0 calificaciones0% encontró este documento útil (0 votos)
16 vistas28 páginas
This course covers the various aspects of Computer Security such as program security, operating system security, network security and databasesecurity. The course also covers risk management, BCP and legal and ethical issues related tocomputer security.
This course covers the various aspects of Computer Security such as program security, operating system security, network security and databasesecurity. The course also covers risk management, BCP and legal and ethical issues related tocomputer security.
This course covers the various aspects of Computer Security such as program security, operating system security, network security and databasesecurity. The course also covers risk management, BCP and legal and ethical issues related tocomputer security.
1 Program: B. Tech (Computer Engineering) 1 ~ e r n e s i t
1 Code :BTCOO7001 Evaluation Scheme 1 Theory I Internal Continuous Lecture Practical Assessment (ICA) -- 3 2 I Pre-requisite: Operating systems(BTC004003), Database Management ~stem(BTC003006), Computer Networks(BTC004004) 0bjectives: Thiscourseisan introduction to thefield of Computer Security. The course covers the various aspects of cornputer security such as program security, operating system security, network security and databasesecurity. This course also covers risk management, BCP and legal and ethical issues related to com~ut ersecuritv Outcomes: After successful completion of thiscourse, studentswill beabl eto I Understand thefundamentalsof computer security wi t h theapplication of knowledgeof operating systems and databasesystems. 1 Understand thevariousthreatsto cornputer system and conduct experiments to implement the different techniques to overcome thesethreats. Demonstratethe understanding of the contents of this course and relatew ith thecurrent research being carried out i n theseareas. Detailed Syllabus: - Uni t 1 Description Introduction: Duration 3 4 Basic Components of Computer security(CIA), vulnerabilities, threats Attacks and controls ,goals of security, Computer criminals, Internet Sandardsand RFC. various Security attacks, method of defense, Design Principles. security policies Cryptography basics, transposition ciphers, substitution ciphers, DES, Public key cryptography, streams and block ciphers, Key - 4 Management, Digital Sgnature. Program Security: Secure programs, Non malicious Program Errors, Virusesand -- -- - -- -- 4 / Comput er En g i n e e r i n g Page( 9 2 othermaliciouscode,typesofviruses,attackmechanismof I - ? viruses,TargetedMaliciousCode,ControlsAgainstProgram Threats. OperatingSystemSecurity:Protectedobjectsandmdhodsof protection,Memoryaddressprotection,Controlofaccessto generalobjects,Fileprotectionmechanism -- Database Security: Security requirements, Reliability tand 3 4 integrity,Sensitivedata,inference.~ul t i l ev el database,Proposals for multilevelsecurity Network Security: threats i n controls -- Authentication: Authentication basics, Password, Challenge response, SSO, Biometries AazssControl:, Accesscontrol pri ncses, ACL,DAC,MAC, and RolebasedAccessControl,Accesscontrol models,Kerberos ~p Firewall, Kinds of Firewalls, Filtering Services, DMZ, Implementingpolicies (Default allow, Default Deny) on proxy, IDS,typesofI DS Risk ManagementandBusinessContinuityplanning: Risk analysis, various terminologies associated wi t h risk management, Risk assessment techniques, managing risk, steps for risk management, Bu s i n s impact analysis, various terminologiesassociated wi th BIA,Different types of continuity planning,testingandrevisingtheplan Laws,investigationsandEthicv. Introduction, types of computer crimes, modus operandi,( computerforensics,ethicalissuesincomputersecurity 1 Total I TextBooks: 1. M. Bishop,S.S. Venkatramanayya,"IntroductiontoComputerSecurity", PearsonEducation,2009 2. M.Whitman,H.Mattford, "PrinciplesofInformationSecurity",Cengage Learning,2ndedition,2009. 3. C.Pfleeger,S. Pfleeger,"Securityi nComputing",PearsonEducation,4Ih edition,2008. ReferenceBooks: 1. B. Schneier," Applied Cryptography:Protocols,Algorithmsand Sourcecodein C",Znd Ed.,Wiley ,2004 1 2. A. Kahate,"Cryptography& Network --Security",TMH,Zndedition,2009. - C o mp u t e r E n g i n e e r i n g Pa g e 193 3. Dr.%an Smith," TheCraftofasternSecurity",11 e , PearsonEducation. 4. M. Merkow, J. Breithaupt," Information Security Principles and Practices", PearsonEducation,2007. 5. C. Kaufman, R. Perlman, M. Speciner "Network Security Private Communication inaPublicWorld",PearsonEducation,200 AlfredBasta,WolfHal ton,"Computer SecurityConcepts,Issuesand Implementation",CengageLearning,1" Edition,CourseTechnologyl cengage Learning(2009) TermWork: 1. Minimumt woAssignments. 2. Twoclasstests. 3. Minimum10practicalexperimentscoveringallthetopics. I 1 C o m p u t e r En g i n e e r i n g Page194 Program: B.Tech.(Computer Engineering) 1 Semester:VII Course: IntelligentSystems 1 Code:BTC007002 TeachingScheme EvaluationScheme Theory InternalContinuous Lecture Practical Tutorial Credit (3Hrs, Assessment(ICA) 100 Marks) As perInsti tuteNorms 3 2 0 4 50 50 Pre-requisite:Advanced ProgrammingConceptsandDataStructures 0bjectives: Theaim ofthecoursei stoimpartknowledgeofthecurrenttheories, methodsand techniques i n the field of Artificial Intelligence like heuristic search techniques, knowledge technology, gaming, learning techniques etc. this subject also make student capable to apply this knowledge to analyze, design and develop Al - systems.They canformulatescientificquestionsand i sabletosolveproblemswi t h theaidofabstractionandmodeling. 0utcomes: Aftersuccessfullycompletionofthiscourse,studentsshouldbeableto 1.Applyknowledgeofmathematics,science,andengineeringi ni tsHeuristicsearch techniques. 2. Designan Expertsystemor can implementAl techniqueswith multidisciplinary facultiesandwi l l beabletoconduct experiments, aswell asanalyzeand interpret data. Ex:MedicalDiagnosissystemMYCIN. 3.Studentscanexplorenew researchareasinthefieldofAI techniques. DetailedSyllabus: Uni t Description 1 Duration 1. Introductiont oAr t i f i aal Intelligence: 5 Definition, the Al problems, physical symbol system, physical symbol system hypothesis, Intelligent agents: agents and environment,agent types,desirablepropertiesof knowledge,AI techniques,differentAl techniques. Problems,problemspacesandsearch: Need of asystem tosolvea problem,problem asa statespace search, requirement of a formal description of a problem, production system, control strategy & itsrequirement, breadth firstsearch&depthfirst search, Heuristicsearchtechniaue: Heuristic technique, problems of heuristic technique wi t h real world. different weak methods such as aenerate and test. hill --- Comput er E n g i n e e r ~ n g Page195 and steepest ascent hi l l climbing, problemwi th hillclimbingsuch aslocal maxima,plateau,ridge, simulated annealing,best first search,ORgraphs,A' algorithm, / -- agendadrivensearch.AND-ORGraphs.AObalgorithm. - Knowledge~e~r esent at i on 1 10 l ogi candrules: I Predicate l ogi c facts, r epr at at i onof f ad, mapping between facts and representation, properties and issues of knowledge representation system, prepositional logic & predicate logic, Instancerelationship,lsa,gt& Itpredicate,resolution,conversion to clause form: necessity Herbrand's theorem, resolution in proportionallogic,unificationalgorithm,resolution in predicate logic, different strategies t o speed up resolution procedure,. questionanswering,naturaldeduction. Rules: proceduralversusdeclarativeknowledge,forwardversus backward reasoning,forward & backwardchaining rul esystem, combining backward reasoning, matching: indexing, matching with variable, complex & appropriate matching conflict resolution,controlknowledge, -- Weak SlotB f i l l erstructure: usefulnessof slot& filler structure, 4 semantic net, intersection search, representing non binary predicates by semantic net, partitioned semantic net, frames, framesassets& instance,differentwaysof relatingclasses,slots asfull-fledgedobjects,slotsvaluesasobject,inheritance ---- revisited. Gameplaying: Domainof agame, different waysto improvesearchstrategies, plausible move generate, static evaluation function, different 1 static evaluation functions, minimax search procedure, adding alpha-beta cutoff, search efficiency of alpha-beta procedure, futility cutoff, additional refinements such as waiting for quiescence, secondary search, using book move, iterative deepening,advantageofdepthfirstiterativedeepening -A-Ap--- General concept about learning, different learning techniques such as rotelearning,learningby taking advice, learningi nthe problems solving, learning with macro-operators, learning by chunking, utilitiesproblem, learning from examples, winston's ,learning program, version spaces, candidate elimination algorithm,decisiontree,explanationbasedlearning. Definition, model, characteristic, architecture, development process, limitations, criteria for knowledge representation, knowledgerepresentationschemes, classification model,general )rul es used in classification model. black board model. Comput er En g i n e e r i n g Page196 facilities, causal model,explanation classification, rationalization, its limitations, knowledge acquisition, different techniques, expert system tools l i ke language,shells,narrow EStools,LISPmachine,largehybridES tools,PCbasedexpertsystem,knowledgeacquisitiontools. 1 TextBooks:(Preferably1or2) I 1. ElaineRich,KevinKnight,Artificial Intelligence,2nd edition,TataMcGraw Hi l l , 3rdedition.l999. 1 2. StuartRusseland Peter Norvig,Artificial Intelligence:A ModernApproach, 2ndedition.2000. ReferenceBooks: 1. Patric H. Winston, Artificial Intelligence, 2nd edition, Addison Wesley, 3rd edition,1981. 2. Ni l sJNilson,PrinciplesofArtificialIntelligence,NarosaPublication.1997. 3. Robert J Schalkolf,Artificial Inteilligence: an Engineering approach, McGraw Hi l l ,2002. 4. GeorgeF. Luger,Artificial IntelligenceStructures and Strategiesfor Complex ProblemSolving,41e.2002,PearsonEducation. 5, Ivan Brakto, Prolog Programming for Artificial Intelligence, 31 e, Addison Wedey,2000. 6. M. Sasikumar, S. Ramani,S. Muthuraman;RulebaseExpert System:Practical Introduction(NAROS4). 7. David W. Rolston, Principles of Artificial Intelligence and Expert System Development,McGraw Hi l l , 1988. 8. DanW.Patterson,IntroductiontoArtificial IntelligenceandExpertSystem,PHI, 2009. 9. Giarratano and Riley, Expert System principlesand programming,3 6 edition, PWSpublishingcompany,1998,4thedition. TermWork: EvaluationofTermWorkshouldbebasedontheQuizIMi ni proj ecsl Case studies1 SeminarIPresentations1Onlinequizzesduringtheterm. 1 AsperInternalContinuousAssement (ICA)normsoftheinstitute -- --A Co mp u t e r En g i n e e r i n g Page 197 Pre-requisite: Database Management System(BTC003006) ---I -- Program: B. Tech. (Computer Engineering ) 1 Semester :VII Course : Data Warehousing & Mi ni ng I Code :BTC007003 Teaching Scheme Evaluation Scheme I 0bjectives. The objective of the course i s to learn the fundamentals and concepts of data warehouse. To learn data extraction, transformation and loading. Lecture 3 Various Data mining algorithms to discover useful patterns from large databases. Ability to conduct statistical analysis using different data mining tools to solvereal problemsin businessand commerce Outcomes: After successfully completion of thiscourse, studentsshould beabl eto Understand theneed for data warehouseand data mining Apply different algorithms to largedatabasesto solve problems ,also for strategic business decisions Practical 2 Theory Internal Continuous Tutorial Credit (3 HE, Assessment (ICA) -- Design a data warehouse to support a business problem Detailed Syllabus: , Uni t 1. -- Description m a = Introduction: Need for data warehousing, Basic dements of DW and trends i n requirements --- Architecture and Infrastructure & Data Representation: Architectural components, Infrastructureand metadata. Prinuplesof dimensional modeling, Dimensional modeling advanced topics, dataextraction, transformation and loading, data quality. 4 3. DW, Project Planning and Management, coHecting the -- Information Accessand Delivery: Matching information to classes of users, OLAP i n data warehouse, Data warehousing and the web. Physical design process, data warehousedeployment, growth and maintenance. -- C o m p u t e r En g i n e e r i n g Page( 98 toDataMining: Basicsofdatamining,relatedconcepts,Dataminingtechniques. AlgorithmsforClassification,ClusteringandAssociation rules, KDDProcess 5. Classification: 5 Issuesi nClassification,statisticalbased,Distancebased,Decision based,NeuralNetworkbasedandRulebasedalgorithms I andAssodationRules: Hierarchical and Partitional Algorithms , Clustering Large Databases,BasicAssociationRuleAlgorithms spatial Mining and Temporal I Applicationand rendsi n ~ a t a Mining: Applications. %stems products and research prototypes, I " , 1 Additionalthemesindatamining,Trendsindatamining 1 Total TextBooks: 1) JaweiHan,MichelineKamber,"DataMi ni ngConceptsandTechniques", MorganKaufmann;3edition( Ll y 6,2011), 2) MargaretH. Dunham,"DataMiningIntroductoryandAdvancedTopics", d PrenticeHal,lnc,2003. I RefererimBooks: 1) PaulrajPonniah,"DataWarehousing FundamentalSforI TProfessionals", Wiley;2edition(May24,2010) ----4 TermWork: AsperInternalContinuousAssessment(ICA)normsoftheinstitute C o m p u t e r E n g i n e e r i n g P a g e 199 I Semester :VI I 1 Code :BTC007004 Evaluation Scheme Theory 1 Internal Continuous 1 Lecture Practical Tutorial Credit (3 Hrs, Assessment (ICA) -- 0 8 0 4 Pre-requisite: Knowledge of any programming language. Software I . . Eng1neer1ng(BTC005002), DBMS(BTC003006),UML Diagrams I Objectives: This course prepares students to develop self learning attitude and 1 working skills through software project development. Development of the document preparation skills using standard practices Outcomes: By the end of t hi s course the student wi l l be able t o I studentswill be ableto work cooperatively i n asmall group environment I 1 studentswill beable to analyzequalitativeand quantitativedata, and explain I how evi dencegat h~edsupportsor refutesan initial hypothesis I ( . studentswill be able to ask questionsmncerning language usagewith I mnfidenceand seek effective help from referencesources. I I Detailed Svllabus: A group of 34studentsselects the problem definition for the project work discussed and finalized wi th the help of faculty mentor. They are required to develop aproject based on t hree tier (Front end, logicdevelopment, Database) architecture. Evaluation: Each group isexpected to maintain the log book. Thelog book needsto be evaluated by thementor every week asthepart of continuousevaluation. Each group must demonstratetheworking project, submit the report and do t heppt presentation at theend of thesemester asthe part of semester end exam. Theexam can betaken by t wo examiners: oneinternal and oneexternal examiner. Project Report must contain: 1. Problem Definition 2. Originality of t heworkl Plagiarism declaration 3. Project description 4. Detailsof development -Methods/ Techniques1 Data/ Charts1 Diagrams 5. Database design Co mp u t e r En g i n e e r i n g P a g e 1100 Applications-Advantagesand Limitations. ProjedCode&Snapshots1Output 1 References. Term Work:Asper InternalContinuousAssessment(ICA)normsoftheinstitute Comput er En g i n e e r i n g Page1101 -Program: 6. Tech.(ComputerEngineering) II . . :V Semester Course: lnformationStorageandManagement (Elective1I) 1 Code:BTC007005 TeachingScheme EvaluationScheme Theory InternalContinuous Lecture Practical Tutorial Credit (3Hrs, Assessment(ICA) ' 100 Marks) As perInstituteNorms 3 2 0 4 50 50 Pre-requisite:OperatingSjstem(BTC004003),ComputerNetworks(BTC004004) ObjectivesThecourseprovidesdetailed knowledge,practicaltraining,and insight intotheimplementation and management of various storagetechnologies wi t h a focustowardsapplyingthesetechnologiesinaninformationlifecycleparadigm. Outcomes: Aftersuccessfullycompletionofthiscourse,studentsshouldbeableto 1. Gain the basic knowledge of Sorage domain leading towards cloud environment 2. Appearfor InternationallyacceptedcertificationexamE20-001. 'r 3. Understand the Sorage networks and i ts monitoring, management, Securityissues. ledSyllabus: Uni t Description Duration Introductiont oStorageTechnology: Dataproliferation and the varying valueof datawi th time& usage, Sourcesof data and statesofdatacreation,Datacenterrequirementsandevolutionto accommodate storage needs, Overview of basic storage management skillsand activities,Thefivepillars'of technology, Overview of storage infrastructure components, Evolution of storage, lnformation Lifecycle Management concept, Data categorizationwithinanenterprise,StorageandRegulations Storage Systems Architecture: lntdligent disk subsystems overview, Contrastof integratedvs. modulararrays, Component architecture of intelligent disk subsystems, Disk physical structure components, properties, performance, and specifications, Logical partitioning of disks, RAID & parity algorithms, hot sparing, Physical vs. logical disk organization, protection, and back end management,Array caching properties and algorithms, Front end connectivity and queuing properties, Frontendtohoststorageprovisioning,mapping,and operation, -- - - C o mp u t e r En g i n e e r i n g Page1102 T t e r a c t i o n of file systems wi th storage, Storage system 1 1 connectivityprotocols Introductiont oNetworkedStorage:SOD, DAS,S4N,NAS,& CASevolution, Direct Attached sorage (DAS) environments: elements, connectivity, & management, StorageArea Networks (S4N): elements & connectivity, Fibre Channel principales, standards, & network management principales, S4N management principles, Network Attached Storage (NAS): elements, connectivity options, connectivity protocols (NFS, CIFS,ftp),& managementprinciples,I PS4Nelements,standards (iSC.9. FCIP, iFCP), connectivity principles, security, and management principles, Content Addressable Storage (CAS): elements, connectivity options, standards, and management 1 principles, Hybrid Storage solutions overview including t echn~~o~i esl i kevi rt ual i zat i on & appliances , Introduction to Information Availability: Business Continuity and Disaster Recovery Basics, Local business continuity techniques, Remote business continuity techniques, Disaster Recoveryprinciples&techniques Managing8 Monitoring:Managementphilosophies(holisticvs. system & component), Industry managementstandards( WMP, I SMI-S, CIM), Standard framework applications, management metrics (thresholds,availability,capacity, security, Key 1 performance), Metric analysis methodologies & trend analysis, Reactiveandpro-activemanagementbest practices,Provisioning & configuration change planning, Problem reporting, prioritization, and handling techniques, Management tools overview ---- --- Security 8 Virtualization: Storage Security (Importance of 1% Information security, elements and attributes of security), Developing a storage security model (Restricting Access Path, Vulnerability Management, Understanding Vulnerabilities), Securing Data Storage (Storage Security domains, assessment Methodology, Security elements, threats against Risk ~ applications, Controlling user access to data, threats again backup,recoveryandarchive) Virtualization (Define virtualization, types of virtualization), Storage Virtualization (Storage functionality, Virtual storage, Comparisonof virtualization architectures,challengesof storage virtualization),Blocklevelvirtualization,Filelevel CloudComputing: Cloud enabling technologies, of cloud computing,Benefitsof cloud computing,Cloud service models laas. PaaS. &as.. Cloud de~l ovment models: Public.I C o m p u t e r E n g i n e e r i n g P a g e ) 103 7~-7- pr~vate, Hybrid cloud, Cloud computing infrastructure, Cloud challenges,Cloudadaptationconsiderations. 45 I TextBooks: 1. SomasundaramGanasundaram,AlokShrivastava,"InformationStorageand Management".EMCEducationservices,Wiley IndiaPublisher,secondEdition, 2012. / ReferenasBooks 1. Somasundaram Gana sundaram, Alok Shrivastava. "Information Storage and Management", EMC Education Services, Wiley IndiaPublisher,FirstEdition,2009. 2. MarcFarleyOsborne,"BuildingStorageNetworks",2nd edition, TataMcGrawHi l l , 2001. 3. Robert*aiding,"StorageNetworks:TheCompleteReference",1 TataM&raw Hi l l , 2003. TermWork: 1. Practicalbasedon 10Experiment.s 2. Twoclasstests. t Comput er En g i n e e r i n g Page 1104 Program: B. Tech. -Computer)Semester:VII 7 ~ n ~ i n e e r i n ~ ICourse: Embedded System (Elective - 1 Code:BTC0070@3 I 11) Teaching Scheme I I Prerequisite: Operating %.stem (BTC004003), Computer Network (BTC004004). I I Evaluation Scheme Marks) 0bjective: 1. Thiscoursegivesbasic knowledgeof Design and development of embedded system. 2. Thiswould be helpful in understanding the programming wi th I microcontroller. I Theory Internal Continuous , Lecture I Practical 1 Tutorial I Credit 1 I 3Hr s 100 Aseament (ICA) 3 1 Outcome: I 1 4 1 After successfully completion of thiscourse, studentsshould beable to Theknowledgeof design and development of embedded system 50 2 0 - real-timeoperating system architecture, selecting architecture.' 1 1ntroduction to Real-TimeOperating Svstem Concept :Tasks 1 5 I 1 Understanding theprogramming with microcontroller Detailed Syllabus: - - 1 and task states, semaphores, Mutex, Mailboxes, ' ~essage1 1 ' Process of Embedded Development process, Design, Implementation, Integration and Testing. Survey of Software robin wi th interrupts, function queuescheduling architecture. I I I Unit I 1 2 3 Description lntroduction to Embedded System :Em bedded system ,Categories, Specialties, Application areas, Recent Trends Architecture of Embedded System: Hardwara Architecture, Software Architecture, Application Software, Process of Generating Executable Image, Development 1 Testing Tools. Processes: Threads, Duratio n 4 I Comput er Engi neer i ng Page ( 105 F ( Q u e u e s , Pipes, Signals, Timers, ~ e m o 7 Management, I I Priority Inversion Problem. 7 / Basic Design Using a Real-Time Operating System: I I Overvie*, principl&, An ~ x a m~ l e .Encapsulating 1 1 Semaphores and Queues, Hard Real-Time Scheduling 8 1 Text Books: I Considerations, Saving Memory $$ace, Saving Power. Embedded System Programming-l : Programming, Operations On Bits, Introduction to Embedded 9. 1. Dr. K.V.K.K. Prasad (2005), "Embedded I Real-Time Systems: Concepts, Design and Programming (Black Book) " DreamTech Press, 2. George Couloris, (2008) "Distributed System: Concept and Design", Pearson Education. 3. Raj Kamal(2009) 'Embedded Systems Architecture, Programming 8 DesignnTMH. I Systems, Embedded System Boards, First Embedded System / ReferenceBooks: I Cogram, Blinking LEDS. -- Embedded System Programming4I: EEPROM Programming, Flash Programming, Programming With Sznsors, Interrupts &Timers, Serial Communication, Serial Communication Using lnterrupts, Building Interactive Embedded Systems, Working With RTC -- - Total - pp 6 45 I Minimum three assignments 1. David E.Simon,(2008)"An Embedded Software Primer" Pearson Educat~on. (2009y Go Embeddededed , BPB, ,. , Term work wnsistsof thefollowing: / . Minimum ten experimentsbasedon theabovesyllabus 1 , Comput er En g i n e e r i n g Page I 106 Pre-requisite: Digital + Program: B.Tech.(ComputerEngineering) Course : Advanced Image Processing (Elective1I) Signal -- Semester:VII I Code :BTC007007 Processing 0bjectives: The objective of the course isto provide comprehensive coverage of image processing tools and techniques, enable the students to use these techniques for advance real l i fe applications Teaching Scheme such as biometrics for security and identification, satellite imaging for earth resourcesand medical diagnosis. Outcomes: After successfully completion of thiscourse, studentsshould beableto to use these techniquesfor advance real Iifeapplicationssuch as 1. Biometricsfor security and identification, 2. Satelliteimaging for earth resourcesand 1 3 Medical diagnogs. Detailed Svllabus: Evaluation Scheme Theory Lecture 3 Internal Continuous I Duration Practical 2 Basics of Image Processing ~cqui si ti on-sampl i ngand quantization, lmage representation, storagegray and color images, image preprocessing, point processing techniques, low-pass and high pass, mask processing 1 04 techniques, lmagehistogram. Image Perception Light, Luminance. Brightness and contrast color images, Addi ti ve and Subtractive color models. RGB color scheme, CMYK, YCbCr, LUV, HSI and other Color spaces and their relationship to RGB. Colorization of grayscale images using exhaustive and Kekre's fast search algorithms. Image Analysis aat i al feature extraction, Edge detection, Boundary Representation, moment representation, Morphological operations: Dilation, Erosion, Opening and closing. Morphological operationson Binary and grayscaleirnages. Image Seamentaton. Tutorial 0 06 06 Credit (3 Hrs, Assessment (ICA) 4 50 Comput er E n g ~ n e e r i n gPage 1107 4. Image Compression 1 Redundancy i n images, Inter-pixel redundancy, coding redundancy, and psycho-visual redundancy. Various Lossy and I 1 losslesstechniques to minimizetheseredundancies. I 5. 1 Imaae Transforms 1 Wavelets. 6. ) Imageas Random Variable I Modeling of lmage as Random Variable. Mean Variance, Co- Variance matrix and i ts properties, Eigen vector, K-L Hotelling Transform, --Auto-Correlation, Power Density Spectrum. Advanced Topics lmage Restoration, Vector Quantization (LBG), lmage Mosaicing, lmage Fusion, Digital Watermarking, Seganography and j1 Information Hiding, Principle Component Analysis and i ts 1 Applications t o Finger Print and Face Recognition, lmage " Kronecker product of matrices and development of Fast Algorithm. Application of Kronecker product algorithm to Hadamard, Walsh, and Haar Transforms. Smilar Fast Algorithms for DFT, DCT, DST, Slant and Kekre Transform. -- Total - 45 ' Text Books: 1. R.C. Gonsalez. R.E.Woods(2012)" Digital Image Processing : .NTUU"Parson India I -~ I Reference Books: 1. R.C. Gonsalez, R.E. Woods, Seven Eddins (2010) "Digital lmage Processing using Matlab", TM H 2. Anil K. Jain (2011), " Fundamentalsof imageProcessingn,PHI. 3. William Pratt (2011), "Digital lmage Processing", h h n Willey. 4. M. A. hshi (2011), "Digital Image Processing:An AlgorithmicApproach", PHI. Term Work: At Least threeassignment At least ten experimentsbased on thevariousmethods in thesyllabus. , Two class tests Comput er Engi neer i ng Page I I08 1 Pre-requisite: Software Engineering (BTCOOSOOL) ~ Program: B. Tech. (Computer Engineering) I Semester :VI I - Course : SoftwareArchitecture 1 Code :BTC007008 0bjectives: The objectiveof thecourse is to provide the students w ith technical exposure to theBasicconcepts, principles, methodsin softwarearchitecture. This enables students to learn different architectural styles, patterns and presenting the description of the same using some Architectural description language(ADL). This course also helps them to think about large and complex systems in software and svstem architectural terms Teaching Scheme Lecture 3 valuation Scheme Detailed Syllabus: Unit I Desxiption I Duration 1. / BasicConcepts 03 1 Theory (3 Hrs, Marks) 50 I Internal Continuous Assessment (ICA) As per Institute Norms 50 1 Practical 2 Outcomes: After successfully completion of thiscourse, studentsshould be able to Architectural concernsand approach for familiesof productsfor their design problems Evaluating the recent trendsin softwarearchitecture research Good Paradigmsfor designing new systems. Tutorial 0 02 1.1 Conceptsof SoftwareArchitecture ' 12 Models. Credit 4 2.4 Architectural Conception in Absence of Experience. L 2. 1.3Processes. 1.4 Stakeholders. DesigningArchitectures 2.1 The Design Process. 2.2Architectural Conception. 2.3 Refined Experiencein Action: Stylesand Architectural Patterns. I Co mp u t e r En g i n e e r i n g Pa g e / 109 3. 4. 5. k. 7. t 8. Connectors 3.1 ConnectorsinAction:A MotivatingExample. 3.2 ConnectorFoundations. 3.3 Connector Roles. 3.4ConnectorTypesandTheirVariation Dimensions. 3.5ExampleConnectors. Model i ng 4.1 ModelingConcepts. 4.2Ambiguity,Accuracy,and Precision. 4.3ComplexModeling:MixedContentandMul ti pl eVi ews. 4.4EvaluatingModelingTechniques. 4.593ecificModelingTechniques. Analysis 5.1AnalysisGoals. 5.2ScopeofAnalysis. 5.3ArchitecturalConcernbeingAnalyzed. 1 5.4Levelof FormalityofArchitectural Models. 5.5TypeofAnalysis. 5.6AnalysisTechniques. ImplementationandDeployment ~. 6. 1~~once~t s. 6.2 ExistingFrameworks. 6.3SoftwareArchitectureand Deployment . ~ 1 6.4SoftwareArchitectureandMobility. 1 ConventionalArchitecturalstyles 7.1PipesandFilters 7.2Event-based,ImplicitInvocation 7.3Layeredsystems 7.4Repositories 7.5l nt er~ret ers 7.6Processcontrol CaseStudiesonArchitecturalStyles 8.1 Keywordincontext 8.2InstrumentationSoftware 8.3MobileRobotics 8.4CruiseControl 8.5A layered Designwi t hDifferentstyles 8.6Interpreterusingdifferentldiomsforcomponents 8.7A bladtboardgloballyrecastasaninterpreter ArchitecturesandStyles 8.1DistributedandNetworkedArchitectures. 1 8.2ArchitecturesforNetwork-BasedApplications. 1 04 04 I C o m p u t e r E n g i n e e r i n g P a y e 1110 Text Books: (Preferably 1or 2) 1. Richard N. Taylor, Nenad Medvidovic, Eric Dashofy , "Software Architecture: Foundations, Theory, and Practice" Wiley, Edition 1, January 2009. 2. Mary Shaw , David Garlan "Software Architecture Perspectiveson an Emerging Discipline", PrenticeHall Apri l 12,1996 3. Len Bass, Paul Clements, Rick Kazman: SoftwareArchitecture in Practice, Second edition, Addison -Wesley Profe~sional;2~d edition(Apri1 19,2003) 10. Frank Buschmann, RegineMeunier , HansRohnert , Peter Sommerlad, Michael 3al , "Pattern Oriented Software Architecture" Wiley; Volume 1 edition (August 8, 1996). 3ephen T. AIbin "The Art of Software Architecture: Design Methodsand Techniques" Wiley; 1 edition (March 28,2003) 8.3 Decentralized Architectures. 8.4 Serviceoriented Architecturesand Web Services. Designing f or Non-Functional Properties 9.1 Efficiency. 9.2 Complexity. 9.3 Scalability and Heterogeneity. Term Work: At Least threeassignment At least 6 experiments based on thevariousmethods i n thesyllabus. Twoclasstests 9.4Adaptability. 9.5 Dependability. Dornai ndpeaf i c Software Engineering 10.1 Domain-aecific Software Engineering i n a Nutshell. 10.2 Domain-SpecificSoftware Architecture. 10.3 DSSAs, Product Lines, and I Co mp u t e r En g i n e e r i n g Page1 Ill Program: B.Tech.(Computer Course: E-Commerce TeachingScheme I I Theory Pre-requisite:ComputerNetworks(BTC004004),Security. + Objectives: Thecentralgoal ofthiscoursei stodevelop an integrativeknowledgeofthedigital economy. I t focuseson theinformationsuperhighway asthetechnological enabler that hasdramatically changedtheway i nwhichcompaniesorchestratetheir value creation. This course, wi t h a strategic perspective i n mind, looks into the knowledgeenabledenterprisesandtheinfluenceofelectroniccommerceinshaping therulesof modernbusinessenvironments.Fromamanagerial point of view,the coursewilldelineatetheskillsandknowledgerequiredi nthedigitalworl d.Finally, thiscoursealsooffersatechnology perspectivethattouchesupontheunderlyingI T electroniccommerce I I Outcomes: Uponcompletionofthesubject,studentswillbeableto: a. Comprehendtheunderlyingeconomic mechanismsand dri vi ngforcesof E- Cornrnerce; b. Appraisetheopportunitiesand potentialtoapplyandsynthesizeavarietyof E-Commerce concepts and solutions to create business value for orqanizations,customers,andbusiness~art ners: - c. Undertake planning, organizing, and implementing of E-Commerce initiativestoeffectivelyrespondtoofdynamicmarkgtenvironments. - ;tai l " Syllabus: Uni t Description I Duration Introduction:Electroniccornmerceand PhysicalCommerce, 05 1 differenttypeofecommerce,sorneecomrnercescenario, Basictechnologiesof Emmer ce: ClientsideProgramming, ServerSide Programming.Databaseconnectivity,session 3. AdvancetechnologiesofE-commerce: XML,DataMi ni ng,RichInternetApplication,Web2.0, REST WebServices,WebMashup,Working C o mp u t e r E n g i n e e r i n g Pa g e I l l 2 05 05 Promotions,Strategiesfor Purchasingandsupportactivities, StrategiesforWebAuctions,VirtualCommunities,andweb 05 Characteristicsof eBusiness,eBusinessroleandtheirchallenges,1 - ebusinessRequ~rements, impaclsofe-business 7. E-businessstrategies:Sraregicpositioning Levesof e-business - . strategies,Strategicplanningprocess,Strategicalignment,the consequencesofeBusiness,Sucoessfactorsforimplementationof ebusinessstrategies.Businessmodels,Businessprocessand collaborations 8. IntegrationofApplication:Approachesto Middleware,RPCand RMI,EnterpriseApplicationIntegration,e-businessIntegration, 05 looselyCoupledeBusinesssolutionsforintegration,Service , OrientedArchitecture, EAIandwebServices,WSsecurity 9. E-commerceInfrastructureClusterofServers,Virtualization Techniques,Cloudcomputing,Serverconsolidationusingdoud, 05 IntroductiontoHadoop,HDFS,GoogleAppsengine Total 45 ) TextBooks: 1. "E-CommerceFundamentalsandapplication",ElizabethChang,Henry Chan,RaymondLee,TharamDillon,Wileypublication,11e,2007 2. "E-Commerce:Strategy,Technology andImplementation",Schneider, CengageLearning,91e,2012. 3. "E-BusinessOraanizationalandtechnicalfoundati8nn.MichaelP.Wilev Publication,l/eY2006 ReferenceBooks: ~ ~~ 1. "E-CommerceStrategy:TechnologiesandApplications", DavidWhiteley, TataMcGraw HilI,21 e,2008. 2. "E-Commerce,A ManagerialPerspective",E.Turban,DavidKing,h e Lee, DennisViehIand,PearsonEducation,41e,2010 Internet~ e f e r e ~ m - AssuggestedbyFaculty Term Work: Term work shall consist of at least 6 assignments/programming assignmentsandt wowrittentest. C o mp u t e r E n g ~ n e e r i n gPa g e 1 113 Proaram: B. Tech. (Cornouter Enaineerina) I Semester :VII ~.,~~ - ~ \ ~ ~ ,~~ ~-~ - u~ u r ~ ~ Course: Advanced Computer Architecture I Code :BTC007010 Theory L T r e 1 PraTcaI 1 T u t y a l ~ Cr : t 1 (3f 1 Internal Continuous Assessment (ICA) As per Insti tute Norms Marks) 50 Teaching Scheme Prerequisite: Operating 9/stem(BTCOM003), Computer Networks(BTCOMOM), Digital Communication(BTCOM006) Evaluation Scheme Objectives: The objective of this course i s to learn the fundamental aspects of computer architecturedesign and analysis. The course focuses on processor design, pipelining, superscalar, out-of-order execution, caches (memory hierarchies), virtual memory, storage systems, and simulation techniques 0utcomes: After successfully completion of thiscourse, studentsshould beabl eto Understand theadvanced conceptsof computer architecture. Exposing the major differentials of RlSC and ClSC architectural charaderistics. Investigating modern design structures of Pipelined and Multiprocessors svstems. 2 ~~~ - Detailed Syllabus: Uni t Description I Duration 1 2 3 Performance, Parallel computer models - Multiprocessors and Multicomputers, Multivector and SlMD Computers. Static interconnection networks, Dynamic interconnection Networks: Bus %stems, Crossbar %itch, Multipart Memory, Multistage and Combining Networks. Data and resource dependenm, data hazards, Hardware and software parallelism, Program partitioning and scheduling, Grain size and latency, Control flow, data flow and Demand driven mechanisms, Instruction Level parallelism: basic compilers exposing ILP. lnstruction set architecture, ClSC Scalar Processors, RlSC Scalar Processors, Memory Hierarchy, Inclusion, Coherence and 4 4 6 Comput er En g i n e e r i n g Page1114 Locality. Memory capacity planning. Interleaved memory organization- memory interleaving, pipelined memory access, Bandwidth and Fault Tolerance. Backplane Bus System:Backplane bus specification, Addressing and timing protocols,Arbitrationtransactionandinterrupt. Linear pipeline processor, Nonlinear pipeline processor, Instruction pipeline design, Mechanisms for instruction pipelining, pipeline hazards, Dynamic instruction scheduling - score boarding and Tomosulo's algorithm, Branch handling techniques,ArithmeticPipelineDesign,Staticarithmeticpipeline,, Multifunctionalarithmeticpipelines.%perscaler pipelinedesign, %per pipelineprocessordesign. Cache coherence, Snoopy protocols, Directory based prot ocox Message routing schemes in multicomputer network,deadlock and virtual channel. Vector Processing Principles, Vector instruction types, Vector-access memory schemes. Vector s ~~er c or n~ut ~~ar c hi t ec t ur e, SMD organization: distributed memory model and sharedb - memory model Performance of symmetric shared memory multiprocessor, Principles of Multithreading: Multithreading IssuesandSolutions.Multiple-ContextProcessors 7 Parallel ProgrammingModels,Shared-VariableModel,Message- PassingModel,Data-ParallelModel,Object-Oriented Model 8 MULTI-COREARCHITECTURES Softwareandhardwaremultithreading-3vl Tand CMP architectures- Designissues-casestudies-Intel Multi-core I architecture-SUN CMParchitecture-heterogenousmult~-core processors-casestudy: IBMCellProcessor. I 1 Total I TextBooks: 1. KaiHwang,"Advancedcomputerarchitecture",TMH, 2001. 2. JP.Hayes,"computerArchitectureand organization";MGH, 1998 ReferenceBooks: 1. V.Rajaranam& C.SR.Murthy,"Parallelcomputer";PHILearning,2004. 2. Kain,"AdvanceComputerArchitecture:- A SystemDesignApproach",PHI Learning,1996. 3. M.JFlynn,"ComputerArchitecture,Pipelinedand ParallelProcessor Design";NarosaPublishing.1998, 4. Hwangand Briggs,"ComputerArchitectureand ParallelProcessing";MGH, Comput er En g i n e e r i n g Pa g e 1 I 15 2000. 5. David E. Callav & Aswinder Pal Sngh MargeKaufmann2'Advance Computer Architecture 6. h h n L Hennessey and David, "Computer Architecture, A Quantitative Approach" 4th edition, Elsevier, 2007. 1 I Term Work: At Least threeassignment At least 8experiments based on thevarious methodsi n the syllabus. I Twoclasstests - - -- -- - - ----- - Comput er Engineering PageI l l 6 (ComputerEngineering) ~ e m e s t e r : ~ l l 7 Course: Advanced DatabaseManagement 1 Code:BTC007011 1 EvaluationScheme 1 InternalContinuous 1 100 Marks) 1 Assessment(IcA) i -I ASperlnstitute~ o r m s 50 50 Pre-requisite:DatabaseManagementSjstem(BTC003006) t- 1 Objectives:Expandontheknowledgegained inDatabaseManagementSjstemsin severaldirectionsl i keNon-Relationaldatamodels,deductive(Intel1igent) database systems,webbasedsystemsandobjectoriented Ou t me s : After successfullycompletionofthiscourse,thestudentsmustbeableto 1.Designdatabaseusingextendedconceptof ElRmodel. 2. Thestudents must beabletowritefunctions and procedures using concept of PLISQL. 3.Theymustbeawareofdifferenttypesofdatabasemanagementsystemslikeobject oriented, parallel and distributed and advance databases l i ke active database, t em~or al databaseetc. to -- managedatabaseusingconceptsofdatabaseadministration. I Duration The Extended Entity Relationship Model and Object Model:1 5 TheERmodel revisited,Motivationfor complexdatatypes,User ) I 1 defined abstract data types and structured types, subclasses,1 1 1 super classes, lnheritance, Specialization and 'Generalization, 1 1 1 Constraints and charaderisitics of specialization and 1 generalization,relationshiptypesofdegreehigherthantwo. 2. Procedural Query ( P L I s Q L ) : I 7 1 L a n g ~ e l ~ t r u c t u r e d language ~ - 1 1 SQL and advantags1 Introductionto PLI &L. ~ i s a d v a n t a ~ s b f of PLISQL, PLISQL block structure, block data types, block variable declaration, exception handling. Cursors, types of cursors.functions,procedures,tuggers 3 object-nted Databases: Overvlew of object orlentedl 5 identity,objedstructureand typeknstructions, Encapsulation of operations, Method and persistence, Type hierarchiesand Inheritance,Typeextentsand queries, Complex objects; Databaseschemadesign for OODBMS; OQL, Persistent language; OODBMS architecture and ---- / ,/' Comput er E n g i n e e r ~ n g Page1 I17 - - T s s F Transaction and Concurrency control, example of ODBMS. 4. ObjectRelationalandExtendedRelationalDatabases.Database 4 designfor anORDBMS,Nestedrelationsand collections, storage and access methods, Query processing and optimization, An overview of SQL3, lmolementation issues of extended tvoe: i t 1 Systemcomparisonof RDBMS,OODBMS,andORDBMS. 5(~arallel and Distributed Databases and Client-Sewer Architecture: Architectures for parallel database, Parallel query evaluation, Parallelizing individual operations, Sorting, bi ns, DistributedDatabaseConcepts,DataFragmentation,Replication, and allocationtechniquesfor distributeddatabasedesign;Query processing in distributed databases; Concurrency control and I Recovery indistributed databases.Anoverview of Client-Server 1 interfacesoftheweb.Overview ofXML;dataXML applications; Thesemi structured datamodel,Implementationissues,Indexes Enhanced data models f or Advanced applications: Active databaseconcepts,Temporaldatabaseconcepts,aat i al databaseI I concepts and architecture. Deductive databases and Querv 1 processing,Mobiledat abas, Geographicinformationsystems. Database Administration: Managing a database instance, Maintaining an Online Redo Log files, Managing table spaces and data files, Managing undo data, Managing users and privileges,Managingrolesandauditing. Total -- TextBooks: l.Elmarsi,Navathe,Fundamentalsof DatabaseSystems,51hedition,Addison Weslev.2006 I ReferenceBooks: 1. Stefano Ceri and Giuseppe Pelagatti, Distributed DatabasesPrinciplesand Systems.McGraw Hi l l , 1985. I 2. R.Ramakrishnan, DatabaseManagement Systems,3 d edition,McGraw Hi l l , 2002 I 3. Hennery Korth, Abraham Slberschatz, Database System Concepts, 5th edition,McGrawHi l l , 2005. 4. BipinDesai,AnIntroductiontoDatabase%stem, Galgotia. 5. C.J Date,An IntroductiontoDatabaseSystem,8thedition,AddisonWesley. 2003 /' C o mp u t e r E n g i n e e r i n g Pa g e 1118 astern,ACM Press,AddisonWesley,1995. 7. GeorgeKoch,Oracle8i-Thecomplete Reference,TataMcGraw Hi l l , 2001 8. IvanBayross,OracleDeveloper2000,BPB. 1 TermWork:Asper InternalContinuousAssesment (ICA)normsoftheinstitute NoofPracticals:15 NoofAssignments:020rmore