2017 Cse-Syllabus
2017 Cse-Syllabus
AFFILIATED INSTITUTIONS
B.E. COMPUTER SCIENCE AND ENGINEERING
REGULATIONS – 2017
CHOICE BASED CREDIT SYSTEM
2. Problem analysis: Identify, formulate, review research literature, and analyze complex
engineering problems reaching substantiated conclusions using first principles of
mathematics, natural sciences, and engineering sciences.
5. Modern tool usage: Create, select, and apply appropriate techniques, resources, and
modern engineering and IT tools including prediction and modeling to complex engineering
activities with an understanding of the limitations.
6. The engineer and society: Apply reasoning informed by the contextual knowledge to
assess societal, health, safety, legal and cultural issues and the consequent
responsibilities relevant to the professional engineering practice.
8. Ethics: Apply ethical principles and commit to professional ethics and responsibilities and
norms of the engineering practice.
1
11. Project management and finance: Demonstrate knowledge and understanding of the
engineering and management principles and apply these to one’s own work, as a member
and leader in a team, to manage projects and in multidisciplinary environments.
12. Life-long learning: Recognize the need for, and have the preparation and ability to
engage in independent and life-long learning in the broadest context of technological
change.
To apply software engineering principles and practices for developing quality software for scientific
and business applications.
To adapt to emerging Information and Communication Technologies (ICT) to innovate ideas and
solutions to existing/novel problems.
2
PEOs
3
7. Environment and sustainability:
Understand the impact of the professional
engineering solutions in societal and
environmental contexts, and demonstrate the 2 1
knowledge of, and need for sustainable
development.
PSOs
1. Analyze, design and develop computing solutions by applying foundational concepts of
3 1
computer science and engineering.
2. Apply software engineering principles and practices for developing quality software for
3 1
scientific and business applications.
3. Adapt to emerging information and communication technologies (ICT) to innovate ideas
1 3
and solutions to existing/novel problems.
4
MAPPING OF COURSE OUTCOMES WITH PROGRAMME OUTCOMES
A broad relation between the Course Outcomes and Programme Outcomes is given in the
following table
Problem Solving
and Python √ √ √
Programming
Engineering √ √ √ √ √ √ √
√
Graphics
Problem Solving √
and Python
√ √ √ √ √ √ √
Programming
Laboratory
Physics and √ √ √ √ √ √
Chemistry
Laboratory
Technical English √ √ √ √
Engineering √ √ √
√
Mathematics II
Physics for √ √ √
Information
Science
Basic Electrical, √ √ √
SEMESTER II
Electronics and
Measurement
Engineering
Environmental √ √ √ √
Science and √ √ √ √
Engineering
Programming in C √ √ √ √ √ √ √
Engineering √ √ √ √ √ √ √
Practices √ √ √
Laboratory
C Programming √
√ √ √ √ √ √
Laboratory
5
PROGRAMME OUTCOME (PO)
COURSE
1 2 3 4 5 6 7 8 9 10 11 12
TITLE
Discrete
√ √ √ √
Mathematics
Digital
Principles and √ √ √
Design
Data Structures √ √ √
SEMESTER III
Object Oriented
√ √ √
Programming
Communication
√ √ √
Engineering
Data Structures
√ √ √ √ √ √ √
Laboratory
Object Oriented
Programming √ √ √ √ √ √ √
Laboratory
Digital Systems
√ √ √ √ √ √ √ √
Laboratory
Interpersonal
Skills/Listening √ √ √ √
YEAR II
&Speaking
Probability and
Queueing √ √ √ √ √ √
Theory
Computer
√ √ √
Architecture
Database
Management √ √ √
Systems
SEMESTER IV
Design and
Analysis of √ √ √ √ √ √
Algorithms
Operating
√ √ √
Systems
Software
√ √ √ √ √ √ √ √ √
Engineering
Database
Management
√ √ √ √ √ √ √
Systems
Laboratory
Operating
Systems √ √ √ √ √ √ √
Laboratory
Advanced
Reading and √ √ √ √
Writing
6
Algebra and
√ √ √ √
Number Theory
Computer
√ √ √
Networks
Microprocessors
and √ √ √
Microcontrollers
Theory of
√ √ √
Computation
SEMESTER V
Object Oriented
Analysis and √ √ √ √
YEAR III
Design
Open Elective I
Microprocessors
and
√ √ √ √ √ √ √
Microcontrollers
Laboratory
Object Oriented
Analysis and
√ √ √ √ √ √ √ √ √
Design
Laboratory
Networks
√ √ √ √ √ √ √
Laboratory
Internet
√ √ √ √ √ √ √
Programming
Artificial
√ √ √
Intelligence
Mobile
√ √ √
Computing
SEMESTER VI
Compiler Design √ √ √ √ √ √ √
Distributed
√ √ √
Systems
Professional
Elective I
Internet
Programming √ √ √ √ √ √ √ √
Laboratory
Mobile
Application
√ √ √ √ √ √ √ √ √
Development
Laboratory
Mini Project √ √ √ √ √ √ √ √ √ √ √ √
Professional
Communication
Principles of
SEMESTER VII
√ √ √ √
Management
YEAR IV
Cryptography
and Network √ √ √
Security
Cloud Computing √ √ √
Open Elective II
7
Professional
Elective II
Professional
Elective III
Cloud Computing
√ √ √ √ √ √ √ √
Laboratory
Security
√ √ √ √ √ √ √ √
Laboratory
Professional
Elective IV
SEMESTER
Professional
VIII
Elective V
Project Work
√ √ √ √ √ √ √ √ √ √ √ √
8
PROFESSIONAL ELECTIVES
9
ANNA UNIVERSITY, CHENNAI
AFFILIATED INSTITUTIONS
B.E. COMPUTER SCIENCE AND ENGINEERING
REGULATIONS – 2017
CHOICE BASED CREDIT SYSTEM
I - VIII SEMESTERS CURRICULA AND SYLLABI
SEMESTER I
SI. COURSE CONTACT
COURSE TITLE CATEGORY L T P C
No CODE PERIODS
THEORY
1. HS8151 Communicative English HS 4 4 0 0 4
2. MA8151 Engineering
BS 4 4 0 0 4
Mathematics - I
3. PH8151 Engineering Physics BS 3 3 0 0 3
4. CY8151 Engineering Chemistry BS 3 0 0 3
3
5. GE8151 Problem Solving and
ES 3 3 0 0 3
Python Programming
6. GE8152 Engineering Graphics ES 6 2 0 4 4
PRACTICALS
7. GE8161 Problem Solving and ES 4
Python Programming 0 0 4 2
Laboratory
8. BS8161 Physics and Chemistry BS 4
0 0 4 2
Laboratory
TOTAL 31 19 0 12 25
SEMESTER II
COURSE CONTACT
SI.No COURSE TITLE CATEGORY L T P C
CODE PERIODS
THEORY
1. HS8251 Technical English HS 4 4 0 0 4
2. MA8251 Engineering BS
4 4 0 0 4
Mathematics - II
3. PH8252 Physics for Information BS
3 3 0 0 3
Science
4. BE8255 Basic Electrical, ES
Electronics and
3 3 0 0 3
Measurement
Engineering
5. GE8291 Environmental Science HS
3 3 0 0 3
and Engineering
6. CS8251 Programming in C PC 3 3 0 0 3
PRACTICALS
7. GE8261 Engineering Practices ES 4
0 0 4 2
Laboratory
8. CS8261 C Programming PC 4
0 0 4 2
Laboratory
TOTAL 28 20 0 8 24
10
SEMESTER III
COURSE CONTACT
Sl.No COURSE TITLE CATEGORY L T P C
CODE PERIODS
THEORY
1. MA8351 Discrete Mathematics BS 4 4 0 0 4
2. Digital Principles and
CS8351 ES 4 4 0 0 4
System Design
3. CS8391 Data Structures PC 3 3 0 0 3
4. Object Oriented
CS8392 PC 3 3 0 0 3
Programming
5. Communication
EC8395 ES 3 3 0 0 3
Engineering
PRACTICALS
6. Data Structures
CS8381 PC 4 0 0 4 2
Laboratory
7. Object Oriented
CS8383 PC 4 0 0 4 2
Programming Laboratory
8. Digital Systems
CS8382 ES 4 0 0 4 2
Laboratory
9. Interpersonal
HS8381 Skills/Listening EEC 2 0 0 2 1
&Speaking
TOTAL 31 17 0 14 24
SEMESTER IV
Sl. COURSE CONTACT
COURSE TITLE CATEGORY L T P C
No CODE PERIODS
THEORY
1. MA8402 Probability and Queueing BS
4 4 0 0 4
Theory
2. CS8491 Computer Architecture PC 3 3 0 0 3
3. CS8492 Database Management PC
3 3 0 0 3
Systems
4. CS8451 Design and Analysis of PC
3 3 0 0 3
Algorithms
5. CS8493 Operating Systems PC 3 3 0 0 3
6. CS8494 Software Engineering PC 3 3 0 0 3
PRACTICALS
7. CS8481 Database Management PC
4 0 0 4 2
Systems Laboratory
8. CS8461 Operating Systems PC
4 0 0 4 2
Laboratory
9. HS8461 Advanced Reading and EEC
2 0 0 2 1
Writing
TOTAL 29 19 0 10 24
11
SEMESTER V
Sl. COURSE CONTACT
COURSE TITLE CATEGORY L T P C
No CODE PERIODS
THEORY
1. MA8551 Algebra and Number
BS 4 4 0 0 4
Theory
2. CS8591 Computer Networks PC 3 3 0 0 3
3. EC8691 Microprocessors and
PC 3 3 0 0 3
Microcontrollers
4. CS8501 Theory of Computation PC 3 3 0 0 3
5. CS8592 Object Oriented Analysis
PC 3 3 0 0 3
and Design
6. Open Elective I OE 3 3 0 0 3
PRACTICALS
7. EC8681 Microprocessors and
PC 4 0 0 4 2
Microcontrollers Laboratory
8. CS8582 Object Oriented Analysis
PC 4 0 0 4 2
and Design Laboratory
9. CS8581 Networks Laboratory PC 4 0 0 4 2
TOTAL 31 19 0 12 25
SEMESTER VI
12
SEMESTER VII
SEMESTER VIII
13
HUMANITIES AND SOCIAL SCIENCES (HS)
14
PROFESSIONAL CORE (PC)
Sl. COURSE COURSE TITLE CATEGORY CONTACT L T P C
NO CODE PERIODS
1. CS8251 Programming in C PC 3 3 0 0 3
2. CS8261 C Programming Laboratory PC 4 0 0 4 2
3. CS8391 Data Structures PC 3 3 0 0 3
4. CS8392 Object Oriented
PC 3 3 0 0 3
Programming
5. CS8381 Data Structures Laboratory PC 4 0 0 4 2
6. CS8383 Object Oriented
PC 4 0 0 4 2
Programming Laboratory
7. CS8491 Computer Architecture PC 3 3 0 0 3
8. CS8492 Database Management
PC 3 3 0 0 3
Systems
9. CS8451 Design and Analysis of
PC 3 3 0 0 3
Algorithms
10. CS8493 Operating Systems PC 3 3 0 0 3
11. CS8494 Software Engineering PC 3 3 0 0 3
12. CS8481 Database Management
PC 4 0 0 4 2
Systems Laboratory
13. CS8461 Operating Systems
PC 4 0 0 4 2
Laboratory
14. CS8591 Computer Networks PC 3 3 0 0 3
15. EC8691 Microprocessors and
PC 3 3 0 0 3
Microcontrollers
16. CS8501 Theory of Computation PC 3 3 0 0 3
17. CS8592 Object Oriented Analysis
PC 3 3 0 0 3
and Design
18. EC8681 Microprocessors and
PC 4 0 0 4 2
Microcontrollers Laboratory
19. CS8582 Object Oriented Analysis
PC 4 0 0 4 2
and Design Laboratory
20. CS8581 Networks Laboratory PC 4 0 0 4 2
21. CS8651 Internet Programming PC 3 3 0 0 3
22. CS8691 Artificial Intelligence PC 3 3 0 0 3
23. CS8601 Mobile Computing PC 3 3 0 0 3
24. CS8602 Compiler Design PC 5 3 0 2 4
25. CS8603 Distributed Systems PC 3 3 0 0 3
26. CS8661 Internet Programming
PC 4 0 0 4 2
Laboratory
27. CS8662 Mobile Application
PC 4 0 0 4 2
Development Laboratory
28. CS8792 Cryptography and Network
PC 3 3 0 0 3
Security
29. CS8791 Cloud Computing PC 3 3 0 0 3
30. CS8711 Cloud Computing
PC 4 0 0 4 2
Laboratory
31. IT8761 Security Laboratory PC 4 0 0 4 2
15
PROFESSIONAL ELECTIVES (PE)
SEMESTER VI
ELECTIVE - I
SI. COURSE CONTACT
COURSE TITLE CATEGORY L T P C
No CODE PERIODS
1. CS8075 Data Warehousing and
PE 3 3 0 0 3
Data Mining
2. IT8076 Software Testing PE 3 3 0 0 3
3. IT8072 Embedded Systems PE 3 3 0 0 3
4. CS8072 Agile Methodologies PE 3 3 0 0 3
5. CS8077 Graph Theory and
PE 3 3 0 0 3
Applications-
6. IT8071 Digital Signal Processing PE 3 3 0 0 3
7. GE8075 Intellectual Property
PE 3 3 0 0 3
Rights
SEMESTER VII
ELECTIVE - II
SI. COURSE CONTACT
COURSE TITLE CATEGORY L T P C
No CODE PERIODS
1. CS8091 Big Data Analytics PE 3 3 0 0 3
2. CS8082 Machine Learning
PE 3 3 0 0 3
Techniques
3. CS8092 Computer Graphics and
PE 3 3 0 0 3
Multimedia
4. IT8075 Software Project
PE 3 3 0 0 3
Management
5. CS8081 Internet of Things PE 3 3 0 0 3
6. IT8074 Service Oriented
PE 3 3 0 0 3
Architecture
7. GE8077 Total Quality Management PE 3 3 0 0 3
SEMESTER VII
ELECTIVE - III
SI. COURSE CONTACT
COURSE TITLE CATEGORY L T P C
No CODE PERIODS
1. CS8083 Multi-core Architectures and
PE 3 3 0 0 3
Programming
2. CS8079 Human Computer
PE 3 3 0 0 3
Interaction
3. CS8073 C# and .Net Programming PE 3 3 0 0 3
4. CS8088 Wireless Adhoc and Sensor
PE 3 3 0 0 3
Networks
5. CS8071 Advanced Topics on
PE 3 3 0 0 3
Databases
6. GE8072 Foundation Skills in
Integrated Product PE 3 3 0 0 3
Development
7. GE8074 Human Rights PE 3 3 0 0 3
8. GE8071 Disaster Management PE 3 3 0 0 3
16
SEMESTER VIII
ELECTIVE - IV
SI. COURSE CONTACT
COURSE TITLE CATEGORY L T P C
No CODE PERIODS
1. EC8093 Digital Image Processing PE 3 3 0 0 3
2. CS8085 Social Network Analysis PE 3 3 0 0 3
3. IT8073 Information Security PE 3 3 0 0 3
4. CS8087 Software Defined Networks PE 3 3 0 0 3
5. CS8074 Cyber Forensics PE 3 3 0 0 3
6. CS8086 Soft Computing PE 3 3 0 0 3
7. GE8076 Professional Ethics in
PE 3 3 0 0 3
Engineering
SEMESTER VIII
ELECTIVE - V
SI. COURSE CONTACT
COURSE TITLE CATEGORY L T P C
No CODE PERIODS
1. CS8080 Information Retrieval
PE 3 3 0 0 3
Techniques
2. CS8078 Green Computing PE 3 3 0 0 3
3. CS8076 GPU Architecture and
PE 3 3 0 0 3
Programming
4. CS8084 Natural Language Processing PE 3 3 0 0 3
5. CS8001 Parallel Algorithms PE 3 3 0 0 3
6. IT8077 Speech Processing PE 3 3 0 0 3
7. GE8073 Fundamentals of Nanoscience PE 3 3 0 0 3
17
SUMMARY
1. HS 4 7 3 14 7.60%
2. BS 12 74 4 4 31 16.8%
3. ES 9 59 23 12.5%
4. PC 5
10 19 18 20 10 82 44.5%
5. PE 3 6 6 15 8.15%
6. OE 3 3 6 3.3%
7. EEC 1 1 2 10 14 7.65%
Total 25 24 24 24 25 25 22 16 185
Non Credit /
8.
Mandatory
18
L T P C
HS8151 COMMUNICATIVE ENGLISH
4 0 0 4
OBJECTIVES:
To develop the basic reading and writing skills of first year engineering and technology
students.
To help learners develop their listening skills, which will, enable them listen to lectures and
comprehend them by asking questions; seeking clarifications.
To help learners develop their speaking skills and speak fluently in real contexts.
To help learners develop vocabulary of a general kind by developing their reading skills
19
UNIT V EXTENDED WRITING 12
Reading- longer texts- close reading –Writing- brainstorming -writing short essays – developing
an outline- identifying main and subordinate ideas- dialogue writing-Listening – listening to talks-
conversations- Speaking – participating in conversations- short group conversations-Language
development-modal verbs- present/ past perfect tense - Vocabulary development-collocations-
fixed and semi-fixed expressions.
TOTAL: 60 PERIODS
OUTCOMES:
AT THE END OF THE COURSE, LEARNERS WILL BE ABLE TO:
• Read articles of a general kind in magazines and newspapers.
• Participate effectively in informal conversations; introduce themselves and their friends and
express opinions in English.
• Comprehend conversations and short talks delivered in English
• Write short essays of a general kind and personal letters and emails in English.
TEXT BOOKS:
1. Board of Editors. Using English A Coursebook for Undergarduate Engineers and
Technologists. Orient BlackSwan Limited, Hyderabad: 2015
2. Richards, C. Jack. Interchange Students’ Book-2 New Delhi: CUP, 2015.
REFERENCES:
1. Bailey, Stephen. Academic Writing: A practical guide for students. New York: Rutledge,2011.
2. Means,L. Thomas and Elaine Langlois. English & Communication For Colleges.
CengageLearning ,USA: 2007
3. Redston, Chris &Gillies Cunningham Face2Face (Pre-intermediate Student’s Book&
Workbook) Cambridge University Press, New Delhi: 2005
4. Comfort, Jeremy, et al. Speaking Effectively: Developing Speaking Skills for Business English.
Cambridge University Press, Cambridge: Reprint 2011
5. Dutt P. Kiranmai and Rajeevan Geeta. Basic Communication Skills, Foundation Books: 2013.
20
UNIT II FUNCTIONS OF SEVERAL VARIABLES 12
Partial differentiation – Homogeneous functions and Euler’s theorem – Total derivative – Change
of variables – Jacobians – Partial differentiation of implicit functions – Taylor’s series for functions
of two variables – Maxima and minima of functions of two variables – Lagrange’s method of
undetermined multipliers.
TOTAL: 60 PERIODS
OUTCOMES:
After completing this course, students should demonstrate competency in the following
skills:
Use both the limit definition and rules of differentiation to differentiate functions.
Apply differentiation to solve maxima and minima problems.
Evaluate integrals both by using Riemann sums and by using the Fundamental Theorem of
Calculus.
Apply integration to compute multiple integrals, area, volume, integrals in polar
coordinates, in addition to change of order and change of variables.
Evaluate integrals using techniques of integration, such as substitution, partial fractions
and integration by parts.
Determine convergence/divergence of improper integrals and evaluate convergent
improper integrals.
Apply various techniques in solving differential equations.
TEXT BOOKS :
1. Grewal B.S., “Higher Engineering Mathematics”, Khanna Publishers, New Delhi, 43rd Edition,
2014.
2. James Stewart, "Calculus: Early Transcendentals", Cengage Learning, 7th Edition, New
Delhi, 2015. [For Units I & III - Sections 1.1, 2.2, 2.3, 2.5, 2.7(Tangents problems only), 2.8,
3.1 to 3.6, 3.11, 4.1, 4.3, 5.1(Area problems only), 5.2, 5.3, 5.4 (excluding net change
theorem), 5.5, 7.1 - 7.4 and 7.8].
REFERENCES:
1. Anton, H, Bivens, I and Davis, S, "Calculus", Wiley, 10th Edition, 2016.
2. Jain R.K. and Iyengar S.R.K., “Advanced Engineering Mathematics”, Narosa Publications,
New Delhi, 3rd Edition, 2007.
3. Narayanan, S. and Manicavachagom Pillai, T. K., “Calculus" Volume I and II,
S. Viswanathan Publishers Pvt. Ltd., Chennai, 2007.
4. Srimantha Pal and Bhunia, S.C, "Engineering Mathematics" Oxford University Press, 2015.
5. Weir, M.D and Joel Hass, "Thomas Calculus", 12th Edition, Pearson India, 2016.
21
L T P C
PH8151 ENGINEERING PHYSICS
3 0 0 3
OBJECTIVES:
To enhance the fundamental knowledge in Physics and its applications relevant to various
streams of Engineering and Technology.
22
TEXT BOOKS:
1. Bhattacharya, D.K. & Poonam, T. “Engineering Physics”. Oxford University Press, 2015.
2. Gaur, R.K. & Gupta, S.L. “Engineering Physics”. Dhanpat Rai Publishers, 2012.
3. Pandey, B.K. & Chaturvedi, S. “Engineering Physics”. Cengage Learning India, 2012.
REFERENCES:
1. Halliday, D., Resnick, R. & Walker, J. “Principles of Physics”. Wiley, 2015.
2. Serway, R.A. & Jewett, J.W. “Physics for Scientists and Engineers”. Cengage Learning,
2010.
3. Tipler, P.A. & Mosca, G. “Physics for Scientists and Engineers with Modern Physics’.
W.H.Freeman, 2007.
TEXT BOOKS:
1. S. S. Dara and S. S. Umare, “A Textbook of Engineering Chemistry”, S. Chand & Company
LTD, New Delhi, 2015
2. P. C. Jain and Monika Jain, “Engineering Chemistry” Dhanpat Rai Publishing Company (P)
LTD, New Delhi, 2015
3. S. Vairam, P. Kalyani and Suba Ramesh, “Engineering Chemistry”, Wiley India PVT, LTD,
New Delhi, 2013.
REFERENCES:
1. Friedrich Emich, “Engineering Chemistry”, Scientific International PVT, LTD, New Delhi,
2014.
2. Prasanta Rath, “Engineering Chemistry”, Cengage Learning India PVT, LTD, Delhi, 2015.
3. Shikha Agarwal, “Engineering Chemistry-Fundamentals and Applications”, Cambridge
University Press, Delhi, 2015.
TOTAL: 45 PERIODS
OUTCOMES:
Upon completion of the course, students will be able to
Develop algorithmic solutions to simple computational problems
Read, write, execute by hand simple Python programs.
Structure simple Python programs for solving problems.
Decompose a Python program into functions.
Represent compound data using Python lists, tuples, dictionaries.
Read and write data from/to files in Python Programs.
TEXT BOOKS:
1. Allen B. Downey, ``Think Python: How to Think Like a Computer Scientist’’, 2nd edition,
Updated for Python 3, Shroff/O’Reilly Publishers, 2016 (http://greenteapress.com/wp/think-
python/)
2. Guido van Rossum and Fred L. Drake Jr, “An Introduction to Python – Revised and
updated for Python 3.2, Network Theory Ltd., 2011.
REFERENCES:
1. John V Guttag, “Introduction to Computation and Programming Using Python’’, Revised
and expanded Edition, MIT Press , 2013
2. Robert Sedgewick, Kevin Wayne, Robert Dondero, “Introduction to Programming in
Python: An Inter-disciplinary Approach, Pearson India Education Services Pvt. Ltd., 2016.
3. Timothy A. Budd, “Exploring Python”, Mc-Graw Hill Education (India) Private Ltd.,, 2015.
4. Kenneth A. Lambert, “Fundamentals of Python: First Programs”, CENGAGE Learning,
2012.
