MSC Computer Science - Corrected PDF
MSC Computer Science - Corrected PDF
6912/GA - IV - J1/2013/CU
UNIVERSITY OF CALICUT
Abstract
Scheme and Syllabus of M.Sc Computer Science for the affiliated colleges under CUCSS-PG-2010
- corrections incorporated in the syllabus- implemented with effect from 2014 admissions -orders
issued.
G & A - IV - J
U.O.No. 5502/2016/Admn Dated, Calicut University.P.O, 28.04.2016
ORDER
As per paper read as (1) above, Credit Semester System at Post Graduate level in
affiliated colleges (CUCSS-PG-2010) was implemented from the academic year 2010 onwards. As
per paper read as (2) above, the syllabus of MSc Computer Science for affiliated colleges under
CUCSS -PG 2010 has been approved and implemented. The Board of Studies at its meeting, vide
paper read as (3) above, revised the syllabus of M.Sc.Computer Science of affiliated colleges. As
per paper read as (4) above, orders have been issued, implementing the revised syllabus.
As per paper read as (5) the board of studies has incorporated some correction in the syllabus
as follows.
As per paper read as (6) & (7) the Faculty of Science and Academic Council has approved the
corrected syllabus of MSc Computer Science. As per paper read as (8) the Vice Chacelleor has
approved to implement the items in the minutes of Academic Council.
Sanction has therefore been accorded to incorporate the corrections in the approved syllabus
of M.Sc.Computer Science programme of affiliated colleges under CUCSS PG 2010 w.e.f 2014
admission onwards. Hence the Scheme and Syllabus implemented vide paper read as (5) stands
corrected to this effect. Corrigendum is issued accordingly.
(The corrected syllabus is attached herewith and is available in the website: universityofcalicut.
info)
Anuja Balakrishnan
Deputy Registrar
To
Controller of Examinations
Exam Wing, Pareekshabhavan
Digital Wing, Calicut University
Principals of Affiliated Colleges
Forwarded / By Order
Section Officer
UNIVERSITY OF CALICUT
THENHIPALAM, CALICUT UNIVERSITY P.O
DEGREE OF
COMPUTER SCIENCE
(CHOICE BASED CREDIT AND SEMESTER SYSTEM)
UNDER THE
FACULTY OF SCIENCE
SYLLABUS
(FOR THE STUDENTS ADMITTED FROM THE ACADEMIC YEAR 2014 – 15 O NWARDS)
CONTENTS
2 PROGRAM STRUCTURE
1 PROGRAMME OBJECTIVES
The course of the MSc (Computer Science) programme is designed with the
following objectives:
b) To train and equip the students to meet the requirements of the Software
industry in the country and outside.
Courses: The programme includes four types of courses, viz., Core courses (Code
C) and Elective Courses (Code E). Core courses are of theory and practical oriented.
There is a Project Work which is to be undertaken by all students. No course shall
have more than 4 credits. For project work and General Viva-Voce, the maximum
credits shall be 8. General Viva-Voce covers questions from all courses in the
programme.
Project: Every student of the MSc Computer Science programme shall have to work
on a project of not less than 8 credits under the supervision of a faculty member as
per the curriculum.
3 ADMISSION
The admission to all programmes will be as per the rules and regulations of the
University. The eligibility criteria for admission shall be as announced by the
University from time to time.
Separate rank lists shall be drawn up for reserved seats as per the existing r ules.
The college shall make available to all students admitted a prospectus listing all the
courses offered including electives in various departments during a particular
semester. The information provided shall contain title of the course and credits of
the course.
There shall be a uniform calendar prepared by the University for the registration,
conduct /schedule of the courses, examinations and publication of results. The
University shall ensure that the calendar is strictly followed.
There shall be provision for inter collegiate and inter university transfer in third
semester within a period of two weeks from the date of commencement of the
semester. There shall be provision for credit transfer subject to the conditions
specified by the Board of Studies concerned.
4 REGISTRATION
A student shall be permitted to register for the programme at the time of admission.
A student shall be permitted to register for the examination also. If registration for
The 'Repeat Semester' shall be possible only once for the entire programme and
shall be done in the same college. A student who registered for the course shall
successfully complete the programme within 4 years from the year of first
registration. If not, such candidate has to cancel the existing registration and join
afresh as a new candidate. The students who have attendance within the limit
prescribed, but could not register for the examination have to apply for the token
registration, within two weeks of the commencement of the next semester.
5 COURSE EVALUATION
The evaluation scheme for each course shall contain two parts: (a) internal
evaluation and (b) external evaluation. 25% weight shall be given to internal
evaluation and the remaining 75% to external evaluation. Therefore the ratio of
weight between internal and external is 1:3. Both internal and external evaluation
shall be carried out using Direct grading system.
INTERNAL EVALUATION
THEORY PAPERS
The weightage assigned to various components for internal evaluation for theory
papers is as shown below.
Components Weightage
Test papers with at least 25% questions based on problems or
2
programs (minimum two)
Assignments (minimum two) such as homework, problem
solving, group discussions, quiz, literature survey, term-project, 1
software exercises, etc.
Regularity in the class 1
Seminar 1
Total 5
The course teacher shall maintain the academic record of each student registered for
the course, which shall be forwarded to the University, through the college Principal.
PRACTICAL PAPERS
The mark distribution to award internal continuous assessment marks for practical
course should be as follows:
Components Weightage
Rough record for each experiment 1
Performance in the laboratory – coding, results 1
Fair Record 1
Regularity 1
End-semester test 1
Total 5
Note:
1. All students should have a rough record (observation note book) in which they
write all the works to be carried out in the lab prior to his/her entering the lab.
(S)he may also note down the i/p and o/p that (s)he gives for program
verification in the observation note book (rough record).
2. All lab works should be neatly recorded in a Laboratory Record Book (Fair
Record) in written form. However program results can be pasted in the left hand
side of the fare record.
5. Full credit for regularity in the class can be given only if the candidate has
secured minimum 90% attendance in the course. Attendance evaluation for each
course is as follows:
For the evaluation of the Project Work (CSS4C02) and Term Paper (CSS2P07), an
evaluation committee is to be constituted. One faculty is to be designated as the
Course Coordinator for these courses. Committee is to be constituted by the head of
the department (HOD) and (s)he shall be the Chairperson of the committee. In
addition to the HOD, the Course Coordinator and at least three faculty members can
be designated as the members of the committee. In case HOD is unable to represent
himself/herself in the committee, (s)he can nominate a faculty in lieu for him/her as
a member and the chairperson of the committee. In addition to this, faculty guiding
a particular student will also be a member of the committee. At least one member of
the committee should be a lady, if lady faculties are available in the department
concerned. The Coordinator has to set the schedule for presentation and submission
of the reports. While calculating the final score, 25% weight is to be given for the
scores awarded by the guide to the student and the rest 75% weight is to be given
for the average of the scores awarded to the student by remaining committee
members.
TERM PAPER
A tentative list of the components for evaluation of Term Paper is as shown below.
Evaluation committee can decide about the actual composition of the components
and scores to be awarded for each component.
Component
Relevance of the Topic, Statement of Objectives, Correctness
Quality of Literature Survey / Product Review
Methodology / tools Adopted
Quality of Contributions
Quality of Implementation / Simulation
Quality of Testing
Identification of Future Work
Quality of the Term Paper Report
Publications/Presentations/Communications out of the Term
Paper
Quality of Presentation
PROJECT WORK
Total weightage for Project Work (and General Viva Voce) shall be 72 (36 x 2).
Hence the total grade points shall be 288 (72 x 4). Scheme to award internal
continuous assessment grades for project work should be as follows:
Components Weightage
Monthly progress 4
Regularity 1
Total 5
Regularity is to be reported by the guide to the EC, considering factors such as
students’ commitment to work, timely submission of assignments, punctuality and
availability.
Grade
Component
Points
Relevance of the Topic, Statement of Objectives, Methodology 20
Quality of Literature Survey/Product Review 20
Quality of Analysis Phase 20
Quality of Design Phase 20
Quality of Implementation/Simulation 50
Quality of Testing/Result Analysis 20
Quality of Contributions 20
Identification of Future Work 8
Quality of Project Report 50
Publications/Presentations out of the Project Work* 10
Quality of Presentation 15
Demonstration of the Project Work 10
General Viva Voce 25
Total 288
Grade is calculated by dividing total number of points obtained by a student by 72
*In case at least one student of the batch has a publication/presentation out of his/her
project work in a workshop/conference/journal/IT fest etc, this score is to be awarded for
the student; no other students will deserve score for this component! If none of the
students in the batch could make such an edge, then the score for this component is to be
added with the component “Identification of Future Work”.
The Evaluation Committee can decide about the components for monthly evaluation
from the above list. See Appendix B for a sample evaluation.
EXTERNAL EVALUATION
End semester examinations for theory and practical courses will be conducted by
the University. For practical courses, end semester examinations will be
conducted in even semesters.
Evaluation for the following courses will be done internally by the concerned
departments:
o CSS4E01 Elective IV
External project evaluation shall be conducted at the end of the fourth semester.
The evaluation of the answer scripts shall be done by examiners based on a well-
defined scheme of valuation. The external evaluation shall be done immediately
after the examination preferably in a Centralized Valuation Camp.
For Project Work, if the performance of the student is below the expected
benchmark (E grade), student will be given a chance to reappear within six
weeks (from the date of evaluation) to present the work again, after
incorporating the changes suggested by the examiners. Examiners have to
submit their suggestions in writing to Chairperson, Board of Examinations PG and
the concerned HOD on the day of examination itself. HOD has to convey the
matter ASAP to the students concerned. The Chairperson, Board of Examinations
has to inform the concerned HOD about the schedule for resubmission and
revised evaluation within seven days of the date of evaluation. While submitting
the revised report, the student has to produce a certificate (signed by the
student, the guide and the HOD) stating that the changes suggested by the
examiners are incorporated in the revised report. Also a summary of the changes
made in the revised report as per the suggestions of the examiners is to be
submitted (as a separate manuscript) with the revised report. If the result of the
second evaluation is worth E grade, (s)he will have to appear for the end
semester examinations along with regular students. This provision is only
applicable for Project Work evaluation.
Failed or improvement candidates will have to appear for the end semester
examinations along with regular students.
REVALUATION
Awarding of a higher grade after revaluation may be given only after a second
revaluation.
IMPROVEMENT/SUPPLEMENTARY
No of Questions Weightage
Section for each Total
To be To be
question
Asked Answered
A: Short answer
12 12 1 12
questions+
B: Short Essay 9 6 2 12
C: Essays* 6 3 4 12
Total 36
+
MCQ / fill in the blank / matching /one word / etc. Each question is to be answered in 7
minutes duration and should extract the critical knowledge acquired by the candidate in the
subject.
Component Weightage
Algorithm/Flow diagram/UI diagram/Class Diagram 1
Implementation 1
Result/Output 1
Record 1
Viva 1
Total 5
PROJECT WORK
Total weightage for Project Work (and General Viva Voce) shall be 72 (36 x 2).
Hence the total grade points shall be 288 (72 x 4).
Grade
Component
Points
Relevance of the Topic, Statement of Objectives, Methodology 20
Quality of Literature Survey/Product Review 20
Quality of Analysis Phase 20
Quality of Design Phase 20
Quality of Implementation/Simulation 50
Quality of Testing/Result Analysis 20
Quality of Contributions 20
Identification of Future Work 8
Quality of Project Report 50
Publications/Presentations out of the Project Work* 10
Quality of Presentation 15
Demonstration of the Project Work 10
General Viva Voce 25
Total 288
Grade is calculated by dividing total number of points obtained by a student by 72
*In case at least one student of the batch has a publication/presentation out of his/her
project work in a workshop/conference/journal/IT fest etc, this score is to be awarded for
the student; no other students will deserve score for this component! If none of the
students in the batch could make such an edge, then the score for this component is to be
added with the component “Identification of Future Work”.
8 CREDIT SYSTEM
Each course shall have a specific credit (whole number) depending on the academic
load and the nature and importance of the course. The credit associated with each
course is as listed in the prescribed scheme and syllabi.
Direct Grading System based on a 5 point scale is used to evaluate the performance
(External and Internal Examination of students).
a) One Credit is equivalent to 4 periods of 60 minutes each, for theory and practical.
b) Total credits of the MSc Computer Science Programme shall be 87. The following
is the semester wise credits a student must earn for the award of the degree:
Each course is evaluated by assigning marks with a letter grade (A, B, C, D, E).
A student who fails to secure a minimum grade for a pass in a course will be
permitted to write the examination along with the next batch.
The Cumulative Grade Point Average (CGPA) of the student is calculated at the
end of a programme. The CGPA of a student determines the overall academic
level of the student in a programme and is the criterion for ranking the students.
CGPA can be calculated by the following
SGPA and CGPA shall be rounded off to two decimal places. CGPA determines the
broad academic level of the student in a programme and is the index for ranking
students (in terms of grade points).
An overall letter grade (Cumulative Grade) for the entire programme shall be
awarded to a student depending on her/his CGPA .
10 GRADE CARDS
The University shall issue to the students grade/marks card (by online) on
completion of each semester, which shall contain the following information:
vi. Code number, Title and Credits of each course opted in the semester.
vii. Internal marks, External marks, total marks, Grade point (G) and Letter grade
in each course in the semester.
viii. The total credits, total credit points and SGPA in the semester.
The Final Grade Card issued at the end of the final semester shall contain the details
of all courses taken during the entire programme including those taken over and
above the prescribed minimum credits for obtaining the degree. The Final Grade
Card shall show the CGPA and the overall letter grade of a student for the entire
programme.
11 AWARD OF DEGREE
The successful completion of all the courses prescribed for the MSc Computer
Science programme with C grade shall be the minimum requirement for the award
of MSc Computer Science programme degree.
COLLEGE LEVEL
UNIVERSITY LEVEL
The University shall form a Grievance Redressal Committee as per the existing
norms.
13 TRANSISTORY PROVISION
Notwithstanding anything contained in these regulations, the Vice-Chancellor shall,
for a period of one year from the date of coming into force of these regulations,
have the power to provide by order that these regulations shall be applied to any
programme with such modifications as may be necessary.
14 REPEAL
The Regulations now in force in so far as they are applicable to programmes offered
by the University and to the extent they are inconsistent with these regulations are
hereby repealed. In the case of any inconsistency between the existing regulations
and these regulations relating to the Choice Based Credit Semester System in their
application to any course offered in a College, the latter shall prevail.
Semester I
Weightage Hrs/wk
No Course Code Course Name C
I E T L P T
1.1 CSS1C01 Discrete Mathematical 4 25 75 100 4 4
Structures
1.2 CSS1C02 Advanced Data 4 25 75 100 3 2 5
Structures
1.3 CSS1C03 Theory of Computation 4 25 75 100 4 4
1.4 CSS1C04 The Art of Programming 4 25 75 100 2 2 4
Methodology
1.5 CSS1C05 Computer Organization and 4 25 75 100 4 4
Architecture
1.6 CSS1P06 Practical I 4 25 75 100 4 4
Total 24 17 8 25
Semester II
Weightage Hrs/wk
No Course Code Course Name C I E T L P T
2.1 CSS2C01 Design and Analysis of 4 25 75 100 3 1 4
Algorithms
2.2 CSS2C02 Operating System Concepts 4 25 75 100 3 1 4
2.3 CSS2C03 Computer Networks 4 25 75 100 4 4
2.4 CSS2C04 Computational Intelligence 4 25 75 100 4 4
2.5 CSS2E05 Elective I 4 25 75 100 4 4
2.6 CSS2P06 Practical II 4 25 75 100 4 4
2.7 CSS2P07* Term Paper 1 100 100 1 1
Total 25 18 7 25
* Evaluation is to be done fully internally for this paper
Semester III
Weightage Hrs/wk
No Course Code Course Name C
I E T L P T
3.1 CSS3C01 Advanced Database 4 25 75 100 4 1 5
Management System
3.2 CSS3C02 Principles of Compilers 4 25 75 100 4 4
3.3 CSS3C03 Object Oriented 4 25 75 100 4 4
Programming Concepts
3.4 CSS3E04 Elective II 4 25 75 100 4 4
3.5 CSS3E05 Elective III 4 25 75 100 4 4
3.6 CSS3P06 Practical III 4 25 75 100 4 4
Total 24 20 5 25
Semester IV
Weightage Hrs/wk
No Course Code Course Name Credit
I E T L P T
4.1 CSS4E01* Elective IV 4 100 100 4 1 5
4.2 CSS4C01* Principles of Software 2 100 100 2 2
Engineering
4.2 CSS4C02 Project Work 8 25 75 100
(Duration of the Project = 16
Weeks)
Total 14
Total Credits (Sem I – IV) 87 Credits
*Evaluation is to be done Internally for these papers (by providing 25% weightage for continues
assessment and 75% weightage for the internal examination)
Note:-
Semester I
CSS1C01|Discrete Mathematical Structures
Course Number: 1.1 L P C
Contact Hours/Week: 4 4 0 4
Number of Credits: 4
Number of Contact Hours: 60 Hrs
Prerequisite/Exposure: None
Course Evaluation: 25% (Internal) + 75% (External)
Objectives
Course Outline
Unit I
Sets and Mathematical Logic: Set Theory - Types of sets, Set operations, Principles
of Inclusion and Exclusion. Mathematical Logic - Propositional Calculus - Statement,
Connectives, Conditional and Biconditional, Equivalence of Formula, Well Formed
Formula, Tautologies, Duality Law, Functionally Complete Sets of Connectives,
Normal Forms, Theory of Inference for the Statement Calculus, Predicate Calculus -
Statement Functions, Variables and Quantifiers, Free and Bound Variables, Theory of
Inference for the Predicate Calculus.
Unit II
Unit III
Lattices and Boolean Algebra - Lattices and Algebraic Systems, Principles of Duality,
Basic Properties of Algebraic Systems Defined by Lattices, Distributive Lattices and
Complemented Lattices. Boolean Lattices and Boolean Algebras. Boolean Functions
and Boolean Expressions.
Unit IV
Unit V
Reference
Objectives
Course Outline
Unit I
Unit II
Counting Techniques: Basic counting techniques - permutations and combinations,
asymptotic behaviour of functions. Linear data structures - Arrays – records –
representation - data structure operations - traversing, inserting and deleting -
sorting and searching - sorting algorithms - linear search & binary search –
complexity. Linked lists – operations and implementations, Stack - operations and its
implementations (both array and linked list) – Applications - parsing arithmetic
expressions, conversion and evaluating expressions. Recursion - characteristics of
recursion, types of recursion - applications of recursion in algorithms - comparison of
recursive and non-recursive algorithms. Queue - operations and its implementations
(both array and linked list) – circular queue – dequeue - priority queues, recursive
lists, heterogeneous lists, deterministic skip lists, doubly linked lists and circular lists
- sparse matrix- representation.
Unit III
Unit IV
Unit V
Heap structures - Min-Max heaps - Deaps - leftist heaps - binomial heaps - Fibonacci
heaps -binary heaps - skew heaps - pairing heaps – applications - amortized analysis
- an unrelated puzzle - Binomial queues - skew heaps - Fibonacci heaps - Splay
trees.
References:
1. Alfred V. Aho, John E. Hopcroft and Jeffrey D. Ullman, Data Structures and
Algorithms, Addison-Wesley, ISBN: 978-0201000238.
2. Horowitz E and Sahni S, Fundamentals of Data Structures, Computer Science
Press, ISBN: 9780716780427.
3. Ellis Horowitz, Sartaj Sahni and Susan Anderson-Freed, Fundamentals of Data
Structures in C , Silicon Press, ISBN: 0929306406.
4. Richard F. Gilberg and Behrouz A. Forouzan, Data Structures: A Pseudocode
Approach With C, Thomson Brooks/Cole Publications, Course Technology, ISBN:
9780534390808.
5. Aaron M. Tenenbaum, Yedidyah Langsam and Moshe J. Augenstein, Data
Structure using C , Prentice- Hall, ISBN: 9780131997462.
6. Robert Kruse, Tondo C L and Bruce Leung, Data Structures & Program Design in
C, Pearson India, 2nd Edition, ISBN: 9788177584233.
7. U. A. Deshpande and O. G. Kakde, Data Structures & Algorithms, ISTE Learning
Materials Centre, New Delhi, ISBN: 9788188057054.
8. Thomas H Cormen, Charles E Leiserson, and Ronald L Rivest, Introduction to
Algorithms, 3rd Edition, Prentice Hall of India Private Limited, New Delhi, ISBN:
978-0262033848.
9. Seymour Lipschutz, Data Structures With C , 1st Edition, Tata Mcgraw Hill
Education Private Limited, ISBN: 0070701989.
10. Jean-Paul Tremblay, Paul G. Sorenson, P. G. Sorenson, Introduction to Data
Structures with Applications, 2nd Edition, Mcgraw-Hill College, ISBN: 0070651574.
Objectives
Course Outline
Unit I
Unit II
Regular Expressions, Finite Automata and Regular Expressions, Properties of Regular
Languages - Pumping lemma and proof for existence of non regular languages,
Closure properties, homomorphism, substitution - Decision Properties - Equivalence
and Myhill Nerode and DFA state minimization – Regular Grammar.
Unit III
Context Free Languages - Equivalence of CFG and PDA – Normal forms (CNF and
GNF) – Closure properties of CFL’s – DCFL’s and their properties – Decision
procedures – CYK algorithm – Pumping lemma and proof for existence of non
context-free languages – Context sensitive languages: Equivalence of LBA and
Context Sensitive Grammar (CSG).
Unit IV
Unit V
References
Course Outline
Unit I
Part A: Problem Solving – Flow Chart for Structured Programming – Program Charts
– System Charts – Variables, data names, programming statements – Flow Chart
Symbols – Terminal Symbols – I/O – Comments – Connectors – Process – Decision -
Loops – Flow Charts of Fundamental Algorithms (mentioned in Part B) - Part B:
Algorithm Design – Problem Solving Aspect – Top Down Design – Formal
Conventions – Writing Algorithms – Fundamental Algorithms (Discuss the Design of
Unit II
Unit III
Unit IV
Unit V
References
1. Martin M. Lipschutz and Seymour Lipschutz, Schaum's Outline of Theory and
Problems of Data Processing, ISBN: 9780070379831 (Unit I Part A).
2. Anil Bikas Chaudhuri, The Art Of Programming Through Flowcharts &
Algorithms, Laxmi Publications, New Delhi (Unit I Part A).
3. Jean Paul Trembley and Pual G Sorenson, An Introduction to Data Structures
with Applications, Tata McGraw Hill (Unit I Part B).
4. R G Dromey, How to Solve by Computer , Pearson Education, 5th Edition, ISBN:
0134340019 (Unit I Part B).
5. J.B Dixit, Computer Fundamentals and Programming in C, Firewall Media, ISBN:
8170088828. (Unit I Part C).
6. Dennie Van Tassel, Program Style, Design, Efficiency, Debugging, and Testing,
PHI, ISBN: 0137299478 (Unit I Part C).
7. E Balagruswamy, Programming in ANSI C , TMH, 5th Edition, ISBN: 0070681821.
8. Kamthane, Programming in C, 2nd Edition, Pearson India, ISBN: 8131760316.
9. Brian W. Kernighan and Dennis M. Ritchie, C Programming Language, PHI,
ISBN: 0131103628.
10. Kanetkar, Let Us C, BPB Publications, 8th Edition, ISBN: 1934015253.
Objectives
Course Outline
Unit I
Number systems and Conversions, Boolean Algebra - Truth Tables - Logic gates and
Map simplification - flip-flops - design of combinational and sequential circuits -
examples of digital circuits – adders, multiplexers, decoders, counters, shift registers
- register transfer language and micro operations - data representation - data types,
sign and magnitude, complements, fixed-point representation, floating-point
representation, other binary codes, error detection codes.
Unit II
Unit III
Arithmetic & Logic Unit - addition of positive numbers – fast adders – signed addition
and subtraction - addition/subtraction logic unit – multiplication of positive numbers
– array multiplier, sequential multiplier - signed number multiplication - multiplication
using Booth's algorithm - fast multiplication – bit pair recording of multiplication,
division-restoring and non restoring algorithms, floating point numbers and
operations.
Unit IV
Main Memory - memory hierarchy – main memory – RAM, ROM - memory cells - cell
organization - working – performance considerations - cache memory – virtual
memory - memory management requirements - secondary storage – memory
interleaving. Input / Output Organization - Accessing I/O devices – programmed
I/O, interrupt I/O - interrupts - interrupt processing – hardware interrupts –
programmable interrupt controller – vectored interrupts - interrupt nesting - daisy
chaining - direct memory access (DMA) - DMA operations & DMA Controller,
Introduction to I/O interfaces, I/O channels, IO Processors.
Unit V
References
1. V Carl Hamacher, Zvonko Vranesic and Safwat Zaky, Computer Organization,
Mc-Graw Hill International Edition, 5th Edition, ISBN: 9780071122184.
2. Morris Mano, Digital Logic and Computer Design , Prentice Hall of India, ISBN:
0876924178.
3. M Morris Mano, Computer System Architecture, Prentice Hall, 3rd Edition.
ISBN: 0131755633.
4. William Stallings, Computer Organization and Architecture, 9th Edition,
Prentice Hall, ISBN: 013293633X.
CSS1P06 | Practical I
Course Number: 1.6 L P C
Contact Hours per Week: 4 0 4 4
Number of Credits: 4
Number of Contact Hours: 60 Hrs
Prerequisite/Exposure: None
Course Evaluation: 25% (Internal) + 75% (External)
Objectives
Course Outline
Unit I: C Programming
Semester II
Objectives
• To introduce the concept of algorithmic approach for solving real‐life problems.
• To teach basic principles and techniques of computational complexity.
• To familiarize with parallel algorithms and related techniques.
Course Outline
Unit I
Unit II
Basic Technique for Design of Efficient Algorithm: Brute Force approach (String
matching), Divide-and-Conquer approach (Merge sort), Branch-and-Bound technique
(Knapsack problem). Greedy approach (Kruskal’s algorithm and Prim’s Algorithm),
Dynamic Programming (Longest Common Subsequence), Backtracking (Sum of
subsets problem).
Unit III
Unit V
References:
2. Alfred V. Aho, John E. Hopcroft and Jeffrey D. Ullman, The Design and Analysis
of Computer Algorithms, 1st Edition. Addison Wesley, ISBN: 0534915728 (Unit I,
II, III and IV).
3. Pallaw, V K, Design and Analysis of Algorithms , Asian Books Private Ltd, 2012,
ISBN: 8184121687 (Unit I, II, III and IV).
6. Upadhyay N, Design and Analysis of Algorithms, SK Kataria & Sons, 2008 (Unit I,
II, III and IV).
13. Sanjeev Arora and Boaz Borak, Computational Complexity - A Modern Approach,
Cambridge University Press; 2009, ISBN: 0521424267 (Unit III).
14. Daniel Hills W and Bruce M Boghosian, Parallel Scientific Computation, Science,
13 August 1993, Vol. 261 (5123), pp.856-863 (Unit V).
Objectives
Course Outline
Unit I
Unit II
Unit III
Unit IV
Unit V
References
1. William Stallings, Operating Systems, Internals and Design Principles, 7th Edition,
Pearson, ISBN: 9780273751502.
2. Abraham Silberschatz, Peter B. Galvin and Greg Gagne, Operating System
Concepts, 9th Edition, John Wiley & Sons, ISBN: 9781118063330.
3. Ann McIver McHoes and Ida M. Flynn, Understanding Operating Systems, 6th
Edition, Cengage Learning, 2010, ISBN: 9781439079201.
4. Mukesh Singhal and Niranjan G. Shivaratri, Advanced Concepts in Operating
Systems – Distributed, Database, and Multiprocessor Operating Systems , Tata
McGraw-Hill Education Private Limited, ISBN: 9780070575721.
5. Current Literature (for Mobile Operating Systems).
Objectives
To provide the student with a top down approach of networking starting from the
application layer.
To introduce computer networking in the back drop of Internet protocol stack.
Course Outline
Unit I
Unit II
Application layer protocols – principles – the web and HTTP – FTP – Email in
Internet – DNS. Socket programming – building a Web server - content distribution.
Unit III
Unit IV
Link layer services - error detection and correction - multiple access protocols – LAN
address – ARP – Ethernet – hubs – bridges – switches - wireless links – PPP - ATM.
Unit V
References
Objectives
Unit II
Heuristics Search: control and implementation of state space search, generate and
test, hill climbing, Best–first search, problem reduction, constraint satisfaction,
means-ends analysis, heuristic in games, complexity issues.
Unit III
Knowledge representation issues, representation and mappings, representing simple
facts in logic, representing instances and ISA relationships, computable functions
and predicates, resolution, natural deduction, knowledge representation using rules,
Unit IV
Game playing – the Minimax search procedure, adding Alpha-beta cutoffs, additional
refinement, iterative deepening, planning system and its components,
understanding, understanding as constrained satisfaction. Slot and filler structures:
semantic nets, frames, conceptual dependency, scripts. Definition and characteristics
of expert system, representing and using domain knowledge, expert system shells.
Knowledge engineering, knowledge acquisition, expert system life cycle & expert
system tools, CYCIN & DENDRAL examples of expert system.
Unit V
References
1. Elaine Rich, Kevin Knight and Shivshankar B. Nair, Artificial Intelligence, 3rd
Edition, Tata – McGraw Hill, New Delhi, ISBN: 0070087709.
2. V S Janakiraman, K Sarukesi and P Gopalakrishnan, Foundations of Artificial
Intelligence and Expert System, Macmillan India Limited, ISBN: 0333926250.
3. Stuart Russell and Peter Norvig, Artificial Intelligence: A Modern Approach , 3rd
Edition, Prentice Hall, ISBN: 0136042597.
4. G. F. Luger and W.A Stubblefield, Artificial Intelligence – Structures and
Strategies for Complex Problem Solving , Addison-Wesley, 6th Edition, ISBN:
9780321545893.
5. P. H. Winston, Artificial Intelligence, Addison-Wesley, 3rd Edition, ISBN:
0201533774.
6. Nils J. Nilsson, Artificial Intelligence, A New Synthesis , 1st Edition, Morgan
Kaufmann Publishers, Inc, ISBN: 1558604677.
CSS2P06 |Practical II
Course Number: 2.6 L P C
Contact Hours per Week: 4 0 4 4
Number of Credits: 4
Number of Contact Hours: 60 Hrs
Prerequisite/Exposure: None
Course Evaluation: 25% (Internal) + 75% (External)
Objectives
Course Outline
Unit I: Computer Networks
1. Design a LAN with a given set of requirements. The design should include
topology, hardware and software requirements like cable, connectors,
hubs/switches/bridges, interface cards along with a budget for the LAN.
(Faculty in charge should give the requirements to the students)*.
2. Establish a LAN that consists of at least one server and two clients*.
3. Study of network utilities in Linux/Windows (hostname, ping, ifconfig,
ipconfig, netstat, nslookup, telnet, traceroute, finger, telnet, tracert, arp, ftp
etc)*.
4. Implementation of TCP Client.
5. Implementation of TCP Server.
6. Write a program to check the Date and Time in TCP Date Time Client.
7. Write a program to check the Date and Time in TCP Date Time Server.
8. Implementation of UDP client and server.
9. Write a program to transfer Files using UDP.
10. Implementation of transferring files using FTP.
11. Write a program to simulate the sliding window protocol.
12. Study of Network Simulators (NS2/Glomosim)*.
*These questions are NOT meant for examination purpose. However Viva questions can
be asked based on these experiments.
1. Write programs using the following system calls: fork(), execl() and wait().
2. Write File System Calls to write, append and display.
3. To accept the burst time for a set of processes for FCFS scheduling and create
chart consisting of the burst time, turnaround time and wait time of each
process.
4. To accept the burst time for a set of processes for SJF scheduling and create
chart consisting of the burst time, turnaround time and wait time of each
process.
5. To accept the burst time and priority for a set of processes for Priority
scheduling and create chart consisting of the burst time, priority, turnaround
time and wait time of each process.
6. To create n Fibonacci numbers and prepare a list of prime numbers amongst
them (use pipe for IPC).
7. To demonstrate IPC using shared memory.
8. To allocate memory requirements for processes using best fit allocation- Accept
n processes with their memory requirements and n holes with their sizes.
Perform memory allocation using Best Fit algorithm. Display a chart consisting
of the process and the allocated hole.
9. To accept n processes with their memory requirements and n holes with their
sizes. Perform memory allocation using First Fit algorithm. Display a chart
consisting of the process and the allocated hole.
10. To demonstrate the process of contiguous allocation of memory blocks to store
files of varying sizes.
11. To implement Producer Consumer problem using semaphores.
Objectives
References
Objectives
Course Outline
Unit I
Unit II
Unit III
Unit IV
Unit V
Discrete Techniques and OpenGL programming - Texture mapping, Bit and Pixel
operations, Compositing, Sampling and Aliasing Techniques. Introduction to OpenGL,
Features in OpenGL, OpenGL operations, Abstractions in OpenGL – GL, GLU & GLUT,
a few examples of OpenGL programs.
References
1. Donald Hearn and M. Pauline Baker, Computer Graphics, 2nd Edition, Prentice
Hall, ISBN: 0135309247.
2. Donald D. Hearn, M. Pauline Baker and Warren Carithers, Computer Graphics
with Open GL, 4th Edition, Prentice Hall, ISBN: 9780136053583.
3. Hill, Computer Graphics using OpenG,L , 3rd Edition, Prentice Hall of India Private
Ltd. New Delhi, ISBN: 8120338294.
4. Mason Woo, Jackie Neider, Tom Davis, Dave Shreiner, Dave Shriner and Tom
David, Open GL Programming Guide, 6th Edition, Person, ISBN: 9780201604580.
5. The Official Guide to Learning OpenGL, Version 1.1, Available at
http://www.glprogramming.com/red/.
6. Shreiner and Angel, Interactive Computer Graphics: A Top-Down Approach with
Shader-Based OpenGL, 6th Edition, Pearson Education, ISBN: 0132545233.
Course Outline
Unit I
Unit II
Unit III
Unit IV
Introduction to fuzzy sets, operations on fuzzy sets, fuzzy relations, fuzzy measures,
applications of fuzzy set theory to different branches of science and engineering.
Unit V
References
1. Chuen-Tsai Sun, Eiji Mizutani and Jyh-Shing Roger Jang, Neuro-Fuzzy and
Soft Computing: A Computational Approach to Learning and Machine
Intelligence, Prentice Hall India, ISBN: 8120322436.
2. M. Mitchell, An Introduction to Genetic Algorithms , Prentice-Hall, ISBN:
0262631857.
3. D. E. Goldberg, Genetic Algorithms in Search, Optimization, and Machine
Learning, Addison-Wesley, ISBN: 0785342157673.
4. S. V. Kartalopoulos, Understanding Neural Networks and Fuzzy Logic: Basic
Concepts and Applications, Wiley-IEEE Press, 1st Edition, ISBN:
07803112802004.
5. S. Rajasekaran and G. A. Vijayalakshmi Pai, Neural Networks, Fuzzy Logic and
Genetic Algorithms: Synthesis & Applications , PHI, ISBN: 9788120321861.
Objectives
Course Outline
Unit I
Unit II
Unit III
Unit IV
Server side programming – server side scripts – PHP – designing dynamic web
pages using PHP - defining PHP variables – variable types – operators – control flow
constructs in PHP – passing form data between pages - establishing connection with
MySQL database – managing database.
Unit V
References
4. Xue Bai, Michael Ekedahl, Joyce Farrell, Don Gosselin, Diane Zak, Bill
Morrissey, Michael V. Ekedahl, Peter Macintyre and Shashi Kaparthi, The Web
Warrior Guide to Web programming , Thomson Learning, ISBN:
9780619064587.
5. Chris Bates, Web Programming: Building Internet Applications , 3rd Edition,
Wiley Academic Catalog, ISBN: 9780470017753.
6. Paul J. Deitel, Harvey M. Deitel, Harvey Deitel, Paul Deitel and Abbey Deitel,
Internet and World Wide Web: How to Program, 5th Edition, Prentice Hall,
ISBN: 9780132151009.
7. R. Allen Wyke and Richard Wagner, JavaScript Unleashed, 3rd Edition, SAMS,
ISBN: 9780672317637.
8. Richard Bowen Ken Coar, Ken A Coar and Matthew Marlowe, Apache Server
Unleashed, SAMS, ISBN: 0672318083.
9. Elizabeth Naramore, Jason Gerner, Yann Le Scouarnec, Jeremy Stolz and
Michael K Glass, Beginning PHP5, Apache, and MySQL Web Development,
Wrox, ISBN: 0764579665.
10. Jennifer Marriott and Elin Waring, The Official Joomla! Book, Addison-Wesley
Professional, ISBN: 978-0321821546.
11. Ron Severdia and Kenneth Crowder, Using Joomla: Building Powerful and
Efficient Web Sites, 1st Edition, O'Reilly Media, ISBN: 9780596804947.
CSS2E05d | Bioinformatics
Elective I: CSS2E05 L P C
Course Number: 2.5d 4 0 4
Contact Hours per Week: 4
Number of Credits: 4
Number of Contact Hours: 60 Hrs
Prerequisite/Exposure: None
Course Evaluation: 25% (Internal) + 75% (External)
Objectives
Expose students to the popular genomic and proteomic databases and to impart
knowledge in processing and analyzing genomic data.
Introduce advanced topics in Bioinformatics.
Course Outline
Unit I
Unit II
Unit III
Unit IV
Unit V
Introduction to the major resources - NCBI, EBI and ExPASy - nucleic acid sequence
databases - GenBank, EMBL, DDBJ – Protein sequence databases - SWISS-PROT,
TrEMBL, PIR_PSD - genome databases at NCBI, EBI, TIGR, SANGER – procedures
to access these databases and to make use of the tools available.
Text Books
Molecular Biology Edible Oil Processing, 1st Edition, Ane Books Pvt Ltd, ISBN:
9788180520525.
4. Andrzej K. Konopka and M. James C. Crabbe, Compact Handbook of
Computational Biology, 1st Edition, CRC Press, ISBN: 9780824709822.
5. Richard E. Bellman, Dynamic Programming, Princeton University Press, ISBN:
9780691146683.
6. Needleman S B and Wunsch C D, A General Method Applicable to the Search
for Similarities in the Amino Acid Sequence of Two Proteins , J. Mol. Biol., 48
(1970) 443–453.
7. Smith T F and Waterman M S, Identification of Common Molecular
Subsequences, J. Mol. Bio. 147 (1981) 195–197.
8. Watson J D and Crick F H C, A Structure for Deoxyribose Nucleic Acid , Nature,
171 (1953) 737–738.
9. Pevzner P A and Waterman M S, Open Combinatorial Problems in
Computational Molecular Biology , Proc. Third Israel Symp. Theo. Comp. Syst.
