B.tech IT Syllabus AR16 Revised
B.tech IT Syllabus AR16 Revised
B.tech IT Syllabus AR16 Revised
2016
B. Tech.
Information Technology
(4 Year Program)
2016
Undergraduate Programmes
Contents
ii
GMR Institute of Technology (GMRIT) | Regulation 2016
To turnout disciplined and competent engineers with sound work and life ethics
To implement outcome based education in an IT-enabled environment
To encourage all-round rigor and instill a spirit of enquiry and critical thinking among
students, faculty and staff
To develop teaching, research and consulting environment in collaboration with
industry and other institutions
iii
GMR Institute of Technology (GMRIT) | Regulation 2016
Students with diploma qualification have an option of direct admission into 2 nd year
B. Tech. (Lateral entry scheme). Under this scheme 20% seats of sanctioned intake
will be available in each course as supernumerary seats. Admissions to this three
year B Tech later entry Programme will be through ECET. The maximum period to
complete B. Tech. under lateral entry scheme is six consecutive academic years from
the date of joining.
The course duration for the award of the Degree in Bachelor of Technology will be four
academic years, with two semesters in each year. However if a student is unable to complete the
course within 4 years, he/ she can do so by giving more attempts but within 8 consecutive
academic years from the date of admission.
Academic Calendar
For all the eight semesters a common academic calendar shall be followed in each semester by
having sixteen weeks of instruction, one week for the conduct of practical exams and with three
weeks for theory examinations and evaluation. Dates for registration, sessional and end
semester examinations shall be notified in the academic calendar of every semester. The
schedule for the conduct of all the curricular and co-curricular activities shall be notified in the
planner.
3. Branches of Study
B. Tech. Programmes
I. Chemical Engineering(CH)
II. Civil Engineering (CE)
*
Approved in the Academic Council Meeting held on March 24, 2018 (Satruday)
iv
GMR Institute of Technology (GMRIT) | Regulation 2016
4. ProgrammeStructure
The curriculum will consist of courses of study (Theory, Practical, Contemporary Courses,
Mini Project, Term Papers, Project, Audit Courses, Self-study Courses,MOOCs, Summer
Internship and Full Semester Internship and Courses related Employability Skills) and
syllabi as prescribed by the respective Boards of Studies from time to time. The curriculum is
bifurcated into FSI and Non-FSI modes from 7th semester onwards.
Every student will be required to opt for six elective courses spanned across the semester from
4th to 8th semester from the list of electives as prescribed in the curriculum. Under Choice Based
Credit System (CBCS), the students may take one elective from the list of open electives offered
by other branches of engineering technology in consultation with their respective department.
v
GMR Institute of Technology (GMRIT) | Regulation 2016
e. Project work: The final project work shall be carried out during the 8th semester in
the non- FSI Model. Projects will be taken up batch wise. Internal evaluation will be
done by the Project Review Committee (PRC), comprising of HOD and two senior
faculty members along with the project supervisor. Semester end evaluation will be
done by Project Evaluation Committee (PEC) comprising of three members
including HOD, project guide and an external examiner nominated by the CoE
f. Audit Courses: Audit courses are among the compulsory courses and do not carry
any credits. All the students shall register for one Audit courses in the beginning of
3rdsemester. List of the courses will be notified at the beginning of the third
semester for all students and the student has to choose one audit course under self-
study mode at the beginning of third semester. All the students (regular and lateral
entry students) shall complete the audit course similar to other regular courses and
the results will be indicated with “Satisfactory” or “Not Satisfactory” performance.
g. Self-Study Courses: Self-study courses are the courses which are more similar to
theory courses where in the students learn the courses on independent mode. The
evaluation and assessment pattern for such courses shall be carried out as similar to
regular theory course. These courses shall be opted after getting proper approval
from the respective head of the department as well from the other head of the
department which is offering the course. The credits earned through these self-
study courses over and above the mandatory courses, and it will not be accounted in
CGPA calculation.
h. MOOCs: Meeting with the global requirements, to inculcate the habit of self-learning
and in compliance with UGC guidelines, MOOC (Massive Open Online Course) have
been introduced as electives
The proposed MOOCswould be additional choices in all the elective
groups subject to the availability during the respective semesters and
respective departments will declare the list of the courses at the
beginning of the semester, which are having a minimum of 45 hours in a
given semester
Course content for the selected MOOCs shall be drawn from respective
MOOCs links or shall be supplied by the department. Course will be
mentored by faculty members and Assessment & evaluation of the
courses shall be done by the department
Three credits will be awarded upon successful completion of each
MOOCs
i. Summer Internship: As a part of curriculum in all branches of Engineering, it is
mandatory for all students to undergo summer internship Programme at industries
(core or allied) / R & D organization to get practical insight of their subject domain
during summer break after the 4th semester. This summer internship Programme
shall be availed to a maximum duration of 4 weeks and the assessment shall be
vi
GMR Institute of Technology (GMRIT) | Regulation 2016
carried out with both internal and external experts leading to “Satisfactory” and
“Non-Satisfactory Performance” and it will not be accounted for the calculation of
CGPA
j. Employability Skills: It is mandatory for all students to take a course on
Employability Skills from 3rd Semesterto 6th Semester. The Employability Skills are
covered under two broad streams viz. Aptitude skills and Soft Skills. The credits
earned through these courses will be indicated in the grade sheet and will not be
taken into account for CGPA calculation.
k. Industry Driven One Credit Courses (IDC): Meeting with the industry
requirements, to reduce the gap between industry and academia this one credit (15
hrs.) course has been introduced over and above regular courses from 3rd Semester
to 6th Semester for the interested students. Thecredits earned through these courses
will be indicated in the grade sheet and will not be taken into account for CGPA
calculation.
l. Full Semester Internship: Students can opt for full semester Internship
Programme at industries based on their self-interest either during 7th or 8th
semester to get practical insight relevant to their core branch of engineering or in
allied branch of study under the guidance of internal and external expert members
in the institute and at Industries respectively. All Students who wish to choose FSI
pattern shall exercise this option well before the commencement of 7th semester.
Students who wish to take FSI during 8th semester will have to take one additional
course in 7th semester when compared with Non FSI stream. In case of some
extraordinary cases, students may be permitted to choose the FSI pattern even
before the commencement of 8th semester. In all such cases student shall take one
additional course offered during 8th semester under self-study mode and acquire
the required credits.
i. Minimum CGPA cut-off up to 5th semester as prescribed by CDC
ii. Competency mapping
iii. Students who opt for FSI either in 7th or 8th will be provided with Internship
subject the availability/selection by the industries
Further the credits earned through FSI Programme will be indicated in the grade sheet
and will be accounted for the calculation of CGPA.
FSI final evaluation will be done by the FSI Review Committee (FSIRC), comprising of
HOD,one senior faculty member and External (Industry) expert nominated by HOD.
vii
GMR Institute of Technology (GMRIT) | Regulation 2016
No Course Credits
1 Theory Course 3
2 Integrated Course 4
3 Laboratory/Drawing Course 2
4 MOOCs 3
5 Elective courses 3
6 Audit Course 0
7 Term Paper 2
8 Mini Project 2
9 Summer Internship 0
10 Project work 10
11 Full Semester internship 16
Co-curricular and Extra-Curricular
12 2
Activities(CCEC)
13 Employability Skills (ES) 2
14 Industry Driven One Credit Courses (IDC) 1
Total
Sem. No. of Theory Courses No. of Lab Courses
Credits
I 21
5 3
II 21
III 3 + Employability Skills+ CCEC 25
6(5 Theory + 1 Integrated) 3+ CCEC Activities+
IV 25+1 + 1
Employability Skills
Summer Internship (Audit course) 0
6 (4 Compulsory Theory + 1 1+ Term paper/Mini Project +
V 23
Integrated + 1 Elective) Employability Skills+ CCEC
6 + Audit course 1 + Term paper/Mini project +
VI (3 Compulsory Theory + 1 CCEC Activities + Employability 23+1+1
Integrated + 2 Elective) Skills
VII Full semester internship 16
viii
GMR Institute of Technology (GMRIT) | Regulation 2016
Total
Sem. No. of Theory Courses No. of Lab Courses
Credits
III 3 + Employability Skills+ CCEC 25
6 (5 Theory + 1 Integrated) 3+ CCEC Activities+ Employability
IV 25 + 1+1
Skills
Summer Internship (Audit course) 00
6 (4 Compulsory Theory + 1 1+ Term paper/Mini Project +
V 23
Integrated + 1 Elective) Employability Skills+ CCEC
6+ Audit course 1 + Term paper/Mini project
VI (3 Compulsory Theory + 1 CCEC Activities + Employability 23 + 1+1
Integrated + 2 Elective) Skills
VII Full semester internship 16
ix
GMR Institute of Technology (GMRIT) | Regulation 2016
D. Course Pattern for Three year Lateral Entry Programme (Non FSI)
Total
Sem. No. of Theory Courses No. of Lab Courses
Credits
III 3 + Employability Skills+ CCEC 25
6 (5 Theory + 1 Integrated)
3+ CCEC Activities+ Employability
IV 24 + 1+1
Skills
Summer Internship (Audit course) 00
6 (4 Compulsory Theory + 1 1+ Term paper/Mini Project +
V 23
Integrated + 1 Elective) Employability Skills+ CCEC
6 + Audit course 1 + Term paper/Mini project +
VI (3 Compulsory Theory + 1 CCEC Activities + Employability 24 + 1+1
Integrated + 2 Elective) Skills
VII 3 (1 Compulsory + 2 Elective) 2 13
x
GMR Institute of Technology (GMRIT) | Regulation 2016
xi
GMR Institute of Technology (GMRIT) | Regulation 2016
5. Evaluation Methodology
a. The assessment will be based on the performance in the semester-end examinations and /
or continuous assessment, carrying marks as specified in Clause 10
b. At the end of each semester, final examinations will normally be conducted during
October/November and during April / May of each year. Supplementary examinations may
also be conducted at such times as may be decided by the Institute
c. Continuous Assessment Marks will be awarded on the basis of Continuous Evaluation made
during the semester as per the scheme given in Clause 10
d. The letter grade and the grade points are awarded based on the hybrid grading system
having earned grades and awarded grades. Grading is done based on the percentage of
marks secured by a candidate in individual course as detailed below:
e. After completion of the Programme, the Cumulative Grade Point Average (CGPA) from the I
Semester to VIII Semester (from III to VIII semester for lateral entry) is calculated using the
formula:
Where n is the number of courses registered for, ‘ci’ is the credits allotted to the given
course and ‘gi’ is the grade point secured in the corresponding course.
Out of 40 marks allotted for continuous assessment 30 marks will be awarded based
on two tests(Each Test will be conducted for 40 marks and scale down to 30
marks)conducted and10 marks shall be awarded based on assignment test given
below:
Internal Test 1 & Test 2 : 30 Marks (80 % of marks secured in 1 st best internal tests
and 20% markssecured in 2nd best internal test)
The duration of each internal test will be 90 minutes addressing predominantly
on lower order thinking skills and shall cover two units of syllabus in each test
All the students will be notified with the marks secured within one week after the
completion of the sessional exams
xii
GMR Institute of Technology (GMRIT) | Regulation 2016
Students are permitted for reconciliation with in a period of two working days
after the notification of marks
The evaluation methodology of Design and Drawing Courses coming under
theory will be given in their respective course handouts which will be approved
by department HOD.
Assignment Test : 10 Marks (Test will be conducted for 30 marks and scale
scale down to 10 marks)
The duration of each test will be 120 minutes predominantly focusing on Higher
Order Thinking Skills covering all the possible range of all such HOTs. In case, if
the course has little scope of HOTs, assessment shall be carried out with LOTs
b. Integrated Course
40 marks allotted for continuous assessment as given below:
Theory Course
20 marks will be awarded based on two tests conducted similar to theory( Each Test
will be conducted for 40 marks and scale down to 20 marks) as given below:
Internal Test 1 & Test 2 : 20 Marks (80 % of marks secured in 1 st best internal tests
and 20% marks secured in 2nd best internal test)
Laboratory
20 marks are awarded for continuous assessment and following is the pattern for the
award of 20 marks
Preparation, Observation &Result :10 Marks
Record : 05 Marks
Internal Test : 05 Marks
External Exam (Lab) : 30 Marks
External Exam (Theory) : 60 Marks
c. Laboratory Course:
25 marks are awarded for continuous assessment and following is the pattern for
the award of 25 marks
Without Mini Project:
Preparation, Observation & Result : 10 Marks
Record : 05 Marks
Internal Test : 05 Marks
Viva – Voce : 05 Marks
With Mini Project (through Augmented Experiments):
Preparation, Observation & Result : 05 Marks
Record : 05 Marks
Internal Test : 05 Marks
Viva – Voce : 05 Marks
Augmented Experiment : 05 Marks
xiii
GMR Institute of Technology (GMRIT) | Regulation 2016
Engineering drawing courseisevaluated in line with lab courses and the pattern
of awarding 25 marks for continuous evaluation is as following
Day-to-day work : 15 marks
Internal test : 10 marks
There shall be two internal tests for 10 marks each during the semester and the
average shall be considered.
d. Term Paper
Continuous Assessment : 50 Marks
Distribution
Literature Survey : 10 Marks
Review 1 : 15 Marks
Review 2 : 15 Marks
Final Presentation : 10 Marks
e. Audit Courses
Online Objective Test : 50 Marks
f. Mini Project
Continuous Assessment : 25 Marks
Distribution
Review 1 : 05 Marks
Review 2 : 05 Marks
Literature Survey : 05 Marks
Final Presentation : 05 Marks
g. Project
Continuous Assessment : 100 Marks
Distribution
Innovativeness of the Project : 05 Marks
Literature Survey : 10 Marks
Experimentation / Simulation : 20 Marks
Result Analysis : 05 Marks
Review 1 : 20 Marks
Review II : 20 Marks
Final Presentation : 10 Marks
Project Report : 10 Marks
xiv
GMR Institute of Technology (GMRIT) | Regulation 2016
Students shall acquire 1 credit each in 2nd and 3rd years with the following
scheme:
Scheme of evaluation for the CCEC activities:
No. of slots in each Semester @ 2 slots every week : 24
No. of Stream (2-CC + 1-EC) :3
No. of slots allotted for each stream :8
Requirement for the award of 1- Credit
Students shall choose at least two streams of events in each semester
Students shall secure 75% attendance in each stream of events to obtain
a certificate
Students shall obtain 2 certificates of Participation in each semester.
The credits earned through these courses will be indicated in the grade sheet and
will not be taken into account for CGPA calculation.
Students have to take up these courses from 3rd – 6th semesters. In both streams i.e
Aptitude Skills & Soft Skills (AS and SS) Students will be assessed in each semester.
Based on the marks secured in continuous assessment, students will be assessed for
AS. Based on the attendance for the various activities scheduled, students will be
assessed for SS. 16 periods are allotted for each stream per semester.
For continuous assessment one examination will be conducted after every 5 weeks for
a maximum of 10 marks each(3x10=30). At the end of the semester a comprehensive
test will conducted for 20 marks. The student shall secure at least 40% marks in each
semester to get qualified.
xv
GMR Institute of Technology (GMRIT) | Regulation 2016
Student will secure 1 credit at the end of 4th semester and at the end of 6th semester
subject to the condition that he/she secures 40% marks in AS and 75 attendance in SS
in each semester.
6. Attendance Requirements
7. Promotion Policies
xvi
GMR Institute of Technology (GMRIT) | Regulation 2016
In four year B. Tech.Programme, a student shall be promoted from 2nd year to 3rd
year only if s/he fulfills the academic requirements and earning of minimum 50% of
credits up to 2nd year
In four year B. Tech.Programme, a student shall be promoted from 3rd year to 4th
year only if s/he fulfills the academic requirements and earning of minimum 50%
credits up to 3rd year
In three year lateral entry B. Tech.Programme, a student shall be promoted from 3rd
year to 4th year only if s/he fulfills the academic requirements and earning of
minimum 50% credits up to 3rd year
8. Graduation Requirements
a) The following academic requirements shall be met for the award of the B. Tech. Degree
Student shall secure 174 credits for regular B. Tech.Programme and 132 credits for
the students who entered in second year through lateral entry scheme. However, the
CGPA obtained for the best 167credits(Excluding any one 3 credit course, CCEC and
ES) and 125credits(Excluding any one 3 credit course, CCEC and ES)respectively shall
be considered for the award of Grade/Class/Division
A student of a regular Programme who fails to earn 174 credits within eight
consecutive academic years from the year of his/her admission with a minimum CGPA
of 4.0 shall forfeit his/her degree and his/her admission stands cancelled
A student of a lateral entry Programme who fails to earn 132credits within six
consecutive academic years from the year of his/her admission with a minimum CGPA
of 4.0 shall forfeit his/her degree and his/her admission stands cancelled
b) Award of degree
First Class with Distinction: A candidate who qualifies for the award of the Degree
(vide clause 8 (a) having passed all the courses of study of all the eight semesters
(six semesters for lateral entry candidates) at the first opportunity, within eight
consecutive semesters (six consecutive semesters for lateral entry candidates) after
the commencement of his /her study and securing a CGPA of 7.5 and above shall be
declared to have passed in First Class with Distinction. For this purpose the
withdrawal from examination (vide clause 9) will not be construed as an
opportunity for appearance in the examination
First Class: A candidate who qualifies for the award of the Degree (vide clause 8 (a)
having passed all the courses of study of all the eight semesters (six semesters for
lateral entry candidates) within maximum period of ten consecutive semesters
xvii
GMR Institute of Technology (GMRIT) | Regulation 2016
(eight consecutive semesters for lateral entry candidates) after the commencement
of his /her study and securing a CGPA of 6.5 and above shall be declared to have
passed in First Class
Second Class : A candidate who qualifies for the award of the Degree (vide clause 8
(a) having passed all the courses of study of all the eight semesters (six semesters
for lateral entry candidates) within maximum period of ten consecutive semesters
(eight consecutive semesters for lateral entry candidates) after the commencement
of his /her study and securing a CGPA of 5.0 and above shall be declared to have
passed in Second Class
Degree with Pass Mark : All other candidates who qualify for the award of the
degree shall be declared to have passed in Degree with Pass Mark
c) Grafting
In order to extend the benefit to the students with one/ two backlogs after either 6 th
semester or 8th semester, GRAFTING option is provided to the students enabling their
placements and fulfilling graduation requirements. Following are the guidelines for the
Grafting:
Grafting will be done among the courses within the semester. Shall draw a
maximum of 7 marks from the any one of the cleared courses in the semester and
will be grafted to the failed course in the same semester.
Students shall be given a choice of grafting only once in the 4 years Programme,
either after 6th semester (Option#1) or after 8th semester (Option#2)
Option#1: Applicable to students who have maximum of TWO theory courses in 5 th
and/or 6th semesters
Option#2: Applicable to students who have maximum of TWO theory courses in 7 th
and/or 8th semesters.
Eligibility for grafting:
i. Prior to the conduct of the supplementary examination after the
declaration of the 6th or 8th semester results.
ii. She/he must appear in all regular or supplementary examinations as
per the provisions laid down in regulations for the courses s/he
appeals for grafting.
iii. The marks obtained by her/him in latest attempt shall be taken into
account for grafting of marks in the failed course(s).
d) Betterment chance
Student who clears all the subjects up to 6th semester and wish to improve their CGPA
can register and appear for one betterment chance for maximum of any five theory
courses upto 6th semester. Betterment chance can be availed along with 7th and 8th
semester examinations
xviii
GMR Institute of Technology (GMRIT) | Regulation 2016
f) All the candidates who register for the semester end examination will be issued
memorandum of marks by the Institute. Apart from the semester wise marks memos,
the institute will issue the provisional certificate subject to the fulfillment of all the
academic requirements
a. It is mandatory that all the students need to earn the minimum number of credits (as
per clause 8) for the award of B. Tech. degree in their respective disciplines. However a
student can earn more number of credits if they wish, by registering one additional
course, from the list of courses available in the curriculum of all disciplines, over and
above to the existing courses from 4th semester to 6th semester
b. The students who are opting for full semester internship (FSI) in the 7th or 8th Semester,
they are permitted to take the courses as listed in 7th and 8th semester of the curriculum
are from the list of electives furnished in the curriculum
c. The students, who are in non FSI mode, shall register for the project work in the 8 th
semester only
d. The student shall be permitted to drop any SSC at any point of time
e. All the courses registered and cleared by a student in this mode will be mentioned in the
Cumulative Grade Memo (CGM) as additional acquired. However the CGPA is calculated
for the best 167/125 credits only (as mentioned in the clause 8)
a. A candidate may, for valid reasons, be granted permission by the Principal to withdraw
from appearing for the examination in any course or courses of only one semester
examination during the entire duration of the degree Programme. Also, only ONE
application for withdrawal is permitted for that semester examination in which
withdrawal is sought
b. Withdrawal application shall be valid only if the candidate is otherwise eligible to write
the examination and if it is made prior to the commencement of the examination in that
course or courses and also recommended by the Head of the Department
c. Such Withdrawal from the examination shall be treated as absent for the 1 st attemptto
the respective examination and will lose the eligibility for First Class with Distinction
d. The student shall be allowed to drop FSI course either 7th or 8th semester within 4
weeks from the commencement of the FSI Programme due any uncertainty from either
side. In such case s/he will automatically entered into Non-FSI pattern of curriculum,
and s/he needs to register for respective courses in that semester and appear for
semester end examinations. In case if s/he has earned equivalent number of credits or
near to the equivalent number of credits with respect to clause 9, s/he shall forbid the
courses either partially or fully
e. If any student withdraws from FSI course after the stipulated period mentioned in the
clause 10.d, s/he will be considered as detained from the semester. S/he needs to
register for the semester in the next academic year
xix
GMR Institute of Technology (GMRIT) | Regulation 2016
General
The college may change or amend the academic regulations or syllabi from time to time and the
changes or amendments made shall be applicable to all the students with effect from the dates
notified by the institute.
xx
Department of Information Technology, GMRIT| Curriculum | Regulation 2016
Department Vision
To be a preferred department of learning for students and teachers alike, with dual commitment
to academics and research, serving students in an atmosphere of innovation and critical thinking.
Department Mission
1
Department of Information Technology, GMRIT| Curriculum | Regulation 2016
Program Outcomes
Engineering graduate will be able to
2
Department of Information Technology, GMRIT| Curriculum | Regulation 2016
CURRICULUM FEATURES
UNDER ACADEMIC REGULATION 2016
1. Choice based credit system
2. Types of learning strategies
Curriculum is designed and developed in such a way that it provides a high degree of
flexibility to promote a learner centric environment through different types of learning
strategies viz. Independent learning, collaborative learning and interactive learning.
Independent learning
o Self study elective courses
o Self study topics in each unit in all the courses
Collaborative Learning
o Laboratory classes
o Mini projects in all laboratory courses
o Main project to demonstrate all the possible learning outcomes
Interactive Learning
o Tutorial classes in all the courses wherever possible
3. Industry engagement
Industry driven 3-credit elective courses
Industry driven 1-credit courses from 3rd semester onwards
Summer internship (One month duration) at the end of 2nd year during the program
of study
Full semester internship (FSI) (Six month) during fourth year during the program of
study
4. Layered learning
5. Research oriented electives in the form of term paper
6. Credited courses for employability skills, extra- and co- curricular activities
7. Assessment pattern for all courses in accordance with revised Bloom’s taxonomy
8. Distribution of courses
3
Department of Information Technology, GMRIT| Curriculum | Regulation 2016
4
Department of Information Technology, GMRIT| Curriculum | Regulation 2016
Fifth Semester
Course Periods
No Course POs& PSOs
Code L T P C
1 16CS505 Design and Analysis of Algorithms 2,3 3 1 - 3
2 16CS604 Mobile Computing 1,2,3,5 3 1 - 3
3 16IT403 Automata and Compiler Design 1,2,3 3 1 - 3
4 16IT504 Cloud Computing 2,6,7,8 3 1 - 3
5 16IT505 Object Oriented Analysis and Design 2,3, 4,5 3 - 2 4
6 Elective I/CC 3 1 - 3
7 16IT507 Cloud Computing Lab 4,5,PSO1,PSO2 - - 3 2
9 16IT508/ Term Paper/ - - 3 2
2,4,8,10,12/ 2,3,4,5,8,9,10,11
16IT509 Mini Project
10 16HSX06 CC & EC Activity II - - 3 -
11 16ESX03 Employability Skills III - 2 - -
Total 18 7 11 23
Sixth Semester
1 16HSX04 Engineering Economics & Project 3 1 - 3
11
Management
2 16CS602 Data Mining 2,3,4,5 3 - 2 4
3 16CS603 Internet of Things 1,2,3,4,5,6 3 1 - 3
4 16IT604 Artificial Intelligence 1,2,3 3 1 - 3
5 Elective II/CC 3 1 - 3
6 Elective III (Open Elective) 3 1 - 3
7 16CS607 IOT Lab 4, 9 - - 3 2
8 16IT508/ Term Paper/ - - 3 2
2,4,8,10,12/ 2,3,4,5,8,9,10,11
16IT509 Mini Project
9 Audit Course - - - -
10 16HSX06 CC & EC Activity II - - 3 1
11 16ESX04 Employability Skills IV - 2 - 1
Total 18 7 11 25
Seventh Semester
Course Periods
No Course POs& PSOs
Code L T P C
1 16IT701 Big Data Analytics 2,5,6 3 1 - 3
2 Elective IV/CC 3 1 - 3
3 Elective V/CC 3 1 - 3
4 16CS705 Mobile application Development lab 2,3, 8 - - 3 2
5 16IT705 Big Data Analytics Lab 3,4,5 - - 3 2
6 16IT706 Full Semester Internship1 1,2,5,8,9,10,11,12 - - - 16
Total 9 3 6 13/16
Eighth Semester
1 16CS802 Machine Learning 2,5 3 1 - 3
2 16IT802 Professional Ethics 6,8 3 1 - 3
3 Elective VI/CC 3 1 - 3
4 16IT804 Project 3, 4,9,10,11,12, PSO1,PSO2 - - 3 10
5 16IT706 Full Semester Internship2 1,2,5,8,9,10,11,12 - - - 16
Total 9 3 3 19/16
1
Student who opt for FSI-16IT706 during 7th semester, have to register one more additional elective and 16CS705 &
16IT705 as additional lab courses during 8th semester
2
Student the who opt for FSI-16IT706 during 8th semester, have to register an additional course in consultation with
HoD during 7th semester
5
Department of Information Technology, GMRIT| Curriculum | Regulation 2016
List of Electives
Elective I
Course Periods
No Course POs& PSOs
Code L T P C
1 16IT001 Information System Design 3,5 3 1 - 3
2 16CS001 Computer Graphics & Multimedia 2,3,5 3 1 - 3
3 16CS004 Real Time Operating Systems 2, 3 3 1 - 3
4 MOOCs - - - 3
Elective II
1 16IT002 Distributed Systems 2,7 3 1 - 3
2 16IT003 Information Retrieval Systems 3,6,8 3 1 - 3
3 16IT004 Information Theory & Coding 1,2,3,6,8 3 1 - 3
4 MOOCs - - - 3
Elective III (Open Electives – Mathematics, Chemistry, Entrepreneurship Skills, Industrial Safety and Engineering
& Technology)
1 16CE007 Disaster Management 2 3 1 - 3
2 16EE004 Renewable Energy Sources 2,7 3 1 - 3
3 16ME007 Principles of Entrepreneurship 1,5,8,11 3 1 - 3
4 16EC004 Fundamentals of Global Positioning System 1,2,6 3 1 - 3
5 16CS006 Computational Intelligence 2,3,5 3 1 - 3
6 16CS007 IOT for Engineering Applications 1,5 3 1 - 3
7 16CH008 Industrial Safety and Hazard Management 1,2,3,6,8 3 1 - 3
8 16IT005 Fundamentals of Cloud Computing 2,6,7,8 3 1 - 3
9 16PE006 Smart Grid Technologies 3,5 3 1 - 3
10 16MA001 Computational Mathematics 1,2 3 1 - 3
11 16CY001 Nano Science & Technology 1,12 3 1 - 3
Elective IV
1 16IT006 Human Computer Interaction 5,7 3 1 - 3
2 16IT007 Middleware Technologies 5,11,PSO1,PSO2 3 1 - 3
3 16CS008 Software Project Management 3,5,6 3 1 - 3
4 16CS003 Qualitative Data Analysis 3,5 3 1 - 3
5 MOOCs - - - 3
Elective V
1 16EC602 Digital Signal Processing 1,2,3,PSO2 3 1 - 3
2 16IT008 Application security 5,6,8 3 1 - 3
3 16IT009 Cryptography and Network Security 5,6,8 3 1 - 3
4 16CS009 Social Network Analysis 2,4,5,12 3 1 - 3
5 MOOCs - - - 3
Elective VI
1 16EC005 Digital Image Processing 3,5,6 3 1 - 3
2 16IT010 Computer Forensics 5,6,7,8 3 1 - 3
3 16IT011 E-commerce 5,6,8 3 1 - 3
5 16CS010 Multimedia Database 3,5,6 3 1 - 3
6 16CS011 Wireless Ad hoc Networks 3,5,6 3 1 - 3
7 MOOCs - - - 3
6
Department of Information Technology, GMRIT| Curriculum | Regulation 2016
3Contemporary and One Credit Courses may vary from one Academic Year to another academic year and
depends on the recent trends in the industries
7
Department of Information Technology, GMRIT | Syllabi | Regulation 2016
COs PO10
CO1 3
CO2 3
CO3 3
CO4 3
CO5 3
CO6 3
3–Strongly linked | 2–Moderately linked | 1–Weakly linked
Unit I
In London by M. K. Gandhi
Using appropriate word/phrases, synonyms and antonyms, nouns, pronouns, paragraph writing, changing
autobiography into biography
Montgomery Bus Boycott
11+4 Hours
Unit II
Pecuniary Independence by P. T. Barnum
Using appropriate word/phrases, synonyms and antonyms, Adjectives, Adverbs, Note-making, Rewriting
sentences and Short talk
TED-Sashi Tharoor
12+3 Hours
Unit III
The Drunkard by W. H. Smith
Similes, Rhythmic expressions, One-word substitution, Describing people, Synonym and Antonyms,
Tenses(past and present), Gerund and Verbal Adjective, Summarizing, essay writing, writing paragraph
Essay writing tips
11+4 Hours
Unit IV
Three Days to see by Hellen Keller
Deriving words, adjective formation, Tenses (future), prefixes, ModalAuxiliary verbs, Dialogue writing,
Expressing opinions/ideas, collecting information
Famous Indians with disability
11+4 Hours
Total:45+15 Hours
Textbook (s)
1. M. S. Rama Murty and M. Hariprasad, Prose for Communication Skills, Ravindra Publishing House,
Hyderabad, 2012
8
Department of Information Technology, GMRIT | Syllabi | Regulation 2016
Reference (s)
1. J. Seely, Oxford Guide to Effective Writing and Speaking, OUP, 2013
2. Quirk, Greenbaum, Leech and Svartvk, A Comprehensive Grammar of the English language, Pearson,
India, 2010
3. R. Murphy, English Grammar in Use, 4th Ed, CUP, Cambridge, 2012
4. https://en.wikipedia.org/wiki/Montgomery_Bus_Boycott
5. https://www.ted.com/talks/shashi_tharoor?language=en
6. http://www.internationalstudent.com/essay_writing/essay_tips
7. http://www.thebetterindia.com/16449/famous-indians-with-disability
Understand
1. Sketch the personality of Edward Middleton as he emerges from the conversation in the play.
2. Summarize Gandhi‘s attempts to model himself on the English gentleman and which circumstances
force him to realize that he has been pursuing a false idea?
Apply
1. Construct a dialogue between students about organizing music club activities in their college.
2. Construct a dialogue between two friends about how they plan their own careers.
1
Assignment test should contain only questions related to Higher Order Thinking (HOT) Skills pertaining to this course
9
Department of Information Technology, GMRIT | Syllabi | Regulation 2016
1 3 2
2 3 2
3 3 2
4 3 2
5 3 2
6 3 2
3–Strongly linked | 2–Moderately linked | 1–Weakly linked
Unit I
Differential Equations
Differential equations of first order and first degree–exact, linear and Bernoulli Applications to Newton‘s Law
of cooling, Law of natural growth and decay, orthogonal trajectories, Non-homogeneous linear differential
equations of second and higher order with constant coefficients with RHS term of the type e ax, Sin ax, cos ax,
polynomials in x, eaxV(x), xV(x)
Heat flow problems–Variation of parameters 11+4 Hours
Unit II
Mean Value Theroms and Functions of Several Variables
Generalized Mean Value theorem (All theorems without proof), Functions of several variables-Partial
differentiation, Functional dependence,Jacobian, Maxima and Minima of functions of two variables with
constraints and without constraints.Curve tracing-Cartesian-Polar and Parametric curves
Rolle’s, Lagrange’s and Cauchy’s mean value theorems–Generalized Mean Value theorem proofs
11+4Hours
Unit III
Applications of Integration
Applications of Integration to Lengths, Volumes and Surface areas of revolution in Cartesian and Polar
Coordinates.Multiple integrals-double and triple integrals, change of variables (Cartesian and Polar
coordinates), Change of order of Integration
Applications of Integration–Centroid–Mass 12+3 Hours
Unit IV
Vector Calculus
Vector Differentiation-Gradient, Divergence, Curl and their related properties of sums-products,
Laplacianoperator, Vector Integration - Line integral, work done, Potential function, area, surface and volume
integrals, Vector integral theorems: Greens, Stokes and Gauss Divergence Theorems (All theorems without
proof) and related problems
Vector identities–Proof of Green’s theorem 11+4 Hours
Total:45+15 Hours
10
Department of Information Technology, GMRIT | Syllabi | Regulation 2016
Textbook (s)
1. B. S. Grewal, Higher Engineering Mathematics, 42nd Ed., Khanna Publishers, New Delhi, 2012
2. E. Kreyszig, Advanced Engineering Mathematics, 9th Ed., Wiley, 2012
3. R. K. Jain, S. R. K.Iyengar, Advanced Engineering Mathematics, 4 th Ed., NarosaPublishingHouse,
NewDelhi, 2014
Reference (s)
1. B. V. Ramana, Engineering Mathematics, 4th Ed., Tata McGraw Hill, New Delhi, 2009
2. D. S. Chandrashekharaiah, Engineering Mathematics, Volume 1, Prism Publishers, 2010
3. T. K. V. Iyengar, B. Krishna Ghandhi, S. Ranganathan and M.V. S.S.N. Prasad, Engineering
Mathematics, Volume-I, 12th Ed., S. Chand Publishers, 2014
4. U. M. Swamy, P. VijayaLaxmi, K. L. Sai Prasad and M. Phani Krishna Kishore, A Text Book of
Engineering Mathematics–I, Excel Books, New Delhi, 2010
Create
1. Apipe 20 cm in diameter contains steam at 200 0C. It is covered by a layer of insulation 6cm thick and
thermal conductivity 0.0003. If the temperarature of the outer surface is 30 oC. Find the heat lose per
hour from 2 meter length of the pipe
2
Assignment test should contain only questions related to Higher Order Thinking (HOT) Skills pertaining to this course
11
Department of Information Technology, GMRIT | Syllabi | Regulation 2016
1 3 2
2 3 2
3 3 2
4 3 2
5 3 2
6 3 2
3–Strongly linked | 2–Moderately linked | 1–Weakly linked
Unit I
Optics
Interference:Superposition of waves-Coherence-Young's double slit experiment-Interference in thin films by
reflection (Qualitative treatment)–Newton's rings.Diffraction: Fresnel and Fraunhoffer diffractions-Fraunhoffer
diffraction at a single slit-Diffraction grating-Grating spectrum, Polarization–Types of Polarization-Double
refraction-Nicol prism-Quarter and Half wave plate. Lasers: Characteristics of laser–Stimulated absorption–
Spontaneous emission-Stimulated emission–Population inversion–Pumping mechanism–Active medium–Laser
systems: Ruby laser-He-Ne laser–Semiconductor laser–Applications of Lasers
Wedge shaped film–Polarization–Holography
12+4 Hours
Unit II
Electrostatics and Electromagnetism
Gauss law in electricity and it‘s applications: Coulomb‘s law from Gauss law-spherically distributed charge-
Infinite line of charge-Infinite sheet of charges–Ampere's Law-Magnetic field due to current (Biot-Savart‘s
Law)-B due to a current carrying wire and a circular loop,-Faraday‘s law of induction-Lenz‘s law-Induced
fields-Maxwell‘s equations (Qualitative treatment)-Hall Effect-Electromagnetic Wave and poynting vector
(Qualitative treatment), Superconductivity–Superconductivity phenomenon-General properties-Meissner effect-
Penetration depth-Type I and type II superconductors-Flux quantization-DC and AC Josephson effect-
Applications of superconductors
Infinite line of charge–Infinite sheet of charges Quantum Interference (SQUID)
11+3 Hours
Unit III
Quantum Theory of Solids–Semiconductors–Optical Fiber
Quantum theory of solids: Dual nature of matter, properties of matter waves-Schrödinger‘s wave equation–
Physical significance of wave function–Particle in a box (one dimensional)-Free electron theory of metals,
electrical conductivity-quantum free electron theory–Fermi Dirac Distribution-Kronig-Penney model
(qualitative)-Classification of materials into conductors-semi-conductors & insulators. Semiconductors: Carrier
Concentration (Intrinsic and Extrinsic, qualitative treatment only), Carrier drift, Carrier diffusion, Optical Fiber:
–principle and propagation of light in optical fibers–Numerical aperture and acceptance angle–types of optical
12
Department of Information Technology, GMRIT | Syllabi | Regulation 2016
fibers–single and multimode, step index and graded index fibers–applications–fiber optic communication
system
Uncertainty principle–Intrinsic and Extrinsic Semiconductor–Fiberoptic sensors
12+4 Hours
Unit IV
Magnetic, Dielectric &Nanomaterials
Magnetic Materials: Origin of magnetic moment (Bohr Magneton)-Classification of Magnetic materials-Dia,
para, ferro, Anti-ferro and Ferri magnetism-Domain and Weiss field theory (qualitative treatment only)-
Hysteresis Curve-Soft and Hard magnetic materials-Applications of magnetic materials
Dielectric Materials: Dielectric Polarization-Electronic, ionic and orientation polarizations (Qualitative treatment)
-Dielectrics in alternating fields-frequency dependence of the Polarizability ((Qualitative treatment), Important
dielectric materials
Nanomaterials: Introduction to nano materials-Physical, mechanical-electrical and optical properties of nano
materials-Preparation techniques of nano materials (Sol-Gel, CVD, Ball Milling)-Nano tubes-Different methods
of preparation carbon nano tubes (CNT‘s) (CVD)-Applications of Nanomaterials
Permeability–Magnetization–Dielectric constant–Ferro and Piezo electric effect and materials
10+4 Hours
Total:45+15 Hours
Textbook (s)
1. Halliday, Resnick and Krane, Physics Part-II, Wiley India Pvt. Ltd, 2012
2. S. O. Pillai, Solid State Physics, 6th Ed., Newage International Publishers, 2015
3. M. R. Srinivasan, Engineering Physics, 2nd Ed., Newage International Publishers, 2014
4. A. S. Vasudeva, Modern Engineering Physics, S. Chand and Company, New Delhi, 2006
5. C. M. Srivastava and C.Srinivasan, Science of Engineering Materials, Wiley Eastern Pvt. Ltd, 1997
6. C. P. Poole and F. J. Owens, Introduction to Nanotechnology, Wiley, New Delhi, 2007
Reference (s)
1. R. K. Gour and S. L. Gupta, Engineering Physics, Dhanpathrai Publications, New Delhi, 2002
2. V. Rajendran, Engineering Physics, McGraw Hill Education (India) Private LTD, 2010
3. M. Armugam, Engineering Physics, Anuradha Agencies, 2007
Understand
1. Explain the construction and working principle of Nicole‘s prism.
2. Construct Ruby laser and explain its working principle with energy level diagram.
3. Conclude the inferences from the M-H characteristics of Type-1 and Type-2 super conductors.
3
Assignment test should contain only questions related to Higher Order Thinking (HOT) Skills pertaining to this course
13
Department of Information Technology, GMRIT | Syllabi | Regulation 2016
Apply
1. List any four applications of lasers with reference to their characteristics.
2. Apply Biot-Savart‘s law, and calculate the Magnetic field induction along the infinite length of a straight
conductor at points close to the conductor.
3. Calculate electric field intensity due to infinite line of charge by applying Gauss law.
Analyze
1. Compare Fraunhoffer‘s diffraction and Fresnel‘s diffractions.
2. Discuss the role of Meta stable states in lasing action.
3. Discuss the BCS theory of Superconductors.
14
Department of Information Technology, GMRIT | Syllabi | Regulation 2016
1 3 2 2
2 3 2 2
3 3 2 2
4 3 2 2
5 3 2 2
6 2 3 3
3–Strongly linked | 2–Moderately linked | 1–Weakly linked
Unit I
System of forces-Equilibrium of system of forces
Types of Force systems-Coplanar Concurrent Forces–Resultant–Moment of a Force and its application–
Couples and Resultant of a Force System, Free body diagrams, equations of equilibrium of coplanar concurrent
and non-concurrent force systems, Lami‘s theorem, resolution of a force into a force and a couple
Polygon law of forces for resultant
11+4 Hours
Unit II
Centroid-Centre of Gravity-Area Moments of Inertia-Mass Moment of Inertia
Centroids of simple figures (from basic principles)-Centroids of Composite Figures, Centre of gravity of simple
body (from basic principles), center of gravity of composite bodies, Definition–Moments of Inertia of simple
Figures, Polar Moment of Inertia, Transfer Theorem, Moments of Inertia of Composite Figures.Definition,
Moment of Inertia of simple bodies, Transfer Formula for Mass Moments of Inertia
Mass moment of inertia of composite bodies
12+4 Hours
Unit III
Friction-Power transmission through belts
Theory of friction–Angle of friction–Laws of friction-static friction–Kinetic friction, friction in bodies moving
up or down on an inclined plane-Introduction to belt and rope drives, types of belt drives, velocity ratio of belt
drives, slip of belt drives, tensions for flat belt drive, angle of contact, centrifugal tension, maximum tension of
belt
Condition for transmission of maximum power
11+4Hours
Unit IV
Analysis of perfect frames (Analytical Method)-Virtual Work
Types of Frames-Assumptions for forces in members of a perfect frame, Method of joints, Method of sections,
Force table, Cantilever Trusses, Structures with one end hinged and the other freely supported on rollers
carrying horizontal or inclined loads, Principle of Virtual Work-Application of the Principle of Virtual Work-
potential Energy and Equilibrium
Stable and Unstable Equilibrium 11+3 Hours
Total: 45+15 Hours
15
Department of Information Technology, GMRIT | Syllabi | Regulation 2016
Textbook (s)
1. J. Suresh Kumar, Singer's Engineering Mechanics Statics and Dynamics, BS
Publications, 3rd Edition, 2011
2. A. K. Tayal, Engineering Mechanics Statics and Dynamics, Umesh Publications, 14th Edition, 2011
3. S. S. Bhavikatti, Engineering Mechanics, New Age International, 2008
4. S. Timoshenko & D. H. Young, and JV Rao, Engineering Mechanics, 4th Ed., TMH Education, 2006
Reference (s)
1. Irving H. Shames and G. Krishna MohanaRao, Engineering Mechanics, 4 th Ed., Pearson, 2006
2. R. K. Bansal, Engineering Mechanics, Laxmi Publications, 3rd Edition, 2004
Internal Assessment Pattern
Cognitive Level Int. Test 1 (%) Int. Test 2 (%) Assignment Test4(%)
Remember 20 20 -
Understand 30 30 -
Apply 50 50 60
Analyze -- - 40
Evaluate -- - -
Create -- - -
Total (%) 100 100 100
Sample question (s)
Remember
1. Define centroid
2. List the different types of belt drives
3. Define angle of repose
Understand
1. Explain Lami‘s theorem
2. Compare mass moment of inertia and area moment of inertia
3. Explain the difference between frame and truss
Apply
1. Solve the resultant of three forces acting on a hook as shown in below figure
3. Solve to find the power transmitted by a belt running over a pulley of 600 mm diameter at 200 r.p.m.
The coefficient of friction between the belt and the pulley is 0.25, angle of lap 160° and maximum
tension in the belt is 2500 N
4
Assignment test should contain only questions related to Higher Order Thinking (HOT) Skills pertaining to this course
16
Department of Information Technology, GMRIT | Syllabi | Regulation 2016
Unit I
Programming Basics
Introduction, Algorithm / pseudo code, flowchart, program development steps, structure of a C program,Types,
Operators, and Expressions: C-tokens, Variable Names, Data Types and Sizes, Constants, Declarations, C-
operators, Type Conversions, Precedence and Order of Evaluation
Control Flow: Statements and Blocks, If-Else, Else-If, Switch, Loops-While and For, Loops- Do-while, Break
and Continue
Comma and sizeof operators–Conditional Expressions–goto and Labels
12+3 Hours
Unit II
Arrays and Functions
Array concept, definition, declaration, accessing elements, storing elements, strings and string manipulations, 2-
D arrays, Multidimensional arrays, Array Applications
Basicsof Functions, Functions Returning Non-integers, External Variables, Scope Rules, Static Variables,
BlockStructure, Storage Classes, user defined functions, standard library functions, recursive functions, passing
Arrays to functions, Functions Applications
Arithmetic operations on string–nesting of functions–preprocessor commands
11+4 Hours
Unit III
Pointers and Structures
Pointer concepts, initialization of pointer variables, pointers and function arguments, passing by address,
dangling memory, address arithmetic, Character pointers and functions, pointers to pointers, dynamic memory
management functions
Basics of Structures, Structures and Functions, Arrays of Structures, Pointers to Structures, Self-referential
Structures, typedef, Unions
Programs on Dynamic memory management using functions–Table Lookup
11+4 Hours
Unit IV
File Structures
Standard Input and Output, Formatted Output-printf, Variable-length Argument Lists, Formatted Input-scanf,
File Access
Data Structures: Introduction to linear and non-linear data Structures, definition: stack, queue
17
Department of Information Technology, GMRIT | Syllabi | Regulation 2016
Reference (s)
1. Y. Kanetkar, Let us C, 8th Ed., BPB Publication, 2004
2. F. E. V. Prasad, C Programming: A Problem-Solving Approach, Giliberg, Cengage, 2010
3. A. S. Tenenbaum, Y. Langsam and M. J. Augenstein,Data Structures using C, Pearson Education, 2009
Cognitive Level Int. Test 1 (%) Int. Test 2 (%) Assignment Test5(%)
Remember 25 20 -
Understand 35 40 30
Apply 40 40 40
Analyze - - 30
Evaluate - - -
Create - - -
Total (%) 100 100 100
Understand
1. Explain structure of a c program
2. Describe linear and nonlinear data structures
3. Explain multidimensional arrays
Apply
1. Implement matrix multiplication using arrays
2. Draw flow chart of program development steps
3. Demonstrate pointe to pointer concept.
Analyze
1. Compare structure and union
2. Differentiate logical and relational operators
3. Classify linear and nonlinear data structures
5
Assignment test should contain only questions related to Higher Order Thinking (HOT) Skills pertaining to this course
18
Department of Information Technology, GMRIT | Syllabi | Regulation 2016
1 3
2 3
3 3
4 3
5 3
6 3
3–Strongly linked | 2–Moderately linked | 1–Weakly linked
List of Experiments
1. Variation of magnetic field along the axis of current-carrying circular coil-Stewart and Gee‘s Method
2. Determination of wavelengths of spectral line of mercury spectrum using diffraction grating
3. Determination of radius of curvature of convex lens by forming Newton‘s rings
4. LCR circuit- Study of parallel and series Resonance
5. Measurement of thickness of a thin paper using wedge method
6. Fiber optics-Numerical aperture of a given fiber and study of bendig losses
7. Meldie‘s Experiment–Transverse and longitudinal modes
8. Determination of wave length of Laser by diffraction grating
9. Determination of Hall Coefficient and charge carrier density of semi-conductor
10. Determination of Band gap of a semiconductor
6
Students shall opt any one of the Augmented Experiments in addition to the regular experiments
19
Department of Information Technology, GMRIT | Syllabi | Regulation 2016
List of Experiments
1. Algorithms and Flow charts design and evaluation (Minimum 2)
2. Write C Programs to demonstrate C-tokens and operators
3. Write C Programs to demonstrate Decision Making And Branching (Selection)
4. Write a C program to demonstrate different loops
5. Write a C program to demonstrate arrays
6. Write a C program to demonstrate functions
7. Write a C program to implement the following
A. To manipulate strings using string handling functions.
B. To manipulate strings without using string handling functions
8. Write a C program to demonstrate different library functions
9. Write a C program to implement the following
A. To exchange two values using call by value and reference
B. To multiply two matrices using pointers
10. Write a C program to demonstrate functions using pointers
11. Write a C program to implement the following operations using structure and functions:
i) Reading a complex number ii) Writing a complex number
12. Write a C program
A. To copy data from one file to another
B. To reverse the first n characters in a given file (Note: The file name and n are specified on the
command line)
List of Augmented Experiments 7
1. Merging of two arrays
2. Arithmetic operations on two complex numbers
3. Employee's Management System
4. Library management
5. Department store system
6. Personal Dairy Management System
7. Telecom Billing Management System
8. Bank Management System
9. Contacts Management
10. Medical Store Management System
20
Department of Information Technology, GMRIT | Syllabi | Regulation 2016
List of Experiments
Unit I
Conic Sections-Introduction to Orthographic Projections
Construction of conics using general method and other special methods
Orthographic Projections of Points, Straight Lines parallel to both planes, parallel to one plane and inclined to
other plane
9 Hours
Unit II
Orthographic Projections of Straight Lines and Planes
Projections of Straight Lines inclined to both planes; Projections of Planes; Regular Planes Perpendicular
Parallel to one Reference Plane and inclined to other Reference Plane; inclined to both the Reference Planes
Practice the following topics by using any one 2D drafting software
9 Hours
Unit III
Projections of Solids&Isometric Projections
Projections of Prisms, Cylinders, Pyramids and Cones with the axis inclined to one Principal Plane and Parallel
to the other, Projections of Prisms, Cylinders, Pyramids and Cones inclined to both the Principal Planes
Introduction to Isometric Projections, Isometric axes, angles, Isometric views, Construction of Isometric views
of Simple planes and Solids in various positions
15 Hours
Unit IV
Conversion of Engineering Views
Conversion of Orthographic Views of Simple Solid objects into Isometric View, Conversion of Isometric View
of Simple Solid objects into Orthographic Views
9Hours
Total: 42 Hours
List of Drawing Sheets
1. Conics by General Method
2. Conics by using Special Methods
3. Projections of Points and Straight lines in Simple Positions
4. Projections of Lines inclined to both planes
5. Projections of Planes in Simple positions
21
Department of Information Technology, GMRIT | Syllabi | Regulation 2016
Reference (s)
1. K. C. John, Engineering Graphics for Degree, PHI Publications, 2nd Edition, 2009
2. M. B. Shah and B. C. Rana, Engineering Drawing, Pearson Publishers, 2nd Edition, 2009
3. D. A. Jolhe, Engineering Drawing, Tata McGraw-Hill Education, 1st Edition, 2008
8
Students shall opt any one of the Augmented Experiments in addition to the regular experiments
22
Department of Information Technology, GMRIT | Syllabi | Regulation 2016
COs PO10
1 3
2 3
3 3
4 3
5 3
6 3
3–Strongly linked | 2–Moderately linked | 1–Weakly linked
Unit I
The Knowledge Society by A.P.J. Abdul Kalam
Forming Negative words, Quantifiers, LetterWriting, Interviews, Scientific Terminology
Famous Indian Scientist Inventions
11+4 Hours
Unit II
Principles of Good Writing by L.A.Hill
Word definitions, Articles, e-mail writing, Debates, Noticing changes in English, Origin and meaning of
borrowed words
Effective writing tips
11+4 Hours
Unit III
Man’s Peril by Bertrand Russell
Deriving nouns, Prepositions, Phrasal verbs, Speeches, Report Writing, Problem solving
Bertrand Russell and Einstein Manifesto
12+3 Hours
Unit IV
Shooting an Elephant by George Orwell
Using an appropriate word, conjunctions, voices, Cover letters, Resume, Dialogue writing, Group Discussion
Abridged version of Animal Farm
11+4 Hours
Total :45+15Hours
Textbook (s)
1. M. S. Rama Murty and M. Hariprasad, Prose for Communication Skills, Ravindra Publishing House,
Hyderabad, 2012
23
Department of Information Technology, GMRIT | Syllabi | Regulation 2016
Reference (s)
1. J. Seely, Oxford Guide to Effective Writing and Speaking, OUP, 2013
2. Quirk, Greenbaum, Leech and Svartvik, A Comprehensive Grammar of the English language, Pearson,
India, 2010
3. Raymond Murphy, English Grammar in Use, 4th Ed, CUP, Cambridge, 2012
4. http://www.famousscientists.org/15-famous-indian-scientists-inventions/
5. http://www.grammarbook.com/grammar/effWrite.asp
6. https://en.wikipedia.org/wiki/Russell%E2%80%93Einstein_Manifesto)
7. http://cbhs.portlandschools.org/UserFiles/Servers/Server_1098483/File/Migration/Animal-Farm-
Abridged.pdf
Understanding
1. Read the following passage
There is no dearth of fake patriotism in the world to disguise one‘s weakness of failure in
administration and planning. It rather becomes an instrument in the hands of dictators and selfish rulers to keep
their position safe. One can hear the slogans of patriotism on both the sides of the line of demarcation in the
Indian sub-continent. When there is dissatisfaction among the masses these slogans would be raised—‗danger is
lurking on the borders‘, ‗the enemy is making preparation to attack our country‘. This is not patriotism but
perverse thinking for selfish motives. Patriotism does not require a whip to rouse the sentiments of the people—
if it is true patriotism. The unity achieved during war may be a result of apprehension of slavery, not necessarily
true emotion generated by patriotism. It is in the blood of the people to mould their life according to the needs of
the motherland. It is not in the expediency to create circumstances befitting one‘s own interests. It is rather
regrettable that patriotism is the greatest casualty in almost all the fields in our country. Political expediency and
self-motives have become supreme, to the extent that even to talk of patriotism is labeled as puerile of
reactionary. Let us take inspiration from the young girl who wept and cried bitterly for she could not offer
flowers on the war memorial in London, for none of her forefathers had laid his life for the cause of the nation.
Let us inculcate this noble spirit among people if we have to bring back the glory that was India.
Answer the following question.
a) Show the effect of fake patriotism?
b) When are the slogans of patriotism raised?
c) Is this type of patriotism real patriotism? Whom does it benefit?
d) Is the unity during war real patriotism? Does true patriotism require any instigation?
e) What does the author regret?
f) Explain the result of political expediency and selfish motives?
9
Assignment test should contain only questions related to Higher Order Thinking (HOT) Skills pertaining to this course
24
Department of Information Technology, GMRIT | Syllabi | Regulation 2016
g) Why did the little girl cry bitterly? Do we learn anything from her?
h) Locate the synonym of the word ‗conceal’ from the passage.
i) Find the antonym of the word ‗cheerful‘ from the passage.
j) Suggest a suitable title to the passage.
2. Read the following passage and answer the questions on it:
Many matters, however, are less easily brought to the test of experience. If, like most of mankind, you have
passionate convictions on many such matters, there are ways in which you can make yourself aware of your own
bias. If an opinion contrary to your own makes you angry, that is a sign that you are subconsciously aware of
having no good reason for thinking as you do. If someone maintains that two and two are five, you feel pity
rather than anger, unless you know so little of arithmetic that his opinion shakes your own conviction. The most
savage controversies are those about matters as to which there is no good evidence either way. Persecution is
used in theology, not in arithmetic because in arithmetic there is knowledge, but in theology there is only
opinion. So, whenever you find yourself getting angry about your difference of opinion, be on your guard; you
will probably find, on examination, that your belief is going beyond what the evidence warrants.
Apply
1. Develop an essay on the theme of ―Digital India and its consequences‖ in about 200 words.
2. Write a letter to your friend who is exclusively occupied with his studies. Advise him to take part in
games
Analyze
1. Discuss the chief components of knowledge society with reference to India according to
Dr.A.P.J.Abdul Kalam.
2. Analyze L.A.Hill‘s principles of good writing in achieving ‗vivid expression, simple and
conversational tone‘ to make the writing interesting to the readers.
3. Explain how L.A. Hill‘s principles of good writing are helpful to become a successful writer. (in about
250 words)
Create
1. Imagine yourself to be the instructor of a course in which 75 students have registered. Draft an email to
all your students asking them to prepare a presentation on the topic of their choice.
2. Build a model essay on impact of social media on youth.
25
Department of Information Technology, GMRIT | Syllabi | Regulation 2016
1 3 3
2 3 2
3 3 2
4 3 2
5 3 2
6 3 2
3–Strongly linked | 2–Moderately linked | 1–Weakly linked
Unit I
Matices
Linear systems of equations: Rank-Echelon form, Normal form–Solution of Linear Systems–Rank Method and
Gauss Seidal Method
Eigen values–Eigen vectors–Properties–Cayley-Hamilton Theorem(without proof)–Inverse and powers of a
matrix by using Cayley-Hamilton theorem, Quadratic forms-Reduction of quadratic form to canonical form–
Rank–Positive, negative, semi definite–index–signature
LU Decomposition Method
11+4 Hours
Unit II
Laplace Transforms
Laplace transforms of standard functions–Shifting Theorems, Transforms of derivatives and integrals–Unit step
function–Dirac delta function
Inverse Laplace transforms by Partial fractions–Convolution theorem (without proof)-Application of Laplace
transforms to ordinary differential equations with constant coefficients
Laplace Transform of Periodic Functions 11
11+4 Hours
Unit III
Fourier Series and Transformations
Fourier series–even and odd functions–Half-range sine and cosine series, Fourier integral theorem (without
proof)–Fourier transforms–sine and cosine transforms–properties–inverse transforms–Finite Fourier transforms
Fourier Transform of Convolution Products
12+3 Hours
Unit IV
Partial Differential Equations and Applications
Formation of partial differential equations-by elimination of arbitrary constants and arbitrary functions–
solutions of first order linear (Lagrange) equations and nonlinear equations (standard types)–Method of
Separation of Variables-Applications to wave equation, heat conduction equation in one dimension and
homogeneous Laplace equation in Cartesian coordinates in two dimensions
26
Department of Information Technology, GMRIT | Syllabi | Regulation 2016
Charpits Method
11+4 Hours
Total:45+15 Hours
Textbook (s)
1. B. S. Grewal, Higher Engineering Mathematics, 42nd Ed., Khanna Publishers, New Delhi, 2012
2. S. R. K. Iyengar, R. K. Jain, Advanced Engineering Mathematics, 4th Ed., Narosa Publishing House,
New Delhi, 2014
3. B. V. Ramana, Engineering Mathematics, 4th Ed., Tata McGraw Hill, New Delhi, 2009
Reference (s)
1. T. K. V. Iyengar, B. Krishna Ghandhi, S. Ranganathan and M. V. S. S. N. Prasad, Engineering
Mathematics, 12th Ed.,Volume–I, S. Chand Publishers, 2014
2. U. M. Swamy, P. Vijaya Laxmi, K. L. Sai Prasad and M. Phani Krishna Kishore, A Text Book of
Engineering Mathematics–II, Excel Books, New Delhi, 2010
3. D. S. Chandrashekharaiah, Engineering Mathematics, Vol–1, Prism Publishers, 2010
4. Erwin Kreyszig, Advanced Engineering Mathematics, 9th Ed., Wiley, 2012
Understand
1. If in the interval , then for what values of the Fourier series of
contains only sine terms
2. Form the partial differential equation by eliminating arbitrary constants from
2 2
z (x a )( y b)
3. Evaluate L 2 t
Apply
Create
10
Assignment test should contain only questions related to Higher Order Thinking (HOT) Skills pertaining to this course
27
Department of Information Technology, GMRIT | Syllabi | Regulation 2016
28
Department of Information Technology, GMRIT | Syllabi | Regulation 2016
1 3 2
2 3 2
3 3
4 3 2
5 3
6 3 2
3–Strongly linked | 2–Moderately linked | 1–Weakly linked
Unit I
Water Technology & Advanced Materials
Water technology: sources of water–hardness of water–disadvantages of hard water–boiler troubles–internal
treatment methods, softening methods–lime soda, zeolite, ion exchange and reverse osmosis -specifications for
drinking water–BIS & WHO standards–municipal water treatment–analysis of water for hardness, chloride &
fluoride, numerical problems
Advanced materials–Nanomaterials–Introduction–Preparation by chemical methods–Characterization–SEM–
Applications in industry–solar, water purification and battery technology
Preparation of some important membranes for reverse osmosis process
12+3 Hours
Unit II
Polymers & Composites
Polymers: Introduction–Advantages of polymers over Metals and Alloys; Types of polymers–Types of
polymerization–Physical properties: viscosity, polydispersity, molecular weight distribution etc., and
mechanical properties–Plastics: Thermosetting & thermoplastics–Compounding of plastics–Moulding methods
(Compression, Injection, Transfer, Extrusion)–Preparation, Properties and Engineering applications of important
industrial polymers–Poly Ethylene, Poly Styrene, PVC, PTFE, Bakelite–Molecular Imprinting Polymers (MIP)
–Conducting Polymers–Biodegradable polymers-Fiber reinforced plastics-Glass fiber reinforced plastic–Bullet
Proof Plastics–Rubbers: processing of natural rubber–Vulcanization and compounding of rubber–Engineering
applications of rubber
Inorganic rubbers-silicone rubbers
11+4 Hours
Unit III
Fuels & Energy Resources
Fuels–Introduction-Calorific value–determination of calorific value–Bomb calorimeter and Junker‘s
calorimeters-Classification of fuels–characteristics of a good fuel–classification and analysis of coal-Extraction
of Crude Oils–refining of crude oil–Cracking-Thermal and Catalytic cracking–Synthetic petrol–Polymerization,
Fischer Tropsch and Bergius processes–Knocking–Anti Knocking–Octane &Cetanenumber–ASTM standards of
29
Department of Information Technology, GMRIT | Syllabi | Regulation 2016
Reference (s)
1. S. Chawla, A Textbook of Engineering Chemistry, 3rd Ed., Dhanpat Rai& Co (Pvt) Ltd, New Delhi,
2012
2. P. Murthy, C. V. Agarwal, A. Naidu, Textbook of Engineering Chemistry, B. S. Publications,
Hyderabad, 2006
3. T. Pradeep, Textbook of Nanoscience and Nanotechnology, McGraw Hill Education,India,
Pvt.Limited, 2013
11
Assignment test should contain only questions related to Higher Order Thinking (HOT) Skills pertaining to this course
30
Department of Information Technology, GMRIT | Syllabi | Regulation 2016
Understand
1. What is meant by desalination? Explain the procedure for softening of water by Reverse osmosis
process?
2. What is compounding of plastics? Explain the role of Fillers and Stabilizers with examples
in compounding of plastics?
3. How a photo-voltaic cell constructed and what is is the working mechanism of it?
Apply
1. Water contains the constituents like CO2 , HCO3- , Mg(HCO3)2 , H+, CaSO4 , NaCl and Na2SO4 and
this water is subjected to Lime and Soda softening, which type of chemical reactions are involved
between these constituents with Lime and Soda?
2. Which moulding technique is involved in making a plastic ball in toys industry? Explain the process in
detail with neat sketch?
3. By which methods, the underground pipelines are protected from corrosion? Explain the involved
mechanisms?
Analyze
1. The Boiler fed water contains the following compositions: CaSO4, CaCl2, MgCl2, SiO2&
Na2CO3.Suggest the suitable methods and involved principle to prevent the formation of scale and
sludge by these constituents?
2. When a metal X (of reduction potential = 0.337V at 250C) is connected to another
metal Y (of reduction potential = -0.140V at 250C) and this structure is exposed
continuously to sea water, which type of corrosion would take place? Explain with
suitable mechanism.
3. Which type of corrosion is involved in the following jointed pipeline and why? Explain the involved
mechanism in detail
Iron pipe Copper pipe
Sea water inlet Sea water outlet
31
Department of Information Technology, GMRIT | Syllabi | Regulation 2016
1 3 1
2 3 1
3 2 1
4 3 1
5 3 1
6 2 3
3–Strongly linked | 2–Moderately linked | 1–Weakly linked
Unit I
Basic Electrical Components
Definition of charge, electric potential, electric field, voltage, current, power and energy, Ohm‘s law, Faraday‘s
Law of Electromagnetic Induction, Classification of network elements, Basic circuit elements–R, L and C,
Types of energy sources-Dependent and independent sources, Kirchhoff‘s laws, Resistive, inductive and
capacitive networks–series, parallel circuits, Self Inductance, mutual inductance, Types of induced emfs, Dot
Convention, Coefficient of coupling
Types of resistors–inductors and capacitors
11+4 Hours
Unit II
Fundamentals of Electrical Circuits
DC Circuits:Voltage and current division rule, Source transformation, mesh and nodal analysis, Star-delta
transformation. AC Circuits:Generation of alternating current, periodic waveforms and basic definitions, RMS
and average values of periodic and non-periodic waveforms, form factor and peak factor, AC through pure R
and L, Phasor representation, J-operator, Power in ac circuits
AC through pure capacitor
12+4 Hours
Unit III
Electrical Machines & Measuring Instruments
Electrical Machines:Principle of operation, Construction and Applications-DC Machines, 1-phase Transformers,
1-Phase Induction Motors, Stepper motors. Measuring Instruments: Classification of Measuring Instruments,
Construction and basic working principle of Voltmeter, Ammeter, Wattmeter
Working principle of Energy meter
12+4 Hours
Unit IV
Electrical Safety, Wiring and Introduction to Power System
Indian electricity safety rules, Electric shock- effects, protective measures and first aid, Earthling-Basic
principles and types.Electrical wiring-wiring accessories, staircase, tube light.Single line diagram of power
system
Design of corridor wiring 10+3Hours
Total:45+15 Hours
32
Department of Information Technology, GMRIT | Syllabi | Regulation 2016
Textbook (s)
1. D. P. Kothari and I. J. Nagrath, Theory and Problems of Basic Electrical Engineering, 4th Ed., PHI
Learning Private limited, 2013
2. S. Ghosh, Fundamentals of Electrical & Electronics Engineering, 2nd Ed., PHI, 2010
3. V. K. Mehta and Rohit Mehta, Basic Electrical Engineering, S Chand and company Ltd, New Delhi,
India, Revised Edition, 2012
Reference (s)
1. J. B. Gupta, Basic Electrical and Electronics Engineering, 3rd Ed., S. K. Kataria & Sons, 2009
2. B. L. Theraja, Fundamentals of Electrical Engineering and Electronics, 5 th Ed., S. Chand & Company
Ltd, 2013
3. K. Alice Mary and P.Ramana, Basic Electrical Engineering, 1st Ed., Winger Publications, 2013
4. Basic Electrical Engineering by K.Alice Mary and P.Ramana, Winger Publications, 1stEdition, 2013
Understand
1. Explain the principle of operation of transformer.
2. Describe the working of DC generator.
3. Explain the construction and working of Wattmeter.
4. Illustrate the emf equation of a transformer
12
Assignment test should contain only questions related to Higher Order Thinking (HOT) Skills pertaining to this course
33
Department of Information Technology, GMRIT | Syllabi | Regulation 2016
1 - - 3 3
2 - - - 3
3 3 3 - 3
4 - - 3 3
5 - - 3 3
6 - - - 3
3–Strongly linked | 2–Moderately linked | 1–Weakly linked
Unit I
Multidisciplinary Nature of Environmental Studies &Natural Resources
Definition, Scope and Importance, Multidisciplinary nature of Environmental Studies, Value of Nature-
Productive, Aesthetic/Recreation, Option, Need for Public Awareness, Institutions (BNHS, BVIEER, ZSI, BSI)
and People in Environment (MedhaPatkar, SundarlalBahuguna, Indira Gandhi, Rachael Carson)
Natural Resources: Renewable and Non–renewable resources–Importance, uses, overexploitation/threats, and
conservation of (i) forest (ii) water (iii) mineral (iv)food and (v) energy resources, role of an individual in
conservation of natural resources
Biotic and abiotic components–Case studies of forest-water-mineral-food-energy resources
12+4 Hours
Unit II
Ecosystem & Biodiversity
Ecosystems: Concept of an ecosystem, Structure and function of an ecosystem, Biogeological cycles (Energy
flow, Carbon and Nitrogen Cycles), Ecological succession, Food chains, food webs and ecological pyramids,
Introduction, types, characteristic features, structures and functions of the following ecosystems:a. Forest
Ecosystem b. Aquatic EcosystemBiodiversity and its Conservation: Definition and levels of biodiversity, Bio–
geographical classification of India, hot spots of biodiversity–India as a mega diversity nation, Threats to
biodiversity, Endangered and endemic species of India, Conservation of biodiversity: In–situ and Ex–situ
conservation
Phosphorus cycle–Desert ecosystems–Grassland ecosystem–Case studies on conservation of biodiversity
12+4 Hours
Unit III
Environmental Pollution &Social Issues
Environmental Pollution: Definition, Cause, effects, control measures and case studies of: Air pollution b. Water
pollution c. Soil pollution Solid waste Management: Causes, effects and control measures of urban and
industrial wastes. Disaster management (floods and cyclones) Social Issues and the Environment: Sustainability,
Urban problems related to energy, Water conservation and watershed management, Resettlement and
rehabilitation of people; Environmental ethics: Issues and possible solutions, global warming, ozone layer
depletion, Consumerism and waste products
Noise pollution–Case studies on pollution–Wasteland reclamation 11+4 Hours
34
Department of Information Technology, GMRIT | Syllabi | Regulation 2016
Unit IV
Human Population and the Environmental Acts
Human Population and the Environment: Population growth, Affluence, Technology and Environmental Impact
(Master Equation), Population explosion and Family Welfare Programme, Value Education, HIV/AIDS,
Women and Child Welfare, Role of information Technology in Environment and human health, Environment
Protection Acts: Air (Prevention and Control of Pollution) Act, Water (Prevention and control of Pollution) Act,
Wildlife Protection Act and Forest Conservation Act. Issues involved in enforcement of environmental
legislation
Human Rights–The environment (Protection) Act, 1986
10+3 Hours
Total:45+15 Hours
Textbook (s)
1. E. Bharucha, Textbook of Environmental Studies, 1st Ed., University Press (India) Pvt. Ltd., 2005
Reference (s)
1. W. P. Cunningham, M. A. Cunningham, Principles of Environmental Science, 6 th Ed., Tata McGraw
Hill, 2008
2. A. Kaushik, C. P. Kaushik, Perspectives in Environmental Studies, 4 th Ed., New Age International
Publishers, 2008
3. H. S. Peavy, D. R. Rowe, G. Tchobanoglous, Environmental Engineering, 1 st Ed., McGraw Hill, 1984
4. T. E. Graedel, B. R. Allenby, Industrial Ecology and Sustainable Engineering, 1 st Ed., Pearson
Publications, 2009
13
Assignment test should contain only questions related to Higher Order Thinking (HOT) Skills pertaining to this course
35
Department of Information Technology, GMRIT | Syllabi | Regulation 2016
COs P010
1 3
2 3
3 3
4 3
5 3
6 3
3–Strongly linked | 2–Moderately linked | 1–Weakly linked
List of Experiments
14
Students shall opt any one of the Augmented Experiments in addition to the regular experiments
36
Department of Information Technology, GMRIT | Syllabi | Regulation 2016
37
Department of Information Technology, GMRIT | Syllabi | Regulation 2016
COs PO4
CO1 3
CO2 3
CO3 3
CO4 3
CO5 3
CO6 3
List of Experiments
Introduction to Quantitative Analysis
1. Assessment of Quality of water
i) Hardness ii) Chloride iii) Fluoride iv) Dissolved Oxygen v) Nitrite
2. Testing quality of lubricants
i) Viscosity Index ii) Flash & Fire point iii) Acid Number
3. Quality Analysis of engineering materials
i) Cement ii) Al/Cu wire iii) Steel
4. Preparation of Engineering and Nano materials
i) Bakelite ii) Nylon iii) Silver nano particles
5. Estimation of Purity of Iron in Ingot
6. Analysis of fertility of soil
i) Sodium & Potassium ii) Micro Nutrients
7. Determination of acid strength (for a citrus fruit) by Conductometr
8. Detection of adulteration of Food in Honey/ Milk/ Tea
9. Estimation of heavy metals in fast food items by AAS.
10. Testing of corrosion of metal
Note: Student should perform minimum of 12 experiments at least one form each head.
15
Students shall opt any one of the Augmented Experiments in addition to the regular experiments
38
Department of Information Technology, GMRIT | Syllabi | Regulation 2016
39
Department of Information Technology, GMRIT | Syllabi | Regulation 2016
List of experiments
Trades
Carpentry : 1. Cross Lap joint
2. T-Lap joint
3. Dovetail Joint
4. Mortise and Tennon Joint
Fitting : 1. Square Fit
2. V- Fit
3. Half Round Fit
4. Dovetail Fit
Tin Smithy : 1. Square Box without lid
2. Taper Tray
3. Open Scoop
4. Funnel
House Wiring : 1. Parallel/Series Connection of three bulbs
2. Florescent Lamp Wiring
3. Stair Case Wiring
4. Godown Wiring
Total: 45 Hours
16
List of Augmented Experiments
1. Prepare Tee–bridle joint
2. Prepare Corner dovetail joint
3. Make Corner bridge joint
4. Make Dovetail lap joint
5. Prepare 900round elbow pipe
6. Prepare Ellipse using GI sheet
7. Make cylindrical pipe
8. Make Round T-pipe
9. Prepare hexagonal fitting
10. Prepare diagonal dovetail fitting
11. Prepare universal fitting
16
Students shall opt any one of the Augmented Experiments in addition to the regular experiments
40
Department of Information Technology, GMRIT | Syllabi | Regulation 2016
41
Department of Information Technology, GMRIT | Syllabi | Regulation 2016
42
Department of Information Technology, GMRIT| Curriculum | Regulation 2016
REMEMBER
1. List 2 different kinds of transmission lines
2. Define modulation
3. List 7 layers in OSI reference model
4. State Inverse square law
5. List 5 types of cellular telephone
UNDERSTAND
1. Identify the functions of layers in OSI reference model
2. Explain the principles involved in the transmission of data through optical fiber
3. Explain the basic telephone call procedure
4. Explain hand off process in cellular networks
5. Explain HDLC protocol
1
Comprehensive test should contain only questions related to Higher Order Thinking (HOT) Skills
43
Department of Information Technology, GMRIT| Curriculum | Regulation 2016
APPLY
1. If the frame is 1101011011 and generator is 10011,what would be the transmitted frame
2. What is the remainder obtained by dividing x7+x5+1by the generator polynomial x3+1
3. Consider a 32 bit block of data 11100111 1101110100111001 10101001 that has to be transmitted IF
Longitudinal Redundancy Check is used what is the transmitted bit stream
4. What is the data transfer rate in bps of a signal that is encoded using phase modulation with eight different
phase angles and a baud rate of 3000?
ANALYZE
1. A block of 32 bits has to be transmitted. Discusshow the thirty two bit block is transmitted to thereceiver
using Longitudinal Redundancy Check
2. In the Hamming code for a data unit of m bits how do you computes the number of redundant bitsneeded.
3. Compare Analog cellular telephone with digital cellular telephone
4. A bit string 0111101111101111110, needs to betransmitted at the data link layer. What is the stringactually
transmitted after bit stuffing
5. A bit stream 10011101 is transmitted using the standard CRC method. The generator polynomial isx3+1
show the actual bit string transmitted. Suppose the third bit from left is inverted during transmission show
that this error is detected at receivers end
44
Department of Information Technology, GMRIT| Curriculum | Regulation 2016
COs–POs Mapping
COs PO1 PO2 PO3 PO 13 PO 14
1 1 3 2 1 1
2 3 3 2 1 2
3 2 2 3 1 1
4 3 3 2 1 2
5 2 2 3 2 1
6 1 2 3 1 2
Unit I
Introduction to Database Systems
File System Vs DBMS, Advantages of DBMS, Structure of DBMS, Levels of Data Abstraction (Data
Independence), Database Users and Administrators, Different Data Models. E-R Model: Overview of Database
Design, Entities, Attributes, and Entity Sets, Relationships and Relationship Sets Additional Features of the ER
Model
Codd’s rules - Introduction to Distributed Databases - Data Ware Housing and Data Mining
(11+3) Hours
Unit II
Introduction to the Relational Model
Integrity Constraints Over Relations-Introduction to Views-Relational Algebra - Selection And Projection - Set
Operations-Renaming-Joins-Division-Examples of Relational Algebra Queries-Relational Calculus: Tuple
Relational Calculus.
SQL Queries: Form Of Basic SQL Query-Union-Intersect-And Except-Nested Queries-Aggregative Operators-
Group By And Having Clauses-Null Values-Outer Joins.
Query Optimization: Query Processing and Optimization-Heuristics and Cost Estimation in Query Optimization
(11+5) Hours
Unit III
Schema Refinement and Normal Forms
Introduction To Schema Refinement - Problems Caused By Redundancy - Decomposition - Problems Related To
Decomposition - Functional Dependency - Closure of a Set of Fds - Attribute Closure - First - Second - Third
Normal Forms – BCNF - Multi Valued Dependencies – Fourth Normal Form.
Transactions: Acid Properties of Transaction - Transaction States - Schedule: Serial Schedule - Concurrent
Schedules - Anomalies Associated With Concurrent Schedules (RW - WR - and WW Conflicts) -Serializability -
Conflict Serializability - and View Serializability.
Join Dependency - Fifth Normal Form - Domain Key Normal Form
(12+4) Hours
45
Department of Information Technology, GMRIT| Curriculum | Regulation 2016
Unit IV
OODBMS, Concurrency Control, Crash recovery
Introduction to Lock Management-Lock Based Concurrency Control: 2pl-Strict 2pl-Concurrency without Locking-
Timestamp–Based Concurrency Control - Optimistic Concurrency Control. Introduction to Aries - the Log - the
Write-Ahead Log Protocol-Check Pointing
Object-Oriented DBMSs-Concepts and Design: Introduction to Object-Oriented Data Models and DBMSs-
OODBMS perspectives-Persistence-Issues in OODBMSs-The object Oriented Database System Manifesto-
Advantages and Disadvantages of OODBMSs-Object oriented Database Design.
Database Security: Data Classification-Threats and Risks-Database access control-Types of Privileges.
File Organization-Comparison of File Organizations (Heap File - Sorted File Hash File)
(11+3) Hours
Total: 45+15 Hours
Textbook (s)
1. Elmasri & Navatha, Fundamentals of Database Systems, Pearson Education, 2006
2. Silberschatz Korth, Database System Concepts, McGraw hill, 5th Edition, 2010
Reference (s)
1. Peter Rob & Carlos Coronel, Database Systems design, Implementation and Management, 7 th Edition,
2004.
2. Raghurama Krishnan & Johannes Gehrke, Database Management Systems, TATA McGraw-Hill, 3rd
Edition, 2006
3. C.J.Date, Introduction to Database Systems, Pearson Education, 1999.
Remember
1. List any four application of DBMS
2. Define data model
3. List any four applications for triggers
4. Define functional dependency
5. List the 4 properties of Transaction
Understand
1. Explain E-R Model with suitable example
2. Explain the role of integrity constraints in database design
3. Illustrate the working principle of „write a head log‟ protocol
4. Differentiate 3NF and 4NF
5. Explain Two Phase Locking Protocol
2
Assignment test should contain only questions related to Higher Order Thinking (HOT) Skills pertaining to this course
46
Department of Information Technology, GMRIT| Curriculum | Regulation 2016
Apply
1. When multiple transactions are being executed by the operating system in a multiprogramming
environment, there are possibilities that instructions of one transaction are interleaved with some other
transaction. Apply the suitable concept to overcome the problem
2. Classify various normal forms according to their applicability
3. Give some real world applications of Normalization
4. Illustrate the Commit and Rollback operations of Transaction Control
5. Give some real world applications for Database indexing techniques
Analyze
1. Compare File processing system with DBMS
2. Analyze different locking protocol for concurrency control and serializability
3. Normalization will increase the complexity of the database design. Justify
4. Compare DDL and DML of SQL
5. Compare and Contrast Serializability and Recoverability
Evaluate
1. Is database redesign is necessary? explain
2. How can you evaluate the performance of two data models?
3. Evaluate the performance of query processor and list the corresponding metrics
4. How can you assess the throughput and delay for any DBMS?
5. How can you evaluate the impact of data models on the query processing?
47
Department of Information Technology, GMRIT| Curriculum | Regulation 2016
COs–POs Mapping
COs PO1 PO 2 PO4 PO9
1 3 2 1 1
2 3 2 2 1
3 2 2 2 3
4 2 2 3 1
5 3 2 2 3
6 3 3 1 2
Practical Components
1. Construction of half-adder, half-subtractor, full-adder, full-subtractor and verification of their truth tables
2. 4-bit word Parity generator and checker
(11+9) Hours
Unit III
Combinational Logic Circuits and Programmable Logic Devices (PLDs)
Multiplexers-Demultiplexers-Realization of Boolean Functions Using Decoders and Multiplexers, Code Converters
- Magnitude Comparator
48
Department of Information Technology, GMRIT| Curriculum | Regulation 2016
Practical Components
1. Verification of the properties of decoders and encoders
2. Verification of the functioning of Multiplexer and De-multiplexers
(12+6) Hours
Unit IV
Introduction to Sequential Logic Circuits & Registers and Counters
Design of Registers - Buffer Register - Control Buffer Registers - Bidirectional Shift Registers - Universal Shift
Register - Design of Ripple Counters - Synchronous Counters and Variable Modulus Counters (Mod-2,4,6,10 & 16)
- Ring Counter - Johnson Counter. Finite State Machine-capabilities and limitations -Mealy and Moore State
Machines -Mealy to Moore conversion and vice-versa - Reduction of State Tables and State Assignment
Construction of Finite Automata -Mealy - Moore Machines
Practical Components
1. Realization of Flip-Flops using IC‟s.
2. Verification of functioning of Basic Shift Register (SR), SI/SO SR, SI/PO SR, PI/SO SR, PI/PO SR
(12+9) Hours
Total: 75 Hours
Textbook (s)
1. Morris Mano, Digital Design, 3rd Edition, PHI, 2006
2. A. Anand Kumar, Switching Theory and Logic Design, 3rd Edition, PHI, 2016
Reference (s)
1. Charles H. Roth - Fundamentals of Logic Design, 3rd Edition, Thomson Publications, 1998
2. Zvi Kohavi, Switching & Finite Automata Theory, 2nd Edition, Tata McGraw Hill, 2008
3. R. P. Jain, Modern Digital Electronics, 4th Edition, Tata McGraw Hill, 2010
SAMPLE QUESTION (S)
Internal Assessment Pattern
Cognitive Level Int. Test 1 (%) Int. Test 2 (%) Augmented Test3 (%)
Remember 25 20 --
Understand 40 40 30
Apply 35 40 30
Analyze 10
Evaluate -- 10
Create -- -- 20
Total (%) 100 100 100
Remember
1. List the first 16 numbers in base12
2. State Basic Theorems and Properties of Boolean Algebra
3. Reproduce RS-Latch with NOR gates
4. State Demorgan‟s theorem
5. Define Priority Encoder
6. List basic types of programmable logic devices
3
Augmented test should contain only questions related to Higher Order Thinking (HOT) Skills pertaining to this course
49
Department of Information Technology, GMRIT| Curriculum | Regulation 2016
Understand
1. Explain the functioning of Carry-Lookahead-Adder
2. Describe working Johnson Counter and Ring Counter
3. Draw 5 variable K-map structure
4. Convert decimal number 22.64 to Hexadecimal number
5. Explain how Edge triggered flip flop eliminates Race Around Condition
Apply
1. Show that a full adder can be constructed with two half adders and one OR gate
2. Show dual of X-OR is its complement
3. Demonstrate full adder with MUX
4. Show that NAND connections are not Associative
5. Show that a half adder can be constructed with two half adders and one OR gate
Analyze
1. Compare and Contrast Combinational Circuits and Sequential Circuits
2. Compare PROM and PLA
3. Analyze the following circuit and prove that it is equivalent to T-flipflop
50
Department of Information Technology, GMRIT| Curriculum | Regulation 2016
51
Department of Information Technology, GMRIT| Curriculum | Regulation 2016
Remember
1. Define converse, contra positive and inverse of an implication
2. List out the different Principal normal forms with example
3. State the property of first theory of digraph theory by taking a suitable example
4. Define monoid and abelian group with a suitable example
5. Define Pigeonhole Principle and the generalization of the Pigeonhole Principle
4
Assignment test should contain only questions related to Higher Order Thinking (HOT) Skills pertaining to this course.
52
Department of Information Technology, GMRIT| Curriculum | Regulation 2016
Understand
1. Explain the Planarity of the Kuratowski‟s two planar graphs
2. Explain the General Principle of Inclusion-Exclusion for n-sets
3. Draw the Hasse diagram of the following relation
R is a relation defined as the divisors of 60 and denoted by D60.
4. Compare between Eulerian graph and Hamiltonian graph
Apply
1. Show that the identity. C(n, r -1) + C(n, r) = C(n +1, r)
2. Show that the complete graphs K2, K3, K4 are planar
3. Let G be the set of all non-zero real numbers with a binary operation *, defined as a*b = a2b2. Show that
<G,*> is an abelian group.
4. Find the coefficient of x9y3 in the expansion of (2x-3y)12.
Analyze
1. Differentiate between Permutation and Combination and find the relation between them.
2. Compare the Equivalence Relation, Compatible relation and Partial Order Relation.
3. Justify, whether the following argument is valid or not.
p q
r s
p r
----------
qvs
4. Identify the combinations in set of electives of 7 subjects that has no repetitions for a group of 10 members
having 5 students in each group.
Evaluate
1. In a sample of 100 logic chips, 23 have a defect type D1, 26 have a defect type D2, 30 have a defect type D3,
7 have defects types D1 and D2, 8 have defects types D1 and D3, 10 have defects types D2 and D3 and 3 have
all three types defects.
Determine the number of chips having (i) At least one defect & (ii) no defect.
2. Find the MST using Kruskals‟s algorithms with explanation.
3. A woman has 11 close relatives and she wishes to invite 5 of them to dinner. Determine the number of
ways can she invite them in the following situations.
a. There is no restriction on the choice.
b. Two particular persons will not attend separately.
c. Two particular persons will not attend together.
4. Determine the number of vertices and number of edges of the complete bipartite graphs K 4,7 and K 7,11.
53
Department of Information Technology, GMRIT| Curriculum | Regulation 2016
COs–POs Mapping
COs PO1 PO2 PSO1
1 3 1 1
2 3 3 1
3 2 3 2
4 2 3 3
5 3 1 3
6 2 3 1
54
Department of Information Technology, GMRIT| Curriculum | Regulation 2016
Creation of binary tree from in-order & pre-order sequences - Creation of binary tree from in-order & post-order
sequences Priority queue - Representation of symbol tables in compiler design
(12+4) Hours
Unit IV
Efficient Binary Search Trees
Introduction to AVL trees, Height of an AVL Tree, Balancing AVL tree by rotations after insertions and deletions of
a data node
Multi-way search trees: introduction to m-way search trees, B-trees, B+ Trees
Graphs: Definitions, Graph representation - Adjacency matrix, adjacency lists, Graph Traversals (BFS & DFS)
Application of graphs for Determination of single source shortest path - extraction of minimum cost spanning trees
(11+4) Hours
Total: 45+15 Hours
Textbook (s)
1. Horowitz, Sahni and Anderson-Freed, Fundamentals of Data Structures in C, 2nd Edition, Universities
Press, 2008
2. Mark Allen Weiss, Data Structures and Algorithm Analysis in C, Pearson Education, 2002
Reference (s)
1. R. F. Gilberg, B. A. Forouzan, Data Structures A Pseudocode Approach with C, 2nd Edition, CENGAGE
Learning, 2005
2. S. Tanenbaum, Y. Langsam and M.J. Augenstein,Data Structures using C, Pearson Education, 1990
3. Seymour Lipschutz, Data Structures with C, Schaum Series, McGraw Hill Education, 2010
5
Assignment test should contain only questions related to Higher Order Thinking (HOT) Skills pertaining to this course.
55
Department of Information Technology, GMRIT| Curriculum | Regulation 2016
5. Explain with suitable example of LL rotation after inserting a new node into an AVL tree
6. Demonstrate the application of singly linked lists for the addition of the polynomials P1 and P2
Apply
1. Construct a symbol parse tree for the key words of following program
void main() {
long int n,num,d;
char prime;
clrscr();
printf("Enter the range for prime no");
scanf("%ld",&n);
for(num=2;num<=n;num++) {
prime='t';
for(d=2;d<=sqrt(num);d++)
if (num%d==0) {
prime='f';
break;
} if(prime==t)
printf("%10ld",num);
} getch();
}
2. Develop an algorithm to concatenate two single linked lists
3. Construct a priority queue and implement all basic operations to demonstrate priority queue
4. Build a recursive procedure to count the number of nodes in a binary tree
5. Develop a queue using single linked list data structure
Analyze
1. Analyze the efficiency of insertion sort for the following inputs to sort
A={12, 23, 3, 11, 56, 6, 78, 7} B={12, 14, 23, 45, 56, 67, 78, 81}
2. Analyze the efficiency of BST deletion to delete a node with two children
3. Compare BST deletion and AVL deletion methods according to time efficiency.
4. Choose a suitable data structure to implement a linked stack
5. Analyze the efficiency of BFS graph traversal method
Evaluate
1. Justify that the height of the AVL tree is O (log n) where n is the no of nodes in the tree
2. Prove that the height of a complete, balanced binary tree of „n‟ nodes is “log (n+1)”
3. The worst time complexity of binary search is O(log n), Justify
4. Choose a suitable data structure to implement double ended queue
5. Compare the height by successive insertion of following numbers if inserted into a BST and AVL tree
{12, 14, 23, 45, 56, 67, 78, 81}
Create
1. Construct the binary tree for the given in-order and pre-order traversal of a tree
In-order sequence: D B E A F C , Pre-order sequence: A B D E C F
2. Modify the routine BST-branch so that the nodes of the tree are freed after they are no longer required.
3. Modify the bubble sort algorithm so that a record is kept of the actual number of comparisons and
interchanges made
4. Construct the binary tree for the given in-order and post-order traversal of a tree
In-order: 4 2 5 1 6 7 3 8 , Post-order: 4 5 2 6 7 8 3 1
56
Department of Information Technology, GMRIT| Curriculum | Regulation 2016
57
Department of Information Technology, GMRIT| Curriculum | Regulation 2016
Unit IV
Applets & Event Handling
Applets: Concepts of Applets, differences between applets and applications, life cycle of an applet, types of applets,
creating applets, passing parameters to applets, The AWT class hierarchy, user interface components labels, button,
Text components
Event Handling: Events, Delegation event model, handling mouse and keyboard events, Adapter classes, inner
classes, Compare basic AWT components with swing components, More user interface components-canvas,
scrollbars, check box, choices, lists panels–scroll pane, dialogs, menu bar, layout managers.
Applet Security Policies–Anonymous Inner classes a Short–cut to Event Handling–Java Utilities (java.util Package)
(12+4) Hours
Total: 45+15 Hours
Textbook (s)
1. H. Schildt, Java: The complete reference, 7th Edition, TMH, 2006
2. T. A. Budd, An Introduction to Object–Oriented Programming, 3rd Edition, Addison Wesley Longman, 2002
Reference (s)
1. Dietal & Dietal, Java: How to Program, 8th Edition, PHI, 2010
2. C. S. Horstmann and G. Cornell, Core Java, Vol 1. Fundamentals, 7 th Edition, Pearson Education, 2004
3. C. Horstmann, BIG JAVA Compatible with Java 5 & 6, 3rd Edition, Wiley Publishers, 2008
Remember
1. List all OOPs principles
2. Define class and object
3. Illustrate various data types supported by JAVA
4. State various access controls available in JAVA
5. Define inheritance
6. Define thread
Understand
1. Explain byte code
2. Explain the use of super, static and final keywords
3. Illustrate the use of try, catch, throw and throws
4. Java is purely object oriented programming language. Explain
5. Explain types of polymorphism with Example
6
Assignment test should contain only questions related to Higher Order Thinking (HOT) Skills pertaining to this course
58
Department of Information Technology, GMRIT| Curriculum | Regulation 2016
Apply
1. Write statements that perform the following one-dimensional-array operations:
a) Set the 10 elements of integer array counts to zero
b) Add one to each of the 15 elements of integer array bonus
c) Display the five values of integer array best Scores in column format
2. Create two arrays that store all even no‟s in one array and all odd no‟s in another array for a given set
of elements
3. Write a java program to implements final variable, Method and classes
4. Explain the reason for the following code giving compiling errors.
abstract class AbstractClass
{
abstract void abstractMethod()
{
System.out.println("First Method");
}
}
5. Write a java program to implement the following techniques
a) Method Overloading
b) Method Overriding
6. Write a Java program to implement Virtual function technique
Analyze
1. Compare and Contrast an abstract class and an interface
2. Differentiate method overloading and overriding
3. Differentiate abstraction and encapsulation
4. Identify the uses of calling a synchronize method inside a synchronize method
5. Identify memory leak problems in Java objects
59
Department of Information Technology, GMRIT| Curriculum | Regulation 2016
9
Students shall opt any one of the Augmented Experiments in addition to the regular experiments
60
Department of Information Technology, GMRIT| Curriculum | Regulation 2016
8
Students shall opt any one of the Augmented Experiments in addition to the regular experiments
61
Department of Information Technology, GMRIT| Curriculum | Regulation 2016
12. Develop an application to perform the inorder, preorder and postorder traversals of a binary tree using non-
recursive methods.
13. Develop an application to perform inserting and deleting a node in a graph
14. Develop an application to simulate a calculator which performs the addition, subtraction, multiplication and
division of polynomials using linked list.
15. Develop an application to perform construction of an AVL search tree using insertion and deletion
operations.
62
Department of Information Technology, GMRIT| Curriculum | Regulation 2016
7
Students shall opt any one of the Augmented Experiments in addition to the regular experiments
63
Department of Information Technology, GMRIT| Curriculum | Regulation 2016
Soft Skills: Communication Skills & Confidence: How Communication Skills affect Confidence? How to
communicate effectively.(with Examples) - Attitude & Confidence: Attitude Vs Skills vs Knowledge, Attitude Vs
Behavior, How to develop Positive Attitude? Confidence? Fear? Steps to Overcoming the Fear of Public Speaking?
- Goal Setting: Vision Vs Mission Vs Goals, Why Goal Setting? SMART Technique to Goal Setting, Putting First
things First and Time Management - JAM & J2M Sessions: Practice & Evaluation - Public Speaking: Presentations
by Students on General Topics.
Quantitative Aptitude: Problems on numbers - H.C.F and L.C.M - Problems on ages – Averages - Time and Work
- Time & Distance – Percentages - Profit & loss - Ratio & Proportions – Partnership - Simple interest & Compound
interest – Clocks – Calendars - Pipes and Cisterns - Mensuration
Verbal reasoning: Number series - Direction test - Blood relations – Syllogisms - Seating arrangement -
Permutations, combinations and Probability – Dice - Cube and Cuboid - Data sufficiency - Logical deductions –
Analogies - Course of action - Cause and effect - Data interpretation.
64
Department of Information Technology, GMRIT| Curriculum | Regulation 2016
Course Outcomes
1. Demonstrate and understanding of the relational data model
2. Performance analysis between Tibero® DB and Oracle DBMS
Tibero ®DB: Fundamentals of Data Base Management Systems, Fundamentals of Tibero®DB. Different data
models for Data Base management systems, Database Languages: DDL, DML, DCL, types of SQL queries and
different operators, Tibero / SQL Queries: Form of Basic SQL Query, Introduction to Nested Queries, Correlated
Nested Queries, Set Comparison Operators, Aggregative Operators-NULL values.
(15 Hours)
65
Department of Information Technology, GMRIT| Curriculum | Regulation 2016
COs PO1 PO 2
1 3 3
2 3 3
3 2 3
4 2 2
5 3 2
6 3 2
3–Strongly linked | 2–Moderately linked | 1–Weakly linked
Unit I
Probability: Sample space and events – Probability – The axioms of probability – Some Elementary theorems -
Conditional probability – Baye‟s theorem, Random variables – Discrete and continuous Distributions and
properties-Expectations - MGFs.
Real time problems of Baye’s theorem, Construction of discrete probability distributions
(11 +4) Hours
Unit II
Binomial, Poisson, Exponential, Normal distributions and their MGFs – related properties
Limiting cases from Binomial distribution to Poisson and Normal distribution
(11 + 4) Hours
Unit III
Sampling distribution: Populations and samples - Sampling distributions of mean (known and unknown)-Central
limit theorem. Test of Hypothesis– Type I and Type II errors. One tail and two-tail tests –tests of Hypothesis
concerning one and two means & Proportions-Z test, Maximum error and interval estimation of means and
proportions. Tests of significance – Student‟s t-test, F-test, Chi-square test for independence of attributes
Real time problems in construction of confidence intervals and Testing of Hypothesis
(11 + 4) Hours
Unit IV
Statistical Quality Control methods-Methods of preparing Control charts-X-bar, p and R-charts-curve fitting by the
method of least squares- linear, polynomial and exponential curves-Correlation-Pearson‟s correlation coefficient
and Spearman‟s Rank correlation and linear Regression.
Construction of NP-chart
(12 + 3) Hours
Total: 45+15 Hours
66
Department of Information Technology, GMRIT| Curriculum | Regulation 2016
Textbook(s):
1. B.V.Ramana, Engineering Mathematics, TMH-publications, 4th Edition, 2009.
2. Miller and J. E. Freund, Probability & Statistics for Engineers, Prentice Hall of India, 8 th Edition, 2011.
3. T. K. V. Iyengar, B. Krishna Gandhi et. al, Probability & Statistics, S. Chand & Company, 2012.
Reference book(s):
1. Arnold O. Allen, Probability & Statistics, Academic Press, 2nd Edition, 2005.
2. Shahnaz Bathul, A text book of Probability & Statistics, V. G. S. Book Links, 2 nd Edition, 2007.
3. Murugesan and Gurusamy, A text book of Probability & Statistics, Anuradha Publications, 2011.
Cognitive Level Int. Test 1 (%) Int. Test 2 (%) Assignment Test7 (%)
Remember 25 20 --
Understand 35 35 --
Apply 30 25 70
Analyze 10 20 20
Evaluate -- 10
Create -- --
Total (%) 100 100 100
Remember
1. List out the formulas related to permutation and combination
2. List out all types of events in probability
3. Define axioms of probability
4. Define conditional probability
Understand
1. Explain probability, condition probability definitions and Bayes theorem
2. Discuss Moment generating functions of discrete and continuous distributions
3. Compare Binomial, Poisson, Normal distributions
4. Illustrate the procedure involved in sampling distributions
Apply
1. The mean voltage of a battery is 15 and SD is 0.2. Compute the probability that four such batteries
connected in series will have a combined voltage of 60.8 0r more volts.
2. A company claims that the mean life time of tube lights is 500 hours. Is the claim of the company tenable if
a random sample of 25 tube lights produced by the company has mean 518 hours and SD 40 hours.
Company is satisfied if t falls between -t0.01 and t0.01.
3. It is observed that 174 out of a random sample of 200 truck drivers on highway during night are drunk. Is it
valid to state that at least 90% of the truck drivers are drunk. Use 0.05 LOS
7
Assignment test should contain only questions related to Higher Order Thinking (HOT) Skills pertaining to this course
67
Department of Information Technology, GMRIT| Curriculum | Regulation 2016
68
Department of Information Technology, GMRIT| Curriculum | Regulation 2016
Practical Components
1. Suggest architecture style for internet banking system
(11+3) Hours
Unit IV
Testing and Risk Management
Unit testing, integration testing, system testing, object oriented programs testing, black box and white box testing,
debugging,
Risk management - Risk types, strategies, estimation and Planning.
Software Quality - Quality assurance and its techniques
Software Implementation Techniques - Testing as an Engineering Activity
Practical Components
1. Prepare Test suite
2. Perform code generation using automated tools
(11+9) Hours
Total: 75 Hours
Textbook (s)
1. Rajib Mal, Fundamentals of software Engineering, 3rdEdition, Eastern Economy Edition, 2009
2. Roger S. Pressman, Software Engineering, A practitioner‟s Approach, 6 thEdition, McGraw-Hill
International Edition, 2005
Reference(s)
1. I. Sommerville, Software Engineering, 7thEdition, Pearson education, 2004
2. K K Aggarwal and Yogesh singh, Software engineering,3 rd Edition, New age international
publication,2008
SAMPLE QUESTION (S)
Internal Assessment Pattern
Cognitive Level Int. Test 1 (%) Int. Test 2 (%) Augmented Test8 (%)
Remember 25 15 --
Understand 35 15 20
Apply 20 25 30
Analyze 20 25 30
Evaluate -- 10 20
Create -- 10 --
Total (%) 100 100 100
Remember
1. Define software engineering
2. List 3 software myths
3. Define Feasibility study
4. What is meant by debugging?
5. Define Risk
Understand
1. Explain various quality assurance techniques
2. Describe software architecture styles and patterns
3. Illustrate golden rules for user interface design
4. Explain various techniques for requirements elicitation and analysis
5. Describe the differences between white box testing and black box testing
8
Augmented test should contain only questions related to Higher Order Thinking (HOT) Skills pertaining to this course
69
Department of Information Technology, GMRIT| Curriculum | Regulation 2016
Apply
1. Classify the techniques of requirement analysis
Analyze
1. Compare and Contrast software life cycle models
2. Analyze risk types in the risk management
Evaluate
1. How do you assess the quality of the software product?
2. How do you assess the performance of software models?
70
Department of Information Technology, GMRIT| Curriculum | Regulation 2016
COs–POs Mapping
COs PO3 PO5 PO6 PO13
1 3 1 2 1
2 3 3 2 2
3 2 3 2 2
4 2 3 2 2
5 3 3 3 2
6 2 3 2 3
Unit I
HTML Common tags- List, Tables, images, forms, Frames, Links and Navigation, CSS: Introduction, CSS
Properties, Controlling Fonts, Text Formatting, Pseudo classes, Selectors,.
Java Script: Learning Java script: Variables, operators, Functions, Control structures, Events, Validations,plugins.
Introduction to HTML5, introduction to CSS3 13+4 Hours
Unit II
PHP Programming: Introducing PHP: Creating PHP script, Running PHP script. Working with Variables and
constants: Using variables, Using constants, Data types, Operators.
Controlling program flow: Conditional statements, Control statements, Arrays, functions. Working Withforms.
PHP 5 Global Variables – Superglobals - PHP 5 Cookies - PHP 5 Session 10+3 Hours
Unit III
PHP Programming
Introducing PHP: Creating PHP script - Running PHP scriptworking with Variables and constants: Using variables -
Using constants-Data types - Operators. Controlling program flow: Conditional statements - Control statements -
Arrays - functions
PHP 5 Global Variables – Superglobals - PHP 5 Cookies - PHP 5 Session 11+4 Hours
Unit IV
JDBC and AJAX
JDBC architecture - JDBC drivers - working with PHP forms and Database using MYSQL - Developing JDBC
applications Introduction - AJAX with XML and PHP - Common Gateway Interface and Perl programming -
Developing AJAX applications
PHP 5 File Handling - PHP XML DOM Parser - and AJAX Database
11+4 Hours
Total: 45+15 Hours
71
Department of Information Technology, GMRIT| Curriculum | Regulation 2016
Textbook (s)
1. Jon Duckett, Web programming with HTML, XHTML and CSS, 2nd Edition, Wiley India, 2010
2. Uttam Roy, Web Technologies, OXFORD University press,2010
Reference (s)
1. Bai, Michael Ekedahl, Web programming, CENAGE Learning, India Edition, 2015
2. Paul S.Wang, An Introduction to Web DesignProgramming, India Edition, 2004
SAMPLE QUESTION (S)
Internal Assessment Pattern
Cognitive Level Int. Test 1 (%) Int. Test 2 (%) Assignment Test9 (%)
Remember 25 25 --
Understand 35 35 30
Apply 40 40 20
Analyze 15
Evaluate -- -- 10
Create -- 25
Total (%) 100 100 100
Remember
1. List out different form elements in HTML
2. Define GET() and POST() method
3. List out different types of JDBC drivers
4. List any three XML parsers
5. Write about XML DTD
Understand
1. Explain fundamental HTML elements
2. Explain internet concepts
3. Illustrate how work java script events
4. Describe procedure for how to connect PHP to MYSQL
5. Explain AJAX technologies
Apply
1. Implement tables in HTML
2. Demonstrate and implement how to connect PHP to MYSQL, student Placement details.
3. Demonstrate and implement Java script validations using regular expressions
4. Implement AJAX technology with any application
5. Implement PHP to MYSQL, insert the student academic information
Analyze
1. Compare and contrast CSS4 and CSS5
2. Compare XML DTD and XML Schema
3. Compare SGML-based versus XML-based HTML
Evaluate
1. How the Sessions can be maintained in Session tracking?
2. Compare Servlet with CGI
3. How to add Nodes in DOM Tree?
4. How the template based Transformation achieved with the help of XSLT?
9
Assignment test should contain only questions related to Higher Order Thinking (HOT) Skills pertaining to this course
72
Department of Information Technology, GMRIT| Curriculum | Regulation 2016
3103
Course Outcomes
1. Propose appropriate network model for data communication
2. Analyze various protocols in data link layer.
3. Analyze IEEE 802 series protocols.
4. Develop web applications for sending E-mail.
5. Propose and implement appropriate routing algorithm for data routing.
6. Extend the Internet connection to a given system and trouble shoots the same.
COs–POs Mapping
Unit I
Network Hardware-Network Software-and Transmission Media
OSI-TCP/IP-the ARPANET-Network Topologies-Physical Layer:
Transmission media: Magnetic Media-Twisted pair-Base band Coaxial Cable-Fiber optics-Wireless Transmission:
Electromagnetic Spectrum-Radio Transmission-and Microwave Transmission.Switching Techniques: Circuit
Switching-Packet Switching-Message Switching.
73
Department of Information Technology, GMRIT| Curriculum | Regulation 2016
Unit IV
Transport Layer
Transport Services-Connection management-Elements of Transport Protocols-Internet Transport Protocols: UDP
and TCP. IPv4 & IPv6, Application Layer-Domain name system-Electronic Mail-WWW,
ATM Transport protocol-Proxy Servers-Multimedia: Data compression-digital representation of analog signals-
Real time transport protocol-session control protocols
12+4 Hours
Total: 45+15 Hours
Textbook (s)
1. Andrew S Tanenbaum, Computer Networks, 4th Edition, Pearson Education /PHI, 2002
2. Behrouz A. Forouzan, Data Communications and Networking, 3rdEdition, Tata McGraw Hill Higher
Education, 2003
Reference (s)
1. Willam Stallings, Data and Computer Communications,8thEdition, Pearson Prentice Hall, 2007
2. W.A. Shay, Thomson, Understanding communications and Networks, 3rd Edition, Cengage Learning, 2005
Remember
1. List the applications of Computer Networks
2. Write two differences between OSI and TCP/IP models.
3. State 5 key assumptions in Dynamic channel allocation?
4. State the purpose of DNS.
5. Define congestion.
6. State the 2-army problem.
Understand
1. Illustrate OSI Reference model.
2. Explain various design issues of data link layer.
3. What are the responsibilities of Data Link layer and explain Pure Aloha and Slotted Aloha protocols.
4. Describe Distance Vector routing algorithm with example and explain count to infinity problem
5. Represent the Manchester encoding for the bit stream: 0001110101.
Apply
1. What is the check summed frame transmitted if the message is 1101011011 and the generator polynomial is
x 4 + x + 1 using CRC
2. Can you think of any circumstances under which an open-loop protocol, (e.g., a Hamming code) might be
preferable to the feedback-type protocols.
10
Assignment test should contain only questions related to Higher Order Thinking (HOT) Skills pertaining to this course
74
Department of Information Technology, GMRIT| Curriculum | Regulation 2016
3. Assuming that all routers and hosts are working properly and that all software in both is free of all errors, is
there any chance, however small, that a packet will be delivered to the wrong destination?
Analyze
1. The following data fragment occurs in the middle of a data stream for which the byte-stuffing algorithm
described in the text is used: A B ESC C ESC FLAG FLAG D. What is the output after stuffing?
2. The following character encoding is used in a data link protocol: A: 01000111; B: 11100011; FLAG:
01111110; ESC: 11100000 Show the bit sequence transmitted (in binary) for the four-character frame: A B
ESC FLAG when each of the following framing methods are used:
(a) Character count.
(b) Flag bytes with byte stuffing.
(c) Starting and ending flag bytes, with bit stuffing.
3. Analyze Data link protocols almost always put the CRC in a trailer rather than in a header.
Evaluate
1. Consider the user of differentiated services with expedited forwarding. Is there a guarantee that expedited
packets experience a shorter delay than regular packets? Justify.
2. Compute a multicast spanning tree for router C in the following subnet for a group with members at routers
A, B, C, D, E, F, I, and K.
75
Department of Information Technology, GMRIT| Curriculum | Regulation 2016
1. Identify the different components of the computer system, their functions and their interconnections.
2. Demonstrate the various instruction formats that the processor follows.
3. How the control unit generates control signals to execute a particular instruction
4. How the memory system can be suitably designed to improve the performance of the computer.
5. Analyze how high speed computers can be designed by using the pipelining and multiprocessor
6. Illustrate data transfer between central computer and I/O devices may be handles in a variety of modes
COs – POs Mapping
COs PO1 PO 2
1 3 3
2 3 2
3 3 3
4 2 3
5 2 3
6 2 2
3–Strongly linked | 2–Moderately linked | 1–Weakly linked
Unit I
Fundamentals of Computers and Basic Computer Organization and Design
Introduction to Digital Computers. Functional units, Register transfer language: Register transfer, Bus and memory
transfers; Micro-Operations: Arithmetic micro-operations, Logic micro-operations, Shift micro-operations,
Arithmetic logic shift unit: Instruction codes, Computer registers, Computer instructions, Timing and Control,
Instruction cycle, Memory-Reference instructions, Register-Reference instruction, Input-Output instruction,
Interrupts,
Hardware and Software-Computer types (12+4) Hours
Unit II
Computer Arithmetic and the Memory System
Fixed point representation, Floating point representation, Addition and subtraction, Multiplication algorithms,
Division algorithms, Memory hierarchy, Semiconductor RAM memories, Read-only memories, Cache memories,
Performance considerations, Secondary storage,
Floating point arithmetic operations-Virtual memories (12+4) Hours
Unit III
Central Processing Unit and Control Unit Design
Stack organization, Instruction formats, Addressing modes, Data Transfer and manipulation, Program control,
reduced instruction set computer, Complex instruction set computer Hardwired control unit design, Micro-
programmed Control unit design, Control memory, Address sequencing,
Micro-program example (11+3) Hours
Unit IV
Input-Output Organization and Pipeline Processing
Peripheral devices, Input-Output interface, Asynchronous data transfer, Modes of transfer, Priority interrupt, Direct
memory access, Parallel processing, Pipelining, Arithmetic pipeline, Instruction pipeline
Input-Output processor (IOP) (10+4) Hours
Total : 45+15 hours
Textbook (s)
76
Department of Information Technology, GMRIT| Curriculum | Regulation 2016
1. Carl Hamacher, ZvonksVranesic and SafeaZaky, Computer Organization, 5 thEdition, McGraw Hill, 2002
2. M.Moris Mano, Computer Systems Architecture 3rd Edition, Pearson/PHI, 1992
Reference (s)
1. William Stallings, Computer Organization and Architecture, 6th Edition, Pearson/PHI,2007
2. Andrew S. Tanenbaum ,Structured Computer Organization, 6thEdition PHI/Pearson,2012
Int. Test 2
Cognitive Level Int. Test 1 (%)
(%)
Assignment Test11 (%)
Remember 30 20 --
Understand 30 20 --
Apply 20 30 70
Analyze 20 30 30
Evaluate -- -- --
Create -- -- --
Total (%) 100 100 100
Remember
1. List functional parts of computer
2. Define an interrupt
3. List any four applications of stacks
4. Define address sequencing
5. Write the representation of floating point number in computer memory.
Understand
1. Explain logic and shift micro operations with example
2. Represent the format of an instruction. How do you differentiate Memory reference, Register reference and
IO reference instructions? Write at least two instructions in each category.
3. Explain the phases of instruction cycle with flowchart.
4. Illustrate the concept of virtual memory with an example.
5. Compare isolated IO and memory mapped IO
Apply
1. Construct 4 bit common bus using multiplexers
2. Assess the configuration of pipeline to perform the operation (Ai+Bi)(Ci+Di) where i is from 1 to 6.
3. Design 5 bit arithmetic circuit to perform the following two operations.
4. D=A+B+1 and D=A+B‟+1
5. Use booth‟s Algorithm to multiply (-9) X (-13)
6. Construct an algorithm for evaluating square root of binary fixed point number.
Analyze
1. Differentiate between CISC and RISC characteristics
2. Does DMA have priority over CPU when both request memory transfer? Justify
3. Attribute the hardware procedure for detecting an overflow by comparing signs of augend and addend. The
numbers are in signed-2‟s complement representation.
4. Is it necessary the read and write control lines in a DMA controller bi directional? Justify.
5. Why should be the sign of the remainder after the division be the same as the sign of dividend? Justify.
11
Assignment test should contain only questions related to Higher Order Thinking (HOT) Skills pertaining to this course
77
Department of Information Technology, GMRIT| Curriculum | Regulation 2016
Unit I
Operating Systems Overview and Process Management
Operating Systems Overview: Introduction to Operating Systems - Operating System Structure - Operating System
Operations - Operating System Services - System calls - Types of System Calls.
Process Management: Introduction to Process - Process Scheduling - Operations on Processes - Inter Process
Communication - Process Scheduling Criteria - and Scheduling Algorithms and its Evaluation. Multi-Threading
Models
Multilevel Scheduling (12+4) Hours
Unit II
Process Synchronization and Deadlocks
Process Synchronization: Introduction to Process synchronization - The Critical-Section Problem - Peterson‟s
Solution - Synchronization Hardware - Semaphores and Classical Problems of Synchronization using Semaphores
Deadlocks: System Model - Deadlock Characterization - Methods for Handling Deadlocks - Deadlock Prevention -
Deadlock Avoidance - Deadlock Detection - and Recovery from Deadlock.
Unit III
Memory Management
Memory Management: Introduction to Memory Management - Swapping - Contiguous Memory Allocation - Paging
- Segmentation.
Virtual Memory Management: Introduction to Virtual Memory Concept - Demand Paging - Copy on Write - Page
Replacement Algorithms - Allocation of Frames - Thrashing.
Memory Management by Intel (11+4) Hours
78
Department of Information Technology, GMRIT| Curriculum | Regulation 2016
Unit IV
File System and Secondary Storage Structure
File Concept - Access Methods - Directory Structure - File System Structure - Allocation Methods - Free-Space
Management.
Overview of Mass Storage Structure - Disk Structure - Disk Scheduling - RAID structures
UNIX File System
(11+3) Hours
Total: 45+15 Hours
Textbook (s)
1. Abraham Silberchatz, Peter B. Galvin and Greg Gagne, Operating System Concepts, 7th Edition, John
Wiley, 2005.
2. William Stallings, Operating Systems Internal Design Principles, 6th Edition, Pearson Education, 2005
Reference (s)
1. D.M.Dhamdhere, Operating systems, A Concept based Approach, 2nd Edition, TMH, 2006.
2. Crowley, Operating System A Design Approach, 1st Edition, TMH, 2001
3. Modern Operating Systems, Andrew S Tanenbaum, 3rd edition, PHI, 2009
Remember
1. List any four operating systems
2. Define operating system
3. List any four operating system services
Understand
1. Explain System calls
2. Explain the role memory management in operating system
3. Illustrate the working principle critical section problem
Apply
1. When multiple transactions are being executed by the operating system in a multiprogramming
environment, there are possibilities that instructions of one transaction are interleaved with some other
transaction. Apply the suitable concept to overcome the problem
2. Give an example of a scenario that might benefit from a file system supporting an append-only access
write.
12
Assignment test should contain only questions related to Higher Order Thinking (HOT) Skills pertaining to this course
79
Department of Information Technology, GMRIT| Curriculum | Regulation 2016
Analyze
1. Context switching between two threads of execution within the operating system is usually performed by a
small assembly language function. In general terms, what does this small function do internally?
2. Compare CPU scheduling algorithms
3. Analyze the general strategy behind deadlock prevention, and give an example of a practical deadlock
prevention method.
Evaluate
1. Assuming the operating system detects the system is deadlocked, what can the operating system do to
recover from deadlock?
2. Describe how to implement a lock using semaphores
80
Department of Information Technology, GMRIT| Curriculum | Regulation 2016
List of Experiments
1. Execute the following UNIX commands: cal - date - echo -bc -passwd - PATH - who -uname -pwd - cd -
mkdir -rmdir - cat -cp -rm - mv - more - ls -wc.
2. Execute the following UNIX commands: cmp -comm - diff - tar -df - du - mount -umount -chmod and vi
editor commands.
3. a) Write a shell script to accept three numbers and display the largest.
b) Write a shell script which will accept different numbers and find their sum.
c) Write a shell script to find the number of files in a directory.
4. a) Write a shell script to display first ten positive numbers using until loop.
b) Write a shell script to print the first 10 odd numbers using the while loop.
5. a) Write a sed command that deletes the first character in each line in a file.
b) Write a sed command that deletes the character before the last character in each line in a file.
c) Write a sed command that swaps the first and second words in each line in a file.
6. Implement the following forms of IPC. a) Pipes b) FIFO
7. Implement file transfer using Message Queue form of IPC.
8. Implementation of semaphore: Write a program that demonstrates how two processes can share a variable
using semaphore
9. To implement C Program to Catch Signals SIGINT - SIGKILL - SIGSTOP.
10. Write a c program to implement Two threads displaying two strings “Hello” and “How are you?”
independent of each other.
11. Design TCP iterative Client and Server application to reverse the given input sentence.
12. Design UDP Client Server to transfer a file.
List of Augmented Experiments12
1. Simulate the UNIX help main menu
2. Simulate the File Management Commands Sub-menu
3. Simulate the Text Processing Commands Sub-menu
4. Simulate the System Status Commands Sub-menu
5. Code for Shell Script to make a menu driven calculator using case in Unix / Linux / Ubuntu
6. Code for Shell Script to create a Menu Driven program : Hard Link - Soft Link - Counting each of the links
for a specific link and Display the soft-links in Unix / Linux / Ubuntu
7. Using the file input - do the following using sed - displaying the result on the screen
8. Create a chat server using Message Queue
9. Simulate alarm using Unix / Linux / Ubuntu alarm system call
10. Implement a game to create 1 master process and 10 racing processes where the master process is feeding a
pipe with "Win" - and then broadcast the signal SIGUSR1 to its group of process. When a racing process
12
Students shall opt any one of the Augmented Experiments in addition to the regular experiments
81
Department of Information Technology, GMRIT| Curriculum | Regulation 2016
gets the signal SIGUSR1 - it tries to read the pipe - the one getting the "Win" message is out for the rest of
the game. At the end of the game - each process has a number which is the round number in which it caught
the message "Win".
11. Simulate dice rolling.
12. Simulate Text editor in UNIX / Linux / Ubuntu
82
Department of Information Technology, GMRIT| Curriculum | Regulation 2016
List of Experiments
1. Design the following static web pages required for a Training and placement cell web site. 1) Home Page
2) Login Page 3) Registration page
2. 4) Company Details Page 5) Alumni Details Page 6) Placement Staff Details Page
3. 7) Student personal Info Page 8) Student Academic Info page 9) Semester Wise Percentage & their
Aggregate page
5. Apply different font styles, font families, font colors and other formatting styles to the above static web
pages.
6. Install wamp server and tomcat server, access above developed static web pages using these servers.
7. Write a servlet/PHP to connect to the database, Insert the details of the users who register with the web site,
whenever a new user clicks the submit button in the registration.
8. Write a JSP/PHP to connect to the database, Insert the details of the student academic information with
student academic info page.
9. User Authentication:
Assume four users user1user2, user3 and user4 having the passwords pwd1, pwd2, pwd3 and pwd4
respectively. Write a servlet for doing the following.
1. Create a Cookie and add these four user id‟s and passwords to this Cookie.
2. Read the user id and passwords entered in the Login form (week1) and authenticate with the values (user
id and passwords) available in the cookies.
If he is a valid user (i.e., user-name and password match) you should welcome him by name (user-name)
else you should display “You are not an authenticated user “.
Use init-parameters to do this. Store the user-names and passwords in the webinf.xml and access them in the
servlet by using the getInitParameters() method.
11. Write a JSP to insert the student‟s semester wise percentages and calculate aggregate and insert into
database.
12. Write a JSP to search the students according to their aggregate and produce sorted list or according to their
Enroll number.
83
Department of Information Technology, GMRIT| Curriculum | Regulation 2016
84
Department of Information Technology, GMRIT| Curriculum | Regulation 2016
List of Experiments
1. A. Familiarization with Networking Components and devices: LAN Adapters - Hubs -Switches - Routers
etc. B. Familiarization with Transmission media and Tools: Co-axial cable - UTP Cable - Crimping Tool -
Connectors etc.
2. Preparing the UTP cable for cross and direct connections using crimping tool.
3. Implement the data link layer framing methods: a. Character stuffing method b. Bit Stuffing method
4. Implement on a data set of characters the two CRC polynomials: CRC 12 - CRC 16
5. Implement on a data set of characters the CRC polynomials: CRC CCIP.
6. Implementation of sliding window protocol: go back n sliding window protocol
7. Implement Dijkstra„s algorithm to compute the Shortest path thru a graph.
8. Take an example subnet graph with weights indicating delay between nodes. Now Obtain Routing table art
each node using distance vector routing algorithm.
9. Take an example subnet of hosts. Obtain broadcast tree for it
10. To configure the IP address for a computer connected to LAN and to configure network parameters of a
web browser for the same computer.
11. Configuration of TCP/IP Protocols in Windows
12. A. Installing of internal modem and connecting to Internet. B. To configure WiFi for your PC.
13. Installation of NS2/NS3 tools and Overview
10
Students shall opt any one of the Augmented Experiment in addition to the regular experiments
85
Department of Information Technology, GMRIT| Curriculum | Regulation 2016
Soft Skills: Self Esteem: Definition? Types of Self Esteem, Causes of Low Self Esteem, Merits of Positive Self
Esteem and Steps to build a positive Self Esteem - JAM & J2M Sessions: Practice; Group Discussions (Practice):
GD? GD Vs Debate, Overview of a GD , Skills assessed in a GD, Dos & Don‟ts,& Conducting practice sessions &
Evaluation (Simple Topics) - Motivational Talk on Team Work: Team Vs Group? Stages in Team Building,
Mistakes to avoid and Lessons to Learn (Through Stories) - Self Introspection: Analyzing oneself to identify the
drawbacks, taking steps to overcome them in stages, Fortifying the Strengths further (through SWOT Analysis).
Quantitative Aptitude: Problems on numbers - H.C.F and L.C.M - Problems on ages – Averages - Time and Work
- Time & Distance – Percentages - Profit & loss - Ratio & Proportions – Partnership - Simple interest & Compound
interest – Clocks – Calendars - Pipes and Cisterns - Mensuration
Verbal reasoning: Number series - Direction test - Blood relations – Syllogisms - Seating arrangement -
Permutations, combinations and Probability – Dice - Cube and Cuboid - Data sufficiency - Logical deductions –
Analogies - Course of action - Cause and effect - Data interpretation
86
Department of Information Technology, GMRIT| Curriculum | Regulation 2016
1001
Course Outcomes
1. Illustrate the ongoing developments in Computer and Ethical Hacking Basics related to information
technologies
2. Explain cyber security and IT laws with related legislation relate to one another
Ethical Hacking & Security: Cyber Ethics-Hacking Introduction, Information Gathering, Scanning, Google
Hacking Database, Virus, Worms Virus Analysis, Trojans & Backdoors, Sniffers & key loggers, Proxy Servers &
VPNs, Social Engineering, Email, DNS, IP spoofing, Honey Pots, System Hacking & Security, Bots, Botnets &
DOS. Vulnerability Research, SQL Injection 1, SQL Injection 2, XSS Attacks & Countermeasures, LFI/ RFI
Attacks & Countermeasures , Information Disclosure Vulnerabilities, Buffer Overflow Attacks, Session Hijacking
Attacks, Hacking Web Servers, Vulnerability Assessment & Penetration Testing, Exploit Writing , Secure Coding
Practices, Wireless Hacking & Security, SMS Forging & Countermeasures, VoIP Hacking & Countermeasures
15 Hours
1. Justice Yatindra Singh, Cyber Laws, Universal Law Publishing Co, New Delhi, (2012)
2. Vasu Deva, Cyber Crimes and Law Enforcement, Commonwealth Publishers, New Delhi, (2003)
87
Department of Information Technology, GMRIT | Syllabi | Regulation 2016
COs–POs) Mapping
COs PO2 PO3
1 3 1
2 1 3
3 3 3
4 3 3
5 3 3
6 3 3
88
Department of Information Technology, GMRIT | Syllabi | Regulation 2016
Reference (s)
1. Introduction to Design and Analysis of Algorithms A strategic approach, R.C.T.Lee, S.S.Tseng, R.C.Chang and
T.Tsai, McGraw Hill.
2. Design and Analysis of algorithms, Aho, Ullman and Hopcroft,Pearson education.
3. Algorithms – Richard Johnson baugh and Marcus Schaefer, Pearson Education.
Remember
1. Define performance analysis of an algorithm.
2. Define recurrence relation
3. Define disjoint sets.
4. Define optimality principle
Understand
1. Explain back tracking algorithm
2. Explain Asymptotic notations
3. Explain the LC search algorithm
4. Explain the divide and conquer strategy. Write the applications of divide and conquer strategy and write the
control abstraction for divide and conquer strategy
5. Explain the 4 cases of master theorem
6.What are implicit and explicit constraints in back tracking ?
Apply
1. Solve the fractional knapsack problem with capacity m=20,W=(18,15,10),P=(25,24,15) for the optimum solution.
2. Create two arrays that store all even no‟s in one array and all odd no‟s in another array for a given set of elements
3. Find the space and time complexity of an algorithm to find the maximum element from an array.
1
Assignment test should contain only questions related to Higher Order Thinking (HOT) Skills Pertaining to this course
89
Department of Information Technology, GMRIT | Syllabi | Regulation 2016
6. Find the shortest tour for the TSP for the given graph using FIFOBB.
Analyze
1. Analyze the time complexity of quicksort .
2. Differentiate greedy method with dynamic approach
3. Discuss the worst case time complexity of travelling sales person problem
4. How polynomial multiplication is best with FFT
5. Compute the time complexity of fun()?
int fun(int n)
{ int count = 0;
for (inti = n; i> 0; i /= 2)
for (int j = 0; j <i; j++)
count += 1;
return count;
}
90
Department of Information Technology, GMRIT | Syllabi | Regulation 2016
Course Outcomes
1. Compare and identify the GSM - GPRS and Bluetooth software model for mobile computing.
2. Develop advanced data communicating methods and networking protocols for wireless and mobile
environments
3. Justify and employ application frameworks for developing mobile applications including under
disconnected and weakly connected environment
4. Categorize Critically and Security issues of mobile and wireless computing systems
5. Discover and implement simple mobile games
6. Develop applications that rely on wireless data communications including applications for the mobile
phone.
COs–POs Mapping
COS PO1 PO2 PO3 PO5
1 2 2 1 1
2 3 2 1 1
3 2 3 2 2
4 2 3 2 2
5 2 3 3 3
6 1 3 3 3
3-Strongly linked , 2-Moderately linked ,1-weakly linked
Unit I
Mobile Communications
Overview: Wireless transmission - voice and data communication standards-1G/2G/3G/4G - WPAN - WLAN -
applications-limitations-mobile computing architecture-overview on mobile devices and systems. Wireless Medium Access
Control: Motivation for a specialized MAC (Hidden and exposed terminals - Near and far terminals - MACA) - modulation
- Spread spectrum - SDMA - FDMA - TDMA – CDMA GSM: services - system architecture - radio interface - localization
- call handling - handover - security - GPRS -EDGE
Networking: communication modes - basic network designs - cellular infrastructure 11+4 Hours
Unit II
Mobile Network and Transport Layer
Mobile Network Layer: Mobile IP - IP packet delivery - agent advertisement and discovery - registration -
tunneling and encapsulation - optimizations - Dynamic Host Configuration Protocol Mobile Transport Layer: Traditional
TCP - Indirect TCP - Snooping TCP - Mobile TCP . 12+4 Hours
Multi Task gadget: wide area mobile data - air link standards for data - wireless application environment
Unit III
Mobile Ad hoc Network (MANET)
Introduction - Properties - applications - limitations - routing issues - routing algorithms-proactive (DSDV & OLSR) and
reactive (DSR & AODV).
Wireless Sensor Network (WSN): Introduction - architecture - applications - security in ad hoc networks
Wireless LAN: IEEE 802.11 - System architecture - Protocol layers.
Satellite systems: history - applications - basics - broad cast systems 10+3 Hours
Unit IV
Network Simulator:
Overview on different network simulators (NS2 - NS3 -Qualnet -Omnet++ -Netsim etc.) - configuration of MANET and
WSN on NS2/NS3.
Mobile OS: Overview on different mobile Oss (Android OS - Android OS architecture , IOS -architecture , black berry ) ,
App development examples ,Wireless Application Protocol (WAP): Introduction – architecture,
Application layer protocols - SMTP , FTP , DHCP, World Wide Web, Windows 10. 12+4 Hours
Total: 45+15 Hours
91
Department of Information Technology, GMRIT | Syllabi | Regulation 2016
Textbook (s)
1. Raj Kamal, Mobile Computing, Oxford press, 2nd Edition, 2012
2. Jochen Schiller, Mobile Communications, Pearson Education, 2ndEdition, 2003
Reference (s)
1. Asoke K Talukder, Hasan Ahmed and RoopaYavagal Mobile Computing, McGraw Hill, 2010
2. Prasant Kumar Pattnaik and Rajib Mall, Fundamentals of Mobile Computing, PHI Learning, 2012
3. http://www.isi.edu/nsnam/ns/doc/ns_doc.pdf (NS2 manual)
SAMPLE QUESTION(S)
Internal Assessment Pattern
Cognitive Level Int.Test 1(%) Int.Test 2(%) Assignment Test2 (%)
Remember 30 25 10
Understand 25 15 20
Apply 25 20 30
Analyze 20 20 30
Evaluate -- 10 10
Create -- 10 --
Total 100 100 100
Remember
Understand
Apply
Analyze
2
Assignment test should contain only questions related to Higher Order Thinking (HOT) Skills Pertaining to this course
92
Department of Information Technology, GMRIT | Syllabi | Regulation 2016
Evaluate
Create
93
Department of Information Technology, GMRIT | Syllabi | Regulation 2016
COs–POs Mapping
COs PO1 PO2 PO3
1 1 3 2
2 2 3 3
3 3 2 2
4 2 1 3
5 2 1 3
6 2 1 3
94
Department of Information Technology, GMRIT | Syllabi | Regulation 2016
Textbook (s)
1. J. E. Hopcroft and J. D. Ullman, Introduction to Automata Theory, Languages and Computation, 3 rd Edition,
Pearson/Addison Wesley, 2007
2. Mishra & Chandra Sekharan, Theory of Computer Science& Automata Language and Computation, 3 rd Edition,
Prentice Hall of India, 2007.
3. Alfred V Aho, Monical S Lam, Ravi Sethi, Jeffrey D. Ullman, Compilers, Principles Techniques and Tools, 2nd
Edition, Pearson, 2007.
4. V. Raghavan, Principles of Compiler Design, 2nd Edition, TMH, 2011.
Reference (s)
1. 1 P. Linz, Introduction to Formal Language and Computation, 2nd Edition, Narosa, 2006.
2. H. R. Lewis & C. H. Papadimitriou, Elements of the Theory of Computation, Prentice Hall of India, 2nd Edition -
2006.
3. Nandini Prasad, Principles of Compiler Design, 2nd Edition, Elsevier, 2012
4. Kenneth C Louden, Compiler Construction, Principles and Practice, 1st Edition, Cengage, 1997.
Remember
1. List out the different tuples of Deterministic Finite Automata
2. List out the closure properties of regular sets
3. State some software tools that manipulate source program.
4. List out the cousins of compiler.
Understand
1. Explain the procedure of simplification of CFG
2. Describe the types of Turing machines
3. Illustrate the pumping lemma with an example
4. Represent the Error-recovery actions in a lexical analyzer.
5. Formulate the roles and tasks of a lexical analyzer.
6. Illustrate Why lexical and syntax analyzers are separated out.
7. Identify the problems with top down parsing
Apply
1. Apply the Arden‟s theorem to convert the following Finite automata to Regular expression
3
Assignment test should contain only questions related to Higher Order Thinking (HOT) Skills Pertaining to this course
95
Department of Information Technology, GMRIT | Syllabi | Regulation 2016
2. Apply Pumping lemma to prove the language L={ a p / p is a prime number} is not regular
3. Eliminate UNIT productions from the CFG:
SA
AB
Ba/b/c
Analyze
Evaluate
96
Department of Information Technology, GMRIT | Syllabi | Regulation 2016
Requirements for modern data centres-high availability and Service Orientated-Infrastructures (SOI). Modern data centre
use case studies.
(10 +4) Hours
Unit IV
Cloud Computing Software Security Fundamentals
Data Security, Network Security, Host Security, Compromise Response.
97
Department of Information Technology, GMRIT | Syllabi | Regulation 2016
Cloud information Security Objectives, Cloud Security Services, Relevant Cloud Security Design Principles, Secure Cloud
Software Requirements, Approaches to Cloud Software Requirements Engineering, Cloud Security Policy Implementation.
Cloud Computing Risk Issues: The CIA Triad, Privacy and Compliance Risks, Threats to Infrastructure Data and Access
Control, Cloud Access Control Issues, Cloud Service Provider Risks.
Microsoft Azure , IBM Bluemix (10 +3) Hours
Total: (45+15) Hours
Textbook (s)
1. George Reese, Cloud Application Architectures, 1st Edition O‟Reilly Media, 2009
2. Ronald L.Krutz and Russell Dean Vines, Cloud Security, 1st Edition, Wiley Publishing, 2010
Reference (s)
1. Michael Miller, Cloud Computing-Web Based Applications that change the way you work and collaborate online,
1st Edition, Pearson Education, Publishing, 2011
2. Kai Hwang, Geoffrey C Fox and .Jack J.Dongarra, Distributed & Cloud Computing from Parallel Processing to the
Internet of Things , 1st Edition, MK Publishing, 2010
3. David S Linthicum, Cloud Computing and SOA Convergence in Your Enterprise: A Step-by-Step Guide, 1st
Edition, Addison-Wesley, 2009
SAMPLE QUESTION (S)
Internal Assessment Pattern
Cognitive Level Int. Test 1 (%) Int. Test 2 (%) Assignment Test4 (%)
Remember 40 45 20
Understand 40 45 60
Apply 20 10
Analyze -- -- 20
Evaluate -- -- --
Create -- -- --
Total (%) 100 100 100
Remember
1. Define Cloud Computing.
2. List types of virtualization.
3. Define proactive scaling.
4. What is CIA Triad?
Understand
1. Explain different cloud Infrastructure models.
2. Explain different levels of virtualization.
3. Explain about cloud Network security in detail.
4. Explain about Recovery Point Objective.
5. With neat diagram explain the functioning of Xen Architecture.
6. List and explain various cloud service providers risks.
Analyze
1. Compare cloud center and service infrastructure.
2. Analyze different cloud services provided by Amazon
4
Assignment test should contain only questions related to Higher Order Thinking (HOT) Skills Pertaining to this course
98
Department of Information Technology, GMRIT | Syllabi | Regulation 2016
(11+12) Hours
Unit III
Class & Object Diagrams and Advanced Structural Modeling
Classes-Relationships-and common Mechanisms. Class and object diagrams-Advanced classes-advanced relationships-
Interfaces-Packages. Forward and Reverse Engineering concepts,Events and signals-concepts of state machines and state
chart diagrams
Association classes-Abstract class
Practical Components
1. Suggest case study of Library management systems
2. Draw The Use case and Activity and State Chart Diagrams for Point of sale
(11+3)Hours
99
Department of Information Technology, GMRIT | Syllabi | Regulation 2016
Unit IV
Architectural Modeling
Introduction to Components-Component diagrams-Component vs. classes. Introduction to Deployment and deployment
diagrams. Deployment vs.component. Case Study: Online banking System.
Patterns and frameworks-Systems and models
Practical Components
1. Perform case study online banking system
2. Draw the Use Case, Activity, State Chart for Point of sale
(11+9)Hours
Total: 75 Hours
Textbook(s)
1. Grady Booch , James Rumbaugh and IvarJacobson, The Unified Modeling Language User Guide, 1st Edition
,Addison Wesley October 20, 1998
2. Ali Bahrami, Object Oriented Systems Development using the unified modeling language, 1 stEdition, TMH, 2008
Reference (s)
1. Meilir Page, Jones, Fundamentals of Object Oriented Design in UML, Pearson Education, 1999.
2. AtulKahate, Object Oriented Analysis & Design, The McGraw-Hill Companies, 2004.
Understand
1. Illustrate Conceptual model of UML
2. Illustrate object oriented modeling
3. Formulate Overview of interaction diagrams
Apply
1. Choose Case Study for Online banking System
2. Demonstrate a class diagram for University data base
3. Construct a use case diagram for Railway reservation system
Analyze
5
Assignment test should contain only questions related to Higher Order Thinking (HOT) Skills Pertaining to this course
100
Department of Information Technology, GMRIT | Syllabi | Regulation 2016
Evaluate
1. Judge Deployment vs. component Diagram
2.
4.
Choose a suitable diagram when it is a design phase
101
Department of Information Technology, GMRIT | Syllabi | Regulation 2016
103
Department of Information Technology, GMRIT | Syllabi | Regulation 2016
Soft Skills: Introduction to Campus Placements: Stages of Campus Placement, Skills assessed in Campus Placements &
How to get ready? - A Motivational Talk on Positive Thinking: Beliefs, Thoughts, Actions, Habits & Results (Success);
Resume Preparation: Resume? Templates? Mistakes to be avoided in a Resume, Steps to be followed in preparing it(with
examples) - Group Discussions: GD? Stages of a GD, Skills assessed in a GD, Blunders to be avoided, How to excel in a
GD? - GD-Practice: Practice sessions for the Students on different Topics including the contemporary issues with brief
inputs on each topic & feedback on their performance & Evaluation
Quantitative Aptitude: Problems on numbers - H.C.F and L.C.M - Problems on ages – Averages - Time and Work - Time
& Distance – Percentages - Profit & loss - Ratio & Proportions – Partnership - Simple interest & Compound interest –
Clocks – Calendars - Pipes and Cisterns - Mensuration
Verbal reasoning: Number series - Direction test - Blood relations – Syllogisms - Seating arrangement - Permutations,
combinations and Probability – Dice - Cube and Cuboid - Data sufficiency - Logical deductions – Analogies - Course of
action - Cause and effect - Data interpretation
104
Department of Information Technology, GMRIT | Syllabi | Regulation 2016
1001
Intended Learning Outcomes
1. Illustrate different data types, packages and calling functions in Ruby on Rails
2. Analyze MVC framework and apply development best practices learning methods
Ruby & Rails: Introduction to Ruby programming language. Ruby web programming & popularity, extension of the Ruby
programming language, Introduction to Rails, Rails framework for building websites, Rails supporting Principles: MVC
Design Pattern, COC - Convention over Configuration, Dry - Don’t Repeat Yourself. Ruby on Rails & full-stack: Ruby
on Rails over the front-end and the back-end. Web application, without the Back-end or front-end representation. Side-
effect of Ruby on Rails, HTML/CSS, JavaScript, and Ruby
15 Hours
Reading Material (s)
1. Ruby on Rails , Learn web development with rails by Michael Hartl, Tutorial, Commonwealth Publishers, New
Delhi, (2014)
105
Department of Information Technology, GMRIT | Syllabi | Regulation 2016
Unit III
System Design
Objectives-Features to be designed-Managing the design process-Managing EndUser development system Design of
output-Design of Input and control-Design of online dialogue-Design of Files and Databases.
Approaches to Development-Systems Development Life Cycle
(12+4) Hours
Unit IV
System Engineering and Quality Assurance
Designing reliable and maintainable system-Program Structure charts-Software Modules-Coupling-Cohesion. Software
Design and documentation Tools: Structured flowchart-HIPO-Wamier/Orr diagrams. Managingquality Assurance-
Assessing system Reliability-Testing Strategies-Documentation. Managing System Implementation: Training Conversion
Methods-Data and File Preparation-post implementation review. Managing Information system Development: Estimation
and management of development Time-Personnel and Development Management-structured walkthroughs. Selection of
106
Department of Information Technology, GMRIT | Syllabi | Regulation 2016
Hardware and Software: Hardware Selection-Determining size and capacity requirements. Computer Evaluation-
plugcompatible equipment-financial Factors-Maintenance and Support-Software Selection.
Modular Programming and the Top-Down Approach-Auditing
(13+3) Hours
Total: (45+15) Hours
Textbook(s)
1. A. James &Senn, Analysis and Design of Information Systems, 2nd Edition MCGRAW-HillEdu, 2008
2. Arthur M. Langer ,Analysis and Design of Information Systems 3rd Edition , SpringerSpringer Science &
Business Media, 2007
Reference(s)
1. Preeti Gupta, System Analysis and Design 2nd Edition, Firewall Media, 2008
SAMPLE QUESTION (S)
Internal Assessment Pattern
Cognitive Level Int. Test 1 (%) Int. Test 2 (%) Assignment Test6 (%)
Remember 35 20 --
Understand 30 30 --
Apply 25 30 80
Analyze 10 20 20
Evaluate -- -- --
Create -- -- --
Total (%) 100 100 100
Remember
1. What are the components of Information systems?
2. List out various layers that consists information system architecture.
3. What is top-down programming structure?
4. Define software metrics.
Understand
1. Represent the block diagram of system development life cycle.
2. Draw the salient features of accounting information system.
3. Indicate how to apply competitive strategy concepts to the strategic role of information systems.
4. Contrast Physical system design activity in detail
Apply
1. Write statements that perform the following one-dimensional-array operations
2. Find traditional system life cycle approach for building information systems.
3. Show how IT enables systems are useful for solving real world business problems
4. Demonstrate the Physical components required fororganizational information system
Analyze
1. Justify how to apply competitive strategy concepts to the strategic role of information systems.
2. Identify 4 fact finding techniques, giving one different advantage and one different disadvantage of each.
3. Compare the concept of Data Flow Diagram (DFD) from that of Decision Table.
4. Differentiate the terms Physical Model and Logical Model as used in System design process
6
Assignment test should contain only questions related to Higher Order Thinking (HOT) Skills Pertaining to this course
107
Department of Information Technology, GMRIT | Syllabi | Regulation 2016
COs–POs Mapping
COs PO2 PO3 PO5
1 3 2 1
2 2 3 1
3 3 2 2
4 3 2 1
5 2 3 2
6 2 2 1
3–Strongly linked | 2–Moderately linked | 1–Weakly linked
Unit I
Introduction & Output primitives
Application of Computer Graphics- overview of graphics systems-raster scan systems-random scan systems-raster scan
display processors
Output primitives :Points and lines-line drawing algorithms(Bresenham‟s and DDA Line derivations and algorithms)-mid-
point circle and ellipse algorithms. Filled area primitives: Inside and outside tests-Scan line polygon fill algorithm-
boundary-fill and flood-fill algorithms.
Graphics monitors-work stations and input devices
(11+4) Hours
Unit II
2-D Geometrical transforms & 2D-Viewing
Translation-scaling-rotation-reflection and shear transformations-matrix representations and homogeneous coordinates-
composite transforms-transformations between coordinate systems.
2-D viewing:The viewing pipeline-viewing coordinate reference frame-window to view-port coordinate transformation-
viewing functions-Cohen-Sutherland and Cyrus beck line clipping algorithms-Sutherland –Hodgeman polygon clipping
algorithm.
Transformation Functions and raster methods for transformations (11+4) Hours
Unit III
3-D object representation-Transformations & Visible Surface Detection Methods
Polygon surfaces-quadric surfaces- spline representation -Hermite curve-Bezier curve and B-Spline curves-Bezier and B-
Spline surfaces.3-D Geometric transformations:Translation-rotation-scaling-reflection and shear transformations-composite
transformations. 3D Viewing pipeline-clipping-projections ( Parallel and Perspective).
Visible surface detection methods:Classification-back-face detection-depth-buffer-scan-line-depth sorting -BSPtree
methods-area sub-division and octree methods.
Basic illumination models-polygon rendering methods
(11+4) Hours
Unit IV
108
Department of Information Technology, GMRIT | Syllabi | Regulation 2016
Reference (s)
1. Newman W.M. and Sproull R.F., Principles of Interactive Computer Graphics, 2ndEdition, Tata McGraw Hill
Publishing Company Limited, New Delhi, 1997.
2. S. Harrington, Computer Graphics, A Programming Approach, MGH Publication, New Delhi, 1994.
3. J.D. Foley et. Al, A Fundamental of Computer Graphics, Addition Wesley, London, 1993.
SAMPLE QUESTION (S)
Internal Assessment Pattern
Cognitive Level Int. Test 1 (%) Int. Test 2 (%) Assignment Test7 (%)
Remember 20 35 --
Understand 35 35 --
Apply 35 20 40
Analyze 10 10 40
Evaluate -- -- 20
Create -- -- --
Total (%) 100 100 100
Remember
1. List the applications of computer graphics
2. Write 2D transformation matrix for translation, rotation and scaling
3. Define parallel projection
4. List the steps to design computer animation
Understand
1. Explain Bresenham‟s Line drawing algorithm
2. Explain Sutherland-Hodgeman polygon clipping algorithm
3. Write about Depth sorting visible surface detection method
4. Explain about Lossless Image Compression.
Apply
7
Assignment test should contain only questions related to Higher Order Thinking (HOT) Skills Pertaining to this course
109
Department of Information Technology, GMRIT | Syllabi | Regulation 2016
1. Draw a circle with center (5,8) and radius 7 units using Midpoint circle generation algorithm
2. Obtain the reflection of a point A(10, 10) with respect to the line y=x+2
3. Use Cohen Sutherland clipping algorithm to clip two lines p1p2 and p3p4 with p1(40,15) p2(75,45) p3(70,20)
p4(100,10) against window a(50,10) b(80,10) c(80,40) d(50,40)
4. Clip the polygon v1-v6 against the window ABCD. Assume any convenient numerical values for the vertices
preserving the information containing the figure. Employ Sutherland-Hodgeman algorithm
Analyze
1. Compare raster scan and random scan systems
2. Write the functionalities of B-spline curves
3. Test the Bresenham‟s line drawing algorithm to draw a line between the points (20,10) and (30,18)
4. Compare and contrast parallel and perspective projections
110
Department of Information Technology, GMRIT | Syllabi | Regulation 2016
COs–POs Mapping
COs PO 2 PO 3
1 3 3
2 3 2
3 3 2
4 3 3
5 2 2
6 2 2
3–Strongly linked | 2–Moderately linked | 1–Weakly linked
Unit I
Real-Time Systems
Introduction: Real time definition - Applications of Real-Time systems - A basic model of Real-time system -
Characteristics of Real-time system - Safety and Reliability - Types of Real-time tasks - timing constraints - Modeling
timing constraints Some important concepts - Types of Real-time tasks and their characteristics - Task scheduling - Clock-
Driven scheduling - Hybrid schedulers - Event-Driven scheduling - Earliest Deadline First (EDF) scheduling.
Identify some RTOS for review - Embedded Programming in C
11 + 4 Hours
Unit II
Scheduling Periodic Tasks
Rate monotonic algorithm (RMA). Some issues associated with RMA. Issues in using RMA practical situations.Handling
Resource Sharing and dependencies among Real-time Tasks: Resource sharing among real-time tasks.Priority inversion.
Priority Inheritance Protocol (PIP) - Highest Locker Protocol (HLP) - Priority Ceiling Protocol (PCP).Different types of
priority inversions under PCP. Important features of PCP - Some issues in using a resource sharing protocol. Handling task
dependencies
Memory Management - and PortingμCos
11 + 4 Hours
Unit III
Scheduling Real-Time Tasks in Multiprocessor and Distributed Systems
Multiprocessor task allocation - Dynamic allocation of tasks - Fault tolerant scheduling of tasks - Clock in distributed Real-
time systems - Centralized clock synchronization Commercial Real-time operating systems: Time services - Features of a
Real-time operating system - Unix as a Real-time operating system - Unix-based Real-time operating systems - Windows as
a Real-time operating system - POSIX-RT - A survey of contemporary Real-time operating systems. Benchmarking real-
time systems
RTOS for fault Tolerant Applications
11 + 4 Hours
Unit IV
111
Department of Information Technology, GMRIT | Syllabi | Regulation 2016
Cognitive Level Int. Test 1 (%) Int. Test 2 (%) Assignment Test8 (%)
Remember 25 15 10
Understand 35 25 20
Apply 20 35 30
Analyze 20 25 20
Evaluate -- -- 10
Create -- -- 10
Total (%) 100 100 100
Remember
Understand
Apply
1. In a real time system what is the difference between a performance constraint and a behavioral constraint? Give
practical examples of each type of constraint.
2. Draw a schematic model showing the important components of a typical hard real system. Explain the working of
output interface using a suitable schematic diagram. Explain using a suitable circuit diagram how analog to digital
conversion is achieved in an output interface.
8
Assignment test should contain only questions related to Higher Order Thinking (HOT) Skills Pertaining to this course
112
Department of Information Technology, GMRIT | Syllabi | Regulation 2016
3. Draw a schematic model showing the important components of a typical hard real system. Explain the working of
input interface using a suitable schematic diagram. Explain using a suitable circuit diagram how digital to analog
conversion is achieved in an input interface.
Analyze
1. Is it possible to have an extremely safe but unreliable system? If your answer is affirmative, then give example of
such a system. If your answer is no, then explain why such a system is not possible to exist.
2. Identify the constraints that a set of periodic real-time tasks need to satisfy for RMA to be optimal scheduler for
the set of tasks?
3. Compare the performance of IEEE 802.4 protocol with IEEE 802.5 protocol for real-time applications at high,
medium and low bandwidths.
113
Department of Information Technology, GMRIT | Syllabi | Regulation 2016
3103
Course Outcomes
1. Explain basic principles of engineering economics
2. Apply cost-volume-profit (CVP) analysis in their business decision making
3. Evaluate investment proposals through various capital budgeting methods
4. Apply the knowledge to prepare the simple financial statements for measuring performance of business firm
5. Analyze key issues of organization, management and administration
6. Evaluate project for accurate cost estimates and plan future activities
COs – POs Mapping
COs PO11
1 2
2 1
3 2
4 3
5 1
6 3
Unit I
Introduction to Engineering Economics - Demand Forecasting & Cost Analysis
Concept of Engineering Economics – Types of efficiency – Managerial Economics Nature and Scope – Law of Demand –
Types of Elasticity of demand.Demand Forecasting & Cost Analysis:Demand Forecasting: Meaning, Factors Governing
Demand Forecasting, Methods of Demand Forecasting (Survey and Statistical Methods) – Cost Analysis: Basic Cost
Concepts, Break Even Analysis.
Factors affecting the elasticity of demand – Supply and law of Supply.
(10 + 3)Hours
Unit II
Investment Decisions & Market Structures - Financial Statements & Ratio Analysis
Time Value of Money – Capital Budgeting: Meaning, Need and Techniques of Capital Budgeting –Types of Markets
Structures – Features – Price Out-put determination under Perfect Competition and Monopoly.Financial Statements & Ratio
Analysis:Introduction to Financial Accounting – Double entry system – Journal – Ledger – Trail Balance – Final Accounts
(with simple adjustments) – Financial Analysis through Ratios: Interpretation of Liquidity Ratios (Current Ratio and quick
ratio), Activity Ratios (Inventory turnover ratio and Debtor Turnover ratio, Creditors Turnover Ratio, Capital Turnover Ratio),
Solvency Ratios (Debt- Equity ratio, Interest Coverage ratio), and Profitability ratios (Gross Profit Ratio, Net Profit ratio,
Operating Ratio, P/E Ratio and EPS).
Price output determination under Monopolistic markets, Accounting concepts and conventions
(11 + 6)Hours
Unit III
Introduction to Management - Strategic Management
Introduction to Management: Nature – Importance – Classical Theories of Management: F.W.Taylor‟s and Henri Fayol‟s
Theory – Functions and Levels of Management – Decision Making Process.
Methods of Production (Job, Batch and Mass Production) - Inventory Control, Objectives, Functions – Analysis of
Inventory – EOQ.
Maslow & Douglas Mc.Gregor theories of Management, ABC Analysis
(12 + 2)Hours
Unit IV
Project Management
Introduction – Project Life Cycle and its Phases – Project Selection Methods and Criteria – Technical Feasibility – Project
Control and Scheduling through Networks – Probabilistic Models of Networks – Time-Cost Relationship (Crashing) –
Human Aspects in Project Management: Form of Project Organization – Role & Traits of Project Manager.
114
Department of Information Technology, GMRIT | Syllabi | Regulation 2016
Remembering
1. Define Managerial Economics. Explain its nature and scope
2. Explain the concept of efficiency? What are the serveral methods to enhacing the economic efficiency?
3. Define Production Function? What are the various types of production functions
4. What is meaning of productivity? Explain how productivity can be enhanced in the Indian industries
5. How are projects “unique” and „temporary as defined by PMBOK?
Understanding
1. What do you understand by engineering economics? Discuss
2. What is law of demand? Explain its exceptions
3. Explain different elements of costs used in cost analysis
4. Illustrate the effect of price on demand and supply with the help of a diagram
5. Compare and contrast long-run equilibrium under monopolistic competition with that under perfect competition.
Application
1. Determine price elasticity of demand given that the quantity demand of a product is 1000 units when the price is
Rs.100 and when the price declines to Rs.70, demand increases to 1100 units.
2. Consider the following data of company for the year 2015
Sales = Rs.2,40.000/-
Fixed cost = Rs.50,000/-
Variable caost = Rs.75,000/-
Find our the followings
a) Contribution
b) Profit
c) BEP
9
Assignment test should contain only questions related to Higher Order Thinking (HOT) Skills Pertaining to this course
115
Department of Information Technology, GMRIT | Syllabi | Regulation 2016
d) Margin of safety
3. “Every debit must have a corresponding credit” Explain.
4. Identigy the factors that are to be diagnosed both in the external and the internal environment to make enough
ground for strategy formulation. Illustrate appropriately
5. “Poor technology selection can lead to total failure for a manufacturing firm”, Do you agree? Give reasons in
support of your answer with suitable examples
Analysis
1. “Management is regarded as an art by some, science by othes”. In the light of this statement, explain the exact
nature of management.
2. Make a comparative analysis of the features of different methods of production.
3. Analyse the Discounted Cash Flow (DCF) technique for appraising large investment decisions.
4. Is there any lind between mission, goal, objective, strategy and programmes in an industrial environment?
5. Compare and contrast the project evaluation and review technique (PERT) with the critical path method (CPM)
Evaluate
4. From the following information calculate ARR of the project, with initial cost of Rs.2,00,000/- and scrap value is
Rs.10,000/.
Year Project
1 20000
2 50000
3 70000
4 60000
5 40000
Activity to tm tp
1-2 2 5 14
1-3 3 12 21
2-4 5 14 17
3-4 2 5 8
4-5 1 4 7
3-5 6 15 30
a) Construct the network
b) Find the project duration
c) Identify the critical path
Create
1. Discuss the flow of goods, services, resources and money payments in a simple economy with the help of a
suitable diagram.
2. Sketch and explain the demand relationship in each of the following statements.
a. I would never buy a Britney Spears CD! You couldn‟t even give me one for nothing.
116
Department of Information Technology, GMRIT | Syllabi | Regulation 2016
b. I generally buy a bit more coffee as the price falls. But once the price falls to Rs.2/-, I‟ll buy out the entire
stock of the supermarket.
c. I spend more on orange juice even as the price rises. (Does this mean that I must be violating the law of
demand?)
3. “Managerial Economics is the discipline which deals with application of economic theory to business
management”, Discuss.
4. How information technology has enabled the development of project management in recent times?
5. „GE Matrix is an extension of BCG Matrix‟, Discuss.
117
Department of Information Technology, GMRIT | Syllabi | Regulation 2016
3 024
Course Outcomes
1. Process raw data by applying relevant preprocessing techniques to make it suitable for various data mining
algorithms.
2. Discover and measure interesting patterns from different kinds of databases.
3. Apply the techniques of clustering, classification, association finding, feature selection and visualization to real
world data.
4. Become aware of ethical issues that are present in data mining applications.
5. Evaluate models/algorithms of data mining techniques with respect to their accuracy
6. Demonstrate capacity to perform a self-directed piece of practical work that requires the application of data mining
techniques
COs–POs Mapping
COs PO2 PO3 PO5 PO6
1 3 1 1 1
2 3 1 2 2
3 3 3 2 2
4 1 3 1 1
5 2 1 3 2
6 3 2 2 2
3–Strongly linked | 2–Moderately linked | 1–Weakly linked
Unit I
Introduction to Data Mining and Warehousing
Overview of Data warehouse-Data Warehouse Architecture-Introduction to Data Mining-Basic Data Mining Tasks-Data
Mining Issues-Data Mining Metrics-Different sources of Data Mining-Data Mining and KDD-Types of Data-Data
Preprocessing-Statistical Perspective on Data Mining-Similarity Measures-Examples of Proximity Measures-Issues in
Proximity Calculations-Selection of the Right Proximity Measure
Data Mining Primitives-Concept Description: Characterization and Comparison
Practical Components
1. Introduction to Graphical User Interface (GUI) of WEKA
2. Introduction to IBM SPSS Modeler and Nodes Palette
3. Perform Data Pre-processing on sample data set
11+9 Hours
Unit II
Mining Association Rules in Large Databases
Association Rule Mining-Mining Single-Dimensional Boolean Association Rules from Transactional
Databases-Mining Multilevel Association Rules from Transaction Databases-Mining Multidimensional
Association Rules from Data sources-From Association Mining to Correlation Analysis-Constraint-Based
Association Mining
Evaluation of Association Patterns-Effect of Skewed support distribution
Practical Components
1. Perform Association Analysis to derive the association rules using Aprioriand FP-Growth Algorithm.
2. Preparing the data for analysis using data audit node.
12+6 Hours
Unit III
Classification of Data
Preliminaries-General Approach to Solving Classification Problem-Decision Tree Induction-Rule-based Classifier-Nearest-
Neighbor Classifiers-Bayesian Classifiers-Artificial Neural Network
118
Department of Information Technology, GMRIT | Syllabi | Regulation 2016
Reference (s)
1. Margaret H Dunham, Data Mining Introductory and advanced topics, 2nd Edition, Pearson Education, 2004
2. Arun K Pujari, Data Mining Techniques, 2nd Edition, University Press, 1999.
3. Ian H. Witten, Eibe Frank, Mark A. Hall, Data Mining:Practical Machine Learning Tools and Techniques, 3rd
Edition, Morgan Kaufmann Publishers, 2011
Remember
1. What are the steps in the data mining process?
2. What is Descriptive and predictive data mining?
3. What is Data Generalization?
4. What is clustering?
5. Define Spatial Databases.
Understand
1. What are the requirements of clustering?
10
Assignment test should contain only questions related to Higher Order Thinking (HOT) Skills Pertaining to this course
119
Department of Information Technology, GMRIT | Syllabi | Regulation 2016
Analyze
1. Identify the different types of data repositories on which mining can be performed
2. Compare the parametric methods and non-parametric methods of reduction
3. Differentiate the types of data in cluster analysis.
4. Justify Additional themes in data mining
5. Criticize over the data quality is so important in a data warehouse environment
Evaluate
1. Judge the attributes requirement for high performance data mining
2. Determine the data visualization help in decision-making
3. Select the factors to be considered while selecting the sample in statistics
120
Department of Information Technology, GMRIT | Syllabi | Regulation 2016
1. Demonstrate knowledge and understanding of the security and ethical issues of the Internet of Things
2. Conceptually identify vulnerabilities, including recent attacks, involving the Internet of Things
3. Conceptually describe countermeasures for Internet of Things devices
4. Analyze the societal impact of IoT security events
5. Develop critical thinking skills
6. Compare and contrast the threat environment based on industry and/or device type
COs–POs Mapping
Unit I
IoT Concepts and Architectures
Introduction - Internet of Things Definition Evolution - IoT Architectures - Resource Management - IoT Data
Management and Analytics - Communication Protocols - Internet of Things Applications – Security - Identity
Management and Authentication – Privacy - Standardization and Regulatory Limitations
Open Source Semantic Web Infrastructure for Managing IoT Resources in the Cloud
11+3 Hours
Unit II
Device/Cloud Collaboration Framework & Fog Computing
Device/Cloud Collaboration Framework: Powerful Smart Mobile Devices - Runtime Adaptation Engine - Privacy-
Protection Solution. Applications of Device/Cloud Collaboration: Context-Aware Proactive Suggestion - Semantic
QA Cache - Image and Speech Recognition.
Fog Computing: Definitions and Characteristics - Reference Architecture – Applications - Research Directions and
Enablers - Commercial Products - Case Study on SMART City
IoT Enablers and Solutions
11+4 Hours
Unit III
Virtualization on Embedded Boards as Enabling Technology for the Cloud of Things
Cloud and Fog Computing - Three Delivery Models of Fog and Cloud-of-Things Computing - Machine Reference
Model With its Three Interface Levels - Virtualization Technique Taxonomy - Hardware-Level and Process-Level
Virtualization Taxonomy - ARM Virtualization Extensions - XEN ARM Virtualization - KVM ARM Virtualization
- Virtualization and Real-Time
Micro Virtual Machines (MICROVMS) For Cloud assisted Cyber-Physical Systems (CPS): Virtual Machines and
Micro Virtual Machines - Architecture for Deploying Cps in the Cloud and the Expansion of the IoT - Extending the
Possibilities of the IoT by Cloud Computing - Micro Virtual Machines with the Sensor Observation Service and
Path Between Smart Objects and CPS
IoT Architecture for Selected Use Cases: eHealth, Precision Agriculture and Domotic 12+4 Hours
121
Department of Information Technology, GMRIT | Syllabi | Regulation 2016
Unit IV
Stream Processing In IoT: Foundations, State-Of-The-Art and Future Directions
Stream Processing in the System Architecture of IoT - Comparison of the Stream Model and the Batch Model -
Differences Between Two Use-Cases of Stream Processing: DSMS and CEP - The Characteristics of Stream Data in
IoT - General Architecture of a Stream Processing System in IoT - Continuous Logic Processing System -
Challenges and Future Directions
Framework for Distributed Data Analysis for IoT: Anomaly Detection - Problem Statement and Definitions -
Distributed Anomaly Detection - Efficient Incremental Local Modeling
Home Temperature Monitoring System, Raspberry Pi Platform, Introduction to Object Orientation Programming
(OOP) with Java, Webcam and Raspberry Pi Camera Projects
1. Rajkumar Buyya, Amir Vahid Dastjerdi, “Internet of Things: Principles and Paradigms,” Elsevier 2016
Reference (s)
1. Dieter Uckelmann, Mark Harrison, Florian Michahelles, Architecting the Internet of Things, Springer,
2011
2. Luigi Atzor, The Internet of Things: A survey, Journal on Networks, Elsevier Publications, 2010
3. http://postscapes.com/
4. http://www.theinterntofthings.eu/what-is-the-internet-of-things
SAMPLE QUESTION (S)
Internal Assessment Pattern
Cognitive Int. Test 1 Int. Test 2
Assignment Test8 (%)
Level (%) (%)
Remember 20 25 --
Understand 30 25 30
Apply 25 10 30
Analyze 25 20 20
Evaluate -- 20 20
Create -- -- --
Total (%) 100 100 100
Remember
Assignment Test should contain only questions related to Higher Order Thinking (HOT) Skills
122
Department of Computer Science and Engineering, GMR Institute of Technology (GMRIT) | Regulation 2016
Understand
1. Identify the evolutionary terms of Internet of Things (IoT) that use to interact and live with the physical objects.
2. Illustrate the reference architecture of IoT that unifies the smart objects and human beings to provide the
ubiquitous communication
3. Illustrate the service-oriented architecture of IoT that ensures the interoperability among the heterogeneous
devices
4. Illustrate the API-Oriented Architecture of IoT that use SOAP and Remote Method Invocation (RMI) as a
means for describing, discovering, and calling services
5. Discuss the resource capacity, selecting and provisioning the resources that greatly impact Quality of Service
(QoS) of the IoT applications
6. Classify the taxonomy of resource management activities of IoT.
7. Report the standard requirement of real time analytics to fulfill the demand of real-time stream processing
engine.
Apply
1. Interpret a study analysis on open-source prototyping platform for the industrial IoT.
2. Implement a suitable OPENIoT Architecture for IoT/Cloud Convergence that provides an abstract presentation
of the functional elements of architecture.
3. Sketch W3C SSN-XG ontology and how to semantically enable real time sensor feeds
4. Execute the two-tier data dissemination model for large-scale wireless sensor network
5. Demonstrate SPARQL query caching in order to improve the performance of semantic web applications
6. Illustrations a technique to cluster semantically similar QA pairs for retrieving an answer for a newly given
query without asking the QA engine on the cloud side
Analyze
1. Comparative analysis on real-time analytics in Cloud-IoT and fog computing.
2. Compare the communication efficiencies for the following protocols such as AMPQ, CoAP, DDS, MQTT,
UPnP and XMPP in terms of Transport Layer Protocols.
3. Differentiate the major significances of nesC, keil C and Dynamic C.
4. Relate a set of minimal features to be fulfilled by the programming frameworks for IoT.
5. Comparative analysis on IoT programming approaches
Evaluate
1. Select an example that utilizes the device-collaboration framework for the proactive suggestion application
2. Appraise a semantic QA cache that implement the device/cloud collaboration framework to compute the
probability of the on-device semantic QA cache to answer a given query correctly.
3. Select a suitable example that use automatically tagging recognized images to display the additional information
such as social sentiment in order to achieve similar performance improvement for speech-recognition
application with DL through device/cloud collaboration framework
4. Critique on fog-computing assisted distributed analytics system that uses a set of fall-detection algorithms,
including algorithms based on acceleration measurements and time-series analysis methods, as well as filtering
techniques to facilitate the fall-detection process.
123
Department of Information Technology, GMRIT| Curriculum | Regulation 2016
88
Department of Information Technology, GMRIT| Curriculum | Regulation 2016
Textbooks (s)
1. E.Rich K.Knight, and B. Nair, Artificial Intelligence, 3rdEdition, TMH, 1 July 2017
2. Russel Norvig, Artificial Intelligence A modern Approach, 3rd Edition, Pearson Education,2010
Reference (s)
1. Patrick henry Winston,Artificial Intelligence, third edition,Pearson Education Asia, 2005
2. Dan W. Patterson, Introduction to Artificial intelligence and Expert Systems, 2 nd Edition, PHI,2009
Remember
1. State the tasks which are associated with A.I.
2. Give an example of cript-arithmetic problem.
3. Define Script
4. Recall Intelligence
Understand
1. Explain Turing Test.
2. Explain the characteristics of production system.
3. Write A* algorithm in detail and explain its functionality to solve 8-puzzle problem.
4. Explain the semantic analysis phase done through case grammars in Natural Language understanding
Apply
11
Assignment test should contain only questions related to Higher Order Thinking (HOT) Skills Pertaining to this course
89
Department of Information Technology, GMRIT| Curriculum | Regulation 2016
MONEY
Create
1. The function h‟ is an estimator of h of best-first search algorithm. Explain what is done in the algorithm if
h‟ underestimates h and h‟ overestimate h.
2. Write A* algorithm in detail and explain its functionality to solve 8-puzzle problem.
3. Consider the problem of finding cloths to wear in the morning. To solve this problem, it‟s necessary to use
knowledge such as:
Wear jeans unless either they are dirty or you have a job interview today.
Were a sweater if it‟s cold.
It‟s usually cold in the winter.
Wear sandals if it‟s warm
It‟s usually warm in the summer.
Build a JTMS-style database of the necessary facts to solve this problem.
90
Department of Information Technology, GMRIT| Curriculum | Regulation 2016
The Internet of Things (IoT) is a system of interrelated computing devices, mechanical and digital machines,
objects, animals or people that are provided with unique identifiers and the ability to transfer data over a
network without requiring human-to-human or human-to-computer interaction.
List of Experiments
1. Accident Detection System.
2. Health Monitoring System.
3. Traffic congestion detection System.
4. Surveillance Systems.
5. Home Security Systems/ Automation System.
6. “Next generation” IoT applications must be able to capture, collect, interpret, and act on vast
amounts of information – detecting connectivity gaps, handling interruptions, and meeting
specific business and industry requirements.
91
Department of Information Technology, GMRIT| Curriculum | Regulation 2016
Soft Skills: Overview of Employability Skills: Skills required for excelling in both the GDs and Interviews -
Interview Skills: Interview? Types of Interview, Dos & Don‟ts, Skills assessed in an Interview, Mistakes to be
avoided, How to equip oneself to excel? How to handle the Typical Interview Questions? (With Examples) - Mock
Interviews (HR Round): Practice sessions with Feedback & Evaluation - Email Writing: Practice - Motivational
Talk: (Case specific) such as “Building Confidence” or “Emotional Intelligence”
Quantitative Aptitude: Problems on numbers - H.C.F and L.C.M - Problems on ages – Averages - Time and Work
- Time & Distance – Percentages - Profit & loss - Ratio & Proportions – Partnership - Simple interest & Compound
interest – Clocks – Calendars - Pipes and Cisterns - Mensuration
Verbal reasoning: Number series - Direction test - Blood relations – Syllogisms - Seating arrangement -
Permutations, combinations and Probability – Dice - Cube and Cuboid - Data sufficiency - Logical deductions –
Analogies - Course of action - Cause and effect - Data interpretation
92
Department of Information Technology, GMRIT| Curriculum | Regulation 2016
COs-POs Mapping
COs PO2 PO7
1 3 1
2 3 2
3 2 3
4 3 1
5 2 3
6 2 3
3–Strongly linked | 2–Moderately linked | 1–Weakly linked
Unit I
Introduction to Distributed systems
Definition of Distributed systems-goals of distributed systems-types of distributed systems-Distributed system
architecture-architectural styles-system architectures-Communication Fundamentals-Remote Procedure Call-
Message-Oriented Communication-Stream-Oriented Communication-Multicast Communication.
The node addition algorithm-Application level multicasting
(10+5 )Hours
Unit II
Naming, Synchronization, Consistency and Replication
Names-Identifiers-and Addresses-Flat Naming-Structured Naming-Attribute-Based ,Clock Synchronization-Stream
Synchronization-Synchronization Mechanisms-Logical Clocks-Physical clocksIntroduction-Data-Centric
Consistency Models-Client-Centric Consistency Models-Consistency Protocols.
Framework for Consistency-Multiprocess Systems-SessionGuarantees
(10+3) Hours
Unit III
Fault Tolerance&Distributed File Systems
Introduction to Fault Tolerance-Process Resilience-Reliable Client-Server Communication-Reliable Group
Communication-peer to peer communications-Distributed Commit-Recovery.Introduction to distributed file
systems-Architecture-Process-communications-consistency and replication-Sun network file system
Server Message Block-Andrew File System
(12+4 )Hours
Unit IV
Distributed Transactions&Coordination and Agreement:
Introduction-Flat and nested distributed transitions-Atomic commit protocol-concurrency control in distributed
transactions-distributed dead locks-Transaction and recovery.Introduction-Distributed Mutual exclusion-Elections-
multi cast communication-consensus and related problems.Case study: CORBA RMI-CORBA Services.
A ring based election algorithm-Maekawa’s algorithm
13+3 Hours
Total: 45+15 Hours
93
Department of Information Technology, GMRIT| Curriculum | Regulation 2016
Textbook(s)
1. Andrew S.Tanenbaum and Maarten Van Steen,Distributes Systems Principles and paradigms,-Second
Edition, Prentice Hall, 2002
2. George Coulouris , Jean Dollimore& Tim Kindberg , Distributed Systems: Concepts and Design , 4 th
Edition, Addison-Wesley, 2005
Reference(s)
1. Andrew S.Tanenbaum, Distributed Operating Systems, Pearson Education, 1995
SAMPLE QUESTION (S)
Internal Assessment Pattern
Cognitive Level Int. Test 1 (%) Int. Test 2 (%) Assignment Test12 (%)
Remember 25 20 --
Understand 35 35 --
Apply 30 35 70
Analyze 10 10 30
Evaluate -- -- --
Create -- -- --
Total (%) 100 100 100
Remember:
1. List three properties of distributed systems.
2. List some disadvantages or problems of distributed systems that local only systems do not show (or at least
not so strong)
3. Define distributed Systems.
4. What are the services and examples of Middleware?
5. List five reasons why to build distributed System.
6. What do you mean by transparency?
7. What are the request reply protocols?
8. List the types of Communication paradigms.
9. Define distributed mutual exclusion.
Understand:
12
Assignment test should contain only questions related to Higher Order Thinking (HOT) Skills Pertaining to this course
94
Department of Information Technology, GMRIT| Curriculum | Regulation 2016
Apply:
1. Develop the scenario how might the clocks in two computers that are linked by a local network be
synchronized without reference to an external time source
2. Design in detail any two application domain where distributed system is applied.
3. Formulate why there is no explicit data typing in CORBA
4. Formulate the design and implementation of name services and Domain Name services.
Evaluate:
1. Rank the advantages and disadvantages of HTML, URLs and HTTP as core technologies for information
browsing?
2. Conclude on shared memory Approach
3. Explain on LDAP.
4. How will you assess a consensus problem?
5. (i)Explain detail about two phase commit protocol. (ii) Examine on atomic commit protocol.
95
Department of Information Technology, GMRIT| Curriculum | Regulation 2016
3103
Course Outcomes
1. Learn Classical and advanced techniques employed by Web Search engines
2. Know different ways of representation and retrieval of documents.
3. Apply techniques of preprocessing needed for IRS
4. Apply the techniques of clustering on unstructured data
5. Apply indexing methods for fast retrieval from Document data.
6. Develop an IRS by using different user search techniques and text search algorithms
COs–POs) Mapping
COs PO3 PO6 PO8
1 3 2 2
2 3 2 2
3 2 3 1
4 2 3 1
5 2 3 1
6 3 3 2
Unit IV
Information Retrieval System Evaluation
Introduction, Measures used in System Evaluation,Standard test collections, Evaluation of unranked retrieval sets,
Evaluation of ranked retrieval results.
Beyond the syllabus: Measurement Example-TREC Results. (11+4) Hours
Total: (45+15) Hours
Textbook (s)
1. Kowalski, Gerald, Mark T Maybury: Information Retrieval Systems: Theory and Implementation, Kluwer
Academic Press, 1997.
2. http://nlp.stanford.edu/IR-book/html/htmledition/evaluation-in-information-retrieval-1.html
96
Department of Information Technology, GMRIT| Curriculum | Regulation 2016
Reference (s)
1. Frakes, W.B.andRicardoBaeza Yates, Information Retrieval Data Structures and Algorithms, 1st Edition
Prentice Hall, 1992.
2. Robert Korfhage, Information Storage & Retrieval, 1st Edition, John Wiley & Sons, 2005
Remember
1. Define measures for IRS
2. Define PAT
3. State Browse capabilities
4. List automatic indexing
5. Recall term clustering algorithms
Understand
1. Explain Functional Overview
2. Explain Stemming algorithms
3. Summarize Brute force algorithms
4. Illustrate S/w text search Algorithms
5. Interpret standard test collection
6. Classify S/w & H/w text search systems
Apply
1. Demonstrate Precision
2. Design a hybrid Indexing Data Structure
3. Use stemming Algorithms for IRS
Analyze
1. Analyze s/w and h/w indexing methods
2. Analyze search and Browse capabilities
3. Compare Pat and Stemming algorithms
4. Analyze Term clustering Algorithms
Evaluate
1. Determine Which of the indexing algorithm is efficient
2. Check all automatic indexing methods for its efficiency
3. Compare S/w text search and H/w text search algorithms
13
Assignment test should contain only questions related to Higher Order Thinking (HOT) Skills Pertaining to this course
97
Department of Information Technology, GMRIT| Curriculum | Regulation 2016
COs–POs Mapping
COs PO1 PO2 PO3 PO6 PO8
1 1 2 1 2 1
2 2 3 2 1 2
3 2 1 3 2 2
4 3 3 3 1 2
5 1 1 1 2 1
6 1 1 1 1 3
3–Strongly linked | 2–Moderately linked | 1–Weakly linked
Unit I
Information Theory
Information–Entropy-Information rate-classification of codes-Kraft McMillan inequality-Source coding theorem-
Shannon-Fano coding-Huffman coding-Extended Huffman coding-Joint and conditional entropies-Mutual
information-Discrete memoryless channels–BSC.
BEC Channel capacity-Shannon limit (12+4) Hours
Unit II
Source Coding: Text-Audio and Speech
Text: Adaptive Huffman Coding-Arithmetic Coding-LZW algorithm–Audio: Perceptual coding-Masking
techniques-Psychoacoustic model-MEG Audio layers I-II-III-Dolby AC3-Speech: Channel Vocoder.
Linear Predictive Coding (11+3) Hours
Unit III
Source Coding: Image and Video
Image and Video Formats–GIF-TIFF-SIF-CIF-QCIF–Image compression: READ-JPEG–Video Compression:
Principles-I-B-P frames-Motion estimation-Motion compensation.
H.261-MPEG standard (11+3) Hours
Unit IV
Error Control Coding Block & Convolutional Codes
Definitions and Principles: Hamming weight-Hamming distance-Minimum distance decoding-Single parity codes-
Hamming codes-Repetition codes-Linear block codes-Cyclic codes-Syndrome calculation-Encoder and decoder
CRC Convolution codes–code tree-trellis state diagram-Encoding .
Decoding: Sequential search and Viterbi algorithm–Principle of Turbo coding (11+5) Hours
Total: (45+15) Hours
Textbook (s)
1. R Bose, Information Theory-Coding and Crptography,2nd Edition TMH,2007
2. Fred Halsall, Multidedia Communications: Applications-Networks-Protocols and Standards,1st Edition
Perason Education Asia, 2000
98
Department of Information Technology, GMRIT| Curriculum | Regulation 2016
Reference(s)
1. K Sayood, Introduction to Data Compression, 3rd Ed., Elsevier, 2006
2. S Gravano, Introduction to Error Control Codes, 2nd Edition Oxford University Press, 2007
3. Amitabha Bhattacharya, Digital Communication, 2nd Edition ,TMH, 2006
Remember
1. Write the conditional entropy H(Y |X) in bits
2. State the entropy of the source, H(X)
3. List the advantage and disadvantage of cyclic code
4. Define rate of information.
Understand
1. Draw the mutual information I(X; Y)?
2. Represent binary cyclic code?
3. Indicate the different methods for controlling the errors?
4. Contrast fixed length codes inefficient for alphabets whose letters are not equiprobable? Discuss this in
relation to Morse code.
Apply
1. Find the alternative expression for H(Y ) − H(Y |X) in terms of the joint entropy & both marginal entropies
2. Demonstrate a plot of the function you would need to use in order to recover completely the continuous
signal transmitted, using just such a finite list of discrete periodic samples of it
3. Select the important properties of codes while encoding a source?
4. Compute the coding rate R of your code? How do you know whether it is optimally efficient?
Analyze
1. Justify In terms of the probability distributions, what are the conditional entropies H(X|Y ) and H(Y |X)?
2. Compare is there any limit to the capacity of such a channel if you can increase its bandwidth W in Hertz
without limit, but while not changing N0 or P? If so, what is that limit?
3. Conclude that mutual information is non negative.
4. Identify code word corresponding to the information sequence 10011 using time domain and transform
domain
14
Assignment test should contain only questions related to Higher Order Thinking (HOT) Skills Pertaining to this course
99
Department of Information Technology, GMRIT| Curriculum | Regulation 2016
COs–POs Mapping
COs PO2 PO6 PO7 PO8
1 3 2 1 2
2 3 2 1 3
3 3 2 1 1
4 2 2 2 2
5 3 2 1 3
6 2 2 3 2
3–Strongly linked | 2–Moderately linked | 1–Weakly linked
Unit I
Understanding Cloud Computing
Cloud computing: Introduction, Cloud application architectures, Value of cloud computing, Cloud Infrastructure
models, Cloud Services, History of Cloud Computing, Advantages of Cloud Computing, Disadvantages of Cloud
Computing, Companies in the Cloud Today, Amazon Web Services, Windows Azure, Google services, IBM Cloud
Before the move into the cloud- Know Your Software Licenses, The Shift to a Cloud Cost Model, Service Levels for
Cloud Applications Ready for the cloud: Web Application Design, Machine Image Design, Privacy Design, Design,
Database Management.
Tata Cloud- Salesforce.com
(13+3) Hours
Unit II
Virtual Machines and Virtualization of Clusters and Data Centers
Implementation Levels of Virtualization, Virtualization Structures/Tools and Mechanisms, Virtualization of CPU,
Memory, and I/O Devices, Virtual Clusters and Resource Management, Virtualization for Data-Center Automation
Case Studies: Cloud centers in detail, Comparing approaches, Xen, Eucalyptus, Cloud Stack, and Open Stack
VMware- KVM.
(10+5) Hours
Unit III
Scaling of Cloud Infrastructure & Security
Capacity, Planning, Cloud Scale.Cloud Security-Data Security, Network Security, Host Security, Compromise
Response
Disaster Recovery-Disaster Recovery Planning, Disasters in cloud, Cloud Disaster Management.
Requirements for modern data centers- high availability and Service Orientated Infrastructures (SOI)- Modern data
centre use case studies.
(10+3) Hours
100
Department of Information Technology, GMRIT| Curriculum | Regulation 2016
Unit IV
Cloud Computing Software Security Fundamentals
Cloud information Security Objectives, Cloud Security Services, Relevant Cloud Security Design Principles, Secure
Cloud Software Requirements, Approaches to Cloud Software Requirements Engineering, Cloud Security Policy
Implementation. Cloud Computing Risk Issues: The CIA Triad, Privacy and Compliance Risks, Threats to
Infrastructure Data and Access Control, Cloud Access Control Issues, Cloud Service Provider Risks.
Security concepts-Confidentiality-privacy-integrity-authentication-non-repudiation-availabilit- access control-
defence in depth- least privilege
(12+4) Hours
Total:(45+15) Hours
Textbook (s)
1. George Reese, Cloud Application Architectures, 1st Edition O‟Reilly Media, 2009
2. Ronald L.Krutz and Russell Dean Vines, Cloud Security, 1st Edition, Wiley Publishing, 2010
Reference (s)
1. Michael Miller, Cloud Computing-Web Based Applications that change the way you work and collaborate
online, 1st Edition, Pearson Education, Publishing, 2011
2. Kai Hwang, Geoffrey C Fox and .Jack J.Dongarra, Distributed & Cloud Computing from Parallel Processing
to the Internet of Things , 1st Edition, MK Publishing, 2010
3. David S Linthicum, Cloud Computing and SOA Convergence in Your Enterprise: A Step-by-Step Guide,
1st Edition, Addison-Wesley, 2009
Remember
1. Define Cloud Computing
2. List types of virtualization
3. Define proactive scaling
4. What is CIA Triad?
Understand
1. Explain different cloud Infrastructure models
2. Explain different levels of virtualization
3. Explain about cloud Network security in detail?
4. Explain about Recovery Point Objective.
15
Assignment test should contain only questions related to Higher Order Thinking (HOT) Skills Pertaining to this course
101
Department of Information Technology, GMRIT| Curriculum | Regulation 2016
Apply
1. Explain any IaaS service provided by Amazon
2. What is cloud Stack?
3. How disaster recovery planning can be done
4. How Web Application Design is used in designing cloud applications
Analyze
1. Compare cloud center and service infrastructure.
2. Analyze different cloud services provided by Amazon
3. With neat diagram explain the functioning of Xen Architecture.
4. List and explain various cloud service providers risks.
102
Department of Information Technology, GMRIT| Curriculum | Regulation 2016
Unit I
Introduction to Disaster Management and Management of Natural Disasters
Introduction: Interdisciplinary nature of the subject, Disaster Risk Reduction–Global Policies and Practices, Basic
Strategies and Practices of Disaster Reduction, Linking Disaster Risk Reduction with Global Framework, Integrated
Disaster Risk Management and Post-Disaster Response-Management of Natural Disasters: Floods, Droughts,
Earthquakes, Global Warming, Cyclones, Landslides, Tsunamis and Post Tsunami hazards along the Indian Coast
Significant Aspects of Disasters-Global Earthquake Safety Initiative-Prediction of Tsunamis-Typology of flood
risks-Framework for Preparedness and Mitigation
12+3 Hours
Unit II
Management of Manmade Disasters and Risk & Vulnerability
Management of Manmade Disasters:Temporal Transport Hazard Dynamics, Solid Waste Management: Post–
disaster, A Threat of Bio-terrorism in Mega Cities, Rail and Air craft‟s accidents, emerges infectious diseases, AIDS
and Climate Change Risk Reduction-Risk & Vulnerability: Building Codes and Land Use Planning, Social
Vulnerability, Environmental Vulnerability and Disaster Risk Reduction, Macroeconomic Management and
Sustainable Development, Financial Management of Disaster related Economic Losses
Temporal Analysis of Transport-Capacity Building and Institutional Strengthening-Climate Risk Management -
Decision Framework
11+4 Hours
Unit III
Role of Technology in Disaster Management
Role of Technology in Disaster Management:Implementation Technology for Disaster Reduction, Disaster
Management for Infrastructure, Geospatial Information in agriculture Drought Assessment and Monitoring,
Multimedia Technology in Disaster Risk Management Training-Education and Community: Education in Disaster
Risk Reduction , Essentials of School Disaster Education, Community Capacity and Disaster Resilience,
Community-based Disaster Recovery, Community-based Disaster Management and Social Capital, Designing
Resilience
Disaster Management Program-Building Community Capacity-Remote Sensing and GIS 11+4 Hours
103
Department of Information Technology, GMRIT| Curriculum | Regulation 2016
Unit IV
Multi Sectional and Crosscutting Issues
Multi Sectional Issues:Impact of Disasters on Poverty and Deprivation, Climate Change Adaptation and Human
Health, Health Hazards and Environmental Risk-Crosscutting Issues: Forest Management and Disaster Risk
Reduction, Institutional Capacity in Disaster Management, Corporate Sector and Disaster Risk Reduction, Essentials
of Pre-disaster Recovery Planning
Poverty Vulnerability Indices-Protective Functions of Forest Resources-Corporate Organizations and Disaster
Potential-Community Focused Approach
11+4 Hours
Total: 45+15 Hours
Textbook (s)
1. R. Shaw and R. R. Krishna Murthy, Disaster Management: Global Challenges and Local Solutions, 1 st Ed.,
Universities Press (India) Private Limited, Hyderabad, 2009
2. J. Singh, Disaster Management: Future Challenges and Opportunities,2nd Ed., I.K.International Publishing
House Private Limited, New Delhi, 2007
Reference (s)
1. D. P. Coppola, Introduction to International Disaster Management, 3rd Ed., Elsevier Publications, 2011
2. U. Ranke, Natural Disaster Risk Management, Springer International Publishing, 2016
Remember
1. Define Hazard.
2. Define Disaster.
3. What are the different phases of disaster management cycle?
4. Define Tsunami.
5. Define landslide.
Understand
1. Explain when hazard become disaster
2. “Prevention is better than cure is opted proverb in the context of disaster management” Explain.
3. Explain the causes of global warming.
4. Explain the difference between environmental and social vulnerabilities.
5. “All the developmental projects will lead to disaster risk”, Justify.
Apply
1. Role of Geospatial technology in disaster management
2. Role of multimedia technology in disaster management
16
Assignment test should contain only questions related to Higher Order Thinking (HOT) Skills pertaining to this course
104
Department of Information Technology, GMRIT| Curriculum | Regulation 2016
Unit I
Introduction &Solar Energy
Introduction to renewable energy, advantages of generating power through renewable energy sources – technical &
economical, Solar Energy:Physics of sun, the solar constant, extra-terrestrial and terrestrial solar radiation,
instruments for measuring solar radiation and sun shine. Flat Plate and Concentrating Collectors, classification of
concentrating collectors, thermal analysis of flat plate collectors, Photo voltaic energy conversion,PV cell model and
characteristics, Maximum power point tracking for photovoltaic power systems. Types of Maximum power point
tracking methods (Perturb and Observe (hill climbing), Incremental Conductance, Fractional short circuit current,
Fractional open circuit voltage)
Solar applications-solar heating /cooling technique
12+4 Hours
Unit II
Wind & Bio-Mass Energy
Sources and potentials, horizontal and vertical axis windmills, performance characteristics, Betz criteria, maximum
power point tracking for wind, types of Maximum power point tracking methods
Principles of Bio-Conversion, Anaerobic/aerobic digestion,Types of Bio-Gas Digesters,gas yield, Combustion
characteristics of bio-gas,
Utilization for cooking, IC.Engine operation
12+4 Hours
Unit III
Energy Conversion systems
Geothermal &OceanEnergy: Types of Resources (hydrothermal, geo-pressured, hot dry rock), types of wells, and
methods of harnessing the energy (vapour dominated, liquid dominated).Ocean thermal energy conversion,
principles, Open loop&closed loop OTEC Cycles.Tidal energy- potential, conversion techniques-single basin, two
basin system. Wave energy: conversion techniques.
Fuel cells-Principle of working of various types of fuel cells and their working, Magneto-hydrodynamics (MHD)-
Principle of working of MHD Power plant, Hydrogen generation, battery energy storage system.
105
Department of Information Technology, GMRIT| Curriculum | Regulation 2016
Reference (s)
1. Tiwari and Ghosal, Renewable energy resources, Narosa Publishing house, 2ndEdition, 2001
2. RanjanRakesh, Kothari D. P.& Singal K. C., Renewable Energy Sources And Emerging Technologies,
PHI, 2ndEdition, 2013.
3. Nikos Hatziargyriou,Micro grids: Architectures and Control,wiley,1stEdition.
4. Electricity Act 2003, Renewable Energy Act 2015.
5. Indian Constitution-Articles 51A, 47, 48A.
Cognitive Level Int. Test 1 (%) Int. Test 2 (%) Comprehensive Test17 (%)
Remember 40 40 ---
Understand 60 60 80
Apply 20
Analyze --- --- ---
Evaluate --- --- ---
Create --- --- ---
Total (%) 100 100 100
Remember
1. Define renewable energy
2. List out the advantages HAWT
3. List out the disadvantages non concentration collector
4. Define solar radiation
5. Define solar constant
6. Define micro-grid
Understand
1. Explain need of micro-grid
2. Interpret faraday‟s laws
3. Explainclosed loop OTEC Cycles system
17
Comprehensive test should contain only questions related to Higher Order Thinking (HOT) Skills
106
Department of Information Technology, GMRIT| Curriculum | Regulation 2016
Apply
1. Compute the power coefficient of wind turbine
2. Demonstrate storage of energy from battery
3. Assess magnetic flux density due to circular ring
4. Compute solar cell working
5. Assess the nature of microgrid
107
Department of Information Technology, GMRIT| Curriculum | Regulation 2016
Unit I
Introduction to Entrepreneurship
Definition of Entrepreneur, Entrepreneurial Traits, Entrepreneur Vs. Manager, Entrepreneur Vs Entrepreneur. The
Entrepreneurial decision process- Role of Entrepreneurship in Economic Developments, Ethics and Social
responsibility of entrepreneurs, Woman as entrepreneur.
Opportunities for entrepreneurs in India and abroad.
10+3 Hours
Unit II
Creating and starting the venture
Sources of new Ideas, Methods of generating ideas, creating problems solving- Product planning and development
process
The business plan
Writing Business plan, Evaluating Business plans, Using and implementing business plans, marketing plan,
financial plan and the organizational plan launching formalities
Nature and scope of business plan.
15+5 Hours
Unit III
Financing and managing the new venture
Source of Capital, record keeping, recruitment, motivating and leading teams, financial controls, Marketing and
sales controls. E- Commerce and Entrepreneurship
New venture expansion strategies and issues
Features evaluation of joint ventures, acquisitions, merges, franchising, Public issues, rights issues, bonus issues
Internet advertising
9+3 Hours
108
Department of Information Technology, GMRIT| Curriculum | Regulation 2016
Unit IV
Institutional support Entrepreneurship
Role of Dire crate of Industries, District Industries, Centers (DICS), Industrial development Corporation (IDC),
state Financial corporation (SFCs), Small Scale Industries Development Corporations (SSIDCs), Khadi and village
Industries Commission (KVIC), Technical Consultancy Organization (TCO), small Industries Service Institute
(SISI), National Small Industries Corporation (NSIC), Small Industries Development Bank of India (SIDBI),
salient provision under Indian Factories Act, Employees State Insurance Act, Workmen‟s Compensation Act and
payment of Bonus Act.
Labour legislation
11+4 Hours
Total: 45+15Hours
Textbook (s)
1. Robert Hisrich& Michael Peters, Entrepreneurship, TMH, 5th Edition, 2009.
2. Dollinger, Entrepreneurship, Pearson Education, 4th Edition, 2004.
Reference (s)
1. VasantDesal, The Dynamics of Entrepreneurial Development and Management Himalaya publishing House,
5th Edition, 2017.
2. William A. Sahlman, James Stancill, Arthur Rock, Harvard Business Review on Entrepreneurship, Harvard
Business School Press, 10th Edition 1999.
3. Robert J. Calvin, Entrepreneurial Management, Tata McGraw-Hill Education 2004.
4. GurmeetNaroola, The Entrepreneurial Connection: East Meets West in the Silicon Valley, Special edition,
TiE, 2001.
5. Bill Bolton & John Thompson, Entrepreneurs Talent, Temperament, Technique, Routledge, 2 nd Edition,
2004.
6. Agrawal, A.N. &Agarwal, M.K., Indian Economy: Problems of Development and Planning, New Age
International, 42nd Edition, 2017.
7. GauravDatt&AshwaniMahajan, Dutt&Sundaram‟s Indian Economy, S. Chand, 72nd Edition, 2016.
8. Srivastava, Industrial Relations Labour Laws, Vikas Publishing House, 6 th Edition, 2005.
9. ArunaKaulgud, Entrepreneurship Management by Vikas publishing house, 2003.
10. Thomas W. Zimmerer& Norman M. Scalbrorough, Essential of Entrepreneurship and small business
management, PHI, 4th Edition, 2005.
11. Mary Coulter, Entrepreneurship in Action, PHI 2nd Edition, 2005.
12. Kaplan, Patterns of Entrepreneurship, Willey, 4th Edition, 2005.
13. ND Kapoor, Industrial Law, Sultan Chand & Sons, 14th Revised Edition, 2013.
Sample Question (s)
Internal Assessment Pattern
Cognitive Level Int. Test 1 (%) Int. Test 2 (%) Assignment Test18(%)
Remember 30 40 -
Understand 70 60 -
Apply - - 35
Analyze - - 45
Evaluate - - 20
Create - - -
Total (%) 100 100 100
18Assignment Test should contain only questions related to Higher Order Thinking (HOT) Skills
109
Department of Information Technology, GMRIT| Curriculum | Regulation 2016
Remember
1. List the different methods of generating ideas and explain any four methods.
2. List the difference between entrepreneur vs manager.
3. What are the objectives of market research?
4. What are the market research activities? List them.
5. List the important functions of IDBI.
Understand
1. Illustrate the difference between entrepreneur vs manager.
2. Illustrate the characteristics or traits of an entrepreneur.
3. Illustrate the sources of new ideas for entrepreneur.
4. Explain the various steps involved in writing a business plan.
5. What are the various sources of capital required for business venture?
6. Describe the role of E-commerce in entrepreneurship with its applications.
7. Write about marketing plan and financial plans required for an entrepreneur.
8. Illustrate the factories act 1948.
9. Illustrate the reasons for the need of labor legislation becomes important
.
110
Department of Information Technology, GMRIT| Curriculum | Regulation 2016
Unit I
Introduction to Global Navigation Satellite Systems
The History of GPS, The Evolution of GPS, Development of NAVSTAR GPS, Block I, Block II, Block IIA, Block
IIR, Block IIR-M, Block IIF and Block III satellites, GPS working principle, Trilateration, Determination of satellite
position, Determining the receiver position: 2D or X-Y Plane, 3D or X-Y-Z Plane, Ionospheric effects of GPS
signals
GIS Integration
12+4 Hours
Unit II
Types of Global Navigation Satellite Systems
GALILEO: Advantages of GALILEO, signal components, PRN codes, Modulation schemes of Galileo signals:
BOC, Alt-BOC, Galileo and GPS Signal interoperability, Improved performance from the combination of
GALILEO and GNSSs, GLONASS: GLONASS constellation details, signal structure: PRN code,P-code,C/A
code,navigationdata,signal modulation
GAGAN Navigation system
12+3 Hours
Unit III
GPS Satellite constellation and Signals
GPS system segments: Space segment, Control segment, User segment, GPS Signals: Pseudorandom noise (PRN)
code, C/A code, P code, Navigation data, GPS signal generation: generation of codes, Comparison of GNSSs in
terms of constellation and services, IRNSS: Segments, 1A to 1G specifications, applications
Simulation of GPS signals
10+4 Hours
111
Department of Information Technology, GMRIT| Curriculum | Regulation 2016
Unit IV
Coordinate Systems
Geoid, Ellipsoid, Coordinate Systems: Geodetic and Geo centric, CTRS, CIRS, ECEF, Datums: world geodetic
1984, Indian geodetic datum, Conversion between Cartesian and geodetic coordinate frame, Map projections:
Advantages, metric properties, construction, types of map projections
Extract GPS Coordinates for a Google Maps Location 11+4 Hours
Total: 45+15 Hours
Textbook (s)
1. G.S. Rao, Global Navigation Satellite Systems, McGraw-Hill Publications, New Delhi, 2010
2. Ahmed El-Rabbany, Introduction to GPS: the Global Positioning System,Artech House,2002
Reference (s)
1. Scott Gleason and DemozGebre- Egziabher, GNSS Applications and Methods, Artech House, 685
Canton Street, Norwood, MA 02062, 2009
2. James Ba-Yen Tsui, Fundamentals of GPS receivers-A software approach, John Wiley &Sons, 2001
Remember
1. Define trilateration.
2. List two applications of GPS.
3. List two important specifications of GLONASS
4. Retrive the need of PRS.
5. Define ranging codes and data.
Understand
Apply
19
Assignment test should contain only questions related to Higher Order Thinking (HOT) Skills pertaining to this course
112
Department of Information Technology, GMRIT| Curriculum | Regulation 2016
1 X
4. Show that the longitude of a point in ECEF is tan .
Y
x(t ) A, t /2
5. Compute the Fourier transform of a pulse signal defined as
0, t /2
Analyse
113
Department of Information Technology, GMRIT| Curriculum | Regulation 2016
Unit I
Basic Elements of Soft Computing
Basic elements of Soft Computing: Difference between Hard Computing & Soft Computing- Introduction to
Neural Networks - Fuzzy Logic - Genetic Algorithms - Hybrid Systems.Artificial Neural Networks:
Introduction to Artificial Neural Networks - Evolution of Neural Networks - Basic Models of Neural Networks
- McCulloch-Pitts Neuron - Hebb Network.
Basics of Artificial Intelligence and Computational Intelligence.
11+4 Hours
Unit II
Supervised Learning Network
Supervised Learning Network: Artificial Neural Networks: Introduction - Perceptron Networks - Back
Propagation Network. Radial Basis Function Network.
Associative Memory Networks: Auto-associative Memory Network - Hetero auto-associative Memory
Network - Bidirectional Associative Memory (BAM) - Hopfield Networks.
Functional Link Neural Network.
11+4 Hours
Unit III
Unsupervised Learning Network
Introduction - Fixed Weight Competitive Nets -Kohonen Self-Organizing Feature Maps - Learning Vector
Quantization - Counter Propagation Networks - Adaptive Resonance Theory Networks (ART-1 & ART-2).
Support Vector Machines and their applications for Classification.
11+4 Hours
Unit IV
Fuzzy logic and Genetic Algorithm
Introduction to Fuzzy Sets: Difference between Classical Sets & Fuzzy Sets – Properties.
Classical Relations and Fuzzy Relations: Cartesian product of Relations - Classical Relations - Fuzzy Relations
Membership Functions: Features of Membership Functions -Fuzzification - and Defuzzification
Genetic Algorithm: Basic Concepts – Operators.
114
Department of Information Technology, GMRIT| Curriculum | Regulation 2016
Concepts on Fuzzy Controller and its applications -a Simple Application of Genetic Algorithm for function
Optimization.
11+4 Hours
Total: 44+16 Hours
Textbook (s)
1. S. N. Sivanandam, S N Deepa, Principles of Soft Computing, 2ndEditionWiley India, 2007
2. V. Kecman, Learning and soft computing, Pearson Education, India, 2006
3. Russell Eberhart and Yuhui Shi - Computational Intelligence: Concepts to Implementations (2007)
Reference(s)
1. G. J. Klir and Bo Yuan, Fuzzy sets and Fuzzy Logic, Prentice Hall, USA, 1995
2. N. J. Nelsson, Artificial Intelligence, A New Synthesis, Harcourt Asia Ltd., 1998
3. D. E. Goldberg, Genetic Algorithms: Search, Optimization and Machine Learning, Addison Wesley, N.Y –
1989
4. S. Haykins, Neural networks: a comprehensive foundation Pearson Education, India, 2002
5. A. P. Engelbrecht, Computational Intelligence: An Introduction, John Wiley & Sons, 2007.
6. X. Yu and M. Gen, Introduction to Evolutionary Algorithms, Springer Verlag, 2010.
7. FakhreddineKarray and Clarence de Silva - Soft Computing and Intelligent Systems Design, 2004.
8. AndriesEngelbrecht - Computational Intelligence: an Introduction, 2007.
9. AmitKonar - Computational Intelligence: Principles, Techniques, and Applications, 2005.
10. Vojislav Kecman - Learning and Soft Computing: Support Vector Machines, Neural Networks, and Fuzzy
Logic Models, 2001.
Cognitive Level Int. Test 1 (%) Int. Test 2 (%) Assignment Test20 (%)
Remember 25 15 --
Understand 35 15 --
Apply 20 20 40
Analyze 20 30 40
Evaluate -- 20 20
Create -- -- --
Total (%) 100 100 100
Remember
1. Define Chromosome
2. List two methods in which the information flows in a nervous system
3. List five unsupervised learning algorithms
4. List the difference between classical logic and fuzzy logic
5. List the computational units of ART
Understand
1. Explain the components of Soft Computing
2. Explain the role of activation function in exhibiting the output from a neuron
3. Construct the 5 node pattern {0,1,1,0,1} by Hopfield network and explain the procedure for recalling
andstoring
4. Explain Adaptive Resonance Theory and its type
5. Explain CPN and illustrate the steps involved in training algorithm of full CPN
Apply
20
Assignment test should contain only questions related to Higher Order Thinking (HOT) Skills pertaining to this course
115
Department of Information Technology, GMRIT| Curriculum | Regulation 2016
1. Construct a ANN circuit which makes the flow of data using multilayered and multilevel networks
2. Apply clusters of various datasets maintained by learning approach considering live example
3. Draw the neat architecture of hamming network and trace the inhibitatory and excitatory neurons by
considering an inconsistent vector
4. Find the Max-min and Max Product composition of the fuzzy relation matrices R={0.6,0.3,0.2,0.9}(2x2)
S={1,0.5,0.3,0.8,0.4,0.7}(2x3)
5. Find the cardinality for the matrices R={1,4,6,7}(2x2) S={5,2,3,7}(2x2)
Analyze
1. Differentiate between learning and training algorithms considering multilayer perceptron network and trace
the different types of networks obtained.
2. Differentiate between Counter Propagation Network and Adaptive Resonance Theory
Evaluate
1. Evaluate using Back Propagation algorithm for the below map considering weights , inputs and outputs
2. Evaluate the instance, that the 2 dimensional input vector X is presented to the three-neuron
ohonennetwork, x=[ 0.52 0.12]. The initial weight vectors, Wj are given by
W1=[0.27 , 0.81]
W2=[0.42 , 0.70]
W3=[0.43 , 0.21]
in a form of 2 X 1 matrix. Find the winning neuron using the Euclidean distance and apply kernel self-
organization map.State the differences between register machines and stack machine?
116
Department of Information Technology, GMRIT| Curriculum | Regulation 2016
Unit I
Introduction to Safety &Industrial Hygiene
Safety programs, Engineering ethics, Accident and Loss Statistics, Acceptable Risk, Public Perceptions, The nature
of the Accident Process, Inherent Safety, Government of India and OSHA regulations, Industrial Hygiene,
Identification, Evaluation & Control
Lethal dosage–Material Safety Data Sheets
12+4 Hours
Unit II
Toxicology, Fires and Explosions
how toxicants enter biological organisms, how toxicants are eliminated from biological organisms, effects of
toxicants on biological organisms The fire triangle, Distinction between fire and explosions, Definitions,
Flammability characteristics of liquids and vapors, MOC and inerting, ignition energy, Auto ignition, Auto
oxidation, Adiabatic compression, Explosions
Firefighting equipment–Personal protecting equipment–Building fire safety codes
11+3 Hours
Unit III
Designs to Prevent Fires and Explosions
Inerting, static electricity, controlling static electricity, explosion proof equipment and instruments, ventilation,
sprinkler systems, miscellaneous designs for preventing fires and explosions
Work permit–Earthling–Color codes for identification of process
10+4 Hours
Unit IV
Hazards Identification and Risk Assessment
Process hazards checklists, hazards surveys, hazards and operability studies, safety reviews, other methods. Review
of probability theory, event trees, fault trees, QRA and LOPA
Health and safety foundation–5S Practice–Emergency procedures
12+4 Hours
Total: 45+15 Hours
117
Department of Information Technology, GMRIT| Curriculum | Regulation 2016
Reference (s)
1. H.H.Fawcett and W.S.Wood, Safety and Accident Prevention in Chemical Operations, John Wiley and
sons, 2nd Ed., New York, 1982
2. Hammer, Willie, and Dennis Price. Occupational safety management and engineering. Pearson College
Division, 2001
Remember
1. Define terms hazard and accidents
2. List three-step of accidents process?
3. Define terms LD and ED
4. List any four reversible effects that caused by toxic exposure
5. Define terms risk, loss prevention
Understand
1. Identify the initiation, propagation, and termination steps for motor accident
2. Explain about how toxicants enter biological organisms
3. Explain the key responsibilities‟ of professional engineers
4. Explain the inherent safety techniques that are used in the chemical industry
5. Explain how toxicants are eliminated from biological organisms
6. List the ingredients of safety program for outstanding safety program
Apply
1. An employee works in a plant with a FAR of 4. If this employee works a 4-hr shift, 200 days per year, what
are the expected deaths per person per year?
2. Air contains 5 ppm of diethylamide (TLV-TWA of 5 ppm), 20 ppm of cyclohexanol (TLV-TWA of 50
ppm), and 10 ppm of propylene oxide (TLV-TWA of 2 ppm). What is the mixture TLV-TWA and has this
level been exceeded?
3. The following accident report has been filed. Failure of a threaded 1½″ drain connection on a rich oil line at
the base of an absorber tower in a large (1.35 MCF/D) gas producing plant allowed the release of rich oil
and gas at 850 psi and –40°F. The resulting vapor cloud probably ignited from the ignition system of
engine driven re compressors. The 75′ high × 10′ diameter absorber tower eventually collapsed across the
pipe rack and on two exchanger trains. Breaking pipelines added more fuel to the fire. Severe flame
impingement on an 11,000-horsepower gas turbine–driven compressor, waste heat recovery, and super-
21
Assignment test should contain only questions related to Higher Order Thinking (HOT) Skills pertaining to this course
118
Department of Information Technology, GMRIT| Curriculum | Regulation 2016
heater train resulted in its near total destruction. Identify the initiation, propagation, and termination steps
for this accident
4. A process has a reported FAR of 2. If an employee works a standard 8-hr shift 300 days per year, compute
the deaths per person per year
Analyze
1. Can gate valves be placed between a vessel relief and its vessel
2. Liquid levels in storage tanks are frequently determined by measuring the pressure at the bottom of the
tank. In one such tank the material stored in the tank was changed and an overflow resulted. Why?
Evaluate
1. How to convert your kitchen in to XP area
2. Does LOPA really replace 90% of the QRA?
119
Department of Information Technology, GMRIT| Curriculum | Regulation 2016
UNIT I
Introduction to the Smart Grids
Introduction to smart grid- Electricity network-Local energy networks- General considerations for a smart grid,
characteristics of smart grids, elements in smart grids.
Electric transportation- Low carbon central generation-Attributes of the smart grid- Alternate views of a smart grid.
Smart grid to evolve a perfect power system: Introduction- Overview of the perfect power system configurations-
Device level power system- Building integrated power systems- Distributed power systems- Fully integrated power
system-Nodes of innovation.
Present status of smart grids in India
14+4 Hours
UNIT II
Smart Electric Grid & Measurement Technologies
Smart electric grid: generation- Distributed energy resources: Renewable energy, energy storage, solar energy,
wind energy, biomass, hydro power, geothermal and fuel cell, effect of electric vehicles(EV‟s) , transmission,
distribution, and end-user; Basic concepts of power, load models, load flow analysis
Measurement Technologies: Widearea monitoring system (WAMS), advanced metering infrastructure (AMI),
phasor measurement units.
Functioning of PMU
12+3 Hours
UNIT III
Communication & Networking Technology
Architectures, standards and adaptation of power line communication (PLC), zigbee, GSM, GPS, GIS, machine to-
machine communication models for the smart grid; Home area networks (HAN) and neighborhood area networks
(NAN)
Machine to human communication system
11+3 Hours
UNIT IV
Energy Management in Smart grids
Aspects of energy management in the smart grid; SCADA; micro grids; demonstration projects; case studies.Policy
and economic drives of the smart grid; environmental implications; sustainability issues of smart grid systems.
Environmental issues related to smart grid systems 10+3 Hours
120
Department of Information Technology, GMRIT| Curriculum | Regulation 2016
1. Clark W Gellings, “The Smart Grid, Enabling Energy Efficiency and Demand Side Response”- CRC Press,
2012
2. JanakaEkanayake, KithsiriLiyanage,Jianzhong.Wu, Akihiko Yokoyama, Nick Jenkins, “Smart Grid:
Technology and Applications”- Wiley, 2012
Reference(s)
1. A. Keyhani, Smart Power Grid Renewable Energy Systems, Wiley 2011
2. James Momoh, Smart Grid :Fundamentals of Design and Analysis, Wiley, IEEE Press, 2012
Cognitive Level Int. Test 1 (%) Int. Test 2 (%) Assignment Test22(%)
Remember 10 10 ---
Understand 50 50 --
Apply 40 40 55
Analyze -- -- 45
Evaluate --- --- ---
Create --- --- ---
Total (%) 100 100 100
Remember
1. Define smart grid system
2. Write about self healing capability
3. List out four basic characteristics of smart grid system
4. Write about resiliency to disturbances
5. Write down the basic elements of smart grid system
6. Write about smart meters
7. Write down the generation options which are possible in smart grid system
8. Write about the functions of smart grids
9. Write down the attributes of smart grid system
10. Write about smart home energy management system
Understand
1. Illustrate the advanced power system network
2. Draw the block diagram of smart grid system
3. Explain the self healing property of smart grid system
4. Explain about self healing capability technology in smart grid systems
5. Explain the self healing property of smart grid system
6. Explain about the smart homes
7. Explain the energy storage system in smart grids
8. Explain about outage management system
Apply
22
Assignment Test should contain only questions related to Higher Order Thinking (HOT) Skills
121
Department of Information Technology, GMRIT| Curriculum | Regulation 2016
1. Construction of modern power system network with the help of basic characteristics
2. Choose the best renewable energy source based on the environmental conditions
3. Execute the smart home with the smart grid elements
4. Develop a smart hybrid electric vehicle with efficient battery system
5. Compute micro grid system with dc loads
6. Find the net power injected in the bus i for a two bus system
Analyze
122
Department of Information Technology, GMRIT| Curriculum | Regulation 2016
Unit I
Errors in numerical calculations and Solutions of algebraic and transcendental equations
Absolute, relative and percentage errors, a general error formula, errors in a series approximation
Locating Roots of Equations with one variable : Secant method, Muller‟s method
Solution of nonlinear equations - Introduction, Iteration method, Newton-Raphson method
Develop MATLAB codefor Bisection method, Newton-Raphson method and for the above methods
12 + 3 Hours
Unit II
Solution of Linear Systems and Interpolation
Direct methods -LU Decomposition, Iterative methods –Jacobi method, Gauss-Seidel method
Interpolating polynomials using finite differences- Bessel interpolation, Piecewise and spline interpolation -
Piecewise Linear interpolation, Quadratic spline interpolation
Develop MATLAB code for the above methods
11 + 4 Hours
Unit III
Numerical Integration and BVP(ODE)
Newton-Cotes methods (Weddle‟s rule)
Solution of BVP - Finite difference method, shooting method, the cubic spline method
Develop MATLAB code for Trapezoidal, Simpson’s 1/3 & 3/8 rules and for the above methods
11+4 Hours
123
Department of Information Technology, GMRIT| Curriculum | Regulation 2016
Unit IV
Numerical solutions of PDEs
Introduction, Finite difference approximations to derivatives, Solutions of Laplace & Poisson equations
usingJacobi‟s, Gauss-Seidel & SOR methods.Solution of parabolic equation using -Bender-Schmidt & Crank-
Nicolson methods. Solution of hyperbolic equation
Develop MATLAB code for the above methods
11 + 4 Hours
Textbook(s)
1. M. K. Jain, S.R.K. Iyengar, R.K. Jain, Numerical methods for Scientific and Engineering Computation, 4th
edition, New Age International publishers, New Delhi(
2. S.S.Sastry, Introductory methods of numerical analysis, 4th Edition, PHI
3. B. S. Grewal, Higher Engineering Mathematics, 42nd edition, Khanna publishers, New Delhi
Reference(s)
1. S. C. Chapra& R. P. Canale, Numerical Methods for Engineers, 6th Edition, McGraw Hill(2012)
2. Cleve Moler, Numerical Computing with MATLAB, SIAM.
Remember
Understand
Apply
1. Given , construct the Taylor series approximations of orders 0 to 7 at and state their
absolute errors.
2. Apply Newton-Raphson method to find a root of the equation .
3. Given the set of data points (1,-8), (2,-1) and (3, 18) satisfying the function , find the linear splines
satisfying the given data. Determine the approximate values of y(2.5) and
23
Comprehensive test should contain only questions related to Higher Order Thinking (HOT) Skills
124
Department of Information Technology, GMRIT| Curriculum | Regulation 2016
4. Apply Gauss-Seidel‟s method to solve Laplace equation for the region given in the figure
Analyze
6. Compare the roots obtained from Secant method, Muller‟s methods and explain which method is preferable
7. Analyze the physical significance of spline‟s interpolation formula
8. Differentiate shooting and cubic splines methods for numerical integration.
9. Analyzethe platform for the application of Laplace Equation
125
Department of Information Technology, GMRIT| Curriculum | Regulation 2016
1 3 2
2 3 2
3 3 2
4 3 2
5 3 2
6 3 2
3–Strongly linked | 2–Moderately linked | 1–Weakly linked
Unit I
Introduction to Nanomaterials
Introduction to nanomaterials and nanotechnology, Nano-sizes and their unique properties: comparison with the
bulk materials, Different shapessizes and morphology of nanomaterials; Defects in nanocrystalline materials, Effect
of grain size on physical properties – magnetic, electrical, optical and thermal properties.
11 + 3 Hours
Unit II
Fabrication of Nanomaterials
Top Down Approaches: Grinding, Planetory milling and comparison of particles; Bottom Up Approach: Wet
Chemical Synthesis - Microemulsion Approach, Colloidal Nanoparticles Production, Sol Gel Methods,
Sonochemical Approach, Microwave and Atomization; Gas phase Production Methods - Chemical Vapour
Depositions; Carbon Nano structures: carbon molecules, carbon clusters, carbon nano tubes- synthesis, formation.
12+4 Hours
Unit III
Characterization of Nanomaterials
Fractionation principles of particle size measurements, Particle size and its distribution, powder X-ray Diffraction,
Zeta potential, Electronic band structure Electron statistics Application: Optical transitions in solids, photonic
crystals, Microscopies: Scanning Electron Microscopy, Transmission Electron Microscopy, Atomic Forced
Microscopy, Scanning and Tunneling Microscopy.
11 + 4 Hours
126
Department of Information Technology, GMRIT| Curriculum | Regulation 2016
Unit IV
Applications of Nanomaterials
Self-assembly and molecular manufacturing, Surfactant based system Colloidal system applications, Functional
materials Applications: Single walled and multi walled CNTs, quantum dots, GaN wires, TiO 2 and ZnOnano
crystalline materials, Nanosensors based on optical properties.
11 + 4 Hours
Total:45+15 Hours
Textbook(s)
1. B. S. Murthy, P. Shankar, Baldev Raj, B.B. Rath, Ames Murday,Text book ofNanoscience and
Nanotechnology, published by Springer & Universities Press (India) Pvt. Ltd.
2. Sulabha K. Kulkarni,Nanotechnology: Principles & Practices, Springer
3. Nils O. Petersen, Foundations for Nanoscience and Nanotechnology, CRC Press, 2017.
Reference(s)
1. Stuart M. Lindsay, Introduction to Nanoscience, Oxford University Press, 2009.
2. Robert Kelsall, Ian Hamley, Mark Geoghegan, Nanoscale Science and Technology, John Wiley & Sons,
2005.
3. Gabor L. Hornyak , H.F. Tibbals , JoydeepDutta , John J. Moore Introduction to Nanoscience and
Nanotechnology CRC Press
4. Davies, J.H. „The Physics of Low Dimensional Semiconductors: An Introduction‟, Cambridge University
Press, 1998
Understand
1. Explain the sol-gel method of preparing nano materials. What kind of materials can be prepared by this
method in nanoform.
2. How will the electrical, magnetic & optical properties vary for nanoamterials compared to bulk. Explain
with an example for each.
3. What are the various carbon nano materials available? Describe one methos of producing Carbon nano
tubes.
Apply
24
Assignment test should contain only questions related to Higher Order Thinking (HOT) Skills pertaining to this course
127
Department of Information Technology, GMRIT| Curriculum | Regulation 2016
1. How is SEM used for characterization of nano materials? Describe the principle and working of instrument.
2. Based on the optical properties of Nano TiO2 and ZnO, describe the design & construction of nano sensors.
3. Describe the functions and applications of Carbon nano tubes and gaNnano wires.
Analyze
1. How is the size of nanomaterials characterized? Assess the advantage of using SEM & TEM instead of
powder XRD for size of particle, grain size characterization.
2. For a semiconductor, as the materials is sized down to nano, the electronic band structure is found to vary
from bulk material. Explain the changes in electronic band structure for a direct band gap material.
3. Calculate the changes in surface to volume ratio (S/V ratio) for a particle of 1 micrometer cube divided into
10 nanometer cubes by top down approaches. Comment on its impact in catalysis
128
Department of Information Technology, GMRIT| Curriculum | Regulation 2016
129
Department of Information Technology, GMRIT| Curriculum | Regulation 2016
Textbook (s)
1. Steven Murray, Learn R, Kindle 1st Edition, 2013.
2. Norman Matloff, The Art of R Programming: A Tour of Statistical Software Design, 1st edition, Kindle
Edition, 2014
3. Mark Gardener, Beginning R-The Statistical Programming Language, 2nd Edition, John Wiley & Sons, Inc.,
2012.
4. NASSCOM Material
Reference (s)
1. Mark Gardener ,Beginning R: The Statistical Programming Language ,1st Edition, John Wily & sons,
2012
2. Emmanuel Paradis , R for Beginners, 1st Edition, kindle 2012
3. https://bigdatauniversity.com/courses/introduction-to-data-analysis-using-r/
4. http://www.r-tutor.com/elementary-statistics
Remember
1. What is Ordinary least squares(OLS)?
2. What is Dummy Variables?
3. What are 2 ways of looping in R? Give an Example?
4. How to find summary statistics in R?
Understand
1. Explain about Big data and Data Analytics?
2. Explain Components of R with Example?
3. Explain about NoSQL? What are the types of NoSQL tools based on Data models
4. Which of the following is not a functionality of R- Linear modeling and nonlinear modeling
Apply
1. How do you read excel dataset in R
2. Explain the process of how to connect data with R?
3. Relate between the Rbind and Cbind
25
Assignment test should contain only questions related to Higher Order Thinking (HOT) Skills Pertaining to this course
130
Department of Information Technology, GMRIT| Curriculum | Regulation 2016
Analyze
1. How to interpret data to make it useful for business?
2. What are various steps involved organizational decision making?
3. How to find summary statistics in R
Evaluate
1. Define Knowing the language R? Justify using R as Calculator with example?
2. Explain about Regression Residuals with example?
4. Define Probability Distribution? Explain various Probability Distribution curves?
Create
1. Design the different Visualization models for Twitter data?
2. Create the various components of descriptive statistics? Explain with suitable example
131
Department of Information Technology, GMRIT| Curriculum | Regulation 2016
3103
Course Outcomes
7. Master the fundamentals of website development, such as HTML5, Servlet,JSP with MVC Architecture
8. Use fundamental skills to maintain web server required to host a website
9. Build dynamic, database-driven web applications, such as use of a IBM RAD, to develop robust online
programs
10. Implement core concepts of database connectivity
11. Design websites using appropriate security principles, focusing specifically on the vulnerabilities inherent
in the common web implementation
12. Design, code, publish, deployment of web applications on IBM Bluemix
COs–POs Mapping
COs PO3 PO5 PO6 PO7
1 2 3 1 3
2 2 3 2 1
3 3 2 2 2
4 2 3 1 3
5 2 3 2 2
6 3 3 3 3
132
Department of Information Technology, GMRIT| Curriculum | Regulation 2016
Development of Apps using Bluemix services- Registering Services in BluemixTM- Deploying a Nod.js
app that uses CloudantNoSQL DB- Demo Binding and Insertion of records- Build a Twitter influencer application
in Bluemix
Setup and installing- Eclipse and CD plugins, Jazz editor to deploy application toBluemix 12+4 hours
26
Assignment test should contain only questions related to Higher Order Thinking (HOT) Skills Pertaining to this course
133
Department of Information Technology, GMRIT| Curriculum | Regulation 2016
Apply
1. Demonstrate the process for war file deployment in the cloud.
2. How does bluemixstackupagaist AWS and Azure?
Analyze
1. Justify your answer .Which technique is used for Session management .
2. Deploy a Nod.js app that uses CloudantNoSQL DB
134
Department of Information Technology, GMRIT | Syllabi | Regulation 2016
COs–POs Mapping
COs PO2 PO5 PO6
1 3 3 1
2 3 3 2
3 3 3 3
4 1 1 1
5 3 2 2
6 3 2 1
Unit I
Concepts of DDBMS 13+4 Hours
Data Fragmentation; Replication; and allocation techniques for DDBMS; Methods for designing and implementing
DDBMS, designing a distributed relational database; Architectures for DDBMS: cluster federated, parallel databases
and client server architecture.
Introduction to Big Data
Introduction - Challenges of Conventional Systems, What is Business Analytics, Business Analytics lifecycle, Why
Big Data Analytics, Defining Big data, Characteristics of Big Data(V‟s), Business Analytics phases: Data
Acquisition- Data Cleaning - Data Manipulation - Data Analysis (Statistical and Analytical methods) to make sense
of data - Data Visualization
Unit II
Introduction to NoSQL 12+4 Hours
Overview, and History of NoSQL Databases Definition of the Four Types of NoSQL Database, The Value of
Relational Databases, Getting at Persistent Data, Concurrency, Integration, Impedance Mismatch, Application and
Integration Databases, Attack of the Clusters, The Emergence of NoSQL, Key Points,Comparison of relational
databases to new NoSQL stores, MongoDB, Cassandra, HBASE, Neo4j use and deployment, Challenges NoSQL
approach, Key-Value and Document Data Models, Column-Family Stores, Aggregate-Oriented Databases
135
Department of Information Technology, GMRIT | Syllabi | Regulation 2016
Unit III
Introduction to HADOOP 10+4 Hours
Introduction to HADOOP - Hadoop ecosystem components and uses, Hadoop Storage: HDFS, Concept of Hadoop
Distributed file system, Design of HDFS, Configuration of HDFS.
HADOOP MapReduce
Hadoop Data Types, Functional-Concept of Mappers, Functional-Concept of Reducers, MapReduce Execution
Framework, Partitioners and Combiners, Hadoop Clusters component : NameNode, Secondary NameNode, and
DataNode, Data flow (Anatomy of File Write and Read);
Challenges for processing big data, RDBMS vs HADOOP,Accessing HDFS - CLI (Command Line Interface)
Unit IV
Statistics with R Programming 10+3 Hours
Introduction, How to run R, R Sessions and Functions, Basic Math, Variables, Data Types, Vectors, Conclusion,
Advanced Data Structures, Data Frames, Lists, Matrices, Arrays, Classes.R Programming Structures, Control
Statements, Loops, - Looping Over Nonvector Sets,- If-Else, Arithmetic and Boolean Operators and values, Default
Values for Argument, Return Values, Deciding Whether to explicitly call return- Returning Complex Objects,
Functions are Objective, No Pointers in R, Recursion, A Quicksort Implementation-Extended Extended Example: A
Binary Search Tree.
1. Distributed Databases:Principles and Systems Paperback – 1 Jul 2017 by Stefano Ceri Giuseppe
Pelagatti , McGraw Hill Education, ISBN-10: 0070265119, ISBN-13: 978-0070265110, 2017.
2. Tom White “ Hadoop: The Definitive Guide” FourthEdition, O‟ reilly Media, 2015
3. Prajapati, V. Big data analytics with R and Hadoop. Packt Publishing Ltd, 2013
Reference (s)
1. M. Tamer Ozsu and Patrick Valduriez, “Principles of Distributed Database Systems”, Springer Science +
Business Media , 3rd Edition, 2011.
2. Zikopoulos, P., Parasuraman, K., Deutsch, T., Giles, J., & Corrigan, D.v Harness the Powerof Big Data The
IBM Big Data Platform. McGraw Hill Professional, 2012
3. The Art of R Programming, Norman Matloff, Cengage Learning, 1st Edition, 2011
136
Department of Information Technology, GMRIT | Syllabi | Regulation 2016
Remember
1. List out data sources
2. Name the basic advantages of data analysis
3. Define Big data
4. Define Big Data Analytics
5. What is parallel processing?
6. Name two basic operations of parallel processing
Understand
1. Explain the role of map-reduce in BDA
2. Demonstrate with neat diagram BDA
3. Explain architecture of HADOOP
4. What is the role of OOZIE.
5. Explain the advantages of NoSQL
6. How to provide security to Big data
Apply
1. Explain the steps to store the data in HDFS
2. Build the schema in Hive.
3. Write the steps to analyze the log files in Big data
Analyze
1. List out any 3 differences between structured and un-structured data
2. Analyze the difference between data analysis and reporting
Evaluate
1. Evaluate the performance of HDFS and HADOOP in a simple cluster
Create
1. Construct the unstructured table using Big data analytic tools
2. Modify the table in NoSQL Database
1
Assignment test should contain only questions related to Higher Order Thinking (HOT) Skills pertaining to the course.
137
Department of Information Technology, GMRIT | Syllabi | Regulation 2016
Course Outcomes
1. Apply mobile application models/architectures and patterns to the development of a mobile
software application.
2. Demonstrate the components and structure of a mobile development framework (Google‟s
Android Studio).
3. Apply essential Android Programming concepts.
4. Develop various Android applications related to layouts & rich uses interactive interfaces
5. Develop Android applications related to mobile related server-less database like SQLITE
6. Apply a mobile development framework to the development of a mobile application.
COs–POs Mapping
COs PO2 PO4 PO5 PO9
1 2 3 3 2
2 3 2 2 3
3 3 3 3 2
4 2 3 3 1
5 3 1 2 3
6 2 2 1 2
List of Experiments
1. Develop an application that uses GUI components, Font and Colors forWindows Mobile devices.
2. Write an android program to print the set of alphabets/strings in a linear layout and in table
layout.
3. Write an android program to demonstrate DatePickerDialog, TimePickerDialog with current date
and current running time and perform the tasks to demonstrate a Menu with name File with New
and Open as menu items.
4. Write an android program to switch from one activity to another using Intent. When the activity is
changed disable the use of back button to avoid going to previous activity Views
5. Write an android program to demonstrate scroll view and list view. (List view should array
adapter. The adapter should use array list of companies.Each item in the list view should have
company name, company address and its annual revenue.)
6. Write an android program to implement the following operations using SQLite Database.
Create the SQLite Database Object.
Execute the CRUD Operations required for the application
Close the database.
138
Department of Information Technology, GMRIT | Syllabi | Regulation 2016
7. Write a sample program to show how to make a SOCKET Connection from j2me phone.
This J2ME sample program shows how to how to make a SOCKETConnection from a J2ME
Phone.
8. Develop Win Application on Number of Super specialty hospitals in a city. SQLite Database
9. Implement Window applicationDivide students into batches and suggest them to develop
any interested project such as.
a. Student Mark Entry System
b. Attendance System
10. Creating an application that correctly deals with display orientation modeslike Docking and
anchoring controls for Windows Mobile devices.(Use Visual Basic .NET or Visual C# /
Visual Studio 2013)
11. Implement an Window application that creates an alert upon receiving a message.
12. Develop a native Winapplication that uses GPS location information.
Reading Material(s)
1. Mobile Application Development Lab manual–Department of CSE-GMRIT, Rajam
139
Department of Information Technology, GMRIT | Syllabi | Regulation 2016
List of Experiments
1. Set up a pseudo-distributed, single-node Hadoop cluster backed by the Hadoop DistributedFile System,
running on Ubuntu Linux. After successful installation on one node,configuration of a multi-node Hadoop
cluster(one master and multiple slaves).Hadoop file management: Adding files and directories ,Retrieving
files , Deleting files
2. Move files between your regular Linux file-system and HDFS you can use the put and get commands.
3. Run the word-count job with the command below, where “/user/biadmin/input/” is where the input files are,
and “output” is the directory where the output of the job will be stored.
4. Write a script to implement the following:
o Exploring Data with Apache Pig
o Splitting a Dataset
o Joining Datasets with Apache Pig
5. Write a script to implement the following on the given dataset:
o Sorting
o Grouping the Data with Apache Pig
6. Write a script to Demonstration: Computing Page Rank using Pig
7. Database manipulation using Hive: To create, alter, drop databases and views
8. Define an external Hive table and review the results, Implement Partition and Skew in Hive
9. Functions and indexes in Hive, Use Hive to Drop Functions and indexes
10. Produce the histogram by summing the word counts grouped by word length.
Reading Material(s)
1. Data Science and Big Data Analytics, EMC2 Education Dept. of CSE VR14 VRSEC 162 Services
2. Jiawei Han and Micheline Kamber, Data Mining Concepts and Techniques, 2 ed, Elseiver publishers
3. VigneshPrajapati, Big Data Analytics with R and Hadoop, packt publishing, 2013
4. Bill Franks, Taming The Big Data Tidal Wave, 1st Edition, Wiley, 2012. [3] Frank J. Ohlhorst, Big Data
Analytics,1st Edition, Wiley, 2012.
140
Department of Information Technology, GMRIT | Syllabi | Regulation 2016
Unit I
Introduction
Importance of user Interface-definition, importance of good design, Benefits of good design, A brief history of
Screen design, The graphical user interface-popularity of graphics, the concept of direct manipulation, graphical
system, Characteristics, Web user-Interface popularity, characteristics-Principles of user interface.
Design methodologies-participatory design-Usability and tests-Acceptability tests.
10+5 Hours
Unit II
Design process
Human interaction with computers, importance of human characteristics human consideration, Human interaction
speeds, understanding business junctions, Screen Designing:-Design goals-Screen planning and purpose, organizing
screen elements, ordering of screen data and content-screen navigation and flow-Visually pleasing composition-
amount of information-focus and emphasis-presentation information simply and meaningfully-information retrieval
on web-statistical graphics-Technological consideration in interface design.
Design Visual thinking-virtual-environments-item presentation sequence-layout-form fill-in dialog boxes
10+3 Hours
Unit III
Windows
New and Navigation schemes selection of window, selection of devices based and screen based controls,
Components-text and messages, Icons and increases-Multimedia, uses problems, choosing colors.
Goals of Co-operation-asynchronous interactions-synchronous distributed-application to education-social uses
12+4 Hours
Unit IV
Software tools &Interaction Devices
Specification methods, interface-Building Tools, Keyboard and function keys, pointing devices-speech recognition
digitization and generation-image and video displays-drivers.
Database query and phase search in documents, multimedia document searches, information visualization
13+3 Hours
141
Department of Information Technology, GMRIT | Syllabi | Regulation 2016
Total:45+15 Hours
Textbook (s)
1. Wilbert O Galitz, Wiley Dream Tech, The essential guide to user interface design,2ndEdition,Wiley
Computer Publishing, 2002
2. Ben Shneidermann, Designing the user interface, 3rd Edition, Pearson Education Asia, 2008
Reference (s)
1. Alan Dix, Janet Fincay, GreGoryd, Abowd, Russell Bealg, Human Computer Interaction.,3rd Edition,
Pearson Education, 2004
Remember
1. Define Human Computer Interaction.
2. What is the basic goal of Human Computer Interaction?
3. State the long term goal of HCI
4. List the factors HCI designers must consider for User Interface Design
Understand
1. Demonstrate the HCI importance.
2. Extend the Trouble faced by human with Computers.
3. Illustrate Psychological Responses to Poor Design
4. InterpretHuman-factor variables used in Comparison of pointing devices.
Apply
2
Assignment test should contain only questions related to Higher Order Thinking (HOT) Skills pertaining to this course.
142
Department of Information Technology, GMRIT | Syllabi | Regulation 2016
COs–POs) Mapping
COs PO5 PO11 PSO1 PSO2
1 3 1 2 2
2 2 3 3 1
3 3 2 2 3
4 2 3 2 1
5 3 1 1 3
6 2 3 2 1
UNIT – I
Introduction
General Middleware, Service Specific Middleware, Client/Server Building blocks – RPC - Messaging – Peer – to –
Peer, Java RMI - Computing standards – OMG - Overview of CORBA - Overview of COM/DCOM - Overview of
EJB - Middleware types - Middleware in distributed Applications
UNIT-III
COM and .NET
Evolution of DCOM - Introduction to COM - COM clients and servers - COM IDL - COM Interfaces COM
Threading Models – Marshalling - Custom and standard marshalling - Comparison COM and CORBA -
Introduction to .NET - Overview of .NET architecture
143
Department of Information Technology, GMRIT | Syllabi | Regulation 2016
UNIT-IV
Remember
5. Represent the Characteristics of Client/Server Architecture
6. State 3 methods of Dynamic CORBA
7. List four uses of Middleware
8. Write the role of RMI
Understand
5. Demonstrate the pitfalls for Client/Server Computing
6. Illustrate Late Binding with system.reflection and Activator class
7. Justify the reasons for employing distributed computing in business
3
Assignment test should contain only questions related to Higher Order Thinking (HOT) Skills pertaining to this course.
144
Department of Information Technology, GMRIT | Syllabi | Regulation 2016
Apply
145
Department of Information Technology, GMRIT | Syllabi | Regulation 2016
COs–POs Mapping
COs PO3 PO5 PO6
1 1 3 1
2 1 3 1
3 3 2 2
4 1 2 3
5 2 3 1
6 1 2 3
3–Strongly linked | 2–Moderately linked | 1–Weakly linked
UNIT I
The principles of conventional software Engineering, Principles of Modern software management, transitioning to
an iterative process.Conventional Software Management: The Waterfall Model, Conventional Software
Management Performance, Software Economics, Software Cost Estimation.Improving Software Economics:
Reducing Software Product Size, Improving Software Processes, Improving Team Effectiveness, Improving
Automation, Achieving Required Quality, Peer Inspections.
Software Development Phases, Procedural vs Object Oriented Paradigm.
12+4 Hours
UNIT II
Life Cycle Phases: Engineering and Production Stages, Inception, Elaboration, Construction, Transition Phases.
Artifacts of Software Process: The Artifact Sets, Types of Artifacts.;Software Architectures: A Management
Perspective and Technical Perspective, Software Process Workflows, Iteration Workflows.
Off-the-Shelf Components, Requirement Specification Document, Methods of Specification.
10+3 Hours
UNITIII
Checkpoints of the Process: Major Milestones, Minor Milestones, Periodic Status Assessments. Iterative Process
Planning: Work breakdown Structures, Planning Guidelines, Cost Estimation and Scheduling Iteration Planning
Process, Pragmatic Planning.; Project Organizations and Responsibilities: Line-of-Business Organizations,
Project Organizations, Evolution of Organizations.; Process Automation: Automation Building Blocks, The Project
Environment.
CASE Tools for Requirements Specification, Planning and Estimation.
10+3 Hours
UNIT IV
The Seven Core Metrics, Management Indicators, Quality Indicators, Life Cycle Expectations, Pragmatic Software
Metrics, Metrics Automation, Tailoring the Process- Process Discriminant.; Future Software Project
Management: Modern Project Profiles, Next Generation Software Economics, Modern Process Transitions.
Types of Software Testing, Software Testing Methodologies.
10+3 Hours
Total: 45+15 Hours
146
Department of Information Technology, GMRIT | Syllabi | Regulation 2016
Textbook (s)
1. Walker Royce, Software Project Management, Pearson Education, 2005.
Reference (s)
1. Bob Hughes, Mike Cotterell and Rajib Mal, Software Project Management, Tata McGraw- Hill Edition.
2. Joel Henry, Software Project Management, Pearson Education.
3. Pankaj Jalote, Software Project Management in practice, PearsonEducation.2005.
Remember
1. Define Software Process
2. List the phases of Software Development.
3. What is an Artifact?
4. What is Process Automation?
Understand
1. Explain various formal methods of specification.
2. Explain COCOMO II Model.
3. Explain Critical Path Methods to schedule a software project.
Apply
4
Comprehensive test should contain only questions related to Higher Order Thinking (HOT) Skills Pertaining to this course
147
Department of Information Technology, GMRIT | Syllabi | Regulation 2016
3103
Course Outcomes
1.Describe various styles of interpretation of qualitative data
2. Explain the relative appropriateness of different analysis approaches for a particular qualitative study
3. Apply one or more analytic approaches to data they have collected and write an analysis paper
4. Describe special issues in ethics for qualitative research
5. Develop qualitative data files effectively to ensure ease of use and participant confidentiality
6. Illustrate the basic and intermediate functions of software program for coding of textual data
COs–POs Mapping
COs PO3 PO5
1 3 2
2 2 3
3 1 3
4 3 2
5 2 1
6 1 3
3–Strongly linked | 2–Moderately linked | 1–Weakly linked
Unit I
Concepts-Contexts-Basics
Qualitative Data Analysis - Ethnographic Fieldwork - Sampling Strategies - Transcription of Data Analysis -
Collaborative Analysis of Qualitative Data - Qualitative Comparative Practices: Dimensions - Cases and Strategies.
Sampling-types of sampling for data (using simple tools)
11+3 Hours
Unit II
Reflexivity and the Practice of Qualitative Research & Analytic Strategies
Induction - Deduction & Abduction - Interpretation and Analysis - Grounded Theory and Theoretical Coding -
Qualitative Content Analysis - Phenomenology - Narrative Analysis - Documentary Method - Hermeneutics and
Objective Hermeneutics - Cultural Studies - Net no graphic Analysis - Using Software in Qualitative Analysis.
Study of different Software Tools for Qualitative Analysis
11+3 Hours
Unit III
Types of Data and their Analysis
Analyzing -Interviews - Focus Groups - Observations - Documents - News Media - Films - Images - Sounds -
Virtual Data - Video Analysis and Videography - Conversations and Conversation Analysis - Discourses and
Discourse Analysis
Data Management Techniques
12+4 Hours
Unit IV
Using and Assessing Qualitative Data Analysis
Re-analysis of Qualitative Data - Qualitative Meta-analysis - Quality of Data Analysis - Ethical Use of Qualitative
Data and Findings - Generalization in and from Qualitative Analysis - Theorization from Data - Writing and/as
Analysis - Implementation.
Report writing for a sample data from the field work
12+5 Hours
Total: 45+15
148
Department of Information Technology, GMRIT | Syllabi | Regulation 2016
Textbook (s)
1. Editor: Uwe Flick, The SAGE Handbook of Qualitative Data Analysis, 3rd Edition, SAGE Publications India
Pvt. Ltd., New Delhi, 2013.
2. Robert K. Yin, Qualitative Research from Start to Finish, 2nd Edition, The Guilford Press, London, 2010.
Reference (s)
1. Louise B. Silverstein, Carl F. Auerbach, Qualitative Data: An Introduction to Coding and Analysis, New
York University Press, New York, 2003.
2. Bernard, H.R.& Ryan, G. W. Thousand Oaks, CA: Analyzing Qualitative Data: Systematic Approaches, 2nd
Edition, SAGE Publications, 2017.
5
Assignment test should contain only questions related to Higher Order Thinking (HOT) Skills pertaining to this course.
149
Department of Information Technology, GMRIT | Syllabi | Regulation 2016
3103
Course Outcomes
1 2 1
2 2 1
3 2 1
4 3 2 1
5 2 1 1
6 3 2 1
Unit I
Digital Image Fundamentals
Fundamental steps in Digital image processing,Components of an Image processing system, Elements of visual
perception, Image sampling and quantization, basic relationships between pixels, An introduction to mathematical
tools in digital image processing.
Image transforms: 2D DFT and its properties, Discrete cosine transform, Discrete Wavelet Transform.
Walsh Transform, Hadamard Transform
13+4 Hours
Unit II
Image Enhancement and Color Image Processing
Enhancement in spatial domain: Intensity transformations, Histogram Processing, smoothing and sharpening, Image
Enhancement in Frequency Domain: Smoothing and Sharpening Filters
Color fundamentals, Color models, Pseudo color Image Processing, Full Color Image Processing, color
transformations.
Color Image Enhancement in spatial and frequency domain
13+4 Hours
Unit III
Image Restoration
Image Degradation/Restoration model, Noise models, Restoration using spatial filtering, Periodic noise reduction by
frequency domain filtering, Linear Position-Invariant Degradations, Inverse filtering, Minimum Mean Square Error
Filtering, Constrained Least squares filtering.
150
Department of Information Technology, GMRIT | Syllabi | Regulation 2016
Unit IV
Image Segmentation and Compression
Image segmentation: Fundamentals, point, Line and Edge detection, Thresholding, Region based Segmentation,
Image Compression: Fundamentals, Image Compression Models, Lossless Compression, Lossy Compression,
Transform coding and JPEG compression standard.
Watershed algorithm 10+4 Hours
Total: 45+15 Hours
Textbook (s)
1. Rafel C.Gonzalez and Richard E.Woods, Digital Image Processing, Pearson Education,3rdEdition 2011
2. S.Sridhar, Digital Image Processing, Oxford publishers, 2nd Edition, 2016
Reference (s)
1. Anil K. Jain, Fundamentals of Digital Image Processing, Pearson Education, 1 st Edition, 2015
2. S.Jayaraman, S.Esakirajan, T.Veerakaumar, Digital Image Processing, McGraw Hill publishers, 2011
3. M.Sonka,V. Hlavac, R. Boyle, Image Processing, Analysis and Machine Vision, Vikas Publishing House,
2001
REMEMBER
6
Assignment test should contain only questions related to Higher Order Thinking (HOT) Skills pertaining to this course
151
Department of Information Technology, GMRIT | Syllabi | Regulation 2016
UNDERSTAND
APPLY
3 1 2 1 (q)
2 2 0 2
1 2 1 1
(p) 1 0 1 2
5. Show that a linear, spatially –invariant degradation system with additive noise can be modeled in the spatial
domain as the convolution of the degradation function with an image followed by addition of noise
ANALYSE
1. Differentiate between image enhancement and restoration in terms of processing and applications
2. Compare lossy and lossless compression methods in terms of entropy, applications and transforms used
3. Is image enhancement a subjective approach? Justify your answer
4. Is lossless compression preferred to lossy compression? Justify your answer
5. Differentiate region based segmentation and thresholding based segmentation in terms of approach and
applications
152
Department of Information Technology, GMRIT | Syllabi | Regulation 2016
Unit-I
Computer Security Concepts
Introduction to Information Security, Introduction to Data and Network Security, Integrity, and Availability, NIST
FIPS 199 Standard, Assets and Threat Models,Examples, Control Hijacking– Attacks and defenses, Buffer overflow
and control hijacking attacks,Exploitation techniques and fuzzing-Finding vulnerabilities and exploits
Dealing with Legacy code-Dealing with bad (legacy) application code: Sandboxing and Isolation.
11+4 Hours
Unit II
Web Application Security
Least privilege, access control, operating system security-The principle of least privilege, Access control concepts,
Operating system mechanisms, Unix, Windows, Qmail, Chromium, and Android examples. Basic web security
model-Browser content, Document object model (DOM), Same-origin policy. SQL injection, Cross-site request
forgery, Cross-site scripting, Attacks and Defenses, Generating and storing session tokens, Authenticating users
The SSL protocol-The lock icon-User interface attacks-Pretty Good Privacy.
11+4 Hours
Unit III
Network Defenses
Network defense tools, Secure protocols, Firewalls, VPNs, Tor, I2P, Intrusion Detection and filters, Host-Based IDS
vs Network-Based IDS, Dealing with unwanted traffic: Denial of service attacks.Malicious Software and Software
Security-Malicious Web, Internet Security Issues, Types of Internet Security Issues, Computer viruses, Spyware,
Key-Loggers, Secure Coding, Electronic and Information Warfare.
11+4 Hours
Unit IV
Mobile Platform Security Models
Android, iOSMobile platform security models, Detecting Android malware in Android markets.Security Risk
Management-How Much Security Do You Really Need, Risk Management, Information Security Risk Assessment:
153
Department of Information Technology, GMRIT | Syllabi | Regulation 2016
Introduction, Information Security Risk Assessment: Case Studies, Risk Assessment in Practice.The Trusted
Computing Architecture-Introduction to Trusted Computing,
TPM Provisioning, Exact Mechanics of TPM. 11+4 Hours
Total: 45+15 Hours
Textbook (s)
1. William Stallings, Network Security Essentials: Applications and Standards, 4th edition, Prentice Hall,
2010.
2. Michael T. Goodrich and Roberto Tamassia, Introduction to Computer Security, Addison Wesley, 2011.
Reference (s)
1. Alfred J. Menezes, Paul C. van Oorschot and Scott A. Vanstone, Handbook of Applied Cryptography, CRC
Press, 2001.
Remember
1.
Distinguish between message integrity and message authentication.
2.
Write the authentication dialogue exchanged between a user and authentication
server in Kerberos V4?
Understand
1. Determine the security services required to counter various types of Active and
Passive attacks. What are the common C functions that give raise to buffer overflow?
2. Describe the round function of CAST block Cipher. Explain the encryption algorithm of CAST.
Apply
1. What are the requirements of hash functions?
2. What is the need for security services at transport layer of Internet Protocol?
3. Explain the four protocols defined by Secure Socket Layer.
Analyze
1. What are the main features of Kerberos Version 5?
2. Write briefly about the signature based Intrusion Detection Systems.
7
Comprehensive test should contain only questions related to Higher Order Thinking (HOT) Skills Pertaining to this course
154
Department of Information Technology, GMRIT | Syllabi | Regulation 2016
COs–POs) Mapping
COs PO5 PO6 PO8
1 2 2 3
2 2 2 3
3 2 1 3
4 2 1 2
5 2 2 3
6 2 2 2
3–Strongly linked | 2–Moderately linked | 1–Weakly linked
UNIT I
Introduction: Security Attacks, Security Goals, Computer criminals, Methods of Defence, Security Services,
Security Mechanisms. Basics of Cryptography:Symmetric Cipher Model, Substitution Techniques,
Transportation, Techniques, Other Cipher Properties- Confusion, Diffusion, Block and Stream Ciphers. Block
Cipher Design Principles and Modes of Operations, Symmetric Key Cryptosystems: Principles of Private Key
System, Data Encryption Standard (DES), Strength of DES, Triple DES, International Data Encryption algorithm,
Advanced Encryption Standard (AES),
Blowfish, CAST-128. 11 + 4 Hours
UNIT II
Public Key Ciphers: Principles of Public Key Cryptosystems, RSA Algorithm, Diffie-Hellman Key Exchange.
Cryptographic Hash Functions: Principles of Cryptographic Hash functions, Applications of Cryptographic Hash
Functions, Secure Hash Algorithm (SHA), Message Authentication Codes – Message Authentication Requirements
and Functions, HMAC, Digital Signatures, Digital Signature Schemes, Authentication Protocols,
UNIT III
Authentication Applications: Kerberos, Key Management and Distribution, X.509 Directory Authentication service,
Public Key Infrastructure, Electronic Mail Security: Pretty Good Privacy, S/MIME. IP Security: Overview,
Architecture, Authentication Header, Encapsulating Security Payload, Combining security Associations, Internet
Key Exchange, Web Security: Web Security Considerations, Secure Sockets Layer and Transport Layer Security,
Electronic Payment. 11 + 4 Hours
155
Department of Information Technology, GMRIT | Syllabi | Regulation 2016
UNIT IV
IDS and Firewalls: Intruders, Intrusion Detection, Password Management, Firewalls-Characteristics, Types of
Firewalls, Placement of Firewalls, Firewall Configuration, Trusted Systems. Non-cryptographic protocol
Vulnerabilities: DoS, DDoS, Session Hijacking and Spoofing, Software Vulnerabilities- Phishing, Buffer
Overflow,
Format String Attacks, SQL Injection. 11 + 4 Hours
Text Books:
1. William Stallings, “Cryptography And Network Security – Principles and Practices”,
Prentice Hall of India, Third Edition, 2003.
2. AtulKahate, "Cryptography and Network Security", Tata McGraw-Hill, 2003.
1. William Stallings, “Cryptography and Network Security: Principles and Practices”, Third
Edition, Pearson Education, 2006.
2. Matt Bishop ,“Computer Security art and science ”, Second Edition, Pearson Education,
2002
3. Wade Trappe and Lawrence C. Washington, “Introduction to Cryptography with Coding
Theory” Second Edition, Pearson Education, 2007
4. Jonathan Katz, and Yehuda Lindell, Introduction to Modern Cryptography, CRC Press,
2007
5. Douglas R. Stinson, “Cryptography Theory and Practice”, Third Edition, Chapman &
Hall/CRC, 2006
6. Wenbo Mao, “Modern Cryptography – Theory and Practice”, Pearson Education, First
Edition, 2006.
7. Network Security and Cryptography, Menezes Bernard, Cengage Learning, New Delhi,
2011
8
Comprehensive test should contain only questions related to Higher Order Thinking (HOT) Skills Pertaining to this course
156
Department of Information Technology, GMRIT | Syllabi | Regulation 2016
Remember
1. Use Caesar cipher with key =15 to encrypt the message “Hello”.
2. What is differential cryptanalysis?
3. Solve the congruence x 2 7 mod 13.
4. Distinguish between message integrity and message authentication.
5. Write the authentication dialogue exchanged between a user and authentication
server in Kerberos V4?
Understand
1. What are the tools available for session hijacking? Explain briefly how they work.
2. Determine the security services required to counter various types of Active and
Passive attacks. What are the common C functions that give raise to buffer overflow?
3. Describe the round function of CAST block Cipher. Explain the encryption algorithm of CAST.
4. Explain the Key Scheduling of CAST. How many S-boxes are used by CAST
Apply
1. Explain the compression of Secure Hash Algorithm.
2. What are the requirements of hash functions?
3. What is the need for security services at transport layer of Internet Protocol?
4. Explain the four protocols defined by Secure Socket Layer.
Analyze
1. What are the main features of Kerberos Version 5?
2. Write briefly about the signature based Intrusion Detection Systems.
3. What is Transport mode and Tunnel mode? Explain about the scope of AH and ESP in these modes .
157
Department of Information Technology, GMRIT | Syllabi | Regulation 2016
COs–POs) Mapping
COs PO2 PO4 PO5 PO12
1 2 2 3 2
2 2 2 3 2
3 2 1 3 3
4 2 1 2 2
5 2 2 3 2
6 2 2 2 2
Unit I
Introduction
Introduction to Web, Limitations of current Web, Development of Semantic Web, Emergence of the Social Web,
Statistical Properties of Social Networks, Network analysis, Development of Social Network Analysis-Key concepts
and measures in network analysis, Discussion networks-Blogs and online communities-Web-based networks
Unit II
Evolution
Evolution in Social Networks– Framework, Tracing Smoothly Evolving Communities, Models
and Algorithms for Social Influence Analysis, Influence Related Statistics, Social Similarity
and Influence, Influence Maximization in Viral Marketing, Link Prediction in Social Networks, Feature based
Link Prediction
Unit III
Mining Communities and Opinion Mining
Applications of Community Mining Algorithms, Node Classification in Social Networks
Opinion Extraction–Sentiment Classification and Clustering, Temporal Sentiment Analysis-Irony Detection in
Opinion Mining-Wish Analysis–Product Review Mining–Review Classification
158
Department of Information Technology, GMRIT | Syllabi | Regulation 2016
Unit IV
Modelling and Visualization
12+4 Hours
Total: 45+15 Hours
Textbook (s)
1. Charu C. Aggarwal, Social Network Data Analytics, Springer, 2011
2. Peter Mika, Social Networks and the Semantic Web, Springer, 1st Edition, 2007.
Reference (s)
1. BorkoFurht, Handbook of Social Network Technologies and Applications, Springer, 1st Edition, 2010.
2. GuandongXu,Yanchun Zhang and Lin Li, Web Mining and Social Networking, Techniques and
applications, Springer, 1st Edition, 2011.
3. Giles, Mark Smith, John Yen, Advances in Social Network Mining and Analysis, Springer,
2010.
4. Ajith Abraham, Aboul Ella Hassanien, VáclavSnášel, Computational Social Network
Analysis: Trends, Tools and Research Advances, Springer, 2009.
Remember
1. What are the limitations of current web?
2. List the statistical properties of social networks
3. Define social similarity.
4. What are the two different measures in influence related statistics
Understand
6. Explain about development of semantic web in research.
7. Demonstrate web based networks.
8. Illustrate the ways of visualizing social networks with matrix based representation and node – link diagram.
9
Comprehensive test should contain only questions related to Higher Order Thinking (HOT) Skills Pertaining to this course
159
Department of Information Technology, GMRIT | Syllabi | Regulation 2016
2. Solve Path, Length and Distance between nodes (i.e., Density measures) using SNA Data Processing Tools.
3. Make use of the above graph to solve network density and cut points.
4. Develop random graphs using Erdos Reini Model
5. Solve Weak Ties,Traidic closure for the following graph.
Analyze
6. Compute PageRank for the following figure.
8. Examine the ways to visualize community‟s hubs and node centrality measures using sna package.
9. Analyze positive, moderate and negative feeds using sentiment analysis on twitter data.
160
Department of Information Technology, GMRIT | Syllabi | Regulation 2016
COs–POs) Mapping
COs PO3 PO5 PO6 PO7
1 3 1 1 2
2 1 3 2 3
3 3 1 2 1
4 3 1 3 3
5 3 3 2 1
6 3 3 3 2
Unit-1 (10+3)
Data Management: Sources of Big data, Introduction to Data Management and importance of Data
management,Functions of Data Management, Data Management Goals, Data Management Principles,
Data Management Issues, Design Data Architecture and manage the Data for analysis, understand various
sources of the Data, Export all the Data onto the cloud.
Unit – 2 (12+4)
Big Data Tools: Introduction to the Big Data tools like spark, Scala, Impala, Identify gaps in the
data and follow-up for decision making: Missing data Imputation, Model based Techniques.
Big Data Analytics: Introduction to Big Data Analytics, Relational Database to Big data-Key
Value store, Column Oriented database, Document based database, Graph database, Overview of
Hadoop, HDFS, MapReduce, Outlier detection and elimination, Data preprocessing for the
analysis.
Hadoop Clusters and the Hadoop Ecosystem
Unit – 3 (12+4)
Machine Learning Algorithms: Hypothesis testing and Determining the multiple analytical
methodologies: Supervised Learning, Unsupervised Learning, Reinforcement Learning, Train
161
Department of Information Technology, GMRIT | Syllabi | Regulation 2016
model using statistical/machine learning algorithms, Test model, Sample for prediction, Explore
the chosen algorithms for more accuracy
Unint-4 (11+4)
Data Visualization: Prepare the data for visualization, Draw insights out of the visualization
tool, Data Visualization in Tablue: Extract the data, the workspace, Data Visualization.
Remember
1. Define Big data.
2. Define data analytics
3. Define No SQL
4. Define Machine Learning
Understand
1. Explain the functionalities of data management
2. Explain various sources of the data
3. What are the steps involved in Export job process in Amazon S3
4. What are the benefits of using spark, scala, and impala
5. what are the steps followed in machine learning algorithms
10
Assignment test should contain only questions related to Higher Order Thinking (HOT) Skills Pertaining to this course
162
Department of Information Technology, GMRIT | Syllabi | Regulation 2016
Apply
1. how you identify gaps in the data and what are the methods for reducing missing values in data set
2. write down the steps involved in data visualization in tableu
3.
Analyze
1. Which source of data is more reliable and why
2. What are the outliers and how do we detect them.
3. Why do we use data visualization and what is the role of tableu in data visualization
163
Department of Information Technology, GMRIT | Syllabi | Regulation 2016
UNIT II (12+4)
Hours
Introduction to Security Audit: Definition and Need for security audit, Scope of an audit,Audit
Types & Phases, Audit methodology,AuditTasks,post auditing actions and reporting, case
studies:Firewall Security Auditing,IDS Security Auditing and Social Engineering Auditing.
Total: 45+15
164
Department of Information Technology, GMRIT | Syllabi | Regulation 2016
Textbook (s)
1. NASSCOM Study Material
Reference (s)
1. NASSCOM Study Material
Remember
1. List the various security metrics
2. List advantages of security audit
3. Define Vulnerability.
Understand
7. Explain need of configurations
8. Explain Identification of Digital Evidence,
9. Write about NIST sample metrics
10. Discuss about vulnerability scanning.
Apply
1. Apply any auditing tool to perform security audit.
2. Apply different network scanning tools to collect vulnerable information.
Analyze
1. Analyze log files of IDS&IPS tools to find level of risk.
11
Comprehensive test should contain only questions related to Higher Order Thinking (HOT) Skills Pertaining to this course
165
Department of Information Technology, GMRIT | Syllabi | Regulation 2016
COs–POs Mapping
COs PO3 PO5 PO6 PO7
1 3 2 3 3
2 2 1 1 2
3 2 1 2 3
4 1 3 2 2
5 1 3 3 1
6 1 3 2 2
Unit I
Introduction to Hadoop & Big Data using IBM Infosphere Big Insights
Functions and features of Hadoop, Capabilities of Hadoop and HDFS, Administer HDFS, Big Data, , How Hadoop
solves the Big Data problem, IBM‟s 4V‟s, Hadoop ecosystem, Practical Questions
Linux Based Commands, The limitations of the existing solutions for Big Data problems, Types of Data.12+4 Hours
Unit II
Introduction to Sqoop, Sqoop Job & Hive
Import tables from RDBMS MYSQL FROM HDFS(HADOOP), Export data from HDFS TO RDBMS MYSQL,
Import particular columns of the table from RDBMS MYSQL TO HDFS, Import subset of tables RDBMS MYSQL
TO HDFS, Use of warehouse-dir in sqoop, Perform SQL queries in sqoop by using EVAL command, SQOOP
JOBS, Sqoop Job Incremental Import.
About Hive, Hive Components, Comparison with Traditional Database, Loading and Querying Data in Hive
Basic SQL Query Formation & Generation. 13+3 Hours
Unit III
Introduction to MapreduceProraming
Introduction to mapreduce Programing, Introduction to pig Latin language 11+3 Hours
Unit IV
Introduction of Big Data Programming & Big SQL
Introduction to Big Data Programming
Introduction to Big SQL , Big SQL Data Types, Big R overview 11+3 Hours
Total: 47+13 Hours
166
Department of Information Technology, GMRIT | Syllabi | Regulation 2016
Textbook (s)
1. IBM CE - Essentials of Big Data with Hadoop using IBM InfoSphereBigInsights
2. IBM CE - Big Data Programming using IBM InfosphereBigInsights
Reference (s)
1. R. F. Gilberg, B. A.Forouzan, Data Structures A Pseudocode Approach with C, 2 ndEdition, CENGAGE
Learning, 2005
2. S. Tanenbaum, Y. Langsam and M.J. Augenstein,Data Structures using C, Pearson Education, 1990
3. Seymour Lipschutz, Data Structures with C, Schaum Series, McGraw Hill Education, 2010
4. Horowitz, Sahni and Anderson-Freed, Fundamentals of Data Structures in C, 2ndEdition, Universities Press,
2008
5. Mark Allen Weiss, Data Structures and Algorithm Analysis in C, Pearson Education, 2002
Remember
1. List theactive and passive namenodes
2. Does Apache Sqoop have a default database?
3. Define sqoop job
4. Abbreviate 3V‟s
5. Give the syntax of orderby
6. Define Job Tracker
Understand
1. Explain the use of HDFS for applications having large data sets and not when there are a lot of small files?
2. Classify “HDFS Block” and an “Input Split”?
3. Illustrate the list all databases whose name starts with p.
4. Identify the procedure how the Namenode tackle Datanode failures
5. Represent Shuffling and Sorting in MapReduce?
Apply
1. On what concept the Hadoop framework needs to be applied? Name the port number for NameNode, Task
Tracker and Job Tracker and deploy the procedure how can you overwrite the replication factors in HDFS?
2. Demonstrate the statement “MapReduce chunks are handled by HDFS”.
3. Perform the following in Sqoop:
12
Assignment test should contain only questions related to Higher Order Thinking (HOT) Skills pertaining to this course
167
Department of Information Technology, GMRIT | Syllabi | Regulation 2016
a. How do you fetch data which is the result of join between two tables ?.
b. How can you force sqoop to execute a free form Sql query only once and import the rows serially.
c. What are the basic differences between relational database and HDFS?
d. How to import only the updated rows form a table into HDFS using sqoop assuming the source has last
update timestamp details for each row?
Analyze
1. Start Pig Grunt in Hadoop/MapReduce mode.
Load records into a bag from:
/training/exercises/pig/input1.txt
The file contains two columns separated by a tab; be sure tocreate a schema where column one is of type
int and columntwo is of type charrarray.
Print the schema of the bag to screen.
Dump Records to the screen; your output should look like this:
(1,a)
(2,b)
(3,c)
(4,d)
Create another bag but limit the number of records to 2; print the bag to screen and Exit Pig Grunt.
2. Demonstrate speculative execution in Hadoop
3. Justify the role of Record Reader in Hadoop
Evaluate
168
Department of Information Technology, GMRIT | Syllabi | Regulation 2016
UNIT I
Introduction: Learning, Types of Machine Learning, Hypothesis Formulation and Model Selection, Phases of ML:
Training, Testing and Validation; Evaluation Machine Learning Models: Error Analysis, Performance Indices,
Datasets for ML; Regression: Linear Regression, Linear Regression with Multiple Variables, Logistic Regression,
Regularization; Examples of Machine Learning Tools: Weka, R, Python, MATLAB,TensorFlow.
Basic Statistics: Averages, Variance and Covariance, Probability Distributions, The Bias-Variance Trade-off.
10+3 Hours
UNIT II
Learning with Trees: Constructing Decision Trees, CART, Constructing Rules from a Decision Tress
Classification example;. Bayesian Learning: Bayes Theorem, Graphical Models: Bayesian Networks, Approximate
Inference, Making Bayesian Networks. Instance based Learning: Nearest Neighbor Classifiers.
Modelling a Supervised Learning System, ID3 Classifier, Conditional Probability, Naive Bayes Classifier, Distance
Metrics in Data mining.
10+3 Hours
UNIT III
Clustering: Introduction, Advanced Similarity and Distance Measures, Clustering Large Databases, Clustering with
Categorical Attributes, Comparison. ; Dimensionality Reduction: Linear Discriminant Analysis, Principal
Component Analysis.; Evolutionary Learning: Genetic Algorithms, Genetic Operators. Genetic Programming;
Ensemble Learning: Boosting, Bagging.
Types of Clustering Techniques, Similarity and Distance Measures
13+5 Hours
UNIT IV
Artificial Neural Networks: ANN Learning, The Multilayer Perceptron (MLP): Error Propagation, Delta Rule,
Back Propagation Algorithm, Applications; Deep Learning: Convolutional Neural Networks (CNN/ConvNets),
Recurrent Neural Networks (RNNs), Restricted Boltzmann Machines (RBMs), Deep Boltzmann Machines (DBMs);
Machine Learning with Large Datasets: ML Models for Large Scale Learning, Online Learning.
Linear Separability, The Perceptron, Sigmoid Function and its properties.
169
Department of Information Technology, GMRIT | Syllabi | Regulation 2016
12+4 Hours
Total: 45+15 Hours
Textbook (s)
1. Stephen Marsland, "Machine Learning - An Algorithmic Perspective ", CRC Press, 2009.
2. Sunila Gollapudi, “Practical Machine Learning” First Edition 2016, Packt Publishing Ltd.
Reference (s)
1. Tom M. Mitchell, "Machine Learning ",Tata McGraw Hill, 1997.
SAMPLE QUESTION (S)
Internal Assessment Pattern
Cognitive Level Int. Test 1 (%) Int. Test 2 (%) Assignment Test13 (%)
Remember 40 30 --
Understand 40 40 --
Apply 20 30 80
Analyze -- -- 20
Evaluate -- -- --
Create -- -- --
Total (%) 100 100 100
Remember
1. Define Machine Learning.
2. List the types of Machine Learning.
3. State Bayes Theorem.
4. What is Regularization?
Understand
1. Demonstrate Linear Regression.
2. Explain Back Propagation Algorithm.
3. Illustrate Decision Tree Induction process in detail.
4. Demonstrate Genetic Operations in detail.
Apply
13
Comprehensive test should contain only questions related to Higher Order Thinking (HOT) Skills Pertaining to this course
170
Department of Information Technology, GMRIT | Syllabi | Regulation 2016
Ethics in Information Technology, Supporting the Ethical Practices of IT Users 10+5 Hours
Unit-II
Computer, Internet Crime and Privacy
IT Security Incidents: A Major Concern ,Why Computer Incidents Are So Prevalent ,Types of Exploits ,Types of
Perpetrators , Implementing Trustworthy Computing ,Risk Assessment ,Establishing a Security Policy ,Educating
Employees, Contractors, and Part-Time Workers , prevention ,Detection , Response.
Privacy: Privacy Protection and the Law, Information Privacy, Privacy Laws, Applications, and Court Rulings,Key
Privacy and Anonymity Issues, IdentityTheft, ConsumerProfiling, Treating Consumer Data Responsibly Workplace
Monitoring.
Federal Laws for Prosecuting Computer Attacks, Advanced Surveillance Technology. 10+3 Hours
Unit-III
Intellectual Property: Intellectual Property definition, Copyrights ,Copyright Term ,Eligible Works ,Fair Use
Doctrine ,Software Copyright Protection ,The Prioritizing Resources and Organization for IntellectualProperty
(PRO-IP) Act of 2008 ,General Agreement on Tariffs and Trade (GATT) ,The WTO and the WTO TRIPS
Agreement (1994) ,The World Intellectual Property Organization (WIPO) Copyright Treaty (1996) ,The Digital
Millennium Copyright Act (1998) , Patents ,Software Patents ,Software Cross-Licensing Agreements ,Defensive
Publishing and Patent Trolls , Submarine Patents and Patent Farming .
Key Intellectual Property Issues: Plagiarism, Reverse Engineering, Open Source Code, CompetitiveIntelligence.
171
Department of Information Technology, GMRIT | Syllabi | Regulation 2016
Software Development: Strategies for Engineering Quality Software, the Importance of Software Quality,
Software Product Liability, Key Issues in Software Development, Development of Safety-Critical Systems, Quality
Management Standards.
ACM code of ethics and professional conduct 12+4 Hours
Unit -IV
Social Networking
What Is a Social Networking Web Site? ,Business Applications of Online Social Networking ,Social Network
Advertising ,The Use of Social Networks in the Hiring Process ,Social Shopping Web Sites ,Social Networking
Ethical Issues ,Cyberbullying ,Cyberstalking ,Encounters with Sexual Predators ,Uploading of Inappropriate
Material .
Reference Book (s )
1. Deborah G. Johnson, “Computer Ethics,“ 3rd Edition, Prentice Hall, 2001,
2. Sara Base, A Gift of Fire: Social, Legal and Ethical Issues, for Computing and the Internet,” 4th Edition,
Pearson Edition 2012
SAMPLE QUESTION (S)
INTERNAL ASSESSMENT PATTERN
Cognitive Int. Test 1 Int. Test 2 Comprehensive Test14
Level (%) (%) (%)
Remember 40 40 --
Understand 50 40 30
Apply 10 10 30
Analyze -- 10 20
Evaluate -- -- 20
Create -- -- --
Total (%) 100 100 100
Remember
14
Assignment test should contain only questions related to Higher Order Thinking (HOT) Skills pertaining to this course.
172
Department of Information Technology, GMRIT | Syllabi | Regulation 2016
Understand
Analyze
Evaluate
173
Department of Information Technology, GMRIT | Syllabi | Regulation 2016
3103
Course Outcomes
1 2 1
2 2 1
3 2 1
4 3 2 1
5 2 1 1
6 3 2 1
Unit II
Image Enhancement and Color Image Processing
Enhancement in spatial domain: Intensity transformations, Histogram Processing, smoothing and sharpening, Image
Enhancement in Frequency Domain: Smoothing and Sharpening Filters
Color fundamentals, Color models, Pseudo color Image Processing, Full Color Image Processing, color
transformations.
Color Image Enhancement in spatial and frequency domain
13+4 Hours
Unit III
Image Restoration
Image Degradation/Restoration model, Noise models, Restoration using spatial filtering, Periodic noise reduction by
frequency domain filtering, Linear Position-Invariant Degradations, Inverse filtering, Minimum Mean Square Error
Filtering, Constrained Least squares filtering.
Estimating the degradation function, Geometric Mean filter
174
Department of Information Technology, GMRIT | Syllabi | Regulation 2016
9+3 Hours
Unit IV
Image Segmentation and Compression
Image segmentation: Fundamentals, point, Line and Edge detection, Thresholding, Region based Segmentation,
Image Compression: Fundamentals, Image Compression Models, Lossless Compression, Lossy Compression,
Transform coding and JPEG compression standard.
Watershed algorithm 10+4 Hours
Total: 45+15 Hours
Textbook (s)
1. Rafel C.Gonzalez and Richard E.Woods, Digital Image Processing, Pearson Education,3 rdEdition 2011
2. S.Sridhar, Digital Image Processing, Oxford publishers, 2nd Edition, 2016
Reference (s)
1. Anil K. Jain, Fundamentals of Digital Image Processing, Pearson Education, 1st Edition, 2015
2. S.Jayaraman, S.Esakirajan, T.Veerakaumar, Digital Image Processing, McGraw Hill publishers, 2011
3. M.Sonka,V. Hlavac, R. Boyle, Image Processing, Analysis and Machine Vision, Vikas Publishing House,
2001
REMEMBER
UNDERSTAND
15
Assignment test should contain only questions related to Higher Order Thinking (HOT) Skills pertaining to this course
175
Department of Information Technology, GMRIT | Syllabi | Regulation 2016
5. Illustrate contrast stretching transformation function to increase the dynamic range of the gray levels in the
image
APPLY
3 1 2 1 (q)
2 2 0 2
1 2 1 1
(p) 1 0 1 2
5. Show that a linear, spatially –invariant degradation system with additive noise can be modeled in the spatial
domain as the convolution of the degradation function with an image followed by addition of noise
ANALYSE
1. Differentiate between image enhancement and restoration in terms of processing and applications
2. Compare lossy and lossless compression methods in terms of entropy, applications and transforms used
3. Is image enhancement a subjective approach? Justify your answer
4. Is lossless compression preferred to lossy compression? Justify your answer
5. Differentiate region based segmentation and thresholding based segmentation in terms of approach and
applications
176
Department of Information Technology, GMRIT | Syllabi | Regulation 2016
CO-PO Mapping:
COs PO5 PO6 PO7 PO8
1 3 2 1 1
2 3 1 1 1
3 3 1 1 1
4 1 2 3 3
5 1 3 1 1
6 2 3 3 3
3–Strongly linked | 2–Moderately linked | 1–Weakly linked
Unit I
Computer Forensics and Investigations & Investor’s Office and Laboratory
Understanding Computer Forensics, Preparing for Computer Investigations, Taking A Systematic Approach,
Procedure for Corporate High-Tech Investigations, Understanding Data Recovery Workstations and
Software,Understanding Forensics Lab Certification Requirements, Determining the Physical Requirements for a
Computer Forensics Lab, Selecting a Basic Forensic Workstation.
UNIT-III
Digital Evidence:
Identifying Digital Evidence, Collecting the Evidence in Private-Sector Incident Scenes, Processing law
Enforcement Crime Scenes, Preparing for a Search, Securing a Computer Incident or Crime Scene, Sizing Digital
evidence at the Scene, Storing Digital evidence, obtaining a Digital Hash.
Selecting a basic forensic work station, methodologies to store digital evidence 12+3 Hours
UNIT-IV
Current Computer Forensics Tools
Evaluating Computer Forensics Toll Needs, Computer Forensics Software Tools, Computer Forensics Hardware
Tools, Validating and Testing Forensics Software
Computer Forensics Analysis and Validation:Determining What Data to Collect and Analyze, Validating Forensic
Data, Addressing Data-Hiding Techniques, Performing Remote Acquisition
Digital evidence handling procedures, Linux system forensics, windows system forensics 11+4 Hours
Total: 45+15 Hours
177
Department of Information Technology, GMRIT | Syllabi | Regulation 2016
Textbook (s)
1. Nelson, Phillips Eninger, Steuart, Computer Forensics and Investigations, Cengage Learning, 4 th Edition,
2009
2. Man Young Rhee, Internet Security: Cryptographic Principles, Algorithms and Protocols, Wiley
Publications, 2003
Reference (s)
1. John R.Vacca, Computer Forensics, Cengage Learning, 2005
2. MarjieT.Britz, Computer Forensics and Cyber Crime: An Introduction, 3rdEd, Prentice Hall, 2013
SAMPLE QUESTION (S)
Internal Assessment Pattern
Cognitive Int. Test 1 Int. Test 2 Comprehensive
Level (%) (%) Test16 (%)
Remember 30 20 --
Understand 35 30 --
Apply 30 30 50
Analyze 15 20 30
Evaluate -- -- 20
Create -- -- --
Total (%) 100 100 100
Remember
1. List the various disk storage formats
2. List some digital evidences
3. List some tools used for digital evidences
4. List different type of compression methods.
Understand
1. Explain RAID Data Acquisition
2. Explain Identification of Digital Evidence,
3. Write about Locating and Recovering Graphics
4. Discuss about Mobile Device Forensics
Apply
1. Apply any different digital forensics tool to create OS image.
2. Apply different networking tools to collect evidences.
Analyze
1. Compare different digital forensic open source tools to select a suitable tool which
identifies hidden data.
Evaluate
1. Evaluate the performance of dd and dfcldd LINUX commands
2. Evaluate the performance of Widows based tools when compared with LINUX
Create
1. Use any open source tool to create ISO image of a disk.
16
Comprehensive test should contain only questions related to Higher Order Thinking (HOT) Skills pertaining to this course
178
Department of Information Technology, GMRIT | Syllabi | Regulation 2016
3103
Course Outcomes
1. Identify E – commerce principles in market place.
2. Understand different business models for e-commerce
3. Identify M – commerce principles to various business domains
4. Understand the Framework Of Mobile Commerce
5. Get an exposure to current technological advancements in M-commerce.
6. Analyze security issues in E – commerce business models.
COs–POs Mapping
COs PO5 PO6 PO8
1 1 3 1
2 2 3 1
3 2 3 2
4 2 2 3
5 2 3 2
6 2 3 3
3–Strongly linked | 2–Moderately linked | 1–Weakly linked
Unit I
Fundamentals of E-Commerce
Introduction -The e-commerce environment - The e-commerce marketplace -Focus on portals, Location of trading in
the marketplace - Commercial arrangement for transactions - Focus on auctions - Business models for e-commerce -
Revenue models - Focus on internet start-up companies - the dot-com - E-commerce versus E-business.
E-Business models-Role of Internet
10+5 Hours
Unit II
Mobile Commerce
Introduction – Infrastructure Of M– Commerce – Types Of Mobile Commerce Services – Technologies Of Wireless
Business – Benefits And Limitations, Support, Mobile Marketing & Advertisement, Non–Internet Applications In
M– Commerce – Wireless/Wired Commerce Comparisons
Internet Security standards -E-commerce ethics 12+4 Hours
Unit III
Mobile Commerce: Technology
A Framework For The Study Of Mobile Commerce – NTT Docomo‟s I– Mode – Wireless Devices For Mobile
Commerce – Towards A Classification Framework For Mobile Location Based Services – Wireless Personal And
Local Area Networks –The Impact Of Technology Advances On Strategy Formulation In Mobile Communications
Networks
M-commerce application 13+3 Hours
UNIT-IV
Security in E&M-Commerce
Electronic payment systems-Digital Token-Based-Smart Cards-Credit Cards-Risks in Electronic Payment systems.
New kind of payments:E-Wallet,Paytm,paypal. Inter Organizational Commerce-EDI-EDI Implementation-Value
added networks. Focus on security design for e-business: Managing computer viruses,Controlling information
service usage,Monitoring of electronic communications, E-mail management,Hacking,Secure e-commerce
transactions,Approaches to developing secure systems,Current approaches to e-commerce security and Reassuring
the customer.
179
Department of Information Technology, GMRIT | Syllabi | Regulation 2016
Textbook(s)
1. Dave Chaffey, “E-Business and E-Commerce Management”, Third Edition, 2009, PearsonEducation
2. Dr.Pandey , Saurabh Shukla E-commerce and Mobile commerce Technologies , Sultan chand ,2011
3. Kalakata, Whinston, Frontiers of electronic commerce, Pearson, 2006.
Reference(s)
1. Brian E. Mennecke, Troy J. Strader, “Mobile Commerce: Technology, Theory andApplications”, Idea
Group Inc., IRM press
2. Hendry Chan, Raymond Lee, Tharam Dillon-EllizabethChang, E-Commerce fundamentals and applications,
John Wiley, 2001
3. S.Jaiswal, Galgotia,E-Commerce, 2000
Remember
1. Define E-commerce
2. What is EDI
3. State the approaches of Supply chain management
4. List the factors Digital Video electronic Commerce
Understand
1. Demonstrate mercantile models.
2. Illustrate Electronic payment systems
5. InterpretAdvertising models for marketing
Analyze
1. Distinguish Desktop video processing and desktop video conferencing
2. Categorize advertising models
3. Analyze Commerce Catalogue
17
Assignment test should contain only questions related to Higher Order Thinking (HOT) Skills pertaining to this course.
180
Department of Information Technology, GMRIT | Syllabi | Regulation 2016
COs–POs Mappings
Video Segmentation
11+3 Hours
181
Department of Information Technology, GMRIT | Syllabi | Regulation 2016
Textbook(s)
1. Principles of Multimedia Database Systems, V.S. Subrahmanian, Elseveir(Morgan Kauffman).
Reprint 2011.
2. Guojun Lu, "Multimedia Database Management Systems”, Artech House Publishers
Reference(s)
1. Spatial Databases, Shashi Shekhar, Sanjiv Chawla, Pearson Education
3. Multimedia Database Systems, Prabhakaram, Springer
4. Philippe Rigaux, Michel O. Scholl, Agnes Voisard, "Spatial Databases: With Application to
GIS”, Morgan Kaufmann Publisher.
5. http://srmnotes.weebly.com/cs1138-multimedia-database.html.
Remember
1. List the various issues of multimedia databases
2. Write the different Word Stems
3. Define Spatial Databases
4. List the steps to design a multimedia for real time application
Understand
1. Explain Multimedia Data Based on The Principle of Uniformity.
2. Explain Representing Image DBs with R-Trees
3. Write about Video Segmentation
4. Discuss about Video Databases
Apply
1. Compare k-d Trees with Point Quad trees and which one is efficient?
2. Compare and contrast Transaction-Time State Tables - Bitemporal Tables
Analyze
1. Compare Spatial Access Methods with respect toSpatial Query Languages
2. How the Query Languages is plays role for Retrieving Multimedia Data
18
Comprehensive test should contain only questions related to Higher Order Thinking (HOT) Skills Pertaining to this course
182
Department of Information Technology, GMRIT | Syllabi | Regulation 2016
COs–POs Mapping
COs PO3 PO5 PO6
1 1 3 1
2 3 1 2
3 3 1 2
4 1 3 1
5 1 3 1
6 1 3 1
3–Strongly linked | 2–Moderately linked | 1–Weakly linked
UNIT-I
Wireless Ad Hoc Networks: Introduction, Properties, applications, limitations, Issues in Ad Hoc Wireless
Networks, Ad Hoc Wireless Internet.
MAC Protocols: Introduction, Issues in Designing a MAC protocol for Ad Hoc Wireless Networks, Design goals of
a MAC Protocol for Ad Hoc Wireless Networks, Classifications of MAC Protocols, Contention - Based Protocols,
Contention - Based Protocols with reservation Mechanisms
183
Department of Information Technology, GMRIT | Syllabi | Regulation 2016
UNIT – IV
Security Protocols: Network Security Requirements, Issues and Challenges in Security Provisioning, Network
Security Attacks, Key Management, Secure Routing in Ad Hoc Wireless Networks.
Wireless Sensor Networks: Introduction, Sensor Network Architecture, Data Dissemination, Data Gathering,
Location Discovery
Quality of a Sensor Network, Evolving Standards, Other Issues
15 Hrs
REFERENCE BOOKS
1. Wireless Sensor Networks - C. S. Raghavendra, Krishna M. Sivalingam, 2004, Springer
2. Ad- Hoc Mobile Wireless Networks: Protocols & Systems, C.K. Toh ,First ed. Pearson Education
Remember
1. Find out the major significance of cellular wireless networks and Ad hoc wireless networks.
2. List few latest application systems of Ad hoc wireless networks.
3. Identify the challenging issues in Ad hoc network configuration and maintenance.
4. Show the proactive steps to solve the hidden terminal problem.
5. List the transmission impediments of wireless channel.
6. List the issues that affect the design deployment and performance of ad hoc wireless system.
7. List the benefits when deployment of a commercial ad hoc wireless networks compared to wired
network
8. Write the advantages of hybrid wireless networks.
19
Assignment test should contain only questions related to Higher Order Thinking (HOT) Skills pertaining to this course
184
Department of Information Technology, GMRIT | Syllabi | Regulation 2016
9. Define Scalability.
10. Write the design goals of MAC protocol for ad- hoc networks.
11. Describe the issues of MAC protocol for ad hoc networks in brief.
12. Show the classifications of MAC protocol.
13. Identify the effects of exposed terminal problem in wireless networks.
14. Relate the advantages of directional antennas of MMAC over MACAW.
15. Name the mechanisms used in MAC layer.
16. List any two specific requirement of real- time MAC protocol.
17. Give the classification of contention based protocol.
18. State the major challenges in designing routing protocols.
19. List the characteristics of a routing protocol for ad hoc wireless networks.
20. Mention any four qualities of service metrics that are used to evaluate the performance of the
network.
21. List the types of hybrid routing protocols.
22. Draw the structure of layered architecture.
23. Find out the components of WSN.
24. Define LEACH.
Understand
1. Summarize the issues that affect the deployment and performance of ad hoc wireless system.
2. Outline the benefits when deployment of a commercial ad hoc wireless networks compared to wired
network.
3. Compare Ad-hoc Networks and Wireless LAN.
4. Compare the efficiency of the packet queuing mechanism adopted in MACA and MACAW.
5. Relate contention based protocols with reservation mechanism and contention based protocols with
scheduling mechanism by means of packet delivery, reception and acknowledgement ratio.
6. Describe the design strategies of MACAW protocol.
7. Illustrate various steps involved in five phase reservation protocol with its frame format.
8. Compare the differences of Ad hoc on demand Distance vector routing protocol (AODV) and
dynamic sequence routing protocol (DSRP).
9. Identify any four reasons that lead to the quick power drain of nodes in mobile ad hoc network.
10. Explain the sensor network architecture with a suitable illustration.
Apply
1. Calculate the maximum achievabledata rateovera9KHzchannelwhose signaltonoiseratiois20dB.
2. Think of four scenarios where wireless networks can replace wired networks in order to
improve the efficiency of people at their workplace. Briefly describe how in each case a
wireless network will fit the role better than a wired network.
3. Determine the transfer time of a 22 KB file with a mobile data network (a) with a transmission
rate of 10 Kbps and (b) repeat the same for 802.11 WLAN operating at 2 Mbps. (c) What is the
length of the file that WLAN can carry in the time that mobile data service carried a 20 KB
file? (d) What do you infer from the answers to the above questions?
4. Assume that in one slot in Bluetooth 256 bits of payload could be transmitted. How many slots
are needed if the payload size is (a) 512 bits, (b) 728 bits, and (c) 1,024 bits. Assume that the
non-payload portions do not change.
185
Department of Information Technology, GMRIT | Syllabi | Regulation 2016
5. With reference to the discussion on scatternets, illustrate the trade-off of synchronization and
bandwidth using a timing diagram. (Hint: Consider the case when a Bluetooth device acts as a
master in one piconet and as a slave in another.)
6. Calculate the probability of data packet collision in the MACA protocol. Assume that Tc is the
control packet transmission and propagation delay, Tw is the optimal maximum back-off time,
β is the percentage of ready nodes, and R is the transmission range of each node.
Analyze
1. Discussthedeployment scenariosforvariousHIPERLAN standardsintheETSIBRANsystem.
2. Compare the EY-NPMA and the CSMA/CA mechanisms.
3. In the serial communications, the baud rate of transmission is specified. Legacy applications on
Bluetooth devices specify the baud rate. In the case of the old serial communications, the data rate is
the specified baud rate, but in the case of Bluetooth serial communications, it is not so. Why?
4. Identify and elaborate some of the important issues in pricing for multi-hop wireless communication.
5. Channel quality estimation can be done both at the sender and the receiver. Which is more
advantageous? Why?
6. Compare an ad hoc network and a cellular network with respect to bandwidth usage and cost
effectiveness.
7. Compare the pros and cons of using scheduling-based MAC protocols over reservation- based MAC
protocols.
Evaluate
Consider the topology given in below OS simulate DSR,SSA, and ABR protocol s for path establishment
from node 1 to node 10,find thepathsfoundandtheratioofthenumberofRouteRequestpacketssent
inthenetwork.(Links labeled"U"refertounstable ones.)
1. Justify whether the LCC algorithm (when run consistently with node degrees or node IDs)
give a deterministic result? If so, prove the above fact. Otherwise, give a counter -example.
2. Critique on how content-based multicasting (CBM) could be advantageous or
disadvantageous as far as the bandwidth utilization of the network is concerned.
3. Discuss how network security requirements vary in the following application scenarios of ad
hoc wireless networks:
A. Home Network
B. Classroom Network
C. Military Network
D. Emergency Search and Rescue Network
4. Discuss how security provisioning in ad hoc wireless networks differs from that in infrastructure-
based networks?
186
Department of Information Technology, GMRIT | Syllabi | Regulation 2016
COs–POs) Mapping
COs PO3 PO5 PO6
1 3 1 2
2 1 3 3
3 3 1 2
4 3 3 3
5 3 1 2
6 3 3 3
What and Why Analytics, Introduction to Tools and Environment, Application of Modelling in
business, Databases & Types of data and variables, Data modelling techniques, Missing
Imputations etc.
Need for business modelling, Regression – concepts, Blue property –assumptions-Least Square
Estimation, Variable Rationalization, and model Building.
Unit – 2 (10+4)
187
Department of Information Technology, GMRIT | Syllabi | Regulation 2016
Standard operating procedures for documentation and knowledge sharing, Defining purpose and
scope documents, understanding structure of documents – case studies, articles, white papers,
technical reports, minutes of meeting etc. Style and forma, Intectual property and copyright .
Document preparation tools – Visio, Power point, word, excel etc. Version control, Accessing
and updating corporate knowledge base, peer review and feed back.
1. Text Books:
3. NASSCOM Study material.
Reference Books:
Remember
5. Define Predictive analytics
6. What is linear regression
7. Define imputation
8. What is ETL
9. Define time series
20
Assignment test should contain only questions related to Higher Order Thinking (HOT) Skills pertaining to this course
188
Department of Information Technology, GMRIT | Syllabi | Regulation 2016
Understand
1. What are the steps involved in analysis of data
2. What is Ordinary Least square method? Explain with example
3. What is the difference between and ARMA and ARIMA? Explain with suitable example
4. What tools should use for documentation
Apply
4. How to impute missing data in R
5. What are the various methods of creating a decision tree
6. Write a procedure for creating diagrams in Visio
Analyze
1. Write the steps for preparing case study
2. Write a procedure creating flowcharts and organization charts in Visio
189
Department of Information Technology, GMRIT | Syllabi | Regulation 2016
COs–POs Mapping
COs PO3 PO5 PO6 PO7
1 3 1 1
2 3 3 2 3
3 2 3 2
4 3 1 1 2
5 1 3 1 1
6 1 1 3 2
Unit II
Services and policies, Understanding services, Service selection policies, Identity policies, Provisioning resources,
Account provisioning for users, Configuring an entitlement, Provisioning policy join directives, Workflows,
Understanding workflows, Understanding notifications, Workflow elements, Approval requests, Access control,
Understanding Access Control items, Life Cycle Management , Auditing and Reporting
11+4 Hours
Unit III
IBM Security Access Manager for Web,Security Access Manager architecture,Understanding reverse proxy
concepts,Using the reverse proxy as a policy enforcer,Describing reverse proxy features,Using the Web Gateway
Appliance,Administration overview,Administering users,groups and domains,Managing ACLS and Protected object
policy,Importing and exporting from Policy Administration
11+4 Hours
Unit IV
Authentication Overview,Authentication methods,understanding Instances,understanding reverse proxy
junctions,using junction mapping table,using transparent junctions,using virtual host junctions,Creating HTTP
190
Department of Information Technology, GMRIT | Syllabi | Regulation 2016
transformations,using Trust association interceptor,using WCP,Using logs ,audit and traces,Advanced topics,IBM
security Access Manager support
13+4 Hours
Total: 45+15 Hours
Textbook (s)
1. IBM Security Identity Manager 6 Basic Administration
2. IBM Security Access Manager Admin Guide
Reference (s)
>https://www.ibm.com/support/knowledgecenter/en/SSRMWJ_6.0.0/com.ibm.isim.doc_6.0/ic-homepage.htm
>http://www-01.ibm.com/support/docview.wss?uid=swg21689113
>https://www-03.ibm.com/software/products/sl/access-mgr
>http://www-01.ibm.com/support/docview.wss?uid=swg27046801
Remember
1. Explain ISIM deployment architecture in brief
2. List down the Types of users and brief it?
3. List down the types of identity feed?
Understand
1. What is provisioning, and list down the types?
2. What is workflow? Types of Workflow and explain design options ?
Apply
1. What is workflow? Types of Workflow and explain design options ?
2. Write down the steps for manager approval workflow?
21
Comprehensive test should contain only questions related to Higher Order Thinking (HOT) Skills
191
Department of Information Technology, GMRIT | Syllabi | Regulation 2016
Analyze
1. What are the components of the organization tree in IBM Security Identity Manager ?
explain with examples
2. What is the need of reporting? How do we use Tivoli Common Reporting? Name the
script name used to configure.
Evaluate
1. Justify the security of roles in ISIM
Prove that the roles in ISIM cannot access other accounts without proper authentication
192