COURSE HAND-OUT B.TECH. - SEMESTER VIII

Size: px
Start display at page:

Download "COURSE HAND-OUT B.TECH. - SEMESTER VIII"

Transcription

1 COURSE HAND-OUT B.TECH. - SEMESTER VIII DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING

2 RAJAGIRI SCHOOL OF ENGINEERING AND TECHNOLOGY (RSET) VISION TO EVOLVE INTO A PREMIER TECHNOLOGICAL AND RESEARCH INSTITUTION, MOULDING EMINENT PROFESSIONALS WITH CREATIVE MINDS, INNOVATIVE IDEAS AND SOUND PRACTICAL SKILL, AND TO SHAPE A FUTURE WHERE TECHNOLOGY WORKS FOR THE ENRICHMENT OF MANKIND MISSION TO IMPART STATE-OF-THE-ART KNOWLEDGE TO INDIVIDUALS IN VARIOUS TECHNOLOGICAL DISCIPLINES AND TO INCULCATE IN THEM A HIGH DEGREE OF SOCIAL CONSCIOUSNESS AND HUMAN VALUES, THEREBY ENABLING THEM TO FACE THE CHALLENGES OF LIFE WITH COURAGE AND CONVICTION Department of CSE, RSET 2

3 DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING (CSE), RSET VISION TO BECOME A CENTRE OF EXCELLENCE IN COMPUTER SCIENCE & ENGINEERING, MOULDING PROFESSIONALS CATERING TO THE RESEARCH AND PROFESSIONAL NEEDS OF NATIONAL AND INTERNATIONAL ORGANIZATIONS. MISSION TO INSPIRE AND NURTURE STUDENTS, WITH UP-TO-DATE KNOWLEDGE IN COMPUTER SCIENCE & ENGINEERING, ETHICS, TEAM SPIRIT, LEADERSHIP ABILITIES, INNOVATION AND CREATIVITY TO COME OUT WITH SOLUTIONS MEETING THE SOCIETAL NEEDS. Department of CSE, RSET 3

4 B.TECH PROGRAMME PROGRAMME EDUCATIONAL OBJECTIVES (PEOs) 1. Graduates shall have up-to-date knowledge in Computer Science & Engineering along with interdisciplinary and broad knowledge on mathematics, science, management and allied engineering to become computer professionals, scientists and researchers. 2. Graduates shall excel in analysing, designing and solving engineering problems and have life-long learning skills, to develop computer applications and systems, resulting in the betterment of the society. 3. Graduates shall nurture team spirit, ethics, social values, skills on communication and leadership, enabling them to become leaders, entrepreneurs and social reformers. PROGRAMME OUTCOMES (POs) Graduates will be able to achieve a. An ability to apply mathematical foundations, algorithmic principles, and computer science theory in the modelling and design of computer-based systems. b. An ability to identify, analyse, formulate and solve technical problems by applying principles of computing and mathematics relevant to the problem. c. An ability to define the computing requirements for a technical problem and to design, implement and evaluate a computer-based system, process or program to meet desired needs. d. An ability to learn current techniques, skills and modern engineering tools necessary for computing practice. e. An ability to carry out experiments, analyse results and to make necessary conclusions. f. An ability to take up multidisciplinary projects and to carry out it as per industry standards. g. An ability to take up research problems and apply computer science principles to solve them leading to publications. h. An ability to understand and apply engineering solutions in a global and social context. i. An ability to understand and practice professional, ethical, legal, and social responsibilities as a matured citizen. j. An ability to communicate effectively, both written and oral, with a range of audiences. Department of CSE, RSET 4

5 k. An ability to engage in life-long learning and to engage in continuing professional development. l. An ability to cultivate team spirit and to develop leadership skills thereby moulding future entrepreneurs. INDEX SCHEME: B.TECH 8TH SEMESTER 6 CS High Performance Computing 7 COURSE INFORMATION SHEET 7 COURSE PLAN 10 CS Artificial Intelligence 14 COURSE INFORMATION SHEET 14 COURSE PLAN 17 CS Security in Computing 19 COURSE INFORMATION SHEET 19 COURSE PLAN 22 CS L05 Mobile Computing 24 COURSE INFORMATION SHEET 24 Course Plan 31 CS L06 Advanced Networking Trends 34 COURSE INFORMATION SHEET 34 Course Plan 37 CS G02 Neural Networks 39 COURSE INFORMATION SHEET 39 COURSE PLAN 42 CS G05 Natural Language Processing 44 COURSE INFORMATION SHEET 44 CS Computer Graphics Lab 48 COURSE INFORMATION SHEET 48 COURSE PLAN 51 CS Project 54 COURSE INFORMATION SHEET 54 Department of CSE, RSET 5

6 SCHEME: B.TECH 8TH SEMESTER (Computer Science & Engineering) Mahatma Gandhi University Revised Scheme for B.Tech Syllabus Revision 2010 Hours/Week Marks End-Sem Code Subject Inter End- duration Credits L T P/D -nal Sem hours CS High Performance Computing CS Artificial Intelligence CS Security in Computing CS010 Elective III 804Lxx CS010 Elective IV 805Gxx CS Computer Graphics Lab CS Project CS Viva Voce Total Electives III CS L01 E-commerce CS L02 Grid Computing CS L03 Biometrics CS L04 Optimization Techniques CS L05 Mobile Computing CS L06 Advanced Networking Trends Electives IV CS G01 Multimedia Techniques CS G02 Neural networks CS G03 Advanced Mathematics CS G04 Software Architecture CS G05 Natural Language Processing CS G06 Pattern Recognition Department of CSE, RSET 6

7 CS High Performance Computing COURSE INFORMATION SHEET PROGRAMME: COMPUTER SCIENCE & ENGINEERING DEGREE: BTECH YEAR: JAN 2014 JUNE 2014 COURSE: HIGH PERFORMANCE COMPUTING SEMESTER: VIII CREDITS: 4 COURSE CODE: CS COURSE TYPE: CORE /ELECTIVE / BREADTH/ S&H COURSE AREA/DOMAIN: COMPUTER HARDWARE CONTACT HOURS: 3+2 (Tutorial) hours/week. CORRESPONDING LAB COURSE CODE (IF ANY): LAB COURSE NAME: SYLLABUS: UNIT DETAILS HOURS I Introduction to parallel processing - Trends towards parallel processing - Parallelism in uniprocessor - Parallel computer structures-architecture classification schemes,amdahl s law,indian contribution to parallel processing. 15 II Principles of pipelining and vector processing - Linear pipelining - Classification of pipeline processors - General pipelines - Instruction and Arithmetic pipelines Design of Pipelined instruction unit-principles of Designing Pipeline Processors- Instruction prefetch and branch handling- Data Buffering and Busing Structure-Internal forwarding and register tagging- Hazard detection and Resolution,Dynamic pipelines and Reconfigurability 15 III IV V Array processors - SIMD array processors - Interconnection networks - Static vs dynamic networks - mesh connected networks - Cube interconnection networks - Parallel algorithms for array processors - SIMD matrix multiplication-parallel sorting on array processors - Associative array processing - Memory organization. Multiprocessor architectures and Programming - Loosely coupled and Tightly coupled multiprocessors - Interconnection networks - Language features to exploit parallelism Inter process communication mechanism-process synchronisation mechanisms, synchronization with semaphores. Dataflow computers - Data driven computing and Languages, Data flow computers architectures - Static data flow computer, Dynamic data flow computer,data flow design alternatives TOTAL HOURS 60 TEXT/REFERENCE BOOKS: T/R BOOK TITLE/AUTHORS/PUBLICATION T R1 R2 R3 R4 R5 R6 R7 Computer Architecture & Parallel Processing - Kai Hwang & FayeA.Briggs,Mc Graw Hill Computer architecture A quantitative approach - John L Hennessy and David A.Patterson- ELSEVIER, Fourth Edition Elements of Parallel computing - V. Rajaraman - PHI Super Computers - V. Rajaraman - Wiely arstern Parallel Processing for Super Computers & AI Kai Hwange & Douglas Degneot Mc Graw Hill Highly parallel computing - George S. Almasi,Allan Gottlieb. - Benjamin Cumings Publishers. HIgh Performance Computer Architecture - Harold S. Stone, Addison Wesley. Advanced Computing- Vijay P.Bhatkar, Asok V.Joshi, Arirban Basu, Asok K.Sharma. Department of CSE, RSET 7

8 COURSE PRE-REQUISITES: C.CODE COURSE NAME DESCRIPTION SEM CS010 COMPUTER ORGANISATION ARCHITECTURE III 304 COURSE OBJECTIVES: 1 To design a powerful and cost-effective computer system 2 To provide the basic concepts of parallel processing on high performance computers. COURSE OUTCOMES: SNO DESCRIPTION PO MAPPING 1 a Graduates will be able to classify and describe the operation of parallel computer architectures 2 Graduates will be able to understand the basic concepts of pipelining and related design issues. a, b 3 Graduates will be able to learn advanced concepts in multiprocessor architecture and interconnection networks c, d 4 Graduates will understand the concepts of parallelism especially inter process communication and synchronization a 5 Graduates will get a thorough knowledge of various design alternatives of dataflow computers c, d GAPS IN THE SYLLABUS - TO MEET INDUSTRY/PROFESSION REQUIREMENTS: SNO DESCRIPTION PROPOSED PO ACTIONS MAPPING 1 Study of RISC and CISC architectures Assignment d 2 Case study : IBM Power1( RS6000) Reading assignment c,d PROPOSED ACTIONS: TOPICS BEYOND SYLLABUS/ASSIGNMENT/INDUSTRY VISIT/GUEST LECTURER/NPTEL ETC TOPICS BEYOND SYLLABUS/ADVANCED TOPICS/DESIGN: Sl.No DESCRIPTION PO MAPPING 1 To study the internal structure of the processing elements in Illiac IV a, d 2 To study operating system requirements for multiprocessors a, d WEB SOURCE REFERENCES: 1 https://computing.llnl.gov/tutorials/parallel_comp/ 2 3 csd.ijs.si/courses/dataflow/ DELIVERY/INSTRUCTIONAL METHODOLOGIES: CHALK & TALK STUD. ASSIGNMENT WEB RESOURCES LCD/SMART BOARDS STUD. SEMINARS ADD-ON COURSES ASSESSMENT METHODOLOGIES-DIRECT ASSIGNMENTS STUD. SEMINARS TESTS/MODEL EXAMS UNIV. EXAMINATION STUD. LAB PRACTICES SIMPLE QUESTIONS MINI/MAJOR PROJECTS CERTIFICATIONS Department of CSE, RSET 8

9 ADD-ON COURSES IN TUTORIAL HOUR OTHERS ASSESSMENT METHODOLOGIES-INDIRECT ASSESSMENT OF COURSE OUTCOMES (BY FEEDBACK, ONCE) ASSESSMENT OF MINI/MAJOR PROJECTS BY EXT. EXPERTS STUDENT FEEDBACK ON FACULTY (TWICE) OTHERS Prepared by by Ms.Deepa John Approved Mr. Ajith S (H.O.D) Department of CSE, RSET 9

10 COURSE PLAN 2014 S8 CS CS HIGH PERFORMANCE COMPUTING Sl.No Module Planned 1 1 Day 1 Introduction to parallel processing 2 1 Day 2 Trends towards parallel processing 3 1 Day 3 Parallelism in Uniprocessor 4 1 Day 4 Parallelism in Uniprocessor 5 1 Day 5 Parallel computer structures 6 1 Day 6 Parallel computer structures 7 1 Day 7 Architecture classification schemes 8 1 Day 8 Architecture classification schemes 9 1 Day 9 Amdahl s Law 10 2 Day 10 Principles of pipelining and vector processing 11 2 Day 11 Linear pipelining 12 2 Day 12 Classification of pipeline processors 13 2 Day 13 General pipelines 14 2 Day 14 Instruction and Arithmetic pipelines 15 2 Day 15 Design of Pipelined Instruction Unit Department of CSE, RSET 10

11 16 2 Day 16 Design of Pipelined Instruction Unit 17 2 Day 17 Principles of Designing Pipeline Processors 18 2 Day 18 Instruction Prefetch and Branch Handling 19 2 Day 19 Instruction Prefetch and Branch Handling 20 2 Day 20 Data Buffering and Busing Structure 21 2 Day 21 Data Buffering and Busing Structure 22 2 Day 22 Internal forwarding and register tagging Day 23 Internal forwarding and register tagging Day 24 Hazard detection and Resolution 25 2 Day 25 Hazard detection and Resolution 26 2 Day 26 Dynamic pipelines and Reconfigurability 27 2 Day 27 Dynamic pipelines and Reconfigurability 28 3 Day 28 Array processors - SIMD array processors 29 3 Day 29 Array processors - SIMD array processors 30 3 Day 30 Interconnection networks 31 3 Day 31 Static vs dynamic networks 32 3 Day 32 mesh connected networks 33 3 Day 33 Cube interconnection networks 34 3 Day 34 Parallel algorithms for array processors - Department of CSE, RSET 11

12 35 3 Day 35 SIMD matrix multiplication 36 3 Day 36 SIMD matrix multiplication 37 3 Day 37 Parallel sorting on array processors 38 3 Day 38 Parallel sorting on array processors 39 3 Day 39 Associative array processing 40 3 Day 40 Associative array processing 41 3 Day 41 Memory organization 42 4 Day 42 Multiprocessor architectures and Programming 43 4 Day 43 Loosely Coupled and Tightly Coupled Multiprocessors 44 4 Day 44 Loosely Coupled and Tightly Coupled Multiprocessors 45 4 Day 45 Interconnection networks 46 4 Day 46 Language features to exploit parallelism 47 4 Day 47 Inter Process communication Mechanism 48 4 Day 48 Process synchronisation mechanisms 49 4 Day 49 Process synchronisation mechanisms 50 4 Day 50 synchronization with semaphores Day 51 synchronization with semaphores Day 52 Dataflow computers 53 5 Day 53 Data driven computing and Languages Department of CSE, RSET 12

13 54 5 Day 54 Data flow computers Architectures 55 5 Day 55 Static data flow computer 56 5 Day 56 Static data flow computer 57 5 Day 57 Dynamic data flow computer 58 5 Day 58 Dynamic data flow computer 59 5 Day 59 Data flow design Alternatives Day 60 Data flow design Alternatives. Department of CSE, RSET 13

14 CS Artificial Intelligence COURSE INFORMATION SHEET PROGRAMME: COMPUTER SCIENCE & ENGINEERING DEGREE: BTECH YEAR: JAN 2014 JUNE 2014 COURSE: ARTIFICIAL INTELLIGENCE SEMESTER: VIII CREDITS: 4 COURSE CODE: CS REGULATION: 2010 COURSE AREA/DOMAIN: RECENT TRENDS IN COMPUTING CORRESPONDING LAB COURSE CODE (IF ANY): SYLLABUS: COURSE TYPE: CORE CONTACT HOURS: 2+2 (Tutorial) hours/week. LAB COURSE NAME: UNIT DETAILS HOURS I Problems- problem spaces and search, production systems, Problem characteristics, Searching strategies Generate and Test, Heuristic Search Techniques- Hill climbing issues in hill climbing, General Example Problems. Python-Introduction to Python- Lists Dictionaries & Tuples in Python- Python 14 implementation of Hill Climbing II Search Methods- Best First Search- Implementation in Python- OR Graphs, The A * Algorithm, Problem Reduction- AND-OR Graphs, The AO* algorithm, Constraint Satisfaction. Games as search problem, MINIMAX search procedure, Alpha Beta pruning. III Knowledge representation -Using Predicate logic- representing facts in logic, functions and predicates, Conversion to clause form, Resolution in propositional logic, Resolution in predicate logic, Unification, Question Answering, forward and backward chaining IV V Learning- Rote Learning Learning by Advice- Learning in Problem Solving - By Parameter Adjustment with Macro Operators, Chunking, Learning from Examples- Winston s Learning Program, Version Spaces- Positive & Negative Examples Candidate Elimination- Decision Trees- ID3 Decision Tree Induction Algorithm. Fuzzy Sets Concept of a Fuzzy number- Operations on Fuzzy Sets Typical Membership Functions Discrete Fuzzy Sets. Expert System Representing and using Domain Knowledge Reasoning with knowledge Expert System Shells Support for explanation- examples Knowledge acquisition-examples TOTAL HOURS 60 TEXT/REFERENCE BOOKS: T/R R1 R2 BOOK TITLE/AUTHORS/PUBLICATION Elaine Rich, Kevin Knight, Shivashankar B Nair Tata McGraw Hill- Artificial Intelligence, 3rd Edn,2004. Stuart Russell Peter Narang, Pearson Education Asia - Artificial Department of CSE, RSET 14

15 R3 R4 Intelligence- A modern approach. George F Luger - Artificial Intelligence, Pearson Education Asia Allen B. Downey (Think Python) Python for software design- How to think like a computer scientist, Cambridge University press, COURSE PRE-REQUISITES: C.CODE COURSE NAME DESCRIPTION SEM CS Problem Solving & Computer Programming Knowledge of Programming Techniques III CS Data Structures and Algorithms knowledge of search and data structures, such as balanced binary trees. IV EN B Engineering Mathematics II Knowledge of mathematical strategies and graphs III COURSE OBJECTIVES: 1 Enabling Knowledge: Ability to apply artificial intelligence techniques, including search heuristics, knowledge representation, planning and reasoning. 2 Problem Solving: Ability to design and implement appropriate solutions for search problems (such as playing two-person games) and for planning problems (such as determining a sequence of actions for a robot). 3 Critical Analysis: Ability to analyse problem specifications and derive appropriate solution techniques for them. COURSE OUTCOMES: SNO DESCRIPTION PO MAPPING 1 Graduates will be able to assess critically the techniques presented and to apply them to real world problems b,c,d 2 Graduates will be able aware of the major challenges facing AI and the complexity of typical problems within the field b,e 3 Graduates will get to understand the major areas and challenges of AI c,e 4 Graduates will be able to apply basic AI algorithms to solve problems. a,b,c,d 5 Graduates will be able to get a knowledge of applications in different areas of computing including the web and human interaction a,b,e GAPS IN THE SYLLABUS - TO MEET INDUSTRY/PROFESSION REQUIREMENTS: SNO DESCRIPTION PROPOSED ACTIONS 1 Given a planning problem, be able to develop the proper representation Assignment for the problem in a planning language, and then create a plan using an appropriate planning method 2 Given a learning problem, be able to determine which learning techniques may be applied to this problem, and be able to outline a method to solve the problem Assignment PROPOSED ACTIONS: TOPICS BEYOND SYLLABUS/ASSIGNMENT/INDUSTRY VISIT/GUEST LECTURER/NPTEL ETC TOPICS BEYOND SYLLABUS/ADVANCED TOPICS/DESIGN: SNO TOPICS PO MAPPING 1 Agents and Intelligent agents d 2 Design a problem which uses A* Algorithm c,d WEB SOURCE REFERENCES: Department of CSE, RSET 15

16 Website for search strategy implementation in python DELIVERY/INSTRUCTIONAL METHODOLOGIES: CHALK & TALK STUD. ASSIGNMENT WEB RESOURCES LCD/SMART BOARDS STUD. SEMINARS ADD-ON COURSES ASSESSMENT METHODOLOGIES-DIRECT ASSIGNMENTS STUD. SEMINARS TESTS/MODEL EXAMS UNIV. EXAMINATION STUD. LAB PRACTICES STUD. VIVA MINI/MAJOR PROJECTS CERTIFICATIONS ADD-ON COURSES OTHERS ASSESSMENT METHODOLOGIES-INDIRECT ASSESSMENT OF COURSE OUTCOMES (BY FEEDBACK, ONCE) ASSESSMENT OF MINI/MAJOR PROJECTS BY EXT. EXPERTS OTHERS STUDENT FEEDBACK ON FACULTY (ONCE) Prepared by by Ms. Sangeetha Jamal Approved Mr. Ajith S (H.O.D) Department of CSE, RSET 16

17 COURSE PLAN SL NO TOPICS MODULE 1 problem spaces and search MODULE 1 2 production systems MODULE 1 3 Problem characteristics MODULE 1 4 Searching Strategies MODULE 1 5 Generate and Test MODULE 1 6 Heuristic Search Techniques MODULE 1 7 Hill climbing MODULE 1 8 issues in hill climbing MODULE 1 9 Introduction to Python- Lists Dictionaries & Tuples in Python MODULE 1 10 Python implementation of Hill Climbing MODULE 1 11 Best First Search MODULE 2 12 Implementation in Python OR Graphs MODULE 2 13 The A * Algorithm MODULE 2 14 Problem Reduction MODULE 2 15 AND-OR Graphs, The AO* algorithm MODULE 2 16 Constraint Satisfaction MODULE 2 17 Games as search problem MODULE 2 18 MINIMAX search procedure MODULE 2 19 Alpha Beta pruning MODULE 2 20 Using Predicate logic MODULE 3 21 representing facts in logic MODULE 3 22 functions and predicates MODULE 3 23 Conversion to clause form MODULE 3 24 Resolution in propositional logic MODULE 3 25 Resolution in predicate logic MODULE 3 Unification, Question Answering MODULE 3 Department of CSE, RSET 17

18 26 27 forward and backward chaining MODULE 3 28 Rote Learning MODULE 4 29 Learning by Advice MODULE 4 30 Learning in Problem Solving MODULE 4 31 By Parameter Adjustment with Macro Operators, Chunking, MODULE 4 32 Learning from Examples MODULE 4 33 Winston s Learning Program, Version Spaces MODULE 4 34 Positive & Negative Examples MODULE 4 35 Candidate Elimination MODULE 4 36 Decision Trees MODULE 4 37 ID3 Decision Tree Induction Algorithm MODULE 4 38 Concept of a Fuzzy number MODULE 5 39 Operations on Fuzzy Sets MODULE 5 40 Typical Membership Functions MODULE 5 41 Discrete Fuzzy Sets MODULE 5 42 Representing and using Domain Knowledge MODULE 5 43 Reasoning with knowledge MODULE 5 44 Expert System Shells MODULE 5 45 Support for explanation- examples MODULE 5 46 Knowledge acquisition-examples MODULE 5 Department of CSE, RSET 18

19 CS Security in Computing COURSE INFORMATION SHEET PROGRAMME: ENGINEERING COMPUTER SCIENCE & DEGREE: BTECH YEAR: JAN 2013 JUNE 2013 COURSE: SECURITY IN COMPUTING SEMESTER: VIII CREDITS: 4 COURSE CODE: CS COURSE TYPE: CORE /ELECTIVE / BREADTH/ S&H COURSE AREA/DOMAIN: RECENT TRENDS IN COMPUTING CORRESPONDING LAB COURSE CODE (IF ANY): NIL SYLLABUS: CONTACT HOURS: 3+1 (Tutorial) hours/week. LAB COURSE NAME: NIL UNIT DETAILS HOURS I Introduction: Security basics Aspects of network security Attacks Different types Security attacks -Security services and mechanisms. Cryptography: Basic Encryption & Decryption Classical encryption techniques symmetric encryption, substitution ciphers Caesar cipher Monoalphabetic Cipher, Playfair Cipher, Polyalphabetic cipher - 12 Vigenère Cipher, Transposition ciphers - Rail Fence cipher, Row Transposition Ciphers. II Modern Block Ciphers - Fiestel Networks, DES Algorithm Avalanche Effect. Introduction to Number Theory - Prime Factorisation, Fermat's Theorem, Euler's Theorem, Primitive Roots, Discrete Logarithms. Public key Cryptography:- Principles of Public key Cryptography Systems, RSA algorithms- Key Management Diffie-Hellman Key Exchange, Elliptic curve cryptography. 12 III Message Authentication-Requirements- Authentication functions- Message authentication codes-hash functions- Secure Hash Algorithm, MD5, Digital signatures- protocols- Digital signature standards, Digital Certificates. Application Level Authentications- Kerberos, X.509 Authentication Service, X.509 certificates. 12 IV Network Security: Electronic Mail Security, Pretty Good Privacy, S/MIME, IP Security Overview, IP Security Architecture, Authentication Header, Encapsulating Security Payload. Web Security: Web Security considerations- Secure Socket Layer - Transport layer Security- Secure electronic transaction. Firewalls- Packet filters- Application Level Gateway- Circuit Level Gateway. 12 V Operating System Security: Memory and Address Protection, Control of Access to General Objects, File Protection Mechanisms, Models of Security Bell-La Padula Confidentiality Model and Biba Integrity Model. System Security: Intruders, Intrusion Detection, Password 12 Management, Viruses and Related Threats, Virus Countermeasure. TOTAL HOURS 60 Department of CSE, RSET 19

20 TEXT/REFERENCE BOOKS: T/R BOOK TITLE/AUTHORS/PUBLICATION 1 William Stallings, Cryptography and Network Security Principles and Practices, Pearson Education, Fourth Edition, Charles P. Pfleeger, Security in Computing, Pearson Education, Third Edition, Behrouz A. Forouzan, Dedeep Mukhopadhyay Cryptography & Network Security, Second Edition,Tata McGraw Hill, New Delhi, Andrew S. Tanenbaum, Modern Operating Systems, Pearson Education, Second Edition, Atul Kahate, Cryptography and Network Security, Second Edition, Tata McGraw Hill 6 Wenbo Mao, Modern Cryptography- Theory & Practice, Pearson Education, Bruce Schneier, Applied Cryptography, John Wiley and Sons Inc, COURSE PRE-REQUISITES: C.CODE COURSE NAME DESCRIPTION SEM EN ,301 CS CS CS CS Engineering mathematics I & II Mathematical Skills I,II & III PSCP Problem Solving Skills III Operating Systems System Architecture V Computer Networks Networking VI Web Technologies Programming Skills VII COURSE OBJECTIVES: 1 To impart an essential study of computer security issues 2 To develop basic knowledge on cryptography 3 To impart an essential study of various security mechanisms COURSE OUTCOMES: SNO DESCRIPTION PO MAPPING 1 Students will have the basic knowledge of different types of Security attacks 2 Students will be able to analyze and compare different security mechanisms and services. 3 Students will be able to analyze different modern encryption algorithms. 4 Students will have the basic knowledge of different Authentication mechanisms 5 Students will have the knowledge on latest techniques used in different Security aspects (e.g. network security, web security etc.) a,b a,b,c a.b.c.h a,b a,b,c,h GAPS IN THE SYLLABUS - TO MEET INDUSTRY/PROFESSION REQUIREMENTS: Department of CSE, RSET 20

21 SNO DESCRIPTION PROPOSED ACTIONS PROPOSED ACTIONS: TOPICS BEYOND SYLLABUS/ASSIGNMENT/INDUSTRY VISIT/GUEST LECTURER/NPTEL ETC PO MAPPING TOPICS BEYOND SYLLABUS/ADVANCED TOPICS/DESIGN: SNO DESCRIPTION PO MAPPING 1 WEB SOURCE REFERENCES: DELIVERY/INSTRUCTIONAL METHODOLOGIES: CHALK & TALK STUD. WEB RESOURCES ASSIGNMENT LCD/SMART BOARDS STUD. SEMINARS ADD-ON COURSES ASSESSMENT METHODOLOGIES-DIRECT ASSIGNMENTS STUD. SEMINARS TESTS/MODEL EXAMS UNIV. EXAMINATION STUD. LAB PRACTICES STUD. VIVA MINI/MAJOR PROJECTS CERTIFICATIONS ADD-ON COURSES OTHERS ASSESSMENT METHODOLOGIES-INDIRECT ASSESSMENT OF COURSE OUTCOMES (BY FEEDBACK, ONCE) ASSESSMENT OF MINI/MAJOR PROJECTS BY EXT. EXPERTS STUDENT FEEDBACK ON FACULTY (TWICE) OTHERS Prepared by by Mr. Mintu Philip Approved Mr. Ajith S (H.O.D) Department of CSE, RSET 21

22 COURSE PLAN SL NO TOPIC 1 Introduction: Security basics 2 Aspects of network security 3 Attacks Different types 4 Security attacks 5 Security services and mechanisms 6 Basic Encryption & Decryption 7 Classical encryption techniques 8 symmetric encryption, substitution ciphers 9 Caesar cipher 10 Monoalphabetic Cipher, Playfair Cipher 11 Polyalphabetic cipher - Vigenère Cipher 12 Transposition ciphers - Rail Fence cipher, Row Transposition Ciphers 13 Modern Block Ciphers - Fiestel Networks 14 DES Algorithm 15 Avalanche Effect 16 Introduction to Number Theory - Prime Factorisation 17 Fermat's Theorem 18 Euler's Theorem 19 Primitive Roots 20 Discrete Logarithms 21 Public key Cryptography:- Principles of Public key Cryptography Systems 22 RSA algorithms 23 Key Management 24 Diffie-Hellman Key Exchange 25 Elliptic curve cryptography 26 Message Authentication-Requirements 27 Authentication functions 28 Message authentication codes 29 Hash function 30 Secure Hash Algorithm 31 MD5 32 Digital signatures- protocols 33 Digital signature standards 34 Digital Certificates 35 Application Level Authentications- Kerberos 36 X.509 Authentication Service 37 X.509 certificates 38 Network Security: Electronic Mail Security 39 Pretty Good Privacy 40 S/MIME 41 IP SecurityOverview 42 IP Security Architecture 43 Authentication Header 44 Encapsulating Security Payload 45 Web Security: Web Security considerations 46 Secure Socket Layer Department of CSE, RSET 22

23 47 Transport layer Security- 48 Secure electronic transaction 49 Firewalls 50 Packet filters 51 Application Level Gateway 52 Circuit Level Gateway 55 Operating System Security: 56 Memory and Address Protection 57 Control of Access to General Objects 58 File Protection Mechanisms 59 Models of Security Bell-La Padula Confidentiality Model 60 Biba Integrity Model 61 System Security: Intruders 62 Intrusion Detection 63 Password Management 64 Viruses and Related Threats 65 Virus Countermeasure. Department of CSE, RSET 23

24 CS L05 Mobile Computing COURSE INFORMATION SHEET PROGRAMME: COMPUTER SCIENCE & ENGINEERING DEGREE: BTECH 2014 YEAR: JAN 2014 JUNE COURSE NAME: MOBILE COMPUTING SEMESTER: VIII CREDITS: 4 COURSE CODE: CS L05 COURSE TYPE: ELECTIVE REGULATION: 2010 COURSE AREA/DOMAIN: NETWORKING AND COMMUNICATION CORRESPONDING LAB COURSE CODE (IF ANY): NIL CONTACT HOURS: 2+2 (Tutorial) hours/week. LAB COURSE NAME: NA SYLLABUS: UNIT DETAILS HOURS I Introduction to wireless communication system:- 2G cellular network,2g TDMA Standards,3G wireless networks, wireless local loop and LMDS, Broadcast Systems-Broadcast transmission, Digital Audio Broadcasting-Multimedia Object Transfer Protocol. Digital Video Broadcasting. Cellular concepts-channel assignment strategy-hand off strategy-interface and system 10 Capacity-trunking improving coverage and capacity in cellular system. II Wireless Communication Systems:-Telecommunication Systems-GSM-GSM services & features,architecture,channel type, frame structure, signal processing in GSM & DECT features & characteristics,architecture,functional concepts & radio link, personal access communication system(pacs)-system architecture-radio interface, Protocols. Satellite Systems-GEO, LEO, MEO. 12 Department of CSE, RSET 24

25 III Wireless LAN and ATM:- Infra red and Radio Transmission, Infrastructure and ad hoc networks, Bluetooth- Architecture, Applications and Protocol, Layers, Frame structure. comparison between and Wireless ATM- Services, Reference Model, Functions, Radio Access Layer. Handover- Reference Model, Requirements, Types, handover scenarios. Location Management, Addressing, Access Point Control Protocol (APCP). IV TreesBary Mobile Network and Transport Layers:- Mobile IP- Goals, Requirements, IP packet delivery, Advertisement and discovery. Registration, Tunneling and Encapsulation, 14 Optimization, Reverse Tunneling, IPv6, Dynamic Host configuring protocol, Ad hoc networks Routing, DSDV, Dynamic source routing. Hierarchical Algorithms. Traditional TCP, Indirect TCP, Snooping TCP, Mobile TCP, Transmission. V Wireless Application Protocol & World Wide Web WAP- Architecture, Protocols-Datagram, Transaction, Session.-Wireless Application Environment-WML- Features, Script- Wireless Telephony Application. WWW- HTTP, Usage of HTML, WWW system architecture. 13 TOTAL HOURS 60 Department of CSE, RSET 25

26 TEXT/REFERENCE BOOKS: T/R BOOK TITLE/AUTHORS/PUBLICATION 1 Jochen Schiller Mobile Communications, Preason Education Asia 2 Wireless communications Principles and practice-second edition-theodore S.Rappaport,PHI,Second Edition,New Delhi, Computer Networks Andrew S. Tanenbaum, PHI 4 Communication Networks -Fundamental Concepts and Key Architectures Leon-Garcia & Indra Widjaja, Tata McGraw Hill COURSE PRE-REQUISITES: C.CODE COURSE NAME DESCRIPTION SEM CS COMPUTER NETWORKS NETWORKING FUNDAMENTALS VI COURSE OBJECTIVES: 1 To learn about the concepts and principles of mobile computing. 2 To learn about the key components and technologies involved in building mobile applications. Department of CSE, RSET 26

INFORMATION TECHNOLOGY PROGRAM

INFORMATION TECHNOLOGY PROGRAM INFORMATION TECHNOLOGY PROGRAM The School of Information Technology offers a two-year bachelor degree program in Information Technology for students having acquired an advanced vocational certificate.

More information

Information and Communications Technology Courses at a Glance

Information and Communications Technology Courses at a Glance Information and Communications Technology Courses at a Glance Level 1 Courses ICT121 Introduction to Computer Systems Architecture This is an introductory course on the architecture of modern computer

More information

M.S. Computer Science Program

M.S. Computer Science Program M.S. Computer Science Program Pre-requisite Courses The following courses may be challenged by sitting for the placement examination. CSC 500: Discrete Structures (3 credits) Mathematics needed for Computer

More information

Doctor of Philosophy in Computer Science

Doctor of Philosophy in Computer Science Doctor of Philosophy in Computer Science Background/Rationale The program aims to develop computer scientists who are armed with methods, tools and techniques from both theoretical and systems aspects

More information

CRYPTOG NETWORK SECURITY

CRYPTOG NETWORK SECURITY CRYPTOG NETWORK SECURITY PRINCIPLES AND PRACTICES FOURTH EDITION William Stallings Prentice Hall Upper Saddle River, NJ 07458 'jkfetmhki^^rij^jibwfcmf «MMr""'-^.;

More information

Master of Science in Computer Science

Master of Science in Computer Science Master of Science in Computer Science Background/Rationale The MSCS program aims to provide both breadth and depth of knowledge in the concepts and techniques related to the theory, design, implementation,

More information

Computer Science MS Course Descriptions

Computer Science MS Course Descriptions Computer Science MS Course Descriptions CSc I0400: Operating Systems Underlying theoretical structure of operating systems; input-output and storage systems, data management and processing; assembly and

More information

IT4405 Computer Networks (Compulsory)

IT4405 Computer Networks (Compulsory) IT4405 Computer Networks (Compulsory) INTRODUCTION This course provides a comprehensive insight into the fundamental concepts in data communications, computer network systems and protocols both fixed and

More information

CRYPTOGRAPHY AND NETWORK SECURITY Principles and Practice

CRYPTOGRAPHY AND NETWORK SECURITY Principles and Practice CRYPTOGRAPHY AND NETWORK SECURITY Principles and Practice THIRD EDITION William Stallings Prentice Hall Pearson Education International CONTENTS CHAPTER 1 OVERVIEW 1 1.1 1.2 1.3 1.4 1.5 1.6 PART ONE CHAPTER

More information

Textbooks: Matt Bishop, Introduction to Computer Security, Addison-Wesley, November 5, 2004, ISBN 0-321-24744-2.

Textbooks: Matt Bishop, Introduction to Computer Security, Addison-Wesley, November 5, 2004, ISBN 0-321-24744-2. CSET 4850 Computer Network Security (4 semester credit hours) CSET Elective IT Elective Current Catalog Description: Theory and practice of network security. Topics include firewalls, Windows, UNIX and

More information

CRYPTOGRAPHY AND NETWORK SECURITY

CRYPTOGRAPHY AND NETWORK SECURITY CRYPTOGRAPHY AND NETWORK SECURITY PRINCIPLES AND PRACTICE SIXTH EDITION William Stallings International Edition contributions by Mohit P Tahiliani NITK Surathkal PEARSON Boston Columbus Indianapolis New

More information

Master s Program in Information Systems

Master s Program in Information Systems The University of Jordan King Abdullah II School for Information Technology Department of Information Systems Master s Program in Information Systems 2006/2007 Study Plan Master Degree in Information Systems

More information

Division of Mathematical Sciences

Division of Mathematical Sciences Division of Mathematical Sciences Chair: Mohammad Ladan, Ph.D. The Division of Mathematical Sciences at Haigazian University includes Computer Science and Mathematics. The Bachelor of Science (B.S.) degree

More information

QF01/0407-1.0 الخطة الدراسية كلية العلوم وتكنولوجيا المعلومات- برنامج الماجستير/ الوصف المختصر

QF01/0407-1.0 الخطة الدراسية كلية العلوم وتكنولوجيا المعلومات- برنامج الماجستير/ الوصف المختصر Algorithms analysis and design(0102721). The course introduces students to a variety of computer problems and methods of their solutions. It enables students to assess the complexity of problems and algorithms.

More information

VALLIAMMAI ENGINEERING COLLEGE

VALLIAMMAI ENGINEERING COLLEGE VALLIAMMAI ENGINEERING COLLEGE (A member of SRM Institution) SRM Nagar, Kattankulathur 603203. DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING Year and Semester : I / II Section : 1 Subject Code : NE7202

More information

EXAM questions for the course TTM4135 - Information Security May 2013. Part 1

EXAM questions for the course TTM4135 - Information Security May 2013. Part 1 EXAM questions for the course TTM4135 - Information Security May 2013 Part 1 This part consists of 5 questions all from one common topic. The number of maximal points for every correctly answered question

More information

CODE COURSE NAME DESCRIPTION SEM II HU501. HU601 Principles of Management Management Basics VI

CODE COURSE NAME DESCRIPTION SEM II HU501. HU601 Principles of Management Management Basics VI Course: CS802E- E Commerce PROGRAMME: COMPUTER SCIENCE & ENGINEERING DEGREE:B. TECH COURSE: E Commerce SEMESTER: 8 CREDITS: 3 COURSECODE: CS802E COURSE AREA/DOMAIN: Concepts of electronic marketing, legal

More information

Assessment Plan for CS and CIS Degree Programs Computer Science Dept. Texas A&M University - Commerce

Assessment Plan for CS and CIS Degree Programs Computer Science Dept. Texas A&M University - Commerce Assessment Plan for CS and CIS Degree Programs Computer Science Dept. Texas A&M University - Commerce Program Objective #1 (PO1):Students will be able to demonstrate a broad knowledge of Computer Science

More information

Masters in Advanced Computer Science

Masters in Advanced Computer Science Masters in Advanced Computer Science Programme Requirements Taught Element, and PG Diploma in Advanced Computer Science: 120 credits: IS5101 CS5001 up to 30 credits from CS4100 - CS4450, subject to appropriate

More information

Masters in Artificial Intelligence

Masters in Artificial Intelligence Masters in Artificial Intelligence Programme Requirements Taught Element, and PG Diploma in Artificial Intelligence: 120 credits: IS5101 CS5001 CS5010 CS5011 CS4402 or CS5012 in total, up to 30 credits

More information

Computer Science. Master of Science

Computer Science. Master of Science Computer Science Master of Science The Master of Science in Computer Science program at UALR reflects current trends in the computer science discipline and provides students with a solid theoretical and

More information

MEng, BSc Applied Computer Science

MEng, BSc Applied Computer Science School of Computing FACULTY OF ENGINEERING MEng, BSc Applied Computer Science Year 1 COMP1212 Computer Processor Effective programming depends on understanding not only how to give a machine instructions

More information

Department of Computer Science

Department of Computer Science Department of Computer Science Ali Sekmen, PhD 2, Chair 005, McCord Hall 615-963-5712 Faculty: K. Al Nasr, W. Chen, E. Erdemir, M. Hayes, H. Miao, T. Rogers, G. Shao, F. Yao General Statement: The Department

More information

VALLIAMMAI ENGNIEERING COLLEGE SRM Nagar, Kattankulathur 603203.

VALLIAMMAI ENGNIEERING COLLEGE SRM Nagar, Kattankulathur 603203. VALLIAMMAI ENGNIEERING COLLEGE SRM Nagar, Kattankulathur 603203. DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING Year & Semester : VII/ IV Section : CSE-1 & 2 Subject Code : CS2402 Subject Name : MOBILE

More information

Part A: Course Outline

Part A: Course Outline University of Macau Faculty of Science and Technology Department of Electrical and Computer Engineering Part A: Course Outline Course Title Computer Systems and Network Fundamentals Course Code ECEB256

More information

Masters in Human Computer Interaction

Masters in Human Computer Interaction Masters in Human Computer Interaction Programme Requirements Taught Element, and PG Diploma in Human Computer Interaction: 120 credits: IS5101 CS5001 CS5040 CS5041 CS5042 or CS5044 up to 30 credits from

More information

FLORIDA STATE COLLEGE AT JACKSONVILLE COLLEGE CREDIT COURSE OUTLINE

FLORIDA STATE COLLEGE AT JACKSONVILLE COLLEGE CREDIT COURSE OUTLINE Form 2A, Page 1 FLORIDA STATE COLLEGE AT JACKSONVILLE COLLEGE CREDIT COURSE OUTLINE COURSE NUMBER: CET 2600 COURSE TITLE: Network Fundamentals PREREQUISITE(S): CTS 1131 and CTS 1133 COREQUISITE(S): STUDENT

More information

01219211 Software Development Training Camp 1 (0-3) Prerequisite : 01204214 Program development skill enhancement camp, at least 48 person-hours.

01219211 Software Development Training Camp 1 (0-3) Prerequisite : 01204214 Program development skill enhancement camp, at least 48 person-hours. (International Program) 01219141 Object-Oriented Modeling and Programming 3 (3-0) Object concepts, object-oriented design and analysis, object-oriented analysis relating to developing conceptual models

More information

School of Computer Science

School of Computer Science School of Computer Science Computer Science - Honours Level - 2014/15 October 2014 General degree students wishing to enter 3000- level modules and non- graduating students wishing to enter 3000- level

More information

CONCENTRATIONS: HIGH-PERFORMANCE COMPUTING & BIOINFORMATICS CYBER-SECURITY & NETWORKING

CONCENTRATIONS: HIGH-PERFORMANCE COMPUTING & BIOINFORMATICS CYBER-SECURITY & NETWORKING MAJOR: DEGREE: COMPUTER SCIENCE MASTER OF SCIENCE (M.S.) CONCENTRATIONS: HIGH-PERFORMANCE COMPUTING & BIOINFORMATICS CYBER-SECURITY & NETWORKING The Department of Computer Science offers a Master of Science

More information

2010-2011 Assessment for Master s Degree Program Fall 2010 - Spring 2011 Computer Science Dept. Texas A&M University - Commerce

2010-2011 Assessment for Master s Degree Program Fall 2010 - Spring 2011 Computer Science Dept. Texas A&M University - Commerce 2010-2011 Assessment for Master s Degree Program Fall 2010 - Spring 2011 Computer Science Dept. Texas A&M University - Commerce Program Objective #1 (PO1):Students will be able to demonstrate a broad knowledge

More information

ICTTEN8195B Evaluate and apply network security

ICTTEN8195B Evaluate and apply network security ICTTEN8195B Evaluate and apply network security Release 1 ICTTEN8195B Evaluate and apply network security Modification History Release Release 2 Comments This version first released with ICT10 Integrated

More information

MEng, BSc Computer Science with Artificial Intelligence

MEng, BSc Computer Science with Artificial Intelligence School of Computing FACULTY OF ENGINEERING MEng, BSc Computer Science with Artificial Intelligence Year 1 COMP1212 Computer Processor Effective programming depends on understanding not only how to give

More information

CSET 4750 Computer Networks and Data Communications (4 semester credit hours) CSET Required IT Required

CSET 4750 Computer Networks and Data Communications (4 semester credit hours) CSET Required IT Required CSET 4750 Computer Networks and Data Communications (4 semester credit hours) CSET Required IT Required Current Catalog Description: Computer network architectures and their application to industry needs.

More information

Introduction to Artificial Intelligence

Introduction to Artificial Intelligence Introduction to Artificial Intelligence 1st year undergraduate degrees with AI and/or CS http://www.cs.bham.ac.uk/~jxb/iai.html Lecturer: Dr. John A. Bullinaria http://www.cs.bham.ac.uk/~jxb John A. Bullinaria,

More information

NEURAL NETWORK FUNDAMENTALS WITH GRAPHS, ALGORITHMS, AND APPLICATIONS

NEURAL NETWORK FUNDAMENTALS WITH GRAPHS, ALGORITHMS, AND APPLICATIONS NEURAL NETWORK FUNDAMENTALS WITH GRAPHS, ALGORITHMS, AND APPLICATIONS N. K. Bose HRB-Systems Professor of Electrical Engineering The Pennsylvania State University, University Park P. Liang Associate Professor

More information

Weighted Total Mark. Weighted Exam Mark

Weighted Total Mark. Weighted Exam Mark CMP4103 Computer Systems and Network Security Period per Week Contact Hour per Semester Weighted Total Mark Weighted Exam Mark Weighted Continuous Assessment Mark Credit Units LH PH TH CH WTM WEM WCM CU

More information

James B. Fenwick, Jr., Program Director and Associate Professor Ph.D., The University of Delaware FenwickJB@appstate.edu

James B. Fenwick, Jr., Program Director and Associate Professor Ph.D., The University of Delaware FenwickJB@appstate.edu 118 Master of Science in Computer Science Department of Computer Science College of Arts and Sciences James T. Wilkes, Chair and Professor Ph.D., Duke University WilkesJT@appstate.edu http://www.cs.appstate.edu/

More information

M.Tech. DEGREE EXAMINATION, DEC. - 2013 (Examination at the end of Final Year) Computer Science. Paper - I : ADVANCED DATABASE MANAGEMENT SYSTEMS

M.Tech. DEGREE EXAMINATION, DEC. - 2013 (Examination at the end of Final Year) Computer Science. Paper - I : ADVANCED DATABASE MANAGEMENT SYSTEMS (DMTCS 21) M.Tech. DEGREE EXAMINATION, DEC. - 2013 (Examination at the end of Final Year) Computer Science Paper - I : ADVANCED DATABASE MANAGEMENT SYSTEMS Time : 03 Hours Maximum Marks : 75 Answer question

More information

Bachelor of Games and Virtual Worlds (Programming) Subject and Course Summaries

Bachelor of Games and Virtual Worlds (Programming) Subject and Course Summaries First Semester Development 1A On completion of this subject students will be able to apply basic programming and problem solving skills in a 3 rd generation object-oriented programming language (such as

More information

MASTER OF SCIENCE IN INFORMATION ASSURANCE PROGRAM DEPARTMENT OF COMPUTER SCIENCE HAMPTON UNIVERSITY

MASTER OF SCIENCE IN INFORMATION ASSURANCE PROGRAM DEPARTMENT OF COMPUTER SCIENCE HAMPTON UNIVERSITY MASTER OF SCIENCE IN INFORMATION ASSURANCE PROGRAM DEPARTMENT OF COMPUTER SCIENCE HAMPTON UNIVERSITY HTTP://SCIENCE.HAMPTONU.EDU/COMPSCI/ The Master of Science in Information Assurance focuses on providing

More information

Computer Networks. A Top-Down Approach. Behrouz A. Forouzan. and. Firouz Mosharraf. \Connect Mc \ Learn. Hill

Computer Networks. A Top-Down Approach. Behrouz A. Forouzan. and. Firouz Mosharraf. \Connect Mc \ Learn. Hill Computer Networks A Top-Down Approach Behrouz A. Forouzan and Firouz Mosharraf \Connect Mc \ Learn Graw I Succeed* Hill Preface xvii Trademarks xxiii Chapter 1 Introduction 1 1.1 OVERVIEW OF THE INTERNET

More information

Masters in Networks and Distributed Systems

Masters in Networks and Distributed Systems Masters in Networks and Distributed Systems Programme Requirements Taught Element, and PG Diploma in Networks and Distributed Systems: 120 credits: IS5101 CS5001 CS5021 CS4103 or CS5023 in total, up to

More information

Masters in Computing and Information Technology

Masters in Computing and Information Technology Masters in Computing and Information Technology Programme Requirements Taught Element, and PG Diploma in Computing and Information Technology: 120 credits: IS5101 CS5001 or CS5002 CS5003 up to 30 credits

More information

GUJARAT TECHNOLOGICAL UNIVERSITY, AHMEDABAD, GUJARAT COURSE CURRICULUM COURSE TITLE: ESSENTIALS OF NETWORK SECURITY (COURSE CODE: 3351602)

GUJARAT TECHNOLOGICAL UNIVERSITY, AHMEDABAD, GUJARAT COURSE CURRICULUM COURSE TITLE: ESSENTIALS OF NETWORK SECURITY (COURSE CODE: 3351602) GUJARAT TECHNOLOGICAL UNIVERSITY, AHMEDABAD, GUJARAT 1. RATIONALE COURSE CURRICULUM COURSE TITLE: ESSENTIALS OF NETWORK SECURITY (COURSE CODE: 3351602) Diploma Program in which this course is offered Information

More information

CSE 3461 / 5461: Computer Networking & Internet Technologies

CSE 3461 / 5461: Computer Networking & Internet Technologies Autumn Semester 2014 CSE 3461 / 5461: Computer Networking & Internet Technologies Instructor: Prof. Kannan Srinivasan 08/28/2014 Announcement Drop before Friday evening! k. srinivasan Presentation A 2

More information

One LAR Course Credits: 3. Page 4

One LAR Course Credits: 3. Page 4 Course Descriptions Year 1 30 credits Course Title: Calculus I Course Code: COS 101 This course introduces higher mathematics by examining the fundamental principles of calculus-- functions, graphs, limits,

More information

OPNET Network Simulator

OPNET Network Simulator Simulations and Tools for Telecommunications 521365S: OPNET Network Simulator Jarmo Prokkola Research team leader, M. Sc. (Tech.) VTT Technical Research Centre of Finland Kaitoväylä 1, Oulu P.O. Box 1100,

More information

1) Explain the following evolutionary process models: a) The spiral model. b) The concurrent development model.

1) Explain the following evolutionary process models: a) The spiral model. b) The concurrent development model. (DMSIT 21) ASSIGNMENT - 1, MAY-2014. PAPER- I : SOFTWARE ENGINEERING 1) Explain the following evolutionary process models: a) The spiral model. b) The concurrent development model. 2) What are requirements

More information

Gujarat University Syllabus M.Tech (Networking & Communications) II

Gujarat University Syllabus M.Tech (Networking & Communications) II Gujarat University M.Tech (Networking & Communications) II Subject Name: Network Security Subject Code: MTNT 121 Objectives: To enable students to learn The various security standards set by the global

More information

REGULATIONS FOR THE DEGREE OF MASTER OF SCIENCE IN COMPUTER SCIENCE (MSc[CompSc])

REGULATIONS FOR THE DEGREE OF MASTER OF SCIENCE IN COMPUTER SCIENCE (MSc[CompSc]) 305 REGULATIONS FOR THE DEGREE OF MASTER OF SCIENCE IN COMPUTER SCIENCE (MSc[CompSc]) (See also General Regulations) Any publication based on work approved for a higher degree should contain a reference

More information

Course Syllabus For Operations Management. Management Information Systems

Course Syllabus For Operations Management. Management Information Systems For Operations Management and Management Information Systems Department School Year First Year First Year First Year Second year Second year Second year Third year Third year Third year Third year Third

More information

Eastern Washington University Department of Computer Science. Questionnaire for Prospective Masters in Computer Science Students

Eastern Washington University Department of Computer Science. Questionnaire for Prospective Masters in Computer Science Students Eastern Washington University Department of Computer Science Questionnaire for Prospective Masters in Computer Science Students I. Personal Information Name: Last First M.I. Mailing Address: Permanent

More information

TIME SCHEDULE. 1 Introduction to Computer Security & Cryptography 13

TIME SCHEDULE. 1 Introduction to Computer Security & Cryptography 13 COURSE TITLE : INFORMATION SECURITY COURSE CODE : 5136 COURSE CATEGORY : ELECTIVE PERIODS/WEEK : 4 PERIODS/SEMESTER : 52 CREDITS : 4 TIME SCHEDULE MODULE TOPICS PERIODS 1 Introduction to Computer Security

More information

THREE YEAR DEGREE (HONS.) COURSE BACHELOR OF COMPUTER APPLICATION (BCA) First Year Paper I Computer Fundamentals

THREE YEAR DEGREE (HONS.) COURSE BACHELOR OF COMPUTER APPLICATION (BCA) First Year Paper I Computer Fundamentals THREE YEAR DEGREE (HONS.) COURSE BACHELOR OF COMPUTER APPLICATION (BCA) First Year Paper I Computer Fundamentals Full Marks 100 (Theory 75, Practical 25) Introduction to Computers :- What is Computer?

More information

Prerequisites: Fundamentals of Networking, Knowledge of Operating Systems

Prerequisites: Fundamentals of Networking, Knowledge of Operating Systems Course Name: Linux Server Administration Course Code: PGDNA121 To understand the basic principles underlying Server Software Planning and Deploying Linux Server Manage the Servers Efficiently Fundamentals

More information

First Semester Examinations 2011/12 INTERNET PRINCIPLES

First Semester Examinations 2011/12 INTERNET PRINCIPLES PAPER CODE NO. EXAMINER : Martin Gairing COMP211 DEPARTMENT : Computer Science Tel. No. 0151 795 4264 First Semester Examinations 2011/12 INTERNET PRINCIPLES TIME ALLOWED : Two Hours INSTRUCTIONS TO CANDIDATES

More information

Master of Engineering - ME (Medical Software)

Master of Engineering - ME (Medical Software) Master of Engineering - ME (Medical Software) This program has been designed to create skilled professionals who can engineer the medical world. Students are trained to suit the industry requirements.

More information

Dr.NNCE EEE/VI Sem CN-TWB

Dr.NNCE EEE/VI Sem CN-TWB CS2363 COMPUTER NETWORKS TUTORIAL WORK BOOK FOR VI SEMESTER B.E (EEE) ACADEMIC YEAR 2013-2014 (FOR PRIVATE CIRCULATION ONLY) ANNA UNIVERSITY, CHENNAI (R-2008) NAME REG.NO BATCH : : : DEPARTMENT OF ELECTRICAL

More information

Back Propagation Neural Network for Wireless Networking

Back Propagation Neural Network for Wireless Networking International Journal of Computer Sciences and Engineering Open Access Review Paper Volume-4, Issue-4 E-ISSN: 2347-2693 Back Propagation Neural Network for Wireless Networking Menal Dahiya Maharaja Surajmal

More information

MSc Information Technology - E521

MSc Information Technology - E521 MSc Information Technology - E521 1. Aims and Objectives This conversion programme targets non-engineering graduates with a view of preparing them for the employment market where up-to-date IT skills represent

More information

Masters in Information Technology

Masters in Information Technology Computer - Information Technology MSc & MPhil - 2015/6 - July 2015 Masters in Information Technology Programme Requirements Taught Element, and PG Diploma in Information Technology: 120 credits: IS5101

More information

City University of Hong Kong. Information on a Course offered by Department of Electronic Engineering with effect from Semester A in 2012/2013

City University of Hong Kong. Information on a Course offered by Department of Electronic Engineering with effect from Semester A in 2012/2013 City University of Hong Kong Information on a Course offered by Department of Electronic Engineering with effect from Semester A in 01/013 Part I Course Title: Course Code: Course Duration: Cryptography

More information

Study Plan Masters of Science in Computer Engineering and Networks (Thesis Track)

Study Plan Masters of Science in Computer Engineering and Networks (Thesis Track) Plan Number 2009 Study Plan Masters of Science in Computer Engineering and Networks (Thesis Track) I. General Rules and Conditions 1. This plan conforms to the regulations of the general frame of programs

More information

Lectures for the course: Electronic Commerce Technology (IT 60104)

Lectures for the course: Electronic Commerce Technology (IT 60104) Lectures for the course: Electronic Commerce Technology (IT 60104) Week 1 Lecture 1 30/12/2010 Introduction to the course Evaluation guidelines Week 2 Lecture 2 3/01/2011 Overview of E-Commerce E-Commerce

More information

Govt. of Karnataka, Department of Technical Education Diploma in Computer Science & Engineering. Sixth Semester

Govt. of Karnataka, Department of Technical Education Diploma in Computer Science & Engineering. Sixth Semester Govt. of Karnataka, Department of Technical Education Diploma in Computer Science & Engineering Sixth Semester Subject: Network Security & Management Contact Hrs / week: 4 Total hrs: 64 Table of Contents

More information

Course Curriculum for Master Degree in Electrical Engineering/Wireless Communications

Course Curriculum for Master Degree in Electrical Engineering/Wireless Communications Course Curriculum for Master Degree in Electrical Engineering/Wireless Communications The Master Degree in Electrical Engineering/Wireless Communications, is awarded by the Faculty of Graduate Studies

More information

Master of Science (Electrical Engineering) MS(EE)

Master of Science (Electrical Engineering) MS(EE) Master of Science (Electrical Engineering) MS(EE) 1. Mission Statement: The mission of the Electrical Engineering Department is to provide quality education to prepare students who will play a significant

More information

B.Sc. (Computer Science) First Year

B.Sc. (Computer Science) First Year B.Sc. (Computer Science) First Year Paper No. Title of Paper External Internal Assessment Maximum Pass Exam Durations Semester I I Computer Fundamentals & Programming 40 5 45 16 3hrs in C II Logical Organization

More information

COURSE TITLE COURSE DESCRIPTION

COURSE TITLE COURSE DESCRIPTION COURSE TITLE COURSE DESCRIPTION CS-00X COMPUTING EXIT INTERVIEW All graduating students are required to meet with their department chairperson/program director to finalize requirements for degree completion.

More information

COMPUTER ENGINEERING GRADUTE PROGRAM FOR MASTER S DEGREE (With Thesis)

COMPUTER ENGINEERING GRADUTE PROGRAM FOR MASTER S DEGREE (With Thesis) COMPUTER ENGINEERING GRADUTE PROGRAM FOR MASTER S DEGREE (With Thesis) PREPARATORY PROGRAM* COME 27 Advanced Object Oriented Programming 5 COME 21 Data Structures and Algorithms COME 22 COME 1 COME 1 COME

More information

LOUGHBOROUGH UNIVERSITY

LOUGHBOROUGH UNIVERSITY LOUGHBOROUGH UNIVERSITY Programme Specification Computer Science Please note: This specification provides a concise summary of the main features of the programme and the learning outcomes that a typical

More information

Information Technology Career Cluster Introduction to Cybersecurity Course Number: 11.48100

Information Technology Career Cluster Introduction to Cybersecurity Course Number: 11.48100 Information Technology Career Cluster Introduction to Cybersecurity Course Number: 11.48100 Course Description: Introduction to Cybersecurity is designed to provide students the basic concepts and terminology

More information

CS Master Level Courses and Areas COURSE DESCRIPTIONS. CSCI 521 Real-Time Systems. CSCI 522 High Performance Computing

CS Master Level Courses and Areas COURSE DESCRIPTIONS. CSCI 521 Real-Time Systems. CSCI 522 High Performance Computing CS Master Level Courses and Areas The graduate courses offered may change over time, in response to new developments in computer science and the interests of faculty and students; the list of graduate

More information

Computer Science. Requirements for the Major (updated 11/13/03)

Computer Science. Requirements for the Major (updated 11/13/03) Computer Science Faculty: Knox Chair; Komagata,, Martinovic, Neff, Sampath, Wolz Faculty from mathematics with joint teaching appointments in computer science: Conjura, Greenbaun, Iannone The computer

More information

REGULATIONS FOR THE DEGREE OF MASTER OF SCIENCE IN COMPUTER SCIENCE (MSc[CompSc])

REGULATIONS FOR THE DEGREE OF MASTER OF SCIENCE IN COMPUTER SCIENCE (MSc[CompSc]) 299 REGULATIONS FOR THE DEGREE OF MASTER OF SCIENCE IN COMPUTER SCIENCE (MSc[CompSc]) (See also General Regulations) Any publication based on work approved for a higher degree should contain a reference

More information

STUDY PROGRAM: INFORMATION TECHNOLOGY

STUDY PROGRAM: INFORMATION TECHNOLOGY FACULTY OF COMPUTING STUDY PROGRAM: INFORMATION TECHNOLOGY CURRICULUM Introduction As an academic discipline, Information Technology focuses on preparing graduates who are concerned with issues related

More information

Introduction to Neural Computation. Neural Computation

Introduction to Neural Computation. Neural Computation Introduction to Neural Computation Level 4/M Neural Computation Level 3 Website: http://www.cs.bham.ac.uk/~jxb/inc.html Lecturer: Dr. John A. Bullinaria John A. Bullinaria, 2015 Module Administration and

More information

Course Specifications

Course Specifications Form (A) General Information Course name Course number Faculty Department Course type Course level Planning and Quality Assurance Affairs Course Specifications Information Security ITCS4301 Engineering

More information

List of courses MEngg (Computer Systems)

List of courses MEngg (Computer Systems) List of courses MEngg (Computer Systems) Course No. Course Title Non-Credit Courses CS-401 CS-402 CS-403 CS-404 CS-405 CS-406 Introduction to Programming Systems Design System Design using Microprocessors

More information

Major prerequisites by topic: Basic concepts in operating systems, computer networks, and database systems. Intermediate programming.

Major prerequisites by topic: Basic concepts in operating systems, computer networks, and database systems. Intermediate programming. Elective course in Computer Science University of Macau Faculty of Science and Technology Department of Computer and Information Science SFTW498 Information Security Syllabus 2nd Semester 2011/2012 Part

More information

Please consult the Department of Engineering about the Computer Engineering Emphasis.

Please consult the Department of Engineering about the Computer Engineering Emphasis. COMPUTER SCIENCE Computer science is a dynamically growing discipline. ABOUT THE PROGRAM The Department of Computer Science is committed to providing students with a program that includes the basic fundamentals

More information

Department of Computer Science

Department of Computer Science The University of Texas at San Antonio 1 Department of Computer Science The Department of Computer Science offers a Bachelor of Science degree in Computer Science and a Minor in Computer Science. Admission

More information

Analysis of IP Network for different Quality of Service

Analysis of IP Network for different Quality of Service 2009 International Symposium on Computing, Communication, and Control (ISCCC 2009) Proc.of CSIT vol.1 (2011) (2011) IACSIT Press, Singapore Analysis of IP Network for different Quality of Service Ajith

More information

Soran University Faculty of Science and Engineering Computer Science Department Information Security Module Specification

Soran University Faculty of Science and Engineering Computer Science Department Information Security Module Specification 1. Module Title Information Security 2. Module Code: CS403INS 3. Module Level - Forth Stage 4. Module Leader Safwan M. 5. Teaching Semester 7 and 8 Soran University Faculty of Science and Engineering Computer

More information

Introduction to Neural Networks

Introduction to Neural Networks Introduction to Neural Networks 2nd Year UG, MSc in Computer Science http://www.cs.bham.ac.uk/~jxb/inn.html Lecturer: Dr. John A. Bullinaria http://www.cs.bham.ac.uk/~jxb John A. Bullinaria, 2004 Module

More information

Core Courses Seminar (0-2) Non-credit Ph.D. Thesis (0-1) Non-credit Special Studies (8-0) Non-credit. Elective Courses

Core Courses Seminar (0-2) Non-credit Ph.D. Thesis (0-1) Non-credit Special Studies (8-0) Non-credit. Elective Courses İZMİR INSTITUTE OF TECHNOLOGY GRADUATE SCHOOL OF ENGINEERING AND SCIENCES DEPARTMENT OF COMPUTER ENGINEERING JOINT DOCTORAL PROGRAM IN COMPUTER SCIENCE AND ENGINEERING Core Courses CENG 590 CENG 600 CENG

More information

FACULTY OF COMPUTER SCIENCE AND INFORMATION TECHNOLOGY AUTUMN 2016 BACHELOR COURSES

FACULTY OF COMPUTER SCIENCE AND INFORMATION TECHNOLOGY AUTUMN 2016 BACHELOR COURSES FACULTY OF COMPUTER SCIENCE AND INFORMATION TECHNOLOGY Please note! This is a preliminary list of courses for the study year 2016/2017. Changes may occur! AUTUMN 2016 BACHELOR COURSES DIP217 Applied Software

More information

REGULATIONS FOR THE DEGREE OF MASTER OF SCIENCE IN COMPUTER SCIENCE (MSc[CompSc])

REGULATIONS FOR THE DEGREE OF MASTER OF SCIENCE IN COMPUTER SCIENCE (MSc[CompSc]) 244 REGULATIONS FOR THE DEGREE OF MASTER OF SCIENCE IN COMPUTER SCIENCE (MSc[CompSc]) (See also General Regulations) Any publication based on work approved for a higher degree should contain a reference

More information

Master of Science in Computer Science Information Systems

Master of Science in Computer Science Information Systems Master of Science in Computer Science Information Systems 1. General Admission Requirements. Admission to Graduate Studies (see graduate admission requirements). 2. Program Admission. In addition to meeting

More information

IT4504 - Data Communication and Networks (Optional)

IT4504 - Data Communication and Networks (Optional) - Data Communication and Networks (Optional) INTRODUCTION This is one of the optional courses designed for Semester 4 of the Bachelor of Information Technology Degree program. This course on Data Communication

More information

Chapter 5. Data Communication And Internet Technology

Chapter 5. Data Communication And Internet Technology Chapter 5 Data Communication And Internet Technology Purpose Understand the fundamental networking concepts Agenda Network Concepts Communication Protocol TCP/IP-OSI Architecture Network Types LAN WAN

More information

Department of Computer & Information Sciences. CSCI-445: Computer and Network Security Syllabus

Department of Computer & Information Sciences. CSCI-445: Computer and Network Security Syllabus Department of Computer & Information Sciences CSCI-445: Computer and Network Security Syllabus Course Description This course provides detailed, in depth overview of pressing network security problems

More information

Department of CSE. Jaypee University of Information Technology, Waknaghat. Course Curricula

Department of CSE. Jaypee University of Information Technology, Waknaghat. Course Curricula Department of CSE Jaypee University of Information Technology, Waknaghat Course Curricula This document contains the Course Curricula for the following courses offered in the Department of CSE : B.Tech.

More information

B.Sc. in Computer Information Systems Study Plan

B.Sc. in Computer Information Systems Study Plan 195 Study Plan University Compulsory Courses Page ( 64 ) University Elective Courses Pages ( 64 & 65 ) Faculty Compulsory Courses 16 C.H 27 C.H 901010 MATH101 CALCULUS( I) 901020 MATH102 CALCULUS (2) 171210

More information

Proposed Syllabus by C.S.J.M.University,Kanpur. Bachelors of Computer Application

Proposed Syllabus by C.S.J.M.University,Kanpur. Bachelors of Computer Application BCA-S307 Computer Network Security 4 0 0 4 Introduction: Attack, Services and Mechanism, Model for Internetwork Security. Cryptography: Notion of Plain Text, Encryption, Key, Cipher Text, Decryption and

More information

Course Outline Department of Computing Science Faculty of Science. COMP 3710-3 Applied Artificial Intelligence (3,1,0) Fall 2015

Course Outline Department of Computing Science Faculty of Science. COMP 3710-3 Applied Artificial Intelligence (3,1,0) Fall 2015 Course Outline Department of Computing Science Faculty of Science COMP 710 - Applied Artificial Intelligence (,1,0) Fall 2015 Instructor: Office: Phone/Voice Mail: E-Mail: Course Description : Students

More information