4th Sem Syllabus
4th Sem Syllabus
OBJECTIVES: The objective of this course is to fulfill the needs of engineers to understand
applications of Numerical Analysis, Transform Calculus and Statistical techniques in order to
acquire mathematical knowledge and to solving wide range of practical problems appearing in
different sections of science and engineering. More precisely, the objectives are:
To introduce effective mathematical tools for the Numerical Solutions algebraic and
transcendental equations.
To enable young technocrats to acquire mathematical knowledge to understand Laplace
transformation, Inverse Laplace transformation and Fourier Transform which are used in
various branches of engineering.
To acquaint the student with mathematical tools available in Statistics needed in various
field of science and engineering.
Module 1: Numerical Methods – 1: (8 hours): Solution of polynomial and transcendental
equations – Bisection method, Newton-Raphson method and Regula-Falsi method. Finite
differences, Relation between operators, Interpolation using Newton’s forward and backward
difference formulae. Interpolation with unequal intervals: Newton’s divided difference and
Lagrange’s formulae.
Module 2: Numerical Methods – 2: (6 hours): Numerical Differentiation, Numerical integration:
Trapezoidal rule and Simpson’s 1/3rd and 3/8 rules. Solution of Simultaneous Linear Algebraic
Equations by Gauss’s Elimination, Gauss’s Jordan, Crout’s methods, Jacobi’s, Gauss-Seidal, and
Relaxation method.,
Module 3: Numerical Methods – 3: (10 hours): Ordinary differential equations: Taylor’s series,
Euler and modified Euler’s methods. RungeKutta method of fourth order for solving first and
second order equations. Milne’s and Adam’s predicator-corrector methods. Partial differential
equations: Finite difference solution two dimensional Laplace equation and Poission equation,
Implicit and explicit methods for one dimensional heat equation (Bender-Schmidt and Crank-
Nicholson methods), Finite difference explicit method for wave equation.
Module 4: Transform Calculus: (8 hours): Laplace Transform, Properties of Laplace Transform,
Laplace transform of periodic functions. Finding inverse Laplace transform by different methods,
convolution theorem. Evaluation of integrals by Laplace transform, solving ODEs by Laplace
Transform method, Fourier transforms.
Module 5: Concept of Probability: (8 hours): Probability Mass function, Probability Density
Function, Discrete Distribution: Binomial, Poisson’s, Continuous Distribution: Normal
Distribution, Exponential Distribution.
Textbooks/References:
1. P. Kandasamy, K. Thilagavathy, K. Gunavathi, Numerical Methods, S. Chand & Company, 2nd
Edition, Reprint 2012.
2. S.S. Sastry, Introductory methods of numerical analysis, PHI, 4th Edition, 2005.
3. Erwin kreyszig, Advanced Engineering Mathematics, 9th Edition, John Wiley & Sons, 2006.
4. B.S. Grewal, Higher Engineering Mathematics, Khanna Publishers, 35th Edition, 2010.
5. N.P. Bali and Manish Goyal, A text book of Engineering Mathematics, Laxmi Publications,
Reprint, 2010.
6. Veerarajan T., Engineering Mathematics, Tata McGraw-Hill, New Delhi, 2008.
7. P. G. Hoel, S. C. Port and C. J. Stone, Introduction to Probability Theory, Universal Book Stall,
2003 (Reprint).
8. S. Ross, A First Course in Probability, 6th Ed., Pearson Education India, 2002.
9. W. Feller, An Introduction to Probability Theory and its Applications, Vol. 1, 3rd Ed., Wiley,
1968. Statistics
RAJIV GANDHI PROUDYOGIKI VISHWAVIDYALAYA, BHOPAL
Course Objectives
Data structure includes analyzing various algorithms along with time and space complexities. It also
helps students to design new algorithms through mathematical analysis and programming.
Unit-I Algorithms, Designing algorithms, analyzing algorithms, asymptotic notations, heap and heap sort.
Introduction to divide and conquer technique, analysis, design and comparison of various algorithms
based on this technique, example binary search, merge sort, quick sort, strassen’s matrix multiplication.
