Computerscienceandengineerings1 S8
Computerscienceandengineerings1 S8
Computerscienceandengineerings1 S8
Preamble: This course introduces students to some basic mathematical ideas and tools which are at
the core of any engineering course. A brief course in Linear Algebra familiarises students with some
basic techniques in matrix theory which are essential for analysing linear systems. The calculus of
functions of one or more variables taught in this course are useful in modelling and analysing
physical phenomena involving continuous change of variables or parameters and have applications
across all branches of engineering.
Course Outcomes: After the completion of the course the student will be able to
CO 1 solve systems of linear equations, diagonalize matrices and characterise quadratic forms
CO 2 compute the partial and total derivatives and maxima and minima of multivariable functions
CO 3 compute multiple integrals and apply them to find areas and volumes of geometrical shapes,
mass and centre of gravity of plane laminas
CO 4 perform various tests to determine whether a given series is convergent, absolutely
convergent or conditionally convergent
CO 5 determine the Taylor and Fourier series expansion of functions and learn their applications.
Mapping of course outcomes with program outcomes
PO PO 2 PO 3 PO 4 PO 5 PO 6 PO PO 8 PO 9 PO 10 PO 11 PO 12
1 7
CO 1 3 3 3 3 2 1 1 2 2
CO 2 3 3 3 3 2 1 1 2 2
CO 3 3 3 3 3 2 1 1 2 2
CO 4 3 2 3 2 1 1 1 2 2
CO 5 3 3 3 3 2 1 1 2 2
Assessment Pattern
Attendance : 10 marks
Continuous Assessment Test (2 numbers) : 25 marks
Assignment/Quiz/Course project : 15 marks
Assignments: Assignment should include specific problems highlighting the applications of the
methods introduced in this course in science and engineering.
End Semester Examination Pattern: There will be two parts; Part A and Part B. Part A contain 10
questions with 2 questions from each module, having 3 marks for each question. Students should
answer all questions. Part B contains 2 questions from each module of which student should answer
any one. Each question can have maximum 2 sub-divisions and carry 14 marks.
Course Outcome 1 (CO1): Solve systems of linear equations, diagonalize matrices and characterise
quadratic forms
𝑥
1. A is a real matrix of order 3 × 3and 𝑋 = 𝑦 . What can you say about the solution of 𝐴𝑋 =
𝑧
0if rank of A is 1? 2 ?3?
3 0 2
2. Given𝐴 = 0 2 0 , find an orthogonal matrix 𝑃that diagonalizes A.
−2 0 0
3. Find out what type of conic section the following quadratic form represents
−2 2 −3
4. The matrix 𝐴 = 2 1 −6 has an eigen value5 with corresponding Eigen vector𝑋 =
−1 −2 0
1
2 . Find 𝐴 𝑋
−1
Course Outcome 2 (CO2): compute the partial and total derivatives and maxima and minima of
multivariable functions
1. Find the slope of the surface 𝑧 = 𝑥 𝑦 + 5𝑦 in the x-direction at the point (1,-2)
2. Given the function 𝑤 = 𝑥𝑦 + 𝑧, use chain rule to find the instantaneous rate of change of
𝑤at each point along the curve 𝑥 = 𝑐𝑜𝑠𝑡, 𝑦 = 𝑠𝑖𝑛𝑡, 𝑧 = 𝑡
3. Determine the dimension of rectangular box open at the top , having a volume 32 cubic ft
and requiring the least amount of material for it’s construction.
Course Outcome 3(CO3): compute multiple integrals and apply them to find areas and volumes of
geometrical shapes, mass and centre of gravity of plane laminas.
2. Explain how you would find the volume under the surface 𝑧 = 𝑓(𝑥, 𝑦)and over a specific
region 𝐷in the 𝑥𝑦plane using (i) double integral (ii) triple integral?
3. Find the mass and centre of gravity of a triangular lamina with vertices (0,0), (2,1), (0,3) if
the density function is 𝑓(𝑥, 𝑦) = 𝑥 + 𝑦
Course Outcome 4 (CO4): perform various tests to determine whether a given series is convergent,
absolutely convergent or conditionally convergent.
1. What is the difference between a sequence and a series and when do you say that they are
convergent? Divergent?
∞
2. Determine whether the series ∑ converges or diverges.
∞( )
3. Is the series ∑ convergent? Absolutely convergent? Conditionally convergent?
Course Outcome 5 (CO5): determine the Taylor and Fourier series expansion of functions and learn
their applications.
𝑓(𝑥) = (1 + 𝑥) for|𝑥| < 1where 𝑘is any real number. What happens if 𝑘is a positive
integer?
2. Use Maclaurin series of 𝑙𝑛(1 + 𝑥), −1 < 𝑥 ≤ 1to find an approximate value of𝑙𝑛2.
3. Find the Fourier series of the function𝑓(𝑥) = 𝑥 , −2 ≤ 𝑥 < 2, 𝑓(𝑥 + 4) = 𝑓(𝑥). Hence
using Parseval’s identity prove that 1 + + + … =
4. Expand the function 𝑓(𝑥) = 𝑥 (0 < 𝑥 < 1⁄2) into a (i) Fourier sine series (ii) Fourier cosine
series.
Model Question paper
QP CODE: PAGES:3
Reg No:______________
Name :______________
APJ ABDUL KALAM TECHNOLOGICAL UNIVERSITY FIRST SEMESTER B.TECH DEGREE EXAMINATION,
MONTH & YEAR
(2019-Scheme)
PART A
1 2 −1
1. Determine the rank of the matrix 𝐴 = −2 −4 2 .
3 6 −3
2 0
2. Write down the eigen values of = . What are the eigen values of 𝑃 𝐴𝑃 where
0 −1
−4 2
𝑃= ?
3 −1
3. Find 𝑓 (1,3) and 𝑓 (1,3) for the function 𝑓(𝑥, 𝑦) = 2𝑥 𝑦 + 2𝑦 + 4𝑥.
4. Show that the function 𝑢(𝑥, 𝑡) = sin (𝑥 − 𝑐𝑡) is a solution of the equation =𝑐
.
5. Use double integral to find the area of the region enclosed between the parabolas 𝑦 = 𝑥
and the line 𝑦 = 2𝑥.
6. Use polar coordinates to evaluate the area of the region bounded by 𝑥 + 𝑦 = 4, the line
𝑦 = 𝑥 and the y axis in the first quadrant
7. Test the convergence of the series ∑∞ .
8. Test the convergence of the alternating series ∑∞ (−1) using Leibnitz test.
9. Find the Taylor series expansion of 𝑠𝑖𝑛𝜋𝑥about𝑥 = .
10. Find the values to which the Fourier series of
𝑓(𝑥) = 𝑥for−𝜋 < 𝑥 < 𝜋, with 𝑓(𝑥 + 2𝜋) = 𝑓(𝑥) converges (10x3=30)
PART B
(Answer one full question from each module, each question carries 14 marks)
Module -I
11. (a) Solve the following system of equations
𝑦 + 𝑧 − 2𝑤 = 0
2𝑥 − 3𝑦 − 3𝑧 + 6𝑤 = 2
4𝑥 + 𝑦 + 𝑧 − 2𝑤 = 4
−2 2 −3
(b) Find the eigen values and eigen vectors of the matrix 2 1 −6
−1 −2 0
−1 2 −2
12. (a) Diagonalize the matrix 2 4 1
2 1 4
(b) What kind of conic section the quadratic form3𝑥 + 22𝑥 𝑥 + 3𝑥 = 0 represents?
Transform it to principal axes.
Module - II
13. (a) Find the local linear approximation to 𝑓(𝑥, 𝑦) = 𝑥 + 𝑦 at the point (3, 4).Use it to
approximate 𝑓(3.04,3.98)
(b) Let 𝑤 = 𝑥 + 𝑦 + 𝑧 , 𝑥 = 𝑐𝑜𝑠𝜃, 𝑦 = 𝑠𝑖𝑛𝜃, 𝑧 = 𝑡𝑎𝑛𝜃. Use chain rule to find when
𝜃= .
14. (a) Let 𝑧 = 𝑓(𝑥, 𝑦) where 𝑥 = 𝑟𝑐𝑜𝑠𝜃, 𝑦 = 𝑟𝑠𝑖𝑛𝜃, prove that
+ = + .
(b) Locate all relative maxima, relative minima and saddle points
𝑓(𝑥, 𝑦) = 𝑥𝑦 + + (𝑎 ≠ 0, 𝑏 ≠ 0).
Module - III
15. (a) Evaluate∬ (2𝑥 𝑦 + 9𝑦 ) 𝑑𝑥𝑑𝑦 where D is the region bounded by 𝑦 = 𝑥 and 𝑦 = 2√𝑥
(b) Evaluate ∫ ∫ 𝑒 𝑑𝑥𝑑𝑦 changing the order of integration.
√
16. (a) Find the volume of the solid bounded by the cylinder 𝑥 + 𝑦 = 4 and the planes
𝑦 + 𝑧 = 4 and 𝑧 = 0..
(b) Evaluate ∭ 1 − 𝑥 − 𝑦 − 𝑧 𝑑𝑥𝑑𝑦𝑑𝑧, taken throughout the volume of
the sphere 𝑥 + 𝑦 + 𝑧 = 1, by transforming to spherical polar coordinates
Module - IV
17. (a) Test the convergence of the series
(i) ∑∞ (ii) ∑∞
!
( )!
(b) Determine the convergence or divergence of the series ∑∞ (−1)
( )!
18. (a) Check whether the series ∑∞ (−1) ( )!
is absolutely convergent, conditionally
convergent or divergent.
. . . . . .
(b) Test the convergence of the series 1 + .
+ . .
+ . . .
+⋯
Module - V
19. (a) Obtain the Fourier series of for𝑓(𝑥) = 𝑒 , in the interval 0 < 𝑥 < 2𝜋.with 𝑓 𝑥 +
( )
2𝜋 = 𝑓(𝑥). Hence deduce the value of∑∞ .
𝑖𝑓 0 < 𝑥 <
(b) Find the half range sine series of 𝑓(𝑥) = ( )
𝑖𝑓 <𝑥<𝐿
20. (a)Expand (1 + 𝑥) .as a Taylor series about 𝑥 = 0and state the region of convergence of
the series.
(b) Find the Fourier series for 𝑓(𝑥) = 𝑥 in the interval −𝜋 < 𝑥 < 𝜋
Syllabus
Systems of linear equations, Solution by Gauss elimination, row echelon form and rank of a matrix,
fundamental theorem for linear systems (homogeneous and non-homogeneous, without proof),
Eigen values and eigen vectors. Diagonaliztion of matrices, orthogonal transformation, quadratic
forms and their canonical forms.
Concept of limit and continuity of functions of two variables, partial derivatives, Differentials, Local
Linear approximations, chain rule, total derivative, Relative maxima and minima, Absolute maxima
and minima on closed and bounded set.
(Text 1: Relevant topics from sections 14.1, 14.2, 14.3, 14.5, 14.6, 14.8)
Double integrals (Cartesian), reversing the order of integration, Change of coordinates (Cartesian to
polar), finding areas and volume using double integrals, mass and centre of gravity of
inhomogeneous laminas using double integral. Triple integrals, volume calculated as triple integral,
triple integral in cylindrical and spherical coordinates (computations involving spheres, cylinders).
Module 4 (sequences and series)
(Text 1: Relevant topics from sections 9.1, 9.3, 9.4, 9.5, 9.6)
Convergence of sequences and series, convergence of geometric series and p-series(without proof),
test of convergence (comparison, ratio and root tests without proof); Alternating series and Leibnitz
test, absolute and conditional convergence.
(Text 1: Relevant topics from sections 9.8, 9.9. Text 2: Relevant topics from sections 11.1, 11.2,
11.6 )
Taylor series (without proof, assuming the possibility of power series expansion in appropriate
domains), Binomial series and series representation of exponential, trigonometric, logarithmic
functions (without proofs of convergence); Fourier series, Euler formulas, Convergence of Fourier
series (without proof), half range sine and cosine series, Parseval’s theorem (without proof).
Text Books
2. Erwin Kreyszig, Advanced Engineering Mathematics, 10 thEdition, John Wiley & Sons, 2016.
Reference Books
2. G.B. Thomas and R.L. Finney, Calculus and Analytic geometry, 9 th Edition, Pearson, Reprint,
2002.
4. Veerarajan T., Engineering Mathematics for first year, Tata McGraw-Hill, New Delhi, 2008.
1.2 Row echelon form, finding rank from row echelon form, fundamental 3
theorem for linear systems
3.3 Finding areas and volumes, mass and centre of gravity of plane laminas 3
4.3 Alternating series and Leibnitz test, absolute and conditional convergence 2
Preamble: The aim of the Engineering Physics Program is to offer students a solid background in the
fundamentals of Physics and to impart that knowledge in engineering disciplines. The
program is designed to develop scientific attitudes and enable the students to correlate
the concepts of Physics with the core programmes
Course Outcomes: After the completion of the course the student will be able to
CO 2 Apply the interaction of light with matter through interference, diffraction and identify
these phenomena in different natural optical processes and optical instruments.
CO 3 Analyze the behaviour of matter in the atomic and subatomic level through the principles of
quantum mechanics to perceive the microscopic processes in electronic devices.
CO 4 Classify the properties of magnetic materials and apply vector calculus to static magnetic
fields and use Maxwell’s equations to diverse engineering problems
CO 5 Analyze the principles behind various superconducting applications, explain the working of
solid state lighting devices and fibre optic communication system
PO 1 PO 2 PO 3 PO 4 PO 5 PO 6 PO 7 PO 8 PO 9 PO 10 PO 11 PO 12
CO 1 3 2 1 2 1
CO 2 3 2 1 2 1
CO 3 3 2 1 2 1
CO 4 3 1 1 2 1
CO 5 3 1 1 2 1
Assessment Pattern
Mark distribution
Attendance : 10 marks
Continuous Assessment Test (2 numbers) : 25 marks
Assignment/Quiz/Course project : 15 marks
End Semester Examination Pattern: There will be two parts; Part A and Part B. Part A contain 10
questions with 2 questions from each module, having 3 marks for each question. Students should
answer all questions. Part B contains 2 questions from each module of which student should answer
any one. Each question can have maximum 2 sub-divisions and carry 14 marks.
3. (a) Explain the formation of Newton’s rings and obtain the expression for radii of bright and
dark rings in reflected system. Also explain how it is used to determine the wavelength of
a monochromatic source of light.
(b) A liquid of refractive index µ is introduced between the lens and glass plate.
What happens to the fringe system? Justify your answer.
3. (a) Solve Schrodinger equation for a particle in a one dimensional box and obtain its
energy eigen values and normalised wave functions.
(b) Calculate the first three energy values of an electron in a one dimensional box of width
1 A0 in electron volt.
3. (a) Starting from Maxwell’s equations, derive the free space electromagnetic wave
equation and show that velocity of electromagnetic wave is 1/ (µo εo) ½
(b) An electromagnetic wave is described by E = 100 exp 8πi [10 14 t – (10 6 z / 3)] V/m.
Find the direction of propagation of the wave,speed of the wave and magnetic flux
density in the wave.
QP CODE: PAGES:3
Reg No:______________
Name :______________
APJ ABDUL KALAM TECHNOLOGICAL UNIVERSITY FIRST SEMESTER B.TECH DEGREE EXAMINATION,
MONTH & YEAR
PART A
4. Diffraction of light is not as evident in daily experience as that of sound waves. Give reason.
5. State and explain Heisenberg’s Uncertainty principle. With the help of it explain natural
line broadening.
PART B
Answer any one full question from each module. Each question carries 14 Marks
Module 1
11. (a) Derive the differential equation of damped harmonic oscillator and deduce its
solution.Discuss the cases of over damped, critically damped and under damped cases. (10)
(b) The frequency of a tuning fork is 500 Hz and its Q factor is 7×10 4. Find the relaxation time.
Also calculate the time after which its energy becomes 1/10 of its initial undamped value.(4)
12. (a) Derive an expression for the velocity of propagation of a transverse wave in a stretched
string. Deduce laws of transverse vibrations. (10)
(b) The equation of transverse vibration of a stretched string is given by y =0.00327 sin (72.1x-
2.72t)m, in which the numerical constants are in S.I units. Evaluate (i) Amplitude (ii) Wavelength
(iii) Frequency and (iv)Velocity of the wave. (4)
Module 2
13.(a)Explain the formation of Newton’s rings and show that the radius of dark ring is
proportional to the square root of natural numbers. How can we use Newton’s rings
experiment to determine the refractive index of a liquid. (10)
(b) Two pieces of plane glass are placed together with a piece of paper between two at one
end. Find the angle of the wedge in seconds if the film is viewed with a monochromatic light of
wavelength 4800Å. Given β = 0.0555 cm. (4)
14. (a) Explain the diffraction due to a plane transmission grating. Obtain the grating equation. (10)
(b) A grating has 6000 lines per cm. Find the angular separation of the two yellow lines
of mercury of wavelengths 577 nm and 579 nm in the second order. (4)
Module 3
(b) An electron is confined to one dimensional potential box of length 2Å. Calculate the energies
corresponding to the first and second quantum states in eV. (4)
16.(a) Classify nanomaterials based on dimensionality of quantum confinement and explain the
following nanostructures. (i) nano sheets (ii) nano wires (iii) quantum dots. (10)
(b) Find the de Broglie wavelength of electron whose kinetic energy is 15 eV. (4)
Module 4
17.(a) State Poynting’s Theorem. Calculate the value of Poynting vector at the surface of the sun if
the power radiated by the sun is 3.8 x 10 26 W and its radius is 7 X 10 8 m. (5)
(b) Distinguish between paramagnetic, diamagnetic and ferromagnetic materials. (9)
18.(a) Starting from Maxwell’s Equations, derive electromagnetic wave equations in free space. (10)
(b) If the magnitude of H in a plane wave is 1 A/m, find the magnitude of E in free space. (4)
Module 5
19.(a) Show that superconductors are perfect diamagnets. Distinguish between Type I and
20.(a) Define numerical aperture of an optic fibre and derive an expression for the NA of a step
index fibre with a neat diagram. (10)
(b) Calculate the numerical aperture and acceptance angle of a fibre with a core refractive index
of 1.54 and a cladding refractive index of 1.50 when the fibre is inside water of refractive
index 1.33. (4) (14x5=70)
Syllabus
ENGINEERING PHYSICS A
(FOR CIRCUIT BRANCHES)
Module 1
Oscillations and Waves
Harmonic oscillations, Damped harmonic motion-Derivation of differential equation and its solution,
Over damped, Critically damped and Under damped Cases, Quality factor-Expression, Forced
oscillations-Differential Equation-Derivation of expressions for amplitude and phase of forced
oscillations, Amplitude Resonance-Expression for Resonant frequency, Quality factor and Sharpness
of Resonance, Electrical analogy of mechanical oscillators
Wave motion- Derivation of one dimensional wave equation and its solution, Three dimensional
wave equation and its solution (no derivation), Distinction between transverse and longitudinal
waves, Transverse vibration in a stretched string, Statement of laws of vibration
Module 2
Wave Optics
Interference of light-Principle of superposition of waves, Theory of thin films - Cosine law (Reflected
system), Derivation of the conditions of constructive and destructive Interference, Interference due
to wedge shaped films -Determination of thickness and test for optical planeness, Newton’s rings -
Measurement of wavelength and refractive index, Antireflection coatings
Module 3
Quantum Mechanics & Nanotechnology
Introduction for the need of Quantum mechanics, Wave nature of Particles, Uncertainty principle,
Applications-Absence of electrons inside a nucleus and Natural line broadening mechanism,
Formulation of time dependent and independent Schrodinger wave equations-Physical meaning of
wave function, Particle in a one dimensional box- Derivation for normalised wave function and
energy eigen values, Quantum Mechanical Tunnelling (Qualitative)
Introduction to nanoscience and technology, Increase in surface to volume ratio for nanomaterials,
Quantum confinement in one dimension, two dimension and three dimension-Nano sheets, Nano
wires and Quantum dots, Properties of nanomaterials-mechanical, electrical and optical,
Applications of nanotechnology (qualitative ideas)
Module 4
Magnetism & Electro Magnetic Theory
Magnetic field and Magnetic flux density, Gauss’s law for Magnetic flux density, Ampere’s Circuital
law, Faraday’s law in terms of EMF produced by changing magnetic flux, Magnetic permeability and
susceptibility, Classification of magnetic materials-para, dia and ferromagnetic materials
Fundamentals of vector calculus, concept of divergence, gradient and curl along with physical
significance, Line, Surface and Volume integrals, Gauss divergence theorem & Stokes’ theorem,
Equation of continuity, Derivation of Maxwell’s equations in vacuum, Comparison of displacement
current with conduction current. Electromagnetic waves, Velocity of Electromagnetic waves in free
space, Flow of energy and Poynting’s vector (no derivation)
Module 5
Superconductivity & Photonics
Superconducting phenomena, Meissner effect and perfect diamagnetism, Types of superconductors-
Type I and Type II, BCS Theory (Qualitative), High temperature superconductors-Applications of
super conductivity
Introduction to photonics-Photonic devices-Light Emitting Diode, Photo detectors -Junction and PIN
photodiodes, Solar cells-I-V Characteristics, Optic fibre-Principle of propagation of light, Types of
fibres-Step index and Graded index fibres, Numerical aperture –Derivation, Fibre optic
communication system (block diagram), Industrial, Medical and Technological applications of optical
fibre, Fibre optic sensors-Intensity Modulated and Phase modulated sensors.
Text Books
2. H.K.Malik , A.K. Singh, “Engineering Physics” McGraw Hill Education, Second Edition 2017
Reference Books
1. Arthur Beiser, “Concepts of Modern Physics ", Tata McGraw Hill Publications, 6th Edition
2003
2. D.K. Bhattacharya, Poonam Tandon, “Engineering Physics”, Oxford University Press, 2015
7. Halliday, Resnick, Walker, “Fundamentals of Physics’’, John Wiley & Sons.Inc, 2001
10. I. Dominic and. A. Nahari, “A Text Book of Engineering physics”, Owl Books Publishers,
Revised edition, 2016
Course Contents and Lecture Schedule
No Topic No. of Lectures
1 Oscillations and Waves (9 hours)
3.1 Introduction for the need of Quantum mechanics, Wave nature of 2 hrs
Particles, Uncertainty principle, Applications-Absence of electrons
inside a nucleus and Natural line broadening mechanism
3.2 Formulation of time dependent and independent Schrodinger wave 4 hrs
equations-Physical Meaning of wave function, Particle in a one
dimensional box- Derivation for normalised wave function and energy
eigen values, Quantum Mechanical Tunnelling (Qualitative)
3.3 Introduction to nanoscience and technology, Increase in surface to 2 hrs
volume ratio for nanomaterials, Quantum confinement in one
dimension, two dimension and three dimension-Nano sheets, Nano
wires and Quantum dots
3.4 Properties of nanomaterials-mechanical, electrical and optical 1 hr
Applications of nanotechnology (qualitative ideas)
4 Magnetism & Electro Magnetic Theory (9 hours)
4.1 Magnetic field and Magnetic flux density, Gauss’s law for Magnetic flux 2 hrs
density, Ampere’s Circuital law, Faraday’s law in terms of EMF
produced by changing magnetic flux
4.2 Explanation for Magnetic permeability and susceptibility Classification 1 hr
of magnetic materials- para, dia and ferromagnetic materials
4.3 Fundamentals of vector calculus, concept of divergence, gradient and 2 hrs
curl along with physical significance, Line, Surface and Volume integrals,
Gauss divergence theorem & Stokes’ theorem
4.4 Equation of continuity, Derivation of Maxwell’s equations in vacuum, 4 hrs
Comparison of displacement current with conduction current.
Electromagnetic waves, Velocity of Electromagnetic waves in free
space, Flow of energy and Poynting’s vector (no derivation)
5 Superconductivity &Photonics (9hours)
5.1 Super conducting Phenomena, Meissner effect and perfect 2 hrs
diamagnetism, Types of superconductors-Type I and Type II
5.2 BCS Theory (Qualitative), High temperature superconductors, 2 hrs
Applications of super conductivity
5.3 Introduction to photonics-Photonic devices-Light Emitting Diode, Photo 2 hrs
detectors -Junction and PIN photodiodes, Solar cells-I-V Characteristics
5.4 Optic fibre-Principle of propagation of light, Types of fibres-Step index 3 hrs
and Graded index fibres, Numerical aperture –Derivation, Fibre optic
communication system (block diagram), Industrial, Medical and
Technological applications of optical fibre, Fibre optic sensors-Intensity
Modulated and Phase modulated sensors
PHT ENGINEERING PHYSICS B Category L T P CREDIT Year of
110 (FOR NON-CIRCUIT BRANCHES) Introduction
BSC 3 1 0 4 2019
Preamble: The aim of the Engineering Physics program is to offer students a solid background in the
fundamentals of Physics and to impart that knowledge in engineering disciplines. The
program is designed to develop scientific attitudes and enable the students to
correlate the concepts of Physics with the core programmes
Course Outcomes: After the completion of the course the student will be able to
CO 2 Apply the interaction of light with matter through interference, diffraction and identify
these phenomena in different natural optical processes and optical instruments.
CO 3 Analyze the behaviour of matter in the atomic and subatomic level through the principles
of quantum mechanics to perceive the microscopic processes in electronic devices.
CO 4 Apply the knowledge of ultrasonics in non-destructive testing and use the principles of
acoustics to explain the nature and characterization of acoustic design and to provide a safe
and healthy environment
CO 5 Apply the comprehended knowledge about laser and fibre optic communication systems in
various engineering applications
PO 1 PO 2 PO 3 PO 4 PO 5 PO 6 PO 7 PO 8 PO 9 PO PO PO
10 11 12
CO 1 3 2 1 2 1
CO 2 3 2 1 2 1
CO 3 3 2 1 2 1
CO 4 3 1 2 1
CO 5 3 2 1 2 1
Assessment Pattern
Mark distribution
End Semester Examination Pattern: There will be two parts; Part A and Part B. Part A contain 10
questions with 2 questions from each module, having 3 marks for each question. Students should
answer all questions. Part B contains 2 questions from each module of which student should answer
any one. Each question can have maximum 2 sub-divisions and carry 14 marks.
QP CODE: PAGES:3
Reg No:______________
Name :______________
APJ ABDUL KALAM TECHNOLOGICAL UNIVERSITY FIRST SEMESTER B.TECH DEGREE EXAMINATION,
MONTH & YEAR
PART A
4. Diffraction of light is not as evident in daily experience as that of sound waves. Give reason.
5. State and explain Heisenberg’s Uncertainty principle. With the help of it explain natural
line broadening.
7. Define sound intensity level. Give the values of threshold of hearing and threshold of pain.
10. Distinguish between step index and graded index fibre. (10x3=30)
PART B
Answer any one full question from each module. Each question carries 14 Marks
Module 1
11. (a) Derive the differential equation of damped harmonic oscillator and deduce its
solution. Discuss the cases of over damped, critically damped and under damped
cases. (10)
(b) The frequency of a tuning fork is 500 Hz and its Q factor is 7×104. Find the relaxation
time. Also calculate the time after which its energy becomes 1/10 of its initial
undamped value. (4)
12. (a) Derive an expression for the velocity of propagation of a transverse wave in a stretched
string. Deduce laws of transverse vibrations. (10)
(b) The equation of transverse vibration of a stretched string is given by y =0.00327 sin
(72.1x-2.72t ) m, in which the numerical constants are in S.I units. Evaluate (i)
Amplitude (ii) Wavelength (iii) Frequency and (iv) Velocity of the wave. (4)
Module 2
13. (a) Explain the formation of Newton’s rings and show that the radius of dark ring is
proportional to the square root of natural numbers. How can we use Newton’s rings
experiment to determine the refractive index of a liquid? (10)
(b) Two pieces of plane glass are placed together with a piece of paper between two at
one end. Find the angle of the wedge in seconds if the film is viewed with a
monochromatic light of wavelength 4800Å. Given β = 0.0555 cm. (4)
14. (a) Explain the diffraction due to a plane transmission grating. Obtain the grating equation.
(10)
(b) A grating has 6000 lines per cm. Find the angular separation of the two yellow lines
of mercury of wavelengths 577 nm and 579 nm in the second order. (4)
Module 3
15. (a) Derive time dependent and independent Schrodinger equations. (10)
(b) An electron is confined to one dimensional potential box of length 2Å. Calculate the
energies corresponding to the first and second quantum states in eV. (4)
16. (a) Classify nanomaterials based on dimensionality of quantum confinement and explain the
following nanostructures. (i) nano sheets (ii) nano wires (iii) quantum dots. (10)
(b) Find the de Broglie wavelength of electron whose kinetic energy is 15 eV. (4)
Module 4
17. (a) Explain reverberation and reverberation time? What is the significance of
Reverberation time. Explain the factors affecting the acoustics of a building and their
corrective measures? (10)
(b) The volume of a hall is 3000 m3. It has a total absorption of 100m2 sabine. If the hall is filled
with audience who add another 80 m2sabine, then find the difference in reverberation time. (4)
18. (a) With a neat diagram explain how ultrasonic waves are produced by piezoelectric
oscillator. Also discuss the piezoelectric method of detection of ultrasonic waves. (10)
(b) An ultrasonic source of 0.09 MHz sends down a pulse towards the sea bed which
returns after 0.55 sec. The velocity of sound in sea water is 1800 m/s. Calculate the
depth of the sea and the wavelength of the pulse. (4)
Module 5
19. (a) Outline the construction and working of Ruby laser. (8)
20. (a) Define numerical aperture of an optic fibre and derive an expression for the NA of a step
index fibre with a neat diagram. (10)
(b) An optical fibre made with core of refractive index 1.5 and cladding with a fractional
index difference of 0.0006. Find refractive index of cladding and numerical aperture. (4)
(14x5=70)
SYLLABUS
Module 1
Oscillations and Waves
Harmonic oscillations, Damped harmonic motion-Derivation of differential equation and its solution,
Over damped, Critically damped and Under damped Cases, Quality factor-Expression, Forced
oscillations-Differential Equation-Derivation of expressions for amplitude and phase of forced
oscillations, Amplitude Resonance-Expression for Resonant frequency, Quality factor and Sharpness
of Resonance, Electrical analogy of mechanical oscillators
Wave motion- Derivation of one dimensional wave equation and its solution, Three dimensional
wave equation and its solution (no derivation), Distinction between transverse and longitudinal
waves, Transverse vibration in a stretched string, Statement of laws of vibration
Module 2
Wave Optics
Interference of light-Principle of superposition of waves, Theory of thin films - Cosine law (Reflected
system), Derivation of the conditions of constructive and destructive Interference, Interference due
to wedge shaped films -Determination of thickness and test for optical planeness, Newton’s rings -
Measurement of wavelength and refractive index, Antireflection coatings
Module 3
Quantum Mechanics & Nanotechnology
Introduction for the need of Quantum mechanics, Wave nature of Particles, Uncertainty principle,
Applications-Absence of electrons inside a nucleus and Natural line broadening Mechanism,
Formulation of time dependent and independent Schrodinger wave equations-Physical Meaning of
wave function, Particle in a one dimensional box- Derivation for normalised wave function and
energy eigen values, Quantum Mechanical Tunnelling (Qualitative)
Introduction to nanoscience and technology, Increase in surface to volume ratio for nanomaterials,
Quantum confinement in one dimension, two dimension and three dimension-Nano sheets, Nano
wires and Quantum dots, Properties of nanomaterials-mechanical, electrical and optical,
Applications of nanotechnology (qualitative ideas)
Module 4
Acoustics & Ultrasonics
Acoustics, Classification of sound-Musical sound-Noise, Characteristics of Musical Sounds-Pitch or
frequency-Loudness or Intensity-Measurement of Intensity level-Decibel-Quality or timbre,
Absorption coefficient, Reverberation-Reverberation time-Significance- Sabine’s formula (no
derivation), Factors affecting architectural acoustics and their remedies
Module 5
Laser and Fibre optics
Properties of laser, Absorption and emission of radiation, Spontaneous and stimulated emission,
Einstein’s coefficients (no derivation), Population inversion, Metastable states, basic components of
laser, Active medium, Pumping mechanism, Optical resonant cavity, working principle, Construction
and working of Ruby laser and Helium neon laser ,Construction and working of semiconductor
laser(Qualitative) ,Applications of laser, Holography, Difference between hologram and photograph,
Recording of hologram and reconstruction of image, Applications
Optic fibre-Principle of propagation of light, Types of fibres-Step index and Graded index fibres,
Numerical aperture –Derivation, Fibre optic communication system (block diagram), Industrial,
Medical and Technological applications, Fibre optic sensors-Intensity Modulated and Phase
modulated sensors
Text Books
1. M.N.Avadhanulu, P.G.Kshirsagar,TVS Arun Murthy “A Text book of Engineering Physics”, S.Chand
&Co., Revised Edition, 2019.
2. H.K.Malik , A.K. Singh, “Engineering Physics” McGraw Hill Education, Second Edition, 2017.
Reference Books
1. Arthur Beiser, “Concepts of Modern Physics ", Tata McGraw Hill Publications, 6th Edition 2003
2. D.K. Bhattacharya, Poonam Tandon, “Engineering Physics”, Oxford University Press, 2015
3. Md.N.Khan & S.Panigrahi “Principles of Engineering Physics 1&2”, Cambridge University Press,
2016
7. B. B. Laud, “Lasers and Non linear optics”, New age International Publishers, 2nd Edition ,2005
9. I. Dominic and. A. Nahari, “A Text Book of Engineering physics”, Owl Books Publishers, Revised
edition, 2016
Course Contents and Lecture Schedule
No Topic No. of Lectures
1 Oscillations and Waves ( 9 hours)
3.1 Introduction for the need of Quantum mechanics, Wave nature of 2 hrs
Particles, Uncertainty principle, Applications-Absence of electrons
inside a nucleus and Natural line broadening mechanism
3.2 Formulation of time dependent and independent Schrodinger wave 4 hrs
equations-Physical Meaning of wave function, Particle in a one
dimensional box- Derivation for normalised wave function and energy
eigen values, Quantum Mechanical Tunnelling (Qualitative)
3.3 Introduction to nanoscience and technology, Increase in surface to 2 hrs
volume ratio for nanomaterials, Quantum confinement in one
dimension, two dimension and three dimension-Nano sheets, Nano
wires and Quantum dots
3.4 Properties of nanomaterials-mechanical, electrical and optical 1 hr
Applications of nanotechnology (qualitative ideas)
4 Acoustics & Ultrasonics (9hrs)
Preamble: To enable the students to acquire knowledge in the concepts of chemistry for engineering
applications and to familiarize the students with different application oriented topics like
spectroscopy, electrochemistry, instrumental methods etc. Also familiarize the students with topics
like mechanism of corrosion, corrosion prevention methods, SEM, stereochemistry, polymers,
desalination etc., which enable them to develop abilities and skills that are relevant to the study and
practice of chemistry.
Course outcomes: After the completion of the course the students will be able to
CO 1 Apply the basic concepts of electrochemistry and corrosion to explore its possible
applications in various engineering fields.
CO 2 Understand various spectroscopic techniques like UV-Visible, IR, NMR and its
applications.
CO 3 Apply the knowledge of analytical method for characterizing a chemical mixture or a
compound. Understand the basic concept of SEM for surface characterisation of
nanomaterials.
CO 4 Learn about the basics of stereochemistry and its application. Apply the knowledge of
conducting polymers and advanced polymers in engineering.
CO 5 Study various types of water treatment methods to develop skills for treating
wastewater.
PO 1 PO 2 PO 3 PO 4 PO 5 PO 6 PO 7 PO 8 PO 9 PO PO PO
10 11 12
CO 1 1 2 1
CO 2 1 1 1 2
CO 3 1 1 1 2
CO 4 2 1
CO 5 1 1 3
Assessment Pattern
End Semester Examination Pattern: There will be two parts- Part A and Part B. Part A contains 10
questions (2 questions from each module), having 3 marks for each question. Students should
answer all questions. Part B contains 2 questions from each module, of which student should
answer any one. Each question can have maximum 2 subdivisions and carries 14 marks.
3. (a) Explain how electroless plating copper and nickel are carried out (10 Marks)
(b) Calculate the emf of the following cell at 30oC, Z n / Zn 2+ (0.1M) // Ag+ (0.01M) // Ag.
3. (a) What is Chemical shift? What are factors affecting Chemical shift? How 1H NMR spectrum of
CH3COCH2Cl interpreted using the concept of chemical shift. (10 Marks)
(b) Calculate the force constant of HF molecule, if it shows IR absorption at 4138 cm -1. Given that
atomic masses of hydrogen and fluorine are 1u and 19u respectively. (4 Marks)
3. (a) What are conducting polymers? How it is classified? Give the preparation of polyaniline
(10 Marks)
(b) Standard hard water contains 20 g of CaCO3 per liter,50 mL of this required 30mL of EDTA
solution, 50mL of sample water required 20mL of EDTA solution. 50mL sample water after boiling
required 14 mL EDTA solution. Calculate the temporary hardness of the given sample of water, in
terms of ppm. (4 Marks)
Total Pages:
Reg No.:_______________ Name:__________________________
PART A
Answer all questions, each carries 3 marks Marks
1 What is potentiometric titration? How the end point is determined graphically? (3)
2 What is Galvanic series? How is it different from electrochemical series? (3)
3 Which of the following molecules can give IR absorption? Give reason? (3)
(a) O2 (b) H2O (c) N2 (d) HCl
4 Which of the following molecules show UV-Visible absorption? Give reason. (3)
(a) Ethane (b) Butadiene (c) Benzene
5 What are the visualization techniques used in TLC? (3)
6 Write the three important applications of nanomaterials. (3)
7 Draw the Fischer projection formula and find R-S notation of (3)
PART B
Answer any one full question from each module, each question carries 14 marks
Module 1
11 a) Give the construction of Li-ion cell. Give the reactions that take place at the (10)
electrodes during charging and discharging. What happens to anodic material when
the cell is 100% charged.
b) Calculate the standard electrode potential of Cu, if its electrode potential at 25 °C (4)
2+
is 0.296 V and the concentration of Cu is 0.015 M.
OR
12 a) Explain the mechanism of electrochemical corrosion of iron in oxygen rich and oxygen (10)
deficient acidic and basic environments.
b) Given below are reduction potentials of some species (4)
Use the above data to examine whether the acids, dil. HCl and dil. H2SO4 , can be used
to provide acid medium in redox titrations involving KMnO4.
Module 2
13 a) What is spin-spin splitting? Draw the NMR spectrum of (i) CH3 CH2CH2 Br (ii) (10)
CH3CH(Br)CH3 Explain how NMR spectrum can be used to identify the two isomers.
b) A dye solution of concentration 0.08M shows absorbance of 0.012 at 600 nm; while a (4)
test solution of same dye shows absorbance of 0.084 under same conditions. Find the
concentration of the test solution.
OR
14 a) Explain the basic principle of UV-Visible spectroscopy. What are the possible (10)
electronic transitions? Explain with examples.
b) Sketch the vibrational modes of CO2 and H2O. Which of them are IR active? (4)
Module 3
15 a) Explain the principle, instrumentation and procedure involved in gas chromatography. (10)
b) Explain the DTA of CaC2O4.H2O with a neat sketch. (4)
OR
16 a) Explain the various chemical methods used for the synthesis of nanomaterial (10)
b) How TGA is used to analyse the thermal stability of polymers? (4)
Module 4
Syllabus
Module 1
Introduction - Differences between electrolytic and electrochemical cells - Daniel cell - redox
reactions - cell representation. Different types of electrodes (brief) - Reference electrodes - SHE -
Calomel electrode - Glass Electrode - Construction and Working. Single electrode potential -
definition - Helmholtz electrical double layer -Determination of E0 using calomel
electrode.Determination of pH using glass electrode.Electrochemical series and its applications. Free
energy and EMF - Nernst Equation - Derivation - single electrode and cell (Numericals) -Application -
Variation of emf with temperature. Potentiometric titration - Introduction -Redox titration
only.Lithiumion cell - construction and working.Conductivity- Measurement of conductivity of a
solution (Numericals).
Module 3
Thermal analysis –TGA- Principle, instrumentation (block diagram) and applications – TGA of
CaC2O4.H2O and polymers. DTA-Principle, instrumentation (block diagram) and applications - DTA of
CaC2O4.H2O. Chromatographic methods - Basic principles and applications of column and TLC-
Retention factor. GC and HPLC-Principle, instrumentation (block diagram) - retention time and
applications.
Module 4
Copolymers - Definition - Types - Random, Alternating, Block and Graft copolymers - ABS -
preparation, properties and applications.Kevlar-preparation, properties and applications.Conducting
polymers - Doping -Polyaniline and Polypyrrole - preparation properties and applications. OLED -
Principle, construction and advantages.
Module 5
Dissolved oxygen (DO) -Estimation (only brief procedure-Winkler’s method), BOD and COD-
definition, estimation (only brief procedure) and significance (Numericals). Sewage water treatment
- Primary, Secondary and Tertiary - Flow diagram -Trickling filter and UASB process.
Text Books
Reference Books
2. Donald L. Pavia, “Introduction to Spectroscopy”, Cengage Learning India Pvt. Ltd., 2015.
10. Soney C. George,RinoLaly Jose, “Text Book of Engineering Chemistry”, S. Chand & Company
Pvt Ltd, 2019.
Course Contents and Lecture Schedule
No Topic No. of
Lectures
(hrs)
4.2 R-S Notation – Rules and examples - Optical isomerism, Chirality, Enantiomers 1
and Diastereoisomers-Definition with examples.
5.3 Dissolved oxygen (DO) -Estimation (only brief procedure-Winkler’s method), BOD 2
and COD-definition, estimation (only brief procedure) and significance
(Numericals).
5.4 Sewage water treatment - Primary, Secondary and Tertiary - Flow diagram - 2
Trickling filter and UASB process.
EST ENGINEERING CATEGORY L T P CREDIT Year of Introduction
100 MECHANICS ESC 2 1 0 3 2019
Preamble: Goal of this course is to expose the students to the fundamental concepts of mechanics
and enhance their problem-solving skills. It introduces students to the influence of applied force
system and the geometrical properties of the rigid bodies while stationary or in motion. After this
course students will be able to recognize similar problems in real-world situations and respond
accordingly.
Prerequisite: Nil
Course Outcomes: After completion of the course the student will be able to:
CO 2 Identify and describe the components of system of forces acting on the rigid body
Apply the conditions of equilibrium to various practical problems involving different force
CO 3 system.
CO 5 Solve problems involving rigid bodies, applying the properties of distributed areas and masses
PO 1 PO 2 PO 3 PO 4 PO 5 PO 6 PO 7 PO 8 PO 9 PO 10 PO 11 PO 12
CO 1 2 2 - - - - - - - - - -
CO 2 3 3 - - - - - - - - - -
CO 3 3 3 - - - - - - - - - -
CO 4 3 3 - - - - - - - - - -
CO 5 3 3 - - - - - - - - - -
Assessment Pattern
End Semester Examination Pattern: There will be two parts; Part A and Part B. Part A contain 10
questions with 2 questions from each module, having 3 marks for each question. Students should
answer all questions. Part B contains 2 questions from each module of which student should answer
any one. Each question can have maximum 2 sub-divisions and carry 14 marks.
Part A
Course Outcome 1 (CO1): (One question from each module to meet the course objective 1: To
recall principles and theorems related to rigid body mechanics)
1. Explain D’Alembert’s principle
Course Outcome 2 (CO2) (One question from each module to meet the course objective 2: To
identify and describe the components of system of forces acting on the rigid body)
1. A simply supported beam AB of span 5 m is carrying point loads 5 kN, 3 kN and 2 kN at 1m, 3m
and 4m respectively from support A. Calculate the support reaction at B.
2. A gymnast holding onto a bar, is suspended motionless in mid-air. The bar is supported by two
ropes that attach to the ceiling. Diagram the forces acting on the combination of gymnast and bar
3. While you are riding your bike, you turn a corner following a circular arc. Illustrate the forces that
act on your bike to keep you along the circular path ?
Part B
All the questions under this section shall assess the learning levels corresponding to the course
outcomes listed below.
To apply the conditions of equilibrium to variou
variouss practical problems involving different force
CO 3
system.
To solve problems involving rigid bodies, applying the properties of distributed areas and
CO 5 masses
1. Two rollers each of weight 100 N are supported by an inclined plane and a vertical wall. Find the
reaction at the points of contact A, B, C. Assume all the surfaces to be smooth.
Course
Description of course outcome Marks
outcome Learning level assessed
allocated
identifier
To apply the conditions of equilibrium Applying – (Sketch the free
CO 3 to various practical problems involving body diagram that represent 4
different force system. equilibrium state of the body )
Total 14
2. A cylindrical disc, 50 cm diameter and cm thickness, is in contact with a horizontal conveyor belts
running at uniform speeds of 5 m/s. Assuming there is no slip at points of contact determine (i)
angular velocity of disc (ii) Angular acceleration of disc if velocity of conveyor changes to 8 m/s. Also
compute the moment acting about the axis of the disc in both cases.
Course
Description of course outcome Marks
outcome Learning level assessed
allocated
identifier
To apply the conditions of equilibrium to Applying – (Sketch the
CO 3 various practical problems involving different free body diagram that 4
force system. represent state of the
body )
Applying (Choose the
To choose appropriate theorems, principles or
CO 4 equations and formulae 4
formulae to solve problems of mechanics.
required for calculation)
Total 14
Course Marks
outcome Description of course outcome Learning level assessed allocat
identifier ed
To apply the conditions of equilibrium to Applying – (Illustrate the
CO 3 various practical problems involving computation of centroid for 4
different force system. the given geometrical shape)
To choose appropriate theorems, Applying (Choose the
CO 4 principles or formulae to solve problems equations and formulae 4
of mechanics. required for calculation)
Total 14
4. A rectangular hole is made in a triangular section as shown. Find moment of inertia about the
section x-x passing through the CG of the section and parallel to BC.
Course
Description of course outcome Marks
outcome Learning level assessed
allocated
identifier
To apply the conditions of equilibrium to Applying – (Illustrate the 4
Total 14
Model Question Paper
QP CODE:
Reg No.:_______________
Name:__________________________ ___
APJ ABDUL KALAM TECHNOLOGICAL UNIVERSITY FIRST SEMESTER B.TECH DEGREE EXAMINATION,
MONTH & YEAR
ENGINEERING MECHANICS
Part A
4. A simply supported beam AB of span 5 m is carrying point loads 5 kN, 3 kN and 2 kN at 1m, 3m
and 4m respectively from support A. Calculate the support reaction at B.
5. A gymnast holding onto a bar, is suspended motionless in mid-air. The bar is supported by two
ropes that attach to the ceiling. Diagram the forces acting on the combination of gymnast and bar
6. While you are riding your bike, you turn a corner following a circular arc. Illustrate the forces that
act on your bike to keep you along the circular path ?
8. State the equation of motion of a rotating rigid body, rotating about its fixed axis.
9. Illustrate the significance of instantaneous centre in the analysis of rigid body undergoing
rotational motion.
10. Highlight the principles of mechanics applied in the evaluation of elastic collusion of rigid bodies.
PART B
(Answer one full question from each module, each question carries 14 marks)
Module -I
11. Two identical rollers each of weight 100 N are supported by an inclined plane, making an angle
of 30o with the vertical, and a vertical wall. Find the reaction at the points of contact A, B, C. Assume
all the surfaces to be smooth. (14 marks)
C
A
B
12. A string tied to a wall is made to pass over a pulley placed 2m away from it. A weight P is
attached to the string such that the string stretches by 2m from the support on the wall to the
location of attachment of weight. Determine the force P required to maintain 200 kg body in
position for = 30o, The diameter of pulley B is negligible. (14 marks)
Module – 2
13. Two blocks A & B are resting against a wall and the floor as shown in figure below. Find the
value of horizontal force P applied to the lower block that will hold the system in equilibrium.
Coefficient of friction are : 0.25 at the floor, 0.3 at the wall and 0.2 between the blocks.
(14 marks)
14. A beam is hinged at A and roller supported at B. It is acted upon by loads as shown below.
Find the reactions at A & B. (14 marks)
Module – 3
15. A rectangular hole is made in a triangular section as shown. Find moment of inertia about the
section x-x passing through the CG of the section and parallel to BC. (14 marks)
16. Support A has ball and socket connection. Roller support at B prevents motion in the —z
direction. Corner C is tied to D by a rope. The triangle is weightless. Determine the unknown force
components acting at A, B, and C. (14 marks)
Module - 4
17. A cricket ball is thrown by a fielder from a height of 2m at an angle of 300 to the horizontal with
an initial velocity of 20 m/s , hits the wickets at a height of 0.5 m from the ground. How far was the
fielder from the wicket? (14 marks)
18. An engine of weight 500 kN pull a train weighing 1500 kN up an incline of 1 in 100. The train
starts from rest and moves with constant acceleration against a resistance of 5 N/kN. It attains a
maximum speed of 36 kmph in 1 km distance. Determine the tension in the coupling between train
and engine and the traction force developed by the engine. (14marks)
Module – 5
19. A cylindrical disc, 50 cm diameter and 10 cm thickness having mass of 10 kg, is in contact with a
horizontal conveyor belt running at uniform speeds of 5 m/s. Assuming there is no slip at points of
contact determine (i) angular velocity of disc (ii) Angular acceleration of disc if velocity of conveyor
changes to 8 m/s in 10 seconds. Also compute the moment acting about the axis of the disc in both
cases. (14 marks)
20. A wheel rotating about fixed axis at 20 rpm is uniformly accelerated for 70 seconds during which
time it makes 50 revolutions. Find the (i) angular velocity at the end of this interval and (ii) time
required for the velocity to reach 100 revolutions per minute. (14 marks)
SYLLABUS
Module 1
Introduction to Engineering Mechanics-statics-basic principles of statics-Parallelogram law,
equilibrium law, principles of superposition and transmissibility, law of action and reaction(review)
free body diagrams.
Concurrent coplanar forces-composition and resolution of forces-resultant and equilibrium
equations – methods of projections – methods of moments – Varignon’s Theorem of moments.
Module 2
Friction – sliding friction - Coulomb’s laws of friction – analysis of single bodies –wedges, ladder-
analysis of connected bodies .
Parallel coplanar forces – couple - resultant of parallel forces – centre of parallel forces – equilibrium
of parallel forces – Simple beam subject to concentrated vertical loads. General coplanar force
system - resultant and equilibrium equations.
Module 3
Centroid of composite areas- – moment of inertia-parallel axis and perpendicular axis theorems.
Polar moment of inertia,radius of gyration,mass moment of inertia-ring,cylinder and disc.
Theorem of Pappus Guldinus(demonstration only)
Forces in space - vectorial representation of forces, moments and couples –resultant and equilibrium
equations – concurrent forces in space (simple problems only)
Module 4
Dynamics – rectilinear translation - equations of kinematics(review)
kinetics – equation of motion – D’Alembert’s principle. – motion on horizontal and inclined
surfaces, motion of connected bodies. Impulse momentum equation and work energy equation
(concepts only).
Curvilinear translation - equations of kinematics –projectile motion(review), kinetics – equation of
motion. Moment of momentum and work energy equation (concepts only).
Module 5
Rotation – kinematics of rotation- equation of motion for a rigid body rotating about a fixed axis –
rotation under a constant moment.
Plane motion of rigid body – instantaneous centre of rotation (concept only).
Simple harmonic motion – free vibration –degree of freedom- undamped free vibration of spring
mass system-effect of damping(concept only)
Text Books
1. Timoshenko and Young, Engineering Mechanics, McGraw Hill Publishers
2. Shames, I. H., Engineering Mechanics - Statics and Dynamics, Prentice Hall of India.
3. R. C. Hibbeler and Ashok Gupta, Engineering Mechanics, Vol. I statics, Vol II Dynamics, Pearson
Education.
References
1. Merriam J. L and Kraige L. G., Engineering Mechanics - Vols. 1 and 2, John Wiley.
2. Tayal A K, Engineering Mechanics – Statics and Dynamics, Umesh Publications
3. Bhavikkatti, S.S., Engineering Mechanics, New Age International Publishers
4. F.P.Beer abd E.R.Johnston (2011), Vector Mechanics for Engineers, Vol.I-Statics, Vol.II-Dynamics,
9th Ed, Tata McGraw Hill
5. Rajasekaran S and Sankarasubramanian G, Engineering Mechanics - Statics and Dynamics, Vikas
Publishing House Pvt Ltd.
Course
No. of
Module Topic outcomes
Hours
addressed
1 Module 1 Total: 7
2.1 Friction – sliding friction - Coulomb’s laws of friction – analysis of CO1 and 1
single bodies –illustrative examples on wedges and ladder-teacher CO2
assisted problem solving tutorials using problems from wedges and
ladder.
2.2 Problems on friction - analysis of connected bodies. illustrative CO3, CO4 1
numerical exercise– teacher assisted problem solving. and CO5
2.6 General coplanar force system-resultant and equilibrium equations - CO3, CO4 1
illustrative examples and CO5
2.7 General coplanar force system - Extended problem solving - Quiz to CO3, CO4 1
evaluate learning level. and CO5
3 Module 3 Total: 7
3.1 Centroid of simple and regular geometrical shapes – centroid of CO1 and
figures in combination - composite areas- examples for illustration – CO2 1
problems for practice to be done by self.
3.2 Moment of inertia- parallel axis theorem –examples for illustration - CO1 and
1
problems for practice to be done by self. CO2
3.3 Moment of inertia - perpendicular axis theorem - example for CO1 and
illustration to be given as hand out and discussion on the solved CO2 1
example.
3.4 Solutions to practice problems – problems related to centroid and CO3, CO4 1
moment of inertia - problems for practice to be done by self. and CO5
3.5 Polar moment of inertia, Radius of gyration. CO1 and
1
Mass moment of inertia of ring, cylinder and uniform disc. CO2
Theorem of Pappus Guldinus - Demonstration
3.6 Introduction to forces in space – vectorial representation of forces, CO1,and
moments and couples – simple problems to illustrate vector CO2 1
representations of forces, moments and couples to be done in class.
3.7 Solution to practice problems - resultant and equilibrium equations
for concurrent forces in space – concurrent forces in space - 2 simple CO3,CO4 1
problems to illustrate the application of resultant and equilibrium and CO5
equations for concurrent forces in space.
4 Module 4 Total: 7
Introduction to dynamics – review of rectilinear translation - CO1 and
4.1 equations of kinematics – problems to review the concepts – CO2 1
additional problems involving extended application as exercises .
4.6 Extended problem solving – rectilinear and curvilinear translation. CO3, CO4 1
& CO5
Concepts on Impulse momentum equation and work energy equation 1
(rectilinear translation – discussions to bring out difference between
4.7 CO1 and
elastic and inelastic collusions).
CO2
Concepts on Moment of momentum and work energy equation
(curvilinear translation).
5 Module 5 Total: 7
Rotation – kinematics of rotation- equation of motion for a rigid body CO1 and 1
5.1 rotating about a fixed axis – simple problems for illustration. CO2
Rotation under a constant moment – teacher assisted problem 1
5.2 solving. CO3,CO4
and CO5
5.3 Rotation under a constant moment - extended problem solving. CO3, CO4 1
and CO5
Plane motion of rigid body- instantaneous centre of rotation (concept CO1 and 1
5.4
only). CO2
Preamble: To enable the student to effectively perform technical communication through graphical
representation as per global standards.
Prerequisite: NIL
Course Outcomes: After the completion of the course the student will be able to
PO PO PO PO PO PO PO PO PO PO PO PO
1 2 3 4 5 6 7 8 9 10 11 12
CO 1 3
CO 2 3
CO 3 3 1
CO 4 3 1
CO 5 3 2
CO 6 3 3 3
Assessment Pattern
QP CODE: PAGES:3
Reg No:______________
Name :______________
APJ ABDUL KALAM TECHNOLOGICAL UNIVERSITY FIRST SEMESTER B.TECH DEGREE EXAMINATION,
MONTH & YEAR
ENGINEERING GRAPHICS
PART A
MODULE I
1. The end point A of a line is 20mm above HP and 10mm in front of VP. The other end of the line is
50mm above HP and 15mm behind VP. The distance between the end projectors is 70mm. Draw
the projections of the line. Find the true length and true inclinations of the line with the principal
planes. Also locate the traces of the line.
2. One end of a line is 20mm from both the principal planes of projection. The other end of the line
is 50mm above HP and 40mm in front of VP. The true length of the line is 70mm. Draw the
projections of the line. Find its apparent inclinations, elevation length and plan length. Also
locate its traces.
MODULE II
3. A pentagonal pyramid of base side 25mm and height 40mm, is resting on the ground on one of
its triangular faces. The base edge of that face is inclined 30o to VP. Draw the projections of the
solid.
4. A hexagonal prism has side 25mm and height 50mm has a corner of its base on the ground and
the long edge containing that corner inclined at 30o to HP and 45o to VP. Draw the projections of
the solid.
MODULE III
5. A triangular prism of base side 40mm and height 70mm is resting with its base on the ground
and having an edge of the base perpendicular to VP. Section the solid such that the true shape of
the section is a trapezium of parallel sides 30mm and 10mm. Draw the projections showing the
true shape. Find the inclination of the cutting plane with the ground plane.
6. Draw the development of a pentagonal pyramid of base side 30mm and height 50mm. A string is
wound from a corner of the base round the pyramid and back to the same point through the
shortest distance. Show the position of the string in the elevation and plan.
MODULE IV
7. The frustum of a cone has base diameter 50mm and top diameter 40mm has a height of 60mm.
It is paced centrally on top of a rectangular slab of size 80x60mm and of thickness 20mm. Draw
the isometric view of the combination.
8. A hexagonal prism has base side 35mm and height 60mm. A sphere of diameter 40mm is
placed centrally on top of it. Draw the isometric projection of the combination.
MODULE V
9. Draw the perspective view of a pentagonal prism, 20mm side and 45mm long lying on one of its
rectangular faces on the ground and having its axis perpendicular to picture plane. One of its
pentagonal faces touches the picture plane and the station point is 50mm in front of PP, 25mm
above the ground plane and lies in a central plane, which is 70mm to the left of the center of the
prism.
10. Draw three orthographic views with dimensions of the object shown in figure below.
(20X5=100)
Time : 3 hours EST110 ENGINEERING GRAPHICS Max. Marks: 100
SCHEME OF VALUATION
1. Locating the points and drawing the projections of the line – 4 marks
Finding true length by any one method – 6 marks
Finding true inclination with VP – 2 marks
Finding true inclination with HP – 2 marks
Locating horizontal trace – 2 marks
Locating vertical trace – 2 marks
Dimensioning and neatness – 2 marks
Total = 20 marks
2. Locating the points and drawing true length of the line – 4 marks
Finding projections by any method – 6 marks
Finding length of elevation and plan – 2 marks
Finding apparent inclinations – 2 marks
Locating horizontal trace – 2 marks
Locating vertical trace – 2 marks
Dimensioning and neatness – 2 marks
Total = 20 marks
3. Drawing initial position plan and elevation – 4 marks
First inclination views – 4 marks
Second inclination views -8 marks
Marking invisible edges – 2 marks
Dimensioning and neatness – 2 marks
Total = 20 marks
(Any one method or combination of methods for solving can be used.
If initial position is wrong then maximum 50% marks may be allotted for the answer)
General Instructions:
First angle projection to be followed
Section A practice problems to be performed on A4 size sheets
Section B classes to be conducted on CAD lab
SECTION A
Module 1
Introduction : Relevance of technical drawing in engineering field. Types of lines, Dimensioning, BIS
code of practice for technical drawing.
Orthographic projection of Points and Lines: Projection of points in different quadrants, Projection of
straight lines inclined to one plane and inclined to both planes. Trace of line. Inclination of lines with
reference planes True length of line inclined to both the reference planes.
Module 2
Orthographic projection of Solids: Projection of Simple solids such as Triangular, Rectangle, Square,
Pentagonal and Hexagonal Prisms, Pyramids, Cone and Cylinder. Projection of solids in simple
position including profile view. Projection of solids with axis inclined to one of the reference planes
and with axis inclined to both reference planes.
Module 3
Sections of Solids: Sections of Prisms, Pyramids, Cone, Cylinder with axis in vertical position and cut
by different section planes. True shape of the sections. Also locating the section plane when the
true shape of the section is given.
Development of Surfaces: Development of surfaces of the above solids and solids cut by different
section planes. Also finding the shortest distance between two points on the surface.
Module 4
Isometric Projection: Isometric View and Projections of Prisms, Pyramids, Cone , Cylinder, Frustum of
Pyramid, Frustum of Cone, Sphere, Hemisphere and their combinations.
Module 5
Perspective Projection: Perspective projection of Prisms and Pyramids with axis perpendicular to the
ground plane, axis perpendicular to picture plane.
Conversion of Pictorial Views: Conversion of pictorial views into orthographic views.
SECTION B
(To be conducted in CAD Lab)
Introduction to Computer Aided Drawing: Role of CAD in design and development of new products,
Advantages of CAD. Creating two dimensional drawing with dimensions using suitable software.
(Minimum 2 exercises mandatory)
Introduction to Solid Modelling: Creating 3D models of various components using suitable modelling
software. (Minimum 2 exercises mandatory)
Text Books
1. Bhatt, N.D., Engineering Drawing, Charotar Publishing House Pvt. Ltd.
2. John, K.C. Engineering Graphics, Prentice Hall India Publishers.
Reference Books
2. Agrawal, B. And Agrawal, C.M., Engineering Darwing, Tata McGraw Hill Publishers.
3. Benjamin, J., Engineering Graphics, Pentex Publishers- 3 rd Edition, 2017
4. Duff, J.M. and Ross, W.A., Engineering Design and Visualisation, Cengage Learning.
5. Kulkarni, D.M., Rastogi, A.P. and Sarkar, A.K., Engineering Graphics with AutoCAD, PHI.
6. Luzaddff, W.J. and Duff, J.M., Fundamentals of Engineering Drawing, PHI.
7. Varghese, P.I., Engineering Graphics, V I P Publishers
8. Venugopal, K., Engineering Drawing and Graphics, New Age International Publishers.
No SECTION A No. of
Hours
1 MODULE I
1.3 Projection of lines, inclined to one plane. Lines inclined to both planes, 2
trapezoid method of solving problems on lines.
2 MODULE II
2.1 Introduction of different solids, Simple position plan and elevation of solids 2
3.1 Introduction to section planes. AIP and AVP. Principle of locating cutting 2
points and finding true shape
4 MODULE IV
5 MODULE V
Preamble:
Objective of this course is to provide an insight and inculcate the essentials of Civil Engineering
discipline to the students of all branches of Engineering and to provide the students an
illustration of the significance of the Civil Engineering Profession in satisfying the societal needs.
Prerequisite: NIL
Course Outcomes: After completion of the course, the student will be able to
Recall the role of civil engineer in society and to relate the various disciplines of Civil
CO 1 Engineering.
Summarise the basic infrastructure services MEP, HVAC, elevators, escalators and
CO 4
ramps
Discuss the Materials, energy systems, water management and environment for green
CO 5 buildings.
CO6 3 2
CO7 3 1
CO8 3 1
CO9 3 2
CO10 3 1
CO11 3
Assessment Pattern
Mark distribution
Attendance : 10 marks
Continuous Assessment Test (2 numbers) : 25 marks
Assignment/Quiz/Course project : 15 marks
There will be two parts; Part I – Basic Civil Engineering and Part II – Basic Mechanical Engineering.
Part I and PART II carries 50 marks each. For the end semester examination, part I contain 2 parts -
Part A and Part B. Part A contain 5 questions carrying 4 marks each (not exceeding 2 questions from
each module). Part B contains 2 questions from each module out of which one to be answered. Each
question carries 10 mark and can have maximum 2 sub-divisions. The pattern for end semester
examination for part II is same as that of part I. However, student should answer both part I and
part 2 in separate answer booklets.
Course Outcome CO1: To recall the role of civil engineer in society and to relate the various
disciplines of Civil Engineering.
1.Explain relevance of Civil engineering in the overall infrastructural development of the country.
Course outcome 2 (CO2) (One question from each module and not more than two)
Explain different types of buildings, building components, building materials and building
construction
1. Discuss the difference between plinth area and carpet area.
Course outcome 3 (CO3) (One question from each module and not more than two)
Course outcome 4 (CO4) (One question from each module and not more than two)
Summarise the basic infrastructure services MEP, HVAC, elevators, escalators and ramps
1. Explain the civil engineering aspects of elevators, escalators and ramps in buildings
Course outcome 5 (CO5) (One question from each module and not more than two)
Discuss the Materials, energy systems, water management and environment for green buildings.
Section II Answer any 1 full question from each module. Each full question carries 10 marks
Course Outcome 1 (CO1) (Two full question from each module and each question can have
maximum 2 sub-divisions)
To recall the role of civil engineer in society and to relate the various disciplines of Civil Engineering
CO Questions
1. a List out the types of building as per occupancy. Explain any two, each in about five sentences.
b. Discuss the components of a building with a neat figure.
2. a.What are the major disciplines of civil engineering and explain their role in the infrastructural
framework.
b. Explain the role of NBC, KBR & CRZ norms in building rules and regulations prevailing in our
country.
Course Outcome 2 (CO2) & Course Outcome 3 (CO3) (Two full question from each module and
each question can have maximum 2 sub-divisions)
Explain different types of buildings, building components, building materials and building
construction & Describe the importance, objectives and principles of surveying.
CO Questions
1. a. What are the different kinds of cement available and what is their use.
b. List the properties of good building bricks. Explain any five.
2. a. List and explain any five modern construction materials used for construction.
b. Explain the objectives and principles of surveying
Course outcome 4 (CO4) & Course outcome 5 (CO5) (Two full question from each module and
each question can have maximum 2 sub-divisions)
Summarise the basic infrastructure services MEP, HVAC, elevators, escalators and ramps & Discuss
the Materials, energy systems, water management and environment for green buildings.
CO Questions
1. a. Draw the elevation and plan of one brick thick wall with English bond
b. Explain the energy systems and water management in Green buildings
2. a. Draw neat sketch of the following foundations: (i) Isolated stepped footing;
(ii) Cantilever footing; and (iii) Continuous footing.
b. Discuss the civil engineering aspect of MEP and HVAC in a commercial building
Reg No:__________________
Name:____________________________
APJ ABDUL KALAM TECHNOLOGICAL UNIVERSITY FIRST SEMESTER B.TECH DEGREE EXAMINATION,
MONTH & YEAR
PART A
Part B
MODULE I
6a. List out the types of building as per occupancy. Explain any two, each in about five
sentences. (5)
b. Discuss the components of a building with a neat figure. (5)
OR
7a. What are the major disciplines of civil engineering and explain their role in the
infrastructural framework. (5)
b. Explain the role of NBC, KBR & CRZ norms in building rules and regulations prevailing in our
country. (5)
MODULE II
8a. What are the different kinds of cement available and what is their use. (5)
b. List the properties of good building bricks. Explain any five. (5)
OR
9a. List and explain any five modern construction materials used for construction. (5)
b. Explain the objectives and principles of surveying (5)
MODULE III
10a. Draw the elevation and plan of one brick thick wall with English bond (5)
b. Explain the energy systems and water management in Green buildings (5)
OR
11a. Draw neat sketch of the following foundations: (i) Isolated stepped footing;
(ii) Cantilever footing; and (iii) Continuous footing. (5)
b. Discuss the civil engineering aspect of MEP and HVAC in a commercial building (5)
[10 x 3 = 30]
PART II: BASIC MECHANICAL ENGINEERING
PART A
1. Sketch the P-v and T-s diagram of a Carnot cycle and List the processes.
2. Illustrate the working of an epicyclic gear train.
3. Explain cooling and dehumidification processes.
4. Differentiate between soldering and brazing.
5. Explain the principle of Additive manufacturing.
4 x 5 = 20 marks
Part B
MODULE I
6. In an air standard Otto cycle the compression ratio is 7 and compression begins at 35oC,
0.1MPa. The maximum temperature of the cycle is 1100oC. Find
i) Heat supplied per kg of air,
ii) Work done per kg of air,
iii)Cycle efficiency
Take Cp = 1.005 kJ/kgK and Cv=0.718 kJ/kgK 10 marks
OR
MODULE II
MODULE III
10. Explain the two high, three high, four high and cluster rolling mills with neat
sketches. 10 marks
OR
11. a) Describe the arc welding process with a neat sketch. 6 marks
b) Differentiate between up-milling and down-milling operations. 4 marks
SYLLABUS
Module 1
General Introduction to Civil Engineering: Relevance of Civil Engineering in the overall
infrastructural development of the country. Responsibility of an engineer in ensuring the safety of
built environment. Brief introduction to major disciplines of Civil Engineering like Transportation
Engineering, Structural Engineering, Geo-technical Engineering, Water Resources Engineering and
Environmental Engineering.
Introduction to buildings: Types of buildings, selection of site for buildings, components of a
residential building and their functions.
Building rules and regulations: Relevance of NBC, KBR & CRZ norms (brief discussion only).
Building area: Plinth area, built up area, floor area, carpet area and floor area ratio for a building as
per KBR.
Module 2
Module 3
Building Construction: Foundations: Bearing capacity of soil (definition only), functions of
foundations, types – shallow and deep (brief discussion only). Load bearing and framed structures
(concept only).
Brick masonry: - Header and stretcher bond, English bond & Flemish bond random rubble masonry.
Roofs and floors: - Functions, types; flooring materials (brief discussion only).
Basic infrastructure services: MEP, HVAC, elevators, escalators and ramps (Civil Engineering aspects
only), fire safety for buildings.
Green buildings:- Materials, energy systems, water management and environment for green
buildings. (brief discussion only).
Module 4
Analysis of thermodynamic cycles: Carnot, Otto, Diesel cycles, Derivation of efficiency of these
cycles, Problems to calculate heat added, heat rejected, net work and efficiency. IC Engines: CI, SI, 2-
Stroke, 4-Stroke engines. Listing the parts of different types of IC Engines. Efficiencies of IC
Engines(Definitions only), Air, Fuel, cooling and lubricating systems in SI and CI Engines, CRDI, MPFI.
Concept of hybrid engines.
Module 5
Refrigeration: Unit of refrigeration, reversed Carnot cycle,COP, vapour compression cycle (only
description and no problems); Definitions of dry, wet & dew point temperatures, specific humidity
and relative humidity, Cooling and dehumidification, Layout of unit and central air conditioners.
Description about working with sketches of: Reciprocating pump, Centrifugal pump, Pelton turbine,
Francis turbine and Kaplan turbine. Overall efficiency, Problems on calculation of input and output
power of pumps and turbines (No velocity triangles)
Description about working with sketches of: Belt and Chain drives, Gear and Gear trains, Single plate
clutches.
Module 6
Manufacturing Process: Basic description of the manufacturing processes – Sand Casting, Forging,
Rolling, Extrusion and their applications.
Metal Joining Processes: List types of welding, Description with sketches of Arc Welding, Soldering
and Brazing and their applications
Basic Machining operations: Turning, Drilling, Milling and Grinding.
Description about working with block diagram of: Lathe, Drilling machine, Milling machine, CNC
Machine. Principle of CAD/CAM, Rapid and Additive manufacturing.
Text Books:
References Books:
1. Chen W.F and Liew J Y R (Eds), The Civil Engineering Handbook. II Edition CRC Press (Taylor
and Francis)
2. Chudley, R and Greeno R, Building construction handbook, Addison Wesley, Longman group,
England
3. Chudley, R, Construction Technology, Vol. I to IV, Longman group, England Course Plan
4. Kandya A A, Elements of Civil Engineering, Charotar Publishing house
5. Mamlouk, M. S., and Zaniewski, J. P., Materials for Civil and Construction Engineering, Pearson
Publishers
6. Rangwala S.C and Dalal K B Building Construction Charotar Publishing house
7. Clifford, M., Simmons, K. and Shipway, P., An Introduction to Mechanical Engineering Part I -
CRC Press
8. Roy and Choudhary, Elements of Mechanical Engineering, Media Promoters &Publishers Pvt.
Ltd., Mumbai.
9. Sawhney, G. S., Fundamentals of Mechanical Engineering, PHI
10. G Shanmugam, M S Palanichamy, Basic Civil and Mechanical Engineering, McGraw Hill
Education; First edition, 2018
11. Benjamin,J.,Basic Mechanical Engineering,Pentex Books,9th Edition,2018
12. Balachandran, P.Basic Mechanical Engineering,Owl Books
Course Contents and Lecture Schedule:
Course
No. of
No Topic outcomes
Lectures
addressed
1 Module I Total: 7
Building rules and regulations: Relevance of NBC, KBR & CRZ norms
1.4 (brief discussion only) CO2 1
Building area: Plinth area, built up area, floor area, carpet area and
1.5 CO2 1
floor area ratio for a building as per KBR.
2 Module 2 Total: 7
3.2 Roofs: Functions, types; roofing materials (brief discussion only) CO2 2
Floors: Functions, types; flooring materials (brief discussion only)
3.3 Basic infrastructure services: MEP, HVAC, Elevators, escalators and CO4 2
ramps (Civil Engineering aspects only) fire safety for buildings
4 MODULE 4
5 MODULE 5
Definitions of dry, wet & dew point temperatures, specific humidity and 1
5.2 relative humidity, Cooling and dehumidification, Layout of unit and
central air conditioners.
Description about working with sketches : Reciprocating pump, 4
Centrifugal pump, Pelton turbine, Francis turbine and Kaplan turbine.
5.3
Overall efficiency, Problems on calculation of input and output power
of pumps and turbines (No velocity triangles)
Description about working with sketches of: Belt and Chain drives, Gear 3
5.4
and Gear trains, Single plate clutches
6 MODULE 6
Preamble:
This course aims to (1) equip the students with an understanding of the fundamental principles of
electrical engineering(2) provide an overview of evolution of electronics, and introduce the working
principle and examples of fundamental electronic devices and circuits (3) provide an overview of
evolution of communication systems, and introduce the basic concepts in radio communication.
CO 1 Apply fundamental concepts and circuit laws to solve simple DC electric circuits
CO 2 Develop and solve models of magnetic circuits
CO 3 Apply the fundamental laws of electrical engineering to solve simple ac circuits in steady
state
CO 4 Describe working of a voltage amplifier
CO 5 Outline the principle of an electronic instrumentation system
CO 6 Explain the principle of radio and cellular communication
PO 1 PO 2 PO 3 PO 4 PO 5 PO 6 PO 7 PO 8 PO 9 PO PO PO
10 11 12
CO 1 3 1 - - - - - - - - - 2
CO 2 3 1 - - - - - - - - - 2
CO 3 3 1 - - - - - - - - - 2
CO 4 2 - - - - - - - - - - -
CO 5 2 - - - - - - - - - - 2
CO 6 2 - - - - - - - - - - 2
Assessment Pattern
End Semester Examination Pattern: There will be two parts; Part I – Basic Electrical Engineering and
Part II – Basic Electronics Engineering. Part I and PART II carries 50 marks each. For the end semester
examination, part I contain 2 parts - Part A and Part B. Part A contain 5 questions carrying 4 marks
each (not exceeding 2 questions from each module). Part B contains 2 questions from each module
out of which one to be answered. Each question carries 10 mark and can have maximum 2 sub-
divisions. The pattern for end semester examination for part II is same as that of part I. However,
student should answer both part I and part 2 in separate answer booklets.
2. What is a transducer?
Course Outcome 6 (CO6): Explain the principle of radio and cellular communication
2. What is the need of two separate sections RF section and IF section in a super heterodyne
receiver?
QP CODE: Pages: 3
Reg No.:_______________
Name:_________________
APJ ABDUL KALAM TECHNOLOGICAL UNIVERSITY FIRST SEMESTER B.TECH DEGREE EXAMINATION,
MONTH & YEAR
PART I
PART A
1. Calculate the current through the 4 resistor in the circuit shown, applying current
division rule:
2. Calculate the RMS and average values of a purely sinusoidal current having peak value
15A.
4. Derive the relation between line and phase values of voltage in a three phase star
connected system.
PART B
Answer one question from each module; each question carries 10 marks.
Module 1
6. . Calculate the node voltages in the circuit shown, applying node analysis:
(b) Calculate the current through the galvanometer (G) in the circuit shown:
(6 marks)
Module 2
8. (a) State and explain Faraday’s laws of electromagnetic induction with examples. (4 marks)
(b) Differentiate between statically and dynamically induced emf. A conductor of length
0.5m moves in a uniform magnetic field of flux density 1.1T at a velocity of 30m/s.
Calculate the emf induced in the conductor if the direction of motion of the conductor is
inclined at 600 to the direction of field. (6 marks)
9. (a) Derive the amplitude factor and form factor of a purely sinusoidal waveform. (5 marks)
Module 3
10. Draw the power triangle and define active, reactive and apparent powers in ac circuits.
Two coils A and B are connected in series across a 240V, 50Hz supply. The resistance of
A is 5 and the inductance of B is 0.015H. If the input from the supply is 3kW and
2kVAR, find the inductance of A and the resistance of B. Also calculate the voltage across
each coil.
11. A balanced three phase load consists of three coils each having resistance of 4Ω and
inductance 0.02H. It is connected to a 415V, 50Hz, 3-phase ac supply. Determine the
phase voltage, phase current, power factor and active power when the loads are connected
in (i) star (ii) delta.
(3x10=30)
PART II
PART A
1. Give the specifications of a resistor. The colour bands marked on a resistor are Blue, Grey,
Yellow and Gold. What are the minimum and maximum resistance values expected from that
resistance?
2. What is meant by avalanche breakdown?
3. Explain the working of a full-wave bridge rectifier.
4. Discuss the role of coupling and bypass capacitors in a single stage RC coupled amplifier.
5. Differentiate AM and FM communication systems.
(5x4=20)
PART B
Answer one question from each module; each question carries 10 marks.
Module 4
6. a) Explain with diagram the principle of operation of an NPN transistor. (5)
b) Sketch and explain the typical input-output characteristics of a BJT when connected in
common emitter configuration. (5)
OR
7. a) Explain the formation of a potential barrier in a P-N junction diode. (5)
b) What do you understand by Avalanche breakdown? Draw and explain the V-I characteristics
of a P-N junction and Zener diode. (5)
Module 5
8. a) With a neat circuit diagram, explain the working of an RC coupled amplifier. (6)
b) Draw the frequency response characteristics of an RC coupled amplifier and state the reasons
for the reduction of gain at lower and higher frequencies. (4)
OR
9. a) With the help of block diagram, explain how an electronic instrumentation system. (6)
b) Explain the principle of an antenna. (4)
Module 6
10. a) With the help of a block diagram, explain the working of Super hetrodyne receiver. (6)
b) Explain the importance of antenna in a communication system. (4)
OR
11. a) With neat sketches explain a cellular communication system. (5)
b) Explain GSM communication with the help of a block diagram. (5)
(3x10=30)
SYLLABUS
Elementary concepts of DC electric circuits: Basic Terminology including voltage, current, power,
resistance, emf; Resistances in series and parallel; Current and Voltage Division Rules; Capacitors &
Inductors: V-I relations and energy stored. Ohms Law and Kirchhoff's laws-Problems; Star-delta
conversion (resistive networks only-derivation not required)-problems.
Analysis of DC electric circuits: Mesh current method - Matrix representation - Solution of network
equations. Node voltage methods-matrix representation-solution of network equations by matrix
methods. Numerical problems.
Magnetic Circuits: Basic Terminology: MMF, field strength, flux density, reluctance - comparison
between electric and magnetic circuits- Series and parallel magnetic circuits with composite
materials, numerical problems.
Electromagnetic Induction: Faraday's laws, problems, Lenz's law- statically induced and dynamically
induced emfs - Self-inductance and mutual inductance, coefficient of coupling
MODULE 3: AC Circuits
Three phase AC systems: Generation of three phase voltages; advantages of three phase systems,
star and delta connections (balanced only), relation between line and phase voltages, line and phase
currents- Numerical problems
MODULE 4
Introduction to Semiconductor devices: Evolution of electronics – Vacuum tubes to nano
electronics. Resistors, Capacitors and Inductors (constructional features not required): types,
specifications. Standard values, color coding. PN Junction diode: Principle of operation, V-I
characteristics, principle of avalanche breakdown. Bipolar Junction Transistors: PNP and NPN
structures, Principle of operation, relation between current gains in CE, CB and CC, input and
output characteristics of common emitter configuration.
MODULE 5
Basic electronic circuits and instrumentation: Rectifiers and power supplies: Block diagram
description of a dc power supply, Working of a full wave bridge rectifier, capacitor filter (no
analysis), working of simple zener voltage regulator. Amplifiers: Block diagram of Public Address
system, Circuit diagram and working of common emitter (RC coupled) amplifier with its frequency
response, Concept of voltage divider biasing. Electronic Instrumentation: Block diagram of an
electronic instrumentation system.
MODULE 6
Introduction to Communication Systems: Evolution of communication systems – Telegraphy to 5G.
Radio communication: principle of AM & FM, frequency bands used for various communication
systems, block diagram of super heterodyne receiver, Principle of antenna – radiation from
accelerated charge. Mobile communication: basic principles of cellular communications, principle
and block diagram of GSM.
Text Books
1. D P Kothari and I J Nagrath, “Basic Electrical Engineering”, Tata McGraw Hill, 2010.
2. D C Kulshreshtha, “Basic Electrical Engineering”, Tata McGraw Hill, 2010.
3. ChinmoySaha, Arindham Halder and Debarati Ganguly, Basic Electronics - Principles and
Applications, Cambridge University Press, 2018.
4. M.S.Sukhija and T.K.Nagsarkar, Basic Electrical and Electronics Engineering, Oxford University
Press, 2012.
5. Wayne Tomasi and Neil Storey, A Textbook On Basic Communication and Information
Engineering, Pearson, 2010.
Reference Books
1. Del Toro V, “Electrical Engineering Fundamentals”, Pearson Education.
2. T. K. Nagsarkar, M. S. Sukhija, “Basic Electrical Engineering”, Oxford Higher Education.
3. Hayt W H, Kemmerly J E, and Durbin S M, “Engineering Circuit Analysis”, Tata McGraw-Hill
4. Hughes, “Electrical and Electronic Technology”, Pearson Education.
5. V. N. Mittle and Arvind Mittal, “Basic Electrical Engineering,” Second Edition, McGraw Hill.
6. Parker and Smith, “Problems in Electrical Engineering”, CBS Publishers and Distributors.
7. S. B. Lal Seksena and Kaustuv Dasgupta, “Fundamentals of Electrical Engineering”, Cambridge
University Press.
8. Anant Agarwal, Jeffrey Lang, Foundations of Analog and Digital Electronic Circuits, Morgan
Kaufmann Publishers, 2005.
9. Bernard Grob, Ba sic Electronics, McGraw Hill.
10. A. Bruce Carlson, Paul B. Crilly, Communication Systems: An Introduction to Signals and
Noise in Electrical Communication, Tata McGraw Hill, 5 th Edition.
COURSE CONTENTS AND LECTURE SCHEDULE
Numerical problems. 2
2.1 Magnetic Circuits: Basic Terminology: MMF, field strength, flux density,
reluctance - comparison between electric and magnetic circuits-
1
Series and parallel magnetic circuits with composite materials,
numerical problems. 2
3 AC Circuits
3.1 AC Circuits: Phasor representation of sinusoidal quantities. 1
Trigonometric, Rectangular, Polar and complex forms.
5.2 Amplifiers: Block diagram of Public Address system, Circuit diagram and 4
working of common emitter (RC coupled) amplifier with its frequency
response, Concept of voltage divider biasing
Note: The simulations can be done on open tools such as QUCS, KiCad, GNURadio or similar software
to augment the understanding.
CATEGORY L T P CREDIT YEAR OF
HUN LIFE SKILLS INTRODUCTION
101 MNC 2 0 2 --- 2019
Preamble: Life skills are those competencies that provide the means for an individual to be
resourceful and positive while taking on life's vicissitudes. Development of one's personality by being
aware of the self, connecting with others, reflecting on the abstract and the concrete, leading and
generating change, and staying rooted in time-tested values and principles is being aimed at. This
course is designed to enhance the employability and maximize the potential of the students by
introducing them to the principles that underly personal and professional success, and help them
acquire the skills needed to apply these principles in their lives and careers.
Prerequisite: None
Course Outcomes: After the completion of the course the student will be able to
CO 1 Define and Identify different life skills required in personal and professional life
CO 2 Develop an awareness of the self and apply well-defined techniques to cope with emotions
and stress.
CO 3 Explain the basic mechanics of effective communication and demonstrate these through
presentations.
CO 4 Take part in group discussions
CO 5 Use appropriate thinking and problem solving techniques to solve new problems
CO 6 Understand the basics of teamwork and leadership
PO 1 PO 2 PO 3 PO 4 PO 5 PO 6 PO 7 PO 8 PO 9 PO PO PO
10 11 12
CO 1 2 1 2 2 1 3
CO 2 3 2
CO 3 1 1 3
CO 4 3 1
CO 5 3 2 1
CO 6 1 3
Mark distribution
100 50 50 2 hours
Continuous Internal Evaluation
Total Marks: 50
Attendance : 10 marks
Regular assessment : 15 marks
Series test (one test only, should include first three modules) : 25 marks
Regular assessment
3. What is the PATH method? Describe a situation where this method can be used effectively.
1. Identify the communication network structure that can be observed in the given situations.
Describe them.
2. 'Listening skills are essential for effectively participating in a group discussion.' Do you
agree? Substantiate your answer.
1. Illustrate the creative thinking process with the help of a suitable example
2. Translate the following problem from verbal to graphic form and find the solution : In a quiz,
Ananth has 50 points more than Bimal, Chinmay has 60 points less than Ananth, and Dharini
is 20 points ahead of Chinmay. What is the difference in points between Bimal and Dharini?
3. List at least five ways in which the problem "How to increase profit?" can be redefined
1. A group of engineers decided to brainstorm a design issue on a new product. Since no one
wanted to disagree with the senior members, new ideas were not flowing freely. What
group dynamics technique would you suggest to avoid this 'groupthink'? Explain the
procedure.
2. “A group focuses on individual contribution, while a team must focus on synergy.” Explain.
3. Identify the type of group formed / constituted in each of the given situations
Syllabus
Module 1
Overview of Life Skills: Meaning and significance of life skills, Life skills identified by WHO: Self-
awareness, Empathy, Critical thinking, Creative thinking, Decision making, problem solving, Effective
communication, interpersonal relationship, coping with stress, coping with emotion.
Life skills for professionals: positive thinking, right attitude, attention to detail, having the big
picture, learning skills, research skills, perseverance, setting goals and achieving them, helping
others, leadership, motivation, self-motivation, and motivating others, personality development, IQ,
EQ, and SQ
Module 2
Self-awareness: definition, need for self-awareness; Coping With Stress and Emotions, Human
Values, tools and techniques of SA: questionnaires, journaling, reflective questions, meditation,
mindfulness, psychometric tests, feedback.
Stress Management: Stress, reasons and effects, identifying stress, stress diaries, the four A's of
stress management, techniques, Approaches: action-oriented, emotion-oriented, acceptance-
oriented, resilience, Gratitude Training,
Coping with emotions: Identifying and managing emotions, harmful ways of dealing with emotions,
PATH method and relaxation techniques.
Morals, Values and Ethics: Integrity, Civic Virtue, Respect for Others, Living Peacefully. Caring,
Sharing, Honesty, Courage, Valuing Time, Time management, Co operation, Commitment, Empathy,
Self-Confidence, Character, Spirituality, Avoiding Procrastination, Sense of Engineering Ethics.
Module 3
21st century skills: Creativity, Critical Thinking, Collaboration, Problem Solving, Decision Making,
Need for Creativity in the 21st century, Imagination, Intuition, Experience, Sources of Creativity,
Lateral Thinking, Myths of creativity, Critical thinking Vs Creative thinking, Functions of Left Brain &
Right brain, Convergent & Divergent Thinking, Critical reading & Multiple Intelligence.
Steps in problem solving: Problem Solving Techniques, Six Thinking Hats, Mind Mapping, Forced
Connections. Analytical Thinking, Numeric, symbolic, and graphic reasoning. Scientific temperament
and Logical thinking.
Module 4
Group and Team Dynamics: Introduction to Groups: Composition, formation, Cycle, thinking,
Clarifying expectations, Problem Solving, Consensus, Dynamics techniques, Group vs Team, Team
Dynamics, Virtual Teams. Managing team performance and managing conflicts, Intrapreneurship.
Module 5
Lab Activities
Verbal
Non Verbal:
Non-verbal Communication and Body Language: Forms of non-verbal communication; Interpreting
body-language cues; Kinesics; Proxemics; Chronemics; Effective use of body language,
Communication in a multi cultural environment.
Reference Books
1. Shiv Khera, You Can Win, Macmillan Books, New York, 2003.
2. Barun K. Mitra, “Personality Development & Soft Skills”, Oxford Publishers, Third impression,
2017.
3. ICT Academy of Kerala, "Life Skills for Engineers", McGraw Hill Education (India) Private Ltd.,
2016.
4. Caruso, D. R. and Salovey P, “The Emotionally Intelligent Manager: How to Develop and Use
the Four Key Emotional Skills of Leadership”, John Wiley & Sons, 2004.
5. Kalyana, “Soft Skill for Managers”; First Edition; Wiley Publishing Ltd, 2015.
6. Larry James, “The First Book of Life Skills”; First Edition, Embassy Books, 2016.
7. Shalini Verma, “Development of Life Skills and Professional Practice”; First Edition; Sultan
Chand (G/L) & Company, 2014.
8. Daniel Goleman, "Emotional Intelligence"; Bantam, 2006.
9. Remesh S., Vishnu R.G., "Life Skills for Engineers", Ridhima Publications, First Edition, 2016.
10. Butterfield Jeff, “Soft Skills for Everyone”, Cengage Learning India Pvt Ltd; 1 edition, 2011.
11. Training in Interpersonal Skills: Tips for Managing People at Work, Pearson Education, India;
6 edition, 2015.
12. The Ace of Soft Skills: Attitude, Communication and Etiquette for Success, Pearson
Education; 1 edition, 2013.
PHL ENGINEERING CATEGORY L T P CREDIT YEAR OF
120 PHYSICS LAB INTRODUCTION
BSC 0 0 2 1 2019
Preamble: The aim of this course is to make the students gain practical knowledge to co-relate with
the theoretical studies and to develop practical applications of engineering materials
and use the principle in the right way to implement the modern technology.
Course Outcomes: After the completion of the course the student will be able to
CO 2 Understand the need for precise measurement practices for data recording
CO 3 Understand the principle, concept, working and applications of relevant technologies and
comparison of results with theoretical calculations
CO 4 Analyze the techniques and skills associated with modern scientific tools such as lasers and
fiber optics
CO 5 Develop basic communication skills through working in groups in performing the laboratory
experiments and by interpreting the results
PO 1 PO 2 PO 3 PO 4 PO 5 PO 6 PO 7 PO 8 PO 9 PO 10 PO 11 PO 12
CO 1 3 3 1 2 1
CO 2 3 3 1 2 1
CO 3 3 3 1 2 1
CO 4 3 3 1 2 1
CO 5 3 3 1 2 1
Mark distribution
Attendance : 20 marks
Class work/ Assessment /Viva-voce : 50 marks
End semester examination (Internally by college) : 30 marks
SYLLABUS
LIST OF EXPERIMENTS
Reference books
1. S.L.Gupta and Dr.V.Kumar, “Practical physics with viva voice”, Pragati PrakashanPublishers, Revised
Edition, 2009
Preamble: To impart scientific approach and to familiarize with the experiments in chemistry relevant
for research projects in higher semesters
Course outcomes: After the completion of the course the students will be able to
CO 2 Develop skills relevant to synthesize organic polymers and acquire the practical skill to
use TLC for the identification of drugs
CO 3 Develop the ability to understand and explain the use of modern spectroscopic
techniques for analysing and interpreting the IR spectra and NMR spectra of some
organic compounds
CO 4 Acquire the ability to understand, explain and use instrumental techniques for chemical
analysis
CO 5 Learn to design and carry out scientific experiments as well as accurately record and
analyze the results of such experiments
PO 1 PO 2 PO 3 PO 4 PO 5 PO 6 PO 7 PO 8 PO 9 PO PO PO
10 11 12
CO 1 3 2 3
CO 2 3 3 3
CO 3 3 3 3
CO 4 3 3 3
CO 5 3 1 3
CO 6 3 1 3
Mark distribution
Attendance : 20 marks
Class work/ Assessment /Viva-voce : 50 marks
End semester examination (Internally by college) : 30 marks
End Semester Examination Pattern: Written Objective Examination of one hour
SYLLABUS
6. Soney C George, Rino Laly Jose, “Lab Manual of Engineering Chemistry”, S. Chand &
Company Pvt Ltd, New Delhi, 2019.
ESL YEAR OF
CIVIL & MECHANICAL CATEGORY L T P CREDIT
120 INTRODUCTION
WORKSHOP
0 0 2 1 2019
Preamble: The course is designed to train the students to identify and manage the tools, materials
and methods required to execute an engineering project. Students will be introduced to a team
working environment where they develop the necessary skills for planning, preparing and executing
an engineering project.
To enable the student to familiarize various tools, measuring devices, practices and different
methods of manufacturing processes employed in industry for fabricating components.
Prerequisite: None
Course Outcomes: After the completion of the course the student will be able to:
Course
Course Outcome Description
Outcome
CO 1 Name different devices and tools used for civil engineering measurements
CO 2 Explain the use of various tools and devices for various field measurements
Demonstrate the steps involved in basic civil engineering activities like plot
CO 3 measurement, setting out operation, evaluating the natural profile of land, plumbing
and undertaking simple construction work.
Choose materials and methods required for basic civil engineering activities like field
CO 4
measurements, masonry work and plumbing.
CO 5 Compare different techniques and devices used in civil engineering measurements
Identify Basic Mechanical workshop operations in accordance with the material and
CO 6
objects
Apply appropriate Tools and Instruments with respect to the mechanical workshop
CO 7
trades
CO 8 Apply appropriate safety measures with respect to the mechanical workshop trades
PO
PO 1 PO 2 PO 3 PO 4 PO 5 PO 6 PO 7 PO 8 PO 9 PO 10 PO 11
12
CO 1 1 - - - 1 1 - - 2 2 - -
CO 2 1 - - - 1 1 - - 2 2 - -
CO 3 1 - - - 1 1 - 2 2 2 1 -
CO 4 1 - - - 1 1 - 2 2 2 1 1
CO 5 1 - - - 1 1 - - 2 2 1
CO 6 2
CO 7 2
CO 8 2
Mark distribution
100 70 30 1 hour
Assessment Procedure: Total marks allotted for the course is 100 marks. CIE shall be conducted for
70 marks and ESE for 30 marks. CIE should be done for the work done by the student and also
viva voce based on the work done on each practical session. ESE shall be evaluated by written
examination of one hour duration conducted internally by the institute.
Attendance : 20 marks
Class work/ Assessment /Viva-voce : 50 marks
End semester examination (Internally by college) : 30 marks
SYLLABUS
PART 1
CIVIL WORKSHOP
Exercise 1. Calculate the area of a built-up space and a small parcel of land- Use standard
measuring tape and digital distance measuring devices
Exercise 2. (a) Use screw gauge and vernier calliper to measure the diameter of a steel rod and
thickness of a flat bar
(b) Transfer the level from one point to another using a water level
(c) Set out a one room building with a given plan and measuring tape
Exercise 3. Find the level difference between any two points using dumpy level
Exercise 4. (a) Construct a 1 thick brick wall of 50 cm height and 60 cm length using English
bond. Use spirit level to assess the tilt of walls.
(b) Estimate the number of different types of building blocks to construct this wall.
Exercise 5. (a) Introduce the students to plumbing tools, different types of pipes, type of
connections, traps, valves ,fixtures and sanitary fittings.
Reference Books:
PART II
MECHANICAL WORKSHOP
LIST OF EXERCISES
(Minimum EIGHT units mandatory and FIVE models from Units 2 to 8 mandatory)
UNIT 1:- General : Introduction to workshop practice, Safety precautions, Shop floor ethics, Basic
First Aid knowledge.
Study of mechanical tools, components and their applications: (a) Tools: screw drivers,
spanners, Allen keys, cutting pliers etc and accessories (b) bearings, seals, O-rings, circlips,
keys etc.
UNIT 2:- Carpentry : Understanding of carpentry tools
Minimum any one model
1. T –Lap joint 2. Cross lap joint 3. Dovetail joint 4. Mortise joints
UNIT 3:- Foundry : Understanding of foundry tools
Minimum any one model
1.Bench Molding 2. Floor Molding 3. Core making 4. Pattern making
UNIT 4: - Sheet Metal : Understanding of sheet metal working tools
Minimum any one model
1. Cylindrical shape
2. Conical shape
3. Prismatic shaped job from sheet metal
UNIT 5: - Fitting : Understanding of tools used for fitting
Minimum any one model
1. Square Joint
2. V- Joint
3. Male and female fitting
UNIT 6: - Plumbing : Understanding of plumbing tools, pipe joints
Any one exercise on joining of pipes making use of minimum three types of pipe joints
No Topic No of Sessions
1 INTRODUCTION
2 CARPENTRY
4 SHEET METAL
5 FITTING
6 PLUMBING
7 SMITHY
8 WELDING
9 ASSEMBLY
10 MACHINES
Preamble: Electrical Workshop is intended to impart skills to plan and carry out simple
electrical wiring. It is essential for the practicing engineers to identify the basic practices and
safety measures in electrical wiring.
Prerequisite: NIL
Course Outcomes: After the completion of the course the student will be able to
PO 1 PO 2 PO 3 PO 4 PO 5 PO 6 PO 7 PO 8 PO 9 PO PO PO
10 11 12
CO 1 - - - - - 3 - - - - - 1
CO 2 2 - - - - - - - - 1 - -
CO 3 2 - - 1 - 1 - 1 2 2 - 2
CO 4 3 - - - - - - - - - - 2
CO 5 3 - - - 2 - - - - - - 2
CO 6 3 - - - 2 - - - - - - 1
CO 7 - - - - - - - - 3 2 - 2
Mark distribution
Attendance : 20 marks
Class work/ Assessment /Viva-voce : 50 marks
End semester examination (Internally by college) : 30 marks
Syllabus
PART 1
ELECTRICAL
PART II
ELECTRONICS
6. Printed circuit boards (PCB) [Types, Single sided, Double sided, PTH, Processing
methods, Design and fabrication of a single sided PCB for a simple circuit with manual
etching (Ferric chloride) and drilling.]
7. Assembling of electronic circuits using SMT (Surface Mount Technology) stations.
8. Assembling of electronic circuit/system on general purpose PCB, test and show the
functioning (Any Two circuits).
1. Fixed voltage power supply with transformer, rectifier diode, capacitor filter,
zener/IC regulator.
Preamble: This course introduces the concepts and applications of differentiation and integration of
vector valued functions, differential equations, Laplace and Fourier Transforms. The objective of this
course is to familiarize the prospective engineers with some advanced concepts and methods in
Mathematics which include the Calculus of vector valued functions, ordinary differential equations
and basic transforms such as Laplace and Fourier Transforms which are invaluable for any engineer’s
mathematical tool box. The topics treated in this course have applications in all branches of
engineering.
Course Outcomes: After the completion of the course the student will be able to
CO 1 Compute the derivatives and line integrals of vector functions and learn their applications
CO 2 Evaluate surface and volume integrals and learn their inter-relations and applications.
CO 3 Solve homogeneous and non-homogeneous linear differential equation with constant
coefficients
CO 4 Compute Laplace transform and apply them to solve ODEs arising in engineering
CO 5 Determine the Fourier transforms of functions and apply them to solve problems arising in
engineering
PO 1 PO PO 3 PO 4 PO 5 PO 6 PO 7 PO PO 9 PO 10 PO 11 PO 12
2 8
CO 1 3 3 3 3 2 1 1 2 2
CO 2 3 3 3 3 2 1 1 2 2
CO 3 3 3 3 3 2 1 1 2 2
CO 4 3 3 3 3 2 1 1 2 2
CO 5 3 3 3 3 2 1 1 2 2
Assessment Pattern
Mark distribution
Attendance : 10 marks
Continuous Assessment Test (2 numbers) : 25 marks
Assignment/Quiz/Course project : 15 marks
Assignments: Assignment should include specific problems highlighting the applications of the
methods introduced in this course in science and engineering.
End Semester Examination Pattern: There will be two parts; Part A and Part B. Part A contain 10
questions with 2 questions from each module, having 3 marks for each question. Students should
answer all questions. Part B contains 2 questions from each module of which student should answer
any one. Each question can have maximum 2 sub-divisions and carry 14 marks.
Course Outcome 1 (CO1): Compute the derivatives and line integrals of vector functions and learn
their applications
1. How would you calculate the speed, velocity and acceleration at any instant of a particle moving
in space whose position vector at time 𝑡is 𝒓(𝑡)?
2. Find the work done by the force field 𝐹 = (𝑒 − 𝑦 )𝒊 + (cos 𝑦 + 𝑥 )on a particle that travels
once around the unit circle centred at origin having radius 1.
3. When do you say that a vector field is conservative? What are the implications if a vector field is
conservative?
Course Outcome 2 (CO2): Evaluate surface and volume integrals and learn their inter-relations and
applications
1. Write any one application each of line integral, double integral and surface integral.
2. Use the divergence theorem to find the outward flux of the vector field 𝐹(𝑥, 𝑦 , 𝑧) = 𝑧𝒌across the
𝑥 +𝑦 +𝑧 =𝑎
3. State Greens theorem. Use Green’s theorem to express the area of a plane region bounded by a
curve as a line integral.
Course Outcome 3 (CO3): Solve homogeneous and non-homogeneous linear differential equation
with constant coefficients
1. If 𝑦 (𝑥) and 𝑦 (𝑥) are solutions of𝑦 + 𝑝𝑦 + 𝑞𝑦 = 0, where 𝑝, 𝑞 are constants, show that
Course Outcome 4 (CO4): Compute Laplace transform and apply them to solve ODEs arising in
engineering
Course Outcome 5(CO5): Determine the Fourier transforms of functions and apply them to solve
problems arising in engineering
2. What are the conditions for the existence of Fourier Transform of a function 𝑓(𝑥)?
3. Find the Fourier transform of 𝑓(𝑥) = 1 for |𝑥| < 1 and 𝑓(𝑥) = 0 otherwise.
QP CODE: PAGES:3
Reg No:______________
Name :______________
APJ ABDUL KALAM TECHNOLOGICAL UNIVERSITY FIRST SEMESTER B.TECH DEGREE EXAMINATION,
MONTH & YEAR
(2019-Scheme)
PART B
(Answer one full question from each module. Each full question carries 14 marks)
MODULE 1
11a) Prove that the force field 𝑭 = 𝑒 𝒊 + 𝑥𝑒 𝒋is conservative in the entire xy-plane
b) Find the work done by the force field𝑭(𝑥, 𝑦, 𝑧) = 𝑥𝑦𝒊 + 𝑦𝑧𝒋 + 𝑥𝑧𝒌along C where
C is the curve𝒓(𝑡) = 𝑡𝒊 + 𝑡 𝒋 + 𝑡 𝒌
MODULE II
13 a) Use divergence theorem to find the outward flux of the vector field
14 a) Use divergence theorem to find the volume of the cylindrical solid bounded
by 𝑥 + 4𝑥 + 𝑦 = 7, 𝑧 = −1, 𝑧 = 4, given the vector field 𝑭 = 𝒙𝑖 + 𝒚𝑗 + 𝒛𝑘
across surfaceof the cylinder
MODULE III
15 a) Solve 𝑦 + 4𝑦 + 4𝑦 = 𝑥 + 𝑒 cos 𝑥
b) Solve 𝑦 − 3𝑦 + 3𝑦 − 𝑦 = 𝑒 − 𝑥 − 1
16 a) Solve𝒚 + 𝟑𝑦 + 3𝑦 + 𝑦 = 30𝑒 given𝑦(0) = 3,𝑦 (0) = −3 , 𝑦 (0) = −47
b) Using method of variation of parameters, solve𝑦 + 𝑦 = 𝑠𝑒𝑐 𝑥
MODULE IV
b) Solve the differential equation𝑦 + 16𝑦 = 4𝛿(𝑡 − 3𝜋); 𝑦(0) = 2,𝑦 (0) = 0 using Laplace
transform
18 a) Solve𝑦 + 3𝑦 + 2𝑦 = 𝑓(𝑡) where 𝑓(𝑡) = 1 for 0 < 𝑡 < 1 and 𝑓(𝑡) = 1for 𝑡 > 1
using Laplace transform
MODULE V
19 a) Find the Fourier cosine integral representation for 𝑓(𝑥) = 𝑒 for 𝑥 > 0and
∞
𝑘 > 0 and hence evaluate ∫ the function
b) Does the Fourier sine transform 𝑓(𝑥) = 𝑥 sin 𝑥for 0 < 𝑥 < ∞ exist? Justify your
answer
20 a) Find the Fourier transform of 𝑓(𝑥) = |𝑥 |for |𝑥| < 1 and 𝑓(𝑥) = 0 otherwise
(Text 1: Relevant topics from sections 12.1, 12.2, 12.6, 13.6, 15.1, 15.2, 15.3)
Vector valued function of single variable, derivative of vector function and geometrical
interpretation, motion along a curve-velocity, speed and acceleration. Concept of scalar and vector
fields , Gradient and its properties, directional derivative , divergence and curl, Line integrals of
vector fields, work as line integral, Conservative vector fields , independence of path and potential
function(results without proof).
(Text 1: Relevant topics from sections 15.4, 15.5, 15.6, 15.7, 15.8)
Green’s theorem (for simply connected domains, without proof) and applications to evaluating line
integrals and finding areas. Surface integrals over surfaces of the form z = g(x, y), y = g(x, z) or x =
g(y, z) , Flux integrals over surfaces of the form z = g(x, y), y = g(x, z) or x = g(y, z), divergence
theorem (without proof) and its applications to finding flux integrals, Stokes’ theorem (without
proof) and its applications to finding line integrals of vector fields and work done.
(Text 2: Relevant topics from sections 2.1, 2.2, 2.5, 2.6, 2.7, 2.10, 3.1, 3.2, 3.3)
Laplace Transform and its inverse ,Existence theorem ( without proof) , linearity,Laplace transform
of basic functions, first shifting theorem, Laplace transform of derivatives and integrals, solution of
differential equations using Laplace transform, Unit step function, Second shifting theorems. Dirac
delta function and its Laplace transform, Solution of ordinary differential equation involving unit
step function and Dirac delta functions. Convolution theorem(without proof)and its application to
finding inverse Laplace transform of products of functions.
Module-5 (Fourier Tranforms)
Fourier integral representation, Fourier sine and cosine integrals. Fourier sine and cosine transforms,
inverse sine and cosine transform. Fourier transform and inverse Fourier transform, basic properties.
The Fourier transform of derivatives. Convolution theorem (without proof)
Text Books
Reference Books
2. G.B. Thomas and R.L. Finney, Calculus and Analytic geometry, 9 th Edition, Pearson,Reprint,
2002.
4. Louis C Barret, C Ray Wylie, “Advanced Engineering Mathematics”, Tata McGraw Hill, 6 th
edition, 2003.
7. Srimanta Pal, Subodh C. Bhunia, “Engineering Mathematics”, Oxford University Press, 2015.
8. Ronald N. Bracewell, “The Fourier Transform and its Applications”, McGraw – Hill
International Editions, 2000.
1.3 Gradient and its properties, directional derivative , divergent and curl 3
1.4 Line integrals with respect to arc length, line integrals of vector fields. 2
Work done as line integral
4.5 Dirac Delta function and solution of ODE involving Dirac delta function 2
Preamble: The aim of the Engineering Physics Program is to offer students a solid background in the
fundamentals of Physics and to impart that knowledge in engineering disciplines. The
program is designed to develop scientific attitudes and enable the students to correlate
the concepts of Physics with the core programmes
Course Outcomes: After the completion of the course the student will be able to
CO 2 Apply the interaction of light with matter through interference, diffraction and identify
these phenomena in different natural optical processes and optical instruments.
CO 3 Analyze the behaviour of matter in the atomic and subatomic level through the principles of
quantum mechanics to perceive the microscopic processes in electronic devices.
CO 4 Classify the properties of magnetic materials and apply vector calculus to static magnetic
fields and use Maxwell’s equations to diverse engineering problems
CO 5 Analyze the principles behind various superconducting applications, explain the working of
solid state lighting devices and fibre optic communication system
PO 1 PO 2 PO 3 PO 4 PO 5 PO 6 PO 7 PO 8 PO 9 PO 10 PO 11 PO 12
CO 1 3 2 1 2 1
CO 2 3 2 1 2 1
CO 3 3 2 1 2 1
CO 4 3 1 1 2 1
CO 5 3 1 1 2 1
Assessment Pattern
Mark distribution
Attendance : 10 marks
Continuous Assessment Test (2 numbers) : 25 marks
Assignment/Quiz/Course project : 15 marks
End Semester Examination Pattern: There will be two parts; Part A and Part B. Part A contain 10
questions with 2 questions from each module, having 3 marks for each question. Students should
answer all questions. Part B contains 2 questions from each module of which student should answer
any one. Each question can have maximum 2 sub-divisions and carry 14 marks.
3. (a) Explain the formation of Newton’s rings and obtain the expression for radii of bright and
dark rings in reflected system. Also explain how it is used to determine the wavelength of
a monochromatic source of light.
(b) A liquid of refractive index µ is introduced between the lens and glass plate.
What happens to the fringe system? Justify your answer.
3. (a) Solve Schrodinger equation for a particle in a one dimensional box and obtain its
energy eigen values and normalised wave functions.
(b) Calculate the first three energy values of an electron in a one dimensional box of width
1 A0 in electron volt.
3. (a) Starting from Maxwell’s equations, derive the free space electromagnetic wave
equation and show that velocity of electromagnetic wave is 1/ (µo εo) ½
(b) An electromagnetic wave is described by E = 100 exp 8πi [10 14 t – (10 6 z / 3)] V/m.
Find the direction of propagation of the wave,speed of the wave and magnetic flux
density in the wave.
QP CODE: PAGES:3
Reg No:______________
Name :______________
APJ ABDUL KALAM TECHNOLOGICAL UNIVERSITY FIRST SEMESTER B.TECH DEGREE EXAMINATION,
MONTH & YEAR
PART A
4. Diffraction of light is not as evident in daily experience as that of sound waves. Give reason.
5. State and explain Heisenberg’s Uncertainty principle. With the help of it explain natural
line broadening.
PART B
Answer any one full question from each module. Each question carries 14 Marks
Module 1
11. (a) Derive the differential equation of damped harmonic oscillator and deduce its
solution.Discuss the cases of over damped, critically damped and under damped cases. (10)
(b) The frequency of a tuning fork is 500 Hz and its Q factor is 7×10 4. Find the relaxation time.
Also calculate the time after which its energy becomes 1/10 of its initial undamped value.(4)
12. (a) Derive an expression for the velocity of propagation of a transverse wave in a stretched
string. Deduce laws of transverse vibrations. (10)
(b) The equation of transverse vibration of a stretched string is given by y =0.00327 sin (72.1x-
2.72t)m, in which the numerical constants are in S.I units. Evaluate (i) Amplitude (ii) Wavelength
(iii) Frequency and (iv)Velocity of the wave. (4)
Module 2
13.(a)Explain the formation of Newton’s rings and show that the radius of dark ring is
proportional to the square root of natural numbers. How can we use Newton’s rings
experiment to determine the refractive index of a liquid. (10)
(b) Two pieces of plane glass are placed together with a piece of paper between two at one
end. Find the angle of the wedge in seconds if the film is viewed with a monochromatic light of
wavelength 4800Å. Given β = 0.0555 cm. (4)
14. (a) Explain the diffraction due to a plane transmission grating. Obtain the grating equation. (10)
(b) A grating has 6000 lines per cm. Find the angular separation of the two yellow lines
of mercury of wavelengths 577 nm and 579 nm in the second order. (4)
Module 3
(b) An electron is confined to one dimensional potential box of length 2Å. Calculate the energies
corresponding to the first and second quantum states in eV. (4)
16.(a) Classify nanomaterials based on dimensionality of quantum confinement and explain the
following nanostructures. (i) nano sheets (ii) nano wires (iii) quantum dots. (10)
(b) Find the de Broglie wavelength of electron whose kinetic energy is 15 eV. (4)
Module 4
17.(a) State Poynting’s Theorem. Calculate the value of Poynting vector at the surface of the sun if
the power radiated by the sun is 3.8 x 10 26 W and its radius is 7 X 10 8 m. (5)
(b) Distinguish between paramagnetic, diamagnetic and ferromagnetic materials. (9)
18.(a) Starting from Maxwell’s Equations, derive electromagnetic wave equations in free space. (10)
(b) If the magnitude of H in a plane wave is 1 A/m, find the magnitude of E in free space. (4)
Module 5
19.(a) Show that superconductors are perfect diamagnets. Distinguish between Type I and
20.(a) Define numerical aperture of an optic fibre and derive an expression for the NA of a step
index fibre with a neat diagram. (10)
(b) Calculate the numerical aperture and acceptance angle of a fibre with a core refractive index
of 1.54 and a cladding refractive index of 1.50 when the fibre is inside water of refractive
index 1.33. (4) (14x5=70)
Syllabus
ENGINEERING PHYSICS A
(FOR CIRCUIT BRANCHES)
Module 1
Oscillations and Waves
Harmonic oscillations, Damped harmonic motion-Derivation of differential equation and its solution,
Over damped, Critically damped and Under damped Cases, Quality factor-Expression, Forced
oscillations-Differential Equation-Derivation of expressions for amplitude and phase of forced
oscillations, Amplitude Resonance-Expression for Resonant frequency, Quality factor and Sharpness
of Resonance, Electrical analogy of mechanical oscillators
Wave motion- Derivation of one dimensional wave equation and its solution, Three dimensional
wave equation and its solution (no derivation), Distinction between transverse and longitudinal
waves, Transverse vibration in a stretched string, Statement of laws of vibration
Module 2
Wave Optics
Interference of light-Principle of superposition of waves, Theory of thin films - Cosine law (Reflected
system), Derivation of the conditions of constructive and destructive Interference, Interference due
to wedge shaped films -Determination of thickness and test for optical planeness, Newton’s rings -
Measurement of wavelength and refractive index, Antireflection coatings
Module 3
Quantum Mechanics & Nanotechnology
Introduction for the need of Quantum mechanics, Wave nature of Particles, Uncertainty principle,
Applications-Absence of electrons inside a nucleus and Natural line broadening mechanism,
Formulation of time dependent and independent Schrodinger wave equations-Physical meaning of
wave function, Particle in a one dimensional box- Derivation for normalised wave function and
energy eigen values, Quantum Mechanical Tunnelling (Qualitative)
Introduction to nanoscience and technology, Increase in surface to volume ratio for nanomaterials,
Quantum confinement in one dimension, two dimension and three dimension-Nano sheets, Nano
wires and Quantum dots, Properties of nanomaterials-mechanical, electrical and optical,
Applications of nanotechnology (qualitative ideas)
Module 4
Magnetism & Electro Magnetic Theory
Magnetic field and Magnetic flux density, Gauss’s law for Magnetic flux density, Ampere’s Circuital
law, Faraday’s law in terms of EMF produced by changing magnetic flux, Magnetic permeability and
susceptibility, Classification of magnetic materials-para, dia and ferromagnetic materials
Fundamentals of vector calculus, concept of divergence, gradient and curl along with physical
significance, Line, Surface and Volume integrals, Gauss divergence theorem & Stokes’ theorem,
Equation of continuity, Derivation of Maxwell’s equations in vacuum, Comparison of displacement
current with conduction current. Electromagnetic waves, Velocity of Electromagnetic waves in free
space, Flow of energy and Poynting’s vector (no derivation)
Module 5
Superconductivity & Photonics
Superconducting phenomena, Meissner effect and perfect diamagnetism, Types of superconductors-
Type I and Type II, BCS Theory (Qualitative), High temperature superconductors-Applications of
super conductivity
Introduction to photonics-Photonic devices-Light Emitting Diode, Photo detectors -Junction and PIN
photodiodes, Solar cells-I-V Characteristics, Optic fibre-Principle of propagation of light, Types of
fibres-Step index and Graded index fibres, Numerical aperture –Derivation, Fibre optic
communication system (block diagram), Industrial, Medical and Technological applications of optical
fibre, Fibre optic sensors-Intensity Modulated and Phase modulated sensors.
Text Books
2. H.K.Malik , A.K. Singh, “Engineering Physics” McGraw Hill Education, Second Edition 2017
Reference Books
1. Arthur Beiser, “Concepts of Modern Physics ", Tata McGraw Hill Publications, 6th Edition
2003
2. D.K. Bhattacharya, Poonam Tandon, “Engineering Physics”, Oxford University Press, 2015
7. Halliday, Resnick, Walker, “Fundamentals of Physics’’, John Wiley & Sons.Inc, 2001
10. I. Dominic and. A. Nahari, “A Text Book of Engineering physics”, Owl Books Publishers,
Revised edition, 2016
Course Contents and Lecture Schedule
No Topic No. of Lectures
1 Oscillations and Waves (9 hours)
3.1 Introduction for the need of Quantum mechanics, Wave nature of 2 hrs
Particles, Uncertainty principle, Applications-Absence of electrons
inside a nucleus and Natural line broadening mechanism
3.2 Formulation of time dependent and independent Schrodinger wave 4 hrs
equations-Physical Meaning of wave function, Particle in a one
dimensional box- Derivation for normalised wave function and energy
eigen values, Quantum Mechanical Tunnelling (Qualitative)
3.3 Introduction to nanoscience and technology, Increase in surface to 2 hrs
volume ratio for nanomaterials, Quantum confinement in one
dimension, two dimension and three dimension-Nano sheets, Nano
wires and Quantum dots
3.4 Properties of nanomaterials-mechanical, electrical and optical 1 hr
Applications of nanotechnology (qualitative ideas)
4 Magnetism & Electro Magnetic Theory (9 hours)
4.1 Magnetic field and Magnetic flux density, Gauss’s law for Magnetic flux 2 hrs
density, Ampere’s Circuital law, Faraday’s law in terms of EMF
produced by changing magnetic flux
4.2 Explanation for Magnetic permeability and susceptibility Classification 1 hr
of magnetic materials- para, dia and ferromagnetic materials
4.3 Fundamentals of vector calculus, concept of divergence, gradient and 2 hrs
curl along with physical significance, Line, Surface and Volume integrals,
Gauss divergence theorem & Stokes’ theorem
4.4 Equation of continuity, Derivation of Maxwell’s equations in vacuum, 4 hrs
Comparison of displacement current with conduction current.
Electromagnetic waves, Velocity of Electromagnetic waves in free
space, Flow of energy and Poynting’s vector (no derivation)
5 Superconductivity &Photonics (9hours)
5.1 Super conducting Phenomena, Meissner effect and perfect 2 hrs
diamagnetism, Types of superconductors-Type I and Type II
5.2 BCS Theory (Qualitative), High temperature superconductors, 2 hrs
Applications of super conductivity
5.3 Introduction to photonics-Photonic devices-Light Emitting Diode, Photo 2 hrs
detectors -Junction and PIN photodiodes, Solar cells-I-V Characteristics
5.4 Optic fibre-Principle of propagation of light, Types of fibres-Step index 3 hrs
and Graded index fibres, Numerical aperture –Derivation, Fibre optic
communication system (block diagram), Industrial, Medical and
Technological applications of optical fibre, Fibre optic sensors-Intensity
Modulated and Phase modulated sensors
PHT ENGINEERING PHYSICS B Category L T P CREDIT Year of
110 (FOR NON-CIRCUIT BRANCHES) Introduction
BSC 3 1 0 4 2019
Preamble: The aim of the Engineering Physics program is to offer students a solid background in the
fundamentals of Physics and to impart that knowledge in engineering disciplines. The
program is designed to develop scientific attitudes and enable the students to
correlate the concepts of Physics with the core programmes
Course Outcomes: After the completion of the course the student will be able to
CO 2 Apply the interaction of light with matter through interference, diffraction and identify
these phenomena in different natural optical processes and optical instruments.
CO 3 Analyze the behaviour of matter in the atomic and subatomic level through the principles
of quantum mechanics to perceive the microscopic processes in electronic devices.
CO 4 Apply the knowledge of ultrasonics in non-destructive testing and use the principles of
acoustics to explain the nature and characterization of acoustic design and to provide a safe
and healthy environment
CO 5 Apply the comprehended knowledge about laser and fibre optic communication systems in
various engineering applications
PO 1 PO 2 PO 3 PO 4 PO 5 PO 6 PO 7 PO 8 PO 9 PO PO PO
10 11 12
CO 1 3 2 1 2 1
CO 2 3 2 1 2 1
CO 3 3 2 1 2 1
CO 4 3 1 2 1
CO 5 3 2 1 2 1
Assessment Pattern
Mark distribution
End Semester Examination Pattern: There will be two parts; Part A and Part B. Part A contain 10
questions with 2 questions from each module, having 3 marks for each question. Students should
answer all questions. Part B contains 2 questions from each module of which student should answer
any one. Each question can have maximum 2 sub-divisions and carry 14 marks.
QP CODE: PAGES:3
Reg No:______________
Name :______________
APJ ABDUL KALAM TECHNOLOGICAL UNIVERSITY FIRST SEMESTER B.TECH DEGREE EXAMINATION,
MONTH & YEAR
PART A
4. Diffraction of light is not as evident in daily experience as that of sound waves. Give reason.
5. State and explain Heisenberg’s Uncertainty principle. With the help of it explain natural
line broadening.
7. Define sound intensity level. Give the values of threshold of hearing and threshold of pain.
10. Distinguish between step index and graded index fibre. (10x3=30)
PART B
Answer any one full question from each module. Each question carries 14 Marks
Module 1
11. (a) Derive the differential equation of damped harmonic oscillator and deduce its
solution. Discuss the cases of over damped, critically damped and under damped
cases. (10)
(b) The frequency of a tuning fork is 500 Hz and its Q factor is 7×104. Find the relaxation
time. Also calculate the time after which its energy becomes 1/10 of its initial
undamped value. (4)
12. (a) Derive an expression for the velocity of propagation of a transverse wave in a stretched
string. Deduce laws of transverse vibrations. (10)
(b) The equation of transverse vibration of a stretched string is given by y =0.00327 sin
(72.1x-2.72t ) m, in which the numerical constants are in S.I units. Evaluate (i)
Amplitude (ii) Wavelength (iii) Frequency and (iv) Velocity of the wave. (4)
Module 2
13. (a) Explain the formation of Newton’s rings and show that the radius of dark ring is
proportional to the square root of natural numbers. How can we use Newton’s rings
experiment to determine the refractive index of a liquid? (10)
(b) Two pieces of plane glass are placed together with a piece of paper between two at
one end. Find the angle of the wedge in seconds if the film is viewed with a
monochromatic light of wavelength 4800Å. Given β = 0.0555 cm. (4)
14. (a) Explain the diffraction due to a plane transmission grating. Obtain the grating equation.
(10)
(b) A grating has 6000 lines per cm. Find the angular separation of the two yellow lines
of mercury of wavelengths 577 nm and 579 nm in the second order. (4)
Module 3
15. (a) Derive time dependent and independent Schrodinger equations. (10)
(b) An electron is confined to one dimensional potential box of length 2Å. Calculate the
energies corresponding to the first and second quantum states in eV. (4)
16. (a) Classify nanomaterials based on dimensionality of quantum confinement and explain the
following nanostructures. (i) nano sheets (ii) nano wires (iii) quantum dots. (10)
(b) Find the de Broglie wavelength of electron whose kinetic energy is 15 eV. (4)
Module 4
17. (a) Explain reverberation and reverberation time? What is the significance of
Reverberation time. Explain the factors affecting the acoustics of a building and their
corrective measures? (10)
(b) The volume of a hall is 3000 m3. It has a total absorption of 100m2 sabine. If the hall is filled
with audience who add another 80 m2sabine, then find the difference in reverberation time. (4)
18. (a) With a neat diagram explain how ultrasonic waves are produced by piezoelectric
oscillator. Also discuss the piezoelectric method of detection of ultrasonic waves. (10)
(b) An ultrasonic source of 0.09 MHz sends down a pulse towards the sea bed which
returns after 0.55 sec. The velocity of sound in sea water is 1800 m/s. Calculate the
depth of the sea and the wavelength of the pulse. (4)
Module 5
19. (a) Outline the construction and working of Ruby laser. (8)
20. (a) Define numerical aperture of an optic fibre and derive an expression for the NA of a step
index fibre with a neat diagram. (10)
(b) An optical fibre made with core of refractive index 1.5 and cladding with a fractional
index difference of 0.0006. Find refractive index of cladding and numerical aperture. (4)
(14x5=70)
SYLLABUS
Module 1
Oscillations and Waves
Harmonic oscillations, Damped harmonic motion-Derivation of differential equation and its solution,
Over damped, Critically damped and Under damped Cases, Quality factor-Expression, Forced
oscillations-Differential Equation-Derivation of expressions for amplitude and phase of forced
oscillations, Amplitude Resonance-Expression for Resonant frequency, Quality factor and Sharpness
of Resonance, Electrical analogy of mechanical oscillators
Wave motion- Derivation of one dimensional wave equation and its solution, Three dimensional
wave equation and its solution (no derivation), Distinction between transverse and longitudinal
waves, Transverse vibration in a stretched string, Statement of laws of vibration
Module 2
Wave Optics
Interference of light-Principle of superposition of waves, Theory of thin films - Cosine law (Reflected
system), Derivation of the conditions of constructive and destructive Interference, Interference due
to wedge shaped films -Determination of thickness and test for optical planeness, Newton’s rings -
Measurement of wavelength and refractive index, Antireflection coatings
Module 3
Quantum Mechanics & Nanotechnology
Introduction for the need of Quantum mechanics, Wave nature of Particles, Uncertainty principle,
Applications-Absence of electrons inside a nucleus and Natural line broadening Mechanism,
Formulation of time dependent and independent Schrodinger wave equations-Physical Meaning of
wave function, Particle in a one dimensional box- Derivation for normalised wave function and
energy eigen values, Quantum Mechanical Tunnelling (Qualitative)
Introduction to nanoscience and technology, Increase in surface to volume ratio for nanomaterials,
Quantum confinement in one dimension, two dimension and three dimension-Nano sheets, Nano
wires and Quantum dots, Properties of nanomaterials-mechanical, electrical and optical,
Applications of nanotechnology (qualitative ideas)
Module 4
Acoustics & Ultrasonics
Acoustics, Classification of sound-Musical sound-Noise, Characteristics of Musical Sounds-Pitch or
frequency-Loudness or Intensity-Measurement of Intensity level-Decibel-Quality or timbre,
Absorption coefficient, Reverberation-Reverberation time-Significance- Sabine’s formula (no
derivation), Factors affecting architectural acoustics and their remedies
Module 5
Laser and Fibre optics
Properties of laser, Absorption and emission of radiation, Spontaneous and stimulated emission,
Einstein’s coefficients (no derivation), Population inversion, Metastable states, basic components of
laser, Active medium, Pumping mechanism, Optical resonant cavity, working principle, Construction
and working of Ruby laser and Helium neon laser ,Construction and working of semiconductor
laser(Qualitative) ,Applications of laser, Holography, Difference between hologram and photograph,
Recording of hologram and reconstruction of image, Applications
Optic fibre-Principle of propagation of light, Types of fibres-Step index and Graded index fibres,
Numerical aperture –Derivation, Fibre optic communication system (block diagram), Industrial,
Medical and Technological applications, Fibre optic sensors-Intensity Modulated and Phase
modulated sensors
Text Books
1. M.N.Avadhanulu, P.G.Kshirsagar,TVS Arun Murthy “A Text book of Engineering Physics”, S.Chand
&Co., Revised Edition, 2019.
2. H.K.Malik , A.K. Singh, “Engineering Physics” McGraw Hill Education, Second Edition, 2017.
Reference Books
1. Arthur Beiser, “Concepts of Modern Physics ", Tata McGraw Hill Publications, 6th Edition 2003
2. D.K. Bhattacharya, Poonam Tandon, “Engineering Physics”, Oxford University Press, 2015
3. Md.N.Khan & S.Panigrahi “Principles of Engineering Physics 1&2”, Cambridge University Press,
2016
7. B. B. Laud, “Lasers and Non linear optics”, New age International Publishers, 2nd Edition ,2005
9. I. Dominic and. A. Nahari, “A Text Book of Engineering physics”, Owl Books Publishers, Revised
edition, 2016
Course Contents and Lecture Schedule
No Topic No. of Lectures
1 Oscillations and Waves ( 9 hours)
3.1 Introduction for the need of Quantum mechanics, Wave nature of 2 hrs
Particles, Uncertainty principle, Applications-Absence of electrons
inside a nucleus and Natural line broadening mechanism
3.2 Formulation of time dependent and independent Schrodinger wave 4 hrs
equations-Physical Meaning of wave function, Particle in a one
dimensional box- Derivation for normalised wave function and energy
eigen values, Quantum Mechanical Tunnelling (Qualitative)
3.3 Introduction to nanoscience and technology, Increase in surface to 2 hrs
volume ratio for nanomaterials, Quantum confinement in one
dimension, two dimension and three dimension-Nano sheets, Nano
wires and Quantum dots
3.4 Properties of nanomaterials-mechanical, electrical and optical 1 hr
Applications of nanotechnology (qualitative ideas)
4 Acoustics & Ultrasonics (9hrs)
Preamble: To enable the students to acquire knowledge in the concepts of chemistry for engineering
applications and to familiarize the students with different application oriented topics like
spectroscopy, electrochemistry, instrumental methods etc. Also familiarize the students with topics
like mechanism of corrosion, corrosion prevention methods, SEM, stereochemistry, polymers,
desalination etc., which enable them to develop abilities and skills that are relevant to the study and
practice of chemistry.
Course outcomes: After the completion of the course the students will be able to
CO 1 Apply the basic concepts of electrochemistry and corrosion to explore its possible
applications in various engineering fields.
CO 2 Understand various spectroscopic techniques like UV-Visible, IR, NMR and its
applications.
CO 3 Apply the knowledge of analytical method for characterizing a chemical mixture or a
compound. Understand the basic concept of SEM for surface characterisation of
nanomaterials.
CO 4 Learn about the basics of stereochemistry and its application. Apply the knowledge of
conducting polymers and advanced polymers in engineering.
CO 5 Study various types of water treatment methods to develop skills for treating
wastewater.
PO 1 PO 2 PO 3 PO 4 PO 5 PO 6 PO 7 PO 8 PO 9 PO PO PO
10 11 12
CO 1 1 2 1
CO 2 1 1 1 2
CO 3 1 1 1 2
CO 4 2 1
CO 5 1 1 3
Assessment Pattern
End Semester Examination Pattern: There will be two parts- Part A and Part B. Part A contains 10
questions (2 questions from each module), having 3 marks for each question. Students should
answer all questions. Part B contains 2 questions from each module, of which student should
answer any one. Each question can have maximum 2 subdivisions and carries 14 marks.
3. (a) Explain how electroless plating copper and nickel are carried out (10 Marks)
(b) Calculate the emf of the following cell at 30oC, Z n / Zn 2+ (0.1M) // Ag+ (0.01M) // Ag.
3. (a) What is Chemical shift? What are factors affecting Chemical shift? How 1H NMR spectrum of
CH3COCH2Cl interpreted using the concept of chemical shift. (10 Marks)
(b) Calculate the force constant of HF molecule, if it shows IR absorption at 4138 cm -1. Given that
atomic masses of hydrogen and fluorine are 1u and 19u respectively. (4 Marks)
3. (a) What are conducting polymers? How it is classified? Give the preparation of polyaniline
(10 Marks)
(b) Standard hard water contains 20 g of CaCO3 per liter,50 mL of this required 30mL of EDTA
solution, 50mL of sample water required 20mL of EDTA solution. 50mL sample water after boiling
required 14 mL EDTA solution. Calculate the temporary hardness of the given sample of water, in
terms of ppm. (4 Marks)
Total Pages:
Reg No.:_______________ Name:__________________________
PART A
Answer all questions, each carries 3 marks Marks
1 What is potentiometric titration? How the end point is determined graphically? (3)
2 What is Galvanic series? How is it different from electrochemical series? (3)
3 Which of the following molecules can give IR absorption? Give reason? (3)
(a) O2 (b) H2O (c) N2 (d) HCl
4 Which of the following molecules show UV-Visible absorption? Give reason. (3)
(a) Ethane (b) Butadiene (c) Benzene
5 What are the visualization techniques used in TLC? (3)
6 Write the three important applications of nanomaterials. (3)
7 Draw the Fischer projection formula and find R-S notation of (3)
PART B
Answer any one full question from each module, each question carries 14 marks
Module 1
11 a) Give the construction of Li-ion cell. Give the reactions that take place at the (10)
electrodes during charging and discharging. What happens to anodic material when
the cell is 100% charged.
b) Calculate the standard electrode potential of Cu, if its electrode potential at 25 °C (4)
2+
is 0.296 V and the concentration of Cu is 0.015 M.
OR
12 a) Explain the mechanism of electrochemical corrosion of iron in oxygen rich and oxygen (10)
deficient acidic and basic environments.
b) Given below are reduction potentials of some species (4)
Use the above data to examine whether the acids, dil. HCl and dil. H2SO4 , can be used
to provide acid medium in redox titrations involving KMnO4.
Module 2
13 a) What is spin-spin splitting? Draw the NMR spectrum of (i) CH3 CH2CH2 Br (ii) (10)
CH3CH(Br)CH3 Explain how NMR spectrum can be used to identify the two isomers.
b) A dye solution of concentration 0.08M shows absorbance of 0.012 at 600 nm; while a (4)
test solution of same dye shows absorbance of 0.084 under same conditions. Find the
concentration of the test solution.
OR
14 a) Explain the basic principle of UV-Visible spectroscopy. What are the possible (10)
electronic transitions? Explain with examples.
b) Sketch the vibrational modes of CO2 and H2O. Which of them are IR active? (4)
Module 3
15 a) Explain the principle, instrumentation and procedure involved in gas chromatography. (10)
b) Explain the DTA of CaC2O4.H2O with a neat sketch. (4)
OR
16 a) Explain the various chemical methods used for the synthesis of nanomaterial (10)
b) How TGA is used to analyse the thermal stability of polymers? (4)
Module 4
Syllabus
Module 1
Introduction - Differences between electrolytic and electrochemical cells - Daniel cell - redox
reactions - cell representation. Different types of electrodes (brief) - Reference electrodes - SHE -
Calomel electrode - Glass Electrode - Construction and Working. Single electrode potential -
definition - Helmholtz electrical double layer -Determination of E0 using calomel
electrode.Determination of pH using glass electrode.Electrochemical series and its applications. Free
energy and EMF - Nernst Equation - Derivation - single electrode and cell (Numericals) -Application -
Variation of emf with temperature. Potentiometric titration - Introduction -Redox titration
only.Lithiumion cell - construction and working.Conductivity- Measurement of conductivity of a
solution (Numericals).
Module 3
Thermal analysis –TGA- Principle, instrumentation (block diagram) and applications – TGA of
CaC2O4.H2O and polymers. DTA-Principle, instrumentation (block diagram) and applications - DTA of
CaC2O4.H2O. Chromatographic methods - Basic principles and applications of column and TLC-
Retention factor. GC and HPLC-Principle, instrumentation (block diagram) - retention time and
applications.
Module 4
Copolymers - Definition - Types - Random, Alternating, Block and Graft copolymers - ABS -
preparation, properties and applications.Kevlar-preparation, properties and applications.Conducting
polymers - Doping -Polyaniline and Polypyrrole - preparation properties and applications. OLED -
Principle, construction and advantages.
Module 5
Dissolved oxygen (DO) -Estimation (only brief procedure-Winkler’s method), BOD and COD-
definition, estimation (only brief procedure) and significance (Numericals). Sewage water treatment
- Primary, Secondary and Tertiary - Flow diagram -Trickling filter and UASB process.
Text Books
Reference Books
2. Donald L. Pavia, “Introduction to Spectroscopy”, Cengage Learning India Pvt. Ltd., 2015.
10. Soney C. George,RinoLaly Jose, “Text Book of Engineering Chemistry”, S. Chand & Company
Pvt Ltd, 2019.
Course Contents and Lecture Schedule
No Topic No. of
Lectures
(hrs)
4.2 R-S Notation – Rules and examples - Optical isomerism, Chirality, Enantiomers 1
and Diastereoisomers-Definition with examples.
5.3 Dissolved oxygen (DO) -Estimation (only brief procedure-Winkler’s method), BOD 2
and COD-definition, estimation (only brief procedure) and significance
(Numericals).
5.4 Sewage water treatment - Primary, Secondary and Tertiary - Flow diagram - 2
Trickling filter and UASB process.
EST ENGINEERING CATEGORY L T P CREDIT Year of Introduction
100 MECHANICS ESC 2 1 0 3 2019
Preamble: Goal of this course is to expose the students to the fundamental concepts of mechanics
and enhance their problem-solving skills. It introduces students to the influence of applied force
system and the geometrical properties of the rigid bodies while stationary or in motion. After this
course students will be able to recognize similar problems in real-world situations and respond
accordingly.
Prerequisite: Nil
Course Outcomes: After completion of the course the student will be able to:
CO 2 Identify and describe the components of system of forces acting on the rigid body
Apply the conditions of equilibrium to various practical problems involving different force
CO 3 system.
CO 5 Solve problems involving rigid bodies, applying the properties of distributed areas and masses
PO 1 PO 2 PO 3 PO 4 PO 5 PO 6 PO 7 PO 8 PO 9 PO 10 PO 11 PO 12
CO 1 2 2 - - - - - - - - - -
CO 2 3 3 - - - - - - - - - -
CO 3 3 3 - - - - - - - - - -
CO 4 3 3 - - - - - - - - - -
CO 5 3 3 - - - - - - - - - -
Assessment Pattern
End Semester Examination Pattern: There will be two parts; Part A and Part B. Part A contain 10
questions with 2 questions from each module, having 3 marks for each question. Students should
answer all questions. Part B contains 2 questions from each module of which student should answer
any one. Each question can have maximum 2 sub-divisions and carry 14 marks.
Part A
Course Outcome 1 (CO1): (One question from each module to meet the course objective 1: To
recall principles and theorems related to rigid body mechanics)
1. Explain D’Alembert’s principle
Course Outcome 2 (CO2) (One question from each module to meet the course objective 2: To
identify and describe the components of system of forces acting on the rigid body)
1. A simply supported beam AB of span 5 m is carrying point loads 5 kN, 3 kN and 2 kN at 1m, 3m
and 4m respectively from support A. Calculate the support reaction at B.
2. A gymnast holding onto a bar, is suspended motionless in mid-air. The bar is supported by two
ropes that attach to the ceiling. Diagram the forces acting on the combination of gymnast and bar
3. While you are riding your bike, you turn a corner following a circular arc. Illustrate the forces that
act on your bike to keep you along the circular path ?
Part B
All the questions under this section shall assess the learning levels corresponding to the course
outcomes listed below.
To apply the conditions of equilibrium to variou
variouss practical problems involving different force
CO 3
system.
To solve problems involving rigid bodies, applying the properties of distributed areas and
CO 5 masses
1. Two rollers each of weight 100 N are supported by an inclined plane and a vertical wall. Find the
reaction at the points of contact A, B, C. Assume all the surfaces to be smooth.
Course
Description of course outcome Marks
outcome Learning level assessed
allocated
identifier
To apply the conditions of equilibrium Applying – (Sketch the free
CO 3 to various practical problems involving body diagram that represent 4
different force system. equilibrium state of the body )
Total 14
2. A cylindrical disc, 50 cm diameter and cm thickness, is in contact with a horizontal conveyor belts
running at uniform speeds of 5 m/s. Assuming there is no slip at points of contact determine (i)
angular velocity of disc (ii) Angular acceleration of disc if velocity of conveyor changes to 8 m/s. Also
compute the moment acting about the axis of the disc in both cases.
Course
Description of course outcome Marks
outcome Learning level assessed
allocated
identifier
To apply the conditions of equilibrium to Applying – (Sketch the
CO 3 various practical problems involving different free body diagram that 4
force system. represent state of the
body )
Applying (Choose the
To choose appropriate theorems, principles or
CO 4 equations and formulae 4
formulae to solve problems of mechanics.
required for calculation)
Total 14
Course Marks
outcome Description of course outcome Learning level assessed allocat
identifier ed
To apply the conditions of equilibrium to Applying – (Illustrate the
CO 3 various practical problems involving computation of centroid for 4
different force system. the given geometrical shape)
To choose appropriate theorems, Applying (Choose the
CO 4 principles or formulae to solve problems equations and formulae 4
of mechanics. required for calculation)
Total 14
4. A rectangular hole is made in a triangular section as shown. Find moment of inertia about the
section x-x passing through the CG of the section and parallel to BC.
Course
Description of course outcome Marks
outcome Learning level assessed
allocated
identifier
To apply the conditions of equilibrium to Applying – (Illustrate the 4
Total 14
Model Question Paper
QP CODE:
Reg No.:_______________
Name:__________________________ ___
APJ ABDUL KALAM TECHNOLOGICAL UNIVERSITY FIRST SEMESTER B.TECH DEGREE EXAMINATION,
MONTH & YEAR
ENGINEERING MECHANICS
Part A
4. A simply supported beam AB of span 5 m is carrying point loads 5 kN, 3 kN and 2 kN at 1m, 3m
and 4m respectively from support A. Calculate the support reaction at B.
5. A gymnast holding onto a bar, is suspended motionless in mid-air. The bar is supported by two
ropes that attach to the ceiling. Diagram the forces acting on the combination of gymnast and bar
6. While you are riding your bike, you turn a corner following a circular arc. Illustrate the forces that
act on your bike to keep you along the circular path ?
8. State the equation of motion of a rotating rigid body, rotating about its fixed axis.
9. Illustrate the significance of instantaneous centre in the analysis of rigid body undergoing
rotational motion.
10. Highlight the principles of mechanics applied in the evaluation of elastic collusion of rigid bodies.
PART B
(Answer one full question from each module, each question carries 14 marks)
Module -I
11. Two identical rollers each of weight 100 N are supported by an inclined plane, making an angle
of 30o with the vertical, and a vertical wall. Find the reaction at the points of contact A, B, C. Assume
all the surfaces to be smooth. (14 marks)
C
A
B
12. A string tied to a wall is made to pass over a pulley placed 2m away from it. A weight P is
attached to the string such that the string stretches by 2m from the support on the wall to the
location of attachment of weight. Determine the force P required to maintain 200 kg body in
position for = 30o, The diameter of pulley B is negligible. (14 marks)
Module – 2
13. Two blocks A & B are resting against a wall and the floor as shown in figure below. Find the
value of horizontal force P applied to the lower block that will hold the system in equilibrium.
Coefficient of friction are : 0.25 at the floor, 0.3 at the wall and 0.2 between the blocks.
(14 marks)
14. A beam is hinged at A and roller supported at B. It is acted upon by loads as shown below.
Find the reactions at A & B. (14 marks)
Module – 3
15. A rectangular hole is made in a triangular section as shown. Find moment of inertia about the
section x-x passing through the CG of the section and parallel to BC. (14 marks)
16. Support A has ball and socket connection. Roller support at B prevents motion in the —z
direction. Corner C is tied to D by a rope. The triangle is weightless. Determine the unknown force
components acting at A, B, and C. (14 marks)
Module - 4
17. A cricket ball is thrown by a fielder from a height of 2m at an angle of 300 to the horizontal with
an initial velocity of 20 m/s , hits the wickets at a height of 0.5 m from the ground. How far was the
fielder from the wicket? (14 marks)
18. An engine of weight 500 kN pull a train weighing 1500 kN up an incline of 1 in 100. The train
starts from rest and moves with constant acceleration against a resistance of 5 N/kN. It attains a
maximum speed of 36 kmph in 1 km distance. Determine the tension in the coupling between train
and engine and the traction force developed by the engine. (14marks)
Module – 5
19. A cylindrical disc, 50 cm diameter and 10 cm thickness having mass of 10 kg, is in contact with a
horizontal conveyor belt running at uniform speeds of 5 m/s. Assuming there is no slip at points of
contact determine (i) angular velocity of disc (ii) Angular acceleration of disc if velocity of conveyor
changes to 8 m/s in 10 seconds. Also compute the moment acting about the axis of the disc in both
cases. (14 marks)
20. A wheel rotating about fixed axis at 20 rpm is uniformly accelerated for 70 seconds during which
time it makes 50 revolutions. Find the (i) angular velocity at the end of this interval and (ii) time
required for the velocity to reach 100 revolutions per minute. (14 marks)
SYLLABUS
Module 1
Introduction to Engineering Mechanics-statics-basic principles of statics-Parallelogram law,
equilibrium law, principles of superposition and transmissibility, law of action and reaction(review)
free body diagrams.
Concurrent coplanar forces-composition and resolution of forces-resultant and equilibrium
equations – methods of projections – methods of moments – Varignon’s Theorem of moments.
Module 2
Friction – sliding friction - Coulomb’s laws of friction – analysis of single bodies –wedges, ladder-
analysis of connected bodies .
Parallel coplanar forces – couple - resultant of parallel forces – centre of parallel forces – equilibrium
of parallel forces – Simple beam subject to concentrated vertical loads. General coplanar force
system - resultant and equilibrium equations.
Module 3
Centroid of composite areas- – moment of inertia-parallel axis and perpendicular axis theorems.
Polar moment of inertia,radius of gyration,mass moment of inertia-ring,cylinder and disc.
Theorem of Pappus Guldinus(demonstration only)
Forces in space - vectorial representation of forces, moments and couples –resultant and equilibrium
equations – concurrent forces in space (simple problems only)
Module 4
Dynamics – rectilinear translation - equations of kinematics(review)
kinetics – equation of motion – D’Alembert’s principle. – motion on horizontal and inclined
surfaces, motion of connected bodies. Impulse momentum equation and work energy equation
(concepts only).
Curvilinear translation - equations of kinematics –projectile motion(review), kinetics – equation of
motion. Moment of momentum and work energy equation (concepts only).
Module 5
Rotation – kinematics of rotation- equation of motion for a rigid body rotating about a fixed axis –
rotation under a constant moment.
Plane motion of rigid body – instantaneous centre of rotation (concept only).
Simple harmonic motion – free vibration –degree of freedom- undamped free vibration of spring
mass system-effect of damping(concept only)
Text Books
1. Timoshenko and Young, Engineering Mechanics, McGraw Hill Publishers
2. Shames, I. H., Engineering Mechanics - Statics and Dynamics, Prentice Hall of India.
3. R. C. Hibbeler and Ashok Gupta, Engineering Mechanics, Vol. I statics, Vol II Dynamics, Pearson
Education.
References
1. Merriam J. L and Kraige L. G., Engineering Mechanics - Vols. 1 and 2, John Wiley.
2. Tayal A K, Engineering Mechanics – Statics and Dynamics, Umesh Publications
3. Bhavikkatti, S.S., Engineering Mechanics, New Age International Publishers
4. F.P.Beer abd E.R.Johnston (2011), Vector Mechanics for Engineers, Vol.I-Statics, Vol.II-Dynamics,
9th Ed, Tata McGraw Hill
5. Rajasekaran S and Sankarasubramanian G, Engineering Mechanics - Statics and Dynamics, Vikas
Publishing House Pvt Ltd.
Course
No. of
Module Topic outcomes
Hours
addressed
1 Module 1 Total: 7
2.1 Friction – sliding friction - Coulomb’s laws of friction – analysis of CO1 and 1
single bodies –illustrative examples on wedges and ladder-teacher CO2
assisted problem solving tutorials using problems from wedges and
ladder.
2.2 Problems on friction - analysis of connected bodies. illustrative CO3, CO4 1
numerical exercise– teacher assisted problem solving. and CO5
2.6 General coplanar force system-resultant and equilibrium equations - CO3, CO4 1
illustrative examples and CO5
2.7 General coplanar force system - Extended problem solving - Quiz to CO3, CO4 1
evaluate learning level. and CO5
3 Module 3 Total: 7
3.1 Centroid of simple and regular geometrical shapes – centroid of CO1 and
figures in combination - composite areas- examples for illustration – CO2 1
problems for practice to be done by self.
3.2 Moment of inertia- parallel axis theorem –examples for illustration - CO1 and
1
problems for practice to be done by self. CO2
3.3 Moment of inertia - perpendicular axis theorem - example for CO1 and
illustration to be given as hand out and discussion on the solved CO2 1
example.
3.4 Solutions to practice problems – problems related to centroid and CO3, CO4 1
moment of inertia - problems for practice to be done by self. and CO5
3.5 Polar moment of inertia, Radius of gyration. CO1 and
1
Mass moment of inertia of ring, cylinder and uniform disc. CO2
Theorem of Pappus Guldinus - Demonstration
3.6 Introduction to forces in space – vectorial representation of forces, CO1,and
moments and couples – simple problems to illustrate vector CO2 1
representations of forces, moments and couples to be done in class.
3.7 Solution to practice problems - resultant and equilibrium equations
for concurrent forces in space – concurrent forces in space - 2 simple CO3,CO4 1
problems to illustrate the application of resultant and equilibrium and CO5
equations for concurrent forces in space.
4 Module 4 Total: 7
Introduction to dynamics – review of rectilinear translation - CO1 and
4.1 equations of kinematics – problems to review the concepts – CO2 1
additional problems involving extended application as exercises .
4.6 Extended problem solving – rectilinear and curvilinear translation. CO3, CO4 1
& CO5
Concepts on Impulse momentum equation and work energy equation 1
(rectilinear translation – discussions to bring out difference between
4.7 CO1 and
elastic and inelastic collusions).
CO2
Concepts on Moment of momentum and work energy equation
(curvilinear translation).
5 Module 5 Total: 7
Rotation – kinematics of rotation- equation of motion for a rigid body CO1 and 1
5.1 rotating about a fixed axis – simple problems for illustration. CO2
Rotation under a constant moment – teacher assisted problem 1
5.2 solving. CO3,CO4
and CO5
5.3 Rotation under a constant moment - extended problem solving. CO3, CO4 1
and CO5
Plane motion of rigid body- instantaneous centre of rotation (concept CO1 and 1
5.4
only). CO2
Preamble: To enable the student to effectively perform technical communication through graphical
representation as per global standards.
Prerequisite: NIL
Course Outcomes: After the completion of the course the student will be able to
PO PO PO PO PO PO PO PO PO PO PO PO
1 2 3 4 5 6 7 8 9 10 11 12
CO 1 3
CO 2 3
CO 3 3 1
CO 4 3 1
CO 5 3 2
CO 6 3 3 3
Assessment Pattern
QP CODE: PAGES:3
Reg No:______________
Name :______________
APJ ABDUL KALAM TECHNOLOGICAL UNIVERSITY FIRST SEMESTER B.TECH DEGREE EXAMINATION,
MONTH & YEAR
ENGINEERING GRAPHICS
PART A
MODULE I
1. The end point A of a line is 20mm above HP and 10mm in front of VP. The other end of the line is
50mm above HP and 15mm behind VP. The distance between the end projectors is 70mm. Draw
the projections of the line. Find the true length and true inclinations of the line with the principal
planes. Also locate the traces of the line.
2. One end of a line is 20mm from both the principal planes of projection. The other end of the line
is 50mm above HP and 40mm in front of VP. The true length of the line is 70mm. Draw the
projections of the line. Find its apparent inclinations, elevation length and plan length. Also
locate its traces.
MODULE II
3. A pentagonal pyramid of base side 25mm and height 40mm, is resting on the ground on one of
its triangular faces. The base edge of that face is inclined 30o to VP. Draw the projections of the
solid.
4. A hexagonal prism has side 25mm and height 50mm has a corner of its base on the ground and
the long edge containing that corner inclined at 30o to HP and 45o to VP. Draw the projections of
the solid.
MODULE III
5. A triangular prism of base side 40mm and height 70mm is resting with its base on the ground
and having an edge of the base perpendicular to VP. Section the solid such that the true shape of
the section is a trapezium of parallel sides 30mm and 10mm. Draw the projections showing the
true shape. Find the inclination of the cutting plane with the ground plane.
6. Draw the development of a pentagonal pyramid of base side 30mm and height 50mm. A string is
wound from a corner of the base round the pyramid and back to the same point through the
shortest distance. Show the position of the string in the elevation and plan.
MODULE IV
7. The frustum of a cone has base diameter 50mm and top diameter 40mm has a height of 60mm.
It is paced centrally on top of a rectangular slab of size 80x60mm and of thickness 20mm. Draw
the isometric view of the combination.
8. A hexagonal prism has base side 35mm and height 60mm. A sphere of diameter 40mm is
placed centrally on top of it. Draw the isometric projection of the combination.
MODULE V
9. Draw the perspective view of a pentagonal prism, 20mm side and 45mm long lying on one of its
rectangular faces on the ground and having its axis perpendicular to picture plane. One of its
pentagonal faces touches the picture plane and the station point is 50mm in front of PP, 25mm
above the ground plane and lies in a central plane, which is 70mm to the left of the center of the
prism.
10. Draw three orthographic views with dimensions of the object shown in figure below.
(20X5=100)
Time : 3 hours EST110 ENGINEERING GRAPHICS Max. Marks: 100
SCHEME OF VALUATION
1. Locating the points and drawing the projections of the line – 4 marks
Finding true length by any one method – 6 marks
Finding true inclination with VP – 2 marks
Finding true inclination with HP – 2 marks
Locating horizontal trace – 2 marks
Locating vertical trace – 2 marks
Dimensioning and neatness – 2 marks
Total = 20 marks
2. Locating the points and drawing true length of the line – 4 marks
Finding projections by any method – 6 marks
Finding length of elevation and plan – 2 marks
Finding apparent inclinations – 2 marks
Locating horizontal trace – 2 marks
Locating vertical trace – 2 marks
Dimensioning and neatness – 2 marks
Total = 20 marks
3. Drawing initial position plan and elevation – 4 marks
First inclination views – 4 marks
Second inclination views -8 marks
Marking invisible edges – 2 marks
Dimensioning and neatness – 2 marks
Total = 20 marks
(Any one method or combination of methods for solving can be used.
If initial position is wrong then maximum 50% marks may be allotted for the answer)
General Instructions:
First angle projection to be followed
Section A practice problems to be performed on A4 size sheets
Section B classes to be conducted on CAD lab
SECTION A
Module 1
Introduction : Relevance of technical drawing in engineering field. Types of lines, Dimensioning, BIS
code of practice for technical drawing.
Orthographic projection of Points and Lines: Projection of points in different quadrants, Projection of
straight lines inclined to one plane and inclined to both planes. Trace of line. Inclination of lines with
reference planes True length of line inclined to both the reference planes.
Module 2
Orthographic projection of Solids: Projection of Simple solids such as Triangular, Rectangle, Square,
Pentagonal and Hexagonal Prisms, Pyramids, Cone and Cylinder. Projection of solids in simple
position including profile view. Projection of solids with axis inclined to one of the reference planes
and with axis inclined to both reference planes.
Module 3
Sections of Solids: Sections of Prisms, Pyramids, Cone, Cylinder with axis in vertical position and cut
by different section planes. True shape of the sections. Also locating the section plane when the
true shape of the section is given.
Development of Surfaces: Development of surfaces of the above solids and solids cut by different
section planes. Also finding the shortest distance between two points on the surface.
Module 4
Isometric Projection: Isometric View and Projections of Prisms, Pyramids, Cone , Cylinder, Frustum of
Pyramid, Frustum of Cone, Sphere, Hemisphere and their combinations.
Module 5
Perspective Projection: Perspective projection of Prisms and Pyramids with axis perpendicular to the
ground plane, axis perpendicular to picture plane.
Conversion of Pictorial Views: Conversion of pictorial views into orthographic views.
SECTION B
(To be conducted in CAD Lab)
Introduction to Computer Aided Drawing: Role of CAD in design and development of new products,
Advantages of CAD. Creating two dimensional drawing with dimensions using suitable software.
(Minimum 2 exercises mandatory)
Introduction to Solid Modelling: Creating 3D models of various components using suitable modelling
software. (Minimum 2 exercises mandatory)
Text Books
1. Bhatt, N.D., Engineering Drawing, Charotar Publishing House Pvt. Ltd.
2. John, K.C. Engineering Graphics, Prentice Hall India Publishers.
Reference Books
2. Agrawal, B. And Agrawal, C.M., Engineering Darwing, Tata McGraw Hill Publishers.
3. Benjamin, J., Engineering Graphics, Pentex Publishers- 3 rd Edition, 2017
4. Duff, J.M. and Ross, W.A., Engineering Design and Visualisation, Cengage Learning.
5. Kulkarni, D.M., Rastogi, A.P. and Sarkar, A.K., Engineering Graphics with AutoCAD, PHI.
6. Luzaddff, W.J. and Duff, J.M., Fundamentals of Engineering Drawing, PHI.
7. Varghese, P.I., Engineering Graphics, V I P Publishers
8. Venugopal, K., Engineering Drawing and Graphics, New Age International Publishers.
No SECTION A No. of
Hours
1 MODULE I
1.3 Projection of lines, inclined to one plane. Lines inclined to both planes, 2
trapezoid method of solving problems on lines.
2 MODULE II
2.1 Introduction of different solids, Simple position plan and elevation of solids 2
3.1 Introduction to section planes. AIP and AVP. Principle of locating cutting 2
points and finding true shape
4 MODULE IV
5 MODULE V
Preamble:
Objective of this course is to provide an insight and inculcate the essentials of Civil Engineering
discipline to the students of all branches of Engineering and to provide the students an
illustration of the significance of the Civil Engineering Profession in satisfying the societal needs.
Prerequisite: NIL
Course Outcomes: After completion of the course, the student will be able to
Recall the role of civil engineer in society and to relate the various disciplines of Civil
CO 1 Engineering.
Summarise the basic infrastructure services MEP, HVAC, elevators, escalators and
CO 4
ramps
Discuss the Materials, energy systems, water management and environment for green
CO 5 buildings.
CO6 3 2
CO7 3 1
CO8 3 1
CO9 3 2
CO10 3 1
CO11 3
Assessment Pattern
Mark distribution
Attendance : 10 marks
Continuous Assessment Test (2 numbers) : 25 marks
Assignment/Quiz/Course project : 15 marks
There will be two parts; Part I – Basic Civil Engineering and Part II – Basic Mechanical Engineering.
Part I and PART II carries 50 marks each. For the end semester examination, part I contain 2 parts -
Part A and Part B. Part A contain 5 questions carrying 4 marks each (not exceeding 2 questions from
each module). Part B contains 2 questions from each module out of which one to be answered. Each
question carries 10 mark and can have maximum 2 sub-divisions. The pattern for end semester
examination for part II is same as that of part I. However, student should answer both part I and
part 2 in separate answer booklets.
Course Outcome CO1: To recall the role of civil engineer in society and to relate the various
disciplines of Civil Engineering.
1.Explain relevance of Civil engineering in the overall infrastructural development of the country.
Course outcome 2 (CO2) (One question from each module and not more than two)
Explain different types of buildings, building components, building materials and building
construction
1. Discuss the difference between plinth area and carpet area.
Course outcome 3 (CO3) (One question from each module and not more than two)
Course outcome 4 (CO4) (One question from each module and not more than two)
Summarise the basic infrastructure services MEP, HVAC, elevators, escalators and ramps
1. Explain the civil engineering aspects of elevators, escalators and ramps in buildings
Course outcome 5 (CO5) (One question from each module and not more than two)
Discuss the Materials, energy systems, water management and environment for green buildings.
Section II Answer any 1 full question from each module. Each full question carries 10 marks
Course Outcome 1 (CO1) (Two full question from each module and each question can have
maximum 2 sub-divisions)
To recall the role of civil engineer in society and to relate the various disciplines of Civil Engineering
CO Questions
1. a List out the types of building as per occupancy. Explain any two, each in about five sentences.
b. Discuss the components of a building with a neat figure.
2. a.What are the major disciplines of civil engineering and explain their role in the infrastructural
framework.
b. Explain the role of NBC, KBR & CRZ norms in building rules and regulations prevailing in our
country.
Course Outcome 2 (CO2) & Course Outcome 3 (CO3) (Two full question from each module and
each question can have maximum 2 sub-divisions)
Explain different types of buildings, building components, building materials and building
construction & Describe the importance, objectives and principles of surveying.
CO Questions
1. a. What are the different kinds of cement available and what is their use.
b. List the properties of good building bricks. Explain any five.
2. a. List and explain any five modern construction materials used for construction.
b. Explain the objectives and principles of surveying
Course outcome 4 (CO4) & Course outcome 5 (CO5) (Two full question from each module and
each question can have maximum 2 sub-divisions)
Summarise the basic infrastructure services MEP, HVAC, elevators, escalators and ramps & Discuss
the Materials, energy systems, water management and environment for green buildings.
CO Questions
1. a. Draw the elevation and plan of one brick thick wall with English bond
b. Explain the energy systems and water management in Green buildings
2. a. Draw neat sketch of the following foundations: (i) Isolated stepped footing;
(ii) Cantilever footing; and (iii) Continuous footing.
b. Discuss the civil engineering aspect of MEP and HVAC in a commercial building
Reg No:__________________
Name:____________________________
APJ ABDUL KALAM TECHNOLOGICAL UNIVERSITY FIRST SEMESTER B.TECH DEGREE EXAMINATION,
MONTH & YEAR
PART A
Part B
MODULE I
6a. List out the types of building as per occupancy. Explain any two, each in about five
sentences. (5)
b. Discuss the components of a building with a neat figure. (5)
OR
7a. What are the major disciplines of civil engineering and explain their role in the
infrastructural framework. (5)
b. Explain the role of NBC, KBR & CRZ norms in building rules and regulations prevailing in our
country. (5)
MODULE II
8a. What are the different kinds of cement available and what is their use. (5)
b. List the properties of good building bricks. Explain any five. (5)
OR
9a. List and explain any five modern construction materials used for construction. (5)
b. Explain the objectives and principles of surveying (5)
MODULE III
10a. Draw the elevation and plan of one brick thick wall with English bond (5)
b. Explain the energy systems and water management in Green buildings (5)
OR
11a. Draw neat sketch of the following foundations: (i) Isolated stepped footing;
(ii) Cantilever footing; and (iii) Continuous footing. (5)
b. Discuss the civil engineering aspect of MEP and HVAC in a commercial building (5)
[10 x 3 = 30]
PART II: BASIC MECHANICAL ENGINEERING
PART A
1. Sketch the P-v and T-s diagram of a Carnot cycle and List the processes.
2. Illustrate the working of an epicyclic gear train.
3. Explain cooling and dehumidification processes.
4. Differentiate between soldering and brazing.
5. Explain the principle of Additive manufacturing.
4 x 5 = 20 marks
Part B
MODULE I
6. In an air standard Otto cycle the compression ratio is 7 and compression begins at 35oC,
0.1MPa. The maximum temperature of the cycle is 1100oC. Find
i) Heat supplied per kg of air,
ii) Work done per kg of air,
iii)Cycle efficiency
Take Cp = 1.005 kJ/kgK and Cv=0.718 kJ/kgK 10 marks
OR
MODULE II
MODULE III
10. Explain the two high, three high, four high and cluster rolling mills with neat
sketches. 10 marks
OR
11. a) Describe the arc welding process with a neat sketch. 6 marks
b) Differentiate between up-milling and down-milling operations. 4 marks
SYLLABUS
Module 1
General Introduction to Civil Engineering: Relevance of Civil Engineering in the overall
infrastructural development of the country. Responsibility of an engineer in ensuring the safety of
built environment. Brief introduction to major disciplines of Civil Engineering like Transportation
Engineering, Structural Engineering, Geo-technical Engineering, Water Resources Engineering and
Environmental Engineering.
Introduction to buildings: Types of buildings, selection of site for buildings, components of a
residential building and their functions.
Building rules and regulations: Relevance of NBC, KBR & CRZ norms (brief discussion only).
Building area: Plinth area, built up area, floor area, carpet area and floor area ratio for a building as
per KBR.
Module 2
Module 3
Building Construction: Foundations: Bearing capacity of soil (definition only), functions of
foundations, types – shallow and deep (brief discussion only). Load bearing and framed structures
(concept only).
Brick masonry: - Header and stretcher bond, English bond & Flemish bond random rubble masonry.
Roofs and floors: - Functions, types; flooring materials (brief discussion only).
Basic infrastructure services: MEP, HVAC, elevators, escalators and ramps (Civil Engineering aspects
only), fire safety for buildings.
Green buildings:- Materials, energy systems, water management and environment for green
buildings. (brief discussion only).
Module 4
Analysis of thermodynamic cycles: Carnot, Otto, Diesel cycles, Derivation of efficiency of these
cycles, Problems to calculate heat added, heat rejected, net work and efficiency. IC Engines: CI, SI, 2-
Stroke, 4-Stroke engines. Listing the parts of different types of IC Engines. Efficiencies of IC
Engines(Definitions only), Air, Fuel, cooling and lubricating systems in SI and CI Engines, CRDI, MPFI.
Concept of hybrid engines.
Module 5
Refrigeration: Unit of refrigeration, reversed Carnot cycle,COP, vapour compression cycle (only
description and no problems); Definitions of dry, wet & dew point temperatures, specific humidity
and relative humidity, Cooling and dehumidification, Layout of unit and central air conditioners.
Description about working with sketches of: Reciprocating pump, Centrifugal pump, Pelton turbine,
Francis turbine and Kaplan turbine. Overall efficiency, Problems on calculation of input and output
power of pumps and turbines (No velocity triangles)
Description about working with sketches of: Belt and Chain drives, Gear and Gear trains, Single plate
clutches.
Module 6
Manufacturing Process: Basic description of the manufacturing processes – Sand Casting, Forging,
Rolling, Extrusion and their applications.
Metal Joining Processes: List types of welding, Description with sketches of Arc Welding, Soldering
and Brazing and their applications
Basic Machining operations: Turning, Drilling, Milling and Grinding.
Description about working with block diagram of: Lathe, Drilling machine, Milling machine, CNC
Machine. Principle of CAD/CAM, Rapid and Additive manufacturing.
Text Books:
References Books:
1. Chen W.F and Liew J Y R (Eds), The Civil Engineering Handbook. II Edition CRC Press (Taylor
and Francis)
2. Chudley, R and Greeno R, Building construction handbook, Addison Wesley, Longman group,
England
3. Chudley, R, Construction Technology, Vol. I to IV, Longman group, England Course Plan
4. Kandya A A, Elements of Civil Engineering, Charotar Publishing house
5. Mamlouk, M. S., and Zaniewski, J. P., Materials for Civil and Construction Engineering, Pearson
Publishers
6. Rangwala S.C and Dalal K B Building Construction Charotar Publishing house
7. Clifford, M., Simmons, K. and Shipway, P., An Introduction to Mechanical Engineering Part I -
CRC Press
8. Roy and Choudhary, Elements of Mechanical Engineering, Media Promoters &Publishers Pvt.
Ltd., Mumbai.
9. Sawhney, G. S., Fundamentals of Mechanical Engineering, PHI
10. G Shanmugam, M S Palanichamy, Basic Civil and Mechanical Engineering, McGraw Hill
Education; First edition, 2018
11. Benjamin,J.,Basic Mechanical Engineering,Pentex Books,9th Edition,2018
12. Balachandran, P.Basic Mechanical Engineering,Owl Books
Course Contents and Lecture Schedule:
Course
No. of
No Topic outcomes
Lectures
addressed
1 Module I Total: 7
Building rules and regulations: Relevance of NBC, KBR & CRZ norms
1.4 (brief discussion only) CO2 1
Building area: Plinth area, built up area, floor area, carpet area and
1.5 CO2 1
floor area ratio for a building as per KBR.
2 Module 2 Total: 7
3.2 Roofs: Functions, types; roofing materials (brief discussion only) CO2 2
Floors: Functions, types; flooring materials (brief discussion only)
3.3 Basic infrastructure services: MEP, HVAC, Elevators, escalators and CO4 2
ramps (Civil Engineering aspects only) fire safety for buildings
4 MODULE 4
5 MODULE 5
Definitions of dry, wet & dew point temperatures, specific humidity and 1
5.2 relative humidity, Cooling and dehumidification, Layout of unit and
central air conditioners.
Description about working with sketches : Reciprocating pump, 4
Centrifugal pump, Pelton turbine, Francis turbine and Kaplan turbine.
5.3
Overall efficiency, Problems on calculation of input and output power
of pumps and turbines (No velocity triangles)
Description about working with sketches of: Belt and Chain drives, Gear 3
5.4
and Gear trains, Single plate clutches
6 MODULE 6
Preamble:
This course aims to (1) equip the students with an understanding of the fundamental principles of
electrical engineering(2) provide an overview of evolution of electronics, and introduce the working
principle and examples of fundamental electronic devices and circuits (3) provide an overview of
evolution of communication systems, and introduce the basic concepts in radio communication.
CO 1 Apply fundamental concepts and circuit laws to solve simple DC electric circuits
CO 2 Develop and solve models of magnetic circuits
CO 3 Apply the fundamental laws of electrical engineering to solve simple ac circuits in steady
state
CO 4 Describe working of a voltage amplifier
CO 5 Outline the principle of an electronic instrumentation system
CO 6 Explain the principle of radio and cellular communication
PO 1 PO 2 PO 3 PO 4 PO 5 PO 6 PO 7 PO 8 PO 9 PO PO PO
10 11 12
CO 1 3 1 - - - - - - - - - 2
CO 2 3 1 - - - - - - - - - 2
CO 3 3 1 - - - - - - - - - 2
CO 4 2 - - - - - - - - - - -
CO 5 2 - - - - - - - - - - 2
CO 6 2 - - - - - - - - - - 2
Assessment Pattern
End Semester Examination Pattern: There will be two parts; Part I – Basic Electrical Engineering and
Part II – Basic Electronics Engineering. Part I and PART II carries 50 marks each. For the end semester
examination, part I contain 2 parts - Part A and Part B. Part A contain 5 questions carrying 4 marks
each (not exceeding 2 questions from each module). Part B contains 2 questions from each module
out of which one to be answered. Each question carries 10 mark and can have maximum 2 sub-
divisions. The pattern for end semester examination for part II is same as that of part I. However,
student should answer both part I and part 2 in separate answer booklets.
2. What is a transducer?
Course Outcome 6 (CO6): Explain the principle of radio and cellular communication
2. What is the need of two separate sections RF section and IF section in a super heterodyne
receiver?
QP CODE: Pages: 3
Reg No.:_______________
Name:_________________
APJ ABDUL KALAM TECHNOLOGICAL UNIVERSITY FIRST SEMESTER B.TECH DEGREE EXAMINATION,
MONTH & YEAR
PART I
PART A
1. Calculate the current through the 4 resistor in the circuit shown, applying current
division rule:
2. Calculate the RMS and average values of a purely sinusoidal current having peak value
15A.
4. Derive the relation between line and phase values of voltage in a three phase star
connected system.
PART B
Answer one question from each module; each question carries 10 marks.
Module 1
6. . Calculate the node voltages in the circuit shown, applying node analysis:
(b) Calculate the current through the galvanometer (G) in the circuit shown:
(6 marks)
Module 2
8. (a) State and explain Faraday’s laws of electromagnetic induction with examples. (4 marks)
(b) Differentiate between statically and dynamically induced emf. A conductor of length
0.5m moves in a uniform magnetic field of flux density 1.1T at a velocity of 30m/s.
Calculate the emf induced in the conductor if the direction of motion of the conductor is
inclined at 600 to the direction of field. (6 marks)
9. (a) Derive the amplitude factor and form factor of a purely sinusoidal waveform. (5 marks)
Module 3
10. Draw the power triangle and define active, reactive and apparent powers in ac circuits.
Two coils A and B are connected in series across a 240V, 50Hz supply. The resistance of
A is 5 and the inductance of B is 0.015H. If the input from the supply is 3kW and
2kVAR, find the inductance of A and the resistance of B. Also calculate the voltage across
each coil.
11. A balanced three phase load consists of three coils each having resistance of 4Ω and
inductance 0.02H. It is connected to a 415V, 50Hz, 3-phase ac supply. Determine the
phase voltage, phase current, power factor and active power when the loads are connected
in (i) star (ii) delta.
(3x10=30)
PART II
PART A
1. Give the specifications of a resistor. The colour bands marked on a resistor are Blue, Grey,
Yellow and Gold. What are the minimum and maximum resistance values expected from that
resistance?
2. What is meant by avalanche breakdown?
3. Explain the working of a full-wave bridge rectifier.
4. Discuss the role of coupling and bypass capacitors in a single stage RC coupled amplifier.
5. Differentiate AM and FM communication systems.
(5x4=20)
PART B
Answer one question from each module; each question carries 10 marks.
Module 4
6. a) Explain with diagram the principle of operation of an NPN transistor. (5)
b) Sketch and explain the typical input-output characteristics of a BJT when connected in
common emitter configuration. (5)
OR
7. a) Explain the formation of a potential barrier in a P-N junction diode. (5)
b) What do you understand by Avalanche breakdown? Draw and explain the V-I characteristics
of a P-N junction and Zener diode. (5)
Module 5
8. a) With a neat circuit diagram, explain the working of an RC coupled amplifier. (6)
b) Draw the frequency response characteristics of an RC coupled amplifier and state the reasons
for the reduction of gain at lower and higher frequencies. (4)
OR
9. a) With the help of block diagram, explain how an electronic instrumentation system. (6)
b) Explain the principle of an antenna. (4)
Module 6
10. a) With the help of a block diagram, explain the working of Super hetrodyne receiver. (6)
b) Explain the importance of antenna in a communication system. (4)
OR
11. a) With neat sketches explain a cellular communication system. (5)
b) Explain GSM communication with the help of a block diagram. (5)
(3x10=30)
SYLLABUS
Elementary concepts of DC electric circuits: Basic Terminology including voltage, current, power,
resistance, emf; Resistances in series and parallel; Current and Voltage Division Rules; Capacitors &
Inductors: V-I relations and energy stored. Ohms Law and Kirchhoff's laws-Problems; Star-delta
conversion (resistive networks only-derivation not required)-problems.
Analysis of DC electric circuits: Mesh current method - Matrix representation - Solution of network
equations. Node voltage methods-matrix representation-solution of network equations by matrix
methods. Numerical problems.
Magnetic Circuits: Basic Terminology: MMF, field strength, flux density, reluctance - comparison
between electric and magnetic circuits- Series and parallel magnetic circuits with composite
materials, numerical problems.
Electromagnetic Induction: Faraday's laws, problems, Lenz's law- statically induced and dynamically
induced emfs - Self-inductance and mutual inductance, coefficient of coupling
MODULE 3: AC Circuits
Three phase AC systems: Generation of three phase voltages; advantages of three phase systems,
star and delta connections (balanced only), relation between line and phase voltages, line and phase
currents- Numerical problems
MODULE 4
Introduction to Semiconductor devices: Evolution of electronics – Vacuum tubes to nano
electronics. Resistors, Capacitors and Inductors (constructional features not required): types,
specifications. Standard values, color coding. PN Junction diode: Principle of operation, V-I
characteristics, principle of avalanche breakdown. Bipolar Junction Transistors: PNP and NPN
structures, Principle of operation, relation between current gains in CE, CB and CC, input and
output characteristics of common emitter configuration.
MODULE 5
Basic electronic circuits and instrumentation: Rectifiers and power supplies: Block diagram
description of a dc power supply, Working of a full wave bridge rectifier, capacitor filter (no
analysis), working of simple zener voltage regulator. Amplifiers: Block diagram of Public Address
system, Circuit diagram and working of common emitter (RC coupled) amplifier with its frequency
response, Concept of voltage divider biasing. Electronic Instrumentation: Block diagram of an
electronic instrumentation system.
MODULE 6
Introduction to Communication Systems: Evolution of communication systems – Telegraphy to 5G.
Radio communication: principle of AM & FM, frequency bands used for various communication
systems, block diagram of super heterodyne receiver, Principle of antenna – radiation from
accelerated charge. Mobile communication: basic principles of cellular communications, principle
and block diagram of GSM.
Text Books
1. D P Kothari and I J Nagrath, “Basic Electrical Engineering”, Tata McGraw Hill, 2010.
2. D C Kulshreshtha, “Basic Electrical Engineering”, Tata McGraw Hill, 2010.
3. ChinmoySaha, Arindham Halder and Debarati Ganguly, Basic Electronics - Principles and
Applications, Cambridge University Press, 2018.
4. M.S.Sukhija and T.K.Nagsarkar, Basic Electrical and Electronics Engineering, Oxford University
Press, 2012.
5. Wayne Tomasi and Neil Storey, A Textbook On Basic Communication and Information
Engineering, Pearson, 2010.
Reference Books
1. Del Toro V, “Electrical Engineering Fundamentals”, Pearson Education.
2. T. K. Nagsarkar, M. S. Sukhija, “Basic Electrical Engineering”, Oxford Higher Education.
3. Hayt W H, Kemmerly J E, and Durbin S M, “Engineering Circuit Analysis”, Tata McGraw-Hill
4. Hughes, “Electrical and Electronic Technology”, Pearson Education.
5. V. N. Mittle and Arvind Mittal, “Basic Electrical Engineering,” Second Edition, McGraw Hill.
6. Parker and Smith, “Problems in Electrical Engineering”, CBS Publishers and Distributors.
7. S. B. Lal Seksena and Kaustuv Dasgupta, “Fundamentals of Electrical Engineering”, Cambridge
University Press.
8. Anant Agarwal, Jeffrey Lang, Foundations of Analog and Digital Electronic Circuits, Morgan
Kaufmann Publishers, 2005.
9. Bernard Grob, Ba sic Electronics, McGraw Hill.
10. A. Bruce Carlson, Paul B. Crilly, Communication Systems: An Introduction to Signals and
Noise in Electrical Communication, Tata McGraw Hill, 5 th Edition.
COURSE CONTENTS AND LECTURE SCHEDULE
Numerical problems. 2
2.1 Magnetic Circuits: Basic Terminology: MMF, field strength, flux density,
reluctance - comparison between electric and magnetic circuits-
1
Series and parallel magnetic circuits with composite materials,
numerical problems. 2
3 AC Circuits
3.1 AC Circuits: Phasor representation of sinusoidal quantities. 1
Trigonometric, Rectangular, Polar and complex forms.
5.2 Amplifiers: Block diagram of Public Address system, Circuit diagram and 4
working of common emitter (RC coupled) amplifier with its frequency
response, Concept of voltage divider biasing
Note: The simulations can be done on open tools such as QUCS, KiCad, GNURadio or similar software
to augment the understanding.
HUN PROFESSIONAL COMMUNICATION CATEGORY L T P CREDIT
102 MNC 2 0 2 --
Preamble: Clear, precise, and effective communication has become a sine qua non in today's
information-driven world given its interdependencies and seamless connectivity. Any aspiring
professional cannot but master the key elements of such communication. The objective of this
course is to equip students with the necessary skills to listen, read, write, and speak so as to
comprehend and successfully convey any idea, technical or otherwise, as well as give them the
necessary polish to become persuasive communicators.
Prerequisite: None
Course Outcomes: After the completion of the course the student will be able to
PO 1 PO 2 PO 3 PO 4 PO 5 PO 6 PO 7 PO 8 PO 9 PO PO PO
10 11 12
CO 1 3 2
CO 2 1 3
CO 3 1 1 3
CO 4 3 1
CO 5 1 2 3
CO 6 1 1 1 3
Mark distribution
100 50 50 2 hours
Continuous Internal Evaluation
Total Marks: 50
Attendance : 10 marks
Regular assessment : 25 marks
Series test (one test only, should include verbal aptitude for placement and higher studies, this test
will be conducted for 50 marks and reduced to 15) : 15 marks
Regular assessment
Project report presentation and Technical presentation through PPT : 7.5 marks
Listening Test : 5 marks
Group discussion/mock job interview : 7.5 marks
Resume submission : 5 marks
2. Enumerate the advantages and disadvantages of speed reading. Discuss how it can impact
comprehension.
Module 1
Technology-based communication: Effective email messages, slide presentations, editing skills using
software. Modern day research and study skills: search engines, repositories, forums such as Git
Hub, Stack Exchange, OSS communities (MOOC, SWAYAM, NPTEL), and Quora; Plagiarism
Module 2
Reading, Comprehension, and Summarizing: Reading styles, speed, valuation, critical reading,
reading and comprehending shorter and longer technical articles from journals, newspapers,
identifying the various transitions in a text, SQ3R method, PQRST method, speed reading.
Comprehension: techniques, understanding textbooks, marking and underlining, Note-taking:
recognizing non-verbal cues.
Module 3
Oral Presentation: Voice modulation, tone, describing a process, Presentation Skills: Oral
presentation and public speaking skills, business presentations, Preparation: organizing the material,
self-Introduction, introducing the topic, answering questions, individual presentation practice,
presenting visuals effectively.
Debate and Group Discussions: introduction to Group Discussion (GD), differences between GD and
debate; participating GD, understanding GD, brainstorming the topic, questioning and clarifying, GD
strategies, activities to improve GD skills
Module 4
Listening and Interview Skills Listening: Active and Passive listening, listening: for general content, to
fill up information, intensive listening, for specific information, to answer, and to understand.
Developing effective listening skills, barriers to effective listening, listening to longer technical talks,
listening to classroom lectures, talks on engineering /technology, listening to documentaries and
making notes, TED talks.
Interview Skills: types of interviews, successful interviews, interview etiquette, dress code, body
language, telephone/online (skype) interviews, one-to-one interview & panel interview, FAQs
related to job interviews
Module 5
Formal writing: Technical Writing: differences between technical and literary style. Letter Writing
(formal, informal and semi formal), Job applications, Minute preparation, CV preparation
(differences between Bio-Data, CV and Resume), and Reports. Elements of style, Common Errors in
Writing: describing a process, use of sequence words, Statements of Purpose, Instructions,
Checklists.
Analytical and issue-based Essays and Report Writing: basics of report writing; Referencing Style
(IEEE Format), structure of a report; types of reports, references, bibliography.
Lab Activities
Written: Letter writing, CV writing, Attending a meeting and Minute Preparation, Vocabulary
Building
Spoken: Phonetics, MMFS (Multimedia Feedback System), Mirroring, Elevator Pitch, telephone
etiquette, qualities of a good presentation with emphasis on body language and use of visual aids.
Listening: Exercises based on audio materials like radio and podcasts. Listening to Song. practice and
exercises.
Reading: Speed Reading, Reading with the help of Audio Visual Aids, Reading Comprehension Skills
Mock interview and Debate/Group Discussion: concepts, types, Do’s and don’ts- intensive practice
Reference Books
1. English for Engineers and Technologists (Combined edition, Vol. 1 and 2), Orient Blackswan 2010.
2. Meenakshi Raman and Sangeetha Sharma,”Technical Communication: Principles and Practice”, 2nd
Edition, Oxford University Press, 2011
th
3. Stephen E. Lucas, "The Art of Public Speaking", 10 Edition; McGraw Hill Education, 2012.
nd
4. Ashraf Rizvi, "Effective Technical Communication", 2 Edition, McGraw Hill Education, 2017.
th
5. William Strunk Jr. & E.B. White, "The Elements of Style", 4 Edition, Pearson, 1999.
6. David F. Beer and David McMurrey, Guide to writing as an Engineer, John Willey. New York, 2004.
7. Goodheart-Willcox, "Professional Communication", First Edition , 2017.
8. Training in Interpersonal Skills: Tips for Managing People at Work, Pearson Education, India, 6 edition,
2015.
9. The Ace of Soft Skills: Attitude, Communication and Etiquette for Success, Pearson Education; 1
edition, 2013.
10. Anand Ganguly, “Success in Interview”, RPH, 5th Edition, 2016.
11. Raman Sharma, “Technical Communications”, Oxford Publication, London, 2004.
YEAR OF
CATEGORY L T P CREDIT
EST PROGRAMING IN C INTRODUCTION
102
ESC 2 1 2 4 2019
Preamble: The syllabus is prepared with the view of preparing the Engineering Graduates capable of writing
readable C programs to solve computational problems that they may have to solve in their professional life.
The course content is decided to cover the essential programming fundamentals which can be taught
within the given slots in the curriculum. This course has got 2 Hours per week for practicing programming in
C. A list showing 24 mandatory programming problems are given at the end. The instructor is supposed to
give homework/assignments to write the listed programs in the rough record as and when the required
theory part is covered in the class. The students are expected to come prepared with the required program
written in the rough record for the lab classes.
Prerequisite: NIL
Course Outcomes: After the completion of the course the student will be able to
Develop readable* C programs with branching and looping statements, which uses
CO 2
Arithmetic, Logical, Relational or Bitwise operators.
Write readable C programs with arrays, structure or union for storing the data to be
CO 3
processed
Divide a given computational problem into a number of modules and develop a readable
CO 4 multi-function C program by using recursion if required, to find the solution to the
computational problem
CO 5 Write readable C programs which use pointers for array processing and parameter passing
CO 6 Develop readable C programs with files for reading input and storing output
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO1
CO2
CO3
CO4
CO5
CO6
Assessment Pattern
Remember 15 10 25
Understand 10 15 25
Apply 20 20 40
Analyse 5 5 10
Evaluate
Create
Mark distribution
Marks Marks
Attendance : 10 marks
Continuous Assessment Test 2 (for lab, internal examination, for 2 hrs) : 20 marks
Internal Examination Pattern: There will be two parts; Part A and Part B. Part A contains 5 questions
with 2 questions from each module (2.5 modules x 2 = 5), having 3 marks for each question. Students
should answer all questions. Part B also contains 5 questions with 2 questions from each module (2.5
modules x 2 = 5), of which a student should answer any one. The questions should not have sub-
divisions and each one carries 7 marks.
End Semester Examination Pattern: There will be two parts; Part A and Part B. Part A contains 10
questions with 2 questions from each module, having 3 marks for each question. Students should
answer all questions. Part B contains 2 questions from each module of which a student should answer
any one. Each question can have maximum 2 sub-divisions and carry 14 marks.
Course Outcome 1 (CO1): Write an algorithm to check whether largest of 3 natural numbers is prime or
not. Also, draw a flowchart for solving the same problem.
Course Outcome 2 (CO2): Write an easy to read C program to process a set of n natural numbers and to
find the largest even number and smallest odd number from the given set of numbers. The program
should not use division and modulus operators.
Course Outcome 3(CO3):Write an easy to read C program to process the marks obtained by n students
of a class and prepare their rank list based on the sum of the marks obtained. There are 3 subjects for
which examinations are conducted and the third subject is an elective where a student is allowed to
take any one of the two courses offered.
Course Outcome 4 (CO4): Write an easy to read C program to find the value of a mathematical function
f which is defined as follows. f(n) = n! / (sum of factors of n), if n is not prime and f(n) = n! / (sum of
digits of n), if n is prime.
Course Outcome 5 (CO5): Write an easy to read C program to sort a set of n integers and to find the
number of unique numbers and the number of repeated numbers in the given set of numbers. Use a
function which takes an integer array of n elements, sorts the array using the Bubble Sorting Technique
and returns the number of unique numbers and the number of repeated numbers in the given array.
Course Outcome 6 (CO6): Write an easy to read C program to process a text file and to print the
Palindrome words into an output file.
Model Question paper
QP CODE: PAGES:3
Reg No:______________
Name :______________
APJ ABDUL KALAM TECHNOLOGICAL UNIVERSITY FIRST SEMESTER B.TECH DEGREE EXAMINATION,
MONTH & YEAR
PART A
Part B
Answer any one Question from each module. Each question carries 14 Marks
11. (a) Draw a flow chart to find the position of an element in a given sequence, using linear
searching technique. With an example explain how the flowchart finds the position of a
given element. (10)
(b) Write a pseudo code representing the flowchart for linear searching. (4)
OR
12. (a) With the help of a flow chart, explain the bubble sort operation. Illustrate with an
example. (10)
(b) Write an algorithm representing the flowchart for bubble sort. (4)
13. (a) Write a C program to read an English Alphabet through keyboard and display whether
the given Alphabet is in upper case or lower case. (6)
(b) Explain how one can use the builtin function in C, scanfto read values of different data
types. Also explain using examples how one can use the builtin function in C, printffor text
formatting. (8)
OR
15. (a) Write a function in C which takes a 2-Dimensional array storing a matrix of numbers and
the order of the matrix (number of rows and columns) as arguments and displays the sum
of the elements stored in each row. (6 )
(b) Write a C program to check whether a given matrix is a diagonal matrix. (8)
OR
16. (a) Without using any builtin string processing function like strlen, strcat etc., write a
program to concatenate two strings. (8)
(b) Write a C program to perform bubble sort. (6)
17. (a) Write a function namely myFact in C to find the factorial of a given number. Also, write
another function in C namelynCr which accepts two positive integer parameters n and r and
returns the value of the mathematical functionC(n,r)( n! / ( r! x (n - r)!) ). The function nCr is
expected to make use of the factorial function myFact. (10)
(b) What is recursion? Give an example. (4)
OR
18. (a) With a suitable example, explain the differences between a structure and a union in C.
(6)
(b) Declare a structure namely Student to store the details (roll number, name, mark_for_C)
of a student. Then, write a program in C to find the average mark obtained by the students
in a class for the subject Programming in C (using the field mark_for_C). Use array of
structures to store the required data (8)
19. (a) With a suitable example, explain the concept of pass by reference. (6)
(b) With a suitable example, explain how pointers can help in changing the content of a
single dimensionally array passed as an argument to a function in C.
(8)
OR
20. (a) Differentiate between sequential files and random access files? (4)
(b) Using the prototypes explain the functionality provided by the following functions. (10)
rewind()
i. fseek()
ii. ftell()
iii. fread()
SYLLABUS
Programming in C (Common to all disciplines)
Module 1
Basics of Computer Hardware and Software
Basics of Computer Architecture: processor, Memory, Input& Output devices
Application Software & System software: Compilers, interpreters, High level and low level languages
Introduction to structured approach to programming, Flow chart Algorithms, Pseudo code (bubble
sort, linear search - algorithms and pseudocode)
Module 2
Program Basics
Basic structure of C program: Character set, Tokens, Identifiers in C, Variables and Data Types ,
Constants, Console IO Operations, printf and scanf
Operators and Expressions: Expressions and Arithmetic Operators, Relational and Logical Operators,
Conditional operator, size of operator, Assignment operators and Bitwise Operators. Operators
Precedence
Control Flow Statements: If Statement, Switch Statement, Unconditional Branching using goto
statement, While Loop, Do While Loop, For Loop, Break and Continue statements.(Simple programs
covering control flow)
Module 3
Arrays and strings
Arrays Declaration and Initialization, 1-Dimensional Array, 2-Dimensional Array
String processing: In built String handling functions (strlen, strcpy, strcat and strcmp, puts, gets)
Linear search program, bubble sort program, simple programs covering arrays and strings
Module 4
Working with functions
Introduction to modular programming, writing functions, formal parameters, actual parameters
Pass by Value, Recursion, Arrays as Function Parameters structure, union, Storage Classes, Scope
and life time of variables, simple programs using functions
Module 5
Pointers and Files
Basics of Pointer: declaring pointers, accessing data though pointers, NULL pointer,array access
using pointers, pass by reference effect
File Operations: open, close, read, write, append
Sequential access and random access to files: In built file handlingfunctions (rewind() ,fseek(), ftell(),
feof(), fread(), fwrite()), simple programs covering pointers and files.
Text Books
1. Schaum Series, Gottfried B.S.,Tata McGraw Hill,Programming with C
2. E. Balagurusamy, Mcgraw Hill,Programming in ANSI C
3. Asok N Kamthane, Pearson,Programming in C
4. Anita Goel, Pearson, Computer Fundamentals
Reference Books
1. Anita Goel and Ajay Mittal, Pearson, Computer fundamentals and Programming in C
2. Brian W. Kernighan and Dennis M. Ritchie, Pearson, C Programming Language
3. Rajaraman V, PHI, Computer Basics and Programming in C
4. Yashavant P, Kanetkar, BPB Publications, Let us C
1.1 Basics of Computer Architecture: Processor, Memory, Input& Output devices 2 hours
Linear search program, bubble sort program, simple programs covering arrays
3.3 3 hours
and strings
4.3 structure, union, Storage Classes,Scope and life time of variables, simple 3 hours
programs using functions
5.1 Basics of Pointer: declaring pointers, accessing data though pointers, NULL 3 hours
pointer,array access using pointers, pass by reference effect
The mark obtained out of 50 will be converted into equivalent proportion out of 20 for CIE
computation.
LIST OF LAB EXPERIMENTS
1. Familiarization of Hardware Components of a Computer
2. Familiarization of Linux environment – How to do Programming in C with Linux
3. Familiarization of console I/O and operators in C
i) Display “Hello World”
ii) Read two numbers, add them and display theirsum
iii) Read the radius of a circle, calculate its area and display it
iv)Evaluate the arithmetic expression ((a -b / c * d + e) * (f +g)) and display its solution.Read
the values of the variables from the user through console.
Preamble: The aim of this course is to make the students gain practical knowledge to co-relate with
the theoretical studies and to develop practical applications of engineering materials
and use the principle in the right way to implement the modern technology.
Course Outcomes: After the completion of the course the student will be able to
CO 2 Understand the need for precise measurement practices for data recording
CO 3 Understand the principle, concept, working and applications of relevant technologies and
comparison of results with theoretical calculations
CO 4 Analyze the techniques and skills associated with modern scientific tools such as lasers and
fiber optics
CO 5 Develop basic communication skills through working in groups in performing the laboratory
experiments and by interpreting the results
PO 1 PO 2 PO 3 PO 4 PO 5 PO 6 PO 7 PO 8 PO 9 PO 10 PO 11 PO 12
CO 1 3 3 1 2 1
CO 2 3 3 1 2 1
CO 3 3 3 1 2 1
CO 4 3 3 1 2 1
CO 5 3 3 1 2 1
Mark distribution
Attendance : 20 marks
Class work/ Assessment /Viva-voce : 50 marks
End semester examination (Internally by college) : 30 marks
SYLLABUS
LIST OF EXPERIMENTS
Reference books
1. S.L.Gupta and Dr.V.Kumar, “Practical physics with viva voice”, Pragati PrakashanPublishers, Revised
Edition, 2009
Preamble: To impart scientific approach and to familiarize with the experiments in chemistry relevant
for research projects in higher semesters
Course outcomes: After the completion of the course the students will be able to
CO 2 Develop skills relevant to synthesize organic polymers and acquire the practical skill to
use TLC for the identification of drugs
CO 3 Develop the ability to understand and explain the use of modern spectroscopic
techniques for analysing and interpreting the IR spectra and NMR spectra of some
organic compounds
CO 4 Acquire the ability to understand, explain and use instrumental techniques for chemical
analysis
CO 5 Learn to design and carry out scientific experiments as well as accurately record and
analyze the results of such experiments
PO 1 PO 2 PO 3 PO 4 PO 5 PO 6 PO 7 PO 8 PO 9 PO PO PO
10 11 12
CO 1 3 2 3
CO 2 3 3 3
CO 3 3 3 3
CO 4 3 3 3
CO 5 3 1 3
CO 6 3 1 3
Mark distribution
Attendance : 20 marks
Class work/ Assessment /Viva-voce : 50 marks
End semester examination (Internally by college) : 30 marks
End Semester Examination Pattern: Written Objective Examination of one hour
SYLLABUS
6. Soney C George, Rino Laly Jose, “Lab Manual of Engineering Chemistry”, S. Chand &
Company Pvt Ltd, New Delhi, 2019.
ESL YEAR OF
CIVIL & MECHANICAL CATEGORY L T P CREDIT
120 INTRODUCTION
WORKSHOP
0 0 2 1 2019
Preamble: The course is designed to train the students to identify and manage the tools, materials
and methods required to execute an engineering project. Students will be introduced to a team
working environment where they develop the necessary skills for planning, preparing and executing
an engineering project.
To enable the student to familiarize various tools, measuring devices, practices and different
methods of manufacturing processes employed in industry for fabricating components.
Prerequisite: None
Course Outcomes: After the completion of the course the student will be able to:
Course
Course Outcome Description
Outcome
CO 1 Name different devices and tools used for civil engineering measurements
CO 2 Explain the use of various tools and devices for various field measurements
Demonstrate the steps involved in basic civil engineering activities like plot
CO 3 measurement, setting out operation, evaluating the natural profile of land, plumbing
and undertaking simple construction work.
Choose materials and methods required for basic civil engineering activities like field
CO 4
measurements, masonry work and plumbing.
CO 5 Compare different techniques and devices used in civil engineering measurements
Identify Basic Mechanical workshop operations in accordance with the material and
CO 6
objects
Apply appropriate Tools and Instruments with respect to the mechanical workshop
CO 7
trades
CO 8 Apply appropriate safety measures with respect to the mechanical workshop trades
PO
PO 1 PO 2 PO 3 PO 4 PO 5 PO 6 PO 7 PO 8 PO 9 PO 10 PO 11
12
CO 1 1 - - - 1 1 - - 2 2 - -
CO 2 1 - - - 1 1 - - 2 2 - -
CO 3 1 - - - 1 1 - 2 2 2 1 -
CO 4 1 - - - 1 1 - 2 2 2 1 1
CO 5 1 - - - 1 1 - - 2 2 1
CO 6 2
CO 7 2
CO 8 2
Mark distribution
100 70 30 1 hour
Assessment Procedure: Total marks allotted for the course is 100 marks. CIE shall be conducted for
70 marks and ESE for 30 marks. CIE should be done for the work done by the student and also
viva voce based on the work done on each practical session. ESE shall be evaluated by written
examination of one hour duration conducted internally by the institute.
Attendance : 20 marks
Class work/ Assessment /Viva-voce : 50 marks
End semester examination (Internally by college) : 30 marks
SYLLABUS
PART 1
CIVIL WORKSHOP
Exercise 1. Calculate the area of a built-up space and a small parcel of land- Use standard
measuring tape and digital distance measuring devices
Exercise 2. (a) Use screw gauge and vernier calliper to measure the diameter of a steel rod and
thickness of a flat bar
(b) Transfer the level from one point to another using a water level
(c) Set out a one room building with a given plan and measuring tape
Exercise 3. Find the level difference between any two points using dumpy level
Exercise 4. (a) Construct a 1 thick brick wall of 50 cm height and 60 cm length using English
bond. Use spirit level to assess the tilt of walls.
(b) Estimate the number of different types of building blocks to construct this wall.
Exercise 5. (a) Introduce the students to plumbing tools, different types of pipes, type of
connections, traps, valves ,fixtures and sanitary fittings.
Reference Books:
PART II
MECHANICAL WORKSHOP
LIST OF EXERCISES
(Minimum EIGHT units mandatory and FIVE models from Units 2 to 8 mandatory)
UNIT 1:- General : Introduction to workshop practice, Safety precautions, Shop floor ethics, Basic
First Aid knowledge.
Study of mechanical tools, components and their applications: (a) Tools: screw drivers,
spanners, Allen keys, cutting pliers etc and accessories (b) bearings, seals, O-rings, circlips,
keys etc.
UNIT 2:- Carpentry : Understanding of carpentry tools
Minimum any one model
1. T –Lap joint 2. Cross lap joint 3. Dovetail joint 4. Mortise joints
UNIT 3:- Foundry : Understanding of foundry tools
Minimum any one model
1.Bench Molding 2. Floor Molding 3. Core making 4. Pattern making
UNIT 4: - Sheet Metal : Understanding of sheet metal working tools
Minimum any one model
1. Cylindrical shape
2. Conical shape
3. Prismatic shaped job from sheet metal
UNIT 5: - Fitting : Understanding of tools used for fitting
Minimum any one model
1. Square Joint
2. V- Joint
3. Male and female fitting
UNIT 6: - Plumbing : Understanding of plumbing tools, pipe joints
Any one exercise on joining of pipes making use of minimum three types of pipe joints
No Topic No of Sessions
1 INTRODUCTION
2 CARPENTRY
4 SHEET METAL
5 FITTING
6 PLUMBING
7 SMITHY
8 WELDING
9 ASSEMBLY
10 MACHINES
Preamble: Electrical Workshop is intended to impart skills to plan and carry out simple
electrical wiring. It is essential for the practicing engineers to identify the basic practices and
safety measures in electrical wiring.
Prerequisite: NIL
Course Outcomes: After the completion of the course the student will be able to
PO 1 PO 2 PO 3 PO 4 PO 5 PO 6 PO 7 PO 8 PO 9 PO PO PO
10 11 12
CO 1 - - - - - 3 - - - - - 1
CO 2 2 - - - - - - - - 1 - -
CO 3 2 - - 1 - 1 - 1 2 2 - 2
CO 4 3 - - - - - - - - - - 2
CO 5 3 - - - 2 - - - - - - 2
CO 6 3 - - - 2 - - - - - - 1
CO 7 - - - - - - - - 3 2 - 2
Mark distribution
Attendance : 20 marks
Class work/ Assessment /Viva-voce : 50 marks
End semester examination (Internally by college) : 30 marks
Syllabus
PART 1
ELECTRICAL
PART II
ELECTRONICS
6. Printed circuit boards (PCB) [Types, Single sided, Double sided, PTH, Processing
methods, Design and fabrication of a single sided PCB for a simple circuit with manual
etching (Ferric chloride) and drilling.]
7. Assembling of electronic circuits using SMT (Surface Mount Technology) stations.
8. Assembling of electronic circuit/system on general purpose PCB, test and show the
functioning (Any Two circuits).
1. Fixed voltage power supply with transformer, rectifier diode, capacitor filter,
zener/IC regulator.
SEMESTER -3
COMPUTER SCIENCE AND ENGINEERING
DISCRETE MATHEMATICAL STRUCTURES
Preamble:
The purpose of this course is to create awareness in students about the basic terminologies used
in advanced courses in Computer Science and develop rigorous logical thinking for solving
different kinds of problems in Computer Science. This course helps the learner to apply the
theory and applications of elementary Counting Principles, Propositional Logic, Predicate Logic,
Lattices, Generating Functions, Recurrence Relations and Algebraic Structures eventually in
practical applications.
Course Outcomes: After the completion of the course the student will be able to
CO# CO
Check the validity of predicates in Propositional and Quantified Propositional Logic
CO1 using truth tables, deductive reasoning and inference theory on Propositional Logic
(Cognitive Knowledge Level: Apply)
Solve counting problems by applying the elementary counting techniques - Rule of
Sum, Rule of Product, Permutation, Combination, Binomial Theorem, Pigeonhole
CO2
Principle and Principle of Inclusion and Exclusion (Cognitive Knowledge Level:
Apply)
Classify binary relations into various types and illustrate an application for each type
CO3 of binary relation, in Computer Science (Cognitive Knowledge Level:
Understand)
Illustrate an application for Partially Ordered Sets and Complete Lattices, in
CO4
Computer Science (Cognitive Knowledge Level: Apply)
Explain Generating Functions and solve First Order and Second Order Linear
CO5 Recurrence Relations with Constant Coefficients (Cognitive Knowledge Level:
Apply)
Illustrate the abstract algebraic systems - Semigroups, Monoids, Groups,
CO6 Homomorphism and Isomorphism of Monoids and Groups (Cognitive Knowledge
Level: Understand)
COMPUTER SCIENCE AND ENGINEERING
Mapping of course outcomes with program outcomes
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO1
CO2
CO3
CO4
CO5
CO6
Assessment Pattern
Continuous Assessment Tests
Bloom’s End Semester Examination
Category Marks (%)
Test 1 (%) Test 2 (%)
Remember 30 30 30
Understand 30 30 30
Apply 40 40 40
Analyze
Evaluate
Create
COMPUTER SCIENCE AND ENGINEERING
Mark Distribution
There will be two parts; Part A and Part B. Part A contains 10 questions with 2 questions from
each module, having 3 marks for each question. Students should answer all questions. Part B
contains 2 full questions from each module of which student should answer any one. Each
question can have maximum 2 sub-divisions and carries 14 marks.
Syllabus
Module – 1 (Fundamentals of Logic)
Mathematical logic - Basic connectives and truth table, Statements, Logical Connectives,
Tautology, Contradiction. Logical Equivalence - The Laws of Logic, The Principle of duality,
Substitution Rules . The implication - The Contrapositive, The Converse,The Inverse.
Logical Implication - Rules of Inference. The use COMPUTER
of Quantifiers SCIENCE ANDQuantifier.
- Open Statement, ENGINEERING
Logically Equivalent – Contrapositive, Converse , Inverse , Logical equivalences and
implications for quantified statement, Implications , Negation .
Partially ordered Set – Hasse Diagram, Maximal-Minimal Element, Least upper bound (lub),
Greatest Lower bound(glb) ( Topological sorting Algorithm- excluded). Equivalence Relations
and Partitions - Equivalence Class.
Lattice - Dual Lattice , Sub lattice , Properties of glb and lub , Properties of Lattice , Special
Lattice , Complete Lattice, Bounded Lattice, Completed Lattice , Distributive Lattice.
Text Book
PART A
1. Show the following implication without constructing the truth table: (P ^ Q) => P→Q
2. Write the negation of the following statement. “ If I drive, then I will not walk”
3. What is pigeon hole principle? Explain. If you select any five numbers from 1 to 8 then
prove that at least two of them will add up to 9 .
4. In how many ways can the letters of the word ALLAHABAD be arranged ?
5. Show that the divisibility relation ' / ' is a partial ordering on the set Z+.
6. Consider the functions given by f(x) = 2x+3 and g(x) = x2. Find (g o f ) and ( f o g).
7. What is meant by exponential generating function? Explain.
8. Provide one example of linear homogeneous recurrence relation. Mention the degree
also.
9. What is a monoid ? Explain.
10. Let (A, .) be a group. Show that (ab)-1 = b-1a-1
(10 x 3 = 30 Marks)
PART B
(Answer any one Question from each Module. Each question carries 14 Marks)
11.
(a) Show that S ⋁ R is tautologically implied by (PVQ) ⋀ (P→R) ⋀ (Q→S)
(6 marks)
(b) Show that from COMPUTER SCIENCE AND ENGINEERING
(ii) (∃x)(F(x) ⋀ S(x)) → (y) (M(y) → W(y)).
(iii)(∃y) (M(y) ⋀ W(y)) the conclusion (x)(F(x) → S(x)) follows.
(8 marks)
OR
12.
(a) Show that (x) (P(x) ⋁ Q(x)) ⇒ ((x)P(x) ⋁ (∃x) Q(x)) using indirect method of
proof .
(6 marks)
(b) Discuss indirect method of proof . Show that the following premises are inconsistent
(i) If Jack misses many classes through illness, then he fails high school.
(ii) If Jack fails high school, then he is uneducated.
(iii)If Jack reads a lot of books, then he is not uneducated.
(iv) Jack misses many classes through illness and reads a lot of books.
(8 marks)
13.
(a) Explain binomial theorem. Determine the coefficient of x9y3 in the expansion of
(x+y)12, (x+2y)12 and (2x- 3y)12 using binomial theorem.
(6 marks)
(b) How many 5 digit numbers can be formed from the digits 1,2,3,4,5 using the digits without
repetition ?
(i) How many of them are even?
(ii) How many are even and greater than 30,000?
(8 marks)
OR
14.
(a) There are 8 guests in a party. Each guest brings a gift and receives another gift in
return. No one is allowed to receive the gift they bought. How many ways are there to
distribute the gifts?
(6 marks)
(b) Six papers are set in an examination of which two are mathematical. Only one
examination will be conducted in a day. In how many different orders ,can the papers
be arranged so that
(i) Two mathematical papers are consecutive?
(ii) Two mathematical papers are not consecutive?
(8 marks)
15.
COMPUTER
(a) Let A = { 1,2,3,4,...11,12} and let R be the equivalenceSCIENCE
relation on AAND ENGINEERING
x A defined by
(a,b) R (c,d) iff a+d = b+c. Prove that R is an equivalence relation and find the
equivalence class of (2 ,5)
(8 marks)
(b) What is a chain lattice ? Explain. Also show that every chain is a distributive lattice.
(6 marks)
OR
16.
(a) Suppose f(x) = x+2 , g(x) = x-2, and h(x) = 3x for x ɛ R , where R is the set of real
numbers. Find (g o f ) , ( f o g ) , (f o f) and ( g o g)
(8 marks)
(b) Let R and S be two relations on a set A . If R and S are symmetric, Prove that (R∩S)
is also symmetric.
(6 marks)
17.
(a) Solve the recurrence relation ar - 7ar-1+ 10ar-2 = 0 for r ≥ 2 ; Given a0 = 0; a1 = 41
using generating functions
(8 marks)
(b) Solve the recurrence relation ar - 4ar-1 + 4ar-2 = (r+1)2 using generating function.
(6 marks)
OR
18.
(a) Solve an - 3an-1 + 2 ; a0 = 1 n ≥ 1, using generating functions.
(8 marks)
(b) Use generating function to solve the following recurrence relation an = 2an-1+ 2n ;
with a0 = 2.
(6 marks)
19.
(a) Prove that the set 'Q' of rational numbers other than 1 forms an abelian group with
respect to the operation ' * ' defined by a * b = a+b -ab.
(8 Marks)
(b) Show that the direct product of two group is a group.
(6 Marks)
OR
20.
(a) Show that the subgroup of a cyclic group is cyclic.
(8 Marks)
(b) Let (A,*) be a group. Show that (A,*) is an abelian group if and only if a2* b2=(a*b)2 for all
‘a’ and ‘b’ in A
(6 Marks)
COMPUTER
TEACHING PLAN SCIENCE AND ENGINEERING
No of Lecture
No Contents
Hrs
Module – 1 (Fundamentals of Logic) (9 hrs)
1.1 1
Mathematical logic, Basic Connectives and Truth Table
YEAR OF
CST DATA CATEGORY L T P CREDIT
INTRODUCTION
201 STRUCTURES
PCC 3 1 0 4 2019
Preamble: This course aims at moulding the learner to understand the various data structures,
their organization and operations. The course helps the learners to assess the applicability of
different data structures and associated algorithms for solving real world problem which requires
to compare and select appropriate data structures to solve the problem efficiently. This course
introduces abstract concepts for data organization and manipulation using data structures such as
stacks, queues, linked lists, binary trees, heaps and graphs for designing their own data structures
to solve practical application problems in various fields of Computer Science.
Identify the suitable data structure (array or linked list) to represent a data item
required to be processed to solve a given computational problem and write an
CO2
algorithm to find the solution of the computational problem (Cognitive Knowledge
Level: Apply)
Store a given dataset using an appropriate Hash Function to enable efficient access of
CO4
data in the given set (Cognitive Knowledge Level: Apply)
Select appropriate sorting algorithms to be used in specific circumstances (Cognitive
CO5
Knowledge Level: Analyze)
Design and implement Data Structures for solving real world problems efficiently
CO6
(Cognitive Knowledge Level: Apply)
COMPUTER SCIENCE AND ENGINEERING
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO1
CO2
CO3
CO4
CO5
CO6
Assessment Pattern
Remember 30 30 30
Understand 30 30 30
Apply 40 40 40
COMPUTER SCIENCE AND ENGINEERING
Analyse
Evaluate
Create
Mark Distribution
Attendance : 10 marks
First Internal Examination shall be preferably conducted after completing the first half of the
syllabus and the Second Internal Examination shall be preferably conducted after completing
remaining part of the syllabus.
There will be two parts: Part A and Part B. Part A contains 5 questions (preferably, 2 questions
each from the completed modules and 1 question from the partly covered module), having 3
marks for each question adding up to 15 marks for part A. Students should answer all questions
from Part A. Part B contains 7 questions (preferably, 3 questions each from the completed
modules and 1 question from the partly covered module), each with 7 marks. Out of the 7
questions in Part B, a student should answer any 5.
There will be two parts; Part A and Part B. Part A contains 10 questions with 2 questions from
each module, having 3 marks for each question. Students should answer all questions. Part B
contains 2 questions from each module of which a student should answer any one. Each question
can have maximum 2 sub-divisions and carries 14 marks.
COMPUTER SCIENCE AND ENGINEERING
SYLLABUS
Module 1
Module 2
Module 4
Trees and Graphs
Trees, Binary Trees-Tree Operations, Binary Tree Representation, Tree Traversals, Binary Search
Trees- Binary Search Tree Operations
Graphs, Representation of Graphs, Depth First Search and Breadth First Search on Graphs,
Applications of Graphs
Module 5
Text Book
Reference Books
3. Aho A. V., J. E. Hopcroft and J. D. Ullman, Data Structures and Algorithms, Pearson
Publication.
Course Outcome1(CO1): Write an algorithm for matrix multiplication and calculate its
time complexity.
Course Outcome 2(CO2): How a linked list can be used to represent the polynomial
5x4y6+24x3y4-17x2y3+15xy2+45.Write an algorithm to add two Bivariate polynomials
represented using linked list.
Course Outcome 3(CO3): Create a Binary search Tree with node representing the
following sequence 14, 15, 4, 18, 9, 16, 20, 17, 3, 7, 5, 2 and perform inorder, preorder
and postorder traversals on the above tree and print the output.
Course Outcome 4(CO4): The size of a hash table is 7. The index of the hash table
varies from 0 to 6. Consider the keys 89, 18, 49, 58, 25 in the order. Show how the keys
are stored in the hash table using Linear probing.
COMPUTER SCIENCE AND ENGINEERING
Course Outcome 5(CO5): In what circumstances does Quick Sort perform over Merge
sort.
Course Outcome 6(CO6): Design a reservation system for railways that include
waiting list. If the reservation is full “Display reservation full” and put the passenger in
in waiting list and give a waiting list number. If a passenger cancels the ticket, then the
seat should be automatically allocated to the first passenger in the waiting list.
QP CODE: PAGES:3
Reg No:_______________
Name:_________________
PART A
1. Calculate the frequency count of the statement x = x+1; in the following code segment
x = x + 1;
4. Convert the expression ((A/(B-D+E))*(F-G)*H) to postfix form. Show each step in the
conversion including the stack contents
5. Write an algorithm to count the number of occurrences of a character in a linked list (each
node contains only one character)
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15
A B C - D E - - - - F G - - -
B C D
E F G
10. Let the size of a hash table is 10. The index of the hash table varies from 0 to 9. Assume
the keys 73, 54, 15, 48, 89, 66, 37, 18, 41, 22, 62 are mapped using modulo operator.
Show how the keys are distributed using chaining method.
COMPUTER SCIENCE AND ENGINEERING
Part B
Answer any one Question from each module. Each question carries 14 Marks
OR
12. a) Write algorithms for Linear Search and Binary Search and Compare their time
complexities (10)
b) Between O(nlogn) and O(logn) which one is better and why? (4)
13. a) Write algorithms to insert and delete elements from a double ended queue.
OR
14. a) Write an algorithm to insert and delete elements from a Priority Queue (8)
15. a) Write an algorithm to multiply two polynomials represented using linked list (10)
OR
b) Discuss the advantages and disadvantages of First-fit, Best-fit and Worst-fit allocation
schemes (6)
COMPUTER SCIENCE AND ENGINEERING
17. a) List the properties of Binary Search Tree. Write an algorithm to search an element
OR
18. a) Give algorithms for DFS and BFS of a graph and explain with examples (8)
19. a) Write algorithms for Merge sort and Quick Sort. (10)
b) Illustrate the working of Quick sort on the following input 38, 8, 0, 28, 45, -12, 89, 66,
42 (4)
OR
20. a) With examples discuss the different hash functions used for hashing (10)
b) Apply the hash function h(x) = x mod 7 for linear probing on the data 2341, 4234,
2839, 430, 22, 397, 3920 and show the resulting hash table (4)
Teaching Plan
Module 1 :Basic Concepts of Data Structures (5 hours)
4.7 Depth First Search and Breadth First Search on Graphs 1hour
4.8 Applications of Graphs 1hour
Preamble: The objective of the course is to familiarize learners with the basic concepts of
Boolean algebra and digital systems. This course covers the design of simple combinational and
sequential logic circuits, representation and arithmetic algorithms for Binary, BCD (Binary
Coded Decimal) and Floating point numbers which in turn are helpful in understanding
organization & design of a computer system and understanding how patterns of ones and zeros
can be used to store information on computers, including multimedia data.
Prerequisite: Nil
Course Outcomes: After the completion of the course the student will be able to
CO# CO
Illustrate decimal, binary, octal, hexadecimal and BCD number systems, perform
conversions among them and do the operations - complementation, addition,
CO1
subtraction, multiplication and division on binary numbers (Cognitive Knowledge
level: Understand)
Simplify a given Boolean Function and design a combinational circuit to implement
CO2 the simplified function using Digital Logic Gates (Cognitive Knowledge level:
Apply)
Design combinational circuits - Adders, Code Convertors, Decoders, Magnitude
CO3 Comparators, Parity Generator/Checker and design the Programmable Logic Devices -
ROM and PLA. (Cognitive Knowledge level: Apply)
Design sequential circuits - Registers, Counters and Shift Registers. (Cognitive
CO4
Knowledge level: Apply)
Use algorithms to perform addition and subtraction on binary, BCD and floating point
CO5
numbers (Cognitive Knowledge level: Understand)
COMPUTER SCIENCE AND ENGINEERING
Mapping of course outcomes with program outcomes
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO1
CO2
CO3
CO4
CO5
Assessment Pattern:
End Semester
Bloom’s Category Test 1 (%) Test 2 (%)
Examination Marks (%)
Remember 20 20 20
Understand 35 35 35
Apply 45 45 45
Analyse
Evaluate
Create
Mark Distribution: COMPUTER SCIENCE AND ENGINEERING
150 50 100 3
SYLLABUS
Module I
Number systems, Operations & Codes
Decimal, Binary, Octal and Hexadecimal Number Systems- Number Base Conversions.
Addition, Subtraction, Multiplication and Division of binary numbers. Representation of
negative numbers- Complements, Subtraction with complements. Addition and subtraction of
BCD, Octal and Hexadecimal numbers. Binary codes- Decimal codes, Error detection codes,
Reflected code, Character coding schemes – ASCII, EBCDIC.
Module II
Boolean Algebra
Postulates of Boolean Algebra. Basic theorems and Properties of Boolean Algebra. Boolean
Functions - Canonical and Standard forms. Simplification of Boolean Functions- Using
Karnaugh- Map Method (upto five variables), Don’t care conditions, Product of sums
COMPUTER
simplification, Tabulation Method. Digital Logic SCIENCE
Gates- Implementation AND ENGINEERING
of Boolean functions
using basic and universal gates.
Module III
Combinational Logic Circuits
Design Procedure & Implementation of combinational logic circuits- Binary adders and
subtractors, Binary Parallel adder, Carry look ahead adder, BCD adder, Code converter,
Magnitude comparator, Decoder, Demultiplexer, Encoder, Multiplexer, Parity generator/
Checker.
Module IV
Sequential logic circuits:
Flip-flops- SR, JK, T and D. Triggering of flip-flops- Master slave flip- flops, Edge- triggered
flip- flops. Excitation table and characteristic equation. Registers- register with parallel load.
Counter design: Asynchronous counters- Binary and BCD counters, timing sequences and state
diagrams. Synchronous counters- Binary Up- down counter, BCD counter.
Module V
Shift registers
Shift registers – Serial In Serial Out, Serial In Parallel Out, Bidirectional Shift Register with
Parallel load. Ring counter. Johnson counter- timing sequences and state diagrams.
Arithmetic algorithms
Algorithms for addition and subtraction of binary numbers in signed magnitude and 2’s
complement representations. Algorithm for addition and subtraction of BCD numbers.
Representation of floating point numbers, Algorithm for addition and subtraction of floating
point numbers.
Text Books:
1. M. Morris Mano, Digital Logic & Computer Design, 4/e, Pearson Education, 2013
2. Thomas L Floyd, Digital Fundamentals, 10/e, Pearson Education, 2009.
3. M. Morris Mano, Computer System Architecture, 3/e, Pearson Education, 2007.
Reference Books:
1. M. Morris Mano, Michael D Ciletti , Digital Design With An Introduction to the Verilog
HDL, 5/e, Pearson Education, 2013.
2. Donald D Givone, Digital Principles and Design, Tata McGraw Hill, 2003
Sample Course Level Assessment Questions COMPUTER SCIENCE AND ENGINEERING
Course Outcome 2(CO2): Given a Boolean function F and don’t care conditions D, using
Karnaugh map obtain the simplified expression in (i) SOP and (ii) POS:
! F(A, B, C, D) = A′B′D′ + A′CD + A′BC
! D(A, B, C, D) = A′BC′D + ACD + A B′D
Reg No:_______________
Name:_________________
PART-A
1. Represent the decimal numbers (459)10 and (859)10 in hexadecimal and perform
2. Subtract (1101)
! 2 from !(11010)2 using: i) !2′s complement and ii) 1′
! s complement
arithmetic.
8. Construct D flip- flop using NAND gates. Also give its truth table.
9. Explain how a shift register is used for serial data transfer?
PART-B
(Answer any one full question from each module) (14X5=70)
COMPUTER SCIENCE AND ENGINEERING
11. (a) Perform the following operations using 2’s complement arithmetic: (8)
(i) !8810 + (−37)10 (ii) !(−20)10 + (−12)10
OR
(b) Using K-map, simplify the Boolean function F in sum of products form, (10
using the don’t care conditions d:
!F(w, x, y, z) = w′(x′y + x′y′ + x yz) + x′z′(y + w)
!d(w, x, y, z) = w′ x (y′z + yz′) + w yz
OR
14. (a) Simplify the following expressions using Karnaugh- map method. (8)
(i) !F = Σ(0,2,4,6,9,11,13,15,17,21,25,27,29,31)
(ii) F
! = Π(0,2,5,7)
∑
(i) !F(x, y, z, a) = (1,3,7)
(ii) F(x,
! y, z) = Π(0,3,6,7)
(iii) F(A,
! B, C, D) = Π(0,1,2,3,4,6,12)
15. (a) Implement Full adder circuit using NAND gate only. (4)
(b) Design a code converter for converting BCD to Excess 3 code (10)
OR
16. (a) With a neat diagram explain 4-bit carry look-ahead adder. (6)
COMPUTER SCIENCE AND ENGINEERING
(b) Design a Gray to binary code converter using a 4x1 MUX. Draw the (8)
circuit diagram and explain.
17. (a) Design a counter that count the states 0,3,5,6,0… using T flip- flops. (10)
(b) Write the characteristics equation, excitation table of JK, T and D flipflop. (4)
OR
18. (a) Explain race around condition and how it can be avoided. (6)
(b) Design a synchronous Binary Up-Down Counter. (8)
19. (a) With a neat diagram explain universal shift register. (8)
20. (a) Write algorithm for floating point addition and subtraction. (8)
(b) Implement the functions Y
! 1 = A B′C′ + A B′C + A BC and Y
! 2 = BC + AC (6)
using minimum gates Programmable Logic Array.
Teaching Plan
(7
Module 1: Number systems, Operations & Codes (No algorithms)
hours)
Number Systems: Decimal, Binary, Octal and Hexadecimal number systems,
1.1 1 hour
Number Base Conversions.
2.4 Simplification of Boolean Functions: Karnaugh -Map Method (upto five 1 hour
variables), Don’t care conditions (Lecture 1)
Simplification of Boolean Functions: Karnaugh -Map Method (upto five
2.5 1 hour
variables), Don’t care conditions (Lecture 2)
Digital Logic Gates: AND, OR, NOT, NAND, NOR, XOR, XNOR,
2.8 Implementation of Boolean functions using basic and universal gates. (Lecture 1 hour
1)
Digital Logic Gates: AND, OR, NOT, NAND, NOR, XOR, XNOR,
2.9 Implementation of Boolean functions using basic and universal gates. (Lecture 1 hour
2)
(9
Module 3: Combinational Logic Circuits
hours)
Binary Adders:
3.2 1 hour
Implementation of Half Adder, Full Adder
Binary Subtractors:
3.3 1 hour
Implementation of Half Subtractor, Full Subtractor
Implementation of Binary Parallel Adder ,Carry look ahead Adder, BCD Adder
3.4 1 hour
(Lecture 1)
Implementation of Binary Parallel Adder ,Carry look ahead Adder, BCD Adder
3.5 1 hour
(Lecture 2)
COMPUTER SCIENCE AND ENGINEERING
Implementation of Various Combinational Circuits:
3.6 1 hour
Code Converters, Magnitude Comparator
(9
Module 4: Sequential logic circuits:
hours)
Flip flops:
4.1 1 hour
SR, JK, T and D flip- flops (Lecture 1)
Counter Design:
4.7 Asynchronous counters- Binary and BCD counters- timing sequences and state 1 hour
diagrams. (Lecture 1)
Asynchronous counters- Binary and BCD counters- timing sequences and state
4.8 1 hour
diagrams. (Lecture 2)
4.9 Synchronous counters- Binary Up- down counter, BCD counter 1 hour
(11
Module 5: Shift registers, Arithmetic algorithms & PLD’s
hours)
5.1 Shift Registers - Serial In Serial Out, Serial In Parallel Out. 1 hour
Preamble: The purpose of this course is to enable learners to solve problems by breaking it
down to object level while designing software and to implement it using Java. This course covers
Object Oriented Principles, Object Oriented Programming in Java, Inheritance, Exception
handling, Event handling, multithreaded programming and working with window-based
graphics. This course helps the learners to develop Desktop GUI Applications, Mobile
applications, Enterprise Applications, Scientific Applications and Web based Applications.
Course Outcomes: After the completion of the course the student will be able to
Write Java programs using the object oriented concepts - classes, objects,
CO1 constructors, data hiding, inheritance and polymorphism (Cognitive Knowledge
Level: Apply)
Utilise datatypes, operators, control statements, built in packages & interfaces, Input/
CO2 Output Streams and Files in Java to develop programs (Cognitive Knowledge Level:
Apply)
Illustrate how robust programs can be written in Java using exception handling
CO3
mechanism (Cognitive Knowledge Level: Understand)
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO1
CO2
CO3
CO4
CO5
Assessment Pattern
Remember 30 30 30
Understand 30 30 30
Apply 40 40 40
Analyse
Evaluate
Create
COMPUTER SCIENCE AND ENGINEERING
Mark Distribution
Attendance : 10 marks
First series test shall be preferably conducted after completing the first half of the syllabus and
the second series test shall be preferably conducted after completing remaining part of the
syllabus.
There will be two parts: Part A and Part B. Part A contains 5 questions (preferably, 2 questions
each from the completed modules and 1 question from the partly covered module), having 3
marks for each question adding up to 15 marks for part A. Students should answer all questions
from Part A. Part B contains 7 questions (preferably, 3 questions each from the completed
modules and 1 question from the partly covered module), each with 7 marks. Out of the 7
questions in Part B, a student should answer any 5.
End Semester Examination Pattern: There will be two parts; Part A and Part B. Part A contains
10 questions with 2 questions from each module, having 3 marks for each question. Students
should answer all questions. Part B contains 2 questions from each module of which a student
should answer any one. Each question can have maximum 2 sub-divisions and carry 14 marks.
COMPUTER SCIENCE AND ENGINEERING
SYLLABUS
Module 1
Introduction:
Approaches to Software Design - Functional Oriented Design, Object Oriented Design, Case
Study of Automated Fire Alarm System.
Object Modeling Using Unified Modeling Language (UML) – Basic Object Oriented concepts,
UML diagrams, Use case model, Class diagram, Interaction diagram, Activity diagram, State
chart diagram.
Introduction to Java - Java programming Environment and Runtime Environment, Development
Platforms -Standard, Enterprise. Java Virtual Machine (JVM), Java compiler, Bytecode, Java
applet, Java Buzzwords, Java program structure, Comments, Garbage Collection, Lexical Issues.
Module 2
Module 4
Advanced features of Java:
Java Library - String Handling – String Constructors, String Length, Special String Operations -
Character Extraction, String Comparison, Searching Strings, Modifying Strings, using valueOf(),
Comparison of StringBuffer and String.
Collections framework - Collections overview, Collections Interfaces- Collection Interface, List
Interface.
Collections Class – ArrayList class. Accessing a Collection via an Iterator.
Event handling - Event Handling Mechanisms, Delegation Event Model, Event Classes, Sources
of Events, Event Listener Interfaces, Using the Delegation Model.
Multithreaded Programming - The Java Thread Model, The Main Thread, Creating Thread,
Creating Multiple Threads, Synchronization, Suspending, Resuming and Stopping Threads.
Module 5
Text Books:
1. Herbert Schildt, Java: The Complete Reference, 8/e, Tata McGraw Hill, 2011.
2. Rajib Mall, Fundamentals of Software Engineering, 4th edition, PHI, 2014.
3. Paul Deitel, Harvey Deitel, Java How to Program, Early Objects 11th Edition, Pearson,
2018.
Reference Books:
Course Outcome1(CO1): For the following passage develop UML diagrams and then
implement it as a Java program in accordance with your UML design.
Passage: College Office collects semester fee and college bus fee for each student. A
clerk at the college office collects the fees from each student. The bus fee is calculated
depending on the distance of the corresponding bus stop from the college. The semester
fee varies depending upon the semester as well as branch of each student. Students are
supposed to pay the fees in full. Economically backward students are eligible for 50%
discount in semester fee. The consolidated fees receipt is issued to each student by the
clerk, which contains the student name, admission number, semester and branch of
student along with details of fees collected. Students can log in and view the details of
fees remitted and dues if any. The system allows students and clerk level login to the
system. Clerk is able to view reports of each class showing status of fees payment of
each student.
Course Outcome 2(CO2): Write a Java program to evaluate a post fix expression
containing two operands and a single operator using stack. Stack should be implemented
as a separate entity so as to reflect OOP concepts.
Course Outcome 3(CO3): Write a program to demonstrate the start, run, sleep and join
methods in Thread class.
Course Outcome 4(CO4): Write a GUI based program with separate buttons to add,
delete and display student details i.e. name, student ID, current semester and branch of
study based on student ID.
Course Outcome 5(CO5): Using Swing create a JFrame with a JLabel and two
JButtons. Set the texts of JButtons as “Yes” and “No” respectively. Set the JLabel’s text
to the text of the button currently being pressed. Initially the JLabel’s text is blank.
COMPUTER SCIENCE AND ENGINEERING
QP CODE: PAGES:3
Reg No:_______________
Name:_________________
PART A
2. Describe the concepts of object and class with a suitable Java program.
3. Explain the concept of method overriding with an example.
4. What is the use of the keyword final in Java?
5. Explain the concept of streams.
6. Explain any two applications of Serialization.
7. Distinguish the usage of “==” and equals() method when comparing String type?
8. What are Collections in Java? Explain any one Collection interface in Java.
9. Explain any two properties of Swing components in Java.
10. Explain JLabel component. With suitable examples explain any two of its constructors.
Part B
Answer any one question completely from each module
11.
(a) Describe in detail any three Object Oriented Programming principles. Illustrate with
suitable examples.
(9)
COMPUTER SCIENCE AND ENGINEERING
(b) What is Java Runtime Environment? What is the role of Java Virtual Machine in it?
(5)
OR
12.
(a) Compare and contrast Java standard edition and Java enterprise edition.
(5)
(b) Why is Java considered to be platform independent? What is the role of Bytecode in
making Java platform independent?
(9)
13.
(a) Explain in detail the primitive data types in Java.
(8)
(b) Explain automatic type conversion in Java with an example. What are the two
conditions required for it?
(6)
OR
14.
(a) Using a suitable Java program explain the difference between private and public
members in the context of inheritance.
(8)
(b) Is it possible to use the keyword super within a static method? Give justification for
your answer.
(6)
15.
(a) Explain in detail about byte streams and character streams with suitable code
samples.
(6)
(b) Describe in detail about exception handling, try block and catch clause with the help
of a suitable Java program.
(8)
OR
16.
(a) Explain object streams in Java. Explain the role of Serializable interface with a
suitable code sample.
(8)
(b) Explain throw, throws and finally constructs with the help of a Java program.
(6)
COMPUTER SCIENCE AND ENGINEERING
17.
(a) Describe in detail the creation of a thread using the Runnable interface and the
Thread class with suitable examples.
(10)
(b) Explain List Interface. Mention any two exceptions thrown by its methods.
(4)
OR
18.
(a) Explain in detail the Delegation Event model for event handling in Java.
(7)
(b) Write a simple program by extending appropriate class to demonstrate the working of
threads in java.
(7)
19.
(a) Write a Java program to demonstrate the use of JLabel and JButton by adding them
to JFrame.
(7)
(b) Explain step-by-step procedure of using Java DataBase Connectivity in Java
programs.
(7)
OR
20.
(a) Explain the class hierarchy of Java Swing components.
(7)
(b) Write a Java Program to create a student table and to add student details to it using
JDBC.
(7)
COMPUTER SCIENCE AND ENGINEERING
Teaching Plan
2.10 Calling Order of Constructors, Method Overriding, the Object class, 1 hour
2.11 Abstract Classes and Methods, Using final with Inheritance 1 hour
5.5 Exploring Swings –JFrame, JLabel, The Swing Buttons, JTextField. 1 hour
JDBC overview, Creating and Executing Queries – create table,
5.6 1hour
delete, insert, select (Basics only, DBMS course is not a prerequisite).
5.7 Creating and Executing Queries – create table, delete, insert, select. 1 hour
5.8 Creating and Executing Queries – create table, delete, insert, select. 1 hour
COMPUTER SCIENCE AND ENGINEERING
YEAR OF
DATA STRUCTURES CATEGORY L T P CREDIT INTRODUCTION
CSL 201
LAB
PCC 0 0 3 2 2019
Preamble: The aim of the Course is to give hands-on experience for Learners on creating and
using different Data Structures. Data Structures are used to process data and arrange data in
different formats for many applications. The most commonly performed operations on data
structures are traversing, searching, inserting, deleting and few special operations like merging
and sorting.
Write a time/space efficient program to sort a list of records based on a given key in
CO2
the record (Cognitive Knowledge Level: Apply)
Examine a given Data Structure to determine its space complexity and time
CO3
complexities of operations on it (Cognitive Knowledge Level: Apply)
CO4 Design and implement an efficient data structure to represent given data (Cognitive
Knowledge Level: Apply)
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO1
CO2
CO3
CO4
CO5
CO6
Assessment Pattern
Remember 20 20
Understand 20 20
Apply 60 60
Analyse
Evaluate
Create
Mark Distribution
Attendance : 15 marks
Viva-voce : 15 marks
Internal Examination Pattern: The marks will be distributed as Algorithm 30 marks, Program
20 marks, Output 20 marks and Viva 30 marks. Total 100 marks which will be converted out of
15 while calculating Internal Evaluation marks.
End Semester Examination Pattern: The marks will be distributed as Algorithm 30 marks,
Program 20 marks, Output 20 marks and Viva 30 marks. Total 100 marks will be converted out
of 75 for End Semester Examination.
COMPUTER SCIENCE AND ENGINEERING
SYLLABUS
8. Implementation of binary trees using linked lists and arrays- creations, insertion, deletion
and traversal. **
11. Implementation of sorting algorithms – bubble, insertion, selection, quick, merge sort
COMPUTER SCIENCE AND ENGINEERING
13. Representation of graphs and computing various parameters (in degree, out degree etc.) -
adjacency list, adjacency matrix.
15. Implementation of hash table using your own mapping functions and observe collisions
and overflow resolving schemes.**
17. Simulation of a basic memory allocator and garbage collector using doubly linked list.
** mandatory.
1. Write a program to read two polynomials and store them in an array. Calculate the sum of the
two polynomials and display the first polynomial, second polynomial and the resultant
polynomial.
2. C Write a program to enter two matrices in normal form . Write a function to convert two
matrices to tuple form and display it. Also find the transpose of the two matrices represented
in tuple form and display it. Find the sum of the two matrices in tuple form and display the
sum in tuple form.
3. Write a program to enter two matrices in normal form . Write a function to convert two
matrices to tuple form and display it. Also find the transpose of the two matrices represented
in tuple form and display it. Find the sum of the two matrices in tuple form and display the
sum in tuple form.
9. Using stack convert an infix expression to a postfix expression and evaluate the postfix
expression.
10. Write a program to convert an infix expression to a prefix expression using stacks.
12. Write a menu driven program for performing the following operations on a Linked List:
12.1.Display
12.2.Insert at Beginning
12.3.Insert at End
12.4.Insert at a specified Position
12.5.Delete from Beginning
12.6.Delete from End
12.7.Delete from a specified Position
16. Write a program to read two polynomials and store them using linked list. Calculate the sum
of the two polynomials and display the first polynomial, second polynomial and the resultant
polynomial.
17. Write a program to read two polynomials and store them using linked list. Find the product
of two polynomials and store the result using linked list. Display the resultant polynomial.
18. Write a program for addition of polynomials containing two variables using linked list.
19. The details of students(number, name, total-mark) are to be stored in a linked list. Write
functions for the following operations:
19.1.Insert
19.2.Delete
19.3.Search
19.4.Sort on the basis of number
19.5.Display the resultant list after every operation
20. Create a Doubly Linked List from a string taking each character from the string. Check if the
given string is palindrome in an efficient method.
22. Write a program to create a binary search tree and find the number of leaf nodes
26. Create a text file containing the name, height, weight of the students in a class. Perform
Quick sort and Merge sort on this data and store the resultant data in two separate files. Also
write the time taken by the two sorting methods into the respective files.
Eg. Sony Mathew 5.5 60
Arun Sajeev 5.7 58
Rajesh Kumar 6.1 70
27. Write a program to sort a set of numbers using Heap sort and find a particular number from
the sorted set using Binary Search.
28. Implement a Hash table using Chaining method. Let the size of hash table be 10 so that the
index varies from 0 to 9.
29. Implement a Hash table that uses Linear Probing for collision resolution
COMPUTER SCIENCE AND ENGINEERING
Course Outcomes:
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO1 ! ! ! ! ! ! ! !
CO2 ! ! ! ! ! ! ! !
CO3 ! ! ! ! ! ! ! !
CO4 ! ! ! ! ! ! ! !
CO5 ! ! ! ! ! ! ! !
COMPUTER SCIENCE AND ENGINEERING
Assessment Pattern
Continuous Assessment
End Semester Examination
Bloom’s Category Test - Internal Exam
(Percentage)
(Percentage)
Remember 20 20
Understand 20 20
Apply 60 60
Analyse
Evaluate
Create
Mark Distribution
150 75 75 3 hours
COMPUTER SCIENCE AND ENGINEERING
Attendance : 15 marks
Viva-voce : 15 marks
Internal Examination Pattern: The marks will be distributed as Algorithm 30 marks, Pro-
gram 20 marks, Output 20 marks and Viva 30 marks. Total 100 marks which will be con-
verted out of 15 while calculating Internal Evaluation marks.
SYLLABUS
The syllabus contains six sessions (A, B, C, D, E, F). Each session consists of three concrete
Java exercises, out of which at least two questions are mandatory.
(A) Basic programs using datatypes, operators, and control statements in Java.
1) Write a Java program that checks whether a given string is a palindrome or not.
Ex: MALAYALAM is palindrome.
2) Write a Java Program to find the frequency of a given character in a string. **
3) Write a Java program to multiply two given matrices. **
(B) Object Oriented Programming Concepts: Problem on the use of constructors, inheritance,
method overloading & overriding, polymorphism and garbage collection:
4) Write a Java program which creates a class named 'Employee' having the following
members: Name, Age, Phone number, Address, Salary. It also has a method named 'print-
Salary( )' which prints the salary of the Employee. Two classes 'Officer' and 'Manager'
inherits the 'Employee' class. The 'Officer' and 'Manager' classes have data members 'spe-
cialization' and 'department' respectively. Now, assign name, age, phone number, address
and salary to an officer and a manager by making an object of both of these classes and
print the same. (Exercise to understand inheritance). **
5) Write a java program to create an abstract class named Shape that contains an empty
method named numberOfSides( ). Provide three classes named Rectangle, Triangle and
Hexagon such that each one of the classes extends the class Shape. Each one of the class-
es contains only the method numberOfSides( ) that shows the number of sides in the giv-
en geometrical structures. (Exercise to understand polymorphism). **
6) Write a Java program to demonstrate the use of garbage collector.
(C) Handling different types of files as well as input and output management methods:
10) Write a Java program that shows the usage of try, catch, throws and finally. **
11) Write a Java program that implements a multi-threaded program which has three threads.
First thread generates a random integer every 1 second. If the value is even, second
thread computes the square of the number and prints. If the value is odd the third thread
will print the value of cube of the number.
12) Write a Java program that shows thread synchronization. **
13) Write a Java program that works as a simple calculator. Arrange Buttons for digits and
the + - * % operations properly. Add a text field to display the result. Handle any possible
exceptions like divide by zero. Use Java Swing. **
14) Write a Java program that simulates a traffic light. The program lets the user select one of
three lights: red, yellow, or green. When a radio button is selected, the light is turned on,
and only one light can be on at a time. No light is on when the program starts. **
15) Write a Java program to display all records from a table using Java Database Connectivi-
ty (JDBC).
(F) Standard Searching and Sorting Algorithms using data structures and algorithms learned
from course Data Structures (CST 201):
** Mandatory
COMPUTER SCIENCE AND ENGINEERING
PRACTICE QUESTIONS
SEMESTER -3
MINOR
COMPUTER SCIENCE AND ENGINEERING
YEAR OF
CST OBJECT ORIENTED CATEGORY L T P CREDIT
INTRODUCTION
281 PROGRAMMING
MINOR 3 1 0 4 2019
Preamble: This is the programming course for awarding B.Tech. Minor in Computer Science
and Engineering with specialization in Software Engineering. The purpose of this course is to
enable learners to solve problems by breaking it down to object level while designing software
and to implement it using Java. This course covers Object Oriented Principles, Object Oriented
Programming in Java, Inheritance, Exception handling, Event handling, multithreaded
programming and working with window-based graphics. This course helps the learners to
develop Mobile applications, Enterprise Applications, Scientific Applications and Web based
Applications.
Course Outcomes: After the completion of the course the student will be able to
Write Java programs using the object oriented concepts - classes, objects,
CO1 constructors, data hiding, inheritance and polymorphism (Cognitive Knowledge
Level: Apply)
Utilise datatypes, operators, control statements, built in packages & interfaces, Input/
CO2 Output Streams and Files in Java to develop programs (Cognitive Knowledge Level:
Apply)
Illustrate how robust programs can be written in Java using exception handling
CO3
mechanism (Cognitive Knowledge Level: Understand)
Write application programs in Java using multithreading (Cognitive Knowledge
CO4
Level: Apply)
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO1
CO2
CO3
CO4
CO5
Assessment Pattern
Remember 30 30 30
Understand 30 30 30
Apply 40 40 40
Analyse
Evaluate
Create
COMPUTER SCIENCE AND ENGINEERING
Mark Distribution
Attendance : 10 marks
First series test shall be preferably conducted after completing the first half of the syllabus and
the second series test shall be preferably conducted after completing remaining part of the
syllabus.
There will be two parts: Part A and Part B. Part A contains 5 questions (preferably, 2 questions
each from the completed modules and 1 question from the partly covered module), having 3
marks for each question adding up to 15 marks for part A. Students should answer all questions
from Part A. Part B contains 7 questions (preferably, 3 questions each from the completed
modules and 1 question from the partly covered module), each with 7 marks. Out of the 7
questions in Part B, a student should answer any 5.
End Semester Examination Pattern: There will be two parts; Part A and Part B. Part A contains
10 questions with 2 questions from each module, having 3 marks for each question. Students
should answer all questions. Part B contains 2 questions from each module of which a student
should answer any one. Each question can have maximum 2 sub-divisions and carry 14 marks.
COMPUTER SCIENCE AND ENGINEERING
SYLLABUS
Module 1
Introduction:
Approaches to Software Design - Functional Oriented Design, Object Oriented Design, Case
Study of Automated Fire Alarm System.
Object Modeling Using UML – Basic Object Oriented concepts, UML (Unified Modeling
Language) diagrams, Use case model, Class diagram, Interaction diagram, Activity diagram,
State chart diagram.
Introduction to Java - Java programming Environment and Runtime Environment, Development
Platforms -Standard, Enterprise. Java Virtual Machine (JVM), Java compiler, Bytecode, Java
applet, Java Buzzwords, Java program structure, Comments, Garbage Collection, Lexical Issues.
Module 2
Module 4
Advanced features of Java:
Input/Output - I/O Basics, Reading Console Input, Writing Console Output, PrintWriter Class,
Object Streams and Serialization, Reading and Writing Files.
Java Library - String Handling – String Constructors, String Length, Special String Operations -
Character Extraction, String Comparison, Searching Strings, Modifying Strings, Using
valueOf(), Comparison of StringBuffer and String.
Collections framework – Collections overview, Collections Class – ArrayList. Accessing
Collections via an Iterator.
Module 5
Event handling - Event Handling Mechanisms, Delegation Event Model, Event Classes, Sources
of Events, Event Listener Interfaces, Using the Delegation Model.
Multithreaded Programming - The Java Thread Model, The Main Thread, Creating Thread,
Creating Multiple Threads, Suspending, Resuming and Stopping Threads.
Text Books:
1. Herbert Schildt, Java: The Complete Reference, 8/e, Tata McGraw Hill, 2011.
2. Rajib Mall, Fundamentals of Software Engineering, 4th edition, PHI, 2014.
3. Paul Deitel, Harvey Deitel, Java How to Program, Early Objects 11th Edition, Pearson,
2018.
Reference Books:
Course Outcome1(CO1): For the following passage develop UML diagrams and then
implement it as a Java program in accordance with your UML design.
Passage: College Office collects semester fee and college bus fee for each student. A
clerk at the college office collects the fees from each student. The bus fee is calculated
depending on the distance of the corresponding bus stop from the college. The semester
fee varies depending upon the semester as well as branch of each student. Students are
supposed to pay the fees in full. Economically backward students are eligible for 50%
discount in semester fee. The consolidated fees receipt is issued to each student by the
clerk, which contains the student name, admission number, semester and branch of
student along with details of fees collected. Students can log in and view the details of
fees remitted and dues if any. The system allows students and clerk level login to the
system. Clerk is able to view reports of each class showing status of fees payment of
each student.
Course Outcome 2 (CO2): Write a Java program to prepare the rank list of students
based one their performance in the first Semester B.Tech. Degree examination at APJ
Abdul Kalam Technological University. The output should be stored in a file.
Course Outcome 3 (CO3): Write a program to demonstrate how event handling and
exception handling are supported in Java..
Course Outcome 4 (CO4): Write a program to demonstrate the start, run, sleep and join
methods in Thread class..
COMPUTER SCIENCE AND ENGINEERING
QP CODE: PAGES:3
Reg No:_______________
Name:_________________
PART A
11.
(a) Describe in detail polymorphism, abstraction and inheritance with suitable examples.
(9)
(b) What is Java Virtual Machine?
(5)
OR
12.
(a) Compare and contrast Functional Oriented and Object Oriented approach by
considering a simple bus ticket reservation system.
(5)
(b) What is a class diagram? Explain with an example.
(9)
13.
(a) Explain primitive data types in Java. How are they different from other data types?
(8)
(b) Explain variables and arrays in Java.
(6)
OR
14.s
(a) Using a suitable Java program explain the concept of methods and constructors.
(8)
(b) Explain the keyword super and its usage in Java.
(6)
15.
(a) Using a table, explain the effect of access specifiers in inheritance.
(6)
(b) Describe in detail about exception handling using try block and catch clause in Java
with the help of a suitable Java program.
(8)
OR
16.
(a) What is an interface in Java? Explain with a suitable example.
(8)
(b) Explain throw, throws and finally constructs with the help of a Java program.
(6)
17.
COMPUTER SCIENCE AND ENGINEERING
(a) Explain ArrayList collections framework. Also explain the use of iterator in
accessing collections.
(8)
(b) Bring out difference between “==” and equals() method with the help of a sample
program
(6)
OR
18.
(a) Compare Byte Streams and Character Streams. Write a program to demonstrate the
usage of the PrintWriter class.
(8)
(b) Explain any three String constructors with the help of sample code for each.
(6)
19.
(a) Explain in detail the Delegation Event model for event handling in Java.
(7)
(b) Describe in detail the creation of a thread using the Runnable interface.
(7)
OR
20.
(a) What are the differences between a process and a thread?
(4)
(b) Write a Graphical User Interface (GUI) based Java program to implement a simple
calculator supporting the operations addition, subtraction, multiplication and
division. Use Swing controls to implement GUI. There may be three text boxes, the
first two for operands and the last for result. Add four buttons for the above
operations. Write neat comments in your program to show how you handle events.
(10)
COMPUTER SCIENCE AND ENGINEERING
Teaching Plan
3.2 Calling Order of Constructors, Method Overriding, the Object class, 1 hour
3.3 Abstract Classes and Methods, Using final with Inheritance 1 hour
Preamble: This is a programming course for awarding B. Tech. Minor in Computer Science and
Engineering with specialization in Machine Learning. The objective of the course is to provide
learners an insight into Python programming, and develop programming skills to manage the
development of software systems. It covers programming environment, important instructions,
data representations, intermediate level features, Object Oriented Programming and file data
processing of Python. This course lays the foundation to develop web applications, Machine
Learning, and Artificial Intelligence-based applications and tools, Data Science and Data
Visualization applications.
Prerequisite: Nil
Course Outcomes: After the completion of the course the student will be able to
CO1 Write, test and debug Python programs (Cognitive Knowledge level: Apply)
Illustrate uses of conditional (if, if-else, if-elif-else and switch-case) and iterative
CO2
(while and for) statements in Python programs (Cognitive Knowledge level: Apply)
Develop programs by utilizing the modules Lists, Tuples, Sets and Dictionaries in
CO3
Python (Cognitive Knowledge level: Apply)
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO1 ✔ ✔ ✔ ✔ ✔ ✔
CO2 ✔ ✔ ✔ ✔ ✔ ✔
CO3 ✔ ✔ ✔ ✔ ✔ ✔ ✔
CO4 ✔ ✔ ✔ ✔ ✔ ✔
CO5 ✔ ✔ ✔ ✔ ✔ ✔ ✔
COMPUTER SCIENCE AND ENGINEERING
Assessment Pattern
End Semester
Test 1 (Marks in Test 2 (Marks
Bloom’s Category Examination (Marks in
percentage) in percentage)
percentage)
Remember 20 20 20
Understand 35 35 35
Apply 45 45 45
Analyse
Evaluate
Create
Mark Distribution
SYLLABUS
Module I
Programming Environment and Python Basics:
Getting Started with Python Programming - Running code in the interactive shell, Editing,
Saving, and Running a script. Using editors - IDLE, Jupyter. The software development process
- Case Study.
Basic coding skills - Working with data types, Numeric data types and Character sets, Keywords,
Variables and Assignment statement, Operators, Expressions, Working with numeric data, Type
conversions, Comments in the program. Input, Processing, and Output. Formatting output. How
Python works. Detecting and correcting syntax errors. Using built in functions and modules in
math module.
Module II
Building Python Programs:
Control statements - Selection structure (if-else, switch-case), Iteration structure(for, while),
Testing the control statements, Lazy evaluation. Functions - Hiding redundancy and complexity,
Arguments and return values, Variable scopes and parameter passing, Named arguments, Main
function, Working with recursion, Lambda functions. Strings and number systems - String
function, Handling numbers in various formats.
Module III
Data Representation:
Lists - Basic list Operations and functions, List of lists, Slicing, Searching and sorting list, List
comprehension. Work with tuples. Sets. Work with dates and times. Dictionaries - Dictionary
COMPUTER
functions, dictionary literals, adding and removing SCIENCE
keys, accessing and AND ENGINEERING
replacing values,
traversing dictionaries, reverse lookup. Case Study - Data Structure Selection.
Module IV
Object Oriented Programming:
Design with classes - Objects and Classes, Methods, Instance Variables, Constructor, Accessors
and Mutators. Structuring classes with Inheritance and Polymorphism. Abstract Classes.
Exceptions - Handle a single exception, handle multiple exceptions.
Module V
Data Processing:
The os and sys modules. Introduction to file I/O - Reading and writing text files, Manipulating
binary files. NumPy - Basics, Creating arrays, Arithmetic, Slicing, Matrix Operations, Random
numbers. Plotting and visualization. Matplotlib - Basic plot, Ticks, Labels, and Legends.
Working with CSV files. – Pandas - Reading, Manipulating, and Processing Data.
Text Books:
1. Kenneth A Lambert., Fundamentals of Python : First Programs, 2/e, Cengage Publishing,
2016
2. Wes McKinney, Python for Data Analysis, 2/e, Shroff / O’Reilly Publishers, 2017
Reference Books:
1. Allen B. Downey, Think Python: How to Think Like a Computer Scientist, 2/e, Schroff,
2016
2. Michael Urban and Joel Murach, Python Programming, Shroff/Murach, 2016
3. David M.Baezly, Python Essential Reference. Addison-Wesley Professional; 4/e, 2009.
4. Charles Severance. Python for Informatics: Exploring Information,
5. http://swcarpentry.github.io/python-novice-gapminder/
Course Outcome 2(CO2): Write a Python program which takes a positive integer n as input
and finds the sum of cubes all positive even numbers less than or equal to the number.
Course Outcome 3(CO3): Given is a list of of words, wordlist, and a string, name. Write a
Python function which takes wordlist and name as input and returns a tuple. The first element of
COMPUTER
the output tuple is the number of words in the wordlist SCIENCE
which have AND ENGINEERING
name as a substring in it. The
second element of the tuple is a list showing the index at which the name occurs in each of the
words of the wordlist and a 0 if it doesn’t occur.
Course Outcome 4(CO4): Write a Python program to implement the addition, subtraction, and
multiplication of complex numbers using classes. Use constructors to create objects. The input to
the program consist of real and imaginary parts of the complex numbers.
Course Outcome 5(CO5): Given a file “auto.csv” of automobile data with the fields index,
company, body-style, wheel-base, length, engine-type, num-of-cylinders, horsepower, average-
mileage, and price, write python code to
1) Clean and Update the CSV file
2) Print total cars of all companies
3) Find the average mileage of all companies
4) Find the highest priced car of all companies.
COMPUTER SCIENCE AND ENGINEERING
Model Question Paper
QP CODE: PAGES:
Reg No:_______________
Name:_________________
PART-A
13. (a) Write a Python code to check whether a given year is a leap year or not [An (5)
year is a leap year if it’s divisible by 4 but not divisible by 100 except for
those divisible by 400].
(b) Input 4 integers (+ve and −ve). Write a Python code to find the sum of (9)
negative numbers, positive numbers, and print them. Also, find the
averages of these two groups of numbers and print.
OR
14. (a) Write a Python program to find the value for sin(x) up to n terms using the (8)
series
where x is in degrees
(b) Write a Python code to determine whether the given string is a Palindrome (6)
or not using slicing. Do not use any string function.
15. (a) Write a Python code to create a function called list_of_frequency that takes (5)
a string and prints the letters in non-increasing order of the frequency of
their occurrences. Use dictionaries.
(b) Write a Python program to read a list of numbers and sort the list in a non- (9)
decreasing order without using any built in functions. Separate function
should be written to sort the list wherein the name of the list is passed as
the parameter.
OR
16.
COMPUTER SCIENCE AND ENGINEERING
(a) Illustrate the following Set methods with an example. (6)
i. intersection( ) ii. Union( ) iii. Issubset( ) iv. Difference( ) v. update( ) vi.
discard( )
(b) Write a Python program to check the validity of a password given by the (8)
user.
The Password should satisfy the following criteria:
1. Contains at least one letter between a and z
2. Contains at least one number between 0 and 9
3. Contains at least one letter between A and Z
4. Contains at least one special character from $, #, @
5. Minimum length of password: 6
17. (a) How can a class be instantiated in Python? Write a Python program to (10)
express the instances as return values to define a class RECTANGLE with
parameters height, width, corner_x, and corner_y and member functions to
find center, area, and perimeter of an instance.
(b) Explain inheritance in Python. Give examples for each type of inheritance. (4)
OR
18. (a) Write a Python class named Circle constructed by a radius and two (6)
methods which will compute the area and the perimeter of a given circle
(b) Write Python program to create a class called as Complex and implement (8)
__add__( ) method to add two complex numbers. Display the result by
overloading the + Operator.
19. (a) Write a Python program to add two matrices and also find the transpose of (8)
the resultant matrix.
(b) Given a file “auto.csv” of automobile data with the fields index, company, (6)
body-style, wheel-base, length, engine-type, num-of-cylinders, horsepower,
average-mileage, and price, write Python codes using Pandas to
1) Clean and Update the CSV file
2) Print total cars of all companies
3) Find the average mileage of all companies
4) Find the highest priced car of all companies.
OR
20.
COMPUTER SCIENCE AND ENGINEERING
(a) Write Python program to write the data given below to a CSV file.
(5)
SN Name Country Contribution Year
1 Linus Torvalds Finland Linux Kernel 1991
2 Tim Berners-Lee England World Wide Web 1990
3 Guido van Rossum Netherlands Python 1991
(b) Given the sales information of a company as CSV file with the following (9)
fields month_number, facecream, facewash, toothpaste, bathingsoap,
shampoo, moisturizer, total_units, total_profit. Write Python codes to
visualize the data as follows
1) Toothpaste sales data of each month and show it using a scatter plot
2) Face cream and face wash product sales data and show it using the
bar chart
3) Calculate total sale data for last year for each product and show it
using a Pie chart.
(14X5=70)
Teaching Plan
(10
Module 1: Programming Environment and Python Basics
hours)
Getting Started with Python Programming: Running code in the interactive
1.1 1 hour
shell Editing, Saving, and Running a script
1.6 Working with numeric data, Type conversions, Comments in the program 1 hour
1.7 Input, Processing, and Output, Formatting output – How Python works 1 hour
1.8 How Python works – Detecting and correcting syntax errors 1 hour
1.9 Using built in functions and modules: Case – Using math module 1 hour
5.2 Introduction to file I/O: Reading and writing text files 1 hour
5.3 Manipulating binary files 1 hour
Year of
CST DATA Category L T P Credit
Introduction
285 COMMUNICATION
MINOR 3 1 0 4 2019
Preamble: This is a basic course in communication for awarding B. Tech. Minor in Computer
Science and Engineering with specialization in Networing. The purpose of this course is to
prepare learners to understand the communication entities and the associated issues in the
field of Computer Science. This course covers fundamental concepts of data transmission &
media, digital & analog transmissions, multiplexing & spread spectrum, error detection &
correction and switching. Concepts in data communication help the learner to understand the
concepts in networking and mobile communication.
Prerequisite: NIL
Course Outcomes: After the completion of the course the student will be able to
CO1 ! ! ! !
CO2 ! ! ! !
CO3 ! !
CO4 ! ! ! ! !
CO5 ! ! ! ! ! !
CO6 ! ! ! ! ! !
Conduct investigations of
PO4 PO10 Communication
complex problems
Assessment Pattern
End Semester
Test 1 (Marks Test 2 (Marks
Bloom’s Category Examination (Marks in
in percentage) in percentage)
percentage)
Remember 30 30 30
Understand 40 40 40
Apply 30 30 30
Analyse
Evaluate
Create
COMPUTER SCIENCE AND ENGINEERING
Mark Distribution
Total Marks CIE Marks ESE Marks ESE Duration
150 50 100 3
Syllabus
Module 1
Data Transmission Basics
Communication model - Simplex, Half duplex, Full duplex transmission. Periodic Analog
signals - Sine wave, Amplitude, Phase, Wavelength, Time and frequency domain, Bandwidth.
Analog & digital data and signals. Transmission impairments - Attenuation, Delay distortion,
Noise. Data rate limits - Noiseless channel, Nyquist bandwidth, Noisy channel, Shannon's
capacity formula.
Module 2
Transmission Media
Guided Transmission Media - Twisted pair, Coaxial cable, Optical fiber. Unguided media -
Radio waves, Terrestrial microwave, Satellite microwave, Infrared. Wireless Propagation -
Ground wave propagation, Sky Wave propagation, Line-of-Sight (LoS) Propagation.
Module 3
Digital Transmission and Analog Transmission
Digital data to Digital signal – Non-Return-to-Zero (NRZ), Return-to-Zero (RZ), Multilevel
COMPUTER SCIENCE AND ENGINEERING
binary, Biphase. Analog data to Digital signal - Sampling theorem, Pulse Code Modulation
(PCM), Delta Modulation (DM). Digital data to Analog signal: Amplitude Shift Keying
(ASK), Frequency Shift Keying (FSK), Phase Shift Keying (PSK). Analog data to Analog
signal: Amplitude Modulation (AM), Frequency Modulation (FM), Phase Modulation (PM).
Module 4
Multiplexing and Spread Spectrum
Multiplexing - Frequency Division Multiplexing (FDM), Wave length Division Multiplexing
(WDM), Time Division Multiplexing (TDM), Characteristics, Synchronous TDM, Statistical
TDM. Spread Spectrum Techniques - Direct Sequence Spread Spectrum (DSSS), Frequency
Hopping Spread Spectrum (FHSS), Code Division Multiplexing, Code Division Multiple
Access (CDMA).
Module 5
Error Detection, Correction and Switching
Digital data communication techniques - Asynchronous transmission, Synchronous
transmission. Detecting and correcting errors - Types of Errors, Parity check, Checksum,
Cyclic Redundancy Check (CRC), Forward Error Correction (FEC), Hamming Distance,
Hamming Code. Basic principles of Switching - Circuit Switching, Packet Switching,
Message Switching.
Text Books
1. Forouzan B. A., Data Communications and Networking, 5/e, McGraw Hill, 2013.
2. William Stallings, Data and Computer Communication 9/e, Pearson Education, Inc.
Reference Books
1. Schiller J., Mobile Communications, 2/e, Pearson Education, 2009.
2. Curt M. White, Fundamentals of Networking and Communication 7/e, Cengage learning.
Reg No:_______________
Name:_________________
1. What is bandwidth? Find the lowest frequency, if a periodic signal has a bandwidth of 20
Hz and the highest frequency is 60 Hz. Draw the Spectrum if the signal contains all
frequencies of same amplitude.
2. Assume that a TV picture is to be transmitted over a channel with 4.5 MHz bandwidth and
a 35 dB Signal-to-Noise-Ratio. Find the capacity of the channel.
3. What is the purpose of cladding in optical fibres?
4. Which wireless propagation is suitable for satellite communication? Justify your answer.
5. Explain the working of Delta Modulation with an example.
6. Illustrate the equivalent square wave pattern of the bit string 01001101 using Non-Return-
to-Zero(NRZ) - Level and NRZ-Invert encoding schemes.
7. Distinguish between synchronous and statistical Time Division Multiplexing.
8. Apply Direct Sequence Spread Spectrum to the data 101 using the Barker sequence
10110111000. Show the encoding and decoding steps.
9. Find the minimum hamming distance for the following cases:
a) Detection of two errors
b) Correction of two errors
c) Detection of 3 errors or correction of 2 errors
d) Detection of 6 errors or correction of 2 errors
10. Find the parity bit for simple even parity check for the following.
a) 1001010
b) 0001100
c) 1000000
d) 1110111
COMPUTER SCIENCE AND ENGINEERING
PART-B
(Answer ANY one full question from each module. Each question carries 14 marks)
11. a) With the help of suitable figures, distinguish between time domain and frequency
domain. (4)
OR
12. a) Calculate the bandwidth, if a periodic signal is decomposed into 4 sine waves with
frequencies 50 Hz, 100 Hz, 150 Hz and 200Hz. Draw the spectrum, assuming all
components having amplitude in the range 6-12 V and all are multiple of two in the
increasing order.
(6)
13. a) Fora parabolic reflective antenna operating at 12 GHz with a diameter of 2 m, calculate
the effective area and the antenna gain.
(6)
b) List any four advantages and disadvantages of twisted pair, coaxial cable and fiber optic
cable.
(8)
OR
(6)
b) With the help of suitable diagrams, differentiate Multi-mode and Single-mode optical
fibres. How the rays are propagated in Step-index and Graded-index Multi-mode fibres.
(8)
(4)
COMPUTER SCIENCE AND ENGINEERING
b) What is polar encoding? Encode the pattern 010011001110 using the two Biphase
schemes.
(10)
OR
16. a) Show the equivalent analog sine wave pattern of the bit string 010011010 using
Amplitude Shift Keying, Frequency Shift Keying and Phase Shift Keying.
(4)
b) State Sampling theorem. Explain Pulse Code Modulation with suitable figures.
(10)
17. a) Four channels are multiplexed using Time Division Multiplexing. If each channel sends
100 bytes/sec and we multiplex one byte per channel, determine the frame size, duration of
a frame, frame rate and bit rate of the link.
(6)
b) With the help of an example, explain the working of Frequency Hopping Spread
Spectrum.
(8)
OR
18. a)Explain the different techniques by which the disparity in input data rate is handled by
Time Division Multiplexing.
(4)
b) Suppose Alice and Bob are communicating using Code Division Multiple Access. Alice
uses the code [+1 +1] and Bob uses the code [+1 -1]. Alice sends the data bit 0 and Bob
sends the data bit 1. Show the data in the channel and how they can detect what the other
person has sent.
(10)
b) Describe the need for a switch. What are the different phases in circuit switching?
(10)
OR
COMPUTER SCIENCE AND ENGINEERING
20. a) With the help of a suitable example, explain the virtual circuit approach of packet
switching.
(6)
b) Find the Hamming code for the data-word 1011001. Assume odd parity.
(8)
Teaching Plan
(10
Module 3: Digital Transmission and Analog Transmission
Hours)
3.1 Digital data to Digital signal – Non-Return-to-Zero (NRZ) 1
3.3 Biphase 1
3.4 Analog data to Digital signal - Sampling theorem 1
4.9 CDMA 1
5.5 CRC 1
SEMESTER -4
COMPUTER SCIENCE AND ENGINEERING
Prerequisite: The topics covered under the course Discrete Mathematical Structures (MAT
203 )
Course Outcomes: After the completion of the course the student will be able to
Explain vertices and their properties, types of paths, classification of graphs and
CO 1
trees & their properties. (Cognitive Knowledge Level: Understand)
Demonstrate the fundamental theorems on Eulerian and Hamiltonian graphs.
CO 2
(Cognitive Knowledge Level: Understand)
Illustrate the working of Prim’s and Kruskal’s algorithms for finding minimum cost
CO 3 spanning tree and Dijkstra’s and Floyd-Warshall algorithms for finding shortest
paths. (Cognitive Knowledge Level: Apply)
Explain planar graphs, their properties and an application for planar graphs.
CO 4
(Cognitive Knowledge Level: Apply)
Explain the Vertex Color problem in graphs and illustrate an example application
CO 6
for vertex coloring. (Cognitive Knowledge Level: Apply)
COMPUTER SCIENCE AND ENGINEERING
Mapping of course outcomes with program outcomes
PO PO PO PO PO
PO 2 PO 3 PO 4 PO 7 PO 10 PO 11 PO 12
1 5 6 8 9
CO 1 √ √ √ √ √
CO 2 √ √ √ √ √ √
CO 3 √ √ √ √ √ √
CO 4 √ √ √ √ √ √
CO 5 √ √ √ √ √
CO 6 √ √ √ √ √ √
Assessment Pattern
Understand 30 30 30
Apply 40 40 40
Analyse
Evaluate
Create
COMPUTER SCIENCE AND ENGINEERING
Mark Distribution
Attendance : 10 marks
First Internal Examination shall be preferably conducted after completing the first half of the
syllabus and the Second Internal Examination shall be preferably conducted after completing
remaining part of the syllabus.
There will be two parts: Part A and Part B. Part A contains 5 questions (preferably, 2
questions each from the completed modules and 1 question from the partly covered module),
having 3 marks for each question adding up to 15 marks for part A. Students should answer
all questions from Part A. Part B contains 7 questions (preferably, 3 questions each from the
completed modules and 1 question from the partly covered module), each with 7 marks. Out
of the 7 questions in Part B, a student should answer any 5.
End Semester Examination Pattern: There will be two parts; Part A and Part B. Part A
contain 10 questions with 2 questions from each module, having 3 marks for each question.
Students should answer all questions. Part B contains 2 questions from each module of which
student should answer anyone. Each question can have maximum 2 sub-divisions and carries
14 marks.
COMPUTER SCIENCE AND ENGINEERING
Syllabus
Module 1
Module 2
Eulerian and Hamiltonian graphs : Euler graphs, Operations on graphs, Hamiltonian paths
and circuits, Travelling salesman problem. Directed graphs – types of digraphs, Digraphs and
binary relation, Directed paths, Fleury’s algorithm.
Module 3
Trees and Graph Algorithms : Trees – properties, pendant vertex, Distance and centres in a
tree - Rooted and binary trees, counting trees, spanning trees, Prim’s algorithm and Kruskal’s
algorithm, Dijkstra’s shortest path algorithm, Floyd-Warshall shortest path algorithm.
Module 4
Connectivity and Planar Graphs : Vertex Connectivity, Edge Connectivity, Cut set and Cut
Vertices, Fundamental circuits, Planar graphs, Kuratowski’s theorem (proof not required),
Different representations of planar graphs, Euler's theorem, Geometric dual.
Module 5
Text book:
Reference Books:
2. Is it possible to construct a graph with 12 vertices such that two of the vertices have
degree 3 and the remaining vertices have degree 4? Justify
3. Prove that a simple graph with n vertices must be connected, if it has more than
(n − 1)(n − 2)
edges.
2
4. Prove the statement: If a graph (connected or disconnected) has exactly two odd degree,
then there must be a path joining these two vertices.
1. Define Hamiltonian circuit and Euler graph. Give one example for each.
3. Prove that a connected graph G is an Euler graph if all vertices of G are of even degree.
4. Prove that a graph G of n vertices always has a Hamiltonian path if the sum of the degrees
of every pair of vertices Vi, Vj in G satisfies the condition d(Vi) + d(Vj) =n−1
Course Outcome 3 (CO3):
1. Define edge connectivity, vertex connectivity and separable graphs. Give an example for
each.
2. Prove that a connected graph with n vertices and e edges has e − n + 2 edges.
3. Prove the statement: Every cut set in a connected graph G must also contain at least one
branch of every spanning tree of G.
4. Draw the geometrical dual (G*) of the graph given below, also check whether G and G*
are self-duals or not, substantiate your answer clearly.
1. Show that if A(G) is an incidence matrix of a connected graph G with n vertices, then
rank of A(G) is n−1.
2. Show that if B is a cycle matrix of a connected graph G with n vertices and m edges, then
rank B = m−n+1.
3. Derive the relations between the reduced incidence matrix, the fundamental cycle matrix,
and the fundamental cut-set matrix of a graph G.
4. Characterize simple, self-dual graphs in terms of their cycle and cut-set matrices.
1. Show that an n vertex graph is a tree iff its chromatic polynomial is P n(λ) = λ(λ − 1)n−1
QP
Code : Total Pages: 4
1 Construct a simple graph of 12 vertices with two of them having degree 1, (3)
three having degree 3 and the remaining seven having degree 10.
2 What is the largest number of vertices in a graph with 35 edges, if all (3)
vertices are of degree at least 3 ?
3 Define a Euler graph. Give an example of Eulerian graph which is not (3)
Hamiltonian
4 Give an example of a strongly connected simple digraph without a directed (3)
Hamiltonian path.
5 What is the sum of the degrees of any tree of n vertices? (3)
6 How many spanning trees are there for the following graph (3)
COMPUTER SCIENCE AND ENGINEERING
7 Show that in a simple connected planar graph G having V-vertices, E-edges, (3)
and no triangles E <= 3V - 6.
8 Let G be the following disconnected planar graph. Draw its dual G*, and the (3)
dual of the dual (G*)*.
9 Consider the circuit matrix B and incidence matrix A of a simple connected (3)
graph whose columns are arranged using the same order of edges. Prove that
every row of B is orthogonal to every row of A?
10 A graph is critical if the removal of any one of its vertices (and the edges (3)
adjacent to that vertex) results in a graph with a lower chromatic number.
Show that Kn is critical for all n > 1.
PART B
Answer any one Question from each module. Each question carries 14 Marks
11 a) Prove that for any simple graph with at least two vertices has two vertices of (6)
the same degree.
b) Prove that in a complete graph with n vertices there are (n-1)/2 edge disjoint (8)
Hamiltonian circuits and n >= 3
OR
OR
COMPUTER SCIENCE AND ENGINEERING
etermine whether the following graphs G1 = (V1, E1) and G2 = (V2, E2) are isomorphic
12. a) D
12 a) Determine whether the following graphs G1 = (V1, E1) and G2 = (V2, E2) are (6)
or not. Give justification. (6)
isomorphic or not. Give justification.
b) P b) that
rove Prove that a graph
a simple simplewith n vertices
graph with nand k components
vertices and k components
can have atcan have
most at (n-(8)
(n-k)
k+1)/2 edges.
most (n-k) (n-k+1)/2 edges (8)
13Leta)S bLet
13. a) e a Ssetbeofa 5set
elements. Construct
of 5 elements. Construct whose
a graphaGgraph G vertices are subsets
whose vertices of S of size
are subsets (8)
2 and twoofsuch
S ofsubsets are two
size 2 and adjacent
such in G if they
subsets are disjoint.
are adjacent in G if they are disjoint. (8)
i. Drawi.theDraw G.graph G.
graphthe
ii. How ii.
many edges
How manymust musttobeG added
be added
edges to order
in ordertoforGGin have afor
Hamiltonian
G to havecycle?
a
b) Let G be a graph with exactly
Hamiltonian two connected components, both being Eulerian. What is
cycle?
theb)
minimum
Let G number of edges
be a graph withthat need totwo
exactly be added to G to
connected obtain an Eulerian
components, graph? (6)
both being
Eulerian. What is the minimum number of edges that need to be added to G (6)
to obtain an Eulerian graph?
OR
14. a) Show that a k-connected graph with no hamiltonian
OR cycle has an independent set of size
14k +a)1. Show that a k-connected graph with no hamiltonian cycle has an (8)
(8)
b) independent set of size k + 1. (6)
i.b) Let Gi.beLet
a graph
G bethat has exactly
a graph twoexactly
that has connected
two components, both being both
connected components,
Hamiltonian
beinggraphs. Find thegraphs.
Hamiltonian minimumFindnumber of edgesnumber
the minimum that oneofneeds to that
edges add to
G to obtain
oneaneeds
Hamiltonian
to add tograph.
G to obtain a Hamiltonian graph. (6)
ii. For which
ii. Forvalues
which n the graph
of values n (hyper-cube
of n Qthe on n vertices)onis nEulerian.
graph Qn (hyper-cube vertices) is
Eulerian.
15 a) A tree T has at least one vertex v of degree 4, and at least one vertex w of (5)
degree 3. Prove that T has at least 5 leaves.
COMPUTER SCIENCE AND ENGINEERING
b) Write Dijkstra’s shortest path algorithm. (9)
Consider the following weighted directed graph G.
Find the shortest path between a and every other vertices in G using
Dijkstra’s shortest path algorithm.
OR
16 a) Define pendent vertices in a binary tree? Prove that the number of pendent (5)
vertices in a binary tree with n vertices is (n+1)/2.
b) (9)
Write Prim’s algorithm for finding minimum spanning tree.
Find a minimum spanning tree in the following weighted graph, using
Prim's algorithm.
Determine the number of minimum spanning trees for the given graph.
COMPUTER SCIENCE AND ENGINEERING
17 a) i. State and prove Euler's Theorem relating the number of faces, edges and (9)
vertices for a planar graph.
ii. If G is a 5-regular simple graph and |V| = 10, prove that G is non-planar.
b) Let G be a connected graph and e an edge of G. Show that e is a cut-edge if (5)
and only if e belongs to every spanning tree.
OR OR
18 a) 18. a) State
State Kuratowski's
Kuratowski's theorem,
theorem, andituse
and use it to show
to show thatgraph
that the the graph G below
G below is notis not
(9)planar.
Draw
planar. G on
Draw the the
G on plane without
plane edges
without crossing.
edges YourYour
crossing. drawing should
drawing use the labelling of
should
thelabelling
use the vertices of
given.
the vertices given. (9)
b) Let G
b) be
LetaGconnected graph graph
be a connected and e and
an edge of G.ofShow
e an edge that that
G. Show e belongs to ato a(5)
e belongs loop if and
loop if only
and only if e belongs
if e belongs to notospanning
no spanning
tree.tree. (5)
19 a) 19.
Define the circuit
a) Define matrix
the circuit B(G)Bof
matrix a connected
(G) graphgraph
of a connected G with n vertices
G with and and
n vertices e (7)
e edges with
edgesanwith an example.
example. Prove Prove that
that the theofrank
rank of is
B(G) B(G) is .e-n+1
e-n+1
b) Give
(7) the definition of the chromatic polynomial PG(k). Directly from the (7)
definition, prove
b) Give the that theofchromatic
definition polynomials
the chromatic of P
polynomial
and
WGn(k) Cn satisfy
. Directly fromthe
the definition,
identity PWnthat
prove (k) =the
k Pchromatic polynomials of Wn and Cn satisfy the identity PWn(k) = k PCn-1
Cn-1 (k – 1).
(k – 1). (7)
OR
OR
20 a) Define the incidence matrix of a graph G with an example. Prove that the (4)
20. a) of
rank Define the incidence
an incidence matrixmatrix
of a connected G with
of a graphgraph an nexample.
with Prove
vertices is n-1. that the rank of an
incidence matrix of a connected graph with n vertices is n-1. (4)
b) (10)
i. A graph G has chromatic polynomial PG(k)
= k4 -4k3 +5k2 -2k. How many vertices
and edges does G have? Is G bipartite? Justify your answers.
COMPUTER SCIENCE AND ENGINEERING
b) i. A graph G has chromatic polynomial PG(k) = k4-4k3+5k2-2k. How
many vertices and edges does G have? Is G bipartite? Justify your
answers.
ii. Find a maximum matching in the graph below and use Hall's theorem
to show that it is indeed maximum.
(10)
****
Assignments
No. of
No Topic
Lectures
2. Incidence and Degree – Isolated vertex, pendent vertex and Null graph 1
4. Isomorphism 1
7. Connected graphs. 1
1. Euler graphs 1
2. Operations on graphs 1
8. Fleury’s algorithm 1
1. Trees – properties 1
2. Trees – properties 1
6. Counting trees 1
8. Prim’s algorithm 1
9. Kruskal’s algorithm 1
3. Fundamental circuits 1
4. Fundamental circuits 1
5. Planar graphs 1
6. Kuratowski’s theorem 1
8. Euler's theorem 1
9. Geometric dual 1
4. Chromatic polynomial 1
5. Matching 1
6. Covering 1
Computer YEAR OF
CATEGORY L T P CREDIT
CST 202 Organization INTRODUCTION
and Architecture PCC 3 1 0 4 2019
Preamble:
The course is prepared with the view of enabling the learners capable of understanding the
fundamental architecture of a digital computer. Study of Computer Organization and
Architecture is essential to understand the hardware behind the code and its execution at
physical level by interacting with existing memory and I/O structure. It helps the learners
to understand the fundamentals about computer system design so that they can extend the
features of computer organization to detect and solve problems occurring in computer
architecture.
Prerequisite : Topics covered under the course Logic System Design (CST 203)
Course Outcomes: After the completion of the course the student will be able to
CO# CO
Recognize and express the relevance of basic components, I/O organization and
CO1
pipelining schemes in a digital computer (Cognitive knowledge: Understand)
Explain the types of memory systems and mapping functions used in memory systems
CO2
(Cognitive Knowledge Level: Understand)
Demonstrate the control signals required for the execution of a given instruction
CO3
(Cognitive Knowledge Level: Apply) )
Illustrate the design of Arithmetic Logic Unit and explain the usage of registers in it
CO4
(Cognitive Knowledge Level: Apply)
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO1
CO2
CO3
CO4
CO5
CO6
Assessment Pattern
Remember 20 20 30
Understand 40 40 30
Apply 40 40 40
Analyze
COMPUTER SCIENCE AND ENGINEERING
Evaluate
Create
Mark Distribution
Attendance : 10 marks
First Internal Examination shall be preferably conducted after completing the first half of the
syllabus and the Second Internal Examination shall be preferably conducted after completing
remaining part of the syllabus.
There will be two parts: Part A and Part B. Part A contains 5 questions (preferably, 2 questions
each from the completed modules and 1 question from the partly covered module), having 3
marks for each question adding up to 15 marks for part A. Students should answer all questions
from Part A. Part B contains 7 questions (preferably, 3 questions each from the completed
modules and 1 question from the partly covered module), each with 7 marks. Out of the 7
questions in Part B, a student should answer any 5.
COMPUTER SCIENCE AND ENGINEERING
There will be two parts; Part A and Part B. Part A contains 10 questions with 2 questions from
each module, having 3 marks for each question. Students should answer all questions. Part B
contains 2 questions from each module of which a student should answer any one. Each question
can have maximum 2 sub-divisions and carries 14 marks.
Syllabus
Module 1
Basic Structure of computers – functional units - basic operational concepts - bus structures.
Memory locations and addresses - memory operations,Instructions and instruction sequencing ,
addressing modes.
Module 2
Register transfer logic: inter register transfer – arithmetic, logic and shift micro operations.
Processor logic design: - processor organization – Arithmetic logic unit - design of
arithmetic circuit - design of logic circuit - Design of arithmetic logic unit - status register –
design of shifter - processor unit – design of accumulator.
Module 3
Arithmetic algorithms: Algorithms for multiplication and division (restoring method) of binary
numbers. Array multiplier , Booth’s multiplication algorithm.
Pipelining: Basic principles, classification of pipeline processors, instruction and arithmetic
pipelines (Design examples not required), hazard detection and resolution.
Module 4
Control Logic Design: Control organization – Hard_wired control-microprogram control –
control of processor unit - Microprogram sequencer,micro programmed CPU organization -
horizontal and vertical micro instructions.
Module 5
I/O organization: accessing of I/O devices – interrupts, interrupt hardware -Direct memory
access.
COMPUTER SCIENCE AND ENGINEERING
Text Books
1. Hamacher C., Z. Vranesic and S. Zaky, Computer Organization ,5/e, McGraw Hill, 2011
3. KaiHwang, Faye Alye Briggs, Computer architecture and parallel processing McGraw-
Hill, 1984
Reference Books
1. Mano M. M., Digital Logic & Computer Design, 3/e, Pearson Education, 2013.
2. Patterson D.A. and J. L. Hennessy, Computer Organization and Design, 5/e, Morgan
Kaufmann Publishers, 2013.
4. Chaudhuri P., Computer Organization and Design, 2/e, Prentice Hall, 2008.
Course Outcome 2(CO2): Explain the steps taken by the system to handle a write miss
condition inside the cache memory.
Course Outcome 3(CO3): Generate the sequence of control signals required for the
execution of the instruction MOV [R1],R2 in a threebus organization.
Course Outcome 4(CO4): Design a 4-bit combinational logic shifter with 2 control
signals H0 and H1 that perform the following operations :
COMPUTER SCIENCE AND ENGINEERING
H1 H0 Operation
0 1 No shift operation
1 0 Shift left
1 1 Shift right
Course Outcome 5(CO5): Explain the restoring algorithm for binary division. Also
trace the algorithm to divide (1001)2 by (11)2
QP CODE: PAGES:2
Reg No:_______________
Name:_________________
PART A
2. Distinguish between big endian and little endian notations. Also give the significance of
these notations.
Part B
Answer any one Question from each module. Each question carries 14 Marks
COMPUTER SCIENCE AND ENGINEERING
11.
(4)
11.(b) Write the control sequence for the instruction DIV R1,[R2] in a three bus structure.
(10)
OR
12. Explain the concept of a single bus organization with help of a diagram. Write the control
sequence for the instruction ADD [R1],[R2].
(14)
(14)
OR
14.
14.(a) Design a 4 bit combinational logic shifter with 2 control signals H1 and H2 that
perform the following operations (bit values given in parenthesis are the values of
control variable H1 and H2 respectively.) : Transfer of 0’s to S (00), shift right (01),
shift left (10), no shift (11).
(5)
14.(b) Design an ALU unit which will perform arithmetic and logic operation with a given
binary adder.
(9)
15.
15.(a) Give the logic used behind Booth’s multiplication algorithm.
(4)
15.(b) Identify the appropriate algorithm available inside the system to perform the
multiplication between -14 and -9. Also trace the algorithm for the above input.
(10)
OR
16.
16.(a) List and explain the different pipeline hazards and their possible solutions
(10)
COMPUTER SCIENCE AND ENGINEERING
(14)
OR
18. Give the structure of the micro program sequencer and its role in sequencing the micro
instructions.
(14)
19.
19.(a) Explain the different ways in which interrupt priority schemes can be implemented
(10)
(4)
OR
20.
TEACHING PLAN
No of
No Contents Lecture
Hrs
Module 1 : (Basic Structure of computers) (9 hours)
Functional units,basic operational concepts,bus structures
1.1 1
(introduction)
1.2 Memory locations and addresses , memory operations 1
Module 2 :(Register transfer logic and Processor logic design) (10 hours)
YEAR OF
CST Database Management CATEGORY L T P CREDIT
INTRODUCTION
204 Systems
PCC 3 1 0 4 2019
Prerequisite: Topics covered under the course Data Structures (CST 201), Exposure to a High
Level Language like C/python.
Course Outcomes: After the completion of the course the student will be able to
Model and design solutions for efficiently representing and querying data using
CO3
relational model (Cognitive Knowledge Level: Analyze)
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO1
CO2
CO3
CO4
CO5
CO6
Assessment Pattern
Analyze
Evaluate
Create
Mark Distribution
Attendance : 10 marks
First Internal Examination shall be preferably conducted after completing the first half of the
syllabus and the Second Internal Examination shall be preferably conducted after completing
remaining part of the syllabus.
There will be two parts: Part A and Part B. Part A contains 5 questions (preferably, 2 questions
each from the completed modules and 1 question from the partly covered module), having 3
marks for each question adding up to 15 marks for part A. Students should answer all questions
from Part A. Part B contains 7 questions (preferably, 3 questions each from the completed
modules and 1 question from the partly covered module), each with 7 marks. Out of the 7
questions in Part B, a student should answer any 5.
COMPUTER SCIENCE AND ENGINEERING
There will be two parts; Part A and Part B. Part A contains 10 questions with 2 questions from
each module, having 3 marks for each question. Students should answer all questions. Part B
contains 2 questions from each module of which a student should answer any one. Each question
can have maximum 2 sub-divisions and carries 14 marks.
Syllabus
ER model - Basic concepts, entity set & attributes, notations, Relationships and constraints,
cardinality, participation, notations, weak entities, relationships of degree 3.
Introduction to Relational Algebra - select, project, cartesian product operations, join - Equi-join,
natural join. query examples, introduction to Structured Query Language (SQL), Data Definition
Language (DDL), Table definitions and operations – CREATE, DROP, ALTER, INSERT,
DELETE, UPDATE.
SQL DML (Data Manipulation Language) - SQL queries on single and multiple tables, Nested
queries (correlated and non-correlated), Aggregation and grouping, Views, assertions, Triggers,
SQL data types.
Physical Data Organization - Review of terms: physical and logical records, blocking factor,
pinned and unpinned organization. Heap files, Indexing, Singe level indices, numerical examples,
Multi-level-indices, numerical examples, B-Trees & B+-Trees (structure only, algorithms not
required), Extendible Hashing, Indexing on multiple keys – grid files.
COMPUTER SCIENCE AND ENGINEERING
Module 4: Normalization
Different anomalies in designing a database, The idea of normalization, Functional dependency,
Armstrong’s Axioms (proofs not required), Closures and their computation, Equivalence of
Functional Dependencies (FD), Minimal Cover (proofs not required). First Normal Form (1NF),
Second Normal Form (2NF), Third Normal Form (3NF), Boyce Codd Normal Form (BCNF),
Lossless join and dependency preserving decomposition, Algorithms for checking Lossless Join
(LJ) and Dependency Preserving (DP) properties.
Text Books
2. Sliberschatz A., H. F. Korth and S. Sudarshan, Database System Concepts, 6/e, McGraw
Hill, 2011.
Reference Books:
1. Adam Fowler, NoSQL for Dummies, John Wiley & Sons, 2015
2. NoSQL Data Models: Trends and Challenges (Computer Engineering: Databases and Big
Data), Wiley, 2018
3. Web Resource: https://www.w3resource.com/redis/
4. web Resource: https://www.w3schools.in/category/mongodb/
5. Web Resource: https://www.tutorialspoint.com/cassandra/cassandra_introduction.htm
6. Web Resource : https://www.tutorialspoint.com/arangodb/index.htm
COMPUTER SCIENCE AND ENGINEERING
1. For the SQL query, SELECT A, B FROM R WHERE B=’apple’ AND C = ‘orange’ on the
table R(A, B, C, D), where A is a key, write any three equivalent relational algebra
expressions.
2. Given the FDs P→Q, P→R, QR→S, Q→T, QR→U, PR→U, write the sequence of
Armstrong’s Axioms needed to arrive at the following FDs: (a) P → T (b) PR → S (c)
QR → SU
3. Consider a relation PLAYER (PLAYER-NO, PLAYER-NAME, PLAYER-POSN,
TEAM, TEAM-COLOR, COACH-NO, COACH-NAME, TEAM-CAPTAIN). Assume
that PLAYER-NO is the only key of the relation and that the following dependencies
hold:
TEAM→{TEAM-COLOR, COACH-NO, TEAM-CAPTAIN}
COACH-NO→COACH-NAME.
i. Is the relation in 2NF? If not, decompose to 2NF.
ii. Is the relation in 3NF? If not, decompose to 3NF.
COMPUTER SCIENCE AND ENGINEERING
4. In the following tables foreign keys have the same name as primary keys except
DIRECTED-BY, which refers to the primary key ARTIST-ID. Consider only single-
director movies.
MOVIES(MOVIE-ID, MNAME, GENRE, LENGTH, DIRECTED-BY)
ARTIST(ARTIST-ID, ANAME)
ACTING(ARTIST-ID, MOVIE-ID)
Write SQL expressions for the following queries:
(a) Name(s) and director name(s) of movie(s) acted by ‘Jenny’.
(b) Names of actors who have never acted with ‘Rony’
(c) Count of movies genre-wise.
(d) Name(s) of movies with maximum length.
PART B
COMPUTER SCIENCE AND ENGINEERING
Answer any one Question from each module. Each question carries 14 Marks
11 a. Design an ER diagram for the following scenario: There is a set of teams, each (14)
team has an ID (unique identifier), name, main stadium, and to which city this
team belongs. Each team has many players, and each player belongs to one
team. Each player has a number (unique identifier), name, DoB, start year, and
shirt number that he uses. Teams play matches, in each match there is a host
team and a guest team. The match takes place in the stadium of the host team.
For each match we need to keep track of the following: The date on which the
game is played The final result of the match. The players participated in the
match. For each player, how many goals he scored, whether or not he took
yellow card, and whether or not he took red card. During the match, one player
may substitute another player. We want to capture this substitution and the time
at which it took place. Each match has exactly three referees. For each referee
we have an ID (unique identifier), name, DoB, years of experience. One referee
is the main referee and the other two are assistant referee.
OR
12 a. Interpret the the following ER diagram.
(8)
"
b. Distinguish between physical data independence and logical data independence (6)
with suitable examples.
COMPUTER SCIENCE AND ENGINEERING
OR
14 a.Write SQL DDL statements for the the following (Assume suitable domain (10)
types):
i. Create the tables STUDENT(ROLLNO, NAME, CLASS, SEM,
ADVISER), FACULTY(FID, NAME, SALARY, DEPT). Assume that
ADVISER is a foreign key referring FACUTY table.
ii. Delete department with name ‘CS’ and all employees of the
department.
iii. Increment salary of every faculty by 10%.
b.Illustrate foreign key constraint with a typical example. (4)
COMPUTER SCIENCE AND ENGINEERING
15 For the relation schema below, give an expression in SQL for each of the queries (14)
that follows:
a) Find the names, street address, and cities of residence for all employees
who work for the Company ‘RIL Inc.' and earn more than $10,000.
b) Find the names of all employees who live in the same cities as the
companies for which they work.
c) Find the names of all employees who do not work for ‘KYS Inc.’. Assume
that all people work for exactly one company.
d) Find the names of all employees who earn more than every employee of
‘SB Corporation'. Assume that all people work for at most one company.
e) List out number of employees company-wise in the decreasing order of
number of employees.
OR
16 a. Consider an EMPLOYEE file with 10000 records where each record is of (9)
size 80 bytes. The file is sorted on employee number (15 bytes long), which
is the primary key. Assuming un-spanned organization and block size of
512 bytes compute the number of block accesses needed for selecting
records based on employee number if,
i. No index is used
ii. Single level primary index is used
iii. Multi-level primary index is used
Assume a block pointer size of 6 bytes.
b. Illustrate correlated and non-correlated nested queries with real examples. (5)
Teaching Plan
Hours
Course Name
(48)
Module 1: Introduction & ER Model 8
Concept & Overview of DBMS, Characteristics of DB system,
1.1 1
Database Users.
Structured, semi-structured and unstructured data. Data Models and
1.2 1
Schema
Hours
Course Name
(48)
3.4 Views, assertions (with examples) 1
3.5 Triggers (with examples), SQL data types 1
Review of terms: physical and logical records, blocking factor,
3.6 1
pinned and unpinned organization. Heap files, Indexing
3.7 Singe level indices, numerical examples 1
Hours
Course Name
(48)
5.4 Desirable Properties of transactions, Serial schedules 1
5.5 Concurrent and Serializable Schedules 1
5.6 Conflict equivalence and conflict serializability 1
5.7 Recoverable and cascade-less schedules 1
Prerequisite: Topics covered in the courses are Data Structures (CST 201) and Programming
in C (EST 102)
Course Outcomes: After the completion of the course the student will be able to
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO1
CO2
CO3
CO4
CO5
CO6
Assessment Pattern
Understand 30 30 30
Apply 40 40 40
Analyse
Evaluate
Create
COMPUTER SCIENCE AND ENGINEERING
Mark Distribution
Each of the two internal examinations has to be conducted out of 50 marks. First series test shall
be preferably conducted after completing the first half of the syllabus and the second series test
shall be preferably conducted after completing remaining part of the syllabus. There will be two
parts: Part A and Part B. Part A contains 5 questions (preferably, 2 questions each from the
completed modules and 1 question from the partly completed module), having 3 marks for each
question adding up to 15 marks for part A. Students should answer all questions from Part A.
Part B contains 7 questions (preferably, 3 questions each from the completed modules and 1
question from the partly completed module), each with 7 marks. Out of the 7 questions, a student
should answer any 5.
Syllabus
Module I
Module II
Processes - Process states, Process control block, threads, scheduling, Operations on processes -
process creation and termination – Inter-process communication - shared memory systems,
Message passing systems.
Process Scheduling – Basic concepts- Scheduling COMPUTER SCIENCE
criteria -scheduling AND ENGINEERING
algorithms- First come
First Served, Shortest Job Firs, Priority scheduling, Round robin scheduling
Module III
Module IV
Module V
File System: File concept - Attributes, Operations, types, structure – Access methods, Protection.
File-system implementation, Directory implementation. Allocation methods.
Storage Management: Magnetic disks, Solid-state disks, Disk Structure, Disk scheduling,
Disk formatting.
Text Book
Abraham Silberschatz, Peter Baer Galvin, Greg Gagne, ' Operating System Concepts' 9th
Edition, Wiley India 2015.
Reference Books:
1. Andrew S Tanenbaum, “Modern Operating Systems” , 4th Edition, Prentice Hall, 2015.
2. William Stallings, “Operating systems”, 6th Edition, Pearson, Global Edition, 2015.
3. Garry Nutt, Nabendu Chaki, Sarmistha Neogy, “Operating Systems”, 3rd Edition, Pearson
Education.
4. D.M.Dhamdhere, “Operating Systems”, 2nd Edition, Tata McGraw Hill, 2011.
5. Sibsankar Haldar, Alex A Aravind, “Operating Systems”, Pearson Education.
Sample Course Level Assessment Questions COMPUTER SCIENCE AND ENGINEERING
Course Outcome1 (CO1): What is the main advantage of the micro kernel approach to system
design? How do user program and system program interact in a microkernel architecture?
Course Outcome 2 (CO2): Define process. With the help of a neat diagram explain different
states of process.
Course Outcome 3 (CO3): What do you mean by binary semaphore and counting semaphore?
With C, explain implementation of wait () and signal().
Course Outcome 4 (CO4): Describe resource allocation graph for the following. a) with a
deadlock b) with a cycle but no deadlock.
Course Outcome 6 (CO6): Explain the different file allocation methods with advantages and
disadvantages.
Reg No:_______________
Name:_________________
PART-A
1. How does hardware find the Operating System kernel after system switch-on?
6. What is critical section? What requirement should be satisfied by a solution to the critical
section problem?
a) frame=2 b)frame=3
10. Define the terms (i) Disk bandwidth (ii) Seek time.
11. a) Explain the following structures of operating system (i) Monolithic systems
(ii) Layered Systems (iii) Micro Kernel (iv) Modular approach. (12)
b) Under what circumstances would a user be better of using a time sharing system than a
PC or a single user workstation? (2)
OR
12. a) What is the main advantage of the micro kernel approach to system design? How do user
program and system program interact in a microkernel architecture? (8)
b) Describe the differences between symmetric and asymmetric multiprocessing? What are
the advantages and disadvantages of multiprocessor systems? (6)
13. a) Define process. With the help of a neat diagram explain different states of process. (8)
b) Explain how a new process can be created in Unix using fork system call. (6)
OR
14 a) Find the average waiting time and average turnaround time for the processes given in the
table below using:- i) SRT scheduling algorithm ii) Priority scheduling algorithm (9)
Process Arrival Time (ms)COMPUTER SCIENCE
CPU Burst Time (ms) AND ENGINEERING
Priority
P1 0 5 3
P2 2 4 1
P3 3 1 2
P4 5 2 4
b) What is a Process Control Block? Explain the fields used in a Process Control Block. (5)
15. Consider a system with five processes P0 through P4 and three resources of type A, B, C.
Resource type A has 10 instances, B has 5 instances and C has 7 instances. Suppose at time
t0 following snapshot of the system has been taken:
i) What will be the content of the Need matrix? Is the system in a safe state? If Yes, then what is
the safe sequence? (8)
iii)What will happen if process P1 requests one additional instance of resource type A and two
instances of resource type C? (6)
OR
16. a) State dining philosopher’s problem and give a solution using semaphores. (7)
b) What do you mean by binary semaphore and counting semaphore? With C struct, explain
implementation of wait () and signal() (7)
COMPUTER
17. a) Consider the following page reference string SCIENCE
1, 2, 3, 4, 2, 1, 5, 6, 2, 1, 2,AND
3, 7, 6,ENGINEERING
3, 2, 1, 2,
3, 6. Find out the number of page faults if there are 4 page frames, using the following
page replacement algorithms i) LRU ii) FIFO iii) Optimal (9)
OR
18. a) With a diagram, explain how paging is done with TLB. (5)
b) Memory partitions of sizes 100 kb, 500 kb, 200 kb, 300 kb, 600 kb are available, how
would best ,worst and first fit algorithms place processes of size 212 kb, 417 kb, 112 kb,
426 kb in order. Rank the algorithms in terms of how efficiently they uses memory. (9)
19. a) Suppose that a disk drive has 5000 cylinders, numbered 0 to 4999. the drive currently
services a request at cylinder 143, and the previous request was at cylinder 125. the queue
of pending request in FIFO order is 86, 1470, 913, 1774, 948, 1509, 1022, 1750, 130.
Starting from the current position, what is the total distance (in cylinders) that the disk arm
moves to satisfy all pending requests for each of the following algorithms
OR
20. a) Explain the different file allocation operations with advantages and disadvantages. (8)
b) Explain the following i) file types ii) file operation iii) file attributes (6)
Teaching Plan
3.4 Semaphores 1
3.5 Monitors 1
4.2 Swapping 1
4.3 Contiguous memory allocation, fixed and variable partitions 1
4.4 Segmentation. 1
4.5 Paging (Lecture 1) 1
5.3 Protection 1
5.4 File-System implementation 1
Preamble: This course helps the learners to get familiarized with (i) Digital Logic Design
through the implementation of Logic Circuits using ICs of basic logic gates & flip-
flops and (ii) Hardware Description Language based Digital Design. This course helps the
learners to design and implement hardware systems in areas such as games, music, digital
filters, wireless communications and graphical displays.
Prerequisite:Topics covered under the course Logic System Design (CST 203)
Course Outcomes: After the completion of the course the student will be able to
Design and implement combinational logic circuits using Logic Gates (Cognitive
CO 1
Knowledge Level: Apply)
CO 1
CO 2
CO 3
CO 4
COMPUTER SCIENCE AND ENGINEERING
Assessment Pattern
Continuous Assessment
End Semester
Bloom’s Category Test (Internal Exam)
Examination (Percentage)
(Percentage)
Remember 20 20
Understand 20 20
Apply 60 60
Analyse
Evaluate
Create
Mark Distribution
150 75 75 3 hours
Attendance : 15 marks
Viva-voce : 15 marks
SYLLABUS
• A 2 hour session should be spent to make the students comfortable with the use of
trainer kit/breadboard and ICs.
• The following experiments can be conducted on breadboard or trainer kits.
• Out of the 15 experiments listed below, a minimum of 8 experiments should be
completed by a student, including the mandatory experiments (5).
1. Realization of functions using basic and universal gates (SOP and POS forms).
2. Design and realization of half adder, full adder, half subtractor and full subtractor using:
a) basic gates (b) universal gates. *
3. Code converters: Design and implement BCD to Excess 3 and Binary to Gray code
converters.
4. Design and implement 4 bit adder/subtractor circuit and BCD adder using IC7483.
5. Implementation of Flip Flops: SR, D, T, JK and Master Slave JK Flip Flops using basic
gates.*
6. Asynchronous Counter: Design and implement 3 bit up/down counter.
7. Asynchronous Counter: Realization of Mod N counters (At least one up counter and one
down counter to be implemented). *
8. Synchronous Counter: Realization of 4-bit up/down counter.
9. Synchronous Counter: Realization of Mod-N counters and sequence generators. (At least
one mod N counter and one sequence generator to be implemented) *
10. Realization of Shift Register (Serial input left/right shift register), Ring counter and
Johnson Counter using flipflops. *
11. Realization of counters using IC’s (7490, 7492, 7493).
12. Design and implement BCD to Seven Segment Decoder.
13. Realization of Multiplexers and De-multiplexers using gates.
14. Realization of combinational circuits using MUX & DEMUX ICs (74150, 74154).
15. To design and set up a 2-bit magnitude comparator using basic gates.
COMPUTER SCIENCE AND ENGINEERING
PART B (Any 4 Experiments)
• The following experiments aim at training the students in digital circuit design with
Verilog. The experiments will lay a foundation for digital design with Hardware
Description Languages.
• A 3 hour introductory session shall be spent to make the students aware of the
fundamentals of development using Verilog
• Out of the 8 experiments listed below, a minimum of 4 experiments should be
completed by a student
Experiment 1. Realization of Logic Gates and Familiarization of Verilog
(a) Familiarization of the basic syntax of Verilog
(b) Development of Verilog modules for basic gates and to verify truth tables.
(c) Design and simulate the HDL code to realize three and four variable Boolean
functions
Experiment 5: Adder/Subtractor
(a) Write the Verilog modules for a 4-bit adder/subtractor
(b) Development of Verilog modules for a BCD adder
Experiment 8: Counters
(a) Development of Verilog modules for an asynchronous decade counter.
(b) Development of Verilog modules for a 3 bit synchronous up-down counter.
COMPUTER SCIENCE AND ENGINEERING
Practice Questions
PART A
1. Design a two bit parallel adder using gates and implement it using ICs of basic gates
2. A combinatorial circuit has 4 inputs and one output. The output is equal to 1 when (a)
all inputs are 1, (b) none of the inputs are 1, (c) an odd number of inputs are equal to
1. Obtain the truth table and output function for this circuit and implement the same.
3. Design and implement a parallel subtractor.
4. Design and implement a digital circuit that converts Gray code to Binary.
5. Design a combinational logic circuit that will output the 1’s compliment of a 4-bit
input number.
∑
6. Implement and test the logic function f! (A, B, C ) = m(0,1,3,6) using an 8:1 MUX
IC
7. Design a circuit that will work as a ring counter or a Johnson counter based on a mode
bit, M.
8. Design a 4-bit synchronous down counter.
9. Design a Counter to generate the binary sequence 0,1,3,7,6,4
10. Design an asynchronous mod 10 down counter
11. Design and implement a synchronous counter using JK flip flop ICs to generate the
sequence: 0 - 1 -3 - 5 - 7 - 0.
PART B
1. Develop Verilog modules for a full subtractor in structural modeling using half
subtractors.
2. Design a 4 bit parallel adder using Verilog.
3. Develop Verilog modules for a 4 bit synchronous down counter.
4. Write Verilog code for implementing a 8:1 multiplexer.
5. Develop Verilog modules for a circuit that converts Excess 3 code to binary.
6. Write the Verilog code for a JK Flip flop, and its test-bench. Use all possible
combinations of inputs to test its working
7. Write the hardware description in Verilog of a 8-bit register with shift left and shift
right modes of operations and test its functioning.
8. Write the hardware description in Verilog of a mod-N (N > 9) counter and test it.
COMPUTER SCIENCE AND ENGINEERING
YEAR OF
OPERATING CATEGORY L T P CREDIT
CSL204 INTRODUCTION
SYSTEMS LAB
PCC 0 0 3 2 2019
Preamble: The course aims to offer students a hands-on experience on Operating System
concepts using a constructivist approach and problem-oriented learning. Operating systems are
the fundamental part of every computing device to run any type of software.
Prerequisite: Topics covered in the courses are Data Structures (CST 201) and Programming
in C (EST 102)
Course Outcomes:
Illustrate the performance of First In First Out, Least Recently Used and Least
CO4
Frequently Used Page Replacement Algorithms. (Cognitive knowledge: Apply)
Implement modules for Deadlock Detection and Deadlock Avoidance in Operating
CO5
Systems. (Cognitive knowledge: Apply)
Implement modules for Storage Management and Disk Scheduling in Operating
CO6
Systems. (Cognitive knowledge: Apply)
COMPUTER SCIENCE AND ENGINEERING
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO1
CO2
CO3
CO4
CO5
CO6
Assessment Pattern:
Evaluate
Create
COMPUTER SCIENCE AND ENGINEERING
Mark Distribution
ESE
Total Marks CIE Marks ESE Duration
Marks
150 75 75 3 hours
Attendance : 15 marks
All Students attending the Operating System Lab should have a Fair Record. The fair record
should be produced in the University Lab Examination. Every experiment conducted in the
lab should be noted in the fair record. For every experiment in the fair record, the right hand
page should contain Experiment Heading, Experiment Number, Date of experiment, Aim of
the Experiment and the operations performed on them, Details of experiment including
algorithm and result of Experiment. The left hand page should contain a print out of the code
used for experiment and sample output obtained for a set of input.
COMPUTER SCIENCE AND ENGINEERING
SYLLABUS
OPERATING SYSTEMS LAB
* mandatory
4. Given the list of processes, their CPU burst times and arrival times, display/print the
Gantt chart for FCFS and SJF. For each of the scheduling policies, compute and print the
average waiting time and average turnaround time
5. Write a C program to simulate following non-preemptive CPU scheduling algorithms to
find turnaround time and waiting time.
a)FCFS b) SJF c) Round Robin (pre-emptive) d) Priority
6. Write a C program to simulate following contiguous memory allocation techniques
a) Worst-fit b) Best-fit c) First-fit
7. Write a C program to simulate paging technique of memory management.
8. Write a C program to simulate Bankers algorithm for the purpose of deadlock avoidance.
9. Write a C program to simulate disk scheduling algorithms a) FCFS b) SCAN c) C-SCAN
10. Write a C program to simulate page replacement algorithms a) FIFO b) LRU c) LFU
11. Write a C program to simulate producer-consumer problem using semaphores.
12. Write a program for file manipulation for display a file and directory in memory.
13. Write a program to simulate algorithm for deadlock prevention.
14. Write a C program to simulate following file allocation strategies.
a)Sequential b) Indexed c) Linked
COMPUTER SCIENCE AND ENGINEERING
SEMESTER -4
MINOR
COMPUTER SCIENCE AND ENGINEERING
Preamble: This is the second course for awarding B.Tech Minor in Computer Science and
Engineering with specialization in Software Engineering. The course provides the learners a
clear understanding of the main constructs of contemporary programming languages and the
various systems of ideas that have been used to guide the design of programming languages.
This course covers the concepts of Names, Bindings & Scope, Statement-Level Control
Structures, Sub Programs, support for Object Oriented Programming, Exception Handling, Event
Handling, Concurrency Control, Functional Programming and Logic Programming. This course
helps the learners to equip with the knowledge necessary for the critical evaluation of existing
and upcoming programming languages. It also enables the learner to choose the most appropriate
language for a given programming task, apply that language's approach to structure or organize
the code and classify programming languages based on their features.
Prerequisite:
Course Outcomes: After the completion of the course the student will be able to
Explain the criteria for evaluating programming languages and compare Imperative,
CO1 Functional and Logic programming languages (Cognitive Knowledge Level:
Understand)
Explain the characteristics of data types and variables (Cognitive Knowledge Level:
CO2
Understand)
Illustrate how control flow structures and subprograms help in developing the
CO3 structure of a program to solve a computational problem (Cognitive Knowledge Level:
Apply)
Explain the characteristics of Object Oriented Programming Languages (Cognitive
CO4
Knowledge Level: Understand)
Compare concurrency constructs in different programming languages (Cognitive
CO5
Knowledge Level: Understand)
1
COMPUTER SCIENCE AND ENGINEERING
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO1
CO2
CO3
CO4
CO5
Assessment Pattern
Remember 30 30 30
Understand 50 50 50
Apply 20 20 20
Analyze
Evaluate
Create
2
COMPUTER SCIENCE AND ENGINEERING
Mark Distribution
Attendance : 10 marks
Continuous Assessment Test : 25 marks
Continuous Assessment Assignment : 15 marks
Each of the two internal examinations has to be conducted out of 50 marks. First series test shall
be preferably conducted after completing the first half of the syllabus and the second series test
shall be preferably conducted after completing remaining part of the syllabus. There will be two
parts: Part A and Part B. Part A contains 5 questions (preferably, 2 questions each from the
completed modules and 1 question from the partly completed module), having 3 marks for each
question adding up to 15 marks for part A. Students should answer all questions from Part A.
Part B contains 7 questions (preferably, 3 questions each from the completed modules and 1
question from the partly completed module), each with 7 marks. Out of the 7 questions, a student
should answer any 5.
There will be two parts; Part A and Part B. Part A contains 10 questions with 2 questions from
each module, having 3 marks for each question. Students should answer all questions. Part B
contains 2 questions from each module of which a student should answer any one. Each question
can have maximum 2 sub-divisions and carries 14 marks.
3
COMPUTER SCIENCE AND ENGINEERING
SYLLABUS
Module 1
Data Types – Primitive Data Types, Character String Types, User-Defined Ordinal Types, Array
Types, Record Types, List Types, Pointer & Reference Types, Type Checking, Strong Typing,
Type Equivalence. Expressions – Arithmetic Expressions, Overloaded Operators, Type
Conversions, Relational and Boolean Expressions, Short-Circuit Evaluation. Assignment -
Assignment Statements, Mixed-mode Assignment.
Module 3
Module 4
Support for Object Oriented Programming – Inheritance, Dynamic Binding, Design Issues for Object
Oriented Languages, Support for Object Oriented Programming in C++, Implementation of Object-
Oriented Constructs. Exception Handling – Basic Concepts, Design Issues. Event Handling - Introduction
to Event Handling.
Module 5
Text Books
2. Scott M. L., Programming Language Pragmatics, 3rd Edn., Morgan Kaufmann Publishers.
4
COMPUTER SCIENCE AND ENGINEERING
Reference Books:
1. Kenneth C. Louden, Programming Languages: Principles and Practice, 2nd Edn., Cengage
Learning.
3. Ravi Sethi, Programming Languages: Concepts & Constructs, 2nd Edn., Pearson
Education.
Course Outcome 1 (CO1): Compare any three programming languages based on the language
evaluation criteria. Prepare a list of characteristics that affect the language evaluation criteria.
Identify the advantages and disadvantages of imperative, functional and logic programming
languages.
Course Outcome 2 (CO2): Two most important design issues that are specific to character
string types are (1) whether a string is simply a special kind of character array or a primitive type
(2) whether strings have static or dynamic length. Justify your answer.
Course Outcome 3 (CO3):
1. Describe three situations where a combined counting and logical looping statement is
needed.
2. Describe the ways that aliases can occur with pass-by-reference parameters.
3. Identify the two fundamental design considerations for parameter-passing methods.
Course Outcome 4 (CO4):
1. Describe the role of a virtual method table in implementing dynamic method binding.
2. Identify one disadvantage of inheritance.
Course Outcome 5 (CO5): Evaluate the use of semaphores and monitors for providing
competition synchronization and cooperation synchronization.
5
COMPUTER SCIENCE AND ENGINEERING
QP CODE: PAGES:3
PART A
Part B
Answer any one Question from each module. Each question carries 14 Marks
11.
(a) Explain different criteria used for evaluating languages.
(7 marks)
(b) Explain the major methods of implementing programming languages.
(7 marks)
OR
12.
(a) Explain the meanings, purposes, advantages and disadvantages of four categories of
scalar variables according to their storage bindings.
(7 marks)
6
COMPUTER SCIENCE AND ENGINEERING
program example;
var a, b : integer;
procedure sub1;
var x, y: integer;
begin { sub1 }
……….. (1)
end { sub1 }
procedure sub2;
var x : integer;
……..
procedure sub3;
var x: integer;
begin { sub3 }
……….. (2)
end { sub3 }
begin { sub2 }
……….. (3)
end { sub2}
begin {example}
……….. (4)
end {example } (7 Marks)
13.
(a) Explain any two problems associated with the pointer data types and also indicate
how dangling pointer problem can be solved.
(7 marks)
(b) Describe the lazy and eager approaches for reclaiming garbage.
(7 marks)
OR
14.
(a) What is meant by side effect and illustrate the advantages of referential
transparency?
(8 marks)
(b) Explain the terms: compound assignment operator, coercion and short circuit
evaluation. (6 marks)
7
COMPUTER SCIENCE AND ENGINEERING
15.
(a) Explain different categories of iteration control statements.
(8 marks)
(b) Explain techniques used for identifying correct referencing environment for a
subprogram that was sent as a parameter.
(6 marks)
OR
16.
(a) Describe the implementation models of Parameter passing.
(10 Marks)
(b) Differentiate coroutines from conventional subprograms.
(4 marks)
17.
(a) What is an exception handler? Explain how exceptions are handled in object
oriented language?
(7 Marks)
(b) What are the design issues in object oriented languages? (7 Marks)
OR
8
COMPUTER SCIENCE AND ENGINEERING
Teaching Plan
2.3 Record Types, List Types, Pointer and Reference Types 1 Hour
9
COMPUTER SCIENCE AND ENGINEERING
10
COMPUTER SCIENCE AND ENGINEERING
11
COMPUTER SCIENCE AND ENGINEERING
CODE MATHEMATICS FOR CATEGORY L T P CREDIT
CST284 MACHINE LEARNING VAC 3 1 0 4
Preamble: This is the foundational course for awarding B. Tech. Honours in Computer
Science and Engineering with specialization in Machine Learning. The purpose of this
course is to introduce mathematical foundations of basic Machine Learning concepts among
learners, on which Machine Learning systems are built. This course covers Linear
Algebra, Vector Calculus, Probability and Distributions, Optimization and Machine Learning
problems. Concepts in this course help the learners to understand the mathematical principles
in Machine Learning and aid in the creation of new Machine Learning solutions, understand
& debug existing ones, and learn about the inherent assumptions & limitations of the current
methodologies.
Course Outcomes: After the completion of the course the student will be able to
Make use of the concepts, rules and results about linear equations, matrix algebra,
CO 1 vector spaces, eigenvalues & eigenvectors and orthogonality & diagonalization to
solve computational problems (Cognitive Knowledge Level: Apply)
Perform calculus operations on functions of several variables and matrices,
CO 2 including partial derivatives and gradients (Cognitive Knowledge Level: Apply)
Utilize the concepts, rules and results about probability, random variables, additive
& multiplicative rules, conditional probability, probability distributions and Bayes’
CO 3
theorem to find solutions of computational problems (Cognitive Knowledge Level:
Apply)
Train Machine Learning Models using unconstrained and constrained optimization
CO 4 methods (Cognitive Knowledge Level: Apply)
PO PO PO PO 4 PO 5 PO PO 7 PO 8 PO 9 PO PO 11 PO
1 2 3 6 10 12
CO 1 √ √ √ √ √
CO 2 √ √ √ √
CO 3 √ √ √ √ √
CO 4 √ √ √ √ √ √
COMPUTER SCIENCE AND ENGINEERING
Assessment Pattern
Analyse
Evaluate
Create
Mark Distribution
Attendance : 10 marks
Continuous Assessment Tests : 25 marks
Continuous Assessment Assignment : 15 marks
COMPUTER SCIENCE AND ENGINEERING
First Internal Examination shall be preferably conducted after completing the first half of the
syllabus and the Second Internal Examination shall be preferably conducted after completing
remaining part of the syllabus.
There will be two parts: Part A and Part B. Part A contains 5 questions (preferably, 2
questions each from the completed modules and 1 question from the partly covered module),
having 3 marks for each question adding up to 15 marks for part A. Students should answer
all questions from Part A. Part B contains 7 questions (preferably, 3 questions each from the
completed modules and 1 question from the partly covered module), each with 7 marks. Out
of the 7 questions in Part B, a student should answer any 5.
End Semester Examination Pattern: There will be two parts; Part A and Part B. Part A
contains 10 questions with 2 questions from each module, having 3 marks for each question.
Students should answer all questions. Part B contains 2 questions from each module of which
student should answer anyone. Each question can have maximum 2 sub-divisions and carries
14 marks.
COMPUTER SCIENCE AND ENGINEERING
Syllabus
Module 1
Module 2
Module 3
Module 4
Module 5
Text book:
1.Mathematics for Machine Learning by Marc Peter Deisenroth, A. Aldo Faisal, and
Cheng Soon Ong published by Cambridge University Press (freely available at https://
mml - book.github.io)
COMPUTER SCIENCE AND ENGINEERING
Reference books:
1. For a scalar function f(x, y, z ) = x2 +3y2 +2z2, find the gradient and its magnitude at
the point (1, 2, -1).
2. Find the maximum and minimum values of the function f(x,y)=4x+4y-x2-y2
subject to the condition x2 + y2 <= 2.
3. Suppose you were trying to minimize f(x, y) = x2+ 2y + 2y2. Along what vector
should you travel from (5,12)?
4. Find the second order Taylor series expansion for f(x, y) = (x + y)2about (0 ,0).
5. Find the critical points of f(x, y) = x2 –3xy+5x-2y+6y2+8.
6. Compute the gradient of the Rectified Linear Unit (ReLU) function ReLU(z) =
max(0 , z).
7. Let L = ||Ax - b||22, where A is a matrix and x and b are vectors. Derive dL in terms of
dx.
Course Outcome 3 (CO3):
i. Find P(J∩T)
3 1 1
Find the angle between the vectors 𝑥𝑥 = � �and 𝑦𝑦 = � �.
1 2
4 Find the eigen values of the following matrix in terms of k. Can you find an
eigen vector corresponding to each of the eigen values?
PART B
Answer any one Question from each module. Each question carries 14 Marks
11 a) i.Find all solutions to the system of linearequations (4)
COMPUTER SCIENCE AND ENGINEERING
ii. Prove that all vectors orthogonal to [2,−3,1]T forms a subspace (4)
W of R3. What is dim (W) and why?
b) A set of n linearly independent vectors in Rn forms a basis. Does the set of (6)
vectors (2, 4,−3),(0, 1, 1),(0, 1,−1) form a basis for R3? Explain
yourreasons.
OR
𝑥𝑥1
12 a) Find all solutions in 𝑥𝑥 = �𝑥𝑥2� ∈ 𝑅𝑅 3 of the equation system 𝐴𝐴𝐴𝐴 = 12𝑥𝑥 , (7)
𝑥𝑥3
6 4 3
where 𝐴𝐴 = �6 0 9� and ∑3𝑖𝑖=1 xi = 1.
0 8 0
b) Consider the transformation T (x, y) = (x + y, x + 2y, 2x + 3y). Obtain ker T (7)
and use this to calculate the nullity. Also find the transformation matrix
forT.
13 a) Use the Gramm-Schmidt process to find an orthogonal basis for the column (7)
space of the following matrix.
OR
14 a) i. Let L be the line through the origin in R2 that is parallel to the vector (6)
[3, 4]T. Find the standard matrix of the orthogonal projection onto L.
Also find the point on L which is closest to the point (7, 1) and find the
point on L which is closest to the point (-3 , 5).
ii. Finda3×3orthogonalmatrixSanda3×3diagonalmatrixD
such that A = SDST
COMPUTER SCIENCE AND ENGINEERING
15 a) Askierisonamountainwithequationz=100–0.4x2–0.3y2,wherez (8)
denotes height.
i. The skier is located at the point with xy-coordinates (1, 1), and wants
to ski downhill along the steepest possible path. In which direction
(indicated by a vector (a, b) in the xy-plane) should the skier
beginskiing.
ii. The skier begins skiing in the direction given by the xy-vector (a, b)
you found in part (i), so the skier heads in a direction in space given
by the vector (a, b, c). Find the value of c.
b) Find the linear approximation to the function f(x,y) = 2 - sin(-x - 3y) at the (6)
point (0 , π), and then use your answer to estimate f(0.001 , π).
OR
16 a) Let g be the function given by (8)
17 a) There are two bags. The first bag contains four mangos and two apples; the (6)
second bag contains four mangos and four apples. We also have a biased
coin, which shows “heads” with probability 0.6 and “tails” with probability
0.4. If the coin shows “heads”. we pick a fruitat random from bag 1;
otherwise we pick a fruit at random from bag 2. Your friend flips the coin
(you cannot see the result), picks a fruit at random from the corresponding
bag, and presents you a mango.
What is the probability that the mango was picked from bag 2?
b) Suppose that one has written a computer program that sometimes compiles (8)
and sometimes not (code does not change). You decide to model the
apparent stochasticity (success vs. no success) x of the compiler using a
Bernoulli distribution with parameter μ:
Choose a conjugate prior for the Bernoulli likelihood and compute the
posterior distribution p( μ | x1 , ... ,xN).
OR
18 a) Two dice are rolled. (6)
A = ‘sum of two dice equals 3’
B = ‘sum of two dice equals 7’
C = ‘at least one of the dice shows a 1’
COMPUTER SCIENCE AND ENGINEERING
i. What is P(A|C)?
ii. What is P(B|C)?
iii. Are A and C independent? What about B and C?
b) Consider the following bivariate distribution p(x,y) of two discrete random (8)
variables X and Y .
Compute:
i. The marginal distributions p(x) and p(y).
ii. The conditional distributions p(x|Y = y1) and p(y|X = x3).
Show that x* = (1, 1/2, -1) is optimal for the optimization problem
(6)
OR
20 a) Derive the gradient descent training rule assuming that the target function is (8)
represented as od = w0 + w1x1 + ... + wnxn. Define explicitly the cost/ error
function E, assuming that a set of training examples D is provided, where
each training example d D is associated with the target output td.
b) Find the maximum value of f(x,y,z) = xyz given that g(x,y,z) = x + y + z = 3 (6)
and x,y,z>=0.
***
COMPUTER SCIENCE AND ENGINEERING
Teaching Plan
No. of
No Topic Lectures
(49)
Module-I (LINEAR ALGEBRA) 8
1.1 Matrices, Solving Systems of Linear Equations
1
1.2 Vector Spaces 1
1.3 Linear Independence 1
1.4 Basis and Rank (Lecture – 1) 1
1.5 Basis and Rank (Lecture – 2) 1
1.6 Linear Mappings 1
1.7 Matrix Representation of Linear Mappings 1
INTRODUCTION TO Year of
CST Category L T P Credit
COMPUTER Introduction
286
NETWORKS MINOR 3 1 0 4 2019
Preamble: This is the second course for awarding B. Tech. Minor in Computer Science and
Engineering with specialization in Networking. Study of this course provides the learners a
clear understanding of how computer networks from local area networks to the massive and
global Internet are built and how they allow the usage of computers to share information and
communicate with one another. This course covers the layers of OSI Reference models and
inter-networking. This course helps the learners to compare and analyze the existing network
technologies and to choose a suitable network design for a given system.
Course Outcomes: After the completion of the course the student will be able to
Discuss the design issues of data link layer, data link layer protocols, bridges
CO 2 and switches (Cognitive Knowledge : Understand)
Illustrate wired LAN protocols (IEEE 802.3/4/5) and wireless LAN protocols
CO 3 (IEEE 802.11a/b/g/n, 802.15) (Cognitive Knowledge : Understand)
Illustrate the functions and protocols of network layer, transport layer and
CO 5 application layer in inter-networking (Cognitive Knowledge : Understand)
COMPUTER SCIENCE AND ENGINEERING
CO1 ! ! ! !
CO2 ! ! ! ! !
CO3 ! ! ! ! !
CO4 ! ! ! !
CO5 ! ! ! ! ! !
Assessment Pattern
End Semester
Test 1 (Marks Test 2 (Marks
Bloom’s Category Examination (Marks in
in percentage) in percentage)
percentage)
Remember 40 30 30
Understand 60 50 50
Apply 20 20
Analyse
Evaluate
Create
COMPUTER SCIENCE AND ENGINEERING
Mark Distribution
Total Marks CIE Marks ESE Marks ESE Duration
150 50 100 3
Each of the two internal examinations has to be conducted out of 50 marks. First series test shall
be preferably conducted after completing the first half of the syllabus and the second series test
shall be preferably conducted after completing remaining part of the syllabus. There will be two
parts: Part A and Part B. Part A contains 5 questions (preferably, 2 questions each from the
completed modules and 1 question from the partly completed module), having 3 marks for each
question adding up to 15 marks for part A. Students should answer all questions from Part A.
Part B contains 7 questions (preferably, 3 questions each from the completed modules and 1
question from the partly completed module), each with 7 marks. Out of the 7 questions, a
student should answer any 5.
Syllabus
Module 1
The Data Link Layer - Data Link layer Design Issues, Error Detection and Correction,
Elementary Data Link Protocols, Sliding Window Protocols, HDLC (High-Level Data Link
Control) Protocol. The Medium Access Control (MAC) Sub layer – The Channel Allocation
Problem, Multiple Access Protocols, Ethernet, Wireless LANs - 802.11 a/b/g/n, Bridges &
Switches.
Module 3
COMPUTER SCIENCE AND ENGINEERING
Network Layer Design Issues. Routing Algorithms - The Optimality Principle, Shortest path
routing, Flooding, Distance Vector Routing, Link State Routing, Multicast Routing, Routing for
Mobile Hosts. Congestion Control Algorithms, Quality of Service (QoS) - Requirements,
Techniques for Achieving Good QoS.
Module 4
Network Layer in Internet – The IP Protocol, IP Addresses, Internet Control Message Protocol
(ICMP), Address Resolution Protocol (ARP), Reverse Address Resolution Protocol (RARP),
Bootstrap Protocol (BOOTP), Dynamic Host Configuration Protocol (DHCP). Open Shortest
Path First (OSPF) Protocol, Border Gateway Protocol (BGP), Internet Multicasting, IPv6,
ICMPv6.
Module 5
Transport Layer – The Transport Service – Services Provided to the Upper Layers, Transport
Service Primitives. The User Datagram Protocol (UDP), Transmission Control Protocol (TCP) –
Overview of TCP, TCP Segment Header, Connection Establishment & Release, Connection
Management Modeling, TCP Retransmission Policy, TCP Congestion Control.
Application Layer – File Transfer Protocol (FTP), Domain Name System (DNS), Electronic
mail, MIME, Simple Network Management Protocol (SNMP), World Wide Web – Architectural
Overview.
Text Book
Andrew S. Tanenbaum, Computer Networks, 4/e, PHI (Prentice Hall India).
Reference Books
1. Behrouz A Forouzan, Data Communication and Networking, 4/e, Tata McGraw Hill
2. Larry L Peterson and Bruce S Dave, Computer Networks – A Systems Approach, 5/e,
Morgan Kaufmann.
3. Fred Halsall, Computer Networking and the Internet, 5/e.
4. James F. Kurose, Keith W. Ross, Computer Networking: A Top-Down Approach, 6/e.
5. Keshav, An Engineering Approach to Computer Networks, Addison Wesley, 1998.
6. W. Richard Stevens. TCP/IP Illustrated volume 1, Addison-Wesley, 2005.
7. William Stallings, Computer Networking with Internet Protocols, Prentice-Hall, 2004.
8. Request for Comments (RFC) Pages - IETF -https://www.ietf.org/rfc.html
CourseOutcome1 (CO1): Compare TCP/IP Reference model and OSI Reference model.
CourseOutcome2 (CO2): Distinguish between switches and bridges.
COMPUTER SCIENCE AND ENGINEERING
CourseOutcome3 (CO3): Draw and explain the frame format for Ethernet.
CourseOutcome5 (CO4): Discuss remedies for count to infinity problem in routing.
CourseOutcome4 (CO5): Subnet the Class C IP Address 206.16.2.0 so that you have 30
subnets. What is the subnet mask for the maximum number of hosts? How many hosts can
each subnet have?
Reg No:_______________
Name:_________________
PART-A
1. Why Layered Architecture is used in Computer Networks? Define the terms protocol and
interface?
2. What are the different service primitives in Computer Networks?
3. Draw and explain Ethernet frame format.
4. What is the output string when the bit string 0111101111101111110 is subjected to bit
stuffing?
5. Discuss the count to infinity problem in routing.
6. What is flooding? Describe any two situations where flooding is advantageous.
7. What is IP (Internet Protocol) subnetting? Illustrate with example.
8. How many octets does the smallest possible IPv6 (IP version 6) datagram contain?
9. Can TCP (Transmission Control Protocol) be used directly over a network (e.g. an
Ethernet) without using IP? Justify your answer
10. What is the role of SNMP (Simple Network Management Protocol)?
(10x3=30)
Part B
COMPUTER SCIENCE AND ENGINEERING
(Answer any one Question from each module. Each question carries 14 Marks)
Module I
11. (a) With a neat diagram, explain the OSI (Open Systems Interconnection) reference
Model. (8)
(b) Compare OSI Reference model and the TCP/IP model (6)
OR
12. (a) Consider two networks providing reliable connection-oriented service. One of them
offers a reliable byte stream and the other offers a reliable message stream. Are they
identical? Justify your answer. (8)
(b) Compare LAN (Local Area Networks), MAN (Metropolitan Area Networks) and
WAN (Wide Area Networks). (6)
Module II
13. (a) Discuss the different strategies used to avoid collisions in CSMA/CA (Carrier Sense
Multiple Access/Collision Avoidance) . (8)
(b) Briefly explain the working of HDLC (High-Level Data Link Control). (6)
OR
Module III
15. (a) Illustrate Distance Vector Routing Algorithm with an example. (8)
(b) Explain the characteristics of RIP (Routing Information Protocol). (6)
OR
16. (a) Explain an Interior Gateway protocol that uses a link state algorithm to propagate
routing information. (6)
(b) Explain how routing is performed in a Mobile network. (8)
Module IV
COMPUTER SCIENCE AND ENGINEERING
17. (a) Explain address resolution problem and RARP (Reverse Address Resolution Protocol)
with an example network. (10)
(b) How IGMP (Internet Group Management Protocol) supports internet multicasting?
Explain. (4)
OR
18. (a) Subnet the class C IP address 195.1.1.0 so that you have 10 subnets with a maximum
of 12 hosts in each subnet. (6)
(b) Draw IPv6 Datagram format and explain its features (8)
Module V
19. (a) Distinguish between TCP and UDP (User Datagram Protocol) header formats. (8)
(b) Explain the principal DNS (Domain Name System) resource record types for IPv4. (6)
OR
20. (a) What is the role of SMTP (Simple Mail Transfer Protocol) in E-mail? (6)
(b) With the help of a basic model explain the working of WWW (World Wide Web). (8)
Teaching Plan
Module 1 (8 Hours)
2.7 The Medium Access Control (MAC) Sub layer – The Channel 1
Allocation Problem, Multiple Access Protocols.
2.8 Ethernet - Ethernet Cabling, Manchester Encoding, The 1
Ethernet MAC Sub layer Protocol, The Binary Exponential
Backoff Algorithm.
2.9 Ethernet - Ethernet Performance, Switched Ethernet, Fast 1
Ethernet, Gigabit Ethernet, IEEE 802.2: Logical Link Control.
2.10 Wireless LANs - 802.11 a/b/g/n. 1
Module 3 (9 Hours)
Module 4 (9 Hours)
Module 5 (8 Hours)
SEMESTER -4
HONOURS
COMPUTER SCIENCE AND ENGINEERING
Year of
CODE COURSE NAME CATEGORY L T P CREDIT
Introduction
Preamble: This is the foundational course for awarding B. Tech. Honours in Computer Science and
Engineering with specialization in Security in Computing. The purpose of this course is to create
awareness among learners about the important areas of number theory used in computer science. This
course covers Divisibility & Modular Arithmetic, Primes & Congruences, Euler's Function, Quadratic
Residues and Arithmetic Functions, Sum of Squares and Continued fractions. Concepts in Number
Theory help the learner to apply them eventually in practical applications in Computer organization &
Security, Coding & Cryptography, Random number generation, Hash functions and Graphics.
Course Outcomes: After the completion of the course the student will be able to
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO1 ! ! ! ! ! !
CO2 ! ! ! ! !
CO3 ! ! ! ! ! !
CO4 ! ! ! ! ! !
CO5 ! ! ! ! ! !
CO6
! ! ! ! ! ! !
Assessment Pattern
Remember 30 30 30
Understand 30 30 30
Apply 40 40 40
Analyse
Evaluate
Create
Mark Distribution
Attendance : 10 marks
First Internal Examination shall be preferably conducted after completing the first half of the syllabus
and the Second Internal Examination shall be preferably conducted after completing remaining part of
the syllabus.
There will be two parts: Part A and Part B. Part A contains 5 questions (preferably, 2 questions each
from the completed modules and 1 question from the partly covered module), having 3 marks for each
question adding up to 15 marks for part A. Students should answer all questions from Part A. Part B
contains 7 questions (preferably, 3 questions each from the completed modules and 1 question from
the partly covered module), each with 7 marks. Out of the 7 questions in Part B, a student should
answer any 5.
There will be two parts; Part A and Part B. Part A contains 10 questions with 2 questions from each
module, having 3 marks for each question. Students should answer all questions. Part B contains 2
questions from each module of which a student should answer any one. Each question can have
maximum 2 sub-divisions and carries 14 marks.
SYLLABUS
Module 1
Modular Arithmetic- Properties, Euclid's algorithm for the greatest common divisor, Extended Euclid’s
Algorithm, Least Common multiple, Solving Linear Diophantine Equations, Modular Division.
Module 2
Module 3
The Group of units- The group Un,Primitive roots, Existence of primitive roots, Applications of
primitive roots.
Module 4
Quadratic Residues- Quadratic Congruences, The group of Quadratic residues, Legendre symbol,
Jacobi Symbol, Quadratic reciprocity.
Arithmetic Functions- Definition and examples, Perfect numbers, Mobius function and its properties,
Mobius inversion formula, The Dirichlet Products.
Module 5
Sum of Squares- Sum of two squares, The Gaussian Integers, Sum of three squares, Sum of four
squares.
Continued Fractions -Finite continued fractions, Infinite continued fractions, Pell's Equation, Solution
of Pell’s equation by continued fractions.
Text Books
1. G.A. Jones & J.M. Jones, Elementary Number Theory, Springer UTM, 2007.
Reference Books
1. William Stallings, Cryptography and Network Security Principles and Practice, Pearson Ed.
2. Tom M.Apostol, ‘Introduction to Analytic Number Theory’, Narosa Publishing House Pvt. Ltd,
New Delhi, (1996).
3. Neal Koblitz, A course in Number Theory and Cryptography, 2nd Edition, Springer ,2004.
Course Outcome 1 (CO1): Describe the properties of modular arithmetic and modulo operator.
Course Outcome 2 (CO2): Prove that the equation y2 = x3 - 2 has only the integer solution (3, ±5).
Course Outcome 3 (CO3): State the law of reciprocity for Jacobi symbols and use it to determine
whether 888 is a quadratic residue or non residue of the prime 1999.
Course Outcome 4 (CO4): Using Chinese remainder theorem, solve the system of congruence x
≡2(mod 3), x ≡3(mod 5), x ≡2(mod 7)
PART A
Part B
11. (a) State the Euclidean algorithm and its extension with an example. (7)
(b) Find all the solutions of 24x + 34 y = 6. (7)
OR
12. (a) Describe the properties of modular arithmetic and modulo operator. (7)
(b) Explain Extended Euclidean algorithm. Using the algorithm find the
COMPUTER SCIENCE AND ENGINEERING
OR
14. (a) Using Chinese remainder theorem, solve the system of congruences,
x ≡2(mod 3), x ≡3(mod 5), x ≡2(mod 7) (7)
(b) Define Fermat primes. Show that any two distinct Fermat numbers are
Relatively prime. (7)
15. (a) Distinguish between public key and private key encryption techniques.
Also point out the merits and demerits of both. (7)
(b) Define Carmichael number and show that a Carmichael number must
be the product of at least three distinct primes. (7)
OR
16. (a)Define a pseudo prime to a base and find all non trivial bases for which
15 is a pseudo prime. (6)
(b) Find an element of
i) order 5 modulo 11 ii) order 4 modulo 13
iii) order 8 modulo 17 iv) order 6 modulo 19 (8)
17. (a) Determine the quadratic residues and non residues modulo 17. Also
determine whether 219 is a quadratic residue or non residue of the prime 383.
(8)
(b) State the law of quadratic reciprocity. Determine those odd primes p for
which 3 is a quadratic residue and those for which it is a non residue. (6)
OR
18. (a) State and prove properties of Legendre’s symbol. (7)
(b) State the law of reciprocity for Jacobi symbols and using it determine
whether 888 is a quadratic residue or non residue of the prime 1999. (7)
19. (a) Prove that the equation y2 = x3 - 2 has only the integer solution (3 , ±5). (7)
COMPUTER SCIENCE AND ENGINEERING
(b) Define a Gaussian integer. Factorize the Gaussian integer 440 − 55i. (7)
OR
20. (a) If m, and n can be expressed as sum of four squares, then show that mn can
also be expressed the sum of four squares. (7)
(b) Find all the solutions of the Diophantine equation x2 – 6 y 2 =1. (7)
Teaching Plan
2.3 Primality testing and factorization, Miller -Rabin Test for Primality. 1 hour
3.9 Existence of primitive roots for Primes, Applications of primitive roots. 1 hour
4.7 Mobius inversion formula., application of the Mobius inversion formula. 1 hour
Preamble: This is the foundational course for awarding B. Tech. Honours in Computer
Science and Engineering with specialization in Machine Learning. The purpose of this
course is to introduce mathematical foundations of basic Machine Learning concepts among
learners, on which Machine Learning systems are built. This course covers Linear
Algebra, Vector Calculus, Probability and Distributions, Optimization and Machine Learning
problems. Concepts in this course help the learners to understand the mathematical principles
in Machine Learning and aid in the creation of new Machine Learning solutions, understand
& debug existing ones, and learn about the inherent assumptions & limitations of the current
methodologies.
Course Outcomes: After the completion of the course the student will be able to
Make use of the concepts, rules and results about linear equations, matrix algebra,
CO 1 vector spaces, eigenvalues & eigenvectors and orthogonality & diagonalization to
solve computational problems (Cognitive Knowledge Level: Apply)
Perform calculus operations on functions of several variables and matrices,
CO 2 including partial derivatives and gradients (Cognitive Knowledge Level: Apply)
Utilize the concepts, rules and results about probability, random variables, additive
CO 3 & multiplicative rules, conditional probability, probability distributions and Bayes’
theorem to find solutions of computational problems (Cognitive Knowledge Level:
Apply)
Train Machine Learning Models using unconstrained and constrained optimization
CO 4
methods (Cognitive Knowledge Level: Apply)
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO 1 √ √ √ √ √
CO 2 √ √ √ √
CO 3 √ √ √ √ √
CO 4 √ √ √ √ √ √
COMPUTER SCIENCE AND ENGINEERING
Assessment Pattern
Analyse
Evaluate
Create
Mark Distribution
Attendance : 10 marks
Continuous Assessment Tests : 25 marks
Continuous Assessment Assignment : 15 marks
COMPUTER SCIENCE AND ENGINEERING
First Internal Examination shall be preferably conducted after completing the first half of the
syllabus and the Second Internal Examination shall be preferably conducted after completing
remaining part of the syllabus.
There will be two parts: Part A and Part B. Part A contains 5 questions (preferably, 2
questions each from the completed modules and 1 question from the partly covered module),
having 3 marks for each question adding up to 15 marks for part A. Students should answer
all questions from Part A. Part B contains 7 questions (preferably, 3 questions each from the
completed modules and 1 question from the partly covered module), each with 7 marks. Out
of the 7 questions in Part B, a student should answer any 5.
End Semester Examination Pattern: There will be two parts; Part A and Part B. Part A
contains 10 questions with 2 questions from each module, having 3 marks for each question.
Students should answer all questions. Part B contains 2 questions from each module of which
student should answer anyone. Each question can have maximum 2 sub-divisions and carries
14 marks.
COMPUTER SCIENCE AND ENGINEERING
Syllabus
Module 1
Module 2
Module 3
Module 4
Module 5
Text book:
1.Mathematics for Machine Learning by Marc Peter Deisenroth, A. Aldo Faisal, and
Cheng Soon Ong published by Cambridge University Press (freely available at https://
mml - book.github.io)
COMPUTER SCIENCE AND ENGINEERING
Reference books:
1. FindthesetSofallsolutionsinxofthefollowinginhomogeneouslinearsystemsAx
= b, where A and b are defined as follows:
1. For a scalar function f(x, y, z ) = x2 +3y2 +2z2, find the gradient and its magnitude at
the point (1, 2, -1).
2. Find the maximum and minimum values of the function f(x,y)=4x+4y-x2-y2
subject to the condition x2 + y2 <= 2.
3. Suppose you were trying to minimize f(x, y) = x2+ 2y + 2y2. Along what vector
should you travel from (5,12)?
4. Find the second order Taylor series expansion for f(x, y) = (x + y)2about (0 ,0).
5. Find the critical points of f(x, y) = x2 –3xy+5x-2y+6y2+8.
6. Compute the gradient of the Rectified Linear Unit (ReLU) function ReLU(z) =
max(0 , z).
7. Let L = ||Ax - b||22, where A is a matrix and x and b are vectors. Derive dL in terms of
dx.
i. Find P(J∩T)
3 1 1
Find the angle between the vectors 𝑥𝑥 = � �and 𝑦𝑦 = � �.
1 2
4 Find the eigen values of the following matrix in terms of k. Can you find an
eigen vector corresponding to each of the eigen values?
PART B
Answer any one Question from each module. Each question carries 14 Marks
11 a) i.Find all solutions to the system of linearequations (4)
ii. Prove that all vectors orthogonal to [2,−3,1]T forms a subspace (4)
vectors (2, 4,−3),(0, 1, 1),(0, 1,−1) form a basis for R3? Explain
yourreasons.
OR
𝑥𝑥1
12 a) Find all solutions in 𝑥𝑥 = �𝑥𝑥2� ∈ 𝑅𝑅 3 of the equation system 𝐴𝐴𝐴𝐴 = 12𝑥𝑥 , (7)
𝑥𝑥3
6 4 3
where 𝐴𝐴 = �6 0 9� and ∑3𝑖𝑖=1 xi = 1.
0 8 0
b) Consider the transformation T (x, y) = (x + y, x + 2y, 2x + 3y). Obtain ker T (7)
and use this to calculate the nullity. Also find the transformation matrix
forT.
13 a) Use the Gramm-Schmidt process to find an orthogonal basis for the column (7)
space of the following matrix.
OR
14 a) i. Let L be the line through the origin in R2 that is parallel to the vector (6)
[3, 4]T. Find the standard matrix of the orthogonal projection onto L.
Also find the point on L which is closest to the point (7, 1) and find the
point on L which is closest to the point (-3 , 5).
ii. Find the rank-1 approximation of
ii. Finda3×3orthogonalmatrixSanda3×3diagonalmatrixD
such that A = SDST
15 a) Askierisonamountainwithequationz=100–0.4x2–0.3y2,wherez (8)
denotes height.
i. The skier is located at the point with xy-coordinates (1, 1), and wants
to ski downhill along the steepest possible path. In which direction
(indicated by a vector (a, b) in the xy-plane) should the skier
beginskiing.
ii. The skier begins skiing in the direction given by the xy-vector (a, b)
you found in part (i), so the skier heads in a direction in space given
by the vector (a, b, c). Find the value of c.
b) Find the linear approximation to the function f(x,y) = 2 - sin(-x - 3y) at the (6)
point (0 , π), and then use your answer to estimate f(0.001 , π).
OR
16 a) Let g be the function given by (8)
COMPUTER SCIENCE AND ENGINEERING
17 a) There are two bags. The first bag contains four mangos and two apples; the (6)
second bag contains four mangos and four apples. We also have a biased
coin, which shows “heads” with probability 0.6 and “tails” with probability
0.4. If the coin shows “heads”. we pick a fruitat random from bag 1;
otherwise we pick a fruit at random from bag 2. Your friend flips the coin
(you cannot see the result), picks a fruit at random from the corresponding
bag, and presents you a mango.
What is the probability that the mango was picked from bag 2?
b) Suppose that one has written a computer program that sometimes compiles (8)
and sometimes not (code does not change). You decide to model the
apparent stochasticity (success vs. no success) x of the compiler using a
Bernoulli distribution with parameter μ:
Choose a conjugate prior for the Bernoulli likelihood and compute the
posterior distribution p( μ | x1 , ... ,xN).
OR
18 a) Two dice are rolled. (6)
A = ‘sum of two dice equals 3’
B = ‘sum of two dice equals 7’
C = ‘at least one of the dice shows a 1’
i. What is P(A|C)?
ii. What is P(B|C)?
iii. Are A and C independent? What about B and C?
b) Consider the following bivariate distribution p(x,y) of two discrete random (8)
COMPUTER SCIENCE AND ENGINEERING
variables X and Y .
Compute:
i. The marginal distributions p(x) and p(y).
ii. The conditional distributions p(x|Y = y1) and p(y|X = x3).
Show that x* = (1, 1/2, -1) is optimal for the optimization problem
(6)
OR
20 a) Derive the gradient descent training rule assuming that the target function is (8)
represented as od = w0 + w1x1 + ... + wnxn. Define explicitly the cost/ error
function E, assuming that a set of training examples D is provided, where
each training example d D is associated with the target output td.
b) Find the maximum value of f(x,y,z) = xyz given that g(x,y,z) = x + y + z = 3 (6)
and x,y,z>=0.
***
COMPUTER SCIENCE AND ENGINEERING
Teaching Plan
No. of
No Topic Lectures
(49)
Module-I (LINEAR ALGEBRA) 8
1.1 Matrices, Solving Systems of Linear Equations
1
1.2 Vector Spaces 1
1.3 Linear Independence 1
1.4 Basis and Rank (Lecture – 1) 1
1.5 Basis and Rank (Lecture – 2) 1
1.6 Linear Mappings 1
2.4 1
Orthogonal Projections – Projection into One Dimensional
Subspaces
2.5 Projection onto General Subspaces. 1
2.6 Gram-Schmidt Orthogonalization 1
2.7 Determinant and Trace, Eigen values and Eigenvectors. 1
2.8 Cholesky Decomposition 1
2.9 Eigen decomposition and Diagonalization 1
2.10 Singular Value Decomposition 1
2.11 Matrix Approximation 1
COMPUTER SCIENCE AND ENGINEERING
YEAR OF
Category L T P CREDIT
CST Principles of Program INTRODUCTION
296 Analysis and Verification
HONOURS 3 1 0 4 2019
Preamble: This is the foundational course for awarding B. Tech. Honours in Computer Science
and Engineering with specialization in Formal Methods. Program Analysis and Program
Verification are two important areas of study, discussing Methods, Technologies and Tools to
ensure reliability and correctness of software systems. The syllabus for this course is prepared
with the view of introducing the Foundational Concepts, Methods and Tools in Program Analysis
and Program Verification.
Prerequisite: Topics covered in the course Discrete Mathematical Structures (MAT 203).
Course Outcomes: After the completion of the course the student will be able to
Explain the concepts and results about Lattices, Chains, Fixed Points, Galois
Connections, Monotone and Distributive Frameworks, Hoare Triples, Weakest
CO1
Preconditions, Loop Invariants and Verification Conditions to perform Analysis and
Verification of programs (Cognitive knowledge level: Understand)
Use the tool VCC to specify and verify the correctness of a C Program with respect to
CO6
a given set of properties (Cognitive knowledge level: Analyse)
1
COMPUTER SCIENCE AND ENGINEERING
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO1
CO2
CO3
CO4
CO5
CO6
2
COMPUTER SCIENCE AND ENGINEERING
Assessment Pattern:
Understand 30 30 30
Apply 40 40 40
Analyze
Evaluate
Create
Mark Distribution
Attendance : 10 Marks
Assignment : 15 Marks
First series test shall be preferably conducted after completing the first half of the syllabus and
the second series test shall be preferably conducted after completing the remaining part of the
syllabus.
3
COMPUTER SCIENCE AND ENGINEERING
There will be two parts: Part A and Part B. Part A contains 5 questions (preferably, 2 questions
each from the completed modules and 1 question from the partly covered module), having 3
marks for each question adding up to 15 marks for part A. Students should answer all questions
from Part A. Part B contains 7 questions (preferably, 3 questions each from the completed
modules and 1 question from the partly covered module), each with 7 marks. Out of the 7
questions in Part B, a student should answer any 5.
There will be two parts; Part A and Part B. Part A contains 10 questions with 2 questions from
each module, having 3 marks for each question. Students should answer all questions from Part
A. Part B contains 2 questions from each module of which a student should answer any one, each
question carries 14 marks. Each question in part B can have a maximum 2 sub-divisions.
SYLLABUS
Module 1
Module 2
Introduction to Program Analysis – The WHILE language, Reaching Definition Analysis, Data
Flow Analysis, Abstract Interpretation, Algorithm to find the least solutions for the Data Flow
Analysis problem.
Module 3
4
COMPUTER SCIENCE AND ENGINEERING
Module 4
Module 5
Program Verification - Why should we Specify and Verify Code, A framework for software
verification - A core programming Language, Hoare Triples, Partial and Total Correctness,
Program Variables and Logical Variables, Proof Calculus for Partial Correctness, Loop
Invariants, Verifying code using the tool VCC (Verifier for Concurrent C).
Text Books
1. Flemming Nielson, Henne Nielson and Chris Kankin, Principles of Program Analysis,
Springer (1998).
2. Michael Hutch and Mark Ryan, Logic in Computer Science - Modeling and Reasoning
about Systems, Cambridge University Press, Second Edition.
References
1. Julian Dolby and Manu Sridharan, Core WALA Tutorial (PLDI 2010), available online at
http://wala.sourceforge.net/files/PLDI_WALA_Tutorial.pdf
2. Ernie & Hillebrand, Mark & Tobies, Stephan (2012), Verifying C Programs: A VCC
Tutorial.
5
COMPUTER SCIENCE AND ENGINEERING
1. Find a lattice to represent the data states of a given program and propose a sound abstract
interpretation framework to do a given analysis on the program.
2. When is an abstract interpretation framework said to be sound? Illustrate with an
example.
3. When is an abstract interpretation framework said to be precise? Illustrate with an
example.
1. Illustrate how one can do Interprocedural Data Flow Analysis using the tool WALA.
1. Using the tool VCC prove that a given code segment satisfies a given property.
6
COMPUTER SCIENCE AND ENGINEERING
QP CODE: PAGES:3
PART A
7
COMPUTER SCIENCE AND ENGINEERING
PART B
Answer any one Question from each module. Each question carries 14 Marks
11.
a. What is an infinite ascending chain in a lattice? Show an example lattice with an
infinite ascending chain. Is it possible for a complete lattice to contain an infinite
ascending chain? (7 marks)
b. State and prove Knaster-Tarski fixed point theorem. (7 marks)
OR
12.
a. Consider the lattice (ℕ,! ≤ ) . Let f! : ℕ → ℕ , be a function defined as follows:
when x! < 100 , f! (x) = x + 1 , when x! > 100 , f! (x) = x − 1 , otherwise f! (x) = x .
Then, show the following for f! : (i) the set of all fixpoints, (ii) the set of all pre-
fixpoints and (iii) the set of all post-fixpoints. (7 marks)
b. Let (D,
! ≤ ) be a lattice with a least upper bound for each subset of D ! . Then, prove
that every subset of D! has a greatest lower bound. (7 marks)
13.
a. With a suitable example, explain the equational approach in Data Flow Analysis.
(7 marks)
b. With a suitable example, explain how you obtain the collecting semantics of a
program point. (7 marks)
OR
14.
a. With an example, explain the Constrained Based Approach in Data Flow
Analysis. (7 marks)
b. Discuss the properties of an algorithm to solve the problem of computing the least
solution to the program analysis problems in Data Flow Analysis. (7 marks)
15.
a. Using Intraprocedural Reaching Definition Analysis, find the assignments killed
and generated by each of the blocks in the program
[x:=5]1;
[y:=1]2 ;
while [x>1]3 do
([y:=x*y]4 ; [x:=x-1]5)
(7 marks)
b. Analyse the following program using Intraprocedural Very Busy Expression
analysis
8
COMPUTER SCIENCE AND ENGINEERING
if [a>b]1 then
([x: =b-a]2 ; [y: =a-b]3)
else
([y: =b-a]4; [x: =a-b]5)
(7 marks)
OR
16.
a. Find Maximal Fixed Point (MFP) solution for the program
[x: =a+b]1;
[y: =a*b]2 ;
while [y>a+b]3 do
([a: =a+l]4; [x: =a+b]5)
(7 marks)
b. With examples, explain the difference between flow sensitive and flow insensitive
analysis. (7 marks)
17.
a. Prove that (L,
! α, γ, M ) is an adjunction if and only if (L,
! α, γ, M ) is a Galois
connection. (7 marks)
b. Prove that if α
! : L → M is completely additive then there exists γ! : M → L such
that (L,
! α, γ, M ) is a Galois connection. Similarly, if γ! : M → L is completely
multiplicative then there exists α! : L → M such that (L,! α, γ, M ) is a Galois
connection. (7 marks)
OR
18.
a. Show that if (Li, αi, γi, Mi) are Galois connections and βi : Vi ➝ Li are
representation functions then
((α1 o β1) ↠ (α2 o β2)) (↝) = α2 o ((β1 ↠ β2) (↝)) o γ1
(7 marks)
b. Briefly explain Kildall’s algorithm for abstract interpretation (7 marks)
19.
a. Briefly explain the need of specification and verification of code. (7 marks)
b. Argue that Hoare Logic is sound. When Hoare Logic is complete? Let {A}P{B}
be a Hoare triple such that Hoare Logic is complete for the program P. Then, is it
always possible to check the validity of the Hoare Triple? If not, what is the
difficulty? (7 marks)
OR
20.
a. With suitable examples, show the difference between partial and total correctness.
(7 marks)
b. With a suitable example, show how a basic program segment can be verified
using the tool VCC. (7 marks)
9
COMPUTER SCIENCE AND ENGINEERING
Teaching Plan
Module 1 (Mathematical Foundations) 6 Hours
2.5 Algorithm to find the least solutions for the Data Flow Analysis problem 1 Hour
10
COMPUTER SCIENCE AND ENGINEERING
11
COMPUTER SCIENCE AND ENGINEERING
12
HUMANITIES
SEMESTER -3
HUMANITIES
CODE CATEGORY L T P CREDIT
MCN201 SUSTAINABLE ENGINEERING 2 0 0 NIL
Preamble: Objective of this course is to inculcate in students an awareness of environmental issues and the
global initiatives towards attaining sustainability. The student should realize the potential of technology in
bringing in sustainable practices.
Prerequisite: NIL
Course Outcomes: After the completion of the course the student will be able to
CO 1 Understand the relevance and the concept of sustainability and the global initiatives in this
direction
CO 2 Explain the different types of environmental pollution problems and their sustainable
solutions
CO 3 Discuss the environmental regulations and standards
CO 4 Outline the concepts related to conventional and non-conventional energy
CO 5 Demonstrate the broad perspective of sustainable practices by utilizing engineering
knowledge and principles
PO 1 PO 2 PO 3 PO 4 PO 5 PO 6 PO 7 PO 8 PO 9 PO PO PO
10 11 12
CO 1 2 3 2
CO 2 2 3 2
CO 3 2 3 2
CO 4 2 3 2
CO 5 2 3 2
Assessment Pattern
Mark distribution
Attendance : 10 marks
Continuous Assessment Test (2 numbers) : 25 marks
Assignment/Quiz/Course project : 15 marks
End Semester Examination Pattern: There will be two parts; Part A and Part B. Part A contain 10 questions with 2
questions from each module, having 3 marks for each question. Students should answer all questions. Part B contains 2
questions from each module of which student should answer any one. Each question can have maximum 2 sub-divisions
and carry 14 marks.
1
HUMANITIES
Total Marks CIE ESE ESE Duration
Course Outcome 1 (CO1): Understand the relevance and the concept of sustainability and the global initiatives in this
direction
1. Explain with an example a technology that has contributed positively to sustainable development.
2. Write a note on Millennium Development Goals.
Course Outcome 2 (CO2): Explain the different types of environmental pollution problems and their sustainable
solutions
2. Write a note on any one environmental pollution problem and suggest a sustainable solution.
3. In the absence of green house effect the surface temperature of earth would not have been suitable for survival
of life on earth. Comment on this statement.
2. “Nature is the most successful designer and the most brilliant engineer that has ever evolved”. Discuss.
Course Outcome 4 (CO4): Outline the concepts related to conventional and non-conventional energy
1. Suggest a sustainable system to generate hot water in a residential building in tropical climate.
Course Outcome 5 (CO5): Demonstrate the broad perspective of sustainable practices by utilizing engineering
knowledge and principles
1. Suggest suitable measures to make the conveyance facilities used by your institution sustainable.
Part A
Part B
(Answer one question from each module. Each question carries 14 marks)
11. Discuss the evolution of the concept of sustainability. Comment on its relevance in the modern world.
OR
13. Explain the common sources of water pollution and its harmful effects.
OR
15. Explain the different steps involved in the conduct of Environmental Impact Assessment.
OR
17. Comment on the statement, “Almost all energy that man uses comes from the Sun”.
OR
OR
20. Discuss any three methods by which you can increase energy efficiency in buildings.
3
HUMANITIES
Syllabus
Sustainability- need and concept, technology and sustainable development-Natural resources and their pollution, Carbon
credits, Zero waste concept. Life Cycle Analysis, Environmental Impact Assessment studies, Sustainable habitat, Green
buildings, green materials, Energy, Conventional and renewable sources, Sustainable urbanization, Industrial Ecology.
Module 1
Sustainability: Introduction, concept, evolution of the concept; Social, environmental and economic sustainability
concepts; Sustainable development, Nexus between Technology and Sustainable development; Millennium Development
Goals (MDGs) and Sustainable Development Goals (SDGs), Clean Development Mechanism (CDM).
Module 2
Environmental Pollution: Air Pollution and its effects, Water pollution and its sources, Zero waste concept and 3 R
concepts in solid waste management; Greenhouse effect, Global warming, Climate change, Ozone layer depletion,
Carbon credits, carbon trading and carbon foot print, legal provisions for environmental protection.
Module 3
Environmental management standards: ISO 14001:2015 frame work and benefits, Scope and goal of Life Cycle Analysis
(LCA), Circular economy, Bio-mimicking, Environment Impact Assessment (EIA), Industrial ecology and industrial
symbiosis.
Module 4
Resources and its utilisation: Basic concepts of Conventional and non-conventional energy, General idea about solar
energy, Fuel cells, Wind energy, Small hydro plants, bio-fuels, Energy derived from oceans and Geothermal energy.
Module 5
Sustainability practices: Basic concept of sustainable habitat, Methods for increasing energy efficiency in buildings,
Green Engineering, Sustainable Urbanisation, Sustainable cities, Sustainable transport.
Reference Books
1. Allen, D. T. and Shonnard, D. R., Sustainability Engineering: Concepts, Design and Case Studies, Prentice Hall.
2. Bradley. A.S; Adebayo,A.O., Maria, P. Engineering applications in sustainable design and development,
Cengage learning
3. Environment Impact Assessment Guidelines, Notification of Government of India, 2006
4. Mackenthun, K.M., Basic Concepts in Environmental Management, Lewis Publication, London, 1998
5. ECBC Code 2007, Bureau of Energy Efficiency, New Delhi Bureau of Energy Efficiency Publications-Rating
System, TERI Publications - GRIHA Rating System
6. Ni bin Chang, Systems Analysis for Sustainable Engineering: Theory and Applications, McGraw-Hill
Professional.
7. Twidell, J. W. and Weir, A. D., Renewable Energy Resources, English Language Book Society (ELBS).
8. Purohit, S. S., Green Technology - An approach for sustainable environment, Agrobios Publication
4
HUMANITIES
Course Contents and Lecture Schedule
5
HUMANITIES
CODE COURSE NAME CATEGORY L T P CREDIT
2 0 0 2
EST 200 DESIGN AND ENGINEERING
Preamble:
The purpose of this course is to
i) introduce the undergraduate engineering studentsthe fundamental principles of
design engineering,
ii) make them understand the steps involved in the design process and
iii) familiarize them with the basic tools used and approaches in design.
Students are expected to apply design thinking in learning as well as while practicing
engineering, which is very important and relevant for today. Case studies from various
practical situations will help the students realize that design is not only concerned about the
function but also many other factors like customer requirements, economics, reliability, etc.
along with a variety of life cycle issues.
The course will help students to consider aesthetics, ergonomics and sustainability factors in
designs and also to practice professional ethics while designing.
Prerequisite:
Nil.The course will be generic to all engineering disciplines and will not require specialized
preparation or prerequisites in any of the individual engineering disciplines.
Course Outcomes:
PO 1 PO 2 PO 3 PO 4 PO 5 PO 6 PO 7 PO 8 PO 9 PO PO PO
10 11 12
CO 1 2 1 1 1
CO 2 2 1 1 2
CO 3 2 1 1 2 2 1
HUMANITIES
Assessment Pattern
Attendance : 10 marks
Continuous Assessment Test (2 numbers) : 25 marks
Assignment/Quiz/Course project : 15 marks
End Semester Examination (ESE) Pattern: There will be two parts; Part A and Part B.
Part A : 30 marks
part B : 70 marks
Part A contains 10 questions with 2 questions from each module, having 3 marks for each question.
Students should answer all questions.
Part B contains 2 case study questions from each module of which student should answer any one.
Each question carry 14 marks and can have maximum 2 sub questions.
Mark distribution
Course Outcome 1 (CO1): Appreciate the different concepts and principles involved in design
engineering.
3. Describedesign thinking.
5. Write notes on the following concepts in connection with design engineering 1) Modular Design,
2) Life Cycle Design , 3) Value Engineering, 4) Concurrent Engineering, and 5) Reverse Engineering
Course Outcome 2 (CO2) Apply design thinking while learning and practicing engineering.
1. Construct the iterative process for design thinking in developing simple products like a pen,
umbrella, bag, etc.
2. Show with an example how divergent-convergent thinking helps in generating alternative designs
and then how to narrow down to the best design.
3. Describe how a problem-based learning helps in creating better design engineering solutions.
Course Outcome 3(CO3): Develop innovative, reliable, sustainable and economically viable designs
incorporating different segments of knowledge in engineering.
1. Illustratethe development of any simple product by passing through the different stages of design
process
2. Show thegraphical design communication with the help of detailed 2D or 3D drawings for any
simple product.
3. Describe how to develop new designs for simple products through bio-mimicry.
HUMANITIES
Model Question paper
Page 1 of 2
Reg No.: Name:
APJ ABDUL KALAM TECHNOLOGICAL UNIVERSITY
THIRD/FOURTH SEMESTER B.TECH DEGREE EXAMINATION
Course Code: EST 200
Course Name: DESIGN AND ENGINEERING
Max. Marks: 100Duration: 3 Hours
PART A
Answer all questions, each question carries 3 marks
Use only hand sketches
Part B
Answer any ONE question from each module. Each question carry 14 marks
Module 1
(11) Show the designing of a wrist watch going through the various stages of the design
process. Use hand sketches to illustrate the processes.
or
(12) Find the customer requirements for designing a new car showroom. Show how the
design objectives were finalized considering the design constraints?
HUMANITIES
Module 2
(13) Illustrate the design thinking approach for designing a bag for college students within a
limited budget. Describe each stage of the process and the iterative procedure
involved. Use hand sketches to support your arguments.
or
(14) Construct a number of possible designs and then refine them to narrow down to the
best design for a drug trolley used in hospitals. Show how the divergent-convergent
thinking helps in the process. Provide your rationale for each step by using hand
sketches only.
Module 3
(15) Graphically communicate the design of a thermo flask used to keep hot coffee. Draw
the detailed 2D drawings of the same with design detailing, material selection, scale
drawings, dimensions, tolerances, etc. Use only hand sketches.
or
(16) Describe the role of mathematical modelling in design engineering. Show how
mathematics and physics play a role in designing a lifting mechanism to raise 100 kg of
weight to a floor at a height of 10 meters in a construction site.
Module 4
(17) Show the development of a nature inspired design for a solar poweredbus waiting shed
beside a highway. Relate between natural and man-made designs. Use hand sketches
to support your arguments.
or
(18) Show the design of a simple sofa and then depict how the design changes when
considering 1) aesthetics and 2) ergonomics into consideration. Give hand sketches and
explanations to justify the changes in designs.
Module 5
(19) Examine the changes in the design of a foot wear with constraints of 1) production
methods, 2) life span requirement, 3) reliability issues and 4) environmental factors.
Use hand sketches and give proper rationalization for the changes in design.
or
(20) Describe the how to estimate the cost of a particular design using ANY of the following:
i) a website, ii) the layout of a plant, iii) the elevation of a building, iv) anelectrical or
electronic system or device and v) a car.
Show how economics will influence the engineering designs. Use hand sketches to support
your arguments.
Page 2 of 2
HUMANITIES
Syllabus
Module 1
Design Process:- Introduction to Design and Engineering Design, Defining a Design
Process-:Detailing Customer Requirements, Setting Design Objectives, Identifying
Constraints, Establishing Functions, Generating Design Alternatives and Choosing a
Design.
Module 2
Design Thinking Approach:-Introduction to Design Thinking, Iterative Design
Thinking Process Stages: Empathize, Define, Ideate, Prototype and Test. Design
Thinking as Divergent-Convergent Questioning. Design Thinking in a Team
Environment.
Module 3
Design Communication (Languages of Engineering Design):-Communicating
Designs Graphically, Communicating Designs Orally and in Writing. Mathematical
Modeling In Design, Prototyping and Proofing the Design.
Module 4
Design Engineering Concepts:-Project-based Learning and Problem-based Learning
in Design.Modular Design and Life Cycle Design Approaches. Application of Bio-
mimicry,Aesthetics and Ergonomics in Design. Value Engineering, Concurrent
Engineering, and Reverse Engineering in Design.
Module 5
Expediency, Economics and Environment in Design Engineering:-Design for
Production, Use, and Sustainability. Engineering Economics in Design. Design
Rights. Ethics in Design
Text Books
1) YousefHaik, SangarappillaiSivaloganathan, Tamer M. Shahin, Engineering Design Process,
Cengage Learning 2003, Third Edition, ISBN-10: 9781305253285,
2) Voland, G., Engineering by Design, Pearson India 2014, Second Edition, ISBN 9332535051
Reference Books
1. Philip Kosky, Robert Balmer, William Keat, George Wise, Exploring Engineering, Fourth
Edition: An Introduction to Engineering and Design, Academic Press 2015, 4th Edition,
ISBN: 9780128012420.
2. Clive L. Dym, Engineering Design: A Project-Based Introduction, John Wiley & Sons,
New York 2009, Fourth Edition, ISBN: 978-1-118-32458-5
3. Nigel Cross, Design Thinking: Understanding How Designers Think and Work, Berg
Publishers 2011, First Edition, ISBN: 978-1847886361
4. Pahl, G., Beitz, W., Feldhusen, J., Grote, K.-H., Engineering Design: A Systematic
Approach, Springer 2007, Third Edition, ISBN 978-1-84628-319-2
HUMANITIES
Course Contents and Lecture Schedule
No Topic No. of Lectures
1 Module 1: Design Process
1.1 Introduction to Design and Engineering Design.
What does it mean to design something? How Is
engineering design different from other kinds of design? 1
Where and when do engineers design? What are the basic
vocabularyin engineering design? How to learn and do
engineering design.
1.2 Defining a Design Process-: Detailing Customer
Requirements.
How to do engineering design? Illustrate the process with 1
an example. How to identify the customer requirements of
design?
1.3 Defining a Design Process-: Setting Design Objectives,
Identifying Constraints, Establishing Functions.
How to finalize the design objectives? How to identify the 1
design constraints? How to express the functions a design
in engineering terms?
1.4 Defining a Design Process-: Generating Design
Alternatives and Choosing a Design.
1
How to generate or create feasible design alternatives?
How to identify the "best possible design”?
1.5 Case Studies:- Stages of Design Process.
Conduct exercises for designing simple products going 1
through the different stages of design process.
2 Module 2: Design Thinking Approach
2.1 Introduction to Design Thinking
How does the design thinking approach help engineers in 1
creating innovative and efficient designs?
2.2 Iterative Design Thinking Process Stages: Empathize,
Define, Ideate, Prototype and Test.
How can the engineers arrive at better designs utilizing 1
the iterative design thinking process (in which knowledge
acquired in the later stages can be applied back to the
earlier stages)?
2.3 Design Thinking as Divergent-Convergent Questioning.
Describe how to create a number of possible designs and 1
then how to refine and narrow down to the 'best design'.
2.4 Design Thinking in a Team Environment.
How to perform design thinking as a team managing the 1
conflicts ?
2.5 Case Studies: Design Thinking Approach.
1
Conduct exercises using the design thinking approach for
HUMANITIES
designing any simple products within a limited time and
budget
3 Module 3: Design Communication (Languages of Engineering Design)
3.1 Communicating Designs Graphically.
1
How do engineering sketches and drawings convey designs?
3.2 Communicating Designs Orally and in Writing.
How can a design be communicated through oral 1
presentation or technical reports efficiently?
First Series Examination
3.3 Mathematical Modelling in Design.
How do mathematics and physics become a part of the 1
design process?
3.4 Prototyping and Proofing the Design.
1
How to predict whether the design will function well or not?
3.5 Case Studies: Communicating Designs Graphically.
Conduct exercises for design communication through
detailed 2D or 3D drawings of simple products with 1
design detailing, material selection, scale drawings,
dimensions, tolerances, etc.
4 Module 4: Design Engineering Concepts
4.1 Project-based Learning and Problem-based Learning in 1
Design.
How engineering students can learn design engineering
through projects?
How students can take up problems to learn design
engineering?
4.2 Modular Design and Life Cycle Design Approaches. 1
What is modular approach in design engineering? How it
helps?
How the life cycle design approach influences design
decisions?
4.3 Application of Bio-mimicry, Aesthetics and Ergonomics 1
in Design.
How do aesthetics and ergonomics change engineering
designs?
How do the intelligence in nature inspire engineering
designs? What are the common examples of bio-mimicry
in engineering?
4.4 Value Engineering, Concurrent Engineering, and Reverse 1
Engineering in Design.
How do concepts like value engineering , concurrent
engineering and reverse engineering influence
engineering designs?
4.5 Case Studies: Bio-mimicry based Designs. 1
Conduct exercises to develop new designs for simple
HUMANITIES
products using bio-mimicry and train students to bring out
new nature inspired designs.
5 Module 5: Expediency, Economics and Environment in Design
Engineering
5.1 Design for Production, Use, and Sustainability. 1
How designs are finalized based on the aspects of
production methods, life span, reliability and
environment?
5.2 Engineering Economics in Design. 1
How to estimate the cost of a particular design and how
will economics influence the engineering designs?
5.3 Design Rights. 1
What are design rights and how can an engineer put it
into practice?
5.4 Ethics in Design. 1
How do ethics play a decisive role in engineering design?
5.5 Case Studies: Design for Production, Use, and 1
Sustainability.
Conduct exercises using simple products to show how designs
change with constraints of production methods, life span
requirement, reliability issues and environmental factors.
Second Series Examination
HUMANITIES
Course Outcomes: After the completion of the course the student will be able to
CO 1 Understand the core values that shape the ethical behaviour of a professional.
CO 2 Adopt a good character and follow an ethical life.
Explain the role and responsibility in technological development by keeping personal ethics
CO 3 and legal ethics.
Solve moral and ethical problems through exploration and assessment by established
CO 4 experiments.
Apply the knowledge of human values and social values to contemporary ethical values and
CO 5 global issues.
Assessment Pattern
Continuous Assessment Tests
Bloom’s category End Semester Exam
1 2
Remember 15 15 30
Understood 20 20 40
Apply 15 15 30
Mark distribution
Total
CIE ESE ESE Duration
Marks
End Semester Examination Pattern: There will be two parts; Part A and Part B. Part A contains 10 questions
with 2 questions from each module, having 3 marks for each question. Students should answer all questions.
Part B contains 2 questions from each module of which student should answer any one. Each question can have
maximum 2 sub-divisions and carry 14 marks.
PAGES:3 Name : _
PART A
8. Recall confidentiality.
10. Name any three professional societies and their role relevant to engineers.
(10x3 = 30 marks)
PART B
(Answer one full question from each module, each question carries 14 marks)
MODULE I
Or
12. a) Exemplify a comprehensive review about integrity and respect for others.
HUMANITIES
b) Discuss about co-operation and commitment. (8+6 = 14 marks)
MODULE II
13.a) Explain the three main levels of moral developments, deviced by Kohlberg.
Or
b) Discuss in detail the three types of inquiries in engineering ethics (8+6 = 14 marks)
MODULE III
Or
MODULE IV
20. a) Investigate the causes and effects of acid rain with a case study.
b) Conclude the features of ecocentric and biocentric ethics. (8+6 = 14 marks)
HUMANITIES
Syllabus
Morals, values and Ethics – Integrity- Academic integrity-Work Ethics- Service Learning- Civic Virtue-
Respect for others- Living peacefully- Caring and Sharing- Honestly- courage-Cooperation commitment-
Empathy-Self Confidence -Social Expectations.
Senses of Engineering Ethics - Variety of moral issues- Types of inquiry- Moral dilemmas –Moral Autonomy –
Kohlberg’s theory- Gilligan’s theory- Consensus and Controversy-Profession and Professionalism- Models of
professional roles-Theories about right action –Self interest-Customs and Religion- Uses of Ethical Theories.
Collegiality and loyalty – Managing conflict- Respect for authority- Collective bargaining- Confidentiality-
Role of confidentiality in moral integrity-Conflicts of interest- Occupational crime- Professional rights-
Employee right- IPR Discrimination.
Multinational Corporations- Environmental Ethics- Business Ethics- Computer Ethics -Role in Technological
Development-Engineers as Managers- Consulting Engineers- Engineers as Expert witnesses and advisors-Moral
leadership.
Text Book
2. R S Naagarazan, A text book on professional ethics and human values, New age international
(P) limited ,New Delhi,2006.
Reference Books
1. Mike W Martin and Roland Schinzinger, Ethics in Engineering,4th edition, Tata McGraw Hill
Publishing Company Pvt Ltd, New Delhi,2014.
2. Charles D Fleddermann, Engineering Ethics, Pearson Education/ Prentice Hall of India, New
Jersey,2004.
3. Charles E Harris, Michael S Protchard and Michael J Rabins, Engineering Ethics- Concepts and
cases, Wadsworth Thompson Learning, United states,2005.
4. http://www.slideword.org/slidestag.aspx/human-values-and-Professional-ethics.
HUMANITIES
SEMESTER -4
HUMANITIES
CODE COURSE NAME CATEGORY L T P CREDIT
MCN202 CONSTITUTION OF INDIA 2 0 0 NIL
Preamble:
The study of their own country constitution and studying the importance environment as
well as understanding their own human rights help the students to concentrate on their day
to day discipline. It also gives the knowledge and strength to face the society and people.
Prerequisite: Nil
Course Outcomes: After the completion of the course the student will be able to
PO 1 PO 2 PO 3 PO 4 PO 5 PO 6 PO 7 PO 8 PO 9 PO PO PO
10 11 12
CO 1 2 2 2 2
CO 2 3 3 3 3
CO 3 3 2 3 3
CO 4 3 2 3 3
CO 5 3 2 3 3
CO 6 3 3 3 2
Assessment Pattern
Mark distribution
Attendance : 10 marks
Continuous Assessment Test (2 numbers) : 25 marks
Assignment/Quiz/Course project : 15 marks
End Semester Examination Pattern: There will be two parts; Part A and Part B. Part A
contain 10 questions with 2 questions from each module, having 3 marks for each question.
Students should answer all questions. Part B contains 2 questions from each module of
which student should answer any one. Each question can have maximum 2 sub-divisions
and carry 14 marks.
Course Level Assessment Questions
2 Examine the scope of freedom of speech and expression underlying the constitution.
3 The thumb impression of an accused is taken by the police against his will. He contends
that this is a violation of his rights under Art 20(3) of the constitution. Decide.
1 Explain the powers of the President to suspend the fundamental rights during emergency.
HUMANITIES
2 Explain the salient features of appeal by special leave.
3 A state levies tax on motor vehicles used in the state, for the purpose of maintaining roads
in the state. X challenges the levy of the tax on the ground that it violates the freedom of
2 List the important principles contained in the directive principles of state policy.
PART A
(10X3=30marks)
PART B
Module 1
Module 2
13 A high court passes a judgement against X. X desires to file a writ petition in the supreme
court under Art32, on the ground that the judgement violates his fundamental rights.
Module3
16 Supreme court may in its discretion grant special leave to appeal. Examine the situation.
Module 4
18 X filed a writ petition under Art 226 which was dismissed. Subsequently, he filed a writ
petition under Art 32 of the constitution, seeking the same remedy. The Government
argued that the writ petition should be dismissed, on the ground of res judicata. Decide.
Module 5
HUMANITIES
19 Examine the scope of the financial relations between the union and the states.
Syllabus
Text Books
1 D D Basu, Introduction to the constitution of India, Lexis Nexis, New Delhi, 24e, 2019
Reference Books
1 Ministry of law and justice, The constitution of India, Govt of India, New Delhi, 2019.
2 JN Pandey, The constitutional law of India, Central Law agency, Allahabad, 51e, 2019
3 MV Pylee, India’s Constitution, S Chand and company, New Delhi, 16e, 2016
Preamble:
The purpose of this course is to
i) introduce the undergraduate engineering studentsthe fundamental principles of
design engineering,
ii) make them understand the steps involved in the design process and
iii) familiarize them with the basic tools used and approaches in design.
Students are expected to apply design thinking in learning as well as while practicing
engineering, which is very important and relevant for today. Case studies from various
practical situations will help the students realize that design is not only concerned about the
function but also many other factors like customer requirements, economics, reliability, etc.
along with a variety of life cycle issues.
The course will help students to consider aesthetics, ergonomics and sustainability factors in
designs and also to practice professional ethics while designing.
Prerequisite:
Nil.The course will be generic to all engineering disciplines and will not require specialized
preparation or prerequisites in any of the individual engineering disciplines.
Course Outcomes:
PO 1 PO 2 PO 3 PO 4 PO 5 PO 6 PO 7 PO 8 PO 9 PO PO PO
10 11 12
CO 1 2 1 1 1
CO 2 2 1 1 2
CO 3 2 1 1 2 2 1
HUMANITIES
Assessment Pattern
Attendance : 10 marks
Continuous Assessment Test (2 numbers) : 25 marks
Assignment/Quiz/Course project : 15 marks
End Semester Examination (ESE) Pattern: There will be two parts; Part A and Part B.
Part A : 30 marks
part B : 70 marks
Part A contains 10 questions with 2 questions from each module, having 3 marks for each question.
Students should answer all questions.
Part B contains 2 case study questions from each module of which student should answer any one.
Each question carry 14 marks and can have maximum 2 sub questions.
Mark distribution
Course Outcome 1 (CO1): Appreciate the different concepts and principles involved in design
engineering.
3. Describedesign thinking.
5. Write notes on the following concepts in connection with design engineering 1) Modular Design,
2) Life Cycle Design , 3) Value Engineering, 4) Concurrent Engineering, and 5) Reverse Engineering
Course Outcome 2 (CO2) Apply design thinking while learning and practicing engineering.
1. Construct the iterative process for design thinking in developing simple products like a pen,
umbrella, bag, etc.
2. Show with an example how divergent-convergent thinking helps in generating alternative designs
and then how to narrow down to the best design.
3. Describe how a problem-based learning helps in creating better design engineering solutions.
Course Outcome 3(CO3): Develop innovative, reliable, sustainable and economically viable designs
incorporating different segments of knowledge in engineering.
1. Illustratethe development of any simple product by passing through the different stages of design
process
2. Show thegraphical design communication with the help of detailed 2D or 3D drawings for any
simple product.
3. Describe how to develop new designs for simple products through bio-mimicry.
HUMANITIES
Model Question paper
Page 1 of 2
Reg No.: Name:
APJ ABDUL KALAM TECHNOLOGICAL UNIVERSITY
THIRD/FOURTH SEMESTER B.TECH DEGREE EXAMINATION
Course Code: EST 200
Course Name: DESIGN AND ENGINEERING
Max. Marks: 100Duration: 3 Hours
PART A
Answer all questions, each question carries 3 marks
Use only hand sketches
Part B
Answer any ONE question from each module. Each question carry 14 marks
Module 1
(11) Show the designing of a wrist watch going through the various stages of the design
process. Use hand sketches to illustrate the processes.
or
(12) Find the customer requirements for designing a new car showroom. Show how the
design objectives were finalized considering the design constraints?
HUMANITIES
Module 2
(13) Illustrate the design thinking approach for designing a bag for college students within a
limited budget. Describe each stage of the process and the iterative procedure
involved. Use hand sketches to support your arguments.
or
(14) Construct a number of possible designs and then refine them to narrow down to the
best design for a drug trolley used in hospitals. Show how the divergent-convergent
thinking helps in the process. Provide your rationale for each step by using hand
sketches only.
Module 3
(15) Graphically communicate the design of a thermo flask used to keep hot coffee. Draw
the detailed 2D drawings of the same with design detailing, material selection, scale
drawings, dimensions, tolerances, etc. Use only hand sketches.
or
(16) Describe the role of mathematical modelling in design engineering. Show how
mathematics and physics play a role in designing a lifting mechanism to raise 100 kg of
weight to a floor at a height of 10 meters in a construction site.
Module 4
(17) Show the development of a nature inspired design for a solar poweredbus waiting shed
beside a highway. Relate between natural and man-made designs. Use hand sketches
to support your arguments.
or
(18) Show the design of a simple sofa and then depict how the design changes when
considering 1) aesthetics and 2) ergonomics into consideration. Give hand sketches and
explanations to justify the changes in designs.
Module 5
(19) Examine the changes in the design of a foot wear with constraints of 1) production
methods, 2) life span requirement, 3) reliability issues and 4) environmental factors.
Use hand sketches and give proper rationalization for the changes in design.
or
(20) Describe the how to estimate the cost of a particular design using ANY of the following:
i) a website, ii) the layout of a plant, iii) the elevation of a building, iv) anelectrical or
electronic system or device and v) a car.
Show how economics will influence the engineering designs. Use hand sketches to support
your arguments.
Page 2 of 2
HUMANITIES
Syllabus
Module 1
Design Process:- Introduction to Design and Engineering Design, Defining a Design
Process-:Detailing Customer Requirements, Setting Design Objectives, Identifying
Constraints, Establishing Functions, Generating Design Alternatives and Choosing a
Design.
Module 2
Design Thinking Approach:-Introduction to Design Thinking, Iterative Design
Thinking Process Stages: Empathize, Define, Ideate, Prototype and Test. Design
Thinking as Divergent-Convergent Questioning. Design Thinking in a Team
Environment.
Module 3
Design Communication (Languages of Engineering Design):-Communicating
Designs Graphically, Communicating Designs Orally and in Writing. Mathematical
Modeling In Design, Prototyping and Proofing the Design.
Module 4
Design Engineering Concepts:-Project-based Learning and Problem-based Learning
in Design.Modular Design and Life Cycle Design Approaches. Application of Bio-
mimicry,Aesthetics and Ergonomics in Design. Value Engineering, Concurrent
Engineering, and Reverse Engineering in Design.
Module 5
Expediency, Economics and Environment in Design Engineering:-Design for
Production, Use, and Sustainability. Engineering Economics in Design. Design
Rights. Ethics in Design
Text Books
1) YousefHaik, SangarappillaiSivaloganathan, Tamer M. Shahin, Engineering Design Process,
Cengage Learning 2003, Third Edition, ISBN-10: 9781305253285,
2) Voland, G., Engineering by Design, Pearson India 2014, Second Edition, ISBN 9332535051
Reference Books
1. Philip Kosky, Robert Balmer, William Keat, George Wise, Exploring Engineering, Fourth
Edition: An Introduction to Engineering and Design, Academic Press 2015, 4th Edition,
ISBN: 9780128012420.
2. Clive L. Dym, Engineering Design: A Project-Based Introduction, John Wiley & Sons,
New York 2009, Fourth Edition, ISBN: 978-1-118-32458-5
3. Nigel Cross, Design Thinking: Understanding How Designers Think and Work, Berg
Publishers 2011, First Edition, ISBN: 978-1847886361
4. Pahl, G., Beitz, W., Feldhusen, J., Grote, K.-H., Engineering Design: A Systematic
Approach, Springer 2007, Third Edition, ISBN 978-1-84628-319-2
HUMANITIES
Course Contents and Lecture Schedule
No Topic No. of Lectures
1 Module 1: Design Process
1.1 Introduction to Design and Engineering Design.
What does it mean to design something? How Is
engineering design different from other kinds of design? 1
Where and when do engineers design? What are the basic
vocabularyin engineering design? How to learn and do
engineering design.
1.2 Defining a Design Process-: Detailing Customer
Requirements.
How to do engineering design? Illustrate the process with 1
an example. How to identify the customer requirements of
design?
1.3 Defining a Design Process-: Setting Design Objectives,
Identifying Constraints, Establishing Functions.
How to finalize the design objectives? How to identify the 1
design constraints? How to express the functions a design
in engineering terms?
1.4 Defining a Design Process-: Generating Design
Alternatives and Choosing a Design.
1
How to generate or create feasible design alternatives?
How to identify the "best possible design”?
1.5 Case Studies:- Stages of Design Process.
Conduct exercises for designing simple products going 1
through the different stages of design process.
2 Module 2: Design Thinking Approach
2.1 Introduction to Design Thinking
How does the design thinking approach help engineers in 1
creating innovative and efficient designs?
2.2 Iterative Design Thinking Process Stages: Empathize,
Define, Ideate, Prototype and Test.
How can the engineers arrive at better designs utilizing 1
the iterative design thinking process (in which knowledge
acquired in the later stages can be applied back to the
earlier stages)?
2.3 Design Thinking as Divergent-Convergent Questioning.
Describe how to create a number of possible designs and 1
then how to refine and narrow down to the 'best design'.
2.4 Design Thinking in a Team Environment.
How to perform design thinking as a team managing the 1
conflicts ?
2.5 Case Studies: Design Thinking Approach.
1
Conduct exercises using the design thinking approach for
HUMANITIES
designing any simple products within a limited time and
budget
3 Module 3: Design Communication (Languages of Engineering Design)
3.1 Communicating Designs Graphically.
1
How do engineering sketches and drawings convey designs?
3.2 Communicating Designs Orally and in Writing.
How can a design be communicated through oral 1
presentation or technical reports efficiently?
First Series Examination
3.3 Mathematical Modelling in Design.
How do mathematics and physics become a part of the 1
design process?
3.4 Prototyping and Proofing the Design.
1
How to predict whether the design will function well or not?
3.5 Case Studies: Communicating Designs Graphically.
Conduct exercises for design communication through
detailed 2D or 3D drawings of simple products with 1
design detailing, material selection, scale drawings,
dimensions, tolerances, etc.
4 Module 4: Design Engineering Concepts
4.1 Project-based Learning and Problem-based Learning in 1
Design.
How engineering students can learn design engineering
through projects?
How students can take up problems to learn design
engineering?
4.2 Modular Design and Life Cycle Design Approaches. 1
What is modular approach in design engineering? How it
helps?
How the life cycle design approach influences design
decisions?
4.3 Application of Bio-mimicry, Aesthetics and Ergonomics 1
in Design.
How do aesthetics and ergonomics change engineering
designs?
How do the intelligence in nature inspire engineering
designs? What are the common examples of bio-mimicry
in engineering?
4.4 Value Engineering, Concurrent Engineering, and Reverse 1
Engineering in Design.
How do concepts like value engineering , concurrent
engineering and reverse engineering influence
engineering designs?
4.5 Case Studies: Bio-mimicry based Designs. 1
Conduct exercises to develop new designs for simple
HUMANITIES
products using bio-mimicry and train students to bring out
new nature inspired designs.
5 Module 5: Expediency, Economics and Environment in Design
Engineering
5.1 Design for Production, Use, and Sustainability. 1
How designs are finalized based on the aspects of
production methods, life span, reliability and
environment?
5.2 Engineering Economics in Design. 1
How to estimate the cost of a particular design and how
will economics influence the engineering designs?
5.3 Design Rights. 1
What are design rights and how can an engineer put it
into practice?
5.4 Ethics in Design. 1
How do ethics play a decisive role in engineering design?
5.5 Case Studies: Design for Production, Use, and 1
Sustainability.
Conduct exercises using simple products to show how designs
change with constraints of production methods, life span
requirement, reliability issues and environmental factors.
Second Series Examination
HUMANITIES
Course Outcomes: After the completion of the course the student will be able to
CO 1 Understand the core values that shape the ethical behaviour of a professional.
CO 2 Adopt a good character and follow an ethical life.
Explain the role and responsibility in technological development by keeping personal ethics
CO 3 and legal ethics.
Solve moral and ethical problems through exploration and assessment by established
CO 4 experiments.
Apply the knowledge of human values and social values to contemporary ethical values and
CO 5 global issues.
Assessment Pattern
Continuous Assessment Tests
Bloom’s category End Semester Exam
1 2
Remember 15 15 30
Understood 20 20 40
Apply 15 15 30
Mark distribution
Total
CIE ESE ESE Duration
Marks
End Semester Examination Pattern: There will be two parts; Part A and Part B. Part A contains 10 questions
with 2 questions from each module, having 3 marks for each question. Students should answer all questions.
Part B contains 2 questions from each module of which student should answer any one. Each question can have
maximum 2 sub-divisions and carry 14 marks.
PAGES:3 Name : _
PART A
8. Recall confidentiality.
10. Name any three professional societies and their role relevant to engineers.
(10x3 = 30 marks)
PART B
(Answer one full question from each module, each question carries 14 marks)
MODULE I
Or
12. a) Exemplify a comprehensive review about integrity and respect for others.
HUMANITIES
b) Discuss about co-operation and commitment. (8+6 = 14 marks)
MODULE II
13.a) Explain the three main levels of moral developments, deviced by Kohlberg.
Or
b) Discuss in detail the three types of inquiries in engineering ethics (8+6 = 14 marks)
MODULE III
Or
MODULE IV
20. a) Investigate the causes and effects of acid rain with a case study.
b) Conclude the features of ecocentric and biocentric ethics. (8+6 = 14 marks)
HUMANITIES
Syllabus
Morals, values and Ethics – Integrity- Academic integrity-Work Ethics- Service Learning- Civic Virtue-
Respect for others- Living peacefully- Caring and Sharing- Honestly- courage-Cooperation commitment-
Empathy-Self Confidence -Social Expectations.
Senses of Engineering Ethics - Variety of moral issues- Types of inquiry- Moral dilemmas –Moral Autonomy –
Kohlberg’s theory- Gilligan’s theory- Consensus and Controversy-Profession and Professionalism- Models of
professional roles-Theories about right action –Self interest-Customs and Religion- Uses of Ethical Theories.
Collegiality and loyalty – Managing conflict- Respect for authority- Collective bargaining- Confidentiality-
Role of confidentiality in moral integrity-Conflicts of interest- Occupational crime- Professional rights-
Employee right- IPR Discrimination.
Multinational Corporations- Environmental Ethics- Business Ethics- Computer Ethics -Role in Technological
Development-Engineers as Managers- Consulting Engineers- Engineers as Expert witnesses and advisors-Moral
leadership.
Text Book
2. R S Naagarazan, A text book on professional ethics and human values, New age international
(P) limited ,New Delhi,2006.
Reference Books
1. Mike W Martin and Roland Schinzinger, Ethics in Engineering,4th edition, Tata McGraw Hill
Publishing Company Pvt Ltd, New Delhi,2014.
2. Charles D Fleddermann, Engineering Ethics, Pearson Education/ Prentice Hall of India, New
Jersey,2004.
3. Charles E Harris, Michael S Protchard and Michael J Rabins, Engineering Ethics- Concepts and
cases, Wadsworth Thompson Learning, United states,2005.
4. http://www.slideword.org/slidestag.aspx/human-values-and-Professional-ethics.
HUMANITIES
SEMESTER V
Course
Sl. No Course L-T-P Category Page No
Code
FORMAL LANGUAGES AND
1 CST 301 3-1-0 PCC 4
AUTOMATA THEORY
2 CST 303 COMPUTER NETWORKS 3-1-0 PCC 16
3 CST 305 SYSTEM SOFTWARE 3-1-0 PCC 28
MICROPROCESSORS AND
4 CST 307 3-1-0 PCC 39
MICROCONTROLLERS
MANAGEMENTOF
5 CST 309 3-0-0 PCC 49
SOFTWARE SYSTEMS
SYSTEM SOFTWARE AND
7 CSL 331 0-0-4 PCC 61
MICROPROCESSORS LAB
DATABASE MANAGEMENT
8 CSL 333 0-0-4 PCC 66
SYSTEMS LAB
CONCEPTS IN SOFTWARE
9 CST 381 3-1-0 Minor 74
ENGINEERING
CONCEPTS IN MACHINE
10 CST 383 3-1-0 Minor 85
LEARNING
11 CST 385 CLIENT SERVER SYSTEMS 3-1-0 Minor 99
CRYPTOGRAPHIC
12 CST 393 3-1-0 Honours 110
ALGORITHMS
NEURAL NETWORKS AND
13 CST 395 3-1-0 Honours 122
DEEP LEARNING
PRINCIPLES OF MODEL
14 CST 397 3-1-0 Honours 135
CHECKING
1
COMPUTER
SEMESTER SCIENCE
VI AND ENGINEERING
Course
Sl. No Course L-T-P Category Page No
Code
1 CST 302 COMPILER DESIGN 3-1-0 PCC 147
COMPUTER GRAPHICS AND
2 CST 304 3-1-0 PCC 158
IMAGE PROCESSING
ALGORITHM ANALYSIS AND
3 CST 306 3-1-0 PCC 170
DESIGN
COMPREHENSIVE COURSE
4 CST 308 1-0-0 PCC 184
WORK
5 CSL 332 NETWORKING LAB 0-0-3 PCC 197
6 CSD 334 MINI PROJECT 0-0-3 PCC 203
FOUNDATIONSOF
7 CST 312 2-1-0 PEC 209
MACHINE LEARNING
8 CST 322 DATA ANALYTICS 2-1-0 PEC 225
FOUNDATIONS OF SECURITY
9 CST 332 2-1-0 PEC 238
IN COMPUTING
AUTOMATED
10 CST 342 2-1-0 PEC 248
VERIFICATION
11 CSL 362 PROGRAMMING IN PYTHON 2-1-0 PEC 258
DATA AND COMPUTER
12 CST 372 2-1-0 PEC 270
COMMUNICATION
INTRODUCTION TO
13 CST 382 3-1-0 Minor 184
SOFTWARE TESTING
CONCEPTS IN DEEP
14 CST 384 3-1-0 Minor 295
LEARNING
WIRELESS NETWORKS AND
15 CST 386 3-1-0 Minor 309
IOT APPLICATIONS
16 CST 394 NETWORK SECURITY 3-1-0 Honours 321
ADVANCED TOPICS IN
17 CST 396 3-1-0 Honours 333
MACHINE LEARNING
THEORY OF COMPUTABILITY
18 CST 398 3-1-0 Honours 349
AND COMPLEXITY
2
COMPUTER SCIENCE AND ENGINEERING
SEMESTER V
3
COMPUTER SCIENCE AND ENGINEERING
FORMAL Year of
Category L T P Credit
CST LANGUAGES AND Introduction
301 AUTOMATA
THEORY PCC 3 1 0 4 2019
Preamble: This is a core course in theoretical computer science. It covers automata and
grammar representations for languages in Chomsky Hierarchy. For regular languages, it also
covers representations using regular expression and Myhill-Nerode Relation. The topics
covered in this course have applications in various domains including compiler design,
decidability and complexity theory, software testing, formal modelling and verification of
hardware and software.
Prerequisite: Basic knowledge about the following topic is assumed: sets, relations -
equivalence relations, functions, proof by Principle of Mathematical Induction.
Course Outcomes: After the completion of the course the student will be able to
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO1 PO11 PO1
0 2
CO1
4
COMPUTER SCIENCE AND ENGINEERING
CO2
CO3
CO4
CO5
Assessment Pattern
Remember 30 30 30
Understand 30 30 30
Apply 40 40 40
Analyze
Evaluate
Create
5
COMPUTER SCIENCE AND ENGINEERING
Mark Distribution
Each of the two internal examinations has to be conducted out of 50 marks. The first series test
shall be preferably conducted after completing the first half of the syllabus and the second
series test shall be preferably conducted after completing the remaining part of the syllabus.
There will be two parts: Part A and Part B. Part A contains 5 questions (preferably, 2 questions
each from the completed modules and 1 question from the partly completed module), having 3
marks for each question adding up to 15 marks for part A. Students should answer all questions
from Part A. Part B contains 7 questions (preferably, 3 questions each from the completed
modules and 1 question from the partly completed module), each with 7 marks. Out of the 7
questions, a student should answer any 5.
There will be two parts; Part A and Part B. Part A contains 10 questions with 2 questions from
each module, having 3 marks for each question. Students should answer all questions. Part B
contains 2 questions from each module of which a student should answer any one. Each
question can have maximum 2 sub-divisions and carries 14 marks.
6
COMPUTER SCIENCE AND ENGINEERING
Syllabus
Myhill-Nerode Relations (MNR)- MNR for regular languages, Myhill-Nerode Theorem (MNT)
(No proof required), Applications of MNT.
Context Free Grammar (CFG)- CFG representation of Context Free Languages (proof of
correctness is required), derivation trees and ambiguity, Normal forms for CFGs.
Context Sensitive Languages - Context Sensitive Grammar (CSG), Linear Bounded Automata.
Turing Machines - Standard Turing Machine, Robustness of Turing Machine, Universal Turing
Machine, Halting Problem, Recursive and Recursively Enumerable Languages.
Text Book
7
COMPUTER SCIENCE AND ENGINEERING
Reference Materials
1. John E Hopcroft, Rajeev Motwani and Jeffrey D Ullman, Introduction to Automata Theory,
Languages, and Computation, 3/e, Pearson Education, 2007
2. Michael Sipser, Introduction To Theory of Computation, Cengage Publishers, 2013.
Course Outcome 1 (CO1): Identify the class of the following languages in Chomsky
Hierarchy:
• 𝐿𝐿1 = {𝑎𝑎𝑝𝑝 |𝑝𝑝𝑝𝑝𝑝𝑝 𝑎𝑎 𝑝𝑝𝑝𝑝𝑝𝑝𝑝𝑝𝑝𝑝 𝑛𝑛𝑛𝑛𝑛𝑛𝑛𝑛𝑛𝑛𝑛𝑛}
• 𝐿𝐿2 =
{𝑥𝑥{0,1}∗ |𝑥𝑥𝑥𝑥𝑥𝑥 𝑡𝑡ℎ𝑒𝑒 𝑏𝑏𝑏𝑏𝑏𝑏𝑏𝑏𝑏𝑏𝑏𝑏 𝑟𝑟𝑟𝑟𝑟𝑟𝑟𝑟𝑟𝑟𝑟𝑟𝑟𝑟𝑟𝑟𝑟𝑟𝑟𝑟𝑟𝑟𝑟𝑟𝑟𝑟𝑟𝑟 𝑜𝑜𝑜𝑜 𝑎𝑎 𝑑𝑑𝑑𝑑𝑑𝑑𝑑𝑑𝑑𝑑𝑑𝑑𝑑𝑑 𝑛𝑛𝑛𝑛𝑛𝑛𝑛𝑛𝑛𝑛𝑛𝑛 𝑤𝑤ℎ𝑖𝑖𝑖𝑖ℎ 𝑖𝑖𝑖𝑖 𝑎𝑎 𝑚𝑚𝑚𝑚𝑚𝑚𝑚𝑚𝑚𝑚𝑚𝑚𝑚𝑚𝑚𝑚 𝑜𝑜𝑜𝑜5}
• 𝐿𝐿3 = {𝑎𝑎𝑛𝑛 𝑏𝑏 𝑛𝑛 𝑐𝑐 𝑛𝑛 |𝑛𝑛 ≥ 0}
• 𝐿𝐿4 = {𝑎𝑎𝑚𝑚 𝑏𝑏 𝑛𝑛 𝑐𝑐 𝑚𝑚 +𝑛𝑛 |𝑚𝑚 > 0, 𝑛𝑛 ≥ 0}
• 𝐿𝐿5 = {𝑀𝑀#𝑥𝑥|𝑀𝑀ℎ𝑎𝑎𝑎𝑎𝑎𝑎𝑎𝑎 𝑜𝑜𝑜𝑜𝑜𝑜}. Here, 𝑀𝑀 is a binary encoding of a Turing Machine and 𝑥𝑥 is a
binary input to the Turing Machine.
Course Outcome 2 (CO2):
(i) Design a DFA for the language 𝐿𝐿 = {𝑎𝑎𝑎𝑎𝑎𝑎|𝑥𝑥 ∈ {𝑎𝑎, 𝑏𝑏}∗ }
(ii) Write a Regular Expression for the
language:𝐿𝐿 = {𝑥𝑥 ∈ {𝑎𝑎, 𝑏𝑏}∗ |𝑡𝑡ℎ𝑖𝑖𝑖𝑖𝑖𝑖 𝑙𝑙𝑙𝑙𝑙𝑙𝑙𝑙 𝑠𝑠𝑠𝑠𝑠𝑠𝑠𝑠𝑠𝑠𝑠𝑠 𝑖𝑖𝑖𝑖 𝑥𝑥 𝑖𝑖𝑖𝑖 𝑏𝑏}
(iii) Write a Regular Grammar for the
language:𝐿𝐿 = {𝑥𝑥 ∈ {0,1}∗ |𝑡𝑡ℎ𝑒𝑒𝑒𝑒𝑒𝑒 𝑎𝑎𝑎𝑎𝑎𝑎 𝑛𝑛𝑛𝑛 𝑐𝑐𝑐𝑐𝑐𝑐𝑐𝑐𝑐𝑐𝑐𝑐𝑐𝑐𝑐𝑐𝑐𝑐𝑣𝑣𝑣𝑣 𝑧𝑧𝑧𝑧𝑧𝑧𝑧𝑧𝑧𝑧 𝑖𝑖𝑖𝑖𝑖𝑖}
(iv) Show the equivalence classes of the canonical Myhill-Nerode relation induced by the
language: 𝐿𝐿 = {𝑥𝑥 ∈ {𝑎𝑎, 𝑏𝑏}∗ |𝑥𝑥𝑥𝑥𝑥𝑥𝑥𝑥𝑥𝑥𝑥𝑥𝑥𝑥𝑥𝑥𝑥𝑥 𝑒𝑒𝑒𝑒𝑒𝑒𝑒𝑒 𝑛𝑛𝑛𝑛𝑛𝑛𝑛𝑛𝑛𝑛𝑛𝑛 𝑜𝑜𝑜𝑜𝑜𝑜′𝑠𝑠 𝑎𝑎𝑎𝑎𝑎𝑎 𝑜𝑜𝑜𝑜𝑜𝑜 𝑛𝑛𝑛𝑛𝑛𝑛𝑛𝑛𝑛𝑛𝑛𝑛 𝑜𝑜𝑜𝑜𝑜𝑜′𝑠𝑠}.
Course Outcome 3 (CO3):
(i) Design a PDA for the language𝐿𝐿 = {𝑤𝑤𝑤𝑤 𝑅𝑅 |𝑤𝑤 ∈ {𝑎𝑎, 𝑏𝑏}∗ }. Here, the notation 𝑤𝑤 𝑅𝑅
represents the reverse of the string 𝑤𝑤.
(ii) Write a Context-Free Grammar for the language 𝐿𝐿 = {𝑎𝑎𝑛𝑛 𝑏𝑏 2𝑛𝑛 |𝑛𝑛 ≥ 0}.
Course Outcome 4 (CO4):
(i) Design a Turing Machine for the language 𝐿𝐿 = {𝑎𝑎𝑛𝑛 𝑏𝑏 𝑛𝑛 𝑐𝑐 𝑛𝑛 |𝑛𝑛 ≥ 0}
(ii) Design a Turing Machine to compute the square of a natural number. Assume that the
input is provided in unary representation.
Course Outcome 5 (CO5): Argue that it is undecidable to check whether a Turing
Machine 𝑀𝑀enters a given state during the computation of a given input 𝑥𝑥.
8
COMPUTER SCIENCE AND ENGINEERING
1. Design a DFA for the language 𝐿𝐿 = {𝑥𝑥 ∈ {𝑎𝑎, 𝑏𝑏}∗ |𝑎𝑎𝑎𝑎𝑎𝑎 𝑖𝑖𝑖𝑖 𝑛𝑛𝑛𝑛𝑛𝑛 𝑎𝑎 𝑠𝑠𝑠𝑠𝑠𝑠𝑠𝑠𝑠𝑠𝑠𝑠𝑠𝑠𝑠𝑠𝑠𝑠 𝑖𝑖𝑖𝑖 𝑥𝑥}.
4. Prove that the language 𝐿𝐿1 = {𝑎𝑎𝑛𝑛! |𝑛𝑛 ∈ 𝑁𝑁} is not regular.
6. Write a Context-Free Grammar for the language: 𝐿𝐿 = {𝑥𝑥 ∈ {𝑎𝑎, 𝑏𝑏}∗ |#𝑎𝑎 (𝑥𝑥) =
#𝑏𝑏 (𝑥𝑥)}. Here, the notation #1 (𝑤𝑤) represents the number of occurrences of the
symbol 1 in the string 𝑤𝑤.
7. Design a PDA for the language of odd length binary palindromes (no explanation
is required, just list the transitions in the PDA).
8. Prove that Context Free Languages are closed under set union.
9. Write a Context Sensitive Grammar for the language 𝐿𝐿 = {𝑎𝑎𝑛𝑛 𝑏𝑏 𝑛𝑛 𝑐𝑐 𝑛𝑛 |𝑛𝑛 ≥ 0} (no
explanation is required, just write the set of productions in the grammar).
9
COMPUTER SCIENCE AND ENGINEERING
Part B
(Answer any one question from each module. Each question carries 14
Marks)
11. (a) Draw the state-transition diagram showing an NFA 𝑁𝑁 for the following
language 𝐿𝐿. Obtain the DFA𝐷𝐷 equivalent to 𝑁𝑁 by applying the subset (7)
construction algorithm.
𝐿𝐿 = {𝑥𝑥 ∈ {𝑎𝑎, 𝑏𝑏}∗ |𝑡𝑡ℎ𝑒𝑒 𝑠𝑠𝑠𝑠𝑠𝑠𝑠𝑠𝑠𝑠𝑠𝑠 𝑙𝑙𝑙𝑙𝑙𝑙𝑙𝑙 𝑠𝑠𝑠𝑠𝑠𝑠𝑠𝑠𝑠𝑠𝑠𝑠 𝑖𝑖𝑖𝑖 𝑥𝑥 𝑖𝑖𝑖𝑖 𝑏𝑏}
(b) Draw the state-transition diagram showing a DFA for recognizing the
following language: (7)
OR
12. (a) Write a Regular grammar 𝐺𝐺 for the following language 𝐿𝐿defined as: 𝐿𝐿 =
{𝑥𝑥 ∈ {𝑎𝑎, 𝑏𝑏}∗ |𝑥𝑥𝑥𝑥𝑥𝑥𝑥𝑥𝑥𝑥 𝑛𝑛𝑛𝑛𝑛𝑛 𝑐𝑐𝑐𝑐𝑐𝑐𝑐𝑐𝑐𝑐𝑐𝑐𝑐𝑐 𝑐𝑐𝑐𝑐𝑐𝑐𝑐𝑐𝑐𝑐𝑐𝑐𝑐𝑐𝑐𝑐𝑐𝑐𝑐𝑐𝑐𝑐𝑐𝑐′𝑠𝑠}. (7)
(b) Obtain the DFA 𝐴𝐴𝐺𝐺 over the alphabet set 𝛴𝛴 = {𝑎𝑎, 𝑏𝑏}, equivalent to the regular (7)
grammar 𝐺𝐺 with start symbol 𝑆𝑆 and productions: 𝑆𝑆 → 𝑎𝑎𝑎𝑎 and 𝐴𝐴 → 𝑎𝑎𝑎𝑎|𝑏𝑏𝑏𝑏|𝑏𝑏.
13. (a) Using Kleen’s construction, obtain the regular expression for the language
represented by the following NFA
(8)
(b) Using pumping lemma for regular languages, prove that the language
𝐿𝐿 = {𝑎𝑎𝑛𝑛 𝑏𝑏 𝑛𝑛 |𝑛𝑛 ≥ 0} is not regular. (7)
OR
10
COMPUTER SCIENCE AND ENGINEERING
(b) Using ultimate periodicity for regular languages, prove that the language (6)
𝑛𝑛 2
𝐿𝐿 = {𝑎𝑎 |𝑛𝑛 ≥ 0} is not regular.
15. (a) Show the equivalence classes of the canonical Myhill-Nerode relation for the (7)
language of binary strings with odd number of 1′s and even number of 0s.
OR
16. (a) Convert the Context-Free Grammar with productions: {𝑆𝑆 → 𝑎𝑎𝑎𝑎𝑎𝑎|𝜖𝜖} into
Greibach Normal form. (8)
(b) Convert the Context-Free Grammar with productions: {𝑆𝑆 → 𝑎𝑎𝑎𝑎𝑎𝑎|𝑏𝑏𝑏𝑏𝑏𝑏|𝑆𝑆𝑆𝑆|𝜖𝜖} (6)
into Chomsky Normal form.
17. (a) Design a PDA for the language 𝐿𝐿 = {𝑎𝑎𝑚𝑚 𝑏𝑏 𝑛𝑛 𝑐𝑐 𝑚𝑚 +𝑛𝑛 |𝑛𝑛 ≥ 0, 𝑚𝑚 ≥ 0}. Also (7)
illustrate the computation of the PDA on a string in the language
(b) With an example illustrate how a multi-state PDA can be transformed into an (7)
equivalent single-state PDA.
OR
11
COMPUTER SCIENCE AND ENGINEERING
18. (a) Using pumping lemma for context-free languages, prove that the language: (6)
𝐿𝐿 = {𝑤𝑤𝑤𝑤|𝑤𝑤 ∈ {𝑎𝑎, 𝑏𝑏}∗ } is not a context-free language.
(b) With an example illustrate how a CFG can be converted to a single-state PDA (8)
19. (a) Design a Turing machine to obtain the sum of two natural numbers 𝑎𝑎 and 𝑏𝑏, (7)
both represented in unary on the alphabet set {1}. Assume that initially the
𝜔𝜔 𝜔𝜔
tape contains ⊢ 1𝑎𝑎 01𝑏𝑏 ♭ . The Turing Machine should halt with ⊢ 1𝑎𝑎+𝑏𝑏 ♭
as the tape content. Also, illustrate the computation of your Turing Machine
on the input 𝑎𝑎 = 3and 𝑏𝑏 = 2.
(b) With an example illustrate how a CFG can be converted to a single-state (7)
PDA.
OR
20. (a) Design a Turing machine to obtain the sum of two natural numbers 𝑎𝑎and 𝑏𝑏, (7)
both represented in unary on the alphabet set {1}. Assume that initially the
𝜔𝜔 𝜔𝜔
tape contains ⊢ 1𝑎𝑎 01𝑏𝑏 ♭ . The Turing Machine should halt with ⊢ 1𝑎𝑎+𝑏𝑏 ♭
as the tape content. Also, illustrate the computation of your Turing Machine
on the input 𝑎𝑎 = 3and 𝑏𝑏 = 2.
(b) Write a context sensitive grammar for the language 𝐿𝐿 = {𝑎𝑎𝑛𝑛 𝑏𝑏 𝑛𝑛 𝑐𝑐 𝑛𝑛 |𝑛𝑛 ≥ 0}. (7 )
Also illustrate how the the string 𝑎𝑎2 𝑏𝑏 2 𝑐𝑐 2 can be derived from the start symbol
of the proposed grammar.
12
COMPUTER SCIENCE AND ENGINEERING
Teaching Plan
1.3 Formal definition of DFA, Language accepted by the class of DFA 1 Hour
2.1 Regular Expression (RE) - Example REs and formal definition 1 Hour
13
COMPUTER SCIENCE AND ENGINEERING
3.6 Context Free Grammar (CFG) - Example CFGs and formal definition 1 Hour
4.7 Pumping Lemma for context-free languages (No proof required) 1 Hour
14
COMPUTER SCIENCE AND ENGINEERING
5.2 Linear Bounded Automata (LBA) - Example LBA, formal definition 1 Hour
15
COMPUTER SCIENCE AND ENGINEERING
Year of
CST COMPUTER Category L T P Credit
Introduction
303 NETWORKS
PCC 3 1 0 4 2019
Preamble: Study of this course provides the learners a clear understanding of how computer
networks from local area networks to the massive and global Internet are built, how they allow
computers to share information and communicate with one another. This course covers the
physical aspects of computer networks, layers of OSI Reference model, and inter-networking.
The course helps the learners to compare and analyze the existing network technologies and
choose a suitable network design for a given system.
Prerequisite: Nil
Course Outcomes: After the completion of the course, the student will be able to
Describe the fundamental characteristics of the physical layer and identify the
CO2 usage in network communication (Cognitive Knowledge: Apply)
Explain the design issues of data link layer, link layer protocols, bridges and
CO3 switches (Cognitive Knowledge: Understand)
Illustrate wired LAN protocols (IEEE 802.3) and wireless LAN protocols (IEEE
CO4 802.11) (Cognitive Knowledge: Understand)
CO6 Illustrate the functions and protocols of the network layer, transport layer, and
application layer in inter-networking (Cognitive Knowledge: Understand)
16
COMPUTER SCIENCE AND ENGINEERING
PO1
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO12
1
CO1
CO2
CO3
CO4
CO5
CO6
Assessment Pattern
End Semester
Test 1 (Marks in Test 2 (Marks
Bloom’s Category Examination (Marks in
percentage) in percentage)
percentage)
Remember 40 30 30
17
COMPUTER SCIENCE AND ENGINEERING
Understand 50 50 50
Apply 10 20 20
Analyze
Evaluate
Create
Mark Distribution
ESE
Total Marks CIE Marks ESE Marks
Duration
150 50 100 3
Attendance : 10 marks
Continuous Assessment Test : 25 marks
Continuous Assessment Assignment : 15 marks
Each of the two internal examinations has to be conducted out of 50 marks. The first series test
shall be preferably conducted after completing the first half of the syllabus. The second series
test shall be preferably conducted after completing the remaining part of the syllabus. There
will be two parts: Part A and Part B. Part A contains 5 questions (preferably, 2 questions each
from the completed modules and 1 question from the partly completed module), having 3
marks for each question adding up to 15 marks for part A. Students should answer all questions
from Part A. Part B contains 7 questions (preferably, 3 questions each from the completed
modules and 1 question from the partly completed module), each with 7 marks. Out of the 7
questions, a student should answer any 5.
There will be two parts; Part A and Part B. Part A contains 10 questions with 2 questions from
each module, having 3 marks for each question. Students should answer all questions. Part B
contains 2 questions from each module of which a student should answer anyone. Each
question can have maximum 2 sub-divisions and carries 14 marks.
18
COMPUTER SCIENCE AND ENGINEERING
Syllabus
Physical Layer – Modes of communication, Physical topologies, Signal encoding, Repeaters and
hub, Transmission media overview. Performance indicators – Bandwidth, Throughput, Latency,
Queuing time, Bandwidth–Delay product.
Data link layer - Data link layer design issues, Error detection and correction, Sliding window
protocols, High-Level Data Link Control(HDLC)protocol. Medium Access Control (MAC)
sublayer –Channel allocation problem, Multiple access protocols, Ethernet, Wireless LANs -
802.11, Bridges & switches - Bridges from 802.x to 802.y, Repeaters, Hubs, Bridges, Switches,
Routers and Gateways.
Network layer design issues. Routing algorithms - The Optimality Principle, Shortest path
routing, Flooding, Distance Vector Routing, Link State Routing, Multicast routing, Routing for
mobile hosts. Congestion control algorithms. Quality of Service (QoS) - requirements,
Techniques for achieving good QoS.
Transport service – Services provided to the upper layers, Transport service primitives. User
Datagram Protocol (UDP). Transmission Control Protocol (TCP) – Overview of TCP, TCP
segment header, Connection establishment &release, Connection management modeling, TCP
retransmission policy, TCP congestion control.
Application Layer –File Transfer Protocol (FTP), Domain Name System (DNS), Electronic
mail, Multipurpose Internet Mail Extension (MIME), Simple Network Management Protocol
19
COMPUTER SCIENCE AND ENGINEERING
Text Books
Reference Books
1. Larry L Peterson and Bruce S Dave, Computer Networks – A Systems Approach, 5/e,
Morgan Kaufmann.
2. Fred Halsall, Computer Networking and the Internet, 5/e.
3. James F. Kurose, Keith W. Ross, Computer Networking: A Top-Down Approach, 6/e.
4. Keshav, An Engineering Approach to Computer Networks, Addison Wesley, 1998.
5. W. Richard Stevens. TCP/IP Illustrated Volume 1, Addison-Wesley, 2005.
6. William Stallings, Computer Networking with Internet Protocols, Prentice-Hall, 2004.
7. Request for Comments (RFC) Pages - IETF -https://www.ietf.org/rfc.html
20
COMPUTER SCIENCE AND ENGINEERING
and from E: (7, 6, 3, 9, 0, 4). The measured delays from C to B, D, and E, are 6, 3, and
5, respectively. What is C’s new routing table? Give both the outgoing line to use and
the expected delay.
21
COMPUTER SCIENCE AND ENGINEERING
3. Data link protocols almost always put the CRC in a trailer rather than in a header.
Why?
6. Describe two major differences between the warning bit method and the
Random Early Detection (RED) method.
7. The Protocol field used in the IPv4 header is not present in the fixed IPv6 header.
Why?
8. How many octets does the smallest possible IPv6 (IP version 6) datagram contain?
10. When Web pages are sent out, they are prefixed by MIME headers. Why?
(10x3=30)
Part B
(Answer any one question from each module. Each question carries 14
Marks)
11. (a) With a neat diagram, explain Open Systems Interconnection (OSI) Reference
Model. (8)
(b) Compare Twisted Pair, Coaxial Cable and Optical Fibre guided transmission
media. (6)
OR
12. (a) Consider two networks providing reliable connection-oriented service. One
of them offers a reliable byte stream and the other offers a reliable message (8)
stream. Are they identical? Justify your answer.
(b) Sketch the waveform in Manchester and Differential Manchester Encoding (6)
for the bitstream 11000110010.
22
COMPUTER SCIENCE AND ENGINEERING
13. (a) A bit stream 10011101 is transmitted using the standard CRC method. The
generator polynomial is 𝑥𝑥3 + 1. Show the actual bit string transmitted.
Suppose the third bit from the left is inverted during transmission. Show that
this error is detected at the receiver's end.
(8)
(b) Explain the working of High-Level Data Link Control (HDLC) protocol.
(6)
OR
14. (a) Explain the working of IEEE 802.11 MAC sublayer. (10)
15. (a) Illustrate Distance Vector Routing algorithm with an example. (8)
OR
16. (a) A computer on a 6-Mbps network is regulated by a token bucket. The token
bucket is filled at a rate of 1 Mbps. It is initially filled to capacity with 8 (8)
megabits. How long can the computer transmit at the full 6 Mbps?
17. (a) Explain the address resolution problem using Address Resolution Protocol (10)
(ARP) and Reverse Address Resolution Protocol (RARP)with an example
network.
(b) A network on the Internet has a subnet mask of 255.255.240.0. What is the (4)
maximum number of hosts it can handle?
OR
18. (a) How do you subnet the Class C IP address 195.1.1.0 so as to have 10 subnets (6)
with a maximum of 12 hosts in each subnet.
(b) Draw IPv6 Datagram format and explain its features. (8)
19. (a) Distinguish the header formats of Transmission Control protocol (TCP) and (8)
User Datagram Protocol (UDP).
(b) Explain the principal Domain Name System (DNS) resource record types for (6)
23
COMPUTER SCIENCE AND ENGINEERING
IPv4.
OR
20. (a) What is the role of Simple Mail Transfer Protocol (SMTP) in E- mail? (6)
(b) With the help of a basic model, explain the working of World Wide Web (8 )
(WWW).
Teaching Plan
No Contents No of
Lecture
Hrs
1.2 Network Hardware, Local Area Networks (LAN), Metropolitan Area 1 hour
Networks (MAN), Wide Area Networks (WAN), Wireless networks, Home
networks, Internetworks.
1.3 Network Software, Protocol hierarchies, Design issues for the layers. 1 hour
1.6 The TCP/IP reference model, Comparisonof OSI and TCP/IP reference 1 hour
models.
1.7 Physical layer, Modes of communication, Simplex, Half-duplex, and Full- 1 hour
duplex, Physical topologies, Mesh, Star, Bus, Ring, Hybrid.
1.9 Transmission media overview, Guided media (twisted pair, coaxial and 1 hour
fiber optic media), Unguided/wireless media (radio, microwave, and
infrared).
1.10 Performance indicators, Bandwidth (in Hertz and in Bits per Seconds), 1 hour
24
COMPUTER SCIENCE AND ENGINEERING
2.6 Medium Access Control (MAC) sublayer, Channel allocation problem, 1 hour
Multiple access protocols.
2.7 Ethernet, Ethernet cabling, Manchester encoding, Ethernet MAC sublayer 1 hour
protocol, Binary Exponential Backoff algorithm.
2.8 Ethernet performance, Switched Ethernet, Fast Ethernet, Gigabit Ethernet, 1 hour
IEEE 802.2: Logical Link Control.
2.9 Wireless LANs, 802.11 protocol stack, Physical layer, MAC Sublayer 1 hour
protocol, Frame structure.
2.10 Bridges &switches, Bridges from 802.x to 802.y, Repeaters, Hubs, 1 hour
Bridges, Switches, Routers, and Gateways.
3.2 Routing algorithms, The Optimality Principle, Shortest path routing, 1 hour
Flooding.
25
COMPUTER SCIENCE AND ENGINEERING
3.8 Quality of Service, Requirements, Techniques for achieving good Quality 1 hour
of Service.
4.4 Internet Control Message Protocol (ICMP), Address Resolution Protocol 1 hour
(ARP), Reverse Address Resolution Protocol (RARP).
4.9 IPv6, Header format, Extension headers, Internet Control Message Protocol 1 hour
version 6 (ICMPv6).
5.1 Transport Service, Services provided to the upper layers, Transport service 1 hour
primitives. User Datagram Protocol (UDP).
5.2 Transmission Control Protocol (TCP), TCP segment header, Connection 1 hour
establishment &release, Connection management modeling.
26
COMPUTER SCIENCE AND ENGINEERING
27
COMPUTER SCIENCE AND ENGINEERING
Year of
CST SYSTEM Category L T P Credit
Introduction
305 SOFTWARE
PCC 3 1 0 4 2019
Preamble:
The purpose of this course is to create awareness about the low-level codes which are very close
to the hardware and about the environment where programs can be developed and executed. This
course helps the learner to understand the machine dependent and machine independent system
software features and to design/implement system software like assembler, loader, linker,
macroprocessor and device drivers. Study of system software develops ability to design
interfaces between software applications and computer hardware.
Course Outcomes: After the completion of the course the student will be able to
CO5 Design algorithms for system softwares and analyze the effect of data structures.
(Cognitive Knowledge Level: Apply)
CO6 Understand the features of device drivers and editing & debugging tools.(Cognitive
Knowledge Level: Understand)
28
COMPUTER SCIENCE AND ENGINEERING
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO1
CO2
CO3
CO4
CO5
CO6
Design/Development of
PO3 PO9 Individual and team work
solutions
Conduct investigations of
PO4 PO10 Communication
complex problems
29
COMPUTER SCIENCE AND ENGINEERING
Assessment Pattern
Continuous Assessment End Semester
Tests Examinati
Bloom’s Category
Test 1 ( Test 2 on
%) (%) Marks(% )
Remember 30 30 30
Understand 30 30 30
Apply 40 40 40
Analyze
Evaluate
Create
Mark Distribution
ESE
Total Marks CIE Marks ESE Marks Durat
ion
150 50 100 3
Attendance : 10 marks
Continuous Assessment Test (Average of series Tests 1&2) : 25 marks
Continuous Assessment Assignment : 15 marks
Each of the two internal examinations has to be conducted out of 50 marks. First series test shall
be preferably conducted after completing the first half of the syllabus and the second series test
shall be preferably conducted after completing remaining part of the syllabus. There will be two
parts: Part A and Part B. Part A contains 5 questions (preferably, 2 questions each from the
completed modules and 1 question from the partly completed module), having 3 marks for each
question adding up to 15 marks for part A. Students should answer all questions from Part A.
Part B contains 7 questions (preferably, 3 questions each from the completed modules and 1
question from the partly completed module), each with 7 marks. Out of the 7 questions, a student
should answer any 5.
30
COMPUTER SCIENCE AND ENGINEERING
There will be two parts; Part A and Part B. Part A contains 10 questions with 2 questions from
each module, having 3 marks for each question. Students should answer all questions. Part B
contains 2 questions from each module of which a student should answer any one. Each question
can have maximum 2 sub-divisions and carry 14 marks.
Syllabus
Module-1 ( Introduction)
SIC/XE Programming, Basic Functions of Assembler, Assembler Output Format – Header, Text
and End Records. Assembler Data Structures, Two Pass Assembler Algorithm, Hand Assembly
of SIC/XE Programs.
Basic Loader Functions - Design of Absolute Loader, Simple Bootstrap Loader. Machine
Dependent Loader Features- Relocation, Program Linking, Algorithm and Data Structures of
Two Pass Linking Loader. Machine Independent Loader Features -Automatic Library Search,
Loader Options. Loader Design Options.
Macro Preprocessor - Macro Instruction Definition and Expansion, One pass Macro processor
Algorithm and data structures, Machine Independent Macro Processor Features, Macro processor
design options. Device drivers - Anatomy of a device driver, Character and block device drivers,
General design of device drivers. Text Editors- Overview of Editing, User Interface, Editor
31
COMPUTER SCIENCE AND ENGINEERING
Structure. Debuggers - Debugging Functions and Capabilities, Relationship with other parts of
the system, Debugging Methods- By Induction, Deduction and Backtracking.
Text book
1. Leland L. Beck, System Software: An Introduction to Systems Programming, 3/E,
Pearson Education Asia
References
1. D.M. Dhamdhere, Systems Programming and Operating Systems, Second Revised
Edition, Tata McGraw Hill.
2. John J. Donovan, Systems Programming, Tata McGraw Hill Edition 1991.
2. Can an assembler incorporating program blocks function using the same data
structures as that of a normal two pass assembler? Justify your answer
32
COMPUTER SCIENCE AND ENGINEERING
QP CODE:
PART A
2. What are assembler directives? List out any five assembler directives in SIC.
33
COMPUTER SCIENCE AND ENGINEERING
Part B
(Answer any one question from each module. Each question carries 14 Marks)
(b) Explain the architecture and addressing modes of SIC machine. (10)
OR
12. (a) Explain the addressing modes supported by SIC/ XE machine with suitable (8)
illustrations.
13. (a) Let NUMBERS be an array of 100 words. Write a sequence of SIC/XE (6)
instructions to find the maximum of these numbers.
(b) Perform hand assembly of the above written program using two pass (8)
assembler and show the status of various data structures and object
program create.
34
COMPUTER SCIENCE AND ENGINEERING
OR
14. (a) Write down and explain the second pass of a two pass assembler algorithm. (8)
(b) What is a Program Block. What is its advantage? With suitable example, (6)
explain how Program Blocks are handled by SIC assembler.
15. (a) What is a Program Block. What is its advantage? With suitable example, (7)
explain how Program Blocks are handled by SIC assembler.
(b) What is a forward reference? With example, illustrate how forward (7)
references are handled by a single pass assembler?
OR
16. (a) With suitable examples explain machine dependent assembler features. (8)
(b) Explain with examples, the need and working of multipass assembler. (6)
17. (a) With the data structures used, state and explain two pass algorithm for a (10)
linking loader.
OR
(b) What is Dynamic Linking? With example, illustrate how dynamic linking (5)
is performed.
19. (a) Write down the single pass macro processor algorithm and with suitable (10)
example illustrate its working.
(b) How are unique labels generated during Macro Expansion? (4)
OR
35
COMPUTER SCIENCE AND ENGINEERING
Teaching Plan
No Contents No: of
Lecture
Hours
Module -1 ( Introduction) (9 hours)
1.1 System Software Vs. Application Software , Different System Software– 1 hour
Assembler, Linker, Loader, Macro Processor
1.2 Text Editor, Debugger, Device Driver, Compiler, Interpreter, Operating 1 hour
System(Basic Concepts only)
36
COMPUTER SCIENCE AND ENGINEERING
37
COMPUTER SCIENCE AND ENGINEERING
5.2 One pass Macro processor algorithm and data structures 1 hour
5.3 One pass Macro processor Algorithm and data structures illustration with 1 hour
example
5.4 Machine Independent Macro Processor Features- generation of unique 1 hour
labels, Concatenation of macro parameter, Keyword macro parameters
5.5 Machine Independent Macro Processor Features- Conditional Macro 1 hour
Expansion
5.6 Macro processor design options 1 hour
5.7 Device drivers- Anatomy of a device driver, Character and block device 1 hour
drivers, General design of device drivers
5.8 Text Editors- Overview of Editing, User Interface , Editor Structure 1 hour
5.9 Debuggers :- Debugging Functions and Capabilities, Debugging 1 hour
Methods- By Induction, Deduction and Backtracking.
38
COMPUTER SCIENCE AND ENGINEERING
Year of
CST MICROPROCESSORS AND Category L T P Credit
Introduction
307 MICROCONTROLLERS
PCC 3 1 0 4 2019
Preamble: The course enables the learners capable of understanding the fundamental architecture
of microprocessors and micro controllers. This course focuses on the architecture, assembly
language programming, interrupts, interfacing of microprocessors with peripheral devices and
microcontrollers and its programming. It helps the learners to extend the study of latest
processors and develop hardware based solutions.
Prerequisite : Sound knowledge in Logic System Design and Computer organization &
architecture.
CO2 Develop 8086 assembly language programs. (Cognitive Knowledge Level: Apply)
CO3 Demonstrate interrupts, its handling and programming in 8086. (Cognitive Knowledge
Level: Apply))
CO4 Illustrate how different peripherals (8255,8254,8257) and memory are interfaced with
microprocessors. (Cognitive Knowledge Level: Understand)
CO5 Outline features of microcontrollers and develop low level programs. (Cognitive
Knowledge Level: Understand)
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO1
CO2
CO3
CO4
CO5
39
COMPUTER SCIENCE AND ENGINEERING
Assessment Pattern
Remember 20 20 20
Understand 40 40 40
Apply 40 40 40
Analyze
Evaluate
Create
Mark Distribution
40
COMPUTER SCIENCE AND ENGINEERING
Syllabus
Module-1(Evolution of microprocessors):
8085 microprocessor (-Basic Architecture only). 8086 microprocessor – Architecture and
signals, Physical Memory organization, Minimum and maximum mode of 8086 system
and timings. Comparison of 8086 and 8088.Machine language Instruction format.
Module-2 (Addressing modes and instructions):
Addressing Modes of 8086. Instruction set – data copy /transfer instructions, arithmetic
instructions, logical instructions, string manipulation instructions, branch instructions,
unconditional and conditional branch instruction, flag manipulation and processor control
instructions. Assembler Directives and operators. Assembly Language Programming with
8086.
Module- 3 (Stack and interrupts):
Stack structure of 8086, programming using stack- Interrupts - Types of Interrupts and
Interrupt Service Routine- Handling Interrupts in 8086- Interrupt programming. -
41
COMPUTER SCIENCE AND ENGINEERING
Programmable Interrupt Controller - 8259, Architecture (Just mention the control word, no
need to memorize the control word)- Interfacing Memory with 8086.
Module- 4 (Interfacing chips):
Programmable Peripheral Input/output port 8255 - Architecture and modes of operation-
Programmable interval timer 8254-Architecture and modes of operation- DMA controller
8257 Architecture (Just mention the control word, no need to memorize the control word
of 8254 and 8257)
Module- 5 (Microcontrollers):
8051 Architecture- Register Organization- Memory and I/O addressing- Interrupts and
Stack- 8051 Addressing Modes- Instruction Set- data transfer instructions, arithmetic
instructions, logical instructions, Boolean instructions, control transfer instructions-
Simple programs.
Text Books
1. Bhurchandi and Ray, Advanced Microprocessors and Peripherals, Third Edition
McGraw Hill.
2. Raj Kamal, Microcontrollers: Architecture, Programming, Interfacing and System
Design, Pearson Education.
3. Ramesh Gaonkar, Microprocessor Architecture, Programming, and Applications with
the 8085, Penram International Publishing Pvt. Ltd.
Reference Books
1. Barry B. Brey, The Intel Microprocessors – Architecture, Programming and
Interfacing, Eighth Edition, Pearson Education.
2. A. NagoorKani, Microprocessors and Microcontrollers, Second Edition, Tata
McGraw Hill
3. Douglas V. Hall, SSSP Rao, Microprocessors and Interfacing, Third Edition,
McGrawHill Education.
42
COMPUTER SCIENCE AND ENGINEERING
43
COMPUTER SCIENCE AND ENGINEERING
QP CODE:
PART A
3. Assume AL register is having the value 7FH. What will be the content of AL
after the following instructions are executed
a)ROR AL,01 b)SAR AL,01
6. Define Interrupt Service Routine? How to find the address of the ISR
corresponding to a given interrupt in 8086?
44
COMPUTER SCIENCE AND ENGINEERING
10. Write the sequence of 8051 instructions to store any two numbers at two
consecutive locations 70H and 71H, multiply them and store the result in (10x3=30)
location 72H.
Part B
(Answer any one question from each module. Each question carries 14 Marks)
11. (a) Specify the significance of segmentation and how it is implemented in 8086 (5)
OR
12. (a) Write down the differences between 8086 and 8088 processors (4)
(b) Explain the physical memory organization of 8086 with a neat diagram. (10)
How does the 8086 processor accesses a word from an odd memory
location? How many memory cycles does it take?
13. (a) Write an 8086 assembly language program for finding the sum of the (10)
squares of first N natural numbers. Calculate the squares of each number
using a subroutine SQUARE.
OR
14. (a) Write an 8086 assembly language program for printing the reverse of a (5)
given input string.
(b) Explain the addressing modes for sequential control flow instructions in (9)
8086.
OR
16. (a) Interface 32Kx8 RAM using four numbers of 8Kx8 memory chips and (10)
16Kx8 ROM using two numbers of 8Kx8 EPROM chips. The address
map is given as RAM starts at 00000H and ROM ends at FFFFFH
45
COMPUTER SCIENCE AND ENGINEERING
17. (a) Explain the architecture of 8255 with a neat diagram (10)
(b) Identify the mode and I/O configuration for ports A, B and C of an 8255 (4)
after its control register is loaded with 86 H?
OR
18. (a) Define Direct Memory Access (DMA)and illustrate the role of a DMA (8)
controller? Explain the register organization of 8257 and state how these
registers are used during DMA transfer operations.
(b) Write an 8051 assembly language program for adding two matrices whose (5)
elements are stored sequentially in some memory location. Assume suitable
locations.
OR
20. (a) Explain the internal data memory organization of 8051. (9)
46
COMPUTER SCIENCE AND ENGINEERING
Teaching Plan
No of
No Contents Lecture
Hrs
Module 1 : (Evolution of microprocessors) (9 hours)
1.1 Overview of 8085 microprocessor 1 hour
47
COMPUTER SCIENCE AND ENGINEERING
48
COMPUTER SCIENCE AND ENGINEERING
Year of
CST MANAGEMENT OF Category L T P Credit
Introduction
309 SOFTWARE SYSTEMS
PCC 3 0 0 3 2019
Preamble: This course provides fundamental knowledge in the Software Development Process.
It covers Software Development, Quality Assurance, Project Management concepts and
technology trends. This course enables the learners to apply state of the art industry practices in
Software development.
Course Outcomes: After the completion of the course the student will be able to
Demonstrate Traditional and Agile Software Development approaches (Cognitive
CO1
Knowledge Level: Apply)
49
COMPUTER SCIENCE AND ENGINEERING
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO1
CO2
CO3
CO4
CO5
50
COMPUTER SCIENCE AND ENGINEERING
Assessment Pattern
Remember 30 30 30
Understand 40 40 50
Apply 30 30 20
Analyse
Evaluate
Create
Mark Distribution
Attendance : 10 marks
First Internal Examination shall be preferably conducted after completing the first half of the
syllabus and the Second Internal Examination shall be preferably conducted after completing the
remaining part of the syllabus.
51
COMPUTER SCIENCE AND ENGINEERING
There will be two parts: Part A and Part B. Part A contains 5 questions (preferably, 2 questions
each from the completed modules and 1 question from the partly covered module), having 3
marks for each question adding up to 15 marks for part A. Students should answer all questions
from Part A. Part B contains 7 questions (preferably, 3 questions each from the completed
modules and 1 question from the partly covered module), each with 7 marks. Out of the 7
questions in Part B, a student should answer any 5.
There will be two parts; Part A and Part B. Part A contains 10 questions with 2 questions from
each module, having 3 marks for each question. Students should answer all questions. Part B
contains 2 questions from each module of which a student should answer any one. Each question
can have a maximum of 2 subdivisions and carries 14 marks.
Syllabus
52
COMPUTER SCIENCE AND ENGINEERING
Object-oriented design using the UML, Design patterns, Implementation issues, Open-source
development - Open-source licensing - GPL, LGPL, BSD. Review Techniques - Cost impact of
Software Defects, Code review and statistical analysis. Informal Review, Formal Technical
Reviews, Post-mortem evaluations. Software testing strategies - Unit Testing, Integration
Testing, Validation testing, System testing, Debugging, White box testing, Path testing, Control
Structure testing, Black box testing, Testing Documentation and Help facilities. Test automation,
Test-driven development, Security testing. Overview of DevOps and Code Management - Code
management, DevOps automation, Continuous Integration, Delivery, and Deployment
(CI/CD/CD). Software Evolution - Evolution processes, Software maintenance.
Text Books
1. Book 1 - Ian Sommerville, Software Engineering, Pearson Education, Tenth edition, 2015.
2. Book 2 - Roger S. Pressman, Software Engineering : A practitioner’s approach, McGraw
Hill publication, Eighth edition, 2014
3. Book 3 - Ian Sommerville, Engineering Software Products: An Introduction to
Modern Software Engineering, Pearson Education, First Edition, 2020.
References
53
COMPUTER SCIENCE AND ENGINEERING
54
COMPUTER SCIENCE AND ENGINEERING
4. What are the proactive approaches one can take to optimise efforts in the testing phase?
55
COMPUTER SCIENCE AND ENGINEERING
QP CODE:
Reg No:______________
Name :______________ PAGES : 3
APJ ABDUL KALAM TECHNOLOGICAL UNIVERSITY
FIFTH SEMESTER B.TECH DEGREE EXAMINATION, MONTH & YEAR
Course Code: CST 309
Course Name: Management of Software Systems
3. Identify any four types of requirements that may be defined for a software system
Part B
(Answer any one question from each module. Each question carries 14
Marks)
56
COMPUTER SCIENCE AND ENGINEERING
(b) Explain Agile Development techniques and Agile Project Management (6)
13. (a) What are functional and nonfunctional requirements? Imagine that you are
developing a library management software for your college, list eight (10)
functional requirements and four nonfunctional requirements.
OR
14. (a) Explain Personas, Scenarios, User stories and Feature identification? (8)
(b) Compare Software Architecture design and Component level design (6)
OR
17. (a) What is a critical path and demonstrate its significance in a project schedule (8)
with the help of a sample project schedule.
OR
18. (a) Explain elements of Software Quality Assurance and SQA Tasks. (6)
(b) What is algorithmic cost modeling? What problems does it suffer from when (8)
57
COMPUTER SCIENCE AND ENGINEERING
19. (a) Explain elements of Software Quality Assurance and SQA Tasks. (8)
OR
(b) How can Software projects benefit from Container deployment and Micro (6 )
service deployment?
Teaching Plan
No of
No Contents Lecture
Hrs
Module 1 : Introduction to Software Engineering (7 hours)
1.1 Introduction to Software Engineering.[ Book 1, Chapter 1] 1 hour
1.2 Software process models [Book 1 - Chapter 2] 1 hour
1.3 Process activities [Book 1 - Chapter 2] 1 hour
58
COMPUTER SCIENCE AND ENGINEERING
2.4 Personas, Scenarios, User stories, Feature identification [Book 3 - Chapter 3] 1 hour
2.5 Design concepts [Book 2 - Chapter 12] 1 hour
2.6 Architectural Design [Book 2 - Chapter 13] 1 hour
2.7 Component level design [Book 2 - Chapter 14] 1 hour
2.8 Design Document Template. Case study: The Ariane 5 launcher failure. [Ref 1 hour
- 2, Book 2 - Chapter 16]
Module 3 : Implementation and Testing (9 hours)
3.1 Object-oriented design using the UML, Design patterns [Book 1 - Chapter 7] 1 hour
3.2 Implementation issues, Open-source development - Open-source licensing - 1 hour
GPL, LGPL, BSD [Book 1 - Chapter 7]
3.3 Review Techniques - Cost impact of Software Defects, Code review and 1 hour
statistical analysis. [Book 2 - Chapter 20]
34 Informal Review, Formal Technical Reviews, Post-mortem evaluations. 1 hour
[Book 2 - Chapter 20]
3.5 Software testing strategies - Unit Testing, Integration Testing, Validation 1 hour
testing, System testing and Debugging (basic concepts only). [Book 2 -
Chapter 22]
3.6 White box testing, Path testing, Control Structure testing, Black box testing. 1 hour
Test documentation [Book 2 - Chapter 23]
3.7 Test automation, Test-driven development, Security testing. [Book 3 - 1 hour
Chapter 9]
3.8 DevOps and Code Management - Code management, DevOps automation, 1 hour
CI/CD/CD. [Book 3 - Chapter 10]
3.9 Software Evolution - Evolution processes, Software maintenance. [Book 1 - 1 hour
Chapter 9]
Module 4 : Software Project Management (6 hours)
4.1 Software Project Management - Risk management, Managing people, 1 hour
Teamwork [Book 1 - Chapter 22]
4.2 Project Planning - Software pricing, Plan-driven development, Project 1 hour
scheduling, Agile planning [Book 1 - Chapter 23]
4.3 Estimation techniques [Book 1 - Chapter 23] 1 hour
4.4 Configuration management [Book 1 - Chapter 25] 1 hour
59
COMPUTER SCIENCE AND ENGINEERING
60
COMPUTER SCIENCE AND ENGINEERING
Year of
Category L T P Credit
CSL SYSTEM SOFTWARE AND Introduction
331 MICROPROCESSORS LAB
PCC 0 0 4 2 2019
Preamble: The aim of this course is to give hands-on experience in how microcontrollers, and
microprocessors can be programmed. The course also aims to enable students to design and
implement system software. The student should get familiar with assembly level programming of
microprocessors and microcontrollers, interfacing of devices to microcontrollers, resource
allocation algorithms in operating systems and design and implementation of system software.
PO1 PO2 PO3 PO4 PO PO PO7 PO8 PO9 PO10 PO11 PO12
5 6
CO1
CO2
CO3
CO4
CO5
61
COMPUTER SCIENCE AND ENGINEERING
Assessment Pattern
Continuous
End Semester
Assessment Test
Bloom’s Category Examination
(Internal Exam)
Percentage
Percentage
Remember 20 20
Understand 20 20
Apply 60 60
Analyse
Evaluate
Create
Mark Distribution
Total ESE
CIE Marks ESE Marks
Marks Duration
150 75 75 3 hours
62
COMPUTER SCIENCE AND ENGINEERING
Internal Examination Pattern: The marks will be distributed as Algorithm 30 marks, Program
20 marks, Output 20 marks and Viva 30 marks. Total 100 marks which will be converted out of
15 while calculating Internal Evaluation marks.
End Semester Examination Pattern: The marks will be distributed as Algorithm 30 marks,
Program 20 marks, Output 20 marks and Viva 30 marks. Total 100 marks will be converted out
of 75 for End Semester Examination.
All Students attending the System Software and Microprocessors Lab should have a Fair Record.
The fair record should be produced in the University Lab Examination. Every experiment
conducted in the lab should be noted in the fair record. For every experiment in the fair record
the right hand page should contain Experiment Heading, Experiment Number, Date of
Experiment, Aim of Experiment, Details of Experiment including algorithm and Result of
Experiment. The left hand page should contain a print out of the code used for the experiment
and sample output obtained for a set of input.
Syllabus
MICROPROCESSOR LAB
I. Assembly Language Programming Exercises/Experiments using 8086 Trainer kit
II. Exercises/Experiments using MASM (PC required)
III. Interfacing Exercises/Experiments with 8086 trainer kit through Assembly Language
programming
IV. Exercises/Experiments using 8051 trainer kit
63
COMPUTER SCIENCE AND ENGINEERING
Text Books
1. Bhurchandi and Ray, Advanced Microprocessors and Peripherals, Third Edition
McGraw Hill.
2. Andrew S Tanenbaum, “Modern Operating Systems” , 4th Edition, Prentice Hall, 2015.
3. Leland L. Beck, System Software: An Introduction to Systems Programming, 3/E,
Pearson Education Asia, 1997.
Reference Books
1. A. NagoorKani, Microprocessors and Microcontrollers, Second Edition, Tata
McGraw Hill
2. Douglas V. Hall, SSSP Rao, Microprocessors and Interfacing, Third Edition,
McGrawHill Education.
3. William Stallings, “Operating systems”, 6th Edition, Pearson, Global Edition,
2015.
4. Garry Nutt, Nabendu Chaki, Sarmistha Neogy, “Operating Systems”, 3rd
Edition, Pearson Education.
5. D.M. Dhamdhere, Systems Programming and Operating Systems,
Second Revised Edition, Tata McGraw Hill.
Practice Questions
64
COMPUTER SCIENCE AND ENGINEERING
65
COMPUTER SCIENCE AND ENGINEERING
DATABASE Year of
CSL Category L T P Credits
MANAGEMENT introduction
333
SYSTEMS LAB PCC 0 0 4 2 2019
Preamble:
The Database Management Systems course is intended to impart the elementary concepts of a
database management system to students and equip them to design and implement a database
application based on those concepts. This course helps the learners to get practical exposure on
database creation, SQL queries creation, transaction processing and NoSQL & MongoDB based
operations. The course enables the students to create, manage and administer the databases,
develop necessary tools for the design and development of the databases, and to understand
emerging technologies to handle Big Data.
Course Outcomes: After the completion of the course the student will be able to
CO1 Design database schema for a given real world problem-domain using standard
design and modeling approaches. (Cognitive Knowledge Level: Apply)
CO2 Construct queries using SQL for database creation, interaction, modification, and
updation. (Cognitive Knowledge Level: Apply)
C03 Design and implement triggers and cursors. (Cognitive Knowledge Level: Apply)
C04 Implement procedures, functions, and control structures using PL/SQL. (Cognitive
Knowledge Level: Apply)
C06 Develop database applications using front-end tools and back-end DBMS.
(Cognitive Knowledge Level: Create)
66
COMPUTER SCIENCE AND ENGINEERING
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO1
CO2
CO3
CO4
CO5
CO6
Assessment Pattern:
67
COMPUTER SCIENCE AND ENGINEERING
Mark Distribution
Total Marks CIE Marks ESE Marks ESE Duration
150 75 75 3 hours
Syllabus
1. Design a database schema for an application with ER diagram from a problem description
**.
2. Creation, modification, configuration, and deletion of databases using UI and SQL
Commands **.
3. Creation of database schema - DDL (create tables, set constraints, enforce relationships,
create indices, delete and modify tables). Export ER diagram from the database and verify
relationships** (with the ER diagram designed in step 1).
68
COMPUTER SCIENCE AND ENGINEERING
4. Database initialization - Data insert, Data import to a database (bulk import using UI and
SQL Commands)**.
5. Practice SQL commands for DML (insertion, updating, altering, deletion of data, and
viewing/querying records based on condition in databases)**.
6. Implementation of built-in functions in RDBMS**.
7. Implementation of various aggregate functions in SQL**.
8. Implementation of Order By, Group By & Having clause **.
9. Implementation of set operators nested queries, and join queries **.
10. Implementation of queries using temp tables.
11. Practice of SQL TCL commands like Rollback, Commit, Savepoint **.
12. Practice of SQL DCL commands for granting and revoking user privileges **.
13. Practice of SQL commands for creation of views and assertions ** .
14. Implementation of various control structures like IF-THEN, IF-THEN-ELSE, IF-THEN-
ELSIF, CASE, WHILE using PL/SQL **.
15. Creation of Procedures, Triggers and Functions**.
16. Creation of Packages **.
17. Creation of Cursors **.
18. Creation of PL/SQL blocks for exception handling **.
19. Database backup and restore using commands.
20. Query analysis using Query Plan/Show Plan.
21. Familiarization of NoSQL Databases and CRUD operations**.
22. Design a database application using any front end tool for any problem selected. The
application constructed should have five or more tables**.
** mandatory
Text Books
1. Elmasri R. and S. Navathe, Database Systems: Models, Languages, Design and Application
Programming, Pearson Education, 2013.
2. Sliberschatz A., H. F. Korth and S. Sudarshan, Database System Concepts, 6/e, McGraw
Hill, 2011.
References
1. Adam Fowler, NoSQL for Dummies, John Wiley & Sons, 2015
2. NoSQL Data Models: Trends and Challenges (Computer Engineering: Databases and Big
Data), Wiley, 2018
69
COMPUTER SCIENCE AND ENGINEERING
Practice Questions
EXERCISES
1. Create a normalized database design with proper tables, columns, column types, and
constraints
2. Create an ER diagram for the above database design.
3. Write SQL commands to
a. Create a database by name Library. Drop the database and re-create it.
b. Create DDL statements and create the tables and constraints (from the design) in the
database created in step-a (Library)
70
COMPUTER SCIENCE AND ENGINEERING
Notes: [ Create a script file and execute it. Create the script file in such a way that,,if the
table exists, drop the tables and recreate )]
c. Create and execute DROP TABLE command in tables with and without FOREIGN
KEY constraints.
d. Create and execute ALTER TABLE command in tables with data and without data.
e. Create and execute SQL commands to build indices on Member_Id and Book_Id on
table Book_Issue.
f. Create and execute GRANT/REVOKE commands on tables.
g. Create and execute SQL commands to insert data into each of the tables designed
h. Learn and execute bulk import of data to tables from CSV files (insert 1000 records of
books into the BOOK table from a CSV file).
i. Create and execute UPDATE/DELETE commands on tables. Try to update/delete
rows with Primary and Foreign Keys. Try bulk updates or deletes using SQL
UPDATE statement
4. Write SQLQuery to retrieve the following information
a. Get the number of books written by a given author
b. Get the list of publishers and the number of books published by each publisher
c. Get the names of authors who jointly wrote more than one book.
d. Get the list of books that are issued but not returned
e. Get the list of students who reads only ‘Malayalam’ books
f. Get the total fine collected for the current month and current quarter
g. Get the list of students who have overdue (not returned the books even on due date)
h. Calculate the fine (as of today) to be collected from each overdue book.
i. Members who joined after Jan 1 2021 but has not taken any books
5. Book return should insert an entry into the Book_Return table and also update the status in
Book_Issue table as ‘Returned’. Create a database TRANSACTION to do this operation
(stored procedure).
6. Create a database view ‘Available_Books’, which will list out books that are currently
available in the library
7. Create a database procedure to add, update and delete a book to the Library database (use
parameters).
8. Use cursors and create a procedure to print Books Issue Register (page wise – 20 rows in a
page)
9. Create a history table (you may use the same structure without any keys) for the MEMBER
table and copy the original values of the row being updated to the history table using a
TRIGGER.
10. NoSQL Exercise
a. Practice Mongo DB CRUD operations. Refer:
https://docs.mongodb.com/manual/crud/
71
COMPUTER SCIENCE AND ENGINEERING
b. You may use a MongoDB local installation or cloud MongoDB services like
MongoDB Atlas for this exercise
c. For documentation: Refer: https://docs.mongodb.com/manual/introduction/
72
COMPUTER SCIENCE AND ENGINEERING
SEMESTER V
MINOR
73
COMPUTER SCIENCE AND ENGINEERING
Year of
CONCEPTS IN Category L T P Credit
CST Introduction
SOFTWARE
381
ENGINEERING
VAC 3 1 0 4 2019
Preamble: This course provides fundamental knowledge in the Software Development Process.
It covers Software Development, Quality Assurance and Project Management concepts. This
course enables the learners to apply state of the art industry practices in Software development.
Prerequisite: Basic understanding of Object Oriented Design and Development.
Course Outcomes: After the completion of the course the student will be able to
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO1 PO1 PO12
0 1
CO1
CO2
74
COMPUTER SCIENCE AND ENGINEERING
CO3
CO4
CO5
Assessment Pattern
Remember 30 30 30
Understand 30 30 30
75
COMPUTER SCIENCE AND ENGINEERING
Apply 40 40 40
Analyse
Evaluate
Create
Mark Distribution
Attendance : 10 marks
First Internal Examination shall be preferably conducted after completing the first half of the
syllabus and the Second Internal Examination shall be preferably conducted after completing the
remaining part of the syllabus.
There will be two parts: Part A and Part B. Part A contains 5 questions (preferably, 2 questions
each from the completed modules and 1 question from the partly covered module), having 3
marks for each question adding up to 15 marks for part A. Students should answer all questions
from Part A. Part B contains 7 questions (preferably, 3 questions each from the completed
modules and 1 question from the partly covered module), each with 7 marks. Out of the 7
questions in Part B, a student should answer any 5.
76
COMPUTER SCIENCE AND ENGINEERING
There will be two parts; Part A and Part B. Part A contains 10 questions with 2 questions from
each module, having 3 marks for each question. Students should answer all questions. Part B
contains 2 questions from each module of which a student should answer any one. Each question
can have a maximum of 2 subdivisions and carries 14 marks.
Syllabus
Object-oriented design using the UML, Design patterns, Implementation issues, Open-source
development - Open-source licensing - GPL, LGPL, BSD. Review Techniques - Cost impact of
Software Defects, Code review and statistical analysis. Informal Review, Formal Technical
Reviews, Post-mortem evaluations. Software testing strategies - Unit Testing, Integration
Testing, Validation testing, System testing, Debugging, White box testing, Path testing, Control
Structure testing, Black box testing, Testing Documentation and Help facilities. Test automation,
Test-driven development, Security testing. Overview of DevOps and Code Management - Code
management, DevOps automation, CI/CD/CD. Software Evolution - Evolution processes,
Software maintenance.
77
COMPUTER SCIENCE AND ENGINEERING
Text Books
1. Book 1 - Ian Sommerville, Software Engineering, Pearson Education, Tenth edition, 2015.
2. Book 2 - Roger S. Pressman, Software Engineering : A practitioner’s approach, McGraw
Hill publication, Eighth edition, 2014
3. Book 3 - Ian Sommerville, Engineering Software Products: An Introduction to Modern
Software Engineering, Pearson Education, First Edition, 2020.
References
78
COMPUTER SCIENCE AND ENGINEERING
79
COMPUTER SCIENCE AND ENGINEERING
QP CODE:
Reg No:______________
Name :______________
PAGES : 3
APJ ABDUL KALAM TECHNOLOGICAL UNIVERSITY
FIFTH SEMESTER B.TECH DEGREE EXAMINATION(MINOR), MONTH & YEAR
Course Code: CST 381
Course Name: Concepts in Software Engineering
Duration: 3 Hrs Max. Marks : 100
PART A
Answer all Questions. Each question carries 3 Marks
1. Explain why professional software that is developed for a customer is not simply
the programs that have been developed and delivered
3. Identify and briefly describe four types of requirements that may be defined for a
computer based system.
80
COMPUTER SCIENCE AND ENGINEERING
Part B
(Answer any one question from each module. Each question carries 14 marks)
11. (a) Compare between waterfall model and spiral model (8)
OR
(b) Explain Agile Development techniques and Agile Project Management. (7)
13. (a) What are functional and nonfunctional requirements? Imagine that you are
developing a library management software for your college, identify at least (10)
8 functional requirements and 4 nonfunctional requirements.
OR
14. (a) Explain Personas, Scenarios, User stories and Feature identification? (8)
(b) Compare between Software Architecture design and Component level (6)
design
15. (a) Describe the formal and informal review techniques in detail. (6)
OR
17. (a) What is a critical path and demonstrate its significance in a project schedule (6)
with the help of a sample project schedule.
81
COMPUTER SCIENCE AND ENGINEERING
OR
(b) What is algorithmic cost modeling? What problems does it suffer from when (6)
compared with other approaches to cost estimation?
19. (a) Explain elements of Software Quality Assurance and SQA Tasks. (8)
OR
1.8 Case studies : An insulin pump control system. Mentcare - a patient 1 hour
information system for mental health care. [Book 1 - Chapter 1]
Module 2 : Requirement Analysis and Design (10 hours)
82
COMPUTER SCIENCE AND ENGINEERING
2.9 Component level design, Design Document Template. [Book 2 - Chapter 14, 1 hour
Ref - 2]
2.10 Case study: The Ariane 5 launcher failure. [ Book 2 - Chapter 16] 1 hour
3.1 Object-oriented design using the UML, Design patterns [Book 1 - Chapter 7] 1 hour
3.7 White box testing, Path testing, Control Structure testing [Book 2 - Chapter 1 hour
23]
3.8 Black box testing. Test documentation [Book 2 - Chapter 23] 1 hour
3.10 Security testing. DevOps and Code Management [Book 3 - Chapter 9, Chapter 1 hour
10]
3.11 DevOps and Code Management - Code management, DevOps automation, 1 hour
CI/CD/CD. [Book 3 - Chapter 10]
83
COMPUTER SCIENCE AND ENGINEERING
5.1 Software Quality, Software Quality Dilemma, Achieving Software Quality. 1 hour
[Book 2 - Chapter 19]
5.2 Elements of Software Quality Assurance, SQA Tasks [Book 3 - Chapter 21] 1 hour
5.6 CMMI process improvement framework, ISO 9001:2000 for Software. [Book 1 hour
2 - Chapter 37]
84
COMPUTER SCIENCE AND ENGINEERING
CONCEPTS IN Year of
CST Category L T P Credit
MACHINE introduction
383
LEARNING VAC 3 1 0 4 2019
Preamble: This course enables the learners to understand the fundamental concepts and
algorithms in machine learning. The course covers the standard and most popular supervised
learning algorithms such as linear regression, logistic regression, decision trees, Bayesian
learning & the naive Bayes algorithm, support vector machines& kernels, basic clustering
algorithms and dimensionality reduction methods. This course helps the students to provide
machine learning based solutions to real world problems.
Course Outcomes
CO3 Illustrate the concepts of Multilayer neural network and Support Vector Machine
(Cognitive Knowledge Level: Apply)
CO5 Solve real life problems using appropriate machine learning models and evaluate the
performance measures (Cognitive Knowledge Level: Apply)
PO1 PO2 PO3 PO4 PO5 PO6 PO PO8 PO9 PO10 PO11 PO1
7 2
CO1
CO2
CO3
85
COMPUTER SCIENCE AND ENGINEERING
CO4
CO5
Assessment Pattern
Mark Distribution
Total Marks CIE Marks ESE Marks ESE Duration
86
COMPUTER SCIENCE AND ENGINEERING
First Internal Examination shall be preferably conducted after completing the first half of the
syllabus and the Second Internal Examination shall be preferably conducted after completing
remaining part of the syllabus.
There will be two parts: Part A and Part B. Part A contains 5 questions (preferably, 2 questions
each from the completed modules and 1 question from the partly covered module), having 3
marks for each question adding up to 15 marks for part A. Students should answer all questions
from Part A. Part B contains 7 questions (preferably, 3 questions each from the completed
modules and 1 question from the partly covered module), each with 7 marks. Out of the 7
questions in Part B, a student should answer any 5.
There will be two parts; Part A and Part B. Part A contains 10 questions with 2 questions from
each module, having 3 marks for each question. Students should answer all questions. Part B
contains 2 questions from each module of which a student should answer any one. Each question
can have maximum 2 sub-divisions and carry 14 marks.
Syllabus
Regression - Linear regression with one variable, Linear regression with multiple variables,
solution using gradient descent algorithm and matrix method, basic idea of overfitting in
regression. Linear Methods for Classification- Logistic regression, Perceptron, Naive Bayes,
Decision tree algorithm ID3.
87
COMPUTER SCIENCE AND ENGINEERING
Text Book
1. Ethem Alpaydin, Introduction to Machine Learning, 2nd edition, MIT Press 2010.
2. Mohammed J. Zaki and Wagner Meira, Data Mining and Analysis: Fundamental
Concepts and Algorithms, Cambridge University Press, First South Asia edition,
2016.
3. Jake VanderPlas, Python Data Science Handbook, O'Reilly Media, 2016
4. Tom Mitchell, Machine Learning, McGraw-Hill, 1997.
Reference Books
1. Christopher Bishop. Neural Networks for Pattern Recognition, Oxford University
Press, 1995.
2. Kevin P. Murphy. Machine Learning: A Probabilistic Perspective, MIT Press
2012.
3. Trevor Hastie, Robert Tibshirani, Jerome Friedman, The Elements Of Statistical
Learning, Second edition Springer 2007.
4. P. Langley, Elements of Machine Learning, Morgan Kaufmann, 1995.
5. Richert and Coelho, Building Machine Learning Systems with Python.
6. Davy Cielen, Arno DB Meysman and Mohamed Ali. Introducing Data Science:
Big Data, Machine Learning, and More, Using Python Tools, Dreamtech Press
2016.
88
COMPUTER SCIENCE AND ENGINEERING
Course Outcome1(CO1):
1. A coin is tossed 100 times and lands heads 62 times. What is the maximum likelihood
estimate for θ, the probability of heads.
2. Suppose data x1, ..., xnare independent and identically distributed drawn from an
exponential distribution exp(λ). Find the maximum likelihood for λ.
3. Suppose x1, ..., xn are independent and identically distributed(iid) samples from a
distribution with density
89
COMPUTER SCIENCE AND ENGINEERING
4. Briefly explain one way in which using tanh instead of logistic activations makes
optimization easier.
5. ReLU activation functions are most used in neural networks instead of the tanh activation
function. Draw both activation functions and give a) an advantage of the ReLU function
compared to the tanh function. b) a disadvantage of the ReLU function compared to the
tanh function.
4. What is Principal Component Analysis (PCA)? Which eigen value indicates the direction
of largest variance?
5. Suppose that one runs a principal component analysis on a data set and tells that the
percentage of variance explained by the first 3 components is 80%. How is this
percentage of variance explained?
90
COMPUTER SCIENCE AND ENGINEERING
area. In addition to the price, there are 10 features describing the house, such as number
of bedrooms, total indoor area, lot area, a swimming pool, location, etc. Explain how you
would implement a machine learning model that would solve this prediction task. Give all
steps you would carry out when developing it. Explain why the model you built is
probably useless in the long run.
3. For a classifier, the confusion matrix is given by:
91
COMPUTER SCIENCE AND ENGINEERING
remove the point from the training set, and re-train the classifier, will the decision boundary
change or stay the same? Justify your answer.
6. Mention the primary motivation for using the kernel trick in machine learning algorithms?
7. Expectation maximization (EM) is designed to find a maximum likelihood setting of the
parameters of a model when some of the data is missing. Does the algorithm converge? If so,
do you obtain a locally or globally optimal set of parameters?
8. Illustrate the strength and weakness of k-means algorithm.
9. Classifier A attains 100% accuracy on the training set and 70% accuracy on the test set.
Classifier B attains 70% accuracy on the training set and 75% accuracy on the test set. Which
one is a better classifier. Justify your answer.
10. How does bias and variance trade-off affect machine learning algorithms?
(10x3=30)
Part B
Answer any one Question from each module. Each question carries 14 Marks
11. a) Suppose that X is a discrete random variable with the following probability mass
function: where 0 ≤ θ ≤ 1 is a parameter. The following 10 independent observations
were taken from such a distribution: (3, 0, 2, 1, 3, 2, 1, 0, 2, 1). What is the maximum
likelihood estimate of θ. (6)
b) A gamma distribution with parameters α, β has the following density function, where Γ(t) is
the gamma function.
If the posterior distribution is in the same family as the prior distribution, then we say that
the prior distribution is the conjugate prior for the likelihood function. Using the Gamma
distribution as a prior, show that the Exponential distribution is a conjugate prior of the
Gamma distribution. Also, find the maximum a posteriori estimator for the parameter of the
Exponential distribution as a function of α and β. (8)
OR
12. a) Traffic between 8AM and 9AM at a certain place was measured by counting the number
of vehicles that passed at that time. Suppose the counts follow a Poisson process. A random
sample of 9 observations was collected, having observed the following number of vehicles:
(95, 100, 80, 70, 110, 98, 97, 90, 70). Derive the maximum likelihood estimator for the
92
COMPUTER SCIENCE AND ENGINEERING
average number of vehicles that pass by that place between 8 AM and 9 AM, and compute
the corresponding estimate using the given sample. (7)
b) Find the maximum a posteriori (MAP) estimator for the mean of a univariate normal
distribution. Assume that we have N samples, x1,..., xN independently drawn from a normal
distribution with known variance σ2 and unknown mean µ and the prior distribution for the
mean is itself a normal distribution with mean ν and variance β2. (7)
13.a) Derive the gradient descent training rule assuming for the target functionod = w0 + w1x1 + ...
+ wnxn. Define explicitly the squared cost/error function E, assuming that a set of training
examples D is provided, where each training example d ∈ D is associated with the target
output td. (10)
b) How can we interpret the output of a two-class logistic regression classifier as a probability?
(4)
OR
14. a) In a two-class logistic regression model, the weight vector w = [4, 3, 2, 1, 0]. We apply it
to some object that we would like to classify; the vectorized feature representation of this
object is x = [−2, 0,−3, 0.5, 3]. What is the probability, according to the model, that this
instance belongs to the positive class? (6)
b) The following dataset can be used to train a classifier that determines whether a given person
is likely to own a car or not. There are three features: education level (primary, secondary, or
university); residence (city or country); gender (female, male).
93
COMPUTER SCIENCE AND ENGINEERING
15. a) Consider a support vector machine whose input space is 2-D, and the inner products are
computed by means of the kernel K(x, y) = (x.y + 1)2-1, where x.ydenotes the ordinary inner
product. Show that the mapping to feature space that is implicitly defined by this kernel is the
mapping to 5-D given by (10)
17. a)Suppose that we have the following data (one variable). Use single linkage
Agglomerative clustering to identify the clusters.
Daa: (2, 5, 9, 15, 16, 18, 25, 33, 33, 45). (8)
b) Given two objects represented by the tuples (22, 1, 42, 10) and (20, 0, 36, 8):
(i) Compute the Euclidean distance between the two objects.
(ii) Compute the Manhattan distance between the two objects.
94
COMPUTER SCIENCE AND ENGINEERING
(iii) Compute the Minkowski distance between the two objects, using p = 3 (6)
OR
18. a) Suppose that we have the following data:
Identify the cluster by applying the k-means algorithm, with k = 2. Try using initial
cluster centers as far apart as possible. (10)
b) List the steps involved in Principal Component Analysis. (4)
19. a) Suppose the dataset had 9700 cancer-free images from 10000 images from cancer
patients. Find precision, recall and accuracy ? Is it a good classifier? Justify. (8)
b) Suppose that you have a classification problem where our feature representation contains
about 10,000,000 features. We would like to develop a classifier that can be deployed in a
mobile phone, so preferably it should have a small memory footprint. Discuss one solution
for how this can be done. (6)
OR
20. a) What are ROC space and ROC curve in machine learning? In ROC space, which points
correspond to perfect prediction, always positive prediction and always negative prediction?
Why? (6)
b)Suppose there are three classifiers A,B and C. The (FPR, TPR) measures of the three
classifiers are as follows – A (0, 1), B (1, 1) , C (1,0.5). Which can be considered as a
perfect classifier? Justify your answer. (4)
95
COMPUTER SCIENCE AND ENGINEERING
Teaching Plan
No of
No Contents Lecture
Hrs
Module 1 :Overview of machine learning (7 hours)
1.3 Maximum likelihood estimation (MLE)- example (TB 1: Section 4.2) 1hour
1.4 Maximum a posteriori estimation(MAP) (TB 4: Section 6.2) 1hour
96
COMPUTER SCIENCE AND ENGINEERING
2.1 Linear regression with one variable (TB 1: Section 2.6) 1hour
2.2 Multiple variables, Solution using gradient descent algorithm and matrix 1hour
method (No derivation required) (TB 1: Section 5.8)
2.3 Overfitting in regression, Lasso and Ridge regularization 1hour
2.4 Logistic regression 1hour
2.5 Perceptron 1hour
2.6 Naive Bayes (TB 2: Section 18.2) 1hour
2.7 Decision trees (TB 2: Chapter 19) 1hour
2.8 Decision trees- ID3 algorithm (TB 2: Chapter 19) 1hour
Module 3 : Neural Networks and Support Vector Machines (TB 2: Chapter 21)
(11 hours)
3.1 Multilayer Feed forward Network, Activation Functions (Sigmoid, ReLU, 1hour
Tanh)
3.2 Back Propagation Algorithm 1hour
3.3 Illustrative Example for Back Propagation 1hour
3.4 Introduction, Maximum Margin Hyperplane, 1hour
3.5 Mathematics behind Maximum Margin Classification 1hour
3.6 Formulation of maximum margin hyperplane and solution 1hour
3.7 Soft margin SVM 1hour
3.8 Solution of Soft margin SVM 1hour
3.9 Non-linear SVM 1hour
3.10 Kernels for learning non-linear functions and properties of kernel functions. 1hour
3.11 Example Kernels functions- Linear, RBF, Polynomial. 1hour
Module 4 : Unsupervised Learning (10 hours)
4.1 Similarity measures- Minkowski distance measures( Manhattan, Euclidean), 1hour
Cosine Similarity
4.2 Clustering - Hierarchical Clustering (TB 2: Chapter 14) 1hour
4.3 K-means partitional clustering (TB 2: Chapter 13) 1hour
4.4 Expectation maximization (EM) for soft clustering (TB 2: Chapter 13) 1hour
4.5 Expectation maximization (EM) for soft clustering (TB 2: Chapter 13) 1hour
97
COMPUTER SCIENCE AND ENGINEERING
98
COMPUTER SCIENCE AND ENGINEERING
Year of
Category L T P Credit
CST CLIENT SERVER Introduction
385 SYSTEMS
VAC 3 1 0 4 2019
Preamble:
The syllabus is prepared with the view of preparing the Engineering Graduates to build effective
Client/Server applications. This course aims at providing a foundation in decentralized computer
systems, using the client/server model. The course content is decided to cover the essential
fundamentals which can be taught within the given slots in the curriculum.
Course Outcomes: After the completion of the course the student will be able to
Course Outcomes
Identify the basics of client/server systems and the driving force behind the
CO 1
development of client/server systems(Cognitive Knowledge Level: Understand)
99
COMPUTER SCIENCE AND ENGINEERING
CO1
CO2
CO3
CO4
CO5
100
COMPUTER SCIENCE AND ENGINEERING
Assessment Pattern
Remember 40 40 40
Understand 40 40 40
Apply 20 20 20
Analyse
Evaluate
Create
Mark distribution
Attendance : 10 marks
Continuous Assessment Test 1 (for theory, for 2 hrs) : 20 marks
Continuous Assessment Test 2 (for lab, internal examination, for 2hrs) : 20 marks
Internal Examination Pattern:
There will be two parts; Part A and Part B. Part A contains 5 questions with 2 questions from
each module (2.5 modules x 2 = 5), having 3 marks for each question. Students should answer
all questions. Part B also contains 5 questions with 2 questions from each module (2.5 modules
101
COMPUTER SCIENCE AND ENGINEERING
x 2 = 5), of which a student should answer any one. The questions should not have sub-
divisions and each one carries 7 marks.
There will be two parts; Part A and Part B. Part A contains 10 questions with 2 questions from
each module, having 3 marks for each question. Students should answer all questions. Part B
contains 2 questions from each module of which a student should answer any one. Each
question can have maximum 2 sub-divisions and carry 14 marks.
1. Describe the client server system development methodology? Explain different phases of
System Integration Life-Cycle.
1. Explain about network management and remote system management. How can security be
provided to the network?
Syllabus
Module – 1 (Introduction)
102
COMPUTER SCIENCE AND ENGINEERING
Client- Services, Request for services, RPC, Windows services, Print services, Remote boot
services, other remote services, Utility Services. Server- Detailed server functionality, Network
operating system, Available platforms, Server operating system. Organizational Expectations,
Improving performance of client/server applications, Single system image, Downsizing and
Rightsizing, Advantages and disadvantages of Client/Server computing, Applications of
Client/Server.
Text Book
103
COMPUTER SCIENCE AND ENGINEERING
Reference Books
1. Jeffrey D.Schank, “Novell’s Guide to Client-Server Application & Architecture” Novell Press
2. Robert Orfali, Dan Harkey, Jeri Edwards, Client/Server Survival Guide, Wiley-India
Edition, Third Edition
5. Specify the role of the client in Client/Server computing and also list any six
services provided by the client.
6. Why do most RPC system support call by value semantics for parameter passing?
7. What do you mean by a thin client network? List three advantages of the Thin
104
COMPUTER SCIENCE AND ENGINEERING
Part B
(Answer any one question from each module. Each question carries 14
Marks)
11. (a) Differentiate between Transaction server and Data server system with
examples. (7)
OR
(b) Classify and describe the driving forces that drive the move to Client/Server (8)
computing.
13. (a) Explain the role of mainframe-centric model in Client/Server computing? (5)
OR
14. (a) List and explain the general forces behind the architecture for business (7)
information systems
15. (a) Illustrate the concept of rightsizing and downsizing in Client/Server (7)
Computing
(b) What is client server system development methodology? Explain the (7)
105
COMPUTER SCIENCE AND ENGINEERING
OR
16. (a) In Client/Server computing, explain the following with examples (10)
i. Dynamic Data Exchange
ii. RPC, Remote Procedure Call
iii. Remote Boot Service
iv. Diskless Computer
v. Object-linking and embedding
(b) Explain the functions and features of Network Operating System (4)
17. (a) Explain about network management and remote system management. How (10)
can security be provided to the network ?
(b) In client server architecture, what do you mean by Availability, Reliability, (4)
Serviceability and Security? Explain with examples.
OR
18. (a) Client server is modular infrastructure, this is intended to improve Usability, (7)
Flexibility, Interoperability and Scalability. Explain each term with an
example, in each case how it helps to improve the functionality of client
server architecture.
(b) Explain about network management and remote system management. How (7)
can security be provided to network?
19. (a) Explain the different types of Client/Server Database Architecture (9)
(b) List and explain the main components of Database middleware (5)
OR
20. (a) Discuss types of database utilities, tools and their functions (7)
(b) Discuss about the role of traditional and web databases in handling (7 )
client/server based applications.
106
COMPUTER SCIENCE AND ENGINEERING
Teaching Plan
107
COMPUTER SCIENCE AND ENGINEERING
108
COMPUTER SCIENCE AND ENGINEERING
SEMESTER V
HONOURS
109
COMPUTER SCIENCE AND ENGINEERING
Year of
Category L T P Credit
CST CRYPTOGRAPHIC Introduction
393 ALGORITHMS
VAC 3 1 0 4 2019
Preamble:
Course Outcomes: After the completion of the course the student will be able to
Identify the security services provided for different types of security attacks.
CO1
(Cognitive Knowledge Level : Understand)
PO PO1 PO1
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO11
9 0 2
CO1
110
COMPUTER SCIENCE AND ENGINEERING
CO2
CO3
CO4
CO5
Assessment Pattern
111
COMPUTER SCIENCE AND ENGINEERING
age)
Remember 30 30 30
Understand 30 30 30
Apply 40 40 40
Analyze
Evaluate
Create
Mark Distribution
Attendance : 10 marks
First Internal Examination shall be preferably conducted after completing the first half of the
syllabus and the Second Internal Examination shall be preferably conducted after completing
remaining part of the syllabus.
112
COMPUTER SCIENCE AND ENGINEERING
There will be two parts: Part A and Part B. Part A contains 5 questions (preferably, 2 questions
each from the completed modules and 1 question from the partly covered module), having 3
marks for each question adding up to 15 marks for part A. Students should answer all questions
from Part A. Part B contains 7 questions (preferably, 3 questions each from the completed
modules and 1 question from the partly covered module), each with 7 marks. Out of the 7
questions in Part B, a student should answer any 5.
There will be two parts; Part A and Part B. Part A contains 10 questions with 2 questions from
each module, having 3 marks for each question. Students should answer all questions. Part B
contains 2 questions from each module of which a student should answer any one. Each question
can have maximum 2 sub-divisions and carries 14 marks.
Syllabus
Need for security, Security approaches, Principles of security, Types of attacks, OSI Security
Architecture, Classical encryption techniques - Substitution techniques, Transposition
techniques. Stream cipher, Block cipher, Public key cryptosystems vs. Symmetric key
cryptosystems, Encrypting communication channels.
Overview of symmetric key cryptography, Block cipher principles, Data Encryption Standard
(DES), Differential and Linear cryptanalysis, Double DES, Triple DES, International Data
Encryption Algorithm (IDEA), Advanced Encryption Algorithm (AES),Block cipher modes of
operation, Stream cipher, RC4.
Principles of public key cryptosystems, RSA algorithm, RSA illustration, Attacks, ElGamal
cryptographic system, Knapsack algorithm, Diffie-Hellman key exchange algorithm, Elliptical
curve cryptosystems.
Symmetric key distribution using symmetric encryption, Symmetric key distribution using
asymmetric encryption, Distribution of public keys, Generating keys, transferring keys,
Verifying keys, Updating keys, Storing keys, Backup keys, Compromised keys, Public key
infrastructure.
113
COMPUTER SCIENCE AND ENGINEERING
Module – 5 (Authentication)
Text Books
1. William Stallings, Cryptography and Network Security Principles and Practice, Pearson
Edu, 6e.
2. Bruice Schneier, Applied Cryptography Protocols, Algorithms and source code in C,
Wiley,2e.
References
2. Discuss the different security services provided for preventing security attacks.
114
COMPUTER SCIENCE AND ENGINEERING
2. Write an algorithm for the InvSubBytes transformation and implement using python
(Assignment)
3. Consider the following elliptic curve signature scheme. We have a global elliptic curve,
prime p, and “generator” G. Alice picks a private signing key XA and forms the public
verifying YA = XAG. To sign a message M:
• Alice picks a value k
• Alice sends Bob M, k and the signature S = M - kXAG.
• Bob verifies that M=S+kYA.
Show that the verification process produces an equality if the signature is valid.
4. Write an algorithm to add two points on an elliptic curve over GF(p) and implement using
Python. (Assignment)
5. Write an algorithm for encryption using knapsack cryptosystem and implement using Java.
(Assignment)
Course Outcome4 (CO4):
1. List four general categories of schemes for the distribution of public keys.
2. What are the essential ingredients of a public-key directory?
Course Outcome 5 (CO5):
1. State the value of the length field in SHA-512 if the length of the message is 1919 bits and
1920 bits.
2. Write an algorithm in pseudo code for HMAC and implement using Python (Assignment)
115
COMPUTER SCIENCE AND ENGINEERING
PART A
2. Define Substitution Cipher. Encrypt using one time pad M = HONORS and K =
CIPHER.
5. Perform encryption using RSA Algorithm for the following p=7; q=11; e=13;
M=5.
116
COMPUTER SCIENCE AND ENGINEERING
(10x3=30)
Part B
(Answer any one question from each module. Each question carries 14
Marks)
11. (a)
With a neat sketch, Explain OSI Security architecture model.
(8)
(b)
How does link encryption differ from end-to-end encryption? Explain.
(6)
OR
12. (a)
Encrypt the text “cryptography” using the Hill Cipher with the key
9 4
(8)
5 7 . Show the calculations.
(b) Illustrate the steps involved in encrypting a plain text using playfair cipher
(6)
with an example.
13. (a)
With a neat sketch, explain a single round in DES.
10
(b)
Explain encryption and decryption using 2 keys and 3 keys of triple DES.
(4)
OR
14. (a) Explain the block cipher modes i) Cipher feedback mode ii) Output
(8)
feedback mode.
15. (a) Write an algorithm for generating public and private key using Elliptical
(10)
curve cryptography.
117
COMPUTER SCIENCE AND ENGINEERING
(b) The equation y2=x3 +x+1, the calculation is done modulo 13. Add two
(4)
points R= P+Q, where P= (4,2) and Q= (10,6).
OR
16. User A and B use the Diffie-Hellman key exchange technique with a
common prime q=71 and primitive root alpha=7.
(a) If user A has private key XA =3, What is A’s public key YA? (7)
(b) If user B has private key XB =6, What is A’s public key YB? (7)
17. (a) Define a session key and show how a KDC can create can create a session
(7)
key between Alice and Bob.
(b) What are the requirements for the use of a public-key certificate scheme? (7)
OR
18. (a) What are the core components of a PKI? Briefly describe each component. (8)
(b) Describe the following (i) Updating keys (ii) Compromised Keys. (6)
19. (a) Describe how SHA-512 logic produce message digest (10)
OR
20. (a) Specify the format for X.509 certificate. Explain the steps required to obtain
(7)
user’s certificate.
(b) With suitable block diagrams, explain the types of functions that may be
(8 )
used to produce an authenticator.
118
COMPUTER SCIENCE AND ENGINEERING
Teaching Plan
No of Lecture
No Contents
Hrs
119
COMPUTER SCIENCE AND ENGINEERING
120
COMPUTER SCIENCE AND ENGINEERING
121
COMPUTER SCIENCE AND ENGINEERING
Year of
Category L T P Credit
CST NEURAL NETWORKS Introduction
395 AND DEEP LEARNING
VAC 3 1 0 4 2019
Preamble:
Course Outcomes: After the completion of the course the student will be able to
Illustrate the basic concepts of neural networks and its practical issues(Cognitive
CO2 Knowledge Level : Apply)
Outline the standard regularization and optimization techniques for deep neural
CO3 networks (Cognitive Knowledge Level : Understand)
Explain the concepts of modern RNNs like LSTM, GRU (Cognitive Knowledge
Level : Understand)
CO5
122
COMPUTER SCIENCE AND ENGINEERING
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO1
CO2
CO3
CO4
CO5
123
COMPUTER SCIENCE AND ENGINEERING
Assessment Pattern
Mark Distribution
Total Marks CIE Marks ESE Marks ESE
Duration
124
COMPUTER SCIENCE AND ENGINEERING
contains 2 questions from each module of which a student should answer any one. Each question
can have a maximum 2 subdivisions and carry 14 marks.
Syllabus
Module - 1 (Basics of Machine Learning )
Introduction to neural networks -Single layer perceptrons, Multi Layer Perceptrons (MLPs),
Representation Power of MLPs, Activation functions - Sigmoid, Tanh, ReLU, Softmax. Risk
minimization, Loss function, Training MLPs with backpropagation, Practical issues in neural
network training - The Problem of Overfitting, Vanishing and exploding gradient problems,
Difficulties in convergence, Local and spurious Optima, Computational Challenges.
Applications of neural networks.
Introduction to deep learning, Deep feed forward network, Training deep models, Optimization
techniques - Gradient Descent (GD), GD with momentum, Nesterov accelerated GD,
Stochastic GD, AdaGrad, RMSProp, Adam. Regularization Techniques - L1 and L2
regularization, Early stopping, Dataset augmentation, Parameter sharing and tying, Injecting
noise at input, Ensemble methods, Dropout, Parameter initialization.
Recurrent neural networks – Computational graphs, RNN design, encoder – decoder sequence
to sequence architectures, deep recurrent networks, recursive neural networks, modern RNNs
LSTM and GRU, Practical use cases for RNNs. Case study - Natural Language Processing.
125
COMPUTER SCIENCE AND ENGINEERING
Text Book
1. Goodfellow, I., Bengio,Y., and Courville, A., Deep Learning, MIT Press, 2016.
2. Neural Networks and Deep Learning, Aggarwal, Charu C., c Springer International
Publishing AG, part of Springer Nature 2018
3. Fundamentals of Deep Learning: Designing Next-Generation Machine Intelligence
Algorithms (1st. ed.). Nikhil Buduma and Nicholas Locascio. 2017. O'Reilly Media, Inc.
Reference Books
1. Satish Kumar, Neural Networks: A Classroom Approach, Tata McGraw-Hill Education,
2004.
2. Yegnanarayana, B., Artificial Neural Networks PHI Learning Pvt. Ltd, 2009.
3. Michael Nielsen, Neural Networks and Deep Learning, 2018
1 man woman
2 man man
3 woman woman
4 man man
126
COMPUTER SCIENCE AND ENGINEERING
5 man woman
6 woman woman
7 woman man
8 man man
9 man woman
10 woman woman
3. In a Deep CNN architecture the feature map L1 was processed by the following
operations as shown in the figure. First down sampled using max pool operation of size
2 and stride 2, and three convolution operations and finally max unpool operation and
followed by an element wise sum. The feature map L1 and L4 are given below. Compute
the matrix L6.
L1 = 10 20 15 22 L4 = 10 20
20 16 28 30 20 30
30 12 20 16
20 20 40 12
127
COMPUTER SCIENCE AND ENGINEERING
4. Illustrate the workings of the RNN with an example of a single sequence defined on
a vocabulary of four words.
QP CODE: PAGES:4
Reg No:_______________
Name:_________________
APJ ABDUL KALAM TECHNOLOGICAL UNIVERSITY
FIFTH SEMESTER B.TECH DEGREE EXAMINATION(HONORS), MONTH &
YEAR
Course Code: CST 395
Course Name: Neural Networks and Deep Learning
Max.Marks:100 Duration:3 Hours
PART A
Answer all Questions. Each question carries 3 Marks
2. Suppose 10000 patients get tested for flu; out of them, 9000 are actually healthy
and 1000 are actually sick. For the sick people, a test was positive for 620 and
negative for 380. For healthy people, the same test was positive for 180 and
negative for 8820. Construct a confusion matrix for the data and compute the
128
COMPUTER SCIENCE AND ENGINEERING
5. Derive weight updating rule in gradient descent when the error function is a)
mean squared error b) cross entropy
7. What happens if the stride of the convolutional layer increases? What can be the
maximum stride? Justify your answer.
Part B
(Answer any one question from each module. Each question carries 14
Marks)
11. (a)
Prove that the decision boundary of binary logistic regression is linear
(9)
(b) Given the following data, construct the ROC curve of the data. Compute
the AUC.
Threshold TP TN FP FN
1 0 25 0 29
2 7 25 0 22 (5)
3 18 24 1 11
4 26 20 5 3
5 29 11 14 0
129
COMPUTER SCIENCE AND ENGINEERING
6 29 0 25 0
7 29 0 25 0
OR
12. (a) With an example classification problem, explain the following terms:
a) Hyper parameters b) Training set c) Validation sets d) Bias e) Variance (8)
y 52 54 56 58 62
13. (a) Update the parameters V11 in the given MLP using back propagation with
learning rate as 0.5 and activation function as sigmoid. Initial weights are
given as V11= 0.2, V12=0.1, V21=0.1, V22=0.3, V11=0.2, W11=0.5,
W21=0.2
V
1 1 W
0.6
(10)
T=0.9
1
0.8
2 2
(b)
Explain the importance of choosing the right step size in neural networks
(4)
OR
14. (a) Explain in detail any four practical issues in neural network training (8)
130
COMPUTER SCIENCE AND ENGINEERING
(b) Calculate the output of the following neuron Y with the activation function
as a) binary sigmoid b) tanh c)ReLU
(6)
(b) Differentiate gradient descent with and without momentum. Give equations
for weight updation in GD with and without momentum. Illustrate (8)
plateaus, saddle points and slowly varying gradients.
OR
16. (a) Suppose a supervised learning problem is given to model a deep feed
forward neural network. Suggest solutions for the following a) small sized
dataset for training b) dataset with both labelled and unlabeled data c) (9)
large data set but data from different distribution
(b) Describe the effect in bias and variance when a neural network is modified
(5)
with more number of hidden units followed with dropout regularization.
17. (a) Draw and explain the architecture of Convolutional Neural Networks (8)
(b) Suppose that a CNN was trained to classify images into different
categories. It performed well on a validation set that was taken from the
same source as the training set but not on a testing set. What could be the (6)
problem with the training of such a CNN? How will you ascertain the
problem? How can those problems be solved?
OR
18. (a) Explain the following convolution functions a)tensors b) kernel flipping c)
(10)
down sampling d) strides e) zero padding.
131
COMPUTER SCIENCE AND ENGINEERING
19. (a) Describe how an LSTM takes care of the vanishing gradient problem. Use
some hypothetical numbers for input and output signals to explain the (8)
concept
OR
20. (a) Explain LSTM based solution for anyone of the problems in the Natural
(8)
Language Processing domain.
Teaching Plan
132
COMPUTER SCIENCE AND ENGINEERING
2.6 Practical issues in neural network training - The Problem of Overfitting, 1 hour
Vanishing and exploding gradient problems
133
COMPUTER SCIENCE AND ENGINEERING
134
COMPUTER SCIENCE AND ENGINEERING
PRINCIPLES OF Year of
CST Category L T P Credit
MODEL Introduction
397
CHECKING VAC 3 1 0 4 2019
Preamble:
This course covers the basic theory and algorithm for an automatic verification process namely,
model checking. Model checking is a formal process for proving the correctness of a
hardware/software which can be modelled as a finite-state transition system. This course
introduces the topics - finite-state modelling of hardware/software, linear-time properties,
classification of linear-time properties, Linear Temporal Logic (LTL), a formal language for
property specification, LTL model checking algorithm and model checking case studies. Proving
correctness of a hardware/software is essential in safety critical systems in domains such as
avionics, health care and automotive.
Prerequisite: Nil
Course Outcomes: After the completion of the course, the student will be able to
Perform LTL model checking with the tool SAL (Symbolic Analysis
CO5 Laboratory). (Cognitive Knowledge Level: Apply)
135
COMPUTER SCIENCE AND ENGINEERING
PO1
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO12
1
CO1
CO2
CO3
CO4
CO5
CO6
136
COMPUTER SCIENCE AND ENGINEERING
Assessment Pattern
End Semester
Test 1 (Marks in Test 2 (Marks
Bloom’s Category Examination (Marks in
percentage) in percentage)
percentage)
Remember 30 30 30
Understand 40 40 40
Apply 40 40 40
Analyze
Evaluate
Create
Mark Distribution
ESE
Total Marks CIE Marks ESE Marks
Duration
150 50 100 3
Attendance : 10 marks
Continuous Assessment Test : 25 marks
Continuous Assessment Assignment : 15 marks
Each of the two internal examinations has to be conducted out of 50 marks. The first series test
shall be preferably conducted after completing the first half of the syllabus. The second series
test shall be preferably conducted after completing the remaining part of the syllabus. There will
be two parts: Part A and Part B. Part A contains 5 questions (preferably, 2 questions each from
the completed modules and 1 question from the partly completed module), having 3 marks for
each question adding up to 15 marks for part A. Students should answer all questions from Part
A. Part B contains 7 questions (preferably, 3 questions each from the completed modules and 1
question from the partly completed module), each with 7 marks. Out of the 7 questions, a
student should answer any 5.
137
COMPUTER SCIENCE AND ENGINEERING
There will be two parts; Part A and Part B. Part A contains 10 questions with 2 questions from
each module, having 3 marks for each question. Students should answer all questions. Part B
contains 2 questions from each module of which a student should answer anyone. Each
question can have maximum 2 sub-divisions and carries 14 marks.
Syllabus
Linear-Time (LT) Properties - Deadlock. Linear-Time Behavior - Paths and State Graph, Path
Fragment, Maximal and Initial Path Fragment, Path. Traces - Trace and Trace Fragment, LT
Properties - LT Property, Satisfaction Relation for LT Properties, Trace Equivalence and LT
Properties. Safety Properties and Invariants - Invariants, Safety Properties, Trace Equivalence
and Safety properties. Liveness Properties - Liveness Property, Safety vs. Liveness Properties.
Fairness - Fairness, Unconditional, Weak and Strong Fairness, Fairness Strategies, Fairness
and Safety. (Definition and examples only for all topics - no proof required).
Regular Properties - Model Checking Regular Safety properties - Regular Safety property,
Verifying Regular Safety Properties. Automata on Infinite Words - ⍵ -Regular Languages and
Properties, Nondeterministic Buchi Automata (NBA), Deterministic Buchi Automata (DBA),
Generalised Buchi Automata (Definitions only). Model Checking ⍵ -Regular Properties -
Persistence Properties and Product, Nested Depth-First Search (Only algorithms required).
Linear Temporal Logic (LTL) - Syntax, Semantics, Equivalence of LTL Formulae, Weak
Until, Release and Positive Normal Form, Fairness, Safety and Liveness in LTL (Definitions
only). Automata Based LTL Model Checking (Algorithms and examples only).
138
COMPUTER SCIENCE AND ENGINEERING
Introduction - Introduction to the tool Symbolic Analysis Laboratory (SAL). The Language of
SAL - The expression language, The transition Language, The module language, SAL
Contexts. SAL Examples - Mutual Exclusion, Peterson’s Protocol, Synchronous Bus Arbiter,
Bounded Bakery protocol, Bakery Protocol, Simpson’s Protocol, Stack.
Text Books
1. Christel Baier and Joost-Pieter Katoen, Principles of Model Checking, The MIT Press.
(Modules 1 - 4)
2. Leonardo de Moura, Sam Owre and N. Shankar, The SAL Language Manual, SRI
International (http://sal.csl.sri.com/doc/language-report.pdf, Chapters 1, 3, 4, 5, 6, 7)
(Module 5)
Reference Materials
139
COMPUTER SCIENCE AND ENGINEERING
1. What is model checking? Give the schematic view of the model checking
approach.
5. Find the product automaton for the following Transition System and Non-
Deterministic Finite Automaton (NFA).
140
COMPUTER SCIENCE AND ENGINEERING
7. Express the following statements about traffic lights in Linear Temporal Logic
(LTL).
a. Once red, the light can not become green immediately.
b. Once red, the light always becomes green eventually after being
yellow for some time.
Part B
(Answer any one question from each module. Each question carries 14
Marks)
11. (a) Explain in detail the various phases of the model checking process.
(7)
OR
12. (a) Explain the following terms in association with execution of a transition
system. (14)
a. Execution Fragment
b. Maximal and Initial Execution Fragment
c. Execution
d. Reachable States
13. (a) With an example, explain the satisfaction relation for LT properties. (7)
141
COMPUTER SCIENCE AND ENGINEERING
14. (a) Give the transition system for the fault tolerant variant of the dining (4)
philosophers problem.
(b) With a suitable example, explain the algorithms to check whether a (10)
Transition System satisfies an invariant or not.
15. (a) Give the algorithm for verifying Regular Safety Properties. Explain with (7)
an appropriate example.
OR
17. (a) Explain the syntax of Linear Temporal Logic (LTL). (7)
OR
18. (a) With an example, give the difference between until and weak until in LTL. (4)
(b) With a suitable example, explain automata based LTL model checking. (10)
19. (a) Explain Peterson’s protocol. What are the LTL properties to be verified to (8)
ensure its correctness?
(b) Write a SAL script for the verification of Peterson’s protocol. (6)
OR
20. (a) Show the SAL model corresponding to Bakery protocol. (8)
(b) List any three Linear Time properties of this model and show their LTL (6 )
specifications.
142
COMPUTER SCIENCE AND ENGINEERING
Teaching plan
143
COMPUTER SCIENCE AND ENGINEERING
144
COMPUTER SCIENCE AND ENGINEERING
145
COMPUTER SCIENCE AND ENGINEERING
SEMESTER VI
146
COMPUTER SCIENCE AND ENGINEERING
Preamble:
The purpose of this course is to create awareness among students about the phases of a compiler
and the techniques for designing a compiler. This course covers the fundamental concepts of
different phases of compilation such as lexical analysis, syntax analysis, semantic analysis,
intermediate code generation, code optimization and code generation. Students can apply this
knowledge in design and development of compilers.
Prerequisite: Sound knowledge in Data Structures, Formal Languages & Automata Theory.
Course Outcomes: After the completion of the course the student will be able to
Model language syntax using Context Free Grammar and develop parse tree
CO2 representation using leftmost and rightmost derivations (Cognitive Knowledge
Level: Apply)
Build Syntax Directed Translation for a context free grammar, compare various
CO4 storage allocation strategies and classify intermediate representations (Cognitive
Knowledge Level: Apply)
147
COMPUTER SCIENCE AND ENGINEERING
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO1
CO2
CO3
CO4
CO5
Assessment Pattern
Remember 20 20 20
Understand 40 40 40
Apply 40 40 40
Analyze
148
COMPUTER SCIENCE AND ENGINEERING
Evaluate
Create
Mark Distribution
149
COMPUTER SCIENCE AND ENGINEERING
Syllabus
Module - 1 (Introduction to compilers and lexical analysis)
Analysis of the source program - Analysis and synthesis phases, Phases of a compiler. Compiler
writing tools. Bootstrapping. Lexical Analysis - Role of Lexical Analyser, Input Buffering,
Specification of Tokens, Recognition of Tokens.
Role of the Syntax Analyser – Syntax error handling. Review of Context Free Grammars -
Derivation and Parse Trees, Eliminating Ambiguity. Basic parsing approaches - Eliminating left
recursion, left factoring. Top-Down Parsing - Recursive Descent parsing, Predictive Parsing,
LL(1) Grammars.
Handle Pruning. Shift Reduce parsing. Operator precedence parsing (Concept only). LR parsing -
Constructing SLR, LALR and canonical LR parsing tables.
Text Books
1. Aho A.V., Ravi Sethi and D. Ullman. Compilers – Principles Techniques and Tools,
Addison Wesley, 2006.
Reference Books
1. D.M.Dhamdhere, System Programming and Operating Systems, Tata McGraw Hill &
Company, 1996.
2. Kenneth C. Louden, Compiler Construction – Principles and Practice, Cengage Learning
Indian Edition, 2006.
150
COMPUTER SCIENCE AND ENGINEERING
3. Tremblay and Sorenson, The Theory and Practice of Compiler Writing, Tata McGraw Hill
& Company,1984.
151
COMPUTER SCIENCE AND ENGINEERING
4. What is left recursive grammar? Give an example. What are the steps in removing
left recursion?
152
COMPUTER SCIENCE AND ENGINEERING
Part B
(Answer any one question from each module. Each question carries 14 Marks)
11. (a) Explain the different phases of a compiler with a running example.
(9)
OR
12. (a) What is a regular definition? Give the regular definition of an unsigned integer
(7)
13. (a) What is Recursive Descent parsing? List the challenges in designing such a
parser? (4)
OR
153
COMPUTER SCIENCE AND ENGINEERING
14. (a) What is Recursive Descent parsing? List the problems in designing such a (4)
parser
(b) Design a recursive descent parser for the grammar S→cAd, A→ab/ b (5)
Find the FIRST and FOLLOW of the non-terminals S, A and B in the (5)
grammar
S→aABe
A→Abc | b
B→d
15. (a) Construct the LR(0) set of items and their GOTO function for the grammar (10)
S→S S + | S S * | a
OR
17. (a) Design a Syntax Directed Translator(SDT) for the arithmetic expression (4 * (8)
7 + 19) * 2 and draw an annotated parse tree for the same.
(b) Consider the grammar with following translation rules and E as the start (6)
symbol
E → E1 # T {E.value=E1.value x T.value ;}
| T{E.value=T.value ;}
T → T1 & F{ T.value=T1.value + F.value ;}
| F{T.value= F.value ; }
F → num { F.value=num. lvalue ;}
Compute E.value for the root of the parse tree for the expression
2#3 & 5# 6 &7
154
COMPUTER SCIENCE AND ENGINEERING
OR
18. (a) Write Syntax Directed Translator ( SDT) and parse tree for infix to postfix (8)
translation of an expression.
OR
20. (a) Write the Code Generation Algorithm and explain the getreg function (6)
Teaching Plan
No. of
No Contents Lecture
Hours
Module - 1(Introduction to Compilers and lexical analyzer) (8 hours)
155
COMPUTER SCIENCE AND ENGINEERING
156
COMPUTER SCIENCE AND ENGINEERING
157
COMPUTER SCIENCE AND ENGINEERING
Year of
Category L T P Credit Introduction
CST COMPUTER GRAPHICS
304 AND IMAGE
PCC 3 1 0 4 2019
PROCESSING
Preamble:
The purpose of this course is to make awareness about strong theoretical relationships between
computer graphics and image processing. This course helps the learner to understand three-
dimensional environment representation in a computer, transformation of 2D/3D objects, basic
mathematical techniques and algorithms used to build useful applications, imaging, and image
processing techniques. The study of computer graphics and image processing develops the ability
to create image processing frameworks for different domains and develops algorithms for
emerging display technologies.
CO# CO
Describe the working principles of graphics devices(Cognitive Knowledge level:
CO1 Understand)
158
COMPUTER SCIENCE AND ENGINEERING
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO1 PO11 PO1
0 2
CO1
CO2
CO3
CO4
CO5
CO6
Assessment Pattern
Continuous Assessment Tests
Bloom’s End Semester
Category Test 1 (%) Test 2 (%) Examination
Marks (%)
Remember 30 30 30
Understand 30 30 30
159
COMPUTER SCIENCE AND ENGINEERING
Apply 40 40 40
Analyze
Evaluate
Create
Mark Distribution
160
COMPUTER SCIENCE AND ENGINEERING
Syllabus
Module – 1(Basics of Computer graphics and Algorithms)
Basics of Computer Graphics and its applications. Video Display devices- Refresh Cathode Ray
Tubes, Random Scan Displays and systems, Raster scan displays and systems. Line drawing
algorithms- DDA, Bresenham’s algorithm. Circle drawing algorithms- Midpoint Circle generation
algorithm, Bresenham’s algorithm.
Module - 2(Filled Area Primitives and transformations)
Filled Area Primitives- Scan line polygon filling, Boundary filling and flood filling. Two
dimensional transformations-Translation, Rotation, Scaling, Reflection and Shearing, Composite
transformations, Matrix representations and homogeneous coordinates. Basic 3D transformations.
Module - 3 (Clipping and Projections)
Window to viewport transformation. Cohen Sutherland Line clipping algorithm. Sutherland
Hodgeman Polygon clipping algorithm. Three dimensional viewing pipeline. Projections- Parallel
and Perspective projections. Visible surface detection algorithms- Depth buffer algorithm, Scan
line algorithm.
Module - 4 (Fundamentals of Digital Image Processing)
Introduction to Image processing and applications. Image as 2D data. Image representation in
Gray scale, Binary and Colour images. Fundamental steps in image processing. Components of
image processing system. Coordinate conventions. Sampling and quantization. Spatial and Gray
Level Resolution. Basic relationship between pixels– neighbourhood, adjacency, connectivity.
Fundamentals of spatial domain-convolution operation.
Module - 5 (Image Enhancement in Spatial Domain and Image Segmentation)
Basic gray level transformation functions - Log transformations, Power-Law transformations,
Contrast stretching. Histogram equalization. Basics of spatial filtering - Smoothing spatial filter-
Linear and nonlinear filters, and Sharpening spatial filters-Gradient and Laplacian.
Fundamentals of Image Segmentation. Thresholding - Basics of Intensity thresholding and Global
Thresholding. Region based Approach - Region Growing, Region Splitting and Merging. Edge
Detection - Edge Operators- Sobel and Prewitt.
Text Book
1. Donald Hearn and M. Pauline Baker, Computer Graphics, PHI, 2e, 1996
2. Rafael C. Gonzalez and Richard E. Woods, Digital Image Processing. Pearson, 4e, 2017
References
1) William M. Newman and Robert F. Sproull, Principles of Interactive Computer Graphics.
McGraw Hill, 2001
161
COMPUTER SCIENCE AND ENGINEERING
2) Zhigang Xiang and Roy Plastock, Computer Graphics (Schaum’s outline Series), McGraw
Hill, 2019.
3) David F. Rogers , Procedural Elements for Computer Graphics, Tata McGraw Hill,2001.
4) M. Sonka, V. Hlavac, and R. Boyle, Image Processing, Analysis, and Machine Vision,
Thomson India Edition, 4e, 2017.
162
COMPUTER SCIENCE AND ENGINEERING
3. The spatial resolution of an image is given by 128 X 128.What is its storage requirements if
it is represented by 64 gray levels?
Course Outcome 6 (CO6):
1. A skilled medical technician is charged with the job of inspecting a certain class of
monochrome images generated by electronic microscope. To facilitate the inspection, the
technician uses image processing aids. However when he examines the images he finds the
following problems.
(a) Presence of bright isolated dots that are not of interest.
(b) Lack of sharpness
(c) Poor contrast
Identify the sequence of preprocessing steps that the technician may use to overcome the
above mentioned problems and explain it.
(a) Apply histogram equalisation to the image by rounding the resulting image pixels to
integers
(b) Sketch the histogram of the original image and the histogram-equalised image.
3. You have Sobel operator and Laplacian operator for edge detection. Which operator will
you select for edge detection in the case of noisy image? Explain.(Assignment)
163
COMPUTER SCIENCE AND ENGINEERING
QP CODE:
PART A
2. Consider a raster system with a resolution of 1024*1024. What is the size of the
raster needed to store 4 bits per pixel? How much storage is needed if 8 bits per
pixel are to be stored?
3. Show that two successive reflections about either of the coordinate axes is
equivalent to a single rotation about the coordinate origin.
6. Find the orthographic projection of a unit cube onto the x=0, y=0 and z=0 plane.
164
COMPUTER SCIENCE AND ENGINEERING
9. A captured image appears very dark because of wrong lens aperture setting.
Describe an enhancement technique which is appropriate to enhance such an
image.
Part B
(Answer any one question from each module. Each question carries 14 Marks)
11. (a) Write Midpoint circle drawing algorithm and use it to plot a circle with (10)
radius=20 and center is (50,30).
(b) Draw the architecture of raster scan display systems and explain its working (4)
principle.
OR
12. (a) Derive the initial decision parameter of Bresenham’s line drawing algorithm (10)
and use the algorithm to rasterize a line with endpoints (2,2) and (10,10).
(b) Explain the working principle of color CRT monitors with suitable (4)
illustrations.
13. (a) Compare boundary fill algorithm and flood fill algorithm. (5)
(b) Reflect a triangle ABC about the line 3x-4y+8=0. The position vector of the (9)
coordinate ABC is given as A(4,1), B(5,2) and C(4,3).
OR
14. (a) Explain the need of using vanishing points in projections. (4)
(b) Explain Cohen-Sutherland line clipping algorithm. Use the algorithm to clip (10)
line P1(70, 20) and P2(100,10) against a window lower left hand corner
(50,10) and upper right hand corner (80,40).
15. (a) Describe Sutherland Hodegman polygon clipping algorithm and what are its (7)
165
COMPUTER SCIENCE AND ENGINEERING
limitations.
(b) Explain how visible surfaces can be detected using depth buffer algorithm. (7)
OR
16. (a) Describe Sutherland Hodegman polygon clipping algorithm and what are its (7)
limitations.
(b) Explain how visible surfaces can be detected using depth buffer algorithm. (7)
17. (a) Explain the components of an image processing system with suitable diagram (9)
(b) Define Resolution of an image. Explain the spatial and gray level resolution (5)
of an image with an example.
OR
18. (a) Define 4-adjacency, 8 adjacency and m-adjacency. Consider the image (7)
segment shown.
4 2 3 2 (q)
3 3 1 3
2 3 2 2
(p) 2 1 2 3
Let V={1,2} and compute the length of the shortest 4- ,8- and m- path
between p and q. If a particular path does not exist between these two points,
explain why?
(b) Using any one application, explain the steps involved in image processing. (7)
19. (a) A 5x5 image patch is shown below. Compute the value of the marked pixel if (4)
it is smoothened by a 3x3 average filter and median filter.
(b) Define Image segmentation and describe in detail method of edge and region (10)
based segmentation technique.
166
COMPUTER SCIENCE AND ENGINEERING
OR
20. (a) Distinguish between smoothing and sharpening filters in terms of (10)
(i) Functionality
(ii) Types
(iii) Applications
(iv) Mask Coefficients
(b) Describe how an image is segmented using split and merge technique in (8 )
association with the region adjacency graph.
Teaching Plan
No Contents No of Lecture
Hrs (45 hrs)
167
COMPUTER SCIENCE AND ENGINEERING
4.4 Coordinate conventions, Sampling and quantization, Spatial and Gray 1 hour
Level Resolution
168
COMPUTER SCIENCE AND ENGINEERING
adjacency, connectivity
5.5 Basics of spatial filtering, Smoothing spatial filter- Linear and 1 hour
nonlinear filters
5.9 Region Based Approach- Region Growing, Region Splitting and 1 hour1
Merging
169
COMPUTER SCIENCE AND ENGINEERING
ALGORITHM Year of
Category L T P Credit
CST Introduction
ANALYSIS AND
306 DESIGN PCC 3 1 0 4 2019
Preamble:
The course introduces students to the design of computer algorithms, as well as analysis of
algorithms. Algorithm design and analysis provide the theoretical backbone of computer science
and are a must in the daily work of the successful programmer. The goal of this course is to
provide a solid background in the design and analysis of the major classes of algorithms. At the
end of the course students will be able to develop their own versions for a given computational
task and to compare and contrast their performance.
Prerequisite:
Strong Foundation in Mathematics, Programming in C, Data Structures and Graph Theory.
Course Outcomes: After the completion of the course the student will be able to
CO# CO
Analyze any given algorithm and express its time and space complexities in
CO1
asymptotic notations. (Cognitive Level: Apply)
Derive recurrence equations and solve it using Iteration, Recurrence Tree,
CO2 Substitution and Master’s Method to compute time complexity of algorithms.
(Cognitive Level: Apply)
Illustrate Graph traversal algorithms & applications and Advanced Data
CO3 structures like AVL trees and Disjoint set operations. (Cognitive Level:
Apply)
Demonstrate Divide-and-conquer, Greedy Strategy, Dynamic programming,
CO4 Branch-and Bound and Backtracking algorithm design techniques
(Cognitive Level: Apply)
Classify a problem as computationally tractable or intractable, and discuss
CO5
strategies to address intractability (Cognitive Level: Understand)
Identify the suitable design strategy to solve a given problem. (Cognitive
CO6
Level: Analyze)
170
COMPUTER SCIENCE AND ENGINEERING
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO1
CO2
CO3
CO4
CO5 √
CO6
Assessment Pattern
Continuous Assessment Tests
Bloom’s End Semester Examination
Category Test 1 (%) Test 2 (%) Marks (%)
Remember 30 30 30
Understand 30 30 30
Apply 40 40 40
171
COMPUTER SCIENCE AND ENGINEERING
Analyze
Evaluate
Create
Mark Distribution
172
COMPUTER SCIENCE AND ENGINEERING
Syllabus
Module-1 (Introduction to Algorithm Analysis)
Characteristics of Algorithms, Criteria for Analysing Algorithms, Time and Space Complexity -
Best, Worst and Average Case Complexities, Asymptotic Notations - Big-Oh (O), Big- Omega
(Ω), Big-Theta (Θ), Little-oh (o) and Little- Omega (ω) and their properties. Classifying functions
by their asymptotic growth rate, Time and Space Complexity Calculation of simple algorithms.
Analysis of Recursive Algorithms: Recurrence Equations, Solving Recurrence Equations –
Iteration Method, Recursion Tree Method, Substitution method and Master’s Theorem (Proof not
required).
Module–2 (Advanced Data Structures and Graph Algorithms)
Self Balancing Tree - AVL Trees (Insertion and deletion operations with all rotations in detail,
algorithms not expected); Disjoint Sets- Disjoint set operations, Union and find algorithms.
DFS and BFS traversals - Analysis, Strongly Connected Components of a Directed graph,
Topological Sorting.
Module–3 (Divide & Conquer and Greedy Strategy)
The Control Abstraction of Divide and Conquer- 2-way Merge sort, Strassen’s Algorithm for
Matrix Multiplication-Analysis. The Control Abstraction of Greedy Strategy- Fractional Knapsack
Problem, Minimum Cost Spanning Tree Computation- Kruskal’s Algorithms - Analysis, Single
Source Shortest Path Algorithm - Dijkstra’s Algorithm-Analysis.
Module-4 (Dynamic Programming, Back Tracking and Branch & Bound))
The Control Abstraction- The Optimality Principle- Matrix Chain Multiplication-Analysis, All
Pairs Shortest Path Algorithm - Floyd-Warshall Algorithm-Analysis. The Control Abstraction of
Back Tracking – The N Queen’s Problem. Branch and Bound Algorithm for Travelling Salesman
Problem.
Module-5 (Introduction to Complexity Theory)
Tractable and Intractable Problems, Complexity Classes – P, NP, NP- Hard and NP-Complete
Classes- NP Completeness proof of Clique Problem and Vertex Cover Problem- Approximation
algorithms- Bin Packing, Graph Coloring. Randomized Algorithms (Definitions of Monte Carlo
and Las Vegas algorithms), Randomized version of Quick Sort algorithm with analysis.
Text Books
1. T.H.Cormen, C.E.Leiserson, R.L.Rivest, C. Stein, Introduction to Algorithms, 2nd Edition,
Prentice-Hall India (2001)
2. Ellis Horowitz, Sartaj Sahni, Sanguthevar Rajasekaran, “Fundamentals of Computer
Algorithms”, 2nd Edition, Orient Longman Universities Press (2008)
173
COMPUTER SCIENCE AND ENGINEERING
3. Sara Baase and Allen Van Gelder ―Computer Algorithms, Introduction to Design and
Analysis, 3rd Edition, Pearson Education (2009)
Reference Books
1. Jon Kleinberg, Eva Tardos, “Algorithm Design”, First Edition, Pearson (2005)
2. Robert Sedgewick, Kevin Wayne, “Algorithms”,4th Edition Pearson (2011)
3. GIlles Brassard, Paul Brately, “Fundamentals of Algorithmics”, Pearson (1996)
4. Steven S. Skiena, “The Algorithm Design Manual”, 2nd Edition, Springer(2008)
174
COMPUTER SCIENCE AND ENGINEERING
3. Find the minimum and maximum height of any AVL-tree with 7 nodes? Assume that the
height of a tree with a single node is 0. (3)
4. Find any three topological orderings of the given graph.
175
COMPUTER SCIENCE AND ENGINEERING
3. Explain Vertex Cover problem using an example. Suggest an algorithm for finding Vertex
Cover of a graph.
4. Write short notes on approximation algorithms.
5. Compare Conventional quick sort algorithm and Randomized quicksort with the help of a
suitable example?
Course Outcome 6 (CO6): (CO attainment through assignment only, not meant for
examinations)
Choosing the best algorithm design strategy for a given problem after applying applicable design
strategies – Sample Problems Given.
1. Finding the Smallest and Largest elements in an array of ‘n’ numbers
2. Fibonacci Sequence Generation.
3. Merge Sort
4. Travelling Sales Man Problem
5. 0/1 Knapsack Problem
PART A
176
COMPUTER SCIENCE AND ENGINEERING
2. State Master’s Theorem. Find the solution to the following recurrence equations
using Master’s theorem.
a) T (n) = 8T(n/2) + 100 n2
b) T (n) = 2T(n/2) + 10 n
4. Show the UNION operation using linked list representation of disjoint sets.
Part B
(Answer any one question from each module. Each question carries 14 Marks)
11. (a) Define Big O, Big Ω and Big Ɵ Notation and illustrate them graphically. (7)
(b) Solve the following recurrence equation using recursion tree method (7)
T(n) = T(n/3) + T(2n/3) + n , where n>1
T(n) = 1, Otherwise
OR
177
COMPUTER SCIENCE AND ENGINEERING
12. (a) Explain the iteration method for solving recurrences and solve the following (7)
recurrence equation using iteration method.
T(n) = 3T(n/3) + n; T(1) = 1
(b) Determine the time complexities of the following two functions fun1( ) and (7)
fun2( ).
i) int fun1(int n)
{
if (n <= 1) return n;
return 2*fun1(n-1);
}
ii) int fun2 (int n)
{
if (n <= 1) return n;
return fun2 (n-1) + fun2 (n-1)
}
13. (a) Write DFS algorithm and analyse its time complexity. Illustrate the (7)
classification of edges in DFS traversal.
(b) Find the strongly connected components of the digraph given below: (7)
OR
14. (a) Illustrate the advantage of height balanced binary search trees over binary (7)
search trees? Explain various rotations in AVL trees with example.
(b) Perform the following operations in the given AVL trees. (7)
178
COMPUTER SCIENCE AND ENGINEERING
15. (a) State Fractional Knapsack Problem and write Greedy Algorithm for (7)
Fractional Knapsack Problem.
(b) Find the optimal solution for the following Fractional Knapsack problem. (7)
Given the number of items(n) = 7, capacity of sack(m) = 15,
W={2,3,5,7,1,4,1} and P = {10,5,15,7,6,18,3}
OR
16. (a) Write and explain merge sort algorithm using divide and conquer strategy (7)
using the data {30, 19, 35, 3, 9, 46, 10}. Also analyse the time complexity.
(b) Write the pseudo code for Dijkstra’s algorithm. Compute the shortest distance (7)
from vertex 1 to all other vertices using Dijkstra’s algorithm.
17. (a) Write Floyd-Warshall algorithm and analyse its complexity. (5)
(b) Write and explain the algorithm to find the optimal parenthesization of matrix (9)
chain product whose sequence of dimension is 4x10,10x3, 3x12,12x20.
OR
18. (a) Explain the concept of Backtracking method using 4 Queens problem. (7)
179
COMPUTER SCIENCE AND ENGINEERING
(b) Define Travelling Salesman Problem (TSP). Apply branch and bound (7)
algorithm to solve TSP for the following graph, assuming the start city as ‘a’.
Draw the state space tree.
19. (a) State bin packing problem? Explain the first fit decreasing strategy (7)
OR
20. (a) Explain the need for randomized algorithms. Differentiate Las Vegas and (6)
Monte Carlo algorithms.
(b) Explain randomized quicksort and analyse the expected running time of (9 )
randomized quicksort with the help of a suitable example?
Teaching Plan
No. of Hours
No Topic
(45 hrs)
1.2 Criteria for Analysing Algorithms, Time and Space Complexity - Best, 1 hour
Worst and Average Case Complexities.
1.3 Asymptotic Notations - Properties of Big-Oh (O), Big- Omega (Ω), Big- 1 hour
Theta (Θ), Little-Oh (o) and Little- Omega (ω).
180
COMPUTER SCIENCE AND ENGINEERING
1.9 Substitution method and Master’s Theorem and its Illustration. 1 hour
2.1 Self Balancing Trees - Properties of AVL Trees, Rotations of AVL Trees 1 hour
181
COMPUTER SCIENCE AND ENGINEERING
Module-4 (Dynamic Programming, Back Tracking and Branch and Bound) 8 Hrs.
4.4 All Pairs Shortest Path Algorithm- Analysis and Illustration of Floyd- 1 hour
Warshall Algorithm.
4.6 Back Tracking: The Control Abstraction – The N Queen’s Problem. 1 hour
182
COMPUTER SCIENCE AND ENGINEERING
5.8 Randomized Algorithms (definitions of Monte Carlo and Las Vegas 1 hour
algorithms).
183
COMPUTER SCIENCE AND ENGINEERING
Preamble:
The objective of this Course work is to ensure the comprehensive knowledge of each student in
the most fundamental core courses in the curriculum. Six core courses credited from
Semesters 3, 4 and 5 are chosen for the detailed study in this course work. This course helps
the learner to become competent in cracking GATE, placement tests and other competitive
examinations
Prerequisite:
1. Discrete Mathematical Structures
2. Data Structures
3. Operating Systems
4. Computer Organization And Architecture
5. Database Management Systems
6. Formal Languages And Automata Theory
Course Outcomes: After the completion of the course the student will be able to
184
COMPUTER SCIENCE AND ENGINEERING
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO1 PO11 PO1
0 2
CO1
CO2
CO3
CO4
CO5
Assessment Pattern
Remember 10
Understand 20
Apply 20
Analyse
Evaluate
Create
Mark distribution
50 0 50 1 hour
End Semester Examination Pattern: Objective Questions with multiple choice (Four). Question paper
include fifty questions of one mark each covering the five identified courses.
185
COMPUTER SCIENCE AND ENGINEERING
Syllabus
Full Syllabus of all six selected Courses.
No Topic No. of
Lectures
2 DATA STRUCTURES
3 OPERATING SYSTEMS
186
COMPUTER SCIENCE AND ENGINEERING
1. What is the maximum possible number of relations from a set with 5 elements to another set
with 4 elements?
2. The set {1,2,4,7,8,11,13,14} is a group under multiplication modulo 15. Find the inverse of
element 13
187
COMPUTER SCIENCE AND ENGINEERING
7. Which among the following is not a subgroup of the set of Complex numbers under
addition?
(A) 𝑅𝑅, the set of all Real numbers.
(B) Q+, the set of positive rational numbers.
(C) 𝑍𝑍, the set of all integers.
(D) The set 𝑖𝑖𝑖𝑖 of purely imaginary numbers including 0
8. Minimum number 𝑛𝑛 of integers to be selected from 𝑆𝑆 = {1,2, . . . . ,9} to guarantee that the
difference of two of the n integers is 5 is
(A) 3 (B) 4 (C) 6 (D) 9
9. Find the contrapositive the of statement “If it is a sunday, then I will wake up late”
(A) If I am not waking up late, then it is a suniday
(B) If I am not waking up late, then it is not a suniday
(C) If it is not a sunday, then I will not wake up late.
(D) It is not a sunday or I will wake up late
10. In the poset (Z+, |) (where Z+ is the set of all positive integers and | is the divides relation),
which of the following are false?
I. 3 and 9 is comparable
II. 7 and 10 is comparable
III. The poset (Z+, |) is a total order
(A) I and III (B) II only (C) II and III (D) III only
188
COMPUTER SCIENCE AND ENGINEERING
12. The following postfix expression with single digit operands is evaluated using a stack:
822^/43*+51*-
Note that ^ is the exponentiation operator. The top two elements of the stack after the first *
is evaluated are:
(A) 12,2 (B) 12,5 (C) 2,12 (D) 2,5
13. Construct a binary search tree by inserting 8, 6, 12, 3, 10, 9 one after another. To make the
resulting tree as AVL tree which of the following is required?
(A) One right rotation only
(B) One left rotation followed by two right rotations
(C) One left rotation and one right rotation
(D) The resulting tree itself is AVL
14. In a complete 4-ary tree, every internal node has exactly 4 children or no child. The number
of leaves in such a tree with 6 internal nodes is:
(A) 20 (B) 18 (C) 19 (D) 17
a
e
b
c
f
189
COMPUTER SCIENCE AND ENGINEERING
16. Consider a hash table of size seven, with starting index zero, and a hash function (2x + 5)
mod7. Assuming the hash table is initially empty, which of the following is the contents of
the table when the sequence 1, 4, 9, 6 is inserted into the table using closed hashing? Note
that ‘_’ denotes an empty location in the table.
(A) 9, _, 1, 6, _, _, 4 (B) 1, _, 6, 9, _, _, 4
(C) 4, _, 9, 6, _, _, 1 (D) 1, _, 9, 6, _, _, 4
17. Consider the following C program where TreeNode represents a node in a binary tree
struct TreeNode{
struct TreeNode *leftChild;
struct TreeNode *rightChild;
int element;
};
int CountNodes(struct TreeNode *t)
{
if((t==NULL)||((t->leftChild==NULL) && (t->rightChild==NULL)))
return 0;
else
{
return 1+CountNodes(t->leftChild)+CountNodes(t->rightChild)
}
}
The value returned by CountNodes when a pointer to the root of a binary tree is passed as its
argument is
(A) number of nodes
(B) number of leaf nodes
(C) number of non leaf nodes
(D) number of leaf nodes-number of non leaf nodes
18. How many distinct binary search trees can be created out of 6 distinct keys?
(A) 7 (B) 36 (C) 140 (D) 132
19. Suppose a disk has 400 cylinders, numbered from 0 to 399. At some time the disk arm is at
cylinder 58, and there is a queue of disk access requests for cylinder 66, 349, 201, 110, 38,
84, 226, 70, 86. If Shortest-Seek Time First (SSTF) is being used for scheduling the disk
access, the request for cylinder 86 is serviced after servicing ____________ number of
190
COMPUTER SCIENCE AND ENGINEERING
requests.
(A) 1 (B) 2 (C)3 (D)4
20. If frame size is 4KB then a paging system with page table entry of 2 bytes can address
_______ bytes of physical memory.
(A) 2^12 (B) 2^16 (C) 2^18 (D) 2^28
21. Calculate the internal fragmentation if page size is 4KB and process size is 103KB.
(A) 3KB (B) 4KB (C) 1KB (D) 2KB
24. In a system using single processor, a new process arrives at the rate of 12 processes per
minute and each such process requires 5 seconds of service time. What is the percentage of
CPU utilization?
(A) 41.66 (B) 100.00 (C) 240.00 (D) 60.00
25. A system has two processes and three identical resources. Each process needs a maximum of
two resources. This could cause
(A) Deadlock is possible (B) Deadlock is not possible
191
COMPUTER SCIENCE AND ENGINEERING
27. The size of the physical address space of a 32-bit processor is 2^W words. The capacity of
cache memory is 2^N words. The size of each cache block is 2^K words. For a M-way set-
associative cache memory, the length (in number of bits) of the tag field is
(A) W – N + log2M (B) W – N – log2M
(C) W − N − K − log2M (D) W − N − K + log2M
28. A 64-bit processor can support a maximum memory of 8 GB, where the memory is word-
addressable (one word is of 64 bits). The size of the address bus of the processor is atleast
____ bits.
(A) 30 (B) 31 (C) 32 (D) None
29. The stage delays in a 4-stage pipeline are 900, 450, 400 and 350 picoseconds. The first stage
(with delay 900 picoseconds) is replaced with a functionally equivalent design involving two
stages with respective delays 600 and 550 picoseconds. The throughput increase of the
pipeline is _______ percent.
(A) 38 (B) 30 (C) 58 (D) 50
30. Consider a direct mapped cache of size 256 Kilo words with block size 512 words. There are
6 bits in the tag. The number of bits in block (index) and word (offset) fields of physical
address are is:
(A) block (index) field = 6 bits, word (offset) field = 9 bits
(B) block (index) field = 7 bits, word (offset) field = 8 bits
(C) block (index) field = 9 bits, word (offset) field = 9 bits
(D) block (index) field = 8 bits, word (offset) field = 8 bits
31. The memory unit of a computer has 1 Giga words of 64 bits each. The computer has
instruction format, with 4 fields: an opcode field; a mode field to specify one of 12
addressing modes; a register address field to specify one of 48 registers; and a memory
address field. If an instruction is 64 bits long, how large is the opcode field?
(A) 34 bits (B) 24 bits (C) 20 bits (D) 14 bits
32. A computer has 64-bit instructions and 28-bit address. Suppose there are 252 two-address
instructions. How many 1-address instructions can be formulated?
192
COMPUTER SCIENCE AND ENGINEERING
33. Determine the number of clock cycles required to process 200 tasks in a six-segment
pipeline.(Assume there were no stalls),each segment takes 1 cycle.
(A) 1200 cycles (B) 206 cycles (C) 207 cycles (D) 205 cycles
35. Let E1, E2 and E3 be three entities in an E/R diagram with simple single-valued attributes.
R1 and R2 are two relationships between E1 and E2, where R1 is one-to-many, R2 is many-
to-many. R3 is another relationship between E2 and E3 which is many-to-many. R1, R2 and
R3 do not have any attributes of their own. What is the minimum number of tables required
to represent this situation in the relational model?
(A) 3 (B) 4 (C) 5 (D) 6
36. Identify the minimal key for relational scheme R(U, V, W, X, Y, Z) with functional
dependencies F = {U → V, V → W, W → X, VX → Z}
(A) UV (B) UW (C) UX (D) UY
37. It is given that: “Every student need to register one course and each course registered by
many students”, what is the cardinality of the relation say “Register” from the “Student”
entity to the “Course” entity in the ER diagram to implement the given requirement.
(A) M:1 relationship (B) M:N relationship
(C) 1:1 relationship (D) option (B) or(C)
193
COMPUTER SCIENCE AND ENGINEERING
39. Consider the following relation instance, where “A” is primary Key.
A1 A2 A3 A4
1 1 1 Null
5 2 5 1
9 5 13 5
13 13 9 15
Which one of the following can be a foreign key that refers to the same relation?
(A) A2 (B) A3 (C) A4 (D) ALL
40. A relation R(ABC) is having the tuples(1,2,1),(1,2,2),(1,3,1) and (2,3,2). Which of the
following functional dependencies holds well?
(A) A → BC (B) AC → B (C) AB → C (D) BC → A
41. Consider a relation R with attributes A, B, C, D and E and functional dependencies A → BC,
BC → E, E →DA. What is the highest normal form that the relation satisfies?
(A) BCNF (B) 3 NF (C) 2 NF (D) 1 NF
42. For the given schedule S, find out the conflict equivalent schedule.
S : r1(x); r2(Z) ; r3(X); r1(Z); r2(Y); r3(Y);W1(X); W2(Z); W3(Y); W2(Y)
(A) T1→T2→T3 (B) T2->T1->T3
(C) T3→T1→T2 (D) Not conflict serializable
43. Which of the following strings is in the language defined by the grammar:
S → aX
X → aX | bX | b
(A) aaaba (B) babab (C) aaaaa (D) ababb
44. Consider the regular expression (x+y)*xyx(x+y)* where Σ = (x,y). If L is the language
represented by this regular expression, then what will be the minimum number of states in a
DFA recognizing L ?
(A) 2 (B) 3 (C) 4 (D) 5
45. Which of the following cannot handle the same set of languages?
(A) Deterministic Finite Automata and Non-Deterministic Finite Automata
(B) Deterministic Push Down Automata and Non-Deterministic Push Down Automata
(C) All of these
(D) None of these
194
COMPUTER SCIENCE AND ENGINEERING
(I) L will definitely pass the pumping lemma test for CFLs.
(II) M will definitely pass the pumping lemma test for CFLs.
(III) L will not definitely pass the pumping lemma test for CFLs.
(IV) M will not definitely pass the pumping lemma test for CFLs.
(V) L may or maynot pass the pumping lemma test for CFLs.
(VI) M may or maynot pass the pumping lemma test for CFLs.
(A) I, II (B) II, V (C) I, VI (D) IV, V
49. Which of the following regular expressions defined over the alphabet Σ = {0,1} defines the
language of all strings of length l where l is a multiple of 3?
(A) (0 + 1 + 00 + 11 + 000 +111)* (B) (000 + 111)*
(C) ((0 + 1)(0 + 1)(0 + 1))* (D) ((000 + 01 + 1)(111 + 10 + 0))*
50. Determine the minimum number of states of a DFA that recognizes the language over the
alphabet {a,b} consisting of all the strings that contain at least three a's and at least four b's.
ANSWER KEY:-
QNo Ans. QNo Ans. QNo Ans. QNo Ans. QNo Ans.
Key Key Key Key Key
195
COMPUTER SCIENCE AND ENGINEERING
196
COMPUTER SCIENCE AND ENGINEERING
Use network related commands and configuration files in Linux Operating System.
CO1
(Cognitive Knowledge Level: Understand).
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO1
CO2
CO3
197
COMPUTER SCIENCE AND ENGINEERING
CO4
CO5
Assessment Pattern
Mark Distribution
150 75 75 3 hours
198
COMPUTER SCIENCE AND ENGINEERING
Continuous Internal Evaluation Pattern:
Attendance : 15 marks
All the students attending the Networking Lab should have a Fair Record. Every experiment
conducted in the lab should be noted in the fair record. For every experiment, in the fair
record, the right hand page should contain experiment heading, experiment number, date of
experiment, aim of the experiment, procedure/algorithm followed, other such details of the
experiment and final result. The left hand page should contain a print out of the respective
code with sample input and corresponding output obtained. All the experiments noted in the
fair record should be verified by the faculty regularly. The fair record, properly certified by
the faculty, should be produced during the time of End Semester Examination for the
verification by the examiners.
199
COMPUTER SCIENCE AND ENGINEERING
Syllabus
*Mandatory
(Note: At least one program from each topic in the syllabus should be completed in the Lab)
1. Getting started with the basics of network configuration files and networking
commands in Linux.*
2. To familiarize and understand the use and functioning of system calls used for
network programming in Linux.*
3. Implement client-server communication using socket programming and TCP as
transport layer protocol*
4. Implement client-server communication using socket programming and UDP as
transport layer protocol*
5. Simulate sliding window flow control protocols.* (Stop and Wait, Go back N,
Selective Repeat ARQ protocols)
6. Implement and simulate algorithm for Distance Vector Routing protocol or Link
State Routing protocol.*
7. Implement Simple Mail Transfer Protocol.
8. Implement File Transfer Protocol.*
9. Implement congestion control using a leaky bucket algorithm.*
10. Understanding the Wireshark tool.*
11. Design and configure a network with multiple subnets with wired and wireless LANs
using required network devices. Configure commonly used services in the network.*
12. Study of NS2 simulator*
200
COMPUTER SCIENCE AND ENGINEERING
4. Implement a Concurrent Time Server application using UDP to execute the program
at a remote server. Client sends a time request to the server, server sends its system
time back to the client. Client displays the result.
5. a) Implement Stop-and-Wait ARQ flow control protocol.
b) Implement Go-Back--N ARQ flow control protocol.
c) Implement Selective Repeat ARQ flow control protocol.
6. Implement Distance Vector Routing algorithm or Link State Routing algorithm..
7. Implement Simple Mail Transfer Protocol.
8. Develop a concurrent file server which will provide the file requested by a client if it
exists. If not, the server sends appropriate message to the client. Server should also
send its process ID (PID) to clients for display along with the file or the message.
9. Implement leaky bucket algorithm for congestion control.
10. a) Using Wireshark, Capture packets transferred while browsing a selected website.
Investigate the protocols used in each packet, the values of the header fields and the
size
of the packet.
b) Using Wireshark, observe three way handshaking connection establishment, three
way handshaking connection termination and Data transfer in client server
communication using TCP.
c) Explore at least the following features of Wireshark: filters, Flow graphs (TCP),
statistics, and protocol hierarchies.
11. Design and configure a network (wired and wireless LANs) with multiple subnets
using required network devices. Configure at least three of the following services in
the network- TELNET, SSH, FTP server, Web server, File server, DHCP server and
DNS server.
12. a) The network consists of TCP source node (n0) and destination node (n1) over an
area size of 500m x 500m. Node (n0) uses Agent/TCP/Reno as the sending TCP
agent and FTP traffic source. Node (n1) is the receiver of FTP transfers, and it uses
Agent/TCP sink as its TCP-agent for the connection establishment. Run the
simulation for 150 seconds and show the TCP window size in two static nodes
scenario with any dynamic routing protocol. Run the script and analyze the output
graph for the given scenario.
b) Simulate the transmission of ping messages over a star network topology consisting
of ‘n’ nodes and find the number of packets dropped due to congestion using
NS2simulator.
c) Simulate Link State Protocol or Distance Vector Routing protocol in NS2.
201
COMPUTER SCIENCE AND ENGINEERING
Reference Books:
202
COMPUTER SCIENCE AND ENGINEERING
Year of
CSD Category L T P Credit
MINI PROJECT Introduction
334
PCC 0 0 3 2 2019
Preamble:
The objective of this course is to apply the fundamental concepts of Software Engineering
principles for the effective development of an application/research project. This course helps the
learners to practice the different steps to be followed in the software development process such as
literature review and problem identification, preparation of Software Requirement Specification
&Software Design Document (SDD), testing, development and deployment. Mini project
enables the students to boost their skills, widen the horizon of thinking and their ability to resolve
real life problems.
Prerequisite:
A sound knowledge in any programming language and fundamental concepts of Software
Engineering.
Course Outcomes: After the completion of the course the student will be able to
CO# CO
Identify technically and economically feasible problems (Cognitive Knowledge
CO1
Level: Apply)
Identify and survey the relevant literature for getting exposed to related
CO2
solutions and get familiarized with software development processes
(Cognitive Knowledge Level: Apply)
Perform requirement analysis, identify design methodologies and develop
CO3 adaptable & reusable solutions of minimal complexity by using modern tools &
advanced programming techniques (Cognitive Knowledge Level: Apply)
Prepare technical report and deliver presentation (Cognitive Knowledge Level:
CO4 Apply)
Apply engineering and management principles to achieve the goal of the project
CO5 (Cognitive Knowledge Level: Apply)
203
COMPUTER SCIENCE AND ENGINEERING
Mapping of course outcomes with program outcomes
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO1 PO11 PO1
0 2
CO1
CO2
CO3
CO4
CO5
Assessment Pattern
Mark Distribution
204
COMPUTER SCIENCE AND ENGINEERING
Evaluation by the Committee (will be evaluating the level of completion
and demonstration of functionality/specifications, presentation,
oral examination, work knowledge and involvement) : 40 marks
Student Groups with 3 or 4 members should identify a topic of interest in consultation with a
Faculty/Advisor. Review the literature and gather information pertaining to the chosen topic.
State the objectives and develop a methodology to achieve the objectives. Carryout the
design/fabrication or develop codes/programs to achieve the objectives by strictly following
steps specified in the teaching plan. Innovative design concepts, performance, scalability,
reliability considerations, aesthetics/ergonomic, user experience and security aspects taken care
of in the project shall be given due weight.
The progress of the mini project is evaluated based on a minimum of two reviews. The review
committee may be constituted by the Head of the Department comprising HoD or a senior
faculty member, Mini Project coordinator and project guide. The internal evaluation shall be
made based on the progress/outcome of the project, reports and a viva-voce examination,
conducted internally by a 3-member committee. A project report is required at the end of the
semester. The project has to be demonstrated for its full design specifications.
205
COMPUTER SCIENCE AND ENGINEERING
TEACHING PLAN
Students are expected to follow the following steps.
1. Review of Literature and Identification of a problem
2. Create an abstract with a problem statement, solution approach, technology stack, team,
etc. and get department approval. Register Online course/ Collect study materials.
3. Create Software Requirements Specification (SRS Document)
4. Create Software Design Document (SDD). This may include designs like,
a. System Architecture Design
b. Application Architecture Design
c. GUI Design (Mockups)
d. API Design
e. Database Design
f. Technology Stack
5. Create Test Plan, Test Scenarios and Test Cases (Test Case Document) & Traceability
Matrix
6. Create a Project Plan (with Modules, Tasks, Resources, Time schedule) [May use any
project management tool or excel for this] – Choose and follow agile or waterfall
models.
7. Development
a. Set coding standards
b. Environment Setup
c. Source Code Control Setup (Like Subversion(SVN), Git)
d. Development
e. Unit Testing
f. Integration Testing
g. Testing /Quality Assurance(QA)
i. Functional Testing
ii. Load Testing
iii. Report Bugs
h. Resolve Bugs & Retest
206
COMPUTER SCIENCE AND ENGINEERING
8. Deployment (of software from local development environment to a production
environment)
9. Test Run & Get Results
10. Prepare Project Report
207
COMPUTER SCIENCE AND ENGINEERING
SEMESTER VI
PROGRAM ELECTIVE I
208
COMPUTER SCIENCE AND ENGINEERING
Preamble:
This course enables the learners to understand the mathematical foundations of Machine
Learning concepts. This course covers Linear Algebra, Probability and Distributions. Concepts in
this course help the learners to identify the inherent assumptions & limitations of the current
methodologies and develop new Machine Learning solutions.
Prerequisite: A sound background in higher secondary school Mathematics.
Course Outcomes: After the completion of the course the student will be able to
PO PO 2 PO 3 PO 4 PO 5 PO 6 PO 7 PO 8 PO 9 PO PO 11 PO
1 10 12
CO
1
CO
2
CO
3
CO
4
209
COMPUTER SCIENCE AND ENGINEERING
CO 5
Assessment Pattern
Remember
30% 30% 30%
Understand
30% 30% 30%
Apply
40% 40% 40%
Analyse
Evaluate
Create
210
COMPUTER SCIENCE AND ENGINEERING
Mark Distribution
Attendance : 10 marks
First Internal Examination shall be preferably conducted after completing the first half of the
syllabus and the Second Internal Examination shall be preferably conducted after completing
remaining part of the syllabus.
There will be two parts: Part A and Part B. Part A contains 5 questions (preferably, 2 questions each
from the completed modules and 1 question from the partly covered module), having 3 marks for
each question adding up to 15 marks for part A. Students should answer all questions from Part A.
Part B contains 7 questions (preferably, 3 questions each from the completed modules and 1
question from the partly covered module), each with 7 marks. Out of the 7 questions in Part B, a
student should answer any 5.
There will be two parts; Part A and Part B. Part A contain 10 questions with 2 questions from each
module, having 3 marks for each question. Students should answer all questions. Part B contains 2
questions from each module of which student should answer anyone. Each question can have
maximum 2 sub-divisions and carry 14 marks.
211
COMPUTER SCIENCE AND ENGINEERING
Syllabus
Text book:
1. Marc Peter Deisenroth, A. Aldo Faisal, Cheng Soon Ong, Mathematics for Machine
Learning, Cambridge University Press (freely available at https://mml – book.github.io)
2. John A. Rice, Mathematical Statistics and Data Analysis, University of California,
Berkeley, Third edition, published by Cengage.
212
COMPUTER SCIENCE AND ENGINEERING
Reference books:
1. Gilbert Strang, Linear Algebra and Its Applications, 4th Edition,
2. Axler, Sheldon, Linear Algebra Done Right, 2015 Springer
3. Stephen Boyd and Lieven Vandenberghe, Introduction to Applied Linear Algebra, 2018
published by Cambridge University Press
1. Find the set S of all solutions in x of the following inhomogeneous linear systems Ax = b,
where A and b are defined as follows:
4. A set of n linearly independent vectors in Rn forms a basis. Does the set of vectors (2, 4,−3)
(0, 1, 1) , (0, 1,−1) form a basis for R3? Explain your reasons.
213
COMPUTER SCIENCE AND ENGINEERING
2. Let A and B be events such that P(A)=0.45 , P(B)=0.35 and P(A∪B)=0.5. Find P(A∣B).
3. A random variable R has the probability distribution as shown in the following table:
214
COMPUTER SCIENCE AND ENGINEERING
4. A biased coin (with probability of obtaining a head equal to p > 0) is tossed repeatedly and
independently until the first head is observed. Compute the probability that the first head
appears at an even numbered toss.
5. Two players A and B are competing at a quiz game involving a series of questions. On any
individual question, the probabilities that A and B give the correct answer are p and q
respectively, for all questions, with outcomes for different questions being independent.
The game finishes when a player wins by answering a question correctly. Compute the
probability that A wins if
i. A answers the first question,
ii. B answers the first question.
6. A coin for which P(heads) = p is tossed until two successive tails are obtained. Find the
probability that the experiment is completed on the nth toss.
1. An urn contains p black balls, q white balls, and r red balls; and n balls are chosen
without replacement.
a. Find the joint distribution of the numbers of black, white, and red balls in the
sample.
b. Find the joint distribution of the numbers of black and white balls in the
sample.
c. Find the marginal distribution of the number of white balls in the sample.
2. Suppose that two components have independent exponentially distributed lifetimes, T1
and T2, with parameters α and β, respectively. Find (a) P( T1 > T2 ) and (b) P( T1 > 2 T2).
3. Let Z1 and Z2 be independent random variables each having the standard normal
distribution. Define the random variables X and Y by X = Z1 + 3Z2 and Y = Z1 + Z2.
Argue that the joint distribution of (X, Y) is a bivariate normal distribution. What are the
parameters of this distribution?
215
COMPUTER SCIENCE AND ENGINEERING
4. Given a continuous random variable x, with cumulative distribution function Fx(x), show
that the random variable y = Fx(x) is uniformly distributed.
5. You roll a fair dice twice. Let the random variable X be the product of the outcomes of
the two rolls. What is the probability mass function of X? What are the expected values
and the standard deviation of X?
6. Let X be a continuous random variable with the density function f (x) = 2x, 0 ≤ x ≤ 1
a. Find E(X).
b. Find E(X2) and Var(X).
1. Find the moment-generating function of a Bernoulli random variable, and use it to find
the mean, variance, and third moment.
2. Use moment-generating functions to show that if X and Y are independent, then Var(aX
+ bY ) = a2Var(X) + b2Var(Y ).
3. Suppose that you bet Rs 5 on each of a sequence of 50 independent fair games. Use the
central limit theorem to approximate the probability that you will lose more than Rs 75.
4. Suppose that the number of insurance claims, N, filed in a year is Poisson distributed
with E(N) = 10,000. Use the normal approximation to the Poisson to approximate P(N >
10,200).
216
COMPUTER SCIENCE AND ENGINEERING
1 Show that with the usual operation of scalar multiplication but with addition on
reals given by x # y = 2(x + y) is not a vector space.
3 Find the eigenvalues of the following matrix in terms of k. Can you find an
eigenvector corresponding to each of the eigenvalues?
5 The first three digits of a telephone number are 452. If all the sequences of the
remaining four digits are equally likely, what is the probability that a randomly
selected telephone number contains seven distinct digits?
217
COMPUTER SCIENCE AND ENGINEERING
6 Show that if two events A and B are independent, then A and B' are independent.
7 Prove that X and Y are independent if and only if fX|Y (x|y) = fX (x) for all x and y.
9 Compare the Poisson cdf and the normal approximation for (a) λ = 10, (b) λ =
20, and (c) λ = 40.
10 x 3 = 30
10 State law of large numbers.
PART B
Answer any one Question from each module. Each question carries 14 Marks
11 a) Find all solutions to the system of linear equations (8)
Consider the transformation T (x, y) = (x + y, x + 2y, 2x + 3y). Obtain ker T and (6)
b) use this to calculate the nullity. Also find the transformation matrix for T.
OR
12 a) Consider the following linear mapping (8)
218
COMPUTER SCIENCE AND ENGINEERING
iii. Compute the kernel and image of the mapping and find their dimension
b) Prove that all vectors orthogonal to [2, −3, 1]T forms a subspace W of R3. What (6)
is dim (W) and why?
13 a) Find an orthonormal basis of R3 consisting of eigenvectors for the following (8)
matrix
OR
14 a) Find an orthogonal basis for the subspace of R4 spanned by { w1 = (1, 1, 3, 2), w2 (8)
= (1, −2, 0, −1), w3 = (0, 2, 1, 2) }.
b) Find the characteristic equation, eigenvalues, and eigenspaces corresponding to (6)
each eigenvalue of the following matrix
15 a) Three players play 10 independent rounds of a game, and each player has (7)
probability 1/3 of winning each round. Find the joint distribution of the numbers
of games won by each of the three players.
b) An experiment consists of throwing a fair coin four times. Find the probability (7)
mass function and the cumulative distribution function of the following random
variables:
219
COMPUTER SCIENCE AND ENGINEERING
16 a) A factory runs three shifts. On a given day, 1% of the items produced by the first (8)
shift are defective, 2% of the second shift’s items are defective, and 5% of the
third shift’s items are defective. If the shifts all have the same productivity, what
percentage of the items produced in a day are defective? If an item is defective,
what is the probability that it was produced by the third shift?
b) Show that if A and B are two independent events, then P(A ∪ B) = P(A) + P(B) (6)
− P(A)P(B)
17 a) Find the joint density of X + Y and X/Y, where X and Y are independent (8)
exponential random variables with parameter λ. Show that X + Y and X/Y are
independent.
b) Let X be a discrete random variable that takes on values 0, 1, 2 with probabilities
(6)
1/2 , 3/8 , 1/8 , respectively.
i. Find E(X) and Var(X).
ii. Let Y = X2. Find the probability mass function of Y and use it to find E(Y).
18 a) A random square has a side length that is a uniform [0, 1] random variable. Find (7)
the expected area of the square.
b) Let X be a continuous random variable with probability density function on (7)
2 2
0 <= x <= 1 defined by f(x) = 3x . Find the pdf of Y = X .
19 a) Using the fact that the mean of the chi-squared distribution is (n-1), prove that (7)
2 2
E(S ) = σ .
b) i. Random samples of size 36 are taken from an infinite population whose mean (7)
is 80 and standard deviation is 18. Find the mean and standard error of the
220
COMPUTER SCIENCE AND ENGINEERING
sampling distribution.
ii. Why is the Central Limit Theorem so important to statistical analysis?
OR
20 a) A six-sided die is rolled 100 times. Using the normal approximation, find the (8)
probability that the face showing a six turns up between 15 and 20 times. Find
the probability that the sum of the face values of the 100 trials is less than 300.
b) Determine an interval (a, b) such that P[a ≤ t ≤ b ] = 0.80, and that 10% of the
area is on each side of a and b, assuming that the sample is of size 21. (6)
221
COMPUTER SCIENCE AND ENGINEERING
Teaching Plan
No Topic No. of
Lectures
(35)
2.1. Norms, Inner Products, Lengths and Distances, Angles and Orthogonality,
1 hour
222
COMPUTER SCIENCE AND ENGINEERING
223
COMPUTER SCIENCE AND ENGINEERING
5.5 Distributions derived from the Normal Distribution - Chi-square and, and F 1 hour
Distributions,
5.6 Distributions derived from the Normal Distribution - Sample Mean and the 1 hour
Sample Variance.
224
COMPUTER SCIENCE AND ENGINEERING
Preamble:
This course helps the learner to understand the basic concepts of data analytics. This course covers
mathematics for data analytics, predictive and descriptive analytics of data, Big data and its
applications, techniques for managing big data and data analysis & visualization using R
programming tool. It enables the learners to perform data analysis on a real world scenario using
appropriate tools.
Prerequisite: NIL
Course Outcomes: After the completion of the course the student will be able to
CO1 Illustrate the mathematical concepts for data analytics (Cognitive Knowledge
Level: Apply)
CO2 Explain the basic concepts of data analytics (Cognitive Knowledge Level:
Understand)
CO4 Describe the key concepts and applications of Big Data Analytics (Cognitive
Knowledge Level: Understand)
CO5 Demonstrate the usage of Map Reduce paradigm for Big Data Analytics
(Cognitive Knowledge Level: Apply)
CO6 Use R programming tool to perform data analysis and visualization (Cognitive
Knowledge Level: Apply)
225
COMPUTER SCIENCE AND ENGINEERING
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO1
CO2
CO3
CO4
CO5
CO6
226
COMPUTER SCIENCE AND ENGINEERING
Assessment Pattern
Test 1 Test 2
(%) (%)
Remember 30 30 30
Understand 40 40 40
Apply 30 30 30
Mark Distribution
150 50 100 3
227
COMPUTER SCIENCE AND ENGINEERING
from the partly completed module), each with 7 marks. Out of the 7 questions, a student should
answer any5.
There will be two parts; Part A and Part B. Part A contains 10 questions with 2 questions from each
module, having 3 marks for each question. Students should answer all questions. Part B contains 2
full questions from each module of which students should answer any one. Each question can have
a maximum 2 sub-divisions and carries 14 marks.
Syllabus
Descriptive statistics - Measures of central tendency and dispersion, Association of two variables -
Discrete variables, Ordinal and Continuous variable, Probability calculus - probability distributions,
Inductive statistics - Point estimation, Interval estimation, Hypothesis Testing - Basic definitions, t-
test
Module - 2 (Introduction to Data Analytics)
Big Data Overview – State of the practice in analytics, Example Applications - Credit Risk
Modeling, Business Process Analytics.Big Data Analytics using Map Reduce and Apache Hadoop,
Developing and Executing a HadoopMapReduce Program.
Module - 5 (R programming for Data Analysis)
228
COMPUTER SCIENCE AND ENGINEERING
Text Book
1. Bart Baesens," Analytics in a Big Data World: The Essential Guide to Data Science and
its Business Intelligence and Analytic Trends”, John Wiley & Sons, 2013.
2. David Dietrich, “EMC Education Services, Data Science and Big Data Analytics:
Discovering, Analyzing, Visualizing and Presenting Data”, John Wiley & Sons, 2015.
3. Jaiwei Han, MichelineKamber, “Data Mining Concepts and Techniques'', Elsevier, 2006.
4. Christian Heumann and Michael Schomaker, “Introduction to Statistics and
DataAnalysis”, Springer, 2016
References
1. Margaret H. Dunham, Data Mining: Introductory and Advanced Topics. Pearson, 2012.
2. Michael Berthold, David J. Hand, Intelligent Data Analysis, Springer, 2007.
72 84
50 63
229
COMPUTER SCIENCE AND ENGINEERING
81 77
74 78
94 90
86 75
59 49
83 79
65 77
33 52
88 74
81 90
a) Use the method of least squares to find an equation for the prediction of a
student’s final exam marks based on the student’s midterm grade in the
course.
b) Predict the final exam marks of a student who received an 86 on the
midterm exam.
2. Perform knn classification on the following dataset and predict the class for the data
point X (P1 = 3, P2 =7), assuming the value of k as 3.
P1 P2 Class
7 7 False
7 4 False
3 4 True
1 4 True
230
COMPUTER SCIENCE AND ENGINEERING
Members 23 24 27 25 30 28
231
COMPUTER SCIENCE AND ENGINEERING
3. List and explain any two methods for dealing with missing values in a dataset.
4. Consider the following data (in increasing order) for the attribute age: 13, 15, 16, 16, 19, 20,
20, 21, 22, 22, 25, 25, 25, 25, 30, 33, 33, 35, 35, 35, 35, 36, 40, 45, 46, 52, 70. Sketch an
example for stratified sampling using samples of size 5 and the strata “youth,” “middle-aged,”
and “senior.”
6. Find the absolute support, relative support and confidence of the rule (bread => jam) in the
following set of transactions
T1 {bread, butter}, T2{bread, jam, milk}
T3{Milk, curd}, T4{bread, jam}
Part B
(Answer any one question from each module. Each question carries 14 Marks)
(b) A hiking enthusiast has a new app for his smartphone which summarizes his hikes by
using a GPS device. Let us look at the distance hiked (in km) and maximum altitude (in (6)
m) for the last 10 hikes:
Distance 12.5 29.9 14.8 18.7 7.6 16.2 16.5 27.4 12.1 17.5
Altitude 342 1245 502 555 398 670 796 912 238 466
Calculate the arithmetic mean and median for both distance and altitude.
OR
232
COMPUTER SCIENCE AND ENGINEERING
(b) A total of 150 customers of a petrol station are asked about their satisfaction with their (6)
car and motorbike insurance. The results are summarized below: Determine and
interpret Pearson’s χ2 statistic and Cramer’s V.
Satisfied Unsatisfied Total
Car 33 25 58
Car (Diesel engine) 29 31 60
Motor bike 12 20 32
Total 74 76 150
(b) Discuss the methods for handling noisy data. Consider the following sorted data for (6)
price (in dollars) 4, 8, 15, 21, 21, 24, 25, 28, 34.
Illustrate smoothing by bin means and bin boundaries
OR
14. (a) a) What is the need for sampling in data analytics? Discuss the different sampling (8)
techniques.
(b) Use these methods to normalize the following group of data: (6)
200, 300, 400, 600, 1000
(i) min-max normalization by setting min = 0 and max = 1
(ii) z-score normalization
(iii) normalization by decimal scaling .
15. (a) A database has five transactions. Let min_sup be 60% and min_conf be 80%.
.
TID items_bought
T100 {M, O, N, K, E, Y}
T200 {D, O, N, K, E, Y}
T300 {M, A, K, E}
T400 {M, U, C, K, Y}
T500 {C, O, O, K, I, E}
233
COMPUTER SCIENCE AND ENGINEERING
(b) Generate strong association rules from any one 3 itemset. (4)
OR
(b) Suppose that the data mining task is to cluster points (with (x, y) representing location) (6)
into three clusters, where the points areA1(2,10), A2 (2,5), A3 (8,4), B1 (5,8), B2 (7,5),
B3 (6,4), C1(1,2), C2 (4,9). The distance function is Euclidean distance. Suppose
initially we assign A1, B1, and C1as the center of each cluster, respectively. Use the k-
means algorithm to show only
(a) The three cluster centers after the first round of execution.
(b) The final three clusters.
17. (a) Illustrate the working of a Map Reduce program with example.
(8)
OR
18. (a) Discuss the architecture of HDFS and its features. (8)
(b) Illustrate the use of big data analytics in credit risk modeling. (6)
19. (a) List and explain the R functions used in descriptive statistics. (8)
OR
20. (a) Discuss the data visualization for multiple variables in R (8)
(b) Describe the R functions used for cleaning dirty data. (6)
(5 x 14 = 70)
234
COMPUTER SCIENCE AND ENGINEERING
Teaching Plan
No Contents No of
Lecture
Hrs
235
COMPUTER SCIENCE AND ENGINEERING
4.4 Big Data Analytics using Map Reduce and Apache Hadoop 1
4.5 Big Data Analytics using Map Reduce and Apache Hadoop 1
236
COMPUTER SCIENCE AND ENGINEERING
237
COMPUTER SCIENCE AND ENGINEERING
Year Of
FOUNDATIONS Category L T P Credit
CST Introduction
OF SECURITY IN
332
COMPUTING PEC 2 1 0 3 2019
Preamble: The purpose of this course is to create awareness among learners about the
fundamentals of security and number theory. This course covers Integer & Modular Arithmetic,
Primes & Congruences, Discrete Logarithms & Elliptic Curve Arithmetic and an overview of
computer security. The concepts covered in this course enable the learners in effective use of
cryptographic algorithms and to identify the security threats in computing.
Course Outcomes: After the completion of the course, the student will be able to
Use the concepts of prime numbers and factorization for ensuring security in
CO2 computing systems (Cognitive Knowledge Level: Apply)
238
COMPUTER SCIENCE AND ENGINEERING
Mapping of course outcomes with program outcomes
CO1
CO2
CO3
CO4
CO5
Assessment Pattern
End Semester
Bloom’s Category Test 1 (%) Test 2 (%)
Examination (%)
Remember 30 30 30
Understand 30 30 30
Apply 40 40 40
Analyse
239
COMPUTER SCIENCE AND ENGINEERING
Evaluate
Create
Mark Distribution
Total Marks CIE Marks ESE Marks ESE Duration
150 50 100 3
Each of the two internal examinations has to be conducted out of 50 marks. First series test shall
be preferably conducted after completing the first half of the syllabus and the second series test
shall be preferably conducted after completing remaining part of the syllabus. There will be two
parts: Part A and Part B. Part A contains 5 questions (preferably, 2 questions each from the
completed modules and 1 question from the partly completed module), having 3 marks for each
question adding up to 15 marks for part A. Students should answer all questions from Part A.
Part B contains 7 questions (preferably, 3 questions each from the completed modules and 1
question from the partly completed module), each with 7 marks. Out of the 7 questions, a student
should answer any 5.
There will be two parts; Part A and Part B. Part A contains 10 questions with 2 questions from
each module, having 3 marks for each question. Students should answer all questions. Part B
contains 2 questions from each module of which a student should answer any one. Each question
can have maximum 2 sub-divisions and carries 14 marks.
Syllabus
Module-1 (Modular Arithmetic)
Integer arithmetic - Integer division, Divisibility, Greatest Common Divisor (GCD), Euclid's
algorithm for GCD, Extended Euclid’s algorithm, Linear Diophantine Equations. Modular
240
COMPUTER SCIENCE AND ENGINEERING
arithmetic - Operations, Properties. Algebraic structures - Groups, Rings, Fields, Finite fields,
GF(p), GF (2n).
Text Books
1. Behrouz A Forouzan, Cryptography and Network Security, 3/e, Tata McGraw-Hill.
2. Charles P Pfleeger, Shari Lawrence Pfleeger, Jonathan Margulies, Security in
Computing, 5/e, Prentice Hall.
3. G.A. Jones & J.M. Jones, Elementary Number Theory, Springer UTM, 2007
241
COMPUTER SCIENCE AND ENGINEERING
References
1. William Stallings, Cryptography and Network Security Principles and Practices, 4/e,
Pearson Ed.
242
COMPUTER SCIENCE AND ENGINEERING
Reg No:_______________
Name:_________________
10. How does the two-phase update technique help the database manager in handling
failures? (10x3=30)
Part B
(Answer any one question from each module. Each question carries 14
Marks)
243
COMPUTER SCIENCE AND ENGINEERING
11. (a) For the group G = < Z6*, x>, prove that it is an Abelian group. Also show the
result of 5 x 1 and 1 ÷ 5. (6)
(b) Find a particular and the general solution to the following linear Diophantine
equations. (8)
i) 19 x+13y = 20 ii) 40 x + 16 y =88
OR
12. (a) Describe the properties of modular arithmetic and modulo operator.
(6)
(b) Using Extended Euclidean algorithm, find the multiplicative inverse of (i) (8)
131 in Z180 and (ii) 23 in Z100.
13. (a) State and prove Fermat’s theorem. (6)
(b) Explain Fermat’s factorization method and use it to factor 809009. (8)
OR
14. (a) Define Euler’s totient function. Prove that, Ø(pq)=(p-1)(q-1) where p and q (7)
are prime numbers.
(b) Define Fermat primes. Show that any two distinct Fermat numbers are (7)
relatively prime.
15. (a) Using Chinese Remainder Theorem, solve the system of congruence, x (7)
≡2(mod 3), x ≡3(mod 5), x ≡2(mod 7).
(b) Define Carmichael number and show that a Carmichael number must be the (7)
product of at least three distinct primes.
OR
16. (a) For the group G = <Z19*, x>, find the primitive roots in the group. (6)
(b) Consider the elliptic curve y2 = x3+ x + 1 defined over Z23. If P = (3, 10) and (8)
Q = (9,7) are two points on the elliptic curve, find 2P and P + Q.
17. (a) Distinguish the terms vulnerability, threat and control. (4)
(b) With the help of suitable examples, explain the security problems created by (10)
incomplete mediation and time-of-check to time-of use.
OR
18. (a) Differentiate between man-in-the-browser attack and page-in-the-middle (4)
attack.
244
COMPUTER SCIENCE AND ENGINEERING
19. (a) List any six computer security related functions addressed by operating (6)
systems.
(b) How does a kernelized design support in enforcing security mechanisms? (8)
OR
20. (a) Explain any four security requirements of databases. (4)
(b) How can database disclosure be prevented? With the help of suitable (10)
examples, explain any six types of disclosure.
Teaching Plan
No Contents No.of
Lecture
Hrs
Module-1 (Modular Arithmetic) (6 hrs)
245
COMPUTER SCIENCE AND ENGINEERING
Module-3 (Linear Congruence, Primitive Roots and Elliptic Curve Arithmetic) (7 hrs)
246
COMPUTER SCIENCE AND ENGINEERING
247
COMPUTER SCIENCE AND ENGINEERING
YEAR OF
CST AUTOMATED Category L T P CREDIT
INTRODUCTION
342 VERIFICATION
PEC 2 1 0 3 2019
Preamble: This course is intended to impart the basic theory and algorithm for an automatic
verification process namely model checking. This course covers finite-state modelling of
hardware/software, linear-time properties, classification of linear-time properties, Linear
Temporal Logic (LTL) - a formal language for property specification, LTL model checking
algorithm and model checking case studies. This course enables the learners to prove correctness
of a hardware/software used in safety critical systems in domains such as avionics, health care
and automotive.
Prerequisite: NIL
Course Outcomes: After the completion of the course the student will be able to
CO4 Specify a given linear-time property in Linear Temporal Logic (LTL). (Cognitive
Knowledge Level: Apply)
CO5 Perform LTL model checking using the tool Symbolic Analysis Laboratory (SAL).
(Cognitive Knowledge Level: Apply)
248
COMPUTER SCIENCE AND ENGINEERING
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO1 PO1 PO1
0 1 2
CO1
CO2
CO3
CO4
CO5
249
COMPUTER SCIENCE AND ENGINEERING
Assessment Pattern
Evaluate
Create
Mark Distribution
Attendance : 10 marks
Continuous Assessment Test : 25 marks
Continuous Assessment Assignment : 15 marks (Out 15, 10 marks shall be given for a model
checking project to be implemented in SAL.)
Each of the two internal examinations has to be conducted out of 50 marks. First series test shall
be preferably conducted after completing the first half of the syllabus and the second series test
shall be preferably conducted after completing remaining part of the syllabus. There will be two
parts: Part A and Part B. Part A contains 5 questions (preferably, 2 questions each from the
completed modules and 1 question from the partly completed module), having 3 marks for each
250
COMPUTER SCIENCE AND ENGINEERING
question adding up to 15 marks for part A. Students should answer all questions from Part A.
Part B contains 7 questions (preferably, 3 questions each from the completed modules and 1
question from the partly completed module), each with 7 marks. Out of the 7 questions, a student
should answer any 5.
There will be two parts; Part A and Part B. Part A contains 10 questions with 2 questions from
each module, having 3 marks for each question. Students should answer all questions. Part B
contains 2 questions from each module of which a student should answer any one. Each question
can have maximum 2 sub-divisions and carries 14 marks.
Syllabus
Module - 1 (Introduction to Model Checking)
Linear-Time (LT) Properties - Deadlock. Linear-Time Behavior - Paths and State Graph, Path
Fragment, Maximal and Initial Path Fragment, Path. Traces - Trace and Trace Fragment, LT
Properties - LT Property, Satisfaction Relation for LT Properties, Trace Equivalence and LT
Properties. Safety Properties and Invariants - Invariants, Safety Properties, Trace Equivalence
and Safety properties. Liveness Properties - Liveness Property, Safety vs. Liveness Properties.
Fairness - Fairness, Unconditional, Weak and Strong Fairness, Fairness Strategies, Fairness and
Safety. (Definition and examples only for all topics - no proof required).
Regular Properties - Model Checking Regular Safety properties - Regular Safety property,
Verifying Regular Safety Properties. Automata on Infinite Words - ⍵ -Regular Languages and
Properties, Nondeterministic Buchi Automata (NBA), Deterministic Buchi Automata (DBA),
251
COMPUTER SCIENCE AND ENGINEERING
Linear Temporal Logic (LTL) - Syntax, Semantics, Equivalence of LTL Formulae, Weak Until,
Release and Positive Normal Form, Fairness, Safety and Liveness in LTL (Definitions only).
Automata Based LTL Model Checking (Algorithms and examples only).
The Language of SAL - The expression language, The transition Language, The module
language, SAL Contexts.
SAL Examples - Mutual Exclusion, Peterson’s Protocol, Synchronous Bus Arbiter, Bounded
Bakery protocol, Bakery Protocol, Traffic Signalling System.
Text Books
1. Christel Baier and Joost-Pieter Katoen, Principles of Model Checking, The MIT Press.
(Modules 1 - 4)
2. Leonardo de Moura, Sam Owre and N. Shankar, The SAL Language Manual, SRI
International (http://sal.csl.sri.com/doc/language-report.pdf, Chapters 1, 3, 4, 5, 6, 7)
(Module 5)
Reference Materials
252
COMPUTER SCIENCE AND ENGINEERING
trying until it is able to send the message. Show a finite state transition system modeling
this system.
Course Outcome 3 (CO3):
1. Consider a shared memory segment s protected using a mutex lock variable m. Two
processes p1 and p2 are trying to access s. List the Linear Time properties of the system
which will ensure safety, liveness and fairness.
Course Outcome 4 (CO4):
1. Show the LTL specifications of the safety, liveness and fairness properties listed for the
assessment question given in CO3.
Course Outcome 5 (CO5):
1. Model the system mentioned in the question given in CO3 in SAL and verify that the
system is correct with respect to the LTL properties shown as the answer for CO4.
QP CODE: PAGES: 3
PART A
1. Define model checking. Show the schematic diagram of the model checking
approach.
253
COMPUTER SCIENCE AND ENGINEERING
4. List any three Linear Time properties in the Mutual Exclusion problem of
processes.
7. Specify the following statements about traffic lights in Linear Temporal Logic
(LTL).
a. Once red, the light can not become green immediately.
b. Once red, the light always becomes green eventually after being yellow
for some time.
9. List any three applications of the tool Symbolic Analysis Laboratory (SAL).
Part B
(Answer any one question from each module. Each question carries 14 Marks)
11. (a) Explain in detail the various phases of the model checking process.
(8)
OR
12. (a) Define and illustrate the following terms of a transition system.
a. Execution Fragment (14)
b. Maximal and Initial Execution Fragment
c. Execution
d. Reachable States
254
COMPUTER SCIENCE AND ENGINEERING
13. (a) With an example, explain the satisfaction relation for LT properties.
(7)
(b) What is trace equivalence in Transition Systems? Give an example to show that if
two transition systems satisfy the trace equivalence property, then they satisfy the (7)
same set of LT properties.
OR
14. (a) Give the transition system for the fault tolerant variant of the dining (4)
philosophers problem.
(b) With a suitable example, explain the algorithms to check whether a (10)
Transition System satisfies an invariant or not.
15. (a) Explain Regular Safety Properties with a suitable example. (7)
OR
17. (a) Explain the syntax of Linear Temporal Logic (LTL). (7)
OR
18. (a) With an example, give the difference between until and weak until in LTL. (4)
(b) With a suitable example, explain automata based LTL model checking. (10)
19. (a) Explain Peterson’s protocol. What are the LTL properties to be verified to (8)
ensure its correctness?
(b) Write a SAL script for the verification of Peterson’s protocol. (6)
255
COMPUTER SCIENCE AND ENGINEERING
OR
20. (a) Show the SAL model corresponding to Bakery protocol. (8)
(b) List any three Linear Time properties of this model and show their LTL (6 )
Teaching Plan
256
COMPUTER SCIENCE AND ENGINEERING
5.2 The Language of SAL - The expression language, The transition 1 Hour
Language
5.3 The module language, SAL Contexts. 1 Hour
257
COMPUTER SCIENCE AND ENGINEERING
Year of
CST PROGRAMMING IN Category L T P Credit
Introduction
362 PYTHON
PEC 2 1 0 3 2019
Preamble: The objective of the course is to equip the learners to develop multi-module software
solutions for real world computational problems using Python. It encompasses the Python
programming environment, syntax, data representations, intermediate level features, GUI
programming, Object Oriented Programming and data processing. This course lays the
foundation to develop modular software solutions including complex interactive applications,
network applications, and data-driven intelligent applications.
Course Outcomes: After the completion of the course the student will be able to
Write, test and debug Python programs (Cognitive Knowledge level:
CO1
Apply)
Illustrate uses of conditional (if, if-else and if-elif-else ) and
CO2 iterative (while and for) statements in Python programs. (Cognitive
Knowledge level: Apply)
Develop programs by utilizing the Python programming constructs such as Lists,
CO3
Tuples, Sets and Dictionaries. (Cognitive Knowledge level: Apply)
Develop graphical user interface for solutions using Python libraries. (Cognitive
CO4
Knowledge level: Apply)
Implement Object Oriented programs with exception handling. (Cognitive
CO5
Knowledge level: Apply)
Write programs in Python to process data stored in files by utilizing
CO6
Numpy, Matplotlib, and Pandas. (Cognitive Knowledge level: Apply)
258
COMPUTER SCIENCE AND ENGINEERING
PO1
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO11 PO12
0
CO1 ✔ ✔ ✔ ✔ ✔
CO2 ✔ ✔ ✔ ✔
CO3 ✔ ✔ ✔ ✔ ✔ ✔
CO4 ✔ ✔ ✔ ✔ ✔ ✔
CO5 ✔ ✔ ✔ ✔ ✔ ✔
CO6 ✔ ✔ ✔ ✔ ✔ ✔ ✔
Assessment Pattern
Remember 20 20 20
259
COMPUTER SCIENCE AND ENGINEERING
Understand 35 35 35
Apply 45 45 45
Analyse
Evaluate
Create
Mark Distribution
150 50 100 3
260
COMPUTER SCIENCE AND ENGINEERING
contains 2 questions from each module of which a student should answer any one. Each question
can have a maximum of 2 sub-divisions and carries 14 marks.
SYLLABUS
Module -1 (Programming Environment and Python Basics) (6 hours)
Getting started with Python programming – Interactive shell, IDLE, iPython Notebooks,
Detecting and correcting syntax errors, How Python works. The software development process –
A case study. Basic coding skills – strings, assignment, and comments, Numeric data types and
character sets, Expressions, Using inbuilt functions and modules. Control statements – Iteration
with for/while loop, Formatting text for output, A case study, Selection structure (if-else, switch-
case), Conditional iteration with while, A case study, Testing control statements, Lazy evaluation.
Module -2 (Building Python Programs) (8 hours)
Strings and text files – Accessing characters, substrings, Data encryption, Strings and number
system, String methods, Text files, A case study on text analysis. Design with Functions –
Functions as Abstraction Mechanisms, Problem solving with top-down design, Design with
recursive functions, Managing a program’s namespace, Higher-Order Functions. Lists - Basic list
Operations and functions, List of lists, Slicing, Searching and sorting list, List comprehension.
Work with tuples. Sets. Work with dates and times, A case study with lists. Dictionaries -
Dictionary functions, dictionary literals, adding and removing keys, accessing and replacing
values, traversing dictionaries, reverse lookup. Case Study – Data Structure Selection.
Module -3 (Graphics) (7 hours)
Graphics – Terminal-based programs, Simple Graphics using Turtle, Operations, 2D Shapes,
Colors and RGB Systems, A case study. Image Processing – Basic image processing with inbuilt
functions. Graphical User Interfaces – Event-driven programming, Coding simple GUI-based
programs : Windows, Labels, Displaying images, Input text entry, Popup dialog boxes,
Command buttons, A case study.
Module -4 (Object Oriented Programming) (7 hours)
Design with classes - Objects and Classes, Methods, Instance variables, Constructor, Accessor
and Mutator, Data-Modeling Examples, Structuring classes with inheritance and polymorphism.
Abstract classes, Interfaces, Exceptions - Handle a single exception, handle multiple exceptions.
Module -5 (Data Processing) (9 hours)
The os and sys modules, NumPy - Basics, Creating arrays, Arithmetic, Slicing, Matrix
Operations, Random numbers. Plotting and visualization. Matplotlib - Basic plot, Ticks, Labels,
and Legends. Working with CSV files. – Pandas - Reading, Manipulating, and Processing Data.
Introduction to Micro services using Flask.
261
COMPUTER SCIENCE AND ENGINEERING
Text Books:
1. Kenneth A Lambert., Fundamentals of Python : First Programs, 2/e, Cengage Publishing, 2016
2. Wes McKinney, Python for Data Analysis, 2/e, Shroff / O’Reilly Publishers, 2017
3. Flask: Building Python web services, Jack Stouffer, Shalabh Aggarwal, Gareth Dwyer,
PACKT Publishing Limited, 2018
Reference Books:
1. Zed A Shaw, Learn Python 3 The Hard Way, Addison-Wesley, 2017
2. Allen B. Downey, Think Python: How to Think Like a Computer Scientist, 2/e, Schroff, 2016
3. Michael Urban and Joel Murach, Python Programming, Shroff/Murach, 2016
4. Charles Severance. Python for Informatics: Exploring Information,
What would be the output if ‘break’ is replaced with ‘continue’ in the above code fragment?
Course Outcome 3(CO3):
1. Given is a list of of words, wordlist, and a string, name. Write a Python function which takes
wordlist and name as input and returns a tuple. The first element of the output tuple is the
number of words in the wordlist which have name as a substring in it. The second element of
262
COMPUTER SCIENCE AND ENGINEERING
the tuple is a list showing the index at which the name occurs in each of the words of the
wordlist and a 0 if it doesn’t occur.
2. What is the value of L after you run the code below?
L = ["life", "answer", 42, 0]
for thing in L:
if thing == 0:
L[thing] = "universe"
elif thing == 42:
L[1] = "everything"
263
COMPUTER SCIENCE AND ENGINEERING
QP CODE: PAGES:
Reg No:_______________
Name:_________________
PART-B
(Answer any one full question from each module)
264
COMPUTER SCIENCE AND ENGINEERING
11. (a) Write a Python code to check whether a given year is a leap year or not (6)
[An year is a leap year if it’s divisible by 4 but not divisible by 100
except for those divisible by 400].
(b) What are the possible errors in a Python program. Write a Python (8)
program to print the value of 22n+n+5 for n provided by the user.
OR
12. (a) Write a Python program to find the value for sin(x) up to n terms using the (6)
series
where x is in degrees
(b) Write a Python code to determine whether the given string is a Palindrome (8)
or not using slicing. Do not use any string function.
13. (a) Write a Python code to create a function called list_of_frequency that takes a (5)
string and prints the letters in non-increasing order of the frequency of their
occurrences. Use dictionaries.
(b) Write a Python program to read a list of numbers and sort the list in a non- (9)
decreasing order without using any built in functions. Separate function
should be written to sort the list wherein the name of the list is passed as the
parameter.
OR
14. (a) Illustrate the following Set methods with an example. (6)
i. intersection( ) ii. Union( ) iii. Issubset( ) iv. Difference( ) v. update( ) vi.
discard( )
(b) Write a Python program to check the validity of a password given by the (8)
user.
The Password should satisfy the following criteria:
1. Contains at least one letter between a and z
2. Contains at least one number between 0 and 9
3. Contains at least one letter between A and Z
4. Contains at least one special character from $, #, @
5. Minimum length of password: 6
265
COMPUTER SCIENCE AND ENGINEERING
17. (a) How can a class be instantiated in Python? Write a Python program to (10)
express the instances as return values to define a class RECTANGLE with
parameters height, width, corner_x, and corner_y and member functions to
find center, area, and perimeter of an instance.
(b) Explain inheritance in Python. Give examples for each type of inheritance. (4)
OR
18. (a) Write a Python class named Circle constructed by a radius and two methods (6)
which will compute the area and the perimeter of a given circle
(b) Write Python program to create a class called as Complex and implement (8)
__add__( ) method to add two complex numbers. Display the result by
overloading the + Operator.
19. (a) Write a Python program to add two matrices and also find the transpose of (8)
the resultant matrix.
(b) Given a file “auto.csv” of automobile data with the fields index, company, (6)
body-style, wheel-base, length, engine-type, num-of-cylinders, horsepower,
average-mileage, and price, write Python codes using Pandas to
1) Clean and Update the CSV file
2) Print total cars of all companies
266
COMPUTER SCIENCE AND ENGINEERING
20. (a) Write Python program to write the data given below to a CSV file. (5)
(b) Given the sales information of a company as CSV file with the following (9)
fields month_number, facecream, facewash, toothpaste, bathingsoap,
shampoo, moisturizer, total_units, total_profit. Write Python codes to
visualize the data as follows
1) Toothpaste sales data of each month and show it using a scatter plot
2) Face cream and face wash product sales data and show it using the
bar chart
Calculate total sale data for last year for each product and show it using a
Pie chart.
(14X5=70)
Teaching Plan
1.5 Control statements – Definite Iteration with for loop, Formatting text for 1 hour
output, Selection structure (if-else, switch-case), Conditional iteration with
267
COMPUTER SCIENCE AND ENGINEERING
Lists - Basic list Operations and functions, List of lists, Slicing, Searching
2.5 1 hour
and sorting list, List comprehension.
2.6 Work with tuples. Sets. Work with dates and times, A case study with lists. 1 hour
3.3 Image Processing – Basic image processing with inbuilt functions. 1 hour
3.5 Coding simple GUI-based programs : Windows, Labels, Displaying images, 1 hour
Coding simple GUI-based programs : Input text entry, Popup dialog boxes,
3.6 1 hour
Command buttons
268
COMPUTER SCIENCE AND ENGINEERING
4.1 Design with classes : Objects and Classes, Methods, Instance Variables 1 hour
269
COMPUTER SCIENCE AND ENGINEERING
Year of
DATA AND Category L T P Credits
CST Introduction
COMPUTER
372
COMMUNICATION PEC 2 1 0 3 2019
Preamble:
The purpose of this course is to prepare learners to understand the communication entities and
the associated issues in data transmission. This course covers fundamental concepts of data
transmission in digital and analog form, transmission media, concepts of encoding, multiplexing,
spread spectrum and switching methods. This course helps the learner to gain insight into the
important aspects of data communication and computer networking systems and enables to apply
in practical applications.
Prerequisite: NIL
Course Outcomes: After the completion of the course the student will be able to
CO1 Identify the characteristics of signals for analog and digital transmissions
(Cognitive knowledge: Apply)
CO2 Identify the issues in data transmission (Cognitive knowledge: Apply)
CO6 Use error detection, correction and switching techniques in data communication
(Cognitive knowledge: Apply)
270
COMPUTER SCIENCE AND ENGINEERING
Mapping of course outcomes with program outcomes
CO1
CO2
CO3
CO4
CO5
CO6
Assessment Pattern
Remember 30 30 30
Understand 30 30 30
Apply 40 40 40
271
COMPUTER SCIENCE AND ENGINEERING
Analyze
Evaluate
Create
Mark Distribution
272
COMPUTER SCIENCE AND ENGINEERING
Syllabus
Communication model - Simplex, Half duplex, Full duplex transmission. Periodic analog signals
- Sine wave, Amplitude, Phase, Wavelength, Time and frequency domain, Bandwidth. Analog &
digital data and signals. Transmission impairments - Attenuation, Delay distortion, Noise. Data
rate limits - Noiseless channel, Nyquist bandwidth, Noisy channel, Shannon's capacity formula.
Guided transmission media - Twisted pair, Coaxial cable, Optical fiber. Unguided media - Radio
waves, Terrestrial microwave, Satellite microwave, Infrared. Wireless propagation - Ground
wave propagation, Sky wave propagation, Line-of-Sight (LoS) propagation.
Text Books
1. Forouzan B. A., Data Communications and Networking, 5/e, McGraw Hill, 2013.
2. William Stallings, Data and Computer Communication 9/e, Pearson Education, Inc.
273
COMPUTER SCIENCE AND ENGINEERING
References
274
COMPUTER SCIENCE AND ENGINEERING
this be detected? Give reasons for your answer.
Reg No:_______________
Name:_________________
5. Explain the two main distortions that can occur in a delta modulated waveform.
How can it be avoided?
6. Illustrate the equivalent square wave pattern of the bit string 01001101 using
Non-Return-to-Zero (NRZ) - Level and NRZ-Invert encoding schemes.
7. Apply Direct Sequence Spread Spectrum to the data 101 using the Barker
sequence 10110111000. Show the encoding and decoding steps.
275
COMPUTER SCIENCE AND ENGINEERING
10. Find the parity bit for simple even parity check for the following.
a) 1001010 (10x3=30)
b) 0001100
c) 1000000
Part B
(Answer any one question from each module. Each question carries 14
Marks)
11. (a) With the help of suitable figures, distinguish between time and frequency
domain representations. (4)
12. (a) Calculate the bandwidth, if a periodic signal is decomposed into 4 sine waves
with frequencies 50 Hz, 100 Hz, 150 Hz and 200 Hz. Draw the spectrum, (6)
assuming all components having an amplitude in the range 6-12 V and all are
multiples of two in the increasing order.
(b) Distinguish between Nyquist bandwidth and Shannon capacity. Consider a (8)
noiseless channel with a bandwidth of 3000 Hz transmitting a signal with (i)
Two signal levels (ii) Four signal levels. Determine the maximum bit rate in
both cases.
13. (a) For a parabolic reflective antenna operating at 12 GHz with a diameter of 2 (6)
m, calculate the effective area and the antenna gain.
(b) List any four advantages and disadvantages of twisted pair, coaxial cable and
fiber optic cable. (8)
OR
14. (a) Compare the features of terrestrial microwave and satellite microwave. (6)
(b) With the help of suitable diagrams, differentiate Multi-mode and Single- (8)
mode optical fibres. How are the rays propagated in Step-index and Graded-
index Multi-mode fibres?
276
COMPUTER SCIENCE AND ENGINEERING
15. (a) Distinguish between data rate and signal rate. (4)
(b) How is polar encoding done? Encode the pattern 010011001110 using the (10)
two Biphase schemes.
OR
16. (a) Show the equivalent analog sine wave pattern of the bit string 010011010
using Amplitude Shift Keying, Frequency Shift Keying and Phase Shift (4)
Keying.
(b) State Sampling theorem. Explain Pulse Code Modulation with suitable (10)
figures.
17. (a) Four channels are multiplexed using Time Division Multiplexing. If each (6)
channel sends 100 bytes/sec and we multiplex one byte per channel,
determine the frame size, duration of a frame, frame rate and bit rate of the
link.
(b) Explain the working of Frequency Hopping Spread Spectrum with an (8)
example.
OR
18. (a) Explain any three techniques by which the disparity in input data rate is (4)
handled by Time Division Multiplexing. Give examples.
(b) Suppose Alice and Bob are communicating using Code Division Multiple (10)
Access. Alice uses the code [+1 +1] and Bob uses the code [+1 -1]. Alice
sends a data bit 0 and Bob sends a data bit 1. Show the data in the channel
and how they can detect what the other person has sent.
(b) Describe the need for a switch in a communication system. What are the (10)
different phases in circuit switching?
OR
20. (a) Explain the virtual circuit approach of packet switching with a suitable (6)
example.
(b) Find the Hamming code for the data word 1011001. Assume odd parity. (8)
277
COMPUTER SCIENCE AND ENGINEERING
Teaching Plan
No Contents No.of
Lecture
Hrs (35
hrs)
Module-1 (Data Transmission Basics) (6 hrs)
2.5 Infrared 1
278
COMPUTER SCIENCE AND ENGINEERING
5.2 Detecting and correcting errors, Types of errors, Parity check, Checksum 1
5.3 Cyclic Redundancy Check (CRC) 1
279
COMPUTER SCIENCE AND ENGINEERING
SEMESTER VI
MINOR
280
COMPUTER SCIENCE AND ENGINEERING
Preamble:
This is a course in theoretical computer science that includes test cases for white-box, black-
box, and grey-box approaches. This course describes the various techniques for test case design
used to test software artifacts, including requirements, design, and code. The course includes
different techniques for test case design based on graphs, programming language syntaxes and
inputs. The course also covers symbolic execution using PEX tool.
Course Outcomes: After the completion of the course the student will be able to:-
List a range of different software testing techniques and be able to apply specific unit
CO1 testing method to the projects using Junit. (Cognitive Knowledge Level:
Understand)
Explain mutation testing method for a given piece of code to identify hidden defects
CO2 that can’t be detected using other testing methods. (Cognitive Knowledge Level:
Understand)
Explain graph coverage criteria in terms of control flow graph and data flow graph
CO3
for a given program. (Cognitive Knowledge Level: Understand)
Illustrate the use of PEX tool with symbolic execution. (Cognitive Knowledge
CO5
Level: Apply)
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO 9 PO10 PO11 PO12
CO1
CO2
281
COMPUTER SCIENCE AND ENGINEERING
CO3
CO4
CO5
Assessment Pattern
Remember 30 30 30
Understand 40 40 40
Apply 30 30 30
Analyze
Evaluate
Create
282
COMPUTER SCIENCE AND ENGINEERING
Mark Distribution
283
COMPUTER SCIENCE AND ENGINEERING
Syllabus
Module - 1 (Introduction to Software Testing)
Some Popular Errors – Ariane 5, Therac 25, Intel Pentium Bug. What is Software testing? Why should it
be tested? Software Quality, Role of Testing. Testing Process - Level 0 thinking, Level 1 thinking, Level 2
thinking, Level 3 thinking, Level 4 thinking. Software Testing Terminologies - Verification, Validation
and Testing, Faults, Error and Bug, Test cases, Coverage Criteria. Types of Testing- Unit testing,
integration testing, System testing, Acceptance testing, Beta testing, Functional testing, Stress testing,
Performance testing, Usability testing and Regression testing. Testing Methods - Black Box testing, White
Box testing, Grey Box testing.
Overview of Graph Coverage Criteria. Structural Graph Coverage Criteria - Node/vertex coverage, Edge
coverage, Edge pair coverage, Path coverage, Complete path coverage, Prime path coverage, Complete
round trip coverage, Simple round trip coverage. Data Flow Criteria - du paths, du pairs. Subsumption
Relationships among Graph Coverage Criteria. Graph Coverage for Source Code - Control flow graphs for
code, CFG: If statement, CFG: If statement with return, CFG: Switch-case, CFG: Loops, CFG: Exceptions
(try-catch). Example program – Statistics. Graph Coverage for Design Elements - Call graphs and classes,
Class inheritance testing: Coverage criteria, Coverage criteria on inheritance graph, Data flow at the design
level, Inter-procedural DU pairs, Coupling du-pairs example. Example - Quadratic Root. Case Study -
Graph Based testing using JUnit Framework.
284
COMPUTER SCIENCE AND ENGINEERING
Introduction to Grey Box testing - Why Grey Box testing, Gray Box Methodology, Advantages and
Disadvantages. Techniques of Grey Box Testing - Matrix Testing, Regression Testing, Orthogonal Array
Testing or OAT, Pattern Testing. An Introduction to PEX - Parameterized Unit Testing, The Testing
Problem. Symbolic Execution – Example, Symbolic execution tree. PEX application Case Study – PEX.
Text Books
1. Paul Ammann and JeffOffutt ,Introduction to Software Testing.
2. KshirasagarNaik and PriyadarshiTripathy, Software Testing And Quality Assurance: Theory And
Practice.
Reference Materials
1. https://www.csc.ncsu.edu/academics/undergrad/honors/thesis/muclipsebinder.pdf - Muclipse
tutorial.
2. King, James C, “Symbolic Execution and Program Testing”, Association for Computing
Machinery, July 1976.
3.
Sample Course Level Assessment Questions
Course Outcome 1 (CO1): Explain the following types of testing methods with examples.
(i) Balck-box testing.
(ii) White-box testing.
(iii) Grey-box testing.
Course Outcome 2 (CO2): Define 12 mutants for the following method power() using effective mutation
operators. Try to use each mutation operator at least once. Approximately, how many mutants do you think
there would be, if all mutants for power() were created?
public static int power (int left, int right)
{
//**************************************
// Raises Left to the power of Right
// precondition : Right >= 0
// postcondition: Returns Left**Right
//**************************************
intrslt;
rslt = Left;
285
COMPUTER SCIENCE AND ENGINEERING
if (Right == 0)
{
rslt = 1;
}
else
{
for (int i = 2; i <= Right; i++)
rslt = rslt * Left;
}
return (rslt);
}
Course Outcome 3 (CO3): Draw the control flow graph and data flow graph of given piece of code.
public static double ReturnAverage(int value[],int AS, int MIN, int MAX){
/*
Function: ReturnAverageComputes the averageof all those numbers in the input array in
the positive range [MIN, MAX]. The maximumsize of the array is AS. But, the array size
could be smaller than AS in which case the endof input is represented by -999.
*/
int i, ti, tv, sum;
doubleav;
i = 0; ti = 0; tv = 0; sum = 0;
while (ti< AS && value[i] != -999) {
ti++;
if (value[i] >= MIN && value[i] <= MAX) {
tv++;
sum = sum + value[i];
}
i++;
}
if (tv> 0)
av = (double)sum/tv;
286
COMPUTER SCIENCE AND ENGINEERING
else
av = (double) -999;
return (av);
}
Course Outcome 4 (CO4): Explain the following with examples.
1. Input domain modelling.
2. All Combinations Coverage (ACoC)
3. Each Choice Coverage (ECC)
4. Pair-wise Coverage
5. T-wise Coverage
6. Base Choice Coverage
7. Multiple Base Choices Coverage.
Course Outcome 5 (CO5): Draw the symbolic execution tree for the following program code
and explain the symbolic execution of testme (α1, α2).
1. int twice (int v) {
2. return 2 ∗ v;
3. }
4. void testme (int x, int y ) {
5. z = twice ( y);
6. if ( z == x ){
7. if ( x > y + 10)
8. ERROR;
9. }
10. }
11. int main() {
12. x = sym input();
13. y = sym input();
14. testme ( x , y);
15. return(0);
16. }
287
COMPUTER SCIENCE AND ENGINEERING
QP CODE: PAGES: 4
PART A
Answer all Questions. Each question carries 3 Marks
4. What are the functions of Test driver and Test stubs in dynamic unit testing?
5. Define Node coverage, Edge coverage and Prime path coverage in a control flow
graph.
10. Explain the concept of symbolic execution with the help of a toy example.
(10x3=30)
Part B
(Answer any one question from each module. Each question carries 14 Marks)
288
COMPUTER SCIENCE AND ENGINEERING
(iv) Unit testing (v) Integration testing (vi) System testing (vii) Acceptance
testing
OR
12. (a) Explain the following coverage criterias based on the code fragment given
below. (i) Functional coverage (ii) Statement coverage (iii)Conditional (8)
coverage (iv)Branch coverage
int foo (int x, int y){
int z = 0;
if ((x > 0) && (y > 0)){
z = x;}
return z;
}
(b) Write positive and negative test cases for an ATM Machine? (6)
13. (a) Explain Dynamic unit test environment with a neat figure.
(8)
(b) Explain the major difference between control flow testing and data flow
testing. (6)
OR
14. Explain seven types of mutation operators with neat examples. (14)
15. (a) Explain touring, side trips and detours with a neat example. (7)
(b) Explain simple path coverage and prime path coverage with the help of CFG (7)
given below. 1
2 3
OR
289
COMPUTER SCIENCE AND ENGINEERING
(i) Simple if (ii) Simple while loop (iii) Simple for loop (7)
OR
18. (a) Consider the triangle classification program with a specification: (6)
The program reads floating values from the standard input. The three values
A, B, and C are interpreted as representing the lengths of the sides of
triangle. The program then prints a message to the standard output that states
whether the triangle, if it can be formed, is scalene, isosceles, equilateral, or
right angled. Determine the following for the above program:
(i) For the boundary condition A +B > C case (scalene triangle),
identify test cases to verify the boundary.
(ii) For the boundary condition A = C case (isosceles triangle), identify
test cases to verify the boundary.
(iii) For the boundary condition A = B = C case (equilateral triangle),
identify test cases to verify the boundary.
(b) Develop a decision table to generate test cases for this specification. (8)
19. (a) Explain the importance of grey box testing, its advantages and disadvantages. (9)
OR
290
COMPUTER SCIENCE AND ENGINEERING
5. DO; Z← Z * X;
6. J ← J + 1;
7. GO TO LAB; END;
8. RETURN (Z) ;
9. END;
a) Explain Symbolic execution of POWER (αl, α2).
(b) Explain Execution tree for POWER (αl, α2) in the above code fragment. (7 )
TEACHING PLAN
No. of
Index Topics Hours
(45)
1.1 Some Popular Errors– Ariane 5, Therac 25, Intel Pentium Bug. 1 Hour
291
COMPUTER SCIENCE AND ENGINEERING
2.3 Dynamic Unit testing - Control Flow testing, Data Flow testing 1 Hour
Graph Coverage for Source Code - Control Flow Graphs (CFG) for code,
3.6 CFG: If statement, CFG: If statement with return, CFG: Switch-case, CFG: 1 Hour
Loops, CFG: Exceptions (try-catch). Example program - Statistics
Graph Coverage for Design Elements - Call graphs and classes, Class
3.7 inheritance testing: Coverage criteria, Coverage criteria on inheritance 1 Hour
graph,
292
COMPUTER SCIENCE AND ENGINEERING
3.9 Case Study - Graph Based testing using JUnit Framework. (Lecture 1) 1 Hour
3.10 Case Study - Graph Based testing using JUnit Framework. (Lecture 2) 1 Hour
4.9 Case Study - Black Box testing approaches using JUnit. 1 Hour
Introduction to Grey Box testing - Why Grey Box testing, Gray Box
5.1 1 Hour
Methodology, Advantages and Disadvantages.
5.2 Techniques of Grey Box Testing - Matrix Testing, Regression Testing, 1 Hour
293
COMPUTER SCIENCE AND ENGINEERING
5.4 An Introduction to Pex - Parameterized Unit Testing, The Testing Problem. 1 Hour
294
COMPUTER SCIENCE AND ENGINEERING
LEARNING
VAC 3 1 0 4 2019
Preamble:
This course aims to introduce the learner to an overview of the concepts and algorithms involved in
deep learning. Deep learning is a subfield of machine learning, a subfield of artificial intelligence.
Basic concepts and application areas of machine learning, deep networks, convolutional neural
network and recurrent neural network are covered here. This is a foundational program that will
help students understand the capabilities, challenges, and consequences of deep learning and
prepare them to participate in the development of leading-edge AI technology. They will be able to
gain the knowledge needed to take a definitive step in the world of AI.
CO2 Illustrate the validation process of machine learning models using hyper-parameters
and validation sets. (Cognitive Knowledge Level: Understand)
CO3 Demonstrate the concept of the feed forward neural network and its training process.
(Cognitive Knowledge Level: Apply)
CO4 Build CNN and Recurrent Neural Network (RNN) models for different use cases.
(Cognitive Knowledge Level: Apply)
CO5 Use different neural network/deep learning models for practical applications.
(Cognitive Knowledge Level: Apply)
295
COMPUTER SCIENCE AND ENGINEERING
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO1
CO2
CO3
CO4
CO5
296
COMPUTER SCIENCE AND ENGINEERING
Assessment Pattern
Remember 30 30 30
Understand 40 40 40
Apply 30 30 30
Analyse
Evaluate
Create
Mark Distribution
Attendance : 10 marks
Each of the two internal examinations has to be conducted out of 50 marks. First Internal
Examination shall be preferably conducted after completing the first half of the syllabus and the
Second Internal Examination shall be preferably conducted after completing remaining part of the
syllabus.
297
COMPUTER SCIENCE AND ENGINEERING
There will be two parts: Part A and Part B. Part A contains 5 questions (preferably, 2 questions
each from the completed modules and 1 question from the partly covered module), having 3 marks
for each question adding up to 15 marks for part A. Students should answer all questions from Part
A. Part B contains 7 questions (preferably, 3 questions each from the completed modules and 1
question from the partly covered module), each with 7 marks. Out of the 7 questions in Part B, a
student should answer any 5.
There will be two parts; Part A and Part B. Part A contains 10 questions with 2 questions from each
module, having 3 marks for each question. Students should answer all questions. Part B contains 2
questions from each module of which a student should answer any one. Each question can have
maximum 2 sub-divisions and carry 14 marks.
Syllabus
(General Instructions: Instructors are to introduce students to any one software platform and
demonstrate the working of the algorithms in the syllabus using suitable use cases and public
datasets to give a better understanding of the concepts discussed. Tutorial hour may be used for this
purpose)
Module-1 (Introduction)
Key components - Data, models, objective functions, optimization algorithms, Learning algorithm.
Supervised learning- regression, classification, tagging, web search, page ranking, recommender
systems, sequence learning, Unsupervised learning, Reinforcement learning, Historical Trends in
Deep Learning. Other Concepts - overfitting, underfitting, hyperparameters and validation sets,
estimators, bias and variance.
Neural Networks –Perceptron, Gradient Descent solution for Perceptron, Multilayer perceptron,
activation functions, architecture design, chain rule, back propagation, gradient based learning.
Introduction to optimization– Gradient based optimization, linear least squares. Stochastic gradient
descent, Building ML algorithms and challenges.
298
COMPUTER SCIENCE AND ENGINEERING
Recurrent neural networks – Computational graphs, RNN design, encoder – decoder sequence to
sequence architectures, deep recurrent networks, recursive neural networks, modern RNNs LSTM
and GRU, Practical use cases for RNNs.
Applications – computer vision, speech recognition, natural language processing, common word
embedding: continuous Bag-of-Words, Word2Vec, global vectors for word representation (GloVe).
Research Areas – autoencoders, representation learning, boltzmann machines, deep belief
networks.
Text Book
1. Ian Goodfellow, YoshuaBengio, Aaron Courville, Deep Learning, MIT Press 2015 ed.
2. Aston Zhang, Zachary C. Lipton, Mu Li, and Alexander J. Smola, Dive into Deep Learning,
August 2019.
3. Neural Networks and Deep Learning, Aggarwal, Charu C., c Springer International
Publishing AG, part of Springer Nature 2018
Reference Books
1. Neural Smithing: Supervised Learning in Feedforward Artificial Neural Networks by
Russell Reed, Robert J MarksII, A Bradford Book,2014
2. Practical Convolutional Neural Networks by MohitSewak, Md. Rezaul Karim,
PradeepPujari,Packt Publishing 2018
3. Hands-On Deep Learning Algorithms with Python by SudharsanRavichandran,Packt
Publishing 2019
4. Deep Learning with Python by Francois Chollet,Manning Publications Co.,2018
299
COMPUTER SCIENCE AND ENGINEERING
0.9
0.8
300
COMPUTER SCIENCE AND ENGINEERING
QP CODE: PAGES:4
Reg No:_______________
Name:_________________
PART A
Answer all Questions. Each question carries 3 Marks
1. Distinguish between supervised learning and Reinforcement learning. Illustrate
with an example.
301
COMPUTER SCIENCE AND ENGINEERING
4. Why does a single perceptron cannot simulate simple XOR function? Explain
how this limitation is overcome?
7. How many parameters are there in AlexNet? Why the dataset size (1.2 million) is
important for the success of AlexNet?
Part B
(Answer any one question from each module. Each question carries 14
Marks)
11. (a) “A computer program is said to learn from experience E with respect to some
class of
(10)
tasks T and performance measure P, if its performance at tasks in T, as
measured by P, improves with experience E.” What is your understanding of
the terms task, performance and experience. Explain with two example
(b) “How does bias and variance trade-off affect machine learning algorithms?
(4)
OR
12. (a) Illustrate the concepts of Web search, Page Ranking, Recommender systems
with suitable examples.
(10)
(b) List and discuss the different hyper parameters used in fine tuning the (4)
302
COMPUTER SCIENCE AND ENGINEERING
13. (a) How multilayer neural networks learn and encode higher level features from
input features. (7)
(b) Explain gradient decent and delta rule? Why stochastic approximation to
gradient descent is needed? (7)
OR
14. (a) Find the new weights for the network using backpropogation algorithm, the (7)
network is given with a input pattern[-1,1] and target output as +1, Use
learning rate of alpha=0.3 and bipolar sigmoid function.
(b) Write an algorithm for backpropgation which uses stochastic gradient descent (7)
method. Comment on the effect of adding momentum to the network.
15. (a) Input to CNN architecture is a color image of size 112x112x3. The first (5)
convolution layer comprises of 64 kernels of size 5x5 applied with a stride
of 2 and padding 0. What will be the number of parameters?
(b) Let X=[-1, 0, 3, 5] W=[.3 ,.5 .2,.1] be the the input of ith layer of a neural (4)
network and to apply softmax function. What should be the output of it?
OR
16. (a) Explain the concept behind i) Early stopping ii) dropout iii) weight decay (9)
303
COMPUTER SCIENCE AND ENGINEERING
17. (a) Explain the working of RNN and discuss how backpropagation through time
is used in recurrent networks. (8)
(b) Describe the working of a long short term memory in RNNs. (6)
OR
18. (a) What is the vanishing gradient problem and exploding gradient problem? (8)
(b) Why do RNNs have a tendency to suffer from exploding/vanishing gradient? (6)
How to overcome this challenge?
(b) Explain the merits and demerits of using Auto encoders in Computer Vision. (6)
OR
20. (a) Illustrate the use of representation learning in object classification. (7)
Teaching Plan
1.1 Key components - Data, models, objective functions, optimization algorithms. 1 hour
(TB2: Section 1.1-1.2)
304
COMPUTER SCIENCE AND ENGINEERING
1.2 Learning algorithm (TB1: Section 5.1), Supervised learning- regression, 1 hour
classification (TB2: Section 1.3.1)
1.3 tagging, web search, page ranking (TB2: Section 1.3.1) 1 hour
1.7 Concepts: Estimators, bias and variance. (TB1: Section 5.4) 1 hour
1.8 Demonstrate the concepts of supervised learning algorithms using a suitable 1 hour
platform.
2.1 Perceptron, Stochastic Gradient descent, Gradient descent solution for 1 hour
perceptron (TB3: Section 1.1 - 1.2.1)
2.2 Multilayer perceptron (TB3: Section 1.2.2), (TB1: Section 6.1,6.3) 1 hour
2.3 Activation functions- Sigmoid, tanh, Softmax, ReLU, leaky ReLU (TB3: 1 hour
Section 1.2.1.3 - 1.2.1.5)
2.4 Architecture design (TB1: Section 6.4, TB3: Section 1.6) 1 hour
305
COMPUTER SCIENCE AND ENGINEERING
2.8 Linear least squares using a suitable platform. (TB1: Section 4.5) 1 hour
2.9 Building ML Algorithms and Challenges (TB3: 1.4, TB1: 5.10-5.11) 1 hour
3.3 Convolution and Pooling as an infinitely strong prior (TB1: Section 9.4) 1 hour
3.8 Practical challenges of common deep learning architectures- early Stopping 1 hour
(TB3: 4.6)
306
COMPUTER SCIENCE AND ENGINEERING
4.3 Encoder – decoder sequence to sequence architectures. (TB1: Section 10.4) 1 hour
4.5 Recursive neural networks , Modern RNNs, (TB1: Section 10.6, 10.10) 1 hour
4.6 LSTM and GRU (TB1: Section 10.10, TB3: Section 7.5-7.6) 1 hour
4.7 Practical use cases for RNNs. (TB1: Section 11.1-11.4) 1 hour
307
COMPUTER SCIENCE AND ENGINEERING
5.7 Brief introduction on current research areas- representation learning. (TB3: 1 hour
Section 9.3)
5.8 Brief introduction on current research areas- Boltzmann Machines, Deep belief 1 hour
networks. (TB1: Section 20.1, TB3 Section 6.3)
5.9 Brief introduction on current research areas- Deep belief networks. (TB1: 1 hour
Section 20.3)
308
COMPUTER SCIENCE AND ENGINEERING
Year of
WIRELESS Category L T P Credit
CST Introduction
NETWORKS AND
386
IoT APPLICATIONS VAC 3 1 0 4 2019
Preamble:
This course equips the learners with fundamental wireless technologies for the Internet of
Things(IoT) and the IoT ecosystem. It covers the underlying concepts in wireless networks,
communication mechanisms, protocols, hardware, software, and the cloud platforms for IoT. The
students will be able to design smart IoT applications for real world problems..
Course Outcomes: After the completion of the course the students will be able to
CO4 Explain the software components of IoT (Cognitive Knowledge Level :Understand)
Demonstrate the protocols used in IoT and build IoT Programs (Cognitive
CO5
Knowledge Level : Apply)
Build IoT-based smart real-time applications such as Smart Healthcare, Smart
CO6 Agriculture, Smart Environment and Smart Home (Cognitive Knowledge Level :
Apply)
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO1 PO11 PO1
0 2
CO1
CO2
309
COMPUTER SCIENCE AND ENGINEERING
CO3
CO4
CO5
CO6
Assessment Pattern
Remember 30 30 30
Understand 50 40 40
Apply 20 30 30
310
COMPUTER SCIENCE AND ENGINEERING
Analyze
Evaluate
Create
Mark Distribution
Attendance 10 marks
Continuous Assessment Tests 25 marks
Continuous Assessment Assignment 15 marks
311
COMPUTER SCIENCE AND ENGINEERING
Syllabus
312
COMPUTER SCIENCE AND ENGINEERING
Text Books
1. Daniel Chew, “Wireless Internet of Things -A Guide to the lower layers”, IEEE Standards
and Association, IEEE Press, Wiley
2. Rajkamal, “Internet of Things : Architecture and Design Principles”, McGraw Hill (India)
Private Limited.
References
1. ArshadeepBahga, Vijay Madisetti, “Internet of Things: A hands-on approach”, University
Press, 2015 (First edition)
2. Dieter Uckelmann, Mark Harrison, Michahelles Florian (Ed.), Architecting the internet of
things, Springer, 2011
3. Dr. Ovidiu Vermesan, Dr. Peter Friess, Internet of Things: Converging Technologies for
Smart Environments and Integrated Ecosystems, River Publishers, 2013
4. Simon Monk, “Programming Arduino: Getting Started with Sketches”, McGraw Hill
Publications
Sample Course Level Assessment Questions
Course Outcome 1 (CO1):
1. Compare Bluetooth and Bluetooth LE power classes
2. Demonstrate Zigbee Specification Protocol Stack
Course Outcome 2 (CO2):
1. What are the major components of IOT system? Briefly explain each
2. Correlate M2M architectural Levels with IOT architectural Levels
Course Outcome 3 (CO3):
1. Describe the use of GPIO pins ?
2. What are actuators ? Mention the roles of actuators in IoT systems
Course Outcome 4(CO4):
1. Identify the role of HBase in Hadoop File System
2. Differentiate Edge computing and Distributed computing
3. Illustrate open protocols, tools and frameworks generally used in M2M
313
COMPUTER SCIENCE AND ENGINEERING
314
COMPUTER SCIENCE AND ENGINEERING
10. Explain the use of PaaS in IoT Smart applications with any three examples.
(10x3=30)
Part B
(Answer any one question from each module. Each question carries 14 Marks)
11. (a) Compare various Network topologies used in Wireless Networks. (8)
OR
12. (a) Explain protocol stacks used in wireless networks for IoT applications. (8)
13. (a) Define M2M. Explain M2M architecture. Correlate M2M architectural levels (8)
with IoT architectural levels.
OR
14. (a) Summarize different Online Transactions and Processing techniques. (8)
15. (a) Define actuators ? Describe the roles of actuators in IoT systems. (8)
(b) Explain the usage contexts of analog sensors and digital sensors. (6)
OR
16. (a) How data collection, storage & computing services done using Nimbits? (10)
315
COMPUTER SCIENCE AND ENGINEERING
OR
18. (a) Demonstrate an example of Raspberry Pi applications for Industrial IoT. (10)
(b) Compare the features of Arduino-R3 and Arduino Yun boards. (4)
19. (a) Explain various tasks of a smart irrigation monitoring service. (8)
OR
20. (a) a) Mr. Kiran Mathew has been a chronic diabetic patient for the past few (10)
years. He was under regular check up at the hospital every two weeks. All of
a sudden the pandemic like COVID-19 arises in the country and the
government issues a lockdown for a period of two months. Illustrate how
Mr. Kiran can be monitored by the health care worker using intelligent
healthcare techniques.
TEACHING PLAN
No Contents No of
Lecture
Hrs(45)
Module – 1 ( Introduction to IoT and wireless technologies required for IoT) (8 hrs) (TB-
1, Chapter 1...)
316
COMPUTER SCIENCE AND ENGINEERING
1.8 LoRaWAN 1
3.1 Data acquiring and storage for IoT devices- Organization of Data, Big data 1
3.3 Cloud computing for Data storage-IoT Cloud based services using Xively, 1
317
COMPUTER SCIENCE AND ENGINEERING
1
4.2 Embedded Platforms for Prototyping-Arduino, Intel Galileo
4.7 Programming for an arduino controlled traffic control lights at a road junction 1
4.8 Basic Arduino programs to blink LED, Find the distance using ultrasonic 1
sensor
5.1 Business Models and Processes using IOT, Value creation in the Internet of 1
Things.
318
COMPUTER SCIENCE AND ENGINEERING
319
COMPUTER SCIENCE AND ENGINEERING
SEMESTER VI
HONOURS
320
COMPUTER SCIENCE AND ENGINEERING
Preamble:
The purpose of this course is to create a better understanding of the network security concepts.
This course covers network security standards, email security services, web security mechanisms,
firewalls and wireless security mechanisms. This course helps the learner to gain insight into the
key aspects of secure network communication and enables to apply in real-life scenarios.
Prerequisite: A sound background in Number Theory and Cryptographic Algorithms.
Course Outcomes: After the completion of the course the student will be able to
Identify the key aspects of security, intrusion detection systems and digital signature
CO1 schemes (Cognitive Knowledge Level: Apply)
Summarize the protocols used to provide web security (Cognitive Knowledge Level:
CO4 Understand)
321
COMPUTER SCIENCE AND ENGINEERING
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO1
CO2
CO3
CO4
CO5
Assessment Pattern
Continuous Assessment Tests End Semester
Bloom’s Category
Test 1 (%) Test 2 (%) Examination (%)
Remember 30 30 30
Understand 40 40 40
Apply 30 30 30
Analyze
Evaluate
Create
322
COMPUTER SCIENCE AND ENGINEERING
Mark Distribution
Attendance : 10 marks
Each of the two internal examinations has to be conducted out of 50 marks. The first series test
shall be preferably conducted after completing the first half of the syllabus and the second series
test shall be preferably conducted after completing remaining part of the syllabus. There will be
two parts: Part A and Part B. Part A contains 5 questions (preferably, 2 questions each from the
completed modules and 1 question from the partly completed module), having 3 marks for each
question adding up to 15 marks for part A. Students should answer all questions from Part A. Part
B contains 7 questions (preferably, 3 questions each from the completed modules and 1 question
from the partly completed module), each with 7 marks. Out of the 7 questions, a student should
answer any 5.
There will be two parts; Part A and Part B. Part A contains 10 questions with 2 questions from
each module, having 3 marks for each question. Students should answer all questions. Part B
contains 2 questions from each module of which a student should answer any one. Each question
can have maximum 2 sub-divisions and carries 14 marks.
323
COMPUTER SCIENCE AND ENGINEERING
Syllabus
Module – 1 (Network Security Basics)
Introduction to network security - Security requirements, Challenges of security, Network
security model. Malicious programs – Worms, Viruses, Trojans, Spyware, Adware. Intrusion
Detection Systems (IDS) - Uses, Techniques. Digital signatures - ElGamal, Schnorr, Digital
Signature Standard (DSS).
Text Books
1. C. Kaufman, R. Perlman and M. Speciner, “Network Security: Private Communication in a
Public World”, 2/e, PHI.
2. William Stallings, “Cryptography and Network Security Principles and Practice”, 5/e,
Pearson
324
COMPUTER SCIENCE AND ENGINEERING
Education Asia.
References
1. Behrouz A. Forouzan, Debdeep Mukhopadhyay, “Cryptography and Network Security”, 3/e,
Tata McGraw Hill.
2. Tyler Wrightson, “Wireless Network Security A Beginner’s Guide”, 2012, Tata McGraw Hill.
3. William Stallings, “Network Security Essentials: Applications and Standards”, 4/e, Prentice
Hall.
4. Schiller J., Mobile Communications, 2/e, Pearson Education.
5. Roberta Bragg et. al., “Network Security: The Complete Reference”, Tata McGraw Hill.
325
COMPUTER SCIENCE AND ENGINEERING
326
COMPUTER SCIENCE AND ENGINEERING
PART A
Answer all Questions. Each question carries 3 Marks
1.
Distinguish between signature-based and anomaly-based intrusion detection
techniques.
2.
A trusted third party is considered as a main component in a network security
model. Why?
3.
How is endpoint identifier hiding achieved in real-time communication?
4.
Show how encryption is used to provide privacy and integrity in Kerberos v5.
5.
End-to-end privacy is essential for e-mail security. How is this achieved?
6.
List the four steps for preparing an EnvelopedData MIME entity.
7.
Show the operation of a Secure Sockets Layer (SSL) Record protocol.
8.
For Secure Shell (SSH) packets, what is the advantage of not including the MAC
in the scope of packet encryption?
9.
List the three security services provided by IEEE 802.11i.
10.
Define the terms Access Point, Basic Service Set, Extended Service Set.
(10x3=30)
327
COMPUTER SCIENCE AND ENGINEERING
Part B
(Answer any one question from each module. Each question carries 14 Marks)
11. (a)
Using the ElGamal scheme, let p = 881 and d = 700, find values for e1 and
(8)
e2. Choose r = 17. Find the value of S1 and S2 if M = 400.
(b)
Explain the requirements and challenges of network security.
(6)
OR
12. (a) In ElGamal, Schnorr and DSS, what happens if an attacker can find the value
(8)
of random secret key used by the signer? Also, what happens if a user uses
the same value of random secret key to sign two messages? Explain your
answer for each scheme separately.
(b) (6)
Explain the network security model with the help of a neat diagram.
13. (a) Alice wishes to log into Bob’s workstation remotely. List the steps involved
(7)
in this communication if Kerberos v4 is used.
(b)
How does Diffie-Hellman technique provide perfect forward secrecy using
(7)
signature keys?
OR
14. (a) Explain the algorithm for Message Authentication Code (MAC) calculation (8)
and verification in Kerberos v5 rsa-md5-des.
(b) (6)
Compare the aggressive mode and main mode of Phase 1 Internet Key
Exchange (IKE).
15. (a) Describe the different methods by which authentication of source is (7)
performed in email communication.
(b) (7)
Explain the Signed data and Clear-signed data functions provided by
S/MIME.
OR
16. (a) Explain the advantages of Pretty Good Privacy (PGP) over Privacy (7)
Enhanced Mail (PEM).
328
COMPUTER SCIENCE AND ENGINEERING
(b) (7)
Define non-repudiation. Describe the different ways by which it is
implemented in email communication.
17. (a) Describe the significance of pseudo-random function of Transport Layer (7)
Security.
(b) (7)
Explain the four different phases of Secure Sockets Layer (SSL)
HandshakeProtocol.
OR
18. (a) Describe how connection initiation and connection closure is done in Hyper (7)
Text Transfer Protocol Secure (HTTPS).
(b) (7)
Illustrate the sequence of events in Secure Shell (SSH) transport layer
protocol packet exchanges.
19. (a) Explain the Discovery phase and Authentication phase of IEEE 802.11i (7)
operation.
(b) (7)
Why are firewalls needed? Compare the features of packet filters and circuit
level firewalls.
OR
20. (a) Explain the two authentication methods used in Wired Equivalent Privacy (7)
(WEP).
(b) (7)
Describe the three transaction classes provided by Wireless Transaction
Protocol.
329
COMPUTER SCIENCE AND ENGINEERING
Teaching Plan
No of
No Contents Lecture
Hrs
330
COMPUTER SCIENCE AND ENGINEERING
1
2.12 Internet Key Exchange (IKE) phases
331
COMPUTER SCIENCE AND ENGINEERING
5.4 Wired Equivalent Privacy (WEP), Wi-Fi Protected Access (WPA), WPA2 1
332
COMPUTER SCIENCE AND ENGINEERING
Preamble:
This course enables the learners to understand the advanced concepts and algorithms in machine
learning. The course covers the standard and most popular supervised learning algorithms such as
linear regression, logistic regression, decision trees, Bayesian learning and the naive Bayes
algorithm, basic clustering algorithms, auto encoders, sampling methods and PAC learning. This
course helps the students to provide machine learning based solutions to real world problems.
Prerequisite: Basic understanding of probability theory, linear algebra, multivariate calculus and
multivariate probability theory.
CO3 Choose suitable model parameters for different machine learning techniques and to evaluate a
model performance (Cognitive Knowledge Level: Apply)
CO4 Explain the framework of PAC learning, basic concepts of VC dimension and non-
uniform learnability (Cognitive Knowledge Level: Understand)
CO5 Construct Bayesian models for data and apply computational techniques to draw inferences
(Cognitive Knowledge Level: Apply)
CO6 Illustrate the concepts of sampling algorithms, auto encoder, generative adversarial networks
(Cognitive Knowledge Level: Apply)
Mapping of course outcomes with program outcomes
PO1 PO PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO1
2 2
CO1
CO2
CO3
CO4
CO5
CO6
333
COMPUTER SCIENCE AND ENGINEERING
Assessment Pattern
Mark Distribution
Attendance : 10 marks
334
COMPUTER SCIENCE AND ENGINEERING
First Internal Examination shall be preferably conducted after completing the first half of the
syllabus and the Second Internal Examination shall be preferably conducted after completing
remaining part of the syllabus.
There will be two parts: Part A and Part B. Part A contains 5 questions (preferably, 2 questions
each from the completed modules and 1 question from the partly covered module), having 3 marks
for each question adding up to 15 marks for part A. Students should answer all questions from Part
A. Part B contains 7 questions (preferably, 3 questions each from the completed modules and 1
question from the partly covered module), each with 7 marks. Out of the 7 questions in Part B, a
student should answer any 5.
There will be two parts; Part A and Part B. Part A contains 10 questions with 2 questions from
each module, having 3 marks for each question. Students should answer all questions. Part B
contains 2 questions from each module of which a student should answer any one. Each question
can have a maximum 2 sub-divisions and carry 14 marks.
Syllabus
Module -1 (Supervised Learning)
335
COMPUTER SCIENCE AND ENGINEERING
Models of learnability- learning in the limit, probably approximately correct (PAC) learning.
Sample complexity- quantifying the number of examples needed to PAC learn, Computational
complexity of training, Sample complexity for finite hypothesis spaces, PAC results for learning
conjunctions, Sample complexity for infinite hypothesis spaces, Vapnik-Chervonenkis(VC)
dimension.
Graphical models - Bayesian belief networks, Markov random fields(MRFs), Inference on chains
and factor graphs, inference on clique trees. Monte Carlo methods – Basic sampling algorithms,
rejection sampling, importance sampling, Markov chain Monte Carlo(MCMC), Gibbs sampling.
Variational methods. Auto Encoder, Variational AutoEncoder, Generative Adversarial Networks
Textbook
1. Christopher M. Bishop. Pattern recognition and machine learning. Springer 2006.
2. Ethem Alpaydin, Introduction to Machine Learning, 2nd edition, MIT Press 2010.
3. Mohammed J. Zaki and Wagner Meira, Data Mining and Analysis: Fundamental Concepts
and Algorithms, Cambridge University Press, First South Asia edition, 2016.
4. Ian Goodfellow, Yoshua Bengio and Aaron Courville. Deep Learning. MIT Press 2016.
5. Mehryar Mohri, Afshin Rostamizadeh and Ameet Talwalkar. Foundations of Machine
Learning. Second edition. MIT Press 2018.
6. Tom Mitchell. Machine Learning. McGraw Hill 1997.
7. Richard O. Duda, Peter E . Hart, David G. Stork. Pattern classification, Second Edition.
Wiley.
8. Jiawei Han, Micheline Kamber, Jian Pei. Data Mining Concepts and Techniques, Third
Edition. Morgan Kaufmann.
9. David Foster. Generative Deep Learning - Teaching Machines to Paint, Write, Compose,
and Play. O'Reilly Media, Inc., June 2019.
Reference Books
336
COMPUTER SCIENCE AND ENGINEERING
1. Consider a naive Bayes classifier with 3 boolean input variables, X1, X2 and X3, and one
boolean output, Y. How many parameters must be estimated to train such a naive Bayes
classifier? How many parameters would have to be estimated to learn the above classifier
if we do not make the naive Bayes conditional independence assumption?
2. Describe the ID3 algorithm. Is the order of attributes identical in all branches of the
decision tree?
3. Explain the difference between (batch) gradient descent and stochastic gradient descent.
Give an example of when you might prefer one over the other.
4. Suppose that you are asked to perform linear regression to learn the function that outputs
y, given the D-dimensional input x. You are given N independent data points, and that all
the D attributes are linearly independent. Assuming that D is around 100, would you
prefer the closed form solution or gradient descent to estimate the regressor?
5. Suppose you have a three class problem where class label y ∈ 0, 1, 2 and each training
example X has 3 binary attributes X1, X2, X3 ∈ 0, 1. How many parameters (probability
distribution) do you need to know to classify an example using the Naive Bayes
classifier?
Course Outcome 2(CO2):
1. Which similarity measure could be used to compare feature vectors of two images? Justify
your answer.
2. Illustrate the strength and weakness of k-means algorithm.
3. Suppose you want to cluster the eight points shown below using k-means
337
COMPUTER SCIENCE AND ENGINEERING
Assume that k = 3 and that initially the points are assigned to clusters as follows:
C1 = {x1, x2, x3}, C2 = {x4, x5, x6}, C3 = {x7, x8}. Apply the k-means algorithm until
convergence, using the Manhattan distance.
4. Cluster the following eight points representing locations into three clusters: A1(2, 10),
A2(2, 5), A3(8, 4), A4(5, 8), A5(7, 5), A6(6, 4), A7(1, 2), A8(4, 9).
Initial cluster centers are: A1(2, 10), A4(5, 8) and A7(1, 2).
The distance function between two points a = (x1, y1) and b = (x2, y2) is defined as D(a, b)
= |x2 – x1| + |y2 – y1|
Use k-Means Algorithm to find the three cluster centers after the second iteration.
1. What is ensemble learning? Can ensemble learning using linear classifiers learn
classification of linearly non-separable sets?
2. Describe boosting. What is the relation between boosting and ensemble learning?
3. Classifier A attains 100% accuracy on the training set and 70% accuracy on the test set.
Classifier B attains 70% accuracy on the training set and 75% accuracy on the test set.
Which one is a better classifier. Justify your answer.
4. What are ROC space and ROC curve in machine learning? In ROC space, which points
correspond to perfect prediction, always positive prediction and always negative
prediction? Why?
5. Suppose there are three classifiers A,B and C. The (FPR, TPR) measures of the three
classifiers are as follows – A (0, 1), B (1, 1) , C (1,0.5). Which can be considered as a
perfect classifier? Justify your answer.
338
COMPUTER SCIENCE AND ENGINEERING
1. Write down the factored conditional probability expression that corresponds to the
graphical Bayesian Network shown below.
1. Derive an algorithm using the inverse transform method to generate a random sample from
the exponential distribution.
2. Explain the pros and cons of importance sampling versus rejection sampling.
3. Sketch the core idea of the Monte Carlo method. What is a sample? What is a direct
sampling method? Why can't it be used directly to do any inference? What is rejection
sampling? What is its major disadvantage?
4. Generative Adversarial Networks(GANs) include a generator and a discriminator. Sketch a
basic GAN using those elements, a source of real images, and a source of randomness.
5. The word “adversarial” in the acronym for GANs suggests a two-player game. What are
the two players, and what are their respective goals?
339
COMPUTER SCIENCE AND ENGINEERING
1. Suppose you have a dataset with m = 1000000 examples and n = 200000 features
for each example. You want to use multivariate linear regression to fit the
parameters to our data. Should you prefer gradient descent or the normal equation?
Justify your answer.
2. Define Information gain? How is that different from Gain ratio? Give the
advantage of using Gain ratio measure?
3. What is cluster analysis? Identify two applications where cluster analysis can be
applied to multimedia data?
4. Given two objects represented by the tuples (22, 1, 42, 10) and (20, 0, 36, 8):
(i) Compute the Euclidean distance between the two objects.
(ii) Compute the Manhattan distance between the two objects.
5. Suppose there are three classifiers A,B and C. The (FPR, TPR) measures of the
three classifiers are as follows – A (0, 1), B (1, 1) , C (1,0.5). Which can be
considered as a perfect classifier? Justify your answer.
7. For a particular learning task, if the requirement of error parameter ε changes from
0.1 to 0.01. How many more samples will be required for probably approximately
correct(PAC) learning?
340
COMPUTER SCIENCE AND ENGINEERING
8. Suppose we have a hypothesis set that labels all points inside an interval [a, b] as
class 1. Find its Vapnik-Chervonenkis(VC)- dimension?
9. Given a density function f(x), the rejection sampling is a method that can generate
data points from the density function f. List the three steps to generate a random
sample from f using rejection sampling.
10. How does the variational auto-encoder(VAE) architecture allow it to generate new
data points, compared to auto-encoder, which cannot generate new data points? (10x3=30)
Part B
(Answer any one question from each module. Each question carries 14 Marks)
11. (a) . Consider the hypothesis for the linear regression hθ (x) = θ0 + θ1x, and the
(5)
cost function J( θ0, θ1) = 1/2m Σ i= 1 to m ( hθ (x(i)) – y(i))2 where m is the
number of training examples. Given the following set of training examples.
(b) . Write a gradient descent algorithm for multivariate regression? Compare the
gradient and analytical solution to the multivariate regression? (9)
OR
12. (a) Consider the collection of training samples (S) in the Figure given below. Drug
is the target attribute which describes the Drug suggested for each patient. Find (9)
the value of the following . i) Gain(S, Sex) ii) Gain (S, Cholesterol)
341
COMPUTER SCIENCE AND ENGINEERING
(b) Explain how LASSO regression helps to reduce the overfitting problem? (5)
Identify the cluster by applying the k-means algorithm, with k = 2. Try using
initial cluster centers as far apart as possible.
OR
14. (a) Illustrate the strength and weakness of k-means in comparison with the k- (4)
medoids algorithm.
(b) Suppose that we have the following data . Use single linkage Agglomerative (10)
clustering to identify the clusters. Draw the Dendogram. Use Euclidean
distance measure
342
COMPUTER SCIENCE AND ENGINEERING
X Y
P1 0.4 0.53
P2 0.22 0.38
P3 0.35 0.32
P4 0.26 0.19
P5 0.08 0.41
P6 0.45 0.30
(b) What does it mean for a classifier to have a high precision but low recall? (3)
(c) Fill in the missing values in the accompanying three class confusion matrix. (7)
Given that model accuracy is 72% and classification error for class 2 is 20%.
Find also the precision and recall for class1
Predicted
Class 1 14 2 5
Class 3 1 ?(Y) 18
OR
343
COMPUTER SCIENCE AND ENGINEERING
16. (a) What are ROC space and ROC curve in machine learning? In ROC space,
which points correspond to perfect prediction, always positive prediction and (4)
always negative prediction? Why?
(b) Given the following ROC Curve? Find the AUC? (3)
(c) How does random forest classifier work? Why is a random forest better than (7)
a decision tree?
17. (a) Show that the concept class Cn of the conjunction of boolean literals up to n (8)
variables is probably approximately correct(PAC)-learnable.
OR
18. (a) Consider a Boolean classification problem with n binary variables and a (7)
hypothesis space H, where each hypothesis is a decision tree of depth 1. How
many training examples, m suffice to assure that with probability at least 0.99,
any consistent learner using H will output a hypothesis with true error at most
0.05?
(b) Prove that VC(H) ≤ log2 |H|, where H is a hypothesis space. (|H| denotes the (7)
344
COMPUTER SCIENCE AND ENGINEERING
19. (a) Shown below is the Bayesian network corresponding to the Burglar Alarm (7)
problem, P(J | A) P(M | A) P(A | B, E) P(B) P(E). The probability tables show
the probability that variable is True, e.g., P(M) means P(M = t). Find P( J = t ∧
M = f ∧ A = f ∧ B = f ∧ E = t).
(b) Derive an algorithm using the inverse transform method to generate a (7)
random sample from the distribution with density fX(x) = 3 x2, 0 < x < 1.
OR
20. (a) Draw the Bayesian Network that corresponds to this conditional probability: (6)
P(A | B,C,E) P(B | D,E) P(C | F,H) P(D | G) P(E| G,H) P(F | H) P(G) P(H)
(b) What is effective sample size (ESS)? Why is a large ESS necessary but not (3)
sufficient for good MCMC mixing?
345
COMPUTER SCIENCE AND ENGINEERING
Teaching Plan
1.3 Gradient descent, closed form, normal equations (TB 2: Section 5.8) 1 hour
2.7 Expectation Maximization (EM) algorithm for Gaussian mixture model 1 hour
Lecture-1 (TB 3: Chapter 13)
2.8 Expectation Maximization (EM) algorithm for Gaussian mixture model 1 hour
Lecture-2 (TB 3: Chapter 13)
346
COMPUTER SCIENCE AND ENGINEERING
3.4 Error estimation, parameter and model selection (TB 3: Chapter 8.5) 1 hour
4.1 Learning in the limit, probably approximately correct (PAC) learning 1 hour
347
COMPUTER SCIENCE AND ENGINEERING
348
COMPUTER SCIENCE AND ENGINEERING
THEORY OF Year of
CST Category L T P Credit
COMPUTABILITY Introduction
398
AND COMPLEXITY VAC 3 1 0 4 2019
Preamble:
This is a theoretical course in computer science to enable the learners to know the fundamentals of
computability and complexity theories. It covers the notions of computability/decidability, the
process of reduction to prove decidability/undecidability and the classification of problems into
class P, class NP and class NP Complete based on the time complexity of solving the problems.
This course helps the learner to identify whether a real life problem is decidable/undecidable and
also to classify a decidable problem into tractable or intractable, based on the time complexity
class it belongs.
Prerequisite: Sound knowledge in Data Structures and Formal Languages and Automata Theory.
CO1 Illustrate relative computing powers of Finite State Automata, Push Down Automata,
Linear Bounded Automata and Turing Machines.(Cognitive Knowledge Level:
Apply)
CO2 Prove that a given language is undecidable/not semi-decidable by using the reduction
process.(Cognitive Knowledge Level: Apply)
CO3 Describe the time complexity of a given problem as a function of the number of steps
required by a Turing machine to solve it. (Cognitive Knowledge Level: Understand)
CO4 Utilize polynomial time reduction to prove that a given problem is NP Complete.
(Cognitive Knowledge Level: Apply)
PO PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO1 PO11 PO1
1 0 2
CO1
CO2
349
COMPUTER SCIENCE AND ENGINEERING
CO3
CO4
Conduct investigations of
PO4 complex problems PO10 Communication
Assessment Pattern
Remember 30 30 30
Understand 30 30 30
Apply 40 40 40
Analyze
Evaluate
Create
350
COMPUTER SCIENCE AND ENGINEERING
Mark Distribution
150 50 100 3
Syllabus
Module - 1 (Introduction to Formal Language Theory and Regular Languages)
Finite State Automata, Push Down Automata, Linear Bounded Automata, Turing Machines,
Recursive Languages, Recursively Enumerable Languages, Universal Turing Machine,
Enumeration Machine, Two Counter Machine.
Module– 2 (Undecidability)
Halting Problem, Language representation of a problem, Reduction - applications, Rice’s First
and Second Theorem with proof.
351
COMPUTER SCIENCE AND ENGINEERING
Module - 3 (Overview of Complexity Classes)
Measuring time complexity, Asymptotic notations - Big O and small-o, Analysing algorithms,
Complexity relationship among models. Complexity classes- Class P, example problems in class
P, Class NP, Polynomial time verification, example problems in class NP.
Text Books
1. Dexter C. Kozen, Automata and Computability, Springer (1999)
2. Michael Sipser, Introduction to the Theory of Computation, Second Edition
Reference Books
1. Douglas B. West, Introduction to Graph Theory, Second Edition
352
COMPUTER SCIENCE AND ENGINEERING
QP CODE:
PART A
1. Design a Deterministic Finite state Automaton (DFA) for the language:𝐿𝐿 = {𝑥𝑥 ∈
{0,1}∗ |𝑥𝑥does not contain consecutive zeros}.
353
COMPUTER SCIENCE AND ENGINEERING
Part B
(Answer any one question from each module. Each question carries 14 Marks)
11. (a) Why the family of languages recognized by Turing machines is called (8)
Recursively Enumerable? Explain the working of an enumeration machine.
OR
(b) Prove that Turing Machines and Two Counter Machines are equivalent in (10)
power.
13. (a) Prove using Diagonalisation that halting problem is undecidable. (8)
(b) Prove Using reduction that state entry problem of Turing machines is (6)
undecidable.
OR
(b) Prove Using reduction that whether a Turing Machine accepts empty string (6)
(or null string) is undecidable.
𝑛𝑛 𝑛𝑛
15. (a) Show that the language 𝐿𝐿 = {𝑎𝑎 𝑏𝑏 |𝑛𝑛 ≥ 0} can be decided by a deterministic (7)
Turing Machine in 𝑂𝑂(𝑛𝑛 ⋅ 𝑙𝑙𝑙𝑙𝑙𝑙𝑙𝑙) time.
(b) Let 𝑡𝑡(𝑛𝑛) be a function, where 𝑛𝑛 ∈ ℕ and 𝑡𝑡(𝑛𝑛) ≥ 𝑛𝑛. Then, prove that every (7)
𝑡𝑡(𝑛𝑛) time nondeterministic single-tape Turing machine has an equivalent
2𝑂𝑂(𝑡𝑡(𝑛𝑛 )) time single-tape deterministic Turing machine.
354
COMPUTER SCIENCE AND ENGINEERING
OR
16. (a) Prove that every context free language is a member of class P. (8)
17. (a) Define Independent set in a graph. Prove that a graph 𝐺𝐺 of 𝑛𝑛 vertices with an (8)
independent set of size 𝑘𝑘 contains a vertex cover of size 𝑛𝑛 − 𝑘𝑘.
(b) Define the complexity class NP Complete. Explain the significance of an NP (6)
Complete problem.
OR
18. (a) Define the complement of a graph. Prove that the complement of a graph 𝐺𝐺 of (7)
𝑛𝑛 vertices with a CLIQUE of size 𝑘𝑘 contains an independent set of size 𝑘𝑘.
(b) What is satisfiability problem. Prove that satisfiability problem is in class NP. (7)
(b) Prove that Hamiltonian path problem is in the class NP Complete. (10)
OR
20. (a) Prove that Vertex Cover problem is in the class NP Complete. (8)
355
COMPUTER SCIENCE AND ENGINEERING
Teaching Plan
No. of
Lecture
No Contents Hours
(45 hrs)
Module-1(Overview of Automata Theory) (10 hours)
1.10 Proof that two Counter Machines and Turing machines are equivalent 1 hour
356
COMPUTER SCIENCE AND ENGINEERING
357
COMPUTER SCIENCE AND ENGINEERING
358
COMMON COURSES
(S5 & S6)
YEAR OF
Category L T P CREDIT
MCN DISASTER INTRODUCTION
301 MANAGEMENT Non -
2 0 0 Nil 2019
Credit
Preamble: The objective of this course is to introduce the fundamental concepts of hazards and
disaster management.
Prerequisite: Nil
Course Outcomes: After the completion of the course the student will be able to
Define and use various terminologies in use in disaster management parlance and
CO1 organise each of these terms in relation to the disaster management cycle (Cognitive
knowledge level: Understand).
Distinguish between different hazard types and vulnerability types and do
CO2
vulnerability assessment (Cognitive knowledge level: Understand).
Identify the components and describe the process of risk assessment, and apply
CO3
appropriate methodologies to assess risk (Cognitive knowledge level: Understand).
Explain the core elements and phases of Disaster Risk Management and develop
CO4 possible measures to reduce disaster risks across sector and community (Cognitive
knowledge level: Apply)
Identify factors that determine the nature of disaster response and discuss the various
CO5
disaster response actions (Cognitive knowledge level: Understand).
Explain the various legislations and best practices for disaster management and risk
CO6 reduction at national and international level (Cognitive knowledge level:
Understand).
1
Mapping of course outcomes with program outcomes
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO PO1 PO1 PO1
9 0 1 2
CO1 2 2 2 2
CO2 2 3 2 2 2 3 3 2
CO3 2 3 2 2 2 2 3 3 2
CO4 3 3 3 2 2 3 2
CO5 3 3 2 2 3 2
CO6 3 2 3 3 2
2
Assessment Pattern
Mark Distribution
Attendance : 10 marks
Each of the two internal examinations has to be conducted out of 50 marks. First series test shall
be preferably conducted after completing the first half of the syllabus and the second series test
shall be preferably conducted after completing remaining part of the syllabus. There will be two
parts: Part A and Part B. Part A contains 5 questions (preferably, 2 questions each from the
completed modules and 1 question from the partly completed module), having 3 marks for each
question adding up to 15 marks for part A. Students should answer all questions from Part A.
3
Part B contains 7 questions (preferably, 3 questions each from the completed modules and 1
question from the partly completed module), each with 7 marks. Out of the 7 questions, a student
should answer any 5.
There will be two parts; Part A and Part B. Part A contains 10 questions with 2 questions from
each module, having 3 marks for each question. Students should answer all questions. Part B
contains 2 questions from each module of which a student should answer any one. Each question
can have maximum 2 sub-divisions and carries 14 marks.
4
SYLLABUS
Module 1
Systems of earth
Definition and meaning of key terms in Disaster Risk Reduction and Management- disaster,
hazard, exposure, vulnerability, risk, risk assessment, risk mapping, capacity, resilience, disaster
risk reduction, disaster risk management, early warning systems, disaster preparedness, disaster
prevention, disaster mitigation, disaster response, damage assessment, crisis counselling, needs
assessment.
Module 2
Hazard types and hazard mapping; Vulnerability types and their assessment- physical, social,
economic and environmental vulnerability.
Module 3
Disaster risk management -Core elements and phases of Disaster Risk Management
Module 4
5
Module 5
Common disaster types in India; Legislations in India on disaster management; National disaster
management policy; Institutional arrangements for disaster management in India.
The Sendai Framework for Disaster Risk Reduction- targets, priorities for action, guiding
principles
4. United Nations Office for Disaster Risk Reduction, Sendai Framework for Disaster Risk
Reduction 2015-2030, 2015
3. Explain the different types of cyclones and the mechanism of their formation
4. Explain with examples, the difference between hazard and risk in the context of disaster
management
5. Explain the following terms in the context of disaster management (a) exposure (b)
resilience (c) disaster risk management (d) early warning systems, (e) damage assessment
(f) crisis counselling (g) needs assessment
2. What is participatory hazard mapping? How is it conducted? What are its advantages?
6
2. List the strategies for disaster risk management ‘before’, ‘during’ and ‘after’ a disaster
3. What is disaster preparedness? Explain the components of a comprehensive disaster
preparedness strategy
2. What are the steps to effective disaster communication? What are the barriers to
communication?
1. Briefly explain the levels of stakeholder participation in the context of disaster risk
reduction
2. Explain the guiding principles and priorities of action according to the Sendai Framework
for Disaster Risk Reduction
7
Model Question paper
QP CODE: PAGES:3
PART A
1. What is the mechanism by which stratospheric ozone protects earth from harmful UV
rays?
5. List the strategies for disaster risk management ‘before’, ‘during’ and ‘after’ a disaster
7. Briefly explain the levels of stakeholder participation in the context of disaster risk
reduction
8
11. a. Explain the different types of cyclones and the mechanism of their formation [10]
b. Explain with examples, the difference between hazard and risk in the context of
disaster management
[4]
OR
12. Explain the following terms in the context of disaster management [14]
(a) exposure (b) resilience (c) disaster risk management (d) early warning systems, (e) damage
assessment (f) crisis counselling (g) needs assessment
13. a. What is participatory hazard mapping? How is it conducted? What are its advantages?
[8]
OR
14. Explain the types of vulnerabilities and the approaches to assess them [14]
b. Explain the factors that decide the nature of disaster response [6]
OR
17. a. Explain the benefits and costs of stakeholder participation in disaster management [10]
OR
18. a. What are the steps to effective disaster communication? What are the barriers to
communication? [7]
9
19. Explain the salient features of the National Policy on Disaster Management in India
[14]
OR
20. Explain the guiding principles and priorities of action according to the Sendai Framework
for Disaster Risk Reduction [14]
10
Teaching Plan
Module 1 5 Hours
1.1 Introduction about various Systems of earth, Lithosphere- 1 Hour
composition, rocks, Soils; Atmosphere-layers, ozone layer,
greenhouse effect, weather
1.2 Cyclones, atmospheric circulations, Indian Monsoon; hydrosphere- 1 Hour
Oceans, inland water bodies; biosphere
1.3 Definition and meaning of key terms in Disaster Risk Reduction 1 Hour
and Management- disaster, hazard,
1.4 Exposure, vulnerability, risk, risk assessment, risk mapping, 1 Hour
capacity, resilience, disaster risk reduction, Disaster risk
management, early warning systems
1.5 Disaster preparedness, disaster prevention, disaster, Mitigation, 1 Hour
disaster response, damage assessment, crisis counselling, needs
assessment.
Module 2 5 Hours
2.1 Various Hazard types, Hazard mapping; Different types of 1 Hour
Vulnerability types and their assessment
2.2 Vulnerability assessment and types, Physical and social 1 Hour
vulnerability
2.3 Economic and environmental vulnerability, Core elements of 1 Hour
disaster risk assessment
2.4 Components of a comprehensive disaster preparedness strategy 1 Hour
approaches, procedures
2.5 Different disaster response actions 1 Hour
Module 3 5 Hours
3.1 Introduction to Disaster risk management, Core elements of 1 Hour
Disaster Risk Management
3.2 Phases of Disaster Risk Management, Measures for Disaster Risk 1 Hour
Reduction
3.3 Measures for Disaster prevention, mitigation, and preparedness. 1 Hour
11
3.4 Disaster response- objectives, requirements. Disaster response 1 Hour
planning; types of responses.
3.5 Introduction- Disaster Relief, Relief; international relief 1 Hour
organizations.
Module 4 5 Hours
4.1 Participatory stakeholder engagement 1 Hour
4.2 Importance of disaster communication. 1 Hour
4.3 Disaster communication- methods, barriers. Crisis counselling 1 Hour
4.4 Introduction to Capacity Building. Concept – Structural Measures, 1 Hour
Non-structural Measures.
4.5 Introduction to Capacity Assessment, Capacity Assessment; 1 Hour
Strengthening, Capacity for Reducing Risk
Module 5 5 Hours
5.1 Introduction-Common disaster types in India. 1 Hour
5.2 Common disaster legislations in India on disaster management 1 Hour
5.3 National disaster management policy, Institutional arrangements 1 Hour
for disaster management in India.
5.4 The Sendai Framework for Disaster Risk Reduction and targets 1 Hour
5.5 The Sendai Framework for Disaster Risk Reduction-priorities for 1 Hour
action, guiding principles
12
Category L T P CREDIT
Industrial Economics &
HUT 300
Foreign Trade HSMC 3 0 0 3
Preamble: To equip the students to take industrial decisions and to create awareness of economic
environment.
Prerequisite: Nil
Course Outcomes: After the completion of the course the student will be able to
Explain the problem of scarcity of resources and consumer behaviour, and to evaluate
CO1 the impact of government policies on the general economic welfare. (Cognitive
knowledge level: Understand)
Take appropriate decisions regarding volume of output and to evaluate the social cost
CO2
of production. (Cognitive knowledge level: Apply)
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO1 2 3
CO2 2 2 2 2 3 3
CO3 2 2 1 3
CO4 2 2 1 1 3
CO5 2 2 1 3
1
Abstract POs defined by National Board of Accreditation
Assessment Pattern
Mark Distribution
2
Continuous Internal Evaluation Pattern:
Attendance : 10 marks
Continuous Assessment - Test (2 numbers) : 25 marks
Continuous Assessment - Assignment : 15 marks
Each of the two internal examinations has to be conducted out of 50 marks. First series test shall
be preferably conducted after completing the first half of the syllabus and the second series test
shall be preferably conducted after completing remaining part of the syllabus. There will be two
parts: Part A and Part B. Part A contains 5 questions (preferably, 2 questions each from the
completed modules and 1 question from the partly completed module), having 3 marks for each
question adding up to 15 marks for part A. Students should answer all questions from Part A.
Part B contains 7 questions (preferably, 3 questions each from the completed modules and 1
question from the partly completed module), each with 7 marks. Out of the 7 questions, a student
should answer any 5.
Part A contains 10 questions with 2 questions from each module, having 3 marks for each
question. Students should answer all questions. Part B contains 2 questions from each module of
which a student should answer any one. Each question can have maximum 3 sub-divisions and
carries 14 marks.
3
SYLLABUS
Scarcity and choice - Basic economic problems- PPC – Firms and its objectives – types of firms
– Utility – Law of diminishing marginal utility – Demand and its determinants – law of demand
– elasticity of demand – measurement of elasticity and its applications – Supply, law of supply
and determinants of supply – Equilibrium – Changes in demand and supply and its effects –
Consumer surplus and producer surplus (Concepts) – Taxation and deadweight loss.
Production function – law of variable proportion – economies of scale – internal and external
economies – Isoquants, isocost line and producer’s equilibrium – Expansion path – Technical
progress and its implications – Cobb-Douglas production function - Cost concepts – Social cost:
private cost and external cost – Explicit and implicit cost – sunk cost - Short run cost curves -
long run cost curves – Revenue (concepts) – Shutdown point – Break-even point.
Circular flow of economic activities – Stock and flow – Final goods and intermediate goods -
Gross Domestic Product - National Income – Three sectors of an economy- Methods of
measuring national income – Inflation- causes and effects – Measures to control inflation-
Monetary and fiscal policies – Business financing- Bonds and shares -Money market and Capital
market – Stock market – Demat account and Trading account - SENSEX and NIFTY.
4
deficit and devaluation – Trade policy – Free trade versus protection – Tariff and non-tariff
barriers.
Reference Materials
5
4. What is collusive oligopoly?
1. What is devaluation?
2. Suppose a foreign country imposes a tariff on Indian goods. How does it affect India’s
exports?
3. What is free trade?
4. What are the arguments in favour of protection?
6
Model Question paper
QP CODE: PAGES:3
PART A
2. What should be the percentage change in price of a product if the sale is to be increased by 50
3. In the production function Q= 2L 1/2K 1/2 if L=36 how many units of capital are needed to
4. Suppose in the short run AVC 4. Suppose in the short run AVC<P<AC. Will this firm produce
7
10. What is devaluation? (10 x 3 = 30 marks)
PART B
(Answer one full question from each module, each question carries 14 marks)
MODULE I
11. a) Prepare a utility schedule showing units of consumption, total utility and marginal
utility, and explain the law of diminishing marginal utility. Point out any three
limitations of the law.
b) How is elasticity of demand measured according to the percentage method? How is
the measurement of elasticity of demand useful for the government?
Or
12. a) Explain the concepts consumer surplus and producer surplus.
b) Suppose the government imposes a tax on a commodity where the tax burden met
by the consumers. Draw a diagram and explain dead weight loss. Mark consumer
surplus, producer surplus, tax revenue and dead weight loss in the diagram.
MODULE II
13. a) What are the advantages of large-scale production?
b) Explain Producer equilibrium with the help of isoquants and isocost line. What is
expansion path?
Or
14. a) Explain break-even analysis with the help of a diagram.
b) Suppose the monthly fixed cost of a firm is Rs. 40000 and its monthly total variable
cost is Rs. 60000.
i. If the monthly sales is Rs. 120000 estimate contribution and break-even sales.
ii. If the firm wants to get a monthly profit of Rs.40000, what should be the sales?
MODULE III
8
15. a) What are the features of monopolistic competition?
b) Explain the equilibrium of a firm earning supernormal profit under monopolistic
competition.
Or
16.a) Make comparison between perfect competition and monopoly.
b) Explain price rigidity under oligopoly with the help of a kinked demand curve.
MODULE IV
17. a) How is national income estimated under product method and expenditure method?
b) Estimate GDPmp, GNPmp and National income
Or
18. a) What are the monetary and fiscal policy measures to control inflation?
b) What is SENSEX?
MODULE V
19. a) What are the advantages of disadvantages of foreign trade?
b) Explain the comparative cost advantage.
Or
20. a) What are the arguments in favour protection?
b) Examine the tariff and non-tariff barriers to international trade.
(5 × 14 = 70 marks)
9
Teaching Plan
Module 1 (Basic concepts and Demand and Supply Analysis) 7 Hours
1.3 Utility – Law of diminishing marginal utility – Demand – law of demand 1 Hour
1.6 Equilibrium – changes in demand and supply and its effects 1 Hour
Consumer surplus and producer surplus (Concepts) – Taxation and
1.7 1 Hour
deadweight loss.
Module 2 (Production and cost) 7 Hours
2.4 Technical progress and its implications – cob Douglas Production function 1 Hour
Cost concepts – social cost: private cost and external cost – Explicit and
2.5 1 Hour
implicit cost – sunk cost
2.6 Short run cost curves & Long run cost curves 1 Hour
10
Module 4 (Macroeconomic concepts) 7 Hours
Stock and flow – Final goods and intermediate goods – Gross Domestic
4.2 1 Hour
Product - National income – Three sectors of an economy
4.4 Inflation – Demand pull and cost push – Causes and effects 1 Hour
11
Category L T P Credit
HUT
Management for Engineers
310 HMC 3 0 0 3
Preamble: This course is intended to help the students to learn the basic concepts and functions
of management and its role in the performance of an organization and to understand various
decision-making approaches available for managers to achieve excellence. Learners shall have a
broad view of different functional areas of management like operations, human resource, finance
and marketing.
Prerequisite: Nil
Course Outcomes After the completion of the course the student will be able to
1
Mapping of course outcomes with program outcomes
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO1 2 1 2 2 2 2 1 1
CO2 2 1 1 2 1 2 1 1
CO3 2 2 2 2 1
CO4 2 2 2 2 1 2 1
CO5 2 1 1 1 2 1
CO6 2 2 2 1 1 1 1 1 1 1 1
Assessment Pattern
2
Mark Distribution
Attendance : 10 marks
Each of the two internal examinations has to be conducted out of 50 marks. First series test shall
be preferably conducted after completing the first half of the syllabus and the second series test
shall be preferably conducted after completing remaining part of the syllabus. There will be two
parts: Part A and Part B. Part A contains 5 questions (preferably, 2 questions each from the
completed modules and 1 question from the partly completed module), having 3 marks for each
question adding up to 15 marks for part A. Students should answer all questions from Part A.
Part B contains 7 questions (preferably, 3 questions each from the completed modules and 1
question from the partly completed module), each with 7 marks. Out of the 7 questions, a student
should answer any 5.
There will be two parts; Part A and Part B. Part A contains 10 questions with 2 questions from
each module, having 3 marks for each question. Students should answer all questions. Part B
contains 2 questions from each module of which a student should answer any one. Each question
can have maximum 2 sub-divisions and carries 14 marks.
3
SYLLABUS
Project Management, Network construction, Arrow diagram, Redundancy. CPM and PERT
Networks, Scheduling computations, PERT time estimates, Probability of completion of project,
Introduction to crashing.
References:
4
1. H. Koontz, and H. Weihrich, Essentials of Management: An International Perspective. 8th
ed., McGraw-Hill, 2009.
8. R. B. Chase, Ravi Shankar and F. R. Jacobs, Operations and Supply Chain Management,
14th ed. McGraw Hill Education (India), 2015.
Course Outcome 2 (CO2): Explain the following terms with a suitable example Goal,
Objective, and Strategy.
Course Outcome 3 (CO3): Mr. Shyam is the author of what promises to be a successful novel.
He has the option to either publish the novel himself or through a publisher. The publisher is
offering Mr. Shyam Rs. 20,000 for signing the contract. If the novel is successful, it will sell
200,000 copies. Else, it will sell 10,000 copies only. The publisher pays a Re. 1 royalty per copy.
A market survey indicates that there is a 70% chance that the novel will be successful. If Mr.
Shyam undertakes publishing, he will incur an initial cost of Rs. 90,000 for printing and
marketing., but each copy sold will net him Rs. 2. Based on the given information and the
5
decision analysis method, determine whether Mr. Shyam should accept the publisher’s offer or
publish the novel himself.
Course Outcome 4 (CO4): Explain the concepts of crashing and dummy activity in project
management.
Course Outcome 5 (CO5): Derive the expression for the Economic order quantity (EOQ)?
6
Model Question Paper
QP CODE: PAGES: 4
3. Planning is looking ahead and controlling is looking back. Comment with suitable examples
10. What are the key metrics for sustainability measurement? What makes the measurement and
reporting of sustainability challenging?
OR
7
12. a) Explain the 14 principles of administrative management? (10)
13. a) What are planning premises, explain the classification of planning premises. (10)
b) Distinguish between strategy and policy. How can policies be made effective. (4)
OR
15. a) Modern forest management uses controlled fires to reduce fire hazards and to stimulate
new forest growth. Management has the option to postpone or plan a burning. In a specific forest
tract, if burning is postponed, a general administrative cost of Rs. 300 is incurred. If a controlled
burning is planned, there is a 50% chance that good weather will prevail and burning will cost
Rs. 3200. The results of the burning may be either successful with probability 0.6 or marginal
with probability 0.4. Successful execution will result in an estimated benefit of Rs. 6000, and
marginal execution will provide only Rs. 3000 in benefits. If the weather is poor, burning will be
cancelled incurring a cost of Rs. 1200 and no benefit. i) Develop a decision tree for the problem.
(ii) Analyse the decision tree and determine the optimal course of action. (8)
b) Student tuition at ABC University is $100 per semester credit hour. The Education department
supplements the university revenue by matching student tuition, dollars per dollars. Average
class size for typical three credit course is 50 students. Labour costs are $4000 per class, material
costs are $20 per student, and overhead cost are $25,000 per class. (a) Determine the total factor
productivity. (b) If instructors deliver lecture 14 hours per week and the semester lasts for 16
weeks, what is the labour productivity? (6)
OR
16. a) An ice-cream retailer buys ice cream at a cost of Rs. 13 per cup and sells it for Rs. 20 per
cup; any remaining unsold at the end of the day, can be disposed at a salvage price of Rs. 2.5 per
cup. Past sales have ranged between 13 and 17 cups per day; there is no reason to believe that
8
sales volume will take on any other magnitude in future. Find the expected monetary value and
EOL, if the sales history has the following probabilities:
(9)
Market Size 13 14 15 16 17
Probability 0.10 0.15 0.15 0.25 0.35
b) At Modem Lumber Company, Kishore the president and a producer of an apple crates sold to
growers, has been able, with his current equipment, to produce 240 crates per 100 logs. He
currently purchases 100 logs per day, and each log required 3 labour hours to process. He
believes that he can hire a professional buyer who can buy a better quality log at the same cost. If
this is the case, he increases his production to 260 crates per 100 logs. His labour hours will
increase by 8 hours per day. What will be the impact on productivity (measured in crates per
labour-hour) if the buyer is hired? What is the growth in productivity in this case?
(5)
17. a) A project has the following list of activities and time estimates:
(a) Draw the network. (b) Show the early start and early finish times. (c) Show the
critical path. (10)
9
b) An opinion survey involves designing and printing questionnaires, hiring and training
personnel, selecting participants, mailing questionnaires and analysing data. Develop the
precedence relationships and construct the project network. (4)
OR
18. a) The following table shows the precedence requirements, normal and crash times, and
normal and crash costs for a construction project:
Draw the network. (b) Determine the critical path. (c) Determine the optimal duration and the
associated cost. (10)
19. a) What is meant by market segmentation and explain the process of market segmentation (8)
b) The Honda Co. in India has a division that manufactures two-wheel motorcycles. Its budgeted
sales for Model G in 2019 are 80,00,000 units. Honda’s target ending inventory is 10,00, 000
units and its beginning inventory is 12, 00, 000 units. The company’s budgeted selling price to its
distributors and dealers is Rs. 40, 000 per motorcycle. Honda procures all its wheels from an
10
outside supplier. No defective wheels are accepted. Honda’s needs for extra wheels for
replacement parts are ordered by a separate division of the company. The company’s target
ending inventory is 3,00,000 wheels and its beginning inventory is 2,00,000 wheels. The
budgeted purchase price is Rs. 1,600 per wheel.
OR
b) Distinguish between the following: (a) Assets and Liabilities (b) Production concept and
Marketing concept (c) Needs and Wants (d) Design functions and Operational control functions
in operations (4)
11
Teaching Plan
12
Sl.No TOPIC SESSION
Module I
4.2 Network construction 21
Module V
5.1 Introduction to functional areas of management, 28
5.2 Operations management 29
13
COMPUTER SCIENCE AND ENGINEERING
SEMESTER VII
COMPUTER SCIENCE AND ENGINEERING
Preamble: The course aims to introduce the fundamental principles of intelligent systems to
students. This involves ideas about the characteristics of intelligent systems, knowledge
representation schemes, logic and inference mechanisms. The course helps the learner to
understand the design of self learning systems along with some of their typical applications in the
emerging scenario where the business world is being transformed by the progress made in
machine learning.
Prerequisite : NIL
Course Outcomes: After the completion of the course the student will be able to
CO# CO
Explain the fundamental concepts of intelligent systems and their architecture.
CO1 (Cognitive Knowledge Level: Understanding)
CO1
CO2
CO3
CO4
CO5
COMPUTER SCIENCE AND ENGINEERING
Assessment Pattern
Mark Distribution
Total Marks CIE Marks ESE Marks ESE Duration
150 50 100 3
There will be two parts; Part A and Part B. Part A contains 10 questions with 2 questions from
each module, having 3 marks for each question. Students should answer all questions. Part B
contains 2 full questions from each module of which student should answer any one. Each
question can have maximum 2 sub-divisions and carries 14 marks.
Syllabus
Module – 1 (Introduction)
Introduction – What is Artificial Intelligence(AI) ? The Foundations of AI, History of AI,
Applications of AI. Intelligent Agents – Agents and Environments, Good behavior: The concept
of rationality, nature of Environments, Structure of Agents.
Text Book
1. Stuart Russell and Peter Norvig. Artificial Intelligence: A Modern Approach, 3rd Edition.
Prentice Hall.
References
1. Nilsson N.J., Artificial Intelligence - A New Synthesis, Harcourt Asia Pvt. Ltd.
Use the DECISION-TREE-LEARNING algorithm to learn a decision tree for these data.
Show the computations made to determine the attribute to split at each node.
2. What is multivariate linear regression? Explain.
QP CODE:
PART A
2 Describe any two ways to represent states and the transitions between them in
agent programs.
Part B
(Answer any one question from each module. Each question carries 14 Marks)
11 (a) Explain the structure Goal-based agents and Utility-based agents with the (8)
. help of diagrams.
(b) For the following activities, give a PEAS description of the task environment (6)
and characterize it in terms of the task environment properties.
a) Playing soccer
b) Bidding on an item at an auction.
OR
12 (a) Explain the structure Simple reflex agents and Model-based reflex agents (8)
. with the help of diagrams.
13 (a) Explain Best First Search algorithm. How does it implement heuristic search? (6)
.
(b) Describe any four uninformed search strategies. (8)
COMPUTER SCIENCE AND ENGINEERING
OR
15 (a) (a) Solve the following crypt arithmetic problem by hand, using the strategy (8)
. of backtracking with forward checking and the MRV and least-constraining-
value heuristics.
(b) What is local consistency in CSP constraint propagation? Explain different (6)
types local consistencies.
OR
Suppose the first player is the maximizing player. What move should be
chosen? Justify your answer.
17 (a) Convert the following sentences into first order logic: (6)
. Everyone who loves all animals is loved by someone.
Anyone who kills an animal is loved by no one.
Jack loves all animals.
Either Jack or Curiosity killed the cat, who is named Tuna.
COMPUTER SCIENCE AND ENGINEERING
(b) Give a resolution proof to answer the question “Did Curiosity kill the cat? “ (8)
OR
18 (a) Prove or find a counter example to the following assertion in propositional (6)
. logic:
If α |= (β ∧ γ) then α |= β and α |= γ.
(b) For each pair of atomic sentences, give the most general unifier if it exists: (8)
Older (Father (y), y), Older (Father (x), John).
OR
20 (a) Consider the following data set comprised of two binary input attributes (A1 (8)
. and A2) and one binary output.
Teaching Plan
No Contents No of
Lecture
Hrs (36)
Module – 1 (Introduction) (7 hrs)
1.1 Introduction, What is Artificial Intelligence(AI)? 1
1.2 The foundations of AI, The history of AI 1
1.3 Applications of AI 1
1.4 Intelligent Agents – Agents and Environments 1
1.5 Good behavior: The concept of rationality 1
1.6 The nature of Environments 1
1.7 The structure of Agents 1
Module - 2 (Problem Solving by searching) (7 hrs)
2.1 Solving Problems by searching-Problem solving Agents 1
2.2 Illustration of the problem solving process by agents 1
2.3 Searching for solutions 1
2.4 Uninformed search strategies:BFS, Uniform-cost search, DFS, Depth- 1
limited search, Iterative deepening depth-first search
2.5 Informed search strategies: Best First search 1
2.6 Informed search strategies: A* Search 1
2.7 Heuristic functions 1
Module - 3 (Problem Solving in complex environments ) (7 hrs)
3.1 Adversarial search - Games 1
3.2 Optimal decisions in games, The Minimax algorithm 1
3.3 Alpha-Beta pruning 1
3.4 Constraint Satisfaction Problems – Defining CSP 1
3.5 Constraint Propagation- inference in CSPs 1
3.6 Backtracking search for CSPs 1
3.7 The structure of problems 1
COMPUTER SCIENCE AND ENGINEERING
CATEGORY L T P CREDIT
CSL411 COMPILER LAB
PCC 0 0 3 2
Preamble: This course aims to offer students hands-on experience on compiler design
concepts. Students will be able to familiarize with tools such as LEX and YACC and
automate different phases of a compiler. This course helps the learners to enhance the
capability to design and implement a compiler.
Course Outcomes: After the completion of the course the student will be able to
CO 1 Implement lexical analyzer using the tool LEX. (Cognitive Knowledge Level:
Apply)
CO 2 Implement Syntax analyzer using the tool YACC. (Cognitive Knowledge Level:
Apply)
CO 3 Design NFA and DFA for a problem and write programs to perform operations on it.
(Cognitive Knowledge Level: Apply)
PO 1 PO 2 PO 3 PO 4 PO 5 PO 6 PO 7 PO 8 PO 9 PO 10 PO 11 PO 12
CO 1
CO 2
CO 3
CO 4
CO 5
CO 6
COMPUTER SCIENCE AND ENGINEERING
Assessment Pattern
Continuous Assessment
Bloom’s Category End Semester Examination %
Test %
Remember 20 20
Understand 20 20
Apply 60 60
Analyze
Evaluate
Create
Mark distribution
150 75 75 3 hours
Attendance : 15 marks
Continuous Evaluation in Lab : 30 marks
Continuous Assessment Test : 15 marks
Viva-voce : 15 marks
End Semester Examination Pattern: The marks will be distributed as Algorithm 30 marks,
Program 20 marks, Output 20 marks and Viva 30 marks. Total 100 marks will be converted
out of 75 for End Semester Examination.
All Students attending the Compiler Lab should have a Fair Record. The fair record should be
produced in the University Lab Examination. Every experiment conducted in the lab should
be noted in the fair record. For every experiment in the fair record the right hand page should
contain Experiment Heading, Experiment Number, Date of Experiment, Aim of Experiment,
Details of Experiment including algorithm and Result of Experiment. The left hand page
should contain a print out of the code used for the experiment and sample output obtained for
a set of input.
SYLLABUS
PRACTICE QUESTIONS
List of Exercises/Experiments:
1. Design and implement a lexical analyzer using C language to recognize all valid tokens
in the input program. The lexical analyzer should ignore redundant spaces, tabs and
newlines. It should also ignore comments.
2. Implement a Lexical Analyzer for a given program using Lex Tool.
3. Write a lex program to display the number of lines, words and characters in an input text.
4. Write a LEX Program to convert the substring abc to ABC from the given input string.
5. Write a lex program to find out total number of vowels and consonants from the given
input sting.
9. Convert the BNF rules into YACC form and write code to generate abstract
syntax tree.
10. Write a program to find ε – closure of all states of any given NFA with ε transition.
11. Write a program to convert NFA with ε transition to NFA without ε transition.
14. Write a program to find First and Follow of any given grammar.
15. Design and implement a recursive descent parser for a given grammar.
19. Implement the back end of the compiler which takes the three address code and
produces the 8086 assembly language instructions that can be assembled and run
using an 8086 assembler. The target assembly instructions can be simple move,
add, sub, jump etc.
COMPUTER SCIENCE AND ENGINEERING
CATEGORY L T P CREDIT
CSQ413 SEMINAR
PWS 0 0 3 2
Preamble: The course ‘Seminar’ is intended to enable a B.Tech graduate to read, understand,
present and prepare report about an academic document. The learner shall search in the
literature including peer reviewed journals, conference, books, project reports etc., and
identify an appropriate paper/thesis/report in her/his area of interest, in consultation with
her/his seminar guide. This course can help the learner to experience how a presentation can
be made about a selected academic document and also empower her/him to prepare a
technical report.
Course Objectives:
Course Outcomes [COs] : After successful completion of the course, the students will be able
to:
Identify academic documents from the literature which are related to her/his areas of
CO1
interest (Cognitive knowledge level: Apply).
Read and apprehend an academic document from the literature which is related to
CO2
her/ his areas of interest (Cognitive knowledge level: Analyze).
Prepare a presentation about an academic document (Cognitive knowledge
CO3
level: Create).
Give a presentation about an academic document (Cognitive knowledge level:
CO4
Apply).
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO1 2 2 1 1 2 1 3
CO2 3 3 2 3 2 1 3
CO3 3 2 3 1 2 3
CO4 3 2 1 3 3
CO5 3 3 3 3 2 2 2 3 3
COMPUTER SCIENCE AND ENGINEERING
Abstract POs defined by National Board of Accreditation
General Guidelines
The Department shall form an Internal Evaluation Committee (IEC) for the seminar
with academic coordinator for that program as the Chairperson/Chairman and seminar
coordinator & seminar guide as members. During the seminar presentation of a
student, all members of IEC shall be present.
Formation of IEC and guide allotment shall be completed within a week after the
University examination (or last working day) of the previous semester.
Guide shall provide required input to their students regarding the selection of topic/
paper.
Choosing a seminar topic: The topic for a UG seminar should be current and broad
based rather than a very specific research work. It's advisable to choose a topic for the
Seminar to be closely linked to the final year project area. Every member of the project
team could choose or be assigned Seminar topics that covers various aspects linked to
the Project area.
A topic/paper relevant to the discipline shall be selected by the student during the
semester break.
Topic/Paper shall be finalized in the first week of the semester and shall be submitted
to the IEC.
The IEC shall approve the selected topic/paper by the second week of the semester.
Accurate references from genuine peer reviewed published material to be given in the
report and to be verified.
COMPUTER SCIENCE AND ENGINEERING
Evaluation pattern
Seminar Guide: 20 marks (Background Knowledge – 10 (The guide shall give deserving
marks for a candidate based on the candidate's background knowledge about the topic
selected), Relevance of the paper/topic selected – 10).
Report: 20 marks to be awarded by the IEC (check for technical content, overall quality,
templates followed, adequacy of references etc.).
COMPUTER SCIENCE AND ENGINEERING
CATEGORY L T P CREDIT
CSD415 PROJECT PHASE I
PWS 0 0 6 2
Preamble: The course ‘Project Work’ is mainly intended to evoke the innovation and invention
skills in a student. The course will provide an opportunity to synthesize and apply the knowledge
and analytical skills learned, to be developed as a prototype or simulation. The project extends to
2 semesters and will be evaluated in the 7th and 8th semester separately, based on the achieved
objectives. One third of the project credits shall be completed in 7th semester and two third in 8th
semester. It is recommended that the projects may be finalized in the thrust areas of the respective
engineering stream or as interdisciplinary projects. Importance should be given to address societal
problems and developing indigenous technologies.
Course Objectives
To apply engineering knowledge in practical problem solving.
To foster innovation in design of products, processes or systems.
To develop creative thinking in finding viable solutions to engineering problems.
Course Outcomes [COs] :After successful completion of the course, the students will be able to:
Model and solve real world problems by applying knowledge across domains
CO1
(Cognitive knowledge level: Apply).
Develop products, processes or technologies for sustainable and socially relevant
CO2
applications (Cognitive knowledge level: Apply).
Function effectively as an individual and as a leader in diverse teams and to
CO3
comprehend and execute designated tasks (Cognitive knowledge level: Apply).
Plan and execute tasks utilizing available resources within timelines, following
CO4
ethical and professional norms (Cognitive knowledge level: Apply).
Identify technology/research gaps and propose innovative/creative solutions
CO5
(Cognitive knowledge level: Analyze).
Organize and communicate technical and scientific findings effectively in written
CO6
and oral forms (Cognitive knowledge level: Apply).
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO1 2 2 2 1 2 2 2 1 1 1 1 2
CO2 2 2 2 1 3 3 1 1 1 1
CO3 3 2 2 1
CO4 2 3 2 2 3 2
CO5 2 3 3 1 2 1
CO6 2 2 2 3 1 1
COMPUTER SCIENCE AND ENGINEERING
Abstract POs defined by National Board of Accreditation
PROJECT PHASE I
Phase 1 Target
(The evaluation committee comprises HoD or a senior faculty member, Project coordinator
and project supervisor).
COMPUTER SCIENCE AND ENGINEERING
Evaluation by the Guide
The guide/supervisor shall monitor the progress being carried out by the project groups on a
regular basis. In case it is found that progress is unsatisfactory it shall be reported to the
Department Evaluation Committee for necessary action. The presence of each student in the group
and their involvement in all stages of execution of the project shall be ensured by the guide.
Project evaluation by the guide: 30 Marks. This mark shall be awarded to the students in his/her
group by considering the following aspects:
Topic Selection: innovativeness, social relevance etc. (2)
Problem definition: Identification of the social, environmental and ethical issues of the project
problem. (2)
Purpose and need of the project: Detailed and extensive explanation of the purpose and need of
the project. (3)
Project Objectives: All objectives of the proposed work are well defined; Steps to be followed to
solve the defined problem are clearly specified. (2)
Project Scheduling & Distribution of Work among Team members: Detailed and extensive
Scheduling with timelines provided for each phase of project. Work breakdown structure well
defined. (3)
Literature survey: Outstanding investigation in all aspects. (4)
Student’s Diary/ Daily Log: The main purpose of writing daily diary is to cultivate the habit of
documenting and to encourage the students to search for details. It develops the students’ thought
process and reasoning abilities. The students should record in the daily/weekly activity diary the
day to day account of the observations, impressions, information gathered and suggestions given,
if any. It should contain the sketches & drawings related to the observations made by the students.
The daily/weekly activity diary shall be signed after every day/week by the guide. (7)
Individual Contribution: The contribution of each student at various stages. (7)
EVALUATION RUBRICS for PROJECT Phase I: Interim Evaluation
Formulation
None of the team members The students have some The students are comfortable Shows clear evidence of having a
of Design
show any evidence of knowledge on the design with design methods adopted, well- defined design methodology and
and/or
knowledge about the design procedure to be adopted, and and they have made some adherence to it. Excellent knowledge
Methodology
and and the methodology adopted the methodologies. However, the progress as per the plan. The in design procedure and its
1-c 5 till now/ to be adopted in the team has not made much methodologies are understood adaptation. Adherence to project
Progress.
(Group later stages. The team has progress in the design, and yet to a large extent. plan is commendable.
assessment) not progressed from the to catch up with the project
[CO1] previous stage of evaluation. plan.
The student show some interest The student shows very good
Individual and The student does not show interest in project, and takes up The student takes a leadership
and participates in some of the
any interest in the project tasks and attempts to complete position and supports the other
Teamwork activities. However, the activities
1-d activities, and is a passive them. Shows excellent team members and leads the project.
Leadership are mostly easy and superficial
10 member. responsibility and team skills. Shows clear evidence of leadership.
( Individual in nature.
assessment) Supports the other members
[CO3] well.
Preliminary The team has not done any The team has started doing There is some evidence to show Strong evidence for excellent
Analysis/ preliminary work with respect some preliminary work with that the team has done good progress in the project. The team
Modeling / to the analysis/modeling/ respect to the project. The amount of preliminary has completed the required
1-e
Simulation/ simulation/experiment/desig students however are not investigation and design/ preliminary work already and are
10
Experiment / n/feasibility study/ algorithm prepared enough for the work analysis/ modeling etc. poised to finish the phase I in an
Design/ development. and they need to improve a lot. They can improve further. excellent manner. They have shown
Feasibility results to prove their progress.
study
(0 – 3 Marks) (4 – 6 Marks) (7 - 9 Marks) (10 Marks)
[CO1]
The project stages are extensively
documented in the report.
Professional documentation tools
The team did not document
Some documentation is done, like LaTeX were used to document
Documentatio the work at all. The project
but not extensive. Interaction Most of the project details were the progress of the project along
n and journal/diary is not
1-f with the guide is minimal. documented well enough. with the project journal. The
presentation. 5 presented. The presentation
Presentation include some There is scope for documentation structure is well-
(Individual & was shallow in content and
points of interest, but overall improvement. The presentation planned and can easily grow into the
group dull in appearance.
quality needs to be improved. is satisfactory. Individual project report.
assessment). The individual student has no
Individual performance to be performance is good.
idea on the presentation of
improved. The presentation is done
[CO6] his/her part.
professionally and with great clarity.
The individual’s performance is
excellent.
SEMESTER VII
PROGRAM ELECTIVE II
COMPUTER SCIENCE AND ENGINEERING
YEAR OF
CATEGORY L T P CREDIT INTRODUCTION
CST413 MACHINE LEARNING
PEC 2 1 0 3 2019
Preamble: This course enables the learners to understand the advanced concepts and algorithms
in machine learning. The course covers the standard and most popular supervised learning
algorithms such as linear regression, logistic regression, decision trees, Bayesian learning and the
Naive Bayes algorithm, basic clustering algorithms and classifier performance measures. This
course helps the students to provide machine learning based solutions to real world problems.
Prerequisite: Basic understanding of probability theory, linear algebra and Python Programming
Course Outcomes: After the completion of the course the student will be able to
CO1 Illustrate Machine Learning concepts and basic parameter estimation methods.
(Cognitive Knowledge Level: Apply)
CO2 Demonstrate supervised learning concepts (regression, linear classification).
(Cognitive Knowledge Level: Apply)
CO3 Illustrate the concepts of Multilayer neural network and Support Vector Machine
(Cognitive Knowledge Level: Apply)
CO4 Describe unsupervised learning concepts and dimensionality reduction techniques.
(Cognitive Knowledge Level: Apply)
CO5 Solve real life problems using appropriate machine learning models and evaluate the
performance measures (Cognitive Knowledge Level: Apply)
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO1
CO2
CO3
CO4
CO5
COMPUTER SCIENCE AND ENGINEERING
Conduct investigations of
PO4 complex problems PO10 Communication
Assessment Pattern
Remember 30 30 30
Understand 30 30 30
Apply 40 40 40
Analyze
Evaluate
Create
Mark Distribution
150 50 100 3
COMPUTER SCIENCE AND ENGINEERING
Syllabus
Module-1 (Overview of machine learning)
Machine learning paradigms-supervised, semi-supervised, unsupervised, reinforcement learning.
Basics of parameter estimation - maximum likelihood estimation(MLE) and maximum a posteriori
estimation(MAP). Introduction to Bayesian formulation.
Module-2 (Supervised Learning)
Regression - Linear regression with one variable, Linear regression with multiple variables,
solution using gradient descent algorithm and matrix method, basic idea of overfitting in
regression. Linear Methods for Classification- Logistic regression, Naive Bayes, Decision tree
algorithm ID3.
Module-3 (Neural Networks (NN) and Support Vector Machines (SVM))
Perceptron, Neural Network - Multilayer feed forward network, Activation functions (Sigmoid,
ReLU, Tanh), Backpropagation algorithm.
COMPUTER SCIENCE AND ENGINEERING
Reference Books
1. Christopher Bishop. Neural Networks for Pattern Recognition,Oxford University Press,
1995.
2. Kevin P. Murphy. Machine Learning: A Probabilistic Perspective, MIT Press 2012.
3. Trevor Hastie, Robert Tibshirani, Jerome Friedman, The Elements Of Statistical Learning,
Second edition Springer 2007.
4. P. Langley, Elements of Machine Learning, Morgan Kaufmann, 1995.
5. Richert and Coelho, Building Machine Learning Systems with Python.
6. Davy Cielen, Arno DB Meysman and Mohamed Ali.Introducing Data Science: Big Data,
Machine Learning, and More, Using Python Tools, Dreamtech Press 2016.
COMPUTER SCIENCE AND ENGINEERING
2. Suppose you have a three class problem where class label y ∈ 0, 1, 2 and each
training example X has 3 binary attributes X1, X2, X3 ∈ 0, 1. How many parameters
3. Describe how Support Vector Machines can be extended to make use of kernels.
Illustrate with reference to the Gaussian kernel K(x, y) = e−z, where z = (x−y)2 .
4. Briefly explain one way in which using tanh instead of logistic activations makes
optimization easier.
5. ReLU activation functions are most used in neural networks instead of the tanh
activation function. Draw both activation functions and give a) an advantage of the
ReLU function compared to the tanh function. b) a disadvantage of the ReLU
function compared to the tanh function.
Assume that k = 3 and that initially the points are assigned to clusters as follows:
C1 = {x1, x2, x3}, C2 = {x4, x5, x6}, C3 = {x7, x8}. Apply the k-means algorithm until
convergence, using the Manhattan distance.
4. Cluster the following eight points representing locations into three clusters: A1(2, 10),
A2(2, 5), A3(8, 4), A4(5, 8), A5(7, 5), A6(6, 4), A7(1, 2), A8(4, 9).
Initial cluster centers are: A1(2, 10), A4(5, 8) and A7(1, 2).
The distance function between two points a = (x1, y1) and b = (x2, y2) is defined as D(a, b)
= |x2 – x1| + |y2 – y1|
Use k-Means Algorithm to find the three cluster centers after the second iteration.
COMPUTER SCIENCE AND ENGINEERING
QP CODE:
PART A
5. Suppose that you have a linear support vector machine(SVM) binary classifier.
Consider a point that is currently classified correctly, and is far away from the
decision boundary. If you remove the point from the training set, and re-train the
classifier, will the decision boundary change or stay the same? Justify your answer.
6. Mention the primary motivation for using the kernel trick in machine learning
algorithms?
9. Classifier A attains 100% accuracy on the training set and 70% accuracy on the
test set. Classifier B attains 70% accuracy on the training set and 75% accuracy on
the test set. Which one is a better classifier. Justify your answer.
10. How does bias and variance trade-off affect machine learning algorithms?
(10x3=30)
Part B
(Answer any one question from each module. Each question carries 14 Marks)
11. (a) Suppose that X is a discrete random variable with the following probability (7)
mass function: where 0 ≤ θ ≤ 1 is a parameter. The following 10 independent
observations
(b) Suppose you have a three class problem where class label y ∈ 0, 1, 2 (7)
OR
12. (a) Consider the geometric distribution, which has p.m.f P(X = k) = (1 −θ)k−1θ. (7)
Assume that n i.i.d data are drawn from that distribution.
i. Write an expression for the log-likelihood of the data as a function of the
parameter θ.
ii. Find the maximum likelihood estimate for θ?
ii. Let θ has a beta prior distribution. What is the posterior distribution of θ?
(b) Find the maximum a posteriori (MAP) estimator for the mean of a univariate (7)
normal distribution. Assume that we have N samples, x1,..., xN independently
drawn from a normal distribution with known variance σ2 and unknown mean
µ and the prior distribution for the mean is itself a normal distribution with
mean ν and variance β2.
13. (a) Consider the hypothesis for the linear regression hθ(x) = θ0 + θ1x, and the cost (7)
function J( θ0, θ1) = 1/2m Σ1m( hθ(x(i)) – y(i))2where m is the number of training
examples. Given the following set of training examples.
(c) Explain the significance of regularization. How do Ridge differs from Lasso (4)
regularization?
OR
14. (a) The following dataset can be used to train a classifier that determines whether (7)
a given person is likely to own a car or not. There are three features: education
level (primary, secondary, or university); residence (city or country); gender
(female, male).
Use ID3 Algorithm and find the best attribute at the root level of the tree
(b) Consider a linear regression problem y = w1x + w0, with a training set having (7)
m examples (x1, y1), . . .(xm, ym). Suppose that we wish to minimize the mean
5th degree error (loss function) given by 1/m Σ1m(yi −w1xi − w0)5.
1. Calculate the gradient with respect to the parameter w1.
2. Write down pseudo-code for on-line gradient descent on w1.
3. Give one reason in favor of on-line gradient descent compared to batch-
gradient descent, and one reason in favor of batch over on-line.
COMPUTER SCIENCE AND ENGINEERING
15. (a) Consider a support vector machine whose input space is 2-D, and the inner (8)
products are computed by means of the kernel K(x, y) = (x.y + 1)2-1, where
x.y denotes the ordinary inner product. Show that the mapping to feature
space that is implicitly defined by this kernel is the mapping to 5-D given by
(b) Consider a neuron with four inputs, and weight of edge connecting the inputs (3)
are 1, 2, 3 and 4. Let the bias of the node is zero and inputs are 2, 3, 1, 4. If
the activation function is linear f(x)=2x, compute the output of the neuron.
OR
16. (a) State the mathematical formulation to express Soft Margin as a constraint (10)
optimization problem.
17. (a) Suppose that we have the following data (one variable). Use single linkage (8)
Agglomerative clustering to identify the clusters.
Data: (2, 5, 9, 15, 16, 18, 25, 33, 33, 45).
(b) Given two objects represented by the tuples (22, 1, 42, 10) and (20, 0, 36, 8): (6)
(i) Compute the Euclidean distance between the two objects.
(ii) Compute the Manhattan distance between the two objects.
(iii) Compute the Minkowski distance between the two objects, using p = 3
OR
19. (a) Suppose the dataset had 9700 cancer-free images from 10000 images from (7)
cancer patients. Find precision, recall and accuracy ? Is it a good classifier?
Justify.
Actual cancer = yes cancer = no Total
Class\Predicted
class
cancer = yes 90 210 300
cancer = no 140 9560 9700
Total 230 9770 10000
(b) What is Principal Component Analysis (PCA)? Which eigen value indicates (7)
the direction of largest variance?
OR
20. (a) Assume you have a model with a high bias and a low variance. What (6)
are the characteristics of such a model?
(b) What are ROC space and ROC curve in machine learning? In ROC space, (8 )
which points correspond to perfect prediction, always positive prediction and
always negative prediction? Why?
COMPUTER SCIENCE AND ENGINEERING
Teaching Plan
No. of
Lecture
No Contents Hours
(37 hrs)
Module -1 (Overview of machine learning) (7 hours)
1.1 Supervised, semi-supervised, unsupervised learning, reinforcement learning 1 hour
(Text Book (TB) 1: Chapter 1)
1.2 Maximum likelihood estimation(MLE) (TB 1: Section 4.2) 1 hour
1.3 Maximum likelihood estimation (MLE)- example (TB 1: Section 4.2) 1 hour
1.4 Maximum a posteriori estimation(MAP) (TB 4: Section 6.2) 1 hour
1.5 Maximum a posteriori estimation(MAP)-example (TB 4: Section 6.2) 1 hour
1.6 Bayesian formulation (TB 1: Section 14.1, 14.2) 1 hour
1.7 Bayesian formulation -example (TB 1: Section 14.1, 14.2) 1 hour
Module-2 (Supervised Learning) (7 hours)
2.1 Linear regression with one variable (TB 1: Section 2.6) 1 hour
2.2 Multiple variables, Solution using gradient descent algorithm and matrix 1 hour
method (No derivation required) (TB 1: Section 5.8)
2.3 Overfitting in regression, Lasso and Ridge regularization 1 hour
2.4 Logistic regression 1 hour
2.5 Naive Bayes (TB 2: Section 18.2) 1 hour
2.6 Decision trees (TB 2: Chapter 19) 1 hour
2.7 Decision trees- ID3 algorithm (TB 2: Chapter 19) 1 hour
Module-3 (Neural Networks and Support Vector Machines) (9 hours)
3.1 Perceptron, Perceptron Learning 1 hour
3.2 Multilayer Feed forward Network, Activation Functions (Sigmoid, ReLU, 1 hour
Tanh)
3.3 Back Propagation Algorithm 1 hour
3.4 Illustrative Example for Back Propagation 1 hour
3.5 Introduction, Maximum Margin Hyperplane, 1 hour
3.6 Mathematics behind Maximum Margin Classification 1 hour
3.7 Formulation of maximum margin hyperplane and solution 1 hour
COMPUTER SCIENCE AND ENGINEERING
3.9 Non-linear SVM , Kernels for learning non-linear functions, Examples - 1 hour
Linear, RBF, Polynomial
Module-4 (Unsupervised Learning) (7 hours)
5.6 Face detection (TB 3: Chapter 5 Section Application: A Face Detection 1 hour
Pipeline)
5.7 Face detection (TB 3: Chapter 5 Section Application: A Face Detection 1 hour
Pipeline)
COMPUTER SCIENCE AND ENGINEERING
YEAR OF
CATEGORY L T P CREDIT INTRODUCTION
CST423 CLOUD COMPUTING
PEC 2 1 0 3 2019
Preamble: This course helps the learners to understand cloud computing concepts. This course
includes basic understanding of virtualization, fundamentals of cloud security, cloud computing
based programming techniques and different industry popular cloud computing platforms. This
course enables the student to suggest cloud based solutions to real world problems.
Course Outcomes: After the completion of the course the student will be able to
Explain the various cloud computing models and services. (Cognitive Knowledge
CO1
Level: Understand)
Explain different cloud enabling technologies and compare private cloud platforms
CO3
(Cognitive Knowledge Level: Understand)
Apply appropriate cloud programming methods to solve big data problems. (Cognitive
CO4
Knowledge Level: Apply)
Describe the need for security mechanisms in cloud (Cognitive Knowledge Level:
CO5
Understand)
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO1
CO2
CO3
CO4
CO5
CO6
Assessment Pattern
Remember 30 30 30
Understand 40 40 40
Apply 30 30 30
Analyze
Evaluate
Create
Mark Distribution
Attendance : 10 marks
First Internal Examination shall be preferably conducted after completing the first half of the
syllabus and the Second Internal Examination shall be preferably conducted after completing the
remaining part of the syllabus.
There will be two parts: Part A and Part B. Part A contains 5 questions (preferably, 2 questions
each from the completed modules and 1 question from the partly covered module), having 3
marks for each question adding up to 15 marks for part A. Students should answer all questions
from Part A. Part B contains 7 questions (preferably, 3 questions each from the completed
modules and 1 question from the partly covered module), each with 7 marks. Out of the 7
questions in Part B, a student should answer any 5.
End Semester Examination Pattern:
There will be two parts; Part A and Part B. Part A contains 10 questions with 2 questions from
each module, having 3 marks for each question. Students should answer all questions. Part B
contains 2 questions from each module of which a student should answer any one. Each question
can have a maximum of 2 subdivisions and carries 14 marks.
Syllabus
Broadband networks and internet architecture- Internet Service Providers (ISPs), Data center
technology, Web technology, Multitenant technology, Service technology. Resource
provisioning techniques-static and dynamic provisioning.
Open-source software platforms for private cloud-OpenStack, CloudStack, Basics of Eucalyptus,
Open Nebula, Nimbus.
Cloud Programming- Parallel Computing and Programming Paradigms. Map Reduce – Hadoop
Library from Apache, HDFS, Pig Latin High Level Languages, Apache Spark.
Basic terms and concepts in security- Threat agents, Cloud security threats/risks, Trust.
Operating system security-Virtual machine security- Security of virtualization- Security Risks
Posed by Shared Images, Security Risks Posed by Management OS. Infrastructure security-
Network Level Security, Host Level Security, Application level security, Security of the Physical
Systems. Identity & Access Management- Access Control.
Text Books
1. Thomas, E., Zaigham M., Ricardo P "Cloud Computing Concepts, Technology &
Architecture.", (2013 Edition). Prentice Hall.
2. Buyya, R., Vecchiola, C., & Selvi, S. T. “Mastering cloud computing: foundations and
applications programming”, (2017 Edition), Morgan Kaufmann.
3. Bhowmik, S., “Cloud computing”, (2017 Edition). Cambridge University Press.
COMPUTER SCIENCE AND ENGINEERING
References
1. Marinescu, D. C., “Cloud computing: theory and practice.”, (2017 Edition). Morgan
Kaufmann.
2. Buyya, R., Broberg, J., & Goscinski, A. M., “Cloud computing: Principles and paradigms”
(2011 Edition). John Wiley & Sons.
(10 x3 =30)
PART B
Answer any one Question from each Module. Each question carries 14 Marks
11. (a) Discuss the cloud computing reference model. (8)
(b) Which are the basic components of an IaaS-based solution for cloud (6)
computing? Also provide some examples of IaaS implementations.
OR
12. (a) List down the characteristics and challenges of cloud computing. (6)
(b) Classify the various types of clouds. (8)
15. (a) Explain the broadband networks and internet architecture. (8)
(b) List and explain the technologies and components of data centers. (6)
OR
16. (a) What are the major functions of the MapReduce framework? Explain the (8)
logical data flow of MapReduce function using a suitable example .
(b) Write a Hadoop MapReduce program that counts the number of (6)
occurrences of each word in a file.
17. (a) Explain common threats and vulnerabilities in cloud-based environments (8)
with suitable examples.
(b) Discuss the security risks posed by shared images with suitable examples. (6)
COMPUTER SCIENCE AND ENGINEERING
OR
18. (a) Explain the operating system security in cloud computing. (8)
(b) What do you mean by threat agents?. Explain different types of threat (6)
agents.
19. (a) Describe Amazon EC2 and its basic features. (8)
(b) Illustrate the architecture of Amazon S3. (6)
OR
20. (a) Describe the core components of Google AppEngine. (8)
(b) Explain the architecture of Windows Azure. (6)
Teaching Plan
No Contents No. of
Lecture
Hours
(37 hrs)
1.6 Cloud deployment models: Public cloud, Community cloud, Private cloud, 1
Hybrid cloud.
COMPUTER SCIENCE AND ENGINEERING
2.2 Types of VMs: process VM v/s system VM, Emulation, interpretation and 1
binary translation.
3.1 Broadband networks and internet architecture: Internet Service Providers (ISPs), 1
Data center technology, Web technology, Multitenant technology, Service
technology.
4.5 Security Risks posed by Shared Images, Security Risks posed by Management 1
OS.
5.4 Google Cloud Platform:- IaaS Offerings: Compute Engine (GCE), Cloud 1
Storage.
5.5 PaaS Offerings: Google App Engine (GAE), Storage services, Application 1
services, Compute services.
YEAR OF
SECURITY IN CATEGORY L T P CREDIT INTRODUCTION
CST433
COMPUTING
PEC 2 1 0 3 2019
Preamble: This course helps the learners to explore various algorithms to offer confidentiality,
integrity, authentication &non-repudiation services and different attacks on system security with
their countermeasures. It covers classical encryption techniques, symmetric and public key
crypto-system, key distribution techniques, authentication functions, intruders, malicious
software, and DDoS attacks. The concepts covered in this course enable the learners in effective
use of cryptographic algorithms and appropriate countermeasures for securing real life
applications.
Course Outcomes: After the completion of the course, the student will be able to
CO1 Identify the security services provided against different types of security
attacks. (Cognitive Knowledge Level: Understand)
CO2 Illustrate classical encryption techniques for information hiding. (Cognitive
Knowledge Level: Apply)
CO3 Illustrate symmetric/asymmetric key cryptosystems for secure
communication. (Cognitive Knowledge Level: Apply)
CO4 Explain message integrity and authentication methods in a secure
communication scenario. (Cognitive Knowledge Level: Understand)
CO5 Interpret public/secret key distribution techniques for secure communication.
(Cognitive Knowledge Level: Understand)
CO6 Identify the effects of intruders, malicious software and distributed denial of
service attacks on system security. (Cognitive Knowledge Level:
Understand)
COMPUTER SCIENCE AND ENGINEERING
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO1
CO2
CO3
CO4
CO5
CO6
Assessment Pattern
End Semester
Bloom’s Category Test 1 (%) Test 2 (%)
Examination (%)
Remember 30 30 30
Understand 40 40 40
COMPUTER SCIENCE AND ENGINEERING
Apply 30 30 30
Analyse
Evaluate
Create
Mark Distribution
Total Marks CIE Marks ESE Marks ESE Duration
150 50 100 3
Attendance : 10 marks
Continuous Assessment Test : 25 marks
Continuous Assessment Assignment : 15 marks
Each of the two internal examinations has to be conducted out of 50 marks. First series test
shall be preferably conducted after completing the first half of the syllabus and the second
series test shall be preferably conducted after completing remaining part of the syllabus. There
will be two parts: Part A and Part B. Part A contains 5 questions (preferably, 2 questions each
from the completed modules and 1 question from the partly completed module), having 3
marks for each question adding up to 15 marks for part A. Students should answer all
questions from Part A. Part B contains 7 questions (preferably, 3 questions each from the
completed modules and 1 question from the partly completed module), each with 7 marks. Out
of the 7 questions, a student should answer any 5.
There will be two parts; Part A and Part B. Part A contains 10 questions with 2 questions from
each module, having 3 marks for each question. Students should answer all questions. Part B
contains 2 questions from each module of which a student should answer any one. Each
question can have maximum 2 sub-divisions and carries 14 marks.
COMPUTER SCIENCE AND ENGINEERING
Syllabus
Text Books
1. William Stallings, Cryptography and Network Security Principles and Practice, 4/e,
Pearson Ed.
2. Behrouz A Forouzan, Cryptography and Network Security, 3/e, Tata McGraw-Hill.
COMPUTER SCIENCE AND ENGINEERING
References
1. Charles P Pfleeger, Shari Lawrence Pfleeger, Jonathan Margulies, Security in Computing,
5/e, Prentice Hall.
2. G.A. Jones & J.M. Jones, Elementary Number Theory, Springer UTM, 2007.
1. Define the type of security attack in the following case: A student breaks into a
teacher’s office to obtain a copy of the next day’s exam question paper.
2. Which security mechanism is provided in the following case: A bank requires the
customer’s signature for a withdrawal.
1. Alice wishes to send the message “COME BACK EARLY” to Bob, using Playfair
cipher. The key to be used is “SAFFRON”. Show the process of encryption.
2. Using Affine cipher, encrypt “HOT” and decrypt “JDG”. Key is (7, 3).
3. Implement the Vigenere cipher method in a suitable programming language.
(Assignment)
1. If the DES key with parity bit is 0123 ABCD 2562 1456, find the first round key.
2. In RSA, given p=19, q=23, public key(e)=3, find n, ɸ(n) and private key(d).
3. Implement any two symmetric/asymmetric encryption techniques in a suitable
programming language. (Assignment)
1. List any two ways in which secret keys can be distributed to two communicating
parties.
2. Explain the significance of a public-key authority in the distribution of public keys.
1. What are false positives and negatives in the context of Intrusion Detection Systems?
How can we reduce these two?
2. Distinguish between a direct DDoS attack and a reflector DDoS attack.
3. Bob works as a network administrator in ABC & Co. On a day of his absence, he
shared his admin password with one of his colleagues, John, to manage a network
issue. Later John started misusing this privilege by launching DoS attacks in the
network. Describe the ethical issues in this scenario and how can this be avoided?
(Assignment)
Reg No:_______________
Name:_________________
2. Use an Affine cipher to encrypt the message “SECURITY” with the key pair(7,2)
in modulus 26.
Part B
(Answer any one question from each module. Each question carries 14
Marks)
11. (a) Illustrate the two approaches to attack a conventional encryption scheme. (4)
OR
12. (a) Encrypt the text “this is an exercise and complete it” using transposition
cipher with the key (3,2,1,4,5). Show decryption of the ciphertext to recover (6)
the original text back.
(b) Encrypt the message “the house is being sold tonight”using the following (8)
ciphers. Ignore the space between words.
i) Vigenere cipher with key = “largest”.
ii) Autokey system of Vigenere cipher with key =“largest”.
OR
COMPUTER SCIENCE AND ENGINEERING
15. (a) Compare the Cipher Block Chaining Mode (CBC) and Cipher Feedback (6)
Mode (CFB) of block ciphers.
(b) Explain RSA cryptosystem. In an RSA cryptosystem a participant A uses two (8)
prime numbers p=13 and q=17 to generate public key and private key. The
public key of A is 35. Find the private key of A.
OR
16. (a) Illustrate ElGamal cryptosystem. (6)
(b) Consider a Diffie–Hellman scheme with a common prime q=11 and a (8)
primitive root α=2.
i) Show that 2 is a primitive root of 11.
ii) If User A has public key YA= 9, what is A’s private key XA?
iii) If User A has public key YB= 3, what is the shared secret key K,
shared with A?
17. (a) Describe different types of arbitrated digital signature techniques. (6)
OR
19. (a) Explain four techniques used to avoid guessable passwords. (6)
(b) Describe the different techniques for public key distribution. (8)
OR
20. (a) Explain different types of Simple DDoS attack and its countermeasures. (6)
(b) Differentiate between statistical anomaly detection and rule-based intrusion (8)
detection.
COMPUTER SCIENCE AND ENGINEERING
Teaching Plan
No.of
No Contents Lecture
Hours
(35Hrs)
Preamble: The objective of the course is to familiarize learners about the concepts and advantages
of using model based software development. This course covers the methodologies in developing
the model of a software, perform analysis on the model and automatic generation of code from the
model. The OSATE framework and its plugins using the Architecture Analysis and Design
Language(AADL) language is used in the course to demonstrate the end-to-end concept of MBSD
which helps the learners to get a hands on experience.
Course Outcomes: After the completion of the course the student will be able to
CO1 Explain the relevance of model based software development in the software
development process. (Cognitive Knowledge level: Understand)
CO2 Explain Model Driven Architecture with Computation Independent Model (CIM),
Platform Independent Model(PIM), Platform Specific Model (PSM). (Cognitive
Knowledge level: Apply)
CO3 Illustrate software modeling with Architecture Analysis and Design Language
(AADL). (Cognitive Knowledge level: Apply)
CO4 Explain error annex using error modelling concepts and illustrate error modelling
in AADL. (Cognitive Knowledge level: Understand)
CO5 Illustrate the process of code generation from an AADL model. (Cognitive
Knowledge level: Understand)
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO1 PO11 PO1
0 2
CO1
CO2
CO3
CO4
CO5
COMPUTER SCIENCE AND ENGINEERING
Assessment Pattern
Test 1 (Marks in Test 2 (Marks End Semester
Bloom’s Category
percentage) in percentage) Examination Marks
Remember 30 30 30
Understand 50 50 50
Apply 20 20 20
Analyse
Evaluate
Create
Mark Distribution
question adding up to 15 marks for part A. Students should answer all questions from Part A. Part B
contains 7 questions (preferably, 3 questions each from the completed modules and 1 question from
the partly completed module), each with 7 marks. Out of the 7 questions, a student should answer
any 5.
Syllabus
Module - 1 (Introduction to Model Based Software Development)
Software faults, Introduction to Model checking, Introduction to Automated Testing, Model Based
Software Development (MBSD) – Need, MBSD Approach, Learning MBSD from the perspective
of Architecture Analysis and Design Language (AADL).
Modeling: Developing a Simple Model - Define the components - Explain with example
(powerboat autopilot system), Develop a top-level model - Use example Powerboat Autopilot
(PBA) system.
Safety Analysis -Fault tree analysis, Minimal cutsets. Error Modeling in AADL-Error Model
Libraries and Subclause Annotations, Error Types and Common Type Ontology, Error Sources and
Their Impact, Component Error Behavior, Compositional Abstraction of Error Behavior, Use of
Properties in Architecture Fault Models, Error modeling example.
COMPUTER SCIENCE AND ENGINEERING
Need for code generation, Categorization, Code Generation Techniques, Code Generation in AADL
Model – Ocarina.
Text Books
References:
2. Assume we have a system to regulate the fuel valve of a boiler by monitoring the steam flow
and steam pressure. Identify the basic components of this system and design its AADL
model.
1. Suppose we have an isolette system which ensures the temperature is within a specified
temperature range with following components:
iv) operator interface - specify target temperature range(lower desired temperature, upper
desired temperature.)
iv) thermostat - takes as input an air temperature value from a temperature sensor and
controls a heat source to produce an air temperature within a target range.
Model the error flows, error propagations, component error behaviour and error properties
for the value error in the isolette system.
QP CODE:
PART A
COMPUTER SCIENCE AND ENGINEERING
2. Specify the steps and their purpose in the model checking process.
3. Compare Analysis And Design Language (AADL) with Unified modeling language
(UML).
4. Describe the design phase in the model based software development process.
5. Represent interface component with an out data port and an out event port in
AADL.
a) textual b)graphical
6. Give the textual top level model of a powerboat autopilot system in AADL.
7. What is an error type? Mention any two pre-declared timing and value errors in
AADL.
10. How does automated code generation help to deal with faults in a software system?
(10x3=30)
Part B
(Answer any one question from each module. Each question carries 14 Marks)
OR
12. (a) What are software faults? Mention any three software faults and its (5)
consequences.
OR
OR
(2)
(b) Design an AADL model which controls the speed of a vehicle. Also describe (10)
the basic components of the designed model.
17. (a) Illustrate how value error can be modelled using AADL in the isolette system. (10)
(b) With a diagram explain error propagation, termination and transformation in (4)
AADL models.
OR
18. (a) Illustrate error state machines in AADL using proper textual representations. (8)
(b) Suppose we have a train door controller system with following components (6)
i) door_controller - ensures safe opening of the door.
ii) train_controller - sends train speed and transit status to the
door_controller.
iii) alarm - triggered when an emergency occurs in other components.
Model the error flows, error propagations, component error behaviour and
error properties for the value error in the component door_controller.
19. (a) Explain templates and meta model type code generation? (4)
(b) Illustrate how the code can be generated from an AADL model. (10)
COMPUTER SCIENCE AND ENGINEERING
OR
Teaching Plan
Sl Contents Number of
No Lecture
Hours (35)
4.3 Error modeling with AADL - Error Model Libraries and Subclause 1
Annotations
4.4 Error modeling with AADL - Error Types and Common Type Ontology, 1
4.5 Error modeling with AADL - Error Sources and Their Impact, Component 1
Error Behavior
5.2 Categorization 1
YEAR OF
CATEGORY L T P CREDIT INTRODUCTION
CST463 WEB PROGRAMMING
PEC 2 1 0 3 2019
Preamble: This course helps the learners to understand the web programming concepts. It
includes the essential frontend and backend technologies needed for the development of web
applications. The learners will have an opportunity to gain necessary web development skills such
as HTML, CSS, JavaScript, PHP, MySQL integration, JSON and Laravel framework.
Prerequisite: Knowledge of Programming is required.
Course Outcomes: After the completion of the course the student will be able to
CO1 Use HyperText Markup Language (HTML) for authoring web pages and understand
the fundamentals of WWW. (Cognitive Knowledge Level: Understand)
CO2 Construct and visually format responsive, interactive web pages using CSS and
JavaScript (JS) (Cognitive Knowledge Level: Apply)
CO3 Construct websites using advanced sever side programming tool PHP (Cognitive
Knowledge Level: Apply)
CO4 Develop dynamic web applications using PHP and perform MySQL database
operations. (Cognitive Knowledge Level: Apply)
CO5 Explain the importance of object exchange formats using JSON and the MVC based
web application development frameworks (Laravel) (Cognitive Knowledge Level:
Understand)
PO PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
1
CO1
CO2
CO3
CO4
COMPUTER SCIENCE AND ENGINEERING
CO5
Assessment Pattern
Remember 20 20 20
Understand 40 40 40
Apply 40 40 40
Analyze
Evaluate
Create
Mark Distribution
150 50 100 3
COMPUTER SCIENCE AND ENGINEERING
Syllabus
Module – 1 (WWW, HTML)
Introduction to the Internet & WWW: Evolution of Internet & World Wide Web- Web Basics,
URI’s & URL-MIME.
Backgrounds-List Styles-Element Dimensions- Table Layouts-Box Model and Text Flow-div and
span -Basics of Responsive CSS, Media port & Media Queries.
PHP Language Structure: Introduction- Building blocks of PHP-Variables, Data Types -simple
PHP program-Converting between Data Types- Operators and Expressions -Flow Control
functions - Control statements- Working with Functions- Initialising and Manipulating Arrays--
Objects- String Comparisons-String processing with Regular Expression
Advanced PHP: Form processing and Business Logic-Cookies- Sessions & MySQL Integration-
Connecting to MySQL with PHP- Performing CREATE, DELETE, INSERT, SELECT and
UPDATE operations on MySQL table -Working with MySQL data-Reading from Database-
Dynamic Content.
JSON Data Interchange Format: Syntax, Data Types, Object, JSON Schema, Manipulating
JSON data with PHP
Text Books
1 Paul J. Deitel, Harvey M. Deitel, Abbey Deitel, Internet & World Wide Web
How to Program 5th Edition [Module 1,2,3,4]
2. Lindsay Bassett, Introduction to JavaScript Object Notation: A To-the-Point Guide to JSON
1st Edition, O’Reilly [Module 5]
3. Julie C. Meloni, Pearson -PHP, MySQL & JavaScript All in One, Sams Teach Yourself,5th Ed
[Module 4]
4. Matt Stauffer,” LARAVEL up and Running, A framework for building modern PHP apps”1st
Edition, O’REILLY [Module 5]
COMPUTER SCIENCE AND ENGINEERING
Reference Books
1. Robert W Sebesta, Programming the World Wide Web, 7/e, Pearson Education Inc,8th Edition
2. Larry Ullman, Pearson- PHP 6 and MySQL 5 for Dynamic Web Sites: Visual QuickPro Guide
3. Eric van der Vlist, Danny Ayers, Erik Bruchez, Joe Fawcett, Alessandro Vernet",Wrox-
Professional Web 2.0 Programming, Wiley-India edition
4. Web Technologies Black Book 2018(As per Mumbai University Syllabus) HTML, CSS3,
JavaScript, iQuery, AJAX,PHP,XML,MVC and Laravel DT Editorial Services (ISBN:
9789386052490)
QP CODE:
PART A
1. Define WWW. List any two examples of web server & web browser. Differentiate
between URL and a domain?
2. Write the syntax of the URL? Rewrite the default URL of your university website
by adding a subdomain named ‘Research’ and a web page named ‘FAQ.html’.
Also link this URL through the logo of ‘kturesearch.png’ placed in a web page.
The FAQ page should be opened in a new window.
4. What are different ways of adjusting spacing in a text with suitable example.
5. Discuss the various CSS style sheet levels with suitable examples. How are
conflicts resolved when multiple style rules apply to a single web page element?
6. Describe how input from an HTML form is retrieved in a PHP program, with an
example
8. Discuss the various steps for establishing PHP-MySQL connection with a MySQL
COMPUTER SCIENCE AND ENGINEERING
database ?
Part B
(Answer any one question from each module. Each question carries 14 Marks)
11. (a) Design a webpage that displays the following table. (6)
(b) What is the difference between radio buttons and checkboxes when (8)
implemented using HTML? Write HTML code to implement a form which
has the following elements:
i. A textbox which can accept a maximum of 25 characters
ii. Three radio buttons with valid Label, Names and values
iii. Three check boxes buttons with valid Label, Names and values
iv. A selection list containing four items, two which are always visible
v. A submit button clicking on which will prompt the browser to send the
form data to the server “http://www..mysite.com/reg.php” using “POST”
method and reset button to clear its contents. You can use any text of
your choice to label the form elements.
OR
12. (a) Write the equivalent HTML code to implement the following in a web page: (6)
(i) An image titled “birds.jpg” with a height of 100 pixels and width of 200
pixels. If the image cannot be accessed, a message “No image available”
should be displayed (ii) A hyperlink to the URL
“www.mysite.com/birds.jpg”. The hyperlink should have the label “Click
Here”.
(b) Create a static HTML document for your portfolio, which includes the (8)
following contents: your name, address, Mobile Number and email address.
Also add the details about your college, university, your major and the batch
COMPUTER SCIENCE AND ENGINEERING
13. (a) Illustrate the usage of JavaScript DOM in event handling and explain any (8)
three methods with example.
(b) Write CSS and the corresponding HTML code for the following: (6)
i. Set the background color for the hover and active link states to "green"
ii. Set the list style for unordered lists to "square".
iii. Set "Flower.png" as the background image of the page and set 3%
margin for the pages
iv. Set dashed border for left and right and double border for top & bottom
of a table with 2 rows.
OR
14. (a) List the order of precedence of style levels. Organize a sample web page for (6)
providing ‘KTU BTech Honours Regulation 19’ for KTU and use embedded
Style sheet to apply minimum 5 styles for list, tables and pages.
(b) Illustrate the different ways of Array declaration in JavaScript. Describe the (8)
function of the following JavaScript Array object methods with examples.
(i) join (ii) slice
15. (a) Explain any six string handling functions used in PHP with example. (6)
(b) How does a PHP array differ from an array in C? List the different ways to (8)
create an array in PHP with an example. Explain any 4 functions that deals
with PHP array.
OR
16. (a) During the process of fetching a web page from a web server to a client (6)
browser, at what point does an embedded PHP script get executed. What are
the two modes that the PHP processor operates in? Explain
17. (a) Write equivalent PHP statements corresponding to the following: (8)
i. Declare an associative array named “ages” to store the key-value pairs
(“Alice”, 30), (“Bob”, 30), (“Harry”, 35), (“Mary”, 32).
ii. Modify the value associated with the key “Mary” to 28.
iii. Sort the array according to values maintaining the key-value
relationships and print the sorted key-value pairs.
iv. The entry identified by the key “Bob”
(b) What are the uses of cookies in web pages? Describe syntax for setting (6)
cookies in PHP. How can you access and delete the cookie using setcookie()
function?
OR
18. (a) Write a PHP form handling program to perform the user registration of any (8)
website with a minimum of 5 different fields and insert the data into a
MySQL table after establishing necessary connections with the DB,
(b) Design the HTML page which enters a given number and embed the PHP (6)
code to display a message indicating, whether the number is odd or even,
when clicking on the ‘CHECK NUMBER’ button.
19. (a) With a neat diagram, explain about Laravel MVC Framework. (6)
OR
20. (a) Enumerate the data types in JSON. Illustrate the document definition of a (8)
‘Student document ‘using JSON Schema.
Teaching Plan
No of
Lecture
No Contents
Hrs (35
hrs)
Module 1 (7 hours)
1.1 Evolution of Internet &World Wide Web- Web Basics URI’s & URL -MIME 1
[Book 1 - Chapter 1]
Introduction to HTML5
1.4 Special Characters & Horizontal Rules- meta Elements- div and span 1
[Book 1 - Chapter 2]
1.6 HTML5 Form input types, input and data list Elements and autocomplete 1
attributes-Page Structure Elements [Book 1 - Chapter 3]
2.5 Box Model and Text Flow, Basics of Responsive CSS-Media port & Media 1
Queries [Book 1 - Chapter 4]
Introduction to JavaScript
2.10 Document Object Model (DOM)- Form processing [Book 1 - Chapter 12,13] 1
Module 3 (6 hours)
Introduction to PHP
3.1 Building blocks of PHP-Variables, Data Types simple PHP program [Book 3- 1
Chapters 4]
3.2 Converting between Data Types, Operators and Expressions -Flow Control 1
functions [Book 1- Chapters 19]
3.5 Working with Strings-String processing with Regular expression, Pattern Matching 1
[Book 1- Chapters 19]
Module 4 (6 hours)
PHP -MYSQL
4.4 Performing CREATE, DELETE, INSERT operations on MySQL table from PHP 1
Program. [Book 4- Chapters 16]
4.5 Performing SELECT and UPDATE operations on MySQL table from PHP 1
Program. [Book 4- Chapters 16]
Module 5 (6 hours)
JSON
5.2 JSON Schema, Manipulating JSON data with PHP [Book 2 - Chapter 3,4] 1
LARAVEL
YEAR OF
NATURAL LANGUAGE CATEGORY L T P CREDIT INTRODUCTION
CST473
PROCESSING
PEC 2 1 0 3 2019
Preamble: This course enables the learners to understand the concepts of Natural Language
Processing. The course covers basic pre-processing steps, language models, text classification
using machine learning algorithms, information and relation extraction methods, Information
Retrieval, Question Answer Systems and Machine Translation models. This course enables the
students to apply techniques and methods to solve challenging real-world problems in NLP.
Prerequisite: Nil.
Course Outcomes: After the completion of the course the student will be able to
CO1 Summarize basic concepts and learning methods for NLP (Cognitive Knowledge
Level: Understand)
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO1
CO2
CO3
CO4
CO5
COMPUTER SCIENCE AND ENGINEERING
Conduct investigations of
PO4 complex problems PO10 Communication
Assessment Pattern
Remember 30 30 30
Understand 40 40 40
Apply 30 30 30
Analyze
Evaluate
Create
Mark Distribution
150 50 100 3
COMPUTER SCIENCE AND ENGINEERING
Syllabus
Module – 1 (Introduction to NLP)
NLP Tasks and Applications, Language-Building Blocks, Challenges of NLP, Machine Learning
for NLP – Naïve Bayes Classifier, Logistic Regression, Support Vector Machines, Approaches to
NLP-- Heuristics-Based NLP, Machine Learning-based NLP.
Module – 2 (Pre-processing and Representation Models)
NLP System Pipeline--Steps--Data Acquisition, Text Extraction and Clean-up, Pre-processing,
Feature Engineering, Modelling, Evaluation, Post-Modelling Phases
Text Books
1. Daniel Jurafsky, James H. Martin , “Speech and Language Processing”(2nd and 3rd editions),
Pearson Prentice Hall
2. Sowmya Vajjala, Bodhisattwa Majumder, Anuj Gupta, Harshit Surana,” Practical Natural
Language Processing: A Comprehensive Guide to Building Real-World NLP Systems “ June
2020 Publisher(s): O'Reilly Media, Inc. ISBN: 9781492054054.
Reference Books
1. James Allen, “Natural Language Understanding”, Second Edn , Pearson.
2. Christopher Manning and Hinrich Schutze, Statistical Natural Language Processing, MIT Press.
4. Illustrate how linearly inseparable data can be made linearly separable by suitable
mapping using kernel functions.
Course Outcome 2(CO2):
1. Mention two issues associated with sentence segmentation.
3. Given a dataset of tweets, prepare the data for sentiment analysis by doing the
following operations: conversion to lower casing, removal of punctuations, removal
of stop-words, stemming, lemmatization, removal of emojis and removal of URLs.
(Assignment Question)
Use one hot-encoding and Bag-of-words models to represent “dog bites man”.
Using the toy corpus given above, represent the sentence “Dog and Man eat meat” with
TF-IDF model. Use python code for implementation. (Assignment Question)
COMPUTER SCIENCE AND ENGINEERING
2. A corpus of data is available from a social media platform that represents review of
books. How can Naïve Bayes Classifier be used for sentiment analysis of the
reviews? What changes can be made to this classifier to make it tuned for sentiment
analysis.
3. Use python library to implement sentiment analysis of review of a book, given a toy
corpus data set given below. (Assignment Question)
Document Category
just plain boring Negative
entirely predictable and lacks energy Negative
no surprises and very few laughs Negative
very powerful book Positive
the best book of the summer Positive
QP CODE:
PART A
3. List three preprocessing steps that are necessary for an HTML file.
8. Explain the need for an inverted index in an information retrieval system. Are there
any more efficient data structures that serve the same purpose.
10. What are the components that make up a noisy channel model of statistical
Machine Translation? (10x3=30)
COMPUTER SCIENCE AND ENGINEERING
Part B
(Answer any one question from each module. Each question carries 14 Marks)
11. (a) How is classification done by SVM on linearly separable data? (8)
(b) What is a kernel function? What is the need for a kernel function? Can a (4)
kernel function be replaced by an ordinary mapping function?
OR
12. (a) Illustrate the steps involved in classification in Naïve Bayes Classifier. (8)
(b) Explain the fundamental tasks that make up an NLP system. (6)
13. (a) Supposing that a set of social media posts’ dataset is available to do sentiment (8)
analysis. What pre-processing steps need to be done in order to use the data
for generating a language model? Illustrate.
OR
14. (a) Explain the concept of word embeddings as a model for text representation. (6)
15. (a) 1. Given the following data about movie review and its classification, (10)
classify “predictable with no fun” to one of the classes using Naïve
Bayes Classifier.
Document Category
just plain boring Negative
entirely predictable and lacks energy Negative
no surprises and very few laughs Negative
very powerful Positive
the most fun film of the summer Positive
OR
17. (a) Explain supervised approach to relation analysis. What are its limitations? (10)
OR
18. (a) Given the following data about documents and contents, use tf-idf document (10)
scoring method to retrieve the document for the query “sweet love”.
OR
20. (a) How is decoding done in a Phrase-based Statistical Machine Translation (10)
System?
Teaching Plan
No of
No Contents Lecture
Hrs: 35
Module 1 : Introduction to NLP (7 hours)
3.3 Case Studies for Text Classification using Logistic Regression and 1
COMPUTER SCIENCE AND ENGINEERING
SEMESTER VII
OPEN ELECTIVE
COMPUTER SCIENCE AND ENGINEERING
YEAR OF
INTRODUCTION TO CATEGORY L T P CREDIT INTRODUCTION
CST415
MOBILE COMPUTING
OEC 2 1 0 3 2019
Preamble: The purpose of this course is to prepare learners to understand the functionalities
and design considerations of mobile computing. The course content is designed to cover the
mobile computing architecture, features of different communication systems and major
elements of mobile security and next generation computer systems. This course enables the
learners to acquire advanced concepts on mobile and ad-hoc networks.
Course Outcomes: After the completion of the course the student will be able to
CO5 Describe the security protocols and apply suitable security algorithm to
secure the communication (Cognitive knowledge: Apply)
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO1
CO2
CO3
CO4
CO5
CO6
Assessment Pattern
Remember 30 30 30
Understand 50 50 50
Apply 20 20 20
Analyse
Evaluate
COMPUTER SCIENCE AND ENGINEERING
Create
Mark Distribution
Syllabus
Text Books
1. Asoke K. Talukder, Hasan Ahmad, Roopa R Yavagal, Mobile Computing
Technology- Application and Service Creation, 2nd Edition, McGraw Hill Education.
2. Schiller J., Mobile Communications, 2/e, Pearson Education, 2009.
COMPUTER SCIENCE AND ENGINEERING
Reference Books
1. Andrew S. Tanenbaum, Computer Networks, 6/e, PHI.
2. Theodore S. Rappaport, Wireless Communications Principles and Practice, 2/e, PHI,
New Delhi, 2004.
3. Curt M. White, Fundamentals of Networking and Communication 7/e, Cengage learning.
Reg No:_______________
Name:_________________
3. Compare and contrast the satellite systems – GEO, LEO and MEO.
(b) Explain the three-tier architecture of mobile computing with figure. (10)
OR
COMPUTER SCIENCE AND ENGINEERING
12. (a) Describe the significance and functions of core, edge and access network. (6)
(b) Explain the terms (i) Client Context Manager (ii) Policy Manager (iii) Security (8)
Manager (iv) Adaptability Manager
13. (a) Why is multiple access important? With the help of suitable examples, explain (7)
the various multiple access techniques.
(b) Describe the different algorithms used for security and authentication in GSM. (7)
OR
14. (a) Show how call routing is done in GSM. Give an example. (7)
(b) Explain the process of handover. How does handover differ from roaming? (7)
15. (a) With the help of neat sketches, explain the difference between Short Message (6)
Mobile Terminated (SM MT) and Short Message Mobile Originated (SM MO)
messages.
OR
16. (a) How does operator-centric pull differ from operator-independent push and pull? (7)
17. (a) Compare the HIPERLAN and OSI layered architecture. (4)
OR
18. (a) Compare 3G and WiFi. (7)
(b) Explain the HIPERLAN communication models with suitable diagrams. (7)
19. (a) Given p = 7, q = 17 and e = 5. Find the value of d and also encrypt the message (7)
P = 65 using RSA.
(b) Explain the role of MPLS in service provisioning. (7)
OR
20. (a) With the help of a suitable example, show the working of Diffie-Hellman key (7)
exchange algorithm.
(b) Explain the features of any three multimedia broadcast services. (7)
COMPUTER SCIENCE AND ENGINEERING
TEACHING PLAN
No Contents No.of
Lecture Hrs
(35 hrs)
4.7 WiFi Vs 3G 1
YEAR OF
INTRODUCTION TO CATEGORY L T P CREDIT
INTRODUCTION
CST425
DEEP LEARNING
OEC 2 1 0 3 2019
Preamble: This course aims to introduce the learner to an overview of the concepts and
algorithms involved in deep learning. Basic concepts and application areas of machine learning,
deep networks, convolutional neural network and recurrent neural network are covered in this
course. This is a foundational program that will help students understand the capabilities,
challenges, and consequences of deep learning and prepare them to participate in the
development of leading-edge AI technology. They will be able to gain the knowledge needed to
take a definitive step in the world of AI.
Course Outcomes: After the completion of the course the student will be able to
CO1 Demonstrate basic concepts in machine learning.(Cognitive Knowledge Level:
Understand)
CO2 Illustrate the validation process of machine learning models using hyper-parameters
and validation sets. (Cognitive Knowledge Level: Understand)
CO3 Demonstrate the concept of the feed forward neural network and its training process.
(Cognitive Knowledge Level: Apply)
CO4 Build CNN and Recurrent Neural Network (RNN) models for different use cases.
(Cognitive Knowledge Level: Apply)
CO5 Use different neural network/deep learning models for practical applications.
(Cognitive Knowledge Level: Apply)
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO1
CO2
CO3
CO4
CO5
COMPUTER SCIENCE AND ENGINEERING
Conduct investigations of
PO4 complex problems PO10 Communication
Assessment Pattern
Remember 30 30 30
Understand 30 30 30
Apply 40 40 40
Analyze
Evaluate
Create
Mark Distribution
Attendance : 10 marks
Continuous Assessment Tests : 25 marks
Continuous Assessment Assignment : 15 marks
COMPUTER SCIENCE AND ENGINEERING
First Internal Examination shall be preferably conducted after completing the first half of the
syllabus and the Second Internal Examination shall be preferably conducted after completing
remaining part of the syllabus.
There will be two parts: Part A and Part B. Part A contains 5 questions (preferably, 2 questions
each from the completed modules and 1 question from the partly covered module), having 3
marks for each question adding up to 15 marks for part A. Students should answer all questions
from Part A. Part B contains 7 questions (preferably, 3 questions each from the completed
modules and 1 question from the partly covered module), each with 7 marks. Out of the 7
questions in Part B, a student should answer any 5.
There will be two parts; Part A and Part B. Part A contains 10 questions with 2 questions from
each module, having 3 marks for each question. Students should answer all questions. Part B
contains 2 questions from each module of which a student should answer any one. Each question
can have maximum 2 sub-divisions and carry 14 marks.
Syllabus
Module-1 (Introduction)
Neural Networks –Perceptron, Gradient Descent solution for Perceptron, Multilayer perceptron,
activation functions, architecture design, chain rule, back propagation, gradient based learning.
Introduction to optimization– Gradient based optimization, linear least squares. Stochastic
gradient descent, Building ML algorithms and challenges.
Text Book
1. Ian Goodfellow, Yoshua Bengio, Aaron Courville, Deep Learning, MIT Press 2015 ed.
2. Aston Zhang, Zachary C. Lipton, Mu Li, and Alexander J. Smola, Dive into Deep Learning,
August 2019.
3. Neural Networks and Deep Learning: A Textbook by Charu C. Aggarwal. Springer.1st
edition, 2018.
Reference Books
PART A
11. (a) “A computer program is said to learn from experience E with respect to some
class oftasks T and performance measure P, if its performance at tasks in T,
(10)
as measured by P, improves with experience E.” What is your understanding
of the terms task, performance and experience. Explain with two example
(b) “How does bias and variance trade-off affect machine learning algorithms? (4)
OR
COMPUTER SCIENCE AND ENGINEERING
12. (a) Illustrate the concepts of Web search, Page Ranking, Recommender systems (10)
with suitable examples.
(b) List and discuss the different hyper parameters used in fine tuning the (4)
traditional machine learning models
13. (a) How multilayer neural networks learn and encode higher level features from
input features. (7)
(b) Explain gradient decent and delta rule? Why stochastic approximation to (7)
gradient descent is needed?
OR
14. (a) Find the new weights for the network using backpropogation algorithm, the (7)
network is given with a input pattern[-1,1] and target output as +1, Use
learning rate of alpha=0.3 and bipolar sigmoid function.
(b) Write an algorithm for backpropagation which uses stochastic gradient (7)
descent method. Comment on the effect of adding momentum to the
network.
15. (a) Input to CNN architecture is a color image of size 112x112x3. The first (5)
convolution layer comprises of 64 kernels of size 5x5 applied with a stride
of 2 and padding 0. What will be the number of parameters?
(b) Let X=[-1, 0, 3, 5] W=[.3 ,.5 .2,.1] be the the input of ith layer of a neural (4)
network and to apply softmax function. What should be the output of it?
OR
16. (a) Explain the concept behind i) Early stopping ii) dropout iii) weight decay (9)
(b) How backpropagation is used to learn higher-order features in a convolutional (5)
Network?
17. (a) Explain the working of RNN and discuss how backpropagation through time
is used in recurrent networks. (8)
COMPUTER SCIENCE AND ENGINEERING
(b) Describe the working of a long short term memory in RNNs. (6)
OR
18. (a) What is the vanishing gradient problem and exploding gradient problem? (8)
(b) Why do RNNs have a tendency to suffer from exploding/vanishing gradient? (6)
How to overcome this challenge?
19. (a) Explain any two word embedding techniques (8)
(b) Explain the merits and demerits of using Auto encoders in Computer Vision. (6)
OR
20. (a) Illustrate the use of representation learning in object classification. (7)
(b) Compare Boltzmann Machine with Deep Belief Network. (7 )
COMPUTER SCIENCE AND ENGINEERING
Teaching Plan
No. of
Lecture
No Contents Hours
(37 hrs)
Module 1 : Introduction (8 hours)
1.1 Key components - Data, models, objective functions, optimization algorithms. 1
(TB2: Section 1.1-1.2)
1.2 Learning algorithm (TB1: Section 5.1), Supervised learning- regression, 1
classification, tagging, web search, page ranking (TB2: Section 1.3.1)
1.3 Recommender systems, Sequence learning, Unsupervised learning, 1
Reinforcement learning(TB2: Section 1.3.2-1.3.4)
1.4 Historical Trends in Deep Learning (TB1: Section 1.2). 1
1.5 Concepts: overfit, underfit, hyperparameters and validation sets. (TB1: Section 1
5.2-5.3)
1.6 Concepts: Estimators, bias and variance. (TB1: Section 5.4) 1
1.7 Demonstrate the concepts of supervised learning algorithms using a suitable 1
platform.
1.8 Demonstrate the concepts of unsupervised using a suitable platform. 1
Module 2 : Optimization and Neural Networks (9 hours)
2.3 Activation functions- Sigmoid, tanh, Softmax, ReLU, leaky ReLU (TB3: Section 1
1.2.1.3 - 1.2.1.5)
2.4 Architecture design (TB1: Section 6.4, TB3: Section 1.6) 1
2.5 Chain rule, back propagation (TB3: Section 1.3) 1
2.6 Gradient based learning (TB1: Section 6.2) 1
2.7 Gradient based optimization (TB1: Section 4.3) 1
2.8 Linear least squares using a suitable platform. (TB1: Section 4.5) 1
2.9 Building ML Algorithms and Challenges (TB3: 1.4, TB1: 5.10-5.11) 1
Module 3 :Convolution Neural Network (8 hours)
3.1 Convolution operation (TB1:Section 9.1) 1
3.2 Motivation, pooling (TB1:Section 9.2-9.3) 1
COMPUTER SCIENCE AND ENGINEERING
3.3 Convolution and Pooling as an infinitely strong prior (TB1: Section 9.4) 1
YEAR OF
CATEGORY L T P CREDIT INTRODUCTION
CST435 COMPUTER GRAPHICS
OEC 2 1 0 3 2019
Preamble: This course helps the learners to make awareness about strong theoretical concept in
computer graphics. It covers the three-dimensional environment representation in a computer,
transformation of 2D/3D objects and basic mathematical techniques and algorithms used to build
applications. This course enables the learners to develop the ability to create image processing
frameworks for different domains and develop algorithms for emerging display technologies.
CO# CO
Describe the working principles of graphics devices(Cognitive Knowledge
CO1 level: Understand)
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO1
CO2
CO3
CO4
CO5
COMPUTER SCIENCE AND ENGINEERING
Assessment Pattern
Mark Distribution
There will be two parts; Part A and Part B. Part A contains 10 questions with 2 questions from
each module, having 3 marks for each question. Students should answer all questions. Part B
contains 2 full questions from each module of which student should answer any one full
question. Each question can have maximum 2 sub-divisions and carries 14 marks.
Syllabus
Text Book
1. Zhigang Xiang and Roy Plastock, Computer Graphics (Schaum’s outline Series), McGraw
Hill, 2019.
2. Donald Hearn and M. Pauline Baker, Computer Graphics, PHI, 2e, 1996
References
1. William M. Newman and Robert F. Sproull, Principles of Interactive Computer Graphics.
McGraw Hill, 2001
2. David F. Rogers , Procedural Elements for Computer Graphics, Tata McGraw Hill,2001.
3. Donald Hearn, M. Pauline Baker and Warren Carithers, Computer Graphics with
OpenGL, PHI, 4e, 2013
QP CODE:
PART A
2. Consider a raster system with a resolution of 1024*1024. Compute the size of the
raster needed to store 4 bits per pixel? How much storage is needed if 8 bits per
pixel are to be stored?
4. How 8-way symmetry of circle can be used for developing circle drawing
algorithms?
5. Show that two successive reflections about either of the coordinate axes is
equivalent to a single rotation about the coordinate origin.
7. Find the window to viewport normalization transformation with window lower left
corner at (1,1) and upper right corner at (2,6).
COMPUTER SCIENCE AND ENGINEERING
8. How does Cohen Sutherland algorithm determine whether a line is visible, invisible or
a candidate for clipping based on the region codes assigned to the end points of the
line?
9. Define the terms (i) Centre of projection (ii) Principal vanishing point
10. Differentiate between the object space and image space method for the hidden surface
removal of an image. (10x3=30)
Part B
(Answer any one question from each module. Each question carries 14 Marks)
11. (a) Explain the working principle of beam penetration method and shadow mask (8)
method with suitable illustrations.
(b) Draw the architecture of raster scan display systems and explain its working (6)
principle.
OR
12. (a) Explain the working principle of a Refresh CRT monitor with suitable (8)
diagrams.
13. (a) Differentiate between boundary fill and flood fill algorithms. (5)
(b) Derive the initial decision parameter of Bresenham’s line drawing algorithm (9)
and rasterize a line with endpoints (2,2) and (10,10).
OR
14. (a) Write Midpoint circle drawing algorithm and identify the points in the circle (8)
with radius as 20 and center at (50,30) using the algorithm.
(b) Illustrate the working principle of scan line polygon filling algorithm. (6)
15. (a) Reflect a triangle ABC about the line 3x-4y+8=0, where the coordinates of the (8)
triangle are given as A(4,1), B(5,2) and C(4,3).
(b) A diamond shaped polygon is located at P(-1,0), Q(0,-2), R(1,0) and S(0,2). (6)
Find the transformation matrix which would rotate the triangle by 90 degree
counter clockwise about the point Q. Using the transformation matrix, find
the coordinates of the rotated polygon.
OR
COMPUTER SCIENCE AND ENGINEERING
16. (a) Describe the steps required for a general 3D rotation if the rotation axis is not (8)
parallel to any one of the principal axis. The rotation axis is defined by the
points P1(x1,y1,z1) and P2(x2,y2,z2). Give its composite matrix
representation.
(b) Consider a triangle at (2,2), (10,2), (2,10). Perform the following 2D (6)
transformations in succession and find the resultant vertices.
i) Scale with respect to (2,2) by scaling factors (2,2) along x
and y directions.
ii) Rotate by 90 degree counter clockwise direction.
iii) Reflection based on y=x
(b) Explain Cohen-Sutherland line clipping algorithm. Use the algorithm to clip (8)
line with end points P1 (70, 20) and P2(100,10) against a window with lower
left hand corner (50,10) and upper right hand corner (80,40).
OR
18. (a) Describe Sutherland Hodgeman polygon clipping algorithm and list out its (7)
limitations.
(b) Explain the steps involved in clipping a line using Mid point Subdivision (7)
algorithm.
19. (a) Explain how visible surfaces can be detected using depth buffer algorithm. (7)
(b) Define parallel projection. Describe orthographic and oblique parallel (7)
projection.
OR
20. (a) Illustrate the scan line method used in visible surface detection. (7)
(b) Derive the matrix needed for performing perspective projections. (7)
COMPUTER SCIENCE AND ENGINEERING
TEACHING PLAN
No of Lecture
No Contents
Hrs (35 hrs)
YEAR OF
PYTHON FOR CATEGORY L T P CREDIT INTRODUCTION
CST445 ENGINEERS
OEC 2 1 0 3 2019
Preamble: The objective of the course is to provide learners an insight into Python programming
in a scientific computation context and develop programming skills to solve engineering
problems. It covers programming environment, important instructions, data representations,
intermediate level features, Object Oriented Programming and file data processing of Python.
This course lays the foundation to scientific computing, develop web applications, Machine
Learning, and Artificial Intelligence-based applications and tools, Data Science and Data
Visualization applications.
Prerequisite: NIL
Note : Students who have successfully completed CST 283 - Python for Machine Learning
(Minor) are not eligible to opt this course.
Course Outcomes: After the completion of the course the student will be able to
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO1
CO2
CO3
CO4
CO5
CO6
Assessment Pattern
Test 1 (Marks in Test 2 (Marks End Semester
Bloom’s Category
percentage) in percentage) Examination Marks
Remember 20 20 20
Understand 30 30 30
Apply 50 50 50
Analyse
Evaluate
Create
Mark Distribution
Syllabus
Module 1 (Basics of Python)
Getting Started with Python Programming - Running code in the interactive shell, Editing,
Saving, and Running a script. Using editors - IDLE, Jupyter. Basic coding skills - Working with
data types, Numeric data types and Character sets, Keywords, Variables and Assignment
statement, Operators, Expressions, Working with numeric data, Type conversions, Comments in
the program, Input Processing, and Output, Formatting output. How Python works. Detecting
and correcting syntax errors. Using built in functions and modules in math module. Control
statements - Selection structure - if-else, if-elif-else. Iteration structure - for, while. Testing the
control statements. Lazy evaluation.
Text Books:
1. Kenneth A Lambert., Fundamentals of Python : First Programs, 2/e, Cengage Publishing, 2016
2. David J. Pine, Introduction to Python for Science and Engineering, CRC Press, 2021
Reference Books:
1. Wes McKinney, Python for Data Analysis, 2/e, Shroff / O’Reilly Publishers, 2017
2. Allen B. Downey, Think Python: How to Think Like a Computer Scientist, 2/e, Schroff, 2016
3. Michael Urban and Joel Murach, Python Programming, Shroff/Murach, 2016
4. David M.Baezly, Python Essential Reference. Addison-Wesley Professional; 4/e, 2009.
5. Charles Severance. Python for Informatics: Exploring Information,
6. http://swcarpentry.github.io/python-novice-gapminder/
Course Outcome1(CO1):
1. What is type conversion? How is it done in Python?
Reg No:_______________
Name:_________________
Plot the function y = 3x2 for −1 ≤ x ≤ 3 as a continuous line. Include enough points so that
8.
the curve you plot appears smooth. Label the axes x and y
9. Describe random number generation using Python
10. How can a generalized eigen value problem can be solved using Python?
PART-B
(Answer any one full question from each module)
Module -1
11. (a) Compare and contrast interpreted languages and compiled languages. (6)
How does it affect the quality of program development and execution of
the program?
(b) What are the possible errors in a Python program. Write a Python (8)
program to print the value of 22n+n+5 for n provided by the user.
OR
12. (a) Describe Arithmetic operators, Assignment operators, Comparison (6)
operators, Logical operators, and Bitwise operators in detail with examples.
(b) Input 4 integers (+ve and −ve). Write a Python code to find the sum of (8)
negative numbers, positive numbers, and print them. Also, find the averages
of these two groups of numbers and print
Module -2
13. (a) Write a Python code to create a function called list_of_frequency that takes a (5)
string and prints the letters in non-increasing order of the frequency of their
occurrences. Use dictionaries.
(b) Write a Python program to read a list of numbers and sort the list in a non- (9)
decreasing order without using any built in functions. Separate function
should be written to sort the list wherein the name of the list is passed as the
parameter.
OR
14. (a) Illustrate the following Set methods with an example. (8)
i. intersection( ) ii. Union( ) iii. Issubset( ) iv. Difference( ) v. update( ) vi.
discard( )
(b) Write a Python program to check the validity of a password given by the (6)
user.
The Password should satisfy the following criteria:
1. Contains at least one letter between a and z
2. Contains at least one number between 0 and 9
3. Contains at least one letter between A and Z
COMPUTER SCIENCE AND ENGINEERING
Module -5
19. (a) Write python program to solve the following system of equations (4)
x1 − 2x2 + 9x3 + 13x4 = 1
−5x1 + x2 + 6x3 − 7x4 = −3
4x1 + 8x2 − 4x3 − 2x4 = −2
8x1 + 5x2 − 7x3 + x4 = 5
(b) Given the sales information of a company as CSV file with the following (10)
fields month_number, facecream, facewash, toothpaste, bathingsoap,
shampoo, moisturizer, total_units, total_profit. Write Python codes to
visualize the data as follows
1) Toothpaste sales data of each month and show it using a scatter plot
2) Face cream and face wash product sales data and show it using the
bar chart
Calculate total sale data for last year for each product and show it using a
Pie chart.
OR
20. (a) Write Python program to write the data given below to a CSV file. (9)
SN Name Country Contribution Year
(b) Explain how integration is performed with SciPy. Illustrate the same with (5)
the two sample integrals using SciPy function.
COMPUTER SCIENCE AND ENGINEERING
Teaching Plan
Number of
Sl
Contents Hours (35
No
Hrs)
Module 1: Basics of Python (8 hours)
Getting Started with Python Programming: Running code in the interactive
1.1 1 hour
shell Editing, Saving, and Running a script
1.2 Using editors: IDLE, Jupyter 1 hour
Basic coding skills: Working with data types, Numeric data types and
1.3 Character sets, Keywords, Variables and Assignment statement, Operators, 1 hour
Expressions,
Working with numeric data, Type conversions, Comments in the program,
1.4 1 hour
Input Processing, and Output. Formatting output
How Python works. Detecting and correcting syntax errors. Using built in
1.5 1 hour
functions and modules in math module.
1.6 Control statements : Selection structure, if-else, if elifelse 1 hour
1.7 Iteration structure - for, while 1 hour
1.8 Testing the control statements, Lazy evaluation. 1 hour
Module 2: Functions and Python Data Structures (8 hours)
2.1 Functions: Hiding redundancy and complexity, Arguments and return values 1 hour
2.2 Variable scopes and parameter passing 1 hour
2.3 Named arguments, Main function, 1 hour
2.4 Working with recursion, Lambda functions 1 hour
2.5 Strings - String function 1 hour
Lists - Basic list Operations and functions, List of lists, Slicing, Searching
2.6 1 hour
and sorting list, List comprehension.
2.7 Work with tuples. Sets. 1 hour
Dictionaries - Dictionary functions, dictionary literals, adding and removing
2.8 1 hour
keys, Accessing and replacing values, traversing dictionaries, reverse lookup
Module 3: Object Oriented Programming (6 hours)
3.1 Design with classes : Objects and Classes, Methods, Instance Variables 1 hour
3.2 Constructor, Accessors, and Mutators 1 hour
3.3 Structuring classes with Inheritance 1 hour
3.4 Polymorphism 1 hour
3.5 Abstract Classes 1 hour
3.6 Exceptions: Handle a single exception, Handle multiple exception 1 hour
Module 4: Visualization and File handling (6 hours)
COMPUTER SCIENCE AND ENGINEERING
YEAR OF
OBJECT ORIENTED CATEGORY L T P CREDIT
CST455 INTRODUCTION
CONCEPTS
OEC 2 1 0 3 2019
Preamble: The purpose of this course is to enable learners to solve problems by breaking it down
to object level while designing software and to implement it using Java. This course covers Object
Oriented Principles, Object Oriented Programming in Java, Exception handling, Event handling,
multithreaded programming and working with window-based graphics. This course provides
learners the basics to develop Mobile applications, Enterprise Applications, Scientific
Applications and Web based Applications.
Prerequisite: A sound background in any of the programming languages like C, C++, Python etc
is mandatory. Students who completed the minor stream course CST 281 Object Oriented
Programming are not allowed to choose this Open Elective Course.
Course Outcomes: After the completion of the course the student will be able to
Utilise data types, operators, control statements, built in packages & interfaces,
CO2 Input/Output Streams and Files in Java to develop programs (Cognitive Knowledge
Level: Apply)
Illustrate how robust programs can be written in Java using exception handling
CO3
mechanism (Cognitive Knowledge Level: Apply)
PO PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO1 PO11 PO1
1 0 2
CO1
CO2
CO3
CO4
CO5
Conduct investigations of
PO4 complex problems PO10 Communication
Assessment Pattern
Remember 20 20 20
Understand 40 40 40
Apply 40 40 40
Analyze
Evaluate
Create
Mark Distribution
150 50 100 3
from the partly completed module), each with 7 marks. Out of the 7 questions, a student should
answer any5.
Primitive Data types - Integers, Floating Point Types, Characters, Boolean. Literals, Type
Conversion and Casting, Variables, Arrays, Strings, Vector class.
Exception Handling - Checked Exceptions, Unchecked Exceptions, try Block and catch Clause,
Multiple catch Clauses, Nested try Statements, throw, throws and finally.
Java Library - String Handling – String Constructors, String Length, Special String Operations -
Character Extraction, String Comparison, Searching Strings, Modifying Strings, Using
valueOf(), Comparison of String Buffer and String.
Event Handling - Event Handling Mechanisms, Delegation Event Model, Event Classes, Sources
of Events, Event Listener Interfaces, Using the Delegation Model.
Swing Fundamentals - Swing Key Features, Model View Controller (MVC), Swing Controls,
Components and Containers, Exploring Swing - JFrame, JLabel, JButton, JTextField.
Text Books
1. Herbert Schildt, Java: The Complete Reference, 8/e, Tata McGraw Hill, 2011.
2. Balagurusamy E., Programming JAVA a Primer, 5/e, McGraw Hill, 2014.
Reference Books
1. Paul Deitel, Harvey Deitel, Java How to Program, Early Objects 11/e, Pearson, 2018.
2. Y. Daniel Liang, Introduction to Java Programming, 7/e, Pearson, 2013.
3. Nageswararao R., Core Java: An Integrated Approach, Dreamtech Press, 2008.
4. Flanagan D., Java in A Nutshell, 5/e, O'Reilly, 2005.
5. Sierra K., Head First Java, 2/e, O'Reilly, 2005.
COMPUTER SCIENCE AND ENGINEERING
PART A
4. What does the following Java function compute? Justify your answer.
intgreater(int a, int b)
{
while(a!=b)
{
COMPUTER SCIENCE AND ENGINEERING
if(a>b)
a=a-b;
else
b=b-a;
}
return a;
}
8. Write a simple program to read an integer value from console and print it.
Part B
(Answer any one question from each module. Each question carries 14 Marks)
11. (a) Describe in detail polymorphism, abstraction and inheritance with suitable (9)
examples.
OR
12. (a) Explain the salient features of Java language. How does Java Enterprise (9)
Edition (J2EE) differ from Java Standard Edition (Java SE)?
(b) Explain the declaration and use of multi-dimensional array variables in Java, (5)
with example.
13. (a) Explain iteration control statements in Java. Give examples. (8)
COMPUTER SCIENCE AND ENGINEERING
OR
14. (a) Using a suitable Java program, explain the concept of methods and (6)
constructors.
(b) Write a Java program that prompts the user for an integer and then prints out (8)
all the prime numbers up to that number.
15. (a) In a table format, show the effect of access specifiers within and outside (6)
packages in Java.
(b) Describe exception handling using try block and catch clause in Java with the (8)
help of a suitable Java program.
OR
16. (a) What is an interface in Java? Explain with a suitable example. (6)
(b) Write a program that perform integer divisions. The user enters two input data (8)
(any data type) through console into variables Num1 and Num2. If Num1 or
Num2 were not an integer, the program would throw a Number Format
Exception. If Num2 were Zero, the program would throw an Arithmetic
Exception. Display the appropriate exception or result.
17. (a) Write a Java program that displays the number of characters, lines and words (8)
in a text file.
(b) Explain any three String constructors with the help of sample code for each. (6)
OR
18. (a) Write a program to demonstrate the usage of the PrintWriter class. (7)
(b) Write a Java program for sorting a given list of names in ascending order. (7)
19. (a) Explain Delegation Event model for event handling in Java. (7)
(b) Write a program to compute the sum of elements in an array using two (7)
COMPUTER SCIENCE AND ENGINEERING
threads in a parallel way. The first thread sums up the first half of the array
and the second thread sums up the second half of the array. Finally, the main
thread adds these partial sums and prints the result.Use Runnable interfacefor
the creation of a thread.
OR
20. (a) What are the differences between a process and a thread? (4)
(b) Write a Graphical User Interface (GUI) based Java program to implement a (10)
simple calculator supporting the operations addition, subtraction,
multiplication and division. Use Swing controls to implement GUI. There
may be three text boxes, the first two for accepting the operands and the last
for displaying the result. Add four buttons for the above operations. Write
neat comments in your program to show how you handle events.
Teaching Plan
No. of
Lecture
No Contents Hours
(36hrs)
1.6 Primitive Data types - Integers, Floating Point Types, Characters, Boolean 1 hour
1.7 Literals, Type Conversion and Casting, Variables, Arrays, Strings, Vector 1 hour
COMPUTER SCIENCE AND ENGINEERING
class.
3.2 Calling Order of Constructors, Method Overriding, the Object class 1 hour
3.3 Abstract Classes and Methods, Using final with Inheritance 1 hour
4.5 Java Library - String Handling – String Constructors, String Length 1 hour
5.6 Using the Delegation Model, Swing fundamentals, Swing Key Features 1 hour
SEMESTER VII
MINOR
COMPUTER SCIENCE AND ENGINEERING
YEAR OF
CATEGORY L T P CREDIT
INTRODUCTION
CSD481 MINI PROJECT
PWS 0 0 3 4 2019
Preamble: The objective of this course is to apply the fundamental concepts of different courses
learned in respective Minor Streams: Software Engineering, Machine Learning and Networking.
This course helps the learners to get an exposure to the development of application
software/hardware solutions/ software simulations in the field of Computer Science and
Engineering. It enables the learners to understand the different steps to be followed such as
literature review and problem identification, preparation of requirement specification &design
document, testing, development and deployment. Mini project enables the students to boost their
skills, widen the horizon of thinking and their ability to resolve real life problems.
Prerequisite:
A sound knowledge in courses studied in respective minor stream.
Course Outcomes: After the completion of the course the student will be able to
CO# CO
Identify technically and economically feasible problems (Cognitive
CO1 Knowledge Level: Apply)
Identify and survey the relevant literature for getting exposed to related
CO2 solutions. (Cognitive Knowledge Level: Apply)
Perform requirement analysis, identify design methodologies and develop
CO3 adaptable & reusable solutions of minimal complexity by using modern tools
& advanced programming techniques (Cognitive Knowledge Level: Apply)
Prepare technical report and deliver presentation (Cognitive Knowledge
CO4 Level: Apply)
Apply engineering and management principles to achieve the goal of the
CO5 project (Cognitive Knowledge Level: Apply)
CO1
CO2
CO3
CO4
CO5
COMPUTER SCIENCE AND ENGINEERING
Conduct investigations of
PO4 PO10 Communication
complex problems
Assessment Pattern
Mark Distribution
Student Groups with 4 or 5 members should identify a topic of interest in consultation with a
Faculty Advisor/Project Coordinator/Guide. Review the literature and gather information
pertaining to the chosen topic. State the objectives and develop a methodology to achieve the
objectives. Carryout the design/fabrication or develop codes/programs to achieve the objectives
by strictly following steps specified in the teaching plan. Innovative design concepts,
performance, scalability, reliability considerations, aesthetics/ergonomic, user experience and
security aspects taken care of in the project shall be given due weight.
COMPUTER SCIENCE AND ENGINEERING
The progress of the mini project is evaluated based on a minimum of two reviews. The review
committee may be constituted by a senior faculty member, Mini Project coordinator and project
guide. The internal evaluation shall be made based on the progress/outcome of the project,
reports and a viva-voce examination, conducted internally by a 3-member committee. A project
report is required at the end of the semester. The project has to be demonstrated for its full design
specifications.
TEACHING PLAN
● Figures & Tables – Ensure that all Figures and Tables are suitably numbered and given
proper names/headings. Write figure title under the figure and table title above the table.
SEMESTER VII
HONOURS
COMPUTER SCIENCE AND ENGINEERING
YEAR OF
CATEGORY L T P CREDIT INTRODUCTION
CST495 CYBER FORENSICS
VAC 3 1 0 4 2019
Preamble: The course on Cyber Forensics aims at exploring the basics of Cyber Forensics and Cyber
security, the forensic investigation process and principles and the different types of cybercrimes and
threats. This course also focuses on the forensic analysis of File systems, the Network, the Windows
and Linux Operating systems. The course gives a basic understanding of the forensics analysis tools
and a deep understanding of Anti forensics practices and methods. All the above aspects are dealt with
case studies of the respective areas.
Prerequisite: Knowledge in File Systems, Operating systems, Networks and a general awareness on
Cyber Technologies.
Course Outcomes: After the completion of the course the student will be able to
Infer the basic concepts of File Systems and its associated attribute definitions
CO2 (Cognitive Knowledge Level: Understand)
Utilize the methodologies used in data analysis and memory analysis for detection of
CO3 artefacts(Cognitive Knowledge Level: Apply)
Identify web attacks and detect artefacts using OWASP and penetration testing.
CO4 (Cognitive Knowledge Level: Apply)
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO1
CO2
CO3
CO4
CO5
Assessment Pattern
Remember 30 30 30
Understand 40 40 40
Apply 30 30 30
Analyze
Evaluate
Create
Mark Distribution
Attendance : 10 marks
First Internal Examination shall be preferably conducted after completing the first half of the syllabus
and the Second Internal Examination shall be preferably conducted after completing remaining part of
the syllabus.
There will be two parts: Part A and Part B. Part A contains 5 questions (preferably, 2 questions each
from the completed modules and 1 question from the partly covered module), having 3 marks for each
question adding up to 15 marks for part A. Students should answer all questions from Part A. Part B
contains 7 questions (preferably, 3 questions each from the completed modules and 1 question from
the partly covered module), each with 7 marks. Out of the 7 questions in Part B, a student should
answer any 5.
There will be two parts; Part A and Part B. Part A contains 10 questions with 2 questions from each
module, having 3 marks for each question. Students should answer all questions. Part B contains 2
questions from each module of which a student should answer any one. Each question can have
maximum 2 sub-divisions and carries 14 marks.
Syllabus
Module-1(Cyber Forensics and Cyber Security)
Computer Forensics: History of computer forensics, preparing for computer investigations,
understanding Public and private investigations- Forensics Investigation Principles - Forensic
Protocol for Evidence Acquisition - Digital Forensics -Standards and Guidelines - Digital Evidence –
Data Acquisition - storage formats for digital evidence, determining the best acquisition method,
contingency planning for image acquisitions, Cyber Forensics tools- Challenges in Cyber Forensics,
Skills Required to Become a Cyber Forensic Expert
Cyber Security: Cybercrimes, Types of Cybercrimes - Recent Data Breaches - Recent Cyber security
Trends - Case Study: Sim Swapping Fraud, ATM Card Cloning, Hacking email for money, Google
Nest Guard, Email Crimes, Phishing, Types of Phishing.
File system Analysis: FAT and NTFS concepts and analysis -File system category, Content category,
Metadata category, File name category, Application category,Application-level search techniques,
Specific file systems, File recovery, Consistency check. FAT data structure-Boot sector, FAT 32 FS
info, directory entries, Long file name directory entries
COMPUTER SCIENCE AND ENGINEERING
Linux Forensics: Live Response Data Collection- Prepare the Target Media, Format the Drive, Gather
Volatile Information, Acquiring the Image, Initial Triage, Data Analysis- Log Analysis, Keyword
Searches, User Activity, Network Connections, Running Processes, Open File Handlers, The Hacking
Top Ten, Reconnaissance Tools
The OSI Model, Forensic Footprints, Seizure of Networking Devices, Network Forensic Artifacts,
ICMP Attacks, Drive-By Downloads, Network Forensic Analysis Tools, Case Study: Wireshark. Web
Attack Forensics: OWASP Top 10, Web Attack Tests, Penetration Testing.
Module-5 (Anti-Forensics)
Text Books
1. Bill Nelson, Amelia Phillips and Christopher Steuart, Computer forensics - Guide to Computer
Forensics and Investigations, 4/e, Course Technology Inc.
2. Brian Carrier, File System Forensic Analysis, Addison Wesley, 2005.
3. Harlan Carvey, Windows Forensic Analysis DVD Toolkit, 2/e, Syngress.
4. Cory Altheide, Todd Haverkos, Chris Pogue,Unix and Linux Forensic Analysis DVD Toolkit,
1/e, Syngress.
5. William Stallings,Network Security Essentials Applications and Standards, 4/e, Prentice Hall
6. Eric Maiwald, Fundamentals of Network Security, McGraw-Hill, 2004.
References
Discuss the different cyber forensics tools used for image acquisition.
CourseOutcome2(CO2):Explain the pros and cons of NTFS and FAT File systems. Also give the
challenges the investigators would face in extracting evidences from these file systems.
CourseOutcome3 (CO3): Apply any memory forensics methodologies/tools to extract volatile and
nonvolatile data from a Windows based system.
CourseOutcome4 (CO4):Use web attacks test tools like netcraft to identify web application
vulnerabilities of a particular site say www.xyz.com
Course Outcome 5 (CO5): Explain the different anti-forensics practices used to destroy or conceal
data in order to prevent others from accessing it.
QP CODE:
PART A
4. Define the terms file slack, RAM slack and drive slack.
Part B
(Answer any one question from each module. Each question carries 14 Marks)
11. (a) Discuss the different types of Cybercrimes. List the tools used for (8)
identifying Cyber Crimes.
(b) Differentiate between Static acquisition and Live acquisition with example. (6)
OR
12. (a) Explain the principles of Digital Forensic Investigation? Why is it (8)
important? Comment.
(b) When you perform an acquisition at a remote location, what should you (6)
consider preparing this task?
14. (a) What is Metadata? Discuss the first 16 metadata records you would find in (6)
the MFT?
(b) Explain the different types of volatile information in a live response system. (8)
List any two tools used for obtaining volatile information.
16. (a) What are the main live response methodologies? (6)
(b) What is Physical Memory Dump? Explain how a physical memory dump is (8)
analysed.
17. (a) What is OWASP? Also mention the Top 10 web application vulnerabilities (8)
in 2021.
(b) How would you setup Wireshark to monitor packets passing through (6)
aninternet router?
18. (a) What are the goals of conducting a pentesting exercise? (3)
OR
20. (a) Explain the different types of Anti-forensics Detection Techniques. (8)
TEACHING PLAN
No of
Sl.No. Contents Lecture Hrs
(44hrs)
1.6 Contingency planning for image acquisitions, Cyber Forensics tools 1 hour
1.9 Case Study: Sim Swapping Fraud, ATM Card Cloning 1 hour
1.10 Case Study:Hacking email for money, Google Nest Guard 1 hour
3.9 Data Analysis- Log Analysis, Keyword Searches, User Activity 1 hour
COMPUTER SCIENCE AND ENGINEERING
YEAR OF
CATEGORY L T P CREDIT
REINFORCEMENT INTRODUCTION
CST497
LEARNING
VAC 3 1 0 4 2019
Preamble: This course covers fundamental principles and techniques in reinforcement learning.
Reinforcement learning is concerned with building programs that learn how to predict and act in a
stochastic environment, based on past experience. Applications of reinforcement learning range
from classical control problems, such as power plant optimization or dynamical system control, to
game playing, inventory control, and many other fields. Topics include Markov decision process,
dynamic programming, Monte Carlo, temporal difference, function approximation reinforcement
learning algorithms, and applications of reinforcement learning. This course enables the leaners to
apply reinforcement learning on real world applications and research problems.
Prerequisite: A pass in CST 294(Computational Fundamentals for Machine Learning)
Course Outcomes: After the completion of the course the student will be able to
PO PO PO 3 PO 4 PO PO 6 PO PO PO PO PO 11 PO
1 2 5 7 8 9 10 12
CO 1
CO 2
CO 3
CO 4
CO 5
COMPUTER SCIENCE AND ENGINEERING
Assessment Pattern
Remember
30% 30% 30%
Understand
30% 30% 30%
Apply
40% 40% 40%
Analyse
Evaluate
Create
Mark Distribution
Attendance : 10 marks
First Internal Examination shall be preferably conducted after completing the first half of the
syllabus and the Second Internal Examination shall be preferably conducted after completing
remaining part of the syllabus.
There will be two parts: Part A and Part B. Part A contains 5 questions (preferably, 2 questions
each from the completed modules and 1 question from the partly covered module), having 3
marks for each question adding up to 15 marks for part A. Students should answer all questions
from Part A. Part B contains 7 questions (preferably, 3 questions each from the completed
modules and 1 question from the partly covered module), each with 7 marks. Out of the 7
questions in Part B, a student should answer any 5.
End Semester Examination Pattern:There will be two parts; Part A and Part B. Part A contain
10 questions with 2 questions from each module, having 3 marks for each question. Students
should answer all questions. Part B contains 2 questions from each module of which student
should answer anyone. Each question can have maximum 2 sub-divisions and carry 14 marks.
Syllabus
Module 1 (Review Of Probability Concepts)
Carlo Estimation of Action Values, Monte Carlo Control, Monte Carlo Control without
Exploring Starts, Off-policy Prediction via Importance Sampling, Incremental Implementation,
Off-policy Monte Carlo Control.
Module 4 (Temporal-Difference (TD) Methods For Model Free Prediction And Control)
TD Methods - TD Prediction, Advantages of TD Prediction Methods, Optimality of TD(0),
Sarsa: On-policy TD Control, Q-learning: Off-policy TD Control, Expected Sarsa.
n-step Bootstrapping- n-step TD Prediction, n-step Sarsa, step Off-policy Learning, Off-policy
Learning Without Importance Sampling: The n-step Tree Backup Algorithm.
Text book:
1 Richard S. Sutton and Andrew G. Barto, Reinforcement Learning: An Introduction, , 2nd
Edition
2 Alberto Leon-Garcia, Probability, Statistics, and Random Processes for Electrical
Engineering, 3rd Edition,
Reference books:
1 Reinforcement Learning: State-of-the-Art, Marco Wiering and Martijn van Otterlo, Eds
2 Algorithms for Reinforcement Learning, Szepesvari (2010), Morgan & Claypool.
3 Artificial Intelligence: A Modern Approach, Stuart J. Russell and Peter Norvig
4 Mathematical Statistics and Data Analysis by John A. Rice,University of California,
Berkeley, Third edition, published by Cengage.
5 Machine Learning: A Probabilistic Perspective, Kevin P. Murphy
COMPUTER SCIENCE AND ENGINEERING
1 Let Jand Tbe independent events, where P(J)=0.4and P(T)=0.7. Find P(J∩T), P(J∪T)
and P(J∩T′)
2 Let A and B be events such that P(A)=0.45 , P(B)=0.35 and P(A∪B)=0.5. Find P(A∣B ).
3 A random variable Rhas the probability distribution as shown in the following table:
5 Two players A and B are competing at a quiz game involving a series of questions. On
any individual question, the probabilities that A and B give the correct answer are p and q
respectively, for all questions, with outcomes for different questions being independent.
The game finishes when a player wins by answering a question correctly. Compute the
probability that A wins if
(i) A answers the first question,
(ii) B answers the first question.
6 A coin for which P(heads) = pis tossed until two successive tails are obtained. Find the
probability that the experiment is completed on thenthtoss.
7 An urn contains p black balls, q white balls, and r red balls; and n balls are chosen
without replacement.
i. Find the joint distribution of the numbers of black, white, and red balls in the
sample.
ii. Find the joint distribution of the numbers of black and white balls in the
sample.
iii. Find the marginal distribution of the number of white balls in the sample.
8 Suppose that two components have independent exponentially distributed lifetimes,
T1and T2, with parameters αand β, respectively. Find (a) P( T1> T2)and (b) P( T1> 2
T2).
COMPUTER SCIENCE AND ENGINEERING
9 Let Z1 and Z2 be independent random variables each having the standard normal
distribution. Define the random variables X and Y by X = Z1 + 3Z2 and Y = Z1+ Z2.
Argue that the joint distribution of (X, Y) is a bivariate normal distribution. What are the
parameters of this distribution?
10 Given a continuous random variable x, with cumulative distribution function Fx(x),
show that the random variable y = Fx(x) is uniformly distributed.
11 ou roll a fair dice twice. Let the random variable X be the product of the outcomes of the
two rolls. What is the probability mass function of X? What are the expected values and
the standard deviation of X?
12 Show that if two events Aand Bare independent, then Aand B'are independent
13 Prove that Xand Yare independent if and only if fX|Y (x|y) = fX(x)for all xand y
14 A random square has a side length that is a uniform [0, 1] random variable. Find the
expected area of the square.Let X be a continuous random variable with the density
function f (x) = 2x, 0 ≤ x ≤ 1
i. Find E(X).
ii. Find E(X2)and Var(X).
1 What are the main differences between supervised learning and reinforcement learning?
2 Give examples of Markovian and non-Markovian environments?
3 What are the advantages and disadvantages of value methods vs policy methods?
4 Define the optimal state-value function V*(s) for an MDP.
5 Imagine that the rewards are at most 1 everywhere. What is the maximum value that the
discounted return can attain ? Why ?
6 Write down the Bellman optimality equation for state-value functions
7 Suppose that you are in a casino. You have Rs 20 and will play until you lose it all or as
soon as you double your money. You can choose to play two slot machines: 1) slot
machine A costs Rs 10 to play and will return Rs 20 with probability 0.05 and Rs 0
otherwise; and 2) slot machine B costs Rs 20 to play and will return Rs30 with probability
0.01 and Rs 0 otherwise. Until you are done, you will choose to play machine A or
machine B in each turn. Describe the state space, action space, rewards and transition
probabilities. Assume the discount factor γ = 1. Rewards should yield a higher reward
when terminating with Rs 40 than when terminating with Rs 0. Also, the reward for
terminating with Rs 40 should be the same regardless of how we got there (and
equivalently for Rs 0).
COMPUTER SCIENCE AND ENGINEERING
1 Explain policy iteration and value iteration? What are their similarities and differences?
2 Why Monte Carlo methods for learning value functions require episodic tasks? How is it
that n-step TD methods avoid this limitation and can work with continuing tasks?
3 List any three uses of the depth parameter in the Monte-Carlo tree search procedure.
4 Given that qπ(s, a) > vπ(s), can we conclude that π is not an optimal policy. Justify
1 Draw the backup diagram for 2-step Sarsa. Write the corresponding learning rule for 2-
step Sarsa.
2 Why is Sarsa an on-policy algorithm while Q-learning is an off-policy algorithm?
3 How would you differentiate between learning algorithms using on-policy from those
that use off-policy?
4 When using Temporal Difference learning, why is it better to learn action values (Q-
values) rather than state values (V-values)?
5 Supose that a Q-learning agent always chooses the action which maximizes the Q-value.
What is one potential problem with that approach?
6 Describe any two ways that will force a Q-learning agent to explore.
7 Why and when do we need importance sampling?
1 How do you deal with a large possible action space in reinforcement learning?
2 List any two benefits of policy gradient methods over value function based methods.
3 What is the relation between Q-learning and policy gradients methods?
4 Consider a five state random walk. There are five states, s1, s2, ..., s5, in a row with two
actions each, left and right. There are two terminal states at each end, with a reward of +1
for terminating on the right, after s5 and a reward of 0 for all other transitions, including
the one terminating on the left after s1. In designing a linear function approximator, what
is the least number of state features required to represent the value of the equi-probable
random policy?
COMPUTER SCIENCE AND ENGINEERING
1 The first three digits of a telephone number are 452. If all the sequences of the
remaining four digits are equally likely, what is the probability that a randomly
selected telephone number contains seven distinct digits?
2 If X is a discrete uniform random variable, i.e., P(X = k) = 1/n for k = 1, 2, ... ,
n, find E(X)and Var(X).
3 Define the discounted return Gt. Give an expression for Gtin terms of Gt+1.
5 Suppose that we are doing value iteration with γ = 0. How many iterations will
it take for value iteration to converge to the optimal value function?
6 List any three advantages of Monte Carlo methods over dynamic programming
techniques?
7 Draw the backup diagram for 2-step Q-learning. Write the corresponding
learning rule for 2-step Q-learning.
8 Why Monte Carlo methods for learning value functions require episodic tasks.
How does n-step TD methods avoid this limitation and can work with
continuing tasks?
9 In using policy gradient methods, if we make use of the average reward
formulation rather than the discounted reward formulation, then is it necessary
to consider, for problems that do not have a unique start state, a designated start
state, s0? Justify.
10 Value function based methods are oriented towards finding deterministic
COMPUTER SCIENCE AND ENGINEERING
policies whereas policy search methods are geared towards finding stochastic
policies. True or false? Justify.
10 x 3 = 30
PART B
Answer any one Question from each module. Each question carries 14 Marks
11 a) Three players play 10 independent rounds of a game, and each player has (7)
probability 1/3 of winning each round. Find the joint distribution of the numbers
of games won by each of the three players.
b) Find the joint density of X + Y and X/Y, where X and Y are independent (7)
exponential random variables with parameter λ. Show that X + Y and X/Yare
independent.
OR
12 a) An experiment consists of throwing a fair coin four times. Find the probability (7)
mass function and the cumulative distribution function of the following random
variables:
i the number of heads before the first tail
ii the number of heads following the first tail
iii the number of heads minus the number of tails
iv the number of tails times the number of heads.
b) Let X be a continuous random variable with probability density function on (7)
2 2
0 <= x <= 1 defined by f(x) = 3x . Find the pdf of Y = X .
13 a) What is the difference between a state value function V(s) and a state-action (4)
value function Q(s,a)?
b) Consider designing a recycling robot whose job is to collect empty bottles (10)
around the building. The robot has a sensor to detect when a bottle is in front of
it, and a gripper to pick up the bottle. It also senses the level of its battery. The
robot can navigate, as well as pick up a bottle and throw a bottle it is holding in
the trash. There is a battery charger in the building, and the robot should not run
out of battery.
i. Describe this problem as an MDP. What are the states and actions?
ii. Suppose that you want the robot to collect as many bottles as possible,
while not running out of battery. Describe what rewards would enable it
to achieve this task.
COMPUTER SCIENCE AND ENGINEERING
OR
b) Consider a 4x4 gridworld where the agent starts in the top left, the bottom righ (10)
state is terminal, rewards are always -1, γ = 1, and state transitions ar
deterministic. Consider the policy that always chooses the action to move down
except when it is on the bottom row, at which point it chooses the action to mov
right. Starting with v0(s) = 0 for all s, compute v1, v2, ... , v7.
15 a) During a single iteration of the Value Iteration algorithm, we typically iterate (5)
over the states in S in some order to update Vt(s) to Vt+1(s) for all states s. Is it
possible to do this iterative process in parallel? Explain why or why not.
b) Consider an undiscounted Markov Reward Process with two states A and B. (9)
The transition matrix and reward function are unknown, but you have observed
two sample episodes:
A +3 --> A +2 --> B -4 --> A +4 --> B -3
B -2 --> A +3 --> B -3
i. Using first-visit Monte-Carlo evaluation, estimate the state-value
function V(A),V(B).
ii. Using every-visit Monte-Carlo evaluation, estimate the state-value
function V(A),V(B).
iii. Draw a diagram of the Markov Reward Process that best explains these
two episodes. Show rewards and transition probabilities on your
diagram.
OR
16 a) Suppose you are given a finite set of transition data. Assuming that the Markov (4)
model that can be formed with the given data is the actual MDP from which the
data is generated, will the value functions calculated by the MC and TD
methods necessarily agree? Justify.
b) With respect to the expected Sarsa algorithm, is exploration required as it is in (5)
the normal Sarsa and Q-learning algorithms? Justify.
c) For a specific MDP, suppose we have a policy that we want to evaluate through (5)
the use of actual experience in the environment alone and using Monte Carlo
methods. We decide to use the first-visit approach along with the technique of
always picking the start state at random from the available set of states. Will this
approach ensure complete evaluation of the action value function corresponding
to the policy?
17 a) Consider the following Q[S,A] table (9)
COMPUTER SCIENCE AND ENGINEERING
Assume the discount factor, γ= 0.5, and the step size, α = 0.1. After the
experience (s, a, r, s')=(1, 1, 5, 2), which value of the table gets updated and
what is its new value?
b) What is the difference between Q-learning and Sarsa? (5)
OR
Assume the discount factor, γ= 0.5, and the step size, α = 0.1. After the
experience (s, a, r, s', a')=(1, 1, 5, 2, 1), which value of the table gets updated
and what is its new value?
b) For Q-learning to converge we need to correctly manage the exploration vs. (5)
exploitation tradeoff. What property needs to be hold for the exploration
strategy?
19 a) Given the following sequence of states observed from the beginning of an (8)
episode, s2, s1, s3, s2, s1, s2, s1, s6, what is the eligibility value, e7(s1), of state s1at
time step 7 given trace decay parameter λ, discount rate γ, and initial value,
e0(s1) = 0, when accumulating traces are used? What is the eligibility value if
replacing traces are used?
b) Suppose that we are using a policy gradient method to solve a reinforcement (6)
learning problem and the policy returned by the method is not optimal. Give
three plausible reasons for such an outcome?
OR
Write down the update rule that Sarsa would give for this function.
b) Suppose that in a particular problem, the agent keeps going back to the same
state in a loop. What is the maximum value that can be taken by the eligibility (6)
trace of such a state if we consider accumulating traces with λ = 0.25 and γ =
0.8?
COMPUTER SCIENCE AND ENGINEERING
Teaching Plan
No. of
No Topic Lectures
(42)
Module-1 (Review Of Probability Concepts) TB-2(Ch 2,3,4,5)
(8 hours)
1.1 Axioms of probability, concepts of random variables
1 hour
YEAR OF
LOGIC FOR CATEGORY L T P CREDIT
CST499 INTRODUCTION
COMPUTER SCIENCE
VAC 3 1 0 4 2019
Preamble: This course enables the learners to understand the concepts of various logics used in
computer science. The course covers the standard and most popular logics such as propositional
logic, predicate logic, linear temporal logic, computation tree logic, Hoare logic and modal logic.
This course helps the students to develop solutions for specification and verification of real world
systems.
Prerequisite: Nil
CO1 Explain the concepts of Predicate Logic, Propositional Logic, Linear Temporal Logic,
Computation Tree Logic, Hoare Logic and Modal Logic as a formal language.
(Cognitive Knowledge Level: Understand)
CO2 Develop proofs to show the satisfiability, validity and equivalence of logic
formulas.(Cognitive Knowledge Level: Apply)
CO4 Demonstrate Alloy Analyzer to model and analyze software systems. (Cognitive
Knowledge Level: Apply)
CO5 Demonstrate New Symbolic Model Verifier (NuSMV) as a model checking tool to check
the validity of temporal logic formulas.(Cognitive Knowledge Level: Apply)
CO1
CO2
CO3
CO4
COMPUTER SCIENCE AND ENGINEERING
CO5
Conduct investigations of
PO4 complex problems PO10 Communication
Assessment Pattern
Remember 30 30 30
Understand 30 30 30
Apply 40 40 40
Analyze
Evaluate
Create
Mark Distribution
150 50 100 3
COMPUTER SCIENCE AND ENGINEERING
2. A familiar command missing from the core language (described in the text book) is the for-
statement. It may be used to sum the elements in an array, for example, by programming
as follows:
s = 0;
for (i = 0; i <= max; i = i+1) {
s = s + a[i];
}
After performing the initial assignment s = 0, this executes i = 0 first, then executes the
body s = s + a[i] and the incrementation i = i + 1 continually untili<= max becomes false.
Explain how for(C1;B;C2) {C3} can be defined as a derived program in our core language.
PART A
4. Let 𝜙𝜙 be ∃𝑥𝑥 (𝑃𝑃(𝑦𝑦, 𝑧𝑧) ⋀ (∀𝑦𝑦 (~𝑄𝑄(𝑦𝑦, 𝑥𝑥) ⋁ 𝑃𝑃(𝑦𝑦, 𝑧𝑧)))), where 𝑃𝑃 and 𝑄𝑄 are predicate
symbols with two arguments. Identify all bound and free variables in 𝜙𝜙.
6. Prove that the LTL equivalence between 𝜙𝜙 𝑈𝑈 𝜓𝜓and~ �~𝜓𝜓 𝑈𝑈 (~𝜙𝜙 ⋀ ~𝜓𝜓)� ⋀ 𝐹𝐹𝐹𝐹.
Part B
(Answer any one question from each module. Each question carries 14 Marks)
11. (a) Give the rules for Natural Deduction in propositional logic. (6)
(b) Use Natural Deduction to show the equivalence of the following formulas. (8)
a. (𝑝𝑝 ⋀ 𝑞𝑞) ⋀ 𝑟𝑟 , 𝑠𝑠 ⋀ 𝑡𝑡 ⊢ 𝑞𝑞 ⋀ 𝑠𝑠
b. (𝑞𝑞 ⟶ 𝑟𝑟) ⟶ ((~𝑞𝑞 ⟶ ~𝑝𝑝) ⟶ (𝑝𝑝 ⟶ 𝑟𝑟))
OR
12. (a) What is a Horn Formula? How do you decide the satisfiability of a Horn (6)
formula.
13. (a) Use Natural Deduction to prove the following equivalences. (8)
a. ∀𝑥𝑥�𝑄𝑄(𝑥𝑥) → 𝑅𝑅(𝑥𝑥)�, ∃𝑥𝑥(𝑃𝑃(𝑥𝑥)⋀ 𝑄𝑄(𝑥𝑥)) ⊢ ∃𝑥𝑥(𝑃𝑃(𝑥𝑥)⋀𝑅𝑅(𝑥𝑥))
b. ∃𝑥𝑥𝑥𝑥(𝑥𝑥), ∀𝑥𝑥�𝑃𝑃(𝑥𝑥) ⟶ 𝑄𝑄(𝑥𝑥)� ⊢ ∀𝑦𝑦𝑦𝑦(𝑦𝑦)
(b) Illustrate how Quantifier Equivalences can be used to check the equivalence (6)
of predicate logic formulas.
OR
There is an entity named Person, Man and Woman are two specializations of
the entity Person. Every Person has a Father (a Man) and a Mother as
Parent. The Parents of a Person should be married. A Man’s spouse should
be a Woman and a Woman’s spouse should be a Man. The spouse relation
is symmetric.
COMPUTER SCIENCE AND ENGINEERING
(b) Explain Existential Second Order Logic and Universal Second Order Logic. (7)
15. (a) Model the Ferryman problem using New Symbolic Model Verifier (7)
(NuSMV).
(b) Construct a Generalized Buchi Automaton for the LTL formula 𝒪𝒪𝒪𝒪. (7)
OR
16. (a) Show the closure of the LTL formula ~𝑝𝑝 𝑈𝑈 (𝐹𝐹 𝑟𝑟 ⋁ 𝐺𝐺 ~𝑞𝑞 ⟶ 𝑞𝑞 𝑊𝑊 ~𝑟𝑟). (7)
17. (a) Illustrate partial correctness and total correctness in program verification. (7)
(b) (7)
OR
18. (a) Consider the program for computing the factorial of a number as given below. (7)
19. (a) Let ℱ = (𝑊𝑊, 𝑅𝑅) be a frame. Prove the two claims given below. (7)
OR
(b) Find a modal logic to formalize and solve The Wise-Men Puzzle. (6)
COMPUTER SCIENCE AND ENGINEERING
Teaching Plan
No. of
Lecture
No Contents Hours
(45 hrs)
Module-1(Propositional Logic) (8 hours)
3.1 Motivation for Verification, Linear Time Temporal Logic (LTL) - Syntax 1 hour
Semantics of LTL – Practical Patterns of Specifications, Important
3.2 Equivalences between LTL Formulas, Adequate Sets of Connectives for 1 hour
LTL
3.3 Introduction to model checking 1 hour
3.4 Model Checking Systems, Tools, Properties 1 hour
3.5 Model checking example: Mutual Exclusion 1 hour
The New Symbolic Model Verifier (NuSMV) Model Checker –
3.6 1 hour
Introduction, Mutual Exclusion Revisited
3.7 The NuSMV Model Checker – The Ferryman, The Alternating Bit Protocol 1 hour
Branching Time Logic – Syntax of Computation Tree Logic (CTL),
3.8 1 hour
Semantics of CTL
Practical Patterns of Specification, Important Equivalences between CTL
3.9 1 hour
Formulas, Adequate Sets of CTL Connectives
CTL and the Expressive Powers of LTL and CTL – Boolean Combinations
3.10 1 hour
of Temporal Formulas in CTL
3.11 Model-Checking Algorithms – The CTL Model Checking Algorithm 1 hour
3.12 CTL Model Checking with Fairness 1 hour
3.13 The LTL Model Checking Algorithm (Algorithm only) 1 hour
Module-4 (Program Verification) (8 hours)
Introduction to Program Verification, Need of Specification and Verification of
4.1 1 hour
Code
SEMESTER VIII
COMPUTER SCIENCE AND ENGINEERING
YEAR OF
DISTRIBUTED CATEGORY L T P CREDIT INTRODUCTION
CST402
COMPUTING PCC 2 1 0 3 2019
Preamble: The purpose of this course is to understand the system models, algorithms and protocols
that allow computers to communicate and coordinate their actions to solve a problem. This course
helps the learner to understand the distributed computation model and various concepts like global
state, termination detection, mutual exclusion, deadlock detection, shared memory, failure recovery,
consensus, file system. It helps the learners to develop solutions to problems in distributed computing
environment.
Prerequisite: Basic knowledge in data structures and operating systems.
Course Outcomes: After the completion of the course the student will be able to
CO1 Summarize various aspects of distributed computation model and logical time.
(Cognitive Knowledge Level: Understand)
CO2 Illustrate election algorithm, global snapshot algorithm and termination detection
algorithm. (Cognitive Knowledge Level: Apply)
CO3 Compare token based, non-token based and quorum based mutual exclusion
algorithms. (Cognitive Knowledge Level: Understand)
CO4 Recognize the significance of deadlock detection and shared memory in distributed
systems. (Cognitive Knowledge Level: Understand)
CO5 Explain the concepts of failure recovery and consensus. (Cognitive Knowledge Level:
Understand)
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO1 PO11 PO1
0 2
CO1
CO2
CO3
CO4
CO5
CO6
Conduct investigations of
PO4 complex problems PO10 Communication
Assessment Pattern
Remember 30 30 30
Understand 50 50 50
Apply 20 20 20
Analyze
Evaluate
Create
Mark Distribution
150 50 100 3
Syllabus
Module – 1 (Distributed systems basics and Computation model)
Distributed System – Definition, Relation to computer system components, Motivation, Primitives
for distributed communication, Design issues, Challenges and applications. A model of distributed
computations – Distributed program, Model of distributed executions, Models of communication
networks, Global state of a distributed system, Cuts of a distributed computation, Past and future
cones of an event, Models of process communications.
Module – 2 (Election algorithm, Global state and Termination detection)
Logical time – A framework for a system of logical clocks, Scalar time, Vector time. Leader election
algorithm – Bully algorithm, Ring algorithm. Global state and snapshot recording algorithms –
System model and definitions, Snapshot algorithm for FIFO channels – Chandy Lamport algorithm.
Termination detection – System model of a distributed computation, Termination detection using
distributed snapshots, Termination detection by weight throwing,Spanning-tree-based algorithm.
Distributed shared memory – Abstraction and advantages. Shared memory mutual exclusion –
Lamport’s bakery algorithm. Check pointing and rollback recovery – System model, consistent and
inconsistent states, different types of messages, Issues in failure recovery, checkpoint based
recovery, log based roll back recovery.
Module – 5 (Consensus and Distributed file system)
Consensus and agreement algorithms – Assumptions, The Byzantine agreement and other problems,
Agreement in (message-passing) synchronous systems with failures – Consensus algorithm for crash
COMPUTER SCIENCE AND ENGINEERING
failures. Distributed file system – File service architecture, Case studies: Sun Network File System,
Andrew File System, Google File System.
(Note: Proof of correctness and performance analysis are not expected for any of the algorithms
in the syllabus).
Text Books
1. Ajay D. Kshemkalyani and Mukesh Singhal, Distributed Computing: Principles, Algorithms, and
Systems, Cambridge University Press, 2011.
Reference Books
1. George Coulouris, Jean Dollimore, Tim Kindberg and Gordon Blair. Distributed Systems:
Concepts and Design, Addison Wesley, Fifth edition.
2. Kai Hwang, Geoffrey C Fox, Jack J Dongarra, Distributed and Cloud Computing – From
Parallel Processing to the Internet of Things, Morgan Kaufmann Publishers, 2012.
3. Sukumar Ghosh, Distributed Systems: An Algorithmic Approach, CRC Press, Second edition,
2015.
4. Maarten Van Steen, Andrew S. Tanenbaum, Distributed Systems, Prentice Hall of India,Third
edition, 2017.
5. Randy Chow and Theodore Johnson, Distributed Operating Systems and Algorithm Analysis,
Pearson Education India, First edition, 2009.
6. Valmir C. Barbosa, An Introduction to Distributed Algorithms, MIT Press, 2003.
QP CODE:
PART A
1. Identify any three distributed applications and for each application, determine
which all motivating factors are important for building an application over a
distributed system.
2. Assume that the surface of the past cone form a consistent cut. Does it mean that
all events on the surface of the past cone are always concurrent? Demonstrate with
the help of an example.
5. Describe how quorum-based mutual exclusion algorithms differ from the other
categories of mutual exclusion algorithms.
10. Differentiate between whole file serving and whole file caching in Andrew file (10x3=30)
system
Part B
(Answer any one question from each module. Each question carries 14 Marks)
11. (a) Explain the three different models of the service provided by communication (6)
networks.
(b) Explain how the causal dependency between events in distributed execution is (8)
defined using Lamport’s happened before relationship.
OR
12. (a) Address the various strategies that can be adopted to satisfy the requirements (6)
of a reliable and fault tolerant distributed system.
(b) Which are the different versions of send and receive primitives for distributed (8)
communication? Explain.
13. (a) Illustrate bully algorithm for electing a new leader. Does the algorithm meet (7)
liveness and safety conditions?
(b) Clearly mentioning assumptions, explain the rules of termination detection (7)
using distributed snapshots.
OR
14. (a) In Chandy-Lamport algorithm for recording global snapshots, explain how the (6)
recorded local snapshots can be put together to create the global snapshot.
Can multiple processes initiate the algorithm concurrently?
(b) Illustrate the working of spanning tree based termination detection algorithm. (8)
15. (a) Explain and illustrate Lamport’s mutual exclusion algorithm. (8)
(b) Discuss the three types of messages required for deadlock handling in (6)
Maekawa’s algorithm. Explain how Maekawa’s algorithm handles deadlocks.
OR
COMPUTER SCIENCE AND ENGINEERING
16. (a) Explain and illustrate Ricart- Agrawala algorithm for achieving mutual (8)
exclusion.
17. (a) What are the issues in failure recovery? Illustrate with suitable examples. (7)
(b) Show that Lamport’s Bakery algorithm for shared memory mutual exclusion, (7)
satisfy the three requirements of critical section problem.
OR
18. (a) Differentiate consistent and inconsistent states with examples. (4)
19. (a) Explain consensus algorithm for crash failures under synchronous systems. (6)
OR
Teaching Plan
No. of
Lecture
No Contents Hours
(35
hours)
Module – 1(Distributed systems basics and Computation model) (7 hours)
* Proof of correctness and performance analysis are not expected for this algorithm.
COMPUTER SCIENCE AND ENGINEERING
The objective of this Course viva is to ensure the basic knowledge of each student in the most
fundamental core courses in the curriculum. The viva voce shall be conducted based on the core
subjects studied from third to eighth semester. This course helps the learner to become competent in
placement tests and other competitive examinations.
Guidelines
1. The course should be mapped with a faculty and classes shall be arranged for practicing
questions based on the core courses listed in the curriculum.
2. The viva voce will be conducted by the same three member committee assigned for final
project phase II evaluation. It comprises of Project coordinator, expert from
Industry/research Institute and a senior faculty from a sister department.
3. The pass minimum for this course is 25.
4. The mark will be treated as internal and should be uploaded along with internal marks of
other courses.
5. Comprehensive Viva should be conducted along with final project evaluation by the three
member committee.
Mark Distribution
Total marks: 50, only CIE, minimum required to pass : 25
COMPUTER SCIENCE AND ENGINEERING
CATEGORY L T P CREDIT
CSD416 PROJECT PHASE II
PWS 0 0 12 4
Preamble: The course ‘Project Work’ is mainly intended to evoke the innovation and invention
skills in a student. The course will provide an opportunity to synthesize and apply the knowledge
and analytical skills learned, to be developed as a prototype or simulation. The project extends to
2 semesters and will be evaluated in the 7th and 8th semester separately, based on the achieved
objectives. One third of the project credits shall be completed in 7th semester and two third in 8th
semester. It is recommended that the projects may be finalized in the thrust areas of the
respective engineering stream or as interdisciplinary projects. Importance should be given to
address societal problems and developing indigenous technologies.
Course Objectives
To apply engineering knowledge in practical problem solving.
To foster innovation in design of products, processes or systems.
To develop creative thinking in finding viable solutions to engineering problems.
Course Outcomes [COs]: After successful completion of the course, the students will be able to:
Model and solve real world problems by applying knowledge across domains
CO1
(Cognitive knowledge level: Apply).
Develop products, processes or technologies for sustainable and socially relevant
CO2
applications (Cognitive knowledge level: Apply).
Function effectively as an individual and as a leader in diverse teams and to
CO3
comprehend and execute designated tasks (Cognitive knowledge level: Apply).
Plan and execute tasks utilizing available resources within timelines, following ethical
CO4
and professional norms (Cognitive knowledge level: Apply).
Identify technology/research gaps and propose innovative/creative solutions
CO5
(Cognitive knowledge level: Analyze).
Organize and communicate technical and scientific findings effectively in written and
CO6
oral forms (Cognitive knowledge level: Apply).
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO1 2 2 2 1 2 2 2 1 1 1 1 2
CO2 2 2 2 1 3 3 1 1 1 1
CO3 3 2 2 1
CO4 2 3 2 2 3 2
CO5 2 3 3 1 2 1
CO6 2 2 2 3 1 1
COMPUTER SCIENCE AND ENGINEERING
Conduct investigations of
PO4 complex problems PO0 Communication
PROJECT PHASE II
Phase 2 Targets
In depth study of the topic assigned in the light of the report prepared under Phase - I;
Review and finalization of the approach to the problem relating to the assigned topic.
Preparing a detailed action plan for conducting the investigation, including teamwork.
Detailed Analysis/ Modeling / Simulation/ Design/ Problem Solving/Experiment as
needed.
Final development of product/ process, testing, results, conclusions and future
directions.
Preparing a paper for Conference Presentation/ Publication in Journals, if possible.
Presenting projects in Project Expos conducted by the University at the cluster level
and/ or state level as well as others conducted in India and abroad.
Filing Intellectual Property Rights (IPR) if applicable.
Preparing a report in the standard format for being evaluated by the Department
Assessment Board.
Final project presentation and viva voce by the assessment board including the
external expert.
(The evaluation committee comprises HoD or a senior faculty member, Project coordinator
and project supervisor. The final evaluation committee comprises of Project coordinator,
expert from Industry/research/academic Institute and a senior faculty from a sister
department).
COMPUTER SCIENCE AND ENGINEERING
Project Scheduling & Distribution of Work among Team members: Detailed and extensive
Scheduling with timelines provided for each phase of project. Work breakdown structure well
defined. (5)
Student’s Diary/ Daily Log: The main purpose of writing daily diary is to cultivate the habit of
documenting and to encourage the students to search for details. It develops the students’ thought
process and reasoning abilities. The students should record in the daily/weekly activity diary the
day to day account of the observations, impressions, information gathered and suggestions given,
if any. It should contain the sketches & drawings related to the observations made by the
students. The daily/weekly activity diary shall be signed after every day/week by the guide. (7)
Completion of the project: The students should demonstrate the project to their respective
guide. The guide shall verify the results and see that the objectives are met. (5)
EVALUATION RUBRICS for PROJECT Phase II: Interim Evaluation - 1
No. Parameters Marks Poor Fair Very Good Outstanding
Good evidence of an implementable
Some of the aspects of the proposed
The project is not addressing any project. There is some evidence for The project has evolved into incorporating
idea can be implemented. There is
useful requirement. The idea is the originality of the work done by the an outstandingly novel idea. Original work
still lack of originality in the work
Novelty of idea, and evolved into a non-implementable team . There is fresh specifications/ which is not yet reported anywhere else.
done so far by the team. The project
Implementation scope one. The work presented so far is features/improvements suggested by Evidence for ingenious way of innovation
2-a 5 is a regularly done theme/topic
[CO5] lacking any amount of original work the team. The team is doing a design which is also Implementable. Could be a
without any freshness in terms of
[Group Evaluation] by the team. from fundamental principles, and patentable / publishable work.
specifications, features, and/or
there is some independent learning
improvements.
and engineering ingenuity.
Little or no evidence of continued There is some improvement in the Good evidence of planning done and Excellent evidence of enterprising and
planning or scheduling of the primary plan prepared during phase I. being followed up to a good extent extensive project planning and follow-up
project. The students did not stick to There were some ideas on the since phase I. Continued use of project
after phase I. Materials were listed
Adherence to project the plan what they were going to materials /resources required, but not and thought out, but the plan wasn't management/version control tool to track
schedule. build nor plan on what materials / really thought out. The students have the project. Material procurement if
2-c 5 followed completely. Schedules were
[CO4] resources to use in the project. The some idea on the finances required, prepared, but not detailed, and needs applicable is progressing well. Tasks are
[Group Evaluation] students do not have any idea on the but they have not formalized a budget improvement. Project journal is updated and incorporated in the schedule.
budget required even after the end of plan. Schedules were not prepared. presented but it is neither complete A well-kept project journal showed
phase - I. No project journal kept or The project journal has no useful nor updated regularly. evidence for all the above, in addition to
the journal. details on the project. the interaction with the project guide.
The student does not show any The student appears to apply some The student is able to show some Excellent knowledge in design procedure
Application of evidence of applying engineering basic knowledge, but not able to evidence of application of engineering and its adaptation. The student is able to
engineering knowledge on the design and the show the design procedure and the knowledge in the design and apply knowledge from engineering
knowledge methodology adopted. The student's methodologies adopted in a development of the project to good domains to the problem and develop
2-f [CO1] 10 contribution in application of comprehensive manner. extent. solutions.
[Individual engineering knowledge in the project
Assessment] is poor.
None of the expected outcomes are Many of the expected outcomes are Most of the stated outcomes are met.
Only a few of the expected outcomes
Results and achieved yet. The team is unable to achieved. Many observations and Extensive studies are done and inferences
are achieved. A few inferences are
inferences upon derive any inferences on the failures/ inferences are made, and attempts to drawn. Most of the failures are addressed
5 made on the observed failures/issues.
execution [CO5] issues observed. Any kind o f identify the issues are done. Some and solutions suggested. Clear and valid
2-h No further work suggested.
[Group Assessment] observations or studies are not made. suggestions are made for further work. suggestions made for further work.
Documentatio n and The individual student has no idea on The individual's presentation is done
Presentation's overall quality needs The individual’s presentation
presentation. the presentation of his/her part. The professionally and with great clarity. The
5 to be improved. performance is satisfactory.
2-i .[CO6] presentation is of poor quality. individual’s performance is excellent.
[Individual assessment]
(0 - 1 Marks) (2 - 3 Marks) (4 Marks) (5 Marks)
The prepared report is shallow and not Project report shows evidence of
Project report follows the standard The report is exceptionally good. Neatly
as per standard format. It does not systematic documentation. Report is
format to some extent. However, its organized. All references cited properly.
follow proper organization. Contains mostly following the standard style
organization is not very good. Diagrams/Figures, Tables and equations
mostly unacknowledged content. Lack format and there are only a few issues.
2-o Report [CO6] 30 Language needs to be improved. All are properly numbered, and listed and
of effort in preparation is evident. Organization of the report is good.
references are not cited properly in the clearly shown. Language is excellent and
References are not cited. Mostly consistently formatted. Most of
report. There is lack of formatting follows professional styles. Consistent
Unprofessional and inconsistent references/sources are cited/
consistency. formatting and exceptional readability.
formatting. acknowledged properly.
SEMESTER VIII
PROGRAM ELECTIVE III
COMPUTER SCIENCE AND ENGINEERING
YEAR OF
CATEGORY L T P CREDIT INTRODUCTION
CST414 DEEP LEARNING
PEC 2 1 0 3 2019
Preamble: Deep Learning is the recently emerged branch of machine learning, particularly
designed to solve a wide range of problems in Computer Vision and Natural Language Processing.
In this course, the building blocks used in deep learning are introduced. Specifically, neural
networks, deep neural networks, convolutional neural networks and recurrent neural networks.
Learning and optimization strategies such as Gradient Descent, Nesterov Accelerated Gradient
Descent, Adam, AdaGrad and RMSProp are also discussed in this course. This course will helps
the students to attain sound knowledge of deep architectures used for solving various Vision and
NLP tasks. In future, learners can master modern techniques in deep learning such as attention
mechanisms, generative models and reinforcement learning.
Prerequisite: Basic understanding of probability theory, linear algebra and machine learning
Course Outcomes: After the completion of the course, the student will be able to
CO1 Illustrate the basic concepts of neural networks and its practical issues
(Cognitive Knowledge Level: Apply)
CO2 Outline the standard regularization and optimization techniques for deep neural
network (Cognitive Knowledge Level: understand)
CO5 Use different neural network/deep learning models for practical applications.
(Cognitive Knowledge Level: Apply)
COMPUTER SCIENCE AND ENGINEERING
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO1
CO2
CO3
CO4
CO5
Assessment Pattern
Remember 30 30 30
Understand 30 30 30
Apply 40 40 40
COMPUTER SCIENCE AND ENGINEERING
Analyze
Evaluate
Create
Mark Distribution
150 50 100 3
Syllabus
Module-1 (Neural Networks )
Introduction to neural networks -Single layer perceptrons, Multi Layer Perceptrons (MLPs),
Representation Power of MLPs, Activation functions - Sigmoid, Tanh, ReLU, Softmax. , Risk
minimization, Loss function, Training MLPs with backpropagation, Practical issues in neural
network training - The Problem of Overfitting, Vanishing and exploding gradient problems,
Difficulties in convergence, Local and spurious Optima, Computational Challenges. Applications
of neural networks.
Introduction to deep learning, Deep feed forward network, Training deep models, Optimization
techniques - Gradient Descent (GD), GD with momentum, Nesterov accelerated GD, Stochastic
GD, AdaGrad, RMSProp, Adam. Regularization Techniques - L1 and L2 regularization, Early
stopping, Dataset augmentation, Parameter sharing and tying, Injecting noise at input, Ensemble
methods, Dropout, Parameter initialization.
Recurrent neural networks – Computational graphs, RNN design, encoder – decoder sequence to
sequence architectures, deep recurrent networks, recursive neural networks, modern RNNs LSTM
and GRU.
Applications – computer vision, speech recognition, natural language processing, common word
embedding: continuous Bag-of-Words, Word2Vec, global vectors for word representation
(GloVe). Research Areas – autoencoders, representation learning, boltzmann machines, deep
belief networks.
Text Books
1. Goodfellow, I., Bengio,Y., and Courville, A., Deep Learning, MIT Press, 2016.
2. Neural Networks and Deep Learning, Aggarwal, Charu C.
3. Fundamentals of Deep Learning: Designing Next-Generation Machine Intelligence
Algorithms (1st. ed.). Nikhil Buduma and Nicholas Locascio. 2017. O'Reilly Media, Inc.
COMPUTER SCIENCE AND ENGINEERING
Reference Books
1. Satish Kumar, Neural Networks: A Classroom Approach, Tata McGraw-Hill Education,
2004.
2. Yegnanarayana, B., Artificial Neural Networks PHI Learning Pvt. Ltd, 2009.
3. Michael Nielsen, Neural Networks and Deep Learning, 2018
2. Design a single layer perceptron to compute the NAND (not-AND) function. This
function receives two binary-valued inputs x1 and x2, and returns 0 if both inputs are
1, and returns 1 otherwise.
3. Suppose we have a fully connected, feed-forward network with no hidden layer, and
5 input units connected directly to 3 output units. Briefly explain why adding a
hidden layer with 8 linear units does not make the network any more powerful.
4. Briefly explain one thing you would use a validation set for, and why you can’t just
do it using the test set.
6. You would like to train a fully-connected neural network with 5 hidden layers, each
with 10 hidden units. The input is 20-dimensional and the output is a scalar. What is
the total number of trainable parameters in your network?
2. In stochastic gradient descent, each pass over the dataset requires the same number
of arithmetic operations, whether we use minibatches of size 1 or size 1000. Why
can it nevertheless be more computationally efficient to use minibatches of size
1000?
COMPUTER SCIENCE AND ENGINEERING
3. State how to apply early stopping in the context of learning using Gradient Descent.
Why is it necessary to use a validation set (instead of simply using the test set) when
using early stopping?
4. Suppose that a model does well on the training set, but only achieves an accuracy of
85% on the validation set. You conclude that the model is overfitting, and plan to
use L1 or L2 regularization to fix the issue. However, you learn that some of the
examples in the data may be incorrectly labeled. Which form of regularisation
would you prefer to use and why?
5. Describe one advantage of using Adam optimizer instead of basic gradient descent.
QP CODE:
PART A
2. List the advantages and disadvantages of sigmoid and ReLU activation functions.
3. Derive weight updating rule in gradient descent when the error function is a)
mean squared error b) cross entropy.
5. What happens if the stride of the convolutional layer increases? What can be the
maximum stride? Explain.
6. Draw the architecture of a simple CNN and write short notes on each block.
Part B
(Answer any one question from each module. Each question carries 14 Marks)
11. (a) Update the parameters in the given MLP using gradient descent with learning (10)
rate as 0.5 and activation function as ReLU. Initial weights are given as
𝑉𝑉 = 0.1 0.2 0 .1 0.1 W= 0.1 0.1
(b) Explain the importance of choosing the right step size in neural networks. (4)
OR
12. (a) Draw the architecture of a multi-layer perceptron. Derive update rules for (10)
parameters in the multi-layer neural network through the gradient descent
(b) Calculate the output of the following neuron Y if the activation function is a (4)
binary sigmoid.
COMPUTER SCIENCE AND ENGINEERING
13. (a) Explain, what might happen in ADAGRAD, where momentum is expressed (6)
as ∆𝑤𝑤𝑡𝑡 = −𝜂𝜂𝑔𝑔𝑡𝑡 /√(∑𝑡𝑡𝜏𝜏=1 𝑔𝑔𝜏𝜏2 ) where the denominator computes the L2
norm of all previous gradients on a per-dimension basis and is a global
learning rate shared by all dimensions.
(b) Differentiate gradient descent with and without momentum. Give equations (8)
for weight updation in GD with and without momentum. Illustrate plateaus,
saddle points and slowly varying gradient.
OR
14. (a) Suppose a supervised learning problem is given to model a deep feed forward (9)
neural network. Suggest solutions for the following a) small sized dataset for
training b) dataset with unlabeled data c) large data set but data from different
distribution.
(b) Describe the effect in bias and variance when a neural network is modified (5)
with more number of hidden units followed with dropout regularization
15. (a) Draw and explain the architecture of Convolutional Neural Networks (8)
(b) Suppose that a CNN was trained to classify images into different categories. (6)
It performed well on a validation set that was taken from the same source as
the training set but not on a testing set, which comes from another
distribution. What could be the problem with the training of such a CNN?
How will you ascertain the problem? How can those problems be solved?
OR
16. (a) What is the motivation behind convolution neural networks? (4)
(b) Discuss all the variants of the basic convolution function. (10)
17. (a) Describe how an LSTM takes care of the vanishing gradient problem. Use (8)
some hypothetical numbers for input and output signals to explain the
concept.
(b) Draw and explain the architecture of Recurrent Neural Networks (6)
OR
COMPUTER SCIENCE AND ENGINEERING
18. (a) Explain the application of LSTM in Natural Language Processing. (8)
(b) Explain the merits and demerits of using Autoencoders in Computer Vision. (6)
OR
20. (a) Illustrate the use of representation learning in object classification. (7)
Teaching Plan
No. of
Lecture
No Contents Hours
(36 hrs)
YEAR OF
PROGRAMMING CATEGORY L T P CREDIT
CST424 INTRODUCTION
PARADIGMS
PEC 2 1 0 3 2019
Preamble: The course provides the learners a clear understanding of the main constructs of
contemporary programming languages and the various systems of ideas that have been used to
guide the design of programming languages. This course covers the concepts of Names, Bindings
& Scope, Statement-Level Control Structures, Sub Programs, Support for Object Oriented
Programming, Exception Handling, Concurrency Control, Functional Programming and Logic
Programming. This course helps the learners to equip with the knowledge necessary for the critical
evaluation of existing and upcoming programming languages. It also enables the learner to choose
the most appropriate language for a given programming task, apply that language's approach to
structure or organize the code, classify programming languages based on their features and to
design new generation languages.
Prerequisite: Sound knowledge in Programming in C and Object-Oriented Programming.
Mapping of course outcomes with program outcomes
Explain the criteria for evaluating programming languages and compare Imperative,
CO1 Functional and Logic programming languages (Cognitive Knowledge Level:
Understand)
Illustrate the characteristics of data types and variables (Cognitive Knowledge Level:
CO2
Apply)
Comprehend how control flow structures and subprograms help in developing the
CO3 structure of a program to solve a computational problem (Cognitive Knowledge
Level: Apply)
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO1
CO2
CO3
CO4
CO5
Conduct investigations of
PO4 complex problems PO10 Communication
Assessment Pattern
Remember 30 30 30
Understand 40 40 40
COMPUTER SCIENCE AND ENGINEERING
Apply 30 30 30
Analyze
Evaluate
Create
Mark Distribution
150 50 100 3
x : integer – – global
procedure foo(y : integer)
y := 3
print x
...
COMPUTER SCIENCE AND ENGINEERING
x := 2
foo(x)
print x
Syllabus
Module – 1
Introduction – Role of Programming Languages, Programming Domains, Language Evaluation
Criteria, Influence on Language Design, Language Design Trade-offs, Implementation Methods.
Names, Bindings & Scope – Names, Variables, Concept of Binding, Scope and Lifetime,
Referencing Environments.
Module - 2
Data Types – Primitive Data Types, Character String Types, User-Defined Ordinal Types, Array
Types, Record Types, List Types, Pointer & Reference Types, Type Checking, Strong Typing,
Type Equivalence. Expressions – Arithmetic Expressions, Overloaded Operators, Type
Conversions, Relational and Boolean Expressions, Short-Circuit Evaluation. Assignment -
Assignment Statements, Mixed-mode Assignment.
Module - 3
Statement-Level Control Structures – Selection Statements, Iterative Statements, Unconditional
Branching, Guarded Commands. Subprograms – Design Issues of Subprograms, Local
Referencing Environments, Parameter Passing Methods, Subprograms as Parameters,
Overloaded Subprograms, Closures, Co-routines
Module - 4
Support for Object Oriented Programming – Inheritance, Dynamic Binding, Design Issues for
Object Oriented Languages, Support for Object Oriented Programming in C++, Implementation
of Object-oriented Constructs. Exception Handling – Basic Concepts, Design Issues.
Module - 5
Concurrency – Subprogram Level Concurrency, Semaphores, Monitors, Message Passing.
Functional Programming Languages – Introduction to LISP and Scheme, Comparison of
COMPUTER SCIENCE AND ENGINEERING
5. Why for statement in C language is more flexible than that of older languages?
COMPUTER SCIENCE AND ENGINEERING
Part B
(Answer any one question from each module. Each question carries 14 Marks)
11. (a) Explain different criteria used for evaluating languages. (7)
write integer(x)
(a) What does this program print if the language uses static scoping? Give
reasons.
(b) What does it print if the language uses dynamic scoping? Give reasons.
OR
12. (a) With respect to storage binding, explain the meanings, purposes, advantages and (7)
disadvantages of four categories of scalar variables.
referencing environment at the indicated program points (1), (2), (3) & (4) for
the following program segment. Assume that the programming language is
statically scoped.
program example;
var a, b : integer;
procedure sub1;
var x, y: integer;
begin { sub1 }
……….. (1)
end { sub1 }
procedure sub2;
var x : integer;
……..
procedure sub3;
var x: integer;
begin { sub3 }
……….. (2)
end { sub3 }
begin { sub2 }
……….. (3)
end { sub2}
begin {example}
……….. (4)
end {example }
13. (a) Explain any two issues associated with the pointer data types and also indicate (7)
how dangling pointer problem can be solved.
(b) Describe the lazy and eager approaches for reclaiming garbage. (7)
OR
14. (a) What is meant by side effect and illustrate the advantages of referential (8)
transparency?
(b) Explain the terms: compound assignment operator, coercion and short circuit (6)
evaluation.
COMPUTER SCIENCE AND ENGINEERING
15. (a) Illustrate the different categories of iteration control statements. (8)
(b) Explain the techniques used for identifying the correct referencing environment (6)
for a subprogram that was sent as a parameter.
OR
16. (a) Describe the implementation models of Parameter passing. (10)
(b) Differentiate coroutines from conventional subprograms. (4)
17. (a) What is meant by an exception handler? Explain how exceptions are handled in (7)
object-oriented languages.
(b) Describe the design issues in object-oriented languages. (7)
OR
18. (a) Illustrate how a virtual method table can be used for implementing dynamic (7)
method binding.
(b) Explain the different categories, merits and demerits of inheritance. (7)
19. (a) Compare functional and imperative programming languages. (7)
(b) Explain the role of monitors in concurrency. (7)
OR
20. (a) Explain the searching strategies used in Prolog. Why backward chaining is (10)
preferred over forward chaining in Prolog?
(b) (let ((a 6) (4)
(b 8)
(square (lambda (x) (* x x)))
(plus +))
(sqrt (plus (square a) (square b))))
Write the output of the above code? Explain how let and lambda construct
works?
COMPUTER SCIENCE AND ENGINEERING
Teaching Plan
No. of
Lecture
No Contents Hours
(36 hrs.)
Module-1 (7 hours)
Module-2 (7 hours)
2.3 Record Types, List Types, Pointer and Reference Types 1 hour
Module-3 (8 hours)
Module-4 (7 hours)
Module-5 (7 hours)
YEAR OF
NETWORK SECURITY CATEGORY L T P CREDIT INTRODUCTION
CST434
PROTOCOLS
PEC 2 1 0 3 2019
Preamble: This course helps the learners to explore various network and system security
protocols. This course covers authentication protocols, firewalls and security protocols from
different layers such as data link, network, transport and application. The concepts covered in
this course enable the learners in effective use of security protocols for securing network
applications.
Course Outcomes: After the completion of the course, the student will be able to
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO1
CO2
CO3
CO4
CO5
COMPUTER SCIENCE AND ENGINEERING
Assessment Pattern
End Semester
Bloom’s Category Test 1 (%) Test 2 (%)
Examination (%)
Remember 20 20 20
Understand 50 50 50
Apply 30 30 30
Analyse
Evaluate
Create
Mark Distribution
Attendance : 10 marks
Continuous Assessment Test : 25 marks
Continuous Assessment Assignment : 15 marks
COMPUTER SCIENCE AND ENGINEERING
Each of the two internal examinations has to be conducted out of 50 marks. First series test
shall be preferably conducted after completing the first half of the syllabus and the second
series test shall be preferably conducted after completing remaining part of the syllabus. There
will be two parts: Part A and Part B. Part A contains 5 questions (preferably, 2 questions each
from the completed modules and 1 question from the partly completed module), having 3
marks for each question adding up to 15 marks for part A. Students should answer all
questions from Part A. Part B contains 7 questions (preferably, 3 questions each from the
completed modules and 1 question from the partly completed module), each with 7 marks. Out
of the 7 questions, a student should answer any 5.
There will be two parts; Part A and Part B. Part A contains 10 questions with 2 questions from
each module, having 3 marks for each question. Students should answer all questions. Part B
contains 2 questions from each module of which a student should answer any one. Each
question can have maximum 2 sub-divisions and carries 14 marks.
Syllabus
Text Books
1. William Stallings, Cryptography and Network Security Principles and Practice, 4/e,
Pearson Ed.
2. C. Kaufman, R. Perlman and M. Speciner, “Network Security: Private Communication in a
Public World”, 2/e, PHI.
References
1. Behrouz A. Forouzan, DebdeepMukhopadhyay, “Cryptography and Network Security”, 3/e,
Tata McGraw Hill.
2. Tyler Wrightson, “Wireless Network Security A Beginner’s Guide”, 2012, Tata McGraw Hill.
3. William Stallings, “Network Security Essentials: Applications and Standards”, 4/e, Prentice
Hall.
4. Schiller J., Mobile Communications, 2/e, Pearson Education.
5. Roberta Bragg et. al., “Network Security: The Complete Reference”, Tata McGraw Hill
2. Is it possible for the receiver to reorder SSL record blocks that arrive out of order?
If so, explain how it can be done. If not, why?
Course Outcome 4 (CO4):
1. Devise a protocol based on a pre-shared secret key that hides identities and gives
Perfect Forward Secrecy (PFS) for identity hiding. Make two variants, one in
which an active attacker can learn only the initiator’s identity, and one in which an
active attacker can learn only the target’s identity.
2. Explain the tasks performed by the payment gateway during Payment
Authorization in SET.
Course Outcome 5 (CO5):
1. List the weaknesses of a packet-filtering router.
2. Give the relevance of pair wise keys and group keys in IEEE 802.11i.
3. State the design goals of firewalls.
Reg No:_______________
Name:_________________
2. Specify the significance of key pair recovery. When is the key pair updated?
5. Explain the significance of Alert protocol in SSL and list out any three Alert
messages with their uses.
6. Specify the purpose of MAC during the change cipher spec TLS exchange.
COMPUTER SCIENCE AND ENGINEERING
7. What is the advantage, if any, of not including the MAC in the scope of packet
encryption in SSH packets?
Part B
(Answer any one question from each module. Each question carries 14
Marks)
11. (a) Describe the requirements for a public-key certificate scheme. (8)
OR
12. (a) Specify the purpose of the X.509 standard. How is an X.509 certificate
revoked? (8)
(b) Describe the management functions of a PKI. What is a cross certificate? (6)
13. (a) List the services provided by PGP and explain how authentication and (8)
confidentiality are provided.
OR
14. (a) Give the format of a PGP message and specify the significance of each (8)
field in the message.
15. (a) Explain the parameters that identify an SSL session state. (8)
(b) Differentiate between transport mode and tunnel mode in IPSec. (6)
OR
16. (a) The IPsec architecture document states that when two transport mode SAs (8)
arebundled to allow both AH and ESP protocols on the same end-to-end
flow, only one ordering of security protocols seems appropriate: performing
the ESP protocol before performing the AH protocol. Why is this approach
COMPUTER SCIENCE AND ENGINEERING
(b) List and explain the purpose each Alert Codes supported by SSL. (6)
OR
(b) “The HTTPS capability is built into all modern web browsers”. Justify. (6)
OR
20. (a) Compare the features of three types of firewalls. (8)
(b) Compare the Wireless LAN protocols WEP, WPA and WPA2 (6)
TEACHING PLAN
No Contents No.of
Lecture
Hours
(35 Hrs)
1
2.1 Pretty Good Privacy (PGP) – Operational Description
YEAR OF
CATEGORY L T P CREDIT
INTRODUCTION
CST444 SOFT COMPUTING
PEC 2 1 0 3 2019
Preamble: This course enables the learners to understand the concepts of Soft Computing
techniques and its applications. It covers Artificial Neural Networks, operations and models of
fuzzy logic, genetic algorithms and multi objective optimization techniques. This course helps the
students to develop algorithms and solutions for different real world applications.
Prerequisite: NIL.
CO1 Describe soft computing techniques and the basic models of Artificial Neural Network
(Cognitive Knowledge Level: Understand)
CO2 Solve practical problems using neural networks (Cognitive Knowledge Level: Apply)
CO3 Illustrate the operations, model and applications of fuzzy logic (Cognitive Knowledge
Level: Apply)
CO4 Illustrate the concepts of Genetic Algorithm (Cognitive Knowledge Level: Apply)
CO5 Describe the concepts of multi-objective optimization models and the need for using
hybrid soft computing approaches(Cognitive Knowledge Level: Understand)
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO1
CO2
CO3
CO4
CO5
COMPUTER SCIENCE AND ENGINEERING
Conduct investigations of
PO4 complex problems PO10 Communication
Assessment Pattern
Remember 30 30 30
Understand 30 30 30
Apply 40 40 40
Analyze
Evaluate
Create
Mark Distribution
150 50 100 3
COMPUTER SCIENCE AND ENGINEERING
(b) Find S=ZoR using max-min composition (c) Find T=ZoR using max-product composition
COMPUTER SCIENCE AND ENGINEERING
Syllabus
Module – 1 (Introduction to Soft Computing & Artificial Neural Network)
Introduction to Soft Computing. Difference between Hard Computing & Soft Computing.
Applications of Soft Computing. Artificial Neurons Vs Biological Neurons. Basic models of
artificial neural networks – Connections, Learning, Activation Functions. McCulloch and Pitts
Neuron. Hebb network.
Module – 2 (Supervised Learning Network)
Perceptron Networks– Learning rule, Training and testing algorithm. Adaptive Linear Neuron–
Architecture, Training and testing algorithm. Back propagation Network – Architecture, Training
and testing algorithm.
Module - 3 (Fuzzy Logic & Defuzzification)
Fuzzy sets – properties, operations on fuzzy set. Fuzzy membership functions, Methods of
membership value assignments – intuition, inference, Rank Ordering. Fuzzy relations– operations
on fuzzy relation. Fuzzy Propositions. Fuzzy implications. Defuzzification– Lamda cuts,
Defuzzification methods.
COMPUTER SCIENCE AND ENGINEERING
Text Books
1. S.N.Sivanandam and S.N. Deepa, Principles of Soft Computing , 2ndEdition, John Wiley &
Sons.
2. Kalyanmoy Deb, Multi-objective Optimization using Evolutionary Algorithms, 1st
Edition, John Wiley & Sons.
ReferenceBooks
1. Timothy J Ross, Fuzzy Logic with Engineering Applications, John Wiley & Sons, 2016.
2. T.S.Rajasekaran, G.A.Vijaylakshmi Pai “Neural Networks, Fuzzy Logic & Genetic
Algorithms Synthesis and Applications”, Prentice-Hall India.
3. Simon Haykin, “Neural Networks- A Comprehensive Foundation”, 2/e, Pearson Education.
4. Zimmermann H. J, “Fuzzy Set Theory & Its Applications”, Allied Publishers Ltd.
COMPUTER SCIENCE AND ENGINEERING
QP CODE:
PART A
2. A 4-input neuron has weights 1, 2, 3 and 4. The transfer function is linear with the
constant of proportionality being equal to 2. The inputs are 4, 10, 5 and 20
respectively. Predict the output?
3. Explain the Widrow-Hoff learning rule for supervised learning in neural networks
with help of an example. Why is it sometimes called the LMS learning rule?
4. Implement one epoch of Adaline algorithm for AND logic function with binary
inputs and bipolar outputs. Initial weights are w1=0.2, w2=0.1 and learning rate
parameter η=0.2.
5. 0.2
Consider two fuzzy sets 𝐴𝐴 = � 0 +
0.3 1
+2+
0.1
+
0.5 0.1
� 𝐵𝐵 = � 0 +
0.25
+
0.9
+
0.7
+
1 3 4 1 2 3
0.3
4
� Find the following: (a) Algebraic sum (b) Algebraic product(c) Bounded sum.
6. Using your own intuition and definition of universe of discourse, plot membership
COMPUTER SCIENCE AND ENGINEERING
functions for liquid level (Empty, very less, less, full, very full) in a tank.
Part B
(Answer any one question from each module. Each question carries 14 Marks)
11. (a) Implement XOR function using M-P Neuron Model (with binary input).Why (8)
M-P neuron is widely used in processing binary data?
(b) Using Hebb Network calculate the weight required to perform the following (6)
classification of given input pattern.
L belongs to the members of the class(+)target value +1
Udoes not belongs to members of class(.)target value -1
L U
OR
12. (a) Compare the three learning approaches in Artificial Neural Network. How is (8)
the critic information used in learning process.
(b) Define Hebb Law. Design a Hebb Network to implement logical AND (7)
function. Use bipolar input and targets.
COMPUTER SCIENCE AND ENGINEERING
13. (a) Discuss the training algorithm and explain the weight updates in back (10)
propagation networks.
(b) Implement one epoch of Perceptron training algorithm for OR logic function (4)
with binary input and bipolar output.
OR
14. (a) Explain how synaptic weights are adapted iteration by iteration using error (10)
correction rule in Perceptron convergence algorithm for an OR gate with
bipolar inputs and outputs. Initial weights are all zero and learning rate
parameter η=0.1.
(b) Explain Perceptron convergence theorem and discuss Perceptron algorithm (4)
based on XOR logic function.
(b) For the fuzzy sets given 𝐴𝐴 = �0.5 + 0.2 + 0.9� and𝐵𝐵 = � 1 + 0.5 + 1 �. Find (4)
𝑥𝑥 1 𝑥𝑥 2 𝑥𝑥 3 𝑦𝑦 1 𝑦𝑦 2 𝑦𝑦 3
relation R by performing Cartesian product over the given fuzzy sets.
OR
16. (a) Using inference approach, find the membership values for each of the (8)
triangular shapes (I, R, IR, T) for a triangle with angles 120°, 50°, 10°.
(b) Using Zadeh’s notation, determine the ʎ - cut sets for the given fuzzy sets: (6)
0 0.5 0.65 0.85 1.0 1.0
𝑆𝑆1 = � + + + + + �
0 20 40 60 80 100
0 0.45 0.6 0.8 0.95 1.0
𝑆𝑆2 = � + + + + + �
0 20 40 60 80 100
COMPUTER SCIENCE AND ENGINEERING
Express the following for ʎ = 0.5: a) 𝑆𝑆1 ∪ 𝑆𝑆2 b) 𝑆𝑆´2 c) 𝑆𝑆1 ∩´ 𝑆𝑆2
17. (a) Differentiate between value encoding and permutation encoding. (8)
OR
18. (a) Apply Mamdani fuzzy model to design a controller to determine the wash (10)
time of a domestic washing machine. Assume input is dirt and grease of the
cloth. Use three descriptors for input variable and five descriptors for output
variables .Derive the set of rules for controller action and defuzzification.
Design should be supported by figure wherever possible.
(b) Explain Single-Point Crossover and Two-Point Crossover with example. (4)
19. (a) Explain convex and non convex MOOP? How to find a non dominated set. (10)
OR
20. (a) Explain Genetic Neuro-Hybrid System with block diagram. Also write the (8)
advantages of Genetic- Neuro Hybrid systems.
Teaching Plan
No. of
Lecture
No Contents Hours
(35 hrs)
2.1 Perceptron networks – Learning rule, Training and testing algorithm 1 hour
3.1 Introduction to Fuzzy Set, Properties & operations on fuzzy sets 1 hour
YEAR OF
FUZZY SET THEORY CATEGORY L T P CREDIT INTRODUCTION
CST454
AND APPLICATIONS
PEC 2 1 0 3 2019
Preamble: This course equips the students to understand the concepts of fuzziness and its use in
building better solutions to problems. The course covers basic concepts of fuzzy sets, fuzzy
relations, fuzzy logic and building of fuzzy approximation-based solutions. It helps students to
design and develop fuzzy based solutions to real world applications.
Prerequisite: Basic knowledge in set theory.
Course Outcomes: After the completion of the course, the student will be able to
CO1 Explain fuzzy logic based problem solving (Cognitive Knowledge Level:
Understand)
CO2 Summarize the concepts of crisp sets, crisp relations, crisp logic with fuzzy sets, fuzzy
relations and fuzzy logic(Cognitive Knowledge Level: Apply)
CO5 Make use of fuzzy logic inference to solve real world problems(Cognitive Knowledge
Level: Apply)
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO1 PO11 PO1
0 2
CO1
CO2
CO3
CO4
COMPUTER SCIENCE AND ENGINEERING
CO5
Conduct investigations of
PO4 complex problems PO10 Communication
Assessment Pattern
Remember 20 20 20
Understand 50 50 50
Apply 30 30 30
Analyze
Evaluate
Create
Mark Distribution
150 50 100 3
COMPUTER SCIENCE AND ENGINEERING
Syllabus
Module – 1 (Basic Fuzzy Set Theory)
The case for imprecision, Utility and Limitations of Fuzzy Systems, Fuzzy Sets and Membership,
Classical Sets – Properties, Operations, Fuzzy Sets – Properties and Operations, Classical
Relations – Cartesian Product, Operations and Properties of Crisp Relations, Composition, Fuzzy
Relations – Cardinality, Operations, Properties, Fuzzy Cartesian Product and Composition.
Module – 2 (Fuzzy Membership Functions)
Tolerance and Equivalence Relations – Crisp and Fuzzy, Similarity Methods – Cosine, Min-max,
Fuzzy Membership Functions – Features, Fuzzification, Defuzzification to Crisp Sets, λ-Cutsfor
Fuzzy Relations, Linguistic Hedges.
Module - 3 ( Fuzzification and Defuzzification Methods)
Development of Membership Functions –Intuition, Inference, Rank ordering, Inductive reasoning.
Defuzzification to Scalars - Max membership principle, Centroid method, Weighted average
method, Mean max membership, Center of sums, Center of largest area, First (or last) of maxima.
COMPUTER SCIENCE AND ENGINEERING
0 ⋅ 15 0.25 0 ⋅ 6 0.9
𝐴𝐴 = � + + + �
1 2 3 4
0.2 0.3 0.5 0.8
𝐵𝐵 = � + =+ + �
1 2 3 4
Calculate the union, intersection and difference for the two concrete types.
2. An engineer is testing the properties, strength and weight of steel. Suppose he has two
fuzzy sets A , defined on a universe of three discrete strengths, {s1, s2, s3}, and B, defined
on a universe of three discrete weights, {w1,w2,w3}. Suppose A and B represent a “high-
strength steel” and a “near-optimum weight,” respectively, as shown below
1 0.5 0.2
𝐴𝐴 = � + + �
𝑠𝑠1 𝑠𝑠2 𝑠𝑠3
1 0.5 0.2
𝐵𝐵 = � + + �
𝑤𝑤1 𝑤𝑤2 𝑤𝑤3
2. A metro train system uses fuzzy logic in ensuring smooth ride on the train. The metro train
system has fixed stops and the distance between the stops are known. The system uses
fuzzy logic in deciding the pressure applied on the brakes. The amount of pressure applied
depends on the distance to the next stop and the speed of the train. Design appropriate
membership functions for the input and illustrate the use of Mamdani Inference in arriving
at the brake pressure.
QP CODE:
PART A
4. Given two data points, illustrate how a similarity measure between them can be
computed.
8. Write a predicate logic statement for “Ram likes all kinds of food”.
9. Given the relation R below, find λ-cut for the relation using suitable λ value.
Part B
(Answer any one question from each module. Each question carries 14 Marks)
11. (a) An engineer is testing the properties, strength and weight of steel. Suppose he (4)
has two fuzzy sets A, defined on the universe of three discrete strengths { s1,
s2, s3 } and B, defined on the universe of discrete weights { w1, w2, w3}.
Suppose A represents a “high-strength steel” and B a “near-optimum weight”.
1 0.5 0.2 1 0.5 0.3
A = �𝑠𝑠1 + 𝑠𝑠2
+ 𝑠𝑠3
�, B = �𝑤𝑤1 + 𝑤𝑤2
+ 𝑤𝑤3
�
OR
12. (a) How is excluded middle axiom different for crisp and fuzzy sets? (4)
(b) Differentiate between crisp and fuzzy sets with respect to their membership (4)
functions.
13. (a) A structural designer is considering four different kinds of structural beams (10)
{ S1, S2, S3, S4} for a new building. Laboratory experiments on the
deflection resistance for these four kinds of beams have been performed, and
the engineer wants to determine their suitability in the new structure. The
following data have been observed based on the overall deflection capacity of
each beam type:
S1 S2 S3 S4
No deflection X1 0.3 0.6 0.5 0.8
Some X2 0.6 0.3 0.5 0.2
deflection
Excessive X3 0.1 0.1 0 0
deflection
Use cosine amplitude method to determine the similarity of the four beam
types.
OR
14. (a) Define tolerance and equivalence relations. Check whether the relation R (4)
given below is tolerance or equivalence relation.
1 0.8 0 0.1 0.2
⎡0.8 1 0.4 0 0.9⎤
⎢ ⎥
⎢ 0 0.4 1 0 0⎥
⎢0.1 0 0 1 0.5⎥
⎢0.2 0.9 0 0.5 1 ⎥
(b) Given the following data regarding three cities and the quality of their (10)
bridges, find the similarity between the cities using max-min method.
C1 C2 C3
Poor Q1 0.00 0.10 0.10
Fair Q2 0.04 0.04 0.08
Good Q3 0.02 0.04 0.06
COMPUTER SCIENCE AND ENGINEERING
15. (a) Explain the process of developing membership functions using the inference (6)
method.
(b) The following raw data were determined in a pair wise comparison of new (8)
premium car preferences in a poll of 100 people. When it was compared with
a Porsche (P), 79 of those polled preferred a BMW (B), 85 preferred a
Mercedes (M), 59 preferred a Lexus (L), and 67 preferred an Infinity (I).
When a BMW was compared, the preferences were 21 – P, 23 – M, 37 – L,
and 45 – I. When a Mercedes was compared, the preferences were 15 – P, 77
– B, 35 – L, and 48 – I. When a Lexus was compared, the preferences were 41
– P, 63 – B, 65 – M, and 51 – I. Finally, when an Infinity was compared, the
preferences were 33 – P, 55 – B, 52 – M, and 49 – L. Using rank ordering,
plot the membership function for “most preferred car.”
OR
16. (a) 1. Defuzzify the following region using centroid method. (9)
(b) 2. Defuzzify the region given in 16(a) using weighted average method. (5)
17. (a) For a distillation process, the objective is to separate components of a mixture (8)
in the input stream. The relationship between the input variable, temperature,
and the output variable, distillate fractions, is not precise but the human
operator of this process has developed an intuitive understanding of this
relationship. The universe for each of these variables is
0 0.5 0.8 1
B = “separation of mixture is good” =�89 + 92
+ 95
+ 98
�.
Find the fuzzy relation corresponding to “ IF x is 𝐴𝐴̃, THEN y is 𝐵𝐵�
(b) Show how inference is done using Generalized Modus Ponens (6)
OR
18. (a) Illustrate how graphical inference is done using Mamdani method. (6)
(b) A restaurant uses a fuzzy inference system to calculate the tips given to its (8)
employees. The tips are based on the timeliness of service and quality of
service of the waiters. Design appropriate membership functions for the input
and illustrate the use of Sugeno Inference in arriving at the tip amount.
19. (a) Explain fuzzy pattern recognition using multiple features. (7)
(b) Describe how fuzziness in information retrieval can enhance the quality of (7)
search results.
OR
20. (a) Design a fuzzy control system for an air-conditioning system. (7)
Teaching Plan
No. of
Lecture
No Contents Hours
(36 hrs)
Module-1(Basic Fuzzy Set Theory) (6 hours)
Composition
1.5 Fuzzy Relations – Properties, Operations, Cardinality 1 hour
1.6 Fuzzy Cartesian Product, Fuzzy Composition 1 hour
Module-2 (Fuzzy Membership Functions) (6 hours)
2.1 Tolerance and Equivalence Relations - Crisp 1 hour
2.2 Tolerance and Equivalence Relations - Fuzzy 1 hour
2.3 Similarity Methods – Cosine, Minmax 1 hour
2.4 Fuzzy Membership Functions- Features 1 hour
2.5 Fuzzification, Defuzzification to crisp sets – λ-cuts 1 hour
2.6 Linguistic Hedges 1 hour
Module-3 (Fuzzification and Defuzzification Methods) (7 hours)
3.1 Development of Membership Functions – Intuition, Inference 1 hour
3.2 Development of Membership Functions – Rank Ordering 1 hour
3.3 Development of Membership Functions – Inductive reasoning 1 hour
Defuzzification – Max membership principle, weighted average method,
3.4 1 hour
mean max membership
3.5 Defuzzification – Centroid method 1 hour
Defuzzification – Center of Sums, Center of Largest area, First/Last of
3.6 1 hour
maxima
3.7 Defuzzification - exercises 1 hour
Module-4 (Fuzzy Inference) (9 hours)
4.1 Classical Logic – Propositional Logic 1 hour
4.2 Classical Logic – Predicate Logic 1 hour
4.3 Fuzzy Logic 1 hour
4.4 Fuzzy Approximation based reasoning 1 hour
4.5 Fuzzy Rule based systems 1 hour
4.6 Multiple conjunctive and disjunctive antecedents, aggregation 1 hour
4.7 Graphical Techniques for Inference 1 hour
YEAR OF
CATEGORY L T P CREDIT INTRODUCTION
CST464 EMBEDDED SYSTEMS
PEC 2 1 0 3 2019
Preamble: The objective of this course is to familiarize learners with the technologies behind
embedded computing systems. This course introduces and explains the role of different hardware,
software, and firmware components involved in the design and development of embedded
systems. It discusses how real time operating systems incorporate specific features to ensure
timeliness of critical tasks. The course also aims to provide insights about the design followed in
several real-world embedded devices and expose the recent trends in embedded system design to
the students.
Prerequisite: Basic knowledge of Operating Systems, Computer Organization and Architecture.
Course Outcomes: After the completion of the course the student will be able to
CO4 Describe the role of real-time operating systems in embedded devices. (Cognitive
Knowledge Level: Understand)
CO5 Make use of design strategies for developing real-world embedded systems.
(Cognitive Knowledge Level: Apply)
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO1 PO11 PO1
0 2
CO1
CO2
COMPUTER SCIENCE AND ENGINEERING
CO3
CO4
CO5
Assessment Pattern
Remember 20 20 20
Understand 50 50 50
Apply 30 30 30
Analyze
Evaluate
Create
COMPUTER SCIENCE AND ENGINEERING
Mark Distribution
150 50 100 3
Syllabus
Module – 1 ( Introduction to Embedded Systems )
Embedded Systems – Definitions, Embedded Systems vs. General Computing Systems, History,
Classification, Application Areas, Purpose. Building Blocks of a Typical Embedded System –
System Core (Microprocessors, Microcontrollers, DSP, ASICs, PLDs), Memory (Different
ROMs and RAMs), Sensors and Actuators, I/O Subsystem Interface, Communication Interface,
Embedded Firmware, Other System Components (Reset and Brown-out Protection Circuits,
COMPUTER SCIENCE AND ENGINEERING
Oscillator Unit, Real-Time Clock, Watchdog Timer), Printed Circuit Board. Embedded System
Design Process – Requirements, Specification, Architecture Design, Designing Hardware and
Software Components, System Integration.
Module - 2 ( System Modeling and Hardware Software Co-Design )
Computational Models in Embedded Design – Data Flow Graph, Control Data Flow Graph, State
Machine Model, Sequential Program Model, Concurrent Process Model, Object-Oriented Model.
Hardware Software Co-Design – Traditional Embedded Development Cycle, History,
Advantages of the Co-Design Methodology, The Co-Design Process, Fundamental Issues in
Hardware Software Co-Design. Hardware software trade-offs.
Module - 3 ( Real-Time Embedded System Design )
Prerequisite Topics: Operating System – Basics, Types. Basics of Tasks, Process and Threads.
Multiprocessing and Multitasking. Task Scheduling – Non-Preemptive (FIFO, LIFO, SJF) and
Preemptive (SRT, RR, Priority-based, Rate-based).
Task Communication – Shared Memory, Message Passing, Remote Procedure Call and Sockets.
Task Synchronization – Synchronization Issues – Race Condition, Deadlock, Priority Inversion,
Priority Inheritance, Priority Ceiling. Synchronization Techniques – Spin Lock, Sleep &
Wakeup, Semaphores. Selection of an RTOS for an Embedded Design – Functional and Non-
Functional Requirements.
Embedded Product Development Life Cycle – Objectives, Different Phases, Modeling Techniques
– Waterfall Model, Incremental Model, Evolutionary Model, Spiral Model.
Design Case Studies – Battery Operated Smart Card Reader, Automated Meter Reading System,
Smart Watch.
Automotive and Aerospace Systems – Networked Control Systems in Cars and Airplanes,
Vehicular Networks – CAN bus, Time-triggered Architecture, FlexRay and LIN.
Internet of Things Systems – IoT System Architectures - Use Cases (Smart Appliance, Monitoring
and Control Systems). Networks for IoT – Networking concepts, Bluetooth, Bluetooth Low
Energy, 802.15.4, ZigBee and WiFi. Databases and Timewheels. Smart Home Example.
COMPUTER SCIENCE AND ENGINEERING
Text Books:
References:
1. What are Sensors? Explain its role in Embedded System Design. Illustrate with an
example.
2. How do sensors communicate data with other computing devices in an embedded system?
3. What are the advantages and disadvantages of using a microprocessor as the compute
engine of an embedded device?
4. What is a watchdog timer? What can go wrong if your system does not have one?
5. Elaborate the steps involved in the design of an embedded system with appropriate
diagrams.
1. Draw a class diagram to represent a smart eyeglass that automatically changes the glass
shade according to the external light.
2. Design a Seat Belt Warning System and explain its working using a state machine model.
COMPUTER SCIENCE AND ENGINEERING
3. Represent the authentication process of an ATM machine using one of the following
computational models:
1. Control Data Flow Graph.
2. State Transition Diagram.
4. Draw the Finite State Machine diagram for an automated tea/coffee vending machine.
5. Draw a CDFG for the following program fragment.
fun0();
if (cond1) fun1();
else fun2();
fun3();
switch (test1) {
case 1 : fun4();
break;
case 2: fun5();
break;
case 3: fun6();
break;
}
fun7();
● A goes for I/O for 5 units after 4 units of execution time in CPU.
● B and C are CPU bound tasks.
● Find out if a First Come First Serve or Shortest Job First scheduling strategy will
offer the shortest average waiting time for the above scenario.
COMPUTER SCIENCE AND ENGINEERING
3. An organization maintains energy smart buildings with the help of different types of
computing devices spread across different levels of a building. What process
communication mechanism do you recommend? Why?
4. With an example, illustrate how priority inversion can cause high priority tasks to miss
deadlines.
5. Consider the following scenario:
◦ There are three tasks, H, M and L with high, medium, and low priority. Task L and
task H share a resource. Shortly after Task L takes the resource, Task H becomes ready to
run. However, Task H must wait for Task L to finish with the resource, so it pends. Before
Task L finishes with the resource, Task M becomes ready to run, preempting Task L.
While Task M runs, Task H, the highest-priority task in the system, remains in a pending
state.
How can you prevent the high priority task H, from missing any deadlines?
Course Outcome 4 (CO4): .
2. Explain briefly the functional and non-functional requirements that need to be addressed in
the selection of an RTOS.
3. What are the characteristics of a real-time system?
4. How does a hard real-time system differ from a soft-real time system? Explain with an
example.
5. Identify the reasons for choosing an operating system-based firmware to a super-loop
model-based firmware in an embedded device.
1. Prepare a requirement chart for a robotic vacuum cleaner. Fine tune the requirement chart to list
the product specifications (Assignment, preferably group work).
2. Suppose you want to make an old building energy smart. Analyze existing systems and prepare a
report on how this can be achieved following an Embedded product Development Life Cycle
(EDLC) model (Assignment, preferably group work). (Allow groups to make necessary
assumptions such as prevailing climatic conditions).
3. Design a baby monitoring system with suitable active devices and networking components.
Represent your system with a suitable diagram.
4. Identify the components required to build a battery-operated smart card reader and design
the system using these components.
COMPUTER SCIENCE AND ENGINEERING
5. Draw a sequential diagram representing the working of an automated energy metre reading
system.
QP CODE:
PART A
2. List the factors that need to be considered in the selection of memory for embedded
systems.
4. If the time to market of an embedded device is critical, would you prefer a high
level language or assembly language for developing the firmware? Justify.
5. Explain the various factors that need to be considered for the selection of a
scheduling algorithm.
6. What is the difference between ‘Hard’ and ‘Soft’ real-time systems? Give an
example for ‘Hard’ and ‘Soft’ real-time kernels.
7. When will you choose a concurrent process model for an embedded device?
COMPUTER SCIENCE AND ENGINEERING
8. What are the three primary objectives of EDLC? List the different phases of this
development life cycle.
10. Draw the functional block diagram of a fully automatic washing machine.
(10x3=30)
Part B
(Answer any one question from each module. Each question carries 14 Marks)
11. (a) What is embedded firmware? Which are the different approaches used for (6)
embedded firmware development?
(b) List out the requirements for a smartwatch that can show time as well as (8)
measure the user's vitals such as blood pressure, pulse rate and body
temperature. Think of the physical and functional aspects of the product and
also what extra features can be added over the basic functions.
OR
12. (a) Describe various on-board communication interfaces used in embedded (10)
systems.
(b) Explain the role of a watchdog timer in an embedded system. (4)
13. (a) Explain the object oriented program model for embedded system design. (6)
Under which circumstances is this model considered as the best?
(b) Design and draw a concurrent program model for the Seat Belt Warning (8)
System of an automobile. Clearly specify your assumptions in the design.
OR
14. (a) Suppose you are designing a digital motion camera. What are the tradeoffs in (6)
implementing the multimedia codec part of the camera in hardware and in
software?
(b) Draw the state machine diagram of an automatic dawn-dusk solar street light (8)
with a motion sensor.
● The light automatically turns on when the ambient light is below ‘x’
lumens.
● The streetlight operates at low power when no motion is detected for
30 secs.
COMPUTER SCIENCE AND ENGINEERING
15. (a) Identify the type of synchronization mechanism best suited for each of the (6)
following scenarios and explain why.
1. Updating a single byte memory location shared by different tasks,
some of which are time-critical.
2. Updating a block of memory that is shared between multiple low
priority tasks.
3. Multiple instances of a resource shared between tasks.
(b) Under what circumstances would you use the following task communication (8)
mechanisms?
1. Sockets.
2. Remote Procedure Call
3. Shared Memory
OR
16. (a) What is priority inversion? In case of priority inversion, what techniques can (7)
be adopted to ensure that the critical tasks are able to meet their deadlines?
(b) Three processes with process IDs P1, P2, P3 with estimated completion time (7)
6, 2, 4 milliseconds respectively, enters the ready queue together in the order
P1, P3, P2. Process P4 with estimated execution time 4 milliseconds entered
the ready queue 3 milliseconds later the start of execution of P1. Calculate the
waiting time and Turn Around Time (TAT) for each process and the Average
waiting time and Turn Around Time (Assuming there is no I/O waiting for
the processes) in RR algorithm with Time slice = 2 ms.
17. (a) An embedded product under consideration is very complex in nature and (8)
there is a possibility for change in requirements of the product. Also the risk
associated with the development of this product is very high. Which is the
best suited life cycle method to handle this product development? Justify
your answer.
(b) Explain the similarities and differences between iterative and incremental life (6)
cycle models.
OR
18. (a) When do you prefer a super-loop-based firmware design approach over an (8)
RTOS based approach? What are the limitations of the super-loop based
approach and how do you overcome them?
(b) Briefly explain the different approaches used for embedding firmware into (6)
the hardware of an embedded device.
19. (a) Identify the components required to build an automated energy metre reading (6)
system and design it with these components
COMPUTER SCIENCE AND ENGINEERING
(b) List any four wireless standards used for building IoT networks and compare (8)
their characteristics
OR
20. (a) Draw a sequential diagram representing the working of a battery-operated (6)
smart card reader.
(b) Explain the different communication buses used in automotive applications. (8 )
Teaching Plan
No. of
Lecture
No Contents Hours
(35 hrs)
Module-1 (Introduction to Embedded Systems) (8 hours)
YEAR OF
CATEGORY L T P CREDIT
CST474 COMPUTER VISION INTRODUCTION
PEC 2 1 0 3 2019
Preamble: Computer vision is a field of artificial intelligence (AI) that enables computers and
systems to derive meaningful information from digital images, videos and other visual inputs. The
curriculum covers the basics of image formation, key computer vision concepts, methods,
techniques, pattern recognition, various problems in designing computer vision and object
recognition systems. This course enables the learners to understand the fundamentals of computer
vision and develop applications in computer vision.
Prerequisite: Nil
Course Outcomes: After the completion of the course, the student will be able to
Summarize basic concepts, terminology, theories, models and methods in the field of
CO1
computer vision.
(Cognitive Knowledge Level: Understand)
Explain basic methods of computer vision related to multi-scale representation, edge
CO2
detection, detection of other primitives, stereo, motion and object recognition.
(Cognitive Knowledge Level: Understand)
Describe principles of Segmentation, Motion Segmentation and Classification
CO3
(Cognitive Knowledge Level: Understand)
Select appropriate object Tracking and detection methods for computer vision
CO4
applications (Cognitive Knowledge Level: Understand).
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO1
CO2
CO3
COMPUTER SCIENCE AND ENGINEERING
CO4
CO5
Conduct investigations of
PO4 complex problems PO10 Communication
Assessment Pattern
Remember 30 30 30
Understand 50 50 50
Apply 20 20 20
Analyze
Evaluate
Create
COMPUTER SCIENCE AND ENGINEERING
Mark Distribution
150 50 100 3
Syllabus
Module – 1 (Image Formation and Filtering)
Geometric Camera Models - Pinhole perspective, Intrinsic and Extrinsic Parameters, Geometric
Camera Calibration. Linear Filters- Linear Filters and Convolution, Shift Invariant Linear
Systems. Filters as Templates - Normalized Correlation and Finding Patterns.
COMPUTER SCIENCE AND ENGINEERING
QP CODE:
PART A
Part B
(Answer any one question from each module. Each question carries 14 Marks)
COMPUTER SCIENCE AND ENGINEERING
11. (a) Demonstrate the relationship between a point in the world coordinate frame (9)
and its corresponding image point using camera parameters.
(b) Show that convolving a function with a δ function simply reproduces the (5)
original function.
OR
12. (a) What is linear filtering? Explain two applications of linear filtering to image (7)
processing.
(b) Explain an application of normalised correlation to find patterns. (7)
13. (a) Show that smoothing an image and then computing the gradient is same as (5)
convolving an image with the derivative of a smoothing function.
(b) State the epipolar constraint and derive its representations using the Essential (9)
matrix and the Fundamental matrix.
OR
14. (a) Explain the algorithm for computing edges using gradients. (9)
(b) Define binocular fusion. Explain two local methods for binocular fusion. (5)
(b) What is meant by optical flow? How can it be utilized for segmenting (7)
images?
OR
16. (a) Explain the Watershed algorithm. (7)
OR
18. (a) Explain the various kinds of errors in classification and the relationship (7)
between them.
(b) What is overfitting and how does regularization help to minimise it? (7)
19. (a) Explain human activity recognition with appearance features. (7)
COMPUTER SCIENCE AND ENGINEERING
(b) Describe the Sliding window method for detecting objects in images. (7)
OR
20. (a) Explain the principle of detecting faces in an image. (7)
(b) What are the various strategies for object recognition? (7)
Teaching Plan
No. of Lecture
No Contents Hours
(36hrs)
Module 1 Image Formation and Filtering (7)
1.1 Geometric Camera model - Pinhole perspective 1
1.2 Geometric Camera model - Intrinsic Parameters 1
1.3 Geometric Camera model - Extrinsic Parameters 1
1.4 Geometric Camera Calibration – Linear Approach 1
1.5 Linear Filters and Convolution 1
1.6 Shift Invariant Linear Systems - Discrete convolution 1
1.7 Normalized Correlation and Finding patterns 1
Module 2 Local Image Features and Stereo Vision (8)
2.1 Local Image Features - Computing the Image Gradient 1
2.2 Gradient Based Edge Detection 1
2.3 Gradient Based Corner Detection 1
2.4 Stereopsis - Binocular Camera Geometry and Epipolar 1
Constraint
2.5 Essential Matrix and Fundamental Matrix 1
2.6 Binocular Reconstruction 1
2.7 Local Methods for Binocular Fusion 1
2.8 Global Methods for Binocular Fusion 1
Module 3 Segmentation (6)
COMPUTER SCIENCE AND ENGINEERING
SEMESTER VIII
PROGRAM ELECTIVE IV
COMPUTER SCIENCE AND ENGINEERING
Preamble: The course enables the learners to apply formal methods for modelling, validation and
verification of software systems. It covers a series of advanced tools that address challenges faced
in design, coding and verification. This includes both an introduction to the theoretical
underpinnings of these tools, as well as hands-on exploration.
Course Outcomes: After the completion of the course, the student will be able to
CO1 Explain the need and use of formal methods and tools in software engineering.
(Cognitive Knowledge Level: Understand)
CO3 Illustrate the process of proving correctness of code using Hoare-Triple based weakest
precondition analysis.(Cognitive Knowledge Level: Apply)
CO4 Demonstrate program verification using VCC. (Cognitive Knowledge Level: Apply)
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO1 PO11 PO1
0 2
CO1
CO2
CO3
CO4
COMPUTER SCIENCE AND ENGINEERING
Conduct investigations of
PO4 complex problems PO10 Communication
Assessment Pattern
Remember 30 30 30
Understand 30 30 30
Apply 40 40 40
Analyze
Evaluate
Create
Mark Distribution
150 50 100 3
COMPUTER SCIENCE AND ENGINEERING
1. A farmer is on one shore of a river and has with him a fox, a chicken, and a sack of grain.
He has a boat that fits one object besides himself. In the presence of the farmer nothing
gets eaten, but if left without the farmer, the fox will eat the chicken, and the chicken will
eat the grain. How can the farmer get all three possessions across the river safely?Solve the
problem by modeling it in Alloy and using the analyzer to find a solution.
1. Find an inductive loop invariant and show the correctness proof for the statement
𝑤𝑤ℎ𝑖𝑖𝑖𝑖𝑖𝑖 𝑖𝑖 < 𝑛𝑛 𝑑𝑑𝑜𝑜 {𝑎𝑎[𝑖𝑖] ∶= 0; 𝑖𝑖 ∶= 𝑖𝑖 + 1; }
with the precondition 𝑖𝑖 = 0 ˄ 𝑛𝑛 > 0and the post condition ⩝ 𝑗𝑗, 0 ≤ 𝑗𝑗 < 𝑛𝑛 → 𝑎𝑎[𝑗𝑗] =
0.
COMPUTER SCIENCE AND ENGINEERING
1. Write and verify a program that sorts the elements of an array in non-decreasing order. Use
VCC for verification.
QP CODE:
PART A
7. State a sufficient condition required in the assert statement below to provide the
COMPUTER SCIENCE AND ENGINEERING
Part B
(Answer any one question from each module. Each question carries 14 Marks)
OR
(b) Describe the terms Formal Methods and Formal Verification. (7)
There is an entity named Person. Man and Woman are two specializations of
it. Every Person has a Father(a Man) and a Mother(a Woman) as Parent. The
Parents of a Person should be married. A Man’s spouse should be a Woman
and a Woman’s spouse should be a Man. The spouse relation is symmetric.
(b) Model the stack data structure in Alloy with support (7)
for Push and Pop operations. Treat each operation that modifies the stack's
state as an event. The stack should begin empty, and you should not be able
to Pop from an empty stack.
Write three assertions verifying the behaviour of your stack in the following
cases:
• A Pop followed by a Push of the same element
• The number of Push events is exactly equal to the number
of Pop events
• A Pop from a stack with no elements
Create a predicate noP1 that looks for instances that do not satisfy property
P1, and a corresponding\run statement. Similarly, create predicates noP2 and
noP3.
(b) Show a model in Alloy to prove that the Konigsberg bridge problem has no (7)
solution.
(b) Differentiate between partial correctness and total correctness in Hoare Logic. (8)
COMPUTER SCIENCE AND ENGINEERING
16. (a) Use Hoare Logic with the help of loop invariant to prove (8)
(i) {𝑥𝑥 ≤ 𝑛𝑛} 𝑤𝑤ℎ𝑖𝑖𝑖𝑖𝑖𝑖 𝑥𝑥 < 𝑛𝑛 𝑑𝑑𝑑𝑑 𝑥𝑥: = 𝑥𝑥 + 1 {𝑥𝑥 ≥ 𝑛𝑛}
(ii) {𝑖𝑖 = 0 ˄ 𝑗𝑗 = 0 ˄ 𝑛𝑛 = 5} 𝑤𝑤ℎ𝑖𝑖𝑖𝑖𝑖𝑖 𝑖𝑖 < 𝑛𝑛 𝑑𝑑𝑑𝑑 𝑖𝑖 ≔ 𝑖𝑖 + 1; 𝑗𝑗 ∶= 𝑗𝑗 +
1 {𝑗𝑗 = 15}
17. (a) Write a function to find the largest of three numbers and prove using function (10)
contract that your program is correct. Also write another function that calls
the former and assert that the latter returns the correct result.
OR
18. (a) Write and verify a non-recursive program that takes an array and checks (10)
whether it contains any duplicate elements.
(b) Distinguish between sequential and atomic memory access in VCC. (4)
19. (a) Explain how the refinement conditions can be phrased in VCC. (7)
OR
(b) Illustrate the verification of a C program with respect to its Ghost model. (7)
COMPUTER SCIENCE AND ENGINEERING
Teaching Plan
No. of
Lecture
No Contents Hours
(36 hrs)
Module-1(Introduction) (5 hours)
2.7 Show that the Konigsberg Bridge Problem has no solution. 1 hour
YEAR OF
CLIENT SERVER CATEGORY L T P CREDIT INTRODUCTION
CST426
ARCHITECTURE
PEC 2 1 0 3 2019
Preamble: The syllabus is prepared with the view of preparing the Engineering Graduates to
build effective Client/Server applications. This course aims at providing a foundation in
decentralized computer systems, using the client/server model. The course content is decided to
cover the essential fundamentals which can be taught within the given slots in the curriculum.
Course Outcomes: After the completion of the course the student will be able to
Explain the basics of client/server systems and the driving force behind the
development of client/server systems (Cognitive Knowledge Level:
CO 1 Understand)
Outline the architecture and classifications of client/server systems (Cognitive
CO 2 Knowledge Level: Understand)
Choose the appropriate client/server network services for a typical application
CO 3 (Cognitive Knowledge Level: Understand)
Describe management services and issues in network (Cognitive Knowledge
CO 4 Level: Understand)
Compare and summarize the web extensions and choose appropriate web services
CO 5
standards for an application (Cognitive Knowledge Level: Understand)
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO1
CO2
CO3
CO4
CO5
COMPUTER SCIENCE AND ENGINEERING
Conduct investigations of
PO4 complex problems PO10 Communication
Assessment Pattern
Remember 30 30 30
Understand 70 70 50
Apply
Analyse
Evaluate
Create
Mark distribution
Attendance : 10 marks
Continuous Assessment Test 1 (for theory, for 2 hrs) : 20 marks
Continuous Assessment Test 2 (for lab, internal examination, for 2hrs) : 20 marks
COMPUTER SCIENCE AND ENGINEERING
Internal Examination Pattern: There will be two parts; Part A and Part B. Part A
contains 5 questions with 2 questions from each module (2.5 modules x 2 = 5), having 3
marks for each question. Students should answer all questions. Part B also contains 5
questions with 2 questions from each module (2.5 modules x 2 = 5), of which a student
should answer any one. The questions should not have sub- divisions and each one carries
7 marks.
End Semester Examination Pattern: There will be two parts; Part A and Part B. Part A
contain 10 questions with 2 questions from each module, having 3 marks for each
question. Students should answer all questions. Part B contains 2 questions from each
module of which a student should answer any one. Each question can have maximum 2
sub-divisions and carry 14 marks.
Client- Services, Request for services, RPC, Windows services, Print services, Remote
boot services, other remote services, Utility Services. Dynamic Data Exchange (DDE).
Object Linking and Embedding (OLE). Common Object Request Broker Architecture
(CORBA).
Web Services History. Web Server Technology- Web Server, Web Server Communication,
Role of Java for Client/Server on Web. Web Services- MicroServices, APIs, API
Gateway, Authentication of users/clients, Tokens/Keys for Authentication, Service Mesh,
Message Queues, SaaS, Web Sockets.
Client/Server/Browser – Server Technology, Client/Server Technology and Web
Applications, Balanced Computing and the Server’s Changing Role. Thin client computing
- Computing models-Comparison-Computing Environment.
Future of client/ server Computing Enabling Technologies, Transformational system.
COMPUTER SCIENCE AND ENGINEERING
Text Books
Reference Books
QP CODE:
PART A
10. With an example, explain the role of java for client/server on web (10x3=30)
Part B
(Answer any one question from each module. Each question carries 14 Marks)
11. (a) Explain the driving forces behind the development of Client/ Server system (10)
from different perspectives.
OR
12. (a) Explain Client/Server System development methodology and explain various (10)
phases and their activities involved in System Integration Life Cycle.
(b) Write short notes on the following. (a) Single system image. (b) Downsizing (4)
and Client/Server computing.
13. (a) How two-tier computing and three-tier computing improves the performance (10)
of Client/Server system.
OR
15. (a) In Client/Server computing, explain the following with example in detail (a) (10)
Dynamic Data Exchange (b) RPC (c) Remote Boot Service (d) Object-
linking and embedding.
COMPUTER SCIENCE AND ENGINEERING
(b) Explain the role of client in Client/Server computing and also explain the (4)
various services provide by client.
OR
(b) Explain the server functionality in detail, for Client/Server computing. (4)
(b) Comment on the network service acquisition mechanism for the client/service (4)
model.
OR
18. (a) In client server architecture, what do you mean by Availability, Reliability, (10)
Serviceability and Security? Explain with examples
19. (a) What is the future of Client/Server computing in the following technologies (10)
(i) Electronic Document Management. (ii) Full Text Retrieval. (iii)
Geographic Information System.
(b) Discuss the role of web browser for providing web service in Client/Server (4)
environment.
OR
Sl Contents No. of
No Lecture
Hours (35)
Module- 1( Introduction) (7 hours)
3.1 The client: Services, Request for services, RPC, Windows services, Print 1 hour
services
3.2 Remote boot services, Utility Services & Other Services 1 hour
3.3 Dynamic Data Exchange (DDE), Object Linking and Embedding (OLE) 1 hour
3.4 Common Object Request Broker Architecture (CORBA) 1 hour
COMPUTER SCIENCE AND ENGINEERING
3.5 The server: Detailed server functionality, the network operating system 1 hour
5.1 Web Services History , Web Server Technology , Web Server 1 hour
5.2 Web Server Communication , Role of Java for Client/Server on Web 1 hour
5.3 Web Services , MicroServices, APIs, API Gateway, Authentication of 1 hour
users/clients
5.4 Tokens/Keys for Authentication ,Service Mesh, Message Queues 1 hour
YEAR OF
PARALLEL CATEGORY L T P CREDIT INTRODUCTION
CST436
COMPUTING
PEC 2 1 0 3 2019
Preamble: This course helps the learners to understand basic and advanced concepts of parallel
computing. It covers Principles of Parallel Algorithm Design, Communication operations,
Programming Using the Message Passing Paradigm, Programming Shared Address Space
Platforms Thread Basics, and GPU Programming. This course enables a learner to design
solutions to complex real world problems using parallel computing paradigms including thread
parallelism, shared memory program, message passing interfaces, and vector processing.
Course Outcomes: After the completion of the course the students will be able to
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO1
CO2
CO3
CO4
COMPUTER SCIENCE AND ENGINEERING
CO5
CO6
Conduct investigations of
PO4 PO10 Communication
complex problems
Assessment Pattern
Remember 30 20 20
Understand 50 40 40
Apply 20 40 40
COMPUTER SCIENCE AND ENGINEERING
Analyze
Evaluate
Create
Mark Distribution
Attendance 10 marks
Continuous Assessment Tests 25 marks
Continuous Assessment Assignment 15 marks
Syllabus
Module- 1 (Principles of Parallel Algorithm Design)
Thread Basics, Why Threads? The POSIX Thread Application Programme Interface,
Synchronization Primitives in POSIX, Controlling Thread and Synchronization Attributes,
Thread Cancellation, Composite Synchronization Constructs, OpenMP: a Standard for Directive
Based Parallel Programming, Specifying Concurrent Tasks in OpenMP, Synchronization
Constructs in OpenMP, Data Handling in OpenMP, OpenMP Library Functions, OpenMP
Applications: Parallel algorithm development for Matrix multiplication
Text Books
1. Ananth Grama, Anshul Gupta, George Karypis, Vipin Kumar, Introduction to Parallel
Computing, 2nd Ed, Addison-Wesley, 2003
2. David B. Kirk, Wen-mei W. Hwu, Programming Massively Parallel Processors: A
Hands-on Approach, 3rd Ed., Morgan Kaufman, 2016.
References
2. Barbara Chapman, Gabriele Jost, Ruud van der Pas, Using OpenMP: Portable Shared
Memory Paralwlel Programming , MIT Press, 2008.
3. William Gropp, Ewing Lusk, Anthony Skjellum Using MPI: Portable Parallel
Programming with the Message-Passing Interface, 3rd Ed, MIT Press, 2014.
4. Thomas Rauber, Gudula Rünger, Parallel Programming for Multicore and Cluster
Systems, Springer, 2010
2. Which are the characteristics of tasks influencing the selection of mapping scheme?
10. Describe how the data transfer between GPU device and the host memories are (10x3=30)
managed.
Part B
(Answer any one question from each module. Each question carries 14 Marks)
11. (a)
Describe recursive decomposition with an example.
(8)
COMPUTER SCIENCE AND ENGINEERING
(b)
Compare various parallel algorithm models
(6)
OR
(b) In the algorithm, assume a decomposition such that each execution of Line 7 is (6)
a task. Draw a task-dependency graph and a task-interaction graph.
1. procedure FFT_like_pattern(A, n)
2. begin
3. m := log2 n;
4. for j := 0 to m - 1 do
5. k := 2j;
6. for i := 0 to n - 1 do
7. A[i] := A[i] + A[i XOR 2j];
8. end // for
9. end // FFT_like_pattern
13. (a)
Illustrate the All-to-All Broadcast and Reduction with an example
(8)
(b) (6)
Explain any three techniques to improve the speed of communication
operations
OR
(b) Explain the Ring and Mesh techniques of All-to-All Personalized (6)
communication.
15. (a) Explain Collective Communication and Computation Operations in MPI (9)
OR
16. (a) Write algorithm for Collective Communication and Computation Operations
(9)
COMPUTER SCIENCE AND ENGINEERING
using MPI.
17. (a) Explain how mutual exclusion for shared variables are accomplished in (6)
threads.
(b) Explain the nesting of parallel directives with a suitable example. (8)
OR
18. (a) Explain the compilation operations of an example openMP program along (4)
with its pThread translations.
(b) (8)
How is synchronization between CUDA threads achieved?
OR
(b) Write and explain the CUDA program for vector addition. (4 )
COMPUTER SCIENCE AND ENGINEERING
TEACHING PLAN
No Contents No of
Lecture
Hrs (37)
Module- 3 ( Programming Using the Message Passing Paradigm) (TB-1, Ch. 6 ) (7 hrs)
5.3 Vector Addition Kernel, Device Global Memory and Data Transfer 1
YEAR OF
DATA COMPRESSION CATEGORY L T P CREDIT INTRODUCTION
CST446
TECHNIQUES
PEC 2 1 0 3 2019
Preamble: This course helps the learners to understand compression techniques on text, image,
audio and video data. It covers lossy &lossless compression, RLE, JPEG, MPEG and its variants.
This course enables the students to develop and implement compression algorithms on different
domains.
CO# CO
Describe the fundamental principles of data compression(Cognitive Knowledge
CO1 level: Understand)
Make use of statistical and dictionary based compression techniques for various
CO2 applications (Cognitive Knowledge level: Apply)
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO1
CO2
CO3
CO4
CO5
COMPUTER SCIENCE AND ENGINEERING
Assessment Pattern
Continuous Assessment Tests
Bloom’s End Semester Examination
Category Marks (%)
Test 1 (%) Test 2 (%)
Remember 30 30 30
Understand 40 40 40
Apply 30 30 30
Analyze
Evaluate
Create
Mark Distribution
Each of the two internal examinations has to be conducted out of 50 marks. First series test shall
be preferably conducted after completing the first half of the syllabus and the second series test
shall be preferably conducted after completing remaining part of the syllabus. There will be two
parts: Part A and Part B. Part A contains 5 questions (preferably, 2 questions each from the
completed modules and 1 question from the partly completed module), having 3 marks for each
question adding up to 15 marks for part A. Students should answer all questions from Part A.
Part B contains 7 questions (preferably, 3 questions each from the completed modules and 1
question from the partly completed module), each with 7 marks. Out of the 7 questions, a student
should answer any5.
Syllabus
Module-1 (Modelling and types of compression)) 1
Introduction to Compression Techniques- Lossy compression & Lossless compression, Measures
of Performance, Modeling and coding. Mathematical modelling for Lossless and lossy compression
- Physical models and probability models.
Text Book
1. David Solomon, Data compression: the complete reference, 4/e, Springer, January 2007
2. Khalid Sayood, Introduction to data compression, Morgan Kaufmann Publishers,2003.
References
1) Stephen Welstead, Fractal and wavelet Image Compression techniques, PHI, 1999.
2) Sleinreitz, Multimedia System, Addison Wesley.
3) Mark Nelson and Jean-loup Gailly, The Data Compression Book, M&T Books.
1. Explain RLE based text compression and identify a example with compression ratio of 2.
2. Given the eight symbols A, B, C, D, E, F, G, and H with probabilities 1/30, 1/30, 1/30,
2/30, 3/30, 5/30, 5/30, and 12/30, draw three different Huffman trees with heights 5 and 6
for these symbols and calculate the average code size for each tree.
1. Differentiate the LZ77 and LZ78 performance with the input given as
‘sirsideastmaneasilyteasesseasickseals’
2. Explain why the continuous-tone images is required for JPEG and the main steps used in
image compression.
QP CODE:
PART A
10. Explain the working of -law encoder and decoder with an example
(10x3=30)
COMPUTER SCIENCE AND ENGINEERING
Part B
(Answer any one question from each module. Each question carries 14 Marks)
11. (a) Explain mathematical model for lossy compression and lossless compression (10)
(b) Define compression ratio with an example (4)
OR
12. (a) Discuss any probability model and identify the shortcoming of the solution. (7)
13. (a) With a help of flowchart discuss the RLE text compression for text data given (10)
below
‘ABBBBBBBBBCDEEEEF’
(b) calculate the compression ratio for the example while taking repetitions = 4 (4)
OR
14. (a) Illustrate with a example why Huffman coding is preferred than Shannon (10)
Fano Algorithm for compression
(b) How Huffman coding is handling the unpredictability of input data stream (4)
15. (a) Explain in detail the working of LZ78 with example and dictionary Tree (10)
(b) Illustrate with example, how the compression factor LZW differ from the (4)
LZ78
OR
16. (a) How quantization and coding helps in compression and their role in JPEG. (6)
(b) With the help of the given example illustrate the compression ratio of JPEG (8)
and JPEG-LS
17. (a) With the help of equations discuss Composite and Components Video (7)
(b) Differentiate the major changes in MPEG - 2 and MPEG-4 Video (7)
OR
18. (a) Describe in details about functionalities for MPEG-4 (8)
19. (a) How The Human Auditory System limitations can be taken in audio (7)
COMPUTER SCIENCE AND ENGINEERING
compressions
(b) Discuss the complexity of Layer III compared to others in MPEG Audio (7)
Coding
OR
20. (a) Discuss Format of Compressed Data and encoding in layer I and II (9)
TEACHING PLAN
No Contents No of
Lecture
Hrs (36
Hours)
YEAR OF
CATEGORY L T P CREDIT INTRODUCTION
CST466 DATA MINING
PEC 2 1 0 3 2019
Preamble: This course helps the learner to understand the concepts of data mining and data
warehousing. It covers the key processes of data mining, data preprocessing techniques,
fundamentals and advanced concepts of classification, clustering, association rule mining, web
mining and text mining. It enables the learners to develop new data mining algorithms and apply
the existing algorithms in real-world scenarios.
Prerequisite: NIL
Course Outcomes: After the completion of the course the student will be able to
CO# CO
CO1 Employ the key process of data mining and data warehousing concepts in application
domains. (Cognitive Knowledge Level: Understand)
CO2 Make use of appropriate preprocessing techniques to convert raw data into suitable
format for practical data mining tasks (Cognitive Knowledge Level: Apply)
CO3 Illustrate the use of classification and clustering algorithms in various application
domains (Cognitive Knowledge Level: Apply)
CO4 Comprehend the use of association rule mining techniques. (Cognitive Knowledge
Level: Apply)
CO5 Explain advanced data mining concepts and their applications in emerging domains
(Cognitive Knowledge Level: Understand)
PO PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO1 PO11 PO1
1 0 2
CO1
CO2
CO3
COMPUTER SCIENCE AND ENGINEERING
CO4
CO5
Assessment Pattern
Remember 20 20 20
Understand 30 30 30
Apply 50 50 50
Analyze
Evaluate
Create
Mark Distribution
150 50 100 3
COMPUTER SCIENCE AND ENGINEERING
Syllabus
Module – 1 (Introduction to Data Mining and Data Warehousing)
Data warehouse-Differences between Operational Database Systems and Data Warehouses,
Multidimensional data model- Warehouse schema, OLAP Operations, Data Warehouse
Architecture, Data Warehousing to Data Mining, Data Mining Concepts and Applications,
Knowledge Discovery in Database Vs Data mining, Architecture of typical data mining system,
Data Mining Functionalities, Data Mining Issues.
Text Books
1. Dunham M H, “Data Mining: Introductory and Advanced Topics”, Pearson Education, New
Delhi, 2003.
2. Arun K Pujari, “Data Mining Techniques”, Universities Press Private Limited,2008.
3. Jaiwei Han and Micheline Kamber, “Data Mining Concepts and Techniques”, Elsevier,
2006
Reference Books
1. M Sudeep Elayidom, “Data Mining and Warehousing”, 1st Edition, 2015, Cengage
Learning India Pvt. Ltd.
2. MehmedKantardzic, “Data Mining Concepts, Methods and Algorithms”, John Wiley and
Sons, USA, 2003.
3. Pang-Ning Tan and Michael Steinbach, “Introduction to Data Mining”, Addison Wesley,
2006.
COMPUTER SCIENCE AND ENGINEERING
1. Use the methods below to normalize the following group of data:100, 200, 300, 400,550,
600, 680, 850, 1000
(a) min-max normalization by setting min = 0 and max = 1
(b) z-score normalization
(c) Normalization by decimal scaling
Comment on which method you would prefer to use for the given data, givingreasons as to
why.
2. Identify a suitable dataset from any available resources and apply different preprocessing
steps that you have learned. Observe and analyze the output obtained. (Assignment)
2. Illustrate the working of K medoid algorithm for the given dataset. A1=(3,9), A2=(2,5),
A3=(8,4), A4=(5,8), A5=(7,5), A6=(6,4), A7=(1,2), A8=(4,9).
COMPUTER SCIENCE AND ENGINEERING
3. Take a suitable dataset from available resources and apply all the classification and clustering
algorithms that you have studied on original and preprocessed datasets. Analyze the
performance variation in terms of different quality metrics. Give a detailed report based on
the analysis. (Assignment)
1. A database has five transactions. Let min sup = 60% and min con f = 80%.
a) Find all frequent item sets using Apriori and FP-growth, respectively. Compare the
efficiency of the two mining processes.
b) List all of the strong association rules (with support s and confidence c) matching the
following metarule, where X is a variable representing customers, and𝑖𝑖𝑖𝑖𝑖𝑖𝑖𝑖𝑖𝑖 denotes
variables representing items (e.g., “A”, “B”, etc.)
∀𝑥𝑥 ∈ 𝑡𝑡𝑡𝑡𝑡𝑡𝑡𝑡𝑡𝑡𝑡𝑡𝑡𝑡𝑡𝑡𝑡𝑡𝑡𝑡𝑡𝑡, 𝑏𝑏𝑏𝑏𝑏𝑏𝑏𝑏(𝑋𝑋, 𝑖𝑖𝑖𝑖𝑖𝑖𝑖𝑖1 ) ∧ 𝑏𝑏𝑏𝑏𝑏𝑏𝑏𝑏(𝑋𝑋, 𝑖𝑖𝑖𝑖𝑖𝑖𝑖𝑖2 ) ⇒ 𝑏𝑏𝑏𝑏𝑏𝑏𝑏𝑏 (𝑋𝑋, 𝑖𝑖𝑖𝑖𝑖𝑖𝑖𝑖3 ) [𝑠𝑠, 𝑐𝑐]
2. Identify and list some scenarios in which association rule mining can be used, and then use at
least two appropriate association rule mining techniques in one of the two scenarios.
(Assignment)
1. Consider an e-mail database that stores a large number of electronic mail (e-mail)
messages. It can be viewed as a semi structured database consisting mainly of text data.
Discuss the following.
a. How can such an e-mail database be structured so as to facilitate multidimensional
search, such as by sender, by receiver, by subject, and by time?
b. What can be mined from such an e-mail database?
c. Suppose you have roughly classified a set of your previous e-mail messages as junk,
unimportant, normal, or important. Describe how a data mining system may take this
as the training set to automatically classify new e-mail messages or unclassified ones.
2. Precision and recall are two essential quality measures of an information retrieval system.
(a) Explain why it is the usual practice to trade one measure for the other.
(b) Explain why the F-score is a good measure for this purpose.
COMPUTER SCIENCE AND ENGINEERING
(c) Illustrate the methods that may effectively improve the F-score in an information
retrieval system.
3. Explain HITS algorithm with an example.
PART A
6. Given two objects represented by the tuples (22,1,42,10) and (20,0, 36,8).
Compute the Euclideanand Manhattan distance between the two objects.
7. The pincer search algorithm is a bi-directional search, whereas the level wise
algorithm is a unidirectional search. Express your opinion about the statement.
8. Define support, confidence and frequent set in association data mining context.
Part B
(Answer any one question from each module. Each question carries 14 Marks)
11. (a) Suppose a data warehouse consists of three measures: customer, account (7)
and branch and two measures count (number of customers in the branch)
and balance. Draw the schema diagram using snowflake schema and star
schema.
(b) Explain three- tier data warehouse architecture with a neat diagram. (7)
OR
13 (a) Suppose that the data for analysis includes the attribute age. The age values (8)
for the data tuples are (in increasing order) 13, 15, 16, 16, 19, 20, 20, 21, 22,
22, 25, 25, 25, 25, 30, 33, 33, 35, 35, 35, 35, 36, 40, 45, 46, 52, 70.
(a) Use min-max normalization to transform the value 35 for age onto
COMPUTER SCIENCE AND ENGINEERING
the
range [0-1].
(b) Use z-score normalization to transform the value 35 for age, where
the standard deviation of age is 12.94 years.
(c) Use normalization by decimal scaling to transform the value 35 for
age.
(d) Use smoothing by bin means to smooth the above data, using a bin
depth of 3. Illustrate your steps. Comment on the effect of this
technique for the given data.
(b) With proper illustration, explain how PCA can be used for dimensionality (6)
reduction? Explain
OR
14 (a) Suppose a group of 12 sales price records has been sorted as follows: 5, 10, (8)
11, 13, 15, 35, 50, 55, 72, 92, 204, 215. Sketch examples of each of the
following sampling techniques: SRSWOR, SRSWR, cluster sampling,
stratified sampling. Use samples of size 5 and the strata “youth,” “middle-
aged,” and “senior.”
(b) Partition the above data into three bins by each of the following methods: (6)
(i) equal-frequency (equi-depth) partitioning
(ii) equal-width partitioning
15 (a) Explain the concept of a cluster as used in ROCK. Illustrate with examples (9)
(b) Consider the following dataset for a binary classification problem. (5)
A B Class
Label
T F +
T T +
T T +
T F -
T T +
F F -
F F -
F F -
T T -
T F -
Calculate the gain in Gini index when splitting on A and B respectively.
Which attribute would the decision tree induction algorithm choose?
COMPUTER SCIENCE AND ENGINEERING
OR
16 (a) For a sunburn dataset given below, find the first splitting attribute for the (10)
decision tree by using the ID3 algorithm.
17 (a) Illustrate the working of Pincer Search Algorithm with an example. (7)
(b) Describe the working of dynamic itemset counting technique? Specify when (7)
to move an itemset from dashed structures to solid structures?
OR
18 (a) A database has six transactions. Let min_sup be 60% and min_conf be (9)
80%.
TID items_bought
T1 I1, I2, I3
T2 I2, I3, I4
T3 I4, I5
T4 I1, I2, I4
(b) Write partitioning algorithm for finding large itemset and compare its (5)
efficiency with apriori algorithm
COMPUTER SCIENCE AND ENGINEERING
(b) Write an algorithm to find maximal frequent forward sequences to mine log (7)
traversal patterns. Illustrate the working of this algorithm.
OR
20 (a) Explain how web structure mining is different from web usage mining and (7)
web content mining? Write a CLEVER algorithm for web structure mining.
(b) Describe different Text retrieval methods. Explain the relationship between (7)
text mining and information retrieval and information extraction.
Teaching Plan
No. of
No Contents lecture
hours
(36
Hrs)
YEAR OF
CATEGORY L T P CREDIT INTRODUCTION
CST476 MOBILE COMPUTING
PEC 2 1 0 3 2019
Preamble: The course is designed with the view of preparing the engineering students
capable of understanding the communication protocols, various architectures and security
features used in mobile computing. This course covers basics of mobile computing,
architecture of wireless transmission systems and next generation networks. This course
enables the learners to acquire advanced concepts on wireless communication systems and
mobile ad-hoc networks.
Course Outcomes: After the completion of the course the student will be able to
CO1
CO2
CO3
CO4
COMPUTER SCIENCE AND ENGINEERING
CO5
CO6
Assessment Pattern
Remember 30 30 30
Understand 50 50 50
Apply 20 20 20
Analyse
Evaluate
Create
Mark Distribution
Syllabus
Text Books
1. Asoke K. Talukder, Hasan Ahmad, Roopa R Yavagal, Mobile Computing Technology-
Application and Service Creation, 2/e, McGraw Hill Education.
2. Jochen Schiller, Mobile Communications, Pearson Education Asia, 2008.
3. Jonathan Rodriguez, Fundamentals of 5G Mobile Networks, Wiley Publishers, 2015.
Reference Books
1. Raj Kamal, Mobile Computing, 2/e, Oxford University Press.
2. Andrew S. Tanenbaum, Computer Networks, PHI, 3/e, 2003
3. Theodore S. Rappaport, Wireless Communications Principles and Practice, 2/e, PHI, New
Delhi, 2004.
4. Curt M. White, Fundamentals of Networking and Communication 7/e, Cengage learning.
data. Show the encoding, decoding and channel sharing mechanisms using CDMA.
2. Compare the influence of near/far effect and its countermeasures in TDMA and
CDMA systems.
Reg No:_______________
Name:_________________
3. Compare and contrast the satellite systems – GEO, LEO and MEO.
4. Assume all stations can hear all other stations. One station wants to transmit
and senses the carrier idle. Why can a collision still occur after the start of
transmission?
7. Mention the basic purpose of DHCP. Also list the entities of DHCP.
10. How does multifactor security model provide security in a mobile network?
(10x3=30)
Part B
(Answer any one question from each module. Each question carries 14 Marks)
11. (a) Describe the design considerations of three tier architecture of mobile (6)
computing.
(b) Explain any four functions and applications of mobile computing. (8)
OR
12. (a) Explain Internet-Ubiquitous networks mentioning the significance and (6)
functions of core, edge and access network.
(b) With the help of a neat sketch explain the three-tier architecture of mobile (8)
computing.
13. (a) Check to see if the following set of chips can belong to an orthogonal system. (6)
[+1, +1, +1, +1] , [+1, -1, -1, +1] , [-1, +1, +1, -1] , [+1, -1, -1, +1]
(b) Summarize the routing and localization process in satellite systems. (8)
OR
14. (a) Apply Direct Sequence Spread Spectrum to the data 101 using Barker (6)
sequence 10110111000. Show the encoding and decoding steps.
(b) Describe the system architecture of GSM networks. (8)
OR
16. (a) Describe the protocol architecture of IEEE 802.11. (6)
(b) Explain the Medium Access Control management features provided in an (8)
IEEE 802.11 station.
17. (a) With the help of an example, show the routing table creation using (7)
Destination Sequence Distance Vector Routing protocol in mobile ad-hoc
networks.
(b) Describe the router discovery methods used in mobile IP. (7)
OR
18. (a) Compare the features of flat routing and hierarchical routing. (6)
(b) List the entities of a mobile IP. With the help of an example, explain how (8)
packet delivery is done to and from a fixed node.
OR
20. (a) Describe the services of Wireless Asynchronous Transfer Mode. (6)
TEACHING PLAN
No Contents No.of
Lecture
Hrs
(35 hrs)
Module – 1 (Mobile Computing Basics) (6 hrs)
3.6 HIPERLAN-1 1
3.7 Bluetooth 1
SEMESTER VIII
PROGRAM ELECTIVE V
COMPUTER SCIENCE AND ENGINEERING
YEAR OF
HIGH PERFORMANCE CATEGORY L T P CREDIT INTRODUCTION
CST418
COMPUTING
PEC 2 1 0 3 2019
Preamble: This course helps the learners to understand the different architectural features of
high-end processors. This course discusses the Basics of high-end processors Architecture,
Instruction-Level Parallelism, Data-Level Parallelism, Thread Level Parallelism, and GPU
Architectures. This course enables the students to provide solutions to real-world problems
making use of the capabilities of HPC systems.
Prerequisite: Basic knowledge in Computer System architecture, Microprocessors, Operating
systems, and System software.
Course Outcomes: After the completion of the course the student will be able to
CO1 Describe different types of modern processing environments and parallel computing
hardware (Cognitive Knowledge Level: Understand)
CO3 Appreciate the idea of Data Level Parallelism (Cognitive Knowledge Level: Apply)
CO4 Demonstrate the concept of Thread Level Parallelism (Cognitive Knowledge Level:
Apply)
CO5 Describe the basics of GPU architecture. (Cognitive Knowledge Level: Understand)
CO1
CO2
CO3
CO4
C05
COMPUTER SCIENCE AND ENGINEERING
Assessment Pattern
Remember 20 20 20
Understand 50 50 50
Apply 30 30 30
Analyze
Evaluate
Create
Mark Distribution
150 50 100 3
COMPUTER SCIENCE AND ENGINEERING
Syllabus
Module-1 ( Basics of Architecture )
Classes of Computers - Classes of Parallelism and Parallel Architectures – Defining Computer
Architecture – Dependability – Quantitative Principles of Computer Design – Basics of Memory
Hierarchies – Virtual Memory and Virtual Machines – Pipelining
2. Assume a single-issue pipeline. Unroll the loop as many times as necessary to schedule it
without any stalls, collapsing the loop overhead instructions. How many times must the
loop be unrolled? Show the instruction schedule. What is the execution time per element of
the result?
3. Explain the SIMD Instruction Set Extensions for Multimedia.
QP CODE:
PART A
5. What is the equation of CPI (cycles per instruction) for a pipelined processor? How
can we set the ideal pipeline CPI?
6. Explain the two types of name dependencies between an instruction i that precedes
instruction j in program order.
8. Why SMP architectures are called UMA multiprocessors and DSM multiprocessors
as NUMA processors.
COMPUTER SCIENCE AND ENGINEERING
3x10=30
Part B
(Answer any one question from each module. Each question carries 14 Marks)
11. (a) Describe the quantitative principle of computer design with Amdahl's law. (8)
(b) Discuss in detail the importance of considering processor performance for (6)
the design of an efficient computer system.
OR
12. (a) Illustrate how processes are protected with the help of virtual memory. (7)
(b) Discuss the role played by virtual machines in providing protection for (7)
processes.
(b) With neat sketches explain how data-level parallelism is achieved in vector, (6)
and SIMD architectures.
OR
14. (a) Describe the unique features of very long instruction word processors. (8)
(b) Consider a three-way superscalar machine renaming these three instructions (6)
concurrently:
COMPUTER SCIENCE AND ENGINEERING
If the value of x1 starts at 5, then what will be its value when after this
sequence is executed?
15. (a) The following loop has multiple types of dependences. Find all the true (8)
dependences, output dependencies, and anti-dependencies, and eliminate the
output dependencies and anti-dependencies by renaming.
OR
16. (a) Demonstrate the different types of hardware approaches required for the (8)
working of multithreading.
Are there exist dependencies between S1 and S2? Determine whether the
above loop is parallel? If not, show how to make it parallel.
17. (a) Consider an 8-processor multicore where each processor has its own L1 and (8)
L2 caches. Here snooping is performed on a shared bus among the L2
caches. Assume that the average L2 request is 15 cycles for a coherence
miss or other miss and a clock rate of 3.0 GHz, a CPI of 0.7, and a load/store
frequency of 40%. If the goal set is that no more than 50% of the L2
bandwidth is consumed by coherence traffic, then what is the maximum
coherence miss rate per processor?
OR
(b) With a neat diagram, demonstrate invalidate cache coherence protocol for a (8)
private write-back cache, showing the states and state transitions for each
block in the cache.
OR
20. (a) Discuss in detail the characteristics of GPU memory spaces. (8)
Teaching Plan
No. of
Lecture
No Contents Hours
(36 hrs)
Module 1 - Basics of Architecture (7 hours)
YEAR OF
BLOCKCHAIN CATEGORY L T P CREDIT INTRODUCTION
CST428
TECHNOLOGIES
PEC 2 1 0 3 2019
Preamble: The purpose of this course is to create awareness and understanding among students
on the foundation of blockchain technology. The course introduces the cryptographic principles
behind blockchain and helps the students understand concepts like consensus, crypto-currency,
smart contracts, use cases etc. The course enables students to develop simple decentralized
applications using blockchain networks such as Ethereum.
Prerequisite: Basic knowledge in data structures and operating systems.
Course Outcomes: After the completion of the course the student will be able to
CO5 Explain the use of smart contracts and its use cases. (Cognitive Knowledge Level:
Understand)
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO1 PO11 PO1
0 2
CO1
CO2
COMPUTER SCIENCE AND ENGINEERING
CO3
CO4
CO5
CO6
Assessment Pattern
Remember 30 30 30
Understand 50 50 50
Apply 20 20 20
Analyze
Evaluate
Create
COMPUTER SCIENCE AND ENGINEERING
Mark Distribution
150 50 100 3
Text Book
1. Imran Bashir, Mastering Blockchain: A deep dive into distributed ledgers, consensus
protocols, smart contracts, DApps, cryptocurrencies, Ethereum, and more, Packt Publishing,
Third edition, 2020.
References
2. Ritesh Modi, Solidity Programming Essentials: A beginner's guide to build smart contracts
for Ethereum and blockchain, Packt Publishing, First edition, 2018.
3. Kumar Saurabh, Ashutosh Saxena, Blockchain Technology: Concepts and Applications,
First Edition, Wiley Publications, First edition, 2020.
4. Chandramouli Subramanian, Asha A George, et al, Blockchain Technology, Universities
Press (India) Pvt. Ltd, First edition, August 2020.
COMPUTER SCIENCE AND ENGINEERING
QP CODE:
PART A
5. If your blockchain network has 5 Byzantine nodes, what is the minimum number of
nodes that are required to ensure Byzantine fault tolerance using PBFT protocol?
7. Explain how smart contracts can be used for enforcing agreements between parties
in the form of business logic.
10. With the help of a figure show the relationship between the transaction, transaction (10x3=30)
trie, and block header in Ethereum.
Part B
(Answer any one question from each module. Each question carries 14 Marks)
11. (a) Explain the design of SHA-256 and its compression function using a (9)
diagram.
(b) Explain how hash functions are used to build Merkle trees in blockchain. (5)
OR
12. (a) Explain public and private keys. Perform encryption and decryption using (7)
RSA for p=3, q=11, e= 7 and M=5.
13. (a) Illustrate and explain how blockchain works using a neat diagram. (7)
OR
14. (a) Explain consensus mechanisms used in blockchain. List out any six (7)
consensus algorithms used in the context of blockchain.
15. (a) Explain and illustrate how Paxos protocol can be used to achieve consensus. (7)
(b) Show how Practical Byzantine Fault Tolerance can achieve consensus in the (7)
presence of Byzantine faults.
OR
16. (a) Describe the various fields that make up a transaction in Bitcoin. (7)
(b) What is the role of a Bitcoin miner? Explain the mining algorithm used in (7)
COMPUTER SCIENCE AND ENGINEERING
17. (a) Illustrate how blockchain technology can be implemented in finance sector. (7)
(b) Discuss oracles in a blockchain ecosystem. Explain the generic data flow from (7)
a smart contract to an oracle.
OR
18. (a) Explain the design process of decentralized applications with diagrams. (7)
(b) Explain the use of blockchain technology in supply chain management. (7)
19. (a) Using Solidity language, create a simple bank contract that allows a user to (7)
deposit, withdraw and view balance.
(b) Define block difficulty. Explain how block difficulty is adjusted in Ethereum (7)
blockchain network.
OR
20. (a) Using Solidity language, create a simple voting smart contract where a (7)
chairperson will give the right to vote to each address individually.
(b) Explain the concept of Gas in Ethereum. Explain how transaction cost can be (7)
calculated in an Ethereum blockchain network.
COMPUTER SCIENCE AND ENGINEERING
Teaching Plan
No. of
Lecture
No Contents Hours
(35 hours)
Module-1 (Fundamentals of Cryptography) (7 hours)
YEAR OF
IMAGE PROCESSING CATEGORY L T P CREDIT INTRODUCTION
CST438
TECHNIQUE
PEC 2 1 0 3 2019
Preamble: This course helps the learners understand the core concepts and applications of Digital
Image Processing. It covers Digital Image Fundamentals, Image Transforms, Image Enhancement
in Spatial and Frequency Domain, Image Restoration & Image Segmentation and Morphological
Operations & Representation and Description. The learners will be able to develop new
algorithms, tools, and application software for real-world applications involving image processing.
Prerequisite: A basic knowledge of Computer Graphics and Image representation
Course Outcomes: After the completion of the course, the student will be able to
CO1 Explain the concepts of image formation and the basis of digital image processing.
(Cognitive Knowledge Level: Understand)
CO2 Demonstrate the role of image transforms in representing, highlighting, and modifying
image features. (Cognitive Knowledge Level: Apply)
Solve image enhancement problems using spatial and frequency domain techniques.
CO3
(Cognitive Knowledge Level: Apply)
CO4 Make use of the concept of image restoration and image segmentation techniques in
real-world problems. (Cognitive Knowledge Level: Apply)
Assessment Pattern
Remember 30 30 30
Understand 40 40 40
Apply 30 30 30
Analyze
Evaluate
Create
Mark Distribution
150 50 100 3
COMPUTER SCIENCE AND ENGINEERING
Syllabus
Module – 1 (Digital Image Fundamentals)
Elements of Visual Perception, A Simple Image Formation Model. Spatial and Intensity
Resolution. Image Interpolation. Classification of Digital Images. Image Types. Image Storage
Mechanisms. Arithmetic and Logical Operations. Geometric Spatial Transformations and Image
Registration. Image File Formats. Colour Fundamentals and Colour Models.
Module - 2 (Image Transforms)
Basic concept of spatial domain and frequency domain, Unitary transform, Discrete Fourier
Transform- 2D DFT, 4 order DFT Transform coefficients, Forward and inverse transform,
Discrete Cosine Transform- 2D DCT, 4 order DCT Transform Coefficients(No derivation
needed), Forward and Inverse DCT, Hadamard Transform.
Module - 3 (Image Enhancement in Spatial and Frequency Domain)
Point operations- Clipping and Thresholding, Digital Negative, Intensity Level Slicing, Bit
Extraction, Range Compression. Spatial Operations- Fundamentals of spatial convolution and
COMPUTER SCIENCE AND ENGINEERING
correlation, Spatial averaging and spatial Low pass filtering, Directional Smoothing, Median
Filtering, Unsharp masking and Crispening.
3. Use Discrete Fourier transform to construct 2D DFT for a 4x4 image given below. Assume that
indices start from (0,0)
1. Perform intensity level slicing on the 3 BPP (Bit Per Pixel) image. Let r1=3 and r2=5. Draw
the modified image with/without background transformations.
2. Let y(m) = {2,3,8,4,2}. Obtain the median filter output for the window W = [-1,0,1,2] and
show how salt and pepper noise is reduced.
3. Consider a 3*3 spatial mask that averages the four closest neighbors of a point(x,y), but
excludes the point itself from the average.
2. Consider a noisy image that is restored using arithmetic mean filter of size 3x3 and
using the geometric mean filter of the same size. Which image will be less blurred and
why?
3. Suppose that you want to help a radiologist to extract the tumor portion from an MRI
image for volumetric analysis. This volumetric analysis determines the effect of
treatment on the patient, which can be judged from the extracted size and shape of the
abnormal portion. Manual tracing of the tumor regions is very difficult since the tumor
portion on the MRI image is inhomogeneous, with complex shapes and ambiguous
boundaries. Suggest a sequence of steps that you may use to automate this process as an
image processing student. (ASSIGNMENT)
5. Sketch perspective plot of a 2-D ideal low pass filter transfer function and filter
cross-section. List its usefulness in Image enhancement.
6. Explain the significance of directional smoothing technique.
7. Specify the significance of the Zero crossing detector.
(b) Explain the significance of image interpolation and describe its various types. (7)
13. (a) State the advantages of Discrete Cosine Transform over Discrete Fourier (4)
Transform.
(b) You are given a 4 X 4 image patch Compute 2D DCT for the image patch. (10)
Reconstruct the original image patch by neglecting the last four coefficients in
2D DCT. Comment on the observed result.
OR
14. (a) Discuss the concept of sequency in Hadamard transform. (4)
(b) Find the 2D forward DFT of the image segment (10)
1 1 1 1
1 1 1 1
1 1 1 1
Prove the unitary property of the given image segment.
15. (a) Explain the output and application of the following point processing (9)
techniques
(i)Range Compression (ii) Bit Extraction (iii) Thresholding
(b) State and explain the features of median filtering. Compute the output of the (5)
median filtering for Y(m)={2,4,8,3,2} , w={-1,0,1,2} where Y(m) is an array
and w is a window.
OR
16. (a) Describe the role of Unsharp masking with its applications (4)
(b) Explain and compare the basic frequency domain filters for image sharpening (10)
2 4 8 7
12 6 9 8
13 7 4 3
8 12 4 9
COMPUTER SCIENCE AND ENGINEERING
(b) Illustrate the split and merge algorithm for image segmentation using neat (6)
sketches.
19. (a) Explain the purpose of morphological operations in digital image? Describe (7)
the opening and closing operations with examples.
(b) Illustrate Hit or Miss Transformation. (7)
OR
20. (a) Explain the concept of the chain coding scheme with its applications. (6)
(b) Describe in detail any two boundary representation schemes and illustrate (8)
with examples.
Teaching Plan
No. of
Lecture
No Contents Hours
(36 hrs)
Module-1 (Digital Image Fundamentals) (7 hours)
3.4 Spatial averaging and spatial Low pass filtering, Directional Smoothing. 1
3.7 Smoothing Frequency Domain Filters : Ideal Low Pass Filter; Gaussian Low 1
Pass Filter; Butterworth Low Pass Filter;
3.8 Sharpening Frequency Domain Filters: Ideal High Pass Filter; Gaussian High 1
Pass Filter; Butterworth High Pass filter.
Module-4 (Image Restoration & Image Segmentation) ( 6 hours)
4.1 Image degradation model, Noise models. 1
4.2 Mean Filters – Order Statistic filter – Adaptive filters. 1
4.3 Edge Detection, Gradient operators, Laplace operators and zero crossings. 1
COMPUTER SCIENCE AND ENGINEERING
YEAR OF
CATEGORY L T P CREDIT INTRODUCTION
CST448 INTERNET OF THINGS
PEC 2 1 0 3 2019
Preamble: This course equips the learners with fundamental of the Internet of Things(IoT) and
the IoT ecosystem. It covers the architecture of IoT, communication mechanisms, protocols,
hardware, software, data analytics, and the cloud platforms for IoT. This course enables the
students to design smart IoT applications for real world problems using Raspberry Pi.
Course Outcomes: After the completion of the course the students will be able to
Outline the fundamentals of IoT and its underlying physical and logical architecture(Cognitive
CO1
Knowledge Level: Understand)
CO4 Implement data analytics on the IoT platforms (Cognitive Knowledge Level : Apply)
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO1
CO2
CO3
CO4
COMPUTER SCIENCE AND ENGINEERING
CO5
CO6
Conduct investigations of
PO4 PO10 Communication
complex problems
Assessment Pattern
Remember 30 20 30
Understand 60 50 40
Apply 10 30 30
Analyze
COMPUTER SCIENCE AND ENGINEERING
Evaluate
Create
Mark Distribution
Attendance 10 marks
Continuous Assessment Tests 25 marks
Continuous Assessment Assignment 15 marks
Syllabus
Module- 1 ( IoT Architecture)
What is IoT, Genesis of IoT, IoT and Digitization, IoT Impact, Convergence of IT and IoT, IoT
Challenges, IoT Network Architecture and Design, Drivers Behind New Network Architectures,
Comparing IoT Architectures, A Simplified IoT Architecture, The Core IoT Functional Stack,
IoT Data Management and Compute Stack.
Smart Objects: The “Things” in IoT, Sensors, Actuators, and Smart Objects, Sensor Networks,
Connecting Smart Objects, Communications Criteria, IoT Access Technologies
IP as the IoT Network Layer, The Business Case for IP, The need for Optimization, Optimizing
IP for IoT, Profiles and Compliances, Application Protocols for IoT, The Transport Layer, IoT
Application Transport Methods
Data and Analytics for IoT, An Introduction to Data Analytics for IoT, Machine Learning, Big
Data Analytics Tools and Technology, Edge Streaming Analytics, Network Analytics, Securing
IoT, A Brief History of OT Security, Common Challenges in OT Security, Differences between
IT and OT Security Practices and Systems, Formal Risk Analysis Structures: OCTAVE and
FAIR.
IoT Logical Design using Python, IoT Physical Devices and Endpoints - Raspberry Pi interfaces,
Programming Raspberry Pi using Python, Other IoT devices, IoT Physical devices and Cloud
offerings, Cloud Storage Models, WAMP - Autobahn for IoT, Django, Designing RESTful Web
API, Cloud Web Services for IoT.
Textbooks
1. David Hanes, Gonzalo Salgueiro, Patrick Grossetete, Robert Barton, Jerome Henry, "IoT
Fundamentals: Networking Technologies, Protocols, and Use Cases for the Internet of
Things”, 1st Edition, Pearson Education (Cisco Press Indian Reprint)
COMPUTER SCIENCE AND ENGINEERING
References
1. Rajkamal, “Internet of Things: Architecture and Design Principles”, McGraw Hill (India)
Private Limited
2. Dieter Uckelmann, Mark Harrison, Michahelles Florian (Ed.), Architecting the internet of
things, Springer, 2011
3. Dr. Ovidiu Vermesan, Dr. Peter Friess, Internet of Things: Converging Technologies for
Smart Environments and Integrated Ecosystems, River Publishers, 2013
4. Simon Monk, “Programming Arduino: Getting Started with Sketches”, McGraw Hill
Publications
2. Describe the functions of the various layers of simplified IoT Architecture Model.
6. With neat diagrams compare the IoT protocol stacks using 6LoWPAN and IP.
Part B
(Answer any one question from each module. Each question carries 14 Marks)
11. (a) Illustrate the impact of IoT in at least 2 domains of normal human life. (9)
(b) Describe the Application and Analytics sublayer of IoT Architecture (6)
OR
12. (a)
Describe the Standardized IoT architectures.
(8)
(b) Explain the functions of Access Network Sublayer of IoT Architecture (6)
13. (a)
Describe the LoRaWAN technology as an IoT communication paradigm.
(10)
(b) (4)
Describe various types of sensors.
OR
14. (a) Define actuators. Describe the roles of actuators in IoT systems. (6)
(b) Explain the IEEE 802.15.4 standard for wireless communication. (8)
15. (a) Explain Message Queuing Telemetry Transport framework and message (8)
format.
(b) Explain tunneling of legacy SCADA over IP Networks with a neat diagram. (6)
OR
17. (a) Explain the Hadoop ecosystem with a neat diagram. (7)
OR
18. (a) Explain the “The Purdue Model for Control Hierarchy” and OT network (8)
characteristics.
OR
20. (a) Demonstrate an example of Raspberry Pi applications for Industrial IoT. (8)
TEACHING PLAN
No Contents No of
Lecture
Hrs (35
Hrs)
1.6 The Core IoT Functional Stack, IoT Data Management and Compute Stack. 1
5.7 Django 1
YEAR OF
CATEGORY L T P CREDIT INTRODUCTION
CST458 SOFTWARE TESTING
PEC 2 1 0 3 2019
Preamble: This is a course in theoretical computer science that introduces the concepts and
methods in software testing. It covers various techniques for test case design used to test software
artifacts, including requirements, design, and code, the different techniques for test case design
based on graphs, programming language syntaxes and symbolic execution using PEX tool. It
enables the learners to follow a systematic software testing approaches while developing
applications.
Prerequisite: Nil
Course Outcomes: After the completion of the course the student will be able to:-
List a range of different software testing techniques and be able to apply specific unit
CO1 testing method to the projects using Junit.(Cognitive Knowledge Level:
Understand)
Illustrate using appropriate tools the mutation testing method for a given piece of code
CO2 to identify hidden defects that can’t be detected using other testing
methods.(Cognitive Knowledge Level: Apply)
CO3 Explain graph coverage criteria in terms of control flow graph and data flow graph
for a given program.(Cognitive Knowledge Level: Understand)
CO5 Illustrate the use of PEX tool with symbolic execution.(Cognitive Knowledge Level:
Apply)
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO 9 PO10 PO11 PO12
CO1
CO2
CO3
CO4
COMPUTER SCIENCE AND ENGINEERING
CO5
Assessment Pattern
Remember 30 30 30
Understand 40 40 40
Apply 30 30 30
Analyze
Evaluate
Create
Mark Distribution
Attendance 10 marks
Continuous Assessment Tests(Average of SeriesTests1& 2) 25 marks
Syllabus
Module - 1 (Introduction to Software Testing)
Some Popular Errors – Ariane 5, Therac 25, Intel Pentium Bug. What is Software testing? Why should it
be tested? Software Quality, Role of Testing. Testing Process - Level 0 thinking, Level 1 thinking, Level 2
thinking, Level 3 thinking, Level 4 thinking. Software Testing Terminologies - Verification, Validation
and Testing, Faults, Error and Bug, Test cases, Coverage Criteria. Types of Testing- Unit testing,
integration testing, System testing, Acceptance testing, Beta testing, Functional testing, Stress testing,
Performance testing, Usability testing and Regression testing. Testing Methods - Black Box testing, White
Box testing, Grey Box testing.
Overview of Graph Coverage Criteria. Structural Graph Coverage Criteria - Node/vertex coverage, Edge
coverage, Edge pair coverage, Path coverage, Complete path coverage, Prime path coverage, Complete
round trip coverage, Simple round trip coverage. Data Flow Criteria - du paths, du pairs. Subsumption
Relationships among Graph Coverage Criteria. Graph Coverage for Source Code - Control flow graphs for
code, CFG: If statement, CFG: If statement with return, CFG: Switch-case, CFG: Loops, CFG: Exceptions
(try-catch). Example program – Statistics. Graph Coverage for Design Elements - Call graphs and classes,
Class inheritance testing: Coverage criteria, Coverage criteria on inheritance graph, Data flow at the design
level, Inter-procedural DU pairs, Coupling du-pairs example. Example - Quadratic Root. Case Study -
Graph Based testing using JUnit Framework.
Text Books
1. Paul Ammann and JeffOffutt , Introduction to Software Testing, Cambridge University Press
2. Kshirasagar Naik and Priyadarshi Tripathy, Software Testing And Quality Assurance: Theory And
Practice, Wiley.
Reference Materials
1. King, James C, “Symbolic Execution and Program Testing”, Association for Computing Machinery,
July 1976.
intrslt;
rslt = Left;
if (Right == 0)
{
rslt = 1;
}
else
{
for (int i = 2; i <= Right; i++)
rslt = rslt * Left;
}
return (rslt);
}
Course Outcome 3 (CO3):
Draw the control flow graph and data flow graph of given piece of code.
public static double ReturnAverage(int value[],int AS, int MIN, int MAX){
/*
Function: ReturnAverageComputes the averageof all those numbers in the input array in
the positive range [MIN, MAX]. The maximum size of the array is AS. But, the array size
could be smaller than AS in which case the end of input is represented by -999.
*/
int i, ti, tv, sum;
doubleav;
i = 0; ti = 0; tv = 0; sum = 0;
while (ti< AS && value[i] != -999) {
ti++;
if (value[i] >= MIN && value[i] <= MAX) {
tv++;
sum = sum + value[i];
}
i++;
}
COMPUTER SCIENCE AND ENGINEERING
if (tv> 0)
av = (double)sum/tv;
else
av = (double) -999;
return (av);
}
Course Outcome 4 (CO4):
Explain the following with examples.
1. Input domain modelling.
2. All Combinations Coverage (ACoC)
3. Each Choice Coverage (ECC)
4. Pair-wise Coverage
5. T-wise Coverage
6. Base Choice Coverage
7. Multiple Base Choices Coverage.
Course Outcome 5 (CO5):
Draw the symbolic execution tree for the following program code and explain the symbolic
execution of testme (α1, α2).
int twice (int v) {
return 2 ∗ v;
}
void testme (int x, int y ) {
z = twice ( y);
if ( z == x ){
if ( x > y + 10)
ERROR;
}
}
int main() {
x = sym input();
y = sym input();
testme ( x , y);
COMPUTER SCIENCE AND ENGINEERING
return(0);
QP CODE: PAGES: 3
PART A
Answer all Questions. Each question carries 3 Marks
4. What are the functions of Test driver and Test stubs in dynamic unit testing?
5. Define Node coverage, Edge coverage and Prime path coverage in a control flow
graph?
10. Explain the concept of symbolic execution with the help of a toy example?
(10x3=30)
Part B
(Answer any one question from each module. Each question carries 14 Marks)
(i) Black Box testing (ii) White Box testing (iii) GreyBox testing (14)
(iv) Unit testing (v) Integration testing (vi) System testing (vii) Acceptance
testing
OR
12. (a) Explain the following coverage criterias based on the code fragment given
below? (i) Functional coverage (ii) Statement coverage (iii)Conditional (8)
coverage (iv)Branch coverage
int foo (int x, int y){
int z = 0;
if ((x > 0) && (y > 0)){
z = x;}
return z;
}
(b) Write positive and negative test cases for an ATM Machine? (6)
13. (a) Explain Dynamic unit test environment with a neat figure.
(8)
(b) Explain the major difference between control flow testing and data flow
testing. (6)
OR
14. (a) Explain seven types of mutation operators with neat examples? (14)
15. (a) Explain touring, side trips and detours with a neat example (7)
(b) Explain simple path coverage and prime path coverage with the help of CFG (7)
given below? 1
2 3
OR
COMPUTER SCIENCE AND ENGINEERING
OR
18. (a) Consider the triangle classification program with a specification: (6)
The program reads floating values from the standard input. The three values
A, B, and C are interpreted as representing the lengths of the sides of
triangle. The program then prints a message to the standard output that states
whether the triangle, if it can be formed, is scalene, isosceles, equilateral,
orright angled. Determine the following for the above program:
(i) For the boundary condition A +B > C case (scalene triangle),
identify test cases to verify the boundary.
(ii) For the boundary condition A = C case (isosceles triangle), identify
testcases to verify the boundary.
(iii) For the boundary condition A = B = C case (equilateral triangle),
identify testcases to verify the boundary.
(b) Develop a decision table to generate test cases for this specification. (8)
19. (a) Explain the importance of grey box testing, its advantages and disadvantages? (9)
OR
3. J ← 1;
4. LAB: IF Y ≥ J THEN
5. DO; Z← Z * X;
6. J ← J + 1;
7. GO TO LAB; END;
8. RETURN (Z) ;
9. END;
a) Explain Symbolic execution of POWER (αl, α2).
TEACHING PLAN
No Contents No of
Lecture Hrs
(35 hrs)
1.1 Some Popular Errors– Ariane 5, Therac 25, Intel Pentium Bug. 1 Hour
Testing Methods - Black Box testing, White Box testing, Grey Box
1.7 testing. 1 Hour
Dynamic Unit testing - Control Flow testing, Data Flow testing, Domain
2.2 testing, Functional Program testing. 1 Hour
Graph Coverage for Source Code – Control Flow Graphs (CFG) for code,
3.5 CFG: If statement, CFG: If statement with return, CFG: Switch-case, 1 Hour
CFG: Loops, CFG: Exceptions (try-catch). Example program - Statistics
Graph Coverage for Design Elements – Structural graph coverage and
3.6 data flow graph coverage for design elements 1 Hour
3.7 Case Study - Graph Based testing using JUnit Framework. (Lecture 1) 1 Hour
3.8 Case Study - Graph Based testing using JUnit Framework. (Lecture 2) 1 Hour
4.7 Case Study - Black Box testing approaches using JUnit. 1 Hour
Introduction to Grey Box testing - Why Grey Box testing, Gray Box
5.1 Methodology, Advantages and Disadvantages. 1 Hour
YEAR OF
CATEGORY L T P CREDIT
CST468 BIOINFORMATICS INTRODUCTION
PEC 2 1 0 3 2019
Preamble: This course helps the learners to understand the fundamental concepts in Molecular
Biology, Genomics, Proteomics and Modelling. This course introduces bio macromolecules such
as genes and proteins, different biological databases, and tools and algorithms for biological data
processing, analysis and interpretation, and the elements of the systems approach to Molecular
Biology. This course enables the learners to contribute towards drug discovery and
computational analysis and modelling of biological process.
Course Outcomes: After the completion of the course, the student will be able to
CO 2 Identify biological data formats and databases, retrieve bio-sequences, and align bio-
sequences to identify similarity (Cognitive knowledge level : Apply)
CO 3 Employ similarity searching tools and algorithms to align sequences to highlight the
similarity, and describe the structure of genes (Cognitive knowledge level : Apply)
CO 4 Demonstrate Protein Structure, visualize protein structure using tools, and explain how
proteins interact (Cognitive knowledge level : Apply)
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO1
CO2
CO3
COMPUTER SCIENCE AND ENGINEERING
CO4
CO5
Assessment Pattern
Mark Distribution
Attendance 10 marks
Syllabus
Module-1 (Introduction to bioinformatics)
Introduction to bioinformatics, Nature & Scope of Bioinformatics, DNA, RNA, and Protein: The
Central Dogma, Messenger RNA, tRNA, rRNA, Genetic code, Gene Structure and Control,
Transcription, translation
Introduction to Biological Databases, NCBI, Genbank, Bio sequence formats- FASTA, Sequence
alignment- Global Alignment and Local Alignment, Dot Matrix Method, Dynamic Programming
Method, Gap Penalties, Amino Acid Scoring Matrices - PAM and BLOSUM
Module-4 (Proteomics)
Introduction to Systems Biology, Models and Modelling, Properties of models, Systems state
and steady state, Variables, Parameters, and Constants in modelling, Purpose and Adequateness
of Models, Advantages of Computational Modelling, Model Development, Network Versus
Elements, Modularity, Robustness and Sensitivity, Data Integration
Text books
1. Zvelebil, Marketa J., and Jeremy O. Baum. Understanding bioinformatics. Garland Science,
2007.
2. Xiong, Jin. Essential bioinformatics. Cambridge University Press, 2006.
3. Klipp, E., Herwig, R., Kowald, A., Wierling, C., &Lehrach, H. Systems biology in practice:
concepts, implementation and application. John Wiley & Sons. 2005
References
1. Baxevanis, Andreas D., Gary D. Bader, and David S. Wishart, eds. Bioinformatics. John
Wiley & Sons, 2020.
2. Shaik, Noor Ahmad, et al. Essentials of Bioinformatics, Volume I. Springer, 2019
COMPUTER SCIENCE AND ENGINEERING
3. Selzer, Paul M., Richard J. Marhöfer, and Andreas Rohwer, Applied bioinformatics. An
introduction–Springer, Verlag,, 2008.
4. S C Rastogi, N Mendiratta and PRastogi, Bioinformatics: Methods and Applications , PHI
Learning Private Limited, New Delhi, 2015.
5. D E Krane and M L Raymer, Fundamental Concepts of Bioinformatics, Pearson Education,
2006.
6. Andreas D.Baxevanis, B F Francis Ouellette, Bioinformatics - A Practical Guide to the
Analysis of Genes and Proteins, Third Edition, John Wiley & Sons INC. , U.K. 2006
7. Neil C Jones and Pavel A Pevzner, An Introduction to Bioinformatics Algorithms, MIT press,
2004.
5. Write short note on Gap penalties and its usage in comparing Biological
sequences.
6. List any three typesof BLAST and make short description on each.
OR
12. (a) Discuss translation process in protein synthesis. (6)
(b) Explain bio-molecules involved in central dogma, its structure and types. (8)
13. (a) Explain the importance of Primary and secondary databases in (6)
Bioinformatics
(b) Illustrate the methods of pairwise sequence alignment. What is the use of (8)
assigning gap penalties in alignment?
OR
14. (a) Illustrate sequence alignment. What are the applications of sequence (7)
alignment in Bioinformatics?
(b) What is the use of scoring matrices? Differentiate between PAM and (7)
BLOSUM matrices and its usage in alignment.
15. (a) Using Needleman and Wunsch dynamic programming method, construct the (9)
partial alignment score table for the following two sequences, using the
scoring parameters: match score: +5, mismatch score: -1, gap penalty: -2.
CCATGCU
GATTACA
Also write down the optimal global alignment between these sequences along
with the optimal score.
(b) Interpret the blast result and statistical significance of the alignment by (5)
analyzing the results.
OR
16. (a) Using Smith Waterman method construct the partial alignment scoring table (9)
and obtain the optimal local alignment of the following two sequences:
ACGTATCGCGTATA
GATGCTCTCGGAJAA
(b) Illustrate multiple sequence alignment. (5)
17. (a) Discuss hierarchies of protein structure. (6)
(b) Explain how the protein structure is determined by using experimental (8)
techniques.
OR
18. (a) Discuss protein interaction. How it contributes to the complexity of an (9)
organism?
19. (a) Discuss systems biology approach of understanding complex biological (6)
systems.
(b) Explain on Variables, Parameters, and Constants in modeling biological (8)
systems.
OR
20. (a) Explain on advantages of Computational Modeling of biological system. (7)
(b) What are the properties of models in biological system? (7 )
TEACHING PLAN
No Contents No of Lecture
(36 Hrs)
Module-1 (Introduction to bioinformatics)(8 hrs)
Text 1 (Relevant topics from chapter 1.1, 1.2, 1.3)
YEAR OF
COMPUTATIONAL CATEGORY L T P CREDIT INTRODUCTION
CST478 LINGUISTICS
PEC 2 1 0 3 2019
Preamble: The course aims to teach the basics of Computational Linguistics to the students
viewing language phenomena from a computational/statistical standpoint. This involves ideas about
statstical and computational models and how these could be linked with various language
processing tasks. The course helps the learner to appreciate the complexities involved in language
processing tasks using a machine, in contrast with the ease with which human beings handle them.
Some practical aspects are also discussed using the Python and NLTK framework to equip the
student with the capability to design solutions to linguistic problems.
Prerequisite: Nil
Course Outcomes: After the completion of the course the student will be able to
CO# CO
Develop simple systems for linguistic tasks using Python and NLTK.
CO6
(Cognitive Knowledge Level: Apply)
COMPUTER SCIENCE AND ENGINEERING
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO1
CO2
CO3
CO4
CO5
CO6
Assessment Pattern
Continuous Assessment Tests
Bloom’s End Semester Examination
Category Marks (%)
Test 1 Test 2
(%) (%)
Remember 30 30 30
Understand 30 30 30
Apply 40 40 40
Analyze
Evaluate
COMPUTER SCIENCE AND ENGINEERING
Create
Mark Distribution
There will be two parts; Part A and Part B. Part A contains 10 questions with 2 questions from
each module, having 3 marks for each question. Students should answer all questions. Part B
contains 2 full questions from each module of which student should answer any one. Each
question can have maximum 2 sub-divisions and carries 14 marks.
COMPUTER SCIENCE AND ENGINEERING
Syllabus
Module- 1 (Preliminaries)
Introduction: Rationalist and Empiricist Approaches to Language-Questions that linguistics
should answer-Noncategorical phenomena in language-Language and cognition as
probabilistic phenomena
The Ambiguity of Language: Why natural language processing is difficult-Lexical resources-
Word counts-Zipf’s laws-Collocations-Concordances
Linguistic Essentials:
Parts of Speech and Morphology -Nouns and pronouns-Words that accompany nouns:
Determiners and adjectives-Verbs-Other parts of speech-Phrase Structure-Phrase structure
grammars -Semantics and Pragmatics-Corpus Based Work
Module -4 (Grammar)
Part-of-Speech Tagging-The Information Sources in Tagging-Markov Model Taggers-
Hidden Markov Model Taggers-Applying HMMs to POS tagging-The effect of initialization
on HMM training-Transformation Based Learning of Tags
Text Books :
1. C.D. Manning and H. Schutze. Foundations of Statistical Natural Language
Processing. MIT Press.
2. Steven Bird, Ewan Klein, Edward Loper, Natural Language Processing with Python and
NLTK. O’reilly Pub.
References:
1. D. Jurafsky and J.H. Martin: Speech and Language Processing: Introduction to Natural
Language Processing, Computational Linguistics and Speech Recognition, PHI.
2. James Allen: Natural Language Understanding. Pearson Pub.
3. Nitin Hardeniya, Jacob Perkins, Deepti Chopra, Nisheeth Joshi, ItiMathur: Natural
Language Processing: Python and NLTK., 1stEdition. Packt Publishing
QP CODE:
PART A
4. State Bayes’ theorem and explain briefly. Comment on its usefulness in NLP.
6. Consider the sentence: "the children ate the cake with a spoon". Construct the
parse tree for it and explain the attachment ambiguity.
10. Write a Python program to extract different date formats from a text document.
(10x3=30)
COMPUTER SCIENCE AND ENGINEERING
Part B
(Answer any one question from each module. Each question carries 14 Marks)
11. (a) Write a note on the following terms with example: (9)
(i) Collocations (ii) Concordances (iii) Phrase structure grammars
OR
12. (a) Write a note on all parts of speech tags of English language (9)
(b) What are the differences between Rationalist and Empiricist to Language (5)
approaches
(b) Give a formal definition of Hidden Markov Model (HMM) and state the (9)
relevant assumption while using HMM for language modeling
OR
14. (a) Assume that a particular type of syntactic error detected by a system A occurs (5)
once in 1,00,000 sentences on an average. This system detects an error
correctly with a probability 0.05. Suppose the system reports an error in a test
sentence. What is the probability that this is true?
(b) List some of the problems associated with sparse data in SNLP. (9)
Write a note on n-gram Models over Sparse Data
15. (a) What do you understand by Disambiguation based on sense definitions. (9)
Write and explain any one algorithm for this.
(b) With the help of Bayes’ rule, explain the Bayesian disambiguation algorithm. (5)
OR
(b) What is meant by attachment ambiguity? List different attachment issues. (9)
COMPUTER SCIENCE AND ENGINEERING
17. (a) Write a note on Transformation-Based Learning of tags. Give it’s algorithm (9)
(b) How can HMM be used for parts of speech tagging (5)
OR
(b) How do you find the probability of a string using inside and outside (9)
probabilities ?
19. (a) Write a Python program for PoS tagging using the necessary Python (9)
packages.
OR
20. (a) Write a regular expression for removing punctuations, numbers and white (9)
spaces in a piece of text.
(b) Write a Python program to count the number of sentences, words and line (5)
numbers in a given piece of text. Display each sentence along with that.
COMPUTER SCIENCE AND ENGINEERING
TEACHING PLAN
No Contents No of
Lecture Hrs
(36 hrs)
Module - 1 (Preliminaries) (9 hrs)
SEMESTER VIII
MINOR
COMPUTER SCIENCE AND ENGINEERING
YEAR OF
CATEGORY L T P CREDIT
INTRODUCTION
CSD482 MINI PROJECT
PWS 0 0 3 4 2019
Preamble: The objective of this course is to apply the fundamental concepts of different courses
learned in respective Minor Streams: Software Engineering, Machine Learning and Networking.
This course helps the learners to get an exposure to the development of application
software/hardware solutions/ software simulations in the field of Computer Science and
Engineering. It enables the learners to understand the different steps to be followed such as
literature review and problem identification, preparation of requirement specification &design
document, testing, development and deployment. Mini project enables the students to boost their
skills, widen the horizon of thinking and their ability to resolve real life problems.
CO# CO
Identify technically and economically feasible problems (Cognitive
CO1 Knowledge Level: Apply)
Identify and survey the relevant literature for getting exposed to related
CO2 solutions. (Cognitive Knowledge Level: Apply)
CO1
CO2
CO3
CO4
CO5
COMPUTER SCIENCE AND ENGINEERING
Assessment Pattern
Mark Distribution
Total CIE ESE Marks
Marks Marks
150 75 75
Student Groups with 4 or 5 members should identify a topic of interest in consultation with a
Faculty Advisor/Project Coordinator/Guide. Review the literature and gather information
pertaining to the chosen topic. State the objectives and develop a methodology to achieve the
objectives. Carryout the design/fabrication or develop codes/programs to achieve the objectives
by strictly following steps specified in the teaching plan. Innovative design concepts,
performance, scalability, reliability considerations, aesthetics/ergonomic, user experience and
security aspects taken care of in the project shall be given due weight.
COMPUTER SCIENCE AND ENGINEERING
The progress of the mini project is evaluated based on a minimum of two reviews. The review
committee may be constituted by a senior faculty member, Mini Project coordinator and project
guide. The internal evaluation shall be made based on the progress/outcome of the project,
reports and a viva-voce examination, conducted internally by a 3-member committee. A project
report is required at the end of the semester. The project has to be demonstrated for its full design
specifications.
TEACHING PLAN
SEMESTER VIII
HONOURS
COMPUTER SCIENCE AND ENGINEERING
YEAR OF
CATEGORY L T P CREDIT
INTRODUCTION
CSD496 MINI PROJECT
PWS 0 0 3 2 2019
Preamble: The objective of this course is to apply the fundamental concepts of courses
learned in respective Honors Streams: Security in Computing, Machine Learning and Formal
Methods. This course helps the learners to get an exposure to the development of application
software/hardware solutions/ software simulations in the field of Computer Science and
Engineering. It enables the learners to understand the different steps to be followed such as
literature review and problem identification, preparation of requirement specification &design
document, testing, development and deployment. Mini project enables the students to boost
their skills, widen the horizon of thinking and their ability to resolve real life problems.
CO# CO
Identify technically and economically feasible problems (Cognitive
CO1 Knowledge Level: Apply)
Identify and survey the relevant literature for getting exposed to related
CO2 solutions. (Cognitive Knowledge Level: Apply)
Perform requirement analysis, identify design methodologies and develop
CO3 adaptable & reusable solutions of minimal complexity by using modern tools
& advanced programming techniques (Cognitive Knowledge Level: Apply)
Prepare technical report and deliver presentation (Cognitive Knowledge
CO4 Level: Apply)
Apply engineering and management principles to achieve the goal of the
CO5 project (Cognitive Knowledge Level: Apply)
CO1
CO2
CO3
CO4
CO5
COMPUTER SCIENCE AND ENGINEERING
Assessment Pattern
Mark Distribution
Student Groups with 4 or 5 members should identify a topic of interest in consultation with a
Faculty Advisor/Project Coordinator/Guide. Review the literature and gather information
pertaining to the chosen topic. State the objectives and develop a methodology to achieve the
objectives. Carryout the design/fabrication or develop codes/programs to achieve the objectives
by strictly following steps specified in the teaching plan. Innovative design concepts,
COMPUTER SCIENCE AND ENGINEERING
The progress of the mini project is evaluated based on a minimum of two reviews. The review
committee may be constituted by a senior faculty member, Mini Project coordinator and project
guide. The internal evaluation shall be made based on the progress/outcome of the project,
reports and a viva-voce examination, conducted internally by a 3-member committee. A project
report is required at the end of the semester. The project has to be demonstrated for its full design
specifications.
TEACHING PLAN