IT-221 Discrete Structures (3-0-0) 3 Logic Introduction to Logic, Propositional Logic and Predicate Logic !ro"ositional Logic Elements of Propositional Logic, Truth Table, Connectives, Construction of Proposition, Converse and Contrapositive, Reasoning with Propositions, Identities of Propositions and Dual, Use of Identities, Implications, Reasoning with Propositions, Proof of Identities, Proof of Implications !re#icate Logic !ell "ormed "ormula #!ff$ of Predicate Logic, Predicate, %uantification, Constructing "ormulas, Reasoning with Predicate Logic, %uantifiers and Connectives Set an# $unctions& 'ets, relations, functions, operations, and e(uivalence Relations, relation of partial order, partitions, binar) relations, E(uivalence relations Recursion, Proof b) Induction %um&er-theoretic algorithms& *reatest Common Divisor, Chinese Remainder Theorem, Primalit) testing, pol)nomial representation of binar) number, *alois fields, primitive roots, discrete logarithms Te't( )eferences + ,olman -, -usb) R& Discrete Mathematical Structures for Compute Science, P.I / Liu& Introduction to Discrete Mathemetics, 0c*raw1.ill 2 *raham, ,nuth, Pratshni3 & Concrete Mathematics 4 *rimaldi& Discrete Mathematical Structures 5 *rossman P, Discrete Mathematics for Computing, 0acmillan +665 7 Ross ,8 9 !right CR-, Discrete Mathematics, Prentice1.all +666 : ;ohnsonbaugh R, Discrete Mathematics, 0acmillan < !iitala, Discrete Mathematics, 0c*raw .ill 6 -iggs = L, Discrete Mathematics, >?ford +@ Truss ;, Discrete Mathematics for Computer Scientists, 8ddison !esle) IT-223 Data Structures an# *lgorithms (3-0-0) 3 Introduction to data structures, d)namic aspects of operations on data, anal)sis of algorithms Creation and manipulation of data structures& arra)s, lists, stac3s, (ueues, trees, graphs, heaps, hashing and hash tables, height balanced trees, tries 8lgorithms and data structures for sorting and searching, merging, graph traversals, shortest path and minimum spanning tree, order statistics, data structures for images, greed) algorithms, d)namic programming, algorithms1 data structures dependenc), introduction to comple?it) anal)sis and measures 'pecial topics from problems in computational geometr) and string matching Te't( )efernces& + ,ruse RL, Data 'tructure and Program Design, P.I / Rivest, Cormen, Introduction to 8lgorithms, 0IT Press 2 .orowitA and 'ahni& Data 'tructure in CBB , *lagotia 4 Ellis .orowitA, 'artaC 'ahni, "undamentals of Data 'tructures 5 8aron 0 Tenenbaum, D Langsam, 0oshe ; 8ugenstein, Data 'tructures Using C IT-22+ $ormal Languages an# *utomata Theory (3-0-0) 3 Introduction to formal languages and their operations, abstract machines "inite automata and regular e?pressions, =on1deterministic finite automata, 0eal) and 0oore machines, minimiAation of finite automata, Pumping lemma for regular languages Choms3) classification of languages, regular grammars, conte?t free grammars, simplification of conte?t free grammars, =ormal forms of conte?t free grammars Push Down 8utomata Theor)& Push down automata and conte?t free languages, Pumping lemma for conte?t free languages Turing h)pothesis, Turing machine, 0ins3e)Es theorem, T0 variation and encoding, computabilit) and acceptabilit) Te't( )eferences + .opcroft, 0otwani and Ullman& Introduction to Automata Theory, Languages and Computation, Pearson Education / Cohen& Introduction to Computer Theory, 8ddison !esle) 2 0artin& Introduction to Languages and Theory of Computation, TMH. IT-2+1 Data Structure an# *lgorithm La& (0-0-3) 2 The following proposed coverage are broad guiding areas in lab The instructor offering the course in consultation with the theor) offered can adopt further variations in tune with IT1//2 + Implementation of e?periments with, basic data structures and use in d)namic operations on data for different algorithms and problem domainsF / 8nal)sis of basic sorting and searching algorithms and their relationship to these data structures Comparison of as)mptotic comple?it) with real behaviour of algorithmsF 2 'orting programs& -ubble sort, 0erge sort, Insertion sort, 'election sort, and %uic3 sort 4 'earching programs& Linear 'earch, -inar) 'earch 5 8rra) implementation of 'tac3, %ueue, Circular %ueue, Lin3ed List 7 Implementation of 'tac3, %ueue, Circular %ueue, Lin3ed List using d)namic memor) allocation : Implementation of -inar) tree < Program for Tree Traversals #preorder, inorder, postorder$ 6 Program for graph traversal #-"', D"'$ +@ Program for minimum cost spanning tree, shortest path Te't( )eferences& + ,ruse RL, Data 'tructure and Program Design, P.I / Rivest, Cormen, Introduction to 8lgorithms, 0IT Press 2 .orowitA and 'ahni& Data 'tructure in CBB , *lagotia 4 Ellis .orowitA, 'artaC 'ahni, "undamentals of Data 'tructures 5 8aron 0 Tenenbaum, D Langsam, 0oshe ; 8ugenstein, Data 'tructures Using C ,--2+1 ,lectronics De.ices an# -ircuits (3-0-2) / - 8s offered b) the ECE Department ,--2+3 S0itching Theory 1 $inite *utomata (3-0-0) 3 - 8s offered b) the ECE Department 2"en ,lecti.e I (3-3-3) 3(/ Please refer to concerned Department B.Tech Information Technology Semester I4 5$-201 5umanities an# Social Sciences (3-3-3) 2 Please refer to .umanities and 'ocial 'ciences Department IT-222 Data Base 6o#elling an# *#ministration (/-0-0) / Design& Conceptual design, three tier architecture, ER Diagram G entit) #strong and wea3$, Data aggregation, specialiAation, generaliAation Data models& Relational, =etwor3, .ierarchical and >bCect >riented =ormaliAation& Constraints G integrit) and domain, Primar) 3e), 'uper 3e), foreign 3e), 8lternate 3e), candidate 3e), normal forms +=", /=", 2=", -C=", 4=" '%L& DDL and D0L, Relational 8lgebra, '%L %ueries, Triggers and views, Constraints assertions Data >rganiAation& 'e(uential, inde?ed random and hashed files Inverted and multilist structures, - trees, -B trees, %uer) >ptimiAation, ;oin 8lgorithm, 'tatistics and Cost -ase optimiAation D-0' internals& Transaction Processing, concurrenc) control, and recover) management Transaction model properties and state serialisabilit) , Loc3 base protocols, two phase loc3ing Te't()eferences& + 8lmasri and '- =avathe& Fundamentals of Dataase Systems, 8ddison !esle) / ,evine ,line, '%L in =utshell, >EReill) 9 8ssociates 2 Raghu Rama3rishnan, ;ohannes *ehr3e Database 0anagement ')stems, 0c*raw .ill 4 ." ,orth, 'ilberschatA, 'udarshan& Dataase Systems Concepts, 0c*raw .ill 5 C; Date& Data !ase Design, 8ddison !esle) 7 .ansen and .ansen & D!M and Design, P.I IT-22/ 2"erating System (3-0-0) 3 >perating ')stem >verview& >perating ')stems obCectives 9 functions, the evolution of operating ')stems, 0aCor 8chievements, E?amples of >perating s)stems Process Description 9 Control& Process states, Process Description, Process Control, and Processes 9 Threads Concurrenc)& 0utual E?clusion 9 ')nchroniAation Principles of Concurrenc), 0utual E?clusion1'oftware 8pproaches *raphical User Interface 9 >'& Introduction, !indowing Technolog), *UI, Relationship between the >' 9 !indows, Components of *UI, and Re(uirement of a !indows based *UI, 0'1!I=D>!' 9 =T, and !indows /@@@ Introduction to U=IH >perating s)stem Te't()eferences + 0odern >perating ')stems b) Tanembaum #P.I$ / >perating ')stem Concepts1 8braham 'ilberchatA, Peter - *alvin, *reg *agne :th Edition, ;ohn !ile) 2 ')stems Programming 9 >perating ')stems #'econd Edition$ b) Dhamdhere #T0.$ IT-227 -om"uter *rchitecture (3-0-0) 3 Intro#uction to com"uter architecture an# organi8ation Digital components, Ion =eumann 0achine 8rchitecture, "l)nn Classification )egister Transfer Language& 0icro operations 1 data transfer operations, arithmetic, logic and shift micro operations and their hardware implementations as a simple 8rithmetic and logic unit -!9 2rgani8ation& 8ddressing techni(ues 1 Immediate, direct, indirect, register, register indirect, inde?, relative and stac3 addressing techni(ues Instruction formats& Instruction set design, Instruction t)pes& e?ample for Aero address, one address, two address and three address machines, 'tac3, accumulator and general purpose register organiAation *rithmetic *lgorithms& 8rithmetic and Logic Unit, 8dders 1 "ull adder, Ripple carr) adder, Carr) loo3 ahead adder, Carr) select adder, carr) save adder, 0ultiplication 1 8dd and 'hift method, -oothJs 0ultiplier,m 8rra) 0ultiplier, Division 1 Restoring and =on restoring method !i"elining Pipeline structure, pipeline performance measures, Pipeline t)pes 1 Instruction and 8rithmetic pipelines 6emory 2rgani8ation 0emor) device characteristics, R80 organiAation& +D and /D organiAation, Iirtual memor) 1 Paging and 'egmentation, .igh speed memories& 8ssociative and Cache memor) Control Unit Design, .ardwired and 0icro programmed control unit design implementation techni(ues In"ut-2ut"ut Design I> interface, -us structure, 0odes of data transfer, Interrupts, Input >utput Processor, 'erial Communication Te't()eferences + Computer 8rchitecture& 8 %uantitative 8pproach, ;L .enness) and D8 Patterson, 4 th Edition Elsevier IT-2+2 DB6S La& (0-0-3) 2 The following proposed coverage are broad guiding areas lab The instructor offering the course in consultation with the theor) offered can adopt further variations in tune with IT1/// + Conceptual designs using ER diagrams / Design of databases -ased on templates, files and relational basis 2 Development and implementation of D- s)stem from the fundamentals 4 E?periments on '%L (ueries IT-2+/ 2S La& (0-0-3) 2 The following proposed coverage are broad guiding areas in lab The instructor offering the course in consultation with the theor) offered can adopt further variations in tune with IT1//4 + !rite shell scripts for #i$ multiplication table generation, #ii$ cop)ing multiple files to a director), #iii$ counting the number of lines and words present in a given file, #iv$ displa)s the list of all the files in a given director) / !rite a shell script to implement small calculator G addition, subtraction, multiplication and division of two integers Division has two options& one returns the (uotient and the other returns remainder 2 !rite a shell script to reverse the rows and column of a matri? 4 !rite a C program to implement CPU 'cheduling 5 !rite a C program to page replacement algorithms 7 !rite a C program to implement virtual memor) : !rite a C program using for3#$ to illustrate process management < !rite a C program to implement concurrent programming constructs through semaphores G dining philosophersE problem, consumer1producer, readers1writers etc 6 !rite a C program that inllustrate how to e?ecute two commands concurrentl) with a command pipe +@ !rite a C program to implement deadloc3 avoidance algorithms Te't()eferences& + Uni? concepts and applicaions b) 'umitbha Das,T0. applications / Uni? Programming b) stevens, Pearsons Education 2 'hell Programming b) Dashwant ,anet3ar 4 >perating ')stem concepts b) silberschatA, and Peter *alvin 2"en ,lecti.e II (3-3-3) 3(/ Please refer to concerned Department B.Tech Information Technology Semester 4 IT-321 Information System Security (3-0-0) 3 )e.ie0 of %um&er theory& Prime numbers, modular arithmetic, "ermatEs theorem, EulerEs theorem, Chinese remainder theorem, Discrete logarithms, Random number, prime number, factoring, -ry"togra"hy Classical, stream and bloc3 cipher, steganograph) Public vKs private 3e) cr)ptograph) )an#om %um&er :eneration Pseudo Random =umber, PR=*, L"'R, -lum1-lum 'hub generator !ri.ate-;ey cry"togra"hy& "eistel structure, DE', design of '1bo?es, 8E', Triple DE' !u&lic ;ey cry"togra"hy ,e) management, ,e) e?change G Diffie1.ellman, El1*amal, 0er3leJs PuAAle, 8uthentication, 'ignatures, Deniabilit), R'8 Threshol# -ry"rogra"hy& 'haring 'ecrets Digital Signature D'8 and its variants, discrete logarithm based digital signatures 2ne-0ay hash functions G 0D5, '.8 #'ecure .ash 8lgorithm$ -ry"tanalysis Differential and linear cr)ptanal)sis 1 crac3ing DE' Te't 1 )eferences + 'tallings, Cr)ptograph) and =etwor3 'ecurit)& Principles and Practice, Pearson Education 8sia I'-= 6<+14@215<61@ / - 'chneier, 8pplied Cr)ptograph), !ile) I'-= @14:+1++:@616 2 D ,ahn The Codebrea3ers, 'phere boo3s I'-= @1://+15+46: 4 P !a)ner, Disappearing Cr)ptograph), 8cademic Press I'-= @1+/1:2<7:+1< 5 Crac3ing DE', Electronic "rontier "oundation I'-= +15756/15/@12 7 8; 0eneAes, PC van >orschot and '8 Ianstone, 8pplied Cr)ptograph), CRC Press, I'-= @1<4621<5/21:, +66: : DR 'tinson, Cr)ptograph) 1 Theor) and practice, CRC Press, I'-= @1<4621<5/+1@, +665 IT-323 ,--ommerce an# <e& *""lications (3-0-0) 3 Electronic commerce environment and opportunities& -ac3 ground G The Electronic commerce Environment G Electronic 0ar3et Place Technologies 0odes of electronic commerce& >verview G EDI G 0igration to open EDI G E commerce with !!!KInternet G Commerce =et 8dvocac) G !eb commerce going forward 8pproaches to safe electronic Commerce G >verview G 'ource G Transport Protocols G 'ecure Transactions G 'ecure Electronic Pa)ment Protocol G 'ecure Electronic Transaction G Certificates for 8uthentication G 'ecurit) on !eb 'ervers and enterprise networ3s Electronic cash and electronic pa)ment schemes G Internet 0onitor) Pa)ment and 'ecurit) re(uirements G pa)ment and purchase order process G online electronic cash 0aster cardK Iisa 'ecure electronic transaction& Introduction G -usiness re(uirements 1 Concepts 1 Pa)ment Processing Email and 'ecure Email Technologies for Electronic Commerce& Introduction G The means of Distribution G 8 model for 0essage .andling G .ow Does a Email !or3 Internet Resources for Commerce& Introduction G Technologies for !eb 'ervers G Internet 8pplications for commerce G Internet Charges G Internet 8ccess and 8rchitecture G 'earching the Internet Te't( )eferences + !eb Commerce Technolog) .and -oo3 Daniel 0inoli, Emma 0inoli 0c*raw .ill / "rontiers of Electronic Commerce Ravi ,ala3otar, 8ndrew -!hinston 8ddison1!esle) IT-32+ -om"uter %et0or;s 1 *#ministration (/-0-0) / + Computer networ3 architecture, Ph)sical la)er& .ardware, topolog), data encoding, / Data Lin3 La)er& Logical lin3 Control& Error detection and Correction, 8R% protocols, "raming protocols# .DLC, LLC$ 0edium 8ccess Control& 0ultiple access protocols, Channel 8llocation, contention, reservation, round robin with E?amples 2 =etwor3 Inter connection& *eneric switches, switch design issues, switching mechanism & virtual Circuit switching, datagram switching, source route switching, -ridge and bridge learning , *lobal 8ddressing scheme, fragmentation and reassembl), 8ddress translation& 8RP, R8RP, IC0P, IP 'calabilit) Issues, sub netting and super netting #CIDR$ , IP Routing, E*P, -*P protocols 4 End to End protocols& End to end issues, UDP and TCP segment formats, connection establishment and termination, state transition sliding window protocol, TCP "low control, 'ill) window s)ndrome, TCP retransmission, RTT Estimation, TCP Congestion Control and congestion avoidance protocols 5 Internet applications& Client server paradigm, D=', '0TP, RPC, ="' and *eneral networ3 securit) issues 7 Introduction to =etwor3 management protocols Tools and techni(ues for networ3 monitoring authentication, and administration Te't()eferences + Data =etwor3s& -ertse3as and *allagher, Phi / Computer =etwor3ing 8 Top down 8pproach& ;",urose, Pearson 2 Computer =etwor3s 8 ')stems 8pproach& L Peterson and - Davie, Elsevier 4 Computer =etwor3s and Internet& DE Comer, Pearson IT-3+1 Information System Security La& (0-0-3) 2 The following proposed coverage are broad guiding areas in lab The instructor offering the course in consultation with the theor) offered can adopt further variations in tune with IT12/+ + Implementation of Classic Ciphers / E?tended Euclid algorithm implementation 2 Implementation of DE' encr)ption and decr)ption 4 Implementation of Pol)nomial arithmetic, *alois "ields 5 Implementation of 8E' encr)ption and decr)ption 7 Implementation of hash function : 'olution of E(uations through CRT < Implementation of an authentication scheme 6 R'8 implementation +@ Digital 'ignature implementation Te't()eferences + - 'chneier, 8pplied Cr)ptograph), !ile) I'-= @14:+1++:@616 / 8; 0eneAes, PC van >orschot and '8 Ianstone, 8pplied Cr)ptograph), CRC Press, I'-= @1<4621<5/21:, +66: 2 DR 'tinson, Cr)ptograph) 1 Theor) and practice, CRC Press, I'-= @1<4621<5/+1@, +665 IT-3+3 <e& &ase# De.elo"ment La& (0-0-3) 2 Topics to be covered in the lab& Introduction to !eb Programming Installation of P.PK0)'(l and web server Introduction to P.P programming !riting P.P Programs Loops, Control 'tructure and 8rra)s P.P functions 'tring functions 8rra) functions 0athematical function *raphics functions "ile s)stem function Date and time function 0iscellaneous "unctions Error handling >bCect >riented "eatures of P.P "ile and Director) handling 0)'(l database Configuration of 0)'(l server 'tarting 0)'(l server 0)'(l tables Displa)ing 0)'(l data 8dding and removing user access 8dvance P.P programming mail P.P 1 generated PD" files !eb 'ervers II' web 'erver 8pache web server Te't()eferences + -eginning P.P 4 Databases G Christopher 'collo, .arish Rawat, Dipa3 Thomas, 'anCa) 8braham, 8ndrew .ill 9 ;im .ubbardF !ro? Press / P.P 0)'(l !ebsite Programming G Chris -ea, 0i3e DuAAard, ;ess) !hite, Cinis 9 Dilip ThomasF !ro? Press 2 P.P -lac3 -oo3 G Peter 0oulding, Coriolis *roup 4 0)'(l G P.P Database 8pplications G ;a) *reenspan 9 -rad -ulgerF ;ohn !ile) 9 'ons 5 P.P 0)'(l !ebsite Programming& Problem1Design1'olutions G Chris -ea, 0i3e DuAAard, ;ess) !hite, Cinis 9 Dilip ThomasF 8press 7 Essential P.P for !eb Professionals G Christopher CosentinoF Prentice .all : 'amEs Teach Dourself P.P 4 in /4 .ours G 0att LandstraF '80' < P.P 5+ "or -eginners G Ivan -a)ross, >EReill), 'hroff Publishers 9 Distributors Pvt Ltd IT-3++ %et0or; !rogramming 1 *#ministration La& (0-0-3) 2 The following proposed coverage are broad guiding areas lab The instructor offering the course in consultation with the theor) offered can adopt further variations in tune with IT12/5 + Programming for data encoding, CRC detection and Correction / Estimation of networ3 dela) through >' utilities 2 'imulation and Emulation of -us and 'tar topolog), DLC, 08C protocols using -enchmar3 L8= trainer 3its 4 Pac3et measurement and observation using networ3 sniffing tools 5 Use of sniffers for protocol d)namics 7 Installation and wor3ing of RRD toold for looging administration data for networ3s : -andwidth and other networ3 parameter mechanism through '=0P protocols !rogram ,lecti.e I (3-0-2) / >neK0ore of the following courses as offered b) Department IT12:+ Programming in ;ava IT12:2 P)thon Programming IT12:5 'cripting Languages IT12:: 0anagement Information ')stems 2"en ,lecti.e III (3-3-3) 3(/ Please refer to concerned Department B.Tech Information Technology Semester 4I IT-322 Soft0are ,ngg. (3-0-0) 3 Introductor) Concepts& .istorical perspective, ')stem Definition, 'oftware Life C)cle, 'oftware Engineering paradigms ')stem anal)sis& "easibilit) stud) re(uirement anal)sis, Cost benefit anal)sis, Planning s)stems, 8nal)sis tools and techni(ues ')stem Design& design fundamentals, 0odular Design, Data and procedural design, obCect oriented design ')stem Development& Code documentation, Program design paradigms Ierification, Ialidation and Testing& testing methods, "ormal Program Ierification, Testing 'trategies 'oftware 0aintenance& 0aintenance Characteristics, 0aintainabilit), 0aintenance tas3s and side effects Te't()eferences + Pressman R'& 'oftware Engineering& 8 Practitioner approach, 0c*raw .ill / 'ommerville I& 'oftware Engineering, 8ddison !esle) 2 *heAAi C ;aAa)eri 0 and 0andrioli& "undamentals of 'oftware Engg , P.I IT-32/ -om"iler Design (3-0-0) 3 Introduction to translators, compilers versus interpreters, compilation process Le?ical 8nal)sis& "inite automata and Regular e?pressions, 0inimiAation of finite automata ')nta? 8nal)sis& Conte?t "ree *rammars, -ottom1up and Top1down Parsing 8mbiguit), 'hift Reduce Parser, >perator Precedence Parser, Predictive Parsers, LR parsers ')nta? directed translation& ')nta? directed translation, ')nthesiAed and Inherited attributes, Intermediate codes1 Postfi?, %uadruples, Triples Code optimiAation& -asic bloc3s, "low graphs, Local and *lobal data flow anal)sis G D8*, ud1 chaining, available e?pressions, Loop optimiAation Code generation& Compilation of e?pression and control structures Error detection and recover) ')mbol table organiAation& .ashing, lin3ed list, tree structures Te't()eferences + 8ho, Ullman and 'ethi& Compilers G Principles, techni(ues and tools, Pearson Education / Trembla), 'orenson& The Theor) and Practice of Compiler !riting, -'P 2 .olub, Compiler Design in C, P.I IT-3+2 -om"iler La& (0-0-3) 2 The following proposed coverage are broad guiding areas in lab The instructor offering the course in consultation with the theor) offered can adopt further variations in tune with IT12/4 + Programming e?ercises to implement t)pical le?ical anal)Aers, parsers, intermediate code generation / 8ssignments using LEH and D8CC tools 2 Programming assignments on some of the concepts related to Code >ptimiAation Te't()eferences& + 8ho, Ullman and 'ethi& Compilers, Pearson Education / Levine, 0ason and -rown& Le? and Dacc, >JReill) IT-3+/ Seminar (0-2-0) 2 The topics selection covering the latest and relevant topics related to the emerging areas Ideall), some recent reputed Cournal papers abstraction and presentation shall be encouraged for presentation The evaluation shall be continuous and through components evaluation viA content, coverage, depth, presentation, response to the (ueries, and seminar report In case of unsatisfactor) performance, an H grade can be awarded for e?tension wor3 during summer term !rogram ,lecti.e II (3-0-2) / >neK0ore of the following courses as offered b) Department IT12:/ 'ignals and ')stems IT12:4 >bCect >riented ')stem Design IT12:7 0ultimedia Technolog) IT12:< 8rtificial Intelligence 2"en ,lecti.e I4 (3-3-3) 3(/ Please refer to concerned Department 2"en ,lecti.e 4 (3-3-3) 3(/ Please refer to concerned Department B.Tech Information Technology Semester 4II IT-/+1 In#ustrial Training (0-2-0) 2 The evaluation shall be continuous and through components evaluation viA content, coverage, depth, presentation, demonstration, response to the (ueries, and training report In case of unsatisfactor) performance, and failure e?tra credit course from the department e(uivalent to CP145+ can be permitted through consent of DU*C IT-/+3 $ree an# 2"en Source La& (0-0-3) 2 The following proposed coverage are broad guiding areas lab The instructor offering the course in consultation with the theor) offered can adopt further variations 1. Linu? basics and installation and management of the Linu? 2. Different t)pes of software development environment #Eclipse$ 3. ma3e and other software construction utilities on Linu? 4. Iersion control and managing proCect in open source 5. 0anaging large software development through wi3i or ali3e proCect management tools 6. Introduction to scripting for s)stem management !rogram ,lecti.e III (3-0-2) / >neK0ore of the following courses as offered b) Department IT14:+ Computer *raphics IT14:2 .uman Computer Interaction IT14:5 *UI Programming IT14:: 'elected Topics in >' IT14:6 0obile and !ireless Computing !rogram ,lecti.e I4 (3-0-2) / >neK0ore of the following courses as offered b) Department IT14<+ 8dvanced Compiler IT14<2 Design and 8nal)sis of 8lgorithms IT14<5 'emantic !eb IT14<: Data 0ining and Data !arehousing IT14<6 Implementation of Data -ases !rogram ,lecti.e 4 (3-0-2) / >neK0ore of the following courses as offered b) Department IT146+ Information Retrieval IT1462 !ireless 'ensor =etwor3 IT1465 Topics in .igh 'peed =etwor3ing IT146: Digital !atermar3ing and 'teganograph) IT1466 'oftware ProCect 0anagement IT-/++ !ro=ect La& (0-2-3) + >bCective of this elective is to facilitate transfer of 3nowledge ac(uired b) a student to a field of his own choice for application to solving a problem 'tudent is e?pected to collect and stud) relevant material under mentorship of a facult) member wor3ing in similar areaF identif) a suitable problem and propose methodolog) towards its solution 8lternatel) a student can e?plore hardware implementation of e?isting solution#s$ This elective shall act as pre(uel to proCect wor3 for ne?t semester The proCect coordinator#s$ from the department for continuit) shall coordinate this course *rouping and division shall be applicable as defined in the maCor proCect of final semester 2"en ,lecti.e 4I (3-3-3) 3(/ Please refer to concerned Department B.Tech Information Technology Semester 4III IT-/+2 !ro=ect (3-3-3) 10 The maCor proCect covers lab component of the final semester wor3 The evaluation of proCect shall be continuous and will be done through proCect coordinator#s$ The evaluation mechanism shall be evolved based on the e?isting practices through DU*C rectified from time to time Ideall) the proCect should comprise with group siAe of two students shall be limited to ma?imum 4 students and the groups shall be evenl) distributed among facult) through coordinator#s$ Internal and e?ternal components shall not e?ceed 4@M each of the overall mar3s IT-/+/ :rou" Discussions (0-0-3) 2 4L This la& 0ill remain only if In#ustrial training is gi.en 0eightage of 02 cre#its. !rogram ,lecti.e 4I (3-0-2) / >neK0ore of the following courses as offered b) Department IT14:@ Digital "orensics IT14:/ -iometric 'ecurit) IT14:4 IL'I 8lgorithms IT14:7 Intrusion Detection IT14:< Pattern Recognition !rogram ,lecti.e 4II (3-0-2) / >neK0ore of the following courses as offered b) Department IT14<@ 0ulti1Core 8rchitectures IT14</ 'oftware Testing IT14<4 Distributed ')stems IT14<7 8dvanced Topics in Databases IT14<< E?pert ')stems 2"en ,lecti.e 4II (3-3-3) 3(/ Please refer to concerned Department !rogram ,lecti.e I (Semester 4) IT-3>1 !rogramming in ?a.a (3-0-2) / Intro#uction Internet, ;ava as a tool for internet applications, -)te Code and its advantages 2&=ect 2riente# !rogramming an# Design Review of 8bstraction, >bCects and other basics, Encapsulation, Information hiding, 0ethod, 'ignature, Classes and Instances, Pol)morphism, Inheritance, E?ceptions and E?ception .andling with reference to obCect modeling, Coupling and Cohesion in obCect oriented software >bCect >riented Design G Process, E?ploration and 8nal)sis ?a.a !rogramming Basics "undamentals& Iariables and assignments, Input and >utput, Data T)pes and E?pressions, "low of control, Local variables, >verloading Parameter passing, this pointer, ?a.a 2&=ect 2riente# -once"ts >bCects and Classes& Use of file for IK>, "ormatting output with stream functions, Character IK>, Inheritance, Public and private members, Constructors for initialiAations, Derived classes, "low of Control ?a.a Data Structures an# *#.ance# To"ics 8rra)s G Programming with arra)s, arra)s of classes, arra)s as function arguments, 'trings, 0ultidimensional arra)s, 8rra)s of strings, vectors, -ase classes Introduction to ;ava 8pplets Te't()eferences + .erbert 'childt& ;8I8 / 1 The Complete Reference, T0., Delhi / U, Cha3rabort) and D* Dastidar& 'oftware and ')stems 1 8n Introduction, !heeler Publishing, Delhi 2 ;oseph >E=eil and .erb 'childt& Teach Dourself ;8I8, T0., Delhi IT-3>3 !ython !rogramming (3-0-2) / Introduction to P)thon& Data t)pes, variables, e?pressions, operators 'e(uence, set, dictionar), print statement, control1flow statements, functions >bCects and classes, metaclasses Decorators, special methods E?ception handling 0odules s)s, os, etc 'trings and regular e?pressions "ile operations !or3ing with processes and threads Pipes and signals *raphical user interface design in P)thon #including the T"inter module$, !idgets and basic components, La)out options, Event handling =etwor3 scripting #soc3ets, "TP, and e1mail clients$, 'erver1side scripting Databases and persistence in P)thon #including pic"led obCects and shelf files$ Custom and built1in data structures in P)thon C integration with P)thon #including the '!I* module$, Embedding P)thon calls within C Te't()eferences < Programming P)thon b) 0ar3 LutA, >JReill) 6 Learning P)thon, 2rd Edition b) 0ar3 LutA, >JReill) +@ P)thon in a =utshell b) 8le? 0artelli, >JReill) ++ 8n Introduction to P)thon b) *uido van Rossum and ;r "red L Dra3e, =etwor3 Theor) Ltd IT-3>+ Scri"ting Language (3-0-2) / 'hell and 'cripting languages introduction 8!,, Perl, and P)thon programming paradigms Te't()eferences + Relevant online material with the latest version of the scripting languages IT-3>> 6anagement Information Systems (3-0-2) / Interpretation and understanding of information, need and role of information technolog) in business and organiAation Information s)stem& -asic elements, data, information, 3nowledge, infrastructure and t)pes and its development >rganiAing data and information& -asics of data arrangement and access, data 3nowledge 9 decision support, D-0' G 8n overview Introduction to management information s)stem .ardware and software used for information s)stems, transaction processing, office automation Decision ma3ing process, concepts of information, humans as information processors, s)stem concepts, organiAational structure and management concepts Te't( )eferences + 0anagement Information and ')stem, Davis and >lson, 0c1graw .ill / Recent papers from conferences and Cournals !rogram ,lecti.e II (Semester 4I) IT-3>2 Signals an# Systems (3-0-2) / Review of signal description Review of "ourier and Laplace transforms 'pectrogramsF fre(uenc) modulation 'ampling and aliasing The A1transform "ilters& Transfer functions, "IR filters, IIR filters 'pectral anal)sis& D"T for periodic signals, D"T for non1periodic signals Te'ts()eferences + ; . 0cClellan, R ! 'chafer 9 0 8 Doder, DS# First$ a Multimedia Approach, Prentice1.all International +66< / 8 I >ppenheim , R ! 'chafer 9 ; R -ac3, Discrete%time Digital Signal #rocessing, Prentice .all Int +666 Third maCor revision of classic te?t 2 8 I >ppenheim , 8 ' !ills3) 9 ' . =awab, Signals and Systems, Prentice .all Int +667 4 = , 'inha, Linear systems, ;ohn !ile) +66+ 5 ; * Proa3is and D * .anola3is, Digital Signal #rocessing, 0a?well 0acmillan Int +66/ IT-3>/ 2&=ect 2riente# System Design (3-0-2) / 2&=ect 2riente# !rogramming an# Design& Review of abstraction, obCects and other basics, Encapsulation, Information hiding, method, 'ignature, Classes and Instances, Pol)morphism and inheritance -@@ !rogramming Basics& "undamentals, variables and assignments, Input and >utput, Data t)pes and e?pressions, flow of control, subprograms, top1down design, predefined functions, user defined functions, procedural abstractions, local variables, overloading function names, operator overloading, parameter passing, this pointer, destructors, cop) constructor, overloading the assignment operator, virtual functions, function calling functions, friend functions, recursive functions, recursive member functions 'tatic member function -@@ 2&=ect oriente# conce"ts& >bCects and classes, use of file for IK>, formatting output with stream functions, Character IK>, inheritance, structures for diverse data, structures as function arguments, initialiAing structures, defining classes and member functions, public and private members, constructors for initialiAation, standard CBB classes, derived classes, flow of control, use of -oolean e?pressions, multiwa) branches, use and design of loops "riend function and friend class -@@ Data structures an# *#.ance# To"ics& 8rra)s G programming with arra)s, arra)s of classes, arra)s as function arguments, strings, 0ultidimensional arra)s, 8rra)s of strings, pointers D)namic arra)s, Classes and d)namic arra)s, -ase classes, access control, Templates1 generic classes and functions, namespaces 'tandard Template Librar) Te't()eferences + -alaguruswam)& >bCect1oriented Programming with CBB / Robert Lafore& CBB Programming 2 8sho3 = ,amthane & >bCect >riented with CBB, Pearson Education IT-3>7 6ultime#ia Technology (3-0-2) / Introduction to 0ultimedia, *raphics and Image data representations, Color in image and video CIE, R*-, C0D, .'L color models "undamental concepts in video, =T'C, P8L and Digital video Compression methods& Loss) and Loss less compression techni(ues& .uffman coding, 8rithmetic coding, LL! Image compression standards& DCT Transform and "ourier transforms, ;PE* coding Iideo representation and compression techni(ues 0otion vector search& se(uential, /D logarithmic search I, P and - frames, 0PE* Iideo coding, 0PE*1+, 0PE*1/ and 0PE*12& video coding and decoding -asic 8udio compression& "letcher1 0unson curves, Critical -ands, Ps)choacoustic phenomenon, 0PE* La)er 2 #0P2$ 8udio Te't()eferences& IT-3>A *rtificial Intelligence (3-0-2) / >verview of 8I, Problems, Problem space and searching techni(ues, Definition production s)stem, Control strategies, .euristic search techni(ues ,nowledge representation& Representation, mappings, approaches and issues, Predicate logic, prepositional logic, Resolution, Procedural and declarative 3nowledge, forward and bac3ward reasoning, 0atching, 'emantic nets, "rames scripts Learning and learning s)stems& Introduction to .opfield networ3s, introduction to neural networ3s, learning in neural networ3s, applications of neural networ3s, Recurrent networ3 =atural Language Processing, Perceptions and actions Introduction to E?pert ')stems, Definition t)pes, Component, development process Introduction to 8I languages& PR>L>* and LI'P Te't()eferences& + 8rtificial Intelligence& Elaine Rich, ,evin ,night, 0c1*raw .ill / Introduction to 8I 9 E?pert ')stem& Dan ! Patterson, P.I !rogram ,lecti.e III (Semester 4II) IT-/>1 -om"uter :ra"hics (3-0-2) / Intro#uction to com"uter gra"hics& Iector and Raster graphics, *raphic primitives and attributes Computer graphics devices - CRT, plasma, LCD, plotters, 'can conversion of line, circle and ellipse 4ie0ing Transformations& Coordinate s)stem 1 world, device and normaliAed device coordinates, !indow and Iiewport and viewing transformations $illing an# -li""ing 1 "lood fill and seed fill algorithms and scan line pol)gon filling algorithms, Cohen 'utherland clipping algorithms for Pol)gon :eometric transformations 1 /D and 2D transformations& Translation, 'caling, rotation, 'hearing, reflection etc, Transformations about an arbitrar) a?is !ro=ections& Parallel 1 >rthographic, Plans and Elevations, 8?onometric 1 Isometric, Diametric, trimetric, Perspective 1 >ne point, two point, three point 5i##en surface remo.al& >bCect space and image space algorithms, -ac3 space removal, L1buffer, scan line, area subdivision, painters, -'P tree, "loating horiAon and ra) tracing methods -ur.es& 'pline representations, Curve representation techni(ues, Continuit) constraints, .ermite Interpolation, -eAier curves, -1'pline curves Te't()eferences + "ole), Ian Dam Computer *raphics& Principles and Practic 8ddison !esle) / .earn and -a3er Computer *raphics P.I 2 Rogers and 8dams 0athematical Elements of Computer *raphics 0c*raw .ill 4 Rogers and 8dams Procedural Elements of Computer *raphics 0c*raw .ill IT-/>3 5uman -om"uter Interaction (3-0-2) / .uman factors issues in the development of software, use of database s)stems, and design of user interfaces for interactive s)stems 'cience base #theories, models, usabilit) studies, and controlled e?perimentation$, and software engineering with user interface development environments Issues include& command languages, menus, forms, and direct manipulation, graphical user interfaces, computer supported cooperative wor3, information search and visualiAation, !orld !ide !eb design, inputKoutput devices, and displa) design Te't ()eferences + - 'hneiderman, Designing the User Interface, 2rd Edition, 8ddison1!esle), #+66<$ / Interaction Design b) ;enn) Preece, Dvonne Rogers, and .elen 'harp ;ohn !ile) 9 'ons& =ew Dor3, /@@/ I'-=& @4:+46/:<: 2 User Centered !eb 'ite Design, b) DD 0cCrac3en and R; !olfe Pearson Prentice .all& Upper 'addle River, =;, /@@4 I'-=& @+2@4++7+1/ 4 The !eb !iAardJs guide to !eb Design, ;* Lengel, 8ddison1!esle), /@@/ I'-=& @/@+:457/2 IT-/>+ :9I !rogramming (3-0-2) / Issues and Challenges in *UI design >verview of intelligent interface design *raphics versus web interface Principles of good interface ')stem 0enu and =avigation schemes Interaction devices 'creen based controls Usabilit), testing, design for web, humans Colors Te't( )eferences& + !ilbert > *alitA The Essential *uide to User Interface Design !ile) / 'usan !einschen3, Pamela ;amar, 'arah C Deo *UI Design Essentials #Paperbac3$ 2 ;enifer Tidwell Designing Interfaces& Patterns for Effective Interaction Design, >EReill) 4 - 'hneiderman, Designing the User Interface, 2rd Edition, 8ddison1!esle) IT-/>> Selecte# To"ics in 2S (3-0-2) / Processes and Threads, Concurrenc) control, Director) and "ile structure, "ile sharing, ="', 'torage management Design issues of Distributed >', Distributed vKs networ3 operating s)stem Communication& Client 'erver, RPC Distributed >'& Issues, process management, inter1process communication, scheduling, deadloc3s Design and implementation of distributed file s)stems, distributed shared memor) 'ecurit)& Concepts and Distributed ')stems Distributed Concurrenc), Transactions Case stud)& Uni?, 8moeba Te't()eferences& + >perating ')stem 8 Design 8pproach1Crowle), T0. / Tanenbaum& Distriuted &perating Systems, Pearson Education 2 -ach, Design of 'ni( &)S 4 Coulouris et al, Distriuted Systems$ Concepts and Design, 8ddison !esle) 5 0ullender$ Distriuted Systems, 8ddison !esle) 7 Tanenbaum and 'teen& Distriuted Systems$ #rinciples and #aradigms, Pearson Education IT-/>B 6o&ile an# <ireless -om"uting (3-0-2) / !ireless communication fundamentals& Introduction, wireless transmission, fre(uencies for radio transmission,signals, antennas, signal propagation, multiple?ing, modulations, spread spectrum, 08C, 'D08, "D08, TD08, CD08, cellular wireless networ3s Telecommunication networ3s& Telecommunication s)stems &*'0,*PR', DECT, U0T', I0T1/@@@, 'atellite networ3s 1 basics G parameters and configurations G capacit) allocation& "808 and D808 !irless L8=& IEEE1 <@/++, architecture, services, 08C, ph)sical la)er, IEEE <@/++a, <@/++b standards, .IPERL8=, -LUE T>>T. 0obile networ3 la)er& mobile ip, d)namic host configuration protocol,routing,D'DI,D'R Transport and application la)ers & traditional TCP, classical TCP improvements G !8P, !8P /@ Te't()eferences + ;ochen 'chiller, N0obile CommunicationsO, P.IKPearson Education, 'econd Edition, /@@2 / !illiam 'tallings, N!ireless Communications and =etwor3sO, P.IKPearson Education, /@@/ 2 ,aveh Pahlavan, Prasanth ,rishnamoorth), NPrinciples of !ireless =etwor3sO, P.IKPearson Education, /@@2 4 Uwe .ansmann, Lothar 0er3, 0artin ' =ic3lons and Thomas 'tober, NPrinciples of 0obile ComputingO, 'pringer, =ew Dor3, /@@2 5 .aA)sAtof !esolowshi, N0obile Communication ')stemsO, ;ohn !ile) and 'ons Ltd, /@@/ !rogram ,lecti.e I4 (Semester 4II) IT-/A1 *#.ance# -om"iler (3-0-2) / 8 Tour of Compiler Design, LR Parsers G 'LR parsers, Canonical LR and L8LR parsers, Le? and Dacc Tools, Control1flow 8nal)sis, Control1flow *raphs, -asic -loc3s, Data1flow 8nal)sis, Dependence 8nal)sis, *lobal >ptimiAations, Loop >ptimiAations, Dominators, Loop1invariant computations, Code motion, Data Dependence 8nal)sis in Loops, Loop 'cheduling, Runtime ')stem 8rchitectures and 8utomatic 0emor) 0anagement Techni(ues Te't()eferences + 8ho, 8lfred I, 'ethi, Ravi, Ullman, ;effre) D, Compilers& Principles, Techni(ues and Tools, 8ddison1!esle) / 'teven 0uchnic3, 8dvanced Compiler Design 9 Implementation, 0organ ,aufmann 2 ,eith Cooper and Linda TorcAon, Engineering a Compiler, 0organ ,aufmann IT-/A3 Design an# *nalysis of *lgorithms (3-0-2) / )e.ie0 of *lgorithms& 'eaching and 'orting, Tree and *raph traversal D"' and its applications 'hortest path algorithms, minimum spanning tree algorithm 8lgorithm Design Techni(ues& *reed) algorithm, d)namic programming, divide and con(uer, bac3trac3ing, branch and bound *lgorithm *nalysis& 8s)mptotic notation, solution of recurrence, model of computation, time and space comple?ities, average and worst case anal)sis, 8mortiAed anal)sis 0asterJs theorem Recurrence solving :ra"h *lgorithms networ3 flow, matching, coverings, applications of D"'&1 bi1connectivit), Euler circuits, strongl) connected components, topological sort, and articulation point =etwor3 "low :ree#y *lgorithms& ,napsac3 problem Dynamic !rogramming& Chained matri? multiplication, longest common subse(uence Divide and Con(uer& >rder 'tatistics G finding the median, e?ponentiation, matri? multiplication, LC' *""ro'imate *lgorithm& Travelling 'alesman Problem, verte?1cover problem RandomiAed 8lgorithms& 6atri' *lgorithms G 'trassen 0atri? multiplication, LUP decomposition %um&er Theoretic *lgorithms Primalit) Testing, "actoriAation 6iscellaneous& Introduction to appo?imate, randomiAed and probabilistic algorithms Introduction to problem classes G =P, =PC, =P1.ard Te't ( )eferences& 1. Cormen, Leiserson, Rivest& Introduction to Algorithms, Prentice .all of India 2. .orowitA and 'ahani& Fundamental of Computer algorithms 3. 8ho 8I , ;D Ulman& Design and analysis of Algorithms, 8ddison !esle) 4. -rassard & Fundamental of Algorithmics, P.I 5. !! Peterson and E ; !eldon& *rror correcting codes 6. 'ara -aase, 8llen Ian *elder& Computer Algorithms$ Introduction to Design and Analysis, Pearson Education IT-/A+ Semantic <e& (3-0-2) / -asics of 3nowledge representation and informal introduction to >!L Description logics and classiers 1 the 8LC famil) and its e?tensions E?pressiveness versus tractabilit)F highl) e?pressive description logicsF implemented description logic s)stemsF description logics and the PP'emantic !ebJJ Practical issues in ontologies& -asic principles, normalisation and the Q>ntocleanQ methodolog), upper ontologies, Common problems in ontolog) development& parts and wholes, time, space, fundamental limitations Te't()eferences + The Description Logic .andboo3, -aader et al, CUP, /@@2 / Ian Pratt 8rtificial Intelligence 0acmillan, +664 2 ;ohn 'owa Principles of 'emantic =etwor3s& E?plorations in the representation of 3nowledge 0organ ,aufmann, +66+ 4 Russell and =orvig 8rtificial Intelligence& 8 0odern 8pproach Prentice .all, +665 5 .an Reichgelt ,nowledge Representation& 8n 8I Perspective 8ble? Publishing, +66+ IT-/A> Data 6ining an# Data <arehousing (3-0-2) / Introduction to Decision 'upport ')stems, Data !arehouse and >nline 8nal)tical Processing Data !arehouse 8rchitecture& ')stem Processes, Process 8rchitecture& Load !arehouse, %uer), Detailed and 'ummariAed Information Design& Data -ase 'chema "acts, Dimensions and 8ttributes Introduction to Data -ase and 0etadata Data !arehouse Implementation Data 0ining & Introduction and need Data Processing & Data Cleaning, Data Integration and Transformation, Data Reduction Data 0ining Primitives & Descriptive and Predicative Data 0ining, Language D0%L and its Preliminar) Clauses Data 0ining 0ethods& 8ssociation G 'ingle and 0ultilevel, CharacteriAation and Comparison, Regression 8nal)sis, Classification and Predication Data 0ining 8lgorithms& Clustering, 8ssociation, Regression, Decision Trees >L8P & >L8P 8rchitecture, R>L8P, and 0>L8P 8pplication and Trends in Data 0ining Te't()eferences + Data !arehousing in the Real !orld G 8nahor) and 0urra), Pearson Education / Data 0ining G Concepts and Techni(ues G ;iawai .an and 0icheline ,amber 2 -uilding the Data !arehouse G !. Inmon, !ile) IT-/AB Im"lementation of Data Bases (3-0-2) / Issues in Implementation of CentraliAed Database ')stems 1 %uer) Processing, %uer) >ptimiAation, Transaction Processing, Concurrenc), Recover) 0anagement Database ')stem 8rchitectures G CentraliAed and Client1'erver architecture, Parallel ')stems, Distributed Database ')stems Implementation of Distributed Database ')stems1 Distributed Data 'torage, Distributed Transactions, Concurrenc) control in Distributed Database ')stems, Distributed %uer) Processing Te't 1 )eferences + 'ilberschatA 8, ,orth .", 'udarshan ', Database ')stem Concepts, 0c*rall .ill / Elmasri R and =avathe '-, Fundamentals of Dataase Systems, 2rd Edition, 8ddison !esle),/@@@ This boo3 covers most of the material on the course 2 Ceri ', Pelagatti *, Distributed Databases G Principles and ')stems, 0c*raw .ill !rogram ,lecti.e 4 (Semester 4II) IT-/B1 Information )etrie.al (3-0-2) / I=TR>DUCTI>=1 Information storage and retrieval s)stems, Data 'tructures and 8lgorithms Related to Information Retrieval RETRIEI8L 'TR8TE*IE' 1 Iector 'pace 0odel, Probabilistic Retrieval 'trategies, Language 0odels, Inference =etwor3, E?tended -oolean retrieval, Latent 'emantic Inde?ing RETRIEI8L UTILITIE' 1 Relevance "eedbac3 , Clustering, Passage1-ased Retrieval, =1grams, Regression 8nal)sis, Thesauri, 'temming, 'emantic =etwor3s, Parsing, Ran3ing E""ICIE=CD1 Inverted Inde?, %uer) Processing, 'ignature "iles, Duplicate Document Detection I=TE*R8TI=* 'TRUCTURED D8T8 8=D TEHT 1 Review of the Relation 0odel, 8 .istoric Progression, Information Retrieval as a Relational 8pplication, 'emi1'tructured 'earch using a Relational 'chema, 0ulti1dimensional Data 0odel Te't()eferences + Information Retrieval Data 'tructures 9 8lgorithms b) !illiam - "ra3es, Ricardo -aeAa1Dates / Information retrieval1 b) D 8 *rossman , >phir "rieder, 'pringer International Edition IT-/B3 <ireless Sensor %et0or;s (3-0-2) / Introduction G motivation, applications, sensors, architectures, platforms for !'= 8ctual ')stems 1 -er3ele) motes, Tin)>' and nesC!ireless Radio Realities G radio irregularities and impact on protocols 08C protocols G '108C, multi1channel 08C Routing G*eographic routing, D'R, 8>DI, Directed Diffusion, 'PEED Cloc3 ')nchroniAation 1 "T'P, TP'= LocaliAation G TD>8, !al3ing *P', range free solutions Power 0anagement G per node, s)stem1wide, sentr) services, sensing coverage Data 'ervices and Databases G architectures, (ueries #'%L$, data dissemination Programming 8bstractions G programming models, EnviroTrac3, new 8PIs 'ecurit) and Privac) G problems, attac3s, solutions, open research areasCase 'tud)& 8 Complete ')stem G surveillance and trac3ing application .ow to program actual !'= Te't()eferences + #rotocols and Architectures for +ireless Sensor ,et-or"s . ,arl and 8 !illig ;ohn !ile) 9 'ons, ;une /@@5 / +ireless Sensor ,et-or"s$ Technology, #rotocols, and Applications , 'ohrab), D 0inoli, and T Lnati ;ohn !ile) 9 'ons, 0arch /@@: 2 +ireless Sensor ,et-or"s C ' Raghavendra, , 0 'ivalingam, and T Lnati, Editors 'pringer Ierlag, 'ep /@@7 4 +ireless Sensor ,et-or"s$ Architectures and #rotocols E . Callawa), ;r 8UER-8C., 8ug /@@2 5 ,et-or"ing +ireless Sensors - ,rishnamachari Cambridge Universit) Press, Dec /@@5 7 +ireless Sensor ,et-or"s$ An Information #rocessing Approach " Lhao and L *uibas 0organ ,aufmann, ;ul /@@4 : Sensor ,et-or"s and Configuration$ Fundamentals, Standards, #latforms, and Applications = P 0ahali3 'pringer Ierlag, =ov /@@7 < +ireless Sensor ,et-or"s$ A Systems #erspecti.e, = -ulusu and ' ;ha, Editors, 8rtech .ouse, 8ugust /@@5 IT-/B+ To"ics in 5igh S"ee# %et0or;ing (3-0-2) / >verview of Internet Technologies, Issues in ne?t generation Internet 1 Routing, 0ulticasting, Pac3et 'cheduling, %ualit) of 'ervice etc 8dmission control in Internet& Effective bandwidth, Differentiated services, Polic)1based networ3ing, Real time communications over Internet, Internet telephon), Ioice over IP, Integrated services !eb %o', Intelligent caching, Traffic measurement and characteriAation Te't( )eferences + ,urose& Computer ,et-or"ing A Top Do-n Approach, Pearson / Peterson and Davie& Computer ,et-or"s$ A systems approach, 0organ ,aufman and Elsevier 2 ;!alrand, High #erformance Computer ,et-or"s, Elsevier 4 8,umar, D0anCunath, Communication ,et-or" 0,P 5 Recent papers from conferences and Cournals IT-/B> Digital <atermar;ing an# Steganogra"hy (3-0-2) / !atermar3ing& 8pplications, techn(iues, models, detection techni(ues Iisible and invisible watermar3s Embedding Robust watermar3ing, watermar3 securit) 'teganograph) G Least -it, DCT, 'pread spectrum 8udio seganograph) 'teganal)sis techni(ues Te't()eferences + Ingemar Co?, 0atthew 0iller, ;effre) -loom, and ;essica "ridrich Digital +atermar"ing and Steganography, /nd Ed, #The 0organ ,aufmann 'eries in 0ultimedia Information and ')stems$ #.ardcover 1 =ov +7, /@@:$ / "ran3 D 'hih Digital +atermar"ing and Steganography$ Fundamentals and Techni/ues, CRC Pressg 2 'tefan ,atAenbeisser, "abien, and 8P Petitcolas Information Hiding Techni/ues for Steganography and Digital +atermar"ing, 8rtech .ouse 4 =eil " ;ohnsonF Loran DuricF 'ushil ;aCodia Information Hiding$ Steganography and +atermar"ing % Attac"s and Countermeasures, 'pringer 5 *regor) ,ipper In.estigator0s 1uide to Steganography, 8uerbach Publications IT-/BB Soft0are !ro=ect 6anagement (3-0-2) / 'oftware ProCect 0anagement Concept& The 0anagement 'pectrum, People, Product, Process 9 ProCect 'oftware Process 9 ProCect 0atri?& 'oftware 0easurement, 'iAe >riented 0atrices, "unction >riented 0atrices 'oftware ProCect Planning& >bCectives, Decomposition Techni(ues and Empirical Estimation 0odel Ris3 8nal)ses and 0anagement& Ris3 Identification, ProCection, Ris3 Identification, ProCection, Ris3 Refinement, Ris3 0onitoring and 0anagement ProCect 'cheduling 9 Trac3ing, 'oftware %ualit) 8ssurance, 'oftware Configuration 0anagement Te't ()eferences 5 R ' Pressman, 'oftware Engineering 7 P ;alote, 'oftware ProCect 0anagement in Practice : - .ughest 9 0 Cotterell, 'oftware ProCect 0anagement !rogram ,lecti.e 4I (Semester 4III) IT-/>0 Digital $orensics (3-0-2) / $ile System $orensics& Duplicating hard dis3s for Qdead anal)sisO, reading hidden data on a dis3Js .ost Protected 8rea #.P8$, Direct versus -I>' access, dead versus live ac(uisition, Dis3 partitions 1 D>', 8pple, and *PT partitions, -'D dis3 labels, 'un IolumeF multiple dis3 volumes 1 R8ID and dis3 spanningF 8nal)Aing "8T, =T"', E?t/, E?t2, U"'+, and U"'/ file s)stems, "inding evidence& "ile metadata, recover) of deleted files, Using The 'leuth ,it #T',$, 8utops) "orensic -rowser, and related open source tools <e& $orensics networ31based evidence in !indows and Uni? environments, Reconstructing !eb browsing, e1mail activit), Tracing domain name ownership and the source of e1mails System $orensics !indows Registr) changes, Duplicating and anal)Aing the contents of PD8s and flash memor) devices Electronic document, computer image verification and authentication Te'ts()eferences + -rian Carrier File System Forensic Analysis, 8ddison !esle) / Chris Prosise, ,evin 0andia Incident 2esponse and Computer Forensics, 0c*raw .ill 2 Linda Iolonino, Re)naldo 8nAaldua, and ;ana *odwin Computer Forensics$ #rinciples and #ractices, Prentice .all 4 ,eith ; ;ones, Richard -eCtlich, and Curtis ! Rose 2eal Digital Forensics$ Computer Security and Incident 2esponse, 8ddison !esle) 5 Iacca, ;ohn R, Computer Forensics Computer Crime Scene In.estigation, Charles River 0edia 7 =elson, Phillips, Enfinger, 'teuart 1uide to computer Forensics and In.estigation, Course Technolog) : Papers from ;ournalsKConferences IT-/>2 Biometric Security (3-0-2) / -iometrics& =eed, Conventional techni(ues of authentication, challenges 1 legal and privac) issues -iometrics in use& D=8, fingerprint, Iris, Retinal scan, "ace, hand geometr), human gait, speech, ear .andwriting, ,e)stro3e d)namics, 'ignature 0ultimodal biometrics& Combining biometrics, scaling issues -iometric template securit) Te'ts()eferences + ;ulian D 0 8shbourn, -iometrics& 8dvanced Identif) Ierification& The Complete *uide / Davide 0altoni #Editor$, et al, .andboo3 of "ingerprint Recognition 2 LC ;ain #Editor$ et al, Intelligent -iometric Techni(ues in "ingerprint and "ace Recognition 4 ;ohn Chirillo, 'cott -laul, Implementing -iometric 'ecurit) IT-/>/ 4LSI *lgorithms (3-0-2) 3 + Introduction of IL'I Technolog), IL'I design c)cle, design st)les, basic La)out rules and circuit abstraction, introduction to standard Cell, *ate arra), "P*8 / >verview of basic graph algorithms, *raph algorithms for ph)sical Design 2 Partitioning& Classification of partitioning algorithms, ,arnighan1Lin 8lgorithm, "0 8lgorithm, Ratio cut algorithm 4 "loor1planning& Rectangular dual graph approach of floor1planning, hierarchical tree based approach, Integer programming based floor1planning 5 Placement& placement b) simulated annealing and force directed method 7 Routing& classification of routing algorithms, *lobal routing& 0aAe routing algorithms, line probe algorithms, 'teiner tree based algorithms, Detailed Routing& 'ingle la)er and two la)er routing algorithms, routing in "P*8s Te't()eferences + =aveed 'hervawani, N 8lgorithms for IL'I ph)sical Design 8utomation N III Ed 'pringer / 'arrafAadeh and !ong N 8n introduction to IL'I Ph)sical design N 0*. 2 'Ae& IL'I Technolog) 4 !este and Eshranghan, N Introduction toIL'I DesignO Pearson Edu 5 'adi( 0 'ait, .abib Doussef, QIL'I Ph)sical Design 8utomation& Theor) and PracticeQ, !orld 'cientific Publishing Compan)F 7 Cormen Leiserson, Rivest, N Introduction to 8lgorithmsO, Pearson Edu IT-/>7 Intrusion Detection (3-0-2) / Introduction1 Intrusion detection s)stem #ID'$, intrusion prevention s)stem #IP'$, UnauthoriAed access G buffer overflow, pac3et fragmentation, out1of1spec pac3ets Review of =etwor3 protocol G TCPKIP Intrusiond detection through tcpdump ID' and IP' G 8rchitecture and internals 0alicious and non1malicious traffic, IP headers, TDP, UPD and IC0P protocols and header formats, .eader information to detect intrusion, logs and their anal)sis, ID' through reaction and response Intrusion anal)sis G data correlation, tools, '=>RT Te't()eferences 1. 0att "earnow, 'tephen =orthcutt, ,aren "rederic3, and 0ar3 Cooper Intrusion Signatures and Analysis, '80' 2. Carl Endorf, *ene 'chultA, ;im 0ellander, Intrusion Detection and #re.ention, 0c*raw .ill 3. 'tephen =orthcutt and ;ud) =ova3 ,et-or" Intrusion Detection, '80' 4. Paul E Proctor The #ractical Intrusion Detection Handoo", Prentice .all IT-/>A !attern )ecognition (3-0-2) / Digital Image "undamentals& Image 0odel, 'ampling, %uantiAation, =eighborhood, connectivit) of pi?els, Labelling of connected components, Distance measures Image Transforms& "ourier Transform, Discrete "ourier Transform, Properties of /D Discrete "ourier Transform, The fast "ourier Transform and its algorithm, number of operations, the inverse ""T Discrete Cosine Transform and its applications, ,L Transform, Convolution and correlation Image Enhancement& Enhancement b) point processing, spatial filtering, enhancement in fre(uenc) domain, generation of spatial mas3s from fre(uenc) domain specifications Image 'egmentation& Detection of discontinuities, edge lin3ing and boundar) detection, thresholding, region oriented segmentation Representation and Description& Representation schemes, boundar) descriptors, regional descriptors 0orpholog)& Dilation, erosion, opening, closing, .it1or10iss Transform, some basic morphological algorithms li3e pruning, thinning and thic3ening Te't()eferences + *onAaleA and !oods Digital Image Processing, 8ddison !esle) / Castleman Digital Image Processing Prentice .all 2 Duda and .art Pattern Classification ;ohn !ile) !rogram ,lecti.e 4II (Semester 4III) IT-/A0 6ulti--ore *rchitectures (3-0-2) / 0ultiple core programming models *P*PU programming and streaming data processing Issues related with coherenc), languages and communication overheads in multi1core programming Te?tKReferences& + 8rt of 0ultiprocessor Programming& =ir 'havit, Elsevier IT-/A2 Soft0are Testing (3-0-2) / -asic software testing principles 1 'oftware testing, test case generation and test management 8cceptance Testing& User acceptance testing, alpha and beta testing Ierification and Ialidation, "unctional and =on1functional s)stem testing 'oftware (ualit) assurance 'tatic and d)namic testing, -lac31bo? or functional testing, structural, white bo? or glass bo? testing Integration testing, component testing Te't()eferences + Recent papers from conferences and Cournals / 8 P 0athur, "undamentals of software testing IT-/A/ Distri&ute# Systems (3-0-2) / Introduction& !hat is a distributed s)stemR 0ain characteristics 8dvantagesKDisadvantages Design goals 0ain problems 0odels of distributed s)stems Communication in Distributed ')stems& 0essage passing and the clientKserver model Remote Procedure Call *roup Communication Time and 'tate in Distributed ')stems& Time in distributed s)stems Logical cloc3s Iector cloc3s Causal ordering of messages *lobal state and state recording Distributed 0utual E?clusion& 0utual e?clusion in distributed s)stems =on1to3en based algorithms To3en based algorithms Distributed elections Transaction and concurrenc) control& Introduction Transactions =ested transactions Loc3s >ptimistic concurrenc) control Timestamp ordering Comparison method of concurrenc) control Distributed Transactions& Introduction "lat and nested distributed transactions 8tomic commit protocols, Concurrenc) control in distributed transactions, Distributed deadloc3s Transaction recover) Replication& 0otivation for replication Consistenc) and ordering Total and causal ordering Update protocols and voting Recover) and "ault Tolerance& Transaction recover) Chec3pointing and recover) "ault tolerance in distributed s)stems .ardware and software redundanc) -)Aantine agreement "ile ')stems& Introduction, "ile 'ervice 8rchitecture 'un networ3 file s)stem The 8ndrew "ile s)stem Recent 8dvances Te't()eferences + Distributed ')stems& Concepts and Design, 4rd ed b) Coulouris, *, Dollimore, ;, and ,indberg, T, 8ddison1!esle), /@@7 I'-=& @2/+/72545 / Distributed ')stems& Principles and Paradigms, /nd ed b) Tanenbaum, 8 and van 'teen, 0, Prentice .all, /@@: I'-=& @+2/26//:5 IT-/A7 *#.ance# To"ics in Data Bases (3-0-2) / Transaction 0anagement 1 Transaction Processing, Concurrenc) Control, Recover) 0anagement 8dvanced '%L G Comple? (ueries, =ested 'ub(ueries, Iiews, 0aterialiAed Iiews, Triggers, Referential Integrit), 'ecurit) and 8uthoriAation %uer) Processing and %uer) >ptimiAations Database ')stem 8rchitectures, Distributed Databases, Distributed Transactions, Distributed %uer) Processing Te't()eferences + 'ilberschatA 8, ,orth .", 'udarshan ', Database ')stem Concepts, 0c*rall .ill / Elmasri R and =avathe '-, Fundamentals of Dataase Systems, 2rd Edition, 8ddison !esle),/@@@ This boo3 covers most of the material on the course 2 Date C;, An Introduction to Dataase Systems, :th Edition, 8ddison !esle) IT-/AA ,'"ert Systems (3-0-2) / >verview of 8I, Problem space and searching techni(ues, Production s)stem, Control strategies, .euristic search techni(ues, ,nowledge representation ac(uisition and learning Introduction to E?pert ')stems, Definition t)pes, Component, development process 8rchitecture of E?pert ')stem, Case studies and e?pert s)stem development tools Introduction to 8I languages& PR>L>* and LI'P Te't()eferences + 8rtificial Intelligence& Elaine Rich, ,evin ,night, 0c1*raw .ill / Introduction to 8I 9 E?pert ')stem& Dan ! Patterson, P.I 2 "undamentals of e?pert s)stem, '= 'haran, C-' Publishers