Tuesday, January 12, 2010

project is evaluated on the basis

             5.1 Security in computing


Unit I

What does “secure” mean? – Attacks – the meaning of computer security – computer criminals – methods of Defense – what’s next

Elementary Cryptography

Terminology and background – substitution ciphers – transpositions (permutations) – making “Good” Encryption algorithms – the data encryption standard (DES) – The AES Encryption algorithm – public key encryption – the uses of encryption

Unit II

Program security

Secure programs – non-malicious program errors – viruses and other malicious code – targeted malicious code – controls against program threats

Unit III

Protection in general purpose operating system

Protected objects and methods of protection – memory and address protection – control of access to general objects – file protection mechanisms – user authentication

Designing trusted operating systems:

What is a trusted system? Security policies – models of security – trusted operating system design

Unit IV

Database Security

Introduction to Database – security requirements – reliability and integrity – sensitive data – inference – multilevel databases – proposals of multilevel security

Unit V

Security in networks

Network concepts – threats in networks – network security controls – firewalls – Intrusion reduction systems – secure E-mail

Text Book

Security in computing – third edition, charles P.Pfleeger. Shari Lawrence Pfleeger PHI 2005

Reference:

1.Crytography and Network security – Behrouz A.Forouzan, the Mc Graw Hill

2.Cryptography and network security – william stallings PHI 2008



5.2 Software Project Management

Unit I

Introduction – Importance of software project management – project – software project Vs other types of project – contract management and technical project management – activities covered by software project management – plans, methods and methodologies – categorizing software projects – setting objectives – stake holders – business case – requirement specification – management control. Step wise: an overview of project planning: Introduction – Ten steps programmed management and project evaluation: Introduction – programme management – managing the allocation of resources within programs – strategic programme management – creating progrmme – aids to programme management – benefits management – evaluation individual projects – technical assessment – cost benefit analysis – cash file forecasting – cost benefit evaluation techniques – risk evaluation.

Unit II

Selection of an appropriate project approach: Introduction – choosing technologies – technical plan contents list – choice of process models – structure vs speed of delivery – the waterfall model – the V-process model – the spiral model – software prototyping – other ways of categorizing prototypes – incremental delivery – dynamic systems development method – extreme programming – managing interactive processes – selecting the most appropriate process model.

Software cost estimation: Introduction – where are estimates done? – problems with over and under estimates – basics for software estimating – software effort estimation techniques – expert judgement – estimating by analogy – albrecht function point analysis – function points mark II – COSMIC Full function points – a procedure code oriented approach – COCOMO: a parametric model

Unit III

Activity planning: An Introduction – Objectives of activity planning – when to plan – project schedules – projects and Activities – sequencing and scheduling activities – networking planning models – formulating a network model – adding the time dimension – the forward pass – the backward pass – identifying the critical path – activity float – shortening the project duration – identifying critical activities - activity float – shortening the project duration – identifying critical activities – activity on arrow networks.

Risk management : Introduction – Risk – categories of Risk – a framework for dealing with this – risk identification – risk assessment – risk planning – risk management – evaluating risks to schedule – applying the PERT technique – mote carlo simulation – critical chain concepts.

Resource allocation: Introduction – The nature of resources – identifying resource requirements – scheduling resources – creating critical paths – counting the cost – being specific – publishing the resource schedule – cost schedule – the scheduling sequence.

Unit IV

Monitoring and control: Introduction – creating the framework – collection data – visualizing – progress – cost monitoring – earned value analysis – monitoring – getting the project back to target – change control.

Managing contracts: Introduction – ISO 12207 approach to the acquisition and supply of software – the supply process – type of contract – stages in Contract placement typical terms of a contract – contract management – acceptance.

Unit V

Managing people and organizing terms : Introduction – understanding behavior – organizational behavior - a back ground – selecting the right person for the job – the instruction in the best methods – motivation – the oldham – hackman job chracteristics model – working in groups – becoming a team – decision making – leadership – organizational structures – dispersed and virtual team – the influence of culture – stress – health and safety.

Software quality : Introduction – the place of software quality in project planning – the importance of software quality – defining software quality – ISO 9126 – practical software quality measures – product vs process software quality management – external standards – techniques to help enhance software quality – quality plans.

Text book

Software project management Bob hughes and mike cotterell , tata Mc Graw Hill fourth edition 2006

Reference

Software project management A concise study S.A Kelkar PHI 2007





5.3 Principles of compiler design

Unit I

Introduction to compilers:

Compilers and translators – the structure of a compiler – lexical analysis syntax analysis – intermediate code generation – optimization – code generation – book keeping – error handling – compiler-writing tools.

Unit II

Lexical analysis

The role of lexical analyzer – a simple approach to the design of lexical analyzers – regular expressions – implementation of a lexical analyzers

Unit III

Basic parsing techniques

Derivation and parse trees, parsers – shift reduces parsing operator precedence parsing – top down parsing - predictive parsers.

Automatic construction of parsers

LR parsers – the canonical collection of LR(0) items – constructing SLR parsing tables – constructing canonical LR parsing tables – constructing LALR parsing tables – using ambiguous grammars – An automatic parser generator implementation of LR parsing tables – constructing LALR set of items.

Unit IV

Syntax directed translations

Syntax directed translation schemes – implementation of syntax directed translators intermediate code-postfix notation – three address code , quadruples , triples – postfix translations.


Symbol tables

The contents of a symbol table – data structure for symbol tables – representing scope information.

Unit V

Error detection and recovery

Error – lexical phase errors-syntactic phase errors – semantic errors

Introduction to code optimization

The principle source of optimization – loop optimization – DAG representation of basic blocks

Code generation:

Object programs – problem in code generation – a simple code generator – peephole optimization.


Text book

Principles of compiler design – Aho & ullman , Naraso publishing house 1987

Referenece

1.compilers - Aho , ravi sethi ullman , naraso publshing house 1990

2.compilers writing – jean paul tremblay & sorenson McGraw Hill , International editions 1987


5.4 Data mining and Data warehousing

Unit I

Introduction to data warehousing:

Why all the excitement? – The need for data warehousing – paradigm shift – business problem definition – operational and informational data stores – data warehouse definition and characteristics – data warehouse architecture

Data warehousing components

Overall architecture – data warehouse database – souring, acquisition, cleanup and transformation tools – meta data – access tools – data marts – data warehouse administration and management – information delivery system

Building a data warehouse

Business considerations: return on investment – design considerations – technical considerations – implementation considerations – integrated solutions – benefits of data warehousing

Mapping the data warehouse to a multiprocessor architecture

Relational database technology for data warehouse – database architectures for parallel processing – parallel RDBMS features – alternative technologies – parallel DBMS vendors


Unit II

DBMS schemas for decisions support

Data layout for best access – multidimensional data model – star schema – star join and star index – bitmapped indexing – column local storage – complex data types



Data Extraction, clean up and transformation tools:

Tool requirements – vector approaches – access to legacy data – vender solutions – transformation engines

Metadata

Metadata defined – meta data interchange initiative – metadata repository – metadata management – implementation examples – metadata trends

On-line analytical processing (OLAP)

Need for OLAP – multidimensional data modeling – OLAP guidelines – multidimensional verse multi relational OLAP – categorization of OLAP Tools – State of the market – OLAP tools and Internet


Unit III

Introduction to data mining

Data mining has come of age – the motivation for data mining is tremendous – learning from your past mistakes – data mining? Don’t need it – I have got statistics – measuring data mining Effectiveness – accuracy , speed and cost – embedding data mining into your business process – the more things change, the more they remain the same – discovery versus prediction –overfitting – state of the industry – comparing the technolgies

Decision trees

What is decision trees? – Business score card – where to use decision trees – the general idea – how decision tree works – case study: predicting wireless telecommunications churn with chart – strength and weaknesses

Unit IV

Nearest neighbor and clustering:

Businesses score card – where to use clustering and nearest neighbor prediction – the general idea – how clustering and nearest neighbor prediction work – case study: Image recognition for human handwriting – strength and weakness

Genetic algorithms

What are genetic algorithms? – where to use genetic algorithms – the general idea – how the genetic algorithm works – case study : optimizing predictive customer segments – strengths and weaknesses

Unit V

Rule Induction
Business score card – where to use rule induction – the general idea – how rule induction works – case study: classifying U.S.Census returns – strengths and weaknesses – current offerings and future improvements

Selecting and using the right technique:

Using the right technique – data mining in the business process – the case for embedded data mining – how to measure accuracy , explanation and integration – what the future holds for embedded data mining.

Text Book

Data warehousing, data mining & OLAP , Alex berson , stephen J.Smith TMH 2006

Reference

1.Data warehousing, concepts, techniques, products and applications, C.S.R. Prapbhu PHI 2007.

2.Introduction to data mining with case studies, G.K.Gupta PHI 2006



Lab 9 Dot Net Lab


1.program using structure and enum


2.program using classes, methods, properties and read only property


3.program using constructors, overload constructors and class events


4.program using exception handling


5.function to perform various string operations


6.program using net built-in collection classes namely array list, bit, array, hash table, queue, sorted list stack, collection and dictionary base


7.program using inheritance, constructors in inheritance


8.program using overloading, abstract base classes, shared members and interface


9.program using winform controls


10.program using streams and serialization


11.five programs using databases






Lab 10 Networks Lab


Write a java programs for the following


1.Get detailed IP address of a system


2.send data from client to server using UDP


3.send data from client to server using TCP


4.use threads to receive multiple connections for a single server socket


5.send a file from server to multiple clients


6.create a chat room


7. Using RMI, do mathematical operations by sending data from client to server


8.using RMI, do banking transaction between client and server


9.using RMI , prepare EB bill


10.using RMI, do payroll processing


11. using RMI , perform inventory processing



Submit the following documents for the second review will be held on 11.03.2010 at 11 a.m. One page description for the following

1.organization profile
2.system requirement specification
a. Objective
b. Purpose
c. Scope
d. Overview
e. functionalities
f. Performance requirements
speed
Attributes
g) Software interface
h) Hardware interface
3.system analysis
requirement analysis
problem recognition

3.1 feasibility study
technical feasibility
Economical feasibility
Operational feasibility

3.2 DFD diagram
Data flow diagram

4.System design4.1 system architecture
4.2 application architecture

4.3 database designtable design
normalization
modular design
Implementation
5.1 coding style
file naming and organization
file suffices
System testing

6.1 objective of testing6.1.1 unit testing
6.1.2 integration testing
6.1.3 validation, stress, volume, recovery, system and acceptance testing
Test plan and test cases

7.conclusion
7.1 benefits
7.2 limitations
7.3 limitations
8.References8.1 books
8.2 Web
Appendix I
Entity – Relationship diagram
Appendix II
Data Dictionary
Appendix III
Sample screens and reports
Note: Only those who had paid the final semester tuition fee are permitted to attend the review
A7700100 S.Dhana Lakshmi : progress of the project is ok. Need to refer more.
A7700101 S.Jenny : Need to refer stemming algorithm , sample algorithm
And data set to be shown
A7700102 M.Malarvizhi :
A7700103 M.Anantha subramanian : Need to refer KD encoding. Progress of the project is ok.A7700104 E.Chanthru : Need to refer Gspell-SMSD. Progress of the project is ok.A7700105 V.R.G.Dinesh Babu : should be clear about the conceptual view of the projectA7700106 M.Dinesh Kumar : Need to refer P2P. progress of the project is ok.A7700107 M.Mohamed Farook Badhusha: No knowledge about the language of implementation
A7700108 T.Pandi Murugan : Need to refer HMM, FDS. No through knowledge on the projectA7700109 B.Senthur pandian : Need to refer IPMS,IIS. Progress of the project is ok.A1724055 L.Jegan :




The project is evaluated on the basisPresentation - 25% of total marks.Viva - 20% of total marks.Thesis/Project report - 30% of total marks.
Software Coding
i) Documentation - 10% of total marks.
ii) Software - 15% of total marks.

2 comments:

  1. good evening sir,
    i am v.r.g.dinesh babu.sir what we submit our project in second review

    ReplyDelete
  2. good evening sir,

    plz visit my blog

    http://sainavaneethan.blogspot.com/
    http://sainavaneethan.wordpress.com/

    ReplyDelete