5.1 Security in computing
Unit I
What does “secure” mean? – Attacks – the meaning of computer security – computer criminals – methods of Defense – what’s next
Elementary Cryptography
Terminology and background – substitution ciphers – transpositions (permutations) – making “Good” Encryption algorithms – the data encryption standard (DES) – The AES Encryption algorithm – public key encryption – the uses of encryption
Unit II
Program security
Secure programs – non-malicious program errors – viruses and other malicious code – targeted malicious code – controls against program threats
Unit III
Protection in general purpose operating system
Protected objects and methods of protection – memory and address protection – control of access to general objects – file protection mechanisms – user authentication
Designing trusted operating systems:
What is a trusted system? Security policies – models of security – trusted operating system design
Unit IV
Database Security
Introduction to Database – security requirements – reliability and integrity – sensitive data – inference – multilevel databases – proposals of multilevel security
Unit V
Security in networks
Network concepts – threats in networks – network security controls – firewalls – Intrusion reduction systems – secure E-mail
Text Book
Security in computing – third edition, charles P.Pfleeger. Shari Lawrence Pfleeger PHI 2005
Reference:
1.Crytography and Network security – Behrouz A.Forouzan, the Mc Graw Hill
2.Cryptography and network security – william stallings PHI 2008
5.2 Software Project Management
Unit I
Introduction – Importance of software project management – project – software project Vs other types of project – contract management and technical project management – activities covered by software project management – plans, methods and methodologies – categorizing software projects – setting objectives – stake holders – business case – requirement specification – management control. Step wise: an overview of project planning: Introduction – Ten steps programmed management and project evaluation: Introduction – programme management – managing the allocation of resources within programs – strategic programme management – creating progrmme – aids to programme management – benefits management – evaluation individual projects – technical assessment – cost benefit analysis – cash file forecasting – cost benefit evaluation techniques – risk evaluation.
Unit II
Selection of an appropriate project approach: Introduction – choosing technologies – technical plan contents list – choice of process models – structure vs speed of delivery – the waterfall model – the V-process model – the spiral model – software prototyping – other ways of categorizing prototypes – incremental delivery – dynamic systems development method – extreme programming – managing interactive processes – selecting the most appropriate process model.
Software cost estimation: Introduction – where are estimates done? – problems with over and under estimates – basics for software estimating – software effort estimation techniques – expert judgement – estimating by analogy – albrecht function point analysis – function points mark II – COSMIC Full function points – a procedure code oriented approach – COCOMO: a parametric model
Unit III
Activity planning: An Introduction – Objectives of activity planning – when to plan – project schedules – projects and Activities – sequencing and scheduling activities – networking planning models – formulating a network model – adding the time dimension – the forward pass – the backward pass – identifying the critical path – activity float – shortening the project duration – identifying critical activities - activity float – shortening the project duration – identifying critical activities – activity on arrow networks.
Risk management : Introduction – Risk – categories of Risk – a framework for dealing with this – risk identification – risk assessment – risk planning – risk management – evaluating risks to schedule – applying the PERT technique – mote carlo simulation – critical chain concepts.
Resource allocation: Introduction – The nature of resources – identifying resource requirements – scheduling resources – creating critical paths – counting the cost – being specific – publishing the resource schedule – cost schedule – the scheduling sequence.
Unit IV
Monitoring and control: Introduction – creating the framework – collection data – visualizing – progress – cost monitoring – earned value analysis – monitoring – getting the project back to target – change control.
Managing contracts: Introduction – ISO 12207 approach to the acquisition and supply of software – the supply process – type of contract – stages in Contract placement typical terms of a contract – contract management – acceptance.
Unit V
Managing people and organizing terms : Introduction – understanding behavior – organizational behavior - a back ground – selecting the right person for the job – the instruction in the best methods – motivation – the oldham – hackman job chracteristics model – working in groups – becoming a team – decision making – leadership – organizational structures – dispersed and virtual team – the influence of culture – stress – health and safety.
Software quality : Introduction – the place of software quality in project planning – the importance of software quality – defining software quality – ISO 9126 – practical software quality measures – product vs process software quality management – external standards – techniques to help enhance software quality – quality plans.
Text book
Software project management Bob hughes and mike cotterell , tata Mc Graw Hill fourth edition 2006
Reference
Software project management A concise study S.A Kelkar PHI 2007
5.3 Principles of compiler design
Unit I
Introduction to compilers:
Compilers and translators – the structure of a compiler – lexical analysis syntax analysis – intermediate code generation – optimization – code generation – book keeping – error handling – compiler-writing tools.
Unit II
Lexical analysis
The role of lexical analyzer – a simple approach to the design of lexical analyzers – regular expressions – implementation of a lexical analyzers
Unit III
Basic parsing techniques
Derivation and parse trees, parsers – shift reduces parsing operator precedence parsing – top down parsing - predictive parsers.
