Pre-requisite: CSU203 Data Structures & Algorithms
-
Module I
Introduction to computer graphics - basic raster graphics algorithms for drawing 2D primitives - scan converting lines - circles - generating characters - geometrical transformations - 2D transformations - homogeneous coordinates and matrix representation of transformations - window-to-viewport transformation - input devices and interactive techniques - interaction hardware - basic interaction tasks - 3D graphics - viewing in 3D - projections - basics of solid modelling - 3D transformations.
Module II
Introduction to multimedia - media and data streams - properties of a multimedia system - data stream characteristics - information units - multimedia hardware - platforms - memory and storage devices - input and output devices - communication devices - multimedia software - multimedia software tools - multimedia authoring tools
Module III
Multimedia building blocks - audio - basic sound concepts - music - speech - MIDI versus digital audio - audio file formats - sound for the web - images and graphics - basic concepts - computer image processing - video and animation - basic concepts - animation techniques - animation for the web - multimedia building blocks - audio - basic sound concepts - music - speech - MIDI versus digital audio - audio file formats - sound for the web - images and graphics - basic concepts - computer image processing - video and animation - basic concepts - animation techniques - animation for the web
Module IV
Data compression - storage space and coding requirements - classification of coding/compression techniques - basic compression techniques like JPEG, H.261, MPEG and DVI - multimedia database systems - characteristics of multimedia database management system - data analysis - data structure - operations on data - integration in a database model
References
1. Foley J. D., Van Dam A., Feiner S. K., & Hughes J. F., Computer Graphics Principles and Practice, Second Edition, Addison Wesley
2. Ralf Steinmetz & Klara Nahrstedt, Multimedia: Computing, Communications and Applications, Pearson Education
3. Newmann W & Sproull R.F., Principles of Interactive Computer Graphics, McGraw-Hill
4. Rogers D.F., Procedural Elements for Computer Graphics, McGraw-Hill
5. Hearn D. & Baker P.M, Computer Graphics, Prentice Hall India
6. Koegel Buford J. F., Multimedia System, Addison Wesley
7. Vaughan T., Multimedia: Making it Work, Third Edition, Tata McGraw Hill
CSU 341 DISTRIBUTED COMPUTING
Pre-requisite: CSU 313 Operating Systems
-
Module I (10 hours)
Distributed systems versus Parallel systems, Models of distributed systems, Happened Before and Potential Causality Model, Models based on States.
Module II (10 hours)
Logical clocks, Vector clocks, Verifying clock algorithms, Direct dependency clocks, Mutual exclusion, Lamport’s algorithm, Ricart Agrawala algorithm.
Module III (10 hours)
Mutual exclusion algorithms using tokens and Quorums, Drinking philosophers problem, Dining philosophers problem under heavy and light load conditions. Leader election algorithms. Chang-Roberts algorithm.
Module IV (12 hours)
Global state detection, Global snapshot algorithm, Termination detection- Dijikstra and Scholten’s algorithm, Causal message ordering algorithms, Self stabilization , Mutual exclusion with K-state machines.
References:
-
Vijay K. Garg., Elements of Distributed Computing, Wiley & Sons, 2002
-
Chow R. & Johnson T., Distributed Operating Systems and Algorithms, Addison Wesley, 2002
-
Tanenbaum S., Distributed Operating Systems, Pearson Education.,2005
-
Coulouris G., Dollimore J. & Kindberg T., Distributed Systems Concepts And Design, 2/e, Addison Wesley 2004
CSU 343 EMBEDDED SYSTEM DESIGN
Pre-requisites: CSU 313 Operating Systems
CSU 202 Logic Design
CSU 321 Software Engineering
-
Module I (10 hours)
Embedded system overview, trends in embedded software development, applications of embedded systems.
Module II (12 hours)
Hardware architecture, software engineering practices in the embedded software development process,
embedded software development environments.
Module III (10 hours)
Embedded OS, development tools for target processors, real-time embedded software.
Module IV (10 hours)
Embedded communication, Mobile and database applications, Recent trends in Embedded Systems.
References:
1. R. Kamal, Embedded Systems: Architecture, Programming & Design, Tata McGraw Hill, 2003.
2. F. Vahid & T. Givargis Embedded System Design: A Unified Hardware/Software Introduction,
John Wiley.
3. DreamTech Software Team, Programming of Embedded Systems, Wiley DreamTech, 2002.
CSU 411 COMPUTER SECURITY
Pre-requisites: CSU 304 Computer Networks, CSU 313 Operating Systems
CSU 213 Database Management Systems
-
Module I (10 hours)
Concepts of Security, Confidentiality, Integrity, Authenticity, Availability, Accuracy, Utility, Reliability and Possession. Concepts of Computationally Secure and Information theoretic security. Associated proofs. Zero Knowledge Protocols.
Module II (8 hours)
Access Control Matrix and Mechanisms, Vulnerability Analysis. Auditing Computer Security. Security Policy Guidelines. Security Awareness and Employment practices and policies. Anonymity and Identity in the cyber world. Practical examples from Network Domain. Tools for analysis and fingerprinting.
Module III (12 hours)
Systems Security – Operating Systems and Database Security.
Buffer overflow related vulnerabilities and attacks. Prevention.
SQL injection attacks and other web based attacks.
Security Enhanced Linux – A case study. Kerberos.
Module IV (12 hours)
Network Security. Firewalls, Vulnerability Assessment. Intrusion Detection Systems. DOS and DDOS attacks. Prevention strategies. Honey pot approach. Analysis.
Program Security. Security features of a programming language. Java as an example. Malicious code and Mobile code.
Reference:
-
1. Introduction to Computer Security. Matt Bishop. Addison-Wesley. 2004.
-
2. Security in Computing. Charles P Pfleeger. Pearson Education India. 2003.
-
3. Principles of Information Security. Michael E Whitman, Herbert J Mattord. Thomson. 2003.
-
4. Computer Security Handbook. Fourth Edition. Seymour Bosworth, M E Kabay, Editors. John Wiley. 2002.
Dostları ilə paylaş: |