{"id":4993,"date":"2013-01-30T18:49:26","date_gmt":"2013-01-30T13:19:26","guid":{"rendered":"http:\/\/www.kopykitab.com\/blog\/?p=4993"},"modified":"2021-10-07T10:57:17","modified_gmt":"2021-10-07T05:27:17","slug":"pune-technical-university-it-syllabus","status":"publish","type":"post","link":"https:\/\/www.kopykitab.com\/blog\/pune-technical-university-it-syllabus\/","title":{"rendered":"Pune Technical University IT Syllabus"},"content":{"rendered":"<div class=\"Section1\"><strong>PUNE TECHNICAL UNIVERSITY<\/strong><\/div>\n<div class=\"Section1\"><strong>B.E. Information Technology <\/strong><strong>2008 <\/strong><\/div>\n<div class=\"Section1\"><strong>Course Proposed in 2011-12 (Faculty of Engineering)<\/strong><\/div>\n<h1 style=\"text-align: center;\"><strong>\u00a0<\/strong><\/h1>\n<div class=\"Section2\">Structure of B.E. (Information Technology) 2008 Course Proposed in 2011-12<\/p>\n<div>\n<table style=\"width: 698px;\" cellspacing=\"0\" cellpadding=\"0\" align=\"center\">\n<tbody>\n<tr>\n<td align=\"left\" valign=\"top\">Part &#8211; I<\/p>\n<div align=\"center\">\n<table border=\"0\" cellspacing=\"0\" cellpadding=\"0\">\n<tbody>\n<tr>\n<td rowspan=\"3\" valign=\"top\" width=\"63\">Sub<br \/>\nNo.<\/td>\n<td rowspan=\"3\" valign=\"top\" width=\"209\">Subject<\/td>\n<td valign=\"top\" width=\"60\">Teachin<\/td>\n<td valign=\"top\" width=\"66\">g Scheme<\/td>\n<td colspan=\"4\" valign=\"top\" width=\"240\">Examination Scheme<\/td>\n<td rowspan=\"3\" valign=\"top\" width=\"61\">Marks<br \/>\nTotal<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\" width=\"60\">Lect<\/td>\n<td valign=\"top\" width=\"66\">Pract<\/td>\n<td rowspan=\"2\" valign=\"top\" width=\"66\">Theory<\/td>\n<td rowspan=\"2\" valign=\"top\" width=\"60\">Term<br \/>\nWork<\/td>\n<td rowspan=\"2\" valign=\"top\" width=\"60\">Pract.<\/td>\n<td rowspan=\"2\" valign=\"top\" width=\"54\">Oral<\/td>\n<\/tr>\n<tr>\n<td colspan=\"2\" valign=\"top\" width=\"126\">(Hrs. \/ Week)<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\" width=\"63\">414441<\/td>\n<td valign=\"top\" width=\"209\">Information Assurance and Security<\/td>\n<td valign=\"top\" width=\"60\">4<\/td>\n<td valign=\"top\" width=\"66\">2<\/td>\n<td valign=\"top\" width=\"66\">100<\/td>\n<td valign=\"top\" width=\"60\">50<\/td>\n<td valign=\"top\" width=\"60\">&#8212;<\/td>\n<td valign=\"top\" width=\"54\">50<\/td>\n<td valign=\"top\" width=\"61\">200<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\" width=\"63\">410443<\/td>\n<td valign=\"top\" width=\"209\">Object Oriented Modeling and Design<\/td>\n<td valign=\"top\" width=\"60\">4<\/td>\n<td valign=\"top\" width=\"66\">&#8212;<\/td>\n<td valign=\"top\" width=\"66\">100<\/td>\n<td valign=\"top\" width=\"60\">&#8212;<\/td>\n<td valign=\"top\" width=\"60\">&#8212;<\/td>\n<td valign=\"top\" width=\"54\">&#8212;<\/td>\n<td valign=\"top\" width=\"61\">100<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\" width=\"63\">414442<\/td>\n<td valign=\"top\" width=\"209\">Software Testing and Quality Assurance<\/td>\n<td valign=\"top\" width=\"60\">4<\/td>\n<td valign=\"top\" width=\"66\">&#8212;<\/td>\n<td valign=\"top\" width=\"66\">100<\/td>\n<td valign=\"top\" width=\"60\">&#8212;<\/td>\n<td valign=\"top\" width=\"60\">&#8212;<\/td>\n<td valign=\"top\" width=\"54\">&#8212;<\/td>\n<td valign=\"top\" width=\"61\">100<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\" width=\"63\">414443<\/td>\n<td valign=\"top\" width=\"209\">Elective &#8211; I<\/td>\n<td valign=\"top\" width=\"60\">4<\/td>\n<td valign=\"top\" width=\"66\">&#8212;<\/td>\n<td valign=\"top\" width=\"66\">100<\/td>\n<td valign=\"top\" width=\"60\">&#8212;<\/td>\n<td valign=\"top\" width=\"60\">&#8212;<\/td>\n<td valign=\"top\" width=\"54\">&#8212;<\/td>\n<td valign=\"top\" width=\"61\">100<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\" width=\"63\">414444<\/td>\n<td valign=\"top\" width=\"209\">Elective &#8211; II<\/td>\n<td valign=\"top\" width=\"60\">4<\/td>\n<td valign=\"top\" width=\"66\">&#8212;<\/td>\n<td valign=\"top\" width=\"66\">100<\/td>\n<td valign=\"top\" width=\"60\">&#8212;<\/td>\n<td valign=\"top\" width=\"60\">&#8212;<\/td>\n<td valign=\"top\" width=\"54\">&#8212;<\/td>\n<td valign=\"top\" width=\"61\">100<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\" width=\"63\">414445<\/td>\n<td valign=\"top\" width=\"209\">Computer Lab Practices I<\/td>\n<td valign=\"top\" width=\"60\">&#8212;<\/td>\n<td valign=\"top\" width=\"66\">4<\/td>\n<td valign=\"top\" width=\"66\">&#8212;<\/td>\n<td valign=\"top\" width=\"60\">50<\/td>\n<td valign=\"top\" width=\"60\">50<\/td>\n<td valign=\"top\" width=\"54\">&#8212;<\/td>\n<td valign=\"top\" width=\"61\">100<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\" width=\"63\">414446<\/td>\n<td valign=\"top\" width=\"209\">Project Work<\/td>\n<td valign=\"top\" width=\"60\">&#8212;<\/td>\n<td valign=\"top\" width=\"66\">2<\/td>\n<td valign=\"top\" width=\"66\">&#8212;<\/td>\n<td valign=\"top\" width=\"60\">50<\/td>\n<td valign=\"top\" width=\"60\">&#8212;<\/td>\n<td valign=\"top\" width=\"54\">&#8212;<\/td>\n<td valign=\"top\" width=\"61\">50<\/td>\n<\/tr>\n<tr>\n<td colspan=\"2\" valign=\"top\" width=\"271\">Total<\/td>\n<td valign=\"top\" width=\"60\">20<\/td>\n<td valign=\"top\" width=\"66\">08<\/td>\n<td valign=\"top\" width=\"66\">500<\/td>\n<td valign=\"top\" width=\"60\">150<\/td>\n<td valign=\"top\" width=\"60\">50<\/td>\n<td valign=\"top\" width=\"54\">50<\/td>\n<td valign=\"top\" width=\"61\">750<\/td>\n<\/tr>\n<tr>\n<td colspan=\"2\" valign=\"top\" width=\"271\">Total of Part I<\/td>\n<td colspan=\"2\" valign=\"top\" width=\"126\">28<\/td>\n<td colspan=\"5\" valign=\"top\" width=\"301\">750 Marks<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/div>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/div>\n<div>\n<table style=\"width: 698px;\" cellspacing=\"0\" cellpadding=\"0\" align=\"center\">\n<tbody>\n<tr>\n<td align=\"left\" valign=\"top\">B.E. (Information Technology Course) Part &#8211; II<\/p>\n<div align=\"center\">\n<table border=\"0\" cellspacing=\"0\" cellpadding=\"0\">\n<tbody>\n<tr>\n<td rowspan=\"3\" valign=\"top\" width=\"63\">Sub<br \/>\nNo.<\/td>\n<td rowspan=\"3\" valign=\"top\" width=\"209\">Subject<\/td>\n<td valign=\"top\" width=\"60\">Teachin<\/td>\n<td valign=\"top\" width=\"66\">g Scheme<\/td>\n<td colspan=\"4\" valign=\"top\" width=\"240\">Examination Scheme<\/td>\n<td rowspan=\"3\" valign=\"top\" width=\"61\">Marks<br \/>\nTotal<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\" width=\"60\">Lect<\/td>\n<td valign=\"top\" width=\"66\">Pract<\/td>\n<td rowspan=\"2\" valign=\"top\" width=\"66\">Theory<\/td>\n<td rowspan=\"2\" valign=\"top\" width=\"60\">Term<br \/>\nWork<\/td>\n<td rowspan=\"2\" valign=\"top\" width=\"60\">Pract.<\/td>\n<td rowspan=\"2\" valign=\"top\" width=\"54\">Oral<\/td>\n<\/tr>\n<tr>\n<td colspan=\"2\" valign=\"top\" width=\"126\">(Hrs. \/ Week)<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\" width=\"63\">414448<\/td>\n<td valign=\"top\" width=\"209\">Distributed System<\/td>\n<td valign=\"top\" width=\"60\">4<\/td>\n<td valign=\"top\" width=\"66\">&#8212;<\/td>\n<td valign=\"top\" width=\"66\">100<\/td>\n<td valign=\"top\" width=\"60\">&#8212;<\/td>\n<td valign=\"top\" width=\"60\">&#8212;<\/td>\n<td valign=\"top\" width=\"54\">&#8212;<\/td>\n<td valign=\"top\" width=\"61\">100<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\" width=\"63\">414449<\/td>\n<td valign=\"top\" width=\"209\">Information Retrieval<\/td>\n<td valign=\"top\" width=\"60\">4<\/td>\n<td valign=\"top\" width=\"66\">&#8212;<\/td>\n<td valign=\"top\" width=\"66\">100<\/td>\n<td valign=\"top\" width=\"60\">&#8212;<\/td>\n<td valign=\"top\" width=\"60\">&#8212;<\/td>\n<td valign=\"top\" width=\"54\">&#8212;<\/td>\n<td valign=\"top\" width=\"61\">100<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\" width=\"63\">414450<\/td>\n<td valign=\"top\" width=\"209\">Elective &#8211; III<\/td>\n<td valign=\"top\" width=\"60\">4<\/td>\n<td valign=\"top\" width=\"66\">2<\/td>\n<td valign=\"top\" width=\"66\">100<\/td>\n<td valign=\"top\" width=\"60\">50<\/td>\n<td valign=\"top\" width=\"60\">&#8212;<\/td>\n<td valign=\"top\" width=\"54\">50<\/td>\n<td valign=\"top\" width=\"61\">200<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\" width=\"63\">414451<\/td>\n<td valign=\"top\" width=\"209\">Elective &#8211; IV<\/td>\n<td