DETAILED CURRICULUM
IT 401 Theoretical Found.ation of IT 3-0-2 4
Unit 1 : Basics of Theory of Computation; Discrete Structure, Logic Automata, Computational
Complexity
Unit 2 : Data Structure and Algorithms: Algorithm Design Techniques : Recursion, Iteration, etc.
Static & Dynamic Data Structures
Unit 3 : Systems Software: Assembler, Debugger, Editors, Software Tools,
etc.
Books/References:
[1] Trembley and Manohar, Discreta Mathematical Structues, Mc Gaw Hill
[2] C L Liu, Introduction to Mathematical Structues, Mc Gaw Hill
[3] C Papadimitou and C L Lewis, Elements of Theory of Computation, PHI,
1981
[4] Hopcroft & Ullman, Introduction to Automata Theory, Languages of Comp;utations, Add-
Wesley, 1979
[5] R Kruse, B Leungf and C Tondo, Data Structure and Program Design in C, PHI (EEE)
[6] E Horowitz and S Sahni, Data Structure with Pascal, 3rd Ed. Galgotia,
1991
[7] Aho, Hopcroft and Ullman, Data Structures and Algorithms, Addison-Wesley Publishing Co.
[8] Thrembley and Sorenson, An Introduction to Data Structure with Aplications,McGraw Hill, 1985
[9] Dhamdhere, Systems Programming and Operating Systems, Tata Mc Graw
Hill
IT 402 Fundamentals of Computer Systems 3-0-2 4
Unit 1 : Computer Organization and Architecture: CPU, Memory Organization, I/O Devices,
Assembley Language Programming
Unit 2 : Operating Systems: Processor, I/O Management, File System, Memory Management
Laboratory: Programming in Unix, Linux and NT
Unit 3 : Basics of Data Communications Techniques
Books/References:
[1] Hamacher, Vranesic and Zaky, computer Organization, McGraw Hill
[2] M M Mano, computer System Architecture, PHI (EEE)
[3] J Peterson, A Silberschatz and P Galvin, Operating System Concept, Addison-Wesley, 3rd Ed., 1989
[4] M J Bach, Design of Unix Operating System, PHI, 1986
[5] A Silberschatz and P Galvin, Operating System Concept, Addison-Wesley, 4th Ed., 1994
[6] Milenkovic, Operating System-Concept and Design, Mc Graw Hill
[7] Stalling, Data and Computer Communication, PHI (EEE)
[8] A S Tanenbaum, Computer Network, PHI (EEE)
IT 403 Fundamentals of Information Processing 3-0-2 4
Unit 1 : File Organization: Hashing, Indexing with B-Tree, B+ Tree, etc.
Unit 2 : Theoretical Foundation of Database Systems: ER & Relational Model, Algebra, SQL,
Concurrency Control, Distributed Database, etc. Database Application Design Using
Oracle, MS-Access, JDBC, etc.
Unit 3 : Compiler Construction Techniques, Lexical Analyzer, Parser, Intermediate Code
Generation & Optimization, etc.
Books/References:
[1] R. El. Masi and S B Navathe, fundamentals of Data Base Systems, Benjamin Cummings, 1989.
[2] H F Korth and S Silberschatz, Database concepts, 2nd Edition, Mc Graw Hill , 1991.
[3] J.D. Ullman, Principal of Database and Knowledge base Systems, Vol I & II, Computer Science Press, 1988.
[4] I Bayros, Oracle Developer 2000, BPB Publication.
[5] Aho, A V Shethi and Ullman J D : Compiler Design
[6] A C Holub, Compiler Design in C: PHI 1993
IT 501 Advanced Database System 3-0-2 4
Review of ER/EER and other semantic data models; Network, Hierarchical and Ralational Data Models.
Query Processing: Various Operations such as Join, Selection, sorting, expression evaluation, etc
Concurrency Control Mechanism: Protocols, Multiple Granularity, Multi-version schemes, Deadlock handling,
Recovery: Recovery and atomicity, various techniques, buffer management, Advanced Recovery Techniques;
Database Security : Authentication, Various Access Control Mechanisms, etc
Distributed Databases:Distributed Query Processing, Transaction Model, deadlock handling, multi-database systems;
Object Oriented Database: OO Data Model e.g. UML, OO DBMS
architectures, Client-Server Approach, Query Processing, Object
Relational Databases
Spatial Databases: Data Models, various representation schemes,
architectures, Query Processing, Storage Structures; Image and
Multimedia Databases
Books/References:
1. Silberschatz and Korth, Database system concepts, McGraw Hill.
2. Elmasri and Navathe, Fundamentals of database systems; Narosa Publishing Co.
3. John G Hughes, Object Oriented Databases; Prentice Hall Int
nl Series in Computer Science
4. Andleigh and Thakrar, Multimedia Systems Design, Prentice Hall PTR
5. R Raghuramakrishnan & J Gehrke, Database Management System
6. Alhir, UML: In A Nutshell, O
Reilly
IT 502 Distributed System 3-0-0 3
Characterization of Distributed Systems, Design issues
and user requirements. Interprocess Communication-Synchronous and
Asynchronous, Client-server communication, Group communication.
Remote rocedure Call-Design issues & Implementation. Distributed
S-Design issues & Implementation. File Services Design issues,
Implementations and case studies. Name Service-Design issues and case
studies. Time and Co-ordination Physical & Logical Clocks,
Distibuted Co-ordination. Replicaton issues and implementations. Shared
data and Trransactions, Distibuted tansactions, concurrency control.
Recovery and Fault Tolerance. Security-Design issues and case studies.
Books/References:
Coulouris, Dollimore and Kindberg, Distributed Systems-Concepts and Design, Pearson Education Asia
P K Sinha, Distibuted Operating System, PHI, IEEE Press
Singhal and Shivaratri, Advanced Concepts in Operating Systems, TMH
Tanenbaum, Distributed Systems: Principles and Paradigms, Pearson Education
IT 503 Multimedia Systems 3-0-2 4
Concept of Multimedia Data; Various File Formats; Multimedia data Model e.g. RMDM
Compression & Decompression:
Binary Image compression: Various CCITT standards
Color Image compression : JPEG Methodology, DCT, MPEG Methodology
Storage & Retrieval Merthods: Magnetic Media Technology, RAID
Technology, Optical Media, Hierarchical Strage Management; Cache
Management;
Architectural Issues: Specialized processor, Memory System, LAN-WAN
connectivity, Client-Server approach; Distributed Multimedia System:
various components;
Multimedia Authoring; Authoring Tools and their design issues, Hypermedia Application Design issues;
User Interface: Hypermedia Interface Design Issues;
Books/References:
1. Andleigh and Thakrar, Multimedia Systems Design, Prentice Hall PTR
>IT 504 E-Commerce 3-0-0 3
Introduction to E-Commerce; Networking; Web Tools,
recommerder System, Web Auctions, Information Retrieval, Agents for
E-Commerce;
Electronic Payment System: iKP Protocols and other related protocols, security analysis;
Books/References:
S Garfinkel, Web Security and Commerce, O
Reilley & Associates
P Greenspun, Phillip and Alexe
s Guide to Web Publishing, Ap Professional
IT 505 Transmission of Information 3-0-0 3
Information Measure- noiseless coding, construction of optimal codes, discrete memoryless channel- channel capacity;
Fundamentals of Information Theory; Error Correcting Codes- Minimum
distance principles, Hamming Bound, general Binary Code, Group Code,
Linear Group Code, Convolution Encoding- Algenraic structures, Gilbert
Bound, Threshold decoding for Block Codes, Cyclic Binary Codes- BCH
Codes, Generalised BCH Codes and Decoding, Optimum Codes- Information
rate, High-rate Volume Bound, Elias Bound, Asymptotic Error Bound.
Non-Cyclic Codes, Residue Codes, Reed Muller Codes, Orthogonalizable Codes- condition for complete orthogonalization;
Non-binary BCH Codes- non-binary coding, modulation schemes, Weight Function;
Books/References:
Lin S and D J Costello, Error Control Coding, Prentice Hall, New Jersey
Hamming R W, Coding and Information Theory, PHI
Khinehin A., Mathematical Foundations of Information Theory, PHI
IT 506 Logic Programming 3-0-0 3
Logic as a Language for Problem Solving, Sentence
structure, Implication and Interface, General Structure and
Computational Behaviour of Logic Programs, Procedural interpretation of
Logic, Algorithmic view of logic program execution; Pragmatic and
Stylistic considerations for structuring of program and data;
Specification, Verification and synthesis of logic programs; Elementary
features of typical logic implementations, Contribution of Logic
Programming to Theory, practice and technology of computing.
Books/References:
Hogger C J, Introduction to Logic Programming, Academic Press
Bundy A., Computer Modelling of Mathematical Reasoning, Academic Press
Lloyd, J W., Foundations of Logic Programming, Springer Verlag
IT 507 Computer Security & Cryptography 3-0-0 3
Introduction to Cryptography, Mathematical Foundation
of Cryptography : Information Theory, Complexity Theory, Number Theory,
Probability Theory;
Secret Key Cryptosystem : Stream and Block Ciphers; Pseudo-random
pattern generators, LFSR based stream ciphers, other stream ciphers;
Correlation attacks and other relevant attacks for steam ciphers; DES
and Its Security, other Block Ciphers; Differential Cryptanalysis,
Attacks on Block Ciphers;
One-Way Hash Functions and Data Integrity: Snefru, MD4, MD5, SHA, HAVAL; Cryptanalysis of hash functions;
Public Key Cryptography: Mathematical Foundation, RSA, Security Analysis of RSA
Key Establishment Protocols: Symmetric key based and Asymmetric Key
based protocols, KERBEROS, EKE, DH-EKE, PAKE, etc; Secret Sharing;
Digital Signature Schemes: RSA and other related signature schemes, Possible Attacks, DSA and other related signature schemes;
Books/References:
Manezes, Oorschot and Vanstone, Handbook of Applied Cryptography, CRC
Press
B Schnier, Applied Cryptography, PHI
IT 508 Micro Computer Based Design 2-0-4 4
Introduction to microprocessors; typical 8-bit and 16-bit microprocessors and their evaliuation;
Micro-computer programming methodologies;
Memory and I/O Interfacing; Peripheral Devices;
Introduction to DOS, Assembly Language Programming;
IBM PC: Architectural Issues, Intel family of processors, Concept of Co-processors; programming standards, typical uses;
Micro-controllers: Introduction, architecture, uses;
Typical examples of micro-computer based design for applications in Science, Business and Industries;
Books/References:
Yu-Cheng & Gibson G A, Microcomputer System- The 8086/8088 Family, PHI
Nyatt A L., Using Assembly Language, Microtech Publication
Hall, D V., Microprocessors and Interfacing, McGraw Hill
IT 509 Data Mining & Data Warehousing 3-0-2 4
Data Warehousing
Concept of Data Warehouse, Differences between Operational Databases
and Date Warehouse, Multi-dimensional Data Model, Schemas for
Multi-dimensional Databases, Data Cube Representations, Data Warehouse
Architecture, OLTP vs OLAP, Efficient Query Processing in data
Warehouses, Indexing of OLAP data, Meterialization concept;
Data Mining
Data Clustering: Partitioning, Hierarchical, Density-based, Grod Based and Model Based Methods;
Classification & Prediction: Decision Tree Techniques, Back-Propagation Method, Bayesian Method
Association Rule Mining Techniques: Frequent Itemset Generation,
Apriori, Horizontal Method, Sampling Approach, Hashing Approach;
Dynamic Association Rule Mining;
Mining of Complex Types of Data: Mining of Spatial Databases,
Multimedia Databases, Time-series and sequence Data, Text Databases,
WWW Data;
Books/References:
Jiawei Han and Micheline Kamber,
Data Mining: Concepts and Techniques, Morgan Kaufmann, India
A K Pujari,
Data Mining Techniques, University Press, India
Han, Manilla and Smyth,
Principles of Data Mining
, PHI, India
IT 510 Advanced Operating Systems 3-0-2 4
Multirocessor issues: Threads-usage, design issues and
Implementation, synchronization primitives. Processor Management &
Scheduling, Memory management.
Real-time operation System: Design issues and Implementation
Advance Programming Laboratory in UNIX: Drivers, scheduler, threads, IPC, file system.
Books/References:
Tanenbaum, Modern Operating Systems, PHI (EEE)
Milenkovic, Operating Systems: Concepts and Design, McGraw Hill.
Sillberschatz et. al, Operating Systems.
W.R. Steveans, Advanced Progamming in the UNIX Environment, Addison
Wesley.
M.J. Bach, The Design of the UNIX Operation System, PHI(EEE).
6. Singhal and Shivaratri, Advanced Concepts in Operating Systems, TMH
IT 512 Object Oriented Programming & Design 2-1-2 4
Part I: Object Oriented Programming
Structured Programming and Object Oriented Programming paradigms.
Data Abstraction : Class, object, constructors, destructors, memory
allocations for objects, member functions, friend functions, templates.
Inheritance : Single & multiple inheritance, virtual base class.
Polymorphism : Compile time polymorphism : operator overloading, function overloading, static bending.
Runt-time polymorphism : Virtual function, pure virtual function, abstract class, dynamic binding.
Exception handling.
Part II: Object Oriented Design
Object Oriented Design Approaches, Object Modeling Techniques (OMT)
tools : Object Model, Dynamic Model, and Functional Model. (Objet
Diagram, State Diagram, and DFD).
Phases of Object-Oriented Development: Object Analysis, System Design, Object Design.
Books/References:
1. Herbert Schild : The Complete Reference to C++, Osborne
McGrawHill.
2. Rambaugh et al. : Object Oriented Modeling and Design, PHI(EEE).
IT 513 Computer Networks 3-0-2 4
Review of Computer Network Architecture and the Subnet layers.
Transport Layer: Connection management, Quality of Service, TCP/IP Protocol, ATM.
Session Layer : Session establishment and maintenance, Dialogue management, Recovery.
Presentation Layer : XDR, ASN.1, NDR; Message Security and
Authentication Techniques, Encryption algorithms, Data Compression
Algorithms- Run length encoding, DPCM, Dictionary-based methods, Image
compression- JPEG, Video compression- MPEG;
Applications: E-mail, Remote login, File transfer, Network file system, Network management.
UNIX network programming with TCP/IP; Network File System, Novell Netware, and Windows NT installation, configuration and use.
Books/References:
1. Tanenbaum A.S., Computer Network, 3e, PHI (EEE).
2. Stalling W, Data and Computer Communication, 5e, PHI (EEE).
3. Peterson L L, Davie B S, Computer Networks: A Systems Approach, Morgan Kaufmann Publishers Inc.
3. Stevens, UNIX Network Programming, PHI (EEE).
4. Comer, TCP/IP Programming Vol.- I, II, III, PHI(EEE).
IT 514 Software Engineering 3-0-2 4
Introduction to software engineering, concept of a
software project, size factor, quality and productivity factor,
different phase of a software development life cycle, managerial issues.
Software project planning: Problem definition, development of a
solution strategy, development process planning, software development
models and their comparative study; Organizational structure planning,
project formats and team structures; Planning for quality assurance and
configuration management; Planning for verification and validation.
Software economics: Cost estimation and evaluation techniques, cost estimation based on COCOMO model and Raleigh model.
Software requirements analysis and specifications techniques- their notations & languages .
Software design: Concept of fundamental design; Design approaches-
top-down & bottom-up, structured, object-based & object
oriented design; Design specification and notations.
Software implementation: Structured coding techniques, coding styles, and standards; Guidelines for coding and documentation.
Software verification and validation: Theoretical foundation, black box
and white box approaches; Integration and system testing.
Software reliability: Definition and concept of reliability, software
faults, errors, repair and availability, reliability and availability
models.
Case studies.
Books/References:
1. Pressman, R.S., Software Engineering: A Practitioner
s Approach, McGraw Hill.
2. Shooman, M, Software Engineering, McGraw Hill.
3. Fairley, R.E., Software Engineering Concepts, McGraw Hill.
IT 515 Artificial Intelligence 3-0-0 3
Introduction: AI problem; AI techniques, problem as a
state space search, Production Systems, Issues in design of search
programs.
Heuristic Search Techniques : Generate and test, Hill Climbing, Best-First Search, Problem reduction, Means- Ends analysis.
Knowledge Representation : Knowledge representation issues, Predicate
logic, knowledge representation using rules, weak slot-and-Filler
structure.
Natural Language Processing : Syntactic processing, semantic analysis, Discourse and pragmatic processing.
Expert Systems : Representation using domain knowledge, Expert System shell, knowledge acquisition.
Books/References:
1. Artificial Intelligence : E. Rich & K. Knight : Tata McGraw Hill.
2. Principles of Artificial Intelligence : N.J. Nilson; Narosa Pub. House.
IT 516 Design & Analysis of Algorithm 3-0-0 3
Review of basic data structures such as stack, queue, linked list, trees and graphs.
Concepts in algorithm analysis, Asymptotic complexity.
Domain independent algorithm design techniques such as divide and
conquer, greedy method, dynamic programming, back tracking, branch and
bound.
Example algorithms for above techniques from sets, graphs, text
processing, internal and external sorting, height balanced trees,
B-trees, hashing algorithms, dynamic storage allocation, garbage
collection.
Lower bound theory and NP-hard problems.
Books/References:
1. Corman et al., Introduction to Algorithms, McGrawHill.
2. Aho A, Hopcroft J., Ullman J., The Design and Analysis of Algorithms, Addison-
Wesley.
IT 517 Pattern Recognition 3-0-2 4
Unit 1 : Bayes Decision Rules for two Class problem, Bayes maximum likelihood rule, minimum
distance classifier, error probabilities for classifier, Mahalanobis distance, Bound for error
probabilities, Estimation of parameters, Learning.
Unit 2 : Single layer perceptron
Unit 3 : Clustering, Minimum within cluster distance critewrion, k-menas algorithm single linkage,
complete linkage and average linkage algorithms, Isodata algorithm etc.
Unit 4 : Feature Selection
Algorithms for feature selection such as Branch and Bound, Sequential
forward and backward selections, GSFS and GSBS, (L, R) algorithm.
Criterion function: Probabilistic Separability criterion, error
probability based criterion, entropy based criterion, minimum within
class distance based criterion, probabilistic independence.
Principal Component Analysis
Unit 5 : Fuzzy Set-theoretic Pattern Recognition
Usual Fuzzy set theoretic operations
union, intersection etc.
Multitvalued Logic: Zade Compositional Rule of inference
Fuzzy C-means algorithm
Supervised Classification: Multitvalued Recognition System
Fuzzy set theoretic based feature selection criteria
Unit 6 : Applications will be dealt with appropriating classification errors such as commission
and Omission.
Books/References:
Duda and Hart,
Pattern Classification ad Scene Analysis
, John Willey, 1990
P.A. Devijver and J. Kittler,
Pattern Recognition: A Statistical Approach
, 1983
K. Fukunga,
Introduction to Statistical Pattern Recognition
, Academic Press
S.K. Pal and Dutta Mazumdar,
Fuzzy Set Theroetic Methods for Patern Recognition
, John Willey, 1998.
IT 602 End-Term Project I 8
IT 603 End-Term Project II 16
|