BTech06 Syl
BTech06 Syl
Pre-requisite: NIL
L T P Cr
3 0 0 3
Module I
Introduction to computers and software (3 Hours)
Problem solving, algorithm design, and algorithm analysis (mention only) (3 Hours)
Design methodologies: (6 Hours)
Stepwise refinement: Modules and Interfaces.
Object oriented methodology: Encapsulation, Inheritance, Polymorphism
Module II
Programming language concepts and constructs: Expressions, Statements, selection, repetition.
(11 Hours)
Module III
Functions, recursion, I/O mechanisms (Exceptions optional) (10 Hours)
Module IV
Data types: Primitive types and structured types (4 Hours)
Coding practices: (3 Hours)
Indentation guidelines, naming conventions, documenting code, debugging
Testing: Verification methods, test data selection. (2 Hours)
Note: Programming language C++ / Java may be used as a vehicle to achieve the goal.
Text Books:
1.Bruce Eckel, Thinking in Java, 3/ed, Available online at www.bruceeckel.com
2. Bruce Eckel, Thinking in C++, 2/ed. Vol I and II, Available online at www.bruceeckel.com
References:
1. Robert Lafore, Object Oriented Programming in Turbo C++, The Waite Group’s, Galgotia Publications Pvt. Ltd. 2000.
2. Rebecca Thomas, Lawrence R Rogers, Jean L Yates, Advanced Programmer’s Guide to UNIX System V, McGraw Hill
International Edition, Computer Science Series.
3. Patrick Naughton, Herbert Schildt, Java TM 2: The Complete Reference, Tata McGraw-Hill Publishing Company Ltd. 3/ed
4. Danny Kalev, The ANSI/ISO C++ Professional Programmer’s Handbook, PHI 2000.
CSU 212 COMPUTATIONAL COMBINATORICS
Pre-requisite: NIL
L T P Cr
3 0 0 3
Module II (8 Hours)
Generating Functions, Partitions of Integers. The Exponential Generating Functions.
Recurrence Relations .The First-Order Linear Recurrence Relation. The Second-Order Linear Homogeneous Recurrence Relation
with Constant Coefficients. The Non homogeneous Recurrence Relation.
References:
1. Grimaldi R. P. Discrete and Combinatorial Mathematics, 5/e, Addison Wesley, 2002.
2. Thomas Koshy. Discrete Mathematics with Applications, Academic Press, Elsevier, 2004.
3. Kenneth H Rosen. Discrete Mathematics and its Applications. McGraw Hill, 2000.
4. Ravindra K. K. Ahuja, Thomas L. Magnanti, James B. Orlin. Network Flows: Theory, Algorithms, and Applications. Prentice
Hall, 1993.
CSU 202 LOGIC DESIGN
L T P Cr
3 0 2 4
References:
1. N. N. Biswas, Logic Design Theory, Prentice Hall of India, New Delhi, 1993.
2. T. L. Floyd, Digital Fundamentals, 3/e, Universal Book Stall, New Delhi, 1986.
3. B. B. Brey, The Intel Microprocessors 8086 to Pentium: Architecture, Programming and Interface, 6/e,
Prentice Hall of India, New Delhi, 2003.
4. Programming for embedded systems Dream Software team , Willey 2002
5. H. P. Messmer, The Indispensable PC Hardware Book, 3/e, Addison Wesley, 1997.
6. A. K. Ray, and K. M. Bhurchandi, Advanced Microprocessors and Peripherals, Tata McGraw Hill, 2000.
7. D. V. Hall, Microprocessors and Interfacing: Programming and Hardware, 2/e, Tata McGraw Hill, New Delhi, 1992.
CSU 230 PROGRAM DESIGN
L T P Cr
3 0 2 4
References:
1. Aho A.V., Hopcroft J.E., and Ullman J.D., Data Structures and Algorithms, Pearson Education, New Delhi, 1983.
2. Cormen T.H., Leiserson C.E, Rivest R.L. and Stein C, Introduction to Algorithms, Prentice Hall India, New Delhi, 2004
3. Sahni S., Data Structures, Algorithms, and Applications in C++, Mc Graw Hill, Singapore, 1998.
4. Wirth N., Algorithms +Data Structures = Programs, Prentice Hall India, New Delhi, 1976.
L T P Cr
0 0 3 2
References:
1. B. B. Brey, The Intel Microprocessors 8086 to Pentium: Architecture, Programming and Interface, 6/e, Prentice Hall of
India, New Delhi, 2003.
2. Programming for embedded systems Dream Software team , Willey 2002
3. The art of Assembly language programming Randy Hyde
CSU 211 FORMAL LANGUAGES AND AUTOMATA
Pre-requisites: NIL
L T P Cr
3 0 0 3
Module IV (9 Hours)
Chomsky Hierarchy, Undecidability, Reducibility.
References:
2. Hopcroft J. E., Rajeev Motwani, and Ullman J. D., Introduction to Automata Theory, Languages and Computation, Pearson
Education Asia,2001.
3. J. C. Martin, Introduction to Languages and the Theory of Computation, Mc Graw Hill, 2002.
L T P Cr
3 0 0 3
Text Books:
1. Grimaldi R. P., Discrete and Combinatorial Mathematics, 4/e, Pearson Education, New Delhi, 1999
2. B. Kolman and R.C. Busby, Discrete Mathematical Structures for Computer Science, PHI, New Delhi, 1994.
References:
1. Truss J. K., Discrete Mathematics for Computer Scientists, Pearson Education, New Delhi, 1999
2. C. L. Liu C. L., Elements of Discrete Mathematics, 2/e, McGraw Hill, Singapore, 1985
3. J. L. Mott J. L., Kandel A and Baker T. P., Discrete Mathematics for Computer Scientists and Mathematicians, 2/e,
Prentice Hall of India, New Delhi, 1986.
CSU 213 DATABASE MANAGEMENT SYSTEMS
L T P Cr
3 0 0 3
References:
1. Elmasri, Navathe, Somayajulu, Gupta, Fundamentals of Database Systems, IE, Pearson Education, 2006
2. Ramakrishnan R. & Gehrke J., Database Management Systems, Third edition, 2003, McGraw Hill
3. S K Singh, Database Systems-Concepts, Design and Applications, Pearson Education, 2006
CSU 203 DATA STRUCTURES AND ALGORITHMS
L T P Cr
3 0 0 3
Text Book:
Cormen T.H., Leiserson C.E, Rivest R.L. and Stein C, Introduction to Algorithms, Prentice Hall India, New Delhi, 2004
References:
1. Aho A.V., Hopcroft J.E., and Ullman J.D., Data Structures and Algorithms, Pearson Education, New Delhi, 1983.
1. Sahni S., Data Structures, Algorithms, and Applications in C++, Mc Graw Hill, Singapore, 1998.
2. Aho A. V., Hopcroft J. E. & Ullman J. D., The Design And Analysis of Computer Algorithms, Addison Wesley
CSU 215 COMPUTER ORGANISATION
L T P Cr
3 0 2 4
References:
1. D. A. Pattersen and J. L. Hennesy, Computer Organisation and Design: The Hardware/ Software Interface, 3/e, Morgan
Kaufman, Singapore, 2004.
2. V. P. Heuring and H. F. Jordan, Computer System Design and Architecture, Addison Wesley, New Delhi, 1997.
CSU 291 DATA STRUCTURES LAB
L T P Cr
0 0 5 3
Disjoint Set operations: Union and Find using rank and path compression.
Applications of Heap: Priority Queue and Heap Sort.
References:
1. T. H. Cormen, C. E. Lieserson, R. L. Rivest, Introduction to Algorithms, PHI, 1998
2. S. Sahni, Data structures, Algorithms, and Applications in C++, McGraw Hill, 1998
CSU 296 DBMS LAB
L T P Cr
0 0 3 2
References:
1. Elmasr, Navathe, ‘Fundamentals of Database Systems’, 4/e, Pearson Education
2. Reghu Ramakrishnan, Databse Management Systems, McGrawHill
3. http://www.cs.wisc.edu/coral/minibase/minibase.html
CSU 301 DESIGN AND ANALYSIS OF ALGORITHMS
L T P Cr
3 0 0 3
Text Books:
1. Cormen T.H., Leiserson C.E, Rivest R.L. and Stein C, Introduction to Algorithms, Prentice Hall India,
New Delhi, 2004, Modules I, II and III.
2. Motwani R. & Raghavan P., Randomized Algorithms, Cambridge University Press, Module IV
References:
1. Anany Levitin, Introduction to the Design & Analysis of Algorithms, Pearson Education. 2003
2. Basse S., Computer Algorithms: Introduction to Design And Analysis, Addison Wesley.
3. Manber U., Introduction to Algorithms: A Creative Approach, Addison Wesley
4. Aho A. V., Hopcroft J. E. & Ullman J. D., The Design And Analysis of Computer Algorithms, Addison Wesley
CSU 302 NUMBER THEORY AND CRYPTOGRAPHY
L T P Cr
3 0 0 3
References:
1. Niven I., Zuckerman H.S. and Montgomery H. L., An Introduction to the Theory of Numbers, 5/e, John Wiley and Sons, 2004.
2. Stallings W., Cryptography and Network Security: Principles and Practice, 4/e, Pearson Education Asia, 2006.
3. Mano W., Modern Cryptography: Theory & Practice, Pearson Education, 2004.
4.D. A. Burton, Elementary Number Theory, 6/e, Tata McGraw Hill, 2007.
5. Delfs H. and Knebel H., Introduction to Cryptography: Principles and Applications, Springer, 2002
CSU 303 COMPILER CONSTRUCTION
L T P Cr
3 0 0 3
Module I (6 Hours)
Introduction to Programming language translation. Lexical analysis: Specification and recognition of tokens.
Module IV (8 Hours)
Runtime Environments: Storage Organization, activation records. Introduction to machine code generations and code
optimizations.
References:
1. Aho A.V., Sethi R, and Ullman J.D. Compilers: Principles, Techniques, and Tools. Addison-Wesley, 1986.
2. Appel A.W, and Palsberg J. Modern Compiler Implementation in Java. Cambridge University Press, 2002.
CSU 304 COMPUTER NETWORKS
Pre-requisite: CSU 203 Data Structures and Algorithms / CSU 230 Program Design
L T P Cr
3 0 0 3
References:
1. J. F. Kurose and K . W. Ross, Computer Networking: A Top-Down Approach Featuring Internet, 3/e, Pearson Education,
2005.
2. Peterson L.L. & Davie B.S., Computer Networks, A systems approach, 3/E, Harcourt Asia, 2003.
3. Andrew S. Tanenbaum, Computer Networks, 3/E, PHI, 1996.
4. IEEE/ACM Trans on Networking
CSU 305 THEORY OF COMPUTATION
L T P Cr
3 0 0 3
Module I (8 Hours)
Undecidability: Recursive and Recursively enumerable sets, Undecidability, Rice theorems.
Text Books:
References:
1. C. H. Papadimitriou, H. Lewis., Elements of Theory of Computation, Prentice Hall, 1981.
2. J. E. Hopcroft and J. D. Ullman, Introduction to Automata Theory, Languages and Computation, Narosa, 1989.
3. J. C. Martin, Introduction to Languages and the Theory of Computation, Mc Graw Hill, 2002.
4. M. R. Garey and D. S. Johnson. Computers & Intractability, W. H. Freeman & Co., San Farnisco, 1979.
CSU 391 NETWORKS LAB
L T P Cr
0 0 3 2
Lab 1 : Socket Programming Assignments: - a) To develop a mail user agent b) UDP based ping client and server.
Lab2:- a) Implementation of a subset of File Transfer Protocol using TCP/IP b) Implementation of a subset of Simple Mail
Transfer Protocol using UDP
Lab3:- DNS – Tracing the path and find the root/name servers.
Lab7:-Link layer protocols:- IEEE 802.3 protocol and Ethernet frame format.
Lab 8:- - Dynamic Host Configuration Protocol – To study about dynamic allocation of IP addresses.
Module IV (5 Hours)
Lab 9:-To study about the 802.11 frames exchanged between wireless laptop and access point.
References
L T P Cr
0 0 5 3
Module I (7 Hours)
References
L T P Cr
3 0 0 3
Module I (8 Hours)
Introduction: Software process and the role of modeling and analysis, software architecture, and software design.
References:
1. G. Booch, J. Rumbaugh, and I. Jacobson, I. The Unified Modeling Language User Guide. Addison-Wesley, 1999 .
2. E. Gamma, R. Helm, R. Johnson, and J. Vlissides. Design Patterns: Elements of Reusable Object-Oriented Software. Addison-
Wesley, 1995 .
3. F. Buschmann et al. Pattern Oriented Software Architecture, Volume 1: A System of Patterns. John Wiley and Sons, 1996.
4. M. Shaw and D. Garlan. Software Architecture: Perspectives on an Emerging Discipline. Prentice-Hall, 1996
CSU 312 PRINCIPLES OF PROGRAMMING LANGUAGES
L T P Cr
3 0 0 3
Imperative Paradigm
Syntax, Semanaties, and Pragmatics. Basic Constructs Variables, expressions, Statements, Control constructs Conditorial and
iterative constructs. Data abstraction Basic types, arrays, records, unions, sets, pointers, modules. Procedural abstraction: Names,
bindings, scope, parameter passing methods, interface.
Functional Paradigm
Typed arithmetic expressions: Types and typing relation. Simply typed lambda calculus: Function types, Typing relation, Safety.
Extensions to simply typed lambda calculus: Unit type, Let bindings, Pairs, Tuples, Records, Sums, Variants, and Recursion.
References:
1. Ravi Sethi. Programming Languages: Concepts and Constructs. Addison Wesley 1996.
2. Benjamin C Pierce. Types and Programming Languages, MIT Press, 2002
3. Michael L Scott Programming Language Pragmatics. Elsevier. 2004.
CSU 313 OPERATING SYSTEMS
L T P Cr
3 0 0 3
References
1. Silberschatz, Galvin, Gagne, Operating System Principless, 7/e, 2006, John Wiley
2. William Stallings, Operating Systems, 5/e, Pearson Education
3. Crowley C., Operating Systems- A Design Oriented Approach, Tata McGraw Hill, New Delhi
4. Tanenbaum A. S., Modern Operating Systems, Prentice Hall, Pearson Education
5. Gary J. Nutt, Operating Systems - A Modern Perspective, Addison Wesley
L T P Cr
0 0 3 2
Module IV (9 Hours)
Extend the interpreter with Records, Variants, and Lists.
Reference
L T P Cr
0 0 5 3
Module I (25 Hours)
Enhance the primitive NACHOS operating Systems with the following:
Load Module -Implementation of Read(), Write(), Open() and Close() system calls.
Multiprogramming- Implementation of Fork, Wait, Exec and Exit,
References
1. Gary J. Nutt, Operating Systems, Pearson Education, 3/e, 2004.
2. http://www.cs.duke.edu/~narten/110/nachos/main/main.html
3. http://www.ida.liu.se/~TDDB63/material/begguide/beginners-guide.html
L T P Cr
0 0 3 1
Each student group (not more than 5 members in a group) is expected to develop a complete software product using software
engineering techniques. A detailed report is also to be submitted. The students may be assessed individually and in groups.
Pre-requisite: NIL
L T P Cr
0 0 3 1
Each student is expected to undertake with help from the Department of Training and Placement, Internship in the field of
Computer Science and Engineering by undergoing training of at least one-month duration in reputed industries/research centers in
the country. The industrial training is expected to be undertaken during the semester recess. The student should write a final report
on this training and should make an oral presentation before an evaluation committee.
CSU 401 COMPUTER ARCHITECTURE
L T P Cr
3 0 2 4
Fundamentals – Technology trend -performance measurement –Comparing and summarizing performance- quantitative principles
of computer design –Amdahl’s law-Case studies. instruction set architectures – memory addressing- –type and size operand -
encoding an instruction set - role of compilers - case study – MIPS 64 architecture – pipelining - pipeline hazards - data and
control hazards - implementation issues – MIPS floating point pipeline-exception handling-Case study MIPSR 4000 pipeline.
Static scheduling- loop unrolling-static branch prediction VLIW architecture- software pipelining-hardware support for exploring
more parallelism at compile time-Case study IA 64 architecture.
Memory hierarchy design - reducing cache misses and miss penalty, reducing hit time - main memory organization - virtual
memory and its protection - case study – Alpha 21264 memory hierarchy . Memory issues in multicore processor based systems
Multiprocessor and thread level parallelism- classification of parallel architecture-models of communication and memory
architecture-Symmetric shared memory architecture-cache coherence protocols-distributed shared memory architecture-directory
based cache coherence protocol- Memory consistency-relaxed consistency models multi threading- exploiting thread level
parallelism multicore architecture
Simple networks - practical issues
References
1. Hennesy J. L. & Pattersen D. A., Computer Architecture: A Quantitative approach, 3/e, Harcourt Asia Pte Ltd. (Morgan
Kaufman), Singapore
2. Pattersen D. A. & Hennesy J. L., Computer Organisation and Design: The Hardware/ Software Interface, 3/e, Harcourt Asia
Pte Ltd (Morgan Kaufman), Singapore
Each student is expected to present a seminar on a topic of current relevance in computer science and engineering – they have
to refer papers from standard journals like ACM, IEEE, JPDC, IEE etc. – at least three cross references must be used – the
seminar report must not be the reproduction of the original paper.
CSU 498 PROJECT
Pre-requisite: CSU 321 Software Engineering
L T P Cr
0 0 5 3
The project is for a duration of two semesters. Each student group (not more than 5 members in a group) is expected to
develop a complete product. The design and development may include hardware and /or software. First part of the project is
mainly for the design of the product. An interim report is to be submitted at the end of the semester. The assessment may be
made individually and in groups.
L T P Cr
3 0 0 3
Module IV (8 Hours)
Languages and Programming Techniques for AI- Introduction to PROLOG and LISP, Search strategies and Logic Programming
in LISP, Production System examples in PROLOG.
References
1. George F Luger, Artificial Intelligence- Structures and Strategies for Complex Problem Solving, 4/e, 2002, Pearson Education.
2. E. Rich, K.Knight, Artificial Intelligence, 2/e, Tata McGraw Hill
3. S Russel, P Norvig, Artificial Intelligence- A Modern Approach, 2/e, Pearson Education, 2002
3. Winston. P. H, LISP, Addison Wesley
4. Ivan Bratko, Prolog Programming for Artificial Intelligence, 3/e, Addison Wesley, 2000
L T P Cr
0 0 10 5
This is the second part of the project. This part is for the development, testing, and installation of the product. The product
should have user manuals. A detailed report is to be submitted at the end of the semester. The assessment may be made
individually and in groups.
PART II : ELECTIVE COURSES
L T P Cr
3 0 0 3
Review of elementary data structures. Advanced Trees – Red Black Trees, AVL Trees, Optimal Binary Search Trees, Splay
Trees.
B Trees, Tries, Binary Heaps, Priority Queues, Binomial Heaps, Fibonacci Heaps.
Single-source shortest paths – Dijkstra's algorithm, Bellman-Ford Algorithm. All-Pairs shortest paths – Floyd-Warshall algorithm,
Johnson's algorithm for sparse graphs. Maximum Flow - Flow networks, Ford-Fulkerson Method.
References:
1. Cormen T.H., Leiserson C.E, and Rivest R.L., Introduction to Algorithms, Prentice Hall India, New Delhi, 1990.
2. Wirth N., Algorithms + Data Structures = Programs, Prentice Hall India, New Delhi, 1976.
3. Sartaj Sahni, Data Structures, Algorithms and Applications in C++, Universities Press, 2005.
CSU 358 COMMUNICATION AND INFORMATION THEORY
Pre-requisites: CSU 201 Discrete Computational Structures / MAG 501 Discrete Mathematics,
Knowledge of Probability Theory
L T P Cr
3 0 0 3
Reference:
1. R. W. Hamming, Coding and Information Theory, Prentice Hall, 1986.
2. T. Cover and J. Thomas, Elements of Information Theory, Wiley, 1991.
3. P. Garret, The mathematics of coding theory, Pierson Education, 2005.
L T P Cr
3 0 0 3
Module II (12Hours)
Predicate logic, syntax of predicate logic, free and bound variables, semantics of predicate logic,, graphs, tableaus, soundness
theorem, finished sets, completeness theorem, equivalence relations, order relations, set theory.
Module IV ( 6Hours)
Software Veification: Tools used for software verification.SPIN and SMV. Introduction to both tools. Method of verification by
the tools.
References:
1. Jerome Keisler H. Joel Robbin, Mathematical Logic and Computability, McGraw-Hill International Editions, 1996.
2. Papadimitriou, C. H., Computational Complexity, Addison Wesley, 1994
3. Gallier, J. H., Logic for Computer Science: Foundations of Automatic Theorem Proving,, Harper and Row, 1986.
CSU 331 COMPUTER GRAPHICS AND MULTIMEDIA
L T P Cr
3 0 0 3
Module I
Introduction to computer graphics - basic raster graphics algorithms for drawing 2D primitives - scan converting lines - circles -
generating characters - geometrical transformations - 2D transformations - homogeneous coordinates and matrix representation of
transformations - window-to-viewport transformation - input devices and interactive techniques - interaction hardware - basic
interaction tasks - 3D graphics - viewing in 3D - projections - basics of solid modelling - 3D transformations.
Module II
Introduction to multimedia - media and data streams - properties of a multimedia system - data stream characteristics - information
units - multimedia hardware - platforms - memory and storage devices - input and output devices - communication devices -
multimedia software - multimedia software tools - multimedia authoring tools
Module III
Multimedia building blocks - audio - basic sound concepts - music - speech - MIDI versus digital audio - audio file formats -
sound for the web - images and graphics - basic concepts - computer image processing - video and animation - basic concepts -
animation techniques - animation for the web
Module IV
Data compression - storage space and coding requirements - classification of coding/compression techniques - basic compression
techniques like JPEG, H.261, MPEG and DVI - multimedia database systems - characteristics of multimedia database management
system - data analysis - data structure - operations on data - integration in a database model
References
1. Foley J. D., Van Dam A., Feiner S. K., & Hughes J. F., Computer Graphics Principles and Practice, Second Edition, Addison
Wesley
2. Ralf Steinmetz & Klara Nahrstedt, Multimedia: Computing, Communications and Applications, Pearson Education
3. Newmann W & Sproull R.F., Principles of Interactive Computer Graphics, McGraw-Hill
4. Rogers D.F., Procedural Elements for Computer Graphics, McGraw-Hill
5. Hearn D. & Baker P.M, Computer Graphics, Prentice Hall India
6. Koegel Buford J. F., Multimedia System, Addison Wesley
7. Vaughan T., Multimedia: Making it Work, Third Edition, Tata McGraw Hill
CSU 341: DISTRIBUTED COMPUTING
L T P Cr
3 0 0 3
References:
L T P Cr
3 0 0 3
Module I (10 Hours)
Embedded system overview, trends in embedded software development, applications of embedded systems.
References:
1. R. Kamal, Embedded Systems: Architecture, Programming & Design, Tata McGraw Hill, 2003.
2. F. Vahid & T. Givargis Embedded System Design: A Unified Hardware/Software Introduction,
John Wiley.
3. DreamTech Software Team, Programming of Embedded Systems, Wiley DreamTech, 2002.
CSU 353 MOBILE COMMUNICATION SYSTEMS
L T P Cr
3 0 0 3
Module I (8 Hours)
Introduction, wireless transmission - frequencies for radio transmission - signals - antennas - signal propagation - multiplexing -
modulation - spread sprectrum - cellular systems - medium access control - specialized MAC - SDMA - FDMA - TDMA - aloha -
CSMA - collision avoidance - polling - CDMA - comparison of S/T/F/CDMA
References
1. Schiller J., Mobile Communications, 2/e, Pearson Education, 2003.
2. C. Siva Ram Murthy, Ad Hoc Wireless Networks: Architectures and Protocols, Pearson Education, 2004.
3. C. Siva Ram Murthy, WDM Optical Networks: Concepts, Design, and Algorithms, Pearson Education.
4. Singhal et.al S., The Wireless Application Protocol, Addison Wesley
CSU 315 COMPUTER HARDWARE
L T P Cr
3 0 0 3
Module I (8 Hours)
PC hardware: motherboard, memory SDRAM, RDRAM Adapters – graphic adapter, network adapter. Controllers, floppy and
hard disk controllers, streamers and other drives, Interfaces - parallel and serial interfaces, keyboard, mice and other rodents, the
power supply, operating system, BIOS, and memory organization. 8086/8088 Hardware specification: clock generator, bus
buffering and latching, bus timing, ready and wait states, minimum and maximum mode operations. Features of Pentium IV
processor
Module IV (9 Hours)
Interrupts: interrupt processing, hardware interrupts, expanding the interrupt, 8259A programmable interrupt controller. DMA:
DMA operation, 8237 DMA controller, shared bus operation, disk memory systems, video displays.
Bus interface: ISA bus, EISA and VESA buses, PCI bus.
References:
1. B. B. Brey, The Intel Microprocessors 8086 to Pentium: Architecture, Programming and Interface, 6/e,
Prentice Hall of India, New Delhi, 2003.
2. Programming for embedded systems Dream Software team , Willey 2002
3. H. P. Messmer, The Indispensable PC Hardware Book, 3/e, Addison Wesley, 1997.
4. A. K. Ray, and K. M. Bhurchandi, Advanced Microprocessors and Peripherals, Tata McGraw Hill, 2000.
5. D. V. Hall, Microprocessors and Interfacing: Programming and Hardware, 2/e, Tata McGraw Hill, New Delhi, 1992.
6. K. Miller, An Assembly Language Introduction to Computer Architecture using the Intel Pentium, Oxford University
Press, 1999.
7. S. J. Bigelow, Troubleshooting, Maintaining, and Repairing PCs, 2/e, Tata McGraw Hill, New Delhi, 1999.
CSU 333 OBJECT ORIENTED ANALYSIS AND DESIGN
L T P Cr
3 0 0 3
References:
1. Erich Gamma, Richard Helm, Ralph Johnson, John M.Vlissides, Design Patterns: Elements of Reusable Object-Oriented
Software, Addison-Wesley Professional Computing Series, 1995.
2. James O.Coplien, Advanced C++ Programming Styles and Idioms, Addison Wesley, 1991.
3. Peter Coad and Edward Yourdon, Object-Oriented Analysis, Prentice Hall, 1990.
4. Margaret A. Ellis, Bjarne Stroustrup, Annotated C++: Reference Manual, Addison-Wesley Professional, 1990.
5. Booch G. Rumbaugh J & Jacobsons I, The Unified Modeling Language user guide, Addison Wesley. 1999.
6. Bahrami A, Object Oriented System Development, Mc Graw Hill, 1998.
L T P Cr
3 0 0 3
Module I (10 Hours)
Internet and WWW, Creating Web Graphics, HTML, Paintshop, Photoshop, FrontPage, Introduction to XHTML, Cascading Style
Sheets.
1. H. M. Deitel, P. J. Deitel and T. R. Nieto, Internet and World Wide Web: How To Program, Pearson Education, 2000.
2. Harvey Deitel, Paul Deitel, Tem Nieto, Complete Internet & World Wide Web Programming Training Course, Student Edition,
2/e, Prentice Hall , 2002
CSU 431 ADVANCED DATABASE MANAGEMENT SYSTEMS
L T P Cr
3 0 0 3
References:
1. Elmasri, Navathe, Somayajulu, Gupta, Fundamentals of Database Systems, Pearson Education, 2006.
2. Ramakrishnan R. & Gehrke J Database Management Systems, 3rd Edition., McGraw Hill.
3. Connolly and Begg, Database systems, 3rd Edition, Pearson Education, 2003
4. O'neil P. & O'neil E Database Principles, Programming and Performance, 2nd Edition., Harcourt Asia (Morgan Kaufman).
5. Silberschatz, Korth H. F. & Sudarshan S, Database System Concepts, Tata McGraw Hill.
L T P Cr
3 0 0 3
Module I (5 Hours)
Parallel Computation, Performance, Programming models, algorithms, evaluation
References:
1. Culler D and Singh J. P., Parallel Computer Architecture: A Hardware Software Approach, Harcourt Asia Pte Ltd,
Singapore, 1999.
2. Hill M, Jouppi N and Sohi G, Readings in Computer Architecture, Morgan Kauffman, 2000.
3. Shen J. P. and Lipasti M.,, Modern Processor Design: Fundamentals of Superscalar Processors, McGraw Hill, First edition,
2000.
CSU 352 CODING THEORY
L T P Cr
3 0 0 3
Module I (12 Hours)
Review of linear algebra - Linear codes and syndrome decoding. Generator and parity check matrices. Hamming geometry and
code performance. Hamming codes. Error correction and concept of hamming distance.
Module II (8 Hours)
Cyclic codes – Bose, Ray-Chaudhuri, Hocquenghem – BCH codes, RS codes – Polynomial time decoding. Shift register encoders
for cyclic codes. Cyclic hamming codes. Decoding BCH – key equation and algorithms. Berlekamp's Iterative Algorithm for
Finding the Error-Locator Polynomial.
References:
1. R.J. McEliece, The Theory of Information and Coding, Addison Wesley, 1997.
2. R. Johannesson, K. Sh. Zigangirov, Fundamentals of Convolutional Coding, Universities Press, 2001.
3. Van Lint, J. H. An Introduction to Coding Theory, 2nd ed. New York: Springer-Verlag, 1992.
L T P Cr
3 0 0 3
Module I (10 Hours)
Web commerce concepts – the e-commerce phenomenon - electronic marketplace technologies - web based tools for e-commerce -
e-commerce softwares - hosting services and packages
References
1. Weidong Kou, Payment Technologies for E-Commerce, Springer, 2003.
2. Kalakota R. & Whinston A.B., "Frontiers of Electronic Commerce", Addison-Wesley, New Delhi
3. Janice Raynolds, The Complete E-Commerce Book, 2/e, CMP Books, 2004.
4. Schneider G. P. & Perry J. T., Electronic Commerce, Course Technology, Cambridge
5. Westland J. C. & Clark T.H. K., "Global Electronic Commerce", University Press, 2001.
6. Minoli D. & Minoli E., "Web Commerce Technology Handbook", Tata McGraw Hill, New Delhi
L T P Cr
3 0 0 3
Module I (10 Hours)
Introduction to mobile computing, mobile development frameworks and tools, introduction to XML and UML.
References:
1. Reza B’Far, Mobile Computing Principles, Cambridge University Press, 2005.
2. U. Hansmann, L. Merk, M. S. Nicklous and T. Stober, Principles of Mobile Computing, 2/e, Springer, 2003.
3. Harold Davis, Anywhere Computing with Laptops: Making Mobile Easier, O’Reilly, 2005
4. I. Stojmenovic, Handbook of wireless and Mobile computing, Wiley, 2002.
5. Schiller J., Mobile Communications, 2/e, Pearson Education, 2003.
Pre-requisite: CSU 201 Discrete Computational Structures / MEG 501 Discrete Mathematics
L T P Cr
3 0 0 3
Module I (12 Hours)
Introduction - digital image representation - fundamental steps in image processing - elements of digital image processing systems
- digital image fundamentals - elements of visual perception - a simple image model - sampling and quantization - basic
relationship between pixels - image geometry - image transforms - introduction to Fourier transform - discrete Fourier transform -
some properties of 2-fourier transform (DFT) - the FFT - other separable image transforms - hotelling transform
References
1. Rafael C., Gonzalez & Richard E. Woods, Digital Image Processing, Addison Wesley, New Delhi
2. Rosenfeld A. & Kak A.C., Digital Picture Processing, Academic Press
3. Jain A.K, Fundamentals of Digital Image Processing, Prentice Hall, Englewood Cliffs, N.J.
4. Schalkoff R. J., Digital Image Processing and Computer Vision, John Wiley and Sons, New York
5. Pratt W.K., Digital Image Processing, 2nd edition, John Wiley and Sons, New York
CSU 362 PATTERN RECOGNITION
Pre-requisite: CSU 203 Data Structures and Algorithms
L T P Cr
3 0 0 3
Module I (11 Hours)
Introduction - introduction to statistical - syntactic and descriptive approaches - features and feature extraction - learning - Bayes
Decision theory - introduction - continuous case - 2-category classification - minimum error rate classification - classifiers -
discriminant functions - and decision surfaces - error probabilities and integrals - normal density - discriminant functions for
normal density
References
1. Duda & Hart P.E, Pattern Classification And Scene Analysis, John Wiley and Sons, NY
2. Gonzalez R.C. & Thomson M.G., Syntactic Pattern Recognition - An Introduction, Addison Wesley
3. Fu K.S., Syntactic Pattern Recognition And Applications, Prentice Hall, Englewood cliffs, N.J.
Module II (8 Hours)
Access Control Matrix and Mechanisms, Vulnerability Analysis. Auditing Computer Security. Security Policy Guidelines.
