M. TECH (COMPUTER SCIENCE) I YEAR I SEMESTER
1. Essentials of cloud Computing : K.Chandrasekhran , CRC press, 2014
TEXT BOOKS:
1. Essentials of cloud Computing : K.Chandrasekhran , CRC press, 2014
REFERENCES:
1. Cloud Computing: Principles and Paradigms by Rajkumar Buyya, James Broberg and Andrzej M. Goscinski, Wiley, 2011.
2. Distributed and Cloud Computing , Kai Hwang, Geoffery C.Fox, Jack J.Dongarra, Elsevier, 2012.
3. Cloud Security and Privacy: An Enterprise Perspective on Risks and Compliance, Tim Mather, Subra Kumaraswamy, Shahed Latif, O’Reilly, SPD, rp2011.
School of IT, JNTU Hyderabad – 500 085 TELANGANA :: M. Tech. (CS) :: w.e.f. 2017 - 18
M.TECH (COMPUTER SCIENCE) I YEAR I SEMESTER Subject Code: CS1P22
INFORMATION RETRIEVAL SYSTEMS (PROFESSIONAL ELECTIVE - II) UNIT I
Introduction to Information Retrieval Systems : Definition of Information Retrieval System, Objectives of Information Retrieval System, Functional Overview, Relationship to Database Management Systems, Digital Libraries and Data Warehouses;Boolean retrieval. The term vocabulary and postings lists. Dictionaries and tolerant retrieval. Index construction. Index compression.
UNIT II
Scoring, term weighting and the vector space model. Computing scores in a complete search system. Evaluation in information retrieval. Relevance feedback and query expansion.
UNIT III
XML retrieval. Probabilistic information retrieval. Language models for information retrieval.
Text classification. Vector space classification.
UNIT IV
Support vector machines and machine learning on documents. Flat clustering. Hierarchical clustering. Matrix decompositions and latent semantic indexing.
UNIT V
Web search basics. Web crawling and indexes. Link analysis.
TEXT BOOKS:
1. Introduction to Information Retrieval , Christopher D. Manning and Prabhakar Raghavan and Hinrich Schütze, Cambridge University Press, 2008.
2. Information Storage and Retrieval Systems: Theory and Implementation, Kowalski, Gerald, Mark T Maybury,Springer.
REFERENCES :
1. Modern Information Retrival , Ricardo Baeza-Yates, Pearson Education, 2007.
2. Information Retrieval: Algorithms and Heuristics, David A Grossman and Ophir Frieder, 2nd Edition, Springer, 2004.
3. Information Retrieval Data Structures and Algorithms, William B Frakes, Ricardo Baeza- Yates, Pearson Education, 1992.
4. Information Storage & Retieval , Robert Korfhage , John Wiley & Sons.
School of IT, JNTU Hyderabad – 500 085 TELANGANA :: M. Tech. (CS) :: w.e.f. 2017 - 18
M.TECH (COMPUTER SCIENCE) I YEAR I SEMESTER Subject Code: CS1P23 MACHINE LEARNING
(PROFESSIONAL ELECTIVE – II) Objectives:
• To be able to formulate machine learning problems corresponding to different applications.
• To understand a range of machine learning algorithms along with their strengths and weaknesses.
• To understand the basic theory underlying machine learning.
UNIT – I
Introduction: An illustrative learning task, and a few approaches to it. What is known from algorithms? Theory, Experiment. Biology. Psychology. Overview of Machine learning, related areas and applications. Linear Regression, Multiple Regression, Logistic Regression,logistic functions
Concept Learning: Version spaces. Inductive Bias. Active queries. Mistake bound/ PAC model.
basic results. Overview of issues regarding data sources, success criteria.
UNIT –II
Decision Tree Learning: - Minimum Description Length Principle. Occam’s razor. Learning with active queries Introduction to information theory, Decision Trees, Cross Validation and Over fitting
Neural Network Learning: Perceptions and gradient descent back propagation, multilayer networks and back propagation.
UNIT –III
Sample Complexity and Over fitting: Errors in estimating means. Cross Validation and jackknifing VC dimension. Irrelevant features: Multiplicative rules for weight tuning.
Support Vector Machines: functional and geometric margins, optimum margin classifier, constrained optimization, Lagrange multipliers, primal/dual problems, KKT conditions, dual of the optimum margin classifier, soft margins, and kernels.
Bayesian Approaches: The basics Expectation Maximization. Bayes theorem, Naïve Bayes Classifier, Markov models,Hidden Markov Models
School of IT, JNTU Hyderabad – 500 085 TELANGANA :: M. Tech. (CS) :: w.e.f. 2017 - 18
UNIT—IV
Instance-based Techniques: Lazy vs. eager generalization. K nearest neighbor, case- based reasoning.
Clustering and Unsupervised Learning: K-means clustering, Gaussian mixture density estimation, model selection
UNIT—V
Genetic Algorithms: Different search methods for induction - Explanation-based Learning:
using prior knowledge to reduce sample complexity.
Dimensionality reduction: feature selection, principal component analysis, linear discriminant analysis, factor analysis, independent component analysis, multidimensional scaling, manifold learning
TEXT BOOKS:
1. Tom Michel, Machine Learning, McGraw Hill, 1997
2. Trevor Has tie, Robert Tibshirani & Jerome Friedman. The Elements of Statically Learning, Springer Verlag, 2001
REFERENCE BOOKS:
1. Machine Learning Methods in the Environmental Sciences, Neural Networks, William W Hsieh, Cambridge Univ Press.
2. Richard o. Duda, Peter E. Hart and David G. Stork, pattern classification, John Wiley & Sons Inc.,2001
3. Chris Bishop, Neural Networks for Pattern Recognition, Oxford University Press, 1995
Outcomes:
• Student should be able to understand the basic concepts such as decision trees and neural networks.
• Ability to formulate machine learning techniques to respective problems.
• Apply machine learning algorithms to solve problems of moderate complexity
School of IT, JNTU Hyderabad – 500 085 TELANGANA :: M. Tech. (CS) :: w.e.f. 2017 - 18
M.TECH (COMPUTER SCIENCE) I YEAR I SEMESTER Subject Code: CS1P24
HUMAN COMPUTER INTERACTION (PROFESSIONAL ELECTIVE - II) UNIT I
Introduction: Importance of user Interface – definition, importance of good design. Benefits of good design. A brief history of Screen design,
The graphical user interface – popularity of graphics, the concept of direct manipulation, graphical system, Characteristics, Web user – Interface popularity, characteristics- Principles of user interface.
UNIT II
Design process – Human interaction with computers, importance of human characteristics human consideration, Human interaction speeds, understanding business junctions.
Screen Designing:- Design goals – Screen planning and purpose, organizing screen elements, ordering of screen data and content – screen navigation and flow – Visually pleasing composition – amount of information – focus and emphasis – presentation information simply and meaningfully – information retrieval on web – statistical graphics – Technological consideration in interface design.
UNIT III
Windows – New and Navigation schemes selection of window, selection of devices based and screen based controls.
Components – text and messages, Icons and increases – Multimedia, colors, uses problems, choosing colors.
UNIT IV
Software tools – Specification methods, interface – Building Tools.
UNIT V
Interaction Devices – Keyboard and function keys – pointing devices – speech recognition digitization and generation – image and video displays – drivers.
TEXT BOOKS:
1. The essential guide to user interface design, Wilbert O Galitz, Wiley DreamTech.
2. Designing the user interface, 3rd Edition Ben Shneidermann , Pearson Education Asia.
REFERENCES:
1. Human – Computer Interaction. Alan Dix, Janet Fincay, Gre Goryd, Abowd, Russell Bealg, Pearson Education
2. Interaction Design Prece, Rogers, Sharps. Wiley Dreamtech.
3. User Interface Design, Soren Lauesen , Pearson Education.
4. Human –Computer Interaction,D.R.Olsen,Cengage Learning.
5. Human –Computer Interaction,Smith - Atakan,Cengage Learning.
School of IT, JNTU Hyderabad – 500 085 TELANGANA :: M. Tech. (CS) :: w.e.f. 2017 - 18
M.TECH (COMPUTER SCIENCE) I YEAR I SEMESTER Subject Code: CS1P25
COMPUTER GRAPHICS (PROFESSIONAL ELECTIVE - II)
UNIT I
Introduction, Application areas of Computer Graphics, overview of graphics systems, video- display devices, raster-scan systems, random scan systems, graphics monitors and work stations and input devices
Output primitives: Points and lines, line drawing algorithms, mid-point circle and ellipse algorithms. Filled area primitives: Scan line polygon fill algorithm, boundary-fill and flood-fill algorithms.
