CO SYllabus NIT KKR
CO SYllabus NIT KKR
CO SYllabus NIT KKR
PROGRAM
B.TECH COMPUTER ENGINEERING
(Last Updated On 05.05.2009)
Sl.
No.
Course
No.
(1 st SEMESTER)
(Common to all Branches)
Teaching Schedule
Subject
L
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
HUT-109
MET-103
HUT-107
ECT-103
ECT-105
MAT-103
PHT-105
CHT-105
ELT-105
COT-101
CET-103
PHT-107
CHT-107
ELT-107
COT-103
MET-105
Engineering Economics OR
3
Manufacturing Processes
3
Commun. Skills in English OR
2
2
Basic Electronics Eng. and
Basic Electronics Eng. (Pr)
Mathematics-I
3
Physics-I
3
Chemistry I
3
Basic Electrical Engineering OR
2
2
Computer Engineering *
Engineering Graphics-I
Physics-I (Pr)
Chemistry-I (Pr)
Basic Electrical Engineering.(Pr)
OR Computer (Pr) *
Workshop-I (Pr)
TOTAL 15/17
T
1
1
2
2/2
2
1
1
2/2
2/2
8/7
P/
D
2/2
3
2
2
2/2
2/2
3
12/11
Tot
Examination Schedule
(Marks)
Th
Sess
P/VV
Tot
4
50
50
100
4
50
50
100
4
50
50
100
3
50
50
100
1
60
40
100
5
50
50
100
4
50
50
100
4
50
50
100
3
60
40
100
3
50
50
100
3
50
50
100
2
60
40
100
2
60
40
100
1
60
40
100
1
60
40
100
3
60
40
100
35 575/600 225/240 200/160 1600
Duratio
n of
Exam
(Hours)
3
3
3
3
3
3
3
3
3
3
4
3
3
3
3
3
HUT-109 and (ECT-103 +ECT-105) will be offered to first half of the students strength.
HUT-107 and MET-103 will be offered to second half of the students strength.
(ELT-105 + ELT-107) will be offered to first half of the students strength.
(COT-101 + COT-103) will be offered to second half of the students strength.
* All engineering departments will share the teaching as well as the examinations.
Bachelor of Technology (Computer Engg)
Scheme of Courses/Examination
Sl.
No.
Course
No.
1
2
3
4
5
6
7
8
9
10
11
12
MET-103
HUT-109
HUT-107
ECT-103
ECT-105
MAT-104
PHT-106
PHT-108
CHT-106
COT-101
ELT-105
MET-104
13
14
15
16
17
18
PHT-110
PHT-112
CHT-108
MET-106
COT-103
ELT-107
Subject
Manufacturing Processes OR
Engineering Economics
Commn. Skills in English OR
Basic Electronics Eng. and
Basic Electronics Eng.(Pr)
Mathematics-II
Physics-II OR
Physics-II
Chemistry-II
Computer Engineering * OR
Basic Electrical Eng.
Engineering Graphics-II
(2 nd SEMESTER)
(Common to all Branches)
Teaching Schedule
L
3
3
2
2
3
3
3
2
2
2
-
1
1
2
1
1
2/2
2/2
1
2/2
2/2
-
P/
D
2/2
6
Examination Schedule
(Marks)
Tot
Th
Sess
P/VV
Tot
4
4
4
3
1
4
4
4
3
3
3
6
50
50
50
50
50
50
50
50
60
50
50
50
50
50
50
50
40
-
100
100
100
100
100
100
100
100
100
100
100
100
50
50
50
50
50
50
50
Physics-II (Pr) OR
2/2
1
60
40
100
Physics-II (Pr)
2/2
1
60
40
100
Chemistry-II (Pr)
2
2
60
40
100
Workshop-II (Pr)
3
3
60
40
100
Computer (Pr) * OR
2/2
1
60
40
100
2/2
1
60
40
100
Basic Electrical Engineering (Pr)
Total
14/15 7/7 14/13 35 575/575 270/310 155/115 1800
HUT-107 and MET-103 will be offered to first half of the students strength..
HUT-109 and (ECT-103 +ECT-105) will be offered to second half of the students strength.
(COT-101 + COT-103) will be offered to first half of students strength.
(ELT-105 + ELT-107) will be offered to second half of students strength.
(PHT-108+PHT-112) will be offered to (C+M) students and (PHT-106+PHT-110) will be offered to other students.
* All engineering departments will share the teaching as well as the examinations.
Duration
of Exam
(Hours)
3
3
3
3
3
3
3
3
3
3
4
3
3
3
3
3
3
ii
Sl.
No.
Course
No.
Th
Sess
P/VV
Tot
Duration
of Exam
(Hours)
Credits
HUT-201
Industrial Sociology
60
40
100
2.5
COT-201
60
40
100
3.5
3
4
COT-203
COT-205
4
4
2
1
6
5
60
60
40
40
100
100
3
3
5.0
4.5
5
6
7
8
9
COT-207
COT-209
COT-211
COT-213
COT-215
3
3
19
2
2
9
2
3
2
7
5
5
2
3
2
35
60
60
-
40
40
60
60
60
40
40
40
100
100
100
100
100
900
3
3
3
3
3
4.0
4.0
1.0
1.5
1.0
27
iii
Course
No.
1
2
COT-202
COT-204
COT-206
4
5
6
7
COT-208
COT-210
MAT-202
COT-212
COT-214
9
10
COT-216
COT-218
NOTE:
Subject
Teaching Schedule
Examination Schedule
(Marks)
Duration
of Exam
(Hours)
Credits
P/D
Tot
Th
Sess
P/VV
Tot
3
3
1
1
4
4
60
60
40
40
100
100
3
3
3.5
3.5
60
40
100
3.5
Microprocessors I
Unix and Linux Programming
Mathematics III
Object Oriented Programming
(Pr)
Microprocessors I (Pr)
3
3
3
-
1
1
1
-
4
4
4
2
60
60
60
-
40
40
40
60
40
100
100
100
100
3
3
3
3
3.5
3.5
3.5
60
40
100
1
1.0
3
3
3
3
60
60
40
40
100
100
3
3
1.5
1.5
18
34
1000
26
Students of all branches will undergo a practical training of 6 weeks duration after the 4 th semester exam.
iv
Course
No.
Subject
1
2
3
4
HUT-301
COT-301
COT-303
COT-341
Business Management
Design and Analysis of Algorithms
Database Systems
Analog and Digital Communication
5
6
7
8
9
10
COT-307
COT-311
COT-313
COT- 315
COT-317
COT-319
Automata Theory
Algorithms Design (Pr)
Database Systems (Pr)
Software Testing (Pr)
Seminar
Training Viva
Total
Teaching Schedule
Examination Schedule
(Marks)
Duration
of Exam
(Hours)
Credits
P/D
Tot
Th
Sess
P/VV
Tot
3
4
3
4
1
1
2
1
4
5
5
5
60
60
60
60
40
40
40
40
100
100
100
100
3
3
3
3
3.5
4.5
4.0
4.5
4 2
- - - - - 18 9
3
3
2
2
8
6
3
3
2
2
35
60
-
40
60
60
60
40
40
40
-
100
100
100
100
100
100
1000
3
3
3
3
-
5.0
1.5
1.5
1.0
1.0
3.0
29.5
Course
No.
1
2
3
4
5
6
7
COT-302
COT-304
COT-306
COT-308
COT-312
COT-314
COT-316
Subject
Teaching Schedule
Examination Schedule
(Marks)
Duration
of Exam
(Hours)
Credits
P/D
Tot
Th
Sess
P/VV
Tot
Departmental Elective I
3
Operating Systems
4
Computer Hardware Technologies 4
Computer Networks
4
Advanced Computer Architecture
4
Operating Systems (Pr)
Computer Hardware &
Troubleshooting Lab (Pr)
Advanced Technologies (Pr)
Total
19
2
2
1
1
1
-
3
3
5
6
5
5
5
3
3
60
60
60
60
60
-
40
40
40
40
40
60
60
40
40
100
100
100
100
100
100
100
3
3
3
3
3
3
3
4.0
5.0
4.5
4.5
4.5
1.5
1.5
3
9
3
35
60
40
100
800
1.5
27
NOTE: Students of all branches will undergo a practical training of 6 weeks duration after the 6th Semester exam.
1.
2.
3.
4.
5.
6.
7.
Departmental Elective I
COT-340
Digital Signal Processing
COT-342
Multimedia Techniques
COT-344
Graph Theory & Combinatorics
COT-348
Logic of Programming
COT-350
Computer Graphics
COT-352
Software Quality and Reliability
COT-354
Java Programming
vi
(7th SEMESTER)
Sl.
No.
Course
No.
COT-401
4
5
COT-403
COT-405
6
7
8
9
10
COT-411
COT-413
COT-415
COT-417
COT-419
1.
2.
3.
4.
1.
2.
3.
4.
5.
6.
Subject
Teaching Schedule
Open elective I
Departmental Elective II
Examination Schedule
(Marks)
Duratio
n of
Exam
(Hours)
Credits
Th
Sess
P/V V
Tot
To
t
4
75
50
125
3.5
75
50
125
3.5
100
25
125
4.5
3
3
1
1
4
4
75
100
25
25
100
125
3
3
3.5
4..0
1
6
2
2
5
9
2
2
5
1
30
50
25
50
50
75
50
25
75
-
100
50
125
50
75
1000
3
3
3
-
1.5
1.5
6.0
1.5
3.0
32.5
15
Open Elective-I
COT-471 Fundamentals of Software Engineering (for branches except Co, IT)
COT-473 Fundamentals of Database Systems (for branches except Co, IT)
COT-475 Fundamentals of Computer Hardware Techniques (for branches except Co, IT)
COT-477 Artificial Intelligence (open to all branches)
Departmental Elective II
COT-441
Software Project Management
COT-443
Fuzzy Logic
COT-445
Parallel Computing
COT-447
Image Processing
COT-449
VLSI Technology
COT-479
Security and Cryptography
vii
(8 SEMESTER)
Sl.
No.
Course
No.
1
2
Subject
Teaching Schedule
Examination Schedule
(Marks)
P/D
Tot
Th
Sess
Open Elective II
75
75
10
0
10
0
-
COT-402
Web Engineering
COT-404
Compiler Design
5
6
7
8
COT-412
COT-414
COT-416
COT-418
1
-
2
11
-
2
11
1
-
12
Total
1.
2.
3.
4.
5.
COT-472
COT-474
COT-476
COT-478
COT-480
1.
2.
3.
4.
5.
6.
