12MECC101 APPLIED MATHEMATICS INTENDED OUTCOMES…kahedu.edu.in/wp-content/uploads/2013/pdf/Cse...
Transcript of 12MECC101 APPLIED MATHEMATICS INTENDED OUTCOMES…kahedu.edu.in/wp-content/uploads/2013/pdf/Cse...
-
12MECC101 APPLIED MATHEMATICS
INTENDED OUTCOMES:
To develop analytical skills for solving different engineering problems
To solve problems using Matrices and Random processes.
To solve problems by applying differential calculus.
UNIT I ADVANCED MATRIX THEORY
Matrix norms Jordan canonical form Generalized eigenvectors Singular value decomposition
Pseudo inverse Least square approximations QR algorithm.
UNIT II CALCULUS OF VARIATIONS
Variation and its properties Eulers equation Functional dependent on first and higher order
derivatives Functional dependent on functions of several independent variables Some applications
Direct methods Ritz and Kantorovich methods.
UNIT III LINEAR PROGRAMMING
Basic concepts Graphical and Simplex methods Transportation problem Assignment problem.
UNIT IV Z TRANSFORMS
Transform of standard functions Convolution Initial and Final value problems Shifting Theorem
Inverse transform (Using Partial Fraction Residues) Solution of difference Equations using Z
Transform.
UNIT V RANDOM PROCESSES
Classification Stationary random processes Auto Correlation Cross Correlations Power spectral
density Linear system with random input Gaussian Process.
-
TEXT BOOKS:
S.NO Author(s) Name Title of the book Publisher Year of publication
1 Venkataraman M.K Higher Mathematics for Engineering &
Science (3rd
Edition)
National Publishing
Company, New
Delhi
2004
2 Gupta, P.K.and Hira, D.S.
Operations Research (2
nd Edition)
S.Chand & Co.,
New Delhi 2005
3 T.Veerarajan Mathematics III (2
nd Edition)
Tata McGraw Hill,
New Delhi 2000
REFERENCES BOOKS:
S.NO Author(s) Name Title of the book Publisher Year of
publication
1 Bronson, R Matrix Operations
(2nd
Edition)
Schaums outline
Series, McGraw
Hill, New York.
2005
2 Elsgoltis Differential Equations
and Calculus of
Variations (3rd
Edition)
MIR Publishers,
Moscow.
2004
3 Gupta.A.S Calculus of Variations
with Applications (4th
Edition)
Prentice Hall of
India, New Delhi.
2005
WEBSITES:
http://en.wikipedia.org/wiki/Matrix_(mathematics)
http://en.wikipedia.org/wiki/Z-transform
http://www.purplemath.com/modules/linprog.htm
http://en.wikipedia.org/wiki/Linear_programming
http://en.wikipedia.org/wiki/Autocorrelation
-
12MEIS101 COMPUTER NETWORKS
INTENDED OUTCOMES:
To introduce the concepts, terminologies and technologies used in modern
days data communication and computer networking To solve problems using Matrices and Random processes.
To understand the concepts of data communications.
To study the functions of different layers.
To introduce IEEE standards employed in computer networking.
To make the students to get familiarized with different protocols and
network components
UNIT I NETWORK ARCHITECTURE
Layering and protocols OSI Architecture Internet Architecture Link and Medium Access
protocols Framing Error Detection reliable Transmission IEEE 802 Standards Ethernet
Token Rings Wireless Network Adapters.
UNIT II NETWORK LAYER
Circuit Switching Packet Switching Switching and Forwarding Bridges and LAN Switches
Cell Switching Inter networking Routing Global Internet Multicast.
UNIT III TRANSPORT LAYER
UDP TCP Remote Procedure Call Performance Congestion Control and Resource
Allocation TCP Congestion Control Congestion Avoidance Mechanisms Quality of Service
Bandwidth Delay Jitter.
UNIT IV NETWORK SECURITY AND APPLICATION
Cryptographic Algorithms DES RSA MD5 Security Mechanisms Fire Walls Name
Service Traditional Applications SMTP HTTP Multimedia Application RTP RTCP
SCTP.
UNIT V NETWORK MANAGEMENT
Introduction Network Monitoring Network Control SNMPV I Network Management
Concepts Information Standard MIBS.
-
TEXT BOOKS:
S.NO. Author(s) Name Title of the book Publisher Year of publication
1 Larry L.Peterson and Brule S.Davie
Computer Networks
A System Approach
(2nd
Edition)
MarGankangmann
Harcourt Asia, 2002
2 William Stallings SNMP, SNMP V2, SNMPV3, RMON 1
and 2 (3rd Editio)
Addison Wesley 2002
REFERENCE BOOKS:
S.NO Author(s) Name Title of the book Publisher Year of Publications
1 Kurose J.F and K.W. Ross
Computer Networking
A top down
approach featuring the
internet (2nd
Edition)
Addison Wesley,
New York.
2001
2 William Stallings Data & Computer Communication (6th Edition)
Pearson Education,
New York.
2002
3 Mani Subramanian Network Management Principles and Practice
(3rd
Edition)
Addison Wesley,
New York.
2004
WEBSITES:
http://www.mcmcse.com/cisco/guides/osi.shtml
http://f1tutorials.com/Tutorials/Network/computer_network.html
http://www.cse.iitk.ac.in/users/dheeraj/cs425/
http://en.wikipedia.org/wiki/IEEE_802
http://en.wikipedia.org/wiki/Network_management
http://f1tutorials.com/Tutorials/Network/computer_network.htmlhttp://www.cse.iitk.ac.in/users/dheeraj/cs425/http://en.wikipedia.org/wiki/IEEE_802http://en.wikipedia.org/wiki/Network_management
-
12MEIS102 CRYPTOGRAPHY
INTENDED OUTCOMES:
To understand the principles of encryption algorithms; conventional and
public key cryptography. To have a detailed knowledge about
authentication, hash functions and application level security mechanisms.
To know the methods of conventional encryption.
To understand the concepts of public key encryption and number theory
To understand authentication and Hash functions.
To know the network security tools and applications.
To understand the system level security used.
UNIT -I INTRODUCTION
OSI Security Architecture - Classical Encryption techniques Cipher Principles Data Encryption
Standard Block Cipher Design Principles and Modes of Operation - Evaluation criteria for AES AES
Cipher Triple DES Placement of Encryption Function Traffic Confidentiality
UNIT- II PUBLIC KEY CRYPTOGRAPHY
Key Management - Diffie-Hellman key Exchange Elliptic Curve Architecture and Cryptography -
Introduction to Number Theory Confidentiality using Symmetric Encryption Public Key
Cryptography and RSA.
UNIT- III AUTHENTICATION AND HASH FUNCTION
Authentication requirements Authentication functions Message Authentication Codes Hash
Functions Security of Hash Functions and MACs MD5 message Digest algorithm - Secure Hash
Algorithm RIPEMD HMAC Digital Signatures Authentication Protocols Digital Signature
Standard
UNIT -IV NETWORK SECURITY
Authentication Applications: Kerberos X.509 Authentication Service Electronic Mail Security PGP
S/MIME - IP Security Web Security.
UNIT- V SYSTEM LEVEL SECURITY
Intrusion detection password management Viruses and related Threats Virus Counter measures
Firewall Design Principles Trusted Systems.
-
REFERENCE BOOKS:
S.NO Author(s) Name Title of the book Publisher Year of Publication
1 Atul Kahate Cryptography and Network Security
Tata McGraw-Hill
2003
2 Bruce Schneier Applied Cryptography John Wiley & Sons Inc
2001
3 Charles B. Pfleeger, Shari Lawrence
Pfleeger
Security in Computing Pearson Education 2003
4 William Stallings Cryptography And Network Security Principles and
Practices
Prentice Hall of
India 2003
5 Man Young Rhee Internet Security Wiley, New York 2003 6 Pfleeger & Pfleeger Security in Computing Pearson Education,
Asia. 2003
-
12MEIS103 ADHOC NETWORKS
INTENDED OUTCOMES:
To have a detailed knowledge about Adhoc Networks and its protocols.
To know the different Adhoc Network protocol..
To understand the concepts of multicast routing in Adhoc Networks
UNIT I INTRODUCTION
Introduction Fundamentals of Wireless Communication Technology The Electromagnetic Spectrum
Radio Propagation Mechanisms Characteristics of the Wireless Channel IEEE 802.11a,b Standard
Origin Of Ad hoc Packet Radio Networks Technical Challenges Architecture of PRNETs
Components of Packet Radios Ad hoc Wireless Networks Heterogeneity in Mobile Devices
Wireless Sensor Networks Traffic Profiles Types of Ad hoc Mobile Communications
UNIT II AD HOC ROUTING PROTOCOLS
Introduction Issues in Designing a Routing Protocol for Ad Hoc Wireless Networks Classifications of
Routing Protocols Driven Routing Protocols Destination Sequenced Distance Vector (DSDV)
Wireless Routing Protocol (WRP) Cluster Switch Gateway Routing (CSGR) Source Initiated On
Demand Approaches Ad Hoc On Temporally Ordered Routing Algorithm (TORA) Signal Stability
Routing (SSR) Location Aided Routing (LAR) Power Aware Routing (PAR) Zone Routing
Protocol (ZRP).
UNIT III MULTICASTROUTING IN AD HOC NETWORKS
Introduction Issues in Designing a Multicast Routing Protocol Operation of Multicast Routing
Protocols An Architecture Reference Model for Multicast Routing Protocols Classifications of
Multicast Routing Protocols Tree Based Multicast Routing Protocols Mesh Based Multicast
Routing Protocols Summary of Tree and Mesh Based Protocols Energy Efficient Multicasting
Multicasting with Quality of Service Guarantees Application Dependent Multicast Routing
Comparisons of Multicast Routing Protocols.
