Вы находитесь на странице: 1из 8

B.E.

IV YEAR (4YDC) COMPUTER ENGINEERING

CO 4401: ARTIFICIAL INTELLIGENCE

Theory :

1.
Definition and Terminologies, Silicon Model, Biomodel, Cognitive
Model, Introduction to logic, Problems, Problem Spaces, and Search,
Production Systems, Problem Characteristics.
2.
Search techniques: Best first, Depth-first, Generate and Test, Hill
Climbing, Best first Search, Problem Reduction, AND/OR graphs,
Constraints Satisfaction.
3.
Knowledge Representation and Mappings, Knowledge
Representation issues. Predicate Logic, Resolution, Representing
Knowledge using Rules, Reasoning under Uncertainty, Nonmonotonic
Reasoning, Statistical Reasoning, Probability, Bayesian logic, Certainty
factors, Dempster Shafer reasoning, Semantic Nets, Frames,
Conceptual dependency, Scripts.
4.
Introduction to: Game Playing, Planning, Understanding, Natural
Language Processing, Learning, Common Sense, Perception, Lisp,
Prolog, and Expert System.
5.
Basic Concepts of: Neural networks, Fuzzy Logic, Genetic
Algorithm.

Text Books
1.

Rich E., Artificial Intelligence, McGraw-Hill International, 1991.

2.

Neil C. Rowe, AI Through Prolog, Prentice Hall, 1988.

Reference Books
1.
Chanaik E. & D.Mc Dermott, Introduction to AI, AddisonWesley, 1985.
2.
Schalkoff, Artificial Intellegence: An Engineers Appraoch,
McGraw-Hill, 1992.

3.
Keith Weiskamp & Terry Hengl, AI Programming with Turbo
Prolog, John Wiley & Sons, 1998.

B.E. IV YEAR (4YDC) COMPUTER ENGINEERING

CO 4402: COMPUTER PERIPHERALS AND INTERFACES

Theory:

1.
Introduction, Review of various I/O methods Programmed I/O,
Interrupt driven I/O, DMA and I/O processor based.

2.
Computer System Peripherals: Working and Interfacing of
various Peripheral Devices :
i.
Magnetic Disks Floppy Disks, Floppy Disk Drive, Working,
Programming the Floppy Disk Controller, Hard Disk, Disk Drives,
Working and Interfacing.
ii.
Printers Principle and Working of Dot Matrix Printers, Line
Printers, Laser Printers etc., Printer Adapter.
iii.

Keyboards Types, Functioning and Interfacing.

iv.
CRT - Working and Interfacing of various CRT interfacing ICs.
Timing Chain, Cursor Control, Scrolling; Different types of CRTs and CRT
Controller Cards, Light Pen.

3.

Principle of operation of other Peripheral Devices:

i.
Magnetic Tapes: Types Spooler, Cassettes, Cartridges, Various
Tape Standards QIC, DAT (Digital Audio Tapes) and Exabyte.

ii.
Optical Disks, Mouse, Digitizer, Plotter, OCR, OMR, Audio
Response Units, Magnetic Ink Readers, Bar Code Readers, Scanners,
Touch Screens etc.

4.
Communication: Serial Communication RS232C and other
standards, Parallel Communication Centronix.
Bus Standards: Introduction, Asynchronous and Synchronous Buses
VME, ISA, Future Bus, EISA, Multibus, SCSI, IEEE 488 etc.

5.

Input / Output Drivers (Device Drivers).

Computer Accessories : Cables, Connectors, Power Supplies etc.

Text Books
Govindarajalu B., IBM PC and Clones, Tata McGraw-Hill, 2/e, 2002.
Peter Norton, New Inside the PC, SAMS, 2002.
N. Mathivanan, Microprocessors, PC Hardware and Interfacing, PHI,
2003.

Reference Books
1.

Winn L. Rosch, Hardware Bible, 6/e, Que, 2003.

2.
Peter Notron, Programmers Guide to the IBM PC & PS/2,
Microsoft Press/BPB.
3.

IBM PC/XT/AT: Technical Reference Manuals.

4.

Intels Microprocessor and peripherals Handbook, Vol I & II.

B.E. IV YEAR (4YDC) COMPUTER ENGINEERING

CO4403: DESIGN AND ANALYSIS OF ALGORITHMS


Theory:

Review of elementary Data Structures: Stacks, Queues, Lists, Trees,


Hash, Graph. Internal representation of Data Structures, Code tuning
techniques: Loop optimization, Data transfer optimization, Logic
optimization.
Definitions of complexity, Time and Space Complexity; Time space
tradeoff, various bounds on complexity, asymptotic notation: Onotation, -notation, -notation, recurrences and recurrences solving
techniques: recursion-tree method and master method, Average time
analysis methods: Probabilistic methods.
Design and analysis of algorithms using the brute-force, greedy,
dynamic programming, divide-and-conquer and backtracking
techniques.
Algorithm for sorting and searching, Randomized Algorithms, Numbertheoretic algorithms, Matrix Manipulation algorithms, Graph
Algorithms: BFS and DFS.
NP-hard and NP-complete problems, Approximations Algorithms, Data
Stream Algorithms, Introduction to design and complexity of Parallel
Algorithms and Semi-Numerical Algorithms.