COT-440
COT-442
COT-444
COT-446
COT-448
COT-450
13
Duratio
n of
Exam
(Hours)
Credits
Tot
50
P/V
V
-
125
50
125
4.0
50
150
4.5
25
125
4.5
50
125
50
-
50
125
-
100
250
50
75
3
3
-
1.5
20
1.5
3
30
1000
39
Open Electives II
Fundamentals of Operating Systems (for branches except Co, IT)
Fundamentals of Computer Networks (for branches except Co, IT, EC)
Object-Oriented Software Engineering (open to all branches)
Expert Systems (open to all branches)
Security & Cryptography (for branches Co, IT, EC)
Departmental Elective III
Distributed Operating Systems
Software Project Measurement
Natural Language Processing
BioInformatics
Advanced Database Systems
Software Testing
viii
T
2/2
1. Introduction
Overview of a computer system, Block diagram and major parts of a computer, history of computer
development, introduction to binary, octal, & hexadecimal numbers, ASCII code, different levels of
programming languages machine language, assembly language, high level language; need of operating
system, tree structure of storage, introduction to assembler, compiler and interpreter.
2. Basics of C Language
C fundamentals; operators and expressions; i/p and o/p statements-getchar, putchar, scanf, printf; control
statements if-else, while, do-while, for, switch, break, continue, comma operator, goto statement.
BOOKS
1.
2.
3.
ix
Computer Lab
COT-103
L
-
T
-
P
2/2
T
1
P
-
1. Programming Methodology
Introduction to software development Concept of professional programming and software development,
tools for software design and for algorithm specification; Problem solving Steps of developing any
program, algorithm construction, patterns of logic; Use of sub-programs, Top-down decomposition,
principles for decomposition, Communication between procedures, iteration vs. recursion; Program
Documentation Introduction, Documentation for programmers, operators, users, interactive systems.
2. Input/Output Devices
Characteristics and working of magnetic tapes, magnetic disks hard-disk, floppy disk, Winchester disks;
optical disk, magnetic drum, magnetic bubble memory, charge-coupled device; overview of working of
printers character, line, page printers, scanners, plotters, OMR, MICR and Barcode Reader, Voice
recognition and response devices.
3. File Systems and Organizations
File organizations, file operations, file systems, file directories, device control, channel and buffer
management, Sequential File Organization Creating, retrieving and updating sequential files & their
performance; merging natural, balanced, polyphase, cascade and their performance; relative file
organization definition, addressing techniques, problem of collision and its solutions, performance; indexed
sequential file organization definition, application, B+ tree structure, physical layout indexes, design; multikey file organization multi-key access, inverted file organization, multi-list file organization;
BOOKS
1. P. Juliff: Program Design, PHI, 2000.
2. M.E. Loomis: Data Management and File Structures, 2nd Ed. PHI. 1997.
3. V. Rajaraman: Fundamentals of Computers, PHI
4. S.K. Chauhan: P.C. Organization,. Kataria & Sons, Delhi, 2001.
5. Alexis Leon and Mathews Leon: Introduction to Computers, Leon Press, Chennai, & Vikas
Publishing House, New Delhi, 2001.
xi
Data Structures
COT-203
L
4
T
2
P
-
xii
T
1
P
-
1. Introduction
Basic Machine Principle, Structure and representation of real world data, Von-Newman Model and stored
program concept, Subroutine, Branching & Macro facility.
2. Processor Design
Processor Organization, Information representation and Number format, Instruction cycle and Instruction
format, Addressing modes, Arithmetic operation, timed point addition, subtraction, multiplication and
division, ALU design and floating point arithmetic, Parallel processing Performance consideration, Pipeline
processor and Multiunit processor.
3. Control Design
Instruction sequencing and Interpretation, Hardware Control design method, Multiplier control unit and CPU
control unit, Microprogrammed Control, Minimizing Instruction Size, Microprogrammed computer.
4. Memory organization
Memory device characteristic, Random access and serial access memories, Virtual memory memory
hierarchies, Main Memory allocation & replacement policies, Segments, pages and file organization, High
speed memories Interlocked, cache and associative memory.
5. System Organization
Local and long distance communication, Programmed I/O, DMA and interrupts, I/O processors & CPU I/O
interaction, Multiprocessor Introduction.
BOOKS
1. J.P. Hayes: Computer Architecture and Organization, 3rd Ed. TMH, 1999.
2. C.W. Gear: Computer organization and Programming, TMH.
3. T.C. Bartee: Digital Computer Fundamental, TMH.
4. M.M. Mano: Computer System Architecture, PHI.
5. A. S. Tanenbaum: Computer System Organization, PHI.
xiii
Discrete Structures
COT 207
L
3
T
2
P
-
1.Discrete Probability:
Introductory Examples, Basic definitions, Engineering applications of probability, Set theory, Sample space
&events, Probability Multiplication principle, Product of sums principle, Cross product of Sample spaces,
Theorem of Total Probability, Conditional Probability, Mutual Exclusion and Independent Events, Principle
of Inclusion and Exclusion, Bayes Rule.
2.Discrete Random Variable & Distributions:
Random variables and their event spaces, probability Mass function, Distribution function, Discrete Uniform
Distribution, Bernouli Trial & Binomial distribution, Poisson distribution, Geometric distribution, Mean &
Variance of random variables.
3.Relations and Algebraic system:
Binary Relation and their properties, Equivalence Relations and partitions, Partial ordering Relations,
Functions and Pigeonhole Principle, Propositions, Definitions and elementary properties of algebraic
structures , semi groups, monoids and submonoids, groups, and subgroups, Homomorphism and
Isomorphism of monoids and Groups, Definition and Examples of Rings and Subrings, Types of Rings,
Commutative Ring, Integral Domain, Division Ring, Relation of Isomorphism in the set of rings, Field, its
characteristics and subfield.
4.Graphs and Trees:
Introduction, Basic Terminology, Multigraphs and Weighted Graphs, Paths and Circuits, Shortest Paths in
Weighted Graphs, Eulerian Paths and Circuits, Hamiltonian Paths and circuits, Planar Graphs, Trees, Rooted
Trees, Path Lengths in Rooted Trees, Binary Search Trees, Spanning Trees and Cut-sets, Minimum spanning
Trees.
BOOKS
1. C.L. Liu; Elements of Discrete Mathematics.
2. Discrete Mathematics for Computer Science, by Gary Haggard, J.Schlipf, S. Whitesides,
Cengage Learning.
3. J.P. Tramblay; Discrete mathematical Structures with Applications to Computer Science, McGraw Hill,
N.Y., 1977.
xiv
DIGITAL ELECTRONICS
COT-209
L
3
T
1
P
-
BOOKS
1. R.P. Jain: Modern Digital Electronics, TMH.
2. Z Kohavi: Switching and Finite Automata Theory, TMH
3. M.M. Mano: Digital Logic Design, PHI.
4. Dr. B.R. Gupta: Digital Electronics, KATSON
5. James W. Bignell & Robert Donovan: Digital Electronics, CENGAGE
LEARNING
6. Sanjay Kumar Bose: Digital Systems , NEW AGE INTERNATIONAL
PUBLISHERS
xv
T
-
P
2
xvi
T
-
P
3
Define two strings as arrays. Read them using %s. Using pointers, concatenate them without using
string.h.
Define a pointer to an integer; read a list of n numbers using dynamic memory allocation and find
average of these numbers.
Create a file containing 26 alphabets(A to Z) in separate lines.
Copy a file to another. Source file name and destination file name are input from the user.
Write a program for binary search (successful and unsuccessful both).
Sort n numbers using quick/merge/selection sort. Also count the number of exchanges in each case.
Write a program for expression evaluation using stacks.
Write a program for infix to postfix conversion.
Create a singly linked list and reverse it in the same list.
Write a program for a doubly linked list giving following option, insertion, deletion, retrieval,
Write a program to implement queues using linked list with option; list of elements in queue, insertion,
and deletion.
Write a program to implement stacks using linked list with options push and pop.
Write a program for multiplication of two polynomials using linked list.
Write a program to implement binary trees. Depending on the choice, inorder/ preorder/ postorder
traversal is done.
Implement heap sort. Show the contents of heap after each adjustment of element i.e. n outputs should be
printed if list has n elements.
xvii
1.
2.
3.
4.
5.
6.
7.
8.
9.
10.
11.
12.
13.
14.
15.
T
-
P
2
To study and verify the truth table of various logic gates (NOT, AND, OR, NAND, NOR, EX-OR, &
EX-NOR).
To design and verify a half and full adder circuits.
To design a 4 bit adder/subtract using IC 7483.
To design and implement a 4:1 multiplexer.
To design and implement a 1:4 demultiplexer.
Verify the truth table of a 4-bit comparator using IC 7485.
To design and verify a 2:4 decoder.
To design and implement a 2:4 encoder.
To verify the operation of a D and JK flip-flop using ICs 7474 AND 7473.
To design and verify the operation of RS, T, D, and JK flip-flops using logic gates.
To verify the operation of a Mod-10 counter.
To design and implement the operation of a Mod-16 counter using JK flip-flops
To design and implement a Mod-10 counter using JK flip flops and logic gates.
To verify the operation of a 4 bit shift register using IC 7495.
To design and verify the operation of a 4-bit shift left register using D flip-flops.
16. To design and verify the operation of a 4-bit shift right register using D flip-flops.
xviii
T
1
P
-
BOOKS
1.
2.
3.
4.
5.
6.
xix
T
1
P
-
xx
Software Engineering
COT-206
L
3
T
1
P
-
1. Introduction
Introduction to Software crisis & Software processes; Software life cycle models Build & Fix, waterfall
prototype evolutionary, spiral model.
2. Requirement Analysis & Specifications
Problem Analysis DFD, Data dictionaries, ER diagrams, object diagrams; approaches to problems analysis;
SRS; specifying behavioral & non-behavioral requirements.
3. Software Design
What is design? Modularity, strategy of design, function oriented design, object oriented design.
4. Software Metrics
Introduction, size metrics, data structure metrics, information flow metrics, entropy-based measures, metric
analysis.
5. Software Reliability
Importance, Software reliability & Hardware reliability, failures & faults, reliability concepts, reliability
models macro, basic, logarithmic Poisson, calendar time component, micro models; estimating number of
residual errors; reliability allocation.
6. Software Testing
Introduction, Functional testing, structural testing, activities during testing, debugging, testing tools.
7. Software Maintenance
Introduction, types of maintenance, maintenance process, maintenance models, reverse engineering, reengineering.
BOOKS
8. K.K.Aggarwal, Yogesh Singh: Software Engineering, New Age International Ltd, 2001.
9. R.S. Pressman, Software Engineering A Practitioners Approach, 5th Ed, TMH, 2000.
10. Ian Sommerville, Software Engineering, 4 th Ed., Addison Wesley.
11. Pankaj Jalote, An Integrated Approach to Software Engineering 2nd Ed, Narosa Publishing.
xxi
Microprocessors I
COT-208
L
3
T
1
P
-
1. 8086 Architecture
CPU architecture, internal operation, machine language instructions, instruction execution time.
2. Assembly Language Programming
Assembler, instruction format, data transfer instruction, arithmetic instructions, branch instruction, NOP &
HLT instructions, flag manipulation instruction, logical instruction, shift and rotate instruction, directions and
operators.
3. Modular Programming
Stacks, Procedures, Basic Interrupt processing, Interrupt and interrupt routines, 8259A Programmable
Interrupt Controller, macros local labels and nested macros.
4. Strings and I/O Programming
String instructions, I/O consideration, programmed I/O block transfer and DMA.
5. I/O Interface
Serial communication, asynchronous, synchronous, physical, 8251A; Parallel communication: 8255 A, DMA
controllers; maximum mode, 16-bit bus interface, 8279 Programmable keyboard/ Display interface, 8254
Programmable interval Timer, Interfacing to A/D and D/A converters, Stepper motor interfacing.
BOOKS
1. Liu and Gibson, Microcomputer Systems: 8086/8088 family: Architecture, Programming and Design,
PHI.
2. D.V. Hall, Microprocessors and Interfacing, TMH.
3. A. K. Ray & K.M. Bhurchandi, Advanced Microprocessors and Peripherals: Architecture, Programming
and interfacing, TMH.
xxii
1. Linux Startup
User accounts, accessing linux starting and shutting processes, Logging in and Logging out, Command
line, simple commands
2. Shell Programming
Unix file system: Linux/Unix files, inodes and structure and file system related commands, Shell as
command processor, shell variables, creating command substitution, scripts, functions, conditionals, loops,
customizing environment
4. The C Environment
The C compiler, vi editor, compiler options, managing projects, memory management, use of makefiles,
dependency calculations, memory management dynamic and static memory, building and using static and
dynamic libraries, using ldd, soname, dynamic loader, debugging with gdb
5. Processes in Linux
Processes, starting and stopping processes, initialization processes, rc and init files, job control at, batch,
cron, time, network files, security, privileges, authentication, password administration, archiving, Signals and
signal handlers, Linux I/O system
Books
1.
2.
3.
4.
John Goerzen: Linux Programming Bible, IDG Books, New Delhi, 2000.
Sumitabha Das: Your Unix The Ultimate Guide, TMH, 2000.
Mathew: Professional Linux Programming, vol.1 & 2, Wrox-Shroff, 2001.
Welsh & Kaufmann: Running Linux, OReiley & Associates, 2000.
xxiii
T
-
P
2
2.
Describe a class called TOLL- BOOTH with the following data items
unsigned int - to hold the number of cars passing through the booth,
double - to hold the total amount collected.
xxiv
public;
father (int x){age =x;}
virtual void iam()
{cout <<"I AM THE FATHER, my age is :"<<age<<end1;}
};
Derive the two classes son and daughter from the above class and for each, define iam() to write out
similar but appropriate messages. You should also define suitable constructors for these classes.
Now, write a main () that creates objects of the three classes and then calls iam() for them. Declare pointer to
father. Successively, assign addresses of objects of the two derived classes to this pointer and in each case,
call iam() through the pointer to demonstrate polymorphism in action.
5. A thermostat is a device that keeps a system at a constants temperature. It behaves like a temperature
gauge that is capable of getting the current temperature from the system. It is also a switch that can be turned
"on" and "off". The thermostat monitors the temp. in the following manner :
if the current temp. falls below 95% of the required temp., it turns itself "on". On the other hand , if the
current temp. exceeds 1.05 of the required temp. ,it turns itself "off" .In all other cases ,its on-off status
remain un changed.
Implement classes for temp. gauge and switch(named switch) with suitable data and member functions.
The temp. gauge class must have a member function get_temp() that will pretend to get the current temp. of
the system by actually reading it from the keyboard.
Now, implement thermostat class in both the following ways:
a) Develop a class called thermostat that include objects of temp. gauge and switch as its
member(aggregation).
b) Develop a class called thermostat that inherits the data methods of temp. gauge and switch(multiple
inheritance).
Write main() to test all the features of above mentioned classes.
6. Write a program that creates a binary file by reading the data for the students from the terminal. The data
of each student consist of roll no., name (a string of 30 or lesser no. of characters) and marks.
7. Using the file created in problem 6, write a program to display the roll no. and names of the students who
have passed (has obtained 50 or more) .
8. You are to create a file containing n records. Each record relates to a historical event and the year in
which the event took place
Some examples are:
India Wins Freedom 1947
Amartya Sen Gets Nobel 1998
First World War Begins 1914
The data should be read from terminal while creating the file.
xxv
9. A hospital wants to create a database regarding its indoor patients. The information to store include
(a)
(b)
(c)
(d)
Create a structure to store the date (year, month and date as its members). Create a
base class to store the above information. The member function should include
functions to enter information and display a list of all the patients in the databases.
Create a derived class to store the age of the patients. List the information about all
the pediatric patients (less than twelve years in age).
10. Define a class to store the time at a point. The data members should include hr., min.,
and sec. to store hours, minutes and seconds. The member functions should include
functions for reading the time and displaying the same. Add a friend function to add
two times. Write a program, using the above declaration, to read two times and add
them.
11. Write a program to read two matrices and find their product. Use operator overloading
so that the statement for multiplying the matrices may be written as
Z X *Y where X , Y and Z are matrices.
12. Write a program to read a number and display its square, square root, cube and cube
root. Use a virtual function to display any one of the above.
13. Make a class Employee with a name and salary. Make a class Manager inherit from Employee. Add an
instance variable, named department, of type String. Supply a method to toString that prints the
managers name, department and salary. Make a class Executive inherit from Manager. Supply a
method toString that prints the string Executive followed by the information stored in the Manager
superclass object. Supply a test program that tests these classes and methods.
14. Write a superclass Worker and subclass HourlyWorker and SalariedWorker. Every worker has a
name and a salary rate. Write a method computePay(int hours) that computes the weekly pay for every
worker. An hourly worker gets paid the hourly wage for the actual number of hours worked, if hours is
at most 40. If the hourly worker worked more than 40 hours, the excess is paid at time and a half. The
salaried worker gets paid the hourly wage for 40 hours, no matter what the actual number of hours is.
Write a static method that uses polymorphism to compute the pay of any Worker. Supply a test program
that tests these classes and methods.
BOOKS
1.
2.
3.
4.
xxvi
Microprocessors I (Pr.)
COT-214
L
1.
2.
3.
4.
5.
6.
7.
8.
9.
10.
11.
12.
13.
14.
15.
16.
17.
18.
T
-
P
2
xxvii
T
-
P
3
Implement Halsteads equation to compute various science metrics like volume etc., language level,
estimated program length, effort and time in a program.
Compute average number of live variables per statement in a program.
Compute average life of variables in a program.
Compute psychological complexity of a program.
Compute McCabes cyclomatic complexity of a program and generate its control graph.
Use some CASE tool for identifying various phases of software engineering, generate SRS document,
design document like DFD and ER diagram, test cases generation for result automation, engineering
admission automation (seat allocation during counseling).
xxviii
T
-
1.
2.
3.
4.
5.
6.
7.
8.
P
3
xxix
T
1
P
-
1. Introduction
Review of elementary data structures, analyzing algorithms, asymptotic notation, recurrence relations, Hash
tables, Binary search trees, Convex Hull problem.
2. Sorting and Order Statistics
Heapsort, Priority queues, Quicksort,
Sorting in linear time.
2. Advanced Design and Analysis Techniques
Dynamic programming Elements, Matrix-chain multiplication, longest common subsequence, Travelling
Salesperson problem, Greedy algorithms Elements, activity-selection problem, Huffman codes, task
scheduling problem, Knapsack Problem, Backtracking Elements, 8 Queens, Graph Coloring, Hamiltonian
Cycles.
3. Advanced Data Structures
Operations in B-Trees, Binomial heaps, Fibonacci heaps, data structures for disjoint sets, strings.
4. Graph Algorithms
Review of graph algorithms, topological sort, strongly connected components, minimum spanning trees
Kruskal and Prims, Single source shortest paths, relaxation, Dijkstras algorithm, Bellman-Ford algorithm,
single source shortest paths for directed acyclic graphs.
5. NP Hard & NP Complete problems
Basic concepts, Clique Decision problem, Node Cover decision problem, Travelling Salesperson decision
problem, Introduction to approximation algorithms Planer Graph Coloring, Maximum programs stored
problem.
BOOKS
1. Cormen, Leiserson and Rivest: Introduction to Algorithms, 2/e, PHI.
2. Horowitz, Sahni, and Rajasekaran: Fundamentals of Computer Algorithms, Second Edition, Universities
Press, Hyderabad.
3. Aho, Hopcroft, and Ullman: The Design and Analysis of Computer Algorithms, Addison Wesley.
xxx
Database Systems
COT-303
1. Basic Concepts
What is database system, why database, Data independence, 3 levels of architecture; external level,
conceptual level, internal level, mapping DBA, DBMS, organization of databases, components of DBMS,
Data Models, Relational Models, Networks data model, Hierarchical Model, semantic data model.
2. Relational Model
Introduction Relational Model, base tables & views, relations, domains, candidate keys, primary key,
alternate keys, foreign key, Integrity rules, relational Operators relational algebra, relational calculus, Data
Base Design Introduction, Basic Definitions, Non-loss decomposition and functional dependencies, 1NF,
2NF, 3NF, BCNF, MVD & 4NF, JD & 5NF, Normalization procedure, other normal forms.
3. Transaction Management
Transaction concept, transaction states, state diagram of a transaction, concurrent execution of transactions,
conflict serialzability, view serializability, recoverable schedule, cascadeless schedule, testing of
serializabity.
4. Concurrency control
Lock based protocols, timestamp based protocols, and validation based protocols.
BOOKS
1. Database System Concept by Avi Silberchatz, Henry F. Korth and S. Sudarshan, Fifth Edition McGrawHill.
2. Fundamental of Database Systems by Ramez Elmasri, Shamkant B. Navathe, 5 th Edition, Perason
Education.
3. Database Management Systems, by Raghu Ramakrishnan, 3rd edition, MGH.
xxxi
T
1
P
-
1. Spectral Analysis
Fourier series, Response of linear system Power spectral density, Fourier Transform, Convolution, Parsevals
Theorem, correlation between waveforms, Impulse Function, ideal low pass filter, Hilbert transform, Preenvelope.
