Jump to content

Navigation menu

Note: Currently new registrations are closed, if you want an account Contact us

Difference between revisions of "Syllabus Review/VTU/MCA"

no edit summary
 
Line 425: Line 425:




<center>  
<center>
   
   


Line 435: Line 435:
|&lt;center&gt;'''Information Retrieval'''
|&lt;center&gt;'''Information Retrieval'''
|&lt;center&gt;'''07MCA551'''
|&lt;center&gt;'''07MCA551'''
|<center>'''Information &amp; Network Security'''</center>
|&lt;center&gt;'''Information &amp; Network Security'''
|-
|-
|<center>'''07MCA542'''</center>
|<center>'''07MCA542'''</center>
Line 464: Line 464:
  &lt;/center&gt;  
  &lt;/center&gt;  


<center>'''VISVESVARAYA TECHNOLOGICAL UNIVERSITY, BELGAUM'''</center>  
<center>'''VISVESVARAYA TECHNOLOGICAL UNIVERSITY, BELGAUM'''</center>
 
<center>SCHEME OF TEACHING AND EXAMINATION</center> 
 
<center>'''VI SEMESTER - Master of Computer Applications'''</center> 


<center>SCHEME OF TEACHING AND EXAMINATION</center>


<center>'''VI SEMESTER - Master of Computer Applications'''</center>






   
   


{|class="prettytable"
{|class="prettytable"
Line 516: Line 517:


   
   
<center>'''III SEMESTER'''</center>  
<center>'''III SEMESTER'''</center>


   
   
<center>'''Systems Software'''</center>  
<center>'''Systems Software'''</center>


   
   
Line 526: Line 527:


=== Total Hours : 52Exam Marks: 100 ===  
=== Total Hours : 52Exam Marks: 100 ===  
# '''Machine Architecture 6 Hours'''
# '''Machine Architecture 6 Hours'''  


Introduction, System Software and Machine Architecture, Simplified Instructional Computer (SIC) - SIC Machine Architecture, SIC/XE Machine Architecture, SIC Programming Examples.''' '''  
Introduction, System Software and Machine Architecture, Simplified Instructional Computer (SIC) - SIC Machine Architecture, SIC/XE Machine Architecture, SIC Programming Examples.''' '''


# '''Assemblers -1 6 Hours'''
# '''Assemblers -1 6 Hours'''  


Basic Assembler Function - A Simple SIC Assembler, Assembler Algorithm and Data Structures, Machine Dependent Assembler Features - Instruction Formats &amp; Addressing Modes, Program Relocation.
Basic Assembler Function - A Simple SIC Assembler, Assembler Algorithm and Data Structures, Machine Dependent Assembler Features - Instruction Formats &amp; Addressing Modes, Program Relocation.  


# '''Assemblers -2 6 Hours'''
# '''Assemblers -2 6 Hours'''  


Machine Independent Assembler Features – Literals, Symbol-Definition Statements, Expression, Program Blocks, Control Sections and Programming Linking, Assembler Design Operations - One-Pass Assembler, Multi-Pass Assembler, Implementation Examples - MASM Assembler.
Machine Independent Assembler Features – Literals, Symbol-Definition Statements, Expression, Program Blocks, Control Sections and Programming Linking, Assembler Design Operations - One-Pass Assembler, Multi-Pass Assembler, Implementation Examples - MASM Assembler.  


# '''Loaders And Linkers 8 Hours'''
# '''Loaders And Linkers 8 Hours'''  


Basic Loader Functions - Design of an Absolute Loader, A Simple Bootstrap Loader, Machine-Dependent Loader Features – Relocation, Program Linking, Algorithm and Data Structures for a Linking Loader; Machine-Independent Loader Features - Automatic Library Search, Loader Options, Loader Design Options - Linkage Editor, Dynamic Linkage, Bootstrap Loaders, Implementation Examples - MS-DOS Linker.
Basic Loader Functions - Design of an Absolute Loader, A Simple Bootstrap Loader, Machine-Dependent Loader Features – Relocation, Program Linking, Algorithm and Data Structures for a Linking Loader; Machine-Independent Loader Features - Automatic Library Search, Loader Options, Loader Design Options - Linkage Editor, Dynamic Linkage, Bootstrap Loaders, Implementation Examples - MS-DOS Linker.  


# '''Editors And Debugging Systems 6 Hours'''
# '''Editors And Debugging Systems 6 Hours'''  


Text Editors - Overview of Editing Process, User Interface, Editor Structure, Interactive Debugging Systems - Debugging Functions and Capabilities, Relationship With Other Parts Of The System, User-Interface Criteria
Text Editors - Overview of Editing Process, User Interface, Editor Structure, Interactive Debugging Systems - Debugging Functions and Capabilities, Relationship With Other Parts Of The System, User-Interface Criteria  


# '''Macro Processor 8 Hours'''
# '''Macro Processor 8 Hours'''  


Basic Macro Processor Functions - Macro Definitions and Expansion, Macro Processor Algorithm and Data Structures, Machine-Independent Macro Processor Features - Concatenation of Macro Parameters, Generation of Unique Labels, Conditional Macro Expansion, Keyword Macro Parameters, Macro Processor Design Options - Recursive Macro Expansion, General-Purpose Macro Processors, Macro Processing Within Language Translators, Implementation Examples - MASM Macro Processor, ANSI C Macro Processor.
Basic Macro Processor Functions - Macro Definitions and Expansion, Macro Processor Algorithm and Data Structures, Machine-Independent Macro Processor Features - Concatenation of Macro Parameters, Generation of Unique Labels, Conditional Macro Expansion, Keyword Macro Parameters, Macro Processor Design Options - Recursive Macro Expansion, General-Purpose Macro Processors, Macro Processing Within Language Translators, Implementation Examples - MASM Macro Processor, ANSI C Macro Processor.  


# '''Lex and Yacc – 1 6 Hours'''
# '''Lex and Yacc – 1 6 Hours'''  


Lex and Yacc - The Simplest Lex Program, Recognizing Words With LEX, Symbol Tables, Grammars, Parser-Lexer Communication, The Parts of Speech Lexer, A YACC Parser, The Rules Section, Running LEX and YACC, LEX and Hand- Written Lexers, Using LEX - Regular Expression, Examples of Regular Expressions, A Word Counting Program, Parsing a Command Line.
Lex and Yacc - The Simplest Lex Program, Recognizing Words With LEX, Symbol Tables, Grammars, Parser-Lexer Communication, The Parts of Speech Lexer, A YACC Parser, The Rules Section, Running LEX and YACC, LEX and Hand- Written Lexers, Using LEX - Regular Expression, Examples of Regular Expressions, A Word Counting Program, Parsing a Command Line.  


# '''Lex And Yacc - 2 6 Hours'''
# '''Lex And Yacc - 2 6 Hours'''  


Using YACC – Grammars, Recursive Rules, Shift/Reduce Parsing, What YACC Cannot Parse, A YACC Parser - The Definition Section, The Rules Section, Symbol Values and Actions, The LEXER, Compiling and Running a Simple Parser, Arithmetic Expressions and Ambiguity, Variables and Typed Tokens.
Using YACC – Grammars, Recursive Rules, Shift/Reduce Parsing, What YACC Cannot Parse, A YACC Parser - The Definition Section, The Rules Section, Symbol Values and Actions, The LEXER, Compiling and Running a Simple Parser, Arithmetic Expressions and Ambiguity, Variables and Typed Tokens.




'''Text Books:'''
'''Text Books:'''  


# Leland.L.Beck: System Software, 3<sup>rd</sup> Edition, Addison-Wesley, 1997.
# Leland.L.Beck: System Software, 3<sup>rd</sup> Edition, Addison-Wesley, 1997.  


'''('''Chapters 1.1 to 1.3, 2 (except 2.5.2 and 2.5.3), 3 (except 3.5.2 and 3.5.3), 4 (except 4.4.3))
'''('''Chapters 1.1 to 1.3, 2 (except 2.5.2 and 2.5.3), 3 (except 3.5.2 and 3.5.3), 4 (except 4.4.3))  


# John.R.Levine, Tony Mason and Doug Brown: Lex and Yacc, O'Reilly, SPD, 1998.
# John.R.Levine, Tony Mason and Doug Brown: Lex and Yacc, O'Reilly, SPD, 1998.  


(Chapters 1, 2 (Page 2-42), 3 (Page 51-65))
(Chapters 1, 2 (Page 2-42), 3 (Page 51-65))
Line 575: Line 576:


   
   
<center>'''Computer Networks '''</center>  
<center>'''Computer Networks '''</center>


=== Subject Code: 07MCA32I.A. Marks : 50 ===  
=== Subject Code: 07MCA32I.A. Marks : 50 ===  
Line 582: Line 583:




'''1. Foundation 8 Hours'''
'''1. Foundation 8 Hours'''  


# Building a Network; Applications; Requirements; Network Architecture; Implementing Network software; Performance.
# Building a Network; Applications; Requirements; Network Architecture; Implementing Network software; Performance.  


'''2. Direct Link Networks 12 Hours'''
'''2. Direct Link Networks 12 Hours'''  


# Physically connecting hosts; Hardware building blocks; Encoding; Framing; Error detection; Reliable transmission; Ethernet (802.3); Ring; (802.5, FDDI, 802.17); Wireless (802.15.1, 802.11, 802.16, Cell Phone Technologies).
# Physically connecting hosts; Hardware building blocks; Encoding; Framing; Error detection; Reliable transmission; Ethernet (802.3); Ring; (802.5, FDDI, 802.17); Wireless (802.15.1, 802.11, 802.16, Cell Phone Technologies).  


'''3. Packet Switching 7 Hours'''
'''3. Packet Switching 7 Hours'''
Line 596: Line 597:
'''4.Internetworking 12 Hours'''
'''4.Internetworking 12 Hours'''


Simple internetworking (IP);''' '''Routing; Global Internet.
Simple internetworking (IP);''' '''Routing; Global Internet.  


# '''End –to-End Protocols; Resource Allocation Issues 7 Hours'''
# '''End –to-End Protocols; Resource Allocation Issues 7 Hours'''  


Simple demultiplexer (UDP); Reliable byte stream (TCP); Issues in resource allocation
Simple demultiplexer (UDP); Reliable byte stream (TCP); Issues in resource allocation
Line 627: Line 628:


   
   
<center>'''Object Oriented Programming with C++'''</center>  
<center>'''Object Oriented Programming with C++'''</center>




Line 659: Line 660:
Passing parameters to base Class Constructors, Granting access, Virtual base classes  
Passing parameters to base Class Constructors, Granting access, Virtual base classes  


Virtual function – Calling a Virtual function through a base class reference, Virtual attribute is inherited, Virtual functions are hierarchical, pure virtual functions, abstract classes, using Virtual functions, Early &amp; late binding.
Virtual function – Calling a Virtual function through a base class reference, Virtual attribute is inherited, Virtual functions are hierarchical, pure virtual functions, abstract classes, using Virtual functions, Early &amp; late binding.  


# '''Generic Programming with Templates 3 Hours'''
# '''Generic Programming with Templates 3 Hours'''  


Introduction, Function templates, Class templates.
Introduction, Function templates, Class templates.
Line 670: Line 671:




'''Text Books: '''  
'''Text Books: '''


# H. Schild: C++ The Complete Reference, 4<sup>th</sup> Edition, Tata McGraw Hill, 2003.
# H. Schild: C++ The Complete Reference, 4<sup>th</sup> Edition, Tata McGraw Hill, 2003.  


(Chapters 11 to 17, 20, 21)
(Chapters 11 to 17, 20, 21)  


# K R Venugopal, Rajkumar, T., Ravi Shankar: Mastering C++, Tata McGraw Hill, 1997.
# K R Venugopal, Rajkumar, T., Ravi Shankar: Mastering C++, Tata McGraw Hill, 1997.  


(Chapter 1, 3 to 18)
(Chapter 1, 3 to 18)




'''Reference Book: '''  
'''Reference Book: '''


# Stanley B.Lippmann, Josee Lajore: C++Primer, 4<sup>th</sup> <sup>d</sup> Edition, Addison Wesley, 2005.
# Stanley B.Lippmann, Josee Lajore: C++Primer, 4<sup>th</sup> <sup>d</sup> Edition, Addison Wesley, 2005.  


<center>'''Database Management Systems'''</center>  
<center>'''Database Management Systems'''</center>


   
   
Line 692: Line 693:


=== Total Hours : 52Exam Marks: 100 ===  
=== Total Hours : 52Exam Marks: 100 ===  
# '''Introduction 7 Hours'''
# '''Introduction 7 Hours'''  


Introduction; An example; Characteristics of Database approach; Actors on the screen; Workers behind the scene; Advantages of using DBMS approach; A brief history of database applications; when not to use a DBMS. Data models, schemas and instances; Three-schema architecture and data independence; Database languages and interfaces; The database system environment; Centralized and client-server architectures; Classification of Database Management systems.
Introduction; An example; Characteristics of Database approach; Actors on the screen; Workers behind the scene; Advantages of using DBMS approach; A brief history of database applications; when not to use a DBMS. Data models, schemas and instances; Three-schema architecture and data independence; Database languages and interfaces; The database system environment; Centralized and client-server architectures; Classification of Database Management systems.  


# '''Entity-Relationship Model''' '''7 Hours'''
# '''Entity-Relationship Model''' '''7 Hours'''  


Using High-Level Conceptual Data Models for Database Design; An Example Database Application; Entity Types, Entity Sets, Attributes and Keys; Relationship types, Relationship Sets, Roles and Structural Constraints; Weak Entity Types; Refining the ER Design; ER Diagrams, Naming Conventions and Design Issues; Relationship types of degree higher than two.
Using High-Level Conceptual Data Models for Database Design; An Example Database Application; Entity Types, Entity Sets, Attributes and Keys; Relationship types, Relationship Sets, Roles and Structural Constraints; Weak Entity Types; Refining the ER Design; ER Diagrams, Naming Conventions and Design Issues; Relationship types of degree higher than two.  


