B. TECH. FOUR YEAR DEGREE COURSE R18 - SVECW
-
Upload
khangminh22 -
Category
Documents
-
view
1 -
download
0
Transcript of B. TECH. FOUR YEAR DEGREE COURSE R18 - SVECW
B. TECH. FOUR YEAR DEGREE COURSE
DEPARTMENT OF COMPUTER SCIENCE & ENGINEERING
R18 – REGULATIONS, COURSE STRUCTURE & SYLLABUS
(Applicable for the batches admitted from 2018-19)
SHRI VISHNU ENGINEERING COLLEGE FOR WOMEN :: BHIMAVARAM
(Autonomous)
Approved by AICTE & Affiliated to JNTU-K, Kakinada
Accredited with ‘A’ grade by NAAC & NBA
Vishnupur, Bhimavaram -534202
West Godavari Dist., Andhra Pradesh, India
Email: [email protected], website: www.svecw.edu.in
SHRI VISHNU ENGINEERING COLLEGE FOR WOMEN:: BHIMAVARAM
(AUTONOMOUS)
VISION
Transform the society through excellence in Education, Community empowerment
and sustained Environmental protection.
MISSION
To achieve Academic excellence through innovative learning practices
To instill self confidence among rural students by supplementing with co-
curricular and extra-curricular activities
To inculcate discipline and values among students
To establish centers for Institute Industry partnership
To extend financial assistance for the economically weaker sections
To create self-employment opportunities and skill up gradation
To support environment friendly Green Practices
Creating innovation hubs
SHRI VISHNU ENGINEERING COLLEGE FOR WOMEN:: BHIMAVARAM
(AUTONOMOUS)
Department of Computer Science & Engineering
Vision To become a leader in providing academic excellence with career development skills
and research abilities in the area of Computer Science & Engineering.
Mission
To achieve Academic excellence through innovative learning practices
To prepare students to adapt to the challenges of an ever-changing market needs
To build necessary skills required for employability through career development
training
To create interest among students to pursue higher studies
To enrich students with good character, and high integrity to serve the society
To promote research and development in the frontier areas of Computer Science &
Engineering
To inculcate the spirit of moral values and discipline among students
ACADEMIC REGULATIONS
B.Tech. FOUR YEAR DEGREE COURSE
R18 Regulations
(Applicable for the batches admitted from 2018-2019)
SHRI VISHNU ENGINEERING COLLEGE FOR WOMEN : BHIMAVARAM (Autonomous)
Approved by AICTE & Affiliated to JNTUK, Kakinada
Accredited with ‘A’ Grade by NAAC & NBA
Vishnupur, Bhimavaram, West Godavari Dist., Andhra Pradesh, India. PIN - 534202
Email: [email protected], Website: www.svecw.edu.in
®
REGULATIONS THE DEGREE OF BACHELOR OF TECHNOLOGY - REGULAR
(With effect from 2018-19)
RB 0.0
TITLE AND DURATION OF THE COURSE
The course shall be called the degree course in Bachelor of Technology, abbreviated as B.Tech. The course shall be of four academic years duration divided into eight semesters, each semester having duration of minimum 16 weeks. The calendar of events in respect of the course shall be fixed by the Institute from time to time. The external examination in all the subjects shall be conducted at the end of each semester for all the eight semesters. Students joining the B.Tech . programme shall have to complete the programme in a stipulated time frame of 8 years from the date of joining a n d students joining the B.Tech. Programme in the third semester directly through Lateral Entry Scheme (LES) shall have to complete the programme in a stipulated time frame of 6 years from the date of joining otherwise; they shall forfeit their seat in B.Tech. Programme and their admission shall stand cancelled. The students who availed GAP years facility can complete the programme in 10 years.
When a student is detained for lack of credits / shortage of attendance, she may be re-admitted into the same semester / year in which she has been detained. However, the academic regulations under which she was first admitted shall continue to be applicable to her.
RB 1.0 ELIGIBILITY FOR ADMISSION
RB 1.1 Admissions are done as per the norms prescribed by Government. The Government orders issued from time to time in this regard shall prevail.
RB 1.2 The Candidate shall be an Indian National.
RB 1.3 The Candidate should have passed the qualifying examination, Intermediate or equivalent on the date of admission.
RB 1.4 Seats in each programme in the college are classified into CATEGORY-A (70% of intake) and CATEGORY – B (30% of intake) besides lateral entry.
RB 1.5
Category ‘A’ Seats shall be filled by the Convener, EAMCET Admissions. Category ‘B’ Seats shall be filled by the College as per the guidelines of Andhra Pradesh State Council of Higher Education. ‘Lateral Entry’ candidates (20% of the intake) shall be admitted into the Third semester directly based on the rank secured by the candidate in Engineering Common Entrance Test (ECET) in accordance with the instructions received from the Convener, ECET and Government of Andhra Pradesh.
RB 2.0 AWARD OF B.TECH. DEGREE
RB 2.1
A Student shall be declared eligible for the award of the B.Tech. Degree, if she pursues a course of study in not less than four and not more than eight academic years (plus maximum of 2 years of GAP years). A Student admitted into III semester shall be declared eligible for the award of the B.Tech. Degree, if she pursues a course of study in not less than three and not more than six academic years (plus maximum of 2 years of GAP years).
RB 2.2
Each discipline of the B.Tech. programme is designed to have a total of 160 credits and the student shall have to complete the courses and earn all credits as per the requirements for award of the degree. Students joining the B.Tech. programme in the third semester directly through Lateral Entry Scheme (LES) shall have to complete the courses, excluding first year courses and earn 124 credits as per the requirements for award of the degree.
RB 2.3
The B.Tech. Degree shall be conferred on a candidate who has satisfied the following requirements. A Regular student (four year programme) should register herself for 160 credits. In order to become eligible for the award of B.Tech. Degree, the student must obtain 160 credits. A Lateral Entry student should register herself for 124 credits and should obtain all the credits. However, it is mandatory for the students to complete the noncredit courses
RB 3.0 MINIMUM INSTRUCTION DAYS
RB 3.1 The minimum instruction days for each semester shall be 90 working days.
RB 4.0 COURSES OF STUDY
Branch Code- Branch Abbreviation 01-CE ( Civil Engineering ) 02-EEE ( Electrical and Electronics Engineering ) 03-ME (Mechanical Engineering ) 04-ECE ( Electronics and Communication Engineering ) 05-CSE ( Computer Science & Engineering ) 12-IT ( Information Technology )
RB 4.1
Groups of Courses: The Courses in the B.Tech. Programme is of five kinds: Core, Professional Elective, Open Elective, Free Elective and Mandatory Audit Course. Core Course: These are courses which are to be compulsorily studied by a student and it is the core requirement to complete the programme in a said branch. Professional Elective Course: A student can choose a course (subject) from a pool of courses of branch concerned, which add proficiency to the students. Open Elective Course: These are the courses offered by other branches. These courses are designed to lead to knowledge enhancement in multi disciplinary domains. Free Elective Course: A student can choose a course (subject) from a pool of courses of branch concerned, which add proficiency to the students. Mandatory Audit Course: These courses allow a student to attend classes without the benefit of a grade for a course. An undergraduate student who audits a course does so, for the purpose of self-enrichment and academic exploration.
RB 5.0 DISTRIBUTION AND WEIGHTAGE OF MARKS
RB 5.1
The performance of a student in each semester shall be evaluated subject wise with a maximum of 100 marks for theory and 75 marks for practical subject. The main project work shall be evaluated for 200 marks, Mini Project 1 and Mini Project 2 are evaluated each for 50 marks and seminar is evaluated for 50 marks.
RB 5.2
For theory subjects, the distribution shall be 40 marks for Internal Evaluation and 60 marks for the End Examinations.
RB 5.3
Internal evaluation 40 marks shall be awarded as follows: 20 marks for Descriptive, 10 marks for Quiz and 10 marks for Assignment. The descriptive examination is for 90 minutes duration conducted for 30 marks. Each descriptive examination question paper consists of three questions (either - or type) from three units. Three questions to be answered, one from each unit. The descriptive examination conducted for 30 Marks is to be brought down to total marks of 20. The quiz examination is for 20 minutes duration (Conducted with 20 multiple choice questions with a weightage of ½ Mark each). Thought provoking questions shall be covered in Quiz examination.
After every two Units, one Assignment/Tutorial shall be conducted. Two questions from each Unit and maximum of 4 questions must be set in Assignment. Assignment/Tutorial consists of Theory, Design, Analysis, Simulation, Algorithms, Drawing, etc. as the case may be. Out of the 3 Assignments / tutorials, average of best of the 2 Assignments shall be considered for awarding of marks.
For theory subjects, during the semester there shall be 2 MID tests. As the syllabus is framed for 6 units, the First MID examination (both descriptive and quiz) is conducted from first three units and Second MID examination (both descriptive and quiz) is considered from last three units of each subject. Average of two Mid tests (both descriptive and quiz) shall be considered as final marks of the MID. Eg: A student got 18 marks out of 20 marks in Descriptive-1, 8 marks out of 10 marks in Quiz-1 and 8 marks out of 20 marks in Descriptive-2 and 2 marks out of 10 marks in Quiz-2. Assignment-1 = 9 out of 10, Assignment-2 = 4 out of 10 and Assignment-3 = 10 out of 10. The student Internal marks are = ((26+10)/2 + ((9+10)/2) = 27.5 is rounded to 28 marks out of 40 marks. If a student is absent for any one MID examination, she can appear for a Grand Test after MID-2. The Grand Test will be conducted with questions covering the entire syllabus. The marks in the grand test is reduced to 30 marks and to be considered for respective mid. ** All the fractional marks are rounded to the next higher whole digit.
RB 5.4
The end semester examination is conducted for 60 marks by covering the topics of all units. The end examination paper contains 12 questions (two from each unit with either - or choice) of 10 marks each. 1 question has to be answered from each unit. (6 x 10 = 60 marks)
RB 5.5
For practical subjects, there shall be continuous evaluation during the semester for 25 internal marks. Out of the 25 marks for internal, day-to-day work 10 marks, Record 5 marks and 10 marks to be awarded by conducting an internal laboratory test. The end examination shall be conducted for 50 marks by the internal examiner and external examiner.
RB 5.6
For the subject having design and/or drawing (such as Engineering Graphics, Engineering Drawing, Machine Drawing) and estimation, the distribution shall be 40 marks for internal evaluation (20 marks for day–to–day work, and 20 marks for MID tests) and 60 marks for end examination. The average of 2 MIDs shall be considered as final marks of the MID.
RB 5.7
For the seminar, the student shall collect the information on a specialized topic and prepare a technical report showing her understanding over the topic, and submit to the department, which shall be evaluated by the Departmental Committee consisting of Head of the Department, seminar supervisor and senior faculty member. The seminar report shall be evaluated for 50 marks. There shall be no external examination for seminar.
RB 5.8
Out of a total of 200 marks for the main project work, 100 marks shall be for Internal Evaluation and 100 marks for the End Semester Examination. The End Semester Examination (Viva – Voce) shall be conducted by the Committee. The Committee consists of an external examiner, Head of the Department and Supervisor of the Project. The evaluation of project work shall be conducted at the end of the Eighth semester. The Internal Evaluation marks shall be on the basis of Two seminars given by each student on the topic of her project and evaluated by an Internal Committee, consisting of Head of the department, supervisor of the project and a senior faculty member.
RB 5.9
For the mini project works, 50 marks shall be for Internal Evaluation. Viva- Voce shall be conducted by the Committee. The Committee consists of Head of the Department and Supervisor of the Project. The Viva–Voce may be conducted along with respective semester lab external examinations. There shall be no external examination for mini projects.
RB 5.10
Laboratory marks and the internal marks awarded by the department are not final. The marks are subjected to be scrutinized and scaled by the Institute wherever it felt desirable. The internal and laboratory marks awarded by the department shall be referred to a Committee if required. The Committee shall arrive at a scaling factor and the marks shall be scaled as per the scaling factor. The recommendations of the Committee are final and binding. The laboratory records and internal test papers shall be preserved for two years after the final examinations of that semester in the respective departments as per the norms of the Institute and shall be produced to the Committees as and when they ask for.
RB 6.0
PROGRAMME STRUCTURE
Basic Science Courses 10-12%
Engineering Science Courses 9-10%
Humanities and Social Science Courses 6-8%
Professional Core Courses 55-65%
Professional Elective Courses 10-12%
Project
5-7%
Open Elective Courses 5-7%
Internships / Certification Courses/ Seminar 3-4%
Mandatory Audit Courses – 6 courses without credits - RB 7.0 SCHEME OF INSTRUCTION FOR I, II, III AND IV YEARS
RB 7.1 The Schemes of Instruction and syllabi of all B.Tech. programmes are given separately, which are approved by the BOS concerned and the Academic Council.
RB 8.0 CONTACT HOURS AND CREDITS
RB 8.1 One hour of lecture/Tutorial is equivalent to one credit and one hour of practical work/field work is equivalent to 0.5 credit.
RB 8.2
THEORY / TUTORIAL CLASSES Each course is prescribed with fixed number of lecture periods per week. During lecture periods, the course instructor shall deal with the concepts of the course. For certain courses, tutorial periods are prescribed in order to give exercises to the students and to closely monitor their learning abilities and achievements.
RB 8.3
LABORATORY / DRAWING COURSES A minimum prescribed number of experiments/drawings/jobs/programmes have to be performed by students, who shall complete these in all aspects and get each experiment evaluated by teacher concerned and certified by the Head of the Department concerned at the end of the semester.
RB 9.0 MEDIUM OF INSTRUCTION
The Medium of Instruction and examination is in English.
RB 10 ATTENDANCE REQUIREMENTS
RB 10.1
In each semester the candidate has to put in a minimum attendance of 75% with a provision of condonation of 10% of the attendance by the Principal on the specific recommendation of the HOD, showing some reasonable cause such as medical grounds, participation in University level sports, cultural activities, seminars, workshops, paper presentation etc.
RB 10.2 Shortage of attendance below 65% in aggregate shall not be condoned.
RB 10.3 Students, having shortage of attendance and got condonation for attendance, shall have to pay requisite fee towards condonation.
RB 10.4 Students whose shortage of attendance is not condoned will be detained and the student has to re-register for that semester when it is offered by the department.
RB 10.5
Rules for calculation of attendance for the re-admitted candidates who were detained for want of attendance or who had break – in study for various reasons: a) No. of classes conducted shall be counted from the day one of the semester concerned, irrespective of the date of payment of tuition fee. b) They should submit a written request to the Principal, along with a challan paid towards tuition and other fee, for re-admission before the commencement of class-work. c) Student should come to know about the date of commencement of class-work of the semester into which she wishes to get re-admission. The information regarding date of commencement of class-work for each semester is available in the college notice boards/ website. RB 11.0 CONDITIONS FOR PASS AND AWARD OF CREDITS FOR A COURSE
RB 11.1
A candidate shall be declared to have passed in individual theory/drawing course if she secures a minimum of 40% aggregate marks (40 marks out of 100, Internal and semester end examination marks put together), subject to a minimum of 35% marks (21 marks out of 60) in semester end examination. For successful completion of mandatory audit course the student must get a satisfactory grade from the department offering the course. If fails, she has to reappear whenever the course is offered.
RB 11.2
A candidate shall be declared to have passed in individual lab/project course if she secures a minimum of 40% aggregate marks (Internal and semester end examination marks put together), subject to minimum of 35% marks in semester end examination.
RB 11.3 The student has to pass the failed course by appearing the supplementary examination as per the requirement for the award of degree.
RB 11.4 On passing a course of a programme, the student shall earn assigned credits in that course. RB 12.0 TRANSITORY REGULATIONS
RB 12.1
A candidate, who is detained or discontinued in the semester, on readmission shall be required to pass all the courses in the curriculum prescribed for such batch of students in which she joins subsequently. However, exemption shall be given to those candidates who have already passed in such courses in the earlier semester(s) and substitute subject may be offered as approved by College Academic Committee and ratified by Academic Council.
RB 12.2 A student shall be eligible for promotion to next semester of B.Tech. programme, if she satisfies the conditions as stipulated in Regulation RB10.
RB 12.3
Further, a student shall be eligible for promotion to V / VII Semesters of B.Tech. programme, if she acquires the minimum number of credits as given below: A student shall be promoted from Semester - IV to Semester - V or from Semester - VI to Semester - VII only if she fulfills the academic requirements of 50% of the credits from the exams for which results are declared. For Lateral Entry Candidates
A student shall be promoted from Semester - VI to Semester - VII only if she fulfills the academic requirements of 50% credits from the exams for which results are declared.
UG IT 1 T 01 18
RB 13.0
COURSE CODE AND COURSE NUMBERING SCHEME: The subject codes shall be given by the Department teaching the subject. Each subject code contains 10 characters. The 10 Characters for each subject shall be coded as per the following guidelines.
While giving the subject codes the Departments can follow the following steps. i. Collect the requirements from various Departments.(subjects which they have to teach for other Departments) ii. Prepare a list of all the subjects the Departments have to teach in that semester (for their Department as well as other Departments based on the requirements they have collected in point i.) iii. Give subject codes to all these subjects following the guidelines given. iv. Communicate these subject codes(identified in point i) to various Departments. v. Use the subject codes identified in point iii to the subjects in their course structure.
RB 14.0 CONSOLIDATED GRADE CARD
A consolidated grade card containing credits and grades obtained by the candidate shall be issued after completion of the four years B.Tech. Programme.
UG for B.Tech.
subjects
PG for M.Tech/MBA
subjects
Code of the Dept
teaching the subject
IT – IT
CS – CSE
EC – ECE
EE – EEE
ME – Mech
CE – Civil
MB – MBA
BS – Basic Sc.
Semester
Number
1/2/3/…/8
Type of subject
T – Theory-Core/Elective P – Practical S – Seminar J – Project A – Mandatory Audit course M – MOOC I – Internship/certification course/Yoga/Foreign languages/EPICS
Serial Number of the
course taught by the
department in the
semester
01/02/03/….
Regulation
Year
RB 15.0 METHOD OF AWARDING LETTER GRADES AND GRADE POINTS FOR A COURSE
RB 15.1
A letter grade and grade point shall be awarded to the student in each course based on her performance as per the grading system given below
Marks Range Theory (Max – 100)
Marks Range Lab (Max – 75)
Letter Grade Level Grade Point
≥ 90 ≥ 67 O Outstanding 10
≥ 80 < 90 ≥ 60 < 67 S Excellent 9
≥ 70 < 80 ≥ 52 < 60 A Very Good 8
≥ 60 < 70 ≥ 45 < 52 B Good 7
≥ 50 < 60 ≥ 37 < 45 C Fair 6
≥ 40 < 50 ≥ 30 < 37 D Satisfactory 5
< 40 < 30 F Fail 0
Absent 0
RB 15.2
Calculation of Semester Grade Points Average(SGPA)* for semester: The Performance of each student at the end of each semester is indicated in terms of SGPA. The SGPA is calculated as below:
SGPA (Si) = ∑(Ci x Gi) / ∑Ci (for all courses passed in that semester)
Where Ci is the number of credits of the ith course and Gi is the grade point scored by the student in the ith course.
* SGPA is calculated for the candidates who passed all the courses in that semester
RB 15.3
Calculation of Cumulative Grade Points Average (CGPA) The CGPA is calculated as below:
CGPA =∑(Ci x Si) / ∑Ci (for entire programme)
Where Si is the SGPA of the ith semester and Ci is the total number of credits in that semester. The SGPA and CGPA shall be rounded off to 2 decimal points and reported in the transcripts
RB 15.4 Equivalent Percentage for CGPA is = (CGPA-0.75) x 10
RB 16.0
REVALUATION As per the notification issued by the Controller of Examination, the student can submit the application for revaluation, along with the fee receipt for revaluation of her answer script(s) of theory course(s), if she is not satisfied with the Grade obtained. The Controller of Examination shall arrange for revaluation of those answer script(s).
RB 16.1
For Revaluation a new external examiner, other than the first examiner, shall re-evaluate the answer
script(s). If there is any change in marks (below 15% of the maximum External marks) the highest of
the two marks will be considered and if there is any change in marks (Equal or above 15% of the
maximum External marks), the script will be evaluated by the third valuator. The marks of all the
three valuators are compared and the average of two nearer marks will be awarded to the student.
RB 17.0
SUPPLEMENTARY EXAMINATIONS.
Supplementary examinations shall be conducted twice in an academic year, along with regular semester end examinations.
RB 18.0
READMISSION CRITERIA.
A candidate, who is detained in a semester due to lack of attendance/ credits, has to obtain written permission from the Principal for readmission in the same semester after duly fulfilling all the required norms stipulated by the college in addition to paying an administrative fee of Rs.1,000/-
RB 19.0
BREAK IN STUDY.
Student, who discontinues her studies for whatsoever may be the reason, can get readmission into appropriate semester of B.Tech. programme after break-in study only with the prior permission of the Principal of the College provided, such candidate shall follow the transitory regulations applicable to such batch in which she joins. An administrative fee of Rs.1000/- per year of break in study in addition to the prescribed tuition fee and special fee has to be paid by the candidate to condone her break in study if this break in study is not covered under GAP year facility.
RB 20.0
AWARD OF DIVISION.
The award of division for the candidates who admitted into respective B.Tech. programmes in the year 2018-2019 and onwards, is as shown in the following table.
CGPA secured from 160 credits DIVISION
≥ 7.75 without any supplementary passing First Class with Distinction
≥ 6.75 with supplementary exams passing First Class
≥ 5.75 to < 6.75 Second Class
≥ 4.75 to < 5.75 Pass Class
For the purpose of awarding First Class with Distinction, the student must get CGPA within 4 years in case of candidates admitted through EAMCET & Management Quota or within 3 years in case of Lateral Entry candidates admitted through ECET, 6 or 5 years for the students who availed the facility of GAP year, without appearing for any supplementary examinations. Detained candidates are not eligible for the award of First Class with Distinction. For the purpose of awarding First, Second and Pass Class, CGPA obtained in the examinations appeared within the maximum period allowed for the completion of course shall be considered.
RB 21.0 BETTERMENT /IMPROVEMENT OF CUMULATIVE GRADE POINT AVERAGE
RB 21.1
A candidate, after becoming eligible for the award of the Degree, may reappear for the external Examination in any of the theory courses as and when conducted, for the purpose of improving the CGPA. But this reappearance shall be within a period of two academic years after becoming eligible for the award of the Degree, subject to fulfillment of Regulation RB 2.0.
RB 21.2
However, this facility shall not be availed by a candidate to reappear either for Internal Examination or for Semester End Examinations in Practical courses (including Project Viva- voce) and also for Semester End Examinations evaluated internally for the purpose of improvement.
RB 21.3 Modified Grade Card and New Consolidated Grade Card shall be issued after incorporating new Grades and Credits.
RB 22.0 ADVANCED SUPPLEMENTARY EXAMINATIONS
RB 22.1
Candidate(s), who fails in Theory or Lab courses of 4th year second semester, can appear for advanced supplementary examinations conducted within one month after declaration of the revaluation results. However, those candidates who fail in this advanced supplementary examinations of IV year second semester shall appear for subsequent examination along with regular candidates in the examinations conducted at the end of the respective academic year.
RB 23.0
MALPRACTICES The Principal/chief superintendent shall refer the cases of malpractices in internal assessment tests and Semester End Examinations to a Malpractice Enquiry Committee, constituted by him/her for the purpose. The Principal shall take necessary action, against the erring students based on the recommendations of the Committee as per JNTUK Malpractice regulations.
RB 24.0
The physically challenged candidates who have availed additional examination time and a scribe during their Intermediate/EAMCET examinations shall be given similar concessions on production of relevant proof/documents.
RB 25.0
The students who are suffering from contagious diseases are not allowed to appear either internal or Semester end examinations with other students. A separate room will be allotted for such type of students.
RB 26.0
The students who participate in coaching/tournaments held at State/National/International levels through University / Indian Olympic Association during Semester end external examination period shall be promoted to subsequent semesters till the entire course is completed as per the guidelines of University Grants Commission Letter No. F. 1-5/88 (SPE/PES), dated 18-08-1994.
RB 27.0
The Principal shall deal with any academic problem, which is not covered under these rules and regulations, in consultation with the Heads of the Departments in an appropriate manner, and subsequently such actions shall be placed before the Academic Council for ratification. Any emergency modification of Regulation, approved in the Heads of the Departments meetings, shall be reported to the Academic Council for ratification.
RB 28.0 The Academic Council, from time to time, may revise or amend or change the Regulations, schemes of examination and/or syllabi.
RB 29.0
GAP YEAR: Shri Vishnu Engineering College for Women encourages admitted students to defer enrollment for one year to travel, pursue a special project or activity, work or spend time in another meaningful way provided they do not enroll in a degree-granting programme at another college. Deferral for two-year obligatory military service is also granted. The student who wants to avail GAP year must take prior approval from the Principal. The Principal shall grant this facility to students on case -to -case basis, by considering the genuinely of the case.
RB 29.1 The GAP years can be availed only between II Year and III year.
RB 29.2 The students who have backlogs are not eligible for availing GAP year facility.
RB 30.0
FREE ELECTIVES In IV year II semester, Free Electives are offered to students which shall enable interested students to pass these free electives during III year and IV year I semester, and make themselves free in IV year for six months and can attend 6 months Internship/Project Work in Industry /Institute and after proper evaluation and recommendations of the Department, the work done can be submitted as Project work. Prior permission and registration of Free Electives is compulsory. The students who register for free elective should not have any standing backlogs. The students shall not be allowed to register in 3/2 or 4/1 without registering in 3/1. If any student would like to discontinue for the free elective in 3/2 or 4/1 after registering in 3/1, she can be permitted to do so.
RB 30.1
Minimum 20% of intake of students is compulsory for offering regular electives, whereas for Free Electives, the minimum students to register is 10% of total intake of students in that branch
RB 30.2 After announcement of the revaluation results, the students can also register for Free Elective in respect of R-18 regulations.
RB 31.0 As per the demand of the industry, a specific elective can be offered in the department with the permission of the Principal and that can be ratified in the college academic committee.
RB 32.0 For internship, minimum period shall be one month. However it can be completed in 3 to 4 slots /intervals which shall be a minimum of five days slot.
@@@@@@@
MALPRACTICES GUIDELINES
Disciplinary Action for / Improper Conduct in Examinations
Nature of Malpractices/Improper conduct Punishment
If the candidate:
1.(a)
Possesses or keeps accessible in examination hall,
any paper, note book, programmable calculators, Cell phones, palm computers or any other form of
material concerned with or related to the subject of the examination (theory or practical) in which
he is appearing but has not made use of.
(material shall include any marks on the body of the candidate which can be used as an aid in the
subject of the examination)
Expulsion from the examination hall and
cancellation of the performance in that subject only.
(b)
Gives assistance or guidance or receives it from any other candidate orally or by any other body
language methods or communicates through cell phones with any candidate or persons in or
outside the examination hall in respect of any matter.
Expulsion of all the candidates involved from the examination hall and cancellation of
the performance in that subject only. In case of an outsider, he will be handed over to the
police and a case will be registered against him
2.
Has copied in the examination hall from any
paper, book, programmable calculators, palm computers or any other form of material relevant
to the subject of the examination (theory or
practical) in which the candidate is appearing.
Expulsion from the examination hall and
cancellation of the performance in that subject and all other subjects the candidate
has already appeared including practical
examinations and project work and shall not be permitted to appear for the remaining
examinations of the subjects of that Semester/year.
The Hall Ticket of the candidate will be
seized and cancelled.
3.
Impersonates any other candidate in connection
with the examination.
The candidate/Person who has impersonated
shall be expelled from examination hall. The candidate will also be debarred and forfeits
the course. The performance of the original
candidate, who has been impersonated, shall be cancelled in all the subjects of the
examination (including practicals and project work) already appeared and shall not be
allowed to appear for examinations of the
remaining subjects of that semester/year. The candidate is also debarred for two consecutive
semesters from class work and all semester end examinations. The continuation of the
course of such candidate is subject to the academic regulations in connection with
forfeiture of seat. If the imposter is an
outsider, he will be handed over to the police and a case is registered against him.
4. Smuggles in the Answer book or additional sheet
or takes out or arranges to send out the question
Expulsion from the examination hall and
cancellation of performance in that subject
paper during the examination or answer book or
additional sheet, during or after the examination.
and all the other subjects the candidate has
already appeared including practical examinations and project work and shall not
be permitted for the remaining examinations
of the subjects of that semester/year. The candidate is also debarred for two consecutive
semesters from class work and all semester end examinations. The continuation of the
course by the candidate is subject to the academic regulations in connection with
forfeiture
of seat.
5.
Uses objectionable, abusive or offensive language
in the answer paper or in letters to the examiners
or writes to the examiner requesting him to award pass marks.
Cancellation of the performance in that
subject.
6.
Refuses to obey the orders of the Chief Superintendent / Asst. Superintendent / any
officer on duty or misbehaves or creates
disturbance of any kind in and around the examination hall or organizes a walk out or
instigates others to walk out, or threatens the officer-in charge or any person on duty in or
outside the examination hall of any injury to his
person or to any of his relations whether by words, either spoken or written or by signs or by
visible representation, assaults the officer-in-charge, or any person on duty in or outside the
examination hall or any of his relations, or indulges in any other act of misconduct or
mischief which results in damage to or destruction
of property in the examination hall or any part of the College campus or engages in any other act
which in the opinion of the officer on duty amounts to use of unfair means or misconduct or
has the tendency to disrupt the orderly conduct of
the examination.
In Case of students, they shall be expelled from examination halls and cancellation of
their performance in that subject and all other
subjects the candidate(s) has (have) already appeared and shall not be permitted to
appear for the remaining examinations of the subjects of that semester / year. The
candidates also are debarred and forfeit their
seats. In case of outsiders, they will be handed over to the police and a police case is
registered against them.
7.
Leaves the examination hall taking away answer
script or intentionally tears of the script or any
part thereof inside or outside the examination hall.
Expulsion from the examination hall and
cancellation of performance in that subject
and all the other subjects the candidate has already appeared including practical
examinations and project work and shall not be permitted for the remaining examinations
of the subjects of that semester/year. The candidate will also be debarred for two
consecutive semesters from class work and all
semester end examinations. The continuation of the course by the candidate is subject to
the academic regulations in connection with forfeiture of seat.
8.
Possess any lethal weapon or firearm in the
examination hall.
Expulsion from the examination hall and
cancellation of the performance in that subject and all other subjects the candidate
has already appeared including practical
examinations and project work and shall not be permitted for the remaining examinations
of the subjects of that semester/year. The
candidate will also forfeit his/her course.
9.
If the student of the college, who is not a
candidate for the particular examination or any person not connected with the college indulges in
any malpractice or improper conduct mentioned in
clause 6 to 8.
Student of the college expulsion from the
examination hall and cancellation of the performance in that subject and all other
subjects the candidate has already appeared
including practical examinations and project work and shall not be permitted for the
remaining examinations of the subjects of that semester/year. The candidate will also
forfeit the course.
Person(s) who do not belong to the College will be handed over to police and a police
case will be registered against them.
10.
Comes in a drunken/intoxicated condition to the
examination hall.
Expulsion from the examination hall and
cancellation of the performance in that
subject and all other subjects the candidate has already appeared including practical
examinations and project work and shall not be permitted for the remaining examinations
of the subjects of that semester/year.
11.
Copying detected on the basis of internal evidence, such as, during valuation or during
special scrutiny.
Cancellation of the performance in that subject and all other subjects the candidate
has appeared including practical examinations and project work of that
semester/year examinations.
12. If any malpractice is detected which is not
covered in the above clauses1 to 11
Reported to the Principal for further action to
award suitable punishment.
Malpractices identified by squad or special invigilators
Punishments to the candidates as per the guidelines.
* * * * *
SHRI VISHNU ENGINEERING COLLEGE FOR WOMEN:: BHIMAVARAM
(AUTONOMOUS)
DEPARTMENT OF COMPUTER SCIENCE & ENGINEERING
UG : Computer Science & Engineering – CSE
Program Educational Objectives – PEOs:
PEO 1. Graduates will have the expertise in analyzing real time problems and
providing appropriate solutions related to Computer Science & Engineering.
PEO 2. Graduates will have the knowledge of fundamental principles and innovative
technologies to succeed in higher studies and research.
PEO 3. Graduates will continue to learn and to adapt technology developments
combined with deep awareness of ethical responsibilities in profession.
Program Specific Outcomes – PSOs:
PSO1. Apply various programming skills to deliver innovative quality software
products for the changing business needs.
PSO2. Utilize the skills of Data Analytics, Cloud Computing and Machine Learning
to address technological challenges in multidisciplinary areas of engineering.
Program Outcomes –POs:
PO 1. Engineering knowledge: Apply the knowledge of mathematics, science, engineering fundamentals, and an engineering specialization to the solution of complex engineering problems.
PO 2. Problem analysis: Identify, formulate, review research literature, and analyze complex engineering problems reaching substantiated conclusions using first principles of mathematics, natural sciences, and engineering sciences.
PO 3. Design/development of solutions: Design solutions for complex engineering problems and design system components or processes that meet the specified needs with appropriate consideration for the public health and safety, and the cultural, societal, and environmental considerations.
PO 4. Conduct investigations of complex problems: Use research-based knowledge and research methods including design of experiments, analysis and interpretation of data, and synthesis of the information to provide valid conclusions.
PO 5. Modern tool usage: Create, select, and apply appropriate techniques, resources, and modern engineering and IT tools including prediction and modeling to complex engineering activities with an understanding of the limitations.
PO 6. The engineer and society: Apply reasoning informed by the contextual knowledge to assess societal, health, safety, legal and cultural issues and the consequent responsibilities relevant to the professional engineering practice.
PO 7. Environment and sustainability: Understand the impact of the professional engineering solutions in societal and environmental contexts, and demonstrate the knowledge of, and need for sustainable development.
PO 8. Ethics: Apply ethical principles and commit to professional ethics and responsibilities and norms of the engineering practice.
PO 9. Individual and team work: Function effectively as an individual, and as a member or leader in diverse teams, and in multidisciplinary settings.
PO 10. Communication: Communicate effectively on complex engineering activities with the engineering community and with society at large, such as, being able to comprehend and write effective reports and design documentation, make effective presentations, and give and receive clear instructions.
PO 11. Project management and finance: Demonstrate knowledge and understanding of the engineering and management principles and apply these to one’s own work, as a member and leader in a team, to manage projects and in multidisciplinary environments.
PO 12. Life-long learning: Recognize the need for, and have the preparation and ability to engage in independent and life-long learning in the broadest context of technological change.
SHRI VISHNU ENGINEERING COLLEGE
FOR WOMEN
Department of COMPUTER SCIENCE & ENGINEERING
Chemistry
English
OOP
Physics
Mathematics C Programming
Data Structures
Probability & Statistics
Discrete Mathematics
Digital Electronics
FLAT
Compiler Design
Computer Graphics
Artificial Intelligence
DAA
DBMS
COA
SE
ADB
STM
CN
OS
MPMC
Image Processing
NLP
DWDMW
BDT
SPM
WT
CC
IS
ETC
Pattern Recognition
ML
SC
BCT
DS
DP Cyber
Security Management
Science
Virtual Reality
Deep
Learning
IRS
SNSW
HCI
E-COM Web
Services
IOT
HPC
EH
CF
SHRI VISHNU ENGINEERING COLLEGE FOR WOMEN (AUTONOMOUS) BHIMAVARAM - 534202
DEPARTMENT OF COMPUTER SCIENCE & ENGINEERING
Course Structure – R18 (With effect from 2018-2019)
I Year - I Semester
I Year - II Semester
S.No Course Code Course Title L T P C IM EM TM
1 UGBS1T0118 English-I 3 - - 3 40 60 100
2 UGBS1T0218 Mathematics–I 2 1 - 3 40 60 100
3 UGBS1T0318 Semiconductor Physics 3 - - 3 40 60 100
4 UGME1T0118 Engineering Drawing 2 - 2 3 40 60 100
5 UGBS1P0618 English Communication Skills Lab - - 3 1.5 25 50 75
6 UGBS1P0718 Semiconductor Physics Lab - - 3 1.5 25 50 75
7 UGME1P0218 Workshop Practice and Innovation Lab - - 3 1.5 25 50 75
8 UGBS1A1018 Environmental Science 2 - - - - - -
Total 12 1 11 16.5 235 390 625
S.No Course Code Course Title L T P C IM EM TM
1 UGBS2T0118 English-II 3 - - 3 40 60 100
2 UGBS2T0218 Mathematics–II 2 1 - 3 40 60 100
3 UGBS2T0418 Applied Chemistry 3 - - 3 40 60 100
4 UGCS2T0118 Programming for Problem Solving 3 - - 3 40 60 100
5 UGEE2T0218 Basic Electrical & Electronics
Engineering 3 - - 3 40 60 100
6 UGBS2P0618 Business Communication Lab - - 3 1.5 25 50 75
7 UGBS2P0818 Applied Chemistry Lab - - 3 1.5 25 50 75
8 UGCS2P0218 Programming for Problem Solving Lab - - 3 1.5 25 50 75
9 UGBS2A1118 Indian Constitution 2 - - - - - -
Total 16 1 9 19.5 275 450 725
SHRI VISHNU ENGINEERING COLLEGE FOR WOMEN (AUTONOMOUS) BHIMAVARAM - 534202
DEPARTMENT OF COMPUTER SCIENCE & ENGINEERING
Course Structure – R18
(With effect from 2018-2019) II Year - I Semester
II Year - II Semester
S.No Course Code Course Title L T P C IM EM TM
1 UGBS3T0318 Probability and Statistics 3 - - 3 40 60 100
2 UGCS3T0118 Data Structures 3 - - 3 40 60 100
3 UGCS3T0218 Digital Electronics 3 - - 3 40 60 100
4 UGCS3T0318 Discrete Mathematics 3 - - 3 40 60 100
5 UGCS3T0418 Object Oriented Programming 3 - - 3 40 60 100
6 Open Elective-I 3 - - 3 40 60 100
7 UGCS3P0518 Data Structures Lab - - 3 1.5 25 50 75
8 UGCS3P0618 Object Oriented Programming Lab - - 3 1.5 25 50 75
9 UGBS3A0718 Essence of Indian Traditional Knowledge 2 - - - - - -
Total 20 0 6 21 290 460 750
