Artificial Intelligence: Introduction, Intelligent Agents: Agents & Environments, Concept of Rationality, Nature & Structure of Agents; Problem Solving: Solving Problems by Searching, Classical Search, Adversarial Search, Constraint Satisfaction Problems. Knowledge, Reasoning and Planning: Logical agents, First order logic, Inference in First order logic.
Module-2 (13 hours)Classical planning, Knowledge Representation; Uncertain Knowledge and Reasoning: Probabilistic Reasoning, Learning from Examples, Knowledge in Learning; Natural Language Processing: Language models, Text Classification, information retrieval, information extraction
Module-3 (12 hrs)Natural Language for Communication: Phrase structure Grammars, Syntactic Analysis, Augmented grammars and semantic interpretation, Machine translation, Speech recognition; Perception; Expert Systems: Introduction, Design of Expert systems.
Text Books:Introduction: Object orientation & Object oriented development, Modeling Concepts: Modeling as a design technique, Class Modeling, advanced class modeling, State Modeling, advanced State Modeling, Interaction Modeling, advanced Interaction Modeling.
Module-II (13 hours)Analysis and Design: Process overview, system Conception, Domain Analysis, System Design, Class design.
Module-III (12 hours)Implementation: Implementation Modeling, Object Oriented (OO) Languages, Databases, Programming Style.
Text Books:Internet and Web Technology: Introduction and overview, Internetworking concept and architectural model, classful internet addresses, classless and subnet address extensions (CIDR), Protocol Layering, , Mobile IP, Client Server model, World wide web, Voice and Video over IP. Web Programming:- Web 2.0, Web Browsers, Web Servers, URLs, URN, URI, Basics of HTML & XHTML Programming: Syntax, Document structures, images, hyperlinks, List, Tables, Forms, Frames, CSS, Basic JavaScript Programming: DOM, Loops, function and arrays. XML: Document structure, DTD, Namespaces, XML Schema, and Parsing XML documents.
Module-II (15 hours)Enterprise Java Programming: Overview, Java EE 6 API, Web Applications, Java Servlet Technology: - Lifecycle of a Servelet, Servelet API, Servlet Packages, Types of servlets, Database Access, Stateless and Stateful protocols, Session Tracking. JSP Technology: - Architecture & Anatomy of JSP Page, JSP life cycle, JSP with MVC Architecture, Dynamic webpage Creation, Scripting Elements, Session Tracking, Database access, JSTL, JavaServer Faces (JSF) Technology, Facelets, Ajax.
Module-III (10 hours)Web Services: Building Web services with JAX-WS, Enterprise JavaBeans Technology: EJB Component Architecture, Role of EJB & its life cycle, Types of Beans, Stateless and stateful beans, Security features of EJB, Contexts and Dependency Injection for the Java EE Platform; Java Persistence API, Security in Java EE, Java EE Supporting Technologies: Introduction, Transactions and Resource Connections.
Recommended Books:Markov Chain: Stochastic Processes, Markov chains, Chapman-Kolmogorov equations, States of a Markov chain, Properties of Markov chains, Continuous time Markov chains. Markov Decision Process: Model for Markov decision Process, Linear programming and optimal policies, Policy improvement algorithm, Discounted cost criterion
Module-2 (12 hours)Random numbers, Psedo random number generation, Using random numbers to evaluate integrals, Generation of discrete random variables: Inverse transform method, generating Poisson and Binomial random variables, the acceptance � rejection technique Generating continuous random variable : The inverse transform algorithm, the rejection method, the polar method for generating normal random variables, generating Poisson process. Discrete event simulation approach: Simulation via discrete event, the single server queuing system, Queuing system with two servers in series and with two parallel servers, Inventory model.
Module-3 (12 hrs)Variance reduction technique: Use of antithetic variable, use of control variates, variance reduction by conditioning, stratifies sampling, Importance sampling. Statistical validation techniques: Goodness of fit tests, Chi-square goodness of fit test for discrete data, Kolmogorov- Smirnov test for continuous data, Goodness of fit test when some parameters are unspecified, two sample problem.
Text BooksDistributed systems: Definition, goals, types of Distributed Systems, Architectures, Key characteristics-resource sharing openness, concurrency, scalability, fault tolerance, transparency; Design issues, naming, communication, software structure, workload allocation, consistency maintenance; User requirement, functionality, Quality of service, reconfigurability; Interprocess communication, building blocks, client server communication; CORBA's Common Data Representation (CDR); Java object serialization; Extensible markup language (XML); Remote object references; Inter-process communication in UNIX; Remote procedure calling; Design issues, interface definition language exception handling; Implementation - interface processing, communication handling; Binding, Case study: sun RPC Vs. Java RMI.
Module-II (12 hours)Distributed Operating systems: kernel, processes and threads, Naming and protection - Communication and Invocation, virtual memory, Distributed file services - design issues, interfaces, implementation techniques, Case study sun NFS, Name services: Name spaces; Name resolution, Domain Name System, SNS and DNS, Peer-to-Peer Systems. Coordination and Agreement: Time and Global States, Time and co-ordination, Synchronizing physical clocks- logical time and logical clocks, Distributed co-ordination, distributed mutual exclusion, elections, Replication, basic architectural model, consistency and request ordering.
Module-III (12 hours)Distributed Transactions, Recovery and fault tolerances: Transaction recovery, logging -shadow versions, fault model for transaction; Fault tolerance: characteristics; Hierarchical and group masking of faults; Security, authentication and key distribution, logic of authentication, digital signatures; Web Services: SOAP, XML, CORBA, Distributed object based systems, Distributed file systems, Distributed web- based systems, Distributed co-ordination based systems.
Text Books:Introduction to Parallel Computing; Motivating Parallelism, Scope of Parallel Computing; Parallel Programming; Platforms : Implicit parallelism, Limitation of Memory System Performance, Dichotomy of Parallel Computing Platforms, Physical Organization of Parallel Platforms, Communication Costs of Parallel Machines, Routing Mechanism for Interconnection Networks, Impact of Process-processor Mapping and Mapping Techniques.
Module-II (12 hours)Principles of Parallel Algorithm Design : Preliminaries, Decomposition Techniques, Characteristics of Tasks and Interactions, Mapping Techniques for Load Balancing, Methods for containing interaction Overheads, parallel Algorithm Models. Analytical Modelling of Parallel Programs : Sources of Overhead in Parallel Programs, Performance metrics for parallel systems, the effect of Granularity on Performance, Scalability of Parallel Systems, minimum Executuion time and minimum cost-optional Execution Time, Asymptotic Analysis of Parallel Programs, other Scalability Metrics.
Module-III (12 hours)Basic Communication Operations: One-to-All Broadcast and All-to-One Reduction, All-to-All Broadcast and Reduction, Scatter and Gather, All-to-All Personalized Communication, Circular Shift. Introduction to MPI Principles of Message - Passing Programming, The Building Blocks (Send and Receive Operations), MPI (the Message Passing Interface), Collective Communication and Computation Operations, Examples of Matrix - Matrix multiplication, One dimensional Matrix Vector Multiplication using MPI.
Text Books:Introduction: The digitized image and its properties: Applications of image processing, image function, image representation, sampling, quantization, color images, metrics and topological properties of digital images, histograms, image quality, noise image.
Module-II (12 hours)Image preprocessing: Pixel brightness transformation, position dependent brightness correction, gray scale transformation; geometric transformation, local preprocessing- image smoothening, edge detectors, zero-crossing, scale in image processing, canny edge detection, parametric edge models, edges in multi spectral images, local preprocessing and adaptive neighborhood pre processing; image restoration. Image Segmentation: Threshold detection methods, optimal thresholding, multispectral thresholding, thresholding in hierarchical data structures; edge based image segmentation- edge image thresholding, edge relaxation, border tracing, border detection.
Module-III (12 hours)Mathematical Morphology: Basic morphological concepts, four morphological principles, binary dilation, erosion, Hit or miss transformation, opening and closing; thinning and skeleton algorithms; Morphological segmentation -particles segmentation and watersheds, particles segmentation. Image textures: Statistical texture description, methods based on spatial frequencies, co-occurrence matrices, edge frequency, and texture recognition method applications. Image representation and description: Representation, boundary descriptors, regional descriptors
Text Books:Web-based Systems, Web Engineering, A Web Engineering Process, Communication, Planning.
Module-II (12 hours)Modeling Activity, Analysis Modeling For Web Applications, Web Application Design, Interaction Design, and Information Design.
Module-III (12 hours)Functional Design, Construction and Deployment, Design Patterns, Technologies and Tools, Web Applications Testing, Change and Content Management, Future Directions.
Text Books:The Security Problem in Computing: The meaning of computer Security, Computer Criminals, Methods of Defense; Elementary Cryptography: Substitution Ciphers, Transpositions, Making �Good� Encryption Algorithms, Private-Key Cryptosystems, The Data Encryption Standard, The AES Encryption Algorithm, Public-Key Cryptosystems, Public Key Encryptions, Uses of Encryption, Pseudo-randomness, and Hashing.
Module-II (12 hours)Program Security : Secure Programs, Non-malicious Program Errors, viruses and other malicious code, Targeted Malicious code, controls Against Program Threats, Protection in General-Purpose operating system protected objects and methods of protection memory and address protection, File protection Mechanisms, User Authentication Designing Trusted O.S : Security polices, models of security, trusted O.S. design, Assurance in trusted OS, Implementation examples. Digital Signatures, Authentication, Secret Sharing, Group-oriented cryptography, Identification.
Module-III (12 hours)Data base & Network Security: Security requirements, Reliability and integrity, Sensitive data, Inference, multilevel database, proposals for multilevel security; Security in Network; Threats in Network, Network Security Controls, Firewalls, Intrusion Detection Systems, Secure E-mail. Administering Security: Security Planning, Risk Analysis, Organizational Security policies, Physical Security; The Economics of Cyber security; Privacy in Computing; Legal and Ethical Issues in Computer Security: Protecting Programs and data, Information and the law, Rights of Employees and Employers, Software failures, Computer Crime, Case studies of Ethics.
Textbooks:Software Architecture: Introduction, Architectural Styles, Shared Information Systems, Architectural Design Guidance, Formal Models and Specifications, Linguistic Issues. Role of Software Design: Nature of the Design Process, Software Design Process, Design in the Software Development Process, Design Qualities.
Module-II (12 hours)Transferring Design Knowledge: Describing a Design Solution, Transferring Design Knowledge, Design Representations, and Rationale for Method, Design Processes and Design Strategies, Design Patterns.
Module-III (12 hours)Design Principles: Correctness and Robustness, Flexibility, Reusability, and Efficiency. Design Practices: Stepwise Refinement, Incremental Design, Structured Systems Analysis and Structured Design, Jackson Structured Programming, Jackson System Development, Designing with Objects, Component-Based Design, Formal Approach to Design.
Text Books:Molecular Biology and Biological Chemistry: The Genetic Material, Gene structure and Information Content, Protein Structure and Function, The nature of Chemical bonds, Molecular Biology Tools, Genomic Information Content, Data Searches and Pairwise Alignments: Dot Plot, Simple Alignments, Gaps, Scoring Matrices, Needleman and Wunsch Algorithm, Global and local Alignments, Database searches, Multiple sequence Alignments, Substitution Patterns: Patterns of substitutions within Genes, Estimating Substitution numbers, Variations in evolutionary rates between Genes, Molecular clocks, evolution in Organelles.
Module-II (12 hours)Distance based methods of Phylogenetics: History of Molecular Phylogenies, Phylogenetic trees, Distance matrix methods, Maximum likelihood approaches, Multiple sequence Alignments, Character Based methods of Phylogenetics: Parsimony, Inferred ancestral sequences, Strategies for Faster searches, Consensus trees, tree confidence, Comparison of Phylogenetic methods, Molecular Phylogenies.
Module-III (12 hours)Genomics and Gene Recognition: Prokaryotic genomes, Prokaryotic gene structure, GC-content Prokaryotic genomes, Prokaryotic gene density, Eukaryotic genomes, Eukaryotic gene structure, Open reading frames, GC-content Eukaryotic genomes, Gene expression, Transposition, Repetitive elements, Eukaryotic gene density, Protein and RNA structure prediction: Amino acids, Polypeptide composition, Secondary structure, Tertiary and quaternary structure, Algorithms for Modeling Protein Folding, Structure prediction, Predicting RNA secondary structures, Proteomics: from Genomes to Proteomes, Protein classification, Experimental techniques, Inhibitors and drug design, Ligand screening, X-ray crystal structures, NMR structures, Empirical methods and prediction techniques, Postranslational modification prediction. .
Text Books:Introduction to intelligent systems and soft computing: Introduction, Intelligent systems, Knowledge-based systems, Knowledge representation and processing, soft computing. Fundamentals of fuzzy logic systems: Introduction, background, fuzzy sets, generalized fuzzy operations, implication, definitions, fuzziness and fuzzy resolution, fuzzy relations, composition and inference, considerations of fuzzy decision making.
Module-II (10 hours)Fundamentals of artificial neural networks: introduction, learning and acquisition of knowledge, features of artificial neural networks, fundamentals of connectionist modeling. Classes of neural networks: introduction, multilayer perceptron, radial basis function networks, Kohonen�s self-organizing network, Hopfield network, industrial and commercial applications of ANN.
Module-III (10 hours)Neuro-fuzzy systems: introduction, background, architectures of neuro-fuzzy systems, construction of Neuro-fuzzy systems. Evolutionary computing: introduction, overview, genetic algorithms and optimization, the schema theorem, genetic algorithm operators, integration of genetic algorithms with neural networks, integration of genetic algorithms with fuzzy logic, known issues in GAs, population-based incremental learning, evolutionary strategies, ES applications.
Text Books: