B.E. (Information technology)
INTRODUCTION TO SOFTWARE ENGINEERING - Definition and use of Software Engineering Terms related to Software Engineering activities. Size Factors :- Trivial projects, Small projects, Medium size projects, Large projects , Very large projects, Extremely large projects Quality and Productivity factors during Software Development Managerial Issues:- Ideal or expected activities of Managers in a firm
PLANNING AND ANALYSIS PHASE:
Software Project Planning :- Defining the problem, Developing a solution strategy,Planning the development process, Goals and Requirements. Various types of Software Development Models Waterfall model or Linear Sequential model , Prototyping model ,Rapid Application Development (RAD) model , Incremental model , Spiral model & Component Assembly model. Programming Team Structure. Software Configuration Management (SCM) :- Meaning and Components of SCM, SCM terms, SCM tasks,Formal technical reviews (FTR) & Configuration audit.SOFTWARE QUALITY ASSURANCE:-Quality, Quality Control, QualityAssurance, Costs related to maintenance of Quality, Software Quality Assurance(SQA) Activities, Statistical Quality Assurance Risk Management :- Types of Risks andRisk Management Strategies.Software Cost Estimation :- Major factors that influence software cost, Software Cost Estimation Techniques, Expert Judgment, Delphi cost estimation (Recursive Estimation), The COCOMO Model, Work Breakdown Structures(WBS), Function-Oriented Metrics (Function Point Analysis).Analysis Concepts:- Software
Requirement Analysis activities, Software Requirement Specification(SRS) or Software Requirement Plan(SRP) , Models used in the Analysis phase (Analysis Model).
DESIGN PHASE Design Principles. Basic Design sub-Phases:- Data design. Architectural design. Interface design. Procedural design. Fundamental Design Concepts: - Abstraction, Information hiding, Modularity, Concurrency, Verification, Aesthetics. Modularization:- Meaning, Coupling and Cohesion in modules Design Notations. Object Oriented Design: -
Introduction to UML.Software Design byproducts: - Test Plans, Test Case Design, Milestones, Walkthroughs and Inspections.
Coding :- Coding Techniques, Suggestions on good Coding Style (Do's and Dont's),Internal Documentation, Verification and Validation, Objects, Modules and Reusability.
SOFTWARE TESTING, MAINTENANCE PHASE & CASE Tools Testing:- Types of Tests, Test Report and Analysis.Maintenance:- Definition of Software Maintenance, Types of Maintenance, Management of software maintenance.
CASE Tools:- Introduction to CASE tools, Use of CASE tools in various phases of Software Development.
Management Information System
MANAGEMENT & ORGANIZATIONAL SUPPORT SYSTEMS FOR DIGITAL FIRM:
Definition of MIS; Systems approach to MIS: MIS and Human factor considerations,concept of organizational information sub-system, MIS & problem solving. InformationTechnology Infrastructure for digital firm. Related Case Studies.
INFORMATION SYSTEMS & BUSINESS STRATEGY:Information Management. Who are the users? Managers, Decision making & informationSystem, Evolution of Computer based information system (CBIS), Model of CBIS.Changing role of Information systems in organization: Trend to End-User computing,
justifying the CBIS, Achieving the CBIS, Managing the CBIS, Benefits & Challenges ofCBIS implementation. Strategic Information System, Business level & Firm level Strategy,Case Studies.
INFORMATION SYSTEMS IN THE ENTERPRISE:Systems from Management & Functional perspective & their relationship: ExecutiveSupport System, Decision Support System, Sales & Marketing Information System,Manufacturing Information System, Human-Resource Information System. Finance &Account Information System. Case Studies.
INFORMATION TECHNOLOGY FOR COMPETITIVE ADVANTAGE:Firm in its environment, the information resources, who manages the informationresources? Strategic planning for information resources. End-User Computing as astrategic issue, Information resource management concept. Knowledge management &
their work system, Business value of information system Related Case Studies.
INTERNATIONAL INFORMATION SYSTEM:Introduction to E-Commerce, Business Intelligence. E-Commerce strategy, ElectronicData Interchange, E-commerce methodology, E-commerce technology & their successstrategies.Managing International Information Systems: IIS architecture, Global business drivers,challenges, and strategy: divide, conquer, appease, cooptation, business organization,problems in implementing global information systems,
Understanding ethical and social issues related to systems, ethics in information society,and Moral dimensions of information systems.
Introduction to e-Commerce, e-Commerce Framework, e-Commerce and Media Convergence, Anatomy of e-Commerce Applications, e-Commerce Consumer Applications, e-Commerce Organization Applications.
Components of I-way, Network Access Equipment, National-Independent ISPs, Regional- level ISPs,Local -level ISPs.
Client-Server Network Security, Emerging Client-Server Security Threats, Firewalls and Network Security, Data and Message Security, Encrypted Documents and Electronic Mail, Challenge ResponseSystem.
Architectural Framework for e-Commerce, WWW as the Architecture, Security
and the Web, Consumer Oriented Applications, Mercantile Process Models, Types of E-Payment Systems, Smart Cards, Credit Card -Based e-payment Systems.
Electronic Data Interchange, EDI Applications in Business, EDI and E-Commerce, Standardization and EDI, EDI Software Implementation, Value Added Networks (VANs), Internal Information Systems.
Artificial Intelligence and Expert System
GENERAL ISSUES AND OVERVIEW OF AI-The AI problems; what is an AI technique; Characteristics of AI applications Problem Solving, Search and
Control Strategies General Problem solving; Production systems; Control strategies: forward andbackward chaining Exhaustive searches: Depth first Breadth firstsearch.
HEURISTIC SEARCH TECHNIQUES:Hill climbing; Branch and Bound technique; Best firstsearch and A* algorithm; AND/OR Graphs; Problem
reduction and AO* algorithm; Constraint Satisfaction problems Game Playing Minmax search procedure;Alpha-Beta cutoffs; Additional Refinements
KNOWLEDGE REPRESENTATION First Order Predicate Calculus; Skolemnisation; Resolution Principle and Unification; Inference Mechanisms Horn's Clauses; Semantic Networks; Frame Systems and Value Inheritance; Scripts;
Conceptual Dependency AI Programming Languages Introduction to LISP, Syntax and Numeric Functions; List manipulation functions; Iteration and Recursion; Property list and Arrays, Introduction toPROLOG.
NATURAL LANGUAGE PROCESSING PARSING TECHNIQUES Context - free Grammar; Recursive Transition Nets (RTN); Augmented Transition Nets (ATN); Semantic
Analysis, Case and Logic Grammars; Planning Overview - An Example Domain: The Blocks Word;Component of Planning Systems; Goal Stack Planning (linear planning); Non-linear Planning usingconstraint posting ; Probabilistic Reasoning and Uncertainty; Probability theory; Bayes Theorem and Bayesian networks; Certainty Factor.
EXPERT SYSTEMS,Introduction to Expert Systems, Architecture of Expert Systems; Expert System Shells; KnowledgeAcquisition; Case Studies: MYCIN, Rote Learning; Learning by Induction; Explanation basedlearning.
Multimedia and Communication
INTRODUCTION:Concept of Non-Temporal and Temporal Media. Basic Characteristics of Non-Temporal Media; Images,Graphics, Text. Basic Characteristics of Temporal Media: Video, Audio, Animation. Hypertext and
Hypermedia.Presentations: Synchronization, Events, Scripts and Interactivity, Introduction to AuthoringSystems.
COMPRESSION TECHNIQUES:Basic concepts of Compression. Still Image Compression.: JPEG Compression., Features of JPEG2000.Video Compression: MPEG- 1&2 Compression Schemes, MPEG-4 Natural Video Compression.Audio Compression: Introduction to speech and Audio Compression, MP3 Compression Scheme.Compression. Of synthetic. Graphical objects.
MULTIMEDIA SYSTEMS ARCHITECTURE:General Purpose Architecture for Multimedia Support: Introduction to Multimedia PC/Workstation Architecture, Characteristics of MMX instruction set, I/O systems: Overview of USB port and IEEE 1394 interface, Operating System Support for Multimedia Data: Resource Scheduling with real-time considerations, File System, I/O Device Management.
MULTIMEDIA INFORMATION MANAGEMENT:Multimedia Database Design, Content Based Information Retrieval: Image Retrieval, Video Retrieval,Overview of MPEG-7, Design of video-on-Demand Systems.
VIRTUAL REALITY:Introduction to Virtual Reality and Virtual Reality Systems, Related Technologies: Tele-operation and Augmented Reality Systems Interface to the Virtual World-Input; Head and hand trackers, data globes,hap tic input devices. Interface to the Virtual World- Output, Stereo display, head-mounted display, auto-stereoscopic displays, holographic displays, hap tic and force feedback.VRML Programming; Modeling objects and virtual environments Domain Dependent applications:
Medical, Visualization, Entertainment.
Cryptography & Network Security
FOUNDATIONS OF CRYPTOGRAPHY AND SECURITY:-Ciphers and Secret Message, Security Attacks and Services. Mathematical Tools for Cryptography: Substitutions and Permutations, Modular Arithmetic, Euclid's Algorithm,
Finite Fields, Polynomial Arithmetic. Design Principle of Block ciphers: Theory of Block Cipher Design. Cipher Network Structures, DES and Triple DES, Modes of Operation(ECB, CBC, OFB, CFB) , Strength ( or Not) Of DES
BLOCKS CIPHER ALGORITHMS:-IDEA, CAST, Blowfish, Twofish , Rijndael (AES). Pseudo Random Numbers and stream ciphers: Pseudo random sequences, Linear Congruential Generators, Cryptographic Generators, Design of Stream Cipher, RC4, RC5.
PUBLIC KEY CRYPTOGRAPHY:-Prime Numbers and Testing for Primality, Factoring Large Numbers, Discrete Logarithms RSA, Diffie- Hellman, ElGamal , Introduction of Elliptic acre Cryptosystems Key Management , Key Exchange Algorithms, Public – Key Cryptography Standards. Hashes
and Message Digests: Message Authentication, MD5, SHA-1, RIPEMD, HMAC
DIGITAL SIGNATURES, CERTIFICATES, AND STANDARDS:-Digital Signature Standard (DSS and DSA), Public key Infrastructure, Digital Certivicates
and Basics of PKCS Standards. Authentication: Kerberos V 4 and V 5, X.509
Authentication Service. Electronic Mail Security: Pretty Good Privacy (PGP), S /MIME, X.400. IP and Web Security Protocols: IPSec and Virtual Private Networks, Secure Sockets and Transport Layer ( SSL and TLS).
SYSTEM SECURITY Computer Virus, Firewall and Design Principles, Reference: Chapter 18 , 19, & 20 of Cryptography and Network Security. Electronic Commerce Security: Electronic Payment Systems, Secure Electronic Transaction (SET), Protocols (CyberCash, iKey) Ecash (DigiCash ), Smart Card Based Systems
B.E. (Information technology)