System Engineering and Operations Research
System Engineering and Operations Research
System Engineering and Operations Research
UNIVERSITY DEPARTMENTS
M.E. SYSTEMS ENGINEERING AND OPERATIONS RESEARCH
REGULATIONS – 2015
CHOICE BASED CREDIT SYSTEM
1
MAPPING OF PROGRAMME EDUCATIONAL OBJECTIVES WITH PROGRAMME OUTCOMES
A broad relation between the programme objective and the outcomes is given in the following table
1 √ √ √ √
2 √ √ √ √ √ √ √
3 √ √ √ √
4 √ √ √ √ √ √ √
2
A B C D E F G H I J
SEM 1 Advanced Mathematics for
Computing
Data Structures and Algorithms
Networking Technologies
Linear Programming and
applications
Principles of Systems Engineering
Data Structures and Algorithms
Lab
YEAR 1
SEM 3
Non Linear Programming
Elective III
YEAR 2
Elective IV
Elective V
Project Work (Phase I)
II SEMESTER
SL. COURSE CONTACT
COURSE TITLE CATEGORY L T P C
NO CODE PERIODS
THEORY
4
III SEMESTER
IV SEMESTER
5
ANNA UNIVERSITY, CHENNAI
UNIVERSITY DEPARTMENTS
M.E. SYSTEMS ENGINEERING AND OPERATIONS RESEARCH (PART-TIME)
REGULATIONS – 2015
CHOICE BASED CREDIT SYSTEM
CURRICULUM I TO VI SEMESTERS (PART TIME)
SEMESTER - I
SL. COURSE CONTACT
COURSE TITLE CATEGORY L T P C
NO. CODE PERIODS
THEORY
1. Advanced Mathematics
MA7151 FC 4 4 0 0 4
for Computing
2. Data Structures and
SO7101 Algorithms PC 3 3 0 0 3
3. Linear Programming
SO7102 PC 5 3 0 2 4
and Applications
PRACTICALS
4. SO7111 Data Structures and
PC 4 0 0 4 2
Algorithms Lab
TOTAL 16 10 0 6 13
II SEMESTER
SL. COURSE CONTACT
COURSE TITLE CATEGORY L T P C
NO. CODE PERIODS
THEORY
1. SO7251 Advanced Database
PC 3 3 0 0 3
Management Systems
2. SO7201 Supply Chain
PC 3 3 0 0 3
Management
3. CP7153 Advances in Operating
PC 3 3 0 0 3
Systems
PRACTICALS
4. SO7211 Advanced Database
Management Systems PC 4 0 0 4 2
Lab
TOTAL 13 9 0 4 11
III SEMESTER
SL. COURSE CONTACT
COURSE TITLE CATEGORY L T P C
NO. CODE PERIODS
THEORY
1. SO7103 Principles of Systems
PC 3 3 0 0 3
Engineering
2. CP7155 Networking
PC 3 3 0 0 3
Technologies
3.
Elective I PE 3 3 0 0 3
PRACTICALS
4. CP7162
Professional Practices EEC 2 0 0 2 1
TOTAL 11 9 0 2 10
6
IV SEMESTER
V SEMESTER
VI SEMESTER
7
FOUNDATION COURSES (FC)
SL. COURSE COURSE TITLE CATEGORY CONTACT L T P C
NO CODE PERIODS
1. Advanced
Mathematics for FC 4 4 0 0 4
Computing
8
PROFESSIONAL ELECTIVES (PE)
9
MA7153 ADVANCED MATHEMATICS FOR COMPUTING L T PC
4 0 0 4
OBJECTIVES:
To understand the basics of random variables and standard distributions
To understand the arrival process and various queueing and server models
To appreciate the use of simulation techniques
To apply testing of hypothesis to infer outcome of experiments
To apply mathematical linear programming techniques to solve constrained problems.
OUTCOMES:
Upon completion of the course, the student will be able to
Identify the type of random variable and distribution for a given operational
conditions/scene
Study and Design appropriate queuing model for a given problem/system situation
Simulate appropriate application/distribution problems
Differentiate/infer the merit of sampling tests.
Formulate and find optimal solution in the real life optimizing/allocation/assignment
problems involving conditions and resource constraints.
REFERENCES:
1. Johnson, R.A. Miller and Freund’s,” Probability and Statistical for Engineers, Prentice Hall of
India Pvt., Ltd., New Delhi, Seventh Edition, 2005.
2. Hamdy A. Taha, “Operations Research: An Introduction”, Prentice Hall of India Pvt., Ltd. New
Delhi, Eighth Edition, 2007.
3. Jay L. Devore,” Probability and Statistics for Engineering and the Sciences”, Cengage
Learning, Seventh Edition, 2009.
