not Recursive Enumerable – An Undecidable Problem that Is RE –
Undecidable Problems about TM – Post’s Correspondence Problem, The Class P And NP.
TOTAL = 45
TEXT BOOKS:
REFERENCES:
22
UNIT III NEURAL NETWORKS 9
Machine Learning Using Neural Network, Adaptive Networks – Feed forward Networks –
Supervised Learning Neural Networks – Radial Basis Function Networks - Reinforcement
Learning – Unsupervised Learning Neural Networks – Adaptive Resonance architectures –
Advances in Neural networks.
TOTAL = 45
TEXT BOOKS:
1. Jyh-Shing Roger Jang, Chuen-Tsai Sun, Eiji Mizutani, “Neuro-Fuzzy and Soft Computing”,
Prentice-Hall of India, 2003.
2. George J. Klir and Bo Yuan, “Fuzzy Sets and Fuzzy Logic-Theory and Applications”,
Prentice Hall, 1995.
3. James A. Freeman and David M. Skapura, “Neural Networks Algorithms,
Applications, and Programming Techniques”, Pearson Edn., 2003.
REFERENCES:
24
Traditional and Multimedia File Systems-Caching Policy-Batching-Piggy backing-Ethernet-
Gigabit Ethernet-Token Ring-100VG Any LAN-Fiber Distributed Data Interface (FDDI)- ATM
Networks-MAN-WAN.
UNIT IV COMMUNICATION 9
Transport Subsystem-Protocol Support for QOS-Transport of Multimedia-Computer Supported
Cooperative Work-Architecture-Session Management-MBone Applications.
UNIT V SYNCHRONIZATION 9
Synchronization in Multimedia Systems-Presentation-Synchronization Types-Multimedia
Synchronization Methods-Case Studies-MHEG-MODE-ACME.
Total No of periods: 45
TEXT BOOKS:
1. Ralf Steinmetz and Klara Nahrstedt, “Multimedia Systems”, Springer, I Edition 2004.
REFERENCES:
1. Ralf Steinmetz and Klara Nahrstedt , Media Coding and Content Processing, Prentice
hall, 2002.
2. Vaughan T, Multimedia, Tata McGraw Hill, 1999.
3. Mark J.B., Sandra K.M., Multimedia Applications Development using DVI technology,
McGraw Hill, 1992.
4. K. R. Rao, Zoran S. Bojkovic, Dragorad A. Milovacovic, D. A. Milovacovic , Multimedia
Communication Systems: Techniques, Standards, and Networks, Prentice Hall, 1st
Edition, 2002
5. Ze-Nian Li and Mark S. Drew, Fundamentals of Multimedia, Pearson, 2004.
25
UNIT IV DATABASE DESIGN ISSUES 9
ER Model - Normalization - Security - Integrity - Consistency - Database Tuning - Optimization
and Research Issues – Design of Temporal Databases – Spatial Databases.
TOTAL = 45
REFERENCES:
1. Ron Schmelzer et al. “ XML and Web Services”, Pearson Education, 2002.
2. Sandeep Chatterjee and James Webber, “Developing Enterprise Web Services: An
Architect's Guide”, Prentice Hall, 2004.
3. Frank P.Coyle, “XML, Web Services and the Data Revolution”, Pearson Education,
2002.
4. Keith Ballinger, “.NET Web Services Architecture and Implementation”, Pearson
Education, 2003.
5. Henry Bequet and Meeraj Kunnumpurath, “Beginning Java Web Services”,First Edition,
Apress, 2004.
6. Russ Basiura and Mike Batongbacal, “Professional ASP .NET Web Services”, Apress,
2003.
26
UNIT III STATISTICS AND DATA MINING 9
Statistical concepts – Microarrays – Imperfect Data – Randomness – Variability – Approximation
– Interface Noise – Assumptions – Sampling and Distributions – Hypothesis Testing –
Quantifying Randomness – Data Analysis – Tool selection statistics of Alignment – Clustering
and Classification – Data Mining – Methods – Selection and Sampling – Preprocessing and
Cleaning – Transformation and Reduction – Data Mining Methods – Evaluation – Visualization –
Designing new queries – Pattern Recognition and Discovery – Machine Learning – Text Mining
– Tools.
UNIT IV PATTERN MATCHING 9
Pairwise sequence alignment – Local versus global alignment – Multiple sequence alignment –
Computational methods – Dot Matrix analysis – Substitution matrices – Dynamic Programming
– Word methods – Bayesian methods – Multiple sequence alignment – Dynamic Programming
– Progressive strategies – Iterative strategies – Tools – Nucleotide Pattern Matching –
Polypeptide pattern matching – Utilities – Sequence Databases.
UNIT V MODELING AND SIMULATION 9
Drug Discovery – components – process – Perspectives – Numeric considerations – Algorithms
– Hardware – Issues – Protein structure – AbInitio Methods – Heuristic methods – Systems
Biology – Tools – Collaboration and Communications – standards - Issues – Security –
Intellectual property.
Total = 45
REFERENCES
27
Total No. of Periods: 45
TEXT BOOK:
1. Stallings, Cryptography & Network Security - Principles & Practice, Prentice Hall, 3 rd
Edition 2002.
REFERENCES:
1. Bruce, Schneier, Applied Cryptography, 2nd Edition, Toha Wiley & Sons, 1996.
2. Man Young Rhee, “Internet Security”, Wiley, 2003.
3. Pfleeger & Pfleeger, “Security in Computing”, Pearson Education, 3rd Edition, 2003.
28
CS9260 EMBEDDED SYSTEMS
LTPC
3003
REFERENCES
29
CS9261 DIGITAL IMAGING
LTPC
3003
UNIT I FUNDAMENTALS OF IMAGE PROCESSING 9
Introduction – Steps in Image Processing Systems – Image Acquisition – Sampling and
Quantization – Pixel Relationships – Colour Fundamentals and Models, File Formats, Image
operations – Arithmetic, Geometric and Morphological.
.
UNIT II IMAGE ENHANCEMENT 9
Spatial Domain Gray level Transformations Histogram Processing Spatial Filtering –
Smoothing and Sharpening.Frequency Domain : Filtering in Frequency Domain – DFT, FFT,
DCT – Smoothing and Sharpening filters – Homomorphic Filtering.
.
TOTAL = 45
REFERENCES:
1. Rafael C.Gonzalez and Richard E.Woods, “Digital Image Processing” Second Edition,
Pearson Education, 2003.
2. Milan Sonka, Vaclav Hlavac and Roger Boyle, “Image Processing, Analysis and
Machine Vision”, Second Edition, Thomson Learning, 2001
3. Anil K.Jain, “Fundamentals of Digital Image Processing”, Person Educaiton, 2003.
30
CS9262 SOFTWARE QUALITY ASSURANCE
LTPC
3003
UNIT I 9
Introduction to software quality - challenges – objectives – quality factors – components of SQA
– contract review – development and quality plans – SQA components in project life cycle –
SQA defect removal policies – Reviews
UNIT II 9
Basics of software testing – test generation from requirements – finite state models –
combinatorial designs - test selection, minimization and prioritization for regression testing – test
adequacy, assessment and enhancement
UNIT III 9
Testing strategies – white box and black box approach – integration testing – system and
acceptance testing – performance testing – regression testing - internationalization testing – ad-
hoc testing – website testing – usability testing – accessibility testing
Test plan – management – execution and reporting – software test automation –
automated testing tools
UNIT IV 9
Hierarchical models of software quality – software quality metrics –function points -Software
product quality – software maintenance quality – effect of case tools – software quality
infrastructure – procedures – certifications – configuration management – documentation
control.
UNIT V 9
Project progress control – costs – quality management standards – project process standards –
management and its role in SQA – SQA unit
TOTAL = 45
REFERENCES
31
CS9263 AD-HOC NETWORKS
LTPC
3003
UNIT I AD-HOC MAC
Introduction – Issues in Ad-Hoc Wireless Networks. MAC Protocols – Issues, Classifications of
MAC protocols, Multi channel MAC & Power control MAC protocol.
REFERENCES:
1. C.Siva Ram Murthy and B.Smanoj, “ Ad Hoc Wireless Networks – Architectures and
Protocols”, Pearson Education, 2004.
2. Feng Zhao and Leonidas Guibas, “Wireless Sensor Networks”, Morgan Kaufman
Publishers, 2004.
3. C.K.Toh, “Ad Hoc Mobile Wireless Networks”, Pearson Education, 2002.
4. Thomas Krag and Sebastin Buettrich, “Wireless Mesh Networking”, O’Reilly
Publishers, 2007.
32
CS9264 DATA WAREHOUSING AND DATA MINING
LTPC
3003
UNIT I 9
Data Warehousing and Business Analysis: - Data warehousing Components –Building a Data
warehouse – Mapping the Data Warehouse to a Multiprocessor Architecture – DBMS Schemas
for Decision Support – Data Extraction, Cleanup, and Transformation Tools –Metadata –
reporting – Query tools and Applications – Online Analytical Processing (OLAP) – OLAP and
Multidimensional Data Analysis.
UNIT II 9
Data Mining: - Data Mining Functionalities – Data Preprocessing – Data Cleaning – Data
Integration and Transformation – Data Reduction – Data Discretization and Concept Hierarchy
Generation.
Association Rule Mining: - Efficient and Scalable Frequent Item set Mining Methods – Mining
Various Kinds of Association Rules – Association Mining to Correlation Analysis – Constraint-
Based Association Mining.
UNIT III 9
Classification and Prediction: - Issues Regarding Classification and Prediction – Classification
by Decision Tree Introduction – Bayesian Classification – Rule Based Classification –
Classification by Back propagation – Support Vector Machines – Associative Classification –
Lazy Learners – Other Classification Methods – Prediction – Accuracy and Error Measures –
Evaluating the Accuracy of a Classifier or Predictor – Ensemble Methods – Model Section.
UNIT IV 9
Cluster Analysis: - Types of Data in Cluster Analysis – A Categorization of Major Clustering
Methods – Partitioning Methods – Hierarchical methods – Density-Based Methods – Grid-Based
Methods – Model-Based Clustering Methods – Clustering High-Dimensional Data – Constraint-
Based Cluster Analysis – Outlier Analysis.
UNIT V 9
Mining Object, Spatial, Multimedia, Text and Web Data:
Multidimensional Analysis and Descriptive Mining of Complex Data Objects – Spatial Data
Mining – Multimedia Data Mining – Text Mining – Mining the World Wide Web.
Total = 45
REFERENCES
1. Jiawei Han and Micheline Kamber “Data Mining Concepts and Techniques” Second
Edition,
2. Elsevier, Reprinted 2008.
3. Alex Berson and Stephen J. Smith “Data Warehousing, Data Mining & OLAP”, Tata
McGraw – Hill Edition, Tenth Reprint 2007.
4. K.P. Soman, Shyam Diwakar and V. Ajay “Insight into Data mining Theory and Practice”,
Easter Economy Edition, Prentice Hall of India, 2006.
5. G. K. Gupta “Introduction to Data Mining with Case Studies”, Easter Economy Edition,
Prentice Hall of India, 2006.
6. Pang-Ning Tan, Michael Steinbach and Vipin Kumar “Introduction to Data Mining”,
Pearson Education, 2007.
33
CS9265 PERFORMANCE EVALUATION OF COMPUTER SYSTEMS AND NETWORKS
LTPC
3003
UNIT I 9
Performance Characteristics – Requirement Analysis: Concepts –User, Device, Network
Requirements – Process –Developing RMA ,Delay, Capacity Requirements – Flow Analysis –
Identifying and Developing Flows –Flow Models –Flow Prioritization –Specification.
UNIT II 9
Random variables - Stochastic process –Link Delay components – Queuing Models – Little’s
Theorem – Birth & Death process – Queuing Disciplines.
UNIT III 9
Markovian FIFO Queuing Systems – M/M/1 – M/M/a – M/M/∞ - M/G/1 – M/M/m/m and other
Markov-Non-Markovian and self-similar models – Network of Queues –Burke’s Theorem –
Jackson’s Theorem.
UNIT IV 9
Multi-User Uplinks/Downlinks - Capacity Regions - Opportunistic Scheduling for Stability and
Max Throughput - Multi-Hop Routing - Mobile Networks - Throughput Optimality and
Backpressure
UNIT V 9
Performance of Optimal Lyapunov Networking - Energy Optimality- Energy-Delay Tradeoffs -
Virtual Cost Queues - Average Power Constraints - Flow Control with Infinite Demand - Auxiliary
Variables - Flow Control with Finite Demand - General Utility Optimization.
TEXT BOOKS
3. Introduction to Probability Models by Sheldon Ross (8th edition) Academic Press, New
York ,2003
REFERENCES
34
CS9266 AGENT BASED INTELLIGENT SYSTEMS
LTPC
3003
UNIT I INTRODUCTION 9
Definitions - Foundations - History - Intelligent Agents-Problem Solving-Searching - Heuristics
-Constraint Satisfaction Problems - Game playing.
Total No of periods: 45
TEXT BOOK:
1. Stuart Russell and Peter Norvig, “Artificial Intelligence - A Modern Approach”, 2 nd Edition,
Prentice Hall, 2002
REFERENCES:
1. Michael Wooldridge, “An Introduction to Multi Agent System”, John Wiley, 2002.
2. Patrick Henry Winston, Artificial Intelligence, III Edition, AW, 1999.
3. Nils.J.Nilsson, Principles of Artificial Intelligence, Narosa Publishing House, 1992.
35
CS9267 VISUALIZATION TECHNIQUES
LTPC
3003
UNIT I VISUALIZATION 9
Introduction – Issues – Data Representation – Data Presentation - Interaction
TOTAL = 45
TEXT BOOKS:
REFERENCES:
36
CS9268 ADVANCED DATABASES
LTPC
3003
UNIT I PARALLEL AND DISTRIBUTED DATABASES
Database System Architectures: Centralized and Client-Server Architectures – Server System
Architectures – Parallel Systems- Distributed Systems – Parallel Databases: I/O Parallelism –
Inter and Intra Query Parallelism – Inter and Intra operation Parallelism – Distributed Database
Concepts - Distributed Data Storage – Distributed Transactions – Commit Protocols –
Concurrency Control – Distributed Query Processing – Three Tier Client Server Architecture-
Case Studies.
TOTAL = 45
REFERENCES
1. R. Elmasri, S.B. Navathe, “Fundamentals of Database Systems”, Fifth Edition, Pearson
Education/Addison Wesley, 2007.
2. Thomas Cannolly and Carolyn Begg, “ Database Systems, A Practical Approach to
Design, Implementation and Management”, Third Edition, Pearson Education, 2007.
3. Henry F Korth, Abraham Silberschatz, S. Sudharshan, “Database System Concepts”,
Fifth Edition, McGraw Hill, 2006.
37
4. C.J.Date, A.Kannan and S.Swamynathan,”An Introduction to Database Systems”, Eighth
Edition, Pearson Education, 2006.
5. V.S.Subramanian, “Principles of Multimedia Database Systems”, Harcourt India Pvt Ltd.,
2001.
6. Vijay Kumar, “ Mobile Database Systems”, John Wiley & Sons, 2006.
TOTAL=45
REFERENCES:
38
CS9270 COMPONENT BASED TECHNOLOGY
LTPC
3003
UNIT I INTRODUCTION 9
Software Components – objects – fundamental properties of Component technology – modules
– interfaces – callbacks – directory services – component architecture – components and
middleware.
TOTAL = 45
TEXT BOOKS:
REFERENCES:
39