2013 Course Structure BTech CSE
2013 Course Structure BTech CSE
2013 Course Structure BTech CSE
Third Semester
Course Exam.
Relative weightage (%)
Duration
Code Course Name L T P C
PR M ET
Th P
CWS S TE E PRE
MA1302 Engineering Mathematics-III 3 1 0 4 3 10 - 40 50 -
Computer Organization &
CS1301 Architecture 3 1 0 4 3 10 - 40 50 -
Switching Theory & Logic
CS1302 Design 3 1 0 4 3 10 - 40 50 -
CS1303 Data Structures 3 1 0 4 3 10 - 40 50 -
Object Oriented
CS1304 Programming(java) 3 1 0 4 3 10 - 40 50 -
Switching Theory & Logic
CS1330 Design Lab. 0 1 2 2 1.5 - 60 - - 40
CS1331 Data Structures Lab. 0 1 2 2 1.5 - 60 - - 40
Object Oriented
CS1332 Programming(java) Lab 0 1 2 2 1.5 - 60 - - 40
Total 15 8 6 26
Fourth Semester
Course Exam.
Relative weightage (%)
Code Course Name L T P C Duration
MT
Th P
CWS PRS E ETE PRE
MA1402 Engineering Mathematics IV 3 1 0 4 3 10 - 40 50 -
CS1401 Operating Systems 3 1 0 4 3 10 - 40 50 -
Relational Database
CS1402 Management Systems 3 1 0 4 3 10 - 40 50 -
CS1403 Microprocessors 3 1 0 4 3 10 - 40 50 -
---------- Open Elective-I 3 0 0 3 3 10 - 40 50 -
CS1430 Operating System Lab 0 1 2 2 1.5 - 60 - - 40
CS1431 Relational DBMS Lab 0 1 2 2 1.5 - 60 - - 40
CS1432 Microprocessors Lab 0 1 2 2 1.5 - 60 - - 40
Total 15 7 6 25
Fifth Semester
Course Course Name L T P C Exam. Relative weightage (%)
Code Duration
Th P CWS PRS MTE ETE PRE
CS1501 Design & Analysis 3 1 0 4 3 - 10 - 40 50 -
Of Algorithms
CS1502 Software 3 1 0 4 3 - 10 - 40 50 -
Engineering
CS1503 Computer Graphics 3 1 0 4 3 - 10 - 40 50 -
CS1504 Formal Languages 3 1 0 4 3 - 10 - 40 50 -
And Automata
Theory
IT1504 Data 3 1 0 4 3 - 10 - 40 50 -
Communications
CS1530 Design & Analysis 0 1 2 2 - 1.5 60 40
Of Algorithms Lab.
CS1531 Computer Graphics 0 1 2 2 - 1.5 60 40
Lab
CS1532 Software 0 1 2 2 - 1.5 60 40
Engineering Lab
Total 15 8 6 26
Sixth Semester
Course Course Name L T P C Exam. Relative weightage (%)
Code Duration
Th P CWS PRS MTE ETE PRE
CS1601 Language 3 1 0 4 3 - 10 - 40 50 -
Processors
CS1602 Computer 3 1 0 4 3 - 10 - 40 50 -
Networks &
Protocols
CS1603 Parallel Processing 3 1 0 4 3 - 10 - 40 50 -
---------- Open Elective-II 3 0 0 3 3 - 10 - 40 50 -
CS16xx Program Elective –I 3 0 0 3 3 - 10 - 40 50 -
CS16xx Program Elective - 3 0 0 3 3 - 10 - 40 50 -
II
CS1630 Language 0 1 2 2 - 1.5 60 40
Processors Lab.
CS1631 Computer 0 1 2 2 - 1.5 60 40
Networks
&Protocols Lab.
CS1632 Parallel Processing 0 1 2 2 - 1.5 60 40
Lab.
Total 18 6 6 27
Seventh Semester
Course Course Name L T P C Exam. Relative weightage (%)
Code Duration
Th P CWS PRS MTE ETE PRE
MB1721 Essentials of 3 1 0 4 3 - 10 - 40 50 -
Management &
Engineering
Economics
CS1701 Big Data Analytics 3 1 0 4 3 - 10 - 40 50 -
CS1702 Object Oriented 3 1 0 4 3 - 10 - 40 50 -
Analysis & Design
CS17xx Program Elective 3 0 0 3 3 - 10 - 40 50 -
III
CS17xx Program Elective- 3 0 0 3 3 - 10 - 40 50 -
IV
CS1730 Big Data Analytics 0 1 2 3 - 1.5 60 40
Lab
CS1731 Object Oriented 0 1 2 3 - 1.5 60 40
Analysis & Design
Lab
CS1779 Mini project 0 0 - 3 100#
Total 18 5 4 26
Eighth Semester
Course Course Name L T P C Exam. Relative weightage (%)
Code Duration
Th P CWS PRS MTE ETE PRE
CS1881 Major Project 0 0 - 20 25# 75##
TOTAL 0 0 - 20
Open Electives
CS1690 Principles of Programming Languages
CS1691 Programming in C++
CS1692 Programming in Java
CS1693 Linux Basics and Programming
CS1694 Web 2.0 and Rich Internet Applications
CS1695 Information Retrieval
CS1696 Database Management Systems
CS1697 Principles of Software Engineering
Program Electives
ELECTIVE I:
CS1650 Digital Image Processing
CS1651 Information Retrieval
ELECTIVE II:
CS1652 Distributed Systems
CS1653 Cloud Computing Infrastructure Services
ELECTIVES III
CS1750 Artificial Intelligence
CS1751 Advanced Internet Technology
ELECTIVE IV
CS1752 Cryptography & Network Security
CS1753 Mobile computing
Note: A few Electives from the above list will be offered depending on the availability of
Faculty.