4. Ross. S.M., “Probability Models for Computer Science”, Academic Press, 2002.
5. Winston, W.L., “Operations Research”, Thomson – Brooks/Cole, Fourth Edition, 2003.
6. Gross D. and Harris C.M., “Fundamentals of Queuing Theory”, John Wiley and Sons, New
York, 1998.
7. J.Medhi,” Stochastic models of Queuing Theory”, Academic Press, Elsevier, Amsterdam,
2003
10
L T P C
SO7101 DATA STRUCTURES AND ALGORITHMS
3 0 0 3
OBJECTIVES:
To acquire knowledge in data structures and algorithms.
To apply appropriate data structures and algorithm in program designs.
TOTAL = 45 PERIODS
OUTCOMES:
Upon Completion of the course, the students will be able to:
Acquire the ability to select better algorithms based on complexity and efficiency.
Master a variety of advanced data structures and their implementations.
Apply and implement learned algorithm design techniques and data structures to solve
problems.
REFERENCES
1. Bjarne Stroustrup, “The C++ Programming Language”, Addison Wesley, 4th Ed, 2013.
2. E.Horowitz, S.Sahni and Dinesh Mehta, “Fundamentals of Data structures in C++”, University
Press, 2007.
3. E.Horowitz, S.Sahni and S.Rajasekaran, “Computer Algorithms/C++”, Second Edition,
University Press, 2007.
4. Thomas H.Cormen, Charles E.Leiserson, Ronald L.Rivest, Clifford Stein, “Introduction to
Algorithms”, 3rd Ed, PHI Learning, 2009.
11
L T P C
CP7155 NETWORKING TECHNOLOGIES
3 0 0 3
OBJECTIVES
To learn about integrated and differentiated services architectures
To understand the working of wireless network protocols
To study the evolution made in cellular networks
To get familiarized with next generation networks
UNIT I NETWORK ARCHITECTURE AND QoS 9
Overview of TCP/IP Network Architecture – Integrated Services Architecture – Approach –
Components – Services – Queuing Discipline – FQ – PS – BRFQ – GPS – WFQ – Random Early
Detection – Differentiated Services.
OBJECTIVES
To introduce the basic concepts and tools in optimization.
To explore the advanced concepts vertically to get clear understanding and to apply
the concepts in engineering and scientific applications.
UNIT I INTRODUCTION 9
Formulation and Graphical Solutions – Solution of Maximization Model –Solution of Minimization
Model – Simplex method – Degeneracy – Unbounded Solution –Infeasible Solution – Alternative
Optima.
REFERENCES:
1. Hamdy A.Taha, “Operations Research - An Introduction”, Prentice Hall, Ninth Edition, 2010.
2. J.K.Sharma, “Operations Research Theory and applications”, Macmillan, 5 th Edition, 2013.
3. Hiller F.S, Liberman G.J, “Introduction to Operations Research”, 9 th Edition, McGrawHill, Inc.,
2009
4. Ronald L.Rardin, “Optimization in Operations Research”, Pearson Education, Asia, 1997.
5. Jit.S.Chandran, Mahendran P.Kawatra, KiHoKim, “Essentials of Linear Programming”, Vikas
Publishing House Pvt.Ltd. New Delhi, 1994.
6. Harvey M. Wagner, “Principles of Operations Research with applications to Managerial
Decisions”, PHI Learning Private Limited, 2 nd Edition, 2009
13
L T P C
SO7103 PRINCIPLES OF SYSTEMS ENGINEERING
3 0 0 3
OBJECTIVES:
To introduce the concepts related to systems engineering with design, analysis, game theory
and decision making analysis.
TOTAL = 45 PERIODS
OUTCOMES:
Upon completion of the course, the students will:
Have the capability to design and analyze the system.
Acquire decision making ability.
Be familiar in system engineering design.
REFERENCES:
1. Andrew P.Sage and James E.Armstrong, “Systems Engineering”, Wiley InterScience
Publications, 2004.
2. Andrew P.Sage, William B.Rouse, “Handbook of Systems Engineering and Management”, John
Wiley and Sons, 2011.
3. Alexander Kossiakoff, William N.Sweet, “Systems Engineering: Theory & Practice”, John Wiley
& Sons, 2002.
4. James N.Martin, “Systems Engineering Guidebook: A Process for Developing Systems and
Products”, CRC Press, 1997.
14
L T P C
SO7111 DATA STRUCTURES AND ALGORITHM LAB
0 0 4 2
OBJECTIVES
To acquire the knowledge of object oriented programming.
To learn the usage of stack and queues.
To understand the usage of linked list structures for stack and queues.
To learn the working of various searching and sorting algorithms.
L T P C
SO7251 ADVANCED DATABASE MANAGEMENT SYSTEMS
3 0 0 3
OBJECTIVES:
To understand the underlying principles of Relational Database Management System.
To understand and implement the advanced features of DBMS.
To develop database models using distributed databases.
To implement and maintain an efficient database system using emerging trends.
15
UNIT II PARALLEL AND DISTRIBUTED DATABASES 9
Centralized and Client-Server Architectures – Parallel Systems – Distributed Systems – Parallel
Databases – I/O Parallelism – Inter- and Intra-Query Parallelism – Inter- and Intra-operation
Parallelism – Distributed Database Concepts: – Distributed Data Storage – Distributed
Transactions – Commit Protocols – Concurrency Control – Distributed Query Processing.
REFERENCES
1. R. Elmasri, S.B. Navathe, “Fundamentals of Database Systems”, Addison-Wesley, 2011.
2. Thomas Cannolly and Carolyn Begg, “Database Systems, A Practical Approach to Design,
Implementation and Management”, Third Edition, Pearson Education, 2007.
3. Henry F Korth, Abraham Silberschatz, S. Sudharshan, “Database System Concepts”, Fifth
Edition, McGraw Hill, 2006.
4. C.J.Date, A.Kannan and S.Swamynathan,”An Introduction to Database Systems”, Eighth
Edition, Pearson Education, 2006.
5. V.S.Subramanian, “Principles of Multimedia Database Systems”, Harcourt India Pvt. Ltd.,
2001.
L T P C
SO7201 SUPPLY CHAIN MANAGEMENT
3 0 0 3
OBJECTIVES:
To familiarize the management of supply chain assembly and role of IT in it.
To learn about the capability of Inventory management, planning and decision making.
UNIT I INTRODUCTION 9
Introduction to SCM – Development chain – Global Optimization – Managing uncertainty and risk –
Evolution of SCM – Issues in SCM – Decision phase – Supply chain drivers and obstacles – SCM
complexity.
UNIT II FORECASTING 9
Demand forecasting – Role of forecasting-Characteristics – Basic Approach – Time series method
– Measures of forecast error – Aggregate planning in SCM – Aggregate planning using Linear
Programming – Excel – Supply and demand planning in supply chain – Managing supply –
Demand – Implementing solution.
16
UNIT III INVENTORY MANAGEMENT AND RISK POOLING 9
Introduction to inventory – Forms of inventory – Single stage control – Economic Order Quantity
(EOQ)– Lot size model – Demand uncertainty – Single period model – Review Policies – Risk
Pooling – Centralized v/s Decentralized systems – Practical issues – Approaches for future
demand.
REFERENCES:
1. Sunil Chopra, Peter Mendil, “Supply chain Management – Strategy, Planning and Operation”,
Pearson, 5th Edition, 2012.
2. Hartmat Stadtler, Christoper Kilger, “Supply Chain Management and Advanced Planning
Concepts, Models, Software and Case Studies”, 5th edition, Springer, 2015.
3. Simchi-Levi David, Kaminsky Philip, Simchi-Levi Edith, “Designing and Managing the Supply
Chain: Concepts, Strategies and Case Studies”, McGraw Hill, 3rd edition, 2008.
4. Handfield R.B, Nicholas E.L, “Introduction to Supply Chain Management”, PHI, 1999.
5. Shapiro, J.F, “Modelling the Supply Chain”, Dubury, 2nd Edition 2006.
L T P C
CP7153 ADVANCES IN OPERATING SYSTEMS
3 0 0 3
OBJECTIVES
To understand the concepts of distributed systems
To get an insight into the various issues and solutions in distributed operating systems
To learn about mobile and real-time operating systems
To gain knowledge on the design concepts of mainframe operating systems
REFERENCES
1. Mukesh Singhal, Niranjan Shivaratri, “Advanced Concepts in Operating Systems –
Distributed, Database and Multiprocessor Operating Systems”, Tata McGraw-Hill, 2001.
2. Rajib Mall, “Real-Time Systems: Theory and Practice”, Prentice Hall, 2006.
3. Neil Smyth, “iPhone iOS 4 Development Essentials – Xcode”, Payload Media, Fourth
Edition, 2011.
4. Nikolay Elenkov, “Android Security Internals: An In-Depth Guide to Android’s Security
Architecture”, No Starch Press, 2014.
5. Jonathan Levin, “Mac OS X and iOS Internals: To the Apple’s Core”, John Wiley & Sons,
2012.
6. Andrew S. Tanenbaum and Herbert Bos, “Modern Operating Systems”, Fourth Edition,
Prentice Hall, 2014.
7. Mike Ebbers, John Kettner, Wayne O’Brien, Bill Ogden, “Introduction to the New
Mainframe: z/OS Basics”, Third Edition, International Business Machines Corporation,
2011.
8. Abraham Silberschatz, Peter B. Galvin, Greg Gagne, "Operating System Concepts", Wiley,
Eighth edition, 2008.
L T P C
CP7254 SECURITY PRINCIPLES AND PRACTICES
3 0 0 3
OBJECTIVES
To understand the mathematical foundations of security principles
To appreciate the different aspects of encryption techniques
To understand the role played by authentication in security
To appreciate the current trends of security practices
18
UNIT I CLASSICAL CIPHERS 9
Classical Cryptography- Shift Cipher - Substitution Cipher - Affine Cipher – Cryptanalysis -
Cryptanalysis of the Affine Cipher - Cryptanalysis of the Substitution Cipher - Cryptanalysis of the
Vigenere sew Cipher - Shannon’s Theory
L T P C
SO7211 ADVANCED DATABASE MANAGEMENT SYSTEM LAB
0 0 4 2
OBJECTIVES:
To implement Relational Database and Perform Query Operations, Update Operations and
Report Generation, Active Database Concepts, Distributed Database Concepts,
Distributed Database Concepts, XML Databases, ODBC.
19
SOFTWARE:
Oracle 10 G or Higher / Equivalent
TOPICS TO BE COVERED:
1. Data Definition Language
Create, Alter, Drop, Truncate, Comment, Rename Command Enforcing Integrity
Constraints Views, Synonyms, Sequences, Indexes
2. DML Operations
3. Joining Data from Multiple Tables in Queries
The join Condition / The Cartesian Product Equijoin, Self-join, Outer joins
4. Set Operations
5. Aggregate Functions and the GROUP By Clause
6. Using Sub-queries
7. Analytic Functions
8. Introduction to Procedures and Functions
Creating stored PL / SQL objects, procedures, functions
9. Creating Packages
10. Creating package specifications and bodies
11. Creating DML Triggers
Triggering events, Trigger behavior
Correlation identifiers, Multi-statement triggers
Trigger firing behavior, Enabling / Disabling triggers
12. Distributed Database Implementation
TOTAL = 60 PERIODS
OUTCOMES:
Upon Completion of the course, the students will be able to:
Design and implement relational database.
Perform all the query manipulation operations and procedural querying language.
Design and develop active and distributed databases.
L T P C
CP7162 PROFESSIONAL PRACTICES
0 0 2 1
OBJECTIVES:
To facilitate analysis, design and problem solving skills
To have a thorough domain knowledge
To understand the best Industry practices by reading case studies
To kindle innovative and professional thinking
To explore possible alternative solutions
To estimate feasibility, cost, risk and ROI
20
Describe the industry standards and procedures
Predict the business opportunity
Suggest system implications
L T P C
SO7301 NON LINEAR PROGRAMMING
3 0 2 4
OBJECTIVES
To introduce and familiarize non-linear approaches in optimization.
To conceptualize the real life applications in terms of non-linearity and also to learn
MATLAB for solving the same.
UNIT I INTRODUCTION 9
Linear Vs Non-linear Programming – Basic properties of solutions and Algorithms – First order
necessary conditions – Examples of unconstrained problems – second-order conditions – convex
and concave functions – minimization and maximization of convex functions – saddle points –
Jacobian matrix.
21
L T P C
CP7251 CLOUD COMPUTING TECHNOLOGIES
3 0 0 3
OBJECTIVES:
To understand the concepts of cloud and utility computing
To understand the various issues in cloud computing
To familiarize themselves with the lead players in cloud
To appreciate the emergence of cloud as the next generation computing paradigm
To be able to set up a private cloud
UNIT I INTRODUCTION 9
Evolution of Cloud Computing -System Models for Distributed and Cloud Computing - NIST Cloud
Computing Reference Architecture -IaaS - On-demand Provisioning - Elasticity in Cloud -
Examples of IaaS Providers - PaaS - Examples of PaaS Providers - SaaS - Examples of SaaS
Providers - Public , Private and Hybrid Clouds – Google App Engine, Amazon AWS - Cloud
Software Environments -Eucalyptus, Open Nebula, Open Stack, Nimbus
UNIT II VIRTUALIZATION 9
Basics of Virtual Machines - Process Virtual Machines – System Virtual Machines – Emulation –
Interpretation – Binary Translation - Taxonomy of Virtual Machines. Virtualization –Management
Virtualization –– Hardware Maximization – Architectures – Virtualization Management – Storage
Virtualization – Network Virtualization
22
Elsevier/Morgan Kaufmann, 2005.
5. Danielle Ruest, Nelson Ruest, “Virtualization: A Beginner’s Guide”, McGraw-Hill Osborne
Media, 2009.
6. Tom White, "Hadoop: The Definitive Guide", Yahoo Press, 2012.
7. Rajkumar Buyya, Christian Vecchiola, and Thamarai Selvi, “Mastering Cloud Computing”,
Tata McGraw Hill, 2013.
23
L T P C
CP7076 DATA MINING TECHNIQUES
3 0 0 3
OBJECTIVES
To understand data mining principles and techniques and Introduce DM as a cutting edge
business intelligence
To expose the students to the concepts of data warehousing architecture and
implementation
To study the overview of developing areas – web mining, text mining and ethical aspects of
data mining
To identify business applications and trends of data mining
UNIT I INTRODUCTION TO DATA WAREHOUSING 9
Evolution of Decision Support Systems- Data warehousing Components – Building a Data
warehouse, Data Warehouse and DBMS, Data marts, Metadata, Multidimensional data model,
OLAP vs OLTP, OLAP operations, Data cubes, Schemas for Multidimensional Database: Stars,
Snowflakes and Fact constellations
Statistics and Data Analysis – EDA – Small and Big Data –Logistic Regression Model - Ordinary
Regression Model-Mining complex data objects – Spatial databases – Temporal databases –
Multimedia databases – Time series and sequence data – Text mining – Web mining –
Applications in Data mining
TOTAL : 45 PERIODS
OUTCOMES:
Upon completion of this course, the student should be able to
Evolve multidimensional intelligent model from typical system
Discover the knowledge imbibed in the high dimensional system
Evaluate various mining techniques on complex data objects
24
REFERENCES
1. Jiawei Han, Micheline Kamber, “Data Mining: Concepts and Techniques”, Morgan Kaufmann,
Third edition, 2011.
2. Alex Berson, Stephen J. Smith, “Data Warehousing, Data Mining & OLAP”, Tata McGraw Hill,
Tenth Reprint, 2007.
3. G. K. Gupta, “Introduction to Data Min Data Mining with Case Studies”, Eastern Economy
Edition, Prentice Hall of India, Third Edition, 2014.
4. Ian.H.Witten, Eibe Frank and Mark.A.Hall, “Data Mining: Practical Machine Learning Tools
and Techniques”, Morgan Kaufmann, Third edition, 2011.
5. Bruce Ratner, “Statistical and Machine - Learning Data Mining: Techniques for Better
Predictive Modeling and Analysis of Big Data”, CRC Press, Second Edition, 2012.
6. Mehmed kantardzic, “Data mining: Concepts, Models, Methods, and Algorithms”, Wiley-
Blackwell, Second Edition, 2011.
7. Ian Witten, Eibe Frank, “Data Mining: Practical Machine Learning Tools and Techniques”,
Third Edition, Morgan Kaufmann, 2011.
8. George M Marakas, “Modern Data Warehousing, Mining and Visualization: Core Concepts”,
Prentice Hall, 2002.
25
REFERENCES
1. Herbert Schildt, “Java - The Complete Reference”, 9th Edition, McGraw-Hill, 2014.
2. Robert Sebesta, “Programming with world wide web”, Pearson Education, 8th Edition,2015
3. Cay Horstmann and Gary Cornell, “Core Java”, Volume1 & Volume2, Pearson Education, 9th
Edition, 2012.
4. Bryan Basham, Kathy Sierra, Bert Bates, “Head First Servlets and JSP”, O'Reilly Media 2004
5. Deitel and Deitel, “Internet and World Wide Web : How to program”, Pearson Education
Publishers, 5th Edition, 2011
L T P C
SO7001 ADHOC AND WIRELESS SENSOR NETWORKS
3 0 0 3
OBJECTIVES:
To learn about the issues in the design of wireless ad hoc networks
To understand the working of protocols in different layers of mobile ad hoc and sensor
networks
To expose the students to different aspects in sensor networks
To understand various security issues in ad hoc and sensor networks and solutions to the
issues
26
OUTCOMES:
Upon completion of this course, the student should be able to
Identify different issues in wireless ad hoc and sensor networks
Analyze protocols developed for ad hoc and sensor networks
Identify different issues in wireless ad hoc and sensor networks
Identify and critique security issues in ad hoc and sensor networks
REFERENCES
1. Subir Kumar Sarkar, T G Basavaraju, C Puttamadappa, “Ad-Hoc Mobile Wireless Networks”,
Auerbach Publications, 2007.
2. Holger Karl, Andreas Willig, “Protocols and Architectures for Wireless Sensor Networks”,
Wiley India Private Limited, 2011.
3. Erdal Çayirci ,Chunming Rong, “Security in Wireless Ad Hoc and Sensor Networks”, John
Wiley and Sons, 2009.
4. C. Siva Ram Murthy and B.S. Manoj, “Ad Hoc Wireless Networks – Architectures and
Protocols”, Pearson Education, 2004.
5. Carlos De Morais Cordeiro, Dharma Prakash Agrawal, “Ad Hoc and Sensor Networks: Theory
and Applications”, World Scientific Publishing, Second Edition, 2011.
6. Waltenegus Dargie, Christian Poellabauer, “Fundamentals of Wireless Sensor Networks
Theory and Practice”, Wiley India Private Limited, 2014.
7. Adrian Perrig, J.D. Tygar, “Secure Broadcast Communication: In Wired and Wireless
Networks”, Kluwer Academic Publishers, Springer, 2002.
L T P C
CP7093 SOFT COMPUTING
3 0 0 3
OBJECTIVES:
To learn the key aspects of Soft computing and Neural networks
To study the fuzzy logic components
To gain insight onto neuro fuzzy modeling and control
To know about the components and building block hypothesis of genetic algorithm
To gain knowledge in machine learning through Support Vector Machines
L T P C
CP7072 BIG DATA ANALYTICS
3 0 0 3
OBJECTIVES
To understand big data analytics as the next wave for businesses looking for competitive
advantage
To understand the financial value of big data analytics and to explore tools and practices
for working with big data
To understand how big data analytics can leverage into a key component
To learn about stream computing
To know about the research that requires the integration of large amounts of data
OUTCOMES
Upon completion of this course, the student should be able to
Use Hadoop, Map Reduce Framework
Suggest areas to apply big data to increase business outcome
Contextually integrate and correlate large amounts of information automatically to gain
faster insights
REFERENCES
1. Frank J Ohlhorst, “Big Data Analytics: Turning Big Data into Big Money”, Wiley and SAS
Business Series, 2013.
2. Colleen Mccue, “Data Mining and Predictive Analysis: Intelligence Gathering and Crime
Analysis”, Elsevier, Second Edition, 2015.
3. Michael Berthold, David J. Hand, “Intelligent Data Analysis”, Springer, Second Edition,
2007.
4. Anand Rajaraman and Jeffrey David Ullman, “Mining of Massive Datasets”, Cambridge
University Press, 2014.
5. Bill Franks, “Taming the Big Data Tidal Wave: Finding Opportunities in Huge Data Streams
with Advanced Analytics”, Wiley and SAS Business Series, 2012.
6. Paul Zikopoulos, Chris Eaton, Paul Zikopoulos, “Understanding Big Data: Analytics for
Enterprise Class Hadoop and Streaming Data”, McGraw Hill, 2012.
7. Paul Zikopoulos, Dirk de Roos, Krishnan Parasuraman, Thomas Deutsch , James Giles,
David Corrigan, “Harness the Power of Big data - The big data platform”, McGraw Hill,
McGraw-Hill Osborne Media, 2012.
8. Glenn J. Myatt, “Making Sense of Data I: A Practical Guide to Exploratory Data Analysis
and Data Mining”, John Wiley & Sons, Second Edition, 2014.
9. Pete Warden, “Big Data Glossary”, O’Reilly, 2011.
10. Jiawei Han, Micheline Kamber “Data Mining Concepts and Techniques”, Elsevier, Third
Edition, 2011.
11. Greg Michaelson, “An introduction to functional programming through lambda calculus”,
Dover Publications, 2011.
29
L T P C
CP7154 MULTI CORE ARCHITECTURES
3 0 0 3
OBJECTIVES
To introduce the students to the recent trends in the field of Computer Architecture and
identify performance related parameters
To understand the different multiprocessor issues
To expose the different types of multicore architectures
To understand the design of the memory hierarchy
9
UNIT I FUNDAMENTALS OF COMPUTER DESIGN AND ILP
Fundamentals of Computer Design – Measuring and Reporting Performance – Instruction Level
Parallelism and its Exploitation – Concepts and Challenges – Limitations of ILP – Multithreading
– SMT and CMP Architectures – The Multicore era.
TOTAL : 45 PERIODS
OUTCOMES:
Upon completion of this course, the student should be able to
Identify the limitations of ILP and the need for multicore architectures
Discuss the issues related to multiprocessing and suggest solutions
Point out the salient features of different multicore architectures and how they exploit
parallelism
Critically analyze the different types of inter connection networks
Design a memory hierarchy and optimize it
REFERENCES:
1. John L. Hennessey and David A. Patterson, “Computer Architecture – A Quantitative
Approach”, Morgan Kaufmann / Elsevier, 5th edition, 2012.
2. Darryl Gove, “Multicore Application Programming: For Windows, Linux, and Oracle Solaris”,
Pearson, 2011.
3. David B. Kirk, Wen-mei W. Hwu, “Programming Massively Parallel Processors”, Morgan
Kauffman, 2010.
4. Wen– mei W. Hwu, “GPU Computing Gems”, Morgan Kaufmann / Elsevier, 2011
30
SO7008 SYSTEMS MODELLING AND SIMULATION L T P C
3 0 0 3
OBJECTIVES:
To obtain sufficient knowledge to model any given system.
To simulate the modeled system for performance study.
UNIT I INTRODUCTION 9
System definition - Types and characteristics - Need for modeling and simulation - Types of
Simulation - Introduction to discrete event simulation - Single server - Multiserver Exercises -
System modeling - Simple Petrinets
TOTAL: 45 PERIODS
OUTCOMES:
Upon Completion of the course, the students will be able to:
Modeling any given system with rationality.
Predicting the behavior through fine grained analysis.
REFERENCES:
1. Jerry Banks “Discrete-event system simulation”, Pearson Education, 2009.
2. Fitzgerald, John, Larsen, PeterGorm, “Modeling Systems; Practical Tools and Techniques in
software development”, Cambridge University Press, 2009.
3. Hopcroft, John E, Motwani, Rajeev, Ullman, Seffrey D, “Introduction to automata theory,
languages and computation”, Pearson/Addison Wesley, 3rd Edition, 2007.
4. Donald Gross and Carl M. Harris, “Fundamentals of Queuing theory”, 2nd Edition, John Wiley
and Sons, New York (1985).
5. Hamdy A Taha, “Operations Research an Introduction”, Prentice Hall, Eighth Edition, 2007.
6. Jeofrey Gordon “System Simulation”, Prentice Hall of India, 2009.
31
L T P C
SW7251 SOFTWARE TESTING AND QUALITY ASSURANCE
3 0 2 4
OBJECTIVES
The student should be able to
Know what is software and the usage of different types of softwares.
Know the Quality Metrics of various Softwares.
Know the methodologies in making Software.
Test the product finally to check the product Quality.
UNIT I INTRODUCTION 9
Introduction to Software Quality - Challenges – Objectives – Quality Factors – Components of
SQA – Contract Review – Development and Quality Plans – SQA Components in Project Life
Cycle – SQA Defect Removal Policies – Reviews.
TOTAL : 45 + 30 = 75 PERIODS
OUTCOMES
At the end the student will be able to
Analyze the product Quality.
Use various testing methods.
Assess Quality standards.
REFERENCES
1. Daniel Galin, “Software quality assurance – from theory to implementation”,
Pearsoneducation, 2009
2. Yogesh Singh, "Software Testing", Cambridge University Press, 2012
3. Aditya Mathur, “Foundations of software testing”, Pearson Education, 2008
4. Ron Patton, “Software testing” , second edition, Pearson education, 2007
5. Srinivasan Desikan, Gopalaswamy Ramesh, “Software testing– principles andpractices”,
Pearson education, 2006
6. Alan C Gillies, “Software Quality Theory and Management‖”, Cengage Learning, Second
edition,2003 .
7. Robert Furtell, Donald Shafer, and Linda Shafer, "Quality Software ProjectManagement",
Pearson Education Asia, 2002.
32
SO7004 DYNAMIC PROGRAMMING L T P C
3 0 0 3
OBJECTIVES:
To make more specific linear and non-linear approaches that suits both stochastic and
deterministic applications.
To analyze systems to ensure optimal and faster results.
REFERENCES:
1. Hamdy A.Taha, “Operations Research – An Introduction”, PHI Learning Private Limited,
Eighth Edition, 2007.
2. Harvey M.Wagner, “Principles of Operations Research with applications to Managerial
Decisions”, PHI Learning Private Limited, 2nd Edition, 2009.
3. Ronald L.Rardin, “Optimization in Operations Research”, Pearson Education, 1997.
33
SO7003 DESIGN PATTERNS L T P C
3 0 0 3
OBJECTIVES:
To understand the concept of patterns
To learn various design patterns.
To learn the usage of design patterns to keep code quality high.
UNIT I INTRODUCTION 9
History and Origin of Patterns – Introduction to OOAD - Apply Design Patterns – Prototype –
Testing.
UNIT II DESIGN PATTERNS 9
Kinds of Pattern – Quality and Elements – Patterns and Rules – Creativity and Patterns –
Creational Patterns – Structural Patterns – Behavioural Patterns, Factory Patterns.
REFERENCES
1. Erich Gamma, Richard Helm, Ralph Johnson, John Vlissides, “Design patterns: Elements of
Reusable object-oriented software”, Pearson; First Edition, 2012.
2. James W- Cooper, Addison-Wesley,”Java Design Patterns – A Tutorial”, 2003.
3. Eric Freeman, Elisabeth Robson, Bert Bates, Kathy Sierra, “Head First Design Patterns”,
O'Reilly, 2004.
4. Craig Larman, "Applying UML and Patterns: An Introduction to object-oriented Analysis and
Design and the unified process”, Second Edition, Prentice Hall, 2001.
5. William J Brown et al., "Anti-Patterns: Refactoring Software, Architectures and Projects in
Crisis", John Wiley, 1998.
34
UNIT I INTRODUCTION 9
Preliminary Considerations – Cost of Development – Importance of Mobile Strategies in Business
World –Mobile Web Presence – Mobile Applications – Marketing – Web Services for Mobile
Devices – Creating Example Web Service _ Debugging Web Service
TOTAL: 45 PERIODS
OUTCOMES:
Upon Completion of the course, the students will be able to:
To identify the limitations and challenges of working in a mobile and wireless environment
as well as the commercial and research opportunities presented by these technologies.