# '''Relational Model and Relational Algebra 8 Hours '''  
# '''Relational Model and Relational Algebra 8 Hours '''


Relational Model Concepts; Relational Model Constraints and Relational Database Schemas; Update Operations, Transactions and dealing with constraint violations; Unary Relational Operations: SELECT and PROJECT; Relational Algebra Operations from Set Theory; Binary Relational Operations : JOIN and DIVISION; Additional Relational Operations; Examples of Queries in Relational Algebra; Relational Database Design Using ER- to-Relational Mapping.
Relational Model Concepts; Relational Model Constraints and Relational Database Schemas; Update Operations, Transactions and dealing with constraint violations; Unary Relational Operations: SELECT and PROJECT; Relational Algebra Operations from Set Theory; Binary Relational Operations : JOIN and DIVISION; Additional Relational Operations; Examples of Queries in Relational Algebra; Relational Database Design Using ER- to-Relational Mapping.  


# '''SQL 16 Hours'''
# '''SQL 16 Hours'''  


SQL Data Definition and Data Types; Specifying basic constraints in SQL; Schema change statements in SQL; Basic queries in SQL; More complex SQL Queries. Insert, Delete and Update statements in SQL; Specifying constraints as Assertion and Trigger; Views (Virtual Tables) in SQL; Additional features of SQL; Database programming issues and techniques; Embedded SQL, Dynamic SQL; Database stored procedures and SQL / PSM.
SQL Data Definition and Data Types; Specifying basic constraints in SQL; Schema change statements in SQL; Basic queries in SQL; More complex SQL Queries. Insert, Delete and Update statements in SQL; Specifying constraints as Assertion and Trigger; Views (Virtual Tables) in SQL; Additional features of SQL; Database programming issues and techniques; Embedded SQL, Dynamic SQL; Database stored procedures and SQL / PSM.  


# '''Database Design 8 Hours'''
# '''Database Design 8 Hours'''  


Informal Design Guidelines for Relation Schemas; Functional Dependencies; Normal Forms Based on Primary Keys; General Definitions of Second and Third Normal Forms; Boyce-Codd Normal Form.  
Informal Design Guidelines for Relation Schemas; Functional Dependencies; Normal Forms Based on Primary Keys; General Definitions of Second and Third Normal Forms; Boyce-Codd Normal Form.  
Line 715: Line 716:




'''Text Books:'''
'''Text Books:'''  


# Elmasri and Navathe: Fundamentals of Database Systems, 5<sup>th</sup> Edition, Addison-Wesley, 2007
# Elmasri and Navathe: Fundamentals of Database Systems, 5<sup>th</sup> Edition, Addison-Wesley, 2007  


(Chapters 1, 2, 3 except 3.8, 5, 6.1 to 6.5, 7.1, 8, 9.1, 9.2 except SQLJ, 9.4, 10)
(Chapters 1, 2, 3 except 3.8, 5, 6.1 to 6.5, 7.1, 8, 9.1, 9.2 except SQLJ, 9.4, 10)  


# Raghu Ramakrishnan and Johannes Gehrke: Database Management Systems, 3<sup>rd</sup> Edition, McGraw-Hill, 2003.
# Raghu Ramakrishnan and Johannes Gehrke: Database Management Systems, 3<sup>rd</sup> Edition, McGraw-Hill, 2003.  


(Chapters 16, 17.1, 17.2, 18)
(Chapters 16, 17.1, 17.2, 18)




'''Reference Books:'''
'''Reference Books:'''  


# Silberschatz, Korth and Sudharshan: Data base System Concepts,'' ''5<sup>th</sup> Edition, Mc-GrawHill, 2006.
# Silberschatz, Korth and Sudharshan: Data base System Concepts,'' ''5<sup>th</sup> Edition, Mc-GrawHill, 2006.
# C.J. Date, A. Kannan, S. Swamynatham: A Introduction to Database Systems, 8<sup>th</sup> Edition, Pearson education, 2006.
# C.J. Date, A. Kannan, S. Swamynatham: A Introduction to Database Systems, 8<sup>th</sup> Edition, Pearson education, 2006.  


<center>'''Operating Systems'''</center>  
<center>'''Operating Systems'''</center>


   
   
Line 738: Line 739:


=== Total Hours : 52Exam Marks: 100 ===  
=== Total Hours : 52Exam Marks: 100 ===  
# '''Introduction to Operating Systems, System structures''' '''6 Hours'''
# '''Introduction to Operating Systems, System structures''' '''6 Hours'''  


What operating systems do; Computer System organization; Computer System architecture; Operating System structure; Operating System operations; Process management; Memory management; Storage management; Protection and security; Distributed system; Special-purpose systems; Computing environments.Operating System Services; User - Operating System interface; System calls; Types of system calls; System programs; Operating System design and implementation; Operating System structure; Virtual machines; Operating System generation; System boot.
What operating systems do; Computer System organization; Computer System architecture; Operating System structure; Operating System operations; Process management; Memory management; Storage management; Protection and security; Distributed system; Special-purpose systems; Computing environments.Operating System Services; User - Operating System interface; System calls; Types of system calls; System programs; Operating System design and implementation; Operating System structure; Virtual machines; Operating System generation; System boot.  


# '''Process Management 7 Hours'''
# '''Process Management 7 Hours'''  


Process concept; Process scheduling; Operations on processes; Inter-process communication. Multi-Threaded Programming: Overview; Multithreading models; Thread Libraries; Threading issues. Process Scheduling: Basic concepts; Scheduling criteria; Scheduling algorithms; Multiple-Processor scheduling; Thread scheduling.
Process concept; Process scheduling; Operations on processes; Inter-process communication. Multi-Threaded Programming: Overview; Multithreading models; Thread Libraries; Threading issues. Process Scheduling: Basic concepts; Scheduling criteria; Scheduling algorithms; Multiple-Processor scheduling; Thread scheduling.  


# '''Process Synchronization 7 Hours'''
# '''Process Synchronization 7 Hours'''  


Synchronization: The Critical section problem; Peterson’s solution; Synchronization hardware; Semaphores; Classical problems of synchronization; Monitors.
Synchronization: The Critical section problem; Peterson’s solution; Synchronization hardware; Semaphores; Classical problems of synchronization; Monitors.  


# '''Deadlocks 6 Hours'''
# '''Deadlocks 6 Hours'''  


Deadlocks: System model; Deadlock characterization; Methods for handling deadlocks; Deadlock prevention; Deadlock avoidance; Deadlock detection and recovery from deadlock.
Deadlocks: System model; Deadlock characterization; Methods for handling deadlocks; Deadlock prevention; Deadlock avoidance; Deadlock detection and recovery from deadlock.  


# '''Memory Management 7 Hours'''
# '''Memory Management 7 Hours'''  


Memory Management Strategies: Background; Swapping; Contiguous memory allocation; Paging; Structure of page table; Segmentation. Virtual Memory Management: Background; Demand paging; Copy-on-write; Page replacement; Allocation of frames; Thrashing.
Memory Management Strategies: Background; Swapping; Contiguous memory allocation; Paging; Structure of page table; Segmentation. Virtual Memory Management: Background; Demand paging; Copy-on-write; Page replacement; Allocation of frames; Thrashing.
Line 791: Line 792:
  '''Hours/Week: 03Exam Hours : 03'''  
  '''Hours/Week: 03Exam Hours : 03'''  


'''Total Hours : 42Exam Marks : 50'''
'''Total Hours : 42Exam Marks : 50'''  


=== PART- A ===  
=== PART- A ===  
Line 800: Line 801:
# Program to count number of
# Program to count number of
## Positive and negative integers
## Positive and negative integers
## Positive and negative fractions
## Positive and negative fractions  


4) Program to count the numbers of comment lines in a given C program. Also eliminate them and copy that program into separate file.
4) Program to count the numbers of comment lines in a given C program. Also eliminate them and copy that program into separate file.  


# Program to count the number of ‘scanf’ and ‘printf’ statements in a C program. Replace them with ‘readf’ and ‘writef’ statements respectively.
# Program to count the number of ‘scanf’ and ‘printf’ statements in a C program. Replace them with ‘readf’ and ‘writef’ statements respectively.
# Program to recognize a valid arithmetic expression and identify the identifiers and operators present. Print them separately.
# Program to recognize a valid arithmetic expression and identify the identifiers and operators present. Print them separately.
# Program to recognize and count the number of identifiers in a given input file.
# Program to recognize and count the number of identifiers in a given input file.  


=== PART- B ===  
=== PART- B ===  
Line 816: Line 817:
# Program to recognize a valid variable, which starts with a letter, followed by any number of letters or digits.  
# Program to recognize a valid variable, which starts with a letter, followed by any number of letters or digits.  
# Program to evaluate an arithmetic expression involving operators +, -, * and /.
# Program to evaluate an arithmetic expression involving operators +, -, * and /.
# Program to recognize strings ‘aaab’, ‘abbb’, ‘ab’ and ‘a’ using the grammar
# Program to recognize strings ‘aaab’, ‘abbb’, ‘ab’ and ‘a’ using the grammar  


(a<sup>n </sup>b<sup>n</sup> , n&gt;=0)
(a<sup>n </sup>b<sup>n</sup> , n&gt;=0)
Line 828: Line 829:


   
   
<center>'''OOP with C++ Laboratory'''</center>  
<center>'''OOP with C++ Laboratory'''</center>




Line 848: Line 849:
2. Define a STUDENT class with USN, Name, and Marks in 3 tests of a subject. Declare an array of 10 STUDENT objects. Using appropriate functions, find the average of the two better marks for each student. Print the USN, Name and the average marks of all the students.
2. Define a STUDENT class with USN, Name, and Marks in 3 tests of a subject. Declare an array of 10 STUDENT objects. Using appropriate functions, find the average of the two better marks for each student. Print the USN, Name and the average marks of all the students.


3. Write a C++ program to create a class called COMPLEX and implement the following overloading functions ADD that return a complex number:
3. Write a C++ program to create a class called COMPLEX and implement the following overloading functions ADD that return a complex number:  


# ADD(a, s2) – where ‘a’ is an integer (real part) and s2 is a complex number
# ADD(a, s2) – where ‘a’ is an integer (real part) and s2 is a complex number
# ADD(s1, s2) – where s1 and s2 are complex numbers
# ADD(s1, s2) – where s1 and s2 are complex numbers  


4. Write a C++ program to create a class called LIST (linked list) with member functions to insert an element at the front as well as to delete an element from the front of the list. Demonstrate all the functions after creating a list object.
4. Write a C++ program to create a class called LIST (linked list) with member functions to insert an element at the front as well as to delete an element from the front of the list. Demonstrate all the functions after creating a list object.
Line 857: Line 858:
5. Write a C++ program to create a template function for Quicksort and demonstrate sorting of integers and doubles.
5. Write a C++ program to create a template function for Quicksort and demonstrate sorting of integers and doubles.


6. Write a C++ program to create a class called STACK using an array of integers. Implement the following operations by overloading the operators ‘+’ and ‘-‘:
6. Write a C++ program to create a class called STACK using an array of integers. Implement the following operations by overloading the operators ‘+’ and ‘-‘:  


# s1 = s1 + element; where s1 is an object of the class STACK and element is an integer to be pushed on the top of the stack
# s1 = s1 + element; where s1 is an object of the class STACK and element is an integer to be pushed on the top of the stack
# s1 = s1- ; where s1 is an object of the class STACK. ‘-‘ operator pops the element.
# s1 = s1- ; where s1 is an object of the class STACK. ‘-‘ operator pops the element.  


<nowiki>Handle the STACK empty and full conditions. Also display the contents of the stack after each operation, by overloading the << operator.</nowiki>
<nowiki>Handle the STACK empty and full conditions. Also display the contents of the stack after each operation, by overloading the << operator.</nowiki>


<nowiki>7. Write a C++ program to create a class called DATE. Accept two valid dates in the form dd/mm/yy. Implement the following operations by overloading the operators ‘+’ and ‘-‘. After every operation display the results by overloading the operator <<.</nowiki>
<nowiki>7. Write a C++ program to create a class called DATE. Accept two valid dates in the form dd/mm/yy. Implement the following operations by overloading the operators ‘+’ and ‘-‘. After every operation display the results by overloading the operator <<.</nowiki>  


# no_of_days = d1 – d2; where d1 and d2 are DATE objects, and no_of_days is an integer
# no_of_days = d1 – d2; where d1 and d2 are DATE objects, and no_of_days is an integer
# d2 = d1 + no_of_days; where d1 is a DATE object and no_of_days is an integer
# d2 = d1 + no_of_days; where d1 is a DATE object and no_of_days is an integer  


8. Create a class called MATRIX using two-dimensional array of integers. Implement the following operations by overloading the operator ++ which <nowiki>checks the compatibility of two matrices to be added and subtracted. Perform the addition and subtraction by overloading the + and – operators respectively. Display the results by overloading the operator <<.</nowiki>
8. Create a class called MATRIX using two-dimensional array of integers. Implement the following operations by overloading the operator ++ which <nowiki>checks the compatibility of two matrices to be added and subtracted. Perform the addition and subtraction by overloading the + and – operators respectively. Display the results by overloading the operator <<.</nowiki>
Line 874: Line 875:




9. Write a C++ program to create a class called OCTAL which has the characteristics of an octal number. Implement the following operations by writing an appropriate constructor and an overloaded operator +.
9. Write a C++ program to create a class called OCTAL which has the characteristics of an octal number. Implement the following operations by writing an appropriate constructor and an overloaded operator +.  


