Follow us on facebook

Ebooks

Computer system Architecture and Organisation

Chap. 1 Digital Logic Circuits
􀁺 The fundamental knowledge needed for the design of digital systems constructed with individual
gates and flip-flops.
􀂋 Chap. 2 Digital Components
􀁺 The logical operation of the most common standard digital components(Decoders, Multiplexers,
Registers, Counters, and Memories).
􀁺 These digital components are used as building blocks for the design of larger units(Mano
Machine).
􀂋 Chap. 3 Data Representation
􀁺 Various data types found in digital computers are represented in binary form in computer
registers.
􀂋 Chap. 4 Register Transfer and Microoperations
􀁺 A register transfer language is used to express microoperations in symbolic form.
􀁺 Symbols are defined for arithmetic, logic, and shift microoperations.
􀁺 To show the hardware design of the most common microoperations, a composite arithmetic logic
shift unit is developed.
􀂋 Chap. 5 Basic Computer Organization and Design
􀁺 The organization and design of a basic digital computer(Mano Machine).
􀁺 Register transfer language is used to describe the internal operation of the computer.
􀁺 By going through the detailed steps of the design presented in this chapter, the student will be
able to understand the inner workings of digital computers.

Download LInk

_______________________________________________________________

Automata

I have prepared a course in automata theory (finite automata, context-free grammars, decidability, and intractability.
Regular Languages
  • Finite Automata
  • Regular Expressions and Sets
  • Closure Properties
  • Pumping Lemma
  • Myhill-Nerode Theorem and Minimizing DFAs
  • Decision Algorithms
Context-Free Language
  • Context-Free Grammars
  • Push-down Automata
  • Normal Forms for Grammars
  • Closure Properties
  • Decision Algorithms
  • Pumping Lemma, Ogden's Lemma
Turing Machines
  • Turing Machine Specifications
  • Recursive and Recursively Enumerable Languages
  • Universal Machines
  • Undecidable Languages and Problems
  • Rice's Theorem
Complexity
  • Polynomial time and space
  • Complete problems
  • Intractability

Download Link

_______________________________________________________________

Unified Markup Language

Object Oriented Modeling and Design usung UML INTRODUCTION • An overview - Object basics - Object state and properties, Behavior, Methods, Messages. • Object Oriented system development life cycle. • Benefits of OO Methodology.
1.Introduction of Software Architecture
2.Identifying the Types of UML Diagrams
3.The System Modeling
4.Setting Boundaries and Project Scope
5.Creating Interaction Diagrams
6.Creating State Machine Diagrams
7.Creating Activity Diagrams
8.Introducing Architecture Modeling
9.Architecture Modeling of Bank ATM System
10.Administrative Report

Download Link

_______________________________________________________________

Software Engineering

Software Engineering Syllabus
2. Internal Assessment- 40 Marks External Assessment-60 Marks Instructions for paper setter The question paper will consist of two sections A and B. Sections B will have Six questions and will carry 10 marks each. Section A will have 10 short answer type questions, which will cover the entire syllabus uniformly and will carry 20 marks in all.   Instructions for Candidates Candidates are required to attempt four questions from section B and the entire section A. Use of nonprogrammable scientific calculator is allowed
3. Software: Characteristics, Components Applications, Software Process Models: Waterfall, Spiral, Prototyping, Fourth Generation Techniques, Concepts Of Project Management, Role Of Metrics And Measurement.   S/W Project Planning: Objectives, Decomposition Techniques: S/W Sizing, Problem Based Estimation, Process Based Estimation, Cost Estimation Models: COCOMO Model, The S/W Equation, System Analysis: Principles Of Structured Analysis, Requirement Analysis, DFD, Entity Relationship Diagram, Data Dictionary.  
4. S/W Design: Objectives, Principles, Concepts, Design Mythologies: Data Design, Architecture Design, Procedural Design, Object – Oriented Concepts.   Testing Fundamentals: Objectives, Principles, Testability, Test Cases: White Box & black box Testing, Testing Strategies: Verification & Validation, Unit Test, Integration Testing, Validation Testing, System Testing.

Download Link

_______________________________________________________________

Data Communication

UNIT I: I

Introduction: Data Communications, Networks, The Internet, Protocols and Standards, Network Models, Layered Tasks, The OSI Model, Layers in the OSI Model, TCP/IP Protocol Suite, Addressing, Physical Layer and Media, Data and Signals, Analog and Digital, Periodic Analog Signals, Digital Signals, Transmission impairment, Data Rate Limits, Performance, Digital Transmission, Digital-to-Digital Conversion, Analog-to-Digital Conversion, Analog Transmission, Digital-to-analog Conversion, Analog-to-analog Conversion

UNIT II: II

Bandwidth utilization: Multiplexing and Spreading, Multiplexing, Spread Spectrum, Transmission Media, Guided Media, Unguided Media: Wireless, Switching, Circuit-Switched Networks, Datagram Networks, Virtual-Circuit Networks, Structure of a Switch, Using Telephone and Cable Networks for Data Transmission, Telephone Networks, Dial-up Modems, Digital Subscriber Line, Cable TV Networks, Cable TV for Data Transfer

UNIT III: III

Error Detection and Correction, Introduction, Block Coding, Liner Block Codes, Cyclic Codes, Checksum, Data Link Control, Framing, Flow and Error Control, Protocols, Noiseless Channels, HDLC, Point-to-Point Protocol, Multiple Access, Random Access, Aloha, Controlled Access, Channelization, IEEE Standards, Standard Ethernet, Changes in the Standard, Fast Ethernet, Gigabit Ethernet, IEEE 802.11, Bluetooth

UNIT IV: IV

Connecting LANs, Backbone Networks, and Virtual LANs, Connecting Devices, Backbone Networks, Virtual LANs, Cellular Telephony, Satellite Networks, Sonet/SDH, Architecture, Sonet Layers, Sonet Frames, STS Multiplexing, Sonet Networks, Virtual Tributaries, Virtual-Circuit Networks: Frame Relay and ATM, Frame Relay, ATM, ATM LANs

UNIT V: V

Network Layer: Logical Addressing, IPv4 Addresses, IPv6 Addresses, Network Layer: Internet Protocol, Internetworking, IPv4, IPv6, Transition from IPv4 to IPv6, Network Layer: Adress Mapping, Error Reporting and Multicasting, Address Mapping, ICMP, IGMP, ICMPv6, Network Layer: Delivery, Forwarding and Routing, Delivery, Forwarding, Unicast Routing Protocols, Multicast Routing Protocols

UNIT VI: VI

Transport Layer: Process-Process Delivery: UDP, TCP and SCTP, Process-to-Process Delivery, User Datagram Protocol (UDP), TCP, SCTP, Congestion Control and Quality of Service, Data Traffic, Congestion, Congestion Control, Two Examples, Quality Service, Techniques to improve QoS, Integrated Services, Differentiated Services, QoS in Switched Networks

UNIT VII: VII

Application Layer: Domain Name System, Name Space, Domain Name Space, Distribution of Name Space, DNS in the Internet, Resolution, DNS Messages, Types of Records, Registrars, Dynamic Domain Name System (DDNS), Encapsulation, Rmote Logging, Electronic Mail and File Transfer, Remote Logging, Telnet, Electronic Mail, File Transfer

UNIT VIII: VIII

WWW and HTTP: Architecture, Web Documents, HTTP, Network Management: SNMP, Network Management System, Simple Network Management Protocol (SNMP), Multimedia, Digitizing Audio and Video, Audio and Video Compression, Streaming Stored Audio/Video, Streaming Live Audio/Video, Real-Time Interactive Audio/Video, RTP, RTCP, Voice over IP

Download Link

_______________________________________________________________

Computer Graphics

UNIT I 2D PRIMITIVES 9

Output primitives – Line, Circle and Ellipse drawing algorithms – Attributes of output
primitives – Two dimensional Geometric transformation – Two dimensional viewing –Line, Polygon, Curve and Text clipping algorithms.

UNIT II 3D CONCEPTS 9

Parallel and Perspective projections – Three dimensional object representation –
Polygons, Curved lines, Splines, Quadric Surfaces,- Visualization of data sets – 3D
transformations – Viewing -Visible surface identification.

UNIT III GRAPHICS PROGRAMMING 9

Color Models – RGB, YIQ, CMY, HSV – Animations – General Computer Animation, Raster, Keyframe – Graphics programming using OPENGL – Basic graphics primitives – Drawing three dimensional objects – Drawing three dimensional scenes

UNIT IV RENDERING 9

Introduction to Shading models – Flat and Smooth shading – Adding texture to faces –Adding shadows of objects – Building a camera in a program – Creating shaded objects – Rendering texture – Drawing Shadows.

UNIT V FRACTALS 9

Fractals and Self similarity – Peano curves – Creating image by iterated functions –
Mandelbrot sets – Julia Sets – Random Fractals – Overview of Ray Tracing –
Intersecting rays with other primitives – Adding Surface texture – Reflections and
Transparency – Boolean operations on Objects

Download Link

_______________________________________________________________

INTORDUCTION TO COMPUTER

Fundamentals of Computer: 1. Introduction 2. Input / Output & Processing (CPU) 3. Memory Device 4. Types of computers 5. Characteristics of Computer 6. History & Generation 7. Applications of Computer

B) Windows XP Overview:

1. Some Basic Terminology & Typing Skills

2. Desktop Settings & Control Panel

3. Ms. DOS

4. Ms. Paint

5. WordPad

6. Accessories & Multimedia

C) E-mail & Internet: 1. Introduction 2. E-mail Account & Its Functions 3. Search Engine 4. Surfing WebPages 5. Basics of Social Networking Site

D) Virus:

1. General Introduction

& Antivirus Utilities

E) Application Software: 1. Microsoft Word 2. Microsoft PowerPoint 3. Microsoft Excel

F) More: (#Practically Performed activities)

 Widows Seven Overview

 Burning CD/DVD

 Basics of Audio/Video editing

 Fundamentals of Hardware & Networking

 Formatting Hard disk

 Installing Windows

 DOwnload Link

____________________________________________

Windows.Vista.Secrets


Download Link  

____________________________________________________

 C++Tutorials

  • Introduction to compiling and software development
  • Basic scalar data types, operators, flow control, streamed input/output, conversions
  • Declaring, defining and invoking functions
  • Strings processing, exceptions handling, dealing with namespaces
  • Object-oriented approach and its vocabulary
  • Dealing with classes and objects
  • Defining overloaded operators
  • Introduction to STL

Chapters:
Absolute basics
  • machine and  high-level programming languages, compilation process
  • obtaining the machine code: compilation process
  • recommended readings
  • your first program
  • variable – why?
  • integers:  values, literals, operators
  • characters: values, literals, operators
  • dealing with streams and basic input/output operations
Flow control and more data types
  • how to control the flow of the program?
  • floating point types: values, literals, operators
  • more integral types: values and literals
  • loops and controlling the loop execution
  • logic, bitwise and arithmetic operators
Functions
  • functions: why do you need them?
  • declaring and invoking functions
  • side effects
  • different methods of passing parameters and their purpose
  • default parameters
  • inline functions
  • overloaded functions
Accessing data and dealing with exceptions
  • converting values of different types
  • strings: declarations, initializations, assignments
  • string as the example of an object: introducing methods and properties
  • namespaces: using and declaring
  • exception handling
Fundamentals of the object-oriented approach
  • class: what does it actually mean?
  • where do the objects come from?
  • class components
  • constructors
  • referring to objects
  • static members
  • classes and their friends
  • defining and overloading operators
Class hierarchy
  • base class, superclass, subclass
  • inheritance: how does it work?
  • types of inheritance
  • inheriting different class components
  • multiple inheritance
Classes – continued
  • polymorphism: the notion and the purpose
  • virtual methods: declaring and using
  • inheriting virtual methods
  • abstraction and abstract classes
Exceptions – dealing with expected and unexpected problems
  • what is an exception?
  • catching and throwing exceptions
  • different classes and hierarchy of exceptions
  • defining your own exceptions

Download Link 

____________________________________________________

 Database Admininstrator Bible

Introduction (Database Architecture)

  • Describe course objectives
  • Explore the Oracle 10g database architecture

Installing the Oracle Database Software

  • Explain core DBA tasks and tools
  • Plan an Oracle installation
  • Use optimal flexible architecture
  • Install software with the Oracle Universal Installer (OUI)

Creating an Oracle Database

  • Create a database with the Database Configuration Assistant (DBCA)
  • Create a database design template with the DBCA
  • Generate database creation scripts with the DBCA

Managing the Oracle Instance

  • Start and stop the Oracle database and components
  • Use Enterprise Manager (EM)
  • Access a database with SQL*Plus and iSQL*Plus
  • Modify database initialization parameters
  • Understand the stages of database startup
  • View the Alert log
  • Use the Data Dictionary

Managing Database Storage Structures

  • Describe table data storage (in blocks)
  • Define the purpose of tablespaces and data files
  • Understand and utilize Oracle Managed Files (OMF)
  • Create and manage tablespaces
  • Obtain tablespace information
  • Describe the main concepts and functionality of Automatic Storage Management (ASM)

Administering User Security

  • Create and manage database user accounts
  • Authenticate users
  • Assign default storage areas (tablespaces)
  • Grant and revoke privileges
  • Create and manage roles
  • Create and manage profiles
  • Implement standard password security features
  • Control resource usage by users

Managing Schema Objects

  • Define schema objects and data types
  • Create and modify tables
  • Define constraints
  • View the columns and contents of a table
  • Create indexes, views and sequences
  • Explain the use of temporary tables
  • Use the Data Dictionary
  • Manage data through SQL
  • Monitor and resolve locking conflicts

Managing Undo Data

  • Explain DML and undo data generation
  • Monitor and administer undo
  • Describe the difference between undo and redo data
  • Configure undo retention
  • Guarantee undo retention
  • Use the undo advisor

Implementing Oracle Database Security

  • Describe DBA responsibilities for security
  • Apply the principal of least privilege
  • Enable standard database auditing
  • Specify audit options
  • Review audit information
  • Maintain the audit trail

Oracle DBA Training Syllabus – Part 2

Configuring the Oracle Network Environment

  • Create additional listeners
  • Create Net Service aliases
  • Configure connect-time failover
  • Control the Oracle Net Listener
  • Test Oracle Net connectivity
  • Identify when to use shared versus dedicated servers

Backup and Recovery Concepts

  • Identify the types of failure that may occur in an Oracle Database
  • Describe ways to tune instance recovery
  • Identify the importance of checkpoints, redo log files, and archived log files
  • Configure ARCHIVELOG mode

Performing Database Backups

  • Create consistent database backups
  • Back your database up without shutting it down
  • Create incremental backups
  • Automate database backups
  • Monitor the flash recovery area

Performing Database Recovery

  • Recover from loss of a control file
  • Recover from loss of a redo log file
  • Perform complete recovery following the loss of a data file

Performing Flashback

  • Describe Flashback database
  • Restore the table content to a specific point in the past with Flashback Table
  • Recover from a dropped table
  • View the contents of the database as of any single point in time with Flashback Query
  • See versions of a row over time with Flashback Versions Query
  • View the transaction history of a row with Flashback Transaction Query

Moving Data

  • Describe available ways for moving data
  • Create and use directory objects
  • Use SQL*Loader to load data from a non-Oracle database (or user files)
  • Explain the general architecture of Data Pump
  • Use Data Pump Export and Import to move data between Oracle databases
  • Use external tables to move data via platform-independent files

Configuring Recovery Manager

  • Recovery Manager Features and Components
  • Using a Flash Recovery Area with RMAN
  • Configuring RMAN
  • Control File Autobackups
  • Retention Policies and Channel Allocation
  • Using Recovery Manager to connect to a target database in default NOCATALOG mode
  • Displaying the current RMAN configuration settings
  • Altering the backup retention policy for a database

Using Recovery Manager

  • RMAN Command Overview
  • Parallelization of Backup Sets
  • Compressed Backups
  • Image Copy
  • Whole Database and Incremental Backups
  • LIST and REPORT commands
  • Enable ARCHIVELOG mode for the database
  • Use Recovery Manager

Recovering from Non-critical Losses

  • Recovery of Non-Critical Files
  • Creating New Temporary Tablespace
  • Recreating Redo Log Files, Index Tablespaces, and Indexes
  • Read-Only Tablespace Recovery
  • Authentication Methods for Database Administrators
  • Loss of Password Authentication File
  • Creating a new temporary tablespace
  • Altering the default temporary tablespace for a database

Incomplete Recovery

  • Recovery Steps
  • Server and User Managed Recovery commands
  • Recovering a Control File Autobackup
  • Creating a New Control File
  • Incomplete Recovery Overview
  • Incomplete Recovery Best Practices
  • Simplified Recovery Through RESETLOGS
  • Point-in-time recovery using RMAN

Flashback

  • Flashback Database Architecture
  • Configuring and Monitoring Flashback Database
  • Backing Up the Flash Recovery Area
  • Using V$FLASH_RECOVERY_AREA_USAGE
  • Flashback Database Considerations
  • Using the Flashback Database RMAN interface
  • Using Flashback Database EM Interface
  • Managing and monitoring Flashback Database operations

Dealing with Database Corruption

  • Block Corruption Symptoms: ORA-1578
  • DBVERIFY Utility and the ANALYZE command
  • Initialization parameter DB_BLOCK_CHECKING
  • Segment Metadata Dump and Verification
  • Using Flashback for Logical Corruption and using DBMS_REPAIR
  • Block Media Recovery
  • RMAN BMR Interface
  • Dumping and Verifying Segment Metadata

Monitoring and Managing Storage I

  • Database Storage Structures
  • Space Management Overview
  • Oracle-Managed Files (OMF)
  • Row Chaining and Migrating
  • Proactive Tablespace Monitoring
  • Managing Resumable Space Allocation
  • SYSAUX Tablespace
  • Monitoring table and index space usage

Monitoring and Managing Storage II

  • Automatic Undo Management
  • Redo Log Files
  • Table Types
  • Partitioned Tables
  • Index-Organized Tables (IOT)
  • Managing index space with SQL
  • Configure optimal redo log file size
  • View “Automatic Tuning of Undo Retention”

VLDB Support

  • Creating Bigfile Tablespaces
  • Packages and data dictionary changes to support VLDB
  • Creating and maintaining temporary tablespace groups (TTG)
  • Partitioning and Partitioned Indexes
  • Skipping unusable indexes
  • DML Error Logging
  • Interpreting Bigfile ROWIDs

Automating Tasks with the Scheduler

  • Scheduler Concepts
  • Creating a Job Class and a Window
  • Managing Jobs, Programs, Chains, Events, Schedules, priority
  • Viewing and Purging Job Logs
  • Creating a program and a schedule
  • Creating a job that uses a program and a schedule
  • Altering the program and schedule for the job and observing the behavior change of the job
  • Monitoring job runs

Workshop

  • Workshop Methodology, requirements, and setup
  • Scenario 1: Database performance
  • Scenario 2: Finding and Tuning Inefficient SQL
  • Scenario 3: SGA Management – REDO
  • Scenario 4: Running out of Undo Space
  • Scenario 5: Missing datafile
  • Scenario 6: Managing space in a tablespace – REDO
  • Scenario 7: Missing TEMP data file