UNIT IV TRANSPORT LAYER, SECURITY PROTOCOLS
Introduction Issues in Designing a Transport Layer Protocol for Ad Hoc Wireless Networks Design
Goals of a Transport Layer Protocol for Ad Hoc Wireless Networks Classification of Transport Layer
Solutions TCP Over Ad Hoc Wireless Networks Other Transport Layer Protocols for Ad Hoc
Wireless Networks Security in Ad Hoc Wireless Networks Network Security Requirements Issues
and Challenges in Security Provisioning Network Security Attacks Key Management Secure
Routing in Ad Hoc Wireless Networks.
UNIT V QoS AND ENERGY MANAGEMENT
Introduction Issues and Challenges in Providing QoS in Ad Hoc Wireless Networks Classifications of
QoS Solutions MAC Layer Solutions Network Layer Solutions QoS Frameworks for Ad Hoc
Wireless Networks Energy Management in Ad Hoc Wireless Networks Introduction Need for Energy
-
Management in Ad Hoc Wireless Networks Classification of Energy Management Schemes Battery
Management Schemes Transmission Power Management Schemes System Power Management
Schemes.
TEXT BOOKS:
S.NO Author(s) Name Title of the book Publisher Year of Publication
1 Siva Ram Murthy C. and Manoj.B.S
Ad Hoc Wireless Networks
Architectures and Protocols (2
nd Edition)
Prentice Hall PTR,
New Delhi 2004
REFERENCE BOOKS:
S.NO Author(s) Name Title of the book Publisher Year of Publication
1 Toh C.K Ad Hoc Mobile Wireless Networks Protocols and
Systems (3rd
Edition)
Prentice Hall PTR,
New Delhi. 2001
2 Charles E. Perkins Ad Hoc Networking (3rd Edition)
Addison Wesley,
New York 2002
-
12MEIS104 BIO INFORMATICS
INTENDED OUTCOMES:
To study the importance of Bio Informatics among the students
To study the relationship between Data mining with Bio informatics
To simulate the Biological tools using softwares.
UNIT I INTRODUCTION
The Central Dogma Killer Application Parallel Universes Watsons Definition Top Down Vs
Bottom Up Approach Information Flow Conversance Communications.
UNIT II DATABASE AND NETWORKS
Definition Data Management Data Life Cycle Database Technology Interfaces Implementation
Networks Communication Models Transmission Technology Protocols Bandwidth Topology
Contents Security Ownership Implementation.
UNIT III SEARCH ENGINES AND DATA VISUALIZATION
Search Process Technologies Searching And Information Theory Computational Methods
Knowledge Management Sequence Visualizations Structure Visualizations User Interfaces
Animation Vs Simulation.
UNIT IV STATISTICS, DATA MINING AND PATTERN MATCHING
Statistical Concepts Micro Arrays Imperfect Data Basics Quantifying Randomness Data
Analysis Tools Selection Alignment Clustering Classification Data Mining Methods
Technology Infrastructure Pattern Recognition Discovery Machine Learning Text Mining
Pattern Matching Fundamentals Dot Matrix Analysis Substitution Matrix Dynamic Programming
Word Method Bayesian Method Multiple Sequence Alignment Tools.
UNIT V MODELING SIMULATION AND COLLABORATION
Drug Discovery Fundamentals Protein Structure System Biology Tools Collaboration And
Communication Standards Issues Case Study.
-
TEXT BOOKS:
S.NO Author(s) Name Title of the book Publisher Year of Publication
1 Bryan Bergeron Bio Informatics Computing (2
nd Edition)
Prentice Hall,
New York 2003
REFERENCE BOOKS:
S.NO Author(s) Name Title of the book Publisher Year of Publication
1 Affward T.K. ,D.J. Parry Smith
Introduction to Bio
Informatics (4
th Edition)
Pearson
Education, Asia.
2001
2 Pierre Baldi, Soren Brunak
Bio Informatics
The Machine
Learning Approach
(2nd Edition)
First East West
Press, Moscow 2003
-
12MEIS111 NETWORKS LAB
LIST OF EXPERIMENTS
1. Simulation of ARP / RARP. 2. Write a program that takes a binary file as input and performs bit stuffing and CRC
Computation.
3. Develop an application for transferring files over RS232. 4. Simulation of Sliding-Window protocol. 5. Simulation of BGP / OSPF routing protocol. 6. Develop a Client Server application for chat. 7. Develop a Client that contacts a given DNS Server to resolve a given host name. 8. Write a Client to download a file from a HTTP Server. 9. Study of Network Simulators like NS2/Glomosim / OPNET . 10. Write a program mail using mailserver.
-
SEMESTER II
12MEIS201 DATABASE TECHNOLOGY
INTENDED OUTCOMES:
Advanced database aims at developing computer application with different kinds of data models. It is also deals with the Transaction management of these
different databases.
To study the needs of different databases.
To understand about different data models that can be used for these databases.
To make the students to get familiarise the transaction management of the database
To develop in-depth knowledge about web and intelligent database.
To provide an introductory concept about the way in which data can be stored in geographical information systems etc.,
UNIT I DATA BASE SYSTEM CONCEPT
File systems Database systems Database systems architecture Data models Relational model
Hierarchical model Network model Entity-Relationship model Data Dictionary Database
Administration and control.
UNIT II RELATIONAL DATABASES
Codd's rules Base tables Views Domains and key concept Integrity rules Relational Algebra
Relational calculus Commercial query languages Embedded SQL Normalization and database
design.
UNIT III DATABASE SYSTEM DESIGN
File and storage structures Indexing and Hashing Query processing Database recovery
Concurrency control Transaction processing Security and Integrity Triggers.
UNIT IV DISTRIBUTED DATABASES
Centralized versus distributed databases Fragmentation Distributed database architecture Client /
Server databases Distributed transactions Locking and Commit protocols Distributed concurrency
Control Security and reliability Parallel databases.
UNIT V ADVANCED DATABASES
The World Wide Web Object oriented database Object Relational database XML, XML/QL Data
Analysis and OLAP Data mining Data warehousing.
-
TEXT BOOKS:
S.NO. Author(s) Name Title of the book Publisher Year of publication
1 Abraham Silberschatz,
Henry.F.Korth,
Sudharsan.S
Database System
Concepts (4th Edition) Tata McGraw
Hill, New Delhi 2002
2 Ramez Elmasri, Shamkant B. Navathe
Fundamentals of
Database Systems (3rd
Edition)
Addison Wesley,
New York 2004
REFERENCE BOOKS:
S.NO. Author(s) Name Title of the book Publisher Year of publication
1 Jim Buyens Step by Step Web Database
Development (3
rd Edition)
PHI, Asia 2005
2 Stefano Ceri & Giuesppe Pelagatti
Distributed Databases
- Principles and
Systems (2nd
Edition)
McGraw Hill Book
Company, New
Delhi.
2004
3 C.J.Date An Introduction to Database system (7th Edition)
Pearson Education,
New York.
2003
WEBSITES:
http://en.wikipedia.org/wiki/Database#Database_concept
http://www.cse.iitb.ac.in/~sudarsha/db-book/slide-dir/
http://www.classle.net/sites/default/files/text/7539/DBMS_Korth_4edition_sol.pdf
http://www.mediafire.com/?ondtsi8om71tock
http://en.wikipedia.org/wiki/Database#Database_concepthttp://www.cse.iitb.ac.in/~sudarsha/db-book/slide-dir/http://www.classle.net/sites/default/files/text/7539/DBMS_Korth_4edition_sol.pdf
-
12MEIS202 INFORMATION SECURITY
INTENDED OUTCOMES:
To study the critical need for ensuring Information Security in Organizations
To understand the basics of Information Security
To know the legal, ethical and professional issues in Information Security
To know the aspects of risk management
UNIT -1 INTRODUCTION
History, Critical Characteristics of Information, NSTISSC Security Model, Components of an
Information System, Securing the Components, Balancing Security and Access, The SDLC, The Security
SDLC
UNIT- II SECURITY INVESTIGATION
Need for Security, Business Needs, Threats, Attacks, Legal, Ethical and Professional Issues
UNIT- III SECURITY ANALYSIS
Risk Management: Identifying and Assessing Risk, Assessing and Controlling Risk
UNIT- IV LOGICAL DESIGN
Blueprint for Security, Information Security Poicy, Standards and Practices, ISO 17799/BS 7799, NIST
Models, VISA International Security Model, Design of Security Architecture, Planning for Continuity
UNIT- V PHYSICAL DESIGN
Security Technology, IDS, Scanning and Analysis Tools, Cryptography, Access Control Devices,
Physical Security, Security and Personnel
-
REFERENCE BOOKS:
S.NO Author(s) Name Title of the book Publisher Year of Publications
1 Micki Krause, Harold F. Tipton
Handbook of
Information Security
Management
2004
2 Stuart Mc Clure, Joel Scrambray,
George Kurtz
Hacking Exposed Tata McGraw Hill, Osborne
3 Matt Bishop Computer Security Art and Science.
Computer Security
Art and Science.
2002
4 Michael E Whitman and
Herbert J Mattord
Principles of
Information Security Vikas Publishing
House, New Delhi
2003
-
12MEIS203 INFORMATION STORAGE AND MANAGEMENT
INTENDED OUTCOMES:
To understand the content and successfully complete this course, a student must have an understanding of computers, operating systems, networking, and
databases. Experience in specific segments of storage infrastructure would also be
helpful to fully assimilate the course material.
To evaluate storage architectures, including storage subsystems, DAS, SAN, NAS, CAS
To define backup, recovery, disaster recovery, business continuity, and replication
To examine emerging technologies including IP-SAN
To understand logical and physical components of a storage infrastructure
To identify components of managing and monitoring the data center
To define information security and identify different storage virtualization technologies
UNIT I INTRODUCTION TO STORAGE TECHNOLOGY
Review data creation and the amount of data being created and understand the value of data to a business
challenges in data storage and data management Solutions available for data storage Core elements of a
data center infrastructure role of each element in supporting business activities
UNIT II STORAGE SYSTEMS ARCHITECTURE Hardware and software components of the host environment Key protocols and concepts used by each
component Physical and logical components of a connectivity environment Major physical components
of a disk drive and their function logical constructs of a physical disk access characteristics and
performance Implications Concept of RAID and its components Different RAID levels and their
suitability for different application environments
UNIT III INTRODUCTION TO NETWORKED STORAGE Evolution of networked storage Architecture components and topologies of FC SAN NAS and IP
SAN Benefits of the different networked storage options Understand the need for long term
archiving solutions and describe how CAS fulfills the need Understand the appropriateness of the
different networked storage options for different application environments
UNIT IV INFORMATION AVAILABILITY & MONITORING & MANAGING
DATACENTER List reasons for planned/unplanned outages and the impact of downtime Impact of downtime
Differentiate between business continuity (BC) and disaster recovery (DR) RTO and RPO Identify
single points of failure in a storage infrastructure and list solutions to mitigate these failures
Architecture of backup/recovery and the different backup/recovery topologies Replication technologies
and their role in ensuring information availability and business continuity
UNIT V SECURING STORAGE AND STORAGE VIRTUALIZATION
-
Information security Critical security attributes for information systems Storage security domains List
and analyzes the common threats in each domain Virtualization technologies block level and file
level virtualization technologies and processes
TEXT BOOKS:
S.NO Author(s) Name Title of the book Publisher Year of Publications
1 EMC Corporation Information Storage and Management (2
nd Edition)
Wiley, ISBN
number
04702942134, New
York.
2003
2 Robert Spalding Storage Networks The Complete
Reference (3
rd Edition)
Tata McGraw Hill,
Osborne.
2003
REFERENCE BOOKS:
S.NO Author(s) Name Title of the book Publisher Year of Publications
1 Marc Farley Building Storage Networks (2
nd Edition)
Tata McGraw Hill,
Osborne 2001
2 Meeta Gupta Storage Area Network Fundamentals (3
rd Edition)
Pearson Education
Limited, Asia.
2002
-
12MEIS204 CYBER SECURITY
INTENDED OUTCOMES:
To study the critical need for ensuring Information Security in Organizations
To understand the basics of Cyber Security
To know the legal, ethical and professional issues in Cyber Security
To know the aspects of risk management
UNIT I - SECURITY POLICIES AND MANAGEMENT
Security Policy Design - Designing Security Procedures- Risk Assessment Techniques- Security
standards -Security Models:Biba Model-Chinese Wall-Bell La Pedula Model
UNIT II- PHYSICAL AND ENVIRONMENTAL SECURITY
Server Room Design-Fire fighting equipment-Temperature/humidity Control-Application
Security:Databases, Email and Internet
UNIT III COMMUNICATIONS AND OPERATIONS MANAGEMENT
Network Architecture-Network Operations- Security Devices :Firewalls, IDS/IPS, Antivirus-
Routers/Switches-Access Control:Logical and Physical Access Control
UNIT IV- SOFTWARE SECURITY
Security in development methodology-Security testing-Segregation of duties-Information Security
Standards-ISO 27001-PCI DSS
UNIT V - CYBER FORENSICS
Introduction to forensic tools- Evaluation of crime scene and evidence collection- Usage of tools for disk
imaging and recovery processes-Compliance :IT Act,Copy Right Act, Patents.
-
REFERENCE BOOKS:
S.NO Author(s) Name Title of the book Publisher Year of Publication
1 Emmett Dulaney CompTIA Security+ Deluxe Study Guide
Wiley Publishing
Inc,Indiana.
2009
2 John Mallery Hardening Network Security
Mcgraw Hill,USA 2005
3 Eoghan Casey BS MA
Evidence and Computer
Crime Elsevier,Inc,USA
-
12MEIS205 RADIO FREQUENCY IDENTIFICATION
INTENDED OUTCOMES:
To study the critical need for ensuring Authentication in Organizations
To understand the basics of RFID
To know professional issues in RFID
UNIT I -INTRODUCTION
Background and definitions- Automatic identification technology (Auto-ID)-Types of Auto-ID
technology- Radio frequency identification- Serialization- Applications: Automobile toll
collection,Hospital asset tracking using real-time location systems (RTLS)- Supply chain tracking- RFID
bar code comparison
UNIT II -RFID COMPONENTS
Elements of an RFID system- Radio frequencies: LF, HF, UHF, and SHF Systems- Tag-reader
communication: inductive versus radiative coupling - Powering RFID tags: Passive, semi-passive, and
active- Real Time Location Systems.
UNIT III - RFID READERS
RFID Readers: Reader Forms- Reader Components- Reader Configurations-RFID communication:
Elements of Communication System- Elements of speech: medium and modulation- Language: packet
structure and commands - Access: medium access control (MAC)- Binary Tree Navigation- Slotted
Aloha- Interpretation: Object ID, context, sensor information, and business rules RFID Protocols.
UNIT IV - EPCGLOBAL DATA ARCHITECTURE
Electronic product code (EPC)- RFID reader protocol- Application Level Events (ALE)- EPC
Information Services (EPCIS)- Object Naming Service (ONS)- EPC Trust Services- EPC Discovery
Services
UNIT V - SECURING RFID DATA
Potential attacks:Skimming and eavesdropping- Protocol-based security- Encryption and mutual
authentication - Gen 2 standard: security measures - Frequencies and security- ePassports: standardized
security protocols- Physical security- Safeguarding personal privacy: Potential threats to personal privacy-
Regulatory measures.
-
REFERENCE BOOKS:
S.NO Author(s) Name Title of the book Publisher Year of Publication
1 Manish Bhuptani and
Shahram
Moradpour
Deploying Radio
Frequency Identification
Systems
Wiley Publishing
Inc,Indiana.
2005
2 Bill Glover and Himanshu Bhatt
Hardening Network
Security O'Reilly
Media,Inc.USA 2006
3 Eoghan Casey BS MA
Passive UHF RFID in
Practice Elsevier,Inc,USA 2008
http://www.amazon.com/s/ref=ntt_athr_dp_sr_2?_encoding=UTF8&sort=relevancerank&search-alias=books&field-author=Shahram%20Moradpourhttp://www.amazon.com/s/ref=ntt_athr_dp_sr_2?_encoding=UTF8&sort=relevancerank&search-alias=books&field-author=Shahram%20Moradpour
-
12MEIS211 DATABASE TECHNOLGY LAB
List of Experiments
1. Library Management System 2. Quiz System 3. Payroll System 4. HR Management System 5. Inventory Control System 6. e -Book 7. Online Banking 8. Online Ticket Reservation System 9. Online Shopping 10. Online Tax Payment System
-
SEMESTER III
12MEIS301 CYBER FORENSIC
INTENDED OUTCOMES:
To study the advance technologies in Cyber Forensic
To understand the basics of Cyber Forensic
To know the legal, ethical and professional issues in Cyber Security
UNIT I - INTRODUCTION
Basic Computer Terminology, Internet, Networking, Computer Storage, Cell Phone / Mobile Forensics,
Computer Ethics and Application Programs-Introduction to Cyber Forensics, Storage Fundamentals, File
System Concepts-Data Recovery, Operating System Software.Introduction to Encase Forensic Edition,
Forensic Tool Kit (FTK) , Use computer forensics software tools to cross validate findings in computer
evidence-related cases.
UNIT II -DATA AND EVIDENCE RECOVERY
Introduction to Deleted File Recovery, Formatted Partition Recovery, Data Recovery Tools, Data
Recovery Procedures and Ethics, Preserve and safely handle original media, Document a "Chain of
Custody", Complete time line analysis of computer files based on file creation, file modification and file
access, Recover Internet Usage Data, Recover Swap Files/ Temporary Files/ Cache Files.
UNIT III - CYBER CRIMES AND CYBER LAWS
Introduction to IT laws & Cyber Crimes Internet, Hacking, Cracking, Viruses, Virus Attacks,
Pornography, Software Piracy, Intellectual property, Legal System of Information Technology, Social
Engineering, Mail Bombs, Bug Exploits, and Cyber Security.
UNIT IV - CYBER FORENSICS INVESTIGATION Introduction to Cyber Forensic Investigation, Investigation Tools, eDiscovery, Digital Evidence
Collection, Evidence Preservation, E-Mail Investigation, E-Mail Tracking, IP Tracking, E-Mail Recovery,
Encryption and Decryption methods, Search and Seizure of Computers, Recovering deleted evidences,
Password Cracking
UNIT V - CYBER SECURITY
Introduction to Cyber Security, Implementing Hardware Based Security, Software Based Firewalls,
Security Standards, Assessing Threat Levels, Forming an Incident Response Team, Reporting Cyber
crime, Operating System Attacks, Application Attacks, Reverse Engineering & Cracking Techniques and
Financial Frauds
-
REFERENCE BOOKS:
S.NO Author(s) Name Title of the book Publisher Year of Publication
1 William L. Simon,Kevin D.
Mitnick
The Real Stories Behind the
Exploits of Hackers,
Intruders and Deceivers
Wiley
Publishing,Inc,Indi
ana
2005
2 Jack Wiles,Johnny Long,Russ
Rogers,Ron Green
Techno Security's Guide to
Managing Risks for IT
Managers, Auditors and
Investigators
First
Edition,Elsevier
Inc,USA.
