National Institute of Technology Calicut


CSU 354 : ELECTRONIC COMMERCE



Yüklə 419,5 Kb.
səhifə10/10
tarix08.08.2018
ölçüsü419,5 Kb.
#61233
1   2   3   4   5   6   7   8   9   10

CSU 354 : ELECTRONIC COMMERCE

 Pre-requisite: CSU 302 Number Theory & Cryptography




L

T

P

Cr

3

0

0

3

Module I (10 Hours)

Web commerce concepts – the e-commerce phenomenon - electronic marketplace technologies - web based tools for e-commerce - e-commerce softwares - hosting services and packages

 

Module II (10 Hours)

Security issues - approaches to safe e-commerce - PKI- biometrics for security in e-commerce – smart cards and applications


Module III (11 Hours)

Wireless infrastructure – payment agents – mobile agent based systems – digital cash – security requirements for digital cash - Digital cheques, netcheque systems


Module IV (11 Hours)

Secure electronic transaction- secure online payment – micropayments – industrial epayment systems – challenges and opportunities of e-payment.


References

  1. Weidong Kou, Payment Technologies for E-Commerce, Springer, 2003.

  2. Kalakota R. & Whinston A.B., "Frontiers of Electronic Commerce", Addison-Wesley, New Delhi

  3. Janice Raynolds, The Complete E-Commerce Book, 2/e, CMP Books, 2004.

  4. Schneider G. P. & Perry J. T., Electronic Commerce, Course Technology, Cambridge

  5. Westland J. C. & Clark T.H. K., "Global Electronic Commerce", University Press, 2001.

  6. Minoli D. & Minoli E., "Web Commerce Technology Handbook", Tata McGraw Hill, New Delhi



CSU 356 MOBILE COMPUTING


Prerequisite: CSU 304 Computer Networks

 


L

T

P

Cr

3

0

0

3

Module I (10 Hours)

Introduction to mobile computing, mobile development frameworks and tools, introduction to XML and UML.


Module II (10 Hours)

Device independent and multichannel user interface development using UML, developing mobile GUIs, VUIs and mobile applications, multichannel and multimodal user interfaces.


Module III (11 Hours)

Mobile agents and peer-to-peer architectures for mobile applications, wireless connectivity, synchronization and replication of mobile data, mobility and location based services, active transactions.


Module IV (11 Hours)

Mobile Security, the mobile development process, architecture design and technology selection, mobile application development hurdles, testing mobile applications.




References:


  1. Reza B’Far, Mobile Computing Principles, Cambridge University Press, 2005.

  2. U. Hansmann, L. Merk, M. S. Nicklous and T. Stober, Principles of Mobile Computing, 2/e, Springer, 2003.

  3. Harold Davis, Anywhere Computing with Laptops: Making Mobile Easier, O’Reilly, 2005

  4. I. Stojmenovic, Handbook of wireless and Mobile computing, Wiley, 2002.

  5. Schiller J., Mobile Communications, 2/e, Pearson Education, 2003.



CSU 361 IMAGE PROCESSING

Pre-requisite: CSU 201 Discrete Computational Structures / MEG 501 Discrete Mathematics





L

T

P

Cr

3

0

0

3

Module I (12 Hours)

Introduction - digital image representation - fundamental steps in image processing - elements of digital image processing systems - digital image fundamentals - elements of visual perception - a simple image model - sampling and quantization - basic relationship between pixels - image geometry - image transforms - introduction to Fourier transform - discrete Fourier transform - some properties of 2-fourier transform (DFT) - the FFT - other separable image transforms - hotelling transform

 

Module II (10 Hours)



Image enhancement - point processing - spatial filtering - frequency domain - color image processing - image restoration - degradation model - diagonalization of circulant and block circulant matrices - inverse filtering - least mean square filter

 

Module III (10 Hours)



Image compression - image compression models - elements of information theory - error-free compression - lossy compression - image compression standards

 

Module IV (10 Hours)



Image reconstruction from projections - basics of projection - parallel beam and fan beam projection - method of generating projections - Fourier slice theorem - filtered back projection algorithms - testing back projection algorithms

 

References

1. Rafael C., Gonzalez & Richard E. Woods, Digital Image Processing, Addison Wesley, New Delhi

2. Rosenfeld A. & Kak A.C., Digital Picture Processing, Academic Press

3. Jain A.K, Fundamentals of Digital Image Processing, Prentice Hall, Englewood Cliffs, N.J.

4.   Schalkoff R. J., Digital Image Processing and Computer Vision, John Wiley and Sons, New York

5.   Pratt W.K., Digital Image Processing, 2nd edition, John Wiley and Sons, New York

CSU 362 PATTERN RECOGNITION


Pre-requisite: CSU 203 Data Structures and Algorithms

L

T

P

Cr

3

0

0

3

 Module I (11 Hours)

Introduction - introduction to statistical - syntactic and descriptive approaches - features and feature extraction - learning - Bayes Decision theory - introduction - continuous case - 2-category classification - minimum error rate classification - classifiers - discriminant functions - and decision surfaces - error probabilities and integrals - normal density - discriminant functions for normal density

 

Module II (11 Hours)

Parameter estimation and supervised learning - maximum likelihood estimation - the Bayes classifier - learning the mean of a normal density - general bayesian learning - nonparametric technic - density estimation - parzen windows - k-nearest neighbour estimation - estimation of posterior probabilities - nearest - neighbour rule - k-nearest neighbour rule

 

Module III (10 Hours)



Linear discriminant functions - linear discriminant functions and decision surfaces - generalised linear discriminant functions - 2-category linearly separable case - non-separable behaviour - linear programming procedures - clustering - data description and clustering - similarity measures - criterion functions for clustering

 

Module IV (10 Hours)



Syntactic approach to PR - introduction to pattern grammars and languages - higher dimensional grammars - tree, graph, web, plex, and shape grammars - stochastic grammars - attribute grammars - parsing techniques - grammatical inference

 

References



  1. Duda & Hart P.E, Pattern Classification And Scene Analysis, John Wiley and Sons, NY

  2. Gonzalez R.C. & Thomson M.G., Syntactic Pattern Recognition - An Introduction, Addison Wesley

  3. Fu K.S., Syntactic Pattern Recognition And Applications, Prentice Hall, Englewood cliffs, N.J.


CSU 411 COMPUTER SECURITY
Pre-requisites: CSU 304 Computer Networks, CSU 313 Operating Systems

CSU 213 Database Management Systems



L

T

P

Cr

3

0

0

3

Module I (10 Hours)

Concepts of Security, Confidentiality, Integrity, Authenticity, Availability, Accuracy, Utility, Reliability and Possession. Concepts of Computationally Secure and Information theoretic security. Associated proofs. Zero Knowledge Protocols.


Module II (8 Hours)

Access Control Matrix and Mechanisms, Vulnerability Analysis. Auditing Computer Security. Security Policy Guidelines. Security Awareness and Employment practices and policies. Anonymity and Identity in the cyber world. Practical examples from Network Domain. Tools for analysis and fingerprinting.


Module III (12 Hours)

Systems Security – Operating Systems and Database Security.

Buffer overflow related vulnerabilities and attacks. Prevention.

SQL injection attacks and other web based attacks.

Security Enhanced Linux – A case study. Kerberos.
Module IV (12 Hours)

Network Security. Firewalls, Vulnerability Assessment. Intrusion Detection Systems. DOS and DDOS attacks. Prevention strategies. Honey pot approach. Analysis.

Program Security. Security features of a programming language. Java as an example. Malicious code and Mobile code.
Reference:


  1. 1. Introduction to Computer Security. Matt Bishop. Addison-Wesley. 2004.

  2. 2. Security in Computing. Charles P Pfleeger. Pearson Education India. 2003.

  3. 3. Principles of Information Security. Michael E Whitman, Herbert J Mattord. Thomson. 2003.

  4. 4. Computer Security Handbook. Fourth Edition. Seymour Bosworth, M E Kabay, Editors. John Wiley. 2002.


CSU 364 NATURAL LANGUAGE PROCESSING
Pre-requisite: CSU 203 Data Structures and Algorithms


L

T

P

Cr

3

0

0

3


Module I (8 Hours)

Introduction to Natural Language Processing, Different Levels of language analysis, Representation and understanding, Linguistic background.


Module II (12 Hours)

Grammars and parsing, Top down and Bottom up parsers, Transition Network Grammars, Feature systems and augmented grammars, Morphological analysis and the lexicon, Parsing with features, Augmented Transition Networks.


Module III (12 Hours)

Grammars for natural language, Movement phenomenon in language, Handling questions in context free grammars, Hold mechanisms

in ATNs, Gap threading, Human preferences in parsing, Shift reduce parsers, Deterministic parsers, Statistical methods for

Ambiguity resolution


Module IV (10 Hours)

Semantic Interpretation, word senses and ambiguity, Basic logical form language, Encoding ambiguity in logical from, Thematic roles, Linking syntax and semantics, Recent trends in NLP.


References:

1. James Allen, Natural Language Understanding, Second Edition, 2003, Pearson Education.

2. D Juraffsky, J H Martin, Speech and Language Processing, Pearson Education


CSU 373 COMPUTATIONAL COMPLEXITY
Pre-requisite: CSU 305 Theory of Computation


L

T

P

Cr

3

0

0

3


Module I (10 Hours)

Review of Complexity Classes, NP and NP Completeness, Space Complexity, Hierarchies, Circuit satisfiability, Karp Lipton Theorem.


Module II (10 Hours)

Randomized Computation, PTMs, Examples, Important BPP Results, Randomized Reductions, Counting Complexity, Permanent’s and Valiant’s Theorem


Module III (10 Hours)

Review of Interactive Proofs, Lowerbounds: Randomized Decision Trees, Yao’s minimax lemma, Communication Complexity, Multiparty Communication Complexity


Module IV (12 Hours)

Advanced Topics: Selected topics from Average case Complexity, Levin’s theory, Polynomial time samplability, random walks, expander graphs, derandomization, Error Correcting Codes, PCP and Hardness of Approximation, Quantum Computation

 

References:

1. Papadimtriou C. H.., Computational Complexity, Addison Wesley, First Edition, 1993.

2.` Motwani R, Randomized Algorithms, Cambridge University Press, 1995.

3. Vazirani V., Approximation Algorithms, Springer, First Edition, 2004.



  1. Mitzenmacher M and Upfal E., Probability and Computing, Randomized Algorithms and Probabilistic Analysis, Cambridge University Press, 2005.

  2. Arora S and Boaz B, Computational Complexity, (Web Draft) http://www.princeton.edu/theory/complexity

CSU 471 ADVANCED TOPICS IN ALGORITHMS
Pre-requisite: CSU 301 Design and Analysis of Algorithms


L

T

P

Cr

3

0

0

3

Module I (10 Hours)

Discrete Probability: Probability, Expectations, Tail Bounds, Chernoff Bound, Markov Chains. Random Walks. Review of Generating functions, Exponential Generating Functions. Review of Recurrence Relations – both homogeneous and non-homogeneous of first and second degrees. Review of Analysis of recursive and non recursive algorithms.



Module II (12 Hours)

Randomized Algorithms, Moments and Deviations. Tail Inequalities. Randomized selection.

Las Vegas Algorithms. Monte Carlo Algorithms. Parallel and Distributed Algorithms. Concept of De-Randomization and techniques.

Module III (10 Hours)

Complexity: Probabilistic Complexity Classes, Proof Theory. Interactive Proof Systems.

Examples of probabilistic algorithms. Proving that an algorithm is correct 'Almost sure'.
Complexity analysis of probabilistic algorithms . The complexity classes PP and BPP

Module IV (10 Hours)

Kolmogorv Complexity – basic concepts. Models of Computation. Applications to analysis of algorithms. Lower bounds. Relation to Entropy. Kolmogorov complexity and universal probability.

Godel's Incompleteness Theorem. Different Interpretations. Chatin’s Proof for Godel’s Theorem.
References:

1. R. Motwani and P. Raghavan, Randomized Algorithms, Cambrdige University Press, 1995

2. C. H. Papadimitriou, Computational Complexity, Addison Wesley, 1994

3. Dexter C. Kozen, The Design and Analysis of Algorithms, Springer verlag N.Y, 1992




CSU 472 QUANTUM COMPUTATION
Pre-requisites: CSU 203 Data Structures and Algorithms, CSU 301 Design and Analysis of Algorithms


L

T

P

Cr

3

0

0

3

Module I (12 Hours)

Review of Linear Algebra. The postulates of quantum mechanics. Review of Theory of Finite Dimensional Hilbert Spaces and Tensor Products.


Module II (8 Hours)

Models of computation – Turing machines. Quantifying resources. Computational complexity and the various complexity classes. Models for Quantum Computation. Qubits. Single and multiple qubit gates. Quantum circuits. Bell states. Single qubit operations. Controlled operations and measurement. Universal quantum gates.


Module III (12 Hours)

Quantum Algorithms – Quantum search algorithm - geometric visualization and performance. Quantum

search as a quantum simulation. Speeding up the solution of NP Complete problems. Quantum search as an

unstructured database. Grover’s and Shor’s Algorithms.


Module IV (10 Hours)

Introduction to Quantum Coding Theory. Quantum error correction. The Shor code. Discretization of errors, Independent error models, Degenerate Codes. The quantum Hamming bound. Constructing quantum codes – Classical linear codes, Shannon entropy and Von Neuman Entropy.


References:

1. Nielsen M.A. and I.L. Chauang, Quantum Computation and Quantum Information,

Cambridge University Press, 2002.

2. Gruska, J. Quantum Computing, McGraw Hill, 1999.



3. Halmos, P. R. Finite Dimensional Vector Spaces, Van Nostrand, 1958.
Yüklə 419,5 Kb.

Dostları ilə paylaş:
1   2   3   4   5   6   7   8   9   10




Verilənlər bazası müəlliflik hüququ ilə müdafiə olunur ©genderi.org 2024
rəhbərliyinə müraciət

    Ana səhifə