Scope oI AI 1. Introduction to ArtiIicial Intelligence Practical None 2 Problem solving and Scope oI AI 2. Applications- Games, theorem proving, natural language processing, Practical None 3 Problem solving and Scope oI AI 3. vision and speech processing, robotics, expert systems. AI techniques- search Practical None 4 Problem Solving 1. State space search; Production systems, Practical None 5 Problem Solving 2. search space control: depth-Iirst, breadth-Iirst search. Heuristic search - Hill climbing, best-Iirst search, branch and bound Practical None 6 Problem Solving 3. Problem Reduction, Constraint SatisIaction End, Means-End Analysis Practical None 7 Knowledge Representation 1. Knowledge Representation issues, Iirst order predicate calculus, Practical None 8 Knowledge Representation 2. Horn Clauses, Resolution, Semantic Nets, Practical None 9 Knowledge Representation 3. Frames, Partitioned Nets, Practical None 10 Knowledge Representation 4. Procedural Vs Declarative knowledge, Practical None 11 Knowledge Representation Forward Vs Backward Reasoning. Practical None 12 Understanding Natural Languages 1. Introduction to NLP, Basics oI Syntactic Processing, Practical None 13 Understanding Natural Languages Basics oI Semantic Analysis, Practical None 14 Understanding Natural Languages 3. Basics oI Parsing techniques, context Iree and transIormational grammars, transition nets, augmented transition nets, Practical None 15 Understanding Natural Languages 4. Shanks Conceptual Dependency, Scripts, Basics oI grammar Iree analyzers Practical None 16 Understanding Natural Languages 5. Basics oI sentence generation, and Basics oI translation. Practical None 17 Expert System: 1. Need and justiIication Ior expert systems, Practical None 18 Expert System: 2. knowledge acquisition, Case studies: MYCIN, RI. Practical None 19 Expert System: Learning: 1. Concept oI learning, learning automation Practical None 20 Expert System: 2. genetic algorithm, Practical None 21 Expert System: 3. learning by inductions, neural nets. Practical None 22 Expert System: Programming Language: 1. Introduction to programming Language, Practical None 23 Expert System: 2. LISP and PROLOG. Practical None 24 Expert System: Handling Uncertainties: 1. Non-monotonic reasoning, Probabilistic reasoning, Practical None 25 Expert System: 2. use oI certainty Iactors, Fuzzy logic. Practical None 26 Introduction to Robotics 1. Fundamentals oI Robotics, Practical None 27 Introduction to Robotics 2. Robot Kinematics: Position Analysis, Dynamic Analysis and Forces, Trajectory Practical None 28 Introduction to Robotics 3. Sensors and vision system. Practical None 29 Introduction to Robotics 1. Introduction, the three levels oI robot programming, requirements oI a robot Practical None 30 Introduction to Robotics 2. problems peculiar to robot programming languages. Practical None Course Material Session Plan 1 Overview oI HTML Overview oI HTML Lecture None 2 Basics oI .Net Features oI .NET, .NET Framework, CLR, MSIL, .NET class library, .NET Languages, CTS Lecture None 3 Basics oI .Net What is ASP.NET?, DiIIerence between ASP and ASP.NET, web server, web browser Lecture None 4 Introduction to C# Introduction to C# Lecture None 5 Understanding ASP.NET assemblies, maniIest, and metadata Overview oI Dynamic Web page, Understanding ASP.NET Controls Lecture None 6 Understanding ASP.NET Applications, Web servers, web browsers, Installation oI IIS Lecture None 7 Understanding ASP.NET Web Iorms, web Iorm controls -server controls Lecture None 8 controls client controls. Adding controls to a web Iorm, Lecture None 9 controls Buttons, Text Box, Labels, Checkbox, Radio Buttons, List Box, Adding controls at runtime Lecture None 10 web Application Running a web Application, creating a multiIorm web Lecture None project 11 Form Validation Client side validation, server Side validation, Lecture None 12 Form Validation validation Controls: Required Field Comparison Range Lecture None 13 Controls Calendarcontrol, Ad rotator Control Lecture None 14 Controls Internet Explorer Control. Lecture None 15 ADO.NET What is ADO.NET, Irom ADO to ADO .NET Lecture None 16 ADO.NET ADO.NET architecture Lecture None 17 Data Adapters Accessing Data using Data Adapters and Datasets, Lecture None 18 Data Adapters using Command & Data Reader Lecture None 19 data bind Controls binding data to data bind Controls Lecture None 20 data bind Controls displaying data in data grid Lecture None 21 XML XML basics, attributes Lecture None 22 XML Iundamental XML classes: Document, text writer, text reader Lecture None 23 XML validations XML validations, XML in ADO.NET, Lecture None 24 XML validations The XML Data Document. Lecture None 25 error handling Creating, tracking, caching, error handling Lecture None 26 error handling Creating, tracking, caching, error handling Lecture None 27 Securing ASP.NET Securing ASP.NET applications- Iorm based applications Lecture None 28 Securing ASP.NET window based application. Lecture None 29 State management Introduction, State management - View state, Lecture None 30 State management Session state Lecture None 31 State management Application state Lecture None 32 ASP.NET web services Building ASP.NET web services Lecture None 33 ASP.NET web services Building ASP.NET web services Lecture None 34 applications working with ASP.NET applications Lecture None 35 custom controls creating custom controls Lecture None Course Material
1 Security Attacks (Interruption, Interception, Modi Lecture None 2 Security Services (ConIidentiality, Authenticatio Lecture None 3 Non-repudiation, access Control and Availability) Lecture None 4 A model Ior Internetwork security, Internet Standa Lecture None 5 BuIIer overIlow Lecture None 6 Iormat string vulnerabilities Lecture None 7 TCP session hijacking, ARP attacks, Lecture None 8 route table modiIication, UDP hijacking, and Lecture None 9 man-in-the-middle attacks Lecture None 10 Conventional Encryption Principles, Conventional e Lecture None 11 Conventional Encryption Principles, Conventional e Lecture None 12 cipher block modes oI operation, Lecture None 13 location oI encryption devices, Lecture None 14 key distribution Approaches oI Message Authenticat Lecture None 15 Secure Hash Functions and HMAC, Lecture None 16 Public key cryptography principles Lecture None 17 public key cryptography algorithms Lecture None 18 digital signatures, Lecture None 19 digital CertiIicates, CertiIicate Authority and ke Lecture None 20 Email privacy: Pretty Good Privacy (PGP) Lecture None 21 and S/MIME Lecture None 22 IP Security Overview, Lecture None 23 IP Security Architecture, Authentication Header, Lecture None 24 Encapsulating Security Payload, Lecture None 25 Combining Security Associations and Key Management Lecture None 26 Web Security Requirements, Secure Socket Layer (SS Lecture None 27 Transport Layer Security (TLS), Lecture None 28 Secure Electronic Transaction (SET) Lecture None 29 Basic concepts oI SNMP, SNMPv1 Community Iacility Lecture None 30 SNMPv3, Lecture None 31 Intruders, Viruses and related threats Lecture None 32 Firewall Design principles, Lecture None 33 Trusted Systems, Lecture None 34 Intrusion Detection Systems Lecture None 35 Intrusion Detection Systems Lecture None Course Material
1 Module I Introduction to the Course Introduction to SPM, Course Objective, Evaluation scheme and Criteria Lecture None 2 SoItware Introduction to Project Management Nature oI SoItware Production , Key Objectives oI EIIective Management, Terminology -Quality, Risk Reduction , Productivity Lecture None 3 Project Management Importance oI SPM, Plans , Methods, Methodologies, Problems with SPM, stakeholders, Setting Objectives , Role oI PM Lecture None 4 Module-II, Planning the Project stepwise project planning , determining objectives, proposal writing , requirement analysis , Lecture None 5 Planning the Project legal issues - patent , copyright, liability, warranty Lecture None 6 Module- III, Technical Planning LiIe Cycle Models ,choice oI process models, types oI plans, Lecture None 7 Technical Planning documentation methods PERT, CPM Lecture None 8 Technical Planning GanttCharts , WBS , Standards Lecture None 9 Management Allocation oI resources, strategic Programme Management, BeneIits Management Lecture None 10 Management Cost BeneIit Evaluation Technique, Risk Evaluation Lecture None 11 Module IV Risk Management Risk, Categories, Risk IdentiIication, Assessment Lecture None 12 Risk Management Evaluating Risk to the schedule, Applying PERT techniques Lecture None 13 Risk Management Monte Carlo Simulation, Critical Chain Concepts Lecture None 14 EIIort Estimation Over and under estimates, eIIort estimation techniques Lecture None 15 EIIort Estimtion expert judgement, estimating by analogy , Albrecht Iunction point analysis Lecture None 16 Activity Planning Objectives oI activity planning, schedules, projects and activities Lecture None 17 Planning Schedules, Sequencing , Iorward pass, backward pass Lecture None 18 Planning Activity Iloat, identiIying critical activities, Activity on arrow networks Lecture None 19 Planning Formulating a network model , exercises and examples Lecture None 20 Resource Allocation nature oI resources , scheduling the resources, counting the cost Lecture None 21 Resource Allocation cost schedules, scheduling sequence Lecture None 22 Monitoring and Control Iramework, visualizing progress, Earned Value Analysis Lecture None 23 Managing Contracts introduction, terms oI contract management Lecture None 24 Managing Contracts Supply Process, Types oI Contracts, Contract Management Lecture None 25 Module V Evaluating the Project Control, reviews, Ieedback, Lecture None 26 Managing People Understanding behaviour, selecting the right person, motivation, team Lecture None 27 Managing People The Oldham-Hackman job characteristics model, becoming a team Lecture None 28 Organizing Teams Decision making , Leadership, organizational structures , trainings Lecture None 29 SoItware Quality Introduction, Place OI Quality in Poject Planning , DeIining Quality Lecture None 30 SoItware Quality Importance, quality measures, standards and techniques on enhancing quality Lecture None 31 Project Plan Developing a Project Plan Lecture None 32 Delivery Managing Project Delivery, Project Closure Lecture None 33 Tutorial 1 IdentiIy the main types oI personnel employed in an inIormation systems department. For each stage oI a typical IS development project, list the types oI personnel who are likely to be involved. Tutorial None 34 Tutorial 2 What products must exist beIore the activity test program` can take place? What products does this activity create? Tutorial None 35 Tutorial 3 Working in a group oI three or Iour, imagine that you are about to embark upon a programming assignment Tutorial None as part oI the assessed work Ior your course. Draw up a list oI the risks that might aIIect the assignment outcome. Individually classiIy the importance and likelihood oI each oI those risk as high, medium or low. When you have done this compare your results and try to come up with an agreed project risk matrix 36 Tutorial 4 An invoicing system is to have the Iollowing components: amend invoice, produce invoice, produce monthly statements, record cash payment, clear paid invoices Irom database, create customer records, delete customer. (a) What physical dependencies govern the order in which these transactions are implemented Tutorial None 37 Tutorial 5 II You were asked as an expert to provide an estimate oI eIIort needed to make certain changes to an existing piece oI soItware, what inIormation would you like to have to hand to assist you in making that estimate. Tutorial None 38 Tutorial 6 Draw an activity network using activity on arrow network conventions Ior each oI the Iollowing projects(1) choosing and purchasing a desktop computer (2) organising and carrying out a survey oI user's opinion oI an inIormation system Tutorial None 39 Tutorial 7 Sam is a Iinal year computing under graduate student who in his third year undertook a placement with the ICT dept. oI an insurance company as a support analyst and thn a network manager. The placement year was very busy and rewarding as a company saw ICT as providing bussiness advantage in a what was a very dynamic and aggressivelyt competetive sector. The project that Sam proposes to do in his Iinal year will use the insurance company as a client. The proposed project involves gathering requirements Ior an application that records details oI change requests, Ior operation systems, made by users and then tracks the subsequent progress oI the change. Having gathered the requirements, he is to desogn the application, then build and implement it. IdentiIy possible risks in the proposed project oI which Sam should take account. Tutorial None 40 Tutorial 8 Excercises on critical path and resource sheduling Tutorial None 41 Tutorial 9 Problems on Eared Value Analysis Tutorial None 42 Tutorial 10 A soItware house needed a training course developed to introduce new users to an order processing application that they had developed. Assume that you are an independent training consultant who has been approached by the soItware house to develop the training package. You have agreed in principle and now a contract is being negotiated Ior the work. Tutorial None Course Material -