2007
3 Alan Calder, Steve Watkins
Manager's Guide to Data
Security fourth Edition,
Kogan Page
Ltd,USA
2008
-
ELECTIVES
12MEISE01 THEORY OF COMPUTATION
INTENDED OUTCOMES:
To have a introductory knowledge of automata, formal language theory and computability.
To have an understanding of finite state and pushdown automata.
To have a knowledge of regular languages and context free languages.
To know the relation between regular language, context free language and corresponding recognizers.
To study the Turing machine and classes of problems.
UNIT I FINITE AUTOMATA AND REGULAR LANGUAGES
Finite Automata and Regular languages Regular expressions and Regular languages non determinism
and Kleenes theorem Equivalence of DFA and NFA Finite Automation with e-moves equivalence of
regular expression and NFA with e-moves pumping lemma for regular sets.
UNIT II CONTEXT FREE LANGUAGES
Context free languages Derivation and languages Relationship between derivation and derivation tree
Simplification of context free grammars Normal forms for context free grammars CNF and GNF.
UNIT III PUSH DOWN AUTOMATA (PDA)
Acceptance by PDA Pushdown automata and Context free languages Pumping lemma for CFL
deterministic Context free languages and Deterministic pushdown automata.
UNIT IV TURING MACHINE
Context sensitive languages and LBA Turing machine (Definition and examples) Computable
languages and functions Church Turing hypothesis Universal Turing machine P and NP problems
NP-complete.
UNIT V UNSOLVABLE PROBLEMS
Unsolvable problems Rice Theorem Post's correspondence Problem Recursive and recursively
enumerable languages.
-
TEXT BOOKS:
S.NO Author(s) Name Title of the book Publisher Year of Publications
1 Hopcroft and Ullman Introduction to Automata, Languages
and Computation (2nd Edition)
Narosa
Publishers, New
York.
2001
2 Peter Linz An Introduction to formal languages and
Automata (4th Edition)
Narosa
Publishing
House, New
Delhi.
2001
REFERENCE BOOKS:
S.NO Author(s) Name Title of the book Publisher Year of Publications
1 Natarajan A.M., Tamilarasi.A &
Balasubramani.B
Theory of Computation (3
rd Edition)
New age
International
publishers, New
Delhi
2002
2 Harry R. Lewis, Christos H.
Papadimitriou
Elements of Theory of
Computation (4
th Edition)
Prentice Hall, New
Delhi.
2002
-
12MEISE02 SOFT COMPUTING
INTENDED OUTCOMES:
To introduce the techniques of soft computing and adaptive neuro-fuzzy inferencing systems which differ from conventional AI and computing in terms of
its tolerance to imprecision and uncertainty.
To introduce the ideas of fuzzy sets, fuzzy logic and use of heuristics based on human experience
To become familiar with neural networks that can learn from available examples and generalize to form appropriate rules for inferencing systems
To provide the mathematical background for carrying out the optimization associated with neural network learning
UNIT I FUZZY SET THEORY
Introduction to Neuro Fuzzy and soft Computing Fuzzy Sets Basic Definition and Terminology
Set-theoretic operations Member Function Formulation and parameterization Fuzzy Rules and Fuzzy
Reasoning Extension principle and Fuzzy Relations Fuzzy If-Then Rules Fuzzy Reasoning Fuzzy
Inference Systems Mamdani Fuzzy Models Sugeno Fuzzy Models Tsukamoto Fuzzy Models
Input Space Partitioning and Fuzzy Modeling.
UNIT II OPTIMIZATION
Derivative-based Optimization Descent Methods The Method of steepest Descent Classical
Newtons Method Step Size Determination Derivative-free Optimization Genetic Algorithms
Simulated Annealing Random Search Downhill Simplex Search.
UNIT III NEURAL NETWORKS
Supervised Learning Neural Networks Perceptrons-Adaline Backpropagation Multilayer perceptrons
Radial Basis Function Networks Unsupervised Learning and Other Neural Networks Competitive
Learning Networks Kohonen Self Organizing Networks Learning Vector Quantization Hebbian
Learning.
UNIT IV NEURO FUZZY MODELING
Adaptive Neuro-Fuzzy Inference Systems Architecture Hybrid Learning Algorithm learning
Methods that Cross-fertilize ANFIS and RBFN Coactive Neuro-Fuzzy Modeling Framework
Neuron Functions for Adaptive Networks Neuro Fuzzy Spectrum.
UNIT V APPLICATION OF COMPUTATIONAL INTELLIGENCE
Printed Character Recognition Inverse Kinematics Problems Automobile Fuel Efficiency prediction
Soft Computing for Color Recipe Prediction.
-
TEXT BOOKS:
S.NO Author(s) Name Title of the book Publisher Year of Publication
1 Jang J.S.R., Sun.C.T and
Mizutani.E
Neuro-Fuzzy and Soft
Computing (5th Edition)
PHI, Pearson
Education, Asia.
2004
2 Timothy J.Ross Fuzzy Logic with Engineering Application
(2nd
Edition)
McGraw Hill, New
Delhi.
2004
REFERENCE BOOKS:
S.NO Author(s) Name Title of the book Publisher Year of Publication
1 Davis E.Goldberg Genetic Algorithms Search, Optimization and
Machine Learning (4
th Edition)
Addison Wesley,
New York.
2004
2 Rajasekaran S. and G.A.V.Pai
Neural Networks, Fuzzy
Logic and Genetic
Algorithms (5th Edition)
PHI, New Delhi 2003
3 Eberhart R. P.simpson and
R.Dobbins
Computational
Intelligence PC Tools (3
rd Edition)
AP Professional,
Boston.
2003
-
12MEISE03 MOBILE COMPUTING
INTENDED OUTCOMES:
To provide basics for various techniques in Mobile Communications and Mobile Content services.
1. To learn the basics of Wireless voice and data communications technologies. 2. To build working knowledge on various telephone and satellite networks. 3. To study the working principles of wireless LAN and its standards. 4. To build knowledge on various Mobile Computing algorithms. 5. To build skills in working with Wireless application Protocols to develop mobile
content applications
UNIT I INTRODUCTION
Medium Access Control Motivation for Specialized MAC SDMA FDMA DMACDMA
Comparison of Access mechanisms Tele communications GSM DECTTETRA UMTS IMT-200
Satellite Systems Basics Routing Localization Handover Broadcast Systems Overview Cyclic
Repetition of Data Digital Audio Broadcasting Digital Video Broadcasting.
UNIT II WIRELESS NETWORKS
Wireless LAN Infrared Vs Radio Transmission Infrastructure Networks Ad hoc Networks IEEE
802.11 HIPERLAN Bluetooth Wireless ATM Working Group Services Reference Model
Functions Radio Access Layer Handover- Location Management Addressing Mobile Quality of
Service Access Point Control Protocol.
UNIT III MOBILE NETWORK LAYER
Mobile IP Goals Assumptions and Requirement Entities IP packet Delivery Agent Advertisement
and Discovery Registration Tunneling and Encapsulation Optimization Reverse Tunneling IPv6
DHCP- Ad hoc Networks.
UNIT IV MOBILE TRANSPORT LAYER
Traditional TCP Indirect TCP Snooping TCP Mobile TCP Fast retransmit/ Fast Recovery
Transmission/ Timeout Freezing Selective Retransmission Transaction Oriented TCP.
UNIT V WAP
Architecture Datagram Protocol Transport Layer Security Transaction Protocol Session Protocol
Application Environment Wireless Telephony Application.
-
TEXT BOOKS:
S.NO Author(s) Name Title of the book Publisher Year of Publication
1 Schiller J Mobile Communication (5
th Edition)
Addison Wesley,
New York 2003
2 William Stallings Wireless Communication and
Networks (3rd
Edition)
Pearson Education,
Asia.
2003
3 Singhal WAP-Wireless Application Protocol
(2nd
Edition)
Pearson Education,
Asia.
2003
REFERENCE BOOKS:
S.NO Author(s) Name Title of the book Publisher Year of Publication
1 Lother Merk, Martin. S. Nicklaus and
Thomas Stober
Principles of Mobile Computing (2
nd Edition)
Springer, Asia 2003
2 William C.Y.Lee Mobile Communication Design Fundamentals
(4th Edition)
John Wiley, New
York.
2003
-
12MEISE04 DISTRIBUTED COMPUTING
INTENDED OUTCOMES:
To understand the basic concepts in distributing computing in operating systems
To enable the students to involve in research activities in recent trends
To make the students to get idea of distributed operating systems
UNIT I INTRODUCTION
Characterization of Distributed Systems Examples Resource Sharing and the Web Challenges
System Models Architectural and Fundamental Models Networking and Internetworking Types of
Networks Network Principles Internet Protocols Case Studies.
UNIT II PROCESSES AND DISTRIBUTED OBJECTS
Interprocess Communication The API for the Internet Protocols External Data Representation and
Marshalling Client-Server Communication Group Communication Case Study Distributed Objects
and Remote Invocation Communication Between Distributed Objects Remote Procedure Call
Events and Notifications Java RMI Case Study.
UNIT III OPERATING SYSTEM ISSUES I
The OS Layer Protection Processes and Threads Communication and Invocation OS Architecture
Security - Overview Cryptographic Algorithms Digital Signatures Cryptography Pragmatics
Case Studies Distributed File Systems File Service Architecture Sun Network File System The
Andrew File System.
UNIT IV OPERATING SYSTEM ISSUES II
Name Services Domain Name System Directory and Discovery Services Global Name Service
X.500 Directory Service Clocks, Events and Process States Synchronizing Physical Clocks Logical
Time And Logical Clocks Global States Distributed Debugging Distributed Mutual Exclusion
Elections Multicast Communication Related Problems.
UNIT V DISTRIBUTED TRANSACTION PROCESSING
Transactions Nested Transactions Locks Optimistic Concurrency Control Timestamp Ordering
Comparison Flat and Nested Distributed Transactions Atomic Commit Protocols Concurrency
Control in Distributed Transactions Distributed Deadlocks Transaction Recovery Overview of
Replication And Distributed Multimedia Systems.
-
TEXT BOOKS:
S.NO Author(s) Name Title of the book Publisher Year of Publication
1 George Coulouris, Jean Dollimore and Tim
Kindberg
Distributed Systems
Concepts and Design
(3rd Edition)
Pearson Education,
Asia 2002
2 Sape Mullender Distributed Systems (2nd Edition)
Addison Wesley,
New York.
REFERENCE BOOKS:
S.NO Author(s) Name Title of the book Publisher Year of Publication
1 Albert Fleishman Distributes Systems- Software Design and
Implementation (2nd
Edition)
Springer, Verlag,
New York 2004
2 Liu M.L Distributed Computing Principles
and Applications (3
rd Edition)
Pearson Education,
Asia.
2004
3 Andrew S Tanenbaum, Maartenvan Steen
Distributed Systems
Principles and Paradigms (4
th Edition)
Pearson Education,
Asia.
2002
4 Mugesh Singhal, Niranjan G Shivaratri
Advanced Concepts
in Operating Systems (5
th Edition)
Tata McGraw Hill,
New Delhi. 2001
-
12MEISE05 MULTIMEDIA SYSTEMS
INTENDED OUTCOMES:
To impart the fundamental concepts of Multimedia.
To study the multimedia concepts and various Applications.
To enable the students to develop their creativity
UNIT I INTRODUCTION AND QOS
Introduction QOS Requirements and Constraints Concepts Resources Establishment Phase
Runtime Phase Management Architectures.
UNIT II OPERATING SYSTEMS
Real-Time Processing Scheduling Interprocess Communication Memory and Management Server
Architecture Disk Management.
UNIT III FILE SYSTEMS AND NETWORKS
Traditional and Multimedia File Systems Caching Policy Batching Piggy backing Ethernet
Gigabit Ethernet Token Ring 100VG AnyLAN Fiber Distributed Data Interface (FDDI) ATM
Networks MAN WAN.
UNIT IV COMMUNICATION
Transport Subsystem Protocol Support for QOS Transport of Multimedia Computer
Supported Cooperative Work Architecture Session Management MBone Applications.
UNIT V SYNCHRONIZATION
Synchronization in Multimedia Systems Presentation Synchronization Types Multimedia
Synchronization Methods Case Studies MHEG MODE ACME.
-
TEXT BOOKS:
S.NO Author(s) Name Title of the book Publisher Year of Publication
1 Ralf Steinmetz and Klara Nahrstedt
Multimedia Systems (1
st Edition)
Springer, New
York. 2004
2 Rao, K. R.; Bojkovic, Zoran S.;
Milovanovic,
Dragorad A.
Multimedia
Communication
Systems Techniques,
Standards, and
Networks (3rd
Edition)
Prentice Hall, New
Delhi.
2002
REFERENCE BOOKS:
S.NO Author(s) Name Title of the book Publisher Year of Publication
1 Ralf Steinmetz and Klara Nahrstedt
Media Coding and
Content Processing (3
rd Edition)
Prentice hall, New
Delhi 2002
2 Vaughan T Multimedia (2
nd Edition)
Tata McGraw Hill,
New Delhi.
2000
3 Mark J.B., Sandra K.M
Multimedia
Applications
Development using
DVI Technology (4
th Edition)
Tata McGraw Hill,
New Delhi 2004
4 Rao K. R. , Zoran S. Bojkovic,
Dragorad A.
Milovacovic, D. A.
Milovacovic , Ze Nian Li and
Mark S. Drew
Fundamentals of
Multimedia (2
nd Edition)
Pearson education,
Asia.
2004
-
12MEISE06 XML AND WEB SERVICES
INTENDED OUTCOMES:
To impart the basic concepts of web services.
To study the XML techniques in real time application.
To study the security feature in web application.
UNIT I INTRODUCTION
Role Of XML XML and The Web XML Language Basics SOAP Web Services Revolutions Of
XML Service Oriented Architecture (SOA).
UNIT II XML TECHNOLOGY
XML Name Spaces Structuring With Schemas and DTD Presentation Techniques Transformation
XML Infrastructure.
UNIT III SOAP
Overview Of SOAP HTTP XML RPC SOAP Protocol Message Structure Intermediaries
Actors Design Patterns And Faults SOAP With Attachments.
UNIT IV WEB SERVICES
Overview Architecture Key Technologies UDDI WSDL ebXML SOAP And Web Services In
E Com Overview Of .NET And J2EE.
UNIT V XML SECURITY
Security Overview Canonicalization XML Security Framework XML Encryption XML Digital
Signature XKMS Structure Guidelines For Signing XML Documents XML In Practice.
-
TEXT BOOKS:
S.NO Author(s) Name Title of the book Publisher Year of Publication
1 Frank. P. Coyle XML, Web Services And The Data Revolution (2
nd Edition)
Pearson
Education,
Asia.
2002
REFERENCE BOOKS:
S.NO Author(s) Name Title of the book Publisher Year of Publication
1 Ramesh Nagappan, Robert Skoczylas
and Rima Patel
Sriganesh
Developing Java Web
Services (4th Edition)
Wiley Publishing
Inc, New York 2004
2 Sandeep Chatterjee, James Webber
Developing Enterprise Web
Services (4th Edition)
Pearson
Education, Asia 2004
3. McGovern, et al. Java Web Services Architecture (3
rd Edition)
Morgan
Kaufmann
Publishers, New
Delhi.
2005
-
12MEISE07 PARALLEL COMPUTING
INTENDED OUTCOMES:
To study the scalability & clustering issues, understand the technologies
used for parallel computation, study the different inter connection networks
and the different software programming models.
To study the scalability and clustering issues and the technology necessary
for them.
To understand the technologies enabling parallel computing.
To study the different types of interconnection networks.
To study the different parallel programming models.
UNIT I SCALABILITY AND CLUSTERING
Evolution of Computer Architecture Dimensions of Scalability Parallel Computer Models Basic
Concepts Of Clustering Scalable Design Principles Parallel Programming Overview Processes,
Tasks and Threads Parallelism Issues Interaction / Communication Issues Semantic Issues In
Parallel Programs.
UNIT- II ENABLING TECHNOLOGIES
System Development Trends Principles of Processor Design Microprocessor Architecture Families
Hierarchical Memory Technology Cache Coherence Protocols Shared Memory Consistency
Distributed Cache Memory Architecture Latency Tolerance Techniques Multithreaded Latency
Hiding.
UNIT- III SYSTEM INTERCONNECTS
Basics of Interconnection Networks Network Topologies and Properties Buses, Crossbar and
Multistage Switches, Software Multithreading Synchronization Mechanisms.
UNIT- IV PARALLEL PROGRAMMING
Paradigms And Programmability Parallel Programming Models Shared Memory Programming.
UNIT- V MESSAGE PASSING PROGRAMMING
Message Passing Paradigm Message Passing Interface Parallel Virtual Machine.
-
TEXT BOOK
Kai Hwang and Zhi.Wei Xu, 2003, Scalable Parallel Computing, Tata McGraw-Hill, New Delhi
REFERENCE BOOKS:
S.NO Author(s) Name Title of the book Publisher Year of Publication
1 David E. Culler & Jaswinder Pal
Singh
Parallel Computing
Architecture: A
Hardware/Software
Approach
Morgan
Kaufman
Publishers
2001
2 Michael J. Quinn Parallel Programming in C with MPI & OpenMP
McGraw-Hill,
New Delhi 2003
3. Kai Hwang Advanced Computer Architecture
Tata McGraw-
Hill, New Delhi 2003
-
12MEISE08 GRID COMPUTING
INTENDED OUTCOMES:
To understand the technology application and tool kits for grid computing
To understand the basic concepts of grid computing To know the application of grid computing To understanding the technology and tool kits to facilitated the grid computing
UNIT I GRID COMPUTING
Introduction Definition Scope of grid computing
UNIT II GRID COMPUTING INITIATIVES
Grid Computing Organizations and their roles Grid Computing analog Grid Computing road map.
UNIT III GRID COMPUTING APPLICATIONS
Merging the Grid sources Architecture with the Web Devices Architecture.
UNIT IV TECHNOLOGIES
OGSA Sample use cases OGSA platform components OGSI OGSA Basic Services.
UNIT V GRID COMPUTING TOOL KITS
Globus Toolkit Architecture, Programming model, High level services OGSI .Net middleware
Solutions.
TEXT BOOKS:
S.NO Author(s) Name Title of the book Publisher Year of Publication
1 Joshy Joseph & Craig Fellenstein
Grid Computing (4
th Edition)
PHI, Asia 2003
REFERENCE BOOKS:
S.NO Author(s) Name Title of the book Publisher Year of Publication
1 Ahmar Abbas Grid Computing A Practical Guide to
technology and
Applications (2nd
Edition)
Charles River
media, New York.
2003
-
12MEISE09 ROBOTICS
INTENDED OUTCOMES:
Robots are slowly and steadily replacing human beings in many fields. The aim of this course is to introduce the students into this area so that they
could use the same when they enter the industries.
The mathematics associated with the same.
Actuators and sensors necessary for the functioning of the robot.
