Syllabus B.tech Third Year
Syllabus B.tech Third Year
SYLLABUS
(B. Tech. Third Year)
S. Subject Title of the L T P S Total C Minor E Major E Inter Minor Major Total
N Code Subject Periods Duratio Duration nal Marks Marks Marks
o /week n (Hours) Marks (I+II)
(Hours)
S. Subject Title of the L T P S Total C Minor E Major E Inter Minor Major Total
N Code Subject Periods Duratio Duration nal Marks Marks Marks
o /week n (Hours) Marks (I+II)
(Hours)
COURSE OBJECTIVES
COURSE CONTENTS
Unit-I
8085 Architecture: Introduction to microprocessors and microcontrollers, 8085 Processor Architecture,
Internal operations, Instructions and timings, Programming the 8085 – Introduction to 8085 instructions,
addressing modes and Programming techniques with Additional instruction.
Unit-II
Stacks and subroutines, interfacing peripherals - Basic interfacing concepts, interfacing output displays,
interfacing input keyboards. Interrupts - 8085 Interrupts, Programmable Interrupt Controller (8259A).
Direct Memory Access (DMA) – DMA Controller (Intel 8257), Interfacing 8085 with Digital to Analog
and Analog to Digital converters.
Unit-III
Programmable peripheral interface (Intel 8255A), Programmable communication interface (Intel 8251),
Programmable. Interval timer (Intel 8253 and 8254), Programmable Keyboard / Display controller (Intel
8279). Serial and parallel bus standards RS 232 C, IEEE 488.
Unit-IV
Introduction to Microcontrollers, 8051 – Architecture – Instruction set, Addressing modes and
Programming Techniques. Comparison of various families of 8-bit micro controllers. System Design
Techniques Interfacing of LCD, ADC, Sensors, Stepper motor, keyboard and DAC using microcontrollers
Communication standards – serial RS232 and USB
Unit-V
Microprocessor Applications and trends in microprocessor Technology – 8-bit, 16-bit and 32-bit
microprocessors. Advanced Processor Architecture – Register structure, Instruction set, Addressing modes
of 8086.Features of advanced microprocessors.80386, 80486, Pentium and Multi-Core Processors.
SUGGESTED BOOKS
1. “Microprocessor Architecture, Programming, and Applications with the 8085” by R Gaonkar
2. “The 8051 Microcontroller and Embedded Systems : Using Assembly and C” by Muhammad Ali
Mazidi
3. “Introduction to Microprocessors and Microcontrollers” by Crisp John Crisp
4. “Microprocessors And Microcontrollers” by A Nagoor Kani
Barry B. Brey, The Intel Microprocessor, 8086/8088,8018/80188, 80286, 80386, 80486, Pentium
and Pentium pro-processors – architecture, Programming and interfacing, 4 Edition, Prentice Hall
1993.
COURSE OUTCOMES
List and specify the various features of microprocessor, memory and I/O devices including
concepts of system bus.
Identify the various elements of 8085 microprocessor architecture, its bus organization including
control signals.
List the pin functions of the 8085 microprocessor.
Describe the 8085 processor addressing modes, instruction classification and function of each
instruction and write the assembly language programs using 8085 instructions.
Explain the concepts of memory and I/O interfacing with 8085 processor with Programmable
devices.
List and describe the features of advance microprocessors.
COURSE OBJECTIVES
To understand the theory and practice of compiler implementation.
To learn finite state machines and lexical scanning.
To learn context free grammars, compiler parsing techniques, construction of abstract syntax
trees, symbol tables, intermediate machine representations and actual code generation
COURSE CONTENTS
Unit I: Introduction
Issues related to programming Language Design, Issues related to Finite-State Machines, Phases of
Compiler Design, Lexical Analysis, Error Detection and Recovery.
LL(1) Grammars, Recursive Descent Parsers, LR Grammars – Concepts and Terminology, LR(O)
Parsers, SLR(1) Parsers, Canonical LR(1) Parsers, LALR(1) Parsers, using ambiguous grammar.
