Engineering Mathematics-Iv: This Course Will Enable Students To
Engineering Mathematics-Iv: This Course Will Enable Students To
Subject Code
SEMESTER - III
IA Marks
15MAT41
20
04
Exam Marks
80
50
Exam Hours
03
CREDITS - 04
Understand mathematics fundamentals necessary to formulate, solve and analyze engineering problems
Understand and apply Numerical methods to solve ordinary differential equations
Understand and use Finite difference method to solve partial differential equations
Perform Complex analysis
Understand and use of Sampling theory
Understand and apply Joint probability distribution and stochastic process
Module -1
Teaching RBT
Hours
Levels
Numerical Methods: Numerical solution of ordinary differential equations of first
order and first degree, Picards method, Taylors series method, modified Eulers
method, Runge - Kutta method of fourth order. Milnes and Adams-Bashforth predictor
and corrector methods (No derivations of formulae). Numerical solution of
simultaneous first order ordinary differential equations, Picards method, Runge-Kutta
method of fourth order
Module -2
10Hours
L1, L2,
L3, L4
L1, L2,
L3, L4
Module - 3
Complex Variables: Function of a complex variable, limits, continuity, 10 Hours
differentiability,. Analytic functions-Cauchy-Riemann equations in Cartesian and polar
forms. Properties and construction of analytic functions. Complex line integralsCauchys theorem and Cauchys integral formula, Residue, poles, Cauchys Residue
theorem with proof and problems. Transformations: Conformal transformations,
discussion of transformations:
and bilinear
transformations.
Module-4
L1, L2,
L3, L4
1|Page
L1, L2,
L3, L4
Module-5
Sampling Theory: Sampling, Sampling distributions, standard error, test of 10 Hours
hypothesis for means and proportions, confidence limits for means, students tdistribution, Chi-square distribution as a test of goodness of fit. Stochastic process:
Stochastic process, probability vector, stochastic matrices, fixed points, regular
stochastic matrices, Markov chains, higher transition probability.
L1, L2,
L3, L4
Course outcomes:
After studying this course, the students will be able to
Use appropriate numerical methods to solve first and second order ordinary differential equations.
Use Bessel's and Legendre's function which often arises when a problem possesses axial and spherical
symmetry, such as in quantum mechanics, electromagnetic theory, hydrodynamics and heat conduction.
State and prove Cauchys theorem and its consequences including Cauchy's integral formula, compute
residues and apply the residue theorem to evaluate integrals.
Analyze, interpret, and evaluate scientific hypotheses and theories using rigorous statistical methods .
1. Engineering Knowledge
2. Problem Analysis
3. Life-Long Learning
Conduct Investigations of Complex Problems
Question paper pattern:
The question paper will have ten questions.
There will be 2 questions from each module.
Each question will have questions covering all the topics under a module.
The students will have to answer 5 full questions, selecting one full question from each module.
Text Books:
1. N P Bali and Manish Goyal, "A text book of Engineering mathematics" , Laxmi publications, latest
edition.
2|Page
SOFTWARE ENGINEERING
[As per Choice Based Credit System (CBCS) scheme]
(Effective from the academic year 2015 -2016)
SEMESTER - III
IA Marks
15CS42
Subject Code
20
04
Exam Marks
80
50
Exam Hours
03
CREDITS - 04
Module -1
10Hours
L1, L2
Agile Software Development: Agile methods . Plan-driven and agile development. 10 Hours
Extreme programming. Agile project management. Scaling agile methods.
Requirements Engineering: Functional and non-functional requirements .The
software Requirements Document. Requirements Specification . Requirements
Engineering Processes. Requirements Elicitation and Analysis. Requirements
validation. Requirements Management.
Module - 3
L2, L3,
L4
System Models: Context models. Interaction models. Structural models. Behavioural 10 Hours
models. Model-driven engineering. Design and Implementation: Object-oriented
design using the UML. Design patterns. Implementation issues. Open source
development
L2, L3,
L4, L5
Module -2
Module-4
Software Testing: Development testing, Test-driven development, Release testing, 10 Hours
User testing. Software Evolution: Evolution processes .Program evolution dynamics.
Software maintenance. Legacy system management
L2, L3,
L4, L5
Module-5
3|Page
10
Hours
L2, L3,
L4, L5
Course outcomes:
After studying this course, the students will be able to
Design a system, component, or process to meet desired needs within realistic constraints.
Asses professional and ethical responsibility
function on multi-disciplinary teams
use the techniques, skills, and modern engineering tools necessary for engineering practice
Analyse, design, verify, validate, implement, apply, and maintain software systems.
Graduate Attributes (as per NBA)
1.
2.
3.
4.
4|Page
SEMESTER - III
Subject Code
15CS43
IA Marks
20
04
Exam Marks
80
50
Exam Hours
03
CREDITS - 04
10Hours
L1, L2,
Divide and Conquer: General method, Binary search, Recurrence equation for Divide 10 Hours
and Conquer, Finding the maximum and minimum, Quick sort, Merge sort, Strassens
matrix multiplication, Convex Hull, Closest-pair problem, Advantages and
Disadvantages of Divide and Conquer. Decrease and Conquer Approach: Topological
Sort
L2, L3,
L4, L5,
L6
Module -2
Module - 3
Greedy Method: General method, Coin Change Problem, Knapsack Problem, Job 10 Hours
sequencing with deadlines, Minimum cost spanning trees: Prims Algorithm, Kruskals
Algorithm. Single source shortest paths:Dijkstra's Algorithm. Optimal Tree problem:
Huffman Trees and Codes. Transform and Conquer Approach.
L2, L3,
L4, L5,
L6
Module-4
Dynamic Programming: General method, Multistage Graphs, All Pairs Shortest 10 Hours
Paths: Floyd's Algorithm, Optimal Binary Search Trees, 0/1-Knapsack problem,
Bellman-Ford Algorithm, Travelling Sales Person problem, Reliability design.
L2, L3,
L4, L5,
L6
Module-5
5|Page
10
Hours
L2, L3,
L4, L5,
L6
Course outcomes:
Asses the correctness of algorithms using inductive proofs and loop invariants.
Analyse and Compare the asymptotic behaviors of functions obtained by elementary composition of
polynomials, exponentials, and logarithmic functions.
Describe the relative merits of worst-, average-, and best-case analysis.
Describe, apply and analyse the different algorithm design techniques: divide-and-conquer, dynamic
programming, greedy paradigm, graph algorithms and their analysis.
Judge the applicability of appropriate method for solving real world problems
1.
2.
3.
4.
5.
Engineering Knowledge
Problem Analysis
Design/Development of Solutions
Conduct Investigations of Complex Problems
Life-Long Learning
1. Computer Algorithms/C++, Ellis Horowitz, SatrajSahni and Rajasekaran, 2nd edition, 2014, Universities
Press
2. Introduction to the Design and Analysis of Algorithms, AnanyLevitin:, 3rd Edition, 2012, Pearson
Reference Books:
1. Introduction to Algorithms, Thomas H. Cormen, Charles E. Leiserson, Ronal L. Rivest, Clifford Stein, 3rd
Edition, PHI
6|Page
Subject Code
SEMESTER - IV
IA Marks
15CS44
20
04
Exam Marks
80
50
Exam Hours
03
CREDITS - 04
10
L1,L2
Hours
x86: Instructions sets description, Arithmetic and logic instructions and 10 Hours
programs: Unsigned Addition and Subtraction, Unsigned Multiplication and
Division, Logic Instructions, BCD and ASCII conversion, Rotate Instructions.
INT 21H and INT 10H Programming : Bios INT 10H Programming , DOS
Interrupt 21H.8088/86 Interrupts, x86 PC and Interrupt Assignment.
Text book 1: Appendix B, Ch 3: 3.1 to 3.5, Ch 4: 4.1 , 4.2 Chapter 14:
14.1 and 14.2
L2, L3
Module - 3
7|Page
Signed Numbers and Strings: Signed number Arithmetic Operations, String 10 Hours
Operations. Memory and Memory interfacing: Memory address decoding,
data integrity in RAM and ROM, 16-bit memory interfacing.8255 I/O
programming: I/O address MAP of x86 PCs, programming and interfacing
the 8255.
L2,L3,
L4.L6
Module-4
Introduction to ARM: RISC and CISC Architectures, The ARM 10 Hours
Architecture: The Acorn RISC Machine, The ARM programmers model:
General purpose registers, CPSR, SPSR, ARM memory map, data format, load
and store architecture, ARM development tools. ARM Assembly language
Programming
L1, L2,
L3
10
Hours
L1, L2,
L3,L6
Text book 3: Ch 5.
Course outcomes:
After studying this course, the students will be able to
Differentiate microprocessors and microcontrollers
Design and develop 8086 assembly language code to solve problems
Gain the knowledge to interface various devices to ARM processor
Design and developing interrupts routines for interfacing devices
Graduate Attributes (as per NBA)
1. Engineering Knowledge
2. Modern Tool Usage
3. Design/Development of Solutions
4. Conduct Investigations of Complex Problems
Question paper pattern:
The question paper will have ten questions.
There will be 2 questions from each module.
Each question will have questions covering all the topics under a module.
The students will have to answer 5 full questions, selecting one full question from each module.
8|Page
Text Books:
1. Muhammad Ali Mazidi, Janice GillispieMazidi, Danny Causey, The x86 PC Assembly
Language Design and Interfacing, 5th Edition, Pearson, 2013.
2. ARM System-on-Chip Architecture, Steve Furber, Second Edition, Pearson, 2015
3. ARM System Developers Guide, Designing and Optimizing Software, Andrew N.
Sloss,Dominic Symes, Chris W wight, Elsevier, 2014
Reference Books:
1. Barry B Brey: The Intel Microprocessors, 8th Edition, Pearson Education, 2009.
2. Douglas V. Hall: Microprocessors and Interfacing, Revised 2nd Edition, TMH, 2006.
3. K. Udaya Kumar & B.S. Umashankar : Advanced Microprocessors & IBM-PC Assembly
Language Programming, TMH 2003.
4. The Definitive Guide to the ARM Cortex-M3, by Joseph Yiu, 2nd Edition , Newnes, 2009
9|Page
Subject Code
SEMESTER - III
IA Marks
15CS45
20
04
Exam Marks
80
50
Exam Hours
03
CREDITS - 04
Module -1
Teaching RBT
Hours
Levels
10Hours
L1,L2,
L4
Module -2
10 | P a g e
Arrays, Pointers, References, and the Dynamic Allocation Operators: Arrays of 10 Hours
Objects, Creating Initialized vs. Uninitialized Arrays , Pointers to Objects, Type
Checking C++ Pointers , The this Pointer, Pointers to Derived Types , Pointers to Class
Members , References, Reference Parameters, Passing References to Objects,
Returning References, Independent References, References to Derived Types,
Restrictions to References, A Matter of Style , C++'s Dynamic Allocation Operators
,Initializing Allocated Memory ,Allocating Arrays ,Allocating Objects ,The nothrow
Alternative ,The Placement Form of new.Function Overloading, Copy Constructors
and Default Arguments: Function Overloading, Overloading Constructors,
Overloading a Constructor to Gain Flexibility, Allowing Both Initialized and
Uninitialized Objects Copy Constructors , Finding the Address of an Overloaded
Function , The overload Anachronism, Default Function Arguments, Default
Arguments vs. Overloading, Function Overloading and Ambiguity.
L2,L3
Module - 3
Operator Overloading: Creating a Member Operator Function, Creating Prefix and 10 Hours
Postfix Forms, of the Increment and decrement Operators , Overloading the Shorthand
Operators, Operator Overloading Restrictions, Operator Overloading Using a Friend
Function,Using a Friend to Overload ++ or , Friend Operator Functions Add
Flexibility , Overloading new and delete, Overloading new and delete for Arrays,
Overloading the nothrow Version of new and delete, Overloading Some Special
Operators, Overloading [ ] , Overloading ( ), Overloading >, Overloading the Comma
Operator.Inheritances: Base-Class Access Control, Inheritance and protected
Members, Protected Base-Class Inheritance, Inheriting Multiple Base Classes,
Constructors, Destructors, and Inheritance, When Constructors and Destructors Are
Executed , Passing Parameters to Base-Class Constructors, Granting Access, Virtual
Base Classes.
L2,L3,
L4
Module-4
Virtual Functions and Polymorphism: Virtual Functions, Calling a Virtual Function 10 Hours
Through a Base, Class Reference, The Virtual Attribute Is Inherited, Virtual Functions
Are Hierarchical, Pure Virtual Functions, Abstract Classes, Using Virtual Functions,
Early vs. Late Binding. Templates: Generic Functions, A Function with Two Generic
Types, Explicitly Overloading a Generic Function, Overloading a Function Template,
Using Standard Parameters with Template Functions , Generic Function Restrictions ,
Applying Generic Functions, A Generic Sort, Compacting an Array, Generic Classes,
An Example with Two Generic Data Types, Applying Template Classes: A Generic
Array Class, Using Non-Type Arguments with Generic Classes, Using Default
Arguments with Template Classes, Explicit Class Specializations, The typename and
export Keywords, The Power of Templates .Exception Handling: Exception Handling
Fundamentals, Catching Class Types, Using Multiple catch Statements, Handling
Derived-Class Exceptions, Exception Handling Options, Catching All Exceptions,
Restricting Exceptions, Rethrowing an Exception, Understanding terminate( ) and
unexpected( ), Setting the Terminate and Unexpected Handlers, The
uncaught_exception( ) Function, The exception and bad_exception Classes Applying
Exception Handling.
L2,L3,
L6
Module-5
11 | P a g e
C++ I/O System Basics : Old vs. Modern C++ I/O, C++ Streams, The C++ Stream
Classes, C++'s Predefined Streams, Formatted I/O, Formatting Using the ios Members,
Setting the Format Flags, Clearing Format Flags,An Overloaded Form of setf( ),
Examining the Formatting Flags, Setting All Flags, Using width( ), precision( ), and
fill( ), Using Manipulators to Format I/O, Overloading << and >>, Creating Your Own
Inserters, Creating Your Own Extractors, Creating Your Own Manipulator Functions
C++ File I/O: fstream> and the File Classes, Opening and Closing a File, Reading and
Writing Text Files, Unformatted and Binary I/O, Characters vs. Bytes, put( ) and get( ),
read( ) and write( ), More get( ) Functions, getline( ) , Detecting EOF, The ignore( )
Function, peek( ) and putback( ), flush( ), Random Access, Obtaining the Current File
Position , I/O Status, Customized I/O and Files.
10
Hours
L2,L3
L5,L6
Course outcomes:
After studying this course, the students will be able to
1.
2.
3.
4.
Engineering Knowledge
Design/Development of Solutions
Modern Tool Usage
Conduct Investigations of Complex Problems
12 | P a g e
Subject Code
SEMESTER - III
IA Marks
15CS461
20
03
Exam Marks
80
40
Exam Hours
03
CREDITS - 03
Module -1
Teaching RBT
Hours
Levels
L1, L2
Module -2
Cybercrime: Mobile and Wireless Devices: Introduction, Proliferation of Mobile 08 Hours
and Wireless Devices, Trends in Mobility, Credit Card Frauds in Mobile and Wireless
Computing Era, Security Challenges Posed by Mobile Devices, Registry Settings for
Mobile Devices, Authentication Service Security,Attacks on Mobile/Cell
Phones,Mobile Devices: Security Implications for organizations, Organizational
Measures for Handling Mobile,Organizational Security Policies and Measures in
Mobile Computing Era, Laptops
L1, L2
Module 3
Tools and Methods Used in Cybercrime: Introduction, Proxy Servers and 08 Hours
Anonymizers, Phishing, Password Cracking, Keyloggers and Spywares, Virus and
Worms, Trojan Horses and Backdoors, Steganography, DoS and DDoS Attacks, SQL
Injection,
Buffer
Overflow,
Attacks
on
Wireless
Networks
Phishing and Identity Theft: Introduction, Phishing, Identity Theft (ID Theft)
L1, L2
0Module-4
13 | P a g e
L1, L2
Module-5
Introduction to Security Policies and Cyber Laws: Need for An Information
Security Policy, Information Security Standards ISO, Introducing Various Security
Policies and Their Review Process, Introduction to Indian Cyber Law, Objective and
Scope of the it Act, 2000, Intellectual Property Issues, Overview of Intellectual Property - Related Legislation in India, Patent, Copyright, Law Related to
Semiconductor Layout and Design, Software License.
08Hours
L1, L2
Course outcomes:
14 | P a g e
15 | P a g e
Subject Code
SEMESTER - III
IA Marks
15CS462
20
03
Exam Marks
80
40
Exam Hours
03
CREDITS - 03
Understand and apply graphs as a powerful modelling tool that can be used to solve practical problems
in various fields.
Illustrate the main concepts of graph theory, graph representations and the basic classes of graphs.
Identify induced sub graphs, cliques, matchings, covers in graphs
Solve famous graph associated problems.
Teaching RBT
Hours
Levels
08Hours
L1, L2
08 Hours
L2, L3
08 Hours
L1,L2,
L3
08 Hours
L2,L3,
L4
08 Hours
L2,L3,
L4
Module -2
Introduction to Graph Theory contd.: Planar Graphs, Hamilton Paths and Cycles,
Graph Colouring, and Chromatic Polynomials
Module - 3
Trees: Definitions, Properties, and Examples, Routed Trees, Trees and Sorting,
Weighted Trees and Prefix Codes
Module-4
Optimization and Matching: Dijkstras Shortest Path Algorithm, Minimal Spanning
Trees The algorithms of Kruskal and Prim, Transport Networks Max-flow, Mincut Theorem, Matching Theory.
Module-5
Graph Algorithms: Computer representation of Graphs, Basic algorithms: Spanning
Tree, Set of Fundamental circuits, cut-vertices and separability, planarity testing
Course outcomes:
16 | P a g e
1. Design/Development of Solutions
2. Modern Tool Usage
3. Problem Analysis
Question paper pattern:
The question paper will have ten questions.
There will be 2 questions from each module.
Each question will have questions covering all the topics under a module.
The students will have to answer 5 full questions, selecting one full question from each module.
Text Books:
1.Graph theory with Applications to Engineering and computer Science, NarasinghDeo, Prentice Hall
Reference Books:
17 | P a g e
PYTHON PROGRAMMING
[As per Choice Based Credit System (CBCS) scheme]
(Effective from the academic year 2015 -2016)
Subject Code
SEMESTER - III
IA Marks
15CS463
20
03
Exam Marks
80
40
Exam Hours
03
CREDITS - 03
08Hours
L1,L2
08Hours
L3,L5,
L6
08Hours
L2,
L3,L5,
L6
08Hours
L2,L5,
L6
Files and Exception Handling, Tuples, Sets, and Dictionaries, Recursion, programming
examples
Course outcomes:
08Hours
L2,L5,
L6
Module -2
Creating Python Programs, Selections, Loops, Functions. Programming examples
Module - 3
Functional programming, Objects and Classes, More on Strings and Special Methods,
GUI Programming Using Tkinter, Programming examples
Module-4
18 | P a g e
4. Design/Development of Solutions
5. Modern Tool Usage
6. Problem Analysis
Question paper pattern:
The question paper will have ten questions.
There will be 2 questions from each module.
Each question will have questions covering all the topics under a module.
The students will have to answer 5 full questions, selecting one full question from each module.
Text Books:
1. Y. Daniel Liang, Introduction to Programming Using Python, Pearson, ISBN:978-0-13-274718-9, 2013
2.Exploring Python, Timothy A. Budd, Indian edition, McGraw Hill education, ISBN-13: 978-0-07132122-8
Reference Books:
1. Kenneth A. Lambert , B.L Juneja , Fundamentals of Python Programming, Cengage Learning,ISBN:97881-315-2903-4, 2015
2. Charles Dierbach. Introduction to Computer Science Using Python: A Computational Problem-Solving
Focus, Wiley,ISBN:978-81-265-5601-4,2015
3. Allen B.Downey,Think Python,OReilly,First Edition,2012,ISBN:978-93-5023-863-9
19 | P a g e
Subject Code
20
03
Exam Marks
80
40
Exam Hours
03
CREDITS - 03
Teaching RBT
Hours
Levels
08Hours
L1,L2
08 Hours
L2,L3,
L6
08 Hours
L2,L3,
L6
08 Hours
L2,L3,
L6
08 Hours
L2,L3,
L6
Module -2
Parallel Hardware and Parallel Software: Some Background, Modifications to the von
Neumann Model, Parallel Hardware, Parallel Software, Input and Output, Performance,
Parallel Program Design, Writing and running Parallel Programs, Assumptions.
Module - 3
Distributed-Memory Programming with MPI: Getting Started, The Trapezoidal Rule in
MPI, Dealing with I/O, Collective Communication, MPI Derived Data types, Performance
Evaluation of MPI Programs, A Parallel Sorting Algorithm.
Module-4
Shared-Memory Programming with Pthreads: Processes, Threads, and Pthreads, Hello,
World, Matrix-Vector Multiplication, Critical Sections, Busy-Waiting, Mutexes, ProducerConsumer Synchronization and semaphores, barriers and Condition Variables, Read-Write
Locks, Caches, cache Coherence and False Sharing ,Thread Safety.
Module-5
Shared-Memory Programming with OpenMP: Getting Started, The Trapezoidal Rule,
Scpe of Variables, The Reduction Clause, More About Loops in OpenMp: Sorting,
Scheduling Loops, Producers and Consumers, Caches, Cache Coherence, and False
Sharing, Thread-Safety.
20 | P a g e
Course outcomes:
1.
2.
3.
4.
5.
Engineering Knowledge
Problem Analysis
Modern Tool Usage
Conduct Investigations of Complex Problems
Design/Development of Solutions
Reference Books:
1. B. Chapman, G. Jost, and Ruud van der Pas, Using OpenMP, MIT Press
21 | P a g e
SEMESTER - IV
Laboratory Code
15CSL47
IA Marks
20
01I + 02p
Exam Marks
80
40
Exam Hours
03
CREDITS - 02
Design and implement various algorithms studied in the theory class and to know the
performance
Descriptions (if any)
Design, develop and implement the specified algorithms for the following problems using
C++ Language under LINUX /Windows environment.
Experiment Lists:
1.
A. Create a structure called employee with the following details as variables within it.
1. Name of the employee
2. Age
3. Designation
4. Salary
Write a C++ program to create array of objects for the structure to access these and print the
name, age, designation and salary with suitable headings.
B. Write a C++ program to create three objects for a class named print_object with data members
such as roll_no&name. Create a member function set_data() for setting the data values and print()
member function to print which object has invoked it using this pointer
2.
A. Write a C++ program to define a Class called STRING containing two strings and overload
operator= = for comparing, operator+ for Concatenating, new and delete for allocating and
deallocating memory for STRING objects.
B. Write a C++ program to create an object of type class CIRCLE. Illustrate the constructor, the copy
22 | P a g e
classpolygon which has virtual function area(). Derive two classes rectangle and triangle from
polygon and implement area() to calculate and return the area of rectangle and
triangle respectively.
B. Write a C++ program to explain class template by creating a template T for a class named pair
having two data members of type T which are read through a constructor and a member function
get-max() return the greatest of two numbers to main. Note: the value of T depends upon the data
type specified during object creation
4.
Sort a given set of N integer elements using Quick Sort method and Compute its time complexity.
Run the program for varied values of N = 10, 20, 30, 40,50,60,,100, and record the time taken to
sort. Plot a graph of the time taken versus N on graph sheet. The elements can be read from a file or
can be generated using the random number generator. Demonstrate using C++ how the divide-andconquer method works along with its time complexity analysis: worst, average, and best case.
5.
Sort a given set of N integer elements using Merge Sort method and Compute its time complexity.
Run the program for varied values of N = 10, 20, 30, 40,50,60,,100, and record the time taken to
sort. Plot a graph of the time taken versus N on graph sheet. The elements can be read from a file or
can be generated using the random number generator. Demonstrate using C++ how the divide-andconquer method works along with its time complexity analysis: worst, average, and best case.
6.
Implement in C++ the 0/1 Knapsack problem using i) Dynamic Programming ii) Greedy methods.
7.
From a given vertex in a weighted connected graph, find shortest paths to other vertices
using Dijkstra's algorithm. Write the program in C++ .
8.
Find Minimum Cost Spanning Tree of a given undirected graph using i) Kruskal's
algorithm ii) Prim's algorithm. Implement the program in C++ language.
9.
a) Design & Implement in C++ to Find a subset of a given set S = {Sl, S2,.....,Sn} of n
positive integers whose SUM is equal to a
given positive integer D. For example, if S =
{1, 2, 5, 6, 8} and D = 9, there are two solutions {1,2,6}and {1,8}. Display a suitable
message, if the given problem instance doesn't have a solution.
23 | P a g e
1.
2.
3.
4.
5.
Engineering Knowledge
Problem Analysis
Modern Tool Usage
Conduct Investigations of Complex Problems
Design/Development of Solutions
examination.
Studentsare allowed to pick one experimentfrom the lot.
Strictlyfollow theinstructions as printed on the cover page of answer script for
breakup of marks
Marks distribution: Procedure + Conduction + Viva: 20 + 50 + 10 (80)
Change of experiment is allowed only once and marks allotted to the procedure
part to be made zero.
24 | P a g e
SEMESTER - III
Laboratory Code
15CSL48
IA Marks
20
01I + 02P
Exam Marks
80
40
Exam Hours
03
CREDITS - 02
25 | P a g e
Experiment List:
Develop and execute the following programs using 8086 Assembly Language.
Any suitable assembler like MASM/TASM/any equivalent software may be
used.
Program should have suitable comments.
The board layout and the circuit diagram of the interface are to be provided to
the student during the examination.
Software Required: Open source ARM Mbed Development platform
KEIL IDE and Proteus for simulation
SOFTWARE(ALP) PROGRAMS: PART A
PART B
26 | P a g e
Study Experiments:
Interfacing of temperature sensor with ARM freedom board (or any other
ARM microprocessor board) and display temperature on LCD
Course outcomes:
After studying this course, the students will be able to
1. Explain 80x86/ARM instruction sets
2. Design and implement programs written in 80x86/ARM
27 | P a g e
1.
2.
3.
4.
5.
Engineering Knowledge
Problem Analysis
Modern Tool Usage
Conduct Investigations of Complex Problems
Design/Development of Solutions
28 | P a g e