62
KALASALINGAM UNIVERSITY (Under Section 3 of UGC Act 1956) Anand Nagar, Krishnankoil - 626 190 Srivilliputtur (Via), Virudhunagar (Dt), Tamil Nadu CURRICULAM FOR THE M.TECH. DEGREE PROGRAMME IN COMPUTER SCIENCE AND ENGINEERING Semester 1 Code No. Course Title L T P C CSE5001 Big Data Analytics 3 0 0 3 CSE5002 Distributed Operating system 3 0 0 3 CSE* Elective – I 3 0 0 3 MAT5101 Applied Mathematics 3 0 0 3 CSE5102 Web Service 3 0 0 3 CSE5103 Adhoc Wireless Networks 3 0 0 3 CSE5081 Distributed Operating Systems Lab 0 0 3 1 CSE5082 Data Analytic Lab 0 0 3 1 Total 18 0 6 20 Semester 2 Code No. Course Title L T P C CSE5004 Multicore Architecture 3 0 0 3 CSE5005 Soft computing 3 0 0 3 CSE5006 Cloud computing 3 0 0 3 CSE* Elective – II 3 0 0 3

Microsoft Word - M.Tech Computer Science Engg.dockalasalingam.ac.in/.../wp-content/uploads/2015/03/M.Tec…  · Web viewKALASALINGAM UNIVERSITY (Under Section 3 of UGC Act 1956)

  • Upload
    hadien

  • View
    216

  • Download
    0

Embed Size (px)

Citation preview

KALASALINGAM UNIVERSITY(Under Section 3 of UGC Act 1956)

Anand Nagar, Krishnankoil - 626 190Srivilliputtur (Via), Virudhunagar (Dt), Tamil Nadu

CURRICULAM FOR THE

M.TECH. DEGREE PROGRAMME IN

COMPUTER SCIENCE AND ENGINEERING

Semester 1

Code No. Course Title L T P C

CSE5001 Big Data Analytics 3 0 0 3

CSE5002 Distributed Operating system 3 0 0 3

CSE* Elective – I 3 0 0 3

MAT5101 Applied Mathematics 3 0 0 3

CSE5102 Web Service 3 0 0 3

CSE5103 Adhoc Wireless Networks 3 0 0 3

CSE5081 Distributed Operating Systems Lab 0 0 3 1

CSE5082 Data Analytic Lab 0 0 3 1

Total 18 0 6 20

Semester 2

Code No. Course Title L T P C

CSE5004 Multicore Architecture 3 0 0 3

CSE5005 Soft computing 3 0 0 3

CSE5006 Cloud computing 3 0 0 3

CSE* Elective – II 3 0 0 3

CSE* Elective – III 3 0 0 3

CSE5110 Mobile and pervasive computing 3 0 0 3

CSE5083 Cloud computing Lab 0 0 3 1

CSE5084 Soft computing lab 0 0 3 1

Total 18 0 6 20

Semester 3

Code No. Course Title L T P C

CSE* Elective - IV 3 0 0 3

CSE* Elective - V 3 0 0 3

CSE* Elective - VI 3 0 0 3

CSE6098 Project Phase – I 0 0 18 6

Total 9 0 18 15

Semester 4

Code No. Course Title L T P C

CSE6099 Project Phase – II 0 0 30 10

List of Electives for M.Tech (CSE)

Code No. Course Title L T P C

CSE5007 Open source system and networking 3 0 0 3

CSE5008 Computational game theory 3 0 0 3

CSE5009 Bio informatics 3 0 0 3

CSE5010 Embedded Systems 3 0 0 3

CSE5011 Digital Image Processing 3 0 0 3

CSE5012 Natural Language Processing 3 0 0 3

CSE5013 Smart Grid 3 0 0 3

CSE5014 Communication and control in smart grid 3 0 0 3

CSE5104 Secure Network system Design 3 0 0 3

CSE5106 Wireless Sensor Networks 3 0 0 3

CSE5116 Internet of things 3 0 0 3

CSE5117 Mobile Application Development 3 0 0 3

CSE6001 Bio inspired Artificial Intelligence 3 0 0 3

CSE6002 Nano Computing 3 0 0 3

CSE6003 Network on Chip 3 0 0 3

CSE6101 Network Forensics 3 0 0 3

CSE6102 Social Network Analysis 3 0 0 3

CSE6105 Software Defined Networking 3 0 0 3

CSE6108 Green Computing 3 0 0 3

CSE6110 Medical Imaging and Radio Therapy 3 0 0 3

CSE5001 BIG DATA ANALYTICS L T P C

3 0 0 3

INTRODUCTION TO BIG DATA Analytics – Nuances of big data – Value – Issues – Case for Big data – Big data options Team challenge – Big data sources – Acquisition – Nuts and Bolts of Big data. Features of Big Data - Security, Compliance, auditing and protection - Evolution of Big data – Best Practices for Big data Analytics - Big data characteristics - Volume, Veracity, Velocity, Variety – Data Appliance and Integration tools – Greenplum – Informatica

DATA ANALYSIS Evolution of analytic scalability – Convergence – parallel processing systems – Cloud computing – grid computing – map reduce – enterprise analytic sand box – analytic data sets – Analytic methods – analytic tools – Cognos – Microstrategy - Pentaho. Analysis approaches – Statistical significance – business approaches – Analytic innovation – Traditional approaches – Iterative

STREAM COMPUTING Introduction to Streams Concepts – Stream data model and architecture - Stream Computing, Sampling data in a stream – Filtering streams – Counting distinct elements in a stream – Estimating moments – Counting oneness in a window – Decaying window - Realtime Analytics Platform(RTAP) applications IBM Infosphere – Big data at rest – Infosphere streams – Data stage – Statistical analysis – Intelligent scheduler – Infosphere Streams

PREDICTIVE ANALYTICS AND VISUALIZATION Predictive Analytics – Supervised – Unsupervised learning – Neural networks – Kohonen models – Normal – Deviations from normal patterns – Normal behaviours – Expert options – Variable entry - Mining Frequent itemsets - Market based model – Apriori Algorithm – Handling large data sets in Main memory – Limited Pass algorithm – Counting frequent itemsets in a stream – Clustering Techniques – Hierarchical – K- Means – Clustering high dimensional data Visualizations - Visual data analysis techniques, interaction techniques; Systems and applications

UNIT V FRAMEWORKS AND APPLICATIONS IBM for Big Data – Map Reduce Framework - Hadoop – Hive - – Sharding – NoSQL Databases - S3 - Hadoop Distributed file systems – Hbase – Impala – Analyzing big data with twitter – Big data for Ecommerce – Big data for blogs.

REFERENCES1. Frank J Ohlhorst, “Big Data Analytics: Turning Big Data into Big Money”, Wiley

and SAS Business Series, 2012.2. Colleen Mccue, “Data Mining and Predictive Analysis: Intelligence Gathering

and Crime Analysis”,Elsevier, 20073. Michael Berthold, David J. Hand, Intelligent Data Analysis, Springer, 2007.4. Anand Rajaraman and Jeffrey David Ullman, Mining of Massive Datasets,

Cambridge University Press, 2012.5. Bill Franks, “Taming the Big Data Tidal Wave: Finding Opportunities in Huge

Data Streams with Advanced Analytics”, Wiley and SAS Business Series, 2012.

6. Paul Zikopoulos, Chris Eaton, Paul Zikopoulos, “Understanding Big Data: Analytics for Enterprise Class Hadoop and Streaming Data”, McGraw Hill, 2011.

7. Paul Zikopoulos, Dirk deRoos, Krishnan Parasuraman, Thomas Deutsch , James Giles, David Corrigan, “Harness the Power of Big data – The big data platform”, McGraw Hill, 2012.

8. Glenn J. Myatt, Making Sense of Data, John Wiley & Sons, 20079. Pete Warden, Big Data Glossary, O’Reilly, 2011.10. Jiawei Han, Micheline Kamber “Data Mining Concepts and Techniques”, Second

Edition, Elsevier,Reprinted 2008.

CSE5002 DISTRIBUTED OPERATING SYSTEM L T P C

3 0 0 3

CONCEPTS OF OPERATING SYSEMDistributed Operating Systems - Architectures of Distributed Systems - Theoretical Foundations - distributed Mutual Exclusion - Distributed Deadlock Detection - Agreement Protocols 

FILE SYSTEMDistributed Resource Management - Distributed File Systems - Distributed Shared Memory - Distributed Scheduling 

FAULT TOLERANCEFailure Recovery and Fault Tolerance - Recovery - Fault Tolerance 

SECURITYProtection and Security - Resource Security and Protection: Access and Flow Control - Multiprocessor Operating Systems - Multiprocessor System Architectures -Multiprocessor Operating Systems 

DISTRIBUTED OPERATING SYSTEMDatabase operating systems - Introduction to Database Operating Systems - Concurrency Control: Theoretical Aspects - Concurrency Control Algorithms 

TEXT BOOK1. Mukesh Singhal, Niranjan Shivaratri G, Advanced Concepts in Operating Systems

Distributed, Database, and Multiprocessor Operating Systems, Tata McGraw-Hill, Sixth reprint 2008.

 REFERENCES1. Mary Gorman S, Todd Stubbs S, Introduction to Operating Systems: Advanced

Course, 2001. 2. Andrew Tanenbaum S, Modern Operating Systems, Prentice Hall.

3. Pradeep J, Sinha K, Distributed Operating Systems Concepts and design, PHI, 1997.

MAT5101 APPLIED MATHEMATICS L T P C

3 0 0 3

CLASSICAL OPTIMIZATION TECHNIQUESStatement of optimization problem – classification – optimization technique -Unconstrained Optimization – Equality constraints – Inequality constraints – LagrangeMultiplier method – Kuhn-Tucker Condition - Indirect search methods – Gradient of afunction – Steepest descent method – Conjugate gradient method – Newton’s method.

LINEAR PROGRAMMINGStandard form of Linear programming problem – definitions and theorems – Solution oflinear simultaneous equations – Simplex algorithm – graphical method – Dual simplexmethod – Transportation problem - Applications.

MATRIX THEORYMatrix Norms - Jordan Canonical form Generalized Eigen vectors - Singular ValueDecomposition - Pseudo Inverse - Least square Approximations – QR Algorithm.

PROBABILITY AND RANDOM PROCESSProbability - Random Process variables - Binomial, Poisson, Geometric, UniformNormal, Exponential Distributions - Moment generating functions and their properties -Functions of random variables.

QUEUING THEORYSingle and multiple server Markovian queuing models - Customer impatience- Queuingapplications.

TEXT BOOK:1. Singiresu S.Rao ,Engineering Optimization , New Age International (P) Ltd ,20012. Gupta S.C. and Kapoor V.K. Fundamentals of Mathematical Statistics, sultan Chand and sons , Newdelhi,20013. Lewis.D.W. Matrix Thoery, Allied Publishers, Chennai 1995

REFERENCES :1. S.D.Sharma, Operations Research, Kedar Nath Ram Nath & co 2008.2. M.K. Ochi., Applied Probability and Stochastic processes, John Wiley & sons 1992.3. Bronson.R. Matrix operations , Schaums outline series , Tata Mcgraw Hill,Newyork.

CSE5102 WEB SERVICES L T P C

3 0 0 3

DISTRIBUTED INFORMATION SYSTEMS AND MIDDLEWARE

Design of an Information System – Architecture of an Information System – Communication in an Information System –Understanding Middleware – RPC and Related Middleware – TP Monitors – Object Brokers – Message oriented Middleware.

WEB TECHNOLOGIES

Exchanging information over the Internet – Web Technologies for supporting remote clients – Application Servers – Web Technologies for Application Integration

WEB SERVICES TECHNOLOGIES

Web Services Technologies – Web Services Architecture – SOAP : Simple Object Access Protocol – WSDL : Web Services Description Language – UDDI: Universal Description Discovery and Integration- Related Standards

SERVICE CO-ORDINATION PROTOCOLS

An Introduction to co-ordination protocols – Infrastructure for co-ordination Protocols – WS Co-ordination – WS – Transactions – RosettaNet – Standards related to co-ordination protocols

SERVICE COMPOSITION

Basics of Service Composition – A new chance of success for composition – Service Composition Models – Dependencies between co-ordination and composition – BPEL : Business Process Execution language for web services – State of the Art in Web Services

REFERENCES:

1. Gystavo Alonso, Fabio Casasi, Hareemi Kuno, Vijay Machiraju, Web Services – Concepts, Architecture and Applications, Springer, 2004.

2. Ron Schmelzer et al, XML and Web Services, Pearson Education, 2002.3. Sandeep Chatterjee and James Webber, Developing Enterprise Web Services: An

Architect’s Guide, Practice Hall, 2004.4. Jorge Cardoso, Semantic Web Services, 2006.

CSE5103 ADHOC WIRELESS NETWORKS L T P C

3 0 0 3

INTRODUCTION & MAC PROTOCOLS

Ad Hoc Wireless Networks Issues. MAC protocols for ad hoc Wireless Networks: Issues, Classification of MAC Protocols, Contention Based protocols, Contention-Based Protocols with Reservation Mechanisms, Contention-Based MAC Protocols with scheduling Mechanisms, MAC Protocols that use Directional Antennas.

ROUTING PROTOCOLS

Classifications, Table Driven, On-Demand, Hybrid and Hierarchical Routing Protocols, Routing Protocols with efficient Flooding mechanism, Power aware Routing Protocols. Operation of Multicast Routing Protocols, Energy efficient Multicasting and Multicasting with QoS guarantees.

TRANSPORT LAYER AND SECURITY PROTOCOLS

Introduction, Issues, Design Goals, Classification of Transport Layer Solutions, TCP over Ad Hoc Wireless Networks, Other Transport Layer Protocols, Security in Ad Hoc Wireless Networks, Secure Routing in Ad Hoc wireless Networks.

QOS

Introduction, Issues and Chal lenges, Classifications of QoS Solutions, MAC Layer Solutions, Network Layer Solutions, QoS Frameworks for Ad Hoc Wireless Networks

ENERGY MANAGEMENT

Introduction, Need for Energy Management, Classification of Energy Management Schemes, Battery Management Schemes, Transmission Power Management Schemes, System Power Management Schemes

TEXT BOOK1. Siva Ram Murthy C, Manoj B.S., Ad Hoc Wireless Networks: Architectures and

Protocols, Prentice Hall, 2005.

REFERENCES1. Chai-Keong Toh, Ad Hoc Mobile Wireless Networks, PHI, 2002.2. Charles Perkins, Ad Hoc Networking, Addison Wesley, 2001.3. Mohammed Liyas, Handbook of Ad Hoc Wireless Networks, CRC Press, 2003.

CSE5081 DISTRIBUTED OPERATING SYSTEMS LABL T P C

3 0 0 3

LIST OF EXPERIMENTS

1. Implement the following CPU scheduling algorithmsa) FCFS b) Round Robin c) SJF

2. Implementation of mutual Exclusion problem Using Dekker`s Algorithm

3. Implement inter process communication

4. Implement Best-Fit ,First-Fit algorithm for Memory Management

5. Implement Memory Allocation with pages

6. Implement FIFO replacement algorithm

7. Implement LRU replacement algorithm

8. Implement creation of shared memory segment

9. Implement File Locking

10. Implement Banker`s algorithm

CSE5082 DATA ANALYTIC LABL T P C

3 0 0 3

List of Experiments1. To perform multidimensional data model using SQL queries (Star, Snowflake and

Fact constellation schemes) using Oracle 8i2. To perform various OLAP operations such as Slice, Dice, Roll-up, Drill-down,

Pivot using Oracle 8i PL/SQL3. To perform attribute relevance analysis on a given data using .NET framework

2.04. To perform information gain for a particular attribute in the given data

using .NET framework 2.05. To perform data generalisaton and summarization using Oracle 6. Implementing pre-processing using Weka Tool7. Implementing Association Rule mining using Apriori algorithm (Weka Tool)8. Implementing Classification rule process using j48 algorithm (Weka Tool)9. Implementing Classification rule process using id3 algorithm (Weka Tool)10. Implementing Classification rule process using naïve Bayes algorithm (Weka

Tool)11. Implementing Clustering rule process using simple K-means (Weka Tool)12. Implementing visualization using Weka Tool

CSE5004 MULTICORE ARCHITECTUREL T P C

3 0 0 3

NEED FOR MULTICORE ARCHITECTURES Fundamentals of Computer Design - Measuring and Reporting Performance - Instruction Level Parallelism and its Exploitation - Concepts and Challenges – Limitations of ILP – Multithreading – SMT and CMP Architectures – The Multicore era.

MULTIPROCESSOR ISSUES Symmetric and Distributed Shared Memory Architectures – Cache Coherence Issues – Performance Issues – Synchronization Issues – Models of Memory Consistency - Interconnection Networks – Buses, Crossbar and Multi-stage Interconnection Networks.

MULTICORE ARCHITECTURES

Homogeneous and Heterogeneous Architectures – Intel Multicore Architectures – SUN CMP architecture – IBM Cell Architecture – GPGPU Architectures.

MEMORY HIERARCHY DESIGN Introduction - Optimizations of Cache Performance - Memory Technology and Optimizations Protection: Virtual Memory and Virtual Machines - Design of Memory Hierarchies - Case Studies.

MULTICORE PROGRAMMING Parallel Programming models – Shared Memory Programming – Message Passing Interface Open MP Program Development and Performance Tuning.

REFERENCES1. John L. Hennessey and David A. Patterson, “ Computer Architecture – A

Quantitative Approach”,Morgan Kaufmann / Elsevier, 5th. edition, 2012.2. Peter S. Pacheco, “An Introduction to Parallel Programming”, Morgan Kaufmann,

Elsevier, 2011.3. Michael J Quinn, Parallel Programming in C with MPI and OpenMP, Tata

McGraw Hill, 2003.4. Darryl Gove, “Multicore Application Programming: For Windows, Linux, and

Oracle Solaris”, Pearson, 2011.5. David E. Culler, Jaswinder Pal Singh, “Parallel Computing Architecture : A

Hardware/ Software Approach” , Morgan Kaufmann / Elsevier, 1997

CSE5005 SOFT COMPUTINGL T P C

3 0 0 3

INTRODUCTIONConventional Artificial Intelligent system-symbolic processing-expert systems-pitfalls-Hard Vs Soft computing techniques-Constituents of soft computing-Special features-Hybrid system

FUZZY SETS AND LOGICFuzzy sets-Operation on fuzzy sets-fuzzy relation-Fuzzy rules and fuzzy reasoning-Fuzzy Inference systems-Defuzzification-Fuzzy Logic Control-Fuzzy clustering-Fuzzy Decision Making-Applications of Fuzzy logic.

ARTIFICIAL NEURAL NETWORKSOverview of Biological neuro system-Mathematical Model of Neurons-Learning rules-Learning paradigms-Supervised,unsupervised and reinforcement learning-Perceptron networks-Training rules-multilayer perceptron –back propagation algorithms-associative memories-Hop field networks-Boltzmann machine-Self Organising Map-Adaptive Resonance theory

EVOLUTIONARY COMPUTATIONRobustness of traditional optimization and search techniques-The goals of optimization-Introduction to evolutionary programming-Evolutionary strategy-Comparison –Genetic Algorithm-Principles, Genetic operators-GA for Optimization problems-Implementation issues-Applications.

HYBRID INTELLIGENT SYSTEMSAdaptive Neuro Fuzzy Inference Systems(ANFIS)-Architecture-Hybrid Learning Algorithm-Parameter Identification-Rule Based Structure identification-Input Selection-Input Space partition-Neuro fuzzy control-Genetic algorithm for fuzzy system design-Neural network training using GA.

TEXT BOOKS1. J.S.R.Jang,C.T.Sun and E.Mizutani,”Neuro Fuzzy and Soft Computing”,PHI

Learning private Limited,2010. 2. S.N.Sivanandam and S.N.Deepa,”Principles of Soft Computing”, Wiley India (P)

Ltd,2010 Edition.

REFERENCES1. Timothy J.Ross,”Fuzzy Logic with Engineering Applications”,McGraw-

Hill,2004.2. Goldberg,Genetic Algorithm in search,Optimization and Machine

learning,Addison Wesley,1998.CSE5006 CLOUD COMPUTING L T P C

3 0 0 3

FOUNDATIONSIntroduction to Cloud Computing – Roots of Cloud Computing – Layers and Types of Clouds – Desired features of a Cloud - Challenges and Risks – Migration into a Cloud – Seven step Model of Migration in to a Cloud – Enriching the “Integrations as a Service” Paradigm for the Cloud Era –The Enterprise Cloud Computing Paradigm.

INFRASTRUCTURE AS A SERVICEVirtual Machines Provisioning and Migration Services – Management of Virtual Machines for Cloud Infrastructures – The anatomy of cloud infrastructures – distributed Management of Virtual Infrastructures - Scheduling Techniques – Capacity Management to meet SLA Commitments – Enhancing Cloud Computing Environments Using Cluster as a Service – Cloud Storage

PLATFORM AND SOFTWARE AS A SERVICEIntegration of Private and Public Clouds – Aneka Cloud Platform – Hybrid Cloud Implementation – Workflow Engine for clouds – Architecture of workflow management System – The MapReduce Programming Model and Implementations – MapReduce Programming Model – Major MapReduce Implementations for the Cloud – MapReduce Impacts

MONITORING AND MANAGEMENTAn Architecture for Federated Cloud Computing – SLA Management in Cloud Computing – Traditional Approaches to SLA Management – Types of SLA – Life Cycle of SLA – Automated policy based management – Performance Prediction for HPC on clouds – Grid and Cloud – HPC in the Cloud: Performance –related issues

GOVERNANCE AND SECURITY Organizational Readiness and Change Management in the cloud age – Basic concept of Organizational Readiness – Common Change Management Models – Data Security in the Cloud – Cloud Computing and Data Security Risk – Cloud Computing and Identity – Content level Security – Technologies for Data Security in Cloud ComputingREFERENCES :

1. Rajkumar Buyya, James Broberg and Andrej Goscinski, Cloud Computing – Principles and Paradigms, Wiley 2011

2. Borko Furht, Armando Escalante, Handbook of Cloud Computing, Springer 2010

3. Michael Miller, Cloud Computing: Web-Based Applications That Change the Way You Work and Collaborate Online, Que Publishing, August 2008.

4. Kumar Saurabh, “Cloud Computing – Insights into New Era Infrastructure”, Wiley Indian Edition,2011.

CSE5110 MOBILE AND PERVASIVE COMPUTING L T P C

3 0 0 3

INTRODUCTION Differences between Mobile Communication and Mobile Computing – Contexts and Names –Functions – Applications and Services – New Applications – Making Legacy Applications Mobile Enabled – Design Considerations – Integration of Wireless and Wired Networks – Standards Bodies – Pervasive Computing – Basics and Vision – Principles of Pervasive Computing – Categories of Pervasive Devices

3G AND 4G CELLULAR NETWORKS Migration to 3G Networks – IMT 2000 and UMTS – UMTS Architecture – User Equipment – Radio Network Subsystem – UTRAN – Node B – RNC functions – USIM – Protocol Stack – CS and PS Domains – IMS Architecture – Handover – 3.5G and 3.9G a brief discussion – 4G LAN and Cellular Networks – LTE – Control Plane – NAS and RRC – User Plane – PDCP, RLC and MAC – WiMax IEEE 802.16d/e – WiMax Internetworking with 3GPP

SENSOR AND MESH NETWORKS Sensor Networks – Role in Pervasive Computing – In Network Processing and Data Dissemination – Sensor Databases – Data Management in Wireless Mobile Environments – Wireless Mesh Networks – Architecture – Mesh Routers – Mesh Clients – Routing – Cross Layer Approach – Security Aspects of Various Layers in WMN – Applications of Sensor and Mesh networks

CONTEXT AWARE COMPUTING Adaptability – Mechanisms for Adaptation - Functionality and Data – Transcoding – Location Aware Computing – Location Representation – Localization Techniques – Triangulation and Scene Analysis – Delaunay Triangulation and Voronoi graphs – Types of Context – Role of Mobile Middleware – Adaptation and Agents – Service Discovery Middleware

APPLICATION DEVELOPMENT Three tier architecture - Model View Controller Architecture - Memory Management – Information Access Devices – PDAs and Smart Phones – Smart Cards and Embedded Controls – J2ME – Programming for CLDC – GUI in MIDP – Application Development ON Android and iPhone.

REFERENCES1. Asoke K Talukder, Hasan Ahmed, Roopa R Yavagal, “Mobile Computing:

Technology,Applications and Service Creation”, Second Edition, Tata McGraw Hill, 2010.

2. Reto Meier, “Professional Android 2 Application Development”, Wrox Wiley, 2010.

3. Pei Zheng and Lionel M Li, ‘Smart Phone & Next Generation Mobile Computing’, Morgan Kaufmann Publishers, 2006.

4. Frank Adelstein, ‘Fundamentals of Mobile and Pervasive Computing’, TMH, 2005

5. Jochen Burthardt et al, ‘Pervasive Computing: Technology and Architecture of Mobile Internet Applications’, Pearson Education, 2003

6. Feng Zhao and Leonidas Guibas, ‘Wireless Sensor Networks’, Morgan Kaufmann Publishers, 2004

7. Uwe Hansmaan et al, ‘Principles of Mobile Computing’, Springer, 20038. Reto Meier, “Professional Android 2 Application Development”, Wrox Wiley,

2010.9. Stefan Poslad, “Ubiquitous Computing: Smart Devices, Environments and

Interactions”, Wiley, 2009.

CSE5083 CLOUD COMPUTING LAB L T P C

3 0 0 3

List of ExperimentsPart –I (Using Ubuntu Enterprise Cloud based on Eucalyptus)/ OpenStack and other tools)

1. Virtualization using VMware /Xen /KVM Virtual Box2. Implementation of private cloud on a single server (Eucalyptus)3. Implementation of Private Cloud on two physical servers (Eucalyptus)4. Implementation of Private Cloud on three physical severs5. Implementing IaaS using OpenStack6. Implementing PaaS using Eucalyptus and OpenStack7. Implementing SaaS using Eucalyptus and OpenStack

Part – II (Using CloudSim- Tool)8. Create a datacenter with one host and run one cloudlet on it.

9. Create two datacenters with one host and a network topology each and run two cloudlets on them.

10. Create two datacenters with one host each and run cloudlets of two users with network topology on them.

11. Create two datacenters with one host each and run two cloudlets on them.

12. Create a datacenter with one host and a network topology and run one cloudlet on it.

13. Create two datacenters with one host and a network topology each and run two cloudlets on them.

14. Simulation of heterogeneous power aware data centre

CSE5084 SOFT COMPUTING LABL T P C

3 0 0 3

List of Experiments1. Implementation of Perceptron Network using MATLAB2. Implementation of BPN using MATLAB3. Implementation of Hopfield Network in MATLAB4. Implementation of ART algorithm in MATLAB5. Implementation of Fuzzy Operations using MATLAB6. Implementation of Fuzzy arithmetic using MATLAB7. Implementation of defuzzification using MATLAB8. Implementation of Fuzzy inference system using MATLAB9. Solving Economic dispatch problem using GA (MATLAB)10. Solving Travelling Salesman Problem using GA (MATLAB)11. Implementing Fuzzy C-means algorithm (MATLAB)12. Implementing neuro-fuzzy system using Takagi Sugeno (MATLAB

CSE5007 OPEN SOURCE SYSTEM AND NETWORKINGL T P C

3 0 0 3

FOUNDATION Introduction – Memory addressing – Processes – Interrupts and exceptions – Kernel synchronization – clock and timer circuits.

PROCESSES Process scheduling: policy, algorithm, system calls – Memory management: page frame management, memory area management, slab allocator, aligning objects in memory, non-contiguous memory area management, addresses of noncontiguous memory areas – Process address space: process’s address space, foundational aspects of memory regions, page fault exception handler, creation and deletion – System calls – Signals: foundational aspects of the role of signals, generating a signal, delivering a signal and system calls – Implementation aspects of processes.

FILES AND DEVICES Virtual File System – I/O architecture and device drivers, block devices handling, the generic block layer, block device drivers – Implementation aspects of files and devices.

NETWORKING Introduction, data structures overview, user space to kernel interface – System initialization: reasons for notification chains, system initialization overview, device registration and initialization, goals of NIC initialization, interaction between devices and kernel, examples of virtual devices, boot time kernel options, when a device is registered and unregistered – Transmission and reception: decisions and traffic direction, notifying drivers, interrupt handlers, reasons for bottom half handlers, bottom halves solutions, concurrency and locking, preemption, overview of network stack – Bridging: concepts, spanning tree protocol – Implementation aspects of networking.

INTERNETWORKING IPv4 concepts – Neighbouring subsystem concepts – Routing concepts, advanced features Implementation aspects of internetworking.

REFERENCES1. Daniel P Bovet and Marco Cesati, “Understanding the Linux kernel”, 3rd edition,

O’Reilly, 2005.2. Christian Benvenuti, “Understanding Linux Network Internals”, O’Reilly, 2006.3. Y-D Lin, R-H Hwang and Fred Baker, “Computer networks – an open source

approach”, McGraw-Hill, 2012.4. Alessandro Rubini and Jonathan Corbet, “Linux device drivers”, 2nd edition,

O’Reilly, 2001.5. Maurice J Bach, “The design of the Unix operating system”, Pearson, 1986.

CSE5008 COMPUTATIONAL GAME THEORYL T P C

3 0 0 3

INTRODUCTION Introduction – Making rational choices: basics of Games – strategy - preferences – payoffs –Mathematical basics -Game theory –Rational Choice - Basic solution concepts-non-cooperative versus cooperative games - Basic computational issues - finding equilibria and learning in games- Typical application areas for game theory (e.g. Google's sponsored search, eBay auctions, electricity trading markets).

GAMES WITH PERFECT INFORMATION Games with Perfect Information - Strategic games - prisoner's dilemma, matching pennies- Nash equilibria- theory and illustrations - Cournot's and Bertrand's models of oligopoly- auctions- mixed strategy equilibrium- zero-sum games- Extensive Games with Perfect Information-repeated games (prisoner's dilemma)- subgame perfect Nash equilibrium; computational issues.

GAMES WITH IMPERFECT INFORMATION Games with Imperfect Information - Bayesian Games – Motivational Examples – General Definitions –Information aspects – Illustrations - Extensive Games with Imperfect -Information - Strategies-Nash Equilibrium – Beliefs and sequential equilibrium – Illustrations - Repeated Games – The Prisoner's Dilemma – Bargaining

NON-COOPERATIVE GAME THEORY Non-cooperative Game Theory - Self-interested agents- Games in normal form - Analyzing games: from optimality to equilibrium - Computing Solution Concepts of Normal-Form Games – Computing Nash equilibria of two-player, zero-sum games -Computing Nash equilibria of two-player, general-sum games - Identifying dominated strategies

MECHANISM DESIGN Aggregating Preferences-Social Choice – Formal Model- Voting - Existence of social functions - Ranking systems - Protocols for Strategic Agents: Mechanism Design - Mechanism design with unrestricted preferences- Efficient mechanisms - Vickrey and VCG mechanisms (shortest paths) - Combinatorial auctions - profit maximization Computational applications of mechanism design -applications in Computer Science - Google's sponsored search - eBay auctions

REFERENCES1. M. J. Osborne, An Introduction to Game Theory. Oxford University Press, 2004.2. N. Nisan, T. Roughgarden, E. Tardos, and V. V. Vazirani (Editors), Algorithmic

Game Theory. Cambridge University Press, 2007.3. M. J. Osborne and A. Rubinstein, A Course in Game Theory. MIT Press, 1994.

4. A.Dixit and S. Skeath, Games of Strategy, Second Edition. W W Norton & Co Inc, 2004.

5. Yoav Shoham, Kevin Leyton-Brown, Multiagent Systems: Algorithmic, Game-Theoretic, and Logical Foundations, Cambridge University Press 2008

6. Zhu Han, Dusit Niyato,Walid Saad,Tamer Basar and Are Hjorungnes, “Game Theory in Wireless and Communication Networks”, Cambridge University Press, 2012

CSE5009 BIO INFORMATICSL T P C

3 0 0 3

INTRODUCTORY CONCEPTS The Central Dogma – The Killer Application – Parallel Universes – Watson’s Definition – Top Down Versus Bottom up – Information Flow – Convergence – Databases – Data Management – Data Life Cycle – Database Technology – Interfaces – Implementation – Networks – Geographical Scope – Communication Models – Transmissions Technology – Protocols – Bandwidth – Topology – Hardware – Contents – Security – Ownership – Implementation – Management. SEARCH ENGINES, VISUALIZATION AND ALGORITHMSThe search process – Search Engine Technology – Searching and Information Theory –Computational methods – Search Engines and Knowledge Management – Data Visualization –sequence visualization – structure visualization – user Interface –Animation Versus simulation –General Purpose Technologies - Exhaustive search – Greedy – Dynamic programming – divide andconquer – graph algorithms

STATISTICS AND DATA MINING Statistical concepts – Microarrays – Imperfect Data – Randomness – Variability – Approximation –Interface Noise – Assumptions – Sampling and Distributions – Hypothesis Testing – QuantifyingRandomness – Data Analysis – Tool selectionstatistics of Alignment – Clustering and Classification –Data Mining – Methods –Selection and Sampling – Preprocessing and Cleaning – Transformation andReduction – Data Mining Methods – Evaluation – Visualization – Designing new queries – PatternRecognition and Discovery – Machine Learning – Text Mining – Tools.

PATTERN MATCHING Pairwise sequence alignment – Local versus global alignment – Multiple sequence alignment – Computational methods – Dot Matrix analysis – Substitution matrices –Dynamic Programming – Word methods – Bayesian methods – Multiple sequencealignment – Dynamic Programming – Progressive strategies – Iterative strategies –Tools – Nucleotide Pattern Matching – Polypeptide pattern matching– Utilities –Sequence Databases.

MODELING AND SIMULATION Drug Discovery – components – process – Perspectives – Numeric considerations – Algorithms – Hardware – Issues – Protein structure – AbInitio Methods – Heuristic methods – Systems Biology – Tools – Collaboration and Communications – standards -Issues – Security – Intellectual property.

REFERENCES1. Bryan Bergeron, “Bio Informatics Computing”, Second Edition, Pearson

Education, 2003.2. T.K.Attwood and D.J. Perry Smith, “Introduction to Bio Informatics, Longman

Essen,1999.3. An Introduction to, Bioinformatics Algorithms (Computational Molecular

Biology) , “Neil C.Jones,PaveA. Pevzner”, MIT Press 2004.

CSE5010 EMBEDDED SYSTEML T P C

3 0 0 3

INTRODUCTION TO EMBEDDED SYSTEM AND HARDWARE FUNDAMENTALS Examples of Embedded Systems-Typical Hardware- Terminology-Gates-A Few Other Basic Considerations-Timing Diagrams-Memory- Interrupts: Microprocessor Architecture-Interrupt Basics-The Shared-Data Problem-Interrupt Latency.

SOFTWARE ARCHITECTURES FOR EMBEDDED SYSTEMS Round-Robin-Round-Robin with Interrupts-Function-Queue-Scheduling Architecture-Real-Time Operating System Architecture-Selecting an Architecture Forth/Open Firmware: Introducing Forth-. String Words-Stack Manipulation- Creating New Words Comments- if ... else- Loops-. Data Structures-Interacting with Hardware and Memory Forth Programming Guidelines

INTRODUCTION TO REAL-TIME OPERATING SYSTEMS. Tasks and Task States-Tasks and Data-Semaphores and Shared Data-Operating System Services-Message Queues, Mailboxes, and Pipes-Timer Functions-Events-Memory Management-Interrupt Routines in an RTOS Environment.

BASIC DESIGN USING A REAL-TIME OPERATING SYSTEM. Overview-Principles-An Example-Encapsulating Semaphores and Queues-Hard Real-Time Scheduling Considerations-Saving Memory Space-Saving Power-Embedded Software Development Tools-Host and Target Machines.-Linker/Locators for Embedded Software-Getting Embedded Software into the Target System

DEBUGGING TECHNIQUES AND AN EXAMPLE SYSTEM: Testing on Your Host Machine-Instruction Set Simulators-The assert Macro-Using Laboratory Tools-An Example System-What the Program Does-Environment in Which the Program Operates-A Guide to the Source Code-Source Code.

TEXT BOOKS 1. David Simon , An Embedded Software Primer, Addison Wesliey. 2. John Catsoulis, Designing Embedded Hardware, O'Reilly Publications, 2005

REFERENCE 1. Raj Kamal, Embedded Systems: Architecture and Programming ,Mc Graw Hill

publications,1st Edition,2003.

CSE5011 DIGITAL IMAGE PROCESSINGL T P C

3 0 0 3

CONTINUOUS AND DISCRETE IMAGES AND SYSTEMS Light, Luminance -Brightness and Contrast - Eye - Monochrome vision model - Image processing problems and applications - Vision – camera - Digital processing system - 2-D sampling theory – Aliasing - Image quantization - Lloyd Max Quantizer, Dither - Color images - Linear systems and shift invariance - Fourier Transform -Z-Transform - Matrix theory results - Block matrices and Kronecker products.

IMAGE TRANSFORMS

2-D orthogonal and Unitary transforms - 1-D and 2-D DFT - Cosine - Sine -Walsh Hadamard - Haar - Slant -Karhunen-loeve - Singular value decomposition transforms.

IMAGE ENHANCEMENT Point operations - contrast stretching -clipping and thresholding - density slicing - Histogram equalization -modification and specification -spatial operations - spatial averaging -low pass -high pass -band pass filtering - direction smoothing - medium filtering - generalized ceptrum and homomorphic filtering - edge enhancement using 2D IIR and FIR filters - color enhancement.

IMAGE RESTORATION Image observation models - sources of degradation - inverse and Wiener filtering -geometric mean filter - non linear filters -smoothing splines and interpolation - constrained least square restoration.

IMAGE DATA COMPRESSION & IMAGE RECONSTRUCTION FROM PROJECTIONS Pixel Coding -Predictive Coding Techniques - Transform Coding Of Images - Theory And Algorithms - Hybrid Coding And Vector Dpcm - Block Truncation Coding - Video Coding - Inter-Frame Coding - Coding Of 2 Tone Images - Image Coding Standards- Jbig, Jpeg And Mpeg-I And Ii. Wavelet Transform Coding Of Images - Color Image Coding - Random Transform - Back Projection Operator - Inverse Random Transform -Back Projection Algorithm - Fan Beam And Algebraic Restoration Techniques.

M.Tech Computer Science & Engineering Regulations-2014

TEXT BOOKS 1. Anil Jain K, Fundamentals of Digital Image Processing, Pearson Education, 2003. 2. William Pratt , Digital Image Processing, Wiley Interscience, 2nd edition 1991

REFERENCES

1. Gonzales, Rafael and Windz, Digital Image Processing, Addison-Wesley. 2nd edition,1998

2. Maner Sid-Ahmed A., Image Processing, McGraw Hill International Edition, 1995. 3. Andrion Low, Introductory computer Vision and Image Processing, MCGraw Hill

International Edition.

KALASALINGAM UNIVERSITY

M.Tech Computer Science & Engineering Regulations-2014

CSE5012 NATURAL LANGUAGE PROCESSINGL T P C

3 0 0 3

INTRODUCTION Introduction: Knowledge in speech and language processing – Ambiguity – Models and Algorithms – Language Thought and Understanding. Regular Expressions and automata: Regular expressions – Finite-State automata. Morphology and Finite-State Transducers: Survey of English morphology – Finite-State Morphological parsing – Combining FST lexicon and rules – Lexicon-Free FSTs: The porter stammer – Human morphological processing

SYNTAXConstituency – Context-Free rules and trees – Sentence-level constructions – The noun phrase – Coordination – Agreement – The verb phase and sub categorization – Auxiliaries – Spoken language syntax – Grammars equivalence and normal form – Finite-State and Context-Free grammars – Grammars and human processing. Parsing with Context-Free Grammars: Parsing as search – A Basic Top-Down parser – Problems with the basic Top-Down parser – The early algorithm – Finite-State parsing methods.

SEMANTIC Syntax-Driven semantic analysis – Attachments for a fragment of English – Integrating semantic analysis into the early parser – Idioms and compositionality – Robust semantic analysis. Lexical semantics: relational among lexemes and their senses – WordNet: A database of lexical relations – The Internal structure of words – Creativity and the lexicon

NATURAL LANGUAGE GENERATION Introduction to language generation – Architecture for generation – Surface realization – Discourse planning – Other issues.

MACHINE TRANSLATION Language similarities and differences – The transfer metaphor – The interlingua idea: Using meaning – Direct translation – Using statistical techniques – Usability and system development.

TEXT BOOK 1. Daniel Jurafsky and James Martin H, Speech and Language Processing, Pearson Education

Pvt Ltd., Singapore, 2003.

REFERENCE 1. James Allen, Natural Language Understanding, Pearson Education, 2003.

KALASALINGAM UNIVERSITY

M.Tech Computer Science & Engineering Regulations-2014

CSE5013 SMART GRIDL T P C

3 0 0 3

SMART GRID ARCHITECTURAL DESIGNSIntroduction – Power grid vs Smart grid – Computational intelligence – power system enhancement – communication and standards - General View of the Smart Grid Market Drivers - Stakeholder Roles and Function - Working Definition of the Smart Grid Based on Performance - Measures - Representative Architecture - Functions of Smart Grid Components

SMART GRID COMMUNICATIONS AND MEASUREMENT TECHNOLOGYCommunication and Measurement - Monitoring, PMU, Smart Meters, and Measurements Technologies - GIS and Google Mapping Tools - Multiagent Systems (MAS) Technology

PERFORMANCE ANALYSIS TOOLS FOR SMART GRID DESIGNIntroduction to Load Flow Studies - Challenges to Load Flow in Smart Grid and Weaknesses of the Present Load Flow Methods - Load Flow State of the Art: Classical, Extended Formulations, and Algorithms - Congestion Management Effect - Load Flow for Smart Grid Design - DSOPF Application - Static Security Assessment (SSA) and Contingencies - Contingencies and Their Classification - Contingency Studies

STABILITY ANALYSIS TOOLS FOR SMART GRIDIntroduction to Stability-Strengths and Weaknesses of Existing Voltage Stability Analysis Tools-Voltage Stability Assessment-Voltage Stability Assessment Techniques-Voltage Stability Indexing-Analysis Techniques for Steady-State Voltage Stability Studies-Application and Implementation Plan of Voltage Stability-Optimizing Stability Constraint through Preventive Control of Voltage Stability-Angle Stability Assessment-State Estimation

RENEWABLE ENERGY AND STORAGE Renewable Energy Resources-Sustainable Energy Options for the Smart Grid-Penetration and Variability Issues Associated with Sustainable Energy Technology-Demand Response Issues-Electric Vehicles and Plug-in Hybrids-PHEV Technology-Environmental Implications-Storage Technologies

TEXT BOOK

1. Smart Grid: Fundamentals of design and analysis, James Momoh, John Wiley & sons Inc, IEEE press 2012.

KALASALINGAM UNIVERSITY

M.Tech Computer Science & Engineering Regulations-2014

REFERENCES

1. Smart Grid: Technology and Applications, Janaka Ekanayake, Nick Jenkins, Kithsiri Liyanage, Jianzhong Wu, Akihiko Yokoyama, John Wiley & sons inc, 2012.

2. Smart Grid: Integrating Renewable, Distributed & Efficient Energy, Fereidoon P. Sioshansi, Academic Press, 2011.

CSE5014 COMMUNICATION AND CONTROL IN SAMRT GRID

L T P C

3 0 0 3

COMMUNICATION ARCHITECTURES AND MODELS FOR SMART GRIDIntroduction-Smart grid conceptual model-Smart grid communication infrastructures-Interoperability issues-Role of communication infrastructures in smart grid-Security and privacy in the communications infrastructure for smart grid-Open issues and future research directions-Information in today’s power system management operations-Enhanced smart grid measuring functionalities-Demand-side management and demand response

PHYSICAL DATA COMMUNICATIONS, ACCESS, DETECTION, AND ESTIMATION TECHNIQUES FOR SMART GRIDIntroduction-Communications media-Power-line communication standards-Wireless standards-Networking solutions-M2M communications technologies-M2M applications-M2M architectural standards bodies-M2M application in smart grid

SMART GRID AND WIDE-AREA NETWORKSIntroduction-Components of a wide-area measurement system-Communication networks for WAMS-WAMS applications-WAMS modeling and network simulations-Smart grid application requirements-Network topologies-Deployment factors-Performance metrics and tradeoffs

SENSOR AND ACTUATOR NETWORKS FOR SMART GRID Introduction-WSN-based smart grid applications-Research challenges for WSN-based smart grid applications-Sensors and sensing principles-Communication protocols for smart grid-Challenges for WSN protocol design in smart grid-Constrained protocol stack for smart grid-Implementation-Performance evaluation

SECURITY IN SMART GRID COMMUNICATIONS AND NETWORKINGIntroduction-Background-Cyber attack impact analysis framework-Hierarchical architecture-Robust and resilient control-Secure network routing-Management of information security-Intrusion detection for advanced metering infrastructures-Converged networks for SCADA systems-Design principles for authentication

TEXT BOOK

KALASALINGAM UNIVERSITY

M.Tech Computer Science & Engineering Regulations-2014

1. Smart Grid Communication and Networking, Ekram Hossain, Zhu Han and H. Vincent Poor, Cambridge University Press, 2012.

REFERENCES1. Communication and Networking in Smart Grids, Yang Xiao, CRC Press, 2012.2. Smart Grid Infrastructure & Networking, Krzysztof Iniewski, McGraw-Hill Companies,

Incorporated, 2012.

CSE5104 SECURE NETWORK SYSTEM DESIGNL T P C

3 0 0 3

NETWORK SECURITY FOUNDATIONS

Secure network design through modeling and simulation, A fundamental framework for network security, need for user level security on demand, Network Security Axioms, security policies and operations life cycle, security networking threats, network security technologies, general and identity design considerations, network security platform options and best deployment practices, secure network management and network security management.

IDENTIFYING SYSTEM DESIGNER’S NEEDS AND GOALS

Evolution of network security and lessons learned from history, Analyzing top-down network design methodologies, technical goals and tradeoffs – scalability, reliability, availability, Network performance, security, Characterizing the existing internetwork, characterizing network traffic, developing network security strategies.

PHYSICAL SECURITY ISSUES AND LAYER-2 SECURITY CONSIDERATIONS

Control physical access to facilities, Control physical access to data centers, Separate identity mechanisms for insecure locations, Prevent password-recovery mechanisms in insecure locations, awareness about cable plant issues, electromagnetic radiation and physical PC security threats, L2 control protocols, MAC flooding considerations, attack mitigations, VLAN hopping attacks, ARP, DHCP, PVLAN security considerations, L2 best practice policies.

IP ADDRESSING AND ROUTING DESIGN CONSIDERATIONS

Route summarizations, ingress and egress filtering, Non routable networks, ICMP trafficmanagement, Routing protocol security, Routing protocol authentication, transport protocol management policies, Network DoS/flooding attacks.

KALASALINGAM UNIVERSITY

M.Tech Computer Science & Engineering Regulations-2014

TESTING AND OPTIMIZING SYSTEM DESIGN

Selecting technologies and devices for network design, testing network design – using industry tests, building a prototype network system, writing and implementing test plan, tools for testing, optimizing network design – network performance to meet quality of service (QoS), Modeling, simulation and behavior analysis of security attacks, future issues in information system security.

REFERENCES:

1. Sumit Ghosh, Principles of Secure Network System Design, Springer-Verlag, NY,2002. (UNIT I)

2. Sean Convery, Network Security Architecture, Cisco Press, 2004.(UNIT III & IV)3. Priscilla Oppenheimer, Top-Down Network Design, Third edition, Cisco Press, 2012.

(UNIT II & V).4. Larry L. Peterson, Bruce S. Davie, Computer Networks: A Systems Approach, Fourth

Edition, Morgan Kauffmann Publishers Inc., 2009, Elsevier.5. William Stallings, Cryptography and Network security Principles and Practices, Pearson /

PHI, 4th edition, 2006.6. Wade Trappe, Lawrence C Washington, Introduction to Cryptography with Coding

Theory, 2nd edition, Pearson, 2007.

KALASALINGAM UNIVERSITY

M.Tech Computer Science & Engineering Regulations-2014

CSE5106 WIRELESS SENSOR NETWORKSL T P C

3 0 0 3

INTRODUCTION

Introduction – Sensor Mote Platforms – WSN Architecture and Protocol Stack – WSN Applications – Military Applications – Environmental Applications – Health Applications – Home Applications – Industrial Applications – Factors Influencing WSN Design

PHYSICAL LAYER AND MEDIA ACCESS CONTROL

Physical Layer Technologies – Overview of RF Wireless Communication – Channel Coding – Modulation – Wireless Channel Effects – Physical Layer Standards – Media Access Control – Challenges for MAC – CSMA – Contention based Media Access – Reservation Based Media Access – Hybrid Media Access.

NETWORK LAYER AND TRANSPORTATION LAYER

Challenges for routing – Data Centric and Flat Architecture Protocols – Hierarchical Protocols – Geographical Routing Protocols – QoS Based Protocols – Transport Layer – Challenges for Transport Layer – Pump Slowly, Fetch Quickly Protocol – Congestion Detection and Avoidance (CODA) Protocol.

TIME SYNCHRONISATION AND LOCALISATION

KALASALINGAM UNIVERSITY

M.Tech Computer Science & Engineering Regulations-2014

Challenges for Time Synchronisation - Network Time Protocol – Time –Sync Protocol for Sensor Networks (TPSN) – Reference – Broadcast Synchronisation (RBS) – Localisation – Challenges in localization – Ranging Techniques – Range based localization Protocol – Range Free Localisation Protocol.

RECENT TRENDS

Security Issues in WSN – Wireless Sensor and Actor Networks – Wireless Multimedia Sensor Networks – Wireless Underwater Sensor Networks – Wireless Underground Sensor Networks.

REFERENCES:

1. Ian F. Akyildiz and Mehmet Can Vuran, Wireless Sensor Networks, Wiley 2010.2. Jun Zheng and Abbas Jamalipour, Wireless Sensor Networks – A Networking

Perspective, Wiley 2009.3. Holger Karl, Andreas Willig, Protocols and Architectures for Wireless Sensor Networks,

Wiley 2005.4. Ivon Stojmenovic, Hand Book of Sensor Networks – Algorithms and Architectures,

Wiley ,2005

CSE5116 INTERNET OF THINGSL T P C

3 0 0 3

INTRODUCTION Definitions and Functional Requirements –Motivation – Architecture - Web 3.0 View of IoT–Ubiquitous IoT Applications – Four Pillars of IoT – DNA of IoT - The Toolkit Approach for End-user Participation in the Internet of Things. Middleware for IoT: Overview – Communication middleware for IoT –IoT Information Security

IOT PROTOCOLS Protocol Standardization for IoT – Efforts – M2M and WSN Protocols – SCADA and RFID Protocols – Issues with IoT Standardization – Unified Data Standards – Protocols – IEEE 802.15.4 – BACNet Protocol – Modbus – KNX – Zigbee Architecture – Network layer – APS layer – Security

WEB OF THINGSWeb of Things versus Internet of Things – Two Pillars of the Web – Architecture Standardization for WoT– Platform Middleware for WoT – Unified Multitier WoT Architecture – WoT Portals and Business Intelligence. Cloud of Things: Grid/SOA and Cloud Computing – Cloud Middleware – Cloud Standards – Cloud Providers and Systems – Mobile Cloud Computing – The Cloud of Things Architecture

INTEGRATED

KALASALINGAM UNIVERSITY

M.Tech Computer Science & Engineering Regulations-2014

Integrated Billing Solutions in the Internet of Things Business Models for the Internet of Things - Network Dynamics: Population Models – Information Cascades - Network Effects – Network Dynamics: Structural Models - Cascading Behavior in Networks - The Small-World Phenomenon

APPLICATIONS The Role of the Internet of Things for Increased Autonomy and Agility in Collaborative Production Environments - Resource Management in the Internet of Things: Clustering, Synchronisation and Software Agents. Applications - Smart Grid – Electrical Vehicle Charging

REFERENCES1. The Internet of Things in the Cloud: A Middleware Perspective - Honbo Zhou – CRC

Press – 20122. Architecting the Internet of Things - Dieter Uckelmann; Mark Harrison; Florian

Michahelles- (Eds.) – Springer – 20113. Networks, Crowds, and Markets: Reasoning About a Highly Connected World -

David Easley and Jon Kleinberg, Cambridge University Press - 20104. The Internet of Things: Applications to the Smart Grid and Building Automation by –

Olivier Hersent, Omar Elloumi and David Boswarthick - Wiley -20125. Olivier Hersent, David Boswarthick, Omar Elloumi , “The Internet of Things – Key

applications and Protocols”, Wiley, 2012

CSE5117 MOBILE APPLICATION DEVELOPMENTL T P C

3 0 0 3

INTRODUCTION

Preliminary Considerations – Cost of Development – Importnace of Mobile Strategies in Business World – Mobile Web Presence – Mobile Applications – Marketing – Web Services for Mobile Devices – Creating Example Web Service _ Debugging Web Sevice

MOBILE USER INTERFACE DESIGN

Effective Use of Screen Real Estate – Understanding Mobile Application Users – Understanding Mobile Information Design – Understanding Mobile Platforms – Using the Tools for Mobile Interface Design – Choosing a Mobile Web Option – Adaptive Mobile Website – Mobile Web Applications with HTML 5

ANDROID APPLICATION DEVELOPMENT

Getting to know the Android User Interfaces – Designing Your User interface using Views – Displaying Pictures and Menus with Views – Using Image views to Display pictures – Using menus with views – Data Persistence – Saving and loading user performances - Persisting data to files – Creating and using Data bases – Content Providers.

KALASALINGAM UNIVERSITY

M.Tech Computer Science & Engineering Regulations-2014

ANDROID MESSAGING, NETWORKING, LOCATION BASED SERVICES

SMS Messaging, Sending E-mail – Networking – Downloading Binary Data, Text Files- Accessing Web Services – Performing Asynchronous Calls – Location Based Services – Displaying Maps – Getting Location Data – Creating your own services – Communicating between a service and an activity – Binding activities to Services

IOS AND WINDOWS PHONE

Getting started with iOS – iOS Project – Debugging iOS Apps – Objective C Basics – Hello Word App – Building the derby app in iOS – Windows Phone 7 Project – Building Derby App in Windows Phone 7.

REFERENCES

1. Jeff McWherter and Scott Gowell, Professional Mobile Application Development, Wrox 2012.

2. Wei – Meng Lee, Beginning Android Application Development, Wiley 20113. Charlie Collins, Michael Galpin and Matthias Kappler, Android in Practice, Dream Tech.

20124. James Dovey and Ash Furrow, Beginning Objective C, Apress, 20125. David Mark, Jack Nutting, Jeff LaMouche, and Fredric Olsson, Beginning iOS6

Development: Exploring the iOS SDK, Apress, 2013.

CSE6001 BIO INSPIRED ARTIFICIAL INTELLIGENCEL T P C

3 0 0 3

EVOLUTIONARY SYSTEMS Evolutionary Systems – Artificial Evolution - Genetic Representations - Evolutionary Measures - Types of Evolutionary Algorithms - Schema Theory. Evolutionary Computation- Representation- Selection- Reproduction. Genetic Algorithms - Canonical Genetic Algorithm – Crossover- Mutation - Control Parameters – Applications. Genetic Programming - Tree-Based Representation – Building Block Genetic Programming –Applications. Evolutionary Programming – Basics –Operators -StrategyParameters -Evolutionary Programming Implementations

NEURAL AND FUZZY SYSTEMS Neural Networks - Biological Nervous Systems - Artificial Neural Learning - Architecture.Unsupervised Learning - Self-Organizing Feature Maps. Supervised Learning – Types- Learning Rules. Radial Basis Function Networks. Reinforcement Learning – Model Free - Neural

KALASALINGAM UNIVERSITY

M.Tech Computer Science & Engineering Regulations-2014

Networks and Reinforcement Learning. Fuzzy Systems- Fuzzy Sets – Logic and Reasoning – Controllers- Rough Sets.

CELLULAR AND DEVELOPMENT SYSTEMS Cellular Systems - The Basic Ingredients - Cellular Automata -Modeling - Classic Cellular Automata – Other Cellular Systems – Computation - Artificial Life - Complex Systems - Analysis and Synthesis of Cellular Systems. Developmental Systems - Potential Advantages of a Developmental Representation -Rewriting Systems - Synthesis of Developmental Systems - Evolution and Development – Defining Artificial Evolutionary Developmental Systems -Evolutionary Rewriting Systems –Developmental Programs and Processes

IMMUNE SYSTEMS AND COLLECTIVE SYSTEMS Natural Immune systems - Classical View -Working -Constituents of Biological Immune Systems - Immunity Types - Learning the Antigen Structure - The Network Theory - The Danger Theory –Artificial Immune Systems - Algorithms - Classical View Models - Clonal Selection Theory Models – Network Theory Models - Danger Theory Models - Applications and Other AIS models Applications- Biological Self-Organization - Particle Swarm Optimization - Basics - Social Network Structures – Variations - Basic PSO Parameters - Optimization - Applications. Ant Colony Optimization – Cemetery Organization and Brood Care - Division of Labor –Applications

BEHAVIORAL SYSTEMS Behavioral Systems - Behavior in Cognitive Science - Behavior in Artificial Intelligence – Behavioral Systems – Behavior Based Robots –Evolution - Co-evolution - Learning and Self Reproduction of Behavioral Systems. Cultural Algorithms - Culture and Artificial Culture - Cultural Algorithm – Belief Space – Fuzzy Cultural Algorithms – Applications. Co-evolution – Types - Competitive and Cooperative Co-evolution.

REFERENCES1. Claudio Mattiussi, Dario Floreano "Bio-Inspired Artificial Intelligence: Theories,

Methods, and Technologies” (Intelligent Robotics and Autonomous Agents series), MIT Press, 2008

2. Andries P. Engelbrecht, “Computational Intelligence: An Introduction”, 2nd Edition , Wiley; 2007

3. Russell C. Eberhart, Yuhui Shi Computational Intelligence: Concepts to Implementations, Morgan Kaufmann; 1 edition 2007

KALASALINGAM UNIVERSITY

M.Tech Computer Science & Engineering Regulations-2014

CSE6002 NANO COMPUTINGL T P C

3 0 0 3

DEVICESOverview of current research in nano-scale electronics and devices, Semiconductor and Device 1(Materials and building blocks),Semiconductor and Device 2(Photonic Device andMaterials),CMOS Device ,Limit of CMOS technology-Scaling Theory

QUANTUM CONCEPTS

KALASALINGAM UNIVERSITY

M.Tech Computer Science & Engineering Regulations-2014

Nano-Physics-Quantum Mechanics, Quantum Device 1-Length Scales/Transport, Quantum Device 2-Ballistic Electron Transport, Coulomb Blockade, RTD, Electron-Wave Coupling Devices

FUNDAMENTALS OF CHEMISTRY

Fundamental of chemistry, Organic Chemistry, Molecular Electronics I,(Molecular Semiconductors and Metals),Molecular Electronics II(Logic Gates),Carbon Nano tube and Its Application, Spintronics I, Spintronics II

QUANTUM COMPUTATIONQuantum Computation I ,Quantum Computation II,DNA Computation, Nano-Fabrication 1,-photolithography, Nano- Fabrication 2,: e-beam lithography,: Advanced Nano-lithography

NANO CONCEPTSNano-Fabrication 3,: Thin Film Technology:-- MBE, CVD, PECVD, - LB and Self Assembly, Spun-Coating - Nano- Characterization 1 - Scanning Probe Microscopy – Electron Microscopy (TEM, SEM),Nano-Characterization 2 – Photon Spectroscopy - Electron Spectroscopy - Nanomanipulator

TEXT BOOK

1. Rainer Waser , Nanoelectronics and Information Technology: Advanced Electronic Materials and Novel Devices, Wiley- VCH, April 2003.

REFERENCES1. Sandeep Shukla and R. Iris Bahar, et al, Nano, Quantum and Molecular Computing,

Kluwer Academic Publishers, 2004.2. Poole Jr C.P.., Owens F.J. , Introduction to Nanotechnology, Wiley, 2003.3. Petty M.C., Bryce , and D. Bloor ,Introduction to Molecular Electronics, Edward Arnold ,

1995.

CSE6003 NETWORK ON CHIPL T P C

3 0 0 3

ICN ARCHITECTURES

KALASALINGAM UNIVERSITY

M.Tech Computer Science & Engineering Regulations-2014

Introduction - Classification of ICNs - Topologies - Direct networks - Indirect networks-Performance analysis.

SWITCHING TECHNIQUES Basic switching techniques - Virtual channels - Hybrid switching techniques Optimizing switching techniques - Comparison of switching techniques - Deadlock, livelock and Starvation.

ROUTING ALGORITHMS Taxonomy of routing algorithms - Deterministic routing algorithms - Partially adaptive algorithms - Fully adaptive algorithms - Routing in MINs - Routing in switch-based networks with irregular topologies - Resource allocation policies- Flow control.

NETWORK-ON-CHIP NoC Architectures - Router architecture - Area, energy and reliability constraints - NoC design lternatives - Quality-of Service (QoS) issues in NoC architectures

EMERGING TRENDS Fault-tolerance issues - Emerging on-chip interconnection technologies- 3D NoC- Simulation.

REFERENCES1. J. Duato, S. Yalamanchili, and Lionel Ni, "Interconnection Networks: An Engineering

Approach", Morgan Kaufmann Publishers 2004.2. William James Dally and Brian Towles, "Principles and Practices of Interconnection

Networks", ISBN: 0122007514, Morgan Kaufmann, 2003.3. Giovanni De Micheli and Luca Benini, "Networks on Chips: Technology and Tools",

ISBN:0123705215, Morgan Kaufmann, 20064. Natalie Enright Jerger and Li-Shiuan Peh, “On-ChipNetworks”, Synthesis lectures on

computer architecture #8, Morgan and Claypool Publishers 2009.5. Fayez Gebali, Haytham Elmiligi, Mohamed Wathed and El-Kharashi “Networks-on-

Chips: Theory and Practice”, CRC Press, Taylor and Francis

CSE6101 NETWORK FORENSICSL T P C

3 0 0 3

KALASALINGAM UNIVERSITY

M.Tech Computer Science & Engineering Regulations-2014

INTRODUCTION

Practical Investigative Strategies – Real World Class – Footprints – Concepts in Digital Evidence – Challenges relating to Network Evidence – Network Forensics Investigative Methodology – Technical Fundamentals – Sources of Network Based Evidences – Evidence Acquisition – Physical Interception – Traffic Acquisition Software – Active Acquisition.

TRAFFIC ANALYSIS

Packet Analysis – Protocol Analysis - Flow Analysis – Higher – Layer Traffic Analysis – Case Study – Statistical Flow Analysis – Sensors – Flow Record Export Protocol – Collection and Aggregation – Analysis – Case Study

WIRELESS NETWORK FORENSICS AND IDS

Wireless Access Points – Wireless Traffic Capture and Analysis – Common Attacks – Locating Wireless Devices – Case Study – Network Intrusion Detection and Analysis – Types of NIDS/NIPS – NIDS/NIPS Evidence Acquisition – Comprehensive Packet logging – Snort – Case Study

NETWORK DEVICES AND SERVERS

Event Log Aggregation, Correlation and Analysis – Sources of Logs – Network Log Architecture – Collecting and Analysing Evidences – Case Study – Switches , Routers and Firewalls – Interfaces – Logging – Case Study - Web Proxies – Web Proxy Functionality – Evidence- Squid – Web Proxy Analysis – Encrypted Web Traffic - Case Study

ADVANCED TOPICS

Network Tunneling – Tunneling for Functionality - Tunneling for Confidentiality - Covert Tunneling – Case Study – Malware Forensics – Trends in Malware Evolution – Network Behavior of Malware – The future of Malware and Network Forensics – Case Study

REFERENCES

1. Sheri Davidoff and Jonathan Han, Network Forensics – Tracking Hackers through Cyberspace, Prentics Hall, 2012.

2. William J Buchanan, Introduction to Security and Network Forensics, CRC Press, 2011.3. Kevin Mandia, Chris Prosise, Incident Response and computer forensics, Tata

McGrawHill, 2006.4. Bill Nelson, Amelia Philips and Christopher Steuart, Guide to computer forensics and

investigations, course technology, Cengage Learning; 4thedition, ISBN: 1-435-49883-6, 2009.

KALASALINGAM UNIVERSITY

M.Tech Computer Science & Engineering Regulations-2014

CSE6102 SOCIAL NETWORK ANALYSISL T P C

3 0 0 3

INTRODUCTION TO SOCIAL NETWORK ANALYSIS 8Introduction to Web - Limitations of current Web – Development of Semantic Web – Emergence of the Social Web - Network analysis - Development of Social Network Analysis - Key concepts and measures in network analysis - Electronic sources for network analysis - Electronic discussion networks, Blogs and online communities, Web-based networks - Applications of Social Network Analysis.

MODELLING, AGGREGATING AND KNOWLEDGE REPRESENTATION 8Ontology and their role in the Semantic Web - Ontology-based Knowledge Representation – Ontology languages for the Semantic Web – RDF and OWL - Modelling and aggregating social network data - State-of-the-art in network data representation, Ontological representation of social individuals, Ontological representation of social relationships, Aggregating and reasoning with social network data, Advanced Representations.

EXTRACTION AND MINING COMMUNITITES IN WEB SOCIAL NETWROKS 10Extracting evolution of Web Community from a Series of Web Archive - Detecting Communities in Social Networks - Definition of Community - Evaluating Communities - Methods for Community Detection & Mining - Applications of Community Mining Algorithms - Tools for Detecting Communitie Social Network Infrastructures and Communities - Decentralized Online Social Networks- Multi- Relational Characterization of Dynamic Social Network Communities.

PREDICTING HUMAN BEHAVIOR AND PRIVACY ISSUES 10Understanding and Predicting Human Behaviour for Social Communities - User Data Management, Inference and Distribution - Enabling New Human Experiences - Reality Mining - Context-Awareness - Privacy in Online Social Networks - Trust in Online Environment - Trust Models Based on Subjective Logic - Trust Network Analysis - Trust Transitivity Analysis - Combining Trust and Reputation – Trust Derivation Based on Trust Comparisons - Attack Spectrum and Countermeasures.

VISUALIZATION AND APPLICATIONS OF SOCIAL NETWORKS 8Graph Theory- Centrality- Clustering - Node-Edge Diagrams, Matrix representation, Visualizing Online Social Networks, Visualizing Social Networks with Matrix-Based Representations- Matrix + Node-Link Diagrams, Hybrid Representations - Applications - Covert Networks - Community Welfare - Collaboration Networks - Co-Citation Networks.

REFERENCES

1. Peter Mika, “Social networks and the Semantic Web”, Springer, 1st edition 2007.2. Borko Furht, “Handbook of Social Network Technologies and Applications”,

Springer,1st edition, 2010.

KALASALINGAM UNIVERSITY

M.Tech Computer Science & Engineering Regulations-2014

3. Guandong Xu , Yanchun Zhang and Lin Li, “Web Mining and Social NetworkingTechniques and applications”, Springer, 1st edition, 2011.

4. Dion Goh and Schubert Foo, “Social information retrieval systems: emerging technologies and applications for searching the Web effectively”, IGI Global snippet, 2008.

5. Max Chevalier, Christine Julien and Chantal Soulé-Dupuy, “Collaborative and social information retrieval and access: techniques for improved user modelling”, IGI Global snippet, 2009.

6. John G. Breslin, Alexandre Passant and Stefan Decker, “The Social Semantic Web”, Springer, 2009.

KALASALINGAM UNIVERSITY

M.Tech Computer Science & Engineering Regulations-2014

CSE6105 SOFTWARE DEFINED NETWORKING L T P C

3 0 0 3

INTRODUCTION

Introduction – Centralised and Distributed Control and Data Planes – Evolution versus Revolution – The Control Plane – Data Plane – Moving Information between Planes – Distributed Control Planes – IP and MPLS – Creating IP Underlay – Convergence Time – Load Balancing – High availability – creating the MPLS overlay – Replication – Centralised Control Planes – ATM/LANE – Route Servers

SDN CONTROLLERS

Introduction – General Concepts – Layer 3 Centric – Plexxi – Cisco OnePK – Network Programmability – The Management Interface – The Application – Network Divide – The Command line Interface – NETCONF and NETMOD- SNMP- Modern Programmatic Interfaces- I2RS – Modern Orchestration – OpenStack- CloudStack- Puppet.

NETWORK FUNCTION VIRTUALISATION

The Multitenant Data Centre – The virtualized Multitenant Data Centre – SDN Solutions for the Data Centre Network – VLANs- EVPN – VxLAN – NVGRE – Network Function Virtualisations – Virtualisation snd Data Plane I/O – Services Engineered Path – Service Locations and Chaining – NFV at ETSI – Non- ETSI NFV Work

USE CASES

Use cases for Bandwidth Scheduling, Manipulation, and Calendaring – Bandwidth Calendaring – Big Date and Application Hyper – Virtualisation for Instant CSPF- Use cases for Data Centre Overlays, Big data, and Network Function Virtualisation – Use case for Input Traffic Monitoring, Classification, and Triggered Actions.

OPENFLOW

Introduction to OpenFlow – Building Blocks – OpenFlow Messages – Northbound Interface- Implementing OpenFlow Switch – OpenFlow Reference Switch – Hardware Implementations – Software based Switches – Openflow in Cloud Computing.

REFERENCES :

1. Thomas D.Nadeau and Ken Gray, Software Defined Networks, O’reilly, 2013

KALASALINGAM UNIVERSITY

M.Tech Computer Science & Engineering Regulations-2014

2. Siamak Azodolmolky, Software Defined Networking with OpenFlow, PACKT Publishing, 2013

3. Rajesh Kumar Sundarrajan, Software Defined Networking(SDN)- a definitive guide, e-book, March 2014.

CSE6108 GREEN COMPUTINGL T P C

3 0 0 3

FUNDAMENTALS

Green IT Fundamentals: Business, IT, and the Environment – Green computing: carbon foot print, scoop on power – Green IT Strategies: Drivers, Dimensions, and Goals – Environmentally Responsible Business: Policies, Practices, and Metrics.

GREEN ASSETS AND MODELING

Green Assets: Buildings, Data Centers, Networks, and Devices - Green Business Process Management: Modeling, Optimization, and Collaboration – Green Enterprise Architecture – Environmental Intelligence Green Supply Chains – Green Information Systems: Design and Development Models.

GRID FRAMEWORK

Virtualizing of IT systems – Role of electric utilities, Telecommuting, teleconferencing and teleporting –Materials recycling –Best ways for Green PC –Green Data center –Green Grid framework.

GREEN COMPLIANCE

Socio-cultural aspects of Green IT –Green Enterprise Transformation Roadmap –Green Compliance: Protocols, Standards, and Audits –Emergent Carbon Issues: Technologies and Future.

CASE STUDIES

The Environmentally Responsible Business Strategies (ERBS) –Case Study Scenarios for Trial Runs –CASE STUDIES –Applying Green IT Strategies and Applications to a Home, Hospital, Packaging Industry and Telecom Sector.

TEXT BOOKS:

1. Bhuvan Unhelkar, Green IT Strategies andApplications-Using Environmental Intelligence, CRC Press, June 2011

2. Woody Leonhard, Katherrine Murray, Green Home computing for dummies, August 2009.

KALASALINGAM UNIVERSITY

M.Tech Computer Science & Engineering Regulations-2014

REFERENCES:

1. Alin Gales, Michael Schaefer, Mike Ebbers, Green Data Center: steps for the Journey, Shoff/IBM rebook, 2011.

2. John Lamb, The Greening of IT, Pearson Education,2009.3. Jason Harris, Green Computing and Green IT-Best Practices on regulations & industry,

Lulu.com, 2008.4. Carl Speshocky, Empowering Green Initiatives with IT, John Wiley & Sons, 2010.5. Wu Chun Feng (editor), Green computing: Large Scale energy efficiency, CRC Press,

2012

CSE6110 MEDICAL IMAGING AND RADIO THERAPY L T P C

3 0 0 3

UNIT I X – RAYSPrinciple and production of soft X – Rays, Selection of anodes, heel pattern, Scattered Radiation, Porter-Bucky systems, Cooling System, Testing for various parameters of the unit, principles of Angiography and Fluoroscopic Techniques, Image Intensifiers, Single plane and bi plane recording units, digital subtraction angiography, mammography, dental X- ray units.

UNIT II TOMOGRAPHYPrinciple, Plane of Movement, Multisection Radiography, Computerized Axial Tomography, Type of Detection, image reconstruction, Spiral CT, Transverse Tomography,3D Imaging.

UNIT III EMISSION IMAGINGAlpha, Beta, Gamma Emission, different types of Radiation Detectors, G.M. & Proportional Counters, Pulse Height Analyzers, Isotopic, Scanners, Isotopic Diagnosis of RBC Destruction Rate, GI Bleedings Iron Concentration, Liver Functions, Functions of Gamma Camera, PET,SPECT,PET/CT.

UNIT IV MAGNETIC RESONANCE IMAGINGPrinciple of MRI, MRI instrumentation, Imaging Different Sections of the Body, Tissue Characterization, MR Spectroscopy, Functional MRI.

UNIT V THERAPY USING X – RAYS AND ISOTOPESDirect and Indirect effects of high energy radiation, Units for radiation Exposure, Depth Dose curves, Linear Accelerator Betatron, Cobalt and Cesium Therapy, Computation of Absorbed Dose Level, Automatic Treatment Planning, Hazardous Effects of Radiation, Radiation measuring units, Allowed Levels, ICRP regulation Protection Methods.

REFERENCES:1. Chesney D.N~ and Chesney M.O., X-Ray Equipments for Students Radiographer, Blackwell Scientific Publications, Oxford, 19712. Alexander, Kalender and Linke, Computer Tomography, John Wiley, Chich~ster, 1986.

KALASALINGAM UNIVERSITY

M.Tech Computer Science & Engineering Regulations-2014

3. Steve Webb, The Physics of Medical Imaging, Adam Hilger, Philadelpia,1988.4. Peggy. W, Roger.D.Ferimarch, MRI for Technologists, Mc Graw Hill Publications, New York, 1995.5. Donald Graham, Paul Cloke, Martin Vosper -Principles of Radiological physics, Churchill Livingston, 5thEdition 20056. Donald W.McRobbice, Elizabeth A.Moore, Martin J.Grave and Martin R.Prince MRI from picture to proton ,Cambridge University press, New York 2006. 7.Jerry L.Prince and Jnathan M.Links,” Medical Imaging Signals and Systems”- Pearson Education Inc. 2006

KALASALINGAM UNIVERSITY