IEEE Computer Society Press, (1995) 158 – 173.
Objectives
Course Outline
Unit I
Linear programming and sensitivity analysis – two variable LP model, graphical and
algebraic LP solutions, some LP applications, the simplex method and sensitivity
analysis, primal‐dual relationships and economic interpretation, dual simplex and
generalized simplex algorithms and post‐optimal analysis.
Unit II
Transportation and Network models - The transportation models and algorithm, the
assignment and transshipment models, minimum spanning tree algorithm,
shortest‐route problem, maximum flow and min‐cost models, critical path method
and algorithms for matching.
Unit III
Unit IV
Unit V
References
Objectives
To provide the student with basic concepts in statistics, probability that can be
applied for mathematical modeling of computer applications.
Course Outline
Unit I
Integration - trapezoidal rule, Simpson’s 1/3, & 3/8 rules. Differential equations:
Heunn’s polygon, Range-Kutta fourth order, Milne-Simpson, Adams-Bashforth and
Adams-Moulton methods.
Unit IV
Unit V
References
Semester III
Objectives
Course Outline
Unit I
Unit II
Unit III
Relational database query languages - basics of QBE and SQL. Data definition in SQL
- data types, creation, insertion, viewing, updation, deletion of tables, mo difying the
structure of the tables, renaming, dropping of tables. Data constraints – I/O
constraints, primary key, foreign key, unique key constraints, ALTER TABLE
command - database manipulation in SQL - computations done on table data -
SELECT command, logical operators, range searching, pattern matching, grouping
data from tables in SQL, GROUP BY, HAVING clauses. Joins – joining multiple tables,
joining a table to it. DELETE – UPDATE. Views - creation, renaming the column of a
view, destroys view. Program with SQL - data types Using SET and SELECT
commands, procedural flow, IF, IF /ELSE, WHILE, GOTO, global variables. Security -
locks, types of locks, levels of locks. Cursors - working with cursors, error handling,
developing stored procedures, CREATE, A LTER and DROP, passing and returning
data to stored procedures, using stored procedures within queries, building user
defined functions, creating and calling a scalar function, implementing triggers,
creating triggers, multiple trigger interaction (Use MySQL as the RDBMS).
Unit IV
Unit V
Reference
1. Elmasri and Navathe, Fundamentals of Database Systems, 5th Edition,
Pearson, ISBN: 9788131758984.
2. Abraham Silbersehatz, Henry F. Korth and S.Sudarshan, Database System
Concepts, 6th Edition, Tata McGraw-Hill, ISBN: 0071325220.
3. CJ Date, An Introduction to Database Systems, 8th Edition, Addison Wesley,
ISBN: 0321197844.
4. Ramakrishnan and Gehrke, Database Management Systems, 3rd Edition,
McGraw - Hill Education, ISBN: 9339213114.
5. Alexis Leon and Mathews Leon, Database Management Systems, 1st Edition,
Vikas Publishers, ISBN: 8182092221.
6. Vikram Vaswani, MySQL The complete Reference, 1st Edition, Tata Mcgraw
Hill Education Private Limited, ISBN: 0070586845.
7. Joel Murach, Murach's Mysql , Mike Murach & Associates Inc, ISBN:
9350237695.
8. Paul DuBois, MySQL Cookbook, 2nd Edition, O'Reilly Media, ISBN:
8184042809.
Objectives
Course Outline
Unit I
Unit II
Unit III
Unit IV
Unit V
Code generation – issues in the design of a code generator – the target language –
a simple target machine model – the program and instruction costs – address in the
target code – static allocation – stack allocation – run-time address for names –
basic blocks and flow graphs – representation of flow graphs. Code optimization -
the principal sources of optimization – data flow analysis – abstraction – data flow
analysis schema – data flow schemas on basic blocks – reaching definitions – live
variable analysis – available expressions. Region based analysis – regions – region
hierarchies for reducible flow graphs – overview of a region based analysis.
References
1. V Aho A, Ravi Sethi, D Ullman J, Compilers Principles, Techniques and Tools, 2nd
Edition, Pearson Education Singapore Pte Ltd, ISBN: 8131721019.
2. K. V. N. Sunitha, Compiler Construction, Pearson, ISBN:9789332500297.
3. W Appel and Andrew, Modern Compiler Implementation in C , 1st Edition,
Cambridge University Press, ISBN: 817596071X.
4. Allen I Holub, Compiler Design in C , 1st Edition, PHI Learning Pvt Ltd, ISBN:
812030778X.
5. Tremblay and Sorenson, The Theory and Practice of Compiler Writing , 1st Edition,
BSP Books Pvt Ltd, ISBN: 8178000776.
6. Torben Ægidius Mogensen, Basics of Compiler Design , Department of Computer
Science, University of Copenhagen (Online Edition).
Objectives
Course Outline
Unit I
Unit II
Unit III
Exceptions, threads & IO in Java - The file and standard streams, stream classes and
interfaces, using byte streams and character streams, threads - threads vs.
processes, creating threads, runnable interface, thread class, inter thread
communication, synchronization. Exceptions - basic of Java exception handling,
hierarchy, developing user defined exception classes.
Unit IV
Applets, AWT & Swing - applet class, types of applet, skeleton, applet tag, passing
parameters, event handling, delegation event model, event classes, listeners, AWT
classes and window fundamentals, frames, working with fonts, graphics and colors,
AWT controls, layouts and menus, dialogue boxes. Swings - Japplets, icon, labels,
buttons, textbox, combo box, tables and panes.
Unit V
References
1. Herbert Scheldt, Java Complete Reference, 8th Edition, Tata Mcgraw Hill
Education Private Limited, ISBN: 1259002462.
2. E Balaguruswamy, Programming in Java, : A Primer, 4th Edition, Tata Mcgraw Hill
Education Private Limited, ISBN: 007014169X.
3. Kathy Sierra, Head First Java, 2nd Edition, Shroff Publishers and Distributors Pvt
Ltd, ISBN: 8173666024.
4. David Flanagan, Jim Farley, William Crawford and Kris Magnusson, Java
Enterprise in a Nutshell: A Desktop Quick Reference , 3rd Edition, O'Reilly Media,
ISBN: 0596101422.
5. Grady Booch, James Rumbaugh and Ivar Jacobson, The Unified Modeling
Language User Guide, 2nd Edition, Pearson, ISBN: 8131715825.
Objectives
Course Outline
1. Creating database tables and using data types (create table, modify table,
drop table).
2. Data Manipulation (adding data with INSERT, modify data with UPDATE,
deleting records with DELETE).
3. Implementing the Constraints (NULL and NOT NULL, primary key and foreign
key constraint, unique, check and default constraint).
4. Retrieving Data Using SELECT (simple SELECT, WHERE, IN, BETWEEN,
ORDERED BY, DISTINCT and GROUP BY).
5. Aggregate Functions (AVG, COUNT, MAX, MIN, SUM).
6. String functions.
7. Date and Time Functions.
8. Use of union, intersection, set difference.
9. Implement Nested Queries & JOIN operation.
10. Performing different operations on a view.
11. Stored Procedure Programming – Simple Procedures – decision making –
Loops – Error handlers – Cursors – Functions - Triggers – Calling Stored
Procedure from Triggers.
Objectives
Course Outline
Unit I
Unit II
Unit III
Unit IV
Unit V
References
1. Richard O. Duda, Peter E. Hart and David G. Stork, Pattern Classification, CBS
Publishers & Distributors, 2nd Edition, ISBN: 9788126511167.
2. Gonzalez R.C. and Thomson M.G., Syntactic Pattern Recognition: An
Introduction, 1st Edition, Addison-Wesley, ISBN: 0201029316.
3. Fu K. S., Syntactic Pattern Recognition and Applications, Prentice Hall, ISBN:
0138801207.
4. Rajjan Shinghal, Pattern Recognition: Techniques and Applications , 1st Edition,
Oxford University Press India, ISBN: 0195676858.
Objectives
Course Outline
Unit I
Unit II
Different generations of Wireless Cellular Networks - 1G, 2G, 2.5G, 3G, 4G.
Telecommunication systems – GSM – DECT – TETRA – UMTS – IMT-2000. Wireless
LAN – Infrared Vs Radio transmission – Infrastructure Vs Adhoc networks – IEEE
802.11 – HIPERLAN – Bluetooth.
Unit III
Unit IV
Wireless network security – IEEE 80211i security – Wireless Transport Layer Security
– sessions and connections – protocol architecture – WAP end-to-end security.
Unit V
Java for wireless devices - setting up the development environment - basic data
types, libraries (CLDC, MIDP) - UI controls - displayable and display image - events
and event handling - list and choice - text box - alerts - persistent storage - record
stores – records - record enumeration - network MIDlets - the connection framework
- connection interface - connection using HTTP - datagram connection.
References
Objectives
Course Outline
Unit I
Unit II
Message authentication – approaches – MAC – one way Hash function – secure Hash
functions – Message Authentication Codes. Public key cryptography principles –
algorithms – digital Signatures.
Unit III
Unit IV
Transport level security – web security considerations – secure socket layer and
transport layer security – SSL architecture – SSL record protocol – change cipher
spec protocol – handshake protocol. Transport layer security - HTTPS – SSH. IP
Security – overview – policy – encapsulating security payload – combining security
associations – internet key exchange.
Unit V
References
Objectives
To introduce the advanced concepts of web development tools – Web 2.0, Web
Services, Python, SQLite and MVC architecture.
Course Outline
Unit I
Web 2.0 - definition, characteristics, key features, client side technologies (Ajax and
JavaScript frameworks - YUI library, Dojo toolkit, MooTools, jQuery, Ext JS and
prototype JavaScript framework), server side technologies (Ruby, Perl, Python,
Enterprise Java J2EE and Microsoft.NET Framework), concepts (Rich Internet
Application — Web-Oriented Architecture — Social Web), SLATES.
Unit II
Unit III
Unit IV
Server side programming using Python - server side scripting - CGI - role of Web
server – Apache web server – Python server side script – developing Python Server
Side Pages (PSP) – capturing form data – validation – processing data – exchange of
data between form and server.
Unit V
References
Objectives
Course Outline
Unit I
Unit II
Unit III
Unit IV
Unit V
References
Objectives
Course Outline
Unit I
Unit II
Unit III
Unit IV
Unit V
Graph mining - mining object, spatial, multimedia, text and web data -
multidimensional analysis and descriptive mining of complex data objects – spatial
data mining – multimedia data mining – text mining – mining the World Wide Web.
References
1. Jain Pei, Jiawei Han and Micheline Kamber, Data Mining Concepts and
Techniques, 3rd Edition, Elsevier, ISBN: 9380931913.
2. Alex Berson and Stephen J. Smith, Data Warehousing, Data Mining & OLAP ,
Computing Mcgraw-Hill, ISBN: 0070062722.
3. K.P. Soman, Shyam Diwakar and V. Ajay, Insight into Data mining Theory and
Practice, 1st Edition, Prentice Hall of India, ISBN: 8120328973.
4. G. K. Gupta, Introduction to Data Mining with Case Studies, 3rd Edition, PHI
Learning Pvt. Ltd, ISBN: 8120350022.
5. Pang-Ning Tan, Michael Steinbach and Vipin Kumar, Introduction to Data
Mining, 1st Edition, Pearson India, ISBN: 9332518653.
Objectives
Course Outline
Unit I
Introduction to database systems, file systems Vs DBMS, view of data – data
abstraction, view levels, data models, instances and schemas, data independence,
database languages, database architecture, database users, database administrator,
role of DBA. The entity – relationship (ER) model - entity sets, relationship sets,
attributes, constraints, mapping cardinalities, keys, ER diagrams, weak entity sets,
strong entity sets.
Unit II
Dictionary methods - string compression, LZ77 sliding window, MZW, GIF images.
Image compression - approaches to image compression, intuitive methods and
image transform, test images, JPEG, progressive image compression, vector
quantization.
Unit III
Unit IV
Audio compression - sound, digital audio, human auditory system, MPEG-1 audio
layer. Fractal based compression - IFS. Comparison of compression algorithms.
Implementation of compression algorithms.
References
Objectives
Course Outline
Unit I
Unit II
Unit III
Web application concepts for pervasive computing - history, WWW architecture,
protocols, trans-coding, client authentication via the Internet for pervasive
computing. WAP and beyond - introduction, components of the WAP architecture,
WAP infrastructure, WAP security issues, Wireless Markup Language, WAP push,
products, i-Mode, outlook.
Unit IV
Web voice technology - basics of speech recognition, voice standards, speech
applications, speech and pervasive computing, security personal digital assistants -
history, device categories, personal digital assistant operating systems, device
characteristics, software components, standards, mobile applications and personal
digital assistant browsers. Server side programming (Java) for pervasive computing -
Java 2 Enterprise Edition (Overview), servlets, Enterprise Java Beans, Java Server
Pages, Extensible Markup Language, Web Services, Model-View-Controller pattern.
Unit V
References
1. Jochen Burkhardt, Horst Henn, Stefan Hepper, Thomas Schaec and Klaus
Rindtorff, Pervasive Computing: Technology and Architecture of Mobile
Internet Applications, 14th Edition, Pearson Education, ISBN: 8177582801.
2. Stefen Poslad, Ubiquitous Computing: Smart Devices, Environments and
Interactions, Wiley India Pvt Ltd, ISBN: 8126527331.
3. Guruduth S. Banavar, Norman H. Cohen and Chandra Narayanaswami,
Pervasive Computing: An Application-Based Approach, Wiley-Blackwell, ISBN:
0471777404.
4. Frank Adelstein, S K S Gupta, GG Richard and L Schwiebert, Fundamentals of
Mobile and Pervasive Computing , Tata McGraw-Hill, New Delhi, ISBN:
0070603642.
5. Genco and S. Sorce, Pervasive Systems and Ubiquitous Computing , 1st
Edition, WIT Press, ISBN: 1845644824.
6. Somprakash Bandyopadhyay, Amitava Mukherjee and Debashis Saha,
Networking Infrastructure for Pervasive Computing Enabling Technologies and
Systems, 1st Edition, ISBN: 8184898037.
Objectives
Course Outline
Unit I
Unit II
Unit III
Operating system security - protected objects and methods of protection - memory
address protection - fence, relocation, base/bounds registers, tagged architecture,
segmentation, paging. Control of access to general objects - directory, access control
list. File protection mechanism – basics forms of protection, single permissions.
Authentication - authentication basics, password, authentication process challenge -
response, biometrics. Trusted operating systems - security policies for operating
systems, models of security - requirement of security systems, multilevel security,
access security, limitations of security systems. Trusted operating system design -
elements, security features, assurance, system flaws and assurance methods.
Unit IV
Unit V
References
Objectives
Course Outline
Unit I
Unit II
Unit III
Unit IV
Unit V
Text Books
References
Objectives
Course Outline
Unit I
Introduction to Big Data – definition & importance of Big Data - four dimensions of
Big Data - volume, velocity, variety, veracity – importance of big data – structured
data, unstructured data - the role of a CMS in big data management - integrating
data types into a big data environment - distributed computing and Big Data. Big
Data stack – layer 0,1 and 2 – Big Data management – operational databases –
relational databases – non relational databases – NoSQL - key-value pair databases
– document databases - columnar databases - graph databases - spatial databases.
Unit II
Unit III
Unit IV
Unit V
Understanding MapReduce - key/value pairs - the Hadoop Java API for MapReduce -
the Mapper class - the Reducer class - the Driver class - writing simple MapReduce
programs - Hadoop-provided mapper and reducer implementations - Hadoop-specific
data types - the Writable and WritableComparable interfaces - wrapper classes -
Input/output - InputFormat and RecordReader - OutputFormat and RecordWriter.
Implementing WordCount using streaming - analyzing a large dataset - summarizing
the UFO data - summarizing the shape data - a relational view on data with Hive -
creating a table for the UFO data - inserting the UFO data - redefining the table with
the correct column separator - creating a table from an existing file - SQL views.
References
1. Hurwitz, Alan Nugent, Fern Halper and Marcia Kaufman, Big Data for
Dummies, ISBN: 9781118504222.
2. Eelco Plugge, Peter Membrey and Tim Hawkins, The Definitive Guide to
MongoDB: The NOSQL Database for Cloud and Desktop Computing , 1st
Edition, Apress, ISBN: 9781430230519.
3. Chris Elaton, Derk Deroos, Tom Deutsch, George Lapis and Pual Zikopoulos,
Understanding Big Data: Analytics for Enterprise Class Hadoop and Streaming
Data, 1st Edition, ISBN: B006UWBBO6.
4. Garry Turkington, Hadoop Beginner's Guide, Packt Publishing Ltd, ISBN:
1849517304.
Objectives
Course Outline
Unit I
Unit II
Unit III
Unit IV
Unit V
References
1. Gerti Kappel, Birgit Proll, Siegried Reich and Werner Retschitzegger, Web
Engineering: The Discipline of Systematic Development of Web Applications ,
John Wiley and Sons Ltd, ISBN: 9780470064894.
2. Roger S Pressman and David Lowe, Web Engineering: A Practitioner's
Approach, 1st Edition, Tata Macgraw Hill Publications, ISBN: 9780073523293.
3. Leon Shklar and Rich Rosen, Web Application Architecture: Principles,
Protocols and Practices, 2nd Edition, Wiley, ISBN: 047051860X.
4. Guy W Leeky-Thompson, Just Enough Web Programming with XHTML, PHP,
and MySQL, 1st Edition, Cenagage Learning, ISBN: 159863481X.
5. Anders Moller and Michael Schwartzbach, An Introduction to XML and Web
Technologies, 1st Edition, Pearson Education, New Delhi, 2009.
6. Chrits Bates, Web Programming: Building Internet Applications , 3rd Edition,
Wiley India Edition, ISBN: 8126512903.
Semester IV
Objectives
Course Outline
Unit I
Unit II
Unit III
Unit IV
Managing project – time management – setting aims and objectives – techniques for
generating ideas – literature survey – types of information sources – writing
literature survey.
Unit V
References
Objectives
To give a practical exposure to the process of software development life cycle.
To develop a quality software solution by following the software engineering
principles and practices. Students are also encouraged to take up a research
oriented work to formulate a research problem and produce results based on its
implementation/simulation/experimental analysis.
Course Outline
Major project work is to be done individually by each student, under the guidance of
a faculty member of the concerned department.
Guide has to constantly monitor the works done by the student, imparting him/her
the necessary inputs for the successful completion of the project work.
Students can either take up a real-life application oriented project work or research
and development project. The student can formulate a project problem with the help
of her/his guide and submit the project proposal of the same. Approval of the
project proposal is mandatory. If approved, the student can commence working on
it, and complete it.
Objectives
Course Outline
Unit I
Unit II
Unit III
Unit IV
Unit V
References
1. Richard E Woods and Rafael C Gonzalez, Digital Image Processing , 3rd Edition,
Pearson Education Singapore Pte Ltd, ISBN: 8131726959.
2. B. Chanda and D.D. Majumder, Digital Image Processing and Analysis , 2nd
Edition, PHI Learning Pvt Ltd, ISBN: 8120343255.
3. A.K. Jain, Fundamentals of Digital Image Processing, 2nd Edition, PHI Learning
Pvt Ltd, ISBN: 8120309294.
4. W.K. Pratt, Digital Image Processing: PIKS Scientific Inside, 4th Edition, John
Wiley, ISBN: 0471767778.
5. Milan Sonka, Vaclav Hlavac and Roger Boyle, Image Processing Analysis and
Machine Vision, 3rd Edition, Ceneage Learning India Pvt Ltd, ISBN:
8131518833.
Objectives
Course Outline
Unit I
The Extended Entity Relationship model and object model - The ER model revisited,
motivation for complex data types, user defined abstract data types and structured
types, subclasses, super classes, inheritance, specialization and generalization,
constraints and characteristics of specialization and generalization, relationship types
of degree higher than two.
Unit II
Object-Oriented databases - overview of object-oriented concepts, object identity,
object structure, and type constructors, encapsulation of operations, methods, and
persistence, type hierarchies and inheritance, type extents and queries, complex
objects, database schema design for OODBMS, OQL, persistent programming
languages, OODBMS architecture and storage issues, transactions and concurrency
control, example of ODBMS.
Unit III
Unit IV
Unit V
Object databases on the web and semi structured data - web interfaces to the web,
overview of XML - structure of XML data, document schema, querying XML data -
storage of XML data, XML applications - the semi structured data model,
implementation issues, indexes for text data. Enhanced data models for advanced
applications - active database concepts, temporal database concepts, spatial
databases concepts and architecture, deductive databases and query processing,
mobile databases, geographic information systems.
References
Objectives
Course Outline
Unit I
Unit II
Unit III
Introduction to Android and smart phones, Android architecture & virtual machine,
mobile technology terminologies, setting up the environment, setting up emulators,
Android fundamentals - activities and applications activity life cycles, activity stacks,
activity states. Introduction to manifest, resources & R.java, assets, values –
strings.xml - form widgets, views, layouts & drawable resources - XML layouts, linear
layouts, relative layouts, table layouts, Android widgets, UI XML specifications
events, bundles & intents - explicit intents implicit intents event broadcasting with
intents event reception with broadcast receivers, adapters and data binding.
Unit IV
Files, content providers and databases - saving and loading files, SQLite databases -
Android database design - exposing access to a data source through a content
provider content provider registration native content providers, Android Debug
Bridge (adb) tool, Linkify.
Unit V
References
1. Terry Felke-Morris, Web Development & Design Foundations with HTML5 , 7th
Edition, Addison-Wesley, ISBN: 0133571785.
2. Html 5 Black Book: Covers CSS3, Javascript, XML, XHTML, Ajax, PHP and Jquery,
Kogent Learning Solutions Inc, ISBN: 9350040956.
3. Kessler, Programming HTML 5 Applications, OReilly Media, ISBN: 9350235904.
4. Robin Nixon, Html5 For Ios And Android: Beginner Guide, 1st Edition, McGraw-Hill
Education India Pvt .Ltd, ISBN: 101259003078.
5. Lauren Darcey and Shane Conder, Android Wireless Application Development :
Android Essentials (Volume 1), 3rd Edition, Pearson Education, ISBN:
9332518882.
6. Zigurd Mednieks, Rick Rogers, Lombardo John and Blake Meike, Android
Application Development, 1st Edition, O’Reilly Meida,
7. Reto Meier, Professional Android 2 Application Development, 1st Edition, Wiley
India Pvt Ltd, ISBN: 8126525894.
Objectives
Course Outline
Unit I
Basic networking concepts and topologies - OSI reference model, common network
devices, network topologies, MAC standards - need for storage networks – storage
devices - techniques evolution - benefits of SANs - SAN components and building
blocks - fibre channel basics - fibre channel topologies, fibre channel layers, classes
of service SAN topologies.
Unit 2
SAN fundamentals - SAN operating systems software and hardware types of SAN
technology - technology and configuration, high scalability and flexibility standards -
storage management challenges - networked storage implementation challenges -
storage subsystems for video services.
Unit III
Unit IV
Unit V
References
Objectives
Course Outline
Unit I
Unit II
Languages for semantic web and ontologies - web documents in XML – RDF -
schema – web resource description using RDF - RDF properties – topic maps and
RDF – overview – syntax structure – semantics – pragmatics - traditional ontology
languages – LOOM - OKBC – OCML - Flogic Ontology Markup Languages – SHOE –
OIL – AML – OIL – OWL.
Unit III
Ontology learning for semantic web - taxonomy for ontology learning – layered
approach – phases of ontology learning – importing and processing ontologies and
documents – ontology learning algorithms – evaluation.
Unit IV
Unit V
Applications - web services – semantic web services - security issues – current
trends.
References
Objectives
To learn the advanced features of Java programming language that equip the
students to develop web based applications with RDBMS.
Course Outline
Unit I
RMI & Servlets - introduction, architecture, defining remote objects, creating stubs
and skeletons, serializable classes, accessing remote objects, factory classes,
dynamically loaded classes, RMI activation, registering remote objects.
Unit II
Servlets, generic servlet, servlets that access request headers, develop servlets that
manipulate response headers, HTTP servlets, forms, HTTP protocols - configuring
Tomcat Server, servlet context, servlet context listener, servelet chaining.
Unit III
JNDI & EJB - architecture, context initial context class, objects in a context, binding
objects, accessing directory services, attributes and attribute interface modifying
directory entities, creating directories entities. EJB roles, architecture, container,
implementing a basic EJB object, implementing session beans, implementing entity
bean, deploying an enterprise bean object.
Unit IV
Java Server Pages (JSP) - developing JSP pages, technology, syntax using scripting
elements, syntax using the courier page directive, create and use JSP error pages,
building reusable web presentation, components, JSP technology syntax using the
include directive, JSP technology syntax using the jsp:include standard action,
developing JSP Pages using custom tags, problem with JSP technology scriptlet
code, given an existing custom tag library, develop a JSP page using the library,
developing a simple custom tag, structure and execution of a custom tag in a JSP
page, tag handler class for a simple empty custom tag, custom tag that includes its
body in the contour of the HTTP response, tag library description for a simple, empty
custom tag.
Unit V
References
1. Jason Hunter and William Crawford, Java Servlet Programming , 2nd Edition,
O'Reilly Media, ISBN: 0596000405.
2. Karl Moss, Java Servlets, McGraw-Hill, ISBN: 0074637398.
3. Barry Burd, JSP: JavaServer Pages, IDG Books, ISBN: 0764535358.
4. Prashant Sridharan, Javabeans Developer's Resource, ISBN: 0138873089.
5. Chuck Cavaness, Programming Jakarta Struts, 2nd Edition, O'Reilly Media,
ISBN: 0596006519.
6. Madhusudhan Konda, Just Hibernate: A Lightweight Introduction to the
Hibernate Framework, Oreilly Meida, ISBN: 9781449334376.
APPENDIX A
CSS4C02 | PROJECT WORK | GUIDELINES FOR
PROJECT REPORT
TITLE HERE
A PROJECT REPORT
Submitted by
<<College/Dept Emblem>>
MONTH YEAR
ACKNOWLEDGEMENT
Acknowledgments
I would like to thank THE ALMIGHTY's mercy towards me over the years………..
.................. ..................
I hereby declare that this submission is my own work and that, to the best of my
knowledge and belief, it contains no material previously published or written by
another person or material which has been accepted for the award of any other
degree or diploma of the university or other institute of higher learning, except
where due acknowledgment has been made in the text.
Signature :
Place : Name:
Date : Reg. No.:
ii
DECLARATION
I hereby declare that this submission is my own work and that, to the best of my
knowledge and belief, it contains no material previously published or written by
another person or material which has been accepted for the award of any other
degree or diploma of the university or other institute of higher learning, except
where due acknowledgment has been made in the text.
Signature :
Place : Name:
Date : Reg. No.:
iii
CERTIFICATE FROM GUIDE & HOD
CERTIFICATE
This is to certify that the project report entitled TITLE HERE!!! submitted by
<<Name of the Student>> (Register Number: ) to University of Calicut for the
award of the degree of Master of Science (M.Sc.) in Computer Science is a bonafide
record of the project work carried out by him/her under my supervision and
guidance. The content of the report, in full or parts have not been submitted to any
other Institute or University for the award of any other degree or diploma.
Signature Signature
Place :
Date :
(Office seal)
Certified that the candidate was examined by us in the Project Viva Voce
Examination held on ............................. and his/her Register Number is
.....................................
Examiners:
1.
2.
iv
LIST OF CONTENTS
Contents
Abstract Page No
ABSTRACT
Abstract
The abstract is a very brief summary of the report's contents. It should be about half
a page long. Somebody unfamiliar with your project should have a good idea of
what it's about having read the abstract alone and will know whether it will be of
interest to them.
The abstract is not the same as a summary in the sense you are think of. It is a
standalone account of the document giving purpose of the work (objectives),
method used, scope of the work, results, conclusions and recommendations.
The abstract, although it comes first logistically, always should be written at the
completion of the other chapters of the project report. It needs to be written last
because it is the essence of your report, drawing information from all of the other
sections of the report. It explains why the experiment was performed and what
conclusions were drawn from the results obtained.
A general guideline for an abstract has five sections or areas of focus: why the
experiment was conducted; the problem being addressed; what methods were used
to solve the problem; the major results obtained; and the overall conclusions from
the experiment as a whole.
Do not be misled, however, from this list into thinking that the abstract is a long
section. In fact, it should be significantly shorter than all of the others. All of this
information should be summarized in a clear but succinct manner if the abstract is
going to be successful. An estimated average length for all of this information is only
a single paragraph. Although this may seem as though it is a short length to contain
all of the required information, it is necessary because it forces you to be accurate
and yet compact, two essential qualities.
vi
LIST OF F IGURES
List of Figures
vii
LIST OF T ABLES
List of Tables
viii
INTRODUCTION
Chapter 1
Introduction
This is a general introduction about the project. Briefly summarize the relevance
and background information about the proposed work. It should have the following
sections.
Chapter 2
1. Problem Definition
2. Objectives
3. Motivation
4. Methodology
5. Scope
Chapter 3
DESIGN
Chapter 4
System Design
This chapter includes the following subsections.
DESIGN IMPLEMENTATION
Chapter 5
Implementation
This chapter is about the realisation of the concepts and ideas developed earlier. It
can also describe any problems that may have arisen during implementation and
how you dealt with them.
Do not attempt to describe all the code in the system, and do not include large
pieces of code in this section. Instead pick out and describe just the pieces of code
which, for example:
You should also mention any unforeseen problems you encountered when
implementing the system and how and to what extent you overcame them. Common
problems are:
3. Coding
4. Problems Encountered
Chapter 6
1. Test Plans
2. Unit Testing
a. Test Items (Test Cases)
3. Integration Testing
4. System Testing
a. Test Items (Test Cases)
5. Implementation - Changeover Plans
Chapter 7
Conclusion
The purpose of this section is to provide a summary of the whole thesis or report. In
this context, it is similar to the Abstract, except that the Abstract puts roughly equal
weight on all report chapters, whereas the Conclusion chapter focuses primarily on
the findings, conclusions and/or recommendations of the project.
All material presented in this chapter must have appeared already in the
report; no new material can be introduced in this chapter (rigid rule of
technical writing).
Usually, you would not present any figures or tables in this chapter (rule of
thumb).
Conclusions section can have the following (typical) content. These contents must
not be given in bulleted format.
Re-introduce the project and the need for the work though more briefly than
in the introduction.
Reiterate the purpose and specific objectives of your project.
Recap the approach taken similar to the road map in the introduction.
However, in this case, you are re-capping the data, methodology and results
as you go.
Summarize the major findings and recommendations of your work.
Future Enhancements
Identify further works that can be added to make your system to meet the
challenges of tomorrow. You can also include whatever requirements you could not
fully due to the scarcity of time/resources.
REFERENCE
Bibliography
Ideas or contents taken from other sources should be properly cited. It is important
that you give proper credit to all work that is not strictly your own, and that you do
not violate copyright restrictions.
GENERAL INSTRUCTIONS
APPENDIX B
CSS4C02 | PROJECT WORK | A SAMPLE
EVALUATION
Components Weightage
Monthly progress 4
Regularity 1
Total 5
Suppose that we plan 6 phases for monthly review. Evaluation criteria for each
phases is as shown below. Recall that this can be set conveniently by the EC.
Phase Grade
Component
Points
Phase I Relevance of the Topic, Statement of Objectives,
20
Methodology
Quality of Presentation 2
Quality of Interim Report 5
Total 27
Phase II Quality of Literature Survey/Product Review 20
Quality of Presentation 2
Quality of Interim Report 5
Total 27
Phase III Quality of Analysis Phase 20
Quality of Presentation 2
Quality of Interim Report 5
Total 27
Phase IV Quality of Design Phase 20
Quality of Interim Report 5
Quality of Presentation 2
Phase V Quality of Implementation/Simulation 50
Quality of Interim Report 5
Quality of Presentation 5
Total 87
Phase VI Quality of Testing/Result Analysis 20
Quality of Contributions 20
Identification of Future Work 8
Quality of Project Report 25
Publications/Presentations out of the Project Work 10
Demonstration of the Project Work 10
Total 93
Total 288
Each of the phases such as Analysis Phase can be conveniently subdivided into
subsections such as DFD Level 0, DFD Level 1, DFD Level 2, ER Diagram/Class
Diagram. Other components in each phase can also be subdivided appropriately, if
required.
Assume that a student got 250 points after 6 phases of evaluation. Also assume that
his/her regularity performance worth 4 points. Now the final grade for the student is
calculated as ((250/72) X 4 + 4 X 1)/5 = (3.47 X 4 + 4)/5 = 3.57 (A grade).
APPENDIX C
MODEL QUESTION PAPERS
Model question papers for few papers are included as a guideline for the
faculty/subject experts for question papers/students.
Part A
Answer all questions
Each question carries weightage of 1
(6X2=12 weightage)
Part C
Answer any 3 questions, Each question carries 4 weightage
22. Show that Strassen’s matrix multiplication algorithm is faster than standard matrix
multiplication algorithm.
23. Explain Dynamic Programming with an example.
24. The recurrence T(n) = 7T(n/2) + n2 describes the running time of an algorithm A. A
competing algorithm AI has a running time of TI(n)= kTI(n/4)+n 2. What is the largest
integer value for k such that AI is asymptotically faster than A?
25. Prove that Hamiltonian Cycle is NP Complete.
26. Prove that the runtime complexity of merge sort in best case is θ(n log n).
27. Can the master method be applied to the recurrence T(n) = 2T(n/2) + n log n ? Why or
Why not?
(3X4=12 weightage)
Part A
Answer all questions
Each question carries weightage of 1
Part B
Answer any six questions
Each question carries a weightage of two
13. What is the difference between mode switch and process switch?
14. Explain two categories of thread implementation.
15. Explain monitors.
16. Explain the conditions for Deadlock. How deadlock can be described in terms of resource
allocation graph.
17. Explain thread scheduling.
18. What are the characteristics of Real Time Operating Systems?
19. Explain about any two concurrency mechanisms in Unix.
20. Explain trashing.
21. How does client/server differ from other distributed processing solution.
Part C
Answer any three questions
Each question carries a weightage of four
22.
A B C D A B C D A B C D
P0 0 0 1 2 0 0 1 2 1 5 2 0
P1 1 0 0 0 1 7 5 0
P2 1 3 5 4 2 3 5 6
P3 0 6 3 2 2 3 5 6
P4 0 0 1 4 0 6 5 6
Part A
Answer all questions.
Each question carries 1 weightage.
Part B
Answer any six questions.
Each question carries 2 weightage.
(6 x 2 = 12 weightage)
Part C
Answer any three questions
Each question carries 4 weightage
Part A
Answer all questions.
Each question carries 1 weightage.
6.What are the different types of anomalies that may occur while designing a database.
11.Discuss the concept of encapsulation and how it is used to create abstract data types,
Part B
15.Discuss how the entity integrity and referential integrity are implemented using SQL.
17.What are the main differences between designing a relational database and an object database.
20.Between the properties dependency preservation and losslessness, in database design,which one
must be definitely satisfied.Why.
Part C
22.Discuss the various types of join operations in relational algebra. How are the outer join
operations different from join operations.
23.Define Boyce-Codd normal form.How is it different from third normal form.Why is it considered
a stronger form of 3NF.
24.What is aview in SQL.Discuss the problems related to view update and how views are
implemented.
1. What is a Compiler?
2. What are the three phases of analysis of a source program?
3. Define lexical analysis.
4. Define symbol table.
5. What is meant by backpatching?
6. Define input buffering.
7. Define regular expression.
8. What is meant by a parser?
9. Define quadruple.
10. Write a note on peephole optimization.
11. What do you mean by Lexeme?
12. Define ambiguity.
(12X1=12 weightage)
Part B
Answer any 6 questions
Each question carries 2 weightage
(6X2=12 weightage)
Part C
Answer any 3 questions.
Each question carries 4 weightage
22. What are the phases of a Compiler? Explain in detail with the support of a diagram.
23. Find, if the string aaa bbb ccc can be derived from the productions
S ABSc, S Abc, BA AB, Bb bb, Ab ab and Aaaa.
24. How can we convert an NFA to a DFA? Explain with an example.
25. What do you mean by Syntax analysis? Explain in detail.
26. Describe the process of creating symbol table entries.
27. Draw and explain the translation of the statement k := i + j * 1024
(3X4=12 weightage)
(12X1=12 weightage)
Part B
Answer any 6 questions
Each question carries 2 weightage
13. Explain different LAN topologies with the help of examples and diagrams.
14. How mail is delivered between sender and receiver using SMTP?
15. Explain routing. Differentiate between unicast and multicast routing.
16. Differentiate between pure Aloha and slotted Aloha.
17. Explain address resolution in ARP.
18. Compare IPv4 and IPv6.
19. Explain the services provided by transport layer.
20. Explain two different transmission mediums for communication.
21. Explain how FTP works.
(6X2=12 weightage)
Part C
Answer any 3 questions.
Each questions carries 4 weightage
22. Explain TCP/IP reference model. Also explain significance of each layer with the help of
diagram.
23. Compare TCP and UDP with adequate diagrams.
24.Explain Cyclic Redundancy Check with example.
25. Explain CSMA and CSMA/CD.
26. Explain ATM in detail.
27. Explain data encryption and decryption in detail.
(3X4=12 weightage)
Part B
Answer any 6 questions
Each question carries 2 weightage
Part C
Answer any 3 questions.
Each questions carries 4 weightage
Part B
Answer any 6 questions
Each question carries 2 weightage
13. Explain vulnerability, threats, attacks and controls.
14. Briefly describe different classes of computer criminals.
15. Explain incomplete mediation and it’s security implications.
16. What is paging? How can paging be used in combination with segmentation?
17. What are the various types of intermediate code representations?
18. Explain file protection mechanisms.
19. Describe hazard analysis techniques.
20. How would you explain contingency planning?
21. Give a brief note on assurance management in trusted operating systems.
(6X2=12 weightage)
Part C
Answer any 3 questions.
Each questions carries 4 weightage
13. Distinguish between event driven versus time driven model execution
14. Write about discrete and continues simulation models.
15. What is genetic mapping?
16. What is gene prediction? Write any two methods.
17. Explain maximum likelihood approach in phylogenetic analysis
18. Briefly write the basic concept of microarray technology and its use.
19. Write short note on Rasmol and Swiss PDB viewer.
20. Distinguish between rigid and flexible docking.
(6X2=12 weightage)
Part C
Answer any 3 questions.
Each question carries 4 weightage
22. List and explain the different new form element types in HTML 5?
23. Write a short note on jQuery effects.
24. Discuss how phone services are accessed in android applications.
25. Discuss the components of an Android application.
26. What is a Layout? Enumerate various layouts available for android development.
27. Explain the XML and JSON parsing in Android.
(3X4=12 weightage)