valign=\"top\" width=\"60\">4<\/td>\n<td valign=\"top\" width=\"66\">&#8212;<\/td>\n<td valign=\"top\" width=\"66\">100<\/td>\n<td valign=\"top\" width=\"60\">&#8212;<\/td>\n<td valign=\"top\" width=\"60\">&#8212;<\/td>\n<td valign=\"top\" width=\"54\">&#8212;<\/td>\n<td valign=\"top\" width=\"61\">100<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\" width=\"63\">414452<\/td>\n<td valign=\"top\" width=\"209\">Computer Lab Practices II<\/td>\n<td valign=\"top\" width=\"60\">&#8212;<\/td>\n<td valign=\"top\" width=\"66\">4<\/td>\n<td valign=\"top\" width=\"66\">&#8212;<\/td>\n<td valign=\"top\" width=\"60\">50<\/td>\n<td valign=\"top\" width=\"60\">50<\/td>\n<td valign=\"top\" width=\"54\">&#8212;<\/td>\n<td valign=\"top\" width=\"61\">100<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\" width=\"63\">414447<\/td>\n<td valign=\"top\" width=\"209\">Project Work<\/td>\n<td valign=\"top\" width=\"60\">&#8212;<\/td>\n<td valign=\"top\" width=\"66\">6<\/td>\n<td valign=\"top\" width=\"66\">&#8212;<\/td>\n<td valign=\"top\" width=\"60\">100<\/td>\n<td valign=\"top\" width=\"60\">&#8212;<\/td>\n<td valign=\"top\" width=\"54\">50<\/td>\n<td valign=\"top\" width=\"61\">150<\/td>\n<\/tr>\n<tr>\n<td colspan=\"2\" valign=\"top\" width=\"271\">Total<\/td>\n<td valign=\"top\" width=\"60\">16<\/td>\n<td valign=\"top\" width=\"66\">12<\/td>\n<td valign=\"top\" width=\"66\">400<\/td>\n<td valign=\"top\" width=\"60\">200<\/td>\n<td valign=\"top\" width=\"60\">50<\/td>\n<td valign=\"top\" width=\"54\">100<\/td>\n<td valign=\"top\" width=\"61\">750<\/td>\n<\/tr>\n<tr>\n<td colspan=\"2\" valign=\"top\" width=\"271\">Total of Part II<\/td>\n<td colspan=\"2\" valign=\"top\" width=\"126\">28<\/td>\n<td colspan=\"5\" valign=\"top\" width=\"301\">750 Marks<\/td>\n<\/tr>\n<tr>\n<td colspan=\"2\" valign=\"top\" width=\"271\">Total of Part &#8211; I &amp; Part &#8211; II<\/td>\n<td colspan=\"7\" valign=\"top\" width=\"427\">1500 Marks<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/div>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/div>\n<\/div>\n<div class=\"Section3\">Elective &#8211; I<\/p>\n<ol>\n<li>Advance Database Management\n<ol>\n<li>Artificial Intelligence<\/li>\n<li>Compiler Deign<\/li>\n<li>Advanced Operating Systems<\/li>\n<\/ol>\n<\/li>\n<\/ol>\n<p>Elective &#8211; II<\/p>\n<ol>\n<li>Embedded System<\/li>\n<li>Mobile Computing<\/li>\n<li>Multimedia Systems<\/li>\n<\/ol>\n<p>Elective &#8211; III1. Real Time System<\/p>\n<ol>\n<li>Software Architecture<\/li>\n<li>Advanced Graphics<\/li>\n<li>Advance Computer Networks<\/li>\n<\/ol>\n<p>Elective &#8211; IV1. Bio Informatics<\/p>\n<ol>\n<li>Neural Network and Expert System<\/li>\n<li>Geo Informatics Systems<\/li>\n<li>Open Elective<\/li>\n<\/ol>\n<\/div>\n<div class=\"Section4\">Semester &#8211; I Information Technology 2008 Course<\/div>\n<p><strong>\u00a0<\/strong><\/p>\n<div class=\"Section5\">414441: Information Assurance and Security<\/div>\n<p><strong>\u00a0<\/strong><\/p>\n<div class=\"Section6\"><\/div>\n<div class=\"Section7\">Teaching Scheme: Lectures: 4 Hours\/WeekPrerequisite: Data Communication and Computer Networks Objectives: Understand the essentials of information security.Learn the algorithms for implementing securityUnit I Security Fundamentals\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 (8 Hrs.)Introduction, Terminology, Attacks, Security Goals : Authentication, Authorization, Cipher Techniques: Substitution and Transposition, One Time Pad, Modular Arithmetic, GCD, Euclid\u2019s Algorithms, Chinese Remainder Theorem, Discrete Logarithm, Fermat Theorem, Block Ciphers, Stream Ciphers. Secret Splitting and Sharing.Unit II Cryptography\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 (8 Hrs.)Symmetric Key Algorithms: DES, AES, BLOFISH, Attacks on DES. Modes of Operations, Linear Cryptanalysis and Differential Cryptanalysis. Public Key Algorithms: RSA, Key Generation and Usage, ECC. Hash Algorithms: SHA-1,MD5.Unit III Key Management\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 (8 Hrs.)Introduction, Key Management: Generations, Distribution, Updation, Digital Certificate, Digital Signature, PKI. Diffiee Hellman Key Exchange. One Way Authtication, Mutual Authentication, Neeham Schroeder Protocol.Unit IV Network Security\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 (8 Hrs.)Layer Wise Security Concerns, IPSEC- Introduction, AH and ESP, Tunnel Mode, Transport Mode, Security Associations, SSL- Introduction, Handshake Protocol, Record Layer Protocol. IKE- Internet Key Exchange Protocol.Intrusion Detection Systems: Introduction, Anomaly Based, Signature Based,Host Based, Network Based Systems.Unit V Security Management and Applications\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 (6 Hrs.)ISO 27001 Security Standard: Introduction, Evolution of standard, Organizational Context, Implementation, Certifications and benefits. Electronic Payment: Introduction, Payment types, Smart Cards, Chip card transactions and attacks, Payment over internet, Mobile Payments, Electronic Cash.Unit VI Cyber Crimes &amp; Laws\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 (6 Hrs.)Introduction, Computer Forensics, Online Investgative tool, tracing and recovering electronic evidence, Internet fraud, Identity Theft, Industrial Espionage, Cyber Terrorism. Indian IT laws: Introduction and briefs of Law clauses.Text Books :<\/p>\n<ol>\n<li>Bruice Schneier, \u201cApplied Cryptography- Protocols, Algorithms and Source code in C\u201d, 2<sup>nd<\/sup> Edition, Wiely India Pvt Ltd, ISBN 978-81-265-1368-0 Bernard Menezes, \u201cNetwork Security and Cryptography\u201d, Cengage Learning, ISBN- 978-81-315-1349-1<\/li>\n<\/ol>\n<p>Reference Books :<\/p>\n<ol>\n<li>Nina Godbole, \u201c Information Systems Security\u201d, Wiley India Pvt Ltd, ISBN -978-81\u00ad265-1692-6<\/li>\n<li>Willaim Stallings, \u201cComputer Security : Principles and Practices\u201d, Pearson Ed. ISBN : 978-81-317-3351-6<\/li>\n<li>Mark Merkow, \u201c Information Security-Principles and Practices\u201d, Pearson Ed. 978-81\u00ad317-1288-7<\/li>\n<li>CK Shyamala et el., \u201cCryptography and Security\u201d, Wiley India Pvt Ltd, ISBN 978-81\u00ad265-2285-9<\/li>\n<li>Berouz Forouzan, \u201cCryptography and Network Security\u201d, 2 edition, TMH, ISBN : 9780070702080<\/li>\n<\/ol>\n<table cellspacing=\"0\" cellpadding=\"0\">\n<tbody>\n<tr>\n<td width=\"145\" height=\"0\"><\/td>\n<\/tr>\n<tr>\n<td><\/td>\n<td><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><br clear=\"ALL\" \/>Teaching Scheme: Lectures: 4 Hours\/WeekPrerequisites: Software EngineeringObjectives: Introduction to Modeling and Design of software, firmware and business processes.Introduce UML 2.0 and its diagrams as a modeling tool for large and complex systems.Understand the concepts being modeled in UML.Unit I Introduction to OMG Standards: MDA, MOF, XMI, CORBA, UML 2.0. UML (8 Hrs.) History, UML 2.0 New Features. Introduction to UML, UML Meta Model Conceptual Model of UML, Extensibility mechanisms like stereotypes, tagged values, constraints and profiles. OCL. Overview of all diagrams in UML 2.0.Unit II Rational Unified Process emphasizing Inception, Elaboration, Construction, (6 Hrs.) Transition Phases. 4+1 View architecture, Architectural approaches: Use case Centric, Architecture driven, Iterative approach. OO Concepts Review,Overview of Use Case Diagram.Unit III CRC method, Class diagrams, Classes and Relationships, Advanced Classes, (8 Hrs.) Advanced relationships generalization, association with its adornments, dependencies, realization. Interfaces and ports. Packages &amp; diagrams.Instances, Active Objects &amp; object diagram, Composite structure diagrams including composite structures, collaborations Unit IV Interaction diagrams. Interaction Overview diagrams including interactions, (8 Hrs.) signals, exceptions, regions, partitions, Sequence diagrams, Communication diagrams.Unit V Activity diagrams, Activities, sub activities, Events &amp;signals, exceptions, (6 Hrs.) partitions, regions. State Machine diagrams, States, encapsulation of states, transitions, submachine, state Generalization. Timing diagrams. Processes &amp; threads, time &amp; space, Modeling reactive object.Unit VI Support for modeling Architecture in UML. Component diagrams, Deployment (6 Hrs.) diagrams. Collaborations. Pattern &amp; framework.Applications of UML in embedded systems, Web applications, commercial applications.Note: All diagrams are to be assumed for UML 2.0 for each diagram the need, purpose, Concepts, Notation, Forward Engineering, and Reverse Engineering for class diagram must be considered.Text Books :<\/p>\n<ol>\n<li>Grady Booch, James Rumbaugh, Ivar Jacobson, &#8220;Unified Modeling Language User Guide&#8221;, The 2nd Edition, Addison-Wesley Object Technology Series.