Text Books
Cormen, Leisersam, Rivest, Stein, Introduction to Algorithms, Second
Edition, Prentice Hall of India, 2001.
Aho A.V., Hopcorft J.E., J. Ullman, Design and Analysis of Computer
Algorithms, Addison Wesley, 1998.
Horowitz E. and Sahani, Fundamentals of Computer Algorithms,
Galgotia Publications, 1984.

Reference Books

Knuth D., Fundamental algorithms: The Art of Computer


programming, Volume I, Third Edition, Pearson Education. 1998.
Knuth D., Semi numerical Algorithms: The Art of Computer
programming, Volume II, Third Edition, Pearson Education. 1998.
Knuth D., Sorting and Searching: The Art of Computer programming,
Volume III, Second Edition Pearson Education. 1998.
John Kleinberg, Trades E., Algorithm Design, Pearson Education. 2002.
A. Papoulis, S.U. Pillai, Probability, Random Variables and Stochastic
Processes, McGraw Hill. Fourth Edition 2006.

B.E. IV YEAR (4YDC) COMPUTER ENGINEERING

CO 4422: SERVICE ORIENTED ARCHITECTURE

Theory:

1.
SOA Concepts, Services and their properties; Components,
Objects Communication and interaction protocols; Comparison with
system integration technologies like RPC, CORBA, COM, DCOM etc.;
Advantages of SOA.
2.
Basic Web services Architecture, Service Oriented Architecture
technological foundation and related standards like XML, WSDL.
Messaging Architecture of SOA - SOAP.
3.
Service Registries (UDDI) and Web Services Discovery Models,
Static and Dynamic discovery of web services.

4.
Service Composition, Types of Composition approaches, Business
process diagram, challenges in process implementation, Introduction to
the concept of Semantic Web.
5.
Introduction to WS Security: Transport level security, message
level security and related standards like WS-Security, Application
Security, access control and standards.

Text Books
1.
Thomas Erl, Service Oriented Architecture: Concepts,
Technology, and Design, Prentice Hall PTR, 2005.
2.
Graham, Building Web Services with java: Making sense of XML,
SOAP, WSDL and UDDI, 2/e, Pearson Education, 2006.
3.
Mark ONeill, Web Services Security, McGraw Hill/ Osborne
2003.

Reference Books
1.
Coyle, XML Web Service and Data Revolution, Pearson
Education, 2006.
2.
Newcomer, Understanding SOA with Web Services, Pearson
Education, 2006.

Reference Links
1.

http://www.w3.org/2002/ws

2.

http://msdn.microsoft.com/webservices/

3.

http://www-128.ibm.com/developerworks/webservices

4.

http://java.sun.com/index.jsp

B.E. IV YEAR (4YDC) COMPUTER ENGINEERING

CO 4435: ADVANCED COMPUTER NETWORKS


Theory:

Basic Concepts: Review of LAN, MAN, WAN, Intranet, Internet, and


interconnectivity devices: bridges, Routers etc. Review of TCP/IP
Protocol Architecture: ARP/RARP, IP addressing, IP Datagram format
and its Delivery, Routing table format, ICMP Messages, Subnetting,
Supernetting and CIDR, DNS. NAT: Private addressing and NAT, SNAT,
DNAT, NAT and firewalls, IPV6: address structure, address space and
header.
Transport layer: Multiplexing and ports, TCP: Segment format, Sockets,
Synchronization, Three way hand shaking, variable window size and
flow control, Timeout and Retransmission algorithms, connection
control, Silly window Syndrome, UDP: Message Encapsulation, format
and pseudo header. Routing Protocols: BGP- Concept of hidden network
and autonomous system, An Exterior gateway protocol, Different
messages of BGP. Interior Gateway protocol: RIP, OSPF. VLANS:
Concepts, Comparison with Real LANS, Type of VLAN, Tagging.
Wireless LAN: Transmission Medium For WLANs, MAC problems, Hidden
and exposed terminals, Near and far terminals, Infrastructure and ad
hoc, Networks, IEEE 802.11- System arch, Protocol arch, Physical layer,
Concept of spread spectrum, MAC and its management, Power
management, Security. Mobile IP: why not Traditional IP, Goals,
Terminology, Agent advertisement and discovery, Registration,
Tunneling techniques.
Ad hoc network routing: why not Traditional IP routing? Types of routing
protocols, Examples: OADV, DSDV, DSR, ZRP. Mobile Transport Layer:
why not Traditional TCP? , I-TCP, S-TCP, M-TCP. Wireless Cellular
networks: Cellular system, Cellular networks vs. WLAN, GSM Services,
system architecture, Localization and calling, handover and Roaming.
WAP architecture and mobility support. VPN: VPN and its application,
VPN and Firewalls, Fast ether-net and Gigabit Ethernet: Protocol Arch,
Medias and Interfaces, Speed negotiation, Encoding techniques. 100AG Any LAN, Introduction to ISDN: Protocol Architecture Channels and
devices, BRI/PRI.

Text Books
Comer, Internetworking with TCP/ IP Vol-1, Pearson education, 2002.
Jochen Schiller Mobile communication, Addison Wesley, 2003.
William stalling, ISDN and Broadband ISDN with Frame Relay and
ATM, Fourth Edition, Prentice Hall, 2000.

Reference Books
W. Richard Stevens, TCP/IP Illustrated Vol-1 , Addison-Wesley.
Black, ATM-I, Foundation for Broadband Networks, PH Publications.

Website
http://www.cs.wustl.edu/~jain/

Вам также может понравиться