UNIT II
2-D Geometrical transforms: Translation, scaling, rotation, reflection and shear transformations, matrix representations and homogeneous coordinates, composite transforms, transformations between coordinate systems.
2-D Viewing : The viewing pipeline, viewing coordinate reference frame, window to view-port coordinate transformation, viewing functions, Cohen-Sutherland and Cyrus-beck line clipping algorithms, Sutherland –Hodgeman polygon clipping algorithm.
UNIT III
3-D Object representation: Polygon surfaces, quadric surfaces, spline representation, Hermite curve, Bezier curve and B-spline curves, Bezier and B-spline surfaces. Basic illumination models, polygon rendering methods.
UNIT IV
3-D Geometric transformations: Translation, rotation, scaling, reflection and shear transformations, composite transformations, 3-D viewing: Viewing pipeline, viewing coordinates, view volume and general projection transforms and clipping.
UNIT V
Visible surface detection methods: Classification, back-face detection, depth-buffer, scan-line, depth sorting, BSP-tree methods, area sub-division and octree methods
Computer animation: Design of animation sequence, general computer animation functions, raster animation, computer animation languages, key frame systems, motion specifications
School of IT, JNTU Hyderabad – 500 085 TELANGANA :: M. Tech. (CS) :: w.e.f. 2017 - 18
TEXT BOOKS:
1. “Computer Graphics C version”, Donald Hearn and M. Pauline Baker, Pearson education.
2. “Computer Graphics Principles & practice”, second edition in C, Foley, VanDam, Feiner and Hughes, Pearson Education.
REFERENCE BOOKS:
1. “Computer Graphics Second edition”, Zhigand xiang, Roy Plastock, Schaum’s outlines, Tata Mc Graw hill edition.
2. “Procedural elements for Computer Graphics”, David F Rogers, Tata Mc Graw hill, 2nd edition.
3. “Principles of Interactive Computer Graphics”, Neuman and Sproul, TMH.
4. “Principles of Computer Graphics”, Shalini, Govil-Pai, Springer.
5. “Computer Graphics”, Steven Harrington, TMH.
6. Computer Graphics,F.S.Hill,S.M.Kelley,PHI.
7. Computer Graphics,P.Shirley,Steve Marschner&Others,Cengage Learning.
8. Computer Graphics & Animation,M.C.Trivedi,Jaico Publishing House.
9. An Integrated Introduction to Computer Graphics and Geometric Modelling,R.Goldman,CRC Press,Taylor&Francis Group.
10. Computer Graphics,Rajesh K.Maurya,Wiley India.
School of IT, JNTU Hyderabad – 500 085 TELANGANA :: M. Tech. (CS) :: w.e.f. 2017 - 18
M.TECH (COMPUTER SCIENCE) I YEAR I SEMESTER Subject Code: CS1L10
DATA STRUCTURES THROUGH JAVA LAB (LAB – I)
Sample Problems on Data structures:
1. Write Java programs that use both recursive and non-recursive functions for implementing the following searching methods:
a) Linear search b) Binary search
2. Write Java programs to implement the following using arrays and linked lists a) List ADT
3. Write Java programs to implement the following using an array.
a) Stack ADT b) Queue ADT
4. Write a Java program that reads an infix expression and converts the expression to postfix form. (use stack ADT).
5. Write a Java program to implement circular queue ADT using an array.
6. Write a Java program that uses both a stack and a queue to test whether the given string is a palindrome or not.
7. Write Java programs to implement the following using a singly linked list.
a) Stack ADT b)Queue ADT
8. Write Java programs to implement the deque (double ended queue) ADT using a) Array b) Singly linked list c) Doubly linked list.