6. Random Variables & Noise
Probability, Joint Probability, Random variables, Cumulative distribution function, Probability density
function, Average value of random variables, Properties of rectangular Gaussian, Binomial Rayleigh &
Poissons distribution, Central Limit Theorem, Error function, Random processes, Ergodicity & Stationarity,
Covariance, spectral densities. Noise and its sources, Methods of noise calculation in network and
interconnected networks, Mathematical representation of random noise. Narrow band noise and its
representation, Transmission of noise through linear systems, Noise figure to noise temperature, Computation
of signals to noise ratio. Noise bandwidth.
3. Analog Modulation Techniques
Introduction, Amplitude Modulation, AM demodulators, Spectrum of AM signal, Double sideband
suppressed carrier modulation, single side band modulation, Methods of generating SSB signals, vertical side
band modulation, frequency division multiplexing; Angle modulation, Phase and frequency modulation,
spectrum of F.M. signal bandwidth of FM signal; Effect of modulation index on bandwidth; NBFM &
WBFM FM generation methods, FM Demodulation methods.
4. Pulse Modulation
Sampling theorem for low pass and band pass signals, time division multiplexing, concept of pulse amplitude
modulation and pulse width modulation, demodulation of signals, pulse code modulation, Noise computation
in PCM systems, Delta modulation and adaptive delta modulation.
5. Digital Modulation Techniques
Binary phase shift keying, differential phase shift keying, quadrature phase shift keying, M-ary PSK, QASK,
Binary FSK, M-ary FSK, Minimum shift keying.
6. Spread Spectrum Signals
Spread spectrum model, direct sequence spread signals, generation of PN sequences, CDMA system based
on frequency hopped spread spectrum signal.
BOOKS
1. Taub and Schilling: Principles of Communication System, TMH.
2. Simon Haykin: Digital Communication, John Wiley.
3. J. G. Proakis: Digital Communications, MGH.
4. G. Kennedy: Electronic Communication System, TMH.
xxxii
Automata Theory
COT-307
L
4
T
2
P
-
1.
Introduction
Introduction to Finite State Machine, Binary counter, parity bit generator, Moore and Mealy FSMs,
Equivalence, Isomorphism, Reduction of States, Regular Languages, Regular expressions, The
memory required to recognize a language, Distinguishing one string from another, unions,
Intersections and Complements, NFA, NFA with transitions, Criterion for Regularity, Minimal
Finite Automata, The pumping lemma, decision, problems, Finite automata, Nondeterminism and
Kleens Theorem, Regular and Non-regular languages.
2.
Context-Free Language
Context Free Grammars, Definition of CFG, example of familiar languages, unions, concatenations
and closures of CFLs, Derivation Tree, Ambiguity, unambiguous CFG for algebraic expressions,
Simplified forms and normal forms. Push down automata, definition, deterministic PDA, PDA to
CFG and Vice Versa, Parsing. Context Free and Non Context Free Languages, Pumping lemma for
CFG, Intersection and complements of CFL.
Turing Machines
Definition, Turing Machining as Language acceptors, combining TM, computing Partial Function with
TM. Recursively Enumerable and Recursive Languages, Halting Problem, Posts correspondence
Problem, Regular Grammars, context Sensitive grammars, Chomsey Hierarchy.
Computability
Primitive Recursive Functions, Primitive Recursive Predicates and some bounded operations,
unbounded minimization and recursive functions, Godel Numbering, Non-numeric-functions. Growth
rates of functions, Time and space complexity of TM, complexity Classes. P and NP. PolynomialTime. Reductions and NP-Completeness, Cooks Theorem.
3.
4.
BOOKS
1. John C. Martin: Introduction to Languages and the Theory of Computation, MGH.
2. Lewis & Papadimitriou: Elements of the Theory of Computation, PHI.
3. Daniel I.A. Cohen: Introduction to Computer Theory: John Wiley.
4. J.E. Hopcroft and J.D. Ullman: Introduction to Automata Theory Languages and Computation, Narosa.
xxxiii
T
P
3
Implement the minimum cost spanning tree algorithm.
Implement the shortest path algorithm.
Implement the algorithm to compute roots of optimal subtrees.
An Euler circuit for an undirected graph is a path that starts and ends at the same vertex and uses each
edge exactly once. A connected undirected graph G has an Euler circuit. If and only If energy vertex is
of even degree. Give an algorithm and implement to find the Euler Circuit in a graph with e edges
provided one exists.
5. Give an algorithm to determine whether a directed graph with positive and negative cost edges has
negative cost cycle.
6. Write an algorithm in which given an n x n matrix M of positive integers is given and that finds a
sequence of adjacent entries starting from M[n,1] and ending at M[1,n] such that the sum of the absolute
values of differences between adjacent entries is minimized. Two entries M[i,j] and M[k,l] are adjacent
if
(a) i=K+_ 1 and j = l, or
(b) i= k and j = l+_1
For ex. in the following fig. Sequence, 7,5,8,7,9,6,12 is a solution.
1
8
5
7
9
6
12
7
3
5
9
11
4
3
2
6
Matrix of Positive Integers.
7. Write a complete LC branch and bound algorithm for the job sequencing with deadlines problem. Use
the fixed tuple size formulation.
8. Write a LC branch and bound algorithm for the knapsack problem using the fixed tuple size formulation.
9. The postfix representation of an infix arithmetic expression LDR is defined recursively to the postfix
representation of L followed by the postfix representation of R followed by 0. L and R are respectively
the left and right periods of 0. Consider some examples:
Infix.
Postfix.
(i) a + b
ab +
(ii) (a+B) *C
ab + *
(iii) (a-b)/(c*d)
ab-cd*/
(a) Write an algorithm to evaluate a postfix expression E. Assume E is presented as a string and that there
exists an algorithm NEXT-TOKEN(E) that returns the next token (i.e. operator or operand) in E. When all
tokens in E have been extracted, NEXT-TOKEN(E) returns. Assume that the only operators in E are binary
+, _, * and /. (Hint: Make a left to right scan of E using a stack to store operands and results. When even an
operator is run in E, the top two operands on the stack are its right and left operands),
10. Write an algorithm to obtain the postfix form of an infix expression E. Again assume E has only the
binary operators +, _, * and /. (Hint: Make a left to right scan of E using a stack to store operators until
both the left and right operands of an operator have been
output in postfix form). Note that E may contain parenthesis.
xxxiv
Database Systems
COT-313
(Use Oracle or IBM DB/2)
L
-
1.
2.
3.
4.
5.
6.
T
-
P
3
Create a database (database 1) for your class group containing information - roll no., name, group,
branch etc. about students.
Create a database (database 2) for the employees of an organization and edit it using various available
options.
Index the database created in problem 3 using various conditions.
Use various select queries to search the database for both the databases using different conditions.
Generate report for both the databases.
Practice various prompt commands like create, select etc.
Application Programs: 7.
Write a program to list out all the information about students getting marks than 70 % using loop
structure.
8.
Write a program to enter the data into database 2.
9.
Write a program to modify the designation of all employees of database 2 for whom the date of joining
is before Jan. 10, 2002.
10. Write a program to display 5th record from both the databases.
11. Write a program to delete the records of the students who are getting marks less than 40 %.
12. Develop an MIS for an XYZ Paper Mill to automate its
i) inventory
ii) purchase
iii) sales
iv) payroll
v) annual production report.
xxxv
T
-
P
3
Develop a formula for the number of robustness test cases for a function of n variables.
Develop a formula for the number of robustness worst test cases for a function of n variables.
Find a cyclomatic complexity of a graph.
Study the development of decision table for the triangle problem.
Study the development of decision table for the next date function.
Develop a program for the data flow testing.
Develop the program for the white box testing.
Develop the boundary value analysis (test case) on triangle problem.
Develop the boundary value analysis (test case) on next date function.
(B) Developing a small project /tool to generate test data, to execute test data etc.
(C) Exposure to Automated CASE tool
Text book
1. Paul C. Jorgensen: Software testing--A Craftsman s Approach, II Edition,CROC Press
2. Pankaj jalote :an integrated approach to software engineering, III Edtion
Narosa Publications
3. Art of software testing ,II Edition , john wiley publication,2004
xxxvi
Operating Systems
COT-302
L
4
T
2
1.
2.
3.
4.
BOOKS
1. Peterson, J.L. & Silberschatz, A.: Operating System Concepts, Addison, Wesley-Reading.
2. Brinch, Hansen: Operating System Principles, Prentice Hall of India.
3. Haberman, A.N.: Introduction to Operating System Design Galgotia Publication, New Delhi.
4. Tanenbaum, A.S.: Operating Systems.
5. Hansen, P.B.: Architecture of Concurrent Programs, PHI.
6. Shaw, A.C.: Logic Design of Operating Systems, PHI.
xxxvii
T
1
P
-
1. Memory
Memory, memory chips & modules, memory types, advanced memory technologies, troubleshooting
memory.
2. Motherboard
PC family tree, motherboard controllers and system resources, input-output ports, IRQ, I/O bus system: ISA,
MCA, EISA, VESA local bus, PCI, AGP, PCIX; on board I/O devices, ROMBIOS, ROM POST, CMOS
setup.
3. Power Supply
Power supply function and operation, power supply quality and specification, power protection and back-up,
backup power system; UPS; troubleshooting power supply.
BOOKS
1. Craig Zacker & John Rourtre: PC Hardware- The complete reference, TMH.
2. Mark Minosi: The complete PC Upgrade & Maintenance Guide 4/e, BPB publications.
3. S.K. Chauhan: PC Upgrading, maintenance and troubleshooting guide,
xxxviii
Computer Networks
COT-306
L
4
T
1
P
-
1. Introduction
Network Functions, Network Topology, Network Services, Switching Approaches, Transmission media and
systems, multiplexing and signaling techniques, Error detection and correction, Internet checksum algorithm.
2. Layered Architectures
Examples, OSI Reference Model, Overview of TCP/IP architecture, Socket system calls, SNMP, Electronic
Mail.
3. Peer-to-Peer Protocols
Protocols, Service Models and End-to-End requirements, ARQ, Sliding Window Protocols, RTP, HDLC,
PPP protocols, Statistical Multiplexing.
4. MAC and LAN Protocols
Multiple access communication, Random Access-ALOHA, Slotted-ALOHA, CSMA, CSMA-CD, LAN
Standards Ethernet, Fast Ethernet & Gigabit Ethernet, Bluetooth and WiMax standards.
5. Packet Switching Networks
Packet network topology, Datagrams and Virtual Circuits Structure of Switch / Router, Connectionless and
Virtual Circuit packet Switching, Traffic management and QoS FIFO, Priority Queues, Fair Queuing,
MPLS.
6 TCP/IP
Architecture, Internet protocols IP packet, Addressing, Subnet addressing, IP routing, CIDR, ARP, RARP,
ICMP, Reassembly, IPv6, UDP, Transmission Control Protocol TCP, DHCP, Mobile IPv6, Internet
Routing protocols, Multicast Routing.
BOOKS
1. Leon Garcia and Indra Widjaja: Communication Networks Fundamental Concepts and Key
Architectures, TMH, 2000.
2. A.S. Tanenbaum: Computer Networks, Fourth Edition, Pearson Education, 2003.
3. Forouzan: Data Communications and Networks, Fourth Edition, McGraw Hill, 2007.
4.
William Stallings: Data and Computer Communications 5/e, PHI.
xxxix
T
1
P
-
xl
1.
2.
3.
4.
5.
6.
7.
8.
9.
10.
11.
12.
T
-
P
3
xli
T
-
P
3
BOOKS
1. Mark Mines Complete PC upgrade & maintenance guide, BPB publications.
2. Craig Zacker & John Rouske, PC Hardware: The Complete Reference, TMH.
3. Scott Mueller, Upgrading and Repairing PCs, PHI, 1999
xlii
3.
4.
5.
6.
7.
8.
9.
10.
11.
12.
13.
xliii
L.
3
T.
2
P.
-
1. Introduction
Signals, Systems and signal processing, classifications of signals, concept of frequency in continuous time
and discrete time signals. Analog to digital and digital to analog conversion, Discrete time signals,
Discrete time systems, LTI systems, difference equations, implementation of discrete time systems.
2. Z-transform and its Applications
Z Transform, properties of Z transform, Inversion of Z transform, applications of Z transform. Discrete
Fourier Transform(DFT), properties of DFT, Linear filtering methods based on the DFT, frequency
analysis of signals using the DFT.
3. Fast Fourier transform and its applications
1.
2.
3.
4.
5.
xliv
Multimedia Techniques
COT-342
(Departmental Elective I)
L.
3
T.
2
P.
-
xlv
T
2
P
-
1. Introduction
Basic concepts, subgraphs, vertex, degrees, walks, paths, circuits, cycles, trees, spanning trees, cut vertices
and cut edges, connectivity, Euler tours and Hamiltonian cycles, matching perfect matching, connectivity and
separability, network flows, 1-isomorphism and 2-isomorphism.
2. Advanced Features
Vertex coloring, chromatic polynomial, edge coloring, planar and non-planar graphs, Eulers formula,
Kuratowskis theorem, test for planarity, directed graphs, tournaments, networks, max flow, min cut
theorems, graph enumeration, Polyas counting theorem
3. Graph Algorithms
Computer representation of graph, shortest path algorithms, minimal spanning tree, fundamental circuit,
depth first search, planarity testing, directed circuits, isomorphism, performance of graph theoretic
algorithms.
4. Combinatorics
Basic combinatorial numbers, recurrence relations, generating functions, multinomial, counting principles,
Polyas theorem, inclusion and exclusion principles, block design and error correcting codes, Hadamard
matrices, finite geometry.
BOOKS
1.
2.
3.
4.
5.
xlvi
T
2
P
-
Architecture for parallel databases, Parallel query evaluation, parallel zing individual
operations, parallel query optimization; Introduction to distributed databases,
distributed DBMS architectures, storing data in a distributed DBMS, distributed
catalog management, distributed query processing, updating distributed data,
introduction to distributed transactions, distributed concurrency control, recovery.
2.
3.
4.
Data Mining
Introduction, counting co-occurrences, mining for rules, tree structured rules, clustering, similarity
search over sequences.
Object Database Systems
User defined ADT, structured types, objects & reference types, inheritance, design for an ORDBMS,
challenges in implementing an ORDBMS, OODBMS, comparison of RDBMS with OODBMS &
ORDBMS.
Advanced Topics
Advanced transaction processing, integrated access to multiple data source, mobile databases main
memory databases, multimedia databases, GIS, temporal & sequence databases.
BOOKS
1. R. Ramakrishnan & J. Gehrks Database Management Systems MGH, International Ed., 2000.
2. Korth, Silberschatz, Sudershan: Data Base concepts, MGH, 2001.
3. C. J. Date, Database Systems, 7th Ed., Addison Wesley, Pearson Education, 2000.
xlvii
Logic of Programming
COT-348
(Departmental Elective I)
L
3
1.
2.
3.
T
2
P
-
Fundamentals
Propositions, Tautologies, Precedence rules, System definition, Reasoning using Transformations,
Formal Systems, Axioms, Inference Rules, Predicates, Quantification, Free and bound identifiers,
Data Values & Types, Generators, semantic definitions of functions, Generator Induction, definedness
condition.
Semantics
Predicate Transformers, various commands, Alternative and Iterative commands, Procedure call, The
characterization of semantics, The semantic characterization of programming language, Two
Theorems, Design of Properly terminating constructs, Euclids Algorithms, Interrupts, spin locks,
Communicating Sequential Processes (CSP)
Parallel commands, Coroutines, Subroutines and data representation, Monitors and scheduling, Integer
semaphore, Dining Philosophers Problem.
BOOKS
1. David Gries, The Science of Programming, Narosa Publishing House
2. E.W. Dijkstra, A Discipline of Programming PHI
3. Hoare and Jones, Essays in Computing Science, TMH.
xlviii
Computer Graphics
COT-350
(Departmental Elective I)
L T
3 2
1 Basic Concept
Introduction, Point Plotting technique, Coordinate System, Line drawing algorithm, Circle generators,
Line drawing display, storage tube display, refresh line drawing display.
2 Computer Graphics Devices
Point and positioning drive, light pen, mouse, tablet, Input technique, Positioning technique, and
character recognition.
3.
6.
7.
3-D Graphics
Curve and Surfaces, Bezier and B-spline method, perspective depth, Hidden Surface elimination,
depth buffer algorithm, scan line coherence and area coherence algorithm, priority algorithm.
8.
Graphics Systems
Device Independent graphs system, Graphics System design, Case Study of Graphics, Kernel System.
BOOKS
1. Hearn and Baker: Computer Graphics: 2nd Ed., PHI.
2. Rogers: Principles of Computer Graphics, MGH
3. Folay: Fundamentals of Interactive Computer Graphics, Addison Wesley.
4. Harrington: Computer Graphics A Programming approach.
5. Newmann and Sproull: Introduction to Interactive Computer Graphics.
xlix
T
2
P
-
1. Software Quality
Meaning and scope , software quality factors, software quality metrics, relationship between quality factor
and quality metrics, quality management systems, software reviews, formal technical review, correctness
proof, statistical quality assurance, clean room software engineering, ISO 9001 and SEI-CMM standards of
software quality assurance
2 Software Reliability
Meaning and its relation with software quality , reliability modeling-exponential failure time models (viz.
Jelinski Morana model, Schneidiwinds model, Musas basic executionj time model, hyperexponential
model), Weibull and Gamma failure time models ( viz. Weibull model and S-shaped reliability growth
model) , and infinite failure category models (viz. Duanes model, geometric model, Musa Okumto model).
3 Software Testing
Meaning, scope and its relationship with software quality: software testing testing techniques: white box
testing, basis path testing, control structure testing, and black box testing etc. ; software testing strategies
unit testing, integration testing, validation testing and system testing etc.
Books
1.Software Quality: Concepts and Plan, By Robert H Dunn, Prentice Halll International.
2.Software Reliability : Measurement, Prediction and application, By Lohn D Musa, McGraw Hill
3.Software Reliability Engineering By Michele R Lyu, McGraw Hill.
4.Effective Methods of Software Testing, By William E Perry, Wiley.
5.Concepts of Reliability, By L Srinath.
6.Software Reliability, By K K Aggarwal.
7.Software Reliability, By H Koptez.
T
2
li
T
1
P
-
1. Introduction
Introduction to Internet and Intranet, Review of TCP/IP model, UDP, IPv6 Protocol, IP/IPv6 addressing, IP
datagram, IP/IPv6 addressing, IP datagram Routing and Upper Layer Protocols: CIDR, Routing,
Multicasting, Mobile routing, SMTP, FTP, HTTP, Telnet Protocols. Superserver xinetd, ARP Tables, How
DNS Works
2. Intranet Technologies
Internet Technologies integrated with LAN technologies, Web-Server, E-Mail, Printing and file Services,
FTP, Net-News, Network Operating Systems: Introduction to Linux, Netware, Windows NT/2000 service
models. Centralized Services Model.
3. Authentication, File and other Directory Services
File Servers: SMB Protocol, NFS, NIS+, Distributed File Services (WinNT), Unix/Linux File Permissions
Model, The WindowsNT domain+user model of authentication, The Linux Private Groups for users on the
system. LDAP, Kerberos, rsh, rcp, rlogin, Microsoft Active Directory Service, Novell Directory Service,
Pluggable Authentication Module (PAM), auth_ldap.
4. Web Services
The Apache Web Server, Virtual Hosts, Application Support: CGI, Fast-CGI, mod_perl, PHP4, Java Servlets
Support through Tomcat as DSO module of Apache, IIS web server, ISAPI, NSAPI, Frontpage Extensions,
Frontpage extensions support for Apache.
5. Security and Control
TCP wrappers, SSH, Firewall, IP masquerading, IP chains, Advanced routing techniques, Network Address
Translation, Proxy Servers: Hardware and Software.
BOOKS
1. Daniel Minoli, Internet & Intranet Engg. (Tech., protocol & application), MGH.
2. Red Hat Linux Bible, IDG.
3. Windows 2000 Complete Reference TMH.
4. Netware 5 Complete Reference, TMH.
5. Daniel J. Barrett and Richard Silverman, SSH, The Secure Shell: The Definitive Guide, OReilly.
6. Charles Aulds, Linux Apache WebServer Administration, Sybex.
lii
Microprocessors II
COT-403
L
3
T
1
P
-
1. Pentium Architecture
Basic architecture of P II/ P III, Memory management models, registers and flags.
2. Instruction
Basic data types in P II/ P III, addressing modes, instruction format and types, instruction set and
prefixes.
3. Memory Management
Modes of operation of P II/ P III real, protected and virtual; segmentation and its working, paging
and its working, concept of descriptor table, superscalar architecture.
4. Advanced Concepts
Branch prediction, exception handling, performance measurement, optimization, MMX register and
instruction set, interrupt handling.
BOOKS
1. Bray, Intel Microprocessors, The 8086/8088, 80186/80188, 80286, 80386, 80486, Pentium & Pentium
Processor - Architecture, Programming and Interfacing, PHI.
2. A.K. Ray & K.M. Bhurchandi, Advanced Microprocessors & peripherals-Architecture, Programming
& Interfacing: TMH.
3. Intel, Pentium Processor Data Handbook, Intel, 1999.
liii
T
1
P
-
1. Random Variables
Introduction , Engineering Applications to Random variables, Discrete random vectors,
Probability density function (pdf), Cumulative Distribution functions (cdf), Probability
Generating Function, Continuous random variables: some continuous distributions
(Exponential, Hyperexponential, Erlang, Gamma, Normal), Functions of random variables,
jointly distributed random variables.
2. Expectation
Introduction, Moments, Expectation of functions of more than one random variable, Brief
introduction to Conditional pmf, pdf and expectation, Moments and transforms of some
distributions (Uniform, Bernoulli, Binomial, Geometric, Poisson, Exponential, Gamma,
Normal), Computation of mean time to failure.
3. Stochastic Processes
Classification of stochastic processes, The Bernoulli process, The Poisson process, renewal
process, renewal model of program behaviour.
4. Markov Chains
Computation of n-step transition probabilities, State classification and limiting
distributions, Distribution of times between state changes, Irreducible finite chains with
aperiodic states, M/G/1 queuing system, Discrete parameter Birth-Death processes,
Analysis of program execution time. Continuous parameter Markov Chains, Birth-Death
process with special cases, Non-Birth-Death Processes.
5. Estimation and Regression
Maximum likelihood estimation (MLE), Bayesian Estimation Techniques, Expectation
Maximization, Linear Regression, Application of Regression in pattern recognition
BOOKS
1. K.s. Trivedi, Probability, Statistics with reliability, Queuing and Computer Science
Applications, PHI, 2001.
2.The Probability Tutoring Book (An intuitive Course for Engineers & scientists) by Corol Ash
IEEE Press.
3. A first course in Probability by Sheldom M. Ross Rs 350/4. Introduction to Probability Models by Sheldom M. Ross Rs 450/5. Statistics foe the Engineering and Computer Sciences by William Mendenhall.
liv
T
1.
2.
3.
4.
5.
6.
7.
8.
9.
10.
11.
12.
13.
14.
15.
16.
17.
P
2
Define Ethernet, Token Ring, Token Bus, Aloha in user manual 1 of component 1.
Create a hub connected LAN with four nodes in your lab and using traffic capture software measure
throughout. Compare with simulated LAN of similar configuration and determine for what value of
p-Persistent throughput remains unchanged in user manual 1 of component 2.
Define TCP/IP in user manual 1 of component 8.
Define Router in user manual 1 of component 5.
Simulate and Ethernet LAN using 6 to 15 nodes, apply p-Persistent (1/6 to 1/15) and compare the
performance in terms of throughout, probability of success and average attempts. Plot the following
Average attempts Vs Normalized throughout
No of transmitting nodes Vs Probability of success
a. No of transmitting nodes Vs Normalized throughput
b. Refer page 257,263 and 281 of Computer Networks by Andrew S.
c. Tanenbaum (4th Edition) in user manual 2 of component 1.
Simulate an ALOHA and Ethernet network for 6 to 15 nodes and compare performance in user
manual 2 of component 1.
Simulate an Ethernet LAN using 6 to 15 nodes, change error rate (10 -6 to 10-9 ) and compare with
throughput, end time, delay and response time in user manual 2of component 1.
Setup/Stimulate and Ethernet network of 6 to 15 nodes, for 1-Persistent, vary number of
transmitting nodes and compare collision count, throughput, end time, delay and response time in
user manual 2of component 1.
Stimulate a wireless network of 15 node and compare performance with Ethernet and Token ring in
user manual 2 of component 1.
Stimulate a wireless network of 15 node and compare performance with Ethernet and Token ring in
user manual 2 of component 3.
Compare working and performance difference between simple BSS and multiple BSS with
transmitting node in wireless LAN by simulation or real time in user manual 2 of component 3.
Compare the performance of store and forward, cut through and fragment three switches in Ethernet
protocol in user manual 2 of component 4.
Simulate a WAN network using TCP/IP protocol. Keep the error rate moderate (from 10 -7 to 10-9).
Change the congestion algorithm then compare the network performance in user manual 2 of
component 8.
Simulate an WAN network using Router. Change the routing protocol, and then compare the
simulation time in user manual 2 of component 9.
Simulate an WAN network using Router. Change the scheduling technique, and then compare the
Queuing delay for different prioritized packet in user manual 2 of component 10.
lv
Microprocessors II (Pr)
COT-413
L
-
T
-
P
2
Write a program to read a 32-bit integer, store that number in EAX register and display it digit by digit.
Repeat exercise 2 for 64 bit number using two 32 bit registers.
Write a program to find factorial of a number, where result does not exceed 64 bit. Use procedure to
calculate factorial and pass parameters.
Write modular program to perform addition, subtraction, multiplication and division of two 32-bit
numbers.
Sort n 32-bit numbers using modular program.
Write a program that generates a large number of data cache misses and compare its results with a
program having large number of hits.
Repeat exercise 6 for code cache.
lvi
T
1
P
-
lvii
Fuzzy Logic
COT-443
(Departmental Elective II)
L
1. Introduction
Background, uncertainty and impression, Statistics and Random Processes, Uncertainty in Information,
Fuzzy sets and Membership, Chance versus Ambiguity, Classical Sets Operations, Properties, mapping to
classical sets to functions; Fuzzy Sets Operations and Properties; Sets as points in Hypercubes.
2. Relations and Functions
Cartesian Product, Crisp relations cardinality operations, properties, composition, Fuzzy Relations
Cardinality operations, properties, Fuzzy Cartesian Product and Composition, Noninteractive Fuzzy Sets,
Tolerance and Equivalence Relations, Crisp Equivalence Relation, Crisp Tolerance Relation, Fuzzy
Tolerance and Equivalence Relations, Value Assignments, Cosine amplitude, Max-Min method, other
similarity methods, Membership Functions Features, Standard forms and biyearlies, Fuzzyfication,
Membership value assignments, Intuitions, Inference, Rank Ordering, Angular Fuzzy sets, Neural Networks,
Genetic Algorithm, Inductive Reasoning. Lambda-Cuts for Fuzzy Sets, Lambda-cuts for fuzzy relations,
Defuzzification Methods.
3. Arithmetic and Logic
Extension Principle, Crisp functions, Mapping and Relations, Functions of Fuzzy Sets,
Fuzzy Transform Practical Considerations, Fuzzy Numbers, Interval Analysis in
Arithmetic, Approximate Methods of extension, Vertex Method, DSW Algorithm,
Restricted DSW Algorithms, Comparisons, Fuzzy Vectors, Classical predicate logic,
Tautologies, Contradictions, Equivalence, Exclusive Oral Exclusive Logical proofs,
Deductive Proofs, Deductive Inferences, Fuzzy Logic, Approximate Reasoning, Fuzzy
Tautologies, Contradictions, Equivalence and Logical Proofs, other forms of the
implication operation, other forms of the composition operation.
BOOKS
1. Timothy J Ross, Fuzzy Logic with Engineering Applications, MGH.
2. Klir and Yuan, Fuzzy Sets & Fuzzy Logic-Theory and Applications, PHI.
3. Klir & Folger, Fuzzy Sets, Uncertainty and Information, PHI.
lviii
Parallel Computing.
COT-445
(Departmental Elective II)
L
3
T
1
P
-
1. Introduction
Parallel processing terminology, Pipelining Vs Data parallelism, Control parallelism, Scalability, Control
parallel approach, Data parallel approach, Data parallel approach with I/O
2. PRAM Algorithm
Parallel reduction ,Prefix sums, List ranking, Preorder tree traversal, Merging two sorted lists, Graph
coloring, Reducing the number of processors, Problems defying fast solutions on PRAMS
3. Parallel Programming Languages
Programming parallel processes, Example and application, C* programmers model, Language features,
Sample program, OCCAM, programmers model, Language constructs, Sample program, C-LINDA,
Programmers model, Language constructs, Sample program
4. Mapping and Scheduling
Mapping data to processors on processor arrays and multicomputers, Dynamic Load Balancing on
multicomputers, Static scheduling on UMA multiprocessors, Deadlock.
5. Elementary Parallel Algorithms
Classifying MIMD algorithms, Reduction, Hypercube SIMD model, Shuffle-Exchange SIMD model, 2-D
Mesh SIMD model, UMA Multiprocessor model, Broadcast, Prefix sums
6. Matrix Multiplication
Sequential matrix multiplication, Algorithms for processor array, Algorithms for multiprocessors, Algorithms
for multicomputers
7. Sorting
Enumeration sort, lower bound on parallel sorting, Odd-even transposition sort. Bitonic merge, Quick sort
based algorithms, Random read and random write.
BOOKS
1. Michael Quinn: Parallel Computing-Theory and Practice, MGH.
2. Ed. Afonso Ferreira and Jose D. P. Rolin, Parallel Algorithms for irregular problems - State of the art,
Kluwer Academic Publishers.
3.Selim G. Akl, The Design and Analysis of Parallel Algorithms, PH International.
4.Brassard and Bratley, Fundamentals of Algorithms, PHI, New Delhi
lix
Image Processing
COT 447
(Departmental Elective II)
L
3
T
1
P
-
1. Introduction
Image Processing Fourier Transform and Z-Transform, Causality and stability, Toeplit and Circulate Matrics,
orthogonal and unitary Matrices and Kroenker product, Markov Processes KI Transform Mean square
Estimates and Orthogonal Principles.
Image sampling quantization,
Band Limited Image Sampling Versus Replication, Reconstruction of
Image from samples Sampling Theorem, Sampling Theorem for Random Fields, Sampling Optimal
Sampling, Nonrectangular Grid Sampling, Sampling Aperture, Display Aperture/ Interpolation Functions,
Lang range Interpolation, Moire Effect. Image Quantization Uniform Optimal Quantizer, Properties of Mean
Square Quantizer, Commander Design Visual Quantization
2. Image Transforms
Two Dimensional Orthogonal and Unitary Transforms and their properties. One Dimensional and Two
Dimensional DFT Cosine and Sine Transforms Iiadmard, Slant, IIARR and KI, Transforms and their
properties, Approximation to KI Transforms. Image representation by stochastic models, One Dimensional
Causal Models, AR and ARMA models, Non Causal Representation Spectral factorization, Image
Decomposition.
3. Image Enhancement and Restoration
Point Operation, Histogram Modeling, Spatial Operations, Transform Operations, Multispectral Image
Enhancement. Image Observation Models, Inverse and Wiener filtering; FIR Wiener Filters, Filtering using
Image Transform Causal Models and recursive filtering Maximum entropy restoration. Extrapolation of band
limited signal.
4. Image Analysis and Image Compression
Spatial feature extraction, Edge detection and boundary extraction Boundary, region and moment
representations structures, Texture, Image Segmentation, Reconstruction from Projections, Pixel Coding,
Productive Techniques, Transform Coding Theory, Coding of Image, Coding of two-tone image.
BOOKS
1. Anil Jain: Digital Image Processing
2. Gonzalez Woods: Image Processing
lx
VLSI Technology
COT-449
(Departmental Elective II)
L
3
T
1
1. Crystal Growth
MGS,EGS, Czochralspi crystal Puller, Silicon shaping, Wafer Preparation. Epitaxy: Vapour Phase
Epitaxy, Epitaxial Layer evaluation, Molecular Beam Epitaxy.
2. Oxidation
Thermal Oxidation Kinetics, Oxidation Techniques, Oxide Properties, Oxidation induced Defects.
Lithography: Photolithography, E-beam lithography, X-ray Lithography.
3. Reactive Plasma Etching
Plasma Properties, Feature Size control and anisotropic etching, Plasma etching techniques and
equipment. Di-electric and Poly-Silicon Film Deposition: Deposition Processes for Poly- Si, SiO2,
SiO3N4; Plasma assisted Depositions.
4. Diffusion
A Qualitative view of atomic diffusion in Solids, diffusion mechanisms, Ficks one dimensional
diffusion equation, constant source and limited source diffusion, Diffusion of Grp3 and 5 impurities in
Silicon Impurity Sources, diffusion apparatus, Characterization of diffused layers.
Ion Implantation: Introduction, Range Theory, Implantation Equipment Annealing.
5. Metallization
Metallization applications, Choices, Physical Vapour Deposition. Sputtering, Metallization Problems.
Assembly & Packaging : Package Types, design considerations, Package fabrication technologies,
Future trends.
6. Isolation Techniques
lxi
COT-479
L
3
T
1
1. Traditional Cryptography
Cryptoanalysis, substitution and transposition ciphers, Cryptographic principles, secret-key algorithms: DES,
DES chaining, Breaking DES, IDEA, Differential and Linear cryptoanalysis Public-key algorithms: RSA,
Knapsack
2. Authentication protocols
KDC protocol, shared secret key, Diffle-Hellman key exchange, Needham-Schroeder protocol, using
Kerberos, interlock protocol, digital signatures secret key and public key signatures, DSS, message digest,
MD5 and secure hash algorithms
3. Computer Security Mechanisms
Role of different security mechanisms, passwords technology and administration, principles of database
system security, epidemic of viruses: types of viruses, study of different virus codes, means of spread,
prevention from virus, life cycle of a virus, immunization, Trojan horse and bombs with examples, writing
antivirus/trojan codes.
4. Network Security
Basics, security functions, preventing loss and damage, securing local area network authorization, security
plan and policy, securing enterprise network setting priorities, security plans, securing network
components, hardware security, levels of access control and authorization.
BOOKS
1.
2.
3.
lxii
T
1
P
-
Introduction
Introduction to S/W crisis & S/W processes; S/W life cycle models Build & Fix,
waterfall prototype evolutionary, spiral model.
2.
S/W Design
5.
S/W Metrics
Introduction, size metrics, data structure metrics, information flow metrics, entropy based measures,
metric analysis.
S/W Reliability
Importance, S/W reliability & H/W reliability, failures & faults, reliability concepts,
reliability models macro, basic, logarithmic Poisson, calendar time component, micro
models; estimating number of residual errors; reliability allocation.
6.
S/W Testing
S/W Maintenance
lxiii
T
1
P
-
1. Basic Concepts
What is database system, why database, Data independence, 3 levels of architecture; external
level, conceptual level, internal level, mapping DBA, DBMS, organization of databases,
components of DBMS, Data Models, Relational Models, Networks data model, Hierarchical
Model, semantic data model.
2. Relational Model
Introduction Relational Model, base tables & views, relations, domains, candidate keys,
primary key, alternate keys, foreign key, Integrity rules, relational Operators relational
algebra, relational calculus, tuple calculus, domain calculus, Data Base Design Introduction,
Basic Definitions, Non-loss decomposition and functional dependencies, 1NF, 2NF, 3NF,
BCNF, MVD & 4NF, JD & 5NF, Normalization procedure, other normal forms.
3. Concurrency
Transaction concept, transaction state, concurrent executions, serializability lock based
protocols, timestamp based protocols, validation based protocols, deadlock handling.
4. Distributed Data Bases
Introduction, fundamental principles, objectives, Problems of distributed processing-query
processing, catalog management, updates propagation, recovery control, concurrency control.
BOOKS
1. C.J. Date: An Introduction to Database Systems 7th Ed. Addison Wesley, Indian Edition.
2. A.K. Majumdar and Bhattacharyya: Database Management Systems, THM, 1996.
3. A Silberschatz, H.F. Korth & S. Sudarshan: Data Base System Concepts, MHG, 1977.
lxiv
T
1
1.
Memory
P
-
Memory, memory chips & modules, memory types, advanced memory technologies,
troubleshooting memory.
2.
Motherboard
PC family tree, motherboard controllers and system resources, input-output ports, IRQ,
I/O bus system: ISA, MCA, EISA, VESA local bus, PCI, AGP, PCIX; on board I/O
devices, ROMBIOS, ROM POST, CMOS setup.
3.
Power Supply
Power supply function and operation, power supply quality and specification, power
protection and backup, backup power system; UPS; troubleshooting power supply.
4.
Floppy disk interface, IDE interface: ATA standards, master-slave configuration, data
transfer mode; SCSI interface: SCSI bus, SCSI standards; which is better SCSI or IDE;
serial ports, parallel ports, USB, Video adapters, troubleshooting Video adapters.
5.
Floppy disk drive, hard disk drive, CD ROM drive, DVD ROM drive, record able
drives, keyboards, mice, printers and monitor, trouble-shooting drives and peripherals.
BOOKS
1. Craig Zacker & John Rourtre: PC Hardware- The complete reference, TMH.
2. Mark Minosi: The complete PC Upgrade & Maintenance Guide 4/e, BPB publications.
3. Dr. S.K. Chauhan: PC Upgrading, maintenance and troubleshooting guide
lxv
Artificial Intelligence
COT-477
(Open Elective I For all branches)
L
3
T
1
P
-
1. Introduction
Definition of AI, Evolution of Computing, History of AI, Classical, Romantic and Modern period, subject
area, Architecture of AI machines, logic family, Classification of logic.
2. Production System
Production rules, The working memory, Recognize-act cycle, conflict resolution strategies, refractoriness,
Recency, specificity, alternative approach for conflict resolution by meta rules, Architecture of production
system.
3. Propositional Logic
Proposition, tautologies, Theorem proving, Semantic method of theorem proving, forward chaining,
backward chaining, standard theorems, method of substitution, theorem proving using Wangs algorithm.
4. Predicate Logic
Alphabet of First order logic (FOL), predicate, well formed formula, clause form, algorithm for writing
sentence into clause form, Unification of predicates, unification algorithm, resolution Robinsons inference
rule, Scene interpretation using predicate logic.
5. Logic Programming with Prolog
Logic program, Horn clause, program for scene interpretation, unification of goals, SLD resolution, SLD
tree, flow of satisfaction, controlling back tracking using CUT, common use of CUT, implementation of
backtracking using stack, risk of using cuts, fail predicate, application of cut-fail combination, replacing cutfail by not.
6. Default and Non monotonic Logic
Axiomatic theory, Monotonicity Vs Non-Monotonicity, non-atomic reasoning using McDermotts NML-I,
problems with NML-I, reasoning with NML-II, Case study of Truth Maintenance System (TMS), Neural
network fundamentals.
7. Imprecision and Uncertainty
Definition, Probabilistic techniques, Certainty factor based reasoning, conditional probability, medical
diagnosis problem, Bayes Theorem and its limitations, Bayesian belief network, propagation of belief,
Dempster-Shafer theory of uncertainty management, belief interval, Fuzzy relation, inverse Fuzzy relations,
Fuzzy post inverse, Fuzzy Inversion.
8. Intelligent Search Technique
Heuristic function, AND-OR graph, OR graph, Heuristic search, A* algorithm and examples.
BOOKS
1. A. Konar: Artificial Intelligence and Soft Computing--Behavioral and Cognitive Modeling of Human
Brain, CRC Press, USA.
2. E.Charniak and D. McDermott: Introduction to Artificial Intelligence, Addison Wesley Longman.
3. Elline and Rich: Artificial Intelligence, 2/e 1992.
4. Rich and Knight: Artificial Intelligence, 2/e 1992.
lxvi
Web Engineering
COT 402
L
3
T
1
P
-
1. Information Architecture
The Role of the Information Architect, Collaboration and Communication, Organizing Information,
Organizational Challenges, Organizing Web Sites and Intranets, Designing Navigation Systems, Types of
Navigation Systems, Integrated Navigation Elements, Remote Navigation Elements, Designing Elegant
Navigation Systems, Grouping Content, Conceptual Design.
2. Dynamic HTML and Web Designing
HTML Basic Concepts, Good Web Design, Process of Web Publishing, Phases of Web Site development,
Structure of HTML documents, HTML Elements Core attributes, Language attributes, Core Events, Block
Level Events, Text Level Events, Linking Basics, Linking in HTML, Images and Anchors, Anchor
Attributes, Image Maps, Image Preliminaries, Images as Buttons, Introduction to Layout: Backgrounds,
Colors and Text, Fonts, Layout with Tables. Advanced Layout: Frames and Layers, HTML and other media
types. Audio Support in Browsers, Video Support, Other binary Formats. Style Sheets, Positioning with
Style sheets. Basic Interactivity and HTML: FORMS, Form Control, New and emerging Form Elements.
3. CGI using PERL
Introduction to CGI, Alternative Technologies, The Hypertext Transport Protocol, URLs, HTTP, Browser
Requests, Server Responses, Proxies, Content Negotiation, The Common Gateway Interface, The CGI
Environment, Environment Variables, CGI Output, Forms and CGI, Sending Data to the Server,
4. Java Server Pages
Basics, Integrating Scripts in JSPs, JSP Objects and Components, configuring and troubleshooting, JSP:
Request and response objects, Retrieving the contents of a an HTML form, Retrieving a Query String,
Working with Beans, Cookies, Creating and Reading Cookies.
5. XML
Relationship between HTML, SGML and XML, Basic XML, Valid Documents, Ways to use XML, XML for
Data Files, Embedding XML into HTML documents, Converting XML to HTML for DISPLAY, Displaying
XML using CSS and XSL, Rewriting HTML as XML, The future of XML.
BOOKS
1. Thomas A Powell, HTML The Complete Reference, Tata McGraw Hill Publications.
2. Scott Guelich, Shishir Gundavaram, Gunther Birzniek; CGI Programming with Perl 2/e, OReilly
3. Pardi, XML in Action, Web Technology, PHI.
4. Yong, XML Step by Step, PHI.
lxvii
Compiler Design
COT-404
L T
4 1
P
-
Aho A.V. and Ullman J.D. Principles of Compiler Design, Addison Wesley.
Donovan, J, System Programming, TMH.
D.M. Dhamdhere: Compiler Construction-Principles and Practice McMillan India.
David Gries: Compiler Construction for Digital Computer.
lxviii
T
-
P
3
1.
Chalk out the storyboard and design of Dairy Food Limited. As the name reflects your site provides
dairy products and aims at opening an online store. Your storyboard should cover all the features that
you plan to have on the site.
2. Create your own page with your favourite hobbies.
3. Create a Menu or a Table of content web page. Each menu item or section of the table of content should
load a different web page. For example, if the user clicks on Menu one or section 1 then the link should
take him to respective menu html. Or section and so on.
4. Create a web site for your College,
5. Create a frameset that is divided into three sections. The frameset should have three zones.
the topmost section of the frameset should take up about just 15% of the browser window. Name this
frame title.
The middle section should be 70% of the browser window. Name this frame title.
The lower most sections should also be about 15% of the browser window. Name this section as menu.
Create pages for each section. For the lowermost section, create page that loads the content into the
middle section. The topmost section should contain a page describing the web page itself.
6. Create a web page, which displays the map of your Country Link, each city/state on the image using
image map, such that the respective HTML page of the city/state is displayed when the user selects an
area.
7. Add the tickertape applet to your page by customizing it for the following settings:
Increase the count by one.
Accordingly update the message count.
Change the text color to (237,192,171)
Experiment with changing the scrolling speed.
Customize the message text as per your page requirement.
8. Incorporate a quest book into the Dairy Food Webpage and use Java Script to build validations into the
form.
9. Use Stylesheet to modify the following:
Change background to modify the following.
Change font, type, face and color.
Align Text.
Remove underlines from hyperlinks.
10. Use Microsofts Personal Web Server to set up your website.
lxix
T
1
P
-
lxx
T
1
P
-
BOOKS
1. N.E. Fenton, S.L. Pfleeger: Software Metrics 2/e, Thomson Asia, 2002.
2. Henderson Sellers: Object Oriented Metrics Measures of Complexity, PH PTR, New Jersy, 1996.
3. K.K.Aggarwal, Yogesh Singh: Software Engineering, New Age International Ltd, 2001.
lxxi
T
1
P
-
1. Introduction:
Language understanding- Phonetic and Phonological aspects of language, Morphological knowledge,
Syntax- Semantics and Pragmatics, Articulatory Phonetics, Vocal Organs, Vowel, Syllable, Consonant,
Phonetic Transcription, Phonological rules and Transducers.
2. Grammar and Parsing :
Grammar and Sentence structure , Parsing with Context Free Grammar, Top down and bottom up parser,
Transition Network Grammars, Morphological Processing , Earley algorithm, Semantic Networks for
Knowledge Representation, Types of Semantic Networks.
BOOKS
lxxii
Bioinformatics
COT-446
(Departmental Elective III)
1. Introduction to Bioinformatics:
Introduction, outline of proteins, primary structure: the 20 amino acids - chemical structure & properties:
chirality, different types of side chain: relevance to mutation, size, aliphatic/aromatic, polarity, charge,
hydrophobicity; disulphide bonds, molecular models, Polypeptide geometry: the folding chain, nomenclature,
molecular graphics
Structure evolution and mutation genetic information- the triplet code; DNA structure Synthesis of proteins:
cell biology background; transcription: RNA polymerase, introns, exons, splicing translation: ribosomes,
start/stop codons, Post-translational processing
2. Computing Evolution:
Phylogenetic Analysis Sequence-based taxonomy: Overview and Assumptions, From Multiple Alignment to
Phylogeny Neighbor, Joining Maximum Likelyhood vs. Parsimony, The Molecular Clock, Computer Tools
for patterns, mapping and phylogenetic analysis.
Mathematical tools of proteins and nucleic acids, sequence-Function Relationships Sequence Homology and
Conserved Regions, Conserved DNA sequences.
3. Bioinformatics tools:
Networks - WWW, CERN EMBnet; EMBL Database, SEQNET, GenBank, NLM, etc., Sequence Databases
and Sequence Analysis: genomic, cDNA EMBL database GenBank protein sequence, pattern recognition
tools
Similarity searching, secondary sources, Genome databases, Molecular graphics software and other
packages, To find sequences based on keywords & phrases, to grab individual sequences or whole groups of
sequences from a database
4. Genomics:
Introduction, genome scale sequencing, comparative and evolutionary genomics, microarrays, proteomics,
pharmacogenomics, Development using computer tools for eequencing projects, PCR and restriction
mapping, practical and theoretical problems in sequencing, The challenges of whole genome sequencing,
Web-based tools for restriction mapping, new technologies and new bioinformatics tools.
BOOKS
1.
2.
3.
4.
lxxiii
L
3
1.
T
1
Architecture for parallel databases, Parallel query evaluation, parallel zing individual
operations, parallel query optimization; Introduction to distributed databases,
distributed DBMS architectures, storing data in a distributed DBMS, distributed
catalog management, distributed query processing, updating distributed data,
introduction to distributed transactions, distributed concurrency control, recovery.
2.
3.
4.
Data Mining
Introduction, counting co-occurrences, mining for rules, tree structured rules, clustering, similarity
search over sequences.
Object Database Systems
User defined ADT, structured types, objects & reference types, inheritance, design for an ORDBMS,
challenges in implementing an ORDBMS, OODBMS, comparison of RDBMS with OODBMS &
ORDBMS.
Advanced Topics
Advanced transaction processing, integrated access to multiple data source, mobile databases main
memory databases, multimedia databases, GIS, temporal & sequence databases.
BOOKS
1. R. Ramakrishnan & J. Gehrke Database Management Systems MGH, International Ed., 2008.
2. Korth, Silberschatz, Sudershan: Data Base concepts, MGH, 2008.
3. C. J. Date, Database Systems, 5th Ed., Addison Wesley, Pearson Education, 2009.
lxxiv
Software Testing
COT 450
L
1.
Functional Testing: Boundary Value Testing: Analysis. robust testing. worst case testing. special &
random testing. examples: Equivalence Class Testing equivalence classes. examples: Decision Table
Based Testing: decision tables with examples.
2.
Structural Testing: Path testing: DO-Paths. Metrics. basic testing: Data Flow Testing: DU testing.
slice based testing: Mutation testing.
3.
Integration & System Testing: Levels of testing; integration testing: decomposition based. call graph
based & path based integration: System testing: threads based structural & functional testing.
4.
Object Oriented Testing: Some issues in Object Oriented Testing. Units for object-oriented testing.
implications of composition and encapsulation. implication of inheritance. implication of
polymorphism. levels of object-oriented testing. data flow testing for object-oriented software.
Books:
1.
Soris Seizer. .Software Testing Techniques.. Second Edition. Wiley India. 2005.
2.
William Perry. -Effective Methods for Software Testing. 3rd Edition. Wiley India. 2006
3.
Paul C.Jorgensen. -Software Testing A Craftsman. Approach.. 2nd Ed.. CRC Press. 2002
4.
Cern Kaner. Jack Falk. Nguyen Quoc.. -Testing Computer Software.. 2nd Edition. Van Nostrand
Reinhold. New York. 1993
5.
lxxv
L
3
T
1
1. Introductory Concepts
Operating system functions and characteristics, historical evolution of operating systems, Real time systems,
Distributed systems, Methodologies for implementation of O/S service system calls, system programs,
Interrupt mechanisms.
2. File Systems
Functions of the system, File access and allocation methods, Director Systems: Structured Organization,
directory and file protection mechanisms, implementation issues; hierarchy of file and device management.
3. CPU Scheduling
Levels of Scheduling, Comparative study of scheduling algorithms, multiple processor scheduling.
4. Storage Management
Storage allocation methods: Single contiguous allocation, Multiple contiguous allocation, Paging,
Segmentation combination of Paging and Segmentation, Virtual memory concepts, Demand Paging, Page
replacement Algorithms, Thrashing,
5. Device Management
Hardware Organization, Device scheduling policies
6. Deadlocks
Deadlock characterization, Deadlock prevention and avoidance, Deadlock detection and recovery, practical
considerations.
7. Concurrent Processes
Critical section problem, Semaphores, Classical process coordination problems and their solutions,
Interprocess Communications.
8.
Protection
BOOKS
1. Peterson, J.L. & Silberschatz, A.: Operating System Concepts, Addison, Wesley, Reading.
2. Brinch, Hansen: Operating System Principles, Prentice Hall of India.
3. Haberman, A.N.: Introduction to Operating System Design Galgotia Publication, New Delhi.
4. Tanenbaum, A.S.: Operating System.
lxxvi
T
1
P
-
1. Introduction
Network Functions, Network Topology, Network Services, Switching Approaches, Transmission media and
systems, multiplexing and signaling techniques, Error detection and correction, ISDN and BISDN
2. Layered Architectures
Examples, OSI Reference Model, Overview of TCP/IP architecture, Socket system calls, SNMP, Electronic
Mail.
3. Peer-to-Peer Protocols
Protocols, Service Models and End-to-End requirements, ARQ, Sliding Window, RTP, HDLC, PPP
protocols, Statistical Multiplexing.
4. MAC and LAN Protocols
Multiple access communication, Random Access-ALOHA, Slotted-ALOHA, CSMA, CSMA-CD,
Channelization FDMA, TDMA, CDMA, Channelization in Cellular networks LAN Standards - 802.3,
802.4, 802.5, 802.6, FDDI, 802.11, LAN Bridges.
5. Packet Switching Networks
Packet network topology, Datagrams and Virtual Circuits Structure of Switch / Router, Connectionless and
Virtual Circuit packet Switching, X.25, Routing Algorithms, Traffic management and QoS FIFO, Priority
Queues, Fair Queuing, Congestion Control techniques.
6. TCP/IP
Architecture, Internet protocols IP packet, Addressing, Subnet addressing, IP routing, CIDR, ARP, RARP,
ICMP, Reassembly, UDP, Transmission Control Protocol TCP, Reliable stream service, operation,
protocol.
BOOKS
1.
2.
3.
4.
Leon Garcia and Indra Widjaja: Communication Networks Fundamental Concepts and Key
Architectures, TMH, 2000.
A.S. Tanenbaum: Computer Networks, 3/e, PHI, 1997.
Forouzan, Coombs and Fegan: Introduction to data Communications and Networks, TMH, 1999.
William Stallings: Data and Computer Communications 5/e, PHI.
lxxvii
BOOKS
1.
2.
3.
4.
lxxviii
Expert Systems
COT-478
(Open Elective II For all branches)
L
3
1.
T
1
Introduction to Expert System
lxxix