 Download link

  _____________________________________________________-

CSharp Ebook

Introduction to .NET:  What it is and why you'd want to use it.
Ch. 2C# Application Basics: Command line and VS.NET compilation.
Ch. 3  and 4C# Fundamentals: Basic classes, declarations, conditionals, loops, arrays, strings, enumerations, structures, and
Ch. 5 and 6 OOP in C#: Encapsulation, inheritance, polymorphism,
Ch. 7 and 8Exceptions and Object Lifetime: exceptions and the garbage collector.
Ch. 9 and 10Interfaces, generics and collections: How and why to use them 
Ch. 11Callback Interfaces, Delegates, and Events: basics of each -- very important for event driven (GUI) programming
Ch. 12Advanced C# Type Construction: Indexers, operator overload, conversions
Ch. 15.NET Assemblies: basic overview
Ch. 27Windows Forms: Basic windows programming: forms, component class, control class, control events, menus, status bars, tool bars, interacting with the registry
Ch. 27Drawing in Windows (GDI+): Paint sessions, the Graphics class, coordinate systems, color, fonts, hit testing.
Ch. 20Input, Output, and Serialization: System.IO, Directory and File Types, StreamReaders and StreamWriters, working with binary data, configuring objects for serialization
Ch. 21Object Serialization: basics
Ch. 13C# 3.5 features: Automatic properties, extension methods, partial methods, object initializers
Ch. 14LINQ
Ch 15, 16, 17Processes, AppDomains, Contexts, Threading, Type Reflection, Late Binding, Attribute-based programming: Advanced topics from the text will be discussed as time permits.  We can decide as a class on what to explore if we get to this point.

 Download Link

  __________________________________________________

Cryptography And Network Security  

UNIT - 1 : INTRODUCTION
OSI Security Architecture - Classical Encryption techniques - Cipher Principles - Data Encryption Standard - Block Cipher Design Principles and Modes of Operation - Evaluation criteria for AES - AES Cipher - Triple DES - Placement of Encryption Function - Traffic Confidentiality
UNIT - 2 : PUBLIC KEY CRYPTOGRAPHY
Key Management - Diffie-Hellman key Exchange - Elliptic Curve Architecture and Cryptography - Introduction to Number Theory - Confidentiality using Symmetric Encryption - Public Key Cryptography and RSA.
UNIT - 3 : AUTHENTICATION AND HASH FUNCTION
Authentication requirements - Authentication functions - Message Authentication Codes - Hash Functions - Security of Hash Functions and MACs - MD5 message Digest algorithm - Secure Hash Algorithm - RIPEMD - HMAC Digital Signatures - Authentication Protocols - Digital Signature Standard
UNIT - 4 : NETWORK SECURITY
Authentication Applications: Kerberos - X.509 Authentication Service - Electronic Mail Security - PGP - S/MIME - IP Security - Web Security.
UNIT - 5 : SYSTEM LEVEL SECURITY
Intrusion detection - password management - Viruses and related Threats - Virus Counter measures - Firewall Design Principles - Trusted Systems.

Download Link

___________________________________________________

 Sql begginer

 
The History of SQL Server and relational databases
  • Relational database history
  • The evolution of SQL Server
  • SQL Server and ANSI standards
Installing and configuring SQL Server
  • Pre-installation steps
  • Installing SQL Server
  • Configuring the run-time SQL Server system
  • Patching SQL Server - Service packs
SQL Server data storage management
  • SQL Server file management architecture
  • Creating database files
  • Creating SQL Server log files
  • Using SQL Server file groups
Managing data with the DTS utility
  • Using DTS to export and import SQL Server table data
SQL Server Security management
  • Windows security management for the server
  • Windows authentication mode
  • SQL Server rights and role management
SQL Server Backup & Recovery
  • Overview of SQL Server backup & recovery
  • Incremental backups
  • Restoring a SQL Server database
  • Standby database overview
  • Shipping SQL Server log files to standby databases
SQL Server database Replication
  • Microsoft replication architectures
  • Creating a replication topology
  • Configuring SQL Server replication
SQL Server Job scheduling
  • Common database scheduled jobs
  • Configuring SQLMail
  • Setting SQL Server and server alert thresholds
  • Creating customized error conditions
  • Scheduling multi-step job streams

