JNTUK R10 CSE 4-1 Syllabus
JNTUK R10 CSE 4-1 Syllabus
JNTUK R10 CSE 4-1 Syllabus
I
Subject
Credits
1
2
4
4
4
4
Mobile Computing
3
3
2
2
28
7
8
Open Elective
i. MATLAB
ii.Web Services
iii. Open Source Software
iv.Cyber Laws
Elective I:
i. Computer Forensics
ii. Cloud Computing
iii. Software Project Management
iv. Machine Learning
v. Distributed Databases
UML & Design Patterns Lab
Mobile Application Development Lab
Total
UNIT-VIII:
System Security: Intruders, Intrusion Detection, Password Management, Malicious
Software - Types, Viruses, Virus Countermeasures, Worms, Firewalls - Characteristics,
Types of Firewalls, Placement of Firewalls, Firewall Configuration, Trusted systems.
TEXT BOOKS:
1. Cryptography and Network Security: Principles and Practice, 5th Edition, William
Stallings, Pearson Education, 2011.
2. Network Security and Cryptography, Bernard Menezes, Cengage Learning, 2011.
3. Cryptography and Network, 2nd Edition, Behrouz A. Fourouzan and Debdeep
Mukhopadhyay, McGraw-Hill, 2010.
REFERENCE BOOKS:
1. Fundamentals of Network Security by Eric Maiwald (Dreamtech press)
2. Principles of Information Security, Whitman, Thomson.
3. Introduction to Cryptography, Buchmann, Springer.
4. Applied Cryptography, 2nd Edition, Bruce Schneier, Johnwiley & Sons.
***
TEXT BOOKS:
1. The unified Modeling language user guide by Grady Booch, James Rumbaugh
, Ivar Jacobson, PEA
2. Design Patterns By Erich Gamma, Pearson Education
REFERENCE BOOK:
1. Satzinger: Object Oriented Analysis and Design, CENGAGE
***
Unit-VII:
Overview- types of clustering, Basic K-means, K means additional issues, Bisecting
k-means, k-means and different types of clusters, strengths and weaknesses, k-means
as an optimization problem.
Unit-VIII:
Agglomerative Hierarchical clustering, basic agglomerative hierarchical clustering
algorithm, specific techniques, DBSCAN: Traditional density: center-based approach,
strengths and weaknesses (Tan)
TEXT BOOKS:
1. Introduction to Data Mining : Pang-Ning tan, Michael Steinbach, Vipin Kumar,
Pearson
2. Data Mining ,Concepts and Techniques, 3/e, Jiawei Han , Micheline Kamber ,
Elsevier
REFERENCE BOOKS:
1.
2.
3.
4.
Introduction to Data Mining with Case Studies 2nd ed: GK Gupta; PHI.
Data Mining : Introductory and Advanced Topics : Dunham, Sridhar, Pearson.
Data Warehousing, Data Mining & OLAP, Alex Berson, Stephen J Smith, TMH
Data Mining Theory and Practice, Soman, Diwakar, Ajay, PHI, 2006.
***
UNIT II: GSM, CDMA, 2G, 3G and 4G Communications: GSM Services and System Architecture, Radio
Interface of GSM, Protocols of GSM, Localizations, Call Handling, Handover, Security, New Data Services,
General Packet Radio Service, High Speed Circuit Switched Data, Code Division Multiple Access, 3G
Wireless Communication Standards, OFDM, High Speed Packet Access 3G Network, Wi Max IEEE
802.16e, Broadband Wireless Access, 4G Networks, Mobile Satellite Communication Networks
UNIT III: Mobile IP Network Layer: IP and Mobile IP Network Layers, Packet Delivery and Handover
Management, Location Management, Registration, Tunnelling and Encapsulation, Route Optimization,
Dynamic Host Configuration Protocol, VoIP, IPSec.
UNIT IV: Mobile Transport Layer: Conventional TCP/IP Transport Layer Protocols, Indirect TCP, Snooping
TCP, Mobile TCP, Other Methods of Mobile TCP Layer Transmission, TCP over 2.5G/3G Mobile Networks.
UNIT VI: Databases and Mobile Computing: Data Organization, Database Transaction Models, Query
Processing, Data Recovery Process, Database Hoarding Techniques, Data Cashing, Client-Server
Computing for Mobile Computing, Adaptation Software for Mobile Computing, Power Aware Mobile
Computing, Context Aware Mobile Computing
UNIT VIII: Mobile Application Languages: Mobile Application Development, XML, Java, J2ME, JavaCard,
Mobile Application Development Platforms: Operating Systems, Windows Mobile and CE, Windows
Phone7, Android, Symbian.
TEXT BOOKS:
1. Mobile Computing, Raj Kamal, 2nd Edition, Oxford University Press, 2012.
2. Mobile Computing: Technology, Applications and Service Creation, 2nd Edition, Asoke K
Talukder, Hasan Ahmed, Roopa R Yavagal, Tata McGraw Hill, 2010.
3. Mobile Computing: Theoty and Practice, Kumkum Garg, Pearson Education, 2010.
REFERENCE BOOKS:
Unit-IV:
Processing Crime and Incident Scenes: Identifying Digital Evidence, Collecting the
Evidence in Private-Sector Incident Scenes, Processing law Enforcement Crime
Scenes, Preparing for a Search, Securing a Computer Incident or Crime Scene, Sizing
Digital evidence at the Scene, Storing Digital evidence, obtaining a Digital Hash.
Unit-V:
Current Computer Forensics Tools: Evaluating Computer Forensics Toll Needs,
Computer Forensics Software Tools, Computer Forensics Hardware Tools, Validating
and Testing Forensics Software
Unit-VI:
Computer Forensics Analysis and Validation: Determining What Data to Collect and
Anlyze, Validating Forensic Data, Addressing Data-Hiding Techniques, Performing
Remote Acquisition
Unit-VII:
Unit-VIII:
E-mail Investigations Cell Phone and Mobile Device Forensics: Exploring the Role
of E-mail in Investigations, Exploring the Role of Client and Server in E-mail,
Investigating E-mail Crimes and Violations, Understanding E-mail Servers, Using
Specialized E-mail Forensics Tools, Understanding Mobile Device Forensics,
Understanding Acquisition Procedure for Cell Phones and Mobile Devoices
TEXT BOOK:
1. Nelson, Phillips Enfinger,Steuart, Computer Forensics and Investigations, Cengage
Learning.
***
TEXT BOOKS:
1. Cloud Computing Web Based Applications That Change the way you Work and
Collaborate Online Michael Miller, Pearson Education.
2. Cloud Application Architectures, 1st Edition by George Reese O'Reilly Media.
REFERENCE BOOK:
1. Cloud Computing and SOA Convergence in Your Enterprise: A Step-by-Step
Guide David S. Linthicum Addison-Wesley Professional.
2. Distributed & Cloud Computing from Parallel Processing to the internet of Things
by Kai Hwang. Geoffrey C.Fox.Jack J.Dongarra.
***
UNITVII:
Project Control and Process instrumentation : The seven core Metrics, Management
indicators, quality indicators, life cycle expectations, pragmatic Software Metrics,
Metrics automation.
Tailoring the Process: Process discriminants.
UNITVIII:
Future Software Project Management: Modern Project Profiles, Next generation
Software economics, modern process transitions.
TEXT BOOK:
1. Software Project Management, Walker Royce: Pearson Education, 2005.
REFERENCE BOOKS:
1. Software Project Management, Bob Hughes and Mike Cotterell: Tata McGrawHill Edition.
2. Software Project Management, Joel Henry, Pearson Education.
3. Software Project Management in practice, Pankaj Jalote, Pearson
***
UNIT-VII:
Learning Sets of Rules: Introduction, Sequential Covering Algorithms, Learning Rule
Sets: Summary, Learning First Order Rules, Learning Sets of First Order Rules: FOIL,
Induction as Inverted Deduction, Inverting Resolution
UNIT-VIII:
Analytical Learning: Learning with Perfect Domain Theories: Prolog-EBG Remarks on
Explanation-Based Learning, Explanation-Based Learning of Search Control Knowledge
TEXT BOOK:
1. Machine Learning, Tom M. Mitchell, MGH
REFERENCE BOOK:
1. Introduction to machine learning, 2nd ed, Ethem Alpaydin, PHI
***
UNITVIII:
Database Integration, Scheme Translation, Scheme Integration, Query Processing
Query Processing Layers in Distributed Multi-DBMSs, Query Optimization Issues.
Transaction Management Transaction and Computation Model Multidatabase
Concurrency Control, Multidatabase Recovery, Object Orientation And Interoperability
Object Management Architecture CORBA and Database Interoperability Distributed
Component Model COM/OLE and Database Interoperability, PUSH-Based
Technologies
TEXT BOOKS:
1. Distributed Database Principles & Systems, Stefano Ceri, Giuseppe Pelagatti
McGraw-Hill
REFERENCE BOOK:
1. Principles of Distributed Database Systems, M.Tamer Ozsu, Patrick Valduriez
Pearson Education.
TEXT BOOKS:
1. Getting started with MATLAB by Rudra Pratap,Nov 2009. PHI
2. Programming in MATLAB for Engineers by Stephen J.Chapman, Cengage Learning.
REFERENCE BOOKS:
1. MATLAB: An introduction with applications by Amos Gilat, Wiley Student edition.
2. MATLAB for Engineering Explained, Gusfafsson, Fredrik, Bergmam, Niclas
***
1. Building Web Services with Java, 2 Edition, S. Graham and others, Pearson
Education.
2. Java Web Services, D.A. Chappell & T. Jewell, OReilly,SPD.
3. McGovern, et al., Java Web Services Architecture, Morgan Kaufmann
Publishers,2005.
4. J2EE Web Services, Richard Monson-Haefel, Pearson Education.
***
***
UNIT-VII:
IDEBTITY THEFT AND IDENTITY FRAUD: Typologies of Internet Theft/Fraud,
Prevalence and Victimology, Physical Methods of Identity Theft, Virtual and Internet
Facilitated methods, Crimes facilitated by Identity theft/fraud, Organized Crime and
Technology
UNIT-VIII:
Protection of Cyber consumers in India Cyber-consumer act Consumer, Goods and
service, consumer compliant, restricted and unfair trade practices
TEXTBOOKS:
1. Vivek Sood, Cyber Law Simplefied, Tata McGraw Hill
2. Marjie T. Britz, Computer Forensics and Cyber Crime, Pearson.
3. Cyber Laws Texts and Cases, Ferrera, CENGAGE
***