UNIT -I ROBOTIC MANIPULATION
Robotic manipulation Automation and Robots Robot Classification Applications Robot
Specifications Notation. Direct Kinematics: The ARM Equation Dot and Cross products Coordinate
frames Rotations Homogeneous coordinates Link coordinates The arm equation A five-axis
articulated robot (Rhino XR-3) A four-axis SCARA Robot (Adept One) A six-axis articulated Robot
(Intelledex 660). Inverse Kinematics: Solving the arm equation The inverse kinematics problem
General properties of solutions Tool configuration Inverse kinematics of a five-axis articulated robot
(Rhino XR-3)
UNIT- II DYNAMIC OF ROBOTS
Workspace analysis and trajectory planning: Workspace analysis Work envelop of a five-axis
articulated robot Work envelope of a four-axis SCARA robot Workspace fixtures The pick-and-
place operation Continuous-path motion Interpolated motion Straight-line motion. Differential
motion and statics: Manipulator Dynamics: Lagranges equation Kinetic and Potential energy
Generalized force Lagrange -Euler dynamic model Dynamic model of a two-axis planar articulated
robot - Dynamic model of a three-axis SCARA robot Direct and Inverse dynamics Recursive Newton-
Euler formulation
UNIT- III ROBOT CONTROL
Robot control: The control problem State equation Constant solutions Linear feedback systems -
Single-axis PID control PD-Gravity control Computed-Torque control Variable-Structure control
Impedance control
UNIT- IV SENSORS AND ACTUATOR
Actuators - Introduction Characteristics of actuating systems Comparison of actuating systems
Hydraulic devices Pneumatic devices Electric motors Microprocessor control of electric motors
Magnetostricitve actuators Shape-memory type metals Speed reduction. Sensors Introduction
Sensor characteristics Position sensors Velocity sensors Acceleration sensors Force and pressure
sensors Torque sensors Microswitches Light and Infrared sensors Touch and Tactile sensors
Proximity sensors Voice Recognition devices Voice synthesizers Remote center compliance device.
UNIT- V VISION AND TASK PLANNING
Robot vision Image representation Template matching Polyhedral objects Shape analysis
-
Segmentation Iterative processing Perspective Transformations Structured illumination Camera
calibration. Task planning: Task-level programming Uncertainty Configuration space Gross-Motion
planning Grasp planning Fine-Motion planning Simulation of planar motion A task-planning
problem.
REFERENCE BOOKS:
S.NO Author(s) Name Title of the book Publisher Year of Publication
1 Saeed B.Niku Introduction to Robotics Analysis, Systems,
Applications
, Prentice Hall of
India Pvt. Ltd
2003
2 Robert J.Schilling Fundamentals of Robotics Analysis & Control
Prentice Hall of
India Pvt. Ltd.
2002
-
12MEISE10 EMBEDDED SYSTEMS INTENDED OUTCOMES:
To give sufficient background for undertaking embedded systems design.
To introduce students to the embedded systems, its hardware and software.
To introduce devices and buses used for embedded networking.
To explain programming concepts and embedded programming in C and C++.
To explain real time operating systems, inter-task communication and an exemplary case of MUCOS IIRTOS.
UNIT I INTRODUCTION TO EMBEDDED SYSTEMS
Definition and Classification Overview of Processors and hardware units in an embedded system
Software embedded into the system Exemplary Embedded Systems Embedded Systems on a Chip
(SoC) and the use of VLSI designed circuits
UNIT II DEVICES AND BUSES FOR DEVICES NETWORK
I/O Devices Device I/O Types and Examples Synchronous Iso synchronous and Asynchronous
Communications from Serial Devices Examples of Internal Serial Communication Devices UART
and HDLC Parallel Port Devices Sophisticated interfacing features in Devices/Ports Timer and
Counting Devices 12C, USB, CAN and advanced I/O Serial high speed buses ISA, PCI, PCI
X, cPCI and advanced buses.
UNIT III EMBEDDED PROGRAMMING
Programming in assembly language (ALP) vs. High Level Language C Program Elements, Macros and
functions Use of Pointers NULL Pointers Use of Function Calls Multiple function calls in a
Cyclic Order in the Main Function Pointers Function Queues and Interrupt Service Routines Queues
Pointers Concepts of EMBEDDED PROGRAMMING in C++ Objected Oriented Programming
Embedded Programming in C++, C Program compilers Cross compiler Optimization of memory
codes.
UNIT IV REAL TIME OPERATING SYSTEMS PART 1
OS Services Interrupt Routines Handling, Task scheduling models Handling of task scheduling and
latency and deadlines as performance metrics Inter Process Communication And Synchronisation
Shared data problem Use of Semaphore(s) Priority Inversion Problem and Deadlock Situations Inter
Process Communications using Signals Semaphore Flag or mutex as Resource key Message Queues
Mailboxes Pipes Virtual (Logical) Sockets RPCs.
UNIT V REAL TIME OPERATING SYSTEMS PART 2
Study of RTOS, VxWorks Basic Features Task Management Library at the System Library Header
File VxWorks System Functions and System Tasks Inter Process (Task) Communication Functions
Case Study of Coding for Sending Application Layer Byte Streams on a TCP/IP Network Using RTOS
Vxworks
-
TEXT BOOKS:
S.NO Author(s) Name Title of the book Publisher Year of Publication
1 Rajkamal Embedded Systems Architecture, Programming
and Design(2nd
Edition)
TATA McGraw
Hill, New Delhi 2003
REFERENCE BOOKS:
S.NO Author(s) Name Title of the book Publisher Year of Publication
1 David E.Simon An Embedded Software Primer (2
nd Edition)
Pearson Education
Asia 2000
-
12MEISE11 DIGITAL IMAGING
INTENDED OUTCOMES:
To understand the basic concepts of Digital image processing
To enable the students to analyze the details of image compression ans segmentataion
To make the students to understand image recognition and Interpretation
UNIT I DIGITAL IMAGE FUNDAMENTALS
Image formation, Image transforms fourier transforms, Walsh, Hadamard, Discrete cosine, Hotelling
transforms.
UNIT II IMAGE ENHANCEMENT & RESTORATION
Histogram modification techniques Image smoothening Image Sharpening Image Restoration
Degradation Model Noise models Spatial filtering Frequency domain filtering.
UNIT III IMAGE COMPRESSION & SEGMENTATION
Compression Models Elements of information theory Error free Compression Image segmentation
Detection of discontinuities Edge linking and boundary detection Thresholding Region based
segmentation Morphology.
UNIT IV REPRESENTATION AND DESCRIPTION
Representation schemes Boundary descriptors Regional descriptors Relational Descriptors
UNIT V OBJECT RECOGNITION AND INTERPRETATION
Patterns and pattern classes Decision Theoretic methods Structural methods.
-
TEXT BOOKS:
S.NO Author(s) Name Title of the book Publisher Year of Publication
1 Gonzalez.R.C & Woods. R.E
Digital Image Processing
(2nd Edition) Pearson Education, Asia.
2002
REFERENCE BOOKS:
S.NO Author(s) Name Title of the book Publisher Year of Publication
1 Anil Jain.K Fundamentals of Digital image Processing (2
nd
Edition)
Prentice Hall of
India, New Delhi 2002
2 Sid Ahmed Image Processing (5th Edition)
McGraw Hill, New
York 2002
-
12MEISE12 SOFTWARE QUALITY ASSURANCE
INTENDED OUTCOMES:
To introduce an integrated approach to software development incorporating quality assurance technologies.
To study the Software quality models
To study the Quality plan, implementation and documentation
To understand the Quality measurement and metrics and CASE Tools
UNIT I CONCEPTS
Concepts of Quality Control, Quality Assurance, Quality Management Total Quality Management; Cost
of Quality; QC tools 7 QC Tools and Modern Tools; Other related topics Business Process Re
engineering Zero Defect, Six Sigma, Quality Function Deployment, Benchmarking, Statistical process
control.
UNIT II SOFTWARE ENGINEERING CONCEPTS
Software Engineering Principles, Software Project Management, Software Process, Project and Product
Metrics, Risk Management, Software Quality Assurance; Statistical Quality Assurance Software
Reliability, Muse Model; Software Configuration Management; Software Testing; CASE (Computer
Aided Software Engineering).
UNIT III QUALITY ASSURANCE MODELS
Models for Quality Assurance ISO 9000 Series, CMM, SPICE, Malcolm Baldrige Award.
UNIT IV SOFTWARE QUALITY ASSURANCE RELATED TOPICS
Software Process Definition and implementation; internal Auditing and Assessments; Software testing
Concepts, Tools, Reviews, Inspections & Walkthroughts; P CMM.
UNIT V FUTURE TRENDS
PSP and TSP, CMMI, OO Methodology, Clean room software engineering, Defect injection and
prevention.
-
TEXT BOOKS:
S.NO Author(s) Name Title of the book Publisher Year of Publication
1 Roger Pressman Software Engineering (6th Edition)
McGraw Hill, New
Delhi 2005
2 Watts Humphery Managing Software Process (5
th Edition)
Addison Wesley,
New York 2001
REFERENCE BOOKS:
S.NO Author(s) Name Title of the book Publisher Year of Publication
1 Philip B Crosby Quality is Free The Art of Making Quality Certain (2
nd
Edition)
Mass Market, New
York 2002
-
12MEISE13 HIGH SPEED NETWORKS
INTENDED OUTCOMES:
To highlight the features of different technologies involved in High Speed Networking and their performance.
Students will get an introduction about ATM and Frame relay.
Students will be provided with an up-to-date survey of developments in High Speed Networks.
Enable the students to know techniques involved to support real-time traffic and congestion control.
Students will be provided with different levels of quality of service (Q.S) to different applications.
UNIT- I HIGH SPEED NETWORKS
Frame Relay Networks Asynchronous transfer mode ATM Protocol Architecture, ATM logical
Connection, ATM Cell ATM Service Categories AAL.
High Speed LANs: Fast Ethernet, Gigabit Ethernet, Fibre Channel Wireless LANs: applications,
requirements Architecture of 802.11
UNIT II CONGESTION AND TRAFFIC MANAGEMENT
Queuing Analysis- Queuing Models Single Server Queues Effects of Congestion Congestion
Control Traffic Management Congestion Control in Packet Switching Networks Frame Relay
Congestion Control.
UNIT- III TCP AND ATM CONGESTION CONTROL
TCP Flow control TCP Congestion Control Retransmission Timer Management Exponential RTO
backoff KARNs Algorithm Window management Performance of TCP over ATM.Traffic and
Congestion control in ATM Requirements Attributes Traffic Management Frame work, Traffic
Control ABR traffic Management ABR rate control, RM cell formats, ABR Capacity allocations
GFR traffic management.
UNIT -IV INTEGRATED AND DIFFERENTIATED SERVICES
Integrated Services Architecture Approach, Components, Services- Queuing Discipline, FQ, PS, BRFQ,
GPS, WFQ Random Early Detection, Differentiated Services
UNIT- V PROTOCOLS FOR QOS SUPPORT
RSVP Goals & Characteristics, Data Flow, RSVP operations, Protocol Mechanisms Multiprotocol
Label Switching Operations, Label Stacking, Protocol details RTP Protocol Architecture, Data
Transfer Protocol, RTCP.
-
REFERENCE BOOKS:
S.NO Author(s) Name Title of the book Publisher Year of Publication
1 Warland & Pravin Varaiya
High Performance
Communication Networks Jean Harcourt Asia
Pvt. Ltd
2001
2 Irvan Pepelnjk, Jim Guichard and Jeff
Apcar
MPLS and VPN
architecture
3 William Stallings High Speed Networks And Internet
Pearson Education 2002
-
12MEISE14 DATA WAREHOUSING AND DATA MINING
INTENDED OUTCOMES:
To serve as an introductory course to under graduate students with an emphasis on the design aspects of Data Mining and Data Warehousing
To introduce the concept of data mining with in detail coverage of basic tasks, metrics, issues, and implication. Core topics like classification, clustering and
association rules are exhaustively dealt with.
To introduce the concept of data warehousing with special emphasis on architecture and design.
UNIT I INTRODUCTION
Relation To Statistics, Databases Data Mining Functionalities Steps In Data Mining Process
Architecture Of A Typical Data Mining Systems Classification Of Data Mining Systems Overview
Of Data Mining Techniques.
UNIT II DATA PREPROCESSING AND ASSOCIATION RULES
Data Preprocessing Data Cleaning, Integration, Transformation, Reduction, Discretization Concept
Hierarchies Concept Description Data Generalization And Summarization Based Characterization
Mining Association Rules In Large Databases.
UNIT III PREDICTIVE MODELING
Classification And Prediction Issues Regarding Classification And Prediction Classification By
Decision Tree Induction Bayesian Classification Other Classification Methods Prediction Clusters
Analysis Types Of Data In Cluster Analysis Categorization Of Major Clustering Methods Partitioning
Methods Hierarchical Methods
UNIT IV DATA WAREHOUSING
Data Warehousing Components Multi Dimensional Data Model Data Warehouse Architecture
Data Warehouse Implementation Mapping The Data Warehouse To Multiprocessor Architecture
OLAP. Need Categorization Of OLAP Tools.
UNIT V APPLICATIONS
Applications of Data Mining Social Impacts Of Data Mining Tools An Introduction To DB Miner
Case Studies Mining WWW Mining Text Database Mining Spatial Databases.
-
TEXT BOOKS:
S.NO Author(s) Name Title of the book Publisher Year of Publication
1 Jiawei Han, Micheline Kamber
Data Mining Concepts and
Techniques (4th Edition)
Morgan Kaufmann
Publishers, New
York
2002
2 Alex Berson, Stephen J. Smith
Data Warehousing, Data
Mining,& OLAP (2nd
Edition)
Tata McGraw
Hill, New Delhi.
2004
REFERENCE BOOKS:
S.NO Author(s) Name Title of the book Publisher Year of Publication
1 Usama M.Fayyad, Gregory Piatetsky
Shapiro, Padhrai
Smyth And
Ramasamy Uthurusamy
Advances In Knowledge
Discovery And Data
Mining(3rd
Edition)
The M.I.T Press,
Calcutta 2004
2 Ralph Kimball The Data Warehouse Life Cycle Toolkit (2
nd Edition)
John Wiley & Sons
Inc, New York 2004
3 Sean Kelly Data Warehousing In Action (4
th Edition)
John Wiley & Sons
Inc., New York.
2004
-
12MEISE15 PERFORMANCE EVALUATION OF COMPUTER SYSTEMS
AND
NETWORKS
INTENDED OUTCOMES:
To understand the performance Evaluation Techniques
To study the fundamentals ofprobability and Queuing theory used for evaluating the systems performance
To study the algorithm used in analysis of network performance.
UNIT I INTRODUCTION
Need for performance evaluation Role of performance evaluation performance evaluation Methods
Performance Metrics and Evaluation Criteria CPU and I/O Architectures Distributed and Network
Architectures Secondary Storage Topologies Computer Architecture Fundamental Concepts and
Performance Measures.
UNIT II PROBABILITY AND STOCHASTIC PROCESSES
Scheduling Algorithms Workloads Random Variables Probability Distributions Densities
Expectation Stochastic Processes Poisson Process Birth Death Process Markov Process.
UNIT III QUEUING THEORY
Queuing Systems Networks of Queues Estimating Parameters and Distributions Computational
Methods Simulation Process Time Control Systems and Modeling.
UNIT IV PETRI NETS AND SYSTEM PERFORMANCE
Petri Nets Classical Petri Nets Timed Petri Nets Priority based Petri Nets Colored Petri Nets
Generalized Petri Nets Tool Selection Validation of Results Performance Metrics Evaluation
Multiple Server Computer System Analysis.
UNIT V ANALYSIS
OS Components System Architecture Workloads Design Simulation Analysis Database
System Performance Computer Networks Components Simulation Modelling of LAN.
-
TEXT BOOKS:
S.NO Author(s) Name Title of the book Publisher Year of Publication
1 Paul J. Fortier, Howard E. Michael
Computer Systems
Performance Evaluation
and Prediction (4th Edition)
Elsvier Science,
USA.
2003
2 Thomas G. Robertazzi
Computer Networks and
Systems Queing theory and Performance Evaluation
(3rd Edition)
Springer, New
York. 2003
REFERENCE BOOKS:
S.NO Author(s) Name Title of the book Publisher Year of Publication
1 Domenico Ferrari, Giuseppe Serazzi,
Alexandro Zeijher
Measurement & Tuning of
Computer Systems Prentice Hall Inc,
New Delhi.
2004
2 Michael F.Mories and Paul F.Roth
Tools and techniques,
Computer Performance Evaluation (4
th Edition)
Van Nostrand, New
York.
2000
-
12MEISE16 AGENT BASED INTELLIGENT SYSTEMS
INTENDED OUTCOMES:
Artificial Intelligence aims at developing computer applications, which encompasses perception, reasoning and learning and to provide an in-depth
understanding of major techniques used to simulate intelligence.
To provide a strong foundation of fundamental concepts in Artificial Intelligence
To provide a basic exposition to the goals and methods of Artificial Intelligence
To enable the student to apply these techniques in applications which involve perception, reasoning and learning.
UNIT I INTRODUCTION
Definitions Foundations History Intelligent Agents Problem Solving Searching Heuristics
Constraint Satisfaction Problems Game playing.
UNIT II KNOWLEDGE REPRESENTATION AND REASONING
Logical Agents First order logic First Order Inference Unification Chaining Resolution
Strategies Knowledge Representation Objects Actions Events
UNIT III PLANNING AGENTS
Planning Problem State Space Search Partial Order Planning Graphs Nondeterministic Domains
Conditional Planning Continuous Planning MultiAgent Planning.
UNIT IV AGENTS AND UNCERTAINITY
Acting under uncertainty Probability Notation Bayes Rule and use Bayesian Networks Other
Approaches Time and Uncertainty Temporal Models Utility Theory Decision Network
Complex Decisions.
UNIT V HIGHER LEVEL AGENTS
Knowledge in Learning Relevance Information Statistical Learning Methods Reinforcement
Learning Communication Formal Grammar Augmented Grammars Future of AI.
-
TEXT BOOKS:
S.NO Author(s) Name Title of the book Publisher Year of Publication
1 Stuart Russell and Peter Norvig
Artificial Intelligence A
Modern Approach (2nd
Edition)
Prentice Hall, New
Delhi 2002
2 Michael Wooldridge An Introduction to Multi Agent System (4
th Edition)
John Wiley, New
York 2002
REFERENCE BOOKS:
S.NO Author(s) Name Title of the book Publisher Year of Publication
1 Patrick Henry Winston
Artificial Intelligence (3rd
Edition) AW, New York 2002
2 Nils.J.Nilsson Principles of Artificial Intelligence (2
nd Edition)
Narosa Publishing
House, New Delhi 2000
-
12MEISE17 VISUALIZATION TECHNIQUES
INTENDED OUTCOMES:
To understand the basic visualization techniques
To study the basic principles of 2D and 3D Graphics
To study the fundamental concepts of virtual realization systems design
UNIT I INTRODUCTION
Introduction to Visualisation Principles of 2D & 3D Computer Graphics Models and Simulation
strategies.
UNIT II POPULAR TECHNIQUES
Surface Plots City scopes Fish eye views Benediktine Space Perspective walls Cone trees and
Cam trees Sphere Visualisation Rooms Emotical icons.
UNIT III ADVANCED TECHNIQUES
Self Organising graphs Spatial Data arrangements Benediktine Cyberspace Statistical Clustering
and Proximity measures Hyper Structures Human Centered Approaches Information Cube.
UNIT IV VISUALIZATION SYSTEMS
Database Visualisation Populated Information Terrains Legibility enhancement Hyper structure
Visualisation Information Visualisation.
UNIT V SOFTWARE VISUALIZATION
Rapid Prototyping Models for user interaction Formal Specification of Software DFD Software
Architecture.
-
TEXT BOOKS:
S.NO Author(s) Name Title of the book Publisher Year of Publication
1 Chaomei Chan Information Visualisation and Virtual Environment
(2nd
Edition)
Springer Verlag,
New York 2002
REFERENCE BOOKS:
S.NO Author(s) Name Title of the book Publisher Year of Publication
1 Benedikt.M Cyberspace First Steps (3rd Edition)
MIT Press, New
Delhi 2004
2 Pauline Wills Visualisation A Beginner's Guide (5
th Edition)
Hodder &
Stoughton, New
Delhi.
2002
3 Sheryl A Sorby exal 3D Visualisation for Engineering Graphics (3
rd
Edition)
Prentice Hall, New
Delhi 2002
-
12MEISE18 ADVANCED DATABASES
INTENDED OUTCOMES:
Advanced database aims at developing computer application with different kinds of data models. It is also deals with the Transaction management of these
different databases.
To study the needs of different databases.
To understand about different data models that can be used for these databases.
To make the students to get familiarized with transaction management of the database
To develop in-depth knowledge about web and intelligent database.
.
UNIT I DATABASE MANAGEMENT
Relational Data Model SQL Database Design Entity Relationship Model Relational
Normalization Embedded SQL Dynamic SQL JDBC ODBC.
UNIT II ADVANCED DATABASES
Object Databases Conceptual Object Data Model XML and Web Data XML Schema Distributed
Data bases OLAP and Data Mining ROLAP and MOLAP
UNIT III QUERY AND TRANSACTION PROCESSING
Query Processing Basics Heuristic Optimization Cost, Size Estimation Models of Transactions
Architecture Transaction Processing in a Centralized and Distributed System TP Monitor.
UNIT IV IMPLEMENTING AND ISOLATION
Schedules Concurrency Control Objects and Semantic Commutativity Locking Crash, Abort and
Media Failure Recovery Atomic Termination Distributed Deadlock Global Serialization
Replicated Databases Distributed Transactions in Real World.
UNIT V DATABASE DESIGN ISSUES
Security Encryption Digital Signatures Authorization Authenticated RPC Integrity
Consistency Database Tuning Optimization and Research Issues.
-
TEXT BOOKS:
S.NO Author(s) Name Title of the book Publisher Year of Publication
1 Elmasri R. and S.B. Navathe
Fundamentals of Database
Systems (3rd Edition) Addison Wesley,
New York 2004
2 Abraham Silberschatz, Henry.
F. Korth,
S.Sudharsan
Database System Concepts (4thEdition)
Tata McGraw Hill,
New Delhi.
2004
REFERENCE BOOKS:
S.NO Author(s) Name Title of the book Publisher Year of Publication
1 Philip M. Lewis, Arthur Bernstein,
Michael Kifer
Databases and Transaction Processing An Application
Oriented Approach(2nd
Edition)
Addison Wesley,
New York 2002
2 Raghu Ramakrishnan & Johannes Gehrke
Database Management
Systems (3rd Edition)
TMH, New Delhi 2003
-
12MEISE19 SOFTWARE PROJECT MANAGEMENT
INTENDED OUTCOMES:
To build knowledge on software project management
To provide a strong foundation on concept of software process.
To understand the software management disciplines.
UNIT I INTRODUCTION
Conventional Software Management Evolution of Software Economics Improving Software
Economics Conventional versus Modern Software Project Management
UNIT II SOFTWARE MANAGEMENT PROCESS FRAMEWORK
Lifecycle Phases Artifacts of the Process Model Based Software Architectures Workflows of the
Process Checkpoints of the Process
UNIT III SOFTWARE MANAGEMENT DISCIPLINES
Iterative Process Planning Organisation and Responsibilities Process Automation Process Control
and Process Instrumentation Tailoring the Process
UNIT IV MANAGED AND OPTIMIZED PROCESS
Data Gathering and Analysis Principles of Data Gathering, Data Gathering Process, Software Measures,
Data Analysis Managing Software Quality Defect Prevention
UNIT V CASE STUDIES
COCOMO Cost Estimation Model Change Metrics CCPDS R
-
TEXT BOOKS:
S.NO Author(s) Name Title of the book Publisher Year of Publication
1 Walker Royce Software Project Management A Unified
Framework (5th Edition)
Pearson Education,
Asia. 2004
2 Bob Hughes, Mikecotterell
Software Project
Management (3rd Edition) Tata McGraw Hill, New
Delhi.
2004
REFERENCE BOOKS:
S.NO Author(s) Name Title of the book Publisher Year of Publication
1 Humphrey, Watts Managing the software process (3
rd Edition)
Addison Wesley,
New York 2001
2 Ramesh Gopalaswamy
Managing Global Projects
(3rd
Edition) Tata McGraw Hill,
New Delhi 2001
-
12MEISE20 COMPONENT BASED TECHNOLOGY
INTENDED OUTCOMES:
To introduce different software components and their application.
Introduces in depth JAVA, Corba and .Net Components
Deals with Fundamental properties of components, technology and architecture and middleware.
Component Frameworks and Development are covered in depth.
UNIT I INTRODUCTION
Software Components objects fundamental properties of Component technology modules
interfaces callbacks directory services component architecture components and middleware.
UNIT II JAVA COMPONENT TECHNOLOGIES
Threads Java Beans Events and connections properties introspection JAR files reflection
object serialization Enterprise Java Beans Distributed Object models RMI and RMI IIOP.
UNIT III CORBA TECHNOLOGIES
Java and CORBA Interface Definition language Object Request Broker system object model
portable object adapter CORBA services CORBA component model containers Application server
model driven architecture.
UNIT IV COM AND .NET TECHNOLOGIES
COM Distributed COM object reuse interfaces and versioning dispatch interfaces connectable
objects OLE containers and servers Active X controls .NET components assemblies appdomains
contexts reflection remoting.
UNIT V COMPONENT FRAMEWORKS AND DEVELOPMENT
Connectors contexts EJB containers CLR contexts and channels Black Box component framework
directory objects cross development environment component oriented programming
Component design and implementation tools testing tools assembly tools.
-
TEXT BOOKS:
S.NO Author(s) Name Title of the book Publisher Year of Publication
1 Clemens Szyperski Component Software Beyond Object Oriented
Programming (2nd Edition)
Addison Wesley,
New York 2002
REFERENCE BOOKS:
S.NO Author(s) Name Title of the book Publisher Year of Publication
1 Ed Roman Enterprise Java Beans (3rd Edition)
Wiley, New York. 2004
2 Andreas Vogel, Keith Duddy
Java Programming with
CORBA (3rd
Edition) John Wiley &
Sons, New York 2001
3 Corry, Mayfield, Cadman
COM/DCOM Primer Plus (1st Edition)
Tec media, New
Delhi 2004
-
12MEISE021 QUANTUM COMPUTING
INTENDED OUTCOMES:
To understand the fundamental principles of quantum computing.
To understand the building blocks of a quantum computer.
To understand the principles, quantum information and limitation of quantum operations formalizing.
UNIT -I FUNDAMENTAL CONCEPTS
Global Perspectives, Quantum Bits, Quantum Computation, Quantum Algorithms, Quantum Information,
Postulates of Quantum Mechanisms.
UNIT- II QUANTUM COMPUTATION
Quantum Circuits Quantum algorithms, Single Orbit operations, Control Operations, Measurement,
Universal Quantum Gates, Simulation of Quantum Systems, Quantum Fourier transform, Phase
estimation, Applications, Quantum search algorithms Quantum counting Speeding up the solution of
NP complete problems Quantum Search for an unstructured database.
UNIT- III QUANTUM COMPUTERS
Guiding Principles, Conditions for Quantum Computation, Harmonic Oscillator Quantum Computer,
Optical Photon Quantum Computer Optical cavity Quantum electrodynamics, Ion traps, Nuclear
Magnetic resonance.
UNIT- IV QUANTUM INFORMATIONS
Quantum noise and Quantum Operations Classical Noise and Markov Processes, Quantum Operations,
Examples of Quantum noise and Quantum Operations Applications of Quantum operations, Limitations
of the Quantum operations formalism, Distance Measures for Quantum information.
UNIT- V QUANTUM ERROR CORRECTION
Introduction, Shor code, Theory of Quantum Error Correction, Constructing Quantum Codes, Stabilizer
codes, Fault Tolerant Quantum Computation, Entropy and information Shannon Entropy, Basic
properties of Entropy, Von Neumann, Strong Sub Additivity, Data Compression, Entanglement as a
physical resource.
REFERENCE BOOKS:
S.NO Author(s) Name Title of the book Publisher Year of Publication
1 Dan C. Marinescu,
Gabriela M.
Marinescu
Approaching Quantum
Computing 2005
2 Micheal A. Nielsen. & Issac L. Chiang
Quantum Computation and
Quantum Information Cambridge
University Press
2002
-
12MEISE22 ENTERPRISE JAVA (J2EE)
INTENDED OUTCOMES:
To provide fundamental ideas on Java required to implement Real Time Application
To enable the students to understand the concepts in Enterprise Java
By building sample applications, the student will get experience and be ready for large-scale projects
UNIT I INTRODUCTION
J2EE and J2SE The Birth of J2EE Databases The Maturing of Java Ja