0% found this document useful (0 votes)
70 views28 pages

Syllabus M SC - Information Technology Year 2

Uploaded by

Philip Chettiar
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
70 views28 pages

Syllabus M SC - Information Technology Year 2

Uploaded by

Philip Chettiar
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 28

Syllabus M Sc Information Technology Year 2

M Sc Information Technology Year II, Paper I, Term I SUBJECT: SOFTWARE TESTING Objectives To improve your understanding of software testing - its purpose and nature and raise your awareness of issues and constraints aroun d t e s t i n g . T o p r o v i d e a professional qualification widely recognized by employers, customers and peers. To learnstandard terminology. Discover good sources of information. To pr ovide a completep i c t u r e o f t h e t e s t a c t i v i t i e s a n d p r o c e s s e s f r o m r e q u i r e m e n t s r e v i e w t o s y s t e m implementation. Pre-requisites: Software Engineering, OOAD DETAILED SYLLABUS [Link]: Defect, Defect Vs failures, Process problems and defect rates, Thebusiness perspective for testing [Link] a Software Testing Strategy: Computer system strategic risk, Economicsof testing, Common computer problems, Economics of SDLC testing, Testing- anorganizational issue, Establishing a testing policy, Structured approach to testing, Teststrategy, Testing methodology [Link] a Software Testing Methodology: Introduction, Verification andvalidation, Functional and structural testing, Workbench concept, Considerations indeveloping testing methodologies [Link] Software Testing Techniques: Testing techniques/tool selectionprocess, Selecting techniques/tools, Structural system testing techniques, Functionalsystem testing techniques, Unit testing techniques, Functional testing and analysis [Link] and Installing Software Testing Tools: Testing tools-Hammers of testing,Selecting and using the test tools, Appointing managers for testing tools [Link] Testing Process: Cost of computer testing, Life cycle testing concept,Verification and validation in the software development proces s, Software testingprocess, Workbench skills [Link] Testing Process: [Link] 1

Access Project Management Development Estimate andStatus, Test Plan, Requirements Phase Testing, Design Phase Testing, Program PhaseTesting, Execute Test and Record Results, Acceptance Test, Report Test Result,Testing Software Installation, Test Software Change, Evaluate Test Effectiveness [Link] Specialized Systems and Applications: Client/Server systems, RAD,System documentation, Web based systems , Off-the-self software, Multi platformenvironment, Security, Data Warehouse [Link] Test Document: U s e s , T y p e s , R e s p o n s i b i l i t y , S t o r a g e , T e s t p l a n documentation, Test analysis report documentation Books TextB ooks: 1. W.E. Perry, Effective Methods for Software Testing , John Wiley.2. Kaner C., Nguyen H., Falk J., Testing Computer Software , John Wiley. References: 1. Boris Beizer, Software Testing Techniques, Dreamtech2. Louise Tamres, Introducing Software Testing , Pearson Education. Assignments: 10 assignments covering the syllabus has tobe submitted M Sc Information Technology Year II, Paper I, TermII SUBJECT: INFORMATION SECURITY Objectives of the course: Learn about the threats in computer security. Understand whatputs you at a risk and how to control it. Controlling a risk is not eliminating the risk but tobring it to a tolerable level. Pre-requisites: Computer Networks, Operating system. DETAILED SYLLABUS

[Link]

[Link]: Security, Attacks, Computer criminals, Method of defense 2. Program Security: Secure programs, Non-malicious program errors, Viruses andother malicious code, Targeted malicious code, Controls against program threats [Link] System Security: Protected objects and methods of protection, Memoryaddress protection, Control of access to general objects, File protection mechanism,Authentication: Authentication basics, Password, Challenge-response, Biometrics. [Link] Security: Security requirements, Reliability and integrity, Sensitive data,Interface, Multilevel database, Proposals for multilevel security [Link] in Networks: Threats in networks, Network security control, Firewalls,Intrusion detection systems, Secure e-mail, Networks and cryptography, Example protocols: PEM, SSL, IPsec [Link] Security: Security planning, Risk analysis, Organizational securitypolicies, Physical security. 7. Legal, Privacy, and Ethical Issues in Computer Security: P rotecting programsand data, Information and law, Rights of employees and employers, Software failures,Computer crime, Privacy, Ethical issues in computer society, Case studies of ethics Books Text Books: 1. C. P. Pfleeger, and S. L. Pfleeger, Security in Computing , Pearson Education.2. Matt Bishop, Computer Security: Art and Science , Pearson Education. References : 1. Stallings , Cryptography And Network Security: Principles and practice 2. Kaufman, Perlman, Speciner, Network Security 3. Eric Maiwald, Network Security : A Beginners Guide , TMH4. Macro Pistoia, Java Network Security [Link] 3

