Siddhartha Engineering College: Velagapudi Ramakrishna
Siddhartha Engineering College: Velagapudi Ramakrishna
Siddhartha Engineering College: Velagapudi Ramakrishna
Introduction
2.
Programmes Offered
3.
4.
5.
6.
Programme Structure
7.
Medium of Instruction
8.
Syllabus
9.
12. Revaluation
10
10
10
10
17. Malpractices
11
11
11
12
13
14
2
M.Tech(CSE) VR10 Regulations
1. INTRODUCTION
Academic Programmes of the College are governed by rules and regulations as approved by the Academic
Council, which is the highest Academic body of the Institute. These academic rules and regulations are
effective from the academic year 2010-11, for students admitted into two year PG programme offered by
the college leading to Master of Technology (M.Tech) in various specializations offered by respective
departments as given in Table 1.
2. PROGRAMMES OFFERED
Presently, the college is offering Post Graduate programmes in Engineering with the following
specializations:
Table 1: List of Specilizations
S.No
1
2
3
4
Specialization
Structural Engineering
Computer Science and Engineering
Communication s and Signal Processing
Telematics
Department
Civil Engineering
Computer Science and Engineering
Electronics & Communication
Engineering
Power Systems
6
7
CAD/CAM
Thermal Engineering
Mechanical Engineering
These seats will be filled by the College as per the guidelines of APSCHE
3
M.Tech(CSE) VR10 Regulations
6. PROGRAMME STRUCTURE
Every specialization of the M.Tech programme shall have six theory courses and two practical / mini
project / seminar courses in each of first and second semesters. A major project is offered in third and
fourth semesters.
CE
CS
EC
EE
ME
Third and fourth character represents specialization offering as mentioned in Table No. 3.
Structural Engineering
Computer Science and Engineering
Communication s and Signal Processing
Telematics
Power Systems Engg
CAD/CAM
Thermal Engineering
Fifth and sixth characters represent semester number and syllabus version number of the
course offered Seventh character represents course type, as per Table No. 4
Table 4: Course type description
SEVENTH CHARACTER
DESCRIPTION
Theory course
Lab course
Eighth character represents course number as described in Figure 1 below. However, few courses
are given distinct codes.
For example, in MECC 1051 course, the course is offered by Mechanical Engineering Department
(ME) in CAD/CAM specialization offered in the first semester (1), the course syllabus version
number (0), the course is of lab type (5) and the course number is (1), as given in figure.2 below.
VELAGAPUDI RAMAKRISHNA SIDDHARTHA ENGINEERING COLLEGE: VIJAYAWADA - 7
4
M.Tech(CSE) VR10 Regulations
Department
Code
Specialization Semester
code
Number
version
number
Course
type
Course
Number
6.2
6.3
6.4
Tutorials - Two tutorial periods per week are assigned one credit.
Practical 2 periods per week is assigned one credit
However, some courses are prescribed with fixed number of credits depending on the subject
complexity and importance.
6.5
Laboratory Courses
A minimum prescribed number of experiments have to be performed by the students, who shall
complete these in all respects and get each experiment evaluated by teacher concerned and
certified by the Head of the Department concerned at the end of the semester.
6.6
Programme Credits
Each specialization of M.Tech programme is designed to have a total of 80 credits, and the
student shall have to complete the courses and earn credits as per the requirements for the award
of degree.
7. MEDIUM OF INSTRUCTION
The medium of instruction and examination is English.
8. SYLLABUS
As approved by the concerned BOS and the Academic Council.
VELAGAPUDI RAMAKRISHNA SIDDHARTHA ENGINEERING COLLEGE: VIJAYAWADA - 7
5
M.Tech(CSE) VR10 Regulations
c. Students, having shortage of attendance, shall pay Rs.20/-per every period of attendance
shortage subject to a minimum of Rs.500/-.
d. Minimum of 50% aggregate marks must be secured by the candidates in the internal examinations
conducted for theory, practice and lab courses, to be eligible to write semester end examinations.
However, if the student is eligible for promotion based on the attendance, in case necessary, a shortage
of internal marks up to a maximum of 10% may be condoned by the Principal based on the
recommendations of the Heads of the Departments.
e. Students having shortage of internal marks up to a maximum of 10% shall have to pay Rs.1000/towards condonation fee for shortage of internal marks.
f. A student, who does not satisfy the attendance and/or internal marks requirement, shall have to
repeat that semester.
g. Eligible candidates who failed to register for all papers for the semester-end examinations shall not be
permitted to continue the subsequent semester and has to repeat the semester for which he/she has not
registered for semester end examinations.
project in each subject as notified by the teacher at the beginning of the semester.
Students shall be informed regarding the comprehensive assignment/project during first week of semester
and they have to submit completed assignment on or before 12th week of semester.
6
M.Tech(CSE) VR10 Regulations
For Laboratory courses there shall be continuous evaluation during the semester for 25
internal marks. The distribution of internal marks are given below:
Table 5: Distribution of Marks
Sl.No.
1
2
3
Criteria
Day to Day work
Record
Internal Examination
Marks
10
05
10
Sl.No.
1
2
10.1.4
Marks
15
10
Sl.No.
1
2
Criteria
Two seminars
Day to day assessment
Marks
15+15
20
The Semester end examinations shall be conducted for 3 hours duration at the end of the
semester. The question paper shall be given in the following pattern :
There shall be two questions from each unit with internal choice. Each question carries 15
marks. Each course shall consist of four units of syllabus.
7
M.Tech(CSE) VR10 Regulations
8
M.Tech(CSE) VR10 Regulations
In a special case, if any candidate does not submit his/her thesis due to ill health or any other
reason permitted by the head of the institution, he/she will be given another chance to attend for
the viva-voce examination conducted separately at a later date, if the expenditure for conducting
the viva-voce is completely borne by the candidate.
11. CONDITIONS FOR PASS AND AWARD OF CREDITS FOR A COURSE
11.1 Conditions for Pass and award of Grades and Credits:
a)
b)
A candidate shall be declared to have passed in individual lab/project course if he/she secures
a minimum of 50% aggregate marks (Internal & semester end examination marks put
together), subject to a minimum of 50% marks in semester end examination.
c)
If a candidate secures minimum of 40% marks in Theory Courses in the semester end
examination and 40% - 49% of the total marks in the semester end examination and internal
evaluation taken together in some theory courses and secures an overall aggregate of 50% in
all theory courses of that semester he/she declared to be passed in the theory courses of that
semester.
d)
The student has to pass the failed course by appearing the examination when offered next, as
per the requirement for award of the degree.
e)
On passing a course of a programme, the student shall earn assigned credits in that
Course.
11.2 Method of Awarding Letter Grades and Grade Points for a Course.
A letter grade and grade points will be awarded to a student in each course based on his/her
performance as per the grading system given below.
Table 8: Grading System for individual subjects/labs
Theory/Drawing
85-100%
75-84%
70-74%
65-69%
60-64%
50-59%
40-49%
< 40%
Lab/Project
85-100%
75-84%
70-74%
65-69%
60-64%
55-59%
50-54%
< 50%
Grade Points
10
9
8
7
6
5
4
0
Letter Grade
Ex
A+
A
B+
B
C
D
F (Fail)
9
M.Tech(CSE) VR10 Regulations
11.3 Calculation of Semester Grade Points Average (SGPA)* and award of division
for the program.
The performance of each student at the end of the each semester is indicated in
terms of SGPA. The SGPA is calculated as below:
SGPA =
(CR X GP)
CGPA =
(CR X GP)
CR
DIVISION
First Class with distinction
First Class
Second Class
Pass Class
Fail
12.
REVALUATION
As per the notification issued by the Chief Controller of Examinations, the students can submit the
applications for revaluation, along with the fee receipt for revaluation of his/her answer script(s) of
theory course(s), if he/she is not satisfied with marks obtained.
The Controller of Examinations shall arrange for revaluation of those answer script(s).
A new external examiner, other than the first examiner, shall revaluate the answer script(s).
Better marks of the two will be taken into consideration.
10
M.Tech(CSE) VR10 Regulations
13.
READMISSION CRITERIA
A candidate, who is detained in a semester due to lack of attendance/marks, has to obtain written
permission from the Principal for readmission into the same semester after duly fulfilling all the
required norms stipulated by the college in addition to paying an administrative fee of Rs. 1,000/-
14.
BREAK IN STUDY
Student, who discontinues the studies for what so ever may be the reason, can get readmission into
appropriate semester of M.Tech programme after break-in study only with the prior permission of the
Principal of the College provided such candidate shall follow the transitory regulations applicable to
such batch in which he/she joins. An administrative fee of Rs. 2000/- per each year of break in study
in addition to the prescribed tuition and special fee has to be paid by the candidate to condone his/her
break in study.
15.
16.
Students shall conduct themselves within and outside the premises of the Institute in a manner
befitting the students of our Institution.
As per the order of Honorable Supreme Court of India, ragging in any form is considered a criminal
offence and is banned. Any form of ragging will be severely dealt with.
The following acts of omission and/or commission shall constitute gross violation of the code of
conduct and are liable to invoke disciplinary measures with regard to ragging.
Lack of courtesy and decorum; indecent behavior any where within or outside the campus.
Willful damage or distribution of alcoholic drinks or any kind of narcotics to fellow students
/citizens.
Possession, consumption or distribution of alcoholic drinks or any kind of narcotics or hallucinogenic
drugs.
Mutilation or unauthorized possession of library books.
Noisy and unseemly behavior, disturbing studies of fellow students.
Hacking computer systems (such as entering into other persons areas without prior permission,
manipulation and/or damage of computer hardware and software or any other cyber crime etc.
Students are not allowed to use cell phones in the campus.
Plagiarism of any nature is prohibited.
Any other act of gross indiscipline as decided by the college from time to time.
Commensurate with the gravity of offense, the punishment may be reprimand, fine, expulsion from
the institute / hostel, debarment from a examination, disallowing the use of certain facilities of the
Institute, rustication for a specified period or even outright expulsion from the Institute, or even
handing over the case to appropriate law enforcement authorities or the judiciary, as required by the
circumstances.
For an offence committed in (i) a hostel (ii) a department or in a class room and (iii) elsewhere, the
Chief Warden, the Head of the Department and the Principal, respectively, shall have the authority to
reprimand or impose fine.
Cases of adoption of unfair means and/or any malpractice in an examination shall be reported to the
Principal for taking appropriate action.
Un authorized collection of money in any form is strictly prohibited.
Detained and Break-in-Study candidates are allowed into the campus for academic purposes only
with permission from Authorities.
11
17. MALPRACTICES
The Principal shall refer the cases of malpractices in internal assessment tests and Semester-End
Examinations, to a Malpractice Enquiry Committee, constituted by him/her for the purpose. Such
committee shall follow the approved scales of punishment. The Principal shall take necessary action,
against the erring students basing on the recommendations of the committee.
Any action on the part of candidate at an examination trying to get undue advantage in the
performance or trying to help another, or derive the same through unfair means is punishable
according to the provisions contained hereunder. The involvement of the Staff, who are in charge of
conducting examinations, valuing examination papers and preparing/keeping records of documents
relating to the examinations in such acts (inclusive of providing incorrect or misleading information)
that infringe upon the course of natural justice to one and all concerned at the examination shall be
viewed seriously and recommended for award of appropriate punishment after thorough enquiry.
The physically challenged candidates who have availed additional examination time during their
B.Tech/PGCET examinations will be given additional examination time on production of relevant
proof/documents.
Students who are suffering from contagious diseases are not allowed to appear either internal or
semester end examinations.
The Principal shall deal with any academic problem, which is not covered under these rules and
regulations, in consultation with the Heads of the Departments in an appropriate manner, and
subsequently such actions shall be placed before the academic council for ratification. Any emergency
modification of regulation, approved in the Heads of the Departments Meetings, shall be reported to the
academic council for ratification.
19.
AMENDMENTS TO REGULATIONS
The Academic Council may, from time to time, revise, amend or change the regulations,
schemes of examination and/or syllabi.
12
M.Tech(CSE) VR10 Regulations
Sub. Code
Subject Title
CSCS1001
--
40
60
100
CSCS1002
--
40
60
100
CSCS1003
--
--
40
60
100
4
5
CSCS1004
Mathematical Foundation
for Computer Science
Advanced Data Structures &
Algorithms
Computer Organization &
Architecture
Web Technologies
--
--
40
60
100
--
--
40
60
100
CSCS1006
--
--
40
60
100
CSCS1051
--
--
25
50
75
CSCS1052
--
--
25
50
75
24
--
28
290
460
750
CSCS1005
A - Advanced DBMS
B - Digital Image Processing
C AI and Neural Networks
D Parallel Computing & Alg.
Sub. Code
CSCS2001
CSCS2002
CSCS2003
CSCS2004
Subject Title
--
40
60
100
--
40
60
100
--
--
40
60
100
--
--
40
60
100
--
--
40
60
100
--
--
40
60
100
Elective II
5
CSCS2005
Elective III
A Cryptography and Network
Security
B Secured Database
Application Development.
C Bio-informatics
D Soft Computing
CSCS2006
CSCS2051
--
--
25
50
75
CSCS2052
--
--
25
50
75
24
--
28
290
460
750
L: Lecture T: Tutorial P: Practical C: Credits I: Internal Assessment E: End Semester T: Total Marks
13
M.Tech(CSE) VR10 Regulations
S.No
Sub. Code
CSCS4051
Subject Title
Project Work
24
100
200
300
24
Courses
S.No.
Category
Credits
4.
PC
40
5.
Elective Courses
EL
12
6.
MP
24
7.
SC
Total Credits
80
Courses Distribution: Category wise
Year &
Semester
Programme
Core
I Year I
Semester
CSCS1002-4
CSCS1003-4
CSCS1004-4
CSCS1005-4
CSCS1051-2
CSCS1052-2
I Year
II Semester
CSCS2001-4
CSCS2001-4
CSCS2003-4
CSCS2004-4
CSCS2051-2
CSCS2052-2
Elective
Major Project
CSCS1006-4
CSCS1001-4
CSCS2005-4
CSCS2006-4
Total Credits:
Total Credits
28
28
CSCS4051-24
Supporting to
the Core
24
80
14
M.Tech(CSE) VR10 Regulations
4 hrs/ Week
Learning
Outcomes:
Internal Assessment:
Final Examination:
Credits:
40
60
4
UNIT I:
Foundations: Sets, Relations & functions, Proof & Problem Solving, Fundamentals of Logic, Logical
Inferences, Methods of Proof of an implication, First Order Logic & Other methods of proof, Rules of
Inference and quantified propositions, Mathematical Induction.
UNIT II:
Recurrence Relations: Generating Functions, Solving recurrence relations, the methods of
characteristics roots, undetermined coefficient method.
Relations & Digraphs: Equivalence relations, ordering relations, Lattices & enumerations, Operations on
Relations, Paths & Closures, Directed graphs & Adjacency matrices.
UNIT III:
Automata: Introduction to Automata, The central concepts of automata theory - Alphabets, Strings,
Languages.
Finite Automata: An Informal picture of finite automata, Deterministic finite automata (DFA) Definition of DFA, DFA processing strings, Notations for DFA, Extended transition function, the
language of DFA, Non deterministic finite automata (NFA) Definition of NFA, Extended transition
function, the language of NFA, Equivalence of DFA and NFA Finite Automata with transitions: Use
of - transition, notation for an - NFA, Epsilon closures, extended transitions and languages,
Applications
UNIT IV
Regular Expressions and Languages: Regular expressions, finite automata and regular expressions,
Algebraic laws of regular expressions, Proving languages are not regular Pumping lemma for regular
languages, Applications of the pumping lemma, Closure Properties of Regular Languages, Equivalence
and minimization of automata Minimization of DFA.
Context Free Grammars: Context Free Grammars, Parse Trees, Constructing parse trees, derivations
VELAGAPUDI RAMAKRISHNA SIDDHARTHA ENGINEERING COLLEGE: VIJAYAWADA - 7
15
M.Tech(CSE) VR10 Regulations
and parse trees, ambiguous grammars. Context Free languages - Normal forms for context- Free
grammars, the pumping lemma for context free languages.
Pushdown Automata: Definition of the Pushdown automata, the languages of PDA, Equivalences of
PDAs and CFGs.
Learning Resources:
Text Books:
1. Joe L. Mott, Abrabam Kandel and Theodore P. Bakev, Discrete Mathematics for Computer Scientists
and Mathematics. PHI. (UNIT I & II)
2. John.E. Hopcroft, R. Motwani, and Jeffery. D. Ullman, Introduction to Automata Theory, Languages
and Computations. 2 ed, Pearson Education, 2003 (UNIT III & IV)
Reference Books:
1. C. L. Liu, Elements of Discrete Mathematics.
2. Rosen, Discrete Mathematics
16
M.Tech(CSE) VR10 Regulations
CSCS1002
ADVANCED DATA STRUCTURES AND ALGORITHMS
Lecture :
Tutorial :
Practical :
Objectives:
Learning
Outcomes:
4 hrs/ Week
Internal Assessment:
Final Examination:
Credits:
40
60
4
Analyze step by step and develop algorithms to solve real world problems.
Implementing various data structures
Investigate whether the algorithm found is the most efficient.
Formulate the time order analysis for an algorithm.
Formulate the space needs for the implementation of an algorithm.
Prove the correctness of an algorithm
UNIT I:
Overview of Data Structures: Review of Arrays, Stacks, Queues, linked lists, Linked stacks and
Linked queues, Applications.
Algorithm Analysis: Efficiency of algorithms, Apriori Analysis, Asymptotic Notations, Time
complexity of an algorithm using O notation, Polynomial Vs Exponential Algorithms, Average, Best,
and Worst Case Complexities, Analyzing Recursive Programs.
Trees: Introduction, Definition and Basic terminologies of trees and binary trees, Representation of
trees and Binary trees, Binary tree Traversals.
Graphs: Introduction, Definitions and Basic technologies, representation of Graphs, Graph
Traversals and applications.
UNIT II:
Binary Search Trees, AVL Trees and B Trees:
Binary Search Trees: Definition, Operations and applications. AVL Trees: Definition, Operations
and applications. B-Trees: Definition, Operations and applications.
Red Black Trees, Splay Trees: Operations and applications.
Hash Tables: Introduction, Hash Tables, Hash Functions and applications
UNIT III:
Divide and Conquer & Greedy Method: Divide and Conquer: General Method, Binary
Search, Finding Maximum and Minimum, Quick Sort, Merge sort, Strassens Matrix Multiplication,
Greedy Method: General Method, Minimum Cost Spanning Trees, Single Source Shortest Path,
Knapsack. Dynamic Programming General Method, All Pairs Shortest Path, Single Source Shortest
Path, 0 / 1 Knapsack problem, Optimal Binary Search Trees.
UNIT IV
Back Tracking and Branch and Bound: General Method, 8 Queens Problem, Graph
VELAGAPUDI RAMAKRISHNA SIDDHARTHA ENGINEERING COLLEGE: VIJAYAWADA - 7
17
M.Tech(CSE) VR10 Regulations
Coloring. Branch and Bound: The Method, LC Search, Control Abstraction, Bounding, 0 / 1
Knapsack Problem.
NP Hard and NP Complete: Cooks theorem
Learning Resources:
Text Books:
1. G. A. V. Pai, Data Structures and Algorithms. TMH, 2009.
2. Ellis Horowitz, Sartaj Sahni and Sanguthevar Rajasekaran, Fundamentals of Computer Algorithms. 2
ed, UniversityPress.
Reference Books:
1. Thomas Cormen, C. Leiserson, R. L. Rivest and C. Stein, Introduction to Algorithms. 2 ed, PHI.
2. Aho, Hopcraft and Ullman, Design and Analysis of Computer Algorithm. PEA, 1998.
3. E. Horowitz and S. Sahani, Design and Analysis of Algorithms. 3 ed, Galgotia.
18
M.Tech(CSE) VR10 Regulations
CSCS1003
COMPUTER ORGANIZATION AND ARCHITECTURE
Lecture :
Tutorial :
Practical :
4 hrs/ Week
-
Objectives:
Students learn:
Basic building blocks of the computer.
Functional units: operation, interaction and communication.
The factors and trade-offs that affect computer performance.
Concrete representation of data at the machine level.
Machine level Computations
Learning
Outcomes:
Internal Assessment:
Final Examination:
Credits:
40
60
4
UNIT I:
Computer Structure Hardware, software, system software, Von-neumann architecture case
study. IA -32 Pentium: registers and addressing, instructions, assembly language, program flow
control, logic and shift/rotate instructions, multiply, divide MMX, SIMD instructions, I/O
operations, subroutines.
Input/Output Organization - interrupts, DMA, Buses, Interface circuits, I/O interfaces, device
drivers in windows, interrupt handlers
UNIT II:
Processing Unit - Execution of a complete instruction, multiple bus organization, hardwired
control, micro programmed control.
Pipelining: Data hazards, instruction hazards, influence on instruction sets, data path & control
consideration, RISC architecture introduction.
UNIT III:
Memory: Types and hierarchy, model level organization, cache memory, performance
considerations, mapping, virtual memory, swapping, paging, segmentation, replacement policies.
Processes and Threads: Processes, threads, inter process communication, classical IPC problems,
Deadlocks.
UNIT IV
File system: Files, directories, Implementation, UNIX file system
Security: Threats, intruders, accident data loss, basics of cryptography, user authentication.
Learning Resources:
Text Books:
1. Carl Hamacher, Z. Vranesic and Safea Zaky, Computer Organization. 5 ed, McGrawHill.
2. AndrewS. Tanenbaum, Modern OperatingSystems. 2 ed, Pearson/PHI.
Reference Books:
1. William Stallings, Computer Organization and Architecture. 6 ed, Pearson/PHI.
VELAGAPUDI RAMAKRISHNA SIDDHARTHA ENGINEERING COLLEGE: VIJAYAWADA - 7
19
M.Tech(CSE) VR10 Regulations
Morris Mano, Computer System Architecture. 3 ed, Pearson Education.
3. Abraham Silberchatz, Peter B. Galvin and Greg Gagne, Operating System Principles. 7 ed , John
Wiley
2.
4. Stallings, Operating Systems Internals and Design Principles. 5 ed, Pearson Education/PHI,
2005
20
M.Tech(CSE) VR10 Regulations
CSCS1004
WEB TECHNOLOGIES
Lecture :
Tutorial :
Practical :
4 hrs/ Week
-
Objectives:
Students Learn
Learning
Outcomes:
Internal Assessment:
Final Examination:
Credits:
40
60
4
Design web pages using standard web deigning tools like HTML, DHTML and
server based technologies like Servlets and JSP.
Design Java applications using GUI components such as Applets and Swings.
Understand howjava GUI components may access enterprise data bases.
Understand the use of APIs in robust, enterprise three level application
developments.
Understand the Java features for secure communications over the internet
UNIT I:
HTML Common tags - List, Tables, images, forms, Frames, Cascading Style sheets, Introduction to
Java Scripts, Objects in Java Script, Dynamic HTML with Java Script.
XML: Document type definition, XML Schemas, Document Object model, Presenting XML, Using
XML Processors: DOM and SAX
UNIT II:
Review of Applets: Event Handling, AWT Programming.
Introduction to Swing: Handling Swing Controls like Icons Labels Buttons Text Boxes Combo
Boxes Tabbed Panes Scroll Panes Trees Tables Differences between AWT Controls & Swing
Controls, JApplet, Developing a Home page using Applet & Swing.
UNIT III:
Web servers: Tomcat Server installation & Testing.
Servlets & Application Development: Lifecycle of a Servlet, JSDK, The Servlet API, The javax.servlet
Package, Reading Servlet parameters, Reading initialization parameters, Handling Http Request &
Responses, Using Cookies-Session Tracking, Security Issues.
Database Access: Database Access, Database Programming using JDBC Studying Java.sql package,
accessing a database from a servlet application.
UNIT IV
Introduction to JSP: The Problem with Servlet. The Anatomy of a JSP Page, JSP Processing. JSP
Application Design with MVC architecture. AJAX.
JSP Application Development: Generating Dynamic Content, Using Scripting Elements, Implicit JSP
Objects, Conditional Processing, Declaring Variables and Methods, Sharing Data between JSP pages,
Sharing Session and Application Data Memory Usage Considerations, Accessing a Database from a JSP
Page Application.
VELAGAPUDI RAMAKRISHNA SIDDHARTHA ENGINEERING COLLEGE: VIJAYAWADA - 7
21
M.Tech(CSE) VR10 Regulations
Learning Resources:
Text Books:
1. Dietel & Dietel, Internet & World Wide Web. PHI.
2. Patrick Naughton and Herbert Schildt, The complete Reference Java 2. 5 ed, TMH (Chapters: 25)
(UNIT 2,3)
3. Hans Bergsten and SPD OReilly, Java Server Pages. (UNITs 3,4,5)
Reference Books:
1. Marty Hall and Larry Brown, Programming world wide web- Servlets and Java Server Pages
Volume 1: Core Technologies. Pearson
22
M.Tech(CSE) VR10 Regulations
CSCS1005
ADVANCED OPERATING SYSTEMS
Lecture :
Tutorial :
Practical :
Objectives:
4 hrs/ Week
Learning
Outcomes:
Internal Assessment:
Final Examination:
Credits:
40
60
4
UNIT I:
Overview: Introduction, functions of operating systems, design approaches, why advanced operating
systems, types of advanced operating systems.
Architectures of Distributed Systems - System Architecture types, distributed operating systems, issues
in distributed operating systems
Theoretical Foundations - inherent limitations of a distributed system lamp ports logical clocks
vector clocks casual ordering of messages global state cuts of a distributed computation
termination detection.
Distributed resource management: introduction-architecture mechanism for building distributed file
systems design issues
UNIT II:
Distributed shared memory-Architecturealgorithms for implementing DSMmemory coherence and
protocolsdesign issues.
Distributed Scheduling introduction issues in load distributing components of a load distributing
algorithm load distributing algorithm selecting a suitable load sharing algorithm requirements for
load distributing.
Failure Recovery: introduction basic concepts classification of failures backward and forward error
recovery, backward error recovery- recovery in concurrent systems consistent set of check points
check pointing for distributed database systems- recovery in replicated distributed databases
UNIT III:
Multiprocessor System Architectures- basic multiprocessor system architectures inter connection
networks for multiprocessor systems caching hypercube architecture.
Multiprocessor Operating System - structures of multiprocessor operating system, operating system
design issues- threads- process synchronization and scheduling.
Database Operating systems: Introduction- What is different-requirements of a database operating
system.
VELAGAPUDI RAMAKRISHNA SIDDHARTHA ENGINEERING COLLEGE: VIJAYAWADA - 7
23
M.Tech(CSE) VR10 Regulations
UNIT IV
Real time systems: Typical real time applications: Digital Control, High level Controls, signal processing,
other real time applications
Hard Vs Soft real time systems: Jobs and processors, Release times, deadlines, and timing constraints,
Hard and soft timing constraints, Hard real time systems, Soft real time systems
A reference model of real time systems: Processors and resources, Temporal parameters of real time
workload, periodic task model, precedence constraints and data dependency, Scheduling hierarchy
Approaches to real time scheduling: Clock driven approach, weighted round robin approach, Priority
Driven approach, Dynamic Vs Static systems, effective release times and deadlines
Learning Resources:
Text Books:
1. Mukesh Singhal and Niranjan G. Shivaratri, Advanced concepts in operating systems: Distributed,
Database and Multiprocessor OperatingSystems., TMH, 2001(Unit I, II, III)
2. Jane W.S.Liu, Real Time Systems. Pearson Education Asia (Unit IV)
Reference Books:
1. AndrewS.Tanenbaum, Modern OperatingSystem. PHI, 2003.
2. Pradeep K.Sinha, Distributed OperatingSystem-Concepts and Design, PHI, 2003.
3. C. M. Krishna and G. Shin, Real Time Systems. Tata McGrawHill 1997.
24
M.Tech(CSE) VR10 Regulations
CSCS1006 A
ADVANCED DATABASE MANAGEMENT SYSTEMS
40
60
4
Lecture :
Tutorial :
Practical :
4 hrs/ Week
-
Objectives:
Students Learn
Distributed Database Processing
Distributed Database Systems and Design
Parallel Database Systems
Distributed Object Database Management Systems
Learning
Outcomes:
Internal Assessment:
Final Examination:
Credits:
UNIT I:
Introduction: Distributed Data Processing, Distributed Database System, Promises of DDBS,
Complicating Factors, Problem Areas.
Overview of Relational DBMS: Relational Databases Concepts, Normalization, Integrity rules,
Relational data languages.
Distributed DBMS Architecture: DBMS Standardization, Architectural Models for Distributed DBMS,
DDBMS Architecture.
Distributed Database Design: Alternative Design Strategies, Distribution Design Issues,
Fragmentation, and Allocation.
UNIT II:
Overview of Query Processing: Objectives of Query Processing, Characterization of Query Processors,
Layers of QueryProcessing.
Query Decomposition and Data Localization: Query Decomposition, Localization of Distributed
Data
Optimization of Distributed Queries: Query Optimization, Centralized Query Optimization,
Distributed Query Optimization Algorithms.
UNIT III:
Transaction Management: Definition of a Transaction, Properties of transaction, Types of
transactions.
Distributed Concurrency Control:. Serialization, Concurrency Control Mechanism and Algorithms.
Time stamped and Optimistic concurrency control Algorithms, Dead lock Management.
Distributed DBMS Reliability: Reliability concepts and Measures, Fault-tolerance in Distributed
systems, failures in Distributed DBMS, Local & Distributed Reliability Protocols.
UNIT IV
Parallel Database Systems: Database Servers, Parallel Architecture, Parallel DBMS Techniques, Parallel
Execution Problems, Parallel Execution for Hierarchical architecture
Distributed Object Database Management Systems: Fundamental object concepts and Models,
Object Distributed Design, Architectural Issues, Object Management, Distributed Object Storage, Object
Query Processing.
VELAGAPUDI RAMAKRISHNA SIDDHARTHA ENGINEERING COLLEGE: VIJAYAWADA - 7
25
M.Tech(CSE) VR10 Regulations
Learning Resources:
Text Book:
1. M. Tamer Ozsu and P. Valduriez, Principles of Distributed Database Systems. 2 ed, Pearson, 2001.
Reference Books:
1. Stefano Ceri Giuseppe Pelagatti, Principles of Distributed Database Systems. TMH.
2. Raghuramakrishnan and Johhanes Gehrke, Database Management Systems. 3 ed, TMH.
26
M.Tech(CSE) VR10 Regulations
CSCS1006B
DIGITAL IMAGE PROCESSING
Lecture :
Tutorial :
Practical :
Objectives:
4 hrs/ Week
Learning
Outcomes:
Internal Assessment:
Final Examination:
Credits:
40
60
4
UNIT I:
Introduction: Digital Image Processing, Fundamental Steps in Digital Image Processing, Components of
an Image Processing System.
Digital Image Fundamentals: Elements of Visual Perception, Image Sensing and Acquisition, Image
Sampling and Quantization, Some basic Relationships between Pixels.
Image Enhancement in the Spatial Domain: Some Basic Gray Level Transformation, Histogram
Processing, Enhancement Using Arithmetic/Logic Operations, Basics of Spatial Filtering, Smoothing
spatial Filters, Sharpening spatial Filters.
UNIT II:
Image Enhancement in the Frequency Domain: Introduction to the Fourier Transform and the
Frequency Domain, Smoothing frequency-domain Filters, Sharpening Frequency-domain Filters,
Homomorphic Filtering, Implementation.
Image restoration: A model of the image degradation/restoration process, noise models, restoration in
the presence of noiseonly spatial filtering, Weiner filtering, constrained least squares filtering, geometric
transforms; Introduction to the Fourier transform and the frequency domain, estimating the degradation
function, Color Image Processing Introduction.
UNIT III:
Image Segmentation: Detection of Discontinuities, Edge Linking and Boundary Detection,
Thresholding, Region-Based Segmentation,
Image Compression: Fundamentals, image compression models, error-free compression, lossy
predictive coding, image compression standards
UNIT IV
Wavelets and Multiresolution Processing: Multiresolution Expansions, Wavelet Transforms in one
Dimension, The Fast Wavelet Transform, Wavelet Transforms in Two Dimensions
VELAGAPUDI RAMAKRISHNA SIDDHARTHA ENGINEERING COLLEGE: VIJAYAWADA - 7
27
M.Tech(CSE) VR10 Regulations
Morphological Image Processing: Preliminaries, dilation, erosion, open and closing, hit or miss
transformation, basic morphologic algorithms, Object Recognition: Patterns and patterns classes.
Learning Resources:
Text Books:
1. Rafael C. Gonzalez and Richard E. Woods, Digital Image Processing. 2 ed, PHI/Pearson Education.
Reference Books:
1. A.K.Jain, Fundamentals of Digital Image Processing. Prentice Hall India.
2. Madhuri. A. Joshi, Digital Image Processing. PHI.
3. Milan Sonka, Vaclav Hlavac and Roger Boyle, Image Processing, Analysis and Machine Vision. 2 ed,
Thomson Learning.
28
M.Tech(CSE) VR10 Regulations
CSCS1006C
ARTIFICIAL INTELLIGENCE AND NEURAL NETWORKS
Lecture :
Tutorial :
Practical :
4 hrs/ Week
-
Objectives:
Students Learn
Learning
Outcomes:
Internal Assessment:
Final Examination:
Credits:
40
60
4
UNIT I:
Problems, Problem Spaces And Search: Defining the Problem as a State space Search, Production
Systems, Problem Characteristics, Production system characteristics, Issues in the Design of Search
Programs.
Heuristic Search Techniques: Generate-and-test, Hill Climbing, Best-First Search, Problem Reduction,
Constraint Satisfaction, Means-Ends Analysis
UNIT II:
Using Predicate Logic: Representing Simple Facts in logic, Representing Instance and Isa
Relationships, Computable Functions and Predicates, Resolution, Natural Deduction.
Weak Slot-and-Fillers Structures: Semantic Nets, Frames
Strong Slot-and- Fillers Structures: Conceptual Dependency, Scripts
UNIT III:
Overview applications - Engg approaches in NN - Biological Inspiration - Learning Approaches Mathematical Fundamentals for ANN Study.
Elementary building blocks - biological neural units - artificial unit structures - unit net activation to
output characteristics - artificial unit model extensions - single unit mappings and the perceptron - linear
seperability perceptrons - adaline madaline - MLP
NN based pattern associators - PA design and evaluation - linear associative mappings.
UNIT IV
VELAGAPUDI RAMAKRISHNA SIDDHARTHA ENGINEERING COLLEGE: VIJAYAWADA - 7
29
M.Tech(CSE) VR10 Regulations
Recurrent Networks - Hopfield Network design - applications to optimization problem - Application to
Traveling salesman problem BAM.
Self Organizing Networks Introduction clustering kohonen ART networks Learning Theroies
Dynamics Applications.
RBF Design Training Applications TDNN Learning Applications.
Learning Resources:
Text Books:
1. Elaine Rich and Kevin Knight, Artificial Intelligence. 2 ed, TMH.
2. Robert J Schalkoff, Artificial Neural Networks. TMH, 1997.
Reference Books:
1.
2.
3.
4.
5.
6.
30
M.Tech(CSE) VR10 Regulations
CSCS1006D
PARALLEL COMPUTING AND ALGORITHMS
Lecture :
Tutorial :
Practical :
Objectives:
4 hrs/ Week
Learning
Outcomes:
Internal Assessment:
Final Examination:
Credits:
40
60
4
UNIT I:
Introduction: Computational demands of Modern Science, advent of parallel processing, terminologypipelining, data parallelism and control parallelism-Amdahls. Basic parallel random access Machine
Algorithms-definitions of P, NP and NP-Hard, NP-complete classes of sequential algorithms-NC class
for parallel algorithms.
Parallel Computer Architectures: Processor Arrays, Multi processors and multi computers. Mapping
and scheduling aspects of algorithms- Mapping into meshes and hyper cubes, Load balancing, Grahams
List scheduling algorithm, Coffman-graham scheduling algorithm for parallel processors.
UNIT II:
Elementary Parallel algorithms: Parallel algorithms on SIMD and MIMD machines, Analysis of these
algorithms. Matrix Multiplication algorithms on SIMD and MIMD models.
Fast Fourier Transform algorithms- Implementation on Hyper cube Multi computer. Solving linear file system of equations, parallelizing aspects of sequential methods back substitution and Tri diagonal.
UNIT III:
Parallel sorting methods: Odd-even transposition sorting on processor arrays. Biotonic-merge sort on
shuffle exchange ID, Array processor, 2D-Mesh processor and Hypercube Processor Array. Parallel
Quick-sort on Multi processors. Hyper Quick sort on hypercube multi computers.
Parallel Searching: Ellis algorithm and Manber and ladners Algorithms for dictionary operations.
UNIT IV
Parallel algorithms for Graph searching: All Pairs shortest paths and minimum cost spanning tree.
Parallelization aspects of combinatorial search algorithms with Focus on Branch and Bound Methods and
Alpha-beta Search methods.
Learning Resources:
Text Books:
1. Michael J. Quinn, Parallel ComputingTheoryand Practice, 2 ed, TMH.
REFERENCE BOOKS:
VELAGAPUDI RAMAKRISHNA SIDDHARTHA ENGINEERING COLLEGE: VIJAYAWADA - 7
31
M.Tech(CSE) VR10 Regulations
32
M.Tech(CSE) VR10 Regulations
CSCS1051
ADVANCED DATA STRUCTURES LAB
Lecture :
Tutorial :
Practical :
3 hrs/ Week
Objectives:
Learning
Outcomes:
Internal Assessment:
Final Examination:
Credits:
25
50
2
b) DFS
b) Deletion
c) Traversal Techniques
Week 3 :
Write a C program to implement AVL tree using ADT.
a) Insertion
b) Deletion
Week 4 :
Write a C program to implement the Red-Block Tree ADT:
a) Insertion
b) Deletion
c) Print
Week 5:
33
M.Tech(CSE) VR10 Regulations
Write a C Program to implement the Hashing Techniques:
a) Open addressing
b) Separate Chaining
Write a C Program to implement the sorting techniques using divide and conquer approach.
a) Merge sort
b) Quick Sort
Week 6:
Write a C program to implement the Minimal Spanning Trees algorithms:
a) Kruskal
b) Prims
Week 7:
Write a C program to implement the Single Source Shortest Paths algorithms :
a) Dijkstras
b) Bellman-Ford
Week 9:
Write a C program to implement the Optimal Binary Search Tree using Dynamic Programming
Technique.
Week 10:
Write a C program to implement four queens problem and graph coloring using Back Tracking
Technique.
Learning Resources:
Text Books:
1. Mark Allen Weiss, Data Structures and Algorithm Analysis in C. 2 ed, Pearson
Education.
34
M.Tech(CSE) VR10 Regulations
CSCS1052
WEB TECHNOLOGIES LAB
Lecture :
Tutorial :
Practical :
3 hrs/ Week
Objectives:
Learning
Outcomes:
Internal Assessment:
Final Examination:
Credits:
25
50
2
Design web pages with the help of frames, scripting languages, and evolving
technology like DHTML, XML.
Develop applications using Java GUI components
Understand the concept of designing secure web pages using java based
technologies like Servlets and JSP.
Design web pages using standard web deigning tools like HTML, DHTML
and server based technologies like Servlets and JSP.
Design Java applications using GUI components such as Applets and
Swings.
Understand howjava GUI components may access enterprise data bases.
Understand the use of APIs in robust, enterprise three level application
developments.
Understand the Java features for secure communications over the internet
List of Programs:
Week # 1:
Design a web page that reflects the details of a College using simple HTML
tags.
Week # 2:
Design a web application using different types of CSS.
Week # 3:
Design a student database using XML and display the content using XSL by
validating through XML schema.
Week # 4:
Design a user registration form using Java Applets.
Week # 5:
Develop a menu based application page using java swings.
Week # 6:
Develop a home page for college using Swings.
Week # 7:
Design a simple java servlet application to retrieve the data from a client form
and display the data.
Week # 8:
Design a java application to perform all the DML operations on a database.
Week # 9:
Design a web application for user management using Java servlets.
VELAGAPUDI RAMAKRISHNA SIDDHARTHA ENGINEERING COLLEGE: VIJAYAWADA - 7
35
M.Tech(CSE) VR10 Regulations
Week # 10:
Design a simple JSP application to perform simple operations.
Week # 11:
Design a web application for user management using JSP.
Week # 12:
Design a web application to share the data between multiple pages using
sessions and cookies.
Learning Resources:
Text Books:
1. Dietel and Dietel, Internet & World Wide Web. PHI.
2. Patrick Naughton and Herbert Schildt., The complete Reference Java 2. 5 ed, TMH.
3. Hans Bergsten, SPD OReilly, Java Server Pages.
Reference Books:
1. Marty Hall and Larry Brown, ProgrammingWorld Wide Web-Sebesta, Pearson Core Servlets
Andjavaserver Pages Volume 1: Core Technologies. Pearson.
36
M.Tech(CSE) VR10 Regulations
CSCS2001
OBJECT ORIENTED ANALYSIS AND DESIGN
Lecture :
Tutorial :
Practical :
4 hrs/ Week
-
Objectives:
Learning
Outcomes:
Internal Assessment:
Final Examination:
Credits:
40
60
4
UNIT I:
What is UML? The birth of UML; What is the Unified Process? The birth of UP; The requirements
workflow. Software requirements Metamodel; Use case modeling; UP activity: Find actors and use
cases; Advanced use case modeling; The analysis workflow; Objects and classes
UNIT II:
Finding analysis classes; Relationships; Inheritance and polymorphism Generalization; Analysis packages;
Use case realization; Advanced use case realization
UNIT III:
Activity diagrams; Advanced activity diagrams; The design workflow; Design classes; Refining analysis
relationships; Interfaces and components
UNIT IV
Use case realization-design; State machines; Advanced state machines; The implementation workflow;
Deployment
Learning Resources:
Text Books:
1. Jim Arlow, Ila Neustadt, UML 2 and the Unified Process Practical Object-Oriented Analysis and
Design. 2 ed, Pearson Education, 2005.
Reference Books:
1. Booch, Rumbaugh and Jacobson, The Unified Modeling Language Users Manual, Pearson Education,
1999.
2. James Rumbaugh, Jacobson and Booch, Unified Modeling Language Reference Manual. Pearson
Education.
3. Jacobson et al., The Unified Software Development Process, Pearson Education, 1999.
4. Simon Bennett, Steve McRobb and Ray Farmer Object-Oriented Systems Analysis and Design Using
UML. 2 ed, TMH.
VELAGAPUDI RAMAKRISHNA SIDDHARTHA ENGINEERING COLLEGE: VIJAYAWADA - 7
37
M.Tech(CSE) VR10 Regulations
CSCS2002
ADVANCED COMPUTER NETWORKS
Lecture :
Tutorial :
Practical :
Objectives:
4 hrs/ Week
Learning
Outcomes:
Internal Assessment:
Final Examination:
Credits:
40
60
4
UNIT I:
Review of Computer Networks and the Internet: What is the Internet, The Network edge, The
Network core, Access Networks and Physical media, ISPs and Internet Backbones, Delay and Loss in
Packet-Switched Networks, History of Computer Networking and the Internet - Networking Devices:
Multiplexers, Modems and Internet Access Devices, Switching and Routing Devices, Router Structure.
The Link Layer and Local Area Networks: Link Layer: Introduction and Services, Multiple Access
Protocols, Link Layer Addressing, Ethernet, Interconnections: Hubs and Switches, PPP: The Point-toPoint Protocol, Link Virtualization
UNIT II:
Routing and Internetworking: NetworkLayer Routing, Least-Cost-Path algorithms, Non-Least-CostPath algorithms, Intradomain Routing Protocols, Interdomain Routing Protocols, Congestion Control at
Network Layer. Logical Addressing: IPv4 Addresses, IPv6 Addresses - Internet Protocol:
Internetworking, IPv6, Transition from IPv4 to IPv6 Multicasting Techniques and Protocols: Basic
Definitions and Techniques, Intradomain Multicast Protocols, Interdomain Multicast Protocols, NodeLevel Multicast algorithms
Transport and End-to-End Protocols: Transport Layer, Transmission Control Protocol (TCP), User
Datagram Protocol (UDP), Mobile Transport Protocols, TCP Congestion Control Application Layer:
Principles of Network Applications, The Web and HTTP, File Transfer: FTP, Electronic Mail in the
Internet, Domain Name System (DNS), P2P File Sharing, Socket Programming with TCP and UDP,
Building a Simple Web Server.
UNIT III:
Wireless Networks and Mobile IP: Infrastructure of Wireless Networks, Wireless LAN Technologies,
IEEE 802.11 Wireless Standard, Cellular Networks, Mobile IP, Wireless Mesh Networks (WMNs)
Optical Networks and WDM Systems: Overview of Optical Networks, Basic Optical Networking
Devices, Large-Scale Optical Switches, Optical Routers, Wavelength Allocation in Networks, Case Study:
An All-Optical Switch
UNIT IV
VPNs, Tunneling and Overlay Networks: Virtual Private Networks (VPNs), Multiprotocol Label
Switching (MPLS), Overlay Networks VoIP and Multimedia Networking: Overview of IP
Telephony, VoIP Signaling Protocols, Real-Time Media Transport Protocols, Distributed Multimedia
VELAGAPUDI RAMAKRISHNA SIDDHARTHA ENGINEERING COLLEGE: VIJAYAWADA - 7
38
M.Tech(CSE) VR10 Regulations
Networking, Stream Control Transmission Protocol
Mobile A-Hoc Networks: Overview of Wireless Ad-Hoc Networks, Routing in Ad-Hoc Networks,
Routing Protocols for Ad-Hoc Networks Wireless Sensor Networks: Sensor Networks and Protocol
Structures, Communication Energy Model, Clustering Protocols, Routing Protocols
Learning Resources:
Text Books:
1. James F. Kurose, Keith W.Ross, Computer Networking: A Top-Down Approach Featuringthe Internet, 3
ed, Pearson Education, 2007.
2. Nader F. Mir, Computer and Communication Network. Pearson Education, 2007.
Reference Books:
1. Behrouz A. Forouzan, Data Communications and Networking. 4 ed, TMH, 2007.
2. Greg Tomsho, Ed Tittel and David Johnson, Guide to Networking Essentials. 5 ed,
Thomson.
3. S.Keshav, An EngineeringApproach to Computer Networking. Pearson Education.
4. Diane Teare and Catherine Paquet, Campus Network Design Fundamentals. Pearson
Education (CISCO Press)
5. AndrewS. Tanenbaum, Computer Networks. 4 ed, PHI.
6. A.Farrel and Elsevier, The Internet and its Protocols.
39
M.Tech(CSE) VR10 Regulations
CSCS2003
EMBEDDED COMPUTING SYSTEMS
Lecture :
Tutorial :
Practical :
4 hrs/ Week
-
Objectives:
The objective of this course is to equip the students with 8051 microcontroller
programming concepts and tools needed for embedded system design. Embedded
systems have become the next inevitable wave of technology, finding application in
diverse fields of engineering.
Learning
Outcomes:
Internal Assessment:
Final Examination:
Credits:
40
60
4
UNIT I:
Introduction to Embedded Systems: Embedded systems; Processor embedded into a system;
Embedded hardware units and devices in a system; Embedded software in a system; Examples of
embedded systems; Embedded System-on-Chip (SoC) and use of VLSI circuit design technology;
Complex systems design and processors; Design process in embedded system. Formalization of system
design; Design process and design examples; Classification of embedded systems; Skills required for an
embedded system designer.
UNIT II:
Devices: I/O types and examples; Serial communication devices; Parallel device ports;Sophisticated
interfacing features in device ports. Wireless devices; Timer and counting devices; Watchdog timer; Real
time clock.
Communication Buses for Device Networks : Networked embedded systems; Serial bus
communication protocols; Parallel bus device protocols; Internet enabled systems; Wireless and mobile
system protocols.
Device Drivers and Interrupts Service Mechanism: Device access without interrupts; ISR concept;
Interrupt sources; Interrupt servicing mechanism; Multiple interrupts; Context and the periods for
context-switching, interrupt latency and deadline.
UNIT III:
8051 Architecture, Memory Organizations and Real World Interfacing : 8051 Architecture; Real
world interfacing, Processor and Memory Organization.
VELAGAPUDI RAMAKRISHNA SIDDHARTHA ENGINEERING COLLEGE: VIJAYAWADA - 7
40
M.Tech(CSE) VR10 Regulations
Program Modeling Concepts, Processes, Threads, and Tasks: Program models; DFG models; State
machine programming models for event controlled program flow; Modeling of multiprocessor systems.
Multiple processes in an application; Multiple threads in an application; Tasks and task states; Task and
data; Distinctions between functions, ISRs and tasks.
UNIT IV
Real-time Operating systems: Operating System services; Process management; Timer functions;
Event functions; Memory management; Device, file and I/O sub-systems management; Interrupt
routines in RTOS environment and handling of interrupt source calls. Embedded Software
Development, Tools: Introduction; Host and target machines; Linking and locating software; Getting
embedded software in to the target system; Issues in hardware software design and co-design; Testing on
host machine; Simulators; Laboratory tools.
Learning Resources:
Text Books:
1. Rajkamal, Embedded Systems Architecture, Programmingand Design. 2 ed, TMH, 2008.
References:
1. Wayne Wolf, Computers as Components Principles of Embedded Computer System Design. Elsevier, 2005.
2. Steve Heath, Embedded Systems Design. 2 ed, Elsevier, 2003.
3. Dr. K.V.K.K. Prasad, Embedded/ Real-Time Systems: Concepts, Design and Programming The Ultimate
Reference. Dreamtech. Press, 2004.
41
M.Tech(CSE) VR10 Regulations
CSCS2004
DATA MINING
Lecture :
Tutorial :
Practical :
Objectives:
4 hrs/ Week
-
Learning
Outcomes:
Internal Assessment:
Final Examination:
Credits:
40
60
4
UNIT I:
Data Mining: Introduction, Data Mining, Kinds of Data, Data Mining Functionalities, Classification of
Data Mining Systems, Major issues in Data Mining.
Data Preprocessing Data cleaning, Data Integration & Transformation, Data Reduction, Discretization
& Concept HierarchyGeneration, Data Mining Primitives.
UNIT II:
Data Warehouse: Introduction, A Multi-dimensional data model, Data Warehouse Architecture, Data
Warehouse Implementation.
Mining Association rules in Large Databases: Association rule mining, mining single-dimensional
Boolean Association rules from Transactional Databases, Mining Multi-dimensional Association rules
from relational databases & Data Warehouses.
UNIT III:
Classification and Prediction: Introduction, Classification by Decision tree induction, Bayesian
Classification, Classification by Back propagation, Other Classification Methods, Prediction, Classifier
accuracy.
UNIT IV
Cluster Analysis: Introduction, Types of data in Cluster analysis, A categorization of major clustering
methods, partitioning methods, Hierarchical methods, Density-Based Methods: DBSCAN, Grid-based
Method: STING; Model-based Clustering Method: Statistical approach, Outlier analysis.
Learning Resources:
Text Books:
1.
Morgan Kaufmann
42
M.Tech(CSE) VR10 Regulations
Reference Books:
1.
2.
3.
4.
43
M.Tech(CSE) VR10 Regulations
CSCS2005 A
SOFTWARE TESTING METHODOLOGIES
Lecture :
Tutorial :
Practical :
4 hrs/ Week
-
Objectives:
Learning
Outcomes:
Internal Assessment:
Final Examination:
Credits:
40
60
4
UNIT I:
Principles of Testing, System and Acceptance Testing: System testing overview, Why do system
testing, Functional Vs Nonfunctional testing, Functional system testing, Nonfunctional testing,
Acceptance testing, summery of testing Phases.
Performance Testing: Introduction, Factors governing performance testing, Tools for performance
testing, Process for performance testing, Challenges.
UNIT II:
Regression Testing: What is regression testing, Types of regression testing, When do regression testing,
Howto do regression testing, Best practices in regression testing.
Ad hoc Testing: Overview of Ad hoc testing, Buddy testing, Pair testing, Exploratory testing, Iterative
testing, Agile and extreme testing, Defect seeding.
Testing of Object oriented Systems: Introduction, Primer on object-oriented software, Differences in
OO testing.
UNIT III:
Usability and Accessibility Testing: What is usability testing, Approach to usability, when to do
usability testing, How to achieve usability, Quality factors for usability, Aesthetics testing, Accessibility
testing, Tools for usability, Usability lab setup, Test roles for usability.
Organization Structures for testing teams: Dimension of organization structures, Structures in singleproduct companies, structures for multi-product companies, Effect of globalization and geographically
distributed teams on product testing, Testing services organizations, Success factors for testing
organizations.
UNIT IV
Building an Effective Internal IT Audit Function: The Audit departments real mission, the concept
of independence and howto avoid misusing it, howto add value beyond formal audits via consulting and
early involvement, howto enhance effectiveness by building relationships, the role of IT audit and howto
choose the right focus, howto build and maintain and effective IT audit team .
Audit Process: the different types of internal controls, how you should choose what to audit, how to
conduct the basic stages of the audit, planning, field work and documentation, issue discovery and issue
validation, solution development, report drafting and issuance, issue tracking
Learning Resources:
VELAGAPUDI RAMAKRISHNA SIDDHARTHA ENGINEERING COLLEGE: VIJAYAWADA - 7
44
M.Tech(CSE) VR10 Regulations
Text Books:
1. Srinivasan Desikan and Gopalaswamy Ramesh, Software Testing Principles and Practices. Pearson
Education.
2. Chris Davis, Mike Schiller, and Kevin IT, Auditing using Controls to Protect Information Assets.
Wheeler Tata Mc-GRAW-Hill
45
M.Tech(CSE) VR10 Regulations
CSCS2005 B
PATTERN RECOGNITION
Lecture :
Tutorial :
Practical :
4 hrs/ Week
-
Objectives:
Learning
Outcomes:
Internal Assessment:
Final Examination:
Credits:
40
60
4
Understand the concept of patterns and the basic approach to the development of
pattern recognition algorithms
Understand and apply methods for data preprocessing, feature extraction, and feature
selection to multivariate data
Understand and apply supervised and unsupervised classification methods to detect
and characterize patterns in real-world data
Develop prototype for pattern recognition algorithms that can be used to study
algorithm behavior and performance against real-world multivariate data.
The students are exposed to the underlying principles of pattern recognition and on
the methods used to develop and deploy applications in the real world.
An Emphasis is placed on the pattern recognition application development process,
which includes problem identification, concept development, algorithm selection,
system integration, and test and validation.
Understand the basic concepts and methods for the recognition of patterns in data.
Understand working knowledge of the pattern recognition application development
process.
UNIT I:
Introduction: Machine perception, pattern recognition example, pattern recognition systems, the design
cycle, learning and adaptation.
Bayesian Decision Theory: Introduction, continuous features two categories classifications, minimum
error-rate classification- zeroone loss function, classifiers, discriminant functions, and decision surfaces.
UNIT II:
Normal density: Univariate and multivariate density, discriminant functions for the normal density
different cases, Bayes decision theory discrete features, compound Bayesian decision theory and
context.
Maximum likelihood and Bayesian parameter estimation: Introduction, maximum likelihood estimation,
Bayesian estimation, Bayesian parameter estimationGaussian case
UNIT III:
Un-supervised learning and clustering: Introduction, mixture densities and identifiability, maximum
likelihood estimates, application to normal mixtures, K-means clustering. Date description and clustering
similarity
measures,
criteria
function
for
clustering.
Component analyses: Principal component analysis, non-linear component analysis; Low dimensional
representations and multi dimensional scaling.
UNIT IV
Discrete Hidden Morkov Models : Introduction, Discretetime markov process, extensions to hidden
Markov models, three basic problems for HMMs
Continuous hidden Markov models : Observation densities, training and testing with continuous HMMs,
types of HMMs.
Learning Resources:
Text Books:
1. Richard O. Duda, Peter E. Hart and David G. Stroke Pattern Classifications. 2 ed Wiley
Student Edition
2. Lawerence Rabiner and Biing Hwang, Fundamentals of Speech Recognition. Pearson Education.
Reference Book :
1. Earl Gose, Richard John Baugh and Steve Jost, Pattern Recognition and Image Analysis. PHI,
2004.
VELAGAPUDI RAMAKRISHNA SIDDHARTHA ENGINEERING COLLEGE: VIJAYAWADA - 7
46
M.Tech(CSE) VR10 Regulations
CSCS2005C
NATURAL LANGUAGE PROCESSING
Lecture :
Tutorial :
Practical :
4 hrs/ Week
-
Internal Assessment:
Final Examination:
Credits:
40
60
4
Objectives:
Learning
Outcomes:
UNIT I:
Introduction: Regular Expressions and Finite State Automata Morphology and Finite State
Transducers Computational Phonology and Text to speech - N-grams : Counting words in Corpora
Simple N- grams Smoothing Entropy HMMS
UNIT II:
Speech Recognition: Speech Recognition Architecture Overview of HMM Advanced Methods for
decoding Training a speech Recognizer Human Speech Recognition Part of Speech Tagging Rule
Based, Stochastic Part-of-Speech Tagging Transformation Based Tagging.
UNIT III:
Context Free Grammars for English: Context Free Rules and Trees, Sentence Level Constructions,
Coordination, Agreement, Grammars and Human Processing, Parsing with Context Free Grammars, Top
down Parser Problems with Basic Top Down Parser Finite State Parsing Methods - Representing
Meaning: Computational Desiderata for Representations Meaning Structure of Language First Order
Predicate Calculus - Semantic Analysis: Syntax driven Semantic Analysis Attached for a Fragment of
English- Integrating Semantic Analysis into the Early Parser, Robust Semantic Analysis - Dialogue and
Machine
UNIT IV
Translation: Dialogue Acts Automatic, Plan inferential, Cue based Interpretation of Dialogue Acts
Dialogue Structure and coherences Dialogue Managers - Language Similarities and Differences The
Transfer Metaphor The Interlingua Idea- Direct Translation Using Statistical Techniques Usability
and System Development
Learning Resources:
Text Books:
1. D. Jurafsky and J. Martin, Speech and Language Processing: An Introduction to Natural Language
Processing, Computational Linguistics, and Speech Recognition. Pearson Education, 2004.
Reference Books:
VELAGAPUDI RAMAKRISHNA SIDDHARTHA ENGINEERING COLLEGE: VIJAYAWADA - 7
47
M.Tech(CSE) VR10 Regulations
1. C. Manning and H. Schutze, Foundations of Statistical Natural Language Processing. Massachusetts
Institute of Technology, 2003
2. James Allen, Natural Language Understanding. The Benajmins/Cummings Publishing Company
Inc. 1994. ISBN 0-8053-0334-
48
M.Tech(CSE) VR10 Regulations
CSCS2005D
HUMAN COMPUTER INTERACTION
Lecture :
Tutorial :
Practical :
4 hrs/ Week
-
Objectives:
Learning
Outcomes:
Internal Assessment:
Final Examination:
Credits:
40
60
4
Understands the user-centered design cycle and howto practice this approach to
design your own website or other interactive software systems
critique existing website and other interactive software using guidelines from
human factor theories
analyze one after another the main features of a GUI: the use of colors,
organization and layout of content, filling the interface with useful and relevant
information, and communication techniques; and to critique designs in order to
provide better solutions
Evaluate a GUI prototype using a questionnaire
UNIT I:
UNIT III:
Windows: Characteristics, components, operations. Selection of device based and screen based
controls.
Components: Icons and images, Multimedia, choosing proper colors
UNIT IV
VELAGAPUDI RAMAKRISHNA SIDDHARTHA ENGINEERING COLLEGE: VIJAYAWADA - 7
49
M.Tech(CSE) VR10 Regulations
1. Wilbert O Galitz, The Essential Guide to UserIinterface Design, 2 ed, Wiley DreamaTech
2. Ben Shneidermann, Designingthe User Interface. 3 ed, Pearson Education Asia
Reference Books:
1. Alan Dix, Janet Fincay, Gre Goryd, Abowd and Russell Bealg, Human Computer Interaction.
Pearson.
2. Prece, Rogers and Sharps, Interaction Design. Wiley Dreamatech.
3. Soren Lauesen, User Interface Design. Pearson Education.
50
M.Tech(CSE) VR10 Regulations
CSCS2006A
CRYPTOGRAPHY AND NETWORK SECURITY
Lecture :
Tutorial :
Practical :
4 hrs/ Week
-
Objectives:
Students Learn:
Principles and practice of network security.
Techniques of network security
Fundamental aspects of security in a modern networked environment
Basic cryptographic techniques algorithms and protocols
Computational issues in implementing cryptographic protocols and
algorithms.
Learning
Outcomes:
Internal Assessment:
Final Examination:
Credits:
40
60
4
UNIT I:
Security attacks, A model for network security; Classical techniques: Encryption, Steganography;
Modern techniques: simple DES, Block cipher principles, Differential and linear cryptanalysis; Triple
DES, RC5, Blowfish, CAST-128, RC2; Characteristics of Advanced Symmetric block ciphers.
UNIT II:
Conventional Encryption: Placement of Encryption function, Traffic confidentiality, key
distribution, Random number generation. Public key cryptography: principles, RSA algorithm, key
management, Diffie-Hellman key exchange, Elliptic curve cryptography
UNIT III:
Number Theory: Prime and relative prime numbers, modular arithmetic: theorems, testing for
primality, Euclids algorithm, Chinese remainder theorem, discrete logarithms.
Message Authentication and Hash functions: Authentication requirements and functions, security of
hash functions and MACs. Message digest algorithm, secure hash algorithm.
Digital signatures and standards.
UNIT IV
Kerberos authentication and PGP email security; IP Security: overview, architecture, authentication,
encapsulating security payload, key management; Web Security: Web Security requirements, Secure
sockets layer and Transport layer security, Secure Electronic Transaction. Intruders, Viruses and
Worms: Intruders, Viruses and Related threats. Fire Walls: Fire wall Design Principles, Trusted
systems.
Learning Resources:
Text Book:
1. William Stalligs, Cryptographyand Network Security: Principles and Practice. 4 ed, Pearson
Education.
2. Mark Burgess, Principles of Network and Systems Administration. John Wiley.
Reference Books:
1. Charlie Caufman, Radia Perlman and Mike Speciner, Network Security- Private Communication in
a Public World. 2 ed, PHI.
VELAGAPUDI RAMAKRISHNA SIDDHARTHA ENGINEERING COLLEGE: VIJAYAWADA - 7
51
M.Tech(CSE) VR10 Regulations
CSCS2006B
SECURED DATABASE APPLICATIONS DEVELOPMENT
Lecture :
Tutorial :
Practical :
4 hrs/ Week
-
Objectives:
Student Learns
Providing security to database
Various Authentication methods
Defining and implementing password policies
To Implement a Virtual Private Databases
Database Auditing Models
Auditing Projects
To develop a secured authentication repository
Learning
Outcomes:
Internal Assessment:
Final Examination:
Credits:
40
60
4
UNIT I:
Security Architecture: Introduction, Security, Information Systems, Database management systems,
Information security, Information security Architecture, database security, Asset types and their
value, Security methods.
Operating System Security Fundamentals: Introduction, operating systems overview, security
environment, components, Authentication methods, user administration, password policies,
Vulnerabilities of operating systems, E- Mail security.
UNIT II:
Administration of Users: Introduction, user authentication, operating system authentication,
creating/removing/modifying users, default/remote users, Database links, Linked servers, remote
servers. Profiles, Password Policies, Privileges, and Roles.
Introduction, Defining and using profiles, Designing and implementing password policies, Granting
and revoking user privileges, creating, Assigning and revoking user roles.
UNIT III:
Database Application Security Models : Introduction, Types of users, security models, application
types, application securitymodels and Data encryption.
Virtual Private Databases (VPD): Introduction, Overview, implementing a VPD using views and
application context. Implementing oracle VPD, Viewing VPD policies and application context using:
data dictionary, policy manager, implementing rowand column level security with SQL server.
UNIT IV
Database Auditing Models, Application Data Auditing: Database Auditing Models:
Introduction, Auditing overview, environment, process, objectives, classification and types, benefits
and side effects of auditing.
VELAGAPUDI RAMAKRISHNA SIDDHARTHA ENGINEERING COLLEGE: VIJAYAWADA - 7
52
M.Tech(CSE) VR10 Regulations
Application Data Auditing: Introduction, DML auction auditing architecture. Triggers, fine grained
auditing, DML statement audit trail and auditing application errors with Oracle.
Auditing Database Activities, Security and Auditing Project Cases:
Auditing Database Activities: Introduction, usage of database activities, creating DLL triggers,
auditing database activities with oracle. Security and Auditing project cases: Introduction, case study
for developing an online database, taking care of payroll, tracking database changes and developing a
secured authentication repository
Learning Resources:
Text Books:
1. Hassan Afyouni, Database Securityand Auditing. Cengage Learning, 2007.
Reference Books:
1.
2.
3.
4.
5.
53
M.Tech(CSE) VR10 Regulations
CSCS2006C
BIOINFORMATICS
Lecture :
Tutorial :
Practical :
4 hrs/ Week
-
Objectives:
Students learn
40
60
4
Learning
Outcomes:
Internal Assessment:
Final Examination:
Credits:
UNIT I:
The Central Dogma: The Killer Application, Parallel Universes, Watsons Definition, Top Down Versus
Bottom up, Information Flow, Convergence Databases, Data Management, Data Life Cycle , Database
Technology ,Interfaces , Implementation
Networks: Networks, Geographical Scope, Communication Models, Transmissions Technology,
Protocols, Bandwidth, Topology, Hardware, Contents, Security, Ownership, Implementation,
Management.
UNIT II:
The Search Process: Search Engine Technology, Searching and Information Theory, Computational
methods , Search Engines and Knowledge Management
Data Visualization: Data Visualization, sequence visualization, structure visualization, user Interface,
Animation Versus simulation, General Purpose Technologies.
UNIT III:
Statistical Concepts: Micro-arrays, Imperfect Data, Randomness, Variability, Approximation, Interface
Noise, Assumptions, Sampling and Distributions, Hypothesis Testing, Quantifying Randomness, Data
Analysis, Tool selection statistics of Alignment.
Data Mining: Clustering and Classification , Data Mining , Methods , Selection and Sampling ,
Preprocessing and Cleaning , Transformation and Reduction , Data Mining Methods , Evaluation ,
Visualization , Designing new queries ,Pattern Recognition and Discovery , Machine Learning , Text
Mining , Tools.
UNIT IV
Pairwise sequence alignment, Local versus global alignment, Multiple sequence alignment, Computational
methods , Dot Matrix analysis , Substitution matrices , Dynamic Programming, Word methods, Bayesian
methods, Multiple sequence alignment, Dynamic Programming, Progressive strategies, Iterative strategies,
Tools, Nucleotide Pattern Matching, Polypeptide pattern matching , Utilities , Sequence Databases.
VELAGAPUDI RAMAKRISHNA SIDDHARTHA ENGINEERING COLLEGE: VIJAYAWADA - 7
54
M.Tech(CSE) VR10 Regulations
Modeling and Simulation :Drug Discovery, components, process, Perspectives, Numeric
considerations, Algorithms, Hardware, Issues, Protein structure, Ab-Initio Methods, Heuristic methods,
Systems Biology, Tools, Collaboration and Communications, Standards, Issues, Security, Intellectual
property.
Learning Resources:
Text Books:
1. Bryan Bergeron, Bio Informatics Computing. PHI, 2003.
2. Lacroix and Terence Critchlow, Bio Informatics, ManagingScientific Data. Elsevier
Reference Books
1. Attwood and Smith, Introduction to Bio Informatics. Longman, 1999.
2. D Srinivasa Rao, Bio-Informatics. Biotech.
3. Rastogi and Mendiratta, Bio Informatics Methods and Applications. PHI
55
M.Tech(CSE) VR10 Regulations
CSCS2006D
SOFT COMPUTING
Lecture :
Tutorial :
Practical :
4 hrs/ Week
-
Objectives:
Students Learn
General concepts and techniques in soft computing
Soft computing techniques to practical problems
Popular tools for Soft Computing;
Learning
Outcomes:
Internal Assessment:
Final Examination:
Credits:
40
60
4
UNIT I:
Artificial Neural Networks: Basic concepts - Single layer perception - Multilayer Perception Supervised and Unsupervised learning Back propagation networks - Kohnen's self organizing
networks - Hopfield network.
UNIT II:
Fuzzy Systems: Fuzzy sets and Fuzzy reasoning - Fuzzy matrices - Fuzzy functions Decomposition - Fuzzy automata and languages - Fuzzy control methods - Fuzzy decision making.
Neuro - Fuzzy Modeling: Adaptive networks based Fuzzy interface systems - Classification and
Regression Trees - Data clustering algorithms - Rule based structure identification - Neuro-Fuzzy
controls - Simulated annealing Evolutionary computation.
UNIT III:
Genetic Algorithms: Survival of the Fittest - Fitness Computations - Cross over - Mutation Reproduction - Rank method - Rank space method.
UNIT IV
Soft computing and Conventional AI: AI search algorithm - Predicate calculus - Rules of
interference Semantic networks - Frames - Objects - Hybrid models - Applications.
Learning Resources:
Text Books:
1. Jang J.S.R., Sun C.T. and Mizutani E, Neuro-Fuzzy and Soft Computing. PHI/Pearson
Education, 1998.
Reference Books:
1.
2.
3.
4.
5.
56
M.Tech(CSE) VR10 Regulations
CSCS2051
SOFTWARE ENGINEERING LAB
Lecture :
Tutorial :
Practical :
Objectives:
3 hrs/ Week
Learning
Outcomes:
Internal Assessment:
Final Examination:
Credits:
25
50
2
Introduce the lab environment and tools used in the software engineering
lab: WebCT and SynchEye.
Become familiar with a configuration management case tool (Microsoft
Visual Source Safe).
Learn howto prepare project plans
Study the benefits of visual modeling.
Learn use case diagrams: discovering actors and discovering use cases.
Practice use cases diagrams using Rational Rose.
Data model: entity-relationship diagram (ERD).
Functional model: data flowdiagram (DFD).
Documenting Use Cases and Activity Diagrams
Object-Oriented Analysis: Discovering Classes
Interaction Diagrams: Sequence & Collaboration Diagrams
Week 1:
Use Visual Source Safe (VSS) tool to manage your documents for the following Tasks
Create a project and add some java files to it (at least 3 files).
Label the existing files.
Check out all the files and modify one of them.
Check the edited file back in.
Viewthe revision history of the edited file and showthe differences between the old and the
newversions.
Search for any unchecked in files.
Week 2:
Use MS Project 2002 to create a series of tasks leading to completion of a project of your choice. For
your project, you need to:
Set start or ending dates.
Develop a list of tasks that need to be completed.
Establish any sub tasks and create links.
Create any links between major tasks.
Assign a specific amount time for each task.
Assign resources for each task.
Create task information for each item you put into the list.
Week 3:
Read carefully the following problem statement
VELAGAPUDI RAMAKRISHNA SIDDHARTHA ENGINEERING COLLEGE: VIJAYAWADA - 7
57
M.Tech(CSE) VR10 Regulations
We are after a system that controls a recycling machine for returnable bottles and cans. The machine
will allowa customer to return bottles or cans on the same occasion.
When the customer returns an item, the system will check what type has been returned. The system
will register how many items each customer returns and, when the customer asks for a receipt, the
system will print out what he deposited, the value of the returned items and the total return sum that
will be paid to the customer.
The system is also be used by an operator. The operator wants to knowhowmany items of each type
have been returned during the day. At the end of the day, the operator asks for a printout of the total
number of items that have been deposited in the machine on that particular day. The operator should
also be able to change information in the system, such as the deposit values of the items. If
something is amiss, for example if a can gets stuck or if the receipt roll is finished, the operator will
be called by a special alarm signal.
After reading the above problem statement, find:
1. Actors
2. Use cases with each actor
3. Find extended or uses use cases (if applicable)
4. Finally : drawthe main use case diagram:
Week 4:
a. Create an Entity Relationship Diagram (ERD) for an airline reservation system.
b. Create a DFD for:
i. Student Registration System.
ii. (a + b) * ( c + a * d)
Week 5:
1. Take two of the use cases from recycling machine problem (Lab 5) and write flow of events
for those. You should work in groups of three to solve this problem.
2. Practice activity diagram from the example in PPT (Lab 7) for course catalog creation.
Week 6:
Consider the following requirements for the Video Store system. Identify the candidate classes:
The video store keeps in stock an extensive library of current and popular movie titles. A particular
movie may be held on video tape or disk.
Video tapes are in either "Beta" or "VHS" format. Video disks are in DVD format. Each movie has a
particular rental period (expressed in days), with a rental charge to that period. The video store must
be able to immediately answer any inquiries about a movie's stock availability and how many tapes
and/or disks are available for rental. The current condition of each tape and disk must be known and
recorded.
The rental charge differs depending on video medium: tape or disk (but it is the same for the two
categories of tapes: Beta and VHS).
The system should accommodate future video storage formats in addition to VHS tapes, Beta tapes
and DVD disks. The employees frequently use a movie code, instead of movie title, to identify the
movie. The same movie title may have more than one release by different directors.
Week 7:
We all have used an elevator. The following steps describe the scenario of what happens at the
elevator door from outside.
1. The passenger presses the button of either up or down depending on where he wants to go.
2. Then he will see that the button he pressed is illuminated.
3. The elevator is nowmoving to his floor.
4. When the elevator reached his floor it stops.
5. Nowthe button which was illuminated nowoff.
6. The door opens and the passenger enters.
7. The door closes.
VELAGAPUDI RAMAKRISHNA SIDDHARTHA ENGINEERING COLLEGE: VIJAYAWADA - 7
58
M.Tech(CSE) VR10 Regulations
The objects:
3. Passenger (he is the actor).
4. Floor button (this is the interface class, the actor interacts with this object).
5. Elevator controller (this the control class, which coordinates the activities of the scenario).
6. Elevator (the entity class, which represents the machine itself which moves up and down).
7. Door (another entity class, which represents the door which opens and closes).
Week 8:
Refer to Lab 8 exercises; assume that the Video Store needs to know if a video tape is a brand new
tape or it was already taped over (this can be captured by an attribute is_taped_over); assume also
that the storage capacity of a video disk allows holding multiple versions of the same movie, each in a
different language or with different endings.
Use the identified classes from Lab 8 and find their attributes, operations and the relationships
between the classes (build the UML diagram).
Week 9:
Here is what happens in a microwave oven:
1. The oven is initially in an idle state with door open, where the light is turned on.
2. When the door is closed it is nowin idle with door closed, but the light is turned off.
3. If a button is pressed, then it moves to initial cooking stage, where the timer is set and
lights are on, and heating starts
4. At any moment the door may be opened, the cooking is interrupted, the timer is cleared,
and heating stops.
5. Also while cooking, another button can be pushed and extended cooking state starts,
where the timer gets more minutes. At any moment door can be opened here also.
6. If the time times out, then cooking is complete, heating stops, lights are off, and it sounds
a beep.
7. When the door is open, again the oven is in idle state with the door open.
Drawa state transition diagram for the microwave oven
Week 10:
Think about any system and its components and drawdeployment and component diagrams.
Week 11:
A tutorial on howto use JUnit with some example will be presented. Please refer to Lab 13 slides for
an overviewof software testing and JUnit tutorial with some examples.
Write a JUnit test class for testing
public class Exercise {
/** Return the minimum of x and y. */
public static int min(int x, int y) { ... }
}
Learning Resources:
Text Books:
1. Roger S Pressmen, Software Engineering A practitioners Approach.6 ed, TMH
2. James Rumbaugh, Jacobson and Booch, Unified Modeling Language Reference Manual. Pearson
Education.
References:
1. Visual Source Safe (VSS) tool Manual
2. MS Project Manual
3. IBM Rational Rose Manual
59
M.Tech(CSE) VR10 Regulations
CSCS2052
DATA MINING LAB
Lecture :
Tutorial :
Practical :
3 hrs/ Week
Objectives:
Learning
Outcomes:
Internal Assessment:
Final Examination:
Credits:
25
50
2
List of Experiments
1. Preprocessing: Removal specified attribute, discrimination of a continuous valued attribute,
standardization and normalization of data.
2. Preprocessing: Selecting the features subset using different attribute selection measures.
3. Data Warehousing: Cube operations- Drill down, drill up, slice and rotate operations.
4. Association Mining: Finding Association Rules using Apriori principle for Bank dataset
5. Association Mining: Finding Association Rules using Apriori principle for AllElectronics
Transaction Dataset.
6. Classification: classify the AllElectronics dataset records using Decision Tree based
classification model.
7. Classification: classify the AllElectronics dataset records using Rule-Based classification
model.
8. Classification: classify the AllElectronics dataset records using Nave Bayes classification
model.
9. Classification: classify the AllElectronics dataset records using Multilayer Feed forward
Network classification model.
10. Clustering: Use k-means clustering technique to classify the given dataset.
11. Clustering: Use Hierarchical based clustering technique to classifythe given dataset
12. Clustering: Use DBScan clustering technique to classify the given dataset
60
M.Tech(CSE) VR10 Regulations
Learning Resources:
Text Books:
1.
Jiawei Han and Micheline Kamber, Data Mining Concepts and Techniques. Morgan Kaufmann
Publishers.
Reference Books:
61
M.Tech(CSE) VR10 Regulations
CSCS4051
PROJECT
Credits : 24
External Assessment:200