9. Write a Java program to implement priority queue ADT.
10. Write a Java program to perform the following operations:
a) Construct a binary search tree of elements.
b) Search for a key element in the above binary search tree.
c) Delete an element from the above binary search tree.
11. Write a Java program to implement all the functions of a dictionary (ADT) using Hashing.
12. Write a Javaprogram to implement Dijkstra’s algorithm for Single source shortest path problem.
13. Write Java programs that use recursive and non-recursive functions to traverse the given binary tree in
a) Preorder b) Inorder and c) Postorder.
14. Write Java programs for the implementation of bfs and dfs for a given graph.
15. Write Java programs for implementing the following sorting methods:
School of IT, JNTU Hyderabad – 500 085 TELANGANA :: M. Tech. (CS) :: w.e.f. 2017 - 18
a) Bubble sort d) Merge sort g) Binary tree sort b) Insertion sort e) Heap sort
c) Quick sort f) Radix sort
16. Write a Java program to perform the following operations:
a) Insertion into a B-tree b) Searching in a B-tree
17. Write a Java program that implements Kruskal’s algorithm to generate minimum cost spanning tree.
18. Write a Java program that implements KMP algorithm for pattern matching.
REFERENCES:
1. Data Structures and Algorithms in java,3rd edition, A.Drozdek, Cengage Learning.
2. Data Structures with Java, J.R.Hubbard,2nd edition, Schaum’s Outlines,TMH.
3. Data Structures and algorithms in Java, 2nd Edition, R.Lafore, Pearson Education.
4. Data Structures using Java, D.S.Malik and P.S. Nair, Cengage Learning.
5. Data structures, Algorithms and Applications in java, 2nd Edition, S.Sahani, Universities Press.
6. Design and Analysis of Algorithms, P.H.Dave and H.B.Dave, Pearson education.
7. Data Structures and java collections frame work,W.J.Collins,Mc Graw Hill.
8. Java: the complete reference, 7th editon, Herbert Schildt, TMH.
9. Java for Programmers,P.J.Deitel and H.M.Deitel,Pearson education / Java: How to Program P.J.Deitel and H.M.Deitel ,8th edition,PHI.
10. Java Programming,D.S.Malik,Cengage Learning.
11. A Practical Guide to Data Structures and Algorithms using Java, S.Goldman &
K.Goldman, Chapman & Hall/CRC, Taylor & Francis Group.
( Note: Use packages like java.io, java.util, etc)
School of IT, JNTU Hyderabad – 500 085 TELANGANA :: M. Tech. (CS) :: w.e.f. 2017 - 18
M.TECH (COMPUTER SCIENCE) I YEAR I SEMESTER Subject Code: CS1L20
COMPUTER NETWORKING LAB (LAB – II)
Sample Problems on Networks (Use C/JAVA Programming Language):
1. Implement the data link layer framing methods such as character stuffing and bit stuffing.
2. Implement the Aloha protocols.
3. Implement on a data set of characters the three CRC polynomials – CRC 12, CRC 16 and CRC CCIP .
4. Implement Dijkstra‘s algorithm to compute the Shortest path through a graph.
5. Take an example subnet graph with weights indicating delay between nodes. Now obtain Routing table at each node using distance vector routing algorithm.
6. Take an example subnet of hosts . Obtain broadcast tree for it.
7. Take a 64 bit plain text and encrypt the same using DES algorithm.
8. Write a program to break the above DES coding.
9. Using RSA algorithm, Encrypt text data and Decrypt the same
Sample Problems on Network Simulation (Use Simulation tools like NetSim/NS2, etc ):
1. Installation of simulation tools in Linux/Windows environment
2. Introduction about discrete events simulation and its tools like NetSim, NS2, etc 3. Understand IP forwarding within a LAN and across a router
4. Study the working of spanning tree algorithm by varying the priority among the switches 5. Study the throughputs of Slow start + Congestion avoidance(Old Tahoe) and Fast
Retransmit (Tahoe) Congestion Control Algorithms
6. Study how the Data Rate of Wireless LAN(IEEE 802.11b) Network varies as the distance between the Access Point and the wireless nodes is varied
7. Write a script to connect two nodes
8. Write a script for connecting three nodes considering one node as a central node.
9. Write a script to implement star topology 10. Write a script to implement a bus topology.
11. Study the working and routing table formation of Interior routing table formation of interior routing protocols , i.e. Routing Information Protocol (RIP) and Open Shortest Path First(OSPF
12. Analyze the performance of a MANET,(running CSMA/CA(802.11b) in MAC)with increasing node density
13. Analyze the performance of a MANET,(running CSMA/CA(802.11b) in MAC)with increasing node mobility
14. Bit Stuffing and character stuffing 15. Cyclic Redundancy Check
16. Encryption and Decryption using substitution ciphers 17. Distance vector Routing
18. Link State Routing 19. Go Back N Protocol
School of IT, JNTU Hyderabad – 500 085 TELANGANA :: M. Tech. (CS) :: w.e.f. 2017 - 18
M.TECH (COMPUTER SCIENCE) I YEAR I SEMESTER Subject Code: CS1L31
INTERNET OF THINGS LAB (PROFESSIONAL ELECTIVE-I LAB)
(LAB – III)
Following are some of the programs that a student should be able to write and test on an Raspberry Pi, but not limited to this only.
1. Start Raspberry Pi and try various Linix commands in command terminal window:
ls, cd, touch, mv, rm, man, mkdir, rmdir, tar, gzip, cat, more, less, ps, sudo, cron, chown, chgrp, ping etc.
2. Run some python programs on Pi like:
Read your name and print Hello message with name
Read two numbers and print their sum, difference, product and division.
Word and character count of a given string
Area of a given shape (rectangle, triangle and circle) reading shape and appropriate values from standard
input
Print a name 'n' times, where name and n are read from standard input, using for and while loops.
Handle Divided by Zero Exception.
Print current time for 10 times with an interval of 10 seconds.
Read a file line by line and print the word count of each line.
3. Light an LED through Python program
4. Get input from two switches and switch on corresponding LEDs
5. Flash an LED at a given on time and off time cycle, where the two times are taken from a file.
6. Flash an LED based on cron output (acts as an alarm)
School of IT, JNTU Hyderabad – 500 085 TELANGANA :: M. Tech. (CS) :: w.e.f. 2017 - 18
7. Switch on a relay at a given time using cron, where the relay's contact terminals are connected to a load.
8. Access an image trhough a Pi web cam.
9. Control a light source using web page.
10. Implement an intruder system that sends an alert to the given email.
11. Get the status of a bulb at a remote place (on the LAN) through web.
12. Get an alarm from a remote area (through LAN) if smoke is detected.
The student should have hands on experience in using various sensors like temperature, humidity,smoke, light, etc. and should be able to use control web camera, network, and relays connected to the Pi.
School of IT, JNTU Hyderabad – 500 085 TELANGANA :: M. Tech. (CS) :: w.e.f. 2017 - 18
M.TECH (COMPUTER SCIENCE) I YEAR I SEMESTER Subject Code: CS1L32
SOFTWARE ENGINEERING LAB (PROFESSIONAL ELECTIVE-I LAB)
(LAB – III)
Objectives:
• To understand the software engineering methodologies involved in the phases for project development.
• To gain knowledge about open source tools used for implementing software engineering methods.
• To exercise developing product-startups implementing software engineering methods.
Open source Tools: StarUML / UMLGraph / Topcased
Prepare the following documents and develop the software project startup, prototype model, using software engineering methodology for at least two real time scenarios or for the sample experiments.
1. Problem Analysis and Project Planning -Thorough study of the problem – Identify Project scope, Objectives and Infrastructure.
2. Software Requirement Analysis – Describe the individual Phases/modules of the project and Identify deliverables. Identify functional and non-functional requirements.
3. Data Modeling – Use work products – data dictionary.
4. Software Designing - Develop use case diagrams and activity diagrams, build and test class diagrams, sequence diagrams and add interface to class diagrams.
5. Prototype model – Develop the prototype of the product.
The SRS and prototype model should be submitted for end semester examination.
List of Sample Experiments: