HEAD
Combinational algorithms, string processing algorithm, Algebric algorithms , set algorithms
Ullman "Analysis and Design of Algorithm" TMH
Goodman “Introduction to the Design & Analysis of Algorithms, TMH-2002.
Sara Basse, A. V. Gelder, “ Computer Algorithms,” Addison Wesley
T. H. Cormen, Leiserson , Rivest and Stein, “Introduction of Computer algorithm,” PHI
E. Horowitz, S. Sahni, and S. Rajsekaran, “Fundamentals of Computer Algorithms,” Galgotia Publication
UNIT-I
UNIT-II
Data Security and Integrity: Parity Checking Code, Cyclic redundancy checks (CRC), Hemming Code, Protocol Concepts –, Basic flow control, Sliding window protocal-Go-Back-N protocol and selective repeat protocol, Protocol correctness- Finite state machine
UNIT-III
Local Area Network: Ethernet : 802.3 IEEE standard, Token Ring : 802.5 IEEE standard, Token Bus : 802.4 IEEE standard, FDDI Protocol, DQDB Protocol, Inter Networking, Layer 1 connections- Repeater, Hubs, Layer 2 connections- Bridges, Switches, Layer 3 connections- Routers, Gateways.
UNIT-IV
Wide Area Network: Introduction, Network routing, Routing Tables, Types of routing, Dijkstra’s Algorithm, Bellman-Ford Algorithm, Link state routing, Open shortest path first, Flooding, Broadcasting, Multicasting, Congestion & Dead Lock, Internet Protocols, Overview of TCP/IP, Transport protocols, Elements of Transport Protocol, Transmission control protocol (TCP), User data-gram protocol (UDP).
UNIT-V
Network Security, Virtual Terminal Protocol, Overview of DNS, SNMP, email, WWW, Multimedia. BOOKS
A.S.Tanenbaum, “Computer Network”, 4th addition,PHI
Forouzan “Data Communication and Networking 3ed”, TMH
J.F.Hayes, “Moduling and Analysis of Computer Communication Networks”, Plenum Press
D.E.Comer, “Internetworking with TCP/IP”, Volume Ist & IInd, PHI
Willium Stalling, “Data & Computer communications”,Maxwell Macmillan International Ed.
D.Bertsekas and R.Gallager,”Data Networks”, 2nd Ed. ,PHI.
G.E. Keiser ,”Local Area Networks “, McGraw Hill, International Ed.
Modeling Complex Data Semantics, Specialization, Generalization, Aggregation and Association, Objects, Object Identity and its implementation, Clustering, Equality and Object Reference, Architecture of Object Oriented and Object Relational databases, Persistent Programming Languages, Cache Coherence. Case Studies: Gemstone, O2, Object Store, SQL3, Oracle xxi, DB2.
Data log and Recursion, Evaluation of Data log program, Recursive queries with negation.
Parallel architectures, shared nothing/shared disk/shared memory based architectures, Data partitioning, Intra-operator parallelism, pipelining. Distributed Data Storage – Fragmentation & Replication, Location and Fragment Transparency Distributed Query Processing and Optimization, Distributed Transaction Modeling and concurrency Control, Distributed Deadlock, Commit Protocols, Design of Parallel Databases, and Parallel Query Evaluation.
Advanced transaction models: Savepoints, Nested and Multilevel Transactions, Compensating Transactions and Saga, Long Duration Transactions, Weak Levels of Consistency, Transaction Work Flows, Transaction Processing Monitors, Shared disk systems.
Triggers in SQL, Event Constraint and Action: ECA Rules, Query Processing and Concurrency Control, Recursive query processing, Compensation and Databases Recovery, multi-level recovery.
Modeling and Storage of Image and Multimedia Data, Data Structures – R-tree, k-d tree, Quad trees, Content Based Retrieval: Color Histograms, Textures, etc., Image Features, Spatial and Topological Relationships, Multimedia Data Formats, Video Data Model, Audio & Handwritten Data, Geographic Information Systems (GIS).
Accessing Databases through WEB, WEB Servers, XML Databases, Commercial Systems – Oracle xxi, DB2.
Elmarsi, “Fundamentals of Database Systems”, 4 th Edition, Pearson Education
R. Ramakrishnan, “Database Management Systems”, 1998, McGraw Hill International Editions
Elmagarmid.A.K. “Database transaction models for advanced applications”, Morgan Kaufman.
Transaction Processing, Concepts and Techniques, J. Gray and A. Reuter, Morgan Kauffman..
S. Abiteboul, R. hull and V. Vianu, “Foundations of Databases”, 1995, Addison – Wesley Publishing Co., Reading Massachusetts.
W. Kim, “Modern Database Systems”, 1995, ACM Press, Addison – Wesley.
D. Maier, “The Theory of Relational Databases”, 1993, Computer Science Press, Rockville, Maryland
UNIT-I
UNIT-II
UNIT -III
Context-Free grammar & PDA : Properties unrestricted grammar & their equivalence, derivation tree simplifying CFG, unambiguifying CFG, 7-productions, normal form for CFG, Pushdown automata, 2 way PDA, relation of PDA with CFG, Determinism & Non determinism in PDA & related theorems, parsing and pushdown automata.
UNIT-IV
UNIT-V
Hopcroft & Ullman “Introduction to Automata theory, languages & Computation” , Narosha Publishing house.
Lewish Papadimutrau “Theory of Computation” , Prentice Hall of India, New Delhi.
Peter linz, “An Introduction to formal language and automata”, Third edition, Narosa publication.
Marvin L. Minskay “Computation : Finite & Infinite Machines”, PHI.
Mishra & Chander Shekhar “Theory of Computer Science (Automate, Language & Computations), PHI.
The AI problems, what is an AI technique, Characteristics of AI applications. Introduction to LISP programming: Syntax and numeric functions, Basic list manipulation functions, predicates and conditionals, input output and local variables, iteraction and recursion, property lists and arrays.
General problem solving, production systems, control strategies forward and backward chaining, exhausive searches depth first breadth first search.
Hill climbing, branch and bound technique, best first search & A* algorithm, AND / OR graphs, problem reduction & AO* algorithm, constraint satisfaction problems.
UNIT-III
First order predicate calculus, skolemization, resolution principle & unification, interface mechanisms, horn's clauses, semantic networks, frame systems and value inheritance, scripts, conceptual dependency.
Parsing techniques, context free grammer, recursive transitions nets (RNT), augmented transition nets (ATN), case and logic grammers, symantic analysis.
Minimax search procedure, alpha-beta cutoffs, additional refinments.
Overview an example domain the block word, component of planning systems, goal stack planning, non linear planning.
Probability theory, bayes theorem and bayesian networks, certainty factor.
Introduction to expert system and application of expert systems, various expert system shells, vidwan frame work, knowledge acquisition, case studies, MYCIN.
Rote learning, learning by induction, explanation based learning.
Elaine Rich and Kevin Knight “Artifical Intelligence” - Tata McGraw Hill.
“Artifical Intelligence” 4 ed. Pearson.
Dan W. Patterson “Introduction to Artifical Intelligence and Expert Systems”, Prentice India.
Nils J. Nilson “Principles of Artifical Intelligence”, Narosa Publishing House.
Clocksin & C.S.Melish “Programming in PROLOG”, Narosa Publishing House.
M.Sasikumar,S.Ramani etc. “Rule based Expert System”, Narosa Publishing House.
Combinational algorithms, string processing algorithm, Algebric algorithms , set algorithms
Ullman "Analysis and Design of Algorithm" TMH
Goodman “Introduction to the Design & Analysis of Algorithms, TMH-2002.
Sara Basse, A. V. Gelder, “ Computer Algorithms,” Addison Wesley
T. H. Cormen, Leiserson , Rivest and Stein, “Introduction of Computer algorithm,” PHI
E. Horowitz, S. Sahni, and S. Rajsekaran, “Fundamentals of Computer Algorithms,” Galgotia Publication
UNIT-I
UNIT-II
Data Security and Integrity: Parity Checking Code, Cyclic redundancy checks (CRC), Hemming Code, Protocol Concepts –, Basic flow control, Sliding window protocal-Go-Back-N protocol and selective repeat protocol, Protocol correctness- Finite state machine
UNIT-III
Local Area Network: Ethernet : 802.3 IEEE standard, Token Ring : 802.5 IEEE standard, Token Bus : 802.4 IEEE standard, FDDI Protocol, DQDB Protocol, Inter Networking, Layer 1 connections- Repeater, Hubs, Layer 2 connections- Bridges, Switches, Layer 3 connections- Routers, Gateways.
UNIT-IV
Wide Area Network: Introduction, Network routing, Routing Tables, Types of routing, Dijkstra’s Algorithm, Bellman-Ford Algorithm, Link state routing, Open shortest path first, Flooding, Broadcasting, Multicasting, Congestion & Dead Lock, Internet Protocols, Overview of TCP/IP, Transport protocols, Elements of Transport Protocol, Transmission control protocol (TCP), User data-gram protocol (UDP).
UNIT-V
Network Security, Virtual Terminal Protocol, Overview of DNS, SNMP, email, WWW, Multimedia. BOOKS
A.S.Tanenbaum, “Computer Network”, 4th addition,PHI
Forouzan “Data Communication and Networking 3ed”, TMH
J.F.Hayes, “Moduling and Analysis of Computer Communication Networks”, Plenum Press
D.E.Comer, “Internetworking with TCP/IP”, Volume Ist & IInd, PHI
Willium Stalling, “Data & Computer communications”,Maxwell Macmillan International Ed.
D.Bertsekas and R.Gallager,”Data Networks”, 2nd Ed. ,PHI.
G.E. Keiser ,”Local Area Networks “, McGraw Hill, International Ed.
Modeling Complex Data Semantics, Specialization, Generalization, Aggregation and Association, Objects, Object Identity and its implementation, Clustering, Equality and Object Reference, Architecture of Object Oriented and Object Relational databases, Persistent Programming Languages, Cache Coherence. Case Studies: Gemstone, O2, Object Store, SQL3, Oracle xxi, DB2.
Data log and Recursion, Evaluation of Data log program, Recursive queries with negation.
Parallel architectures, shared nothing/shared disk/shared memory based architectures, Data partitioning, Intra-operator parallelism, pipelining. Distributed Data Storage – Fragmentation & Replication, Location and Fragment Transparency Distributed Query Processing and Optimization, Distributed Transaction Modeling and concurrency Control, Distributed Deadlock, Commit Protocols, Design of Parallel Databases, and Parallel Query Evaluation.
Advanced transaction models: Savepoints, Nested and Multilevel Transactions, Compensating Transactions and Saga, Long Duration Transactions, Weak Levels of Consistency, Transaction Work Flows, Transaction Processing Monitors, Shared disk systems.
Triggers in SQL, Event Constraint and Action: ECA Rules, Query Processing and Concurrency Control, Recursive query processing, Compensation and Databases Recovery, multi-level recovery.
Modeling and Storage of Image and Multimedia Data, Data Structures – R-tree, k-d tree, Quad trees, Content Based Retrieval: Color Histograms, Textures, etc., Image Features, Spatial and Topological Relationships, Multimedia Data Formats, Video Data Model, Audio & Handwritten Data, Geographic Information Systems (GIS).
Accessing Databases through WEB, WEB Servers, XML Databases, Commercial Systems – Oracle xxi, DB2.
Elmarsi, “Fundamentals of Database Systems”, 4 th Edition, Pearson Education
R. Ramakrishnan, “Database Management Systems”, 1998, McGraw Hill International Editions
Elmagarmid.A.K. “Database transaction models for advanced applications”, Morgan Kaufman.
Transaction Processing, Concepts and Techniques, J. Gray and A. Reuter, Morgan Kauffman..
S. Abiteboul, R. hull and V. Vianu, “Foundations of Databases”, 1995, Addison – Wesley Publishing Co., Reading Massachusetts.
W. Kim, “Modern Database Systems”, 1995, ACM Press, Addison – Wesley.
D. Maier, “The Theory of Relational Databases”, 1993, Computer Science Press, Rockville, Maryland
UNIT-I
UNIT-II
UNIT -III
Context-Free grammar & PDA : Properties unrestricted grammar & their equivalence, derivation tree simplifying CFG, unambiguifying CFG, 7-productions, normal form for CFG, Pushdown automata, 2 way PDA, relation of PDA with CFG, Determinism & Non determinism in PDA & related theorems, parsing and pushdown automata.
UNIT-IV
UNIT-V
Hopcroft & Ullman “Introduction to Automata theory, languages & Computation” , Narosha Publishing house.
Lewish Papadimutrau “Theory of Computation” , Prentice Hall of India, New Delhi.
Peter linz, “An Introduction to formal language and automata”, Third edition, Narosa publication.
Marvin L. Minskay “Computation : Finite & Infinite Machines”, PHI.
Mishra & Chander Shekhar “Theory of Computer Science (Automate, Language & Computations), PHI.
The AI problems, what is an AI technique, Characteristics of AI applications. Introduction to LISP programming: Syntax and numeric functions, Basic list manipulation functions, predicates and conditionals, input output and local variables, iteraction and recursion, property lists and arrays.
General problem solving, production systems, control strategies forward and backward chaining, exhausive searches depth first breadth first search.
Hill climbing, branch and bound technique, best first search & A* algorithm, AND / OR graphs, problem reduction & AO* algorithm, constraint satisfaction problems.
UNIT-III
First order predicate calculus, skolemization, resolution principle & unification, interface mechanisms, horn's clauses, semantic networks, frame systems and value inheritance, scripts, conceptual dependency.
Parsing techniques, context free grammer, recursive transitions nets (RNT), augmented transition nets (ATN), case and logic grammers, symantic analysis.
Minimax search procedure, alpha-beta cutoffs, additional refinments.
Overview an example domain the block word, component of planning systems, goal stack planning, non linear planning.
Probability theory, bayes theorem and bayesian networks, certainty factor.
Introduction to expert system and application of expert systems, various expert system shells, vidwan frame work, knowledge acquisition, case studies, MYCIN.
Rote learning, learning by induction, explanation based learning.
Elaine Rich and Kevin Knight “Artifical Intelligence” - Tata McGraw Hill.
“Artifical Intelligence” 4 ed. Pearson.
Dan W. Patterson “Introduction to Artifical Intelligence and Expert Systems”, Prentice India.
Nils J. Nilson “Principles of Artifical Intelligence”, Narosa Publishing House.
Clocksin & C.S.Melish “Programming in PROLOG”, Narosa Publishing House.
M.Sasikumar,S.Ramani etc. “Rule based Expert System”, Narosa Publishing House.