 Download Link

  ______________________________________________

 Java-Complete Reference 

Introduction
Programming language Types and Paradigms.
Computer Programming Hierarchy.
How Computer Architecture Affects a Language ?
Why Java ?
Flavors of Java.
Java Designing Goal.
Role of Java Programmer in Industry.
Features of Java Language.
JVM –The heart of Java
Java’s Magic Bytecode
Language Fundamentals
The Java Environment:
Installing Java.
Java Program Development
Java Source File Structure
Compilation
Executions.
Basic Language Elements:
Lexical Tokens,Identifiers
Keywords,Literals, Comments
Primitive Datatypes,Operators
Assignments.
Object Oriented Programming
Class Fundamentals.
Object & Object reference.
Object Life time & Garbage Collection.
Creating and Operating Objects.
Constructor & initialization code block.
Access Control, Modifiers, methods
Nested , Inner Class &Anonymous Classes
Abstract Class & Interfaces
Defining Methods, Argument Passing Mechanism
Method Overloading, Recursion.
Dealing with Static Members. Finalize() Method.
Native Method. Use of “this “ reference.
Use of Modifiers with Classes & Methods.
Design of Accessors and Mutator Methods
Cloning Objects, shallow and deep cloning
Generic Class Types
Syllabus
3
Extending Classes and Inheritance
Use and Benefits of Inheritance in OOP
Types of Inheritance in Java
Inheriting Data Members and Methods
Role of Constructors in inheritance
Overriding Super Class Methods.
Use of “super”.
Polymorphism in inheritance.
Type Compatibility and Conversion
Implementing interfaces.
Package
Organizing Classes and Interfaces in Packages.
Package as Access Protection
Defining Package.
CLASSPATH Setting for Packages.
Making JAR Files for Library Packages
Import and Static Import
Naming Convention For Packages
Exception Handling:
The Idea behind Exception
Exceptions & Errors
Types of Exception
Control Flow In Exceptions
JVM reaction to Exceptions
Use of try, catch, finally, throw, throws in Exception Handling.
In-built and User Defined Exceptions
Checked and Un-Checked Exceptions
Array & String :
Defining an Array
Initializing & Accessing Array
Multi –Dimensional Array
Operation on String
Mutable & Immutable String
Using Collection Bases Loop for String
Tokenizing a String
Creating Strings using StringBuffer
Thread :
Understanding Threads
Needs of Multi-Threaded Programming.
Thread Life-Cycle
Thread Priorities
Synchronizing Threads
Inter Communication of Threads
Critical Factor in Thread -DeadLock
4
Applet
Applet & Application
Applet Architecture.
Parameters to Applet
Embedding Applets in Web page.
Applet Security Policies
A Collection of Useful Classes
Utility Methods for Arrays
Observable and Observer Objects
Date & Times
Using Scanner
Regular Expression
Input/Output Operation in Java(java.io Package)
Streams and the new I/O Capabilities
Understanding Streams
The Classes for Input and Output
The Standard Streams
Working with File Object
File I/O Basics
Reading and Writing to Files
Buffer and Buffer Management
Read/Write Operations with File Channel
Serializing Objects
GUI Programming
Designing Graphical User Interfaces in Java
Components and Containers
Basics of Components
Using Containers
Layout Managers
AWT Componets
Adding a Menu to Window
Extending GUI Features Using Swing Components
Java Utilities (java.util Package)
The Collection Framework :
Collections of Objects
Collection Types
Sets
Sequence
Map
Understanding Hashing
Use of ArrayList & Vector

  Download Link

______________________________________________

Let Us C "Basic of C Language"

