• No results found

M.TECH INFORMATION TECHNOLOGY

N/A
N/A
Protected

Academic year: 2023

Share "M.TECH INFORMATION TECHNOLOGY"

Copied!
44
0
0

Loading.... (view fulltext now)

Full text

Degree, the candidate must fulfill all academic requirements of the subjects, according to the course structure. If the examiner's report is again unfavorable, the thesis will be summarily rejected. Exclusion from the examination hall and cancellation of appearance in that subject only of all candidates concerned.

Removal from the examination hall and cancellation of appearance in that subject and all other subjects in which the candidate has already appeared including practical examinations and project work and shall not be allowed to appear for the remaining examinations of the subjects of that semester/. The candidate's hall ticket must be canceled and sent to the university. The academic rules regarding loss of seat apply to the candidate's continuation of the training.

Removal from the examination hall and cancellation of performance in that subject and all other subjects for which the candidate has already appeared including practical examinations and project work and will not be allowed for the remaining examinations of the subjects of that semester/year. Removal from the examination hall and cancellation of appearance in that subject and all other subjects for which the candidate has already appeared including practical examinations and project work and will not be allowed for the remaining examinations of the subjects of that semester/year. Expulsion of students of the colleges from the examination hall and cancellation of the performance in that subject and all other subjects for which the candidate has already appeared including practical examinations and project work and will not be admitted to the remaining examinations of the subjects of that semester/year .

Cancellation of performance in that subject and all other subjects the candidate has submitted including the practical examinations and project work of the examinations of that semester/year.

Review

The objective of this course is to build a solid foundation in computer network concepts and design. The course will expose students to the concepts of traditional and modern computer networks - wireless and mobile, based on multimedia. Students who complete this course will understand the key concepts and practices used in modern computer networks.

Course Description: This course will enable the student to refresh the basics of Computer Networking in Unit I. Especially the routing protocols should be thoroughly understood with the help of any freely downloadable simulation tool. Through Unit III a student can learn the technologies and protocols needed to design and implement a converged switching network.

This section explains how to configure a switch for basic functionality and how to implement virtual LANs, VTP, and inter-VLAN routing in a converged network. Students must develop the necessary skills to implement a WLAN in a small to medium-sized network. This course in Unit IV discusses the WAN technologies and network services required for converged applications in enterprise networks.

Network Routing

LAN Switching

Wide Area Networks (WANs)

Network Programming using Java

Decision Tree Learning – Introduction, Introduction to Decision Tree, Appropriate Problems for Decision Tree Learning, Basic Decision Tree Learning Algorithm, Hypothesis Space Search in Decision Tree Learning, Inductive Bias in Learning of decision trees, Issues in decision tree learning. Bayesian Learning - Introduction, Bayes' Theorem, Bayes' Theorem and Concept Learning, Maximum Likelihood and Least Square Error Hypotheses, Maximum Likelihood Hypotheses for Predicting Probabilities, Principle of Minimum Description Length, Bayes' Optimal Classifier, Gibs algorithm, naive Bayes classifier, An example of learning to classify text, Bayesian belief networks EM algorithm. Combining inductive and analytic learning – motivation, inductive-analytic approaches to learning, using prior knowledge to initiate hypothesis, using prior knowledge to change the search objective, using prior knowledge to add search operators.

Reinforcement Learning – Introduction, The learning task, Q-learning, non-deterministic, rewards and actions, time difference learning, generalization from examples, relation to dynamic programming. To understand and explain some of the applications of big data and business intelligence in accounting, auditing and business. Write a Java program that reads an infix expression and converts the expression to postfix form.

Write Java programs to implement the deque (double end queue) ADT using a) Array b) Singly linked list c) Doubly linked list. Core distributed computing technologies – client/server, CORBA, JAVA RMI, Micro Soft DCOM, MOM, challenges in distributed computing, role of J2EE and XML in distributed computing, emergence of web services and service oriented architecture (SOA). Introduction to web services – The definition of web services, basic operating model of web services, tools and technologies that enable web services, benefits and challenges of using web services.