To apply the different types of application models/architectures used to develop mobile
software applications.
To design, implement and deploy mobile applications using an appropriate software
development environment.
To work within the capabilities and limitations of a range of mobile computing devices.
REFERENCES:
1. Jeff McWherter and Scott Gowell , Professional Mobile Application Development, Wrox 2012.
2. Simchi-Levi, David, Kamisnky, “Designing and managing the supply chain: Concepts,
Strategies and case studies”, McGraw Hill, 3rd edition, 2008.
3. Mobile Web Development by Nirav Mehta, Packet Publishing, 2008
4. Lyza Danger Gardner and Jason Grigsby, Head First Mobile Web, O’Relliy 2012.
5. Wei – Meng Lee, Beginning Android Application Development, Wiley 2011
6. Charlie Collins, Michael Galpin and Matthias Kappler, Android in Practice, Dream Tech. 2012
7. Jonathan SimonHead First Android Development, O’Relliy 2012.
35
L T P C
CP7077 DATABASE ADMINISTRATION AND TUNING
3 0 0 3
OBJECTIVES
To design and implement relational database solutions for general applications
To develop database scripts for data manipulation and database administration
To understand and perform common database administration tasks such as database
monitoring, performance tuning, data transfer, and security
To balance the different types of competing resources in the database environment so that
the most important applications have priority access to the resources
36
SO7002 BUSINESS PROCESS MANAGEMENT L T P C
3 0 0 3
OBJECTIVES:
To learn business process structure, framework and management.
TOTAL: 45 PERIODS
OUTCOMES:
Upon Completion of the course, the students will be able to:
Understand the life cycle of a business process in an organization.
Model and optimize the business process flow in an organization.
REFERENCES:
1. John Jeston and Johan Nelis, Business Process Management: Practical Guidelines to
Successful Implementations, 2nd Edition, Butterworth-Heinemann, An imprint of Elsevier,
2009.
2. Mathias Weske, Business Process Management: Concepts, Languages, Architectures, 2nd
Edition, Springer, 2012.
3. T.A. Venkatachalam, C.M. Sellappan, Business Process, PHI Learning Private Ltd, 2011
37
L T P C
CP7083 INTERNET OF THINGS IN THE CLOUD
3 0 0 3
OBJECTIVES:
To understand the basics of Internet of things and protocols
To get an idea of some of the application areas where Internet of Things can be applied
To understand the middleware for Internet of Things
To understand the concepts of Web of Things
To understand the concepts of Cloud of Things with emphasis on Mobile cloud computing
UNIT I INTRODUCTION 10
Definitions and Functional Requirements –Motivation – Architecture - Web 3.0 View of IoT–
Ubiquitous IoT Applications – Four Pillars of IoT – DNA of IoT - The Toolkit Approach for End-user
Participation in the Internet of Things. Middleware for IoT: Overview – Communication middleware
for IoT –IoT Information Security
UNIT IV INTEGRATED 9
Integrated Billing Solutions in the Internet of Things Business Models for the Internet of Things -
Network Dynamics: Population Models – Information Cascades - Network Effects – Network
Dynamics: Structural Models - Cascading Behavior in Networks - The Small-World Phenomenon
UNIT V APPLICATIONS 8
The Role of the Internet of Things for Increased Autonomy and Agility in Collaborative Production
Environments - Resource Management in the Internet of Things: Clustering, Synchronisation and
Software Agents. Applications - Smart Grid – Electrical Vehicle Charging
TOTAL : 45 PERIODS
OUTCOMES:
Upon completion of this course, the student should be able to
Identify and design the new models for market strategic interaction
Design business intelligence and information security for WoB
Analyze various protocols for IoT
Design a middleware for IoT
Analyze and design different models for network dynamics
REFERENCES
1. Honbo Zhou, “The Internet of Things in the Cloud: A Middleware Perspective”, CRC Press,
2012.
2. Dieter Uckelmann, Mark Harrison, Michahelles, Florian (Eds), “Architecting the Internet of
Things”, Springer, 2011.
3. David Easley and Jon Kleinberg, “Networks, Crowds, and Markets: Reasoning About a Highly
Connected World”, Cambridge University Press, 2010.
4. Olivier Hersent, Omar Elloumi and David Boswarthick, “The Internet of Things: Applications to
38
the Smart Grid and Building”, Wiley, 2012.
5. Olivier Hersent, David Boswarthick, Omar Elloumi , “The Internet of Things – Key applications
and Protocols”, Wiley, 2012.
L T P C
CP7089 REAL TIME SYSTEMS DESIGN
3 0 0 3
OBJECTIVES:
To learn real time operating system concepts and the associated issues & techniques.
To understand design and synchronization problems in Real Time System.
To understand the evaluation techniques present in Real Time System.
40