R18 Cse CS Syllabus
R18 Cse CS Syllabus
R18 Cse CS Syllabus
BACHELOR OF TECHNOLOGY
COMPUTER SCIENCE & ENGINEERING
Note: The regulations here under are subject to amendments as may be made
by the Academic Council of the College from time to time. Any or all such
amendments will be effective from such date and to such batches of candidates
(including those already undergoing the program) as may be decided by the
Academic Council.
COMPUTER SCIENCE & ENGINEERING
3.1 A student after securing admission shall complete the B.Tech. programme in a
minimum period of four academic years (8 semesters), and a maximum period of eight
academic years (16 semesters) starting from the date of commencement of first year first
semester, failing which student shall forfeit seat in B.Tech course. Each student shall
secure 160 credits (with CGPA ≥ 5) required for the completion of the under graduate
programme and award of the B.Tech. degree.
3.2 UGC/ AICTE specified definitions/ descriptions are adopted appropriately for various
terms and abbreviations used in these academic regulations/ norms, which are listed
below.
3.2.1 Semester scheme
Each under graduate programme is of 4 academic years (8 semesters) with the
academic year divided into two semesters of 22 weeks (≥ 90 instructional days) each,
each semester having - ‘Continuous Internal Evaluation (CIE)’ and ‘Semester End
Examination (SEE)’ under Choice Based Credit System (CBCS) and Credit Based
Semester System (CBSS) indicated by UGC, and curriculum/course structure as
suggested by AICTE are followed.
All subjects/ courses are to be registered by the student in a semester to earn credits
which shall be assigned to each subject/ course in an L: T: P: C (lecture periods:
tutorial periods: practical periods: credits) structure based on the following general
pattern.
One credit for one hour/ week/ semester for theory/ lecture (L) courses or
Tutorials.
One credit for two hours/ week/ semester for laboratory/ practical (P) courses.
6 Third year second semester (i) Regular course of study of third year
to fourth year first semester second semester.
(ii) Must have secured at least 73 credits
out of 123 credits i.e., 60% credits up
to third year second semester from
all the relevant regular and
supplementary examinations,
whether the student takes those
examinations or not.
7 Fourth year first semester Regular course of study of fourth year
to fourth year second first semester.
semester
7.4 A student (i) shall register for all courses/subjects covering 160 credits as specified
and listed in the course structure, (ii) fulfills all the attendance and academic
requirements for 160 credits, (iii) earn all 160 credits by securing SGPA ≥ 5.0 (in
each semester), and CGPA (at the end of each successive semester) ≥ 5.0, (iv)
passes all the mandatory courses, to successfully complete the under graduate
programme. The performance of the student in these 160 credits shall be taken into
account for the calculation of ‘the final CGPA (at the end of under graduate
programme), and shall be indicated in the grade card of IV year II semester.
7.5 If a student registers for ‘extra subjects’ (in the parent department or other
departments/branches of Engg.) other than those listed subjects totaling to 160
credits as specified in the course structure of his department, the performances in
those ‘extra subjects’ (although evaluated and graded using the same procedure as
that of the required 160 credits) will not be taken into account while calculating the
SGPA and CGPA. For such ‘extra subjects’ registered, percentage of marks and
letter grade alone will be indicated in the grade card as a performance measure,
subject to completion of the attendance and academic requirements as stated in
regulations 6 and 7.1 – 7.4 above.
7.6 A student eligible to appear in the semester end examination for any subject/ course,
but absent from it or failed (thereby failing to secure ‘C’ grade or above) may
reappear for that subject/ course in the supplementary examination as and when
conducted. In such cases, internal marks (CIE) assessed earlier for that subject/
course will be carried over, and added to the marks to be obtained in the SEE
supplementary examination for evaluating performance in that subject.
7.7 A student detained in a semester due to shortage of attendance may be re-
admitted in the same semester in the next academic year for fulfillment of
academic requirements. The academic regulations under which a student has been
readmitted shall be applicable. However, no grade allotments or SGPA/ CGPA
calculations will be done for the entire semester in which the student has been
detained.
7.8 A student detained due to lack of credits, shall be promoted to the next academic
year only after acquiring the required academic credits. The academic regulations
under which the student has been readmitted shall be applicable to him.
Two assignments are to be given to students covering the syllabus of first mid and second
Mid examinations and these assignments and Attendance are evaluated for 5 marks each.
The first assignment shall be submitted before first mid examinations and second
Assignment should be submitted before second mid examination.
At the end of the semester Internal Marks Maximum of 30 for the respective subjects are
allotted as follows:
a) 25 marks for the average of the two mid term examinations
b) 5 marks of the average of the two assignment marks & Attendance
8.2.1 For practical subjects there shall be a continuous evaluation during the semester for
25 sectional marks and 50 marks for end examination. Out of the 25 marks for
internal, day-to-day work in the laboratory shall be evaluated for 10 marks, and 10
marks for internal examination (two internal practical examinations will be conducted
and the average of the two examinations will be taken into account) and 5 marks for
laboratory record.
NOTE: A student who is absent for any assignment/Mid term examination for any
reason what so ever shall be deemed to have secured ‘zero’ marks in the
test/examination and no makeup test/examination shall be conducted.
8.2.2 For the subjects having design and / or drawing, (such as Engineering
Graphics, Engineering Drawing, Machine Drawing, Production Drawing Practice, and
Estimation etc., the distribution shall be 30 marks for internal evaluation (15 marks for
day-to-day work and 15 marks for internal tests (the average of the two
examinations will be taken into account) and 70 marks for end examination.
SRI INDU COLLEGE OF ENGINEERING & TECHNOLOGY (AUTONOMOUS) Page 13
COMPUTER SCIENCE & ENGINEERING
There shall be two internal tests in a semester. The Internal and End Examination
pattern for the above subjects may be different from the other theory subjects.
8.2.3 There shall be an industry-oriented mini-Project, in collaboration with an
industry of their specialization, to be taken up during the vacation after III year II
Semester examination. The mini project shall be evaluated during the IV year II
Semester. The industry oriented mini project shall be submitted in report form and
should be presented before a committee, which shall be evaluated for 50 marks. The
committee consists of Head of the Department, the supervisor of mini project and a
senior faculty member of the department and External Examiner.
8.2.4 There shall be a seminar presentation in IV year II Semester. For the seminar, the
student shall collect the information on a specialized topic other than the project
topic and prepare a technical report, showing his understanding of the topic, and
submit to the department, which shall be evaluated by a Departmental committee
consists of the Head of the department, seminar supervisor and a senior faculty
member. The seminar report shall be evaluated for 50 marks. There shall be no
external examination for seminar.
9.3 A student who has obtained an ‘F’ grade in any subject shall be deemed to have
‘failed’ and is required to reappear as a ‘supplementary student’ in the semester end
examination, as and when offered. In such cases, internal marks in those subjects
will remain the same as those obtained earlier.
9.4 To a student who has not appeared for an examination in any subject, ‘Ab’ grade will
be allocated in that subject, and he is deemed to have ‘failed’. A student will be
required to reappear as a ‘supplementary student’ in the semester end examination,
as and when offered next. In this case also, the internal marks in those subjects will
remain the same as those obtained earlier.
9.5 A letter grade does not indicate any specific percentage of marks secured by the
student, but it indicates only the range of percentage of marks.
9.6 A student earns grade point (GP) in each subject/ course, on the basis of the letter
grade secured in that subject/ course. The corresponding ‘credit points’ (CP) are
computed by multiplying the grade point with credits for that particular subject/
course.
i=1
where ‘i’ is the subject indicator index (takes into account all subjects in a semester), ‘N’
is the no. of subjects ‘registered’ for the semester (as specifically required and listed
under the course structure of the parent department), Ci is the no. of credits allotted to
the ith subject, and Gi represents the grade points (GP) corresponding to the letter grade
awarded for that ith subject.
9.9 The Cumulative Grade Point Average (CGPA) is a measure of the overall cumulative
performance of a student in all semesters considered for registration. The CGPA is
the ratio of the total credit points secured by a student in all registered courses in all
semesters, and the total number of credits registered in all the semesters. CGPA is
rounded off to two decimal places. CGPA is thus computed from the I year II
semester onwards at the end of each semester as per the formula
where ‘M’ is the total no. of subjects (as specifically required and listed under the course
structure of the parent department) the student has ‘registered’ i.e., from the 1 st
semester onwards up to and inclusive of the 8 th semester, ‘j’ is the subject indicator
index (takes into account all subjects from 1 to 8 semesters), Cj is the no. of credits
allotted to the jth subject, and Gj represents the grade points (GP) corresponding to the
letter grade awarded for that jth subject. After registration and completion of I year I
semester, the SGPA of that semester itself may be taken as the CGPA, as there are no
cumulative effects.
II Course 14 3 O 10 30
III Course 15 2 A 8 16
III Course 16 1 C 5 5
III Course 17 4 O 10 40
III Course 18 3 B+ 7 21
III Course 19 4 B 6 24
III Course 20 4 A 8 32
III Course 21 3 B+ 7 21
Total Credit
Total Credits 69 518
Points
The above illustrated calculation process of CGPA will be followed for each
subsequent semester until 8th semester. The CGPA obtained at the end of 8th
semester will become the final CGPA secured for entire B.Tech. Programme.
9.10 For merit ranking or comparison purposes or any other listing, only the ‘rounded off’
values of the CGPAs will be used.
9.11 SGPA and CGPA of a semester will be mentioned in the semester Memorandum of
Grades if all subjects of that semester are passed in first attempt. Otherwise the
SGPA and CGPA shall be mentioned only on the Memorandum of Grades in which
sitting he passed his last exam in that semester. However, mandatory courses will
not be taken into consideration.
10.0 Issue of Grade Card:
After the completion of each semester, a grade card or grade sheet shall be issued to
all the registered students of that semester, indicating the letter grades and credits
earned. It will show the details of the courses registered (course code, title, no. of
credits, grade earned, etc.), credits earned.
11.0 Declaration of results
11.1 Computation of SGPA and CGPA are done using the procedure listed in 9.6 to 9.9.
11.2 For final percentage of marks equivalent to the computed final CGPA, the following
formula may be used.
% of Marks = (final CGPA – 0.5) x 10
12.1 A student who registers for all the specified subjects/ courses as listed in the course
structure and secures the required number of 160 credits (with CGPA ≥ 5.0), within 8
academic years from the date of commencement of the first academic year, shall be
declared to have ‘qualified’ for the award of B.Tech. degree in the chosen branch of
Engineering selected at the time of admission.
12.2 A student who qualifies for the award of the degree as listed in item 12.1 shall be
placed in the following classes.
12.3 A student with final CGPA (at the end of the under graduate programme) ≥ 8.00, and
fulfilling the following conditions - shall be placed in ‘first class with distinction’.
However, he
(i) Should have passed all the subjects/courses in ‘first appearance’ within the
first 4 academic years (or 8 sequential semesters) from the date of
commencement of first year first semester.
(ii) Should have secured a CGPA ≥ 8.00, at the end of each of the 8 sequential
semesters, starting from I year I semester onwards.
(iii) Should not have been detained or prevented from writing the semester end
examinations in any semester due to shortage of attendance or any other
reason.
A student not fulfilling any of the above conditions with final CGPA ≥ 8 shall be placed in ‘first
class’.
12.4 Students with final CGPA (at the end of the under graduate programme) ≥ 6.50 but <
8.00 shall be placed in ‘first class’.
12.5 Students with final CGPA (at the end of the under graduate programme) ≥ 5.50 but <
6.50, shall be placed in ‘second class’.
12.6 All other students who qualify for the award of the degree (as per item 12.1), with final
CGPA (at the end of the under graduate programme) ≥ 5.00 but < 5.50, shall be
placed in ‘pass class’.
12.7 A student with final CGPA (at the end of the under graduate programme) < 5.00 will
not be eligible for the award of the degree.
12.8 Students fulfilling the conditions listed under item 12.3 alone will be eligible for award
of ‘Gold Medal’ / College Toppers.
13.0 Withholding of results
13.1 If the student has not paid the fees to the College at any stage, or has dues pending
due to any reason whatsoever, or if any case of indiscipline is pending, the result of
the student may be withheld, and the student will not be allowed to go into the next
higher semester. The award or issue of the degree may also be withheld in such
cases.
14.0 Student transfers
14.1 There shall be no branch transfers after the completion of admission process.
14.2 There shall be no transfers from one college/stream to another within the constituent
colleges and units of Sri Indu College of Engineering & Technology.
14.3 The students seeking transfer to colleges affiliated to JNTUH with special directions of
GAD / JNTUH from various other Universities/institutions have to pass the failed
subjects which are equivalent to the subjects of JNTUH, and also pass the subjects
of JNTUH which the students have not studied at the earlier institution. Further,
though the students have passed some of the subjects at the earlier institutions, if the
same subjects are prescribed in different semesters of JNTUH, the students have to
study those subjects in JNTUH in spite of the fact that those subjects are repeated.
14.4 The transferred students from other Universities/institutions to Sri Indu college who
are on rolls are to be provided one chance to write the CBT (internal marks) in the
equivalent subject(s) as per the clearance letter issued by the University.
14.5 The Sri Indu College of Engineering & Technology (Autonomous) will provide one
chance to write the internal examinations in the equivalent subject(s) to the
students transferred from other universities/institutions who are on rolls, as per the
clearance (equivalence) letter issued by the University.
15.0 Scope
15.1 The academic regulations should be read as a whole, for the purpose of any
interpretation.
15.2 In case of any doubt or ambiguity in the interpretation of the above rules, the decision
of the College Academic Council is final.
15.3 The College may change or amend the academic regulations, course structure or
syllabi at any time, and the changes or amendments made shall be applicable to all
students with effect from the dates notified by the College authorities.
15.4 Where the words “he”, “him”, “his”, occur in the regulations, they include “she”, “her”,
“hers”.
*********
The LES students after securing admission shall pursue a course of study
for not less than three academic years and not more than six academic
years.
2. The student shall register for 123 credits and secure 123 credits with CGPA ≥
5 from II year to IV year B.Tech. programme (LES) for the award of B.Tech.
degree.
3. The students, who fail to fulfill the requirement for the award of the degree in
six academic years from the year of admission, shall forfeit their seat in
B.Tech.
4. The attendance requirements of B. Tech. (Regular) shall be applicable to
B.Tech. (LES).
5. Promotion rule
MALPRACTICES RULES
DISCIPLINARY ACTION FOR / IMPROPER CONDUCT IN EXAMINATIONS
Nature of Malpractices/Improper conduct Punishment
If the student:
Possesses or keeps accessible in
examination hall, any paper, note book,
programmable calculators, cell phones,
pager, palm computers or any other form of
material concerned with or related to the
subject of the examination (theory or Expulsion from the examination hall and
1. (a) practical) in which student is appearing but cancellation of the performance in that
has not made use of (material shall include subject only.
any marks on the body of the student which
can be used as an aid in the subject of the
examination)
Gives assistance or guidance or receives it
from any other student orally or by any other Expulsion from the examination hall and
body language methods or communicates cancellation of the performance in that
(b) through cell phones with any student or subject only of all the students involved. In
persons in or outside the exam hall in respect case of an outsider, he will be handed over
of any matter. to the police and a case is registered
against him.
Has copied in the examination hall from any Expulsion from the examination hall and
paper, book, programmable calculators, palm cancellation of the performance in that
2. computers or any other form of material subject and all other subjects the student
relevant to the subject of the examination has already appeared including practical
(theory or practical) in which the student is examinations and project work and shall
appearing. not be permitted to appear for the
remaining examinations of the subjects of
that semester/year.
The hall ticket of the student is to be
cancelled and sent to the College.
The student who has impersonated shall
be expelled from examination hall. The
student is also debarred and forfeits the
seat. The performance of the original
student who has been impersonated, shall
be cancelled in all the subjects of the
examination (including practicals and
project work) already appeared and shall
3. Impersonates any other student in not be allowed to appear for examinations
connection with the examination. of the remaining subjects of that
semester/year. The student is also
debarred for two consecutive semesters
from class work and all End Examinations.
The continuation of the course by the
student is subject to the academic
regulations in connection with forfeiture of
seat. If the imposter is an outsider, he will
be handed over to the police and a case is
registered against him.
4. Smuggles in the answer book or additional Expulsion from the examination hall and
sheet or takes out or arranges to send out thecancellation of performance in that subject
question paper during the examination or and all the other subjects the student has
answer book or additional sheet, during or already appeared including practical
after the examination. examinations and project work and shall
not be permitted for the remaining
examinations of the subjects of that
semester/year. The student is also
debarred for two consecutive semesters
from class work and all End Examinations.
The continuation of the course by the
student is subject to the academic
regulations in connection with forfeiture of
seat.
Uses objectionable, abusive or offensive Cancellation of the performance in that
language in the answer paper or in letters to subject.
5. the examiners or writes to the examiner
requesting him to award pass marks.
Refuses to obey the orders of the chief In case of students of the college, they
6. superintendent / assistant – superintendent / shall be expelled from examination halls and
any officer on duty or misbehaves or creates cancellation of their performance in
disturbance of any kind in and around the subject and all other subjects the student(s)
examination hall or organizes a walk out or has (have) already appeared and shall not
instigates others to walk out, or threatens the be permitted to appear for the remaining
officer-in charge or any person on duty in or examinations of the subjects of that
outside the examination hall of any injury to his semester/year. The students also are
person or to any of his relations whether by debarred and forfeit their seats. In case of
words, either spoken or written or by signs or outsiders, they will be handed over to the
by visible representation, assaults the officer- police and a police case is registered
in-charge, or any person on duty in or outside against them.
the examination hall or any of his relations, or
indulges in any other act of misconduct or
mischief which result in damage to or
destruction of property in the examination hall
or any part of the college campus or engages
in any other act which in the opinion of the
officer on duty amounts to use of unfair means
or misconduct or has the tendency to disrupt
the orderly conduct of the examination.
7. Leaves the exam hall taking away answer Expulsion from the examination hall and
script or intentionally tears off the script or cancellation of performance in that subject
any part thereof inside or outside the and all the other subjects the student has
examination hall. already appeared including practical
examinations and project work and shall not
be permitted for the remaining examinations
of the subjects of that semester/year. The
student is also debarred for two consecutive
semesters from class work and all End
Examinations. The continuation of the course
by the student is subject to the academic
regulations in connection with forfeiture of
seat.
8. Possesses any lethal weapon or firearm in Expulsion from the examination hall and
the examination hall. cancellation of the performance in that
subject and all other subjects the student
has already appeared including practical
examinations and project work and shall
not be permitted for the remaining
examinations of the subjects of that
semester/year. The student is also
debarred and forfeits the seat.
9. If student of the college, who is not a student Expulsion from the examination hall and
for the particular examination or any person cancellation of the performance in that
not connected with the college indulges in subject and all other subjects the student
any malpractice or improper conduct has already appeared including practical
mentioned in clause 6 to 8. examinations and project work and shall
not be permitted for the remaining
examinations of the subjects of that
semester/year. The student is also
debarred and forfeits the seat.
Person(s) who do not belong to the college
will be handed over to the police and, a
police case will be registered against them.
Expulsion from the examination hall and
cancellation of the performance in that
subject and all other subjects the student
10. Comes in a drunken condition to the
has already appeared for including
examination hall.
practical examinations and project work
and shall not be permitted for the
remaining examinations of the subjects of
that semester/year.
******
Mathematics – I
1 R18MTH1101 3 1 0 4
(Linear Algebra and Calculus)
2 R18ECH1101 Chemistry 3 1 0 4
3 R18EEE1130 Basic Electrical Engineering 3 0 0 3
4 R18MED1101 Engineering Workshop 1 0 3 2.5
5 R18HAS1101 English 2 0 0 2
6 R18ECH1201 Engineering Chemistry Lab 0 0 3 1.5
7 R18HAS1201 English Language and Communication Skills
lab 0 0 2 1
8 R18EEE1212 Basic Electrical Engineering Lab 0 0 2 1
9 R18HAS1102 Environmental Science 3 0 0 0
10 R18IPG1101 Induction Programme for Three Weeks 0 0 0 0
Total Credits 15 2 10 19
R18MTH1102 Mathematics – II
1
(Advanced Calculus) 3 1 0 4
2 R18EAP1101 Applied Physics
3 1 0 4
3 R18CSE1101 Programming for Problem Solving
3 1 0 4
4 R18MED1102 Engineering Graphics
1 0 4 3
5 R18EAP1201 Applied Physics Lab
0 0 3 1.5
6 R18CSE1201 Programming for Problem Solving Lab
0 0 3 1.5
7 R18COI1101 Constitution of India
3 0 0 0
8 R18ITK1101 Essence of Indian Traditional Knowledge
3 0 0 0
Total Credits 16 3 10 18
Open Elective – I
S. Credit
Course Code Course Title L T P
No. s
1 R18CIV3271 Disaster Management & Mitigation
2 R18CSE3272 Database Concepts
3 R18ECE3273 Consumer Electronics
4 R18EEE3274 Electrical Estimation & Costing
3 0 0 3
5 R18INF3275 Information Technology Essentials
6 R18MED3276 Introduction to Robotics
7 R18HMS3277 Fundamentals of Entrepreneurship
8 R18HMS3278 Day to Day Biology
UNIT -I:
P-N Junction Diode: Qualitative Theory of P-N Junction, P-N Junction as a Diode, Diode Equation,
Volt-Ampere Characteristics, Temperature dependence of VI characteristic, Ideal versus Practical –
Resistance levels (Static and Dynamic), Transition and Diffusion Capacitances, Diode Equivalent
Circuits, Load Line Analysis, Breakdown Mechanisms in Semiconductor Diodes, Zener Diode
Characteristics.
Special Purpose Electronic Devices: Principle of Operation and Characteristics of Tunnel Diode
(with the help of Energy Band Diagram), Varactor Diode, SCR and Semiconductor Photo Diode.
UNIT-II:
Rectifiers and Filters : The P-N junction as a Rectifier, Half wave Rectifier, Full wave Rectifier,
Bridge Rectifier, Harmonic components in a Rectifier Circuit, Inductor Filters, Capacitor Filters, L-
Section Filters, π- Section Filters, Comparision of Filters, Voltage Regulation using Zener Diode.
UNIT-III:
Bipolar Junction Transistor and UJT: The Junction Transistor, Transistor Current Components,
Transistor as an Amplifier, Transistor Construction, BJT Operation, BJT Symbol, Common Base,
Common Emitter and Common Collector Configurations, Limits of Operation , BJT Specifications,
BJT Hybrid Model, Determination of h-parameters from Transistor Characteristics, Comparison of CB,
CE, and CC Amplifier Configurations, UJT and Characteristics.
UNIT-IV:
Transistor Biasing and Stabilization: Operating Point, The DC and AC Load lines, Need for Biasing,
Fixed Bias, Collector Feedback Bias, Emitter Feedback Bias, Collector – Emitter Feedback Bias,
Voltage Divider Bias, Bias Stability, Stabilization Factors, Stabilization against variations in VBE and
β, Bias Compensation using Diodes and Transistors, Thermal Runaway, Thermal Stability, Analysis
Transistor Amplifier Circuit using h-parameters
UNIT-V:
Field Effect Transistor and FET Amplifiers
Field Effect Transistor: The Junction Field Effect Transistor (Construction, principle of operation,
symbol) – Pinch-off Voltage - Volt-Ampere characteristics, The JFET Small Signal Model, MOSFET
(Construction, principle of operation, symbol), MOSFET Characteristics in Enhancement and
Depletion modes.
FET Amplifiers: FET Common Source Amplifier, Common Drain Amplifier, Generalized FET
Amplifier, Biasing FET, FET as Voltage Variable Resistor, Comparison of BJT and FET.
TEXT BOOKS:
1. Millman’s Electronic Devices and Circuits – J. Millman, C.C.Halkias, and Satyabrata Jit, 2 Ed.,
1998, TMH.
2. Electronic Devices and Circuits – Mohammad Rashid, Cengage Learning, 2013
3. Electronic Devices and Circuits – David A. Bell, 5 Ed, Oxford
REFERENCE BOOKS:
1. Integrated Electronics – J. Millman and Christos C. Halkias, 1991 Ed., 2008, TMH.
2. Electronic Devices and Circuits – R.L. Boylestad and Louis Nashelsky, 9 Ed., 2006, PEI/PHI.
3. Electronic Devices and Circuits – B. P. Singh, Rekha Singh, Pearson, 2Ed, 2013.
4. Electronic Devices and Circuits - K. Lal Kishore, 2 Ed., 2005, BSP.
5. Electronic Devices and Circuits – Anil K. Maini, Varsha Agarwal, 1 Ed., 2009, Wiley India
Pvt. Ltd.
6. Electronic Devices and Circuits – S.Salivahanan, N.Suresh Kumar, A.Vallavaraj, 2 Ed., 2008,
TMH.
Course Outcomes:
At the end of the course the student will be able to:
Describe the construction, operation and characteristics of electronic devices
like P-N- Junction and special Purpose diodes (Understand).
Determine the application of diode as a rectifier (Apply)
Illustrate the application of transistors as amplifier employing BJT devices
(Apply)
Analyze the Biasing circuits using BJT Transistor Amplifier Circuit (Analyze)
Evaluate construction, operation and characteristics of FET (Evaluate)
Select Biasing circuits using FET Amplifiers (Analyze)
UNIT - I
Introduction to Data Structures, abstract data types, Linear list – singly linked list implementation,
insertion, deletion and searching operations on linear list, Stacks-Operations, array and linked
representations of stacks, stack applications, Queues-operations, array and linked representations.
UNIT - II
Dictionaries: linear list representation, skip list representation, operations - insertion, deletion and
searching. Hash Table Representation: hash functions, collision resolution-separate chaining, open
addressing-linear probing, quadratic probing, double hashing, rehashing, extendible hashing.
UNIT - III
Search Trees: Binary Search Trees, Definition, Implementation, Operations- Searching, Insertion and
Deletion, AVL Trees, Definition, Height of an AVL Tree, Operations – Insertion, Deletion and
Searching, Red –Black, Splay Trees.
UNIT - IV
Graphs: Graph Implementation Methods. Graph Traversal Methods. Sorting: Heap Sort, External
Sorting- Model for external sorting, Merge Sort.
UNIT - V
Pattern Matching and Tries: Pattern matching algorithms-Brute force, the Boyer –Moore algorithm,
the Knuth-Morris-Pratt algorithm, Standard Tries, Compressed Tries, Suffix tries.
TEXTBOOKS:
1. Fundamentals of Data Structures in C, 2nd Edition, E. Horowitz, S. Sahni and Susan Anderson
Freed, Universities Press.
2. Data Structures using C – A. S. Tanenbaum, Y. Langsam, and M.J. Augenstein, PHI/Pearson
Education.
REFERENCE BOOKS:
1. Data Structures: A Pseudocode Approach with C, 2nd Edition, R. F. Gilberg and B.A.
Forouzan, Cengage Learning. R18 B.TECH.
Course Outcomes:
Ability to select the data structures that efficiently model the information in a
problem. (Understand)
Ability to assess efficiency trade-offs among different data structure implementations
or combinations. (Create)
Implement and know the application of algorithms for sorting and searching. (Create)
Design programs using a variety of data structures, including hash tables, binary and
general tree structures, search trees, tries, heaps, graphs, and AVL-trees (Create)
Ability to select the data structures that efficiently model the information in a problem
(Analyze)
Illustrate the concept of Text pattern matching algorithm (Analyze)
Objectives: To learn
• The theory of Probability, and probability d istributions of single and multiple and random
variables
• The sampling theory and testing of hypothesis and making inferences
• Stochastic process and Markov chains.
UNIT-I: Probability
Sample Space, Events, Counting Sample Poi nts, Probability of an Event, Additive Rules, Conditional
Probability, Independence, and the Product Rule, Bayes' Rule,
Random Variables and Probability Distri butions: Concept of a. Random variable, Discrete
Probability Distributions, Continuous Probability Distributions, Statistical Independence.
UNIT-II: Mathematical Expectation
Mean of a Random Variable, Variance and Covariance of Random Variables, Means and Variances of
Linear Combinations of Random Variables, Chebyshev's Theorem.
Discrete Probability Distributions: Introduction and Motivation, Binomial, Distribution,
Geometric Distributions and Poisson distribution.
UNIT-III: Continuous Probability Distributions
Continuous Uniform Distribution, Normal Distribution, Areas under the Normal Curve, Applications
of the Normal Distribution, Normal Approximation to the Binomial, Gamma and Exponential
Distributions.
Fundamental Sampling Distributions: Random Sampling, Some Important Statistics, Sampling
Distributions, Sampling Distribution of Means and the Central Limit Theorem,
Sampling Distribution of S2, t-Distribution, F-Distribution.
UNIT-IV: Estimation & Tests of Hypotheses
Introduction, Statistical Inference, Classical Methods of Estimation.: Estimating the Mean,
Standard Error of a Point Estimate, Prediction Intervals, Tolerance Limits, Esti mating the
Variance, Estimating a Proportion for single mean, Difference between Two Means, between Two
Proportions for Two Samples and Maximum Likelihood Estimation.
Statistical Hypotheses: General Concepts, Testing a Statistical Hypothesis, Tests Concerning a Single
Mean, Tests on Two Means, Test on a Single Proportion, Two Samples: Tests on Two Proportions.
UNIT-V: Stochastic Processes and Markov Chains
Introduction to Stochastic processes-Markov process. Transition Probability, Transition Probability
Matrix, First order and Higher order Markov process, n-step transition probabilities, Markov chain,
Steady state condition, Markov analysis.
Course outcomes:
After learning the contents of this paper the student must be able to
Apply the concepts of probability and distributions to some case studies
Correlate the material of one unit to the material in other units
Resolve the potential misconceptions and hazards in each topic of study.
Text Books
1. Ronald E.Walpole, Raymond H. Myers, Sharon L. Myers, Keying Ye, Probability &
Statistics For Engineers & Scientists, 9thEd. Pearson Publishers.
2. S C Gupta and V K Kapoor, Fundamentals of Mathematical statistics, Khanna
publications.
3. S.D.Sharma, Operations Research, Kedarnath and Ramnath Publishers, Meerut, Delhi
References
1. T.T.Soong, Fundamentals of Probability And Statistics for Engineers, John Wiley &
Sons, Ltd, 2004.
2. Sheldon M Ross, Probability and statistics for Engineers and scientists, academic press.
Course Outcomes:
Describe the probability of an event, product rule, addition rule & boye’s rule(Understand)
Explain Random variables and chebyshev’s theorem , Discrete probability
distribution(Understand)
Calculate the areas under the normal curve & applications of the normal distribution(Apply)
Analyze the fundamental sampling distributions(Analyze)
Test the Hypothesis of single mean, double mean, single proportion, double
proportion(Evaluate)
Evaluate Transition Probabilty matrix(Evaluate)
Unit - IV:
8086 CPU Pin Diagram- Special functions of general purpose registers, Segment register, concept of
pipelining, 8086 Flag register, Addressing modes of 8086.
Unit - V:
8086-Instruction formats: Assembly Language Programs involving branch & Call instructions,
sorting, evaluation of arithmetic expressions.
Suggested books:
1. Computer system Architecture: Morris Mano (UNIT-1,2,3).
2. Advanced Micro Processor and Peripherals- Hall/ A K Ray(UNIT-4,5).
Suggested reference books:
1. Computer Organization and Architecture – William Stallings Sixth Edition, Pearson/PHI.
2. Structured Computer Organization – Andrew S. Tanenbaum, 4th Edition PHI/Pearson.
3. Fundamentals or Computer Organization and Design, - Sivaraama Dandamudi Springer Int.
Edition.
4. Computer Architecture a quantitative approach, John L. Hennessy and David A. Patterson,
Fourth Edition Elsevier.
5. Computer Architecture: Fundamentals and principles of Computer Design, Joseph D. Dumas II,
BS Publication.
Course outcomes
Compare the architectures of different computers.( Evaluate)
Identify different hardware components associated with the memory organization of a
computer(Remember)
Evaluation of address of an operand by using various addressing modes. (Understand)
Summarizes the memory organization(Understand)
Describe the architecture of 8086 microprocessor.(Understand)
Design and implement simple systems using 8086 processor with the knowledge of pin diagram,
registers and instruction formats of 8086 processor by writing assembly language programs. (create)
UNIT - I
Object-Oriented Thinking: Different paradigms for problem solving, need for OOP paradigm,
differences between OOP and Procedure oriented programming, Overview of OOP concepts-
Abstraction, Encapsulation, Inheritance and Polymorphism.
C++ Basics: Structure of a C++ program, Data types, Declaration of variables, Expressions, Operators,
Operator Precedence, Evaluation of expressions, Type conversions, Pointers, Arrays, Pointers and
Arrays, Strings, Structures, References. Flow control statement- if, switch, while, for, do, break,
continue, goto statements. Functions - Scope of variables, Parameter passing, Default arguments, inline
functions, Recursive functions, Pointers to functions. Dynamic memory allocation and de-allocation
operators-new and delete, Preprocessor directives.
UNIT - II
C++ Classes and Data Abstraction: Class definition, Class structure, Class objects, Class scope, this
pointer, Friends to a class, Static class members, Constant member functions, Constructors and
Destructors, Dynamic creation and destruction of objects, Data abstraction, ADT and information
hiding.
UNIT - III
Inheritance: Defining a class hierarchy, Different forms of inheritance, Defining the Base and Derived
classes, Access to the base class members, Base and Derived class construction, Destructors, Virtual
base class.
Virtual Functions and Polymorphism: Static and Dynamic binding, virtual functions, Dynamic
binding through virtual functions, Virtual function call mechanism, Pure virtual functions, Abstract
classes, Implications of polymorphic use of classes, Virtual destructors.
UNIT - IV
C++ I/O: I/O using C functions, Stream classes hierarchy, Stream I/O, File streams and String streams,
Overloading operators, Error handling during file operations, Formatted I/O.
UNIT - V
Exception Handling: Benefits of exception handling, Throwing an exception, The try block, Catching
an exception, Exception objects, Exception specifications, Stack unwinding, Rethrowing an exception,
Catching all exceptions.
TEXT BOOKS:
1. The Complete Reference C++, 4th Edition, Herbert Schildt, Tata McGraw Hill.
2. Problem solving with C++: The Object of Programming, 4th Edition, Walter Savitch, Pearson
Education.
REFERENCES:
1. The C++ Programming Language, 3rd Edition, B. Stroutstrup, Pearson Education.
2. OOP in C++, 3rd Edition, T. Gaddis, J. Walters and G. Muganda, Wiley Dream Tech Press.
3. Object Oriented Programming in C++, 3rd Edition, R. Lafore, Galigotia Publications Pvt Ltd.
Course outcomes
Distinguish the procedural and object oriented paradigm along with
principles(Analyze)
Understand dynamic memory management techniques using pointers, constructors,
destructors, etc (Understand)
Describe the concept of function overloading, operator overloading, virtual functions
and polymorphism.(Understanding)
Classify inheritance with the understanding of early and late binding (Understand)
Illustrate the process of data file manipulations using C++ (Apply)
An ability to incorporate Exception handling in Object Oriented programs(Analyze)
Course outcomes
Upon completion of the Course, students will be able to:
Course outcomes
Design a program to implement the linear data structures using static and dynamic
memory allocation. (Create))
Design a program to implement searching ,sorting techniques for the given
problem.(Create)
Demonstrate the fundamental algorithms of tree data structures by experimenting the
programs.(Apply)
Examine the traversing of a given graph by using the respect to graph traversal
techniques(Apply)
Design a program to implement the pattern matching algorithms for the given
problem.(Create)
PC Hardware
Task 1: Identify the peripherals of a computer, components in a CPU and its functions. Draw the block
diagram of the CPU along with the configuration of each peripheral and submit to your instructor.
Task 2: Every student should disassemble and assemble the PC back to working condition. Lab
instructors should verify the work and follow it up with a Viva. Also students need to go through the
video which shows the process of assembling a PC. A video would be given as part of the course
content.
Task 3: Every student should individually install MS windows on the personal computer. Lab
instructor should verify the installation and follow it up with a Viva.
Task 4: Every student should install Linux on the computer. This computer should have windows
installed. The system should be configured as dual boot with both windows and Linux. Lab instructors
should verify the installation and follow it up with a Viva
Task 5: Hardware Troubleshooting: Students have to be given a PC which does not boot due to
improper assembly or defective peripherals. They should identify the problem and fix it to get the
computer back to working condition. The work done should be verified by the instructor and followed
up with a Viva.
Task 6: Software Troubleshooting: Students have to be given a malfunctioning CPU due to system
software problems. They should identify the problem and fix it to get the computer back to working
condition. The work done should be verified by the instructor and followed up with a Viva.
Task 2: Web Browsers, Surfing the Web: Students customize their web browsers with the LAN proxy
settings, bookmarks, search toolbars and pop up blockers. Also, plug-ins like Macromedia Flash and
JRE for applets should be configured.
Task 3: Search Engines & Netiquette: Students should know what search engines are and how to use
the search engines. A few topics would be given to the students for which they need to search on
Google. This should be demonstrated to the instructors by the student.
Task 4: Cyber Hygiene: Students would be exposed to the various threats on the internet and would be
asked to configure their computer to be safe on the internet. They need to first install an antivirus
software, configure their personal firewall and windows update on their computer. Then they need to
customize their browsers to block pop ups, block active x downloads to avoid viruses and/or worms.
Task 2: Using LaTeX and Word to create project certificate. Features to be covered:- Formatting Fonts
in word, Drop Cap in word, Applying Text effects, Using Character Spacing, Borders and Colors,
Inserting Header and Footer, Using Date and Time option in both LaTeX and Word.
Task 3: Creating project abstract Features to be covered:-Formatting Styles, Inserting table, Bullets and
Numbering, Changing Text Direction, Cell alignment, Footnote, Hyperlink, Symbols, Spell Check,
Track Changes.
Excel
Excel Orientation: The mentor needs to tell the importance of MS office 2007/ equivalent (FOSS) tool
Excel as a Spreadsheet tool, give the details of the four tasks and features that would be covered in
each. Using Excel – Accessing, overview of toolbars, saving excel files, Using help and resources.
Task 1: Creating a Scheduler - Features to be covered: Gridlines, Format Cells, Summation, auto fill,
Formatting Text
Task 2 : Calculating GPA - .Features to be covered:- Cell Referencing, Formulae in excel – average,
std.deviation, Charts, Renaming and Inserting worksheets, Hyper linking, Count function, Task 3:
Performance Analysis - Features to be covered:- Split cells, freeze panes, group and outline, Sorting,
Task 2: Second week helps students in making their presentations interactive. Topic covered during
this week includes: Hyperlinks, Inserting –Images, Clip Art, Audio, Video, Objects, Tables and Charts.
Task 3: Concentrating on the in and out of Microsoft power point and presentations in LaTeX. Helps
them learn best practices in designing and preparing power point presentation. Topic covered during
this week includes: - Master Layouts (slide, template, and notes), Types of views (basic, presentation,
slide slotter, notes etc), and Inserting – Background, textures, Design Templates, Hidden slides.
REFERENCE BOOKS:
1. Comdex Information Technology course tool kit Vikas Gupta, WILEY Dreamtech
2. The Complete Computer upgrade and repair book, 3rd edition Cheryl A Schmidt, WILEY
Dreamtech
3. Introduction to Information Technology, ITL Education Solutions limited, Pearson Education.
4. PC Hardware - A Handbook – Kate J. Chase PHI (Microsoft)
5. LaTeX Companion – Leslie Lamport, PHI/Pearson.
6. IT Essentials PC Hardware and Software Companion Guide Third Edition by David Anfinson
and Ken Quamme. – CISCO Press, Pearson Education.
7. IT Essentials PC Hardware and Software Labs and Study Guide Third Edition by Patrick
Regan – CISCO Press, Pearson Education.
LIST OF EXPERIMENTS
1. Write a C++ Program to display Names, Roll No., and grades of 3 students who have appeared
in the examination. Declare the class of name, Roll No. and grade. Create an array of class
objects. Read and display the contents of the array.
2. Write a C++ program to declare Struct. Initialize and display contents of member variables.
3. Write a C++ program to declare a class. Declare pointer to class. Initialize and display the
contents of the class member.
4. Given that an EMPLOYEE class contains following members: data members: Employee
number, Employee name, Basic, DA, IT, Net Salary and print data members.
5. Write a C++ program to read the data of N employee and compute Net salary of each employee
(DA=52% of Basic and Income Tax (IT) =30% of the gross salary).
6. Write a C++ to illustrate the concepts of console I/O operations.
7. Write a C++ program to use scope resolution operator. Display the various values of the same
variables declared at different scope levels.
8. Write a C++ program to allocate memory using new operator.
9. Write a C++ program to create multilevel inheritance. (Hint: Classes A1, A2, A3)
10. Write a C++ program to create an array of pointers. Invoke functions using array objects.
11. Write a C++ program to use pointer for both base and derived classes and call the member
function. Use Virtual keyword.