, Pearson Education5. Whitman, Mattord, Principles of information security, Thomson Assignments: 10 assignments covering the syllabus has tobe submitted M Sc Information Technology Year II, Paper II, TermI SUBJECT: Artificial Intelligence 1 AI and Internal Representation Artificial Intelligence and the World, Representation in AI, Properties of Internal Representation,The Predicate Calculus, Predicates and Arguments, Connectives Variables and Quantification,How to Use the Predicate Calculus, Other Kinds of Inference Indexing, Pointers and AlternativeNotations, Indexing, The Isa Hierarchy, Slot-Assertion Notation, Frame Notation 2 Lisps Lisps, Typing at Lisp, Defining Programs, Basic Flow of Control in Lisp, Lisp Style, Atoms andLists, Basic Debugging, Building Up List Structure, More on Predicates, Properties, Pointers,Cell Notation and the Internals (Almost) of Lisp, Destructive Modification of Lists, The for Function ,Recursion, Scope of Variables, Input/Output, Macros 3. Neural Networks and Fuzzy systems Neural and fuzzy machine Intelligence, Fuzziness as Multivalence, The Dynamical Systemsapproach to Machine Intelligence, The brain as a dynamical system, Neural and fuzzy systemsas function Estimators, Neural Networks as trainable Dynamical system, Fuzzy systems andapplications, Intelligent Behavior as Adaptive Model free Estimation, Generalization andcreativity, Learning as change, Symbol vs Numbers, Rules vs Principles, Expert systemKnowledge as rule trees, Symbolic vs Numeric Processing, Fuzzy systems as StructuredNumerical estimators, Generating Fuzzy rules with product space Clustering, Fuzzy Systems asParallel associators, Fuzzy systems as Principle based Systems 1. Neural Network Theory Neuronal Dynamics: Activations and signals , Neurons as functions, signal monotonicity,Biological Activations and signals, Neuron Fields, Neuron Dynamical Systems, Commonsignal functions, Pulse-Coded Signal functions 2. Genetic Algorithms

[Link]

A simple genetic algorithm, A simulation by hands, similarity templates(Schemata),Mathematical foundations, Schema Processing at work, The two- armed and k-armed BanditProblem, The building block hypothesis, The minimal Deceptive Problem Computer implementation of Genetic algorithm, Data Structures, Reproduction , Cross over andMutation, Time to reproduce and time to Cross Mapping objective function to fitness form,Fitness scalingApplications of genetic algorithm, De Jong and Function Optimization, Improvement in basictechniques, Introduction to Genetics based machine learning, applications of genetic basedmachine leaning 3. Data Mining Introduction to Data Mining, Computer systems that can learn, Machine learning andmethodology of science, Concept learning, Data ware house, designing decision supportsystems, Client server and data warehousing, Knowledge Discovery Process, VisualizationTechniques, K- nearest neighbor, Decision trees, OLAP tools, Neural networks, Geneticalgorithm, Setting up a KDD environment, Real life applications, Customer profiling,Discovering foreign key relationships Assignments 10 assignments covering the syllabus has to be submitted Text book Introduction to Artificial Intelligence By Eugene Charniak, Drew McDermottAddisonWesley Neural Networks and fuzzy systems A dynamical systems approach to machineIntelligence by Bart Kosko- PHI Genetic Algorithms in search, Optimization & Machine Learning by David E Goldberg-Addison Wesley Data Mining by Pieter Adriaans and Dolf Zantinge Pearson Education Asia Data Warehousing in the Real World by Sam Anahory and Dennis Murray, Addison-Wesley M Sc Information Technology Year II, Paper II, TermII SUBJECT: ROBOTICS Objective:

[Link]

The goal of the course is to familiarize the students with the concepts andtechniques in robot manipulator control, enough to evaluate, chose, and incorporate robotsin engineering systems. Pre-requisite: Exposure to linear algebra and matrix operations. Exposure to programmingin a high level language DETAILED SYLLABUS 1. Robotic Manipulation : Automation and Robots, Classification, Application,Specification, Notations. [Link] Kinematics : Dot and cross products, Co-ordinate frames, Rotations,Homogeneous, Coordinates, Link co-ordination arm equation, (Five-axis robot, Fouraxis robot, Six axis robot). [Link] Kinematics : General properties of solutions tool configuration Five axisrobots, Three-Four axis, Six axis robot (Inverse kinematics). 4. Workspace analysis and trajectory planning work envelop and examples, workspacefixtures, Pick and place operations, Continuous path motion, Interpolated motion, 5. Robot Vision: Image representation, Template matching, Polyhedral objects, Shaneanalysis, Segmentation (Thresholding, region labeling, Shrink operators, Swelloperators, Euler numbers, Perspective transformation, Structured Illumination, Cameracalibration). 6. Task Planning: Task level programming, Uncertainty, Configuration, Space, Grossmotion, Planning, Grasp planning, Fine-motion Planning, Simulation of Planer motion,Source and goal scenes, Task planner simulation. 7. Moments of Inertia.8. Principles of NC and CNC Machines. BOOKS Text Books: 1. Robert Shilling, Fundamentals of Robotics-Analysis and control, PHI.2. Fu, Gonzales and Lee, Robotics, McGraw Hill3. J.J, Craig, Introduction to Robotics [Link] 6

, Pearson Education References: 1. Staughard, Robotics and AI, PHI.2. Grover, Wiess, Nagel, Oderey, Industrial Robotics, McGraw Hill 3. Walfram Stdder, Robotics and Mecatronics , TMH. 4. Niku, Introduction to Robotics, Pearson Education 5. Klafter, Chmielewski, Negin, Robot Engineering , PHI 6. Mittal, Nagrath, Robotics and Control , TMH Assignments: 10 assignments covering the syllabus has tobe submitted

M Sc Information Technology Year II, Elective I, TermI SUBJECT: PARALLEL PROCESSING Objective: Upon completion of this course students will be able to understand andemploy the fundamental concepts and mechanisms which form the basis of the design of parallel computation models and algorithms, recognize problems and limitations toparallel systems, as well as possible solutions Pre-requisite: Computer architecture, Data structures DETAILED SYLLABUS [Link]: Parallel Processing Architectures: Parallelism in sequential machines,Abstract model of parallel computer, Multiprocessor architecture, Pipelining, Arrayprocessors. [Link] Issues: An overview, Operating system support, Types of operating systems, Parallel programming models, Software tools [Link] Dependency Analysis: Types of dependencies loop and array dependences,Loop dependence analysis, Solving diophantine equations, Program transformations [Link] Memory Programming: [Link] 7

General model of shared memory programming,Process model under UNIX [Link] for Parallel Machines: Speedup, Complexity and cost, Histogramcomputation, Parallel reduction, Quadrature problem, Matrix multiplication, Parallelsorting algorithms, Solving linear systems, Probabilistic algorithms [Link] Passing Programming: Introduction, Model, Interface, Circuitsatisfiability, Introducing collective, Benchmarking parallel performance [Link] Programming languages: Fortran90, nCUBE C, Occam, C-Linda [Link] Parallel Programs: Debugging techniques, Debugging message passingparallel programs, Debugging shared memory parallel programs [Link] and I/O Subsystems: Hierarchical memory structure, Virtual memorysystem, Memory allocation and management, Cache allocation and management,Cache memories and management, Input output subsystems [Link] Parallelism Paradigms: Data flow computing, Systolic architectures,Functional and logic paradigms, Distributed shared memory [Link] of Parallel Processors: Speedup and efficiency, Amdahls law,Gustafson-Barsiss law, Karf-Flatt metric, Isoefficiency metric BOOKS Text Books: 1. Hawang Kai and Briggs F. A., Computer Architecture and Parallel Processing ,McGraw Hill 2. Jorden H. F. and Alaghaband G., Fundamentals of Parallel Processing 3. M.J. Quinn, 3. Parallel Programming , TMH References: 1. Shasikumar M., Introduction to Parallel Processing , PHI 2. Wilson G.V., Practical Parallel Programming , PHI

[Link]

3. D. E. Culler, J.P. Singh, A. Gupta, Parallel Computer Architecture, MorganKaufman TERM WORK 8. Term work should consist of at least 10 practical experiments and two assignmentscovering the topics of the syllabus. ORAL EXAMINATION An oral examination is to be conducted based on the above syllabus.

[Link]

M Sc Information Technology Year II, Elective I, TermII SUBJECT: DISTRIBUTED COMPUTING Objective: This course aims to build concepts regarding the fundamental principles of distributed systems. The design issues and distributed operating system concepts arecovered. Pre-requisites: Operating Systems and Computer Networks DETAILED SYLLABUS [Link] to Distributed System: Goals, Hardware concepts, Softwareconcepts, and Client-Server model. Examples of distributed systems. 2. Communication: Layered protocols, Remote procedures call, Remote objectinvocation, Messageoriented communication, Stream-oriented communication. 3. Processes: Threads, Clients, Servers, Code Migration, Software agent. 4. Naming: Naming entities, Locating mobile entities, Removing un-referencedentities. 5. Synchronization: Clock synchronization, Logical clocks, Global state, Electionalgorithms, Mutual exclusion, Distributed transactions. 6. Consistency and Replication: Introduction, Data centric consistency models, Client centric consistency models, Distribution protocols, Consistency protocols. 7. Fault Tolerance: Introduction, Process resilience, Reliable client servercommunication, Reliable group communication. Distributed commit, Recovery. [Link]: Introduction, Secure channels, Access control, Security management. 9. Distributed File System: Sun network file system, CODA files system. [Link] 10

[Link] Study: CORBA, Distributed COM, Globe, Comparison of CORBA, DCOM,and Globe. BOOKS Text Books: 1. A. Taunenbaum, Distributed Systems: Principles and Paradigms 2. G. Coulouris, J. Dollimore, and T. Kindberg, Distributed Systems: Concepts and Design , Pearson Education References: 1. M. Singhal, N. Shivaratri, Advanced Concepts in Operating Systems , TMH TERM WORK 9. Term work should consist of at least 10 practical experiments and two assignmentscovering the topics of the syllabus. ORALEXAMINATION An oral examination is to be conducted based on the above syllabus.

M Sc Information Technology Year II, Elective I, TermI SUBJECT: INTELLIGENT SYSTEMS


Objectives: To understand and apply principles, methodologies and techniques in designand implementation of intelligent system. Prerequisite: Data Structures, Programming Languages, and Algorithms DETAILED SYLLABUS [Link] Intelligence : An overview, Intelligent Systems: Evolution of the concept. [Link] Agents : How agent should act, Structure of intelligent agents,Environments 3. Problem Solving: Solving problems by searching, Informed search methods, Gameplaying 4. Knowledge and Reasoning: [Link] 11

A knowledge based agent, The wumpus worldenvironment, Representation, Reasoning, Logic, Proportional logic, First order logic:Syntax and Semantics, Extensions and Notational variation, Using first order logic 5. Building a Knowledge Base: Properties of good and bad knowledge base, Knowledge engineering, General ontology 6. Interfacing First Order Logic: Interface rules involving quantifiers, An exampleproof, Forward and backward chaining, Completeness 7. Acting Logically: Planning, Practical planning: Practical planners, Hierarchicaldecomposition, Conditional planning 8. Uncertain Knowledge and Reasoning: Uncertainty, Representing knowledge in anuncertain domain, The semantics of belief networks, Inference in belief networks 9. Learning: Learning from observations: General model of learning agents,Inductive learning, learning decision trees, Learning in neural and belief networks:Introduction to neural networks, Perceptrons, Multilayer feed-forward network,Application of ANN, Reinforcement learning: Passive learning in a knownenvironment, Generalization in reinforcement learning, Genetic algorithms 10. Agents that Communicate: Communication as action, Types of communicatingagents, A formal grammar for a subset of English 11. Expert system: Introduction to expert system, Representing and using domainknowledge, Expert system shells, Explanation, Knowledge acquisition 12. Applications: Natural language processing, Perception, Robotics BOOKS Text Books: 1. Struart Russell and Peter Norvig, Artificial Intelligence: A Modern Approach 2. George [Link], Artificial Intelligence: Structures and Strategies for Complex Problem Solving , Pearson Education [Link] 12

References: 1. Nils J. Nillson, Artificial Intelligence: A New Synthesis , Harcourt Asia 2. Elaine Rich and Kevin Knight, Artificial Intelligence , TMH3. Patrick Winston, Artificial Intelligence , Pearson Education4. Ivan Brakto, Prolog Programming for Artificial Intelligence , Pearson Education5. Efraim Turban Jay [Link], Decision Support Systems and Intelligent Systems 6. Ed. M. Sasikumar and Others, Artificial Intelligence : Theory and Practice Proceedings of the International Conference KBCS-2002, Vikas Publishing House TERM WORK 10. Term work should consist of at least 10 practical experiments and two assignmentscovering the topics of the syllabus. ORAL EXAMINATION An oral examination is to be conducted based on the above syllabus.

M Sc Information Technology Year II, Elective I, Term II SUBJECT: NEURAL NETWORKS & FUZZYSYSTEMS
Objective: This course covers basic concepts of artificial neural networks, fuzzy logicsystems and their applications. Its focus will be on the introduction of basic theory,algorithm formulation and ways to apply these techniques to solve real world problems. Pre-requisite: Knowledge of calculus, and basic probability and statistics are [Link] in the following subjects desirable: numerical analysis (includingoptimization). Programming skills in one of the following would be desirable: Matlab,MathCad, C, Java, C++ DETAILED SYLLABUS [Link]: Biological neurons, McCulloch and Pitts models of neuron, Types of activation function, Network architectures, Knowledge representation. Learningprocess: [Link] 13

Error-correction learning, Supervised learning, Unsupervised learning,Learning Rules. [Link] Layer Perceptron: Perceptron convergence theorem, Method of steepestdescent - least mean square algorithms .[Link] Perceptron : Derivation of the back-propagation algorithm, LearningFactors. [Link] Basis and Recurrent Neural Networks: RBF network structure, theoremand the reparability of patterns, RBF learning strategies, K-means and LMS algorithms, comparison of RBF and MLP networks, Hopfield networks: energyfunction, spurious states, error performance [Link] Annealing : The Boltzmann machine, Boltzmann learning rule,Bidirectional Associative Memory. [Link] logic: Fuzzy sets, Properties, Operations on fuzzy sets, Fuzzy relations,Operations on fuzzy relations, The extension principle, Fuzzy measures, Membershipfunctions, Fuzzification and defuzzification methods, Fuzzy controllers. BOOKS Text Books: 1. Simon Haykin, Neural Network a - Comprehensive Foundation , PearsonEducation2. Zurada J.M., Introduction to Artificial Neural Systems, Jaico publishers3. Thimothy J. Ross, Fuzzy Logic with Engineering Applications , McGraw Hill4. Ahmad Ibrahim, Introduction to Applied Fuzzy Electronics , PHI References: 1. Yegnanarayana B., Artificial Neural Networks , PHI2. Driankov D., Hellendoorn H. & Reinfrank M., An Introduction to Fuzzy Control ,Norosa Publishing House3. Berkan R.C., and Trubatch S.L., Fuzzy Systems Design Principles , IEEE Press [Link] 14

TERM WORK 11. Term work should consist of at least 10 practical experiments and two assignmentscovering the topics of the syllabus. ORAL EXAMINATION An oral examination is to be conducted based on the above syllabus

M Sc Information Technology Year II, Elective I, Term I SUBJECT: DIGITAL SIGNAL PROCESSING
Objective: Digital Signal Processing continues to play an increasingly important role inthe fields that range literally from A (astronomy) to Z (zeugmatography, or magneticresonance imaging) and encompass applications such as Compact Disc player, SpeechRecognition, echo cancellations in communication systems, image Enhancement,geophysical exploration, and noninvasive medical imaging. This course aims to buildconcepts regarding the fundamental principles and applications of Signals, SystemTransforms and Filters. Pre-requisites : Nil DETAILED SYLLABUS [Link] Time Signals & System: Discretetime signals, Discretetime systems,Analysis of discrete-time LTI systems, Discrete-time systems described by differentialequations, Implementation of discrete-time systems, Correlation of discrete-timesystems 2.Z-Transform: Definition and Properties of Z-transform, Rational Z-transforms,Inverse Ztransform, one-sided Z-transform, Analysis of LTI systems in Z-domain [Link] Analysis of Signals and Systems: Frequency analysis: Continuous timesignals and Discrete-time signals, Properties of the Fourier transform for discrete-timesignals, Frequency domain characteristics of LTI systems, LTI system as a frequencyselective filter, Inverse systems and deconvolution [Link] Fourier Transform: Frequency domain sampling, Properties of DFT,Linear filtering method based on DFT, Frequency analysis of signals using DFT, FFT algorithm, Applications of FFT, Goertzel algorithm, Quantisation effects in thecomputation of DFT [Link] of Discrete Time Systems: [Link] 15

