NIT Jamshedpur CSE Syllabus

NIT Jamshedpur CSE Syllabus PART III

 

SOFTWARE METRICS AND SOFTWARE PROJECT MANAGEMENT (3-0-0)3
The Basics of Measurement – A goal-based framework for software measurement -Empirical investigation –
Measuring internal product attributes – measuring external product attributes – Making process predictions.
Software Project Management – General Management – Introduction to Project Management – Project Planning
and Evaluation – Project Monitoring and Control – Case Studies.
Reading:
1. Norman E. Fenton, Shari Lawrence Pfleeger, Software Metrics – A Rigorous and Practical Approach, 2nd
Edition, PWS Pub, 1996.
2. Walker Royce, Software Project Management, Addison Wesley, 1998.
3. Pankaj Jalote, Software Project Management in Practice, Pearson Education Inc. Delhi, 2002.
CS372 PROGRAMMING LANGUAGE CONCEPTS (3-0-0)3
Abstraction – Computational paradigms – Imperative languages -Symbol table – Scope – Side effects, aliasing
– Data Types – Type constructs – Parameter Passing Mechanisms – Procedure environments – Abstract Data
Types – Object Oriented languages – Classes and Methods – Design issues – implementation – Functional
Programming – Delayed Evaluation – Recursive functions – Lambda Calculus.
Reading:
1. Kenneth C. Louden, Programming Language Principles and Practices, 2nd Edition, Thomson 2003.
2. Carlo Ghezzi, Mehdi Jazayeri, Programming Language Concepts, 3rd Edition, John Wiley & Sons, 1997.
CS373 UNIX TOOLS AND PROGRAMMING (3-0-0)3
Shell programming – Unix commands – Text processing – sed and awk utilities – grep utility – Introduction to
Lex, Yacc utilities – Introduction to Perl programming.
Reading:
1. Sumitabha Das, Unix Concepts and Applications, 4th Edition, TMH, 2006.
2. John R Levine, Tony Mason, Doug Brown, Lex and Yacc, 2nd Edition, 2009.
CS381 ADVANCED DATA STRUCTURES (3-0-0)3
Dictionaries – Review of Hashing – Closed Hashing, Analysis of Closed Hashing, Hash Table Restructuring –
Skip Lists and Analysis – Height Balanced Trees, Red Black Trees, 2-3 Trees, B-Trees, Splay Trees – Augmenting
Data Structures (Chap. 14, Book 2) – van Emde Boas Trees – Strings and Pattern Matching – Suffix Trees –
Tries – Text Compression, Text Similarity Testing – Range Trees, Priority Search Trees, Quadtrees and k-D
trees.
Reading:
1. Mark Allen Weiss, Data Structures and Algorithm Analysis in C++, 2nd Edition, Pearson, 2004.
2. M T Goodrich, Roberto Tamassia, Algorithm Design, John Wiley, 2002.
CS382 ADVANCED DATABASES (3-0-0)3
Distributed Databases: Query processing, semi-joins, query optimization, Concurrency control Heterogeneity
issues. Advanced Transaction Models: Save-points, Sagas, Nested Transactions, Multi Level Transactions.
Recovery: Multi-level recovery, Shared disk systems, Distributed systems 2PC, 3PC, replication and hot
spares. Recursive query processing: Top-down and bottom-up evaluation, Magic optimization. Parallel
Databases: Parallel Architectures, performance measures, shared nothing/shared disk/shared memory based
architectures, Data partitioning, Intra-operator parallelism, Pipelining, Scheduling, Load balancing, query
optimization.
