CURRICULUM AND SYLLABUS REGULATION 2015 -...

46
M.TECH INFORMATION TECHNOLOGY CURRICULUM AND SYLLABUS REGULATION 2015

Transcript of CURRICULUM AND SYLLABUS REGULATION 2015 -...

M.TECH

INFORMATION TECHNOLOGY

CURRICULUM

AND SYLLABUS

REGULATION 2015

M.TECH INFORMATION TECHNOLOGY REGULATION 2015

2 KALASALINGAM UNIVERSITY

M.TECH CURRICULUM Semester I

Code Subject L T P C INT5004 Network Engineering and Management 3 0 0 3 INT5005 Modern Digital Communication Techniques 3 0 0 3 INT5007 Graph Theory 3 0 0 3 INT5022 Advanced Operating Systems 3 0 0 3 INT6007 Advanced Database Technologies 3 0 0 3 INTXXXX Elective I 3 0 0 3INT5081 Operating System Laboratory 0 0 3 2 INT5085 Networking and DBMS Laboratory 0 0 3 2 Total 18 0 6 22

Semester II

Code Subject L T P C INT5003 High Performance Communication Networks 3 0 0 3 INT5023 Software Quality and Testing 3 0 0 3 INT5024 Wireless Adhoc and Sensor Networks 3 0 0 3 INT5025 Web Integrated Technologies 3 0 0 3 INT6019 Cloud Computing 3 0 0 3 INTXXXX Elective II 3 0 0 3 INT5086 Cloud Computing Laboratory 0 0 3 2 INT5087 Web Integrated Technologies Laboratory 0 0 3 2 Total 18 0 6 22

Semester III

Code Subject L T P C INTXXXX Elective III 3 0 0 3 INTXXXX Elective IV 3 0 0 3 INTXXXX Elective V 3 0 0 3 INT6090 Research Methodologies 2 0 0 1 INT6098 Project Work – Phase I 0 0 12 6 Total 11 0 12 16

Semester IV

Code Subject L T P C INT6099 Project Work – Phase II 0 0 24 12 Total 0 0 24 12

Total Credits (From 1st semester to 4th semester) = 72

M.TECH INFORMATION TECHNOLOGY REGULATION 2015

3 KALASALINGAM UNIVERSITY

LIST OF ELECTIVES

Code Subject L T P C INT5011 Design and Analysis of Algorithms 3 0 0 3 INT5012 Cellular Mobile Communication 3 0 0 3 INT5014 Advanced Computer Architecture 3 0 0 3 INT5015 Optical Fiber Communication 3 0 0 3 INT5016 Wireless Communication Systems 3 0 0 3 INT5017 Advanced Digital Signal Processing 3 0 0 3 INT5019 Multimedia and Virtual Reality Systems 3 0 0 3 INT5020 Evolutionary Computation Techniques 3 0 0 3 INT5021 Fault Tolerant systems 3 0 0 3 INT5026 Image Processing and Pattern Analysis 3 0 0 3 INT5027 Embedded Computing System Design 3 0 0 3 INT5028 Network and Information Security 3 0 0 3 INT5029 Data Warehousing and Data Mining 3 0 0 3 INT6001 Soft Computing 3 0 0 3 INT6002 Grid Computing 3 0 0 3 INT6004 Real Time Systems 3 0 0 3 INT6005 Neural Networks and its Applications 3 0 0 3 INT6011 Advanced Java Programming 3 0 0 3 INT6012 MATLAB Programming. 3 0 0 3 INT6016 Wireless Security 3 0 0 3 INT6017 Advanced Software Architecture. 3 0 0 3 INT6018 Quantum Computing 3 0 0 3 INT6020 Information Retrieval 3 0 0 3 INT6022 Green Computing 3 0 0 3 INT6023 3G and 4G Wireless Networks 3 0 0 3 INT6024 Digital Video Processing 3 0 0 3 INT6025 Web Mining 3 0 0 3 INT6026 Social Network Analysis 3 0 0 3 INT6027 Text Mining 3 0 0 3 INT6028 Agent Based Intelligent System 3 0 0 3

M.TECH INFORMATION TECHNOLOGY REGULATION 2015

4 KALASALINGAM UNIVERSITY

INT5004 NETWORK ENGINEERING AND MANAGEMENT

L T P C 3 0 0 3

FOUNDATIONS OF NETWORKING Communication Networks – Network Elements – Switched Networks and Shared media Networks – Probabilistic Model and Deterministic Model – Datagrams and Virtual Circuits – Multiplexing – Switching - Error and Flow Control – Congestion Control – Layered Architecture – Network Externalities – Service Integration. QUALITY OF SERVICE Traffic Characteristics and Descriptors – Quality of Service and Metrics – Best Effort model and Guaranteed Service Model – Limitations of IP networks – Scheduling and Dropping Policies for BE and GS models – Traffic Shaping Algorithms – End to End Solutions – Laissez Faire Approach – Possible improvements in TCP – Significance of UDP in Inelastic Traffic HIGH PERFORMANCE NETWORKS Integrated Services Architecture – Components and Services – Differentiated Services Networks – Per Hop Behavior – Admission Control – MPLS Networks – Principles and Mechanisms – Label Stacking – RSVP – RTP/RTCP. NETWORK DEVICE ARCHITECTURE Network Devices – Switch – Router – Hardware Components- Software – Configuration – Routing Concepts- Static Routing – Dynamics Routing – Routing Information Protocol – Configuration – Open Shortest Path First Protocol – Configuration – Access Control List – Standard – Extended – Named. Multiplexers, Modems and Internet Access Devices – Switching and Routing Devices- Router Structure - Configuring EGP –RIP – OSPF – IS-IS - Hub - Bridges – Routers – Link Virtualization - Multicast Architecture. SOFTWARE DEFINED NETWORKING History - Data Plane Support for SDN - Software Routers – Programmable Hardware –Control Plane Support for SDN - Modern SDN Stack - Programming Languages – Applications – Data Centre Networking –Software Defined Radio –Campus Networks. REFERENCES:

1. Mahbub Hassan and Raj Jain, “High Performance TCP/IP Networking”, Pearson Education/PHI, 2009.

2. Larry L Peterson and Bruce S Davie, “Computer Networks: A Systems Approach”, Fifth Edition, Morgan Kaufman Publishers, 2012.

3. Jean Warland and Pravin Vareya, “High Performance Networks”, Morgan Kauffman Publishers, 2002

4. James Macfarlane, “Network Routing Basics: Understanding IP Routing in Cisco Systems”, Wiley edition 1 2006.

SEMESTER I

M.TECH INFORMATION TECHNOLOGY REGULATION 2015

5 KALASALINGAM UNIVERSITY

5. Wendell Odom and Rick McDonald, “Routers and Routing Basics CCNA 2 Companion Guide (Cisco Networking Academy)”, Cisco press, 2006.

INT5005 MODERN DIGITAL COMMUNICATION TECHNIQUES

L T P C 3 0 0 3

POWER SPECTRUM AND COMMUNICATION Introduction to communication and Power spectral Density. PSD of a synchronous data pulse stream - M-ary Markov source - Convolutionaly coded modulation - Continuous phase modulation - Scalar and vector communication over memory less channel –Detection Criteria COHERENT AND NON-COHERENT COMMUNICATION Coherent receivers - Optimum receivers in WGN - IQ modulation & demodulation - Non coherent receivers in random phase channels - M-FSK receivers - Rayleigh and Rician channels - Partially coherent receivers - DPSK - M-PSK - M-DPSK. BANDLIMITED CHANNELS AND DIGITAL MODULATIONS Eye pattern - demodulation in the presence of ISI and AWGN - Equalization techniques - IQ modulations - QPSK - QAM - QBOM -Continuous phase modulation - CPFM - CPFSK - MSK - OFDM. BLOCK CODED DIGITAL COMMUNICATION Architecture and performance - Binary block codes - Orthogonal - Bi orthogonal - Trans orthogonal - Shannon’s channel coding theorem - Channel capacity - Matched filter - Concepts of Spread spectrum communication - Coded BPSK and DPSK demodulators - Linear block codes - Hamming - Golay - Cyclic - BCH - Reed - Solomon codes. CONVOLUTIONAL CODED DIGITAL COMMUNICATION Representation of codes using Polynomial - State diagram - Tree diagram - and Trellis diagram - Decoding techniques using Maximum likelihood - Viterbi algorithm, Sequential and Threshold methods - Error probability performance for BPSK and Viterbi algorithm, Turbo Coding. REFERENCES:

1. Simon Haykin, “Digital Communications”, John Wiley and sons, fifth edition, 2010. 2. Wayne Tomasi, “Advanced Electronic Communication Systems”, 7th Edition Pearson

Education Asia, 2008. 3. Lathi B.P., “Modern Digital and Analog Communication Systems”, 6th Edition, Oxford

University press, 2009. 4. Simon M.K., Hinedi S.M., and Lindsey W.C., “Digital Communication Techniques;

Signalling and Detection”, Prentice Hall India, New Delhi, 2007.

M.TECH INFORMATION TECHNOLOGY REGULATION 2015

6 KALASALINGAM UNIVERSITY

INT5007 GRAPH THEORY L T P C 3 0 0 3

INTRODUCTION Introduction of Graphs, Paths, Cycles, And Trails, Vertex Degrees And Counting - Directed Graphs - Trees and Distance: Basic Properties. Spanning Trees and Enumeration, Optimization and Trees. MATCHING CONNECTIVITY AND FLOW Matching and Covers Algorithms and Applications, Matching in General Graphs. – Connectivity and Paths: Cuts and Connectivity, k-connected graphs - Network Flow Problems. COLOURING Vertex Colourings and Upper Bounds - Structure of k-chromatic Graphs, Enumerative Aspects. PLANAR GRAPHS, EDGES AND CYCLES Planar Graphs - Embeddings and Euler’s Formula - Characterization of Planar graphs - Parameters of Planarity, Line Graphs and Edge-Colouring, Hamiltonian Cycles, Planarity, Colouring and Cycles. RAMSEY THEORY AND RANDOM GRAPHS Ramsey Theory for Graphs: Ramsey’s Theorems - Ramsey numbers -Induced Ramsey theorems - Ramsey Properties and Connectivity. Random Graphs: The notion of a random graph - The Probabilistic method - Properties of almost all graphs - Threshold functions and second moments. REFERENCES:

1. Narsingh Deo, “Graph Theory with Applications to Engineering and Computer Science”, PHI, 2007.

2. R J Wilson, “Introduction to Graph Theory”, Pearson Education, 4th Edition, 2003. 3. Jay Yellen, Jonathan L.Gross, “Graph Theory and Its Applications”, CRC

Press LLC, 1998.

INT5022 ADVANCED OPERATING SYSTEMS L T P C 3 0 0 3

OPERATING SYSTEM BASICS Overview – Synchronization Mechanisms – Process and Threads- Process Scheduling – Deadlocks: Detection – Prevention- Recovery – Models of Resources – Memory Management.

M.TECH INFORMATION TECHNOLOGY REGULATION 2015

7 KALASALINGAM UNIVERSITY

DISTRIBUTED OPERATING SYSTEM Issues in Distributed Operating System – Architecture – Communication Primitives – Lamport’s Logical clocks – Causal Ordering of Messages – Distributed Mutual Exclusion Algorithms – Centralized and Distributed Deadlock Detection Algorithms – Agreement Protocols. DISTRIBUTED RESOURCE MANAGEMENT Distributed File System – Design Issues - Distributed Shared Memory – Algorithms for Implementing Distributed Shared memory–Issues in Load Distributing – Scheduling Algorithms – Synchronous and Asynchronous Check Pointing and Recovery – Fault Tolerance – Two-Phase Commit Protocol – Nonblocking Commit Protocol – Security and Protection. REAL TIME & MOBILE OPERATING SYSTEMS Basic Model of Real Time Systems - Characteristics- Applications of Real Time Systems – Real Time Task Scheduling - Handling Resource Sharing - Mobile Operating Systems –Micro Kernel Design - Client Server Resource Access – Processes and Threads - Memory Management – File system. CASE STUDIES Linux System: Design Principles - Kernel Modules - Process Management Scheduling – Memory Management - Input-Output Management - File System - Interprocess Communication. Windows XP: Design Principles - System Components - Process and Thread Management – Memory Management - File System. iphone iOS4: Architecture and SDK Framework - Media Layer - Services Layer - Core OS Layer - File System. REFERENCES:

1. Mukesh Singhal, Niranjan G Shivaratri, “Advanced Concepts in Operating Systems –Distributed, Database, and Multiprocessor Operating Systems”, Tata McGraw-Hill, 2001.

2. Abraham Silberschatz; Peter Baer Galvin; Greg Gagne, “Operating System Concepts”, Seventh Edition, John Wiley & Sons, 2004.