Attributed Translation Grammar, L-Attributed Translation Grammar.
SDT Schemes, Implementation of SDTs, Intermediate Code, Parse Trees and Syntax Trees. Three
Address Code, Quadruples and Triples. Translation schemes for Declarations, Assignment statements,
Boolean Expressions, Flow of control statements, Array references in Arithmetic Expressions, Procedure
Calls, Case Statements, and |Structures.
When to construct and Interact with the symbol Table, Symbol-Table Contents, Operations on symbol
Table. Symbol Table organizations for Block – Structured Languages.
Static Storage Allocation, Dynamic Storage Allocation, Heap Storage Allocation, Garbage Collection and
Compaction.
Object programs, Problems Code Generation, A simple Code Generator. Register Allocation and
Optimization, Code Generation from DAG, PEECPhole optimization.
Recommended Books:
1. Principles of Compiler Design; A. V. Aho & J. D. Ullman Narosa
2. The Theory and Practice of Compiler Writing, J Tremblay and Paul G. S.
COURSE OUTCOMES
To apply the knowledge of Lex tool & Yacc tool to develop a scanner & parser.
To design & conduct experiments for Intermediate Code Generation in compiler.
To design & implement a software system for backend of the compiler.
To deal with different translators.
To develop program to solve complex problems in compiler
To learn the new code optimization techniques to improve the performance of a program in terms
of speed & space.
To acquire the knowledge of modern compiler & its features.
To learn & use the new tools and technologies used for designing a compiler
To use the knowledge of patterns, tokens & regular expressions for solving a problem in the field
of data mining.
COURSE OBJECTIVES
A strong understanding of basic Java programming elements and data abstraction using problem
representation and the object-oriented framework.
As the saying goes, “A picture is worth a thousand words.” This course will use sample objects
such as photos or images to illustrate some important concepts to enhance understanding and
retention.
Student will learn to write procedural programs using variables, arrays, control statements, loops,
recursion, data abstraction and objects in an integrated development environment.
COURSE CONTENTS
The Traditional approach, drawback of procedure oriented languages, the three basic constructs of OOPS
including abstraction and encapsulation, inheritance and polymorphism, comparison of various object
oriented languages, Need of java, The creation of java, Basic differences of java and c++, byte code,
difference between JDK, JRE, JVM, java applets and applications, java buzzword, three basic constructs
of oops applicable to java.
Classification of various data types used in java(including Integer, float, characters, Boolean), closer look
at the literals used in java, defining and initialization of variables, type conversion and casting, automatic
type promotions in expressions, arrays(one dimensional and multidimensional).
Arithmetic operators, bitwise operators, relational operators, Boolean logical operators, assignment
operator, ? Operator, operator precedence, java’s selection statement (if, switch statement), iteration
statement(while, do-while, for, nested loops) Jump statement (break, continue).
Class fundamentals, declaring objects, assigning object to reference variables, constructors (default and
parameterized), this keyword, garbage collection, finalize keyword, method introduction and returning a
value from a method, overloading method, overloading constructor, object as parameter, returning objects,
recursion, understanding static keyword, final keyword, introduction to inner and nested classes, exploring
String class, using command line argument.
Inheritance basic, use of super, method overriding, abstract class, Object class, defining a package, access
protection, importing a package, introduction to interface, defining a interface, applying a interface,
variables in interface, extension of interface, fundamentals of Exception handling, types of exception, use
AAC / BoS Approval: DD-MM-YYYY Page 8 of 27
School of Computer Science & Engineering
SYLLABUS of B. Tech (2015 Batch)
of try and catch, nested try block, throw, throws, finally keywords, java’s built in exception, creating your
own exception.
The java thread model, thread priorities, synchronization, crating a thread, creating multiple thread, using
is Alive() and join(),Synchronization in multiple thread, I/O basics, streams(byte and character), reading
and writing console input and output, Reading and writing files.
