Comp.7th Sem
Comp.7th Sem
COURSE CODE
CREDITS
PREQ
LTP
:
:
:
:
:
COURSE NAME
COURSE CODE
CREDITS
LTP
PR-REQ.
:
:
:
:
:
SYSTEM SOFTWARE
CS 462
04
400
Computer Architecture
NO OF LECTURES
INTRODUCTION
07
Introduction to various system softwares, Introduction to the m/c architecture to be used
for the implementation of various System Softwares- basic architecture, addressing
modes, instruction set to be used, common symbols to be used like EQU, DC, DS etc in
case of IBM 360 architecture.
ASSEMBLERS
08
Data structures and logic flow for a simple two-pass assembler, Design of a two pass
assembler, n-pass assembler, Effect of machine architecture on assembler design Sorting
techniques, Searching techniques. Effect of machine architecture on assembler design,
sorting techniques, Searching techniques.
MACRO PROCESSORS
07
Data structures and design of a two-pass macro processor, introduction to one pass macro
processor, combining macro processor with assembler.
MACRO PROCESSOR PROGRAMMING
05
Concatenation of macro parameters; Generation of labels in macro expansions;
Conditional macro expansion; Keyword and positional macro parameters; Nested macro
definitions; Nested macro invocations, Macro processing within an assembler, Generalpurpose macro processors.
LINKERS AND LOADERS
04
Absolute loaders; Program relocation; Program linking; Data structures and logic flow
for a relocating and linking loader, Library search to resolve external references
OVERLAYS, LOADING
05
Overlay programs; Linkage editors; various loading techniques: Dynamic loading,
Bootstrap loaders, Effect of machine architecture on loader design
COMPILERS
05
Structure of a Compiler, Various types of Grammars, Various Phases of Compiler.
PARSING TECHNIQUES
04
Recursive descent and operator precedence, Simple code generation techniques; Code
optimization; Storage allocation; Compilation of Structured variables; Block-structured
languages.
TYPES OF COMPILERS
Multi-pass compilers Interpreters; P-code compilers; Cross Compilers
03
BOOK:
1. System Programming By J J Donovan TMH
REFERENCES:
1. System Software by Dhamdhere
2. System Software: An Introduction to Systems Programming by Leland L. Beck
3. System Software : An Introduction to Systems Programming by Beck
COURSE NAME
COURSE CODE
CREDITS
LTP
:
:
:
:
DEPARTMENTAL LAB IV
CS 463
02
0 04
COURSE NAME
COURSE CODE
CREDITS
LTP
:
:
:
:
DEPARTMENTAL LAB V
CS 464
02
0 04
CAPSTONE PROJECT-I
CS 498
COURSE NAME
COURSE CODE
CREDITS
LTP
:
:
:
:
NO. OF LECTURES
UNIX MODEL
(4)
Introduction, Basic Definitions, Input and Output, Signals, Process Control, Daemon
Processes
THE UNIX FILE SYSTEM AND SHELL INTRODUCTION
(4)
The Shell:Executing commands and command options; Interactive features: job control,
history; The UNIX file system; File Utilities (cp, mv, rm, etc.); comm, cmp, diff; Tree
walking: find, xargs
INTER PROCESS COMMUNICATION
(4)
Introduction, Pipes and FIFOs, Message Queues, Read-Write Locks, Record Locking,
Semaphores, Shared Memory.
COMMUNICATION PROTOCOLS
(4)
XNS, SNA, NETBIOS, OSI Protocols, UUCP
INTRODUCTION TO TCP/IP, THE TRANSPORT LAYER
(4)
TCP, UDP and SCTP, TCP Connection Establishment and Termination, SCTP Association
Establishment and Termination, Port Numbers, Buffer Sizes and limitations.
SOCKETS
(4)
Sockets Introduction, TCP Sockets, UDP Sockets, SCTP Sockets,
SOCKETS PARTII
(4)
I/O Multiplexing, Socket Options, Name and Address conversions, TCP, UDP and SCTP
Examples.
Introduction to Ipv4 and Ipv6 Interoperability, Daemon Processes, Advanced I/O Functions.
(4)
UNIX Domain Protocols, Nonblocking I/O, Routing Sockets, Out-of-band data.
(4)
Signal Driven I/O, Threads, Raw Sockets
(4)
Remote Login, Remote Command execution, Remote Tape drive access, Remote procedure
calls.
(4)
BOOK:
UNIX Network programming by W. Richard Stevens
REFERENCES:
1. UNIX Network programming The sockets networking API Vol 1 by W. Richard
Stevens
2. UNIX Network programming Interprocess Communications by W. Richard Stevens
3. UNIX Network programming Vol 1 by W. Richard Stevens
4. Internet working with TCP/IP Vol III by Douglas
5. The protocols by W.Richard Stevens
:
:
:
:
COMPUTER GRAPHICS
CS 470
04
400
NO. OF LECTURES
Graphics Hardware:
(6)
Introduction, Application areas of Computer Graphics, overview of graphics systems,
video-display devices, and raster-scan systems, random scan systems, graphics monitors
and workstations and input devices.
Output primitives:
(4)
Points and lines, line drawing algorithms, mid-point circle and ellipse algorithms.
Filled area primitives:
(4)
Scan line polygon fill algorithm, boundary-fill and flood-fill algorithms.
REFERENCES:
1. Computer Graphics, second Edition, Donald Hearn and M.Pauline Baker,
PHI/Pearson Education.
2. Computer Graphics Second edition, Zhigand xiang, Roy Plastock, Schaums
outlines, Tata Mc-Graw hill edition.
3. Procedural elements for Computer Graphics, David F Rogers, Tata Mc Graw hill, 2nd
edition.
4. Principles of Interactive Computer Graphics, Newman and Sproul, TMH.
5. Computer Graphics, Steven Harrington, TMH.
COURSE NAME
COURSE CODE
CREDITS
LTP
:
:
:
:
COMPILER DESIGN
CS 471
04
400
NO. OF LECTURES
COMPILER STRUCTURE
(6)
Analysis-synthesis model of compilation, various phases of a compiler, passes of
compilers, bootstrapping, tool based approach to compiler construction.
PHASES OF COMPILERS
(6)
Lexical analysis: Interface with input, parser and symbol table, token, patterns.
Difficulties in lexical analysis. Error reporting. Implementation. Regular definition, Onepass compilation techniques, Transition diagrams, implementation techniques, use of
lexical analyzer generators LEX, specific source language issues.
SYNTAX ANALYSIS AND BASIC PARSING TECHNIQUES
(8)
Syntax directed definitions like Inherited and synthesized attributes, dependency graph,
evaluation order, bottom up and top down evaluation of attributes, L- and S-attributed
definitions. CFGs, derivations and parse trees, ambiguity, associativity, precedence, use
of syntax analyzer generators, top down parsing, shift reduce parsing, recursive descent
parsing, transformation on the grammars, predictive parsing, bottom up parsing, operator
precedence grammars, LR(k) parsing (SLR, LALR, LR), YACC.
AUTOMATIC CONSTRUCTION OF SOME EFFICIENT PARSERS
(8)
Canonical collection of LR(0) items, constructing SLR parsing tables, constructing LR
parsing table, constructing LALR parsing tables, ambiguous grammars usages,
implementation of LR parsing tables, constructing LALR sets of items.
INTERMEDIATE CODE GENERATION
(4)
Syntax directed translation schemes and their implementation, Intermediate languages,
quadruples and triples, assignment statements, boolean expressions, array references,
procedure calls, declarations, case statements.
SEMANTIC ANALYSIS
(4)
Type checking, type system, type expressions, structural and name equivalence of types,
type conversion, overloaded functions and operators, polymorphic functions.
RUN TIME SYSTEM AND OPTIMIZATION
(4)
Storage organization, activation tree, activation record, parameter passing, symbol tables,
data structures for symbol tables, handling recursive calls, global optimization through
flow graph analysis, dynamic storage allocation, local optimization techniques, loop
optimization techniques, loop-invariant, peephole optimization.
ERROR DETECTION AND RECOVERY
(4)
Introduction to errors in all phases of compilers, lexical-phase errors, synthetic phase
errors, semantic errors and various recovery methods.
CODE GENERATION AND INSTRUCTION SELECTION
(6)
Issues, basic blocks and flow graphs, register allocation, code generation, DAG
representation of programs, code generation from dags, code generator generators,
specifications of machine, Compiler-Compilers, Parser generators, machine independent
code generation
COMPILER HONOURS:
Study of LEX, Study of YACC, Study of design of various code optimization techniques
used in the advanced compilers, Study of parallelism and Garbage collection techniques.
BOOK:
1. V. Aho, R. Sethi, and J. D. Ullman. Compilers: Principles, Techniques and Tools ,
Addison-Wesley.
REFERENCES:
1. C. Fischer and R. LeBlanc. Crafting a Compiler , Benjamin Cummings, 1991.
2. A. C. Holub. Compiler Design in C , Prentice-Hall Inc., 1993.
3. Dhamdhere. Compiler Construction , McMillan India.
4. Dick Grune, Henri E Bal .Modern Compiler Design, Wiley
5. Wirth. Compiler Construction , Addison-Wesley.
COURSE NAME
COURSE CODE:
CREDITS:
L T P:
NO. OF LECTURES
NO. OF LECTURES
(04)
(04)
(04)
(04)
(04)
(04)
(04)
(04)
(04)
(04)
BOOK:
1. Neuro fuzzy and soft computing by Jang, Pearson Education
REFERENCES:
1. Learning and Soft Computing by Kecman, Pearson Education
2. Fuzzy Sets and Fuzzy Logic - Klir and Yuan, PHI
3. Neurocomputing: Theory & Practice by Philip D.Wasserman, VanNostrand Reinhold
5. Neural Network in computer Intelligence by Fu, TMH
6. Neural Networks and Fuzzy Systems by Bart Kosko, PHI
7. An Introduction to Genetic Algorithm -Melaine Mitchell, PHI
COURSE NAME
:
ADVANCED DATABASE MANAGEMENT
SYSTEMS
COURSE CODE
:
CS 474
CREDITS
:
04
LTP
:
400
LECTURE WISE BREAKUP
NO. OF LECTURES
REPRESENTING DATA ELEMENTS
4
Data Elements and Fields, Representing Relational Database Elements, Records,
Representing Block and Record Addresses, Client-Server Systems, Logical and
Structured Addresses, Record Modifications, Index Structures, Indexes on Sequential
Files, Secondary Indexes, B-Trees, Hash Tables.
RELATIONAL ALGEBRA
5
Relational Algebra: Basics of Relational Algebra, Set Operations on Relations, Extended
Operators of Relational Algebra, Constraints on Relations, Modification of the Database,
Views Relational Calculus, Tuple Relational Calculus, Domain Relational Calculus.
NORMALIZATION
4
Database design process, Relational database design, Relation Schema, Anomalies in a
database , Functional dependencies, Membership and minimal covers, Normal forms,
First Normal Form, Second Normal Form, Third Normal Form, Boyce-Codd Normal
Form, Multivalued dependencies, Fourth Normal Form, Join dependencies, Fifth Normal
Form, Inclusion dependencies , Effect of de-normalization on database performance.
SQL
4
Use Of SQL, DDL Statements, DML Statements, View Definitions, Constraints and
Triggers Keys and Foreign Keys, Constraints on Attributes and Tuples, Modification of
Constraints Cursors, Dynamic SQL.
CONCURRENCY CONTROL
5
Serialisability, Enforcing Serializability by Locks, Locking Systems With Several Lock
Modes, Architecture for a Locking Scheduler Managing Hierarchies of Database
Elements, Concurrency Control by Timestamps, Concurrency Control by Validation.
TRANSACTION MANAGEMENT
4
Introduction of Transaction management, Serializability and Recoverability, View
Serializability, Resolving Deadlocks, Distributed Databases, Distributed Commit,
Distributed Locking.
DISTRIBUTED DATABASE
3
Homogeneous And Heterogeneous Database, Distributed Data Storage, Distributed
Transaction, Commit Protools, Concurrency Control In Distributed Databases.
DATABASE SECURITY:
4
Database security issues, Discretionary access control, Mandatory & role based access
control, Database audit.
ADVANCED DATABASE APPLICATION:
5
Evolution of an Information system, Decision making and MIS, MIS as a technique for
making programmed decisions, Navigation Database System Architecture Overview,
Data Mining, Data warehouse, Types of transaction processing system
:OLAP,OLTP,DSS
EMERGING TECHNOLOGIES:
8
Data mining: Data mining concepts, Association rules, Classification, Clustering,
Application of data mining. Data warehousing: Characteristics of Data warehouses, Data
modelling of data warehouses, Typical functionality of data warehouses., XML &
Internet
databases,
Object
relationalDatabases.
BOOK:
1. Data base system concepts , Abraham Silberschatz , Henry .F .Korth , S. Sudarshan ,
Fourth Edition , TMH
REFERENCES:
1. Raghu Ramakrishnan, Johannes Gehrke, "Database Management Systems",
McGraw-Hill International
2. BC Desai, An Introduction to Database Systems, Galgotia Publications
3. An Introduction to database systems, Sixth Edition C. J. Date Addison Wesley
4. Fundamentals of database system , Fourth Edition , Elmasri , Navathe , Fourth
Edition , Pearson.
5. Computer Data Base Organization by Martin J. (Latest edition), PHI
6. Principles of data base systems. (Latest edition) by J.D.Ullman, Narosa Publishers
COURSE NAME
COURSE CODE
CREDITS
LTP
:
:
:
:
Ghemawat, OSDI'08
12) Dynamo: Amazon's Highly Available Key-value Store, Giuseppe DeCandia, Deniz
Hastorun, Madan Jampani, Gunavardhan Kakulapati, Avinash Lakshman, Alex Pilchin,
Swaminathan Sivasubramanian, Peter Vosshall and Werner Vogels, SOSP'07
13) DCell: A Scalable and Fault-Tolerant Network Structure for Data Centers, Chuanxiong
Guo, Haitao Wu, Kun Tan, Lei Shi, Yongguang Zhang, Songwu Lu, SIGCOMM'08
14) Learning to Share: Narrowband-Friendly Wideband Networks, Hariharan Rahul, Nate
Kushman, Dina Katabi, Charles Sodini, and Farinaz Edalat, SIGCOMM'08
15) Dryad: Distributed Data-Parallel Programs from Sequential Building Blocks, Michael
Isard, Mihai Budiu, Yuan Yu, Andrew Birrell, and Dennis Fetterly, EuroSys'07
16) Measurement and Analysis of Online Social Networks, Alan Mislove, Massimiliano
Marcon, Krishna P. Gummadi, Peter Druschel, Bobby Bhattacharjee, IMC'07
17) Skilled in the Art of Being Idle: Reducing Energy Waste in Networked Systems, Sergiu
Nedevschi, Sylvia Ratnasamy, Jaideep Chandrashekar, Bruce Nordman, Nina Taft,
NSDI'09
18) Pig Latin: A Not-So-Foreign Language for Data Processing, C. Olston, B. Reed, U.
Srivastava, R. Kumar and A. Tomkins, SIGMOD'08
19) User Interactions in Social Networks and their Implications, Christo Wilson, Bryce Boe,
Alessandra Sala, Krishna P. N. Puttaswamy and Ben Y. Zhao, EuroSys'09
20) Improving MapReduce Performance in Heterogeneous Environments, Matei Zaharia,
Andy Konwinski, Anthony D. Joseph, Randy H. Katz, Ion Stoica, OSDI'08
21) eBay in the Sky: Strategy-Proof Wireless Spectrum Auctions, Xia Zhou, Sorabh Gandhi,
Subhash Suri, Haitao Zheng, MobiCom 2008
22) TRUST: A General Framework for Truthful Double Spectrum Auctions, Xia Zhou, Haitao
Zheng, INFOCOM'09
COURSE CODE
:
COURSE NAME
:
CREDITS
:
LTP
:
LECTURE WISE BREAKUP
CS 476
DATA MINING & WARE HOUSING
4
400
NO. OF LECTURES
COURSE NAME
COURSE CODE
CREDITS
LTP
:
:
:
:
COURSE NAME
COURSE CODE
CREDIT
L T P
:
:
:
:
DATA AGGREGATION
5
Introduction, directed diffusion, low energy adaptive clustering hierarchy, tiny
aggregation, greedy aggregation
PRACTICAL IMPLEMENTATION ISSUES
5
Introduction, the partitioning decision, transducer interfaces, time base accuracy and
average power consumption, a practical perspective on wireless sensor networks, a
sensor network for biological data acquisition
POWER MANAGEMENT
5
Introduction, power sources, loads, voltage converters and regulators, power
management strategy, sensor network management, power efficient topologies for
wireless sensor networks, dynamic power management in sensor networks
COURSE NAME
COURSE CODE
CREDIT
LTP
:
:
:
:
ERP
CS 479
04
400
NO. OF LECTURES
(3)
Basic ERP Concepts, Risks and Benefits of ERP, Justifying ERP Investments,
RoadMap for successful ERP Implementation, Importance of ERP, ERP Package
Selection issues.
ERP AND RELATED TECHNOLOGIES
(5)
Business Process Re-engineering, Data Warehousing, Data Mining, OLAP,
Product Life Cycle Management, Supply Chain Management, Customer
Relationship Management, Advanced Technology and ERP Security.
ERP FUNCTIONAL MODULES
(7)
HRD, Personnel Management, Training and Development, Skill Inventory,
Finance, Manufacturing, Plant Maintenance, Material Management, Quality
Management, Marketing, Sales-Distribution and Service.
MATERIAL PLANNING AND PRODUCTION PLANNING
(5)
Material Planning and Control, Inventory, Forecasting, Manufacturing, Production
Planning, Production Scheduling, Production Control, Sales and Distribution.
ERP IMPLEMENTATION
(5)
Implementation Challenges, Requirements and process definition, Pre-Post
Implementation Activities, ERP implementation life cycle, Data migration,
Measuring performance of the ERP system.
ERP KEY MANAGERIAL ISSUES
(10)
Concept Selling, IT Infrastructure, Implication of ERP system on Business
Organization, Critical Success factors in ERP system, Critical Failure factors in
ERP system, ERP Culture Implementation Issues, Resistance to Change, Return on
Investment, Future Directions and Trends in ERP, Case Studies of Big Business
houses adopting ERP.
BOOKS:
1. ERP Demystified by Alexis Leon, TMH.
2. Enterprise Resource Planning by Alexis Leon, TMH.
REFERENCES:
Enterprise Resource Planning by Mary Sumner
COURSE NAME
COURSE CODE
CREDITS
PREQ
LTP
:
:
:
:
:
4.
5. Building Microsoft ASP.NET Applications for Mobile Devices, Andy Wigley and
Peter Roxburgh, MS Press
6. IEEE Wireless LAN medium access control (MAC) and physical layer (PHY)
specications. IEEE Standard 802.11, 1997.
7. G.A.Halls. HIPERLAN: the high performance radio local area network standard.
Electronics and Communication Engineering Journal, 6:289296, December 1994.
8. IEEE Wireless LAN medium access control (MAC) and physical layer (PHY)
specications Amendment 4: Further higher speed physical layer extension in the 2.4
GHz band. IEEE Standard 802.11g, 2003.
9. The Changing Usage of a Mature Campus-wide Wireless Network Tristan
Henderson, David Kotz, Ilya Abyzov (Dartmouth College, USA), Mobicom 2004
COURSE NAME:
COURSE CODE:
CREDITS:
L T P:
4
400
NO. OF LECTURES
(05)
(05)
(05)
(05)
(05)
(05)
(05)
(05)
(05)
(05)
BOOK:
1.
Natural Language understanding by James Allen, Pearson Education
REFERENCES:
1. NLP: A Paninian Perspective by Akshar Bharati, Vineet Chaitanya, and Rajeev
Sangal, Prentice Hall
2. Meaning and Grammar by G. Chirchia and S. McConnell Ginet, MIT Press
3. An Introduction to Natural Language Processing, Computational Linguistics, and
Speech Recognition by Daniel Jurafsky and James H. Martin, Pearson Education
4. Natural language processing in Prolog by Gazdar, & Mellish, Addison-Wesley
COURSE NAME
COURSE CODE
CREDIT
L T P
:
:
:
:
NETWORK TECHNOLOGY
CS 482
04
4 0 0
NO. OF LECTURES
INTRODUCTION
5
Overview of Local Area Networks: Basic LAN terminology, LAN Standards, How LANs
operate, LAN Topologies, Example Applications of LANs.
Overview of wide area networks: WAN Architecture, WAN Transmission Mechanism,
WAN Addressing.
LAN ACCESS TECHNIQUES
5
Performance measures and Notation, Random Access Overview, ALOHA, CSMA,
CSMA/CD Controlled Access Schemes, Switched Access Methods.
LAN TECHNOLOGIES
15
Ethernet: Overview of Ethernet (IEEE 802.3), Standard Ethernet, Fast Ethernet, Switched
Ethernet, Gigabit Ethernet, Ten Gigabit Ethernet
Token Passing LANs: Token Bus (IEEE 802.4), Token Ring (IEEE 802.5), FDDI, RPR
ATM LANs: ATM LAN Architecture, LAN Emulation (LANE), Client Server Model,
LANE Operation, Frame Format
Storage area networks
NETWORK INTERCONNECTIONS
5
Internetworking Concepts, Repeaters, Hubs, Bridges, Routers, Switches, Gateways,
Virtual LANs
WAN TECHNOLOGIES
Frame Relay: Introduction, Frame Relay Operation, Frame Relay Layers
ATM: Introduction, ATM Architecture, ATM Cell Structure, Switching, ATM Layers,
ATM Service Categories
WIRELESS TECHNOLOGIES
7
Wireless links and network characteristics, wireless LANs, PANs, MANs and WANs
MULTIMEDIA NETWORK TECHNOLOGIES
7
Streaming stored audio and video, best effort service, protocols for realtime interactive
applications, content distribution networks, scheduling and policing mechanisms,
integrated services and differentiated services, RSVP.
BOOKS:
1. G. Keiser, Local Area Networks, 2nd Edition, TMH, 2002.
REFERENCES:
1. B.A. Forouzan, Local area networks, 1st Edition, TMH, 2003
2. A.L. Garcia and I. Widraja, Communication networks, TMH, 2nd ed, 2004.
3. W. Stallings, Data and Computer Communications, 6th Edition, Pearson Education
Asia, 2001
4. A.S. Godbole, Data Communications and Networks, TMH, 2002.
5. James F. Kurose and Keith W. Ross, Computer Networking: A top down approach
featuring the Internet, Pearson Education, third ed.
6. B.A. Forouzan, Data Communications and Networking, 2nd Edition, TMH, 2003.