ARTIFICIAL INTELLIGENCE LTPMC 3 1 0 100 4 UNIT I Introduction and Problem Solving I 9 Artificial Intelligence: Definition-Turing Test-Relation with other Disciplines-History of AIApplications- Agent: Intelligent Agent-Rational Agent - Nature of EnvironmentsStructure of Agent.-Problem Solving Agent - Problems: Toy Problems and Real-world Problems-Uninformed Search Strategies: BFS, DFS, DLS, IDS, Bidirectional Search comparison of uninformed search strategies. UNIT II Problem Solving II: 9 Informed Search Strategies-Greedy best-first search-A* search-Heuristic functionsLocal search Algorithms and Optimization problems - Online Search Agent-Constraint Satisfaction Problems-Backtracking Search for CSP’s –Local Search for Constraint Satisfaction Problems-Structure of Problems -Adversarial Search-Optimal Decision in Games-Alpha-Beta Pruning-Imperfect Real Time Decisions-Games that Include an Element of Chance. UNIT III Knowledge Representation 9 First-Order Logic-Syntax and Semantics of First-Order-Logic-Using First-Order-LogicKnowledge Engineering in First-Order-Logic.- Inference in First-Order-Logic- Inference rules-Unification and Lifting-Forward Chaining-Backward Chaining-Resolution. UNIT IV Learning 9 Learning from Observations- Forms of Learning-Learning Decision –Ensemble Learning - A Logical Formulation of Learning-Knowledge in Learning-Explanation Based Learning-Learning using Relevance Information-Inductive Logic Programming. UNIT V Applications 9 Communication –Communication as action -A formal grammar for a fragment of English s– Syntactic Analysis – Augmented Grammars – Semantic Interpretation – Ambiguity and Disambiguation – Discourse Understanding – Grammar Induction. Perception –Image Formation –Early Image Processing Operations – Extracting Three Dimensional Information – Object Recognition – Using Vision for Manipulation and Navigation. CRYPTOGRAPHY AND NETWORK SECURITY LTPMC 3 1 0 100 4 UNIT-I Introduction 8 Introduction -Motivating examples-Basic concepts: confidentiality, integrity, availability, security policies, security mechanisms, assurance- Basic cryptography Historical background Transposition/Substitution, Caesar Cipher Introduction to Symmetric crypto primitives, Asymmetric crypto primitives. Unit-II Symmetric Ciphers 8 Traditional Symmetric ciphers- Substitution ciphers-Transposition ciphers-stream and block ciphers. Modern Symmetric key ciphers-Modern block and Stream ciphers-Data Encryption Standard-DES analysis-Structure-Multiple DES- Advanced data Encryption Standard-Transformation-Key Expansion-Analysis. Modern Block Ciphers-Stream Ciphers-other issues. UNIT-III Asymmetric Ciphers 8 Mathematics of cryptography-Primality testing-factorization –Chinese remainder theorem-Quadratic congruence- exponentiation and logarithm-RSA CryptosystemRabin Cryptosystem-Elgamal Cryptosystem-Elliptic cryptosystem. UNIT-IV Message integrity and Message authentication 12 Message integrity and Message authentication –Cryptographic hash functions-Digital signature- Key management – private and public -distribution –Kerberos- PGP-Security at application layer-Transport layer-Network layer-IKE-ISAKMP UNIT-V Advanced Network Security 9 Wireless Application protocol (WAP) security- Security in GSM- Security in 3G- Security in java- .Net-Operating Systems- Network Security- firewalls and VPN- Case studies – Single Sign On (SSO)-Denial of service (DOS)-Cross site scripting vulnerability CSSV. INTERNET PROGRAMMING LTPMC 3 0 0 100 3 UNIT I XHTML 8 Introduction to XHTML: Headers -Linking - Images–Unordered Lists -Nested and Ordered Lists forms -Tables–Form- frames– Cascading style sheets . UNIT II DHTML and Java 10 Object model and collections -event model - filters and transition. Java Basics: Data types, variables, Array, Operator, Control statements, I/O operation, Exception handling, file handling. UNIT III Data Binding, ActiveX and Java Script 8 Data binding with tabular data control – Multimedia -ActiveX Control. Introduction to JavaScript: control structures - functions - arrays - objects UNIT IV Java Servlet 10 Servlet: Introduction , Architecture, Lifecycle -Working with servlet- Handling HTTP get Requests - Handling HTTP get Requests Containing Data - Handling HTTP post Requests - Redirecting Requests to Other Resources - Multi-Tier Application (JDBC) UNIT V Java Network Programming 9 Looking up Internet Address - Socket programming – client/server programs – E-mail client – SMTP - POP3 programs – web page retrieval – protocol handlers – content handlers. Security Issues in Internet programming PRINCIPLES OF COMPILER DESIGN UNIT I INTRODUCTION TO COMPILING 9 Compilers - Analysis of the source program - Phases of a compiler - Cousins of the Compiler - Grouping of Phases - Compiler construction tools UNIT II LEXICAL ANALYSIS 9 Role of Lexical Analyzer - Input Buffering - Specification and recognition of Tokens Finite automata – Regular expression to finite automata – Optimization of DFA-based pattern matchers – Tool for generating lexical analyzer. UNIT III SYNTAX ANALYSIS 9 Role of the parser -Writing Grammars -Context-Free Grammars - Top Down parsing Recursive Descent Parsing - Predictive Parsing - Bottom-up parsing - Shift Reduce Parsing - Operator Precedence Parsing - LR Parsers - SLR Parser - Canonical LR Parser - LALR Parser-Tool for parser. UNIT IV INTERMEDIATE CODE GENERATION 9 Intermediate languages - Declarations - Assignment Statements - Boolean Expressions – Flow control statements - Back patching - Procedure calls. UNIT V CODE GENERATION AND CODE OPTIMIZATION 9 Issues in the design of code generator - The target machine - Basic Blocks and Flow Graphs - A simple Code generator - DAG representation of Basic Blocks – Introduction to optimization - Principal Sources of Optimization - Optimization of basic Blocks Peephole Optimization. Case Study : One Pass Compiler. SOFTWARE TESTING LTPMC 3 0 0 100 3 UNIT I INTRODUCTION 8 Purpose of testing- Some Dichotomies – A model for testing-The taxonomy of bugs: Synopsis – Consequence of bugs – taxonomy of bugs – Level of Testing – Test CasesExamples. UNIT II FUNCTIONAL AND STRUCTURAL TESTING 9 Boundary Value Testing – Equivalence Class Testing – Comparison Testing-Cause Effect Graphs- Basis Path Testing - Condition Testing- Data Flow Testing – Loop Testing - Structural Coverage. UNIT III INTEGRATION AND SYSTEM TESTING 9 Unit Testing- Integration Testing – System Testing – Interaction Testing – Verification and Validation – Extreme Testing. UNIT IV OBJECT ORINTED TESTING 9 Issues in Object Oriented Testing – Class Testing – Object Oriented Integration Testing – GUI Testing – Object Oriented System Testing. UNIT V DEBUGGING AND TESTING TOOLS 10 Debugging Process – Debugging Approach –Software Testing Tool: An Overview- Win Runner – Silk Test – Load Runner – Jmeter - Test Director DISTRIBUTED COMPUTING LTPMC 3 0 0 100 3 UNIT I INTRODUCTION 9 Characterization of Distributed Systems - Examples - Resource Sharing and the Web Challenges - System Models - Architectural and Fundamental Models - Networking and Internetworking - Types of Networks - Network Principles - Internet Protocols - Case Studies. UNIT II PROCESSES AND DISTRIBUTED OBJECTS 9 Interprocess Communication - The API for the Internet Protocols - External Data Representation and Marshalling - Client-Server Communication - Group Communication - Case Study - Distributed Objects and Remote Invocation - Communication Between Distributed Objects - Remote Procedure Call - Events and Notifications - Java RMI Case Study. UNIT III OPERATING SYSTEM ISSUES – I 9 The OS Layer - Protection - Processes and Threads - Communication and Invocation – OS Architecture - Security - Overview - Cryptographic Algorithms - Digital Signatures Cryptography Pragmatics - Case Studies - Distributed File Systems - File Service Architecture - Sun Network File System - The Andrew File System UNIT IV OPERATING SYSTEM ISSUES – II 9 Name Services -Domain Name System - Directory and Discovery Services - Global Name Service - X.500 Directory Service - Clocks, Events and Process States Synchronizing Physical Clocks - Logical Time And Logical Clocks - Global States Distributed Debugging - Distributed Mutual Exclusion – Elections – Multicast Communication Related Problems. UNIT V DISTRIBUTED TRANSACTION PROCESSING 9 Transactions - Nested Transactions - Locks - Optimistic Concurrency Control Timestamp Ordering - Comparison - Flat and Nested Distributed Transactions - Atomic Commit Protocols - Concurrency Control in Distributed Transactions - Distributed Deadlocks - Transaction Recovery - Overview of Replication And Distributed Multimedia Systems