<\/li>\n<li>Dan PHone, Neil Pitman, &#8220;UML 2.0 in a Nutshell (In a Nutshell (O&#8217;Reilly)<\/li>\n<li>Tom Pender, Eugene McSheffrey, Lou Varvels, Wiley &#8220;UML 2 Bible&#8221;<\/li>\n<\/ol>\n<p>Reference Books<\/p>\n<ol>\n<li>Hans-Erik Eriksson, Magnus Penker, Brian Lyons, David Fado &#8220;UML 2 Toolkit&#8221;<\/li>\n<li>Martin Fowler, Addision Wesley, &#8220;UML Distilled A Brief Guide to the Standard object Modeling Language&#8221;, Third Edition<\/li>\n<\/ol>\n<table cellspacing=\"0\" cellpadding=\"0\">\n<tbody>\n<tr>\n<td width=\"132\" height=\"0\"><\/td>\n<\/tr>\n<tr>\n<td><\/td>\n<td><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><br clear=\"ALL\" \/>Teaching Scheme: Lectures: 4 Hours\/WeekPrerequisites: Software EngineeringObjectives: Introduction to software testing lifecycle.Understanding various types of software tests and quality control standardsUnit I Testing Principles\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 (6 Hrs.)Need of testing, Basic concepts &#8211; errors, faults, defects, failures, test bed, unit testing, integration testing system, system testing, regression testing, alpha, beta and acceptance testing , functional testing, performance testing, recovery testing, white box testing, black box testing, verification and validation Unit II Test Management\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 (6 Hrs.)Testing Life Cycle &#8211; Roles and activities,Test Planning &#8211; forming a test team, develop test plan review Test Cases design strategiesblack box approach: random testing, equivalence class partitioning and boundary value analysis.white box approach: test adequacy criteria, coverage and control flow graphs, paths, loop testing, mutation testing.Test execution: build test data, life cycle of defect, defect tracking, defect detection stages, defect detection stages, defect types, defect severity, defect analysis and prevention.Unit III Software Metrics\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 (6 Hrs.)Scope of software metrics, Classifying software measures, Measurement basics &#8211; representational theory, scales, meaningfulness, What to measure &#8211; GOM technique, Control flow structure, product quality metrics &#8211; MTTF, defect density, customer problems, customer satisfaction, function point,Metrics for software maintenance, In-process quality metrics.Unit IV Quality Assurance\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 (6 Hrs.)Quality concepts &#8211; quality, quality control, quality assurance, cost of quality Software quality assurance &#8211; SQA activities, software reviews, inspections, audits, Software reviews, inspections, audits, Software reliability Quality Attributes: correctness, reliability, usability, integrity, portability, maintainability, interoperability. Ishikawa\u2019s Seven Basic Tools Unit V Quality Standards\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 (6 Hrs.)Basic concept of &#8211; ISO 9000 &amp; 9001, CMM, six sigma.Unit VI Development of CMM\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 (8 Hrs.)CMM &#8211; Following KPAs : requirements management (RM), software project tracking and oversight (SPTO), software configuration management (SCM), organization process definition (OPD), software product engineering (SPE), peer reviews (PR), quantitative process management (QPM), defect prevention (DP), process change managementText Books :<\/p>\n<ol>\n<li>Iien Burnstein, \u201cPractical Software Testing\u201d, Springer Publication.<\/li>\n<li>William E Perry, \u201cEffective Methods for Software Testing\u201d, Second Edition, Wiley Publication.<\/li>\n<li>Norman E. Fenton \u201cSoftware Metrics A Rigorous and Practical Approach\u201d, Second Edition, Thomson Publication.<\/li>\n<\/ol>\n<p>References Books:<\/p>\n<ol>\n<li>Stephen H. Kan \u201cMetrics and Models in Software Quality Engineering\u201d Pearson Education.<\/li>\n<li>Pressman, \u201cSoftware Engineering \u201c, Fifth Edition, TATA McGraw Hill.<\/li>\n<li>Pankay Jalote \u201cCMM Practice\u201d Pearson Education.<\/li>\n<\/ol>\n<\/div>\n<div class=\"Section8\">Examination Scheme: Theory: 100 MarksPrerequisites: Database Management systems Objectives: Understand the salient features of various types management, data warehousing and data miningUnit I OverviewPL\/SQL &#8211; Introduction to PL\/SQL &#8211; Declare, begin statements, Variables,Control Structure, PL\/SQL Transactions &#8211; Savepoint, Cursor, PL\/SQL Database Objects &#8211; Procedures, Functions, Packages, Triggers.Programmatic SQL &#8211; Embedded SQL, Dynamic SQL, and ODBC Standard.Unit II Transaction processing and concurrency controlDefinition of Transaction and ACID properties. Transaction Processing &#8211; Transaction-processing monitors, transactional workflows, main-memory databases, real-time transaction systems, long-duration transactions, transaction management in multi-databases. Concurrency Control &#8211; Locks, Optimistic Concurrency Control (Backward and Forward validations), Timestamping Concurrency Control.Unit III Object-based databases and xmlObject-based databases &#8211; Complex data types, structured types and inheritance in SQL, table inheritance, array and multiset types in SQL, object- identity and reference types in SQL, implementing O-R features, Persistent programming languages, OO vs OR. XML &#8211; Structure of XML, Document Schema, Querying and Transformation, API in XML, XML applications.Unit IV Data warehousingIntroduction to Data Warehousing &#8211; Concepts, Benefits and Problems, DW Architecture &#8211; Operational Data, load manager, meta data, DW Data flows &#8211; inflow, upflow, meta flow, DW tools and technologies &#8211; Extraction, cleansing and transformation tools, DW DBMS, admin and management tools, data marts &#8211; reasons and issues, Data Warehousing using Oracle.Data Warehousing Design &#8211; Designing, Dimensionality modeling, Design methodology, DW deign using Oracle.Unit V Olap and data miningOn-line Analytical Processing &#8211; OLAP BenchMarks, applications, benefits, tools, categories, extensions to SQL, Data mining &#8211; introduction, techniques, predictive modeling, tools. Data mining algorithms &#8211; Apriori, Decision tree, k-means, Bayesian classifier.Unit VI Database securitySecurity and integrity threats, Defence mechanisms, Statistical database auditing &amp; control. Security issue based on granting\/revoking of privileges, Introduction to statistical database security. PL\/SQL Security &#8211; Locks &#8211; Implicit locking, types and levels of locks, explicit locking, Oracles\u2019 named Exception Handlers.Text Books:<\/p>\n<ol>\n<li>A. Silberschatz, H. Korth and S. Sudarshan, \u201cDatabase System Concepts\u201d, Fifth Edition, McGraw-Hill International Edition.<\/li>\n<li>Thomas Connolly and Carolyn Begg, \u201cDatabase Systems &#8211; A Practical Approach to Design, Implementation and Management\u201d, Third Edition, Low Price Edition.<\/li>\n<\/ol>\n<p>Reference Books:<\/p>\n<ol>\n<li>Ivan Bayross, \u201cSQL, PL\/SQL &#8211; The Programming Language of ORACLE\u201d, Third Revised<\/li>\n<\/ol>\n<p>Edition, BPB Publication.<\/p>\n<ol>\n<li>Jiawei Han and Micheline Kamber, \u201cData Mining &#8211; Concepts and Techniques\u201d, Second<\/li>\n<\/ol>\n<p>Edition, Elsevier.<\/p>\n<ol>\n<li>M. Gertz, and S. Jajodia, \u201cHandbook of Database Security- Application and Trends\u201d,<\/li>\n<\/ol>\n<p>2008, Springer.Examination Scheme: Theory: 100 MarksPrerequisites: Discrete mathematics, basic probability theory and statistics Knowledge of any programming language and data structuresObjectives<\/p>\n<ul>\n<li>Introduction to the basic principles and applications of Artificial Intelligence.<\/li>\n<li>Understanding of the basic areas of artificial intelligence such as problem solving, knowledge representation, reasoning, planning, perception, vision and learning<\/li>\n<li>Students will also be able to design and implement key components of intelligent agents and expert systems of moderate complexity in C++\/Java and\/or Lisp or Prolog and evaluate their performance.<\/li>\n<\/ul>\n<p>Unit I Introduction to AI and intelligent agents\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 (8 Hrs.)What is Artificial Intelligence? The Turing Test, AI Problem, AI Techniques, Foundation of Artificial IntelligenceIntelligent Agents &#8211; Agents and environments, Good behavior, nature of environments, structure of agents, problem solving agents Application of AI and Swarm intelligent systems Unit II Heuristics search and game playing\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 (8 Hrs.)Defining the problem as a state space search, production system, problem characteristicsHeuristic search techniques- Generate and test, Hill Climbing, Best-First Search, Constraint satisfaction problems (CSP)Application of search in Game playing &#8211; Minimax search procedure, Adding alpha-beta cutoffs, additional refinement, State of Art Game programs.Unit III Knowledge representation &amp; NLP\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 (8 Hrs.)Representation and mapping, Approach &amp; Issues in knowledge representation, Prepositional logicFirst order logic &#8211; representation revisited, syntax and semantics for first order logic, using first order logic, Knowledge engineering in first order logic, inference in First order logic, unification and liftingWeak-slot and filler structure, Strong slot and filler structures. Reasoning Under Uncertainty &#8211; Nonmonotonic reasoning, logic for Nonmonotonic reasoningNatural Language Processing- Introduction, Steps in the process, Spell checkingUnit IV Planning and perception\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 (8 Hrs.)Planning &#8211; Block world problem, components of a planning systems, Goal stack planning, Non-linear planning, Hierarchical planning, least commitment strategyPerception &#8211; Image formation, Image processing operations, Extracting 3D information, Object Recognition, Using vision for manipulation and navigation Unit V Learning and expert system (8 Hrs.)What is learning?, Forms of learning, Rote learning, learning by taking advice,Learning in problem solving, Induction leaning, Explanation based learning,Formal learning theory. Connectionist models- learning in Neural network Architecture of expert system, expert system shell, explanation, knowledge Acquisition, Two case studies of an expert system.Unit VI AI Programming and Advanced AI\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 (8Hrs.)AI Programming: Converting English to Prolog facts and Rules, Prolog Terminology, Arithmetic operation, Matching, Backtracking, Cuts, Recursion,Lists. Prolog in Artificial IntelligenceAdvanced AI: Genetic Algorithms, Parallel &amp; Distributed AI<\/p><\/div>\n<div class=\"Section9\">\n<ol>\n<li>Elaine Rich and Kevin Knight, Shivashankar Nair, \u201cArtificial Intelligence\u201d, 3<sup>rd<\/sup> Edition, Tata McGraw-Hill, ISBN-10- 0070087709, ISBN-13- 9780070087705<\/li>\n<li>Stuart Russell, Peter Norvig, \u201cArtificial Intelligence &#8211; A Modern Approach\u201d, 2nd Edition, Pearson Education \/ Prentice Hall of India, ISBN: 0137903952<\/li>\n<\/ol>\n<p>Reference Books :<\/p>\n<ol>\n<li>George F. Luger , \u201cArtificial Intelligence: Structures and Strategies for Complex Problem Solving\u201d, Pearson, ISBN-10: 0321545893<\/li>\n<li>N.P. Padhy, \u201cArtificial Intelligence And Intelligent Systems\u201d, Oxford University Publishers, ISBN 9780195671544<\/li>\n<li>Ivan Bratko, \u201cPROLOG : Programming for Artificial Intelligence\u201d, Pearson Education, 3 Edition, ISBN10: 0-201-40375-7<\/li>\n<li>Saroj Kaushik, \u201cArtificial Intelligence\u201d, Cengage Learning, , ISBN-13: 9788131510995<\/li>\n<\/ol>\n<\/div>\n<div class=\"Section10\">Examination Scheme: Theory: 100 MarksPrerequisite: System Software ProgrammingObjectives: To introduce principles behind the design of common programming language featuresTo understand the details of all phases of compilersTo apply the phases of compiler on object oriented programming languages.Unit I High Level languages; Programming Paradigms; Compilers and their\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 (8Hrs.)structure, Types of the compilersSyntax and Notations; Regular Expressions and Lexical Syntax; Context Free Grammars; Lexical Analysis Unit II Parsing &#8211; Top Down Parsing; Recursive Descent Parsing; Bottom up Parsing, (6 Hrs.)LR parsing &amp; LALR parsing; Ambiguity Unit III Abstract Syntax Trees; Semantic Actions, Control Flow; Loops and Loop (8 Hrs.)Invariants, Types; Type Checking Unit IV Procedures\/Functions; Calls; Parameter Passing; Scope and Scope Rules, (8Hrs.) Runtime Memory Models; Activations Records (Frames); Activation Stacks (Call Stacks)Unit V Intermediate Representation; Basic Blocks and Conditional Branches; (8 Hrs.)Instruction Selection; Liveness Analysis; Register Allocation Unit VI Program Structuring; Data Abstraction &amp; Information Hiding; Modules &amp; (8 Hrs.) Objects and Object Orientation; Class-based and Object-based Languages, Inheritance; Derived Classes; Notion of Self, Implementation of Object Oriented LanguagesText Books :<\/p>\n<ol>\n<li>Ravi Sethi, \u201cProgramming Languages &#8211; Concepts and Constructs\u201d. 2<sup>nd<\/sup> Edition, Pearson,<\/li>\n<li>Andrew Appel, \u201cModern Compiler Implementation in C\u201d, Cambridge University Press.<\/li>\n<\/ol>\n<p>Reference Books :<\/p>\n<ol>\n<li>JP Bennett, \u201cIntroduction to Compiling Techniques\u201d, Tata McGrawHill Edition, 2002\n<ol>\n<li>H Alblas and A Nymeyer, \u201cPractice and Principles of Compiler Building with C\u201d, PHI, 1998<\/li>\n<li>Andrew Appel, \u201cModern Compiler Implementation in C\u201d, Cambridge University Press\n<ol>\n<li>O\u2019Reilly, LEX and YACC,<\/li>\n<\/ol>\n<\/li>\n<\/ol>\n<\/li>\n<\/ol>\n<\/div>\n<div class=\"Section11\">Examination Scheme: Theory: 100 MarksPrerequisite: Basics of Operating systems Objectives: To understand and explore advanced OS concepts To study OS Design and internalsUnit I Introduction\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 (8Hrs.)Operating System Architecture, multitasking, multiuser, multiprocessing, multi- threading OS, Operating System Services for process management, process scheduling concepts, system calls for process management, process communication and synchronization concepts, memory and I\/O management overview, UNIX commands for system administration.Unit II Multitasking OS :Design and implementation\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 (8Hrs.)Kernel of multitasking OS :services, process state transitions, functional specification, implementation considerations, system list ,ready list and its manipulation, IPC and synchronization, process management , interrupt managementUnit III Multiprocessor systems\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 (8Hrs.)Introduction, parallel hardware and interconnections, types of multiprocessorOS, Sharaing OS, mutiprocesor OS design considerations, threads, thread scheduling, kernel mode processes, multiprocessor synchronization, implementation of mutual exclusion.Unit IV Memory management\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 (8Hrs.)overview, Pages, Zones, kmalloc, vmalloc, slab layer, slab layer allocator, deallocator ,statically allocating on the stack, High memory mapping. Non contiguous memory managementUnit V I\/O systems\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 (8Hrs.)I\/O device types, I\/O structure, Driver interfaces, disk device driver access strategies, unification of files and I\/O devices, generalized disk device drivers, disk caching, I\/O scheduler.Unit VI File system\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 (8Hrs.)File system organization, operations, implementation, file descriptors, file blocks allocaton, mapping of file blocks ,System Calls for the file system: open, read, write , lseek, Close. mounting and un mounting file systems, link, unlink ,file system abstractions, VFS, file system maintenance, file securityText Books :<\/p>\n<ol>\n<li>Milan Milenkovic,\u201dOperating systems Concepts and design\u201d,Milan Milenkovic TMGH second edition.<\/li>\n<li>charles crowly,\u201dOperating systems a design oriented approach\u201d , TMGH<\/li>\n<li>Maurice J. Bach, &#8220;The design of the UNIX Operating System&#8221;, Prentice Hall India, ISBN- 81-203-0516- 7<\/li>\n<li>Daniel Bovet: \u201cUnderstanding the Linux kernel\u201d, 3rd edition, O&#8217;Reilly<\/li>\n<\/ol>\n<p>Reference Books<\/p>\n<ol>\n<li>Andrew S. Tanenbaum ,\u201cModern Operating Systems\u201d, , ISBN-13: 978-81-203-2063-5, PHI.<\/li>\n<li>Richard Stevens ,\u201dUNIX Network Programming\u201d, ISBN-978-81-203-0749-0, PHI.<\/li>\n<li>Kay Robbins, Steve Robbins,\u201dUNIX Systems Programming Communication, Concurrency and Threads\u201d,2nd Edition, Jun 2003, Hardback, ISBN13: 9780130424112.<\/li>\n<li>Robert Love ,\u201dLinux Kernel Development\u201d, ISBN 81-297-0359-9, Pearson Education<\/li>\n<\/ol>\n<p>Teaching Scheme:\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Examination Scheme:Lectures: 4 Hours\/Week\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Theory: 100 MarksPrerequisite: Digital circuits and Logic Design, Knowledge of microcontrollers, microprocessors Objectives: Understand the basics of embedded systems and its applicationsUnit I Introduction to Embedded System\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 (8 Hrs.)Definition of Embedded System &amp; its classification, characteristics of embedded systems, design parameters\/Metrics of embedded systems. Components of embedded systems with review of Microprocessor &amp; Microcontrollers, introduction to embedded processor, Digital signal processor, Application specific system processor, Multiprocessor systems using General Purpose Processor Unit II System Processor\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 (8Hrs.)Standard Single purpose processors: Peripherals, Introduction, Timers,Counters and watchdog Timers, UART, Pulse Width Modulators, Clocking unit, Real Time Clock Reset Circuitry. Processor and memory organization, processor and memory selection, Memory Types, Memory map and addresses.Unit III I\/O Interfacing\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 (8 Hrs.)I\/O devices: ADC\/DAC, Optical Devices such as LED\/LCD Display devices,Keyboard controller, Timer &amp; counting devices, serial communication using I2C, SPI,CAN, RS232, &amp; USB. Device drivers &amp; interrupt service Mechanism: ISR concepts and ISR handling mechanisms Unit IV Programming Concepts, Embedded System Programming C &amp; C++\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 (8Hrs.)Assemble language high level lang. C program Elements, Micros &amp; Function,Data types, Data Structures, Modifiers, Statement, loops &amp; Pointers, queues &amp;Stacks, List &amp; order list, Embedded System Programming in C++ &amp; Java. C Program Compilers &amp; Cross Compilers. In Circuit emulator. Software engineering practices in the embedded software development process.Unit V Real Time Operating Systems\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 (8 Hrs.)Real Time &amp; embedded system OS: off the shelf operating Systems, Embedded OS, Real Time OS, hand held OS. RTOS Tashk and task scheduling, Interrupt Latency &amp; Response time, Strategy for synchronization between the processes, ISR, OS functions &amp; tasks for resource management, Semaphores, message Queue, mailbox, pipes, signals, event registers, memory management, priority Inversion problems and solutions.Unit VI Overview &amp; Applications of Embedded System\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 (8 Hrs.)Case Study of coding for Vending machine system using MUCOSRTOS, Case study coding for send application layer byte streams on A TCP\/IP Network Using RTOS Vx works, Case study of an Embedded System for an adapting Cruise control System in a car, Case Study in embedded system for Smart Card, Case Study of Digital camera.Text Books :<\/p>\n<ol>\n<li>Rajkamal, \u201cEmbedded System Architecture Programming Design\u201d, Tata Graw Hill Publication<\/li>\n<li>Dr. K.V.K.K. Prasad, \u201cEmbedded \/ Real time System : Concepts, Design &amp; Programming &#8211; Black book\u201d, Dreamtech Press Publication<\/li>\n<li>Jonathan Valvano, \u201cEmbedded Microcomputer Systems &#8211; Real Time Interfacing\u201d, CENGAGE Learning.<\/li>\n<li>Peckol, \u201cEmbedded System\u201d, Wiley Publishers<\/li>\n<li>David Simon,\u201dAn Embedded Software Primer \u201d<\/li>\n<li>Sriam Iyer, Pankaj Gupta, \u201cEmbedded Real time Systems Programming\u201d Tata Graw Hill<\/li>\n<li>Tammy Nergaard, \u201cEmbedded System Architecture &#8211; A Comprehensive Guide For Engineering &amp; Programming\u201d, Elesevier Publication<\/li>\n<li>Steve Heath Embedded Systems Design\u201d, Elesevier publication.<\/li>\n<\/ol>\n<\/div>\n<div class=\"Section12\">Examination Scheme: Theory: 100 MarksPrerequisite: Computer NetworksObjective: Understanding the fundamentals involved in technologies of Mobile computingUnit I Introduction\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 (8Hrs.)Introduction &#8211; PCS Architecture, Cellular Telephony, Cordless Telephony and Low-Tier PCS, Generations of Wireless Systems, Basic Cellular System,Concept of Frequency reuse channels, Cells SplittingMobility Management &#8211; Handoff, Roaming Management, Roaming Management under SS7Handoff Management &#8211; Handoff Detection, Strategies for Handoff Detection,Channel Assignment, Link Transfer Types, Hard Handoff, Soft Handoff Unit II GSM\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 (8 Hrs.)GSM System Overview &#8211; GSM Architecture, Location Tracking and Call Setup,Security, Data Services, Unstructured Supplementary Service Data,GSM Network Signaling &#8211; GSM MAP Service Framework, MAP ProtocolMachine, MAP Dialogue, Examples of MAP Service PrimitivesGSM Mobility Management &#8211; GSM Location Update, Mobility Databases,Failure Restoration, VLR Identification Algorithm, VLR Overflow Control Unit III GSM Services\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 (8 Hrs.)GSM Short Message Service &#8211; SMS Architecture, SMS Protocol Hierarchy, Mobile-Originated Messaging, Mobile &#8211; Terminated Messaging, DTE-DCE Interface International Roaming for GSM &#8211; International GSM Call Setup,Reducing the International Call Delivery CostGSM Operations, Administration, and Maintenance &#8211; Call Recording Functions, Performance Measurement and Management, Subscriber and Service Data Management Mobile Number Portability &#8211; Fixed Network Number Portability,Number Portability for Mobile Networks, Mobile Number Portability Mechanisms, Implementation Costs for Mobile NumberPortability Mobile Prepaid Phone Services &#8211; Wireless IN approach, Service node approach, Hot billing approach, Comparison of prepaid solutions Unit IV Mobile Data Networks\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 (8Hrs.)General Packet Radio Service (GPRS) &#8211; GPRS Functional Groups, GPRS Architecture GPRS Network Nodes, GPRS Interfaces, GPRS Procedures, GPRS Billing, Evolving from GSM to GPRSWireless Application Protocol (WAP) &#8211; WAP Model, WAP Gateway, WAP Protocols WAP UAProf and Caching, Wireless Bearers for WAP, WAP Developer Toolkits, Mobile Station Application Execution Environment Third-Generation Mobile Services &#8211; Paradigm Shifts in Third-Generation Systems\u00a0\u00a0 W-CDMA and cdma2000, Improvements on Core Network,Quality of Service in 3G Wireless Operating System for 3G Handset, Third- Generation Systems and Field Trials, Other Trial Systems, Impact on Manufacture and Operator Technologies Unit V Mobile Network Layer\u00a0 (8 Hrs.)Mobile IP: Goals, assumptions and requirements, entities and terminologies, IP packet delivery, agent discovery, registration, tunneling and encapsulation, optimization, reverse tunneling, IPv6, DHCP, MANET : routing, destination sequence distance vector, dynamic source routing, alternative matrics, protocol overviewUnit VI Emerging Mobile Technologies\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 (8 Hrs.)Bluetooth, Wireless Broadband (WiMAX), RFiD, Java Card., WLL, W-LAN,UMTS, Spread Spectrum Technologies<\/p>\n<ol>\n<li>Yi Bing Lin,\u201dWireless and Mobile Network Architectures\u201d, Wiley Publications<\/li>\n<li>Jochen Schiller,\u201dMobile Communications\u201d,Pearson Education<\/li>\n<\/ol>\n<p>Reference Books :<\/p>\n<ol>\n<li>Asoke Talukder and Roopa Yavagal,\u201dMobile Computing\u201d, Tata McGraw Hill\n<ol>\n<li>William C.Y.Lee, \u201cMobile Cellular Telecommunications\u201d, McGraw Hill<\/li>\n<\/ol>\n<\/li>\n<\/ol>\n<\/div>\n<div class=\"Section13\">Examination Scheme: Theory: 100 Marks<\/div>\n<div class=\"Section14\">Prerequisites :<\/p>\n<ul>\n<li>Digital Electronics<\/li>\n<li>Data Structures and Files Objectives :<\/li>\n<li>To learn the storage and processing of various Multimedia components.\n<ul>\n<li>To learn the advance graphics.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p>Unit I Introduction:<\/p><\/div>\n<div class=\"Section15\"><\/div>\n<div class=\"Section16\">What is multimedia, Goals and objectives, characteristics of multimedia presentation, multimedia applications, Multimedia building blocks, multimedia and internet,Multimedia architecture, Windows multimedia support, hardware support, distributed multimedia applications, streaming technologies, multimedia database systems, Multimedia authoring tools, overview of multimedia software tools, multimedia Document Architecture,(MHEG, SGML, ODA, OMF etc.)Text: Types of text, Text compression: Huffman coding, LZ &amp; LZW, text file formats: TXT, DOC; RTF, PDF, PS.Unit II Digital Image ProcessingBasic Image fundamentals, Image data types, image File formats &#8211; (BMP, TIFF, JPEG, PCX etc), Image acquisition, storage processing, Communication, and display, Image enhancement: Enhancement by point processing, Spatial filtering.Image compression: Types of compression: lossy &amp; lossless, symmetrical &amp; asymmetrical, intraframe &amp; interframe Hybrid JPEG, Lossless: RLE, Shannon- Fano algorithm, Arithmetic coding. Lossy: Vector quantization, fractal compression technique, transform coding, psycho-analysis, and interframe correlation. Hybrid: JPEG-DCTUnit III Audio and audio compressionNature of sound waves, characteristics of sound waves, psycho-acoustic, and elements of audio systems: Microphone, amplifiers, speakers, synthesizer, MIDI, digital audio, CD formats. Audio file formats: WAV, AIFF, VOC, AVI, MPEG Audio File formats, RMF, WMA audio compression techniques such as DM, ADPCM and MPEG Unit IV VideoVideo signal formats, Video transmission standards: EDTV, CCIR, CIF, SIF, HDTV, digitization of video, video recording systems: VHS, Video Compact Cassette, DVCAN, Camcorder, Lesser disc, VCD, DVD-video, micro-MV, Video file formats: MOV, RealVideo, H-261, H-263, cinepack. Nerodigtal, Video editing, DVD formats Unit V Virtual Reality and MultimediaConcept, Forms of VR, VR applications, VR devices: Hand Gloves, Head mounted tracking system, VR chair, CCD, VCR, 3D Sound system, Head mounted display. Virtual ObjectsBasics of VRML.Unit VI AnimationUses of animation, types of animation, principles of animation, Techniques of animation: Onion Skinning, Motion Cycling, masking, Flip Book animation, Rotoscoping &amp; blue-screening, color cycling, morphing, animation on the web, 3D animation, Creating animation using Flash,3D- Max<\/div>\n<div class=\"Section17\">\n<ol>\n<li>Ranjan Parekh, &#8220;Principles of Multimedia&#8221;, TMH, ISBN 0-07-058833-3<\/li>\n<li>Ralf Steinmetz and Klara Nahrstedt &#8220;Multimedia Computing, Communication and Applications&#8221;, Pearson Education.<\/li>\n<\/ol>\n<p>Reference Books :<\/p>\n<ol>\n<li>Ze-Nian Li, Marks S. Drew, &#8220;Fundamentals of Multimedia&#8221;, Pearson Education.<\/li>\n<li>Nigel Chapman and Jenny Chapman, &#8220;Digital Multimedia&#8221;, Wiley<\/li>\n<li>A. K. Jain,&#8221;Fundamentals of Digital Image Processing&#8221;, PHI<\/li>\n<li>Gonzalez, Woods, &#8220;Digital Image Processing&#8221; Addison Wesley<\/li>\n<li>Mark Nelson, &#8220;Data Compression Book &#8220;, BPB.<\/li>\n<li>Judith Jeffcoate \/&#8217;Multimedia in Practice&#8221;:, Pill.<\/li>\n<li>Robert Reinhardt, Snow Dowd, \u201cFlash 8 Bible\u201d<\/li>\n<li>Keith Peters, \u201cFoundation AS Animation: Making Things Move!\u201d<\/li>\n<li>Sanford Kennedy, \u201c3ds max Animation and Visual Effects Techniques\u201d<\/li>\n<\/ol>\n<\/div>\n<div class=\"Section18\">Teaching scheme: Practical: 2 Hours\/WeekExamination scheme: Term Work: 50 Marks Oral: 50 Marks<\/div>\n<div class=\"Section19\"><\/div>\n<div class=\"Section20\">Section A Programming<\/p>\n<ol>\n<li>Writing program in C++ or Java to implement RSA algorithm for key generation and cipher verification<\/li>\n<li>Write a Client &#8211; Server programm in C++ or Java for authentication verification.<\/li>\n<li>Develop and program in C++ or Java based on number theory such as chinese remainder or Extended Euclidian algorithm. ( Or any other to illustrate number theory for security)<\/li>\n<\/ol>\n<p>Section B Cryptography Library ( API )<\/p>\n<ol>\n<li>Writing program in C++, C# or Java to implement RSA algorithm using Libraries (API)<\/li>\n<li>Writing program in C++, C# or Java to implement SHA-1 algorithm using Libraries (API)<\/li>\n<li>Writing program in C++, C# or Java to implement AES algorithm using Libraries (API)<\/li>\n<\/ol>\n<p>Section C Security Tools<\/p>\n<ol>\n<li>Configure and demonstrate use of IDS tool such as snort.<\/li>\n<li>Configure and demonstrate use of Traffic monitoring tool such as Wireshark with security perspective.<\/li>\n<li>Configure and demonstrate use of velnerability assessment tool such as NESSUS<\/li>\n<li>Implement web security with Open SSL tool kit<\/li>\n<\/ol>\n<p>Students should submit the term work in the form of a journal. Each assignment has to be well documented with problem definition, theory and code documentation. Staff in charge will assess the assignments continuously and grade or mark each assignment on completion date, declared for each assignment.Note: Oral examination will be based on the term work submitted by the student and the associated theory of the subject.414445: Computer Lab Practices IExamination Scheme : Term Work: 50 Marks Practical: 50 MarksPart A Object Oriented Modeling &amp; DesignSelect a hypothetical system of sufficient complexity\/ Select a Real Time system of sufficient complexity and implement assignment 1 to 9 using any UML 2.0 Tool.<\/p>\n<ol>\n<li>Prepare a SRS plan &amp; Draw use case diagram.<\/li>\n<li>Design class diagram &amp; composite structure diagram.\n<ol>\n<li>Apply advanced notations to same class diagram &amp; do forward engineering.<\/li>\n<li>Study reverse engineering using C++ code\/java code for class diagram.<\/li>\n<li>Draw p ackage di agram.<\/li>\n<li>Design sequence &amp; communication diagrams {vice versa}.<\/li>\n<li>Design interaction overview diagrams<\/li>\n<li>Design activity diagram &amp; state diagrams.<\/li>\n<li>Design component &amp; deployment &amp; diagrams.<\/li>\n<\/ol>\n<\/li>\n<\/ol>\n<p>Every Project group should implement assignment 1 to 9 for their project definition using any UML 2.0 Tool.Part B Software Testing and Quality Assurance<\/p>\n<ol>\n<li>Manual Testing<\/li>\n<\/ol>\n<p>a)\u00a0 Write black box test cases for an application using Test Director tool.b)\u00a0\u00a0 Perform white box testing &#8211; Cyclomatic complexity, data flow testing, control flow testing<\/p>\n<ol>\n<li>Automated Testing<\/li>\n<\/ol>\n<p>Perform Black Box testing using automated testing tool on an application. Testing Points to be covered &#8211; data driven wizard, parameterization, exception handing<\/p>\n<ol>\n<li>Defect Tracking :\n<ol>\n<li>Log the test results in Test Director<\/li>\n<li>Prepare a Defect Tracking Report \/ Bug Report using MS-Excel or Defect Tracking Tool like BugZilla<\/li>\n<li>a. Calculate Software Metrics for an application using FP analysis<\/li>\n<\/ol>\n<\/li>\n<\/ol>\n<p>method.b. Prepare any two of the Ishikawa\u2019s Seven tools listed below for an application<\/p>\n<ol>\n<li>The cause-and-effect or Ishikawa diagram\n<ol>\n<li>The check sheet<\/li>\n<li>The control chart<\/li>\n<li>The histogram<\/li>\n<li>The Pareto chart<\/li>\n<li>The scatter diagram<\/li>\n<li>Stratification<\/li>\n<\/ol>\n<\/li>\n<\/ol>\n<p>Note : All 04 assignments are compulsory.Recommended Tools<\/p>\n<div align=\"center\">\n<table border=\"0\" cellspacing=\"0\" cellpadding=\"0\">\n<tbody>\n<tr>\n<td valign=\"top\" width=\"32\">a)<\/td>\n<td valign=\"top\" width=\"248\">Quick Test Professional &#8211; preferred<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\" width=\"32\">b)<\/td>\n<td valign=\"top\" width=\"248\">Win Runner<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\" width=\"32\">c)<\/td>\n<td valign=\"top\" width=\"248\">Load Runner<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\" width=\"32\">d)<\/td>\n<td valign=\"top\" width=\"248\">Silk Test<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\" width=\"32\">e)<\/td>\n<td valign=\"top\" width=\"248\">Rational Robo<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/div>\n<p>Suggested Applications (not mandatory) &#8211; front end (VB) &#8211; back end (Oracle \/ MS Access)<\/p>\n<div align=\"center\">\n<table border=\"0\" cellspacing=\"0\" cellpadding=\"0\">\n<tbody>\n<tr>\n<td valign=\"top\" width=\"30\">a)<\/td>\n<td valign=\"top\" width=\"325\">Calculator &#8211; Integer operations, add, sub, div<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\" width=\"30\">b)<\/td>\n<td valign=\"top\" width=\"325\">Login Form and successful &amp; failed login pages<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\" width=\"30\">c)<\/td>\n<td valign=\"top\" width=\"325\">Inventory management &#8211; atleast 2 forms<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\" width=\"30\">d)<\/td>\n<td valign=\"top\" width=\"325\">Library management &#8211; atleast 2 forms<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\" width=\"30\">e)<\/td>\n<td valign=\"top\" width=\"325\">Training &amp; Placement Cell system<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\" width=\"30\">f)<\/td>\n<td valign=\"top\" width=\"325\">Online reservation system<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/div>\n<p>Reference Books :a)\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Software Testing Techniques : Boris Beizer : dreamTechb)\u00a0\u00a0\u00a0\u00a0\u00a0 Software Testing Tools : Dr. KVKK Prasad : dreamTech<\/p><\/div>\n<div class=\"Section21\">414446: Project WorkExamination scheme: Term work: 50 MarksThe Student will undertake one project over the academic year, which will involve the analysis, design of a system or sub system in the area of Information Technology and Computer Science and Engineering.The project will be undertaken preferably by a group of at least 4 students who will jointly work and implement the project. The group will select a project with approval of the guide (Staff- member assigned).The aim of project is to allow the students to study the feasibility of the project, planning project, studying existing systems, tools available to implement the project and state of art software testing procedures and technology with use of case tools.Every group must submit the preliminary project report of the project in LATEX by the end of first month from the commencement of the first term. It should have the following details in it.<\/p>\n<ol>\n<li>Introduction<\/li>\n<li>Aims and objectives<\/li>\n<li>Literature survey<\/li>\n<li>Problem statement<\/li>\n<li>Proj ect Requirements<\/li>\n<li>Proposed architecture\/ high level design of the project<\/li>\n<li>Project plan<\/li>\n<\/ol>\n<p>A panel of examiner will evaluate the viability of project and allot the term work marks.The group will submit at the end of semester II.a)\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 The Workable project.b)\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Project report (in LATEX) in the form of bound journal complete in all respect &#8211; 1 copy for the Institute and 1 copy of each student in the group for certification.The term work will be accessed by the examiners in consultation with the guide. Oral examination will be based on the project work completed by the candidates. Preliminary report work completed by candidates. Preliminary report must also be presented during the oral examination.The project report contains the details.<\/p>\n<ol>\n<li>Problem definition and requirement specification acceptance test procedure (ATP).\n<ol>\n<li>System definition &#8211; requirement Analysis.<\/li>\n<li>System design.<\/li>\n<li>System implementation &#8211; code documentation &#8211; dataflow diagrams\/ algorithm, protocols used.<\/li>\n<li>Test result and procedure &#8211; test report as per ATP.<\/li>\n<li>Platform choice use.<\/li>\n<li>Conclusions.<\/li>\n<li>Appendix tools used, References.<\/li>\n<\/ol>\n<\/li>\n<\/ol>\n<p>Documentation will use UML approach with presentation, Category, Use Case, Class Diagrams etc.<\/p><\/div>\n<div class=\"Section22\">Semester &#8211; II Information Technology 2008 Course<\/div>\n<p><strong>\u00a0<\/strong><\/p>\n<div class=\"Section23\">414448: Distributed SystemPrerequisite : Operating System and Computer NetworksObjective : Understand the fundamentals of distributed environment in complex applicationUnit I Introduction\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 (5 Hrs.)Introduction to Distributed Systems: Goals, Architecture, Examples of Distributed Systems, Characteristics, Hardware and Software Concepts,Design Issues, Challenges.System Models: Architectural models, fundamental models and Failure Model.Unit II Inter-process Communication and Coordination\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 (7 Hrs.)Message Passing Communication: Communication Primitives, Message Synchronization and Buffering, Pipe, Pipe and Socket APIs, Group Communication, MulticastingRemote Procedural Call: Basic Operation, Implementation and Call Semantics,Failure Handling, LRPCObject Oriented Distributed Computing Technologies &#8211; Basics, design issues of various technologies like RMI and CORBA with semantics and executions.Unit III Synchronization and Election\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 (7 Hrs.)Clock Synchronization: Logical and Physical Clocks, Algorithms and Uses Mutual Exclusion: Centralize, Distributed and Token Ring Algorithms, ComparisonLogical Clocks: Lamport\u2019s Logical Clock, Vector Clocks Global State: Needs, Properties and Various Global States Election Algorithm: Bully and Ring AlgorithmUnit IV Distributed File Systems\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 (7 Hrs.)Introduction, Characteristics, File Service ArchitectureSun Network and CODA File System: Overview of NFS, Communication, Processes, Naming,Synchronization, Consistency and Replication, Fault Tolerance and Security Naming Services: Case Study of Global Name Service and X.500 Directory ServiceUnit V Distributed Shared Memory\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 (7 Hrs.)Replication: Introduction, Reasons for Replication, Object Replication and Scaling TechniqueDistributed Shared Memory: Design and Implementation Issue;Data Centric Consistency Models &#8211; Strict, Sequential, Casual, PRAM, Weak,Release, EntryClient-Centric Consistency Models: Eventual, Monotonic Reads, Monotonic Writes, Read Your Writes, Writes Follow Reads Unit VI Fault Tolerant and Recovery\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 (7 Hrs.)Fault Tolerance: Concepts, Failure Models, Failure Masking by Redundancy Process Resilience: Design Issues, Failure Masking and Replication, Agreement in Faulty SystemsRecovery: Introduction, Check-pointing, Message Logging &#8211; Synchronous and Asynchronous, Adaptive Logging<\/div>\n<div class=\"Section24\">\n<ol>\n<li>George Coulouris, Jean Dollimore &amp; Tim Kindberg, \u201cDistributed Systems &#8211; Concept and Design\u201d 4<sup>th<\/sup> Edition, Publisher: Pearson (LPE). ISBN &#8211; 978-81-317-1840-7<\/li>\n<li>Andrew S. Tanenbaum &amp; Maarten van Steen\u201d, Distributed Systems &#8211; Principles and Paradigms\u201d, Publisher: PHI.<\/li>\n<\/ol>\n<p>Reference Books :<\/p>\n<ol>\n<li>Randay Chow, Theodore Johnson, \u201cDistributed Operating System and Algorithm Analysis\u201d, Publisher: Pearson (LPE). ISBN &#8211; 978-81-317-2859-8<\/li>\n<\/ol>\n<\/div>\n<div class=\"Section25\">414449: Information Retrieval<\/div>\n<p><strong>\u00a0<\/strong><\/p>\n<div class=\"Section26\"><\/div>\n<div class=\"Section27\">Examination Scheme: Theory: 100 MarksObjective : To deal with IR representation, storage, organization &amp; access to information items(8 Hrs.)Basic Concepts of IR, Data Retrieval &amp; Information Retrieval, IR system block diagram. Automatic Text Analysis, Luhn&#8217;s ideas, Conflation Algorithm, Indexing and Index Term Weighing, Probabilistic Indexing, Automatic Classification. Measures of Association, Different Matching Coefficient, Classification Methods, Cluster Hypothesis. Clustering Algorithms, Single Pass Algorithm, Single Link Algorithm, Rochhio&#8217;s Algorithm and DendogramsUnit IFile Structures, Inverted file, Suffix trees &amp; suffix arrays, Signature files, Ring (6 Hrs.) Structure, IR Models, Basic concepts, Boolean Model, Vector Model, and Fuzzy Set Model. Search Strategies, Boolean search, serial search, and cluster- based retrieval, Matching FunctionPerformance Evaluation- Precision and recall, alternative measures reference (6 Hrs.) collection (TREC Collection), Libraries &amp; Bibliographical system- Online IR system, OPACs, Digital libraries &#8211; Architecture issues, document models, representation &amp; access, Prototypes, projects &amp; interfaces, standards Taxonomy and Ontology: Creating domain specific ontology, Ontology life (8 Hrs.) cycleDistributed and Parallel IR: Relationships between documents, Identify appropriate networked collections, Multiple distributed collections simultaneously, Parallel IR &#8211; MIMD Architectures, Distributed IR &#8211; Collection Partitioning, Source Selection, Query ProcessingMultimedia IR models &amp; languages- data modeling, Techniques to represent (8 Hrs.) audio and visual document, query languages Indexing &amp; searching- generic multimedia indexing approach, Query databases of multimedia documents,Display the results of multimedia searches, one dimensional time series, two dimensional color images, automatic feature extraction.Searching the Web, Challenges, Characterizing the Web, Search Engines, (6 Hrs.) Browsing, Mata searchers, Web crawlers, robot exclusion, Web data mining, Metacrawler, Collaborative filtering, Web agents (web shopping, bargain finder,..), Economic, ethical, legal and political issues..Text Books :<\/p>\n<ol>\n<li>Yates &amp; Neto, &#8220;Modern Information Retrieval&#8221;, Pearson Education, ISBN 81-297-0274-6\n<ol>\n<li>C.J. Rijsbergen, &#8220;Information Retrieval&#8221;, (<a href=\"http:\/\/www.dcs.gla.ac.uk\" target=\"_blank\" rel=\"noopener\">www.dcs.gla.ac.uk<\/a>)<\/li>\n<li>I. Witten, A. Moffat, and T. Bell, \u201cManaging Gigabytes\u201d<\/li>\n<li>D. Grossman and O. Frieder \u201cInformation Retrieval: Algorithms and Heuristics\u201d<\/li>\n<\/ol>\n<\/li>\n<\/ol>\n<p>Reference Books :<\/p>\n<ol>\n<li>Mark leven, \u201cIntroduction to search engines and web navigation\u201d, John Wiley and sons Inc., ISBN 9780-170-52684-2.<\/li>\n<li>V. S. Subrahamanian, Satish K. Tripathi \u201cMultimedia information System\u201d, Kulwer Academic Publisher<\/li>\n<li>Chabane Djeraba, \u2019\u2019Multimedia mining A highway to intelligent multimedia documents\u201d, Kulwer Academic Publisher, ISBN 1-4020-7247-3<\/li>\n<\/ol>\n<p>Examination Scheme: Theory: 100 MarksObjective: To get an overview of design and evaluation issues of RTS, Real Time Communication and operating systems.Unit I Introduction to Real Time Systems\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 (8 Hrs.)Definition of RTS, Issues in real time computing -Constraints, Structure of RTS, Typical real time applications \u2014 Digital Control, Signal Processing, Characterizing RTS. Performance measures of RTS- properties of performance measure, Performabitity &#8211; cost function and hard deadline &#8211; Estimating program real time, Analysis of source code, pipelining, dependencies.Unit II Task Assignment and scheduling\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 (8 Hrs.)Types of tasks, Timings, precedence, resource constraints, classification of scheduling algorithms, priority driven approach for periodic and aperiodic task,Non preemptive method(EDD), preemptive methods(EDF and LST), Rate monotonic, deadline monotonic, EDF and its variants for periodic tasks,Resource and resource access scheduling protocols: blocking and priority inversion, priority inheritance and priority ceiling protocolsUnit III Programming languages, tools and databases\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 (8 Hrs.)Language Characteristics. Data typing. Control structures, facilitating hierarchical decomposition, packages, error handling, Overloading &amp; Generics,Use of POSIX Programming API in RTS Basic definition of databases. Real Time versus General Purpose databases, Main memory databases. Transaction priorities, Aborts, Concurrency control issues, Two phase approach to improve predictability, Maintaining serialization consistency, Databases for hard Real Time Systems.Unit IV Real Time Communication\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 (8 Hrs.)Network topologies- Sending messages, Network architecture issues, Protocol &#8211; Contention based, Token based. Stop &amp; Go Multi hop Protocol. The Pooled Bus.Hierarchical Round Robin Deadline, based. Fault tolerant Routing, medium access control protocols of broadcast networks, Internet and resources reservation protocols.Unit V Real Time Kernel and Operating Systems\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 (8 Hrs.)Time services, features of RTOS, Program and processes Threads, sharing resources,Resources management: memory management and process management, fore ground\/background systems, operating system architecture, Real time POSIX standards, capabilities of RTOS.Unit VI Fault Tolerance and Reliability, UML For Real Time Systems (8 Hrs.)Fault types, detection, error containment, Redundancy- Hardware, Software,Time, Information redundancy, Data diversity. Reversal checks, Malicious or Byzantine failures, Integrated failure handling, Reliability models: Hardware and software error models, Modeling for time, resource, schedulability, performance, RT UML profileText Books :<\/p>\n<ol>\n<li>C.M. Krishna ,\u201dReal Time systems\u201d, Tata Mc Graw Hills publications<\/li>\n<li>Jane W.S. Liu,\u201dReal Time Systems\u201d, Pearson Education<\/li>\n<li>Douglass,\u201dReal Time UML\u201d, Pearson Education<\/li>\n<li>Peckol,\u201dEmbedded System\u201d, WILEY publications Reference Books :<\/li>\n<li>Stuart bennet, \u201cReal Time Computer control, An Introduction \u201d Pearson Publications\n<ol>\n<li>C. Sivraman Murthy and G.Maniraman, \u201cResource Management in real time systems and Network\u201d MIT ISBN &#8211; 51-203-2682-2<\/li>\n<\/ol>\n<\/li>\n<\/ol>\n<\/div>\n<div class=\"Section28\">Examination Scheme: Theory: 100 MarksObjectives :<\/p>\n<ul>\n<li>Introduction to the software architecture as a discipline.<\/li>\n<li>Introduction to current architecture approach.<\/li>\n<li>Introduction to software architecture strategies.<\/li>\n<\/ul>\n<p>Unit I Architecture Business cycle, What is software architecture, why software (8Hrs.)architecture is important, documenting software architectures.Unit II Understanding quality attributes, architecture and quality attributes, (8 Hrs.)achieving quality attributes.Unit III Design patterns: History, Important principles behind design patterns,\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 (8Hrs.)Programing the interface and concept of delegation.Pune Technical University IT Syllabus<\/p><\/div>\n","protected":false},"excerpt":{"rendered":"<p>PUNE TECHNICAL UNIVERSITY B.E. Information Technology 2008 Course Proposed in 2011-12 (Faculty of Engineering) \u00a0 Structure of B.E. (Information Technology) 2008 Course Proposed in 2011-12 Part &#8211; I Sub No. Subject Teachin g Scheme Examination Scheme Marks Total Lect Pract Theory Term Work Pract. Oral (Hrs. \/ Week) 414441 Information Assurance and Security 4 2 &#8230; <a title=\"Pune Technical University IT Syllabus\" class=\"read-more\" href=\"https:\/\/www.kopykitab.com\/blog\/pune-technical-university-it-syllabus\/\" aria-label=\"More on Pune Technical University IT Syllabus\">Read more<\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"fifu_image_url":"","fifu_image_alt":""},"categories":[1],"tags":[773,476,861],"amp_enabled":true,"_links":{"self":[{"href":"https:\/\/www.kopykitab.com\/blog\/wp-json\/wp\/v2\/posts\/4993"}],"collection":[{"href":"https:\/\/www.kopykitab.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kopykitab.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kopykitab.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kopykitab.com\/blog\/wp-json\/wp\/v2\/comments?post=4993"}],"version-history":[{"count":3,"href":"https:\/\/www.kopykitab.com\/blog\/wp-json\/wp\/v2\/posts\/4993\/revisions"}],"predecessor-version":[{"id":135778,"href":"https:\/\/www.kopykitab.com\/blog\/wp-json\/wp\/v2\/posts\/4993\/revisions\/135778"}],"wp:attachment":[{"href":"https:\/\/www.kopykitab.com\/blog\/wp-json\/wp\/v2\/media?parent=4993"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kopykitab.com\/blog\/wp-json\/wp\/v2\/categories?post=4993"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kopykitab.com\/blog\/wp-json\/wp\/v2\/tags?post=4993"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}