Applet fundamentals, applet architecture, Applet skeleton, passing parameter to applet, Delegation event
model, Exploring all Event Classes, Event Listener interface, Adapter class, Anonymous inner class,
Window fundamentals, working with frame window, working with graphics, working with color, fonts,
layout managers, using of buttons, checkbox, choice lists, lists, scroll bar, text fields, text area, menu bars
and menus, and handling the corresponding events generated by above components.
Recommended Books:
COURSE OUTCOMES
Write, compile, and execute Java programs using J2SE or other Integrated Development
Environments (IDEs) such as Eclipse, NetBeans, and JDeveloper.
Write, compile and execute Java programs using object oriented class structures with parameters,
constructors, and utility and calculations methods, including inheritance, test classes and
exception handling.
Write, compile, and execute Java programs using arrays and recursion.
Write, compile, and execute Java programs manipulating Strings and text documents.
Write, compile, execute Java programs that include GUIs and event driven programming
COURSE OBJECTIVES
COURSE CONTENTS
The course aims to provide an understanding of the diverse branches of AI through a discussion of its
theoretical foundations. At the end of the course the students shall have in-depth understanding of
different knowledge representation formalisms and various techniques used for "reasoning" and "theorem
proving".
Unit I: Introduction
AI History and applications. Overview of AI application areas: game playing, automated reasoning and
theorem proving, expert systems, natural language understanding, planning and robotics, machine learning
and Alan Turing Test.
Symbol and sentences, the semantics of the Propositional Calculus & Predicate Calculus. Inference Rules
and Theorem Proving. Axioms, Literals, Horn clause & Clausal forms.
Inductive, Deductive, Abductive and Default reasoning. More examples on Resolution proof.
Structures and strategies for state space search. Algorithms for Heuristic search, Heuristic evaluation
functions.
An overview of the induction methods, types and tools. Stages in Knowledge acquisition with examples.
Analyzing, coding, documenting and diagramming. Scope of knowledge.
Overview of expert system technology; rule-based expert systems; Construction of ES. Components of an
ES, The explanation facility, Rule-based formation and forward and backward chaining techniques for
problem solving.
Introduction. Vocabulary and issues, How NLP programs work, Natural Language application, NL
Interfaces.
Recommended Books:
2. Artificial Intelligence: Strategies and techniques for complex problems solving by George Luger,
Addison-Wesley, 2003.
3. Artificial Intelligence - A Modern Approach by Stuart Russell & Peter Norvig, Prentice Hall.
COURSE OUTCOMES
To understand the basics of Artificial Intelligence , Intelligent Agents and its structure
To understand the problem solving by various searching techniques
To understand the concept of informed search and Exploration
To understand the concept of constraint satisfaction Problems and Adversarial Search
To Understand what is Reasoning and Knowledge Representation
To understand the concept of Reasoning with Uncertainty & Probabilistic Reasoning
To Understand the basic forms of Machine Learning, decision trees and statistical
Learning setting.
COURSE OBJECTIVES
Unit I: Introduction
Notion of an Algorithm – Fundamentals of Algorithmic Problem Solving – Important Problem Types –
Fundamentals of the Analysis of Algorithm Efficiency – Analysis Framework – Asymptotic
Notations and its properties – Mathematical analysis for Recursive and Non-recursive algorithms.
Text Books:
COURSE OUTCOMES
Students who complete the course will have demonstrated the ability to do the following:
Analysis of Algorithms: computational models, order notation, time and space complexities,
worst-case and expected complexities, lower and upper bounds, Amortized cost
Techniques for designing efficient algorithms: recursion, divide-and-conquer, dynamic
programming, balancing and backtracking
Problems on sets and sequences: merging, sorting, searching, and selection (including
external memory)
Graph/Network algorithms
String matching algorithms
Optimization algorithms LP, IP, SDP
Tractable and intractable problems: The classes of P, NP and NP-Complete problems
Approximation algorithms
Spectral algorithms
COURSE CONTENTS
Suggested Books
1. Adobe Experience Manager: A practioners guide – V ilango, Vishwanath C R, Vandana, Shiva
Balan, 2017
2. Adobe Experience Manager: Classroom in a Book – Ryan D Lunka, 2014, Adobe Press.
3. Adobe Experience Manager: Quick Reference Guide, Shane closer, 2014, Adobe Press.
4. Digital Marketing Handbook, Shivani karwal, 2015, Create Space Independent Publishing
Platform
COURSE OUTCOMES
After successful completion of this course, students shall be able to;
COURSE OBJECTIVES
1. To understand what Internet of Things is.
2. To get basic knowledge of RFID Technology, Sensor Technology and Satellite
Technology.
3. To make students aware of resource management and security issues in Internet of
Things.
COURSE CONTENTS
Unit I: Introduction
What is the Internet of Things? : History of IoT, About IoT, Overview and
Motivations, Examples of Applications, Internet of Things Definitions and
Frameworks : IoT Definitions, IoT Architecture, General Observations, ITU-T Views,
Working Definition, IoT Frameworks, Basic Nodal Capabilities
Wireless Sensor Networks: History and context, WSN Architecture, the node,
Connecting nodes, Networking Nodes, Securing Communication
Suggested Books
1. Daniel Minoli, “Building the Internet of Things with IPv6 and MIPv6: The Evolving
World of
M2M Communications”, ISBN: 978-1-118-47347-4, Willy Publications
2. Bernd Scholz-Reiter, Florian Michahelles, “Architecting the Internet of
Things”, ISBN 978-3-642-19156-5 e-ISBN 978-3-642-19157-2, Springer
COURSE OUTCOMES
COURSE OBJECTIVES
The course is designed to provide Basic knowledge of Python. Python programming is intended for
software engineers, system analysts, program managers and user support personnel who wish to learn the
Python programming language.
COURSE CONTENTS
Unit -1
Unit 2
Learn the basic constructs of Python programming, create a program that plays a variant of Rock –Paper-
Scissors.
Unit 3
Learn the basics of event driven programming, understand difference Local and global variables, create an
interactive progam that plays a simple guessing game.
Unit 4
Create a canvas in Python ,learn how to draw on the canvas ,create a digital stopwatch.
Unit 5
Learn the basics of lists in python ,model moving objects in python ,recreate the classic arcade game
“Pong”.
Text Books:
3. How to think like a computer Scientist,by Brad Miller and David Ranum.
Online Version
www.interactivepython.org/runstone/static/thinkscpy/index.html.
COURSE OUTCOMES
COURSE OBJECTIVES
Graduates are effective team members, aware of cultural diversity, who conduct themselves
ethically and professionally.
Use effective communication skills and technical skills to assure production of quality software,
on time and within budget.
Build upon and adapt knowledge of science, mathematics, and engineering to take on more
expansive tasks that require an increased level of self-reliance, technical expertise, and leadership.
COURSE CONTENTS
Unit I: Introduction
The role of Software, Software Characteristics, Industrial strength software, Classification of software
products, Legacy Software, Software Engineering Challenges, Software Development Life Cycle.
Software Development Process Models: Waterfall, Prototyping, Iterative, Spiral. Comparison of Models,
Project Management Process, Inspection Process, Software Configuration management Process,
Requirements Change management Process, Agile Process.
Feasibility study: Technical, Economic & Behavioral; Data Gathering: Sources of Data, Observation,
Interviewing, Questioners, On-site Observation, Software Process & Characteristics, Software
Requirements, Problem Analysis: Data Flow Modeling, Object Oriented Modeling, Prototyping, Cost
Benefit Analysis, SRS, Developing Use Cases. Validation & Metrics
Effort Estimation: Constructive Cost Model (COCOMO), Project Scheduling, SCM planning, Quality
Planning, Risk Management, Project Monitoring Planning
Design Concepts & Principles, Cohesion, Coupling, Design Methodology, Introduction to Unified
Modeling Language (UML), Verification, Metrics
Software Reliability & Metrics, ISO 9000 Standard, Capability Maturity Model, CASE Tools, User
Training, Software Maintenance
Recommended Books:
COURSE OUTCOMES
The following are the Software Engineering Student Outcomes describing what students are expected to
know or be able to do by the time of graduation from the program:
COURSE OBJECTIVES
COURSE CONTENTS
Unit I
Artificial Neural Network
Introduction – Fundamental concept – Evolution of Neural Networks – Basic Models of Artificial Neural
Networks – Important Terminologies of ANNs – McCulloch-Pitts Neuron – Linear Separability – Hebb
Network. Supervised Learning Network: Perceptron Networks – Adaline – Multiple Adaptive Linear
Neurons – Back-Propagation Network – Radial Basis Function Network.
Unit II
Artificial Neural Network Associative Memory Networks: Training Algorithms for Pattern Association
– Autoassociative Memory Network – Heteroassociative Memory Network – Bidirectional Associative
Memory – Hopfield Networks – Iterative Autoassociative Memory Networks – Temporal Associative
Memory Network. Unsupervised Learning Networks: Fixed weight Competitive Nets – Kohonen Self-
Organizing Feature Maps – Learning Vector Quantization – Counter propagation Networks – Adaptive
Resonance Theory Networks – Special Networks.
Unit III
Fuzzy Set Theory Introduction to Classical Sets and Fuzzy sets
Classical Relations and Fuzzy Relations – Tolerance and Equivalence Relations – Noninteractive Fuzzy
sets – Membership Functions: Fuzzification – Methods of Membership Value Assignments –
Defuzzification – Lambda-Cuts for Fuzzy sets and Fuzzy Relations – Defuzzification Methods.
Unit IV
Fuzzy Set Theory
Fuzzy Arithmetic and Fuzzy Measures: Fuzzy Rule Base and Approximate Reasoning: Truth values and
Tables in Fuzzy logic – Fuzzy Propositions – Formation of Rules – Decomposition and Aggregation of
rules – Fuzzy Reasoning – Fuzzy Inference Systems (FIS) – Fuzzy Decision Making – Fuzzy Logic
Control Systems.
Unit V
(Genetic Algorithm) Introduction – Basic Operators and Terminologies in GAs – Traditional
Algorithm vs. Genetic Algorithm – Simple GA – General Genetic Algorithm – The Scheme Theorem –
Classification of Genetic Algorithm – Holland Classifier Systems – Genetic Programming. Applications
of Soft Computing: A Fusion Approach of Multispectral Images with SAR Image for Flood Area Analysis
– Optimization of Travelling Salesman Problem using Genetic Algorithm Approach – Genetic Algorithm
based Internet Search Technique – Soft Computing based Hybrid Fuzzy Controllers – Soft Computing
based Rocket Engine – Control.
Text Book:
S.N. Sivanandan and S.N. Deepa, Principles of Soft Computing, Wiley India, 2007. ISBN: 10: 81-265-
1075-7.
Reference Books:
S. Rajasekaran and G.A.V.Pai, Neural Networks, Fuzzy Logic and Genetic Algorithms, PHI, 2003.
Timothy J.Ross, Fuzzy Logic with Engineering Applications, McGraw-Hill, 1997. 3. J.S.R.Jang, C. T.Sun
and E.Mizutani, Neuro-Fuzzy and Soft Computing, PHI, 2004, Pearson Education.
COURSE OUTCOMES
COURSE OBJECTIVES
COURSE CONTENTS
Unit 1
Brief Introduction to Machine Learning
Supervised Learning
Unsupervised Learning
Reinforcement Learning
Unit 2
Probability Basics
Linear Algebra
Statistical Decision Theory – Regression & Classification
Bias – Variance
Linear Regression
Multivariate Regression
Unit 3
Dimensionality Reduction
Subset Selection, Shrinkage Methods, Principle Components Regression
Linear Classification, Logistic Regression, Linear Discriminant Analysis
Optimization, Classification-Separating Hyperplanes Classification
Unit 4
Artificial Neural Networks (Early models, Back Propagation, Initialization, Training & Validation)
Parameter Estimation (Maximum Likelihood Estimation, Bayesian Parameter Estimation)
Decision Trees
Evaluation Measures, Hypothesis Testing
Ensemble Methods, Graphical Models
Unit 5
Clustering, Gaussian Mixture Models, Spectral Clustering
Ensemble Methods
Learning Theory, Reinforcement Learning
Suggested Books
COURSE OUTCOMES
Identify the characteristics of datasets and compare the trivial data and big data for various
applications.
Understand machine learning techniques and computing environment that are suitable for the
applications under consideration .
Solve problems associated with batch learning and online learning, and the big data characteristics
such as high dimensionality, dynamically growing data and in particular scalability issues.
Develop scaling up machine learning techniques and associated computing techniques and
technologies for various applications.
Implement various ways of selecting suitable model parameters for different machine learning
techniques.
Integrate machine learning libraries, and mathematical and statistical tools with modern
technologies like hadoop distributed file system and mapreduce programming model
COURSE OBJECTIVES
Extensive, detailed and critical understanding of the concepts, issues, principles and theories of
computer network security
Detailed and practical understanding of formalisms for specifying security related properties and
validating them using model checking
Critical theoretical and detailed practical knowledge of a range of computer network security
technologies as well as network security tools and services
Practical experience of analysing, designing, implementing and validating solutions to computer
network security challenges using common network security tools and formal methods.
COURSE CONTENTS:
Unit I
Attacks on computers and computer security, need for security, approaches , principles, types of attacks
,operational model of network security, Cryptography concepts and techniques, substitution transposition,
encryption and decryption, symmetric ,Asymmetric key cryptography, key range size, possible type of
attacks
Unit II
Mathematics of cryptography and DES Block ciphers modes, feistel ciphers DES. working of DES
,cracking des ,problems on des., 2DES, 3DES, des design ,Side channel attacks, Differential
cryptanalysis.
Unit III
Symmetric-Key Cryptography: Glosis field theory, AES , overview of Rijndael comparison with others.
Symmetric ciphers ,Blowfish in practice ,RC4, RC5,RC6,IDEA, RSA
Unit IV
Asymmetric-Key Cryptography: RSA, Elliptic curve cryptography ECC,Digital certificates and PKI.
Unit V
Cryptographic Hash Functios: Hashing schemes SHA- family, MAC, Digital Signature RSA El Gomel ,
DSS DSA, Authentication Protocols , applications Kerberos, X.509 Directory services
Unit VI
Network Security: Internet security protocols , SSL,TLS TSP WAP security, SET Hashing Authentication
& Signature Schemes E-mail security, Email architecture SSL, PGP, MIME, S/MIME
Internet Protocol Security ( IPSec) IPSec architecture, IPSec verses other layers security Mobile IPSec,
VPN, Web security SSL, TLS, SET etc
Unit VII
System Security: Intruders , types of attacks , protecting against Intruders honeypots, scanning and
analysis tools, Viruses and worms, types of viruses, protection, Firewall architecture implementing
firewalls , xml firewalls , Trusted systems , trusted system applications , multi level security, trusted
products.Security implementation, wireless security, securities in Adhoc-networks.
Suggested Books:
COURSE OUTCOMES
Understand the basic security services e.g. Authentication, Access Control, Confidentiality,
Integrity, and Non repudiation).
Understand the concepts of risk, threats, vulnerabilities and attack.
Know the important ethical and legal issues to consider in computer security.
Know the goals of end-to-end data security. [Familiarity]
Understand the role of random numbers and prime numbers in security.
Learn standard symmetric encryption algorithms[Assessment]
Learn the architecture for public and private key cryptography and how public key
infrastructure (PKI) supports network security.
Learn the methods of digital signature and encryption.
Learn key management and how key exchange protocols work.
Learn security protocols at different layers of Network layer hierarchy.
Learn futuristic cryptographic techniques like Eliptic Curve and quantum cryptography.
Learn the concept of trusted computing.
Learn the Web security Protocol.