Reading:
1. M. Stonebraker, Readings in Database Systems, 2nd Edition, Morgan Kauffman, 1993.
2. M T Ozsu, Patrick Valduriez, Principles of Distributed Database Systems, Prentice Hall, 1999
3. S. Ceri and G. Pelaggati, Distributed Database System Principles and Systems, MGH, 1985.
B.Tech. Computer Science and Engineering – Scheme and Syllabi
16
CS383 ADVANCED DATA MINING TECHNIQUES (3-0-0)3
Sequential Pattern Mining concepts, primitives – Scalable Methods in Sequential Pattern Mining – Mining
Time Series Data – Periodicity Analysis for Time Related Sequence Data – Mining Data Streams – Class
Imbalance Problem – Graph Mining – Web Mining – Privacy Preserving Data Mining – Social Networks;
Reading:
1. J Han and M Kamber, Data Mining Concepts and Techniques, 2nd Edition, Elsevier, 2011
2. Pang Ning Tan, M Steinbach, Vipin Kumar, Introduction to Data Mining, Addision Wesley, 2006;
3. G Dong and J Pei, Sequence Data Mining, Springer, 2007.
CS401 DISTRIBUTED COMPUTING (4-0-0)4
A model of distributed computations, Logical and physical times and clock synchronization, Global state and
snapshot recording algorithms, Message ordering and group communication, Termination detection algorithms,
Distributed mutual exclusion algorithms, Deadlock detection in distributed systems, Distribued shared memory,
Check pointing and rollback recovery, Consensus and agrrement algorithms, Failure detectors.
Reading:
1. Ajay D. Kshemakalyani, Mukesh Singhal, Distributed Computing, Cambridge University Press, 2008.
2. Andrew S. Tanenbaum, Maarten Van Steen, Distributed Systems – Principles and Paradigms, PHI, 2004.
CS402 CRYPTOGRAPHY AND NETWORK SECURITY (4-0-0)4
Public key Cryptographic Algorithms for larger key sizes, Public key Cryptographic Algorithms using GMP
Library for larger key sizes. Network Layout Discovery, Node Discovery, tcpdump, nmap, traceroute. Packet
Sniffing, Intrusion Detection System – Snort. Security Vulnerabilities in SSL/TLS – OpenSSL, stunnel, Omen,
Demonstration of SSL attacks, SQL Injection Demonstration. Block Ciphers and Encryption of “large” files
using different Modes of Operation. Usage of Steganographic Tools, Identifying the System vulnerabilities
using Vulnerability Detection Tools and National Vulnerability Database.
Reading:
1. Eric Cole, Dr. Ronald Kurtz and James W. Conley, Network Security Bible, Wiley Publishers, 2009.
2. Jason Albanese and Wes Sonnenreich, Network Security Illustrated, MGH Publishers, 2003.
3. Eric Maiwald, Network Security: A Beginner’s Guide, 3rd Edition, MGH/Osborne, 2012.
ME435 INDUSTRIAL MANAGEMENT (3-0-0)3
Management theory and practice: functions of management; Hawthorne Experiments, leadership styles and
motivational theories. Marketing management: Marketing management process, product life cycle and
marketing strategies. Operations management: Productivity and work study, operations strategy, statistical
process control, Taguchi’s parametric design, Quality function deployment, Introduction to TQM and ISO
9000. inventory costs, ABC classification, EOQ, P and Q inventory systems. Project management: project
planning and feasibility analysis, project scheduling methods.
Reading:
1. Koontz., H. et al., Essentials of Management, 7th Edition, MGH, New York, 2007.
2. Philip Kotler., Marketing Management, 13th Edition, Prentice Hall of India/Pearson, New Delhi, 2009.
3. Chase, Shankar, Jacobs and Aquilano, Operations and Supply Management, 12th Edition, Tata McGraw
Hill, New Delhi, 2010.
CS411 BUSINESS INTELLIGENCE (3-0-0)3
Overview of managerial, strategic and technical issues associated with Business Intelligence and Data
Warehouse – design, implementation and utilization. Data warehouse architecture, OLAP, data cubes, Reporting
tools, Balance Scorecard, dash board design, and implementation, case studies.
Reading:
1. Efraim Turban, Ramesh Sharda, Jay Aronson, David King, Decision Support and Business Intelligence
Systems, 9th Edition, Pearson Education, 2009.
2. David Loshin, Business Intelligence – The Savy Manager’s Guide Getting Onboard with Emerging IT,
Morgan Kaufmann Publishers, 2009.
