Escolar Documentos
Profissional Documentos
Cultura Documentos
1. Artificial Intelligence
2. Distributed Systems
3. Mobile Computing
4. Network Protocols
5. Parallel Processing
4 - 100 3 - - 100
5. RISK MANAGEMENT:
- Software risks, Risk identification, Risk projection, Risk refinement, Risk mitigation, Risk
monitoring & management, RMMM plan.
REFERENCE BOOK :
Software Engineering A Practitioners Approach R S Pressman MCH
Fundamental of Software Engineering Ghezzi C. Jazayeri M. & PHI
Mandroll D.
Software Engineering - An Industrial Approach Radice R. A. & Phillips PHI
Vol.1
Software Engineering Concepts Fairely R. MCH
Software Engineering Concepts Sommerville I.
Software Engineering The Production Of Pfleadger S.I.
Quality Software
A Spiral Model Of Software Development and Boechm B.W. IEEE Computer
Enhancement
4 2 100 3 50 25 175
1. VIEWS : Need for views. Data definition and data manipulations of views. Update operations
on views; union, intersection, difference, restriction, projection, extension and join. SQL support
for views.
2. OPTIMIZATION : Optimization process; expression transformation. Use of data base statistics.
Implementing the relational operators.
3. DOMAINS, RELATIONS AND DATA TYPES : Domains; type compatibility; scalac
operations; relations. Relational operations. Type inheritance.
4. DISTRIBUTED AND CLIENT/SERVER DATABASE SYSTEMS : Objectives of
distributed database systems; structure and design issues; associated difficulties; distributed
query processing; commit protocols, recovery and concurrency issues. DBMS gateways.
5. OBJECT ORIENTED SYSTEMS : Review of object oriented programming concepts. Basic
concepts and architecture of object-oriented database systems; handling binary large objects;
performance and application selection issues.
6. EMERGING DATABASE TECHNOLOGY AND APPLICATIONS : Deductive
databases, Expert database systems, Multi database system.
7. CASE STUDIES.
REFERENCE BOOKS :
1. C. J. Date An Introduction to Database Systems Addition Wesley
2. C.S.R.Prabhu Object-Oriented Database Systems Prentice Hall India.
3. Henry F. Korth Database System Concepts McGraw-Hill
4. Ramez Elmasri Database System Addition Wesley
4 2 100 3 50 25 175
1. INTRODUCTION :
- What is compiler, applications, phases, grouping of phases, challenge, tools, types, cousins,
Analysis of source program, Complication process, simple one pas compiler
2. LEXICAL ANALYSIS :
- Role of lexical analyzer, Input buffering, Specification and recognition of tokens.
- Finite automaton (NFA, DFA, NFA to DFA), RE to NFA
3. SYNTAX ANALYSIS :
- Role of Parser
- Grammars
- Top down parsing
o Recursive Descent Parsing
o Predictive Parsing
- Bottom up parsing
o Shift reduce parsing
o Operator precedence
- LR parsing
o LR parsing methods
o Constructing LR parsing table
o Handling ambiguities in LR parsing
- Introduction to syntax directed translation
4. TYPE CHACKING :
- Static vs dynamic checking, Type expression, equivalence of type expression, Type conversion
5. SYMBOL TABLE & RUNTIME ENVIRONMENT :
- Symbol table entry, Different types, feature, Activation record
6. ERROR HANDLING :
- Sources of errors, error recovery etc.
7. INTERMEDIATE CODE GENERATION :
- Intermediate languages, issues, three address code generation etc.
8. CODE GENERATION :
- Issue in design of code generation, basic block and flow graphs, register allocation and
assignment, dag representation of basic block.
9. CODE OPTIMIZATION :
- Need for optimization, problems in optimization, classification, principle sources of optimization,
transformation, local and global optimization.
REFERENCE BOOK :
1. Aho Alluman & Shethi - Principles of Compiler Design 3rd Edition - Narosa Publishing house
2. A. V. Aho & J. D. Alluman - Principles of Compiler Design - Narosa Publishing house
2. D M Dhamdhere - Compiler Construction-Principles & Practice - Macmillan India
3. J P Tremblay and P G Sorenson - The Theory and Practice of Compiler Writing - MGH
4 2 100 3 50 25 175
1. INTRODUCTION TO AI :
- Definition, AI Technique, AI Problems, Area of AI, State space Representation, Production
System, Problem Characteristics, Production System Characteristics.
2. SEARCH TECHNIQUES :
- Breadth first search, depth first search, generate and test, hilt climbing, best-first search, problem
reduction, constraint satisfaction, means-ends-analysis, nearest neighbor, branch and bound.
3. KNOWLEDGE REPRESENTATION :
- Knowledge representation issue, prepositional calculus predicate calculus, resolution, procedural
versus backward reasoning, matching, control knowledge, semantic net, frame, script.
4. EXPERT SYSTEM :
- Features, characteristic, architecture, goals, tools, advantages, problems, applications.
5. FUZZY SYSTEM :
- Fuzzy versus crisp, crisp sets, fuzzy set, set theory operations, crisp and fuzzy relation, fuzzy
rule-based system, applications.
7. NLP :
- Introduction, steps of understanding, need for NLP, fundamental problems, applications.
REFERENCE BOOKS :
1. Andrew S. Tanenbaum Modern Operating System Prentice Hall India.
2. Silberschatz and Galvin Operating system Concepts (5th Edition) AWL
3. Mukesh Singhal, Niranjan G. Shivratri Advanced Concepts in Operating Systems
4. Distributed, Database and Multiprocessor Operating Systems
Mc-Graw Hill International Edition
• Introduction
History, Physical and Technological Constraints, Impacts on Computer Science Wireless * * *
• Communications
Radio Propagation, Media Access, Wireless Communication Systems
• Wireless Networks
Global System for Mobile Communication (GSM) Packet Radio Network (GPRS),
Wireless LAN/WAN, Voice over IP
• Mobile Networking
Mobile-IP, Ad-Hoc Networks And Ad-Hoc Routing
• Wireless Protocols
Wireless TCP, WAP And WML Scripting, Session Mobility
• Discovery
Mobile Applications And Services
Mobile Agents, Transcoding And Proxy Architecture, Wireless Web And WAP Security
Authentication In Mobile Applications, Privacy Issues
Case Study: Satellite Networks
Satellite MAC, Multicast Over Satellite, Asymmetric Routing, TCP Over Satellite, LEO
Constellation And LEO Routing
• New Topics
Power Management And Energy-Awareness Computing, Information Appliances, Mobile Wireless
Networks Simulation
• Projects
Because Mobile Computing And Wireless Network Is Still Emerging Field, Many Of The Topics
Have Little Consensus In The Research Community On The Best Approaches. Therefore, students
are require to visit at Mobile Switching Center and prepare a comprehensive report.
REFERENCE BOOKS :
1. W. Richand Stevens TCP/IP Illustrated (Vol. 1 to 3) AWL, Addision Wesley
2. W. Richand Stevens UNIX Network Programming Prentice Hall India
3. Douglas E. Comer Internetworking witn TCP/IP (Vol. 1 to 3) PHI.
(05) PARALLEL PROCESSING
TEXT/REFERENCES:
4 2 100 3 50 25 175
REFERENCE BOOK :
REFERENCE BOOK :
1) The Complete Reference JSP
2) Java Servlet Programing Oreilly
3) Developing Java Servlets Teal
4) Professional JSP Wrox
REFERENCE BOOKS:
1. Using VC++ : Prentic Hall India Kate Gregory
2. Patrick Naughton & Herbert Schildt : Tata McGraw-Hill Java The Complete Reference
3. Balagurusami : Tata McGraw-Hill Programming with Java - a Primer
1. INTRODUCTION :
- Service, Mechanisms, Attacks, OSI Security Architecture.
2. CLASSICAL ENCRYPTION TECHNIQUES :
- Symmetric cipher model, substitution and transposition techniques, steganography, DES, Block
cipher principles, Data encryption standard.
3. FINITE FIELDS & ADVANCED ENCRYPTION STANDARD :
4. CONTENPORARY SYMMETRIC CIPHERS :
5. NUMBER THEORY :
6. PUBLIC KEY CRYPTOGRAPHY & RSA :
7. MESSAGE AUTHENTICATION & HASH FUNCTIONS. :
8. HAS ALGORITHMS :
- MDS, RIPEMD, HMAC.
REFERENCE BOOK :
Cryptography and Network Security William Stalliys PHI
Principles and Practice (Third Edition)
Network Security Retentions Application & William Stalliys PHI
Standard.
Applied Cryptography Bruce Schnejer ---
SAURASHTRA UNIVERSITY , RAJKOT
B.E. SEM VII (CE)
(706) Semi Project-II
-- 2 -- -- 75 25 100
The students have to design project work in the institute during semester using the languages and tools
which they had learn in earliest or current semester and submit a comprehensive report along with the
source code at the end of semester.