+ All Categories
Home > Documents > Proposed Syllabus for MSc. CS Bastar Bv

Proposed Syllabus for MSc. CS Bastar Bv

Date post: 05-Apr-2018
Category:
Upload: ashimsarkar2006
View: 224 times
Download: 1 times
Share this document with a friend

of 91

Transcript
  • 7/31/2019 Proposed Syllabus for MSc. CS Bastar Bv

    1/91

    1 M.Sc. (Computer Science)

    Contents1 First Year Semester-1 ............................................................................................................ 6

    1.1 CS-101: Principles of Programming Languages ............................................................................... 71.2 CS102 - Advanced Networking ..................................................................................................... 121.3 CS-103: Distributed Database Concepts ......................................................................................... 15

    1.4 CS-104: Design and Analysis of Algorithms .................................................................................. 171.5 CS-105- Seminar ............................................................................................................................. 191.6 CS-106: Practical Based on Course-CS-101 ................................................................................... 201.7 CS -107Practical Based on Course: CS-102 ............................................................................... 211.8 CS -108 Practical based on Course CS-103 .................................................................................... 221.9 CS -109Practical Based on Course-CS-104 ................................................................................ 23

    2 First Year Semester-2 .......................................................................................................... 242.1 CS-201: Digital Image Processing .................................................................................................. 252.2 CS-202: Advanced Operating System ............................................................................................ 272.3 CS-203: Data Mining and Data Warehousing ................................................................................ 30 2.4 CS-206: Practical based on course CS-201 ..................................................................................... 322.5 CS-207 : Practical Based on Course CS-202 .................................................................................. 33

    2.6 CS-208: Practical Based on CS 203: ............................................................................................... 343 Second Year Semester-3 .................................................................................................... 363.1 CS301: Software Metrics & Project Management .......................................................................... 373.2 CS-302: MOBILE COMPUTING .................................................................................................. 383.3 CS-303 SOFT COMPUTING ......................................................................................................... 423.4 CS 305 COMPILER DESIGN ........................................................................................................ 43

    Electives....................................................................................................................................... 442. Functional Programming................................................................................................................. 463. Linux Kernel Programming and Introduction to Device Drivers ................................................... 484. Natural Language Processing.......................................................................................................... 505. Program Analysis ............................................................................................................................ 516. DOT NET........................................................................................................................................ 52

    7. Information Systems Security ......................................................................................................... 558. Software Architecture and Design Patterns .................................................................................... 589. Software Testing Tools & Methodologies ...................................................................................... 6010. MODELLING AND SIMULATION ............................................................................................. 6511. EMBEDDED SYSTEM PROGRAMMING .................................................................................. 6612. Language Processors ....................................................................................................................... 6813. Artificial Intelligence ...................................................................................................................... 70

    4 Guide Line of Project (Minor) ................................................................................................. 72PROJECT STRUCTURE ....................................................................................................................... 73

    INTRODUCTION ................................................................................................................................... 73

    OBJECTIVES ......................................................................................................................................... 73

    IMPORTANCE OF THE MINI PROJECT .................................................................................................. 73

    MINI PROJECT: TABLE OF CONTENTS .................................................................................................. 74

    EXPLANATION OF CONTENTS.............................................................................................................. 76

    Key Features Of The Project ................................................................................................................... 81Analysis ............................................................................................................................................... 81

    Design .................................................................................................................................................. 82

    Coding ................................................................................................................................................. 82

  • 7/31/2019 Proposed Syllabus for MSc. CS Bastar Bv

    2/91

    2 M.Sc. (Computer Science)

    Testing ................................................................................................................................................. 82

    STEPS OF THE MINI PROJECT .......................................................................................................... 83Selection of Topic Area ....................................................................................................................... 83

    Project Report Planning ...................................................................................................................... 84

    Project Plan ......................................................................................................................................... 84

    Project Proposal Report ...................................................................................................................... 84

    Project Final Report ............................................................................................................................ 85

    Project Assessment ............................................................................................................................. 85

    GUIDELINES FOR THE PROJECT PROPOSAL ................................................................................ 85Project Proposal .................................................................................................................................. 85

    Front page ........................................................................................................................................... 85

    Structure ............................................................................................................................................. 85

    INTRODUCTION......................................................................................................................... 85

    Problem Definition ...................................................................................................................... 86 Requirements Specification ........................................................................................................ 86

    Planning and Scheduling ............................................................................................................. 86

    Software and Hardware Requirements ...................................................................................... 86

    Preliminary Product Description ................................................................................................. 86

    Conceptual Models. .................................................................................................................... 86

    REFERENCES ................................................................................................................................... 86

    GUIDELINES FOR THE PROJECT REPORT ..................................................................................... 86Project Report Format ........................................................................................................................ 86

    Project Report Layout ......................................................................................................................... 87

    Font size and margin ........................................................................................................................... 87

    Heading ............................................................................................................................................... 87

    Figure and Tables ................................................................................................................................ 89

    Software Requirement Specification ...................................................................................................... 89 External Interfaces of the system: They identify the information which is to flow from and totothe system............................................................................................................................................ 89

    A typical SRS should include following contents: Normally IEEE standard is followed. ..................... 90PROJECT CATEGORIES ......................................................................................................................... 90

    LIST OF APPLICATION AND TOOLS ........................................................................................... 91

  • 7/31/2019 Proposed Syllabus for MSc. CS Bastar Bv

    3/91

    3 M.Sc. (Computer Science)

    BASTAR VISHWAVIDYALAYA JAGDALPUR

    Syllabus for M.Sc. (Computer Science)

    (Academic year 2012-2013)

    Course Structure The entire course is a Two years and Four semester full time course. Forthree semesters there will be four theory courses and Lab courses. The last semester will beproject.

    Assessment Pattern

    M.Sc.(Computer Science)

    Semester 1

    Subject

    CodeSubject Paper

    Theory Marks (A)Sessional

    Marks (B)Teaching Load

    per Week

    Max Min Max Min L T PCS-101 Principles of Programming Languages 100 40 50 30 4 2

    CS-102 Advanced Networking 100 40 50 30 4 3

    CS-103 Distributed Database Concepts 100 40 50 30 4 2

    CS-104 Design and Analysis of Algorithms 100 40 50 30 3 3

    CS-105 Seminar - - 50 30 - - 2

    CS-106 Practical Based on CourseCS-101 50 30 - - - - 4

    CS-107 Practical Based on CourseCS-102 50 30 - - - - 4

    CS-108 Practical Based on CourseCS-103 100 60 - - - - 6

    CS-109 Practical Based on CourseCS-104 50 30 - - - - 4

    Total (Paper+Internal)(650+250)

    900250 15 10 20

  • 7/31/2019 Proposed Syllabus for MSc. CS Bastar Bv

    4/91

    4 M.Sc. (Computer Science)

    Semester 2

    SubjectCode

    Subject PaperTheory Marks (A)

    Sessional

    Marks (B)Teaching Load

    per WeekMax Min Max Min L T P

    CS-201 Digital Image Processing

    100 40 50 30 4 2CS-202 Advanced Operating Systems 100 40 50 30 4 2

    CS-203 Data Mining and Data Warehousing 100 40 50 30 3 3

    CS-204 Elective Course-1 100 40 50 30 3 3

    CS-205 Project (Minor) 50 30 50 30 - - 2

    CS-206 Practical Based on CourseCS-201 50 30 - - - - 4

    CS-207 Practical Based on CourseCS-202 50 30 - - - - 4

    CS-208 Practical Based on CourseCS-203 50 30 - - - - 6

    CS-209 Practical Based on CourseCS-204 50 30 - - - - 4

    Total (Paper+Internal)(650+250)

    900250 14 10 20

    Semester 3

    Subject

    CodeSubject Paper

    Theory Marks (A)Sessional

    Marks (B)Teaching Load

    per WeekMax Min Max Min L T P

    CS-301Software Metrics & ProjectManagement 100 40 50 30 4 2

    CS-302 Mobile Computing 50 40 50 30 4 2

    CS-303 Soft Computing 50 20 50 30 3 3CS-304 Elective Course II 50 20 50 30 3 3

    CS-305 Compiler Design 50 30 50 30 - - 2

    CS-306 Seminar 50 30 - - - - 4

    CS-307 Practical Based on CourseCS-302 100 60 - - - - 4

    CS-308 Practical Based on CourseCS-303 100 60 - - - - 6

    CS-309 Practical Based on CourseCS-304 100 60 - - - - 4

    Total (Paper+Internal)(650+250)

    900250 14 10 20

    Semester 4

    Subject

    CodeSubject Paper

    Theory Marks (A)Sessional

    Marks (B)Teaching Load

    per WeekMax Min Max Min L T P

    CS-401SYSTEM DEVELOPMENT

    PROJECT200 120 100 30 2

  • 7/31/2019 Proposed Syllabus for MSc. CS Bastar Bv

    5/91

    5 M.Sc. (Computer Science)

    Important information regarding the CS-204/CS-304: Elective Course

    Please note that, one elective from the following list to be opted for each of the semesters

    2nd and 3rd (CS-204 in semester two and CS-304 in semester three respectively) accordingto prerequisite conditions (if any).

    List of Elective Courses1. Advanced Algorithms2. Functional Programming3. Linux Kernel Programming and Introduction to Device Drivers4. Natural Language Processing5. Program Analysis6. DOT NET7. Information Systems Security

    8. Software Architecture and Design Patterns9. Software Testing Tools & Methodologies10. Modeling and Simulations11. Embedded System Programming12. Language Processors13. Artificial Intelligence

  • 7/31/2019 Proposed Syllabus for MSc. CS Bastar Bv

    6/91

    6 M.Sc. (Computer Science)

    M.Sc.(Computer Science)

    1 First Year Semester-1

  • 7/31/2019 Proposed Syllabus for MSc. CS Bastar Bv

    7/91

    7 M.Sc. (Computer Science)

    1.1 CS-101: Principles of Programming Languages

    Course Prerequisites:

    It is assumed that student learning this course have the following background:

    Experience with an OOP language (such as Java or C++)Experience with a procedural language (such as C)Working knowledge of C, C++, and Java programming.Basic algorithms and data structure concepts.

    Why to study this course?

    To allow Informed Design DecisionsGives insight when debuggingPermits effective use of compilers/linkers interpreters and language oriented tools.Helps to understand how language features work.Learn features, emulate missing features.Develop a greater understanding of the issues involved in programming language design andimplementationDevelop an in-depth understanding of functional, logic, and object-oriented programmingparadigmsImplement several programs in languages other than the one emphasized in the corecurriculum (Java/C++)Understand design/implementation issues involved with variable allocation and binding,control flow, types, subroutines, parameter passingDevelop thorough understanding of the compilation processTo introduce several different paradigms of programming

    To gain experience with these paradigms by using example programming languagesTo understand concepts of syntax, translation, abstraction, and implementation

    Course Objectives:

    This course will prepare you to think about programming languages analytically:- Separate syntax from semantics- Compare programming language designs- Learn new languages more quickly- Use standard vocabulary when discussing languages- Understand basic language implementation techniques

    This course focuses on both:- Theory is covered by the textbook readings, lectures, and on the tests- Implementation is covered by the homework assignments

  • 7/31/2019 Proposed Syllabus for MSc. CS Bastar Bv

    8/91

    8 M.Sc. (Computer Science)

    Unit-1

    1. Introduction

    The Art of Language DesignThe Programming Language SpectrumWhy Study Programming Languages?

    Compilation and InterpretationProgramming Environments

    2. Non-Imperative Programming Models: Functional, Logic Languages

    Common LISP

    Basic LISP Primitives( FIRST, REST, SETF, CONS, APPEND, LIST,NTHCDR, BUTLAST,LAST,LENGTH, REVERSE, ASSOC)

    Procedure definition and binding, DEFUN, LETPredicates and Conditional,

    EQUAL, EQ, EQL, =, MEMBER, LISTP, ATOM, NUMBERP,SYMBOLP, NIL, NULL, IF, WHEN, UNLESS,COND, CASE

    Procedure Abstraction and Recursion

    Turbo PrologIntroduction, facts, Objects and Predicates, Variables, Using Rules, Controlling execution failand cut predicates

    3. Names, Scopes, and Bindings

    The Notion of Binding Time Object Lifetime and Storage Management : Static Allocation, Stack-Based Allocation, Heap-Based Allocation, Garbage Collection Scope Rules

    o Static Scoping, Nested Subroutines, Declaration Order, Dynamic Scoping The meaning of Names in a Scope

    o Aliases, Overloading, Polymorphism and Related Concepts The Binding of Referencing Environments Subroutine Closures, First-Class Values and Unlimited Extent, Object Closures Macro Expansion

    Unit-24. Control Flow

    Expression Evaluationo Precedence and Associativity, Assignments, Initialization, Ordering Within

    Expressions, Short-Circuit Evaluation

  • 7/31/2019 Proposed Syllabus for MSc. CS Bastar Bv

    9/91

    9 M.Sc. (Computer Science)

    Structured and Unstructured Flowo Structured Alternatives to gotoo Sequencingo Selection

    o Short-Circuited Conditions, Case/Switch Statementso Iterationo Enumeration-Controlled Loops, Combination Loops, Iterators, Logicallyo Controlled Loopso Recursiono Iteration and Recursion, Applicative- and Normal-Order Evaluation

    Unit-3

    5. Data TypesIntroduction

    Primitive Data TypesNumeric TypesIntegerFloating pointComplexDecimalBoolean TypesCharacter TypesCharacter String Types

    Design IssuesStrings and Their Operations

    String Length OperationsEvaluationImplementation of Character String Types

    User defined Ordinal typesEnumeration types

    DesignsEvaluation

    Subrange typesAdas designEvaluation

    Implementation fo used defined ordinal typesArray typesDesign issuesArrays and indices

    Subscript bindings and array categories, Heterogeneous arrays, Array initializationArray operations, Rectangular and Jagged arrays, Slices, Evaluation, Implementation ofArray Types

    Associative ArraysStructure and operations, Implementing associative arrays

  • 7/31/2019 Proposed Syllabus for MSc. CS Bastar Bv

    10/91

    10 M.Sc. (Computer Science)

    Record typesDefinitions of records, References to record fields, Operations on recordsEvaluation, Implementation of Record types

    Union TypesDesign issues, Discriminated versus Free unions, Evaluation

    Implementation of Union typesPointer and Reference TypesDesign issues, Pointer operations,Pointer problems

    Dangling pointers, Lost heap dynamic variablesPointers in C and C++Reference typesEvaluationImplementation of pointer and reference types

    Representation of pointers and referencesSolution to dangling pointer problem

    Heap management6. Subroutines and Control Abstraction.

    Fundamentals of SubprogramsDesign Issues for subprogramsLocal Referencing EnvironmentsParameter-Passing MethodsParameters That are SubprogramsOverloaded SubprogramsGeneric Subroutines

    Generic Functions in C++Generic Methods in Java

    Design Issues for FunctionsUser-Defined Overloaded OperatorsCoroutinesThe General Semantics of Calls and ReturnsImplementing Simple SubprogramsImplementing Subprograms with Stack-Dynamic Local VariablesNested SubprogramsBlocksImplementing Dynamic Scoping

    Unit-4

    7. Data Abstraction and Object Orientation.Object-Oriented ProgrammingEncapsulation and Inheritance

    Modules, Classes, Nesting (Inner Classes), Type Extensions, Extendingwithout Inheritance

    Initialization and Finalization

  • 7/31/2019 Proposed Syllabus for MSc. CS Bastar Bv

    11/91

    11 M.Sc. (Computer Science)

    Choosing a Constructor, References and Values, Execution Order, GarbageCollection

    Dynamic Method BindingVirtual- and Non-Virtual Methods, Abstract Classes, Member Lookup,Polymorphism, Object Closures

    Multiple InheritanceSemantic Ambiguities, Replicated Inheritance, Shared Inheritance,Mix-In Inheritance

    Unit-5

    8. ConcurrencyIntroduction

    Multiprocessor ArchitectureCategories of concurrencyMotivations for studying concurrency

    Introduction to Subprogram-level concurrency

    Fundamental conceptsLanguage Design for concurrency, Design Issues

    SemaphoresIntroductionCooperation synchronizationCompetition SynchronizationEvaluation

    MonitorsIntroductionCooperation synchronizationCompetition SynchronizationEvaluation

    Message PassingIntroductionThe concept of Synchronous Message Passing

    Java ThreadsThe Thread class, PrioritiesCompetition SynchronizationCooperation Synchronization, Evaluation

    Text Books:1.Scott Programming Language Pragmatics, 3e(With CD) ISBN 9788131222560Kaufmann Publishers, An Imprint of Elsevier, USA2. Concepts of Programming Languages, Eighth Edition by Robert W. Sebesta,Pearson Education.3. Introduction to Turbo Prolog by Carl Townsend4. LISP 3rd edition by Patrick Henry Winston & Berthold Klaus Paul Horn (BPB)Additional Reading:Programming Languages: Principles and Paradigms, M. Gabbrielli, S. Martini, Springer,ISBN: 9781848829138

  • 7/31/2019 Proposed Syllabus for MSc. CS Bastar Bv

    12/91

    12 M.Sc. (Computer Science)

    1.2 CS102 - Advanced NetworkingUnit-1

    1. Review of Basic ConceptsTCP/IP Protocol SuiteUnderlying Technologies : LAN (802.3)

    Wireless Lans (802.11)Point-to-point WANSSwitched WANS

    2. The Internet Layer ProtocolsReview of IPv4 ProtocolIPv6Transition from IPv4 to IPv6ICMPv4ICMPv6

    3. Routing ProtocolsForwarding

    Structure of a RouterRouting TablesIntraAnd Inter-Domain RoutingDistance Vector RoutingRIPOSPFBGPMulticast Routing

    Unit-2

    4. The Transport LayerThe Transport Service

    Elements of Transport ProtocolsUDPTCP

    5. MultimediaDigitizing Audio and VideoStreaming stored Audio / VideoStreaming Live Audio / VideoReal-Time Interactive Audio / VideoRTPRTCPVoice Over IP

    Unit-36. Introduction To Security

    The need for SecuritySecurity ApproachesPrinciples of SecurityTypes of Attacks

    7. Cryptography: Concepts and TechniquesIntroduction

  • 7/31/2019 Proposed Syllabus for MSc. CS Bastar Bv

    13/91

    13 M.Sc. (Computer Science)

    Plain Text and Cipher TextSubstitution TechniquesTransposition TechniquesSymmetric and Asymmetric keycryptography

    Unit-48. Symmetric Key AlgorithmsAlgorithms types and modesDES

    9. Asymmetric key AlgorithmsRSASymmetric and Asymmetric key CryptographyDigital Signatures

    10. Digital CertificatesIntroductionDigital Certificates

    Unit-511. Internet Security ProtocolsSecure Socket LayerTLSSHTTPTSPSETSSL Verses SET3-D Secure ProtocolElectronic MoneyEmail SecurityFirewallsIP SecurityVPN

    12. User AuthenticationPasswordsCertificate-based AuthenticationKerberosSecurity Handshake Pitfalls

    Text Books:TCP / IP Protocol Suite Fourth EditionBehrouz A. Forouzan

    Computer Networks Fourth EditionAndrew Tanenbaum

    Cryptography and Network Security Second EditionAtul KahateSupplementary but very useful references/texts: (Few of the references below contain latestresearch and trends related to Networks and Security and are useful for seminar/presentations bythe students.)1. Computer Network Security, Kizza, Springer, 97803872047342. Guide to Computer Network Security, Kizza, Springer, 978-1-84800-916-53. Network Security, Harrington, Elsevier, ISBN 97881312021664. Douglas E. Comer, Internetworking with TCP/IP, Vol. 1, Principles, Protocols

  • 7/31/2019 Proposed Syllabus for MSc. CS Bastar Bv

    14/91

    14 M.Sc. (Computer Science)

    and Architecture Fifth Edition, Prentice Hall, 2000, ISBN 0-13-018380-6.5. William Stallings, Data and Computer Communications , Seventh Edition,Pearson Education6. Douglas E. Comer, Internetworking with TCP/IP, Vol. 2, Design, Implementationand Internals, Prentice Hall Publisher.

    7. Internetworking with TCP/IP, Vol. 3, Client-server Programming andApplications by Douglas E. Comer, Prentice Hall Publisher. (Excellent referencefor distributed programming over TCP/IP networks)8. Richard Stevens, TCP/IP Illustrated, Vol. 1, by, Addison Wesley (A very practicalbook with lots of useful network diagnostic tools and programs.)9. Craig Hunt, TCP/IP Network Administration OReilly & Associates, Inc. (A mustfor network and system administrators dealing with internetworking.)10. L. Peterson and B. Davie. Morgan , Computer Networks: A Systems Approach byKaufmann Publishers Inc., ISBN 978813121045111. J. Kurose, K. Ross ``Computer Networking: A Top-Down Approach Featuring theInternet'' Addison-Wesley, '00

    12. William Stallings," Cryptography And Network Security Prentice Hall /PearsonEducationGuidelines to paper setters:Frame formats of protocols are not expectedProblems should be asked on Routing Protocols , TCP, Cryptography, RSA

  • 7/31/2019 Proposed Syllabus for MSc. CS Bastar Bv

    15/91

    15 M.Sc. (Computer Science)

    1.3 CS-103: Distributed Database ConceptsPre-requisites: Students should be well-versed with the basic and advanced concepts ofRDBMSObjectives:Main objective is to understand the principles and foundations of distributed databases. This

    course addresses architecture, design issues, integrity control, query processing and optimization,transactions, and concurrency control & distributed transaction reliability.

    Unit-1

    Distributed databases: An overviewFeatures of distributed Vs centralized databasesWhy DDB? DDBMSPromises / problem areas in implementing a DDBDDBMS ArchitectureDBMS StandardizationArchitectural models for DDBMSDDBMS architecture

    Distributed catalog managementUnit-2

    Distributed database designAlternative design strategiesDistributed design issuesConcepts of join graphsFragmentation and allocationOverview of Query processing

    Query processing problems Objectives of query processingComplexity of relational algebra operatorsCharacterization of query processorsLayers of query processing

    Unit-3Query decomposition & data localization

    Query decomposition Optimization of distributed queriesQuery optimization

    Centralized query optimization Join ordering in fragment queries. Distributed query

    optimization algorithmsCentralized query optimizationJoin ordering in fragment queriesDistributed query optimization algorithms

    Unit-4

    Management of distributed transactionsFramework for transaction managementSupporting atomicity of distributed transactionsConcurrency control of distributed transactionsArchitectural aspects of distributed transactions

  • 7/31/2019 Proposed Syllabus for MSc. CS Bastar Bv

    16/91

    16 M.Sc. (Computer Science)

    Concurrency controlFoundations of distributed concurrency controlDistributed deadlocksConcurrency control based on timestampsOptimistic methods for distributed concurrency control

    Unit-5

    Distributed DBMS reliabilityReliability concepts & measuresFailures in DDBMSLocal reliability protocolsDistributed reliability protocolsDealing with site failuresNetwork partitioning

    Reference Books:

    1. Principles of Distributed Database Systems; 2nd Edition By M. Tamer Ozsu and PatrickValduriez Publishers: Pearson Education Asia ISBN: 81-7808-375-22. Distributed Database; Principles & Systems By Stefano Ceri and Giuseppo PelagattiPublications: McGraw-Hill International Editions ISBN: 0-07-010829-33. Database systems (2nd edition) By Raghuramakrishnan and Johannes

  • 7/31/2019 Proposed Syllabus for MSc. CS Bastar Bv

    17/91

    17 M.Sc. (Computer Science)

    1.4 CS-104: Design and Analysis of AlgorithmsPrerequisites

    Basic algorithms and data structure concepts.Basic programming conceptsObjectives

    This course will prepare students inBasic Algorithm Analysis techniques and understand the use o asymptotic notationUnderstand different design strategiesUnderstand the use of data structures in improving algorithm performanceUnderstand classical problem and solutionsLearn a variety of useful algorithmsUnderstand classification o problems

    Unit-1

    AnalysisAlgorithm definition, space complexity, time complexity, worst casebest caseaverage casecomplexity, asymptotic notation, sorting algorithms (insertion sort, heap sort) , sorting in lineartime, searching algorithms, recursive algorithms ( Tower of Hanoi , Permutations).

    Unit-2

    Design strategiesDivide and conquer-control abstraction, binary search, merge sort, Quick sort, Strassens matrixmultiplicationGreedy method- knapsack problem, job sequencing with deadlines,Minimum-cost spanning trees, Kruskal and Prims algorithm, optimal storage on tapes, optimalmerge patterns, Huffman coding

    Unit-3

    Dynamic programming- matrix chain multiplication, . single source shortest paths, Dijkstrasalgorithm, Bellman- ford algorithm , all pairs shortest path, longest common subsequence, stringediting, 0/1 knapsack problem, Traveling salesperson problem.

    Unit-4

    Decrease and conquer: - DFS and BFS, Topological sorting, connected componentsBacktracking: General method, 8 Queens problem, Sum of subsets problem, graph coloringproblem, Hamiltonian cycle

    Unit-5

    Branch and Bound Technique : FIFO, LIFO, LCBB, TSP problem, 0/1 knapsack problemTransform and conquer:- Horners Rule and Binary Exponentiation Problem ReductionProblem classificationNondeterministic algorithm, The class of P, NP, NP-hard and NP- Complete problems,significance of Cooks theorem

  • 7/31/2019 Proposed Syllabus for MSc. CS Bastar Bv

    18/91

    18 M.Sc. (Computer Science)

    Text BooksEllis Horowitz, Sartaj Sahni & Sanguthevar Rajasekaran, Computer Algorithms, Galgotia.T. Cormen, C. Leiserson, & R. Rivest, Algorithms, MIT Press, 1990 1

    References Texts

    1) A. Aho, J. Hopcroft, & J. Ullman, The Design and Analysis of Computer Algorithms,Addison Wesley, 19742) Donald Knuth, The Art of Computer Programming (3 vols., various editions, 1973-81),Addison Wesley3) The Algorithm Manual, Steven Skiena, Springer ISBN:97881848986514) Graphs, Networks and Algorithms, Jungnickel, Springer, ISBN: 3540219056

  • 7/31/2019 Proposed Syllabus for MSc. CS Bastar Bv

    19/91

    19 M.Sc. (Computer Science)

    1.5 CS-105- Seminar

    Suggested List of Seminar Topics:

    Wireless Security

    Wi-Fi and WIMAX

    Digital Certificates and Digital Signatures

    Mobile Security

    Public Key Infrastructure

  • 7/31/2019 Proposed Syllabus for MSc. CS Bastar Bv

    20/91

    20 M.Sc. (Computer Science)

    1.6 CS-106: Practical Based on Course-CS-101Principal of Programming Language

    LISP

    Sample Set:

    1. Define a LISP function to compute sum of squares.

    2. Define a LISP function to compute difference of squares. (if x > y return x 2-y2, otherwise y2-

    x2)

    3. Define a Recursive LISP function to solve Ackermanns Function.

    4. Define a Recursive LISP function to compute factorial of a given number.

    5. Define a Recursive LISP function which takes one argument as a list and returns last element

    of the list. (do not use last predicate)

    6. Define a Recursive LISP function which takes one argument as a list and returns a list exceptlast element of the list. (do not use butlast predicate)

    7. Define a Recursive LISP function which takes one argument as a list and returns reverse of

    the list. (do not use reverse predicate)

    8. Define a Recursive LISP function which takes two arguments first, an atom, second, a list,

    returns a list after removing first occurrence of that atom within the list.

    9. Define a Recursive LISP function which appends two lists together.

    10. Define a recursive LISP function which takes 2 lists as arguments and returns a list

    containing alternate elements from each list.

    e.g. if L1=(1 5 7) and L2=(2 4 9 3) output should be (1 2 5 4 7 9 3)

    Prolog:

    Sample Set of:

    1. Prolog programs doing formal reasoning and resolutions proofs.

    e.g. Consider the following statements: John likes all kinds of food. Apples are food.

    Chicken is food. Anything anyone eats, and is still alive, means whatever he ate was a food.

    Sue eats everything Bill eats. Bill eats Peanuts and is still alive. Write a Prolog program to

    prove that John likes Peanuts, and to answer the question What food does Sue eat?

    2. Simple Prolog programs using facts, rules, built-in I/O predicates, fail, recursion with or

    without repeat predicate, and cut predicate.

  • 7/31/2019 Proposed Syllabus for MSc. CS Bastar Bv

    21/91

    21 M.Sc. (Computer Science)

    1.7 CS -107Practical Based on Course: CS-102Suggested List

    1.Write a C prog that contains a string (char pointer) with a value Hello World .The program

    should XOR each character in this string with 0 & display the result. Repeat the exercise by an

    XOR operation with 1.

    2. Study phishing in more detail. Find out which popular bank sites have been phished and how .

    3. Think about offering phishing prevention techniques. Which ones of them would be most

    effective and why ?

    4. Encrypt the following message by using ___________ technique. Key is _____.

    5. Write C/Java program to implement DES algorithm logic.

    6. Write C/Java program that generate the message digest of a given number.

    7. Write a Java prog , which accepts the details of a base-64 encoded digital certificate, parses itand displays its main contents such as issuer name, serial number, subject name , valid from and

    valid to.

    8. Write a C program to perform Base-64 encoding on a 24 bit input.

    9. SSL talks about security at the transport layer. What if we want to enforce security at the

    lower layers

    10. Investigate how to use SSL in Java & .Net. Write an SSL client and server in these

    technologies.

    11. Implement Kerberos.

    . Download &Study at least one free real life firewall product.

    13.Study how VPN is implemented.

  • 7/31/2019 Proposed Syllabus for MSc. CS Bastar Bv

    22/91

    22 M.Sc. (Computer Science)

    1.8 CS -108 Practical based on Course CS-103Suggested Topic-

    1. Problems on Fragmentation: Small case studies, where each case specifies the database

    schema, the workload for the database is given. Based on this info, the fragmentation has to

    be done ( horizontal or vertical)

    2. Problems on deriving & classifying the join graphs, given the relation fragments, of a

    database

    3. Problems on query optimization ( Exrecise problems given in reference book , Database

    systems By Raghuramakrishnan ( the 3rd reference book given in the syllabus)

    4. Problems on concurrency control algorithms (similar to the problems given in exercises of

    reference book 1 & 2)

  • 7/31/2019 Proposed Syllabus for MSc. CS Bastar Bv

    23/91

    23 M.Sc. (Computer Science)

    1.9 CS -109Practical Based on Course-CS-104

    1. Problem Assignments

    A set of problems from the exercises of Text Book can be given as problem solving assignments

    2. Programming AssignmentImplementing a set of algorithms And comparing their performance on an input set.

  • 7/31/2019 Proposed Syllabus for MSc. CS Bastar Bv

    24/91

    24 M.Sc. (Computer Science)

    M.Sc. (Computer Science)

    2

    First Year Semester-2

  • 7/31/2019 Proposed Syllabus for MSc. CS Bastar Bv

    25/91

    25 M.Sc. (Computer Science)

    2.1 CS-201: Digital Image ProcessingUnit-1

    Introduction

    Definition of Digital Image Processing, The Origins of Digital Image Processing, Examples ofFields that Use Digital Image Processing - X-ray Imaging, Ultraviolet Band, Visible and InfraredBands, Microwave Band, and Radio Band Imaging; Fundamental Steps in Digital ImageProcessing, Components of an Image Processing System,

    Digital Image FundamentalsElements of Visual Perception, Light and the Electromagnetic Spectrum, Image Sensing andAcquisition - Single Sensor, Sensor Strips, Sensor Arrays, A Simple Image Formation Model;Image Sampling and Quantization - Spatial and Gray-Level Resolution, Aliasing and MoirPatterns, Zooming and Shrinking Digital Images; Some Basic Relationships Between Pixels -Neighbors, Adjacency, Connectivity, Regions, and Boundaries, Distance Measures, Image

    Operations on a Pixel Basis; Linear and Nonlinear OperationsUnit-2

    Image Enhancement in the Spatial DomainSome Basic Gray Level Transformations - Negatives, Log, Power-Law, Piecewise-LinearTransformations; Histogram Processing - Histogram Equalization, Histogram Matching(Specification), Local Enhancement; Enhancement Using Arithmetic/Logic Operations - ImageSubtraction, Image Averaging; Basics of Spatial Filtering, Smoothing Spatial Filters - SmoothingLinear and Order-Statistics Filters; Sharpening Spatial Filters - Use of Second Derivatives forEnhancement : The Laplacian, Use of First Derivatives for Enhancement: The Gradient;Combining Spatial Enhancement Methods

    Image Enhancement in the Frequency DomainIntroduction to the Fourier Transform and the Frequency Domain - One-Dimensional FourierTransform and its Inverse, Two-Dimensional DFT and Its Inverse, Filtering in the FrequencyDomain, Correspondence between Filtering in the Spatial and Frequency Domains; Smoothingand Frequency-Domain Filters - Ideal , Butterworth, and Gaussian Lowpass Filters; SharpeningFrequency Domain Filters - Ideal , Butterworth, and Gaussian Highass Filters, Laplacian in theFrequency Domain, Unsharp Masking, High-Boost Filtering, and High-Frequency EmphasisFiltering; Homomorphic Filtering Implementation - Some Additional Properties of the 2-DFourier Transform, Computing the Inverse Fourier Transform Using a Forward TransformAlgorithm, More on Periodicity: the Need for Padding, The Convolution and CorrelationTheorems, Summary of Properties of the 2-D Fourier Transform, The Fast Fourier Transform;

    Unit-3Image RestorationA Model of the Image Degradation/Restoration Process, Noise Models, Restoration in thePresence of Noise OnlySpatial Filtering - Mean, Order-Statistics, and Adaptive Filters Filters;Periodic Noise Reduction by Frequency Domain Filtering - Bandreject, Bandpass, and NotchFilters Filters; Estimating the Degradation Function - Estimation by Image Observation,Experimentation and Modeling; Inverse Filtering, Minimum Mean Square Error (Wiener)Filtering, Geometric Mean

  • 7/31/2019 Proposed Syllabus for MSc. CS Bastar Bv

    26/91

    26 M.Sc. (Computer Science)

    Filter - Geometric Transformations, Spatial Transformations, Gray-Level Interpolation

    Unit-4

    Color Image ProcessingColor Fundamentals, Color Models - RGB, CMY, HSI; Pseudocolor Image Processing

    Intensity Slicing, Gray Level to Color Transformations; Basics of Full-Color Image Processing,ColorTransformations - Formulation, Color Complements, Color Slicing, Tone and Color Corrections,Histogram Processing; Smoothing and Sharpening, Color Segmentation, Color Edge Detection,Noise in Color Images

    Morphological Image ProcessingSome Basic Concepts from Set Theory, Logic Operations Involving Binary Images, Dilation andErosion, Opening and Closing, The Hit-or-Miss Transformation, Some Basic MorphologicalAlgorithms - Boundary Extraction, Region Filling, Extraction of Connected Components,Convex Hull, Thinning, Thickening; Extensions to Gray-Scale Images

    Unit-5Image SegmentationDetection of Discontinuities - Point Detection, Line Detection, Edge Detection, Edge Linkingand Boundary Detection - Local Processing, Global Processing via the Hough Transform,Thresholding- The Role of Illumination, Basic Global Thresholding, Basic Adaptive Thresholding, OptimalGlobal and Adaptive Thresholding, Use of Boundary Characteristics for Histogram Improvementand Local Thresholding, Thresholds Based on Several Variables, Region-Based Segmentation -Region Growing, Region Splitting and Merging,

    Representation and DescriptionChain Codes, Polygonal Approximations, Signatures, Boundary Segments, Skeletons, SimpleBoundary Descriptors, Shape Numbers, Fourier Descriptors, Statistical Moments, SimpleRegional Descriptors, Topological Descriptors, Texture, Moments of Two-DimensionalFunctions Use of Principal Components for Description, Relational Descriptors

    Text Book:1. Gonzalez, R. C. and Woods, R. E. [2002/2008], Digital Image Processing, 2nd/3rd ed.,Prentice HallReference Books:1. Sonka, M., Hlavac, V., Boyle, R. [1999]. Image Processing, Analysis and Machine Vision (2 nd edition), PWS Publishing, or (3rd edition) Thompson Engineering, 20072. Gonzalez, R. C., Woods, R. E., and Eddins, S. L. [2009]. Digital Image Processing UsingMATLAB, 2nd ed., Gatesmark Publishing, Knoxville, TN.3. Anil K. Jain [2001], Fundamentals of digital image processing (2nd Edition), Prentice-Hall,NJ4. Willian K. Pratt [2001], Digital Image Processing (3rd Edition), , John Wiley & Sons, NY5. Burger, Willhelm and Burge, Mark J. [2008]. Digital Image Processing: An AlgorithmicIntroduction Using Java, Springer6. Digital Image Analysis (With CD-ROM), Kropatsch, Springer, ISBN 978038795066

  • 7/31/2019 Proposed Syllabus for MSc. CS Bastar Bv

    27/91

    27 M.Sc. (Computer Science)

    7. Digital Image Processing, 6e (With CD), Jhne, Springer, ISBN:978-3-540-24035-8 2

    2.2 CS-202: Advanced Operating SystemPrerequisites:

    Working knowledge of C programming. Working knowledge of NASM/GAS assembler for 80x86 (32 and 64 bit) instruction Set Basic Computer Architecture concepts. Basic algorithms and data structure concepts.

    Course Objectives:This course teaches Advanced Operating Systems Concepts using Unix/Linux and Windows asrepresentative examples. This course strikes a delicate balance between theory and practicalapplications In fact, most chapters start with the theory and then switches focus on how theconcepts in a C program. This course describes the programming interface to the Unix/Linuxsystem - the system call interface. It is intended for anyone writing programs that run under

    Unix/Linux. Finally, it concludes with an overview of Windows Internals. This course providesan understanding of the functions of Operating Systems. It also provides provide an insight intofunctional modules of Operating Systems. It discusses the concepts underlying in the design andimplementation of Operating Systems. This course also gives implementation details at lowerlevel using Assembly language Programming by creating some interest in system call design.

    Syllabus:Unit-1

    1. Introduction to UNIX/Linux Kernel

    System Structure, User Perspective, Assumptions about Hardware, Architecture ofUNIX Operating System. Concepts of Linux Programming, Getting Started with System Programming. Introduction to the tools on Linux, NASM

    2. File and Directory I/O

    inodes, structure of regular file, open, read, write, lseek, close, pipes, dup open, creat, close, lseek, read, write, file sharing, atomic operations, dup and dup2,

    fcntl, ioctl, /dev/fd, stat, fstat, lstat, file types, Set-User-ID and Set-Group-ID, fileaccess permissions, ownership of new files and directories, access function, umaskfunction, chmod and fchmod, sticky bit, chown, fchown, and lchown, file size, filetruncation, file systems, link, unlink, remove, and rename functions, symbolic links,

    symlink and readlink functions, file times, utime, mkdir and rmdir, readingdirectories, chdir, fchdir, and getcwd, device special files.

    Scatter/Gather I/O, The Event Poll Interface, Mapping Files into Memory, Advice forNormal File I/O, Synchronized, Synchronous, and Asynchronous Operations, I/OSchedulers and I/O Performance, Files and their Metadata, Directories, Links, Copyingand Moving files, Device Nodes, Out-of-Band Communication, Monitoring File Events.

  • 7/31/2019 Proposed Syllabus for MSc. CS Bastar Bv

    28/91

    28 M.Sc. (Computer Science)

    Unit-2

    3. Process Environment, Process Control and Process Relationships

    Process states and transitions, the context of a process, saving the context of aprocess, sleep, process creation, signals, process termination, awaiting process

    termination, invoking other programs, the user id of a process Process termination, environment list, memory layout of a C program, shared

    libraries, memory allocation, environment variables, setjmp and longjmp, getrlimitand setrlimit, process identifiers, fork, vfork, exit, wait and waitpid, waitid, wait3 andwait4, race conditions, exec, changing user IDs and group IDs, interpreter files,system function, process accounting, user identification, process times, Terminallogins, network logins, process groups, sessions, controlling terminal, tcgetpgrp,tcsetpgrp, and tcgetsid functions, job control, shell execution of programs, orphanedprocess groups.

    The Process ID, Running a New Process, Terminating a Process, Waiting for TerminatedChild Processes, Users and Groups, Sessions and Process Groups, Daemons, Process

    Scheduling, Yielding the Processor, Process Priorities, Processor Affinity .Unit-3

    4. Memory ManagementThe Process Address Space, Allocating Dynamic Memory, Managing Data Segment,Anonymous Memory Mappings, Advanced Memory Allocation, Debugging MemoryAllocations, Stack-Based Allocations, Choosing a Memory Allocation Mechanism,Manipulating Memory, Locking Memory, Opportunistic Allocation.

    Unit-4

    5. Signal Handling

    Signal concepts, signal function, unreliable signals, interrupted system calls, reentrantfunctions, SIGCLD semantics, reliable-signal technology, kill and raise, alarm andpause, signal sets, sigprocmask, sigpending, sigaction, sigsetjmp and siglongjmp,sigsuspend, abort, system function revisited, sleep, job-control signals.

    Signal Concepts, Basic Signal Management, Sending a Signal, Reentrancy, SignalSets, Blocking Signals, Advanced Signal Management, Sending a Signal with aPayload.

    Unit-5

    6. Windows Internals

    Foundation Concepts, utilities and Terms

    Services, Functions, and Terms, Processes, Threads, and Jobs, Virtual Memory, KernelMode vs. User Mode Introduction to the Sysinternals Troubleshooting Utilities (File and Disk, Process,

    Security, System Information and Miscellaneous Utilities) System Architecture Requirements and Design Goals, OS Model, Architecture Overview

    (Portability, Symmetric Multiprocessing) Process Internals

  • 7/31/2019 Proposed Syllabus for MSc. CS Bastar Bv

    29/91

    29 M.Sc. (Computer Science)

    Data Structures, Kernel variables, Performance Counters, Relevant Functions Protected Processes Flow ofCreateProcess Stage 1 through Stage 7, New Process Thread Internals

    Data Structures, Kernel Variables, Performance Counters, Relevant Functions, Birth of aThread

    Examining Thread Activity Limitations on Protected Process Threads Worker Factories (Thread Pools) Thread Scheduling Overview of Windows Scheduling, Priority Levels, Windows Scheduling APIs, Relevant

    Tools, Real-Time Priorities, Thread States, Dispatcher Database, Quantum, SchedulingScenarios, Context Switching, Idle Thread,Priority Boosts

    Job Objects

    Recommended Text:1. Linux System Programming, OReilly, by Robert Love.

    2. Windows Internals, Microsoft Press, by Mark E. Russinovich and David A. Soloman.3. The Design of the UNIX Operating System, PHI, by Maurice J. Bach.4. Advanced Programming in the UNIX Environment, Addison-Wesley, by Richard Stevens.5. Guide to Assembly Language Programming in Linux, Sivarama P. Dandamudi, Springer6. Professional Assembly Language, Richard Blum, Wrox, Wiley India

  • 7/31/2019 Proposed Syllabus for MSc. CS Bastar Bv

    30/91

    30 M.Sc. (Computer Science)

    2.3 CS-203: Data Mining and Data WarehousingUnit-1

    Introduction to Data Mining

    Basic Data Mining TasksDM versus Knowledge Discovery in DatabasesData Mining IssuesData Mining MetricsSocial Implications of Data MiningOverview of Applications of Data Mining

    Introduction to Data Warehousing

    Architecture of DWOLAP and Data CubesDimensional Data Modeling-star, snowflake schemasData PreprocessingNeed, Data Cleaning, Data Integration & Transformation, Data

    ReductionMachine LearningPattern Matching

    Unit-2Data Mining Techniques

    Frequent item-sets and Association rule mining: Apriori algorithm,Use of sampling for frequent item-set, FP tree algorithmGraph Mining: Frequent sub-graph mining, Tree mining, Sequence Mining

    Unit-3

    Classification & Prediction

    Decision tree learning:Construction, performance, attribute selectionIssues: Over-fitting, tree pruning methods, missing values,continuous classesClassification and Regression Trees (CART)Bayesian Classification:

    Bayes Theorem, Nave Bayes classifier,Bayesian NetworksInference

    Parameter and structure learningLinear classifiersLeast squares, logistic, perceptron and SVM classifiers

    PredictionLinear regressionNon-linear regression

    Unit-45 Accuracy MeasuresPrecision, recall, F-measure, confusion matrix, cross-validation, bootstrap

  • 7/31/2019 Proposed Syllabus for MSc. CS Bastar Bv

    31/91

    31 M.Sc. (Computer Science)

    6. Software for data mining and applications of data miningR, Weka, Sample applications of data mining

    7. Clusteringk-means

    Expectation Maximization (EM) algorithmHierarchical clustering, Correlation clustering

    Unit-58. Brief overview of advanced techniquesActive learningReinforcement learningText miningGraphical modelsWeb Mining

    Reference Books:

    1. Data Mining: Concepts and Techniques, Han, Elsevier ISBN:9789380931913/97881312053582. Margaret H. Dunham, S. Sridhar, Data MiningIntroductory and Advanced Topics, PearsonEducation

    3. Tom Mitchell, Machine Learning, McGraw-Hill, 1997

    4. R.O. Duda, P.E. Hart, D.G. Stork. Pattern Classification. Second edition. John Wiley andSons, 2000.

    5. Christopher M. Bishop, Pattern Recognition and Machine Learning, Springer 2006

    6. Raghu Ramkrishnan, Johannes Gehrke, Database Management Sysstems, Second Edition,McGraw Hill International

    7. Ian H.Witten, Eibe Frank Data Mining: Practical Machine Learning Tools and Techniques,Elsevier/(Morgan Kauffman), ISBN:97893805018648. [Research-Papers]: Some of the relevant research papers that contain recent results anddevelopments in data mining field

  • 7/31/2019 Proposed Syllabus for MSc. CS Bastar Bv

    32/91

    32 M.Sc. (Computer Science)

    2.4 CS-206: Practical based on course CS-201Image Processing

    Fundamentals and Coding Practice1. Design 128, 64, 32, 16, 8 and 4-level uniform quantizers and quantize the gray-level image,lena.pgm. Compare the results by these six different quantizers. Explain the artifacts (e.g., the

    visibility of undesirable contours).2. Divide the image lena.pgm into blocks and each block has the size 4 x 4 pixels. Replace eachblock by the intensity of the (2,2) pixel within the block. The new image will be 1/4th the sizein both dimensions. Display the down-sampled imageSpatial Transforms and Filtering3. Apply power law transformation to the city.pgm image taking different values for gamma

    ( = 3, = 4, and = 5).4. Compute and plot (show the image and its histogram) the histogram oflena.pgm and city.pgm.Comment on what information can be discerned about the images from an examination of thehistogram.5. Apply histogram equalization to the input images lcgrain.pgm and darkgrain.pgm; submityour code and the output images.6. Reduce the salt-and-pepper noise in the circuit.pgm image; submit your code and the outputimage.Filtering in Frequency Domain and Image Restoration7. Remove the noise from the input images circuit1.pgm, circuit2.pgm, circuit3.pgm, andmoon.pgm . Submit your code and the output images.8. Restore the original images from the inputs degrade1.pgm, degrade2.pgm and degrade3.pgm.Morphological Image Processing9. Remove the noise from the input image mimage.pgm. Submit your code and the output image.10. Extract the gradient parts from the input image brain.pgm. Perform edge detection.Segmentation and Object recognition

    11. Extract the rice objects from the input image rice.pgm.12. Separate the two types of blobs in the input image twoblobs.pgm.13. Develop an imaging application to detect and count human faces in an image.14. Develop an imaging application to detect and count text lines and number of words in ascanned document.NOTE:a) The submitted answer to the assignments should be a maximum of 2 pages plus the relevantfigures.b) All programming should be done using C/C++/Java/OpenCV/MATLAB.c) A copy of your complete program must be attached to your submitted answer as an appendix.

  • 7/31/2019 Proposed Syllabus for MSc. CS Bastar Bv

    33/91

    33 M.Sc. (Computer Science)

    2.5 CS-207 : Practical Based on Course CS-202

    1. Write your own dup2 function that performs the same service as the dup2 system call

    without calling the fcntl function. Be sure to handle errors correctly.

    2. Write a utility like cp(1) that copies a file containing holes, without writing the bytes of 0 tothe output file.

    3. Write a C program that creates azombie, and then call system to execute the ps(1) command

    to verify that the process is azombie.

    4. Implement your own sig2str function.

    5. Write a C program that creates a file and writes the integer 0 to the file. The process then

    creates a child, and the Parent and Child alternate incrementing the counter in the file. Each

    time the counter is incremented, print which process (Parent or Child) is doing theincrement.

    6. Write a C program that calls fork and has the child create a new session. Verify that the child

    becomes a process group leader and that the child no longer has a controlling terminal.

    7. Write a C function which handles all possible signals. The function should consist of a single

    loop that iterates once for every signal in the current signal mask (not once for every possible

    signal).

    8. Write a C program that calls sleep (60) in an infinite loop. Every five times through the loop

    (every 5 minutes), fetch the current time of day and print the tm_sec field.

    9. Write a C program that calls fwrite with a large buffer (a few hundred megabytes). Before

    calling fwrite, call alarm to schedule a signal in 1 second. In your signal handler, print that

    the signal was caught and return.

    10. Any one assignment on windows internals (Compulsory) (Please note that you are not

    expected to write sdk program related to windows programming).

    11. Write as many programs in Assembly as you can for getting familiar with Assembly

    Programming, binutils(tool chain for system programmers), OS services on Linux, Theseprograms should make use of system calls related to memory management, process

    management, file management etc) (Minimum 5 programs Compulsory)

    12. Understanding how the utilities of Sys-internals suit are useful for system programmer point

    of view.

  • 7/31/2019 Proposed Syllabus for MSc. CS Bastar Bv

    34/91

    34 M.Sc. (Computer Science)

    2.6 CS-208: Practical Based on CS 203:Practical 1: Using the WEKA WorkbenchA. Become familiar with the use of the WEKA workbench to invoke several

    different machine learning schemes. Use latest stable version. Use both the graphicalinterface (Explorer) and command line interface (CLI). See Weka home page for Wekadocumentation.B. Use the following learning schemes, with the default settings to analyze the weather data (inweather.arff). For test options, first choose "Use training set", then choose "Percentage Split"using default 66% percentage split. Report model percent error rate.ZeroR (majority class)OneRNaive Bayes SimpleJ4.8C. Which of these classifiers are you more likely to trust when determining whether to play?

    Why?D. What can you say about accuracy when using training set data and when using a separatepercentage to train?Practical 2: Basic classification and usage of wekaBecome familiar with the use of the WEKA workbench to invoke several different machinelearning schemes.Use latest stable version. Use both the graphical interface (Explorer) and command lineinterface (CLI).Use the following learning schemes, with the default settings to analyze the weather data (inweather.arff). For test options, first choose "Use training set", then choose "Percentage Split"using default 66% percentage split. Report model percent error rate.

    - ZeroR (majority class)- OneR- Naive Bayes Simple- J4.8Which of these classifiers are you more likely to trust when determining whether to play?Why?What can you say about accuracy when using training set data and when using a separatepercentage to train?Practical 3: ClassificationIBuild different classification models using different classification algorithms (such as decisiontree, naive bayes, bayesian networks) for the IRIS dataset that comes with weka / R.. Compare

    the accuracy (precision, recall, F1 measure) of these different classification algorithms.Practical 4: ClassificationIIFor this assignment, you will use the "Iris" data-set from UCI Machine Learning Repository.This data-set considers three classes of flowers : Iris Setosa, Iris Versicolour, Iris Virginica andhas 50 samples from each flower (so a total of 150 samples). For each sample, it records 4features: sepal length in cm; sepal width in cm; petal length in cm; petal width in cmTask:

  • 7/31/2019 Proposed Syllabus for MSc. CS Bastar Bv

    35/91

    35 M.Sc. (Computer Science)

    1. Divide the data into 2 parts : part I containing a random set of 30 samples, and the rest intopart II.2. Use part I to get prior probabilities of each class.3. First you will use only the first feature to classify the flowers into these 3 classes. Assume thatthe class conditional distribution of "sepal length" is Gaussian for each of the 3 classes.

    Estimate the parameters of the three distributions using maximum likelihood estimation. Usedata in part II.4. Using the parameters obtained above, classify the data in part II. Report on the number oferrors.5. Now use all four features in Step 3 above : assume that the class conditional distribution is a 4-dimensional Gaussian. Repeat Step 4.Practical 5: RegressionBuild a linear regression model for the housing dataset from UCI Machine learning repositoryto reduce the dimensionality of data. Which are the features selected in this reduced dataset?Build a linear regression with the reduced dataset? Compare the two models built.

  • 7/31/2019 Proposed Syllabus for MSc. CS Bastar Bv

    36/91

    36 M.Sc. (Computer Science)

    M.Sc. (Computer Science)

    3 Second Year

    Semester-3

  • 7/31/2019 Proposed Syllabus for MSc. CS Bastar Bv

    37/91

    37 M.Sc. (Computer Science)

    3.1 CS301: Software Metrics & Project Management

    1. What is Project? What is Project management? Project phases and project lifecycle, organizational structure, Qualities of Project Manager.2. Project Management Components.

    Project Integration Management-Project plan development and execution, changecontrols, configuration management.3. Scope Management-Strategic planning, scope planning, definition, verification andcontrol.4. Time management- Activity planning, schedule development and control.5. Cost Management- Cost estimation and Control.6. Quality Management- Quality planning and assurance.7. Human Resource Management- Organizational planning , staff acquisition.8. Communication Management-Information distribution , reporting.9. Risk Management-Risk identification, Quantification and control.10. Procurement Management- Solicitation, contract administration.

    11. Software Metrics- The scope of software metrics, software metrics data collection,analyzing software data, measuring size, structure, external attributes.12. Software Reliability- Measurement and prediction, resource measurement, productivity,teams and tools.13. Planning a messurement program.

    What is metrics plan?: Developing goals, questions and metrics.Where and When: Mapping measures to activities.How: Measurement tools.Who: Measurers , analyst, tools revision plans.

    14. Quality StandardsCMM, PSP/TSP

    References :1. Information Technology Project Management

    By -Kathy Schwalbe.2. Software Metrics A rigorous and practical approach

    ByNorman Fenton, Shari Lawrence Pfleeger.3: Software Engineering By- Roger Presman.

  • 7/31/2019 Proposed Syllabus for MSc. CS Bastar Bv

    38/91

    38 M.Sc. (Computer Science)

    3.2 CS-302: MOBILE COMPUTING

    Prerequisites Concepts of multiplexing and modulation Concepts of Networking

    Conversant with OS internals Familiar with event handling

    Web browsers Create and Compile Java Programs

    Brief History of wireless communication

    Objectives To familiarize the students with the buzz words and technology of mobile communication

    Understand the GSM architecture

    Understand the issues relating to Wireless applications

    1. Introduction to Mobile Computing

    i. Introduction and need for Mobile computingii. Mobility and portabilityiii. Mobile and Wireless devicesiv. Applicationsv. Brief History of wireless communicationBook1: Mobile Comm. By Jochen Schiller

    2. Wireless Transmissioni. General Concepts of multiplexing and modulationii. Spread Spectrumiii. Cellular Systems

    iv. Cellular Phone Arrayv. Mobile Phone Technologies (1G, 2G, 2.5G, 3G)Book1: Mobile Comm. By Jochen Schiller

    3. Medium Access Control Layeri. Why specialized MAC?- hidden and exposed terminals- near and far terminalsii. General Concepts and comparison of SDMA, FDMA, TDMA , CDMABook1: Mobile Comm. By Jochen Sciller

    4. Global System for Mobile Comm.i. Mobile Services (Bearer, Tele-and-supplementary services)ii. System Architecture- Radio subsystem- Network and switching subsystem- Operation subsystemiii. Protocols- Localization and calling

  • 7/31/2019 Proposed Syllabus for MSc. CS Bastar Bv

    39/91

    39 M.Sc. (Computer Science)

    - Handoveriv. Value Added Services

    - SMSArchitecture, Mobile Originated and Mobile Terminatedprocedures

    - Cell Broadcast ServiceArchitecture, Message Transfer Procedure- MMS

    Architecture, Protocol framework, Message TransferProcedure- Location Services

    Logical Reference Model, Control Procedures, NetworkArchitecture, determination of Location Information, Locationbased servicesv. GPRSBook1: Mobile Comm. By Jochen Schiller

    Book5:2G Mobile Networks: GSM and HSCSD By NishitNarang and Sumit Kasera

    5. Mobile IPi. Goals, assumptions and requirementsii. Entities and terminologiesiii. Agent Discoveryiv. Registrationv. Tunneling and encapsulationvi. Reverse Tunnelingvii. IPv6viii. IP micro-mobility supportCellular IP, Hawaii, Hierarchicalmobile IPv6ix. Mobile Routing :Destination sequence distance Vector, Dynamic Source Routing,Alternative Matrix, Adhoc Routing Protocols -Flat, Hierarchical,Geographic-position-assistedBook1: Mobile Comm. By Jochen Schiller

    6. Mobile TCPi. Traditional TCP- Congestion Control, Slow start, Fast retransmit / Fast recovery- Implications on mobilityii. Classical TCP improvementsIndirect TCP, Snooping TCP, Mobile TCP, Fast retransmit / Fastrecovery, Transmission / Timeout freezing, SelectiveRetransmission, Transaction oriented TCPiii. TCP over 2.5/3G wireless networksBook1: Mobile Communications By Jochen Schiller

  • 7/31/2019 Proposed Syllabus for MSc. CS Bastar Bv

    40/91

    40 M.Sc. (Computer Science)

    7. Wireless Application Protocol

    i. Architectureii. Wireless datagram protocoliii. Wireless transport layer security

    iv. Wireless transaction protocolv. Wireless session protocolvi. Wireless application environmentvii. WMLviii. WML Scriptsix. Push Architecturex. PushPull ServicesBook1: Mobile Communications by Jochen Schiller

    8. Platform/Operating Systemsi. Palm OS

    ii. Windows CEiii. Embedded Linuxiv. J2ME (Introduction)v. Symbian (Introduction)vi. File Systems (Book1)Book2: Pervasive ComputingBook1: Mobile Comm. By Jochen Schiller

    9. Java for Wireless Devicesi. Setting up the development environmentii. Basic Data types, Libraries (CLDC, MIDP)

    Any J2ME book

    10. UI Controlsi. Displayable and Display

    - Image- Events and Event Handling- List and choice- Text box- Alerts

    Any J2ME book11. Persistent Storage

    i. Record Storesii. Recordsiii. Record EnumerationAny J2ME book

    12. Network MIDletsi. The Connection Frameworkii. Connection Interface

  • 7/31/2019 Proposed Syllabus for MSc. CS Bastar Bv

    41/91

    41 M.Sc. (Computer Science)

    iii. Making a connection using HTTPiv. Using datagram connectionAny J2ME book

    13. Wireless Messaging

    i. Architecture for Messaging applicationii. Messaging APIiii. Types of applicationsiv. Pros and cons of messaging

    References: http://java.sun.com/products/wmahttp://forum.nokia.com

    Books1. Mobile Communications Jochen Schiller, Pearson Education, 2nd Edition2. Pervasive Computing Technology and Architecture of Mobile Internet Applications

    Jochen Burkhardt, Dr. Horst Henn, Steffen Hepper, Klaus Rintdorff, Thomas Schack , PearsonEducation3. Wireless Java Programming with J2ME Yu Feng and Dr, Jun Zhu , Techmedia Publications,1st edition4. Complete Reference J2ME5. Mobile Networks GSM and HSCSDNishit Narang, Sumit Kasera, TataMcGrawHill6. Mobile ComputingAsoke K Talukdar, Roopa R. Yavagal, TataMcGrawHill

  • 7/31/2019 Proposed Syllabus for MSc. CS Bastar Bv

    42/91

    42 M.Sc. (Computer Science)

    3.3 CS-303 SOFT COMPUTING

    1.IntroductionSoft computing paradigms-Neural network-Fuzzy logic-derivation free optimization methods

    of Genetics algo.-soft computing characteristics.

    2. Fuzzy logicsets-properties-arithmetics-member functions- fuzzy relations-relation equations-fuzzy

    measures-types of uncertainity-members of uncertainitiesmeasures of fuzziness-probabilitiesVspossibilities-measures of fuzzy events.

    3. Neural computingneuron modelling- learning in simple neuron-perception earning curve-prooflimitations of

    perception.

    4. Neural networks

    Multilevel perception-algo-visualizing network behaviour-B:PN-self organizingnetwork-Kohenen algo.- Hopfield network-adaptive resonance theory-patternclassification.

    5. Genetic algoIntroduction- Biological terminology-search space and fitness land scapeselements of genetic

    algorithms -Genetic algo in problem solving.

    Books1. JS Jang ,C.T. Sun , E.Mizutani, " Neuro-fuzzy and soft computing" Prentice International.2. Simon Haykin " Neural networks - A comprehensive foundation" PHI

    3. Melanie Mitchell , " An introduction to Genetic algorithms", PHI

  • 7/31/2019 Proposed Syllabus for MSc. CS Bastar Bv

    43/91

    43 M.Sc. (Computer Science)

    3.4 CS 305 COMPILER DESIGN

    Unit-1Compilers-Grammars-Languages-Phases of compiler-compiler writing tools-Errors-Lexicalphase errors, syntactic phase errors, semantic phase errors

    Unit-2

    Role of lexical analyzer-input BufferingSpecification and Recognition of tokensLanguage forspecifyingLexical analyzer-Finite Automata-Regular expression to NFA-Optimization of DFA basedpattern matchesDesign of a Lexical Analyzer Generator

    Unit-3

    Parsers-CFG-derivations and parse trees-capabilities of CFG- Top own parsing-Bottom Up

    parsing LR,parsing SLR, parsing LALR, parsing CLR, parsing Operator PrecedencePredictive Parsing.

    Unit-4Syntax Directed Translation scheme-Implementation of Syntax Directed Translators-Intermediate code postfix notation, parse trees and syntax trees-Trees three address codeQuadruples, TriplesTranslation of Assignment statementsBoolean expressions-DeclarationFlow control statementsBack patching.

    Unit-5

    Principal source of optimization-Issues in the design of a code generator-Run-Time storagemanagementBasic blocks and flow graphs Next use information-Simple code generator DAGrepresentation of basic blocks-Peephole optimizationCode Generation

    References:1. A.V.Aho, Ravi Sethi,J. D.ullman, Compilersprinciples ,Techniques and tools, AddisonWesley publishing company,1988.2. Allen I.Holub, compiler Design in C, Prentice Hall of India, 1993.3. Kenneth C. Louden, Compiler Construction: Principles & Practice, Thomson Learning 20034. Muchnick, Advanced Compiler Design: Implementation, Acadamic Press.5. Rajini Jindal , Compilers Construction & Design , Umesh Publications , Delhi.2002

    6. Ronald Mak ,Writing Compilers and Interpreters, 2nd Edition , John Miler &Sons , 1996 .

  • 7/31/2019 Proposed Syllabus for MSc. CS Bastar Bv

    44/91

    44 M.Sc. (Computer Science)

    Electives

  • 7/31/2019 Proposed Syllabus for MSc. CS Bastar Bv

    45/91

    45 M.Sc. (Computer Science)

    1. CS 204/CS 304: Elective Course : Advanced Algorithm

    Advanced data structures (Fibonacci heaps, splay trees, dynamic trees, B-Trees) in-memoryrepresentations and persistence of DS, Revision of Graph algorithms: Network flows (maxflow and min-cost flow/circulation)String algorithms: (10 Hrs)o String searching - (KnuthMorrisPratt algorithm, BoyerMoore string searchalgorithm, RabinKarp string search algorithm)o Suffix trees - mathematical properties of suffix treeso Applications of Suffix trees:

    regular expression searches using suffix trees; Finding all maximal pairs and maximal repeats, Patricia trees

    Intractable problems: approximation algorithms1. Steiner tree and TSP2. Steiner forest3. Group Steiner trees

    4. Set cover via primal-dual5. k-median on a cycleInteger programming and optimization algorithms1. Formulations, complexity and relaxations2. discrete optimization,3. cutting plane methods,4. enumerative and heuristic methods5. Convex programming algorithms: ellipsoid method, interior-point methods, proximalpointmethods.Preliminary reading:

    Introduction to Algorithms: by Cormen, T.H., C.E. Leiserson, R.L. Rivest, and C. Stein;

    MIT Press; ISBN: 9780262032933The Algorithm Manual, Steven Skiena, Springer ISBN:9788184898651Reference Books:

    Theory of Linear and Integer Programming: by Schrijver; John Wiley & Sons. ISBN:9780471982326Convex Optimization: by Boyd and Vandenberghe; Cambridge University Press; ISBN:9780521833783Approximation Algorithms: by Vazirani; Springer-Verlag: ISBN: 9783540653677Advances in Steiner Trees (Combinatorial Optimization) by Ding-Zhu Du (Editor), J.M.Smith (Editor), J. Hyam Rubinstein (Editor); Springer; ISBN: 978-0792361107Algorithms On Strings,Trees, And Sequences; by D. Gusfield; Cambridge University Press,(ISBN 052158519)Additional reading:Algorithmic Number Theory: by Bach and Shallit; MIT Press; ISBN: 9780262024051

  • 7/31/2019 Proposed Syllabus for MSc. CS Bastar Bv

    46/91

    46 M.Sc. (Computer Science)

    2. CS 204/CS 304-Elective Course : Functional ProgrammingUnit-1

    Introduction to Functional programmingo Expressions and values.o Functions.

    o Recursion.o Types.Introduction to Haskello tupleso polymorphismo higher order functionso strings & characters

    Unit-2Data types

    o Data-Type declarationso Data and type constructors

    o Defining functions over datatypes using patterno Abstract data typeso Polymorphismo Polymorphic Functions,o Polymorphic datatypes,o Type Constructors to define polymorphic Constructor functionso Recursive datatypeso Higher Order functions

    Unit-3

    The Haskell Class Systemo

    Classes as predicates on typeso Instance declarationso Inheritance and dependent classeso Derived instanceso The Show classo The Eq class

    Unit-4

    Programs and Proofso Equational reasoningo Proofs on program equivalence

    Unit-5Monadso IO monado List monado Maybe monado State monadReference BooksHaskell - The Craft of Functional Programming: by Simon Thompson, Addison-Wesley,

  • 7/31/2019 Proposed Syllabus for MSc. CS Bastar Bv

    47/91

    47 M.Sc. (Computer Science)

    ISBN 0-201-34275-8Types and Programming Languages, by Benjamin C. Pierce; The MIT Press; ISBN0262162091Additional reading:Haskell 98 language and libraries - the Revised Report: by Simon Peyton Jones; Cambridge

    University Press; ISBN 0521826144

  • 7/31/2019 Proposed Syllabus for MSc. CS Bastar Bv

    48/91

    48 M.Sc. (Computer Science)

    3. CS-204/CS 304 -Elective Course: Linux Kernel Programming andIntroduction to Device Drivers

    Objectives:

    - Important concepts in OS kernel development getting hands-on Knowledge with Linux kernel- Getting to know the device driver programming.

    Pre-requisite:Should have done course on Advanced Operating SystemUNIX/LINUX Internals: as Operating System.Usage and Implementation of UNIX/LINUX System CallsCourse Contents

    Unit-1

    Introduction to the kernel design - monolithic Vs microkernelEmpowering the kernel - drivers and moduleCommunication with the userspaceMemory Management issues in the kernel

    Unit-2

    Accessing Hardware- address space concepts- memory mapped and I/O- Virtual devices, char devicesHandling hardware events- interrupt handling- timers and polling

    Unit-3

    Kernel source code organization- Linux kernel sources and organisation- Browsing and understanding the kernel sources- Common Techniques used during Linux kernel programming

    Linux module programming- Hello World- Basic Virtual device, char device, mknod,- Debugging typical kernel Oops- strace

    Unit-4

    Communication with the userspace- ioctls, proc,Accessing Hardware- address space concepts- memory mapped and I/Okobjects and sysfs

  • 7/31/2019 Proposed Syllabus for MSc. CS Bastar Bv

    49/91

    49 M.Sc. (Computer Science)

    Unit-5

    Handling hardware events- interrupt handling, bottom halves, timers- softirq, tasklets and workqueues

    Sleeping and Locking- sleeping: interruptible, timed- locking: mutex, semaphores, spinlocksExploring and developing a driver for any peripheral of one embedded device. (Thecollege/Institute has complete freedom to include or exclude this chapter, as per theavailability of proper devices. Not to be asked for any examination)Reference books

    Linux kernel development, Robert Love, Pearson, ISBN: 9788131758182Professional Linux Kernel Architecture, Wolfgang Mauerer, Wrox (Wiley India), ISBN9788126519293Understanding the Linux Kernel, Bovet, Cesati, Shroff/O'Reilly ISBN: 9788184040838

    Linux Device Drivers, 3rd Edition, Corbet, Rubini, Greg-Kroah Hartman ,Shroff/O'Reilly , ISBN: 8173668493ARM System Developer's Guide: Designing and Optimizing System Software - Sloss,Symes, Wright

  • 7/31/2019 Proposed Syllabus for MSc. CS Bastar Bv

    50/91

    50 M.Sc. (Computer Science)

    4. CS 204/CS 304- Elective Course : Natural Language Processing

    PREREQUISITES1. A previous course on Artificial Intelligence will help.2. Courses of Data Structures and Algorithms should have been done.

    3. Exposure to Linguistics is useful, though not mandatory.COURSE OUTLINEWords and Word Forms : Morphology fundamentals; Morphological Diversity of IndianLanguages; Morphology Paradigms; Finite State Machine Based Morphology; AutomaticMorphology Learning; Shallow Parsing; Named Entities; Maximum Entropy Models; RandomFields.Structures : Theories of Parsing, Parsing Algorithms; Robust and Scalable Parsing on NoisyText as in Web documents; Hybrid of Rule Based and Probabilistic Parsing; Scope Ambiguityand Attachment Ambiguity resolution.Meaning : Lexical Knowledge Networks, Wordnet Theory; Indian Language Wordnets andMultilingual Dictionaries; Semantic Roles; Word Sense Disambiguation; WSD and

    Multilinguality; Metaphors; Coreferences.Applications of NLP: Sentiment Analysis; Text Entailment; Robust and Scalable MachineTranslation; Question Answering in Multilingual Setting; Cross Lingual Information Retrieval(CLIR).REFERENCES1. Allen, James, Natural Language Understanding, Second Edition, Benjamin/Cumming, 1995.2. Charniack, Eugene, Statistical Language Learning, MIT Press, 1993.3. Jurafsky, Dan and Martin, James, Speech and Language Processing, Second Edition,Prentice Hall, 2008.4. Manning, Christopher and Heinrich, Schutze, Foundations of Statistical Natural LanguageProcessing, MIT Press, 1999.

    5. Natural Language Processing and Text Mining, Kao, Springer, ISBN-9781846281754

  • 7/31/2019 Proposed Syllabus for MSc. CS Bastar Bv

    51/91

    51 M.Sc. (Computer Science)

    5. Elective Course: Program Analysis

    Static analysis:Abstract interpretation (dataflow analysis)

    Type systems

    o simple type systemso type reconstructiono universal and existential polymorphismo subtypingo bounded quantificationo recursive typeso type operators

    Model checkingo decision procedureso SAT solverso BDDs

    o Partial Order Reductiono Satisfiability Modulo Theory (SMT) solvers

    Theorem-proving

    Dynamic AnalysisAutomated testing and debugging using model inferenceSoftware visualizationReference Books:

    Logic in Computer Science - Modelling and Reasoning About Systems: by Michael Huthand Mark Ryan; Cambridge University Press (ISBN 9780521670890)Principles of Program Analysis: by Nielson and Chris Hankin, Springer ISBN 978-3-540-65410-0

    Model Checking: by Clarke, Grumberg, and Peled; MIT PressDecision Procedures - An Algorithmic Point of View: by Kroening and Strichman; SpringerSoftware Visualization: by John T. Stasko, John B. Domingue, Marc H. Brown and BlaineA. Price; MIT Press (ISBN: 978-0-262-19395-5)Types and Programming Languages, by Benjamin C. Pierce; The MIT Press; ISBN0262162091

  • 7/31/2019 Proposed Syllabus for MSc. CS Bastar Bv

    52/91

    52 M.Sc. (Computer Science)

    6. CS 204/CS 304: Elective Course: DOT NETObjectives:

    - To understand the DOTNET framework, C# language features and Web development usingASP.NET- Evaluation will be as below

    1. Theory paper : 50 marks2. Project work (either in C# or ASP.NET): 50 marks.Students are supposed to give the project demo and presentation of their project.Project Evaluation : ( to be done internally by subject teacher)a. Coding : 20 Marksb. Documentation & Demo : 15 marksc. Presentation + presentation style : 15 marksPrerequisite:

    - Knowledge of object-oriented programming concepts such as data abstraction,encapsulation, inheritance, and polymorphism.- Familiarity with programming language such as C++ and/or Java.

    - Knowledge of web developmentTopics to be covered:

    Unit I

    1. DOTNET Frameworka. Introduction to DOTNETb. DOT NET class frameworkc. Common Language Runtimei. Overviewii. Elements of .NET applicationiii. Memory Managementiv. Garbage Collector : Faster Memory allocation,

    Optimizationsd. Common Language Integrationi. Common type systemii. Reflection APIe. User and Program Interface2. Introduction to C#a. Language featuresi. Variables and Expressions, type conversionii. Flow Controliii. Functions, Delegatesiv. Debugging and error handling, exception handling

    ( System Defined and User Defined)b. Object Oriented Conceptsi. Defining classes, class members, Interfaces, propertiesii. Access modifiers, Implementation of class, interfaceand propertiesiii. Concept of hiding base class methods, Overridingiv. Event Handlingc. Collections, Comparisons and Conversions

  • 7/31/2019 Proposed Syllabus for MSc. CS Bastar Bv

    53/91

    53 M.Sc. (Computer Science)

    i. Defining and using collections, Indexers, iteratorsii. Type comparison, Value Comparisoniii. Overloading Conversion operators, as operatord. Genericsi. Using generics

    ii. Defining Generics, generic Interfaces, Generic methods,Generic DelegateUnit-II

    3. Window Programminga. Window Controlsi. Common Controlsii. Container Controlsiii. Menus and Toolbarsiv. Printingv. Dialogsb. Deploying Window Application

    i. Deployment Overviewii. Visual studio setup and Deployment project typesiii. Microsoft windows installer architectureiv. Building the project : Installation

    Unit-III

    4. Data Accessa. File System Datab. XMLc. Databases and ADO.NETd. Data Binding5. Web Programminga. Basic Web programmingb. Advanced Web programmingc. Web Servicesd. Deployment Web applications

    Unit-IV

    6. .NET Assembliesa. Componentsb. .NET Assembly featuresc. Structure of Assembliesd. Calling assemblies, private and shared assemblies7. Networkinga. Networking overviewb. Networking programming optionsi. Webclientii. WebRequest and WebResponseiii. TcpListener &TcpClient8. Introduction to GDI+a. Overview of Graphical Drawingb. Pen Class, Brush Class, Font Class

  • 7/31/2019 Proposed Syllabus for MSc. CS Bastar Bv

    54/91

    54 M.Sc. (Computer Science)

    c. Using Imagesd. Clipping, Drawing2D, Imaging

    Unit-V

    1. Introduction to ASP.NET

    2. Server Controls and Variables, control Structures & Functionsa. Forms, webpages, HTML forms, Webformsb. Request & Response in Non-ASP.NET pagesc. Using ASP.NET Server Controlsd. Datatypes : Numeric, text, arrays, datacollectionse. Overview of Control structuresf. Functions : web controls as parameters3. Even Driven Programming and PostBacka. HTML eventsb. ASP.NET page eventsc. ASP.NET Web control eventsd. Event driven programming and postback4. Reading from Databasesa. Data pagesb. ADO.NET5. ASP.NET Server Controlsa. ASP.NET Web Controlsb. HTML Server Controlsc. Web Controls6. DOTNET assemblies and Custom Controlsa. Introduction to Coolies, Sessionsb. Session eventsc. State management Recommendations7. Web Servicesa. HTTP, XML & Web servicesb. SOAPc. Building ASP.NET web serviced. Consuming a web serviceRecommended Text and Reference books:

    Beginning Visual C#, Wrox PublicationProfessional Visual C#, Wrox PublicationInside C#, by Tom Archer ISBN: 0735612889 Microsoft Press 2001, 403 pagesBeginning ASP.NET 3.5, Wrox Publication

    Programming ASP.NET 3.5 by Jesse Liberty, Dan Maharry, Dan Hurwitz, OReillyIllustrated C# 2008, Solis, Publication APRESS, ISBN 978-81-8128-958-2Professional C# 4.0 and .NET 4by Christian Nagel, Bill Evjen, Jay Glynn, Karli Watson,Morgan Skinner, WROXBeginning C# Object-Oriented Programming By Dan Clark , ApressADO.NET Examples and Best Practices for C# Programmers, By Peter D. Blackburn ApressDatabase Programming with C#, By Carsten Thomsen, Apress

  • 7/31/2019 Proposed Syllabus for MSc. CS Bastar Bv

    55/91

    55 M.Sc. (Computer Science)

    7. CS 204/CS 304 : Elective Course : Information Systems SecurityObjectives of the Course:1. To enable students to get sound understanding of Info-Sys-Security, Net SecurityCryptography2. To equip with knowledge and skills necessary to support for their career in Information

    Security3. To develop attitude and interest along with necessary knowledge and skills among thestudents to encourage them to do further academic studies / research in this area, after thecompletion of their M.Sc. Course

    Unit-IConceptual foundation of Information Systems Security- Concepts and Terminologyo Threats, Attacks, Types of attacks, Programs that attacko Vulnerabilities, Risks, Risk Assessment and Mitigation- Security & Elements / principles of Information Securityo Confidentiality, Integrity, Availability, Identification, Authentication, Authorization,

    Accountability, PrivacyData Encryption techniques- Introduction, Plain text, Cipher text- Substitution techniques: Caeser cipher, Mono-alphabetic cipher, Homophonic, polygra,polyalphabetic, playfair, Hill cipher- Transposition techniques: Reil Fense technique, simple columnar, Vernam, Book cipher- Encryption & Decryption- Symmetric and Asymmetric key cryptography: Diffie-Hellman key exchange- Steganography

    Unit-II

    Symmetric / Secret Key Encryption

    - Algorithm Types and Modes- Overview of symmetric key cryptography- DES (Data Encryption Standard)- Double DES, Triple DES- AES (Advanced Encryption Standard)- IDEA (International Data Encryption Algorithm)- Blowfish- RC4 & RC5Asymmetric key / Public Key Encryption- History & overview of asymmetric key cryptography- RSA algorithm

    - key management- Deffie-Hellman key exchange- Elliptic curve cryptography

    Unit-III

    Message Integrity techniques- Message Digest- MD5- SHA

  • 7/31/2019 Proposed Syllabus for MSc. CS Bastar Bv

    56/91

    56 M.Sc. (Computer Science)

    - Message Authentication Code (MAC) & HMAC- Digital Signature techniqueso Digital Signatures using DSA (Digital Signature Algorithm)o DSS (Digital Signature Standard) and RSADigital Certificates and PKI (Public Key Infrastructure)

    - Digital Certificates- Private key management- PKIX Model- Public key cryptography standards (PKCS)- XML, PKI and Security

    Unit-IVAuthentication techniques- Passwords- Authentication Tokens- Certificate Based Authentication- Biometric Authentication

    - Kerberos- Key Distribution Center(KDC)- Security Handshake PitfallsInternet Security protocols- Secure Socket Layer (SSL)- Transport Layer Security (TLS) , Secure HTTP (SHTTP)- Time Stamping Protocol (TSP)- Secure Electronic Transaction ( SET)- 3-D Secure Protocol- Electronic Money- Email Security : SMTP, PEM, PGP, S/MIME- Wireless Application Protocol (WAP) Security- Security in GSM- Security in 3G

    Unit-V

    Server Security & Firewalls- Intrusion Detection, IDS, Intrusion Prevention Systems (IPS)- Introduction of Firewall, Packet Filters,- Application Level Gateways- Circuit Level Gateways- Firewall architecture- This chapter should also include detailed study of at least one free Firewall, IDS, IPSproducts with demonstrations ( For Internal evaluation only)Malicious Software- Malicious Code- Viruses : types, working of anti-virus software- Worms- Trojan horse, Spyware- Attacks: Hoax, Back-door, Brute Force, Dictionary, Spoofing, Denial-of-service, Man-inthe-middle, spam, E-mail Bombing & Spamming, Sniffer. Timing attack.

  • 7/31/2019 Proposed Syllabus for MSc. CS Bastar Bv

    57/91

    57 M.Sc. (Computer Science)

    Recommended Books (Text and Reference):1. Atul Kahate, "Cryptography And Network Security TMH2. William Stallings," Cryptography and Network Security Prentice Hall /Pearson Education3. Cryptography and Information Security By V.K. Pachghare ( PHI Learning Private Limited)4. Introduction to Computer Security By Matt Bishop and Sathyanarayana (PEARSON

    EDUCATION)5. Applied Cryptography Protocols, Algorithms, and Source Code in C By Bruice Schneier(Wiley India)6. A Classical Introduction to Cryptography, Vaudenay, Springer, 978-0-387-25464-77. A Classical Introduction to Cryptography Exercise Book, Baigneres, Springer, 978-0-387-27934-3

  • 7/31/2019 Proposed Syllabus for MSc. CS Bastar Bv

    58/91

    58 M.Sc. (Computer Science)

    8. CS 204/CS 304 : Elective Course: Software Architecture and Design PatternsUnit-I

    1. The


Recommended