Introduction to the C Language
The C Language and its Advantages
The Structure of a C Program
Writing C Programs
Building an Executable Version of a C Program
Debugging a C Program
Examining and Running a C Application Program
Data Types and Variables
Data Types
Operands, Operators, and Arithmetic Expressions
Input/Output Management
Input/Output Management
The getchar() and putchar() Functions and Single-character I/O
Formatted Input and the scanf() Function
Control-flow Statements
The Control-flow Program Statements
Looping Statements
The Data-checking Process
Modular Programming with Functions
The C Function
Passing Data to Functions
Passing an Address to Modify a Value in Memory
Using Functions in the Checkbook Program
The C Standard Library Functions
Arrays, Pointers, and Strings
Arrays
Pointers
Strings
Using Arrays, Strings, and Pointers in the Checkbook Program
Structures and Dynamic Memory Allocation
Structures
Arrays of Structures
Passing Structures to Functions
Nested Structures
Dynamic Memory Allocation
The Preprocessor and Multiple-file Compilation
The C Preprocessor and the #include and #define Directives
The Conditional Compilation Directives
Global Variables and Variable Storage Classes
Program Organization and Multi-file Compilation
File Input/Output
Command-line arguments
File Input and Output
Combining Command-line Arguments and File I/O

 Download Link

  ______________________________________________

Software Engineering  

INTRODUCTION: Definitions, Characteristics of Software - Software Engineering vs other engineering disciplines – Software Myths – Software Life Cycle Models – Selection of Software Process models.                                                   (8)
Requirement Analysis: Prototyping – Specification – Analysis modeling. (8)

Software Design: Software design – Abstraction – Modularity – Software architecture – Effective modular design – Cohesion and Coupling – Architectural design and procedural design – Data flow oriented design.                                  (8)
User Interface Design: User Interface design – Human factors – Human computer interaction – Human – Computer interface design – Interface design – Interface standards. Programming languages and coding – Language classes – Code documentation – Code efficiency – Software configuration management.                                                (6)

PROGRAMMING STANDARDS: Need for structured programming – Coding standards – Maintainability of programs.  (3)

Testing TECHNIQUES: Software testing – Path testing – Control structures testing – Black Box testing – Unit, Integration, Validation and system testing – Software Maintenance.                                                                                   (6)
TRENDS IN SOFTWARE ENGINEERING:  Reverse Engineering and Re-engineering – wrappers – Case Study of CASE tools. (3)

Download Link

______________________________________________

DISASTER MANAGEMENT

Module 1 – Introduction & Dimensions of Natural & Anthropogenic Disasters, Principles/Components of Disaster Management, Organisational Structure for Disaster Management, Disaster Management Schemes/SOPs, Natural Disasters and Mitigation Efforts, Flood Control, Drought Management, Cyclones, Avalanches, Mangroves, Land Use Planning, Inter-Linking of Rivers, Role of Union/States, Role of Armed Forces/Other Agencies in Disasters, Important Statutes/ Legal Provisions, IEDs/Bomb Threat Planning, NBC Threat and Safety Measures, Forest Fires, Oil Fires, Crisis in Power Sector, Accidents in Coal Mines, Terrorism and Emergency Management, Case Studies, Field Visits, Dissertation, Project Work.
Module 2 – Operations Management (OM), Risk Assessment and Disaster Response, Quantification Techniques, NGO Management, SWOT Analysis based on Design & Formulation Strategies, Insurance & Risk Management, Role of Financial Institutions in Mitigation Effort, Group Dynamics, Concept of Team Building, Motivation Theories and Applications, School Awareness and Safety Programmes, Psychological and Social Dimensions in Disasters, Trauma and Stress, Emotional Intelligence, Electronic Warning Systems, Recent Trends in Disaster Information Provider, Geo Informatics in Disaster Studies, Cyber Terrorism, Remote Sensing & GIS Technology, Laser Scanning Applications in Disaster Management, Statistical Seismology, Quick Reconstruction Technologies, Role of Media in Disasters, Management of Epidemics, Bio-Terrorism, Forecasting / Management of Casualties.

 Download Link

  ______________________________________________

Applied Java™ Patterns.


 Download Link

  ______________________________________________

AUTOMATA THEORY


 Download Link

 

 

0 comments:

Post a Comment