Unit-II Study of Greedy strategy, examples of greedy method like optimal merge patterns, Huffman
coding, minimum spanning trees, knapsack problem, job sequencing with deadlines, single source
shortest path algorithm, etc.
Unit-III Concept of dynamic programming, problems based on this approach such as 0/1 knapsack,
multistage graph, reliability design, Floyd-Warshall algorithm, etc.
Unit-IV Backtracking concept and its examples like 8 queen’s problem, Hamiltonian cycle, Graph coloring
problem etc. Introduction to branch & bound method, examples of branch and bound method like
traveling salesman problem etc. Meaning of lower bound theory and its use in solving algebraic
problem, Introduction to parallel algorithms.
Unit-V Binary search trees, height balanced trees, 2-3 trees, B-trees, basic search and traversal
techniques for trees and graphs (In order, preorder, postorder, DFS, BFS), NP-completeness.
Course Outcomes:
At the end of the course student will be able to :
1 Implement sorting and searching algorithm
2 Experiment with techniques for obtaining maximum output with minimum efforts
4 Solve 8 queen’s problem and others of the kind for application in real world scenarios .
5 Distinguish between NP hard and NP complete problems and develop their solutions
Reference Books:-
Objectives: Students to be familiarize the basic principles of computer architecture, Design and
Multi Processing, Types of data transfer, Concept of semi conductor memories which is useful for
research work in field Computer System.
Reference Books:
1.Morris Mano , “Computer System Organization ”PHI
2.Alan Clements: “Computer Organization and Architecture”, Cengage Learning
3.Subrata Ghosal: “Computer Architecture and Organization”, Pearson
4.William stalling ,“Computer Architecture and Organization” PHI
5.M. Usha, T.S. Shrikant: “Computer System Architecture and Organization”, Willey India
6.Chaudhuri, P.Pal: “Computer Organization and Design”, PHI
7.Sarangi: “Computer Organization and Architecture”,Mc-Graw Hills
Computer Org.& Architecture (List of Practicals)
1. Study of Multiplexer and Demultiplexer
2. Study of Half Adder and Subtractor
3. Study of Full Adder and Subtractor
4. WAP to add two 8 bit numbers and store the result at memory location 2000
5. WAP to multiply two 8 bit numbers stored at memory location 2000 and 2001 and stores
the result at memory location 2000 and 2001.
6. WAP to add two 16-bit numbers. Store the result at memory address starting from 2000.
7. WAP which tests if any bit is '0' in a data byte specified at an address 2000. If it is so, 00
would be stored at address 2001 and if not so then FF should be storedat the same address.
8. Assume that 3 bytes of data are stored at consecutive memory addresses of the data
memory starting at 2000. Write a program which loads register C with (2000), i.e. with data
contained at memory address2000, D with (2001), E with (2002) and A with (2001).
9. Sixteen bytes of data are specified at consecutive data-memory locations starting at 2000.
Write a program which increments the value of all sixteen bytes by 01.
10. WAP to add t 10 bytes stored at memory location starting from 3000. Store the result at
memory location 300A
RAJIV GANDHI PROUDYOGIKI VISHWAVIDYALAYA, BHOPAL
Unit-I Basic Concepts: Introduction to DBMS, File system vs DBMS, Advantages of database
systems, Database System architecture, Data models, Schemas and instances, Data
independence, Functions of DBA and designer, Entities and attributes, Entity types, Key
attributes, Relationships, Defining the E-R diagram of database.
Unit-III SQL: Data definition in SQL, update statements and views in SQL: Data storage and
definitions, Data retrieval queries and update statements, Query Processing & Query
Optimization: Overview, measures of query cost, selection operation, sorting, join, evaluation of
expressions, transformation of relational expressions, estimating statistics of expression results,
evaluation plans. Case Study of ORACLE and DB2.
Unit-IV Relational Database design: Functional Dependency –definition, trivial and non-trivial
FD, closure of FD set, closure of attributes, irreducible set of FD, Normalization –1NF, 2NF,
3NF, Decomposition using FD-dependency preservation, lossless join, BCNF, Multi-valued
dependency, 4NF, Join dependency and 5NF
Course Outcomes:
After successful completion of this course, the students would be able to:
1. Compare file system and DBMS and explain how DBMS is better than traditional File
Processing Systems.
2. Analyze the physical and logical database designs, database modeling, relational,
hierarchical, and network models
3. Analyze and renovate an information model into a relational database schema and to use a
DDL, DML and DCL utilities to implement the schema using a DBMS.
4. Formulate data retrieval queries in SQL and Relational Algebra.
5. Demonstrate an understanding of functional dependencies, normalization theory and
apply such knowledge to the design of a database.
6. Demonstrate and explain terms like Transaction Processing, Concurrency Control,
distributed database and big data.
Reference Books:
1. Korth, Silbertz, Sudarshan, “Database Concepts”, McGraw Hill.
2. Elmasri, Navathe, “Fundamentals of Database Systems”, Pearson.
3. Ivan Bayross, “SQL, PL/SQL the Programming Language of Oracle”, BPB publications.
4. S. Sharma, J. Agrawal, S. Agrawal, “Advanced Database Management System”,
Dreamtech Press.
5. Leon & Leon, “Fundamental of Data Base Management System”, TMH
List of Experiments:
1. To perform various SQL Commands of DDL, DML, DCL.
2. Write SQL Commands such as Insertion, deletion and updation for any schema.
3. To execute Nested Queries, Join Queries, order-by, having clause and string operation.
4. To perform set operators like Union, Intersect, Minus on a set of tables.
5. To execute various commands for GROUP functions (avg, count, max, min, Sum).
6. Write a PL/SQL block for transaction application using Triggers.
7. Write a DBMS program to prepare report for an application using function.
8. Designing of various Input screens/Forms.
9. Create reports using database connectivity of Front end with back end.
10. Create database Design with normalization and implementing in any application.
RAJIV GANDHI PROUDYOGIKI VISHWAVIDYALAYA, BHOPAL
Installing ASP.NET framework, overview of the ASP .net framework, overview of CLR, class
library, overview of ASP.net control, understanding HTML controls, study of standard
controls, validations controls, rich controls. Windows Forms: All about windows form, MDI
form, creating windows applications, adding controls to forms, handling Events, and using
various Tolls
Understanding and handling controls events, ADO.NET- Component object model, ODBC,
OLEDB, and SQL connected mode, disconnected mode, dataset, data-reader Data base
controls: Overview of data access data control, using grid view controls, using details view and
frame view controls, ado .net data readers, SQL data source control, object data source
control, site map data source.
XML: Introducing XML, Structure, and syntax of XML, document type definition (DTD), XML
Schema, Document object model, Presenting and Handling XML. xml data source, using
navigation controls, introduction of web parts, using java script, Web Services
References:
1. C# for Programmers by Harvey Deitel, Paul Deitel, Pearson Education
2. Balagurusamy; Programming in C#; TMH
3. Web Commerce Technology Handbook by Daniel Minoli, Emma Minoli , TMH
4. Web Programming by Chris Bates, Wiley
5. Alex Mackey, “ Introduction.NET 4.5 “, Wiley India
6. ASP .Net Complete Reference by McDonald, TMH.
7. ADO .Net Complete Reference by Odey, TMH
Unit II
Application Security- Data Security, Security Technology-Firewall and VPNs, Intrusion
Detection, Access Control. Security Threats -Viruses, Worms, Trojan Horse, Bombs, Trapdoors,
Spoofs, E-mail Viruses, Macro Viruses, Malicious Software, Network and Denial of Services
Attack, Security Threats to E-Commerce- Electronic Payment System, e- Cash, Credit/Debit
Cards.
Unit III
Cryptrography concepts and Techniques
Plain text , cipher text, types – substitution ,transposition ,encryption, decryption , symmetric
and asymmetric key cryptography algorithms, steganography .
Unit IV
Security Policies- Development of Policies, WWW Policies, Email Security Policies, Policy Review
Process-Corporate Policies-Sample Security Policies, Publishing and Notification Requirement of
the Policies.
Unit V
Information Security Standards-ISO, IT Act, Copyright Act, Patent Law, IPR. Cyber Laws in India;
IT Act 2000 Provisions, Intellectual Property Law: Copy Right Law, Software License,
Semiconductor Law and Patent Law.
Case Study – Corporate Security , Cyber cases
References: