B.SC CSIT Micro Syllabus - Semester V
B.SC CSIT Micro Syllabus - Semester V
Course Description: This course introduces basic elements of the design and analysis of computer
algorithms. Topics include asymptotic notations and analysis, divide and conquer strategy, greedy
methods, dynamic programming, basic graph algorithms, NP-completeness, and approximation
algorithms. For each topic, beside in-depth coverage, one or more representative problems and their
algorithms shall be discussed.
Course Objectives:
Analyze the asymptotic performance of algorithms.
Demonstrate a familiarity with major algorithm design techniques
Apply important algorithmic design paradigms and methods of analysis.
Solve simple to moderately difficult algorithmic problems arising in applications.
Able to demonstrate the hardness of simple NP-complete problems
Course Contents:
Unit 1: Foundation of Algorithm Analysis (4)
1.1. Algorithm and its properties, RAM model, Time and Space Complexity, detailed analysis
of algorithms (Like factorial algorithm), Concept of Aggregate Analysis
1.2. Asymptotic Notations: Big-O, Big-Ω and Big-Ө Notations their Geometrical Interpretation
and Examples.
1.3. Recurrences: Recursive Algorithms and Recurrence Relations, Solving Recurrences
(Recursion Tree Method, Substitution Method, Application of Masters Theorem)
50
Unit 5: Dynamic Programming (8)
5.1. Greedy Algorithms vs Dynamic Programming, Recursion vs Dynamic Programming,
Elements of DP Strategy
5.2. DP Algorithms: Matrix Chain Multiplication, String Editing, Zero-One Knapsack
Problem, Floyd Warshwall Algorithm, Travelling Salesman Problem and their
Analysis.
5.3. Memoization Strategy, Dynamic Programming vs Memoization
Laboratory Work:
This course can be learnt in effective way only if we give focus is given in practical aspects of
algorithms and techniques discussed in class. Therefore student should be able to implement the
algorithms and analyze their behavior. Students should:
Implement comparison sorting algorithms and perform their empirical analysis.
Implement divide-and-conquer sorting algorithms and perform their empirical analysis.
Implement algorithms for order statistics and perform their empirical analysis.
Implement algorithms by using Greedy, DP and backtracking paradigm
Implement NP-complete problems and realize their hardness.
Recommended Books:
1. Thomas H. Cormen, Charles E. Leiserson, Ronald L. Rivest and Clifford Stein,
“Introduction to algorithms”, Third Edition.. The MIT Press, 2009.
2. Ellis Horowitz, Sartaj Sahni, Sanguthevar Rajasekiaran, “Computer Algorithms”, Second
Edition, Silicon Press, 2007.
3. Kleinberg, Jon, and Eva Tardos, “ Algorithm Design” , Addison-Wesley, First Edition,
2005
51
System Analysis and Design
Course Description: This course familiarizes students with the concepts of information systems
development including systems development life cycle, different approaches to systems
development, project management, planning, analysis, design, implementation and maintenance.
This course also covers some fundamental concepts of object oriented systems analysis and design.
Course Objectives: The main objective of this course is to provide knowledge of different concepts
of system analysis and design so that students will be able to develop information systems using
different methodologies, tools, techniques, and approaches.
Course Contents:
Unit 1: Foundations for Systems Development (10 Hrs.)
1.1.The Systems Development Environment: Introduction; A Modern Approach to Systems
Analysis and Design; Developing Information Systems and the Systems Development Life
Cycle; The Heart of the Systems Development Process and Traditional Waterfall SDLC; CASE
Tools
1.2.Other Approaches: Prototyping; Spiral; Rapid Application Development; Introduction to Agile
Development
1.3.Managing the Information Systems Project: Introduction; Managing the Information Systems
Project; Representing and Scheduling Project Plans; Using Project Management Software
52
4.3.Designing Interfaces and Dialogues: Introduction; Designing Interfaces and Dialogues;
Interaction Methods and Devices; Designing Interfaces; Designing Dialogues; Designing
Interfaces and Dialogues in Graphical Environments
Laboratory / Project Work: In the practical session, students will learn to use project
management, CASE, and modeling tools. They also prepare a project report that includes at least
analysis, design, and implementation phases of system analysis and design. The project can be done
in groups with at most four members in each group using any suitable database, programming, and
interfacing technologies.
Text Books:
1. Joseph S. Valacich and Joey F. George, Modern Systems Analysis and Design, 8th Edition,
Pearson
2. Alan Dennis, Barbara Haley Wixom, and David Tegarden, Systems Analysis and Design – An
Object-Oriented Approach with UML, 5th Edition, Wiley
References Books:
1. Kenneth E. Kendall and Julie E. Kendall, System Analysis and Design, 9th Edition, Pearson
2. Jeffrey Whitten and Lonnie Bently, System Analysis and Design Methods, 7th Edition
3. Scott Tilley and Harry J. Rosenblatt, System Analysis and Design, 11th Edition
53
Cryptography
Course Description: The course introduces the underlying the principles and design of
cryptosystems. The course covers the basics concepts of cryptography including: traditional ciphers,
block ciphers, stream ciphers, public and private key cryptosystems. The course also includes the
theory of hash functions, authentication systems, network security protocols and malicious logic.
Course Objectives: The objectives of this course are to familiarize the students with cryptography
and its applications. The students will be able to develop basic understanding of cryptographic
mechanisms.
Course Contents:
Unit I: Introduction and Classical Ciphers (7 hr)
1.4. Security: Computer Security, Information Security, Network Security, CIA Triad,
Cryptography, Cryptosystem, Cryptanalysis, Security Threats and Attacks, Security Services,
Security Mechanisms
1.5. Classical Cryptosystems:
Substitution Techniques: Ceasar, Monoalphabetic, Playfair, Hill, Polyalphabetic ciphers,
One-time pad
Transposition Techniques: Rail Fence Cipher
1.6. Modern Ciphers: Block vs. Stream Ciphers, Symmetric vs. Asymmetric Ciphers
Laboratory Works:
The laboratory work includes implementing and simulating the concepts of cryptographic
algorithms, hash functions, digital signatures, network security protocols and malicious logic.
Students are free to use any of the language and platform as per the skills.
Text Book:
1. W. Stallings, Cryptography and Network Security, Pearson Education.
Reference Books:
1. William Stallings, Network Security, Principles and Practice.
2. Matt Bishop, Computer Security, Art and Science.
3. Mark Stamp, Information Security: Principles and Practices.
4. Bruce Schneier, Applied Cryptography.
5. Douglas. R. Stinson. Cryptography: Theory and Practice.
6. B. A. Forouzan, Cryptography & Network Security, Tata Mc Graw Hill.
55
Simulation and Modeling
Course Description: The syllabus consists of introduction to system, modeling and simulation of
different types of systems. It includes the modeling of systems, its validation, verification and
analysis of simulation output. It comprises the concept of queuing theory, random number
generation as well as study of some simulation languages.
Course Objective: To make students understand the concept of simulation and modeling of real
time systems.
Course Contents:
Unit 1: Introduction to Simulation (6 Hours)
System and System Environment, Components of System, Discrete and Continuous System,
System Simulation, Model of a System, Types of Model, Use of Differential and Partial differential
equations in Modeling, Advantages, Disadvantages and Limitations of Simulation, Application
Areas, Phases in Simulation Study
56
Unit 8: Simulation of Computer Systems (9 Hours)
Simulation Tools, Simulation Languages: GPSS, Case Studies of different types of Simulation
Models and Construction of sample mathematical models
Laboratory Work:
Practical should include the simulation of some real time systems (continuous and discrete event
systems), Queuing Systems, Random Number generations as well as study of Simulation Tools and
Language
Text Book:
1. Jerry Banks, John S. Carson, Barry L. Nelson, David M. Nicole, “Discrete Event system
simulation”, 5th Edition, Pearson Education
Reference Books:
1. Geoffrey Gordon: System Simulation
2. Law, "Simulation Modeling and Analysis", 5th Edition, McGraw-Hill
57
Web Technology
Course Description: This course covers the fundamental concepts of HTML, CSS, JavaScript,
XML, and PHP.
Course Objectives: The main objective of this course is to provide basic knowledge of web design
using HTML and CSS, client side scripting using JavaScript, handling web data using XML and
server side scripting using PHP.
Course Contents:
Unit 1: Introduction (3 Hrs.)
Web Basics: Internet, Intranet, WWW, Static and Dynamic Web Page; Web Clients; Web Servers;
Client Server Architecture: Single Tier, Two-Tier, Multi-Tier; HTTP: HTTP Request and
Response; URL, Client Side Scripting, Server Side Scripting, Web 1.0, Web 2.0
Laboratory Works:
The laboratory work includes creating web pages and applications with using HTML, CSS,
JavaScript, XML, and PHP. Students have to prepare a web based application, using above
mentioned technologies, as a project work.
Text Books:
1. Web Design with HTML, CSS, JavaScript and jQuery Set, Jon Duckett, John Wiley & Sons
2. Web Technologies: A Computer Science Perspective, Jeffrey C. Jackson , Pearson Prentice
Hall
3. Learning PHP, MySQL & JavaScript: with jQuery, CSS & HTML5, Robin Nixon, O’Reilly
4. PHP & MySQL: Server-side Web Development, Jon Ducket, Wiley
Reference Books:
1. HTML5 and CSS3 for the Real World”, Estelle Weyl, Louis Lazaris, Alexis Goldstein,
Sitepoint
2. HTML & CSS: Design and Build Websites, Jon Duckett, John Wiley & Sons
3. Dynamic Web Programming and HTML5, Paul S. Wang, CRC Press
4. HTML5 Programming with JavaScript for Dummies, John Paul Mueller
5. JavaScript and JQuery: Interactive Front-end Web Development, Jon Duckett, Wiley
6. The Complete Reference: HTML and CSS, Thomas A. Powell, Mc Graw Hill
7. JavaScript: The Web Technologies Series, Don Gosseli, Course Technology Cengage Learning
8. Web Technologies: HTML, JAVASCRIPT, PHP, JAVA, JSP, ASP.NET, XML and AJAX,
Black Book, Dreamtech Press
9. An Introduction to XML and Web Technologies, Anders Møller and Michael I. Schwartzbach,
Addison-Wesley
10. PHP and MySQL Web Development, Luke Welling, Addison Wesley
11. www.w3schools.com
59
Multimedia Computing
Course Description: This course familiarizes students with the concepts of multimedia computing
including sound, image, video, animations, data compression, and multimedia applications.
Course Objectives: The main objective of this course is to provide knowledge of different concepts
of multimedia computing and their applications.
Course Contents:
Unit 1: Introduction (5 Hrs.)
Global Structure of Multimedia; Multimedia Application; Medium; Multimedia System and
Properties; Characteristics of a Multimedia System; Challenges for Multimedia Systems;
Components of a Multimedia System
Laboratory Work: The laboratory work includes writing programs of different concepts of
multimedia computing.
60
Recommended Books:
1. Multimedia: Computing, Communications and Applications, Ralf Steinmetz and Klara
Nahrstedt, Pearson Education Asia
2. Multimedia Communications, Applications, Networks, Protocols and Standards, Fred Halsall,
Pearson Education Asia
3. Multimedia Systems, John F. Koegel Buford, Pearson Education Asia
61
Wireless Networking
Course Description: This course familiarizes students with different concepts of wireless
networking including wireless channels, communication techniques, cellular communications,
mobile network, and advanced features.
Objective: The main objective of this course is to provide concepts and principles of wireless
networking including protocol stacks and standards with the evolution of latest wireless networks.
Laboratory Works:
1. Implement DSSS, Channel coding, line coding in MATLAB or equiv. tool
2. Analyze performance of WiMAX/WiFi network using NetSim or equiv. tool.
3. Develop QPSK detector and understand the relation between BER and SNR.
4. Implement various pulse shaping filers implemented in wireless communication.
5. Implement wireless routing protocol: DSDV & AODV
6. Create IPv6 based (Ad-hoc & Infrastructure) wireless network environment and evaluate
connectivity, delay, latency, throughput etc.
7. Understand Contiki OS and implement IoT/WSN
Recommended Books:
1. Vijay Garg. “Wireless Communications and networking”, First Edition, Elsevier 2007
2. John W. Mark and Weisua Zhuang. “Wireless communications and Networing”, Prentice
hall of India Pvt. Ltd., 2005
3. Jochen Schiller, ”Mobile Communications”, Second Edition, Pearson Education 2012
4. Simon Haykin , Michael Moher, David Koilpillai, “Modern Wireless
Communications”, First Edition, Pearson Education 2013
63
Image Processing
Course Description: This course covers the investigation, creation and manipulation of digital
images by computer. The course consists of theoretical material introducing the mathematics of
images and imaging. Topics include representation of two-dimensional data, time and frequency
domain representations, filtering and enhancement, the Fourier transform, convolution,
interpolation. The student will become familiar with Image Enhancement, Image Restoration,
Image Compression, Morphological Image Processing, Image Segmentation, Representation and
Description, and Object Recognition.
Course Objectives: The objective of this course is to make students able to:
develop a theoretical foundation of Digital Image Processing concepts.
provide mathematical foundations for digital manipulation of images; image acquisition;
preprocessing; segmentation; Fourier domain processing; and compression.
gain experience and practical techniques to write programs for digital manipulation of
images; image acquisition; preprocessing; segmentation; Fourier domain processing; and
compression.
Course Contents:
Unit 1: Introduction (5 Hrs.)
Digital Image, A Simple Image Model,Fundamental steps in Image Processing, Elements of Digital
Image Processing systems, Element of visual perception, Sampling and Quantization, Some basic
relationships like Neighbors, Connectivity, DistanceMeasures between pixels
Laboratory Work: Students are required to develop programs in related topics using MatLab or
suitable programming language.
Text Books:
1. Rafael C. Gonzalez and Richard E. Woods, “Digital Image Processing”, Pearson Edition,
Latest Edition.
Reference Books:
1. I. Pitas, "Digital Image Processing Algorithms", Prentice Hall, Latest Edition.
2. A. K. Jain, “Fundamental of Digital Image processing”, Prentice Hall of India Pvt. Ltd.,
Latest Edition.
3. K. Castlemann, “Digital image processing”, Prentice Hall of India Pvt. Ltd., Latest Edition.
4. P. Monique and M. Dekker, “Fundamentals of Pattern recognition”, Latest Edition.
65
Knowledge Management
Course Description: This course introduces fundamental concept of knowledge and different l
issues in managing the knowledge.
Course Objective: This course enables to learn about the Evolution of Knowledge management, be
familiar with tools, be exposed to applications, and be familiar with some case studies.
Course Contents:
Unit 1: (9 Hrs.)
5. An Introduction to Knowledge Management, The foundations of knowledge management,
Cultural issues, Technology applications organizational concepts and processes,
Management aspects, decision support systems.
6. The Evolution of Knowledge management: From Information Management to Knowledge
Management, Key Challenges Facing the Evolution of Knowledge Management, Ethics
for Knowledge Management.
Unit 2: (9 Hrs.)
2.1 Organization and Knowledge Management, Building the Learning Organization.
Knowledge Markets: Cooperation among Distributed Technical Specialists, Tacit
Knowledge and Quality Assurance.
Unit 4: (8 Hrs.)
4.1. Components of a Knowledge Strategy - Case Studies (From Library to Knowledge Center,
Knowledge Management in the Health Sciences, Knowledge Management in Developing
Countries).
Unit 5: (9 Hrs.)
5.1. Advanced topics and case studies in knowledge management - Development of a
knowledge management map/plan that is integrated with an organization's strategic
and business plan - A case study on Corporate Memories for supporting various aspects in
the process life -cycles of an organization
Laboratory Works:
Upon completion of the course, the student should be able to:
Use the knowledge management tools.
Develop knowledge management Applications.
Design and develop enterprise applications.
66
Text Book:
1. Srikantaiah. T. K., Koenig, M., “Knowledge Management for the Information Professional”
Information Today, Inc., 2000.
Reference Books:
1 Nonaka, I., Takeuchi, H., “The Knowledge-Creating Company: How Japanese Companies
Create the Dynamics of Innovation”, Oxford University Press, 1995.
67
Society and Ethics in Information Technology
Course Description:
This course covers different concepts related with sociology, and social and ethical issues related
with the use of Information Technology. This course also covers social context of computing,
software issues and new frontiers of computer ethics.
Course Objective:
The basic objective of this course is to provide fundamental knowledge on the concept of sociology
to understand social, cultural, economic, political and technical aspects, and knowledge of different
social and ethical issues related with Information Technology.
68
Unit 9: New Frontiers for Computer Ethics [7 Hrs.]
Artificial Intelligence ad Ethics; Virtualization, Virtual Reality, and Ethics; Cyberspace and Ethics;
Cyberbullying
Recommended Books:
1. Alex Inkles, “What is Sociology? Introduction in the Discipline & Profession”, Prentice Hall of
India
2. Joseph Migga Kizza, Ethical and Social Issues in the Information Age, Springer International
Publishing , 6th Edition, 2017
3. Michael J. Quinn, Ethics for the Information Age, 7th Edition, Pearson Education, 2017
4. G. M. Foster, “Traditional Culture & Impact of Technological Change”
5. C.N.S. Rao, “Principle of Sociology with an Introduction of Social Thought”, S. Chand & Co.
Ltd.
6. Pratley Peter, “The Essence of Business Ethics”, Prentice Hall of India, New Delhi
7. A .Giddens & D. Mitchell, “Introduction to Sociology”, 3rd Ed., London, W.W. Norton &
company
69
Microprocessor Based Design
Course Objective: The course objective is to demonstrate the concept of microprocessor and to be
able to design a microprocessor based system to get desired results. It also emphasizes on hardware
interfacing of 8051 to develop solutions of real world problems.
Course Contents:
Unit 1: Introduction to Microcontroller (12 Hrs.)
Overview of Typical Microcontroller, The Picocontroller, The Microcontroller’s Memory, The
Central Processor, Timing, The I/O Interface, The Address, Data, and Control Buses, The
Picocontroller Design, Software/Firmware Development Architecture, Interfacing, Interfacing
Types, Interfacing Techniques, Introduction of PIC, and ARM
Laboratory works:
Programming and Application development around 8051, Interfacing to ADC, DAC, and Sensors
Recommended Books:
1. D. V. Hall, Microprocessors and Interfacing - Programming and Hardware, McGraw
Hill
2. K. J. Ayala, The 8051 Microcontroller: Architecture, Programming and Applications,
West
3. Mazidi, M.A., The 8051 Microcontroller and Embedded System, Pearson Education
(2008)
4. T. Bansod, Pratik Tawde, Microcontroller Programming (8051, PIC, ARM7 ARM
Cortex), Shroff Publishers & Distributors Pvt. Ltd
70