B.Tech. Computer Science and Engineering – Scheme and Syllabi
17
CS412 GAME THEORY (3-0-0) 3
Basic Solution concepts and Computational Issues – The complexity of Nash Equilibria – Equilibrium
Computation for Two-Player Games in Strategic and Extensive Form – Learning, Regret Minimization, and
Equilibria – Combinatorial Algorithms for Market Equilibria – Computation of Market Equilibria by Convex
Programming – Graphical Games;
Reading:
1. Noam Nisan, Tim Roughgarden, Eva Tardos, Vijay V. Vazirani, Algorithmic Game Theory, Cambridge
University Press, September 2007.
2. Ronald Cohn Jesse Russell, Algorithmic Game Theory, VSD Publishers, 2012.
CS413 PATTERN RECOGNITION (3-0-0)3
Classifiers Based on Bayes Decision Theory – Linear classifiers – Non linear classifiers – Feature Selection –
Dimensionality Reduction and Feature Generation – Template Matching – Markov Chain and Hidden Markov
Model – System Evaluation – Unsupervised Learning and Clustering;
Reading:
1. S.Theodoridis and K. Koutroumbas, Pattern Recognition, 4th Edition, Academic Press, 2009.
2. C.Bishop, Pattern Recognition and Machine Learning, Springer, 2006.
CS414 SEMANTIC WEB (3-0-0)3
The Semantic Web Vision, overview of techniques and standards, Semantic Web Architecture, Ontology
languages- XML, RDF (Resource Description Framework), RDFS (RDF Schema) and OWL (Web Ontology
Language), Ontology Development using Protege editor, Ontology Querying, Ontology Reasoning and
Description Logic (DL), Semantic Web Application Areas, Ontology programming with Jena API, Ontology
Engineering.
Reading:
1. Grigoris Antoniou and Frank van Harmelen, A Semantic Web Primer, 1st Edition, MIT Press, 2004.
2. John Hebeler, Matthew Fisher, Ryan Blace and Andrew Perez-Lopez, Semantic Web Programming, 1st
Edition, Wiley, 2009.
CS421 SECURE SOFTWARE ENGINEERING (3-0-0)3
Software security Definition, Threats and Vulnerabilities, Risk Management, Security Requirements, Secure
Design Principles and Patterns, Secure Programming: Data validation, Secure Programming: Using
Cryptography Securely, Code Reviews and Static Analysis, Security Testing, Creating a Software Security
Programs.
Reading:
1. Julia H Allen, Sean J Barnum, Robert J Ellison, Gary McGraw, Nancy R Mead, Software Security
Engineering: A Guide for Project Managers, Addison Wesley, 2008
2. Ross J Anderson, Security Engineering: A Guide to Building Dependable Distributed Systems, 2nd Edition,
Wiley, 2008.
3. Howard, M. and LeBlanc, D., Writing Secure Code, 2nd Edition, Microsoft Press, 2003.
CS422 DISTRIBUTED OBJECT TECHNOLOGIES (3-0-0)3
Introduction to client/server computing, CORBA with Java, DCOM, Introduction to C# and .NET platform,
Java Bean component model, EJB and CORBA.
Reading:
1. Robert Orfali and Dan Harkey, Client/Server Programming with Java and CORBA, 2nd Edition, John
Wiley & Sons, 1998.
2. Robert J. Oberg, Introduction to C# Using .NET, Prentice Hall, 2002
3. G. Brose, A Vogel, K Duddy, Java Programming with CORBA, 3rd Edition, Wiley, 1998.
B.Tech. Computer Science and Engineering – Scheme and Syllabi
18
CS423 DESIGN PATTERNS (3-0-0) 3
Introduction. – A Case Study: Designing a Document Editor – Design Pattern Catalog – Creational Patterns –
Structural Pattern – Behavioral Patterns. What to Expect from Design Patterns, a Brief History, and the Pattern
Community.
Reading:
1. Erich Gamma, Design Patterns, Addison-Wesley, 1994.
2. Frank Buschmann, RegineMeunier, Hans Rohnert, Peter Sommerlad, Michael Stal, Pattern-Oriented
Software Architecture: A System of Pattern, John Wiley & Sons; 1996.
CS424 ADVANCED COMPILER DESIGN (3-0-0) 3
Loop optimizations – Register allocation – Local methods, Graph colouring, Code scheduling Software
pipelining, Inter procedural dataflow analysis, Optimizing for memory Hierarchies.
High performance systems – Scalar, vector, multiprocessor, SIMD, Message Passing Architectures. Sequential
and parallel loops. Data dependence Use-Def chains. Dependence system, GCD test, Banerjee’s Inequality,
Exact algorithm, Exact algorithm, Vectorization, Concurren-tization, Array region analysis, Loop restructuring
transformations.
Reading:
1. Steven S. Muchnick, Advanced Compiler Design and Implementation, Morgan Kaufmann, Elsevier Science,
2003.
2. Michael Wolfe, High Performance Compilers for Parallel Computing, Addison Wesley, 1995.
CS451 WIRELESS AND MOBILE COMPUTING (3-0-0)3
Application Design Elements – Development Environments – Introduction to Objective-C – The MVC Model –
The Delegate Pattern – The HTML5, iPhone, Android, and Blackberry SDKs- iOS – Windows Mobile – Wireless
Communication Technologies -Cellular networks – Wireless (802.11) – TCP/IP in the mobile setting- The
Unified Look and Feel Paradigm – The iPhone and Blackberry Human Interface Guidelines – Common User
Interface Guidelines – Distributed Computing – Consistency and Reliability – Security Issues – Adhoc Networks
– Sensor Networks – The Future of Mobile Computing – Upcoming Technologies – Convergence of Media and
Communication Devices – Overview of Mobile Technologies – Anatomy of a Mobile Device.
Reading:
1. T. Mikkonen, Programming Mobile Devices: An Introduction for Practitioners, Wiley, 2007.
2. S. Hashimi, S. Komatineni, D. MacLean, Pro Android 2, Apress 2010.
3. D. Mark and J. LaMarche, Beginning iPhone 3 Development: Exploring the iPhone SDK, Apress, 2009.
4. Rizk, Beginning BlackBerry Development, Apress, 2009.
CS452 MACHINE LEARNING AND SOFT COMPUTING (3-0-0)3
The concept learning task. General-to-specific ordering of hypotheses. Version spaces. Inductive bias – Decision
Tree Learning – Artificial Neural Networks- Perceptrons, Multilayer networks and backpropagation – Evaluating
Hypotheses – Bayesian Learning – Computational Learning Theory – Instance-Based Learning – Radial basis
function networks – Case-based learning – Genetic Algorithms – Reinforcement Learning.
Reading:
1. Tom Mitchell, Machine Learning, MGH International, 1997.
2. Ethem Alpaydin, Introduction to Machine Learning, Eastern Economy Edition, Prentice Hall of India,
2005.
CS461 MODEL-DRIVEN FRAMEWORKS (3-0-0)3
Traditional software engineering approach – drawbacks – Software processes – modular-based software design
– Model-driven Architecture (MDA) – system modeling- MOF’s metamodelling 4-layer hierarchy – domain
specific modeling languages, UML profiles platforms – transformation – automated GUI generation – software
B.Tech. Computer Science and Engineering – Scheme and Syllabi
19
artifacts using UML standard modelling language – MDA Practice – Usage of QVT, Kermeta, etc. – MDA
Transformation Languages – model editors- model validators – model metrics – modeling framework –
middleware to support transformations – MDA applications.
Reading:
1. Thomas Stahl, Markus Voelter, Model-Driven Software Development: Technology, Engineering,
Management, Wiley, 2006.
2. Anne Kleppe, Jos Warmer, and Wim Bast, MDA Explained – The Model Driven Architecture: Practice and
Promise, Pearson Education, Boston, USA, 2003.

Leave a Comment