Course Outcomes
Prescribed Textbook : All the five Units in the Textbook, “Towards a World of Equals: A Bilingual
Textbook on Gender” written by A.Suneetha, Uma Bhrugubanda, Duggirala Vasanta, Rama Melkote,
Vasudha Nagaraj, Asma Rasheed, Gogu Shyamala, Deepa Sreenivas and Susie Tharu and published by
Telugu Akademi, Hyderabad,Telangana State in the year 2015.
Note: Since it is an Interdisciplinary Course, Resource Persons can be drawn from the fields of English
Literature or Sociology or Political Science or any other qualified faculty who has expertise in this
REFERENCE BOOKS:
Menon, Nivedita. Seeing like a Feminist. New Delhi: Zubaan-Penguin Books, 2012
Abdulali Sohaila. “I Fought For My Life…and Won.”Available online at:
http://www.thealternative.in/lifestyle/i-fought-for-my-lifeand-won-sohaila-abdulal/
Course Outcomes:
Students will have developed a better understanding of important issues related to
gender in contemporary India.
Students will be sensitized to basic dimensions of the biological, sociological,
psychological and legal aspects of gender. This will be achieved through discussion of
materials derived from research, facts, everyday life, literature and film.
Students will attain a finer grasp of how gender discrimination works in our society
and how to counter it.
Students will acquire insight into the gendered division of labour and its relation to
politics and economics.
Men and women students and professionals will be better equipped to work and live
together as equals.
Students will develop a sense of appreciation of women in all walks of life.
Through providing accounts of studies and movements as well as the new laws that
provide protection and relief to women, the textbook will empower students to
understand and respond to gender violence.
Unit - I:
Sets, Relation and Function: Operations and Laws of Sets, Cartesian Products, Binary Relation,
Partial Ordering Relation, Equivalence Relation, Image of a Set, Sum and Product of Functions,
Bijective functions, Inverse and Composite Function, Size of a Set, Finite and infinite Sets, Countable
and uncountable Sets, Cantor's diagonal argument and The Power Set theorem, Schroeder-Bernstein
theorem.
Principles of Mathematical Induction: The Well-Ordering Principle, Recursive definition, The
Division algorithm: Prime Numbers, The Greatest Common Divisor: Euclidean Algorithm, The
Fundamental Theorem of Arithmetic.
Unit - II:
Basic counting techniques-inclusion and exclusion, pigeon-hole principle, permutation and
combination.
Unit - III:
Propositional Logic: Syntax, Semantics, Validity and Satisfiability, Basic Connectives and Truth
Tables, Logical Equivalence: The Laws of Logic, Logical Implication, Rules of Inference, The use of
Quantifiers. Proof Techniques: Some Terminology, Proof Methods and Strategies, Forward Proof,
Proof by Contradiction, Proof by Contraposition, Proof of Necessity and Sufficiency.
Unit - IV:
Algebraic Structures and Morphism: Algebraic Structures with one Binary Operation, Semi Groups,
Monoids, Groups, Congruence Relation and Quotient Structures, Free and Cyclic Monoids and
Groups, Permutation Groups, Substructures, Normal Subgroups, Algebraic Structures with two Binary
Operation, Rings, Integral Domain and Fields. Boolean Algebra and Boolean Ring, Identities of
Boolean Algebra, Duality, Representation of Boolean Function, Disjunctive and Conjunctive Normal
Form
Unit - V:
Graphs and Trees: Graphs and their properties, Degree, Connectivity, Path, Cycle, Sub Graph,
Isomorphism, Eulerian and Hamiltonian Walks, Graph Colouring, Colouring maps and Planar Graphs,
Colouring Vertices, Colouring Edges, List Colouring, Perfect Graph, definition properties and
Example, rooted trees, trees and sorting, weighted trees and prefix codes, Bi-connected component and
Articulation Points, Shortest distances.
Suggested books :
1. Kenneth H. Rosen, Discrete Mathematics and its Applications, Tata McGraw – Hill Susanna S.
Epp, Discrete Mathematics with Applications,4th edition, Wadsworth Publishing Co. Inc. C L
Liu and D P Mohapatra, Elements of Discrete Mathematics A Computer Oriented Approach,
3rd Edition by, Tata McGraw – Hill.
Course Outcomes
1. For a given logic sentence express it in terms of predicates, quantifiers, and logical connectives
2. For a given a problem, derive the solution using deductive logic and prove the solution based on
logical inference
3. For a given a mathematical problem, classify its algebraic structure
4. Evaluate Boolean functions and simplify expressions using the properties of Boolean algebra
5. Develop the given problem as graph networks and solve with techniques of graph theory.
TEXT BOOKS:
1. Switching and Finite Automata Theory- Zvi Kohavi & Niraj K. Jha, 3rd Edition, Cambridge.
2. Digital Design- Morris Mano, PHI, 3rd Edition.
3. Douglas Perry, “VHDL”, Tata McGraw Hill, 4th edition, 2002.
REFERENCE BOOKS:
1. Introduction to Switching Theory and Logic Design – Fredriac J. Hill, Gerald R. Peterson, 3rd
Ed,John Wiley & Sons Inc.
2. Digital Fundamentals – A Systems Approach – Thomas L. Floyd, Pearson, 2013.
3. Digital Logic Design - Ye Brian and HoldsWorth, Elsevier
4. Fundamentals of Logic Design- Charles H. Roth, Cengage Learning, 5th, Edition, 2004.
5. Digital Logic Applications and Design- John M. Yarbrough, Thomson Publications, 2006.
6. Digital Logic and State Machine Design – Comer, 3rd, Oxford, 2013.
Course Outcomes:
Upon completion of the course, students should possess the following skills:
Interpret the various number systems & code converters, error detecting and
correcting, BCD, Gray Code, EX-3.
Describe the operation of logic gates and Apply Boolean Algebra on K-map.
Design / Analysis of Combinational Circuits.
Diagram illustrates the operation &timing constrains for Latches &Flip-Flops and Registers and
Counters.
Design &analyze sequential circuits.
Use HDL &appropriate EDA tools for digital logic design &simulation.
UNIT - I:
Operating System Introduction: Operating Systems Objectives and functions, Computer System
Architecture, OS Structure, OS Operations, Evolution of Operating Systems - Simple Batch, Multi
programmed, time shared, Personal Computer, Parallel, Distributed Systems, Real-Time Systems,
Special - Purpose Systems, Operating System services, user OS Interface, System Calls, Types of
System Calls, System Programs, Opening System Design and Implementation, OS Structure, Virtual
machines.
UNIT - II:
Process and CPU Scheduling - Process concepts - The Process, Process State, Process Control Block,
Threads, Process Scheduling - Scheduling Queues, Schedulers, Context Switch, Preemptive
Scheduling, Dispatcher, Scheduling Criteria, Scheduling algorithms, Multiple-Processor Scheduling,
Real-Time Scheduling, Thread scheduling, Case studies: Linux, Windows.
Process Coordination - Process Synchronization, The Critical section Problem, Peterson's solution,
Synchronization Hardware, Semaphores, and Classic Problems of Synchronization, Monitors, Case
Studies: Linux, Windows.
UNIT - III:
Memory Management and Virtual Memory - Logical & physical Address Space, Swapping,
Contiguous Allocation, Paging, Structure of Page Table. Segmentation, Segmentation with Paging,
Virtual Memory, Demand Paging, Performance of Demanding Paging, Page Replacement, Page
Replacement Algorithms, Allocation of Frames, Thrashing.
UNIT - IV:
File System Interface - The Concept of a File, Access methods, Directory Structure, File System
Mounting, File Sharing, Protection, File System Implementation - File System Structure, File System
Implementation, Allocation methods, Free-space Management, Directory Implementation, Efficiency
and Performance.
Mass Storage Structure - Overview of Mass Storage Structure, Disk Structure, Disk Attachment,
Disk Scheduling, Disk Management, Swap space Management.
UNIT - V:
Deadlocks - System Model, Deadlock Characterization, Methods for Handling Deadlocks, Deadlock
Prevention, Deadlock Avoidance, Deadlock Detection and Recovery from Deadlock.
Protection - System Protection, Goals of Protection, Principles of Protection, Domain of Protection,
Access Matrix, Implementation of Access Matrix, Access Control, Revocation of Access Rights,
Capability-Based Systems, Language-Based Protection.
TEXT BOOKS:
1. Operating System Principles, Abraham Silberchatz, Peter B. Galvin, Greg Gagne 8th Edition,
Wiley Student Edition.
2. Operating systems - Internals and Design Principles, W. Stallings, 6th Edition, Pearson.
REFERENCES BOOKS:
1. Modern Operating Systems, Andrew S Tanenbaum 3rd Edition PHI.
2. Operating Systems A concept - based Approach, 2nd Edition, D. M. Dhamdhere, TMH.
3. Principles of Operating Systems, B. L. Stuart, Cengage learning, India Edition.
4. Operating Systems, A. S. Godbole, 2nd Edition, TMH
5. An Introduction to Operating Systems, P.C.P. Bhatt, PHI.
6. Operating Systems, S, Haldar and A. A. Arvind, Pearson Education.
7. Operating Systems, R. Elmasri, A. G. Carrick and D. Levine, Mc Graw Hill.
8. Operating Systems in depth, T. W. Doeppner, Wiley.
Outcome:
Apply optimization techniques for the improvement of system performance.
Ability to understand the synchronous and asynchronous communication mechanisms in their
respective OS.
Learn about minimization of turnaround time, waiting time and response time and also
maximization of throughput with keeping CPU as busy as possible.
Ability to compare the different OS
UNIT – IV
Transaction Management: Transaction Concept – Transaction State – Implementation of Atomicity
and Durability - Concurrent – Executions – Serializability – Recoverability – Implementation of
Isolation – Testing for serializability.
Concurrency Control: Lock – Based Protocols – Timestamp Based Protocols – Validation – Based
protocols – Multiple Granularity.
Recovery Syhstem – Failure Classification – Storage Structure – Recovery and atomicity – Log –
Based Recovery – Recovery with Concurrent Transactions – Buffer Management – Failure with loss of
nonvolatile storage – Advance Recovery systems – Remote Backup systems.
UNIT – V
Overview of Storage and Indexing : Data on External Storage, File Organization and Indexing –
Clustered Indexes, Primary and Secondary Indexes, Index data Structures – Hash Based indexing, Tree
based Indexing Comparison of File Organizations.
Tree Structured Indexing: Intuitions for tree indexes, Indexed Sequential Access Methods (ISAM)
B+ Trees: A Dynamic Index Structure, Search Insert, Delete.
Hash Based Indexing: Static Hashing, Extendable hashing, Liner Hashing, Extendable hashing vs
Liner Hashing.
TEXT BOOKS:
1. Data base Management systems, Raghu Ramakrishan, Johannes Gehrke, TMH, 3 rd Edition,
2003.
2. Data base System Concepts, A. Silberschatz, H.F. Korth, S.Sudharshan, McGraw hill, VI
edition, 2006.
REFERENCE BOOKS
1. Database Systems, 6th edition, Ramez Elmastri, Shamkant B. Navathe, Pearson Education,
2013.
2. Database Principles, Programming, and Performance, P.O. Neil, E.O’Neil, 2 nd ed., ELSEVIER.
3. Database Systems, A Practical approach to Design implementation and Management Fourth
edition, Thomas Connolly, Carolyn Begg, Pearson education.
4. Database System Concepts, Peter Rob & Carlos Coronel, Cengage learning, 2008
5. Fundamentals of Relational Database Management systems, S.Sumathi, S. Esakkirajan,
Springer.
6. Database Management System Oracle SQL and PL/SQL, P.K.Das Gupta, PHI.
7. Introduction to Database Management, M.L. Gillenson and others, Wiley Student Edition.
8. Database Development and Management, Lee Chao, Auerbach publications, Taylor & Francis
Group.
9. Introduction to Database Systems, C.J.Date, Pearson Education.
10. Database Management Systems, G.K.Gupta, TMH.
Outcomes:
Demonstrate the basic elements of a relational database management system.
Ability to identify the data models for relevant problems.
Ability to design entity relationship and convert entity relationship diagrams into RDBMS and
formulate SQL queries on the respect data.
Apply normalization for the development of application software’s
UNIT – I
OOP concepts – Data abstraction, encapsulation, inheritance, benefits of inheritance, polymorphism,
classes and objects, Procedural and object oriented programming paradigms.
Java programming – History of Java, comments, data types variables constants, scope and life time of
variables, operators, operator hierarchy, expressions, type conversion and casting, enumerated types, ,
simple java stand along programs, arrays, console input and output, formatting output, constructors,
methods, parameter passing, static fields and methods, access control, this reference, overloading
methods and constructors, recursion, garbage collection, building strings, exploring string class.
UNIT- II
Inheritance – inheritance hierarchies, super and sub classes, Member access rules, super keyword,
preventing inheritance: final classes and methods, the Object class and its methods.
Polymorphism – dynamic binding, method overriding, abstract classes and methods.
Interfaces – interfaces vs. Abstract classes, defining an interface implementing interfaces, accessing
implementations through interface references, extending interface.
Inner classes – Uses of inner classes, local inner classes, anonymous inner classes, static inner classes,
examples.
Packages – Defining, Creating and Accessing a Package, Understanding CLASSPATH, importing
packages.
UNIT – III
Exception handling - Dealing with errors, benefits of exception handling, the classification of
exceptions – exception hierarchy, checked exceptions and unchecked exceptions, usage of try, catch,
throw, throws and finally, re-throwing exceptions, exception specification, built in exceptions, creating
own exception sub classes.
Multithreading - Differences between multiple processes and multiple threads, thread states, creating
threads, interrupting threads, thread priorities, synchronizing threads, inter-thread communication,
producer consumer pattern.
UNIT – IV
Collection Framework in Java - Introduction to Java Collections, Overview of Java Collection
Frame work, Generics, Commonly used Collection classes – Array List, Vector, Hash table, Stack,
Enumeration, Iterator, String Tokenizer, Random, Scanner, calendar and Properties.
Files – Streams – byte streams, character streams, text input/output, binary input/output, random access
file operations, File management using File class.
Connecting to Database – JDBC Type 1 to 4 drivers, connecting to a database, querying a database
and processing the results, updating data with JDBC.
UNIT – V
GUI Programming with Java – The AWT class hierarchy, introduction to Swing, Swing vs AWT,
Hierarchy for Swing components, Containers – JFrame, JApplet, JDialog, JPanel, Overview of some
swing components – Jbutton, JLabel, JTextField, JTestArea, Simple swing applications, Layout
management – Layout manger types – border, grid and flow
Event handling – Events, Event Sources, Event classes, Event Listeners, Relationship between Event
sources and Listeners, Delegation event model, Examples: handling a button click, handling mouse
events, Adapter classes.
Applets – Inheritance hierarchy for applets, differences between applets and applications, life cycle of
an applet, passing parameters to applets, applet security issues,Introduction to Spring.
TEXT BOOK:
1. Java Fundamentals – A comprehensive introduction, Herbert Schildt and Dale Skrien, TMH
REFERENCE BOOKS :
1. Java for Programmers, P.J.Deitel and H.M.Deitel, Pearson education (OR) Java: How to
program P.J.Deitel and H.M.Deitel, PHI.
2. Object Oriented Programming through Java, P. Radha Krishna Universities Press.
3. Thinking in Java, Bruce Eckel, Pearson Education.
4. Programming in Java, S.Malhotra and S. Choudhary, Oxford Univ. Press.
5. Spring 3.0,Black book,Dreamtech,Prabhu Sunderraman.
Outcomes:
Understanding of OOP concepts and basics of java programming (Console and GUI based)
The skills to apply OOP and Java programming in problem solving.
Should have the ability to extend his/her knowledge of Java programming further on his/her
own.
To write the code to implemented modify various concepts in operating systems using Linux.
List of Programs:
Outcomes:
The course objectives ensure the development of students applied skills in operating systems
related areas.
Students Williams knowledge in writing Software routines Modules or implementing various
concepts of Operating systems
Apart from the above mentioned entities you can identify more. The above mentioned are few.
Note: The student is required to submit a document by writing the Entities and keys to the lab teacher.
Experiment 2: Concept design with E-R Model
Relate the entities appropriately. Apply cardnalities for each relationship. Identify strong entities and
weak entities (if any). Indicate the type of relationships (total / partial). Try to incorporate
generalization, aggregation, specialization etc wherever required.
Example: E-R diagram for bus
Note: The student is required to submit a document by drawing the E-R Diagram to the lab teacher.
Experiment 3: Relational Model
Represent all the entities (Strong, Weak) in tabular fashion. Represent realtionships in a tabular
fashion. There are different ways of representing relationships as tables based on the requirement.
Different types of attributes (Composite, Multi-valued, and Derived) have different way of
representation.
Example: The passenger tables look as below. This is an example. You can add more attributes based
on E-R model. This is not a normalized table.
Passenger
Name Age Sex Address Ticket_id Passport ID
Note: The student is required to submit a document by Represent relationships in a tabular fashion to
SRI INDU COLLEGE OF ENGINEERING & TECHNOLOGY (AUTONOMOUS) Page 66
COMPUTER SCIENCE & ENGINEERING
Passport ID Ticket_id
You can do the second and third normal forms if required. Any how Normalized tables are given at the
end.
Experiment 5: Installation of MySQL and practice DDL commands
Installation of MySQL. In this week you will learn Creating databases, How to create tables, altering
the database, droping tables and databases if not required. You will also try truncate, rename
commands etc.
Example for creation of a normalized "Passenger" table.
1. Write a Query to display the information present in the Passenger and cancellation tables. Hint:
Use UNION Operator.
2. Display the number of days in a week on which the 9W01 bus is available.
3. Find number of tickets booked for each PNR_No using GROUP BY CLAUSE. Hint: Use
GROUP BY on PNR_No.
4. Find the distinct PNR numbers that are present.
5. Find the number of tickets booked by a passenger where the number of seats is greater than 1.
Hint: Use GROUP BY, WHERE and HAVING CLAUSES.
6. Find the total number of cancelled setas.
RFERENCE BOOKS:
Outcomes:
Note:
i. Use Linux and MySQL for the Lab Experiments. Though not mandatory, encourage the use of
Eclipse platform.
ii. The list suggests the minimum program set. Hence, the concerned staff is requested to add more
problems to the list as needed.
1. Use Eclipse or Netbean platform and acquaint with the various menus. Create a test project, add
a test class and run it. See how you can use auto suggestions, auto fill. Try code formatter and
code refactoring like renaming variables, methods and classes. Try debug step by step with a
small program of about 10 to 15 lines which contains at least one if else condition and a for
loop.
2. Write a Java program that works as a simple calculator. Use a grid layout to arrange buttons for
the digits and for the +, -, *, % operations. Add a text field to display the result. Handle any
possible exceptions like divided by zero.
3.
a. Develop an applet in Java that displays a simple message.
b. Develop an applet in Java that receives an integer in one text field, and computes its
factorial Value and returns it in another text field, when the button named "Compute" is
clicked.
4. Write a Java program that creates a user interface to perform integer divisions. The user enters
two numbers in the text fields, Num1 andNum2. The division of Num1 and Num2 is displayed
in the Result field when the Divide button is clicked. If Num1 or Num2 were not an integer, the
program would throw a Number Format Exception. If Num2 were Zero, the program would
throw an Arithmetic Exception. Display the exception in a message dialog box.
5. Write a Java program that implements a multi-thread application that has three threads. First
thread generates random integer every 1 second and if the value is even, second thread
computes the square of the number and prints. If the value is odd, the third thread will print the
value of cube of the number.
6. Write a Java program that connects to a database using JDBC and does add, delete, modify and
retrieve operations.
7. Write a Java program that simulates a traffic light. The program lets the user select one of three
lights: red, yellow, or green with radio buttons. On selecting a button, an appropriate message
with "Stop" or "Ready" or "Go" should appear above the buttons in selected colr. Initially there
is no message shown.
8. Write a Java program to create an abstract class named Shape that contains two integers and an
empty method named printArea(). Provide three classes named Rectangle, Triangle and Circle
such that each one of the classes extends the class Shape. Each one of the classes contains only
the method printArea() that prints the area of the given shape.
9. Suppose that a table named Table.txt is stored in a text file. The first line in the file is the
header, and the remaining lines correspond to rows in the table. The elements are seperated by
commas. Write a java program to display the table using Labels in Grid Layout.
10. Write a Java program that handles all mouse events and shows the event name at the center of
the window when a mouse event is fired (Use Adapter classes).
11. Write a Java program that loads names and phone numbers from a text file where the data is
organized as one line per record and each field in a record are seperated by a tab ( ). It takes a
name or phone number as input and prints the corresponding other value from the hash table
(hint: use hash tables).
12. Implement the above program with database instead of a text file.
13. Write a Java program that takes tab seperated data (one record per line) from a text file and
inserts them into a database.
14. Write a java program that prints the meta-data of a given table.
TEXT BOOK:
1. Java Fundamentals - A comprehensive Introduction, Herbert Schildt and dale skrien, TMH.
REFERENCE BOOKS:
1. Java for Programmers, P.J. Deitel and H.M. Deitel, Pearson education (OR) Java: How to
Program P.J. Deitel and H.M. Deitel, PHI.
2. Object Orients Programming through Java, P. Radha Krishna, Universities Press.
3. Thinking in Java, Bruce Eckel, Pearson Education.
4. Programming in Java, S. Malhotra and S. Choudhary, Oxford Univ. Press.
Outcomes:
REFERENCES:
1. Ambrish Gupta, Financial Accounting for Management, Pearson Education, New
Delhi, 2012.
2. H. Craig Peterson & W. Cris Lewis, Managerial Economics, Pearson, 2012.
3. Lipsey & Chrystel, Economics, Oxford University Press, 2012.
4. Domnick Salvatore: Managerial Economics In a Global Economy, Thomson, 2012.
5. Narayanaswamy: Financial Accounting - A Managerial Perspective, Pearson, 2012.
6. S.N. Maheswari & S.K. Maheswari, Financial Accounting, Vikas, 2012.
7. Truet and Truet: Managerial Economics: Analysis, Problems and Cases, Wiley, 2012.
8. Dwivedi: Managerial Economics, Vikas, 2012.
9. Shailaja & Usha: MEFA, University Press, 2012.
10. Aryasri: Managerial Economics and Financial Analysis, TMH, 2012.
11. Vijay Kumar & Appa Rao, Managerial Economics & Financial Analysis, Cengage
2011.
12. J.V. Prabhakar Rao & P.V. Rao, Managerial Economics & Financial Analysis,
Maruthi Publishers, 2011.
Outcomes:
At the end of the course, the student will
Understand the market dynamics namely, demand and supply, demand forecasting,
elasticity of demand and supply, pricing methods and pricing in different market
structures.
Gain an insight into how production function is carried out to achieve least cost
combination of inputs and cost analysis.
Develop an understanding of
Analyse how capital budgeting decisions are carried out.
Understanding the framework for both manual and computerised accounting process
Know how to analyse and interpret the financial statements through ratio analysis.
UNIT - I:
Introduction to Software Engineering: The evolving role of software, Changing Nature of
Software, Legacy Software, Software myths.
A Generic view of process: Software engineering- A layered technology, a process framework,
The Capability Maturity Model Integration (CMMI), Process patterns, process assessment, personal
and team process models.
Process models: The waterfall model, Incremental process models, Evolutionary process models, The
Unified process.
UNIT - II:
Software Requirements: Functional and non-functional requirements, User requirements,
System requirements, Interface specification, the software requirements document.
Requirements engineering process: Feasibility studies, Requirements elicitation and
analysis, Requirements validation, Requirements management.
System models : Context Models, Behavioral models, Data models, Object models,
structured methods.
UNIT - III:
Design Engineering: Design process and Design quality, Design concepts, the design model, pattern
based software design.
Creating an architectural design: software architecture, Data design, Architectural styles and
patterns, Architectural Design, assessing alternative architectural designs, mapping data flow into a
software architecture.
Modeling component-level design : Designing class-based components, conducting component-level
design, Object constraint language, designing conventional components.
Performing User interface design: Golden rules, User interface analysis and design, interface
analysis, interface design steps, Design evaluation.
UNIT - IV:
Testing Strategies: A strategic approach to software testing, test strategies for conventional software,
Black-Box and White-Box testing, Validation testing, System testing, the art of Debugging.
Product metrics: Software Quality, Frame work for Product metrics, Metrics for Analysis Model,
Metrics for Design Model, Metrics for source code, Metrics for testing, Metrics for maintenance.
Metrics for Process and Products: Software Measurement, Metrics for software quality.
UNIT - V:
Risk Management: Reactive vs Proactive Risk strategies, software risks, Risk identification, Risk
projection, Risk refinement, RMMM, RMMM Plan.
Quality Management: Quality concepts, Software quality assurance, Software Reviews, Formal
technical reviews, Statistical Software quality Assurance, Software reliability, The ISO 9000 quality
standards.
TEXT BOOKS :
REFERENCE BOOKS :
Outcomes:
UNIT - I:
Overview of the Internet: Protocol, Layering Scenario, TCP/IP Protocol Suite: The OSI Model,
Internet history standards and administration; Comparison of the OSI and TCP/IP reference model.
Physical Layer: Guided transmission media, wireless transmission media.
Data Link Layer - design issues, CRC codes, Elementary Data Link Layer Protocols, sliding window
protocol
UNIT - II:
Multi Access Protocols - ALOHA, CSMA, Collision free protocols, Ethernet- Physical Layer,
Ethernet Mac Sub layer, data link layer switching & use of bridges, learning bridges, spanning tree
bridges, repeaters, hubs, bridges, switches, routers and gateways.
UNIT - III:
Network Layer: Network Layer Design issues, store and forward packet switching connection less
and connection oriented networks-routing algorithms-optimality principle, shortest path, flooding,
Distance Vector Routing, Control to Infinity Problem, Hierarchical Routing, Congestion control
algorithms, admission control.
UNIT - IV:
Internetworking: Tunneling, Internetwork Routing, Packet fragmentation, IPv4, IPv6 Protocol, IP
addresses, CIDR, IMCP, ARP, RARP, DHCP.
Transport Layer: Services provided to the upper layers elements of transport protocol-addressing
connection establishment, Connection Release, Crash Recovery.
UNIT - V:
The Internet Transport Protocols: UDP-RPC, Real Time Transport Protocols, The Internet Transport
Protocols- Introduction to TCP, The TCP Service Model, The TCP Segment Header, The Connection
Establishment, The TCP Connection Release, The TCP Connection Management Modeling, The TCP
Sliding Window, The TCP Congestion Control, The future of TCP.
Application Layer- Introduction, providing services, Applications layer paradigms, Client server
model, Standard client-server application-HTTP, FTP, electronic mail, TELNET, DNS, SSH
TEXT BOOKS:
1. Data Communications and Networking - Behrouz A. Forouzan, Fifth Edition TMH, 2013.
2. Computer Networks - Andrew S Tanenbaum, 4th Edition, Pearson Education.
REFERENCES BOOKS:
1. An Engineering Approach to Computer Networks - S. Keshav, 2nd Edition, Pearson Edication.
2. Understanding communications and Networks, 3rd Edition, W. A. Shay, Cengage Learning.
3. Introduction to Computer Networks and Cyber Security, Chwan-Hwa (John) Wu, J. David
Irwin, CRC Press.
4. Computer Networks, L. L. Peterson and B. S. Davie, 4th edition, ELSEVIER.
5. Computer Networking: A Top-Down Approach Featuring the Internet, James F. Kurose, K. W.
Ross, 3rd Edition, Pearson Eduction.
Outcomes:
Students should be understand and explore the basics of Computer Networks and Various
Protocols. He/She will be in a position to understand the World Wide Web concepts.
Students will be in a position to administrate a network and flow of information further he/she
can understand easily the concepts of network security, Mobile, and ad hoc networks.
UNIT – V
Client side Scripting : Introduction to Javascript: Javascript Language – declaring variables, scope of
variables, functions, evnt handlers (onclick, onsubmit etc.), Document Object Model, Form Validation.
Simple AJAX application.
TEXT BOOKS:
1. Web Technologies, Uttam K Roy, Oxford University Press
2. The Complete Reference PHP – Steven Holzner, Tata McGraw-Hill
REFERENCE BOOKS:
1. Web Programming, building internet applications, Chris Bates 2 nd Edition, Wiley Dreamtech.
2. Java Server Pages – Hans Bergsten, SPD O’Reilly
3. Java Script, D. Flanagan, O’Reilly, SPD
4. Beginning Web Programming- Jon Duckett WROX.
5. Programming world wide web, R.W. Sebesta, Fourth Edition, Pearson
6. Internet and World Wide Web – How to program, Dietel and Nieto, Pearson
Outcomes:
Gain knowledge of client side scripting, validation of forms and AJAX programming.
Have understanding of server side scripting with PHP language.
Have understanding of what is XML and how to parse and use XML Data with Java
To introduce Server side programming with Java Servlets and JSP.
Professional Elective-I
(R18CSE3111) Advanced Computer Architecture
Objectives:
Understand The Micro-Architectural Design Of Processors
Learn About The Various Techniques Used To Obtain Performance Improvement And Power
Savings In Current Processors
UNIT – I
Fundamental of computer design-technology trends –cost-measuring and reporting performance
quantitative principle of computer design.
UNIT – II
Instruction set principles and examples-classifying instruction set memory addressing –type and size of
operands –addressing modes for signal processing –instruction level parallelism(ILP)-over coming data
hazards –high performance instruction delivery-limitation of ILP
UNIT – III
ILP software approach-compiler techniques-static branch protection –VLIW approach –HW support
for more ILP at compile time-H W verses S.W solutions
UNIT – IV
Memory hierarchy design-cache performance –reducing cache misses penalty and miss rate-virtual
memory-protection and example of VM. multiprocessors and thread level parallelism
UNIT – V
Storage Systems –Types-Buses –Raid-Errors And Failures.
Inter connection networks and clusters-interconnection network media-practical issues in
interconnecting network
TEXT BOOKS:
1.Computer Architecture A Quantitative Approach 3rd Edition John L.Hennessy &David A.
Patterson Morgon Kufmann(An Imprint Of Elsevier )
REFERENCE BOOK:
1. “Computer Architecture and Parallel Processing”Kai Hwang and A. Briggs international Edition
McGraw-Hill.
2. Advanced computer Architecture, dezso sima,Terence fountiain,peter kacsuk,person.
3. Parallel computer Architecture,a hardware /software approach ,david e.culler,jaswinder pal singh
with anoop gupta,Elsevier
Outcomes:
At the end of the course, the student should be able to:
Evaluate Performance Of Different Architectures With Respect To Various Parameters
Analyze Performance Of Different ILP Techniques
Identify Cache and Memory Related Issues in Multi-Processors Possess the skill for
representing knowledge using the appropriate technique.
UNIT I :
Fundamentals : Strings, Alphabet, Language, Operations, Finite state machine, definitions,
finite automaton model, acceptance of strings, and languages, deterministic finite automaton and
non deterministic finite automaton, transition diagrams and Language recognizers.
Finite Automata : NFA with Î transitions - Significance, acceptance of languages. Conversions
and Equivalence : Equivalence between NFA with and without Î transitions, NFA to DFA
conversion, minimisation of FSM, equivalence between two FSM’s, Finite Automata with output-
Moore and Melay machines.
UNIT II :
Regular Languages : Regular sets, regular expressions, identity rules, Constructing finite Automata
for a given regular expressions, Conversion of Finite Automata to Regular expressions. Pumping
lemma of regular sets, closure properties of regular sets (proofs not required).
Grammar Formalism : Regular grammars-right linear and left linear grammars, equivalence
between regular linear grammar and FA, inter conversion, Context free grammar, derivation trees,
sentential forms. Right most and leftmost derivation of strings.
UNIT III :
Context Free Grammars : Ambiguity in context free grammars. Minimisation of Context
Free Grammars. Chomsky normal form, Greiback normal form, Pumping Lemma for Context
Free Languages. Enumeration of properties of CFL (proofs omitted).
Push Down Automata : Push down automata, definition, model, acceptance of CFL, Acceptance
by final state and acceptance by empty state and its equivalence. Equivalence of CFL and
PDA, interconversion. (Proofs not required). Introduction to DCFL and DPDA.
UNIT IV :
Turing Machine : Turing Machine, definition, model, design of TM, Computable functions,
recursively enumerable languages. Church’s hypothesis, counter machine, types of Turing machines
(proofs not required). linear bounded automata and context sensitive language.
UNIT V :
Computability Theory : Chomsky hierarchy of languages, linear bounded automata and
context sensitive language, LR(0) grammar, decidability of problems, Universal Turing Machine,
undecidability of posts. Correspondence problem, Turing reducibility, Definition of P and NP
problems, NP complete and NP hard problems.
TEXT BOOKS :
1. “Introduction to Automata Theory Languages and Computation”. Hopcroft H.E. and Ullman J.
D. Pearson Education
2. Introduction to Theory of Computation – Sipser 2nd edition Thomson
REFERENCES BOOKS:
1. Introduction to Forml languages Automata Theory and Computation Kamala Krithivasan Rama R.
2. Introduction to Computer Theory, Daniel I.A. Cohen, John Wiley.
3. Theory Of Computation: A Problem - Solving Approach, Kavi Mahesh, Wiley India Pvt. Ltd.
4. “Elements of Theory of Computation”, Lewis H.P. & Papadimition C.H. Pearson /PHI.
5. Theory of Computer Science – Automata languages and computation -Mishra and
Chandrashekaran, 2nd edition, PHI.
Outcomes:
Graduate should be able to understand the concept of abstract machines and their power to
recognize the languages.
Attains the knowledge of language classes & grammars relationship among them with the help
of Chomsky hierarchy.
Graduate will be able to understanding the pre-requisites to the course compiler or advanced
compiler design.
Professional Elective-I
(R18CSE3113) Principles of Programming Languages
Objectives:
To briefly describe various programming paradigms.
To provide conceptual understanding of High level language design and implementation.
To introduce the power of scripting languages.
UNIT I :
Preliminary Concepts: Reasons for studying, concepts of programming languages,
Programming domains, Language Evaluation Criteria, influences on Language design, Language
categories, Programming Paradigms – Imperative, Object Oriented, functional Programming , Logic
Programming. Programming Language Implementation – Compilation and Virtual Machines,
programming environments. Syntax and Semantics: general Problem of describing Syntax and
Semantics, formal methods of describing syntax - BNF, EBNF for common programming languages
features, parse trees, ambiguous grammars, attribute grammars, denotational semantics and axiomatic
semantics for common programming language features.
UNIT II :
Data types: Introduction, primitive, character, user defined, array, associative, record, union,
pointer and reference types, design and implementation uses related to these types. Names, Variable,
concept of binding, type checking, strong typing, type compatibility, named constants, variable
initialization. Expressions and Statements: Arithmetic relational and Boolean expressions, Short
circuit evaluation mixed mode assignment, Assignment Statements, Control Structures – Statement
Level, Compound Statements, Selection, Iteration, Unconditional Statements, guarded commands.
UNIT III :
Subprograms and Blocks: Fundamentals of sub-programs, Scope of life time of variables, static and
dynamic scope, design issues of subprograms and operations, local referencing environments,
parameter passing methods, overloaded sub-programs, generic sub-programs, parameters that are sub-
program names, design issues for functions user defined overloaded operators, co routines.
UNIT IV :
Abstract Data types: Abstractions and encapsulation, introductions to data abstraction, design
issues, language examples, C++ parameterized ADT, object oriented programming in small talk, C++,
Java, C#, Ada 95
Concurrency: Subprogram level concurrency, semaphores, monitors, massage passing, Java
threads, C# threads.
Exception handling: Exceptions, exception Propagation, Exception handler in Ada, C++ and Java.
Logic Programming Language: Introduction and overview of logic programming, basic elements
of prolog, application of logic programming.
UNIT V:
Functional Programming Languages: Introduction, fundamentals of FPL, LISP, ML,
Haskell, application of Functional Programming Languages and comparison of functional and
imperative Languages.
Scripting Language: Pragmatics, Key Concepts, Case Study: Python- Values and Types, Variables,
Storage and Control, Bindings and Scope, Procedural Abstraction, Separate Compilation, Module
Library.
TEXT BOOKS:
1. Concepts of Programming Languages Robert .W. Sebesta 8/e, Pearson Education, 2008.
2. Programming Language Design Concepts, D. A. Watt, Wiley dreamtech, rp-2007.
REFERENCE BOOKS:
1. Programming Languages, 2nd Edition, A. B. Tucker, R. E. Noonan, TMH.
2. Programming Languages, K. C. Louden, 2nd Edition, Thomson, 2003.
3. LISP Patric Henry Winston and Paul Horn Pearson Education.
4. Programming in Prolog, W. F. Clocksin & C. S. Mellish, 5th Edition, Springer.
5. Programming Python, M. Lutz, 3rd Edition, O'reilly, SPD, rp-2007.
6. Core Python Programming, Chun, II Edition, Pearson Education, 2007.
7. Guide to Programming with Python, Michel Dawson, Thomson, 2008
Outcomes:
Ability to express syntax and semantics in formal notation.
Ability to apply suitable programming paradigm for the application.
Gain knowledge and comparison of the features programming languages.
UNIT I
Real-time operating systems: Design issues, principles and case study.
UNIT II
Distributed operating system: Design issues, features and principles of working, case study.
UNIT III
Network operating system: Design issues, working principles and characteristic features,
case study.
UNIT IV
Kernel development: Issues and development principles, case study.
UNIT V
Protection, privacy, access control and security issues, solutions.
TEXT BOOKS:
1. A. Silberschatz - Applied Operating System Concepts, Wiley, 2000.
2. Lubemir F Bic and Alan C. Shaw - Operating System Principles, Pearson Education, 2003.
REFERENCE BOOKS:
1. Operating Systems : Internal and Design Principles - Stallings, 6th ed., PE.
2. Modern Operating Systems, Andrew S Tanenbaum 3rd ed., PE.
3. Operating System Principles- Abraham Silberchatz, Peter B. Galvin, Greg Gagne, 7th ed.,, John
Wiley
4. UNIX User Guide – Ritchie & Yates.
5. UNIX Network Programming - W.Richard Stevens ,1998, PHI.
6. The UNIX Programming Environment – Kernighan & Pike, PE.
UNIT – I
Introduction: History, Intelligent Systems, Foundations of AI, Sub areas of AI, Applications
Problem Solving – State – Space Search and Control Strategies: Introduction General Problem Solving,
Characteristics of Problem, Exhaustive Searches, Heuristic Search Techniques, Iterative-Deepening A*,
Constraint Satisfaction.
Game Playing, Bounded Look-ahead Strategy and use of Evaluation Functions, Alpha-Beta Pruning.
UNIT – II
Login Concepts and Logic Programming: Introduction, Propositional Calculus Propositional Logic,
Natural Deduction System, Axiomatic System, Semantic Tableau System in Propositional Logic,
Resolution Refutation in Propositions Logic, Predicate Logic, Login Programming.
Knowledge Representation: Introduction, Approaches to Knowledge Representation, Knowledge
Representation using Semantic Network Extended Semantic Networks for KR, Knowledge
Representation using frames.
UNIT – III
Expert System and Applications: Introduction, Phases in Building Expert Systems, Expert, Application
of Expert Systems, List of Sheets and Tools.
Uncertainty Measure – Probability Theory: Introduction, Probability Theory Bayesian Belief Networks,
Certainty Factor Theory, Dempster-Shafer Theory
UNIT – IV
Machine-Learning Paradigms: Introduction, Machine Learning Systems, Supervised and Unsupervised
Learning Inductive Learning, Learning Decision Trees (Text Book 2) Deductive Learning Clustering,
Support Vector Machines.
Artificial Neural Networks: Introduction, Artificial Neural Networks, Single-Layer Feed – Forward
Networks, Multi-Layer Feed – Forward Networks Radial-Basis Function Networks, Design Issues of
Artificial Neural Networks, Recurrent Networks.
UNIT – V
Advanced knowledge Representation Techniques: Case Grammars Semantic Web.
Natural Language Processing: Introduction, Sentence Analysis Phases, Grammars and Parsers, Types
of Parsers, Semantic Analysis, Universal Networking knowledge.
TEXT BOOKS:
1. Saroj Koushik, Artificial Intelligence, Cengage Learning, 2011.
2. Russell, Novig, Artificial Intelligence, A Modern Approach, Pearson Education, Second
Edition, 2004.
REFERENCE BOOK:
1) Rich Knight, Nair, Artificial Intelligence, Tata McGraw Hill, Third Edition, 2009
Outcomes:
Possess the ability to formulate an efficient problem space for a problem expressed in English.
Possess the ability to select a search algorithm for a problem and characterize its time and space
complexities.
Possess the skill for representing knowledge using the appropriate technique.
Possess the ability to apply A1 techniques to solve problems of Game Paying, Expert Systems,
Machine Learning and Natural Language Processing.
UNIT - II
Translation of Global Queries to Fragment Queries, Equivalence transformations for Queries,
Transforming Global Queries into Fragment Queries, Distributed Grouping and Aggregate Function
Evaluation, Parametric Queries. Optimization of Access Strategies, A Framework for Query
Optimization, Join Queries, General Queries
UNIT - III
The Management of Distributed Transactions, A Framework for Transaction Management, Supporting
Atomicity of Distributed Transactions, Concurrency Control for Distributed Transactions,
Architectural Aspects of Distributed Transactions Concurrency Control, Foundation of Distributed
Concurrency Control, Distributed Deadlocks, Concurrency Control based on Timestamps, Optimistic
Methods for Distributed Concurrency Control.
UNIT - IV
Reliability, Basic Concepts, Nonblocking Commitment Protocols, Reliability and concurrency Control,
Determining a Consistent View of the Network, Detection and Resolution of Inconsistency,
Checkpoints and Cold Restart, Distributed Database Administration, Catalog Management in
UNIT - V
Architectural Issues, Alternative Client/Server Architectures, Cache Consistency, Object Management,
Object Identifier Management, Pointer Swizzling, Object Migration, Distributed Object Storage,
Object Query Processing, Object Query Processor Architectures, Query Processing Issues, Query
Execution, Transaction Management, Transaction Management in Object DBMSs, Transactions as
Objects Database Integration, Scheme Translation, Scheme Integration, Query Processing Query
Processing Layers in Distributed Multi-DBMSs, Query Optimization Issues Transaction Management
Transaction and Computation Model, Multidatabase Concurrency Control, Multidatabase Recovery,
Object Orientation and Interoperability, Object Management Architecture CORBA and Database
interoperability, Distributed Component Object Model, COM/OLE and Database Interoperability,
PUSH-Based Technologies
TEXT BOOKS:
1. Distributed Databases Principles & Systems, Stefano Ceri, Giuseppe Pelagatti, TMH.
2. Principles of Distributed Database Systems, M. Tamer Ozsu, Patrick Valduriez , Pearson
Education, 2nd Edition.
REFERENCE BOOKS:
1. Distributed Database Systems, Chanda Ray, Pearson.
2. Distributed Database Management Systems, S. K. Rahimi and Frank. S. Haug, Wiley.
The Course Management System (CMS) is a web application for department personnel, Academic
Senate, and Registrar staff to view, enter, and manage course information formerly submitted via
paper. Departments can use CMS to create new course proposals, submit changes for existing courses,
and track the progress of proposals as they move through the stages of online approval.
Easy Leave
This project is aimed at developing a web based Leave Management Tool, which is of importance to
either an organization or a college.
The Easy Leave is an Intranet based application that can be accessed throughout the organization or a
specified group/Dept. This system can be used to automate the workflow of leave applications and
their approvals. The periodic crediting of leave is also automated. There are features like notifications,
cancellation of leave, automatic approval of leave, report generators etc in this Tool.
a country, its capital should be printed next to the list. Add CSS to customize the properties of the
font of the capital (color, bold and font size).
5.Create an XML document that contains 10 users information. Write a Java program, which takes
User Id as input and returns the user details by taking the user information from the XML document
using
(a) DOM Parser and
(b) SAX parser
6.Implement the following web applications using
(a) PHP,
(b) Servlets and
(c) JSP:
i. A user validation web application, where the user submits the login name and password to the
server. The name and password are checked against the data already available in Database and if
the data matches, a successful login page is returned. Otherwise a failure message is shown to the
user.
ii. Modify the above program to use an xml file instead of database.
iii. Modify the above program to use AJAX to show the result on the same page below the submit
button.
iv. A simple calculator web application that takes two numbers and an operator (+, -, /, * and %)
from an HTML page and returns the result page with the operation performed on the operands.
v. Modify the above program such that it stores each query in a database and checks the database
first for the result. If the query is already available in the DB, it returns the value that was
previously computed (from DB) or it computes the result and returns it after storing the new
query and result in DB.
vi. A web application takes a name as input and on submit it shows a hello page where is taken from
the request. It shows the start time at the right top corner of the page and provides a logout button.
On clicking this button, it should show a logout page with Thank You message with the duration
of usage (hint: Use session to store name and time).
vii. A web application that takes name and age from an HTML page. If the age is less than 18, it
should send a page with “Hello , you are not authorized to visit this site” message, where should
be replaced with the entered name. Otherwise it should send “Welcome to this site” message.
viii. A web application for implementation:
The user is first served a login page which takes user’s name and password. After submitting the
details the server checks these values against the data from a database and takes the following
decisions.
If name and password matches, serves a welcome page with user’s full name. If name matches
and password doesn’t match, then serves “password mismatch” page If name is not found in the
database, serves a registration page, where user’s full name is asked and on submitting the full
name, it stores, the login name, password and full name in the database (hint: use session for
storing the submitted login name and password)
ix. A web application that lists all cookies stored in the browser on clicking “List Cookies” button.
Add cookies if necessary
Outcomes:
xUse LAMP Stack for web applications
Use Tomcat Server for Servlets and JSPs
Write simple applications with Technologies like HTML, Javascript,
AJAX, PHP, Servlets and JSPs Connect to Database and get results
Parse XML files using Java (DOM and SAX parsers)
Minimum Requirement:
The Advanced Communication Skills (ACS) Laboratory shall have the following infra-structural
facilities to accommodate at least 35 students in the lab:
Spacious room with appropriate acoustics.
Round Tables with movable chairs
Audio-visual aids
LCD Projector
Public Address system
P – IV Processor, Hard Disk – 80 GB, RAM–512 MB Minimum, Speed – 2.8 GHZ
T. V, a digital stereo & Camcorder
Headphones of High quality
Prescribed Lab Manual: A book titled A Course Book of Advanced Communication Skills (ACS)
Lab published by Universities Press, Hyderabad.
Suggested Software:
The software consisting of the prescribed topics elaborated above should be procured and used.
Oxford Advanced Learner’s Compass, 7th Edition
DELTA’s key to the Next Generation TOEFL Test: Advanced Skill Practice.
Lingua TOEFL CBT Insider, by Dreamtech
TOEFL & GRE( KAPLAN, AARCO & BARRONS, USA, Cracking GRE by CLIFFS)
The following software from ‘train2success.com’
Preparing for being Interviewed
Positive Thinking
Interviewing Skills
Telephone Skills
Time Management
Books Recommended:
1. Technical Communication by Meenakshi Raman & Sangeeta Sharma, Oxford University
Press 2009.
2. Advanced Communication Skills Laboratory Manual by Sudha Rani, D, Pearson Education
2011.
3. Technical Communication by Paul V. Anderson. 2007. Cengage Learning pvt. Ltd. New
Delhi.
4. Business and Professional Communication: Keys for Workplace Excellence. Kelly M.
Quintanilla & Shawn T. Wahl. Sage South Asia Edition. Sage Publications. 2011.
5. The Basics of Communication: A Relational Perspective. Steve Duck & David T.
McMahan. Sage South Asia Edition. Sage Publications. 2012.
6. English Vocabulary in Use series, Cambridge University Press 2008.
Outcomes
Accomplishment of sound vocabulary and its proper use contextually.
Flair in Writing and felicity in written expression.
Enhanced job prospects.
Effective Speaking Abilities
(R18MAC3100) MOOCs-I
UNIT - V
Combining Inductive and Analytical Learning – Motivation, Inductive-Analytical Approaches to
Learning, Using Prior Knowledge to Initialize the Hypothesis, Using Prior Knowledge to Alter the
Search Objective, Using Prior Knowledge to Augment Search Operators, Reinforcement Learning –
Introduction, The Learning Task, Q Learning, Non-Deterministic, Rewards and Actions, Temporal
Difference Learning, Generalizing from Examples, Relationship to Dynamic Programming
TEXT BOOKS:
1. Machine Learning – Tom M. Mitchell, - MGH
2. Machine Learning: An Algorithmic Perspective, Stephen Marsland, Taylor & Francis (CRC)
REFERENCE BOOKS:
1. Machine Learning Methods in the Environmental Sciences, Neural Networks, William W Hsieh,
Cambridge Univ Press.
2. Richard o. Duda, Peter E. Hart and David G. Stork, pattern classification, John Wiley & Sons
Inc., 2001
3. Chris Bishop, Neural Networks for Pattern Recognition, Oxford University Press, 1995.
Outcomes:
Ability to apply the process of testing and various methodologies in testing for developed
software.
Ability to write test cases for given softw3are to test it before delivery to the customer.
UNIT - I
Introduction to PERL and Scripting: Scripts and Programs, Origin of Scripting , Scripting Today,
Characteristics of Scripting Languages, Uses for Scripting Languages, Web Scripting, and the universe
of Scripting Languages. PERL- Names and Values, Variables, Scalar Expressions, Control Structures,
arrays, list, hashes, strings, pattern and regular expressions, subroutines.
UNIT - II
Advanced perl: Finer points of looping, pack and unpack, file system, eval, data structures, packages,
modules, objects, interfacing to the operating system, Creating Internet ware applications, Dirty Hands
Internet Programming, security Issues.
PHP Basics : PHP Basics- Features, Embedding PHP Code in your Web pages, Outputting the data to
the browser, Data types, Variables, Constants, expressions, string interpolation, control structures,
Function, Creating a Function, Function Libraries, Arrays, strings and Regular Expressions.
UNIT - III
Advanced PHP Programming: PHP and Web Forms, Files, PHP Authentication and Methodologies
-Hard Coded, File Based, Database Based, IP Based, Login Administration, Uploading Files with PHP,
Sending Email using PHP, PHP Encryption Functions, the Mcrypt package, Building Web sites for the
World.
UNIT - IV
TCL : TCL Structure, syntax, Variables and Data in TCL, Control Flow, Data Structures, input/output,
procedures, strings, patterns, files, Advance TCL-eval, source, exec and uplevel commands, Name
spaces, trapping errors, event driven programs, making applications internet aware, Nuts and Bolts
Internet Programming, Security Issues, C Interface.
Tk-Visual Tool Kits, Fundamental Concepts of Tk, Tk by example, Events and Binding , Perl-Tk.
UNIT - V
Python: Introduction to Python language, python-syntax, statements functions, Built-in-functions
and Methods, Modules in python, Exception Handling.
Integrated Web Applications in Python — Building Small, Efficient Python Web Systems,
Web Application Framework.
TEXT BOOKS:
1. The World of Scripting Languages , David Barron, Wiley Publication
2. Python Web Programming, Steve Holden and David Beazley, New Riders Publications.
3. Beginning PHP and MySQL, 3rd Edition, Jason Gilmore, Apress Publications (Dream tech.).
REFERENCE BOOKS:
1. Open Source Web Development with LAMP using Linux, Apache, MySQL, Perl and PHP,
J.Lee and B.Ware (Addison Wesley) Pearson Education.
2. Programming Python, M.Lutz, SPD.
3. PHP 6 Fast and Easy Web Development, Julie Meloni and Matt Telles, Cengage
Learning Publications.
4. PHP 5.1, I.Bayross and S.Shah, The X Team, SPD.
5. Core Python Programming, Chun, Pearson Education.
6. Guide to Programming with Python, M.Dawson, Cengage Learning
7. Perl by Example, E. Quigley, Pearson Education.
8. Programming Perl, Larry Wall, T. Christiansen and J. Orwant, O'Reilly, SPD.
9. Tcl and the Tk Tool kit, Ousterhout, Pearson Education.
10. PHP and MySQL by Example, E. Quigley, Prentice Hall(Pearson).
11. Perl Power, J.P.Flynt, Cengage Learning.
12. PHP Programming solutions, V.Vaswani, TMH.
Outcomes:
Ability to understand the differences between scripting languages,
Ability to apply your knowledge of the weaknesses of scripting languages to
select implementation.
Master an understanding of python especially the object oriented concepts.
Mobile application development is the process by which application software is developed for low-
power handheld devices, such as personal digital assistants, enterprise digital assistants or mobile
phones. These applications can be pre-installed on phones during manufacture, downloaded by
customers from various mobile software distribution platforms, or delivered as web applications using
server-side or client-side processing (e.g. JavaScript) to provide an “application-like” experience
within a Web browser. Application software developers also have to consider a lengthy array of screen
sizes, hardware specifications and configurations because of intense competition in mobile software
and changes within each of the platforms.
Objectives:
On completion of this course the students should be able to:
1. Design, implement and evaluate a User Interface for a mobile application using J2ME.
2. Create a small but realistic working mobile application for small computing devices.
3. Categorise the challenges posed by developing mobile applications
and be able to propose and evaluate and select appropriate
solutions.
UNIT- I
J2ME Overview : Java 2 Micro Edition and the World of Java, Inside J2ME, J2ME and Wireless
Devices
Small Computing Technology: Wireless Technology, Radio Data Networks, Microwave Technology,
Mobile Radio Networks, Messaging, Personal Digital Assistants
UNIT- II
J2ME Architecture and Development Environment: J2ME Architecture, Small Computing Device
Requirements, Run-Time Environment, MIDlet Programming, Java Language for J2ME, J2ME
Software Development Kits, Hello World J2ME Style, Multiple MIDlets in a MIDlet Suite, J2ME
Wireless Toolkit
J2ME Best Practices and Patterns: The Reality of Working in a J2ME World, Best Practices
UNIT- III
Commands, Items, and Event Processing: J2ME User Interfaces, Display
Class, The Palm OS Emulator, Command Class, Item Class, Exception Handling
High-Level Display: Screens: Screen Class, Alert Class, Form Class, Item Class, List Class, Text Box
Class, Ticker Class
Low-Level Display: Canvas: The Canvas, User Interactions, Graphics, Clipping Regions, Animation
UNIT- IV
Record Management System: Record Storage, Writing and Reading Records, Record Enumeration,
Sorting Records, Searching Records, Record Listener
JDBC Objects: The Concept of JDBC, JDBC Driver Types, JDBC Packages, Overview of the JDBC
Process, Database Connection, statement Objects, Result set, Transaction Processing, Metadata, Data
Types, Exceptions.
JDBC and Embedded SQL: Model Programs, Tables, Indexing, Inserting Data into Tables, Selecting
Data from a Table, Metadata, Updating Tables, Deleting Data form a Table, Joining Tables,
Calculating Data, Grouping and Ordering Data, Subqueries, VIEWs
UNIT- V
Generic Connection Framework: The Connection, Hypertext Transfer Protocol, Communication
Management Using HTTP Commands, Session Management, Transmit as a Background Process
TEXT BOOKS:
1. J2ME: The Complete Reference, James Keogh, Tata McGrawHill.
2. Programming for Mobile and Remote Computers, G.T.Thampi, dreamtech press.
REFERENCE BOOKS:
1. Enterprise J2ME: Developing Mobile Java Applications – Michael Juntao Yuan, Pearson
Education, 2004
2. Beginning Java ME Platform, Ray Rischpater, Apress, 2009
3. Beginning J2ME: From Novice to Professional, Third Edition, Sing Li, Jonathan B. Knudsen,
Apress, 2005
4. Kicking Butt with MIDP and MSA:Creating Great Mobile Applications,1 st edition, J.Knudsen,
Pearson.
Outcomes:
Ability to evaluate and select appropriate solutions to the mobile computing platform.
Ability to develop the user interface.
Ability design a simple mobile phone game.
Consider the following mini Language, a simple procedural high-level language, only operating on
integer data, with a syntax looking vaguely like a simple C crossed with Pascal. The syntax of the
language is defined by the following BNF grammar:
<program> ::= <block>
<block> ::= { <variabledefinition> <slist> } | { <slist> }
<variabledefinition> ::= int<vardeflist>;
<vardeflist> ::= <vardec> | <vardec>, <vardeflist>
<vardec> ::= <identifier> | <identifier> [ <constant> ]
<slist> ::= <statement> | <statement>; <slist>
<statement> ::= <assignment> | <ifstatement> | <whilestatement> | <block> | <printstatement> |
<empty>
<assignment> ::= <identifier> = <expression> | <identifier> [ <expression> ] = <expression>
<ifstatement> ::= <bexpression> then <slist> else <slist> endif | if <bexpression> then <slist> endif
<whilestatement> ::= while <bexpression> do <slist> enddo
<printstatement> ::= print ( <expression> )
<expression> ::= <expression> <additionop> <term> | <term> | addingop> <term>
<bexpression> ::= <expression> <relop> <expression>
<relop> ::= < | <= | == | >= | > | !=
<addingop> ::= + | -
<term> ::= <term> <mulitop> <factor> | <factor>
<multop> ::= * | /
<factor> ::= <constant> | <identifier> | <identifier> [ <expression> ] | ( <expression> )
<constant> ::= <digit> | <digit> <constant>
<identifier> ::= <identifier> <letterordigit> | <letter>
<letterordigit> ::= <letter> | <digit>
<letter> ::= a|b|c|d|e|f|g|h|i|j|k|l|m|n|o|p|q|r|s|t|u|v|w|x|y|z
<digit> ::= 0|1|2|3|4|5|6|7|8|9
<empty> has the obvious meaning
Comments (zero or more characters enclosed between the standard C / Java style comment brackets
/*...*/) can be inserted. The language has rudimentary support for 1-dimensional arrays. The
declaration
int a[3] declares an array of three elements, referenced as a[0], a[1] and a[2] Note also that you should
worry about the scoping of names.
The following is a simple register-based machine, supporting a total of 17 instructions. It has three
distinct internal storage areas. The first is the set of 8 registers, used by the individual instructions as
detailed below, the second is an area used for the storage of variables and the third is an area used for
the storage of program. The instructions can be precede by a label. This consists of an integer in the
range 1 to 9999 and the label is followed by a colon to separate it from the rest of the instruction. The
numerical label can be used as the argument to a jump instruction, as detailed below.
In the description of the individual instructions below, instruction argument types are specified as
follows:
R specifies a register in the form R0, R1, R2, R3, R4, R5, R6 or R7 (or r0, r1, etc).
L specifies a numerical label (in the rabge 1 tp 9999).
V specifies a "variable location" ( a variable number, or a variable location pointed to by a register -
see below).
A specifies a constant value, a variable location, a register or a variable location pointed to by a register
(an indirect address). Constant values are specified as an integer value, optionally preceded by a minus
sign, preceded by a # symbol. An indirect address is specified by an @ followed by a register.
So, for example an A-type argument could have the form 4 (variable number 4), #4 (the constant value
4), r4 (register 4) or @r4 (the contents of register 4 identifies the variable location to be accessed).
The instruction set is defined as follows:
LOAD A, R
loads the integer value specified by A into register R.
STORE R, V
stores the value in register R to variable V.
OUT R
outputs the value in register R.
NEG R
negates the value in register R.
ADD A, R
adds the value specified by A to register R, leaving the result in register R.
SUB A, R
subtracts the value specified by A from register R, leaving the result in register R.
MUL A, R
multiplies the value specified by A by register R, leaving the result in register R.
DIV A, R
divides register R by the value specified by A, leaving the result in register R.
JMP L
causes an unconditional jump to the instruction with the label L.
JEQ R, L
jumps to the instruction with the label L if the value in register R is zero.
JNE R, L
jumps to the instruction with the label L if the value in register R is not zero.
JGE R, L
jumps to the instruction with the label L if the value in register R is greater than or equal to zero.
JGT R, L
jumps to the instruction with the label L if the value in register R is greater than zero.
JLE R, L
jumps to the instruction with the label L if the value in register R is less than or equal to zero.
JLT R, L
jumos to the instruction with the label L if the value in register R is less than zero.
NOP
is an instruction with no effect. It can be tagged by a label.
STOP
stops execution of the machine. All programs should terminate by executing a STOP instruction.
Outcomes:
By this laboratory, students will understand the practical approach of now a compiler works.
This will enable him to work in the development phase of new computer languages in industry.
Write programs in ‘C’ Language to demonstrate the working of the following constructs:
i) do…while ii) while….do iii) if…else iv) switch v) for
“A program written in ‘C’ language for Matrix Multiplication fails” Introspect the causes for its
failure and write down the possible reasons for its failure.
Take any system (e.g. ATM system) and study its system specifications and report the various
bugs.
Write the test cases for any known application (e.g. Banking application)
Create a test plan document for any application (e.g. Library Management System)
Study of any testing tool (e.g. Win runner)
Study of any web testing tool (e.g. Selenium)
Study of any bug tracking tool (e.g. Bugzilla, bugbit)
Study of any test management tool (e.g. Test Director)
Study of any open source-testing tool (e.g. Test Link)
Take a mini project (e.g. University admission, Placement Portal) and execute it. During the
Life cycle of the mini project create the various testing documents* and final test report
document.