Automatic construction of parsers
LR parsers – the canonical collection of LR(0) items – constructing SLR parsing tables – constructing canonical LR parsing tables – constructing LALR parsing tables – using ambiguous grammars – An automatic parser generator implementation of LR parsing tables – constructing LALR set of items.
Unit IV
Syntax directed translations
Syntax directed translation schemes – implementation of syntax directed translators intermediate code-postfix notation – three address code , quadruples , triples – postfix translations.
Symbol tables
The contents of a symbol table – data structure for symbol tables – representing scope information.
Unit V
Error detection and recovery
Error – lexical phase errors-syntactic phase errors – semantic errors
Introduction to code optimization
The principle source of optimization – loop optimization – DAG representation of basic blocks
Code generation:
Object programs – problem in code generation – a simple code generator – peephole optimization.
Text book
Principles of compiler design – Aho & ullman , Naraso publishing house 1987
Referenece
1.compilers - Aho , ravi sethi ullman , naraso publshing house 1990
2.compilers writing – jean paul tremblay & sorenson McGraw Hill , International editions 1987
5.4 Data mining and Data warehousing
Unit I
Introduction to data warehousing:
Why all the excitement? – The need for data warehousing – paradigm shift – business problem definition – operational and informational data stores – data warehouse definition and characteristics – data warehouse architecture
Data warehousing components
Overall architecture – data warehouse database – souring, acquisition, cleanup and transformation tools – meta data – access tools – data marts – data warehouse administration and management – information delivery system
Building a data warehouse
Business considerations: return on investment – design considerations – technical considerations – implementation considerations – integrated solutions – benefits of data warehousing
Mapping the data warehouse to a multiprocessor architecture
Relational database technology for data warehouse – database architectures for parallel processing – parallel RDBMS features – alternative technologies – parallel DBMS vendors
Unit II
DBMS schemas for decisions support
Data layout for best access – multidimensional data model – star schema – star join and star index – bitmapped indexing – column local storage – complex data types
Data Extraction, clean up and transformation tools:
Tool requirements – vector approaches – access to legacy data – vender solutions – transformation engines
Metadata
Metadata defined – meta data interchange initiative – metadata repository – metadata management – implementation examples – metadata trends
On-line analytical processing (OLAP)
Need for OLAP – multidimensional data modeling – OLAP guidelines – multidimensional verse multi relational OLAP – categorization of OLAP Tools – State of the market – OLAP tools and Internet
Unit III
Introduction to data mining
Data mining has come of age – the motivation for data mining is tremendous – learning from your past mistakes – data mining? Don’t need it – I have got statistics – measuring data mining Effectiveness – accuracy , speed and cost – embedding data mining into your business process – the more things change, the more they remain the same – discovery versus prediction –overfitting – state of the industry – comparing the technolgies
Decision trees
What is decision trees? – Business score card – where to use decision trees – the general idea – how decision tree works – case study: predicting wireless telecommunications churn with chart – strength and weaknesses
Unit IV
Nearest neighbor and clustering:
Businesses score card – where to use clustering and nearest neighbor prediction – the general idea – how clustering and nearest neighbor prediction work – case study: Image recognition for human handwriting – strength and weakness
Genetic algorithms
What are genetic algorithms? – where to use genetic algorithms – the general idea – how the genetic algorithm works – case study : optimizing predictive customer segments – strengths and weaknesses
Unit V
Rule Induction
Business score card – where to use rule induction – the general idea – how rule induction works – case study: classifying U.S.Census returns – strengths and weaknesses – current offerings and future improvements
Selecting and using the right technique:
Using the right technique – data mining in the business process – the case for embedded data mining – how to measure accuracy , explanation and integration – what the future holds for embedded data mining.
Text Book
Data warehousing, data mining & OLAP , Alex berson , stephen J.Smith TMH 2006
Reference
1.Data warehousing, concepts, techniques, products and applications, C.S.R. Prapbhu PHI 2007.
2.Introduction to data mining with case studies, G.K.Gupta PHI 2006
Lab 9 Dot Net Lab
1.program using structure and enum
2.program using classes, methods, properties and read only property
3.program using constructors, overload constructors and class events
4.program using exception handling
5.function to perform various string operations
6.program using net built-in collection classes namely array list, bit, array, hash table, queue, sorted list stack, collection and dictionary base
7.program using inheritance, constructors in inheritance
8.program using overloading, abstract base classes, shared members and interface
9.program using winform controls
10.program using streams and serialization
11.five programs using databases
Lab 10 Networks Lab
Write a java programs for the following
1.Get detailed IP address of a system
2.send data from client to server using UDP
3.send data from client to server using TCP
4.use threads to receive multiple connections for a single server socket
5.send a file from server to multiple clients
6.create a chat room
7. Using RMI, do mathematical operations by sending data from client to server
8.using RMI, do banking transaction between client and server
9.using RMI , prepare EB bill
10.using RMI, do payroll processing
11. using RMI , perform inventory processing
Submit the following documents for the second review will be held on 11.03.2010 at 11 a.m. One page description for the following
1.organization profile
2.system requirement specification
a. Objective
b. Purpose
c. Scope
d. Overview
e. functionalities
f. Performance requirements
speed
Attributesg) Software interface
h) Hardware interface
3.system analysis
requirement analysis
problem recognition
3.1 feasibility study
technical feasibility
Economical feasibility
Operational feasibility
3.2 DFD diagram
Data flow diagram
4.System design4.1 system architecture
4.2 application architecture
4.3 database designtable design
normalization
modular design
Implementation5.1 coding style
file naming and organization
file suffices
System testing
6.1 objective of testing6.1.1 unit testing
6.1.2 integration testing
6.1.3 validation, stress, volume, recovery, system and acceptance testing
Test plan and test cases
7.conclusion
7.1 benefits
7.2 limitations
7.3 limitations8.References8.1 books
8.2 WebAppendix I
Entity – Relationship diagram
Appendix II
Data Dictionary
Appendix III
Sample screens and reports
Note: Only those who had paid the final semester tuition fee are permitted to attend the review
A7700100 S.Dhana Lakshmi : progress of the project is ok. Need to refer more.
A7700101 S.Jenny : Need to refer stemming algorithm , sample algorithm
And data set to be shown
A7700102 M.Malarvizhi :
A7700103 M.Anantha subramanian : Need to refer KD encoding. Progress of the project is ok.A7700104 E.Chanthru : Need to refer Gspell-SMSD. Progress of the project is ok.A7700105 V.R.G.Dinesh Babu : should be clear about the conceptual view of the projectA7700106 M.Dinesh Kumar : Need to refer P2P. progress of the project is ok.A7700107 M.Mohamed Farook Badhusha: No knowledge about the language of implementation
A7700108 T.Pandi Murugan : Need to refer HMM, FDS. No through knowledge on the projectA7700109 B.Senthur pandian : Need to refer IPMS,IIS. Progress of the project is ok.A1724055 L.Jegan :
The project is evaluated on the basisPresentation - 25% of total marks.Viva - 20% of total marks.Thesis/Project report - 30% of total marks.
Software Coding
i) Documentation - 10% of total marks.
ii) Software - 15% of total marks.
Tuesday, January 12, 2010
Tuesday, January 5, 2010
II MCA lab cycle
5.1 security in computing
Unit I
What does “secure” mean? – Attacks – the meaning of computer security – computer criminals – methods of Defense – what’s next
Elementary Cryptography
Terminology and background – substitution ciphers – transpositions (permutations) – making “Good” Encryption algorithms – the data encryption standard (DES) – The AES Encryption algorithm – public key encryption – the uses of encryption
Unit II
Program security
Secure programs – non-malicious program errors – viruses and other malicious code – targeted malicious code – controls against program threats
Unit III
Protection in general purpose operating system
Protected objects and methods of protection – memory and address protection – control of access to general objects – file protection mechanisms – user authentication
Designing trusted operating systems:
What is a trusted system? Security policies – models of security – trusted operating system design
Unit IV
Database Security
Introduction to Database – security requirements – reliability and integrity – sensitive data – inference – multilevel databases – proposals of multilevel security
Unit V
Security in networks
Network concepts – threats in networks – network security controls – firewalls – Intrusion reduction systems – secure E-mail
Text Book
Security in computing – third edition, charles P.Pfleeger. Shari Lawrence Pfleeger PHI 2005
Reference:
1.Crytography and Network security – Behrouz A.Forouzan, the Mc Graw Hill
2.Cryptography and network security – william stallings PHI 2008
5.2 Software Project Management
Unit I
Introduction – Importance of software project management – project – software project Vs other types of project – contract management and technical project management – activities covered by software project management – plans, methods and methodologies – categorizing software projects – setting objectives – stake holders – business case – requirement specification – management control. Step wise: an overview of project planning: Introduction – Ten steps programmed management and project evaluation: Introduction – programme management – managing the allocation of resources within programs – strategic programme management – creating progrmme – aids to programme management – benefits management – evaluation individual projects – technical assessment – cost benefit analysis – cash file forecasting – cost benefit evaluation techniques – risk evaluation.
Unit II
Selection of an appropriate project approach: Introduction – choosing technologies – technical plan contents list – choice of process models – structure vs speed of delivery – the waterfall model – the V-process model – the spiral model – software prototyping – other ways of categorizing prototypes – incremental delivery – dynamic systems development method – extreme programming – managing interactive processes – selecting the most appropriate process model.
Software cost estimation: Introduction – where are estimates done? – problems with over and under estimates – basics for software estimating – software effort estimation techniques – expert judgement – estimating by analogy – albrecht function point analysis – function points mark II – COSMIC Full function points – a procedure code oriented approach – COCOMO: a parametric model
Unit III
Activity planning: An Introduction – Objectives of activity planning – when to plan – project schedules – projects and Activities – sequencing and scheduling activities – networking planning models – formulating a network model – adding the time dimension – the forward pass – the backward pass – identifying the critical path – activity float – shortening the project duration – identifying critical activities - activity float – shortening the project duration – identifying critical activities – activity on arrow networks.
Risk management : Introduction – Risk – categories of Risk – a framework for dealing with this – risk identification – risk assessment – risk planning – risk management – evaluating risks to schedule – applying the PERT technique – mote carlo simulation – critical chain concepts.
Resource allocation: Introduction – The nature of resources – identifying resource requirements – scheduling resources – creating critical paths – counting the cost – being specific – publishing the resource schedule – cost schedule – the scheduling sequence.
Unit IV
Monitoring and control: Introduction – creating the framework – collection data – visualizing – progress – cost monitoring – earned value analysis – monitoring – getting the project back to target – change control.
Managing contracts: Introduction – ISO 12207 approach to the acquisition and supply of software – the supply process – type of contract – stages in Contract placement typical terms of a contract – contract management – acceptance.
Unit V
Managing people and organizing terms : Introduction – understanding behavior – organizational behavior - a back ground – selecting the right person for the job – the instruction in the best methods – motivation – the oldham – hackman job chracteristics model – working in groups – becoming a team – decision making – leadership – organizational structures – dispersed and virtual team – the influence of culture – stress – health and safety.
Software quality : Introduction – the place of software quality in project planning – the importance of software quality – defining software quality – ISO 9126 – practical software quality measures – product vs process software quality management – external standards – techniques to help enhance software quality – quality plans.
Text book
Software project management Bob hughes and mike cotterell , tata Mc Graw Hill fourth edition 2006
Reference
Software project management A concise study S.A Kelkar PHI 2007
5.3 Principles of compiler design
Unit I
Introduction to compilers:
Compilers and translators – the structure of a compiler – lexical analysis syntax analysis – intermediate code generation – optimization – code generation – book keeping – error handling – compiler-writing tools.
Unit II
Lexical analysis
The role of lexical analyzer – a simple approach to the design of lexical analyzers – regular expressions – implementation of a lexical analyzers
Unit III
Basic parsing techniques
Derivation and parse trees, parsers – shift reduces parsing operator precedence parsing – top down parsing - predictive parsers.
Automatic construction of parsers
LR parsers – the canonical collection of LR(0) items – constructing SLR parsing tables – constructing canonical LR parsing tables – constructing LALR parsing tables – using ambiguous grammars – An automatic parser generator implementation of LR parsing tables – constructing LALR set of items.
Unit IV
Syntax directed translations
Syntax directed translation schemes – implementation of syntax directed translators intermediate code-postfix notation – three address code , quadruples , triples – postfix translations.
Symbol tables
The contents of a symbol table – data structure for symbol tables – representing scope information.
Unit V
Error detection and recovery
Error – lexical phase errors-syntactic phase errors – semantic errors
Introduction to code optimization
The principle source of optimization – loop optimization – DAG representation of basic blocks
Code generation:
Object programs – problem in code generation – a simple code generator – peephole optimization.
Text book
Principles of compiler design – Aho & ullman , Naraso publishing house 1987
Referenece
1.compilers - Aho , ravi sethi ullman , naraso publshing house 1990
2.compilers writing – jean paul tremblay & sorenson McGraw Hill , International editions 1987
5.4 Data mining and Data warehousing
Unit I
Introduction to data warehousing:
Why all the excitement? – The need for data warehousing – paradigm shift – business problem definition – operational and informational data stores – data warehouse definition and characteristics – data warehouse architecture
Data warehousing components
Overall architecture – data warehouse database – souring, acquisition, cleanup and transformation tools – meta data – access tools – data marts – data warehouse administration and management – information delivery system
Building a data warehouse
Business considerations: return on investment – design considerations – technical considerations – implementation considerations – integrated solutions – benefits of data warehousing
Mapping the data warehouse to a multiprocessor architecture
Relational database technology for data warehouse – database architectures for parallel processing – parallel RDBMS features – alternative technologies – parallel DBMS vendors
Unit II
DBMS schemas for decisions support
Data layout for best access – multidimensional data model – star schema – star join and star index – bitmapped indexing – column local storage – complex data types
Data Extraction, clean up and transformation tools:
Tool requirements – vector approaches – access to legacy data – vender solutions – transformation engines
Metadata
Metadata defined – meta data interchange initiative – metadata repository – metadata management – implementation examples – metadata trends
On-line analytical processing (OLAP)
Need for OLAP – multidimensional data modeling – OLAP guidelines – multidimensional verse multi relational OLAP – categorization of OLAP Tools – State of the market – OLAP tools and Internet
Unit III
Introduction to data mining
Data mining has come of age – the motivation for data mining is tremendous – learning from your past mistakes – data mining? Don’t need it – I have got statistics – measuring data mining Effectiveness – accuracy , speed and cost – embedding data mining into your business process – the more things change, the more they remain the same – discovery versus prediction –overfitting – state of the industry – comparing the technolgies
Decision trees
What is decision trees? – Business score card – where to use decision trees – the general idea – how decision tree works – case study: predicting wireless telecommunications churn with chart – strength and weaknesses
Unit IV
Nearest neighbor and clustering:
Businesses score card – where to use clustering and nearest neighbor prediction – the general idea – how clustering and nearest neighbor prediction work – case study: Image recognition for human handwriting – strength and weakness
Genetic algorithms
What are genetic algorithms? – where to use genetic algorithms – the general idea – how the genetic algorithm works – case study : optimizing predictive customer segments – strengths and weaknesses
Unit V
Rule Induction
Business score card – where to use rule induction – the general idea – how rule induction works – case study: classifying U.S.Census returns – strengths and weaknesses – current offerings and future improvements
Selecting and using the right technique:
Using the right technique – data mining in the business process – the case for embedded data mining – how to measure accuracy , explanation and integration – what the future holds for embedded data mining.
Text Book
Data warehousing, data mining & OLAP , Alex berson , stephen J.Smith TMH 2006
Reference
1.Data warehousing, concepts, techniques, products and applications, C.S.R. Prapbhu PHI 2007.
2.Introduction to data mining with case studies, G.K.Gupta PHI 2006
Lab 9 Dot Net Lab
1.program using structure and enum
2.program using classes, methods, properties and read only property
3.program using constructors, overload constructors and class events
4.program using exception handling
5.function to perform various string operations
6.program using net built-in collection classes namely array list, bit, array, hash table, queue, sorted list stack, collection and dictionary base
7.program using inheritance, constructors in inheritance
8.program using overloading, abstract base classes, shared members and interface
9.program using winform controls
10.program using streams and serialization
11.five programs using databases
Lab 10 Networks Lab
Write a java programs for the following
1.Get detailed IP address of a system
2.send data from client to server using UDP
3.send data from client to server using TCP
4.use threads to receive multiple connections for a single server socket
5.send a file from server to multiple clients
6.create a chat room
7. Using RMI, do mathematical operations by sending data from client to server
8.using RMI, do banking transaction between client and server
9.using RMI , prepare EB bill
10.using RMI, do payroll processing
11. using RMI , perform inventory processing
Lab 7: Database LabPL/SQL1.Program using conditional control, iterative control and sequential control
2.Program using exception handling
3.program using explicit cursors and implicit cursors
4.program using pl/sql tables and record5.program using database triggers6.program to design procedures using in, out, inout parameter.7.Program to design procedures using functions8.program to design procedures using packages
Forms and Report Writer1.Inventory control2.banking3.students mark list4.library maintenance5.payroll6.invoice7.Railway Reservation8.College Admission
Lab 8: Web Technology lab
1.Design a web page using html tags2.design a web page using html frames3.design a web page having questionnaire using html forms4.design a web page using html5.design a web page using all multimedia components
6.design a web page using flash menus7.design a web page that has bio-data using JavaScript and do validation8.design a web page to submit employee information to a server
9.design a web page for online exam10.design five pages of a e-book11.create a computer dictionary using script
12.create a tutorial Web site using script13.using databases display info in web page14.using Asp/ Jsp develop at least three applications
Unit I
What does “secure” mean? – Attacks – the meaning of computer security – computer criminals – methods of Defense – what’s next
Elementary Cryptography
Terminology and background – substitution ciphers – transpositions (permutations) – making “Good” Encryption algorithms – the data encryption standard (DES) – The AES Encryption algorithm – public key encryption – the uses of encryption
Unit II
Program security
Secure programs – non-malicious program errors – viruses and other malicious code – targeted malicious code – controls against program threats
Unit III
Protection in general purpose operating system
Protected objects and methods of protection – memory and address protection – control of access to general objects – file protection mechanisms – user authentication
Designing trusted operating systems:
What is a trusted system? Security policies – models of security – trusted operating system design
Unit IV
Database Security
Introduction to Database – security requirements – reliability and integrity – sensitive data – inference – multilevel databases – proposals of multilevel security
Unit V
Security in networks
Network concepts – threats in networks – network security controls – firewalls – Intrusion reduction systems – secure E-mail
Text Book
Security in computing – third edition, charles P.Pfleeger. Shari Lawrence Pfleeger PHI 2005
Reference:
1.Crytography and Network security – Behrouz A.Forouzan, the Mc Graw Hill
2.Cryptography and network security – william stallings PHI 2008
5.2 Software Project Management
Unit I
Introduction – Importance of software project management – project – software project Vs other types of project – contract management and technical project management – activities covered by software project management – plans, methods and methodologies – categorizing software projects – setting objectives – stake holders – business case – requirement specification – management control. Step wise: an overview of project planning: Introduction – Ten steps programmed management and project evaluation: Introduction – programme management – managing the allocation of resources within programs – strategic programme management – creating progrmme – aids to programme management – benefits management – evaluation individual projects – technical assessment – cost benefit analysis – cash file forecasting – cost benefit evaluation techniques – risk evaluation.
Unit II
Selection of an appropriate project approach: Introduction – choosing technologies – technical plan contents list – choice of process models – structure vs speed of delivery – the waterfall model – the V-process model – the spiral model – software prototyping – other ways of categorizing prototypes – incremental delivery – dynamic systems development method – extreme programming – managing interactive processes – selecting the most appropriate process model.
Software cost estimation: Introduction – where are estimates done? – problems with over and under estimates – basics for software estimating – software effort estimation techniques – expert judgement – estimating by analogy – albrecht function point analysis – function points mark II – COSMIC Full function points – a procedure code oriented approach – COCOMO: a parametric model
Unit III
Activity planning: An Introduction – Objectives of activity planning – when to plan – project schedules – projects and Activities – sequencing and scheduling activities – networking planning models – formulating a network model – adding the time dimension – the forward pass – the backward pass – identifying the critical path – activity float – shortening the project duration – identifying critical activities - activity float – shortening the project duration – identifying critical activities – activity on arrow networks.
Risk management : Introduction – Risk – categories of Risk – a framework for dealing with this – risk identification – risk assessment – risk planning – risk management – evaluating risks to schedule – applying the PERT technique – mote carlo simulation – critical chain concepts.
Resource allocation: Introduction – The nature of resources – identifying resource requirements – scheduling resources – creating critical paths – counting the cost – being specific – publishing the resource schedule – cost schedule – the scheduling sequence.
Unit IV
Monitoring and control: Introduction – creating the framework – collection data – visualizing – progress – cost monitoring – earned value analysis – monitoring – getting the project back to target – change control.
Managing contracts: Introduction – ISO 12207 approach to the acquisition and supply of software – the supply process – type of contract – stages in Contract placement typical terms of a contract – contract management – acceptance.
Unit V
Managing people and organizing terms : Introduction – understanding behavior – organizational behavior - a back ground – selecting the right person for the job – the instruction in the best methods – motivation – the oldham – hackman job chracteristics model – working in groups – becoming a team – decision making – leadership – organizational structures – dispersed and virtual team – the influence of culture – stress – health and safety.
Software quality : Introduction – the place of software quality in project planning – the importance of software quality – defining software quality – ISO 9126 – practical software quality measures – product vs process software quality management – external standards – techniques to help enhance software quality – quality plans.
Text book
Software project management Bob hughes and mike cotterell , tata Mc Graw Hill fourth edition 2006
Reference
Software project management A concise study S.A Kelkar PHI 2007
5.3 Principles of compiler design
Unit I
Introduction to compilers:
Compilers and translators – the structure of a compiler – lexical analysis syntax analysis – intermediate code generation – optimization – code generation – book keeping – error handling – compiler-writing tools.
Unit II
Lexical analysis
The role of lexical analyzer – a simple approach to the design of lexical analyzers – regular expressions – implementation of a lexical analyzers
Unit III
Basic parsing techniques
Derivation and parse trees, parsers – shift reduces parsing operator precedence parsing – top down parsing - predictive parsers.
Automatic construction of parsers
LR parsers – the canonical collection of LR(0) items – constructing SLR parsing tables – constructing canonical LR parsing tables – constructing LALR parsing tables – using ambiguous grammars – An automatic parser generator implementation of LR parsing tables – constructing LALR set of items.
Unit IV
Syntax directed translations
Syntax directed translation schemes – implementation of syntax directed translators intermediate code-postfix notation – three address code , quadruples , triples – postfix translations.
Symbol tables
The contents of a symbol table – data structure for symbol tables – representing scope information.
Unit V
Error detection and recovery
Error – lexical phase errors-syntactic phase errors – semantic errors
Introduction to code optimization
The principle source of optimization – loop optimization – DAG representation of basic blocks
Code generation:
Object programs – problem in code generation – a simple code generator – peephole optimization.
Text book
Principles of compiler design – Aho & ullman , Naraso publishing house 1987
Referenece
1.compilers - Aho , ravi sethi ullman , naraso publshing house 1990
2.compilers writing – jean paul tremblay & sorenson McGraw Hill , International editions 1987
5.4 Data mining and Data warehousing
Unit I
Introduction to data warehousing:
Why all the excitement? – The need for data warehousing – paradigm shift – business problem definition – operational and informational data stores – data warehouse definition and characteristics – data warehouse architecture
Data warehousing components
Overall architecture – data warehouse database – souring, acquisition, cleanup and transformation tools – meta data – access tools – data marts – data warehouse administration and management – information delivery system
Building a data warehouse
Business considerations: return on investment – design considerations – technical considerations – implementation considerations – integrated solutions – benefits of data warehousing
Mapping the data warehouse to a multiprocessor architecture
Relational database technology for data warehouse – database architectures for parallel processing – parallel RDBMS features – alternative technologies – parallel DBMS vendors
Unit II
DBMS schemas for decisions support
Data layout for best access – multidimensional data model – star schema – star join and star index – bitmapped indexing – column local storage – complex data types
Data Extraction, clean up and transformation tools:
Tool requirements – vector approaches – access to legacy data – vender solutions – transformation engines
Metadata
Metadata defined – meta data interchange initiative – metadata repository – metadata management – implementation examples – metadata trends
On-line analytical processing (OLAP)
Need for OLAP – multidimensional data modeling – OLAP guidelines – multidimensional verse multi relational OLAP – categorization of OLAP Tools – State of the market – OLAP tools and Internet
Unit III
Introduction to data mining
Data mining has come of age – the motivation for data mining is tremendous – learning from your past mistakes – data mining? Don’t need it – I have got statistics – measuring data mining Effectiveness – accuracy , speed and cost – embedding data mining into your business process – the more things change, the more they remain the same – discovery versus prediction –overfitting – state of the industry – comparing the technolgies
Decision trees
What is decision trees? – Business score card – where to use decision trees – the general idea – how decision tree works – case study: predicting wireless telecommunications churn with chart – strength and weaknesses
Unit IV
Nearest neighbor and clustering:
Businesses score card – where to use clustering and nearest neighbor prediction – the general idea – how clustering and nearest neighbor prediction work – case study: Image recognition for human handwriting – strength and weakness
Genetic algorithms
What are genetic algorithms? – where to use genetic algorithms – the general idea – how the genetic algorithm works – case study : optimizing predictive customer segments – strengths and weaknesses
Unit V
Rule Induction
Business score card – where to use rule induction – the general idea – how rule induction works – case study: classifying U.S.Census returns – strengths and weaknesses – current offerings and future improvements
Selecting and using the right technique:
Using the right technique – data mining in the business process – the case for embedded data mining – how to measure accuracy , explanation and integration – what the future holds for embedded data mining.
Text Book
Data warehousing, data mining & OLAP , Alex berson , stephen J.Smith TMH 2006
Reference
1.Data warehousing, concepts, techniques, products and applications, C.S.R. Prapbhu PHI 2007.
2.Introduction to data mining with case studies, G.K.Gupta PHI 2006
Lab 9 Dot Net Lab
1.program using structure and enum
2.program using classes, methods, properties and read only property
3.program using constructors, overload constructors and class events
4.program using exception handling
5.function to perform various string operations
6.program using net built-in collection classes namely array list, bit, array, hash table, queue, sorted list stack, collection and dictionary base
7.program using inheritance, constructors in inheritance
8.program using overloading, abstract base classes, shared members and interface
9.program using winform controls
10.program using streams and serialization
11.five programs using databases
Lab 10 Networks Lab
Write a java programs for the following
1.Get detailed IP address of a system
2.send data from client to server using UDP
3.send data from client to server using TCP
4.use threads to receive multiple connections for a single server socket
5.send a file from server to multiple clients
6.create a chat room
7. Using RMI, do mathematical operations by sending data from client to server
8.using RMI, do banking transaction between client and server
9.using RMI , prepare EB bill
10.using RMI, do payroll processing
11. using RMI , perform inventory processing
Lab 7: Database LabPL/SQL1.Program using conditional control, iterative control and sequential control
2.Program using exception handling
3.program using explicit cursors and implicit cursors
4.program using pl/sql tables and record5.program using database triggers6.program to design procedures using in, out, inout parameter.7.Program to design procedures using functions8.program to design procedures using packages
Forms and Report Writer1.Inventory control2.banking3.students mark list4.library maintenance5.payroll6.invoice7.Railway Reservation8.College Admission
Lab 8: Web Technology lab
1.Design a web page using html tags2.design a web page using html frames3.design a web page having questionnaire using html forms4.design a web page using html5.design a web page using all multimedia components
6.design a web page using flash menus7.design a web page that has bio-data using JavaScript and do validation8.design a web page to submit employee information to a server
9.design a web page for online exam10.design five pages of a e-book11.create a computer dictionary using script
12.create a tutorial Web site using script13.using databases display info in web page14.using Asp/ Jsp develop at least three applications
Monday, January 4, 2010
projectbcamca
A7105151 K.Brindha : LAN CONFERENCE title is selected
A7105152 R.Kavitha : 'Logistics Management System' title is selected. Front End is 'Asp.net',Back End is 'Sql Sever'.
A7105154 s.priya
A7105155 P.Ramyadevi : EMPLOYEE FUND MANAGEMENT title is selected
A7105156 R.Shalini :'Two Wheeler Service and Sales Management System' title is selected
A7105157 S.Sharmila E-CONFERENCE title is selected
A7105158 M.R.AnandaKumar : HUMAN RESOURCE title is slected
A7105159 T.Anandaporul : FRONT OFFICE UTILIZATION ON HYUNDAI title is selected
A7105160 N.AnanthaPrabu : CUSTOMER RELATIONSHIP MANGEMENT title is selected
A7105161 P.Angalarajan : PHARMACY MANAGEMENT SYSTEM title is selected
A7105162 R.Arun
A7105163 K.Arun Kumar
A7105164 A.Balamurugan
A7105166 M.Dinesh venkataraman
A7105167 S.Ganesan
A7105168 M.Jangi Raman :HETROGENEOUS AND HOMOGENEOUS LOAD BALANCING title is selected
A7105169 M.Karthick : Towards making broadcast encryption title is selected
A7105170 S.Karthick
A7105171 B.Karthick
A7105172 P.Madusoothanan
A7105173 M.Mahendran :Procedure for interdomain transfer engineering title is selected
A7105174 S.Malaieswaran :computer spares sales system title is selected
A7105175 M.Muthumanickam
A7105176 C.Prabu : CUSTOMER RELATIONSHIP MANAGEMENT title is selected
A7105177 S.Ramasamy : Cell Breathing Techniques for Load Balancing in Wireless LANs title is selected
A7105178 B.Sathish Kumar: steganography title is selected
A7105179 T.Subash chandra bose :SESA:RISING TECHNOLOGY FOR SERVICE - CENTRIC ENVIRONMENTS title is selected
A7105180 M.Sundar :Collaborative Proxy System for Distributed Web Content Transcoding title is selected
A7105181 M.Sundara Mahalingam: HUMAN RESOURCE DEVELOPMENT INFORMATION SYSTEM title is selected
A7105182 S.Syed sulaiman yasar : civil supply management title is selected
A7105183 B.Thamim Ansari :CUSTOMER RELATIONSHIP MANAGEMENT title is selected
A7105184 R.Vasantha Marimuthu
A7105185 S.Venkatesh
A7105186 M.D.Vidya sagar
A7105187 J.Vignesh Kumar
A7105188 A.Vijaya kumar : L & B ASSERT MANAGEMENT title is selected
A7105189 S.D.Vinoth Kumar :MOVING VIRTUAL SERVER FROM PEER TO PEER BASED ON LOAD title is selected
A7105152 R.Kavitha : 'Logistics Management System' title is selected. Front End is 'Asp.net',Back End is 'Sql Sever'.
A7105154 s.priya
A7105155 P.Ramyadevi : EMPLOYEE FUND MANAGEMENT title is selected
A7105156 R.Shalini :'Two Wheeler Service and Sales Management System' title is selected
A7105157 S.Sharmila E-CONFERENCE title is selected
A7105158 M.R.AnandaKumar : HUMAN RESOURCE title is slected
A7105159 T.Anandaporul : FRONT OFFICE UTILIZATION ON HYUNDAI title is selected
A7105160 N.AnanthaPrabu : CUSTOMER RELATIONSHIP MANGEMENT title is selected
A7105161 P.Angalarajan : PHARMACY MANAGEMENT SYSTEM title is selected
A7105162 R.Arun
A7105163 K.Arun Kumar
A7105164 A.Balamurugan
A7105166 M.Dinesh venkataraman
A7105167 S.Ganesan
A7105168 M.Jangi Raman :HETROGENEOUS AND HOMOGENEOUS LOAD BALANCING title is selected
A7105169 M.Karthick : Towards making broadcast encryption title is selected
A7105170 S.Karthick
A7105171 B.Karthick
A7105172 P.Madusoothanan
A7105173 M.Mahendran :Procedure for interdomain transfer engineering title is selected
A7105174 S.Malaieswaran :computer spares sales system title is selected
A7105175 M.Muthumanickam
A7105176 C.Prabu : CUSTOMER RELATIONSHIP MANAGEMENT title is selected
A7105177 S.Ramasamy : Cell Breathing Techniques for Load Balancing in Wireless LANs title is selected
A7105178 B.Sathish Kumar: steganography title is selected
A7105179 T.Subash chandra bose :SESA:RISING TECHNOLOGY FOR SERVICE - CENTRIC ENVIRONMENTS title is selected
A7105180 M.Sundar :Collaborative Proxy System for Distributed Web Content Transcoding title is selected
A7105181 M.Sundara Mahalingam: HUMAN RESOURCE DEVELOPMENT INFORMATION SYSTEM title is selected
A7105182 S.Syed sulaiman yasar : civil supply management title is selected
A7105183 B.Thamim Ansari :CUSTOMER RELATIONSHIP MANAGEMENT title is selected
A7105184 R.Vasantha Marimuthu
A7105185 S.Venkatesh
A7105186 M.D.Vidya sagar
A7105187 J.Vignesh Kumar
A7105188 A.Vijaya kumar : L & B ASSERT MANAGEMENT title is selected
A7105189 S.D.Vinoth Kumar :MOVING VIRTUAL SERVER FROM PEER TO PEER BASED ON LOAD title is selected
Subscribe to:
Posts (Atom)