M.Tech.(CS) FT -2012

49
ACADEMIC REGULATIONS COURSE STRUCTURE AND DETAILED SYLLABUS COMPUTER SCIENCE & ENGINEERING For M. Tech. (Computer Science) (Two Year Full Time Programme)

Transcript of M.Tech.(CS) FT -2012

Page 1: M.Tech.(CS) FT -2012

ACADEMIC REGULATIONS COURSE STRUCTURE AND

DETAILED SYLLABUS

COMPUTER SCIENCE & ENGINEERING

For

M. Tech. (Computer Science)(Two Year Full Time Programme)

JNTUH COLLEGE OF ENGINEERING HYDERABAD (Autonomous)

Kukatpally, Hyderabad – 500 085, Andhra Pradesh, India.

2012

Page 2: M.Tech.(CS) FT -2012

Dept. of CSE, JNTUHCEH M. Tech. (CS) (FT) w.e.f. 2012-13

JNTUH COLLEGE OF ENGINEERING HYDERABAD(Autonomous)

M.Tech. (Computer Science) – Full Time w.e.f. 2012-2013

I SEMESTERS.

No. Subject L T P Credits

1 Advanced Data Structures & Algorithms 4 0 0 3 2 Database Engineering 4 0 0 3 3 Computer Organization & Architecture 4 0 0 3 4 Operating System Design 4 0 0 3 5 Elective-I 4 0 0 3 6 Elective-II 4 0 0 3 7 Computing Laboratory-I 0 0 4 2 8 Seminar 0 0 4 2

24 0 8 22

II SEMESTERS.

No. Subject L T P Credits

1 Advanced Computer Networks 4 0 0 3 2 Security in Computing 4 0 0 3 3 Web Services & Service Oriented Architecture 4 0 0 3 4 Parallel and Distributed Algorithms 4 0 0 3 5 Elective-III 4 0 0 3 6 Elective-IV 4 0 0 3 7 Computing Laboratory –II 0 0 4 2 8 Soft skills Lab 0 0 4 2

24 0 8 22

III SEMESTERS.

No. Subject L T P Credits

1 Comprehensive Viva Voce - - - 22 Project - Part I (inclusive of PRC - I) - - - 20

22

IV SEMESTERS.

No. Subject L T P Credits

1 Project Part II & Dissertation (inclusive of PRC - II) - - - 2222

2

Page 3: M.Tech.(CS) FT -2012

Dept. of CSE, JNTUHCEH M. Tech. (CS) (FT) w.e.f. 2012-13

Elective – IInformation Retrieval SystemsSoftware Design & EngineeringWireless Networks

Elective-II Natural Language ProcessingSoft ComputingLinux Internals

Elective-III Web Data MiningAdhoc & Sensor Networks Software Architecture & Design Patterns

Elective-IV Research Methodologies in Computer ScienceGame TheoryCloud Computing

3

Page 4: M.Tech.(CS) FT -2012

Dept. of CSE, JNTUHCEH M. Tech. (CS) (FT) w.e.f. 2012-13

ADVANCED DATA STRUCTURES & ALGORITHMS

UNIT-IAlgorithm analysis: RAM model – notations, Recurrence analysis – Masters Theorem, Amortized analysis, Disjoint sets, Randomized Algorithms - n-queen problem, selection sort, quick sort,

UNIT-IIHeap Structures, Min-Max Heaps, Leftist trees, Binomial Heaps, Fibonacci heaps

UNIT-IIISearch Structures- OBST, AVL, 2-3 trees, Red-Black trees, B-trees,

UNIT-IVDigital trees, tries, Splay trees

UNIT-VApproximation Algorithms: Planar graph colouring, Job Scheduling, TSP.NP-Hard and NP-complete: Non-deterministic algorithms, clique problem, Vertex cover problem, TSP.

Text Books1. Fundamentals of Data structures in C++ Sahni, Horowitz,Mehatha, Universities Press,

2nd Edition. 2. Introduction to Algorithms, TH Cormen, PHI.3. Design methods and analysis of Algorithms, SK Basu, PHI.

References:1. Data Structures & Algorithm Analysis in C++, Mark Allen Weiss, Pearson Education.2. Fundamentals of Computer Algorithms, 2nd Edition, Ellis Horowitz, Sartaj Sahni,

Sanguthevar Rajasekaran, Universities Press.

4

Page 5: M.Tech.(CS) FT -2012

Dept. of CSE, JNTUHCEH M. Tech. (CS) (FT) w.e.f. 2012-13

DATABASE ENGINEERING

UNIT- I Relational ModelConstraints, update operations, transactions, and dealing with constraint violations. Relational database design algorithms, MVDs and 4NF, JD and 5NF, inclusion dependencies, other dependencies and normal forms.

UNIT- II Query Processing & OptimizationMeasures of Query Cost, Selection Operation ,Sorting ,Join Operation, Other Operations, Evaluation of Expressions Transformation of Relational Expressions, Estimating Statistics of Expression Results, Choice of Evaluation Plans, Materialized Views, Advanced Topics in Query Optimization.

UNIT- III Object & Object-Relational DatabasesConcepts of Object databases, Object database standards, languages and design.Object-relational and Extended-Relational Systems.

UNIT – IV Security, Advanced Modeling Database SecurityEnhanced data models for advanced applications – active databases, temporal databases, spatial and multimedia databases, deductive databases.

UNIT- VAdvanced Transaction Processing - Transaction-Processing Monitors, Transactional Workflows, E-Commerce, Main-Memory Databases , Real-Time Transaction Systems ,Long-Duration Transactions Case studies: PostgreSQL, IBM DB2, Oracle, Microsoft SQL server.

Text Books: 1. Fundamentals of Database Systems, Elmasri Navrate Pearson Education, V edition2. Data base System Concepts, Silberschatz, Korth, McGraw hill, VI edition.

References :1. Data base Systems design, Implementation, and Management, Peter Rob & Carlos Coronel 7th Edition.2. Introduction to Database Systems, C.J.Date Pearson Education3. Oracle for Professionals,The X Team,S.Shah and V.Shah,SPD.4. Database Systems Using Oracle:A Simplified guide to SQL and PL/SQL,Shah,PHI.5. Fundamentals of Database Management Systems,M.L.Gillenson,Wiley Student Edition.

COMPUTER ORGANIZATION AND ARCHITECTURE5

Page 6: M.Tech.(CS) FT -2012

Dept. of CSE, JNTUHCEH M. Tech. (CS) (FT) w.e.f. 2012-13

UNIT I: BASIC STRUCTURE OF COMPUTERSFunctional units – Basic operational concepts – Bus structures – Performance and metrics – Instructions and instruction sequencing – Hardware – Software Interface – Instruction set architecture – Addressing modes – RISC – CISC. ALU design – Fixed point and floating point operations.

UNIT II: BASIC PROCESSING UNIT Fundamental concepts – Execution of a complete instruction – Multiple bus organization– Hardwired control – Micro programmed control – Nano programming.