SYLLABI
MA1302 ENGINEERING MATHEMATICS-III [3 1 0 4]
Boolean Algebra, subalgebra, Direct product & Homomorphism, Lattices and Algebraic
Systems, properties of Lattices and related theorem, Statements and Notations, Tautologies and
contradictions, equivalence of formulas, Tautological implications, Theory of inference, rules of
inference, statement function, variables and quantifiers, Predicate Calculus, Permutations and
Combinations, Generating function, Principle of inclusion and exclusion, Partitions,
compositions, Lexicographical and Fikes ordering of permutations, Algorithms for generating
functions, Graph theory, path, cycle, Basic theorems, Dijkstra’s Algorithms, Group theory,
semigroups and monoids, Permutation groups, cyclic groups.
Text Books:
1. J. P. Tremblay and R. Manohar, Discrete Mathematics Structures with Application to
computer Science, Tata Mc Graw Hill, 2001.
References:
1. C. L. Liu, Elements of Discrete Mathematics, Mc Graw Hill, 2008.
2. E. P. Page and L. B. Wilson, An introduction to computational combinatorics, Cambridge
Univ. Press, 1979.
Basic Structure of computers: Computer types, functional units, basic operational concepts,
bus structures, software, performance; Machine Instructions and programs: Numbers,
arithmetic operations and characters, Memory locations and addresses; Memory operations,
Addressing modes; Arithmetic: Addition and subtraction of signed numbers, Adders, ALU
design, Bit slice processor, Multiplication of positive numbers Signed operand multiplication,
Fast multiplication, Integer division, Floating point numbers and operations; Memory Systems:
Introduction, Basic concepts, Design methods; RAM memories, Read only memories, Speed
size and cost, Cache memories, Performance considerations, Virtual memories, Memory,
Management Requirements, Secondary storage; Input/Output organization: Accessing I/O
devices, Interrupts, Direct memory access, Buses, Interface circuits
References:
1. C. Hamacher, Z. Vranesic, “Computer Organization”, TMH, 2002.
2. W. Stallings, “Computer Organization and Architecture – Designing for Performance”, PHI,
2009.
Introduction to logic circuits: Variables and functions, Inversion, Truth tables, Logic gates and
networks, Boolean algebra, Introduction to VHDL; Optimized implementation of logic
functions: Synthesis using AND OR and NOT gates, Karnaugh map, Strategy for minimization,
Minimization of POS forms, Incompletely Specified Functions, Multiple output circuits NAND
and NOR logic networks, multilevel NAND and NOR circuits, Analysis of multilevel circuits;
Number representation and arithmetic circuits: Positional number representation, Addition of
unsigned numbers, Signed numbers, Fast adders, Design of arithmetic circuits using VHDL,
BCD representation; Combinational-Circuit building blocks: Multiplexer, decoder, Encoder,
Code converter, Arithmetic comparison circuits, VHDL for Combinational Circuits; Flip Flops,
Registers, Counters; Overview of semiconductor diode: BJT, MOSFET, TTL–standard, High
speed, low-power, low-power schottky, CMOS logic-NAND, NOR
References:
1. S. Brown and Z. Vranesic, “Fundamentals of Digital Logic with VHDL Design”, TMH,
2000.
2. M. Mano, “Digital Design”, PHI Pvt. Ltd., 3rd Edition, 2000.
3. P. Leach, A. Malvino, G. Saha, “Digital Principles and Applications”, TMH, 6th Edition,
2006.
4. J. Bhasker, “A VHDL Primer”, PHI Pvt. Ltd., 3rd Edn, 2005.
References:
1. A. Forouzan, R. F. Gilberg, “A Structured Programming Approach Using C”, Thomson, 2003.
2. A. Tenenbaum, J. Augenstein, “Data Structures using C”, Pearson Education, 2006.
3. E. Horowitz, S. Sahni, “Fundamentals of Data Structures in C”, Silicon Press, 2nd Edn, 2007.
The History and Evolution of java: The Creation of Java, how java changed the internet,
Java’s Magic, Servlets, The java Buzzwords; An Overview of Java, arrays; Introduction to
classes: Class fundamentals, declaring objects, Assigning Object reference variables,
Introduction to methods, Constructors, this keyword, Garbage collection, finalize() method,
Overloading, objects as parameters, argument passing, returning objects, recursion, access
control, final, nested and inner classes, string class; I/O Basics: Reading Console Input, Writing
Console Output, Files, Applet fundamentals; Inheritance: basics, super, multilevel hierarchy,
overriding, abstract classes, final with inheritance; Packages and Interfaces, Exception Handling,
Multithreaded programming; String Handling, Applet Class, Event Handling; Introduction to
AWT: Classes, component, Container, Panel, Window, frame, Canvas, working with frame,
working with Graphics, using AWT Controls.
References:
1. Herbert Schildt , “The Complete Reference Java Eight Edition”, Tata McGraw-Hill, reprint
2011
2. Steven Holzner, “Java 2 programming black book” , Dream Tech, New Delhi, reprint: 2005.
Simulation of the following logic circuits using VHDL code MAX+ and Verification of logic
gates and Boolean algebra; Boolean algebra, Simplification of expressions using Kmap.
Experiments on multilevel NAND, NOR circuits; Arithmetic circuits; multiplexers and
Multiplexer Applications.
References:
1. S. Brown and Z. Vranesic, “Fundamentals of digital logic with VHDL design”, TMH, 2000.
2. J. Bhasker, “A VHDL Primer”, PHI Pvt. Ltd., 3rd Edition, 2005.
Review of C and programs on Recursion, Stacks, Stacks, Queues, lists, Trees, Graphs, using C
language.
References:
1. A. Forouzan, R. F. Gilberg, “A Structured Programming Approach Using C, Thomson”, 2nd
Edition, 2003.
2. A. Tanenbaum, J. Augeustein, “Data Structures using C”, Pearson Education, 2006.
3. E. Horowitz, S. Sahni, “Fundamentals of Data Structures in C”, Silicon Press, 2nd Edition,
2007.
Control statements and arrays, Stacks and Lists, Strings, Classes and methods, Inheritance,
Packages, Interfaces, Exception Handling, Threads, Input/Output, Event Handling, Applets,
involving AWT, Programs involving AWT
References:
Herbert Schildt , “The Complete Reference Java Eight Edition”, Tata McGraw-Hill, reprint
2011
Text Books:
1. P. L. Meyer, Introduction to Probability and Statistical Applications, Addison-Wesley
Pub. Co., 1970.
References:
1. K. S. Trivedi, Probability, Statistics with Reliability, Queuing and computer science
applications, PHI, 2002.
2. Miller, Fruend and Johnson, Probability and Statistics for Engineers, PHI 2009.
References:
1. A. Silberschatz, P. B. Galvin, “Operating System Concepts”, International student version,
Wiley India Student Edition, Eighth Edition, 2009.
2. W. Stallings, “Operating Systems: Internals and Design Principles”, Pearson Ed., 2009.
3. J. Harris, “Operating Systems”, Tata McGraw-Hill publications, 2002.
References:
1. S. Korth, “Database System Concepts”, Mc-GrawHill, 6th Edition, 2011.
2. R. Elmasri, S. Navathe, “Fundamentals of Database Systems”, Pearson Education, 2006.
3. T. Connolly, C. Begg, “Database Systems–A Practical Approach to Design, Implementation
and Management”, Pearson Education, 3rd Edition, 2002.
.
CS1403 MICROPROCESSORS [3 1 0 4]
8086: internal architecture, programming the 8086, Addressing modes, Flags; Instruction Set:
assembler and Assembler directives, Simple sequence programs, Jumps and conditional jumps,
Loop instructions, Instruction timing and delay loops; String instructions, Writing and Using
Procedures and Macros, Interrupts and Interrupt Responses: 8259 Priority Interrupt
Controller, 8254 Software-Programmable Timer/counter; Software interrupts, DOS 21h
functions; Timing and Functional diagram: reset and wait state, Min and Max mode operation,
Min and max mode input, output timing diagrams; 8255: Programmable Parallel ports and
Handshake Input/ Output, 8087 Math Coprocessor, ISA Bus, PCI Bus, USB Bus, Accelerates
graphics port (AGP) Architecture, Real address and PVAM mode, Task protection and
Task Switching, Paging, Architecture, addressing modes, Instruction set, Simple assembly
language programs
References:
1. D. V. Hall, “Microprocessors and Interfacing”, TMH, Revised Second Edition, 2006.
2. B. B. Brey, “The Intel Microprocessors”, Seventh Edition, Prentice Hall India, 2005.
3. A. Clements, “Microprocessor system design 68000 Hardware”, Software, and Interfacing,
PWS Publishing Company, Third Edition, 1997.
Testing the use of UNIX commands, UNIX shell commands, Basics of Shell Programming,
UNIX System Calls, CPU Scheduling Algorithms, Deadlock Detection Algorithms, Deadlock
Avoidance Algorithms, Page Replacement Algorithms, Memory Allocation Algorithms, Disk
Scheduling Algorithms, UNIX Inter Process Communication.
References:
1. A. Silberschatz, P. B. Galvin, “Operating System Concepts”, International student version,
Wiley India Student Edition, Eighth Edition, 2009.
2. W. Stallings, “Operating Systems: Internals and Design Principles”, Pearson Ed., 2009.
3. J. Harris, “Operating Systems”, Tata McGraw-Hill publications, 2002.
References:
1. S. Korth, “Database System Concepts”, McGrawHill, 6th Edition, 2011.
2. R. Elmasri, S. Navathe, “Fundamentals of Database Systems”, Pearson Education, 2006.
3. T. Connolly, C. Begg, “Database Systems–A Practical Approach to Design”, Implementation
and Management, Pearson Education, 3rd Edition, 2002.
References:
1. Respective User Manual for the kit.
Algorithm Analysis: A priori and a posteriori Analysis, Time Space Tradeoff, Asymptotic
Notations, Properties of asymptotic notations, Recurrence equations, Solving recurrence
equations using Substitution method and Master’s method, Divide and Conquer: Binary Search,
Finding Maximum and Minimum, Merge Sort, Quick Sort, Matrix Multiplication, Greedy
Algorithms: Knapsack Problem, Job Sequencing with deadline, Optimal Merge Pattern, Single
Source Shortest Path, Minimum Cost Spanning tree, Dynamic Programming: Multistage
Graphs, Matrix Chain Multiplication, All-Pair shortest paths, Optimal binary search trees, 0/1
Knapsack, Travelling salesperson problem, Graph Traversals, Connected Components, Spanning
Trees, Bi-connected components, Introduction to NP-Hard and NP-Completeness.
TEXT BOOKS:
1. Ellis Horowitz, Sartaj Sahni and Sanguthevar Rajasekaran, Computer Algorithms C++,
Second Edition, Universities Press, 2007.
2. K.S. Easwarakumar, Object Oriented Data Structures using C++, Vikas Publishing House pvt.
Ltd., 2000
REFERENCES:
Introduction: The Evolving Role of Software, The changing nature of software, Legacy
software, Software Myths, Software Engineering: A Layered Technology, A Process
Framework, The Capability Maturity Model Integration (CMMI), Specialized Process Models,
The Unified Process; Agile development: Agile Process Models Software Engineering Practice,
Communication Practice, Planning Practices, Modeling Practices, Construction Practice,
Deployment Computer–Based Systems, The System Engineering Hierarchy, Business Process
Engineering: An Overview; Product Engineering: An Overview, Data Modeling Concepts,
Object Oriented Analysis, Flow-Oriented Modeling, Taxonomy of Quality Attributes,
Perspectives of Quality, Quality System, Software Quality Assurance, Capability Maturity
Model Observation on Estimation, The Project Planning Process, Software Scope and
Feasibility, Human Resources, Empirical Estimation Model
References:
1. R. Pressman, “Software Engineering: A Practitioners Approach”, McGrawHill Pubs, 2000.
2. H. Valiet, “Software Engineering: Principles and Practice”, Wiley India, 3rd Edition, 2005.
Overview of Graphics Systems: Video display devices, Raster scan systems, Graphics software,
Introduction to OpenGL; Graphics Output primitives: Line drawing algorithms, Circles and
Ellipses generating algorithms, General Scan line polygon fill algorithm, Scan line fill of convex
polygons and regions with curved boundaries, Filling of areas with irregular boundaries;
Geometrical Transformations: Basic 2D transformations, Matrix representation and
Homogeneous coordinates, Inverse transformations, 2D composite transformations, Geometric
transformations in 3D space, 3D translation, rotation and scaling, Composite 3D transformations,
Affine transformations; Illumination Models: Light sources, Ambient light, Diffuse reflection,
Specular reflection and Phong model, Shadows, Displaying light intensities, Halftone patterns
and Dithering techniques, Basic ray tracing algorithm; Computer Animation: Raster methods
for computer animation, Design of animation sequences, Traditional and Computer animation
techniques, Key-Frame systems, Motion specifications, Articulated figure animation, Periodic
motion
References:
1. D. Hearn, M. Baker, Computer Graphics with OpenGL, Pearson Education, 3rd Edition, 2010.
2. E. Angel, Interactive Computer Graphics- A top down approach using OpenGL, Pearson
Education, 5th Edition, 2003.
References:
1. P. Linz, “An Introduction To Formal Languages and Automata”, Narosa Publishing House,
Fourth Edition, 2006.
2. J. Martin, “Introduction to Languages and the Theory of Computation”, McGraw Hill, 2002.
3. J. Hopcroft, R. Motwani, “Introduction to Automata Theory, Languages and Computation”,
Pearson Education, 2006.
Introduction: Introduction to computer networks, evolution of computer networks and its uses,
OSI 7-Layer Architecture. The Physical layer: Basics of data communication, transmission
media, wireless transmission, telecom infrastructure, PSTN, Communication Satellites, Data
Link Layers, Framing, Error Detection and Correction, Retransmission Algorithms; Queuing
Models: Introduction & Little's Theorem, M/M/1, M/M/m, Queues. Networks of Queues, M/G/1
Queues, M/G/1, Priority Queues, Multiple Access & Aloha, Stabilized Aloha, Tree Algorithms,
CSMA, CSMA/CD and Ethernet, High-Speed LANs, Token Rings, Satellite Reservations;
Introduction to Switch Architecture: High Speed Switch Scheduling, Broadcast Routing &
Spanning Trees, Shortest Path Routing, Distributed Routing Algorithms, Optimal Routing, Flow
Control - Window/Credit Schemes, Rate Based Schemes, Transport Layer and TCP/IP;
Introduction to ATM Networks: Optical Networks and Wireless Networks.
TEXT BOOKS:
1. Bertsekas, Dimitri, Gallager, Robert, “Data Networks” (2nd Edition). Prentice Hall India,
ISBN: 9789332518742.
2. Tanenbaum A. S., “Computer networks” (5th Edition). Pearson Education, ISBN:
9788120307803.
3. Behrouz Forouzan, “Data communication & networking” (5th Edition). TMH, ISBN:
9781259064753.
REFERENCES:
1. Peterson and Davie “Computer Networks: A Systems Approach” (5th Edition), Morgan
Kaufmann Publishers, ISBN: 978-0123850591.
2. William Stallings, “Data and Computer Communications” (9th Edition). Pearson
Education, ISBN: 9789332518865.
3. Stevens, “TCP/IP Illustrated”, Addison-Wesley Publication, ISBN: 978-0201633467.
4. Kleinrock, Leonard, “Queueing Systems, Vol 1: Theory”, Wiley Publication ISBN:
9780471491101.
1. Kleinrock, Leonard, “Queueing Systems, Vol 1: Theory”, Wiley Publication ISBN:
9780471491101.
References:
1. A. Levitin, “Introduction to The Design and Analysis of Algorithms”, Pearson Education, 2nd
Edition, 2007.
2. E. Horowitz, S. Sahni, “Computer Algorithms”, Galgotia Publications, 2001.
3. H. Cormen, C. E. Leiserson, “Introduction to Algorithms”, PHI, 2nd Edition, 2006.
Understanding OpenGL and programs to draw objects, Line drawing algorithms, Midpoint
Circle and Ellipse algorithms, Polygon filling algorithms, Line and Polygon clipping algorithms,
2D transformation functions, 3D transformation functions, Transformation of user defined
objects in 2D and 3D, 2D curves, Effects of lighting in OpenGL, Programs for illustration of
graphical principles using OpenGL, Creating animation programs
References:
1. D. Hearn, M. Baker, “Computer Graphics with OpenGL”, Pearson Education, 3rd Edition,
2010.
2. E. Angel, “Interactive Computer Graphics- A top down approach using OpenGL”, Pearson
Education, 5th Edition, 2003.
Introduction to Unified Modeling Language (UML), Use case diagrams, Class diagram, Object
diagram, Activity diagram, sequence diagram, component diagram, deployment diagram, stat
chart diagram.
References:
Wendy Boggs and Michael Boggs. 1999. Mastering Uml with Rational Rose with Cdrom.
SYBEX Inc., Alameda, CA, USA.
CS1601 LANGUAGE PROCESSORS [3 1 0 4]
Introduction: Structure of a Compiler; The Role of the Lexical Analyzer, Input Buffering,
Specification of Tokens, Recognition of Tokens, The Lexical-Analyzer Generator Lex, Finite
Automata, From Regular Expression to Automata, Design of a Lexical-Analyzer Generator;
Context-Free Grammars, Writing a Grammar, Top-Down Parsing, Bottom-Up Parsing,
Introduction to LR Parsing: Simple LR, More Powerful LR Parsers, Using Ambiguous
Grammars, Parser Generators. Syntax-Directed Definition, Construction of Syntax Trees;
Variants of Syntax Trees, Three-Address Code, Types and Declarations: Type Expressions, Type
Equivalence; Translation of Expressions: Operations within Expressions, Type Checking:
Rules for Type Checking, Storage Organization, Stack, Allocation of Space; Issues in the Design
of a Code Generator, Target Language, Addresses in the Target Code, Basic Blocks and Flow
Graphs, Elements of Assembly Language Programming, A Simple Assembly Scheme, Pass
Structure of Assemblers, Design of Two Pass Assemblers
References:
References:
1. W. R Stevens, “TCP/IP Illustrated, Volume 1: The Protocols”, Addison-Wesley, 1994.
2. P. Loshin, “IPV6 Clearly Explained”, Morgan Kauffman, 1999.
3. C. E. Perkins, “Mobile IP Design Principles and Practices”, Addison-Wesley, 1998.
4. B. A. Forouzan, “TCP/IP Protocol Suite”, TMH, 3rd Edition, 2005.
CS1603 PARALLEL PROCESSING [3 1 0 4]
References:
1. D. Kirk and W. Hwu, “Programming Massively Parallel Processors A Hands on approach”,
2nd edition, Morgan Kaufmann, 2013.
2. Peter S. Pacheco, “An introduction to parallel programming”, Morgan Kaufmann, 2011.
3. Shane Cook, “CUDA Programming: A Developer's Guide to Parallel Computing with
GPUs”, Morgan Kaufmann, 2013
4. Jason Sanders, Edward Kandrot,” CUDA by example: an introduction to general-purpose
GPU programming” NVIDIA corporation, 2011
Preliminary Scanning Applications, Design & Implementation of Lexical Analyzer, Design &
Implementation of Parser, Implementation of Code Generator, Programs using LEX, Programs
using YACC.
References:
1. A. V. Aho, M. S. Lam, R. Sethi, J. D. Ullman, Compilers Principles, Techniques and Tools,
Pearson Education, 2nd edition, 2000.
2. D. M. Dhamdhere, Systems Programming and Operating Systems, Tata McGraw Hill, 2nd
Revised Edition, 2001.
3. K. C. Louden, Compiler Construction - Principles and Practice, Thomson India Ed., 2007.
Programs on UNIX/LINUX file API's, Client-Server Programming using TCP and UDP,
Implementation of Data Encapsulation, De-capsulation, fragmentation in TCP/IP, Networking
basics: (IN LINUX OS) Basic Network Configurations: Assigning IP address, Subnet Mask,
gateway address, LAN behind proxy, Connecting to Internet Network Server Configurations: (IN
LINUX OS) Web Server/Telnet/SSH Server, FTP/TFTP Server, DHCP Server, DNS Server,
Database Server (MySQL/PostGreSql), Squid
References:
1. W. R Stevens, TCP/IP Illustrated, Volume 1: The Protocols, Addison-Wesley, 1994.
2. P. Loshin, IPV6 Clearly Explained, Morgan Kauffman, 1999.
3. C. E. Perkins, Mobile IP Design Principles and Practices, Addison-Wesley, 1998.
4. B. A. Forouzan, TCP/IP Protocol Suite, TMH, 3rd Edition, 2005.
Recap of Dynamic Memory Allocation in CPU; Programs on CUDA, Hello, World!, A kernel
Call, Passing Parameters; Vector Additions, Matrix additions using single block without shared
memory and multiple block without shared memory, Matrix transpose Dynamic memory
allocation in GPU; Dynamic Programming in CPU and GPU; Programs on single block shared
memory and multiple block shared memory; Case Study Projects on Parallel processing
References:
1. D. Kirk and W. Hwu, “Programming Massively Parallel Processors A Hands on approach”,
2nd edition, Morgan Kaufmann, 2013.
2. Peter S. Pacheco, “An introduction to parallel programming”, Morgan Kaufmann, 2011.
3. Shane Cook, “CUDA Programming: A Developer's Guide to Parallel Computing with
GPUs”, Morgan Kaufmann, 2013
4. Jason Sanders, Edward Kandrot,” CUDA by example: an introduction to general-purpose
GPU programming” NVIDIA corporation, 2011
References:
1. P. Drucker, Management, Task and Responsibility, Allied, 2002.
2. P. Drucker, The practice of management, Butterworth Hein Mann, 2003.
3. G. J. Tuesen & H. G. Tuesen, Engineering Economy, Prentice Hall of India, 2002.
4. L. T. Blank & A. J. Tarquin, Engineering Economy, McGraw Hill, 1989.
CS1701 DATA SCIENCE & BIG DATA ANALYTICS [3 1 0 4]
Introduction to big data, definition, need and evolution of BDA, applications of Big Data, Big
Data Analytics: analyzing big data, sources of big data, characteristics of big data (4 V’s),
Drivers of BDA, types of data, structured vs. unstructured data, data marts, Case study based
tutorial, Differences between traditional DWDM and BDA, Limitations of traditional RDBMSs
to store and analyze Big Data, Data science, definition and concepts, data scientists: key
competencies and characteristics of data scientists, More discussions on data science: data
wrangling, data munging, data jujitsu, Tutorial based on data science applications, Big Data
Analytics Ecosystem, State of the Practice in Analytics: Data Analytics Lifecycle and
discussions, Roles for a Successful Analytics Project; Case Study to apply the data analytics
lifecycle, Analytical databases and DW appliances; Hadoop distributions – Comparing various
BDA tools, Analyzing and Exploring the Data: Challenges when managing and analyzing big
data, The role of Data Virtualization in a Big Data environment; Why to visualize data. Statistics
for Model Building and Evaluation: Statistics in the Analytic Lifecycle, Hypothesis Testing,
Difference of means, Advanced Analytics – Theory and Methods Overview: K-means clustering,
Association Rules, Linear Regression, Logistic Regression, Naïve Bayesian Classifiers , Tutorial
based on advanced analytics, Decision Trees, Time Series Analysis, Text Analytics; Tutorial
based on analytics, Big Data Platforms and Storage Options: The new multi-platform Analytical
Ecosystem; Beyond the Data Warehouse - Analytical databases, Hadoop and NoSQL DBMSs
References:
1. Data Science and Big Data Analytics: Discovering, Analyzing, Visualizing and Presenting
Data, EMC Education Services.
2. Michael Minelli, Michele Chambers, Ambiga Dhiraj, “Big Data, Big Analytics: Emerging
Business Intelligence and Analytic Trends”, john wiley,2013.
References:
1. M. Docherty & A. Bahrami, “Object Oriented Systems Development using the unified
modeling language”, McGraw Hill International Edition, 1999.
2. B. Jackson, “Object Oriented Analysis and Design with Unified Process”, Satzinger Cengage
Learning, 2011.
3. A. Dennis, B. Wixom, D. Tegarden, “System Analysis and Design with UML Version 2.0: An
Object Oriented Approach”, Wiley-India, Second Ed, 2005.
3. A. Dennis, B. Wixom, D. Tegarden, System Analysis and Design with UML Version 2.0: An
Object Oriented Approach, Wiley-India, Second Ed, 2005.
References:
1. M. Docherty, A. Bahrami, “Object Oriented Systems Development using the unified modeling
language”, McGraw Hill International Edition, 1999.
2. B. Jackson, “Object Oriented Analysis and Design with Unified Process”, Satzinger Cengage
Learning, 2011.
3. A. Dennis, B. Wixom, D. Tegarden, “System Analysis and Design with UML Version 2.0: An
Object Oriented Approach”, Wiley-India, Second Edition, 2005.
CS1779 SEMINAR [0 0 - 1]
Each student has to present a seminar individually, on any technical topic related to the subject,
but not covered in the syllabus. The time duration for presentation is 20 minutes and 10 minutes
is devoted for question and answer session. Slides have to be prepared for the presentation. A
seminar report has to be submitted a week before the day of the presentation.
The project work may be carried out in the institution/ industry/ research laboratory or any other
competent institutions. The duration of the project work shall be a minimum of 16 weeks, which
may be extended up to 24 weeks. A mid-semester evaluation of the project work shall be done
after about 8 weeks. An interim project report on the progress of the work shall be submitted to
the department by the student, before the mid-semester evaluation. The final evaluation and viva-
voice will be conducted after submission of the final project report in the prescribed form. As
part of project evaluation, the student has to make a presentation on the work carried out, before
the departmental committee
Text Books:
1. R.C. Gonzalez and P Wintz, “Digital Image Processing”, Second Edition, Addison-
Wesley Publishing, 2009.
2. K Castlemann, “Digital Image Processing”, Prentice Hall of India Ltd, 2007.
3. J.T.TOU, R.C. Gonzalez, “Pattern Recognition Principles”, Addison-Wesley Publishing,
1979.
4. Sing Tze Bow, M Dekker, “Pattern Recognition Principles and Image Processing”,
Signal Processing and Communication Series, 2002.
Reference Books:
1. A.K Jain, “Fundamentals of Digital Image Processing”, Prentice Hall of India Pvt Ltd,
1989.
2. M James, “Pattern Recognition”, BSP Professional Books, 1988.
3. P. Moniqque, “Fundamentals of Pattern Recognition”, Marcel Dekker Inc, 1993.
Text Books:
Text books :
1. Coulouris George, Dollimore Jean, Kindberg Tim: “Distributed Systems, Concepts and
Design”: Pearson Education Asia (LPE) 3rd edition 2001.
2. Andrew S Tannenbaum, Maarteen Van Steen: “ Distributed Systems, Principles and
Paradigms”: Pearson Education Asia: (LPE) 1st Indian Reprint 2002
References:
1. Ajay D. Kshemkalyani, Mukesk Singhal, “Distributed Computing : Principles,
Algorithms, and Systems”, Cambridge University Press/ Foundation Books India , New
Delhi, 2008.
2. Mei- Ling Liu, “ Distributed Computing: Principles and Application”, Pearson
Education, Inc. New Delhi. 2004,
Introduction: Clouds and Cloud Computing: Basic Concepts, Cloud Classifications, and Types
of Services, deployment models; Classic Data Center (CDC): DBMS concepts, CDC
drawbacks and need of Cloud Resources, CDC Management and case studies; Virtualized Data
Center (VDC): Compute and Storage, Compute virtualization overview, Compute virtualization
techniques, Virtual Machines, VM Resource management techniques, Physical to virtual
conversion, Hypervisor Management Software, Virtual Infrastructure Requirements; Storage:
Storage virtualization overview, Virtual Machine Storage, Block level and File level
virtualization, Virtual provisioning and automated storage tiering; Networking: VDC
networking overview, VDC networking components , VLAN and VSAN technologies, Network
traffic management, Exercise – VDC networking; Desktop and Application: Desktop
virtualization, Application virtualization, Business Continuity in VDC, Fault tolerance
mechanism in VDC, Backup in VDC, Replication and migration in VDC, Cloud infrastructure
and service creation, Cloud service management; Cloud Security: Security basics, Cloud
security concerns and threats, Cloud security mechanisms, Access control and identity
management in Cloud, Governance, risk, and compliance, Security best practices for Cloud,
Cloud Migration; Issues in Cloud Considerations: Migration Considerations, Security issues at
different phases to adopt the Cloud.
Text Books:
1. Course materials from EMC² Education Services
2. Miller M, “Cloud Computing”, 8th Edition, Que Publishers 2008.
3. Buyya R K, “Cloud Computing: Principles and Paradigms”, Wiley Press, 2011.
Reference Books:
1. K Saurabh, “Cloud Computing”, 2nd Edition, Wiley India
2. V Joysula, M Orr, G Page, “Cloud Computing: Automating the Virtualized Data Center”, Cisco
Press, 2012.
Reference Books:
1. Tanenbaum A. S ,”Computer Networks”, Pearson Education.
2. Stalling W, “Computer Networks”, Pearson Education
3. Douglas E. Comer & M.S Narayanan,”Computer Network & Internet”, Pearson Education
4. Behraj A Forouzan,”Data Communication & Networking”, McGraw-Hill.
5. Natalia Olifar & Victor Olifer,”Computer Networks”, Willey Pub.
6. Prakash C. Gupta, “Data Comunications and Computer Networks”, PHI
7. Bertsekas & Gallager “Data Network” , PHI
8 Gallo,”Computer Communication & Networking Technologies”,Cengage Learning
Introduction: Computer Security Concepts, The OSI Security Architecture, Security Attacks,
Security Services, Security Mechanisms, A Model for Network Security Symmetric Cipher
Model, Substitution Techniques, Transposition Techniques, Block Ciphers; Data Encryption
Standard: Block Cipher Principles, The Data Encryption Standard (DES), A DES Example, The
Strength of DES The Origins AES, AES Structure, AES Round Functions, AES Key Expansion,
AES Example; Block Cipher Operation: Multiple Encryption and Triple DES, Electronic
Codebook Mode, Cipher Block Chaining Mode, Cipher Feedback Mode, Output Feedback
Mode, Counter Mode; Pseudorandom Number Generation: principes, Pseudorandom Number
Generators, Pseudorandom Number Generation Using a Block Cipher, Stream Ciphers; Public-
Key Cryptography and RSA: Principles of Public-Key Cryptosystems, The RSA Algorithm,
Diffie-Hellman Key Exchange Applications of Cryptographic Hash Functions, Authentication
Requirement, Message Authentication Function, Message Authentication Codes, Digital
Signatures; Transport-Level Security: Web Security Issues, Secure Sockets Layer (SSL),
Transport Layer Security (TLS), Electronic Mail Security, Pretty Good Privacy (PGP), IP
Security: IP Security Overview, IP Security Policy, Encapsulating Security Payload, Combining
Security Associations, Internet Key Exchange
References:
1. B. A. Forouzan, D. Mukhopadhyay, “Cryptography and Network Security”, Mc-Graw Hill,
2nd Edition, 2008.
2. W. Stallings, “Cryptography and Network Security: Principles and Practice”, Prentice Hall,
5th edition, 2010.
Introduction: Intelligent Systems, Foundations and Applications of AI, Current trends in AI;
Problems: Characteristics of Problems, Problem reduction, Game playing, Bounded look-ahead
strategy and use of evaluation functions, Alpha-Beta Pruning, Two – Player perfect information
games, Propositional Logic: Natural deduction system, Resolution Refutation in PL, Predicate
Logic approaches to knowledge representation, Knowledge representation: using Semantic
Network, Extended semantic Networks for KR, Knowledge Representation using Frames,
Probability Theory: Bayesian Belief Networks, Certainty Factor Theory; Agents vs. software
programs: Classification of Agents, Working of an Agent, Single Agent and Multi-Agent
systems, Performance evaluation of Agents, Architectures for Intelligent Agents, Fuzzy sets:
Fuzzy set operations, Types membership functions, Multi-valued logic and Fuzzy Logic,
Machine-Learning Systems, Supervised and Unsupervised learning, Inductive learning,
Deductive learning, Support Vector Machine, ANN, Single layer feed-forward networks, Multi-
layer feed-forward NN.
References:
1. S. Kaushik, “Artificial Intelligence, Cengage Learning Publications”, First Edition, 2011.
2. E. Rich, K. Knight, “Artificial Intelligence”, Tata McGraw Hill Edition, 1991.
3. N. J. Nilsson, “Principles of Artificial Intelligence”, Springer Verlag, 1982.
Open Elective – I
CS1690 PRINCIPLES OF PROGRAMMING LANGUAGES
[3 0 0 3]
References:
1. Terrence W. Pratt, Masvin V. Zelkowitz “Programming Languages design and
Implementation” , Pearson Education, Fourth Edition .
2. Allen Tucker, Robert Noonan “Programming Languages Principles and Paradigms Tata
MC Graw –Hill Publication, First edition.
Open Elective – I
CS1691 PROGRAMMING IN C++
[3 0 0 3]
References:
1. Stanley B. Lippman, Josee Lajoie, Barbara E. Moo, “C++ Primer”, Addison Wesley, 4th
Edition, 2005.
2. Herbert Schildt, “The Complete Reference C++”, TMH., 4th Edition, 2005.
Open Elective – I
CS1692 PROGRAMMING IN JAVA
[3 0 0 3]
References:
1. Steven Holzner, “Java 2 Programming Black Book”, DreamTech, New Delhi,
reprint: 2005.
2.Pratik Patel & KarlMoss , ”Java database programming with JDBC” DreamTech,
New Delhi, second edition, 2000.
Open Elective – I
CS1693 LINUX BASICS AND PROGRAMMING
[3 0 0 3]
INTRODUCTION:What is Unix? What is Linux? Distributions, The GNU Project and the Free
Software Foundation Programming Linux, Unix Programs, The C/C++ Compiler. Development
System Roadmap, Unix Philosophy; The Unix Operating System: A brief Session in
Unix/Linux,T he Unix Architecture and Command Usage. The Unix Architecture, Features of
Unix, POSIX and Single Unix Specification, Locating commands, Internal and External
Commands, Command Structure, Flexibility of command usage and Browsing the manual pages
on-line and understanding it; GENERAL PURPOSE UTILITIES AND THE FILE SYSTEM:
cal,date,echo,printf,bc,script. E.Mail basics, mailx: The Universal Mailer,passwd:Changing your
password, Password Framing Rules and Discipline. who,uname,tty,sty; THE FILE: What's in a
file name?,Tthe parent-child relationship, the home directory, pwd,cd,mkdir,rmdir,absolute path
names, using absolute pathname for a command, relative pathnames,ls:Listing directory contents,
ls Options, The Unix/Linux File System.; ANDLING UNIX/LINUX FILES:
cat,cp,rm,mv,more,lp,file,wc,od,split,cmp,comm,dif,dos2unix,unix2dos,compressing,archiving,
extracting with gzip/gunzip,zip/unzip,tar, bzip2/bunzip2 File attributes,ls –l :Listing File
Attributes,the –d option: listing directory attributes, file Ownership,file permissions, chmod:
Changing File Permissions,Directory Permissions,Changing File Ownership File Systems and
Inodes,Hard Links, Symbolic Links,umask:Default file and Directory Permissions,Modifications
and access times,find:Locating Files; SHELL AND PROGRAMMING: The Shells interpretive
Cycle,Shell Offerings,Pattern Matching -The Wild Cards,Escaping andQuoting,Redirection:
The Three standard files, /dev/null and /dev/tty: Two special Files,Pipes,Creating aTee,
Command Substitution,Shell Variables; THE SHELL AS A PROGRAMMING LANGUAGE:
Shell Syntax: Variables, Conditions, Control Structures,Functions,Commands,Command
Execution, Here Documents,Debugging Scripts; FILTERS: pr,head,tail,cut,paste,sort,uniq,nl,
tr grep,Basic Regular Expressions(BRE),Extended Regular Expressions(ERE) and egrep,
sed:The StreamEditor; THE PROCESS: sh process, parents and children, ps, system process,
mechanism of Process creation,Running jobs in background, kill, nice, at and batch and cron.
ESSENTIAL SYSTEM ADMINISTRATION: Linux Installation-Single and Dual boot, Disk
partition basics,Connecting to LAN,Connecting to Internet,Setting up IP address-static and
dynamic,assigning hostname.
The System Administrators Login and Privileges,Maintaining Security,User
Management,Startup and Shutdown,Managing Diskspace,Device files,Handling floppy/USB
drives,backup/Restore with cpio
Text Books:
1. Neil Matthew and Richard Stones “Beginning Linux Programming” Wrox
Publication.
2. Sumitabha Das “UNIX Concepts and Applications” TMH Publications New-Delhi.
References:
References:
1. Thomas A. Powel - Ajax: The Complete Reference , McGraw Hill, 2008.
2. Gottfried Vossen, Stephan Hagemann - Unleashing Web 2.0: From Concepts to
Creativity, Elsevier, 2007.
3. Colin Moock - Essential Actionscript 3.0, O’Reilly Publications, 2007.
4. Steven Holzner - Ajax Bible, Wiley India, 2007.
5. Justin Gehtland et al - A Web 2.0 Primer Pragmatic Ajax, SPD Publications, 2006.
6. Eric Van derVlist et al - Professional Web 2.0 Programming , Wiley India, 2007.
OPEN ELECTIVE-II
CS1695 INFORMATION RETRIEVAL
[3 0 0 3]
INTRODUCTION, RETRIEVAL STRATEGIES :Introduction; Retrieval Strategies: Vector
Space Model; Probabilistic Retrieval strategies Some More Retrieval Strategies: Language
Models; Inference Networks; Extended Boolean Retrieval; Latent Semantic Indexing; Neural
Networks; Genetic Algorithms; Fuzzy Set Retrieval. RETRIEVAL UTILITIES: Relevance
feedback; Clustering; Passage-Based Retrieval; N-Grams; Regression Analysis; Thesauri;
Semantic Networks; Parsing; INDEXING AND SEARCHING:Introduction; Inverted Files;
Other indices for text; Boolean queries; Sequential searching; Pattern matching; Structural
queries; Compression; CROSS-LANGUAGE INFORMATION RETRIEVAL AND
EFFICIENCY: Introduction; Crossing the language barrier; Cross-Language retrieval strategies;
Cross language utilities. Duplicate Document Detection.; INTEGRATING STRUCTURED
DATA AND TEXT: Review of the relational model; A historical progression; Information
retrieval as a relational application; Semi-structured search using a relational schema; Multi-
dimensional data model; PARALLEL INFORMATION RETRIEVAL, DISTRIBUTED
INFORMATION RETRIEVAL: Parallel text scanning; Parallel indexing; Clustering and
classification; Large parallel systems; A theoretic model of distributed information retrieval;
Web search; Result fusion; Peer-to-Peer information systems; Other architectures;
MULTIMEDIA IR: Introduction; data modeling; Query languages; Spatial access methods; A
general multimedia indexing approach; One-dimensional time series; Two-dimensional color
images; Automatic picture extraction.
Text Books:
1.David A. Grossman, Ophir Frieder: Information Retrieval Algorithms and Heuristics,
Springer, 2nd Edition, 2004.
2. Ricardo Baeza-Yates, Berthier Ribeiro-Neto: Modern Information Retrieval, Pearson
Education, 1999.
References:
1. William B. Frakes, Ricardo Baeza-Yates (Editors):Information Retrieval Data
Structures & Algorithms, Prentice Hall PTR, 1992.
OPEN ELECTIVE-II
[3 0 0 3]
Text Books:
References:
(3 0 0 3)
References:
1. Roger S. Pressman “Software Engineering A Practioner’s Approach, McGraw-Hill, 6th
edition, 2005.
2. Ian Sommerville “Software Engineering”, Pearson, 9th edition, 2010
3. Pankaj Jalote “ An integrated approach to Software Engineering” Springer, 3rd edition,
2005.