18.IT Final
18.IT Final
UNIVERSITY DEPARTMENTS
B.TECH. INFORMATION TECHNOLOGY
REGULATIONS – 2015
CHOICE BASED CREDIT SYSTEM
Vision of the Department
To educate students with conceptual knowledge and technical skills in the field of
Information Technology with moral and ethical values to achieve excellence in
academic, industry and research centric environments.
PEO3. Collaborate with industry, academic and research institutions for product and
research related development.
PEO4. Imbibe high professionalism, effective communication skills and team spirit to
work on multidisciplinary projects, in diverse professional environments.
PSO1: Ability to apply programming principles and practices for the design of software
solutions in an internet-enabled world of business and social activities.
PSO2: Ability to identify the resources to build and manage the IT infrastructure using the
current technologies in order to solve real world problems with an understanding of the
tradeoffs involved in the design choices.
PSO3: Ability to plan, design and execute projects for the development of intelligent
systems with a focus on the future.
3
MAPPING OF PROGRAMME EDUCATIONAL OBJECTIVES WITH PROGRAMME OUTCOMES:
A broad relation between the programme objective and the outcomes is given in the
following table.
PROGRAMME OUTCOMES
a b c d e f g h
1
2
3
4
5
4
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8
Foundational English
Mathematics I
SEM 1
Engineering Physics
Engineering Chemistry
Computing Techniques
Basic Sciences Laboratory
Computer Practices Laboratory
Technical English
Mathematics - II
SEM 2
SEM 4
Operating Systems
Software Engineering
Computer Architecture
Web Technology
Web Technology Laboratory
Operating Systems Laboratory
Embedded Systems
Unix Internals
Computer Networks
Compiler Engineering
SEM 5
Professional Elective - I
Open Elective - I *
Computer Networks Laboratory
Embedded Systems Laboratory
Socially Relevant Project #
Integrated Programming
Information Security
Parallel and Distributed Systems
Mobile Computing
SEM 6
Open Elective - II *
Professional Elective - II
Integrated Programming Laboratory
Information Security and Mobile Computing
Laboratory
Creative and Innovative Project #
SEM 7
Data Analytics
Principles of Human Computer Interaction
Knowledge Engineering and Intelligent Systems
Professional Elective - III
Professional Elective - IV
Graphics and Multimedia Laboratory
Mini Project
Professional Elective - V
SEM 8 Professional Elective - VI
Professional Elective -VII
Project Work
ANNA UNIVERSITY, CHENNAI
UNIVERSITY DEPARTMENTS
B.TECH. INFORMATION TECHNOLOGY
REGULATIONS – 2015
CHOICE BASED CREDIT SYSTEM
SEMESTER I
SEMESTER II
8
SEMESTER III
SEMESTER IV
5. IT7402
Web Technology PC 3 3 0 0 3
6. MA7451
Discrete Mathematics BS 4 4 0 0 4
PRACTICALS
7. IT7411
Operating Systems
PC 4 0 0 4 2
Laboratory
8. IT7412 Web Technology
PC 4 0 0 4 2
Laboratory
TOTAL 28 20 0 8 24
SEMESTER V
SEMESTER VI
SEMESTER VIII
1. HS 4 4 - - - - - - 8
2. BS 12 7 7 4 - - - - 30
3. ES 5 6 6 - - - - - 17
4. PC - 8 10 20 16 16 16 - 86
5. PE - - - - 3 3 6 9 21
6. OE - - - - 3 3 - - 6
7. EEC - - - - 1 2 - 10 13
Total 21 25 23 24 23 24 22 19 181
Non Credit /
8.
Mandatory
HS7151 FOUNDATIONAL ENGLISH LT P
C400
4
COURSE DESCRIPTION:
This course aims at developing the language skills necessary for the first year students of
Engineering and Technology.
OBJECTIVES:
To develop the four language skills – Listening, Speaking, Reading and Writing.
To improve the students’ communicative competence in English.
To teach students the various aspects of English language usage.
CONTENTS:
UNIT I GREETING AND INTRODUCING ONESELF 12
Listening- Types of listening – Listening to short talks, conversations; Speaking – Speaking
about one’s place, important festivals etc. – Introducing oneself, one’s family/ friend; Reading –
Skimming a passage– Scanning for specific information;Writing- Guided writing - Free writing on
any given topic (My favourite place/ Hobbies/ School life, writing about one’s leisure time
activities, hometown, etc.); Grammar – Tenses (present and present continuous) -Question types
- Regular and irregular verbs; Vocabulary – Synonyms and Antonyms.
TEACHING METHODS:
Interactive sessions for the speaking module.
Use of audio – visual aids for the various listening activities.
Contextual Grammar Teaching.
EVALUATION PATTERN: End Semester – 50%
Internals – 50%
LEARNING OUTCOMES:
Students will improve their reading and writing skills
Students will become fluent and proficient in communicative
English TOTAL: 60 PERIODS
Students will be able to improve their interpersonal communication
TEXTBOOK:
1. Richards, Jack.C with Jonathan Hull and Susan Proctor New Interchange : English for
International Communication. (level2, Student’s Book) Cambridge University Press,
New Delhi: 2010.
REFERENCES:
1. Bailey, Stephen. Academic Writing: A practical guide for students. New York: Rutledge,
2011.
2. Morgan, David and Nicholas Regan. Take-Off: Technical English for Engineering.
London: Garnet Publishing Limited, 2008.
3. Redston, Chris & Gillies Cunningham Face 2 Face (Pre-intermediate Student’s Book&
Workbook) Cambridge University Press, New Delhi: 2005
4. Comfort, Jeremy, Pamela Rogerson-Revell, Trish Stott , Derek Utley Speaking Effectively:
Developing Speaking Skills for Business English. Cambridge University Press,
Cambridge: Reprint 2011.
MA7151 MATHEMATICS – I L T P C
(Common to all branches of B.E. / B.Tech. Programmes in 4 0 0 4
I Semester)
OBJECTIVES:
The goal of this course is for students to gain proficiency in calculus computations.
In calculus, we use three main tools for analyzing and describing the behavior of
functions: limits, derivatives, and integrals. Students will use these tools to solve
application problems in a variety of settings ranging from physics and biology to
business and economics.
To make the student acquire sound knowledge of techniques in solving ordinary
differential equations that model engineering problems.
To familiarize the student with functions of several variables. This is needed in many
branches of engineering.
To acquaint the student with mathematical tools needed in evaluating multiple
integrals and their usage.
REFERENCES:
1. Ramana B.V., “Higher Engineering Mathematics”, Tata McGraw Hill Co. Ltd., New Delhi,
11th Reprint, 2010.
2. Jain R.K. and Iyengarrd S.R.K., “Advanced Engineering Mathematics”, Narosa
Publications, New Delhi, 3 Edition, 2007.
3. Bali N., Goyal M. and Watkins C., “Advanced Engineering Mathematics”, Firewall Media
(An imprint of Lakshmi Publications Pvt., Ltd.,), New Delhi, 7th Edition, 2009.
4. Greenberg M.D., “Advanced Engineering Mathematics”, Pearson Education, New Delhi,
2nd Edition, 5th Reprint, 2009.
5. Peter V.O’Neil, “Advanced Engineering Mathematics”, Cengage Learning India Pvt., Ltd,
New Delhi, 2007.
PH7151 ENGINEERING PHYSICS L T P C
(Common to all branches of B.E / B.Tech programmes) 3 0 0 3
OBJECTIVE:
To introduce the concept and different ways to determine moduli of elasticity and applications.
To instill the concept of sound, reverberation, noise cancellation, and ultrasonic generation,
detection and applications
To inculcate an idea of thermal properties of materials, heat flow through materials and
quantum physics
To promote the basic understanding of interferometers, principles and applications of lasers,
optical fibers and sensors
To establish a sound grasp of knowledge on the basics, significance and growth of single
crystals
TEXTBOOKS:
1. Gaur R.K. and Gupta S.L., “Engineering Physics”, Dhanpat Rai Publications (2013)
2. Palanisamy P.K., “Engineering Physics”, Scitech Publications (P) Ltd. (2006).
3. Arumugam M., “Engineering Physics”, Anuradha Publications (2000)
REFERENCES:
1. Serway R.A. and Jewett, J.W. “Physics for Scientists and Engineers with Modern Physics”.
Brooks/cole Publishing Co. 2010.
2. Tipler P.A. and Mosca, G.P., “Physics for Scientists and Engineers with Modern Physics”.
W.H.Freeman, 2007.
3. Markert J.T.,Ohanian, H. and Ohanian, M. “Physics for Engineers and Scientists”. W.W.Norton
& Co. 2007.
UNIT V NANOCHEMISTRY 9
Basics-distinction between molecules, nanoparticles and bulk materials; size-dependent
properties.Preparation of nanoparticles – sol-gel and solvothermal.Preparation of carbon
nanotube by chemical vapour deposition and laser ablation. Preparation of nanowires by
VLS growth, electrochemical deposition and electro spinning.Properties and uses of
nanoparticles, nanoclusters, nanorods, nanotubes and nanowires.
TOTAL: 45 PERIODS
OUTCOMES:
Will be familiar with polymer chemistry, surface chemistry and catalysis.
Will know the photochemistry, spectroscopy and chemical thermodynamics.
Will know the fundamentals of nano chemistry.
TEXTBOOKS:
1. Jain P. C. & Monica Jain., “Engineering Chemistry”, Dhanpat Rai Publishing Company
(P) Ltd, New Delhi, 2014.
2. Kannan P., Ravikrishnan A., “Engineering Chemistry”, Sri Krishna Hitech Publishing
Company Pvt. Ltd. Chennai, 2014.
REFERENCES:
1. Pahari. A., Chauhan B., “Engineering Chemistry”, Firewall Media, New Delhi, 2012.
2. Sivasankar B., “Engineering Chemistry”, Tata McGraw-Hill Publishing Company Ltd,
New Delhi, 2012.
3. AshimaSrivastava. Janhavi N N, Concepts of Engineering Chemistry”, ACME Learning
Private Limited., New Delhi., 2010.
4. Vairam S., Kalyani P., Suba Ramesh., “Engineering Chemistry”, Wiley India Pvt Ltd.,
New Delhi., 2011.
UNIT I INTRODUCTION 9
Introduction to Computers – Computer Software – Computer Networks and Internet - Need for
logical thinking – Problem formulation and development of simple programs - Pseudo code -
Flow Chart and Algorithms.
UNIT IV POINTERS 9
Macros - Storage classes –Basic concepts of Pointers– Pointer arithmetic - Example Problems
- Basic file operations
TEXTBOOKS:
1. Pradip Dey, Manas Ghosh, “Computer Fundamentals and Programming in C”, Second
Edition, Oxford University Press, 2013
2. Ashok N. Kamthane, “Computer programming”, Pearson Education, 2007.
3. Yashavant P. Kanetkar. “Let Us C”, BPB Publications, 2011.
REFERENCES:
1. Kernighan,B.W and Ritchie,D.M, “The C Programming language”, Second Edition,
Pearson Education, 2006
2. Byron S Gottfried, “Programming with C”, Schaums Outlines, Second Edition, Tata
McGraw-Hill, 2006.
3. R.G. Dromey, “How to Solve it by Computer”, Pearson Education, Fourth Reprint, 2007
OBJECTIVE:
To inculcate experimental skills to test basic understanding of physics of
materials including properties of matter, thermal and optical properties.
To induce the students to familiarize with experimental determination of velocity of
ultrasonic waves, band gap determination and viscosity of liquids.
TOTAL: 30 PERIODS
OUTCOME:
Upon completion of the course, the students will be able
To determine various moduli of elasticity and also various thermal and optical
properties of materials.
To determine the velocity of ultrasonic waves, band gap determination and viscosity
of liquids.
LIST OF EXPERIMENTS
1. Search, generate, manipulate data using MS office/ Open Office
2. Presentation and Visualization – graphs, charts, 2D, 3D
3. Problem formulation, Problem Solving and Flowcharts
4. C Programming using Simple statements and expressions
5. Scientific problem solving using decision making and looping.
6. Simple programming for one dimensional and two dimensional arrays.
7. Solving problems using String functions
8. Programs with user defined functions
9. Program using Recursive Function
10. Program using structures and unions.
TOTAL: 60 PERIODS
OUTCOMES:
On Completion of the course, the students should be able to:
Write and compile programs using C programs.
Write program with the concept of Structured Programming
Identify suitable data structure for solving a problem
Demonstrate the use of conditional statement.
CONTENTS
UNIT I ANALYTICAL READING 12
Listening- Listening to informal and formal conversations; Speaking – Conversation
Skills(opening, turn taking, closing )-explaining how something works-describing technical
functions and applications; Reading –Analytical reading, Deductive and inductive reasoning;
Writing- vision statement–structuring paragraphs.
UNIT II SUMMARISING 12
Listening- Listening to lectures/ talks on Science & Technology; Speaking –Summarizing/ Oral
Reporting, Reading – Reading Scientific and Technical articles; Writing- Extended definition –Lab
Reports – Summary writing.
UNIT III DESCRIBING VISUAL MATERIAL 12
Listening- Listening to a panel discussion; Speaking – Speaking at formal situations; Reading –
Reading journal articles - Speed reading; Writing-data commentary-describing visual material-
writing problem-process- solution-the structure of problem-solution texts- writing critiques
UNIT IV WRITING/ E-MAILING THE JOB APPLICATION 12
Listening- Listening to/ Viewing model interviews; Speaking –Speaking at different types of
interviews – Role play practice ( mock interview); Reading – Reading job advertisements and
profile of the company concerned; Writing- job application – cover letter –Résumé preparation.
TEACHING METHODS:
Practice writing
Conduct model and mock interview and group discussion.
Use of audio – visual aids to facilitate understanding of various forms of technical communication.
Interactive sessions.
EVALUATION PATTERN:
Internals – 50%
End Semester – 50%
TOTAL: 60 PERIODS
LEARNING OUTCOMES
Students will learn the structure and organization of various forms of
technical communication.
Students will be able to listen and respond to technical content.
Students will be able to use different forms of communication in their respective fields.
TEXTBOOK:
1. Craig,Thaine. Cambridge Academic English: An integrated skills course for
EAP(Student’s Book)Level: Intermediate Cambridge University Press, New Delhi: 2012
REFERENCES:
1. Laws, Anne. Presentations. Hyderabad: Orient Blackswan, 2011.
2. Ibbotson, Mark. Cambridge English for Engineering. Cambridge University Press,
Cambridge, New Delhi: 2008
3. Naterop, Jean B. and Rod Revell. Telephoning in English. Cambridge: Cambridge University
Press, 2004.
4. Rutherford, Andrea J. Basic Communication Skills for Technology. New Delhi: Pearson
Education, 2001.
5. Bailey, Stephen. Academic Writing A practical Guide for Students. Routledge, London:
2004
6. Hewings, Martin. Cambridge Academic English: An integrated skills course for
EAP(Student’s Book)Level: Intermediate Cambridge University Press, New Delhi: 2012.
MA7251 MATHEMATICS - II L T P C
(Common to all branches of B.E. / B.Tech. Programmes 4 0 0 4
in II Semester)
OBJECTIVES:
To develop the use of matrix algebra techniques that is needed by engineers for practical
applications.
To acquaint the student with the concepts of vector calculus, needed for problems in all
engineering disciplines.
To develop an understanding of the standard techniques of complex variable theory so
as to enable the student to apply them with confidence, in application areas such as heat
conduction, elasticity, fluid dynamics and flow of the electric current.
To make the student appreciate the purpose of using transforms to create a new domain
in which it is easier to handle the problem that is being investigated.
UNIT I MATRICES 12
Eigenvalues and Eigenvectors of a real matrix – Characteristic equation – Properties of
eigenvalues and eigenvectors – Cayley-Hamilton theorem – Diagonalization of matrices –
Reduction of a quadratic form to canonical form by orthogonal transformation – Nature of
quadratic forms.
REFERENCES:
1. Ramana, B.V. “Higher Engineering Mathematics”, Tata McGraw Hill, New Delhi, 2010.
2. Glyn James, “Advanced Modern Engineering Mathematics”, Pearson Education, New
Delhi, 2007.
3. Jain R.K. and Iyengar S.R.K., “Advanced Engineering Mathematics”, Narosa
Publications, New Delhi, 3rd Edition, 2007.
4. Bali N., Goyal M. and Watkins C., “Advanced Engineering Mathematics”, Firewall Media
(An imprint of Lakshmi Publications Pvt., Ltd.,), New Delhi, 7th Edition, 2009.
5. Peter V. O’Neil , “Advanced Engineering Mathematics”, Cengage Learning India Pvt.,
Ltd, New Delhi, 2007.
TEXT BOOKS:
1. Balasubramaniam R. “Callister's Materials Science and Engineering”, Wiley-India 2014.
2. Donald Askeland, “Materials Science and Engineering”, Cengage Learning India Pvt Ltd.,
2010.
3. Kasap S.O., “Principles of Electronic Materials and Devices”, Tata McGraw-Hill 2007.
4. Pierret R.F., “Semiconductor Device Fundamentals”, Pearson 2006.
REFERENCES:
1. Garcia N. and Damask A., “Physics for Computer Science Students”, Springer-Verlag, 2012.
2. Datta S., “Quantum Transport: Atom to Transistor”, Cambridge University Press 2013.
3. Hanson G.W., “Fundamentals of Nanoelectronics”, Pearson Education 2009.
4. Charles Kittel, “Introduction to Solid State Physics”, Wiley Publications 2012.
5. Wilson J. and Hawkes, J.F.B., “Optoelectronics: An introduction”, Prentice Hall 1989.
6. Neil Gershenfeld, “The Physics of Information Technology”, Cambridge
Series on Information & the Natural Sciences, Cambridge University Press
2000.
TEXT BOOK:
1. Mark Allen Weiss, “Data Structures and Algorithm Analysis in C”, 2nd edition, Pearson
Education, 1997.
REFERENCES:
1. Aho, Hopcroft and Ullman, “Data Structures and Algorithms”, Pearson Education,1983.
2. ReemaThareja, “Data Structures Using C”, Oxford University Press, 2011
TEXT BOOK:
1. N.D.Bhatt and V.M.Panchal, “Engineering Drawing”, Charotar Publishing House, 50th
Edition, 2010.
REFERENCES:
1. K.R.Gopalakrishna., “Engineering Drawing” (Vol I&II combined) SubhasStores,
Bangalore, 2007
2. Luzzader, Warren.J., and Duff,John M.,,’’ Fundamentals of Engineering Drawingwith an
introduction to Interactive Computer Graphics for Design and Production”,Eastern
Economy Edition, Prentice Hall of India Pvt Ltd, New Delhi, 2005
3. M.B.Shah and B.C.Rana, “Engineering Drawing”, Pearson, 2nd Edition, 2009
4. K.Venugopal and V.Prabhu Raja, “Engineering Graphics”, New Age International
(P)Limited ,2008.
TEXT BOOKS:
1. Robin Nixon, "Learning PHP, MySQL, JavaScript, CSS & HTML5" Third Edition, O'REILLY,
2014.
2. James F. Kurose, “Computer Networking: A Top-Down Approach”, Sixth Edition, Pearson,
2012.
REFERENCES:
1. Gottapu Sasibhushana Rao, "Mobile Cellular Communication", Pearson, 2012.
2. R. Kelly Rainer , Casey G. Cegielski , Brad Prince, Introduction to Information Systems, Fifth
Edition, Wiley Publication, 2014.
3. it-ebooks.org
OBJECTIVES:
To write simple scripts for the creation of web sites
To create various information technology enabled applications
1. Creation of interactive web sites - Design using HTML and authoring tools
2. Creation of simple PHP scripts - Dynamism in web sites
3. Handling multimedia content in web sites
4. Database applications using PHP and MySQL
5. Study of computer networking components
6. Creation information retrieval system using web, PHP and MySQL
OUTCOMES:
On Completion of the course, the students should be able to:
Design interactive websites using basic HTML tags, different styles, links and with all
basic control elements.
Create client side and server side programs using scripts using PHP scripts.
Design dynamic web sites and handle multimedia components.
Create applications with PHP connected to database.
Create Personal Information System
Implement the technologies behind computer networks and mobile
communication.
Implement the technologies related to computer networks and mobile communication
Implement Data Structures using ADT’s
Solving problems using appropriate data structures
LIST OF EXCERCISE:
1. Practice of C Programming
2. Implementation of Linked List
3. Implementation of Stack using Arrays and Linked List.
4. Implementation of Queue using Arrays and Linked List.
5. Implementation of Stack and Queue applications.
6. Implementation of Binary Search Tree.
7. Implementation of Priority Queue.
8. Implementation of Sorting and Searching techniques.
TOTAL: 60 PERIODS
OUTCOMES:
On Completion of the course, the students should be able to:
Implement any data structures using ADT's.
Solve the given problem using appropriate data structures
WOOD WORK
Sawing, planning and making joints like T-Joint, Mortise and Tenon joint and Dovetail
joint.
STUDY
• Study of joints in door panels and wooden furniture
• Study of common industrial trusses using models.
OUTCOMES:
On Completion of the course, the students should be able to:
Ability to fabricate carpentry components and to lay pipe connections including plumbing
works.
Ability to use welding equipments to join the structures
Ability to do wiring for electrical connections and to fabricate electronics circuits.
TEXT BOOKS:
1. Gilbert M.Masters, ‘Introduction to Environmental Engineering and Science’, 2nd
edition, Pearson Education 2004.
2. Benny Joseph, ‘Environmental Science and Engineering’, Tata McGraw-Hill, New Delhi, 2006.
REFERENCES:
1. R.K. Trivedi, ‘Handbook of Environmental Laws, Rules, Guidelines, Compliances
and Standards’, Vol. I and II, Enviro Media.
2. Cunningham, W.P. Cooper, T.H. Gorhani, ‘Environmental Encyclopedia’,Jaico
Publ., House, Mumbai, 2001.
3. Dharmendra S. Sengar, ‘Environmental law’, Prentice hall of India PVT LTD,New
Delhi, 2007.
4. Rajagopalan, R, ‘Environmental Studies-From Crisis to Cure’, Oxford University Press
2005.
TEXT BOOKS:
1. Abraham Silberschatz, Henry F. Korth, S. Sudharshan, “Database System Concepts”, Sixth
Edition, Tata McGraw Hill, 2010.
2. C.J.Date, A.Kannan, S.Swamynathan, “An Introduction to Database Systems”, Eighth Edition,
Pearson Education, 2006.
REFERENCES:
1. Ramez Elmasri, Shamkant B. Navathe, “Fundamentals of Database Systems”,
Sixth Edition, Pearson Education, 2010.
2. Raghu Ramakrishnan, Johannes Gehrke “Database Management Systems”, Fourth
Edition, Tata Mc Graw Hill, 2010.
3. G.K.Gupta, “Database Management Systems”, Tata McGraw Hill, 2011.
4. Carlos Coronel, Steven Morris, Peter Rob, “Database Systems: Design, Implementation and
Management”, Ninth Edition, Cengage Learning, 2011
TEXT BOOK:
1. Simon Haykin, “Communication Systems”, John Wiley and Sons Inc. 4th Edition, 2001.
REFERENCES:
1. Taub & Schilling, “Principles of Communication systems”, McGraw-Hill, 3rd Edition, 2008.
2. Wayne Tomasi, “Electronic communication systems”, fundamentals through advanced, 5/e,
Pearson Education, Fourth Reprint, 2005.
TEXT BOOKS:
1. Mark Allen Weiss, “Data Structures and Algorithm Analysis in C++”, Fourth edition, Pearson
Education, 2014.
2. Bjarne Stroustrup, “The C++ Programming Language”, Fourth edition, Pearson Education,
2014.
REFERENCES
1. Thomas H. Cormen, Charles E. Leiserson, Ronald L. Rivest, Clifford Stein, "Introduction to
Algorithms", Third Edition, Mc Graw Hill, 2009.
2. Robert Sedgewick, "Algorithms in C++", Third Edition, Pearson Education , 1998.
3. Ira Pohl, “Object Oriented Programming using C++”, 2nd edition, Pearson Education, 1997.
4. Michael T Goodrich, Roberto Tamassia, David Mount, “Data Structures and Algorithms in C+
+”, 7th edition, Wiley Publishers, 2004.
TEXT BOOK:
1. M. Morris Mano and Michael D. Ciletti, “Digital Design”, V Edition, Pearson Education, 2012.
REFERENCES:
1. G. K. Kharate, “Digital Electronics”, Oxford University Press, 2010.
2. John F. Wakerly, “Digital Design Principles and Practices”, Fourth Edition, Pearson
Education, 2007.
3. Charles H. Roth Jr, “Fundamentals of Logic Design”, Fifth Edition – Jaico Publishing House,
Mumbai, 2003.
4. Donald D. Givone, “Digital Principles and Design”, Tata MCGraw Hill, 2003.
OUTCOMES:
On Completion of the course, the students should be able to:
Build digital circuits using basic gates and MSI devices
Simulate and analyze digital circuits.
Debug implementation issues for Boolean functions.
OBJECTIVES:
To learn and implement DDL, DML, DCL and TCL commands in query language
To practice SQL Queries, PL/SQL programming concepts and Triggers
To design and develop a database application
OBJECTIVES:
To understand the concepts of Object Oriented Programming
To use standard template library in the implementation of standard data structures
To learn advanced data structures using Object Oriented Programming language
To expose graph structures and traversals using OOP concepts.
To understand various graph algorithms using OOP concepts.
LIST OF EXPERIMENTS:
1. Practicing C++ programs with Classes, Objects, Constructors and Destructors.
2. Function overloading and Operator overloading.
3. Inheritance.
4. Polymorphism – Virtual functions.
5. Templates and STL
6. Exception handling.
7. Implementation of AVL tree.
8. Implementation of Splay Tree.
9. Implementation of a Heap tree
10. Implementation of Graphs - Topological Sort
11. Graph Traversals Algorithms - Breadth-First Search – Depth-First Search
12. Shortest Path Algorithms – Dijkstra’s algorithm – Bellman-Ford algorithm – Floyd-Warshall
algorithm.
13. Minimum Spanning Tree Implementation – Kruskal and Prim’s algorithm.
TOTAL: 60 PERIODS
OUTCOMES:
On Completion of the course, the students should be able to:
Implement the given problem using object oriented programming concepts.
Implement advanced data structures through ADT's using OOP.
Analyze and apply the graph data structures for a real world problem.
TOTAL: 45PERIODS
OUTCOMES:
Upon completion of the course, the students will be able to:
To differentiate the perspective of various software process models
To elicit the requirements for real-time problems
To compile a SRS pertaining to industry standards
To create a behavioral model from the set of requirements
To develop a user-interface design for the given system
To outline various software metrics and their context in measuring software programs
To estimate the software cost
Distinguish the perspective of various Software process models
Analyze the requirements for real-time problems
To create software requirements specification pertaining to industry standards
To create a behavioral model from the set of requirements
To design and develop a user- interface for the given system.
To optimize the software cost estimation
TEXTBOOKS:
1. Roger S. Pressman, “Software Engineering: A Practitioner’s Approach”, McGraw Hill
International edition, Seventh edition, 2009.
2. Ian Sommerville, “Software Engineering”, Ninth Edition, Pearson Education, 2008.
REFERENCES:
1. Stephan Schach, “Software Engineering”, Tata Mc Graw Hill, 2007.
2. Pfleeger and Lawrence “Software Engineering: Theory and Practice”, Pearson Education,
Second edition, 2001.
TOTAL : 60 PERIODS
OUTCOMES:
Upon completion of the course, the students will be able to
Identify the functional units of a computer system and their operation
Point out the various metrics of performance
Critically analyze the different types of ISA styles
Explain the data path and control path implementation of a processor
Discuss the implementations of various functional units
Point out the characteristics of the memory and I/O systems and
discuss their design
TEXTBOOK:
1. David A. Patterson and John L. Hennessy, “Computer Organization and Design: The
Hardware/Software Interface”, Fourth Edition, Morgan Kaufmann / Elsevier, 2009.
REFERENCES:
1. Carl Hamacher, Zvonko Vranesic, Safwat Zaky and Naraig Manjikian, “Computer
Organization and Embedded Systems”, Sixth Edition, Tata McGraw Hill, 2012.
2. William Stallings, “Computer Organization and Architecture – Designing for Performance”,
Sixth Edition, Pearson Education, 2003.
3. John P. Hayes, “Computer Architecture and Organization”, Third Edition, Tata McGraw Hill,
1998.
4. John L. Hennessey and David A. Patterson, “Computer Architecture – A Quantitative
Approach”, Morgan Kaufmann / Elsevier Publishers, Fourth Edition, 2007.
5. V.P. Heuring, H.F. Jordan, “Computer Systems Design and Architecture”, Second Edition,
Pearson Education, 2004.
6. Behrooz Parhami, “Computer Architecture”, Oxford University Press, 2007.
TEXT BOOK:
1. Abraham Silberschatz, Peter B. Galvin, Greg Gagne, “Operating System Concepts Essentials”,
John Wiley & Sons Inc., 2010.
REFERENCES:
1. Andrew S. Tanenbaum, “Modern Operating Systems”, Second Edition, Addison Wesley, 2001.
2. D M Dhamdhere, “Operating Systems: A Concept-based Approach”, Second Edition, Tata
McGraw-Hill Education, 2007.
3. Charles Crowley, “Operating Systems: A Design-Oriented Approach”, Tata Mc Graw Hill
Education”, 1996.
4. William Stallings, “Operating Systems: Internals and Design Principles”, Seventh Edition,
Prentice Hall, 2011.
UNIT II DESIGNTECHNIQUES 9
Divide-and-Conquer - Merge Sort - Dynamic Programming - Matrix chain multiplication - Elements
of Dynamic programming - Longest common subsequence - Greedy Algorithms - Activity selection
problem -Elements of the Greedy Strategy - Huffman code – Task scheduling problem
UNIT IV APPLICATIONS 9
Matrix Operations – Solving systems of Linear equations - Linear Programming - Simplex algorithm
- Standard and Slack forms – Duality - Initial basic feasible solution - String Matching - Naive
string-matching algorithm - Knuth-Morris-Pratt algorithm
UNIT V NP-COMPLETENESS 9
NP-completeness – Polynomial Time - Polynomial Time Verification - Reducibility - NP-
completeness proofs - Approximation Algorithms - Vertex-Cover problem – Travelling-Salesman
problem
TOTAL: 45 PERIODS
OUTCOMES:
On Completion of the course, the students should be able to:
Design and implement any problem using design techniques
Critically analyze the complexity of the given algorithm.
Solve the problem in polynomial time or prove that to be a NP-Complete problem.
Articulate the process of problem solving and writing algorithms
Understand different algorithmic design strategies
Design and implement any problem using design techniques
Critically analyze the complexity of the given algorithm
Solve the problem in polynomial time or prove that to be np-complete problem
Obtaining knowledge of advanced topics of algorithms such as approximation algorithms,
linear programming, and randomized algorithm
TEXT BOOK:
1. Thomas H. Cormen, Charles E. Leiserson, Ronald L. Rivest, Clifford Stein, Introduction to
Algorithms", Third Edition, Mc Graw Hill, 2009.
REFERENCES:
1. S.Sridhar, "Design and Analysis of Algorithms", Oxford University Press, First Edition, 2015.
2. Steven S Skiena, "The Algorithm Design Manual", Second Edition, Springer, 2010.
3. Robert Sedgewick and Kevin Wayne, “Algorithms”, Fourth Edition, Pearson Education, 2011.
4. Alfred V. Aho, John E. Hopcroft, Jeffrey D. Ullman, “Data Structures and Algorithms”, Pearson
Education, Reprint 2006.
5. Donald E Knuth, “Art of Computer Programming-Volume I- Fundamental Algorithms”, Third
edition, Addison Wesley, 1997.
TEXT BOOKS:
1. Paul Deitel and Harvey Deitel, "Java SE 8 for programmers", Pearson Education, 2015
2. Harvey Deitel, Abbey Deitel," Internet and World Wide Web How To Program", 5th
Edition,Pearson Publication, 2012
3. James Payne, Beginning Python - Using Python 2.6 and 3.1, Wiley India Pvt. Ltd., 2010
REFERENCES:
1. Marty Hall and Larry Brown, “Core Servlets And Javaserver Pages”, Second Edition
2. Bryan Basham, Kathy Siegra, Bert Bates, “Head First Servlets and JSP”, Second Edition
3. Uttam K Roy, “Web Technologies”, Oxford University Press, 2011.
4. http://www.w3schools.com/
5. http://nptel.ac.in/courses/106105084/
UNIT II COMBINATORICS 12
Mathematical induction – Strong induction and well ordering – The basics of counting - The
pigeonhole principle – Permutations and combinations – Recurrence relations -Solving linear
recurrence relations using generating functions – Inclusion - Exclusion - Principle and its
applications.
TOTAL: 60 PERIODS
OUTCOMES:
On completion of the module the student should be able to:
Understand the notion of mathematical thinking, mathematical proofs, and
algorithmic thinking, and be able to apply them in problem solving.
Understand the basics of discrete probability and number theory, and be able to apply the
methods from these subjects in problem solving.
Use effectively algebraic techniques to analyse basic discrete structures and algorithms.
Understand asymptotic notation, its significance, and be able to use it to analyse
asymptotic performance for some basic algorithmic examples.
Understand some basic properties of graphs and related discrete structures, and be able to
relate these to practical examples.
TEXTBOOKS:
1. Kenneth H.Rosen, “Discrete Mathematics and its Applications”, Tata Mc Graw Hill Pub.
Co. Ltd., New Delhi, 7th Edition, Special Indian edition, 2011.
2. Tremblay J.P. and Manohar R, “Discrete Mathematical Structures with Applications
to Computer Science”, Tata McGraw Hill Pub. Co. Ltd, New Delhi, 30th Reprint, 2011.
REFERENCES:
1. Ralph. P. Grimaldi, “Discrete and Combinatorial Mathematics: An Applied
Introduction”, Pearson Education Asia, Delhi, 4th Edition, 2007.
2. Thomas Koshy,” Discrete Mathematics with Applications”, Elsevier Publications,
2006.
3. Seymour Lipschutz and Mark Lipson,”Discrete Mathematics”, Schaum’s Outlines,
Tata McGraw Hill Pub. Co. Ltd., New Delhi, 3rd Edition, 2010.
LIST OF EXERCISES:
1. Basic unix commands such as ls, cd, mkdir, rmdir, cp, rm, mv, more, lpr, man, grep,
sed, etc.,
2. Shell script
3. Process control System calls - demonstration of fork, execute and wait
4. Thread management
5. Thread synchronization
6. Deadlock avoidance using semaphores
7. Interprocess communication using pipes
8. Interprocess communication using FIFOs
9. Interprocess communication using signals
10. Implementation of CPU scheduling policy in Linux
11. Implement a memory management policy in Linux
12. Implement a file system in Linux
13. Linux kernel configuration
TOTAL : 60 PERIODS
OUTCOMES:
On Completion of the course, the students should be able to:
Learn the concepts to identify, create and maintain the basic command in
operating systems
Express strengths and limitations of various managements schemes in operating systems
Explain the core issues of operating systems
Implement algorithms of operating systems
Learn the concepts to identify, create and use the basic command in operating systems
Exploration of memory
3 3 3 2 2 - - 2 3 3 - 2 3 2 1
management methodologies
Exploration of interprocess
3 3 3 1 2 - - 2 3 3 - 2 3 2 -
communication strategies
EXERCISES:
1. Creating simple applications using JAVA by exploring all the object oriented programming
concepts such as inheritance, polymorphism, interfaces and packages.
2. Creating GUI based application using JAVA Swings
3. Developing concurrent and generic programming using Threads
4. Creation of simple websites using HTML 5 Tags
5. Creation of web forms and validating it through javascripts
6. Creation of XML file and validating with DTD and XML schema
7. Working with DOM and SAX parsers
8. Creation of AJAX based application
9. Developing JSON application
10. Creation of dynamic HTML based web applications
11. Creation of servlet based web application with JDBC
12. Developing JSP application
13. Creating simple applications using python
14. Simple database and web application using python
TOTAL: 60 PERIODS
OUTCOMES:
On Completion of the course, the students should be able to:
Create simple web applications
Implement server side and client side programming develop web applications with various
web technology concepts.
TOTAL : 45 PERIODS
OUTCOMES:
On Completion of the course, the students should be able to:
Use compiler construction tools.
Design and implement a prototype compiler
Understand the concept of lexical analysis and construction of deterministic and non deterministic
automata
Understand the concept of parsing and construction of parser.
Study the concept of intermediate code generation techniques.
Study of programming language design, target machine design and run time environment of
compilers.
Study about the compiler construction tools.
Obtaining knowledge to construct a prototype compiler for a subset of a programming language
TEXT BOOK:
1. Alfred V. Aho, Monica S. Lam, Ravi Sethi, and Jeffrey D. Ullman, "Compilers: Principles,
Techniques, and Tools", Second Edition, Pearson Education, 2009.
REFERENCES:
1. Torben gidius Mogensen, "Basics of Compiler Design", Springer, 2011.
2. LeBlanc Jr., Richard J., Cytron, Ron K., Fischer, Charles N. ,Crafting a Complier, Addison-
Wesley, First Edition, 2009.
3. K.D. Cooper and L.Torczon, Engineering a Compiler, Morgan-Kaufmann, Second Edition,
2011.
4. K. Muneeswaran, "Compiler Design", Oxford University Press, 2013.
Course Outcomes (COs) /
Program 1 2 3 4 5 6 7 8 9 10 11 12 PSO1 PSO2 PSO3
Outcomes (POs)
Understand the concept of lexical
analysis and construction of
3 3 3 2 3 - - - 2 - - 2 3 1 1
deterministic and non
deterministic automata
Understand the concept of
parsing and 3 3 3 1 3 - - - 2 - - 2 3 1 1
construction of parser
Study the concept of intermediate 3 3 3 1 3 - - - 2 - - 2 3 1 1
code generation techniques
Study of programming language
design, target machine design
3 3 3 - 3 - - - 2 - - 2 3 2 1
and run time environment of
compilers.
Study about the compiler
3 3 3 - 3 - - - 2 - - 3 3 1 1
construction tools.
Obtaining knowledge to
construct a prototype compiler 3 3 3 2 3 - - - 2 - - 3 3 3 2
for a subset of a programming
language
UNIT I FUNDAMENTALS 9
Building a network - Network edge and core - Layering and protocols - Internet Architecture -
Networking devices: Modems, Routers, Switches, Gateways - Needs/Principles of Application
Layer Protocols - Web and HTTP - FTP - Electronic Mail (SMTP, POP3, IMAP, MIME) - DNS –
SNMP- Peer to Peer- Distributed Hash table
TEXT BOOKS:
1. Larry L. Peterson, Bruce S. Davie, “Computer Networks: A systems approach”, Fifth Edition,
Morgan Kaufmann Publishers, 2010.
REFERENCES:
1. Ying-Dar Lin, Ren-Hung Hwang, Fred Baker, “Computer Networks: An Open Source
Approach”, McGraw Hill Publisher, 2011.
2. Nader. F. Mir, “Computer and Communication Networks”, Pearson Prentice Hall Publishers,
2010.
3. Forouzan, Behrouz A., and Firouz Mosharraf. "Computer networks: a top-down approach",
McGraw-Hill, Special Indian Edition 2012.
TEXT BOOKS:
1. Muhammed Ali Mazidi, Janice Gillispie Mazidi and Rolin D. Mc Kinlay, “The 8051
2. Microcontroller and Embedded Systems”, Pearson Education, Second edition, 2007.
3. Wayne Wolf, “Computers as Components:Principles of Embedded Computer
System Design”, Elsevier, 2006.
4. Andrew N Sloss, D. Symes, C. Wright, ” Arm system developers guide”, Morgan
Kauffman/ Elsevier, 2006.
REFERENCES:
1. Michael J. Pont, “Embedded C”, Pearson Education , 2007.
2. Steve Heath, “Embedded System Design” , Elsevier, 2005
3. Muhammad Ali Mazidi , Sarmad Naimi , Sepehr Naimi, "The AVR Microcontroller and
Embedded Systems: Using Assembly and C" Pearson Education, First edition, 2014
4. Arshdeep Bahga, Vijay Madisetti, " Internet of Things: A Hands-on-Approach" VPT First
Edition, 2014
UNIT I OVERVIEW 9
General Overview of the System: History – System structure – User perspective –Operating
System Services – Assumptions about Hardware. Introduction to the Kernel Architecture of the
UNIX Operating System – Introduction to System Concept - The Buffer Cache - Buffer headers –
Structure of the Buffer Pool – Scenarios for Retrieval of a Buffer– Reading and Writing Disk Blocks
– Advantages and Disadvantages of the Buffer Cache.
UNIT IV PROCESSES 9
Process States and Transitions – Layout of System Memory – The Context of a Process – Saving
the Context of a Process – Manipulation of the Process Address Space - Process Control -
process Creation – Signals – Process Termination – Awaiting Process Termination – Invoking
other programs – User Id of a Process – Changing the size of a Process – Shell – System Boot
and the INIT Process– Process Scheduling.
TOTAL: 45 PERIODS
OUTCOMES:
On Completion of the course, the students should be able to:
To design and implement the subsystems of an operating system.
To explain the data structures of an open source operating system.
To modify and implement the data structures and algorithms of an open source operating
system.
To have a knowledge about the memory management in unix operating system.
To know the internal representation of files in unix operating system.
To identify process creation, manipulation ,waiting and termination of processes.
TEXT BOOK:
1. Maurice J. Bach, “The Design of the Unix Operating System”, First Edition, Pearson Education,
1999.
REFERENCES:
1. B. Goodheart, J. Cox, “The Magic Garden Explained”, Prentice Hall of India,1986.
2. S. J. Leffler, M. K. Mckusick, M. J. .Karels and J. S. Quarterman., “The Design and
Implementation of the 4.3 BSD Unix Operating System”, Addison Wesley, 1998.
3. Robert Love, "Linux Kernel Development", III Edition, Addison Wesley, 2010.
LIST OF EXERCISES:
1. Write a network application program
2. Use tools to visualize packet flow
3. Configure Router/Switch to set up network (network administration)
4. Simple Chat Program using TCP Sockets
5. Simulation of HTTP Protocol using TCP Sockets
6. Simulation of Sliding Window Protocol using TCP Sockets
7. Simulation of DNS using UDP Sockets
8. Simulation of Ping using Raw Sockets
9. Learn to use commands like TCP Dump, Netstat, Trace Route
10. Study of TCP/UDP performance using simulation tool
11. Performance comparison of MAC protocols using simulation tool
12. Performance comparison of Routing protocols using simulation tool
TOTAL: 60 PERIODS
OUTCOMES:
On Completion of the course, the students should be able to:
To implement a network layer software and analyze functionalities of computer networks
To practice the various visualization tools to identify the Packet Flow.
To learn and implement about network configuration management.
To develop a simulation program for connection establishment using various types of
sockets
To learn and use the various commands in network programming.
To analyze and compare the performance of various routing protocols
LIST OF EXERCISES:
1. 8051 Assembly Language Experiments(Kit and Simulator) based
on: Data transfer programs
Arithmetic and logical programs
Conversions and sorting
Timers and Interrupts
Serial Communication
I/O interfacing: Traffic Generator ,DAC, ADC, Stepper Motor
2. Basic and Interfacing Programs Using Embedded C
3. Real time system programs (Embedded C)
4. KEIL software example programs
2. ARM/Atom based Application Development:
i. Programs to practice data processing instructions.
ii. Interfacing programs
iii. Program that uses combination of C and ARM/Atom assembly code.
3. Embedded Application Development on Platforms like Bluemix:
TOTAL : 60 PERIODS
OUTCOMES :
On Completion of the course, the students should be able to:
Develop Applications based on Embedded Systems
Write an Embedded C Program, Debug and interpret the Results
Write and implement simple assembly programs that use various features of the processor.
Able to do an experiment that senses an analog signal, process and control [e.g.,
Keypad, Display.]
Design and implement an embedded processor based system for a real-time application.
Design and deploy an IoT using Arduino/ARM Equivalent boards .
Students are expected to take up problems that would directly benefit the society and design and
implement an IT based solution for the problem, based on the courses undertaken up to that
semester. The evaluation of the project would be based on the formulation of the problem, and
the technical merit of the solution.
OUTCOMES:
On Completion of the course, the students should be able to:
Be a benefit to the society by solving a socially pertinent problem, design and
implement it with an IT based solution for the problem.
Design a computational model for the societal relevant problem
Implement the computational model that addresses the societal problems
Test the computational model in real time settings
Deploy the developed computation model
Appreciate the collaborative problem solving skill set of the team
Understand the importance of IT in society
TOTAL: 30 PERIODS
IT7601 INFORMATION SECURITY LT
P C30
0 3
OBJECTIVES:
To introduce the concepts and models of security in computing
To design and implement symmetric and asymmetric cryptosystems
To explain the security standards followed at the network level and at the application level
To estimate the level of security risk faced by an organization and the counter measures
to handle the risk
To learn secured software development
TEXT BOOKS:
1. Charles Pfleeger, Shari Lawrence Pfleeger, Devin N Paul, “Security in Computing ”, Pearson,
2007.
2. William Stallings, “Cryptography and Network Security – Principles and Practices”, Pearson
Education, Sixth Edition, 2013.
REFERENCES:
1. Wade Trappe, Lawrence C Washington, “Introduction to Cryptography with Coding and
Theory”, Second Edition, Pearson, 2007.
2. Wenbo Mao, “Modern Cryptography Theory and Practice”, Pearson, 2004.
3. Matt Bishop, “Computer Security: Art and Science”, Pearson, 2003.
4. Behrouz A Forouzan and Debdeep Mukhopadhyay, "Cryptography and Network Security",
Tata Mc Graw Hill Ltd. 2010.
OUTCOMES:
On Completion of the course, the students should be able to:
Develop complex real world web applications
Differentiate the importance of various application development frameworks
Interpret java ee, its features, containers and develop applications using its features.
Discover and differentiate the importance of various application development frameworks to
implement mvc framework.
Develop enterprise level web applications using java based technologies
Understand the basics of security mechanisms and its usage in application server, enterprise
beans and providing security in web applications.
Design and implement web services that accommodates to specific requirements.
Develop complex real world web applications
TEXT BOOKS:
1. Kogent Learning Solutions Inc.," Java Server Programming Java EE7 (J2EE 1.7): Black
Book", Dream Tech Press, 2014.
2. https://docs.oracle.com/javaee/7/JEETT.pdf
REFERENCES:
1. Ed Roman, Rima Patel Sriganesh, Gerald Brose, Mastering Enterprise JavaBeans, 3rd
Edition, WILEY publication,2005.
2. Jim Keogh, J2EE: The Complete Reference, TATA Mc-Graw Hill, 2002.
3. James Holmes, Struts: The Complete Reference, 2nd Edition, TATA McGraw Hill, 2007.
TOTAL:45 PERIODS
OUTCOMES:
On Completion of the course, the students should be able to:
To articulate the concept of wireless communication
To have knowledge on the architecture of GSM and LTE protocol
To choose the appropriate WLAN technology for a given scenario
To deploy various protocols that support mobility at network layer and transport layer
To design and implement mobile applications
To explore the architecture of various mobile operating systems platforms
TEXT BOOKS:
1. Jochen Schiller, “Mobile Communications”, Second Edition, Pearson, 2009.
2. Asoke K Talukder, Hasan Ahmed, Roopa R Yavagal, “Mobile Computing
Technology, Applications and Service Creation”, 2nd edition, Tata McGraw Hill, 2010.
REFERENCES:
1. William Stallings, “Wireless Communication and Networks”, Pearson Education, 2009.
2. Uwe Hansmaan, Lothar Merk, Martin S. Nicklons and Thomas Stober, ‘Principles of Mobile
Computing’, Springer, 2003.
3. Pattnaik Prasant Kumar and Mall Rajib, "Fundamentals of Mobile Computing", PHI, 2012
4. Zigurd Mednieks, Laird Dornin, G, Blake Meike and Masumi Nakamura,
“Programming Android”, O‟Reilly, 2011.
TEXT BOOKS:
1. George Coulouris, Jean Dollimore, Tim Kindberg, “Distributed Systems Concepts and Design”,
Fifth Edition, Pearson Education Asia, 2011.
2. MukeshSinghal, “Advanced Concepts In Operating Systems”, McGraw Hill Series in Computer
Science, 1994.
3. Introduction to Parallel Computing, Second Edition, Ananth Grama, Anshul Gupta, George
Karypis, Vipin Kumar,: Addison Wesley 2003
REFERENCES:
1. Ajay D. Kshemkalyani and Mukesh Singhal, “Distributed Computing: Principles, Algorithms and
Systems”, Cambridge Press.
2. A.S.Tanenbaum, M.Van Steen, “Distributed Systems”, Pearson Education, 2004.
3. M.L.Liu, “Distributed Computing Principles and Applications”, Pearson Addison Wesley, 2004.
4. Tom White, “Hadoop: The Definitive Guide”, O'REILLY Media, 2009.
OUTCOMES:
On Completion of the course, the students should be able to:
Know concepts, models, frameworks, and tools that engineering graduates’ need in a world
where creativity and innovation is fast becoming a pre-condition for competitive advantage.
Design a computational model for creative and innovative problems.
Implement the computational model that addresses the innovative solutions.
Test the computational model in real time settings.
Deploy the developed computation model.
Appreciate the collaborative problem solving skill set of the team.
Appreciate the need of creativity and innovation for competitive advantage
TOTAL: 60 PERIODS
OBJECTIVES:
The Information Security Laboratories to present several hands-on exercises to help
reinforce the students knowledge and understanding of the various Information security
aspects.
The lab exercises are based on implementation of cryptographic algorithms and with usage
of various security attacks/defenses related tools and utilities.
LIST OF EXERCISES:
The following exercises are based on the cryptographic algorithms. They can be implemented
using C, C++, Java, etc.
1. Write a program to perform encryption and decryption using the following algorithms
a. Ceaser cipher
b. Substitution cipher
c. Hill Cipher
2. Write a program that contains functions, which accept a key and input text to be
encrypted/decrypted. This program should use the key to encrypt/decrypt the input by
using the triple DES algorithm. Make use of Cryptography package.
3. Write a program to implement the Rijndael algorithm logic.
4. Write the RC4 logic in any language
5. Using cryptography, encrypt the text “Helloworld”using Blowfish.Create your own key
using key tool.
6. Write a program to implement RSA algorithm.
7. Implement the Diffie-Hellman Key Exchange mechanism using HTML and Script.
Consider the end user as one of the parties(Alice) and the Script application as the
other party(Bob)
8. Calculate the message digest of a text using the SHA-1/MD5 algorithm in any language
9. Create a digital certificate of your own by using the key tool.
10. Write a program to encrypt user’s passwords before they are stored in a database table,
and to retrieve the whenever they are to be brought back for verification.
11. Key generation (public and private key pair)can be performed using Java. Write a
program which can do this.
12. Write a program which performs a digital signature on a given text.
TOTAL: 60 PERIODS
OUTCOMES:
On Completion of the course, the students should be able to:
Have knowledge on the fundamentals of secret and public cryptography.
Familiar with network security designs using available secure solutions (such as PGP,
SSL, IPSec, etc)
EXERCISES
1. Creating servlet based application with session and cookies
2. Developing JSP applications with JDBC and session management
3. Experimenting with basic EJB applications.
4. Developing EJB application with session and entity beans
5. Creation of web services using JAVA
6. Creation of RESTful web services and SOAP based web services
7. Developing SOA based solutions using web service composition
8. Hibernate based application development
9. Application development using spring
10. Application development using strut framework
11. Creation of Database applications using Hibernate
12. Creation of java based secure application
TOTAL : 60 PERIODS
OUTCOMES:
On Completion of the course, the students should be able to:
Develop enterprise level java applications
Implement enterprise java concepts such as JSP, Servlet, EJB
Create the applications using the concepts of hibernate, spring, struts
Identify and understand the state of art in their respective fields and become familiar with the
concepts.
Apply the concepts learnt to relevant research problems or practical applications and classify the
concepts.
Understand and formulate the real-time concepts and models, develop enterprise level java
applications.
Design and develop enterprise level java applications and become familiar with frameworks and
tools.
Design and create enterprise java concepts using JSP, servlet, EJB.
Create the applications using the concepts of hibernate, spring, struts.
TEXTBOOKS:
1. F.S. Hill, Jr. and Stephen M. Kelley, Jr., "Computer graphics using OpenGL", Pearson
Prentice Hall, Third edition, 2007.
2. Mark S Drew and Zee Nian Li, "Fundamentals of multimedia", Prentice Hall, 2006.
REFERENCES:
1. Alan Watt, "3D Computer Graphics", Pearson Addison Wesley, Third edition, 2000.
2. Hearn and Baker, "Computer Graphics with OpenGL", Pearson, Fourth edition.
3. Ralf Steinmetz and Klara Nahrstedt, "Multimedia Systems", Springer IE, 2004.
TOTAL: 45 PERIODS
OUTCOMES:
On Completion of the course, the students should be able to:
Identify the differences between reporting and analytics
Demonstrate fundamental mathematics behind analytics
Install Hadoop and write Map Reduce Programs
Critically analyze different big data frameworks for programming, storage and
statistical analysis
Apply mining techniques for stream data.
REFERENCES:
1. Paul Zikopoulos and Chris Eaton, Understanding Big Data: Analytics for Enterprise Class
Hadoop and Streaming Data: Analytics for Enterprise Class Hadoop and Streaming Data,
McGraw-Hill Education; 1 edition 2011
2. Philipp K. Janert, Data Analysis with Open Source Tools, O’Reilly Media, 2010.
3. Michael Berthold, David J. Hand, “Intelligent Data Analysis”, Springer, 2007.
4. Glenn J. Myatt, “Making Sense of Data”, John Wiley & Sons, 2007.
Course Outcomes (COs) /
1 2 3 4 5 6 7 8 9 10 11 12 PSO1 PSO2 PSSO3
Program Outcomes (POs)
To know the fundamental
concepts of big data and 3 2 2 - - - - - 2 - - 2 2 2 3
analysis
To learn various techniques for
3 3 2 - 2 - - - 2 - - 2 2 2 3
mining data streams
To learn event modelling for
3 2 2 - 2 - - - 2 - - 2 1 3 3
different applications
Work with big data platform and
3 3 2 3 3 - - - 2 - - 2 2 3 3
its analysis techniques
Design efficient algorithms for
mining the data from large 3 3 3 3 3 - - - 2 - - 2 3 3 3
volumes
Model a framework for human
3 3 3 3 3 - - - 2 - - 2 2 3 3
activity recognition
UNIT V LEARNING 9
Statistical methods - Bayesian techniques- Supervised learning- Unsupervised learning-
Regression methods - Learning under uncertainty - Probability methods - Text processing
TOTAL: 45 PERIODS
OUTCOMES:
On Completion of the course, the students should be able to:
Use the knowledge representation and reasoning techniques for the design of intelligent
systems
Apply the reasoning methods of various logics to computer science domains.
Create intelligent systems using learning mechanisms.
Understand the mechanism of agents, environments, knowledge representation and reasoning
techniques
Analyse the different types of search mechanisms.
Apply the reasoning techniques of lower order logics.
Understand the reasoning process of higher order logics.
Apply the learning techniques to real world problems.
To explore the recent trends in Intelligent systems.
TEXT BOOKS:
1. Stuart Russell, Peter Norvig, "Artificial Intelligence: A Modern Approach", Third Edition,
Pearson Education, 2009.
2. Michael Huth and Mark Ryan," Logic in Computer Science: Modelling and Reasoning about
Systems", Cambridge University Press, Second edition, 2004.
REFERENCES:
1. Saroj Kaushik, "Artificial Intelligence", Cengage Learning, 2012.
2. Ronald Brachman, Hector Levesque “Knowledge Representation and Reasoning “, The
Morgan Kaufmann Series in Artificial Intelligence, 2004.
3. Johan van Benthem, Hans van Ditmarsch, Jan van Eijck and Jan Jaspars," Logic in Action,
A new introduction to Logic", Available in http://www.logicinaction.org/, 2014.
TEXT BOOKS:
1. Alan Dix, Janet Finlay, Gregory D. Abowd, Russell Beale, Human – Computer Interaction,
Third Edition, Pearson, 2004.
2. Ben Shneiderman, Catherin Plaisant, Maxine Cohen and Steven M. Jacobs, Designing the
user interface: Strategies for effective human computer interaction, Fifth edition, Pearson
2009.
REFERENCES:
1. Donald A. Norman, Design of everyday things, Basic books, Revised edition, 2013.
2. Reto Meier, Professional Android 4 Application Development, Wiley, 2012.
OBJECTIVES:
To introduce the necessary background, the basic algorithms, and the applications of
computer graphics.
To examine the various graphics applications of modeling, design and visualization.
To develop an innovative multimedia projects.
TOTAL : 60 PERIODS
OUTCOMES:
On Completion of the course, the students should be able to:
Be able to construct interactive computer graphics programs using OpenGL.
Have a thorough understanding of working of 2D and 3D computer graphics.
Able to create animation in both 2D and 3D.
Have the ability to build a multimedia application.
Three member team is identified to carry out mini project, the goal of mini project is to choose the
final year project, Perform Literature Survey, refer IEEE papers, IEEE/ACM papers, study the
implementation issues, familiarize with the tools needed for implementation, study necessary
simulation software (if any) and implement the initial phase of the project. Three reviews needs to
be conducted project report has to be submitted by the team. Final review will be conducted by
external member.
TOTAL : 60 PERIODS
OUTCOMES:
As a team, identify a real-world problem that can be solved using IT tools and techniques.
Analyse existing artefacts and solutions and design novel effective approaches.
To explore, select, and deploy the appropriate tools for effective implementation of the design.
To prepare the documentation for the design and implementation, write reports and make
presentations justifying the choices made.
To develop the required collaboration and communication skills to work in a professional team
and multi-disciplinary context.
To quickly develop Proof-of- Concept of solutions to problems.
Course Outcomes (COs) /
1 2 3 4 5 6 7 8 9 10 11 12 PSO1 PSO2 PSO3
Program Outcomes (POs)
UNIT I INTRODUCTION 9
Graphs – Introduction – Isomorphism – Sub Graphs – Walks, Paths, Circuits – Connectedness–
Components – Euler Graphs – Hamiltonian paths and circuits – Trees – Properties of Trees–
Distance and Centers in Tree – Rooted and Binary Trees.
TOTAL: 45 PERIODS
OUTCOMES:
Upon completion of the course, the students will be able to:
Write programs involving basic graph algorithms
Write programs for graph coloring
Differentiate the potential use of directed and undirected graphs
Outline the concepts of permutations and combinations
Demonstrate understanding of the fundamental theorems of graph theory.
Identify and differentiate the potential use of special graphs and describe the basic properties
of each kind
Design and develop programs involving basic graph algorithms.
Introduce graphs as a powerful modeling tool that can be used to solve practical problems in
various fields.
Outline and apply the concepts of permutations and combinations and generating functions in
applications.
Apply the abstract concepts of graph theory in modeling and solving non-trivial problems in
different fields of study.
TEXTBOOKS:
1. Narsingh Deo, “Graph Theory: With Application to Engineering and Computer Science”,
Prentice Hall of India, 2003.
2. Grimaldi R.P., “Discrete and Combinatorial Mathematics: An Applied Introduction”, Addison
Wesley, 1994.
REFERENCES:
1. Clark J. and Holton D.A., “A First Look at Graph Theory”, Allied Publishers, 1995.
2. Mott J.L., Kandel A. and Baker T.P., “Discrete Mathematics for Computer Scientists and
Mathematicians”, Prentice Hall of India, 1996.
3. Liu C.L., “Elements of Discrete Mathematics”, McGraw Hill, 1985.
4. Rosen K.H., “Discrete Mathematics and Its Applications”, McGraw Hill, 2007.
Identify and describe soft computing techniques and their role in building intelligent
machines.
Apply neural networks to pattern classification and regression problems using soft
computing approach.
Apply fuzzy logic and reasoning to handle uncertainty and solve engineering problems.
Apply genetic algorithms to optimization problems.
Integrate the knowledge of neural networks, fuzzy logic, genetic algorithms, probabilistic
reasoning, rough sets, chaos, hybrid approaches.
Awake the importance of tolerance of imprecision and uncertainty for design of robust and
low-cost intelligent machines.
TEXTBOOKS:
1. S. Rajasekaran and G.A. Vijayalakshmi Pai, “Neural Networks, Fuzzy Logic and
Genetic Algorithm: Synthesis and Applications”, Prentice Hall of India, 2003.
2. N.P.Padhy,”Artificial Intelligence and Intelligent Systems”, Oxford University Press,
2005.
3. J.S.R. Jang, C.T. Sun and E. Mizutani, “Neuro-Fuzzy and Soft Computing”, Pearson
Education, 2004.
REFERENCES:
1. Siman Haykin, “Neural Networks ”, Prentice Hall of India, 1999
2. Timothy J. Ross, “Fuzzy Logic with Engineering Applications”, Third Edition, Wiley India,
2010
3. S.Y.Kung, “Digital Neural Network”, Prentice Hall International, 1993.
4. Aliev.R.A and Aliev,R.R, “ Soft Computing and its Application”, World Scientific
Publishing Company, 2001.
5. Wulfram Gerstner and Wenner Kristler, “Spiking Neural Networks”, Cambridge
University Press.
6. Bart Kosko, “Neural Networks and Fuzzy Systems: Dynamical Systems Application to
Machine Intelligence”, Prentice Hall, 1992.
UNIT V APPLICATIONS 9
Multirate Signal Processing: Decimation, Interpolation, Sampling Rate Conversion by a Rational
Factor – Adaptive Filters: Introduction, Applications of Adaptive Filtering to Equalization, Echo
Cancellation – Speech Recognition Systems, Speech Synthesis Systems – Image Enhancement,
Case Study.
TOTAL: 45 PERIODS
OUTCOMES:
Upon completion of the course, the students will be able to:
Perform frequency transforms for signals
Design IIR and FIR filters
Write programs using analog and digital filters and to compare the respective output
Identify finite word length errors in digital filters
TEXTBOOKS:
1. John G. Proakis and Dimitris G. Manolakis, “Digital Signal Processing – Principles,
Algorithms and Applications”, Pearson Education / Prentice Hall, Fourth edition, 2007.
2. Emmanuel C. Ifeachor and Barrie. W. Jervis, “Digital Signal Processing”, Pearson Education
/ Prentice Hall, Second Edition, 2002.
REFERENCES:
1. Sanjit K. Mitra, “Digital Signal Processing – A Computer Based Approach”, Tata McGraw Hill,
Fourth Edition, 2011.
2. Alan V. Oppenheim, Ronald W. Jchafer and Hohn. R. Back, “Discrete Time Signal
Processing”, Pearson Education, Third Edition, 2009.
3. K. P. Soman and K. I. Ramachandran, "Insight into Wavelets - From Theory to Practice",
Prentice Hall of India, Third Edition, 2010.
4. Lawrence Rabiner and Biing-Hwang Juang, "Fundamentals of Speech Recognition", First
Edition, Prentice Hall, 1993.
5. Rafael C. Gonzalez and Richard E. Woods, “Digital Image Processing”, Third Edition,
Pearson Education, 2009.
6. Dake Liu, “Embedded DSP Processor Design: Application Specific Instruction Set
Processors”, Morgan Kaufmann, First Edition, 2008.
TEXTBOOKS:
1. Singhal J.P. “Disaster Management”, Laxmi Publications, 2010. ISBN-10: 9380386427
ISBN-13: 978-9380386423
2. Tushar Bhattacharya, “Disaster Science and Management”, McGraw Hill India Education
Pvt. Ltd., 2012. ISBN-10: 1259007367, ISBN-13: 978-1259007361]
3. Gupta Anil K, Sreeja S. Nair. Environmental Knowledge for Disaster Risk Management,
NIDM, New Delhi, 2011
4. Kapur Anu Vulnerable India: A Geographical Study of Disasters, IIAS and Sage Publishers,
New Delhi, 2010.
REFERENCES:
1. Govt. of India: Disaster Management Act , Government of India, New Delhi, 2005
2. Government of India, National Disaster Management Policy,2009.
5. Humanitarian Assistance
before and after disaster 3 3 3 1 3 3 3 3 3 3 3 3 - 3 3
6. Technological innovations in
Disaster Risk Reduction: 3 3 3 3 3 3 3 2 3 2 - 3 3 3 3
Advantages and problems
TOTAL: 45 PERIODS
OUTCOMES:
Upon completion of the course, the students will be able to:
Define, formulate and analyze a problem
Solve specific problems independently or as part of a team
Gain knowledge of the Innovation & Product Development process in the Business
Context
Product Development process in the Business Context
Work independently as well as in teams
Manage a project from start to finish
TEXTBOOKS:
1. Book specially prepared by NASSCOM as per the MoU.
2. Karl T Ulrich and Stephen D Eppinger, "Product Design and Development", Tata McGraw
Hill, Fifth Edition, 2011.
3. John W Newstorm and Keith Davis, "Organizational Behavior", Tata McGraw Hill,
Eleventh Edition, 2005.
REFERENCES:
1. Hiriyappa B, “Corporate Strategy – Managing the Business”, Author House, 2013.
2. Peter F Drucker, “People and Performance”, Butterworth – Heinemann [Elsevier], Oxford,
2004.
3. Vinod Kumar Garg and Venkita Krishnan N K, “Enterprise Resource Planning –
Concepts”, Second Edition, Prentice Hall, 2003.
4. Mark S Sanders and Ernest J McCormick, "Human Factors in Engineering and Design",
McGraw Hill Education, Seventh Edition, 2013
Product Development 2 2 2 2 2 2 2 0 0 0 2 0 2 2 2
process in the Business
Context
Work independently as well 0 0 0 0 0 0 0 0 3 0 0 0 0 0 0
as in teams
UNIT I 9
Human Rights – Meaning, origin and Development. Notion and classification of Rights – Natural,
Moral and Legal Rights. Civil and Political Rights, Economic, Social and Cultural Rights; collective
/ Solidarity Rights.
UNIT II 9
Evolution of the concept of Human Rights Magana carta – Geneva convention of 1864. Universal
Declaration of Human Rights, 1948. Theories of Human Rights.
UNIT III 9
Theories and perspectives of UN Laws – UN Agencies to monitor and compliance.
UNIT IV 9
Human Rights in India – Constitutional Provisions / Guarantees.
UNIT V 9
Human Rights of Disadvantaged People – Women, Children, Displaced persons and Disabled
persons, including Aged and HIV Infected People. Implementation of Human Rights – National
and State Human Rights Commission – Judiciary – Role of NGO’s, Media, Educational
Institutions, Social Movements.
TOTAL : 45 PERIODS
OUTCOME:
Engineering students will acquire the basic knowledge of human rights.
To sensitize the engineering students to various aspects of human rights.
An understanding of the principles and institutions of international human rights law, including
their origins,
assumptions contents, limits and potential.
Understanding the importance of the human rights Act 1998.
The role of human rights in contemporary issues relating to terrorism, religion, ethnicity,
gender and development.
Analyse a country’s situation or an international situation in terms of human rights and
formulate human rights-based initiatives and policies.
REFERENCES:
1. Kapoor S.K., “Human Rights under International law and Indian Laws”, Central Law Agency,
Allahabad, 2014.
2. Chandra U., “Human Rights”, Allahabad Law Agency, Allahabad, 2014.
3. Upendra Baxi, The Future of Human Rights, Oxford University Press, New Delhi.
UNIT I INTRODUCTION 9
Introduction - Need for quality - Evolution of quality - Definition of quality - Dimensions of product
and service quality –Definition of TQM-- Basic concepts of TQM –-Gurus of TQM (Brief
introduction) -- TQM Framework- Barriers to TQM –Benefits of TQM.
TEXT BOOK:
1. Dale H.Besterfiled, Carol B.Michna,Glen H. Besterfield,Mary B.Sacre,Hemant Urdhwareshe
and Rashmi Urdhwareshe, “Total Quality Management”, Pearson Education Asia, Revised
Third Edition, Indian Reprint, Sixth Impression,2013.
REFERENCES:
1. James R. Evans and William M. Lindsay, “The Management and Control of Quality”, (6th
Edition), South-Western (Thomson Learning), 2005.
2. Oakland, J.S. “TQM – Text with Cases”, Butterworth – Heinemann Ltd., Oxford, Third Edition,
2003.
3. Suganthi,L and Anand Samuel, “Total Quality Management”, Prentice Hall (India) Pvt. Ltd.,
2006 .
4. Janakiraman,B and Gopal, R.K, “Total Quality Management – Text and Cases”,Prentice Hall
(India) Pvt. Ltd., 2006.
TEXT BOOKS:
1. R. Elmasri, S.B. Navathe, “Fundamentals of Database Systems”, Sixth Edition, Pearson
Education, 2010.
2. Henry F Korth, Abraham Silberschatz, S. Sudharshan, “Database System Concepts”, Sixth
Edition, McGraw Hill, 2010.
REFERENCES:
1. C.J.Date, A.Kannan and S.Swamynathan, “An Introduction to Database Systems”, Eighth
Edition, Pearson Education, 2006.
2. P. J. Sadalage and M. Fowler, "NoSQL Distilled: A Brief Guide to the Emerging World of
Polyglot Persistence", Pearson Education, 2013.
3. Rigaux, Scholl and Voisard, "Spatial Databases With Application to GIS, 1st Edition,
Morgan Kaufmann, 2002.
4. ShashiShekhar, Sanjay Chawla, "Spatial Databases: A Tour", Prentice Hall, 2003.
5. Thomas M Connolly and Carolyn E Begg, “Database Systems: A Practical Approach to
Design, Implementation and Management”, Fourth Edition, Pearson Education, 2008
Course Outcomes (COs) /
1 2 3 4 5 6 7 8 9 10 11 12 PSO1 PSO2 PSO3
Program Outcomes (POs)
Analyze the recent advancements
3 3 2 - 1 - - - 2 - - 2 2 2 -
in databases.
Evaluate the usage and
effectiveness of various 3 3 2 - 1 - - - 2 - - 2 - 2 -
databases.
Understand and work with the
architecture of
3 2 1 - 2 - - - 2 - - 2 - 2 -
parallel and distributed
databases.
Develop IR (expand) systems,
3 2 3 1 3 - - - 2 - - 2 2 2 1
xml and web databases.
Implement intelligent and
3 2 3 1 3 - - - 2 - - 2 2 2 3
multimedia databases.
Explore the representation,
storage mechanism,
query strategy and transaction 3 2 2 - 1 - - - 2 - - 2 2 2 1
management of
various databases.
IT7002 ADVANCED NETWORKS LT PC
300 3
OBJECTIVES:
To explain QoS requirements and compare different approaches to QoS.
To appreciate need for high speed networks
To identify reliability issues and provide solutions
UNIT I INTERNETWORKING 9
IPv6 - Design issues - Scalability - Addressing - Headers - Routing - Auto configuration - Transition
from IPv4 to IPv6 - Interoperability - QoS in IPv6 - Multicast support - ICMPv6 - Security in IPv6
TEXT BOOKS:
1. Larry L. Peterson, Bruce S. Davie, “Computer Networks: A Systems Approach”, Fifth Edition,
Elsevier/Morgan Kaufmann Publishers, 2011.
2. Bruce S. Davie, Adrian Farrel, “MPLS: Next Steps”, Morgan Kaufmann Publishers, 2011.
3. Rajiv Ramaswami, Kumar N. Sivarajan and Galen H. Sasaki, "Optical Networks A Practical
Perspective " ,Third Edition, Morgan Kaufmann,2010.
REFERENCES:
1. William Stallings, " High-speed networks and internets ", Second Edition Pearson Education
India, 2002.
2. "MPLS Configuration Examples and TechNotes " , www.cisco.com.
3. Ying-Dar Lin , Ren-Hung Hwang , Fred Baker , "Computer Networks: An Open Source
Approach", McGraw-Hill Higher Education, 2011.
UNIT I INTRODUCTION 9
Agents as a paradigm for software engineering - Agents as a tool for understanding human
societies- Intelligent Agent: Agents and Objects - Agents and Expert Systems - Agents as
Intentional Systems - Abstract Architectures for Intelligent Agents - How to Tell an Agent What to
Do
UNIT II LEARNING IN AGENTS 9
Proportional case - Handling variables and qualifiers - Dealing with intractability - Reasoning with
horn clauses - Procedural control of reasoning - Rules in production – Reasoning with Higher
order Logics.
UNIT V APPLICATIONS 9
Agent for workflow and business process management- Mobile agents - Agents for distributed
systems - agents for information retrieval and management - agents for electronic commerce -
agent for human- computer interface - agents for virtual environments - agents for social
simulation.
TOTAL: 45 PERIODS
OUTCOMES:
On Completion of the course, the students should be able to:
Implement a computational agent with various searching techniques.
Apply the reasoning mechanisms of proposition and predicate logic to agents.
Use the learning mechanisms for an artificial agent.
Execute different communication and co-operation methodologies in a multi-agent setup.
TEXT BOOKS:
1. Michael Wooldridge, An Introduction to Multi Agent Systems, Second Edition, John
Wiley and Sons, 2009.
2. Stuart Russell, Peter Norvig, “Artificial Intelligence: A Modern Approach”, Third Edition,
Pearson Education, 2009.
3. Lin Padgham, Michael Winikoff, Developing Intelligent Agent Systems: A Practical Guide,
Wiley publications, 2005.
REFERENCES:
1. Ronald Brachman, Hector Levesque “Knowledge Representation and Reasoning ”, The
Morgan Kaufmann Series in Artificial Intelligence 2004
2. Arthur B. Markman, “Knowledge Representation”, Lawrence Erlbaum Associates,1998
TEXT BOOK:
1. Christian Nagel, Bill Evjen, Jay Glynn, Karli Watson, Morgan Skinner . “Professional C#
2012 and .NET 4.5”, Wiley, 2012
REFERENCES:
1. Andrew Troelsen, Pro C# 5.0 and the .NET 4.5 Framework, Apress publication, 2012.
2. Ian Gariffiths, Mathew Adams, Jesse Liberty, “Programming C# 4.0”, O’Reilly, Fourth
Edition, 2010.
