Syllabus PDF
Syllabus PDF
MESRA
RANCHI, INDIA
P.G Programme
Institute Vision
To become a Globally Recognized Academic Institution in consonance with the social,
economic and ecological environment, striving continuously for excellence in education,
research and technological service to the National needs.
Institute Mission
To educate students at Undergraduate, Postgraduate Doctoral and Post-Doctoral levels to
perform challenging engineering and managerial jobs in industry.
To provide excellent research and development facilities to take up Ph.D. programmes and
research projects.
To develop effective teaching and learning skills and state of art research potential of the
faculty.
To build national capabilities in technology, education and research in emerging areas.
To provide excellent technological services to satisfy the requirements of the industry and
overall academic needs of society.
Department Vision
The department strives to be recognized for outstanding education and research, leading to
excellent professionals and innovators in the field of Computer Science and Engineering,
who can positively contribute to the society.
Department Mission
To impart quality education and equip the students with strong foundation that could make
them capable of handling challenges of the new century.
To maintain state of the art research facilities and facilitate interaction with world's leading
universities, industries and research organization for constant improvement in the quality of
education and research.
PEO2:To be well prepared for pursuing higher studies in related fields of teaching and research.
PEO 3:To be aware of the requirements of being an ethical and professional leader and inculcating
team spirit.
PEO4:To inculcate the ability to innovate and contribute towards the growth of the nation.
ProgrammeOutcomes (POs)
PO3:Identify modern tools and techniques through critical thinking for solving complex problems.
PO4:Use the computational resources efficiently to develop software for the industry need.
PO5:Understand and assess societal, environmental, safety, legal and ethical norms for
professional computing practices.
PO7:Recognize the need for self-motivation, learning and unlearning to engage in life-long
learning for continual development.
PO8:Excel in descriptive oral, written communication and presentation skills required for
documenting and delivering project artefacts effectively.
Course Objectives
This course enables the students to:
SYLLABUS
(8L)
Module III:
Group:Semi group, Group, Finite and infinite groups, Sub-groups, Cosets, Lagranges Theorem, Ring and
Field, Vector, Vector space and subspace, Linear combination of vectors, Basis.
Coding: Codewords and code, Encoding and decoding function, Hamming distance, Error detection and
correction of codes
(8L)
Module-IV and V:
Graph Theory: Basic Terminology, Types of graphs, Graph Representation, Graph Isomorphism,
Connectivity, Euler and Hamiltonian graphs, Planar Graphs, Graph Colouring, Chromatic number and
chromatic polynomial
Trees: Basic Terminologies and properties of Trees, Introduction to Spanning Trees, Minimum spanning
trees. Propositional Logic: Proposition, Logical operation and its properties, Tautologies, Equivalences
(16L)
Books recommended:
TEXT BOOK
1. KolmanBusby and Ross Rehmann, Discrete Matheamatical Structures., 5/e, Pearson
Education, 2006.
2. N. Chandrasekaran and M. Umaparvathi, Discrete Mathematics, PHI
3. Chakraborty S.K.and Sarkar B.K.,Discrete Mathematics, Oxford University Press, New
Delhi, India, 2010(ISBN No.- 0-19-806543-4).
REFERENCE BOOK
1.
PHI, 2016. (R1)
2.
(R2)
nd
3. C. L. LIU, Edition, 2001. (R3)
th
4. Edition, Maxwell, Macmillan International.
(R4)
3 Quizzes 30 % (3 × 10%)
Assignment (s) 10
Indirect Assessment
1. Student Feedback on Faculty
2. Student Feedback on Course Outcome
Course Objectives
This course enables the students to:
1. Derive appropriate numerical methods to solve algebraic, transcendental
equations and linear system of equations
2. Approximate a function using various interpolation techniques, to find the
numerical solution of initial value problems
3. Apply concepts in probability theory, the properties of probability distributions
4. Estimation of mean, variance and proportion, the concepts of statistical
hypothesis
Course Outcomes
After the completion of this course, students will be able to:
CO1 Solve algebraic, transcendental equation and linear system of equations using an
appropriate numerical method arising in various engineering problems
CO2 Evaluate derivative at a value using an appropriate numerical method in various
research problems, solve differential equation numerically
CO3 Learn basic probability axioms, rules and the moments of discrete and continuous
random variables as well as be familiar with common named discrete and
continuous random variables.
CO4 Find the point and interval estimates, analyse data statistically and interpretation
of the results
SYLLABUS
Module I:
REFERENCE BOOK
th
1. Edition, Pearson Education, New
Delhi, 2006. (R1)
2. -Brooks/Cole, Indian
Reprint, 2005. (R2)
COURSE OUTCOME (CO) ATTAINMENT ASSESSMENT TOOLS & EVALUATION
PROCEDURE
3 Quizzes 30 % (3 × 10%)
Assignment (s) 10
Indirect Assessment
1. Student Feedback on Faculty
2. Student Feedback on Course Outcome
Course Delivery Methods
Course Objectives
This course enables the students to:
1. Analyze and demonstrate writing and speaking processes through invention,
organization, drafting, revision, editing, and presentation.
2. Understand the importance of specifying audience and purpose and to select
appropriate communication choices.
3. Interpret and appropriately apply modes of expression, i.e., descriptive,
expositive, Narrative, scientific, and self-expressive, in written, visual, and
oral communication
4. Participate effectively in groups with emphasis on listening, critical and
reflective thinking, and responding.
5. Develop the ability to research and write a documented paper and/or to give
an oral presentation.
Course Outcomes
After the completion of this course, students will be able to:
CO1 Apply business communication strategies and principles to prepare effective
communication for domestic and international business situations.
CO2 Utilize analytical and problem-solving skills appropriate to business
communication.
CO3 Participate in team activities that lead to the development of collaborative
work skills.
CO4 Select appropriate organizational formats and channels used in developing
and presenting business messages
CO5 Communicate via electronic mail, Internet, and other technologies and
deliver an effective oral business presentation.
SYLLABUS
Module I:
Books recommended:
TEXT BOOK
1. (T1)
2.
Hill. (T2)
3. (T3)
REFERENCE BOOK
1. (R1)
2. (R2)
3. (R3)
3 Quizzes 30 % (3 × 10%)
Assignment (s) 10
Indirect Assessment
1. Student Feedback on Faculty
2. Student Feedback on Course Outcome
Course Objectives
This course enables the students to:
1. To understand the concept of management principles and practices, as a
discipline, as an art or a science, management and administration, managerial
skills, roles of a manager and levels of management .
2. To compare and contrast various development of management thought such as
early classical approaches, administrative management, neo-classical approaches,
behavioural approaches, modern approaches, business ethics and social
responsibility.
3. To classify the type of plans and to critically examine different types of planning
and select the types of decisions for further growth of the organization.
4. To create an organizational structure-formal and informal organization to point
out span of control, authority, responsibility, accountability, delegation of
authority, Departmentation, decentralization and can design a plan for manpower
planning, job design, recruitment and selection, training and development and
performance appraisal.
5. To develop the core of leadership, directing function, motivational theories,
communication process and different types of control system to facilitate change
for the development of the organization.
Course Outcomes
After the completion of this course, students will be able to:
CO1 To Debate management principles and practices as an art or a science, classify
managerial skills and roles being played by a manager and recommend
appropriate organisational structure.
CO2 To identify factors affecting Decision-making and Planning activity at all levels in
an organization.
CO3 To Explain the key decisions related to the various Staffing functions in an
organisation.
CO4 To analyse leadership styles, Communication and Motivation strategies adopted
by managers and comment on their appropriateness. vis a vis nature of the
organisation.
SYLLABUS
Module I:
Books recommended:
TEXT BOOK
1. (T1)
2. (T2)
3. (T3)
REFERENCE BOOK
1. (R1)
2. (R2)
3.
Harold, Mc Graw Hill. (R3)
4. (R4)
Indirect Assessment
1. Student Feedback on Faculty
2. Student Feedback on Course Outcome
Course
Course Delivery
CD Course Delivery methods Outcome Method
Lecture by use of boards/LCD projectors/OHP
CD1 projectors CO1 CD1
CD2 Tutorials/Assignments CO2 CD1 and CD2
CD3 Seminars CO3 CD1 and CD2
CD4 Mini projects/Projects CO4 CD 1,CD2
CD5 Laboratory experiments/teaching aids
CD6 Industrial/guest lectures
CD7 Industrial visits/in-plant training
Self- learning such as use of NPTEL materials and
CD8 internets
Course Objectives
This course enables the students to:
1. Understand how they can solve real life problems using computers.
2. Analyze real life problems for finding solutions to them.
3. Design mechanisms for developing the solution in computer understandable
form.
4. Implement the solution with C programming language
5. Able to implement the algorithms designed by them using C-programming
language
Course Outcomes
After the completion of this course, students will be able to:
CO1 Develop basic understanding of computers, the concept of algorithm and
algorithmic thinking.
CO2 Develop efficient algorithms for solving a problem. .
CO3 Use the basic C language for solving engineering or other real-life problems.
CO4 Design an algorithmic solution for a given problem.
CO5 Implement the algorithms designed by them using C-programming language and
shall be capable of explaining the various concepts like decision making, looping,
branching, arrays, functions, recursion, structures, pointers, unions and files of C
language .
Books recommended:
TEXT BOOK
1. 7th Edition, Pearson
Education, New Delhi, 2006.(T1)
th
2. Hanly J.R., Edition,
Pearson Education, New Delhi, 2004.(T2)
REFERENCE BOOK
Direct Assessment
Indirect Assessment
1. Student Feedback on Faculty
2. Student Feedback on Course Outcome
Course Objectives
This course enables the students to:
1. To provide knowledge of Computer Architecture
2. Employ knowledge of various Digital Logic Circuits, Data Representation,
Register and Processor level Design and Instruction Set architecture
3. To develop the logical ability to Determine which hardware blocks and control
lines are used for specific instructions
4. Understand memory organization, I/O organization and its impact on computer
cost/performance.
5. Know merits and pitfalls in computer performance measurements.
Course Outcomes
After the completion of this course, students will be able to:
CO1 Describe the merits and pitfalls in computer performance measurements and
analyze the impact of instruction set architecture on cost-performance of
computer design
CO2 Explain Digital Logic Circuits, Data Representation, Register and Processor
level Design and Instruction Set architecture
CO3 Solve problems related to computer arithmetic and Determine which hardware
blocks and control lines are used for specific instructions
CO4 Design a pipeline for consistent execution of instructions with minimum
hazards
CO5 Explain memory organization, I/O organization and its impact on computer
cost/performance.
Direct Assessment
Indirect Assessment
1. Student Feedback on Faculty
2. Student Feedback on Course Outcome
Course Objectives
This course enables the students:
1. To learn computer language.
2. To Learn coding for problems.
3. To learn the problem-solving process through computer.
4. To know the limitations of system during program execution.
5. To know the practical application of various programming techniques.
Course Outcomes
After the completion of this course, students will be able:
CO1 To formulate simple algorithms for arithmetic and logical problems.
CO2 To translate the algorithms to programs.
CO3 To test and execute the programs and correct syntax and logical errors.
CO4 To apply programming to solve simple numerical method problems,
differentiation of function and simple integration.
CO5 To decompose a problem into functions and synthesize a complete program using
divide and conquer approach.
11 10 11
11 10 9 10 11
11 10 9 8 9 10 11
7. WAP to convert a decimal number into an equivalent number of the input base. Test your
program for base 2,8,10 & 16.
8. WAP to read a number n, and print it out digit-by-digit, as a series of words. For e.g. 123
14. WAP to find the product of two matrices A and B. Display the source matrices and product
matrix C in matrix format.
15. WAP to find whether a given matrix is a triangular matrix or not.
16. WAP to find the transpose of a matrix. Display the source and the transposed matrix in
matrix format.
Books recommended:
TEXT BOOK
1. Education, 7th Edition.
(T1)
2. -Hill. (T2)
3. E. Balaguruswamy, Programming in ANSI C, Tata McGraw-Hill. (T3)
4. R.G.Dromey, How to Solve it by Computer, Pearson Education. (T4)
Indirect Assessment
1. Student Feedback on Faculty
2. Student Feedback on Course Outcome
Course Objectives
This course enables the students to:
1. Derive appropriate numerical methods to solve algebraic, transcendental
equations and linear system of equations
2. Approximate a function using various interpolation techniques, to find the
numerical solution of initial value problems
3. Apply concepts in probability theory, the properties of probability distributions
4. Estimation of mean, variance and proportion, the concepts of statistical
hypothesis
Course Outcomes
After the completion of this course, students will be able to:
CO1 Solve algebraic, transcendental equation and linear system of equations using an
appropriate numerical method arising in various engineering problems
CO2 Evaluate derivative at a value using an appropriate numerical method in various
research problems, solve differential equation numerically
CO3 Learn basic probability axioms, rules and the moments of discrete and continuous
random variables as well as be familiar with common named discrete and
continuous random variables.
CO4 Find the point and interval estimates, analyse data statistically and interpretation
of the results
Course Objectives
This course enables the students:
A. To provide knowledge of practical implementations and usage of Data Structures
and Algorithms.
Course Outcomes
After the completion of this course, students are expected to
1. Identify various data structures and their usages.
MODULE II
Stacks, Queues, Dequeues: The Stack, Queue, Dequeue ADTs, Simple Array Based Stack,
Queue, Dequeue Implementation, Implementing Stack, Queue with Singly Linked List, Reversing
an Array using Stack, Matching Parenthesis and HTML tags, A Circular Queue.(8L)
MODULE III
Trees: General Trees, Binary Trees, Implementing Trees, Tree Traversal Algorithms,
BinarySearch Trees, AVL Trees, B Trees.
(8L)
MODULE IV
Sorting: Merge sort, Quick sort, Studying sorting through algorithmic lens, Comparing
SortingAlgorithms. (8L)
Heap: Priority Queues, Array Implementation of Heaps, Construction of Heaps, Heap Sort.
MODULE V
Graphs: Data Structures for graphs, Graph Traversals, Transitive Closure, Directed Acyclic
Graphs, Shortest Paths, Minimum Spanning Trees. (8L)
Text book:
1.
th
Edition, 2014.
2. Klein Shmuel Tomi, Basic Concepts in Data Structures, Cambridge University Press, 1st
Edition, 2016.
Reference books:
1.
st
2. Edition.
Direct Assessment
3 Quizzes 30 % (3 × 10%)
Assignment (s) 10
Indirect Assessment
1. Student Feedback on Faculty
2. Student Feedback on Course Outcome
Course Objectives
After the completion of this course, students will be:
A. Developing computer skills to solve computational problems in biology
B. Using the biological databases to retrieve various biological information
C. Applying the tools to do biological analysis
D. Identifying and solving various biological challenges
E. Able to predict the secondary and tertiary structures of protein sequences.
Course Outcomes
After the completion of this course, students will be:
1. Describe the contents and properties of the most important bioinformatics
databases.
3. Explain the principle for, and execute pairwise sequence alignment by dynamic
programming.
Module 1:
Major Information Resources & Databases in Bioinformatics: Information Resources: NCBI,
EBI, ExPasy, Entrez, Derived (Secondary) Databases of Sequences, Different Bio-sequence File
Formats. (8L)
Module 2:
Sequence Analysis: Homology, Gap Penalty, Scoring matrices (PAM, BLOSUM), Dot matrix
method, Dynamic programming using Needleman-Wunschalgorithm,Scoring methods of MSA (Sum
of Pair), BLAST and FASTA.(8L)
Module 3:
Phylogenetic Analysis: Molecular Phylogenetics: Basics, molecular clock, Substitution Models of
evolution, Tree reconstruction methods (Distance based).(8L)
Module 4:
Molecular Modeling and Molecular Docking: Structure alignment: superimposition and RMSD
calculations, DALI, Classification of 3-D structures of proteins,SCOP, CATH, Structure
Prediction of Protein Structure (Chou-Fasman), Homology modelling. (8L)
Module 5:
Applications of Bioinformatics: Cheminformatics, Bigdata analysis, Microarray - Data
analysis, Theory and Algorithms, motif analysis and presentation.(8L)
Textbook
1. Bioinformatics: Sequence and Genome Analysis, David W Mount, Cold Spring
Harbor Laboratory Press, New York (September 2004)
Guidebook on Molecular Modeling In Drug Design (Illustrated), J. G. Vinter,
Mark Gardner (Editor), J. G. Vinter (Editor), CRC Press (May 1994) ISBN: 0849377722
Binformatics: a practical guide to the analysis of genes and proteins, Baxevanis A.,
Ouellette F.B.F., John Wiley and Sons, New York.
Reference books:
1. Fundamental Concepts of Bioinformatics, Dan E Krane, Michael L Raymer, Benjamin-
Cummings Pub Co (Sept 2002, ISBN 0805346333)
Direct Assessment
Indirect Assessment
1. Student Feedback on Faculty
2. Student Feedback on Course Outcome
Course Objectives
This course enables the students to:
1. Present the main components of OS and their working
2. Introduce the concepts of process and thread and their scheduling policies
4. Analyze the different techniques for managing memory, I/O, disk and files.
Course Outcomes
After the completion of the course student will be able to:
1. Describe the main components of OS and their working
2. Explain the concepts of process and thread and their scheduling policies
4. Compare the different techniques for managing memory, I/O, disk and files.
MODULE: II
Processes and Threads: Processes and Programs, Programmer view of Processes, OS view of
Processes, Threads, Case studies of Processes and Threads.(8L)
MODULE: III
Memory Management: Managing the Memory Hierarchy, Static and Dynamic Memory
Allocation, Memory Allocation to a Process, Reuse of Memory, Contiguous Memory Allocation,
Noncontiguous Memory Allocation, Paging, Segmentation, Segmentation with Paging, Kernel
Memory Allocation, A Review of Relocation, Linking and Program Forms.(8L)
Virtual Memory: Virtual Memory Basics, Demand Paging, Page Replacement Policies, Memory
Allocation to a Process, Shared Pages, Memory Mapped Files, Unix Virtual Memory, Linux
Virtual Memory, Virtual Memory using Segmentation.(8L)
MODULE: IV
File Systems: File System and IOCS, Files and File Operations, Fundamental File Organizations,
Directory Structures, File Protection, Interface between File System and IOCS, Allocation of Disk
Space, Implementing File Access, File Sharing Semantics, File System Reliability, Virtual File
System, Unix File System, Linux File System, Windows File System, Performance of File
Systems.(8L)
MODULE: V
Security and Protection: Overview of Security and Protection, Goals of Security and Protection,
Security Attacks, Formal and Practical aspects of Security, Encryption, Authentication and
Password Security, Access Descriptors and the Access Control Matrix, Protection Structures,
Capabilities, Unix Security, Linux Security, Windows Security.(8L)
Text Book:
nd
1. Dhamdhere D.M., - Edition, TMH, New
Delhi, 2006.
2002.
Direct Assessment
Indirect Assessment
1. Student Feedback on Faculty
2. Student Feedback on Course Outcome
Course Objectives
This course enables the students:
A. The course shall allow students to understand the basic tenets of OOP.
B. The course will exemplify the basic syntax and constructs of C++.
C. The course will help students understand the application OOP principles in various
use cases.
D. The course will explain basic C++ characteristics and their working.
E. The course aims to expose students to newer C++ constructs like NIO, Lambdas etc.
Course Outcomes
After the completion of this course, students will be:
1. Identify the difference between procedural and OO programming.
2. Construct programs using various OOP principles.
3. Design programs using C++
4. Operate on files and strings in real life scenarios.
5. Analyze thread performance and inter thread communication issues
MODULE: II
Modifying Objects: Assignment, Const Definitions, Input Statements, Computing the Number of
Molecules in a Hydrocarbon, Compound Assignment, Increment and Decrement, Estimating
Yearly Savings of Change, The String Class, EzWindows, Moving Lawns.(8L)
Control Constructs: Boolean Algebra, A Boolean Type, Conditional Execution Using the if
Statement, Conditional Execution Using the switch Statement, Computing a Requested
Expression, Validating a Date, Iteration Using the while Statement, Simple String and Character
Processing, Iteration Using the for Statement, Simple Data Visualization, Solving the Lazy Hobo
Riddle, Iteration Using the do Construct.(8L)
MODULE: III
Functions Usage Basics and Libraries: Function Basics, The Preprocessor, Using Software
Libraries, The iostream Library, The iomanip Library, The fstream Library, The math Library,
Library ctype, The assert macros.
MODULE: IV
The Class Construct and Object-Oriented Design: Introducing a Parameter-Defined Data
Type, The Rectangle Shape Class, Using the Rectangle Shape Class, Constructors, Building a
Kaleidoscope, Object-Oriented Analysis and Design.
Pointers and Dynamic Memory: Lvalues and Rvalues, Pointer Basics, Constant Pointers and
Pointers to Constants, Arrays and Pointers, Character String Processing, Program Command-line
Parameters, Pointers to Functions, Dynamic Objects, A Simple ADT for Representing Lists of
Integer Values.(8L)
Templates and Polymorphism: Generic actions and Types, Function Templates, Class
Templates, A Simple List Class Using a Class Template, Sequential Lists, Polymorphism, Virtual
Function Nuances, Abstract Base Classes, Virtual Multiple Inheritance.(8L)
Text Book:
nd
Object- Edition, TMH Education, New Delhi, 2000.
Reference Book:
th
Direct Assessment
Indirect Assessment
1. Student Feedback on Faculty
2. Student Feedback on Course Outcome
Course Objectives
This course enables the students:
A. To observe that how the real world data is stored, retrieved, and communicate under
the DBMS environment
B. To design a logical model which having the unique relation between the Data.
C. To apply the query for the modification of the system.
D.
data.
E. To discuss a system which allows to restrict the uncontrolled exaction and provide
rigorous variation of the task.
Course Outcomes
After the completion of this course, students will be:
1. Describe various data models and schemas used in database management systems.
2. Explain the fundamental concepts, data definitions and query processing tasks in
relational querylanguages.
3. Recognize database design theory, and evaluate functional dependencies and normal
forms indatabases.
4. Formulate the operations of transaction and concurrent query processing tasks to
obtain the correctresults even under strict time constraints.
5. Interpret the foundational concepts of distributed databases. Illustrate several
techniques related totransaction management and query processing in distributed
database management systems.
MODULE - II
Relational Model: Concepts, Constraints, Languages, Design and Programming: Relational
database Schemas, Relational Algebra, Relational Calculus (Tuple Relational calculus and
Domain Relational calculus), Update operations, Transactions, Dealing with constraint violations.
Binary Relational operation: JOIN and DIVISION, SQL, More complex SQL Queries, Security &
Integrity violations, authorization and views, integrity constants, encryption, Statistical databases
(8L)
MODULE - III
Database Design Theory and Methodology: Pitfalls in relational database design, Functional
Dependencies, Decomposition Using Functional Dependencies. Normalization using functional
Dependencies, General Definition of First, Second, Third and Forth Normal Form. Boyce-Codd
Normal Form(BCNF), Multivalued and join dependencies, DKNF, Atomic values, Data-base
Design Process. Modeling Temporal Data, Alternative approaches to database design. (8L)
MODULE - IV
Transaction Processing Concepts and Concurrency Control Techniques: Transaction
Processing, Desirable Properties of Transactions, Transaction State, Characterizing Schedules
based on Recoverability and Serializability. Lock-Based Protocols, Timestamp-Based Protocols,
Validation-Based Protocols, Multiple Granularity, Deadlock Handling, Recovery and Atomicity,
Log-Based Recovery.(8L)
MODULE - V
Distributed Databases and Client-Server Architectures: Concepts and Types of Distributed
databases, data fragmentation, Replication and Allocation Techniques for Distributed Database
Design, Query Processing in Distributed Databases, Overview of Concurrency Control and
Recovery in Distributed Databases, An Overview of 3-Tier Client-Server Architecture.(8L)
Text Book:
th
Edition, Pearson
Education, 2006.
Reference Book:
th
Edition, McGraw Hill Higher
Education, 2005.
Direct Assessment
Indirect Assessment
1. Student Feedback on Faculty
2. Student Feedback on Course Outcome
Course Objectives
A. To impart knowledge about the scope of financial management and accounting with
understanding the concept of financial functions and decision making.
B. To give knowledge about the various sources of finance
C. To impart knowledge on capital budgeting decision making with a basic concept of
different techniques to appraise business projects
Course Outcomes
1. Apply the concepts of financial management as well as accounting and analyse the
statements with the help of Ratio Analysis.
2. Identify and implement long and short term sources of finance through capital market
and money market.
3. Applydiverse appraisal techniques including Non-Discounting and Discounting
factors like, Pay Back, ARR, NPV, IRR, Profitability Index etc
4. Analyse and implement various techniques of working capital management and its
policy implications.
5. Explain conceptual framework on management of cost and various techniques of cost
management.
Module I
Introduction to Financial Management, Accounting Concept Concept, Finance Functions, Role
of Finance Manager, Decision Making. Principles and conventions, Double Entry System,
Accounting Statements, Analysis of Financial Statement: Ratio Analysis.(8L)
Module II
Sources of Finance: -Short term &Long term, Stock Market: Primary Market & Secondary
Market, Shares: Equity Shares & Preference Shares, Debenture: Definition & Types, Venture
Capital, Mutual Fund, Bank Loan: Working Capital Loan & Term Loan.(8L)
Module III
Capital Budgeting: -Definition, Concept, Objective, Methods of appraisal; Payback Period, ARR,
NPV, IRR, Benefit Cost Ratio.(8L)
Module IV
Working Capital Management: -Working Capital:Definition, Gross Working Capital, Net
Working Capital, Importance, influencing factors, Working Capital Cycle, Working
CapitalPolicies, Working Capital Financing Policies.(8L)
Module 5
Cost Management- Cost:Definition, Concept, Classification, Cost Centre: Concept and Types,
Cost Sheet. Marginal Costing: Definition, Importance, CVP Analysis: Break Even Analysis,
Margin of Safety, Angle of incidence, Graphical Representation, Limitations. (8L)
Reference Books:-
1. Financial Management by I.M. PandeyVikas Publication.
2. An Introduction to Financial Accounting by S.N. Maheshwari, Vikas Publication.
3. Cost & Management Accounting by M.N.Arora, Vikas Publication
4. Financial Management: Theory & Practices by Chandra Prasanna, TMH Publication
Direct Assessment
Indirect Assessment
1. Student Feedback on Faculty
2. Student Feedback on Course Outcome
Course
Course Delivery
CD Course Delivery methods Outcome Method
CD1, CD2,
CD2 Tutorials/Assignments CO2 CD4
CD1, CD2,
CD4 Mini projects/Projects CO4 CD5, CD8
CD1, CD2,
CD3, CD4,
CD5 Laboratory experiments/teaching aids CO5 CD6, CD8
CD9 Simulation
Course Objectives
This course enables the students:
A. To assess how the choice of data structures and algorithm design methods
impact the performance of programs.
B. To choose the appropriate data structure and algorithm design method for a
specified application.
C. To solve problems using data structures such as linear lists, stacks, queues,
hash tables, binary trees, heaps, binary search trees, and graphs and writing
programs for these solutions.
D. Analyse and compare the different algorithms
Course Outcomes
After the completion of this course, students will be able to:
1. Be able to design and analyze the time and space efficiency of the data
structure
2. Analyze run-time execution of previous learned sorting methods, including
selection, merge sort, heap sort and Quick sort
3. Have practical knowledge on the applications of data structures
4. Be capable to identity the appropriate data structure for given problem
1. Baluja G S, Data Structure through C , Ganpat Rai Publication, New Delhi, 2015.
2. Pai G A V Data Structures and Algorithms: Concepts, Techniques and Applications ,
2ndEdn, Tata McGraw-Hill, 2008.
3. Horowitz E., Sahni S., Susan A., Fundamentals of Data Structures in C , 2nd Edition,
University Press, 2010.
Reference books:
4.
Edn, McGraw-Hill, Inc. New York, NY, USA.
5. McGraw-Hill.
6.
2007.
7.
Education Ltd. New Delhi
Course Objectives
This course enables the students to:
1. Present the main components of OS and their working
2. Introduce the concepts of process and thread and their scheduling policies
4. Analyze the different techniques for managing memory, I/O, disk and files.
Course Outcomes
After the completion of the course student will be able to:
1. Describe the main components of OS and their working
2. Explain the concepts of process and thread and their scheduling policies
4. Compare the different techniques for managing memory, I/O, disk and files.
5. Write a program that deletes every 5th byte from a file, but without using a temporary
file or allocating a buffer in the memory.
6. WAP in C to implement FCFS CPU scheduling Algorithm.
7. WAP in C to implement SJF CPU scheduling Algorithm.
8. WAP in C to implement Priority CPU scheduling Algorithm.
9. WAP in C to implement Round Robin ( RR ) CPU scheduling Algorithm.
10. WAP in c to read from the buffer & produce desired output.
11. WAP ii C to create Userid& Password.
12. WAP in c to implement and find how many Users currently login in NetWork.
13. WAP in c to create your won system call just like a copy.
14. WAP in c to create your won system call just like a delete.
15. WAP in c to find the Disk Space.
16. WAP In C to find The number of pages in the process.
17. WAP In C to find The number of frames allocated to the process.
18. WAP in c to find the no. of blocks occupied by a file.
19. WAP in c to create your won system call just like a delete.
20. WAP in c to create your won system call just like a ls.
21. WAP in c to find a PID no. of any Process.
Indirect Assessment
1. Student Feedback on Faculty
2. Student Feedback on Course Outcome
Course Objectives
This course enables the students to:
Course Outcomes
After the completion of this course, students will be able to:
CO2 Use the basic object-oriented design principles in computer problem solving
Objective: To Understand and Implement special types of functions like friend function
3. Write a Program to swap private data members of classes named as class_1, class_2
using friend function.
4.Write an inline function to find largest of three number
11.Write a Program illustrating how the constructors are implemented and the order in
which they are called when the classes are inherited. Use three classes named alpha, beta,
gamma such that alpha, beta are base class and gamma is derived class inheriting alpha &
beta.
Objective: To Understand and Implement exception handling
Books recommended:
TEXT BOOKS
1. J.P.Cohoon&J.W.Davidson- C++ Program Design: An Introduction to Programming and
Object-Oriented Design, 2ndEdn, TMH Edn, New Delhi-2000.
REFERENCE BOOKS
1. F.L.Friedman&E.B.Koffman- Problem Solving, Abstraction, and Design Using C++,
4thEdn, Pearson Education, Inc. 2004.
Indirect Assessment
1. Student Feedback on Faculty
2. Student Feedback on Course Outcome
Course Objectives
This course enables the students:
A. To observe that how the real world data is stored, retrieved, and communicate under
the DBMS environment
B. To design a logical model which having the unique relation between the Data.
C. To apply the query for the modification of the system.
D. To develop a conceptual design which allows as to
data.
E. To discuss a system which allows to restrict the uncontrolled exaction and provide
rigorous variation of the task.
Course Outcomes
After the completion of this course, students will be:
1. Describe various data models and schemas used in database management systems.
2. Explain the fundamental concepts, data definitions and query processing tasks in
relational querylanguages.
3. Recognize database design theory, and evaluate functional dependencies and normal
forms indatabases.
4. Formulate the operations of transaction and concurrent query processing tasks to
obtain the correctresults even under strict time constraints.
5. Interpret the foundational concepts of distributed databases. Illustrate several
techniques related totransaction management and query processing in distributed
database management systems.
emp(empno,ename,job,mgr,hiredate,sal,comm,deptno,gr),
dept(deptno,dname,loc)
SMITH CLERK
ALLEN SALESMAN
SMITH ( Clerk)
ALLEN ( Salesman)
30. Do a case sensitive search for a list of employees with a job that the user enters.
31. It has been discovered that the sales people in dept. 30 are not all male. Please produce
thefollowingoutput.
ENAME DEPTNO JOB
35. Write a query which returns DAY of the week ( i.e. MONDAY) for any date entered in the
format DD/MM/YY.
36. Write a query to calculate length of service of each employee.
37. Find the minimum salary of all employees.
38. Find the maximum, minimum, and average salaries of all employees.
39. List the maximum and minimum salary of each job type.
40. Find how many managers are in each dept.
41. Find the average salary and average total remuneration of each job type. Remembers sales
man earn commission.
42. Find out the difference between highest and lowest salary.
43. Find all department s which have more than three employees.
44. Check whether all employee nos are unique. ( No Duplicate)
45. List lowest paid employee working for each Manager. Exclude any groups where the
minimum salary is less than 1000. Sort the output by salary.
46.
C)
47. Show only employee on Grade C.
48. .Show all employee in Dallas.
49. List the employees name, job, salary, grade and department for everyone in the company
except clerks. Sort on salary, displaying the highest first.
51. Display all employees who earn less than their managers.
52. Display all employees by name and eno along with their managers name and number.
53. Modify above spoliation to display KING who has no MANAGER.
54. Find the job that was files in the first half of 1983 and the name job that was filled in the
same period in 1984.
55. Find all employees who have joined before their manager.
EMPLOYEE HIREDATE MANAGER HIREDATE
56. Find the employees who earn the highest salary in each job, type, sort in descending order
of salary.
57. Find the employees who earn the minimum salary for their job, Display the result in
descending order of salary
58. Find the most recently hired employees in the department. Order by hiredate.
59. Show the details of any employee who earns a salary greater than the average for their
department. Sort in department number order.
60. List all department where there are no employees.
Text book:
Indirect Assessment
1. Student Feedback on Faculty
2. Student Feedback on Course Outcome
Course Objectives:
This course enables the students:
A. Help students realize the advanced features in JAVA.
B. Establish the relationship between the core and advanced JAVA frameworks.
C. Understand problems where Advanced JAVA is required.
D. Evaluate the advantages and short comings of advanced JAVA
E. Understand how frameworks and APIs are designed.
Course Outcomes:
After the completion of this course, students will be:
1. Learn the architecture of advanced swing components and design GUIs using them.
2. Learn to interface with external data sources with Java.
3. Leverage Java to create and deploy network programs.
4. Use Java to design enterprise level Web sites.
5.
Making Decisions with Java: Comparing Numbers in Java, Comparing Strings in Java, Logical
(Boolean) Operators and Order of Precedence, Selection Structures in Java.
MODULE: II
Repeating Program Statements: The while Statement, Thefor Statement, The
Statement, Nested Loops, break, and continue.
Methods and Classes: Predefined Java Methods, Programmer-Defined Methods.
Arrays: The One-Dimensional Array, Multidimensional Arrays, Other Array Topics.(8L)
MODULE: III
Characters, Strings, and Formatting: Working with Characters, Working with Strings,
Formatting Data for Output.
MODULE: IV
File Input and Output: Inputting Data from a Text File, Outputting Data to a Text file,
Performing Input and Output with Binary Files.(8L)
MODULE: V
Graphical User Interfaces: Creating User Interfaces, Overview of a Java GUI, Developing a
Java GUI, Adding Functionality to a GUI, Improving GUI Layout.(8L)
Text Book:
1. -Oriented
st
Edition, Thomson Learning, New Delhi, 2007.
Reference Books:
th
Edition, Pearson Education, New Delhi, 2006.
rd
Edition, TMH, New Delhi, 2005.
Direct Assessment
Indirect Assessment
1. Student Feedback on Faculty
2. Student Feedback on Course Outcome
Course Objectives
After the completion of this course, students will be:
1. Understand different notions of asymptotic complexity
Course Outcomes
After the completion of this course, students will be:
1. Identify the different notions of asymptotic complexity and determine the asymptotic
complexity of algorithms including the solving of recurrence relations
3. Describe and use basic and advanced graph algorithms includinlg DFS, BFS, and
Bellman Ford
4. Analyse the difference between the dynamic programming concept and a greedy
approach
Probabilistic Algorithms: Introduction, Probabilistic does not imply uncertain, Expected versus
average time, Pseudorandom generation, Numerical probabilistic algorithms, Monte Carlo
algorithms, Las Vegas algorithms. (8L)
Text Book:
Reference Books:
1.
Ltd.,New Delhi, 2004.
2.
3. Cormen T.H., Leiserson Charles E.,
rd
Edition, PHI, New Delhi, 2005.
rd
4. Dasgupta S., Papadimitriou C.H., Vaziran U.V, Edition , TMH, New Delhi,
2007.
5. 2nd Edition, Universities
Press (India) Pvt. Ltd., 2005.
Direct Assessment
Indirect Assessment
1. Student Feedback on Faculty
2. Student Feedback on Course Outcome
Course Objectives
This course enables the students to:
A. Define a system and recognize the behavior of a system.
B. Design finite state machines and the equivalent regular expressions.
C. Construct pushdown automata and the equivalent context free grammars
Course Outcomes
After the completion of this course, students will be able to:
1. Relate formal languages and mathematical models of computation
2. Attain knowledge about different types of languages and the corresponding
machines
3. Learn about the pushdown machine and its role in compiler construction
MODULE: II
Regular Expressions and Finite Automata: Regular languages and Regular Expressions,
Memory required to recognize a language, Finite Automata, capability & limitations of FSM,
Deterministic Finite Automata , Non-Deterministic Finite Automata, NFA with e-moves, regular
sets & regular expressions, Equivalence of DFA and NDFA, NFA from regular expressions,
regular expressions from DFA, Moore versus Mealy m/c, two way finite automata equivalence
(8L)
MODULE: III
Regular and Non-regular languages: Criterion for Regularity, Minimal Finite Automata,
Pumping Lemma for Regular Languages, Decision problems, Regular Languages and Computers.
MODULE: IV
Pushdown Automata: Definition, Moves, Instantaneous Descriptions, Language recognised by
PDA, Deterministic PDA, Acceptance by final state & empty stack, Equivalence of PDA ,
Pumping lemma for CFL, Interaction and Complements of CFL,Decision algorithms.
Turing Machines: Definition and examples, Computing Partial Functions with Turing
Machine(TM), Combining TMs, Variations of TMs, Multi-tape TMs, Non-deterministic TM,
Universal TM, Church Thesis. (8L)
MODULE: V
Recursively Enumerable Languages: Recursively Enumerable and Recursive, Enumerating
Language, Context Sensitive and Chomosky Hierarchy.
Text Books:
rd
Edition, TMH.
Reference Books:
1. Mishra K.L.P
rd
Edition, Narosa, 2008.
Direct Assessment
Indirect Assessment
1. Student Feedback on Faculty
2. Student Feedback on Course Outcome
Course Objectives
This course enables the students to:
1. Students are effective team members, aware of cultural diversity, who conduct
themselves ethically and professionally
2. Students use effective communication skills and technical skills to assure
production of quality software, on time and within budget.
3. Students build upon and adapt knowledge of science, mathematics, and
engineering to take on more expansive tasks.
4. Able to increase level of self-reliance, technical expertise, and leadership.
Course Outcomes
After the completion of this course, students will be:
1. Explain the software engineering principles and techniques
2. Apply Software Project Management Practices
3. Apply the knowledge gained for their project work as well as to develop
software following software engineering standards
4. Analyze various methods of software testing strategies
5. Develop self-reliance, technical expertise, and leadership.
MODULE: II
Requirement Engineering: A bridge to design and construction, Requirement Engineering Task,
Initiating the Requirement Engineering Process, Eliciting Requirements, Developing Use case,
Building the Analysis Model, Negotiating Requirements, Validating Requirements.(8L)
MODULE: III
Design Engineering: Design Process and Design Quality, Design Concepts, Design Models,
Pattern Based Software Design. (8L)
MODULE: IV
Testing Strategies and Testing Tactics: Strategic Approach to software Testing, Test Strategies
for conventional and Object Oriented Software, Validation Testing System Testing, White Box
Testing, Basic Path Testing Control Structure Testing, Black Box Testing, Object Oriented
Testing Methods. (8L)
MODULE: V
Metric for process and Estimation Techniques: Process metrics, Software Measurement,
Software Project Estimation, Decomposition Techniques, Empirical Estimation Models,
Estimation for Object Oriented Projects Specialized Estimation Techniques.
Text Book:
th
Edition.,
Tata McGraw Hill.
Reference Books:
1.
2nd Edition.
Indirect Assessment
1. Student Feedback on Faculty
2. Student Feedback on Course Outcome
Course Objectives
Course Outcomes
2. Analyze the complex issues confronting organizational leaders as they develop their CSR
program
3. To formulate strategies to satisfy stakeholders.
4. Faced with a management problem, suggesting solutions that are ethical and
socially responsible and that respect the principles of good governance.
Module III
CSR-Legislation In India & the world. Section 135 of Companies Act 2013.(8L)
Module IV
The Drivers of CSR in India, Relation between CSR and Corporate governance; Identifying key
stakeholders of CSR & their roles. (Stakeholders: Organization, Government, Society and
Regulatory Environments) (8L)
UNIT V
Review current trends and opportunities in CSR.CSR as a Strategic Business tool for Sustainable
development. Review of successful corporate initiatives & challenges of CSR.(8L)
Reference Books:
1. Corporate Social Responsibility : Kotler and Lee
2. Theory and practices of CSR : Idowu, Samuel O., Louche, Celine
3. CSR in India : Sanjay Aggarwal
Indirect Assessment
1. Student Feedback on Faculty
2. Student Feedback on Course Outcome
Course Objectives
This course enables the students:
A. To understand the structure of databases distributed over the network.
Course Outcomes
After the completion of this course, students will be:
1. An understanding of detailed architecture of distributed database.
2. An ability to design a distributed database for any environment using horizontal and
vertical fragmentation.
Module I
Introduction: Distributed Data Processing, What is a Distributed Database System? Promises of
DDBSs, Problem Areas. (8L)
Module II
Distributed DBMS Architecture: DBMS Standardization, Architectural Models for Distributed
DBMSs, Distributed DBMS Architecture.
Distributed Database Design: Alternative Design Strategies, Distribution Design Issues,
Fragmentation, Allocation. (8L)
Module III
Overview of Query Processing: Query Processing Problem, Objectives of Query Processing,
Complexity of Relational Algebra Operations, Layers of Query Processing.
Query Decomposition and Optimization: Query Decomposition, Query Optimization,
Centralized Query Optimization, Distributed Query Optimization Algorithms.(8L)
Module IV
Transaction Management and Concurrency Control: Definition of a Transaction, properties of
Transactions, Serializability Theory, Taxonomy of Concurrency Control Mechanisms, Locking-
based Concurrency Control Algorithms, Timestamp-based Concurrency Control Algorithms,
Deadlock Management. (8L)
Module V
Distributed DBMS Reliability: Reliability Concepts and Measures, Failures and Fault Tolerance
in Distributed Systems, Failures in Distributed DBMS, Local Reliability Protocols, Distributed
Reliability Protocols. (8L)
Text Books:
nd
1. M. Tamer Ozsu, Patrick Edition, Pearson,
2011.
Reference Books:
th
1. Edition, Pearson Education,
2008.
2. A Practical Approach to Design,
th
Edition, Pearson Education, 2008.
th
3. Edition, McGraw Hill,
2002.
Indirect Assessment
1. Student Feedback on Faculty
2. Student Feedback on Course Outcome
Course Objectives
This course enables the students:
A. To understand the basic components of DSS
B. To learn different phases and models for Decision making
C. To understand how to create a distributed database using fragmentation.
D. To learn transaction processing in a distributed environment.
E. To understand how concurrency control is performed in a distributed environment.
Course Outcomes
After the completion of this course, students will be able to:
1. Discuss the basic components of DSS
2. Classify the different phases and models for Decision making
3. Design a DSS according to the requirements.
4. Model and develop different levels in DSS using Software engineering principles
5. Analyse the system with pros and cons.
MODULE I
Decision Making Process: An Over view, Introduction, Managerial decision making and
Information System, Need for computerized decision support and the supporting technologies,
Framework of DSS, Group Support System, Executive information system, Knowledge
management Systems. (8L)
MODULE II
Decision Making, System, Models: Decision Making Introduction and Definition, System,
Models, previews of modeling process, Decision making The intelligence phase, the design
phase and the choice phase.
Evaluation Multiple Goals, sensitivity analysis, What if and goal seeking.
Decision Making - The implementation phase, Alternative decision making models.
(8L)
MODULE III
DSS Configurations, Definitions, Characteristics & Capabilities, Components, The Data
management Subsystem, Model Management Subsystem, Knowledge based management,
Subsystem, User interface Subsystem, DSS Classification, DSS H/W, Difference between
Management Science and MIS.
Modeling & Analysis - Modeling for MSS, Static & Dynamic Models, Treating Certainty,
Uncertainty and Risk, Interface diags, MSS modeling in spreadsheets, Decision analysis (Decision
tables and Decision trees), Optimization via mathematied programming, Meusistic Programming,
Multidimensional Modeling OLAP. (8L)
MODULE IV
DSS Development Introduction, The Traditional System Development life cycle, Alternate
Development Methodologies, Prototyping, DSS Technology Levels and Tools, DSS Development
Platforms, DSS Development Tool Selection, Team Developed DSS, End User Developed DSS,
DSS System Integration. (8L)
MODULE V
Collaboration Communication, Enterprise DSS Group Decision Making Communication &
Collaboration, Communication Support, Collaboration Support Computer Supported Co-
operative work, Group Support System, GSS Technologies. (8L)
Text Book:
th
1. Edition,
Pearson Education.
Direct Assessment
Indirect Assessment
1. Student Feedback on Faculty
2. Student Feedback on Course Outcome
Course Objectives
This course enables the students:
A. Examine the types of the data to be mined and apply pre-processing methods on raw
data.
B. To introduce the basic concepts of Data Warehouse and Data Mining techniques
C. Apply the techniques of clustering, classification, association finding, feature
selection and visualization to real world data
D. Prepare students for research in the area of data mining and related applications and
Enhance students communication and problem solving skills
E. Provide the students with practice on applying data mining solutions using common
data mining software tool /programming languages.
Course Outcomes
After the completion of this course, students will be able to:
1. Describe the fundamentals of data mining systems as well as issues related to access
and retrieval of data at scale.
2. Explain the various data mining functionalities and data warehousing techniques.
3. Apply the various data mining techniques to solve classification, clustering and
association rule mining problems.
4. Analyze and choose among different approaches of a data mining task.
5. Design and evaluate data mining models to be used in solving real life problems,
keeping in view social impacts of data mining.
MODULE V
Cluster Analysis: Introduction, Types of Data in Cluster Analysis, A Categorization of Major
Clustering Methods, Partitioning Method - k- Medoids Algorithm, CLARANS, Hierarchical
Methods - BIRCH, ROCK Density-Based Methods - DBSCAN, Outlier Analysis. (8L)
Text books:
1.
Harcourt India. Private Limited, 2nd Edition.
Reference books:
1.
2.
New Delhi, 2004.
3. , 2006.
Direct Assessment
Indirect Assessment
1. Student Feedback on Faculty
2. Student Feedback on Course Outcome
Course Delivery Methods
Course Objectives
This course enables the students:
A. Understand issues related to use of digital media
Course Outcomes
After the completion of this course, students will be:
1. Identify multiple issues related to digital media, including audio, image, and video
content
2. Analyses techniques for streaming media
MODULE -I
Introduction, Multimedia Information Applications, Issues and Challenges, Semantic Models for
Multimedia Information Systems, Multimedia Semantic Models. (8L)
MODULE -II
Multimedia database Searching, Image Segmentation,Video Parsing and Segmentation
Approaches ,Iconic-Based Grouping and Browsing Approaches , Knowledge-Based Event
Modeling Approaches , Characteristics of Video Data Modeling , Motion Detection and Tracking
Approaches ,Object Recognition Approaches ,Content-Based Retrieval.(8L)
MODULE -III
Multimedia Browsing, Video Browsing, Key Frame Selections. (8L)
MODULE -IV
Augmented Transition Network Model (ATN), Spatial and Temporal Relations of Semantic
Objects, Multimedia Presentations, Multimedia Database Searching, Multimedia Browsing, User
Interactions and Loops. (8L)
MODULE -V
Object Composition Petri Net Model, Interval Based Conceptual Models.(8L)
Text Book:
1.
Reference Book:
1. -Multimedia Database Retrieval A Human-Centered
Direct Assessment
Indirect Assessment
1. Student Feedback on Faculty
2. Student Feedback on Course Outcome
Course Objectives:
This course enables the students:
A. Help students realize the advanced features in JAVA.
B. Establish the relationship between the core and advanced JAVA frameworks.
C. Understand problems where Advanced JAVA is required.
D. Evaluate the advantages and short comings of advanced JAVA
E. Understand how frameworks and APIs are designed.
Course Outcomes:
After the completion of this course, students will be:
1. Learn the architecture of advanced swing components and design GUIs using them.
2. Learn to interface with external data sources with Java.
3. Leverage Java to create and deploy network programs.
4. Use Java to design enterprise level Web sites.
5. Understand Ja
1. WAJP to show the characteristic of a number. {E.g. 24 it has two coefficients 2 in tens position and 4 in
units position. It is composed of 2 and 3. It is a positive number. Also show whether it is odd or even.
2. WAJP to take input through command line argument and do the following:
a) Check whether the number is prime.
b) Generate the reverse a number.
3. Write a menu driven program using switch in Java to perform following:
a) For input of 1, check whether the number is prime
b) For input of 3, find the factors of the number
c) For input of 5, check the number is odd or even.
4. Write a program in Java to generate hexadecimal equivalent of a number without using array.
5. WAJP to take two number inputs through command line argument and do the following:
a) Check whether two numbers are prime to each other or not.
b) Find LCM of two numbers.
17. WAJP to create a class called Fraction with data member numerator and denominator; take input
(through command line argument) of two fractions and then add, subtract, multiply and divide, finally
display the result in reduced term.
18. Write a program in Java to create a class for Employee having 2 data member code and name. Then
create 3 classes Officer, AdminStaff and MStaff. The Officer class has data members designation and
pay-scale; the AdminStaff has data members grade and pay-band; the MStaffhas data member
department and two sub-classes Regular and Casual. The Regular staff has data members level and
consolidated-pay and Casual has data member daily-wage. Take all inputs through constructors and
write appropriate methods for displaying one data for each type of class.
19. WAJP to design a class called Account using the inheritance and static that show all function of bank
(withdrawal, deposit) and generate account number dynamically.
20. WAJP to design an application Password.java that produces and prints a random password depending
upon name of an individual. If the input is Abdul Kalam then the password would be 33421LAM. Note:
take the first name A=1, B=2, D=4, U=21 where 2+1=3, and L=12, where 1+2=3; so the number comes
to be 12433, so u can find out.
*****
*******
*****
***
22. WAJP to take a string count all vowels and then delete the same from the string.
23. Write a Patient class which inherits from the Person class. Patient can again be of two types, indoor
and outdoor. The Patient class requires the following:
a) a variable to store the patient ID for the patient
b) a variable to store the department of hospital
c) a variable to store the ward of hospital
d) a variable to store the patient 's date of joining the hospital
e) a variable to store the patient 's address
f) a variable to store the medical fees that the patient pays
g) constructor methods, which initialize the variables
h) a method to calculate the medical fees (for both indoor and outdoor patient)
24. WAJP to take a string as password and check whether it contains at least two numbers, 3 alphabets and
no space in it. If any contrary throw message.
25. Write a program in Java to create a class called Rational having two data members for numerator and
denominator. Take two inputs of rational numbers and perform multiplication and division. Display the
result in reduced form.
Indirect Assessment
1. Student Feedback on Faculty
2. Student Feedback on Course Outcome
Course Objectives
Course Outcomes
After the completion of this course, students will be able to:
CO1. Identify the software requirement capturing process.
CO2. Elaborate knowledge about dynamic view of system.
CO3. e Analyseabout static view of software system.
CO4. Analysis about the relationship among static and dynamic view of system.
CO5. Identify the process of deployment of software system.
Indirect Assessment
1. Student Feedback on Faculty
2. Student Feedback on Course Outcome
Course Objectives
This course enables the students
1. To impart the basic concepts of User Interface Design.
2. To develop understanding about human computer interaction methods that utilize
more general, widespread and easier-to-learn capabilities.
3. The cognitive and perceptual constraints that affect interface design
4. Techniques for evaluating the usability of an interface
5 How to communicate the results of a design process, both in oral and written form
Course Outcomes
After the completion of this course, students will be able to:
1. Identify the key terms related to user interfaces and user interface design and
implementation
2. Identify and describe various types of computer users and computer use contexts
3. Identify and describe various types of user interfaces
4. Explain the user interface design process
5 Identify and describe common abstract user interface components, such as radio
buttons and group boxes
Introduction: Importance of user interface definition, importance of good design, brief history
Graphical User Interface Web User Interface Theories, Principles and Guidelines of User
interface design (8L)
Module II
Design Process: Obstacles in development path deigning for people-Understanding Human
Interaction with computers, Importance of Human Characteristics, Human consideration, Human
Interaction speeds Understanding Business function(8L)
Module II
Screen Designing: Design goals - screen meaning and purpose, organizing screen elements
ordering of screen data and content screen navigation and flow visually pleasing composition
amount of information focus and emphasis presenting information simply and meaningfully
information retrieval on web Statistical graphics Technological considerations in Interface
Design.
(8L)
Module IV
Menus and navigation schemes: structures of menus-functions of menus- contents of menus -
formatting of menus phrasing the menu- selecting menu choices-navigating menus-kinds of
graphical menus- Selection of windows-Window characteristics-components of windows-window
presentation styles-types of windows-window management-organising window functions-window
operations-Selection of device based and screen based controls - text and messages icons and
images Multimedia colours- uses, problems, choosing colours. (8L)
Module V
Distributed and Collaborative Interaction: Device consistency-distribution of the user
interface-event distribution-graphical package layer-programmable API-Model semantics
distribution-data layer distribution-asynchronous Collaboration-Software tools-specification
methods- interface building tools evaluation and critiquing tools-Interaction devices keyboard
and function keys - pointing devices- speech recognition, digitization and generation image and
video displays printers. (8L)
Text books:
rd
1. Edition., Wiley
Dreamtech, Delhi, 2007.
th
2. Edition., Pearson Education Asia,
Delhi, 2014.
Reference books:
1. Dan R. Olsen, Human Computer Interaction, Cengage, New Delhi, 2009.
2. John M. Carroll, Human Computer Interaction, Pearson Education Asia, Delhi, 2002.
3. Alan Cooper, The Essentials of User Interface Design, Wiley Dreamtech, Delhi, 2002.
Indirect Assessment
1. Student Feedback on Faculty
2. Student Feedback on Course Outcome
Course Objectives
This course enables the students:
A. To build an understanding of the fundamental concepts of the data communication
model and communications architecture.
B. To study characteristics of communication mediums and the characteristics of
signals propagated through different transmission media, including concepts of
transmission impairments.
C. To understand the basic principles of signal encoding techniques, error-detection,
and error-correction techniques.
D. To understand techniques for flow control and multiplexing for maximum utilization
of bandwidths in the data communications process.
E. To understand the various switching techniques and routing techniques for efficient
transmission.
Course Outcomes
After the completion of this course, students will be:
1. Understand and be able to explain the principles of a layered protocol architecture;
be able to identify and describe the system functions in the correct protocol layer
and further describe how the layers interact.
2. Understand, explain and calculate digital transmission over different types of
communication media.
3. Understand, explain and solve mathematical problems for data-link and network
protocols.
4. Describe the principles of access control to shared media and perform performance
calculations.
5. Understand and explain the principles and protocols for route calculations and be
able to perform such calculations.
MODULE - I
Data Communications and Networking Overview: A Communications Model, Data
Communications, Data Communication Networking.
Protocol Architecture: The Need for a Protocol Architecture, A Simple Protocol Architecture,
OSI, The TCP/IP Protocol Architecture(8L)
MODULE - II
Data Transmission: Concepts and Terminology, Analog and Digital Data Transmission,
Transmission Impairments, Channel Capacity.
Guided and Wireless Transmission: Guided Transmission Media, Wireless Transmission,
Wireless Propagation, Line-of-Sight Transmission.(8L)
MODULE - III
Signal Encoding Techniques: Digital Data Digital Signals, Digital Data Analog Signals, Analog
Data Digital Signals, Analog Data Analog Signals.
MODULE IV
Data Link Control: Flow Control, Error Control, High-Level Data Link Control (HDLC).
Multiplexing: Frequency Division Multiplexing, Synchronous Time Division Multiplexing,
Statistical Time Division Multiplexing.
MODULE -V
Asynchronous Transfer Model: Protocol Architecture, ATM Logical Connections, ATM Cells,
Transmission of ATM Cells, ATM Service Categories, ATM Adaptation Layer.
Routing in Switched Networks: Routing in Circuit-Switching Networks, Routing in Packet-
Switching Networks, Least-Cost Algorithms(8L)
Text Book:
th
Edition., Pearson Education./ PHI,
New Delhi, 2006.
Reference Books:
th
Edition. TMH, New Delhi,
2006.
Direct Assessment
Indirect Assessment
1. Student Feedback on Faculty
2. Student Feedback on Course Outcome
Course Objectives:
This course enables the students to:
1. Illustrate the concepts of Project Management for developing software projects.
2. Demonstrate the software project evaluation issues
3. Classify the software projects for development using suitable process models
4. Predict the software cost and risk for the software projects
5. Design a framework for managing various aspects of software projects like resource
allocation, monitoring and control, contract and quality management etc.
Course Outcomes
After the completion of this course, students will be:
1. Apply the concepts of Project Management for developing software projects.
2. Solve the software project evaluation issues.
3. Categorize the software projects for development using suitable process models
4. Estimate the software cost and risk for the software projects.
5. Create a framework for managing various aspects of software projects like resource
allocation, monitoring and control, contract and quality management etc.
MODULE I
Managing Software Project: Process & Project Management, Project Management and the
CMM, Project Management at Infosys, Introduction to CMMI, PCMM.
The Project Planning Infrastructure: The process data base, The process capability Baseline,
Process Assets and the Body of Knowledge System. (8L)
Module II
Planning: The Infosys Development Process, Requirement Change Management
Effort Estimation & Scheduling: Estimation and Scheduling Concepts, Effort Estimation,
Scheduling. (8L)
Module III
Module IV
Measurement and Tracking Planning: Concepts in measurement, Measurements, Project
tracking.
Project Management Plan: Team Management, Customer Communication and Issue
Resolution, Structure of the Project Management Plan.(8L)
Module V
Configuration Plan: Concepts in Configuration Management, Configuration Management
Process.
Reviews: The Reviews, Review process Data Collection, Monitoring & Control, Introduction of
Reviews & the NAH Syndrome.
Project Monitoring & Control: Project tracing, Milestone Analysis, Activity Level Analysis
using SPC, Defect Analysis & Prevention Process Monitoring & audit.(8L)
Text Book:
1.
Delhi, 2002.
Reference Books:
rd
1. Edition, Tata Mcgraw
Hill, New Delhi, 2004.
2.
3. Wesley, 1989.
Direct Assessment
Indirect Assessment
1. Student Feedback on Faculty
2. Student Feedback on Course Outcome
Course Objectives
This course enables the students:
A. Help students realise the advanced features in JAVA.
B. Establish the relationship between the core and advanced JAVA frameworks.
Course Outcomes
After the completion of this course, students will be:
1. Learn the architecture of advanced swing components and design GUIs using them.
5.
MODULE -I
Components and Facilities or Rich Graphical User Interfaces: Programming with the JFC,
Swing API Components, Jcomponent Class, Windows, Dialog Boxes, and Panels, Labels, Buttons,
and Check Boxes, Menus, Toolbars, and Actions, Sliders, Spinners, Progress Bars, and Scrollbars,
Lists and Combo Boxes, Text-Entry Components, Color and File Choosers, Tables and Trees,
Printing with the 2D API, Java Print Service API.(8L)
MODULE -II
Using Relational Database: Introduction, Best Practices for Programming for Databases, JDBC
Drivers for RDBM Systems, SQL to Java Type Mappings, Understanding the Database used in
this chapter, Using the java.sql API, Coding Transactions, Using the javax.sql API, Connection
Pooling. (8L)
MODULE -III
XML: Introduction, XML Structure, XML Example Document with SAX, Parsing an XML
Document with DOM, Generating an XML Document with DOM, Validating XML Documents
using DTD and XML Schema, Transforming XML using XSLT.Network Programming:
Introduction, Working with URLs, Working with Sockets, Remote Method Invocation.(8L)
MODULE -IV
Building Web Applications: Introduction, The Technology of the Web, J2EE Web Application
Packaging, Servlets, The Servlet API, The User Experience, Building a Web App with Continuity,
Java Server Pages, JSP Tags and API, How the Server Processes JSPs, Java Coding in JSPs,
Frameworks for Building Web Applications, Building Robust WebApps.(8L)
MODULE -V
Enterprise JavaBeans: Introduction, Enterprise Programming, What are EJBs? Session EJBs,
EJB Clients, Entity EJBs, Message-Driven Beans, EJB Transactional Characteristics, EJB
Security, Best Practices for Designing EJB-Based Applications.(8L)
Text Book:
rd
1. Edition, India
Edition, Thomson Education, New Delhi, 2007.
Direct Assessment
Indirect Assessment
1. Student Feedback on Faculty
2. Student Feedback on Course Outcome
Course Objectives
This course enables the students:
Course Outcomes
After the completion of this course, students will be:
1. Elaborate the evolution of various system software.
2. Define various data structures that helps in the proper functioning of the system
programs.
3. Analyse basic design of various system software.
4. Apply functionalities & components of system software & tools into different layers
for efficient code generation.
MODULE -I
Introduction: System Softwares& its Components, Evolution of System Softwares- Operating
System, Loaders, Interpreters, Compilers, Linkers, Assemblers.Assemblers: Elements of
Assembly Language Programming, Assembly Process, Single Pass Assembler, Design of a 2-Pass
assembler for In 8088.(8L)
MODULE -II
Macros & Macro processors: Macros, Different forms of Macros, Macros using AIF, AGO,
REPT. Etc, Design of a Macro Processor, Macro Assembler.(8L)
MODULE -III
Loaders: Basic Loader Functions, Absolute Loader, Compile & go Loader, Relocating Loader,
Direct Linking Loader.(8L)
MODULE -IV
Linkage Editors: Linking and Relocation, Program Relocability, Linkage Editor and its
Application in IBP-PC, Linking for Program Overlays.(8L)
MODULE -V
Software Tools: Spectrum of Software Tools, Text Editors, Interpreter and Program Generators,
Debug Monitors, Programming Environments.(8L)
Text Book:
nd
1. Edition, TMH, New
Delhi.
Reference Book:
1.
Direct Assessment
Indirect Assessment
1. Student Feedback on Faculty
2. Student Feedback on Course Outcome
Course Objectives
This course enables the students to:
A. Understand the need of compiler
B. Provide a thorough understanding of design, working, and implementation of
programming languages
C. Trace the major concept areas of language translation and compiler design
Course Outcomes
After the completion of this course, students will be able to
1. Understand the need of compiler for interfacing between users and machine
3. Trace the major concept areas of language translation and compiler design
MODULE -I
Introduction to Compiling: Translators, Interpreters, Compiler, other language processors,
Phases of a compiler, Passes of compiler, Back-end and Front-end of compiler, Basic idea on
Symbol Table, Issues in Compiler construction, Concept on l-value and r-value, Programming
Language basics, Compiler construction tools.
Lexical and Syntax Analysis: Lexical analysis: Role of a Lexical analyser, Input buffering,
Specification and recognition of tokens, State-machine driven lexical analysers and their
implementations, Lexical analyser generator tool: LEX/FLEX. (8L)
MODULE -II
Syntax analysis: Need and Role of Parser, Importance of Context Free Grammars in designing
Parser, Parse trees, derivations and sentential forms, Ambiguity.
Top down parsing: Backtracking, Recursive descent and Predictive parsers (LL), Error-detection
in LL parser
Bottom-up parsing: Simple Shift-Reduce parsing, LR Parsers: SLR, CLR and LALR parsers,
Error detection in S-R parsing, Handling ambiguous grammar, Parser generator tool:
YACC/BISON (8L)
MODULE -III
Syntax Directed Translation: Syntax directed definitions, Construction of syntax tree, Attribute
grammars, Inherited and synthesized attributes, Dependency graphs, Evaluation orders of
attributes, S-Attributed definitions, L-attributed definitions.
Intermediate code generation: Variants of Syntax Trees, Three-address codes of different
constructs, Translation of expressions, Type checking: Rules for type checking, Type conversion;
(8L)
MODULE -IV
Machine independent code optimization: Sources of optimization, DAG, Peephole optimization
and Basic Blocks, Loops in Flow Graphs, Data flow analysis and equations (8L)
MODULE -V
Runtime Environment and Code Generation:
Runtime environment: Storage organization: Static and Dynamic, Stack allocation and Heap
allocation of memory;
Code generation: Issues in designing of a code generator, Register allocation and Assignment,
Target machine (assembly code for 80- series) (8L)
Text Book:
1.
Pearson Education.
Press.
theory.
Direct Assessment
3 Quizzes 30 % (3 × 10%)
Assignment (s) 10
Indirect Assessment
1. Student Feedback on Faculty
2. Student Feedback on Course Outcome
Course Objectives
This course enables the students to:
A. Understand the need of Programming Language Design
D.
merits and demerits.
Course Outcomes
After the completion of this course, students will be able to:
1. Understand the concept of Programming Language Design
2. Differentiate the types of Programming languages using design strategy
3. Design a programming Language considering the underlying components and
concepts
4. Develop a programming language effectively
5.
MODULE -I
Introduction:
The Role of Programming Languages: Toward Higher-Level Languages, Programming
Paradigms, Languages Implementation: Bridging the Gap.
Language Description: Syntactic Structure: Expression Notations, Abstract Syntax Trees,
Lexical Syntax, Context- Free Grammars, Grammars for Expressions.(8L)
MODULE -II
Imperative Programming:
Statements: Structured Programming: The Need for Structured Programming, Syntax-Directed
Control Flow, Design Considerations: Syntax, Handling Special Cases in Loops, Programming
with Invariants, Proof Rules for Partial Correctness, Control Flow in C.(8L)
MODULE -III
Types: Data Representation: The Role of Types, Basic Types, Arrays: Sequences of Elements,
Records: Named Fields, Unions and Variant Records, Sets, Pointers: Efficiency and Dynamic
Allocation, Two String Tables, Types and Error Checking.
Procedure Activations: Introduction to Procedures, Parameter- Passing Methods, Scope Rules for
Names, Nested Scopes in the Source Text, Activation Records, Lexical Scope: Procedures as in C.
(8L)
MODULE -IV
Object-Oriented Programming:
Grouping of Data and Operations: Constructs for Program Structuring, Information Hiding,
Program Design with Modules, Modules and Defined Types, Class Declarations in C++, Dynamic
Allocation in C++, Templates: Parameterized Types, Implementation of Objects in C++.
Object-Oriented Programming: What is an Object?, Object-Oriented Thinking, Inheritance,
Object-Oriented Programming in C++, Derived Classes and Information Hiding, Objects in
Smalltalk, Smalltalk Objects have a Self. (8L)
MODULE -V
Functional Programming:
Elements of Functional Programming: A Little Language of Expressions, Types: Values and
Operations, Approaches to Expression Evaluation, Lexical Scope, Type Checking.
Functional Programming in a Typed Language: Exploring a List, Function Declaration by
Cases, Functions as First-Class Values, ML: Implicit Types, Data Types, Exception handling in
ML.
Functional Programming with Lists: Scheme, Dialect of Lisp, The Structure of Lists, List
Manipulation, A Motivating Example: Differentiation, Simplification of Expressions.(8L)
Text Book:
nd
1.
Edition, Pearson Education, 2007.
Direct Assessment
Indirect Assessment
1. Student Feedback on Faculty
2. Student Feedback on Course Outcome
Course Objectives
This course enables the students:
A. To appreciate problems of traditional web designing techniques.
C. To understand
E. To optimize the performance and rendering of web sites for different types of clients.
Course Outcomes
After the completion of this course, students will be:
1. Able to design models, controllers and views in ASP.NET
2. Will be able to establish secure and optimized database connections from the web
sites
3. Will be able to perform secure and optimized user management and role handling
Text books:
st
1. Edition, Apress, 2017.
Direct Assessment
Indirect Assessment
1. Student Feedback on Faculty
2. Student Feedback on Course Outcome
Course Objectives
This course enables the students
1. To impart the basic concepts of User Interface Design.
2. To develop understanding about human computer interaction methods that utilize
more general, widespread and easier-to-learn capabilities.
3. The cognitive and perceptual constraints that affect interface design
4. Techniques for evaluating the usability of an interface
5 How to communicate the results of a design process, both in oral and written form
Course Outcomes
After the completion of this course, students will be able to:
1. Identify the key terms related to user interfaces and user interface design and
implementation
2. Identify and describe various types of computer users and computer use contexts
3. Identify and describe various types of user interfaces
4. Explain the user interface design process
5 Identify and describe common abstract user interface components, such as radio
buttons and group boxes
b) Include the internal style sheet for body tags & also use class name, so that the style can
be applied for all tags.
Books recommended:
TEXT BOOKS
Indirect Assessment
1. Student Feedback on Faculty
2. Student Feedback on Course Outcome
Course Objectives
This course enables the students to:
1. To familiarize the student in introducing and exploring various Network
topologies and networking protocols
Course Outcomes
After the completion of this course, students will be able to:
CO1 Express programming & simulation for networking problems.
CO3 Design and implement simulation of a simple LAN and a WAN that meet
a specific set of criteria
Q1. What is the IP of the machine you are using? Compare it with the IP of your neighbors.
Are the IPs of your neighbors same? Why or Why not?
time of a message sent to that server. Use the ping command for the following URLs and
record the success or failure statistics along with the average round trip time.
a) google.com
b) facebook.com
c) bitmesra.ac.in
Q3. Trace the route that is taken when you try to access:
a) google.com
b) facebook.com
c) bitmesra.ac.in
Q1. Implement on a data set of characters the three CRC polynomials CRC 12, CRC
16 and CRC 32.
Q3. To study different types of transmission media, various topologies, and configure
modem of computer HUB and Switches.
Q3. Write a C/C++ program to translate dotted decimal IP address into 32 bit address.
Q4. To implement a routing protocol and check its connectivity in a variable length subnet
masked network
Q2. Take an example subnet graph with weights indicating delay between nodes.
Now obtain Routing table art each node using distance vector routing algorithm
Q3. Take an example subnet of hosts. Obtain broadcast tree for it.
Q1. Take a 64 bit playing text and encrypt the same using DES algorithm.
Q3. Using RSA algorithm encrypts a text data and Decrypt the samebjective: To
Understand and Implement Data Interpolation
Books recommended:
TEXT BOOKS
REFERENCE BOOKS
Indirect Assessment
1. Student Feedback on Faculty
2. Student Feedback on Course Outcome
Course Objectives
Course Outcomes
Statistics: Meaning and Applications of Statistics in business decision making and research.
Collection, Tabulation andpresentation of data.Measures of central tendency: Mean, Median and
Mode. Measures of dispersion: Range, Mean Deviation, Standard Deviation. Relative measure of
Dispersion (8L)
Module-II
Variable. Distribution Theory: Discrete and Continuous: Binomial and Poisson Distribution and
Normal Distribution. Application of Distribution theory to Engineering and Management Science
problems (8L)
Module -IV
Sampling Theory and Distribution. EstimationTheory: Unbiasedness and Minimum Variance
Unbiased Estimator. (8L)
Module- V
Testing of Hypotheses: Null and Alternative Hypothesis, Type-I and II error. p test, t test, Chi
Square test, F Test and their applications. ANOVA - One way test. (8L)
Text Books:
1. Levin Richard I. & Rubin, David S, Statistics for Management, Prentice Hall Of India, New
Delhi.
3. Gupta S.P Gupta M P, Business Statistics, Sultan Chand.
3. Terry, Sineich, Business Statistics by Examples, Collier McMillan Publisher.
Indirect Assessment
1. Student Feedback on Faculty
2. Student Feedback on Course Outcome
Course
Course Delivery
CD Course Delivery methods Outcome Method
CD1, CD2,
CD2 Tutorials/Assignments CO2 CD4
CD1, CD2,
CD3, CD4,
CD5 Laboratory experiments/teaching aids CO5 CD6, CD8
CD9 Simulation
Course Objectives
This course enables the students:
A. To perform visual computations for geometrical drawings.
B. To understand different hardware used for graphical requirement
C. To perform visual computations for geometrical drawings.
D. To display 3D objects in a 2D display devices using projection techniques.
E. To create realistic images using color and shading techniques.
Course Outcomes
After the completion of this course, students will be:
1. Able to understand the concept of image formation as realized by human visual
system.
2. Able to Illustrate the digitization process of images and related algorithms for
drawing basic geometric figures in the 2D display devices.
3. Able to describe architecture of basic Input/ Output devices and their underlying
working principles along with various primitives for drawing shapes.
4. Able to apply fundamental mathematics in producing spatial 3D-image of an
object in an inherently 2D display device.
5. Able to produce realism in the target object/ objects in a scene.
Basic Raster Graphics Algorithms for Drawing 2D Primitives: Overview, Scan Converting
Lines, Scan Converting Circles, Scan Converting Ellipses, Filling Rectangles, Filling Polygons,
Filling Ellipse Arcs, Pattern Filling, Thick Primitives, Line Style and Pen Style, Clipping in a
Raster World, Clipping Lines, Clipping Circles and Ellipses, Clipping Polygons, Generating
Characters, SRGP_copyPixel, Antialising.(8L)
Module- II
Graphics Hardware: Hardcopy Technologies, Display Technologies, Raster-Scan Display
Systems, The Video Controller, Random-Scan Display Processor, Input Devices for Operator
Interaction, Image Scanners.
Geometrical Transformations: 2D Transformations, Homogeneous Coordinates and Matrix
Representation of 2D Transformations, Composition of 2D Transformations, The Window-to-
View port Transformation, Efficiency, Matrix Representation of 3D Transformations,
Composition of 3D Transformations, Transformations as a Change in Coordinate System.
(8L)
Module- III
Viewing in 3D: Projections, Specifying an Arbitrary 3D View, Examples of 3D Viewing, The
Mathematics of Planar geometric Projections, Implementing Planar Geometric Projections,
Coordinate Systems. (8L)
Module -IV
Input Devices, Interaction Techniques, and Interaction Tasks: Interaction Hardware, Basic
Interaction Tasks, Composite Interaction Tasks.
Representation Curves and Surfaces : Polygon Meshes, Parametric Cubic Curves, Parametric
Bicubic Surfaces, Quadric Surfaces.
Achromatic and Colored Light: Achromatic Light, Chromatic Color, Color Models for Raster
Graphics, Reproducing Color, Using Color in Computer Graphics. (8L)
Module-V
The Quest for Visual Realism: Why Realism?, Fundamental Difficulties, Rendering Techniques
for Line Drawings, Rendering Techniques for Shaded Images, Improved Object Models,
Dynamics, Stereosis, Improved Displays, Interacting with Our Other Senses, Aliasing and
Antialiasing.
Visible-Surface Determination: Functions of Two Variables, Techniques for Efficient Visible-
Surface Algorithms, Algorithms for Visible-Line Determination, The z-Buffer Algorithms, List-
Priority Algorithms, Area-Subdivision Algorithms, Algorithms for Octress, Algorithms for
Curved Surfaces, Visible-Surface Ray Tracing.
Illumination and Shading: Illumination Models, Shading Models for Polygons, Surface Detail,
Shadows, Transparency, Inter object Reflections, Physically Based Illumination Models,
Extended Light Sources, Spectral Sampling. (8L)
Reference Book:
1.
Direct Assessment
Indirect Assessment
1. Student Feedback on Faculty
2. Student Feedback on Course Outcome
Course Objectives
This course enables the students:
A. To Characterize engineering systems in terms of their essential elements,
purpose, parameters, constraints, performance requirements, sub-systems,
interconnections and environmental context.
B. To understand Engineering problem modelling and solving through the
relationship between theoretical and mathematical
C. To provide Mathematical modelling real world situations related to engineering
systems development,
D. To able Generate random numbers and random variates using different
techniques.
E. To provide the knowledge of queuing theory to solve real life problem
Course Outcomes
After the completion of this course, students will be:
1. Define basic concepts in modeling and simulation (M&S).
2. Classify various simulation models and give practical examples for each
category.
3. Understand the behavior of a dynamic system and create an analogous model
for a dynamic system.
4. Generate and test random number variates and apply them to develop simulation
models.
5. Develop a real life model using queuing system.
The concepts of a system, System Environment, Stochastic Activities, continuous and discrete
systems, System Modeling, Types of models.
Module II
The technique of simulation, the Monte Carlo method, comparison of simulation and analytical
methods, experimental nature of simulation, types of system simulation, numerical computation
technique for continuous & discrete models, distributed lag models, cobweb models.
Continuous system models, differential equations, analog computers & methods, hybrid
computers, CSSLs, CSMP-III, Feedback Systems, Simulation of an Autopilot.(8L)
Module III
Exponential Growth & decay models, modified exponential growth models, logistic curves,
generalization of growth models, system dynamics diagrams, Simple system dynamics diagrams,
multi segment models, representation of time delays.(8L)
Module IV
Evaluation of continuous probability functions, continuous uniformly distributed random
numbers, a uniform random number numbers, generating discrete distributions, non-uniform
continuously distributed random numbers, the rejection method.
Random numbers Generators: Techniques for generating random numbers. Test for random
numbers.
Module V
Queuing disciplines, measures of queues. Discrete events, representation of time, generation of
arrival patterns, simulation of a telephone system, delayed calls, Simulation programming tasks,
measuring utilization and occupancy. (8L)
Text books:
nd
1. Edition, Pearson Education, 2007.
2. -Event System
th
Edition, Pearson Education, 2007.
Indirect Assessment
1. Student Feedback on Faculty
2. Student Feedback on Course Outcome
Course Objectives
This course enables the students to:
A. Construct the operational models for the real-world applications using Linear
Programming
C. Explain the computational feasibility of the solutions using the Deterministic and
Probabilistic Dynamic Programming
D. Model problems using Non-Linear Programming and evaluate the suitability of the
available techniques for the problem at hand
E. Produce the meta-heuristic algorithms for real world optimization
Course Outcomes
After the completion of this course, students will be able to:
1. Prepare the operational models for the real-world applications using Linear
Programming
3. Analyse the computational feasibility of the solutions using the Deterministic and
Probabilistic Dynamic Programming
4. Model problems using Non-Linear Programming and evaluate the suitability of the
available techniques for the problem at hand
MODULE II
Linear Programming Problem: Introduction, Mathematical Formulation of the Problem,
Graphical Solution Method, Some Exceptional Cases, General LPP, Canonical and Standard forms
of LPP, Simplex Method: Introduction, Fundamental properties of solutions, the Computational
Procedure, Use of Artificial variables, Solution to simulation Linear Equations, Investing a Matrix
using Simplex Method. (8L)
MODULE III
Duality in LPP: Introduction, General Primal Dual pair, Formulating a Dual Problem, Primal
Dual pair in Matrix form, Halting theorems, Dual simplex method, Post optical Analysis,
Introduction: Variation in cost vector, Requirement Vector, Coefficient Matrix, Structural
Variation. (8L)
MODULE IV
Integer Programming and Advance LPP techniques:
MODULE V
Dynamic Programming & Introduction: Characteristic of Dynamic Programming, Dynamic
Programming Algorithm, Solution of LPP by Dynamic Programming.
NLPP: Introduction, Formulality(8L)
Text Book:
th
1. Hiller S. & Lieberman G.J. Edition, TMH, New Delhi, 2012.
Reference Books:
th
1. Edition, Pearson Education, New Delhi, 2013.
st
2. Edition, Oxford University Press 2012.
Indirect Assessment
1. Student Feedback on Faculty
2. Student Feedback on Course Outcome
Course Objectives
This course enables the students:
A. To understand the algorithms available for the processing of linguistic
information and computational properties of natural languages.
B. To conceive basic knowledge on various morphological, syntactic and semantic
NLP tasks.
C. To familiarize various NLP software libraries and data sets publicly available.
Course Outcomes
After the completion of this course, students will be able to:
1. Describe the typical NLP problems, their importance & difficulty; and concepts
of morphology, syntax, semantics, discourse & pragmatics of natural language.
3. Discover various linguistic and statistical features relevant to the basic NLP task,
namely, spelling correction, morphological analysis, parts-of-speech tagging,
parsing and semantic analysis.
5. Evaluate a NLP system, identify shortcomings and suggest solutions for these
shortcomings.
MODULE-I
Introduction to NLP
NLP introduction and applications, NLP phases, Difficulty of NLP including ambiguity;
Spelling error and Noisy Channel Model; Concepts of Parts-of-speech and Formal Grammar of
English. (8L)
MODULE-II
Language Modelling: N-gram and Neural Language Models
Language Modelling with N-gram, Simple N-gram models, Smoothing (basic techniques),
Evaluating language models; Neural Network basics, Training; Neural Language Model, Case
study: application of neural language model in NLP system development.(8L)
MODULE-III
Parts-of-speech Tagging
Parts-of-speech Tagging: basic concepts; Tagset; Early approaches: Rule based and TBL; POS
tagging using HMM, POS Tagging using Maximum Entropy Model.(8L)
MODULE-IV
Parsing
Basic concepts: top down and bottom up parsing, treebank; Syntactic parsing: CKY parsing;
Statistical Parsing basics: Probabilistic Context Free Grammar (PCFG); Probabilistic CKY
Parsing of PCFGs. (8L)
MODULE-V
Semantics
Vector Semantics; Words and Vector; Measuring Similarity; Semantics with dense vectors;
SVD and Latent Semantic Analysis; Embeddings from prediction: Skip-gram and CBOW;
Concept of Word Sense; Introduction to WordNet.(8L)
Text books:
rd
1. Edition, 2018.
Reference books:
1. Jurafsky D. and Martin J. H., Speech and language processing: An Introduction to
nd
Indirect Assessment
1. Student Feedback on Faculty
2. Student Feedback on Course Outcome
Course Objectives
This course enables the students:
A. An ability to apply knowledge of mathematics, science and engineering to both software
and hardware design problems.
B. An ability to design and conduct experiments and to analyze and interpret data
related to software and hardware design solutions.
C. An ability to design a system, component or process to meet desired needs within
realistic constraints.
D. An ability to function on multidisciplinary teams using current computer
engineering tools and technologies.
E. An ability to identify, formulate and solve engineering problems based on a
fundamental understanding of concepts of computer engineering topics.
Course Outcomes
After the completion of this course, students will be able to:
1. Recall the principles and approaches of artificial intelligence and understand
different aspects of Intelligent agent.
2. Apply different search techniques for solving real world problems and select the
most appropriate solution by comparative evaluation.
5. Write various types of LISP and PROLOG programs and explore more
sophisticated LISP and PROLOG code.
MODULE-I
Introduction: Overview of Artificial Intelligence- Problems of AI, AI Technique, Tic - Tac -
Toe Problem.
Intelligent Agents: Agents & Environment, Nature Of Environment, Structure Of Agents, Goal
Based Agents, Utility Based Agents, Learning Agents.
Problem Solving: Problems, Problem Space & Search: Defining The Problem As State Space
Search, Production System, Problem Characteristics, Issues In The Design Of Search Programs.
(8L)
MODULE-II
Search Techniques: Solving Problems By Searching, Problem Solving Agents, Searching For
Solutions; Uniform Search Strategies: Breadth First Search, Depth First Search, Depth Limited
Search, Bi-directional Search, Comparing Uniform Search Strategies.
Heuristic Search Strategies: Greedy Best-First Search, A* Search, Memory Bounded Heuristic
Search: Local Search Algorithms & Optimization Problems: Hill Climbing Search, Simulated
Annealing Search, Local Beam Search, Genetic Algorithms; Constraint Satisfaction Problems,
Local Search For Constraint Satisfaction Problems.
Adversarial Search: Games, Optimal Decisions & Strategies in Games, The Mini Max Search
Procedure, Alpha-Beta Pruning, Additional Refinements, Iterative Deepening.(8L)
MODULE-III
Knowledge & Reasoning: Knowledge Representation Issues, Representation & Mapping,
Approaches to Knowledge Representation, Issues in Knowledge Representation.
Using Predicate Logic: Representing Simple Fact in Logic, Representing Instant & ISA
Relationship, Computable Functions & Predicates, Resolution, and Natural Deduction.
Representing Knowledge Using Rules: Procedural Verses Declarative Knowledge, Logic
Programming, Forward Verses Backward Reasoning, Matching, Control Knowledge(8L)
MODULE-IV
Probabilistic Reasoning: Representing Knowledge in an Uncertain Domain, Bayesian Networks,
Dempster-Shafer Theory.
Planning: Overview, Components of A Planning System, Goal Stack Planning, Hierarchical
Planning.
Learning: Forms Of Learning, Inductive Learning, Explanation Based Learning, Neural Net
Learning & Genetic Learning. (8L)
Direct Assessment
Indirect Assessment
1. Student Feedback on Faculty
2. Student Feedback on Course Outcome
Course Objective:
This course enables the students:
A. Understand the fundamentals of digital image processing.
B. Develop a Broad knowledge of Spatial and Frequency image transforms used for
enhancing an image.
C. Learn Image restoration techniques and noise models used for restoring an image.
Course Outcomes
After the completion of this course, students will be:
1. Understand the concept of image formation, digitization and the role human visual
system plays in perception of image data.
2. Acquire an appreciation for spatial and frequency based techniques for enhancing
the appearance of an image duly applying them in different applications.
3. Discern the difference between noise models, gain an insight into assessing the
degradation function and realize different spatial and frequency based filtering
techniques for reduction and removal of noise.
4. Synthesize a solution to image compression using the concept of information
theory and lossless and lossy compression techniques.
5. Design and create practical solutions using morphological operators for common
image processing problems and assess the results.
MODULE -I
What Is Digital Image Processing, Fundamental Steps in Digital Image Processing , Components
of an Image Processing System, Elements of Visual Perception, Light and the Electromagnetic
Spectrum, Image Sensing and Acquisition, Image Sampling and Quantization, Some Basic
Relationships Between Pixels, Linear and Nonlinear Operations. (8L)
MODULE -II
Enhancements in Spatial Domain: Some Basic Gray Level Transformations, Histogram
Processing, Enhancement Using Arithmetic/Logic Operations, Basics of Spatial Filtering,
Smoothing Spatial Filters, Sharpening Spatial Filters, Combining Spatial Enhancement Methods.
Enhancements in Frequency Domain: Introduction to the Fourier Transform and the Frequency
Domain, Smoothing Frequency-Domain Filters, Sharpening Frequency Domain Filters,
Homomorphism Filtering (8L)
MODULE -III
Image Restoration: A Model of the Image Degradation/Restoration Process, Noise Models.
Restoration in the Presence of Noise Only-Spatial Filtering, Periodic Noise Reduction by
Frequency Domain Filtering, Linear, Position-Invariant Degradations, Estimating the Degradation
Function, Inverse Filtering, Mean Square Error (Wiener) Filtering, Constrained Least Squares
Filtering, Geometric Mean Filter, Geometric Transformations. (8L)
MODULE -IV
Image Compression: Fundamentals, Image Compression Models, Elements of Information
Theory, Error-Free Compression, Lossy Compression.(8L)
MODULE -V Morphological
Image Processing and Segmentation: Preliminaries, Dilation and Erosion, Opening and Closing,
The Hit-or-Miss Transformation. Some Basic Morphological Algorithms, Detection of
Discontinuities, Edge Linking and Boundary Detection, Thresholding, Region-Based
Segmentation. (8L)
Text books:
rd
1. Edition, Pearson
Education, New Delhi, 2009.
Reference books:
th
1. Edition, John Wiley & sons Inc., 2006.
2. Sonka M., Hlavac Vaclav, Image Processing, Analysis and Machine
nd
Edition, Thomson Learning, India Edition, 2007.
3.
Direct Assessment
Indirect Assessment
1. Student Feedback on Faculty
2. Student Feedback on Course Outcome
Course Delivery Methods
Course Objective:
This course enables the students:
A. 1 To know the basic functions of different AI branches.
.
B. 2 To understand the functionalities of neural networks .
.
C. 3 To know the application of fuzzy logic.
.
D. 4 To understand the basic functionalities of optimizations through soft computing.
.
E. 5 To find the basic functions of soft computing.
.
Course Outcomes
After the completion of this course, students will be:
1. Solve numerical on Fuzzy sets and Fuzzy Reasoning.
MODULE III
Genetic Algorithms, Basic Concepts, Creation Of Offspring, Working Principle, Encoding, Fitness
Function, Reproduction.
Genetic Modeling, Inheritance Operations, Cross Over, Inversion And Deletion, Mutation
Operator, Bit Wise Operators, Generation Cycle, Convergence Of Genetic Algorithm, Application,
Multi-Level Optimization, Real Life Problems, Difference And Similarities Between GA And
Other Traditional Methods, Advanced In GA.(8L)
MODULE IV
Fundamentals Of Neural Networks, Basic Concepts Of Neural Network, Human Brain, Model Of
An Artificial Neuron, Neural Network Architectures, Characteristic Of Neural Networks, Learning
Method, Taxonomy Of Neural Network Architectures, History Of Neural Network Research, Early
Neural Network Architectures, Some Application Domains.(8L)
MODULE V
Back Propagation Network Architecture Of Back Propagation Network, Back Propagation
Learning, Illustration, Applications, Effect Of Tuning Parameters Of The Back Propagation Neural
Network, Selection Of Various Parameters In BPN, Variations Of Standard Back Propagation
Algorithm.
Associative Memory And Adaptive Resonance Theory, Autocorrelations, Hetrocorrelators ,
Multiple Training Encoding Strategy, Exponential BAM, Associative Memory For Real Coded
Pattern Pairs, Applications, Introduction To Adaptive Resonance Theory, ARTI, Character
Recognition Using ARI1(8L)
Text Book:
1.
Reference Book:
1. Jang JyhShing R, A
1997.
Direct Assessment
Indirect Assessment
1. Student Feedback on Faculty
2. Student Feedback on Course Outcome
Course Delivery Methods
Course Objectives
This course enables the students to:
1. Understand about security requirements in cloud.
2. Learn about infrastructure security at different levels
3. Know about management standards of cloud security
4. Develop and Apply trust-based security model to different layers
Course Outcomes
After the completion of this course, students will be able to:
1. Identify security aspects of each cloud model
2. Implement a public cloud instance using a public cloud service provider
3. Apply trust-based security model to different layer
4. Develop a risk-management strategy for moving to the Cloud
5. Identify various research domain of cloud computing
Module I
Introduction: Online Social Networks and Applications, Cloud introduction and overview,
Different clouds, Risks, Novel applications of cloud computing
(8L)
Module II
Requirements, Introduction Cloud computing architecture, On Demand Computing Virtualization
at the infrastructure level, Security in Cloud computing environments, CPU Virtualization, A
discussion on Hypervisors Storage Virtualization Cloud Computing Defined, The SPI Framework
for Cloud Computing, The Traditional Software Model, The Cloud Services Delivery Model, Key
Drivers to Adopting the Cloud, The Impact of Cloud Computing on Users, Governance in the
Cloud, Barriers to Cloud Computing Adoption in the Enterprise
(8L)
Module III
Infrastructure Security, Infrastructure Security: The Network Level, The Host Level, The
Application Level, Data Security and Storage, Aspects of Data Security, Data Security Mitigation
Provider Data and Its Security Identity and Access Management Trust Boundaries and IAM, IAM
Challenges, Relevant IAM Standards and Protocols for Cloud Services, IAM Practices in the
Cloud, Cloud Authorization Management.
(8L)
Module IV
Security Management Standards, Security Management in the Cloud, Availability Management:
SaaS, PaaS, IaaS, Privacy Issues: Privacy Issues, Data Life Cycle, Key Privacy Concerns in the
Cloud, Protecting Privacy, Changes to Privacy Risk Management and Compliance in Relation to
Cloud Computing, Legal and Regulatory Implications, U.S. Laws and Regulations, International
Laws and Regulations.
(8L)
Module V
Internal Policy Compliance, Governance, Risk, and Compliance (GRC), Regulatory/External
Compliance, Cloud Security Alliance, Auditing the Cloud for Compliance, Security-as-a-Cloud,
Recent developments in hybrid cloud and cloud security(8L)
Text Books:
1.
2009.
2. Security and Privacy: An Enterprise Perspective on Risks and
-10: 0596802765, O'Reilly Media, 2009.
Indirect Assessment
1. Student Feedback on Faculty
2. Student Feedback on Course Outcome
Course Objectives
This course enables the students:
1. To formulate machine learning problems corresponding to different
applications.
2. To understand various supervised, semi-supervised and unsupervised machine
learning algorithms.
3. To familiarize various machine learning software libraries and data sets publicly
available.
4. To develop machine learning based system for various real-world problems.
5. To assess how the choice of a machine learning algorithm impacts the accuracy
of a system.
Course Outcomes
After the completion of this course, students will be able to:
1. Formulate machine learning problems corresponding to different applications:
data, model selection, model complexity
2. Demonstrate understanding of a range of machine learning algorithms along
with their strengths and weaknesses
3. Implement machine learning solutions to classification, regression, and
clustering problems
4. Design and implement various machine learning algorithms in a range of real-
world applications
5. Evaluate and analyse the performance of a machine learning algorithm or a
system based on machine learning algorithm.
Module II
Supervised Learning
Basics of Feature Selection and Evaluation, Decision Tree, Overfitting and Pruning, Logistic
regression, Support Vector Machine and Kernel; Noise, bias-variance trade-off, under-fitting and
over-fitting concepts.
(8L)
Module III
Neural Networks
Perceptrons: representational limitation and gradient descent training. Multilayer networks and
backpropagation. Hidden layers and constructing intermediate, distributed representations.
Overfitting, learning network structure, recurrent networks.
(8L)
Module IV
Unsupervised and Semi Supervised Learning
Learning from unclassified data. Clustering. Hierarchical Agglomerative Clustering. k-
meanspartitional clustering. Expectation maximization (EM) for soft clustering. Semi-supervised
learning with EM using labeled and unlabled data.
(8L)
Module V
Ensemble
Committees of multiple hypotheses, bagging, boosting, active learning with ensembles.
(8L)
Text Books:
1. -Graw Hill.
Reference Books:
1.
University Press, 2017.
2.
Indirect Assessment
1. Student Feedback on Faculty
2. Student Feedback on Course Outcome
Course Delivery Methods
Course Objectives
This course enables the students:
A. To appreciate the problems of computing with big data
Course Outcomes
After the completion of this course, students will be:
1. Able to map problems to in memory computing architectures.
2. Able to apply Spark for solving simple problems using the basic data structures
4. Able to work with streaming data in Spark and analyse the results
MODULE -I
An introduction to Apache Spark, Basic Architecture, Spark APIs, Spark Session, Dataframes,
Transformations, Actions, Datasets, Structured Streaming(8L)
MODULE -II
Structured APIs, Overview, Basic Structured Operations, Different types of Data, Aggregations,
Joins, Data Sources, SparkSQL, Datasets (8L)
MODULE -III
Low Level API, Resilient Distributed Datasets, Advanced Resilient Distributed Datasets,
Distributed shared variables. (8L)
MODULE -IV
Streaming, Fundamentals, Structured Streaming basics, Event time and stateful processing
(8L)
MODULE -V
Machine Learning, Preprocessing and feature engineering, Classification, Unsupervised learning
(8L)
Text books:
1. Big Data Processing made
st
Indirect Assessment
1. Student Feedback on Faculty
Course Objectives
This course enables the students:
1. To understand the foundations of cryptographic attacks.
2. To gain knowledge of encrypting data, and to choose between different
algorithms.
3. Prepare students for research in the area of cryptography and enhance students
communication and problem solving skills
4. To differentiate between the encryption techniques and know their suitability
to an application.
5. To effectively apply their knowledge to the construction of secure
cryptosystems.
Course Outcomes
After the completion of this course, students will be able to:
1. Understand the various types of cryptographic attacks and the mathematics
behind cryptography.
2. Describe the various types of ciphers and hash functions.
3. Apply the different cryptographic techniques to solve real life problems.
4. Evaluate different techniques as to their suitability to various applications.
5. Develop a cryptosystem keeping in view social issues and societal impacts.
Module I
Foundations Protocol Building Blocks - Basic Protocols - Intermediate Protocols - Advanced
Protocols - Zero-Knowledge Proofs - Zero-Knowledge Proofs of Identity -Blind Signatures -
Identity-Based Public-Key Cryptography. (8L)
Module II
Key Length - Key Management Public Key Cryptography versus Symmetric Cryptography -
Encrypting Communications Channels - Encrypting Data for Storage - Hardware Encryption
versus Software Encryption - Compression, Encoding, and Encryption - Detecting Encryption
Hiding and Destroying Information. (8L)
Module III
Information Theory - Complexity Theory - Number Theory - Factoring - Prime Number
Generation - Discrete Logarithms in a Finite Field - Data Encryption Standard (DES) Lucifer -
Madryga - NewDES - GOST 3 Way Crab RC5 - Double Encryption - Triple Encryption -
CDMF Key Shortening - Whitening. (8L)
Module IV
Pseudo-Random-Sequence Generators and Stream Ciphers RC4 - SEAL - Feedback with Carry
Shift Registers - Stream Ciphers Using FCSRs - Nonlinear-Feedback Shift Registers - System-
Theoretic Approach to Stream-Cipher Design - Complexity-Theoretic Approach to Stream-Cipher
Design - N- Hash - MD4 - MD5 - MD2 - Secure Hash Algorithm (SHA) - OneWay Hash
Functions Using Symmetric Block Algorithms - Using Public-Key Algorithms - Message
Authentication Codes (8L)
Module V
RSA - Pohlig-Hellman - McEliece - Elliptic Curve Cryptosystems -Digital Signature Algorithm
(DSA) - Gost Digital Signature Algorithm - Discrete Logarithm Signature Schemes - Ongchnorr-
Shamir -Cellular Automata - Feige-Fiat-Shamir -Guillou-Quisquater - Diffie-Hellman - Station-to-
Station Protocol - -Pass Protocol - IBM Secret-Key Management Protocol -
MITRENET - Kerberos - IBM Common Cryptographic Architecture. (8L)
Text Books:
1.
2nd Edition, John Wiley & Sons, Inc, 1996.
2.
3.
Reference Book:
1. Stallings William,
Education.
Direct Assessment
Indirect Assessment
1. Student Feedback on Faculty
2. Student Feedback on Course Outcome
Course Objectives
This course enables the students to:
1. Understand the basic concept and the IoT Paradigm
2. Know the state of art architecture for IoT applications
3. Learn the available protocols used for IoT
4. Design basic IoT Applications.
5. Evaluate optimal IoT applications.
Course Outcomes
After the completion of this course, students will be able to:
1. Identify the IoT Components and its capabilities
2. Explain the architectural view of IoT under real world constraints
3. Analyse the different Network and link layer protocols
4. Evaluate and choose among the transport layer protocols
5. Design an IoT application
Module I
IoT - An Architectural Overview
Building an architecture, Main design principles and needed capabilities, An IoT architecture
outline, standards considerations. M2M and IoT Technology Fundamentals- Devices and
gateways, Local and wide area networking, Data management, Business processes in IoT,
Everything as a Service(XaaS), M2M and IoT Analytics, Knowledge Management. (8L)
Module II
IoT Architecture - State of the Art
Introduction, State of the art, Reference Model and architecture, IoT reference Model - IoT
Reference Architecture; Introduction, Functional View, Information View, Deployment and
Operational View (8L)
Module III
IoT Data Link Layer & Network Layer Protocols
PHY/MAC Layer (3GPP MTC, IEEE 802.11, IEEE 802.15), WirelessHART,Bluetooth Low
Energy, Zigbee Smart Energy
Network Layer-IPv4, IPv6, 6LoWPAN (8L)
Module IV
Transport & Session Layer Protocols
Transport Layer (TCP, MPTCP, UDP,) Session Layer-HTTP, CoAP, XMPP, AMQP, MQTT.
(8L)
Module V
Layer Protocols & Security
Service Layer -oneM2M, ETSI M2M
Security in IoT Protocols MAC 802.15.4, 6LoWPAN, RPL, Application Layer protocols.
(8L)
Text Books:
1. Holler Jan, TsiatsisVlasios, Mulligan Catherine, Avesand Stefan, Karnouskos Stamatis,
From Machine-to-Machine to the Internet of Things: Introduction to a New
st
Edition, Academic Press, 2014.
2. -
MUMBAI
Reference Books:
1.
ISBN 978-3-642-19156-5 e-ISBN 978-3-642-19157-2.
2.
Indirect Assessment
1. Student Feedback on Faculty
2. Student Feedback on Course Outcome
Course Objectives
This course enables the students:
A. Understand basic mobile network concepts and its architectures.
B. Know Protocols like mobile telephony and introduce to the concepts of bluetooths
etc.
C. Comprehend the GSM architectures and its features that support mobile
communications.
D. Understand the network management and Middleware services used in Ip and Mobile
telephony
E. Get accustomed to the concepts like GPRS, 3G, 4G networks
Course Outcomes
After the completion of this course, students will be:
1. Identify the role of cellular networks in Mobile and Pervasive Computing
3. Assess the principles for routing and allocating the resources on the 3G-4G wireless
network
Introduction: Mobility of bits and bytes, wireless the beginning, mobile computing, dialogue
control, Networks, middleware and gateways, application and services, developing mobile
computing applications, security in mobile computing, standard bodies. Mobile Computing
Architecture: architecture for mobile computing, three tier architecture,
(8L)
Module II
Mobile Computing through Telephony: evolution of telephony, multiple access procedures, mobile
computing through telephone. Emerging Technologies: introduction, Bluetooth, radio frequency
identification, wireless broadband, mobile IP, IPV6,.(8L)
Module III
Global System for Mobile Communications GSM: introduction, GSM architecture , call routing in
GSM, PLMN interface, GSM address and identifiers, network aspect in GSM, GSM frequency
allocation, authenticity and security. Short Message Service SMS : Mobile computing over SMS,
Short message services(SMS) (8L)
Module IV
General Packet Radio Service GPRS:GPRS and packet data network, GPRS network architecture,
GPRS network operation, data services in GPRS, applications for GPRS, limitations for GPRS,
billing and charging in GPRS. Wireless Application Protocol WAP: introduction , WAP, MMS,
GPRS applications.
CDMA and 3G
Client Programming: introduction, moving beyond the desktop, a peak under the hood: hardware
overview, mobile phone, PDA, design constraints in application for handheld devices. (8L)
Module V
Voice Over Internet Protocol and Convergence: VoIP, H 323 framework for VoIP 564, SIP,
comparision between H.323 and SIP 570, Real time protocol, convergence technologies, call
routing, voice over IP applications, IP multimedia subsystem, Mobile VoIP. (8L)
Text Book:
1.
-Hill Education ,2010.
October 2004.
4. Adelstein Frank, Gupta Sandeep K.S., Richard III Golden G., Schwiebert, Loren,
-Hill
Professional, 2005.
5.
nd
Edition., Springer, 2003.
Direct Assessment
Indirect Assessment
1. Student Feedback on Faculty
2. Student Feedback on Course Outcome
Course Objectives
This course enables the students:
A. To understand what constitutes multimedia
B. Understand the underlying concepts and mathematics of multimedia
C. Get acquainted with the hardware and software that constitutes multimedia
D. Know basic algorithms in the field of multimedia and animation
E. Know file formats and their importance
Course Outcomes
After the completion of this course, students will be:
1. Evaluate the uses of multimedia and different standards in graphics, video, audio,
animation, CDROM and other hardware
2. Apply the principles of multimedia development, including story-board techniques
and develop a suitable story-board for a small multimedia project
3. Implement the multimedia project using appropriate technology
4. Describe and evaluate a variety of 3D principles and techniques
5. Design and create concept artwork for a short animated project, including
storyboards, turnaround artwork and technical drawings.
Introduction, Multimedia Information Applications, Issues and Challenges, Semantic Models for
Multimedia Information Systems, Multimedia Semantic Models (8L)
MODULE -II
MODULE -III
MODULE -IV
Augmented Transition Network Model (ATN), Spatial and Temporal Relations of Semantic
Objects, Multimedia Presentations, Multimedia Database Searching, Multimedia Browsing, User
Interactions and Loops (8L)
MODULE -V
Object Composition Petri Net Model, Interval Based Conceptual Models (8L)
Text Book:
Reference Book:
-Centered
Direct Assessment
Indirect Assessment
1. Student Feedback on Faculty
2. Student Feedback on Course Outcome
Course Objectives
Course Outcomes
CO3 To test and execute the graphical syntax and logical errors.
5. To draw a line using the line function. Take the end co-ordinates from the user.
15. To draw a line using DDA algo, where end points are taken from the user.
18. To create a line and increase its size with a value taken from user.
22. To create a circle and translate it with a value taken from user.
26. To shear a rectangle. Take the shear factor from the user.
27. To create an equilateral triangle and translate, rotate and scale it.
Books recommended:
TEXT BOOK
2. Donald Hearn, M. Pauline Baker, Computer Graphics, C Version, Prentice Hall Publication
3. https://www.programmingsimplified.com/c/graphics.
Indirect Assessment
1. Student Feedback on Faculty
2. Student Feedback on Course Outcome
Course Outcomes
After the completion of this course, students will be able to:
CO2 Use of these tools for any engineering and real time applications.
CO3 Acquire knowledge on utilizing these tools for a better project in their
curriculum as well as they will be prepared to handle industry problems
with confidence when it matters to use these tools in their employment.
TEXT BOOKS
1. Beginning Blender: Open Source 3D Modeling, Animation, and Game Design By
Lance Flavel(T1)
2. (T2)
REFERENCE BOOKS
Indirect Assessment
1. Student Feedback on Faculty
2. Student Feedback on Course Outcome