# OCTAL h = x; where x is an integer.
# OCTAL h = x; where x is an integer.
# int y = h + k; where h is an OCTAL object and k is an integer
# int y = h + k; where h is an OCTAL object and k is an integer  


<nowiki>Display the OCTAL result by overloading the operator << . Also display the values of h and y.</nowiki>
<nowiki>Display the OCTAL result by overloading the operator << . Also display the values of h and y.</nowiki>
Line 887: Line 888:
12. Write a C++ program to create a class called STUDENT with data members USN, Name and Age. Using inheritance, create the classes UGSTUDENT and PGSTUDENT having fields as Semester, Fees and Stipend. Enter the data for at least 5 students. Find the semester-wise average age for all UG and PG students separately.
12. Write a C++ program to create a class called STUDENT with data members USN, Name and Age. Using inheritance, create the classes UGSTUDENT and PGSTUDENT having fields as Semester, Fees and Stipend. Enter the data for at least 5 students. Find the semester-wise average age for all UG and PG students separately.


<nowiki>13. Write a C++ program to create a class called STRING and implement the following operations. Display the results after every operation by overloading the operator <<.</nowiki>
<nowiki>13. Write a C++ program to create a class called STRING and implement the following operations. Display the results after every operation by overloading the operator <<.</nowiki>  


# STRING s1 = “VTU”
# STRING s1 = “VTU”
# STRING s2 = “BELGAUM”
# STRING s2 = “BELGAUM”
# STRING s3 = s1 + s2 (Use copy constructor)
# STRING s3 = s1 + s2 (Use copy constructor)  


14. Write a C++ program to create a class called BIN_TREE (Binary Tree) with member functions to perform in-order, preorder and post-order traversals. Create a BIN_TREE object and demonstrate the traversals.
14. Write a C++ program to create a class called BIN_TREE (Binary Tree) with member functions to perform in-order, preorder and post-order traversals. Create a BIN_TREE object and demonstrate the traversals.
Line 898: Line 899:


   
   
<center>'''DBMS Laboratory'''</center>  
<center>'''DBMS Laboratory'''</center>


   
   
Line 905: Line 906:


=== Total Hours : 42Exam Marks: 50 ===  
=== Total Hours : 42Exam Marks: 50 ===  
# Consider the Insurance database given below. The primary keys are underlined and the data types are specified.
# Consider the Insurance database given below. The primary keys are underlined and the data types are specified.  


PERSON (driver – id #: String, name: string, address: strong)
PERSON (driver – id #: String, name: string, address: strong)
Line 915: Line 916:
OWNS (driver-id <nowiki>#:string</nowiki>, Regno:string)
OWNS (driver-id <nowiki>#:string</nowiki>, Regno:string)


PARTICIPATED (driver-id: string, Regno:string, report-number:int, damage amount:int)
PARTICIPATED (driver-id: string, Regno:string, report-number:int, damage amount:int)  


# Create the above tables by properly specifying the primary keys and the foreign keys.
# Create the above tables by properly specifying the primary keys and the foreign keys.
# Enter at least five tuples for each relation.
# Enter at least five tuples for each relation.
# Demonstrate how you
# Demonstrate how you  


# Update the damage amount for the car with a specific Regno in the accident with report number 12 to 25000.
# Update the damage amount for the car with a specific Regno in the accident with report number 12 to 25000.
# Add a new accident to the database.
# Add a new accident to the database.  


(iv) Find the total number of people who owned cars that were involved in accidents in 2008.
(iv) Find the total number of people who owned cars that were involved in accidents in 2008.  


# Find the number of accidents in which cars belonging to a specific model were involved.
# Find the number of accidents in which cars belonging to a specific model were involved.
# Generate suitable reports.
# Generate suitable reports.
# Create suitable front end for querying and displaying the results.
# Create suitable front end for querying and displaying the results.  


II. Consider the following relations for an order processing database application in a company.
II. Consider the following relations for an order processing database application in a company.
Line 942: Line 943:
SHIPMENT (order #: int, warehouse#: int, ship-date: date)
SHIPMENT (order #: int, warehouse#: int, ship-date: date)


WAREHOUSE (warehouse #: int, city: string)
WAREHOUSE (warehouse #: int, city: string)  


# Create the above tables by properly specifying the primary keys and the foreign keys.
# Create the above tables by properly specifying the primary keys and the foreign keys.
Line 950: Line 951:
# Demonstrate the deletion of an item from the ITEM table and demonstrate a method of handling the rows in the ORDER_ITEM table that contain this particular item.  
# Demonstrate the deletion of an item from the ITEM table and demonstrate a method of handling the rows in the ORDER_ITEM table that contain this particular item.  
# Generate suitable reports.
# Generate suitable reports.
# Create suitable front end for querying and displaying the results.
# Create suitable front end for querying and displaying the results.  


III.''' '''Consider the following database of student enrollment in courses &amp; books adopted for each course.
III.''' '''Consider the following database of student enrollment in courses &amp; books adopted for each course.
Line 962: Line 963:
BOOK _ ADOPTION (course# :int, sem:int, book-ISBN:int)
BOOK _ ADOPTION (course# :int, sem:int, book-ISBN:int)


TEXT (book-ISBN:int, book-title:string, publisher:string, author:string)
TEXT (book-ISBN:int, book-title:string, publisher:string, author:string)  


# Create the above tables by properly specifying the primary keys and the foreign keys.
# Create the above tables by properly specifying the primary keys and the foreign keys.
# Enter at least five tuples for each relation.
# Enter at least five tuples for each relation.
# Demonstrate how you add a new text book to the database and make this book be adopted by some department.
# Demonstrate how you add a new text book to the database and make this book be adopted by some department.  


# Produce a list of text books (include Course #, Book-ISBN, Book-title) in the alphabetical order for courses offered by the ‘CS’ department that use more than two books.
# Produce a list of text books (include Course #, Book-ISBN, Book-title) in the alphabetical order for courses offered by the ‘CS’ department that use more than two books.
# List any department that has ''all'' its adopted books published by a specific publisher.
# List any department that has ''all'' its adopted books published by a specific publisher.
# Generate suitable reports.
# Generate suitable reports.
# Create suitable front end for querying and displaying the results.
# Create suitable front end for querying and displaying the results.  


IV. The following tables are maintained by a book dealer.
IV. The following tables are maintained by a book dealer.
Line 983: Line 984:
CATEGORY (category-id:int, description:string)
CATEGORY (category-id:int, description:string)


ORDER-DETAILS (order-no:int, book-id:int, quantity:int)
ORDER-DETAILS (order-no:int, book-id:int, quantity:int)  


# Create the above tables by properly specifying the primary keys and the foreign keys.
# Create the above tables by properly specifying the primary keys and the foreign keys.
# Enter at least five tuples for each relation.
# Enter at least five tuples for each relation.  


# Give the details of the authors who have 2 or more books in the catalog and the price of the books is greater than the average price of the books in the catalog and the year of publication is after 2000.
# Give the details of the authors who have 2 or more books in the catalog and the price of the books is greater than the average price of the books in the catalog and the year of publication is after 2000.
# Find the author of the book which has maximum sales.
# Find the author of the book which has maximum sales.  


# Demonstrate how you increase the price of books published by a specific publisher by 10%.
# Demonstrate how you increase the price of books published by a specific publisher by 10%.
# Generate suitable reports.
# Generate suitable reports.
# Create suitable front end for querying and displaying the results.
# Create suitable front end for querying and displaying the results.  


# Consider the following database for a banking enterprise
# Consider the following database for a banking enterprise  


BRANCH(branch-name:string, branch-city:string, assets:real)
BRANCH(branch-name:string, branch-city:string, assets:real)
Line 1,007: Line 1,008:
LOAN(loan-number:int, branch-name:string, amount:real)
LOAN(loan-number:int, branch-name:string, amount:real)


BORROWER(customer-name:string, loan-number:int)
BORROWER(customer-name:string, loan-number:int)  


# Create the above tables by properly specifying the primary keys and the foreign keys
# Create the above tables by properly specifying the primary keys and the foreign keys
Line 1,015: Line 1,016:
# Demonstrate how you delete all account tuples at every branch located in a specific city.
# Demonstrate how you delete all account tuples at every branch located in a specific city.
# Generate suitable reports.
# Generate suitable reports.
# Create suitable front end for querying and displaying the results.
# Create suitable front end for querying and displaying the results.  


'''''Instructions:'''''
'''''Instructions:'''''  


# The exercises are to be solved in an RDBMS environment like Oracle or DB2.
# The exercises are to be solved in an RDBMS environment like Oracle or DB2.
Line 1,024: Line 1,025:
# The student need not create the front end in the examination. The results of the queries may be displayed directly.
# The student need not create the front end in the examination. The results of the queries may be displayed directly.
# Relevant queries other than the ones listed along with the exercises may also be asked in the examination.
# Relevant queries other than the ones listed along with the exercises may also be asked in the examination.
# Questions must be asked based on lots.
# Questions must be asked based on lots.  


<center>'''IV Semester'''</center>  
<center>'''IV Semester'''</center>


   
   
<center>'''Topics in Enterprise Architecture - 1 '''</center>  
<center>'''Topics in Enterprise Architecture - 1 '''</center>




Line 1,090: Line 1,091:




'''Text Books:'''
'''Text Books:'''  


# Herbert Schildt: Java The Complete Reference, 7<sup>th</sup> Edition, Tata McGraw Hill, 2007.
# Herbert Schildt: Java The Complete Reference, 7<sup>th</sup> Edition, Tata McGraw Hill, 2007.  


(Chapters 1, 2, 3, 4, 5, 6, 8, 10, 11, 21, 22, 29, 30, 31)
(Chapters 1, 2, 3, 4, 5, 6, 8, 10, 11, 21, 22, 29, 30, 31)  


# Jim Keogh: J2EE The Complete Reference, Tata McGraw Hill, 2007.
# Jim Keogh: J2EE The Complete Reference, Tata McGraw Hill, 2007.  


(Chapters 5, 6, 11, 12, 15)  
(Chapters 5, 6, 11, 12, 15)  




'''Reference Books:'''
'''Reference Books:'''  


# Y. Daniel Liang: Introduction to JAVA Programming, 6<sup>th</sup> Edition, Pearson Education, 2007.
# Y. Daniel Liang: Introduction to JAVA Programming, 6<sup>th</sup> Edition, Pearson Education, 2007.
# Stephanie Bodoff et al: The J2EE Tutorial, 2<sup>nd</sup> Edition, Pearson Education, 2004.
# Stephanie Bodoff et al: The J2EE Tutorial, 2<sup>nd</sup> Edition, Pearson Education, 2004.  


<center>'''Software Engineering'''</center>  
<center>'''Software Engineering'''</center>


   
   
Line 1,113: Line 1,114:


=== Total Hours : 52Exam Marks: 100 ===  
=== Total Hours : 52Exam Marks: 100 ===  
# '''Overview 6 Hours'''
# '''Overview 6 Hours'''  


Introduction:''' '''FAQ's about software engineering, Professional and ethical responsibility.
Introduction:''' '''FAQ's about software engineering, Professional and ethical responsibility.


Socio-Technical systems: Emergent system properties; Systems engineering; Organizations, people and computer systems; Legacy systems.
Socio-Technical systems: Emergent system properties; Systems engineering; Organizations, people and computer systems; Legacy systems.  


# '''Critical Systems, Software Processes 6 Hours'''
# '''Critical Systems, Software Processes 6 Hours'''  


Critical Systems: A simple safety-critical system; System dependability; Availability and reliability.
Critical Systems: A simple safety-critical system; System dependability; Availability and reliability.


Software Processes: Models, Process iteration, Process activities; The Rational Unified Process; Computer-Aided Software Engineering.
Software Processes: Models, Process iteration, Process activities; The Rational Unified Process; Computer-Aided Software Engineering.  


# '''Requirements 7 Hours'''
# '''Requirements 7 Hours'''  


Software Requirements: Functional and Non-functional requirements; User requirements; System requirements; Interface specification; The software requirements document.  
Software Requirements: Functional and Non-functional requirements; User requirements; System requirements; Interface specification; The software requirements document.  


Requirements Engineering Processes: Feasibility studies; Requirements elicitation and analysis; Requirements validation; Requirements management.
Requirements Engineering Processes: Feasibility studies; Requirements elicitation and analysis; Requirements validation; Requirements management.  


# '''System models, Project Management 7 Hours'''
# '''System models, Project Management 7 Hours'''  


System Models: Context models; Behavioral models; Data models; Object models; Structured methods.
System Models: Context models; Behavioral models; Data models; Object models; Structured methods.


Project Management: Management activities; Project planning; Project scheduling; Risk management.
Project Management: Management activities; Project planning; Project scheduling; Risk management.  


# '''Software Design 7 Hours'''
# '''Software Design 7 Hours'''  


Architectural Design: Architectural design decisions; System organization; Modular decomposition styles; Control styles.
Architectural Design: Architectural design decisions; System organization; Modular decomposition styles; Control styles.


Object-Oriented design: Objects and Object Classes; An Object-Oriented design process; Design evolution.
Object-Oriented design: Objects and Object Classes; An Object-Oriented design process; Design evolution.  


# '''Development 6 Hours'''
# '''Development 6 Hours'''  


Rapid Software Development: Agile methods; Extreme programming; Rapid application development.
Rapid Software Development: Agile methods; Extreme programming; Rapid application development.


Software Evolution: Program evolution dynamics; Software maintenance; Evolution processes; Legacy system evolution.
Software Evolution: Program evolution dynamics; Software maintenance; Evolution processes; Legacy system evolution.  


# '''Verification and Validation 7 Hours '''  
# '''Verification and Validation 7 Hours '''


Verification and Validation: Planning; Software inspections; automated static analysis; Verification and formal methods.  
Verification and Validation: Planning; Software inspections; automated static analysis; Verification and formal methods.  


Software testing: System testing; Component testing; Test case design; Test automation.
Software testing: System testing; Component testing; Test case design; Test automation.  


# '''Management''' '''6 Hours '''  
# '''Management''' '''6 Hours '''


Managing People: Selecting staff; Motivating people; Managing people; The People Capability Maturity Model.
Managing People: Selecting staff; Motivating people; Managing people; The People Capability Maturity Model.
Line 1,169: Line 1,170:




'''Reference Books:'''
'''Reference Books:'''  


# Roger.S.Pressman: Software Engineering-A Practitioners approach, 7<sup>th</sup> Edition,McGraw-Hill, 2007.
# Roger.S.Pressman: Software Engineering-A Practitioners approach, 7<sup>th</sup> Edition,McGraw-Hill, 2007.
# Shari Lawrence Pfleeger, Joanne M. Atlee : Software Engineering Theory and Practice, 3<sup>rd</sup> Edition, Pearson Education, 2006.
# Shari Lawrence Pfleeger, Joanne M. Atlee : Software Engineering Theory and Practice, 3<sup>rd</sup> Edition, Pearson Education, 2006.
# Waman S Jawadekar: Software Engineering Principles and Practice, Tata McGraw Hill, 2004.
# Waman S Jawadekar: Software Engineering Principles and Practice, Tata McGraw Hill, 2004.  


<center>'''Web Programming'''</center>  
<center>'''Web Programming'''</center>


=== Subject Code: 07MCA43I.A. Marks : 50 ===  
=== Subject Code: 07MCA43I.A. Marks : 50 ===  
Line 1,212: Line 1,213:




'''Text Books:'''
'''Text Books:'''  


# Robert W. Sebesta: Programming the World Wide Web, 4<sup>th </sup>Edition, Pearson Education, 2008.
# Robert W. Sebesta: Programming the World Wide Web, 4<sup>th </sup>Edition, Pearson Education, 2008.  


(Chapters 1 to 9)
(Chapters 1 to 9)




'''Reference Books:'''
'''Reference Books:'''  


# M. Deitel, P.J. Deitel, A. B. Goldberg: Internet &amp; World Wide Web How to H program, 3<sup>rd</sup> Edition, Pearson Education / PHI, 2004.
# M. Deitel, P.J. Deitel, A. B. Goldberg: Internet &amp; World Wide Web How to H program, 3<sup>rd</sup> Edition, Pearson Education / PHI, 2004.
# Chris Bates: Web Programming Building Internet Applications, 3<sup>rd</sup> Edition, Wiley India, 2006.
# Chris Bates: Web Programming Building Internet Applications, 3<sup>rd</sup> Edition, Wiley India, 2006.
# Xue Bai et al: The Web Warrior Guide to Web Programming, Thomson, 2003.
# Xue Bai et al: The Web Warrior Guide to Web Programming, Thomson, 2003.  


<center>'''Design and Analysis of Algorithms'''</center>  
<center>'''Design and Analysis of Algorithms'''</center>




Line 1,278: Line 1,279:




'''Text Books:'''
'''Text Books:'''  


# Anany Levitin: Introduction to the Design and Analysis of Algorithms, Pearson Education, 2003.
# Anany Levitin: Introduction to the Design and Analysis of Algorithms, Pearson Education, 2003.  


(Chapters 1.1-1.4, 2.1-2.5, 3.1, 3.2, 3.4, 4.1-4.5, 5.1-5.4, 6.1, 6.3, 6.4, 6.6, 7.1-7.3, 8.1, 8.2, 8.4, 9.1-9.4, 10.1-10.3, 11.1-11.3)  
(Chapters 1.1-1.4, 2.1-2.5, 3.1, 3.2, 3.4, 4.1-4.5, 5.1-5.4, 6.1, 6.3, 6.4, 6.6, 7.1-7.3, 8.1, 8.2, 8.4, 9.1-9.4, 10.1-10.3, 11.1-11.3)  




'''Reference Books: '''  
'''Reference Books: '''


# Coremen T.H., Leiserson C.E., and Rivest R.L.: Introduction to Algorithms, PHI, 1998.
# Coremen T.H., Leiserson C.E., and Rivest R.L.: Introduction to Algorithms, PHI, 1998.
# Horowitz E., Sahani S., Rajasekharan S.: Computer Algorithms, Galgotia Publications, 2001.
# Horowitz E., Sahani S., Rajasekharan S.: Computer Algorithms, Galgotia Publications, 2001.  


<center>'''Computer Graphics and Visualization '''</center>  
<center>'''Computer Graphics and Visualization '''</center>


   
   
Line 1,298: Line 1,299:


   
   
# '''Introduction 7 Hours'''
# '''Introduction 7 Hours'''  


Applications of computer graphics; A graphics system; Images: Physical and synthetic; The human visual system; The pinhole camera; The synthetic camera model; The programmer’s interface; Graphics architectures.
Applications of computer graphics; A graphics system; Images: Physical and synthetic; The human visual system; The pinhole camera; The synthetic camera model; The programmer’s interface; Graphics architectures.
Line 1,349: Line 1,350:


   
   
<center>'''UNIX Systems Programming '''</center>  
<center>'''UNIX Systems Programming '''</center>


=== Subject Code: 07MCA452I.A. Marks : 50 ===  
=== Subject Code: 07MCA452I.A. Marks : 50 ===  
Line 1,355: Line 1,356:


=== Total Hours : 52Exam Marks: 100 ===  
=== Total Hours : 52Exam Marks: 100 ===  
# '''Introduction 6 Hours'''
# '''Introduction 6 Hours'''  


UNIX and ANSI Standards:''' '''The ANSI C Standard, The ANSI/ISO C++ Standards, Difference between ANSI C and C++, The POSIX Standards, The POSIX.1 FIPS Standard, The X/Open Standards.  
UNIX and ANSI Standards:''' '''The ANSI C Standard, The ANSI/ISO C++ Standards, Difference between ANSI C and C++, The POSIX Standards, The POSIX.1 FIPS Standard, The X/Open Standards.  


UNIX and POSIX APIs: The POSIX APIs, The UNIX and POSIX Development Environment, API Common Characteristics.
UNIX and POSIX APIs: The POSIX APIs, The UNIX and POSIX Development Environment, API Common Characteristics.  


# '''UNIX Files 6 Hours'''
# '''UNIX Files 6 Hours'''  


File Types, The UNIX and POSIX File System, The UNIX and POSIX File Attributes, Inodes in UNIX System V, Application Program Interface to Files, UNIX Kernel Support for Files, Relationship of C Stream Pointers and File Descriptors, Directory Files, Hard and Symbolic Links.
File Types, The UNIX and POSIX File System, The UNIX and POSIX File Attributes, Inodes in UNIX System V, Application Program Interface to Files, UNIX Kernel Support for Files, Relationship of C Stream Pointers and File Descriptors, Directory Files, Hard and Symbolic Links.
Line 1,367: Line 1,368:
'''3. UNIX File APIs 7 Hours'''
'''3. UNIX File APIs 7 Hours'''


General File APIs, File and Record Locking, Directory File APIs, Device File APIs, FIFO File APIs, Symbolic Link File APIs, General File Class, regfile Class for Regular Files, dirfile Class for Directory Files, FIFO File Class, Device File Class, Symbolic Link File Class, File Listing Program.
General File APIs, File and Record Locking, Directory File APIs, Device File APIs, FIFO File APIs, Symbolic Link File APIs, General File Class, regfile Class for Regular Files, dirfile Class for Directory Files, FIFO File Class, Device File Class, Symbolic Link File Class, File Listing Program.  


# '''UNIX Processes 7 Hours'''
# '''UNIX Processes 7 Hours'''  


The Environment of a UNIX Process:''' '''Introduction, main function, Process Termination, Command-Line Arguments, Environment List, Memory Layout of a C Program, Shared Libraries, Memory Allocation, Environment Variables, setjmp and longjmp Functions, getrlimit, setrlimit Functions, UNIX Kernel Support for Processes.
The Environment of a UNIX Process:''' '''Introduction, main function, Process Termination, Command-Line Arguments, Environment List, Memory Layout of a C Program, Shared Libraries, Memory Allocation, Environment Variables, setjmp and longjmp Functions, getrlimit, setrlimit Functions, UNIX Kernel Support for Processes.
Line 1,377: Line 1,378:
Introduction, Process Identifiers, fork, vfork, exit, wait, waitpid, waited, wait3, wait4 Functions, Race Conditions, exec Functions, Changing User IDs and Group IDs, Interpreter Files, system Function, Process Accounting, User Identification, Process Times.  
Introduction, Process Identifiers, fork, vfork, exit, wait, waitpid, waited, wait3, wait4 Functions, Race Conditions, exec Functions, Changing User IDs and Group IDs, Interpreter Files, system Function, Process Accounting, User Identification, Process Times.  


Process Relationships: Introduction, Terminal Logins, Network Logins, Process Groups, Sessions, Controlling Terminal, tcgetpgrp, tcsetpgrp, and tcgetsid Functions, Job Control, Shell Execution of Programs, Orphaned Process Groups.
Process Relationships: Introduction, Terminal Logins, Network Logins, Process Groups, Sessions, Controlling Terminal, tcgetpgrp, tcsetpgrp, and tcgetsid Functions, Job Control, Shell Execution of Programs, Orphaned Process Groups.  


# '''Signals and Daemon Processes 7 Hours'''
# '''Signals and Daemon Processes 7 Hours'''  


Signals: The UNIX Kernel Support for Signals, signal, Signal Mask, sigaction, The SIGCHLD Signal and the waitpid Function, The sigsetjmp and siglongjmp Functions, Kill, Alarm, Interval Timers, POSIX.lb Timers.
Signals: The UNIX Kernel Support for Signals, signal, Signal Mask, sigaction, The SIGCHLD Signal and the waitpid Function, The sigsetjmp and siglongjmp Functions, Kill, Alarm, Interval Timers, POSIX.lb Timers.


Daemon Processes: Introduction, Daemon Characteristics, Coding Rules, Error Logging, Single-instance daemons; Daemon conventions; Client-Server Model.
Daemon Processes: Introduction, Daemon Characteristics, Coding Rules, Error Logging, Single-instance daemons; Daemon conventions; Client-Server Model.  


# '''Interprocess Communication - 1 6 Hours'''
# '''Interprocess Communication - 1 6 Hours'''  


Introduction; Pipes, popen, pclose Functions; Coprocesses; FIFOs; XSI IPC; Message Queues; Semaphores.
Introduction; Pipes, popen, pclose Functions; Coprocesses; FIFOs; XSI IPC; Message Queues; Semaphores.  


# '''Network IPC: Sockets 6 Hours'''
# '''Network IPC: Sockets 6 Hours'''  


Introduction; Socket Descriptors; Addressing; Connection establishment; Data transfer; Socket options; Out-of-band data; Nonblocking and asynchronous I/O.  
Introduction; Socket Descriptors; Addressing; Connection establishment; Data transfer; Socket options; Out-of-band data; Nonblocking and asynchronous I/O.  




'''Text Books:'''
'''Text Books:'''  


# Terrence Chan: Unix System Programming Using C++, Prentice-Hall of India / Pearson Education, 1999..
# Terrence Chan: Unix System Programming Using C++, Prentice-Hall of India / Pearson Education, 1999..  


(Chapters 1, 5, 6, 7, 8, 9)
(Chapters 1, 5, 6, 7, 8, 9)  


# W.Richard Stevens, Stephen A. Rago: Advanced Programming in the UNIX Environment, 2<sup>nd</sup> Edition, Pearson Education / Prentice-Hall of India, 2005.
# W.Richard Stevens, Stephen A. Rago: Advanced Programming in the UNIX Environment, 2<sup>nd</sup> Edition, Pearson Education / Prentice-Hall of India, 2005.  


(Chapters 7, 8, 9, 13, 15, 16)  
(Chapters 7, 8, 9, 13, 15, 16)  
Line 1,409: Line 1,410:
1. Marc J. Rochkind:''' '''Advanced UNIX Programming, 2<sup>nd</sup> Edition, Pearson Education, 2005.
1. Marc J. Rochkind:''' '''Advanced UNIX Programming, 2<sup>nd</sup> Edition, Pearson Education, 2005.


2. Maurice.J.Bach: The Design of the UNIX Operating System, Pearson Education / PHI, 1987.
2. Maurice.J.Bach: The Design of the UNIX Operating System, Pearson Education / PHI, 1987.  


# Uresh Vahalia:''' '''UNIX Internals, Pearson Education, 2001.
# Uresh Vahalia:''' '''UNIX Internals, Pearson Education, 2001.  


<center>'''Multimedia Systems'''</center>  
<center>'''Multimedia Systems'''</center>


   
   
Line 1,459: Line 1,460:




'''Text Books:'''
'''Text Books:'''  


# Ralf Steinmetz, Klara Narstedt: Multimedia Fundamentals: Vol 1-Media Coding and Content Processing, 2<sup>nd</sup> Edition, Pearson Education / PHI, 2003.
# Ralf Steinmetz, Klara Narstedt: Multimedia Fundamentals: Vol 1-Media Coding and Content Processing, 2<sup>nd</sup> Edition, Pearson Education / PHI, 2003.  


(Chapters 2, 3, 4, 5, 6, 7, 8, 9)
(Chapters 2, 3, 4, 5, 6, 7, 8, 9)  


# Prabhat K. Andleigh, Kiran Thakrar: Multimedia Systems Design, PHI, 2003.
# Prabhat K. Andleigh, Kiran Thakrar: Multimedia Systems Design, PHI, 2003.  


(Chapters 1, 3, 7)
(Chapters 1, 3, 7)




'''Reference Books:'''
'''Reference Books:'''  


# K.R Rao, Zoran S. Bojkovic and Dragorad A. Milovanovic: Multimedia Communication Systems: Techniques, Standards, and Networks, Pearson Education, 2002.
# K.R Rao, Zoran S. Bojkovic and Dragorad A. Milovanovic: Multimedia Communication Systems: Techniques, Standards, and Networks, Pearson Education, 2002.
# Nalin K Sharad: Multimedia information Networking, PHI, 2002.
# Nalin K Sharad: Multimedia information Networking, PHI, 2002.  


<center>'''Pattern Recognition'''</center>  
<center>'''Pattern Recognition'''</center>


   
   
Line 1,524: Line 1,525:


   
   
<center>'''Principles of User Interface Design'''</center>  
<center>'''Principles of User Interface Design'''</center>


   
   
Line 1,531: Line 1,532:


=== Total Hours : 52Exam Marks: 100 ===  
=== Total Hours : 52Exam Marks: 100 ===  
# '''Human Factors of Interactive Software, Theories, Principles and Guidelines 7 Hours'''
# '''Human Factors of Interactive Software, Theories, Principles and Guidelines 7 Hours'''  


Introduction, Goals of Systems Engineering, Goals of Interface Design, Motivation for Human Factors in Design, Accommodation of Human Diversity, Goals for the Profession,''' '''High Level Theories, Object-Action Interface Model, Principle 1: Recognize the Diversity, Principle 2: Use the Eight Golden Rules of Interface Design, Principle 3: Prevent Errors, Guidelines for Date Display, Guidelines for Data Entry, Balance of Automation and Human Control.
Introduction, Goals of Systems Engineering, Goals of Interface Design, Motivation for Human Factors in Design, Accommodation of Human Diversity, Goals for the Profession,''' '''High Level Theories, Object-Action Interface Model, Principle 1: Recognize the Diversity, Principle 2: Use the Eight Golden Rules of Interface Design, Principle 3: Prevent Errors, Guidelines for Date Display, Guidelines for Data Entry, Balance of Automation and Human Control.  


===== Management Issue 6 Hours =====  
===== Management Issue 6 Hours =====  
  Introduction, Organizational Design to Support Usability, The Three Pillars of Design, Development Methodologies, Ethnographic Observation, Participatory Design, Scenario Development, Social Impact Statement for Early Design Review, Legal Issues.  
  Introduction, Organizational Design to Support Usability, The Three Pillars of Design, Development Methodologies, Ethnographic Observation, Participatory Design, Scenario Development, Social Impact Statement for Early Design Review, Legal Issues.  


Expert Reviews, Usability Testing and Laboratories, Surveys, Acceptance Tests, Evaluation During Active Use, Controlled Psychologically Oriented Experiments
Expert Reviews, Usability Testing and Laboratories, Surveys, Acceptance Tests, Evaluation During Active Use, Controlled Psychologically Oriented Experiments  


# '''Tools and Environments 7 Hours'''
# '''Tools and Environments 7 Hours'''  


Introduction, Specification Methods, Interface-Building Tools, Evaluation and Critiquing Tools.
Introduction, Specification Methods, Interface-Building Tools, Evaluation and Critiquing Tools.


Introduction, Examples of Direct-Manipulation Systems, Explanations of Direct Manipulation, Visual Thinking and Icons, Direct Manipulation Programming, Home Automation, Remote Direct Manipulation Virtual Environments.
Introduction, Examples of Direct-Manipulation Systems, Explanations of Direct Manipulation, Visual Thinking and Icons, Direct Manipulation Programming, Home Automation, Remote Direct Manipulation Virtual Environments.  


===== Menus, Forms, Dialog Boxes and Commands 6 Hours =====  
===== Menus, Forms, Dialog Boxes and Commands 6 Hours =====  
  Task Related Organization, Item Presentation Sequence, Response Time and Display Rate, Fast Movement through Menus, Menu Layout, Form Fillin, Dialog Boxes.  
  Task Related Organization, Item Presentation Sequence, Response Time and Display Rate, Fast Movement through Menus, Menu Layout, Form Fillin, Dialog Boxes.  


Functionality to support Users Tasks, Command-Organization Strategies, The Benefits of Structure, Naming and Abbreviations, Command Menus, Natural Language in Computing.
Functionality to support Users Tasks, Command-Organization Strategies, The Benefits of Structure, Naming and Abbreviations, Command Menus, Natural Language in Computing.  


# '''Interaction Devices and Response Time 7 Hours'''
# '''Interaction Devices and Response Time 7 Hours'''  


Interaction Devices, Introduction, Keyboards and Function Keys, Pointing Devices, Speech Recognition, Digitization, and Generation, Image and Vide Displays, Printers. Theoretical Foundations, Expectations and Attitudes.
Interaction Devices, Introduction, Keyboards and Function Keys, Pointing Devices, Speech Recognition, Digitization, and Generation, Image and Vide Displays, Printers. Theoretical Foundations, Expectations and Attitudes.  


# '''Presentation Styles, Manuals, Help, and Tutorials - 1 6 Hours'''
# '''Presentation Styles, Manuals, Help, and Tutorials - 1 6 Hours'''  


Error Messages, Non-anthropomorphic Design, Display Design, Color. Reading from Paper Versus from Displays.
Error Messages, Non-anthropomorphic Design, Display Design, Color. Reading from Paper Versus from Displays.  


# '''Presentation Styles, Manuals, Help, and Tutorials – 2'''
# '''Presentation Styles, Manuals, Help, and Tutorials – 2'''  


'''Multiple-Window Strategies, Hypermedia and the World Wide Web – 1 7 Hours'''
'''Multiple-Window Strategies, Hypermedia and the World Wide Web – 1 7 Hours'''
Line 1,565: Line 1,566:
Preparation of Printed Manuals, Preparation of Online Facilities.
Preparation of Printed Manuals, Preparation of Online Facilities.


Multiple-Window Strategies: Introduction, Individual-Window Design, Multiple- window Design, Co-ordination by Tightly Coupled Windows, Image Browsing and Tightly Coupled Windows, Personal Role Management an Elastic Windows.
Multiple-Window Strategies: Introduction, Individual-Window Design, Multiple- window Design, Co-ordination by Tightly Coupled Windows, Image Browsing and Tightly Coupled Windows, Personal Role Management an Elastic Windows.  


# '''Multiple-Window Strategies, Hypermedia and the World Wide Web – 2 6 Hours '''  
# '''Multiple-Window Strategies, Hypermedia and the World Wide Web – 2 6 Hours '''


Genres and Goals and Designers, Users and Their Tasks, Object-Action Interface Model for Web Site Design.
Genres and Goals and Designers, Users and Their Tasks, Object-Action Interface Model for Web Site Design.




'''Text Books:'''
'''Text Books:'''  


# Ben Shneiderman: Designing the User Interface, 3<sup>rd</sup> Edition, Addison-Wesley, 1998.
# Ben Shneiderman: Designing the User Interface, 3<sup>rd</sup> Edition, Addison-Wesley, 1998.  


(Chapters 1 to 13, and 16)
(Chapters 1 to 13, and 16)




'''Reference Books:'''
'''Reference Books:'''  


# Alan J Dix et. al.: Human-Computer Interaction, II Edition, Prentice-Hall, India,1998
# Alan J Dix et. al.: Human-Computer Interaction, II Edition, Prentice-Hall, India,1998
# Eberts: User Interface Design, Prentice-Hall, 1994.
# Eberts: User Interface Design, Prentice-Hall, 1994.  


3. Wilber O Galitz: The Essential Guide to User Interface Design - An Introduction to GUI Design, Principles and Techniques, Wiley-Dreamtech India Pvt. Ltd, 1998.
3. Wilber O Galitz: The Essential Guide to User Interface Design - An Introduction to GUI Design, Principles and Techniques, Wiley-Dreamtech India Pvt. Ltd, 1998.


   
   
<center>'''Advanced Computer Networks'''</center>  
<center>'''Advanced Computer Networks'''</center>




Line 1,632: Line 1,633:




'''Text Books:'''
'''Text Books:'''  


# Behrouz A. Forouzan, Data Communications and Networking, 4<sup>th</sup> Edition, Tata McGraw-Hill, 2006.
# Behrouz A. Forouzan, Data Communications and Networking, 4<sup>th</sup> Edition, Tata McGraw-Hill, 2006.  


(Chapters 2, 17, 18, 20.3, 20.4, 21.1, 21.2, 22.4, 23.4, 24, 29)
(Chapters 2, 17, 18, 20.3, 20.4, 21.1, 21.2, 22.4, 23.4, 24, 29)  


# Nader F. Mir: Computer and Communication Networks, Pearson, 2007.
# Nader F. Mir: Computer and Communication Networks, Pearson, 2007.  


(Chapters 19, 20 excluding 20.5)
(Chapters 19, 20 excluding 20.5)
Line 1,647: Line 1,648:
1. William Stallings , Data and Computer Communication, 5<sup>th</sup> Edition, Prentice Hall India.
1. William Stallings , Data and Computer Communication, 5<sup>th</sup> Edition, Prentice Hall India.


2. William A. Shay, Understanding Data Communications and Networks, 2<sup>nd</sup> Edition, Thomson.
2. William A. Shay, Understanding Data Communications and Networks, 2<sup>nd</sup> Edition, Thomson.  


# Godbole, Data Communications and Networks, Tata McGraw-Hill 2002.
# Godbole, Data Communications and Networks, Tata McGraw-Hill 2002.
# Micael A. Gallo &amp; William M. Handcock, Computer
# Micael A. Gallo &amp; William M. Handcock, Computer
# Communications and Networking Technologies, 2003 Edition, Thomson.
# Communications and Networking Technologies, 2003 Edition, Thomson.  


<center>'''Java and J2EE Laboratory'''</center>  
<center>'''Java and J2EE Laboratory'''</center>




Line 1,667: Line 1,668:
#####  
#####  
######  
######  
####### a) Write a JAVA Program to demonstrate Constructor Overloading and Method overloading.
####### a) Write a JAVA Program to demonstrate Constructor Overloading and Method overloading.  


b) Write a JAVA Program to implement Inner class and demonstrate its Access Protections.
b) Write a JAVA Program to implement Inner class and demonstrate its Access Protections.  


# a) Write a JAVA Program to implement Inheritance.
# a) Write a JAVA Program to implement Inheritance.  


b) Write a JAVA Program to implement Exception Handling (Using Nested try catch and finally).
b) Write a JAVA Program to implement Exception Handling (Using Nested try catch and finally).  


# a) Write a JAVA Program to create an Interface and implement it in a class.
# a) Write a JAVA Program to create an Interface and implement it in a class.  


b) Write a JAVA Program to create a class (extending Thread) and use methods Thread class to change name, priority, ---- of the current Thread and display the same.
b) Write a JAVA Program to create a class (extending Thread) and use methods Thread class to change name, priority, ---- of the current Thread and display the same.  


# a) Write a JAVA Program to create a Scrolling Text using JAVA Applets.
# a) Write a JAVA Program to create a Scrolling Text using JAVA Applets.  


b)Write a JAVA Program to pass parameters to Applets and display the same.
b)Write a JAVA Program to pass parameters to Applets and display the same.  


# Write a JAVA Program to insert data into Student DATA BASE and retrieve info base on particular queries (Using JDBC Design Front end using Swings).
# Write a JAVA Program to insert data into Student DATA BASE and retrieve info base on particular queries (Using JDBC Design Front end using Swings).
Line 1,688: Line 1,689:
# Write a JAVA Servlet Program to implement a dynamic HTML using Servlet (user name and password should be accepted using HTML and displayed using a Servlet).
# Write a JAVA Servlet Program to implement a dynamic HTML using Servlet (user name and password should be accepted using HTML and displayed using a Servlet).
# Write a JAVA Servlet Program to Download a file and display it on the screen (A link has to be provided in HTML, when the link is clicked corresponding file has to be displayed on Screen)
# Write a JAVA Servlet Program to Download a file and display it on the screen (A link has to be provided in HTML, when the link is clicked corresponding file has to be displayed on Screen)
# a) Write a JAVA Servlet Program to implement RequestDispatcher object (use include() and forward() methods).
# a) Write a JAVA Servlet Program to implement RequestDispatcher object (use include() and forward() methods).  


b)Write a JAVA Servlet Program to implement and demonstrate get() and Post methods(Using HTTP Servlet Class).
b)Write a JAVA Servlet Program to implement and demonstrate get() and Post methods(Using HTTP Servlet Class).
Line 1,695: Line 1,696:
# Write a JAVA Servlet Program to implement sendRedirect() method(using HTTP Servlet Class).
# Write a JAVA Servlet Program to implement sendRedirect() method(using HTTP Servlet Class).
# Write a JAVA Servlet Program to implement sessions (Using HTTP Session Interface).
# Write a JAVA Servlet Program to implement sessions (Using HTTP Session Interface).
# a) Write a JAVA JSP Program to print 10 even and 10 odd number.
# a) Write a JAVA JSP Program to print 10 even and 10 odd number.  


b) Write a JAVA JSP Program to implement verification of a particular user login and display a welcome page.
b) Write a JAVA JSP Program to implement verification of a particular user login and display a welcome page.  


# Write a JAVA JSP Program to get student information through a HTML and create a JAVA Bean Class, populate Bean and display the same information through another JSP.
# Write a JAVA JSP Program to get student information through a HTML and create a JAVA Bean Class, populate Bean and display the same information through another JSP.  


<center>'''Web Programming Laboratory'''</center>  
<center>'''Web Programming Laboratory'''</center>


   
   
Line 1,714: Line 1,715:
   
   
# <nowiki>Develop and demonstrate a XHTML document that illustrates the use external style sheet, ordered list, table, borders, padding, color, and the <span> tag.</nowiki>
# <nowiki>Develop and demonstrate a XHTML document that illustrates the use external style sheet, ordered list, table, borders, padding, color, and the <span> tag.</nowiki>
# Develop and demonstrate a XHTML file that includes Javascript script for the following problems:
# Develop and demonstrate a XHTML file that includes Javascript script for the following problems:  


# Input: A number n obtained using prompt
# Input: A number n obtained using prompt  


Output: The first n Fibonacci numbers
Output: The first n Fibonacci numbers
Line 1,722: Line 1,723:
b) Input: A number n obtained using prompt
b) Input: A number n obtained using prompt


Output: A table of numbers from 1 to n and their squares using '''alert'''
Output: A table of numbers from 1 to n and their squares using '''alert'''  


# Develop and demonstrate a XHTML file that includes Javascript script that uses functions for the following problems:
# Develop and demonstrate a XHTML file that includes Javascript script that uses functions for the following problems:  


# Parameter: A string
# Parameter: A string  


Output: The position in the string of the left-most vowel
Output: The position in the string of the left-most vowel


b) Parameter: A number
b) Parameter: A number  


  Output: The number with its digits in the reverse order  
  Output: The number with its digits in the reverse order  


# a) Develop and demonstrate, using Javascript script, a XHTML document that collects the USN ( the valid format is: A digit from 1 to 4 followed by two upper-case characters followed by two digits followed by two upper-case characters followed by three digits; no embedded spaces allowed) of the user. Event handler must be included for the form element that collects this information to validate the input. Messages in the alert windows must be produced when errors are detected.
# a) Develop and demonstrate, using Javascript script, a XHTML document that collects the USN ( the valid format is: A digit from 1 to 4 followed by two upper-case characters followed by two digits followed by two upper-case characters followed by three digits; no embedded spaces allowed) of the user. Event handler must be included for the form element that collects this information to validate the input. Messages in the alert windows must be produced when errors are detected.  


b) Modify the above program to get the current semester also (restricted to be a number from 1 to 8)
b) Modify the above program to get the current semester also (restricted to be a number from 1 to 8)  


# a) Develop and demonstrate, using Javascript script, a XHTML document that contains three short paragraphs of text, stacked on top of each other, with only enough of each showing so that the mouse cursor can be placed over some part of them. When the cursor is placed over the exposed part of any paragraph, it should rise to the top to become completely visible.
# a) Develop and demonstrate, using Javascript script, a XHTML document that contains three short paragraphs of text, stacked on top of each other, with only enough of each showing so that the mouse cursor can be placed over some part of them. When the cursor is placed over the exposed part of any paragraph, it should rise to the top to become completely visible.  


b) Modify the above document so that when a paragraph is moved from the top stacking position, it returns to its original position rather than to the bottom.
b) Modify the above document so that when a paragraph is moved from the top stacking position, it returns to its original position rather than to the bottom.  


# a) Design an XML document to store information about a student in an engineering college affiliated to VTU. The information must include USN, Name, Name of the College, Brach, Year of Joining, and e-mail id. Make up sample data for 3 students. Create a CSS style sheet and use it to display the document.
# a) Design an XML document to store information about a student in an engineering college affiliated to VTU. The information must include USN, Name, Name of the College, Brach, Year of Joining, and e-mail id. Make up sample data for 3 students. Create a CSS style sheet and use it to display the document.  


b) Create an XSLT style sheet for one student element of the above document and use it to create a display of that element.
b) Create an XSLT style sheet for one student element of the above document and use it to create a display of that element.  


# a) Write a Perl program to display various Server Information like Server Name, Server Software, Server protocol, CGI Revision etc.
# a) Write a Perl program to display various Server Information like Server Name, Server Software, Server protocol, CGI Revision etc.  


b) Write a Perl program to accept UNIX command from a HTML form and to display the output of the command executed.
b) Write a Perl program to accept UNIX command from a HTML form and to display the output of the command executed.  


# a) Write a Perl program to accept the User Name and display a greeting message randomly chosen from a list of 4 greeting messages.
# a) Write a Perl program to accept the User Name and display a greeting message randomly chosen from a list of 4 greeting messages.  


b) Write a Perl program to keep track of the number of visitors visiting the web page and to display this count of visitors, with proper headings.
b) Write a Perl program to keep track of the number of visitors visiting the web page and to display this count of visitors, with proper headings.  


# Write a Perl program to display a digital clock which displays the current time of the server.
# Write a Perl program to display a digital clock which displays the current time of the server.
Line 1,759: Line 1,760:
# Write a PHP program to store page views count in SESSION, to increment the count on each refresh, and to show the count on web page.
# Write a PHP program to store page views count in SESSION, to increment the count on each refresh, and to show the count on web page.
# Create a XHTML form with Name, Address Line 1, Address Line 2, and E-mail text fields. On submitting, store the values in MySQL table. Retrieve and display the data based on Name.  
# Create a XHTML form with Name, Address Line 1, Address Line 2, and E-mail text fields. On submitting, store the values in MySQL table. Retrieve and display the data based on Name.  
# Using PHP and MySQL, develop a program to accept book information viz. Accession number, title, authors, edition and publisher from a web page and store the information in a database and to search for a book with the title specified by the user and to display the search results with proper headings.
# Using PHP and MySQL, develop a program to accept book information viz. Accession number, title, authors, edition and publisher from a web page and store the information in a database and to search for a book with the title specified by the user and to display the search results with proper headings.  


<center>'''ALGORITHMS LABORATORY'''</center>  
<center>'''ALGORITHMS LABORATORY'''</center>


=== Subject Code: Marks : 50 ===
=== Subject Code: Marks : 50 ===
Line 1,773: Line 1,774:
# Sort a given set of elements using Merge sort method and determine the time required to sort the elements. Repeat the experiment for different values of n, the number of elements in the list to be sorted and plot a graph of the time taken versus n.  
# Sort a given set of elements using Merge sort method and determine the time required to sort the elements. Repeat the experiment for different values of n, the number of elements in the list to be sorted and plot a graph of the time taken versus n.  
# Sort a given set of elements using Selection sort and determine the time required to sort elements. Repeat the experiment for different values of n, the number of elements in the list to be sorted and plot a graph of the time taken versus n.
# Sort a given set of elements using Selection sort and determine the time required to sort elements. Repeat the experiment for different values of n, the number of elements in the list to be sorted and plot a graph of the time taken versus n.
# a. Obtain the Topological ordering of vertices in a given digraph.
# a. Obtain the Topological ordering of vertices in a given digraph.  


b. Implement All Pair Shortest paths problem using Floyd's algorithm.
b. Implement All Pair Shortest paths problem using Floyd's algorithm.  


# Implement 0/1 Knapsack problem using dynamic programming.
# Implement 0/1 Knapsack problem using dynamic programming.
Line 1,781: Line 1,782:
# Sort a given set of elements using Quick sort method and determine the time required sort the elements. Repeat the experiment for different values of n, the number of elements in the list to be sorted and plot a graph of the time taken versus n.
# Sort a given set of elements using Quick sort method and determine the time required sort the elements. Repeat the experiment for different values of n, the number of elements in the list to be sorted and plot a graph of the time taken versus n.
# Find Minimum Cost Spanning Tree of a given undirected graph using Kruskal's algorithm.
# Find Minimum Cost Spanning Tree of a given undirected graph using Kruskal's algorithm.
# a. Print all the nodes reachable from a given starting node in a digraph using BFS method.
# a. Print all the nodes reachable from a given starting node in a digraph using BFS method.  


b. Check whether a given graph is connected or not using DFS method.
b. Check whether a given graph is connected or not using DFS method.  


# Find a subset of a given set S = {sl,s2,.....,sn} of n positive integers whose sum is equal to a given positive integer d. For example, if S= {1, 2, 5, 6, 8} and d = 9 there are two solutions{1,2,6}and{1,8}.A suitable message is to be displayed if the given problem instance doesn't have a solution.
# Find a subset of a given set S = {sl,s2,.....,sn} of n positive integers whose sum is equal to a given positive integer d. For example, if S= {1, 2, 5, 6, 8} and d = 9 there are two solutions{1,2,6}and{1,8}.A suitable message is to be displayed if the given problem instance doesn't have a solution.
# a. Implement Horspool algorithm for String Matching.
# a. Implement Horspool algorithm for String Matching.  


b. Find the Binomial Co-efficient using Dynamic Programming.
b. Find the Binomial Co-efficient using Dynamic Programming.  


# Find Minimum Cost Spanning Tree of a given undirected graph using Prim’s algorithm.
# Find Minimum Cost Spanning Tree of a given undirected graph using Prim’s algorithm.
# a. Implement Floyd’s algorithm for the All-Pairs- Shortest-Paths problem.
# a. Implement Floyd’s algorithm for the All-Pairs- Shortest-Paths problem.  


b. Compute the transitive closure of a given directed graph using Warshall's algorithm.
b. Compute the transitive closure of a given directed graph using Warshall's algorithm.  


# Implement N Queen's problem using Back Tracking.
# Implement N Queen's problem using Back Tracking.  


'''Note: In the examination questions must be given based on lots. '''
'''Note: In the examination questions must be given based on lots. '''


   
   
<center>'''V SEMESTER'''</center>  
<center>'''V SEMESTER'''</center>


   
   
<center>'''Object-Oriented Modeling and Design Patterns'''</center>  
<center>'''Object-Oriented Modeling and Design Patterns'''</center>


   
   
Line 1,810: Line 1,811:


=== Total Hours : 52Exam Marks: 100 ===  
=== Total Hours : 52Exam Marks: 100 ===  
<center>'''PART – A'''</center>  
<center>'''PART – A'''</center>




Line 1,888: Line 1,889:


   
   
<center>'''System Modeling and Simulation'''</center>  
<center>'''System Modeling and Simulation'''</center>




Line 1,945: Line 1,946:




'''Reference Books''':
'''Reference Books''':  


# Lawrence M. Leemis, Stephen K. Park: Discrete – Event Simulation: A First Course, Pearson / Prentice-Hall, 2006.  
# Lawrence M. Leemis, Stephen K. Park: Discrete – Event Simulation: A First Course, Pearson / Prentice-Hall, 2006.  
# Averill M. Law: Simulation Modeling and Analysis,4<sup>th</sup> Edition, Tata McGraw-Hill, 2007.
# Averill M. Law: Simulation Modeling and Analysis,4<sup>th</sup> Edition, Tata McGraw-Hill, 2007.  


<center>'''Topics in Enterprise Architecture - 2'''</center>  
<center>'''Topics in Enterprise Architecture - 2'''</center>


   
   
Line 1,957: Line 1,958:


=== Total Hours : 52Exam Marks: 100 ===  
=== Total Hours : 52Exam Marks: 100 ===  
# '''The philosophy of .NET ''''''6 Hours'''
# '''The philosophy of .NET ''''''6 Hours'''  


Understanding the Previous State of Affairs, The .NET Solution, The Building Block of the .NET Platform (CLR,CTS, and CLS), The Role of the .NET Base Class Libraries, What C# Brings to the Table, An Overview of .NET Binaries ( aka Assemblies ), the Role of the Common Intermediate Language , The Role of .NET Type Metadata, The Role of the Assembly Manifast, Compiling CIL to Platform –Specific Instructions, Understanding the Common Type System, Intrinsic CTS Data Types, Understanding the Common Languages Specification, Understanding the Common Language Runtime A tour of the .NET Namespaces, Increasing Your Namespace Nomenclature, Deploying the .NET Runtime
Understanding the Previous State of Affairs, The .NET Solution, The Building Block of the .NET Platform (CLR,CTS, and CLS), The Role of the .NET Base Class Libraries, What C# Brings to the Table, An Overview of .NET Binaries ( aka Assemblies ), the Role of the Common Intermediate Language , The Role of .NET Type Metadata, The Role of the Assembly Manifast, Compiling CIL to Platform –Specific Instructions, Understanding the Common Type System, Intrinsic CTS Data Types, Understanding the Common Languages Specification, Understanding the Common Language Runtime A tour of the .NET Namespaces, Increasing Your Namespace Nomenclature, Deploying the .NET Runtime  


# '''Building C# Applications 6 Hours'''
# '''Building C# Applications 6 Hours'''  


The Role of the Command Line Complier (csc.exe), Building C # Application using csc.exe Working with csc.exe Response Files, Generating Bug Reports , Remaining C# Compiler Options, The Command Line Debugger (cordbg.exe) Using the, Visual Studio .NET IDE, Other Key Aspects of the VS.NET IDE, C# “Preprocessor:” Directives, An Interesting Aside: The System. Environment Class
The Role of the Command Line Complier (csc.exe), Building C # Application using csc.exe Working with csc.exe Response Files, Generating Bug Reports , Remaining C# Compiler Options, The Command Line Debugger (cordbg.exe) Using the, Visual Studio .NET IDE, Other Key Aspects of the VS.NET IDE, C# “Preprocessor:” Directives, An Interesting Aside: The System. Environment Class  


# '''C# Language Fundamentals. 8 Hours'''
# '''C# Language Fundamentals. 8 Hours'''  


The Anatomy of a Basic C# Class, Creating objects: Constructor Basics, The Composition of a C# Application, Default Assignment and Variable Scope, The C# Member Initialization Syntax, Basic Input and Output with the Console Class, Understanding Value Types and Reference Types, The Master Node: System, Object, The System Data Types (and C# Aliases), Converting Between Value Types and Reference Types: Boxing and Unboxing, Defining Program Constants, C# Iteration Constructs, C# Controls Flow Constructs, The Complete Set of C# Operators, Defining Custom Class Methods, Understating Static Methods, Methods Parameter Modifies, Array Manipulation in C #, String Manipulation in C#, C# Enumerations, Defining Structures in C#, Defining Custom Namespaces.  
The Anatomy of a Basic C# Class, Creating objects: Constructor Basics, The Composition of a C# Application, Default Assignment and Variable Scope, The C# Member Initialization Syntax, Basic Input and Output with the Console Class, Understanding Value Types and Reference Types, The Master Node: System, Object, The System Data Types (and C# Aliases), Converting Between Value Types and Reference Types: Boxing and Unboxing, Defining Program Constants, C# Iteration Constructs, C# Controls Flow Constructs, The Complete Set of C# Operators, Defining Custom Class Methods, Understating Static Methods, Methods Parameter Modifies, Array Manipulation in C #, String Manipulation in C#, C# Enumerations, Defining Structures in C#, Defining Custom Namespaces.  
Line 1,971: Line 1,972:
'''4. Object- Oriented Programming with C# 6 Hours'''
'''4. Object- Oriented Programming with C# 6 Hours'''


Forms Defining of the C# Class, Definition the “Default Public Interface” of a Type, Recapping the Pillars of OOP, The First Pillars: C#’s Encapsulation Services, Pseudo- Encapsulation: Creating Read-Only Fields, The Second Pillar: C#’s Inheritance Supports, keeping Family Secrets: The “ Protected” Keyword, Nested Type Definitions, The Third Pillar: C #’s Polymorphic Support, Casting Between .
Forms Defining of the C# Class, Definition the “Default Public Interface” of a Type, Recapping the Pillars of OOP, The First Pillars: C#’s Encapsulation Services, Pseudo- Encapsulation: Creating Read-Only Fields, The Second Pillar: C#’s Inheritance Supports, keeping Family Secrets: The “ Protected” Keyword, Nested Type Definitions, The Third Pillar: C #’s Polymorphic Support, Casting Between .  


# '''Exceptions and Object Lifetime. 6 Hours'''
# '''Exceptions and Object Lifetime. 6 Hours'''  


Ode to Errors, Bugs, and Exceptions, The Role of .NET Exception Handing, the System. Exception Base Class, Throwing a Generic Exception, Catching Exception, CLR System – Level Exception (System. System Exception), Custom Application-Level Exception (System. System Exception), Handling Multiple Exception, The Family Block, the Last Chance Exception Dynamically Identifying Application – and System Level Exception Debugging System Exception Using VS. NET, Understanding Object Lifetime, the CIT of “new’, The Basics of Garbage Collection,, Finalization a Type, The Finalization Process, Building an Ad Hoc Destruction Method, Garbage Collection Optimizations, The System. GC Type.  
Ode to Errors, Bugs, and Exceptions, The Role of .NET Exception Handing, the System. Exception Base Class, Throwing a Generic Exception, Catching Exception, CLR System – Level Exception (System. System Exception), Custom Application-Level Exception (System. System Exception), Handling Multiple Exception, The Family Block, the Last Chance Exception Dynamically Identifying Application – and System Level Exception Debugging System Exception Using VS. NET, Understanding Object Lifetime, the CIT of “new’, The Basics of Garbage Collection,, Finalization a Type, The Finalization Process, Building an Ad Hoc Destruction Method, Garbage Collection Optimizations, The System. GC Type.  
Line 1,992: Line 1,993:




'''Text Books: '''  
'''Text Books: '''


# Andrew Troelsen: Pro C# with .NET 3.0, Special Edition, Dream tech Press, India, 2007.
# Andrew Troelsen: Pro C# with .NET 3.0, Special Edition, Dream tech Press, India, 2007.  


Chapters: 1 to 11 (up to pp.369)
Chapters: 1 to 11 (up to pp.369)  


# E. Balagurusamy: Programming in C#, , 5<sup>th</sup> Reprint, Tata McGraw Hill, 2004.
# E. Balagurusamy: Programming in C#, , 5<sup>th</sup> Reprint, Tata McGraw Hill, 2004.  


(Programming Examples 3.7, 3.10, 5.5, 6.1, 7.2, 7.4, 7.5, 7.6, 8.1, 8.2, 8.3, 8.5, 87, 8.8, 9.1, 9.2, 9.3, 9.4, 10.2, 10.4, 11.2, 11.4, 12.1, 12.4, 12.5, 12.6, 13.1, 13.2, 13.3, 13.6, 14.1, 14.2, 14.4, 15.2, 15.3, 16.1, 16.2, 16.3, 18.3, 18.5.18.6.)
(Programming Examples 3.7, 3.10, 5.5, 6.1, 7.2, 7.4, 7.5, 7.6, 8.1, 8.2, 8.3, 8.5, 87, 8.8, 9.1, 9.2, 9.3, 9.4, 10.2, 10.4, 11.2, 11.4, 12.1, 12.4, 12.5, 12.6, 13.1, 13.2, 13.3, 13.6, 14.1, 14.2, 14.4, 15.2, 15.3, 16.1, 16.2, 16.3, 18.3, 18.5.18.6.)




'''Reference Books: '''  
'''Reference Books: '''


# Tom Archer: Inside C#, WP Publishers, 2001.  
# Tom Archer: Inside C#, WP Publishers, 2001.  
# Herbert Schildt: The Complete Reference C#, , Tata McGraw Hill, 2004.
# Herbert Schildt: The Complete Reference C#, , Tata McGraw Hill, 2004.  


<center>'''Information Retrieval'''</center>  
<center>'''Information Retrieval'''</center>




Line 2,018: Line 2,019:


   
   
# '''Introduction, Retrieval Strategies - 1 7 Hours'''
# '''Introduction, Retrieval Strategies - 1 7 Hours'''  


Introduction; Retrieval Strategies: Vector Space Model; Probabilistic Retrieval strategies
Introduction; Retrieval Strategies: Vector Space Model; Probabilistic Retrieval strategies
Line 2,024: Line 2,025:
'''2'''. '''Retrieval Strategies – 2 6 Hours'''
'''2'''. '''Retrieval Strategies – 2 6 Hours'''


Some More Retrieval Strategies: Language Models; Inference Networks; Extended Boolean Retrieval; Latent Semantic Indexing; Neural Networks; Genetic Algorithms; Fuzzy Set Retrieval.
Some More Retrieval Strategies: Language Models; Inference Networks; Extended Boolean Retrieval; Latent Semantic Indexing; Neural Networks; Genetic Algorithms; Fuzzy Set Retrieval.  


# '''Retrieval Utilities 7 Hours'''
# '''Retrieval Utilities 7 Hours'''  


Relevance feedback; Clustering; Passage-Based Retrieval; N-Grams; Regression Analysis; Thesauri; Semantic Networks; Parsing.
Relevance feedback; Clustering; Passage-Based Retrieval; N-Grams; Regression Analysis; Thesauri; Semantic Networks; Parsing.  


# '''Indexing and Searching 6 Hours'''
# '''Indexing and Searching 6 Hours'''  


Introduction; Inverted Files; Other indices for text; Boolean queries; Sequential searching; Pattern matching; Structural queries; Compression.
Introduction; Inverted Files; Other indices for text; Boolean queries; Sequential searching; Pattern matching; Structural queries; Compression.  


# '''Cross-Language Information Retrieval and Efficiency 6 Hours'''
# '''Cross-Language Information Retrieval and Efficiency 6 Hours'''  


Introduction; Crossing the language barrier; Cross-Language retrieval strategies; Cross language utilities. Duplicate Document Detection.
Introduction; Crossing the language barrier; Cross-Language retrieval strategies; Cross language utilities. Duplicate Document Detection.  


# '''Integrating Structured Data and Text 6 Hours'''
# '''Integrating Structured Data and Text 6 Hours'''  


Review of the relational model; A historical progression; Information retrieval as a relational application; Semi-structured search using a relational schema; Multi-dimensional data model.
Review of the relational model; A historical progression; Information retrieval as a relational application; Semi-structured search using a relational schema; Multi-dimensional data model.  


# '''Parallel Information Retrieval, Distributed Information Retrieval 7 Hours'''
# '''Parallel Information Retrieval, Distributed Information Retrieval 7 Hours'''  


Parallel text scanning; Parallel indexing; Clustering and classification; Large parallel systems; A theoretic model of distributed information retrieval; Web search; Result fusion; Peer-to-Peer information systems; Other architectures.
Parallel text scanning; Parallel indexing; Clustering and classification; Large parallel systems; A theoretic model of distributed information retrieval; Web search; Result fusion; Peer-to-Peer information systems; Other architectures.
Line 2,051: Line 2,052:




'''Text Books:'''
'''Text Books:'''  


# David A. Grossman, Ophir Frieder: Information Retrieval Algorithms and Heuristics, 2<sup>nd</sup> Edition, Springer, 2004.
# David A. Grossman, Ophir Frieder: Information Retrieval Algorithms and Heuristics, 2<sup>nd</sup> Edition, Springer, 2004.  


(Chapters 1, 2, 3, 4, 5, 6, 7, 8)
(Chapters 1, 2, 3, 4, 5, 6, 7, 8)  


# Ricardo Baeza-Yates, Berthier Ribeiro-Neto: Modern Information Retrieval, Pearson Education, 1999
# Ricardo Baeza-Yates, Berthier Ribeiro-Neto: Modern Information Retrieval, Pearson Education, 1999  


(Chapters 8, 11, 12)
(Chapters 8, 11, 12)




'''Reference Books :'''
'''Reference Books :'''  


# William B. Frakes, Ricardo Baeza-Yates (Editors):Information Retrieval Data Structures &amp; Algorithms, Prentice Hall PTR, 1992.
# William B. Frakes, Ricardo Baeza-Yates (Editors):Information Retrieval Data Structures &amp; Algorithms, Prentice Hall PTR, 1992.  


<center>'''Data Mining'''</center>  
<center>'''Data Mining'''</center>


   
   
Line 2,122: Line 2,123:


   
   
<center>'''Supply Chain Management'''</center>  
<center>'''Supply Chain Management'''</center>


   
   
Line 2,152: Line 2,153:
  The role of revenue management in Supply Chain; revenue management for multiple customer segments, perishable assets, seasonal demand, and bulk and spot contracts; Using revenue management in practice.  
  The role of revenue management in Supply Chain; revenue management for multiple customer segments, perishable assets, seasonal demand, and bulk and spot contracts; Using revenue management in practice.  


Lack of Supply Chain coordination and Bullwhip effect; Effect of lack of coordination on performance; Obstacles to coordination in the Supply Chain; managerial levers to achieve coordination; Building strategic partnerships and trust within a supply Chain; Achieving coordination in practice.
Lack of Supply Chain coordination and Bullwhip effect; Effect of lack of coordination on performance; Obstacles to coordination in the Supply Chain; managerial levers to achieve coordination; Building strategic partnerships and trust within a supply Chain; Achieving coordination in practice.  


== 8. IT, Internet and Supply Chain 6 Hours ==  
== 8. IT, Internet and Supply Chain 6 Hours ==  
Line 2,160: Line 2,161:




'''Text Books :'''
'''Text Books :'''  


# Sunil Chopra, Pter Meindl: Supply Chain Management Strategy, Planning, and Operation, 2<sup>nd</sup> Edition, Prentice-Hall of India, 2004.
# Sunil Chopra, Pter Meindl: Supply Chain Management Strategy, Planning, and Operation, 2<sup>nd</sup> Edition, Prentice-Hall of India, 2004.  


(Chapters 1, 2, 4, 4, 5, 6, 7, 8.1 to 8.3, 10, 14, 15, 16, 17, 18)
(Chapters 1, 2, 4, 4, 5, 6, 7, 8.1 to 8.3, 10, 14, 15, 16, 17, 18)




'''Reference Books:'''
'''Reference Books:'''  


# David Simchi-Levi, Philp Kaminky, Edith Simchi-Levi: Designing and Managing The Supply Chain Concepts, Strategies &amp; Case Studies, 3<sup>rd</sup> Edition, tata McGraw Hill, 2003.
# David Simchi-Levi, Philp Kaminky, Edith Simchi-Levi: Designing and Managing The Supply Chain Concepts, Strategies &amp; Case Studies, 3<sup>rd</sup> Edition, tata McGraw Hill, 2003.
# R.P. Mohanty, S.G. Deshmukh: Supply Chain Management Theories &amp; Practices, Bizmantra, 2005.
# R.P. Mohanty, S.G. Deshmukh: Supply Chain Management Theories &amp; Practices, Bizmantra, 2005.  


3. Rahul V. Altekar: Supply Chain Management Concepts and Cases, PHI, 2005.
3. Rahul V. Altekar: Supply Chain Management Concepts and Cases, PHI, 2005.
Line 2,177: Line 2,178:


   
   
<center>'''Network Management'''</center>  
<center>'''Network Management'''</center>




Line 2,189: Line 2,190:
'''1. Introduction 7 Hours '''
'''1. Introduction 7 Hours '''


Analogy of Telephone Network Management, Data and Telecommunication Network Distributed computing Environments, TCP/IP-Based Networks: The Internet and Intranets, Communications Protocols and Standards- Communication Architectures, Protocol Layers and Services; Case Histories of Networking and Management – The Importance of topology , Filtering Does Not Reduce Load on Node, Some Common Network Problems; Challenges of Information Technology Managers, Network Management: Goals, Organization, and Functions- Goal of Network Management, Network Provisioning, Network Operations and the NOC, Network Installation and Maintenance; Network and System Management, Network Management System platform, Current Status and Future of Network Management.
Analogy of Telephone Network Management, Data and Telecommunication Network Distributed computing Environments, TCP/IP-Based Networks: The Internet and Intranets, Communications Protocols and Standards- Communication Architectures, Protocol Layers and Services; Case Histories of Networking and Management – The Importance of topology , Filtering Does Not Reduce Load on Node, Some Common Network Problems; Challenges of Information Technology Managers, Network Management: Goals, Organization, and Functions- Goal of Network Management, Network Provisioning, Network Operations and the NOC, Network Installation and Maintenance; Network and System Management, Network Management System platform, Current Status and Future of Network Management.  


= 2. Basic Foundations: Standards, Models, and Language 6 Hours =  
= 2. Basic Foundations: Standards, Models, and Language 6 Hours =  
Line 2,207: Line 2,208:
Remote Monitoring, RMON SMI and MIB, RMONI1- RMON1 Textual Conventions, RMON1 Groups and Functions, Relationship Between Control and Data Tables, RMON1 Common and Ethernet Groups, RMON Token Ring Extension Groups, RMON2 – The RMON2 Management Information Base, RMON2 Conformance Specifications; ATM Remote Monitoring, A Case Study of Internet Traffic Using RMON.
Remote Monitoring, RMON SMI and MIB, RMONI1- RMON1 Textual Conventions, RMON1 Groups and Functions, Relationship Between Control and Data Tables, RMON1 Common and Ethernet Groups, RMON Token Ring Extension Groups, RMON2 – The RMON2 Management Information Base, RMON2 Conformance Specifications; ATM Remote Monitoring, A Case Study of Internet Traffic Using RMON.


'''6. Broadband Network Management: ATM Networks 6 Hours'''
'''6. Broadband Network Management: ATM Networks 6 Hours'''  


== Broadband Networks and Services, ATM Technology – Virtual Path-Virtual Circuit, TM Packet Size, Integrated Service, SONET, ATM LAN Emulation, Virtual LAN; ATM Network Management – The ATM Network Reference Model, The Integrated Local Management Interface, The ATM Management Information Base, The Role of SNMP and ILMI in ATM Management, M1 Interface: Management of ATM Network Element, M2 Interface: Management of Private Networks, M3 Interface: Customer Network Management of Public Networks, M4 Interface: Public Network Management, Management of LAN Emulation, ATM Digital Exchange Interface Management. ==  
== Broadband Networks and Services, ATM Technology – Virtual Path-Virtual Circuit, TM Packet Size, Integrated Service, SONET, ATM LAN Emulation, Virtual LAN; ATM Network Management – The ATM Network Reference Model, The Integrated Local Management Interface, The ATM Management Information Base, The Role of SNMP and ILMI in ATM Management, M1 Interface: Management of ATM Network Element, M2 Interface: Management of Private Networks, M3 Interface: Customer Network Management of Public Networks, M4 Interface: Public Network Management, Management of LAN Emulation, ATM Digital Exchange Interface Management. ==  
Line 2,227: Line 2,228:


   
   
<center>'''Compiler Design'''</center>  
<center>'''Compiler Design'''</center>




Line 2,278: Line 2,279:




'''Reference Books:'''
'''Reference Books:'''  


# Charles N. Fischer, Richard J. leBlanc, Jr.: Crafting a Compiler with C, Pearson Education, 1991.
# Charles N. Fischer, Richard J. leBlanc, Jr.: Crafting a Compiler with C, Pearson Education, 1991.
# Andrew W Apple: Modern Compiler Implementation in C, Cambridge University Press, 1997.
# Andrew W Apple: Modern Compiler Implementation in C, Cambridge University Press, 1997.
# Kenneth C Louden: Compiler Construction Principles &amp; Practice, Thomson Education, 1997.
# Kenneth C Louden: Compiler Construction Principles &amp; Practice, Thomson Education, 1997.  


<center>'''Software Architectures'''</center>  
<center>'''Software Architectures'''</center>


   
   
Line 2,348: Line 2,349:


   
   
<center>'''Information and Network Security'''</center>  
<center>'''Information and Network Security'''</center>


   
   
Line 2,355: Line 2,356:


=== Total Hours : 52Exam Marks: 100 ===  
=== Total Hours : 52Exam Marks: 100 ===  
# '''Planning for Security 6 Hours'''
# '''Planning for Security 6 Hours'''  


Introduction; Information Security Policy, Standards, and Practices; The Information Security Blue Print; Contingency plan and a model for contingency plan.
Introduction; Information Security Policy, Standards, and Practices; The Information Security Blue Print; Contingency plan and a model for contingency plan.  


# '''Security Technology 12 Hours'''
# '''Security Technology 12 Hours'''  


Introduction; Physical design; Firewalls; Protecting Remote Connections.
Introduction; Physical design; Firewalls; Protecting Remote Connections.


Introduction; Intrusion Detection Systems (IDS); Honey Pots, Honey Nets, and Padded cell systems; Scanning and Analysis Tools.
Introduction; Intrusion Detection Systems (IDS); Honey Pots, Honey Nets, and Padded cell systems; Scanning and Analysis Tools.  


# '''Cryptography 8 Hours'''
# '''Cryptography 8 Hours'''  


Introduction; A short History of Cryptography; Principles of Cryptography; Cryptography Tools; Attacks on Cryptosystems.
Introduction; A short History of Cryptography; Principles of Cryptography; Cryptography Tools; Attacks on Cryptosystems.  


# '''Introduction to Network Security, Authentication Applications 8 Hours'''
# '''Introduction to Network Security, Authentication Applications 8 Hours'''  


Attacks , services, and Mechanisms; Security Attacks; Security Services; A model for Internetwork Security; Internet Standards and RFCs.
Attacks , services, and Mechanisms; Security Attacks; Security Services; A model for Internetwork Security; Internet Standards and RFCs.


Kerberos, X.509 Directory Authentication Service.
Kerberos, X.509 Directory Authentication Service.  


# '''Electronic Mail Security 6 Hours'''
# '''Electronic Mail Security 6 Hours'''  


Pretty Good Privacy (PGP); S/MIME.
Pretty Good Privacy (PGP); S/MIME.
Line 2,381: Line 2,382:
'''7. IP Security 6 Hours'''
'''7. IP Security 6 Hours'''


IP Security Overview; IP Security Architecture; Authentication Header; Encapsulating Security Payload; Combining Security Associations; Key Management.
IP Security Overview; IP Security Architecture; Authentication Header; Encapsulating Security Payload; Combining Security Associations; Key Management.  


# '''Web Security 6 Hours'''
# '''Web Security 6 Hours'''  


Web security requirements; Secure Socket layer (SSL) and Transport layer Security (TLS); Secure Electronic Transaction (SET).
Web security requirements; Secure Socket layer (SSL) and Transport layer Security (TLS); Secure Electronic Transaction (SET).




'''Text Books:'''
'''Text Books:'''  


# Michael E. Whitman and Herbert J. Mattord: Principles of Information Security, 2<sup>nd</sup> Edition, Thomson, 2005.
# Michael E. Whitman and Herbert J. Mattord: Principles of Information Security, 2<sup>nd</sup> Edition, Thomson, 2005.  


(Chapters 5, 6, 7, 8; Exclude the topics not mentioned in the syllabus)
(Chapters 5, 6, 7, 8; Exclude the topics not mentioned in the syllabus)  


# William Stallings: Network Security Essentials: Applications and Standards, Pearson Education, 2000.
# William Stallings: Network Security Essentials: Applications and Standards, Pearson Education, 2000.  


(Chapters: 1, 4, 5, 6, 7, 8)
(Chapters: 1, 4, 5, 6, 7, 8)
Line 2,404: Line 2,405:


   
   
<center>'''Software Testing'''</center>  
<center>'''Software Testing'''</center>




Line 2,468: Line 2,469:


   
   
<center>'''Services Oriented Architecture'''</center>  
<center>'''Services Oriented Architecture'''</center>




Line 2,519: Line 2,520:


   
   
<center>'''Mobile Computing'''</center>  
<center>'''Mobile Computing'''</center>




Line 2,570: Line 2,571:




'''Text Book:'''
'''Text Book:'''  


# Raj Kamal: Mobile Computing, Oxford University Press, 2007.
# Raj Kamal: Mobile Computing, Oxford University Press, 2007.  


'''Reference BOOKs:'''
'''Reference BOOKs:'''  


# Asoke Talkukder, Roopa R Yavagal: Mobile Computing – Technology, Applications and Service Creation, Tata McGraw Hill, 2005.
# Asoke Talkukder, Roopa R Yavagal: Mobile Computing – Technology, Applications and Service Creation, Tata McGraw Hill, 2005.
# Reza B’Far: Mobile Computing Principles – Designing and Developing Mobile Applications with UML and XML, 5<sup>th</sup> Edition, Cambridge University press, 2006.
# Reza B’Far: Mobile Computing Principles – Designing and Developing Mobile Applications with UML and XML, 5<sup>th</sup> Edition, Cambridge University press, 2006.
# Uwe Hansmann, Lothat Merk, Martin S Nicklous and Thomas Stober: Principles of Mobile Computing, 2<sup>nd</sup> Edition, Springer International Edition, 2003.
# Uwe Hansmann, Lothat Merk, Martin S Nicklous and Thomas Stober: Principles of Mobile Computing, 2<sup>nd</sup> Edition, Springer International Edition, 2003.  


4. Schiller: Mobile Communication, Pearson Publication, 2004.
4. Schiller: Mobile Communication, Pearson Publication, 2004.


   
   
<center>'''Artificial Intelligence'''</center>  
<center>'''Artificial Intelligence'''</center>


   
   
Line 2,639: Line 2,640:


   
   
<center>'''Web 2.0 and Rich Internet Applications'''</center>  
<center>'''Web 2.0 and Rich Internet Applications'''</center>




Line 2,649: Line 2,650:


   
   
# '''Introduction, Web Services 8 Hours'''
# '''Introduction, Web Services 8 Hours'''  


What is Web 2.0?, Folksonomies and Web 2.0, Software As a Service (SaaS), Data and Web 2.0, Convergence, Iterative development, Rich User experience, Multiple Delivery Channels, Social Networking.
What is Web 2.0?, Folksonomies and Web 2.0, Software As a Service (SaaS), Data and Web 2.0, Convergence, Iterative development, Rich User experience, Multiple Delivery Channels, Social Networking.
Line 2,673: Line 2,674:
Working with UI components: Understanding UI Components, Creating component instances, Common UI Component properties, Handling events, Button, Value selectors, Text components, List based controls, Data models and Model View Controller, Creating collection objects, Setting the data provider, Using Data grids, Using Tree controls, Working with selected values and items, Pop up controls, Navigators, Control bars
Working with UI components: Understanding UI Components, Creating component instances, Common UI Component properties, Handling events, Button, Value selectors, Text components, List based controls, Data models and Model View Controller, Creating collection objects, Setting the data provider, Using Data grids, Using Tree controls, Working with selected values and items, Pop up controls, Navigators, Control bars


Working with data: Using data models, Using XML, Using Actionscript classes, Data Binding.
Working with data: Using data models, Using XML, Using Actionscript classes, Data Binding.  


# '''Building Advanced Web 2.0 applications 8 Hours'''
# '''Building Advanced Web 2.0 applications 8 Hours'''  


Definition of mash up applications, Mash up Techniques, Building a simple mash up application with AJAX, Remote data communication, strategies for data communication, Simple HTTPServices, URLLoader in Flex, Web Services in Flex, Examples: Building an RSS reader with AJAX, Building an RSS reader with Flex.
Definition of mash up applications, Mash up Techniques, Building a simple mash up application with AJAX, Remote data communication, strategies for data communication, Simple HTTPServices, URLLoader in Flex, Web Services in Flex, Examples: Building an RSS reader with AJAX, Building an RSS reader with Flex.




'''Text Books:'''
'''Text Books:'''  


# Nicholas C Zakas et al: Professional AJAX, Wrox publications, 2006.
# Nicholas C Zakas et al: Professional AJAX, Wrox publications, 2006.  


(Chapters 1 to 4, Chapter 6 pp157-166, Chapter 7 pp191-196)
(Chapters 1 to 4, Chapter 6 pp157-166, Chapter 7 pp191-196)  


# Chafic Kazoun: Programming Flex 2, O’Reilly publications, 2007.
# Chafic Kazoun: Programming Flex 2, O’Reilly publications, 2007.  


(Chapters 1, Chapters 3 to 7, Chapter 12, Chapter 16 pp380-403)
(Chapters 1, Chapters 3 to 7, Chapter 12, Chapter 16 pp380-403)  


# Francis Shanahan: Mashups, Wrox, 2007.
# Francis Shanahan: Mashups, Wrox, 2007.  


(Chapters 1, 6)
(Chapters 1, 6)




'''Reference Books:'''
'''Reference Books:'''  


# Thomas A. Powel: Ajax The Complete reference, McGraw Hill, 2008.
# Thomas A. Powel: Ajax The Complete reference, McGraw Hill, 2008.
Line 2,702: Line 2,703:
# Steven Holzner : Ajax Bible Wiley India , 2007.
# Steven Holzner : Ajax Bible Wiley India , 2007.
# Justin Gehtland et al: A Web 2.0 primer Pragmatic Ajax, SPD Publications, 2006.
# Justin Gehtland et al: A Web 2.0 primer Pragmatic Ajax, SPD Publications, 2006.
# Eric Van derVlist et al: Professional Web 2.0 Programming, Wiley India, 2007.
# Eric Van derVlist et al: Professional Web 2.0 Programming, Wiley India, 2007.  


<center>'''Software Design Laboratory'''</center>  
<center>'''Software Design Laboratory'''</center>




Line 2,716: Line 2,717:
The student has to draw the necessary UML diagrams using any suitable UML Drawing Tool and implement in Java OR C++ OR C# a program to demonstrate the Design Pattern specified by the Examiner.
The student has to draw the necessary UML diagrams using any suitable UML Drawing Tool and implement in Java OR C++ OR C# a program to demonstrate the Design Pattern specified by the Examiner.


'''The Design Pattern is allotted based on lots from the following list:'''
'''The Design Pattern is allotted based on lots from the following list:'''  


# Expert
# Expert
Line 2,726: Line 2,727:
# Proxy
# Proxy
# Façade
# Façade
# Polymorphism
# Polymorphism  


<center>'''.Net Laboratory'''</center>  
<center>'''.Net Laboratory'''</center>




Line 2,775: Line 2,776:


   
   
<center>'''Mini Project'''</center>  
<center>'''Mini Project'''</center>




Line 2,784: Line 2,785:
'''Total Hours: 42Exam Marks: 50'''
'''Total Hours: 42Exam Marks: 50'''


'''NOTES:'''
'''NOTES:'''  


* A team of '''TWO '''students must develop the mini project. However, during the examination, each student must demonstrate the project individually.
* A team of '''TWO '''students must develop the mini project. However, during the examination, each student must demonstrate the project individually.
Line 2,795: Line 2,796:
** Implementation  
** Implementation  
** Testing
** Testing
* The Report must be valuated for 10 marks, Demonstration for 30 marks and Viva for 10 marks. &lt;/center&gt; &lt;/center&gt; </center>
* The Report must be valuated for 10 marks, Demonstration for 30 marks and Viva for 10 marks. &lt;/center&gt; &lt;/center&gt; &lt;/center&gt;  </center>
Anonymous user