File

advertisement
ARTIFICIAL INTELLIGENCE
LTPMC
3 1 0 100 4
UNIT I
Introduction and Problem Solving I 9
Artificial Intelligence: Definition-Turing Test-Relation with other Disciplines-History of
AIApplications- Agent: Intelligent Agent-Rational Agent - Nature of EnvironmentsStructure of Agent.-Problem Solving Agent - Problems: Toy Problems and Real-world
Problems-Uninformed Search Strategies: BFS, DFS, DLS, IDS, Bidirectional Search comparison of uninformed search strategies.
UNIT II
Problem Solving II: 9
Informed Search Strategies-Greedy best-first search-A* search-Heuristic functionsLocal search Algorithms and Optimization problems - Online Search Agent-Constraint
Satisfaction Problems-Backtracking Search for CSP’s –Local Search for Constraint
Satisfaction Problems-Structure of Problems -Adversarial Search-Optimal Decision in
Games-Alpha-Beta Pruning-Imperfect Real Time Decisions-Games that Include an
Element of Chance.
UNIT III
Knowledge Representation 9
First-Order Logic-Syntax and Semantics of First-Order-Logic-Using First-Order-LogicKnowledge Engineering in First-Order-Logic.- Inference in First-Order-Logic- Inference
rules-Unification and Lifting-Forward Chaining-Backward Chaining-Resolution.
UNIT IV
Learning 9
Learning from Observations- Forms of Learning-Learning Decision –Ensemble Learning
- A Logical Formulation of Learning-Knowledge in Learning-Explanation Based
Learning-Learning using Relevance Information-Inductive Logic Programming.
UNIT V
Applications 9
Communication –Communication as action -A formal grammar for a fragment of English
s– Syntactic Analysis – Augmented Grammars – Semantic Interpretation – Ambiguity
and Disambiguation – Discourse Understanding – Grammar Induction.
Perception –Image Formation –Early Image Processing Operations – Extracting Three
Dimensional Information – Object Recognition – Using Vision for Manipulation and
Navigation.
CRYPTOGRAPHY AND NETWORK SECURITY
LTPMC
3 1 0 100 4
UNIT-I
Introduction 8
Introduction -Motivating examples-Basic concepts: confidentiality, integrity, availability,
security policies, security mechanisms, assurance- Basic cryptography Historical
background Transposition/Substitution, Caesar Cipher Introduction to Symmetric crypto
primitives, Asymmetric crypto primitives.
Unit-II
Symmetric Ciphers 8
Traditional Symmetric ciphers- Substitution ciphers-Transposition ciphers-stream and
block ciphers. Modern Symmetric key ciphers-Modern block and Stream ciphers-Data
Encryption Standard-DES analysis-Structure-Multiple DES- Advanced data Encryption
Standard-Transformation-Key Expansion-Analysis. Modern Block Ciphers-Stream
Ciphers-other issues.
UNIT-III
Asymmetric Ciphers 8
Mathematics of cryptography-Primality testing-factorization –Chinese remainder
theorem-Quadratic congruence- exponentiation and logarithm-RSA CryptosystemRabin Cryptosystem-Elgamal Cryptosystem-Elliptic cryptosystem.
UNIT-IV
Message integrity and Message authentication 12
Message integrity and Message authentication –Cryptographic hash functions-Digital
signature- Key management – private and public -distribution –Kerberos- PGP-Security
at application layer-Transport layer-Network layer-IKE-ISAKMP
UNIT-V
Advanced Network Security 9
Wireless Application protocol (WAP) security- Security in GSM- Security in 3G- Security
in java- .Net-Operating Systems- Network Security- firewalls and VPN- Case studies –
Single Sign On (SSO)-Denial of service (DOS)-Cross site scripting vulnerability CSSV.
INTERNET PROGRAMMING
LTPMC
3 0 0 100 3
UNIT
I XHTML 8
Introduction to XHTML: Headers -Linking - Images–Unordered Lists -Nested and
Ordered Lists forms -Tables–Form- frames– Cascading style sheets .
UNIT II
DHTML and Java 10
Object model and collections -event model - filters and transition. Java Basics: Data
types, variables, Array, Operator, Control statements, I/O operation, Exception handling,
file handling.
UNIT III
Data Binding, ActiveX and Java Script 8
Data binding with tabular data control – Multimedia -ActiveX Control. Introduction to
JavaScript: control structures - functions - arrays - objects
UNIT IV
Java Servlet 10
Servlet: Introduction , Architecture, Lifecycle -Working with servlet- Handling HTTP get
Requests - Handling HTTP get Requests Containing Data - Handling HTTP post
Requests - Redirecting Requests to Other Resources - Multi-Tier Application (JDBC)
UNIT V
Java Network Programming 9
Looking up Internet Address - Socket programming – client/server programs – E-mail
client – SMTP - POP3 programs – web page retrieval – protocol handlers – content
handlers. Security Issues in Internet programming
PRINCIPLES OF COMPILER DESIGN
UNIT I
INTRODUCTION TO COMPILING 9
Compilers - Analysis of the source program - Phases of a compiler - Cousins of the
Compiler - Grouping of Phases - Compiler construction tools
UNIT II
LEXICAL ANALYSIS 9
Role of Lexical Analyzer - Input Buffering - Specification and recognition of Tokens Finite automata – Regular expression to finite automata – Optimization of DFA-based
pattern matchers – Tool for generating lexical analyzer.
UNIT III
SYNTAX ANALYSIS 9
Role of the parser -Writing Grammars -Context-Free Grammars - Top Down parsing Recursive Descent Parsing - Predictive Parsing - Bottom-up parsing - Shift Reduce
Parsing - Operator Precedence Parsing - LR Parsers - SLR Parser - Canonical LR
Parser - LALR Parser-Tool for parser.
UNIT IV
INTERMEDIATE CODE GENERATION 9
Intermediate languages - Declarations - Assignment Statements - Boolean Expressions
– Flow control statements - Back patching - Procedure calls.
UNIT V
CODE GENERATION AND CODE OPTIMIZATION 9
Issues in the design of code generator - The target machine - Basic Blocks and Flow
Graphs - A simple Code generator - DAG representation of Basic Blocks – Introduction
to optimization - Principal Sources of Optimization - Optimization of basic Blocks Peephole Optimization.
Case Study : One Pass Compiler.
SOFTWARE TESTING
LTPMC
3 0 0 100 3
UNIT I
INTRODUCTION 8
Purpose of testing- Some Dichotomies – A model for testing-The taxonomy of bugs:
Synopsis – Consequence of bugs – taxonomy of bugs – Level of Testing – Test CasesExamples.
UNIT II
FUNCTIONAL AND STRUCTURAL TESTING 9
Boundary Value Testing – Equivalence Class Testing – Comparison Testing-Cause
Effect Graphs- Basis Path Testing - Condition Testing- Data Flow Testing – Loop
Testing - Structural Coverage.
UNIT III
INTEGRATION AND SYSTEM TESTING 9
Unit Testing- Integration Testing – System Testing – Interaction Testing – Verification
and Validation – Extreme Testing.
UNIT IV
OBJECT ORINTED TESTING 9
Issues in Object Oriented Testing – Class Testing – Object Oriented Integration Testing
– GUI Testing – Object Oriented System Testing.
UNIT V
DEBUGGING AND TESTING TOOLS 10
Debugging Process – Debugging Approach –Software Testing Tool: An Overview- Win
Runner – Silk Test – Load Runner – Jmeter - Test Director
DISTRIBUTED COMPUTING
LTPMC
3 0 0 100 3
UNIT I
INTRODUCTION 9
Characterization of Distributed Systems - Examples - Resource Sharing and the Web Challenges - System Models - Architectural and Fundamental Models - Networking and
Internetworking - Types of Networks - Network Principles - Internet Protocols - Case
Studies.
UNIT II
PROCESSES AND DISTRIBUTED OBJECTS 9
Interprocess Communication - The API for the Internet Protocols - External Data
Representation and Marshalling - Client-Server Communication - Group Communication
- Case Study - Distributed Objects and Remote Invocation - Communication Between
Distributed Objects - Remote Procedure Call - Events and Notifications - Java RMI Case Study.
UNIT III
OPERATING SYSTEM ISSUES – I 9
The OS Layer - Protection - Processes and Threads - Communication and Invocation –
OS Architecture - Security - Overview - Cryptographic Algorithms - Digital Signatures Cryptography Pragmatics - Case Studies - Distributed File Systems - File Service
Architecture - Sun Network File System - The Andrew File System
UNIT IV
OPERATING SYSTEM ISSUES – II 9
Name Services -Domain Name System - Directory and Discovery Services - Global
Name Service - X.500 Directory Service - Clocks, Events and Process States Synchronizing Physical Clocks - Logical Time And Logical Clocks - Global States Distributed Debugging - Distributed Mutual Exclusion – Elections – Multicast
Communication Related Problems.
UNIT V
DISTRIBUTED TRANSACTION PROCESSING 9
Transactions - Nested Transactions - Locks - Optimistic Concurrency Control Timestamp Ordering - Comparison - Flat and Nested Distributed Transactions - Atomic
Commit Protocols - Concurrency Control in Distributed Transactions - Distributed
Deadlocks - Transaction Recovery - Overview of Replication And Distributed Multimedia
Systems
Download