UNIT III: PIPELINING Basic concepts – Data hazards – Instruction hazards – Influence on instruction sets – Data path and control considerations – Performance considerations – Exception handling.

UNIT IV: MEMORY SYSTEMBasic concepts – Semiconductor RAM – ROM – Speed – Size and cost – Cache memories – Improving cache performance – Virtual memory – Memory management requirements – Associative memories – Secondary storage devices.

UNIT V: I/O ORGANIZATION Accessing I/O devices – Programmed Input/output -Interrupts – Direct Memory Access– Buses – Interface circuits – Standard I/O Interfaces (PCI, SCSI, USB), I/O devices and processors.

Text Book:

1. Carl Hamacher, Zvonko Vranesic and Safwat Zaky, “Computer Organization”, Fifth Edition, Tata McGraw Hill, 2002.

References:

1. David A. Patterson and John L. Hennessy, “Computer Organization and Design: The Hardware/Software interface”, Third Edition, Elsevier, 2005.

2. William Stallings, “Computer Organization and Architecture – Designing for Performance”, Sixth Edition, Pearson Education, 2003.

3. John P. Hayes, “Computer Architecture and Organization”, Third Edition, Tata McGraw Hill, 1998.

4. V.P. Heuring, H.F. Jordan, “Computer Systems Design and Architecture”, Second Edition, Pearson Education, 2004.

6

Page 7: M.Tech.(CS) FT -2012

Dept. of CSE, JNTUHCEH M. Tech. (CS) (FT) w.e.f. 2012-13

OPERATING SYSTEMS DESIGN

UNIT I INTRODUCTION: Introduction and History of OS, OS Concepts, System Calls, OS Structure,PROCESSES: Processe Concept, Interprocess Communication, Classical IPC Problems & Scheduling

UNIT II INPUT/OUTPUT: Principles of I/O Hardware & I/O Software, Deadlocks, RAM Disks, Disks & Terminals

UNIT III MEMORY MANAGEMENT: Basic Memory Management, Swapping, Virtual Memory, Page Replacement Algorithms, Design Issues For Paging Systems & Segmentation

UNIT IV FILE SYSTEMS: Files, Directories, File System Implementation, Security & Protection Mechanisms

UNIT V Case Study: MINIX 3Overview & implementation of processes, the system task & the clock task in minix 3Overview & implementation of I/O, Block Devices, Process Manager, & File System In Minix3

Text Book:

1. Operating Systems Design and Implementation, 3/EAndrew S Tanenbaum & Albert S Woodhull,  Prentice Hall,  2006

Reference Book:

1. Operating Systems: Internals and Design Principles, 5/EWilliam Stallings, Prentice Hall, 2005

7

Page 8: M.Tech.(CS) FT -2012

Dept. of CSE, JNTUHCEH M. Tech. (CS) (FT) w.e.f. 2012-13

Elective- IINFORMATION RETRIEVAL SYSTEMS

UNIT I Introduction:Motivation, Basic Concepts, Past-Present and Future, the Retrieval ProcessModeling :Introduction, A Taxonomy of Information retrieval Models, Retrieval: Ad hoc and Filtering, A Formal Characteristics of IR Models, Classic Information Retrieval, Alternative Ste Theory Models, Alternative Probabilistic Models, Structured Text Retrieval Models, Model for Browsing

UNIT IIRetrieval EvaluationIntroduction, retrieval Performance Evaluation, Reference CollectionsQuery languagesIntroduction, Keyword-Based Querying, Pattern Matching, Structural Queries, Query ProtocolsQuery OperationsIntroduction, User Relevance Feedback, Automatic Local Analysis, Automatic global AnalysisText OperationsIntroduction, Document Preprocessing, Document Clustering, Text Compression, Comparing text Compression Techniques

UNIT IIIIndexing and SearchingIntroduction, Inverted Files, Other Indices for Text, Boolean queries, Sequential Searching, pattern Matching, Structural Queries, CompressionSearching the WebIntroduction, Challenges, Characterizing the Web, Search Engines, Browsing, Metasearches, Finding the Needle in the Haystack, Searching using Hyperlinks

UNIT IVUser Interfaces and VisualizationIntroduction, human-Computer Interaction, The Information Access Process, Starting Points, Query Specification, Context, User Relevance Judgments, Interface Support for the Search Process

UNIT VMultimedia IR: Models and LanguagesIntroduction, Data Modeling, Query LanguagesMultimedia IR: Indexing and |SearchingIntroduction, Background-Spatial Access Methods,A Generic Multimedia Indexing Approach, One Dimentional Time Series, wo dimential Color Images, Automatic Feature Extraction.

8

Page 9: M.Tech.(CS) FT -2012

Dept. of CSE, JNTUHCEH M. Tech. (CS) (FT) w.e.f. 2012-13

Text Books1. Modern Information Retrival By Yates and Neto Pearson Education.

Reference:1. Kowalski, Gerald, Mark T Maybury: Information Retrieval Systems: Theory and

Implementation, Kluwer Academic Press, 1997.2. Frakes, W.B., Ricardo Baeza-Yates: Information Retrieval Data Structures and

Algorithms, Prentice Hall, 1992.3. Information Storage & Retieval By Robert Korfhage – John Wiley & Sons.

9

Page 10: M.Tech.(CS) FT -2012

Dept. of CSE, JNTUHCEH M. Tech. (CS) (FT) w.e.f. 2012-13

Elective- ISOFTWARE DESIGN AND ENGINEERING

UNIT I Introduction to Software Engineering: The evolving role of software, Changing Nature of Software, legacy software, Software myths. A Generic view of process: Software engineering- A layered technology, a process framework, The Capability Maturity Model Integration (CMMI), Process patterns, process assessment, personal and team process models. Process models: The waterfall model, Incremental process models, Evolutionary process models, Specialized process models, The Unified process. Software Requirements: Functional and non-functional requirements, User requirements, System requirements, Interface specification, the software requirements document. Requirements engineering process: Feasibility studies, Requirements elicitation and analysis, Requirements validation, Requirements management.

UNIT II Software DesignThe nature of the design process, transferring design knowledge, constraints upon the design process and product, recording design decisions, designing with others, context for design, economic factors, assessing design qualities, quality attributes of the design product, assessing the design process. Representing abstract ideas, design view points, the architecture concept, design methods, design patterns, design representations, rationale for design methods. Design Processes and Strategies : The role of strategy in design methods, describing the design process – The D – Matrix, design by top-down decomposition, design by composition, organizational influences upon design.

UNIT IIIDesigning with objects and components Designing with objects : Design practices for object-oriented paradigm, Object-oriented paradigm, Object-oriented frame works, Hierarchical object oriented design process and heuristics, the fusion method, the unified process. Component - based design:The component concept, designing with components, designing components, COTS.User Interface designThe Golden rules, Interface analysis and design models, user and task analysis, analysis of display content and work environment, applying interface design issues, design evaluation.

UNIT IVConcepts Of Software ProjectsProject Management : The management spectrum: people, product, process and project, W5HH principle, Critical practicesMetrics for Process and Projects : Process metrics, project metrics, size-oriented metrics, function-oriented metrics, Object-oriented and use-case metrics, metrics for software quality, integrating metrics with in software process.UNIT V

10

Page 11: M.Tech.(CS) FT -2012

Dept. of CSE, JNTUHCEH M. Tech. (CS) (FT) w.e.f. 2012-13

Project Scheduling and ManagementProject Scheduling: Basic concepts, project scheduling , defining a task set and task network, timeline charts, trackimg the schedule, tracking the progress for an OO project, Earned value analysis.Risk Management: Reactive Vs. Proactive risk strategies, software risks, risk identification, risk projection,risk refinement, risk mitigation and monitoring, the RMMM plan.

Text Books: 1. Software design, David Budgen, second edition, Pearson education,20032. Software Engineering:A practitioner’s Approach, Roger S Pressman, sixth edition.

McGrawHill International Edition, 2005

Reference Books: 1. Applying domain- driven design and patterns, jimmy Nilsson, Pearson

education,20062. Software Engineering Foundations, Ian Sommerville, seventh edition, Pearson

education,2004. 3. Software Project Managenent , Bob Hughes & Mike Cotterell, Fourth edition, Tata

Mc Gr aw Engineering : A Primer, Waman S Jawadekar, Tata McGraw-Hill, 2008 4. The Art of Project Management, Scott Berkun, O’Reilly, 2005.5. Software Engineering, Project Management , Richard H. Thayer & Edward Yourdon,

second edition, Wiley india, 2004. 6. Software Engineering foundations,Yingxu Wang Auerbach publications, 2008.7. Applied Software Project Management , Andrew Stellman & Jennifer Greene,

O’Reilly, 2006.

Elective- I11

Page 12: M.Tech.(CS) FT -2012

Dept. of CSE, JNTUHCEH M. Tech. (CS) (FT) w.e.f. 2012-13

WIRELESS NETWORKS

UNIT – IIntroduction to Wireless Networks: Evolution of Wireless Networks, Challenges, Overview of various Wireless Networks (1G to 4G).Introduction to Mobile Computing: Applications, Limitations, GSM- Mobile Services, System architecture, Radio Interface, Protocols, Localization and calling, HandoverIntroduction to HIPERLAN, Mobile IP-IP Packet delivery, Agent advertisement, registration, tunneling, encapsulation, MANETs,

UNIT – IIWireless Communications Principles and Fundamentals: Introduction, the Multiple Access for Wireless Systems, Cellular Concept, The Ad Hoc and Semi Ad Hoc Concepts, Wireless Services, Data Delivery Approaches, Overview of Basic Techniques and Interactions between the Different Network layers.

UNIT – IIISatellite Networks: Introduction, Satellite Systems, Satellite-based Internet AccessFixed Wireless Access Systems: Wireless Local Loop versus Wired Access, Wireless Local loop, Wireless Local Loop Subscriber Terminals (WLL), Wireless Local Loop Interface to the PSTN, IEEE 802.16 Standards.

UNIT – IVWireless Local Area Networks: Introduction, Wireless LAN Topologies, Wireless LAN Requirements, the Physical Layer, The Medium Access Control (MAC) Layer, Latest Developments. Personal Area Networks (PANs): Introduction to PAN Technology and Applications, Commercial Alternatives: Bluetooth, Commercial Alternatives: HomeRF.

UNIT – VWireless ATM and Ad Hoc Routing: Introduction, Wireless ATM Architecture, HIPERLAN 2: An ATM Compatible WLAN, Routing in Wireless Ad Hoc Networks.Security Issues in Wireless Systems: Attacks on wireless networks, Security services, WEP Protocol, VPN.

Text Book:1. Wireless Networks: P.Nicopolitidis, M.S.Obaidat, G.I.Papadmitriou, A.S.Pomportsis,

John wiley & Sons, Ltd.2. Wireless Communication and Networking, Vijay K Garg, Elsevier.

References:1. Wireless Communications Principles and Practices, T.S.Rappaport, Pearson

Education.2. Wireless Communication & Networks, William Stallings, Pearon Education.3. Mobile Computing , Raj Kamal, Oxford

Elective- II12

Page 13: M.Tech.(CS) FT -2012

Dept. of CSE, JNTUHCEH M. Tech. (CS) (FT) w.e.f. 2012-13

NATURAL LANGUAGE PROCESSING

UNIT I : Finding the Structure of Words         Words and Their Components, Issues and Challenges, Morphological Models

Finding the Structure of Documents         Introduction, Methods, Complexity of the Approaches, Performances of the Approaches, Processing Stages, Discussion  

UNIT II :Syntax         Parsing Natural Language, Treebanks: A Data-Driven Approach to Syntax, Representation of Syntactic Structure, Parsing Algorithms, Models for Ambiguity Resolution in Parsing, Multilingual Issues

UNIT IIISemantic Parsing         Introduction, Semantic Interpretation, System Paradigms, Word Sense, Predicate-Argument Structure, Meaning Representation

UNIT IV :Language Modeling          Introduction, N-Gram Models, Language Model Evaluation, Parameter Estimation, Language Model Adaptation, Types of Language Models, Language-Specific Modeling Problems, Multilingual and Crosslingual Language Modeling  

Multilingual Sentiment and Subjectivity Analysis         Introduction, Definitions, Sentiment and Subjectivity Analysis on English, Word- and Phrase-Level Annotations, Sentence-Level Annotations, Document-Level Annotations

UNIT V:Recognizing Textual Entailment         Introduction, The Recognizing Textual Entailment Task, A Framework for Recognizing Textual Entailment, Case Studies, Taking RTE Further, Useful Resources Text Books:1. Multilingual natural Language Processing Applications : From Theory to Practice –

Daniel M. Bikel and Imed Zitouni, Pearson Publications

Reference:1. Speech and Natural Language Processing - Daniel Jurafsky & James H Martin,

Pearson Publications

Elective - IISOFT COMPUTING

13

Page 14: M.Tech.(CS) FT -2012

Dept. of CSE, JNTUHCEH M. Tech. (CS) (FT) w.e.f. 2012-13

UNIT-IAI Problems and Search: AI problems, Techniques, Problem Spaces and Search, Heuristic Search Techniques- Generate and Test, Hill Climbing, Best First Search Problem reduction, Constraint Satisfaction and Means End Analysis. Approaches to Knowledge Representation- Using Predicate Logic and Rules.

UNIT-IIArtificial Neural Networks: Introduction, Basic models of ANN, impotant terminologies, Supervised Learning Networks, Perceptron Networks, Adaptive Linear Neuron, Backpropogation Network. Associative Memory Networks. Traing Algorithms for pattern association, BAM and Hopfield Networks.

UNIT-IIIUnsupervised Learning Network- Introduction, Fixed Weight Competitive Nets, Maxnet, Hamming Network, Kohonen Self-Organizing Feature Maps, Learning Vector Quantization, Counter Propogation Networks, Adaptive Resonance Theory Networks. Special Networks-Introduction to various networks.

UNIT-IVIntroduction to Classical Sets ( crisp Sets)and Fuzzy Sets- operations and Fuzzy sets. Classical Relations -and Fuzzy Relations- Cardinality, Operations, Properties and composition. Tolerance and equivalence relations.Membership functions- Features, Fuzzification, membership value assignments, Defuzzification.

UNIT-VFuzzy Arithmetic and Fuzzy Measures, Fuzzy Rule Base and Approximate Reasoning Fuzzy Decision makingFuzzy Logic Control Systems. Genetic Algorithm- Intrduction and basic operators and terminology.Applications: Optimization of TSP, Internet Search TechniqueText Books:1. Principles of Soft Computing- S N Sivanandam, S N Deepa, Wiley India, 20072. Soft Computing and Intelligent System Design -Fakhreddine O Karray, Clarence D

Silva,. Pearson Edition, 2004.

References :1. Artificial Intelligence and SoftComputing- Behavioural and Cognitive Modelling of the

Human Brain- Amit Konar, CRC press, Taylor and Francis Group.2. Artificial Intelligence – Elaine Rich and Kevin Knight, TMH, 1991, rp2008.3. Artificial Intelligence – Patric Henry Winston – Third Edition, Pearson Education.4. A first course in Fuzzy Logic-Hung T Nguyen and Elbert A Walker, CRC. Press

Taylor and Francis Group.

14

Page 15: M.Tech.(CS) FT -2012

Dept. of CSE, JNTUHCEH M. Tech. (CS) (FT) w.e.f. 2012-13

Elective - IILINUX INTERNALS

UNIT IIntroduction to linux kernel, getting started with kernelProcess Management : process descriptor and the task structure, process creation, Linux implementation of threads, process terminationProcess scheduling : Multitasking, process scheduler, policy, scheduling algorithm, scheduling implementation, process selection, preemption and context switching, real-time scheduling policies, scheduler related system calls

UNIT IISystem calls : sys calls, system call handler, system call implementation , system call contextKernel Data structures: Linked list, Queues, Maps, binary treesInterrupts and Interrupt handlers: Interrupts, interrupt handlers, Registering an interrupt handler, writing interrupt handler, interrupt context, implementing interrupt handlers, interrupt control

UNIT IIIKernel Synchronization: Critical regions and race conditions, locking, deadlocks, contention and scalability, atomic operations, spin locks, reader writer spin locks, semaphores, reader writer semaphores, mutexes , sequential locks, preemption disabling, ordering and barriersTimers and time management: kernel notion of time, tick rate, jiffies, hardware clocks and timers, timer interrupt handler, timers, delaying execution

UNIT IVMemory Management: Pages, Jones, getting pages, Kmalloc(), vmalloc(), Slab layer, statically allocating on the stack, high memory mappings, per-CPU allocations, per-CPU interface, Virtual File System: common file system interface, file system abstraction layer, Unix file systems, VFS objects and their data structures, the super block object and operations, inode object and operations, Dentry object and operations, file object and operations, data structures associated with file systems and processes

UNIT VBlocl I/O layer: anatomy of a block device, buffers and buffer heads, the bio-structure, request queues, I/O schedulersProcess Address Space: Address spaces, memory descriptor, virtual memory areas, manipulating memory areasPage cache and page write back: approaches to caching, linux page cache the buffer cache, flusher threadsDevices and modules: device types, modules, the device model, sysfsPortability: history and operating systems, word size and data types, data alignment, byte order, time, page size, processor ordering, SMP, kernel preemption and high memoryText Books:

15

Page 16: M.Tech.(CS) FT -2012

Dept. of CSE, JNTUHCEH M. Tech. (CS) (FT) w.e.f. 2012-13

1. Linux Kernel Development by Robert Love, 3rd Edition, Pearson

References:1. Linux Kernel Programming by Michael Beck , Harald Bohme, mirko Dziadzka, Ulbrich

Kunitz, Robert Magnus, Dirk Verworner, 3rd Edition, Pearson.

16

Page 17: M.Tech.(CS) FT -2012

Dept. of CSE, JNTUHCEH M. Tech. (CS) (FT) w.e.f. 2012-13

COMPUTING LABORATORY – I(ADS&A, DBE)

Experiments for ADS:1. Write a program to implement the Randomized n-Queens problem2. Write a program to implement the Randomized selection sort3. Write a program to implement the Randomized Quick sort4. Write a program to implement the operations of Binary Search Trees5. Write a program to implement the Optimal Binary Search Tree 6. Write a program to implement the operations of AVL trees 7. Write a program to implement the operations of Real – Black trees8. Write a program to implement the operations of Splay Trees9. Write a program to implement the operations of Leftist tree10. Write a program to implement the operations of Binomial Heap11. Write a program to implement the operations of Fibonacci Heap12. Write a program to implement the Operations of Digital Search trees13. Write a program to implement the Operations of Binary Tries14. Write a program to implement the Operations of Suffix Tries

Experiments for DBE:1. Lab Experiments for DBE:2. Payroll processing system - Database design using E-R model 3. Applying Normalization techniques on Payroll processing systems.4. Integrity constraints enforcement, High level language extension with Triggers on

Payroll processing systems5. Implement query processing algorithms: nested loop join, merge join, hash join,

hybrid hash join.6. Implement Dynamic programming algorithm for join order optimization.7. Image storage and retrieval in MySQL database8. Transaction Processing activities – application program development – concurrent

executions

17

Page 18: M.Tech.(CS) FT -2012

Dept. of CSE, JNTUHCEH M. Tech. (CS) (FT) w.e.f. 2012-13

ADVANCED COMPUTER NETWORKSUNIT-IComputer Networks & Internet: Introduction to terminology- Internet, Protocol, Access Networks, Physical media, Packet – switched Networks, Protocol layers and their service models, backbones, NAPs, ISPs

UNIT-IIApplication Layer: Principles of application layer Protocols, the world wide Web: HTTP, File Transfer: FTP, Electronic Mail in the Internet.

UNIT - IIITransport Layer: Transport – Layer Services and Principles, Multiplexing and Demultiplexing Applications, Connectionless Transport: UDP, Principles of Reliable of Data Transfer, connection-Oriented Transport: TOP, Principles of Congestion Control, TCP Congestion Control.

UNIT – IVNetwork Layer and Routing: Introduction and Network Service Model, Routing Principles, Hierarchical Routing, Internet Protocol, Routing in the Internet, IPv6, Multicasting Routing.

UNIT – VLink Layer and Local Area Networks: The Data Link Layer: Introduction, Services, Error Detection and Correction, Multiple Access Protocols and LANs, LAN Addresses and ARP, Ethernet, Hubs, Bridges and Switches, Wireless LANs: IEEE 802.11, The point-to-Point Protocol, ATM, X.25 and Frame Relay.