3. Andrew S.Tanenbaum, “Modern Operating System”, Third Edition, Prentice Hall Inc., 2008.

4. Rajib Mall, “Real-Time Systems: Theory and Practice”, Pearson Education India, 2006. 5. H M Deital, P J Deital and D R Choffnes, “Operating Systems”, Pearson Education,

2004. 6. Neil Smyth, “iPhone iOS 4 Development Essentials – Xcode”, Fourth Edition, Payload

media, 2011.

INT6007 ADVANCED DATABASE TECHNOLOGIES L T P C 3 0 0 3

PARALLEL AND DISTRIBUTED DATABASES Database System Architectures: Centralized and Client-Server Architectures – Server System Architectures – Parallel Systems- Distributed Systems – Parallel Databases: I/O Parallelism

M.TECH INFORMATION TECHNOLOGY REGULATION 2015

8 KALASALINGAM UNIVERSITY

Inter and Intra Query Parallelism – Inter and Intra operation Parallelism – Design of Parallel Systems- Distributed Database Concepts - Distributed Data Storage – Distributed Transactions – Commit Protocols – Concurrency Control – Distributed Query Processing – Case Studies OBJECT AND OBJECT RELATIONAL DATABASES Concepts for Object Databases: Object Identity – Object structure – Type Constructors –Encapsulation of Operations – Methods – Persistence – Type and Class Hierarchies – Inheritance – Complex Objects – Object Database Standards, Languages and Design: ODMG Model – ODL – OQL – Object Relational and Extended – Relational Systems: Object Relational features in SQL/Oracle – Case Studies. INTELLIGENT DATABASES Active Databases: Syntax and Semantics (Starburst, Oracle, DB2)- Taxonomy- Applications- Design Principles for Active Rules- Temporal Databases: Overview of Temporal Databases- TSQL2- Deductive Databases: Logic of Query Languages – Datalog- Recursive Rules-Syntax and Semantics of Datalog Languages- Implementation of Rules and Recursion- Recursive Queries in SQL- Spatial Databases- Spatial Data Types- Spatial Relationships- Spatial Data Structures- Spatial Access Methods- Spatial DB Implementation. ADVANCED DATA MODELS Mobile Databases: Location and Handoff Management - Effect of Mobility on Data Management - Location Dependent Data Distribution - Mobile Transaction Models -Concurrency Control - Transaction Commit Protocols- Multimedia Databases- Information Retrieval- Data Warehousing- Data Mining- Text Mining. EMERGING TECHNOLOGIES XML Databases: XML-Related Technologies-XML Schema- XML Query Languages- Storing XML in Databases-XML and SQL- Native XML Databases- Web Databases- Geographic Information Systems- Biological Data Management- Cloud Based Databases: Data Storage Systems on the Cloud- Cloud Storage Architectures-Cloud Data Models- Query Languages- Introduction to Big Data-Storage-Analysis. REFERENCES:

1. R. Elmasri, S.B. Navathe, “Fundamentals of Database Systems”, Fifth Edition, Pearson Education/Addison Wesley, 2008.

2. Thomas Cannolly and Carolyn Begg, “Database Systems, A Practical Approach to Design, Implementation and Management”, Fourth Edition, Pearson Education, 2008.

3. Henry F Korth, Abraham Silberschatz, S. Sudharshan, “Database System Concepts”, Sixth Edition, McGraw Hill, 2011.

4. C.J.Date, A.Kannan, S.Swamynathan, “An Introduction to Database Systems”, Eighth Edition, Pearson Education, 2006.

M.TECH INFORMATION TECHNOLOGY REGULATION 2015

9 KALASALINGAM UNIVERSITY

INT5081 OPERATING SYSTEM LABORATORY L T P C 0 0 3 2

1. Implementation of the following CPU Scheduling Algorithms.

i) FCFS ii) Round Robin iii) Shortest Job First. 2. Simulation of Deadlock detection, prevention and recovery process. 3. Implementation of Decker’s Algorithm. 4. Implementation of Distributed mutual exclusion Algorithms. 5. Semaphores Implementation. 6. Implementation of Best fit, First Fit Algorithm for Memory Management. 7. Implementation of Memory Allocation with Pages. 8. Implementation of FIFO Algorithm. 9. Implementation of LRU Algorithm. 10. Implementation of Shared memory Segmentation. 11. Implementation of File Locking concept. 12. Implementation of Banker’s algorithm. 13. Implementation of Distributed OS Agreement protocols. 14. Implementation of Distributed OS Resource Scheduling algorithms 15. Two-Phase Commit Protocol in Distributed OS.

INT5085 NETWORKING AND DBMS LABORATORY L T P C 0 0 3 2

1. Client-server programming 2. Socket programming ( TCP/UDP) 3. Network analyzer 4. Traffic Analysis 5. Protocol Analysis 6. Study of Software Defined Networking tools 7. Data Definition, Manipulation of Tables and Views 8. Database Querying – Simple queries, Nested queries, Sub queries and Joins 9. Triggers 10. Transaction Control 11. Embedded SQL 12. Database Connectivity with Front End Tools 13. Front End Tools / Programming Languages 14. High level language extensions - PL/SQL Basics 15. Procedures and Functions 16. Database Design and Implementation (Case Study)

M.TECH INFORMATION TECHNOLOGY REGULATION 2015

10 KALASALINGAM UNIVERSITY

INT5003 HIGH PERFORMANCE COMMUNICATION NETWORKS

L T P C 3 0 0 3

NETWORKS Telephone - computer - cable television and wireless networks - networking principles - and digitization - service integration, network services and layered architecture - traffic characterization and QOS - network services - network elements and network mechanisms- OSI and IP models -Ethernet (IEEE 802.3) - token ring (IEEE 802.5). PACKET SWITCHED NETWORKS FDDI - DQDB - frame relay - SMDS - Internet working with SMDS- Overview of Internet protocol - TCP and UDP - performance of TCP / IP networks CIRCUIT SWITCHED NETWORKS AND ATM SONET - DWDM - Fiber to home - Main features - addressing, signaling and routing - ATM header structure - adaptation layer, management and control. INTERNETWORKING WITH ATM AND WIRELESS NETWORKS Interworking with ATM –LAN over ATM-IP over ATM-MPOA-FR and SMDS over ATM- ISDN- BISDN - Wireless channel, link level design, channel access - Network design and wireless networks. OPTICAL NETWORKS AND SWITCHING Optical links - WDM systems cross-connects optical LANs, optical paths and networks –Applications - TDS and SDS - modular switch designs - packet switching, distributed, shared input and output buffers. REFERENCES:

1. Jean Warland and Pravin Varaiya, “High Performance Communication Networks”, 2nd Edition, London, 2001.

2. Leon Garcia, Widjaja, “Communication Networks”, Tata McGraw-Hill, New Delhi, 2000.

3. Sumit Kasera, Pankaj Sethi, “ATM Networks”, Tata McGraw-Hill, New Delhi, 2000. 4. Behrouz Forouzan A., “Data Communication and Networking”, 4th edition, Tata McGraw

Hill, New Delhi, 2007.

SEMESTER II

M.TECH INFORMATION TECHNOLOGY REGULATION 2015

11 KALASALINGAM UNIVERSITY

INT5023 SOFTWARE QUALITY AND TESTING L T P C 3 0 0 3

INTRODUCTION Basics of Software Testing – Testing Principles – Goals – Testing Life Cycle– Phases of Testing – Test Plan(IEEE format) – Importance of Testing in Software Production Cycle. SOFTWARE TESTING METHODOLOGY Software Test Plan–Components of Plan - Types of Technical Reviews - Static and Dynamic Testing- – Software Testing in Spiral Manner - Information Gathering - Test Planning – Test Case Design - Test Development - Test Coverage - Test Evaluation -Prepare for Next Spiral – Conduct System Test - Acceptance Test - Summarize Testing Results. EMERGING SPECIALIZED AREAS IN TESTING Test Process Assessment – Test Automation Assessment - Test Automation Framework – Nonfunctional Testing – SOA Testing – Agile Testing – Testing Center of Excellence – Onsite/Offshore Model - Modern Software Testing Tools. SOFTWARE QUALITY MODELS Software quality –Verification versus Validation– Components of Quality Assurance – SQA Plan – Quality Standards – CMM – PCMM – CMMI – Malcolm Baldrige National Quality Award. QUALITY THROUGH CONTINUOUS IMPROVEMENT PROCESS Role of Statistical Methods in Software Quality – Transforming Requirements intoTest Cases – Deming’s Quality Principles – Continuous Improvement through Plan Do Check Act (PDCA). REFERENCES:

1. William E.Lewis, “Software Testing and Continuous Quality Improvement”, Third edition, Auerbach Publications, 2011.

2. Kshirasagar Naik, Priyadarshi Tripathy, “Software Testing and Quality Assurance Theory and Practice”, John Wiley & Sons publication, 2011.

3. Ron Patton, “Software testing”, Second edition, Pearson Education, 2007 4. Elfriede Dustin, Jeff Rashka, John Paul, “Automated Software Testing: Introduction,

Management and Performance”, Addison-Wesley, 1999.

INT5024 WIRELESS ADHOC AND SENSOR NETWORKS

L T P C 3 0 0 3

ADHOC NETWORKS FUNDAMENTALS AND MAC PROTOCOLS Fundamentals of WLAN’s – IEEE 802.11 Architecture - Self Configuration and Auto Configuration- Issues in Ad-Hoc Wireless Networks – MAC Protocols for Ad-Hoc Wireless

M.TECH INFORMATION TECHNOLOGY REGULATION 2015

12 KALASALINGAM UNIVERSITY

Networks – Contention Based Protocols - TCP over Ad-Hoc Networks-TCP Protocol Overview - TCP And MANET’s – Solutions For TCP over Ad-Hoc Networks ADHOC NETWORK ROUTING AND MANAGEMENT Routing in Ad-Hoc Networks- Introduction -Topology based versus Position based Approaches - Proactive, Reactive, Hybrid Routing Approach - Principles and issues – Location services - DREAM – Quorums based Location Service – Grid – Forwarding Strategies – Greedy Packet Forwarding – Restricted Directional Flooding- Hierarchical Routing- Other Routing Protocols. SENSOR NETWORK FUNDAMENTALS AND COMMUNICATION PROTOCOLS Introduction – Architecture - Single Node Architecture – Sensor Network Design Considerations – Energy Efficient Design Principles for WSN’s – Protocols for WSN – Physical Layer – Transceiver Design Considerations – MAC Layer Protocols – IEEE 802.15.4 Zigbee – Link Layer and Error Control Issues - Routing Protocols – Mobile Nodes and Mobile Robots - Data Centric & Contention Based Networking – Transport Protocols & QoS – Congestion Control Issues – Application Layer Support. SENSOR NETWORK MANAGEMENT AND PROGRAMMING Sensor Management - Topology Control Protocols and Sensing Mode Selection Protocols – Time Synchronization - Localization and Positioning – Operating Systems and Sensor Network Programming – Sensor Network Simulators. ADHOC AND SENSOR NETWORK SECQURITY Security in Ad-Hoc and Sensor Networks – Key Distribution and Management – Software based Anti-tamper Techniques – Water Marking techniques – Defense against Routing Attacks – Secure Ad-hoc Routing Protocols – Broadcast Authentication WSN Protocols – TESLA – Biba – Sensor Network Security Protocols - SPINS REFERENCES:

1. Carlos De Morais Cordeiro, Dharma Prakash Agrawal, “Ad-Hoc and Sensor Networks: Theory and Applications”, Second Edition, World Scientific Publishing, 2011.

2. Holger Karl, Andreas willig, “Protocols and Architectures for Wireless Sensor Networks”, John Wiley & Sons, Inc .2005.

3. C.Siva Ram Murthy and B.S.Manoj, “Ad Hoc Wireless Networks – Architectures and Protocols”, Pearson Education, 2004.

4. C.K.Toh, “Ad Hoc Mobile Wireless Networks”, Pearson Education, 2002. 5. Erdal Çayırcı , Chunming Rong, “Security in Wireless Ad Hoc and Sensor Networks”,

John Wiley and Sons, 2009. 6. Waltenegus Dargie, Christian Poellabauer, “Fundamentals of Wireless Sensor Networks

Theory and Practice”, John Wiley and Sons, 2010. 7. Adrian Perrig, J. D. Tygar, "Secure Broadcast Communication: In Wired and Wireless

Networks", Springer, 2006.

M.TECH INFORMATION TECHNOLOGY REGULATION 2015

13 KALASALINGAM UNIVERSITY

INT5025 WEB INTEGRATED TECHNOLOGIES L T P C 3 0 0 3

WEB DESIGN PRINCIPLES Web Engineering and Application Development – Introduction – Challenges and Role of Web Engineering – Web Design Methods – Design Issues – OOWS Model Driven approach –OOHDM – UML based Web Engineering – Designing Multichannel Web Application – Designing Web Application with Web ML and Web Ratio – Semantic Web Information System - Quality Evaluation and Experimental Web Engineering – Measuring and Evaluating Web Application – Need for Empirical Web Engineering WEB APPLICATION DEVELOPMENT Web Technology Basics – HTML5 – Cascading Style Sheet – Client side scripting – JavaScript – JavaScript Objects – XML Basics – DOM – SAX – XSL – AJAX – RSS – Database Connectivity – Server Side Scripting – Servlet – Servlet Life Cycle – Servlet based Web Application – JSP – PHP – ASP.NET – Case Study ENTERPRISE APPLICATION DEVELOPMENT Three Tier Architecture – Working With Model-View-Controller – JCP – J2EE - XML Based APIs – Application Servers - Presentation Tier and EIS Tier – Java Mail – JMS – Java Transactions – JNDI – Java Authentication and Authorization Services – Java Cryptography COMPONENTS AND FRAMEWORKS Service Tier And Data Tier – EJB Architecture – Session Beans – Entity Beans – Message Driven Beans – J2EE Connector Architecture - Web Services – J2EE Web Services – Patterns – Presentation, Service Tier and Data Tier Patterns – J2ME - Struts – Hibernate – Spring SOA BASICS SOA Principles – Evolution of SOA – SOA and WS_Extension – Service Activity – Coordination – Transaction – Orchestration – Choreography – Security – Advanced Messaging - Notification and Eventing - Case Studies – Current Trends REFERENCES:

1. Gustavo Rossi, Oscar Pastor, Daniel Schwabe, Luis Olsina, “Web Engineering Modeling and Implementing web Applications”, Springer, 2008.

2. Thomas Erl, “Service Oriented Architecture, Concepts, Technology, and Design”, Pearson, 2005.

3. James McGovern, Sameer Tyagi, Michael E. Stevens, Sunil Mathew, “Java Web Services Architecture”, Elsevier, 2003.

M.TECH INFORMATION TECHNOLOGY REGULATION 2015

14 KALASALINGAM UNIVERSITY

INT6019 CLOUD COMPUTING L T P C 3 0 0 3

INTRODUCTION Evolution of Cloud Computing –System Models for Distributed and Cloud Computing – NIST Cloud Computing Reference Architecture -IaaS – On-demand Provisioning – Elasticity in Cloud – E.g. of IaaS Providers - PaaS – E.g. of PaaS Providers - SaaS – E.g. of SaaS Providers – Public, Private and Hybrid Clouds. VIRTUALIZATION Basics of Virtualization - Types of Virtualization - Implementation Levels of Virtualization - Virtualization Structures - Tools and Mechanisms - Virtualization of CPU, Memory, I/O Devices - Desktop Virtualization – Server Virtualization. CLOUD INFRASTRUCTURE Architectural Design of Compute and Storage Clouds – Layered Cloud Architecture Development – Design Challenges - Inter Cloud Resource Management – Resource Provisioning and Platform Deployment – Global Exchange of Cloud Resources. PROGRAMMING MODEL Parallel and Distributed Programming Paradigms – Map Reduce , Twister and Iterative MapReduce – Hadoop Library from Apache – Mapping Applications - Programming Support - Google App Engine, Amazon AWS - Cloud Software Environments -Eucalyptus, Open Nebula, Open Stack. SECURITY IN THE CLOUD Security Overview – Cloud Security Challenges – Software-as-a-Service Security – Security Governance – Risk Management – Security Monitoring – Security Architecture Design – Data Security – Application Security – Virtual Machine Security. REFERENCES:

1. Kai Hwang, Geoffrey C Fox, Jack G Dongarra, “Distributed and Cloud Computing, From Parallel Processing to the Internet of Things”, Morgan Kaufmann Publishers, 2012.

2. John W.Rittinghouse and James F.Ransome, “Cloud Computing: Implementation, Management, and Security”, CRC Press, 2010.

3. Toby Velte, Anthony Velte, Robert Elsenpeter, “Cloud Computing, A Practical Approach”, TMH, 2009.

4. George Reese, “Cloud Application Architectures: Building Applications and Infrastructure in the Cloud”, O'Reilly, 2009.

5. James E. Smith, Ravi Nair, “Virtual Machines: Versatile Platforms for Systems and Processes”, Elsevier/Morgan Kaufmann, 2005.

6. Katarina Stanoevska-Slabeva, Thomas Wozniak, Santi Ristol, “Grid and Cloud Computing – A Business Perspective on Technology and Applications”, Springer, 2010.

M.TECH INFORMATION TECHNOLOGY REGULATION 2015

15 KALASALINGAM UNIVERSITY

INT5086 CLOUD COMPUTING LABORATORY L T P C 0 0 3 2

1. Create a Collaborative learning environment for a particular learning topic using Google

Apps. Google Drive, Google Docs and Google Slides must be used for hosting e-books, important articles and presentations respectively. The instructor must use the Google Sheets to convey the timetable for different events and for analyzing the scores for individual assignment submission.

2. Modeling and simulation Cloud computing environments, including Data Centers, Hosts and Cloudlets and perform VM provisioning using CloudSim: Design a host with two CPU cores, which receives request for hosting two VMs, such that each one requires two cores and plans to host four tasks units. More specifically, tasks t1, t2, t3 and t4 to be hosted in VM1, while t5, t6, t7, and t8 to be hosted in VM2. Implement space-shared allocation policy and time-shared allocation policy. Compare the results.

3. Model a Cloud computing environment having Data center that had 100 hosts. The hosts are to be modeled to have a CPU core (1000 MIPS), 2 GB of RAM and 1 TB of storage. Consider the workload model for this evaluation included provisioning requests for 400 VMs, with each request demanding 1 CPU core (250 MIPS), 256 MB of RAM and 1 GB of storage. Each VM hosts a web-hosting application service, whose CPU utilization distribution was generated according to the uniform distribution. Each instance of a web-hosting service required 150,000 MIPS or about 10 minutes to complete execution assuming 100% utilization. Simulate Energy-conscious model for power consumption and power management techniques such as Dynamic Voltage and Frequency Scaling (DVFS). Initially, VMs are to be allocated according to requested parameters (4 VMs on each host). The Cloud computing architecture that is to be considered for studying energy-conscious resource management techniques/policies included a data center, CloudCoordinator, and Sensor component. The CloudCoordinator and Sensor perform their usual roles. Via the attached Sensors (which are connected with every host), CloudCoordinator must periodically monitor the performance status of active VMs such as load conditions, and processing share. This real time information is to be passed to VMM, which can use it for performing appropriate resizing of VMs and application of DVFS and soft scaling. CloudCoordinator continuously has to adapt allocation of VMs by issuing VM migration commands and changing power states of nodes according to its policy and current utilization of resources.

4. Model and simulate the environment consisting of a data center with 10,000 hosts where each host was modeled to have a single CPU core (1200MIPS), 4GB of RAM memory and 2TB of storage. Consider the provisioning policy for VMs as space-shared, which allows one VM to be active in a host at a given instance of time. Make a request from the end-user (through the DatacenterBroker) for creation and instantiation of 50 VMs that had following constraints: 1024MB of physical memory, 1 CPU core and 1GB of storage. The application granularity was modeled to be composed of 300 task units, with each task unit requiring 1,440,000 million instructions (20 minutes in the simulated hosts) to be executed on a host. Minimal data transfer (300 KB) overhead can be considered for the task units (to and from the data center). After the creation of VMs, task units were submitted in small groups of 50 (one for each VM) at interarrival delay of 10 minutes.

5. Implement Map Reduce concept for

M.TECH INFORMATION TECHNOLOGY REGULATION 2015

16 KALASALINGAM UNIVERSITY

a. Strassen’s Matrix Multiplication for a huge matrix. b. Computing the average number of citation index a researcher has according to age among some 1 billion journal articles.

6. Consider a network of entities and relationships between them. It is required to calculate a state of each entity on the basis of properties of the other entities in its neighborhood. This state can represent a distance to other nodes, indication that there is a neighbor with the certain properties, characteristic of neighborhood density and so on. A network is stored as a set of nodes and each node contains a list of adjacent node IDs. Mapper emits messages for each node using ID of the adjacent node as a key. Reducer must recompute state and rewrite node with the new state. Implement this scenario.

7. Setup a Private Cloud Using OpenStack or Eucalyptus. Develop a simple applications and make it available to the intended user.

8. Install and configure OpenStack Object Storage - Swift in Ubuntu. Consider a huge storage requirement and store it in the cloud in a transparent manner.

9. Install and configure OpenStack Nova-Compute. Enable a connected user to get a virtual machine of a selected performance such as CPU, Memory.

10. Install and configure Stack Image services to query for information on available disk images, and use the Image Service's client library for streaming virtual disk images.

INT5087 WEB INTEGRATED LABORATORY L T P C 0 0 3 2

1. Web programming with HTML tags, CSS for styling, Page layout 2. Develop webpage using JavaScript for client side programming and HTML forms 3. Using The DOM and the JavaScript object models 4. Website optimization: crunching HTML, using CSS to replace HTML and light-weight

graphics to speed up websites 5. Creating XML file with XML DTD and XML schema, SAX, XSL 6. Web site creation with PHP for server side programming for storing current date-time

using cookies and for storing page views using sessions 7. Web application development using Servlet/ PHP/ JSP/ ASP.NET 8. Working with PHP and MySQL. 9. Constructing dynamic server-side web pages using JSF and integrate the Web application

with many of the other Java2 Enterprise Edition application server methodologies such as Enterprise Java Beans, JavaMail, and SOAP.

10. Developing Java Enterprise Applications Using EJB3 Session beans, entity beans and message-driven beans.

11. Working with JNDI, JDBC and JMS. 12. Application development using J2ME.

M.TECH INFORMATION TECHNOLOGY REGULATION 2015

17 KALASALINGAM UNIVERSITY

INT6090 RESEARCH METHODOLOGY L T P C 1 0 0 1

Building blocks of science in research Concept of Applied and Basic research Quantitative and Qualitative Research Techniques Laboratory and the Field Experiment Internal and External Review of Advantages and Disadvantages of various Data-Collection Methods and their utility. Data Analysis Factor Analysis Cluster Analysis Application of Statistical (SPSS) Software Package in Research Purpose of the written report Basics of written reports Integral parts of a report, Title of a report, Table of contents, Abstract, Synopsis, Introduction, Body of a report, Experimental Results and Discussion, Recommendations and Implementation section, Conclusions and Scope for future work REFERENCES:

1. Donald R. Cooper and Ramela S. Schindler, “Business Research Methods”, Tata McGraw- Hill Publishing Company Limited, New Delhi, 2000.

2. Uma Sekaran, “Research Methods for Business”, John Wiley and Sons Inc., New York, 2000.

3. C.R.Kothari, “Research Methodology”, Wishva Prakashan, New Delhi, 2001. 4. Donald H.McBurney, “Research Methods”, Thomson Asia Pvt. Ltd. Singapore, 2002. 5. G.W.Ticehurst and A.J.Veal, “Business Research Methods”, Longman, 1999. 6. Ranjit Kumar, “Research Methodology”, Sage Publications, London, New Delhi, 1999. 7. Raymond-Alain Thie’tart, et.al., “Doing Management Research”, Sage Publications,

London, 1999.

SEMESTER III

M.TECH INFORMATION TECHNOLOGY REGULATION 2015

18 KALASALINGAM UNIVERSITY

INT5011 DESIGN AND ANALYSIS OF ALGORITHMS L T P C 3 0 0 3

ALGORITHM Fundamentals of algorithmic problem solving - Important problem types - Fundamentals of the analysis of algorithm efficiency - analysis frame work - Asymptotic notations - Mathematical analysis for recursive and non-recursive algorithms. DIVIDE AND CONQUER METHOD AND GREEDY METHOD Divide and conquer methodology - Merge sort - Quick sort - Binary search - Binary tree traversal - Multiplication of large integers - Strassen’s matrix multiplication - Greedy method - Prim’s algorithm - Kruskal’s algorithm - Dijkstra’s algorithm. DYNAMIC PROGRAMMING Computing a binomial coefficient - Warshall’s and Floyd’ algorithm - Optimal binary search tree - Knapsack problem - Memory functions. BACKTRACKING AND BRANCH AND BOUND Backtracking - N-Queens problem - Hamiltonian circuit problem - Subset sum problem – Branch and bound - Assignment problem - Knapsack problem - Traveling salesman problem. NP-HARD AND NP-COMPLETE PROBLEMS P & NP problems - NP-complete problems - Approximation algorithms for NP-hard problems - Traveling salesman problem - Knapsack problem. REFERENCES:

1. Anany Levitin, “Introduction to the Design and Analysis of Algorithms”, Pearson Education (Singapore), Indian branch, New Delhi, 2005.

2. R C T Lee, S S Tseng, R C Chang, Y T Tsai, “Introduction to Design and Analysis of Algorithms", Tata Mc Graw Hill, Education, 2005.

3. Ellis Horowitz, Sartaj Sahni, Sanguthevar Rajasekaran, "Fundamentals of Computer Algorithms", second edition, Galgotia Publications, New Delhi, 2003

4. Aho A V., J E Hopcroft., J D Ullman., "Design and Analysis of Algorithms", third edition, Pearson Education, Singapore, 2000.

5. Thomas H.Cormen, Charles E.Leiserson, Ronald L.Rivest, “Introduction to Algorithms”, Prentice Hall, MIT Press 1990.

ELECTIVES

M.TECH INFORMATION TECHNOLOGY REGULATION 2015

19 KALASALINGAM UNIVERSITY

INT5012 CELLULAR MOBILE COMMUNICATION L T P C 3 0 0 3

CELLULAR CONCEPT Frequency reuse - Channel Assignment Strategies - Hand off Strategies - Interference and System Capacity - Trunking and Grade of Service - Improving coverage and capacity in cellular systems. RADIO PROPAGATION Free Space Propagation Model - Propagation Mechanisms - Reflection - Diffraction and scattering - Models for Path loss - Small scale Multipath Propagation - Parameters of Mobile Multipath Channels - small scale fading types. MULTIPLE ACCESS TECHNIQUES FDMA - TDMA - CDMA - Spread Spectrum Multiple Access - Multiplexing and OFDM - Packet Radio Protocols - Capture Effect - Capacity of cellular systems. EQUALIZATION, DIVERSITY AND CODING Linear and Nonlinear Equalization - Adaptive Equalization - Diversity techniques - RAKE Receiver - Fundamentals of Channel Coding - Block codes and finite fields - convolutional codes - coding gain - Trellis coded Modulation - Turbo Codes. WIRELESS STANDARDS GSM - IS-95 -UMTS - IMT-2000 - Signaling - Call Control - Mobility Management and location tracing. REFERENCES:

1. Rappaport T.S., Wireless Communications Principles and Practice, Pearson Education, 2nd Edition, 2008.

2. Blake R., Wireless Communication Technology, Thomson Delmar, 2nd Edition, 2007. 3. Lee W.C.Y., Mobile Communications Engineering: Theory and applications, McGraw-

Hill International, 2nd Edition, 2009.

INT5014 ADVANCED COMPUTER ARCHITECTURE L T P C 3 0 0 3

PIPELINING AND ILP Fundamentals of Computer Design - Measuring and Reporting Performance - Instruction Level Parallelism and Its Exploitation - Concepts and Challenges - Overcoming Data Hazards with Dynamic Scheduling – Dynamic Branch Prediction - Speculation - Multiple Issue Processors –Case Studies.

M.TECH INFORMATION TECHNOLOGY REGULATION 2015

20 KALASALINGAM UNIVERSITY

THREAD-LEVEL PARALLELISM Multi-threading – Multiprocessors - Centralized and Distributed Shared Memory Architectures –Cache Coherence Issues - Performance Issues – Synchronization Issues – Models of Memory Consistency - Interconnection Networks – Buses, Crossbar and Multi-Stage Switches – Multi Core Processor Architectures - Case Study. SIMD AND GPU ARCHITECTURES SIMD Extensions for Multimedia – Graphics Processing Units – GPU Computational Structures – GPY ISA – GPU Memory Structures – Case Study. MEMORY HIERARCHY DESIGN Introduction - Optimizations of Cache Performance - Memory Technology and Optimizations –Name Mapping Implementations - Virtual Memory and Virtual Machines - Design of Memory Hierarchies - Case Studies. WAREHOUSE-SCALE COMPUTERS Programming Models and Workloads – Storage Architectures – Physical Infrastructure – Cloud Infrastructure – Case Study REFERENCES:

1. John L. Hennessey and David A. Patterson, “Computer Architecture – A Quantitative Approach”, Morgan Kaufmann / Elsevier, Fifth edition, 2012.

2. Richard Y. Kain, “Advanced Computer Architecture a Systems Design Approach”, PHI, 2011.

INT5015 OPTICAL FIBER COMMUNICATION L T P C 3 0 0 3

OPTICAL FIBERS Geometrical description - wave propagation - Dispersion in single mode (SM) and multimode (MM) fibers - Limitations due to dispersion - Fiber Losses - Non liner optical effects. OPTICAL AMPLIFIERS Concepts - Semiconductor optical Amplifier - Raman and Brillouin amplifier - Fiber amplifiers - Erbium doped amplifiers - System applications. DISPERSION MANAGEMENT Need-Precompensation schemes - Post compensation techniques - Dispersion compensating fibers - Optical filters - Fiber Bragg gratings - Optical Phase Conjugation -Long Haul light wave systems - High capacity systems.

M.TECH INFORMATION TECHNOLOGY REGULATION 2015

21 KALASALINGAM UNIVERSITY

MULTICHANNEL SYSTEMS WDM light wave systems - WDM components - System performance issues - Time Division Multiplexing (TDM) - Sub carrier multiplexing - Code Division Multiplexing – DWDM. COHERENT LIGHTWAVE SYSTEMS Concepts - Modulation formats - Demodulation formats - Bit Error Rate (BER) – Sensitivity degradation - System performance. REFERENCES:

1. G.P. Agrawal, “Fiber Optic Communication Systems”, John Wiley & Sons, New York, 4TH Edition, 2010.

2. G. Keiser, “Optical Fiber Communication Systems”, McGraw–Hill, New York, 5th Edition, 2010.

3. H. Franz & V.K. Jain, “Optical Communication Components and Systems”, Narosa Publications New Delhi, 3rd Edition, 2008.

4. Selvarajan, S. Kar and T. Srinivas, “Optical fiber Communication - Principle and Systems”, Tata McGraw-Hill,4TH edition , 2010.

INT5016 WIRELESS COMMUNICATION SYSTEMS L T P C 3 0 0 3

WIRELESS STANDARDS 3G - Proposals for 3G Standard - 3GPP2 - 3GPP2 - 3G Evolution Paths - CDMA Principles - Radio - Channel Access Schemes - Spread Spectrum - RAKE Receiver - Power Control - Handovers - Multi-user Detection - TDD - Modulation Techniques and Spread Spectrum – Spreading Techniques – Data Modulation. CODING TECHNIQUES Spreading Codes - Orthogonal Codes - Pseudo - Noise Codes - Synchronization Codes - autocorrelation and Cross-Correlation - Intercell Interference - Channel Coding - Coding Processes - Coding Theory - Block Codes - Convolutional Codes - Turbo Codes - Channel Coding in UTRAN. WIRELESS NETWORKS Network - General Discussion - Evolution from GSM - UMTS Network Structure - Core Network - UMTS Radio Access Network - GSM Radio Access Network. Interfaces - Network Protocols - UMTS Network Evolution - Network Planning - Network Planning Terminology - Network Planning Process - Admission Control - Congestion Control - Network Management - Telecommunication Management Architecture. DATA TRANSMISSION Procedures - RRC Connection Procedures - Radio Bearer Procedures. Data Transmission - Handovers - Random Access Procedure - New Concepts in the UMTS Network - Locations

M.TECH INFORMATION TECHNOLOGY REGULATION 2015

22 KALASALINGAM UNIVERSITY

Services - High-Speed Downlink Packet Access - Multimedia Broadcast/Multicast Service - Multimedia Messaging Service - Super - Charger. Prepaging - Gateway Location Register - Optimal Routing - Adaptive Multirate Codec - Support of Localized Service Area - Smart Antennas. SERVICES 3G Services - Service Categories - Teleservices - Bearer Services Supplementary Services - Services Capabilities - Quality of Service - 3G Applications - Application Technologies - Multimedia - Traffic Characteristics of 3G Applications - M-Commerce. Examples of 3G Applications - Terminals - The Future - New Spectrum. Satellites - 3G Upgrades - Downlink Bottleneck. 4G Vision. REFERENCES:

1. Juha Korhonen, Introduction to 3G Mobile Communications, Artech House, 4th Edition 2010.

2. Roman Kitka, Richard Levine, Lawrence J.HJarte, 3G Wireless Demystified Tata McGraw Hill, India, 5th Edition, 2009.

3. Daniel Collins, Clint Smith, “3G Wireless Networks”, Tata McGraw Hill, India, 3rd Edition, 2008.

INT5017 ADVANCED DIGITAL SIGNAL PROCESSING

L T P C 3 0 0 3

DISCRETE RANDOM SIGNAL PROCESSING Wiener–Khintchine Relation - Power Spectral Density –Filtering Random Process, Spectral Factorization Theorem- special types of random process – Signal modeling-Least Squares method,Pade approximation, Prony’s method, iterative Prefiltering, Finite Data records, Stochastic Models. SPECTRUM ESTIMATION Non–Parametric Methods - Correlation Method – co-variance Estimator- Performance Analysis of Estimators - Unbiased - Consistent Estimators- Periodogram Estimator - Bartlett Spectrum Estimation- Welch Estimation – Model Based Approach - AR, MA, and ARMA signal modeling - Parameter Estimation using Yule - Walker Method. LINEAR ESTIMATION AND PREDICTION Maximum likelihood criterion - Efficiency of estimator - Least mean squared error criterion – Wiener filter - Discrete Wiener Hoff equations - Recursive estimators - Kalman filter - Linear prediction,Prediction error - Whitening filter, Inverse filter - Levinson recursion, Lattice realization, Levinson recursion algorithm for solving Toeplitz system of equations.

M.TECH INFORMATION TECHNOLOGY REGULATION 2015

23 KALASALINGAM UNIVERSITY

ADAPTIVE FILTERS FIR adaptive filters – Newton’s steepest descent method-adaptive filter based on steepest descent method - Widrow-Hoff LMS adaptive algorithm - Adaptive channel equalization - Adaptive echo canceller - Adaptive noise cancellation - RLS adaptive filters - Exponentially weighted RLS- Sliding window RLS - Simplified IIR LMS Adaptive filter MULTIRATE DIGITAL SIGNAL PROCESSING Mathematical description of change of sampling rate - Interpolation and Decimation – Continuous Time Model-Direct Digital Domain Approach-Decimation by an integer factor - Interpolation by an integer factor – Single and Multistage realization-Polyphase realization- - Application to sub band coding - Wavelet transform and filter bank implementation of wavelet expansion of signals. REFERENCES:

1. John G.Proakis, Dimitris G.Manolakis, “Digital Signal Processing”, Pearson Education”, 2nd Edition, 2002.

2. Monson H. Hayes, “Statistical Digital Signal Processing and Modeling”, John Wiley and Sons Inc., New York, 2008.

3. Sophoncles J. Orfanidis, “Optimum Signal Processing “, McGraw-Hill, 2007. 4. John G. Proakis, Dimitris G. Manolakis, “Digital Signal Processing”, Prentice Hall of

India, New Delhi, 4th Edition,2009. 5. Simon Haykin, “Adaptive Filter Theory”, Prentice Hall, Englehood Cliffs, 5th

Edition,2013. 6. S. Kay, “Modern spectrum Estimation theory and application”, Prentice Hall, Englehood

Cliffs,2010. 7. P. P. Vaidyanathan, “Multirate Systems and Filter Banks”, Prentice Hall, 2008.

INT5019 MLTIMEDIA AND VIRTUAL REALITY SYSTEMS

L T P C 3 0 0 3

MULTIMEDIA Architecture and issues for distributed multimedia systems – Digital audio representation and processing – Video Technology – Digital video and image compression – Time based media representation and delivery. MULTIMEDIA DEVICES Multimedia Services over public networks – Requirements – Architecture – Protocols – Multimedia interchange – Multimedia Conferencing – Multimedia groupware – Computer and video fusion approach to open shared workspaces. MULTIMEDIA SERVICES Operating System support for continuous media applications – Middleware system services architecture – Multimedia devices – Presentation devices and user interface – Multimedia File

M.TECH INFORMATION TECHNOLOGY REGULATION 2015

24 KALASALINGAM UNIVERSITY

Systems – Information Models - Multimedia presentation and authoring. VIRTUAL REALITY SYSTEMS Virtual environment system: An introduction – terminology – classification – system architecture – synthesis – Physiology & perception in virtual environments – Enabling technology: Visual, Auditory, Haptic/Kinaesthetic environment systems. SOFTWARES Desktop virtual reality, VPL RB2 system, virtual environmental operating shell, Minimal Reality, World Tool Kit, Multigen, Generic Visual system – Software considerations - Virtual environment displays – position and orientation tracking – visually coupled system requirements – interaction with virtual objects – applications of virtual environments. REFERENCES:

1. Antonio S. Camara, “Multimedia and Virtual Reality”, Addison Wesley, 2nd Edition 2004.

2. John F. Koegel Bufford, “Multimedia Systems”, Addison Wesley, 2008. 3. Roy S. Kalawsky, “The science of Virtual Reality and Virtual Environments”, Addison

Wesley 2010. 4. Alistair Sutcliffe, “Multimedia and Virtual Reality: Designing Multisensory User

Interfaces”, Lawrence Erlbaum, 2009. 5. Howard Rheingold, “Virtual Reality: The Revolutionary Technology of Computer-

Generated Artificial Worlds - and How It Promises to Transform Society”, 2008.

INT5020 EVOLUTIONARY COMPUTATION TECHNIQUES

L T P C 3 0 0 3

INTRODUCTION History of Evolutionary computation – Genetic algorithm-Evolutionary strategy-Evolutionary programming- Derivative methods-Stochastic processes- Modes of stochastic convergence- Schema processing-Transform methods-Fitness land scale- Probably approximately correct(PAC)- Learning Analysis- Limitation of Evolutionary computation methods- Local performance measures. GENETIC ALGORITHM Robustness of Traditional optimization and search techniques - The goals of optimization - Genetic Algorithm - An Overview of GA – Genetic operators - GA in problem solving - Implementation - Applications. EVOLUTIONARY PROGRAMMING Introduction- Representation- Reproductive Operators- Objective- Population sizes and dynamics- Convergence and stopping criteria.

M.TECH INFORMATION TECHNOLOGY REGULATION 2015

25 KALASALINGAM UNIVERSITY

EVOLUTIONARY STRATEGIES Introduction- ES and Real Valued Parameter optimization problem- Self Adaptation- Exploiting Parallelism- Dynamic Landscape. HYBRID METHODS Hybridization of Genetic Algorithm (GA) with Artificial Neural Networks (ANN) , Fuzzy Logic (FL) and other Optimization methods like Particle Swarm Optimization (PSO) and Ant Colony Optimization(ACO)- Case Studies and Application. REFERENCES:

1. A.E. Eiben and J.E. Smith, “Introduction to Evolutionary Computing”, Springer, Natural Computing Series 1st edition, 2003,

2. J.S.R. Jang, C.T. Sun and E. Mizutani, “Neuro Fuzzy and Soft Computing”, PHI, 2008. 3. Timothy J.Ross, “Fuzzy Logic with Engineering Applications”, McGraw- Hill, 2010. 4. Kosko. B, “Neural Networks and Fuzzy Systems”, Prentice-Hall of India Pvt. Ltd., 2009. 5. Fogel, “Evolutionary Computation”, Prentice Hall India Publications, 2010.

INT5021 FAULT TOLERANT SYSTEMS L T P C 3 0 0 3

INTRODUCTION Fault Prevention -Fault tolerance – anticipated and unanticipated Faults- Test generation for digital systems- Combinational logic. Network Boolean difference method test generation for sequential circuits- fault simulation. ERROR MODEL General coding scheme – Parity checking code- arithmetic code – code for computer memories checking errors in logical operation – communication coding. FAULT TOLERANCE Coding technique-fault tolerant self checking and fail safe circuits-fault tolerant in combinatorial and sequential circuits- synchronous and asynchronous fail safe circuits. ARCHITECTURE Fault tolerant computers - general purpose commercial systems-fault tolerant multiprocessor and VLSI based communication architecture. FAULT TOLERANT SOFTWARE Design-N-version programming recovery block - acceptance tests-fault trees- validation of fault tolerant systems.

M.TECH INFORMATION TECHNOLOGY REGULATION 2015

26 KALASALINGAM UNIVERSITY

REFERENCES: 1. K.K.Pradhan, “Fault Tolerant Computing Theory and Techniques”, Volume III, PHI,

2008. 2. Anderson and Lee, “Fault Tolerant Principles and Practice”, PHI, 2008. 3. Parag K. Lala, “Fault Tolerant and Fault Testable, Hardware design”, PHI, 2009. 4. LALA, “Digital Systems Design Using PLD’s”, PHI, 2010. 5. N. N. Biswas, “Logic Design theory”, PHI, 2008. 6. Shem , Toy Levei , Ashok K Agarwala , “Fault Tolerant System design”, Tata McGraw

Hill , 2011.

INT5026 IMAGE PROCESSING AND PATTERN ANALYSIS

L T P C 3 0 0 3

INTRODUCTION Elements of an Image Processing System- Mathematical Preliminaries- Image Enhancement Grayscale Transformation- Piecewise Linear Transformation-Bit Plane Slicing- Histogram Equalization--Histogram Specification- Enhancement by Arithmetic Operations- Smoothing Filter- Sharpening Filter- Image Blur Types and Quality Measures. MATHEMATICAL MORPHOLOGY AND IMAGE SEGMENTATION Binary Morphology-Opening and Closing- Hit-or-Miss Transform- Grayscale Morphology- Basic morphological Algorithms- Morphological Filters-Thresholding-Object (Component) Labeling- Locating Object Contours by the Snake Model- Edge Operators-Edge Linking by Adaptive Mathematical morphology- Automatic Seeded Region Growing- A Top-Down Region Dividing Approach. IMAGE REPRESENTATION, DESCRIPTION AND FEATURE EXTRACTION Run-Length Coding- Binary Tree and Quadtree- Contour Representation-Skeletonization by Thinning- Medial Axis Transformation-Object Representation and Tolerance- Fourier Descriptor and Moment Invariants-Shape Number and Hierarchical Features-Corner Detection- Hough Transform-Principal Component Analysis-Linear Discriminate Analysis- Feature Reduction in Input and Feature Spaces. PATTERN RECOGNITION The Unsupervised Clustering Algorithm-Bayes Classifier- Support Vector Machine- Neural Networks-The Adaptive Resonance Theory Network-Fuzzy Sets in Image Analysis-Document image processing and classification-Block Segmentation and Classification- Rule-Based Character Recognition system- Logo Identification-Fuzzy Typographical Analysis for Character Pre classification-Fuzzy Model for Character Classification. APPLICATIONS Face and Facial Feature Extraction-Extraction of Head and Face Boundaries and Facial Features- Recognizing Facial Action Units-Facial Expression Recognition in JAFFE Database-Image Steganography- Types of Steganography- Applications of Steganography- Embedding Security

M.TECH INFORMATION TECHNOLOGY REGULATION 2015

27 KALASALINGAM UNIVERSITY

and Imperceptibility- Examples of Steganography Software-Genetic Algorithm Based Steganography. REFERENCES:

1. Frank Y Shih, “Image Processing and Pattern Recognition: Fundamentals and Techniques”, Willey IEEE Press, April 2010.

2. Rafael C. Gonzalez, Richard E. Woods, Steven Eddins, “Digital Image Processing using MATLAB”, Pearson Education, Inc., 2004.

3. D.E. Dudgeon and R.M. Mersereau, “Multidimensional Digital Signal Processing”, Prentice Hall Professional Technical Reference, 1990.

4. William K. Pratt, “Digital Image Processing”, John Wiley, New York, 2002.

INT5027 EMBEDDED COMPUTING SYSTEM DESIGNL T P C 3 0 0 3

EMBEDDED PROCESSORS Embedded Computers - Characteristics of Embedded Computing Applications - Challenges in Embedded Computing System Design - Embedded System Design Process- Formalism for System Design - Structural Description - Behavioural Description - ARM Processor – Intel ATOM Processor. EMBEDDED COMPUTING PLATFORM CPU Bus Configuration - Memory Devices and Interfacing - Input/Output Devices and Interfacing - System Design - Development and Debugging – Emulator – Simulator - JTAG Design Example – Alarm Clock - Analysis and Optimization of Performance - Power and Program Size. EMBEDDED NETWORK ENIVIRONMENT Distributed Embedded Architecture - Hardware And Software Architectures - Networks for Embedded Systems - I2C - CAN Bus - SHARC Link Supports – Ethernet – Myrinet – Internet - Network-based Design - Communication Analysis - System Performance Analysis – Hardware Platform Design - Allocation and Scheduling - Design Example - Elevator Controller. REAL-TIME CHARACTERISTICS Clock Driven Approach - Weighted Round Robin Approach - Priority Driven Approach – Dynamic versus Static Systems - Effective Release Times and Deadlines - Optimality of the Earliest Deadline First (EDF) Algorithm - Challenges in Validating Timing Constraints in Priority Driven Systems - Off-Line versus On-Line Scheduling. SYSTEM DESIGN TECHNIQUES Design Methodologies - Requirement Analysis – Specification - System Analysis and Architecture Design - Quality Assurance - Design Examples - Telephone PBX - Ink jet printer - Personal Digital Assistants - Set-Top Boxes.

M.TECH INFORMATION TECHNOLOGY REGULATION 2015

28 KALASALINGAM UNIVERSITY

REFERENCES: 1. Wayne Wolf, “Computers as Components: Principles of Embedded Computing System

Design”, Morgan Kaufman Publishers. 2. Jane.W.S. Liu, “Real-Time systems”, Pearson Education Asia. 3. C. M. Krishna and K. G. Shin, “Real-Time Systems” , McGraw-Hill, 1997 4. Frank Vahid and Tony Givargis, “Embedded System Design: A Unified

Hardware/Software Introduction”, John Wiley & Sons. 5. Andrew N Sloss, D. Symes, C. Wright, “Arm system developers guide”, Morgan

Kauffman/ Elsevier, 2006.

INT5028 NETWORK AND INFORMATION SECURITY

L T P C 3 0 0 3

INTRODUCTION An Overview of Computer Security-Security Services-Security Mechanisms-Security Attacks- Access Control Matrix, Policy-Security policies, Confidentiality policies, Integrity policies and Hybrid policies. CRYPTOSYSTEMS & AUTHENTICATION Classical Cryptography-Substitution Ciphers-permutation Ciphers-Block Ciphers-DES- Modes of Operation- AES-Linear Cryptanalysis, Differential Cryptanalysis- Hash Function - SHA 512- Message Authentication Codes-HMAC - Authentication Protocols PUBLIC KEY CRYPTOSYSTEMS Introduction to Public key Cryptography- Number theory- The RSA Cryptosystem and Factoring Integer- Attacks on RSA-The ELGamal Cryptosystem- Digital Signature Algorithm-Finite Fields- Elliptic Curves Cryptography- Key management – Session and Interchange keys, Key exchange and generation-PKI SYSTEM IMPLEMENTATION Design Principles, Representing Identity, Access Control Mechanisms, Information Flow and Confinement Problem. Secure Software Development: Secured Coding - OWASP/SANS Top Vulnerabilities – Buffer Overflows - Incomplete mediation - XSS - Anti Cross Site Scripting Libraries - Canonical Data Format - Command Injection - Redirection - Inference – Application Controls NETWORK SECURITY Secret Sharing Schemes-Kerberos- Pretty Good Privacy (PGP)-Secure Socket Layer (SSL)- Intruders – HIDS- NIDS - Firewalls - Viruses REFERENCES:

1. William Stallings, “Cryptography and Network Security: Principles and Practices”, Third Edition, Pearson Education, 2006.

M.TECH INFORMATION TECHNOLOGY REGULATION 2015

29 KALASALINGAM UNIVERSITY

2. Matt Bishop ,“Computer Security art and science ”, Second Edition, Pearson Education, 2002.

3. Wade Trappe and Lawrence C. Washington, “Introduction to Cryptography with Coding Theory”, Second Edition, Pearson Education, 2007.

4. Jonathan Katz, and Yehuda Lindell, “Introduction to Modern Cryptography”, CRC Press, 2007.

5. Douglas R. Stinson, “Cryptography Theory and Practice”, Third Edition, Chapman & Hall/CRC, 2006.

6. Wenbo Mao, “Modern Cryptography – Theory and Practice”, Pearson Education, First Edition, 2006.

7. Menezes Bernard, “Network Security and Cryptography”, Cengage Learning, New Delhi, 2011.

8. Man Young Rhee, “Internet Security”, Wiley, 2003.

INT5029 DATA WAREHOUSING AND DATA MINING L T P C 3 0 0 3

DATA WAREHOUSE Data Warehousing - Operational Database Systems vs. Data Warehouses – Multidimensional Data Model - Schemas for Multidimensional Databases – OLAP Operations – Data Warehouse Architecture – Indexing – OLAP queries & Tools. DATA MINING & DATA PREPROCESSING Introduction to KDD process – Knowledge Discovery from Databases - Need for Data Preprocessing – Data Cleaning – Data Integration and Transformation – Data Reduction – Data Discretization and Concept Hierarchy Generation. ASSOCIATION RULE MINING Introduction - Data Mining Functionalities - Association Rule Mining - Mining Frequent Itemsets with and without Candidate Generation - Mining Various Kinds of Association Rules - Constraint- Based Association Mining. CLASSIFICATION & PREDICTION Classification vs. Prediction – Data preparation for Classification and Prediction – Classification by Decision Tree Introduction – Bayesian Classification – Rule Based Classification – Classification by Back Propagation – Support Vector Machines – Associative Classification – Lazy Learners – Other Classification Methods – Prediction – Accuracy and Error Measures – Evaluating the Accuracy of a Classifier or Predictor – Ensemble Methods – Model Section. CLUSTERING Cluster Analysis: - Types of Data in Cluster Analysis – A Categorization of Major Clustering Methods – Partitioning Methods – Hierarchical methods – Density-Based Methods – Grid-Based Methods – Model-Based Clustering Methods – Clustering High- Dimensional Data – Constraint- Based Cluster Analysis – Outlier Analysis.