3. Andy Wigley, Daniel Moth, Peter Foot, “Mobile Development Handbook”, Microsoft
Press, 2011.
4. Harsh Bhasin, “Programming in C#”, Oxford University Press, 2014.
UNIT I INTRODUCTION 9
Introduction to Cloud Computing – Definition of Cloud – Evolution of Cloud Computing –
Underlying Principles of Parallel and Distributed Computing – Cloud Characteristics – Elasticity in
Cloud – On-demand Provisioning.
UNITII VIRTUALIZATION 9
Basics of Virtualization – Types of Virtualization – Implementation Levels of Virtualization –
Virtualization Structures – Tools and Mechanisms – Virtualization of CPU – Memory – I/O Devices
– Desktop Virtualization – Server Virtualization.
UNIT III CLOUD ENABLING TECHNOLOGIES AND INFRASTRUCTURE 9
Service Oriented Architecture – RESTful Web Services – NIST Cloud Computing Reference
Architecture – laaS – PaaS – SaaS – Public, Private and Hybrid Clouds – Cloud Storage –Design
Challenges in Cloud – Peer-to-Peer Architecture.
TEXT BOOKS:
1. Kai Hwang, Geoffrey C Fox, Jack G Dongarra, "Distributed and Cloud Computing,
From Parallel Processing to the Internet of Things", Morgan Kaufmann Publishers,
2012.
2. James E. Smith, Ravi Nair, "Virtual Machines: Versatile Platforms for Systems and Processes",
Elsevier/Morgan Kaufmann, 2005.
3. Toby Velte, Anthony Velte, Robert Elsenpeter, "Cloud Computing - A Practical Approach”,
TMH,2009.
REFERENCES:
1. John W.Rittinghouse and James F.Ransome, "Cloud Computing: Implementation
"Management, and Security", CRC Press, 2010.
2. Rajkumar Buyya, Christian Vecchiola, S.ThamaraiSelvi “Mastering Cloud Computing”, Tata
Mcgraw Hill, 2013.
3. George Reese, "Cloud Application Architectures: Building Applications and Infrastructure in the
Cloud: Transactional Systems for EC2 and Beyond (Theory in Practice), O'Reilly, 2009.
UNIT V APPLICATIONS 9
Machine translation - Transfer metaphor - Interlingua and statistical approaches - Discourse
processing - Dialog and conversational agents - Natural language generation - Surface Realization
and discourse planning.
TOTAL: 45 PERIODS
OUTCOMES:
On Completion of the course, the students should be able to:
Develop applications related to speech processing
Develop applications related to text mining
TEXT BOOKS:
1. Daniel Jurafsky, James H. Martin, " Speech and Language Processing", Pearson
Education, 2009.
2. Ronald Cole, J.Mariani, et.al, "Survey of the state of the art in human language
Technology", Cambridge University Press, 1997.
3. Michael W.Berry, " Survey of Txt Mining: Clustering, Classification and Retrieval", Springer
Verlag, 2004.
4. Christopher D.Manning, Hinrich Schutze, "Foundations of Statistical Natural Language
Processing ", MIT Press, 1999.
REFERENCES:
1. James Allen, "Natural Language Understanding", Second Edition, Pearson
Education, 2008.
2. Gerald J.Kowalski, Mark. T. Maybury, " Information Storage and Retrieval systems" , Kluwer
Academic Publishers, 2000.
3. Tomek Strzalkowski, " Natural Language Information Retrieval", Kluwer Academic Publishers,
1999.
IT7007 COMPUTER FORENSICS LTPC
3003
OBJECTIVES:
To introduce the concept of Computer Forensic and Investigations
To know about the principles of evidence collection and management
To learn about the types of attacks and remedial actions in the context of systems,
networks, images and video.
TEXT BOOKS:
1. Kevin Mandia, Chris Prosise, “Incident Response and Computer Forensics”, Tata Mc Graw
Hill, 2006.
2. Bill Nelson, Amelia Philips, Christopher Stueart, "Guide to Computer Forensics and
Investigations", Cengage Learning, 2013.
REFERENCES:
1. John R. Vacca, “Computer Forensics”, Firewall Media, 2009.
2. Eoghan Casey, "Handbook Computer Crime Investigation's Forensic Tools and Technology",
Academic Press, 1st Edition, 2001.
3. Davide Cowen, " Computer Forensics: A Beginners Guide", McGraw Hill Education (India)
Private Limited, 2011.
UNIT I INTRODUCTION 9
Definition – Benefits – Challenges & opportunities- Developing E-learning-E-learning approaches-
E-learning components-Synchronous and asynchronous e-learning-Quality of e-learning-Blended
learning- ROI metrics & evaluation – E-Learning cycle – Learning strategy – Business drivers – E-
learning strategy.
UNIT II DESIGN 9
Identifying and organizing course content-Needs analysis- Analyzing the target audience-
Identifying course content-Defining learning objectives-Defining the course sequence-Defining
instructional, media, evaluation and delivery strategies-Defining instructional methods, Defining the
delivery strategy, Defining the evaluation strategy. Instructional design – Design issues – Types of
learning engagements – Blended learning – Team – Infra structure – Vendor relationships
TEXTBOOKS:
1. Clark, R. C. and Mayer, R. E. (2011) eLearning and the Science of Instruction. 3rd edition.
2. Means, B., Toyama, Y., and Murphy, R. (2010) Evaluation of Evidence-Based Practices in
Online Learning: A Meta-Analysis and Review of Online Learning Studies.
REFERENCES :
1. Crews, T. B., Sheth, S. N., and Horne, T. M. (2014) Understanding the Learning
Personalities of Successful Online Students. Educause Review. Jan/Feb 2014.
2. Madhuri Dubey,”Effective E-learning Design,Development and Delivery”,University Press
2011.
REFERENCES:
1. David H. Eberly, “3D Game Engine Design, Second Edition: A Practical Approach to Real-
Time Computer Graphics” Morgan Kaufmann, 2 Edition, 2006.
2. Jung Hyun Han, “3D Graphics for Game Programming”, Chapman and Hall/CRC,1st edition,
2011.
3. Mike Mc Shaffrfy, “Game Coding Complete”, Third Edition, Charles River Media, 2009.
4. Jonathan S. Harbour, “Beginning Game Programming”, Course Technology PTR, 3 edition,
2009.
5. Ernest Adams and Andrew Rollings, “Fundamentals of Game Design”, Prentice Hall 1st
edition, 2006.
6. Roger E. Pedersen, “Game Design Foundations”, Edition 2, Jones & Bartlett Learning, 2009.
7. Scott Rogers, “Level Up!: The Guide to Great Video Game Design”, Wiley, 1st edition, 2010.
TEXT BOOKS:
1. Peter Pacheco, “Introduction to parallel programming”, Morgan Kauffman, 2011.
2. David B. Kirk, Wen-mei W. Hwu, “Programming massively parallel processors”,
Morgan Kauffman, 2013, 2nd Edition.
REFERENCES:
1. Shane Cook, “CUDA Programming – A developers guide to parallel computing with GPUs”,
Morgan Kauffman, 2013.
2. B.R. Gaster, L. Howes, D.R. Kaeli, P. Mistry, D. Schaa, “ Heterogeneous computing
with OpenCL”, Morgan Kauffman, 2012.
TOTAL: 45 PERIODS
OUTCOMES:
On Completion of the course, the students should be able to:
File patents for their innovations.
Distinguish between legal procedures for patents and copyrights.
TEXT BOOKS:
1. BARE ACT, Indian Patent Act 1970 Acts & Rules, Universal Law Publishing Co. Pvt. Ltd.,
2007.
2. Stim,“Intellectual Property Copyrights, trademarks, and Patents,” Cengage Learning India
Private Ltd, 2004.
3. Deborah E. Bouchoux, “Intellectual Property Rights,” Cengage Learning India Private Ltd,
2005.
REFERENCES :
1. Prabuddha Ganguli, “Intellectual Property Rights,”, TMH, 2001.
2. A. Primer, R. Anita Rao and Bhanoji Rao, Intellectual Property Rights, Lastain Book
company.
3. V. Sople Vinod, Managing Intellectual Property by (Prentice Hall of India Pvt.Ltd),
2006.
4. Lal, C.S, “Intellectual property handbook: copyright, designs, patent and trademarks”,
Law Publishers Allahabad, 2000.
5. P.Narayanan, “Patent Law”, 3rd Edition; Eastern law house, 1998.
TEXT BOOK:
1. Arshdeep Bahga, Vijay Madisetti, "Internet of Things-A hands-on approach", Universities
Press, 2015.
REFERENCES:
1. Manoel Carlos Ramon, “Intel® Galileo and Intel® Galileo Gen 2: API Features and
Arduino Projects for Linux Programmers”, Apress, 2014.
2. Marco Schwartz, “Internet of Things with the Arduino Yun”, Packt Publishing, 2014.
Course Outcomes (COs) /
1 2 3 4 5 6 7 8 9 10 11 12 PSO1 PSO2 PSO3
Program Outcomes (POs)
Design a portable IoT using
arduino/equivalent boards and 3 2 3 - 2 - - - 2 - - 2 2 2 -
relevant protocols
Develop web services to
2 2 3 1 2 - - - 2 - - 2 2 2 -
access/control IoT devices
Deploy an IoT application and
2 2 3 - 2 - - - 2 - - 2 2 2 -
connect to the cloud
Analyze applications of iot in real
2 2 1 1 2 - - - 2 - - 2 2 2 3
time scenario
Apply analytics in the design of iot
2 2 3 1 2 - - - 2 - - 2 2 2 3
based applications
Manage iot systems based on the
2 2 1 - 2 - - - 2 - - 2 2 2 3
level of complexity
UNIT I INTRODUCTION 9
Mobile Applications – Characteristics and Benefits – Application Model – Infrastructure and
Managing Resources – Mobile Software Engineering – Frameworks and Tools – Mobile devices
Profiles.
UNIT II USER INTERFACE 9
Generic UI Development – VUIs and Mobile Applications – Text to Speech techniques – Designing
the right UI – Multimodal and Multichannel UI – Gesture based UIs – Screen Elements and
Layouts – Voice XML – Java API.
UNIT III APPLICATION DESIGN 9
Memory Management – Design patterns for limited memory – Work flow for Application
Development – Techniques for composing Applications – Dynamic Linking – Plug ins and rules of
thumb for using DLLs – Concurrency and Resource Management – Look and feel.
UNIT IV APPLICATION DEVELOPMENT 9
Intents and Services – Storing and Retrieving data – Communication via the Web – Notification
and Alarms – Graphics and Multimedia – Telephony – Location based services – Packaging and
Deployment – Security and Hacking.
UNIT V TOOLS 9
Google Android Platform – Eclipse Simulator – Android Application Architecture – Event based
programming – Apple iPhone Platform – UI tool kit interfaces – Event handling and Graphics
services – Layer Animation.
TOTAL:45 PERIODS
OUTCOMES:
On Completion of the course, the students should be able to:
To design and implement the user interfaces for mobile applications.
To design the mobile applications that is aware of the resource constraints of mobile devices.
To develop advanced mobile applications that accesses the databases and the web.
To develop useful mobile applications in the current scenario using Google Android and
Eclipse simulator.
TEXT BOOKS:
1. Share Conder, Lauren Darcey, "Android Wireless Application Development" Pearson
3rd Edition.
2. Zigurd Mednieks, Laird Dornin, G, Blake Meike and Masumi Nakamura, “Programming
Android”, O‟Reilly, 2011.
REFERENCES:
1. Professional mobile Application Development paperback,2012 Jeff
Mcherter (Author),Scott Gowell (Author), Wiley India Private Limited
2. Reto Meier, Wrox Wiley, “Professional Android 2 Application Development”, 2010.
3. Alasdair Allan, “iPhone Programming”, O‟Reilly, 2010.
4. Wei-Meng Lee, “Beginning iPhone SDK Programming with Objective-C”, Wrox Wiley,
2010.
5. Stefan Poslad, “Ubiquitous Computing: Smart Devices, Environments and interactions”,
Wiley, 2009.
6. Pro iOS Table VIews: for iPhone, iPad and IPod Touch Paperback,2012, Tim Duckett,
Apress
7. iOS Programming: The Big Nerd Ranch Guide Paperback, 2014, Joe COnway, Aaron
Hilegass, Christian Keur.
8. iOS in Practise Paperback, 2012, Bear Cachil.
9. Mobile Authentication: Problems and Solutions (SpringerBriefs in Computer Science)
Paperback, 2012, Markus Jakobsson.
10. Android App Development for Young Adults & The Rest of US Paperback, 2015, Paula
Beer, Carl Simmons.
11. Oracle Mobile Application Framework Developer Guide: Build Multiplatform Enterprise
Mobile Apps Paperback, 2014, Luc Bros.
TEXT BOOKS:
1. W. Richard Stevens, “UNIX Network Programming Vol-I”, Third Edition, PHI Pearson
Education, 2003.
2. William Stallings, “SNMP, SNMPv2, SNMPv3 and RMON 1 and 2”, Third Edition, Pearson
Edition, 2009.
REFERENCES:
1. D.E. Comer, “Internetworking with TCP/IP Vol- I: Sixth Edition, Pearson Edition, 2013.
2. D.E. Comer, “Internetworking with TCP/IP Vol- III: Client-Server Programming and Application
BSD Sockets Version”, Second Edition, Pearson Edition, 2003.
Course Outcomes (COs) /
1 2 3 4 5 6 7 8 9 10 11 12 PSO1 PSO2 PSO3
Program Outcomes (POs)
Implementation of Client/server
communications using TCP and
3 3 3 1 3 - - - 2 - - 3 3 3 2
UDP sockets
UNIT II CLUSTERING 9
Clustering for unsupervised learning and classification – Clustering concept – C Means algorithm –
Hierarchical clustering – Graph theoretic approach to pattern Clustering – Validity of Clusters.
TEXT BOOKS:
1. M. Narasimha Murthy and V.Susheela Devi, “Pattern Recognition”, Springer 2011.
2. S.Theodoridis and K.Koutroumbas, “Pattern Recognition”, 4th Edition., Academic Press,
2009
REFERENCES:
1. Robert J.Schalkoff, “Pattern Recognition Statistical, Structural and Neural Approaches”,
John Wiley & Sons Inc., New York, 1992.
2. C.M.Bishop,“Pattern Recognition and Machine Learning”, Springer, 2006.
3. R.O.Duda, P.E.Hart and D.G.Stork, “Pattern Classification”, John Wiley, 2001.
4. Andrew Webb, “Stastical Pattern Recognition”, Arnold publishers, London, 1999.
OUTCOMES:
On Completion of the course, the students should be able to:
Work in the linux environment and contribute to free and open source software
Implement content management systems
Install and configure linux os distribution in embedded devices that support linux
Build simple hardware projects using embedded linux devices
TEXT BOOK:
1. Roderick W Smith, Linux Essentials, Wiley Publications, 2012.
REFERENCES:
1. Philosophy of GNU URL: http://www.gnu.org/philosophy/
2. Overview of Linux Distributions URL: http://distrowatch.com/dwres.php?resource=major
3. Introduction to Linux – A Hands on Guide, URL: http://tldp.org/guides.html
4. Linux: Rute's User tutorial and exposition , URL: http://rute.2038bug.com/index.html.gz
5. Version control system , URL: http://git-scm.com/\
6. Stephen Burge,Joomla! 3 Explained: Your step-by-step guide, Pearson education, 2014.
7. Simon Monk, "Programming the Raspberrypi: Getting started with python", McGraw Hill, 2013
UNIT V APPLICATIONS 9
Web Services – Semantic Web Services - Case Study for specific domain – Security issues –
Web Data Exchange and Syndication - Semantic Wikis - Semantic Portals - Semantic Metadata in
Data Formats - Semantic Web in Life Sciences - Ontologies for Standardizations - RIF
Applications.
TOTAL :45 PERIODS
OUTCOMES:
On Completion of the course, the students should be able to:
Create Ontology for a given domain.
Develop an application using ontology languages and tools.
Design and develop web service applications using semantic portals.
TEXT BOOKS:
1. Asuncion Gomez-Perez, Oscar Corcho, Mariano Fernandez-Lopez “Ontological Engineering:
with examples from the areas of Knowledge Management, e-Commerce and the Semantic
Web” Springer, 2004.
2. Pascal Hitzler, Markus Krötzsch, Sebastian Rudolph, "Foundations of Semantic Web
Technologies", Chapman & Hall/CRC, 2009.
REFERENCES:
1. Grigoris Antoniou, Frank van Harmelen, “A Semantic Web Primer (Cooperative Information
Systems)”, The MIT Press, 2004.
2. Alexander Maedche, “Ontology Learning for the Semantic Web”,Springer; 1 edition, 2002.
3. John Davies, Dieter Fensel, Frank Van Harmelen, “Towards the Semantic Web: Ontology –
Driven Knowledge Management”, John Wiley & Sons Ltd., 2003.
4. John Davies(Editor), Rudi Studer(Co-Editor), Paul Warren(Co-Editor)“Semantic Web
Technologies: Trends and Research in Ontology-based Systems”Wiley Publications, Jul
2006.
5. Dieter Fensel (Editor), Wolfgang Wahlster, Henry Lieberman, James Hendler, “Spinning the
Semantic Web: Bringing the World Wide Web to Its Full Potential”, The MIT Press, 2002.
6. Michael C. Daconta, Leo J. Obrst, Kevin T. Smith, “The Semantic Web: A Guide to the Future
of XML, Web Services, and Knowledge Management”, Wiley, 2003.
7. Steffen Staab (Editor), Rudi Studer, “Handbook on Ontologies (International Handbooks on
Information Systems)”, Springer 1st edition, 2004.
8. Dean Allemang(Author),James Hendler(Author) “Semantic Web for the Working Ontologist:
Effective Modeling in RDFS and OWL” (Paperback), Morgan Kaufmann, 2008.
TEXT BOOKS:
1. Peter Mika, “Social Networks and the Semantic Web”, Springer, 1st edition 2007.
2. BorkoFurht, “Handbook of Social Network Technologies and Applications”, Springer, 1st
edition, 2010.
REFERENCES:
1. GuandongXu ,Yanchun Zhang and Lin Li, “Web Mining and Social Networking
Techniques and applications”, Springer, 1st edition, 2011.
2. Max Chevalier, Christine Julien and Chantal Soulé-Dupuy, “Collaborative and Social
Information Retrieval and Access: Techniques for Improved User Modelling”, IGI
Global snippet, 2009.
3. John G. Breslin, Alexandre Passant and Stefan Decker, “The Social Semantic
Web”, Springer, 2009.
TOTAL : 45 PERIODS
OUTCOMES:
On Completion of the course, the students should be able to:
An insight to Software Testing will be obtained
Have knowledge about the role of software tester and aware of automated testing tools
Emphasis on maintaining documentation for testing will be understood
TEXT BOOKS
1. Paul C. Jorgensen, “Software Testing: A Craftsman's Approach”, Fourth Edition, CRC Press,
2013.
2. Dorothy Graham, Mark Fewster, “Experiences of Test Automation: Case Studies of Software
Test Automation”, Pearson Education, 2012.
REFERENCES:
1. Glenford J.Myers, Tom Badgett, Corey Sandler, “The Art of Software Testing”,3rd edition,
John Wiley & Sons publication, 2012.
2. Srinivasan Desikan, Gopalaswamy Ramesh, “Software testing- Principles and Practices”,
Pearson education, 2009.
3. Boris Beizer, “Software testing techniques”, Dream Tech Press, 2009.
4. Mauro Pezze, Michal Young, “Software Testing and Analysis Process Principles and
Techniques”, Wiley India, 2008.
UNIT I INTRODUCTION 9
Introduction – Issues – Data Representation – Data Presentation – Common Mistakes in design.
TEXT BOOKS:
1. Colin Ware, “Information Visualization Perception for Design” Margon Kaufmann
Publishers, 2004, 2nd edition.
2. Robert Spence “Information visualization – Design for interaction”, Pearson Education, 2 nd
Edition, 2007
3. Stephen Few, “Information Dashboard Design-The Effective Visual Communication of
Data”: O'Reilly Media Publisher,1st Edition 2006
REFERENCE:
1. Stuart.K.Card, Jock.D.Mackinlay and Ben Shneiderman, “Readings in Information Visualization
Using Vision to think”, Morgan Kaufmann Publishers.
TEXT BOOKS:
1. KazemSohraby, Daniel Minoli, TaiebZnati, “Wireless Sensor Networks-Technology, Protocols,
and Applications”, John Wiley & Sons, 2007.
2. Ian F. Akyildiz ,Xudong Wang , “Wireless Mesh Networks”, John Wiley & Sons, 2009.
REFERENCES:
1. Holger Karl, Andreas Willig, “Protocols and Architectures for Wireless Sensor Networks”, John
Wiley & Sons, 2005.
2. Yan Zhang, JijunLuo, Honglin Hu, “Wireless Mesh Networking-Architectures, Protocols and
Standards”, Auerbach Publications, 2007.
3. Robert Faludi, " Building Wireless Sensor Networks", O’Reilly Media, 2011.
4. Timothy Kolaya , " Advances in Wireless Mesh Networks " , Clanrye International, 2015.
REFERENCES:
1. Milan Sonka, Vaclav Hlavac and Roger Boyle, “Image Processing, Analysis and Machine
Vision”, Second Edition, Thompson Learning, 2007.
2. Anil K.Jain, “Fundamentals of Digital Image Processing”, PHI, 2011.
3. Sanjit K. Mitra, & Giovanni L. Sicuranza, “Non Linear Image Processing”, Elsevier, 2007.
UNIT I FUNDAMENTALS 9
Internetworking concepts - IP and datagram forwarding - TCP services - Interactive data flow -
Timeout and retransmission - Bulk data flow - Persist timer – Keep-alive timer
TEXT BOOKS:
1. Douglas E. Comer, “Internetworking with TCP/IP Principles, Protocols and Architecture”, Vol.
1 Sixth edition, Pearson Education Asia, 2013.
2. Douglas E. Comer, “Internetworking with TCP/IP - Design, Implementation and Internals”, Vol.
2 Third edition, Pearson Education Asia, 1999.
REFERENCE:
1. W. Richard Stevens, “TCP/IP illustrated-The Protocols”, Volume 1, Pearson Education, 2012.
MA7359 ALGEBRA AND NUMBER THEORY LTPC
400 4
OBJECTIVES :
To introduce the basic notions of groups, rings, fields which will then be used to solve
related problems.
To examine the key questions in the Theory of Numbers.
To give an integrated approach to number theory and abstract algebra, and provide a firm
basis for further reading and study in the subject.
REFERENCES:
1. San Ling and Chaoping Xing, “Coding Theory – A first Course”, Cambridge
Publications, Cambridge, 2004.
2. Niven.I, Zuckerman.H.S., and Montgomery, H.L.,“An Introduction to
Theory of Numbers” , John Wiley and Sons, Singapore, 2004.
3. Lidl.R., and Pitz. G, "Applied Abstract Algebra", Springer-Verlag, New
Delhi, 2nd Edition, 2006.
MA 7354 NUMERICAL METHODS LTP C
4004
OBJECTIVES:
To provide the mathematical foundations of numerical techniques for solving linear system,
eigenvalue problems, interpolation, numerical differentiation and integration and the errors
associated with them;
To demonstrate the utility of numerical techniques of ordinary and partial differential
equations in solving engineering problems where analytical solutions are not readily
available.
UNIT I SOLUTION OF EQUATIONS AND EIGENVALUE PROBLEMS 12
Solution of algebraic and transcendental equations - Fixed point iteration method – Newton-
Raphson method- Solution of linear system of equations - Gauss elimination method – Pivoting -
Gauss-Jordan methods – Iterative methods of Gauss-Jacobi and Gauss-Seidel - Matrix Inversion
by Gauss-Jordan method - Eigen values of a matrix by Power method and by Jacobi’s method.
TOTAL: 60 PERIODS
TEXT BOOKS:
1. Grewal, B.S. and Grewal,J.S., “Numerical methods in Engineering and
Science”, Khanna Publishers, New Delhi, 9th Edition, 2007.
2. Sankara Rao . K, " Numerical Methods for Scientists and Engineers" PHI
Learning Pvt Ltd. New Delhi, 2007.
REFERENCES:
1. Brian Bradie, “A Friendly Introduction to Numerical Analysis”, Pearson Education
Asia, New Delhi, 1st Edition, 2007.
2. Gerald, C.F. and Wheatley, P.O., “Applied Numerical Analysis”, Pearson
Education Asia, New Delhi, 6th Edition, 2006.
3. Laurene V. Fausett, “Applied Numerical Analysis using MATLAB”, Pearson
Education, New Delhi, 1st print, 2nd Edition, 2009.
4. S. R. K. Iyengar, R. K. Jain, Mahinder Kumar Jain, "Numerical Methods for
Scientific and Engineering Computation", 6th Edition, New Age
International Publishers, New Delhi, 2012.