Week-5
1. Create a user login system upon login, a simple shopping cart for online storeapplication is displayed
where there are three products to choose from, and usercan add any or all of the products to his cart,
remove products from the cart, andview the contents of the cart.
2. Write a script that uses cookies to remember how long ago a visitor first visited thepage. Display this
value in the page, in minutes and seconds.
Week-6
1. Print every number from 9 through 19 in base 16.11. Create a Python dictionary with [key, value] as
[person, phone_number] and workwith various dictionary functions.
Week -7
1. Write a Python script to create a dictionary with [word, count] where count is thenumber of
occurrences of the word in a given list of string.
2.Write a Python script using a function which returns a list containing Fibonacciseries of n terms.
Week-8
1. Implement Queue data structure in Python by defining a class Queue.
2. Write a program that reads a file and writes out a new file with the lines in reversedorder (i.e. the
first line in the old file becomes the last one in the new file.)
3. Write a program to perform matrix multiplication by reading the matrices from thefile and write the
resultant matrix to the file.
Week-9
1. Write a program to experiment with different layouts using different pack orders.
Week-10
1. Write a GUI to enter the employee details into the database and allows us toperform update and
remove employee information.
Week-11
1. Create a template that shows a menu from a restaurant and have Django createthe database.
Week-12
1. Create a single page application using AngularJS and NodeJS.
Objectives:
Week - 1: Installation of Java Wireless Toolkit (J2ME) Week - 2 Working with J2ME Features
Week - 3 Threads & High Level UI
Week - 4 Working on Drawing and Images
Week - 5 Developing Networked Applications using the Wireless Toolkit Week - 6 Authentication
with a Web Server
Week - 7 & 8 Web Application using J2ME
Outcomes:
1. Ability to install J2ME toolkit.
2. Ability to develop the user interface and authenticate with a Web Server..
3. Ability to design Web application using J2ME.
Once after successful installation of Java and the tool kit compile this program and run the following
program in the toolkit.
Steps to run this program in toolkit:
1. Start -> All Programs -> Sun Java Tool Kit -> Wireless Tool Kit
2. Click New Project – Enter Project Name -> Enter Class Name -> Click on Create Project.
3. Choose appropriate API Selection and Configurations.
4. Place Java Source file in WTK2.1 / WTK2.2\ apps\ projectname\ src
5. Build the Project.
6. Run the Project.
import javax.microedition.lcdui.*;
import javax.microedition.midlet.*;
public class HelloWorld extends MIDlet{
private Form form;
private Display display;
public HelloWorld(){
super();
}
public void startApp(){
form = new Form(“Hello World”);
String msg = ”Hello World!!!!!!!”;
form.append(msg);
display = Display.getDisplay(this);
display.setCurrent(form);
}
public void pauseApp(){}
public void destroyApp(boolean unconditional){
notifyDestroyed();
}
}
Week - 2 Working with J2ME Features:
Working with J2ME Features: Say, creating a Hello World program Experiment with the most basic
features and mobile application interaction concepts (lists, text boxes, buttons, radio boxes, soft
buttons, graphics, etc)
2.1 Create a program which creates to following kind of menu.
* cut
* copy
* past
* delete
* select all
* unselect all
3.2 High-level UI
Create a MIDP application, which show to the user 5-10 quiz questions. All questions have 4 possible
options and one right option exactly. Application counts and shows to the user how many right answers
were right and shows them to user.
3.3 Create a MIDP application, where the user can enter player name and points. The program saves
the information to the record using RMS at MIDP device. Program should also print out the top 10
player list to the end user. You can use this class in your game if you made own class for saving and
reading record sets.
4.2 Create a MIDP application, which draws a bar graph to the display. Data values can be given at
int[] array.
4.3 Create a MIDP application, which draws a bar graph to the display. Data values can be given at
int[] array. You can enter four data (integer) values to the input text field.
sent by the client and the client screen will now display a message sent by the server in response.
The response message from the server is the original client message in reverse.
6) Try various features of the phone simulator including the different look-and feel options.
Week - 6 Authentication with a Web Server
6.1 Write a sample program to show how to make a SOCKET Connection from j2me phone.
This J2ME sample program shows how to how to make a SOCKET
Connection from a J2ME Phone. Many a times there is a need to connect backend HTTP server from
the J2ME application. shows how to make a SOCKET connection from the phone to port 80.
6.2 Login to HTTP Server from a J2ME Program
This J2ME sample program shows how to display a simple LOGIN SCREEN on the J2ME phone and
how to authenticate to a HTTP server.
Many J2ME applications for security reasons require the authentication of the user. This free J2ME
sample program, shows how a J2ME application can do authentication to the backend server.
Note: Use Apache Tomcat Server as Web Server and Mysql as Database Server.
Week - 7 & 8 Web Application using J2ME
The following should be carried out with respect to the given set of application domains: (Assume that
the Server is connected to the well-maintained database of the given domain. Mobile Client is to be
connected to the Server and fetch the required data value/information)
Students Marks Enquiry
Town/City Movie Enquiry
Railway/Road/Air (For example PNR) Enquiry/Status
Sports (say, Cricket) Update
Town/City Weather Update
Public Exams (say Intermediate or SSC)/ Entrance (Say EAMCET) Results Enquiry
Divide Students into Batches and suggest them to design database according to their domains
and render information according to their requests.
(R18MAC3200) MOOCs-II
Course Outcomes:
Student will be able to understand basic cryptographic algorithms, message and
web authentication and security issues.
Ability to identify information system requirements for both of them such as client and server.
Ability to understand the current legal issues towards information security.
UNIT – I: Security Concepts: Introduction, The need for security, Security approaches, Principles
of security, Types of Security attacks, Security services, Security Mechanisms, A model for Network
Security Cryptography Concepts and Techniques: Introduction, plain text and cipher text, substitution
techniques, transposition techniques, encryption and decryption, symmetric and asymmetric key
cryptography, steganography, key range and key size, possible types of attacks.
UNIT – II: Symmetric key Ciphers: Block Cipher principles, DES, AES, Blowfish, RC5, IDEA,
Block cipher operation, Stream ciphers, RC4. Asymmetric key Ciphers: Principles of public key
cryptosystems, RSA algorithm, Elgamal Cryptography, Diffie-Hellman Key Exchange, Knapsack
Algorithm.
UNIT – III: Cryptographic Hash Functions: Message Authentication, Secure Hash Algorithm
(SHA-512), Message authentication codes: Authentication requirements, HMAC, CMAC,
Digital signatures, Elgamal Digital Signature Scheme. Key Management and Distribution: Symmetric
Key Distribution Using Symmetric & Asymmetric Encryption, Distribution of Public Keys, Kerberos,
X.509 Authentication Service, Public – Key Infrastructure
UNIT – IV: Transport-level Security: Web security considerations, Secure Socket Layer and
Transport Layer Security, HTTPS, Secure Shell (SSH) Wireless Network Security: Wireless Security,
Mobile Device Security, IEEE 802.11 Wireless LAN, IEEE 802.11i Wireless LAN Security
UNIT – V: E-Mail Security: Pretty Good Privacy, S/MIME IP Security: IP Security overview,
IP Security architecture, Authentication Header, Encapsulating security payload, Combining security
associations, Internet Key Exchange Case Studies on Cryptography and security: Secure Multiparty
Calculation, Virtual Elections, Single sign On, Secure Inter-branch Payment Transactions, Cross site
Scripting Vulnerability.
TEXT BOOKS:
Cryptography and Network Security – Principles and Practice: William Stallings, Pearson
Education, 6th Edition
Cryptography and Network Security: Atul Kahate, Mc Graw Hill, 3rd Edition
REFERENCE BOOKS:
Cryptography and Network Security: C K Shyamala, N Harini, Dr T R Padmanabhan, Wiley
India, 1st Edition.
Cryptography and Network Security : Forouzan Mukhopadhyay, Mc Graw Hill, 3rd Edition
Information Security, Principles, and Practice: Mark Stamp, Wiley India.
Principles of Computer Security: WM. Arthur Conklin, Greg White, TMH
Introduction to Network Security: Neal Krawetz, CENGAGE Learning
Network Security and Cryptography: Bernard Menezes, CENGAGE Learning
UNIT III
Data Mining – Frequent Pattern Analysis : Mining Frequent Patterns, Associations and Correlations –
Mining Methods- Pattern Evaluation Method – Pattern Mining in Multilevel, Multi Dimensional Space –
Constraint Based Frequent Pattern Mining, Classification using Frequent Patterns
UNIT IV
Classification and Clustering : Decision Tree Induction – Bayesian Classification – Rule Based
Classification – Classification by Back Propagation – Support Vector Machines –– Lazy Learners –
Model Evaluation and Selection-Techniques to improve Classification Accuracy. Clustering Techniques
– Cluster analysis-Partitioning Methods – Hierarchical Methods – Density Based Methods – Grid Based
Methods – Evaluation of clustering – Clustering high dimensional data- Clustering with constraints,
Outlier analysis-outlier detection methods.
UNITV:
Applications and Trends In Data Mining : Data mining applications, Data Mining Products and
Research Prototypes, Additional Themes on Data Mining and Social Impacts Of Data Mining.
TEXT BOOK:
1. Jiawei Han and Micheline Kamber, ―Data Mining Concepts and Techniques, Third Edition,
Elsevier, 2012.
2. Alex Berson and Stephen J.Smith, ―Data Warehousing, Data Mining & OLAP‖, Tata McGraw –
Hill Edition, 35th Reprint 2016.
REFERENCES:
1. K.P. Soman, Shyam Diwakar and V. Ajay, ―Insight into Data Mining Theory and Practice,
Eastern Economy Edition, Prentice Hall of India, 2006.
2. Ian H.Witten and Eibe Frank, ―Data Mining: Practical Machine Learning Tools and
Techniques, Elsevier, Second Edition.
UNIT II
TREES, CONNECTIVITY & PLANARITY : Spanning trees – Fundamental circuits – Spanning
trees in a weighted graph – cut sets – Properties of cut set – All cut sets – Fundamental circuits and cut
sets – Connectivity and separability – Network flows – 1-Isomorphism – 2-Isomorphism –
Combinational and geometric graphs – Planer graphs – Different representation of a planer graph.
UNIT III
MATRICES, COLOURING AND DIRECTED GRAPH : Chromatic number – Chromatic
partitioning – Chromatic polynomial – Matching – Covering – Four color problem – Directed graphs –
Types of directed graphs – Digraphs and binary relations – Directed paths and connectedness – Euler
graphs.
UNIT IV
PERMUTATIONS & COMBINATIONS: Fundamental principles of counting – Permutations and
combinations – Binomial theorem – combinations with repetition – Combinatorial numbers – Principle
of inclusion and exclusion – Derangement – Arrangements with forbidden positions.
UNIT V
GENERATING FUNCTIONS : Generating functions – Partitions of integers – Exponential
generating function – Summation operator – Recurrence relations – First order and second order –
Non-homogeneous recurrence relations – Method of generating functions.
TEXT BOOKS:
3. NarsinghDeo, “Graph Theory: With Application to Engineering and Computer Science”, Prentice
Hall of India, 2003.
4. Grimaldi R.P. “Discrete and Combinatorial Mathematics: An Applied Introduction”, Addison
Wesley, 1994.
REFERENCES:
1. Clark J. and Holton D.A, “A First Look at Graph Theory”, Allied Publishers, 1995.
2. Mott J.L., Kandel A. and Baker T.P. “Discrete Mathematics for Computer Scientists and
Mathematicians” , Prentice Hall of India, 1996.
3. Liu C.L., “Elements of Discrete Mathematics”, McGraw Hill, 1985.
4. Rosen K.H., “Discrete Mathematics and Its Applications”, McGraw Hill, 2007
5) Cloud Security and Privacy: An Enterprise Perspective on Risks and Compliance, Tim Mather,
Subra Kumaraswamy, Shahed Latif, O’Reilly, SPD, rp2011.
Outcomes
Ability to understand the virtualization and cloud computing concepts.
UNIT I: INTRODUCTION
Artificial Neural Network: Introduction, Characteristics- Learning Methods – Taxonomy– Evolution of
Neural Networks- Basic Models –Applications. Fuzzy Logic: Introduction – Crisp Sets- Fuzzy Sets –
Crisp Relations and Fuzzy Relations: Cartesian product of Relation – Classical Relation, Fuzzy
Relations, Tolerance And Equivalence Relations, Non-Iterative Fuzzy Sets.
REFERENCES:
1. S.Rajasekaran and G.A.Vijayalakshmi Pai, “Neural Networks, Fuzzy Logic and Genetic
Algorithm: Synthesis & Applications”, Prentice-Hall of India Pvt. Ltd., 2006.
2. George J. Klir, Ute St. Clair, Bo Yuan, “Fuzzy Set Theory: Foundations and Applications”
Prentice Hall, 1997.
3. David E. Goldberg, “Genetic Algorithm in Search Optimization and Machine Learning”
Pearson Education India, 2013.
4. James A. Freeman, David M. Skapura, “Neural Networks Algorithms, Applications, and
Programming Techniques, Pearson Education India, 1991.
Unit – I : Introduction to Internet of Things –Definition and Characteristics of IoT, Physical Design
of IoT – IoT Protocols, IoT communication models, Iot Communication APIs IoT enabaled
Technologies – Wireless Sensor Networks, Cloud Computing, Big data analytics, Communication
protocols, Embedded Systems, IoT Levels and Templates Domain Specific IoTs – Home, City,
Environment, Energy, Retail, Logistics, Agriculture, Industry, health and Lifestyle
Unit – II : IoT and M2M – Software defined networks, network function virtualization, difference
between SDN and NFV for IoT Basics of IoT System Management with NETCOZF, YANG-
NETCONF, YANG, SNMP NETOPEER
Unit – III : Introduction to Python – Language features of Python, Data types, data structures,
Control of flow, functions, modules, packaging, file handling, data/time operations, classes, Exception
handling Python packages – JSON, XML, HTTPLib, URLLib, SMTPLib
Unit – IV : IoT Physical Devices and Endpoints – Introduction to Raspberry PI-Interfaces (serial,
SPI, I2C) Programming – Python program with Raspberry PI with focus of interfacing external
gadgets, controlling output, reading input from pins.
Unit – V : IoT Physical Servers and Cloud Offerings – Introduction to Cloud Storage models and
communication APIs Webserver – Web server for IoT, Cloud for IoT, Python web application
framework Designing a RESTful web API
TEXT BOOKS:
Internet of Things – A Hands-on Approach, Arshdeep Bahga and Vijay Madisetti, Universities
Press, 2015, ISBN: 9788173719547
Getting Started with Raspberry Pi, Matt Richardson & Shawn Wallace, O’Reilly (SPD), 2014,
ISBN: 9789350239759
Professional Elective –V
(R18CSE4153) Software Process & Project Management
Objectives:
Describe and determine the purpose and importance of project management from the
perspectives of planning, tracking and completion of project.
Compare and differentiate organization structures and project structures.
Implement a project to manage project schedule, expenses and resources with the application of
suitable project management tools.
UNIT I : Software Process Maturity : Software maturity Framework, Principles of Software Process
Change, Software Process Assessment, The Initial Process, The Repeatable Process, The Defined
Process, The Managed Process, The Optimizing Process.
Process Reference Models : Capability Maturity Model (CMM), CMMI, PCMM, PSP, TSP.
UNIT III: Workflows and Checkpoints of process : Software process workflows, Iteration
workflows, Major milestones, Minor milestones, Periodic status assessments.
Process Planning : Work breakdown structures, Planning guidelines, cost and schedule estimating
process, iteration planning process, Pragmatic planning.
UNIT IV: Project Organizations : Line-of- business organizations, project organizations, evolution
of organizations, process automation.
Project Control and process instrumentation : The seven core metrics, management indicators,
quality indicators, life-cycle expectations, Pragmatic software metrics, and metrics automation.
UNIT V: CCPDS-R Case Study and Future Software Project Management Practices : Modern
Project Profiles, Next-Generation software Economics, Modern Process Transitions.
TEXT BOOKS:
1. Managing the Software Process, Watts S. Humphrey, Pearson Education.
2. Software Project Management, Walker Royce, Pearson Education.
REFERENCE BOOKS:
1. Effective Project Management: Traditional, Agile, Extreme, Robert Wysocki, Sixth
edition, Wiley India, rp2011.
2. An Introduction to the Team Software Process, Watts S. Humphrey, Pearson Education,
2000
3. Process Improvement essentials, James R. Persse, O’Reilly, 2006
4. Software Project Management, Bob Hughes & Mike Cotterell, fourth edition, TMH,
2006
5. Applied Software Project Management, Andrew Stellman & Jennifer Greene, O’Reilly,
2006.
6. Head First PMP, Jennifer Greene & Andrew Stellman, O’Reilly, 2007
7. Software Engineering Project Managent, Richard H. Thayer & Edward Yourdon, 2nd
edition, Wiley India, 2004.
8. The Art of Project Management, Scott Berkun, SPD, O’Reilly, 2011.
9. Applied Software Project Management, Andrew Stellman & Jennifer Greene, SPD,
O’Reilly, rp2011.
10. Agile Project Management, Jim Highsmith, Pearson education, 2004.
1. Write a C program that contains a string (char pointer) with a value ‘Hello world’. The program
should XOR each character in this string with 0 and displays the result.
2. Write a C program that contains a string (char pointer) with a value ‘Hello world’. The program
should AND or and XOR each character in this string with 127 and display the result.
3. Write a Java program to perform encryption and decryption using the following algorithms
a. Ceaser cipher b. Substitution cipher c. Hill Cipher
4. Write a C/JAVA program to implement the DES algorithm logic.
5. Write a C/JAVA program to implement the Blowfish algorithm logic.
6. Write a C/JAVA program to implement the Rijndael algorithm logic.
7. Write the RC4 logic in Java Using Java cryptography; encrypt the text “Hello world” using
Blowfish. Create your own key using Java key tool.
8. Write a Java program to implement RSA algorithm.
9. Implement the Diffie-Hellman Key Exchange mechanism using HTML and JavaScript.
10. Calculate the message digest of a text using the SHA-1 algorithm in JAVA.
11. Calculate the message digest of a text using the MD5 algorithm in JAVA.
Unit – 2: Organising: Nature of organizing, organisation levels and span of management – Factors
determining span – Organizational design and structure –departmentation, line and staff concepts,
staffing – delegation, decentralization and recentralisation of authority – responsive organizations.
Meaning and types of power – Empowerment – Groups Vs. Teams – Nature of groups –dynamics of
informal groups – dysfunctions of groups and teams – Teams in modern work place.
Unit – 4: Motivation and Leading: Theories of Motivation-Maslow’s need hierarchy, Hertzberg’s Two
Factor Theory. Job design and Goal setting for High performance- Socio technical Design and High
performance work practices. Leading: Leading Vs Managing – Leadership Theories- Leadership styles
– developing leadership skills – transformational leaders, transactional leaders, Leadership in Cross-
cultural environment – Evaluating Leader- Women and Corporate leadership.
Unit – 5: Communication and Control: Meaning, Types of communication and barriers to effective
communication in Organizations, Using Communication Skills to manage Conflicts. Controlling:
Basic control process- Requirements for effective control – control techniques – Overall controls and
preventive controls.
References
Koontz, Weihrich & Aryasri: Principles of Management, TMH,New Delhi, 2009
Luthans, Fred: Organisational Behaviour, 11/e, McGraw Hill, 2009
Stoner, Freeman and Gilbert: Jr. Management, Pearson,New Delhi, 2009.
Aryasri & VSP Rao: Management and Organisational Behaviour, Excel, 2009
Kavitha Singh:Organisational Behaviour, Pearson, 2009.
Kellogg: Conflict in Organizational Groups, Kogan Page,2009
John M. Ivancevich: Organisational Behaviour & Management, TMH, 2009
Schermerhorn: Management, Wiley 2009
Pierce and Gardner: Management and Organisational Behaviour: An Integrated Perspective,
Cengage, 2009.
BPP:Organisational Behaviour, Viva, 2009
UNIT – I
Characterization of Distributed Systems : Introduction, Examples of distributed Systems, Resource
Sharing and the Web, Challenges.
System Models : Introduction, Architectural models and Fundamental models
UNIT II
Time and Global States: Introduction, Clocks, events and Process states, Synchronizing physical
clocks, logical time and logical clocks, global states, distributed debugging.
Coordination and Agreement: Introduction, Distributed mutual exclusion, Elections, Multicast
communication, consensus and related problems.
UNIT – III
Inter Process Communication : Introduction, The API for the Internet Protocols , External Data
Representation and marshalling, Client-Server Communication, Group Communication, Case Study:
IPC in UNIX.
Distributed objects and Remote Invocation: Introduction, Communication between distributed
objects, Remote Procedure Call, Events and notifications, Case study: JAVA RMI.
UNIT – IV
Distributed File Systems: Introduction, File Service architecture, Case Study1: SUN network file
systems, Case Study 2: .The Andrew File System.
Name Services: Introduction, Name Services and the Domain Name System, Directory Services, Case
study of the Global Name Service
Distributed Shared Memory: Introduction, Design and Implementation issues, Sequential consistency
and IVY case study, Release consistency and Munin case study, Other consistency models
UNIT V
Transactions and Concurrency control: Introduction, Transactions, Nested Transactions, Locks,
Optimistic concurrency control, Timestamp ordering, Comparison of methods for concurrency control.
Distributed Transactions: Introduction, Flat and Nested Distributed Transactions, Atomic commit
protocols, Concurrency control in distributed transactions, Distributed deadlocks, Transaction recovery
TEXT BOOKS:
1. Distributed Systems, Concepts and Design, G Coulouris, J Dollimore and T Kindberg, Pearson
Education, 4TH Edition, 2009.
REFERENCES:
1. Distributed Systems: Principles and Paradigms, S. Tanenbaum and Maarten Van Steen, 2 nd
Edition, PHI.
2. Distributed Systems, An Algorithm Approach, Sukumar Ghosh, Chapman & Hali/CRC, Taylor
& Fransis Group, 2007.
Outcomes
Able to comprehend and design a new distributed system with the desired features.
Able to start literature survey leading to further research in any subarea.
Able to develop new distributed applications.
Text books:
Man Young Rhee, “Internet Security: Cryptographic Principles”, “Algorithms and Protocols”,
Wiley Publications, 2015.
Nelson, Phillips, Enfinger, Steuart, “Computer Forensics and Investigations”, Cengage
Learning, India Edition, 2016.
References:
John R.Vacca, “Computer Forensics”, Cengage Learning, 2015
Richard E.Smith, “Internet Cryptography”, 3rd Edition Pearson Education, 2014.
Marjie T.Britz, “Computer Forensics and Cyber Crime”: An Introduction”, 3rd Edition,
Prentice Hall, 2017.
UNIT- I
Introduction: Importance of user Interface – definition, importance of good design. Benefits of good
design. A brief history of Screen design.
The graphical user interface – popularity of graphics, the concept of direct manipulation, graphical
system, Characteristics, Web user – Interface popularity, characteristics- Principles of user interface.
UNIT- II
Design process – Human interaction with computers, importance of human characteristics human
consideration, Human interaction speeds, understanding business junctions.
Screen Designing:- Design goals – Screen planning and purpose, organizing screen elements, ordering
of screen data and content – screen navigation and flow – Visually pleasing composition – amount of
information – focus and emphasis – presentation information simply and meaningfully – information
retrieval on web – statistical graphics – Technological consideration in interface design.
UNIT- III
Windows – New and Navigation schemes selection of window, selection of devices based and screen
based controls.
Components – text and messages, Icons and increases – Multimedia, colors, uses problems, choosing
colors.
UNIT- IV
Software tools – Specification methods, interface – Building Tools.
UNIT- V
Interaction Devices – Keyboard and function keys – pointing devices – speech recognition digitization
and generation – image and video displays – drivers.
TEXT BOOKS:
1. The essential guide to user interface design, Wilbert O Galitz, Wiley DreamTech.
2. Designing the user interface. 3rd Edition Ben Shneidermann, Pearson Education Asia.
REFERENCE BOOKS:
1. Human – Computer Interaction. Alan Dix, Janet Fincay, Gre Goryd, Abowd, Russell Bealg,
Pearson Education
2. Interaction Design Prece, Rogers, Sharps. Wiley Dreamtech.
3. User Interface Design, Soren Lauesen , Pearson Education.
4. Human –Computer Interaction,D.R.Olsen, Cengage Learning.
5. Human –Computer Interaction, Smith - Atakan, Cengage Learning.
Outcomes:
Ability to apply HCI and principles to interaction design.
Ability to design certain tools for blind or PH people.
S. Credit
Course Code Course Title L T P
No. s
TEXT BOOK
1. Gupta.G.K, “Database Management Systems”, Tata McGraw Hill, 2011.
REFERENCES
1. Silberschatz, Korth.H and Sudarshan.S, “Database System Concepts”, 6th Edition, McGraw-
HillInternational, 2011.
2. Hector Garcia-Molina, Jeffrey D.Ullman, Jennifer Widom, “Database System The Complete
Book, 1st Edition, Pearson 2002.
3. RamezElmasri and ShamkantB.Navathe, “Fundamentals of Database Systems”, Fifth Edition,
Pearson, 2008.
UNIT II: Entertainment Electronics - Audio systems: Construction and working principle of :
Microphone, Loud speaker, AM and FM receiver, stereo, 2.1 home theatre, 5.1 home theatre .
Display systems: CRT, LCD, LED and Graphics displays Video Players : DVD and Blue RAY.
Recording Systems: Digital Cameras and Camcorders.
UNIT III: Smart Home - Technology involved in Smart home, Home Virtual Assistants- Alexa and
Google Home. Home Security Systems - Intruder Detection, Automated blinds, Motion Sensors,
Thermal Sensors and Image Sensors, PIR, IR and Water Level Sensors.
UNIT IV: Home Appliances - Home Enablement Systems: RFID Home, Lighting control, Automatic
Cleaning Robots, Washing Machines, Kitchen Electronics- Microwave, Dishwasher, Induction Stoves,
Smart Refrigerators, Smart alarms, Smart toilet, Smart floor, Smart locks.
UNIT V: Communication Systems - Cordless Telephones, Fax Machines, PDAs- Tablets, Smart
Phones and Smart Watches. Introduction to Smart OS- Android and iOS. Video Conferencing
Systems- Web/IP Camera, Video security, Internet Enabled Systems, Wi-Fi, IoT, Li-Fi, GPS and
Tracking Systems, Contemporary Topics.
TEXT BOOKS:
1. Thomas L Floyd "Electronic Devices" 10th Edition Pearson Education Asia 2018.
2. Philp Hoff "Consumer Electronics for Engineers" - Cambridge University Press.1998.
3. Jordan Frith, " Smartphones as Locative Media ", Wiley. 2014.
4. Dennis C Brewer, " Home Automation", Que Publishing 2013.
5. Thomas M. Coughlin, "Digital Storage in Consumer Electronics", Elsevier and Newness 2012.
Course Outcomes:
C325.1. summarize the consumer electronics fundamentals and explain about microprocessors and
microcontrollers, energy management and intelligent building perspective (K2-Understand)
C325.2. Demonstrate Audio systems, Display systems, video systems and recording systems (K3-
Apply)
C325.3. Describe the smart Home, Home Virtual Assistants, Home security systems and Different
types of sensors (K2-Understand)
C325.4. Outline the home enablement systems like RFID Home, kitchen electronics and smart alarms,
smart toilet, smart floor and smart locks. (K4-Analyse)
C325.5. Discuss cordless telephones, Fax machines PDA’s TABLETs Smart phones and Smart watches.
C325.6. Compare and explain Android and iOS and demonstrate Video conferencing systems,
Internet enabled systems, Wi-Fi, Li-Fi, GPS and Tracking systems. (K5-Evaluate)
TEXT BOOKS:
1. Deb.S.R, “Robotics Technology and Flexible Automation”, Tata McGraw – Hill Publishing
Company Limited, 2010.
2. Mikell. P. Groover, ‘Industrial Robotics Technology’, Programming and Applications,
McGraw Hill Co, 2008.
REFERENCES:
1. Klafter.R.D, Chmielewski.T.A, and Noggin’s., “Robot Engineering : An Integrated Approac”’,
Prentice Hall of India Pvt. Ltd.,1994.
2. Fu.K.S, Gonzalez.R.C&Lee.C.S.G, “Robotics control, sensing, vision and intelligence”,
McGraw Hill Book co, 1987
3. Craig.J.J, “Introduction to Robotics mechanics and control”, AddisonWesley, 1999.
4. Ray Asfahl.C, “Robots and Manufacturing Automation”, John Wiley & Sons Inc., 1985.
5. Kozyrey, Yu. “Industrial Robotics”, MIR Publishers Moscow, 1985.
UNIT V: Financing and How to Start up Business? - Financial opportunity identification; Banking
sources; Non-banking Institutions and Agencies; Venture Capital – Meaning and Role in
Entrepreneurship; Government Schemes for funding business; Pre launch, Launch and Post launch
requirements; Procedure for getting License and Registration; Challenges and Difficulties in Starting
an Enterprise, Contemporary Topics.
TEXT BOOKS :
1. Jayshree Suresh, “Entrepreneurial Development”, Margham Publishers, Chennai, 2011.
2. Poornima M Charantimath, “Entrepreneurship development small business enterprises”,
Pearson, 2013.
REFERENCES:
1. Raj Shankar, “Entrepreneurship: Theory And Practice”, Vijay Nicole imprints ltd in
collaboration with Tata Mc-graw Hill Publishing Co.ltd.-new Delhi, 2012
2. Robert D. Hisrich, Mathew J. Manimala, Michael P Peters and Dean A. Shepherd,
“Entrepreneurship”, 8th Edition, Tata Mc-graw Hill Publishing Co.ltd.-new Delhi, 2012
3. Martin Roger, “The Design of Business”, Harvard Business Publishing, 2009
4. Roy Rajiv, “Entrepreneurship”, Oxford University Press, 2011
5. Drucker.F, Peter, “Innovation and Entrepreneurship”, Harper business, 2006.
COURSE OUTCOMES:
1. The student can understand the biology of human system and health.
2. This provides student with a scope for selection of healthy food and sustain environment.
UNIT I: Biology of Human Diseases and Disorders - Diabetes mellitus, communicable diseases,
genetic disorders, vector borne diseases, antibiotics - mode of action.
UNIT II: Biology for Human - Blood pressure, immune system and immunity, cardiac infarction, in
vitro fertilization, cord blood bank, stem cells.
UNIT III: Biology of Cosmetics and Detergents - Biology of complexion and texture, bioactive
natural products in industrial use, bio surfactants, antioxidants.
UNIT IV: Biology and Nutrition - Dietary index, carbohydrates, proteins and fats, HDL and LDL,
dairy products and application, herbal plants and home remedies.
UNIT V: Biology and Environment - Water pollution, air pollution, bioremediation, species
biodiversity, global warming and greenhouse effect, Contemporary Topics.
TEXT BOOKS:
1. Gareth J. Price, Biology: An Illustrated Guide to Science, Diagram Group, Infobase Publishing,
2006.
2. Pam Dodman, Real-Life Science Biology, Walch Publishing, 2008.
REFERENCES:
1. Biology:TheScience of Life, Stephen Nowicki, http://www.thegreatcourses.com/tgc/courses.
2. Neil Schlager, Science of everyday things: Real-Life Biology, Gale Publishing 2002.
UNIT 1 Concept of Green Buildings : Green building initiatives, its origin, characteristics of a green
building, green buildings in India, certification of green buildings.Criteria for rating – sustainability.
Depleting natural resources of building materials; renewable and recyclable resources; energy efficient
materials; green cement, biodegradable materials, smart materials, engineering evaluation of these
materials. Case study.
UNIT 2 Sources of Energy Renewable and non-renewable sources of energy ; coal, petroleum,
nuclear, wind, solar, hydro, geothermal sources; potential of these sources, hazards, pollution; global
scenario with reference to demand and supply in India. Energy arises. Carbon Emission: Forecasting,
control of carbon emission, air quality and its monitoring carbon foot print; environmental issues,
minimizing carbon emission.
UNIT 4 Actuator Techniques Actuator and actuator materials – Piezoelectric and Electrostrictive
Material – Magneto structure Material – Shape Memory Alloys – Electrorheological Fluids–
Electromagnetic actuation – Role of actuators and Actuator Materials.
UNIT 5 Materials For "Green" Systems Green materials, including biomaterials, biopolymers,
bioplastics, and composites Nanotech Materials for Truly Sustainable Construction: Windows,
Skylights, and Lighting. Paints, Roofs, Walls, and Cooling.Multifunctional Gas Sensors, Biomimetic
Sensors, Optical Interference Sensors Thermo-, light-, and stimulus-responsive smart materials,
Contemporary Topics.
TEXT BOOKS
1. Sustainable Construction , Charles J. Kibert.,Third Edition
2. Green Building A to Z, Jerry Yudelson.
REFERENCE BOOKS
1 Advanced Technology for Smart buildings,James Sinopoli
E BOOKS https://www.springer.com/in/book/9789811010002
https://www.elsevier.com/books/smart-buildings/casini/978-0-08-100635-1
MOOChttps://www.mooc-list.com/tags/green-building
UNIT I: Need for Cyber Security - Introduction to security- CIA triad-Case studies- security attacks-
issues related to social networking - Guidelines
UNIT II: Methods to Secureyourself in the Cyber World - Why and What of Reversible and
Irreversible Cryptographic mechanisms? Applications of Digital Signature - Good password practices
UNIT III: E-Commerce: Secure Transactions - What is E-commerce? – Online banking security-
Online shopping fraudGuidelines and Recommendations
UNIT IV: EVERYDAY SECURITY - Connecting your laptop, mobile devices, PDAs to Internet-
Managing your browser-Facebook Security-E-mail security – Safe guarding from Viruses:
Antiviruses– Best practices and guidelines
UNIT V: CYBER SECURITY LAWS AND COMPETENT AUTHORITIES - Indian IT Act, 2008 -
What is Cyber Forensics? – Functions of cybercrime cell – Responding to a cyber-attack,
Contemporary Topics
REFERENCES:
Course outcomes
After completion of the course, students will be able to:
C415.1. Differentiate various elements, processes, and parameters in communication systems, and
describe their functions, effects, and interrelationship (K2-Understand).
C415.2. Interpret the mobile cellular concepts, standards and all generations of cellular systems. (K2-
understand)
C415.3. Describe the existing and emerging wireless standards and Compare various wireless networks
and their specifications. (K5-Evaluate)
C415.4. Demonstrate the history of Satellite communication, applications and orbit concepts,
Placement of a Satellite in a Geo-Stationary orbit and GPS concept (K3- Apply)
C415.5 Summarize the radar fundamentals and analysis of the radar signals. (K4- Analyze)
C415.6 Explain the Navigation systems (K2-Understand).
UNIT I: Introduction of Light : Types of illumination, Day lighting, Supplementary artificial lighting
and total lighting, Quality of good lighting, Factors affecting the lighting-shadow, glare, reflection,
Color rendering and stroboscopic effect, Methods of artificial lighting, Lighting systems-direct,
indirect, semi direct, semi indirect, Lighting scheme, General and localized.
UNIT II: Measurement of Light: Definition of luminous flux, Luminous intensity, Lumen, Candle
power, Illumination, M.H.C.P, M.S.C.P, M.H.S.C.P, Lamp efficiency, Brightness or luminance, Laws
of illumination, Inverse square law and Lambert’s Cosine law, Illumination at horizontal and vertical
plane from point source, Concept of polar curve, Calculation of luminance and illumination in case of
linear source, round source and flat source.
UNIT III: Design of Interior Lighting : Definitions of maintenance factor, Uniformity ratio, Direct
ratio, Coefficients of utilization and factors affecting it, Illumination required for various work planes,
Space to mounting height ratio, Types of fixtures and relative terms used for interior illumination such
as DLOR and ULOR, Selection of lamp and luminance, Selection of utilization factor, reflection factor
and maintenance factor Determination of Lamp Lumen output taking into account voltage and
temperature variations, Calculation of wattage of each lamp and no of lamps needed, Layout of lamp
luminaire, Calculation of space to mounting height ratio, Indian standard recommendation and standard
practices for illumination levels in various areas, Special feature for entrance, staircase, Corridor
lighting and industrial building.
UNIT IV: Design of Outdoor Lighting: Street Lighting : Types of street and their level of
illumination required, Terms related to street and street lighting, Types of fixtures used and their
suitable application, Various arrangements in street lighting, Requirements of good street lighting,
Selection of lamp and luminaire, Calculation of their wattage, Number and arrangement, Calculation of
space to mounting height ratio, Calculation of illumination level available on road.
UNIT V:Design of Outdoor Lighting: Flood Lighting: Terms related to flood lighting, Types of
fixtures and their suitable applications, Selection of lamp and projector, Calculation of their wattage
and number and their arrangement, Calculation of space to mounting height ratio, recommended
method for aiming of lamp.
Special Features of Aesthetic Lighting: Monument and statue lighting, Sports lighting, Hospital
lighting, Auditorium lighting, Contemporary Topics.
Text Books:
1. D.C. Pritchard Lighting, Routledge, 2016
2. Jack L. Lindsey, Applied Illumination Engineering, PHI, 1991
3. John Matthews Introduction to the Design and Analysis of Building Electrical Systems,
Springer, 1993
4. M.A. Cayless, Lamps and Lighting, Routledge, 1996
References:
1. IS CODE 3646
2. IS CODE 6665
(R18INF4185) E – COMMERCE
COURSE OUTCOMES: At the end of the course, the students will be able to :
1. Understand the E – commerce strategies and value chains
2. Understand the E-commerce services
3. Understand E - commerce infrastructure, its applications and Supply Chain Management.
4. Know the availability of latest technology and applications of E-Payment Mechanism.
5. Apply E-Commerce in business-to-business application.
UNIT 1: Electronic Commerce: Overview, Definition, Advantages & Disadvantages of E-Commerce,
Threats of E-Commerce, Managerial Prospective, Rules & Regulation for Controlling Commerce,
Relationship Between E-Commerce & Networking, Different Types of Networking for E-Commerce,
internet, Intranet, EDI Systems, Wireless Application Protocol: Definition, Hand Held Devices,
Mobility & Commerce Model, Mobile Computing, Wireless Web, Web Security, Infrastructure
Requirement for E-Commerce, Business Model of E-Commerce; Model Based on Transaction Type,
Model Based on Transaction Party- B2B, B2C, C2B, C2C, E-Governance.
UNIT 2: E-Strategy: Overview, Strategic Methods for developing E-Commerce. Four C's
(Convergence, Collaborative, Computing, Content Management & Call Center). Convergence:
Technological Advances in Convergence - Types, Convergence and its implications, Convergence &
Electronic Commerce. Collaborative Computing: Collaborative Product Development, contract as per
CAD, Simulations Collaboration, Security. Content Management: Definition of Content, Authoring
Tools and Content Management, Content Management, Content - partnership, repositories,
convergence, providers, Web Traffic.
UNIT 3: Traffic Management: Content Marketing Call Center: Definition, Need, Tasks Handled,
Mode of Operation, Equipment, Strength & Weakness of Call Center, Customer Premises Equipment
(CPE).
Supply Chain Management: E-logistics, Supply Chain Portal, Supply Chain Planning Tools (SCP
Tools), Supply Chain Execution(SCE), SCEFramework, Internet's Effect on Supply Chain Power.
UNIT 4: E-Payment Mechanism: Payment through card system, E-Cheque, E-Cash, E-Payment,
Threats& Protections.
E-Marketing: Home - Shopping, E-Marketing, Tele- Marketing
UNIT 5: Electronic Data Interchange (EDI): Meaning, Benefits, Concepts, Application, EDI Model,
Protocols (UN EDI, FACT/ GTDI), ANSIX-12, Data Encryption (DES/RSA)
Risks of E-Commerce: Overview, Security for E-Commerce, Security Standards, Firewall,
Cryptography, Key Management, Password Systems, Digital Certificates, Digital Signatures,
Contemporary Topics.
Text Book:
1. Electronic Commerce - Technologies & Applications, Bhaskar Bharat, TMH
Reference Books:
1. E-commerce, MM Oka, EPH
2. Frontiers of Electronics Commerce, Kalakotia, Whinston, Pearson Education
3. Electronic Commerce, Loshinpete, Murphy P. A., Jaico Publishing Housing
UNIT 1: Introduction: An approach to industrial design -elements of design structure for industrial
design in engineering application in modern manufacturing systems. Ergonomics and Industrial
Design: Introduction -general approach to the man- machine relationship- workstation design-working
position.
UNIT 2: Control and Displays: Shapes and sizes of various controls and displays-multiple, displays
and control situations - design of major controls in automobiles, machine tools etc Ergonomics and
Production: ergonomics and product design -ergonomics in automated systems- expert systems for
ergonomic design. Anthropometric data and its applications in ergonomic, design- limitations of
anthropometric data- use of computerized database.
UNIT 3: Visual Effects of Line and Form: The mechanics of seeing- psychology of seeing general
influences of line and form. Color: Color and light -color and objects- color and the eye -color
consistency- color terms- reactions to color and color continuation -color on engineering equipment.
UNIT 4: Aesthetic Concepts: Concept of unity- concept of order with variety -concept of purpose style
and environment- Aesthetic expressions. Style-components of style- house style, observation style in
capital goods, case study.
UNIT 5: Industrial Design in Practice: General Design -specifying design equipment- rating the
importance of industrial design -industrial design in the design process, Contemporary Topics.
REFERENCE BOOKS:
1. Industrial Design for Engineers - Mayall W.H. - London Hiffee books Ltd.-1988.
2. Applied Ergonomics Hand Book - Brain Shakel (Edited) - Butterworth scientific. London
3. Introduction to Ergonomics - R. C. Bridger - McGraw Hill Publications -1995.
4. Human Factor Engineering - Sanders & McCormick - McGraw Hill Publications – 6th edition,2002.
COURSE OUTCOMES:
1. Discuss with some confidence many of the rhetorical devices, from metaphor to enjambment
associated with creative writing.
2. Appreciate the complexity of Poetry, Short Fiction, and Creative Nonfiction.
3. Understand the importance of Creative Writing as a means of self-expression.
4. Read and discuss with enhanced understanding Poetry, Short Fiction, and Creative Nonfiction
5. Show improvement in writing and analytical skills.
UNIT I: Introduction to Literary Forms - Elements of Poetry - Rhythm and Meter Poetic Forms –
Ballad, Lyrics, Elegy, Odes, Haiku, Sonnets Literary Genres- Short Fiction, Drama, and Non-Fiction
UNIT II: Poetry Writing - Appreciation of the form and content of poem Techniques - figurative
language - (structure - rhythm – imagery – tone – style point of view, voice - read and discuss
numerous poems)
Ballad - The Ballad of the Landlord by Langston Hughes; Lyrics - Kubla Khan by Samuel Taylor
Coleridge Elegy - Elegy Written in a Country’s Churchyard by Thomas Gray Odes – Ode to a
Nightingale by John Keats; Haik u- This Other World by Richard Wright Sonnet - On His Blindness by
John Milton Students Creative Assignment – Students will write three poems.
UNIT III: Short Fiction / Novel - Elements of Fiction - Character – Plot- Setting – Theme - Style;
Narrator - Point of view - Tone – Suspension of Disbelief. Genres - Adventure, Comic, Fantasy,
Gothic, Romance, Historical, Horror, Supernatural, Thriller, Science Fiction - Gooseberries by Anton
Chekhov Short Story - My Lost Dollar by Stephen Leacock Students Creative Assignment – Students
will write one Short Story
UNIT IV: Drama - Elements of Drama - Character Plot, Theme, Dialogue, Convention, Genre,
Audience, Stagecraft, Design, ConversionsDrama – The King of the Dark Chamber by Rabindranath
Tagore Students Creative Assignment- Students will write a review of the drama read in the class.
UNIT V: Non Fiction - Prose, Biography, Memoirs, and Personal Essays Walden or Life in the
Woods by Henry David Thoreau Students Creative Assignment - Students will write one or two essays,
Contemporary Topics.
REFERENCES
1. Candace H. Schaefer, Rick Diamond. 1998. The Creative Writing Guide: A Path to Poetry,
Nonfiction, and Drama, Longman, New York, USA
2. Shelly Clark and MarjoneSaisa, 2009. Road Trip: Conversations with Writers, The Backwaters
Press, Nebraska, USA
3. Nikki Moustaki (ed.), 1998. Writing Fiction: The Practical Guide from New York’s Acclaimed
Creative Writing School, Publisher: Bloomsbury, ISBN: 0156005743.
Students’ Responsibilities:
1. Students will form teams of 3–5 members each, while working collaboratively throughout the
semester.
2. Students will present and report the tasks to the class and to the concerned faculty members and
design experts, using their oral and written communication skills as well as creativity and team
skills.
3. Students must proactively engage in observing the objects and processes which are part of their
daily life and society from a design perspective and discuss with peers to learn collaboratively.
UNIT 1: Design Overview and Motivation History and Context of birth of Design; Design thinking:
Introduction and Motivation; Various definitions and interpretations of design, Design Vocabulary;
Design in Indian Context; Art and Design: Art in Design, Design beyond Art; Design in Creative
Industries
UNIT 2: Design Sensitization for Engineers- Design Engineering vs. Engineering Design, Examples of
Engineering Design and Design Engineering in various engineering domains, Examples of design
failures leading to bad products and services, Real-world examples of bad design that caused
engineering and technological disasters, Domain-specific Engineering Design examples
UNIT 4: Communication Skills for Design, Culture and Art Communication Media to express an idea:
Visuals, Text, Voice and Audio, Info graphics General guidelines for a good Presentation: Target
audience, slideshow templates, appropriate visual elements, presentation styles, guidelines General
guidelines for a good Report: Documentation classification, standards, styles, and templates Modes of
communication: Reports and documents, Presentation, poster, graphic, blog or website. Understanding
Art in Design: Need for creativity, Elements of Visual Design Aesthetics: Influences and impressions
of Colors, Shapes, Layouts, Patterns, and Fonts as Design Elements
UNIT 5:Applied Creativity and Design for Services Methods to brainstorm solutions for user issues;
Combining solutions to workable solution concepts; Identifying the user needs in a service-driven
economy; Process Flows and Customer Experience considerations for designing and improving
services; 5 Why’s; Service Delivery Pathways. Doing Design Looking for a problem, Ideation and
Rules of Ideation, Framing and stating the problem; Basic considerations of Prototyping/ Model
Building, Basics of Testing and Validation, Incorporating feedback, Contemporary Topics.
TEXT BOOKS:
1. Daniel Ling, “Complete Design Thinking Guide for Successful Professionals”, CreateSpace
Independent Publishing, 2015 (ISBN: 978-1514202739)
2. Tim Brown, “Change by Design”, Harper Business, 2012 (ISBN: 978-0062337382)
3. Jimmy Jain, “Design Thinking for Startups: A Handbook for Readers and Workbook for
Practitioners”, Notion Press, 2018 (ISBN: 978-1642495034)
4. Beverly Rudkin Ingle, “Design Thinking for Entrepreneurs and Small Businesses: Putting the
Power of Design to Work”, APress, 2013 (ISBN: 978-1430261810)
REFERENCES:
1. Donald A. Norman, “The Design of Everyday Things”, MIT Press, 2013 (ISBN: 978-
0262525671)
2. Bruno Munari, “Design As Art”, Penguin UK, 2009 (ISBN: 978-0141035819)
3. Tom Kelly, Jonathan Littman, “The Art of Innovation”, HarperCollins Business, 2002 (ISBN:
978-0007102938)
4. Thomas Lockwood, “Design Thinking: Integrating Innovation, Customer Experience, and
Brand Value”, Allworth Press, 2009 (ISBN: 978-158115)
S.
Course Code Course Title L T P Credits
No.
COURSE OUTCOMES:
1. At the end of the course the student will be able to understand
2. The characteristics of electromagnetic radiation and its interaction with earth features
3. The types and configuration of various satellites and sensors
4. The elements of data interpretation
UNIT II:EMR Interaction with Atmosphere- Standard atmospheric profile – main atmospheric
regions and its characteristics – interaction of radiation with atmosphere - Scattering (Rayleigh, Mie,
non-selective scattering) absorption and refraction – Atmospheric effects on visible, infrared, thermal
and microwave spectrum – Atmospheric windows.
UNIT III: EMR Interaction with Earth- Energy balance equation – Specular and diffuse reflectors –
Spectral reflectance &emittance – Spectro radiometer / Spectrophotometer – Spectral Signature
concepts – Typical spectral reflectance curves for vegetation, soil and water body – Factors affecting
spectral reflectance of vegetation, soil and water body.
UNIT IV: Platforms and Sensors- Ground based platforms –Airborne platforms – Space borne
platforms – Classification of satellites – Sun synchronous and Geosynchronous satellites – Resolution
concepts – Scanners - Along and across track scanners – Orbital and sensor characteristics of different
satellites – Airborne and Space borne TIR sensors – Calibration – S/N ratio – Passive/Active
microwave sensing – Airborne and satellite borne RADAR –SAR –LIDAR , UAV – High Resolution
Sensors
UNIT V: Data Products and Visual Interpretation- Photographic (film and paper) and digital
products – quick look products - High Resolution data products data - ordering – interpretation – basic
characteristics of image elements – interpretation keys (selective and elimination) – visual
interpretation of natural resources, Contemporary Topics.
TEXT BOOKS:
1. Richards, Remote sensing digital Image Analysis-An Introduction Springer - Verlag 1993.
2. Lillesand, T.M. and Kiefer R.W. Remote Sensing and Image interpretation, John Wiley and Sons,
Inc, New York, 2002.
REFERENCES:
1. Janza, F.Z., Blue H.M. and Johnson,J.E. Manual of Remote Sensing. Vol.I, American Society
of Photogrametry, Virginia, USA, 2002.
2. Verbyla, David, Satellite Remote Sensing of Natural Resources. CRC Press, 1995
3. Paul Curran P.J. Principles of Remote Sensing. Longman, RLBS, 2003.
UNIT I: Introduction: What is Soft Computing? Difference between Hard and Soft computing,
Requirement of Soft computing, Major Areas of Soft Computing, Applications of Soft Computing.
Neural Networks: What is Neural Network, Learning rules and various activation functions, Single
layer Perceptrons, Back Propagation networks, Architecture of Back propagation(BP) Networks,
Backpropagation Learning, Variation of Standard Back propagation Neural Network, Introduction to
Associative Memory, Adaptive Resonance theory and Self Organizing Map, Recent Applications.
UNIT II:Fuzzy Systems: Fuzzy Set theory, Fuzzy versus Crisp set, Fuzzy Relation, Fuzzification,
Minmax Composition, Defuzzification Method, Fuzzy Logic, Fuzzy Rule based systems, Predicate
logic, Fuzzy Decision Making, Fuzzy Control Systems, Fuzzy Classification.
UNIT III: Genetic Algorithm: History of Genetic Algorithms (GA), Working Principle, Various
Encoding methods, Fitness function, GA Operators- Reproduction, Crossover, Mutation, Convergence
of GA, Bit wise operation in GA, Multi-level Optimization.
UNIT 4: Hybrid Systems: Sequential Hybrid Systems, Auxiliary Hybrid Systems, Embedded Hybrid
Systems, Neuro-Fuzzy Hybrid Systems, Neuro-Genetic Hybrid Systems, Fuzzy-Genetic Hybrid
Systems.
TEXT BOOKS:
1. Neural Networks, Fuzzy Logic and Genetic Algorithms: Synthesis & Applications,
S.Rajasekaran, G. A. Vijayalakshami, PHI.
2. Genetic Algorithms: Search and Optimization, E. Goldberg.
3. Neuro-Fuzzy Systems, Chin Teng Lin, C. S. George Lee, PHI.
4. Build_Neural_Network_With_MS_Excel_sample by Joe choong.
UNIT II: TV Fundamentals - Concept of Aspect ratio, image continuity, interlace scanning, scanning
periods, horizontal and vertical, vertical resolution, horizontal resolution; Vestigial sideband
transmission, bandwidth for Colour signal, picture tube, brightness, contrast, viewing distance
luminance, hue, saturation, compatibility; Colour theory, primary colors and secondary colors, additive
Colour mixing subtractive Colour mixing; Composite Video Signal, Pedestal height, Blanking pulse,
Colour burst, Horizontal sync pulse details, Vertical sync pulse details, Equalizing pulses, CCIR B
standards for Colour signal transmission and reception.
UNIT III: TV Transmitters and Receiver - Audio and Video signal transmission; Positive and
Negative modulation; Merits and Demerits of Negative modulation; Introduction to television camera
tube (a) Vidicon; (b) Plumbicon; (c) Solid State camera based on CCD; Color Picture tube (a) PIL, (b)
Delta gun picture tube; Block diagram of monochrome TV transmitter; Block diagram of Colour TV
transmitter; Block diagram of monochrome TV Receiver.
UNIT IV: Colour TV - Block Diagram and operation of color TV receiver (PAL D type); Explain –
YagiUda Antenna; Explain block diagram of PAL-D decoder with circuit diagram of chroma signal
amplifier, Burst pulse blanking, Colour killer control, Basic Circuit for Separation of U and V signals.
AGC Amplifier.Colour signal matrixing, RGB drive amplifiers; EHT generation: circuit explanation
for line output stage using transistor or IC in Colour TV; Comparisons between NTSC, PAL and
SCAM Systems.
UNIT V: Cable Television - Working principle and specification of following components : Dish
antenna, LNBC, Multiplexer, Attenuators Connectors (two ways and three ways), Amplifier and cable;
MATV,CATV and CCTV;Design concept for cable TV network; Block diagram of dB meter with
working principle; Direct to Home System (DTH) Introduction and Block Diagram, Contemporary
Topics.
References :
1. Television & Radio Engineering (A.M. Dhake) Tata McGraw Hill.
2. Television Engg and Video System (R.G. Gupta) Tata McGraw Hill.
3. Audio Video Systems (R.G. Gupta) Tata McGraw Hill.
4. Modern TV Pratice (R.R. Gulati) New Age International.
5. Basic Radio and Television (S. Sharma) Tata McGraw Hill.
6. Colour Television Principles and Pratice (R.R. Gulati) New Age International.
7. Basic Television and Video System (Bernard Grob) Tata McGraw Hill.
8. Mono Chrome and Colour Television (R.R. Gulati0 New Age International.
9. Modern CD Player Servicing Manual (ManoharLotia) BPB Publication.
Course Outcomes:
After completion of the course, students will be able to:
C423.1. Explain and differ ate the different amplifiers, graphic equalizer and Dolby NR recording
systems (K3-apply)
C423.2. Describe the TV fundamentals like concept of aspect ratio, image continuity etc Color theory
(K2-Understand)
C423.3. Discuss about composite video signal ad CCIR B standard for color signal Transmission and
reception (K2-Understand)
C423.4. Discuss monochrome TV transmitter and receivers, Color TV transmitter and compare TV
camera tubes, Color picture tube (K5-Evaluate)
C423.5. Diagram Illustrate of color TV receivers (PAL-D) and Differentiate between NTSC PAL and
SCAM systems (K4-Analyse)
C423.6. Explain about cable Television, MATV, CATV, CCTV, Cable TV network and DTH (K2-
Understand)
UNIT I: SOLAR ENERGY - Solar radiation its measurements and prediction - Solar thermal
collectors - Flat plate collectors, Concentrating collectors – Applications - Heating, Cooling,
Desalination, Drying, Cooking, etc - Principle of photovoltaic conversion of solar energy - Types of
solar cells and fabrication - Photovoltaic applications - Battery charging, Domestic lighting, Street
lighting and water pumping.
UNIT II:WIND ENERGY - Wind energy - Energy chains - Application - Historical background,
Merits and limitations - Nature of wind - Planetary and local day / night winds - Wind energy quantum
- Power in wind- Turbine efficiency - Torque Thrust calculations Velocity at different heights - Site
selection - Components of Wind Energy Conversion System (WECS).
UNIT III: BIOMASS ENERGY - Energy from Biomass - Biomass as Renewable Energy Source -
Types of Bio mass Fuels - Solid, Liquid and Gas - Biomass Conversion Techniques- Wet Process, Dry
Process-Photosynthesis - Biogas Generation - Factors affecting Biodigestion - Classification of bio gas
plant - Continuous, Batch and Fixed Dome types - Advantages and Disadvantages.
UNIT IV: TIDAL, OTEC, HYDEL AND GEOTHERMAL ENERGY - Tidal energy: Tide – Spring
tide, Neap tide – Tidal range – Tidal Power – Types of tidal power plant – Single and dual basin
schemes – Requirements in tidal power plant - Ocean Thermal Energy Conversion (OTEC): Principle -
Open and closed OTEC Cycles - Hydel Energy: Micro hydro - Geothermal Energy: Geothermal energy
sources - Power plant and environmental issues.
UNIT V:NEW ENERGY SOURCES - Hydrogen as a renewable energy source - Sources of Hydrogen
- Fuel for Vehicles - Hydrogen Production - Direct electrolysis of water, thermal decomposition of
water, biological and biochemical methods of hydrogen production - Storage of Hydrogen - Gaseous,
Cryogenic and Metal hydride - Fuel Cell – Principle of working, construction and applications,
Contemporary Topics.
TEXT BOOKS
1. Rai.G.D, “Non- conventional resources of energy”, Khanna publishers, Fourth edition, 2010.
2. Khan. B.H, “Non-Conventional Energy Resources”, The McGraw Hills, Second edition, 2009.
REFERENCES
1. Rao.S&Parulekar, “Energy Technology”, Khanna publishers, Fourth edition, 2005.
2. Pai.B.R and Ram Prasad.M.S, “Power Generation through Renewable Sources of Energy”, Tata
McGraw Hill, New Delhi, 1991.
3. Bansal.N.K, Kleeman and Meliss, “Renewable energy sources and conversion Techniques”,
Tata McGraw hill, 1990.
4. Godfrey Boyl “Renewable Energy: Power Sustainable Future”,Oxford University Press, Second
edition, 2006.
5. Ryan O’Hayre, Suk-Won Cha and Whitney colella, “Fuel Cell Fundamentals”, Second edition,
2009.
6. John W Twidell and Anthony D Weir, “Renewable Energy Resources”, Taylor and Francis,
2006.
7. Freris.L.L, “Wind Energy Conversion systems”, Prentice Hall, UK, 1990.
UNIT III: Network - Introduction to Network Security, Email Security, IP Security, Web Security,
Kerberos, X.509 techniques.
UNIT IV: Scanning & Enumeration Technology - Malicious software, Firewalls, Honey pots,
Intrusion Detection system, Intrusion Prevention system
UNIT V: Ethics In Information Security - Implementing Information Security, Legal Ethical &
Professional issues in Information Security, Contemporary Topics.
TEXT BOOKS:
1. Matt Bishop, “Computer Security: Art and Science”, Addison-Wesley Professional, First
Edition, 2003. ISBN: 0201440997.
2. William Stallings, “Cryptography and Network Security”, Pearson Education, Fourth Edition,
2006. ISBN: 8177587749
REFERENCES:
1. Michael E. Whitman, Herbert J. Mattord ,“Principles of Information Security” Cengage
Learning, Fourth Edition, 2010, ISBN: 1111138214
2. Charlie Kaufman, Radia Perlman, Mike Speciner, “Network security: private communication in
a public world”, Second Edition, ISBN: 0130460192.
3. Dieter Gollmann ,”Computer Security “, Third Edition, ISBN: 0470741155.
COURSE OUTCOMES:
1. To understand the fundamentals of quality
2. To understand the role of TQM tools and techniques in elimination of wastages and reduction
of defects
3. To develop quality as a passion and habit
UNIT I: Quality Gurus And TQM Kitemarks - Evolution of TQM – Quality Guru’s – Edward
Deming – Joseph Juran – Philip Crosby – Genichi Taguchi – Walter Shewart – Criteria for Deming’s
PrizeUNIT II - PRODUCT DESIGN AND ANALYSIS (9 hours) Basic Design Concepts and TQM –
Design Assurance – Design Validation – Failure Mode Effect Analysis – Fault Tree Analysis – Design
for Robustness – Value Analysis
UNIT-III: Process Improvement and Modern Production Management Tools - Six Sigma
Approach – Total Productive Maintenance – Just-In-Time – Lean Manufacturing Paradigms
UNIT IV: Quality Improvement Tools and Continuous Improvement - Q-7 Tools – New Q-7
Tools – Quality Function Deployment – Kaizen – 5S – PokaYoke
TEXT BOOKS
1. Total Engineering Quality Management, Sunil Sharma, 1st Edition, MacMillan India Limited.
2. Total Quality Management, Poornima M. Charantimath, 2nd Edition, Pearson Education.
REFERENCES
1. “Quality and Performance Excellence”, James R Evans, Edition, 7th Edition, Cengage
Learning.
2. “Quality Management”, Howard S Gitlow, Alan J Oppenheim, Rosa Oppenheim, David M
Levine,3rd Edition , Tata McGraw Hill Limited.
3. “Fundamentals of Quality Control & Improvement”, AmitavaMitra, 3rd Edition, Wiley
Publications, 2012.
REFERENCES
1. Engineering Ethics, Concepts Cases: Charles E Harris Jr., Michael S Pritchard, Michael
J Rabins, 4e ,Cengage learning, 2015.
2. Business Ethics concepts & Cases: Manuel G Velasquez, 6e, PHI, 2008.