M.TECH INFORMATION TECHNOLOGY REGULATION 2015

30 KALASALINGAM UNIVERSITY

REFERENCES: 1. Jiawei Han and Micheline Kamber, “Data Mining Concepts and Techniques” Second

Edition, Elsevier, Reprinted 2008. 2. K.P. Soman, Shyam Diwakar and V. Ajay, “Insight into Data mining Theory and

Practice”, Easter Economy Edition, Prentice Hall of India, 2006. 3. G. K. Gupta, “Introduction to Data Mining with Case Studies”, Easter Economy Edition,

Prentice Hall of India, 2006. 4. A Pang-Ning Tan, Michael Steinbach and Vipin Kumar, “Introduction to Data Mining”,

Pearson Education, 2007.

INT6001 SOFT COMPUTING L T P C 3 0 0 3

INTRODUCTION TO SOFT COMPUTING Evolution of Computing - Soft Computing Constituents – From Conventional AI to Computational Intelligence - Machine Learning Basics GENETIC ALGORITHMS Introduction, Building block hypothesis, working principle, Basic operators and Terminologies like individual, gene, encoding, fitness function and reproduction, Genetic modeling: Significance of Genetic operators, Inheritance operator, cross over, inversion & deletion, mutation operator, Bitwise operator, GA optimization problems, JSPP (Job Shop Scheduling Problem), TSP (Travelling Salesman Problem),Differences & similarities between GA & other traditional methods, Applications of GA. NEURAL NETWORKS Machine Learning using Neural Network, Adaptive Networks – Feed Forward Networks – Supervised Learning Neural Networks – Radial Basis Function Networks – Reinforcement Learning – Unsupervised Learning Neural Networks – Adaptive Resonance Architectures – Advances in Neural Networks. FUZZY LOGIC Fuzzy Sets – Operations on Fuzzy Sets – Fuzzy Relations – Membership Functions-Fuzzy Rules and Fuzzy Reasoning – Fuzzy Inference Systems – Fuzzy Expert Systems – Fuzzy Decision Making NEURO-FUZZY MODELING Adaptive Neuro-Fuzzy Inference Systems – Coactive Neuro-Fuzzy Modeling – Classification and Regression Trees – Data Clustering Algorithms – Rule base Structure Identification – Neuro-Fuzzy Control – Case Studies.

M.TECH INFORMATION TECHNOLOGY REGULATION 2015

31 KALASALINGAM UNIVERSITY

REFERENCES: 1. Jyh-Shing Roger Jang, Chuen-Tsai Sun, Eiji Mizutani, “Neuro-Fuzzy and Soft

Computing”, Prentice-Hall of India, 2003. 2. Kwang H.Lee, “First course on Fuzzy Theory and Applications”, Springer–Verlag Berlin

Heidelberg, 2005. 3. George J. Klir and Bo Yuan, “Fuzzy Sets and Fuzzy Logic-Theory and Applications”,

Prentice Hall, 1995. 4. James A. Freeman and David M. Skapura, “Neural Networks Algorithms, Applications,

and Programming Techniques”, Pearson Edn., 2003. 5. David E. Goldberg, “Genetic Algorithms in Search, Optimization and Machine

Learning”, Addison Wesley, 2007. 6. Mitsuo Gen and Runwei Cheng, “Genetic Algorithms and Engineering Optimization”,

Wiley Publishers, 2000. 7. Mitchell Melanie, “An Introduction to Genetic Algorithm”, Prentice Hall, 1998. 8. S.N.Sivanandam, S.N.Deepa, “Introduction to Genetic Algorithms”, Springer, 2007. 9. A.E. Eiben and J.E. Smith, “Introduction to Evolutionary Computing” Springer, 2003. 10. E. Sanchez, T. Shibata, and L. A. Zadeh, Eds., "Genetic Algorithms and Fuzzy Logic

Systems: Soft Computing Perspectives, Advances in Fuzzy Systems - Applications and Theory", Vol. 7, River Edge, World Scientific, 1997.

11. Ross Timothy J, “Fuzzy Logic with Engineering Applications”, Wiley India Pvt Ltd, New Delhi, 2010.

INT6002 GRID COMPUTING L T P C 3 0 0 3

INTRODUCTION Parallel and Distributed Computing - Cluster Computing - Grid Computing Anatomy and Physiology of Grid - Web and Grid Services. FRAMEWORK Architecture – Implementation of Grid Architecture – Grid Services OGSI, OGSA, WSRF –Grid Resource and Service Management –Resource Management Framework – Service Negotiation and Acquisition Protocol – Layers of Grid Computing – Building Reliable Services – Grid Monitoring – Sensors and Sensor Management - Grid Security – WS Security – GSI. DATA AND KNOWLEDGE GRID Data Source – Collective Data Services - Data Management – Collective Data Management – Federation Services – Representing Knowledge – Processing Knowledge - Knowledge Oriented Grid. GRID MIDDLEWARE List of Globally Available Toolkits – GT3 – Architecture Details – Grid Service Container – OGSI Implementation – Security Infrastructure - System Level Services – Hosting Environments- Programming Model.

M.TECH INFORMATION TECHNOLOGY REGULATION 2015

32 KALASALINGAM UNIVERSITY

APPLICATIONS Scientific – Medical – Bioinformatics – Federated Computing – ERM – Multiplayer Games - Collaborative Science – Case Study. REFERENCES:

1. Ian Foster, Carl Kesselman, “The Grid 2: Blueprint for a New Computing Infrastructure”, Elsevier Series, Second edition, 2006.

2. Srikumar Venugopal, Krishna Nadiminti, Hussein Gibbins and Rajkumar Buyya, “Designing a Resource Broker for Heterogeneous Grids, Software: Practice and Experience”, Wiley Press, New York, USA, 2008.

3. Fran Berman, Geoffrey Fox, Anthony J.G. Hey, “Grid Computing: Making the Global Infrastructure a Reality”, Wiley, 2003.

4. Maozhen Li, Mark Baker, “The Grid: Core Technologies”, Wiley, 2005.

INT6004 REAL TIME SYSTEMS L T P C 3 0 0 3

TYPES & ISSUES Real time Definitions - Types - Examples - Structure of an RTS - Task classes Real - time system issues - Architecture issues - OS issues - other issues - Performance measure for real - time systems. REAL TIME LANGUAGES Programming languages and tools - Language features - survey of commonly used programming languages - programming environments - run - time support Real - Time Systems life cycle - Real - time Specification and Design Techniques Natural languages - mathematical specification - Flow charts - structure charts - Pseudo code and PDL - FSA - DFD - Petri Nets - Warnier - Orr notation - state charts. SCHEDULING ALGORITHMS Real - Time OS Task - control block model - Task states - Task management - POSIX. Task assignment and scheduling classical uniprocessor scheduling Algorithms - Task assignment - Fault Tolerance scheduling. FAULT TOLERANT SYSTEMS Real-time communication Network Topologies - Protocols - Reliability - Testing and Fault Tolerance - Faults - Failures - Bugs and effects - reliability - Testing - Fault Tolerance. FUTURE APPLICATIONS Real - Time Applications - The first real - time application - Real - time database - real - time image processing - real-time UNIX.

M.TECH INFORMATION TECHNOLOGY REGULATION 2015

33 KALASALINGAM UNIVERSITY

REFERENCES: 1. C.M. Krishna, Kang G. Shin, “Real – Time Systems”, McGraw – Hill International

Editions, 1997. 2. Rajib Mall, ”Real-time Systems: Theory and Practice”, Pearson Education, 2007 3. Peter D.Lawrence, “Real Time Micro Computer System Design – An Introduction”,

McGraw Hill, 1988. 4. Phillip A. Laplante., “Real Time Systems Hand book”, Prentice Hall of India Pvt.

Ltd., 3rd Edition, 2009. 5. C.M. Krishna. Kang G. Shin , “Real Time Systems”, 3RD Edition Tata McGraw Hill

International, 2010.

INT6005 NEURAL NETWORKS AND ITS APPLICATIONS

L T P C 3 0 0 3

ARTIFICIAL NEURAL NETWORKS Neuro-physiology - General Processing Element - ADALINE - LMS learning rule - MADALINE - MR2 training algorithm. BPN AND BAM Back Propagation Network - updating of output and hidden layer weights - Application of BPN - Associative memory - Bi-directional Associative Memory - Hopfield memory - traveling sales man problem. SIMULATED ANNEALING AND CPN Annealing - Boltzmann machine learning - Application - Counter Propagation network - architecture - Training - Applications. SOM AND ART Self-organizing map- Learning algorithm- Feature map classifier- Applications- Architecture of Adaptive Resonance Theory - Pattern matching in ART network. NEOCOGNITRON Architecture of Neocognitron - Data processing and performance of architecture of spacio - temporal networks for speech recognition. REFERENCES:

1. M. Ananda Rao, J. Srinivas, “Neural Networks : Algorithms and Applications”, Alpha Science International, 2009.

2. Laurene Fausett, “Fundamentals of Neural Networks: Architecture, Algorithms and Applications”, 2nd Edition, Prentice Hall, 2008.

3. Freeman J.A. and Skapura B.M., “Neural Networks, Algorithms Applications and Programming Techniques”, Addison-Wesely, 2010.

M.TECH INFORMATION TECHNOLOGY REGULATION 2015

34 KALASALINGAM UNIVERSITY

INT6011 ADVANCED JAVA PROGRAMMING L T P C 3 0 0 3

JAVA FUNDAMENTALS Java I/O streaming – filter and pipe streams – Byte Code interpretation - Threading – Swing. NETWORK PROGRAMMING IN JAVA Sockets – secure sockets – custom sockets – UDP datagrams – multicast sockets – URL classes – Reading Data from the server – writing data – configuring the connection – Reading the header – telnet application – Java Messaging services APPLICATIONS IN DISTRIBUTED ENVIRONMENT Remote method Invocation – activation models – RMI custom sockets – Object Serialization – RMI – IIOP implementation – CORBA – IDL technology – Naming Services – CORBA programming Models - JAR file creation MULTI-TIER APPLICATION DEVELOPMENT Server side programming – servlets – Java Server Pages - Applet to Applet communication – applet to Servlet communication - JDBC – Applications on databases – Multimedia streaming applications – Java Media Framework. ENTERPRISE APPLICATIONS Server Side Component Architecture – Introduction to J2EE – Session Beans – Entity Beans – Persistent Entity Beans . REFERENCES:

1. Elliotte Rusty Harold, “Java Network Programming”, O’Reilly publishers, 2000. 2. Ed Roman, “Mastering Enterprise Java Beans”, John Wiley & Sons Inc., 1999. 3. Hortsmann & Cornell, “CORE JAVA 2 ADVANCED FEATURES”, Vol II, Pearson

Education, 2002. 4. Web reference: http://java.sun.com. 5. Patrick Naughton, “COMPLETE REFERENCE: JAVA2”, Tata McGraw-Hill, 2003.

INT6012 MATLAB PROGRAMMING L T P C 3 0 0 3

THE MATLAB WORKING ENVIRONMENT AND BASIC FEATURES The MATLAB Desktop – Using the MATLAB’S Editor to create M – Files – Getting Help – Saving and Retrieving a Work Session. Simple Math – The MATLAB workspace – About Variables – Comments, Punctuation and Aborting Execution, Complex Numbers – Floating Point Arithmetic – Mathematical Functions – Numeric Data types – Operators – Relational Operators – Logical Operators – Operator Precedence

M.TECH INFORMATION TECHNOLOGY REGULATION 2015

35 KALASALINGAM UNIVERSITY

ARRAY AND ARRAY OPERATIONS Simple Arrays – Array Addressing or Indexing – Array Construction – Array Orientation – Array manipulations – Array Sorting – Array Functions – Array Size – Arrays and Memory Utilizations – Multidimensional Arrays CELL ARRAYS AND STRUCTURES Cell Array Creation – Cell Array Manipulation – Retrieving Cell Array Content, Comma with Separated Lists – Cell Functions – Cell Arrays of Strings – Structure Creation – Structure Manipulation – Retrieving Structure Content- Comma with Separeted Lists – Structure Functions CHARACTER STRINGS AND CONTROL FLOW String Construction – Numbers to Strings to Numbers – String Evaluations – String Functions – Cell Array of Strings – Searching with Regular Expressions. For Loops – While Loops – if-else-end Constructions – Switch Case Constructions – Try – Catch blocks FUNCTIONS FILE AND DIRECTORY MANAGEMENT M-File Function – Construction Rules – Input and Output Arguments – Function Workspace – Function & MATLAB Search Path – Creating your own Tool Box – Command – Function Durability – Function Handles and Anonymous Functions – Nested Functions. Native Data Files – Data Import and Export – Low Level File I/O – Directory Management FTP Operations. REFERENCES:

1. Duane Hansel man and Bruce little field, “Mastering MATLAB”, Pearson Education, 2008.

2. Rudra Pratap, “Getting Started with MATLAB”, Oxford University Press, 2009. 3. Stephen J. Chapman, “Matlab Programming for Engineers”, ISBN: 9780534390563,

Thomson Learning, 2010. 4. Rafael C. Gonzalez, Richard E. Woods, Steven L. Eddins, “Digital Image Processing

using MATLAB”, Pearson Education 2008. 5. Dr.Partha S. Mallick, “MATLAB and Simulink”, SCITECH Publications India Pvt. Ltd.,

2008.

INT6016 WIRELESS SECURITY L T P C 3 0 0 3

WIRELESS THREATS Introduction to wireless technologies-Wireless security challenges-Kinds of security breaches- Vulnerability analysis-Eavesdropping-Communication Jamming - RF interference –Covert wireless channels –DOS attack - Spoofing-Theft of services- Wi Fi Cyber crimes and need for awareness- Countermeasures -Wireless security Standards.

M.TECH INFORMATION TECHNOLOGY REGULATION 2015

36 KALASALINGAM UNIVERSITY

CRYPTOGRAPHY Encryption and Decryption- Product ciphers-AES (advanced Encryption Standard)- Pseudorandom number Generator-Stream ciphers A5, RC4-Public key cryptography-ECC (Elliptic Curve Cryptography) – Need for Authentication-Cryptographic threats-Cryptography in Embedded Hardware. WIRELESS LOCAL AREA NETWORK Introduction WLAN –Transmission Media- WLANS Threats- Countermeasures-WEP (wired Equivalence Protocol)-Bluetooth security. SECURITY IN WIRELESS DATA NETWORKS Wireless Device security issues- CDPD security (Cellular Digital Packet Data)-GPRS security (General Packet Radio Service)-GSM (Global System for Mobile Communication) security –IP security. WIRELESS TRANSPORT LAYER SECURITY (WTLS) Secure Socket Layer-Wireless Transport Layer Security-WAP Security Architecture-WAP Gateway. REFERENCES:

1. Maxim Merritt and David Pollino, “Wireless Security”, McGraw Hill , 2002. 2. Randall K. Nichols, Panos C. Lekkas , “Wireless Security-Models, Threats and

Solutions”, Mcgraw – Hill, 2002. 3. Nicolas Sklavos, Xinmiao Zhang, “Wireless Security and Cryptography: Specifications

and Implementations”, CRC press, 2007. 4. A.Forouzan, “Cryptography and Network Security, Principles and Practices”, McGraw

Hill , 2007. 5. Brian carter russell shumway, “Wireless Security End to End”, John Wiley & Sons , 2002 6. Chris Hurley, Michael Puchol, Russ Rogers and Frank Thornton, “WarDriving: Drive,

Detect, Defend, A Guide to Wireless Security”, Syngress, 2004 .

INT6017 ADVANCED SOFTWARE ARCHITECTURE L T P C 3 0 0 3

INTRODUCTION TO SOFTWARE ARCHITECTURE Introduction - Software architecture - An Engineering discipline for software - Status of software architecture - Architectural styles - pipes and filters - Layered Systems - Repositories - Process control - Other familiar architectures - Heterogeneous architectures INTEGRATION OF SHARED INFORMATION SYSTEMS Shared information systems - DB integration - Integration in software development environments - Integration in the design of Buildings - Architectural structures for shared information systems.

M.TECH INFORMATION TECHNOLOGY REGULATION 2015

37 KALASALINGAM UNIVERSITY

DESIGN OF USER INTERFACE ARCHITECTURE Guidance for user interface architectures - Quantified design space - formal models and specifications - requirements for architecture - description languages - First class connectors - Adding implicit invocation to traditional programming languages. SOFTWARE DESIGN Design process- Software Design Process – Design in Software development Process – Design Qualities – Expressing ideas about a Design – some Design Representations Rational for method. - Design strategies- Top down and bottom up strategies for design. DESIGN MODELS Structured Systems Analysis and Structured Design – SSA/SD Process – extended forms of SSA/SD , Object-Oriented and Object-based design –Hierarchical Object Oriented Design – Architectural design and mapping - Round trip Engineering - Architectural design patterns – object oriented design patterns- Design for Real time Systems. REFERENCES:

1. Mary Shaw, David Garlan, “Software Architecture perspectives on an Emerging Discipline”, EEE, PH1, 2008.

2. David Budgen, " Software Design ", Addison-Wesley, 2009. 3. Roger S. Pressmann, “Software Engineering - A practioner's Approach”, 7th Edition,

McGraw-Hill Higher Education, 2010. 4. Stephen T. Albin , “The Art of Software Architecture” , Wiley Dreamtech 2010.

INT6018 QUANTUM COMPUTING L T P C 3 0 0 3

FUNDAMENTAL CONCEPTS Global Perspectives, Quantum Bits, Quantum Computation, Quantum Algorithms, Quantum Information, Postulates of Quantum Mechanisms. QUANTUM COMPUTATION Quantum Circuits – Quantum algorithms, Single Orbit operations, Control Operations, Measurement, Universal Quantum Gates, Simulation of Quantum Systems, Quantum Fourier transform, Phase estimation, Applications, Quantum search algorithms – Quantum counting – Speeding up the solution of NP – complete problems – Quantum Search for an unstructured database. QUANTUM COMPUTERS Guiding Principles, Conditions for Quantum Computation, Harmonic Oscillator Quantum Computer, Optical Photon Quantum Computer – Optical cavity Quantum electrodynamics, Ion traps, Nuclear Magnetic resonance.

M.TECH INFORMATION TECHNOLOGY REGULATION 2015

38 KALASALINGAM UNIVERSITY

QUANTUM INFORMATIONS Quantum noise and Quantum Operations – Classical Noise and Markov Processes, Quantum Operations, Examples of Quantum noise and Quantum Operations – Applications of Quantum operations, Limitations of the Quantum operations formalism, Distance Measures for Quantum information. QUANTUM ERROR CORRECTION Introduction, Shor code, Theory of Quantum Error –Correction, Constructing Quantum Codes, Stabilizer codes, Fault – Tolerant Quantum Computation, Entropy and information – Shannon Entropy, Basic properties of Entropy, Von Neumann, Strong Sub Additivity, Data Compression, Entanglement as a physical resource. REFERENCES:

1. Micheal A. Nielsen. & Issac L. Chiang, “Quantum Computation and Quantum Information”, Cambridge University Press, Fint South Asian edition, 2008.

2. Phillip Kaye, Raymond Laflamme and Michele Mosca, “An Introduction to Quantum Computation”, Oxford University Press, 2008.

3. D. Bouwmeester, "The Physics of Quantum Information", Springer, 2010. 4. H.K. Lo, T. Spiller, S. Popescu, "Introduction to Quantum Computation and

Information", World Scientific, 2008. 5. G. P. Berman, "Introduction to Quantum Computers", World Scientific, 2010. 6. Mika Hirvensalo, "Quantum Computing", Springer, 2004. 7. Ranee K. Brylinski and Goong Chen, "Mathematics of Quantum Computation",

Chapman & Hall/CRC, 2002. 8. D. Brub and G Leuchs, "Lectures on Quantum Information", John Wiley and Sons Ltd,

2006. 9. G.V. Assche, "Quantum Cryptography and Secret-Key Distillation", Cambridge

University Press, 2006. 10. M. Le Bellac, "A Short Introduction to Quantum Information and Quantum

Computation", Cambridge University Press, 2010. 11. A.O. Pittenger, "An Introduction to Quantum Computing Algorithms", Birkhauser, 2009.

INT6020 INFORMATION RETRIEVAL L T P C 3 0 0 3

INTRODUCTION Introduction - Goals and History of IR - The Impact of the Web on IR - The Role of Artificial Intelligence (AI) in IR - Basic IR Models - Boolean and Vector-Space Retrieval Models – Ranked Retrieval - Text-Similarity Metrics - TF-IDF (Term Frequency/Inverse Document Frequency) Weighting - Cosine Similarity.

M.TECH INFORMATION TECHNOLOGY REGULATION 2015

39 KALASALINGAM UNIVERSITY

PREPROCESSING Basic Tokenizing Indexing and Implementation of Vector-Space Retrieval - Simple Tokenizing - Stop-Word Removal and Stemming - Inverted Indices - Efficient Processing with Sparse Vectors - Query Operations and Languages - Relevance Feedback - Query Expansion - Query Languages. METRICS Experimental Evaluation of IR - Performance Metrics – Recall - Precision and F Measure - Evaluations on Benchmark Text Collections - Text Representation - Word Statistics - Zipf's Law - Porter Stemmer – Morphology - Index Term Selection - Using Thesauri - Metadata and Markup Languages - Web Search - Search Engines – Spidering – Metacrawlers - Directed Spidering – Link Analysis Shopping Agents. CATEGORIZATION AND CLUSTERING Text Categorization and Clustering - Categorization Algorithms - Naive Bayes - Decision Trees and Nearest Neighbor - Clustering Algorithms - Agglomerative Clustering - K-Means – Expectation Maximization (EM) - Applications to Information Filtering – Organization and Relevance Feedback. EXTRACTION AND INTEGRATION Recommender Systems - Collaborative Filtering and Content-Based Recommendation of Documents and Products Information Extraction and Integration - Extracting Data from Text – XML - Semantic Web - Collecting and Integrating Specialized Information on the Web. REFERENCES:

1. Christopher D. Manning, Prabhakar Raghavan and Hinrich Schütze, “Introduction to Information Retrieval”, Cambridge University Press, 2008.

2. Ricci, F, Rokach, L. Shapira, B.Kantor, “Recommender Systems Handbook”, First Edition, 2011.

3. Brusilovsky, Peter, “The Adaptive Web: Methods and Strategies of Web Personalization”, Springer, 2007.

INT6022 GREEN COMPUTING L T P C 3 0 0 3

INTRODUCTION Energy- efficient – power efficient and thermal aware computing and communication - Newton’s cooling model and basic thermodynamics and sustainability. POWER MANAGEMENT Operating system Directed power management – Power management history and motivation – key power management concepts – power management scenarios – ACPI desktop motherboard design

M.TECH INFORMATION TECHNOLOGY REGULATION 2015

40 KALASALINGAM UNIVERSITY

DEVELOPMENT OF EFFICIENT POWER MANAGEMENT SYSTEM Dual mode desktop power delivery – system BIOS – Designing mobile systems – Communication with peripheral devices – Drivers – Developing robust power managed applications ENERGY EFFICIENT DATA CENTER Data center power consumption – Power metrics – Energy efficient data center tuning – energy efficient server management – Industry vision and recommendations CASE STUDIES AND APPLICATION Google green datacenter - IBM green technology - Microsoft – Case Studies – Applying Green IT Strategies and Applications to a Home – Hospital - Packaging Industry and Telecom Sector. REFERENCES:

1. Jerzy Kolinski, Ram Chary, Andrew Henroid, and Barry Press, “Building the Power-Efficient PC A Developer's Guide to ACPI Power Management”, Intel Press August 2001.

2. Lauri Minas, Brad Ellison, “Energy Efficiency for Information Technology: How to Reduce Power Consumption in Servers and Data Centers”, Intel Press, 2009.

3. Bhuvan Unhelkar, “Green IT Strategies and Applications-Using Environmental Intelligence”, CRC Press, June 2011.

4. Wu Chun Feng, “Green Computing: Large-Scale Energy Efficiency”, CRC Press INC, 2013.

INT6023 3G AND 4G WIRELSS NETWORKS L T P C 3 0 0 3

INTRODUCTION Introduction: History of Mobile Cellular Systems - First Generation - Second Generation - Generation 2.5 - Overview of 3G & 4G. 3GPP and 3GPP2 standards 3G NETWORKS Evolution from GSM, 3G Services and Applications - UMTS network structure - Core network - UMTS Radio access - HSPA – HSUPA- HSDPA- CDMA 1X - EVDO Rev -0, Rev-A, Rev-B, Rev-C Architecture- Protocol stack. 4G LTE NETWORKS LTE: Introduction, Radio interface architecture - Physical layer, Access procedures – System Architecture Evolution (SAE) - Communication protocols – Interfaces. WIMAX NETWORKS Introduction – IEEE 802.16 – Frame Format – Protocols - OFDM – MIMO - IEEE 802.20- Applications.

M.TECH INFORMATION TECHNOLOGY REGULATION 2015

41 KALASALINGAM UNIVERSITY

DLNA & NFC REVOLUTION Introduction and Evolution - Applications of DLNA and NFC - DLNA Architecture and Protocol stack - Smart phone and NFC – Mobile Commerce and NFC – NFC tags –Security Issues. REFERENCES:

1. Juha Korhonen, “Introduction to 3G Mobile Communication”, Artech House, 2003. 2. Erik Dahlman, Stefan Parkvall, Johan Skold and Per Beming , “3G Evolution HSPA and

LTE for Mobile Broadband”, Academic Press, 2008. 3. Flavio Muratore, “UMTS Mobile Communication for the Future”, John Wiley & Sons ,

2001. 4. Harri Holma and Antti Toskala, “HSDPA/HSUPA for UMTS”, Johan Wiley & Sons,

2006.

INT6024 DIGITAL VIDEO PROCESSING L T P C 3 0 0 3

FUNDAMENTALS OF VIDEO PROCESSING Video Formation, Perception and Representation - Video Capture and Display – Principles of Color Video - Video Cameras – Video Display and Composite versus Component Models and Gamma Correction – Analog Video Raster – Progressive vs Interlaced scans – Characterization of Video Raster – Spatial and Temporal resolution – Signal Bandwidth. DIGITAL VIDEO Multiplexing of Luminance – Chrominance and Audio – Digital Video – Notation – ITU– R.BT.601 Digital Video Format and Other Digital Video Formats and Applications - Digital Video Quality - Video Sampling – Basics of the Lattice Theory – Sampling of Video Signals over Lattices – Filtering Operations in Cameras and Display Devices – Camera Apertures – Display apertures. VIDEO SEGMENTATION AND VIDEO FEATURE ANALYSIS Video Modeling – Camera Models – Pinhole Model – Object Model – Shape Model, Motion Model – Scene Model - Two Dimensional Motion Models – Definition and Notation – Two Dimensional Motion Models Corresponding to Typical Camera Motions – Two Dimensional Motion Corresponding to Three Dimensional Rigid Motion and Approximation of Projective Mapping. MOTION ESTIMATION Two Dimensional Motion Estimation – Optical Flow – Two Dimensional Motion versus Optical Flow - Optical Flow Equation and Ambiguity in Motion Estimation - General Methodologies – Motion Representation - Motion Estimation Criteria – Optimization Methods - Pixel Based Motion Estimation - Regularization Using the Motion Smoothness Constraints – Block Matching Algorithm – Exhaustive Block Matching Algorithm – Phase Correlation Method and

M.TECH INFORMATION TECHNOLOGY REGULATION 2015

42 KALASALINGAM UNIVERSITY

ultiresolution Motion Estimation – General Formulation and Hierarchical Block Matching Algorithm. DIGITAL VIDEO ANALYSIS AND CASE STUDIES Digital video analysis – Basic Algorithms – Object Tracking and analysis – Video classification and Recognition– Video Understanding – Case Studies in Object tracking. REFERENCES:

1. Murat Teal, "Digital Video Processing", Pearson Education, 2010. 2. Alan Bovik C, “The Essential Guide to Video Processing”, Academic Press Inc, 2009. 3. David Bull et al, "Video Coding for Mobile Communications", Academic Press, 2008. 4. Oge Marques, “Practical Image and Video processing using Matlab”, IEEE Press, 2011.

INT6025 WEB MINING L T P C 3 0 0 3

INTRODUCTION Overview of Data mining – Data mining from a Business Perspective – Data types, Input and output of data mining algorithms- Decision Tree- Classification and Regression Trees – Preprocessing and Post processing in Data mining INFORMATION RETRIEVAL Information Retrieval and Text Mining - Keyword Search - Nearest-Neighbor Methods – Measuring Similarity - Web-Based Document Search - Document–Matching - Inverted Lists - Evaluation of Performance - Structure in a Document Collection - Clustering Documents by Similarity- Evaluation of Performance - Information Extraction - Patterns and Entities from Text- Co reference and Relationship Extraction - Template Filling and Database Construction WEB SEARCH Crawling the web – HTML and HTTP Basics – Crawling Basics – Engineering Large Scale Crawlers- Putting together a Crawler- Boolean Queries and the Inverted Index – Relevance Ranking – Similarity Search LEARNING Similarity and Clustering – Formulations and approaches- Bottom up and Top down Partitioning Paradigms – Clustering and Visualization via Embeddings – Probabilistic Approaches to clustering – Collaborative Filtering – Supervised Learning – Semi Supervised Learning APPLICATIONS Social Network Analysis- Social Sciences and Bibliometry – Page Rank and HITS – Short comings of coarse Grained Graph model- Enhanced Models and Techniques- Evaluation of Topic Distillation- Measuring and Modeling the Web – Resource Discovery – Collecting

M.TECH INFORMATION TECHNOLOGY REGULATION 2015

43 KALASALINGAM UNIVERSITY

Important Pages Preferentially – Similarity Search Using Link Topology – Topical Locality and Focused Crawling – Discovering Communities- The Future of Web Mining. REFERENCES:

1. Sholom Weiss, “Text Mining: Predictive Methods for Analyzing Unstructured Information”, Springer, 2005.

2. Hercules Antonio do Prado, Edilson Fernada, “ Emerging Technologies of Text Mining: Techniques and Applications”, Information Science Reference (IGI), 2008.

3. Min Song, Yi-fang Brrok Wu, “Handbook of Research on Text and Web Mining Technologies”, Vol I & II, Information Science Reference (IGI),2009.

4. Soumen Chakrabarti, “ Mining the Web : Discovery Knowledge from Hypertext Data”, Elsevier Science 2003.

5. K.P.Soman,Shyam Diwakar, V.Ajay “ Insight into Data Mining Theory and Practice”, Prentice Hall of India Private Ltd 2006.

6. Anthony Scime, “Web Mining Applications and Techniques”, Idea Group Publishing, 2005.

7. Margret H.Dunham “DATA MINING - Introductory and Advanced Concepts”, Pearson Education,2003.

8. R. Kosala and H. Blockeel, “Web Mining Research: A Survey”, SIGKDD Exploration, vol. 2, issue 1, 2000.

9. J. Srivastava et al, “Web Usage Mining: Discovery and Applications of Usage Patterns from Web Data”, SIGKDD Exploration, vol. 2, issue 1, 1999.

INT6026 SOCIAL NETWORK ANALYSIS L T P C 3 0 0 3

INTRODUCTION Introduction to Web - Limitations of current Web – Development of Semantic Web – Emergence of the Social Web – Statistical Properties of Social Networks -Network analysis - Development of Social Network Analysis - Key concepts and measures in network analysis - Discussion networks - Blogs and online communities - Web-based networks. MODELING AND VISUALIZATION Visualizing Online Social Networks - A Taxonomy of Visualizations - Graph Representation - Centrality- Clustering - Node-Edge Diagrams - Visualizing Social Networks with Matrix-Based Representations- Node-Link Diagrams - Hybrid Representations - Modelling and aggregating social network data – Random Walks and their Applications –Use of Hadoop and Map Reduce - Ontological representation of social individuals and relationships. MINING COMMUNITIES Aggregating and reasoning with social network data, Advanced Representations – Extracting evolution of Web Community from a Series of Web Archive - Detecting Communities in Social

M.TECH INFORMATION TECHNOLOGY REGULATION 2015

44 KALASALINGAM UNIVERSITY

Networks - Evaluating Communities – Core Methods for Community Detection & Mining - Applications of Community Mining Algorithms - Node Classification in Social Networks. EVOLUTION Evolution in Social Networks – Framework - Tracing Smoothly Evolving Communities – Models and Algorithms for Social Influence Analysis - Influence Related Statistics - Social Similarity and Influence - Influence Maximization in Viral Marketing - Algorithms and Systems for Expert Location in Social Networks - Expert Location without Graph Constraints - with Score Propagation – Expert Team Formation - Link Prediction in Social Networks - Feature based Link Prediction – Bayesian Probabilistic Models - Probabilistic Relational Models TEXT AND OPINION MINING Text Mining in Social Networks -Opinion extraction – Sentiment classification and clustering - Temporal sentiment analysis - Irony detection in opinion mining - Wish analysis – Product review mining – Review Classification – Tracking sentiments towards topics over time. REFERENCES:

1. Charu C. Aggarwal, “Social Network Data Analytics”, Springer; 2011. 2. Peter Mika, “Social Networks and the Semantic Web”, Springer, 1st edition 2007. 3. Borko Furht, “Handbook of Social Network Technologies and Applications”, Springer,

1st edition, 2010. 4. Guandong Xu , Yanchun Zhang and Lin Li, “Web Mining and Social Networking –

Techniques and applications”, Springer, 1st edition, 2011. 5. Giles, Mark Smith, John Yen, “Advances in Social Network Mining and Analysis”,

Springer, 2010. 6. Ajith Abraham, Aboul Ella Hassanien, Václav Snášel, “Computational Social Network

Analysis: Trends, Tools and Research Advances”, Springer, 2009. 7. Toby Segaran, “Programming Collective Intelligence”, O’Reilly, 2012.

INT6027 TEXT MINING L T P C 3 0 0 3

INTRODUCTION Overview of Text Mining - Document Classification - Information Retrieval - Clustering Organizing Documents - Information Extraction - Prediction and Evaluation –Textual Information to Numerical Vectors - Collecting Documents - Document Standardization – Tokenization – Lemmatization - Vector Generation for Prediction - Sentence Boundary Determination – Evaluation Performance. INFORMATION RETRIEVAL AND TEXT MINING Information Retrieval and Text Mining - Keyword Search - Nearest-Neighbor Methods – Measuring Similarity - Web-Based Document Search - Document–Matching - Inverted Lists - Evaluation of Performance - Structure in a Document Collection - Clustering Documents by

M.TECH INFORMATION TECHNOLOGY REGULATION 2015

45 KALASALINGAM UNIVERSITY

Similarity- Evaluation of Performance - Information Extraction - Patterns and Entities from Text- Co reference and Relationship Extraction - Template Filling and Database Construction. CLUSTERING AND CLASSIFICATION Cluster - Preserving Dimension Reduction Methods for Efficient Classification of Text Data - Dimension Reduction in the Vector Space Model - Orthogonal Basis of Centroids – Discriminant Analysis - Trace Optimization using an Orthogonal Basis of Centroids - Automatic Discovery of Similar Words - Simultaneous Clustering and Dynamic Weighting - Simultaneous Soft Clustering and Term Weighting - Robustness in the Presence of Noise - Feature Selection and Document Clustering. LEARNING AND TEXT MINING Vector Space Models (VSM) for Search and Cluster Mining - Major and Minor Cluster Discovery - Discovering Hot Topics from Dirty Text - Thesaurus Assistant- Sentence Identifier- Sentence Extractor- Mining Case Excerpts for Hot Topics -Combining Families of Information Retrieval Algorithms using Metalearning. TRENDS IN TEXT MINING Trend and Behavior Detection from Web Queries - Query Data and Analysis- Vocabulary Growth - Technology Opportunities Analysis(TOA)- Constructive Collaborative Inquiry-based Multimedia ELearning (CIMEL)- Timelines- New Event Detection- Themeriver- Patentminer- Summarization- Active Learning- Learning with Unlabeled Data- Different Ways of Collecting Samples- Question Answering - Case Studies - Market Intelligence from the Web - Lightweight Document Matching for Digital Libraries- Generating Model Cases for Help Desk Applications - Assigning Topics to New Articles - E-Mail Filtering - Search Engines - Extracting Named Entities from Documents- Customized Newspapers - Text Mining and Social Networks. REFERENCES :

1. Michael Berry, “Survey of Text Mining: Clustering, Classification and Retrieval”, Springer, 2004.

2. Sholom Weiss, “Text Mining: Predictive Methods for Analyzing Unstructured Information”, Springer, 2005.

3. Hercules Antonio do Prado, Edilson Fernada, “ Emerging Technologies of Text Mining: Techniques and Applications”, Information Science Reference (IGI), 2008.

4. Min Song, Yi-fang Brrok Wu, “Handbook of Research on Text and Web Mining Technologies”, Vol I & II, Information Science Reference (IGI), 2009.

INT6028 AGENT BASED INTELLIGENT SYSTEM L T P C 3 0 0 3

INTRODUCTION Artificial Intelligence- Introduction- Intelligent agents - Problem solving - Solving Problems by Searching- Informed Search and Exploration- Constraint Satisfaction Problems- Adversarial

M.TECH INFORMATION TECHNOLOGY REGULATION 2015

46 KALASALINGAM UNIVERSITY

Search- Heuristics - Game playing. KNOWLEDGE REPRESENTATION AND REASONING Logical agents - First order logic - Inference in First-Order Logic- First order inference – Unification – Chaining - Resolution strategies - Knowledge representation – Objects – Actions - Events. PLANNING AGENTS Planning- Planning and Acting in the Real World- State space search - Partial order planning – Graphs - Nondeterministic Domains - Conditional planning - Continuous planning – Multi agent planning. AGENTS AND LEARNING Learning from Observations– Forms of Learning- Learning Decision Trees- Knowledge in Learning- Statistical Learning Methods-Reinforcement Learning HIGHER LEVEL AGENTS Knowledge in learning - Relevance information - Statistical learning methods - Reinforcement learning – Communication - Formal grammar - Augmented grammars - Future of AI. TEXT BOOK

1. Stuart Russell, Peter Norvig, “Artificial Intelligence - A Modern Approach”, Prentice Hall, 2nd Edition, 2002.

REFERENCES

1. Michael Wooldridge, “An Introduction to Multi Agent System”, John Wiley, 2002. 2. Patrick Henry Winston, “Artificial Intelligence”, AW, 3rd Edition, 1999. 3. Nils Nilsson, J., “Principles of Artificial Intelligence”, Narosa Publishing House, 1992.