Text Book:1. Computer Networks a Top-down Approach Featuring the Internet. James F. Kurose

and keith W.Ross, Addison Wesley.

References:1. Computer Networks, Tenanbaum, Pearson Educaiton.2. Computer Networks a systems approach, Larry L. Peterson and Bruce

S.Davie, Elsevier, 5th Edition.

18

Page 19: M.Tech.(CS) FT -2012

Dept. of CSE, JNTUHCEH M. Tech. (CS) (FT) w.e.f. 2012-13

SECURITY IN COMPUTING

Unit I Security Problem in ComputingComputer Security, Threats, Attacks, Computer Criminals, Defense Methods, CryptographySymmetric and Public-key Encryption, Uses of Encryption.

Unit II Program Security Secure Programs, Viruses and other Malicious Code, Control against Program Threats Protection in General-Purpose OSProtected Objects and Methods of Protection, Memory and Address Protection, Control of Access to General Objects, File Protection Mechanism, User Authentication.

Unit III Designing Trusted OSWhat is Trusted System?, Security Policies, Models of Security, Trusted Operating System DesignDatabase and Data Mining SecuritySecurity Requirements, Reliability and Integrity, Sensitive Data, Inference, Multilevel Databases, Proposals for Multilevel Security, Data Mining

Unit IV Security in NetworksThreats in Networks, Network Security Controls, Firewalls, Intrusion Detection System, Secure E-MailAdministering Security Security Planning, Organizational Security Policies, Physical SecurityEconomics of CybersecurityQuantifying Security, Modeling Cybersecurity, Current Research and Future directions

Unit V Privacy in ComputingPrivacy Concepts, Privacy Principles and Policies, Authentication and Privacy, Privacy on the WebLegal and Ethical Issues in Computer SecurityProtecting Programs and Data, Computer Crime, Ethical Issues in Computer Security, Case Studies of EthicsSecurity in Service-Oriented Architecture (SOA)Web Services, XML Firewalls

19

Page 20: M.Tech.(CS) FT -2012

Dept. of CSE, JNTUHCEH M. Tech. (CS) (FT) w.e.f. 2012-13

Prescribed Text Book1. C. P. Fleeger and S. L. Fleeger, Security in Computing, Pearson Education.

References 1. M.Bishop and S. S. Venkatramanaya, Introduction to Computer Security,

Pearson Education Asia, 2005.2. Atul Khate, Cryptography and Network Security, Tata McGraw-Hill.3. Stallings W., Cryptography and Network Security Principles and Practice, 3/e,

Pearson Education Asia, 2003. 4. C K Shyamala, N Harini, Dr T R Padmanabham, Cryptography and Network

Security, Wiley India

20

Page 21: M.Tech.(CS) FT -2012

Dept. of CSE, JNTUHCEH M. Tech. (CS) (FT) w.e.f. 2012-13

WEB SERVICES & SERVICE ORIENTED ARCHITECTURE

UNIT- IEvolution and Emergence of Web Services – Evolution of distributed computing. Core distributed computing technologies – client/server, CORBA, JAVA RMI, Micro Soft DCOM, MOM, Challenges in Distributed Computing, role of J2EE and XML in distributed computing, emergence of Web Services and Service Oriented Architecture (SOA). Introduction to Web Services – The definition of web services, basic operational model of web services, tools and technologies enabling web services, benefits and challenges of using web services.

UNIT -IIWeb Service Architecture – Web services Architecture and its characteristics, core building blocks of web services, standards and technologies available for implementing web services, web services communication, basic steps of implementing web services. Describing Web Services – WSDL introduction, non functional service description, WSDL1.1 Vs WSDL 2.0, WSDL document, WSDL elements, WSDL binding, WSDL tools, WSDL port type, limitations of WSDL.

UNIT IIIBrief Over View of XML – XML Document structure, XML namespaces, Defining structure in XML documents, Reuse of XML schemes, Document navigation and transformation. SOAP : Simple Object Access Protocol, Inter-application communication and wire protocols, SOAP as a messaging protocol, Structure of a SOAP message, SOAP envelope, Encoding, Service Oriented Architectures, SOA revisited, Service roles in a SOA, Reliable messaging, The enterprise Service Bus, SOA Development Lifecycle, SOAP HTTP binding, SOAP communication model, Error handling in SOAP.

UNIT – IVRegistering and Discovering Services : The role of service registries, Service discovery, Universal Description, Discovery, and Integration, UDDI Architecture, UDDI Data Model, Interfaces, UDDI Implementation, UDDI with WSDL, UDDI specification, Service Addressing and Notification, Referencing and addressing Web Services, Web Services Notification.

UNIT - VSOA and web services security considerations, Network-level security mechanisms, Application-level security topologies, XML security standards, Semantics and Web Services, The semantic interoperability problem, The role of metadata, Service metadata, Overview of .NET and J2EE, SOA and Web Service Management, Managing Distributed System, Enterprise management Framework, Standard distributed management frameworks, Web service management, Richer schema languages, WS-Metadata Exchange.

Text Books:21

Page 22: M.Tech.(CS) FT -2012

Dept. of CSE, JNTUHCEH M. Tech. (CS) (FT) w.e.f. 2012-13

1. Web Services & SOA Principles and Technology, Second Edition, Michael P. Papazoglou.

2. Developing Java Web Services, R. Nagappan, R. Skoczylas, R.P. Sriganesh, Wiley India.

3. Developing Enterprise Web Services, S. Chatterjee, J. Webber, Pearson Education.

Reference Books:1. XML, Web Services, and the Data Revolution, F.P.Coyle, Pearson Education.2. Building web Services with Java, 2nd Edition, S. Graham and others, Pearson

Education.3. Java Web Services, D.A. Chappell & T. Jewell, O’Reilly, SPD.4. McGovern, et al., “Java web Services Architecture”, Morgan Kaufmann Publishers,

2005.5. J2EE Wer Services, Richard Monson-Haefel, Pearson Education.

22

Page 23: M.Tech.(CS) FT -2012

Dept. of CSE, JNTUHCEH M. Tech. (CS) (FT) w.e.f. 2012-13

PARALLEL & DISTRIBUTED ALGORITHMS

UNIT-IBasic Techniques, Parallel Computers for increase Computation speed, Parallel & Cluster Computing

UNIT-IIMessage Passing Technique- Evaluating Parallel programs and debugging, Portioning and Divide and Conquer strategies examples

UNIT-IIIPipelining- Techniques computing platform, pipeline programs examples

UNIT-IVSynchronous Computations, load balancing, distributed termination examples, programming with shared memory, shared memory multiprocessor constructs for specifying parallelist sharing data parallel programming languages and constructs, open MP

UNIT-VDistributed shared memory systems and programming achieving constant memory distributed shared memory programming primitives, algorithms – sorting and numerical algorithms.

Text Books:1. Parallel Programming, Barry Wilkinson, Michael Allen, Pearson Education, 2nd

Edition.

23

Page 24: M.Tech.(CS) FT -2012

Dept. of CSE, JNTUHCEH M. Tech. (CS) (FT) w.e.f. 2012-13

Elective-III WEB DATA MINING

UNIT - IIntroduction, What is the World Wide Web?, A Brief History of the Web and the Internet, Web Data Mining, Association Rules and Sequential Patterns, Basic Concepts of Association Rules, Apriori Algorithm, Data Formats for Association Rule Mining, Mining with Multiple Minimum Supports, Mining Class Association Rules, Basic Concepts of Sequential Patterns, Mining Sequential Patterns Based on GSP, Mining Sequential Patterns Based on PrefixSpan, Generating Rules from Sequential Patterns.

UNIT – IIBasic Concepts, Decision Tree Induction, Classifier Evaluation, Rule Induction, Classification Based on Associations, Naïve Bayesian Classification, Naïve Bayesian Text Classification, Support Vector Machines, K-Nearest Neighbor Learning, Unsupervised Learning, K-means Clustering, Representation of Clusters, Hierarchical Clustering, Distance Functions.

UNIT – IIIInformation Retrieval and Web Search, Information Retrieval Models, Relevance Feedback, Evaluation Measures, Text and Web Page Pre-Processing, Inverted Index and Its Compression, Latent Semantic Indexing, Web Search, Meta-Search: Combining Multiple Rankings, Web Spamming.

UNIT – IVSocial Network Analysis, Co-Citation and Bibliographic Coupling, PageRank, HITS, Web Crawling, A Basic Crawler Algorithm, Implementation Issues, Universal Crawlers, Information Integration, Introduction to Schema Matching, Pre-Processing for Schema Matching, Schema-Level Match, Domain and Instance-Level Matching, Combining Similarities, Integration of Web Query Interfaces, Constructing a Unified Global Query Interface, Opinion Mining and Sentiment Analysis.

UNIT – VThe Problem of Opinion Mining, Document Sentiment Classification, Sentence Subjectivity and Sentiment Classification, Opinion Lexicon Expansion, Aspect-Based Opinion Mining, Mining Comparative Opinions, Opinion Search and Retrieval, Opinion Spam Detection, Web Usage Mining, Data Collection and Pre-Processing, Data Modeling for Web Usage Mining, Discovery and Analysis of Web Usage Patterns, Recommender Systems and Collaborative Filtering, Query Log Mining.

Text Books:

1. WEB DATA MINING, Exploring Hyperlinks, Contents, and Usage Data, Bing Liu, Second Edition, July 2011.

2. DATA MINING Concepts and Techniques, Jiawei Han, Micheline Kamber, Jian Pei, Third Edition.

References Books:24

Page 25: M.Tech.(CS) FT -2012

Dept. of CSE, JNTUHCEH M. Tech. (CS) (FT) w.e.f. 2012-13

1. DATA MINING Introductory and Advanced Topics, Pearson Education, Margaret H. Dunham, Third Edition.

2. DATA MINING, Practical Machine Learning Tools and Techniques with Java Implementations, Ian H. Witten, Eibe Frank, Elsevier, Second Edition.

3. DATA MINING, Pieter Adriaans, Dolf Zantinge, Pearson Education

25

Page 26: M.Tech.(CS) FT -2012

Dept. of CSE, JNTUHCEH M. Tech. (CS) (FT) w.e.f. 2012-13

Elective-III ADHOC & SENSOR NETWORKS

UNIT I Introduction to Ad Hoc Networks Characteristics of MANETs, Applications of MANETs and challenges of MANETs. Routing in MANETs Criteria for classification, Taxonomy of MANET routing algorithms, Topology based routing algorithms, Position based routing algorithms, Other routing algorithms.

UNIT II Data Transmission Broadcast storm problem, Broadcasting, Multicasting and Geocasting. TCP over Ad Hoc TCP protocol overview, TCP and MANETs, Solutions for TCP over Ad hoc

UNIT IIIBasics of Wireless, Sensors and Applications Applications, Classification of sensor networks, Architecture of sensor network, Physical layer, MAC layer, Link layer. Data Retrieval in Sensor Networks Routing layer, Transport layer, High-level application layer support, Adapting to the inherent dynamic nature of WSNs, Sensor Networks and mobile robots.

UNIT IV Security - Security in Ad Hoc networks, Key management, Secure routing, Cooperation in MANETs, Intrusion Detection systems. Sensor Network Platforms and Tools Sensor Network Hardware, Berkeley motes, Sensor Network Programming Challenges, Node-Level Software Platforms,

UNIT VOperating System – TinyOS, Imperative Language: nesC, Dataflow style language: TinyGALS, Node-Level Simulators, ns-2 and its sensor network extension, TOSSIM

Text Books: 1. Ad Hoc and Sensor Networks – Theory and Applications, Carlos Corderio Dharma

P.Aggarwal, World Scientific Publications, March 2006, ISBN – 981-256-681-3 2. Wireless Sensor Networks: An Information Processing Approach, Feng

Zhao,Leonidas Guibas,Elsevier Science,ISBN–978-1-55860-914-3(Morgan Kauffman)

26

Page 27: M.Tech.(CS) FT -2012

Dept. of CSE, JNTUHCEH M. Tech. (CS) (FT) w.e.f. 2012-13

Elective-IIISOFTWARE ARCHITECTURE & DESIGN PATTERNS

UNIT I Envisioning Architecture The Architecture Business Cycle, What is Software Architecture, Architectural patterns, reference models, reference architectures, architectural structures and views. Creating an Architecture Quality Attributes, Achieving qualities, Architectural styles and patterns, designing the Architecture, Documenting software architectures, Reconstructing Software Architecture.

UNIT IIAnalyzing Architectures Architecture Evaluation, Architecture design decision making, ATAM, CBAM.

UNIT III Moving from one system to many Software Product Lines, Building systems from off the shelf components, Software architecture in future.

UNIT IV Patterns Pattern Description, Organizing catalogs, role in solving design problems ,Selection and usage. Creational and Structural patterns Abstract factory, builder, factory method, prototype, singleton, adapter, bridge, composite, façade, flyweight, Proxy.

UNIT VBehavioral patterns Chain of responsibility, command, Interpreter, iterator, mediator, memento, observer, state, strategy, template method, visitor. Case Studies A-7E – A case study in utilizing architectural structures, The World Wide Web - a case study in interoperability, Air Traffic Control – a case study in designing for high availability, Celsius Tech – a case study in product line development

Text Books:1. Software Architecture in Practice, second edition, Len Bass,Pau Clements&Rick

Kazman, Pearson Education,2003. 2. Design Patterns, Erich Gamma, Pearson Education, 1995.

Reference Books:27

Page 28: M.Tech.(CS) FT -2012

Dept. of CSE, JNTUHCEH M. Tech. (CS) (FT) w.e.f. 2012-13

1. Beyond Software architecture, Luke Hohmann, Addison wesley, 2003. 2. Software architecture, David M. Dikel, David Kane and James R. Wilson, Prentice

Hall PTR, 2001 3. Software Design, David Budgen, second edition, Pearson education, 2003 4. Head First Design patterns, Eric Freeman & Elisabeth Freeman, O’REILLY, 2007. 5. Design Patterns in Java, Steven John Metsker & William C. Wake, Pearson

education, 2006 6. J2EE Patterns, Deepak Alur, John Crupi & Dan Malks, Pearson education, 2003. 7. Design Patterns in C#, Steven John metsker, Pearson education, 2004.

28

Page 29: M.Tech.(CS) FT -2012

Dept. of CSE, JNTUHCEH M. Tech. (CS) (FT) w.e.f. 2012-13

Elective – IV

RESEARCH METHODOLOGIES IN COMPUTER SCIENCE

UNIT I Introduction, Technical Research Paper Writing and Publication

UNIT II Research Paper Search

UNIT IIIResearch Ethics, Research Methods in Computer Science and Engineering, Research Methods for Software Engineering, Research Methods (deductive methods and proofs),

UNIT IVPaper Publishing and Reviewing, Measured-based research methods in Computer Engineering

UNIT VPreparation & Presentation of a scientific paper

Reference Web Resources

1. A Computer Scientist's Guide to Writing and Publishing Technical Articles, Paul Martin, Technical Report, CS-TR-95-4, Dept of CS, Victoria University of Wellington, New Zealand, 1995.

2. Marcia Martens Pierson, Bion L. Pierson, Beginnings and Endings: Keys to Better Engineering Technical Writing, IEEE Transactions on Professional Communication (IEEE T-PC), Vol. 40, No. 4, pp 299 - 304 December 1997

29

Page 30: M.Tech.(CS) FT -2012

Dept. of CSE, JNTUHCEH M. Tech. (CS) (FT) w.e.f. 2012-13

Elective - IVGAME THEORY

UNIT-I: Introduction- Game Theory, Games and Solutions Game Theory and the Theory of Competitive Equilibrium, Rational Behavior, The Steady State and Deductive Interpretations, Bounded Rationality Terminology and Notation

Nash Equilibrium- Strategic Games, Nash Equilibrium Examples Existence of a Nash Equilibrium, Strictly Competitive Games, Bayesian Games: Strategic Games with Imperfect Information UNIT-II: Mixed, Correlated, and Evolutionary Equilibrium -Mixed Strategy Nash Equilibrium Interpretations of Mixed Strategy Nash Equilibrium Correlated Equilibrium Evolutionary Equilibrium Rationalizability and Iterated Elimination of Dominated Actions-Rationalizability Iterated Elimination of Strictly Dominated Actions ,Iterated Elimination of Weakly Dominated Actions

UNIT III : Knowledge and Equilibrium -A Model of Knowledge Common Knowledge , Can People Agree to Disagree? , Knowledge and Solution Concepts, The Electronic Mail Game UNIT IV: Extensive Games with Perfect Information -Extensive Games with Perfect Information Subgame Perfect Equilibrium Two Extensions of the Definition of a Game The Interpretation of a Strategy , Two Notable Finite Horizon Games , Iterated Elimination of Weakly Dominated Strategies Bargaining Games -Bargaining and Game Theory , A Bargaining Game of Alternating Offers Subgame Perfect Equilibrium Variations and Extensions UNIT V: Repeated Games - The Basic Idea Infinitely Repeated Games vs.\ Finitely Repeated Games Infinitely Repeated Games: Definitions Strategies as Machines  Trigger Strategies: Nash Folk Theorems Punishing for a Limited Length of Time: A Perfect Folk Theorem for the Limit of Means Criterion Punishing the Punisher: A Perfect Folk Theorem for the Overtaking Criterion Rewarding Players Who Punish: A Perfect Folk Theorem for the Discounting Criterion The Structure of Subgame Perfect Equilibria Under the Discounting Criterion Finitely Repeated Game

Text Books: 1. M. J. Osborne and A. Rubinstein, A course in Game Theory, MIT Press 2. Roger Myerson, Game Theory, Harvard University Press 3. D. Fudenberg and J. Tirole, Game Theory, MIT Press

References1. J. von Neumann and O. Morgenstern, Theory of Games and Economic Behavior,

New York: John Wiley and Sons., 2. R.D. Luce and H. Raiffa, Games and Decisions, New York: John Wiley and Sons., 3. G. Owen, Game Theory, (Second Edition), New York: Academic Press,

Elective - IV30

Page 31: M.Tech.(CS) FT -2012

Dept. of CSE, JNTUHCEH M. Tech. (CS) (FT) w.e.f. 2012-13

CLOUD COMPUTING

UNIT – IIntroduction to virtualization and virtual machine, Virtualization in cluster/grid context Virtual network, Information model & data model for virtual machine, Software as a Service (SaaS), SOA, On Demand Computing.

UNIT – II Cloud computing: Introduction, What it is and What it isn’t, from Collaborations to Cloud, Cloud application architectures, Value of cloud computing, Cloud Infrastructure models, Scaling a Cloud Infrastructure, Capacity Planning, Cloud Scale.

UNIT – IIIData Center to Cloud: Move into the Cloud, Know Your Software Licenses, The Shift to a Cloud Cost Model, Service Levels for Cloud ApplicationsSecurity: Disaster Recovery, Web Application Design, Machine Image Design, Privacy Design, Database Management,   Data Security ,   Network Security ,   Host Security , Compromise Response

UNIT – IVDefining Clouds for the Enterprise- Storage-as-a-Service, Database-as-a-Service, Information-as-a-Service, Process-as-a-Service, Application-as-a-Service, Platform-as-a-Service, Integration-as-a-Service, Security-as-a-Service, Management/Governance-as-a-Service, Testing-as-a-ServiceInfrastructure-as-a-Service

UNIT – VDisaster Recovery,   Disaster Recovery, Planning , Cloud Disaster ManagementCase study: Types of Clouds, Cloudcentres in detail, Comparing approaches, Xen OpenNEbula , Eucalyptus, Amazon, Nimbus

Text Books:1. Cloud Computing – Web Based Applications That Change the way you Work and

Collaborate Online – Michael Miller, Pearson Education.2. Cloud Application Architectures, 1st Edition by George Reese O'Reilly Media.

Reference Book:1. Cloud Computing and SOA Convergence in Your Enterprise: A Step-by-Step Guide

David S. Linthicum Addison-Wesley Professional.2. Enterprise Web 2.0 Fundamentals by Krishna Sankar; Susan A. Bouchard, Cisco

Press

COMPUTING LABORATAORY – II(Web Services & Security (Parallel and Distributed Algorithms)

31

Page 32: M.Tech.(CS) FT -2012

Dept. of CSE, JNTUHCEH M. Tech. (CS) (FT) w.e.f. 2012-13

Web Services:1. Write a program to implement WSDL Service (Hello Service . WSDL File)2. Write a program the service provider can be implement a single get price(), static bind()

and get product operation.3. Write a program to implement the operation can receive request and will return a

response in two ways.a) One-Way operationb) Request - Response

4. Write a program to implement to create a simple web service that converts the temperature from Fahrenheit to Celsius (using HTTP Post Protocol)

5. Write a program to implement business UDDI Registry entry6. Write a program to implement

a) Web based service consumerb) Windows application based web service consumer

Security:1 a. Write a program to send a message (for example: “Mid exams are from next Monday”)

to your friend.b. Write a program for the above one to show that the message has been modified

(attack). (ex: “Mid exams are postponed”).2 a. Write a program so that sender and receiver are sharing the same key (Symmetric

Encryption). b. Write a program so that sender sends the message and receiver decrypts the message

with the above key.3 a. Write a program which shows the public-key cryptography technique. Note: generate

two keys, public and private and encrypt with one key and decrypt with the other key.4 a. Write a program to compute the sum of integers from 1 to 10. b. Modify the above program to show that the above program can be sabotaged so that

during execution it computes a different sum from 3 to 20. (Program security)5. Write a program so that two mutually suspicious parties can authenticate each other. 6. Write a program to display the student’s database (roll number, name, and attendance),

but not the students confidential information (such as marks). (Database security)7. Write a program to demonstrate man-in-middle attack. (Security in Networks)8. Write a program, to demonstrate the denial-of-service to the authorized user in the Lab.

(Administrative Security)Parallel and Distributed Algorithms:

1. Write a sample MPI Program to add a group of numbers together Note: These numbers are randomly generated and held in a file.

2. Write a Parallel Program to sort the numbers by using bucket sort that uses divide and conquer approach

3. Write a Parallel Program that uses divide and conquer approach to find the first zero in a list of integers stored in an array. Use 16 Processes and 256 numbers

4. Write a pipelined program of adding a list of programs5. Write a pipelined program of insertion sort with five numbers6. Write a parallel program that will implement the load balancing

technique using pipeline structure32

Page 33: M.Tech.(CS) FT -2012

Dept. of CSE, JNTUHCEH M. Tech. (CS) (FT) w.e.f. 2012-13

7. Write a parallel program that will implement Moore’s algorithm using the load balancing

8. Write a distributed shared memory program to perform matrix multiplication Note: Dividing each matrix into four sub matrixes and using four processes

9. Write a Parallel program to implement the Bubble sort10. Write a Parallel program to implement the Merge Sort11. Write a Parallel program to implement the Quick Sort12. Write a Parallel program to implement the Matrix Addition13. Write a Parallel program to implement the Matrix Multiplication

33

Page 34: M.Tech.(CS) FT -2012

Dept. of CSE, JNTUHCEH M. Tech. (CS) (FT) w.e.f. 2012-13

SOFT SKILLS LAB(Activity-based)

OBJECTIVES To improve the fluency of students in English To facilitate learning through interaction To illustrate the role of skills in real-life situations with case studies, role plays etc. To train students in group dynamics, body language and various other activities

which boost their confidence levels and help in their overall personality development To encourage students develop behavioral skills and personal management skills To impart training for empowerment, thereby preparing students to become

successful professionals

INTRODUCTIONDefinition and Introduction to Soft Skills – Hard Skills vs. Soft Skills – Significance of Soft/Life/Self Skills - Self and SWOT Analysis and

Exercises on Productivity Development - Effective / Assertive Communication Skills (Activity based)- Time Management (Case study)- Creativity and Critical Thinking (Case study) - Decision Making and Problem solving (Case study) - Stress Management (Case study)

Exercises on Professional Etiquette and Social Skills- Role Play and Simulation - Introducing Self and Others - Greetings - Apologies

- Requests - Agreement and Disagreement etc.- Telephone Etiquette.

Exercises on Personality Development Skills- Self-esteem (Case Study)- Positive Thinking (Case Study)- Emotional Intelligence (Case Study)- Team Building & Leadership Skills (Case Study)- Conflict Management (Case Study)

Exercises on Presentation Skills- Netiquette - Importance of Oral Presentation – Defining Purpose – Analyzing the Audience -

Planning Outline and Preparing the Presentation – Individual and Group Presentations – Graphical Organizers – Tools and Multimedia Visuals.

- One Minute Presentations (warming up activity)- PPT on Project Work – Understanding the Nuances of Delivery – Body Language

- Closing and Handling Questions –Rubrics for Individual Evaluation (Practice Sessions)

34

Page 35: M.Tech.(CS) FT -2012

Dept. of CSE, JNTUHCEH M. Tech. (CS) (FT) w.e.f. 2012-13

Exercises on Professional Communication- Active Listening - Group Discussions (Case Study) - Group Discussions as part of a Selection

Procedure (Checklist of GDs) - Analysis of Selected Interviews (Objectives of Interview) - Mock-Interviews (Practice Sessions)- Job application and Preparing a Resume - Process Writing (Technical Vocabulary) - Writing a Project Report – Assignments

Exercises on Ethics and ValuesIntroduction –– Types of Values - Personal, Social and Cultural Values - Importance of Values in Various Contexts

- Significance of Modern and Professional Etiquette - Etiquette in Formal and Informal Situations (Illustrations)

- Attitude, Good Manners and Work Culture (Live Examples)- Social Skills - Dealing with the Challenged (Live Examples)- Professional Responsibility and Adaptability (Live Examples)- Corporate Expectations

@@@@@ Note: Hand-outs are to be prepared and given to students. Training plan will be integrated in the syllabus. Topics mentioned in the syllabus are activity-based.

SUGGESTED READING1. Alex, K. 2012. Soft Skills. S. Chand Publishers 2. Sherfield, Robert M. 2005. et al Cornerstone: Developing Soft Skills. Pearson3. Suresh Kumar,E; Sreehari, P. & Savithri, J. 2011. Communication Skills and Soft

Skills- An Integrated Approach. New Delhi: Pearson4. Patnaik, P. 2011. Group Discussion and Interview Skills. New Delhi: Foundation5. Sudhir Andrews. 2009. How to Succeed at Interviews. New Delhi: Tata McGraw Hill6. Sasikumar, V & Dhamija, P.V. 1993. Spoken English - A Self-Learning Guide to

Conversation Practice. New Delhi: Tata McGraw-Hill 7. Dixson, Richard J. Everyday Dialogues in English. Prentice Hall India Pvt Ltd8. Mukhopadhyay. L et al. 2012. Polyskills. New Delhi: CUP India Pvt Ltd9. Rizvi, M. A. 2005. Effective Technical Communication. New Delhi: Tata McGraw Hill10. The Hindu Speaks on Education by the Hindu Newspaper11. Naterop, B. Jean and Revell, Rod. 2004. Telephoning in English. Cambridge: CUP

35