Structure of FIR systems, Structure of IIR systems, quantization of filter coefficients, round-off effects in digital filters [Link] of Digital Filters: Design of FIR filters, Design of IIR filters from analogfilters, frequency transformations, Design of digital filters based on least-squaresmethod digital filters from analogue filters, Properties of FIR digital filters, Design of FIR filters using windows, Comparison of IIR and FIR filters, and Linear phase filters. [Link] to DSP coprocessors: TMS 320C40/50, Analog Devices .[Link] : Image processing, Control, Speech, Audio, Telecommunication BOOKS Text Books: 1. J.G. Proakis, Introduction to Digital Signal Processing , PHI2. Oppenhiem and Schaffer, Discrete Time Signal Processing References: 1. S.K. Mitra, Digital Signal Processing , TMH.2. T.J. Cavicchi, Digital Signal Processing , John Wiley.3. L.C. Ludeman, Fundamentals Of Digital Signal Processing , John Wiley.4. E.C. Ifeachor, B.W. Jervis, Digital Signal Processing , Pearson Education.5. S Sallivahanan, Digital Signal Processing , TMH.6. Ashok Ambardar, Analog and Digital Signal Processing , Thompson Learning. TERM WORK 12. Term work should consist of at least 10 practical experiments and two assignments ORAL EXAMINATION An oral examination is to be conducted based on the above syllabus.

[Link]

16

M Sc Information Technology Year II, Elective I, Term I SUBJECT: Enterprise Networking


Introduction Growth of Computer Networking, Complexity in Network Systems, Mastering the Complexity,Resource Sharing, Growth of the Internet, Probing the Internet, Interpreting A Ping Response PART I DATA TRANSMISSION Transmission Media Copper Wires, Glass Fibers, Radio, Satellites, Geosynchronous Satellites, Low Earth OrbitSatellites, Low Earth Orbit Satellite Arrays, Microwave, Infrared, Light Form a Laser Local Asynchronous Communication The Need for Asynchronous Communication, Using Electric Current to Send Bits, Standards for Communication, Baud Rate, Framing, and Errors, Full Duplex Asynchronous Communication,Limitations of Real Hardware, Hardware Bandwidth and the Transmission of Bits, The Effect of Noise On Communication, Significance for Data Networking Long-Distance Communication (Carriers, Modulation and Modems) Sending Signals across Long Distances, Modem Hardware Used for Modulation andDemodulation, Leased Analog Data Circuits, Optical, Radio Frequency, And Dialup Modems,Carrier Frequencies and Multiplexing, Base band And Broadband TechnologiesWave Division Multiplexing, Spread Spectrum, Time Division Multiplexing PART II PACKET TRANSMISSION Packets, Frames and Error Detection The Concept of Packets, Packets and Time-Division Multiplexing, Packets and Hardware Frames, Byte Stuffing, Transmission Errors, Parity Bits and Parity Checking, Probability,Mathematics And Error Detection, Detecting Errors With Checksums, Detecting Errors WithCyclic Redundancy Checks, Combining Building Blocks, Burst Errors, Frame format And Error Detection Mechanisms LAN Technologies and Network Topology Direct Point-To-Point Communication, Shared Communication Channels, Significance of LANsand Locality of Reference, LAN Topologies, Bus Network: Ethernet Carrier Sense on Multi-Access Networks (CSMA), Collision Detection and Back off With CSMA/CD, Wireless LANsAnd CSMA/CA, Bus Network: Local Talk Hardware Addressing and Frame Type Identification [Link] 17

