Sethu Institute of Technology
Sethu Institute of Technology
Sethu Institute of Technology
CBCS CURRICULUM
Regulations 2019
Total No. of
Category Credits Percentage
Courses
Engineering Sciences 11 28 16
Mandatory Course 5 - -
Course
Course Title L T P C
Code
THEORY
PRACTICAL
TOTAL 17 2 8 23
3
Semester II
Course
Course Title L T P C
Code
THEORY
PRACTICAL
TOTAL 16 1 7 20.5
4
Semester III
Course
Course Title L T P C
Code
THEORY
19UCS303 ES DigitalElectronics 3 0 0 3
PRACTICAL
19UCS307 PW Seminar 0 0 2 1
TOTAL 18 1 11 24.5
5
Semester IV
Course
Course Title L T P C
Code
THEORY
Transforms and Discrete
Mathematics
19UMA421 BS 3 1 0 4
(Common to CSE &IT)
PRACTICAL
MANDATORY COURSES
TOTAL 18 2 9 21.5
6
Semester V
Course
Course Title L T P C
Code
THEORY
PE Professional Elective – I 3 0 0 3
OE Open Elective – I 3 0 0 3
PRACTICAL
TOTAL 17 1 11 23.5
7
Semester VI
Course
Course Title L T P C
Code
THEORY
PE Professional Elective – II 3 0 0 3
OE Open Elective – II 3 0 0 3
PRACTICAL
MANDATORY COURSES
TOTAL 19 1 14 26
8
Semester VII
Course
Course Title L T P C
Code
THEORY
PE Professional Elective IV 3 0 0 3
PE Professional Elective V 3 0 0 3
PRACTICAL
MANDATORY COURSES
TOTAL 20 0 6 22
9
Semester VIII
Course
Course Title L T P C
Code
THEORY
PE Professional Elective VI 3 0 0 3
OE Open Elective – IV 3 0 0 3
PRACTICAL
TOTAL 6 0 16 14
10
LIST OF ELECTIVES
Course
Course Title L T P C
Code
19UCS901 Graph Theory 3 0 0 3
11
Course
Course Title L T P C
Code
19UCS928 Green Computing 3 0 0 3
Course
Course Title L T P C
Code
12
LIST OF ONE CREDIT COURSES
19UCS861 R Programming 0 0 2 1
19UCS865 Wordpress 1 0 0 1
19UCS866 Multimedia 1 0 0 1
19UCS867 Mongo DB 0 0 2 1
13
Semester I
Course
Course Title L T P C
Code
THEORY
TOTAL 17 2 8 23
14
19UGM131 INDUCTION PROGRAMME L T P C
3 0 0 3
PRE-REQUISITE:
COURSE OBJECTIVES :
Ethical values – Ambition and Family Expectation, Gratitude, Competition and Excellence – Belief –
Morality of life – Guest Lecture by Eminent personality
UNIT IV LITERARY
Elocution - Essay writing Competition - Impromptu Session - Dance and singing competition
Vaigai Dam – Theni - VOC- Port-Tuticorin - Madurai Radio City-Madurai - Aavin Milk –Madurai-NSS
Activities.
Department Introduction and Purpose of Course - Eminent speakers – Scope and Feature of the
Course - Latest Innovation
TOTAL : 45 Periods
COURSE OUTCOMES:
After the successful completion of this course, the student will be able to
15
Identify inputs and outputs of different industry process.
REFERENCE BOOK:
16
19UEN101 ENGLISH FOR TECHNICAL COMMUNICATION L T P C
2 0 0 2
PRE-REQUISITE:
COURSE OBJECTIVES :
UNIT I 8 Hrs
Listening –Formal and informal conversations and comprehension Speaking- introducing oneself –
exchanging personal and social information- Reading – Skimming and Scanning. Writing –
Sentence Formation, Formal Letters (Permission/Requisition) - Grammar - Parts of Speech - Tense
- Vocabulary Development – Technical Word Formation- Prefix- suffix - Synonyms and Antonyms-
Phrases and Clauses
UNIT II 8 Hrs
Listening – Motivational speech by Great Speakers Speaking –Narrating daily events -retelling
short stories. Reading – Newspaper reading. Writing – Job application letter - Transformation of
Information (Transcoding) –Grammar Subject-Verb Agreement (Concord),–– Vocabulary
Development –Same word in different parts of speech
UNIT IV 7 Hrs
Listening – Understating the instruction. Speaking -Intonation and preparing dialogue on various
formal and informal situation Reading –Note Making from given text - Writing –Creating coherence,
Essay writing with proper introduction and conclusion, Giving Instruction (Guidance/Procedure) -
Grammar – Spot the Errors in English, Vocabulary Development – One word substitution.
TOTAL : 30 Periods
COURSE OUTCOMES:
17
After the successful completion of this course, the student will be able to
TEXT BOOK:
1. KN Shoba, Lourdes JoavaniRayen, Communicative English, New Delhi, Cambridge
University Press, 2017
REFERENCE BOOKS:
1. Raman, Meenakshi, Sangeetha Sharma, Business Communication, New Delhi,
Oxford University Press, 2014.
2. Lakshminarayanan. K.R, English for Technical Communication, Chennai,
Scitech Publications (India) Pvt. Ltd, 2004.
3. Rizvi. Asraf M, Effective Technical Communication, New Delhi, Tata McGraw-Hill
Publishing Company Limited, 2007.
18
ENGINEERING MATHEMATICS – I
19UMA102 L T P C
(Common to ALL Branches – Except CSBS))
3 1 0 4
PRE-REQUISITE:
COURSE OBJECTIVES :
To make the students capable of identifying linear equations based problems (Eigen Value)
from practical areas and obtain the Eigen value oriented solutions in certain cases.
To widen the students’ knowledge base on linear algebra, growth rate computation and
application of integrals.
Able to integrating various types of functions using various integration methods.
To familiarize the students with the basic rules of differentiation and use them to find
derivatives of products and quotients of functions
To apply these mathematical concepts (matrix theory, differentiation and integration) in
engineering field.
Eigen value and eigenvector of a real matrix – Characteristic equation – Properties – Cayley-
Hamilton theorem (excluding Proof) – Orthogonal reduction –(transformation of a symmetric matrix
to diagonal form) – Quadratic form – Reduction of quadratic form to canonical form by orthogonal
transformation
UNIT II DIFFERENTIAL CALCULUS 9 +3 Hrs
Partial derivatives – Euler’s theorem for homogenous functions – Total derivatives – Differentiation of
implicit functions – Jacobian – Taylor’s expansion – Maxima and Minima – Method of Lagrangian
Multipliers.
19
Double integration – Cartesian and Polar coordinates – Change of order of integration – Area as a
double integral - Change of variables between Cartesian and Polar coordinates – Triple integration in
Cartesian coordinates – Volume as triple integral.
COURSE OUTCOMES:
After the successful completion of this course, the student will be able to
Apply the Characteristic Equation, Characteristic roots and use the applicability of Cayley –
Hamilton theorem to find the Inverse of matrix. (Apply)
Analyze functions using limits, continuity, derivatives and to solve Physical application
problems.(Analyze)
Apply differentiation techniques and Lagrange multiplier method to predict the extreme values
of the functions with constrain. (Apply)
Apply the concept of some special function like Gamma, Beta function and their relation to
evaluate some definite integral. (Apply)
Apply integration to compute Multiple integrals, Area and Volume in addition to change of order
and change of variables. (Apply)
Understand the basic concept in Matrix, Differentiation and Integration. (Understand)
TEXT BOOKS:
20
REFERENCE BOOKS:
1. RAMANA B.V, “Higher Engineering Mathematics”, Tata McGraw Hill Publishing Company,
New Delhi, 11th Reprint, (2010).
2. GLYN JAMES, “Advanced Engineering Mathematics”, Pearson Education, New Delhi, 7th
Edition, (2007).
3. JAIN R.K and IYENGAR S.R.K,” Advanced Engineering Mathematics”, Narosa Publishing
House, New Delhi, 3rd Edition, (2007).
4. BHARATI KRISHNA TIRTHAJI, “Vedic Mathematics - Mental Calculation”, MotilalBanarsi
Dass Publications, New Delhi, 1st Edition, (1965).
5. KREYSZIG. E, “Advanced Engineering Mathematics”, John Wiley & Sons, New York, 10th
Edition, (2011).
6. P.SIVARAMAKRISHNA DAS, E.RUKMANGADACHARI“Engineering mathematics”, volume1,
Pearson Edison New Delhi, 2nd Edition, (2013).
21
ENGINEERING PHYSICS
19UPH103 L T P C
(Common To All Branches)
3 0 0 3
PRE-REQUISITE:
COURSE OBJECTIVES :
Introduction – Classification of solids –Space lattice –Basis-Lattice parameter – Unit cell – Crystal
system –Miller indices –d-spacing in cubic lattice - Calculation of number of atoms per unit cell –
Atomic radius-Coordination number – Packing factor for SC, BCC, FCC and HCP structures – crystal
imperfection – Burger vector.
UNIT II PHOTONICS 10 Hrs
Introduction - Black body radiation – Planck’s law of radiation- Wien’s displacement law-Rayleigh
Jeans law- – Compton Effect – Theory and experimental verification – Matter waves-Schrodinger’s
wave equation – Time dependent – Time independent equation –Particle in 1-D dimensional box
Introduction - Elasticity- Stress and Strain - Hooke’s law – Three moduli of elasticity –stress-strain
curve – Poisson’s ratio –Factors affecting elasticity –Bending moment – Depression of a cantilever –
Young’s modulus by uniform bending –I- shaped girders.
TOTAL: 45 PERIODS
COURSE OUTCOMES:
After the successful completion of this course, the student will be able to
Classify the types of crystals, lasers and elastic behavior of solids (U)
Apply the basic knowledge of crystal, quantum mechanics and mechanical behavior of solids to solve
engineering problems (AP)
Apply the principle of laser to estimate the wavelength of emitted photons. (AP)
Analyze the dual nature of matter using the concepts of quantum mechanics(AN)
Analyze the structural and optical properties of crystals in industrial and medical applications (AN)
Analyze the structural and optical properties of materials for specific Engineering Applications. (AN)
22
TEXT BOOKS:
REFERENCE BOOKS:
1. Raghuvenshi G.S., “Engineering Physics”, PHI Learning Private Limited, New Delhi,
Revised Edition 2018.
2. Arul doss .G., “Engineering Physics”, PHI Learning Limited, New Delhi, Revised Edition
2018.
3. Marikani .A., “Engineering Physics”, PHI Learning Private Limited, New Delhi, Revised
Edition 2017.
4. Sankar B.N., and Pillai .S.O., “A Text book of Engineering Physics”, New Age International
Publishers Private Limited, New Delhi, Revised Edition 2017.
5. Avadhanulu M.N. and Kshirsagar P.G., “A Textbook: of Engineering Physics”, S.Chand&
Company Ltd., New Delhi, 2018.
23
19UCY105 APPLIED CHEMISTRY L T P C
3 0 0 3
PRE-REQUISITE:
COURSE OBJECTIVES :
Chemical Bonding: Electronic Configuration– Ionic Bond - Covalent Bond – Metallic bond –Aufbau
principle, Pauli Exclusion principle, Valence bond theory application and its limitations, Various types
of hybridization (sp, sp2,sp3) (C2H2, C2H4, CH4) -bond strength and bond energy - Hydrogen
bonding, Vander Waalsforces.
UNIT II WATER AND ITS TREATMENT TECHNOLOGIES 11 Hrs
Introduction to smart materials and their structure - Organic Light Emitting Diodes – Principles and
applications, Liquid crystals – definition and applications.Green chemistry – Concept, importance,
principles – e- waste disposal.
Batteries, fuel cells and super capacitors: Types of batteries – primary battery (dry cell) secondary
battery (lead acid battery, lithium-ion-battery)fuelcells–H2-O2fuel cell and application.
TOTAL: 45 PERIODS
COURSE OUTCOMES:
After the successful completion of this course, the student will be able to
24
green
chemistry.(Understand)
Describe the importance of energy storage devices and super capacitors (Understand)
TEXT BOOKS:
1. JainP.C.andMonicaJain,“EngineeringChemistry”,DhanpatRaiPublishingCompany
(P) Ltd, New Delhi, 2002.
2. Dr.Sunita Rattan, “A Textbook of Engineering Chemistry” S.K.Kataria&Sons.,New
Delhi, 2013.
REFERENCE BOOKS:
1. DerekPletcherandFrankC.Walsh,“IndustrialElectrochemistry”,ChapmanandHall,
New York, 1993.
2. Peter Grundler, “ Chemical Sensors – An introduction for Scientists andEngineers”,
Springer, New York, 2007.
25
PROBLEM SOLVING AND PYTHON PROGRAMMING L T P C
19UCS108
(Common to ALL Branches)
3 0 0 3
COURSE OBJECTIVES:
To impart the concepts in problem solving for computing
To familiarize the logical constructs of programming
To illustrate programming in Python.
UNIT I INTRODUCTION 9Hrs
Introduction to python – features of python – modes of working with python. Values and data types:
numbers, Boolean, strings; variables, expressions, statements, tuple assignment, precedence of
operators, comments – print function- conversion of algorithm in to program – Solving simple
problems involving arithmetic computations and sequential logic to solve.
UNIT III CONTROL CONSTRUCTS 9Hrs
Flow of execution – control structures: conditional (if), alternative (if-else), chained conditional (if-elif-
else); Iteration: state, while, for, break, continue, pass – Solving problems involving decision making
and iterations
UNIT IV FUNCTIONS AND PACKAGES 9Hrs
Functions - function definition and use, flow of execution, parameters and arguments; parameters,
local and global scope, function composition-Anonymous or Lambda Function, recursion -packages.
UNIT V 9Hrs
LISTS, TUPLES, DICTIONARIES AND STRINGS
Lists: list operations, list slices, list methods, list loop, mutability, aliasing, cloning lists,
listparameters; Tuples: tuple assignment, tuple as return value; Dictionaries: operations and
methods; advanced list processing - list comprehension - Strings: string slices; immutability, string
functions and methods, string module
TOTAL: 45Periods
COURSE OUTCOMES:
After the successful completion of this course, the student will be able to
26
TEXT BOOKS :
REFERENCE BOOKS :
27
ENGINEERING GRAPHICS
19UME109 L T P C
(Common to ALL Branches)
3 1 0 4
PRE-REQUISITE:
COURSE OBJECTIVES :
To develop student's graphic skill for communication of concepts, ideas and design of
engineering products and expose them to existing national standards related to
technicaldrawings.
To impart knowledge in development of surfaces, isometric and perspective projections.
CONCEPTS AND CONVENTIONS (NOT FOR EXAMINATION) 4 Hrs
Projection of simple solids like prisms, pyramids, cylinder and cone with axis is parallel,
perpendicular and inclined to one of the plane.
UNIT II SECTION OF SOLIDS 10 Hrs
Section of solids - simple position with cutting plane parallel, perpendicular and inclined to one of the
plane.
Development of lateral surfaces of simple and truncated solids - Prisms, pyramids and cylinders and
cones - Development of lateral surfaces of sectioned solids.
Isometric Projections
Principles of isometric projection – isometric scale – isometric view - isometric projections of simple
solids and cut solids.
28
TOTAL 45 (L) + 15 (T) = 60 Periods
COURSE OUTCOMES:
After the successful completion of this course, the student will be able to
Apply the knowledge of First angle of projection and to draw the Projection of different
simple solids. (Apply)
Draw the section of solids with true shape of the section. (Apply)
Draw the development of lateral surface of regular and sectioned solids. (Apply)
Draw the isometric view of simple solids and sectioned solids. (Apply)
Sketch the orthographic views from the given pictorial (isometric) view. (Apply)
TEXT BOOKS:
REFERENCE BOOKS:
1. Venugopal K., and Prabhu Raja V., “Engineering Graphics”, New Age International
(P) Limited,(2008).
2. Gopalakrishnan K.R., “Engineering Drawing” (Vol.I&II), SubhasPublications.(1998).
3. DhananjayA.Jolhe, “Engineering Drawing with an introduction to Auto CAD”,
Tata McGraw Hill Publishing Company Limited,(2008).
29
PROBLEM SOLVING AND PYTHON PROGRAMMING
19UCS110 LABORATORY L T P C
(Common to ALL Branches )
0 0 3 1.5
COURSE OBJECTIVES :
To familiarize with programming environment
To familiarize the implementation of programs in Python
LIST OF EXPERIMENTS
1. Write a Python program to process the mark processing system (Record has the
following fields: Name, Reg_no, Mark1, Mark2, Mark3, Mark4, Total, average). Print the
student details and find the total and average mark.
2. Write a Python program to compute the +2 Cutoff mark, given the Mathematics, physics
and Chemistry marks. A college has decided to admit the students with a cut off marks
of180. Decide whether the student is eligible to get an admission in that college or not.
3. A pizza in a circular shape with 8 inches and which is placed in a square box whose side
length is 10 inches. Find how much of the box is “empty”?
4. A person owns an air conditioned sleeper bus with 35 seating capacity that routes
between Chennai to Bangalore. He wishes to calculate whether the bus is running in
profit or loss state based on the following scenario:
Amount he spent for a day for diesel filling is: Rs. 15,000
Amount he spent for a day for Driver and cleaner beta is: Rs. 3,000
Ticket amount for a Single person is Rs: 950
If all the seats are filled, what would be the result?
If only 15 seats are filled, what would be the result?
5. Consider the person ‘X’ has some amount in his hand and the person ‘Y’ has some
amount in his hand. If they wish to exchange the amount among them, how they can
exchange the amount by using the third party ‘Z’.
Problems involve iterations
6. A man is blessed with a duck that can lay golden eggs. First day it lays one egg, in
second day it lays two eggs, in third day it lays three eggs, and it continues to lay eggs in
an incremental manner day by day. Now calculate how many golden eggs that duck lays
till ‘n’th day.
7. Four People A,B,C,D are sitting in a Circular arrangement. In how many ways their
seating can be arranged.
8. The Greek theater shown at the right has 30 seats in the first row of the center section.
Each row behind the first row gains two additional seats.
th
How many seats are in the 5 row in the center section?
9. Write a program that accepts the lengths of three sides of a triangle as inputs. The
program output should indicate whether or not the triangle is a right triangle. (Recall from
30
the Pythagoras theorem that in a right triangle, the square of one side equals the sum of
the squares of other two sides)
10. A game has to be made from marbles of five colors, yellow, blue, green, red and Violet
where five marbles has to be kept one upon another. Write a python program using
recursion, to find how many ways these marbles can be arranged.
11. Tower of Hanoi is a mathematical puzzle where we have three rods and n disks. The
objective of the puzzle is to move the entire stack to another rod, obeying the following
simple rules:
Here is a high-level outline of how to move a tower from the starting pole, to the goal
pole, using an intermediate pole:
1. Move a tower of height-1 to an intermediate pole, using the final pole.
2. Move the remaining disk to the final pole.
3. Move the tower of height-1 from the intermediate pole to the final pole using
original pole
12. In a class of 50 numbers of students, 6 students are selected for state cricket academy.
Sports faculty of this school has to report to the state cricket academy about the selected
students’ physical fitness. Here is one of the physical measures of the selected students’;
Height in cm is given for those 6 selected students [153,162,148,167,175,151]. By
implementing functions, do the following operations.
(i) State academy selector has to check whether the given height is present in
the selected students list or not.
(ii) State academy selector has to order the height of students in an incremental
manner.
(iii) State academy selector has to identify the maximum height from the list.
Dictionary
13. A university wishes to create and maintain the details of the students such as Rollno,
Regno, Name, Dept, Batch, Contact_no, Nativity(Indian/NRI) as key value pairs. Do the
following operations:
(i) Display the complete student details on giving Rollno as input.
(ii) Display the complete student details whose nativity belongs to NRI.
(iii) Display the complete student details whose department is CSE.
Tuples
14. A librarian wishes to maintain books details such as ISBN, Book Name, Author Name,
Year published, Publisher Name. He wishes to retrieve the book details in the following
scenario:
(i) Retrieve the complete details of the book on giving ISBN.
(ii) Retrieve the details of the book which published after the year 2015.
(iii) Retrieve the details of the book whose author name is ‘Andrew’.
(iv) Retrieve the details of the book that name of the book is ‘Python’
31
Problems involve Strings
15. A musical album company has ‘n’ number of musical albums. The PRO of this company
wishes to do following operations based on some scenarios:
(i) Name of the album starts with ‘s’ or ‘S’.
(ii) (ii) Name of the album which contains ‘jay’ as substring.
(iii) Check whether the album name presents in the repository or not.
(iv)Count number of vowels and consonants in the given album name.
TOTAL: 45 Periods
COURSE OUTCOMES:
After the successful completion of this course, the student will be able to
Formulate algorithms for simple problems and translate the algorithms to a working program
(Apply)
Formulate algorithms and programs for arithmetic computations and sequential logic.(Apply)
Write iterative programs using control constructs.(Apply)
Develop programs using functions, packages and use recursion to reduce
redundancy.(Apply)
Represent data using lists, tuples, dictionaries and manipulate them through a
program.(Apply)
HARDWAREREQUIRMENTS
LAN SYSTEM WITH 30 NODES (OR) STANDALONE PCS – 30 NOS
SOFTWAREREQUIRMENTS
OS – UNIX CLONE (License free Linux)
EDITOR – IDLE
32
ENGINEERING FUNDAMENTALS LABORATORY
19UCS112 L T P C
(Common to CSE, ECE,IT & BME Branches )
0 0 3 1.5
COURSE OBJECTIVES :
To familiarize the Hardware components of Computer
To practice the installation of operating systems and other software’s
LIST OF EXPERIMENTS
GROUP A (COMPUTER) 24 Periods
TOTAL: 45 Periods
COURSE OUTCOMES:
After the successful completion of this course, the student will be able to
Identify the components of the computer and assemble the hardware components of a
computer.(Apply)
Install and uninstall the Operating systems and other software’s both in in windows and
Linux environment.(Apply)
33
Demonstrate the basic network settings and make trouble shoot and Maintain the
compute.(Apply)
Demonstrate the function of electronics components.(Apply)
Develop code for interfacing sensors with microcontroller. (Apply)
EQUIPMENT
SL. NAME OF THE EQUIPMENT/SOFTWARE QUANTITY
NO.
1 LOGIC TRAINER KIT 2
2 CRO AND AFO 2
3 SMALL MULTIPURPOSE PCBS 5
4 SOLDERING GUNS 5
5 MULTIMETERS 5
6 DC AMMETER 10
7 DC VOLTMETER 10
8 VARIABLE DC POWER SUPPLY 5
9 NODE MCU DEVELOPMENT BOARD 10
10 PIR SENSOR (HC-SR501) 5
11 TEMPERATURE SENSOR (LM35 OR DHT11) 5
12 PC WITH WINDOWS 7 3
34
19UGS113 BASIC SCIENCES LABORATORY L T P C
0 0 2 1
PRE-REQUISITE :
COURSE OBJECTIVES:
PHYSICS LABORATORY
LIST OF EXPERIMENTS
1. Laser – Determination of particle size and wavelength of Laser source.
using Diode Laser.
2. Ultrasonic Interferometer - Determination of velocity of sound in liquid and
compressibility of liquid.
3. Poiseuille’s method - Determination of Coefficient of viscosity of liquid.
4. Spectrometer – Determination of dispersive power of a prism.
5. Air Wedge method - Determination of thickness of a thin wire.
6. Uniform bending method – Determination of Young’s modulus of
the given rectangular beam.
CHEMISTRY LABORATORY
LIST OF EXPERIMENTS
35
6. Determination of molecular weight of polymer by Viscometry
7. Comparison of the electrical conductivity of two samples-
Conductometric method
8. Estimation of copper in brass by EDTA method
TOTAL : 30 Periods
COURSE OUTCOMES:
After the successful completion of this course, the student will be able to
Apply the principles of Optics, Laser physics and Mechanics to determine the
Engineering properties of materials. (Apply )
Analyze the given liquid sample to determine the viscosity and compressibility of
the liquid.(Analyze)
Apply the principles of spectroscopy to determine the properties using
prism.(Apply)
Prepare solutions on various concentrations. (Apply )
Analyse the given solution quantitatively using chemical and electro analytical
methods.(Analyze)
Determine the amount and molecular weight of the given substances.(Apply)
36
SEMESTER- II
37
Semester II
Course
Course Title L T P C
Code
THEORY
PRACTICAL
TOTAL 16 1 7 20.5
38
19UEN201 COMMUNICATION SKILLS FOR PROFESSIONALS L T P C
1 0 1 1.5
PRE-REQUISITE:
COURSE OBJECTIVES :
Time: 5
Project
SELF INTRODUCTION & DELIVER A SPEECH BEFORE AUDIENCE to 7
1
minutes
Use appropriate posture, gestures, facial expressions and eye contact to express your ideas.
Use proper intonation and adequate speech module.
Time: 5
Project 4 PRESENT YOUR TOPIC WITH VISUAL AIDS to 7
minutes
39
COURSE OUTCOMES:
After the successful completion of this course, the student will be able to
REFERENCE BOOKS:
1. Competent Communication- A Practical Guide to becoming a better speaker, Toastmasters
International, USA.
2. Norman Lewis – Word Power Made Easy, Pocket Book Publication, 2019.
40
DIFFERENTIAL EQUATIONS AND COMPLEX ANALYSIS
19UMA203 (COMMON TO CSE & IT) L T P C
3 1 0 4
PRE-REQUISITE:
COURSE OBJECTIVES :
Higher order linear differential equations with constant coefficients – Method of variation of
parameters – Cauchy’s and Legendre’s linear equations – Applications of ODE in Computer Science
Engineering
UNIT II VECTOR CALCULUS 9+3 Hrs
Gradient Divergence and Curl – Directional derivative – Irrotational and Solenoidal vector fields –
Vector integration – Green’s theorem in a plane, Gauss divergence theorem and Stokes’ theorem
(excluding proofs) – Simple applications involving cubes and rectangular parallelopiped.
Functions of a complex variable – Analytic function – Necessary and Sufficient Conditions (excluding
Proofs) – Harmonic function - Properties of an analytic function – Harmonic conjugate – Construction
of analytic functions – Conformal mapping- Simple transformation w = z+c, cz, 1/z, and Bilinear
transformation..
Statement and applications of Cauchy’s integral theorem, Cauchy’s integral formula and Cauchy
Residue Theorem – Taylor’s and Laurent’s expansions – Applications of residue theorem to evaluate
real integrals – Unit circle and semi-circular contour (excluding Poles on the real axis).
Formation of partial differential equations – Singular integrals- Lagrange’s linear equation -- Linear
41
partial differential equations of second and higher order with constant coefficients of both
homogeneous and non-homogeneous types- Solutions of one dimensional wave equation
COURSE OUTCOMES:
After the successful completion of this course, the student will be able to
● Apply the knowledge of higher order ordinary differential equations in real life engineering
problems.(Apply)
● Apply the concept of vector identities in problem solving and evaluate the line, surface and
volume integrals. (Apply)
● Apply the knowledge of standard techniques of complex variables and mapping for evaluating
analytically. (Apply)
● Apply the knowledge of singularities, residues in complex integration. (Apply)
● Apply the knowledge of partial differential equation in solving linear, higher order and one
dimensional Wave equation. (Apply)
● Understand the knowledge of Cauchy Riemen equations , poles, homogeneous and non-
homogeneous equation. (Understand)
TEXT BOOKS:
1. RAMANA B.V, “Higher Engineering Mathematics”, Tata McGraw Hill Publishing Company,
New Delhi, 11th Reprint, (2010).
2. KREYSZIG. E, “Advanced Engineering Mathematics”, John Wiley & Sons, New York, 10th
Edition, (2011).
3. JAIN R.K and IYENGAR S.R.K, “Advanced Engineering Mathematics”, Narosa Publishing
House Pvt. Ltd., New Delhi, 3rd Edition, (2007).
4. GREWAL. B.S, “Higher Engineering Mathematics”, Khanna Publications, New Delhi, 43rd
Edition, (2014).
42
19UPH205 PHYSICS FOR INFORMATION SCIENCE L T P C
(COMMON TO EEE,CSE & IT BRANCHES)
3 0 0 3
PRE-REQUISITE:
COURSE OBJECTIVES :
To introduce the essential principles of physics for information science and related
Engineering applications.
To demonstrate the concepts of conduction in conductors.
To enable the students to understand the dielectric and magnetic materials.
To apply fundamental knowledge in the area of fiber optics.
TOTAL:45 PERIODS
43
COURSE OUTCOMES:
After the successful completion of this course, the student will be able to
• Illustrate classical and Quantum free electron theory and calculate carrier concentration in
metals.(Understand)
• Examine the characteristics of semiconducting materials in terms of bandgap and charge
carriers.(Analyze)
• Distinguish the properties of magnetic materials and their domain theory for the applications
of storage devices.(Analyze)
• Discuss the types of polarization mechanism in dielectrics and its applications.
(Understand)
• Describe the principlesand propagation of light in fiber optical communication
System.(Understand)
• Utilize the fundamentals of physics to improve the technology in communication.(Apply)
TEXT BOOKS:
1. William D. Callister, Jr. “Material Science and Engineering”, Seventh Edition, John Wiley &
Sons Inc. New Delhi, 2015
2. Dr. Mani.P, “Engineering Physics II ”, Dhanam Publications, Edition ,2018, Chennai
3. Rajendran.V, “Engineering,Physics”, Tata Mc-Graw Hill Publishing Company limited, New
Delhi, Revised Edition 2016.
REFERENCE BOOKS:
1. Raghuvenshi G.S., “Engineering Physics”, PHI Learning Private Limited, New Delhi,
Revised Edition 2014.
2. Arul doss .G., “Engineering Physics”, PHI Learning Limited, New Delhi, Revised Edition
2013.
3. Marikani .A., “Engineering Physics”, PHI Learning Private Limited, New Delhi, Revised
Edition 2012.
4. Sankar B.N., and Pillai .S.O., “Engineering Physics – I”, New Age International Publishers
Private Limited, New Delhi, Revised Edition 2015.
44
19UCY204 ENVIRONMENTALSCIENCE L T P C
3 0 0 3
PRE-REQUISITE:
COURSE OBJECTIVES :
Definition – Causes, effects and control measures of: (a) Air pollution (b) Water pollution (c) Soil
pollution (d) Marine pollution (e) Noise pollution (f) Thermalpollution- pollution case studies - Role of
an individual in prevention of pollution –Disaster management: floods, earthquake, cyclone and
landslides.
Water conservation, rain water harvesting, watershed management – Climate change, global
warming, acid rain, ozone layer depletion, nuclear accidents and holocaust, case studies.
Environmental laws/Acts, (EPA).
Population growth, variation among nations – Population explosion – Human rights – Family welfare
programme – Environment and Human Health – Human Rights-Value education – HIV / AIDS –
Women and child welfare – Role of information technology in environment and human health.
Total: 45 Periods
45
COURSE OUTCOMES:
After the successful completion of this course, the student will be able to
TEXT BOOKS:
1. AnubhaKaushik, kaushik C.P., “Environmental Science and Engineering”,Third
Edition, New Age International, New Delhi, 2009.
2. Benny Joseph “Environmental Science and Engineering”, Tata Mc-Graw Hill, New
Delhi, 2006.
REFERENCE BOOKS:
46
INTRODUCTION TO COMPUTER SCIENCE AND L T P C
19UCS205
ENGINEERING
3 0 0 3
COURSE OBJECTIVES:
To familiarize the computer processors and memory
To know the types of software and various programming paradigms
To impart the knowledge in networks, computing techniques and emerging trends
UNIT I PROCESSORS AND MEMORY 9Hrs
Artificial Intelligence- Machine learning – Deep Learning – Data Science – Internet of Things – Block
chain – Cyber security.
TOTAL: 45 Periods
COURSE OUTCOMES:
After the successful completion of this course, the student will be able to
Illustrate the types of processors and memories in a computing environment. (Understand)
Classify the types of software’s used by the computer and user. (Understand)
Apply suitable programming paradigm to provide solution for a problem. (Apply)
Identify the suitable network topology to connect computing system. (Apply)
Analyze and identify appropriate computing technology to solve the problem. (Apply)
Articulate the emerging trends in the field of Computer Science and
Engineering.(Understand)
TEXT BOOKS:
47
WEB REFERENCES:
1. https://www.researchgate.net/publication/329191354_Lecture_Notes_on_Computer_Archit
ecture
2. https://ftms.edu.my/v2/wp-content/uploads/2019/02/csca0101_ch07.pdf
3. https://www.academia.edu/3879674/Programming_Paradigm
48
L T P C
19UCS206 PROGRAMMING USING C
3 0 0 3
COURSE OBJECTIVES:
To familiarize the programming constructs of C
To explain the concepts of arrays, functions, pointers, structures in C
To explain the concepts of file
UNIT I INTRODUCTION TO C 9Hrs
Flow of execution – branching constructs: if, if – else, else if ladder, switch, break – looping
constructs: while, do. While, for, break and continue – Solving problems involving decision making
and iterations
UNIT III ARRAYS AND POINTERS 9Hrs
Array definition – one dimensional array declaration – initialization – accessing elements – Solving
problems using 1D array manipulation - two dimensional array declaration – initialization – accessing
elements – Solving problems for matrix manipulation, and string manipulation Pointers: Declaration
– Referencing and Dereferencing – Solving problems of string handling.
UNIT IV STRUCTURES,UNION AND FUNCTIONS 9Hrs
Structures and Union: Definition – variable declaration – initialization – accessing members – Solving
problems using structures and union - pointer to structures - self-referential structures – notion of
linked list (without implementation) - Functions: definition – prototype – function call – functions with
arguments and without arguments – Parameter passing methods – recursive functions – Solving
problems using non-recursive and recursive functions.
UNIT V FILE PROCESSING 9Hrs
Files – Types of file processing: Sequential access, Random access – Sequential access file -
Example Program: Finding average of numbers stored in sequential access file - Random access file
- Example Program: Transaction processing using random access files – Command line arguments
TOTAL: 45Periods
COURSE OUTCOMES:
After the successful completion of this course, the student will be able to
Apply the knowledge of arithmetic & sequential logic to solve problems related to
mathematical expressions. (Apply]
Analyze and identify suitable control constructs to provide solutions to computer applied
complex engineering problems. (Evaluate)
49
Apply the concept of pointers to solve complex engineering problems.(Apply)
Formulate problems to provide solutions to computer applied complex engineering problems
using modularity.(Analyze)
Apply the knowledge of permanent storage of data to solve computer applied complex
engineering problems. (Apply)
Design solutions for computer applied complex engineering problems that meet specified
needs.(Create)
TEXT BOOKS :
REFERENCE BOOKS :
50
19UGS210
L T P C
ENERGY AND ENVIRONMENTAL
SCIENCE LABORATORY
0 0 3 1.5
PRE-REQUISITE :
COURSE OBJECTIVES:
• To analyze the Band gap, moment of inertia, thermal conductivity and rigidity
modulus of the materials.
• To gain knowledge in PHOTONICS.
• Apply the theoretical concepts to perform lab experiments.
• To assess the water quality parameters.
• To acquire knowledge on water quality parameters for the analysis of industrial
effluents.
PHYSICS LABORATORY
LIST OF EXPERIMENTS
CHEMISTRY LABORATORY
LIST OF EXPERIMENTS
51
TOTAL : 45 Periods
COURSE OUTCOMES:
After the successful completion of this course, the student will be able to
• Apply the principles of Optics, Laser physics and spectroscopy to determine the
Engineering properties of materials.(Apply)
• Determine the thermal conductivity of the given material .(Understand)
• Determine the energy gap and specific resistance of the given
material.(Understand)
• Test and analyze the water quality parameters for the given sample. (Analyze)
0 0 3 1.5
COURSE OBJECTIVES :
Familiarize with programming environment
Familiarize the implementation of programs in C
LIST OF EXPERIMENTS
TOTAL: 45 Periods
COURSE OUTCOMES:
After the successful completion of this course, the student will be able to
Write programs to solve problems involving computations. (Apply)
Provide modular solution to complex problems to reduce redundancy and to improve code
reuse.(Apply)
Access data stored in secondary storage in sequential and random manner. (Apply)
Design solutions for computer applied complex Engineering Problems that meet specified needs.
53
(Create)
HARDWARE
SOFTWARE
COMPILER – C
54
SEMESTER- III
55
Semester III
Course
Course Title L T P C
Code
THEORY
19UCS303 ES DigitalElectronics 3 0 0 3
19UCS305 PC Operating 3 0 0 3
PRACTICAL
19UCS307 PW Seminar 0 0 2 1
TOTAL 18 1 11 24.5
56
SEMESTER III
PROBABILITY, QUEUEING THEORY AND NUMERICAL
19UMA322 METHODS L T P C
(COMMON TO CSE AND IT )
3 1 0 4
PRE-REQUISITE:
COURSE OBJECTIVES :
To make the student acquire sound knowledge of standard distributions that can describe
real life phenomena.
To provide the basic characteristic features of a queuing system and develop the skills in
analyzing queuing models.
To acquaint the student with the roots of nonlinear (algebraic or transcendental) equations,
solutions of large system of linear equations and Eigen value problem of a matrix can be
obtained numerically where analytical methods fail to give solution.
Axioms of probability - Conditional probability - Total probability - Discrete and continuous random
variables - Moments - Moment generating functions and their properties. Binomial, Poisson, Normal
and Exponential- Joint probability distributions - Marginal and Conditional distributions – Covariance
- Correlation and Regression.
UNIT II QUEUEING THEORY 9+3 Hrs
Definitions – Basic terms of Queueing theory - Markovian models – Birth and Death Queuing models
- Steady state results: Single and multiple server queuing models - Little’s Formula - Queues with
finite waiting rooms - Finite source models.
Method of Group Averages – The least squares method – Fitting a straight line - Fitting a Parabola -
Fitting a curve of the form y = axb - Fitting an exponential curve – Method of moments
Iteration method – Newton-Raphson method – Gauss Elimination method – Pivoting – Gauss Jordan
methods –iterative methods : Gauss Jacobi method ,Gauss Seidel method - Eigen values of a
matrix by Power method – Jacobi’s method for a real symmetric matrix
57
NUMERICAL SOLUTIONS OF ORDINARY DIFFERENTIAL
UNIT V 9+3 Hrs
EQUATIONS
Single step methods: Taylor series method – Euler method, Modified Euler’s Method – Fourth order
Runge – Kutta method for solving first and second order equations – Multistep methods: Milne’s and
Adam’s predictor and corrector methods
COURSE OUTCOMES:
After the successful completion of this course, the student will be able to
TEXT BOOKS:
58
REFERENCE BOOKS:
59
19UCS302 DATA STRUCTURES L T P C
3 0 0 3
PRE-REQUISITE:
COURSE OBJECTIVES :
Basic Terminologies: Elementary Data Organizations, Abstract Data Types (ADTs) – List ADT –
array-based implementation – linked list implementation –singly linked lists- circularly linked lists-
doubly-linked lists – applications of lists –Polynomial Manipulation – All operations (Insertion,
Deletion, Merge, Traversal).
UNIT II LINEAR DATA STRUCTURES-STACK, QUEUE 9Hrs
Tree ADT – tree traversals – Binary Tree ADT – expression trees – applications of trees – binary
search tree ADT –Threaded Binary Trees- AVL Trees – B-Tree -B+ Tree – Heap – Applications.
Searching- Linear Search – Binary Search. Sorting – Bubble sort – Selection sort – Insertion sort –
Shell sort – Radix sort. Hashing- Hash Functions – Separate Chaining – Open Addressing –
Rehashing – Extendible Hashing.
TOTAL:45 Periods
COURSE OUTCOMES:
After the successful completion of this course, the student will be able to
Explain the fundamentals of various Linear and Nonlinear data structures. (Understand)
Apply the concepts of linear data structures to solve real world problems. (Apply)
Implement various problem solving strategies to design an efficient framework of solutions
using Nonlinear data structures for different problems. (Apply)
Design optimal solution for complex engineering problems for a given scenario considering
the suitability of various data structures. (Analyze)
Create a mathematical framework for solving the given problem using the concepts of data
structures. (Create)
60
Describe the way of obtaining the solutions made by the separate team members for the
given problem and practice the best one. (Affective Domain)
TEXT BOOKS:
1. Mark Allen Weiss, "Data Structures and Algorithm Analysis in C", 2nd Edition, Pearson
Education, 2011
2. Seymour Lipschutz, “Data Structures with C”, McGraw Hill Education, Special Indian
Edition, 2014.
REFERENCE BOOKS:
1. ISRD Group, “Data Structures using C”, 2nd Edition, McGrraw-Hill Education (India)
Private Limited, 2013.
2. ReemaThareja, “Data Structures Using C”, Oxford University Press, 2011.
3. A.V.Aho, J.E Hopcroft and J.D.Ullman, “Data structures and Algorithms”, Pearson
Education, First Edition Reprint 2003.
61
19UCS303 DIGITAL ELECTRONICS L T P C
3 0 0 3
PRE-REQUISITE:
COURSE OBJECTIVES :
To present the Digital fundamentals, Boolean algebra and its applications in digital
systems.
To familiarize with the design of various combinational digital circuits using logic gates.
To introduce the analysis and design procedures for synchronous and asynchronous
sequential circuits.
To explain the various semiconductor memories and related technology.
To introduce the electronic circuits involved in the making of logic gates.
UNIT I DIGITAL FUNDAMENTALS 9 Hrs
Number Systems – Decimal, binary, Octal, Hexadecimal, 1’s and 2’s complements, Codes- Binary,
BCD, Excess3, Gray,Alphanumeric codes, Boolean theorms, Logic gates, Universal gates, Sum of
products and Product of sums, Minterms and Maxterms, Karnaugh map Minimization and
QuineMcCluskey method of minimization.
UNIT II COMBINATIONAL CIRCUITS 9 Hrs
Design of Half and Full Adders, Half and Full Subtractors, Binary Parallel Adder – Carry look ahead
Adder, BCD Adder, Magnitude Comparator, Code Conversion- Binary to Gray , Gray to Binary, BCD
to Excess 3,Multiplexer, Demultiplexer, Decoder, Encoder, Priority Encoder
Flip flops- SR,JK,T,D, Master/Slave FF –operation and excitation tables, Triggering of FF, Analysis
and design of clocked sequential circuits – Design – Moore/Mealy models, state minimization, state
assignment, circuit implementation- Design of Counters- Ripple Counters, Ring Counters, Shift
registers, Universal Shift Register.
Analysis and design of asynchronous sequential circuits,cycles and races, state reduction, race free
assignments, Hazards, Essential Hazards, Design of Hazard free circuits.
Basic memory structure – ROM – PROM – EPROM – EEPROM – EAPROM. RAM – Static and
dynamic RAM – Programmable Logic Devices – Programmable Logic Array(PLA) – Programmable
Array Logic (PAL) – Field Programmable Gate Arrays (FGPA) – Implementation of combinational
logic circuits using PLA, PAL. Digital integrated circuits: Logic levels, propagation delay, power
dissipation, fan-out and fan-in, noise margin, logic families and their characteristics- RTL,TTL, ECL,
CMOS.
TOTAL:45Periods
COURSE OUTCOMES:
62
After the successful completion of this course, the student will be able to
• Explain the functions of a digital circuit (Understand)
• Apply simplification techniques to design minimized logic circuits. (Apply)
• Analyze synchronous and asynchronous sequential circuits to provide solutions for
engineering problems. (Analyze)
• Evaluate the design of a digital circuit using the fundamental concepts. (Evaluate)
• Develop a digital system for a real time application to meet the functional requirements.
(Create)
• Communicate the purpose and result of a design project in written and oral presentation.
(Affective Domain)
TEXT BOOKS:
1. M. Morris Mano, “Digital Logic and Computer Design”, Pearson Education, 4th
Edition,2016.
2. A.Kumar, “Fundamentals of Digital Circuits”, Prentice Hall India, 2016.
3. R.P. Jain, “Modern Digital Electronics”, McGraw Hill Education, 2009.
REFERENCE BOOKS:
WEB REFERENCES:
63
OBJECT ORIENTED PROGRAMMING USING JAVA
19UCS304 L T P C
3 0 0 3
TOTAL:45Periods
COURSE OUTCOMES:
After the successful completion of this course, the student will be able to
Define classes with access controls to create objects for real world scenarios. (Apply)
Construct hierarchy of classes to create objects for complex scenarios. (Apply)
Apply partial and fully abstractions in class design for complex problems. (Apply)
64
Use Collections framework to construct various data structures to process the input of a
computing solution. (Apply)
Utilize I/O streams in Java to store, retrieve, and access data into and from files. (Apply)
Develop GUI interfaces for interactive window applications. (Create)
TEXT BOOKS:
REFERENCE BOOKS:
1. Paul J. Deitel, and Harvey M. Deitel, “Java for Programmers”, Pearson Education,2nd
Edition, 2012.
2. Cay Horstmann, and Gary Cornell, “Core Java Volume - I Fundamentals”, Prentice Hall,
9th Edition, 2011.
3. Herbert Schildt, “The Complete Reference JAVA 2” , Tata McGraw Hill, 5th Edition,
2002.
4.Oracle Java Documentation, "The Java Tutorials", https:// docs.oracle.com/
javase/tutorial/ index.html.
5. https://www.javatpoint.com/javafx-tutorial
65
19UCS305 OPERATING SYSTEMS L T P C
3 0 0 3
PRE-REQUISITE:
COURSE OBJECTIVES :
The student should be made to:
• Study the basic concepts and functions of operating systems.
• Understand the structure and functions of OS.
• Learn about Processes, Threads and Scheduling algorithms.
• Understand the principles of concurrency and Deadlocks.
• Learn various memory management schemes.
• Study I/O management and File systems.
UNIT I INTRODUCTION 9 Hrs
Process Management – Process concept, The process, Process State Diagram, Process control
block, Process Scheduling- Scheduling Queues, Schedulers, Operations on Processes, Interprocess
Communication, Threading Issues, Scheduling-Basic Concepts, Scheduling Criteria, Scheduling
Algorithms.
Memory Management: Swapping, Contiguous Memory Allocation, Paging, the structure of the Page
Table, Segmentation
Virtual Memory Management: Virtual Memory, Demand Paging, Page-Replacement Algorithms,
Thrashing
File system Interface- the concept of a file, Access Methods, Directory structure, File system
mounting, file sharing, protection.
File System implementation- File system structure, allocation methods, free-space management
mass-storage structure overview of Mass-storage structure, Disk scheduling, Device drivers
66
TOTAL:45Periods
COURSE OUTCOMES:
After the successful completion of this course, the student will be able to
TEXT BOOKS:
1. Silberschatz, Galvin, and Gagne, “Operating System Concepts”, Sixth Edition, Wiley India
Pvt Ltd, 2003.
REFERENCE BOOKS:
2. Gary Nutt, “Operating Systems”, Third Edition, Pearson Education, 2004. 3. Harvey M.
Deital, “Operating Systems”, Third Edition, Pearson Education, 2004.
3 0 0 3
PRE-REQUISITE:
COURSE OBJECTIVES :
To familiarize the components of computer system and instructions
To discuss in detail the operation of the arithmetic unit.
To design pipelining and parallel processing architecture
67
To give knowledge on memory and I/O systems
UNIT I OVERVIEW AND INSTRUCTIONS 9 Hrs
Addition and Subtraction of signed numbers – Multiplication of unsigned and signed numbers – Fast
Multiplication – Integer division – Floating point numbers and operations – ALU – Data path and
Control Unit.
UNIT III PIPELINING & PARALLEL PROCESSORS 9 Hrs
Pipelining – Instruction and Arithmetic Pipeline – Data hazards – Instruction hazards – Superscalar
operation.
Parallel processors: Introduction to parallel processors, Concurrent access to memory and cache
coherency
UNIT IV MEMORY CONCEPTS 9 Hrs
Memory hierarchy - Memory technologies – Cache basics – Measuring and improving cache
performance - Virtual memory, TLBs- Memory Management Requirements
Input/output system-Accessing I/O Devices – Interrupts – Direct Memory Access – Bus Structure –
Bus Operation – Arbitration – Interface Circuits – USB
TOTAL:45Periods
COURSE OUTCOMES:
After the successful completion of this course, the student will be able to
TEXT BOOKS:
REFERENCE BOOKS:
19UCS307
SEMINAR L T P C
0 0 2 1
PRE-REQUISITE :
Seminar provides an opportunity for the students to express his technical ideas orally through
presentation. The seminar facilitates to develop communication skills, the ability to prepare and
present technical ideas with clarity of expression, and the ability to analyse the technical ideas
critically. The students will be evaluated based on their scientific and technical knowledge,
preparation and organization of the presentation, language, manners and style of presentation,
clarity of expression, adequacy and use of required tools and references, confidence, attitude
and time management. Suitable rubrics will be formed to evaluate the seminar presentation by
the Course handling faculty in consultation with the HoD and the general guidelines given by
the Principal
TOTAL:30Periods.
COURSE OUTCOMES:
After the successful completion of this course, the student will be able to
Identify, and discuss current, real-world issues related to computer science and
engineering.(Affective Domain)
Communicate effectively on Complex computer science and engineering activities with
the engineering community. (Affective Domain)
Apply principles of ethics in interaction with others.(Affective Domain)
69
19UCS308 DATA STRUCTURES LABORATORY L T P C
0 0 3 1.5
PRE-REQUISITE :
COURSE OBJECTIVES:
To demonstrate linear and non-linear data structures.
To implement searching, sorting and hashing algorithms.
LIST OF EXPERIMENTS
1. Create a list with n nodes. Each node contains height and weight of the
person.
i. Insert the node based on the sorted order of weight.
ii. Delete the specified node(s) based on height information and display the
resultant list.
2. Represent a polynomial as a linked list and write functions to add and multiply
the following polynomial and display the resultant polynomial.
4X4+3X3+X+5, 3X3+2X2+X+3.
3. The Monk is trying to explain to its users that even a single unit of time can be
extremely important and to demonstrate this particular fact he gives them a
challenging task. There are N processes to be completed. All the processes have
a unique number assigned to them from 1 to N. Now, you are given two things:
i. The calling order in which all the processes are called.
ii. The ideal order in which all the processes should have been executed.
Now, let us demonstrate this by an example. Let's say that there are 3
processes, the calling order of the processes is: 3 - 2 - 1. The ideal order is: 1 - 3
- 2, i.e., process number 3 will only be executed after process number 1 has been
completed; process number 2 will only be executed after process number 3 has
been executed.
i. Iteration #1: Since the ideal order has process #1 to be executed firstly,
the calling ordered is changed, i.e., the first element has to be pushed to
the last place. Changing the position of the element takes 1 unit of time.
The new calling order is: 2 - 1 - 3. Time taken in step #1: 1.
ii. Iteration #2: Since the ideal order has process #1 to be executed firstly,
the calling ordered has to be changed again, i.e., the first element has to
be pushed to the last place. The new calling order is: 1 - 3 - 2. Time taken
in step #2: 1.
iii. Iteration #3: Since the first element of the calling order is same as the ideal
order, that process will be executed. And it will be thus popped out. Time
taken in step #3: 1.
iv. Iteration #4: Since the new first element of the calling order is same as the
ideal order, that process will be executed. Time taken in step #4: 1.
v. Iteration #5: Since the last element of the calling order is same as the ideal
order, that process will be executed. Time taken in step #5: 1.
Total time taken: 5 units.
PS: Executing a process takes 1 unit of time. Changing the position takes
1 unit of time.
Inputformat:
The first line a number N, denoting the number of processes. The second
70
line contains the calling order of the processes. The third line contains the
ideal order of the processes.
Outputformat:
Print the total time taken for the entire queue of processes to be executed.
4. Write a program to check a sequence of brackets is balanced if the following
conditions are met:
i. It contains no unmatched brackets.
ii. The subset of brackets enclosed within the confines of a matched pair of
brackets is also a matched pair of brackets.
iii. Given n strings of brackets, determine whether each sequence of
brackets is balanced. If a string is balanced, return YES. Otherwise, return
NO.
INPUT:
The first line contains a single integer n, the number of strings.
Each of the next n lines contains a single string s, a sequence of brackets.
CONSTRAINTS:
1<=n<=10^3
1<=|s|<=10^3, where is the length of the sequence.
All characters in the sequences? { {, }, (, ), [, ] }.
5. Implement basic binary search tree operations. While deleting the node with
two children, replace it with either in -order successor or in -order predecessor
based on choice.
6. Write a program to implement an expression tree. Produce its pre -order, in-
order, and post-order traversals.
7. An array A of size N is given. Perform an operation in which remove the largest
and the smallest element from the array and add their difference back into the
array. So, the size of the array will decrease by 1 after each operation. Input the Q
tasks, For each task, print the sum of all the elements in the array.
8. The ABC Company has its branches in several cities in India. The company
wants to lease phone lines to connect them up with each other; and the phone
company charges different amounts of money to connect different pairs of
cities. They want to connect all the branches with a minimum total cost. Help
them to fix their problem.
9. The XYZ Parcel service wants to deliver a package from Madurai to
Trivandrum, Bangalore, Hyderabad, Bombay, New Delhi and kolkata through
rail. The train fare between each pair of cities varies. The XYZ Parcel service
wants to cut down on the total distance traveled to save transport charge and
it wants to know the route with minimum distance from Madurai to all other
cities. Help them to find the route.
10. Implement hashing with open addressing. Resolve the collision with
i. Linear probing
ii. Quadratic probing
11. Write a program to arrange the names of the students in the class using
Bubble sort and Insertion sort as well as print the number of comparisons
made by each algorithm.
TOTAL : 45 Periods
COURSE OUTCOMES:
After the successful completion of this course, the student will be able to
• Apply linked list concepts to provide solution for computing problems. (Apply)
• Make use of Stack and queue for solving computing problems. (Apply)
71
• Experiment with Binary tree and Expression tree. (Apply)
• Design solutions for computer applied real world complex engineering problems
using graph algorithms. (Create)
• Apply the knowledge of sorting to organize the data. (Apply)
• Apply the knowledge of hashing for data indexing. (Apply)
HARDWARE REQUIREWMENTS:
SOFTWARE REQUIREMENTS:
72
19UCS309 JAVA PROGRAMMING LABORATORY L T P C
0 0 3 1.5
PRE-REQUISITE :
COURSE OBJECTIVES:
To enable students to understand Integrated Development Environment
(IDE) to work with Java
To enable students to write object oriented programs in Java
To enable students to develop Graphical User Interfaces
To enable students to manipulate data stored in a database
LIST OF EXPERIMENTS
1. Write a java program to illustrate constructors.
2. Write a java program to demonstrate arrays and strings.
3. Write a java program to implement inheritance
4. Write a java program to demonstrate interface.
5. Write a java program to illustrate exception handling.
6. Write a java program to demonstrate generic programming
7. Write a java program to use collection.
8. Write a java program to perform File I/O.
9. Write a java program to design Forms using FX.
10. Write a java program to demonstrate Dialogs.
TOTAL : 30 Periods
COURSE OUTCOMES:
After the successful completion of this course, the student will be able to
HARDWARE REQUIREWMENTS:
SOFTWARE REQUIREMENTS:
73
Operating System: Linux (any flavor) / Windows
JDK version above 6, any IDE like NetBeans, Eclipse, Code etc.
0 0 3 1.5
PRE-REQUISITE :
COURSE OBJECTIVES:
The student should be made to:
Study the working concepts of CPU scheduling
Understand various file allocation strategy
Learn various file organization techniques
Understand the resource allocation concepts relevant to deadlock
Implement page replacement algorithms
Solve problem relevant to memory management
LIST OF EXPERIMENTS
1. Simulation of FCFS scheduling algorithm.
2. Simulation of SJF scheduling algorithm.
3. Simulation of Priority scheduling algorithm.
4. Simulation of Round Robin scheduling algorithm.
5. Implementation of file allocation strategy.
a) Sequential b) Indexed c) Linked
6. Simulate all File Organization Techniques I
a) Single level directory b) Two level
7. Simulate all File Organization Techniques II
a) Hierarchical b) DAG
8. Simulation of dining philosopher problem.
9. Simulate Bankers Algorithm for Dead Lock Avoidance
10. Simulate Bankers Algorithm for Dead Lock Prevention
11. Simulate all page replacement algorithms
a) FIFO b) LRU c) LFU Etc. …
12. Simulate Paging Technique of memory management.
13.Simulate disk scheduling algorithms I
a) FCFS b) SSTF
14. Simulate disk scheduling algorithms II
a) SCAN b) LOOK
15. Simulate Segmentation Technique of memory management.
TOTAL : 45 Periods
COURSE OUTCOMES:
After the successful completion of this course, the student will be able to
• Apply the knowledge of CPU scheduling to solve problems relevant to multi
74
process.(Apply)
• Employ various file allocation strategies to simulate in the operating systems
(Apply)
• Deploy various file organization techniques in the operating system (Apply)
• Build solutions to the resource allocation problem which leads to deadlock (Apply)
• Simulate various techniques implements to page replacement algorithms (Apply)
• Provide solutions to the problems relevant to memory management (Apply)
HARDWARE REQUIREWMENTS:
SOFTWARE REQUIREMENTS:
75
SEMESTER-IV
76
Semester IV
Course
Course Title L T P C
Code
THEORY
Transforms and Discrete Mathematics
19UMA421 BS 3 1 0 4
(Common to CSE &IT)
PRACTICAL
MANDATORY COURSES
TOTAL 18 2 9 21.5
77
19UMA421 TRANSFORMS AND DISCRETE MATHEMATICS
L T P C
(COMMON TO CSE & IT)
3 1 0 4
PRE-REQUISITE:
COURSE OBJECTIVES :
● To make the student acquire sound knowledge to test the logic of program.
● To familiarize the student to be aware of generating functions.
● To acquaint the student with the basics of Z - transform in its applicability to discretely varying
functions, gained the skill to formulate certain problems in terms of difference equations and
solve them using the Z - transform technique bringing out the elegance of the procedure
involved
Permutations and Combinations - Mathematical inductions - Strong induction and well ordering - The
basics of counting – The pigeonhole Principle – Recurrence relations – Solving Linear recurrence
relations - Generating functions - Inclusion and exclusion and applications.
Algebraic systems - Semi groups and Monoids – Groups - Subgroups and Homomorphisms - Cosets
and Lagrange’s theorem - Ring & Fields – Vector Spaces (Definitions and examples).
Fourier integral theorem (without proof) – Fourier transform pair – Sine and Cosine transforms –
Properties – Transforms of simple functions – Convolution theorem – Parseval’s identity -
Application of Fourier Transform
Z-transform – Elementary properties – Inverse Z-transform – Convolution theorem – Initial and Final
value Theorems - Formation of difference equations – Solution of difference equations.
78
COURSE OUTCOMES:
After the successful completion of this course, the student will be able to
● Apply logical structure of proofs and work symbolically with connections and quantifiers to
produce logical value, correct and clear argument. (Apply)
● Apply the knowledge of induction hypotheses and the principle of basic counting ,
pigeonhole principle and solving, linear Recurrence relations, generating functions. (Apply)
● Apply the knowledge of set with the operations for groups, rings and fields using elementary
properties if necessary. (Apply)
● Apply the acquired knowledge of Fourier transform and its properties which are used to
transform signals between time and frequency domain. (Apply)
● Apply the acquired knowledge of Z transform and its properties inverse Z transform and
difference equations. (Apply)
● Understand the knowledge of principle of counting, continuous and discrete
transforms.(Understand)
TEXT BOOKS:
1. KENNETH H.ROSEN, “Discrete Mathematics and its Applications”, Special Indian Edition,
Tata McGraw-Hill Pub. Co. Ltd., New Delhi, 5th Edition, (2008).
2. TREMBLY J.P and MANOHAR R, “Discrete Mathematical Structures with Applications to
Computer Science”, Tata McGraw–Hill Pub. Co. Ltd, New Delhi, 35th Re-print, (2008).
3. VEERAJAN.T, “Engineering Mathematics for semester III”, Tata McGraw-Hill,New Delhi
(2000).
REFERENCE BOOKS:
79
5. KANDASAMY.P, THILAGAVATHY.K, and GUNAVATHY.K, Engineering Mathematics III,
Chand & Company Ltd., New Delhi, 3rd Edition, (1996).
3 0 0 3
PRE-REQUISITE:
COURSE OBJECTIVES :
Data Communication- Networks-Protocols and Standards –Layered Tasks – The OSI Model –
Layers-TCP/IP Protocol Suite- Addressing – Performance- multiplexing –Spread Spectrum-
Transmission Media- Switching.
UNIT II DATA LINK LAYER AND MEDIA ACCESS CONTROL 9Hrs
Error Detection and Error Correction –Data Link Control - Multiple access Protocols- Wired LANs-
Ethernet –Wireless LAN- IEEE 802.11 –Bluetooth – Connecting Devices- wireless WAN – Virtual
Circuit Networks.
UNIT III NETWORK LAYER 9Hrs
Network Layer Services - packet switching – Logical Addressing- Internet Protocols (IPV4 and
IPv6)– Address Mapping – Network Layer Protocols: ICMP – IGMP – ICMP v6 – Delivery-
Forwarding –Unicast Routing Protocol– Multicast Routing Protocol
DNS, DDNS, TELNET, EMAIL – (POP, SMTP), FTP, WWW, HTTP, SNMP, Basic concepts of
Cryptography and digital signature – Firewalls.
TOTAL : 45 Periods
80
COURSE OUTCOMES:
After the successful completion of this course, the student will be able to
Describe about the basic layers and its functions in computer networks.(Understand)
Apply the knowledge of error detection and correction techniques for error free data flow in
a computing Environment.(Apply)
Identify suitable routing algorithm to transmit the data efficiently in a network Environment.
(Analyze)
Apply the knowledge of congestion control mechanisms to the solution of problems involving
the improvement of QoS.(Apply)
Illustrate the working of various application layer protocols.(Apply)
Design a LAN network and estimate their performances. (Create)
TEXT BOOKS:
1. Behrouz A. Forouzan, “Data Communications and Networking”, Fifth Edition TMH, 2013.
2. Andrew S Tanenbaum, “Computer Networks”, PHI, 2010.
3. Walliam Stallings , “Data and Computer Communications”, PHI,2002
REFERENCE BOOKS:
81
19UCS403 DESIGN AND ANALYSIS OF ALGORITHMS L T P C
3 1 0 4
COURSE OBJECTIVES :
TOTAL:45(L)+15(T)= 60 Periods
COURSE OUTCOMES:
After the successful completion of this course, the student will be able to
• Compute and analyze the time complexity of recursive and non-recursive algorithms.
(Analyze)
• Develop algorithms to solve problems using brute force and divide and conquer techniques
and analyze the time complexity of it. (Analyze)
• Derive algorithm using dynamic programming technique to solve problems. (Apply)
• Construct algorithm to solve problem using Greedy and Iterative techniques.(Apply)
• Employ algorithm design techniques to solve NP problems using backtracking and branch
and bound technique. (Apply)
• Adapt the best suitable algorithmic technique to solve real world problems on evaluating the
performance of various algorithmic techniques. (Create)
82
TEXT BOOKS:
REFERENCE BOOKS:
4. Alfred V. Aho, John E. Hopcroft and Jeffrey D. Ullman, “Data Structures and
Algorithms”,Pearson Education, Reprint 2006.
3 0 0 3
COURSE OBJECTIVES :
RAID – File Organization – Organization of Records in Files – Indexing and Hashing –Ordered
Indices – B+ tree Index Files – B tree Index Files – Static Hashing – Dynamic Hashing – Query
Processing – Algorithms for SELECT and JOIN operations – Query optimization using Heuristics
and Cost Estimation
Database Security: Authentication, Authorization and access control, DAC, MAC andRBAC
models, Intrusion Detection-Object oriented and object relational databases - Web databases -
Distributed databases–Parallel Databases-Temporal Databases- Spatial Databases.
TOTAL:45 Periods
COURSE OUTCOMES:
After the successful completion of this course, the student will be able to
84
TEXT BOOKS:
REFERENCE BOOKS:
3 0 0 3
PRE-REQUISITE:
COURSE OBJECTIVES :
85
To develop an in-depth understanding of the operation of microprocessors and
Microcontrollers, assembly language programming & interfacing techniques
To introduce the hardware architecture, instruction set, programming of 8051 microcontroller
and Advanced microcontroller
Memory interfacing and I/O interfacing - Serial Communication Interface (8251)- parallel port
Interface (8255) - Keyboard and Display controller (8279) – Programmable Interval
Timer(8253/8254) – Programmable Interrupt Controller(8259) - DMA Controller(8237).
8051 Architecture– Memory organization - Special Function Registers (SFRs) - I/O Pins / Ports –
Instruction sets and Addressing modes - 8051 Modes and Programming – Timer, Interrupts, Serial
ports- Assembly Language Programming
8051 Interfacing: LCD & Keyboard interfacing - ADC, DAC & Sensor interfacing, External Memory
Interfacing - Stepper Motor and Wave form generation-Traffic light controller.
TOTAL : 45 Periods
COURSE OUTCOMES:
After the successful completion of this course, the student will be able to
Apply the knowledge of 8086 processor to design and develop code for appropriate
applications.( Apply)
Analyze the various interfacing techniques to develop real time applications.
(Analyze)
Apply the knowledge of 8051 micro controller to design and develop code for appropriate
applications. ( Apply)
Analyze the various interfacing techniques to develop Microcontroller based real time
Application.(Analyze)
86
Develop code for real time control applications using Arduino Microcontroller.(Apply)
TEXT BOOKS:
REFERENCE BOOKS:
0 0 3 1.5
87
PRE-REQUISITE :
COURSE OBJECTIVES:
To learn and use network commands
To learn socket programming
To implement remote procedure call
To learn and use simulation tools to implement and analyze the
performance of network routing protocol.
LIST OF EXPERIMENTS
1. Implementation of CRC and Hamming Code generation(CO1)
2. Implementation of Stop and Wait Protocol(CO2)
3. Implementation of Sliding Window Protocol(CO2)
4. Implementation of Distance Vector Routing Protocol and Link State Vector Routing
Protocol(CO2)
5.Program using TCP Socket(CO3)
(i) data and time Server & client
(ii) echo Server & Client
(iii) File Transfer
(iv) Web page Upload and Download
6.Implementation of DNS using UDP socket(CO3)
7. Implementation of ARP/RARP(CO3)
8. Implementation of RPC(CO3)
9. Implementation of Data Encryption and Decryption(CO4)
10.Performance evaluation of Routing Protocols using Simulation tool.(CO3)
TOTAL : 45 Periods
COURSE OUTCOMES:
After the successful completion of this course, the student will be able to
HARDWARE REQUIREWMENTS:
Desktops – 30Nos
88
SOFTWAREREQUIREWMENTS:
1. C++ Compiler,J2SDK(Freeware),
2. Network Simulators, NS2/Glomosim/OPNET ( Freeware)
0 0 3 1.5
89
COURSE OBJECTIVES:
To demonstrate the creation and usage of database
LIST OF EXPERIMENTS
1. Vijay TV Company wishes to develop a database to store data about the TV series that
the
companyproduces.Thedataincludesinformationaboutactorswhoplayintheseries,anddirec
tors who direct the episodes of theseries. Actors and directors are employed by the
company. A TV series are divided into episodes. Each episode may be transmitted at
several occasions. An actor is hired to participate in a series, but may participate in
many series. Each episode of a series is directed by one of the directors, but different
episodes may be directed by different directors.
Create tables with necessary integrity constraints. Insert minimum of 10 records in
each table.
90
5. A municipality needs a database containing information concerning the inhabitants of the
municipality. The database will be used for the planning of schools, health care and child
care. From the database, you should be able to receive answers to queries of the
following types: (Use library functions and aggregate functions)
i. How many boys and girls will start school during year x?
ii. How many people will become old-age pensioners during year x?
iii. How many households have more than x people?
iv. How many people are single parents?
v. In how many households is at least one member unemployed?
vi. How many households have a total income that is less than the norm for receiving
social benefits?
6. A medical health research project has a database containing data about all patients at
ahospital. For each patient, data about the symptoms that the patient shows is
registered:fever, headache, cough, chest pains, . . . Symptoms can have different
severity: low, middle,or high. A patient may show several symptoms, e.g., high fever,
medium headache andsomecough.The database also contains data about diseases.
Each disease is characterized bydifferent symptoms: a patient with a cold should have
fever and a cough, a malaria patientshould have fever and fits of shivering, etc.
Write SQL statements that answer the following questions (define and use views). Find
the names of all patients that:
i. don’t have any symptom of high severity,
ii. have at least two different symptoms,
iii. have at least one of the symptoms of malaria
iv. have all the symptoms of malaria.
7. A company has several employees, all with different names, who perform interviews with
job applicants (one applicant is interviewed by one employee). The job applicants also
have different names. The interviewer makes appointments for interviews with the
applicants. Each applicant may be interviewed at several occasions, possibly by different
interviewers, but in that case the interviews take place during different days.
The company has special interview rooms. Each interviewer uses the same room for all
interviews during a day. A room may, however, be used by different interviewers during
a day, as long as the interviews don’t collide in time.
The reservation of interview appointments is to be computerized. The database
developer has decided to use a single relation for all data, with the following schema:
Interviews(interviewer, applicant, day, time, room)
8. Shops sell items at varying prices. Customers buy items from shops. This is described
by the following relations:
Shops(shopId, name, address)
Items(itemId, name, description)
Sells(shopId, itemId, price)
Customers(customerId, name, address)
Sales(saleId, customerId, itemId, shopId, date)
91
i. Write a procedure to print the name and address of all customers who haven’t
bought any item.
ii. Write a procedure for all customers that have bought at least one item: print the
customer id and the total sum of all purchases.
iii. Write a function to print the number of shops that sell items with id’s starting with
’EF’.
iv. Write a function to print the name and address of the shop(s) that sell the item with
id = ’EF123-A’ at the lowest price.
9. A company organizes its activities in projects. Products that are used in the projects are
bought from suppliers. This is described in a database with the following schema:
Projects(projNbr, name, city)
Products(prodNbr, name, color)
Suppliers(supplNbr, name, city)
Deliveries(supplNbr, prodNbr, projNbr, number)
i. Write a trigger which displays a message whenever an entry is made in the table
‘Deliveries’.
ii. Write a trigger which is invoked automatically whenever a product is supplied to
the city ‘London’.
iii. Execute an exception if the ‘number’ field in ‘Deliveries’ table is zero.
10. Develop an application for the any one of the following using any front end tool to design
the GUI and Oracle/MySql as back end.
92
TOTAL : 45 Periods
COURSE OUTCOMES:
After the successful completion of this course, the student will be able to
• Apply the concepts of database systems to design a good database schema for a given
application. (Apply)
• Construct queries using SQL to extract information from a database. (Apply)
• Analyze various database design techniques to develop a database application for a
given scenario. (Analyze)
• Design Database application for a given real life scenario using the concepts of SQL and
PL/SQL. (Create)
• Communicate effectively to justify the computing solutions based on legal and ethical
principles. (Affective domain)
• Function effectively as an individual or in teams to develop database application for a
given scenario. (Affective domain)
HARDWARE REQUIREWMENTS:
SOFTWARE REQUIREMENTS:
93
MICROPROCESSORS AND
19UEC426 L T P C
MICROCONTROLLERS LABORATORY
0 0 3 1.5
PRE-REQUISITE :
COURSE OBJECTIVES:
• To introduce ALP concepts and features
• To write ALP for Arithmetic and logical operation in 8086 and 8051
• To differentiate serial and parallel interface
• To interface different I/Os with Microprocessor and Microcontroller.
LIST OF EXPERIMENTS
Microprocessor -8086
Microcontroller-8051
Interfacing
TOTAL : 45 Periods
94
COURSE OUTCOMES:
After the successful completion of this course, the student will be able to
Develop assembly language programs to perform arithmetic and logical operations
using 8086 and 8051.( Apply)
Develop assembly language programs for various applications using 8086
microprocessor & 8051 microcontroller ( Apply)
Analyze the data transfer information through serial & parallel ports
(Analyze)
Analyze the various interfacing techniques to develop real time applications using
8086 microprocessor & 8051 Microcontroller. (Analyze)
95
19UGM431 GENDER EQUALITY L T P C
1 0 0 P/F
PRE-REQUISITE:
COURSE OBJECTIVES :
Definition of gender, Perspectives-Gender sensitive approach- Gender and sex- Social construction of
gender and gender roles- Socialization- institutions of socialization- changing content and context of
gender-need for re-socialization. Gender Stereotyping and Gender Discrimination.
Indian constitution related to equality - Fundamental rights - Directive principles of state policy - right
to equality - rights against exploitation - cultural and educational rights - the right to constitutional
remedy - University Declaration of Human Rights - Enforcement of Human Rights for Women and
Children - Role of Cells and Counseling Centers- Internal Complaints Committee - Legal AID cells,
Help line, State and National level Commission.
Gender & Morality – Structural and functionalist views of Gender- Gender in the Classroom-Beyond
access for girls and boys-Gender equality in schools-Gender equality and adult basic education-
Developing capacity to achieve gender equality in education-Individuality and removal of gender
stereotypes- Respect for each other’s-Promote equal opportunity.
TOTAL:15 Periods
COURSE OUTCOMES:
After the successful completion of this course, the student will be able to
Describe the social construction of gender and sexuality and their influence in social
context. (Understand)
Analyze how the concepts of gender equality are created, maintained, and/or challenged.
(Analyze)
Apply concepts of gender roles and equality in classroom, school, disciplinary or
interdisciplinary creative, scholarly, and/or activist project. (Apply)
REFERENCES:
1. Sheila Aikman and Elaine Unterhalter, “Practising Gender Equality in Education”, Oxfam
GB, 2007.
2. Pasadena and Hackensack, “Gender roles and Equality”, Salem Press,2011.
96
BASICS OF BIOLOGY FOR ENGINEERS
19UGM432 L T P C
(For CSE, CSBS &Mech)
2 0 0 P/F
PRE-REQUISITE:
COURSE OBJECTIVES :
Characteristics of living organisms – Basic classification – Cell theory – Structure of prokaryotic and
eukaryotic cell – Introduction to Bio-molecules: Definition – General classification and important
functions of Carbohydrates – Lipids – Proteins – Nucleic acids, Vitamins and Enzymes – Genes and
Chromosome.
UNIT II BIODIVERSITY 5 Hrs
Plant System: Basic concepts of Plant growth – Nutrition – Photosynthesis and Nitrogen fixation –
Animal System: Elementary study of Digestive, Respiratory, Circulatory, Excretory systems and their
functions.
Discovery of cell and Cell Theory – Comparison between plant and animal cells – Cell wall – Plasma
membrane – Modification of plasma membrane and intracellular junctions – Stem cells and Tissue
engineering.
TOTAL : 30 PERIODS
COURSE OUTCOMES:
After the successful completion of this course, the student will be able to
• Explain the fundamentals of living things, their classification, cell structure and biochemical
97
constituents.(Understand)
• Apply the concept of plant, animal and microbial systems and growth in real life situations.
(Apply)
TEXT BOOKS:
1. Satyanarayana, U. “Biotechnology”, 4th Edition, Books and Allied Pvt. Ltd. Kolkata, 2007.
2. Carol D. Tamparo and Marcia A. “Diseases of the Human Body”, Lewis, F.A. Davis
Company, 2011.
3. R. Khandpur, “Biomedical instrumentation - Technology and applications”, McGraw Hill
Professional, 2004.
REFERENCE BOOKS
1. Lehninger A.L, Nelson D.L, Cox .M.M, Principles of Biochemistry”, CBS Publications 2017.
2. Arthur T. Johnson, “Biology for Engineers”, CRC Press, Taylor and Francis, 2nd Edition,
2019.
3. Cecie Starr, Ralph Taggart, Christine Evers and Lisa Starr, “Cell Biology and Genetics
(Biology: The unity and diversity of life Volume I)”, Cengage Learning, 12th Edition, 2008.
98
Semester V
Course
Course Title L T P C
Code
THEORY
PE Professional Elective – I 3 0 0 3
OE Open Elective – I 3 0 0 3
PRACTICAL
TOTAL 17 1 11 23.5
99
19UCS501 INTERNET AND WEB TECHNOLOGY L T P C
2 0 3 3.5
PRE-REQUISITE:
COURSE OBJECTIVES :
LIST OF EXPERIMENTS
1. Design an aesthetic web page with basic HTML elements to describe the instructions of any simple
game. The web page should clearly specify the instructions to be followed by the players.
2. The 2021 ICC Men’s T20 World Cup is scheduled to be the seventh ICC Men’s T20 World
Cup tournament, with matches taking place in the United Arab Emirates and Oman from 17 October
to 14 November 2021. Design a web page that shows the match flow, schedule, venue, team players
list with history, and ticket registration form using appropriate HTML elements.
3. Yoga Outreach Society develops and delivers life-affirming yoga programs to communities most
under-served members. Partnering with yoga instructors, community organizations, social service
agencies, and prisons to provide trauma-informed and strengths-based yoga programming for facility
participants. Design a web page to meet the needs of the clients in all ages and skills who want to
learn more about and take yoga classes. The website should give the details of class schedule,
pricing, diet chart, and how to sign up. The clients may look the web page for knowing more about
the different types of yoga available. (AP)
UNIT II CSS AND CSS3 6L + 9 P
Style Sheets: Introduction to CSS – CSS Types–CSS Selectors - background images – colors and
properties - manipulating texts using fonts - borders and boxes – margins - padding lists - positioning
using CSS.CSS3: CSS3 Multi Backgrounds – CSS3 Text – CSS3 2D Transform and 3D Transform.
LIST OF EXPERIMENTS
1. Design a good-looking web site for your college containing a description of the courses,
departments, faculty, and library etc, Use suitable HTML elements with CSS.
2. Design a web page of your home town with an attractive background color, text color, an Image, font
etc. The web page should give the information about the trending news, tourist spots, food items,
100
and a rating form about your hometown. Use suitable HTML elements with CSS.
3. Develop an animated website using HTML and CSS.
UNIT III CLIENT SIDE SCRIPTING JAVA SCRIPT 6L + 9 P
LIST OF EXPERIMENTS
1. Develop a script that will determine whether a department-store customer has exceeded the credit
limit on a charge account. For each customer, the following facts are available:
a) Account number
b) Balance at the beginning of the month
c) Total of all items charged by this customer this month
d) Total of all credits applied to this customer's account this month
e) Allowed credit limit
The script should input each of these facts from a prompt dialog as an integer, calculate the new
balance (= beginning balance + charges – credits), display the new balance and determine whether the
new balance exceeds the customer’s credit limit. For customers whose credit limit is exceeded, the
script should output HTML5 text that displays the message “Credit limit exceeded.”
2. Hangman is a paper and pencil guessing game for two or more players. One player thinks of a word,
phrase or sentence and the other tries to guess it by suggesting letters within a certain number of
guesses. The word to guess is represented by a row of dashes, representing each letter of the word.
In most variants, proper nouns, such as names, places, and brands, are not allowed. Slang words,
sometimes referred to as informal or shortened words, are also not allowed. If the guessing player
suggests a letter which occurs in the word, the other player writes it in all its correct positions. If the
suggested letter does not occur in the word, the other player draws one element of a hanged man
stick figure as a tally mark.
The player guessing the word may, at any time, attempt to guess the whole word. If the word is
correct, the game is over and the guesser wins. Otherwise, the other player may choose to penalize
the guesser by adding an element to the diagram. On the other hand, if the other player makes
enough incorrect guesses to allow his opponent to complete the diagram, the game is also over, this
time with the guesser losing. However, the guesser can also win by guessing all the letters that
appear in the word, thereby completing the word, before the diagram is completed.
3. Write a web page that enables the user to play the game of 15. There’s a 4-by 4 board (implemented
as an HTML5 table) for a total of 16 slots. One of the slots is empty. The other slots are occupied by
15 tiles, randomly numbered from 1 through 15. Any tile next to the currently empty slot can be
moved into the currently empty slot by clicking on the tile. Your program should create the board with
the tiles out of order. The user’s goal is to arrange the tiles in sequential order row by row. Using the
DOM and the click event, write a script that allows the user to swap the positions of the open position
and an adjacent tile.
PHP Variables and Operators – Control structures – Arrays –Strings - Function and Forms – PHP
Classes and Objects – Constructors – Inheritance - PHP Databases : Connection to Server -
Creating Database - Creating a Table, inserting data, altering tables, queries, deleting database,
101
deleting data and tables.
LIST OF EXPERIMENTS
1. Write a PHP Script for storing and retrieving employee information from MySql table
i) Design a HTML form to collect employee details with salary
ii) Store this employee details in Mysql database
iii) Display all employee details in HTML table format
2. Design a HTML form to read a semester marks of 10 students from the user with proper
validation. Write a PHP Script to read all the marks and calculate total and average of your
semester marks and display the marks, total and average in HTML table format.
3. Create a class named ‘Animal’ with the data members, family and food. Use appropriate
member functions to read and display the member data. Inherit the two classes ‘Cow’ and
‘Lion’ from the Animal class with the necessary methods.
UNIT V XML AND AJAX 6L+9P
Basics of XML - Building Blocks of XML – Names Space in XML - DTD and XML Schemas – XML
Parser and Validation – XSL and XSLT Transformation – XSL Elements – XPATH AJAX: Ajax Client
Server Architecture - XML Http Request Object – XML SOAP Protocol.
LIST OF EXPERIMENTS
1. Create internal and external DTD for a catalog of four stroke motorbikes, where each
motorbike has the following child elements – make, model, year, color, engine and chasis
number. The engine element has the child element engine number, number of cylinders, and
type of fuel.
2. Use AJAX to retrieve data from an XML file and display it in table format.
3. Create a simple XML document contains student details where each student element has the
student personal details with 4 subject marks and calculate total and average marks. All
student details are display the web page in HTML table format using XSL and XSLT.
TOTAL : 75 Periods
COURSE OUTCOMES:
After the successful completion of this course, the student will be able to
102
TEXT BOOKS:
Education India.
REFERENCE BOOKS:
3. Web Applications : Concepts and Real World Design, Knuckles, Wiley- India
4. Internet and World Wide Web How to program, P.J. Deitel & H.M. Deitel Pearson.
5. Zak Ruvalcaba Anne Boehm, “Murach's HTML5 and CSS3”, 3rdEdition, Murachs/Shroff
103
19UCS502 SOFTWARE ENGINEERING PRACTICES L T P C
3 0 0 3
PRE-REQUISITE:
COURSE OBJECTIVES :
Understand the key concepts, principles and Process models of Traditional, Agile and
DevOps.
Describe and compare various software development methods and understand the context
in which each approach might be applicable.
To know about the quality checking mechanism for software process and product.
UNIT I INTRODUCTION TO SOFTWARE PROCESS AND MODELS 9
Introduction – Life Cycle for Traditional – Generic Software Process Model: Prescriptive Process
models: Waterfall Model, Incremental Process Models Evolutionary Process Models, Concurrent
Models. Specialized Process Models – Agile Life Cycle - Agile Manifesto and Principles - Agile
Software Engineering Process Models: Overview of Scrum - Extreme Programming - Feature
Driven development - Lean Software Development . DevOps Lifecycle Phases – Principles –
Agile Vs DevOps.
Introduction to Scrum Framework – Agile Scrum Methodology – Agile Planning and Estimation –
Writing and Working in User Stories with Acceptance Criteria – Project Velocity – Tools for Agile
Project Management - Case Study.
UNIT III AGILE SOFTWARE DESIGN, DEVELOPMENT AND TESTING 9
Agile design practices, Role of design Principles including Single Responsibility Principle, Open
Closed Principle, Liskov Substitution Principle, Interface Segregation Principles, Dependency
Inversion Principle in Agile Design. Refactoring Techniques. Agile Testing Practices and Principles
– Life Cycle – Methodologies: Test-Driven Development (TDD), xUnit framework , Exploratory
testing, Risk based testing, Regression tests.
UNIT IV INTRODUCTION AND FRAMEWORK FOR DevOps 9
COURSE OUTCOMES:
After the successful completion of this course, the student will be able to remember
Explain the basic and advanced software development methodologies of traditional, agile and
DevOps. (Understand)
TEXT BOOKS:
2. Ken Schawber, Mike Beedle,” Agile Software Development with Scrum”, Pearson, 2002.
3. Lenn Bass, Ingo Weber and Liming Zhu, “ DevOps – A Software Architects Perspective”,
Addison – Wesley,
REFERENCE BOOKS:
1. Ian Sommerville, “Software Engineering”, 9th Edition, Pearson Education Asia, 2011.
2. Robert C. Martin , Micha Martin, ” Agile Software Development, Principles, Patterns and
Practices ”, Pearson, 2007
3. Sricharan Vadapalli, “ DevOps: Continuous Delivery , Integration and Deployment with
DevOps – Rapid Learning Solution”,
105
4. Lisa Crispin, Janet Gregory,” Agile Testing: A Practical Guide for Testers and Agile Teams”,
Addison Wesley, 2008.
5. Alistair Cockburn, ” Agile Software Development: The Cooperative Game ”, Addison
Wesley, 2006
6. Mike Cohn, ” User Stories Applied: For Agile Software”, Addison Wesley , 1st Edition
7. Kent Beck, “Test Driven Development: By Example”, Addison Wesley, 2002.
19UCS503 L T P C
MOBILE APPLICATION DEVELOPMENT
2 0 3 3.5
COURSE OBJECTIVES :
Aims at providing techniques for deploying and testing mobile applications, and for
enhancing their performance and scalability
Identify the capabilities and limitations of mobile platforms that affect application
development and deployment
Elaborating the characterization and architecture of mobile applications
Analyzing the impact of technology and business trends in mobile application development
Lab Exercise
1. Develop an application that uses GUI components, Font and Colors in various layouts.
2. Develop an android application to implement a User Input Control.
3. Develop an android application to demonstrate simple event handling.
106
overview – Implicit intents – Explicit intents – Intents with activities – Intents with broadcast
receivers.
Lab Exercise
Lab Exercise
Lab Exercise
14. Develop an android application to demonstrate SQLite Database.
15. Develop an android application to demonstrate Firebase Database.
TOTAL: 75 Periods
COURSE OUTCOMES:
After the successful completion of this course, the student will be able to
• Gain knowledge about the fundamentals of mobile application development tools and
concepts(Understand)
• Develop solutions to existing problems by building an effective and advanced application
using integrated development environment.(Apply)
• Analyze the existing security issues in real world scenario and build a secure, reliable and
effective mobile application. (Analyze)
• Evaluate the prominence of the deployed android application using Cloud hosting function.
(Evaluate)
• Design a full stack android mobile application that can be deployed to the real world. (Create)
• Follow the design pattern and effectively communicate with team members to developan
effective software product. (Affective domain)
TEXT BOOK:
1. “Head first android development, A brain friendly guide” – Dawn Griffiths and David
Griffiths, Oreilly, third edition, 2015.
REFERENCE BOOKS:
HARDWARE REQUIREMENT:
108
SOFTWARE REQUIREMENT
Java JDK
Android studio
Emulator
3 1 0 4
COURSE OBJECTIVES :
To understand various formal languages like Regular Language, Context Free Language,
Context Sensitive Language and Recursively Enumerable language.
To understand various Computing models like Finite State Machine, Pushdown Automata,
Linear Bounded Automata and Turing Machine.
To understand Decidability and Undecidability of various problems.
Regular Expression, Regular Language and Regular Grammar – Equivalence of FA and Regular
Expressions– Equivalence of FA and Regular Grammar-Properties - Pumping Lemma for Regular
Languages –Equivalence and Minimization of Automata.
Context-free grammars (CFG) and languages (CFL)–Derivation and Parse trees– Equivalence of
Derivations and Parse Trees–Ambiguity in CFG– Normal forms of CFG – Chomsky and Greibach
normal forms–Context Sensitive Grammars-Context Sensitive Languages.
109
UNIT IV PUSH DOWN AUTOMATA AND LINEAR BOUNDED AUTOMATA 9+3
COURSE OUTCOMES:
After the successful completion of this course, the student will be able to
Understand the concepts of formal languages and automata theory for solving various
problems of engineering. (Understand)
Apply the knowledge of formal languages and automata theory to solve complex engineering
problems for pattern recognition and syntax checking. (Apply)
Identify the suitable automata model for complex engineering problems for reaching
sustained conclusions. (Analyze)
Design an automata model to solve complex engineering problems based on grammar and
languages.(Apply)
Relate the equivalence of automata model and languages or grammars.(Analyze)
Design computational models for a given problem using modern tools with the understanding
of the limitations of the model: Flap /JFlap, DAG-O-Bert, Deus ex Machina, ASSIST.(Create)
TEXT BOOK:
1. J.E.Hopcroft, R.Motwani and J.D Ullman, “Introduction to Automata Theory, Languages and
Computations”, Pearson Education, Third Edition, 2008.
110
REFERENCE BOOKS :
3. Kamala Krithivasan and R. Rama, “Introduction to Formal Languages, Automata Theory and
Computation”, Pearson Education, Delhi, 2009.
4. J. Martin, “Introduction to Languages and the Theory of Computation”, Tata McGraw Hill, New
Delhi, Third Edition, 2007.
5. MichealSipser, “Introduction to the Theory and Computation”, Cengage Learning India, 2012.
111
Semester VI
Course
Course Title L T P C
Code
THEORY
PE Professional Elective – II 3 0 0 3
OE Open Elective – II 3 0 0 3
PRACTICAL
MANDATORY COURSES
112
19UCS601 PRINCIPLES OF COMPILER DESIGN L T P C
TOTAL 19 1 14 26
113
3 1 0 4
COURSE OBJECTIVES :
Syntax Directed Definitions, Evaluation Orders for Syntax Directed Definitions, Intermediate
Languages: Syntax Tree, Three Address Code, Types and Declarations, Translation of Expression.
After the successful completion of this course, the student will be able to
114
Apply different parsing algorithms to develop the parsers for a given grammar.(Apply)
Translate parsed source statements into three address statements.(Apply)
Examine the right storage structure for the language constructs.(Analyze)
Design a simple code generator for the given programing Language.(Apply)
Apply the optimization techniques for target code generation.(Apply)
TEXT BOOKS:
1.Alfred V. Aho, Ravi Sethi Jeffrey D. Ullman, “Compilers- Principles, Techniques, and Tools”,
Pearson Education Asia, 2007.
2. Holub, Allen I., “Compiler Design in C”, PHI, 2003.
REFERENCE BOOKS:
115
19UCS602 CRYPTOGRAPHY AND NETWORK SECURITY L T P C
3 0 0 3
PRE-REQUISITE:
COURSE OBJECTIVES :
INTRODUCTION 9
UNIT I
Security trends – Legal, Ethical and Professional Aspects of Security, Need for Security at Multiple
levels, Security Policies – Model of network security – Security attacks, services and mechanisms –
OSI security architecture – Classical encryption techniques: substitution techniques, transposition
techniques, steganography- Foundations of modern cryptography: perfect security – information
theory – product cryptosystem – cryptanalysis.
UNIT II SYMMETRIC KEY CRYPTOGRAPHY 9
MATHEMATICS OF SYMMETRIC KEY CRYPTOGRAPHY: Algebraic structures – Modular
arithmetic-Euclid‟s algorithm- Congruence and matrices – Groups, Rings, Fields- Finite fields-
SYMMETRIC KEY CIPHERS: SDES – Block cipher Principles of DES – Strength of DES –
Differential and linear cryptanalysis – Block cipher design principles – Block cipher mode of
operation – Evaluation criteria for AES – Advanced Encryption Standard – RC4 – Key distribution.
UNIT III PUBLIC KEY CRYPTOGRAPHY 9
MATHEMATICS OF ASYMMETRIC KEY CRYPTOGRAPHY: Primes – Primality Testing –
Factorization – Euler‘s totient function, Fermat‘s and Euler‘s Theorem – Chinese Remainder
Theorem – Exponentiation and logarithm – ASYMMETRIC KEY CIPHERS: RSA cryptosystem – Key
distribution – Key management – Diffie Hellman key exchange – ElGamal cryptosystem – Elliptic
curve arithmetic-Elliptic curve cryptography
UNIT IV MESSAGE AUTHENTICATION AND INTEGRITY 9
Authentication requirement – Authentication function – MAC – Hash function – Security of hash
function and MAC – SHA –Digital signature and authentication protocols – DSS- Entity
Authentication: Biometrics, Passwords, Challenge Response protocols- Authentication applications –
Kerberos, X.509
116
UNIT V SECURITY PRACTICE AND SYSTEM SECURITY 9
Electronic Mail security – PGP, S/MIME – IP security – Web Security – SYSTEM SECURITY:
Intruders – Malicious software – viruses – Firewalls.
COURSE OUTCOMES:
After the successful completion of this course, the student will be able to
Analyze the techniques that protect and defend information, information systems by ensuring
authentication. (Analyze)
Apply symmetric cryptographic algorithms to ensure data secrecy. (Apply)
Apply the mathematics of public key cryptographic algorithms. (Apply)
Apply appropriate techniques to ensure message authentication and integrity.(Apply)
Analyze the suitability of security algorithms for real time applications. (Analyze)
TEXT BOOK:
1. William Stallings, Cryptography and Network Security: Principles and Practice, PHI 3rd Edition,
2006.
REFERENCE BOOKS:
1. K Shyamala, N Harini and Dr. T R Padmanabhan: Cryptography and Network Security, Wiley
India Pvt.Ltd
2. BehrouzA.Foruzan, Cryptography and Network Security, Tata McGraw Hill 2007.
3. Charlie Kaufman, Radia Perlman, and Mike Speciner, Network Security: PRIVATE
Communication in a PUBLIC World, Prentice Hall, ISBN 0-13-046019-2
117
19UCS603 ARTIFICIAL INTELLIGENCEAND MACHINE LEARNING L T P C
3 0 0 3
PRE-REQUISITE:
COURSE OBJECTIVES :
To introduce the fundamental concepts in Artificial Intelligence.
To give an idea about the basics of designing intelligent agents that can solve general
purpose problems.
To introduce the concept of Machine Learning
Logical agents – propositional logic – inferences – first-order logic – inferences in first order logic –
Knowledge engineering in FOL -unification – forward chaining – backward chaining –resolution.
UNIT III REASONING UNDER UNCERTAINTY AND PLANNING 9
Linear Regression – Bayesian learning – Logistic regression – SVM –Neural Networks – Multi layer
Neural network – Neural Network and back propagation algorithm.
TOTAL : 45 Periods
COURSE OUTCOMES:
After the successful completion of this course, the students will be able to
118
• Represent and Formulate more variety of sentences using Propositional and predicate logic.
[Apply]
• Analyse a Problem situation and formulate it in terms of state space search problem and
recommend the actions that the agent can execute. [Analyse]
• Build reasoning systems that use network models to reason with uncertainty according to
the laws of probability theory. [Create]
• Construct the planning graph and extract the solution plan from planning graph [Create]
• Analyse the given data set and predict decisions for the given scenario. [Analyse]
• Develop a model that makes rational decisions in important domains like Medical diagnosis,
Health care and Business. [Create]
TEXT BOOKS:
REFERENCE BOOKS:
119
ARTIFICIAL INTELLIGENCEAND MACHINE
19UCS608 L T P C
LEARNING LABORATORY
0 0 3 1.5
PRE-REQUISITE :
COURSE OBJECTIVES:
Implementing the basic concepts in Artificial Intelligence.
Implementing Machine Learning Algorithms
LIST OF EXPERIMENTS
1. Implement Breadth First Search ( for 8 puzzle problem or Water jug problem or
any AI search problem)
2. Implement Depth First Search ( for 8-queen problem or 8 puzzle problem or Water
jug problem or any AI search problem)
3. Solve travelling salesperson problem using Best First Search
4. Build a Knowledge based system for forecasting the weather
5. Write a program to construct a Bayesian network considering medical data. Use
this model to demonstrate the diagnosis of heart patients using standard Heart
Disease Data Set.
6. Demonstrate the working of decision tree based on ID3 algorithm. Use an
appropriate data set for building the decision tree and apply this knowledge to
classify the new sample
7. Construct model to predict the residential home prize as a function of the homes
living area.
8. Develop a model to determine the likelihood of a patient’s successful response to
a specific medical treatment
9. Develop an algorithm to predict whether a particular customer buy a computer or
not based on the following attribute age, income, student and credit rating.
10. Given the symptoms exhibited in a patient and a database of anonymized patient
records, Develop a model to predict whether the patient is likely to have an illness.
TOTAL : 45 Periods
COURSE OUTCOMES:
120
After the successful completion of this course, the student will be able to
Implement search Algorithms for multiple state real world problems. [Apply]
Build rule based expert system for domain specific applications. [Create]
Construct Bayesian network model for the given problem and use this model to
make rational decision. [Create]
Construct decision tree for the given dataset and use this to classify new samples.
[Create]
Build linear regression analytical model to relate several input variable to
continuous output variable. [Create]
HARDWARE REQUIREWMENTS:
SOFTWARE REQUIREMENTS:
121
Semester VII
Course
Course Title L T P C
Code
THEORY
PE Professional Elective IV 3 0 0 3
PE Professional Elective V 3 0 0 3
PRACTICAL
MANDATORY COURSES
TOTAL 20 0 6 22
122
19UCS702 CLOUD COMPUTING L T P C
3 0 0 3
PRE-REQUISITE:
COURSE OBJECTIVES :
To introduce the essentials of building fully featured applications on various cloud models.
To familiarize the concepts of designing and developing various service models and
deployment models
To impart the knowledge of classic data centre and different cloud applications.
OVERVIEW OF CLOUD COMPUTING AND INFRASTRUCTURE AS A
UNIT I 9
SERVICES
Application – DBMS – Compute – Storage – Networking – Object based and Unifies storage
Technologies – and Back-up, Replication technologies – CDC Management - Architectural design
of compute and storage clouds - Public cloud Platforms: GAE, AWS, AND AZURE – Inter Cloud
Resource Management.
UNIT III PLATFORM AS A SERVICE / SOFTWARE AS A SERVICE 9
Aneka Tools: Aneka Cloud Platform - Aneka Resource Provisioning Service - Hybrid Cloud
implementation - Workflow engine for clouds – Workflow management Systems on Cloud, Utilizing
Cloud for workflow execution - Building Aneka clouds - Cloud programming and management.
Map Reduce: The Map-Reduce Programming model and Implementation – Map-Reduce
Programming model - Major Map-Reduce implementation for the cloud..
UNIT IV DATA SECURITY AND MANAGING THE CLOUD 9
Software Testing Life Cycle for traditional and Agile and its impact on testing - Software Testing
Strategies: A Strategic Approach to Software Testing - Test Strategies for Conventional Software -
Test Strategies for Object-Oriented Software- Test Strategies for WebApps and Mobile Apps -
123
Validation and System Testing - The Art of Debugging. Testing Conventional Applications:
White-Box Testing - Basis Path Testing - Control Structure Testing - Black-Box Testing - Model-
Based Testing.
Cloud in Industry: Amazon Web Services, Google App Engine, Microsoft Azure – Emerging Cloud
Software Environments. Cloud Scientific Applications: HealthCare Cloud Business and
Consumer Application in CRM and ERP.
TOTAL:45 Periods
COURSE OUTCOMES:
After the successful completion of this course, the student will be able to remember
After the successful completion of this course, the student will be able to,
Apply the Basics of cloud computing and virtualization techniques in building a cloud
computing environment [Apply].
Analyze the applications of classic data centre and identify the suitable cloud service system
for the given applications [Analyze]
Apply Aneka tools and Map Reduce Technique in Cloud services on PaaS and SaaS [Apply].
Analyze various Challenging issues and risks associated with cloud security. [Analyze]
Identify and Evaluate the suitable model and types of cloud computing for the cloud
applications on scientific and Business. [Evaluate]
Implement the customized virtualized cloud for various applications. [Create ]
TEXT BOOKS:
1. Raj Kumar Buyya, James Broberg, AndrezeiM.Goscinski,” Cloud Computing: Principles and
paradigms”, Wiley 2013.
2. Rajkumar Buyya, Christian Vecchiola, S. Tahamarai Selvi, “Mastering Cloud Computing:
Foundation Application Programming”, mk publications.
3. Kai Hwang Geoffrey C. Fox Jack J. Dongarra, “Distributed and Cloud Computing: From
Parallel Processing to the Internet of Things” 2012 Elsevier.
124
REFERENCE BOOKS:
1. John W. RittingHouse and James F. Ransome, “ Cloud Computing: Implementation,
Management and Security”, CRC Press.
2. Judith Hurwitz, Robin Bloor, Marcia Kaufman, and Dr. Fern Halper, “ Cloud Computing for
Dummies”, Wile Publishing, Inc.
3. Cloud infrastructures and services EMC2 Bangalore book.
125
19UCS703 BUILDING INTERNET OF THINGS L T P C
3 0 0 3
COURSE OBJECTIVES :
In this course, student will explore various components of Building Internet of things such as
Sensors, internetworking and cyber space. In the end they will also be able to design and implement
IoT circuits and solutions.
The Vision-Introduction, From M2M to IoT, M2M towards IoT-the global context, A use case
example, Differing Characteristics. Definitions, M2M Value Chains, IoT Value Chains, An emerging
industrial structure for IoT
Building architecture, Main design principles and needed capabilities, An IoT architecture outline,
standards considerations. Reference Architecture and Reference Model of IoT.
Getting Familiar with IoT Architecture, Various architectural views of IoT such as Functional,
Information, Operational and Deployment. Constraints affecting design in IoT world- Introduction,
Technical design Constraints.
126
Smart Cities, Privacy and Security Issues in IoT.
TOTAL:45Periods
COURSE OUTCOMES:
After the successful completion of this course, the student will be able to
TEXT BOOKS:
1. CharalamposDoukas , Building Internet of Things with the Arduino, Create space, April 2002.
REFERENCE BOOKS:
1.Jan Holler, Vlasios Tsiatsis, Catherine Mulligan, Stefan Avesand, Stamatis Karnouskos, David
Boyle, “From Machine-to-Machine to the Internet of Things: Introduction to a New Age of
Intelligence”, 1st Edition, Academic Press, 2014.
2. Vijay Madisetti and Arshdeep Bahga, “Internet of Things (A Hands-onApproach)”, 1st Edition,
VPT, 2014
4. Cuno Pfister, Getting Started with the Internet of Things, O‟Reilly Media, 2011, ISBN: 978-1-
4493- 9357-1
127
19UCS708 CLOUD COMPUTING LABORATORY L T P C
(COMMON TO CSE & IT) 0 0 2 1
PRE-REQUISITES :
COURSE OBJECTIVES:
To make the students understand concepts of virtualization and to use cloud as Infrastructure,
Platform, Software services.
To provide an overview of concepts of Various Cloud Applications.
LIST OF EXPERIMENTS
1. Decide which applications you are going to install on your virtual machine according to that install 32 or
64-bit Operating system in VM. Because, Some applications are not compatible with old operating systems.
So you should install higher version of Windows to work with UFT and also check OS compatibility of your
required application before proceeding with operating system installation and to check if your processor will
supports in a specific virtual machine. After checking, you can install and run the any one or two virtual
machines.
2. Create a VM using Virtual Box and Install a C compiler through the VM and create and run the program
to find sum of array elements using pointers in C compiler.
3. Writing a word count application program in Map-Reduce algorithm to read the text file and count the
frequency of the words and sums the counts for each word in java language for assuming a huge dataset.
Examples of dataset is given below.
“ Hello I am studying Sethu Institute of Technology”
“ Hello I am Ram”
4. Create a Virtual Machine and apply the allocation algorithm for created virtual machine in an Eclipse IDE
using CloudSim tool for creation a datacenter with one host and run one cloudlet on it.
5. Create two VM and three Cloudlet services then allocate these services to the VM’s and apply the task
scheduling algorithm in an Eclipse IDE using CloudSim Tool for creation a datacenter with one host and run
one cloudlet on it .
6. Create two VM and three Cloudlet services then allocate these services to the VM’s and apply the
Energy Conscious Model in an Eclipse IDE using CloudSim Tool for creation a two datacenter with one
host and run one cloudlet on it .
128
7. Create a simple app program to find Total, Average and Percentage of 5 subjects with five different
marks using arithmetic operators to perform arithmetic operations for the cloud using python or java in an
Google App Engine in Eclipse.
8. Create a basic user comment form that will display the content that the user submits via that form on an
HTML template and create a basic application that can serve static files, such as CSS or images. After you
have set up your development environment, you can write the code for the application and deploy it to App
Engine.
9. Create a one text file s or image file that contain minimum 5 MB content and those file is transfer form
one virtual machine like VM Ware to another virtual machine like Oracle Virtual Box.
10. To host a static website on Amazon S3, you configure an Amazon S3 bucket for website hosting and
then upload your website content to the bucket. When you configure a bucket as a static website, you
enable static website hosting, set permissions, and add an index document. Depending on your website
requirements, you can also configure other options, including redirects, web traffic logging, and custom
error documents.
TOTAL : 45Periods
COURSE OUTCOMES:
After the successful completion of this course, the student will be able to,
Configure and Install the various Virtualization tools such a sVM Ware, Oracle Virtual Box to create
simple program using C, Java with Hadoop Map-Reduce. [ Create]
Learn how to simulate a cloud environment to implement a new allocation, scheduler algorithm and
Energy Conscious model in an Eclipse IDE using CloudSim Tool. [ Apply].
Learn how to create simple application program using python or java, enable Cloud Storage access
to your App Engine and create a basic user comment and files in the cloud development
environment. [ Create ].
To learn developing and hosting the simple web page in cloud environment and to transfer the file
form one VM to another. [Create]
129
HARDWARE: COMPUTERS REQUIRED – 30 Nos with minimum 16 MB RAM .
130
19UCS709 INTERNET OF THINGS LABORATORY L T P C
3 0 0 3
PRE-REQUISITE :
COURSE OBJECTIVES:
To understand the working of sensor
To understand the working of various micro controllers
To solve real world problem using arduino
LIST OF EXPERIMENTS
1. Introduction to various sensors and various actuators & its Application (Students have
to prepare Report for the same). Perform Experiment using Arduino Uno to measure the
distance of any object using Ultrasonic Sensor.
a) PIR Motion Sensor.
b) Rain Drop Sensor.
c) Moisture Sensor.
d) Temperature Sensor.
e) Touch Sensor.
f) Infrared Sensor.
g) Servo Moto.
h) RFID Sensor.
i) Bluetooth Module.
j) Wi-Fi Module.
2. Demonstrate NodeMCU and its working
3. Getting Started with ESP8266 Wi-Fi SoC
4. Hands-on with on-board peripherals of ESP8266
5. Demonstrate Arduino and its pins.
6. Perform Experiment using Arduino Uno to measure the distance of any object using
Ultrasonic Sensor.
7. Create a circuit using Arduino and sensors. Perform experiment using Arduino Uno to
Learn Working of Servo Motor
8. Creating a webpage and display the values available through Arduino.
9. Demonstration of Setup & Working of Raspberry Pi. (Students have to prepare the
Report for the same.).
10. OPEN Ended problem: Students are required to submit an IOT based project using
the Microcontroller or a Raspberry Pi and connecting various sensors and actuators. The
data for the same should be displayed via a webpage or a web app.
TOTAL : 45 Periods
131
COURSE OUTCOMES:
After the successful completion of this course, the student will be able to
HARDWARE REQUIREWMENTS:
SOFTWARE REQUIREMENTS:
132
LIST OF ELECTIVES
Course
Course Title L T P C
Code
19UCS901 Graph Theory 3 0 0 3
133
Course
Course Title L T P C
Code
19UCS929 Advanced Java Programming 3 0 0 3
134
19UCS901 GRAPH THEORY L T P C
3 0 0 3
PRE-REQUISITE:
COURSE OBJECTIVES :
Be familiar with the most fundamental Graph Theory topics and results
Be exposed to the techniques of proofs and analysis
Equip the students with problem solving, critical thinking to solve real-world problems
UNIT I INTRODUCTION 9
Trees – Properties of trees – Distance and centers in tree – Rooted and binary trees- On Counting
Trees- Spanning trees – Fundamental circuits – Spanning trees in a weighted graph – cut sets –
Properties of cut set – All cut sets – Fundamental circuits and cut sets – Connectivity and
separability – Network flows – 1-Isomorphism – 2-Isomorphism
Combinational and geometric graphs – Planar graphs – Different representation of a planar graph-
Detection of Planarity-Combinational and geometric Dual
Directed graphs – Types of directed graphs – Digraphs and binary relations – Directed paths and
connectedness – Euler Digraphs-Fundamental Circuits in Digraphs-Orientation and Tournaments-
Acyclic Digraphs and Decyclization
135
UNIT V ADVANCED TOPICS 9
TOTAL:45 Periods
COURSE OUTCOMES:
After the successful completion of this course, the student will be able to
• Formulate and prove central theorems about trees, matching, connectivity, colouring and
planar graphs (Create)
TEXT BOOKS:
REFERENCE BOOKS:
136
19UCS902 PARALLEL AND DISTRIBUTED ALGORITHMS L T P C
3 0 0 3
COURSE OBJECTIVES :
UNIT I 9
INTRODUCTION
Definition-Model of Distributed Computation-Snapshot Algorithms for FIFO Channels-non FIFO Channels-
Terminology and basic algorithm
UNIT II 9
MESSAGE ORDERING & TERMINATION DETECTION
Message ordering and group communication: Message ordering paradigms –Asynchronous execution with
synchronous communication –Synchronous program order on an asynchronous system –Group
communication – Causal order (CO) - Total order. Termination Detection-System Model of a distributed
system-Termination detection using distributed snapshots-Termination detection by weight throwing.
UNIT III 9
DISTRIBUTED MUTEX & DEADLOCK
Distributed mutual exclusion algorithms: Introduction – Preliminaries – Lamport‘s algorithm – Ricart-Agrawala
algorithm – Maekawa‘s algorithm – Suzuki–Kasami‘s broadcast algorithm. Deadlock detection in distributed
systems: Introduction – System model – Preliminaries – Models of deadlocks – Knapp‘s classification –
Algorithms for the single resource model, the AND model and the OR model.
137
UNIT V SEARCHING & NUMERICAL PROBLEMS 9
Searching a sorted sequence –– Matrix Transpositions – Matrix by Matrix multiplications – Matrix by vector
multiplication-Numerical Problems-Solving Systems of Linear Equations-Finding Roots of NonLinear
Equations-Solving Partial Differential Equations
TOTAL:45 Periods
COURSE OUTCOMES:
After the successful completion of the course, the students will be able to:
TEXT BOOKS:
1. Kshemkalyani, Ajay D., and Mukesh Singhal. Distributed computing: principles, algorithms, and
systems. Cambridge University Press, 2011.
2. George Coulouris, Jean Dollimore and Tim Kindberg, ―Distributed Systems Concepts and
Design‖, Fifth Edition, Pearson Education, 2012.
3.Selim G. Akl, The Design and Analysis of Parallel Algorithms, Prentice Hall, New Jercy, 1989.
REFERENCE BOOKS:
1. Pradeep K Sinha, “Distributed Operating Systems: Concepts and Design”, Prentice Hall of India,
2007.
2. Mukesh Singhal and Niranjan G. Shivaratri. Advanced concepts in operating systems. McGraw-
Hill, Inc., 1994.
138
19UCS903 QUANTUM COMPUTING L T P C
3 0 0 3
PRE-REQUISITE:
COURSE OBJECTIVES :
To introduce the building blocks of a quantum computer and design techniques of simple
quantum circuits.
To explain the quantum algorithms.
To learn about quantum computational complexity.
UNIT I FOUNDATION 9
Overview of traditional computing – Church-Turing thesis – circuit model of computation – reversible
computation – quantum physics – quantum physics and computation – Dirac notation and Hilbert
Spaces – dual vectors – operators – the spectral theorem – functions of operators – tensor products
– Schmidt decomposition theorem.
UNIT II QUBITS AND QUANTUM MODEL OF COMPUTATION 9
State of a quantum system – time evolution of a closed system – composite systems – measurement
– mixed states and general quantum operations – quantum circuit model – quantum gates –universal
sets of quantum gates – unitary transformations – quantum circuits.
UNIT III QUANTUM ALGORITHMS – I 9
Superdense coding – quantum teleportation – applications of teleportation – probabilistic versus
quantum algorithms – phase kick-back – the Deutsch algorithm – the Deutsch- Jozsa algorithm –
Simon's algorithm – Quantum phase estimation and quantum Fourier Transform – eigenvalue
estimation.
UNIT IV QUANTUM ALGORITHMS – II 9
Order-finding problem – eigen value estimation approach to order finding – Shor's algorithm for order
finding – finding discrete logarithms – hidden subgroups – Grover's quantum search algorithm –
amplitude amplification – quantum amplitude estimation – quantum counting – searching without
knowing the success probability.
QUANTUM COMPUTATIONAL COMPLEXITY AND ERROR
UNIT V 9
CORRECTION
Computational complexity – black-box model – lower bounds for searching – general black-box
lower bounds – polynomial method – block sensitivity – adversary methods – classical error
correction –classical three-bit code – fault tolerance – quantum error correction – three- and nine-
qubit quantum codes – fault-tolerant quantum computation.
TOTAL: 45 Periods
139
COURSE OUTCOMES:
After the successful completion of this course, the student will be able to
Explain the fundamental concepts of quantum computing. (Understand)
Develop quantum logic gate circuits (Apply)
Develop quantum algorithms. (Apply)
Solve order finding problem. (Apply)
Solve Error correcting mechanism for quantum computing. (Apply)
Evaluate the main sources of error that can occur during quantum computation(Evaluate)
TEXT BOOKS:
1. P. Kaye, R. Laflamme, and M. Mosca, “An introduction to Quantum Computing”,
OxfordUniversity Press, 1999.
2. Michael A. Nielsen, Isaac L. Chuang,Cambridge,”Quantum Computation and
QuantumInformation”, University press,2010.
REFERENCE BOOKS:
1. V. Sahni, “Quantum Computing”, Tata McGraw-Hill Publishing Company, 2007.
2. AnirbanPathank,” Elements of Quantum Computation and QuantumCommunication”,CRC
Press,2013.
3. Eleanor G. Rieffel and Wolfgang H. Polak,” Quantum Computing:A Gentle Introduction”,
MIT press,2011.
4. Dan.C.Marinescu, Gabriela M. Marinescu,” Approaching Quantum Computing”, Pearson
Publication,2007.
140
19UCS904 INFORMATION THEORY AND CODING L T P C
3 0 0 3
PRE-REQUISITE:
COURSE OBJECTIVES :
The student should be made to:
Understand error–control coding.
Understand encoding and decoding of digital data streams.
Be familiar with the methods for the generation of these codes and their decoding techniques.
Be aware of compression and decompression techniques.
Learn the concepts of multimedia communication.
UNIT I INFORMATION THEORY 9
Information – Entropy, Information rate, classification of codes, Kraft McMillan inequality,
Source coding theorem, Shannon-Fano coding, Huffman coding, Extended Huffman
coding - Joint and conditional entropies, Mutual information - Discrete memoryless
channels – BSC, BEC – Channel capacity, Shannon limit.
UNIT II SOURCE CODING: TEXT, AUDIO AND SPEECH 9
Text: Adaptive Huffman Coding, Arithmetic Coding, LZW algorithm – Audio: Perceptual
coding, Masking techniques, Psychoacoustic model, MEG Audio layers I,II,III, Dolby
AC3 - Speech: Channel Vocoder, Linear Predictive Coding
UNIT III SOURCE CODING: IMAGE AND VIDEO 9
Image and Video Formats – GIF, TIFF, SIF, CIF, QCIF – Image compression: READ,
JPEG – Video Compression: Principles-I,B,P frames, Motion estimation, Motion
compensation, H.261, MPEG standard.
UNIT IV ERROR CONTROL CODING: BLOCK CODES 9
Definitions and Principles: Hamming weight, Hamming distance, Minimum distance
decoding - Single parity codes, Hamming codes, Repetition codes - Linear block codes,
Cyclic codes - Syndrome calculation, Encoder and decoder – CRC
UNIT V ERROR CONTROL CODING: CONVOLUTIONAL CODES 9
Convolutional codes – code tree, trellis, state diagram - Encoding – Decoding: Sequential search and
Viterbi algorithm – Principle of Turbo coding
TOTAL : 45 Periods
COURSE OUTCOMES:
After the successful completion of this course, the student will be able to
Apply the knowledge of information theory and linear algebra in source coding and channel
141
coding to the solution of complex engineering problems. (APPLY)
Apply the knowledge of reduction based coding techniques for text, audio and speech type
of data to the solution of complex engineering problems. (APPLY)
Apply the knowledge of multimedia communication to the solutions for computer applied
complex engineering problems. (APPLY)
Apply the knowledge of complex engineering problems for error detection and correction
techniques. (APPLY)
Apply the knowledge of convolution codes for performance analysis & cyclic codes for error
detection and correction to the solution of complex engineering problems. (APPLY)
Design solutions for computer applied complex engineering problems of BCH & RS codes for
Channel performance improvement against burst errors. (CREATE)
TEXTBOOKS:
REFERENCE BOOKS:
142
EMBEDDED SYSTEMS
19UCS905 L T P C
3 0 0 3
COURSE OBJECTIVES :
UNIT II 9
TYPICAL EMBEDDED SYSTEM
Core of the Embedded System: General Purpose and Domain Specific Processors, ASICs,
PLDs, Commercial Off-The-Shelf Components (COTS),
Memory: ROM, RAM, Memory according to the type of Interface, Memory Shadowing, Memory
selection for Embedded Systems.
UNIT IV COMMUNICATION INTERFACE 9
Reset Circuit, Brown-out Protection Circuit, Oscillator Unit, Real Time Clock, Watchdog Timer,
Embedded Firmware Design Approaches and Development Languages.
TOTAL:45 Periods
143
COURSE OUTCOMES:
After the successful completion of this course, the student will be able to
TEXT BOOK
REFERENCE BOOKS:
144
19UCS906 FAULT TOLERANT COMPUTING L T P C
3 0 0 3
PRE-REQUISITE:NIL
COURSE OBJECTIVES :
The student should be made to:
To understand the error model and its operation
Fault tolerance and architecture
Fault tolerant software
UNIT I INTRODUCTION 9
Fault Prevention -Fault tolerance – anticipated and unanticipated Faults- Test generation for digital
systems- Combinational logic. Network Boolean difference method test generation for sequential
circuits- fault simulation.
UNIT II ERROR MODEL 9
General coding scheme – Parity checking code- arithmetic code – code for computer memories –
checking errors in logical operation – communication coding.
UNIT III FAULT TOLERANCE 9
Coding technique-fault tolerant self-checking and fail safe circuits-fault tolerant in combinatorial and
sequential circuits- synchronous and asynchronous fail safe circuits.
UNIT IV ARCHITECTURE 9
Fault tolerant computers - general purpose commercial systems-fault tolerant multiprocessor and
VLSI based communication architecture.
UNIT V FAULT TOLERANT SOFTWARE 9
Design-N-version programming recovery block - acceptance tests-fault trees- validation of fault
tolerant systems.
TOTAL : 45 Periods
COURSE OUTCOMES:
After the successful completion of this course, the student will be able to
Identify the proper methods for preventing anticipated and unanticipated faults. (Apply)
Select the proper test generation method for sequential circuits. (Apply)
Apply the various coding scheme for computer memories and checking errors. (Apply)
Illustrate the various techniques for fault tolerance in combinatorial and sequential circuits.
(Apply)
Employ various types of architecture model for fault tolerant systems. (apply)
Choose the proper testing methods to validate the fault tolerant system. (Apply)
145
TEXT BOOKS:
1. K.K.Pradhan, “Fault Tolerant computing theory and techniques” volume III. Prentice
Hall, 1989
2. Anderson and Lee, “Fault Tolerant principles and practice”, PHI 1989.
REFERENCE BOOKS:
1. Paragon K. Lala, “Fault Tolerant and Fault Testable, Hardware design” PHI 1985.
2. LALA, “Digital systems design using PLD’s “,PHI 1990.
3. N. N. Biswas, “Logic Design theory”, PHI 1990.
4. Shem, toy Levei , Ashok K.Agarwala , “Fault Tolerant System design”, Tata McGraw
Hill, 1994
146
19UCS907 ADHOC AND SENSOR NETWORKS L T P C
3 0 0 3
COURSE OBJECTIVES :
To study the protocols and the functionalities of ad hoc networks
To understand various applications developed based on ad hoc networking
To know about sensor networks
To learn about the security issues in ad hoc and sensor networks
UNIT I INTRODUCTION AND MAC PROTOCOLS 9
Cellular and Ad-hoc Networks – Issues and Challenges in Ad-hoc Networks - Design Issues and
Design Goals of MAC protocols for Ad-hoc Networks - Classification of MAC protocols - Contention
Based Protocols – Power-Aware MAC Protocols – Reservation and Scheduling Mechanisms - Other
Protocols.
UNIT II ROUTING PROTOCOLS 9
Design Issues and Classification of Unicast and Multicast Routing Protocols - Proactive, Reactive
and Hybrid Routing Protocols – Tree Based and Mesh Based Multicast Protocols, Energy Efficient
and QoS Guaranteed Multicast Protocols.
UNIT III TRANSPORT LAYER AND SECURITY ISSUES 9
Design Issues, Design Goals and Classification of Transport Layer Protocols – TCP over Ad Hoc –
Security in Ad-hoc Networks – Network Security Requirements – Network Security Attacks – Key
Management – Secure Routing in Ad-hoc Networks.
UNIT IV MAC AND ROUTING IN WIRELESS SENSOR NETWORKS 9
Unique Constraints and Challenges – Advantages and Applications – Collaborative Processing –
Key Definitions – Localization and Tracking – MAC – Contention – Based Protocols – Schedule –
Based Protocols, Geographic, Energy Aware and Attribute Based Routing.
UNIT V TRANSPORT, QoS AND SECURITY IN WIRELESS SENSOR
9
NETWORKS
Data-centric and Contention-Based Networking – Transport Layer and QoS in Wireless Sensor
Networks – Broadcast Authentication WSN protocols – TESLA – Biba – Sensor Network Security
Protocols
TOTAL: 45 Periods
COURSE OUTCOMES:
147
After the successful completion of this course, the student will be able to
Identify and mitigate the design issues involved in MAC protocols. [Apply]
Select the proper mechanism that are involved in Contention based protocols. [Apply]
Apply the proper routing protocols in Ad-hoc networks. [Apply]
Illustrate the various functionalities of transport layer and security issues in Ad-hoc networks.
[Apply]
Employ various types of routing techniques that involved in wireless sensor networks. [Apply]
Choose the proper security measures to manage the QoS in wireless sensor networks.
[Apply]
TEXT BOOKS:
1. C. Siva Ram Murthy and B.S. Manoj, ―Ad Hoc Wireless Networks – Architectures and
Protocols‖, Pearson Education, Second Edition, 2005.
2. Feng Zhao and Leonidas Guibas, ―Wireless Sensor Networks – An Information Processing
Approach‖, Elsevier Publications, 2004.
REFERENCES:
1. Subir Kumar Sarkar, T G Basavaraju and C Puttamadappa, ―Ad Hoc Mobile Wireless
Networks‖, Auerbach Publications, 2008.
2. Holger Karl and Andreas Willig, ―Protocols and Architectures for Wireless Sensor Networks‖,
John Wiley and Sons, 2009.
3. Erdal Cayirci and Chunming Rong, ―Security in Wireless Ad Hoc and Sensor Networks‖, John
Wiley and Sons, 2009.
4. C.K. Toh, ―Adhoc Mobile Wireless Networks – Protocols and Systems‖, Pearson Education,
First Edition, 2002.
5. George Aggelou, ―Mobile Adhoc Networks – From Wireless LANs to 4G Networks‖, Tata
McGraw Hill, 2009.
148
19UCS908 COMPUTER GRAPHICS L T P C
3 0 0 3
PRE-REQUISITE: Introduction to Computer Graphics and Problem Solving
COURSE OBJECTIVES :
To Study the Two Dimensional Transformations and Viewing.
To impart the knowledge of 3D geometric Transformations and Viewing
To know about the Illumination Models and Self Similarity.
To acquire the knowledge of Color Models
To design 2D and 3D Animations
149
COURSE OUTCOMES:
After the successful completion of this course, the student will be able to
Apply 2D transformations to get desired 2D Object.[Apply]
Apply 3D transformations to obtain desired 3D object.[Apply]
Apply appropriate Illumination Models based on the object[Apply]
Create Fractals using Geometric Methods[Apply]
Choose appropriate Color Models to apply 2D/3D image based on the given object[Apply]
Use Animations to create interactive graphics.[Apply]
Text Books
1. Donald Hearn and M.Pauline Baker, “Computer Graphics”, 2nd Edition, Pearson Education,
Prentice Hall,2004.
2. C. Foley, VanDam, Feiner and Hughes, “Computer Graphics Principles & Practice and
Practice in C”, 2nd Edition, Pearson Education, 2003, ISBN 81 – 7808 – 038 – 9.
REFERENCES BOOK:
1. W. M. Newman, R. F. Sproull– “Principles of Interactive computer Graphics” – 2nd Edition,
1997, Tata MCGraw Hill.
2. Donald Hearn and M Pauline Baker“Computer Graphics with OpenGL”, 4th Edition, 2013,
Pearson education.
150
19UCS909 DATA MINING L T P C
3 0 0 3
COURSE OBJECTIVES :
To impart the knowledge about the basics of data mining , data mining functionalities, and
Preprocessing concepts.
To analyze and implement the Association Rules for analyzing the Transactional Databases
To Study and Implement the major Classification and Clustering Algorithms
To Study the advanced data mining concepts.
Introduction: Motivation and Importance of Data Mining - Data Mining - Kind of Data to be mined -
Data Mining Functionalities - Kind of patterns to be mined - Classification of Data Mining Systems -
Integration of a Data Mining System with a Database - Major Issues in Data Mining.
Data Pre-processing: The need for Preprocessing - Data Cleaning - Data Integration and
Transformation - Data Reduction - Data Discretization and Concept Hierarchy Generation.
Association Rules: problems Definition - Frequent Item Set Generation - The APRIORI Principle -
Support and Confidence Measures - Association Rule Generation - APRIOIRI Algorithm - The
Partition Algorithms - FP - Growth Algorithms - Compact Representation of Frequent Item set -
Maximal Frequent Item Set - Closed Frequent Item Sets.
UNIT III DATA CLASSIFICATION 8
Classification: Problem Definition - Evaluation of classifiers - Classification Techniques, Decision
Selecting the Best Split - Algorithm for Decision tree Induction - Naive Bayes Classifier - Bayesian
Belief Networks – K - Nearest neighbor classification.
UNIT IV CLUSTERING OF DATA 8
Cluster Analysis - Types of Data – Categorization of Major Clustering Methods – K- means–
Partitioning Methods – Hierarchical Methods - Density-Based Methods –Grid Based Methods –
Model-Based Clustering Methods – Clustering High Dimensional Data - Constraint – Based Cluster
Analysis – Outlier Analysis
UNIT V ADVANCED MINING AND ITS APPLICATIONS 8
Advanced Mining: Multimedia Data Mining - Text Mining - Mining the World Wide Web -Data
Mining Applications - Social Impacts of Data Mining.
COURSE OUTCOMES:
After the successful completion of this course, the student will be able to
151
Experiment with various data preprocessing techniques to solve data redundancy. (Apply)
Make use of different patterns of data in data mining system to analyze the database.(Apply)
Analyze the basic functionalities of data mining in order to apply it to real world scenario
(Analyze)
Implement Association Rules for analyzing Transactional databases.(Apply)
Implement major Classification And Clustering Algorithms on various databases.(Apply)
Analyze various Data mining techniques in real time problems.(Analyze)
TEXT BOOK:
REFERENCE BOOKS:
1. Data Mining Techniques, 3rd Edition ,Arun K Pujari,Universities Press.
2. Data Warehouse Fundamentals, PualrajPonnaiah, Wiley Student Edition.
3. Data Mining, VikaramPudi, P Radha Krishna, Oxford University Press
152
19UCS910 NEURAL NETWORKS AND DEEP LEARNING L T P C
3 0 0 3
PRE-REQUISTE: Machine Learning, Artificial Intelligence
COURSE OBJECTIVES :
The student should be made to:
To understand the concepts of neural networks and Artificial neural networks.
To understand convolutional networks and sequence modeling.
To study probabilistic models and auto encoders.
To expose the students to various deep generative models.
To study the various applications of deep learning.
UNIT I INTRODUCTION TO NEURAL NETWORKS 9
Introduction, Humans and Computers, Organization of the Brain, Biological
Neuron, Biological and Artificial Neuron Models, Characteristics of ANN,
McCulloch-Pitts Model, Historical Developments, Potential Applications of ANN.
UNIT II ESSENTIALS OF ARTIFICIAL NEURAL NETWORKS 9
Artificial Neuron Model, Operations of Artificial Neuron, Types of Neuron
Activation Function, ANN Architectures, Classification Taxonomy of ANN –
Connectivity, Learning Strategy (Supervised, Unsupervised, Reinforcement),
Learning Rules.
UNIT III CONVOLUTIONAL NETWORKS AND SEQUENCE MODELLING 9
Introduction to Deep leaning - Convolutional Networks – Convolution operation – Motivation Pooling
– Basic Convolution function – Algorithms – Recurrent and recursive nets : Recurrent neural
networks – Bidirectional RNN – Recursive Neural networks – Auto regressive networks – Long term
dependencies – Temporal dependencies – Approximate search.
UNIT IV PROBABILISTIC MODELS AND AUTO ENCODERS 9
Structured Probabilistic models : Challenges of unstructured modelling – using graphs to describe
model structure – Learning about dependencies – inference – Deep learning approach – Monte carlo
models – Linear Factor models and Auto encoders
UNIT V DEEP GENERATIVE MODELS AND APPLICATIONS 9
Restricted Boltzmann Machines – Deep Belief networks – Deep Boltzmann machine – Convolutional
Boltzmann machine- Speech, Audio and Music processing – Language modelling and Natural
language processing – information retrieval – object recognition and computer vision – Multi modal
and multi task learning
TOTAL : 45 Periods
COURSE OUTCOMES:
153
After the successful completion of this course, the student will be able to
Apply the knowledge of neural network for an application to the solution of complex
engineering problems. (Apply)
Apply the knowledge of Supervised learning and unsupervised learning to the solution of
complex engineering problems. (Apply)
Apply the knowledge of complex engineering problems for convolutional networks and
sequence modelling techniques. (Apply)
Apply the knowledge of probabilistic models and auto encoders for computer applied
complex engineering problems. (Apply)
Apply the knowledge of deep generative models for problem solving of complex engineering
problems. (Apply)
Design solutions for computer applied complex engineering problems of deep learning
algorithms and solve real-world problems. (Create)
TEXT BOOKS:
REFERENCE BOOKS:
154
19UCS911 SPEECH AND NATURAL LANGUAGE PROCESSING L T P C
3 0 0 3
PRE-REQUISITE:
COURSE OBJECTIVES :
Origins and challenges of NLP – Language Modeling: Grammar-based LM, Statistical LM – Regular
Expressions, Finite-State Automata – English Morphology, Transducers for lexicon and rules,
Tokenization, Detecting and Correcting Spelling Errors, Minimum Edit Distance
Unsmoothed N-grams, Evaluating N-grams, Smoothing, Interpolation and Backoff – Word Classes,
Part-of-Speech Tagging, Rule-based, Stochastic and Transformation-based tagging, Issues in PoS
tagging – Hidden Markov and Maximum Entropy models.
Context-Free Grammars, Grammar rules for English, Treebanks, Normal Forms for grammar –
Dependency Grammar – Syntactic Parsing, Ambiguity, Dynamic Programming parsing – Shallow
parsing – Probabilistic CFG, Probabilistic CYK, Probabilistic Lexicalized CFGs – Feature structures,
Unification of feature structures.
155
Discourse segmentation, Coherence – Reference Phenomena, Anaphora Resolution using Hobbs
and Centering Algorithm – Coreference Resolution – Resources: Porter Stemmer, Lemmatizer, Penn
Treebank, Brill’s Tagger, WordNet, PropBank, FrameNet, Brown Corpus, British National Corpus
(BNC)
TOTAL:45Periods
COURSE OUTCOMES:
After the successful completion of this course, the student will be able to
Design a tag set to be used for statistical processing for real-time applications(Apply)
2. Steven Bird, Ewan Klein and Edward Loper, ―Natural Language Processing with
Python, First Edition, OReilly Media, 2009.
REFERENCE BOOKS:
1. Breck Baldwin, ―Language Processing with Java and LingPipe Cookbook, Atlantic
Publisher, 2015.
2. Richard M Reese, ―Natural Language Processing with Java, OReilly Media, 2015.
156
19UCS912 DATA ANALYTICS L T P C
3 0 0 3
PRE-REQUISITE: Database Management Systems
COURSE OBJECTIVES :
The Student should be made to:
Be exposed to big data
Learn the different ways of Data Analysis
Be familiar with data streams
Learn the mining and clustering
Be familiar with the visualization
UNIT I INTRODUCTION 9
Introduction to Big Data Platform – Challenges of conventional systems - Web data – Evolution of
Analytic scalability, analytic processes and tools, Analysis vs reporting - Modern data analytic tools,
Data management and indexing, Measures of central tendency, Measures of location of dispersions.
157
Projects : Understanding business scenarios, Feature engineering and visualization.
TOTAL:45 Periods
COURSE OUTCOMES:
After the successful completion of this course, the student will be able to
Apply fundamental algorithmic ideas to process data (Apply)
Apply the analytic algorithms to solve problems. (Apply)
Apply stream data model in real time applications. (Apply)
Apply data mining techniques for analyzing the big data applications (Apply)
Handle large scale analytics projects using different frameworks (Create)
Build a complete business data analytics solution (Create)
TEXT BOOKS:
1. Michael Berthold, David J. Hand, Intelligent Data Analysis, Springer, 2007.
2. AnandRajaraman and Jeffrey David Ullman, Mining of Massive Datasets,Cambridge University
Press, 2012.
REFERENCE BOOKS:
1. Bill Franks, Taming the Big Data Tidal Wave: Finding Opportunities in Huge Data Streams with
advanced analystics, John Wiley & sons, 2012.
2. Glenn J. Myatt, Making Sense of Data, John Wiley & Sons, 2007 Pete Warden, Big Data
Glossary, O‟ Reilly, 2011.
3. Jiawei Han, MichelineKamber “Data Mining Concepts and Techniques”, Second Edition,
Elsevier, Reprinted 2008.
158
19UCS913 INFORMATION RETRIEVAL L T P C
3 0 0 3
COURSE OBJECTIVES :
Boolean and vector-space retrieval models- Term weighting - TF-IDF weighting-Language Model
based IR - Probabilistic IR – Relevance feedback and query expansion.
UNIT III WEB SEARCH ENGINE – CRAWLING AND INDEXING 9
Web search overview, web structure, search engine – Web Search Engine Architecture - crawling
the web-crawling Documents and email- web indexes –- Index Compression-Index Construction.
UNIT IV WEB SEARCH – LINK ANALYSIS 9
Link Analysis –hubs and authorities – Page Rank algorithms -Searching and Ranking-Queries and
users-Static ranking-Dynamic ranking-Evaluating web search.
UNIT V DOCUMENT TEXT MINING 9
Text Mining -Text classification and clustering - Categorization algorithms: naive Bayes and nearest
neighbor – Clustering algorithms: Flat Clustering-Clustering in information retrieval; k-means; Model
based Clustering.
TOTAL:45 Periods
COURSE OUTCOMES:
After the successful completion of this course, the student will be able to
159
Identify the suitable Information Retrieval models for retrieving the Data for a given Application
(Apply)
Apply Crawling and Indexing Techniques to search web pages. (Apply)
Apply Link Analysis and Ranking in web search for the effective Document Retrieval. (Apply)
Apply Document Text Mining Technique for Categorizing the Documents. (Apply)
TEXT BOOKS:
REFERENCE BOOKS:
160
19UCS914 EXPERT SYSTEMS L T P C
3 0 0 3
PRE-REQUISITE:
COURSE OBJECTIVES :
Develop abilities to apply, build and modify decision models to solve real problems
Explore the issues involved in the design and development of Expert Systems and discuss
the role these systems play in the business environment.
UNIT I INTRODUCTION 9
The meaning of an expert system, problem domain and knowledge domain, the advantages of an
expert system, general stages in the development of an expert system, general characteristics of an
expert system, history and uses of expert systems today, rule-based expert systems, procedural and
nonprocedural paradigms, characteristics of artificial neural systems. -The study of logic, difference
between formal logic and informal logic, meaning of knowledge, how knowledge can be represented,
semantic nets, how to translate semantic nets into PROLOG, limitations of semantic nets, schemas,
frames and their limitations, how to use logic and set symbols to represent knowledge, the meaning
of propositional and first order predicate logic, quantifiers, imitations of propositional and predicate
logic.
UNIT II METHODS OF INFERENCE 9
Trees, lattices, and graphs, state and problem spaces, AND-OR trees and goals, methods of
inference, rules of inference, limitations of propositional logic, logic systems, resolution rule of
inference, resolution systems, and deduction, shallow and causal reasoning, applying resolution to
first-order predicate logic, forward and backward chaining, additional methods of reference, Meta
knowledge, the Markov decision process
The meaning of uncertainty and theories devised to deal with it, types of errors attributed to
uncertainty, errors associate, with induction, features of classical probability, experimental and
subjective probabilities, compound and conditional probabilities, hypothetical reasoning and
backward induction, temporal reasoning, Markov chains, odds of belief, sufficiency and necessity,
role of uncertainty in inference chains, implications of combining evidence, role of inference nets in
161
expert systems, how probabilities are propagated.
Sources of uncertainty in rules, methods of dealing with uncertainty, Dempster-Shafer theory, theory
of uncertainty based on fuzzy logic, commercial applications of fuzzy logic. How to select an
appropriate problem, the stages in the development of an expert system, types of errors to expect in
the development stages, the role of the knowledge engineer in the building of expert systems, the
expected life cycle of an expert system, how to do a life cycle model.
Information management, Hospitals and medical facilities, Help desks management, Employee
performance evaluation, Loan analysis, Virus detection, Useful for repair and maintenance projects,
Warehouse optimization, Planning and scheduling, The configuration of manufactured objects,
Financial decision making Knowledge publishing, Process monitoring and control, Supervise the
operation of the plant and controller, Stock market trading, Airline scheduling & cargo schedules
TOTAL:45Periods
COURSE OUTCOMES:
After the successful completion of this course, the student will be able to
TEXT BOOKS:
1. J. Giarratano and G. Riley, "Expert Systems -- Principles and Programming". 4th Edition, PWS
Publishing Company, 2004.
162
REFERENCE BOOKS:
1.Elias M. Awad, Building Expert Systems, West Publishing Company 1996 B.Tech (Computer
Science and Engineering) Syllabus for Admission Batch 2015-16 8 th Semester
3. Gonzalez and D. Dankel, "The Engineering of Knowledge-Based Systems'', Prentice Hall, 1994.
4.Nikolopoulos, "Expert Systems", Marcel Dekker Inc. 1997. ISBN 0 8247 9927 5
163
19UCS915 IMAGE PROCESSING L T P C
3 0 0 3
PRE-REQUISITE:
COURSE OBJECTIVES :
To introduce the various Image Processing Techniques and their applications
To study the Spatial and Frequency domains for image enhancement
To familiarize the methods of Compression methodologies in digital Images.
To acquire the knowledge of segmentation in digital Images.
To study the methods of Morphological Operations
TOTAL: 45 Periods
COURSE OUTCOMES:
164
After the successful completion of this course, the student will be able to
Explain the fundamental concepts in Digital Image Processing [Understand]
Apply spatial domain processing in digital images.[Apply]
Apply Frequency domain processing in digital Images.[Apply]
Compute appropriate Compression methods for Digital Images[Apply]
Employ segmentation algorithms to segment the images.[Apply]
Compute Morphological Operations in given image for image enhancement[Apply]
TEXT BOOKS
1.R.C. Gonzalez, R.E. Woods; Digital Image Processing (2nd edition), Prentice Hall, 2002,
ISBN 0201180758.
REFERENCES BOOK:
1. R. D. Boyle, R. C. Thomas; Computer vision : a first course, Blackwell Scientific, 1988, ISBN
0632015772.
2.C. R. Giardina, E. R. Dougherty. Morphological Methods in Image and Signal
Processing. Prentice-Hall, Englewood Cliffs, New Jersey, 1988.
165
19UCS916 INTRODUCTION TO DIGITAL SIGNAL PROCESSING L T P C
3 0 0 3
PRE-REQUISITE:
COURS E OBJECTIVES :
Basic elements of DSP – concepts of frequency in Analog and Digital Signals – sampling theorem –
Discrete – time signals, systems – Analysis of discrete time LTI systems – Z transform – Convolution
– Correlation.
UNIT II FREQUENCY TRANSFORMATIONS 9
Introduction to DFT – Properties of DFT – Circular Convolution - Filtering methods based on DFT –
FFT Algorithms - Decimation – in – time Algorithms, Decimation – in – frequency Algorithms – Use of
FFT in Linear Filtering – DCT – Use and Application of DCT.
UNIT III IIR FILTER DESIGN 9
.
Structures of IIR – Analog filter design – Discrete time IIR filter from analog filter – IIR filter design by
Impulse Invariance, Bilinear transformation, Approximation of derivatives – (LPF, HPF, BPF,
BRF) filter design using frequency translation.
UNIT IV FIR FILTER DESIGN 9
Structures of FIR – Linear phase FIR filter – Fourier Series - Filter design using windowing
techniques (Rectangular Window, Hamming Window, Hanning Window), Frequency sampling
techniques
UNIT V FINITE WORD LENGTH EFFECTS IN DIGITAL FILTERS 9
Binary fixed point and floating point number representations – Comparison - Quantization
noise – truncation and rounding – quantization noise power- input quantization error- coefficient
quantization error – limit cycle oscillations-dead band- Overflow error-signal scaling.
166
TOTAL:45 Periods
COURSE OUTCOMES:
After the successful completion of this course, the student will be able to
Analyze the perform of frequency transforms for the signals.
Design IIR and FIR filters.
. Employ signal processing strategies at multidisciplinary team activities.
TEXT BOOK:
1. John G. Proakis and Dimitris G.Manolakis, “Digital Signal Processing – Principles,
Algorithms Applications”, Fourth Edition, Pearson Education, Prentice Hall, 2007.
REFERENCES:
1. Emmanuel C.Ifeachor, and Barrie.W.Jervis, “Digital Signal Processing”, Second Edition,
Pearson Education, Prentice Hall, 2002.
2. Sanjit K. Mitra, “Digital Signal Processing – A Computer Based Approach”, Third Edition,
Tata Mc Graw Hill, 2007.
3. A.V.Oppenheim, R.W. Schafer and J.R. Buck, Discrete-Time Signal Processing, 8th
Indian Reprint, Pearson, 2004.
4. Andreas Antoniou, “Digital Signal Processing”, Tata McGraw Hill, 2006.
167
19UCS917 HUMAN COMPUTER INTERACTION L T P C
3 0 0 3
PRE-REQUISITE:
COURS E OBJECTIVES :
The Human: I/O channels – Memory – Reasoning and problem solving; The computer: Devices
– Memory – processing and networks; Interaction: Models – frameworks – Ergonomics – styles
– elements – interactivity- Paradigms.
UNIT II DESIGN & SOFTWARE PROCESS 9
Interactive Design basics – process – scenarios – navigation – screen design – Iteration and
prototyping. HCI in software process – software life cycle – usability engineering – Prototyping in
practice – design rationale. Design rules – principles, standards, guidelines, rules. Evaluation
Techniques – Universal Design.
Designing Web Interfaces – Drag & Drop, Direct Selection, Contextual Tools, Overlays, Inlays
and Virtual Pages, Process Flow. Case Studies.
TOTAL:45Periods
COURSE OUTCOMES:
After the successful completion of this course, the student will be able to
Design effective dialog for HCI(Apply)
Implement effective HCI software process for real time entities. (Apply)
Practice a variety of simple methods for evaluating the quality of a user interface.( Apply)
Develop user interface for mobile applications. (Create)
Apply appropriate HCI techniques to design systems that are usable by people. ( Apply)
Design interface for web based applications. (Create)
168
TEXT BOOKS:
1. Alan Dix, Janet Finlay, Gregory Abowd, Russell Beale, “Human Computer
Interaction”, 3rd Edition, Pearson Education, 2004(UNIT I,II&III).
2. Brian Fling, “Mobile Design and Development”, First Edition , O’Reilly Media Inc.,2009(UNIT–
IV).
3. Bill Scott and Theresa Neil, “Designing Web Interfaces”, First Edition, O’Reilly, 2009.(UNIT-V).
REFERENCE BOOKS:
1. Ben Shneiderman and Catherine Plaisant, Designing the User Interface: Strategies
forEffective Human-Computer Interaction (5th Edition), 5th ed., Pearson AddisonWesley,2009.
2. Donald A. Norman, The Design of Everyday Things, Basic Books, 2002.
3. Alan Cooper, About Face 3: The Essentials of Interaction Design, 3rd edition, Wiley 2007.
4. Jenny Preece, Yvonne Rogers, and Helen Sharp: Interaction Design: Beyond Human-
Computer Interaction, 3nd ed., Wiley, 2011.
169
19UCS918 BLOCKCHAIN TECHNOLOGY L T P C
3 0 0 3
PRE-REQUISITE:
COURSE OBJECTIVES:
History of Money – Dawn of Bitcoin – The Bitcoin Blockchain – The Bitcoin Network – Bitcoin Scripts
– Full Nodes vs SPVs – Bitcoin Wallets
From Bitcoin to Ethereum – Ethereum Blockchain – Merkle Patricia Tree – RLP Encoding –
Ethereum Transaction and Message Structure – State Transaction Function – Gas and Transaction
Cost – Smart Contracts – Ethereum Virtual Machine – Ethereum Ecosystem : Swarm – Whisper –
DApp – Development Components.
170
adoption, Hyperledger, Corda, Example Enterprise Applications.
DApp – Setting up a Private Ethereum Network: Install go-etherum – Create geth Data directory –
Create a geth account – create genesis.json configuration File – Run the first Node of the Private
Network – Run the second node of the Network – Creating Smart Contract – Deploying the Smart
Contract – Client Application
TOTAL:45Periods
COURSE OUTCOMES:
After the successful completion of this course, the student will be able to
TEXT BOOKS:
REFERENCE BOOKS:
1. The Truth Machine – The Blockchain and the Future of Everything, Authors: Michael J.
Casey and Paul Vigna, St.Martin’s Press
2. Mastering Bitcoin – Programming the Open Blockchain, Author: Andreas M.
Antonopoulos, O’Reilly Publication
171
19UCS919 CYBER SECURITY L T P C
3 0 0 3
PRE-REQUISITE: Basic Knowledge of Computers, Networking and Internet and Windows
Operating System.
COURSE OBJECTIVES :
The Student should be made to:
The course has been designed to give students an extensive overview of cyber security
issues, tools and techniques that are critical in solving problems in cyber security domains.
To provide the concepts of computer security, cryptography, digital money, secure protocols,
detection and other security techniques.
Identify the various essential techniques, control mechanisms in protecting Information
Systems, IT infrastructure, analysing and monitoring potential threats, attacks and
implementing security solutions.
Become Knowledgeable about the best practices related to cyber security, regulations and
laws associated with the same.
The students will also have a wider perspective to information security from national security
perspective from both technology and legal perspective.
UNIT I INTRODUCTION TO CYBER SECURITY CONCEPTS 9
Introduction to Information Systems, Types of Information Systems, Development of Information
Systems, Introduction to Information Security, Need for Information Security.
Essential Terminologies: CIA, Risks, Breaches, Threats, Attacks, Exploits. Information Gathering
(Social Engineering, Foot Printing & Scanning),Threats to Information Systems, Information
Assurance, Cyber Security, and Security Risk Analysis.
Open Source/ Free/ Trial Tools: nmap, zenmap, Port Scanners, Network scanners.
172
Management and Audits, Vulnerabilities and Attacks. Intrusion detection and Prevention Techniques,
Host based Intrusion prevention Systems, Security Information Management, Network Session
Analysis, System Integrity Validation.
Open Source/ Free/ Trial Tools: DOS Attacks, DDOS attacks, Wireshark, Cain &abel, iptables/
Windows Firewall, snort, suricata, fail2ban.
Introduction, Cyber Security Regulations, Roles of International Law, the state and Private Sector in
Cyberspace, Cyber Security Standards. The INDIAN Cyberspace, National Cyber Security Policy
2013. Introduction to Cyber Forensics, Need of Cyber Forensics, Cyber Evidence, Documentation
and Management of Crime Sense, Image Capturing and its importance, Partial Volume Image, Web
Attack Investigations, Denial of Service Investigations, Internet Crime Investigations, Internet
Forensics, Steps for Investigating Internet Crime, Email Crime Investigations.
Open Source/ Free/ Trial Tools: Case Studies related to Cyber Law, Common Forensic Tools like
dd, md5sum, sha1sum, Ram dump analysis, USB device
UNIT V SECURITY IN EVOLVING TECHNOLOGY 9
Biometrics, Mobile Computing and Hardening on android and ios, IOT Security, Web server
configuration and Security. Introduction, Basic security for HTTP Applications and Services, Basic
Security for Web Services like SOAP, REST etc., Identity Management and Web Services,
Authorization Patterns, Security Considerations, Challenges.
Open Source/ Free/ Trial Tools: adb for android, xcode for ios, Implementation of REST/ SOAP web
services and Security implementations.
TOTAL:45 Periods
COURSE OUTCOMES:
After the successful completion of this course, the student will be able to
Explain the basic and advanced cyber securities information system. (Understand)
Apply the cyber security operations (technologies) to simulate different applications,
security practices and System security standards. (Apply)
Apply cyber security threats and vulnerabilities in Information Systems and security
measures to real time scenarios. (Apply)
Analyze and resolve cyber security issues in networks and computer systems to
secure an IT infrastructure. (Analyze)
Develop cyber policies and procedures to manage enterprise cyber security risks and
communicate the human role in security systems. (Create)
Work individually or in teams and demonstrate the solutions to the given exercises
through cyber security tools. (Affective Domain)
TEXT BOOKS:
1. William Stallings, “Cryptography and Network Security”, Pearson Education/PHI, 2006.
2. V.K. Jain, “Cryptography and Network Security”, Khanna Publishing House.
173
3. Gupta Sarika, “Information and Cyber Security”, Khanna Publishing House, Delhi.
4. Charles P. Pfleeger, Shari LawerancePfleeger, “Analysing Computer Security”, Pearson
Education India.
5. AtulKahate, “Cryptography and Network Security”, McGraw Hill.
REFERENCE BOOKS:
1. V.K.Pachghare, “Cryptography and information Security”, PHI Learning Private Limited,
Delhi India.
2. V.K. Jain, “Cryptography and Network Security”, Khanna Publishing House.
3. Nina Godbole, “Information System Security”, Wiley
4. Bothra Harsh, “Hacking”, Khanna Publishing House, Delhi.
5. Sarika Gupta &Gaurav Gupta, Information Security and Cyber Laws, Khanna Publishing
House
6. AnshulKaushik, Cyber Security, Khanna Publishing House
7. Dr.SuryaPrakashTripathi, RitendraGoyal, Praveen Kumar Shukla ,”Introduction to
Information Security and Cyber Law” Willey Dreamtech Press.
8. Mike Chapple and David Seidl "Cyberwarfare: Information operations in a connected world"
Jones & Bartlett Learning
9. CHANDER, HARISH,” Cyber Laws And It Protection ” , PHI Learning Private Limited ,Delhi
10. http://www.ignou.ac.in/upload/Announcement/programmedetails.pdf
3 0 0 3
174
COURSE OBJECTIVES :
After the successful completion of this course, the student will be able to
175
Apply debugging techniques in multithreaded applications.(Apply)
TEXT BOOKS:
19UCS921 L T P C
INFORMATION STORAGE MANAGEMENT
3 0 0 3
PRE-REQUISITES:
176
COURSE OBJECTIVES :
Evaluate storage architecture; understand logical and physical components of
Storage Infrastructure including storage subsystems.
Describe storage networking technologies such as FC-SAN, NAS, IP-SAN anddata archival
solution.
To impart the knowledge of Backup and Archive in virtualized and non-virtualized environment
UNIT I STORAGE SYSTEMS AND DATA CENTER ENVIRONMENT 9
Introduction to information storage - evolution of storage architecture-Data Center Infrastructure Core
element of a Data center, key data center elements, Managing a Datacenter , virtualization, and cloud
computing - Data center environment - Details key data center elements – host (or
compute),connectivity, storage, VMware ESXI-RAID - RAID implementation methods, techniques, and
levels - Intelligent storage system - Details components of intelligent storage systems-virtual storage
provisioning –EMC Symmetric and VNX.
UNIT II STORAGE NETWORKING TECHNOLOGIES 9
Fiber Channel Storage Area Network (FC SAN) - FC SAN components, connectivity, protocol stack and
Zoning and Topologies-IP SAN and FCoE -iSCSI components, Host Connectivity and Topologies and
Protocol Stack-Network Attached Storage (NAS) – File Systems and Network File sharing technology,
Components of NAS,NAS Implementations, NAS File Sharing Protocols-EMC VNX Gateway.
UNIT III BACKUP, ARCHIVE MANAGEMENT 9
Introduction to Business Continuity - information availability and business continuity solutions in both
virtualized and non-virtualized environments. Backup and Archive - Backup and recovery in both
virtualized and non-virtualized environments – De duplication technology to optimize data backups
along with archival solutions to address fixed content storage requirements.
UNIT IV REPLICATION TECHNOLOGIES 9
Local Replication - Local replications of data along with data restore and restart considerations-EMC
Time Finder and EMC Snap View. Remote Replication - Remote replication technologies in virtualized
and non-virtualized environments. Three-site replication and continuous data replication- EMC SRDF,
EMC SAN Copy, and EMC Mirror View
UNIT V SECURING AND MANAGING STORAGE INFRASTRUCTURE 9
Securing the Information Infrastructure - Framework and domains of storage security along with
covering security implementation at storage networking. Security in virtualized and cloud environments-
Managing the Information Infrastructure-threats to a storage infrastructure-storage infrastructure
monitoring and management - storage tiering, information lifecycle management (ILM)-cloud service
management activities-EMC Management Tools-EMC Unisphere-EMC UIM.
TOTAL:45Periods
177
TEXT BOOKS:
1. EMC Corporation, “Information Storage and Management”, Second Edition, May 2012.
Wiley India. ISBN: 978-1-118-09483-9
REFERENCE BOOKS:
3 0 0 3
PRE-REQUISITE: Object Oriented Programming, C Programming
178
COURSE OBJECTIVES :
Upon completion of this course, students will be able
To demonstrate knowledge o Object-Oriented concepts and functional requirements C#.NET
application.
To construct classes, methods and assessors and instantiate objects.
To design and implement database connectivity using ADO.NET in window based
application.
UNIT I OVERVIEW OF .NET 9
Building blocks of .Net platform – Type system - Language specification - Type distinction – Runtime
deployment - .Net aware programming languages - Independent nature of .NET
UNIT II CONCEPTS OF C# 9
Data types – Arrays – Strings - Control Statements - Classes and Objects - this keyword – Static
Keyword - Namespace - Inheritance –Interface and overloading - Polymorphism: Method
Overloading - Operator Overloading – Property – Indexes – Delegates - Exception handling.
UNIT III FILE I/O AND OBJECTS 9
File Operation - File Management Systems - Directory and file types – Programming with file I/O –
Object serialization – Configuration of objects – Serialization mechanisms.
UNIT IV ADO.NET 9
ADO.NET Architecture - ADO.NET - Connected Layer: Data Provider Model - Data Readers - Data
Transaction - Disconnected Layer: Dataset - Data Column- Data RowTable Data.
UNIT V ASP.NET 9
Building ASP.NET web pages – ASP.NET web controls – Master pages – Themes – Web service
Performance- State management: Session data – Cookies.
TOTAL: 45 Periods
COURSE OUTCOMES:
After the successful completion of this course, the student will be able to
Perceive awareness of .NET Environment fundamentals and significant role of .NET in cross
platform.[Understand]
Acquire the working knowledge of C# and apply in simple programming constructs.[Apply]
Analyze the file types and apply the serialization mechanisms in C# for configuration of
objects.[Analyze]
Apply the ADO.NET control to strap the data transactions with .NET application.[Apply]
Construct the web pages using ASP.NET based on intrinsic controls. ( [Apply]
Design and develop profesasional console and window based .NET application.[Analyze]
179
TEXT BOOKS:
1. Andrew Troelsen, ―Pro C# 2010 and the .NET 4 Platform‖, 5 th Edition, APress, 2010
REFERENCE BOOKS:
1. Jesse Liberty, Donald Xie, ―Programming C# 3.0‖, 5 th Edition, O‗Reilly Press, 2008.
3. Herbert Schildt, ―The Complete Reference: C#4.0‖, Tata McGraw Hill, 2012.
4. Thuan Thai, Hoang Q. Lam, ―.NET Framework Essentials‖, 3 rd Edition, O‗Reilly Press, 2003.
180
PRE-REQUISITE:
COURSE OBJECTIVES :
To provide an in-depth introduction to technologies and techniques used in the game industry.
To recognize the processes, mechanics, issues in game design and game engine development.
To integrate various technologies such as multimedia, artificial intelligence and physics engine
into a cohesive, interactive game application.
UNIT I INTRODUCTION TO GAME PROGRAMMING 9
Game engine architecture, Engine support systems, Resource Management and File systems,
Game loop and real-time simulation, Human Interface devices, Collision and rigid body dynamics,
Game profiling.
Graphics Device Management, Tile-Based Graphics and Scrolling, GUI programming for games -
Application layer, Game logic, Game views, managing memory, controlling the main loop, loading
and caching game data, User Interface management, Game event management.
Artificial Intelligence in games, Physics based modeling, Path finding algorithms, Collision detection -
2D and 3D Game development using Flash, DirectX, Java, Python, Game engines - Unity. DX
Studio,
Game design, Differing game types, modes, and perspectives, scripting, audio engineering, Sound
and Music, level design, render threading - Game project management, Game design
documentation, Rapid prototyping and game testing.
TOTAL:45Periods
COURSE OUTCOMES:
181
After the successful completion of this course, the student will be able to
• Explain the basic concept and core architecture of Game Programming (Understand)
• Apply the concept of Graphics, AI and Physics based modeling to construct a game. (Apply)
• Analyze the game mechanics of a given game (Analyze)
• Design the game mechanics of a new game (Create)
• Apply Programming Techniques for different platform and frame work (Apply)
• Test, and evaluate the procedures of the creation, design and development of games.
(Evaluate)
TEXT BOOKS:
1. Game Engine Architecture, 2nd Edition, Jason Gregory, A K Peters, 2014 ISBN
9781466560017.
2. Mike Mc Shaffrfy and David Graham, “Game Coding Complete”, Fourth Edition, Cengage
Learning, PTR, 2012.
3. David H. Eberly, “3D Game Engine Design, Second Edition: A Practical Approach to Real-
Time Computer Graphics” 2 nd Editions, Morgan Kaufmann, 2006.
REFERENCE BOOKS:
1. Ernest Adams and Andrew Rollings, “Fundamentals of Game Design”, 2 nd Edition Prentice
Hall / New Riders, 2009.
3. Jesse Schell, The Art of Game Design: A book of lenses, 1 st Edition, CRC Press, 2008.
182
3 0 0 3
PRE-REQUISITE:
COURSE OBJECTIVES :
To introduce the concepts of Fuzzy set and Fuzzy Relation.
To familiarize the features of Fuzzy membership function and its measures.
To summarize the applications of Fuzzy Logic and Optimization.
To provide comprehensive knowledge of fuzzy logic control to real time systems.
UNIT I INTRODUCTION : FUZZY SETS AND RELATIONS 9
Classical Sets :Operations on Classical Sets, Properties of Classical (Crisp) Sets, Mapping of
Classical Sets to Functions - Fuzzy Sets : Fuzzy Set operations, Properties of Fuzzy Sets.
Crisp Relations: Cardinality of Crisp Relations, Operations on Crisp Relations, Properties of Crisp
Relations, Composition. Fuzzy Relations : Cardinality of Fuzzy Relations, Operations on Fuzzy
Relations, Properties of Fuzzy Relations, Fuzzy Cartesian Product and Composition, Non-interactive
Fuzzy Sets. Tolerance and Equivalence Relations.
UNIT II FUZZY ARITHMETIC AND MEMBERSHIP FUNCTION 9
Lambda-Cuts for Fuzzy Sets, Lambda-Cuts for Fuzzy Relations, Defuzzification Methods Extension
Principle - Crisp Functions, Mapping and Relations, Functions of fuzzy Sets – Extension Principle,
Fuzzy Transform (Mapping), Practical Considerations, Fuzzy Numbers Interval Analysis in
Arithmetic, Approximate Methods of Extension - Vertex method, DSW Algorithm, Restricted DSW
Algorithm, Comparisons, Fuzzy Vectors.
Features of the Membership Function, Standard Forms and Boundaries, Fuzzification, Membership
Value Assignments – Intuition, Inference, Rank Ordering, Angular Fuzzy Sets, Neural Networks,
Genetic Algorithms, Inductive Reasoning.
UNIT III FUZZY DECISION MAKING AND CLASSIFICATION 9
Decision Making:Fuzzy Synthetic Evaluation, Fuzzy Ordering, Preference and consensus,
Multiobjective Decision Making, Fuzzy Bayesian Decision Method, Decision Making under Fuzzy
States and Fuzzy Actions.
Classification by Equivalence Relations - Crisp Relations, Fuzzy Relations. Cluster Analysis, Cluster
Validity, c-Means Clustering - Hard c-Means (HCM), Fuzzy c-Means (FCM). Classification Metric,
Hardening the Fuzzy c-Partition, Similarity Relations from Clustering
UNIT IV FUZZY RULE BASED SYSTEM & PATTERN RECOGNITION 9
Natural Language, Linguistic Hedges, Rule-Based Systems - Canonical Rule Forms, Decomposition
of Compound Rules, Likelihood and Truth Qualification, Aggregation of Fuzzy Rules, Graphical
Techniques of Inference
Fuzzy Pattern Recognition :Feature Analysis -Partitions of the Feature Space -Single-Sample
183
Identification-Multifeature Pattern Recognition -Image Processing .
TEXT BOOKS:
1. Timothy J.Ross “Fuzzy Logic with Engineering Application”,A JohnWilley and Sons Ltd,
Publication,3rd Edition,2010.
2. George Klir and Bo Yuan “Fuzzy Sets and Fuzzy Logic: Theory and Applications”, Prentice
Hall NJ, 1995.
REFERENCE BOOKS:
1. George J. Klir, TinaFolger A., “Fuzzy sets Uncertainty & Information”, PHI Learning Pvt.
Ltd, 2010.
2. Timoty Ross, “Fuzzy Logic with Engineering Applications”, McGraw Hill,4th edition, 2016.
3. Jang J.S.R. Sun C.T & Mizutani E., “Neuro fuzzy and Soft Computing”, PHI Learning Pvt.
Ltd., 2012.
19UCS925 L T P C
MOBILE AND PERVASIVE COMPUTING
184
3 0 0 3
PRE-REQUISITES:
COURSE OBJECTIVES:
To learn the basic architecture and concepts till third generation communication systems
UNIT I INTRODUCTION 9
History – Wireless communications: GSM – DECT – TETRA – UMTS – IMT – 2000 – Blue tooth, Wi-Fi,
WiMAX, 3G,4G, WATM. - Mobile IP protocols -WAP push architecture-Wml scripts and applications.
Data networks – SMS – GPRS – EDGE – Hybrid Wireless100 Networks – ATM – Wireless ATM.
UNIT II OVERVIEW OF A MODERN 4G TELECOMMUNICATIONS SYSTEM 9
Introduction. LTE-A System Architecture. LTE RAN. OFDM Air Interface. Evolved Packet Core. LTE
Requirements. LTE-Advanced. LTE-A in Release. OFDMA – Introduction. OFDM Principles. LTE
Uplink—SC-FDMA. Summary of OFDMA.
UNIT III PERVASIVE CONCEPTS AND ELEMENTS 9
Technology Trend Overview - Pervasive Computing: Concepts - Challenges - Middleware - Context
Awareness - Resource Management - Human–Computer Interaction - Pervasive Transaction
Processing - Infrastructure and Devices - Wireless Networks - Middleware for Pervasive Computing
Systems - Resource Management - User Tracking- Context Management -Service Management - Data
Management - Security Management - Pervasive Computing Environments - Smart Car Space -
Intelligent Campus
UNIT IV HCI IN PERVASIVE COMPUTING 9
Prototype for Application Migration - Prototype for Multimodalities - Human–Computer Interface
inPervasive Environments - HCI Service and Interaction Migration - Context- Driven HCI
ServiceSelection - Interaction Service Selection Overview - User Devices - Service-Oriented
MiddlewareSupport - User History and Preference - Context Manager - Local Service Matching –
GlobalCombination - Effective Region - User Active Scope - Service Combination Selection Algorithm
UNIT V PERVASIVE MOBILE TRANSACTIONS 9
Pervasive Mobile Transactions - Introduction to Pervasive Transactions - Mobile Transaction
Framework - Unavailable Transaction Service - Pervasive Transaction Processing Framework -
Context-Aware Pervasive Transaction Model - Context Model for Pervasive Transaction Processing -
Context-Aware Pervasive Transaction Model - A Case of Pervasive Transactions - Dynamic Transaction
Management - Context-Aware Transaction Coordination Mechanism - Coordination Algorithm for
Pervasive Transactions - Participant Discovery - Formal Transaction Verification - Petri Net with
185
Selective Transition.
TOTAL:45Periods
COURSE OUTCOMES:
After the successful completion of this course, the student will be able to
TEXT BOOKS:
1. Alan Colman, Jun Han, and Muhammad Ashad Kabir, Pervasive Social Computing
Socially-Aware Pervasive Systems and Mobile Applications, Springer, 2016.
2. J. Schiller, ―Mobile Communication‖, Addison Wesley, 2000.
186
19UCS926 BUSINESS INTELLIGENCE AND ITS APPLICATIONS L T P C
3 0 0 3
PRE-REQUISITE:
COURSE OBJECTIVES :
Be exposed with the basic rudiments of business intelligence system
understand the modeling aspects behind Business Intelligence
understand of the business intelligence life cycle and the techniques used in it
Be exposed with different data analysis tools and techniques
UNIT I BUSINESS INTELLIGENCE 9
Effective and timely decisions – Data, information and knowledge – Role of mathematical models –
Business intelligence architectures: Cycle of a business intelligence analysis – Enabling factors in
business intelligence projects – Development of a business intelligence system – Ethics and
business intelligence.
UNIT II KNOWLEDGE DELIVERY 9
The business intelligence user types, Standard reports, Interactive Analysis and Ad Hoc Querying,
Parameterized Reports and Self-Service Reporting, dimensional analysis, Alerts/Notifications,
Visualization: Charts, Graphs, Widgets, Scorecards and Dashboards, Geographic Visualization,
Integrated
UNIT III Analytics, Considerations: Optimizing the Presentation for the Right Message.
EFFICIENCY 9
Efficiency measures – The CCR model: Definition of target objectives- Peer groups – Identification of
good operating practices; cross efficiency analysis – virtual inputs and outputs – Other models.
Pattern matching – cluster analysis, outlier analysis
UNIT IV BUSINESS INTELLIGENCE APPLICATIONS 9
Marketing models – Logistic and Production models – Case studies.
COURSE OUTCOMES:
After the successful completion of this course, the student will be able to
Identify the parameters and apply the proper models to develop business intelligence
systems. (Apply)
Apply the suitable visualization techniques for knowledge discovery. (Apply)
Employ various efficiency modeling techniques to solve real time problems. (Apply)
Apply marketing models involved in business intelligence methods to various situations.
187
(Apply)
Employ logistic and production models involved in business intelligence methods to various
situations. (Apply)
Make use of advanced technologies involved in BI for future prediction. (Apply)
TEXT BOOKS:
1. Efraim Turban, Ramesh Sharda, Dursun Delen, “Decision Support and Business
Intelligence Systems”, 9th Edition, Pearson 2013.
REFERENCE BOOKS:
1. Larissa T. Moss, S. Atre, “Business Intelligence Roadmap: The Complete Project Lifecycle
of Decision Making”, Addison Wesley, 2003.
2. Carlo Vercellis, “Business Intelligence: Data Mining and Optimization for Decision Making”,
Wiley Publications, 2009.
3. David Loshin Morgan, Kaufman, “Business Intelligence: The Savvy Manager?s Guide”,
Second Edition, 2012.
4. Cindi Howson, “Successful Business Intelligence: Secrets to Making BI a Killer App”,
McGraw- Hill, 2007.
5. Ralph Kimball , Margy Ross , Warren Thornthwaite, Joy Mundy, Bob Becker, “The Data
Warehouse Lifecycle Toolkit”, Wiley Publication Inc.,2007.
188
19UCS927 MIXED REALITY L T P C
3 0 0 3
PRE-REQUISITE: Computer Graphics
COURSE OBJECTIVES :
To learn the Concepts of Mixed Reality
To impart the knowledge of Augmented Reality
To acquire the concepts of Virtual Reality
To study the need for content creation for AR and VR
To understand the scope of Mixed Reality
UNIT I Introduction to Mixed Reality 9
Introducing Virtual Reality and Augmented Reality- Mixed reality - Virtuality - Extended reality -
History of Augmented Reality and Virtual Reality, Use Cases, Gaming and Entertainment,
Architecture and construction, Science and Engineering, Health and medicine, Education,
Mechanics of Sight, Mechanics of Hearing, Mechanics of Feeling.
UNIT II Augmented Reality and Setup 9
Tactile and Force Feedback Devices, Display Fundamentals, Augmented Displays (Monocular,
Binocular), Types of Displays, Tracking, Sensors for Tracking - Exploring the Current State of
Augmented Reality - Form Factors -Considering Controllers – Current Issues with AR- Orientation
and Motion, Calibration, Computer Vision, Devices to enable navigation and Interaction
UNIT III Virtual Reality and Setup 9
VR Terminology – HMD -Immersive/Non-immersive VR, Presence, Reality trade-off, Perception
Models and Processes –Virtual Systems- Interaction with Virtual Environment – Tracking and
Modalities – Virtual Reality Applications
UNIT IV Creating Content in Virtual and Augmented Reality 9
Evaluating Your Project - Assessing Your Project’s Technology Needs - Choosing VR & AR –
Planning Your VR & AR Project - Exploring Design Principles in VR & AR - Assessing Design
Software - Capturing Real Life – Assessing Development Software - Distributing Your Content.
UNIT V Future Scope of Mixed Reality 9
Characters, Avatars, Collaboration and Social Networking, Interaction and interaction Design,
foveated rendering – VR App Development – AR App Development
Total : 45 Periods
COURSE OUTCOMES:
After the successful completion of this course, the student will be able to
Use Mixed Reality in the real time experience (Apply)
189
Develop the features of AR Environment (Apply)
Develop 3D Virtual Environments(Apply)
Develop immersive Virtual Reality Applications(Apply)
Implement VR and AR for content Creation(Create)
Analyze the applications of Mixed Reality(Create)
TEXT BOOKS
1. D. SCHMALSTIEG and T. Hollerer, Augmented reality, 1st ed. Pearson Education, 2016.
ISBN13: 978-0321883575.
2. 2. S. Aukstakalnis, Practical augmented reality, 1st ed. Pearson Education, 2017. ISBN-
13: 9780134094236.
3. Burdea, Grigore C and Philippe Coiffet, “Virtual Reality Technology”, Wiley Interscience,
India, 2003.
REFERENCES BOOK:
1. W. M. Newman, R. F. Sproull– “Principles of Interactive computer Graphics” – 2nd Edition,
1997, Tata MCGraw Hill.
2. J. Jerald, The VR Book: Human-Centered Design for Virtual Reality, 1st ed. 2016.
190
19UCS928 GREEN COMPUTING L T P C
3 0 0 3
PRE-REQUISITE:
To learn the fundamentals of Green Computing
To study the Green computing Grid Framework
To understand the issues related with Green compliance
To learn environmentally responsible business strategies
UNIT I FUNDAMENTALS 9
Trends and reasons to go green: Overviews and issues-Current initiatives and standards -
Organization planning for Green computing - Consumption Issues: Minimizing power usage –
Cooling-Going paperless – recycling-Hardware consideration
TEXT BOOKS:
1. Toby J.Velte, Anthony T.Velte, Robert Elsen Peter, “Green IT”, McGraw Hill, 2008.
2. John Lamb, “The Greening of IT”, Pearson Education, 2009.
3. Bud E. Smith, “Green Computing: Tools and Techniques for Saving Energy, Money, and
Resources”, Taylor & Francis Group, CRC Press, 2014.
4. Bhuvan Unhelkar, “Green IT Strategies and Applications-Using Environmental
Intelligence”, CRC Press, June 2011.
191
REFERENCE BOOKS
1. Jason Harris, “Green Computing and Green IT- Best Practices on regulations & industry”,
Lulu.com, 2008.
2. Carl Speshocky, “Empowering Green Initiatives with IT”, John Wiley & Sons, 2010.
3. Wu Chun Feng, “Green computing: Large Scale energy efficiency”, CRC Press, 2012.
192
19UCS929 ADVANCED JAVA PROGRAMMING L T P C
3 0 0 3
COURSE OBJECTIVES :
Exploring Swing – JLabel and ImageIcon, JTextField – The Swing Buttons – JTabbedPane -
JScrollPane, JList&JcomboBox – Trees &JTables – What Is a Java Bean? – Advantages of Java
Beans – Introspection, Bound and Constrained Properties – Persistence & Customizers
Remote Method Invocation –Settingup Remote Method Invocation – RMI with Applets -Networking
Basics – The Networking Classes and Interfaces – InetAddress – Inet4Address and Inet6Address -
TCP/IP Client sockets – URL – URL Connection – HttpURLConnection
UNIT IV JDBC 9
UNIT V SERVLETS 9
Background, The Life Cycle of a Servlet & The JSDK-A Simple Servlet – The Servlet API -RolePlay-
Servlet Concept – The javax.servlet Package – Reading Servlet Parameters, The javax.servlet.http
Package – Handling HTTP Request and Responses – Using Cookies – Session Tracking.
TOTAL : 45 Periods
193
COURSE OUTCOMES:
After the successful completion of this course, the student will be able to
TEXT BOOK
1. Naughton and H.Schildt, (2007), “Java 2-The complete reference”, Fifth Edition McGraw
Hill. (UNIT I – V )
REFERENCE BOOKS
1. Jim Keogh, (2002), “The Complete Reference J2EE”, Tata McGraw Hill Edition, New Delhi.
2. Marty Hall, Larry Brown, (2004), “Core Servlets and Java Server Pages”, 2 nd Edition,
Pearson Education.
194
19UCS930 XML AND WEB SERVICES L T P C
3 0 0 3
PRE-REQUISITE: HTML
COURSE OBJECTIVES :
To understand basics in XML.
Understanding the concepts of web services.
Gaining knowledge in WSDL and UDDI.
Understanding Semantic web
UNIT I XML TECHNOLOGY 9
Introduction -XML in context – Fundamentals of XML- DTD –XML Schemas- Integrating XML with
databases - Case study – Create an XML based application and Integrate with database
UNIT II ARCHITECTING WEB SERVICES 9
Business motivations for web services, Service oriented Architecture (SOA), Architecting Web
services :Implementation ,Logical and Technological views
UNIT III WEB SERVICES BUILDING BLOCK 9
Simple Object Access Protocol (SOAP), Web service Description Language (WSDL ) ,Universal
Description and Discovery Integration (UDDI), Case study : Create a Web service for a specific
application using WSDL ,UDDI and SOAP concepts
UNIT IV XML IN E – BUSINESS 9
B2B – B2C Applications – Different types of B2B interaction- Enterprise Integration – eb XML-
Rosetta Net -Applied XML in vertical industry- web services for mobile devices.
UNIT V SEMANTIC WEB 9
Semantic Web – Role of Meta data in web content- Resource Description Framework – RDF
schema- Architecture of semantic web- NG – WSFL .
TOTAL:45Periods
COURSE OUTCOMES:
After the successful completion of this course, the student will be able to
Apply the concepts of XML (Apply)
Employ the concepts of web services(Apply)
Comprehend Web service Description Language and Universal Description and Discover
Integration Concepts(Apply)
Building Web services for any application(Apply)
Apply methods for constructing and evaluating Web architectures(Apply)
Identify the basics of Semantic Web(Apply)
195
TEXT BOOKS:
1. Ron Schmelzer et al, “XML and Web Services Unleashed”, Pearson Education, 2014.
2. Frank P.Coyle, “XML, Web Services and the Data Revolution”, Pearson Education,
2010
REFERENCE BOOKS:
1. Russ Basiura and Mike Batongbacal, “Professional ASP .NET Web Services”, Apress,
2009
2. Henry Bequet and MeerajKunnumpurath, “Beginning Java Web, Apress, 2004
196
19UCS931 DISTRIBUTED SYSTEMS L T P C
3 0 0 3
COURSE OBJECTIVES :
The student should be made to:
Understand the concepts of communication in distributed environment.
Understand the concepts of process and synchronization.
Be familiar with the distributed resource management.
Be aware of failure and fault tolerance and its security.
Be familiar with the distributed system with various case studies.
UNIT I COMMUNICATION IN DISTRIBUTED ENVIRONMENT 9
Introduction - Examples of Distributed Systems - Resource Sharing and Web - Challenges - API for
Internet Protocol - External Data Representation and Marshaling - Remote Procedure Call -
Communication Between Distributed Objects - Client Server Communication - Group
Communication.
UNIT II PROCESS AND SYNCHRONIZATION 9
Processes - Threads - Communication and Invocation - Clocks, Events and Process States -
Synchronization Physical Clocks - Logical Time and Logical Clocks - Global States - Distributed
Mutual Exclusion - Elections - Distributed Transactions.
UNIT III DISTRIBUTED RESOURCE MANAGEMENT 9
Introduction - Data Centric Consistency Models - Client Centric Consistency Models - Distribution
Protocols - Consistency Protocols - Casually Consistent Lazy Replication
UNIT IV FAULT TOLERANCE AND SECURITY 9
Fault Tolerant Services - Atomic Commit Protocols - Concurrency Control in Distributed Transactions
- Distributed Deadlocks - Transaction Recovery - Security Threads and Attacks - Access Control -
Cryptography - Cryptography Algorithms - Kerberos - Electronic Payment System.
UNIT V CASE STUDIES 9
Distributed Object Based System - CORBA - COM+ - Distributed File System - Sun NFS - Andrew
File System - Distributed Coordination Based System - JINI.
TOTAL : 45 Periods
COURSE OUTCOMES:
After the successful completion of this course, the student will be able to
Understand the various concepts of communication in distributed system. [Understand]
Apply various knowledge of distributed system to solve problems relevant to process oriented
activity. [Apply]
197
Impart the knowledge of various synchronization techniques to synchronize multiple system in
a distributed environment. [Apply]
Solve problems related to resource management in a distributed system. [Apply]
Apply the knowledge of device mechanism to provide ability to fault tolerate in distributed
system. [Apply]
Apply the engineering knowledge to solve security related problems in distributed system.
[Apply]
Analyze the applications of distribution systems in various fields. [Analyze]
TEXT BOOK:
1. George Colouris, Jean Dollimore and Tim Kinberg, “Distributed system concept and Design”
Pearson Education, 4th Edition, 2012.
REFERENCE BOOKS:
198
19UCS932 ROBOTICS AND APPLICATIONS L T P C
3 0 0 3
PRE-REQUISITE:
Basic Engineering Mathematics
Automation and Control
COURSE OBJECTIVES :
To summarize the functions of the basic components of a Robot.
To familiarize the various types of robot driven system and End of Effectors and Sensors
To impart knowledge of Robot Kinematics and Programming
To learn Robot safety issues and economics.
To introduce the Robots for their control and design in Industries
UNIT I INTRODUCTION TO ROBOTICS 7
Robotics: Robot Anatomy—Need for Robots-Types and components of a robot-Classification of
robots,-closed-loop and openloop control systems.-Kinematics systems: Definition of mechanisms
and manipulators-Social issues and safety– Applications of Robots.
UNIT II ROBOT ACTUATION SYSTEM AND KINEMATICS 10
Actuators: Electric, Hydraulic and Pneumatic; Transmission: Gears, Timing Belts and Bearings,
Parameters for selection of actuators-Robot Kinematics and Dynamics : Kinematic Modelling:
Translation and Rotation Representation- Coordinate transformation-DH parameters, Jacobian,
Singularity, and Statics- Dynamic Modelling: Equations of motion: Euler-Lagrange formulation
UNIT III SENSORS AND VISION SYSTEM 9
Sensor: Contact and Proximity, Position, Velocity, Force, Tactile etc.-Introduction to Cameras-
Camera calibration-Geometry of Image formation-Euclidean/Similarity/Affine/Projective
transformations-Vision applications in robotics.
UNIT IV ROBOT CONTROL 10
Basics of control: Transfer functions-Control laws: P, PD, PID-Non-linear and advanced controls.
199
Design Control laws for a Robot systems.[Apply]
Integrate hardware for real prototype of Robotic Device .[Apply]
Select a Robotic System for real life applications.[Create]
Text Books
3. Saha, S.K., “Introduction to Robotics, 2nd Edition, McGraw-Hill Higher Education, New
Delhi, 2014.
4. Mikell P. Grooveret. al., "Industrial Robots -Technology, Programming and Applications",
McGraw Hill, New York, 2008 (Reprint).
REFERENCES BOOK:
3. John J.Craig , ―Introduction to Robotics, Pearson, 3rd edition, 2009(Reprint).
4. R.K. Mittal, I.J. Nagrath, Robotics and control, Tata McGraw-Hill, 2003.
5. Ghosal, A., “Robotics”, Oxford, New Delhi, 2006.
6. Niku Saeed B., “Introduction to Robotics: Analysis, Systems, Applications”, PHI, New
Delhi.
7. Mukherjee S., “Robotics and Automation”, Khanna Publishing House, Delhi.
8. Mark W. Spong, Seth Hutchinson, and M. Vidyasagar, “Robot Modelling and Control”,
John Wiley and Sons Inc, 2005
9. Steve Heath, “Embedded System Design”, 2nd Edition, Newnes, Burlington, 2003
10. Merzouki R., Samantaray A.K., Phathak P.M. and Bouamama B. Ould, “Intelligent
Mechatronic System: Modeling, Control and Diagnosis”, Springer.
11. Deb S. R. and Deb S., ― Robotics Technology and Flexible Automation ,Tata McGraw Hill
Education Pvt. Ltd, 2nd edition, 2010(Reprint).
12. http://nptel.ac.in/courses/112108093,http://www.roboanalyzer.com/tutorials.html
200
19UCS933 E-LEARNING CONCEPTS L T P C
3 0 0 3
COURSE OBJECTIVES :
TOTAL : 45 Periods
COURSE OUTCOMES:
After the successful completion of this course, the student will be able to
Understand the concepts and framework of E-Learning. [Understand]
Understand the various evaluation patterns available. [Understand]
Apply various assessment methods for various topics. [Apply]
Apply appropriate tools to evaluate the outcome. [Apply]
Analyze various assessment patterns to predict the best suited. [Analyze]
Develop an instructional system design to a course. [Create]
201
TEXT BOOKS:
1. D.Randy Garrison “E-Learning in the 21st century a framework for research and practice”,
Second edition, Taylor and Francis, 2011.
2. John Gardner, Bryn Holems, “E-Learning : Concepts and practice” SAGE Publications, 2006.
REFERENCE BOOKS:
1. R.C.Clark and R.E.Mayer, “E-Learning and the science of instruction”, Pfeiffer Wiley, 2011.
2. Mark J Rosenberg, “E-Learning: strategies for delivering knowledge in the Digital Age”,
McGraw- Hill, 2001.
3. Kjell E. (Erik) Rudestam , Judith Schoenholtz-Read, “Handbook of Online Learning”, Sage
Publications Inc., Second Edition, 2009.
202
OPEN ELECTIVES OFFERED TO OTHER PROGRAMMES
Course
Course Title L T P C
Code
203
19UCS971 DIGITAL MARKETING L T P C
3 0 0 3
PRE-REQUISITE:
COURSE OBJECTIVES :
To Provide an Overview of Digital Marketing plans.
To Provide a Foundation of a Greater market share and Increasing brand awareness.
UNIT I INTRODUCTION OF DIGITAL MARKETING 9
Introduction of Digital Marketing - Difference between Traditional Marketing and Digital Marketing, -
Inbound and Outbound Marketing - Components of Online Marketing (Email, Forum, Social network,
Banner, Blog) - Essentials of a website- Website designing
UNIT II SEARCH ENGINE OPTIMIZATION 9
Introduction to Search Engines - Keyword Research and Competition - On page Optimization - Off page
Optimization - Local SEO - Search Engine Algorithm Updates - SEO Reporting
UNIT III GOOGLE ADWORDS 9
PPC Advertising (Online Advertisement) - Display Advertising - Google Shopping Ads -Introduction to
Bing Ads -Mobile Marketing - Video Marketing - Google online Advertisement program
UNIT IV SOCIAL MEDIA MARKETING 9
Introduction to SMM - Facebook Marketing - Facebook Advertising - Twitter Marketing & Ads -YouTube
Marketing - LinkedIn Marketing - InstaGram Marketing - Email Marketing – Pinterest Marketing - Online
Reputation Management - Web Analytics- Google Analytics - Audience Reports- Traffic Reports -
Behavior Reports
UNIT V EXPERIMENTAL TESTING 9
Conversion Tracking – Blogging & Google AdSense - Getting Started as Freelancer - Affiliate Marketing-
Content marketing- Consumer Engagement – Tools & Resources -Legal and Ethical aspects related to
Digital Marketing. Developing digital marketing strategy in Integration form
TOTAL:45 Periods
204
COURSE OUTCOMES:
After the successful completion of this course, the student will be able to
Apply the knowledge of Digital marketing to identify the components to achieve the latest
digital marketing trends. [Apply]
Apply the optimization techniques to plan, predict, and manage digital Marketing
campaigns [Apply]
Employ the techniques of Google adwords for marketing a company. [Apply]
Apply the various marketing strategies to reach the more users through social media.
[Apply]
Analyze the digital marketing reports using various analytics methods. [Analyze]
Apply various techniques to earn through digital marketing as a free lancer. [Apply]
TEXT BOOKS:
1. Puneet Singh Bhatia, Fundamentals of Digital Marketing First Edition, Publication Pearson.
2. Vandana Ahuja, Digital Marketing 1st Edition, Publication Oxford
3. Shivani Karwal, “Digital Marketing Handbook: A Guide to search Engine Optimization, Pay
Per Click Marketing, Email Marketing and Content Marketing”, CreateSpace Independent
Publishing Platform, 1st edition.
REFERENCE BOOKS:
1. Ian Dodson, The Art of Digital Marketing: The Definitive Guide to Creating Strategic, Targeted
and Measurable Online Campaigns, Publication Wiley India Pvt Ltd.
2. Philip Kotler, Hermawan Kartajaya, Iwan Setiawan, Marketing 4.0: Moving from Traditional to
Digital, Publication Wiley India Pvt Ltd.
3. Venakataramana Rolla, “Digital Marketing Practice guide for SMB: SEO, SEM and SMM”,
CreateSpace Independent Publishing Platform, First edition.
4. Dave Chaffey, Fiona Ellis Chadwick, Digital Marketing: Strategy, Implementation & Practice,
Paperback - Import, 2012.
205
19UCS972 SOCIAL NETWORK ANALYSIS CONCEPTS L T P C
3 0 0 3
PRE-REQUISITE:Computer Networks
COURSE OBJECTIVES :
To understand the components of the social network.
Understand human behavior in social web and related communities
Learn visualization of social networks.
UNIT I INTRODUCTION 9
Overview: Social network data-Formal methods-Paths and Connectivity-Graphs to represent social
relations-Working with network data-Network Datasets-Strong and weak ties -Closure, Structural
Holes, and Social Capital-Web-based networks - Applications of Social Network Analysis.
UNIT II MODELING AND VISUALIZATION 9
Visualizing Online Social Networks - A Taxonomy of Visualizations - Graph Representation -
Centrality- Clustering - Node-Edge Diagrams - Visualizing Social Networks with Matrix- Based
Representations- Node-Link Diagrams - Hybrid Representations - Modelling and aggregating social
network data – Random Walks and their Applications –Use of Hadoop and Map Reduce -
Ontological representation of social individuals and relationships.
UNIT III MINING COMMUNITIES 9
Aggregating and reasoning with social network data, Advanced Representations – Extracting
evolution of Web Community from a Series of Web Archive - Detecting Communities in Social
Networks - Evaluating Communities – Core Methods for Community Detection & Mining -
Applications of Community Mining Algorithms - Node Classification in Social Networks.
UNIT IV PREDICTING HUMAN BEHAVIOUR AND PRIVACY ISSUES 9
Understanding and predicting human behaviour for social communities - User data management -
Inference and Distribution - Enabling new human experiences - Reality mining - Context -
Awareness - Privacy in online social networks - Trust in online environment - Trust models based on
subjective logic - Trust network analysis - Trust transitivity analysis - Combining trust and reputation -
Trust derivation based on trust comparisons - Attack spectrum and countermeasures.
UNIT V SECURITY POLICIES 9
Security Policies : Access Control Policies: Authorization-Based Access ControlPolicies, Role-Based
Access Control. Administration Policies, Identification andAuthentication, Auditing a Database
System, Views for Security. Policy Enforcementand Related Issues: SQL Extensions for Security,
Query Modification, DiscretionarySecurity and Database Functions, Data Privacy. Security Policies
for Online SocialNetworks (OSN): Running Example, Access Control Policies, Filtering Policies,
AdminPolicies. Security Policy Specification: Policy Language, Authorizations andProhibitions:
206
Access Control Authorizations, Prohibitions, Admin Authorizations.Security Rules, Security Rule
Enforcement: General Approach, Admin RequestEvaluation, Access Request Evaluation.
COURSE OUTCOMES:
After the successful completion of this course, the student will be able to
• Outline the basic concepts of complex networksand random graphs.
• Visualize social networks.
• Apply Network Implications and cascades behaviour of social
• Predict human behavior in social web and related communities
• Identify the security methods to prevent the risks in socialmedia
TEXT BOOKS:
Peter Mika, ―Social Networks and the Semantic Web‖, Springer, 1st edition, 2007.
BorkoFurht, “Handbook of Social Network Technologies and Applications”, 1st Edition,
Springer, 2010.
BhavaniThuraisingham, SatyenAbrol, Raymond Heatherly, MuratKantarcioglu,
VaibhavKhadilkar and Latifur
Khan,‖‚Analyzing‖and‖Securing‖Social‖Networks‛,‖CRC‖Press‖- Taylor & Francis Group,
2016
REFERENCE BOOKS:
GuandongXu ,Yanchun Zhang and Lin Li, “Web Mining and Social Networking –
Techniques and applications”, First Edition Springer, 2011.
Dion Goh and Schubert Foo, “Social information Retrieval Systems: Emerging
Technologies and Applications for Searching the Web Effectively”, IGI Global Snippet,
2008.
Max Chevalier, Christine Julien and Chantal Soulé-Dupuy, “Collaborative and Social
Information Retrieval and Access: Techniques for Improved user Modelling”, IGI Global
Snippet, 2009.
John G. Breslin, Alexandre Passant and Stefan Decker, “The Social Semantic Web”,
Springer, 2009.
207
19UCS973 JAVA FUNDAMENTALS L T P C
3 0 0 3
PRE-REQUISITE:
COURSE OBJECTIVES :
For programming in the Java programming language,
Obtain knowledge of object-oriented paradigm in the Java programming language,
to use Java in a variety of technologies and on different platforms
UNIT I INTRODUCTION TO JAVA 9
The Genesis of Java- Buzzwords- Object oriented Concept- Lexica Issues- Data types and
variables- Arrays- Operators
UNIT II OBJECT ORIENTED CONCEPTS 9
Control Statements Selection- Control Statement Iteration and jump Statement -Introducing classes-
Class fundamentals- The General form of a class- Declaring Objects- Assigning object reference
variables.
UNIT III METHODS AND CLASSES 9
After the successful completion of this course, the student will be able to
knowledge of the structure and model of the Java programming language, (Understand)
208
use the Java programming language for various programming technologies (understand)
develop software in the Java programming language, (apply)
evaluate user requirements for software functionality required to decide whether the Java
programming language can meet user requirements (analysis)
propose the use of certain technologies by implementing them in the Java programming
language to solve the given problem(create)
choose an engineering approach to solving problems, starting from the acquired knowledge
of programming and knowledge of operating systems. (evaluate)
TEXT BOOKS:
1. Naughton and Schildt.H , “Java 2-The complete reference”, Fifth Edition, McGraw Hill, (2007)
REFERENCES:
1. Subir Kumar Sarkar, T G Basavaraju and C Puttamadappa, ―Ad Hoc Mobile Wireless
Networks‖, Auerbach Publications, 2008.
1. Arnold and Gosling.J, “The java programming language”, Second edition,Addision Wesley,2000
2. Art Gittleman, “Ultimate Java Programming”, First edition, Wiley Publications,2002
209
19UCS974 CLOUD AND BIG DATA L T P C
3 0 0 3
COURSE OBJECTIVES :
To study the fundamentals of cloud computing
To understand the security issues in cloud computing
To study the fundamentals of Big Data and Hadoop architecture
To learn about how the cloud computing can be used for Big Data
UNIT I CLOUD COMPUTING FUNDAMENTALS 9
Cloud computing components- Deployment models of Cloud- Services offered by Cloud- Benefits
and Limitations of Cloud Computing – Issues in Cloud security- Cloud security services and design
principles - Virtualization –Types of Virtualization- Server Virtualization- Desktop Virtualization –
Memory Virtualization – Application and Storage Virtualization- Tools and Products available for
Virtualization
UNIT II SECURITY ISSUES IN CLOUD COMPUTING 9
Security concerns in Traditional IT, Challenges in Cloud Computing in terms of Application Security,
Server Security, and Network Security. Security reference model, Abuse and Nefarious Use of Cloud
Computing, Insecure Interfaces and APIs, Malicious Insiders, Shared Technology Issues, Data Loss
or Leakage, Account or Service Hijacking, Unknown Risk Profile, Different vendors offering Cloud
Security for public and private clouds.
UNIT III INTRODUCTION TO BIG DATA 9
Introduction to Big Data – Characteristics of Data – Evolution of Big Data – Big Data Analytics –
Classification of Analytics – Top Challenges Facing Big Data – Importance of Big Data Analytics –
Data Analytics Tools.
UNIT IV DATA ANALYTICAL FRAMEWORKS 9
Introducing Hadoop –Hadoop Overview – RDBMS versus Hadoop – HDFS (Hadoop Distributed File
System): Components and Block Replication – Processing Data with Hadoop – Introduction to
MapReduce – Features of MapReduce – Introduction to NoSQL: CAP theorem – MongoDB: RDBMS
Vs MongoDB – Mongo DB Database Model – Data Types and Sharding.
UNIT V BIGDATA IN THE CLOUD 9
Big data Vs Cloud Computing - Need of Cloud for Big data- Opportunities and Challenges of Big
data in the cloud- Cloud Computing role for Big data – Benefits of Big data analysis in Cloud – Cloud
computing technologies used for Big data
210 TOTAL: 45 Periods
COURSE OUTCOMES:
After the successful completion of this course, the student will be able to
Identify and use the proper deployment models to offer the cloud services. [Apply]
Choose the proper virtualization types to deliver the cloud services. [Apply]
Identify and apply the proper security measures for securing the cloud environment. [Apply]
Design solution for real time problems using the big data analytic tools and
techniques.[Create]
Develop a solutions for real time data analytics problem using Hadoop mechanism.[Create]
Employ the cloud computing technologies for the big data processing. [Apply]
TEXT BOOKS:
1. Anthony T .Velte, Toby J.Velte, Robert Elsenpeter, “Cloud Computing: A Practical Approach”,
Tata McGraw Hill Edition, Fourth Reprint, 2010
2. Chris Eaton, Dirk deroos et al. , “Understanding Big data ”, McGraw Hill, 2012.
REFERENCE BOOKS:
1. Ronald L.Krutz, Russell vines, “Cloud Security: A Comprehensive Guide to Secure Cloud
Computing”, Wiley Publishing Inc., 2010.
2. Boris lublinsky, Kevin t. Smith, Alexey Yakubovich, “Professional Hadoop Solutions”, Wiley,
ISBN: 9788126551071, 2015.
3. Vignesh Prajapati, “Big Data Analytics with R and Haoop”, Packet Publishing 2013.
4. Kris Jamsa, “Cloud Computing: SaaS, PaaS, IaaS, Virtualization, Business Models, Mobile,
Security and more”, Jones & Bartlett Learning Company LLC, 2013.
211
19UCS975 SCRIPTING LANGUAGES L T P C
3 0 0 3
COURSE OBJECTIVES :
To make them understand the concepts of scripting languages for developing web based
projects.
To facilitate them to create database connections using PHP and build the website for the world.
To improve their ability to demonstrate IP address for connecting the web servers.
To provide knowledge to analyze the internet ware application, security issues and frame works
for application.
Data Structures: Objects and arrays-The secret life of Objects-Modules Java Script and the Browser-
Handling Events-HTTP and Forms
PHP Basics- Features, Embedding PHP Code in your Web pages, Outputting the data to the
browser, Data types, Variables, Constants, expressions, string interpolation, control structures,
Function, Creating a Function, Function Libraries, Arrays, strings and Regular Expressions
Advanced PHP Programming: PHP and Web Forms, Files, Uploading Files with PHP, Sending
212
Email using PHP, PHP Encryption Functions, the Mcrypt package, Building Web sites for the World.
TOTAL:45 Periods
COURSE OUTCOMES:
After the successful completion of this course, the student will be able to
TEXT BOOKS:
1. Jeffrey C. Jackson, “Web Technologies: A Computer Science Perspective”, Prentice Hall, 2007
2. The World of Scripting Languages, David Barron, Wiley Publications.
3. VBScript- Programmer’s Reference Susanne Clark, Antonio De Donatis, Adrian
Kingsley−Hughes et al, Wiley Publishing, Inc.
4. Beginning PHP and MySQL, 3rd Edition, Jason Gilmore, Apress Publications (Dream tech.)
REFERENCE BOOKS:
1. Open Source Web Development with LAMP using Linux, Apache, MySQL, Perl and PHP,
J.Lee
and B.Ware(Addison Wesley) Pearson Education.
2. PHP 6 Fast and Easy Web Development, Julie Meloni and Matt Telles, Cengage Learning
Publications.
3. PHP 5.1, I.Bayross and S.Shah, The X Team, SPD. Pearson Education.
4. PHP and MySQL by Example, E.Quigley, Prentice Hall (Pearson).
5. PHP Programming solutions, V.Vaswani, TMH.
213
19UCS976 DIGITAL AUTOMATION WITH IOT L T P C
3 0 0 3
COURSE OBJECTIVES :
To understand the concepts of Internet of Things.
To identify the various elements of an IoT System.
To understand the various means of communication from Node / Gateway to Cloud
Platforms.
To identify types of data analytics and data visualization tools.
To make students aware of security concerns and challenges while implementing IoT
solutions.
UNIT I INTRODUCTION TO IOT 9
Introduction to IoT, Current technological trends and future prospects, - Evolution of IoT , Business
Scope, Relation with embedded system, - Basic Architecture of an IoT, From M2M to IoT, M2M
towards IoT, IoT Value Chains, An emerging industrial structure for IoT.
UNIT II ELEMENTS OF IOT 9
Application Sensors & Actuators - Edge Networking (WSN) – Gateways - IoT Communication
Model – WPAN and LPWA, Overview of IoT supported Hardware platforms such as: Raspberry pi,
ARM Cortex Processors, Arduino and Intel Galileo boards, Wearable Development Boards.
UNIT III COMMUNICATION AND CONNECTIVE TECHNOLOGIES 9
IoT Communication Model, Cloud computing in IoT, IoT in cloud architecture, Logging on to cloud,
Selecting and Creating cloud service, cloud based IoT platforms - IBM Watson, Google cloud.
UNIT IV DATA ANALYTICS AND IOT PLATFORM 9
Big Data Analytics , Apache Hadoop, Using Hadoop MapReduce for Batch Data Analysis, Apache
Storm, Data Visualization, Visualization tools for IoT.
UNIT V DIGITAL AUTOMATION BASED HANDS-ON PROJECTS 9
Industry 4.0 concepts. Sensors and sensor Node and interfacing using any Embedded target boards
(Raspberry Pi / Intel Galileo/ARM Cortex/ Arduino), DIY Kits – Soil moisture monitoring, Weather
monitoring, Air quality Monitoring, Movement Detection.
TOTAL : 45 Periods
214
COURSE OUTCOMES:
After the successful completion of this course, the student will be able to
Learn and understand the technology and current trends in Internet of things.[Understand]
Understand the various elements of IoT system and hardware devices.[Understand]
Develop IoT Applications based on the cloud computing and its relevance. [Apply] Design
and implement IoT applications that manages big data with data analytics. [Apply]
Implement IoT solutions based on the aware of security concerns and challenges.[Apply]
Develop hands-on projects using an appropriate software and hardware devices in various
digital automation applications.[Analyze]
1. The Internet of Things: Applications and Protocols, Wiley publications. Author(s): Oliver Hersent,
David Boswarthick, Omar Elloumi.
3. Internet of Things with Arduino Cookbook, Packt Publications. Author(s): Marco Schwatrz. 4.
Internet of Things and Data Analytics, Wiley Publications.
215
19UCS977 PROGRAMMING AND DATA STRUCTURES L T P C
3 0 0 3
COURSE OBJECTIVES :
Stack ADT – Evaluating arithmetic expressions- other applications- Queue ADT – circular queue
implementation – Double ended Queues – applications of queues
UNIT III NON-LINEAR DATA STRUCUTRE – TREE 9
Searching: Linear Search – Binary Search, Sorting: Selection Sort – Bubble Sort – Insertion Sort –
Merge sort – Quick sort – Hashing: Hash Functions – Separate Chaining – Open Addressing –
Rehashing – Extendible Hashing.
TOTAL:45 Periods
216
COURSE OUTCOMES:
After the successful completion of this course, the student will be able to
Understand the various applications like linear and non-linear data structures to solve the
problems in relevant applications [Understand]
Apply the concept of linear data structures like stacks, queues and linked lists to access and
organize the data [Apply]
Employ operations on different types of trees and their applications in solving problems.
[Apply]
Design solutions using nonlinear data structures such as AVL trees to solve real world
problems efficiently [Apply]
Design and implement an appropriate hashing function for the applications [Apply]
Analyze the different Program to implementations of various data structure algorithms and to
calculate the efficiency of algorithms.[Analysis]
TEXT BOOKS:
1. Mark Allen Weiss, “Data Structures and Algorithm Analysis in C”, 2nd Edition, Pearson
Education,2009.
2. ISRD Group, “Data Structures using C”, 2nd Edition, McGrraw-Hill Education (India) Private
Limited, 2013.
REFERENCE BOOKS:
217
19UCS978 INTRODUCTION TO C PROGRAMMING L T P C
3 0 0 3
PRE-REQUISITE:
COURSE OBJECTIVES :
Overview of C Program – Constants, Variables and Data Types – Operators and Expressions –
Managing Input and Output operations – Decision Making and Branching – Decision making and
Looping.
Arrays: One dimensional arrays – Two dimensional arrays – Multi dimensional arrays. Character
arrays and Strings: Declaring and initializing String Variables – Comparison of two strings – String
handling functions. User defined Functions: Definition – Declaration – Function calls – Category of
Functions – Recursion - Storage Classes
File management in C – Defining and opening a file – closing a file - Input and Output operations on
file – Error handling during IO operations – Random access to files – Command line Arguments.
Dynamic memory allocation: Allocating a block of memory - Allocating a multiple block of memory –
218
Releasing the used space Altering the size of a block.
TOTAL:45Periods
COURSE OUTCOMES:
After the successful completion of this course, the student will be able to
Recognize the system fundamentals and the role of hardware components of the Computer.
(Understand)
Apply the basic concepts to solve simple problems by applying the logics of conditional
statements and looping constructs. (Apply)
Handle similar types of data using array and understand their functionality. (Understand)
Apply the call by value and call by reference features in functions. (Apply)
Design programs involving their own derived data types, pointers, memory allocation
concepts. (Create)
Handle the file contents with access permissions. (understand)
TEXT BOOKS:
REFERENCE BOOKS:
1. Pradip Dey, Manas Ghosh, ―Fundamentals of Computing and Programming in C‖, 1 st Edition,
Oxford University Press, 2009
219
19UCS979 MACHINE LEARNING FOR ENGINEERS L T P C
3 0 0 3
PRE –REQUISITE:
COURSE OBJECTIVES :
Basics of supervised learning -Classification model - Probability and Bayes learning - Naive Bayes -
Bayesian Network - K-nearest neighbor- Decision tree-Random Forest-Support Vector Machine.
Basics of Neural Network-Understanding the biological neuron and artificial neuron-Types of activation
functions- Early implementations of ANN -McCulloch Pitt’s , Rosenblatt’s Perceptron, ADALINE –
Architectures of neural network- Learning process in ANN- Back propagation -Deep learning
UNIT V UNSUPERVISED LEARNING 9
220
Clustering-Applications-Similarity measures-Partition based clustering techniques- K means clustering,
k-mediod clustering- Hierarchical clustering-Density based clustering-Cluster validation
TOTAL: 45 Periods
COURSE OUTCOMES:
After the successful completion of this course, the student will be able to
Understand the concepts of machine learning for solving various complex problems of
engineering. (Understand)
Apply the knowledge of machine learning to solve complex engineering problems based on
regression, classification and Clustering. (Apply)
Identify the suitable Machine learning algorithm for complex engineering problems for
reaching sustained conclusions using the principles of mathematics. (Analyze)
Design solutions for complex engineering problems to predict or forecast the results for
engineering, business, health care and environmental applications.(Apply)
Interpret the data and synthesize the information using Machine Learning algorithms and
statistical methods to provide valid conclusions.(Evaluate)
Design a model for a given problem using modern tools for predicting the results of the
complex engineering problems, considering the limitations of the model.(Create)
TEXT BOOKS:
REFERENCE BOOKS:
1. Hastie, Trevor, Tibshirani, Robert, Friedman, Jerome, The Elements of Statistical Learning.
Data Mining, Inference, and Prediction, Second Edition,February 2009, Springer.
2. Christopher M. Bishop,Pattern Recognition and Machine Learning, Springer.
3. Peter Flach, ―Machine Learning: The Art and Science of Algorithms that Make Sense of
Data, First Edition, Cambridge University Press, 2012.
4. Jason Bell, ―Machine learning – Hands on for Developers and Technical Professionals,
First Edition, Wiley, 2014
5. EthemAlpaydin, ―Introduction to Machine Learning 3e (Adaptive Computation and Machine
Learning Series), Third Edition, MIT Press, 2014
221
LIST OF ONE CREDIT COURSES
222
LIST OF ONE CREDIT COURSES
19UCS861 R Programming 0 0 2 1
19UCS862
Server Side Scripting 1 0 0 1
19UCS863
Client side Scripting 1 0 0 1
19UCS864
Ruby on Rails 1 0 0 1
19UCS865
Wordpress 1 0 0 1
19UCS866
Multimedia 1 0 0 1
19UCS867
Mongo DB 0 0 2 1
19UCS868
Software Testing Tools 1 0 0 1
19UCS869
Animation Graphics 0 0 2 1
223
19UCS861 R PROGRAMMING L T P C
0 0 2 1
PRE-REQUISITE : C, C++, Java
COURSE OBJECTIVES:
To Provide the Procedures for R installation and develop R Programs for Data
Exploration.
LIST OF EXPERIMENTS
1. Installing R and its Packages in R.
2. Programs on Data types in R
3. Built-in Functions in R
4. Creating and manipulating a vector in R
5. Creating matrix and Manipulating matrix in R
6. Creating and Operations on Factors in R
7. Operations on Data frames in R
8. Programs on control structures in R
9. Programs on loops in R
10. Customizing Graphs in R
TOTAL : 15 Periods
COURSE OUTCOMES:
After the successful completion of this course, the student will be able to
• Install R Packages. (Apply)
• Write Simple Programming in R(Apply)
• Use R for descriptive statistics (Apply)
• Use R to visualize the data.(Apply)
HARDWARE AND SOFTWARE REQUIRMENTS
HARDWARE REQUIREWMENTS:
SOFTWARE REQUIREMENTS:
RStudio
224
19UCS862 SERVER SIDE SCRIPTING L T P C
1 0 0 1
PRE-REQUISITE: WEB PROGRAMMING
COURSE OBJECTIVES :
The general objectives of this course are to provide fundamental concepts of server side script
programming using JavaScript and PHP respectively along with database connectivity.
Learn the basics of the PHP programming language and how to write programs using PHP.
Learn the basics of Java Servlets and JSP for implementing web applications written in Java.
UNIT I INTRODUCTION TO PHP 5
PHP introduction ,Introduction to Server Side Scripting Language, Basic PHP Syntax, Comments in
PHP, Variables, PHP Operators, Control Structures(If else, switch, all loops), PHP include File, File
Handling, File Uploading, PHP Sessions, Sending Emails, PHP Cookies
UNIT II MYSQL CONCEPTS 5
Introduction to MySQL, PHP MySQL Connect to a Database, Closing a Connection, MySQL Data
Types, MySQL Insert, MySQL Select, MySQL Where Clause, MySQL Delete, MySQL Update, MySQL
Aggregate Functions(sum, avg, count etc); MySQL Order by and Group by Clause, MySQL Sub queries,
MySQL Joins
UNIT III XML 5
Introduction to XML, Anatomy of an XML, document, Creating XML Documents, Creating XML DTDs,
XML Schemas, XSL
TOTAL: 15Periods
COURSE OUTCOMES:
After the successful completion of this course, the student will be able to
• Develop the modern Web applications using server side technologies and the web design
fundamentals. [Apply]
• Develop SQL commands and use a database to develop data-driven Web applications.[Apply]
• Design XML Schema and corresponding XML document.[Apply]
TEXT BOOK:
1. Web Technologies, Uttam K Roy, Oxford University Press.
2. PHP : The Complete Reference By Steven Holzner, Tata McGrawHill.
REFERENCE BOOKS:
1. Developing Web Applications in PHP and AJAX, Harwani, McGrawHill.
2. Jeffrey C Jackson, Web Technologies A Computer Science Perspective, Pearson
Education Inc. 2009..
3. Chris Bates, Web Programming Building Internet Applications, 3/e, Wiley India Edition
2009.
225
19UCS863 CLIENT SIDE SCRIPTING L T P C
1 0 0 1
PRE-REQUISITE:
COURSE OBJECTIVES :
To learn the fundamentals of HTML.
To add the dynamic content to pages using JavaScript that meet specific needs and interests.
To facilitate the student to design interactive webpage using scripting language.
UNIT I MARKUP LANGUAGES 5
An Introduction to HTML History-Versions-Basic XHTML Syntax and Semantics-Some Fundamental HTML Elements-
Relative URLs-Lists-tables-Frames-Forms-HTML 5.0
UNIT II CLIENT-SIDE SCRITING (CSS) 4
Basics of CSS, CSS properties for manipulating texts, background, colors, Gradients, Shadow Effects, borders,
margins, paddings, transformations, transitions and animations.
UNIT III JAVASCRIPT AND JQUERY 6
JavaScript: History and Versions Introduction JavaScript in Perspective-Syntax-Variables and Data Types-
Statements-Operators-Literals-Functions-Objects-Arrays-Built-inObjects-JavaScript Debuggers.
jQuery: Basics, syntaxes, selectors, events, effects
TOTAL:15Periods
COURSE OUTCOMES:
After the successful completion of this course, the student will be able to
• Design simple web pages using HTML. (Create)
• Add dynamic content to the page by Java Script to meet the specific needs. (Create)
• Create a dynamic webpage using Java Scriptlibraries jQuery. (Create)
TEXT BOOKS:
1. Jeffrey C. Jackson, "Web Technologies--A Computer Science Perspective", Pearson
Education, 2006.
REFERENCE BOOKS:
1. Jeffrey C. Jackson, "Web Technologies: A Computer Science Perspective", Pearson
Education, 2006.
2. Robert. W. Sebesta, "Programming the World Wide Web", Fourth Edition, Pearson
Education, 2007.
3. Harvey M Deitel, Goldberg, "Internet & World Wide Web How to Program", Third Edition,
Pearson Education, 2006.
4. Marty Hall and Larry Brown,‖ Core Web Programming‖ Second Edition, Volume I and II,
Pearson Education, 2001.
226
19UCS864 RUBY ON RAILS L T P C
1 0 0 1
COURSE OBJECTIVES :
Develop programming skills and logical ability with the use of Ruby Programming
language platform.
Understanding web application development using Rails framework.
REFERENCES:
1. Yukihiro Matsumoto (2008), The Ruby Programming Language, Shroff; First edition, 2008,
ISBN-10: 8184044925, ISBN-13: 978-81840449282.
2. Michael Fitzgerald, Learning Ruby, Published by O’Reilly Media, Inc.,May 2007, ISBN-10:
8184043341, ISBN-13: 978-81840433413.
3. Rails AntiPatterns, Wesley Professional Ruby Series, 1st edition, 2010, ISBN-10:
0321604814, ISBN-13: 978-03216048114.
4. Adam Gamble, Cloves Carneiro, Jr. Rida Al Barazi (2007), Beginning Rails4, Apress, 3rd
edition, 2013ISBN-13 (pbk): 978-1-4302-6034-9| ISBN-13 (electronic): 978-1-4302-6035-6
227
19UCS865 WORD PRESS L T P C
1 0 0 1
PRE-REQUISITE:
COURSE OBJECTIVES :
• To learn the fundamentals in wordpress.
• To become familiar to design a content in webpage.
• Interacting with your reader, through customizing the look.
COURSE OUTCOMES:
After the successful completion of this course, the student will be able to
Install and configure Word Press on a hosting account.(Apply)
To design a web page with content and media.(Create)
The ability to configure Word Press new themes and plugins into your WordPress
site.(Apply)
TEXT BOOK:
1.WordPress Visual QuickStart Guide (2nd Edition) by Matt Beck, Jessica Neuman Beck (z lib.org)
REFERENCE BOOK:
1 0 0 1
PRE-REQUISITE:
COURSE OBJECTIVES :
•
TOTAL:15 Periods
COURSE OUTCOMES:
After the successful completion of this course, the student will be able to
Apply appropriate design Techniques in various fields (Apply)
Design creative ideas relevant for print medium.(Apply)
Solve human-centric problems using multimedia.(Create)
Use appropriate formats for storage(Create)
TEXT BOOKS:
1. The Ultimate Multimedia Handbook, Tata Mc Graw Hill
2. Multimedia at Work, Tata Mc Graw Hill
3. Adobe Photoshop Unleashed, Tata Mc Graw Hill
REFERENCES BOOKS:
1. Teach yourself Corel Draw, Sams Publishing
2. Flash Mx for Dummies, Pustak Mahal
229
19UCS867 MONGODB L T P C
1 0 0 1
COURSEOBJECTIVES:
To introduce the concepts of NoSQL, MongoDB and Data model.
To familiarize the students with CRUD , Indexing and Aggregation operations.
To introduce the Replication , Sharding, Backup and Recovery concepts in MongoDB
NoSQL Databases: Advantages –New SQL –Comparison of SQL, NoSQL and NewSQL –
MongoDB: Overview –Collection, Documents, Key/values – JSON and BSON documents-
Setting up the environment-MongoDB Data Model – Model examples and Patterns –Model
relationships between documents – Model tree structures- Model specific application contexts
Introduction – CRUD concepts – Concerns- concern Levels and Journaling – Cursor Query
optimizations –MongoDB data types. Index: Introduction – Concepts, Types, Properties,
Creation and Reference. Aggregation: Introduction – Approach to aggregation, Types.
UNITIII SCALABILITY , AVAILABLITY AND ADMINISTRATION 5
Introduction to Replication – Concepts – Types- Setup. Introduction to Sharding – Concepts –
Types – Setup. Security –Introduction – concepts – Intergration of MongoDB with Java.
Administration concepts in MongoDB –Monitoring – Backup and Recovery- Export and Import
of data
TOTAL:15Periods
COURSEOUTCOMES:
Afterthesuccessfulcompletionofthis course,thestudentwillbeableto
Store unstructured data in MongoDB and develop skills for processing huge amounts
of data using MongoDB tools. (Apply)
Apply the knowledge of creating and managing different types of indexes in MongoDB
for query execution. (Apply)
Use the skills of replication and sharding of data in MongoDB to optimize read/write
performance and perform installation, configuration, and maintenance of the MongoDB
environment. (Apply)
Demonstrate MongoDB configuration, backup methods, monitoring, and operational
strategies. (Apply)
TEXT BOOKS:
1. AmolNayak, “MongoDB Cookbook Paperback”, Packt Publishing Limited,November 2014.
2. Kristina Chodorow, “MongoDB: The Definitive Guide: Powerful and Scalable Data Storage”,
O’Reilly, 2nd edition, May 2013.
WEB REFERENCES:
1. https://beginnersbook.com/2017/09/mongodb-tutorial/
2. https://www.mongodb.com/
3. http://www.w3resource.com/mongodb/nosql.php
230
L T P C
19UCS868 SOFTWARE TESTING TOOLS
1 0 0 1
COURSE OBJECTIVES:
• To familiarize the students with the methodologies & usage of Tools
• To summarize competency in the logic like Testing Terminology.
UNIT I INTRODUCTION 5
Purpose of Testing-Types of Testing-Model for testing-consequences of bugs-taxonomy of
bugs-Usage of Modern Testing Tools
TEXT BOOKS
1. Software Testing Techniques, Boris Beizer, Dreamtech, Second Edition.
2. Software Testing Tools ,Dr. K.V.K.K.Prasad, Dreamtech. - Covering WinRunner, Silk Test,
LoadRunner, JMeter and TestDirector with case studies
REFERENCE BOOKS
1. The craft of software testing- Brain Marick, Pearson Education.
2. Introduction to Software Testing: P. Ammam & J.Offutt. Cambridge Univ. Press.
3. Software Testing M.G.Limaye TMH
4. Foundations of Software Testing, D. Grahm & Others, Cengage Learning.
5.http://nancyhoekstrxa.blogspot.com/2018/11/download-software-testing-tools.html
231
19UCS870 UML MODELING L T P C
0 0 2 1
PRE-REQUISITE :
COURSE OBJECTIVES:
To demonstrate the process of object-oriented analysis and design to software
development using CASEtools.
LIST OF EXPERIMENTS
Develop a mini project based on thefollowing
1. To develop a problemstatement.
2. Identify Use Cases and develop the Use Casemodel.
3. Identify the conceptual classes and develop a domain model with UML Class
diagram.
4. Using the identified scenarios, find the interaction between objects and represent
them usingUML Sequencediagrams.
5. Draw relevant state charts and activitydiagrams.
6. Identify the User Interface, Domain objects, and Technical services. Draw the partial
layered,logical architecture diagram with UML package diagramnotation.
7. Develop and test the Technical serviceslayer.
8. Develop and test the Domain objectslayer.
9. Develop and test the User interfacelayer.
SUGGESTED LIST OF MINI PROJECTS
1. Passport automationsystem.
2. BankingSystem
3. Library ManagementSystem
4. Online course reservationsystem
5. E-ticketing
6. Student InformationSystem
7. Conference ManagementSystem
8. RecruitmentSystem
9. Stock maintenance system.
10. Exam registration
TOTAL : 30 Periods
232
COURSE OUTCOMES:
After the successful completion of this course, the student will be able to
• Design the projects using OOconcepts. (Apply)
• Use the UML graphical notations for the appropriatediagrams.(Create)
• Use the UML analysis and design models.(Create)
• Apply appropriate design patterns(Apply)
• Convert design into code. (Create)
• Implement the modified system and test it for various scenarios. (Apply)
HARDWARE AND SOFTWARE REQUIRMENTS
HARDWARE REQUIREWMENTS:
SOFTWARE REQUIREMENTS:
A working computer system with either Windows or Linux Rational Rose Software or Visual Paradigm
Software
233
19UCS871 GAME DEVELOPMENT L T P C
1 0 0 1
COURSE OBJECTIVES :
Understand the basic concepts of game theory.
Be familiar with the repeated games.
Be familiar with the bayesian games.
REFERENCE BOOKS:
1. Action theory by V.Krishna, Academic press, 2002
2. A course in game theory by M.J.Osborne, A.Rubeinstein, MIT press.
3. Dynamic non cooperative game theory, by T.Basker and G.J.Oslder.
4. Evolutionary game theory by Jorgen W.Weibull, The MIT press.
234
235