Security Awareness and Employment practices and policies. Anonymity and Identity in the cyber world. Practical examples from
Network Domain. Tools for analysis and fingerprinting.
Reference:
1. Introduction to Computer Security. Matt Bishop. Addison-Wesley. 2004.
2. Security in Computing. Charles P Pfleeger. Pearson Education India. 2003.
3. Principles of Information Security. Michael E Whitman, Herbert J Mattord. Thomson. 2003.
4. Computer Security Handbook. Fourth Edition. Seymour Bosworth, M E Kabay, Editors. John Wiley. 2002.
CSU 364 NATURAL LANGUAGE PROCESSING
L T P Cr
3 0 0 3
Module I (8 Hours)
Introduction to Natural Language Processing, Different Levels of language analysis, Representation and understanding, Linguistic
background.
References:
1. James Allen, Natural Language Understanding, Second Edition, 2003, Pearson Education.
2. D Juraffsky, J H Martin, Speech and Language Processing, Pearson Education
L T P Cr
3 0 0 3
References:
1. Papadimtriou C. H.., Computational Complexity, Addison Wesley, First Edition, 1993.
2.` Motwani R, Randomized Algorithms, Cambridge University Press, 1995.
3. Vazirani V., Approximation Algorithms, Springer, First Edition, 2004.
4. Mitzenmacher M and Upfal E., Probability and Computing, Randomized Algorithms and Probabilistic Analysis, Cambridge
University Press, 2005.
5. Arora S and Boaz B, Computational Complexity, (Web Draft) http://www.princeton.edu/theory/complexity
CSU 471 ADVANCED TOPICS IN ALGORITHMS
L T P Cr
3 0 0 3
Module I (10 Hours)
Discrete Probability: Probability, Expectations, Tail Bounds, Chernoff Bound, Markov Chains. Random Walks. Review of
Generating functions, Exponential Generating Functions. Review of Recurrence Relations – both homogeneous and non-
homogeneous of first and second degrees. Review of Analysis of recursive and non recursive algorithms.
Module II (12 Hours)
Randomized Algorithms, Moments and Deviations. Tail Inequalities. Randomized selection.
Las Vegas Algorithms. Monte Carlo Algorithms. Parallel and Distributed Algorithms. Concept of De-Randomization and
techniques.
Module III (10 Hours)
Complexity: Probabilistic Complexity Classes, Proof Theory. Interactive Proof Systems.
Examples of probabilistic algorithms. Proving that an algorithm is correct 'Almost sure'.
Complexity analysis of probabilistic algorithms . The complexity classes PP and BPP
Module IV (10 Hours)
Kolmogorv Complexity – basic concepts. Models of Computation. Applications to analysis of algorithms. Lower bounds. Relation
to Entropy. Kolmogorov complexity and universal probability.
Godel's Incompleteness Theorem. Different Interpretations. Chatin’s Proof for Godel’s Theorem.
References:
1. R. Motwani and P. Raghavan, Randomized Algorithms, Cambrdige University Press, 1995
2. C. H. Papadimitriou, Computational Complexity, Addison Wesley, 1994
3. Dexter C. Kozen, The Design and Analysis of Algorithms, Springer verlag N.Y, 1992
Pre-requisites: CSU 203 Data Structures and Algorithms, CSU 301 Design and Analysis of Algorithms
L T P Cr
3 0 0 3
Module I (12 Hours)
Review of Linear Algebra. The postulates of quantum mechanics. Review of Theory of Finite Dimensional Hilbert Spaces and
Tensor Products.
Module II (8 Hours)
Models of computation – Turing machines. Quantifying resources. Computational complexity and the various complexity classes.
Models for Quantum Computation. Qubits. Single and multiple qubit gates. Quantum circuits. Bell states. Single qubit operations.
Controlled operations and measurement. Universal quantum gates.
References:
1. Nielsen M.A. and I.L. Chauang, Quantum Computation and Quantum Information,
Cambridge University Press, 2002.
2. Gruska, J. Quantum Computing, McGraw Hill, 1999.
3. Halmos, P. R. Finite Dimensional Vector Spaces, Van Nostrand, 1958.