Syllabus BTECH CSE III Sem Onwards
Syllabus BTECH CSE III Sem Onwards
Syllabus BTECH CSE III Sem Onwards
Page 1 of 398
Institute Vision
To become a Globally Recognised Academic Institution in consonance with the social, economic
and ecological environment, striving continuously for excellence in education, research, and
technological service to the National needs.
Institute Mission
• To educate students at Under Graduate, Post Graduate, Doctoral, and Post-Doctoral levels to
perform challenging engineering and managerial jobs in industry.
• To provide excellent research and development facilities to take up Ph.D. programmes and
research projects.
• To develop effective teaching learning skills and state of art research potential of the faculty.
• To build national capabilities in technology, education, and research in emergingareas.
• To provide excellent technological services to satisfy the requirements of the industry and overall
academic needs of society.
Department Vision:
The department strives to be recognized globally for outstanding education and research,
leading to excellent professionals and innovators in the field of Computer Science and
Engineering, who can positively contribute to the society.
Department Mission
1.To impart quality education and equip the students with strong foundation that could make
them capable of handling challenges of the new century.
2. To maintain state of the art research facilities and facilitate interaction with world’s leading
universities, industries and research organization for constant improvement in the quality of
education and research.
Page 2 of 398
Graduate Attributes
5. Modern Tool Usage: Create, select and apply appropriate techniques, resources and
modern engineering and IT tools including prediction and modelling to complex
engineering activities with an understanding of the limitations.
6. The Engineer and Society: Apply reasoning informed by contextual knowledge to assess
societal, health, safety, legal and cultural issues and the consequent responsibilities relevant
to professional engineering practice.
8. Ethics: Apply ethical principles and commit to professional ethics and responsibilities and
norms ofengineering practice.
12. Life-long Learning: Recognize the need for and have the preparation and ability to engage
in independent and life- long learning in the broadest context of technological change.
Page 3 of 398
Programme Educational Objectives (PEOs)
2. Problem analysis: Identify, formulate, review research literature, and analyze complex
engineering problems reaching substantiated conclusions using first principles of
mathematics, natural sciences, and engineering sciences.
5. Modern tool usage: Create, select, and apply appropriate techniques, resources, and
modern engineering and IT tools including prediction and modeling to complex
engineering activities with an understanding of the limitations.
6. The engineer and society: Apply reasoning informed by the contextual knowledge to
assess societal, health, safety, legal and cultural issues and the consequent responsibilities
relevant to the professional engineering practice.
8. Ethics: Apply ethical principles and commit to professional ethics and responsibilities and
norms of the engineering practice.
Page 4 of 398
10. Communication: Communicate effectively on complex engineering activities with the
engineering community and with society at large, such as, being able to comprehend and
write effective reports and design documentation, make effective presentations, and give
and receive clear instructions.
11. Project management and finance: Demonstrate knowledge and understanding of the
engineering and management principles and apply these to one’s own work, as a member
and leader in a team, to manage projects and in multidisciplinary environments.
12. Life-long learning: Recognize the need for, and have the preparation and ability to engage
in independent and life-long learning in the broadest context of technological change.
13. PSO 1: Ability to identify, analyse and provide efficient solutions that cater to problems of
varying complexity in the field of computer science.
14. PSO 2: Ability to justify / evaluate solutions with help of sound mathematical foundations,
algorithmic principles, theoretical computer science knowhow and research-based
knowledge in view of perpetual advancements in computer science.
15. PSO 3: Inculcate best software practices and principles in consideration with existent
societal, cultural, environmental and financial aspects.
Page 5 of 398
(Semester III)
Course Objectives
1. Recognize and understand the basic cell biology, biomolecules, related metabolic
pathways and applicable bioenergetics.
2. Relate common biological phenomenon at molecular level.
3. Describe the chemical nature of enzymes and mechanism of action for their function in
biochemical reactions.
4. Correlate the molecular methods of biological signal generation and propagation in living
system.
5. Comprehend the steps involved in common application of biotechnology such as
applicable for creation of transgenics, stem cells, plant metabolites production, PCR,
ELISA.
Course Outcomes
CO4 Apply and effectively communicate scientific reasoning and data involved in common
biotechnological applications.
Module-2:
Bioenergetics and Metabolism: Gibbs free energy and thermodynamics, aerobic and anaerobic
respiration, Glycolysis, Krebs cycle and electron transport chain, Beta oxidation, Photosynthesis.
[6L]
Module-3:
Enzymes and its Application: Classification of enzymes, Structure and mechanism of enzyme
action and uses of enzymes, factors affecting enzyme activity, Immobilization of enzymes and
their application. [5L]
Module-4:
Biological Signal Generation and Propagation: Nerve cell structure and signal propagation.
Mechanism of vision and hearing, cell signaling, Circadian rhythm. [6L]
Module-5:
Engineering Biological Systems and its Applications:
Central dogma of molecular biology, Methods in genetic engineering and application, PCR,
ELISA and its application, stem cell and tissue engineering. Artificial Intelligence in Biology,
Plant factory. [6L]
Books Recommended
Recommended Text Book
1. Purves et al, (1998) Life: The Science of Biology, 4th Ed.
2. R. Dulbecco, The Design of Life.
3. Lehninger A, Principals of Biochemistry , 5th Ed
Reference Book
Indirect Assessment –
1. Student Feedback on Faculty
2. Student Feedback on Course Outcome
Program
Specific
Course Program Outcomes (POs)
Outcomes
Outcome
(PSOs)
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15
CO1 3 2 2 1 1 1 1 2 1 2 1 1 2 2 1
CO2 3 2 2 1 1 2 2 2 1 1 1 2 3 2 2
CO3 3 3 3 2 2 1 3 2 1 2 1 2 2 3 2
CO4 2 2 2 2 3 2 3 2 2 1 1 1 1 2 2
Page 8 of 398
CD
3 Seminars
CD
4 Mini projects/Projects
CD
5 Laboratory experiments/teaching aids
CD
6 Industrial/guest lectures
CD
7 Industrial visits/in-plant training
CD Self- learning such as use of NPTEL materials and
8 internets
CD
9 Simulation
Course Objectives
This course enables the students:
A. To know the basic functions of different AI branches.
B. To understand the functionalities of IoT .
C. To know the application of fuzzy logic.
D. To understand the basic functionalities of a cloud based system.
E. To find the basic functions of soft computing.
Page 9 of 398
Course Outcomes:
After the completion of this course, students will be able to:
1. Identify the difference between different branches of AI.
2. Analyze a fuzzy based system.
3. Design Neural Networks to solve problems.
4. Analyze a problem in terms of ANN point of view.
5. Identify the components of a cloud-based system.
SYLLABUS
Module I
Introduction
Definition of Computing, Conventional Computing vs. Intelligent Computing, Necessity of
Intelligent Computing, Current trends in Intelligent Computing
AI Concepts
Introduction to AI, AI problems and Solution approaches, Fundamentals of problem solving using
Search and Heuristics, Overview of Knowledge-base creation, and Intelligent Agents,
Classification of AI.
(8 L)
Module II
Introduction to Soft Computing
Hard Computing vs. Soft Computing, Paradigms of Soft Computing, Real Life applications of
Soft Computing
Fuzzy Logic
Classical Sets Vs Fuzzy Sets, Membership Functions, Fuzzy operations, Fuzzy Relations, Fuzzy
Composition (Max-Min, Max-Product), Defuzzification, Fuzzy Inference System
Genetic Algorithm
Principle of Optimization, Traditional vs Evolutionary optimization, Genetic Algorithm: Working
Cycle of GA, Encoding, Crossover, Mutation.(8 L)
Module III
Introduction to Artificial Neural Networks:
Biological Neuron to Artificial Neuron, Mc-Culloh Pitts Perceptron Model, Layer of Neurons,
Activation Function, Artificial Learning, Types of Learning, Introduction to Back Propagation
Networks, Applications of Neural Network. (8L)
Module IV
Introduction to Cloud computing
Conventional Computing, Historical developments, Defining a Cloud, Cloud Computing reference
model, Overview of Virtualization: Introduction, Types of cloud, Cloud Platforms: Amazon Web
Services, Microsoft Azure, Cloud Applications (8L)
ModuleV
Introduction to IOT
Page 10 of 398
The IoT Paradigm, Concept of Things, IoT Hardware, IoT Protocols, IoT Architecture, enabling
technologies of IoT, IoT Designing and its levels. (8L)
Text books:
1. Rich Elaine, Knight Kevin, Nair S. B. Artificial Intelligence, 3rd Edition, Tata Mc. Graw
Hill.
2. Padhy N. P., Simon S. P. Soft Computing: With MATLAB Programming, Oxford University
Press, 2015.
3. Buyya Raj Kumar, Vecchiola Christian &Selvi S.Thamarai , Mastering Cloud
Computing, McGraw Hill Publication, New Delhi, 2013.
4. Madisetti Vijay and BahgaArshdeep, Internet of Things (A Hands-on-Approach), 1st
Edition, VPT, 2014.
Reference Books:
Raj Pethuru and Raman AnupamaC.,The Internet of Things: Enabling Technologies, Platforms,
and Use Cases, CRC Press.
Konar Amit, Computational Intelligence: Principles, Techniques and Applications, Springer.
Shivanandam and Deepa, Principles of Soft Computing, 2nd Edition, John Wiley and Sons, 2011.
Page 11 of 398
Continuous Internal Assessment % Distribution
Teacher’s Assessment 5
Indirect Assessment
1. Student Feedback on Faculty
2. Student Feedback on Course
CD2 Assignments
CD7 Simulation
Program
Specific
Course Program Outcomes (POs)
Outcomes
Outcome
(PSOs)
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15
CO1 3 2 2 1 1 1 2 2 1 1 1 2 3 1 1
CO2 3 3 3 2 1 2 2 2 2 1 1 2 2 3 2
CO3 3 3 3 2 2 1 2 2 2 2 1 3 2 3 2
CO4 3 3 3 3 2 2 2 3 2 2 1 3 3 2 3
CO5 2 2 1 1 2 1 2 3 1 1 1 2 2 2 1
Page 12 of 398
MAPPING BETWEEN COURSE OUTCOMES AND COURSE DELIVERY METHOD
1. exposed to a wide variety of mathematical concepts that are used in the Computer
Science discipline, which may include concepts drawn from the areas of Number
Theory, Graph Theory and Combinatorics.
2. come across a number of theorems and proofs. Theorems will be stated and proved
formally using various techniques.
Course Outcomes: After the completion of this course, students will be able to
CO1. to model and analyze computational processes using analytic and combinatorial methods
Page 13 of 398
CO4. apply counting techniques to solve combinatorial problems and identify, formulate, and
solve computational problems in various fields.
CO5. apply graph theory in the areas of computer science, operation research, biology, chemistry,
physics, sociology, and engineering
SYLLABUS
Module II
Recurrence Relations, Classification of Recurrence Relations and their solutions by
Characteristic Root method, Generating function and their various aspects, Utility of Generating
function in solving Recurrence Relations.
[9L]
Module III
Set, Operations on Set, Computer representation of Set, Relations, Properties/Classification of
Relations, Closure operations on Relations, Matrix representation of Relations, Digraphs.
Functions and their Representation, Classification of Functions, Warshall's algorithm, Discrete
Numeric Functions, Growth of Functions, Big O, Big Q, Hash Function, Growth Functions.
[9L]
Module IV
Binary Operations, Groups, Product and Quotients of Groups, Semi group, Products and
Quotients of Semi groups, Permutation Group, Composition of Permutation, Inverse
Permutation, Cyclic Permutation, Transposition, Even and Odd Permutation, Coding of Binary
Information and Error Correction, Decoding and Error Correction.
[9L]
Module V
Introduction to Graph, Graph Terminologies and their Representation, Connected & Disconnected
graphs, Isomorphic Graph, Euler & Hamilton graphs. Introduction to Trees, Versatility of Trees,
Tree traversal. Spanning Trees, Minimum Spanning Tree. [9L]
Text Books:
1. Mott, Joe L., Abraham Kandel, and Theodore P. Baker Discrete Mathematics for
ComputerScientists& Mathematicians, PHI, 2nd edition 2002.
2. Swapan Kumar Chakraborty and BikashKanti Sarkar: Discrete Mathematics,
Oxford Univ.Publication, 2010.
Page 14 of 398
3. Kolman, Bernard, Robert C. Busby, and Sharon Ross. Discrete mathematical
structures,Prentice-Hall, Inc., 2003.
Reference Books:
1. BikashKanti Sarkar and Swapan Kumar Chakraborty, Combinatorics and Graph
Theory, PHI,2016.
2. Seymour Lipschuz and Mark Lipson,Discrete Mathematics, Shaum’s outlines, 2003.
3. Liu, Chung Laung, Elements of Discretemathematis, Mcgraw Hill, 2ndedition, 2001.
4. Bondy and Murty, Grapg Theory with Applications, American Elsevier,1979.
5. Robin J. Wilson, Introduction to Graph Theory, Pearson, 2010.
6. Course delivery methods
Lecture by use of boards/lcd projectors/ohp projectors √
Tutorials/assignments √
Seminars
Mini projects/projects √
Laboratory experiments/teaching aids
Industrial/guest lectures
Industrial visits/in-plant training
Self- learning such as use of nptel materials and √
internets
Simulation
Direct assessment
Assignment 5
Quiz (s) √ √ √
Assignment √ √ √ √
Page 15 of 398
Indirect assessment –
1. Student feedback on course outcome
Course Delivery Methods
CD1 Lecture by use of boards/LCD projectors/OHP projectors
CD2 Assignments
CD7 Simulation
Program
Specific
Course Program Outcomes (POs)
Outcomes
Outcome
(PSOs)
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15
CO1 3 2 2 1 2 1 1 1 1 1 1 2 3 3 1
CO2 2 3 3 1 1 2 1 1 1 1 1 2 2 2 2
CO3 2 3 3 3 2 1 1 2 1 2 1 1 2 2 1
CO4 3 3 2 1 1 1 1 1 2 2 1 2 3 2 1
CO5 3 2 2 1 3 1 2 2 1 2 2 2 3 3 2
Page 16 of 398
COURSE INFORMATION SHEET
Course code: EC203
Course title: Digital System Design
Pre-requisite(s): EC101 Basics of Electronics & Communication Engineering
Co- requisite(s):
Credits: L: 3 T:0 P:0 C:3
Class schedule per week: 3x1
Class: B. Tech
Semester / Level: III/02
Branch: ECE
Name of Teacher:
Course Objectives
This course enables the students to:
Course Outcomes
After the completion of this course, students will be able to:
CO5
Schematize and demonstrate simple computing machines.
SYLLABUS
Page 17 of 398
Module – 1:
Basics of Digital Electronics: Number representation, Binary number system, Number base
conversion, Octal, Hexadecimal and BCD codes, binary Arithmetic, Logic gates, Introduction
to VHDL and Verilog, VHDL Models, Logic Families: TTL, ECL, and CMOS Logic Circuits, Logic
levels, voltages and currents, fan-in, fan-out, speed, power dissipation. Comparison of logic
families.
Module – 2:
Simplification of Boolean functions: Boolean Algebra, Basic theorems and Properties, De
Morgan’s theorem, Canonical & Standard forms, Simplification of Boolean function using
Karnaugh map, POS& SOP simplification, Prime implicant, NAND and NOR implementation,.
Module – 3:
Design of Combinational Circuits: Analysis and design procedure, Parity Generators and
Checkers, Adders, Subtractors, Look ahead carry, Adder, 4-bit BCD adder/subtractor, Magnitude
comparator, Decoders, Encoders, Multiplexers, De-multiplexers, , Design of 1 bit ALU for basic
logic and arithmetic operations.
Module – 4:
Design of Sequential Circuits and Memories: Basic Latch, Flip-Flops (SR, D, JK, T and
Master-Slave), Triggering of Flip Flops, Synchronous and asynchronous counters, Registers,
Shift Registers, Memories and Programmable Logic design, Types of memories, Memory
Expansion and its decoding, Programmable Logic Arrays (PLA), Programmable Array Logic
(PAL)
Module – 5:
Design of simple computing machines: SAP-I concepts with stress on timing diagrams,
Microinstructions, Fetch and Execution cycle variable machine cycle, Hardware control
Matrix, Macroinstructions, Microprogramming , Bus concepts, Multiplexed Minimum
system. Pipelining concepts.
Books recommended:
Textbooks:
1. “Digital Design”, Morris Mano and Michael D. Ciletti ,5th edition PHI
2. “Digital System Design using VHDL”, Charles H Roth, Thomson Learning
Reference books:
1. Digital computer Electronics AP Malvino, 3rd Edition Mc Graw Hill
Page 18 of 398
Topics beyond syllabus/Advanced topics/Design:N/A
Teacher’s Assessment 5
Indirect Assessment
1. Student Feedback on Faculty
2. Student Feedback on CoursCourse Delivery Methods
CD2 Assignments
CD7 Simulation
Page 19 of 398
Mapping between Course Outcomes and Program Outcomes
Program
Specific
Course Program Outcomes (POs)
Outcomes
Outcome
(PSOs)
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15
CO1 3 3 2 3 3 1 2 1 1 2 1 2 2 2 1
CO2 3 3 3 2 3 2 3 2 2 2 1 2 3 2 1
CO3 2 2 3 2 2 2 2 2 2 2 1 2 2 2 1
CO4 2 3 3 3 3 3 3 3 2 2 1 3 3 2 2
CO5 2 2 2 3 3 2 3 3 2 2 2 2 1 1 3
Course Objectives
This course enables the students:
Page 20 of 398
A. To be familiar with basic techniques of algorithm analysis.
B. To understand basic concepts about arrays, stacks, queues, linked lists, trees and
graphs.
C. To understand concepts of searching and sorting techniques.
D. To implement various linear & non-linear data structures; and searching &
sorting algorithms.
E. To assess how the choice of data structures impacts the performance of a program.
Course Outcomes
After the completion of this course, students will be able to:
1. Define various linear and non-linear data structures like stack, queue, linked list, tree
and graph.
2. Explain operations like insertion, deletion, traversal, searching, sorting etc. on various
data structures.
3. Design various data structures and their operations.
4. Analyze the performance of data structure based operations including searching and
sorting.
5. Justify the choice of appropriate data structure as applied to specified problem
definition.
SYLLABUS
Module I
Basic Concepts
Definition and basics of: Data Structure, ADT, Algorithms, Time and Space Complexity,
Asymptotic Notations (O, θ, Ω), Time complexity computation of non-recursive algorithms (like
Matrix addition, Selection sort – using step count), Array – basic operations, concept of multi-
dimensional array, Polynomial operations using Array, Sparse Matrix.
(8L)
Module II
Stack and Queue
Stack ADT: basic operations, Queue ADT: basic operations, Circular Queue, Evaluation of
Expressions, Another application or Mazing Problem.
(8L)
Module III
Linked List
Singly Linked List: concept, representation and operations, Circular Linked List, Polynomial
and Sparse Matrix operations using LL, Doubly Linked List: basic concept.
(8L)
Module IV
Tree and Graph
Basic concepts and terminologies, Binary Search Tree and Heap, Disjoint Set, Graph: concept
and terminologies, Concept of BFS, DFS, Spanning Tree, Connected Components.
(8L)
Module V
Searching and Sorting
Sequential Search and Binary Search, Insertion Sort, Heap Sort, Radix Sort,External Sorting: k-
way merging approach.
(8L)
Page 21 of 398
Text book:
1. SahniHorwitz,, Freed Anderson, Fundamentals of Data Structures in C, 2nd Edition (or
latest) , University Press.(T1)
Reference books:
1. TharejaReema, Data Structures Using C, 2nd Edition, Oxford University Press.(R1)
2. Tanenbaum, Langsam, Augenstein, Data Structures using C, Pearson. (R2)
POs met through Gaps in the Syllabus: P10 will be met though report-writing/presentation-based
assignment
POs met through Topics beyond syllabus/Advanced topics/Design: Teaching through paper
Direct Assessment
Assessment tool % contribution during co assessment
Assignment 5
Page 22 of 398
Indirect Assessment
1. Student Feedback on Faculty
2. Student Feedback on Course
Course Delivery Methods
CD1 Lecture by use of boards/LCD projectors/OHP projectors
CD2 Assignments
CD7 Simulation
Program
Specific
Course Program Outcomes (POs)
Outcomes
Outcome
(PSOs)
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15
CO1 2 1 1 1 1 1 1 1 1 1 1 1 2 1 1
CO2 2 2 1 1 1 1 1 1 1 1 1 1 1 1 1
CO3 3 3 3 1 2 1 1 1 1 1 1 2 2 2 1
CO4 3 3 2 1 2 1 1 1 1 1 1 2 2 3 1
CO5 2 2 3 2 2 1 1 2 1 1 1 2 3 2 1
Course Overview: Concepts of measuring instruments, AC RLC series parallel circuit operation,
resonance, KVL and KCL, circuit theorems, 3-phase star and delta connections, measurement of
low and high resistance of D.C. machine, measurement of power by three voltmeter, three-
ammeter methods, measurement of power of 3-phase induction motor by two-wattmeter method.
Course Objectives
This course enables the students :
A. To describe students practical knowledge of active and passive elements and
operation of measuring instruments
C. To establish voltage & current relationships with the help of phasors and correlate
them to experimental results
Course Outcomes
After the completion of this course, students will be able to:
1. classify active and passive elements, explain working and use of electrical
components, different types of measuring instruments;
3. measure voltage, current, power, for DC and AC circuits and also represent them in
phasor notations;
Page 24 of 398
SYLLABUS
LIST OF EXPERIMENTS :
10. Name: Verification of Norton’s, Tellegen’s and Maximum Power transfer theorem
Aim : (i) To verify Norton’s theorem for a given circuit
(ii) To verify Maximum Power transfer theorem for a given circuit
Page 25 of 398
1. Application of principles of magnetic circuits to electrical machines like transformers,
generators and motors
2. Visualize Phase sequence
POs met through Gaps in the Syllabus :a, b, c, g
Topics beyond syllabus/Advanced topics/Design
1. Assignment : Simulation of electrical circuits with dependent/independent sources by
various techniques (Mesh current/Node Voltage/Thevenin’s theorem/Norton’s
theorem/Maximum power transfer theorem etc.) using MATLAB/PSIM/C++
softwares
2. Active/reactive power calculation for 3 – Ф circuits
1 2 3 4 5
1 3 3 3 2
2 3 3 3 3 2
3 3 3 3 3 2
4 3 3 3 3 2
5 3 3 3 1
6 3 3 3 1
7 3 3 3 2 2
8 3 3 3 3
9 3 3 3 2
10 3 3 3 2
3=High, 2=Medium, 1=Low
Direct Assessment
Quiz (s) 10
Page 26 of 398
Viva 20
Quiz 10
Indirect Assessment –
1. Student Feedback on Faculty
2. Student Feedback on Course Outcome
A B C D
1 3 3 3 3
2 3 3 3 3
3 3 3 3 3
4 3 3 3 3
5 2 3 3 3
Program
Specific
Course Program Outcomes (POs)
Outcomes
Outcome
(PSOs)
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15
CO1 2 2 2 1 1 1 2 2 1 2 1 1 1 1 1
CO2 3 3 3 1 2 2 2 2 1 2 1 1 2 1 1
CO3 3 3 3 2 2 2 2 2 1 2 1 1 3 2 1
CO4 3 3 3 2 2 2 2 2 2 2 1 1 3 2 1
Page 27 of 398
CO5 3 3 3 3 3 2 3 3 3 3 2 2 3 3 2
1 3 3 2 2
2 3 3 3
3 3 3 3 2
4 3 3 3
5 3 3 2 2
CO2 CD1,CD4,CD5
CO3 CD1,CD3,CD4,CD5,CD6
Course Objectives
This course enables the students to:
1. Understand the basics of logic gates, input, output, power supply and gates IC’s.
Course Outcomes
CO1 Describe the knowledge of basic logic gates and their design using universal
gates.
CO2 Demonstrate the working of combinational and sequential circuits.
CO3 Integrate and experiment with controlled digital circuits.
CO4 Appraise combinational/sequential circuits and memories.
CO5 Schematize, simulate and implement combinational and sequential circuits to
solve real world problems using VHDL systems.
SYLLABUS
List of experiments:
1. Design and implement a controlled CMOS Inverter.
2. To study and verify the truth table of NAND and EX-OR gate using IC 7400.
Page 29 of 398
3. Design and implement SEVEN segment display unit.
4. Design and verify half adder and full Adder circuits using gates and IC 7483.
5. Design and implement a 3:8 Decoder.
6. Design and implement 8:3 priority encoder.
7. Design a 4 bit magnitude comparator using combinational circuits.
8. Design and implement 8:1 multiplexer and 1:4 demultiplexer.
9. Design ALU with functions of ADD, SUB, INVERT, OR, AND. XOR, INC, DEC and
CMP.
10. Design and verify decade Counter.
11. Design a ROM (8X4) using decoder, gates and diodes.
12. Design of pre settable up/down counter.
## Implement all the above experiments using VHDL platform and verify.
Books recommended:
Textbooks:
1. “Digital Design”, Morris Mano and Michael D. Ciletti ,5th edition PHI
2. “Digital System Design using VHDL”, Charles H Roth, Thomson Learning
Reference books:
2. Digital computer Electronics AP Malvino, 3rd Edition Mc Graw Hill
Page 30 of 398
Semester End Examination √ √ √ √ √
Indirect Assessment
1. Student Feedback on Faculty
2. Student Feedback on Course
Program
Specific
Course Program Outcomes (POs)
Outcomes
Outcome
(PSOs)
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15
CO1 2 2 2 1 1 1 2 2 1 2 1 1 1 1 1
CO2 3 3 3 1 2 2 2 2 1 2 1 1 2 1 1
CO3 3 3 3 2 2 2 2 2 1 2 1 1 3 2 1
CO4 3 3 3 2 2 2 2 2 2 2 1 1 3 2 1
CO5 3 3 3 3 3 2 3 3 3 3 2 2 3 3 2
< 34% = 1, 34-66% = 2, > 66% = 3
Page 31 of 398
Course code: CS202
Course title: Data Structures Lab
Pre-requisite(s):
Co- requisite(s):
Credits: L: 0 T: 0 P: 3
Class schedule per week: 3
Class: B. Tech
Semester / Level: II
Branch: All
Course Objectives
This course enables the students:
A. To assess how the choice of data structures and algorithm design methods
impact the performance of programs.
B. To choose the appropriate data structure and algorithm design method for a
specified application.
C. To solve problems using data structures such as linear lists, stacks, queues,
hash tables, binary trees, heaps, binary search trees, and graphs and writing
programs for these solutions.
D. Analyse and compare the different algorithms
Course Outcomes
After the completion of this course, students will be able to:
1. Be able to design and analyze the time and space efficiency of the data
structure
2. Analyze run-time execution of previous learned sorting methods, including
selection, merge sort, heap sort and Quick sort
3. Have practical knowledge on the applications of data structures
4. Be capable to identity the appropriate data structure for given problem
SYLLABUS
Text books:
1. Baluja G S, “Data Structure through C”, Ganpat Rai Publication, New Delhi, 2015.
2. Pai G A V, “Data Structures and Algorithms: Concepts, Techniques and Applications”,
2ndEdn, Tata McGraw-Hill, 2008.
3. Horowitz E., Sahni S., Susan A., “Fundamentals of Data Structures in C”, 2nd Edition,
University Press, 2010.
Reference books:
Page 33 of 398
POs met through Gaps in the Syllabus: N/A
POs met through Topics beyond syllabus/Advanced topics/Design: through experiments involving
design/modelling of device/circuits on advanced topics
Direct Assessment
Assessment Tools % Contribution during CO Assessment
Continuous Internal Assessment 60
Semester End Examination 40
Indirect Assessment
1. Student Feedback on Faculty
2. Student Feedback on Course
Page 34 of 398
Course Delivery Methods
CD1 Lecture by use of boards/LCD projectors/OHP projectors
CD2 Assignments
CD3 Laboratory experiments/Teaching aids/Seminars
CD4 Mini Projects
CD5 Seminars
CD6 Self- learning such as use of NPTEL materials and internets
CD7 Simulation
Program
Specific
Course Program Outcomes (POs)
Outcomes
Outcome
(PSOs)
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15
CO1 3 3 3 3 2 1 2 2 1 2 1 1 2 3 2
CO2 3 3 3 3 2 1 2 2 2 1 1 2 2 3 2
CO3 3 3 3 3 2 1 2 2 1 2 1 2 3 3 2
CO4 3 3 3 3 2 2 2 2 2 2 2 2 3 2 2
CO5 3 2 2 1 2 3 1 1 1 2 2 2 3 3 3
(Semester IV)
COURSE INFORMATION SHEET
Page 35 of 398
Course code: MA 203
Course title: Numerical Methods
Pre-requisite(s): NIL
Co- requisite(s): ---NIL
Credits: L: 2 T: 0 P: 0 C: 2
Class schedule per week: 2 Lectures
Class: B Tech
Semester / Level: 2
Branch: ALL
Name of Teacher:
Course Objectives: This course enables the students to
4. to find the numerical solution of initial value problems and boundary value problems
Course Outcomes: After the completion of this course, students will be able to
Syllabus
Text Books:
1. Jain M.K, S.R.K. Iyengar and R.K. Jain, Numerical Methods for Scientific and Engineering
Computation, New Age Publications, 2004.
2. S.S. Sastry, Introductory Methods of Numerical Analysis, PHI.
3. E. Kreyszig, Advanced Engineering Mathematics, 9th Edition, John Wiley & Sons, 2006.
Reference Books:
1. S.C. Chapra and R. P. Canale, Numerical Methods for Engineers, McGraw Hill, 1985.
2. C.F. Gerald and P.O. Wheatley, Applied Numerical Analysis, Pearson Education, Seventh
Edition, 2003.
3. R. W. Hamming: Numerical Methods for Scientists and Engineers, Second Edition, Dover
Page 37 of 398
Course outcome (co) attainment assessment tools & evaluation procedure
Direct assessment
Assignment 5
Quiz (s) √ √ √
Assignment √ √ √ √
Indirect assessment –
1. Student feedback on course outcome
Mapping of course outcomes onto program outcomes
Program
Specific
Course Program Outcomes (POs)
Outcomes
Outcome
(PSOs)
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15
CO1 3 3 3 2 1 1 1 2 1 2 1 1 3 2 1
CO2 3 3 3 2 2 1 1 2 1 2 1 2 3 3 1
CO3 3 3 2 3 2 2 2 2 2 2 1 1 2 2 1
CO4 2 2 3 3 2 2 2 2 3 3 2 2 2 2 1
CO5 2 3 3 3 3 2 2 2 2 2 2 2 3 3 1
Course Objectives
This course enables the students:
2 To identify the structure and composition of the spheres of the earth, the only planet
sustaining life.
4 To generate awareness and become a sensitive citizen towards the changing environment.
Course Outcomes
After the completion of this course, students will be:
1 Able to explain the structure and function of ecosystems and their importance in the
holistic environment.
2 Able to identify the sources, causes, impacts and control of air pollution.
3 Able to distinguish the various types of water pollution happening in the environment and
understand about their effects and potential control mechanisms.
4 Able to judge the importance of soil, causes of contamination and need of solid waste
management.
5 Able to predict the sources of radiation hazards and pros and cons of noise pollution.
Page 39 of 398
Syllabus
Text books:
1. A, K. De. (3rd Ed). 2008. Environmental Chemistry. New Age Publications India Ltd.
2. R. Rajagopalan.2016.Environmental Studies: From Crisis to Future by, 3rd edition, Oxford
University Press.
3. Eugene P. Odum. 1971. Fundamentals of Ecology (3rd ed.) -. WB Sunders Company,
Philadelphia.
4. C. N. Sawyer, P. L. McCarty and G. F. Parkin. 2002. Chemistry for Environmental
Engineering and Science. John Henry Press.
5. S.C. Santra. 2011. Environmental Science. New Central Book Agency.
Reference books:
1. D.W.Conell. Basic Concepts of Environmental Chemistry, CRC Press.
Page 40 of 398
2. Peavy, H.S, Rowe, D.R, Tchobanoglous, G. Environmental Engineering, Mc-Graw - Hill
International
3. G.M. Masters& Wendell Ela. 1991. Introduction to Environmental Engineering and
Science, PHI Publishers.
Teacher’s assessment 5
Page 41 of 398
Assignment √ √ √ √ √
Indirect Assessment –
1.Student Feedback on Faculty
2. Student Feedback on Course Outcome
Program
Specific
Course Program Outcomes (POs)
Outcomes
Outcome
(PSOs)
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15
CO1 2 2 2 2 1 3 3 2 2 2 1 1 2 1 1
CO2 2 3 2 3 2 3 3 2 2 2 1 1 2 2 1
CO3 2 3 2 3 2 3 3 2 2 2 1 1 2 2 1
CO4 2 3 2 3 2 3 3 2 2 2 1 2 2 2 1
CO5 2 3 3 3 2 3 3 2 2 2 1 2 2 2 1
If satisfying < 34% = 1, 34-66% = 2, > 66% = 3
Course
Course Delivery
CD Course Delivery methods Outcome Method
CD1 Lecture by use of boards/LCD projectors/OHP projectors CO1 CD1, CD2
CD2 Tutorials/Assignments CO2 CD1, CD2
CD3 Seminars CO3 CD1, CD2
CD4 Mini projects/Projects CO4 CD1, CD2
CD5 Laboratory experiments/teaching aids CO5 CD1, CD2
CD6 Industrial/guest lectures
CD7 Industrial visits/in-plant training
Self- learning such as use of NPTEL materials and
CD8 internets
CD9 Simulation
Page 42 of 398
Course code: CS203
Course title: Computer Organization Architecture
Pre-requisite(s): Digital Logic
Co- requisite(s):
Credits: L: 3 T: 1 P: 0
Class schedule per week: 4
Class: B. Tech
Semester / Level: II
Branch: CSE/IT
Course Objectives
This course enables the students:
1. To understand the basic architecture and organization of systems along with their
performances.
2. To Familiar with Digital Logic circuits, Data representation and Instruction Set
Architecture.
3. To build a complete data path for various instructions.
4. To understand the pipeline concepts and Hazards.
5. To familiar with Memory and I/O Organization.
Course Outcomes
After the completion of this course, students will be to:
1. Explain the merits and pitfalls in computer performance measurements and analyze the
impact of instruction set architecture on cost-performance of computer design
2. Explain Digital Logic Circuits ,Data Representation, Register and Processor level
Design and Instruction Set architecture
3. Solve problems related to computer arithmetic and Determine which hardware blocks
and control lines are used for specific instructions
4. Design a pipeline for consistent execution of instructions with minimum hazards
5. Explain memory organization, I/O organization and its impact on computer cost
/performance.
Syllabus
Module I
Basic Structures of Computers
Introduction to Digital Logic, Basic Structure of Computers: Computer Types, Functional Units,
Input Unit, Memory Unit, Arithmetic and Logic Unit, Output Unit, Control Unit, Basic
Operational Concepts: Fixed and floating point Representation and Arithmetic Operations,
Performance, Historical Perspective. (5L)
Module II
Instruction Set Architecture
Memory Locations and Addresses: Byte Addressability, Big-Endian and Little-Endian
Assignments, Word Alignment, Instructions and Instruction Sequencing, Addressing Modes,
Assembly Language, Subroutines, Additional Instructions, Dealing with 32-Bit Immediate Values.
(5L)
Module III
Basic Processing Unit & Pipelining
Page 43 of 398
Basic Processing Unit: Some Fundamental Concepts, Instruction Execution, Hardware
Components, Instruction Fetch and Execution Steps, Control Signals, Hardwired Control, CISC-
Style Processors.
Pipelining: Basic Concept, Pipeline Organization, Pipelining Issues, Data Dependencies, Memory
Delays, Branch Delays, Pipeline Performance Evaluation. (10L)
Module IV
Memory Organization
Basic Concepts, Semiconductor RAM Memories, Read-only Memories, Direct Memory Access,
Memory Hierarchy, Cache Memories, Performance Considerations, Virtual Memory, Memory
Management Requirements, Secondary Storage. (10L)
Module V
Input Output & Parallel Processing
Basic Input Output
Accessing I/O Devices, Interrupts
Input Output Organization
Bus Structure, Bus Operation, Arbitration, Interface, Interconnection Standards.
Parallel Processing
Hardware Multithreading, Vector (SIMD) Processing, Shared-Memory Multiprocessors, Cache
Coherence, Message-Passing Multicomputers, Parallel Programming for Multiprocessors,
Performance Modeling. (10L)
Text Book:
Patterson David A., Hennessy John L., Computer Organization and Design: The Hardware
/ Software Interface, 5th Edition, Elsevier.(T1)
Reference Books:
Hamachar Carl et. al , Computer Organization and Embedded Systems, 6th Edition,
McGraw Hill. (R1)
Mano M. Morris, Computer System Architecture, Revised 3rd Edition, Pearson.(R2)
Page 44 of 398
Mid semester examination 25
Teacher’s Assessment 5
Indirect Assessment
1. Student Feedback on Faculty
2. Student Feedback on Course
Program
Specific
Course Program Outcomes (POs)
Outcomes
Outcome
(PSOs)
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15
CO1 3 1 1 1 2 1 2 1 2 1 2 2 3 3 3
CO2 3 1 1 1 2 1 2 1 2 1 2 2 3 3 3
CO3 3 2 2 2 3 1 2 1 2 1 2 2 3 3 3
CO4 3 2 2 2 3 1 2 1 2 2 3 3 3 3 3
CO5 3 2 3 3 3 1 2 1 3 1 3 3 3 3 3
Page 45 of 398
CO5 CD1,CD2,CD3,CD4,CD5,CD7
Course Objectives
This course enables the students:
1. The course shall allow students to understand the basic tenets of OOP.
2. The course will exemplify the basic syntax and constructs of JAVA.
3. The course will help students understand the application OOP principles in various use
cases.
4. The course will explain basic JAVA GUI components and their working.
5. The course aims to expose students to newer JAVA constructs like NIO, Lambdas etc.
Course Outcomes
After the completion of this course, students will be:
1. Identify the difference between procedural and OO programming.
2. Construct programs using various OOP principles.
3. Design UI using JAVA GUI components.
4. Operate on files and strings in real life scenarios.
5. Analyze thread performance and inter thread communication issues
SYLLABUS
Module I
Introduction to Classes, Objects and Java
Introduction to Object Technology, Java, Understanding the Java development environment,
Programming in Java, Memory concepts, Doing basic Arithmetic, Comparing entities, Classes,
Objects, Methods, Strings, Primitive vs reference types.
(8L)
Module II
Control Statements, Methods and Arrays
Page 46 of 398
Basic selection statements, Iterative constructs, Relative and Logical operators, break, continue,
Methods, static methods, parameter passing, argument promotion and casting, scopes, method
overloading. Arrays and ArrayList in Java, Enhanced for statement, Passing arrays to methods,
Multidimensional arrays, Using command line arguments.
(8L)
Module III
Object Oriented Concepts: Polymorphism & Inheritance
Controlling access to class members, the use of this keyword, getters and setters, Composition,
enum, the use of static and final, Garbage collection. Superclass and subclass, protected members,
constructors in subclass, the Object class, Introduction to polymorphism, Abstract classes and
methods, Assignment between subclass and superclass variables, Creating and using interfaces.
(8L)
Module IV
Exception Handling & GUI Design
When to use exception handling, Java exception hierarchy, finally block, Stack unwinding,
Chained exceptions, Declaring new exception types, Assertions, try with resources. Simple I/O
with GUI, Basic GUI Components, GUI Event handling, Adapter classes, Layout managers, Using
panels.
(8L)
Module V
Strings, characters & Files
Working with the String and StringBuilder class, Character class, Tokenizing strings, Regular
Expressions, Files and Streams, Using NIO classes, Sequential file handling, Object serialization,
JFileChooser, Introduction to threading, Introduction to Generics and lambda expressions.
(8L)
Text book:
Deitel P., Deitel H., Java How to Program, 10th Edition, Pearson Publications, 2016.(T1)
Reference book:
Wu C. T., Object Oriented Programming in Java, 5th Edition, McGrawHill Publications,
2010.(R1)
POs met through Gaps in the Syllabus: P10 will be met though report-writing/presentation-based
assignment
POs met through Topics beyond syllabus/Advanced topics/Design: Teaching through paper
Page 47 of 398
CD5 Laboratory experiments/teaching aids
CD6 Industrial/guest lectures
CD7 Industrial visits/in-plant training
CD8 Self- learning such as use of NPTEL materials and internets
CD9 Simulation
Course Outcome (CO) Attainment Assessment tools & Evaluation procedure
Direct Assessment
Assessment tool % contribution during co assessment
Assignment 5
Indirect Assessment
1. Student Feedback on Faculty
2. Student Feedback on Course
CD2 Assignments
CD7 Simulation
Page 48 of 398
Mapping of Course Outcomes onto Program Outcomes
Program
Specific
Course Program Outcomes (POs)
Outcomes
Outcome
(PSOs)
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15
CO1 2 1 2 2 3 3 2 1 1 1 1 2 3 2 2
CO2 2 1 2 2 3 3 2 1 1 1 1 2 3 2 2
CO3 2 1 3 3 3 3 2 1 1 1 1 2 3 2 3
CO4 2 1 3 3 3 3 2 1 1 1 2 3 3 2 3
CO5 2 1 3 3 3 3 2 1 1 1 2 3 3 2 3
Course Objectives
This course enables the students to:
Page 49 of 398
1. To analyze the performance of recursive and nor-recursive algorithms.
2. To understand various algorithm design techniques.
3. To use of different paradigms of problem solving.
4. To find efficient ways to solve a given problem.
5. To compare various algorithms of a given problem.
Course Outcomes
After the completion of this course, students will be able to:
1. Define the concepts and mathematical foundation for analysis of algorithms.
2. Explain different standard algorithm design techniques, namely, divide & conquer,
greedy, dynamic programming, backtracking and branch & bound.
3. Demonstrate standard algorithms for fundamental problems in Computer Science.
4. Design algorithms for a given problem using standard algorithm design techniques.
5. Analyze and compare the efficiency of various algorithms of a given problem.
SYLLABUS
Module I
Algorithms and Complexity
Introduction, Algorithm Complexity and various cases using Insertion Sort, Asymptotic Notations,
Time complexity of Recursive Algorithm, Solving Recurrences using Iterative, Recursion Tree
and Master Theorem. (8L)
Module II
Divide and Conquer
Discussion of basic approach using Binary Search, Merge Sort , Quick Sort , Selection in Expected
linear time, Maximum Subarray , Matrix Multiplication , Introduction of Transform and Conquer
and AVL Tree . (8L)
Module III
Dynamic Programming
Introduction and Approach, Rod Cutting, LCS, Optimal BST, Transitive closure and All-pair
Shortest Path, Travelling Salesperson Problem. (8L)
Module IV
Greedy and other Design Approaches
Introduction to greedy using fractional knapsack, Huffman Code, Minimum Spanning Tree – Prim
and Kruskal, Single Source Shortest Path Dijkstra’s and Bellman-Ford, Introduction to
Backtracking using N-Queens problem, Introduction to Branch and Bound using Assignment
Problem or TSP. (8L)
Module V
NP Completeness and Other Advanced Topics
Non-deterministic algorithms – searching and sorting, Class P and NP, Decision and Optimization
problem, Reduction and NPC and NPH, NP Completeness proof for: SAT, Max-Clique, Vertex
Cover, Introduction to Randomized Algorithms, Introduction to Approximation Algorithms.
(8L)
Page 50 of 398
Text Book:
1. Cormen Thomas H. et al., Introduction to Algorithms. 3rd Edition, PHI Learning, latest
edition.(T1)
Reference Books:
1 Horowitz E., Sahani, Fundamentals of Computer Algorithms, Galgotia Publication Pvt.
Ltd. (R1)
2 Dave and Dave, Design and Analysis of Algorithms, 2nd Edition, Pearson. (R2)
3 Goodrich, Tamassia. Algorithm Design. Wiley. (R3)
POs met through Gaps in the Syllabus: P10 will be met though report-writing/presentation-based
assignment
POs met through Topics beyond syllabus/Advanced topics/Design: Teaching through paper
Page 51 of 398
Two quizzes 20 (2×10)
Teacher’s Assessment 5
Indirect Assessment
1. Student Feedback on Faculty
2. Student Feedback on Course
CD2 Assignments
CD7 Simulation
Program
Specific
Course Program Outcomes (POs)
Outcomes
Outcome
(PSOs)
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15
CO1 2 2 3 2 1 1 1 1 1 2 1 2 3 3 2
CO2 2 2 3 2 1 1 1 1 1 2 1 2 3 3 2
CO3 2 2 3 2 1 1 1 1 1 2 2 2 3 3 3
CO4 3 3 3 3 2 1 1 1 1 2 2 3 3 3 3
CO5 3 3 3 3 2 1 1 1 1 2 2 3 3 3 2
Page 52 of 398
Correlation Levels 1, 2 or 3 as defined below:
Course Objectives
This course enables the students to:
1. Present the main components of OS and their working
2. Introduce the concepts of process and thread and their scheduling policies
3. Handling synchronization of concurrent processes and deadlocks
4. Analyze the different techniques for managing memory, I/O, disk and files
5. Design the components of operating system
Course Outcomes
After the completion of the course student will be able to:
1. Describe the main components of OS and their working
2. Explain the concepts of process and thread and their scheduling policies
3. Solve synchronization and deadlock issues
4. Compare the different techniques for managing memory, I/O, disk and files
5. Design components of operating system
Syllabus
Module I [8L]
Page 53 of 398
Operating system Overview
Operating system Objective and Functions, Evolution of Operating System, Major Advances in
OS Components, Characteristics of Modern Operating Systems
Process Description and Control
Process Concept, Process States, Process Description, Process Control, Threads, Types of Threads,
Multicore and Multithreading
Module II [8L]
Scheduling
Type of scheduling, Uniprocessor Scheduling, Multiprocessor Scheduling
Module III [8L]
Concurrency
Mutual Exclusion and Synchronization
Principle of Concurrency, Mutual Exclusion, Hardware Support, Semaphores, Monitors, Message
Passing, Readers/Writers Problem
Deadlock and Starvation
Principle of Deadlock, Deadlock Prevention, Deadlock Avoidance, Deadlock Detection, Dining
Philosopher Problem
Module IV [8L]
Memory Management
Memory Management Requirements, Memory Partitioning, Paging, Segmentation
Virtual Memory
Hardware and Control Structures, Operating System Policies for Virtual Memory
Module V [8L]
I/O Management and Disk Scheduling
I/O device, Organization of the I/O Function, Operating System Design Issues, I/O Buffering, Disk
Scheduling, RAID, Disk Cache
File Management
Overview, File Organization and Access, File Directories, File Sharing, Record Blocking, File
Allocation and Free Space Management
Text Book:
1. StallingsW., Operating systems - Internals and Design Principles, , 8th Edition, Pearson,
2014.
Reference Books:
Page 54 of 398
POs met through Gaps in the Syllabus: P10 will be met though report-writing/presentation-based
assignment
POs met through Topics beyond syllabus/Advanced topics/Design: Teaching through paper
Teacher’s Assessment 5
Indirect Assessment
Page 55 of 398
1. Student Feedback on Faculty
2. Student Feedback on Course
CD2 Assignments
CD7 Simulation
Page 56 of 398
COURSE INFORMATION SHEET
Course Objectives
This course enables the students to understand
the
3. concepts in probability theory, the properties of probability distributions
Course Outcomes
After the completion of this course, students will be able to
3. learn basic probability axioms, rules and the moments of discrete and continuous
random variables as well as be familiar with common named discrete and continuous
random variables.
4. find the point and interval estimates, analyse data statistically and interpretation of
the results
Syllabus
List of Assignments
1. Find a simple root of using bisection method. Read the end points of the interval
in which the root lies, maximum number of iterations and error tolerance eps.
Page 57 of 398
2. Find a simple root of using Regula-Falsi method. Read the end points of the interval
in which the root lies, maximum number of iterations and error tolerance eps.
3. Find a simple root of using Newton Raphson method. Read any initial approximation
, maximum number of iterations and error tolerance eps.
4. Solution of a system of linear equations using Gauss elimination method with partial
pivoting. The program is for system or higher order system.
5. Matrix inversion and solution of system of equations using Gauss-Jordan method. If the
system of equations is larger than change the dimensions of the float statement.
6. Program to solve a system of equation using Gauss-Seidel iteration method. Order of the matrix
is , maximum number of iterations , error tolerance is eps and the initial approximation
to the solution vector is . If the system of equations is larger than change the dimension
in float.
7. Program to find the largest Eigen value in magnitude and the corresponding Eigen vector of a
square matrix of order using power method.
8. Program for Lagrange interpolation.
9. Program for Newton divided difference interpolation.
10. Program for Newton's forward and backward interpolation.
11. Program for Gauss's central difference interpolation (both backward and forward).
12. Program to evaluate the integral of between the limits to using Trapezoidal rule of
integration based on subintervals or nodal points. The values of and are to be read.
The program is tested for .
13. Program to evaluate the integral of between the limits to using Simpson's rule of
integration based on subintervals or nodal points. The values of and are to be
read and the integrand is written as a function subprogram. The program is tested for
.
14. Program to solve an IVP, using Euler method. The initial value
the final value and the step size are to be read. The program is tested for
.
15. Program to solve an IVP, using the classical Runge-Kutta fourth order
method with step size , and also computes the estimate of the truncation error. Input
parameters are: initial point, initial value, number of intervals and the step length h. Solutions
with , and the estimate of the truncation error are available as output. The right hand
side The program is tested for .
Text Books:
1. S.S.Sastry-Introductory Methods of Numerical Analysis-PHI, Private Ltd., New Delhi.
2. N.Pal& S. Sarkar- Statistics: Concepts and Applications, PHI, New Delhi-2005.
Reference Books:
1 R.V.Hogg et.al- Probability and Statistical Inpane, 7th Edn, Pearson Education, New
Delhi-2006.
2. R.L.Burden&J.D.Faires- Numerical Analysis, Thomson Learning-Brooks/Cole, Indian
Reprint, 2005.
POs met through Topics beyond syllabus/Advanced topics/Design: through experiments involving
design/modelling of device/circuits on advanced topics
Attendance Marks 12
Viva Marks 24
Progressive Evaluation √ √ √ √ √
Page 59 of 398
End SEM Evaluation √ √ √ √ √
Indirect Assessment
1. Student Feedback on Faculty
2. Student Feedback on Course Outcome
Program
Specific
Course Program Outcomes (POs)
Outcomes
Outcome
(PSOs)
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15
CO1 2 2 3 2 1 1 1 2 2 3 2
CO2 2 2 3 2 1 1 2 1 2 2 3 2
CO3 2 2 3 2 1 1 1 2 2 2 2 3 2
CO4 3 3 3 2 1 1 2 2 1 2 2 3 3 3 3
CO5 3 3 3 2 1 1 2 2 1 2 2 3 3 3 3
CO1 CD1,CD6
CO5 CD1,CD2,CD7
Page 60 of 398
Course code: IT202
Course title: Basic IT Workshop
Pre-requisite(s):
Co- requisite(s):
Credits: L: 0 T: 0 P: 2
Class schedule per week: 2
Class: B. Tech
Semester / Level: IV/II
Branch: All
Course Objectives
This course enables the students:
1. Understand and use the basic Matlab functions and understand its environment and
variables
2. Know about handling operations and advanced features like menus and toolbars
3. Implement programs with the use of arrays, strings and graphical data representations
Course Outcomes
After the completion of this course, students will be able:
2. Develop application programs with the help of various tool boxes available in Matlab.
Syllabus
Module I
Introduction to MATLAB and Basics Part I:
Introduction, Advantage, Disadvantage of MATLAB, MATLAB Environment, Variables and
Array, Built-in Functions of MATLAB, Subarrays, Multidimensional Arrays, Data Files.
Module II
MATLAB Basic Part II:
Page 61 of 398
Scalar and Array Operations, Hierarchy of Operations, Introduction to Plotting, Polar Plots,
Subplots, MATLAB profiler. String Functions, Complex Data, Three-Dimensional Plot
Module III
MATLAB Advanced Features:
Sparse Arrays, Cell Arrays,Structure Arrays, I/O Functions, Object Handles, Position and Units,
Graphical User Interface: Dialog Boxes, Menus, Toolbars.
Module IV
Introduction to Python Basics
Basics, I Python, Data Types, Operators, Arrays, Plotting
Module V
Python Programming Part 2:
Functions and loops, object oriented programming, Numerical Formalism
Sample list of Assignments:
Sample Assignments on Python
Loop
3. Write a program in python to shuffle a deck of card using the module random and draw 5
cards.
5. Write a program in python to transpose a given matrix M = [[1, 2], [4, 5], [3, 6]].
Function
7. Write a program in python and use in-built functions to convert a decimal number to binary,
octal and hexadecimal number.
Plot
Page 62 of 398
9. Use Matplotlib to draw histogram to represent average age of population given as Age [21, 54,
66, 44, 32,42, 54, 62, 93, 45, 32, 70]
10. Create a 3-D plot in Python for the function √𝑦 2 − 𝑥 2 over the interval -3 ≤ x ≤ 3 and -3 ≤ x
≤ 3.
Assignment Statements:
1. Given two sides a= 3.2 and b=4.6 of a triangle and angle theta= 600 between these two sides.
Find the length of the third side and the area of the triangle.
Arrays
3. The array A is given below. Extend the 2-D array to 3-D array by including another 2-D array
as second element in the third dimension.
4. Let a matrix A of size (3x4) is defined as, = 12356791011 4812 . Reshape the matrix A
into matrix B of the size (6x2).
(i) Form a diagonal matrix A, using the elements of z as he main diagonal elements of A.
(ii) Form the matrix B, using the elements of vector z as elements of upper diagonal of B.
(iii) Form the matrix C, using the elements of vector z as elements of first lower diagonal of C.
Polynomials
6. Integrate the polynomial y = 4x3 + 12x2 + 16x + 1. Take the constant of integration as 3.
x 0 1 2 4
y 1 6 20 100
Page 63 of 398
9. Write a program in MATLAB to illustrate the use of fwrite function for writing binary data of
different formats to a file named ‘check.txt’.
Plots
10. Plot the curve given by the equation y = sin(x) where x varies from 0 to 2ᴨ. Also label the x-
axis and y-axis and provide a suitable title for the plot
11. Plot a bar graph for the data given as x = [1 2 3 4 5 6] and y = [10 15 25 30 27 19]
12. Given x = t2 and y = 4t for -4 < t < 4. Using MATLAB obtain a 3-D plot showing the matrix
in (x, y) space as a factors of time.
Control structures
13. Write a program in MATLAB to find the count of even values in the given n numbers.
Functions
14. Write a function in MATLAB to calculate the roots of the quadratic equation ax2 + bx + c =
0, where a, b, c are constants.
Text Books:
Reference Books
1. Learn Python The Hard Way, Zed A. Shaw, Addison-Wesley, Third Edition
POs met through Topics beyond syllabus/Advanced topics/Design: through experiments involving
design/modelling of device/circuits on advanced topics
Page 64 of 398
CD7 Industrial visits/in-plant training
CD8 Self- learning such as use of NPTEL materials and internets
CD9 Simulation
Indirect Assessment
1. Student Feedback on Faculty
2. Student Feedback on Course
CO1 CD1,CD6
CO5 CD1,CD2,CD7
Program
Specific
Course Program Outcomes (POs)
Outcomes
Outcome
(PSOs)
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15
CO1 2 1 3 2 3 1 1 2 2 2 2
CO2 2 1 3 2 3 1 2 1 2 2 2 3
CO3 2 2 3 2 3 1 2 2 2 2 2 2 3
CO4 2 3 3 2 3 1 2 2 2 2 2 3 3 2 3
CO5 2 3 3 2 3 1 2 2 2 2 2 3 3 2 3
Course Objectives
This course enables the students to:
1. To introduce the student with fundamentals and features of Object
Oriented programming.
Course Outcomes
After the completion of this course, students will be able to:
CO1 Work in any object oriented environment and program using those features.
CO2 Student will have hands on experience with all basic concepts of Java
programming
CO3 Analyse the design pattern of the given problem and further solve with
less complexity.
CO4 Use his/her programming skills to resolve the issues coming while
programming for bigger problems.
CO5 Work in industry environment with good enough knowledge about Java
and OOPs.
Syllabus
List of Programs as Assignments:
Objective: To understand and Implement basic java program concepts using Scanner class.
Page 67 of 398
Q1. Take input from user a character variable in a program and if the value is alphabet then print
"Alphabet" if it’s a number then print "Digit" and for other characters print "Special
Character"
Q2. Write a program to add all the values in a given number and check if the sum is prime number
or not. Ex: 1234->10, not prime.
Page 68 of 398
this object.Create an instance of Bird class and invoke the eat, sleep and fly methods using
this object.
Q2. A HighSchool application has two classes: the Person superclass and the Student subclass.
Using inheritance, in this lab you will create two new classes, Teacher and CollegeStudent.
A Teacher will be like Person but will have additional properties such as salary (the amount
the teacher earns) and subject (e.g. “Computer Science”, “Chemistry”, “English”, “Other”).
The CollegeStudent class will extend the Student class by adding a year (current level in
college) and major (e.g. “Electrical Engineering”, “Communications”, “Undeclared”).
6. Lab Assignment No: 6
Objective: To Understand and Implement the concept of Overloading and Overriding
Q1.Create a class Account with two overloaded constructors. First constructor is used for
initializing, name of account holder, account number and initial amount in account. Second
constructor is used for initializing name of account holder, account number, address, type
of account and current balance. Account class is having methods Deposit(), WithDraw(),
and GetBalance().Make necessary assumption for data members and return types of the
methods. Create objects of Account class and use them.
Q2. Create a base class Fruit which has name ,taste and size as its attributes. A method called eat()
is created which describes the name of the fruit and its taste. Inherit the same in 2 other
class Apple and Orange and override the eat() method to represent each fruit taste.
7. Lab Assignment No: 7
Objective: To Understand and Implement String class in Java
Q1. Reverse the string but not the words. Eg. I/P: Birla institute of technology
O/P: technology of institute birla.
Q2. Find out and print the maximum possible palindrome in a given string. Eg:
I/P: nononsene O/P: nonon
Q3.Given a string and a non-empty word string, return a string made of each char just before and
just after every appearance of the word in the string. Ignore cases where there is no char
before or after the word, and a char may be included twice if it is between two words.
If inputs are "abcXY123XYijk" and "XY", output should be "c13i".
If inputs are "XY123XY" and "XY", output should be "13".
8. Lab Assignment No: 8
Objective: To Understand and Implement the concept of Abstract classes and Interfaces
Q1. Create an abstract class Compartment to represent a rail coach. Provide an abstract function
notice in this class. Derive FirstClass, Ladies, General, Luggage classes from the
compartment class. Override the notice function in each of them to print notice suitable to
the type of the compartment. Create a class TestCompartment. Write main function to do
the following: Declare an array of Compartment of size 10. Create a compartment of a type
as decided by a randomly generated integer in the range 1 to 4. Check the polymorphic
behavior of the notice method.
Q2.Write a program in java which implement interface Student which has two methods
Display_Grade and Attendance for PG_Students and UG_Students (PG_Students and
UG_Students are two different classes for Post Graduate and Under Graduate Students
respectively).
9. Lab Assignment No: 9
Page 69 of 398
Objective: To Understand and Implement Exception handling in java
Q1. Write a program in Java to display name and roll number of students. Initialize respective
array variables for 10 students. Handle ArrayIndexOutOfBoundsException, so that any
such problem does not cause illegal termination of program.
Q2. Write a program to accept name and age of a person from the command prompt(passed as
arguments when you execute the class) and ensure that the age entered is >=18 and < 60.
Display proper error messages. The program must exit gracefully after displaying the error
message in case the arguments passed are not proper. (Hint : Create a user defined
exception class for handling errors.)
10. Lab Assignment No: 10
Objective: To Understand and Implement File Handling and multithreading in java
Q1. Write a program to count the number of times a character appears in the Fileand also copy
from one file to another. (Case insensitive... 'a' and 'A' are considered to be the same)
Q2. 1. Create class of SalesPersons as a thread that will display fives sales persons name. 2. Create
a class as Days as other Thread that has array of seven days.
3. Call the instance of SalesPersons in Days and start both the threads 4. suspendSalesPersons on
Sunday and resume on wednesday Note: use suspend, resume methods from thread
Q3. Create two threads, one thread to display all even numbers between 1 & 20, another to display
odd numbers between 1 & 20. Note: Display all even numbers followed by odd numbers
Hint: use join
11. Lab Assignment No: 11
Objective: To Understand and Implement Applets, AWT and Swings
Q1. Program to create a calculator with the help of AWT packages in Java.
Q2. Program to create a unit converter using Swings in Java.
Q3. APPLETS
a) Working with Frames and various controls.
b) Working with Dialogs and Menus.
c) Working with Panel and Layout.
d) Incorporating Graphics.
e) Working with colors and fonts.
Books recommended:
TEXT BOOKS
1. Krishna P. R., Object Oriented Programming through JAVA, 1st Edition, Universities
Press, 2008.
2. Patrick Naghton& H. Schildt – The Complete Reference Java 2, Tata McGraw Hill
Publication, New Delhi.
3. Dietel,Dietel - Java How to program , 7th edition; Pearson Education , New Delhi.
REFERENCE BOOKS
1. C. Horstmann,G. Cornell - Core Java 2 Vol I & Vol II ; Pearson Education , New Delhi.
2. Balagurusamy -Programming in Java, 2nd Edition; Tata McGraw Hill Publication; New
Delhi.
Page 70 of 398
Course Evaluation:
Day to day progressive evaluation, Lab Quizzes, Surprise Tests, Online Lab performance and Viva
Voce
Gaps in the syllabus (to meet Industry/Profession requirements):
Implementing of real world problems
POs met through Gaps in the Syllabus: PO5&6
POs met through Topics beyond syllabus/Advanced topics/Design: Teaching through research
papers.
Page 71 of 398
Viva 20
Indirect Assessment
1. Student Feedback on Faculty
2. Student Feedback on Course
CD2 Assignments/Seminars
CD7 Simulation
Page 72 of 398
Program
Specific
Course Program Outcomes (POs)
Outcomes
Outcome
(PSOs)
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15
CO1 2 1 2 2 3 3 2 1 1 1 1 2 3 2 2
CO2 2 1 2 2 3 3 2 1 1 1 1 2 3 2 2
CO3 2 1 3 3 3 3 2 1 1 1 1 2 3 2 3
CO4 2 1 3 3 3 3 2 1 1 1 2 3 3 2 3
CO5 2 1 3 3 3 3 2 1 1 1 2 3 3 2 3
CO1 CD1,CD6
CO5 CD1,CD2,CD7
Course Objectives
This course enables the students to:
Page 73 of 398
1. Gain practical experience with designing and implementing concepts of
operating systems such as system calls.
Course Outcomes
After the completion of this course, students will be able to:
CO1 Understand and implement basic services and functionalities of the
operating system using system calls. .
CO2 Use modern operating system calls and synchronization libraries in
software/ hardware interfaces.
CO3 Understand the benefits of thread over process and implement
synchronized programs using multithreading concepts.
CO4 Analyze and simulate CPU Scheduling Algorithms like FCFS, Round
Robin, SJF, and Priority.
CO5 Implement memory management schemes and page replacement schemes.
SYLLABUS
Page 74 of 398
Q1. WAP to implement Round Robin Scheduling
7. Lab Assignment No: 7
Objective: To Understand and Implement Scheduling algorithms
Q1 WAP to implement SRTF scheduling .
8. Lab Assignment No: 8
Objective: To Understand and Implement context switching
Q1. WAP to implement Round Robin Scheduling with context switching.
9. Lab Assignment No: 9
Objective: To Understand and Implement context switching.
Q1.WAP to implement SRTF with context switching.
10. Lab Assignment No: 10
Objective: To Understand and Implement Page Replacement Techniques
Q1. WAP to implement FCFS page replacement algorithm.
Q2. WAP to implement Optimal page replacement algorithm.
Books recommended:
TEXT BOOKS
Operating System Concepts(2012): Abraham Silberschatz Yale University PETER
BAER GALVIN Pluribus Networks GREG GAGNE Westminster College. (T1)
Operating Systems (2003) by Deitel, Deitel, and Choffnes. (T2)
REFERENCE BOOKS
POs met through Topics beyond syllabus/Advanced topics/Design: through experiments involving
design/modelling of device/circuits on advanced topics
Direct Assessment
Assessment Tools % Contribution during CO Assessment
Continuous Internal Assessment 60
Semester End Examination 40
Progressive Evaluation 3 3 3 3
Indirect Assessment
1. Student Feedback on Faculty
2. Student Feedback on Course Outcome
CO1 CD1,CD6
CO5 CD1,CD2,CD7
Page 76 of 398
Mapping between Objectives and Outcomes
Program
Specific
Course Program Outcomes (POs)
Outcomes
Outcome
(PSOs)
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15
CO1 2 2 2 2 1 1 2 1 1 1 1 2 2 2 1
CO2 2 2 2 2 1 1 2 1 1 1 1 2 2 2 1
CO3 2 2 3 2 2 2 2 2 1 2 1 3 3 2 2
CO4 3 3 3 3 2 2 2 2 2 2 2 3 3 3 3
CO1 CD1,CD4
CO5 CD1,CD2
Course Objectives
After the completion of this course, students will be able to:
Course Outcomes
After the completion of this course, students will be able to:
CO1 Able to know the different notions of asymptotic complexity and determine the
asymptotic complexity of algorithms including the solving of recurrence relations.
CO2 Able to determine the practical implications of asymptotic notations.
CO3 Able to Implement, analyze, and compare algorithms.
CO4 Able to Know the difference between the dynamic programming concept and a greedy
approach.
CO5 Able to know and use basic and advanced graph algorithms including DFS, BFS, and
Bellman Ford.
Syllabus
List of Programs as Assignments:
1. Lab Assignment No: 1
Programs on Polynomial vs logarithmic running times
Books recommended:
Text Books:
1. Thomas H Cormen, Charles E Lieserson, Ronald L Rivest and Clifford Stein, Introduction to
Algorithms, Second Edition, MIT Press/McGraw-Hill, 2001. (T1)
2. SanjoyDasgupta, Christos H. Papadimitriou and Umesh V. Vazirani, Algorithms, Tata McGraw-
Hill, 2008. (T2)
3. Jon Kleinberg and ÉvaTardos, Algorithm Design, Pearson, 2005. (T3)
Course Evaluation:
POs met through Topics beyond syllabus/Advanced topics/Design: through experiments involving
design/modelling of device/circuits on advanced topics
Page 79 of 398
Gaps in the syllabus (to meet Industry/Profession requirements):
Indirect Assessment
1. Student Feedback on Faculty
2. Student Feedback on Course
Page 80 of 398
Mapping between Objectives and Outcomes
Mapping of Course Outcomes onto Program Outcomes
Program
Specific
Course Program Outcomes (POs)
Outcomes
Outcome
(PSOs)
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15
CO1 2 2 3 2 1 1 1 1 1 2 1 2 3 3 2
CO2 2 2 3 2 1 1 1 1 1 2 1 2 3 3 2
CO3 2 2 3 2 1 1 1 1 1 2 2 2 3 3 3
CO4 3 3 3 3 2 1 1 1 1 2 2 3 3 3 3
CO5 3 3 3 3 2 1 1 1 1 2 2 3 3 3 2
(Semester V)
Page 81 of 398
COURSE INFORMATION SHEET
Course Objectives
This course enables the students to:
1. Study the components of the data communication model and communications
architecture.
2. Understand the differences and similarities between the OSI model and the TCP model.
3. Understand the fundamentals of the theory of signalling.
4. Understand the basic principles of signal encoding techniques, error-detection, and
error-correction techniques.
5. Understand the characteristics of analog signaling and digital signaling and the strengths
and weaknesses of each method.
Course Outcomes
After the completion of this course, students will be able to:
1. Identify the elements of a communication network.
2. Illustrate different data communications and networking standards.
3. Design and implement a simple LAN and a WAN that meet a specific set of criteria.
4. Identify the new trends and technologies, their potential applications.
5. Examine the social impact of the networking technology particularly on issues related to
security and privacy.
Syllabus
Module I
Data Communications and Networking Overview
A Communications Model, Data Communications, Data Communication Networking, The Need
for Protocol Architecture, A Simple Protocol Architecture, OSI, The TCP/IP Protocol
Architecture, Data TransmissionConcepts and Terminology, Analog and Digital Data
Transmission, Transmission Impairments, Channel Capacity. (8L)
Module II
Transmission Media and Signal Encoding Techniques: Guided Transmission Media, Wireless
Transmission, Wireless Propagation, Line-of-Sight Transmission.Digital Data Digital Signals,
Digital Data Analog Signals, Analog Data Digital Signals, Analog Data Analog Signals. (8L)
Module III
Digital Data Communication Techniques and Data Link Control: Asynchronous and
Synchronous Transmission, Types of Errors, Error Detection, Error Correction, Line
Configurations, Interfacing, Flow Control, Error Control, High-Level Data Link Control (HDLC).
(8L)
Module IV
Page 82 of 398
Multiplexing, Circuit Switching and Packet Switching Multiplexing
Frequency Division Multiplexing, Synchronous Time Division Multiplexing, Statistical Time
Division Multiplexing, Switching Networks, Circuit-Switching Networks, Circuit-Switching
Concepts, Control Signaling, Soft switch Architecture, Packet-Switching Principles, X.25, and
Frame Relay. (8L)
Module V
Asynchronous Transfer Model
Protocol Architecture, ATM Logical Connections, ATM Cells, Transmission of ATM Cells, ATM
Service Categories, ATM Adaptation Layer.
Routing in Switched Networks
Routing in Circuit-Switching Networks, Routing in Packet-Switching Networks, Least-Cost
Algorithms. (8L)
Text Book:
Stallings W., Data and Computer Communications, 10thEdn., Pearson Education, PHI,
New Delhi, 2014.(T1)
Reference Book:
Forouzan B. A., Data Communications and Networking, 5thEdn. TMH, New Delhi,
2017.(R1)
Teacher’s Assessment 5
Page 83 of 398
Continuous Internal Assessment √ √ √ √ √
Indirect Assessment
1. Student Feedback on Faculty
2. Student Feedback on Course
CD2 Assignments
CD7 Simulation
Program
Specific
Course Program Outcomes (POs)
Outcomes
Outcome
(PSOs)
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15
CO1 3 2 2 2 2 1 1 2 2 3 3 3 3
CO2 3 2 2 2 2 1 1 2 2 2 3 3 3 3
CO3 3 3 2 2 2 2 1 2 3 2 3 3 3 3
CO4 3 3 3 3 3 2 2 2 2 3 3 3 3 3 3
CO5 3 3 3 3 3 2 2 2 2 3 3 3 3 3 3
Page 84 of 398
CO4 CD1, CD3,CD6,CD7
CO5 CD1,CD2,CD3,CD4,CD5,CD7
Course Objectives
This course enables the students to:
1. Understand the fundamental concepts, historical perspectives, current trends, structures,
operations and functions of different components of databases.
2. Recognize the importance of database analysis and design in the implementation of any
database application.
3. Describe the role of transaction processing in a database system.
4. Understand various concurrency control mechanisms for a database system.
5. Describe the roles of recovery and security in a database system.
Course Outcomes
After the completion of this course, students will be able to:
1. Analyze data organization requirements and their inter relationships.
2. Illustrate the features of data models and their application for storing data.
3. Design queries to maintain and retrieve useful information from the databases created.
4. Analyze the physical database design with respect to their expected performance using
normalization and query processing.
5. Examine the best practices according to concepts of indexing, transaction control and
concurrency maintenance
Syllabus
Module I
Database Design and Entity - Relational Model
Purpose of Database System; View of Data, Database Languages, Transaction Management,
Database architecture, Database Users and Administrator, Types of database System, Overview of
design process, E-R model, Constraints, E–R Diagram, E-R Diagram issues, Weak Entity Sets,
Extended E – R Features, Reduction to E–R Schemas. (8L)
Module II
Relational Model
Structure of Relational Database, Codd's Rules, Fundamental Relational Algebra Operations,
Additional Relational Algebra Operations, Extended Relational Algebra Operations, Data
definition, Basic structure of SQL queries, Set Operations, Aggregate Functions, Null Values,
Page 85 of 398
Nested Sub Queries, complex queries, views, modification of database, Joined relations, SQL data
types & schemas, Integrity constraints, authorization, Embedded SQL, Triggers. (8L)
Module III
Relational Database Design
Functional dependency, Decomposition, Normalization, First normal form, Second normal form,
Third normal form, BCNF, Multivalued dependencies and Fourth normal form, Join dependencies
and Fifth normal form, DKNF. (8L)
Module IV
Indexing & Hashing
Ordered Indices, B+ Tree index files, B-Tree index files, Multiple key access Static hashing,
Dynamic Hashing, Comparison of ordered indexing and hashing, Index definition in SQL.
Query Processing
Measure of Query Cost, Selection Operation, Evaluation of Expressions. (8L)
Module V
Transaction & Concurrency Control
Transaction Concepts & ACID Properties, Transaction States, Implementation of Atomicity &
Durability, Concurrent Executions, Serializability& Its Testing, Recoverability, Lock-Based
protocols, Validation based protocol, Multiple Granularity, Multiversion Schemes, Deadlock
Handling. (8L)
Text Book:
Silberschatz A. et.al, Database System Concepts, 6th Edition, Tata Mc-Graw Hill, New
Delhi, 2011. (T1)
Reference Books:
Elmasri R., Fundamentals of Database Systems, 7thEdition, Pearson Education, New
Delhi, 2016. (R1)
Ullman Jeffrey D et.al., A First course in Database Systems, 3rd Edition, Pearson
Education, New Delhi- 2014.(R2)
Page 86 of 398
Two quizzes 20 (2×10)
Teacher’s Assessment 5
Indirect Assessment
1. Student Feedback on Faculty
2. Student Feedback on Course
CD2 Assignments
CD7 Simulation
Program
Specific
Course Program Outcomes (POs)
Outcomes
Outcome
(PSOs)
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15
CO1 2 1 2 2 3 3 2 1 1 1 1 2 3 2 2
CO2 3 1 2 2 3 3 2 1 1 1 1 2 3 2 2
CO3 3 1 3 3 3 3 2 1 1 2 1 2 3 2 3
CO4 3 1 3 3 3 3 2 1 1 2 2 3 3 2 3
CO5 2 1 3 3 3 3 2 1 1 1 2 3 3 2 3
Page 87 of 398
MAPPING BETWEEN COURSE OUTCOMES AND COURSE DELIVERY METHOD
Course Objectives
This course enables the students to:
1. Define a system and recognize the behavior of a system.
2. Design finite state machines and the equivalent regular expressions.
3. Construct pushdown automata and the equivalent context free grammars
4. Design Turing machines and Post machines
5. Learn about the issues in finite representations for languages and machines, as well as
gain a more formal understanding of algorithms and procedures.
Course Outcomes
After the completion of this course, students will be able to:
1. Relate formal languages and mathematical models of computation
2. Analyze different types of languages and the corresponding machines
3. Analyze the Pushdown machine and its role in compiler construction
4. Find the capability of real computers and learn examples of unsolvable problems.
5. Analyze classes of P, NP, NP-C and NP-Hard problems
Syllabus
Module I
Introduction to Automata: (mathematical model of digital devices, including real computer),
State Transition Graph, Finite Automaton (FA) and its types, Deterministic Finite
Automaton (DFA), Non-deterministic Finite Automaton (NDFA), Complement, Union,
Intersection of FA’s , Conversion Strategy from NDFA to DFA , Minimization of FA,
Finite Automaton with Output, Applications of FA. (10L)
Module II
Page 88 of 398
Regular Expressions(RE): Introduction , R.E.’s and basic operations, Algebraic laws on
Regular Expression, Finite and Infinite Languages, Equivalence of finite Automaton and regular
expressions, Constructing NDFA from Regular Expression , Pumping Lemma for Regular
Language, Closure properties of Regular Languages, Non-regular languages, Applications of
Regular Expression. (6L)
Module III
Grammar:Introduction, Formal Definition of Grammar, The Chomsky Hierarchy of
Grammar, Designing Regular grammar from DFA, Context Free Grammar, Closure properties
of Context Free Languages, , CFG and Normal form: Chomsky Normal Form, Greibach Normal
Form, Non-Context Free Language, Applications of CFGs. (8L)
Module IV
Push Down Automation (PDA): Introduction, Definition of PDA, Types of Pushdown Automata
(DPDA and NPDA), Converting CFG to PDA, Derivation (Parsing), Parsing Techniques,
Ambiguous and Unambiguous Grammar, Demerits of Ambiguous Grammar. (8L)
Module V
Turing Machine(TM): Single Tape TM, Variations of TM, Halting Problem, Turing Machine
and Languages, Enumerable Languages, Decidable, Recognizable and Undecidable languages,
Solvable and Unsolvable problems, Post Correspondence Problems(PCP), Classes of Problems:
P, NP, NP-C and NP-Hard. (8L)
Text Book:
Hopcroft J.E., Motwani R. and Ullman J.D, Introduction to Automata Theory, Languages and
Computations, Second Edition, Pearson Education, 2008. (T1)
Reference Books:
Mishra K.L.P. andChandrasekaran N. , Theory of Computer Science: Automata,
Languages and Computation, 3rd Edition, PHI.(R1)
Martin John C., Introduction to Languages and the Theory of Computation, 3rd Edition,
TataMcGraw Hill Publishing Company, New Delhi, 2007. (R2)
Lewis Harry R. and Papadimitriou Christos H., Elements of the theory of Computation, 2nd
Edition, Prentice-Hall of India Pvt. Ltd. (R3)
Page 89 of 398
Continuous Internal Assessment % Distribution
Teacher’s Assessment 5
Indirect Assessment
1. Student Feedback on Faculty
2. Student Feedback on Course
CD2 Assignments
CD7 Simulation
Course Objectives
This course enables the students to:
1. Students are effective team members, aware of cultural diversity, who conduct
themselves ethically and professionally
2. Students use effective communication skills and technical skills to assure production of
quality software, on time and within budget.
3. Students build upon and adapt knowledge of science, mathematics, and engineering to
take on more expansive tasks.
4. Able to increase level of self-reliance, technical expertise, and leadership.
Course Outcomes
After the completion of this course, students will be:
1. Explain the software engineering principles and techniques
2. Apply Software Project Management Practices
3. Apply the knowledge gained for their project work as well as to develop software
following software engineering standards
4. Develop self-reliance, technical expertise, and leadership.
Syllabus
Module I
Introduction
Some Definitions, FAQs about software engineering, the evolving role of software, Software
process models, Waterfall model, the prototyping model, spiral model, RAD and Incremental
model, Management activities, Project planning and Project Scheduling. (8L)
Module II
Software Requirements
Page 91 of 398
Functional and non-functional requirements, User requirements, System requirements, the
software requirements document. IEEE standard of SRS, Quality of good SRS.
Module IV
Verification and Validation
Verification and Validation Planning, S/W inspection, static analysis.
Software Testing
Testing functions, Test care design, White Box testing, Black box testing, Unit testing, Integration
Testing, System testing, Reliability. (8L)
Module V
Process metrics, Software Measurement, Software Project Estimation, Decomposition
Techniques, Empirical Estimation Models, Quality assurance and standards, Quality planning,
Quality control, S/W Maintenance in detail. (8L)
Text Book:
Sommerville, Software Engineering, 7th Edition, Pearson Education Publication. (T1)
Reference Books:
Pressman R. S.,Software Engineering: A Practiioners Approach, 5th Edition., TMA, New
Delhi.(R1)
Mall Rajib, Fundamental of Software Engineering, 4th Edition, PHI Learning Private
Limited.(R2)
Peters J. F. &Pedrycz W., Software Engineering, John Wiley & Sons, Inc. 2000.(R3)
Behforooz A. & Hudson F.J., Software Engineering Fundamentals, Oxford Univ. Press,
New York, 2000.(R4)
Page 92 of 398
Assessment Tools % Contribution during CO Assessment
Teacher’s Assessment 5
Indirect Assessment
1. Student Feedback on Faculty
2. Student Feedback on Course
CD2 Assignments
CD7 Simulation
Page 93 of 398
1 3 3 3 1 1 2 1 2 3 3 1 1 1 3 2
2 2 3 1 2 2 2 2 2 2 3 2 1 1 2 3
3 2 3 3 3 3 1 1 1 2 3 1 2 2 3 3
4 3 1 2 1 2 1 2 2 1 1 1 2 2 3 2
5 2 2 1 2 3 1 1 1 1 3 2 3 1 2 3
PROGRAM ELECTIVE -I
Course Objectives
This course enables the students
1. To impart the basic concepts of User Interface Design.
2. To develop understanding about human computer interaction methods that utilize
more general, widespread and easier-to-learn capabilities.
3. The cognitive and perceptual constraints that affect interface design
4. Techniques for evaluating the usability of an interface
5 How to communicate the results of a design process, both in oral and written form
Course Outcomes
After the completion of this course, students will be able to do the following:
1. Identify the key terms related to user interfaces and user interface design and
implementation
2. Identify and describe various types of computer users and computer use contexts
3. Identify and describe various types of user interfaces
4. Describe and explain the user interface design process
5 Identify and describe common abstract user interface components, such as radio
buttons and group boxes
Syllabus
Module I
Introduction: Importance of user interface – definition, importance of good design, brief history
– Graphical User Interface – Web User Interface – Theories, Principles and Guidelines of User
interface design. (7L)
Module II
Design Process: Obstacles in development path deigning for people-Understanding Human
Interaction with computers, Importance of Human Characteristics, Human consideration, Human
Interaction speeds – Understanding Business function. (8L)
Module II
Screen Designing: Design goals - screen meaning and purpose, organizing screen elements
ordering of screen data and content – screen navigation and flow – visually pleasing composition
– amount of information – focus and emphasis – presenting information simply and meaningfully
– information retrieval on web – Statistical graphics – Technological considerations in Interface
Design. (8L)
Module IV
Menus and navigation schemes: structures of menus-functions of menus- contents of menus -
formatting of menus – phrasing the menu- selecting menu choices-navigating menus-kinds of
graphical menus- Selection of windows-Window characteristics-components of windows-window
Page 95 of 398
presentation styles-types of windows-window management-organising window functions-window
operations-Selection of device based and screen based controls - text and messages – icons and
images – Multimedia – colours- uses, problems, choosing colours. (8L)
Module V
Distributed and Collaborative Interaction: Device consistency-distribution of the user
interface-event distribution-graphical package layer-programmable API-Model semantics
distribution-data layer distribution-asynchronous collaboration-Software tools-specification
methods- interface building tools –evaluation and critiquing tools-Interaction devices keyboard
and function keys - pointing devices- speech recognition, digitization and generation – image and
video displays – printers. (9L)
Text books:
Wilbert O. Galitz,”The Essential Guide to User Interface Design”, 3rd Edition, Wiley
Dreamtech,Delhi, 2007.(T1)
Shneiderman Ben, “Designing the User Interface”, 5th Edition, Pearson Education Asia,
Delhi, 2014.(T2)
Reference books:
Olsen Dan R., “Human Computer Interaction”,Cengage, New Delhi,2009.(R1)
Carroll John M.,”Human Computer Interaction”, Pearson Education Asia, Delhi, 2002.(R2)
Cooper Alan, “The Essentials of User Interface Design “, Wiley Dreamtech, Delhi,
2002.(R3)
Teacher’s Assessment 5
Page 96 of 398
Assessment Components CO1 CO2 CO3 CO4 CO5
Indirect Assessment
1. Student Feedback on Faculty
2. Student Feedback on Course
CD2 Assignments
CD7 Simulation
Page 97 of 398
COURSE INFORMATION SHEET
Course code:IT322
Course title: Cloud Computing
Pre-requisites: IT201 Basics of Intelligent Computing
Co- requisite(s): NIL
Credits: L: 3 T: 0 P: 0
Class schedule per week: 3
Class: B. Tech
Semester / Level: III
Branch: CSE/IT
Course Objectives
This course enables the students:
1. Understand the elements of distributed computing and core aspects of cloud Computing.
2. Understand the concepts and aspects of virtualization and application of virtualization
technologies in cloud computing environment
3. Understand the architecture and concept of different cloud models: IaaS, PaaS, SaaS and
gain comprehensive knowledge of different types of clouds.
4. Be familiar with application development and deployment using services of different
cloud computing technologies provider: Google app Engine, Amazon Web Services
(AWS) and Microsoft Azure.
5. Understanding the key security, compliance, and confidentiality challenges in cloud
computing.
Course Outcomes:
After the completion of this course, students will be able to:
1. Recall the various aspects of cloud computing and distributed computing
2. Understand the specifics of virtualization and cloud computing architectures.
3. Develop and deploy cloud application using services of different cloud computing
technologies provider: Google app Engine, Amazon Web Services (AWS) and
Microsoft Azure.
4. Evaluate the security and operational aspects in cloud system design, identify and deploy
appropriate design choices when solving real-world cloud computing problems.
5. Provide recommendations on cloud computing solutions for a Green enterprise.
Syllabus
Module I
Page 98 of 398
Introduction: Essentials, Benefits and need for Cloud Computing - Business and IT Perspective
- Cloud and Virtualization - Cloud Services Requirements - Cloud and Dynamic Infrastructure -
Cloud Computing Characteristics Cloud Adoption. (8L)
Module II
Principles of Parallel and Distributed Computing: Eras of computing, Parallel vs. Distributed
computing, Elements of parallel computing, Elements of distributed computing, Technologies for
distributed computing.
(8L)
Module III
Virtualization: Introduction, Characteristics of virtualized environments, Taxonomy of
virtualization techniques, Virtualization and cloud computing, Pros and cons of virtualization,
Technology examples.
Storage virtualization:Storage Area Networks - Network-Attached storage - Cloud Server
Virtualization - Virtualized Data Centre. (8L)
Module IV
Cloud computing architecture: Introduction, Cloud reference model, Types of clouds,
Economics of the cloud, Open challenges. (8L)
Module V
Cloud platforms in industry and Cloud applications :Amazon web services, Google app
engine, Microsoft azure, Observations, Scientific applications, Scientific, Business and Consumer
applications. (8L)
Text Book:
Buyya Raj Kumar, Vecchiola Christian &Thamarai S. Selvi, “Mastering Cloud
Computing”, McGraw Hill Publication, New Delhi, 2013.(T1)
Reference Books:
Velte T., Velte A. and Elsenpeter R., “Cloud Computing: A Practical Approach”, McGraw
Hill, India.(R1)
Buyya R., Broberg J., “Cloud Computing: Principles and Paradigms”, Wiley.(R2)
Hwang K., Fox G. and Dongarra J., “Distributed and Cloud Computing, From Parallel
Processing to the Internet of Things”, Morgan Kaufmann, 2012.(R3)
Page 99 of 398
Semester End Examination 50
Teacher’s Assessment 5
Indirect Assessment
1. Student Feedback on Faculty
2. Student Feedback on Course
CD2 Assignments
CD7 Simulation
Program
Specific
Course Program Outcomes (POs)
Outcomes
Outcome
(PSOs)
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15
CO1 3 3 3 3 2 3 2 2 1 2 2 2 3 3 3
CO2 3 3 3 3 3 3 2 2 1 2 2 2 3 2 3
CO3 3 3 3 2 3 3 2 2 1 2 2 2 3 3 3
CO4 3 3 3 3 3 2 2 2 2 2 2 2 3 3 3
CO5 3 3 3 3 3 3 2 2 2 2 2 2 2 2 3
Page 100 of 398
MAPPING BETWEEN COURSE OUTCOMES AND COURSE DELIVERY METHOD
Course Objectives
This course enables the students:
1. To understand the basic idea of Network Optimization Models.
2. To introduce the basic concept of Dynamic Programming.
3. To understand the idea of Nonlinear Programming.
4. To know about the basic concepts of Heuristic Programming.
5. Provide the students to practice on Linear Programming for Problem solving.
Course Outcomes
After the completion of this course, students will be able to :
1. Prepare the operational models for the real-world applications using Linear
Programming
2. Apply the techniques to solve the Network Optimization models
3. Analyse the computational feasibility of the solutions using the Deterministic and
Probabilistic Dynamic Programming
4. Model problems using Non-Linear Programming and evaluate the suitability of the
available techniques for the problem at hand
5 Apply the meta-heuristic algorithms for real world optimization
Syllabus
Module I
Module IV
Nonlinear Programming: Graphical Illustration of Nonlinear Programming Problems, Types of
Nonlinear Programming Problems, Unconstrained Optimization, The Karush-Kuhn-Tucker
(KKT) Conditions for Constrained Optimization, Quadratic Programming, Separable
Programming, Convex Programming. (8L)
Module V
Queueing Theory : Basic Structure of Queueing Models, Examples of Real Queueing Systems,
Role of Exponential Distribution, The Birth-and-Death Process,Different Queuing Models.
Text Book:
Hiller ,S. & Lieberman ,G.J.,”Operations Research”, 9/e , TMH, New Delhi–2012.(T1)
Reference Books:
Taha ,H.A.,”Operations Research”, 9/e , Pearson Education , New Delhi-2013.(R1)
Pai,P.P.,”Operations Research”, 1/e, Oxford University Press 2012.(R2)
Gaps in the syllabus (to meet Industry/Profession requirements):N/A
Teacher’s Assessment 5
Indirect Assessment
1. Student Feedback on Faculty
2. Student Feedback on Course
CD2 Assignments
CD7 Simulation
Course Objectives
This course enables the students:
1. To understand the concept of fuzzy logic and controllers
2. To understand the various architectures of ANN and its learning methods
3. To learn about basic concepts of genetic algorithm and its operators
4. To understand the Artificial Neural Networks
5. To understand the Genetic Algorithms
Course Outcomes
Syllabus
Module I
Fuzzy Set Theory: Basic Definition and Terminology, Set Theoretic Operations, Fuzzy types and
levels, MF Formulation and Parameterization, MF of two dimensions, Fuzzy Union, Intersection
and Complement, Fuzzy Number,Fuzzy measure. (8L)
Module II
Fuzzy Logic: Fuzzy Rules and Fuzzy Reasoning:Extension Principles and Fuzzy Relations, Fuzzy
IF THEN Rules, Defuzzification,FuzzyReasoning.Fuzzy Inference System: Introduction,
Mamdani Fuzzy Models, Other Variants, Sugeno Fuzzy Models, Tsukamoto Fuzzy Models. (8L)
Module III
Module IV
Introduction to Artificial Neural Networks: What is a Neural Network? Human Brain, Models
of Neuron, Neural Network viewed as Directed Graphs, Feedback, Network Architecture,
Knowledge Representation, Learning processes:(Error correction, Memory-Based, Hebbian
,Competitive,Boltzman ,Supervised,Unsupervised),Memory,Adaptation. (8L)
Module V
Perceptrons, Adaline, Back Propagation Algorithm, Methods of Speeding, Convolution Networks,
Radical Basis Function Networks, Covers Theorem, Interpolation Learning, The Hopfield
Network. (8L)
Text Books:
1. Jang J.S.R., Sun C.T. and Mizutani E., “Neuro-Fuzzy and Soft Computing”
PHI/Pearson Education, New Delhi 2004.(T1)
2. Rajasekaran S. & Vijayalakshmi G.A. Pai, PHI, New Delhi 2003.(T2)
3. Ross T. J., “Fuzzy Logic with Engineering Applications.” TMH, New York,
1997.(T3)
4. HaykinsSimon ,”Neural Networks :A Comprehensive Foundation, Pearson
Education,2002.(T4)
Reference Books:
1. Ray K.S. ,”Soft Computing and Its application”, Vol 1, Apple Academic
Press, 2015. (R1)
2. Lee K.H. ,”First Course on Fuzzy Theory and App.”, Adv in Soft Computing
Spinger, 2005.(R2)
3. Zimmermann H.Z. ,”Fuzzy Set Theory and its App “ , 4th Edition, Spinger
Science, 2001.(R3)
Teacher’s Assessment 5
Indirect Assessment
1. Student Feedback on Faculty
2. Student Feedback on Course
CD2 Assignments
CD7 Simulation
Program
Specific
Course Program Outcomes (POs)
Outcomes
Outcome
(PSOs)
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15
CO1 3 2 2 2 2 1 1 1 2 2 1 2 2 3 2
CO2 3 3 3 3 3 3 3 1 3 3 1 2 3 3 3
CO3 3 3 3 3 2 2 1 1 2 2 1 2 3 3 2
CO4 3 3 3 3 3 2 1 1 1 2 1 2 3 3 2
CO5 3 3 3 3 3 2 1 1 1 2 1 2 3 3 2
Course Objectives
This course enables the students:
1. Describe the utility of different system programs & system tools.
2. Familiarize with the tradeoffs between run-time and compile-time processing (Linking
& Loading techniques).
3. To learn the concepts and techniques behind the designing of various system software.
4. To organize the functionalities & components of system software & tools into different
layers for efficient code generation.
Course Outcomes
After the completion of this course, students will be:
1. Able to understand the evolution of various system software.
2. Able to understand the various data structures that helps in the proper functioning of
the system programs.
3. Able to understand the basic design of various system software.
4. Able to understand the designing of text editors, debuggers etc.
5. Able to design Assemblers
Syllabus
Module I
Introduction: System Software & its Components, Evolution of System Softwares- Operating
System, Loaders, Interpreters, Compilers, Linkers, Assemblers.
Module II
Macros & Macro processors: Macros, Different forms of Macros, Macros using AIF, AGO,
REPT. Etc, Design of a Macro Processor, Macro Assembler. (8L)
Module III
Loaders: Basic Loader Functions, Absolute Loader, Compile & go Loader, Relocating Loader,
Direct Linking Loader. (8L)
Module IV
Linkage Editors: Linking and Relocation, Program Reliability, Linkage Editor and its
Application in IBM-PC, Linking for Program Overlays. (8L)
Module V
Software Tools: Spectrum of Software Tools, Text Editors, Interpreter and Program Generators,
Debug Monitors, Programming Environments. (8L)
Text Book:
Dhamdhere D.M., ”System Programming and Operating Systems”, 2nd Edition., TMH, New
Delhi.(T1)
Reference Book:
Teacher’s Assessment 5
Indirect Assessment
1. Student Feedback on Faculty
2. Student Feedback on Course
CD2 Assignments
CD7 Simulation
Program
Specific
Program Outcomes (POs)
Outcomes
(PSOs)
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15
CO1 3 3 3 2 3 3 1 1 2 2 1 3 3 2 1
CO2 3 3 2 3 3 2 1 1 2 2 2 1 3 2 2
CO3 3 3 2 3 2 3 1 2 2 2 2 1 3 2 3
CO4 3 2 3 2 3 3 1 2 2 3 3 1 3 3 3
CO5 3 3 3 3 2 2 2 2 2 1 2 1 3 1 2
Course Objectives
This course enables the students to:
1. Identifying trends in distributed systems
2. Introducing peer to peer services and distributed file systems
3. Understanding the issues in process and resource management
4. Understanding the requirements for designing and supporting distributed systems
Course Outcomes
After the completion of this course, students will be able to:
1. Define distributed systems and their architecture.
2. outline peer to peer services and distributed file systems
3. Elaborate on concepts of process and resource management
4. Analyze the requirements for designing and supporting distributed systems
5. Discuss and design the working of distributed systems
Syllabus
Module I
Introduction: Introduction to “Large‐Scale”distributed systems, Consequences of “large‐scale”
Some large‐scale distributed systems, Architectures of large scale distributed systems. (8L)
Module II
Design principles of Distributed system: Introduction to peer‐to‐peer systems, The peer‐to‐peer
paradigms, Services on structured overlays, Building trust in P2P systems. (8L)
Text Books:
Coulouris G., Dollimore J., and Kindberg T., “Distributed Systems Concepts and Design”,
5th Edition, Pearson Education, 2012.(T1)
Distributed Systems: Design and Algorithms,
Editors(s):SergeHaddadFabriceKordonLaurentPautetLaure Petrucci, Wiley online
Library.(T2)
Reference Books:
A. S. Tanenbaum, M. Van Steen, “Distributed Systems: Principles and Paradigms”, Pearson
Education, 2007.(R1)
P. K. Sinha, “Distributed Systems: Concepts and Design”, Prentice Hall, 2007.(R2)
Teacher’s Assessment 5
Indirect Assessment
1. Student Feedback on Faculty
2. Student Feedback on Course
CD2 Assignments
CD7 Simulation
Program
Specific
Course Program Outcomes (POs)
Outcomes
Outcome
(PSOs)
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15
CO1 3 2 2 2 2 1 2 1 1 2 1 3 3 2 2
Course Objectives
1. To Learn Basic Concepts of Cryptography and Network Security and Apply them in various
Real life Application.
2. To understand the basic concepts of Network Security
3. To acquire knowledge on standard algorithms used to provide confidentiality, integrity
and authenticity.
4. To understand how to deploy encryption techniques to secure data in transit across data
networks
5. To design security applications in the field of Information technology
Course Outcomes
After the completion of this course, students will be:
1. Understand the basic concept of Cryptography and Network Security and their mathematical
models, and to be familiar with different types of threats
2. Learning and applying various Ciphering Techniques.
3. Apply Symmetric and Asymmetric Cryptographic Algorithms and Standards in Networks.
4. Examine the issues and structure of Authentication Service and Electronic Mail Security
Page 113 of 398
5. To explain and classify different malicious programs, worms and viruses, and to learn the
working and design principles of Firewalls
Syllabus
Module I
Introduction to Cryptography: ComputerSecurity concepts, The OSI Security Architecture,
Security Attacks, Security Services, A model for Network Security, Classical Encryption
Techniques. (8L)
Module II
Mathematical Foundations of Cryptography: Modular Arithmetic, Euclidean Algorithm,
Groups, Rings, Fields, Finite Fields of the Form GF(p), Polynomial Arithmetic, Finite Fields of
the Form GF(2n), Prime Numbers, Fermat’s and Euler’s Theorem, The Chinese Remainder
Theorem, Quadratic Congruence, Discrete Logarithms. (8L)
Module III
Symmetric and Asymmetric Cryptography: Difference Between Symmetric and Asymmetric
Cryptography, DES, Triple DES, AES, RSA Cryptosystem, Symmetric and Asymmetric Key
Cryptography Together, Elgamal Cryptosystem, Elliptic Curve Cryptosystems, , Diffie-Hellman
Key Exchange , Cryptographic Hash Functions, Message Authentication Codes, Digital Signature.
(8L)
Module IV
Internet Security Protocols : Basic Concepts, Security Socket Layer (SSL), Secure Hyper Text
Transfer Protocol (SHTTP), Time stamping Protocol(TSP), Secure Electronic Transaction(SET),
SSL Versus SET, 3-D Secure Protocol, Electronic Money, Email Security, Wireless Application
Protocol(WAP) Security, Security in GSM. (8L)
Module V
Network Security: Users, Trusts and Trusted Systems, Buffer Overflow and Malicious Software,
Malicious Programs, Worms, Viruses, Intrusion Detection Systems (IDS), Firewalls: Definitions,
Constructions and Working Principles. (8L)
Text Book:
Forouzan B. A., Mukhopadhyay D., “Cryptography and Network Security”, 3rd Edition,
Mcgraw Higher Education, 2016. (T1)
Reference Books:
Stallings W., “Cryptography and Network Security: Principles and Practice”, 7th Edition,
Pearson, 2017.(R1)
Kahate A., “Crptography and Network Security”, 3rd Edition, McGraw Hill Education,
New Delhi, 2013.(R2)
Schneier B., “Applied Cryptogaphy: Protocols, Algorithms And Source Code In C”, 2nd
Edition, Wiley, 2007. (R3)
Teacher’s Assessment 5
Indirect Assessment
1. Student Feedback on Faculty
2. Student Feedback on Course
CD2 Assignments
CD7 Simulation
Program
Specific
Course Program Outcomes (POs)
Outcomes
Outcome
(PSOs)
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15
CO1 3 3 3 3 3 3 3 2 2 1 2 2 2 3 1
CO2 3 3 3 3 3 3 3 2 2 2 1 2 1 2 3
CO3 3 2 3 3 3 2 2 2 2 2 2 2 2 3 3
CO4 3 2 3 3 2 2 1 2 2 2 2 2 1 2 3
CO5 3 2 3 3 1 2 2 2 2 1 1 2 2 1 3
OPEN ELECTIVE -I
Course Objective
This course enables the students:
1. Use a variety of hardware and software on campus and do simple file editing.
2. Discuss computer organization in simple terms, including major future directions.
3. Describe how a computer actually performs instructions.
4. Discuss the data organization concepts that apply to physical storage, data
structures, files, and databases.
5. Discuss the features of a programming language and the nature of the language
translation process.
Course Outcomes:
After the completion of this course, students will be:
1. Distinguish between program writing and algorithm development and apply various
problem solving techniques.
2. Describe the functions of an operating system and discuss the problems inherent in
providing multiprogramming.
3. Distinguish between good and bad programming design methods.
4. Describe data organization concepts.
5. Discuss methods of measuring algorithm performance and the limits of
computability.
Syllabus:
Module I
History of Computing.Computer Generations, Significant Events of recent computing history,
Using the terminal, Editing text files, System commands, Using electronic mail Data
representation. Binary numbers, Integers - 2's complement, sign-magnitude, Fractions - binary,
hexadecimal, Exponents - binary, hexadecimal, excess notation, Characters - ASCII, EBCDIC.
(8L)
Module II
Computer Architecture,CPU organization - registers, op codes, execution cycle, Memory
organization - addresses, base &bound.Device operations - interrupts, parity, commands, physical
Module III
Algorithm Development ,Top-down approach,Common tasks - searching, sorting, merging
Techniques - repetition, recursion, divide-and-conquer Programming Languages. Language
levels, Data types, Operators, Control statements and conditions, Input and output Specifications,
Paradigms - procedural, functional, specification, declaration, object-oriented.
(8L)
Module IV
Software Engineering Modularization Documentation Design methodologies Software life cycle
Systems Software (3 hrs)OperatingsystemsCompilers, interpreters and assemblers, Linkers and
loaders. (8L)
Module V
Data Organization,Data Structures: Consecutive storage - arrays, stacks, queues, trees Files -
access and organization, Data base approaches - relational, network, distributed. Algorithm
Analysis, Measuring time and space, Effects of data structures, Computability. (8L)
Text Books:
Reference Books:
Teacher’s Assessment 5
Indirect Assessment
1. Student Feedback on Faculty
2. Student Feedback on Course
CD2 Assignments
CD7 Simulation
Program
Specific
Course Program Outcomes (POs)
Outcomes
Outcome
(PSOs)
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15
CO1 3 2 1 1 1 1 1 1 1 1 1 2 3 1 1
CO2 2 2 2 1 2 1 1 1 2 2 2 2 2 2 2
CO3 3 3 3 3 3 2 2 2 2 2 2 2 3 3 3
CO4 2 3 3 2 2 1 1 1 2 2 2 2 2 2 1
CO5 3 3 3 3 2 1 1 2 2 2 3 3 3 2 2
Course Objective
This course enables the students:
1. Use a variety of hardware and software on campus and do simple file editing.
2. Discuss computer organization in simple terms, including major future directions.
3. Describe how a computer actually performs instructions.
4. Discuss the data organization concepts that apply to physical storage, data
structures, files, and databases.
5. Discuss the features of a programming language and the nature of the language
translation process.
Course Outcomes:
After the completion of this course, students will be:
Distinguish
1. between program writing and algorithm development and apply various
problem solving techniques.
2. Analyze and discuss the problems and their solutions through programming
3. Distinguish between good and bad programming design methods.
4. Write algorithms to solve problems.
5. Discuss methods of measuring algorithm performance and the limits of
computability.
Syllabus
Indirect Assessment
1. Student Feedback on Faculty
2. Student Feedback on Course
Course Program
Program Outcomes (POs)
Outcome Specific
Course Objectives
This course enables the students:
F. To be familiar with basic techniques of algorithm analysis.
G. To understand basic concepts about arrays, stacks, queues, linked lists, trees and
graphs.
H. To understand concepts of searching and sorting techniques.
I. To implement various linear & non-linear data structures; and searching &
sorting algorithms.
J. To assess how the choice of data structures impacts the performance of a program.
Course Outcomes
After the completion of this course, students will be able to:
Page 123 of 398
1. Define various linear and non-linear data structures like stack, queue, linked list, tree
and graph.
2. Explain operations like insertion, deletion, traversal, searching, sorting etc. on various
data structures.
3. Design various data structures and their operations.
4. Analyze the performance of data structure based operations including searching and
sorting.
5. Justify the choice of appropriate data structure as applied to specified problem
definition.
SYLLABUS
Module I
Basic Concepts
Definition and basics of: Data Structure, ADT, Algorithms, Time and Space Complexity,
Asymptotic Notations (O, θ, Ω), Time complexity computation of non-recursive algorithms (like
Matrix addition, Selection sort – using step count), Array – basic operations, concept of multi-
dimensional array, Polynomial operations using Array, Sparse Matrix.
(8L)
Module II
Stack and Queue
Stack ADT: basic operations, Queue ADT: basic operations, Circular Queue, Evaluation of
Expressions, Another application or Mazing Problem.
(8L)
Module III
Linked List
Singly Linked List: concept, representation and operations, Circular Linked List, Polynomial
and Sparse Matrix operations using LL, Doubly Linked List: basic concept.
(8L)
Module IV
Tree and Graph
Basic concepts and terminologies, Binary Search Tree and Heap, Disjoint Set, Graph: concept
and terminologies, Concept of BFS, DFS, Spanning Tree, Connected Components.
(8L)
Module V
Searching and Sorting
Sequential Search and Binary Search, Insertion Sort, Heap Sort, Radix Sort,External Sorting: k-
way merging approach.
(8L)
Text book:
2. SahniHorwitz,, Freed Anderson, Fundamentals of Data Structures in C, 2nd Edition (or
latest) , University Press.(T1)
Reference books:
3. TharejaReema, Data Structures Using C, 2nd Edition, Oxford University Press.(R1)
4. Tanenbaum, Langsam, Augenstein, Data Structures using C, Pearson. (R2)
POs met through Topics beyond syllabus/Advanced topics/Design: Teaching through paper
Direct Assessment
Assessment tool % contribution during co assessment
Assignment 5
Indirect Assessment
1. Student Feedback on Faculty
2. Student Feedback on Course
Course Delivery Methods
CD1 Lecture by use of boards/LCD projectors/OHP projectors
CD2 Assignments
CD7 Simulation
Program
Specific
Course Program Outcomes (POs)
Outcomes
Outcome
(PSOs)
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15
CO1 2 1 1 1 1 1 1 1 1 1 1 1 2 1 1
CO2 2 2 1 1 1 1 1 1 1 1 1 1 1 1 1
CO3 3 3 3 1 2 1 1 1 1 1 1 2 2 2 1
CO4 3 3 2 1 2 1 1 1 1 1 1 2 2 3 1
CO5 2 2 3 2 2 1 1 2 1 1 1 2 3 2 1
Course Outcomes
After the completion of this course, students will be able to:
1. Be able to design and analyze the time and space efficiency of the data
structure
2. Analyze run-time execution of previous learned sorting methods, including
selection, merge sort, heap sort and Quick sort
3. Have practical knowledge on the applications of data structures
4. Be capable to identity the appropriate data structure for given problem
SYLLABUS
Text books:
1. Baluja G S, “Data Structure through C”, Ganpat Rai Publication, New Delhi, 2015.
2. Pai G A V, “Data Structures and Algorithms: Concepts, Techniques and Applications”,
2ndEdn, Tata McGraw-Hill, 2008.
3. Horowitz E., Sahni S., Susan A., “Fundamentals of Data Structures in C”, 2nd Edition,
University Press, 2010.
Reference books:
POs met through Topics beyond syllabus/Advanced topics/Design: through experiments involving
design/modelling of device/circuits on advanced topics
Direct Assessment
Assessment Tools % Contribution during CO Assessment
Continuous Internal Assessment 60
Semester End Examination 40
Indirect Assessment
1. Student Feedback on Faculty
2. Student Feedback on Course
Course Objectives
This course enables the students:
Course Outcomes
After the completion of this course, students will be able to:
Page 130 of 398
1. Use the knowledge of object oriented programming through Java
2. Successfully use the JDK of various versions for programming
3. Apply the knowledge gained for project work as well as Advanced Java
4. Apply latest know-how related to the new developments in the field of Java
5. develop GUI applications.
Syllabus
MODULE I
Procedure-Oriented Programming, Object-Oriented programming, Benefits of OOP, Applications
of OOP, Basics, Evolution of Java, Structure of JAVA Program, Simple Java Program, Tokens,
Comments, Identifiers, Operators, Literals, Control Structures. Java Environment Setup,
Compiling a Java Program, Java Virtual Machine, Philosophy of Java and Benefits.
(6L)
MODULE II
Data types and program statements: Primitive and reference data types, variables and constants,
enumerated constants, labelled statement, expression and null statements, compound statement,
control statement – decision and loops, jump statement, declaration statement, try-throw-catch-
finally statement, declaring and creating arrays, accessing array elements, assigning values to array
elements, multidimensional arrays. (9L)
MODULE III
Functions, Data Abstraction and classes: Declaration, definition and call, main method
arguments, reference variables, method overloading, parameter passing by value for primitive
types, object references and arrays, scope of variables, return from methods.
Class and object, class members and initialization, access rights of members – public, private and
protected access modifiers, constructor and copy constructor, mutability, finalization, dynamic
memory management, garbage collection, this keyword, static members, scope of variables,
interface – declaration, implementation and extending, package and package visibility. (9L)
MODULE IV
Inheritance and Collection classes: multi level and single inheritance, multiple inheritance of
interfaces, Object class, access rights in subclasses and packages, constructor calling sequence,
super keyword, dynamic binding of methods, abstract class, overriding, shadowing and hiding,
finalize, association, aggregation and composition. String, StringBuffer, Date, Calendar, Math,
Object, Class, Exception class. (8L)
MODULE V
Input/Output and JAVA Applets: Stream clases – InputStream, OutputStream, Buffered Stream,
file classes and handling, pushback streams, reader and writer classes, file reader and writer,
serialization.Applet code example, HTML tags for applet, applet lifecycle, color, font and basic
GUI handling, basic graphics, animation. (8L)
Text books:
E. Balagurusamy - Programming in Java, 2nd Edition; Tata McGraw Hill Publication; New
Delhi.(T1)
Page 131 of 398
Reference books:
Patrick Naghton& H. Schildt – The Complete Reference Java 2, Tata McGraw Hill Publication,
New Delhi.(R1)
Dietel,Dietel - Java How to program , 7th edition; Pearson Education , New Delhi.(R2)
Gaps in the syllabus (to meet Industry/Profession requirements):N/A
Teacher’s Assessment 5
Indirect Assessment
1. Student Feedback on Faculty
2. Student Feedback on Course
CD2 Assignments
CD7 Simulation
Course Objectives
This course enables the students to:
1. To write programs using abstract classes.
2. To write programs for solving real world problems using java collection
frame work.
Course Outcomes
Syllabus
1. Use Eclipse or Net bean platform and acquaint with the various menus. Create a
test project, add a test class, and run it. See how you can use auto suggestions, auto fill. Try
code formatter and code refactoring like renaming variables, methods, and classes. Try
Page 134 of 398
debug step by step with a small program of about 10 to 15 lines which contains at least one
if else condition and a for loop.
2. Write a Java program that works as a simple calculator. Use a grid layout to arrange buttons
for the digits and for the +, -,*, % operations. Add a text field to display the result. Handle
any possible exceptions like divided by zero.
3.
a. Develop an applet in Java that displays a simple message.
b. Develop an applet in Java that receives an integer in one text field, and computes its
factorial Value and returns it in another text field, when the button
named “Compute” is clicked.
4. Write a Java program that creates a user interface to perform integer divisions. The user
enters two numbers in the text fields, Num1 and Num2. The division of Num1 and Num 2
is displayed in the Result field when the Divide button is clicked. If Num1 or Num2 were
not an integer, the program would throw a Number Format Exception. If Num2 were Zero,
the program would throw an Arithmetic Exception. Display the exception in a message
dialog box.
5. Write a Java program that implements a multi-thread application that has three threads.
First thread generates random integer every 1 second and if the value is even, second thread
computes the square of the number and prints. If the value is odd, the third thread will print
the value of cube of the number.
6. Write a Java program for the following:
1. Java for Programmers, P. J. Deitel and H. M. Deitel, 10th Edition Pearson education.
2. Thinking in Java, Bruce Eckel, Pearson Education.
3. Java Programming, D. S. Malik and P. S. Nair, Cengage Learning.
4. Core Java, Volume 1, 9th edition, Cay S. Horstmann and G Cornell, Pearson.
Indirect Assessment
1. Student Feedback on Faculty
2. Student Feedback on Course
CD2 Assignments
CD7 Simulation
Course Objectives
This course enables the students:
1. The course shall allow students to understand the basic tenets of OOP.
2. The course will exemplify the basic syntax and constructs of JAVA.
3. The course will help students understand the application OOP principles in various use
cases.
4. The course will explain basic JAVA GUI components and their working.
5. The course aims to expose students to newer JAVA constructs like NIO, Lambdas etc.
Course Outcomes
After the completion of this course, students will be:
1. Identify the difference between procedural and OO programming.
2. Construct programs using various OOP principles.
3. Design UI using JAVA GUI components.
4. Operate on files and strings in real life scenarios.
5. Analyze thread performance and inter thread communication issues
SYLLABUS
Module I
Introduction to Classes, Objects and Java
Introduction to Object Technology, Java, Understanding the Java development environment,
Programming in Java, Memory concepts, Doing basic Arithmetic, Comparing entities, Classes,
Objects, Methods, Strings, Primitive vs reference types.
(8L)
Module II
Control Statements, Methods and Arrays
(8L)
Module IV
Exception Handling & GUI Design
When to use exception handling, Java exception hierarchy, finally block, Stack unwinding,
Chained exceptions, Declaring new exception types, Assertions, try with resources. Simple I/O
with GUI, Basic GUI Components, GUI Event handling, Adapter classes, Layout managers, Using
panels.
(8L)
Module V
Strings, characters & Files
Working with the String and StringBuilder class, Character class, Tokenizing strings, Regular
Expressions, Files and Streams, Using NIO classes, Sequential file handling, Object serialization,
JFileChooser, Introduction to threading, Introduction to Generics and lambda expressions.
(8L)
Text book:
Deitel P., Deitel H., Java How to Program, 10th Edition, Pearson Publications, 2016.(T1)
Reference book:
Wu C. T., Object Oriented Programming in Java, 5th Edition, McGrawHill Publications,
2010.(R1)
POs met through Gaps in the Syllabus: P10 will be met though report-writing/presentation-based
assignment
POs met through Topics beyond syllabus/Advanced topics/Design: Teaching through paper
Direct Assessment
Assessment tool % contribution during co assessment
Assignment 5
Indirect Assessment
1. Student Feedback on Faculty
2. Student Feedback on Course
CD2 Assignments
CD7 Simulation
Program
Specific
Course Program Outcomes (POs)
Outcomes
Outcome
(PSOs)
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15
CO1 2 1 2 2 3 3 2 1 1 1 1 2 3 2 2
CO2 2 1 2 2 3 3 2 1 1 1 1 2 3 2 2
CO3 2 1 3 3 3 3 2 1 1 1 1 2 3 2 3
CO4 2 1 3 3 3 3 2 1 1 1 2 3 3 2 3
CO5 2 1 3 3 3 3 2 1 1 1 2 3 3 2 3
Semester V(Laboratories)
COURSE INFORMATION SHEET
Course Objectives
This course enables the students to:
1. To familiarize the student in introducing and exploring various Network topologies
and networking protocols
3. To enable the student on how to approach for networking problems using networking
simulation tools.
5. Familiarwithnetworktoolsandnetworkprogramming.
Course Outcomes
After the completion of this course, students will be able to:
CO1 Express programming & simulation for networking problems.
CO3 Design and implement simulation of a simple LAN and a WAN that meet a specific set
of criteria
Syllabus
List of Programs as Assignments:
Q2. Ping” is a tool used to determine if a server is responding and to estimate the round
triptime of a message sent to that server. Use the ping command for the following URLs
andrecord the success or failure statistics along with the average round trip time.
a) google.com
b) facebook.com
c) bitmesra.ac.in
Q3. Trace the route that is taken when you try to access:
a) google.com
b) facebook.com
c) bitmesra.ac.in
Q1. Implement on a data set of characters the three CRC polynomials – CRC 12, CRC
16 and CRC 32.
Q3. To study different types of transmission media, various topologies, and configure
modem of computer HUB and Switches.
Q3. Write a C/C++ program to translate dotted decimal IP address into 32 bit address.
Q4. To implement a routing protocol and check its connectivity in a variable length
subnet masked network
Q2. Take an example subnet graph with weights indicating delay between nodes.
Now obtain Routing table art each node using distance vector routing algorithm
Q1. Take a 64 bit playing text and encrypt the same using DES algorithm.
Q3. Using RSA algorithm encrypts a text data and Decrypt the samebjective: To
Understand and Implement Data Interpolation
Books recommended:
Text books
1. William Stallings, Data and Computer Communication, Prentice Hall of India. (T1)
2. Behrouz A. Forouzan, Data Communication and Networking, McGraw-Hill. (T2)
3. Andrew S. Tanenbaum, Computer Networks, Prentice Hall.(T3)
Reference books
Course Evaluation:
Page 144 of 398
Day to day progressive evaluation, Lab Quizzes, Surprise Tests, Online Lab performance and
Viva Voce
Indirect Assessment
1. Student Feedback on Faculty
2. Student Feedback on Course
Program
Specific
Course Program Outcomes (POs)
Outcomes
Outcome
(PSOs)
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15
CO1 3 2 2 2 2 1 1 2 2 3 3 3 3
CO2 3 2 2 2 2 1 1 2 2 2 3 3 3 3
CO3 3 3 2 2 2 2 1 2 3 2 3 3 3 3
CO4 3 3 3 3 3 2 2 2 2 3 3 3 3 3 3
CO5 3 3 3 3 3 2 2 2 2 3 3 3 3 3 3
Course Objective
This course enables the students:
1. Learn and practice data modeling using the entity-relationship and developing database
designs.
2. Understand the use of Structured Query Language (SQL) and learn SQL syntax.
3. Understanding the basic principles of modeling of database using UML and apply
normalization techniques to normalize the database system.
4. Learn Multidimensional schemas suitable for data warehousing. And learn the
Difference between OLTP (Online Transaction Processing) and OLAP (Online
Analytical Processing).
5. To demonstrate the principles behind the logical database design and Data Warehouse
Modeling.
Course Outcomes
After the completion of this course, students will be able to:
CO1 Describe the fundamental elements of relational database management systems.
CO2 Explain the basic concepts of relational data model, entity-relationship model,
relational database design, relational algebra and SQL.
CO4 Convert the ER-model to relational tables, populate relational database and
formulate SQL.
CO5 Improve the database design by normalization.
SYLLABUS
Books recommended:
TEXT BOOKS
1. A.Silberschatz et.al - Database System Concepts, 5thEdn, Tata Mc-Graw Hill, New Delhi – 2000.
REFERENCE BOOKS
1. Date C.J. - An Introduction to Database System, Pearson Education, New Delhi, 2005.
2. R.Elmasri, Fundamentals of Database Systems, Pearson Education, New Delhi, 2005.
POs met through Topics beyond syllabus/Advanced topics/Design: Teaching through research papers.
Indirect Assessment
1. Student Feedback on Faculty
2. Student Feedback on Course
Program
Specific
Course Program Outcomes (POs)
Outcomes
Outcome
(PSOs)
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15
CO1 3 3 3 2 3 3 1 1 2 2 1 3 3 3 3
CO2 3 3 2 3 3 2 1 1 2 2 2 1 3 3 3
CO3 3 3 2 3 2 3 1 2 2 2 2 1 3 3 3
CO4 3 2 3 2 3 3 1 2 2 3 3 1 3 3 3
CO5 3 3 3 3 2 2 2 2 2 1 2 1 3 1 2
Course Objectives
This course enables the students:
1. To understand the basic concepts of UNIX & shell programming.
2. Understand the basic operations of an operating system.
3. To explore the function of a kernel.
4. To understand the basic function of a device driver.
5. To understand the structure of a file system.
Course Outcomes
After the completion of this course, students will be able to:
1. Explain the design of Linux kernel components
2. Experiencing the kernel by passive/active observation
3. Extend the Linux kernel for understanding, self-satisfaction/falsification.
4. Identify the current research trends in OS, Linux being the reference OS
5. Illustrate the design of Linux kernel components
Syllabus
Module I
Introduction to UNIX, file system, system calls, AWK script, Bourne shell programming. (8L)
Module II
Korn Shell Programming, C Shell Programming, Different tools & Debuggers. (8L)
Module III
Introduction: OS concepts catch-up, Linux kernel overview, Extending the kernel: building a
modified kernel, writing simple kernel modules, User-kernel interfacing: system calls, proc/sys,
character devices, device memory maps, Kernel execution contexts: processes, threads, kernel
threads, interrupts, bottom halves/soft IRQs. (8L)
Module IV
Process management: Linux kernel scheduler, context switching, kernel synchronization
Memory management: Virtual memory, page cache, File systems: The VFS layer, Kernel-File
system interfacing. (8L)
Module V
Generic block layer: Block I/O interfacing, kernel block I/O scheduler
Device drivers: Device probe and software / hardware configurations, event registration,
communication. (8L)
Text Books:
HARWANI B.M., UNIX and Shell Programming, First Publication,Oxford University
Press, 2013. (T1)
Love Robert, Linux Kernel Development, 3rd Edition.(T2)
Corbet Jonathan, Kroah-Hartman Greg, Rubini Alessandro, Linux Device Drivers, 3rd
Page 151 of 398
Edition. (T3)
Bovet Daniel P. , CesatiMarco,Understanding the Linux Kernel, Publisher: O'Reilly.(T4)
Nutt Gary, Kernel Projects for Linux, Addison Wesley, ISBN: 0-201-61243-7, July
2000.(T5)
References Books:
Sarwar Syed Mansoor, Koretsky Robert, & Sarwar Syed Aqeel ,Linux: The Textbook
Addison Wesley, ISBN: 0-201-72595-9. (R1)
Gagné Marcel, Linux System Administration: A User's Guide, Addison Wesley, ISBN:
0-201-71934-7 Paperback, September 2001. (R2)
Rubini Alessandro & Corbet Jonathan ,Linux Device Drivers, O'Reilly & Associates,
ISBN 0-596-00008-1Paperback, June 2001.(R3)
Bar Moshe, Linux File Systems, McGraw-Hill; ISBN: 0-07-212955-7 Paperback.(R4)
Teacher’s Assessment 5
CD2 Assignments
CD7 Simulation
Program
Specific
Course Program Outcomes (POs)
Outcomes
Outcome
(PSOs)
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15
CO1 2 2 3 2 3 1 1 1 3 2 3
CO2 3 2 3 2 3 3 1 3 2 1 1 3 2 3
CO3 2 2 3 2 3 1 1 3 2 3
CO4 3 2 3 2 3 2 1 3 2 1 1 3 2 3
CO5 3 2 3 2 3 3 1 2 2 1 2 3 2 3
Course Objectives
This course enables the students to:
Familiarize the students with the fundamental concepts of Software
1. Engineering
Course Outcomes
After the completion of this course, students will be able to:
CO1 Prepare efficient models for development of software for various
projects
CO2 Collect the requirements the client wants for the software being
produced
CO3
Design the UML diagrams necessary for the software being developed
SYLLABUS
Books recommended:
TEXT BOOKS
1. Software Engineering, Ian Sommerville, Pearson, 10th Edition, 2016.(T1)
2. Software Engineering: A Practioner's Approach, Roger S. Pressman, McGraw Hills, 7th
Edition, 2009.(T2)
REFERENCE BOOKS
Course Evaluation:
Day to day progressive evaluation, Lab Quizzes, Surprise Tests, Online Lab performance and
Viva Voce
Gaps in the syllabus (to meet Industry/Profession requirements):
Implementing of real world problems
POs met through Gaps in the Syllabus: PO2, 5 & 6
POs met through Topics beyond syllabus/Advanced topics/Design: Teaching through research
papers.
CD2 Assignments/Seminars
CD7 Simulation
Indirect Assessment
1. Student Feedback on Faculty
2. Student Feedback on Course
Course Objectives
This course enables the students to:
1. Understand the need of compiler in Computer Engineering
2. Provide a thorough understanding of design, working, and implementation of
programming languages
3. Trace the major concept areas of language translation and compiler design
4. Create an awareness of the functioning and complexity of modern compilers
Course Outcomes
After the completion of this course, students will be:
1. Analyze the need of compiler for interfacing between user and machine
2. Explain the role of several phases of compilation process
3. Create an awareness of the function and complexity of modern compilers
4. Outline the major concept areas of languages translation and Compiler design
5. Develop a comprehensive Compiler for a given language
6. Apply knowledge for developing tool for natural language processing
Syllabus
Module I
Introduction to Compilers and its Cousins, Structure of a Compiler, Science of building Compiler
and its Application, Lexical Analyzer, Input Buffering, Specification and Recognition of Tokens,
Introduction to Lex. (5L)
Module II
Introduction to Syntax Analysis, Elimination of Ambiguity, Left Recursion and Left Factoring,
Recursive and Non-Recursive Top-Down Parsers, Bottom-up Parsers: Shift Reduce Parser
techniques and conflicts, all variants of LR Parsers, Handling Ambiguous grammar in Bottom-Up
Parsing, Error handling while parsing, The Parser generator YAAC. (15L)
Module III
Syntax-Directed Definition(SDD), Evaluation Order of SDD’s and its application, Syntax-
Directed Translation Schemes and their Implementation. (7L)
Module IV
Intermediate code Generation: Variants of Syntax Tree, Three Address Code, Translation of
Expressions, Control flow, Back Patching , Run Time Environment: Storage Organization.
(8L)
Module V
Page 159 of 398
Code Generation: Issues in its Design, Target Language, Addresses in Target Code, Basic Blocks
and Flow Graphs, Optimization of Basic BlocksMachine Independent Optimization: Sources of
Optimization, Data Flow analysis. (5L)
Text book:
Aho A. V., Lam M. S., Sethi R., Ullman J. D., Compilers, Principles, Techniques, and
Tool, 2nd Edition, Pearson Education Asia.(T1)
Reference books:
Fischer C. N., LeBlanc R. J., Crafting a Compiler with C, Pearson Education Asia. (R1)
Louden K. C., Compiler Construction, Principles and Practice, Thomson, Brooks/Cole.
(R2)
Teacher’s Assessment 5
Indirect Assessment
Page 160 of 398
1. Student Feedback on Faculty
2. Student Feedback on Course
CD2 Assignments
CD7 Simulation
2 2 3 1 2 2 2 2 2 2 3 2 1 1 2 1
3 2 3 3 3 3 1 1 1 2 3 1 2 2 3 1
4 3 1 2 1 2 1 2 2 1 1 1 2 2 3 2
5 2 2 1 2 3 1 3 3 1 3 2 3 1 2 3
Course Objectives
This course enables the students to:
1. Learn and become comfortable with graphs and its terminologies
2. Understand applications of graph theory to practical problems and other branches of
mathematics
3. Understand various graphs algorithms along with its analysis.
4. Practice creative problem solving and improve skills in this area
Course Outcomes
After the completion of this course, students will be able to:
1. Analyze different types of graphs and their applications in real world.
2. Perceive the role of cut-set, cut-vertex and fundamental circuits in network flows.
3. Create an awareness of planar and dual graph.
4. Explain how to represent graphs in a computer system
5. Apply the concept of graph coloring and partitioning techniques in NP-problems
Syllabus
Module I
Introduction: Graphs and its applications, Finite and infinite graphs, incidence and degree,
isolated Vertex, pendant Vertex, and Null graph, paths and circuits, isomorphism, sub graphs,
walks, paths, and circuits, connected graphs, disconnected graphs and components, Connectivity
checking algorithm, Euler graphs, Operations on graphs, more on Euler graphs, Hamiltonian paths
and circuits, Travelling Salesman problem. (8L)
Module II
Trees and Fundamental circuits: Trees and its properties, Distance and centres in a tree,
Algorithm for checking if a graph is Tree, Partial k-trees, Dynamic Programming in partial k-trees,
Spanning trees, Spanning trees in a Weighted graph, Prim’s and Kruskal’s algorithms
Cut set and cut vertices: Properties of a cut set, Fundamental circuits and cut sets, connectivity
and separability, Computing connected components, Menger's theorem, Network flows, 1-
Isomorphism, 2-Isomorphism. (8L)
Module III
Page 162 of 398
Planar and Dual Graphs: Planar graph, Kuratowski’s Graphs, Representations of a planar graph,
Detection of planarity, Planar Separator Theorem, Geometric Dual, Combinatorial, Duel,
Thickness and crossings, Algorithms for finding Clique and maximum clique. (8L)
Module IV
Matrix Representation of Graphs: Incidence matrix, Adjacency matrix, Adjacency list, Circuits
Matrix, Fundamental Circuit Matrix and RankofB, Cut-set Matrix, Relationships among Af, Bf
and Cf, path Matrix. (8L)
Module V
Coloring, Covering and partitioning: Chromatic number, Chromatic partitioning, Chromatics
polynomial, Coverings, Four colour problem, Algorithm for graph colouring.
Directed Graphs: Digraphs and its types, Digraphs and binary Relations, Directed paths and
connectedness, Euler Digraphs, Trees with Directed Edges, Fundamental Circuitsin Digraphs,
Matrices A,B and C of Digraphs, Adjacency Matrix of a Digraph, Paired Comparisons and
Tournaments, Acyclic Digraphsand De-cyclization. (8L)
Text Books:
Deo Narasingh, Graph Theory with Applications to engineering and Computer Science,
Prentice Hall of India, 2001.(T1)
Raman Tulasi and Swamy M.N.S., Graph, Networks and Algorithms, John Wiley,
1981.(T2)
Reference Books:
West Douglas B., Introduction to Graph theory, Pearson Education, 2002.(R1)
Harary F., Graph Theory, Addison Wesley/ Narosa, 1998. (R2)
Reingold E. M., Nievergelt J., Deo N., Combinatorial Algorithms: Theory and Practice,
R.(R3)
Teacher’s Assessment 5
Indirect Assessment
1. Student Feedback on Faculty
2. Student Feedback on Course
CD2 Assignments
CD7 Simulation
4 2 3 2 2 1 1 1 1 1 1 1 1 1 2 1
5 2 2 2 3 3 2 1 1 1 1 1 1 1 2 3
Course Objectives
Course Outcomes
Syllabus
Group Discussions, Extempore, Principles of effective speech and presentations, Role playing.
Module V: (3 lectures)
Text Books:
Page 166 of 398
T1. Communication Skills, Sanjay Kumar &PushpLata, Oxford University Press
T2. Business Correspondence and Report Writing,R.C.Sharma, Krishna Mohan.Mcgraw Hill
T3. Communication for Business,Shirley Taylor, V.Chandra, Pearson
Reference Books:
Indirect Assessment –
1. Student Feedback on Faculty
2. Student Feedback on Course Outcome
Course
CD Course Delivery methods Outcome Course Delivery Method
Lecture by use of boards/LCD projectors/OHP
CD1 projectors CO1 CD1,CD2,CD3
CD2 Tutorials/Assignments CO2 CD1,CD2,CD3
CD3 Seminars CO3 CD1,CD2,CD3
CD4 Mini projects/Projects CO4 CD1,CD2,CD3,CO4 CD5
CD5 Laboratory experiments/teaching aids CO5 CD1,CD2,CO5
CD6 Industrial/guest lectures
CD7 Industrial visits/in-plant training
Self- learning such as use of NPTEL materials and
CD8 internets
CD9 Simulation
Course Objectives:
This course enables the students:
Course Outcomes
Syllabus
Module 1: Introduction to the Constitution of India, Salient Features of the Constitution: Sources and
constitutional history, Features: Citizenship, Preamble, Fundamental Rights and Duties, Directive
Principles of State Policy.
Module 2: Union and State Executives: President and Prime Minister, Council of Ministers, Cabinet
and Central Secretariat, Lok Sabha, Rajya Sabha.Governor: Role and Position, Chief Ministers and
Council of ministers.
Module 3: The Indian Judicial System – The Supreme Court and The High Court’s – composition,
Jurisdiction and functions, The Role of the Judiciary.
Module 4: Local Government- District’s Administration: Role and Importance, The Panchayatas –
Gram Sabha, Constitution and Composition of Panchayatas ,Constitution and Composition of
Municipalities
Suggested Readings
Direct Assessment
Indirect Assessment –
1. Student Feedback on Faculty
2. Student Feedback on Course Outcome
Course
Course Delivery
CD Course Delivery methods Outcome Method
CD1 Lecture by use of boards/LCD projectors/OHP projectors CO1 CD1
CD2 Tutorials/Assignments CO2 CD1
CD3 Seminars CO3 CD1, CD2
CD4 Mini projects/Projects CO4, CD1, CD2
CD5 Laboratory experiments/teaching aids CO5 CD1, CD3, CD6
CD6 Industrial/guest lectures
CD7 Industrial visits/in-plant training
CD8 Self- learning such as use of NPTEL materials and internets
CD9 Simulation
Course Objectives
This course enables the students:
2. Know the data transmission and routing protocols. Know the differences among
different networks.
5. Compute the throughput and channel utilization for different network scenarios.
Course Outcomes
After the completion of this course, students will be:
2. Understand all basic characteristics of wireless sensor networks and sensor nodes.
4. Analyse and evaluate different constraint of wireless sensor network, e.g., coverage,
powermanagement, security and data collisions.
Syllabus
Module I
Introduction: Wireless channel and communication fundamentals, Features of Wireless sensor
network, Design principles for WSNs, Service interfaces of WSNs and Gateways, Applications,
Hardware components, Sensor deployment mechanism. (6L)
Module II
Module IV
Protocols: MAC Protocols, Framing and error control in WSNs, Medium access control
protocols, Congestion control and rate control protocols. (8L)
Module V
QOS Issues:
Coverage and deployment, Reliable data transport, Single packet and block delivery, Congestion
control and rate control, Collisions, Collision avoidance mechanism. (8L)
Text books:
Karl Holger and Willig Andreas, “Protocols and Architectures for Wireless Sensor
Networks”.(T1)
Callaway Jr. Edgar H. and Callaway Edgar H., “Wireless Sensor Networks: Architectures
and Protocols”.(T2)
Reference books:
Zhang Yan, Jejunum, Hu Honglin, “Wireless Mesh Networking, Architecture, Protocols
and Standards”.(R1)
Indirect Assessment
1. Student Feedback on Faculty
2. Student Feedback on Course
CD2 Assignments
CD7 Simulation
Course Objectives
This course enables the students to:
1. In-depth understanding of specialist bodies of knowledge within the engineering
discipline.
5. Be able to apply problem solving approaches to work challenges and make decisions
using sound engineering methodologies
Course Outcomes
After the completion of this course, students will be able to:
CO1 Apply knowledge of wireless sensor networks(WSN) to various application areas.
Syllabus
Indirect Assessment
1. Student Feedback on Faculty
Progressive Evaluation √ √ √ √ √
Indirect Assessment
1. Student Feedback on Faculty
2. Student Feedback on Course Outcome
Program
Specific
Course Program Outcomes (POs)
Outcomes
Outcome
(PSOs)
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15
CO1 3 2 3 3 3 3 1 2 3 1 2 2 3 3 3
CO2 3 2 2 3 3 2 1 1 2 2 2 1 3 2 2
CO3 3 3 2 3 3 3 3 2 2 2 2 1 3 1 2
CO4 3 2 3 2 3 2 1 2 2 3 3 1 3 3 2
CO5 3 3 3 3 2 2 2 2 2 1 2 1 2 2 3
Course Objectives
This course enables the students:
1. To Characterise engineering systems in terms of their essential elements, purpose,
parameters, constraints, performance requirements, sub-systems, interconnections and
environmental context.
2. To understand Engineering problem modelling and solving through the relationship
between theoretical and mathematical
3. To provide Mathematical modelling real world situations related to engineering
systems development.
4. To able Generate random numbers and random varieties using different techniques.
Course Outcomes
After the completion of this course, students will be able to do the following:
1. Define basic concepts in modeling and simulation (M&S)
2. Classify various simulation models and give practical examples for each category
3. Analyze the behavior of a dynamic system and create an analogous model for a
dynamic system.
4. Analyze and test random number variates and apply them to develop simulation
models
5. Develop a real-life model using queuing system
Syllabus
Module I
The concepts of a system, System Environment, Stochastic Activities, continuous and discrete
systems, System Modeling, Types of models.System Studies: Subsystem, A Corporate Model,
Environment segment, Production Segment, Management Segment, full Corporate Model, Types
of System study, System Analysis, System Design, System Postulation. (7L)
Module II
The technique of simulation, the Monte Carlo method, comparison of simulation and analytical
methods, experimental nature of simulation, types of system simulation, numerical computation
technique for continuous & discrete models, distributed lag models, cobweb models. Continuous
system models, differential equations, analog computers & methods, hybrid computers, CSSLs,
CSMP-III, Feedback Systems, Simulation of an Autopilot. (8L)
Module III
Page 178 of 398
Exponential Growth & decay models, modified exponential growth models, logistic curves,
generalization of growth models, system dynamics diagrams, Simple system dynamics diagrams,
multi–segment models, representation of time delays. (8L)
Module IV
Evaluation of continuous probability functions, continuous uniformly distributed random
numbers, a uniform random number numbers, generating discrete distributions, non-uniform
continuously distributed random numbers, the rejection method. Random numbers Generators:
Techniques for generating random numbers. Test for random numbers. Random vitiate
Generation: Inverse transform technique, exponential distribution, uniform distribution. (8L)
Module V
Queuing disciplines, measures of queues. Discrete events, representation of time, generation of
arrival patterns, simulation of a telephone system, delayed calls, Simulation programming tasks,
measuring utilization and occupancy. (9L)
Text books:
Gordon Geoffrey, System Simulation, 2nd Edition, Pearson Education, 2007. (T1)
Banks J., Carson J. S. , Nelson B.L., Nicol D.M., Discrete-Event System Simulation,
4thEdn, Pearson Education, 2007. (T2)
Teacher’s Assessment 5
Indirect Assessment
1. Student Feedback on Faculty
2. Student Feedback on Course
CD2 Assignments
CD7 Simulation
Program
Specific
Course Program Outcomes (POs)
Outcomes
Outcome
(PSOs)
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15
CO1 2 2 2 2 2 2 1 1 1 2 1 2 2 2 2
CO2 3 3 3 2 3 2 2 1 1 2 1 2 3 2 2
CO3 3 3 3 3 3 2 2 1 1 2 1 2 3 3 2
CO4 3 3 3 3 3 2 2 1 1 2 1 2 3 3 3
CO5 3 3 3 2 3 2 2 1 1 2 1 2 3 3 3
Course Objectives
This course enables the students:
1. To Characterise engineering systems in terms of their essential elements, purpose,
parameters, constraints, performance requirements, sub-systems, interconnections and
environmental context.
2. To understand Engineering problem modelling and solving through the relationship
between theoretical and mathematical
3. To provide Mathematical modelling real world situations related to engineering
systems development.
4. To able Generate random numbers and random varieties using different techniques.
Course Outcomes
After the completion of this course, students will be able to do the following:
1. Define basic concepts in modeling and simulation (M&S)
2. Classify various simulation models and give practical examples for each category
3. Analyze the behavior of a dynamic system and create an analogous model for a
dynamic system.
4. Analyze and test random number variates and apply them to develop simulation
models
5. Develop a real life model using queuing system
Syllabus
Text books:
Gordon Geoffrey, System Simulation, 2nd Edition, Pearson Education, 2007. (T1)
Banks J., Carson J. S. , Nelson B.L., Nicol D.M., Discrete-Event System Simulation,
4thEdn, Pearson Education, 2007. (T2)
Indirect Assessment
1. Student Feedback on Faculty
2. Student Feedback on Course
Program
Specific
Course Program Outcomes (POs)
Outcomes
Outcome
(PSOs)
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15
CO1 2 2 2 2 2 2 1 1 1 2 1 2 2 2 2
CO2 3 3 3 2 3 2 2 1 1 2 1 2 3 2 2
CO3 3 3 3 3 3 2 2 1 1 2 1 2 3 3 2
CO4 3 3 3 3 3 2 2 1 1 2 1 2 3 3 3
CO5 3 3 3 2 3 2 2 1 1 2 1 2 3 3 3
Course Objectives
This course enables the students:
1. Be familiar with both the theoretical and practical aspects Pattern Recognition.
2. Have described the foundation of pattern formation, measurement, and analysis.
3. Understand the mathematical and computer aspects of while extracting features of an
object.
4. Learn the techniques of clustering and classification for various applications.
Course Outcomes
After the completion of this course, students will be able to:
1. Apply their knowledge on Real World Problems while converting these problems to computer
compatible problems for Pattern Recognition.
2. Solve Decision making model using Statistical and Mathematical Decision Theory.
3. Design clusters for various Pattern using classical and Modern clustering techniques.
4. Analyzing various Techniques for Pattern Classification and Clustering.
5. Develop Model for Pattern classification through Probabilistic or fuzzy.
Page 183 of 398
Syllabus
Module I
Introduction: Feature Vectors, Classifiers, Supervised, Unsupervised, MATLAB Tools. Classifiers
Based on Bayesian Theory, Linear Classifiers, Nonlinear Classifiers. (10L)
Module II
Feature Selection, Feature Generation I: Data Transformation and Dimensionality Reduction,
Feature Generation II. (10L)
Module III
Template Matching, Context Dependent Classification, Supervised Learning. (10L)
Module IV
Clustering: Basic Concepts, sequential Algorithms. (5L)
Module V
Hierarchical algorithms, Fuzzy clustering, probabilistic clustering, Hard Clustering, Optimization.
(5L)
Text Books:
Theodoridis S., Koutroumbas K., Elsevier, “Pattern Recognition”, 5th Edition 2015.(T1)
Murty N. Narshima “Pattern Recognition”, Springer, University Press2nd
edition,2015.(T2)
Reference Book:
DudaR.O.,Hart E. Peter,Stork G. David,” Pattern Classification” 2nd Edition, John Wiley,
New York, 2002.(R1)
Indirect Assessment
1. Student Feedback on Faculty
2. Student Feedback on Course
CD2 Assignments
CD7 Simulation
Program
Specific
Course Program Outcomes (POs)
Outcomes
Outcome
(PSOs)
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15
CO1 3 3 3 2 3 2 1 1 2 1 2 2 3 2 3
CO2 3 2 2 3 3 2 1 1 2 2 2 1 3 2 2
CO3 3 2 2 3 2 3 3 2 2 2 2 1 3 1 2
CO4 3 2 3 2 3 2 1 2 2 3 3 1 3 3 2
CO5 3 3 3 3 2 2 2 2 2 1 2 1 2 2 2
Course Objectives
This course enables the students:
1. Apply their knowledge on Real World Problems while converting these problems to computer
compatible problems for Pattern Recognition.
2. Solve Decision making model using Statistical and Mathematical Decision Theory.
3. Design clusters for various Pattern using classical and Modern clustering techniques.
4. Analyzing various Techniques for Pattern Classification and Clustering.
5. Develop Model for Pattern classification through Probabilistic or fuzzy.
Course Outcomes
After the completion of this course, students will be able to:
1. formulate and describe various applications in pattern recognition
2. understand the Bayesian approach to pattern recognition
3. Be able to mathematically derive, construct, and utilize various classifiers both
theoretically and practically.
4. be able to identify the strengths and weaknesses of different types of
classifiers
5. validate and assess different clustering techniques
Syllabus
Text books:
Reference books:
5. Introduction to Statistical Learning, Gareth James, Daniela Witten, Trevor Hastie, Robert
Tibshirani, Springer, 2013.
6. Pattern Classification, 2nd Ed., Richard Duda, Peter Hart, David Stork, John Wiley & Sons,
2001.
Indirect Assessment
1. Student Feedback on Faculty
2. Student Feedback on Course
Program
Specific
Course Program Outcomes (POs)
Outcomes
Outcome
(PSOs)
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15
CO1 3 3 2 3 3 1 3 2 2 2 1 2 3 3 2
CO2 3 2 3 1 2 1 2 3 2 1 1 2 2 3 2
CO3 3 3 3 1 2 1 2 3 1 2 1 2 3 2 2
CO4 3 3 3 1 2 2 2 2 1 2 3 2 3 1 2
CO5 3 2 3 1 2 2 1 3 2 2 3 2 3 2 3
Course Objectives
This course enables the students to:
1. To understand different hardware used for graphical requirement
2. To perform visual computations for geometrical drawings.
3. To display 3D objects in a 2D display devices using projection techniques
4. To model 3D
5. To create realistic images using color and shading techniques
Course Outcomes
After the completion of this course, students will be:
Syllabus
Module I
Introduction and Overview of Graphics Systems
Use of Computer graphics, Video Display Devices, Raster and Random Scan Displays, Colour
CRT Monitors, Flat Panel Displays, Three-Dimensional Viewing Devices, Stereoscopic & Virtual
Reality, Graphics system architecture, Input Devices, Graphics Software.
Output Primitives
Points and Lines, Line Drawing Algorithms (DDA &Bresenham’s), Circle and Ellipse Generating
Algorithms, Conic Sections.Filling Polygons, Pattern Filling, Thick Primitives, Line Style and
PenStyle, Generating Characters, Aliasing and Antialiasing. (7L)
Module II
Geometric Transformations
Two dimensional transformations and their matrix representations, Translation, Rotation, Scaling,
Reflection, Shears, Homogeneous Coordinates, Composite Transformations, transformations
between Coordinate Systems, Affine transformations, 2-Dimensional viewing pipeline, Window-
to-Viewport Coordinate transformation, Clipping-Point, Line clipping-Cohen Sutherland, Liang
Bursky, Polygon clipping – Sutherland Hodgeman, weilerArtherton, Curve and Text Clipping,
Three Dimensional Transformations, Translation, Rotation, Scaling, Reflection, Shears.
(8L)
Page 189 of 398
Module III
Three Dimensional Concepts and Object Representation
Three Dimensional Display Methods, Polygon Surfaces, Curved Lines & Surfaces, Quadric
Surfaces, Spline Representations, Cubic Spline interpolation methods, Hermite Interpolation,
Bezier Curves and Surfaces, Properties of B-splines, Fractal.
Three Dimensional Transformations and Viewing
Three dimensional viewing pipe line, Projections- Parallel and Perspective, Projection
Transformations, Clipping. (7L)
Module IV
Color Model and Color application
Properties of light, Standard primaries and chromaticity diagram, XYZ Color model, RGB color
model. YIQ color model, HSV color model, HLS color model
Illumination Model and Surface Rendering
Light sources, Basic Illumination Models, Ambient light, Defuse and specular reflection.
Shadows, Transparency, Assigning intensity levels, Polygon Rendering Methods, Constant
intensity shading, Gourad shading, Phong shading, Detail. (7L)
Module V
Visible Surface Detection Methods
Classification of Visible Surface Detection Algorithms, Back Face Detection, Depth Buffer
Method, A-Buffer Method, Scan-Line Method, Depth Sorting Method, BSP-Tree Method & Area
Subdivision Method. Octrees, Ray castiny method.
Graphical User Interfaces and Interactive Input Methods
The User Dialogues, Input of graphical data.
Computer Animation
Design of animation sequences, General computer animation functions, Raster animation,
Computer animation languages, Key frame systems. (7L)
Text books:
Hearn D. & Baker M.P. , Computer Graphics, 2/e , Pearson Education, New Delhi, 2005.(T1)
Reference books:
Foley J.D. et. Al, A Fundamental of Computer Graphics, Addition Wesley, London,
1993.(R1)
Krishnamurthy N, Introduction to Computer Graphics, 1stEdn., TMH, 2002.(R2)
Rogers B., Mathematical elements of Computer Graphics, McGraw Hill, 1989.(R3)
Teacher’s Assessment 5
Indirect Assessment
1. Student Feedback on Faculty
2. Student Feedback on Course
CD2 Assignments
CD7 Simulation
Course Objectives
This course enables the students:
A. Able to understand different hardware used for graphical requirement.
B. Able to perform visual computations for geometrical drawings.
C. Able to display 3D objects in a 2D display devices using projection
techniques
D. Able to create realistic images using color and shading techniques
E. Able to model 3D objects
Course Outcomes
After the completion of this course, students will be able to:
1. To list the basic concept used in Computer Graphics
2. To describe the importance of viewing and projections.
3. To implement various algorithms to scan, convert the basic geometrical
primitives, transformations, Area filling, clipping.
4. To design an application with the principles of Computer Graphics
5. To define the fundamentals of animation, virtual reality and its related
technologies.
Syllabus
Text books:
1. D. Hearn & M.P. Baker - Computer Graphics, 2/e , Pearson Education, New Delhi, 2005.
2. Prabat K Andleigh and KiranThakrar, “Multimedia Systems and Design”, PHI, 2005.
Reference books:
Page 193 of 398
1. W.M. Newman. et. al.- Principle of Interactive Computer Graphics, McGraw Hill Publication,
New Delhi, 1995.
2. S. Harrington -Computer Graphics- A Programming Approach, McGraw Hill Publication, New
Delhi, 1994.
3. J.D. Foley et. al- A Fundamental of Computer Graphics Addition Wesley, London, 1993.
Indirect Assessment
1. Student Feedback on Faculty
2. Student Feedback on Course
Program
Specific
Course Program Outcomes (POs)
Outcomes
Outcome
(PSOs)
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15
CO1 3 2 2 3 2 1 2 1 2 2 1 2 3 3 2
CO2 3 3 3 2 2 1 2 1 1 1 2 2 2 3 3
CO3 3 2 2 2 3 2 2 2 2 2 3 2 3 3 3
CO4 3 3 3 2 3 2 2 1 2 1 1 1 2 2 1
CO5 2 3 3 2 3 3 3 3 3 2 3 3 3 3 2
Course Objectives
This course enables the students:
1. To understand the basic concept of machine learning.
2. To explore the application of machine learning.
3. To understand the concept of supervised learning.
4. To learn the advantage of neural network.
5. To learn the utility of clustering techniques.
Course Outcomes
After the completion of this course, students will be able to:
1. Formulate machine learning problems corresponding to different applications: data,
model selection, model complexity
Syllabus
Module I
Introduction to Machine learning
Machine Learning – what and why? Basics of Linear Algebra and Statistics, Overview of
target function representations; Linear Regression. (8L)
Module II
Supervised Learning
Basics of Feature Selection and Evaluation, Decision Tree, Overfitting and Pruning,
Logistic regression, Support Vector Machine and Kernel; Noise, bias-variance trade-off,
under-fitting and over-fitting concepts. (10L)
Module III
Neural Networks
Perceptions: representational limitation and gradient descent training. Multilayer networks
and back propagation. Hidden layers and constructing intermediate, distributed
representations. Overfitting, learning network structure, recurrent networks.
(8L)
Text book:
1. Mitchell Tom, Machine Learning, Latest Edition, Mc-Graw Hill.(T1)
Reference books:
1. Shalev-Shwartz Shai and Ben-David Shai, Understanding Machine Learning,
Cambridge University Press. 2017.(R1)
2. Bishop Christopher, Pattern Recognition and Machine Learning, Springer,
2006.(R2)
Teacher’s Assessment 5
Indirect Assessment
1. Student Feedback on Faculty
2. Student Feedback on Course
CD2 Assignments
CD7 Simulation
Program
Specific
Course Program Outcomes (POs)
Outcomes
Outcome
(PSOs)
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15
CO1 3 3 1 2 1 1 1 1 1 1 1 2 3 1 1
CO2 3 3 2 2 1 1 1 1 1 1 1 2 3 3 1
CO3 3 3 3 3 3 3 2 2 2 2 2 2 3 3 3
CO4 3 3 3 3 3 2 2 2 2 2 2 2 3 3 2
CO5 2 3 2 3 3 2 1 1 2 2 1 2 3 3 3
Course Objectives:
Course Outcomes:
Syllabus:
1. Implement and demonstrate the FIND-Salgorithm for finding the most specific hypothesis
based on a given set of training data samples. Read the training data from a .CSV file.
2. For a given set of training data examples stored in a .CSV file, implement and demonstrate
the Candidate-Elimination algorithm to output a description of the set of all hypotheses
consistent with the training examples.
Page 199 of 398
3. Write a program to demonstrate the working of the decision tree based ID3 algorithm. Use
an appropriate data set for building the decision tree and apply this knowledge to classify
a new sample.
4. Build an Artificial Neural Network by implementing the Back propagation algorithm and
test the same using appropriate data sets.
5. Write a program to implement the naïve Bayesian classifier for a sample training data set
stored as a .CSV file. Compute the accuracy of the classifier, considering few test data sets.
6. Assuming a set of documents that need to be classified, use the naïve Bayesian Classifier
model to perform this task. Built-in Java classes/API can be used to write the program.
Calculate the accuracy, precision, and recall for your data set.
7. Write a program to construct aBayesian network considering medical data. Use this model
to demonstrate the diagnosis of heart patients using standard Heart Disease Data Set. You
can use Java/Python ML library classes/API.
8. Apply EM algorithm to cluster a set of data stored in a .CSV file. Use the same data set for
clustering using k-Means algorithm. Compare the results of these two algorithms and
comment on the quality of clustering. You can add Java/Python ML library classes/API in
the program.
9. Write a program to implement k-Nearest Neighbor algorithm to classify the iris data set.
Print both correct and wrong predictions. Java/Python ML library classes can be used for
this problem.
10. Implement the non-parametric Locally Weighted Regression algorithm in order to fit data
points. Select appropriate data set for your experiment and draw graphs
Text Books:
Floreano, D. and Mattiussi, C., "Bio-Inspired Artificial Intelligence", MIT Press, 2008.
(T1)
Neumann, F. and Witt, C., “Bioinspired Computation in combinatorial
optimization: Algorithms and their computational complexity”, Springer, 2010. (T2)
Elben, A. E. and Smith, J. E., “Introduction to Evolutionary Computing”, Springer,
2010.(T3)
Goldberg, D. E., “Genetic algorithms in search, optimization, and machine
learning”, Addison- Wesley, 1989.(T4)
Haykin, Simon O., “Neural Networks and Learning Machines”, Third Edition, Prentice
Hall, 2008.(T5)
Reference Books:
Dorigo, M. and Stutzle, T., “Ant Colony Optimization”, A Bradford Book, 2004.(R1)
Ebelhart, R. C. et al., “Swarm Intelligence”, Morgan Kaufmann, 2001.(R2)
Indirect Assessment
1. Student Feedback on Faculty
2. Student Feedback on Course
Program
Course Specific
Program Outcomes (POs)
Outcome Outcomes
(PSOs)
OPEN ELECTIVES-II
Course Objectives
This course enables the students to:
1. To analyze the performance of recursive and nor-recursive algorithms.
2. To understand various algorithm design techniques.
3. To use of different paradigms of problem solving.
4. To find efficient ways to solve a given problem.
5. To compare various algorithms of a given problem.
Course Outcomes
After the completion of this course, students will be able to:
1. Define the concepts and mathematical foundation for analysis of algorithms.
2. Explain different standard algorithm design techniques, namely, divide & conquer,
greedy, dynamic programming, backtracking and branch & bound.
3. Demonstrate standard algorithms for fundamental problems in Computer Science.
4. Design algorithms for a given problem using standard algorithm design techniques.
5. Analyze and compare the efficiency of various algorithms of a given problem.
SYLLABUS
Module I
Algorithms and Complexity
Introduction, Algorithm Complexity and various cases using Insertion Sort, Asymptotic Notations,
Time complexity of Recursive Algorithm, Solving Recurrences using Iterative, Recursion Tree
and Master Theorem. (8L)
Module II
Divide and Conquer
Discussion of basic approach using Binary Search, Merge Sort , Quick Sort , Selection in Expected
linear time, Maximum Subarray , Matrix Multiplication , Introduction of Transform and Conquer
and AVL Tree . (8L)
Module III
Dynamic Programming
Introduction and Approach, Rod Cutting, LCS, Optimal BST, Transitive closure and All-pair
Shortest Path, Travelling Salesperson Problem. (8L)
Module IV
Greedy and other Design Approaches
Introduction to greedy using fractional knapsack, Huffman Code, Minimum Spanning Tree – Prim
and Kruskal, Single Source Shortest Path Dijkstra’s and Bellman-Ford, Introduction to
Module V
NP Completeness and Other Advanced Topics
Non-deterministic algorithms – searching and sorting, Class P and NP, Decision and Optimization
problem, Reduction and NPC and NPH, NP Completeness proof for: SAT, Max-Clique, Vertex
Cover, Introduction to Randomized Algorithms, Introduction to Approximation Algorithms.
(8L)
Text Book:
2. Cormen Thomas H. et al., Introduction to Algorithms. 3rd Edition, PHI Learning, latest
edition.(T1)
Reference Books:
4 Horowitz E., Sahani, Fundamentals of Computer Algorithms, Galgotia Publication Pvt.
Ltd. (R1)
5 Dave and Dave, Design and Analysis of Algorithms, 2nd Edition, Pearson. (R2)
6 Goodrich, Tamassia. Algorithm Design. Wiley. (R3)
POs met through Gaps in the Syllabus: P10 will be met though report-writing/presentation-based
assignment
POs met through Topics beyond syllabus/Advanced topics/Design: Teaching through paper
Teacher’s Assessment 5
Indirect Assessment
1. Student Feedback on Faculty
2. Student Feedback on Course
CD2 Assignments
CD7 Simulation
Program
Course Specific
Program Outcomes (POs)
Outcome Outcomes
(PSOs)
Course Objective
This course enables the students to:
1. To enable the students to understand the tools used in Bioinformatics & how to use
them.
Course Outcomes
Syllabus
Module I
Introduction to Bioinformatics- Historical overview, Bioinformatics Applications, Molecular
Biology and Bioinformatics, Central Dogma of Molecular Biology.
Biological Databases and Information Retrieval- Major Databases in Bioinformatics, Tools for
Web Search, Data Retrieval Tools, Data Mining in Bioinformatics. (8L)
Module II
Genome Analysis and Gene Mapping- Introduction, The Sequence Assembly Problem, Physical
Maps, Cloning, Genome Sequencing, Application of Genetic Maps, Sequence Assembly Tool,
The Human Genome Project. (8L)
Module III
Alignment of Pair of Sequences- Motivation, Methods of Sequence Alignment, Measuring
Sequence Detection Efficiency
Alignment of Multiple Sequences- Methods of Multiple Sequence Alignment, Evaluating
Multiple Alignments, Applications. (8L)
Module IV
Phylogenetic Analysis- Introduction, Terminologies, Tree Topologies, Gene Trees, Methods of
Phylogenetic Analysis, Tree Evaluation, Problems in Phylogenetic Analysis, Tools. (8L)
Module V
Tools for Similarity Search and Sequence Alignment- FASTA, BLAST, Comparison, Other
Programs
Gene Identification and Prediction- Introduction, Basis of Gene Prediction, Pattern Recognition,
Gene Prediction Methods, Other Gene Prediction Tools. (8L)
Text Books:
Rastogi S. C., Namita Mendiratta, Parag Rastogi, “Bioinformatics: Methods and Applications:
Genomics, Proteomics and Drug Discovery”, Fourth Edition, PHI Learning Pvt. Ltd., New
Delhi, 2013.(T1)
An Introduction to Bioinformatics algorithms: Neil C Jones, Pavel A Pevzner, MIT Press,
2004.(T2)
Reference Books:
Bryan Bergeron, “Bioinformatics Computing”, PHI Learning, New
Delhi, 2010.(R1)
Teacher’s Assessment 5
Indirect Assessment
1. Student Feedback on Faculty
2. Student Feedback on Course
CD2 Assignments
CD7 Simulation
Program
Specific
Course Program Outcomes (POs)
Outcomes
Outcome
(PSOs)
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15
CO1 3 3 3 1 3 1 1 1 2 2 2 1
CO2 3 3 3 1 3 1 1 1 2 2 2 1
CO3 3 3 3 3 3 1 1 1 1 1 2 3 2 1
CO4 3 3 3 1 3 1 1 1 1 2 3 2 1
CO5 3 3 3 2 3 1 1 1 1 1 1 2 3 2 1
Course code:IT270
Course title: Introduction to R
Pre-requisite(s): Nil
Co- requisite(s):
Credits: L: 3 T:0 P:0
Class schedule per week: 3
Class: B. Tech
Semester / Level: II
Branch: CSE/IT
Course Objectives
Course Outcomes
After the completion of this course, students will be to do the following:
1. Design programs with Interactive Input and Output, utilizing arithmetic expression,
repetitions and decision making
2. Design programs using the fundamental data structures in R
3. Develop programs in R interfacing files and URLs
4. Solve Mathematical problems using R
5. Design graphs and simulations in R
Syllabus
Module I
Introduction- R reserved words, Variables and Constants, Operators, Operator Precedence
Getting Data In and Out of R –Accessing the Keyboard and Monitor, Reading in Larger
Datasets. (6L)
Module II
Control Statements- if ..else, for loop, while loop, repeat loop, break and next
Data Structures- Vectors, Arrays, Matrices, Lists, Data Frames, Factors, Operations on Dates and
Times. (7L)
Module III
Strings: Overview of String Manipulation Functions
Functions: Function Syntax, Environment and Scope, Recursive Function
Interfaces to the Outside World: File Connections, Reading Lines of a Text File Reading From
a URL Connection. (7L)
Module IV
Maths in R- Math Functions, Functions for Statistical Distributions, Sorting, Linear Algebra
Operations, Set Operations.
Simulation -Generating Random Numbers, Simulating a Linear Model, Random Sampling. (8L)
Module V
Graphics-Creating Graphs, Customising Graphs
Introduction to Object Oriented Features- Concept of Class and Object, S3 Classes, S4 Classes.
(7L)
Text books:
Peng Roger D., R Programming for Data Science.(T1)
Matloff Norman, The Art of R Programming – A Tour of Statistical Software Design. (T2)
Teacher’s Assessment 5
Indirect Assessment
1. Student Feedback on Faculty
2. Student Feedback on Course
CD2 Assignments
CD7 Simulation
Program
Specific
Course Program Outcomes (POs)
Outcomes
Outcome
(PSOs)
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15
CO1 3 3 3 1 3 1 1 1 1 3 2 1
CO2 3 3 3 2 3 1 1 1 1 3 2 1
CO3 3 3 3 2 3 1 1 1 1 1 1 3 2 1
CO4 3 3 3 2 3 1 1 1 1 1 3 2 1
CO5 3 3 3 2 3 1 1 1 1 1 1 3 2 1
Course Outcomes
After the completion of this course, students will be able to do the following:
Syllabus
Module I [6 L]
Problem Analysis-Formal Definition of a Problem, Algorithms, Flowcharts, Examples for
Algorithms and Flowcharts
Introduction to Python- Variables, Operators, Expressions, Evaluation of Expressions, String
Operations, Input and Output functions
Module II [7 L]
Control Statements- Decision making statements, Iterative Statements, Loop Control Statements
Strings and Lists- String Operations, Tuples and Dictionaries-Operations and Examples
Module III [7 L]
Functions- Function Definition and Call, Mathematical functions, User defined Functions,
Parameters and Arguments, Type Conversion and Coercion
Module IV [8 L]
Files – Different File Operations, File Object Attributes, Directories
Exceptions- Except clause, Exception with arguments, Raising an Exception, User Defined
Exceptions
Module V [7 L]
Introduction to Classes and Objects- Object Oriented Features, Attributes, Instances, Garbage
Collection
Reference books:
1. Jose Jeeva, Taming Python by Programming, Khanna Publishing House.
2. Jose J. Introduction to Computing and Problem Solving with Python, (ISBN: 978-93-82609-
810).
Teacher’s Assessment 5
Indirect Assessment
1. Student Feedback on Faculty
2. Student Feedback on Course
CD2 Assignments
CD7 Simulation
Program
Specific
Course Program Outcomes (POs)
Outcomes
Outcome
(PSOs)
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15
CO1 3 3 3 1 3 1 1 1 1 2 2 1
CO2 3 3 3 1 3 1 1 1 1 2 2 1
CO3 3 3 3 1 3 1 1 1 1 1 1 2 2 1
CO4 3 3 3 1 3 1 1 1 1 1 2 2 1
CO5 3 3 3 1 3 1 1 1 1 1 1 2 2 1
Course Objectives
This course enables the students:
1. To understand the necessity of cyber laws.
2. To explore the Constitutional & Human Rights Issues in Cyberspace
3. To understand the criteria for Cyber Stalking/Harassment
4. To understand the different aspects of cyber crimes
Course Outcomes
After the completion of this course, students will be able to:
1. Construct a strategy to Safeguard the society from cybercrime.
2. Organize the evidence in terms of court terminology.
3. Define the legal issues and its applications.
4. Apply Computer forensics and digital detective and various processes, policies and
procedures.
5. Compose the techniques to produce data from computer and hand held devices.
Syllabus
Module I
Introduction
Computers and its Impact in Society, Overview of Computer and Web Technology, Need for
Cyber Law, Cyber Jurisprudence at International and Indian Level.
Cyber Law - International Perspectives
UN & International Telecommunication Union (ITU) Initiatives, Council of Europe - Budapest
Convention on Cybercrime, Asia-Pacific Economic Cooperation (APEC), Organization for
Economic Co-operation and Development (OECD), World Bank, Commonwealth of Nations,
Indian Context of Jurisdiction and IT Act, 2000, International Law and Jurisdictional Issues in
Cyberspace. (8L)
Module II
Constitutional & Human Rights Issues in Cyberspace
Freedom of Speech and Expression in Cyberspace, Right to Access Cyberspace – Access to
Internet, Right to Privacy, Right to Data Protection
Cyber Crimes & Legal Framework
Cyber Crimes against Individuals, Institution and State, Hacking, Digital Forgery, Cyber
Stalking/Harassment, Cyber Pornography, Identity Theft & Fraud, Cyber terrorism, Cyber
Defamation, Different offences under Indian IT Act, 2000. (8L)
Module III
Cyber Torts
Cyber Defamation, Different Types of Civil Wrongs under the IT Act, 2000
Intellectual Property Issues in Cyber Space
Module IV
Introduction to Cybercrime, Classifications of Cyber Crimes, Local and Global perspectives on
Cybercrime, Cyber offences, Cyberstalking, Cybercrime and cloud computing, cybercrimes
through hand held devices., Tools and Methods used in Cybercrime, phishing, steganography,
attacks on wireless network. (8L)
Module V
Understanding Digital forensic, Forensics science, computer forensics, and digital
forensics. Criminalistics, Analysis of cyber-criminalistics area, Holistic approach to cyber-
forensics, Computer forensic tools, Forensics of Hand held devices, tools for hand held device
forensics., intellectual property in the cyberspace, The ethical dimension of Cybercrimes. (8L)
Text Books:
1. Reed Chris & Angel John, Computer Law, OUP, New York, 2007. (T1)
2. Singh Justice Yatindra, Cyber Laws, Universal Law Publishing Co, New Delhi,
2012. (T2)
3. Verma S, K, Mittal Raman, Legal Dimensions of Cyber Space, Indian Law
Institute, New Delhi, 2004. (T3)
4. JonthanRosenoer, Cyber Law, Springer, New York, 1997. (T4)
5. Naib Sudhir, The Information Technology Act, 2005: A Handbook, OUP, New
York, 2011.(T5)
6. Godbole Nina, BelapureSunit, Cyber Security, Wiley Indian Print, 2014.(T6)
7. Sammons John, The Basics of Digital Forensics, Elsevier.(T7)
8. Hyaes D.R., A Practical Guide to Computer Forensics Investigations , Person IT
education 2014.(T8)
Reference Books:
1. Bhansali S. R., Information Technology Act, 2000, University Book House Pvt.
Ltd.,Jaipur, 2003. (R1)
2. Deva Vasu, Cyber Crimes and Law Enforcement, Commonwealth Publishers, New Delhi,
2003. (R2)
3. Nelson Bil, Philips A, Stuarts Christopher, Guide to Computer Forensics and
Investigations: Processing Digital evidence , Cengage Learning, 5th Edition 2015.(R3)
Teacher’s Assessment 5
Indirect Assessment
1. Student Feedback on Faculty
2. Student Feedback on Course
CD2 Assignments
CD7 Simulation
Program
Specific
Course Program Outcomes (POs)
Outcomes
Outcome
(PSOs)
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15
CO1 3 3 3 3 2 2 2 2 2 2 2 1
CO2 3 3 3 3 2 2 2 2 2 2 2 1
CO3 3 3 3 3 2 1 2 2 1 1 2 2 2 1
CO4 3 3 3 3 3 1 2 2 1 1 2 2 2 1
Page 218 of 398
CO5 3 3 3 3 3 1 2 2 1 1 1 2 2 2 1
(SEMESTER VI-LABORATORIES)
Course Objectives
This course enables the students:
1. To understand the basic component of Natural Language Processing.
2. To explore the application areas of Natural Language Processing.
3. To understand the idea of Language Modelling.
4. To explore the basic concepts of Parts-of-speech Tagging.
5. To understand the concepts of language modelling.
Course Outcomes
After the completion of this course, students will be able to:
Syllabus
List of Programs as Assignments:
Text books
lex&yacc (2nd ed.) :O'Reilly & Associates, Inc. Sebastopol, CA, USA ©1992 . (T1)
Reference books
Lex &Yacc:O'Reilly & Associates, Inc. Sebastopol, CA, USA ©1992. (R1)
Course Evaluation:
Day to day progressive evaluation, Lab Quizzes, Surprise Tests, Online Lab performance and
Viva Voce
Indirect Assessment
1. Student Feedback on Faculty
2. Student Feedback on Course
CO1 CD2,CD3
CO5 CD1,CD2,CD4
Course Objectives
This course enables the students:
1. To introduce Android platform and its Architecture.
2. To learn activity creation and Android UI designing.
3. To be familiarized with Intent, Broadcast receivers and Internet services.
4. To integrate multimedia, camera and Location based services in Android Application.
5. To explore Mobile security issues.
Course Outcomes
After the completion of this course, students will be able to:
1. Describe Android platform, Architecture and features.
2. Design User Interface and develop activity for Android App.
3. Design and implement Database Application and Content providers.
4. Use multimedia, camera and Location based services in Android App.
5. Discuss various security issues in Android platform.
Syllabus
Text books:
Reference books:
4. Introduction to Statistical Learning, Gareth James, Daniela Witten, Trevor Hastie, Robert
Tibshirani, Springer, 2013.
5. Pattern Classification, 2nd Ed., Richard Duda, Peter Hart, David Stork, John Wiley & Sons,
2001.
Indirect Assessment
1. Student Feedback on Faculty
2. Student Feedback on Course
Program
Specific
Course Program Outcomes (POs)
Outcomes
Outcome
(PSOs)
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15
CO1 3 2 3 3 2 3 1 2 1 2 1 1 2 1 2
CO2 3 2 3 3 2 1 2 3 2 1 3 2 2 3 2
CO3 3 3 1 3 2 1 3 3 3 2 1 2 3 2 2
CO4 2 3 3 2 2 2 2 2 2 2 2 1 3 2 2
CO5 3 3 3 1 2 3 1 1 2 3 2 2 3 2 3
Course Outcomes
After the completion of this course, students will be:
1. Understand the importance of Intellectual property, their implications and their types.
2. Identify the process for registration and use of copyrights and patents and the rights involved
with them.
3. Discover the functioning of trademarks and domain names, the rights of the holders and
process of dispute resolution.
4. Assess the importance and procedure for registration of Designs and Geographical
Indications, the rights of the owner and arbitration process.
5. Develop an understanding of the Cyber Laws, trends in Cyber crimes and procedures to tackle
them.
Syllabus
Module I
Introduction to Intellectual Property, Justifications for protection of IP, Major forms of IP-
Copyright; Patent; Trade Marks; Designs; Geographic indication; Semi conductors; Plant
varieties, Berne Convention, Paris Convention, TRIPS
Module II
Page 226 of 398
Copyrights- Historical development of copyright, Original literary, dramatic, musical, artistic
works, Cinematograph films, Sound recordings, Ownership of copyright, Term of copyright,
Infringement of copyright, Exceptions of infringement, Remedies, Registration
Patents- Historical development of patents, Criteria for obtaining patents, Non patentable
inventions, Procedure for registration, Term of patent, Rights of patentee, Revocation,
Infringement of patents, Remedies
Module III
Trade Marks and Domain Names - Historical development of trademarks, Functions of marks,
Concept of distinctiveness, Absolute grounds of refusal, Procedure for registration, Term of mark,
Rights of holder, Assignment and licensing of marks, Infringement, Passing Off, Domain Name
Protection, Domain Name Disputes, Cyber squatting, Arbitration
Module IV
Designs- meaning and evolution of design protection, Registration, Term of protection, Rights of
holder, unregistered designs.
Geographical Indications- meaning and its evolution, Difference between GI and Trade Marks,
Registration, Rights, Authorised user
Module V
Cyber Law- Need for Cyber Law, Cyber Jurisprudence at International and Indian Level, Cyber
Crime and IT Act 2000, Nature of cyber criminality, Strategies to tackle cyber crime and Trends,
Defamation, Harassment and Email abuse, Law of Digital Contracts, The System of Digital
Signatures
Text books:
1. Deborah E. Bouchoux, Intellectual Property: The Law of Trademarks, Copyrights, Patents,
and Trade Secrets, Delmar Cengage Learning, 4th Edition, 2013.
2. Vivek Sood, Cyber Law Simplified, Tata McGraw-Hill Publishing, Fourth Reprint, 2008.
Reference books:
1. Miller and Davis' Intellectual Property, Patents, Trademarks, and Copyright in a nutshell,
West Publishing, 5th edition, 2012.
2. William Rodolph Cornish, David Llewelyn, Tanya Frances Aplin, Intellectual
Property: Patents, Copyright, Trade Marks and Allied Rights, Sweet & Maxwell, 7th
Edition, 2010.
3. Henri J. A. Charmasson, John Buchaca, Patents, Copyrights and Trademarks For
Dummies, Wiley, 2nd Edition, 2008.
Teacher’s Assessment 5
Indirect Assessment
1. Student Feedback on Faculty
2. Student Feedback on Course
Course Delivery Methods
CD1 Lecture by use of boards/LCD projectors/OHP projectors
CD2 Assignments
CD7 Simulation
2. An ability to design and conduct experiments and to analyze and interpret data related
to software and hardware design solutions.
Course Outcomes
After the completion of this course, students will be to:
2. Apply different search techniques for solving real world problems and select the most
appropriate solution by comparative evaluation.
5. Explain various types of LISP and PROLOG programs and explore more
sophisticated LISP and PROLOG code.
Syllabus
Module I
Introduction: Overview of Artificial Intelligence- Problems of AI, AI Technique, Tic - Tac - Toe
Problem.
Intelligent Agents: Agents & Environment, Nature Of Environment, Structure Of Agents, Goal
Based Agents, Utility Based Agents, Learning Agents.
Problem Solving: Problems, Problem Space & Search: Defining The Problem As State Space
Search, Production System, Problem Characteristics, Issues In The Design Of Search Programs.
(9L)
Module II
Search Techniques: Solving Problems By Searching, Problem Solving Agents, Searching For
Solutions; Uniform Search Strategies: Breadth First Search, Depth First Search, Depth Limited
Search, Bi-directional Search, Comparing Uniform Search Strategies.
Heuristic Search Strategies: Greedy Best-First Search, A* Search, Memory Bounded Heuristic
Search: Local Search Algorithms & Optimization Problems: Hill Climbing Search, Simulated
Annealing Search, Local Beam Search, Genetic Algorithms; Constraint Satisfaction Problems,
Local Search For Constraint Satisfaction Problems.
Adversarial Search: Games, Optimal Decisions & Strategies in Games, The Mini Max Search
Procedure, Alpha-Beta Pruning, Additional Refinements, Iterative Deepening. (9L)
Module III
Knowledge & Reasoning: Knowledge Representation Issues, Representation & Mapping,
Approaches to Knowledge Representation, Issues in Knowledge Representation.
Using Predicate Logic: Representing Simple Fact in Logic, Representing Instant & ISA
Relationship, Computable Functions & Predicates, Resolution, and Natural Deduction.
Representing Knowledge Using Rules: Procedural Verses Declarative Knowledge, Logic
Programming, Forward Verses Backward Reasoning, Matching, Control Knowledge. (7L)
Module IV
Probabilistic Reasoning: Representing Knowledge in an Uncertain Domain, Bayesian Networks,
Dempster-Shafer Theory.
Planning: Overview, Components of A Planning System, Goal Stack Planning, Hierarchical
Planning.
Module V
Natural Language Processing: Brief introduction to Syntactic Processing, Semantic Analysis,
Discourse & Pragmatic Processing.
Robotics: Introduction, Robot hardware, robotic perception, planning to move, planning uncertain
movements, robotic software architecture, application domains. (6L)
Text Books:
Russel S. and Norvig P., Artificial Intelligence a Modern Approach, 3rd edition, Pearson
Education.(T1)
Rich E. & Knight K., Artificial Intelligence, 3rd edition, TMH, New Delhi.(T2)
Reference books:
Patterson Dan W., Introduction to Artificial Intelligence and Expert Systems, PHI, New
Delhi, 2006.(R1)
Rolston D.W., Principles of AI & Expert System Development, TMH, New Delhi.(R2)
Teacher’s Assessment 5
Indirect Assessment
1. Student Feedback on Faculty
2. Student Feedback on Course
Course Delivery Methods
CD1 Lecture by use of boards/LCD projectors/OHP projectors
CD2 Assignments
CD7 Simulation
Program
Specific
Course Program Outcomes (POs)
Outcomes
Outcome
(PSOs)
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15
CO1 3 2 2 2 3 2 1 1 1 2 1 3 2 3 2
CO2 3 2 2 3 3 2 1 1 3 3 2 3 2 2 1
CO3 3 2 2 2 3 2 2 2 3 3 1 3 2 3 2
CO4 2 3 2 2 2 3 2 1 3 3 1 3 2 2 3
CO5 3 3 2 3 2 3 2 2 2 1 2 2 2 2 3
Course Objectives
This course enables the students to:
Course Outcomes
After the completion of this course, students will be able to:
CO2 Create knowledge base and serve their applications in different fields.
SYLLABUS
PUZZLE SOLVING:
12. Lab Assignment No: 1
Objective: To understand and solve simple AI problems.
To solve Tic-Tac-Toe problem such that computer always win.
(Min-Max Search)
13. Lab Assignment No: 2
Objective: To understand and solve simple AI problems.
Page 233 of 398
To solve Monkey-Banana Problem
OTHER PROBLEMS:
21. Lab Assignment No: 10
Objective: To implement real world Games.
Chess Playing (Computer vs Human)
22. Lab Assignment No: 11
Objective: To implement real-world Games.
Sudoku Puzzle
Books recommended:
TEXT BOOKS
2. Prolog Programming by Bratko, PHI publishing.
3. Dan W. Patterson - Introduction to Artificial Intelligence and Expert Systems, PHI, New Delhi,
2006.
Teacher’s Assessment 5
Indirect Assessment
1. Student Feedback on Faculty
2. Student Feedback on Course
CD2 Assignments
CD7 Simulation
Program
Specific
Course Program Outcomes (POs)
Outcomes
Outcome
(PSOs)
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15
CO1 3 2 2 2 3 2 1 1 1 2 1 3 2 3 2
CO2 3 2 2 3 3 2 1 1 3 3 2 3 2 2 1
CO3 3 2 2 2 3 2 2 2 3 3 1 3 2 3 2
CO4 2 3 2 2 2 3 2 1 3 3 1 3 2 2 3
CO5 3 3 2 3 2 3 2 2 2 1 2 2 2 2 3
Course Objectives
This course enables the students:
1. Understand the basic concept and the Iot Paradigm
2. Know the state of art architecture for IoT applications
3. Learn the available protocols used for IoT
4. Design basic IoT Applications.
5. Evaluate optimal IoT applications.
Course Outcomes
After the completion of this course, students will be:
1. Identify the IoT Components and its capabilities
2. Explain the architectural view of IoT under real world constraints
3. Analyse the different Network and link layer protocols
4. Evaluate and choose among the transport layer protocols
5. Design an IoT application
Module IV
M2M and IoT Technology Fundamentals
Devices and gateways, Local and wide area networking, Data management, Business processes
in IoT, Everything as a Service (XaaS), M2M and IoT Analytics, Knowledge Management. (8L)
Module V
The data processing for IoT
Organization of data processing for the Internet of things. Cloud computing. Fog computing.
Application case studies: Smart Grid. Home Automation. Smart City. (8L)
Text books:
Madisetti Vijay and BahgaArshdeep, Internet of Things (A Hands-on-Approach), 1st
Edition, VPT, 2014.(T1)
Raj Pethuru and Raman Anupama C., The Internet of Things: Enabling Technologies,
Platforms, and Use Cases, CRC Press.(T2)
Reference books:
Vermesan Dr. Ovidiu, Friess Dr. Peter, Internet of Things: Converging Technologies for
Smart Environments and Integrated Ecosystems, River Publishers.(R1)
Holler Jan, TsiatsisVlasios, Mulligan Catherine, Avesand Stefan, Karnouskos Stamatis,
Boyle David, From Machine-to-Machine to the Internet of Things: Introduction to a New
Age of Intelligence, 1st Edition, Academic Press, 2014.(R2)
Teacher’s Assessment 5
Indirect Assessment
1. Student Feedback on Faculty
2. Student Feedback on Course
CD2 Assignments
CD7 Simulation
Course Objectives
This course enables the students:
1. Understand the basic concept and the Iot Paradigm
2. Know the state of art architecture for IoT applications
3. Learn the available protocols used for IoT
4. Design basic IoT Applications.
5. Evaluate optimal IoT applications.
Course Outcomes
After the completion of this course, students will be:
1. Identify the IoT Components and its capabilities
Text books:
Reference books:
Vermesan Dr. Ovidiu, Friess Dr. Peter, Internet of Things: Converging Technologies for
Smart Environments and Integrated Ecosystems, River Publishers.(R1)
Holler Jan, TsiatsisVlasios, Mulligan Catherine, Avesand Stefan, Karnouskos Stamatis,
Boyle David, From Machine-to-Machine to the Internet of Things: Introduction to a New
Age of Intelligence, 1st Edition, Academic Press, 2014.(R2)
Teacher’s Assessment 5
Indirect Assessment
1. Student Feedback on Faculty
2. Student Feedback on Course
CD2 Assignments
CD7 Simulation
Program
Specific
Course Program Outcomes (POs)
Outcomes
Outcome
(PSOs)
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15
CO1 2 3 3 2 3 1 2 1 2 1 1 2 2 2 2
CO2 2 3 3 3 2 2 1 1 1 1 1 2 2 3 2
CO3 2 3 2 2 2 1 1 1 1 1 1 2 3 2 2
CO4 2 2 2 3 2 2 1 1 1 1 1 3 2 2 2
CO5 2 3 3 3 2 1 1 2 1 1 1 3 3 2 2
Course Objectives
This course enables the students:
1. Understand the basic concept of Digital Image Processing
2. To Learn the Fourier Transform& its application
3. Understand the basic components of filters
4. Understand the basic concept of Image Compression Fundamentals
5. Understand the basic concept of Image Segmentation.
Course Outcomes
Page 242 of 398
After the completion of this course, students will be:
1. Understand the concept of image formation, digitization, and role human visual system
plays in perception of image data and spatial filtering techniques for enhancing the
appearance of an image.
2. Acquire an appreciation for various frequency based filtering techniques for enhancing
the appearance of an image, duly applying them in different applications.
3. Discern the difference between noise models, gain an insight into assessing the
degradation function and realize different spatial and frequency based filtering
techniques for reduction and removal of noise.
5. Design and create practical solutions using morphological and image segmentation
operators for common image processing problems and assess the results.
Syllabus
Module I [8 L]
Introduction to Digital Image Processing, Elements of Visual Perception, Image Sensing &
Acquisition, Sampling and Quantization, Basic Relationships between Pixels, Intensity
Transformations, Histogram Processing, Spatial Convolution & Correlation, Smoothing Spatial
Filters, Sharpening Spatial Filters.
Module II 8 L]
Introduction to the Fourier Transform, Discrete Fourier Transform, Properties of the Two-
Dimensional Fourier Transform, Image Smoothing using Frequency Domain filters, Image
Sharpening using Frequency Domain filters, Selective Filtering, Basics of Fast Fourier Transform,
Basics of: Walsh- Hadamard Transform; K-L Transform; Discrete Cosine Transform.
Module III [8 L]
Model of Image Degradation/Restoration Process, Noise Probability Density Functions,
Restoration in presence of Noise only, Periodic Noise Reduction using Frequency Domain
filtering, Circulant Matrices, Block Circulant Matrices, Unconstrained Restoration, Constrained
Restoration, Basics of Inverse Filtering
Module IV [8 L]
Image Compression Fundamentals – Coding Redundancy, Interpixel Redundancy, Psychovisual
Redundancy, Fidelity Criteria, Image Compression Models– Source Encoder and Decoder,
Channel Encoder and Decoder, Elements of Information Theory, Error-Free Compression –
Variable-Length Coding, Bit-Plane Coding, Lossless Predictive Coding. Lossy Compression –
Lossy Predictive Coding, Transform Coding.Color Fundamentals, Color Models, Basics of Full
Color Image Processing
Module V [8 L]
Morphological Image Processing-Preliminaries, Dilation and Erosion, Opening and Closing, Hit-
or-Miss Transformation, Boundary Extraction, Hole Filling, Connected Components, Convex
Hull, Thinning, Thickening, Skeletons, Pruning
Image Segmentation- Fundamentals,Point, Line and Edge Detection, Thresholding, Region Based
Segmentation, Segmentation based on color.
Reference books:
1. W.K.Pratt-Digital Image Processing, 4/e, John Wiley & sons, Inc. 2006.
2. M. Sonka et al. Image Processing, Analysis and Machine Vision, 2/e, Thomson, Learning,
India Edition, 2007.
3. Jayaraman, Digital Image Processing, Tata McGraw-Hill Education, 2011
ii.
Teacher’s Assessment 5
Indirect Assessment
1. Student Feedback on Faculty
2. Student Feedback on Course
CD2 Assignments
CD7 Simulation
Indirect Assessment
1. Student Feedback on Faculty
2. Student Feedback on Course
Program
Course Specific
Program Outcomes (POs)
Outcomes
Outcome (PSOs)
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15
CO1 3 3 3 2 2 1 2 3 3 2
CO2 3 3 3 2 2 1 1 2 3 3 2
CO3 3 3 3 3 2 1 1 2 3 3 2
CO4 3 3 3 3 2 1 1 2 3 3 2
CO5 3 3 3 3 3 2 1 1 1 1 2 3 3 2
Course Objectives
This course enables the students:
1. Understand the basic concept of Digital Image Processing
2. To Learn the Fourier Transform& its application
3. Understand the basic components of filters
4. Understand the basic concept of Image Compression Fundamentals
5. Understand the basic concept of Image Segmentation.
Course Outcomes
After the completion of this course, students will be:
1. Understand the concept of image formation, digitization, and role human visual system
plays in perception of image data and spatial filtering techniques for enhancing the
appearance of an image.
2. Acquire an appreciation for various frequency based filtering techniques for enhancing
the appearance of an image, duly applying them in different applications.
3. Discern the difference between noise models, gain an insight into assessing the
degradation function and realize different spatial and frequency based filtering
techniques for reduction and removal of noise.
5. Design and create practical solutions using morphological and image segmentation
operators for common image processing problems and assess the results.
Text books:
2. Rafael. C. Gonzalez & Richard E. Woods- Digital Image Processing, 3/e Pearson
Education, New Delhi - 2009
Reference books:
1. W.K.Pratt-Digital Image Processing, 4/e, John Wiley & sons, Inc. 2006.
2. M. Sonka et al. Image Processing, Analysis and Machine Vision, 2/e, Thomson, Learning,
India Edition, 2007.
3. Jayaraman, Digital Image Processing, Tata McGraw-Hill Education, 2011
Indirect Assessment
1. Student Feedback on Faculty
2. Student Feedback on Course
Program
Course Specific
Program Outcomes (POs)
Outcomes
Outcome (PSOs)
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15
CO1 3 3 3 2 2 2 2 1 2 2 3 3 2
CO2 3 3 3 2 2 1 2 1 2 2 3 3 2
CO3 3 3 3 3 2 1 2 1 2 2 3 3 2
CO4 3 3 3 3 2 1 2 1 2 2 3 3 2
CO5 3 3 3 3 3 2 1 1 2 1 2 2 3 3 2
Course Objectives
This course enables the students:
1. To provide an overview of approaches facilitating data analytics on huge datasets in
different domain.
3. To provide an overview of Apache Hadoop and HDFS Concepts and Interfacing with
HDFS
5. To provide the knowledge of various Hadoop based tool for processing large datasets.
Course Outcomes
After the completion of this course, students will be able to:
1. Describe big data and use cases from selected business domains
5. Use Hadoop related tools such as HBase, Cassandra, Pig, and Hive for big data
analytics
Syllabus
Module I
Introduction
What is big data, why big data, convergence of key trends, unstructured data, industry examples
of big data, web analytics, big data and marketing, fraud and big data, risk and big data, credit risk
management, big data and algorithmic trading, big data and healthcare, big data in medicine,
advertising and big data, big data technologies, introduction to Hadoop, open source technologies,
cloud and big data, mobile business intelligence, Crowd sourcing analytics, inter and trans firewall
analytics. (8L)
Module II
Introduction to NoSQL, aggregate data models, aggregates, key-value and document data models,
relationships, graph databases, schemaless databases, materialized views, distribution models,
sharding, master-slave replication, peer peer replication, sharding and replication, consistency,
relaxing consistency, version stamps, map-reduce, partitioning and combining, composing map-
reduce calculations. (8L)
Module III
Data format, analyzing data with Hadoop, scaling out, Hadoop streaming, Hadoop pipes, design
of Hadoop distributed file system (HDFS), HDFS concepts, Java interface, data flow, Hadoop I/O,
data integrity, compression, serialization, Avro, file-based data structures. (8L)
Module IV
MapReduce workflows, unit tests with MRUnit, test data and local tests, anatomy of MapReduce
job run, classic Map-reduce, YARN, failures in classic Map-reduce and YARN, job scheduling,
shuffle and sort, task execution, MapReduce types, input formats, output formats. (8L)
Module V
Hbase, data model and implementations, Hbase clients, Hbase examples, praxis.Cassandra,
Cassandra data model, Cassandra examples, Cassandra clients, Hadoop integration, Pig, Grunt,
pig data model, Pig Latin, developing and testing Pig Latin scripts. Hive, data types and file
formats, HiveQL data definition, HiveQL data manipulation, HiveQL queries. (8L)
Text Books:
Teacher’s Assessment 5
Indirect Assessment
1. Student Feedback on Faculty
Page 251 of 398
2. Student Feedback on Course
CD2 Assignments
CD7 Simulation
Program
Specific
Course Program Outcomes (POs)
Outcomes
Outcome
(PSOs)
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15
CO1 3 2 2 1 1 1 1 1 1 1 1 2 3 1 1
CO2 2 2 2 2 3 1 1 1 2 2 2 2 2 2 3
CO3 2 2 2 1 3 2 2 2 3 2 1 2 3 2 3
CO4 3 2 3 2 3 2 2 2 2 2 2 2 3 3 3
CO5 3 3 3 3 3 2 2 2 2 2 3 3 3 2 3
Course Objectives
This course enables the students to:
1. To implement MapReduce programs for processing big data
Course Outcomes
After the completion of this course, students will be able to:
CO1 Process big data using Hadoop framework
SYLLABUS
Books recommended:
TEXT BOOKS
VigneshPrajapati, “Big Data Analytics with R and Hadoop”, Packet Publishing
REFERENCE BOOKS
1. Tom White, “Hadoop: The Definitive Guide”, Second Edition, O’Reilly Yahoo Press
2. Robert D. Schneider, “Hadoop for Dummies”, Wiley.
Course Evaluation:
Day to day progressive evaluation, Lab Quizzes, Surprise Tests, Online Lab performance and
Viva Voce
Gaps in the syllabus (to meet Industry/Profession requirements):
Implementing of real world problems
POs met through Gaps in the Syllabus: PO5&6
Page 254 of 398
Topics beyond syllabus/Advanced topics/Design:
POs met through Topics beyond syllabus/Advanced topics/Design: Teaching through research
papers.
Program
Specific
Course Program Outcomes (POs)
Outcomes
Outcome
(PSOs)
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15
CO1 3 2 2 1 1 1 1 1 1 1 1 2 3 1 1
CO2 2 2 2 2 3 1 1 1 2 2 2 2 2 2 3
CO3 2 2 2 1 3 2 2 2 3 2 1 2 3 2 3
CO4 3 2 3 2 3 2 2 2 2 2 2 2 3 3 3
CO5 3 3 3 3 3 2 2 2 2 2 3 3 3 2 3
Course Objectives
This course enables the students:
1. Examine the types of the data to be mined and apply pre-processing methods on raw
data.
2. To introduce the basic concepts of Data Warehouse and Data Mining techniques
4. Prepare students for research in the area of data mining and related applications and
Enhance students communication and problem solving skills
5. Provide the students with practice on applying data mining solutions using common
Course Outcomes
After the completion of this course, students will be able to:
1. Illustrate the fundamentals of data mining systems as well as issues related to access
and retrieval of data at scale.
2. Explain the various data mining functionalities and data warehousing techniques.
3. Apply the various data mining techniques to solve classification, clustering and
association rule mining problems.
5. Design and evaluate data mining models to be used in solving real life problems,
keeping in view social impacts of data mining.
Syllabus
Module I
Data Mining: Introduction, Relational Databases, Data Warehouses, Transactional databases,
Advanced database Systems and Application, Data Mining Functionalities, Classification of Data
Mining Systems, Major Issues in Data Mining.
Data Processing: Data Cleaning, Data Integration and Transformation, Data Reduction, Data
Discretization and Concept Hierarchy Generation. (6L)
ModuleII
Data Warehouse: Introduction, A Multidimensional data Model, Data Warehouse Architecture,
Data Warehouse Implementation, Data Cube Technology, From Data Warehousing to Data
Mining.Data Cube Computation and Data Generalization. (8L)
Module IV
Classification and Prediction: Classification & Prediction, Issues Regarding Classification &
Prediction, Classification by decision Tree Induction, Bayesian Classification, Classification by
Back propagation, Classification based on concepts & Association Rule Analysis, Other
Classification Methods, Prediction, Classification Accuracy. (8L)
Module V
Cluster Analysis: Introduction , Types of Data in Cluster Analysis, A Categorization of Major
Clustering Methods, Partitioning Method - k- Medoids Algorithm, CLARANS, Hierarchical
Methods - BIRCH, ROCK Density-Based Methods - DBSCAN, Grid-Based Methods – STING,
WaveCluster. Outlier Analysis. (8L)
Text book:
Han Jiawei &Kamber Micheline - Data Mining Concepts & Techniques, 2nd Edition,
Publisher Harcout India. Private Limited.(T1)
Reference books:
Gupta G.K., Introduction to Data Mining with case Studies, PHI, New Delhi, 2006.(R1)
Berson A. & Smith S. J., Data Warehousing Data Mining, COLAP, TMH, New Delhi,
2004.(R2)
Dunham H.M. & Sridhar S., Data Mining, Pearson Education, New Delhi, 2006.(R3)
Teacher’s Assessment 5
Indirect Assessment
1. Student Feedback on Faculty
2. Student Feedback on Course
CD2 Assignments
CD7 Simulation
Program
Specific
Course Program Outcomes (POs)
Outcomes
Outcome
(PSOs)
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15
CO1 3 3 2 3 2 2 2 1 2 2 1 1 3 3 1
CO2 2 3 2 3 2 2 1 2 2 2 2 1 2 2 2
Page 258 of 398
CO3 2 3 3 3 3 3 3 2 3 2 3 1 2 2 3
CO4 3 2 2 3 3 2 2 1 3 2 2 2 3 3 2
CO5 3 3 3 3 2 2 2 1 3 3 3 2 3 3 3
Course Objectives
This course enables the students to:
1. Explain about the necessity of preprocessing and its procedure.
Course Outcomes
After the completion of this course, students will be able to:
CO1 Understand Data Warehousing and Data Mining and its applications and
challenges and Create mini data warehouse.
SYLLABUS
Books recommended:
1. Jiawei Han & Micheline Kamber - Data Mining Concepts & Techniques Publisher Harcout India.
Private Limited.
Reference Books :
1. G.K. Gupta – Introduction to Data Mining with case Studies, PHI, New Delhi – 2006.
2. A. Berson& S.J. Smith – Data Warehousing Data Mining, COLAP, TMH, New Delhi – 2004.
3. H.M. Dunham & S. Sridhar – Data Mining, Pearson Education, New Delhi, 2006.
Course Evaluation:
Day to day progressive evaluation, Lab Quizzes, Surprise Tests, Online Lab performance and
Viva Voce
Gaps in the syllabus (to meet Industry/Profession requirements):
Implementing of real world problems
POs met through Gaps in the Syllabus: PO5&6
POs met through Topics beyond syllabus/Advanced topics/Design: Teaching through research
papers.
Indirect Assessment
1. Student Feedback on Faculty
2. Student Feedback on Course
Program
Specific
Course Program Outcomes (POs)
Outcomes
Outcome
(PSOs)
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15
CO1 3 3 2 3 2 2 2 1 2 3 3 3 3 3 1
CO2 2 3 2 3 2 2 1 2 2 3 3 3 2 2 2
CO3 2 3 3 3 3 3 3 2 3 3 3 3 2 2 3
CO4 3 2 2 3 3 2 2 1 3 3 3 3 3 3 2
CO5 3 3 3 3 2 2 2 1 3 3 3 3 3 3 3
PROGRAM ELECTIVES-IV
Course Objectives
This course enables the students to:
Course Outcomes
After the completion of this course, students will be able to:
1. Explain the working of a search engine and details of the individual components.
5. Evaluate and analyse the performance of a retrieval systems using a suitable test
collection
Syllabus
Module I
Introduction
Introduction; Search Engine Architecture; An overview of crawling, text transformation, index
creation, user interaction, ranking, link analysis, evaluation and deep web. (8L)
Module II
Pre-processing and Indexing
Pre-processing: tokenization, stop word, normalization, stemming, wildcard queries, spelling
correction – edit distance and k-gram; Indexing: Index construction; Index compression. (12L)
Module III
Scoring
Parametric and zone indexes; term frequency and weighting; vector space model; efficient
scoring and ranking; vector space scoring. (8L)
Module IV
IR Evaluation
Evaluation; Standard test collection; Evaluation of unranked and ranked retrieval; Assessing
relevance; System quality and user utility. (6L)
Module V
Relevance Feedback and Query Expansion
Relevance feedback and pseudo relevance feedback; query reformulation. (6L)
Text book:
Manning, Christopher D., Raghavan Prabhakar, and SchützeHinrich, “Introduction to
Information Retrieval”, Cambridge: Cambridge University Press, 2008.(T1)
Reference books:
Grossman David A., Frieder Ophir “Information Retrieval: Algorithms and Heuristics”,
Springer.(R1)
Croft Bruce, Metzler Donald, and Strohman Trevor “Search Engines: Information
Retrieval in Practice”, Pearson Education, 2009.(R2)
Ricardo Baeza-Yates and Neto Berthier Ribeiro “Modern Information Retrieval”, 2nd
Edition, Addison-Wesley, 2011.(R3)
Teacher’s Assessment 5
Indirect Assessment
1. Student Feedback on Faculty
2. Student Feedback on Course
CD2 Assignments
CD7 Simulation
Course Program
Program Outcomes (POs)
Outcome Specific
Page 265 of 398
Outcomes
(PSOs)
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15
CO1 2 3 3 3 2 2 1 1 2 2 1 1 3 3 2
CO2 3 3 2 3 3 2 2 1 3 2 1 1 2 3 3
CO3 3 3 3 3 3 2 2 2 2 2 2 2 2 2 3
CO4 3 3 3 2 2 3 3 1 2 2 2 2 3 3 2
CO5 2 3 3 3 3 3 2 1 2 2 2 1 2 2 2
Course Objectives
This course enables the students to:
Course Outcomes
After the completion of this course, students will be able to:
1. Explain the working of a search engine and details of the individual components.
3. Implement various indexing, scoring, ranking and relevance feedback models and
techniques for information retrieval
5. Evaluate and analyse the performance of a retrieval systems using a suitable test
collection
Syllabus
List of Assignments
1. Assignment on making a corpus and preprocessing: (a) search the web using a
recent event and collect 50 news articles from various sources – this collection is
‘myCorpus’, (b) perform stop word removal and stemming of the documents.
2. Assignments on term-document matrix: Build term-document matrix using
‘myCorpus’ and top N frequent terms. Now find similarity between the documents
using any distance metric.
3. Vary N and choose other distance matrices and perform experiments. Find two
documents that have the highest similarity and two documents having the lowest
similarity. Manually verify the documents and comment on the value of N and
performance of the similarity metrices.
4. Experiments with TfIdf and applications of TfIdf using a given dataset.
5. Experiments with Zips law on Reuters21578 corpus and another Indian language
corpus.
6. Assignments on construction of an Inverted Index using a given corpus.
7. Form 3 suitable queries manually and retrieve documents from ‘myCorpus’. Perform
experiments on various retrieval models.
8. Implement and evaluate algorithms for index compression.
9. Experiments on studying an available crawler and building own toy crawler for
performing specific task.
10. Experiments on Unranked Evaluation Measures: Manually label the set of
documents corresponding to each query. Now compare the system-retrieved
documents with manually labelled set of documents and compute Precision, Recall,
F-measure.
11. Experiments on Ranked Retrieval and Evaluation: Select a task from Forum for
Information Retrieval Evaluation(FIRE) resources, use the available
Program
Specific
Course Program Outcomes (POs)
Outcomes
Outcome
(PSOs)
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15
CO1 2 3 3 3 2 2 1 1 2 2 1 1 3 3 2
CO2 3 3 2 3 3 2 2 1 3 2 1 1 2 3 3
CO3 3 3 3 3 3 2 2 2 2 2 2 2 2 2 3
CO4 3 3 3 2 2 3 3 1 2 2 2 2 3 3 2
CO5 2 3 3 3 3 3 2 1 2 2 2 1 2 2 2
Course Objectives
This course enables the students:
1.• To understand the role of information theory for an efficient, error-free and secure
delivery of information using binary data streams.
2.• To have a complete understanding of error-control coding.
3.• To understand encoding and decoding of digital data streams.
4.• To introduce methods for the generation of these codes and their decoding techniques.
5.• To have a detailed knowledge of compression and decompression techniques.
6 To evaluate the performance of various coding techniques over noisy communication
channels
Course Outcomes
Page 268 of 398
After the completion of this course, students will be:
1.• To be able to understand the principles behind an efficient, correct and secure
transmission of digital data stream.
2. To be familiar with the basics of error-coding techniques.
3.• To have knowledge about the encoding and decoding of digital data streams.
4.• Generation of codes and knowledge about compression and decompression techniques.
5.• To be able to understand the performance requirements of various coding techniques.
6• To produce professionals who will be able to conduct research in information theory.
Syllabus
Module I
Source Coding-Introduction to Information Theory, Uncertainty and Information, Average
Mutual Information and Entropy, Information Measure for Continuous Random Variables, Source
coding theorem, Huffman Coding, Shannon- Fano -Elias Coding, Arithmetic Coding , The
Lempel-Ziv ,Algorithm , Run Length Encoding.
And the PCX Format, Rate Distribution Function, Optimum Quantizer Design, Entropy Rate of a
Stochastic Process, Introduction to Image Compression, The JPEG Standard for Lossless
Compression, The JPEG Standard for Lossy Compression. (8L)
Module II
Channel Capacity and Coding- Introduction, Channel Model, Channel Capacity, Channel
Coding, Information Capacity Theorem, the Shannon Limit, Channel Capacity for MIMO System,
Random Selection of Code. Error Control Coding (Channel Coding). (8L)
Module III
Linear Block Codes for Error Correction- Introduction to Error Correction Codes, Basic
Definitions, Matrix Description of Linear Block Codes , Equivalent Codes , Parity Check Matrix,
Decoding of Linear Block Code ,Syndrome Decoding, Error Probability after Coding (Probability
of Error Correction), Perfect Codes, Hamming Codes, Low Density Parity Check (LDPC) Codes
, Optimal Linear Codes, Maximum Distance Separable (MDS) Codes, Bound on Minimum
Distance, Space Time Block Codes.
(10L)
Module IV
Cyclic Codes- Introduction to the Cyclic Codes, Polynomials, The Division Algorithm for
Polynomials ,A Method for Generating Cyclic Codes, Matrix Description of Cyclic Codes, Burst
Error Correction , Fire Codes, Golay Codes, Cyclic Redundancy Check(CRC) Codes, Circuit
Implementation of Cyclic Codes. (6L)
Module V
Bose –Chaudhuri Hocquenghem(BCH)Codes- introduction to the Codes , Primitive Elements,
Minimal Polynomials, Generator Polynomials , in Terms of Minimal Polynomials, Some
Examples if BCH Codes, Reed –Solomon Codes, Implementation of Reed –Solomon Encoders
and Decoders, Performance of RS Codes Over Real Channels, Nested Codes.
Module VI
Text book:
Bose R., “Information theory Coding and Cryptography”, 2nd Edition, McGraw-Hill, 2008.
(T1)
Teacher’s Assessment 5
Indirect Assessment
1. Student Feedback on Faculty
2. Student Feedback on Course
CD7 Simulation
Course Objectives:
1.• To understand the role of information theory for an efficient, error-free and secure
delivery of information using binary data streams.
2.• To have a complete understanding of error-control coding.
3.• To understand encoding and decoding of digital data streams.
4.• To introduce methods for the generation of these codes and their decoding techniques.
5.• To have a detailed knowledge of compression and decompression techniques.
6 To evaluate the performance of various coding techniques over noisy communication
channels
Course Outcomes:
1.• To be able to understand the principles behind an efficient, correct and secure
transmission of digital data stream.
2. To be familiar with the basics of error-coding techniques.
3.• To have knowledge about the encoding and decoding of digital data streams.
4.• Generation of codes and knowledge about compression and decompression techniques.
5.• To be able to understand the performance requirements of various coding techniques.
6• To produce professionals who will be able to conduct research in information theory.
Syllabus:
1. Write a program for determination of various entropies and mutual information of a given
channel.
Test various types of channel such as
a) Noise free channel.
b) Error free channel
c) Binary symmetric channel
d) Noisy channel Compare channel capacity of above channels.
2. Write a program for generation and evaluation of variable length source coding using
C/MATLAB (Any 2) a) Shannon – Fano coding and decoding b) Huffman Coding and decoding
c) Lempel Ziv Coding and decoding
3. Write a Program for coding & decoding of linear block codes.
4. Write a Program for coding & decoding of cyclic codes.
5. Write a program for coding and decoding of convolutional codes.
6. Write a program for coding and decoding of BCH and RS codes.
7. Write a program to study performance of a coded and encoded communication system
(Calculate the error probability).
Page 272 of 398
8. Write a simulation program to implement source coding and channel coding for transmitting a
text file.
9. Write a program to implement of any compression algorithm for either audio, image or video
data
Text Book:
References:
Direct Assessment
Teacher’s Assessment 5
Indirect Assessment
CD2 Assignments
CD7 Simulation
Program
Specific
Course Program Outcomes (POs)
Outcomes
Outcome
(PSOs)
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15
CO1 3 3 3 2 2 2 1 1 2 2 2 2 3 3 2
CO2 3 3 3 1 2 1 2 1 2 1 2 2 3 3 2
CO3 3 3 3 3 3 1 2 1 2 1 1 2 3 3 2
CO4 3 3 3 2 3 1 1 1 2 2 1 2 3 3 2
CO5 3 3 3 2 3 1 2 1 2 2 1 2 3 3 2
Course Objectives
This course enables the students:
1. To study basic and advanced features of the C# language
2. To create form based and web based applications
3. To study the internals of the .NET framework
4. To know and study about the Common Language Runtime (CLR) and Common
Language Infrastructure (CLI)
Course Outcomes
After the completion of this course, students will be able to:
1. Install and configure Dot Net application development tools.
2. develop, implement and creating Applications with C#
3 develop, implement, and demonstrate Component Services, Threading, Remoting,
Windows services, web
4. explain Security in the .NET framework and Deployment in the .NET.
5. develop Assemblies and Deployment in .NET, Mobile Application Development.
Syllabus
Module I
C# basics
C# and the .NET framework – C# basics – Objects and types – Inheritance –Arrays – Operators
and casts – Indexers. (8L)
Module II
Advanced C# features
Delegates and events – Strings and regular expressions – Generics – Collections–Memory
management and pointers – Errors and exceptions. (8L)
Module III
I/O and network programming
Module IV
Window and web applications
Window based applications – Data access with .NET – basics of ASP .NET -Introduction to web
services. (8L)
Module V
.NET Features
Architecture – Assemblies – shared assemblies – CLR hosting – Appdomains –Reflection. (8L)
Text Books:
Nagel,C. , Evjen,B. , Glynn,J. , Watson,K. , and Skinner,M.,“Professional C# 4 with .NET
4,” Wiley India, 2010.(T1)
Liberty ,J., and MacDonald ,B., “Learning C# 3.0,” First Edition ,O’Reilly, 2008.(T2)
References Book:
Troelson ,A., “Pro C# 5.0 and the.NET 4.5 Framework,” Sixth Edition, Apress,2012.(R1)
Teacher’s Assessment 5
Indirect Assessment
1. Student Feedback on Faculty
2. Student Feedback on Course
CD2 Assignments
CD7 Simulation
Course Objectives
This course enables the students:
1. To study basic and advanced features of the C# language
2. To create form based and web based applications
3. To study the internals of the .NET framework
4. To know and study about the Common Language Runtime (CLR) and Common
Language Infrastructure (CLI)
Course Outcomes
After the completion of this course, students will be able to:
1. Create Simple application using web controls
4. Query textbox and Displaying records & Display records by using database
Syllabus:
Page 278 of 398
List of experiments:
b) Money Conversion
c) Quadratic Equation
d) Temperature Conversion
e) Login control
3. Adrotator Control
4. Calendar control
5. Treeview control
b) Treeview operations
6. Validation controls
Text Books:
Nagel,C. , Evjen,B. , Glynn,J. , Watson,K. , and Skinner,M.,“Professional C# 4 with .NET
4,” Wiley India, 2010.(T1)
Liberty ,J., and MacDonald ,B., “Learning C# 3.0,” First Edition ,O’Reilly, 2008.(T2)
References Book:
Troelson ,A., “Pro C# 5.0 and the.NET 4.5 Framework,” Sixth Edition, Apress,2012.(R1)
Teacher’s Assessment 5
Indirect Assessment
1. Student Feedback on Faculty
2. Student Feedback on Course
CD2 Assignments
CD7 Simulation
Objectives
3. To learn the details about test planning, test case writing and defect management
5. To describe about test metrics, test reports and qualitative and quantitative analysis
Outcomes
After the completion of this course, students will be able to:
1. Comprehend the quality concepts that serve as the foundation for software testing
5. Elucidate about test metrics, test reports and qualitative and quantitative analysis
Syllabus
Module I
Introduction to Software Quality - Fundamentals of quality, financial aspect of quality, Total
Quality Management, basic premises of quality management, quality approaches, quality and
productivity relationship, variation in quality expectations, software quality management,
processes related to software quality, quality management system structure. (8L)
Module II
Fundamentals of Software Testing - Basic concepts of software testing, Comparison between
TQM testing and Big Bang approaches, testing methodologies such as Black Box testing, White
Box testing and Gray Box testing, test processes including test policy defining process, test
strategy and test plan, overview of configuration management, SDLC work products, product risk
management, potential risks of replacement of manual operation with automated systems, risk
management processes, risk control mechanisms, software verification and validation during
SDLC, V-Test model, defect management and life cycle. (8L)
Module III
Testing Techniques and Tools- Levels of testing during SDLC, integration testing techniques,
acceptance test plan and criteria, acceptance test process, acceptance testing methods such as
Page 282 of 398
alpha, beta and gamma testing, testing of specialised systems such as UI testing, compatibility
testing, internationalisation testing, security testing, performance testing, recovery testing and
installation testing, special testing such as OO testing, mobile testing, e-Commerce and e-Business
testing, control testing, client testing, client server testing, web application testing and agile testing,
testing tools and their procurement, advantages and disadvantages of tool usage in SDLC.
(8L)
Module IV
Testing Process - Test policy, test strategy, test planning, test scenario definition, test case
definition, test data definition, test estimation techniques, variation in standards used at
organisation level, national level, customer level and international level, roles and responsibilities
of test team members, test metrics, test reports, quantitative and qualitative data collection and
uses of qualitative and quantitative tools required for data analysis and decision making during
and post testing. (8L)
Module V
Test Process Improvement - Introduction to test process improvement,Alteration in perception
about testing, issues related to testing process, importance of test process improvement, test
process maturity, test process improvement model, stages of test process improvement model,
graphical representation of improvements. (8L)
Text book:
Limaye M. G., “Software Testing: Principles, Techniques and Tools”, Tata McGraw-Hill
Education Pvt Ltd, 2009.(T1)
Reference books:
Chauhan Naresh, “Software Testing: Principles and Practices”, Oxford University Press,
2012.(R1)
Sommerville, “Software Engineering’, 8th Edition, Pearson Education Ltd, 2009.(R2)
Indirect Assessment
1. Student Feedback on Faculty
2. Student Feedback on Course
CD2 Assignments
CD7 Simulation
Program
Specific
Course Program Outcomes (POs)
Outcomes
Outcome
(PSOs)
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15
CO1 3 3 3 3 3 3 1 2 3 1 2 2 3 3 3
CO2 3 3 2 3 3 2 1 1 2 2 2 1 3 2 2
CO3 3 3 2 3 2 3 1 2 2 2 2 1 3 1 2
CO4 3 2 3 2 3 2 1 2 2 3 3 1 3 2 2
CO5 3 3 3 3 2 2 2 2 2 1 2 1 3 2 3
Course Objectives
This course enables the students to:
Familiarize the students with the fundamental concepts of Software
1. Engineering
Course Outcomes
After the completion of this course, students will be able to:
Comprehend the quality concepts that serve as the foundation for software
CO1
testing
Elucidate about test metrics, test reports and qualitative and quantitative
CO5
analysis
SYLLABUS
Books recommended:
TEXT BOOKS
3. Software Engineering, Ian Sommerville, Pearson, 10th Edition, 2016.(T1)
4. Software Engineering: A Practioner's Approach, Roger S. Pressman, McGraw Hills, 7th
Edition, 2009.(T2)
REFERENCE BOOKS
Course Evaluation:
Day to day progressive evaluation, Lab Quizzes, Surprise Tests, Online Lab performance and
Viva Voce
Gaps in the syllabus (to meet Industry/Profession requirements):
Implementing of real world problems
POs met through Gaps in the Syllabus: PO2, 5 & 6
POs met through Topics beyond syllabus/Advanced topics/Design: Teaching through research
papers.
CD2 Assignments/Seminars
CD7 Simulation
Indirect Assessment
1. Student Feedback on Faculty
2. Student Feedback on Course
Program
Specific
Course Program Outcomes (POs)
Outcomes
Outcome
(PSOs)
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15
CO1 3 3 3 3 3 3 1 2 3 1 2 2 3 3 3
CO2 3 3 2 3 3 2 1 1 2 2 2 1 3 2 2
CO3 3 3 2 3 2 3 1 2 2 2 2 1 3 1 2
CO4 3 2 3 2 3 2 1 2 2 3 3 1 3 2 2
CO5 3 3 3 3 2 2 2 2 2 1 2 1 3 2 3
Course Objectives
This course enables the students to:
1. Understand the fundamental concepts, historical perspectives, current trends, structures,
operations and functions of different components of databases.
2. Recognize the importance of database analysis and design in the implementation of any
database application.
3. Describe the role of transaction processing in a database system.
4. Understand various concurrency control mechanisms for a database system.
5. Describe the roles of recovery and security in a database system.
Course Outcomes
After the completion of this course, students will be able to:
1. Analyze data organization requirements and their inter relationships.
2. Illustrate the features of data models and their application for storing data.
3. Design queries to maintain and retrieve useful information from the databases created.
4. Analyze the physical database design with respect to their expected performance using
normalization and query processing.
5. Examine the best practices according to concepts of indexing, transaction control and
concurrency maintenance
Syllabus
Module I
Database Design and Entity - Relational Model
Text Book:
Silberschatz A. et.al, Database System Concepts, 6th Edition, Tata Mc-Graw Hill, New
Delhi, 2011. (T1)
Reference Books:
Elmasri R., Fundamentals of Database Systems, 7thEdition, Pearson Education, New
Delhi, 2016. (R1)
Ullman Jeffrey D et.al., A First course in Database Systems, 3rd Edition, Pearson
Education, New Delhi- 2014.(R2)
Teacher’s Assessment 5
Indirect Assessment
1. Student Feedback on Faculty
2. Student Feedback on Course
CD2 Assignments
CD7 Simulation
Program
Course Specific
Program Outcomes (POs)
Outcome Outcomes
(PSOs)
Page 292 of 398
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15
CO1 2 1 2 2 3 3 2 1 1 1 1 2 3 2 2
CO2 3 1 2 2 3 3 2 1 1 1 1 2 3 2 2
CO3 3 1 3 3 3 3 2 1 1 2 1 2 3 2 3
CO4 3 1 3 3 3 3 2 1 1 2 2 3 3 2 3
CO5 2 1 3 3 3 3 2 1 1 1 2 3 3 2 3
Course Objective
This course enables the students:
1. Learn and practice data modeling using the entity-relationship and developing database
designs.
2. Understand the use of Structured Query Language (SQL) and learn SQL syntax.
3. Understanding the basic principles of modeling of database using UML and apply
normalization techniques to normalize the database system.
4. Learn Multidimensional schemas suitable for data warehousing. And learn the
Difference between OLTP (Online Transaction Processing) and OLAP (Online
Analytical Processing).
5. To demonstrate the principles behind the logical database design and Data Warehouse
Modeling.
CO2 Explain the basic concepts of relational data model, entity-relationship model,
relational database design, relational algebra and SQL.
CO4 Convert the ER-model to relational tables, populate relational database and
formulate SQL.
CO5 Improve the database design by normalization.
SYLLABUS
Books recommended:
TEXT BOOKS
4. A.Silberschatz et.al - Database System Concepts, 5thEdn, Tata Mc-Graw Hill, New Delhi – 2000.
REFERENCE BOOKS
3. Date C.J. - An Introduction to Database System, Pearson Education, New Delhi, 2005.
4. R.Elmasri, Fundamentals of Database Systems, Pearson Education, New Delhi, 2005.
Course Evaluation:
Day to day progressive evaluation, Lab Quizzes, Surprise Tests, Online Lab performance and Viva Voce
Gaps in the syllabus (to meet Industry/Profession requirements):
Implementing of real world problems
POs met through Gaps in the Syllabus: PO5&6
POs met through Topics beyond syllabus/Advanced topics/Design: Teaching through research papers.
Indirect Assessment
1. Student Feedback on Faculty
2. Student Feedback on Course
Program
Specific
Course Program Outcomes (POs)
Outcomes
Outcome
(PSOs)
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15
CO1 3 3 3 2 3 3 1 1 2 2 1 3 3 3 3
CO2 3 3 2 3 3 2 1 1 2 2 2 1 3 3 3
CO3 3 3 2 3 2 3 1 2 2 2 2 1 3 3 3
CO4 3 2 3 2 3 3 1 2 2 3 3 1 3 3 3
CO5 3 3 3 3 2 2 2 2 2 1 2 1 3 1 2
Course Objectives
This course enables the students to:
1. Students are effective team members, aware of cultural diversity, who conduct
themselves ethically and professionally
2. Students use effective communication skills and technical skills to assure production of
quality software, on time and within budget.
3. Students build upon and adapt knowledge of science, mathematics, and engineering to
take on more expansive tasks.
4. Able to increase level of self-reliance, technical expertise, and leadership.
Course Outcomes
After the completion of this course, students will be:
1. Explain the software engineering principles and techniques
2. Apply Software Project Management Practices
3. Apply the knowledge gained for their project work as well as to develop software
following software engineering standards
4. Develop self-reliance, technical expertise, and leadership.
Syllabus
Module I
Introduction
Some Definitions, FAQs about software engineering, the evolving role of software, Software
process models, Waterfall model, the prototyping model, spiral model, RAD and Incremental
Page 297 of 398
model, Management activities, Project planning and Project Scheduling. (8L)
Module II
Software Requirements
Functional and non-functional requirements, User requirements, System requirements, the
software requirements document. IEEE standard of SRS, Quality of good SRS.
Module IV
Verification and Validation
Verification and Validation Planning, S/W inspection, static analysis.
Software Testing
Testing functions, Test care design, White Box testing, Black box testing, Unit testing, Integration
Testing, System testing, Reliability. (8L)
Module V
Process metrics, Software Measurement, Software Project Estimation, Decomposition
Techniques, Empirical Estimation Models, Quality assurance and standards, Quality planning,
Quality control, S/W Maintenance in detail. (8L)
Text Book:
Sommerville, Software Engineering, 7th Edition, Pearson Education Publication. (T1)
Reference Books:
Pressman R. S.,Software Engineering: A Practiioners Approach, 5th Edition., TMA, New
Delhi.(R1)
Mall Rajib, Fundamental of Software Engineering, 4th Edition, PHI Learning Private
Limited.(R2)
Peters J. F. &Pedrycz W., Software Engineering, John Wiley & Sons, Inc. 2000.(R3)
Behforooz A. & Hudson F.J., Software Engineering Fundamentals, Oxford Univ. Press,
New York, 2000.(R4)
Teacher’s Assessment 5
Indirect Assessment
1. Student Feedback on Faculty
2. Student Feedback on Course
CD2 Assignments
CD7 Simulation
3 2 3 3 3 3 1 1 1 2 3 1 2 2 3 3
4 3 1 2 1 2 1 2 2 1 1 1 2 2 3 2
5 2 2 1 2 3 1 1 1 1 3 2 3 1 2 3
Course Objective
This course enables the students:
1. Learn and practice data modeling using the entity-relationship and developing database
designs.
2. Understand the use of Structured Query Language (SQL) and learn SQL syntax.
3. Understanding the basic principles of modeling of database using UML and apply
normalization techniques to normalize the database system.
4. Learn Multidimensional schemas suitable for data warehousing. And learn the
Difference between OLTP (Online Transaction Processing) and OLAP (Online
Analytical Processing).
5. To demonstrate the principles behind the logical database design and Data Warehouse
Modeling.
Syllabus
Module I
Database Design and Entity- Relational Model
Introduction to Data and Database Management, The Database Life Cycle, Conceptual Data
Modeling, Fundamental ER Constructs, Mapping Cardinalities and Constraints, Relational Data
model (Relational Algebra, Tuple and Domain Relational Calculus), Network Model, Hierarchical
Model, Alternative Conceptual Data Modeling Notations, Advanced ER Construct, Summary.
(8L)
Module II
Requirement Analysis and Conceptual Data Modeling
Introduction, Requirements Analysis, Conceptual Data Modeling, View Integration, Entity
Clustering for ER Models, Transforming Rules and SQL Constructs, Transformation Steps,
Summary. (8L)
Module III
The Unified Modeling Language (UML) and Normalization
Class Diagrams, Activity Diagrams, Rules of Thumb for UML Usage, Functional Dependencies,
Fundamentals of Normalization, Design of Normalized Tables, Normalization of Candidate Tables
Derived from ER Diagrams, 1NF, 2NF, 3NF, BCNF, Fourth and Fifth Normal Forms. Determining
the Minimum set of 3NF Tables, Summary. (8L)
Module IV
Business Intelligence
Overview of Data Warehousing, Logical Design, The Exponential Explosion of views, Decision
Support system. Overview of Online Analytical Processing (OLAP), View Size Estimation,
Selection of Materialized Views, View Maintenance, Query Optimization, Forecasting, Overview
of Data mining and Text Mining, Summary. (8L)
Module V
Logical Database Design
Requirements Specification, Logical Design, CASE Tools for Logical Database Design,
generating a Database from a Design, Database Support, Collaborative Support, Distributed
Development, Application Life Cycle tooling Integration, Design Compliance Checking,
Reporting, Modeling a Data Warehouse, Semi-Structured Data, XML, Summary. (8L)
Textbooks:
Teorey ,T. J., Lightstone,S., and Nadeau ,T.,”Database Modeling and Design: Logical
Design”, Fourth Edition, Morgan Kaufmann Publishers, 2006.(T1)
Teacher’s Assessment 5
Indirect Assessment
1. Student Feedback on Faculty
2. Student Feedback on Course
CD2 Assignments
CD7 Simulation
Program
Specific
Course Program Outcomes (POs)
Outcomes
Outcome
(PSOs)
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15
CO1 3 3 3 2 3 3 1 1 2 2 1 3 3 3 3
CO2 3 3 2 3 3 2 1 1 2 2 2 1 3 3 3
CO3 3 3 2 3 2 3 1 2 2 2 2 1 3 3 3
CO4 3 2 3 2 3 3 1 2 2 3 3 1 3 3 3
CO5 3 3 3 3 2 2 2 2 2 1 2 1 3 1 2
Course Objectives
Course Outcomes
After the completion of this course, students will be:
1. Understand the basic concept of Cryptography and Network Security and their mathematical
models, and to be familiar with different types of threats
2. Learning and applying various Ciphering Techniques.
3. Apply Symmetric and Asymmetric Cryptographic Algorithms and Standards in Networks.
4. Examine the issues and structure of Authentication Service and Electronic Mail Security
5. To explain and classify different malicious programs, worms and viruses, and to learn the
working and design principles of Firewalls
Syllabus
Module I
Introduction to Cryptography: ComputerSecurity concepts, The OSI Security Architecture,
Security Attacks, Security Services, A model for Network Security, Classical Encryption
Techniques. (8L)
Module II
Mathematical Foundations of Cryptography: Modular Arithmetic, Euclidean Algorithm,
Groups, Rings, Fields, Finite Fields of the Form GF(p), Polynomial Arithmetic, Finite Fields of
the Form GF(2n), Prime Numbers, Fermat’s and Euler’s Theorem, The Chinese Remainder
Theorem, Quadratic Congruence, Discrete Logarithms. (8L)
Module III
Symmetric and Asymmetric Cryptography: Difference Between Symmetric and Asymmetric
Cryptography, DES, Triple DES, AES, RSA Cryptosystem, Symmetric and Asymmetric Key
Cryptography Together, Elgamal Cryptosystem, Elliptic Curve Cryptosystems, , Diffie-Hellman
Key Exchange , Cryptographic Hash Functions, Message Authentication Codes, Digital Signature.
(8L)
Module IV
Internet Security Protocols : Basic Concepts, Security Socket Layer (SSL), Secure Hyper Text
Transfer Protocol (SHTTP), Time stamping Protocol(TSP), Secure Electronic Transaction(SET),
SSL Versus SET, 3-D Secure Protocol, Electronic Money, Email Security, Wireless Application
Protocol(WAP) Security, Security in GSM. (8L)
Module V
Network Security: Users, Trusts and Trusted Systems, Buffer Overflow and Malicious Software,
Malicious Programs, Worms, Viruses, Intrusion Detection Systems (IDS), Firewalls: Definitions,
Constructions and Working Principles. (8L)
Text Book:
Page 304 of 398
Forouzan B. A., Mukhopadhyay D., “Cryptography and Network Security”, 3rd Edition,
Mcgraw Higher Education, 2016. (T1)
Reference Books:
Stallings W., “Cryptography and Network Security: Principles and Practice”, 7th Edition,
Pearson, 2017.(R1)
Kahate A., “Crptography and Network Security”, 3rd Edition, McGraw Hill Education,
New Delhi, 2013.(R2)
Schneier B., “Applied Cryptogaphy: Protocols, Algorithms And Source Code In C”, 2nd
Edition, Wiley, 2007. (R3)
Teacher’s Assessment 5
Indirect Assessment
1. Student Feedback on Faculty
2. Student Feedback on Course
CD2 Assignments
CD7 Simulation
Program
Specific
Course Program Outcomes (POs)
Outcomes
Outcome
(PSOs)
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15
CO1 3 3 3 3 3 3 3 2 2 1 2 2 2 3 1
CO2 3 3 3 3 3 3 3 2 2 2 1 2 1 2 3
CO3 3 2 3 3 3 2 2 2 2 2 2 2 2 3 3
CO4 3 2 3 3 2 2 1 2 2 2 2 2 1 2 3
CO5 3 2 3 3 1 2 2 2 2 1 1 2 2 1 3
Course Objectives
This course enables the students:
1. Able to understand the basic concepts of GA
2. Able to find the application areas of GA
3. Able to understand the importance of optimization using GA
4. Able to know about the traditional GA model
Course Outcomes
After the completion of this course, students will be able to:
Syllabus
Module I
Introduction to Genetic Algorithm, Genetic Algorithms, Traditional and Search Methods and their
Differences, A Simple Genetic Algorithm. The Fundamental Theorem, Schema Processing.
(8L)
Module II
Two & k-Armed Bandit Problem, Hypothesis, Schemata and Revisited., Computer
Implementation of A Genetic Algorithm: Data Structures, Reproduction, Crossover and Mutation,
A Time to Reproduce, A Time to Cross, How Well Does It Work, Mapping Objective Functions
to Fitness Form, Fitness Scaling. (8L)
Module IV
Coding, A Multiparameter Mapped, Fixed-Point Coding, Discretization, Constraints.Applications
of Genetic Algorithms :The Rise of Genetic Algorithms, Genetic Algorithm Applications of
Historical Interest, De Jong and Function Optimization. (8L)
Module V
Improvements in Basic Technique, Current Applications of Genetic Algorithms.Genetics-
Based Machine Learning, Whence It Came, What is Classifier System, Rule and Message, Genetic
Algorithm. (8L)
Text Book :
Vose M. D., The Simple Genetic Algorithm, PHI, New Delhi, 2004.(R1)
Teacher’s Assessment 5
Indirect Assessment
1. Student Feedback on Faculty
2. Student Feedback on Course
CD2 Assignments
CD7 Simulation
Program
Specific
Course Program Outcomes (POs)
Outcomes
Outcome
(PSOs)
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15
CO1 3 3 3 1 1 1 1 1 2 2 2 1
CO2 3 3 3 1 2 1 1 1 2 2 2 1
CO3 3 3 3 3 3 1 1 1 1 1 2 3 2 1
CO4 3 3 3 2 3 1 1 1 1 1 2 3 2 1
CO5 3 3 3 2 3 1 1 1 1 1 1 2 3 2 1
Course Objectives
Page 309 of 398
This course enables the students:
1. To understand the basic concept of machine learning.
2. To explore the application of machine learning.
3. To understand the concept of supervised learning.
4. To learn the advantage of neural network.
5. To learn the utility of clustering techniques.
Course Outcomes
After the completion of this course, students will be able to:
1. Formulate machine learning problems corresponding to different applications: data,
model selection, model complexity
Syllabus
Module I
Introduction to Machine learning
Machine Learning – what and why? Basics of Linear Algebra and Statistics, Overview of
target function representations; Linear Regression. (8L)
Module II
Supervised Learning
Basics of Feature Selection and Evaluation, Decision Tree, Overfitting and Pruning,
Logistic regression, Support Vector Machine and Kernel; Noise, bias-variance trade-off,
under-fitting and over-fitting concepts. (10L)
Module III
Neural Networks
Perceptions: representational limitation and gradient descent training. Multilayer networks
and back propagation. Hidden layers and constructing intermediate, distributed
representations. Overfitting, learning network structure, recurrent networks.
(8L)
Module IV
Unsupervised and Semi Supervised Learning
Learning from unclassified data. Clustering. Hierarchical Agglomerative Clustering. k-
Text book:
2. Mitchell Tom, Machine Learning, Latest Edition, Mc-Graw Hill.(T1)
Reference books:
3. Shalev-Shwartz Shai and Ben-David Shai, Understanding Machine Learning,
Cambridge University Press. 2017.(R1)
4. Bishop Christopher, Pattern Recognition and Machine Learning, Springer,
2006.(R2)
Teacher’s Assessment 5
Indirect Assessment
1. Student Feedback on Faculty
2. Student Feedback on Course
CD2 Assignments
CD7 Simulation
Program
Specific
Course Program Outcomes (POs)
Outcomes
Outcome
(PSOs)
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15
CO1 3 3 1 2 1 1 1 1 1 1 1 2 3 1 1
CO2 3 3 2 2 1 1 1 1 1 1 1 2 3 3 1
CO3 3 3 3 3 3 3 2 2 2 2 2 2 3 3 3
CO4 3 3 3 3 3 2 2 2 2 2 2 2 3 3 2
CO5 2 3 2 3 3 2 1 1 2 2 1 2 3 3 3
OPEN ELECTIVE IV
Course Objectives
This course enables the students:
1. To understand the basic component of Natural Language Processing.
2. To explore the application areas of Natural Language Processing.
3. To understand the idea of Language Modelling.
4. To explore the basic concepts of Parts-of-speech Tagging.
5. To understand the concepts of language modelling.
Course Outcomes
After the completion of this course, students will be able to:
1. Describe the typical NLP problem, their importance & difficulty; and concepts of
morphology, syntax, semantics, discourse & pragmatics of natural language.
2. Demonstrate understanding of the relationship between NLP and statistics&
machine learning.
3. Discover various linguistic and statistical features relevant to the basic NLP task,
namely, spelling correction, morphological analysis, parts-of-speech tagging,
parsing and semantic analysis.
4. Analyse NLP problems to decompose them into appropriate components.
5. Evaluate a NLP system, identify shortcomings and suggest solutions for these
shortcomings.
Syllabus
Module I
Introduction to NLP :introduction and applications, NLP phases, Difficulty of NLP including
ambiguity; Spelling error and Noisy Channel Model; Concepts of Parts-of-speech and Formal
Grammar of English. (8L)
Page 313 of 398
Module II
Language Modelling: N-gram and NeuralLanguageModelsLanguage Modelling with N-gram,
Simple N-gram models, Smoothing(basic techniques), Evaluating language models;Neural
Network basics, Training;Neural Language Model, Case study: application of neural language
model in NLP system development. (8L)
Module III
Parts-of-speech Tagging: basic concepts; Tagset; Early approaches: Rule based and TBL;
POS tagging using HMM, POS Tagging using Maximum Entropy Model. (8L)
Module IV
ParsingBasic concepts: top down and bottom up parsing, Treebank; Syntactic parsing: CKY
parsing; Statistical parsing basics: Probabilistic Context Free Grammar (PCFG); Probabilistic
CKY Parsing of PCFGs. (8L)
Module V
Semantics: Vector Semantics; Words and Vector; Measuring Similarity; Semantics with dense
vectors; SVD and Latent Semantic Analysis; Embeddings from prediction: Skip-gram and
CBOW; Concept of Word Sense; Introduction to WorldNet. (8L)
Text books:
Jurafsky Dan and Martin James H., Speech and Language Processing (3rd ed.)To be
published in 2018. Available at: https://web.stanford.edu/~jurafsky/slp3/. (T1)
Reference books:
Jurafsky D. and Martin J. H., Speech and language processing: An Introduction to
Natural Language Processing, Computational Linguistics, and Speech Recognition, 2nd
Edition, Upper Saddle River, NJ: Prentice-Hall, 2008.(R1)
Goldberg Yoav, A Primer on Neural Network Models for Natural Language Processing.(R2)
Teacher’s Assessment 5
Indirect Assessment
1. Student Feedback on Faculty
2. Student Feedback on Course
CD2 Assignments
CD7 Simulation
Program
Specific
Course Program Outcomes (POs)
Outcomes
Outcome
(PSOs)
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15
CO1 3 2 2 2 1 1 1 2 1 3 1 1 3 2 1
CO2 3 3 3 1 3 1 1 1 3 1 2 2 3 2 1
CO3 3 3 3 3 3 1 2 2 2 1 1 2 3 3 2
CO4 3 3 3 1 3 2 1 1 2 1 1 2 3 3 2
CO5 3 3 3 3 3 1 1 1 1 1 1 2 3 3 3
Course Objectives
This course enables the students:
1. Understand the basic concept and the Iot Paradigm
2. Know the state of art architecture for IoT applications
3. Learn the available protocols used for IoT
4. Design basic IoT Applications.
5. Evaluate optimal IoT applications.
Course Outcomes
After the completion of this course, students will be:
1. Identify the IoT Components and its capabilities
2. Explain the architectural view of IoT under real world constraints
3. Analyse the different Network and link layer protocols
4. Evaluate and choose among the transport layer protocols
5. Design an IoT application
Syllabus
Module I
Introduction to IOT
The definition of the Internet of Things, main assumptions and perspectives. Platform for IoT
devices Device architectures. Conventional and renewable power sources for resource-constrained
devices. Operating systems for resource-constrained devices. (8L)
Module II
Page 316 of 398
Architecture of IOT
Node structure: Sensing, Processing, Communication, Powering IOT networking: Topologies,
Layer/Stack architecture, The data link layer for IoT- Wireless communication technologies. Wire
communication technologies. Manet Networks.
(8L)
Module III
Communication Technologies
Introduction to ZigBee, BLE, WiFi, LTE, IEEE 802.11ah, Discuss data rate, range, power,
computations/bandwidth, QoS, Service oriented protocols (COAP). Communication protocols
based on the exchange of messages (MQTT). Service discovery protocols. (8L)
Module IV
M2M and IoT Technology Fundamentals
Devices and gateways, Local and wide area networking, Data management, Business processes
in IoT, Everything as a Service (XaaS), M2M and IoT Analytics, Knowledge Management. (8L)
Module V
The data processing for IoT
Organization of data processing for the Internet of things. Cloud computing. Fog computing.
Application case studies: Smart Grid. Home Automation. Smart City. (8L)
Text books:
1. Madisetti Vijay and BahgaArshdeep, Internet of Things (A Hands-on-
Approach), 1st Edition, VPT, 2014.(T1)
2. Raj Pethuru and Raman Anupama C., The Internet of Things: Enabling
Technologies, Platforms, and Use Cases, CRC Press.(T2)
Reference books:
1. Vermesan Dr. Ovidiu, Friess Dr. Peter, Internet of Things: Converging
Technologies for Smart Environments and Integrated Ecosystems, River
Publishers.(R1)
2. Holler Jan, TsiatsisVlasios, Mulligan Catherine, Avesand Stefan, Karnouskos
Stamatis, Boyle David, From Machine-to-Machine to the Internet of Things:
Introduction to a New Age of Intelligence, 1st Edition, Academic Press, 2014.(R2)
Teacher’s Assessment 5
Indirect Assessment
1. Student Feedback on Faculty
2. Student Feedback on Course
CD2 Assignments
CD7 Simulation
Program
Specific
Course Program Outcomes (POs)
Outcomes
Outcome
(PSOs)
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15
CO1 2 3 3 2 3 1 2 1 2 1 1 2 2 2 2
CO2 2 3 3 3 2 2 1 1 1 1 1 2 2 3 2
CO3 2 3 2 2 2 1 1 1 1 1 1 2 3 2 2
Page 318 of 398
CO4 2 2 2 3 2 2 1 1 1 1 1 3 2 2 2
CO5 2 3 3 3 2 1 1 2 1 1 1 3 3 2 2
2. An ability to design and conduct experiments and to analyze and interpret data related
to software and hardware design solutions.
2. Apply different search techniques for solving real world problems and select the most
appropriate solution by comparative evaluation.
5. Explain various types of LISP and PROLOG programs and explore more
sophisticated LISP and PROLOG code.
Syllabus
Module I
Introduction: Overview of Artificial Intelligence- Problems of AI, AI Technique, Tic - Tac - Toe
Problem.
Intelligent Agents: Agents & Environment, Nature Of Environment, Structure Of Agents, Goal
Based Agents, Utility Based Agents, Learning Agents.
Problem Solving: Problems, Problem Space & Search: Defining The Problem As State Space
Search, Production System, Problem Characteristics, Issues In The Design Of Search Programs.
(9L)
Module II
Search Techniques: Solving Problems By Searching, Problem Solving Agents, Searching For
Solutions; Uniform Search Strategies: Breadth First Search, Depth First Search, Depth Limited
Search, Bi-directional Search, Comparing Uniform Search Strategies.
Heuristic Search Strategies: Greedy Best-First Search, A* Search, Memory Bounded Heuristic
Search: Local Search Algorithms & Optimization Problems: Hill Climbing Search, Simulated
Annealing Search, Local Beam Search, Genetic Algorithms; Constraint Satisfaction Problems,
Local Search For Constraint Satisfaction Problems.
Adversarial Search: Games, Optimal Decisions & Strategies in Games, The Mini Max Search
Procedure, Alpha-Beta Pruning, Additional Refinements, Iterative Deepening. (9L)
Module III
Knowledge & Reasoning: Knowledge Representation Issues, Representation & Mapping,
Approaches to Knowledge Representation, Issues in Knowledge Representation.
Using Predicate Logic: Representing Simple Fact in Logic, Representing Instant & ISA
Relationship, Computable Functions & Predicates, Resolution, and Natural Deduction.
Representing Knowledge Using Rules: Procedural Verses Declarative Knowledge, Logic
Programming, Forward Verses Backward Reasoning, Matching, Control Knowledge. (7L)
Module IV
Probabilistic Reasoning: Representing Knowledge in an Uncertain Domain, Bayesian Networks,
Dempster-Shafer Theory.
Planning: Overview, Components of A Planning System, Goal Stack Planning, Hierarchical
Planning.
Page 320 of 398
Learning: Forms Of Learning, Inductive Learning, Explanation Based Learning, Neural Net
Learning & Genetic Learning. (8L)
Module V
Natural Language Processing: Brief introduction to Syntactic Processing, Semantic Analysis,
Discourse & Pragmatic Processing.
Robotics: Introduction, Robot hardware, robotic perception, planning to move, planning uncertain
movements, robotic software architecture, application domains. (6L)
Text Books:
Russel S. and Norvig P., Artificial Intelligence a Modern Approach, 3rd edition, Pearson
Education.(T1)
Rich E. & Knight K., Artificial Intelligence, 3rd edition, TMH, New Delhi.(T2)
Reference books:
Patterson Dan W., Introduction to Artificial Intelligence and Expert Systems, PHI, New
Delhi, 2006.(R1)
Rolston D.W., Principles of AI & Expert System Development, TMH, New Delhi.(R2)
Teacher’s Assessment 5
Indirect Assessment
1. Student Feedback on Faculty
2. Student Feedback on Course
Course Delivery Methods
CD1 Lecture by use of boards/LCD projectors/OHP projectors
CD2 Assignments
CD7 Simulation
Program
Specific
Course Program Outcomes (POs)
Outcomes
Outcome
(PSOs)
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15
CO1 3 2 2 2 3 2 1 1 1 2 1 3 2 3 2
CO2 3 2 2 3 3 2 1 1 3 3 2 3 2 2 1
CO3 3 2 2 2 3 2 2 2 3 3 1 3 2 3 2
CO4 2 3 2 2 2 3 2 1 3 3 1 3 2 2 3
CO5 3 3 2 3 2 3 2 2 2 1 2 2 2 2 3
Course Objectives
This course enables the students:
1. Examine the types of the data to be mined and apply pre-processing methods on raw
data.
2. To introduce the basic concepts of Data Warehouse and Data Mining techniques
4. Prepare students for research in the area of data mining and related applications and
Enhance students communication and problem solving skills
5. Provide the students with practice on applying data mining solutions using common
Course Outcomes
After the completion of this course, students will be able to:
1. Illustrate the fundamentals of data mining systems as well as issues related to access
and retrieval of data at scale.
2. Explain the various data mining functionalities and data warehousing techniques.
3. Apply the various data mining techniques to solve classification, clustering and
association rule mining problems.
5. Design and evaluate data mining models to be used in solving real life problems,
keeping in view social impacts of data mining.
Syllabus
Module I
ModuleII
Data Warehouse: Introduction, A Multidimensional data Model, Data Warehouse Architecture,
Data Warehouse Implementation, Data Cube Technology, From Data Warehousing to Data
Mining.Data Cube Computation and Data Generalization. (8L)
Module III
Mining Association Rules in Large Databases: Association Rule Mining, Single – Dimensional
Boolean Association Rules, Multilevel Association Rules from Transaction Databases, Multi
Dimensional Association Rules from Relational Databases, From Association Mining to
Correlation Analysis, Constraint – Based Association Mining. (10L)
Module IV
Classification and Prediction: Classification & Prediction, Issues Regarding Classification &
Prediction, Classification by decision Tree Induction, Bayesian Classification, Classification by
Back propagation, Classification based on concepts & Association Rule Analysis, Other
Classification Methods, Prediction, Classification Accuracy. (8L)
Module V
Cluster Analysis: Introduction , Types of Data in Cluster Analysis, A Categorization of Major
Clustering Methods, Partitioning Method - k- Medoids Algorithm, CLARANS, Hierarchical
Methods - BIRCH, ROCK Density-Based Methods - DBSCAN, Grid-Based Methods – STING,
WaveCluster. Outlier Analysis. (8L)
Text book:
Han Jiawei &Kamber Micheline - Data Mining Concepts & Techniques, 2nd Edition,
Publisher Harcout India. Private Limited.(T1)
Reference books:
Gupta G.K., Introduction to Data Mining with case Studies, PHI, New Delhi, 2006.(R1)
Berson A. & Smith S. J., Data Warehousing Data Mining, COLAP, TMH, New Delhi,
2004.(R2)
Dunham H.M. & Sridhar S., Data Mining, Pearson Education, New Delhi, 2006.(R3)
Teacher’s Assessment 5
Indirect Assessment
1. Student Feedback on Faculty
2. Student Feedback on Course
CD2 Assignments
CD7 Simulation
Program
Specific
Course Program Outcomes (POs)
Outcomes
Outcome
(PSOs)
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15
CO1 3 3 2 3 2 2 2 1 2 2 1 1 3 3 1
CO2 2 3 2 3 2 2 1 2 2 2 2 1 2 2 2
CO3 2 3 3 3 3 3 3 2 3 2 3 1 2 2 3
CO4 3 2 2 3 3 2 2 1 3 2 2 2 3 3 2
CO5 3 3 3 3 2 2 2 1 3 3 3 2 3 3 3
Course Objectives
This course enables the students to:
1. Explain about the necessity of preprocessing and its procedure.
Course Outcomes
After the completion of this course, students will be able to:
CO1 Understand Data Warehousing and Data Mining and its applications and
challenges and Create mini data warehouse.
SYLLABUS
Books recommended:
Text Books :
2. Jiawei Han & Micheline Kamber - Data Mining Concepts & Techniques Publisher Harcout India.
Private Limited.
Reference Books :
4. G.K. Gupta – Introduction to Data Mining with case Studies, PHI, New Delhi – 2006.
5. A. Berson& S.J. Smith – Data Warehousing Data Mining, COLAP, TMH, New Delhi – 2004.
6. H.M. Dunham & S. Sridhar – Data Mining, Pearson Education, New Delhi, 2006.
Course Evaluation:
Day to day progressive evaluation, Lab Quizzes, Surprise Tests, Online Lab performance and
Viva Voce
Gaps in the syllabus (to meet Industry/Profession requirements):
Implementing of real world problems
POs met through Gaps in the Syllabus: PO5&6
POs met through Topics beyond syllabus/Advanced topics/Design: Teaching through research
papers.
Indirect Assessment
1. Student Feedback on Faculty
2. Student Feedback on Course
Program
Specific
Course Program Outcomes (POs)
Outcomes
Outcome
(PSOs)
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15
CO1 3 3 2 3 2 2 2 1 2 3 3 3 3 3 1
CO2 2 3 2 3 2 2 1 2 2 3 3 3 2 2 2
1 Develop basic knowledge of Nature Inspired Computing Techniques and their working
principle.
3 Generate the possible ways of solution to a certain real world problem using Nature
Inspired Computing Techniques
4 Analyze and modify the performance of the Nature Inspired Computing algorithms.
Course Outcomes:
2. Explain the different Nature Inspired algorithms and other algorithms and their working
principles.
3. Design and modify different Nature Inspired algorithms in terms of Initialization, Processing
and Stopping Criteria.
4. Apply Nature Inspired algorithms to different set of practical problems.
5. Justify the proper applicability of a Nature Inspired algorithm to a problem.
Syllabus:
Bat Algorithm:
BA Introduction, Mapping the Bat Algorithm (BA) to the Behavior of Microbats, Creating an
Initial Population, Pseudocode of the BA
Harmony Search:
Inspiration of the Harmony Search (HS), Initializing the Harmony Memory, Generating New,
Harmonies (Solutions), Pseudocode of the HS
(8L)
Textbook:
1. Meta-heuristic and Evolutionary Algorithms for Engineering Optimization by Omid Bozorg-
Haddad, Mohammad Solgi, Hugo A. Loáiciga, Wiley, 2017, ISBN: 9781119386995
Ref Book:
Teacher’s Assessment 5
Indirect Assessment
1. Student Feedback on Faculty
2. Student Feedback on Course
CD2 Assignments
CD7 Simulation
Course Objectives
This course enables the students:
1. To understand the basic component of Machine Learning.
2. To explore the application areas of Neural Networks.
3. To understand the idea of Recurrent Neural Networks.
4. To explore the basic concepts of Feed forward Neural Networks.
5. To understand the concepts of mathematical modelling.
Course Outcomes
After the completion of this course, students will be able to:
1. Distinguish between machine learning and deep learning
2. Identify problems suitable for application of deep learning.
3. Explain the working of FF Neural Networks and their modifications.
4. Apply Convolutional & Recurrent Neural Networks to solve problems
Page 334 of 398
5. Discuss the efficiency of deep learning systems.
Syllabus
Module I
Machine Learning Basics: Learning Algorithms, Capacity, Over Fitting and Under fitting,
Hyperparameters and Validation sets, Estimators, Bias and variance, Maximum Likelihood
Estimation, BayesianStatistics, Supervised and Unsupervised Learning algorithms, SGD,
Building a ML algorithm,
(8L)
Module II
History of Deep Learning, Deep Learning Success Stories, McCulloch Pitts Neuron, Thresholding
Logic, Perceptrons, Perceptron Learning Algorithm Deep feedforward Networks, Multilayer
Perceptrons (MLPs), Representation Power of MLPs, Sigmoid Neurons, Gradient Descent,
Representation Power of Feedforward Neural Networks, Backpropagation.
(8L)
Module III
Gradient Descent (GD), Momentum Based GD, Nesterov Accelerated GD, Stochastic GD,
AdaGrad, RMSProp, Adam, Eigenvalues and eigenvectors, Eigenvalue Decomposition, Basis,
Principal Component Analysis and its interpretations, Singular Value Decomposition.
Autoencoders and relation to PCA, Regularization in autoencoders, Denoisingautoencoders,
Sparseautoencoders,
Contractive autoencoders.
(8L)
Module IV
Regularization: Bias Variance Tradeoff, L2 regularization, Early stopping, Dataset
Augmentation, Parameter sharing and tying, Injecting noise at input, Ensemble methods, Dropout.
Greedy Layerwise Pre-training, Better activation functions, Better weight initialization methods,
Batch Normalization. Learning Vectorial Representations Of Words.
(8L)
Module V
Convolutional Neural Networks, LeNet, AlexNet, ZF-Net, VGGNet, GoogLeNet, ResNet,
Visualizing Convolutional Neural Networks, Guided Backpropagation, Deep Dream, Deep Art,
Fooling Convolutional Neural Networks,Recurrent Neural Networks, Backpropagation through
time (BPTT), Vanishing and Exploding Gradients, Truncated BPTT, GRU, LSTMs.Encoder
Decoder Models, Attention Mechanism, Attention over images,Introduction to GANs.
. (8L)
Text book:
1. Ian Goodfellow and YoshuaBengio and Aaron Courville,Deep Learning (2016) An
MIT Press book, http://www.deeplearningbook.org.(T2)
2. Skansi S., Introduction to Deep Learning - From Logical Calculus to Artificial
Intelligence, 1st Edition, Springer International Publishing, 2018.(T2)
Teacher’s Assessment 5
Indirect Assessment
1. Student Feedback on Faculty
2. Student Feedback on Course
CD2 Assignments
CD7 Simulation
Course Objectives
This course enables the students:
Page 337 of 398
1. Examine the different types of the data and its interpretation and analysis.
2. To introduce the basic Statistics Probability Distributions.
3. Apply the techniques of hypothesis tests, supervised and unsupervised learning, feature
selection and visualization to real world data.
4. Prepare students for latest research in the area of data analysis such as deep learning and
related applications and Enhance student’s communication and problem solving skills.
5. Provide the students to practice on different datasets for data analysis and interpretation
using common statistical software tool /programming languages.
Course Outcomes
After the completion of this course, students will be able to:
1. Analyze data to convert information to useful knowledge.
2. Develop an appreciation for what is involved in learning from data.
3. Explain a wide variety of learning algorithms and also understand how to apply a variety
of learning algorithms to data.
4. Elaborate the fundamental principles, theory and approaches for Neural Networksand
learning with deep neural networks.
5. Interpret and Solve problems related to statistical analysis in Machine Learning
Syllabus:
Module I
Descriptive Statistics- Introduction to the course Descriptive Statistics Probability Distributions
Inferential Statistics-Inferential Statistics through hypothesis tests Permutation &Randomization
Test. (6L)
Module II
Machine Learning: Introduction and Concepts Differentiating algorithmic and model based
frameworks Regression: Regression & ANOVA Regression ANOVA (Analysis of Variance)
Ordinary Least Squares, Ridge Regression, Lasso Regression, K Nearest Neighbours Regression
& Classification. (10L)
Module III
Supervised Learning with Regression and Classification techniques - Bias-Variance
Dichotomy, Model Validation Approaches, Logistic Regression, Linear Discriminant Analysis,
Quadratic Discriminant Analysis, Regression and Classification Trees, Support Vector Machines
(10L)
Module IV
Ensemble Methods- Random Forest, Neural Networks, Deep learning. (8L)
Module V
Unsupervised Learning and Challenges for Big Data Analytics- K-Means and Hierarchical
Clustering, Associative Rule Mining, Challenges for big data analytics
Prescriptive analytics- Creating data for analytics through designed experiments, Creating data
for analytics through Active learning, Creating data for analytics through Reinforcement learning.
(6L)
Reference Books:
DeGroot, Morris H., and Schervish Mark J., “Probability and Statistics”, 3rd Edition,
Boston, MA: Addison-Wesley., 2002. (R1)
Box, G.E.P., Hunter, J.S and Hunter, W.G, “Statistics for Experimenters - Design,
Innovation and Discovery, 2nd Edition, Wiley, 2005. (R2)
Teacher’s Assessment 5
Indirect Assessment
Page 339 of 398
1. Student Feedback on Faculty
2. Student Feedback on Course
CD2 Assignments
CD7 Simulation
Course Objectives:
Course Outcomes:
Syllabus:
Ref Book:
Course Evaluation:
Day to day progressive evaluation, Lab Quizzes, Surprise Tests, Online Lab performance and
Viva Voce
Gaps in the syllabus (to meet Industry/Profession requirements):
Implementing of real world problems
POs met through Gaps in the Syllabus: PO5&6
POs met through Topics beyond syllabus/Advanced topics/Design: Teaching through research
papers.
Indirect Assessment
1. Student Feedback on Faculty
2. Student Feedback on Course
Program
Specific
Course Program Outcomes (POs)
Outcomes
Outcome
(PSOs)
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15
CO1 3 3 2 3 2 2 2 1 2 3 3 3 3 3 1
CO2 2 3 2 3 2 2 1 2 2 3 3 3 2 2 2
CO3 2 3 3 3 3 3 3 2 3 3 3 3 2 2 3
CO4 3 2 2 3 3 2 2 1 3 3 3 3 3 3 2
CO5 3 3 3 3 2 2 2 1 3 3 3 3 3 3 3
Page 343 of 398
MAPPING BETWEEN COURSE OUTCOMES AND COURSE DELIVERY METHOD
Course Objectives
This course enables the students:
1. To understand the basic component of Machine Learning.
2. To explore the application areas of Neural Networks.
3. To understand the idea of Recurrent Neural Networks.
4. To explore the basic concepts of Feed forward Neural Networks.
5. To understand the concepts of mathematical modelling.
Course Outcomes
After the completion of this course, students will be able to:
1. Develop Neural network models to solve classification problems.
2. Design decision trees to solve real world problems.
3. Create Bayesian Networks for classification problems
4. Design Convolutional & Recurrent Neural Networks to solve problems
5. Interpret the training and testing results of deep learning systems.
Syllabus
Course Evaluation:
Day to day progressive evaluation, Lab Quizzes, Surprise Tests, Online Lab performance and
Viva Voce
Gaps in the syllabus (to meet Industry/Profession requirements):
Implementing of real world problems
POs met through Gaps in the Syllabus: PO5&6
POs met through Topics beyond syllabus/Advanced topics/Design: Teaching through research
papers.
Indirect Assessment
1. Student Feedback on Faculty
2. Student Feedback on Course
Program
Specific
Course Program Outcomes (POs)
Outcomes
Outcome
(PSOs)
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15
CO1 3 3 2 3 2 2 2 1 2 3 3 3 3 3 1
CO2 2 3 2 3 2 2 1 2 2 3 3 3 2 2 2
CO3 2 3 3 3 3 3 3 2 3 3 3 3 2 2 3
CO4 3 2 2 3 3 2 2 1 3 3 3 3 3 3 2
CO5 3 3 3 3 2 2 2 1 3 3 3 3 3 3 3
Course Objectives
This course enables students:
1. To understand different Cyber physical systems, its characteristics and components.
2. To have a comprehensive view of storage and networking infrastructure for highly CPS
deployments.
3. To critically appraise the opportunities and challenges of IoT applications in complex
business environments.
4. To understand the concepts of Ubiquitous Computing
Page 347 of 398
5. To know about embedded systems a s a whole.
Course Outcomes
After the completion of this course, students will be able to:
1. Explain the logical and physical components of a System
2. Evaluate Embedded computing systems.
3. Analyze the various types of CPS technologies.
4. Apply IoT concepts to different technological applications
5. Discuss case studies related to ubiquitous computing systems.
Syllabus
Module 1: Introduction to Systems
(8L)
(8L)
(8L)
Internet of Things, Radio Frequency Identification Technology, Wireless Sensor Networks Technology ,
Sensor Technology, Sensor Networks, Wireless Sensor Networks, Powerline Communication: Internet of
Things and Powerline Communication, Smart Grid, Smart Home Energy Management, RFID
Applications.
(8L)
Ubiquitous Computing Fundamentals, Learning in the Ubiquitous Space: Smart Home and Powerline
Communication, Core Properties of Ubiquitous Computing, Ubiquitous Computing Formalisms for Use
(8L)
TextBooks:
1. Guide to Computing Fundamentals in Cyber-Physical Systems, Concepts, Design Methods, and
Applications, Authors: Möller, Dietmar P.F
Reference Books:
1. Introduction to Embedded Systems – A Cyber–Physical Systems Approach" - E. A. Lee, Sanjit
Seshia
2. Principles of Cyber-Physical Systems” - Rajeev Alur
Teacher’s Assessment 5
Indirect Assessment
Page 349 of 398
1. Student Feedback on Faculty
2. Student Feedback on Course
CD2 Assignments
CD7 Simulation
Course code:IT460
Course title: Cloud Storage and Security
Page 350 of 398
Pre-requisite(s): Cloud Computing
Co- requisite(s):
Credits: L:3 T:1 P:0
Class schedule per week: 4
Class: B.Tech
Semester / Level: IV
Branch: B Tech/IT
Course Objectives
This course enables students:
1. To understand different cloud storage technologies, its characteristics and components.
2. To have a comprehensive view of storage and networking infrastructure for highly
virtualized cloud deployments.
3. To critically appraise the opportunities and challenges of storage management in
complex business environments.
4. To acknowledge the concepts of security systems and cryptographic protocols, which
are widely used in the design of cloud security.
5. To appraise legal and compliance issues related to cloud computing
Course Outcomes
After the completion of this course, students will be able to:
1. Explain the logical and physical components of a Storage infrastructure.
2. Evaluate storage architectures, including DAS, SAN, NAS, and CAS.
3. Elaborate the various types of Storage networking technologies.
4. Discuss the different forms of storage virtualization techniques.
5. Evaluate security issues related to cloud storage.
Syllabus
Reference Book:
1. Richard Barker, Paul Massiglia, “Storage area network essentials”, Wiley New York
2. Greg Schulz, “Cloud and Virtual Data Storage Networking”, Auerbach Publications
3. Meeta Gupta, “Storage Area Networks Fundamentals”, Pearson Education Limited, 2002.
4. Ronald L. Krutz, Russell Dean Vines, “Cloud Security”
Teacher’s Assessment 5
Indirect Assessment
1. Student Feedback on Faculty
2. Student Feedback on Course
CD2 Assignments
CD7 Simulation
Course code:IT462
Course title: SOFTWARE DEFINED NETWORKING
Pre-requisite(s): Data and Computer Communication
Co- requisite(s): NIL
Credits: L: 3 T: 1 P: 0
Class schedule per week: 04
Class: M. Tech
Semester / Level: IV
Branch: CSE/IT
Course Objectives
This course enables the students to:
1. Review the main features of SDN
2. Discuss the timeline of SDN techniques in the past
3. Gain awareness about the ideas and principles behind SDN
4. Recognize architectural themes in computer networking where SDN
originated
5. Apply understanding of security and virtualization in SDN.
Course Outcomes
After the completion of this course, students will be able to:
1. Identify challenges for widely deploying SDN in different contexts
2. Discuss SDN controller scalability issues and possible solutions
3. Analyze SDN Basics and Open Flow.
4. Compare Abstraction methods used in SDN and their applicability
5. Distinguish between scalability and virtualization in SDN
Syllabus
Module I [8L]
Introduction:
Software defined networking, SDN motivation, Conventional networking system today (before
SDN), Ideal networking system for innovation, SDN now: separate forwarding hardware from
controlling software
Module II [8L]
SDN evolution
Page 354 of 398
Main features of SDN, Evolution of the SDN supporting technologies: centralized global view,
Network Control Point, Evolution of SDN technologies: Programmability in Networks, Active
networks SDN basics and OpenFlow,Control plane and data plane, Forwarding abstraction, State
Distribution Abstraction, other Abstraction methods, Network Operating System(NOS),
Openflow.
Module III [8L]
OpenFlow Controllers
SDN controllers, SDN controllers (NOS) .vs. OS, NOS functionality, Existing SDN controllers,
NOX, Open Daylight, REST API.
Module IV [8L]
SDN challenges, SDN Network Updates
SDN challenges, Device heterogeneity, SDN scalability: distributed controller, distributed apps,
NOS: Network abstraction, SDN controller scalability issue, Solutions.
Module V [8L]
SDN virtualization:
Flowvisor Overview, Network slice and flowspace, Slicing control & data planes, Network
Slicing Architecture, Slicing Policies, FlowVisor Slicing, FlowVisor Message Handling.
SDN and Security
Problems of Legacy Network Devices, Security as an App, Framework for Enabling
Security Controls in OpenFlow networks.
Text Books:
The Road to SDN: An Intellectual History of Programmable Networks by Nick Feamster, Jennifer
Rexford and Ellen Zegura, ACM CCR April 2014
Teacher’s Assessment 5
Indirect Assessment
1. Student Feedback on Faculty
2. Student Feedback on Course
CD2 Assignments
CD7 Simulation
Course Objectives
This course enables the students:
1. Understand the basic concept and the Iot Paradigm
2. Know the state of art architecture for IoT applications
3. Learn the available protocols used for IoT
4. Design basic IoT Applications.
5. Evaluate optimal IoT applications.
Course Outcomes
After the completion of this course, students will be able to :
1. Identify the IoT Components and its capabilities
2. Design IoT System using Raspberry-Pi for reading data from various sensors and
storing the data into cloud.
3. Design the Networkfor communication between two devices using Zigbee.
Syllabus
1. Programs/ Script based on Raspberry-Pi, Arduino and other micro controllers.
2. Programs/ Script based on different operating systems for Raspberry-Pi. Understanding the
process of OS installation on Raspberry-Pi
3. Programs/ Script based on Connectivity and configuration of Raspberry-Pi circuit with basic
peripherals, LEDS for understanding GPIO and its use in programs.
5. Programs/ Script showing the connectivity of Raspberry-Pi circuit with IR sensor. Write an
application to detect obstacle and notify user using LEDs.
6. Programs/ Script showing connectivity of Raspberry-Pi /Beagle board with a Zigbee module.
Write a network application for communication between two devices using Zigbee.
8 Write a Program/script using Raspberry-Pi to control the operation of a hardware simulated lift
elevator.
10. Write a Program/script which will create a small dashboard application to be deployed on
cloud. Different publisher devices can publish their information and interested application can
subscribe.
11. Write a Program/script which will create a simple web interface for Raspberry-Pi/Beagle
board to control the connected LEDs remotely through the interface.
Text books:
3. Madisetti Vijay and Bahga Arshdeep, Internet of Things (A Hands-on-
Approach), 1st Edition, VPT, 2014.(T1)
4. Raj Pethuru and Raman Anupama C., The Internet of Things: Enabling
Technologies, Platforms, and Use Cases, CRC Press.(T2)
Reference books:
3. Vermesan Dr. Ovidiu, Friess Dr. Peter, Internet of Things: Converging
Technologies for Smart Environments and Integrated Ecosystems, River
Publishers.(R1)
4. Holler Jan, TsiatsisVlasios, Mulligan Catherine, Avesand Stefan, Karnouskos
Stamatis, Boyle David, From Machine-to-Machine to the Internet of Things:
Introduction to a New Age of Intelligence, 1st Edition, Academic Press, 2014.(R2)
Course Evaluation:
Day to day progressive evaluation, Lab Quizzes, Surprise Tests, Online Lab performance and
Viva Voce
Gaps in the syllabus (to meet Industry/Profession requirements):
Implementing of real world problems
POs met through Gaps in the Syllabus: PO5&6
POs met through Topics beyond syllabus/Advanced topics/Design: Teaching through research
papers.
Program
Specific
Course Program Outcomes (POs)
Outcomes
Outcome
(PSOs)
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15
CO1 3 3 2 3 2 2 2 1 2 3 3 3 3 3 1
CO2 2 3 2 3 2 2 1 2 2 3 3 3 2 2 2
CO3 2 3 3 3 3 3 3 2 3 3 3 3 2 2 3
CO4 3 2 2 3 3 2 2 1 3 3 3 3 3 3 2
CO5 3 3 3 3 2 2 2 1 3 3 3 3 3 3 3
1. To learn the design and development process involved in creating a cloud based
application
2. Install and use a generic cloud environment that can be used as a private cloud.
Course Outcomes
Syllabus
1. Sign up for a free account at two or more cloud storage providers of your choice. Choose
any ten of your files that are larger than 1 MB each. Store these files in both the providers
above. Show a "directory listing" in each.
2. Install Virtualbox/VMware Workstation with different flavours of linux or windows OS
on top of windows7 or 8.
3. Install a C compiler in the virtual machine created using virtual box and execute Simple
Programs
4. Install Google App Engine. Create hello world app and other simple web applications
using python/java.
5. Use GAE launcher to launch the web applications.
6. Simulate a cloud scenario using CloudSim and run a scheduling algorithm that is not
present in CloudSim.
7. Find a procedure to transfer the files from one virtual machine to another virtual machine.
8. Find a procedure to launch virtual machine using trystack (Online Openstack Demo
Version)
9. Install Hadoop single node cluster and run simple applications like wordcount.
Text Book:
Reference Book:
1. Richard Barker, Paul Massiglia, “Storage area network essentials”, Wiley New York
2. Greg Schulz, “Cloud and Virtual Data Storage Networking”, Auerbach Publications
3. Meeta Gupta, “Storage Area Networks Fundamentals”, Pearson Education Limited, 2002.
4. Ronald L. Krutz, Russell Dean Vines, “Cloud Security”
Course Evaluation:
Day to day progressive evaluation, Lab Quizzes, Surprise Tests, Online Lab performance and
Viva Voce
Gaps in the syllabus (to meet Industry/Profession requirements):
Implementing of real world problems
POs met through Gaps in the Syllabus: PO5&6
POs met through Topics beyond syllabus/Advanced topics/Design: Teaching through research
papers.
Indirect Assessment
1. Student Feedback on Faculty
2. Student Feedback on Course
Program
Specific
Course Program Outcomes (POs)
Outcomes
Outcome
(PSOs)
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15
CO1 3 3 2 3 2 2 2 1 2 3 3 3 3 3 1
CO2 2 3 2 3 2 2 1 2 2 3 3 3 2 2 2
CO3 2 3 3 3 3 3 3 2 3 3 3 3 2 2 3
CO4 3 2 2 3 3 2 2 1 3 3 3 3 3 3 2
CO5 3 3 3 3 2 2 2 1 3 3 3 3 3 3 3
Course Objectives
This course enables the students to:
1. To Apply Principles Rasterization
2. To be able to use visual computations for geometrical drawings.
3. To apply principles of Projection techniques
4. To be able to use animation techniques
5. To ConstructVirtual images using color and shading techniques
Course Outcomes
After the completion of this course, students will be able to:
Syllabus
Module I
Graphics Pipeline [10 Lectures]
Graphics system introduction, Rasterization, Scan Conversions, Filled Area Algorithms,
Antialiasing
Module II [ 10 Lectures]
Module III
3D Geometric Transformations, Modeling and Viewing [10 Lectures]
3Dbasic Transformations, 3D Viewing and Clipping, Projections,3D display elements, Implicit
Modeling
Module IV
Curves, Surface Design and Display [10 Lectures]
Curves, Curve Properties, Quadratic Curves, Cubic Curve, Splines, Surface Design, Fractals
geometry, Hidden Surface Removal
Module V
Colorimetry and Computer Animation [10 Lectures]
Color Models, Illumination and shading model, Tone Reproduction, Principles of Animation,
Keyframing, Deformations, Character Animations, Physics based Animations, Morphing and
Motion Specifications
Text books:
1. Hearn D. & Baker M.P. , Computer Graphics, 2/e , Pearson Education, New Delhi,
2005.(T1)
2. Peter Shirley & Steve MarschnerComputer Graphics: CENEAGE Learning, Second
Edition 2012
Reference books:
1. Foley J.D. et. Al, A Fundamental of Computer Graphics, Addition Wesley, London,
1993.(R1)
2. Krishnamurthy N, Introduction to Computer Graphics, 1stEdn., TMH, 2002.(R2)
3. Rogers B., Mathematical elements of Computer Graphics, McGraw Hill, 1989.(R3)
Teacher’s Assessment 5
Indirect Assessment
1. Student Feedback on Faculty
2. Student Feedback on Course
CD2 Assignments
CD7 Simulation
Program
Specific
Course Program Outcomes (POs)
Outcomes
Outcome
(PSOs)
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15
CO1 3 2 2 2 3 2 1 1 2 1 1 2 3 2 2
CO2 3 2 2 3 3 2 1 1 2 2 2 1 3 2 2
CO3 3 2 2 3 2 3 3 2 2 2 2 1 3 1 2
CO4 3 2 3 2 3 2 1 2 2 3 3 1 3 3 2
CO5 3 3 3 3 2 2 2 2 2 1 2 1 2 2 2
Page 366 of 398
MAPPING BETWEEN COURSE OUTCOMES AND COURSE DELIVERY METHOD
Course Objectives
Course Outcomes
After the completion of this course, students will be able to:
1. Explain the process of digital representation of images and the principles of image
enhancement and restoration.
2. Discuss different techniques employed for the segmentation of images.
3. Apply different feature extraction techniques for building pattern recognition
applications.
4. Explain the different pattern recognition strategies.
5. Distinguish between different types of pattern classification techniques and Explain
its applications to different real time problems.
Page 367 of 398
Syllabus
Module I Overview of Image Processing [10 Lectures]
Necessity of image feature extraction, Types of image feature extraction methods, Feature
representation: Chain code representation, Polygonal Approximation, Measuring moments,
Principal components, Boundary thinning
Decision making: Linear functions and Non-linear separability, Classification models: Distance
based classifier, Naïve Bayesian Classifier, Decision Tree, Artificial Neural networks.
Applications: Face Recognition, Character Recognition, Watermarking, Solar image Processing.
Text Book:
1. Image Processing and Pattern Recognition, Frank Y Shin, Wiley, 2nd Edition 2010.
2. Digital Image Processing, Gonzalez, R. and Woods, Prentice Hall, 2018.
3. Digital Image Processing and Pattern Recognition by Malay Kumar Pakhira, PHI, 2014.
4. Pattern Recognition, M NurshimhaMurty, University Press, 2019
Reference Book:
Teacher’s Assessment 5
Indirect Assessment
1. Student Feedback on Faculty
2. Student Feedback on Course
CD2 Assignments
CD7 Simulation
Program
Specific
Course Program Outcomes (POs)
Outcomes
Outcome
(PSOs)
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15
CO1 3 3 2 2 2 2 2 1 3 2 1 2 3 3 2
CO2 2 2 3 3 2 3 2 2 3 2 1 2 2 2 3
CO3 3 2 2 2 3 3 1 1 2 2 2 1 2 2 3
CO4 2 3 3 2 2 2 2 2 2 3 1 1 2 2 2
CO5 2 2 1 1 3 3 2 1 3 3 3 1 2 3 3
Course Objectives
Page 370 of 398
This course enables the students:
1. Be familiar with both the theoretical and practical aspects of computing with images.
2. Have described the foundation of image formation, measurement, and analysis.
3. Understand the geometric relationships between 2D images and the 3D world.
4. Grasp the principles of state-of-the-art deep neural networks
Course Outcomes
After the completion of this course, students will be able to:
1. Develop the practical skills necessary to build computer vision applications.
2. Explain the exposure to object and scene recognition and categorization from images.
3. Develop algorithm for classification and clustering.
4. Discuss the techniques of different models for vision
5. Apply in different engineering application such Image retrieval, Object detection, etc.
Syllabus
Module 1: Understanding machine learning basics: [10 Lectures]
Probability basics: probability, common probability distributions, probability models, normal
distributions, Neural Network:Perceptron, Activation functions, Artificial neural network (ANN),
CNN.Machine learning for machine vision: learning and inference in vision, modelling complex
data densities, regression, and classification models
Text Book
Reference Book:
Teacher’s Assessment 5
Indirect Assessment
1. Student Feedback on Faculty
2. Student Feedback on Course
CD2 Assignments
CD7 Simulation
Course Objectives
This course enables the students to:
1. Apply Principles Rasterization
2. Able to use visual computations for geometrical drawings.
3. Apply principles of Projection techniques
4. Able to use animation techniques
5. Construct Virtual images using color and shading techniques
Course Outcomes
After the completion of this course, students will be able to :
Syllabus
Course Evaluation:
Day to day progressive evaluation, Lab Quizzes, Surprise Tests, Online Lab performance and
Viva Voce
Gaps in the syllabus (to meet Industry/Profession requirements):
Implementing of real world problems
POs met through Gaps in the Syllabus: PO5&6
POs met through Topics beyond syllabus/Advanced topics/Design: Teaching through research
papers.
Indirect Assessment
1. Student Feedback on Faculty
2. Student Feedback on Course
Program
Specific
Course Program Outcomes (POs)
Outcomes
Outcome
(PSOs)
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15
CO1 3 3 2 2 2 2 2 1 3 2 1 2 3 3 2
CO2 2 2 3 3 2 3 2 2 3 2 1 2 2 2 3
CO3 3 2 2 2 3 3 1 1 2 2 2 1 2 2 3
CO4 2 3 3 2 2 2 2 2 2 3 1 1 2 2 2
Course Objectives
This course enables the students:
1. To understand the basic concepts for representation of an image mathematically.
2. Use foundational techniques of image processing to solve image processing problems
of real world application
3. To understand the basic concepts of classification, clustering and its importance to
image processing and pattern recognition.
4. Use image processing and pattern recognition techniques to detect objects and activities
in images.
Course Outcomes
After the completion of this course, students will be able to:
1. Write Code to Explain the process of digital representation of images and the
principles of image enhancement and restoration.
2. Build Code for different techniques employed for the segmentation of images.
3. Write code to Explain different feature extraction techniques for building pattern
recognition applications.
4. Build code for demonstration of different pattern recognition strategies.
5. Develop code for solving problems related to pattern classification
5. Image Processing and Pattern Recognition, Frank Y Shin, Wiley, 2nd Edition 2010.
6. Digital Image Processing, Gonzalez, R. and Woods, Prentice Hall, 2018.
7. Digital Image Processing and Pattern Recognition by Malay Kumar Pakhira, PHI, 2014.
8. Pattern Recognition, M NurshimhaMurty, University Press, 2019
Reference Book:
Course Evaluation:
Day to day progressive evaluation, Lab Quizzes, Surprise Tests, Online Lab performance and
Viva Voce
Gaps in the syllabus (to meet Industry/Profession requirements):
Implementing of real world problems
POs met through Gaps in the Syllabus: PO5&6
POs met through Topics beyond syllabus/Advanced topics/Design: Teaching through research
papers.
Indirect Assessment
1. Student Feedback on Faculty
2. Student Feedback on Course
Program
Specific
Course Program Outcomes (POs)
Outcomes
Outcome
(PSOs)
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15
CO1 3 3 2 2 2 2 2 1 3 2 1 2 3 3 2
CO2 2 2 3 3 2 3 2 2 3 2 1 2 2 2 3
CO3 3 2 2 2 3 3 1 1 2 2 2 1 2 2 3
CO4 2 3 3 2 2 2 2 2 2 3 1 1 2 2 2
CO5 2 2 1 1 3 3 2 1 3 3 3 1 2 3 3
Correlation Levels 1, 2 or 3 as defined below:
Course Objectives
This course enables the students to:
Course Outcomes
After the completion of this course, students will be able to:
SYLLABUS:
Module I
Introduction: Parallel Processing Environment- Pipelining and Data Parallelism, Flynn’s
Taxonomy, Speedup, Scaled Speedup, Analyzing parallel algorithms, P-RAM Algorithms. (8L)
Module II
Processor Array, MIMD: Multiprocessors (shared) and Multi-computers (distributed),
Networks(Processor organizations):Static and dynamic Interconnection Networks, Message
Transferring procedures. (8L)
Module III
Mapping and Scheduling, Dynamic Load Balancing on Multi-computers, Static Scheduling on
UMA Multiprocessors, Parallel Programming model using process and thread, Deadlock and
Synchronization issues. (8L)
Module IV
Elementary Parallel Algorithm: Matrix Multiplication: Sequential Matrix Multiplication,
Algorithms for Processor Array, Algorithms for Multiprocessors, Algorithms for Multi-computers.
(8L)
Module V
Solving set of linear equations: Gaussian Elimination, The Jacobi Algorithm, Sorting algorithms:
Enumeration Sort, ODD-EVEN Transposition sort, BITONIC Merge, Quicksort Based
Algorithms. (8L)
TEXT BOOK:
Quin M. J., “Parallel Computing: Theory and Practice”, McGraw Hill, New York, 1994.
REFERENCE BOOKS:
1. Akl Selim G., “The Design and Analysis of Parallel Algorithms”, Prentice Hall
International.
2. Sasikumar M., Shikhare D. and Prakash P. Ravi, “Introduction to Parallel Processing”, PHI,
2006.
Gaps in the syllabus (to meet Industry/Profession requirements):N/A
POs met through Gaps in the Syllabus:N/A
Topics beyond syllabus/Advanced topics/Design:N/A
POs met through Topics beyond syllabus/Advanced topics/Design:N/A
Teacher’s Assessment 5
Indirect Assessment
1. Student Feedback on Faculty
2. Student Feedback on Course
CD2 Assignments
CD7 Simulation
Program
Specific
Course Program Outcomes (POs)
Outcomes
Outcome
(PSOs)
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15
CO1 1 1 3 2 2 3 2 1 2 3 2 2 3 3 2
CO2 3 2 3 3 2 1 1 1 2 3 2 2 3 3 2
CO3 1 1 2 3 1 2 2 1 3 3 2 3 2 1 3
CO4 2 2 2 3 3 2 3 1 3 2 2 1 2 3 2
CO5 3 2 2 2 2 1 2 1 3 2 2 1 1 1 2
Course Objectives
This course enables the students:
1. To understand the basic component of Parallel Computer Models.
2. To explore the application areas of Parallel Computer.
3. To understand the idea of Processors and Memory Hierarchy.
4. To explore the different IR evolution techniques.
5. To understand the concepts of Multithreaded and Data Flow Architecture.
Course Outcomes
After the completion of this course, students will be able to :
1. Discuss different terminologies in High Performance Computer Architecture.
SYLLABUS
Module I
Parallel Computer Models:The State of Computing, Multiprocessors and Multicomputer,
Multifactor and SIMD Computers, PRAM and VLSI Models, Architectural Development Tracks.
Program and Network Properties:Conditions for Parallelism, Program Partitioning and
Scheduling, Program Flow Mechanism, System Interconnect Architectures. (8L)
Module II
Program and Network Properties:Conditions for Parallelism, Program Partitioning and
Scheduling, Program Flow Mechanism, System Interconnect Architectures.
Principles of Scalable Performance: Performance Metrics and Measures, Parallel Processing
Applications, Speedup Performance Laws, Scalability Analysis and Approaches. (8L)
Module III
Processors and Memory Hierarchy: Advanced Processor Technology, Super Scaler and Vector
Processors, Memory Hierarchy Technology, Virtual Memory Technology.
Bus, Cache, and Shared Memory: Bus Systems, Cache Memory Organizations, Shared-Memory
Organizations, Sequential and Weak Consistency Models, Weak Consistency Models. (8L)
Module IV
Pipelining and Superscalar Techniques: Linear Pipeline Processors, Non Linear Pipeline
Processor, Instruction Pipeline Design, Arithmetic Pipeline Design, Superscalar Pipeline Design
Multiprocessors and Multicomputers: Multiprocessor System Interconnects, Cache Coherence
Synchronization Mechanism, Three Generations of Multicomputers, Message-Passing
Mechanisms. (8L)
Module V
Multi-vector and SIMD Computers: Vector Processing Principles, Multivector Multiprocessor,
Compound Vector Processing, SIMD Computer Organizations, The Connection Machine CM-5
Scalable, Multithreaded and Data Flow Architecture: Latency-Hiding Techniques, Principle
of Multithreading, Fine-Grain Multicomputers, Scalable and Multithreaded Architectures,Data
Flow and Hybrid Architectures. (8L)
Text Book:
1. Hwang K., Jotwani N., Advanced Computer Architecture, 2nd Edition, Tata Mc-Graw Hill,
India, 2010. (T1)
Reference Book:
1.Stone, H. S., High Performance Computer Architecture, 3rd Edition, Addison Wesley Publishing
Company, USA. (R1)
Indirect Assessment
1. Student Feedback on Faculty
2. Student Feedback on Course
CD2 Assignments
CD7 Simulation
Course Objectives
This course enables the students to:
Course Outcomes
After the completion of this course, students will be able to:
SYLLABUS
Module I: History of Supercomputing
Von Neumann Architecture, Basic five stage RISC Pipeline, Cache Memory, Register File, SIMD
instructions, GPU architectures - Streaming Multi Processors, Cache Hierarchy, The Graphics Pipeline.
(8L)
Module II: Understanding Parallelism with GPUs
Reference Books:
Kirk W. B., Hwu W. W., “Programming Massively Parallel Processors”, Second Edition, Morgan
Kauffman, 2013.
Teacher’s Assessment 5
Indirect Assessment
1. Student Feedback on Faculty
2. Student Feedback on Course
CD2 Assignments
CD7 Simulation
Program
Specific
Course Program Outcomes (POs)
Outcomes
Outcome
(PSOs)
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15
CO1 3 2 1 1 3 1 1 1 1 1 1 2 3 1 1
CO2 2 3 2 2 3 1 2 1 2 1 1 2 2 2 2
CO3 3 3 3 3 3 1 2 1 1 2 2 2 3 3 2
CO4 3 3 3 2 3 1 1 1 2 2 2 2 2 2 3
CO5 3 3 2 3 3 1 1 1 2 2 2 2 3 2 2
Course Outcomes
After the completion of this course, students will be able to:
1 Explain about task and data parallel programs.
BOOKS RECOMMENDED:
Page 391 of 398
TEXT BOOKS
1. Ananth Grama, Anshul Gupta, George Karypis, and Vipin Kumar, Introduction to Parallel Computing
(2nd Edition).
2. Edition), PDF, Amazon, cover theory, MPI and OpenMP introduction Recommended: John Cheng,
Max Grossman, and Ty McKercher, Professional CUDA C Programming, 1st Edition 2014.
REFERENCE BOOKS
1. Barbara Chapman, Gabriele Jost, and Ruud van der Pas, Using OpenMP: Portable Shared Memory
Parallel Programming, 2007
Course Evaluation:
Day to day progressive evaluation, Lab Quizzes, Surprise Tests, Online Lab performance and
Viva Voce
Gaps in the syllabus (to meet Industry/Profession requirements):
Implementing of real world problems
POs met through Gaps in the Syllabus: PO5&6
POs met through Topics beyond syllabus/Advanced topics/Design: Teaching through research
papers.
Indirect Assessment
1. Student Feedback on Faculty
2. Student Feedback on Course
Program
Specific
Course Program Outcomes (POs)
Outcomes
Outcome
(PSOs)
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15
CO1 3 3 3 2 2 1 1 1 2 3 1 2 3 2 2
CO2 3 2 2 2 2 1 1 3 2 1 1 1 3 3 2
CO3 2 2 3 3 3 2 1 1 3 3 1 2 2 2 3
CO4 2 2 3 3 3 3 2 1 2 2 1 1 2 2 2
CO5 2 2 1 1 3 3 2 1 3 3 3 1 2 3 3
Course Objectives
This course enables the students to:
1. Understand hardware limitations having impact on the efficiency of software solutions .
3. Learn how to design and implement accelerated programs exploiting the potential of
GPUs
4. Describe importance of the parallel programming on GPUs in the area of general purpose
computing.
Course Outcomes
After the completion of this course, students will be able to:
CO1 Familiarize yourself with the architecture and programming of graphics
processing unit
CO2 Describe different parallel processing platforms involved in achieving High
Performance Computing.
CO4 Implement efficient algorithms for common application kernels, such as matrix
multiplication..
Write a CUDA program for computing the dot product of a vector in parallel with each row of a
matrix. You are required to have each thread access consecutivememory locations (coalescent
memory access). The inputs are
o number of rows, number of columns
o a data matrix file
o a vector file (one row)
Lab Assignment No: 7
For a matrix of floats, create naive and optimized version of 3 simple operations both on
the CPU and GPU:
o Copy
o Matrix Transpose
o Scattered Writes
BOOKS RECOMMENDED:
TEXT BOOK
1. Cook S., “CUDA Programming: A Developer’s Guide to Parallel Computing with GPUs,” First
Edition, Morgan Kauffman, 2013.
Course Evaluation:
Day to day progressive evaluation, Lab Quizzes, Surprise Tests, Online Lab performance and
Viva Voce
Gaps in the syllabus (to meet Industry/Profession requirements):
Implementing of real world problems
POs met through Gaps in the Syllabus: PO5&6
POs met through Topics beyond syllabus/Advanced topics/Design: Teaching through research
papers.
Indirect Assessment
1. Student Feedback on Faculty
2. Student Feedback on Course