Syllabus
Subject
Code :CS8J1 /IS8J1
Subject Title Advanced Algorithms
Total contact hrs 48
Duration
of Exams:3hrs
Max. Exam. Marks 100
Max. 1.A. Marks 25
Contents:
1. ANALYSIS TECIINIQUES: 6 Hrs
Growth functions, Recurrences and solution of recurrence equations;
Amortized analysis: Aggregate, Accounting, and Potential methods.
2. STRING MATCHING ALGORITHMS: 6 Hrs.
Naive algorithm; Robin-Karp algorithm; String matching with finite automata,
Knuth-morris -Pratt andBoyer-Moore algorithms.
3.NUMBER THEORETIC ALGORITHMS:
Elementary notions, GCD, Modular arithmetic, solving, modular linear
equations. the chirese remainder theorem, powers of an element, RSA cryptosy
testing, Integer factorization.
4.HUFFMAN CODES,POLYNOMIALS ,FFT 6hrs
huffman codes: Concepts, construction, Proof ot correctness of Hut!man 's
algorithm polynomials, DFT and FFT, Efficient implementation of FFT.
5.GRAPH ALGORITHMS: 6 Hrs.
Bellman-Ford Algorithm, Shotest paths in a DAG, Johnson's Algorithm for
sparse graphs, Flow tworks and the Ford-Fulkerson algorithm, Maximum
bipartite matching.
6.COMPUTATIONAL GEOMETRY-I: 6 Hrs.
geometric data s:ructures using C++: Vectors, Points, Polygons, Edges;
Geometric objects in space; iding the intersection of a line and a triangle,
Finding star-shaped polygons and convex hulls using 'remental insertion.
7.COMPUTATIONAL GEOMETRY-II: I2Hrs.
Point Enclosure: Ray-shooting and Signed angle methods; Clipping: Cyrus-Beck
and Sutherland-'odgman Algorithms; Triangulating monotonic polygons; Convex
hulls: Gift wrapping and Graham an; Removing hidden surfaces1 Intersection
of convex polygons; convex hulls, contour of the union - rectangles,
Decomposing polygons into monotone pieces.
TextBooks:
1.Thomas H.Cormen et al: Introduction to Algorithms, Prentice Hall India,
1990.(Chapter 2,4.1 to 3,17.3.18.1. to 18.3, 25.3, 25.4, 26.3 27.1 to 27.3
32, 33, 34)
2.Michael J. Laszlo: Computational Geometry and Computer Graphics in C++.
Prentice Hall India, 1996 (chapter 4.1 to 4.6,5.3 to 5.8, 6.2 to 6.5, 7.3,
7.4).
Subject Code CS8J2 / 1S8J2
Duration of Exam 3 Hrs
Subject Title: Pattern Recognition
Max. Exam. Marks :100
Contact hrs 48
Max. I.A. Marks 25
Contents:
1.INTRODUCTION
Machine perception, An example, The classification model, The Descriptive
approach. Decision theory, The continuous case, Two category classification,
Minimum error rate classification, Classifiers, Discriminant ftinctions and
Decision surfaces, Discrininant flinctions for the al density, Bayesion
Decision theory : the discrete case, Independent Binary features, Compound
Decision Theory and.Context. 8 hours
2.PARAMETER ESTIMATION AND SUPERVISED LEARNING: num likelihood
estimation, Bayes Classifier, Learning the mean of a Normal density, General
'ian learning, Sufficient Statistics and exponential family, Problems of
dimensionality, Estimating the rate.
8 hours
3.NON PARAMETRIC TECHNIQUES: juction, Density estimation, Parzen
windows, Nearest neighbor Estimation, Estimation of A riori Probabilities,
The nearest neighbor rule, The k-nearest Neighbor rule, Approximations by
Series isions, Fishers Linear Discriminant function. Multiple Discriminant
Analysis. 8 hours
4.LINEAR DISCRIMINANT FUNCTIONS: juction, linear discriminant
functions and decision surfaces, Generalised disc riminant functions, The 'ategory
linearly separable case, minimising the perceptron criterion function,
Relaxation procedures. ,-eparable behavior, Minimum squared Error
procedures. 8 hours
5.UNSUPERVISED LEARNING AND CLUSTERING:
Introduction, Mixture densitites and identifiability. Maximum likelihood
estimates,Application to normal, Unsupervised Bayesianlearning ,Data
description and clustering .similarity measure ,Criterion functions for
clustering, Iterative optimization, Hierarchical Clustering, Graph theoretic
methods, The problem of validity, Low dimensional representations and
Multidimensional scaling, Ciusterint a!]d Dimensionality reduction. 8
hours
6. NEURAL PATTERtN RECOGNITION:
Introduction to Neural networks, Neurons and Neural nets, Neural Network
strucuires for Pattern recognition applications, Physical neural networks.
The artiflcial Neural ne~vork model inroductiun to neural pattern
associators and matrix approaches: Neural Ne~vork based Pattern associators,
matrix approaches and examples. 8 hours
Text Books:
1 Richard. O..Duda and Peter E. Hart; Pattern recognition (Pattern
Ciassifleation and Scene Analysis Secoud Edition, 2000. (Chapters l.l to
1.4,2.1 to 2.11,4.1 to 4.', 4. to 4.11,5.1 tO 5.8 10.1 to 10.14)
2. Roberrj. Schalkoff: Pattern Recognition: Statistical ,Structuial and
Neural approaches, John Wiley and Sons,Inc .New York(Chapters 10 and 11)
Subject Code CS8J3 / IS8J3 Subject
Title Management in Engineering Total contact hrs 48
Duration
of Exam:3hrs
Max. Exam. Marks 100
Max.
l.A. Marks 25
1.Nature of Organizations
Introduction, The aim of organizations (corporate objeetives), .The
organizations, Strategies for survival . Case study- JP Engineering. 8hrs
2. Personnel Management
Case study and Introduction, Structure of organizations Employing people,
Motivation and leadership. Appraisal of employees, Training and development,
Job design and payment systemm. (12 hrs)
3. Team working and creativity
Introduction, Team working , Group dynamic.;. Managing the creativc process.
8 hrs
4. Personal management
Introduction, Personal organization, Qbjective setting, Self-appraisal. (8
hrs)
5. Communication skills
Introduction, Communications in the workplace, Information gathering,
Written communications, Oral Communications, 'Managing meetings, Case study:
Stephen Lever. (8 hrs)
6. Engineering management in practice
The vocation of engineering management .The Cu 100 project at oxford lasers
ltd,.The Cu-100 project debrief. 6hrs
Text Book:
1. Management in Engineering- Gail Freeman;Bell James Balkwill. - PHI
Reference Book:
1. Management - A Global Perspective- Koontz, O'Donnell and \V. Heinz
-International Saunders Editions
Subject Code CS8K1/IS8K1 Duration
of Exam 3 Hrs
Subject Title Robotics
Max. Exam. Marks:100
Total contact hrs 48
Max.
I.A. Marks 25
Contents:
I. INTRODUCTION : 3hrs
Background, The Mechanics and control of mechanical manipulators, Notations.
2. SPATIAL DESCRIPTIONS AND TRANSFORMATIONS: 12 hrs
Introduclion; Descriptions: Positions, Olientations and flames, Mappings:
changing descriptions from franie to frame, Operators;Transformation,
rotations, Transformation,Summary of interpretations, Transformation,
arithimetic , Transformation,equations,More on representations: Summary of
interpretations. Transformation,of free vectors, Computational
consideratious.
3.MANlPULATOR KINEMATICS: 12 Hrs
Introduction, Link description Link Connection Description, Convention
of frames to links, Manipulators Kinematics. Inverse Manipulator Kinematics
: Introduction, Solvability, Repeatability and accuracy.
4. MANIPULATOR MECHANISM DESlGN: 6Hrs.
Introduction, Basing the design on task requirements, Kinematic
Configuration, Position Sensing, i'orce sensing.
5. LINEAR CONTROL OFMANIPULATORS 3 HRS
Introduction, Feed back and Closed loop Control, Second-order linear
Systems, control of secoid order Systems
6. ROBOT PROGRAMMING LANGUAGES AND SYSTEMS: 6 Hrs
Introduction, The three levels of robot programming, A sample application,
Requirements Prograniniing Language, problem peculiar to robot programming
languages. of a Robot
7. OFF-LINE PROGRAMMIG SYSTEMS: 6 Hrs
Introduction, Central issues in OLP systems, CimStation, Automating subtasks
in OLP systems,
TextBook:
1.Introduction to Robotics -Mechanics and Control ,Jhno J.Craig Addison
Wesley 2nd Edition 1999(chapter 1,2,3.1to 1
Reference Books:
1.K.S.Fu.R.C.Gonzalez,C.S.G.Lee Robotics-Control ,Sesing ,Vision and
Intelligence,McGraaw Hill Book Company.
2.Fundamentals of Robotics -Anlysis and control ,Robert J.Schilling
(Prentice Hall of India),1996
Subject Code:CS8K2/IS8K2 Duration
of Exam:3hrs
Subject Title:Data Warehouses Max.Marks:100
Max.I.A.Marks :25
Total contact hrs:48
Content:
1.Introduction 6hrs
what is data warehouse?Delivery Process,Architectures system Process-overview,Typical
process flow within a data warehouse,extract and load process ,clean and
tranfrom process ,backup and archive process.Quality management
process;Proces Architecture -Load manger,Warehouse manger,Query
manager,Detailed Infromation ,Summary Infromation,Metadata,Data marting
2.Design-I
Database Schema: Starflake schemas ,Identifying facts and
dimensions;Designing fact tables.Dimension tables, and Starflake
schema;Query ,multidimensional schemas.Partitioning strategy:Horizontal
partitioning .Vertical partitioning .Hardware partitioning ;key for
partitionaing sizing the partition.Aggregations:why aggregate and what is an
aggregation ? Designing summary tables and deciding on the summaries to
create:
3. DESIGN-II 6hrs
Data Marting :When is a datamart appropriate?Designing data marts;Costs of
data marts.meta data Data transformation and laod; data mangaement ,Query
generation, metadata and tools.Process mangaers:Tools system Mangers and
Process mangers;local manger;warehouse manager;Query
manger.Security:Requirements:performance impact of security impacts on
design
4.OPERATIONS: 6hrs
Backup and recovery:Definitions;backup strategies ,testing the
strategy.disaster recovery Service level agreement:Types of
system;defining the serve level Agreement.Operating the warehouse
.day-to-Day operations;overnight processing .Capacity Planning :the process
estimating the load.Tunning :Assessing the performance :Tunning the dtad
load;Tunning queries .Testing ;Test plan :Testing backup recovery
,Operational environment ,databse ,and the application;Logistics of the
test.
5.BUILDING A WAREHOUSE USING ORACLE-I 12HRS
The Physical data warehouse :VLDB,NLS,parallelism;gathering statics for
optimization.Table space segregation,Implementation;Dual Schema
approach;Physical Impelmentation check list moving datainto warehouse
database objects:SQL loader Import and Export .Dta mart state;engine -based
tools ;code generation tools ;transparent gareways .partitioning
.partitioning option;traditional partitioning ;striping .indexing the
warehouse .what columns to index;single column and composite indexes.
6.IMPLEMENTATION 12HRS
Backup:backup recovery and restoration .Sercurity :Policy :tool based
security:PAsswork security:management of database users .Enterprise manager
and security .Getting data to the users Query tools;Using SQL plus Oracle
discover:Impromptu.Ralational OLAP and aggregate navigators OLAP,ROLAP and
MOLAP.Data Modeling.The three faces of ROLAP.OLAP.Tools Evaluation.Setting
up OLAP models.Data mining .What is data mining ?Benefints,Techniques
and solution checklist .Data ware house and WWW,intranets.
Text Books:
1. Sam Anahory, Dennis Murray:Data Warehousing, Addison-Wesley, 1997.(
Chapters 1 to 10.13 to 19).
2. Corey et al : ORACLE S - Data Warehousing, Tata NIcGra\v Hili,
199S.(Chapters 7,8,9,10,1 1,12,14,15,16,18,19)
Reference Books:
I. Mark Humphries et al: Data Warehousitig, Addison-Wesley. 1999.
2. William H Inmon: Building the Data Warehouse (Second Edition), John
Wiley, 1996.
3. Pieler Adriaans and Dolt Zantinge:Data Niming, Addison-Wesley,1996
Subject Code CS8K3 /IS8K3
Duration of Exam. 3 hrs
Subject Title Web Commerce Max Exam
MArks:100
Total contact hrs:48 Max.I.A.Marks:25
Contents:
1.INTRODUCTION
Electronic Comerce Environment and opportunties Background .The
electronic Commerce environmrnt. Electronic marketplace technologies.Modes
of electronic commerce: Overview, Electronic Data Interchange (EDI),
Migration to open EDI, e-commercewith Intemet/WWW, CommerceNet Advocacy. Web
Commerce Going Fortvard. Approaches ,o to safe e-commerce: Overview, Secure
Transport protocol, SecureTransactions secure Electronic Payment Protocol
Secure Electronic Transaction, Certificate for Authenticatio Security on Web
Servers and Entcrprise Networks.
1.PAYMENTS AND SECURITY 12hrs
Electronic Payment Systems: Types, Digital Token-Based Electronic Payment
Systems Smart cards and Electronic Payment Systems, Credit card-Based
Electronic Payment Systems. Risk and Electronic Payment Systems, Designing
Electronic Payment Systems. Master card/Visa secure elecronic transaction
Introduction, Business Requirern tits, Concepts, Payment Processing e-maoil
and secure e-mail technologies .Introduction .The means of distribution ,A
Model for message Handling.working of e-mail ,MIME,S/MIME and MOSS
,Comparisons of security methods ,MIME and related facilities for EDI over
the Internet.
I.APPLICATIONS-I 12hrs
Consumer-Oriented e-commerce:Applications,Mereantile process models
,Mercantile Models from the Consumer's Perspective and from theMerchants
Perspective. interorganizational commerce and EDI/EDI.Application ED! in
business, legal, Security and Privacy Issues; EDI and e-Commerce;
Standardization and DI., ED! Software Istandardization and. EDI Envepe for
Message Transport. ;!alue Added Networks, Internet-Based EDI.
intraorganizational e-Commerce: Interna Information systems, Niacroforces
and Internal Commerce, Workflow Automation and Coordination, Customization
and Internal Commerce, Supply Chain Management.
1. APPLICATIONS-II 12hrs
Advertising and Marketing: The New Age of Information-Based
Marketing, Advertising on the Internet, Charting the On-Line Marketing
Process, Marketing Research. Consumer search and Resources Discovery: Search
and Resource Discovery Paradignis, Information Search and Retrieval, e
Commerce Catalogs or Directories, Information Filtering, Consumer-Data
Interface: Emerging Tools Eleetionic Pi~blishing: EP and Web-Bascd EP,
Intellectual Property Issues in the Age of EP Intellectual Property Issues
for Multimedia I' Hypermedia Develupment.
Text Books:
1. DanIel Minoli, Emitia Minoll: Web Commerce Technology Handbook, Tata
McGraw -Hill, l998 (Chapters 1,2,3,6,7,11).
2. Ravi Kalakota, Andrew B. Whinston:Frontiers of lectronic Commerce
.Addison Wesley 1996.(Chapters l,7,8,9,10,11,13,' .)
Reference Books:
1. Danici Lynch and Leslie Lundquist: Digital: Money: The New Eraof Internet
Commerce. J0h Wiley, 1996.
Subject Code CS8K4 / IS8K4 Subject
Title:Genetic Algorithms
Duration of Exam:3hrs
Total contact hrs:48
Max Exam Marks:100 Max.I.A.Marks:25
1 GENETIC ALGORITHMS
Robustness of traditional optimization and search techniques .Goals of
optimization ,A Simple General ,Algorithm,Similarity Templates. 12 hrs
2 MATHEMATICAl FOUNDATIONS
Fundamental theorem. Schems, Processing, 2 armed and K armed bandit problem,
building block hypothesis, minimal deceptive, similarity templates as hyper
planes. 12 hours
3 COMPUTER IMPLEMENTATION OF GENETIC ALGORITHMS
Data structure, reproduction, crossover and mutation, mapping objecti'
functions to fitness for, fitness scaling 12 hours
4 ADVANCED OPERATORS AND TECHNIQUFS IN GENETIC ALGORITHMS SEARCH Dominance,
Diploidy and abeyance, inversion and other re-ordering operators, Macro
operators, niche and special speciation, multi objective optimization,
knowledge based techniques, Genetic Algorithms and Parallel processors,
Genetic Based machine learning, Classifier Systems. 12 hours
5 INDUSTRIAL APPLICATION OF GENETIC ALGORITHMS
Datamining using genetic Algorithms, using genetic operators to d~s~inguish
chaotic behavior from Noise in a time series
Text Books:
1 David Goldberg, Genetic Algorithms in search, optimization and machine
learning, Addison wesley International student edition, 1999. (Chapter 1, 2,
3 (Pages 59 to 79 both inclusive), 5, 6)
2Charles L Karr and L. Michael Freeman, Industrial applications of Genetic
Algorithms, CRC Press, Washington DC, 1998 (Chapters: 9, 13)
Subject Code CS8K5/IS8K5
Duration of Exam 3hrs
Subject Title Cryptography and Network Security
Max. Exam. Marks :100
Max. I.A. Marks 25
Total contact hrs 48
Contents:
1. Cryptography-I
12hrs
Introduction: Attacks, Services, and Mechanisms, Security Attacks, Secutirty
services, A Model Internetwork Security. Conventional Encryption Model,
Steganography, Classical ncryption Techniques. Simplified DES, Block Cipher
Principles, The Data Encryption Standarad, Strength of DES, Differential and
Linear Cryptanalysis. Algorithms: Triple DES, International Data F ryption
Algorithm, Blowfish. Confidentiality Using Conventinal Encryption: Placement
of Lncryption Function, Traffic Cotifidentiality, Key Distrubution, Random
Number Generation.
2. Cryptography-II 12Hrs
Public-Key Cryptography: Principles of Public-Key Cryptosysteins, The RSA
Algorithm, Key Management, Diffie-Heilman Key Exchange. Number Theory: Prime
and Relatively Prime Numbers, Modular Arithmetic, Fermat's and Euler's
Theorems, Testing for Primality, EulersAlgorithms The Chinese Remainder
Theorem, Discrete Logarithms. Message Authentication and Hash Functions:
Authentication Requirements, Authentication Functions, Message
Authentication Codes, MD5 Message Digest Algorithm. Digital Signatures and
Authentication Protocols: Digital Signatures, Authentication Protocols,
Digital Signature Standarad.
3, Network Security-I 12Hrs
Authentication Applications: Kerberos, X.509 Directory Authentication
Service. Electronic Mail Security: Pretty Good Privacy, S/MIME. IP Secuny:
IP Security Overyiew, IP Security Architecture, Authentication Header,
Encapsulating Security Payload, Combining Security Associations, Key
Management.
Text
Book:
William Stallings: Cryptography and network security edition .Perntice -hall
1998.(Chapters 1,2,3.1 to 3.5,4.1 to4.3,5,6.1to6A, 7,8.1 to
8.3,9.1,10,11,12,13,14,15,16)
References:
1.Richard E. Smith: Internet Cryptography, Addis6n-Wesley 1997.
2. Chapmaw,D nad Zwicky ,E,Building Internet Firewalls ,O'Reilly ,1995
3.Derek Atkins et al: Internet Security ,Professional Reference(Second
Edition) TechMedia,1997
4.Chris Breton:Mastering Network Security ,BPB,1995
5.Charlie Kaufman,Radia Perlman,Mike Speciner,Network Security :Private
Communication in a public World PTR Prenttice Hall ,1995