Web Services Architecture – Web services architecture and its features, core building blocks of web services, standards and technologies available for implementing web services, web services communication, basic steps of implementing web services. Description of Web Services – WSDL Introduction, Non-Functional Service Description, WSDL1.1 vs WSDL 2.0, WSDL Document, WSDL Elements, WSDL Binding, WSDL Tools, WSDL Port Type, Limitations of WSDL. Registration and discovery services: The role of service registries, service discovery, universal description, discovery and integration, UDDI architecture, UDDI data model, interfaces, UDDI implementation, UDDI with WSDL, UDDI specification, service addressing and notification, referencing and addressing of web Services, Web Services Notice.

UNIT V

This course provides an insight into what cloud computing is and the various services the cloud is capable of. Foundations: Introduction to cloud computing, migration to a cloud, enrichment of the 'Integration as a Service' paradigm for the cloud era, the Enterprise Cloud Computing paradigm. Web Intelligence: Thinking and Intelligent Web Applications, Information Age, World Wide Web, Limitations of Today's Web, The Next Generation Web, Machine Intelligence, Artificial Intelligence, Ontology, Inference engines, Software Agents, Berners-Lee www, Semantic Road Map, Logic on it semantic web.

Presentation of knowledge for the Semantic Web: ontologies and their role in the Semantic Web, ontology languages ​​for the Semantic Web - Resource Description Framework (RDF) / RDF Schema, Ontology Web Language (OWL), UML, XML/XML Schema. Semantic Web Applications, Services and Technology: Semantic Web Applications and Services, Semantic Search, E-Learning, Semantic Bioinformatics, Knowledge Base, XML-Based Web Services, Generating OWL-S Ontology for Web Services, Semantic Search Technology, Agents for web search and Semantic methods. Social network analysis and the semantic web: what is social network analysis, the development of social network analysis, electronic resources for network analysis - electronic discussion networks, blogs and online communities, online networks.

Semantic Web Technologies, Trends and Research in Ontology-Based Systems, J.Davies, R.Studer, P.Warren, John Wiley & Sons. Semantic Web and Semantic Web Services - Liyang Lu Chapman and Hall/CRC Publishers, (Taylor . & Francis Group). Electronic commerce: Traditional commerce and e-commerce – Internet and WWW – Role of WWW – Value chains – Strategic business and industrial value chains – Role of e-commerce.

Packet-switched networks – TCP/IP protocol script – Internet utilities – SGML, HTML and XML – Web client and servers – Web client/server architecture – Intranet and extranets – Web-based tools for e-commerce – Security. Mobile commerce: Introduction – Infrastructure of M–Commerce – Types of mobile commerce services – Technologies of wireless business – Advantages and limitations, support, mobile marketing and advertising, non– internet applications in M–Commerce – Comparisons with wireless/wired commerce. Mobile commerce: Technology: A framework for the study of mobile commerce – NTT Docomo's I-mode – Wireless devices for mobile commerce – Towards a classification framework for mobile location-based services – Wireless personal and local area networks – The impact of technological progress on strategy formulation in mobile communication networks.

Mobile Commerce: Theory and Applications: Ecology of Mobile Commerce - Wireless Application Protocol - Mobile Business Services - Mobile Portal - Factors Affecting the Adoption of Mobile Gaming Services - Mobile Data Technologies and Small Business Adoption and Diffusion - E-. Steps to develop and implement a software quality assurance plan - quality standards: ISO 9000 and companion ISO standards, CMM, CMMI, PCMM, Malcom Balridge, 3 Sigma, 6 Sigma. Software quality assurance metrics and metrics. Software Quality Measurements: Product Quality Measurements, Process Quality Measurements, Software Maintenance Measurements, Examples of Metric Programs - Software Quality Measurement Methodology: Establish Quality Requirements, Define Software Quality Measurements, Implement Software Quality Measurements, Analyze Measurement Results software, validate software quality measurements – Software quality indicators – Basics of measurement theory.

Testing of specialized systems and applications: Testing of client/server - web applications, testing of off-the-shelf components, testing of security, testing of a data warehouse.

References

Outline

Related documents

6.7 Design Summary Figure 6.4 Design Summary 6.8 Timing Report Speed Grade: -4 Minimum period: 25.764ns Maximum Frequency: 38.814MHz Minimum input arrival time before clock:

Vol.:0123456789 https://doi.org/10.1007/s40261-019-00798-1 ORIGINAL RESEARCH ARTICLE Lilly Insulin Glargine Versus Lantus® in Type 2 Diabetes Mellitus Patients: India and East Asia