You are on page 1of 23

Computer Science & Engineering Department

Kamla Nehru Institute of Technology


Sultanpur (UP) 228118
M.Tech full time (Comp. Sc.)
SEMESTER-I
Sr.
No.

Course
Code

Subjects

Periods
L

1.

RCS 11

2.

RCS 12

3.

RCS 13

4.

RCS 14

Selected Topics
of computer
Science
Advance
Computer
Architecture
Data Networks
Advance
Databases
TOTAL

Subject
Total

Evaluation Scheme

Sessional
CT
TA

Total

ESE
Total

20

30

50

100

150

20

30

50

100

150

20

30

50

100

150

20

30

50

100

150

12

200

400

600

2
2
4

SEMESTER-II
Sr.
No.

Course
Code

RCS 21

RCS 22

3
4

RCS 01y
RCS 02y

Subjects

Algorithms
Modeling&
Simulation
Elective-I
Elective II
Total

Periods

Subject
Total

Evaluation Scheme

Sessional
CT
TA
Total
20
30
50

ESE
Total
100

150

20

30

50

100

150

3
3
9

1
1
3

20
20

30
30

50
50
200

100
100
400

150
150
600

SEMESTER- III
Sr.
No
.

Course
Code

RCS 31

2
3
4
5

RCS 03y
RCS 04y
RCS 34
RCS 35

Subjects

Professional
Aspects in
Software
Engineering
Elective-III
Elective-IV
Seminar
Dissertation
Total

Periods

Subject
Total

Evaluation Scheme

Sessional
CT
TA Total

ESE
Total

50

50

50

3
3
8

1
1
2

20
20
-

30
30
-

50
50
50
100
250

100
100
-

150
150
50
100
500

SEMESTER-IV
Sr.
No.

Course
Code

Subjects

Periods
L

RCS 41

Dissertation
Total

Evaluation Scheme

T
-

CT
-

Sessional
TA Total
100
100

ESE
Total
200
200

Subject
Total

300
300

RCS-11:

Selected Topics of Computer Science


L
3

T
1

P
0

Syllabus
Data Structure and Algorithms- List , Stack, Queue,Tree,Hash Table, Graph, Search
and Sorting Algorithms.
Operating System Scheduling Algorithm, Synchronization Technique, Paging and
Segmentation, Virtual Memory.
Automata Theory Finite Automata, Regular Expression, Context Free Grammar, Push
Down Automata, Turing Machine, P and NP Class.
Complier Design Phases, Lexical Analysis, Syntax and Semantic Analysis, Top Down
and Bottom Up Parsing Techniques.
Books and References:
1. Hopcroft & Ullman, Introduction to Automata Theory, Languages, and
Computation, Narosa Publishing House.
2. Aho, Hopcroft and Ullman, Data Structures and Algorithms, Addison Wesley.
3. Dhamdhere, perating Systems, Tata McGraw Hill.
4. Aho, Ullman and Sethi, Compiler Design, Addison Wesley.

RCS-12: Advanced Computer Architecture


L
3

T
1

P
0

Syllabus
Evolution of computer Architecture, system attribute to performance , Advance Processor
Technology, SIMD ,MIMD model of Parallel processing, Classification of Parallel
Computing structure, Principle of Scalable Performance, System Interconnect
Architecture, Parallel processing and application, High performance memory system,
Vector processing, Risk processors, Pipelining.
Books and References:
1:
Kai Hwang, Advanced Computer Architecture, McGraw-Hill.
2:
Hwang and Briggs, Computer Architecture and Parallel Processing, McGraw Hill
3:
.Hamacher V C, et al: Computer Organization McGraw Hill

RCS-13:

Data Networks
L
3

T
1

P
2

Syllabus
Introduction: Overview of computer networks, seven-layer architecture, TCP/IP suite of
protocols. LANS, MANs, and wireless LANs. (For example, FDDI, DQDB, HIPPI,
Gigabit Ethernet, Wireless Ethernet, etc.) Concept of IPV4 Addressing ,Concept of IPv6:
basic protocol, extensions and options, Concept of QoS, Parameters of Q0S, Overview
of Integrated Services, Differentiated Services and MPLS Mobility in networks. Mobile
IP. , MANETs , Routing in MANETs ,Selected & Advanced Topics related to Network
Security & Network Management.
Books and References:
1: Larry L. Peterson and Bruce S. Davie, Computer Networks- A Systems Approach.
2: W. R. Stevens, TCP/IP Illustrated, Volume 1: The Protocols, Addison Wesley, 1994.
3. G. R. Wright, TCP/IP Illustrated, Volume 2: The Implementation, Addison Wesley,
1995.
4. W. Stallings, Data Communications, PHI Pub.
5. Srinivasan Keshav, An Engineering Approach to Computer Networking, , Pearson
Pub.

RCS-14: Advanced Databases


L
3

T
1

P
2

Syllabus
Database System Concepts and Architecture; Data Model; Normalization; SQL
Advanced Transaction Processing, Deadlock and Concurrency Control; Object Oriented
and Object Relational Databases: Parallel and Distributed Databases; Backup and
Recovery Concepts, Emerging Database Technologies:
Books and References:
1: Ramez Elmasri, Shamkant Navathe: Fundamentals of Database Systems, Fifth
Edition,
Pearson Education, 2007.
2: Raghu Ramakrishnan, Johannes Gehrke : Database Management Systems, Tata
McGraw-Hill.
3. Alexis Lcon, Mathews Leon, Database Management Systems
4. C.J. Date : An Introduction to Database Systems, Eighth Edition, Pearson Education.
5. Abraham Silberschatz, Henry F. Korth, S.Sudarshan: Database System Concepts,
Tata McGraw-Hill.

RCS-21:

Advance Algorithm
L
3

T
1

P
0

Syllabus
Algorithm Fundamentals:Basic Concept, Analysis of Algorithm, Growth of
Functions, Masters Theorem.
Analysis of sorting Algorithms:
Overview, Merge sort, Quick sort, Heap sort, radix
sort.
Advance Data Structure: Red-Black Trees, B/B+ Trees.
Parallel Algorithm: Performance Measures of Parallel Algorithms, Parallel
Merging/Sorting Algorithms on CREW/EREW, Parallel
searching algorithms.
Advance Design and Analysis Techniques: Dynamic
Programming,
Greedy
Algorithms, Branch and Bound, Back
Tracking.
Graph Algorithm:
DFS and BFS algorithm.
NP Complete Problem.
Books and References:
1: Coreman, Rivest, Lisserson, Algorithm, PHI.
2: Basse, Computer Algorithms: Introduction to Design & Analysis,Addision
Wesley.
3. Horowitz, Sahani, and Rajasekaran Fundamental of Computer Algorithms,
Universities Press

RCS-22:

Modeling and Simulation


L T
3 1

P
0

Modeling and simulation. Application areas, definition and types of system, model and
simulation, introduction to discrete-event and continuous simulation.
Simulation Methods: Discrete-event Simulation, Time advance Mechanisms,
Components and organization of Discrete event simulation, Flowchart of next-event time
advance approach, Continuous Simulation, Random Number generation methods.
Queuing Models: Single server queuing system, introduction to arrival and departure
time, flowcharts for arrival and departure routine. Event graphs of queuing model.
Determining the events and variables
Distribution Functions: Stochastic activities, Discrete probability functions, Cumulative
distribution function, Continuous probability functions. Generation of random numbers
following binomial distribution, poisson distribution, continuous distribution, normal
distribution, exponential distribution, uniform distribution.
Programming in GPSS and C/C++: Basic Introduction to Special Simulation
Languages:-GPSS and Implementation of Queuing Models using C/C++.
Books and References:
1:
Averill M. Law and W. David Kelton Simulation Modeling and Analysis, Tata
McGraw-Hill Publication.
2:
Geoffery Gordon System Simulation, Prentice-Hall of India.
3:
Jerry Banks, John S. Carson, Barry L. Nelson and David M. Nicol Discrete-Event
System Simulation, Prentice-Hall of India.

RCS-31: Professional Aspects in Software Engineering


L
2

T
0

P
0

Syllabus
Intellectual Property: Confidential Information, Copyright, Infringement of Copyright, Acts
permitted in Relation to Copyright Works,Licensing and Assignment of Copyright, Moral Rights,
Designs, Trademarks, The tort of passing off, Domain Names, Patents.
Software Licenses: Copyright, Contract, Patent, Free Software and Open Source Software,
MIT License, BSD License, GNU General Public License, GNU Lesser General Public License,
Q Public License, Proprietary License, Sun Community License,
Software Contracts: Basics of Software Contracts, Extent of liability, Contract for the supply of
custom-built software at a fixed price, other types of software service Contract, Liability for
defective software.
Software Crime Prevention: Computing and criminal Activity, Reforms of Criminal Law,
Categories of Misuse, Computer Fraud, Obtaining Unauthorized Access to Computer,
Unauthorized Alteration or Destruction of Information, Denying Access to an Authorized user,
Unauthorized Removal of Information Stored in a Computer.
Data Protection Regulations: Data Protection and Privacy, The impact of the Internet, Factors
Influencing the Regulation of Data Processing, Convergence of Data Protection Practice,
Defamation and the protection of Reputation.
Books and References:
1: Andrew M. St. Laurent, Open Source and Free Software Licensing, OReilly Publications

2:

Frank Bott, et. al, Professional Issues in Software Engineering, Taylor & Francis

RCS-011: Advanced Artificial Intelligence


L
3

T
1

P
0

Syllabus
Introduction to AI. Agents and environments. Problem solving by search; uninformed
search, informed ("heuristic") search, constrained satisfaction problems, adversarial
search, Knowledge representation and reasoning; rule based representations, logical
formalisms, frames or object oriented systems, network based approaches and mixed
representations. Theorem-proving. Knowledge bases and expert systems. Overview of
LISP and PROLOG. Reasoning in uncertain environments. Planning communication and
multiagent systems. Learning. Vision. Natural Language Processing.

Books and References:


1:
Charniak and Mcdermott.Introduction to Artificial Intelligence, Addison-Wesley.
2.
Ginsburg.Essentials of Artificial Intelligence, Morgan Kaufmann.
3.
Winston.Artificial Intelligence, 3rd Edition, Addison Wesley.

RCS-012:

Engineering Object Oriented System


L
3

T
1

P
0

Syllabus
OO manifesto for OO Analysis. Object modeling and difference with data-oriented,
process-oriented and behaviour modelling, Object modeling: classes, complex object
classes, inheritance. Sub systems and systems in OO modeling. State transition diagrams,
Dynamic Modeling: Modeling an event. Event typology, event as trigger , Functional
Modeling: Review of Structured techniques, Cross model constraints and linkages.
Conversion to OO implementation, UML notation
Books and References:
1. Rumbaugh et al, Object Oriented Modeling and Design, Prentice Hall
2. Odell and Martin, Object Oriented Analysis and Design, Prentice Hall

RCS-013:

DISTRIBUTED COMPUTING
L
3

T
1

P
0

Syllabus
Foundation and Characterization of Distributed Systems, System Models, Shared
Address Architecture and Message Passing Architecture, Theoretical Foundation for
Distributed System, Clock Synchronization, Distributed Synchronization and Distributed
Mutual Exclusion, Distributed Deadlock Detection, Agreement Protocols, Distributed
Resource Management, Process and Threads, Distributed File System, Distributed
Scheduling, Load Distribution, Fault Tolerance, Transactions and Concurrency Control in
distributed transactions, Routing, Distributed Objects, Socket and Skeleton, Remote
Procedure Call and Remote Method Invocation, CORBA RMI.
Text Books/Reference Books:
1. Singhal & Shivaratri, "Advanced Concept in Operating Systems", McGraw Hill
2. Ramakrishna, Gehrke, Database Management Systems, Mc Grawhill
3. Coulouris, Dollimore, Kindberg, "Distributed System: Concepts and Design,
Pearson Education
4. Tenanuanbaum, Steen, Distributed Systems, PHI
5. W. Richard Stevens, UNIX Network Programming, Vol 1 & 2, Pearson
6. Gerald Tel, "Distributed Algorithms", Cambridge University Press
7. Ceri, Palgatti, Distributed Databases: Principles & Systems, McGraw-Hill
8. Barbosa, Distributed Algorithms, MIT Press
9. Pradeep K. Sinha, Distributed Operating Systems: Concepts and Design , PHI
10. Randy Chow, Theodore Johnson, Distributed Operating Systems and Algorithm
Analysis, Pearson

RCS- 014: Image Processing


L
3

T
1

P
0

Syllabus
Introduction, Origin, Areas of Image Processing, steps in Digital Image Processing,
Components of Image Processing System, Image Sensing , Sampling and Quantisation,
Neighbouring of Pixels; Image Enhancement and Restoration: Enhancement; Color
Image Processing; Wavelets; Image Compression; Image segmentation; Representation
and Description; Object Recognition: Pattern and pattern classes, recognition based on
Decision Theoretic Methods, Structural Methods.
Books and References:
1: Digital Image Processing by Rafael C. Gonzalez, Richard E. Woods

RCS 015: Cloud Computing


L
3

T
1

P
0

Syllabus
Virtualized Data Center Architecture : Cloud infrastructures, Service provider interfaces;
Saas, Paas, Iaas.VDC environments; concept, planning and design, business continuity
and disaster recovery principles. Managing VDC and cloud environments and
infrastructures.Information Storage Security & Design ,Storage Network Design, Cloud
Optimized Storage: Global storage management locations, scalability, operational
efficiency. Global storage distribution; terabytes to petabytes and greater. Policy based
information management; metadata attitudes; file systems or object storage.
Books and References:
1.Greg Schulz 2011, Cloud and Virtual Data Storage Networking, Auerbach Publications
[ISBN: 978-1439851739]
2.Marty Poniatowski, Foundations of Green IT [ISBN: 978-0137043750]
3.EMC, Information Storage and Management [ISBN: 978-0470294215]
4.Volker Herminghaus, Albrecht Scriba,, Storage Management in Data Centers [ISBN:
978-3540850229]
5.Klaus Schmidt, High Availability and Disaster Recovery [ISBN: 978-3540244608]

RCS -016:

Data Warehousing and Mining


L
3

T
1

P
0

Syllabus
The organizational perspective, the technical perspective, Dimensional Modeling: facts,
dimensions, slowly and rapidly changing dimensions, Data Warehouse operations ,
Aggregation, historical information, Query facility, OLAP functions and Tools, Data
Mining interfaces, Relational representation, Multidimensional representation, Meta-data
and CWM, DW process and architecture , Information systems product driven and goal
driven approaches , Design approaches, Physical design: clustering, partitioning
etc.Types of mining, Mining operations, introduction of statistical Data Mining, Heuristic
Mining,Introduction of mining in data warehousing , Stages of DM process, DecisionTree based classifiers, Data Mining Techniques, Clustering ,Introduction to information
retrieval, Query optimization, Unstructured and semi-structured text, Text encoding,
Tokenization, Steaming, Lemmatization, Index Compression, Lexicon Compression, Gap
encoding, gamma codes, Index constructions, Dynamic indexing, Positional indexes, ngram indexes, real-world issues, Vector-Space Scoring, Nearest neighbor techniques.
Introduction to information retrieval , Inverted indices and Boolean queries, Query
optimization, Unconstrained and semi constrained text, Text encoding, Tokenization,
Stemming, Lemmatization, Tolerant retrieval.
Books and References:
1. Ponnaih, Data Warehouse Fundamentals, Wiley
2. Inmon, Building the Data Warehouse, Wiley
3. Kimball and Ross, The Data Warehouse Toolkit Wiley
4. Murray, Data Warehousing in the Real World, Wiley
5. Imhoff C., Mastering Data Warehouse Design Wiley
6. M.H. Dunham, Data mining: Introductory and Advanced Topics, Pearson
7. J. Han and M. Kamber, Data Mining: Concept and Techniques, Morgan Kaufman
8. Mallach, "Data Warehousing System, McGraw-Hill
9. Rechard J. Roiger and michal W. Greatz, Data Mining: A Tutorial based primer,
Pearson
10. Tom Mitchell, Machine Learning, McGraw-Hill

RCS-017: Complexity Theory


L
3

T
1

P
0

Syllabus
Models of Computation, resources (time and space), algorithms, computability,
complexity; Complexity classes, P/Approximability ,Circuit complexity, lower bounds;
Parallel computation and complexity; Counting problems; Interactive proofs;
Probabilistically
checkable
proofs;
Communication
complexity;
Quantum
computationNP/PSPACE, reductions, hardness, completeness, hierarchy, relationships
between complexity classes ,Randomized computation and complexity; Logical
characterizations, incompleteness.
Books and References:
1. Christos H. Papadimitriou, Combinatorial Optimization: Algorithms and Complexity
2. Sanjeev Arora and Boaz Barak , Complexity Theory: A Modern Approach
3. Steven Homer, Alan L. Selman, Computability and Complexity Theory , Springer

RCS-018: Information Theory


L
3

T
1

P
0

Syllabus
Review of probability theory, Entropy, Mutual information , Data compression ,
Huffman coding , Asymptotic equipartition property , Universal source coding , Channel
capacity , Differential entropy , Block codes and Convolutional codes.

RCS- 027:

Cryptography and Steganography


L
3

T
1

P
0

Syllabus
Symmetric Encryption: DES, Strength of DES,Differential and Linear Cryptanalysis of
DES, Advanced Encryption Standard,Stream Cipher and RC4,Block Cipher Principles,
Block Cipher Modes of operation.Public Key Cryptography: Public Key Cryptosystem,
RSA System, Implementing RSA, Attacks on RSA,Elliptic Curve Cryptography, Key
Management :Distribution of Public Keys, Public Key distribution of secret keys, DiffieHellamn Key Exchange. Number Theory: Eulers Totient Function, Fermats & Eulers
Theorem, Primality Testing, Group, Ring and Field , Modular Airthmatic. Hash Function
and Authentication Application: Hash Functions, Security of Hash function,MD5,Decure
Hash Algorithm,SHA-1,SHA-512, Whirlpool, Digital Signature, Digital Signature
Standard, Authentication Protocols, Kerberos and X.509.Steganography: Introduction to
Steganography, Notation And Terminology, Cachins Definition of Steganographic
Security, Applications of Steganography.
Text Books/Reference Books:
1.William Stallings, Cryptography and Network Sceurity , Fifth Edition, Pearson
Education.
2. Behrouz A Forouzan , Cryptography & Network Security, Special
Edition,2007,TMH
3.Ingemar J.Cox, Matthew L. Miller, Jeffrey A.Bloom, Jessica Fridrich and Ton Kalker,
Digital Watermarking
and Steganography, Secon Edition Morgon Kaufmann.

RCS-031 :

Natural Language Processing


L
3

T
1

P
0

Syllabus
Introduction to semantics, semantic interpretation, knowledge representation, context and
world knowledge, plans and actions, discourse structure, belief models, speech acts.
Selected applications.
Books and References:
G. Chirchia and S. McConnell Ginet.Meaning and Grammar, MIT Press
1:
James Allen.Natural Language Understanding, Benjamin-Cummins
2:

RCS-032: Engineering and Testing Structured Systems


L
3

T
1

Syllabus
Scope of Software Engineering, The Software Crisis, The functional approach.
Structuring a problem. Notion of analysis. Design as synthesis, The Yourdon method:
need for Event Partitioning, Context Diagram, Event typology, converting from events to
software system functions , Data Flow diagrams, Constraints, Data Dictionary, Process
specification techniques.
Construction Design: Coupling and Cohesion. Afferent and Efferent modules, Design
Heuristics for Module Design , Maturity levels of testing, Unit, Module, Sub-System and
System Testing Interaction., Top down and bottom up testing, Constructing Stubs and
Drivers. Notion of a test case, test design approach to software design , White box
testing: Testing Hypotheses, Statement testing, branch testing, branch and statement
testing, Path, predicate path, path interpretation, Cyclomatic complexity, condition
testing, loop testing , Black box testing: Cause-effect technique Implications of software
systems on underlying IT infrastructureacts.
Books and References:
1. Yourdon, Modern Structured Analysis, Pearson
2. Beizer, Software Testing, Van Nostrand Reinhold CO.
3. Pressman, Software engineering, McGraw-Hill
4. Sommerville, Software Engineering, Pearson

RCS-033 :

Real Time Systems


L
3

T
1

P
0

Syllabus
Advance Real-Time Systems: Multiprocessor scheduling, load sharing techniques,
performance metric in Real-Time Systems. Resource management and resource reclaiming in
uniprocessor and multiprocessor systems. Scheduling flexible computations and tasks with
temporal distance constraints. Practical factors and overheads in scheduling, task
synchronization, fault tolerance in multi processor systems, Real-Time communication.
Introduction to object oriented approaches; case study of distributed Real-Time Systems.
Books and References:
1:
J.W.S. Liu: "Real-Time system", Pearson Education Asia.
2.
3.

P.D. Laurence, K.Mauch: "Real-time Microcomputer system design, An introduction",


McGraw Hill.
S.T. Lavi, A.K. Agarwal: "Real-time system Design", McGraw Hill.

RCS-035 : Mobile Computing


L
3

T
1

Syllabus
Introduction:Basic Concepts, Principles of Cellular Communication, Overview of 1G,
2G, 2.5G, 3G and 4G technologies, GSM and CDMA Architecture, Mobility
Management, Mobile Devices: PDA, Mobile OS: Palm OS, Mobile Linux Initiative,
Symbian.Process Migration: Kernel Support for Migration: Mobility Enhancement in
modern UNIX Systems, Transparent Process Migration Design Alternatives, Removing
Process Migration Bottlenecks, Task Migration Issues User Space support for Migration:
Checkpointing, Process Migration Data Issues: Workload Balancing Strategies in
migration, Process lifetime distributions for dynamic load balancing, Disconnected
Operations in Coda File System, Weak Connectivity for Mobile File Access, Weakly
Connected Replicated Storage System. Mobile Data Networking: Mobile IPv4 and
Mobile IPv6, Mobile Internetworking Architecture, Internet Mobility Issues, Route
Optimization, Performance of Wireless TCP, GPRS Services, IP over CDMA
Mobile Agents: Basic Concepts, OS support for Mobile Agents, Java Aglet API,
AGENT TCL, Network Aware Mobile Programs,Mobile Objects and Agents, OMG
MASIF Framework, Mobile Agent Security Issues.
Books and References:
1. Richard Wheeler, Mobility: Processes, Computers and Agents
2. Charles Perkins et.al.,Mobile IP: Design Principles and Practices, Pearson
3. Tomasz Imielinski, Mobile Computing, Springer Verlag

P
0

RCS-037:

Randomized Algorithm
L
3

T
1

P
0

Syllabus
Introduction: Basic Probability Theory, Probability Spaces; Bayes' Rule; Independence;
Expectation; Moments; Common Distributions , Randomized Algorithm: General
concepts and definitions, Quicksort , Min-Cut, Random Partitions, Probabilistic
recurrences , Randomized Complexity Classes: RP, PP, BPP Game Theoretic
Techniques and Lower Bounds: Game theory concepts; Applications to lower bounds,
Examples: Sorting and Game tree evaluation ,Moments and Deviations: Random
sampling/bucketing, Tail bounds : Markov and Chebyshev inequalities, High ,
confidence selection, Pairwise independence, Applications : The stable marriage problem
Tail Inequalities : Chernoff bounds; Applications: Network routing and gate-array wiring
,Markov Chains and Random Walks: A 2-SAT Example, Markov Chains, Random Walks
on Graphs, Graph, Connectivity, Expanders , Probability Amplification by Random
Walks on Expanders , Algebraic methods: Fingerprinting and Freivald's technique,
Verifying polynomial identities, Randomized pattern matching, Data Structures: Random
treaps; Skip lists,Randomized Graph Algorithm: Shortest paths; Minimum spanning tree
,Parallel and Distributed Algorithms: The PRAM Model, Sorting on a PRAM, Maximal
Independent Sets, Perfect Matchings, Number Theory and Algebra: Elementary number
theory, Quadratic residues, Primality testing, RSA cryptosystem.
Books and References:
1. R. Motwani and P. Raghavan, Randomized Algorithms, Cambridge University Press
2. Michael Mitzenmacher, Eli Upfal , Probability and Computing, Cambridge
University Press

RCS-042: Software Quality Management


L
3

T
1

P
0

Syllabus
Introduction : Defining Software Quality, Quality Perspectives and Expectations
,Software Quality Attributes and Specification, Concept of Defects, Faults, Failures,
Defect Rate and Reliability, Defect Prevention, Reduction, and Containment, Overview
of Different Types of Software Review.Software Quality Metrics :Product Quality
Metrics: Mean time to failure, Defect Density, Customer Problems Metric, Customer
Satisfaction Metrics, Function Points, In-Process Quality Metrics: Defect Arrival Pattern,
Phase-Based Defect Removal Pattern, Defect Removal Effectiveness, Metrics for
Software Maintenance: Backlog Management Index, Fix Response Time, Fix Quality,
Software Quality Indicators.Software Quality Management and Models : ISO 9000 :
What ,why and how to get ISO 9000 Certification? Software Quality Models: McCalls
Quality Model, Boehms Quality Model, FURPS, Dromeys Quality Model, ISO
9126,Capability Maturity Model(s),Six Sigma.Software Quality Assurance and Testing :
Quality Planning and Control, Quality Improvement Process, Evolution of Software
Quality Assurance (SQA), Major SQA Activities, Major SQA Issues, Zero Defect
Software, SQA Techniques, Statistical Quality Assurance, Total Quality Management,
Verification and Validation, Software Testing: White Box Testing: Static Testing
,Structural Testing, Black Box Testing: Requirement based testing, Boundary Value
Analysis, Modern Testing Tools and their characteristics.
Books and References:
1. Jeff Tian, Software Quality Engineering , Wiley.
2. Stephen H. Kan , Metrics and Models in Software Quality Engineering,Pearson.
3. Rajib Mall, Fundamentals of Software Engineering, Fourth Edition PHI Learning.
4. Roger S. Pressman, Software Engineering-A Practitioners Approach, Sixth
Edition,McGrawHill
5.Srinivasan Desikan and Gopalaswamy Ramesh, Software Testing-Principles and
Practics,Pearson.

RCS-045

Network Programming
L
3

T
1

P
0

Syllabus
Sockets introduction, Socket address structure, byte ordering functions, byte manipulations
functions, read, written and readline functions. TCP Sockets and UDP socket. Client Server
Design Alternatives, TCP test client and different servers, Creation and termination of
thread, TCP echo server using thread, thread specific data. Inter-process communications:
Inter process communication using pipes, FIFO or named pipes, mutex and condition
variables, record locking, IPC facilities: message passing, semaphore, shared memory.
Books and References:
1: Douglas E. Comer, David L. Stevens, Inter-networking with TCP/IP: Client Server
Programming and Applications, Vol. III, PHI (1996).
2.
Jaffrey D. Schank, Client server Applications and Architecture, BPB Novell press
(2000).
3. Douglas J. Reilly, Client-server server Developers guide, Addision Wesley Developers
press (1999).

RCS-046:

Distributed DBMS
L
3

T
1

P
0

Syllabus
Review of computer networks and centralized DBMS, Why distributed databases, basic
principles of DDBMS,distribution, heterogeneity, autonomy, DDB architecture: clientserver, peer-to-peer, federated, multidatabase, DDB design and implementation:
fragmentation, replication and allocation techniques, Distributed query processing and
optimization,Distributed transaction management, concurrency control and reliability,
DDB interoperability
Books and References:
1. Ceri and Pelagatti, Distributed Data Base Systems, Addison
2. Ozsu,Valduriez, Distributed Data Base Systems, Pearson

RCS-047 : Approximation Algorithms


L
3

T
1

P
0

Syllabus
Introduction, Overview of Complexity Theory: Class NP, NP-Completeness, reductions,
Randomized Complexity Classes, Basics of Probability Theory, Expectation and
moments, basic distributions , Vertex/set cover, Greedy algorithm, Hardness of
approximating Traveling Salesman Problem (TSP), Set cover, layering algorithm,
shortest superstring, Steiner tree, Metric Steiner tree, Metric TSP; Minimum weight
multiway cut minimum weight k-cut , k-center ,Knapsack problem, Pseudo polynomial
time algorithms PTAS, Fully polynomial time approximation scheme, FPTAS, Strong
NP-hardness, Bin packing, Asymptotic PTAS, Euclidean TSP, Proof of correctness ,LP
Duality, LP Duality Theorem, Dual-fitting -based analysis for the greedy set cover
algorithm ,Rounding Algorithm: set cover, randomized rounding ,Half-integrality of
vertex cover; Primal-dual Schema: set cover ,Scheduling on Unrelated Parallel Machines,
Primal-Dual algorithms, Facility Location and the k-Median Problem, Steiner Network
Design.
Books and References:
1. Vijay V.Vazirani, Approximation Algorithm, Springer
2. D. S. Hochbaum, Approximation Algorithms for NP-Hard Problems, PWS 1997

List of Electives
Elective
Elective 1
RCS-01Y

Elective 2
RCS-02Y

Elective 3
RCS-03Y

Elective 4
RCS-04Y

Subject
Code (Y)
(1)
(2)
(3)
(4)
(5)
(6)
(7)
(8)
(1)
(2)
(3)
(4)
(5)
(6)
(7)
(8)
(1)
(2)
(3)
(4)
(5)
(6)
(7)
(8)
(1)
(2)
(3)
(4)
(5)
(6)
(7)
(8)

Subject Name
Advance Artificial Intelligence
Engineering Object Oriented System
Distributed Computing
Image Processing
Cloud Computing
Data Warehouse and Mining
Complexity Theory
Information Theory
Artificial Neural Network and Fuzzy Logic
Advance Software Engineering
Parallel Processing
Biometric System
Wireless Adhoc Network
Dedicated System Design
Cryptography and Stenography
Embeded Systems
Natural Language Processing
Engineering and Testing Structured System
Real Time System
Pattern Recognition
Mobile Computing
Big Data System
Randomized Algorithm
Network Security and Cyber Law
Knowledge Base System
Software Quality Management
Fault Tolerance System
Forensic Science and Application
Network Programming
Distributed DBMS
Approximation Algorithm
Reliability

Prerequisite

RCS-011
RCS-022
RCS-021

RCS-013

You might also like