Theory of Computation

Topics: Software testing, Software engineering, Automata theory Pages: 7 (1819 words) Published: February 6, 2013
IT-601: THEORY OF COMPUTATION Teaching Scheme Lect 3 Prac 2 Total 5 Int Ass 30 Theory Sem End Marks Hrs 70 3 Examination Scheme Practical Sem Total Int Ass End 100 25 25

Total 50

Grand Total 150

Review Of Mathematical Background: Sets, Functions, Logical statements, Proofs, Relations, Languages, The Principal of Mathematical induction, the strong principle of Mathematical induction, Recursive definitions, Structural Induction. Regular Languages And Finite Automata: Regular expressions, Regular languages, Memory required to recognize a language , Finite automata, Distinguishable strings, Union, intersection and complement of regular languages. Nondeterminism And Kleen’s Theorem: Non-deterministic finite automata, Non deterministic finite automata with ^ transitions, Kleen's theorem. Regular And Non Regular Language: Minimization of Finite automata, Non-regular and regular languages, Pumping Lemma, Decision problems and decision algorithms, Regular languages in relation to programming languages. Context-Free Languages And Push-Down Automata: Context-free languages, Regular Grammars , Derivation tree and ambiguity, An Unambiguous CFG , Simplified and Normal forms, Chomsky normal form. Pushdown Automata And CFL: Push-Down Automata, Definition and examples, Deterministic PDA, Types of acceptances and their equivalence, Equivalence of CFG and PDA, Introduction to parsing, Top-down and bottomup parsing, Non-CFL and CFL, Pumping Lemma for CFL, Intersection and Complement of CFL. Turing Machine: Models of computation, TM definition, Combining TMs, Computing a function with TMs. Variations on Turing Machines, Doubly infinite and more than one Tapes, Non-deterministic and Universal TM Reference Books: 1. Introduction to Languages and Theory of Computation By John C. Martin , McGraw-Hill 1991. 2. Computation : Finite and Infinite By Marvin L. Minsky, Prentice-Hall, 1967 3. Introduction to formal languages By G. E. Reevsz, Mc-graw hill. 4. Formal language theory By M. H. Harrison

IT602: NETWORK PROTOCOLS & PROGRAMMING Teaching Scheme Lect 3 Prac 2 Total 5 Int Ass 30 Theory Sem End Marks Hrs 70 3 Examination Scheme Practical Sem Total Int Ass End 100 25 25

Total 50

Grand Total 150

Introduction: The OSI Model and the TCP/IP Protocol Suite, Underlying Technologies. IP Addresses: Classful Addressing , Classless Addressing , Delivery, Forwarding, and Routing of IP Packets, ARP and RARP , Internet Protocol (IP) , Internet Control Message Protocol (ICMP) , Internet Group Management Protocol (IGMP) , User Datagram Protocol (UDP) ,Transmission Control Protocol (TCP) , Stream Control Transmission Protocol (SCTP) , Unicast Routing Protocols : RIP, OSPF, and BGP Multicasting And Multicast Routing Protocols , Host Configuration: BOOTP and DHCP Domain Name System (DNS) Remote Login: TELNET File Transfer: FTP and TFTP Electronic Mail: SMTP, POP, and IMAP Network Management: SNMP World Wide Web : HTTP Reference Book: 1. TCP/IP Protocol Suite, 3/e BY Behrouz Forouzan, Tata-mc-graw hill. 2. TCP/IP Illustrated, Volume 1 By W. Richard Stevens, Low Price Edition

IT-603: INFORMATION SYSTEM SECURITY Teaching Scheme Lect 3 Prac 2 Total 5 Int Ass 30 Theory Sem End Marks Hrs 70 3 Examination Scheme Practical Sem Total Int Ass End 100 25 25

Total 50

Grand Total 150

Physical Protection Methods And Damage Avoidance Plans: Protection from natural disasters like fire, flood, heat, power loss, electrostatic discharge, electromagnetic, lightening etc. Detection and recovery/protection methods. Various backup methods for data. Protection From Intruders: Theft prevention by fences, multiple barriers, walls, mechanical and electronic locks, guards, lights etc. Various intruder detection methods. Hardware Access Control: Passwords, Magnetic Stripe Cards, Smart Cards, Biometric Access Controls. Attacks On Software And Access Controls: Threats like Trojan horse, Time Bombs, Logic Bombs, Viruses, Worms, Trapdoors, Salami Attack, and Software...
Continue Reading

Please join StudyMode to read the full document

You May Also Find These Documents Helpful

  • Theories Essay
  • Theories Essay
  • Accounting Theory Research Paper
  • Essay on Understanding Theories
  • Colony Theory Research Paper
  • Counselling Theories Essay
  • Essay on Grand Theories
  • Essay on nursing theory

Become a StudyMode Member

Sign Up - It's Free