Scheme of Syllabus For 5 Semester (2015-2016 To 2017-2018 Admitted Batches)
Scheme of Syllabus For 5 Semester (2015-2016 To 2017-2018 Admitted Batches)
Sangha s
Basaveshwar Engineering College (Autonomous), Bagalkot
Department of Computer Science and Engineering
# Lab is to be evaluated for 20 marks in CIE only, theory is to be evaluated for 30 marks in CIE and
50
marks in SEE and the same scheme is applicable to elective courses on programming languages.
ANALYSIS AND DESIGN OF ALGORITHMS
Sub Code : UCS521C Credits : 04
Hours/Week : Theory: 03, Practical: 2 CIE MARKS : 50 (30 theory, 20 lab)
Total Hours : 40 SEE Marks : 50
1. Explain different problem types, data structures and efficiency classes such as
best, worst and
average class efficiencies with the asymptotic notations employed for analysis
of algorithms.
2. Devise algorithms using divide and conquer, decrease and conquer strategies
and explain the
difference between them. Also exhibit the understanding of trasform and
conquer techniques.
3. Write the algorithm for solving problems employing space anf tradeoff
technique, greedy strategy and dynamic programming.
4. Explain the concepts of tractability and intractability of problems using
backtracking and branch and bound methods and also notions of polynomial
time and NP-completeness.
5. Implement the algorithms using a suitable programming language.
Divide and Conquer: Mergesort, Quicksort, Binary Search, Binary tree traversals and
related properties, Multiplication of large integers and Stressens Matrix
Multiplication.
Decrease and Conquer: Insertion Sort, Depth First Search, Breadth First Search,
Topological Sorting, Algorithms for Generating Combinatorial Objects.
Transform and Conquer: Presorting, Balanced Search Trees, Heaps and Heapsort,
Problem Reduction Space and Time Tradeoffs: Sorting by Counting, Input
Enhancement in String Matching , Hashing, B-Trees Dynamic Programming:
Computing a Binomial Coefficient, Warshalls and Floyds Algorithms, Optimal Binary
Search Trees. The Knapsack Problem and Memory Functions.
UNIT IV (10 Hours)
Text Books:
Reference Books
COURSE OUTCOMES
TEXT BOOKS:
REFERENCE BOOK:
1) D.M.Dhamdhere, 1999, System Programming and Operating Systems, 2nd Edition, TMH.
DATA COMMUNICATIONS
Ethernet: EEE standards; Standard Ethernet and changes in the standard; Fast
Ethernet; Gigabit Ethernet.
Wireless LANs and Connection of LANs: IEEE 802.11; Bluetooth. Connecting
devices; Backbone Networks; Virtual LANs.
Other Technologies: Cellular telephony; SONET / SDH: Architecture, Layers,
Frames; STS multiplexing.
TEXT BOOK:
REFERENCE BOOKS:
1) Alberto Leon, Garcia and Indra Widjaja, 3rd Edition, Tata McGraw- Hill, 2004,
Communication Networks: Fundamental Concepts and Key Architectures.
2) William Stallings, 8th Edition, Pearson Education, 2007, Data and Computer
Communication.
SOFTWARE ENGINEERING
Understand the current theories, models and techniques that provide a basis for
software product development.
Write software requirement specification based on the formal specifications for
software systems.
Design and develop different components of the software product using standard
models.
Verify and Validate the individual components and the whole software product
using different testing tools.
Demonstrate the necessary understanding of methods and techniques for software
management and also to use these in various development situations.
TEXT BOOK:
REFERENCE BOOKS:
COURSE OUTCOMES
Part I
Part II
1. Design Lexical analyzer to count the no of occurrences of the words from a given
text file.The program should accept the text file and list of words as input.
2. Design Lexical analyzer to count no of positive numbers and negative numbers
from the input given.
3. Design Lexical analyzer to count number of printf and scanf statements and
replace them by sprintf and sscanf respectively.
4. Design Lexical analyzer to count number of integers , float, double,char variable
from C declaration statements
5. Design Lexical analyzer to count number of blank spaces lines, characters, words
from a given text file.
6. Design Lexical analyzer to check whether a given simple arithmetic operation is
valid or not. If valid print number of positive, negative, multiplication and division
operators separately
Part III
1. Design parser using Yacc tool to test the validity of a simple expression involving
operators +,-,/,*.
2. Design parser using Yacc tool to evaluate the given arithmetic expression
involving operators +,-,/,*.
3. Design parser using Yacc tool to recognize a valid variable which starts with a
letter followed by any number of letters and digits.The length of the identifier
should not exceed 15.
4. Design parser using Yacc tool to recognize the grammar an b where n>=10.
5. Design parser using Yacc tool to recognize the validity of nested if statements and
also display the number of levels of nesting
Note:
Marks are based on execution of assignments and lab internal test. The marks are
distributed as below;
1. 30 marks for lab assignment execution.
2. 20 marks for lab internal test.
In semester end examination two questions will be given. One from Part-I and Part-III
respectively.
OPERATING SYSTEM LABORATORY
PART A
1. Write a C program to sort the given set of numbers. Let the parent process sort the
first half of the list and child process sort the second half of the list. Finally let the
parent process merge the two sorted sublists and display the result.
2. Write a C program to sort the given set of numbers. Let the parent sort the first half
of the list and child thread sort the second half of the list. Finally let the parent
thread merge the two sorted sublists and display the result.
3. Write a C program to implement Shortest Request Next Scheduling Policy (Non-
Preemptive).
4. Write a C program to implement the following memory allocation schemes by
considering the problem of external fragmentation.
a. Best Fit
b. Worst Fit
5. Write a C program to implement FIFO page replacement technique,also check
Beladays anomaly.
6. Write a C program to implement LRU page replacement technique.
7. Write a C program to implement Producer-Consumer problem using Dekkers
algorithm
8. Write a C program to implement Bankers Algorithm.
PART B
After completion of this course student should be acquainted with theoretical aspects
of Formal Languages and Finite Automata machines.
Able to construct finite state machines and the equivalent regular expressions.
Able to prove the equivalence of languages described by finite state machines and
regular expressions.
Able to construct pushdown automata and the equivalent context free grammars.
Able to prove the equivalence of languages described by pushdown automata and
context free grammars.
Able to construct Turing machine.
TEXT BOOK:
REFERENCE BOOK:
Course Outcomes: At the end of the course, students are able to:
1. Explain syntax and semantics of different statements and functions in Python.
2. Demonstrate the use of strings, files, lists, dictionaries and tuples in simple
applications.
3. Write simple applications using regular expressions, multiple threads, different
data types.
4. Build simple database applications with GUI.
5. Analyze the given problem and select appropriate data types and modules to
develop the solution.
Unit I (10-Hours)
Variables, Expressions and statements, Conditional execution, Functions, Iterations,
Strings
Unit II (10-Hours)
Files, Lists, Dictionaries, Tuples, Regular expressions
Unit IV (10-Hours)
Text Books:
# Lab is to be evaluated for 20 marks in CIE only, theory is to be evaluated for 30 marks in CIE and
50 marks in SEE and the same scheme is applicable to elective courses on programming
languages.
COMPUTER NETWORKS
COURSE OUTCOMES
Transport Layer: Peer-to-Peer Delivery: UDP, TCP, and SCTP. Congestion Control
and Quality of Service: Data traffic, Congestion, Congestion Control, Two Examples,
Quality of Service, Techniques to improve QoS, Integrated Services, QoS in Switched
Networks.
Application Layer: Domain Name System: Name Space, Domain Name Space,
Distribution of Name Space, DNS In The Internet, Resolution, DNS Messages, Types
of records, Registrars, Dynamic Domain Name System, Encapsulation. Remote
Logging, Electronic Mail, File Transfer. WWW and HTTP: Architecture, Web
Documents, HTTP.
REFERENCE BOOKS:
UNIT I 10hrs
UNIT-II 10hrs
UNIT-IV 10hrs
TEXT BOOKS:
REFERENCE BOOKS:
1. David E Culler, J P Singh, Anoop Gupta, Harcourt Asia and Morgan Kaufmann
1999, Parallel Computer Architecture,
2. John P Hayes, 1998, Computer Architecture and Organization, 3rd Edition,
McGraw-Hill
3. Michael Quinn, Parallel Programming in C with MPI and OpenMP, Tata
McGraw Hill, 2011.
Course Outcomes
UNIT I 12 Hrs
UNIT II 12 Hrs
Graphical Input Data, Logical Classification of Input Devices, Input Functions for
Graphical Data, Interactive Picture-Construction Techniques, OpenGL Interactive
Input-Device Functions , OpenGL Menu Functions, Designing a Graphical User
Interface
Geometric Transformations-1: Basic Two-Dimensional Geometric Transformations,
Matrix Representations and Homogeneous Coordinates, Inverse Transformations,
Two-Dimensional Composite Transformations, Other Two-Dimensional
Transformations, Raster Methods for Geometric Transformations, OpenGL Raster
Transformations, Transformations between Two-Dimensional Coordinate Systems
UNIT-IV 12 Hrs
Text Books:
1. Donald Hearn and Pauline Baker, 3rd Edition ,Pearson Education, 2004,
Computer Graphics with OpenGL
References:
1. Edvard Angel, 5th Edition, Addison-Wesley, 2008, Interactive Computer
Graphics A Top-Down Approach with openGL
2. F.S.Hill Jr.2nd Edition, Pearson Education, 2001, Computer Graphics using
OpenGL
3. James D. Foley, Andries Van Dam, Steven K Feiner, John F. Hughes, Addison-
wesley 19997, Computer Graphics
COMPUTER GRAPHICS LABORATORY
Course Outcomes
At the end of the course students are able to:
1. Draw the basic geometrical using OpenGL built in functions
2. Execute the program to implement fundamental graphics algorithms
3. Develop the programs to create animation of objects using graphics
functions
4. Develop graphics applications using OpenGL programming tool.
Part-A
1. Write OpenGL program to implement Bresenhams line drawing algorithm.
2. Write OpenGL program to implement midpoint circle drawing algorithm.
3. Implement OpenGL program to draw bar chart and pie chart.
4. Write the following interactive OpenGL program
i) Draw a house using mouse to select two end point positions for straight line
ii) Display string WEL TO BEC on display window accepted from keyboard
5. Implement interactive animation programs.
Kite flying
Rotating wheel
Moving car
6. Program to recursively subdivide a triangle to form 2D Sierpinski gasket. The
number of recursive steps is to be specified by the user.
7. Program to draw a cube and spin it using OpenGL transformation matrices.
8. Program to create a house like figure and rotate it about a given fixed point using
OpenGL functions.
9. Program to implement the Cohen- Sutherland line-clipping algorithm.
10. Program to create a cylinder and a parallelepiped by extruding a circle and
quadrilateral respectively. Allow the user to specify the circle and the quadrilateral
Part- B
Develop a suitable graphics package to implement the skills learnt in the theory and
the exercises indicated in Part A. Use the OpenGL.
Lab Assessment:
1. Each laboratory subject is evaluated for 100 marks (50 CIE and 50 SEE)
2. Allocation of 50 marks for CIE
1. Marks for each experiment = 20 marks/No. Of proposed experiments
2. 10 marks for graphics package
3. one practical test for 20 marks(25% write up ,50% conduction, calculation,
25% results)
3. Allocation of 50 marks for SEE
30 marks for evaluating program (25% write up ,50% conduction, calculation,
25% results)
20 marks for evaluating graphics package.
Machine Learning
Course Objectives:
1. Introduce the fundamental concepts in machine learning and popular machine
learning problems.
2. Apply various supervised learning algorithms
3. Introduce various clustering and dimensionality reduction algorithms
Course Outcome:
1. Define machine learning and types of learning algorithms
2. Explain various machine learning algorithms
3. Apply machine learning algorithm to solve problems of moderate complexity
4. Analyze performance of algorithms by varying some parameters
5. To formulate machine learning model for the simple problems
UNIT-I (10-Hours)
Introduction: What is Machine Learning? Examples of Machine Learning
Applications. Well posed learning problems, Designing Learning System, Perspectives
and issues in Machine Learning.
Decision Tree Learning: Introduction, Decision tree representation, Appropriate
problems for decision tree learning, the basic decision tree learning algorithm,
Hypothesis space search in decision tree learning, Inductive Bias in decision tree
learning, Issues in decision tree learning
UNIT-II (10-Hours)
Artificial Neural Networks (ANN): Introduction, Neural Network Representations,
Appropriate Problems For Neural Network Learning, Perceptron, Multilayer Networks
And The Back propagation Algorithm, Remarks On The Back propagation Algorithm,
An Illustrative Example: Face Recognition.
Kernel Machines: Introduction, Optimal Separation Hyper plane, the non separable
case: soft margin hyper plane, V-SVM, Kernel Trick, Vectorial Kernels, Defining
kernel, Multiple kernel learning, Multiclass kernel machines, kernel machine for
regression, One class kernel machine
UNIT-III (10-Hours)
Bayesian learning: Introduction, Bays theorem, Maximum likelihood and least
squared hypothesis, Maximum likelihood hypothesis for predicting probabilities,
Minimum Description length principle, Bays optimal classifier, Gibbs algorithm,
Naive Bays Classifier. An Example: Classify Text. Bayesian Belief networks, EM
Algorithm
Instance Based Learning: Introduction, k-Nearest Neighbor Learning, Locally
Weighted Regression, Radial Basis function, and case based reasoning
UNIT-IV (10-Hours)
Dimensionality Reduction: Introduction, Subset Selection, Principal Components
Analysis, Factor Analysis, Multi dimensional scaling, Linear descreminant analysis,
isomap, Locally Linear Embedding
Clustering: Introduction, Mixture Densities, K-means Clustering, Expectation
Maximization Algorithm, Mixture Latent Variable models, Supervised learning after
clustering, Hierarchical clustering, Choosing the number of clusters
Text Books:
Reference Books:
1. Elements of Statistical Learning, 2nd Edition, Trevor Hastie, Robert
Tipeshirani, Jerome Fredman.
2. Introduction to Machine Learning ,NPTEL Course Material, Dr. Sudheshna
Sarkar IIT Kharakpur.
3. Building Machine Learning Systems with Python, 2nd edition, Luis Pedro
Coelho and Willi Richart, PACKT Publication.
Java and J2EE
Course Outcomes
UNIT I
10 Hours
INTRODUCTION TO JAVA: Java and Java applications; Java Development Kit
(JDK); Java is interpreted, Byte Code, JVM; Object oriented programming; Simple
Java programs. Operators and expressions: Arithmetic Operators, Relational operators,
The? Operator; Logical expression; Type casting; Strings, Control Statements:
Selection statements, iteration statements, Jump Statements. CLASSES,
PACKAGES, EXCEPTIONS Classes: Defining Class, Constructors, Inheritance,
Overriding, Final classes, Interfaces, Implementing Interfaces, Packages: Creating
Packages, Adding a class to a Package, Hiding classes, Exceptions: Types of Errors,
Syntax of Exception handling, Multiple Catch Statement.
UNIT II
10 Hours
MULTI THREADED PROGRAMMING: Creating Threads, Extending Thread
Class, Stopping and blocking thread, Thread exceptions, Thread priority,
Synchronization, Implementing runnable interface Managing I/O Files in java
Stream classes, Character stream classes, other I/o Classes, Input/output Exceptions,
Reading/ writing characters, Reading/writing Bytes, Random access files
UNIT III
10 Hours
JAVA 2 ENTERPRISE EDITION OVERVIEW, DATABASE ACCESS: Overview
of J2EE and J2SE. The Concept of JDBC; JDBC Driver Types; JDBC Packages; A
Brief Overview of the JDBC process; Database Connection; Associating the
JDBC/ODBC Bridge with the Database; Statement Objects; ResultSet; Transaction
Processing; SERVLETS: Background; The Life Cycle of a Servlet; Using Tomcat for
Servlet Development; A simple Servlet; The Servlet API; The Javax. servlet Package;
Reading Servlet Parameter; The Javax.servlet.http package; Handling HTTP Requests
and Responses; Using Cookies; Session Tracking.
UNIT IV
10 Hours
JSP, RMI: Java Server Pages (JSP): JSP, JSP Tags, Tomcat, Request String, User
Sessions, Cookies, Session Objects. Java Remote Method Invocation: Remote Method
Invocation concept; Server side, Client side. ENTERPRISE JAVA BEANS:
Enterprise java Beans; Deployment Descriptors; Session Java Bean.
TEXT BOOKS:
REFERENCE BOOKS:
Course Outcomes:
Unit I
Unit II
Unit III
Unit - IV
Text books:
Reference books:
COURSE OUTCOMES
PART A
Simulation Exercises
Introduction Part
Introduce students to network simulation through the Network simulation Package,
Create a simple network model with multiple scenarios, Collect statistics on network
performance through the use of simulator tools, Analyze and draw conclusion on
network performance
1. Simulate two nodes point-to-point network and study the impact of bit error rate on
packet error rate and investigate the impact of error of a simple hub based CSMA /
CD network.
2. Simulate four nodes point-to-point network and study how the loss, utilization and
transmission of wireless LAN (IEEE 802.11b) network varies as the distance
between access point and wireless nodes.
3. Simulate point-to-point network which consists of 4 to 6 nodes and study network
performance analysis of different scheduling technique like First In Out (FIFO),
Priority, Round Robin, Weight Fair Queue (WFQ) using NetSim.
4. Simulate and study the throughputs of slow start, Congestion avoidance (also
known as Old Tahoe) and First Retransmit (also known as Tahoe), Congestion
Control Algorithms during client-server TCP downloads.
5. Create a network topology which consists six nodes, simulate and study the
working and routing table formation of Interior Routing Protocol i.e. Routing
Information Protocol (RIP) and Open Shortest Path First (OSPF).
6. Simulate seven cells GSM network and study and compare the effect of dynamic
channel allocation (DCA) and fixed channel allocation (FCA) using NetSim.
7. Simulate seven cells GSM network and study how call blocking probability varies
as the load on a GSM network is continuously increased.
PART B
1. Write a program for error detecting code using CRC-CCITT (16- bits).
2. Write a program for Hamming code generation for error detection and correction.
3. Write a program for even / odd parity checking on binary data.
4. Write a program to perform stuffing and destuffing on given information.
5. Write a program for distance vector algorithm to find suitable path for
transmission.
6. Write a program for congestion control using leaky bucket algorithm
7. Using TCP/IP sockets, write a client server program to make the client send the
file name and to make the server send back the contents of the requested file if
present.
8. Implement the program 7 using the message queues IPC channels.
9. Implement the program 7 using the FIFO IPC channels:
10. Write a program for simple RSA algorithm to encrypt and decrypt the data.
Note:
Student is required to solve one problem from PART-A and one problem from PART-
B. The questions are allotted based on lots. Both questions carry equal marks.
B. V. V. Sangha s
Basaveshwar Engineering College (Autonomous), Bagalkot
Department of Computer Science and Engineering
Subject Hrs/Week
Sl.No Subjects C CIE *SEE Total
Code L T P
Object Oriented Modeling and
1 UCS711C 3 0 0 3 50 50 100
Design
2 UCS712C Web Technologies 3 0 0 3 50 50 100
Business communication &
3 UCS713H 3 0 0 3 50 50 100
Technical Writing
UCS714C Mobile Computing Systems 3 0 0 3
4 Elective 6 3 0 0 3 50 50 100
5 Elective-7 3 0 0 3 50 50 100
7 UCS714L Web Programming Laboratory 0 0 3 1.5 50 50 100
Object Oriented Modeling and
8 UCS715L 0 0 3 1.5 50 50 100
Design Laboratory
9 UCS716P Project Phase-I 0 0 4 4 50 50 100
Total 18 0 8 25 450 450 900
Course Outcomes:
At the end of the course the student should be able to
1. Explain the concepts of Object Oriented Modeling and Design.
2. Analyze user requirements for an application.
3. Design various models using Unified Modeling Language.
4. Comprehend the nature of design patterns by understanding small number of
examples from different categories.
5. Develop an application of Object Oriented Modeling and Design practices
from software project management perspectives.
.
TEXT BOOKS:
REFERENCE BOOKS:
rd
1. Object-Oriented Analysis and Design with Applications Grady Booch et al, 3
Edition, Pearson Education, 2007.
2. Object-Oriented Design with UML and JAVA K. Barclay, J. Savage, Elsevier,
2008.
3. The Unified Modeling Language User Guide Booch, G., Rumbaugh, J., and
nd
Jacobson I, 2 Edition, Pearson, 2005.
4. Design Patterns: Elements of Reusable Object-Oriented Software E. Gamma,
R. Helm, R. Johnson, J. Vlissides, Addison-Wesley, 1995.
WEB TECHNOLOGIES
Course Outcome:
1. Understand the basic concepts and tools used in web programming.
2. Apply web programming concepts to develop web pages.
3. Analyze the given requirement specification to develop any business
applications.
4. Design and implement real time web applications.
Fundamentals of Web, XHTML : Internet, WWW, Web Browsers, and Web Servers;
URLs; MIME; HTTP; Security; The Web Programmers Toolbox. XHTML: Origins
and evolution of HTML and XHTML; Basic syntax; Standard XHTML document
structure; Basic text markup. XHTML : Images; Hypertext Links; Lists; Tables;
Forms; Frames; Syntactic differences between HTML and XHTML. CSS:
Introduction; Levels of style sheets; Style specification formats; Selector forms;
Property value forms; CSS: Font properties; List properties; Color; Alignment of text;
The Box model; Background images; The <span> and <div> tags; Conflict resolution.
Text Books:
1. Programming the World Wide Web Robert W. Sebesta, 4th Edition, Pearson
Education, 2008.
2. Java Server Programming Java EE5” Black Book, Dreamtech Press.
3. Jack Franklin “Beginning Jquery” Apress.
4. References:
5. Andrew Trolsen, 2007, ―C# and the .NET platform”, Second Edition, Dream tech
Press,
6. M. Deitel, P.J. Deitel, A. B. Goldberg, ―2004, India Internet & World Wide Web
How to program ―, 3rd Edition, Pearson Education / PHI
7. Chris Bates, 2006, ―Web Programming Building Internet Applications‖,3rd
edition, Wiley India
8. Xue Bai et al, Thomson, 2003,‖The Web Warrior Guide to Web Programming”
BUSINESS COMMUNICATION AND TECHNICAL
WRITING
Course outcomes:
Text Books:
1. Urmila Rai nad S,M Rai ,Business Communication, Himalaya Publishing House.
(chapters 1-7)
2. Lesikar and Fatley , Basics Business communication Skills for Empowering the
Internet Generation 10 th edition, Tata McGraw Hill edition,ISBN:
780070599758.(Chapter 4)
3. Meenakshi Raman and Sangeeta Sharma Technical Communication Principles
and practices, Oxford University Press, ISBN13 9780195668049. (Chapters: 9-
11, 13-17)
4. Meenakshi Raman and Prakash Singh Business Communication, Oxford
University Press, ISBN13: 9780195676952. ( Chapter s 3-4)
MOBILE COMPUTING SYSTEMS
General packet radio services (GPRS): GPRS functional Groups, Architecture, GPRS
network nodes, GPRS interfaces, GPRS procedures, Billing , Wireless application
Protocol (WAP): WAP Gateway, WAP protocols, WAP UAprof and caching. Third
Generation mobile services: W-CDMA and CDMA 2000. Improvements on core
network, QoS in 3G, Wireless OS for 3G Handset, Third generation systems.
Mobile Internet and Wireless Web: Web programming model, WAP programming
model, WAP protocol stack, WAP gateway, Mobile Agents, Characterstics of mobile
agents, Requirements for mobile agent systems, Mobile agents plateforms : Aglet
,Aglet Tcl, PMADE, security issuess in mobile
Computing: Security threats to wireless networks, IEEE 802.11 security through WEP.
TEXTBOOKS:
1. Yi-Bing Lin, Imrich chlamtac Wireless and mobile network architectures Wiley
2. Kumkum harg Mobile computing : Theory & Practice pearson Education India.
REFERENCES:
1. Dr. Ashok Talukder, Ms Roopa Yavagal, Mr. Hasan Ahmed: Mobile Computing,
Technology, Applications and Service Creation 2d Edition, Tata McGraw Hill,
2010
2. Martyn Mallik: Mobile and Wireless Design Essentials Wiley, 2003
3. Raj kamal: Mobile Computing, Oxford University Press, 2007.
4. Iti Saha Misra: Wireless Communications and Networks, 3G and Beyond, Tata
McGraw Hill, 2009.
Computer Networks Security
Course outcomes
At the end of the course, the students will be able to
1) Identity and analyze the existing security vulnerabilities, services and
mechanisms in a computer network and develop a security model to prevent,
detect and recover from the attacks.
2) Illustrate the basic concept of encryption and decryption for secure data
transmission and apply them
3) Analyze and compare various cryptography techniques, authentication and key
management protocols
4) Explain the services and mechanisms employed at the different layers of the
OSI to provide security.
5) Evaluate the existing computing systems and propose new strategies to secure
data communication.
Text book:
UNIT-I (9 Hours)
REFERENCE BOOKS:
Course Outcome:
1. Implement static web pages using basic concepts of web programming
2. Implement dynamic web pages using basic concepts of web programming
3. Demonstrate 2-tier dynamic web pages using mysql and jstl,jsp
4. Design and implement real time web applications.
1. Develop a XHTML document to create bio-data using external style sheet, ordered
list, table, borders, padding, color and the <span> tag.
2. A) Develop a XHTML file that includes JavaScript for the following problems:
Input: percentage marks of the student Output: Display result.
3. Write a XHTML form for Employee information like Emp_id, Name, Department
Name, Phone, Email check the validation for each fields(the first character of
Emp_id is followed by number ,name should accept 20 characters, Phone max 8
digits, email) using event handler in JavaScript.
5. Develop and demonstrate, using JavaScript, a XHTML that changes the content of
XHTML elements by assisting to a user filling out a form associated with text area,
called a help box. The content of help box can change, depending on the placement
of the mouse cursor. When a cursor is placed over particular input field, the help
box can display advice on how field is to be filled.
6. Write an XML file which will display the student information whichincludes
the following:
a. USN
b. Name of student
c. Banch
d. CGPA
Make up sample data for 3 students. Write a Document Type Definition (DTD)
to validate the above XML file. Display the XML file as follows. The contents
should be displayed in a table. Use XML and CSS for the above purpose.
7. Write program using XSLT and XML for displaying student details based on
ranking of CGPA
8. Create a XHTML document which allows user to select the course. Once user
selects course, it should display course id,course name,course description
information using jsp and javabean.
9. Create a form with Name, USN, three test marks text fields. On submitting,
store the values in database table along with total marks scored. Retrieve and
display the database (Using Java Server Program). . Event handler must be
included for the form element that collects every information to validate the
input. Messages in the alert dialog box must be produced when errors are
detected.
10. Write dynamic XHTML document to list student names from database and
search for a particular student details using JSP.
1. Design the models for real world applications using UML diagrams.
2. Implement the applications using JAVA programming language.
3. Trace the behavior and analyze how various scenarios play out.
4. Describe a set of object oriented concepts and language independent graphical
notation that can be used to analyze problem requirements.
5. Use UML as communication and modeling tool.
ASSIGNMENTS
Analyze and design the following Systems with all specifications using the UML
diagrams
1. Class Diagram ii) Usecase Diagram iii) Sequence diagram
2. State Chart Diagram v) Activity Diagram
Students are expected to submit the list of group members for the project work with
consent of the guide. The students who are submitting the list without guide consent
for them department will allocate guides. The Phase I include
1. Deciding the broad area for project work
2. Sufficient literature Survey (includes Research papers, technical reports, white
papers, manuals and survey reports).
3. Identification of Issues and defining problem.
4. A report containing summary of survey made covering issues and problem
definition with print outs of all literature documents.
5. Submission and presentation of term paper by project team.
6. A term paper is a research paper written by students over an academic term
or semester which accounts for a large amount of a grade and makes up much
of the course. Term papers are generally intended to describe an event or
concept or argue a point. There is much overlap between the terms "research
paper" and "term paper". The phrase "term paper" was originally used to
describe a paper (usually a research based paper) that was due at the end of the
"term" - either a semester or quarter, depending on which unit of measure a
school used. Common usage has "term paper" and "research paper" as
interchangeable, but this is not completely accurate. Not all term papers
involve academic research, and not all research papers are term papers.
Hrs/Week
Sl.No Subject Code Subjects C CIE *SEE Total
L T P
1 elective 8 3 0 0 3 50 50 100
2 elective 9 3 0 0 3 50 50 100
elective 10 3 0 0 3 50 50 100
Course Outcome:
1. Understand the definition of cloud computing, its advantages, characteristics, challenges and
platforms.
2. Describe cloud computing architecture, reference model, types of cloud, service models
with respect to all service models etc.
3. Deploy cloud instances in Aneka cloud computing platform and threading programming of
Aneka.
4. Analyze virtualization technology, Cloud Platforms in Industry and High Throughput and
Data Intensive Computing, etc.
5. Evaluate the security related to multi-tenancy and appraise compliance issues that arise from
cloud computing.
Unit-I(10 Hours)
Cloud Computing Architecture: Introduction, Cloud Reference Model, Types of Clouds, Economics
of Cloud, Open Challenges.
Aneka: Cloud Application Platform: Framework Overview, Anatomy of the Aneka Container,
Building Aneka Clouds, Cloud Computing and Management.
Cloud Platforms in Industry: Amazon Web Services, Google AppEngine, Microsoft Azure.
Text Books:
Reference Book:
Course Outcomes:
At the end of the course, student should be able to:
1) List the concepts tools and technologies for big data analytics.
2) Explain the big data and analytics concepts and tools and technologies used for it.
3) Apply the MongoDB, Hive and Pig query language to solve the given problems.
4) Investigate the given real time scenario and use suitable techniques to extract insights from
the data.
5) Design a solution for data analytics problems by combining two or more analytics and
techniques to enhance the value of the enterprise by extracting knowledge from the big data.
Unit- I 10 Hours
Unit- II 10 Hours
The big data technology landscape: NoSQL (Not Only SQL), Hadoop. Introduction to Hadoop:
Introducing Hadoop, significance of Hadoop, RDBMS versus Hadoop, Distributed Computing
Challenges, History of Hadoop, Hadoop Overview, Use Case of Hadoop, Hadoop Distributors,
HDFS (Hadoop Distributed File System), Processing Data with Hadoop, Managing Resources and
Applications with Hadoop YARN (Yet another Resource Negotiator), Interacting with Hadoop
Ecosystem.
Introduction to MongoDB: Definition and Features of MongoDB, Terms Used in RDBMS and
MongoDB, Data Types in MongoDB, MongoDB Query Language.
Unit- IV 10 Hours
Hive: Definition and features of Hive, Hive Architecture, Hive Data Types, Hive File Format, Hive
Query Language (HQL), RCFile Implementation, SerDe, User-Defined Function (UDF). Pig: Pig
and its features, The Anatomy of Pig, Pig on Hadoop, Pig Philosophy, Use Case for Pig: ETL
Processing, Pig Latin Overview, Data Types in Pig, Running Pig, Execution Modes of Pig, HDFS
Commands, Relational Operators, Eval Function, Complex Data Types, Piggy Bank, User-Defined
Functions (UDF), Parameter Substitution, Diagnostic Operator, Word Count Example using Pig,
uses of Pig, Pig versus Hive.
Text Book:
1. Big Data and Analytics, Seema Acharya and Subhashini Chellappan Wiley India, First edition
(rp) 2016.
Reference Books:
1. Frank J. Ohlhorst, Big Data Analytics: Turning Big Data into Big Money, Wiley India Pvt.
Ltd., 2012.
2. Michael Berthold, David J. Hand, Intelligent Data Analysis, Springer, 2007.
3. Paul Zikopoulos, Dirk deRoos, Krishnan Parasuraman, Thomas Deutsch , James Giles, David
Corrigan, Harness the Power of Big data The big data platform, McGraw Hill, 2013.
Internet of Things
Sub Code : UCS066E Credits : 3
Hours/Week : 03 CIE MARKS : 50
Total Hours : 40 SEE Marks : 50
Course outcomes
1. Interpret the impact and challenges posed by IoT networks leading to new
architectural models.
2. Compare and contrast the deployment of smart objects and the technologies to connect
them to network.
3. Appraise the role of IoT protocols for efficient network communication. Elaborate the need
for Data Analytics and Security in IoT.
4. Illustrate different sensor technologies for sensing real world entities and identify the
applications of IoT in Industry.
5. Elaborate the need for Data Analytics and Security in IoT.
UNIT-I (10-Hours)
What is IoT, Genesis of IoT, IoT and Digitization, IoT Impact, Convergence of IT and IoT, IoT
Challenges, IoT Network Architecture and Design, Drivers Behind New Network Architectures,
Comparing IoT Architectures, A Simplified IoT Architecture, The Core IoT Functional Stack, IoT
Data Management and Compute Stack. Smart Objects: The Things in IoT, Sensors, Actuators,
and Smart Objects, Sensor Networks, Connecting Smart Objects, Communications Criteria, IoT
Access Technologies.
UNIT-II(10-Hours)
IP as the IoT Network Layer, The Business Case for IP, The need for Optimization, Optimizing IP
for IoT, Profiles and Compliances, Application Protocols for IoT, The Transport Layer, IoT
Application Transport Methods. Data and Analytics for IoT, An Introduction to Data Analytics for
IoT, Machine Learning, Big Data Analytics Tools and Technology, Edge Streaming Analytics,
Network Analytics.
UNIT-III(10-Hours)
Securing IoT, A Brief History of OT Security, Common Challenges in OT Security, How IT and OT
Security Practices an d Systems Vary, Formal Risk Analysis Structures: OCTAVE and FAIR, The
Phased Application of Security in an Operational Environment IoT Physical Devices and Endpoints
- Arduino UNO: Introduction to Arduino, Arduino UNO, Installing the Software, Fundamentals of
Arduino Programming. IoT Physical Devices and Endpoints - RaspberryPi: Introduction to
RaspberryPi, About the RaspberryPi Board: Hardware Layout.
UNI- IV(10-Hours)
Text Books:
1. David Hanes, Gonzalo Salgueiro, Patrick Grossetete,Robert Barton, Jerome Henry, "IoT
Fundamentals: Networking Technologies, Protocols, and Use Cases for the Internet of
Things , Edition, Pearson Education (Cisco Press Indian Reprint). (ISBN:978-9386873743)
2. Srinivasa K G, Internet of Things,CENGAGE Leaning India, 2017
Reference Books:
Course outcomes
At the end of the course, the students will be able to
Anticipate the issues related to data mining process, different data types and apply the
preprocessing techniques to improve the data quality.
Apply the data mining techniques of clustering, classification, association finding and
outlier analysis on the real world data
UNIT I 10 Hours
INTRODUCTION, DATA 1: What is Data Mining? Motivating Challenges; The origins of data
mining; Data Mining Tasks. Types of Data; Data Quality. DATA 2: Data Preprocessing; Measures
of Similarity and Dissimilarity
UNIT II 10 Hours
TEXT BOOKS:
1. Pang-Ning Tan, Michael Steinbach, Vipin Kumar, 2007, Introduction to Data Mining, Pearson
Education,
2. Jiawei Han and Micheline Kamber,2006, Data Mining Concepts and Techniques, 2nd Edition,
Morgan Kaufmann.
REFERENCE BOOK:
1. K. P. Soman, Shyam Diwakar, V. Ajay, 2006, Insight into Data Mining Theory and Practice ,
PHI.
PROJECT PHASE II
Note:
1. Demonstration/Presentations are evaluated by the Departmental Project Evaluation Committee
(DPEC) comprising of Guide, HOD and Project Coordinator of the Department and reports are
evaluated by the Guide.
2. In Semester End Examination (SEE) Project Work is evaluated jointly by Internal, External
Examiners and HOD/Nominee.
Seminar
Sub Code : UCS813S Credits : 1
Hours/Week : 2 hours CIE MARKS : 50
Exam Hours : 3 hours SEE Marks : 50
Seminars are used as course delivery modes to encourage students to gather current trends in
technology, research literature, and self-learn topics of their interest. Seminars require students to
research a technical topic, make presentations and write a detailed document on their findings
individually under the guidance of faculty.