5. Charles Dierbach, “Introduction to Computer Science using Python: A Computational
Problem-Solving Focus, Wiley India Edition, 2013.
6. Paul Gries, Jennifer Campbell and Jason Montojo, “Practical Programming: An Introduction
to Computer Science using Python 3”, Second edition, Pragmatic Programmers, LLC,
2013.
25
dimensioning.
TEXT BOOKS:
1. Natrajan K.V., “A text book of Engineering Graphics”, Dhanalakshmi Publishers, Chennai,
2009.
2. Venugopal K. and Prabhu Raja V., “Engineering Graphics”, New Age International (P)
Limited, 2008.
REFERENCES:
1. Bhatt N.D. and Panchal V.M., “Engineering Drawing”, Charotar Publishing House, 50th
Edition, 2010.
2. Basant Agarwal and Agarwal C.M., “Engineering Drawing”, Tata McGraw Hill Publishing
Company Limited, New Delhi, 2008.
3. Gopalakrishna K.R., “Engineering Drawing” (Vol. I&II combined), Subhas Stores,
Bangalore, 2007.
26
4. Luzzader, Warren.J. and Duff,John M., “Fundamentals of Engineering Drawing with an
introduction to Interactive Computer Graphics for Design and Production, Eastern
Economy Edition, Prentice Hall of India Pvt. Ltd, New Delhi, 2005.
5. N. S. Parthasarathy and Vela Murali, “Engineering Graphics”, Oxford University, Press,
New Delhi, 2015.
6. Shah M.B., and Rana B.C., “Engineering Drawing”, Pearson, 2nd Edition, 2009.
27
Use Python lists, tuples, dictionaries for representing compound data.
Read and write data from/to files in Python.
BS8161
PHYSICS AND CHEMISTRY LABORATORY L T P C
(Common to all branches of B.E. / B.Tech Programmes)
0 0 4 2
OBJECTIVES:
To introduce different experiments to test basic understanding of physics concepts applied in optics,
thermal physics, properties of matter and liquids.
LIST OF EXPERIMENTS: PHYSICS LABORATORY (Any 5 Experiments)
1. Determination of rigidity modulus – Torsion pendulum
2. Determination of Young’s modulus by non-uniform bending method
3. (a) Determination of wavelength, and particle size using Laser
(b) Determination of acceptance angle in an optical fiber.
4. Determination of thermal conductivity of a bad conductor – Lee’s Disc method.
5. Determination of velocity of sound and compressibility of liquid – Ultrasonic interferometer
6. Determination of wavelength of mercury spectrum – spectrometer grating
7. Determination of band gap of a semiconductor
8. Determination of thickness of a thin wire – Air wedge method
TOTAL: 30 PERIODS
OUTCOMES:
Upon completion of the course, the students will be able to
Apply principles of elasticity, optics and thermal properties for engineering applications.
OBJECTIVES:
To make the student to acquire practical skills in the determination of water quality
parameters through volumetric and instrumental analysis.
To acquaint the students with the determination of molecular weight of a polymer by
viscometery.
1. Estimation of HCl using Na2CO3 as primary standard and Determination of alkalinity in water
sample.
2. Determination of total, temporary & permanent hardness of water by EDTA method.
3. Determination of DO content of water sample by Winkler’s method.
4. Determination of chloride content of water sample by argentometric method.
5. Estimation of copper content of the given solution by Iodometry.
6. Determination of strength of given hydrochloric acid using pH meter.
7. Determination of strength of acids in a mixture of acids using conductivity meter.
8. Estimation of iron content of the given solution using potentiometer.
9. Estimation of iron content of the water sample using spectrophotometer (1, 10-
Phenanthroline / thiocyanate method).
10. Estimation of sodium and potassium present in water using flame photometer.
11. Determination of molecular weight of polyvinyl alcohol using Ostwald viscometer.
12. Pseudo first order kinetics-ester hydrolysis.
13. Corrosion experiment-weight loss method.
14. Determination of CMC.
15. Phase change in a solid.
28
16. Conductometric titration of strong acid vs strong base.
OUTCOMES:
The students will be outfitted with hands-on knowledge in the quantitative chemical analysis
of water quality related parameters.
TOTAL: 30 PERIODS
TEXTBOOK:
1. Vogel’s Textbook of Quantitative Chemical Analysis (8TH edition, 2014).
HS8251 L T P C
TECHNICAL ENGLISH
4 0 0 4
OBJECTIVES:
The Course prepares second semester engineering and Technology students to:
• Develop strategies and skills to enhance their ability to read and comprehend engineering
and technology texts.
• Foster their ability to write convincing job applications and effective reports.
• Develop their speaking skills to make technical presentations, participate in group
discussions.
• Strengthen their listening skill which will help them comprehend lectures and talks in their
areas of specialization.
29
UNIT V GROUP DISCUSSION AND JOB APPLICATIONS 12
Listening- TED/Ink talks; Speaking –participating in a group discussion -Reading– reading and
understanding technical articles Writing– Writing reports- minutes of a meeting- accident and
survey-Vocabulary Development- verbal analogies Language Development- reported
speech.
TEXT BOOKS:
1. Board of editors. Fluency in English A Course book for Engineering and Technology.
Orient Blackswan, Hyderabad: 2016
2. Sudharshana.N.P and Saveetha. C. English for Technical Communication. Cambridge
University Press: New Delhi, 2016.
REFERENCES:
1. Raman, Meenakshi and Sharma, Sangeetha- Technical Communication Principles
and Practice.Oxford University Press: New Delhi,2014.
2. Kumar, Suresh. E. Engineering English. Orient Blackswan: Hyderabad,2015
3. Booth-L. Diana, Project Work, Oxford University Press, Oxford: 2014.
4. Grussendorf, Marion, English for Presentations, Oxford University Press, Oxford: 2007
5. Means, L. Thomas and Elaine Langlois, English & Communication For Colleges.
Cengage Learning, USA: 2007
Students can be asked to read Tagore, Chetan Bhagat and for supplementary
reading.
30
UNIT III ANALYTIC FUNCTIONS 12
Analytic functions – Necessary and sufficient conditions for analyticity in Cartesian and polar
coordinates - Properties – Harmonic conjugates – Construction of analytic function - Conformal
1 2
mapping – Mapping by functions w z c, cz, , z - Bilinear transformation.
z
UNIT IV COMPLEX INTEGRATION 12
Line integral - Cauchy’s integral theorem – Cauchy’s integral formula – Taylor’s and Laurent’s
series – Singularities – Residues – Residue theorem – Application of residue theorem for
evaluation of real integrals – Use of circular contour and semicircular contour.
TEXT BOOKS:
1. Grewal B.S., “Higher Engineering Mathematics”, Khanna Publishers, New Delhi,
43rd Edition, 2014.
2. Kreyszig Erwin, "Advanced Engineering Mathematics ", John Wiley and Sons,
10th Edition, New Delhi, 2016.
REFERENCES :
1. Bali N., Goyal M. and Watkins C., “Advanced Engineering Mathematics”, Firewall
Media (An imprint of Lakshmi Publications Pvt., Ltd.,), New Delhi, 7th Edition, 2009.
2. Jain R.K. and Iyengar S.R.K., “ Advanced Engineering Mathematics ”, Narosa
Publications, New Delhi , 3rd Edition, 2007.
3. O’Neil, P.V. “Advanced Engineering Mathematics”, Cengage Learning India
Pvt., Ltd, New Delhi, 2007.
4. Sastry, S.S, “Engineering Mathematics", Vol. I & II, PHI Learning Pvt. Ltd,
4th Edition, New Delhi, 2014.
5. Wylie, R.C. and Barrett, L.C., “Advanced Engineering Mathematics “Tata McGraw Hill
Education Pvt. Ltd, 6th Edition, New Delhi, 2012.
TEXT BOOKS:
1. Jasprit Singh, “Semiconductor Devices: Basic Principles”, Wiley 2012.
2. Kasap, S.O. “Principles of Electronic Materials and Devices”, McGraw-Hill Education, 2007.
3. Kittel, C. “Introduction to Solid State Physics”. Wiley, 2005.
32
REFERENCES:
1. Garcia, N. & Damask, A. “Physics for Computer Science Students”. Springer-Verlag, 2012.
2. Hanson, G.W. “Fundamentals of Nanoelectronics”. Pearson Education, 2009.
3. Rogers, B., Adams, J. & Pennathur, S. “Nanotechnology: Understanding
Small Systems”. CRC Press, 2014.
33
TEXT BOOKS:
1. D.P. Kotharti and I.J Nagarath, Basic Electrical and Electronics Engineering,
Mc Graw Hill, 2016,Third Edition.
2. M.S. Sukhija and T.K. Nagsarkar, Basic Electrical and Electronic Engineering, Oxford, 2016.
REFERENCES:
1. S.B. Lal Seksena and Kaustuv Dasgupta, Fundaments of Electrical Engineering,
Cambridge, 2016
2. B.L Theraja, Fundamentals of Electrical Engineering and Electronics. Chand
& Co, 2008.
3. S.K.Sahdev, Basic of Electrical Engineering, Pearson, 2015
4. John Bird, ―Electrical and Electronic Principles and Technologyǁ, Fourth Edition, Elsevier,
2010.
5. Mittle,Mittal, Basic Electrical Engineeringǁ, 2nd Edition, Tata McGraw-Hill Edition, 2016.
6. C.L.Wadhwa, “Generation, Distribution and Utilisation of Electrical Energy”, New Age
international pvt.ltd.,2003.
34
UNIT III NATURAL RESOURCES 10
Forest resources: Use and over-exploitation, deforestation, case studies- timber extraction, mining,
dams and their effects on forests and tribal people – Water resources: Use and over- utilization of
surface and ground water, floods, drought, conflicts over water, dams-benefits and problems –
Mineral resources: Use and exploitation, environmental effects of extracting and using mineral
resources, case studies – Food resources: World food problems, changes caused by agriculture
and overgrazing, effects of modern agriculture, fertilizer-pesticide problems, water logging, salinity,
case studies – Energy resources: Growing energy needs, renewable and non renewable energy
sources, use of alternate energy sources. case studies – Land resources: Land as a resource, land
degradation, man induced landslides, soil erosion and desertification – role of an individual in
conservation of natural resources – Equitable use of resources for sustainable lifestyles. Field
study of local area to document environmental assets – river / forest / grassland / hill / mountain.
TOTAL: 45 PERIODS
OUTCOMES:
Environmental Pollution or problems cannot be solved by mere laws. Public participation is an
important aspect which serves the environmental Protection. One will obtain knowledge on
the following after completing the course.
Public awareness of environmental is at infant stage.
Ignorance and incomplete knowledge has lead to misconceptions
Development and improvement in std. of living has lead to serious environmental disasters
TEXTBOOKS:
1. Benny Joseph, ‘Environmental Science and Engineering’, Tata McGraw-Hill, New Delhi, 2006.
2. Gilbert M.Masters, ‘Introduction to Environmental Engineering and Science’, 2nd edition,
Pearson Education, 2004.
REFERENCES :
1. Dharmendra S. Sengar, ‘Environmental law’, Prentice hall of India PVT LTD,New Delhi, 2007.
2. Erach Bharucha, “Textbook of Environmental Studies”, Universities Press(I) PVT, LTD,
Hydrabad, 2015.
3. Rajagopalan, R, ‘Environmental Studies-From Crisis to Cure’, Oxford University Press, 2005.
4. G. Tyler Miller and Scott E. Spoolman, “Environmental Science”, Cengage Learning India
PVT, LTD, Delhi, 2014.
35
CS8251 PROGRAMMING IN C LT P C
3 0 0 3
OBJECTIVES:
To develop C Programs using basic programming constructs
To develop C programs using arrays and strings
To develop applications in C using functions , pointers and structures
To do input/output and file handling in C
UNIT IV STRUCTURES 9
Structure - Nested structures – Pointer and Structures – Array of structures – Example Program
using structures and pointers – Self referential structures – Dynamic memory allocation - Singly
linked list - typedef
OUTCOMES:
Upon completion of the course, the students will be able to
Develop simple applications in C using basic constructs
Design and implement applications using arrays and strings
Develop and implement applications in C using functions and pointers.
Develop applications in C using structures.
Design applications using sequential and random access file processing.
TEXT BOOKS:
1. Reema Thareja, “Programming in C”, Oxford University Press, Second Edition, 2016.
2. Kernighan, B.W and Ritchie,D.M, “The C Programming language”, Second Edition,
Pearson Education, 2006
REFERENCES:
1. Paul Deitel and Harvey Deitel, “C How to Program”, Seventh edition, Pearson Publication
2. Juneja, B. L and Anita Seth, “Programming in C”, CENGAGE Learning India pvt. Ltd., 2011
36
3. Pradip Dey, Manas Ghosh, “Fundamentals of Computing and Programming in C”, First
Edition, Oxford University Press, 2009.
4. Anita Goel and Ajay Mittal, “Computer Fundamentals and Programming in C”, Dorling
Kindersley (India) Pvt. Ltd., Pearson Education in South Asia, 2011.
5. Byron S. Gottfried, "Schaum's Outline of Theory and Problems of Programming with
C",McGraw-Hill Education, 1996.
BUILDINGS:
(a) Study of plumbing and carpentry components of residential and industrial buildings.
Safety
aspects.
PLUMBING WORKS:
(a) Study of pipeline joints, its location and functions: valves, taps, couplings, unions,
reducers,
elbows in household fittings.
(b) Study of pipe connections requirements for pumps and turbines.
(c) Preparation of plumbing line sketches for water supply and sewage works.
(d) Hands-on-exercise:
Basic pipe connections – Mixed pipe material connection – Pipe connections with
different joining components.
BASIC MACHINING:
(a) Simple Turning and Taper turning
(b) Drilling Practice
ELECTRICAL
1. Assorted electrical components for house wiring 15 Sets
2. Electrical measuring instruments 10 Sets
3. Study purpose items: Iron box, fan and regulator, emergency lamp 1 each
4. Megger (250V/500V) 1 No.
5. Power Tools: (a) Range Finder 2 Nos
(b) Digital Live-wire detector 2 Nos
ELECTRONICS
1. Soldering guns 10 Nos.
2. Assorted electronic components for making circuits 50 Nos.
3. Small PCBs 10 Nos.
4. Multimeters 10 Nos.
5. Study purpose items: Telephone, FM radio, low-voltage power
supply
LIST OF EXPERIMENTS:
1. Programs using I/O statements and expressions.
2. Programs using decision-making constructs.
3. Write a program to find whether the given year is leap year or Not? (Hint: not every
centurion year is a leap. For example 1700, 1800 and 1900 is not a leap year)
4. Design a calculator to perform the operations, namely, addition, subtraction, multiplication,
division and square of a number.
5. Check whether a given number is Armstrong number or not?
6. Given a set of numbers like <10, 36, 54, 89, 12, 27>, find sum of weights based on the
following conditions.
5 if it is a perfect cube.
4 if it is a multiple of 4 and divisible by 6.
3 if it is a prime number.
Sort the numbers based on the weight in the increasing order as shown below
<10,its weight>,<36,its weight><89,its weight>
7. Populate an array with height of persons and find how many persons are above the
average height.
8. Populate a two dimensional array with height and weight of persons and compute the Body
Mass Index of the individuals.
9. Given a string “a$bcd./fg” find its reverse without changing the position of special
characters.
(Example input:a@gh%;j and output:j@hg%;a)
39
10. Convert the given decimal number into binary, octal and hexadecimal numbers using user
defined functions.
11. From a given paragraph perform the following using built-in functions:
a. Find the total number of words.
b. Capitalize the first word of each sentence.
c. Replace a given word with another word.
12. Solve towers of Hanoi using recursion.
13. Sort the list of numbers using pass by reference.
14. Generate salary slip of employees using structures and pointers.
15. Compute internal marks of students for five different subjects using structures and
functions.
16. Insert, update, delete and append telephone details of an individual or a company into a
telephone directory using random access file.
17. Count the number of account holders whose balance is less than the minimum balance
using sequential access file.
Mini project
18. Create a “Railway reservation system” with the following modules
Booking
Availability checking
Cancellation
Prepare chart
TOTAL: 60 PERIODS
OUTCOMES:
Upon completion of the course, the students will be able to:
Develop C programs for simple applications making use of basic constructs, arrays and
strings.
Develop C programs involving functions, recursion, pointers, and structures.
Design applications using sequential and random access file processing.
UNIT II COMBINATORICS 12
Mathematical induction – Strong induction and well ordering – The basics of counting – The
pigeonhole principle – Permutations and combinations – Recurrence relations – Solving linear
recurrence relations – Generating functions – Inclusion and exclusion principle and its applications
40
UNIT IV ALGEBRAIC STRUCTURES 12
Algebraic systems – Semi groups and monoids - Groups – Subgroups – Homomorphism’s –
Normal subgroup and cosets – Lagrange’s theorem – Definitions and examples of Rings and
Fields.
OUTCOMES:
At the end of the course, students would:
Have knowledge of the concepts needed to test the logic of a program.
Have an understanding in identifying structures on many levels.
Be aware of a class of functions which transform a finite set into another finite set which
relates to input and output functions in computer science.
Be aware of the counting principles.
Be exposed to concepts and properties of algebraic structures such as groups, rings and
fields.
TEXTBOOKS:
1. Rosen, K.H., "Discrete Mathematics and its Applications", 7th Edition, Tata McGraw
Hill Pub. Co. Ltd., New Delhi, Special Indian Edition, 2011.
2. Tremblay, J.P. and Manohar.R, " Discrete Mathematical Structures with Applications to
Computer Science", Tata McGraw Hill Pub. Co. Ltd, New Delhi, 30th Reprint, 2011.
REFERENCES:
1. Grimaldi, R.P. "Discrete and Combinatorial Mathematics: An Applied Introduction", 4th Edition,
Pearson Education Asia, Delhi, 2007.
2. Lipschutz, S. and Mark Lipson., "Discrete Mathematics", Schaum’s Outlines, Tata McGraw Hill
Pub. Co. Ltd., New Delhi, 3rd Edition, 2010.
3. Koshy, T. "Discrete Mathematics with Applications", Elsevier Publications, 2006.
TEXT BOOK:
1. M. Morris R. Mano, Michael D. Ciletti, “Digital Design: With an Introduction to the
Verilog HDL, VHDL, and SystemVerilog”, 6th Edition, Pearson Education, 2017.
REFERENCES:
1. G. K. Kharate, Digital Electronics, Oxford University Press, 2010
2. John F. Wakerly, Digital Design Principles and Practices, Fifth Edition, Pearson
Education, 2017.
3. Charles H. Roth Jr, Larry L. Kinney, Fundamentals of Logic Design, Sixth Edition,
CENGAGE Learning, 2013
4. Donald D. Givone, Digital Principles and Designǁ, Tata Mc Graw Hill, 2003.
42
UNIT III NON LINEAR DATA STRUCTURES – TREES 9
Tree ADT – tree traversals - Binary Tree ADT – expression trees – applications of trees – binary
search tree ADT –Threaded Binary Trees- AVL Trees – B-Tree - B+ Tree - Heap – Applications of
heap.
TOTAL: 45 PERIODS
OUTCOMES:
At the end of the course, the student should be able to:
Implement abstract data types for linear data structures.
Apply the different linear and non-linear data structures to problem solutions.
Critically analyze the various sorting algorithms.
TEXT BOOKS:
1. Mark Allen Weiss, “Data Structures and Algorithm Analysis in C”, 2nd Edition, Pearson
Education,1997.
2. Reema Thareja, “Data Structures Using C”, Second Edition , Oxford University Press, 2011
REFERENCES:
1. Thomas H. Cormen, Charles E. Leiserson, Ronald L.Rivest, Clifford Stein, “Introduction to
Algorithms", Second Edition, Mcgraw Hill, 2002.
2. Aho, Hopcroft and Ullman, “Data Structures and Algorithms”, Pearson Education,1983.
3. Stephen G. Kochan, “Programming in C”, 3rd edition, Pearson Education.
4. Ellis Horowitz, Sartaj Sahni, Susan Anderson-Freed, “Fundamentals of Data Structures in C”,
Second Edition, University Press, 2008
TEXT BOOKS:
1. Herbert Schildt, “Java The complete reference”, 8th Edition, McGraw Hill Education, 2011.
2. Cay S. Horstmann, Gary cornell, “Core Java Volume –I Fundamentals”, 9th Edition,
Prentice Hall, 2013.
REFERENCES:
1. Paul Deitel, Harvey Deitel, “Java SE 8 for programmers”, 3rd Edition, Pearson, 2015.
2. Steven Holzner, “Java 2 Black book”, Dreamtech press, 2011.
3. Timothy Budd, “Understanding Object-oriented programming with Java”, Updated Edition,
Pearson Education, 2000.
44
UNITII PULSE MODULATION 9
Low pass sampling theorem – Quantization – PAM – Line coding – PCM, DPCM, DM, and
ADPCM And ADM, Channel Vocoder - Time Division Multiplexing, Frequency Division Multiplexing
TEXT BOOKS:
1. H Taub, D L Schilling, G Saha, “Principles of Communication Systems” 3/e, TMH 2007
2. S. Haykin “Digital Communications” John Wiley 2005
REFERENCES:
1. B.P.Lathi, “Modern Digital and Analog Communication Systems”, 3rd edition, Oxford
University Press, 2007
2. H P Hsu, Schaum Outline Series – “Analog and Digital Communications” TMH 2006
3. B.Sklar, Digital Communications Fundamentals and Applications” 2/e Pearson
Education 2007.
OUTCOMES:
At the end of the course, the students will be able to:
Write functions to implement linear and non-linear data structure operations
Suggest appropriate linear / non-linear data structure operations for solving a given
problem
Appropriately use the linear / non-linear data structure operations for a given problem
Apply appropriate hash functions that result in a collision free scenario for data storage and
retrieval
LIST OF EXPERIMENTS
1. Develop a Java application to generate Electricity bill. Create a class with the following
members: Consumer no., consumer name, previous month reading, current month reading,
type of EB connection (i.e domestic or commercial). Compute the bill amount using the
following tariff.
If the type of the EB connection is domestic, calculate the amount to be paid as follows:
First 100 units - Rs. 1 per unit
101-200 units - Rs. 2.50 per unit
201 -500 units - Rs. 4 per unit
> 501 units - Rs. 6 per unit
If the type of the EB connection is commercial, calculate the amount to be paid as follows:
First 100 units - Rs. 2 per unit
101-200 units - Rs. 4.50 per unit
201 -500 units - Rs. 6 per unit
> 501 units - Rs. 7 per unit
2. Develop a java application to implement currency converter (Dollar to INR, EURO to INR, Yen
to INR and vice versa), distance converter (meter to KM, miles to KM and vice versa) , time
converter (hours to minutes, seconds and vice versa) using packages.
3. Develop a java application with Employee class with Emp_name, Emp_id, Address, Mail_id,
Mobile_no as members. Inherit the classes, Programmer, Assistant Professor, Associate
Professor and Professor from employee class. Add Basic Pay (BP) as the member of all the
inherited classes with 97% of BP as DA, 10 % of BP as HRA, 12% of BP as PF, 0.1% of BP for
staff club fund. Generate pay slips for the employees with their gross and net salary.
4. Design a Java interface for ADT Stack. Implement this interface using array. Provide
necessary exception handling in both the implementations.
46
5. Write a program to perform string operations using ArrayList. Write functions for the following
TOTAL : 60 PERIODS
OUTCOMES
Upon completion of the course, the students will be able to
Develop and implement Java programs for simple applications that make use of classes,
packages and interfaces.
Develop and implement Java programs with arraylist, exception handling and
multithreading .
Design applications using file processing, generic programming and event handling.
LIST OF EXPERIMENTS
1. Verification of Boolean Theorems using basic gates.
2. Design and implementation of combinational circuits using basic gates for arbitrary
47
functions, code converters.
3. Design and implement Half/Full Adder and Subtractor.
4. Design and implement combinational circuits using MSI devices:
4 – bit binary adder / subtractor
Parity generator / checker
Magnitude Comparator
Application using multiplexers
5. Design and implement shift-registers.
6. Design and implement synchronous counters.
7. Design and implement asynchronous counters.
8. Coding combinational circuits using HDL.
9. Coding sequential circuits using HDL.
10. Design and implementation of a simple digital system (Mini Project).
TOTAL: 60 PERIODS
OUTCOMES:
Upon Completion of the course, the students will be able to:
Implement simplified combinational circuits using basic logic gates
Implement combinational circuits using MSI devices
Implement sequential circuits like registers and counters
Simulate combinational and sequential circuits using HDL
SOFTWARE:
1. HDL simulator.
L T P C
HS8381 INTERPERSONAL SKILLS/LISTENING&SPEAKING
0 0 2 1
OBJECTIVES:
The Course will enable learners to:
• Equip students with the English language skills required for the successful undertaking of
academic studies with primary emphasis on academic speaking and listening skills.
• Provide guidance and practice in basic general and classroom conversation and to engage in
specific academic speaking activities.
• improve general and academic listening skills
• Make effective presentations.
UNIT I
Listening as a key skill- its importance- speaking - give personal information - ask for personal
information - express ability - enquire about ability - ask for clarification Improving pronunciation -
pronunciation basics taking lecture notes - preparing to listen to a lecture - articulate a complete
idea as opposed to producing fragmented utterances.
UNIT II
Listen to a process information- give information, as part of a simple explanation - conversation
starters: small talk - stressing syllables and speaking clearly - intonation patterns - compare and
contrast information and ideas from multiple sources- converse with reasonable accuracy over a
wide range of everyday topics.
48
UNIT III
Lexical chunking for accuracy and fluency- factors influence fluency, deliver a five-minute informal
talk - greet - respond to greetings - describe health and symptoms - invite and offer - accept -
decline - take leave - listen for and follow the gist- listen for detail
UNIT IV
Being an active listener: giving verbal and non-verbal feedback - participating in a group
discussion - summarizing academic readings and lectures conversational speech listening to and
participating in conversations - persuade.
UNIT V
Formal and informal talk - listen to follow and respond to explanations, directions and instructions
in academic and business contexts - strategies for presentations and interactive communication -
group/pair presentations - negotiate disagreement in group work.
TOTAL :30PERIODS
OUTCOMES:
At the end of the course Learners will be able to:
Listen and respond appropriately.
Participate in group discussions
Make effective presentations
Participate confidently and appropriately in conversations both formal and informal
TEXT BOOKS:
1. Brooks,Margret. Skills for Success. Listening and Speaking. Level 4 Oxford University Press,
Oxford: 2011.
2. Richards,C. Jack. & David Bholke. Speak Now Level 3. Oxford University Press, Oxford:
2010
REFERENCES:
1. Bhatnagar, Nitin and MamtaBhatnagar. Communicative English for Engineers and
Professionals. Pearson: New Delhi, 2010.
2. Hughes, Glyn and Josephine Moate. Practical English Classroom. Oxford University Press:
Oxford, 2014.
3. Vargo, Mari. Speak Now Level 4. Oxford University Press: Oxford, 2013.
4. Richards C. Jack. Person to Person (Starter). Oxford University Press: Oxford, 2006.
5. Ladousse, Gillian Porter. Role Play. Oxford University Press: Oxford, 2014
TOTAL : 60 PERIODS
OUTCOMES:
Upon successful completion of the course, students should be able to:
Understand the fundamental knowledge of the concepts of probability and have knowledge
of standard distributions which can describe real life phenomenon.
Understand the basic concepts of one and two dimensional random variables and apply in
engineering applications.
Apply the concept of random processes in engineering disciplines.
Acquire skills in analyzing queueing models.
Understand and characterize phenomenon which evolve with respect to time in a
probabilistic manner
TEXTBOOKS:
1. Gross, D., Shortle, J.F, Thompson, J.M and Harris. C.M., “Fundamentals of Queueing Theory",
Wiley Student 4th Edition, 2014.
2. Ibe, O.C., “Fundamentals of Applied Probability and Random Processes", Elsevier, 1st Indian
Reprint, 2007.
REFERENCES :
1. Hwei Hsu, "Schaum’s Outline of Theory and Problems of Probability, Random Variables and
Random Processes", Tata McGraw Hill Edition, New Delhi, 2004.
2. Taha, H.A., "Operations Research", 9th Edition, Pearson India Education Services, Delhi,
2016.
3. Trivedi, K.S., "Probability and Statistics with Reliability, Queueing and Computer Science
Applications", 2nd Edition, John Wiley and Sons, 2002.
4. Yates, R.D. and Goodman. D. J., "Probability and Stochastic Processes", 2nd Edition, Wiley
India Pvt. Ltd., Bangalore, 2012.
50
CS8491 COMPUTER ARCHITECTURE L T P C
3 0 0 3
OBJECTIVES:
• To learn the basic structure and operations of a computer.
• To learn the arithmetic and logic unit and implementation of fixed-point and floating point
arithmetic unit.
• To learn the basics of pipelined execution.
• To understand parallelism and multi-core processors.
• To understand the memory hierarchies, cache memories and virtual memories.
• To learn the different ways of communication with I/O devices.
UNIT IV PARALLELISIM 9
Parallel processing challenges – Flynn’s classification – SISD, MIMD, SIMD, SPMD, and
Vector Architectures - Hardware multithreading – Multi-core processors and other Shared
Memory Multiprocessors - Introduction to Graphics Processing Units, Clusters, Warehouse
Scale Computers and other Message-Passing Multiprocessors.
TOTAL : 45 PERIODS
OUTCOMES:
On Completion of the course, the students should be able to:
Understand the basics structure of computers, operations and instructions.
Design arithmetic and logic unit.
Understand pipelined execution and design control unit.
Understand parallel processing architectures.
Understand the various memory systems and I/O communication.
TEXT BOOKS:
1. David A. Patterson and John L. Hennessy, Computer Organization and Design: The
Hardware/Software Interface, Fifth Edition, Morgan Kaufmann / Elsevier, 2014.
2. Carl Hamacher, Zvonko Vranesic, Safwat Zaky and Naraig Manjikian, Computer
Organization and Embedded Systems, Sixth Edition, Tata McGraw Hill, 2012.
REFERENCES:
1. William Stallings, Computer Organization and Architecture – Designing for
Performance, Eighth Edition, Pearson Education, 2010.
2. John P. Hayes, Computer Architecture and Organization, Third Edition, Tata
51
McGraw Hill, 2012.
3. John L. Hennessey and David A. Patterson, Computer Architecture – A Quantitative
Approachǁ, Morgan Kaufmann / Elsevier Publishers, Fifth Edition, 2012.
TOTAL: 45 PERIODS
OUTCOMES:
Upon completion of the course, the students will be able to:
Classify the modern and futuristic database applications based on size and complexity
Map ER model to Relational model to perform database design effectively
Write queries using normalization criteria and optimize queries
Compare and contrast various indexing strategies in different database systems
Appraise how advanced databases differ from traditional databases.
52
TEXT BOOKS:
1. Abraham Silberschatz, Henry F. Korth, S. Sudharshan, “Database System Concepts”, Sixth
Edition, Tata McGraw Hill, 2011.
2. Ramez Elmasri, Shamkant B. Navathe, “Fundamentals of Database Systems”, Sixth Edition,
Pearson Education, 2011.
REFERENCES:
1. C.J.Date, A.Kannan, S.Swamynathan, “An Introduction to Database Systems”, Eighth Edition,
Pearson Education, 2006.
2. Raghu Ramakrishnan, ―Database Management Systemsǁ, Fourth Edition, McGraw-Hill
College Publications, 2015.
3. G.K.Gupta,"Database Management Systems”, Tata McGraw Hill, 2011.
UNIT I INTRODUCTION 9
Notion of an Algorithm – Fundamentals of Algorithmic Problem Solving – Important Problem Types
– Fundamentals of the Analysis of Algorithmic Efficiency –Asymptotic Notations and their
properties. Analysis Framework – Empirical analysis - Mathematical analysis for Recursive and
Non-recursive algorithms - Visualization
UNIT II BRUTE FORCE AND DIVIDE-AND-CONQUER 9
Brute Force – Computing an – String Matching - Closest-Pair and Convex-Hull Problems -
Exhaustive Search - Travelling Salesman Problem - Knapsack Problem - Assignment problem.
Divide and Conquer Methodology – Binary Search – Merge sort – Quick sort – Heap Sort -
Multiplication of Large Integers – Closest-Pair and Convex - Hull Problems.
53
OUTCOMES:
At the end of the course, the students should be able to:
Design algorithms for various computing problems.
Analyze the time and space complexity of algorithms.
Critically analyze the different algorithm design techniques for a given problem.
Modify existing algorithms to improve efficiency.
TEXT BOOKS:
1. Anany Levitin, “Introduction to the Design and Analysis of Algorithms”, Third Edition,
Pearson Education, 2012.
2. Ellis Horowitz, Sartaj Sahni and Sanguthevar Rajasekaran, Computer Algorithms/ C++, Second
Edition, Universities Press, 2007.
REFERENCES:
1. Thomas H.Cormen, Charles E.Leiserson, Ronald L. Rivest and Clifford Stein, “Introduction
to Algorithms”, Third Edition, PHI Learning Private Limited, 2012.
2. Alfred V. Aho, John E. Hopcroft and Jeffrey D. Ullman, “Data Structures and Algorithms”,
Pearson Education, Reprint 2006.
3. Harsh Bhasin, “Algorithms Design and Analysis”, Oxford university press, 2016.
4. S. Sridhar, “Design and Analysis of Algorithms”, Oxford university press, 2014.
5. http://nptel.ac.in/
54
Demand Paging, Page Replacement, Allocation, Thrashing; Allocating Kernel Memory, OS
Examples.
TEXT BOOK :
1. Abraham Silberschatz, Peter Baer Galvin and Greg Gagne, “Operating System Concepts”,
9th Edition, John Wiley and Sons Inc., 2012.
REFERENCES :
1. Ramaz Elmasri, A. Gil Carrick, David Levine, “Operating Systems – A Spiral Approach”,
Tata McGraw Hill Edition, 2010.
2. Achyut S.Godbole, Atul Kahate, “Operating Systems”, McGraw Hill Education, 2016.
3. Andrew S. Tanenbaum, “Modern Operating Systems”, Second Edition, Pearson
Education, 2004.
4. Gary Nutt, “Operating Systems”, Third Edition, Pearson Education, 2004.
5. Harvey M. Deitel, “Operating Systems”, Third Edition, Pearson Education, 2004.
6. Daniel P Bovet and Marco Cesati, “Understanding the Linux kernel”, 3rd edition, O’Reilly,
2005.
7. Neil Smyth, “iPhone iOS 4 Development Essentials – Xcode”, Fourth Edition, Payload media,
2011.
55
UNIT II REQUIREMENTS ANALYSIS AND SPECIFICATION 9
Software Requirements: Functional and Non-Functional, User requirements, System requirements,
Software Requirements Document – Requirement Engineering Process: Feasibility Studies,
Requirements elicitation and analysis, requirements validation, requirements management-
Classical analysis: Structured system Analysis, Petri Nets- Data Dictionary.
OUTCOMES:
On Completion of the course, the students should be able to:
Identify the key activities in managing a software project.
Compare different process models.
Concepts of requirements engineering and Analysis Modeling.
Apply systematic procedure for software design and deployment.
Compare and contrast the various testing and maintenance.
Manage project schedule, estimate project cost and effort required.
TEXT BOOKS:
1. Roger S. Pressman, “Software Engineering – A Practitioner‟s Approach”, Seventh Edition, Mc
Graw-Hill International Edition, 2010.
2. Ian Sommerville, “Software Engineering”, 9th Edition, Pearson Education Asia, 2011.
REFERENCES:
1. Rajib Mall, “Fundamentals of Software Engineering”, Third Edition, PHI Learning
PrivateLimited, 2009.
2. Pankaj Jalote, “Software Engineering, A Precise Approach”, Wiley India, 2010.
3. Kelkar S.A., “Software Engineering”, Prentice Hall of India Pvt Ltd, 2007.
4. Stephen R.Schach, “Software Engineering”, Tata McGraw-Hill Publishing Company
Limited,2007.
5. http://nptel.ac.in/.
1. Data Definition Commands, Data Manipulation Commands for inserting, deleting, updating
and retrieving Tables and Transaction Control statements
2. Database Querying – Simple queries, Nested queries, Sub queries and Joins
3. Views, Sequences, Synonyms
4. Database Programming: Implicit and Explicit Cursors
5. Procedures and Functions
6. Triggers
7. Exception Handling
8. Database Design using ER modeling, normalization and Implementation for any application
9. Database Connectivity with Front End Tools
10. Case Study using real life database applications
TOTAL: 60 PERIODS
OUTCOMES:
Upon completion of the course, the students will be able to:
Use typical data definitions and manipulation commands.
Design applications to test Nested and Join Queries
Implement simple applications that use Views
Implement applications that require a Front-end Tool
Critically analyze the use of Tables, Views, Functions and Procedures
LIST OF EXPERIMENTS
1. Basics of UNIX commands
2. Write programs using the following system calls of UNIX operating system
fork, exec, getpid, exit, wait, close, stat, opendir, readdir
3. Write C programs to simulate UNIX commands like cp, ls, grep, etc.
4. Shell Programming
5. Write C programs to implement the various CPU Scheduling Algorithms
6. Implementation of Semaphores
7. Implementation of Shared memory and IPC
8. Bankers Algorithm for Deadlock Avoidance
9. Implementation of Deadlock Detection Algorithm
10. Write C program to implement Threading & Synchronization Applications
11. Implementation of the following Memory Allocation Methods for fixed partition
a) First Fit b) Worst Fit c) Best Fit
12. Implementation of Paging Technique of Memory Management
13. Implementation of the following Page Replacement Algorithms
a) FIFO b) LRU c) LFU
57
14. Implementation of the various File Organization Techniques
15. Implementation of the following File Allocation Strategies
a) Sequential b) Indexed c) Linked
TOTAL: 60 PERIODS
OUTCOMES:
At the end of the course, the student should be able to
Compare the performance of various CPU Scheduling Algorithms
Implement Deadlock avoidance and Detection Algorithms
Implement Semaphores
Create processes and implement IPC
Analyze the performance of the various Page Replacement Algorithms
Implement File Organization and File Allocation Strategies
L T P C
HS8461 ADVANCED READING AND WRITING
0 0 2 1
OBJECTIVES:
• Strengthen the reading skills of students of engineering.
• Enhance their writing skills with specific reference to technical writing.
• Develop students’ critical thinking skills.
• Provide more opportunities to develop their project and proposal writing skills.
UNIT I
Reading - Strategies for effective reading-Use glosses and footnotes to aid reading
comprehension- Read and recognize different text types-Predicting content using photos and title
Writing-Plan before writing- Develop a paragraph: topic sentence, supporting sentences,
concluding sentence –Write a descriptive paragraph
UNIT II
Reading-Read for details-Use of graphic organizers to review and aid comprehension Writing-
State reasons and examples to support ideas in writing- Write a paragraph with reasons and
examples- Write an opinion paragraph
UNIT III
Reading- Understanding pronoun reference and use of connectors in a passage- speed reading
techniques-Writing- Elements of a good essay-Types of essays- descriptive-narrative- issue-
based-argumentative-analytical.
UNIT IV
Reading- Genre and Organization of Ideas- Writing- Email writing- visumes – Job application-
project writing-writing convincing proposals.
UNIT V
Reading- Critical reading and thinking- understanding how the text positions the reader- identify
Writing- Statement of Purpose- letter of recommendation- Vision statement
TOTAL: 30 PERIODS
OUTCOMES:
At the end of the course Learners will be able to:
Write different types of essays.
Write winning job applications.
58
Read and evaluate texts critically.
Display critical thinking in various professional contexts.
TEXT BOOKS:
1. Gramer F. Margot and Colin S. Ward Reading and Writing (Level 3) Oxford University
Press: Oxford, 2011
2. Debra Daise, CharlNorloff, and Paul Carne Reading and Writing (Level 4) Oxford
University Press: Oxford, 2011
REFERENCES:
1. Davis, Jason and Rhonda LIss.Effective Academic Writing (Level 3) Oxford University
Press: Oxford, 2006
2. E. Suresh Kumar and et al. Enriching Speaking and Writing Skills. Second Edition.
Orient Black swan: Hyderabad, 2012
3. Withrow, Jeans and et al. Inspired to Write. Readings and Tasks to develop writing
skills. Cambridge University Press: Cambridge, 2004
4. Goatly, Andrew. Critical Reading and Writing. Routledge: United States of America,
2000
5. Petelin, Roslyn and Marsh Durham. The Professional Writing Guide: Knowing Well
and Knowing Why. Business & Professional Publishing: Australia, 2004
59
OUTCOMES:
Upon successful completion of the course, students should be able to:
Apply the basic notions of groups, rings, fields which will then be used to solve related
problems.
Explain the fundamental concepts of advanced algebra and their role in modern
mathematics and applied contexts.
Demonstrate accurate and efficient use of advanced algebraic techniques.
Demonstrate their mastery by solving non - trivial problems related to the concepts, and by
proving simple theorems about the, statements proven by the text.
Apply integrated approach to number theory and abstract algebra, and provide a firm
basis for further reading and study in the subject.
TEXTBOOKS:
1. Grimaldi, R.P and Ramana, B.V., "Discrete and Combinatorial Mathematics", Pearson
Education, 5th Edition, New Delhi, 2007.
2. Koshy, T., “Elementary Number Theory with Applications”, Elsevier Publications,
New Delhi, 2002.
REFERENCES:
1. Lidl, R. and Pitz, G, "Applied Abstract Algebra", Springer Verlag, New Delhi, 2nd Edition, 2006.
2. Niven, I., Zuckerman.H.S., and Montgomery, H.L., “An Introduction to Theory of Numbers”,
John Wiley and Sons , Singapore, 2004.
3. San Ling and Chaoping Xing, “Coding Theory – A first Course”, Cambridge Publications,
Cambridge, 2004.
UNIT III 9
NETWORK LAYER
Network Layer Services – Packet switching – Performance – IPV4 Addresses – Forwarding
of IP Packets - Network Layer Protocols: IP, ICMP v4 – Unicast Routing Algorithms –
Protocols – Multicasting Basics – IPV6 Addressing – IPV6 Protocol.
60
TOTAL : 45 PERIODS
OUTCOMES:
On Completion of the course, the students should be able to:
Understand the basic layers and its functions in computer networks.
Evaluate the performance of a network.
Understand the basics of how data flows from one node to another.
Analyze and design routing algorithms.
Design protocols for various functions in the network.
Understand the working of various application layer protocols.
TEXT BOOK:
1. Behrouz A. Forouzan, Data Communications and Networking, Fifth Edition TMH,
2013.
REFERENCES
1. Larry L. Peterson, Bruce S. Davie, Computer Networks: A Systems Approach, Fifth
Edition, Morgan Kaufmann Publishers Inc., 2012.
2. William Stallings, Data and Computer Communications, Tenth Edition, Pearson
Education, 2013.
3. Nader F. Mir, Computer and Communication Networks, Second Edition, Prentice
Hall, 2014.
4. Ying-Dar Lin, Ren-Hung Hwang and Fred Baker, Computer Networks: An Open
Source Approach, McGraw Hill Publisher, 2011.
5. James F. Kurose, Keith W. Ross, Computer Networking, A Top-Down Approach
Featuring the Internet, Sixth Edition, Pearson Education, 2013.
UNIT IV MICROCONTROLLER 9
Architecture of 8051 – Special Function Registers(SFRs) - I/O Pins Ports and Circuits - Instruction
set - Addressing modes - Assembly language programming.
61
UNIT V INTERFACING MICROCONTROLLER 9
Programming 8051 Timers - Serial Port Programming - Interrupts Programming – LCD &
Keyboard Interfacing - ADC, DAC & Sensor Interfacing - External Memory Interface- Stepper
Motor and Waveform generation - Comparison of Microprocessor, Microcontroller, PIC and ARM
processors
TOTAL: 45 PERIODS
OUTCOMES:
At the end of the course, the students should be able to:
Understand and execute programs based on 8086 microprocessor.
Design Memory Interfacing circuits.
Design and interface I/O circuits.
Design and implement 8051 microcontroller based systems.
TEXT BOOKS:
1. Yu-Cheng Liu, Glenn A.Gibson, “Microcomputer Systems: The 8086 / 8088 Family -
Architecture, Programming and Design”, Second Edition, Prentice Hall of India, 2007.
(UNIT I- III)
2. Mohamed Ali Mazidi, Janice Gillispie Mazidi, Rolin McKinlay, “The 8051 Microcontroller and
Embedded Systems: Using Assembly and C”, Second Edition, Pearson education, 2011.
(UNIT IV-V)
REFERENCES:
1. Doughlas V.Hall, “Microprocessors and Interfacing, Programming and
Hardware”,TMH,2012
2. A.K.Ray,K.M.Bhurchandi,”Advanced Microprocessors and Peripherals “3rd edition, Tata
McGrawHill,2012
62
UNIT IV PROPERTIES OF CONTEXT FREE LANGUAGES 9
Normal Forms for CFG – Pumping Lemma for CFL – Closure Properties of CFL – Turing Machines
– Programming Techniques for TM.
UNIT V UNDECIDABILITY 9
Non Recursive Enumerable (RE) Language – Undecidable Problem with RE – Undecidable
Problems about TM – Post’s Correspondence Problem, The Class P and NP.
TOTAL :45PERIODS
OUTCOMES:
Upon completion of the course, the students will be able to:
Construct automata, regular expression for any pattern.
Write Context free grammar for any construct.
Design Turing machines for any language.
Propose computation solutions using Turing machines.
Derive whether a problem is decidable or not.
TEXT BOOK:
1. J.E.Hopcroft, R.Motwani and J.D Ullman, “Introduction to Automata Theory, Languages and
Computations”, Second Edition, Pearson Education, 2003.
REFERENCES:
1. H.R.Lewis and C.H.Papadimitriou, “Elements of the theory of Computation”, Second Edition,
PHI, 2003.
2. J.Martin, “Introduction to Languages and the Theory of Computation”, Third Edition, TMH, 2003.
3. Micheal Sipser, “Introduction of the Theory and Computation”, Thomson Brokecole, 1997.
63
Implementation Diagrams - UML package diagram - When to use package diagrams -
Component and Deployment Diagrams – When to use Component and Deployment diagrams
UNIT V TESTING 9
Object Oriented Methodologies – Software Quality Assurance – Impact of object orientation on
Testing – Develop Test Cases and Test Plans
TOTAL: 45 PERIODS
OUTCOMES:
At the end of the course, the students will be able to:
Express software design with UML diagrams
Design software applications using OO concepts.
Identify various scenarios based on software requirements
Transform UML based software design into pattern based design using design patterns
Understand the various testing methodologies for OO software
TEXT BOOKS:
1. Craig Larman, “Applying UML and Patterns: An Introduction to Object-Oriented Analysis and
Design and Iterative Development”, Third Edition, Pearson Education, 2005.
2. Ali Bahrami - Object Oriented Systems Development - McGraw Hill International Edition - 1999
REFERENCES:
1. Erich Gamma, a n d Richard Helm, Ralph Johnson, John Vlissides, “Design patterns: Elements
of Reusable Object-Oriented Software”, Addison-Wesley, 1995.
2. Martin Fowler, “UML Distilled: A Brief Guide to the Standard Object Modeling Language”,
Third edition, Addison Wesley, 2003.
LIST OF EXPERIMENTS:
8086 Programs using kits and MASM
1. Basic arithmetic and Logical operations
2. Move a data block without overlap
3. Code conversion, decimal arithmetic and Matrix operations.
4. Floating point operations, string manipulations, sorting and searching
5. Password checking, Print RAM size and system date
6. Counters and Time Delay
OUTCOMES:
At the end of the course, the student should be able to:
Write ALP Programmes for fixed and Floating Point and Arithmetic operations
Interface different I/Os with processor
Generate waveforms using Microprocessors
Execute Programs in 8051
Explain the difference between simulator and Emulator
SOFTWARE:
Intel Desktop Systems with MASM - 30 nos
8086 Assembler
8051 Cross Assembler
Draw standard UML diagrams using an UML modeling tool for a given case study and map design
to code and implement a 3 layered architecture. Test the developed code and validate whether the
SRS is satisfied.
1. Identify a software system that needs to be developed.
2. Document the Software Requirements Specification (SRS) for the identified system.
3. Identify use cases and develop the Use Case model.
4. Identify the conceptual classes and develop a Domain Model and also derive a Class
Diagram from that.
5. Using the identified scenarios, find the interaction between objects and represent them
using
UML Sequence and Collaboration Diagrams
6. Draw relevant State Chart and Activity Diagrams for the same system.
7. Implement the system as per the detailed design
8. Test the software system for all the scenarios identified as per the usecase diagram
9. Improve the reusability and maintainability of the software system by applying appropriate
65
design patterns.
10. Implement the modified system and test it for various scenarios
HARDWARE REQUIREMENTS
Standard PC
SOFTWARE REQUIREMENTS
1. Windows 7 or higher
2. ArgoUML that supports UML 1.4 and higher
3. Selenium, JUnit or Apache JMeter
LIST OF EXPERIMENTS
1. Learn to use commands like tcpdump, netstat, ifconfig, nslookup and traceroute. Capture
ping and traceroute PDUs using a network protocol analyzer and examine.
2. Write a HTTP web client program to download a web page using TCP sockets.
3. Applications using TCP sockets like:
Echo client and echo server
Chat
File Transfer
66
4. Simulation of DNS using UDP sockets.
5. Write a code simulating ARP /RARP protocols.
6. Study of Network simulator (NS) and Simulation of Congestion Control Algorithms using
NS.
7. Study of TCP/UDP performance using Simulation tool.
8. Simulation of Distance Vector/ Link State Routing algorithm.
9. Performance evaluation of Routing protocols using Simulation tool.
10. Simulation of error correction code (like CRC).
TOTAL: 60 PERIODS
OUTCOMES:
Upon Completion of the course, the students will be able to:
Implement various protocols using TCP and UDP.
Compare the performance of different transport layer protocols.
Use simulation tools to analyze the performance of various network protocols.
Analyze various routing algorithms.
Implement error correction codes.
SOFTWARE:
1. C / C++ / Java / Python / Equivalent Compiler 30
2. Network simulator like NS2/Glomosim/OPNET/ Packet Tracer / Equivalent
OUTCOMES:
At the end of the course, the students should be able to:
Construct a basic website using HTML and Cascading Style Sheets.
Build dynamic web page with validation using Java Script objects and by applying
different event handling mechanisms.
Develop server side programs using Servlets and JSP.
Construct simple web pages in PHP and to represent data in XML format.
Use AJAX and web services to develop interactive web applications
TEXT BOOK:
1. Deitel and Deitel and Nieto, “Internet and World Wide Web - How to Program”,
Prentice Hall, 5th Edition, 2011.
REFERENCES:
1. Stephen Wynkoop and John Burke “Running a Perfect Website”, QUE, 2nd
Edition,1999.
2. Chris Bates, Web Programming – Building Intranet Applications, 3rd Edition, Wiley
Publications, 2009.
3. Jeffrey C and Jackson, “Web Technologies A Computer Science Perspective”,
Pearson Education, 2011.
4. Gopalan N.P. and Akilandeswari J., “Web Technology”, Prentice Hall of India, 2011.
5. UttamK.Roy, “Web Technologies”, Oxford University Press, 2011.
68
UNIT II PROBLEM SOLVING METHODS 9
Problem solving Methods - Search Strategies- Uninformed - Informed - Heuristics - Local Search
Algorithms and Optimization Problems - Searching with Partial Observations - Constraint
Satisfaction Problems – Constraint Propagation - Backtracking Search - Game Playing - Optimal
Decisions in Games – Alpha - Beta Pruning - Stochastic Games
UNIT V APPLICATIONS 9
AI applications – Language Models – Information Retrieval- Information Extraction – Natural
Language Processing - Machine Translation – Speech Recognition – Robot – Hardware –
Perception – Planning – Moving
TOTAL :45 PERIODS
OUTCOMES:
Upon completion of the course, the students will be able to:
Use appropriate search algorithms for any AI problem
Represent a problem using first order and predicate logic
Provide the apt agent strategy to solve a given problem
Design software agents to solve a problem
Design applications for NLP that use Artificial Intelligence.
TEXT BOOKS:
1 S. Russell and P. Norvig, "Artificial Intelligence: A Modern Approach”, Prentice Hall, Third
Edition, 2009.
2 I. Bratko, “Prolog: Programming for Artificial Intelligence”, Fourth edition, Addison-Wesley
Educational Publishers Inc., 2011.
REFERENCES:
1. M. Tim Jones, “Artificial Intelligence: A Systems Approach(Computer Science)”, Jones
and Bartlett Publishers, Inc.; First Edition, 2008
2. Nils J. Nilsson, “The Quest for Artificial Intelligence”, Cambridge University Press,
2009.
3. William F. Clocksin and Christopher S. Mellish,” Programming in Prolog: Using the ISO
Standard”, Fifth Edition, Springer, 2003.
4. Gerhard Weiss, “Multi Agent Systems”, Second Edition, MIT Press, 2013.
5. David L. Poole and Alan K. Mackworth, “Artificial Intelligence: Foundations of
Computational Agents”, Cambridge University Press, 2010.
69
CS8601 MOBILE COMPUTING L T P C
3 0 0 3
OBJECTIVES:
To understand the basic concepts of mobile computing.
To learn the basics of mobile telecommunication system .
To be familiar with the network layer protocols and Ad-Hoc networks.
To know the basis of transport and application layer protocols.
To gain knowledge about different mobile platforms and application development.
UNIT I INTRODUCTION 9
Introduction to Mobile Computing – Applications of Mobile Computing- Generations of
Mobile Communication Technologies- Multiplexing – Spread spectrum -MAC Protocols –
SDMA- TDMA- FDMA- CDMA
TEXT BOOKS:
1. Jochen Schiller, “Mobile Communications”, PHI, Second Edition, 2003.
2. Prasant Kumar Pattnaik, Rajib Mall, “Fundamentals of Mobile Computing”, PHI
Learning Pvt.Ltd, New Delhi – 2012
REFERENCES
1. Dharma Prakash Agarval, Qing and An Zeng, "Introduction to Wireless and Mobile
systems",Thomson Asia Pvt Ltd, 2005.
2. Uwe Hansmann, Lothar Merk, Martin S. Nicklons and Thomas Stober, “Principles of
Mobile Computing”, Springer, 2003.
3. William.C.Y.Lee,“Mobile Cellular Telecommunications-Analog and Digital Systems”,
Second Edition,TataMcGraw Hill Edition ,2006.
4. C.K.Toh, “AdHoc Mobile Wireless Networks”, First Edition, Pearson Education, 2002.
70
5. Android Developers : http://developer.android.com/index.html
6. Apple Developer : https://developer.apple.com/
7. Windows Phone DevCenter : http://developer.windowsphone.com
8. BlackBerry Developer : http://developer.blackberry.com
LIST OF EXPERIMENTS:
1. Develop a lexical analyzer to recognize a few patterns in C. (Ex. identifiers, constants,
comments, operators etc.). Create a symbol table, while recognizing identifiers.
2. Implement a Lexical Analyzer using Lex Tool
3. Implement an Arithmetic Calculator using LEX and YACC
4. Generate three address code for a simple program using LEX and YACC.
5. Implement simple code optimization techniques (Constant folding, Strength reduction and
Algebraic transformation)
6. Implement back-end of the compiler for which the three address code is given as input and
the 8086 assembly language code is produced as output.
PRACTICALS 30 PERIODS
THEORY 45 PERIODS
TOTAL : 75 PERIODS
OUTCOMES:
On Completion of the course, the students should be able to:
Understand the different phases of compiler.
Design a lexical analyzer for a sample language.
71
Apply different parsing algorithms to develop the parsers for a given grammar.
Understand syntax-directed translation and run-time environment.
Learn to implement code optimization techniques and a simple code generator.
Design and implement a scanner and a parser using LEX and YACC tools.
TEXT BOOK:
1. Alfred V. Aho, Monica S. Lam, Ravi Sethi, Jeffrey D. Ullman, Compilers: Principles,
Techniques and Toolsǁ, Second Edition, Pearson Education, 2009.
REFERENCES
1. Randy Allen, Ken Kennedy, Optimizing Compilers for Modern Architectures: A
Dependence based Approach, Morgan Kaufmann Publishers, 2002.
2. Steven S. Muchnick, Advanced Compiler Design and Implementationǁ, Morgan Kaufmann
Publishers - Elsevier Science, India, Indian Reprint 2003.
3. Keith D Cooper and Linda Torczon, Engineering a Compilerǁ, Morgan Kaufmann
Publishers Elsevier Science, 2004.
4. V. Raghavan, Principles of Compiler Designǁ, Tata McGraw Hill Education Publishers,
2010.
5. Allen I. Holub, Compiler Design in Cǁ, Prentice-Hall Software Series, 1993.
UNIT I INTRODUCTION 9
Introduction: Definition –Relation to computer system components –Motivation –Relation to
parallel systems – Message-passing systems versus shared memory systems –Primitives for
distributed communication –Synchronous versus asynchronous executions –Design issues and
challenges. A model of distributed computations: A distributed program –A model of distributed
executions –Models of communication networks –Global state – Cuts –Past and future cones of
an event –Models of process communications. Logical Time: A framework for a system of logical
clocks –Scalar time –Vector time – Physical clock synchronization: NTP.
TOTAL: 45 PERIODS
OUTCOMES:
At the end of this course, the students will be able to:
Elucidate the foundations and issues of distributed systems
Understand the various synchronization issues and global state for distributed systems.
Understand the Mutual Exclusion and Deadlock detection algorithms in distributed systems
Describe the agreement protocols and fault tolerance mechanisms in distributed systems.
Describe the features of peer-to-peer and distributed shared memory systems
TEXT BOOKS:
1. Kshemkalyani, Ajay D., and Mukesh Singhal. Distributed computing: principles, algorithms,
and systems. Cambridge University Press, 2011.
2. George Coulouris, Jean Dollimore and Tim Kindberg, “Distributed Systems Concepts and
Design”, Fifth Edition, Pearson Education, 2012.
REFERENCES:
1. Pradeep K Sinha, "Distributed Operating Systems: Concepts and Design", Prentice Hall of
India, 2007.
2. Mukesh Singhal and Niranjan G. Shivaratri. Advanced concepts in operating systems.
McGraw-Hill, Inc., 1994.
3. Tanenbaum A.S., Van Steen M., “Distributed Systems: Principles and Paradigms”,
Pearson Education, 2007.
4. Liu M.L., “Distributed Computing, Principles and Applications”, Pearson Education, 2004.
5. Nancy A Lynch, “Distributed Algorithms”, Morgan Kaufman Publishers, USA, 2003.
LIST OF EXPERIMENTS
1. Create a web page with the following using HTML
a. To embed a map in a web page
b. To fix the hot spots in that map
c. Show all the related information when the hot spots are clicked.
73
2. Create a web page with the following.
a. Cascading style sheets.
b. Embedded style sheets.
c. Inline style sheets. Use our college information for the web pages.
3. Validate the Registration, user login, user profile and payment by credit card pages using
JavaScript.
4. Write programs in Java using Servlets:
i. To invoke servlets from HTML forms
ii. Session tracking using hidden form fields and Session tracking for a hit count
5. Write programs in Java to create three-tier applications using servlets for conducting on-
line examination for displaying student mark list. Assume that student information is
available in a database which has been stored in a database server.
6. Install TOMCAT web server. Convert the static web pages of programs into dynamic web
pages using servlets (or JSP) and cookies. Hint: Users information (user id, password,
credit card number) would be stored in web.xml. Each user should have a separate
Shopping Cart.
7. Redo the previous task using JSP by converting the static web pages into dynamic web
pages. Create a database with user information and books information. The books
catalogue should be dynamically loaded from the database.
8. Create and save an XML document at the server, which contains 10 users Information.
Write a Program, which takes user Id as an input and returns the User details by taking
the user information from the XML document
SOFTWARE REQUIRED:
Dream Weaver or Equivalent, MySQL or Equivalent, Apache Server, WAMP/XAMPP
74
LISTOF EXPERIMENTS
1. Develop an application that uses GUI components, Font and Colours
2. Develop an application that uses Layout Managers and event listeners.
3. Write an application that draws basic graphical primitives on the screen.
4. Develop an application that makes use of databases.
5. Develop an application that makes use of Notification Manager
6. Implement an application that uses Multi-threading
7. Develop a native application that uses GPS location information
8. Implement an application that writes data to the SD card.
9. Implement an application that creates an alert upon receiving a message
10. Write a mobile application that makes use of RSS feed
11. Develop a mobile application to send an email.
12. Develop a Mobile application for simple needs (Mini Project)
TOTAL: 60 PERIODS
OUTCOMES:
Upon Completion of the course, the students will be able to:
Develop mobile applications using GUI and Layouts.
Develop mobile applications using Event Listener.
Develop mobile applications using Databases.
Develop mobile applications using RSS Feed, Internal/External Storage, SMS, Multi-
threading and GPS.
Analyze and discover own mobile app for simple needs.
REFERENCES:
1. Build Your Own Security Lab, Michael Gregg, Wiley India
UNIT I
Introduction to Soft Skills-- Hard skills & soft skills - employability and career Skills—Grooming as a
professional with values—Time Management—General awareness of Current Affairs
UNIT II
Self-Introduction-organizing the material - Introducing oneself to the audience – introducing the topic –
answering questions – individual presentation practice–– presenting the visuals effectively – 5 minute
presentations
75
UNIT III
Introduction to Group Discussion— Participating in group discussions – understanding group dynamics
- brainstorming the topic -– questioning and clarifying –GD strategies- activities to improve GD skills
UNIT IV
Interview etiquette – dress code – body language – attending job interviews– telephone/skype
interview -one to one interview &panel interview – FAQs related to job interviews
UNIT V
Recognizing differences between groups and teams- managing time-managing stress- networking
professionally- respecting social protocols-understanding career management-developing a long-term
career plan-making career changes
TOTAL : 30 PERIODS
OUTCOMES:
At the end of the course Learners will be able to:
• Make effective presentations
• Participate confidently in Group Discussions.
• Attend job interviews and be successful in them.
• Develop adequate Soft Skills required for the workplace
Recommended Software
1. Open Source Software
2. Win English
REFERENCES:
1. Butterfield, Jeff Soft Skills for Everyone. Cengage Learning: New Delhi, 2015
2. E. Suresh Kumar et al. Communication for Professional Success. Orient Blackswan:
Hyderabad, 2015
3. Interact English Lab Manual for Undergraduate Students,. OrientBalckSwan: Hyderabad, 2016.
4. Raman, Meenakshi and Sangeeta Sharma. Professional Communication. Oxford University
Press: Oxford, 2014
5. S. Hariharanetal. Soft Skills. MJP Publishers: Chennai, 2010.
UNIT II PLANNING 9
Nature and purpose of planning – planning process – types of planning – objectives – setting
objectives – policies – Planning premises – Strategic Management – Planning Tools and
Techniques – Decision making steps and process.
UNIT III ORGANISING 9
Nature and purpose – Formal and informal organization – organization chart – organization
structure – types – Line and staff authority – departmentalization – delegation of authority –
76
centralization and decentralization – Job Design - Human Resource Management – HR Planning,
Recruitment, selection, Training and Development, Performance Management , Career planning
and management
UNIT IV DIRECTING 9
Foundations of individual and group behaviour – motivation – motivation theories – motivational
techniques – job satisfaction – job enrichment – leadership – types and theories of leadership –
communication – process of communication – barrier in communication – effective communication
–communication and IT.
UNIT V CONTROLLING 9
System and process of controlling – budgetary and non-budgetary control techniques – use of
computers and IT in Management control – Productivity problems and management – control and
performance – direct and preventive control – reporting.
TOTAL: 45 PERIODS
OUTCOMES:
Upon completion of the course, students will be able to have clear understanding of
managerial functions like planning, organizing, staffing, leading & controlling and have same
basic knowledge on international aspect of management
TEXTBOOKS:
1. Stephen P. Robbins & Mary Coulter, “Management”, Prentice Hall (India) Pvt. Ltd., 10th Edition,
2009.
2. JAF Stoner, Freeman R.E and Daniel R Gilbert “Management”, Pearson Education, 6th
Edition, 2004.
REFERENCES:
1. Stephen A. Robbins & David A. Decenzo & Mary Coulter, “Fundamentals of Management”
Pearson Education, 7th Edition, 2011.
2. Robert Kreitner & Mamata Mohapatra, “ Management”, Biztantra, 2008.
3. Harold Koontz & Heinz Weihrich “Essentials of management” Tata McGraw Hill,1998.
4. Tripathy PC & Reddy PN, “Principles of Management”, Tata McGraw Hill, 1999
UNIT I INTRODUCTION 9
Security trends - Legal, Ethical and Professional Aspects of Security, Need for Security at
Multiple levels, Security Policies - Model of network security – Security attacks, services and
mechanisms – OSI security architecture – Classical encryption techniques: substitution
techniques, transposition techniques, steganography- Foundations of modern cryptography:
perfect security – information theory – product cryptosystem – cryptanalysis.
OUTCOMES:
At the end of the course, the student should be able to:
Understand the fundamentals of networks security, security architecture, threats and
vulnerabilities
Apply the different cryptographic operations of symmetric cryptographic algorithms
Apply the different cryptographic operations of public key cryptography
Apply the various Authentication schemes to simulate different applications.
Understand various Security practices and System security standards
TEXT BOOK:
1. William Stallings, Cryptography and Network Security: Principles and Practice, PHI
3rd Edition, 2006.
REFERENCES:
1. C K Shyamala, N Harini and Dr. T R Padmanabhan: Cryptography and Network
Security, Wiley India Pvt.Ltd
2. BehrouzA.Foruzan, Cryptography and Network Security, Tata McGraw Hill 2007.
3. Charlie Kaufman, Radia Perlman, and Mike Speciner, Network Security: PRIVATE
Communication in a PUBLIC World, Prentice Hall, ISBN 0-13-046019-2
78
UNIT II CLOUD ENABLING TECHNOLOGIES 10
Service Oriented Architecture – REST and Systems of Systems – Web Services – Publish-
Subscribe Model – Basics of Virtualization – Types of Virtualization – Implementation Levels of
Virtualization – Virtualization Structures – Tools and Mechanisms – Virtualization of CPU –
Memory – I/O Devices –Virtualization Support and Disaster Recovery.
TOTAL: 45 PERIODS
OUTCOMES:
On Completion of the course, the students should be able to:
Articulate the main concepts, key technologies, strengths and limitations of cloud
computing.
Learn the key and enabling technologies that help in the development of cloud.
Develop the ability to understand and use the architecture of compute and storage cloud,
service and delivery models.
Explain the core issues of cloud computing such as resource management and security.
Be able to install and use current cloud technologies.
Evaluate and choose the appropriate technologies, algorithms and approaches for
implementation and use of cloud.
TEXT BOOKS:
1. Kai Hwang, Geoffrey C. Fox, Jack G. Dongarra, "Distributed and Cloud Computing, From
Parallel Processing to the Internet of Things", Morgan Kaufmann Publishers, 2012.
2. Rittinghouse, John W., and James F. Ransome, “Cloud Computing: Implementation,
Management and Security”, CRC Press, 2017.
REFERENCES:
1. Rajkumar Buyya, Christian Vecchiola, S. ThamaraiSelvi, “Mastering Cloud Computing”, Tata
Mcgraw Hill, 2013.
2. Toby Velte, Anthony Velte, Robert Elsenpeter, "Cloud Computing - A Practical Approach”, Tata
Mcgraw Hill, 2009.
3. George Reese, "Cloud Application Architectures: Building Applications and Infrastructure in the
Cloud: Transactional Systems for EC2 and Beyond (Theory in Practice)”, O'Reilly, 2009.
79
CS8711 CLOUD COMPUTING LABORATORY LTPC
0 042
OBJECTIVES:
To develop web applications in cloud
To learn the design and development process involved in creating a cloud based
application
To learn to implement and use parallel programming using Hadoop
TOTAL : 60 PERIODS
OUTCOMES:
On completion of this course, the students will be able to:
Configure various virtualization tools such as Virtual Box, VMware workstation.
Design and deploy a web application in a PaaS environment.
Learn how to simulate a cloud environment to implement new schedulers.
Install and use a generic cloud environment that can be used as a private cloud.
Manipulate large data sets in a parallel environment.
LIST OF EXPERIMENTS
1. Perform encryption, decryption using the following substitution techniques
(i) Ceaser cipher, (ii) playfair cipher iii) Hill Cipher iv) Vigenere cipher
2. Perform encryption and decryption using following transposition techniques
i) Rail fence ii) row & Column Transformation
3. Apply DES algorithm for practical applications.
4. Apply AES algorithm for practical applications.
5. Implement RSA Algorithm using HTML and JavaScript
6. Implement the Diffie-Hellman Key Exchange algorithm for a given problem.
7. Calculate the message digest of a text using the SHA-1 algorithm.
8. Implement the SIGNATURE SCHEME - Digital Signature Standard.
9. Demonstrate intrusion detection system (ids) using any tool eg. Snort or any other s/w.
80
10. Automated Attack and Penetration Tools
Exploring N-Stalker, a Vulnerability Assessment Tool
11. Defeating Malware
i) Building Trojans ii) Rootkit Hunter
TOTAL: 60 PERIODS
OUTCOMES:
Upon Completion of the course, the students will be able to:
Develop code for classical Encryption Techniques to solve the problems.
Build cryptosystems by applying symmetric and public key encryption algorithms.
Construct code for authentication algorithms.
Develop a signature scheme using Digital signature standard.
Demonstrate the network security system using open source tools
REFERENCES:
1. Build Your Own Security Lab, Michael Gregg, Wiley India
The students in a group of 3 to 4 works on a topic approved by the head of the department under
the guidance of a faculty member and prepares a comprehensive project report after completing
the work to the satisfaction of the supervisor. The progress of the project is evaluated based on a
minimum of three reviews. The review committee may be constituted by the Head of the
Department. A project report is required at the end of the semester. The project work is
evaluated based on oral presentation and the project report jointly by external and internal
examiners constituted by the Head of the Department.
TOTAL: 300 PERIODS
OUTCOME:
On Completion of the project work students will be in a position to take up any
challenging practical problems and find solution by formulating proper methodology.
81
UNIT I DATA WAREHOUSING, BUSINESS ANALYSIS AND ON-LINE ANALYTICAL
PROCESSING (OLAP) 9
Basic Concepts - Data Warehousing Components – Building a Data Warehouse – Database
Architectures for Parallel Processing – Parallel DBMS Vendors - Multidimensional Data Model –
Data Warehouse Schemas for Decision Support, Concept Hierarchies -Characteristics of OLAP
Systems – Typical OLAP Operations, OLAP and OLTP.
TEXT BOOK:
1. Jiawei Han and Micheline Kamber, “Data Mining Concepts and Techniques”, Third Edition,
Elsevier, 2012.
REFERENCES:
1. Alex Berson and Stephen J.Smith, “Data Warehousing, Data Mining & OLAP”, Tata
McGraw – Hill Edition, 35th Reprint 2016.
2. K.P. Soman, Shyam Diwakar and V. Ajay, “Insight into Data Mining Theory and Practice”,
Eastern Economy Edition, Prentice Hall of India, 2006.
3. Ian H.Witten and Eibe Frank, “Data Mining: Practical Machine Learning Tools and
Techniques”, Elsevier, Second Edition.
82
IT8076 SOFTWARE TESTING LTPC
300 3
OBJECTIVES:
To learn the criteria for test cases.
To learn the design of test cases.
To understand test management and test automation techniques.
To apply test metrics and measurements.
UNIT I INTRODUCTION 9
Testing as an Engineering Activity – Testing as a Process – Testing Maturity Model- Testing
axioms – Basic definitions – Software Testing Principles – The Tester’s Role in a Software
Development Organization – Origins of Defects – Cost of defects – Defect Classes – The Defect
Repository and Test Design –Defect Examples- Developer/Tester Support of Developing a Defect
Repository.
83
TEXT BOOKS:
1. Srinivasan Desikan and Gopalaswamy Ramesh, “Software Testing – Principles and Practices”,
Pearson Education, 2006.
2. Ron Patton, “Software Testing”, Second Edition, Sams Publishing, Pearson Education, 2007.
AU Library.com
REFERENCES:
1. Ilene Burnstein, “Practical Software Testing”, Springer International Edition, 2003.
2. Edward Kit,” Software Testing in the Real World – Improving the Process”, Pearson
Education, 1995.
3. Boris Beizer,” Software Testing Techniques” – 2nd Edition, Van Nostrand Reinhold, New
York, 1990.
4. Aditya P. Mathur, “Foundations of Software Testing _ Fundamental Algorithms
and Techniques”, Dorling Kindersley (India) Pvt. Ltd., Pearson Education, 2008.
TOTAL : 45 PERIODS
84
OUTCOMES:
Upon completion of the course, students will be able to:
Describe the architecture and programming of ARM processor.
Explain the concepts of embedded systems
Understand the Concepts of peripherals and interfacing of sensors.
Capable of using the system design techniques to develop firmware
Illustrate the code for constructing a system
TEXT BOOKS:
1.Marilyn Wolf, “Computers as Components - Principles of Embedded Computing System
Design”, Third Edition “Morgan Kaufmann Publisher (An imprint from Elsevier), 2012. (unit I & II)
2 https://www.coursera.org/learn/interface-with-arduino#syllabus (Unit III)
3 .Michael J. Pont, “Embedded C”, 2 nd Edition, Pearson Education, 2008.(Unit IV & V)
REFERENCES:
1.Shibu K.V, “Introduction to Embedded Systems”, McGraw Hill.2014
2.Jonathan W.Valvano, “Embedded Microcomputer Systems Real Time Interfacing”, Third Edition
Cengage Learning, 2012
3 Raj Kamal, “Embedded Systems-Architecture,programming and design”, 3 edition,TMH.2015
4. Lyla, “Embedded Systems”, Pearson , 2013
6. David E. Simon, “An Embedded Software Primer”, Pearson Education,2000.
85
UNIT IV AGILITY AND REQUIREMENTS ENGINEERING 9
Impact of Agile Processes in RE–Current Agile Practices – Variance – Overview of RE Using Agile
– Managing Unstable Requirements – Requirements Elicitation – Agile Requirements Abstraction
Model – Requirements Management in Agile Environment, Agile Requirements Prioritization –
Agile Requirements Modeling and Generation – Concurrency in Agile Requirements Generation.
OUTCOMES:
Upon completion of the course, the students will be able to:
Realize the importance of interacting with business stakeholders in determining the
requirements for a software system
Perform iterative software development processes: how to plan them, how to execute
them.
Point out the impact of social aspects on software development success.
Develop techniques and tools for improving team collaboration and software quality.
Perform Software process improvement as an ongoing task for development teams.
Show how agile approaches can be scaled up to the enterprise level.
TEXT BOOKS:
1. David J. Anderson and Eli Schragenheim, “Agile Management for Software Engineering:
Applying the Theory of Constraints for Business Results”, Prentice Hall, 2003.
2. Hazza and Dubinsky, “Agile Software Engineering, Series: Undergraduate Topics in
Computer Science”, Springer, 2009.
REFERENCES:
1. Craig Larman, “Agile and Iterative Development: A Manager‘s Guide”, Addison-Wesley,
2004.
2. Kevin C. Desouza, “Agile Information Systems: Conceptualization, Construction, and
Management”, Butterworth-Heinemann, 2007.
UNIT II 9
Trees -Properties- Distance and Centres - Types - Rooted Tree-- Tree Enumeration-
Labeled Tree - Unlabeled Tree - Spanning Tree - Fundamental Circuits- Cut Sets -
Properties - Fundamental Circuit and Cut-set- Connectivity- Separability -Related
Theorems.
86
UNIT III 9
Network Flows - Planar Graph - Representation - Detection - Dual Graph - Geometric and
Combinatorial Dual - Related Theorems - Digraph - Properties - Euler Digraph.
UNIT IV 9
Matrix Representation - Adjacency matrix- Incidence matrix- Circuit matrix - Cut-set matrix -
Path Matrix- Properties - Related Theorems - Correlations. Graph Coloring - Chromatic
Polynomial - Chromatic Partitioning - Matching - Covering - Related Theorems.
UNIT V 9
Graph Algorithms- Connectedness and Components- Spanning Tree- Fundamental
Circuits- Cut Vertices- Directed Circuits- Shortest Path - Applications overview.
TOTAL : 45 PERIODS
OUTCOMES:
Upon completion of this course, the students should be able to
Understand the basic concepts of graphs, and different types of graphs
Understand the properties, theorems and be able to prove theorems.
Apply suitable graph model and algorithm for solving applications.
TEXT BOOKS:
1. Narsingh Deo, "Graph Theory with Application to Engineering and Computer
Science", Prentice-Hall of India Pvt.Ltd, 2003.
2. L.R.Foulds , "Graph Theory Applications", Springer ,2016.
REFERENCES:
1. Bondy, J. A. and Murty, U.S.R., "Graph Theory with Applications", North Holland
Publication,2008.
2. West, D. B., “Introduction to Graph Theory”, Pearson Education, 2011.
3. John Clark, Derek Allan Holton, “A First Look at Graph Theory”, World Scientific
Publishing Company, 1991.
4. Diestel, R, "Graph Theory", Springer,3rd Edition,2006.
5. Kenneth H.Rosen, "Discrete Mathematics and Its Applications", Mc Graw Hill ,
2007.
L T P C
IT8071 DIGITAL SIGNAL PROCESSING 3 0 0 3
OBJECTIVES:
To understand the basics of discrete time signals, systems and their classifications.
To analyze the discrete time signals in both time and frequency domain.
To design lowpass digital IIR filters according to predefined specifications based on analog
filter theory and analog-to-digital filter transformation.
To design Linear phase digital FIR filters using fourier method, window technique
To realize the concept and usage of DSP in various engineering fields.
87
UNIT III INFINITE IMPULSE RESPONSE FILTERS 9
Frequency response of Analog and Digital IIR filters–Realization of IIR filter–Design of analog low
pass filter–Analog to Digital filter Transformation using Bilinear Transformation and Impulse Invariant
method–Design of digital IIR filters (LPF, HPF, BPF, and BRF) using various transformation
techniques.
TEXT BOOK:
1. John G. Proakis & Dimitris G.Manolakis, “Digital Signal Processing – Principles, Algorithms &
Applications”, Fourth Edition, Pearson Education / Prentice Hall, 2007.
REFERENCES
1. Richard G. Lyons, “Understanding Digital Signal Processing”. Second Edition, Pearson
Education.
2. A.V.Oppenheim, R.W. Schafer and J.R. Buck, “Discrete-Time Signal Processing”, 8th Indian
Reprint, Pearson, 2004.
3. Emmanuel C.Ifeachor, & Barrie.W.Jervis, “Digital Signal Processing”, Second Edition,
Pearson Education / Prentice Hall, 2002.
4. William D. Stanley, “Digital Signal Processing”, Second Edition, Reston Publications.
UNIT I INTRODUCTION 9
Introduction to IPRs, Basic concepts and need for Intellectual Property - Patents, Copyrights,
Geographical Indications, IPR in India and Abroad – Genesis and Development – the way from
WTO to WIPO –TRIPS, Nature of Intellectual Property, Industrial Property, technological
Research, Inventions and Innovations – Important examples of IPR.
88
UNIT III AGREEMENTS AND LEGISLATIONS 10
International Treaties and Conventions on IPRs, TRIPS Agreement, PCT Agreement, Patent Act
of India, Patent Amendment Act, Design Act, Trademark Act, Geographical Indication Act.
TOTAL : 45 PERIODS
OUTCOME:
Ability to manage Intellectual Property portfolio to enhance the value of the firm.
TEXT BOOKS:
1. V. Scople Vinod, Managing Intellectual Property, Prentice Hall of India pvt Ltd, 2012
2. S. V. Satakar, “Intellectual Property Rights and Copy Rights, Ess Ess Publications, New Delhi,
2002
REFERENCES:
1. Deborah E. Bouchoux, “Intellectual Property: The Law of Trademarks, Copyrights, Patents and
Trade Secrets”, Cengage Learning, Third Edition, 2012.
2. Prabuddha Ganguli,”Intellectual Property Rights: Unleashing the Knowledge Economy”,
McGraw Hill Education, 2011.
3. Edited by Derek Bosworth and Elizabeth Webster, The Management of Intellectual Property,
Edward Elgar Publishing Ltd., 2013.
89
UNIT III ASSOCIATION AND RECOMMENDATION SYSTEM 9
Advanced Analytical Theory and Methods: Association Rules - Overview - Apriori Algorithm -
Evaluation of Candidate Rules - Applications of Association Rules - Finding Association& finding
similarity - Recommendation System: Collaborative Recommendation- Content Based
Recommendation - Knowledge Based Recommendation- Hybrid Recommendation Approaches.
UNIT IV STREAM MEMORY 9
Introduction to Streams Concepts – Stream Data Model and Architecture - Stream Computing,
Sampling Data in a Stream – Filtering Streams – Counting Distinct Elements in a Stream –
Estimating moments – Counting oneness in a Window – Decaying Window – Real time Analytics
Platform(RTAP) applications - Case Studies - Real Time Sentiment Analysis, Stock Market
Predictions. Using Graph Analytics for Big Data: Graph Analytics
OUTCOMES:
Upon completion of the course, the students will be able to:
Work with big data tools and its analysis techniques
Analyze data by utilizing clustering and classification algorithms
Learn and apply different mining algorithms and recommendation systems for large
volumes of data
Perform analytics on data streams
Learn NoSQL databases and management.
TEXT BOOKS:
1. Anand Rajaraman and Jeffrey David Ullman, "Mining of Massive Datasets", Cambridge
University Press, 2012.
2. David Loshin, "Big Data Analytics: From Strategic Planning to Enterprise Integration with
Tools, Techniques, NoSQL, and Graph", Morgan Kaufmann/El sevier Publishers, 2013.
REFERENCES:
1. EMC Education Services, "Data Science and Big Data Analytics: Discovering, Analyzing,
Visualizing and Presenting Data", Wiley publishers, 2015.
2. Bart Baesens, "Analytics in a Big Data World: The Essential Guide to Data Science and its
Applications", Wiley Publishers, 2015.
3. Dietmar Jannach and Markus Zanker, "Recommender Systems: An Introduction",
Cambridge University Press, 2010.
4. Kim H. Pries and Robert Dunnigan, "Big Data Analytics: A Practical Guide for Managers "
CRC Press, 2015.
5. Jimmy Lin and Chris Dyer, "Data-Intensive Text Processing with MapReduce", Synthesis
Lectures on Human Language Technologies, Vol. 3, No. 1, Pages 1-177, Morgan Claypool
publishers, 2010.
90
CS8082 MACHINE LEARNING TECHNIQUES LTPC
3 003
OBJECTIVES:
To understand the need for machine learning for various problem solving
To study the various supervised, semi-supervised and unsupervised learning algorithms in
machine learning
To understand the latest trends in machine learning
To design appropriate machine learning algorithms for problem solving
UNIT I INTRODUCTION 9
Learning Problems – Perspectives and Issues – Concept Learning – Version Spaces and
Candidate Eliminations – Inductive bias – Decision Tree learning – Representation – Algorithm –
Heuristic Space Search.
TEXT BOOK:
1. Tom M. Mitchell, “Machine Learning”, McGraw-Hill E du c at i on ( In d i a ) P r i v ate
L i m i t e d, 20 13 .
REFERENCES:
1. Ethem Alpaydin, “Introduction to Machine Learning (Adaptive Computation and
Machine Learning)”, The MIT Press 2004.
2. Stephen Marsland, “Machine Learning: An Algorithmic Perspective”, CRC Press, 2009.
91
CS8092 COMPUTER GRAPHICS AND MULTIMEDIA L T P C
3 0 0 3
OBJECTIVES:
To develop an understanding and awareness how issues such as content, information
architecture, motion, sound, design, and technology merge to form effective and
compelling interactive experiences for a wide range of audiences and end users.
To become familiar with various software programs used in the creation and
implementation of multi- media
To appreciate the importance of technical ability and creativity within design practice.
To gain knowledge about graphics hardware devices and software used.
To understand the two-dimensional graphics and their transformations.
To understand the three-dimensional graphics and their transformations.
To appreciate illumination and color models
To become familiar with understand clipping techniques
To become familiar with Blender Graphics
TEXT BOOKS:
1. Donald Hearn and Pauline Baker M, “Computer Graphics", Prentice Hall, New Delhi, 2007 [
UNIT I – III ]
2. Andleigh, P. K and Kiran Thakrar, “Multimedia Systems and Design”, PHI, 2003. [ UNIT
IV,V ]
REFERENCES:
1. Judith Jeffcoate, “Multimedia in practice: Technology and Applications”, PHI, 1998.
2. Foley, Vandam, Feiner and Hughes, “Computer Graphics: Principles and
Practice”, 2nd Edition, Pearson Education, 2003.
3. Jeffrey McConnell, “Computer Graphics: Theory into Practice”, Jones and Bartlett
Publishers,2006.
4. Hill F S Jr., "Computer Graphics", Maxwell Macmillan , 1990.
5. Peter Shirley, Michael Ashikhmin, Michael Gleicher, Stephen R Marschner, Erik Reinhard,
KelvinSung, and AK Peters, “Fundamentals of Computer Graphics”, CRC Press, 2010.
6. William M. Newman and Robert F.Sproull, “Principles of Interactive Computer Graphics”,
Mc Graw Hill 1978.
https://www.blender.org/support/tutorials/
93
UNIT II PROJECT LIFE CYCLE AND EFFORT ESTIMATION 9
Software process and Process Models – Choice of Process models - Rapid Application development
– Agile methods – Dynamic System Development Method – Extreme Programming– Managing
interactive processes – Basics of Software estimation – Effort and Cost estimation techniques –
COSMIC Full function points - COCOMO II - a Parametric Productivity Model.
TEXT BOOK:
1. Bob Hughes, Mike Cotterell and Rajib Mall: Software Project Management – Fifth Edition,
Tata McGraw Hill, New Delhi, 2012.
REFERENCES:
1. Robert K. Wysocki “Effective Software Project Management” – Wiley Publication, 2011.
2. Walker Royce: “Software Project Management”- Addison-Wesley, 1998.
3. Gopalaswamy Ramesh, “Managing Global Software Projects” – McGraw Hill Education
(India), Fourteenth Reprint 2013.
94
CS8081 INTERNET OF THINGS LTPC
3 0 03
OBJECTIVES:
To understand Smart Objects and IoT Architectures
To learn about various IOT-related protocols
To build simple IoT Systems using Arduino and Raspberry Pi.
To understand data analytics and cloud in the context of IoT
To develop IoT infrastructure for popular applications
TEXTBOOK:
1. David Hanes, Gonzalo Salgueiro, Patrick Grossetete, Rob Barton and Jerome Henry, “IoT
Fundamentals: Networking Technologies, Protocols and Use Cases for Internet of Things,
Cisco Press, 2017
95
REFERENCES:
1. Arshdeep Bahga, Vijay Madisetti, “Internet of Things – A hands-on approach”, Universities
Press, 2015
2. Olivier Hersent, David Boswarthick, Omar Elloumi , “The Internet of Things – Key applications
and Protocols”, Wiley, 2012 (for Unit 2).
3. Jan Ho¨ ller, Vlasios Tsiatsis , Catherine Mulligan, Stamatis , Karnouskos, Stefan Avesand.
David Boyle, "From Machine-to-Machine to the Internet of Things - Introduction to a New Age of
Intelligence", Elsevier, 2014.
4. Dieter Uckelmann, Mark Harrison, Michahelles, Florian (Eds), “Architecting the Internet of
Things”, Springer, 2011.
5. Michael Margolis, Arduino Cookbook, Recipes to Begin, Expand, and Enhance Your Projects,
2nd Edition, O'Reilly Media, 2011.
https://www.arduino.cc/
https://www.ibm.com/smarterplanet/us/en/?ca=v_smarterplanet
UNIT I XML 9
XML document structure – Well-formed and valid documents – DTD – XML Schema – Parsing
XML using DOM, SAX – XPath - XML Transformation and XSL – Xquery
REFERENCES:
1. James McGovern, Sameer Tyagi, Michael E Stevens, Sunil Mathew, “Java Web Services
Architecture”, Elsevier, 2003.
2. Ron Schmelzer et al. “ XML and Web Services”, Pearson Education, 2002.
3. Frank P.Coyle, “XML, Web Services and the Data Revolution”, Pearson Education,
2002
UNIT I INTRODUCTION 9
Introduction - Need for quality - Evolution of quality - Definitions of quality - Dimensions of product
and service quality - Basic concepts of TQM - TQM Framework - Contributions of Deming, Juran
and Crosby - Barriers to TQM - Customer focus - Customer orientation, Customer satisfaction,
Customer complaints, Customer retention.
97
TEXT BOOK:
1. Dale H.Besterfiled, Carol B.Michna,Glen H. Besterfield,Mary B.Sacre,Hemant Urdhwareshe
and Rashmi Urdhwareshe, “Total Quality Management”, Pearson Education Asia, Revised
Third Edition, Indian Reprint, Sixth Impression, 2013.
REFERENCES:
1. James R. Evans and William M. Lindsay, "The Management and Control of Quality",
8th Edition, First Indian Edition, Cengage Learning, 2012.
2. Janakiraman. B and Gopal .R.K., "Total Quality Management - Text and Cases", Prentice Hall
(India) Pvt. Ltd., 2006.
3. Suganthi.L and Anand Samuel, "Total Quality Management", Prentice Hall (India) Pvt. Ltd.,
2006.
4. ISO9001-2015 standards
REFERENCES:
1. Michael J Quinn, “Parallel programming in C with MPI and OpenMP”, Tata McGraw Hill,2003.
2. Victor Alessandrini, Shared Memory Application Programming, 1st Edition, Concepts and
Strategies in Multicore Application Programming, Morgan Kaufmann, 2015.
3. Yan Solihin, Fundamentals of Parallel Multicore Architecture, CRC Press, 2015.
99
TEXT BOOKS:
1. Alan Dix, Janet Finlay, Gregory Abowd, Russell Beale, “Human Computer Interaction”, 3rd
Edition, Pearson Education, 2004 (UNIT I, II & III)
2. Brian Fling, “Mobile Design and Development”, First Edition, O’Reilly Media Inc., 2009 (UNIT –
IV)
3. Bill Scott and Theresa Neil, “Designing Web Interfaces”, First Edition, O’Reilly, 2009. (UNIT-V)
100
OUTCOMES:
Upon completion of the course, the students will be able to:
Write various applications using C# Language in the .NET Framework.
Develop distributed applications using .NET Framework.
Create mobile applications using .NET compact Framework.
TEXT BOOKS:
1. Christian Nagel, Bill Evjen, Jay Glynn, Karli Watson, Morgan Skinner . ―Professional
C# 2012 and .NET 4.5ǁ, Wiley, 2012
2. Harsh Bhasin, ―Programming in C#ǁ, Oxford University Press, 2014.
REFERENCES
1. Ian Gariffiths, Mathew Adams, Jesse Liberty, ―Programming C# 4.0ǁ, O‘Reilly,
Fourth Edition, 2010.
2. Andrew Troelsen, Pro C# 5.0 and the .NET 4.5 Framework, Apress publication,
2012.
3. Andy Wigley, Daniel Moth, Peter Foot, ―Mobile Development Handbookǁ, Microsoft
Press, 2011.
101
UNIT V SECURITY IN AD HOC AND SENSOR NETWORKS 9
Security Attacks – Key Distribution and Management – Intrusion Detection – Software based
Anti-tamper techniques – Water marking techniques – Defense against routing attacks -
Secure Ad hoc routing protocols – Broadcast authentication WSN protocols – TESLA – Biba –
Sensor Network Security Protocols – SPINS
TEXT BOOKS:
1. C.Siva Ram Murthy and B.S.Manoj, “Ad Hoc Wireless Networks – Architectures and 2.
Protocols”, Pearson Education, 2006.
2. Holger Karl, Andreas Willing, “Protocols and Architectures for Wireless Sensor Networks”,
John Wiley & Sons, Inc., 2005.
REFERENCES
1. Subir Kumar Sarkar, T G Basavaraju, C Puttamadappa, “Ad Hoc Mobile Wireless Networks”,
Auerbach Publications, 2008.
2. Carlos De Morais Cordeiro, Dharma Prakash Agrawal, “Ad Hoc and Sensor Networks: Theory
and Applications (2nd Edition)”, World Scientific Publishing, 2011.
3. Waltenegus Dargie, Christian Poellabauer, “Fundamentals of Wireless Sensor Networks
Theory and Practice”, John Wiley and Sons, 2010
4. Xiang-Yang Li , “Wireless Ad Hoc and Sensor Networks: Theory and Applications”, 1227
th edition, Cambridge university Press,2008.
TOTAL: 45 PERIODS
OUTCOMES:
Upon Completion of the course, the students will be able,
To develop in-depth understanding of relational databases and skills to optimize database
performance in practice.
To understand and critique on each type of databases.
To design faster algorithms in solving practical database problems.
To implement intelligent databases and various data models.
TEXT BOOKS:
1. Ramez Elmasri, Shamkant B. Navathe, “Fundamentals of Database Systems”, Sixth Edition ,
Pearson, 2011.
2. Thomas Cannolly and Carolyn Begg, “Database Systems, A Practical Approach to Design,
Implementation and Management”, Fourth Edition, Pearson Education, 2008.
REFERENCES:
1. Henry F Korth, Abraham Silberschatz, S. Sudharshan, “Database System Concepts”, Sixth
Edition, McGraw Hill, 2011.
103
products and services
To conceptualize, prototype and develop product management plan for a new product
based on the type of the new product and development methodology integrating the
hardware, software, controls, electronics and mechanical systems
To understand requirement engineering and know how to collect, analyze and arrive
at requirements for new product development and convert them in to design
specification
To understand system modeling for system, sub-system and their interfaces and
arrive at the optimum system specification and characteristics
To develop documentation, test specifications and coordinate with various teams to
validate and sustain up to the EoL (End of Life) support activities for engineering
customer
TOTAL: 45 PERIODS
OUTCOMES:
Upon completion of the course, the students will be able to:
Define, formulate and analyze a problem
Solve specific problems independently or as part of a team
Gain knowledge of the Innovation & Product Development process in the Business
Context
Work independently as well as in teams
104
Manage a project from start to finish
TEXTBOOKS:
1. Book specially prepared by NASSCOM as per the MoU.
2. Karl T Ulrich and Stephen D Eppinger, "Product Design and Development", Tata McGraw
Hill, Fifth Edition, 2011.
3. John W Newstorm and Keith Davis, "Organizational Behavior", Tata McGraw Hill,
Eleventh Edition, 2005.
REFERENCES:
1. Hiriyappa B, “Corporate Strategy – Managing the Business”, Author House, 2013.
2. Peter F Drucker, “People and Performance”, Butterworth – Heinemann [Elsevier], Oxford,
2004.
3. Vinod Kumar Garg and Venkita Krishnan N K, “Enterprise Resource Planning –
Concepts”, Second Edition, Prentice Hall, 2003.
4. Mark S Sanders and Ernest J McCormick, "Human Factors in Engineering and Design",
McGraw Hill Education, Seventh Edition, 2013
UNIT I 9
Human Rights – Meaning, origin and Development. Notion and classification of Rights – Natural,
Moral and Legal Rights. Civil and Political Rights, Economic, Social and Cultural Rights;
collective / Solidarity Rights.
UNIT II 9
Evolution of the concept of Human Rights Magana carta – Geneva convention of 1864. Universal
Declaration of Human Rights, 1948. Theories of Human Rights.
UNIT III 9
Theories and perspectives of UN Laws – UN Agencies to monitor and compliance.
UNIT IV 9
Human Rights in India – Constitutional Provisions / Guarantees.
UNIT V 9
Human Rights of Disadvantaged People – Women, Children, Displaced persons and Disabled
persons, including Aged and HIV Infected People. Implementation of Human Rights – National
and State Human Rights Commission – Judiciary – Role of NGO’s, Media, Educational
Institutions, Social Movements.
TOTAL: 45 PERIODS
OUTCOME:
Engineering students will acquire the basic knowledge of human rights.
REFERENCES:
1. Kapoor S.K., “Human Rights under International law and Indian Laws”, Central Law Agency,
Allahabad, 2014.
2. Chandra U., “Human Rights”, Allahabad Law Agency, Allahabad, 2014.
3. Upendra Baxi, The Future of Human Rights, Oxford University Press, New Delhi.
105
GE8071 DISASTER MANAGEMENT LTPC
3 003
OBJECTIVES:
To provide students an exposure to disasters, their significance and types.
To ensure that students begin to understand the relationship between vulnerability,
disasters, disaster prevention and risk reduction
To gain a preliminary understanding of approaches of Disaster Risk Reduction (DRR)
To enhance awareness of institutional processes in the country and
To develop rudimentary ability to respond to their surroundings with potential
disaster response in areas where they live, with due sensitivity
106
TEXTBOOKS:
1. Singhal J.P. “Disaster Management”, Laxmi Publications, 2010. ISBN-10: 9380386427 ISBN-
13: 978-9380386423
2. Tushar Bhattacharya, “Disaster Science and Management”, McGraw Hill India Education Pvt.
Ltd., 2012. ISBN-10: 1259007367, ISBN-13: 978-1259007361]
3. Gupta Anil K, Sreeja S. Nair. Environmental Knowledge for Disaster Risk Management, NIDM,
New Delhi, 2011
4. Kapur Anu Vulnerable India: A Geographical Study of Disasters, IIAS and Sage Publishers,
New Delhi, 2010.
REFERENCES
1. Govt. of India: Disaster Management Act , Government of India, New Delhi, 2005
2. Government of India, National Disaster Management Policy,2009.
107
OUTCOMES:
At the end of the course, the students should be able to:
Know and understand the basics and fundamentals of digital image processing, such as
digitization, sampling, quantization, and 2D-transforms.
Operate on images using the techniques of smoothing, sharpening and enhancement.
Understand the restoration concepts and filtering techniques.
Learn the basics of segmentation, features extraction, compression and recognition
methods for color models.
TEXT BOOKS:
1. Rafael C. Gonzalez, Richard E. Woods, ‘Digital Image Processing’, Pearson, Third Edition,
2010.
2. Anil K. Jain, ‘Fundamentals of Digital Image Processing’, Pearson, 2002.
REFERENCES:
1. Kenneth R. Castleman, ‘Digital Image Processing’, Pearson, 2006.
2. Rafael C. Gonzalez, Richard E. Woods, Steven Eddins, ‘Digital Image Processing using
MATLAB’, Pearson Education, Inc., 2011.
3. D,E. Dudgeon and RM. Mersereau, ‘Multidimensional Digital Signal Processing’, Prentice
Hall Professional Technical Reference, 1990.
4. William K. Pratt, ‘Digital Image Processing’, John Wiley, New York, 2002
5. Milan Sonka et al ‘Image processing, analysis and machine vision’, Brookes/Cole, Vikas
Publishing House, 2nd edition, 1999
UNIT I INTRODUCTION 9
Introduction to Semantic Web: Limitations of current Web - Development of Semantic Web -
Emergence of the Social Web - Social Network analysis: Development of Social Network Analysis
- Key concepts and measures in network analysis - Electronic sources for network analysis:
Electronic discussion networks, Blogs and online communities - Web-based networks -
Applications of Social Network Analysis.
108
communities social network infrastructures and communities - Decentralized online social
networks - Multi-Relational characterization of dynamic social network communities.
TEXT BOOKS:
1. Peter Mika, “Social Networks and the Semantic Web”, First Edition, Springer 2007.
2. Borko Furht, “Handbook of Social Network Technologies and Applications”, 1st Edition,
Springer, 2010.
REFERENCES:
1. Guandong Xu ,Yanchun Zhang and Lin Li, “Web Mining and Social Networking – Techniques
and applications”, First Edition, Springer, 2011.
2. Dion Goh and Schubert Foo, “Social information Retrieval Systems: Emerging Technologies
and Applications for Searching the Web Effectively”, IGI Global Snippet, 2008.
3. Max Chevalier, Christine Julien and Chantal Soulé-Dupuy, “Collaborative and Social
Information Retrieval and Access: Techniques for Improved user Modelling”, IGI Global
Snippet, 2009.
4. John G. Breslin, Alexander Passant and Stefan Decker, “The Social Semantic Web”, Springer,
2009.
UNIT I INTRODUCTION 9
History, What is Information Security?, Critical Characteristics of Information, NSTISSC
Security Model, Components of an Information System, Securing the Components, Balancing
Security and Access, The SDLC, The Security SDLC
109
UNIT II SECURITY INVESTIGATION 9
Need for Security, Business Needs, Threats, Attacks, Legal, Ethical and Professional Issues -
An Overview of Computer Security - Access Control Matrix, Policy-Security policies,
Confidentiality policies, Integrity policies and Hybrid policies
TEXT BOOK:
1. Michael E Whitman and Herbert J Mattord, “Principles of Information Security”, Vikas
Publishing House, New Delhi, 2003
REFERENCES
1. Micki Krause, Harold F. Tipton, “ Handbook of Information Security Management”,
Vol 1-3 CRCPress LLC, 2004.
2. Stuart McClure, Joel Scrambray, George Kurtz, “Hacking Exposed”, Tata McGraw-
Hill, 2003
3. Matt Bishop, “ Computer Security Art and Science”, Pearson/PHI, 2002.
UNIT I INTRODUCTION 9
History of Software Defined Networking (SDN) – Modern Data Center – Traditional Switch
Architecture – Why SDN – Evolution of SDN – How SDN Works – Centralized and
Distributed Control and Date Planes
UNIT V SDN 9
Juniper SDN Framework – IETF SDN Framework – Open Daylight Controller – Floodlight
Controller – Bandwidth Calendaring – Data Center Orchestration
TOTAL :45 PERIODS
OUTCOMES:
Upon completion of the course, the students will be able to:
Analyze the evolution of software defined networks
Express the various components of SDN and their uses
Explain the use of SDN in the current networking scenario
Design and develop various applications of SDN
TEXT BOOKS:
1. Paul Goransson and Chuck Black, ―Software Defined Networks: A Comprehensive
Approach, First Edition, Morgan Kaufmann, 2014.
2. Thomas D. Nadeau, Ken Gray, ―SDN: Software Defined Networks, O'Reilly
Media, 2013.
REFERENCES:
1. Siamak Azodolmolky, ―Software Defined Networking with Open Flow, Packet
Publishing, 2013.
2. Vivek Tiwari, ―SDN and Open Flow for Beginnersǁ, Amazon Digital Services, Inc.,
2013.
3. Fei Hu, Editor, ―Network Innovation through Open Flow and SDN: Principles and
Design, CRC Press, 2014.
TOTAL 45 PERIODS
OUTCOMES:
At the end of the course, the student should be able to:
Understand the basics of computer forensics
Apply a number of different computer forensic tools to a given scenario
Analyze and validate forensics data
Identify the vulnerabilities in a given network infrastructure
Implement real-world hacking techniques to test system security
TEXT BOOKS:
REFERENCES
1. John R.Vacca, “Computer Forensics”, Cengage Learning, 2005
2. MarjieT.Britz, “Computer Forensics and Cyber Crime”: An Introduction”, 3rd Edition,
Prentice Hall, 2013.
3. AnkitFadia “ Ethical Hacking” Second Edition, Macmillan India Ltd, 2006
4. Kenneth C.Brancik “Insider Computer Fraud” Auerbach Publications Taylor &
Francis Group–2008.
TOTAL : 45 PERIODS
OUTCOMES:
Upon completion of this course, the students should be able to
Apply suitable soft computing techniques for various applications.
Integrate various soft computing techniques for complex problems.
TEXT BOOKS:
1. N.P.Padhy, S.P.Simon, "Soft Computing with MATLAB Programming", Oxford
University Press, 2015.
2. S.N.Sivanandam , S.N.Deepa, "Principles of Soft Computing", Wiley India Pvt. Ltd.,
2nd Edition, 2011.
3. S.Rajasekaran, G.A.Vijayalakshmi Pai, "Neural Networks, Fuzzy Logic and Genetic
Algorithm, Synthesis and Applications ", PHI Learning Pvt. Ltd., 2017.
REFERENCES:
1. Jyh-Shing Roger Jang, Chuen-Tsai Sun, Eiji Mizutani, “Neuro-Fuzzy and Soft
Computing”, Prentice-Hall of India, 2002.
2. Kwang H.Lee, “First course on Fuzzy Theory and Applications”, Springer, 2005.
3. George J. Klir and Bo Yuan, “Fuzzy Sets and Fuzzy Logic-Theory and Applications”,
Prentice Hall, 1996.
4. James A. Freeman and David M. Skapura, “Neural Networks Algorithms,
Applications, and Programming Techniques”, Addison Wesley, 2003.
113
UNIT II ENGINEERING ETHICS 9
Senses of ‘Engineering Ethics’ – Variety of moral issues – Types of inquiry – Moral dilemmas –
Moral Autonomy – Kohlberg’s theory – Gilligan’s theory – Consensus and Controversy – Models of
professional roles - Theories about right action – Self-interest – Customs and Religion – Uses of
Ethical Theories.
TEXT BOOKS:
1. Mike W. Martin and Roland Schinzinger, “Ethics in Engineering”, Tata McGraw Hill, New Delhi,
2003.
2. Govindarajan M, Natarajan S, Senthil Kumar V. S, “Engineering Ethics”, Prentice Hall of India,
New Delhi, 2004.
REFERENCES:
1. Charles B. Fleddermann, “Engineering Ethics”, Pearson Prentice Hall, New Jersey, 2004.
2. Charles E. Harris, Michael S. Pritchard and Michael J. Rabins, “Engineering Ethics –
Concepts and Cases”, Cengage Learning, 2009.
3. John R Boatright, “Ethics and the Conduct of Business”, Pearson Education, New Delhi, 2003
4. Edmund G Seebauer and Robert L Barry, “Fundamentals of Ethics for Scientists and
Engineers”, Oxford University Press, Oxford, 2001.
5. Laura P. Hartman and Joe Desjardins, “Business Ethics: Decision Making for Personal
Integrity and Social Responsibility” Mc Graw Hill education, India Pvt. Ltd.,New Delhi, 2013.
6. World Community Service Centre, ‘ Value Education’, Vethathiri publications, Erode, 2011.
Web sources:
1. www.onlineethics.org
2. www.nspe.org
3. www.globalethics.org
4. www.ethics.org
114
CS8080 INFORMATION RETRIEVAL TECHNIQUES LT PC
3 0 03
OBJECTIVES:
To understand the basics of Information Retrieval.
To understand machine learning techniques for text classification and clustering.
To understand various search engine system operations.
To learn different techniques of recommender system.
UNIT I INTRODUCTION 9
Information Retrieval – Early Developments – The IR Problem – The User‘s Task – Information
versus Data Retrieval - The IR System – The Software Architecture of the IR System – The
Retrieval and Ranking Processes - The Web – The e-Publishing Era – How the web changed
Search – Practical Issues on the Web – How People Search – Search Interfaces Today –
Visualization in Search Interfaces.
OUTCOMES:
Upon completion of the course, the students will be able to:
Use an open source search engine framework and explore its capabilities
Apply appropriate method of classification or clustering.
Design and implement innovative features in a search engine.
Design and implement a recommender system.
TEXT BOOKS:
1. Ricardo Baeza-Yates and Berthier Ribeiro-Neto, ―Modern Information Retrieval: The Concepts
and Technology behind Search, Second Edition, ACM Press Books, 2011.
2. Ricci, F, Rokach, L. Shapira, B.Kantor, “Recommender Systems Handbook”, First Edition, 2011.
115
REFERENCES:
1. C. Manning, P. Raghavan, and H. Schütze, ―Introduction to Information Retrieval, Cambridge
University Press, 2008.
2. Stefan Buettcher, Charles L. A. Clarke and Gordon V. Cormack, ―Information Retrieval:
Implementing and Evaluating Search Engines, The MIT Press, 2010.
UNIT I FUNDAMENTALS 9
Green IT Fundamentals: Business, IT, and the Environment – Green computing: carbon
foot print, scoop on power – Green IT Strategies: Drivers, Dimensions, and Goals –
Environmentally Responsible Business: Policies, Practices, and Metrics.
TOTAL : 45 PERIODS
OUTCOMES:
Upon completion of the course, the students will be able to:
Acquire knowledge to adopt green computing practices to minimize negative
impacts on the environment.
Enhance the skill in energy saving practices in their use of hardware.
Evaluate technology tools that can reduce paper waste and carbon footprint by the
stakeholders.
Understand the ways to minimize equipment disposal requirements .
116
TEXT BOOKS:
1. Bhuvan Unhelkar, “Green IT Strategies and Applications-Using Environmental
Intelligence”, CRC Press, June 2014.
2. Woody Leonhard, Katherine Murray, “Green Home computing for dummies”,
August 2012.
REFERENCES:
1. Alin Gales, Michael Schaefer, Mike Ebbers, “Green Data Center: steps for the
Journey”, Shroff/IBM rebook, 2011.
2. John Lamb, “The Greening of IT”, Pearson Education, 2009.
3. Jason Harris, “Green Computing and Green IT- Best Practices on regulations &
industry”, Lulu.com, 2008
4. Carl speshocky, “Empowering Green Initiatives with IT”, John Wiley & Sons, 2010.
5. Wu Chun Feng (editor), “Green computing: Large Scale energy efficiency”, CRC
Press
REFERENCES:
1. Nicholas Wilt, ―CUDA Handbook: A Comprehensive Guide to GPU Programming, Addison -
Wesley, 2013.
2. Jason Sanders, Edward Kandrot, ―CUDA by Example: An Introduction to General Purpose
GPU Programmingǁ, Addison - Wesley, 2010.
3. David B. Kirk, Wen-mei W. Hwu, Programming Massively Parallel Processors - A Hands-on
Approach, Third Edition, Morgan Kaufmann, 2016.
4. http://www.nvidia.com/object/cuda_home_new.html
5. http://www.openCL.org
UNIT I INTRODUCTION 9
Origins and challenges of NLP – Language Modeling: Grammar-based LM, Statistical LM -
Regular Expressions, Finite-State Automata – English Morphology, Transducers for lexicon
and rules, Tokenization, Detecting and Correcting Spelling Errors, Minimum Edit Distance
118
OUTCOMES:
Upon completion of the course, the students will be able to:
To tag a given text with basic Language features
To design an innovative application using NLP components
To implement a rule based system to tackle morphology/syntax of a language
To design a tag set to be used for statistical processing for real-time applications
To compare and contrast the use of different statistical approaches for different
types of NLP applications.
TEXT BOOKS:
1. Daniel Jurafsky, James H. Martin―Speech and Language Processing: An
Introduction to Natural Language Processing, Computational Linguistics and
Speech, Pearson Publication, 2014.
2. Steven Bird, Ewan Klein and Edward Loper, ―Natural Language Processing with
Pythonǁ, First Edition, O‘Reilly Media, 2009.
REFERENCES:
1. Breck Baldwin, ―Language Processing with Java and LingPipe Cookbook, Atlantic
Publisher, 2015.
2. Richard M Reese, ―Natural Language Processing with Javaǁ, O‘Reilly Media, 2015.
3. Nitin Indurkhya and Fred J. Damerau, ―Handbook of Natural Language Processing,
Second Edition, Chapman and Hall/CRC Press, 2010.
4. Tanveer Siddiqui, U.S. Tiwary, “Natural Language Processing and Information
Retrieval”, Oxford University Press, 2008.
UNIT I INTRODUCTION 9
Need for Parallel Processing - Data and Temporal Parallelism - Models of Computation -
RAM and PRAM Model – Shared Memory and Message Passing Models- Processor
Organisations - PRAM Algorithm – Analysis of PRAM Algorithms- Parallel Programming
Languages.
Parallel Algorithms for Reduction – Prefix Sum – List Ranking –Preorder Tree Traversal –
Searching -Sorting - Merging Two Sorted Lists – Matrix Multiplication - Graph Coloring -
Graph Searching.
2D Mesh SIMD Model - Parallel Algorithms for Reduction - Prefix Computation - Selection -
Odd-Even Merge Sorting - Matrix Multiplication
119
UNIT IV SIMD ALGORITHMS -II 9
Hypercube SIMD Model - Parallel Algorithms for Selection- Odd-Even Merge Sort- Bitonic
Sort- Matrix Multiplication Shuffle Exchange SIMD Model - Parallel Algorithms for Reduction
-Bitonic Merge Sort - Matrix Multiplication - Minimum Cost Spanning Tree
TOTAL : 45 PERIODS
OUTCOMES:
Upon completion of this course, the students should be able to
Develop parallel algorithms for standard problems and applications.
Analyse efficiency of different parallel algorithms.
TEXT BOOKS:
1. Michael J. Quinn, "Parallel Computing : Theory & Practice", Tata McGraw Hill
Edition, Second edition, 2017.
2. Ellis Horowitz, Sartaj Sahni and Sanguthevar Rajasekaran, "Fundamentals of
Computer Algorithms", University press, Second edition , 2011.
3. V Rajaraman, C Siva Ram Murthy, " Parallel computers- Architecture and
Programming ", PHI learning, 2016.
REFERENCES:
1. Ananth Grame, George Karpis, Vipin Kumar and Anshul Gupta, "Introduction to
Parallel Computing", 2nd Edition, Addison Wesley, 2003.
2. M Sasikumar, Dinesh Shikhare and P Ravi Prakash , " Introduction to Parallel
Processing", PHI learning , 2013.
3. S.G.Akl, "The Design and Analysis of Parallel Algorithms", PHI, 1989.
IT8077 L T P C
SPEECH PROCESSING
3 0 0 3
OBJECTIVES:
To understand the fundamentals of the speech processing
Explore the various speech models
Gather knowledge about the phonetics and pronunciation processing
Perform wavelet analysis of speech
To understand the concepts of speech recognition
UNIT I INTRODUCTION 9
Introduction - knowledge in speech and language processing - ambiguity - models and algorithms
- language - thought - understanding - regular expression and automata - words & transducers –
N grams
OUTCOMES:
On Successful completion of the course ,Students will be able to
Create new algorithms with speech processing
Derive new speech models
Perform various language phonetic analysis
Create a new speech identification system
Generate a new speech recognition system
TEXT BOOK:
1. Daniel Jurafsky and James H. Martin, “ Speech and Language Processing: An Introduction to
Natural Language Processing, Computational Linguistics and Speech Recognition”, Person
education,2013.
REFERENCES
1. Kai-Fu Lee, “Automatic Speech Recognition”, The Springer International Series in Engineering
and Computer Science, 1999.
2. Himanshu Chaurasiya, “Soft Computing Implementation of Automatic Speech Recognition”,
LAP Lambert Academic Publishing, 2010.
3. Claudio Becchetti, Klucio Prina Ricotti, “Speech Recognition: Theory and C++
implementation”,Wiley publications 2008.
4. Ikrami Eldirawy , Wesam Ashour, “Visual Speech Recognition”, Wiley publications , 2011
UNIT I INTRODUCTION 8
Nanoscale Science and Technology- Implications for Physics, Chemistry, Biology and
Engineering-Classifications of nanostructured materials- nano particles- quantum dots, nanowires-
ultra-thinfilms-multilayered materials. Length Scales involved and effect on properties:
Mechanical, Electronic, Optical, Magnetic and Thermal properties. Introduction to
properties and motivation for study (qualitative only).
121
UNIT III NANOMATERIALS 12
Nanoforms of Carbon - Buckminster fullerene- graphene and carbon nanotube, Single wall carbon
Nanotubes (SWCNT) and Multi wall carbon nanotubes (MWCNT)- methods of synthesis(arc-
growth, laser ablation, CVD routes, Plasma CVD), structure-property Relationships applications-
Nanometal oxides-ZnO, TiO2,MgO, ZrO2, NiO, nanoalumina, CaO, AgTiO2, Ferrites, Nanoclays-
functionalization and applications-Quantum wires, Quantum dots-preparation, properties and
applications.
UNIT V APPLICATIONS 7
NanoInfoTech: Information storage- nanocomputer, molecular switch, super chip, nanocrystal,
Nanobiotechlogy: nanoprobes in medical diagnostics and biotechnology, Nano medicines,
Targetted drug delivery, Bioimaging - Micro Electro Mechanical Systems (MEMS), Nano Electro
Mechanical Systems (NEMS)- Nanosensors, nano crystalline silver for bacterial inhibition,
Nanoparticles for sunbarrier products - In Photostat, printing, solar cell, battery.
TOTAL: 45 PERIODS
OUTCOMES:
Will familiarize about the science of nanomaterials
Will demonstrate the preparation of nanomaterials
Will develop knowledge in characteristic nanomaterial
TEXT BOOKS :
1. A.S. Edelstein and R.C. Cammearata, eds., “Nanomaterials: Synthesis, Properties
and Applications”, Institute of Physics Publishing, Bristol and Philadelphia, 1996.
2. N John Dinardo, “Nanoscale Charecterisation of surfaces & Interfaces”, 2nd edition,
Weinheim Cambridge, Wiley-VCH, 2000.
REFERENCES:
1. G Timp, “Nanotechnology”, AIP press/Springer, 1999.
2. Akhlesh Lakhtakia,“The Hand Book of Nano Technology, Nanometer Structure,
Theory, Modeling and Simulations”. Prentice-Hall of India (P) Ltd, New Delhi, 2007.
122
ANNA UNIVERSITY, CHENNAI
NON- AUTONOMOUS AFFILIATED COLLEGES
REGULATIONS 2021
CHOICE BASED CREDIT SYSTEM
1
engineering community and with society at large, such as, being able to comprehend and write
effective reports and design documentation, make effective presentations, and give and receive
clear instructions.
11 Project management and finance: Demonstrate knowledge and understanding of the
engineering and management principles and apply these to one’s own work, as a member and
leader in a team, to manage projects and in multidisciplinary environments.
12 Life-long learning: Recognize the need for, and have the preparation and ability to
engage in independent and life-long learning in the broadest context of technological change.
Exhibit design and programming skills to build and automate business solutions using cutting
edge technologies.
Strong theoretical foundation leading to excellence and excitement towards research, to
provide elegant solutions to complex problems.
Ability to work effectively with various engineering fields as a team to design, build and
develop system applications.
2
ANNA UNIVERSITY, CHENNAI
NON- AUTONOMOUS AFFILIATED COLLEGES
REGULATIONS 2021
B. E. COMPUTER SCIENCE AND ENGINEERING
CHOICE BASED CREDIT SYSTEM
CURRICULA FOR SEMESTERS I TO VIII AND SYLLABI FOR SEMESTERS III AND IV
SEMESTER I
PERIODS PER TOTAL
S. COURSE CATE-
COURSE TITLE WEEK CONTACT CREDITS
NO. CODE GORY
L T P PERIODS
1. IP3151 Induction Programme - - - - - 0
THEORY
2. HS3151 Professional English - I HSMC 3 0 0 3 3
3. MA3151 Matrices and Calculus BSC 3 1 0 4 4
4. PH3151 Engineering Physics BSC 3 0 0 3 3
5. CY3151 Engineering Chemistry BSC 3 0 0 3 3
Problem Solving and Python
6. GE3151 ESC 3 0 0 3 3
Programming
GE3152 அறிவியல் தமிழ் /Scientific
7. HSMC 1 0 0 1 1
Thoughts in Tamil
PRACTICALS
8. Problem Solving and Python
GE3171 ESC 0 0 4 4 2
Programming Laboratory
9. BS3171 Physics and Chemistry Laboratory BSC 0 0 4 4 2
$
10. GE3172 English Laboratory EEC 0 0 2 2 1
TOTAL 16 1 10 27 22
$ Skill Based Course
SEMESTER II
PERIODS PER TOTAL
S. COURSE CATE- WEEK
COURSE TITLE CONTACT CREDITS
NO. CODE GORY
L T P PERIODS
THEORY
1. HS3251 Professional English - II HSMC 2 0 0 2 2
2. MA3251 Statistics and Numerical Methods BSC 3 1 0 4 4
3. PH3256 Physics for Information Science BSC 3 0 0 3 3
Basic Electrical and Electronics
4. BE3251 ESC 3 0 0 3 3
Engineering
5. GE3251 Engineering Graphics ESC 2 0 4 6 4
6. CS3251 Programming in C PCC 3 0 0 3 3
7. GE3252 தமிழர் மரபு /Heritage of Tamils HSMC 1 0 0 1 1
8. NCC Credit Course Level 1# - 2 0 0 2 2#
PRACTICALS
9. GE3271 Engineering Practices Laboratory ESC 0 0 4 4 2
10. CS3271 Programming in C Laboratory PCC 0 0 4 4 2
Communication Laboratory /
11. GE3272 EEC 0 0 4 4 2
Foreign Language $
TOTAL 17 1 16 34 26
# NCC Credit Course level 1 is offered for NCC students only. The grades earned by the students will
be recorded in the Mark Sheet, however the same shall not be considered for the computation of CGPA.
$ Skill Based Course
3
SEMESTER III
PERIODS TOTAL
S. COURSE CATE PER WEEK
COURSE TITLE CONTACT CREDITS
NO. CODE GORY
L T P PERIODS
THEORY
1. MA3354 Discrete Mathematics BSC 3 1 0 4 4
2. CS3351 Digital Principles and
ESC 3 0 2 5 4
Computer Organization
3. CS3352 Foundations of Data
PCC 3 0 0 3 3
Science
4. CS3301 Data Structures PCC 3 0 0 3 3
5. CS3391 Object Oriented
PCC 3 0 0 3 3
Programming
PRACTICALS
6. CS3311 Data Structures Laboratory PCC 0 0 3 3 1.5
7. CS3381 Object Oriented 0 0 3 3
PCC 1.5
Programming Laboratory
8. CS3361 Data Science Laboratory PCC 0 0 4 4 2
9. GE3361 Professional Development$ EEC 0 0 2 2 1
TOTAL 15 1 14 30 23
$
Skill Based Course
SEMESTER IV
PERIODS TOTAL
S. COURSE CATE
COURSE TITLE PER WEEK CONTACT CREDITS
NO. CODE GORY
L T P PERIODS
THEORY
1. CS3452 Theory of Computation PCC 3 0 0 3 3
2. CS3491 Artificial Intelligence and
PCC 3 0 2 5 4
Machine Learning
3. CS3492 Database Management
PCC 3 0 0 3 3
Systems
4. CS3401 Algorithms PCC 3 0 2 5 4
5. CS3451 Introduction to Operating
PCC 3 0 0 3 3
Systems
6. GE3451 Environmental Sciences and
BSC 2 0 0 2 2
Sustainability
7. NCC Credit Course Level 2# 3 0 0 3 3#
PRACTICALS
8. CS3461 Operating Systems Laboratory PCC 0 0 3 3 1.5
9. CS3481 Database Management
PCC 0 0 3 3 1.5
Systems Laboratory
TOTAL 20 0 10 30 22
#
NCC Credit Course level 2 is offered for NCC students only. The grades earned by the students will
be recorded in the Mark Sheet, however the same shall not be considered for the computation of CGPA.
4
SEMESTER V
PERIODS PER TOTAL
S. COURSE CATE
COURSE TITLE WEEK CONTACT CREDITS
NO. CODE GORY
L T P PERIODS
THEORY
1. CS3591 Computer Networks PCC 3 0 2 5 4
2. CS3501 Compiler Design PCC 3 0 2 5 4
3. CB3491 Cryptography and Cyber 3
PCC 3 0 0 3
Security
4. CS3551 Distributed Computing PCC 3 0 0 3 3
5. Professional Elective I PEC - - - - 3
6. Professional Elective II PEC - - - - 3
7. Mandatory Course-I& MC 3 0 0 3 0
TOTAL - - - - 20
&Mandatory Course-I is a Non-credit Course (Student shall select one course from the list given under
Mandatory Course-I)
SEMESTER VI
PERIODS TOTAL
S. COURSE CATE
COURSE TITLE PER WEEK CONTACT CREDITS
NO. CODE GORY
L T P PERIODS
THEORY
1. CCS356 Object Oriented Software PCC 3 0 2 5 4
Engineering
2. CS3691 Embedded Systems and IoT PCC 3 0 2 5 4
3. Open Elective – I* OEC 3 0 0 3 3
4. Professional Elective III PEC - - - - 3
5. Professional Elective IV PEC - - - - 3
6. Professional Elective V PEC - - - - 3
7. Professional Elective VI PEC - - - - 3
8. Mandatory Course-II & MC 3 0 0 3 0
9. NCC Credit Course Level 3# 3 0 0 3 3#
TOTAL - - - - 23
*Open Elective – I Shall be chosen from the list of open electives offered by other Programmes
&
Mandatory Course-II is a Non-credit Course (Student shall select one course from the list given under
Mandatory Course-II)
#
NCC Credit Course level 3 is offered for NCC students only. The grades earned by the students will
be recorded in the Mark Sheet, however the same shall not be considered for the computation of CGPA
5
SEMESTER VII / VIII*
PERIODS TOTAL
S. COURSE CATE
COURSE TITLE PER WEEK CONTACT CREDITS
NO. CODE GORY
L T P PERIODS
THEORY
1. GE3791 Human Values and Ethics HSMC 2 0 0 2 2
2. Elective - Management# HSMC 3 0 0 3 3
3. Open Elective – II** OEC 3 0 0 3 3
4. Open Elective – III** OEC 3 0 0 3 3
5. Open Elective – IV** OEC 3 0 0 3 3
PRACTICALS
6. CS3711 Summer internship EEC 0 0 0 0 2
TOTAL 14 0 0 14 16
*If students undergo internship in Semester VII, then the courses offered during semester VII will be
offered during semester VIII.
** Open Elective II - IV (Shall be chosen from the list of open electives offered by other Programmes).
#
Elective - Management shall be chosen from the Elective Management courses.
S. PERIODS TOTAL
COURSE CATE
NO COURSE TITLE PER WEEK CONTACT CREDITS
CODE GORY
. L T P PERIODS
PRACTICALS
1. CS3811 Project Work/Internship EEC 0 0 20 20 10
TOTAL 0 0 20 20 10
*If students undergo internship in Semester VII, then the courses offered during semester VII will be
offered during semester VIII.
6
MANDATORY COURSES I
PERIODS TOTAL
S. CATE
COURSE COURSE TITLE PER WEEK CONTACT CREDITS
NO. GORY
CODE L T P PERIODS
MX3081 Introduction to Women MC 3 0 0 3 0
1.
and Gender Studies
2. MX3082 Elements of Literature MC 3 0 0 3 0
3. MX3083 Film Appreciation MC 3 0 0 3 0
4. MX3084 Disaster Management MC 3 0 0 3 0
MANDATORY COURSES II
PERIODS TOTAL
S. COURSE CATE
COURSE TITLE PER WEEK CONTACT CREDITS
NO. CODE GORY
L T P PERIODS
1. MX3085 Well Being with traditional
practices (Yoga, Ayurveda MC 3 0 0 3 0
and Siddha)
2. MX3086 History of Science and
MC 3 0 0 3 0
Technology in India
3. MX3087 Political and Economic
Thought for a Humane MC 3 0 0 3 0
Society
4. MX3088 State, Nation Building and
MC 3 0 0 3 0
Politics in India
5. MX3089 Industrial Safety MC 3 0 0 3 0
7
PROFESSIONAL ELECTIVE COURSES: VERTICALS
Vertical III Vertical VII
Vertical II Vertical IV Vertical VI
Vertical I Cloud Computing and Vertical V Artificial
Full Stack Cyber Security and Emerging
Data Science Data Centre Creative Media Intelligence and
Development Data Privacy Technologies
Technologies Machine Learning
Exploratory Data Web Technologies Cloud Computing Ethical Hacking Augmented Augmented Knowledge
Analysis Reality/Virtual Reality/Virtual Engineering
Reality Reality
Recommender App Development Virtualization Digital and Mobile Multimedia and Robotic Process Soft Computing
Systems Forensics Animation Automation
Neural Networks Cloud Services Cloud Services Social Network Video Creation Neural Networks Neural Networks
and Deep Learning Management Management Security and Editing and Deep Learning and Deep Learning
Text and UI and UX Design Data Warehousing Modern Cryptography UI and UX Design Cyber security Text and
Speech Analysis Speech Analysis
Business Analytics Software Testing Storage Technologies Engineering Secure Digital marketing Quantum Optimization
and Automation software systems Computing Techniques
Image and video Web Application Software Defined Cryptocurrency and Visual Effects Cryptocurrency and Game Theory
analytics Security Networks Blockchain Blockchain
Technologies Technologies
Computer Vision Dev-ops Stream Processing Network Security Game Game Cognitive Science
Development Development
Big Data Analytics Principles of Security and Privacy in Security and Privacy in Multimedia Data 3D Printing and Ethics And AI
Programming Cloud Cloud Compression and Design
Languages Storage
Registration of Professional Elective Courses from Verticals:
Professional Elective Courses will be registered in Semesters V and VI. These courses are listed in groups called verticals that represent a particular area of specialisation
/ diversified group. Students are permitted to choose all the Professional Electives from a particular vertical or from different verticals. Further, only one Professional Elective
course shall be chosen in a semester horizontally (row-wise). However, two courses are permitted from the same row, provided one course is enrolled in Semester V and
another in semester VI.
The registration of courses for B.E./B.Tech (Honours) or Minor degree shall be done from Semester V to VIII. The procedure for registration of courses explained above
shall be followed for the courses of B.E/B.Tech (Honours) or Minor degree also. For more details on B.E./B.Tech (Honours) or Minor degree refer to the Regulations 2021,
Clause 4.10.
8
PROFESSIONAL ELECTIVE COURSES: VERTICALS
PERIODS TOTAL
S. COURSE CATE PER WEEK
COURSE TITLE CONTACT CREDITS
NO. CODE GORY
L T P PERIODS
1. CCS346 Exploratory Data PEC 2 0 2 4 3
Analysis
2. CCS360 Recommender PEC 2 0 2 4 3
Systems
3. CCS355 Neural Networks and PEC 2 0 2 4 3
Deep Learning
4. CCS369 Text and PEC 2 0 2 4 3
Speech Analysis
5. CCW331 Business Analytics PEC 2 0 2 4 3
PERIODS TOTAL
S. COURSE CATE PER WEEK
COURSE TITLE CONTACT CREDITS
NO. CODE GORY
L T P PERIODS
1. CCS375 Web Technologies PEC 2 0 2 4 3
2. CCS332 App Development PEC 2 0 2 4 3
3. CCS336 Cloud Services
PEC 2 0 2 4 3
Management
4. CCS370 UI and UX Design PEC 2 0 2 4 3
5. CCS366 Software Testing and
PEC 2 0 2 4 3
Automation
6. CCS374 Web Application
PEC 2 0 2 4 3
Security
7. CCS342 Dev-ops PEC 2 0 2 4 3
8. CCS358 Principles of
Programming PEC 2 0 2 4 3
Languages
9
VERTICAL 3: CLOUD COMPUTING AND DATA CENTRE TECHNOLOGIES
PERIODS TOTAL
S. COURSE CATE PER WEEK
COURSE TITLE CONTACT CREDITS
NO. CODE GORY
L T P PERIODS
1. CCS335 Cloud Computing PEC 2 0 2 4 3
2. CCS372 Virtualization PEC 2 0 2 4 3
3. CCS336 Cloud Services
PEC 2 0 2 4 3
Management
4. CCS341 Data Warehousing PEC 2 0 2 4 3
5. CCS367 Storage Technologies PEC 3 0 0 3 3
6. CCS365 Software Defined
PEC 2 0 2 4 3
Networks
7. CCS368 Stream Processing PEC 2 0 2 4 3
8. CCS362 Security and Privacy
PEC 2 0 2 4 3
in Cloud
PERIODS TOTAL
S. COURSE CATE PER WEEK
COURSE TITLE CONTACT CREDITS
NO. CODE GORY
L T P PERIODS
1. CCS344 Ethical Hacking PEC 2 0 2 4 3
2. CCS343 Digital and Mobile
PEC 2 0 2 4 3
Forensics
3. CCS363 Social Network
PEC 2 0 2 4 3
Security
4. CCS351 Modern Cryptography PEC 2 0 2 4 3
5. CB3591 Engineering Secure
PEC 2 0 2 4 3
Software Systems
6. CCS339 Cryptocurrency and
Blockchain PEC 2 0 2 4 3
Technologies
7. CCS354 Network Security PEC 2 0 2 4 3
8. CCS362 Security and Privacy in
PEC 2 0 2 4 3
Cloud
10
VERTICAL 5: CREATIVE MEDIA
PERIODS TOTAL
S. COURSE CATE PER WEEK
COURSE TITLE CONTACT CREDITS
NO. CODE GORY
L T P PERIODS
1. CCS333 Augmented
PEC 2 0 2 4 3
Reality/Virtual Reality
2. CCS352 Multimedia and
PEC 2 0 2 4 3
Animation
3. CCS371 Video Creation and
PEC 2 0 2 4 3
Editing
4. CCS370 UI and UX Design PEC 2 0 2 4 3
5. CCW332 Digital marketing PEC 2 0 2 4 3
6. CCS373 Visual Effects PEC 2 0 2 4 3
7. CCS347 Game Development PEC 2 0 2 4 3
8. CCS353 Multimedia Data
Compression and PEC 2 0 2 4 3
Storage
PERIODS TOTAL
S. COURSE CATE PER WEEK
COURSE TITLE CONTACT CREDITS
NO. CODE GORY
L T P PERIODS
1. CCS333 Augmented
PEC 2 0 2 4 3
Reality/Virtual Reality
2. CCS361 Robotic Process
PEC 2 0 2 4 3
Automation
3. CCS355 Neural Networks and
PEC 2 0 2 4 3
Deep Learning
4. CCS340 Cyber security PEC 2 0 2 4 3
5. CCS359 Quantum Computing PEC 2 0 2 4 3
6. CCS339 Cryptocurrency and
Blockchain PEC 2 0 2 4 3
Technologies
7. CCS347 Game Development PEC 2 0 2 4 3
8. CCS331 3D Printing and
PEC 2 0 2 4 3
Design
11
VERTICAL 7: ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
PERIODS TOTAL
SL. COURSE CATE PER WEEK
COURSE TITLE CONTACT CREDITS
NO. CODE GORY
L T P PERIODS
1. CCS350 Knowledge
PEC 2 0 2 4 3
Engineering
2. CCS364 Soft Computing PEC 2 0 2 4 3
3. CCS355 Neural Networks and
PEC 2 0 2 4 3
Deep Learning
4. CCS369 Text and
PEC 2 0 2 4 3
Speech Analysis
5. CCS357 Optimization
PEC 2 0 2 4 3
Techniques
6. CCS348 Game Theory PEC 2 0 2 4 3
7. CCS337 Cognitive Science PEC 2 0 2 4 3
8. CCS345 Ethics And AI PEC 2 0 2 4 3
OPEN ELECTIVES
(Students shall choose the open elective courses, such that the course contents are not
similar to any other course contents/title under other course categories).
OPEN ELECTIVES – I
PERIODS TOTAL
S. COURSE CATE PER WEEK CONTACT
COURSE TITLE CREDITS
NO. CODE GORY
L T P PERIODS
1. OAS351 Space Science OEC 3 0 0 3 3
2. OIE351 Introduction to Industrial 3 0 0 3 3
OEC
Engineering
3. OBT351 Climate Change and its 3 0 0 3 3
OEC
Impact
4. OCE351 Environment and Social 3 0 0 3 3
OEC
Impact Assessment
5. OEE351 Renewable Energy 3 0 0 3 3
OEC
System
6. OEI351 Introduction to Industrial 3 0 0 3 3
Instrumentation and OEC
Control
7. OMA351 Graph Theory OEC 3 0 0 3 3
12
OPEN ELECTIVES – II
OPEN ELECTIVES – IV
14
11. OMF354 Cost Management of OEC 3 0 0 3 3
Engineering Projects
12. OAU352 Batteries and Management OEC 3 0 0 3 3
system
13. OAU353 Sensors and Actuators OEC 3 0 0 3 3
14. OAS353 Space Vehicles OEC 3 0 0 3 3
15. OIM352 Management Science OEC 3 0 0 3 3
16. OIM353 Production Planning and OEC 3 0 0 3 3
Control
17. OIE353 Operations Management OEC 3 0 0 3 3
18. OSF352 Industrial Hygiene OEC 3 0 0 3 3
19. OSF353 Chemical Process Safety OEC 3 0 0 3 3
20. OML352 Electrical, Electronic and OEC 3 0 0 3 3
Magnetic materials
21. OML353 Nanomaterials and OEC 3 0 0 3 3
applications
22. OMR352 Hydraulics and Pneumatics OEC 3 0 0 3 3
23. OMR353 Sensors OEC 3 0 0 3 3
24. ORA352 Foundation of Automation OEC 3 0 0 3 3
25. ORA353 Concepts in Mobile Robotics OEC 3 0 0 3 3
26. OMV351 Marine Propulsion OEC 3 0 0 3 3
27. OMV352 Marine Merchant Vehicles OEC 3 0 0 3 3
28. OMV353 Elements of Marine OEC 3 0 0 3 3
Engineering
29. OAE353 Drone Technologies OEC 3 0 0 3 3
30. OGI352 Geographical Information OEC 3 0 0 3 3
System
31. OAI352 Agriculture Entrepreneurship OEC 3 0 0 3 3
Development
32. OEN352 Biodiversity Conservation OEC 3 0 0 3 3
33. OEE353 Introduction to control OEC 3 0 0 3 3
systems
34. OEI354 Introduction to Industrial OEC 3 0 0 3 3
Automation Systems
35. OCH353 Energy Technology OEC 3 0 0 3 3
36. OCH354 Surface Science OEC 3 0 0 3 3
37. OBT353 Environment and Agriculture OEC 3 0 0 3 3
38. OFD354 Fundamentals of Food OEC 3 0 0 3 3
Engineering
39. OFD355 Food safety and Quality OEC 3 0 0 3 3
Regulations
40. OPY353 Nutraceuticals OEC 3 0 0 3 3
41. OTT354 Basics of Dyeing and Printing OEC 3 0 0 3 3
42. OTT355 Fibre Science OEC 3 0 0 3 3
43. OTT356 Garment Manufacturing OEC 3 0 0 3 3
Technology
44. OPE353 Industrial safety OEC 3 0 0 3 3
45. OPE354 Unit Operations in Petro OEC 3 0 0 3 3
Chemical Industries
15
46. OPT352 Plastic Materials for OEC 3 0 0 3 3
Engineers
47. OPT353 Properties and Testing of OEC 3 0 0 3 3
Plastics
48. OEC353 VLSI Design OEC 3 0 0 3 3
49. OEC354 Industrial IoT and Industry 4.0 OEC 2 0 2 4 3
50. OBM353 Wearable devices OEC 3 0 0 3 3
51. OBM354 Medical Informatics OEC 3 0 0 3 3
52. OCE354 Basics of Integrated Water OEC 3 0 0 3 3
Resources Management
SUMMARY
Non-Credit
8 √ √
/(Mandatory)
Total 22 26 23 22 20 23 16 10 162
A student can also optionally register for additional courses (18 credits) and become eligible for the
award of B.E. / B. Tech. (Honours) or Minor Degree.
For B.E. / B. Tech. (Honours), a student shall register for the additional courses (18 credits) from
semester V onwards. These courses shall be from the same vertical or a combination of different
verticals of the same programme of study only.
For minor degree, a student shall register for the additional courses (18 credits) from semester V
onwards. All these courses have to be in a particular vertical from any one of the other programmes,
Moreover, for minor degree the student can register for courses from any one of the following verticals
also.
Complete details are available in clause 4.10 of Regulations 2021.
16
VERTICALS FOR MINOR DEGREE
(In addition to all the verticals of other programmes)
17
(choice of courses for Minor degree is to be made from any one vertical of other programmes
or from anyone of the following verticals)
PERIODS TOTAL
S. COURSE CATE PER WEEK
COURSE TITLE CONTACT CREDITS
NO. CODE GORY
L T P PERIODS
1. CMG331 Financial Management PEC 3 0 0 3 3
2. CMG332 Fundamentals of
PEC 3 0 0 3 3
Investment
3. CMG333 Banking, Financial
PEC 3 0 0 3 3
Services and Insurance
4. CMG334 Introduction to Blockchain
PEC 3 0 0 3 3
and its Applications
5. CMG335 Fintech Personal Finance
PEC 3 0 0 3 3
and Payments
6. CMG336 Introduction to Fintech PEC 3 0 0 3 3
VERTICAL 2: ENTREPRENEURSHIP
PERIODS TOTAL
S. COURSE CATE PER WEEK
COURSE TITLE CONTACT CREDITS
NO. CODE GORY
L T P PERIODS
1. CMG337 Foundations of
PEC 3 0 0 3 3
Entrepreneurship
2. CMG338 Team Building &
Leadership Management PEC 3 0 0 3 3
for Business
3. CMG339 Creativity & Innovation in
PEC 3 0 0 3 3
Entrepreneurship
4. CMG340 Principles of Marketing
PEC 3 0 0 3 3
Management For Business
5. CMG341 Human Resource
Management for PEC 3 0 0 3 3
Entrepreneurs
6. CMG342 Financing New Business
PEC 3 0 0 3 3
Ventures
18
VERTICAL 3: PUBLIC ADMINISTRATION
PERIODS TOTAL
S. COURSE CATE PER WEEK
COURSE TITLE CONTACT CREDITS
NO. CODE GORY
L T P PERIODS
1. CMG343 Principles of Public
PEC 3 0 0 3 3
Administration
2. CMG344 Constitution of India PEC 3 0 0 3 3
3. CMG345 Public Personnel
PEC 3 0 0 3 3
Administration
4. CMG346 Administrative Theories PEC 3 0 0 3 3
5. CMG347 Indian Administrative
PEC 3 0 0 3 3
System
6. CMG348 Public Policy
PEC 3 0 0 3 3
Administration
PERIODS TOTAL
S. COURSE CATE PER WEEK
COURSE TITLE CONTACT CREDITS
NO. CODE GORY
L T P PERIODS
1. CMG349 Statistics for
PEC 3 0 0 3 3
Management
2. CMG350 Datamining For Business
PEC 3 0 0 3 3
Intelligence
3. CMG351 Human Resource
PEC 3 0 0 3 3
Analytics
4. CMG352 Marketing And Social
PEC 3 0 0 3 3
Media Web Analytics
5. CMG353 Operation And Supply
PEC 3 0 0 3 3
Chain Analytics
6. CMG354 Financial Analytics PEC 3 0 0 3 3
19
VERTICAL 5: ENVIRONMENTAL AND SUSTAINABILITY
PERIODS TOTAL
S. COURSE CATE PER WEEK
COURSE TITLE CONTACT CREDITS
NO. CODE GORY
L T P PERIODS
1. CES331 Sustainable infrastructure
PEC 3 0 0 3 3
Development
2. CES332 Sustainable Agriculture
and Environmental PEC 3 0 0 3 3
Management
3. CES333 Sustainable Bio Materials
PEC 3 0 0 3 3
4. CES334 Materials for Energy
PEC 3 0 0 3 3
Sustainability
5. CES335 Green Technology
PEC 3 0 0 3 3
6. CES336 Environmental Quality
Monitoring and Analysis PEC 3 0 0 3 3
20
MA3354 DISCRETE MATHEMATICS L T P C
3 1 0 4
COURSE OBJECTIVES:
To extend student’s logical and mathematical maturity and ability to deal with abstraction.
To introduce most of the basic terminologies used in computer science courses and application
of ideas to solve practical problems.
To understand the basic concepts of combinatorics and graph theory.
To familiarize the applications of algebraic structures.
To understand the concepts and significance of lattices and boolean algebra which are widely
used in computer science and engineering.
21
TEXT BOOKS:
1. Rosen. K.H., "Discrete Mathematics and its Applications", 7th Edition, Tata McGraw
Hill Pub. Co. Ltd., New Delhi, Special Indian Edition, 2017.
2. Tremblay. J.P. and Manohar. R, "Discrete Mathematical Structures with Applications to
Computer Science", Tata McGraw Hill Pub. Co. Ltd, New Delhi, 30th Reprint, 2011.
REFERENCES:
1. Grimaldi. R.P. "Discrete and Combinatorial Mathematics: An Applied Introduction",
5thEdition, Pearson Education Asia, Delhi, 2013.
2. Koshy. T. "Discrete Mathematics with Applications", Elsevier Publications, 2006.
3. Lipschutz. S. and Mark Lipson., "Discrete Mathematics", Schaum’s Outlines, Tata McGraw Hill
Pub. Co. Ltd., New Delhi, 3rd Edition, 2010.
UNIT IV PROCESSOR 9
Instruction Execution – Building a Data Path – Designing a Control Unit – Hardwired Control,
Microprogrammed Control – Pipelining – Data Hazard – Control Hazards.
22
UNIT V MEMORY AND I/O 9
Memory Concepts and Hierarchy – Memory Management – Cache Memories: Mapping and
Replacement Techniques – Virtual Memory – DMA – I/O – Accessing I/O: Parallel and Serial Interface
– Interrupt I/O – Interconnection Standards: USB, SATA
45 PERIODS
COURSE OUTCOMES:
At the end of this course, the students will be able to:
CO1 : Design various combinational digital circuits using logic gates
CO2 : Design sequential circuits and analyze the design procedures
CO3 : State the fundamentals of computer systems and analyze the execution of an instruction
CO4 : Analyze different types of control design and identify hazards
CO5 : Identify the characteristics of various memory systems and I/O communication
TOTAL: 75 PERIODS
TEXT BOOKS:
1. M. Morris Mano, Michael D. Ciletti, “Digital Design : With an Introduction to the Verilog HDL, VHDL,
and System Verilog”, Sixth Edition, Pearson Education, 2018.
2. David A. Patterson, John L. Hennessy, “Computer Organization and Design, The
Hardware/Software Interface”, Sixth Edition, Morgan Kaufmann/Elsevier, 2020.
REFERENCES:
1. Carl Hamacher, Zvonko Vranesic, Safwat Zaky, Naraig Manjikian, “Computer Organization and
Embedded Systems”, Sixth Edition, Tata McGraw-Hill, 2012.
2. William Stallings, “Computer Organization and Architecture – Designing for Performance”, Tenth
Edition, Pearson Education, 2016.
3. M. Morris Mano, “Digital Logic and Computer Design”, Pearson Education, 2016.
UNIT I INTRODUCTION 9
Data Science: Benefits and uses – facets of data - Data Science Process: Overview – Defining research
goals – Retrieving data – Data preparation - Exploratory Data analysis – build the model– presenting
findings and building applications - Data Mining - Data Warehousing – Basic Statistical descriptions of
Data
COURSE OUTCOMES:
At the end of this course, the students will be able to:
CO1: Define the data science process
CO2: Understand different types of data description for data science process
CO3: Gain knowledge on relationships between data
CO4: Use the Python Libraries for Data Wrangling
CO5: Apply visualization Libraries in Python to interpret and explore data
TOTAL:45 PERIODS
TEXT BOOKS
1. David Cielen, Arno D. B. Meysman, and Mohamed Ali, “Introducing Data Science”, Manning
Publications, 2016. (Unit I)
2. Robert S. Witte and John S. Witte, “Statistics”, Eleventh Edition, Wiley Publications, 2017. (Units II
and III)
3. Jake VanderPlas, “Python Data Science Handbook”, O’Reilly, 2016. (Units IV and V)
REFERENCES:
1. Allen B. Downey, “Think Stats: Exploratory Data Analysis in Python”, Green Tea Press,2014.
24
CS3301 DATA STRUCTURES L T P C
3 0 0 3
COURSE OBJECTIVES:
To understand the concepts of ADTs.
To Learn linear data structures – lists, stacks, and queues.
To understand non-linear data structures – trees and graphs.
To understand sorting, searching and hashing algorithms.
To apply Tree and Graph structures.
UNIT I LISTS 9
Abstract Data Types (ADTs) – List ADT – Array-based implementation – Linked list implementation –
Singly linked lists – Circularly linked lists – Doubly-linked lists – Applications of lists – Polynomial ADT
– Radix Sort – Multilists.
COURSE OUTCOMES:
At the end of this course, the students will be able to:
CO1: Define linear and non-linear data structures.
CO2: Implement linear and non–linear data structure operations.
CO3: Use appropriate linear/non–linear data structure operations for solving a given problem.
CO4: Apply appropriate graph algorithms for graph applications.
CO5: Analyze the various searching and sorting algorithms.
TOTAL:45 PERIODS
TEXT BOOKS
1. Mark Allen Weiss, Data Structures and Algorithm Analysis in C, 2nd Edition, Pearson
Education, 2005.
2. Kamthane, Introduction to Data Structures in C, 1st Edition, Pearson Education, 2007
25
REFERENCES
1. Langsam, Augenstein and Tanenbaum, Data Structures Using C and C++, 2nd Edition, Pearson
Education, 2015.
2. Thomas H. Cormen, Charles E. Leiserson, Ronald L.Rivest, Clifford Stein, Introduction to
Algorithms", Fourth Edition, Mcgraw Hill/ MIT Press, 2022.
3. Alfred V. Aho, Jeffrey D. Ullman,John E. Hopcroft ,Data Structures and Algorithms, 1st edition,
Pearson, 2002.
4. Kruse, Data Structures and Program Design in C, 2nd Edition, Pearson Education, 2006.
26
UNIT V JAVAFX EVENT HANDLING, CONTROLS AND COMPONENTS 9
JAVAFX Events and Controls: Event Basics – Handling Key and Mouse Events. Controls: Checkbox,
ToggleButton – RadioButtons – ListView – ComboBox – ChoiceBox – Text Controls – ScrollPane.
Layouts – FlowPane – HBox and VBox – BorderPane – StackPane – GridPane. Menus – Basics – Menu
– Menu bars – MenuItem.
COURSE OUTCOMES:
On completion of this course, the students will be able to
CO1:Apply the concepts of classes and objects to solve simple problems
CO2:Develop programs using inheritance, packages and interfaces
CO3:Make use of exception handling mechanisms and multithreaded model to solve real world
problems
CO4:Build Java applications with I/O packages, string classes, Collections and generics concepts
CO5:Integrate the concepts of event handling and JavaFX components and controls for developing GUI
based applications
TOTAL:45 PERIODS
TEXT BOOKS:
1. Herbert Schildt, “Java: The Complete Reference”, 11 th Edition, McGraw Hill Education, New Delhi,
2019
2. Herbert Schildt, “Introducing JavaFX 8 Programming”, 1 st Edition, McGraw Hill Education, New
Delhi, 2015
REFERENCE:
1. Cay S. Horstmann, “Core Java Fundamentals”, Volume 1, 11 th Edition, Prentice Hall, 2018.
COURSE OBJECTIVES:
To demonstrate array implementation of linear data structure algorithms.
To implement the applications using Stack.
To implement the applications using Linked list
To implement Binary search tree and AVL tree algorithms.
To implement the Heap algorithm.
To implement Dijkstra’s algorithm.
To implement Prim’s algorithm
To implement Sorting, Searching and Hashing algorithms.
LIST OF EXERCISES:
1. Array implementation of Stack, Queue and Circular Queue ADTs
2. Implementation of Singly Linked List
3. Linked list implementation of Stack and Linear Queue ADTs
4. Implementation of Polynomial Manipulation using Linked list
5. Implementation of Evaluating Postfix Expressions, Infix to Postfix conversion
27
6. Implementation of Binary Search Trees
7. Implementation of AVL Trees
8. Implementation of Heaps using Priority Queues
9. Implementation of Dijkstra’s Algorithm
10. Implementation of Prim’s Algorithm
11. Implementation of Linear Search and Binary Search
12. Implementation of Insertion Sort and Selection Sort
13. Implementation of Merge Sort
14. Implementation of Open Addressing (Linear Probing and Quadratic Probing)
TOTAL:45 PERIODS
COURSE OUTCOMES:
At the end of this course, the students will be able to:
CO1: Implement Linear data structure algorithms.
CO2: Implement applications using Stacks and Linked lists
CO3: Implement Binary Search tree and AVL tree operations.
CO4: Implement graph algorithms.
CO5: Analyze the various searching and sorting algorithms.
LIST OF EXPERIMENTS:
1. Solve problems by using sequential search, binary search, and quadratic sorting algorithms
(selection, insertion)
2. Develop stack and queue data structures using classes and objects.
3. Develop a java application with an Employee class with Emp_name, Emp_id, Address, Mail_id,
Mobile_no as members. Inherit the classes, Programmer, Assistant Professor,
Associate Professor and Professor from employee class. Add Basic Pay (BP) as the member
of all the inherited classes with 97% of BP as DA, 10 % of BP as HRA, 12% of
BP as PF, 0.1% of BP for staff club funds. Generate pay slips for the employees with their gross
and net salary.
4. Write a Java Program to create an abstract class named Shape that contains two integers and
an empty method named printArea(). Provide three classes named Rectangle, Triangle and
Circle such that each one of the classes extends the class Shape. Each one of the classes
contains only the method printArea( ) that prints the area of the given shape.
5. Solve the above problem using an interface.
6. Implement exception handling and creation of user defined exceptions.
28
7. Write a java program that implements a multi-threaded application that has three threads. First
thread generates a random integer every 1 second and if the value is even, the second thread
computes the square of the number and prints. If the value is odd, the third thread will print the
value of the cube of the number.
8. Write a program to perform file operations.
9. Develop applications to demonstrate the features of generics classes.
10. Develop applications using JavaFX controls, layouts and menus.
11. Develop a mini project for any application using Java concepts.
Lab Requirements: for a batch of 30 students
Operating Systems: Linux / Windows
Front End Tools: Eclipse IDE / Netbeans IDE
TOTAL: 45 PERIODS
COURSE OUTCOMES:
On completion of this course, the students will be able to
CO1 : Design and develop java programs using object oriented programming concepts
CO2 : Develop simple applications using object oriented concepts such as package, exceptions
CO3: Implement multithreading, and generics concepts
CO4 : Create GUIs and event driven programming applications for real world problems
CO5: Implement and deploy web applications using Java
LIST OF EXPERIMENTS:
1. Download, install and explore the features of NumPy, SciPy, Jupyter, Statsmodels and Pandas
packages.
2. Working with Numpy arrays
3. Working with Pandas data frames
4. Reading data from text files, Excel and the web and exploring various commands for doing
descriptive analytics on the Iris data set.
5. Use the diabetes data set from UCI and Pima Indians Diabetes data set for performing the
following:
a. Univariate analysis: Frequency, Mean, Median, Mode, Variance, Standard Deviation,
Skewness and Kurtosis.
b. Bivariate analysis: Linear and logistic regression modeling
c. Multiple Regression analysis
d. Also compare the results of the above analysis for the two data sets.
29
6. Apply and explore various plotting functions on UCI data sets.
a. Normal curves
b. Density and contour plots
c. Correlation and scatter plots
d. Histograms
e. Three dimensional plotting
7. Visualizing Geographic Data with Basemap
UNIT V UNDECIDABILITY 9
Unsolvable Problems and Computable Functions –PCP-MPCP- Recursive and recursively enumerable
languages – Properties - Universal Turing machine -Tractable and Intractable problems - P and NP
completeness – Kruskal’s algorithm – Travelling Salesman Problem- 3-CNF SAT problems.
COURSE OUTCOMES:
At the end of this course, the students will be able to:
CO1: Construct automata theory using Finite Automata
CO2: Write regular expressions for any pattern
CO3: Design context free grammar and Pushdown Automata
CO4: Design Turing machine for computational functions
CO5: Differentiate between decidable and undecidable problems
TOTAL:45 PERIODS
TEXT BOOKS:
1. Hopcroft J.E., Motwani R. & Ullman J.D., "Introduction to Automata Theory, Languages and
Computations", 3rd Edition, Pearson Education, 2008.
2. John C Martin , "Introduction to Languages and the Theory of Computation", 4th Edition, Tata
McGraw Hill, 2011.
REFERENCES:
1. Harry R Lewis and Christos H Papadimitriou , "Elements of the Theory of Computation", 2nd
Edition, Prentice Hall of India, 2015.
2. Peter Linz, "An Introduction to Formal Language and Automata", 6th Edition, Jones & Bartlett,
2016.
3. K.L.P.Mishra and N.Chandrasekaran, “Theory of Computer Science: Automata Languages and
Computation”, 3rd Edition, Prentice Hall of India, 2006.
31
UNIT I PROBLEM SOLVING 9
Introduction to AI - AI Applications - Problem solving agents – search algorithms – uninformed search
strategies – Heuristic search strategies – Local search and optimization problems – adversarial search
– constraint satisfaction problems (CSP)
COURSE OUTCOMES:
At the end of this course, the students will be able to:
CO1: Use appropriate search algorithms for problem solving
CO2: Apply reasoning under uncertainty
CO3: Build supervised learning models
32
CO4: Build ensembling and unsupervised models
CO5: Build deep learning neural network models
TOTAL:75 PERIODS
TEXT BOOKS:
1. Stuart Russell and Peter Norvig, “Artificial Intelligence – A Modern Approach”, Fourth Edition,
Pearson Education, 2021.
2. Ethem Alpaydin, “Introduction to Machine Learning”, MIT Press, Fourth Edition, 2020.
REFERENCES:
1. Dan W. Patterson, “Introduction to Artificial Intelligence and Expert Systems”, Pearson
Education,2007
2. Kevin Night, Elaine Rich, and Nair B., “Artificial Intelligence”, McGraw Hill, 2008
3. Patrick H. Winston, "Artificial Intelligence", Third Edition, Pearson Education, 2006
4. Deepak Khemani, “Artificial Intelligence”, Tata McGraw Hill Education, 2013
(http://nptel.ac.in/)
5. Christopher M. Bishop, “Pattern Recognition and Machine Learning”, Springer, 2006.
6. Tom Mitchell, “Machine Learning”, McGraw Hill, 3rd Edition,1997.
7. Charu C. Aggarwal, “Data Classification Algorithms and Applications”, CRC Press, 2014
8. Mehryar Mohri, Afshin Rostamizadeh, Ameet Talwalkar, “Foundations of Machine Learning”,
MIT Press, 2012.
9. Ian Goodfellow, Yoshua Bengio, Aaron Courville, “Deep Learning”, MIT Press, 2016
33
Preservation – Boyce/Codd Normal Form – Multi-valued Dependencies and Fourth Normal Form – Join
Dependencies and Fifth Normal Form
COURSE OUTCOMES:
Upon completion of this course, the students will be able to
CO1:Construct SQL Queries using relational algebra
CO2:Design database using ER model and normalize the database
CO3: Construct queries to handle transaction processing and maintain consistency of the database
CO4: Compare and contrast various indexing strategies and apply the knowledge to tune the
performance of the database
CO5: Appraise how advanced databases differ from Relational Databases and find a suitable
database for the given requirement.
TOTAL:45 PERIODS
TEXT BOOKS:
1. Abraham Silberschatz, Henry F. Korth, S. Sudharshan, “Database System Concepts”, Seventh
Edition, McGraw Hill, 2020.
2. Ramez Elmasri, Shamkant B. Navathe, “Fundamentals of Database Systems”, Seventh Edition,
Pearson Education, 2017
REFERENCES:
1. C.J.Date, A.Kannan, S.Swamynathan, “An Introduction to Database Systems”, Eighth Edition,
Pearson Education, 2006.
34
CS3401 ALGORITHMS L T P C
3 0 2 4
COURSE OBJECTIVES:
To understand and apply the algorithm analysis techniques on searching and sorting algorithms
To critically analyze the efficiency of graph algorithms
To understand different algorithm design techniques
To solve programming problems using state space tree
To understand the concepts behind NP Completeness, Approximation algorithms and
randomized algorithms.
UNIT I INTRODUCTION 9
Algorithm analysis: Time and space complexity - Asymptotic Notations and its properties Best case,
Worst case and average case analysis – Recurrence relation: substitution method - Lower bounds –
searching: linear search, binary search and Interpolation Search, Pattern search: The naïve string-
matching algorithm - Rabin-Karp algorithm - Knuth-Morris-Pratt algorithm. Sorting: Insertion sort –
heap sort
45 PERIODS
PRACTICAL EXERCISES: 30 PERIODS
Searching and Sorting Algorithms
1. Implement Linear Search. Determine the time required to search for an element. Repeat the
experiment for different values of n, the number of elements in the list to be searched and plot a
graph of the time taken versus n.
35
2. Implement recursive Binary Search. Determine the time required to search an element. Repeat
the experiment for different values of n, the number of elements in the list to be searched and
plot a graph of the time taken versus n.
3. Given a text txt [0...n-1] and a pattern pat [0...m-1], write a function search (char pat [ ], char txt
[ ]) that prints all occurrences of pat [ ] in txt [ ]. You may assume that n > m.
4. Sort a given set of elements using the Insertion sort and Heap sort methods and determine the
time required to sort the elements. Repeat the experiment for different values of n, the number
of elements in the list to be sorted and plot a graph of the time taken versus n.
Graph Algorithms
1. Develop a program to implement graph traversal using Breadth First Search
2. Develop a program to implement graph traversal using Depth First Search
3. From a given vertex in a weighted connected graph, develop a program to find the shortest paths
to other vertices using Dijkstra’s algorithm.
4. Find the minimum cost spanning tree of a given undirected graph using Prim’s algorithm.
5. Implement Floyd’s algorithm for the All-Pairs- Shortest-Paths problem.
6. Compute the transitive closure of a given directed graph using Warshall's algorithm.
36
TEXT BOOKS:
1. Thomas H. Cormen, Charles E. Leiserson, Ronald L. Rivest and Clifford Stein, "Introduction to
Algorithms", 3rd Edition, Prentice Hall of India, 2009.
2. Ellis Horowitz, Sartaj Sahni, Sanguthevar Rajasekaran “Computer Algorithms/C++” Orient
Blackswan, 2nd Edition, 2019.
REFERENCES:
1. Anany Levitin, “Introduction to the Design and Analysis of Algorithms”, 3rd Edition, Pearson
Education, 2012.
2. Alfred V. Aho, John E. Hopcroft and Jeffrey D. Ullman, "Data Structures and Algorithms", Reprint
Edition, Pearson Education, 2006.
3. S. Sridhar, “Design and Analysis of Algorithms”, Oxford university press, 2014.
UNIT I INTRODUCTION 7
Computer System - Elements and organization; Operating System Overview - Objectives and Functions
- Evolution of Operating System; Operating System Structures – Operating System Services - User
Operating System Interface - System Calls – System Programs - Design and Implementation -
Structuring methods.
37
UNIT IV STORAGE MANAGEMENT 10
Mass Storage system – Disk Structure - Disk Scheduling and Management; File-System Interface - File
concept - Access methods - Directory Structure - Directory organization - File system mounting - File
Sharing and Protection; File System Implementation - File System Structure - Directory implementation
- Allocation Methods - Free Space Management; I/O Systems – I/O Hardware, Application I/O interface,
Kernel I/O subsystem.
TOTAL:45 PERIODS
COURSE OUTCOMES:
At the end of this course, the students will be able to:
CO1 : Analyze various scheduling algorithms and process synchronization.
CO2 : Explain deadlock prevention and avoidance algorithms.
CO3 : Compare and contrast various memory management schemes.
CO4 : Explain the functionality of file systems, I/O systems, and Virtualization
CO5 : Compare iOS and Android Operating Systems.
TEXT BOOKS:
1. Abraham Silberschatz, Peter Baer Galvin and Greg Gagne, “Operating System Concepts”‖,
10th Edition, John Wiley and Sons Inc., 2018.
2. Andrew S Tanenbaum, "Modern Operating Systems", Pearson, 5th Edition, 2022 New Delhi.
REFERENCES:
1. Ramaz Elmasri, A. Gil Carrick, David Levine, “ Operating Systems – A Spiral Approach”, Tata
McGraw Hill Edition, 2010.
2. William Stallings, "Operating Systems: Internals and Design Principles", 7th Edition, Prentice
Hall, 2018.
3. Achyut S.Godbole, Atul Kahate, “Operating Systems”, McGraw Hill Education, 2016.
38
UNIT II ENVIRONMENTAL POLLUTION 9
Causes, Effects and Preventive measures of Water, Soil, Air and Noise Pollutions.
Solid, Hazardous and E-Waste management. Case studies on Occupational Health and Safety
Management system (OHASMS). Environmental protection, Environmental protection acts .
REFERENCE BOOKS :
1. R.K. Trivedi, ‘Handbook of Environmental Laws, Rules, Guidelines, Compliances and
Standards’, Vol. I and II, Enviro Media. 38 . edition 2010.
39
2. Cunningham, W.P. Cooper, T.H. Gorhani, ‘Environmental Encyclopedia’, Jaico Publ., House,
Mumbai, 2001.
3. Dharmendra S. Sengar, ‘Environmental law’, Prentice hall of India PVT. LTD, New Delhi,
2007.
4. Rajagopalan, R, ‘Environmental Studies-From Crisis to Cure’, Oxford University Press, Third
Edition, 2015.
5. Erach Bharucha “Textbook of Environmental Studies for Undergraduate Courses” Orient
Blackswan Pvt. Ltd. 2013.
LIST OF EXPERIMENTS:
LIST OF EXPERIMENTS:
1. Create a database table, add constraints (primary key, unique, check, Not null), insert rows,
update and delete rows using SQL DDL and DML commands.
2. Create a set of tables, add foreign key constraints and incorporate referential integrity.
3. Query the database tables using different ‘where’ clause conditions and also implement
aggregate functions.
4. Query the database tables and explore sub queries and simple join operations.
5. Query the database tables and explore natural, equi and outer joins.
6. Write user defined functions and stored procedures in SQL.
7. Execute complex transactions and realize DCL and TCL commands.
8. Write SQL Triggers for insert, delete, and update operations in a database table.
9. Create View and index for database tables with a large number of records.
10. Create an XML database and validate it using XML schema.
11. Create Document, column and graph based data using NOSQL database tools.
12. Develop a simple GUI based database application and incorporate all the above-mentioned
features
13. Case Study using any of the real life database applications from the following list
a) Inventory Management for a EMart Grocery Shop
b) Society Financial Management
c) Cop Friendly App – Eseva
d) Property Management – eMall
e) Star Small and Medium Banking and Finance
● Build Entity Model diagram. The diagram should align with the business and functional
goals stated in the application.
41
● Apply Normalization rules in designing the tables in scope.
● Prepared applicable views, triggers (for auditing purposes), functions for enabling
enterprise grade features.
● Build PL SQL / Stored Procedures for Complex Functionalities, ex EOD Batch Processing
for calculating the EMI for Gold Loan for each eligible Customer.
● Ability to showcase ACID Properties with sample queries with appropriate settings
42