Specifying a Recipient, How LAN Hardware Uses Addresses to Filter Packets Format of aPhysical Address, Broadcasting, Multicasting, Multicast Addressing, Identifying PacketContents, Frame Headers And Frame Format, Using Networks That Do Not Have Self-Identifying Frames, Network Analyzers LAN Wiring, Physical Topology, and Interface Hardware Speeds of LANs and Computers, Network Interface Hardware, the Connection between A NICand A Network, Original Thick Ethernet Wiring, Connection Multiplexing, Thin Ethernet WiringTwisted Pair Ethernet, the Topology Paradox, Network Interface Cards and Wiring Schemes, Extending LANs: Fiber Modems, Repeaters, Bridges and Switches Distance Limitation and LAN Design, Fiber Optic Extensions, Repeaters, Bridges, FrameFilteringStartup and Steady State Behavior of Bridged Networks, Planning a Bridged Network, BridgingBetween Buildings, Bridging Across Longer Distances, A Cycle Of Bridges, DistributedSpanning Tree, Switching, Combining Switches And Hubs, Bridging And Switching With Other Technologies Long-Distance Digital Connection Technologies Digital Telephony, Synchronous Communication, Digital Circuits and DSU, TelephoneStandardsDS Terminology and Data Rates, Lower Capacity Circuits, Intermediate Capacity Digital CircuitsHighest Capacity Circuits, Optical Carrier Standards, the C Suffix, Synchronous OpticalNetwork (SONET), the Local Subscriber Loop, ISDN, Asymmetric Digital Subscriber LineTechnologyOther DSL Technologies, Cable Modem Technology, Upstream Communication, Hybrid Fiber Coax Wan Technologies and Routing Large Networks and Wide Areas, Packet Switches, Forming A WAN, Store and ForwardPhysical Addressing In A WAN, Next-Hop Forwarding, Source Independence, Relationship of Hierarchical Addresses to Routing, Routing In A WAN, Use of Defaults Routes, Routing TableComputation, Shortest Path Computation in a Graph, Distributed Route Computation, DistanceVector Routing Network Ownership, Service Paradigm, and Performance Network Ownership, Virtual Private Networks, Service Paradigm, Connection Duration andPersistence, Examples of Service Paradigms, Addresses and Connection Identifiers, NetworkPerformance Characteristics Protocols and Layering The Need for Protocols, Protocol Suites, A Plan for Protocol Design, the Seven Layers, Stacks:Layered Software, How Layered Software Works, Multiple, Nested Headers, the Scientific Basisfor Layering, TERM WORK

[Link]

18

Term work should consist of at least 10 assignments from the aforementioned topics. A Seminar to be presented by each student as part of term works carrying 15 marks. REFERENCE Computer Network, Tuekeun, PHI Networking Technology, Jaiswal, Galgotia. Data Networking, Bertsekas, PHI Computer Networks and Internets, Douglas E. Comer Pearson Education Asia

M Sc Information Technology Year II, Elective II, TermI SUBJECT: PATTERN RECOGNITION
Objective: This course teaches the fundamentals of techniques for classifying multidimensional data, to be utilized for problem-solving in a wide variety of applications,such as engineering system design, manufacturing, technical and medical diagnostics,image processing, economics, psychology. Pre-requisite: Linear Algebra, Probability and Statistics DETAILED SYLLABUS [Link]: Machine perception, Pattern recognition systems, Design cycle,Learning and Adaptation [Link] Decision Theory: Bayesian decision theory: Continuous features,Minimum-error rate classification, classification, Classifiers, Discriminant functionsand Decision surfaces, Normal density, Discriminant functions for normal density,Bayes Decision theory: discrete features [Link]-Likelihood and Bayesian Parameter Estimation: Maximum likelihoodestimation, Bayesian estimation, Bayesian parameter estimation: Gaussian caseandGeneral theory, Prolems of dimentionality, Hidden Markov Model [Link] Techniques: Density estimation, Parzen windows, k n-Nearest- Neighbor estimation, Nearest-Neighbor rule, Matrics and NearestNeighborclassification [Link] Discriminants Functions: [Link] 19

Linear discriminant functions and decisionsurfaces, Generalised linear discriminant functions, 2-Category linearly separable case,Minimising the Perceptron criterion function, Relaxation procedure, Non-separablebehavior, Minimum squared error procedure, Ho-Kashyap procedures, Multicategorygeneralizations [Link] Methods: Decision tree, CART, ID3, C4.5, Gramatical methods,Gramatical interfaces 7. Algorithm Independent Machine Learning: Lack of inherent superiority of anyclassifier, Bias and Variance, Resampling for estimating statistic, Resampling forclassifier design, Estimating and comparing classifiers, Combining classifiers 8. Unsupervised Learning and Clustering: Mixture densities and Identifiability,Maximum-Likelihood estimations, Application to normal mixtures, UnsupervisedBayesian learning, Data description and clustering criterion function for clustering,Hierarchical clustering 9. Applications of Pattern Recognition BOOKS Text Books: 1. Duda, Hart, and Stock, Pattern Classification , John Wiley and Sons.2. Gose, Johnsonbaugh and Jost, Pattern Recognition and Image analysis , PHI TERM WORK Term work should consist of at least 10 practical experiments and two assignmentscovering the topics of the syllabus. ORAL EXAMINATION An oral examination is to be conducted based on the above syllabus.

M Sc Information Technology Year II, Elective II, Term II SUBJECT: COMPUTER VISION
Objective: To introduce the student to computer vision algorithms, methods and conceptswhich will enable the student to implement computer vision systems with emphasis onapplications and problem solving [Link] 20

Pre-requisite: Introduction to Image Processing. DETAILED SYLLABUS Recognition Methodology: Conditioning, Labeling, Grouping, Extracting,Matching. Edge detection, Gradient based operators, Morphological operators, Spatialoperators for edge detection. Thinning, Region growing, region shrinking, Labeling of connected components. Binary Machine Vision: Thresholding, Segmentation, Connected componentlabeling, Hierarchal segmentation, Spatial clustering, Split & merge, Rule-basedSegmentation, Motion-based segmentation. Area Extraction: Concepts, Data-structures, Edge, Line-Linking, Hough transform,Line fitting, Curve fitting (Least-square fitting).12. Region Analysis: Region properties, External points, Spatial moments, Mixed spatialgray-level moments, Boundary analysis: Signature properties, Shape numbers. Facet Model Recognition: Labeling lines, Understanding line drawings,Classification of shapes by labeling of edges, Recognition of shapes, Consisting labeling problem, Back-tracking, Perspective Projective geometry, Inverse perspectiveProjection, Photogrammetry from 2D to 3D, Image matching : Intensity matching of ID signals, Matching of 2D image, Hierarchical image matching. Object Models And Matching: 2D representation, Global vs. Local features. General Frame Works For Matching: Distance relational approach, Ordered-structural matching, View class matching, Models database organization. General Frame Works: Distance relational approach, Ordered Structuralmatching, View class matching, Models database organization. Knowledge Based Vision: Knowledge representation, Control-strategies,Information integration.

[Link]

21

BOOKS Text Books: 1. David A. Forsyth, Jean Ponce, Computer Vision: A Modern Approach 2. R. Jain, R. Kasturi, and B. G. Schunk, Machine Vision , McGraw-Hill. References: 1. Milan Sonka,Vaclav Hlavac, Roger Boyle, Image Processing, Analysis, and Machine Vision Thomson Learning 2. Robert Haralick and Linda Shapiro, Computer and Robot Vision , Vol I, II,Addison-Wesley, 1993. TERM WORK Term work should consist of at least 10 practical experiments and two assignments covering the topics of the syllabus. ORAL EXAMINATION An oral examination is to be conducted based on the above syllabus.

M Sc Information Technology Year II, Elective II, Term I SUBJECT: SYSTEM SECURITY
Objectives of the course: Learn about the threats in computer security. Understand whatputs you at a risk and how to control it. Controlling a risk is not eliminating the risk but tobring it to a tolerable level. Pre-requisites: Computer Networks, Operating system. DETAILED SYLLABUS [Link]: Security, Attacks, Computer criminals, Method of defense 9. Cryptography: Basic Cryptography: Classical Cryptosystems, Public keyCryptography, Cryptographic checksum, Key Management: Key exchange, Keygeneration, Cryptographic key infrastructure, Storing and revoking keys, Hashalgorithm, [Link] 22

Digital signature, Cipher Techniques: Problems, Stream and block ciphers:AES, DES, RC4. 10. Program Security: Secure programs, Non-malicious program errors, Viruses andother malicious code, Targeted malicious code, Controls against program threats [Link] System Security: Protected objects and methods of protection, Memoryaddress protection, Control of access to general objects, File protection mechanism,Authentication: Authentication basics, Password, Challenge-response, Biometrics. [Link] Security: Security requirements, Reliability and integrity, Sensitive data, Interface, Multilevel database, Proposals for multilevel security [Link] in Networks: Threats in networks, Network security control, Firewalls,Intrusion detection systems, Secure e-mail, Networks and cryptography, Exampleprotocols: PEM, SSL, IPsec [Link] Security: Security planning, Risk analysis, Organizational securitypolicies, Physical security. 15. Legal, Privacy, and Ethical Issues in Computer Security: P rotecting programsand data, Information and law, Rights of employees and employers, Software failures,Computer crime, Privacy, Ethical issues in computer society, Case studies of ethics Books Text Books: 3. Stallings , Cryptography And Network Security: Principles and practice 4. C. P. Pfleeger, and S. L. Pfleeger, Security in Computing , Pearson Education. 5. Matt Bishop, Computer Security: Art and Science, Pearson Education. References : 6. Kaufman, Perlman, Speciner, Network Security 7. Eric Maiwald, Network Security : A Beginners Guide, TMH 8. Bruce Schneier, Applied Cryptography, John Wiley. 9. Macro Pistoia, Java network security, Pearson Education 10. Whitman, Mattord, Principles of information security,Thomson [Link] 23

TERM WORK Term work should consist of at least 10 practical experiments and two assignments covering the topics of the syllabus. ORAL EXAMINATION An oral examination is to be conducted based on the above syllabus.

M Sc Information Technology Year II, Elective II, Term II Subject: Virtual Reality and Virtual Environment
Real time computer graphics, Flight simulation, virtual environment, Benefits of virtual reality,Evolution of Virtual Reality, Historical perspective, scientific land marks 3D Computer graphics The virtual world space, positioning the virtual observer, the perspective projection, Human vision,Stereo perspective projection, 3D clipping, colour theory, simple 3D modelling, illumination models,shading algorithms, radiosity, hiddensurface removal, realism, stereographic images Geometric modelling From 2D to 3D, 3D space curves, 3D boundary representation, Geometrical Transformations Frames of reference, Modelling transformations, instances, picking flying, Scaling the VE, Collisiondetection A generic VR Systems The virtual Environment, The computer environment, VR Technology, Modes of Interaction, VR systems Animating the Virtual Environment Dynamics of numbers, the animation of objects, shape and object inbetweening, free-formdeformation, particle systems Physical Simulation Objects falling in a gravitational field, rotating wheels, Elastic collisions, Projectiles, simplependulums, springs, flight dynamics of an aircraft Human factors The eye, The ear, the somatic senses, Equilibrium Virtual Reality Hardware Sensor hardware, Head-coupled displays, Acoustic hardware, Integrated VR Systems [Link] 24

Virtual Reality Software Modelling Virtual worlds, Physical simulation, VR tool kits Virtual Reality Applications Engineering, Entertainment, science, Education, trainingFutureVirtual Environment, Modes of Interaction Text Books Virtual Reality Systems John Vince- Pearson Education Asia

M Sc Information Technology Year II, Elective III, Term I Subject: Multimedia systems and convergence of technologies

Multimedia systems and convergence of technologies Defining the scope of multimedia, Hypertext and Collaborative research, Multimedia and personalisedcomputing, Multimedia on the map, Emerging applications, The challenges The convergence of computers, Communications, and entertainment products The technology trends, Multimedia appliances, Hybrid Devices, Designers perspective, industryperspective of the future, Key challenges ahead, Technical, regulatory, Social Architectures and issues for Distributed Multimedia systems Distributed Multimedia systems, Synchronization, and QOS Architecture, The role of Standards, Aframe work for Multimedia systems Digital Audio Representation and processing Uses of Audio in Computer Applications, Psychoacoustics, Digital representation of sound,transmission of digital sound, Digital Audio signal processing, Digital music making, Speechrecognition and generation, digital audio and the computersVideo TechnologyRaster Scanning Principles, Sensors for TV Cameras, Colour Fundamentals, Colour Video, Videoperformance Measurements, Analog video Artifacts, video equipments, World wide televisionstandards Digital Video and Image Compression Video compression techniques, standardization of Algorithm, The JPEG Image Compression Standard,ITU-T Recommendations, The EPEG Motion Video Compression Standard, DVI Technology Operating System Support for Continuous Media Applications Limitation of Work station Operating system, New OS support, Experiments Using Real Time Mach [Link] 25

Middleware System Services Architecture Goals of Multimedia System services, Multimedia system services Architecture, Media stream protocol Multimedia Devices, Presentation Services, and the User Interface Client control of continuous multimedia, Device control, Temporal coordination and composition,toolkits, hyperapplications Multimedia File systems and Information Models The case for multimedia information systems, The file system support for continuous Media, Datamodels for multimedia and Hypermedia information, Content- based Retrieval of Unstructured Data Multimedia presentation and Authoring Design paradigms and User interface, barriers to wide spread use, research trends Multimedia Services over the Public Networks Requirements, Architecture, and protocols, Net work services, applications Multimedia Interchange Quick time Movie File Format, QMFI, MHEG (Multimedia and Hypermedia Information EncodingExpert Group), Format Function and representation, Track model and Object model, Real TimeInterchange Multimedia conferencing Teleconferencing Systems, Requirements of Multimedia Communications, Shared ApplicationArchitecture and embedded Distributed objects, Multimedia Conferencing Architecture Multimedia Groupware Computer and Video fusion approach to open shared wok place, High Definition Television anddesktop computing, HDTV standards, Knowledge based Multimedia systems, Anatomy of anIntelligent Multimedia system Text Book Multimedia Systems by John F. Koegel Buford- Pearson Education

M Sc Information Technology Year II, Elective II, Term I SUBJECT: Java Technology
Java Programming Object oriented programming revisited, JDK, Java Virtual machine-Platform independent-portability-scalability Operators and expressions-decision making ,branching, looping, Classes,Objects and methods, Arrays Strings and Vectors, Interfaces, Packages, Multi-Threading,managing errors and exceptions, Applet programming, Managing files and streams [Link] 26

Java Technology for Active Web Documents An Early Form of Continuous Update, Active Documents and Server Overhead, ActiveDocument Representation and Translation, Java Technology, the Java Run-Time Environment,The Java LibraryA Graphics Toolkit, Using Java Graphics on a Particular Computer, Java Interpreters andBrowsers Compiling a Java Program, Invoking an Applet, Example of Interaction with a Browser RPC and Middleware Programming Clients and Servers, Remote Procedure Call Paradigm, RPC Paradigm,Communication Stubs, External Data Representation, Middleware and Object-OrientedMiddleware Network Management (SNMP) Managing an Internet, The Danger of Hidden Features, Network Management Software,Clients, Servers, Managers and Agents, Simple Network Management Protocol, Fetch-StoreParadigm, The MIP and Object Names, The Variety of MIB Variables, MIB variables that Java technologies Graphics, JFC-JAVA foundation classes, swing, images, java 2d graphics, internationalization,Communication and Networking, TCP Sockets, UDP Sockets, [Link], java security, Objectserialization, Remote method serialization, JDBC: Java Data Base Connectivity, Java beans,Java interface to CORBA, JAVA- COM Integration, Java Media Framework, commerce and javawallet, Data structures and java utilities, JavaScript, Servelets TERM WORK Term work should consist of at least 06 assignments including debugged java source code for the applications from the aforementioned topics. A Seminar to be presented by each student aspart of term work carrying 15 marks. REFERENCE Using JAVA 2, Joseph L weber, PHI JAVA 2 complete, Sybex, BPB Java2 The complete Reference, Patrick Naughton, T M H Computing concepts With JAVA2, Cay Horstmann, WILEY JSP Java Server Pages, Barry Burd, IDG Books India(p) Ltd Java2 Programming Bible, Aaron Walsh, IDG Books India(p) Ltd Java2, swing, servlets, JDBC & JAVA Beans Programming Black Book Steven Holzner dreamtech press

[Link]

27

Visit for more notes and updated information

[Link]

[Link]

28

You might also like