• Tidak ada hasil yang ditemukan

M. Tech. (COMPUTER SCIENCE) - jntuh sit

N/A
N/A
Protected

Academic year: 2023

Membagikan "M. Tech. (COMPUTER SCIENCE) - jntuh sit"

Copied!
143
0
0

Teks penuh

To qualify for the award of the M.Tech degree, the candidate must complete all the academic requirements of the subjects as per the course structure. After a candidate has fulfilled the requirements prescribed for the completion of the degree and is eligible for the award of the M.

GENERAL

  • Credit Point: It is the product of grade point and number of credits for a course
  • The academic regulation should be read as a whole for the purpose of any interpretation
  • In the case of any doubt or ambiguity in the interpretation of the above rules, the decision of the Vice-Chancellor is final
  • The University may change or amend the academic regulations or syllabi at any time and the changes or amendments made shall be applicable to all the candidates with effect from
  • MALPRACTICES RULES
  • DISCIPLINARY ACTION FOR / IMPROPER CONDUCT IN EXAMINATIONS Nature of Malpractices/Improper

Exclusion from the examination hall and cancellation of performance in that subject and all other subjects the candidate has already appeared including Practical Examinations and Project work and will not be allowed for the remaining subject examinations of that semester/year. Exclusion from the examination hall and cancellation of performance in that subject and all other subjects the candidate has already appeared including the practical examinations and project work and is not allowed for the remaining subject examinations of that semester/year.

No. Subject Code

Database system applications, purpose of database systems, view of data – data abstraction, instances and schemas, data models – the ER model, relational model, other models – database languages ​​– DDL, DML, database access from application programs, transaction management, data Storage and queries, database architecture, database users and administrators, ER diagrams, . Concurrency control: Serializability and recoverability - Introduction to lock management - Lock conversions, dealing with deadlocks, specialized locking techniques - Concurrency control without locking.

TECH (COMPUTER SCIENCE) I YEAR I SEMESTER

Student Enrolment System

The system automatically enrolls the student in all core subjects of the first year of the course. The system checks which courses (if any) are set as prerequisites for the course in which the student wishes to enroll.

Online Bookshop

If the password is correct, the system displays the list of students registered for the subject to the employee. The system checks that this code is not already in use in the system and, if not, creates a new subject record. The system contacts the finance system to check if the student has paid all fees.

If a fee has been paid, the system creates a transcript showing all the subjects the student has been enrolled in each year and the grade for the subject in question. The header on the transcript shows the student's personal information and the course he or she is enrolled in.

E-Bidding

This project is mainly developed for the accounts division of a banking sector to provide a better interface to the entire banking transactions. It also touches on application performance and quality requirements and provides a solid definition of the interface. The computerization of this system would avoid incorrect interpretation and poor calculation of data. The system helps the user to view all documents, source code, tasks, activities, team information with details at a click of a button.

The aim of the project is to design a comprehensive web-enabled application for managing the examination process. Suppose you use your above model trained on the complete data set and classify credit. good/bad for each of the examples in the dataset.

Test the following using JUnit and CPPUnit

Write a Python program that prompts the user for a file name, then prints the number of characters, words, and lines in the file. 10.Write a Python program that implements binary search method to search for a key in a sorted list. 16.Write Python programs that use recursive and non-recursive functions to traverse the given binary tree.

18. Write a Python program that counts the occurrences of words in a text file and displays the words in descending order of their occurrence number. 19. Write a Python program that prompts the user for a directory or file name and displays its size. 21. Write a Python program that prompts the user to enter a directory and displays the number of files in the directory.

Write a Python program that prompts the user for a password (string) and indicates whether it is a valid or invalid password. 23. Write a Python program to calculate n. 24. In data compression, a set of strings is prefix-free if no string is a prefix of another.

Web Intelligence

Knowledge Representation for the Semantic Web

Ontology Engineering

Semantic Web Applications, Services and Technology

Social Network Analysis and semantic web

TECH (COMPUTER SCIENCE) I YEAR II SEMESTER

Features of distributed versus centralized databases, principles of distributed databases, levels of distribution transparency, reference architecture for distributed databases, types of data fragmentation, integrity constraints in distributed databases, distributed database design. Managing distributed transactions, a framework for transaction management, supporting atomicity of distributed transactions, concurrency control for distributed transactions, architectural aspects of distributed transactions. Concurrency Control, Foundation of Distributed Concurrency Control, Distributed Deadlocks and Concurrency Control based on Timestamps, Optimistic Methods for Distributed Concurrency Control.

Reliability, basic concepts, non-blocking commitment protocols, reliability and concurrency control, determining a consistent view of the network, detection and resolution of inconsistencies, checkpoints and cold restarts, distributed database management, catalog management in distributed databases, authorization and protection. Database Integration, Schema Translation, Schema Integration, Query Processing Query Processing Layers in Distributed Multi-DBMSs, Query Optimization Problems Transaction Management Transaction and Compute Model, Multi-Database Concurrency Control, Multi-Database Recovery, Object Orientation and Interoperability, Object Management.

TECH (COMPUTER SCIENCE) II YEAR I SEMESTER

Create an Android application that displays Hello + the name of the user and run it on an emulator. 10.Write an HTML page that can be used to register the candidates for an entrance exam. 12.Write an HTML page that has phone buttons 0 through 9 and a text box that displays the called number.

Use CSS to define colors. 13. Write an HTML page that has a text box for Phone Number or Name. Print average grades with appropriate messages. 21. Write an awk script to find the factorial of a number given by the user.

INTRODUCTION

  • Exercises on Productivity Development
  • Exercises on Personality Development Skills
  • Exercises on Professional Etiquette and Communication

Introduction –– Types of values ​​- Personal, social and cultural values ​​- Meaning of values ​​in different contexts. Basic Statistical Measures: Types of Scales; Measures of Central Tendency; Skewness; Measures of variation; Probability distribution. Research design: Need for research design; Characteristics of a good design; Types of Research Design; Induction and deduction.

Countermeasures, Understanding different types of passwords Passive Internet attacks, active Internet attacks, offline attacks Non-electronic attacks, understanding keyloggers and other spyware technologies. Hijacking, Types of session hijacking, Sequence prediction, Steps in performing session hijacking, Preventing session hijacking.

UNIT II

To gain insight into big data, to learn the analyzes of Big Data. To understand how data is stored and processed in Hadoop. To learn more about NoSQL databases. Benefits and challenges of cloud computing, public versus private clouds, role of virtualization in cloud enablement; Business Agility: Benefits and Challenges for Cloud Architecture. SECURING THE CLOUD: Security concepts - Confidentiality, privacy, integrity, authentication, non-repudiation, availability, access control, defense in depth, least privilege - how these concepts apply in the cloud and their importance in PaaS, IaaS and SaaS.

VIRTUALIZATION SECURITY: Multi-tenancy issues: Isolation of users/VMs from each other- How the cloud provider can deliver this- Virtualization System Security Issues: e.g. CLOUD SECURITY MANAGEMENT: Security management in the cloud - security management standards - SaaS, PaaS, IaaS availability management - access control - Data security and storage in the cloud.

Segmentation and Edge Detection Region operations, basic edge detection, second-order detection, crack edge detection, gradient operators, compass and laplace operators, edge coupling and boundary detection, thresholding, region-based segmentation, segmentation by morphological watersheds.Image compression: Types and requirements, statistical compression, spatial compression, contour coding , quantization compression, image data compression predictive technique, pixel coding, transfer coding theory, lossy and lossless predictive type coding, Digital Image Watermarking. IMAGE PROCESSING FUNDAMENTALS: Review of image processing techniques – classical filtering operations – thresholding techniques – edge detection techniques – corner and interest point detection – mathematical morphology – texture. HOUGH TRANSFORM: Line detection – Hough Transform (HT) for line detection – foot-of-normal method – line localization – line fitting – RANSAC for straight line detection – HT-based circular object detection – accurate center location – speed problem – ellipse detection – Case study: Human iris location – hole detection – generalized Hough Transform (GHT) – spatial matched filtering – GHT for ellipse detection – object location – GHT for feature collation.

APPLICATIONS: Photo album – Face detection – Face recognition – Own faces – Active appearance and 3D shape models of faces Application: Surveillance – foreground-background separation – particle filters – Chamfering, tracking, and occlusion – combining views from multiple cameras – human gait. Jan Erik Solem, “Programming Computer Vision with Python: Tools and Algorithms for Analyzing Images”, O'Reilly Media, 2012.

UNIT IV

Cyber Security Essentials, James Graham, Richard Howard and Ryan Otson, CRC Press

INTRODUCTION & HANDWRITTEN CHARACTER RECOGNITION: Introduction – history – type of biometrics – General architecture of biometric systems – Basic operation of biometric matching – Biometric system errors and performance measurements – Design of biometric systems – Applications of biometrics – Advantages of biometrics versus traditional authentication methods – character recognition – System overview – Geature- extraction for character recognition – Neura;. FACIAL BIOMETRY & RETINA AND IRIS BIOMETRY: Introduction – Background of facial recognition – Design of facial recognition system – Neural network for facial recognition – Face detection in video sequences – Challenges in facial biometrics – Face recognition methods – Advantages and disadvantages – Performance of biometrics – Design of retina biometrics – iris segmentation method – determination of the iris region – experimental results of iris localization – applications of iris biometry – advantages and disadvantages. Biometrics using palm vein pattern – Fingerprint biometrics – Fingerprint recognition system – Minutiae extraction – Fingerprint indexing – Experimental results – Advantages and disadvantages – Basics of hand geometry – Sign language – Indian Sign Language – SIFT algorithms – Practical approach advantages and disadvantages.

ENHANCING PRIVACY USING BIOMETRIC AND CRYPTOGRAPHY BIOMETRIC AND MULTIMODAL BIOMETRIC: Introduction – Privacy Concerns Related to Biometric Developments – Identity and Privacy – Privacy Concerns – Biometrics in Privacy Terms – Privacy Soft Computing – Introduction to Biometric Cryptography – General Purpose Cryptosystem – Modern Cryptography and Attacks – Symmetric Key Ciphers – Cryptographic Algorithms – Introduction to Multimodal Biometrics – Basic Architecture of Multimodal Biometrics – Multimodal Biometrics Using Face and Ear – Characteristics and Advantages of a HAmodal Multimodal Characteristic. . Biometrics – Identity Verification in a Networked World – Samir Nanavathi, Micheal Thieme, Raj Nanavathi, Wiley – Dream Tech.

Referensi

Dokumen terkait

The effectiveness of counseling through cognitive behavioral therapy in increasing students' understanding of bullying is also seen from the results of the study conducted byPambudhi