Академический Документы
Профессиональный Документы
Культура Документы
SEMESTER III
SEMESTER IV
1
SEMESTER V
SEMESTER VI
2
SEMESTER VII
SEMESTER VIII
3
Elective Courses in B.Tech. Computer Science and Engineering
4
The electives have been classified based on the following Focus areas:
5
CS201 DATA STRUCTURES 3-1-0-4
Stacks, Queues, Linked list, and Recursion: Using recursion- linear, binary, and multiple
recursions, Stack - ADT, Array based implementation, implementing recursion and function
calls, Queues - ADT, Array based implementation, Double-ended queue, Circular queue,
Linked list - ADT, Singly LL, Doubly LL, Circular LL, Stack and Queue implementation –
Complexity.
Trees: ADT - Basic tree traversals - Binary tree - Data structure for representing trees,
Priority queues: ADT - Implementation- Heaps, Types of trees – Binary search tree, AVL
tree, (2,4) tree, Red-Black tree, B and B+ trees- Complexity.
Graphs: ADT- Data structure for graphs - Basic traversal- Directed graphs - Weighted
graphs - Definition of spanning tree.
Dictionaries and Hashing: Dictionary ADT - Hash tables - Skip List - Complexity.
TEXT BOOKS:
1. Adam Drozdek, Data Structures and Algorithms in C++, Third Edition, Course
Technology, 2004.
2. Michael T. Goodrich, Roberto Tamassia and David M. Mount, Data Structures and
Algorithms in C++, Wiley publication, 2004.
REFERENCES:
1. Robert Kruse, C.L.Tondo and Bruce Leung, Data Structure and Program Design in
C, Prentice Hall of India Private Ltd, 2002
2. Jean –Paul, Tremblay and Paul G. Sorenson, An Introduction to Data Structures with
Applications, Tata McGraw-Hill, Second Edition, 2002.
6
CS202 OPERATING SYSTEMS: PRINCIPLES AND DESIGN 3-0-0-3
Protection: Kernel and Address Spaces - Address Translation - Memory allocation and
segmentation - Caching and TLBs Caching and Demand paging
Survey of I/O systems and Storage Devices: File system and disk management - Naming
and directories
Basic Networking and Protocols: Distributed file systems - Network Protocols - Network
Communication Abstractions/RPC - Security and privacy
TEXT BOOKS:
1. Silberschatz, Galvin, Operating Systems concepts, John Wiley and Sons, Seventh
Edition, 2002
2. William Stallings, Operating Systems, Prentice Hall, Fifth Edition, 2005.
REFERENCES:
1. D.M.Dhamdhere, Operating Systems, Tata Mc-Graw Hill Publishing Company
Limited, Second Revised Edition, 2004.
2. Pramod Chandra P. Bhatt, An Introduction to Operating System: Concepts and
Pratice, Prentice Hall of India Ltd, Second Edition, 2006.
3. Gary Nutt, Operating Systems, Addison-Wesley, Third Edition, 2003.
7
CS204 DESIGN AND ANALYSIS OF ALGORITHMS 3-0-0-3
Divide and Conquer: Quick sort - Merge sort - Lower bounds - Heap sort - Shell sort -
Radix sort - Comparisons of sorting - Matrix multiplication – FFT - Convex hull.
Greedy Algorithm: Dijkstra’s Single-Source shortest path - Prim’s and Kruskal’s minimum
spanning tree.
TEXT BOOKS:
1. Sara Baase, Allen Van Gelder, Computer algorithms- Introduction to Design and
Analysis, Pearson Education Asia, 2002.
2. Ellis Horowitz, Sartaj Sahni and S Rajasekaran, Fundamentals of Computer
Algorithms, Galgotia, 1998.
REFERENCES:
1. Thomas.H.Cormen, Charles.E.Leiserson, Ronald.L.Rivest, Clifford Stein,
Introduction to Algorithms, Prentice Hall of India Private Limited, 2001.
8
2. Alfred Aho, John E.Hopcroft, Jeffery Ullman, Data Structures and
Algorithms, Addison Wesley, 1983.
Introduction and the Relational Model: History and Introduction to DBMS - Data models.
Structure of Relational Databases - Fundamental Relational-Algebra Operations - Additional
Relational Algebra Operations.
9
Database Design: Overview of the Design Process - The Entity-Relationship Model –
Constraints - Entity-Relationship Diagrams - Entity-Relationship Design Issues - Weak
Entity Sets - Extended E-R Features - Reduction to Relational Schemas.
Relational Database Design: Features of Good Relational Designs - Atomic Domains and
1NF, 2NF, 3NF, 4NF, lossless decomposition, LJNF - Decomposition Using Functional
Dependencies - Functional-Dependency Theory - Decomposition Using Functional
dependencies - Decomposition Using Multi-valued Dependencies – PJNF and DKNF.
SQL: Background - SQL Data Types and Schemas - Integrity Constraints – Data Definition
- Basic Structure of SQL Queries - Set Operations - Aggregate Functions - Null Values -
Nested Sub queries - Complex Queries - Views - Join Relations – Authorization - Functions
and Procedural Constructs – Embedded SQL
Indexing and Hashing: Basic Concepts - Ordered Indices - B+-Tree Index Files - B-Tree
Index Files - Multiple-Key Access - Static Hashing - Dynamic Hashing - Comparison of
Ordered Indexing and Hashing - Bitmap Indices - Index Definition in SQL.
TEXT BOOK:
Abraham Silberschatz, Henry F.Korth and S.Sudharshan, Database System Concepts,
Tata McGraw-Hill Publishing Company Limited, Fifth Edition, 2005
REFERENCES:
1. Ramez Elmasri and Shamkant B. Navathe, Fundamentals of Database Systems,
Addison Wesley, Fifth Edition, 2006
10
CS302 FORMAL LANGUAGES AND AUTOMATA 3-1-0-4
TEXT BOOKS:
Peter Linz, An Introduction to Formal Languages and Automata, Narosa publishing
house, Fourth Edition, 2007.
REFERENCES:
1. Sipser, Michael, Introduction to the Theory of Computation. 2nd ed. Boston, MA:
Course Technology, 2005. ISBN: 0534950973.
2. Martin, John, Introduction to Languages and the Theory of Computation, New York,
NY: McGraw Hill, 2002. ISBN: 0072322004.
3. Garey, Michael, and David S. Johnson. Computers and Intractability: A Guide to the
Theory of NP-Completeness. New York, NY: W.H. Freeman and Company, 1979.
ISBN: 0716710455.
11
Managing Software Projects: Metrics for Process and Projects - Risk Management -
Quality Management - Change Management.
TEXT BOOK:
Roger S Pressman, Software Engineering – A Practitioner’s Approach, McGraw- Hill
Publishers, Sixth edition, 2005.
REFERENCES:
1. Pankaj Jalote, An Integrated Approach to Software Engineering, Narosa Publishers,
Second Edition, 2005.
2. Ian Sommerville, Software Engineering, Addison Wesley, Sixth Edition, 2003
3. Glenford J.Myers, Corey Sandler, Tom Badgett, Todd M.Thomas, The Art of
Software Testing, Wiley Publications, Second Revised(Updated) Edition, 2004.
Concurrent Design Methods: DARTS (Design Approach for Real Time Systems) -
concurrent task design -task interface design. Jackson System Development
12
Comparison of Software Design Methods: Object Oriented Analysis and Design and UML
(Unified Modeling Language (UML) notation) - Structured Analysis and design and Object
Oriented Analysis and Design - Object-Oriented Software Life Cycle.
Use Case Modeling: Use cases - actors - use case associations - Case study for use cases
Object and Class Structuring: Objects and classes - Object structuring criteria - Interface
objects - Entity objects - Control objects - Application logic objects - Case study.
Dynamic Analysis: From use case model to object interaction model - Case study.
TEXT BOOKS:
REFERENCES:
1. T. Quatrani, Visual Modeling with Rational Rose 2000 and UML, Addison Wesley,
1999.
2. Roger S. Pressman, Software Engineering, A Practitioner’s Approach, McGraw Hill ,
2005.
3. Ali Bahrami, Object Oriented Systems Development, McGraw-Hill International
Editions, 1999.
13
Logic Reasoning: Predicate Logic, Prepositional Logic, First Order Logic - Theorem, and
Situation Calculus.
Planning and Learning: Representation For Planning - Partial order Planning Algorithm -
Overview of different forms of learning - Inductive Learning. Communicative Agents -
Types of communicating Agents.
TEXT BOOKS:
1. Stuart Russell and Peter Norvig, Artificial Intelligence- A Modern Approach, Prentice
Hall, Second Edition, 2002
2. Nils J Nilsson, Principles of Artificial Intelligence, Narosa Publishing House, 2004.
REFERENCES
George J.Klir, Ute St. Clair and Bo Yuan, Fuzzy Set Theory: Foundations and
Applications, Prentice Hall, 1997
14
Overview of Java: Data types, Variables, Arrays, Operators – Classes & Methods –
Inheritance – Packages and Interfaces – Exception Handling – Multithreaded programming –
Applets – Networking - Database connectivity.
Web Security: Internet Security – Network security and Firewalls- Proxy servers
TEXT BOOKS:
1. Jeffery Dwite, Michael Erwin and Robert Niles, Using CGI, Prentice Hall of India
Pvt Ltd, Second edition, 1997.
2. Walsh, Aaron E, J2EE a Professional Guide, Tata MC-Graw Hill, 2003
3. Thomas A Powell, The Complete Reference – HTML, Tata McGraw Hill, Third
Edition, 2000.
REFERENCES:
Keiko Pitter, Sara Amato, John Callahan et al, Every Students Guide to the Internet, Tata
Mc-Graw Hill, 2005.
15
Visual C++ Programming: Introduction to VC++ - VC++ components – Types of
Applications in VC++: SDI – MDI - Dialog Based - Console based – Document-View
Architecture.
Using Controls: Edit box - Radio Button - Progress Bar – Slider - Up down control - List
View - Tree View, Labels, ActiveX.
TEXT BOOKS:
1. Charles Petzold, Programming Windows, Benjamin Cummins, Fifth Edition, 1998.
2. Kate Gregory, Using Visual C++, Prentice Hall of India Private Limited, 2002.
REFERENCES:
1. Herbert Schildt, MFC Programming from the Ground Up, Tata McGraw Hill
Publishing Company Limited, Second Edition, 2000.
2. John Paul Mueller, Visual C++ 6 from the Ground Up, Tata McGraw-Hill
Publishing Company Limited, 1998.
Introduction: The process model, virtual memory, threads, synchronization, and deadlock,
File systems, Interprocess communication, networking, and security - Architecture of Unix
Operating System – History - Kernel Data Structures.
File Sub-System And Process Sub-System: Process states and Transitions – Sleep and
Wakeup Processes - Buffer Cache – Internal Representation of Files – System Calls for the
File Systems. Process System Structure of Processes - Context – Address Space – Creation –
16
Termination – Changing the size of a Process – Process Scheduling and Memory
Management Policies
Swapping and Demand Paging: Hybrid system with Demand Paging and Swapping - I/O
System and IPC drivers Interfaces: Disk and Terminal Drivers – Streams - Process Tracking -
System V IPC - Sockets - Network Communication.
TEXT BOOK:
Bach M.J., The Design of the Unix Operating System, Prentice Hall of India Private
Limited, 1990.
REFERENCES:
1. Good heart B. Cox J, The Magic Garden Explained, Prentice Hall of India Private
Limited, 1994.
Names, Bindings, Type Checking, and Scopes: Introduction – Variables - The concept of
Binding - Type Checking - Strong typing - Type Compatibility - Scope and Life time -
Referencing Environments - Named Constants - Variable Initializations.
Data Types: Introduction - Primitive Data Types - User Defined data types - Array Types -
Associative Arrays - Record Types - Union Types - Pointers and Reference Types
17
Expressions and Assignment Statements - Statement-Level Control Structures –
Subprograms - Abstract Data Types and Encapsulation Constructs: The concept of
Abstraction - Design issues for Abstract Data Types - Parameterized Abstract Data Types –
Encapsulation Constructs and Naming Encapsulations.
TEXT BOOK:
Robert W Sebesta, Concepts of Programming Languages, Sixth Edition, Addison
Wesley, 2003
REFERENCES:
1. Harold Abelson and Gerald Jay Sussm, Structure and Interpretation of Computer
Programs, MIT Press, Second Edition, 1996, ISBN: 0262011530
2. Ravi Sethi, Programming Languages Concepts and Constructs, Addison Wesley,
Second edition, 1996.
3. W. Pratt Terrence, Marvin V. Zelkowitz, Programming Languages Design and
Implementation, Pearson Education, 2001.
TEXT BOOKS:
1. A. Miczo, Digital Logic Testing and Simulation, Wiley, 2003
18
2. N.Jha, S.Gupta, Testing of Digital Systems, Cambridge University Press, 2003
3. Lin, S., Costello, D.J, Error Control Coding: Fundamentals and Applications,
Prentice-Hall, 1983, ISBN 0-13-283796-X
1. Working with Objects using SQL for the following: Data Definition Language:
Create, Alter, Grant, Revoke, Drop, Truncate. Data Manipulation Language: Select,
Insert, Update, Delete. Transaction Control Statements - Commit, Rollback, Save
Point.
2. Constraints-Queries: Simple Selection, Projection, and Selection with Conditions.
3. Functions: Aggregate functions, Group by, Order By, Date, and conversion functions
4. Set operators, Joins, Sub Query: Simple, Nested, Co-related, Existence test,
Membership test, DDL and sub queries, and DML and Sub queries
5. Working with Other schema objects: View, Sequence, Index, Synonym, Cluster, lock,
BLOB, CLOB, Nested table, Type.
6. PL/SQL programs, Cursors, Functions, Procedures, Packages, Triggers, Exception
Handling
7. Front End Tool: Forms Creation, Validation, Triggers, and Report Generation
8. Mini Project
19
7. Interaction diagrams - Creation of sequence diagram, auto generation of collaboration
diagram
8. Creation of deployment and component diagram.
CASE STUDIES: ATM system, Course Management System.
TOOL: Rational Rose with UML / Visual Modeler, VISIO tool, Magic Draw.
20
J2EE: J2EE application based on Servlets, JSP, RMI and Java Beans - different IDE’s (Sun
studio, Eclipse, Net Beans, etc)
Hidden Line and Hidden Surface Elimination: Z buffer-Scan line - Depth sorting – Area
subdivision - Octree methods - Ray casting.
Multimedia Systems: Introduction – Audio (speech and music): capture and properties,
Video and image: capture, artifacts and properties - Color Models: Illumination & rendering,
light sources, ambient light, diffuse reflection, specular reflection, basic illumination models
Polygon rendering (Gouraud & Phong), Chromaticity diagram, Color models (RGB, CMY,
YIQ, HSV, HLS) - Animation and Morphing.
21
TEXT BOOKS:
1. Donald Hearn and M. Pauline Baker, Computer Graphics, Prentice Hall, Second
Edition, 1999.
2. John F. Koegel, G. Buford, Multimedia Systems, Addison Wesley Professional, 1994.
REFERENCES:
Roy A. Plastock & Gordon Kalley, Theory and Problems of Computer Graphics,
Schaum’s Outline Series, Tat McGraw-Hill Publishing Company Limited, 1986.
Project Effort Estimation and Scheduling: Work breakdown Structure - software effort
estimation – function point analysis - object point – COCOMO - activity planning - project
schedules - sequencing and scheduling projects - Network planning model - identifying
critical activities - Risk management - Risk planning and control - Evaluating risks to the
schedule.
TEXT BOOK:
Mike Cotterell, Bob Hughes, Software Project Management, inclination/Thomas
Computer Press, 2000.
22
REFERENCES:
1. Jack T Marchewka, Information Technology Project Management Providing
Measurable Organizational Value, Wiley Publication, 2006.
2. Darrel Ince.H Sharp and M.Woodman, Introduction to Software Project Management
and Quality Assurance, Tata Mc-Graw Hill, 1995.
3. Roger S Pressman, Software Engineering – A Practitioner’s Approach, McGraw- Hill
Publishers, Sixth edition, 2005.
This course analyzes issues associated with the implementation of high-level programming
languages. Topics covered include: fundamental concepts, functions, and structures of
compilers, basic program optimization techniques, the interaction of theory and practice, and
using tools in building software. The course features a multi-person project on design and
implementation of a compiler that is written in Java® and generates MIPS executable
machine code.
TEXT BOOKS:
1. Appel, Andrew W., Modern Compiler Implementation in Java®, Cambridge, UK:
Cambridge University Press, 1997.
2. Aho, Alfred V., Ravi Sethi, and Jeffrey Ullman, Compilers: Principles, Techniques
and Tools, Addison-Wesley, 1986.
REFERENCES:
23
1. Muchnick, Steven, Advanced Compiler Design and Implementation, First Edition,
San Mateo, CA: Morgan Kaufman, 1997.
2. Cooper, Keith, and Linda Torczon, Engineering a Compiler, San Mateo, CA: Morgan
Kaufman, 2003.
Introduction: The Machines - The Software - The Reality of High Performance Computing
- Modern Algorithms – Compilers - Scientific Algorithms – History - State-of-Art and
Perspective - Things that are not Traditional Supercomputers Parallel Computing - PDC
models working mechanism - scalability of PDC architectures - applications.
TEXT BOOKS:
1. Barry Wilkinson and Michael Allen, Parallel Programming Techniques and
Applications using Networked Workstations and Parallel Computer, Prentice Hall,
Upper Saddle River 2004.
24
2. Andrew Tanenbaum, Distributed Operating Systems, Prentice Hall 1999.
REFERENCES:
Rishyur. S. Nikhil and Arvind, Implicit Parallel Programming in PH, Morgan
Kaufman, 2001.
TEXT BOOKS:
1. A. E. Eiben and J. E. Smith, Introduction to Evolutionary Computing, Springer -
Natural Computing Series, 2003.
REFERENCES:
1. Kenneth A. De Jong, Evolutionary Computation: A Unified Approach, MIT Press,
2002.
25
2. David Corne, Marco Dorigo and Fred Glover, New Ideas in Optimization, McGraw
Hill Education, 1999.
3. David B. Fogel, Evolutionary Computation: The Fossil Record, John Wiley-IEEE
Press, 1998.
Non Metric Methods: decision trees – CART methods – algorithm independent machine
learning- bias and variance – regression and classification - classifiers – Unsupervised
learning and clustering – mixture densities and identifiably – hierarchical clustering – low
dimensional representation – multidimensional scaling
TEXT BOOKS:
1. Richard O Duda, Peter E Hart, David G Stork,, Pattern Classification, John Wiley &
sons Inc., Second Edition, 2003.
2. Earl Gose, Richard Johnsonbaugh, Steve Jost, Pattern Recognition and Image
Analysis, Prentice Hall of India, 2002.
REFERENCES:
26
2. Christopher M. Bishop, Neural networks for Pattern Recognition, Oxford University
Press, 1995.
Database Architecture: The models - The Database Instance - Connection & Sessions –
Physical and Logical Structure of a Database - Understanding the memory structure -
Understanding the process structure - Understanding the logical structure.
Creating a new database & Managing DB Instance: Creating a Database GUI & manual
– Initialization parameter file -Various options available to shutdown an instance Monitoring
Alert and Trace files - Understanding operating system and password file authentication
Managing Data Dictionary & Other Files: Data dictionary – Managing the data dictionary
- Control file - Log files - Control log switches and checkpoints – Managing Data files.
Managing Logical Data Storage Structure: Logical structure of the database (segments,
extents, blocks) - Creating and Managing Logical Storage Structure – Maintaining storage
structures manually - Mapping Logical Storage to Physical Storage – Managing DB Objects
Basic Net Architecture: Net architecture – Listener - Protocol – Port – Net Service - Session
– Managing & Configuring the Listener in the Server - Configuring the Net Service at the
client side.
Backup and Recovery Overview: Introduction to Backup & Recovery – Types of Failures –
Recovery Methods
Instance and Media Recovery Structures: Background Processes, Memory Structures, and
Files Relating to Recovery – Tune Instance Recovery - User-Managed Backup and Recovery
Operations - DB Verifier - Media Recovery - Transporting Data Between Databases.
27
Service Theft, Corruption, and Disruption - Encryption and Decryption - Public Key
Infrastructure (PKI) - Firewalls.
TEXT BOOKS:
1. Craig S. Mullins, Database Administration: The Complete Guide to Practices and
Procedures, Addison-Wesley, 2002
2. Kevin Lonely, Oracle Database 9i DBA Handbook, Oracle Press, 2002
3. George Baklarz and Bill Wong- DB2 Universal Database V8 for Linux, UNIX, and
Windows- Prentice Hall PTR - 2003
XML: Background –Structure of XML Data – XML Document Schema – Querying and
Transformation – API – Storage of XML Data – XML Applications, EBXML, Native XML
database.
28
TEXT BOOK:
Abraham Silberschatz, Henry F Korth, S Sudarshan Database System Concepts,
Fourth Edition, McGraw-Hill, 2002
REFERENCES:
Hector Garcia-Molina, Jeff Ullman, and Jennifer Widom., Database Systems: The
Complete Book, Prentice-Hall, 2002.
TEXT BOOKS:
1. Cockburn, Agile Software Development, Pearson Education India, 2002
2. Larman, Agile and Iterative Development - A Manager's Guide",Pearson Education
India, 2004
REFERENCE:
J. Langr, Agile Java - Crafting Code with Test-Driven Development, Pearson
Education India, 2006
29
CS427 PRINCIPLES OF DIGITAL IMAGE PROCESSING 3-0-0-3
TEXT BOOKS:
1. Gonzalez and Woods, Digital Image Processing, Prentice Hall, 2007.
2. Gonzalez, Woods and Eddins, Digital Image Processing using MATLAB. Prentice
Hall, 2004.
REFERENCE:
Kenneth R Castleman, Digital Image Processing, Prentice Hall, 1996
30
Watermarking with side information: Informed embedding – informed coding – dirty
paper codes.
TEXT BOOK:
Ingemar Cox, Matthew Miller, Jeffrey Bloom, Mathew Miller, Digital Watermarking:
Principles and Practice, Morgan Kaufmann Series in Multimedia Information and
Systems, 2002
REFERENCES:
1. Stefan Katzenbeisser, Fabien A. P. Petitcolas, Information Hiding Techniques for
Steganography and Digital Watermarking, Artech House, Inc. 685 Canton Street,
Norwood, MA 02062, 2000 ISBN: 1-58053-035-4
2. Juergen Seitz, Digital Watermarking for Digital media, Information Science
Publishing (an imprint of Idea Group Inc.), ISBN 1-59140-518-1 (h/c) -- ISBN 1-
59140-519-X (s/c) -- ISBN 1-59140-520-3 (ebook), 2005
The engineering of computer software and hardware systems - Techniques for controlling
complexity - Strong modularity using client-server design - Virtual memory, and threads -
Networks - Atomicity and coordination of parallel activities - Recovery and reliability -
Privacy, security, and encryption - Impact of computer systems on society – (case studies of
working systems and readings from the current literature provide comparisons and contrasts,
and do design project, extensive written communication exercises).
TEXT BOOK:
Saltzer, Jerome H., and M. Frans Kaashoek. Principles of Computer System Design.
(6.033 class notes, draft release 2.0, MIT, February 2005.)
REFERENCES:
31
Brooks, Frederick P., Jr. The Mythical Man-Month. Reading, MA: Addison-Wesley,
1995. ISBN: 0201835959. (This book is primarily used at the end of the term. The
1974 edition is also usable in 6.033.)
Fuzzy Logic and Rough Sets: Intelligent System to support Judgmental decision forecasting
– Case Study: Estimating Hotel Room Demand – Rough sets theory and Multivariate Data
Analysis in Classification problems
Artificial Neural Networks and Support Vector Machine: Case Studies- Forecasting the
opening cash price index in integrating Gray forecasting and neural networks – Support
vector model for currency crises determination – Saliency analysis of support vector
machines for feature selection
TEXT BOOK:
Shu-Heng Chen, Paul P. Wang, Computational Intelligence in Economics and
Finance (Advanced Information Processing), Springer-Verlag Berlin Heidelberg,
2004, ISBN 3-540-44098-4.
REFERENCES:
1. Shu-Heng Chen, Genetic Algorithms and Genetic Programming in Computational
Finance, Kluwer Academic Publishers, 2002, ISBN:0- 7923-7601-3.
32
2. Paul D Mcnelis, Neural Network in Finance: Gaining Predictive Edge in the Market,
Elsevier Academic Press, 2005, ISBN:0-12-485967-4.
TEXT BOOK:
Amit Konar, Computational Intelligence: Principles, Techniques and Applications,
Springer-Verlag Berlin Heidelberg, 2005, ISBN 3-540-20898-4.
REFERENCES:
1. Russel C Eberhart, Yuhui Shi, Computational Intelligence: Concepts to
Implementations, Morgan Kaufmann, 2007, ISBN 978-1558607590
2. Andries P. Engelbrecht, Computational Intelligence: An Introduction, Wiley; 2Rev
Ed edition, 2007, ISBN 978-0470035610
3. Lipo Wang, Xiuju Fu, Data Mining with Computational Intelligence (Advanced
Information and Knowledge Processing), Springer, first edition, 2005, ISBN 978-
3540245223
4. Lech Polkowski, Rough Sets, Physica-Verlag Heidelberg, First edition, 2003, ISBN
978-3790815108
33
CS432 INFORMATION RETRIEVAL 3-0-0-3
Introduction: Goals and history of IR - The impact of the web on IR - The role of artificial
intelligence (AI) in IR.
IR Models: Boolean and vector-space retrieval models - Probabilistic Model - Fuzzy and
Extended Boolean Models - ranked retrieval - text-similarity metrics - TF-IDF (term
frequency/inverse document frequency) weighting - cosine similarity.
Text Representation & Web Search: Word statistics - Zipf's law - Porter stemmer –
morphology - index term selection - Search engines – spidering – meta crawlers - link
analysis
Information Extraction and Integration: Extracting data from text – XML - semantic web
- collecting and integrating specialized information on the web.
TEXT BOOK -
Ricardo Baeza-Yates and Berthier Ribeiro-Neto, Modern Information Retrieval
(MIR), Addison-Wesley, 2000
34
CS433 MULTIMEDIA DATABASES 3-0-0-3
Multidimensional Data structures: k-d trees, Quadtrees – Oct trees – MX trees – R-trees.
TEXT BOOK:
V.S. Subhramanian, Principles of Multimedia Database Systems, Morgan Kaufmann
Publisher, 2001.
REFERENCES:
1. Khoshafian, Multimedia and Imaging Databases, Lavoisier Publications, 1997
2. Lynne Dunckley, Multimedia Databases: An Object Relational Approach
Addison Wesley, 2002
35
Design Pattern in Java Foundation Classes: Simple JFC program, Buttons and Toolbars,
Menus and Action Objects, JTables, JList, JTrees - Creational - Structural Patterns -
Behavioral Patterns.
Case Study: use of patterns in the design of a modern web framework - Smallworld Internet
Application Server / Apache Axis / Apache Cocoon / Ruby on Rails / Python's Django.
TEXT BOOK:
1. E. Gamma, R. Helm, R. Johnson, J. Vlissides, Design Patterns - Elements of
Reusable Object-Oriented Software, Pearson Education India, 1995 and Addison-
Wesley Publishing Company, 1995
2. James W. Cooper, Java Design Patterns: A Tutorial, Addison-Wesley Professional,
Pap/Cdr Edition, 2000. ISBN-10: 0201485397
REFERENCES:
36
The OMG Way (CORBA, CCM, OMA, and MDA), Microsoft COM, .NET CLR: The
first fundamental wiring model – COM, DCOM, .NET Framework, Common language
frameworks, XML and data - Enterprise services - Web services with .NET.
Text Book:
Clemens Szypersk Dominik Gruntz and Stephan Mureri, Component Software
Beyond object- Oriented Programming, Pearson Education, Second Edition.
Introduction to Image Processing and Image Analysis: Digitized image and its properties,
image sampling and quantization, image representation, thresholding (binarization), basics of
Morphological operations (Dilation, Erosion, Opening, Closing, Skeletonizing), Pre-
processing (Noise removal) and Segmentation. Foundations of 2D , 3D and nD image
processing
Medical Image Analysis: Specifics of medical imaging and medical image analysis, medical
imaging modalities, basics of medical imaging physics, medical image data formats.
Medical Image Segmentation, Medical Image Registration.Tissue characterization,
validation, cardiovascular, pulmonary – case studies
TEXT BOOKS:
1. Gonzalez and Woods, Digital Image Processing, Prentice Hall, 2007.
2. Atam .P. Dhawan, Medical Image Analysis, IEEE Press, 2003.
REFERENCES:
M.Sonka and J.Michael Fitzpatrick, Handbook of Medical Imaging, Volume 2,
Medical Image Processing and Analysis, 2000.
37
CS437 COMPUTER VISION 3-0-0-3
Motion: optical flow, vector fields, reconstruction from optical flow, tracking, motion
segmentation and multiple motions
Learning and Statistical Models: ANNs, SVMs, EM and HMM - Tracking and Video
analysis - Applications of computer vision.
TEXT BOOKS:
1. Linda G. Shapiro and G. Stockman, Computer Vision, Prentice Hall, 2001.
REFERENCES:
1. David A. Forsyth and Jean Ponce, Computer Vision – A Modern Approach, Prentice
Hall, 2002.
2. E. R. Davies, Machine Vision: Theory, Algorithms, Practicalities, Morgan
Kaufmann, 2004.
3. Ramesh Jain, Rangachar Kasturi and Brian G. Schunck, Machine Vision, McGraw
Hill, 1995.
38
CS439 CRYPTOGRAPHY 3-0-0-3
Mathematical Foundations: Number theory - Finite fields - Primitive roots – Square roots -
Exponentiation and discrete logarithm.
Secret-Key Cryptography: Block ciphers and stream ciphers. DES, AES, RC4 - Modes of
operation.
TEXT BOOKS:
1. William Stallings, Cryptography and Network Security, Pearson Education Asia,
Prentice Hall, Third Edition, 2000.
2. D. R. Stinson. Cryptography: Theory and Practice, CRC Press. Third Edition, 2005.
REFERENCES:
W. Trappe and L. C. Washington. Introduction to Cryptography with Coding Theory,
Prentice-Hall, 2002. ISBN: 0-13-061814-4.
Data Mining: Evolution and importance - kinds of data and functionalities - Classification of
database system - Major issues in Data Mining.
39
Data Preprocessing: Summarization – Cleaning – Integration and Transformation –
Reduction – Discretization and Concept Hierarchy.
Mining Frequent Patterns: Basic concepts – Frequent Item set mining methods – Mining
Association rules – from Association to correlation analysis.
TEXT BOOKS:
1. Jiawei Han and Micheline Kamber, Data Mining Concepts and Techniques, Elsevier,
Morgan Kaufmann Publishers, Second edition, 2006.
2. K. P. Soman, Shyam Diwakar and V. Ajay, Insight into Data Mining Theory and
Practice, PHI of India, 2006.
REFERENCE:
1. William H Inmon, Building the Data Warehouse, Wiley Publications, Fourth Edition,
2005.
40
Driven DSS – Data Driven DSS – Document Driven DSS – Knowledge Driven DSS – Model
Driven DSS – History of DSS
Decision Making and Models: Classification Scheme for DSS - The Rational Model -
Simon’s Normative Model - Group Decision Making –Individual Decision Making -
Individual vs. Group Decision Making - The State Space Approach to Decision Support -
The Problem Reduction Approach to Decision Support - A Production System Approach to
DSS
Decision Support Systems & Database: Conceptual and Operational Constructs for
Building a Data Base Knowledge System - Conceptual Constructs for Representing
Knowledge - Simple Files and Tables - Associative Relationship between Aggregate
Concepts - Building a Data Base Knowledge System - Indirect Associations among Concepts
Language Systems for Data Base Knowledge Systems: Languages for Directing Retrieval
- Languages for Directing Computations in the Case of Data Base Knowledge Systems -
Problem-Processing Systems for Data Base Knowledge Systems - Problem Processing for
Retrieval-Only DSS - Problem Processors for Computationally Oriented DSS
Formal Logic Approach to Decision Support: The Language and Knowledge Systems of a
DSS Based on Formal Logic - Conceptual Framework - Operational Constructs - A
Language System for Predicate Expressions - Combining the Data Base and Formal Logic
Approaches – Data Mining Data Warehousing
TEXT BOOKS:
1. Daniel J. Power, Decision Support Systems: Concepts and Resources for Managers,
Quorum/Greenwood, 2002
41
REFERENCE:
1. Bonczek, R. H., C. W. Holsapple, and A. Whinston, Foundations of Decision Support
Systems, Academic Press, 1981
Evolution of Legacy Systems: Characteristics of legacy systems, and challenges for their
evolution. Migration of legacy systems. The re-technologies: re-structuring, reverse-
engineering - re-engineering – process model
TEXT BOOKS:
1. Lowell Jay Arthur, Software Evolution: A Software Maintenance Challenge, John
Wiley and Sons, 1988
REFERENCES:
42
1. Sommerville, Software Engineering, Pearson Education, Eighth Edition, 2006.
2. Roger S Pressman, Software Engineering: A Practitioner's Approach, McGraw-Hill,
Sixth Edition, 2005.
3. Len Bass, Paul Clements, Rick Kazman, Software Architecture in Practice, Pearson
Education, Addison-Wesley, Second Edition, 2003.
Introduction to Economics: The Firm and Its Goals - Review of Mathematical Concepts
Used in Managerial Economics, Supply and Demand - The Mathematics of Supply and
Demand, Demand Elasticity - Applications of Supply and Demand, Demand Estimation and
Forecasting, The Theory and Estimation of Production - The Multiple-Input Case -
Expressing the Production Function with the Use of Calculus, The Theory and Estimation of
Cost - A Mathematical Restatement of the Short-Run Cost Function - The Estimation of Cost
Pricing and Output Decisions: Perfect Competition and Monopoly - The Use of Calculus
in Pricing and Output Decisions - Break-Even Analysis (Volume-Cost-Profit), Monopolistic
Competition and Oligopoly - Special Pricing Practices
TEXT BOOKS:
1. Stephen P, Robbins David A. De Cenzo, Fundamentals of Management, Prentice Hall
Sixth Edition, 2008. ISBN- 10: 0136007104, ISBN-13: 9780136007104
43
2. Paul G. Keat, Philip K. Young, Managerial Economics: Economic Tools for Today's
Decision Makers, Prentice Hall, Fifth Edition, 2006, ISBN-10: 0131860151, ISBN-
13: 9780131860155.
TEXT BOOKS:
1. Cusumano, Michael A, The Business of Software: What Every Manager,
Programmer, and Entrepreneur Must Know in Good Times and Bad, New York, NY:
Free Press, 2004. ISBN: 074321580X.
2. Moore, Geoffrey, Crossing the Chasm: Marketing and Selling High-Tech Products to
Mainstream Customers, Revised ed. New York, NY: HarperBusiness, 1999. ISBN:
0887307175.
REFERENCES:
1. Campbell-Kelly, Martin, A History of the Software Industry: From Airline
Reservations to Sonic the Hedgehog, Cambridge, MA: MIT Press, 2003. ISBN:
0262033038.
2. McConnell, Steve, Rapid Development, Redmond, WA: Microsoft Press, 1996.
ISBN: 1556159005.
3. Moody, Glyn, Rebel Code: Inside Linux® and the Open Source Revolution.
Cambridge, MA: Perseus Publication, 2001. ISBN: 0738203335.
4. Nesheim, John, High-Tech Start Up, New York, NY: Free Press, 2000. ISBN:
068487170X.
44
CS491 COMPUTER GRAPHICS AND VISUALIZATION LABORATORY 0-0-3-1
Mini Project: To design a simple graphics editor with the following functions
(i) Draw and color different shapes
(ii) Perform basic transformations
45
12. Program to generate DAG for the given expression.
13. Program to simulate the storage management.
14. Program to generate a code for a given intermediate code.
46