S.No Course Code Course Title L T P C IM EM TM
1 UGCS4T0118 Computer Organization and Architecture 3 - - 3 40 60 100
2 UGCS4T0218 Database Management Systems 3 - - 3 40 60 100
3 UGCS4T0318 Design and Analysis of Algorithms 3 - - 3 40 60 100
4 UGCS4T0418 Formal Languages and Automata Theory
3 - - 3 40 60 100
5 UGCS4T0518 Software Engineering 3 - - 3 40 60 100
6 Open Elective-II 3 - - 3 40 60 100
7 UGCS4P0618 Database Management Systems Lab - - 3 1.5 25 50 75
8 UGCS4P0718 Object Oriented Analysis and Design Lab
2 - 3 3.5 25 50 75
9 UGCS4J0818 Mini Project-1 - 1 2 2 50 - 50
10 UGBS4A0318 Effective Technical Communication 2 - - - - - -
Total 22 1 8 25 340 460 800
SHRI VISHNU ENGINEERING COLLEGE FOR WOMEN (AUTONOMOUS) BHIMAVARAM - 534202
DEPARTMENT OF COMPUTER SCIENCE & ENGINEERING
Course Structure – R18
(With effect from 2018-2019)
III Year - I Semester
III Year - II Semester
S.No Course Code Course Title L T P C IM EM TM
1 UGCS5T0118 Compiler Design 3 - - 3 40 60 100
2 UGCS5T0218 Computer Networks 3 - - 3 40 60 100
3 UGCS5T0318 Microprocessors and Microcontrollers 3 - - 3 40 60 100
4 UGCS5T0418 Operating Systems 3 - - 3 40 60 100
5 Professional Elective-I 3 - - 3 40 60 100
6 UGCS5P1018 Compiler Design Lab - - 3 1.5 25 50 75
7 UGCS5P1118 Computer Networks & Operating
Systems Lab - - 3 1.5 25 50 75
8 UGCS5P1218 Microprocessors and Microcontrollers Lab
- - 3 1.5 25 50 75
9 UGBS5A0218 Logical Reasoning 2 - - - - - -
Total 17 0 9 19.5 275 450 725
S.No Course Code Course Title L T P C IM EM TM
1 UGCS6T0118 Data Warehousing and Data Mining 3 - - 3 40 60 100
2 UGCS6T0218 Information Security 3 - - 3 40 60 100
3 UGCS6T0318 Web Technologies 3 - - 3 40 60 100
4 Professional Elective-II 3 - - 3 40 60 100
5 Open Elective-III 3 - - 3 40 60 100
6 UGCS6P1018 Data Warehousing and Data Mining
Lab - - 3 1.5 25 50 75
7 UGCS6P1118 Information Security Lab - - 3 1.5 25 50 75
8 UGCS6P1218 Web Technologies Lab - - 3 1.5 25 50 75
9 UGCS6J1318 Mini Project-2 - 1 2 2 50 - 50
10 UGBS6A0118 Quantitative Ability 2 - - - - - -
Total 17 1 11 21.5 325 450 775
SHRI VISHNU ENGINEERING COLLEGE FOR WOMEN (AUTONOMOUS) BHIMAVARAM - 534202
DEPARTMENT OF COMPUTER SCIENCE & ENGINEERING
Course Structure – R18 (With effect from 2018-2019)
IV Year - I Semester
IV Year - II Semester
S.No Course Code Course Title L T P C IM EM TM
1 UGMB7T0118 Management Science 3 - - 3 40 60 100
2 UGCS7T0118 Data Science 3 - - 3 40 60 100
3 UGCS7T0218 Machine Learning 3 - - 3 40 60 100
4 Professional Elective-III 3 - - 3 40 60 100
5 Open Elective-IV 3 - - 3 40 60 100
6 UGCS7P0918 Data Science with R Lab - - 3 1.5 25 50 75
7 UGCS7P1018 Machine Learning Lab - - 3 1.5 25 50 75
Total 15 0 6 18 250 400 650
S.No Course Code Course Title L T P C IM EM TM
1 Free Elective-I 3 - - 3 40 60 100
2 Free Elective-II 3 - - 3 40 60 100
3 Free Elective-III 3 - - 3 40 60 100
4 UGCS8J1818 Major Project - - 10 5 100 100 200
5 UGCS8S1918 Seminar - 2 - 2 50 - 50
6 UGCS8I2018 Internship/Certification Course/EPICS /Foreign Languages/Yoga
- - - 3 - - -
Total 9 2 10 19 270 280 550
L – Lectures, T – Tutorials, P – Practicals, C – Credits, IM – Internal Marks, EM – External Marks, TM – Total Marks
SHRI VISHNU ENGINEERING COLLEGE FOR WOMEN (AUTONOMOUS) BHIMAVARAM - 534202
DEPARTMENT OF COMPUTER SCIENCE & ENGINEERING
Course Structure – R18 (With effect from 2018-2019)
S.No. Course Code Professional Elective-I
(III B.Tech I-Sem)
1 UGCS5T0518 Advanced Databases
2 UGCS5T0618 Computer Graphics
3 UGCS5T0718 Artificial Intelligence
4 UGCS5T0818 Linux Programming
5 UGCS5T0918 Software Testing Methodologies
S.No. Course Code Professional Elective-II
(III B.Tech II-Sem)
1 UGCS6T0418 Big Data Technologies
2 UGCS6T0518 Image Processing
3 UGCS6T0618 Natural Language Processing
4 UGCS6T0718 Cloud Computing
5 UGCS6T0818 Software Project Management
6 UGCS6T0918 Introduction to Analytics (Associate Analytics-1)
S.No. Course Code Professional Elective-III
(IV B.Tech I-Sem)
1 UGCS7T0318 Blockchain Technologies
2 UGCS7T0418 Pattern Recognition
3 UGCS7T0518 Soft Computing
4 UGCS7T0618 Cyber Security
5 UGCS7T0718 Design Patterns
6 UGCS7T0818 Data Analytics (Associate Analytics-2)
SHRI VISHNU ENGINEERING COLLEGE FOR WOMEN (AUTONOMOUS) BHIMAVARAM - 534202
DEPARTMENT OF COMPUTER SCIENCE & ENGINEERING
Course Structure – R18 (With effect from 2018-2019)
S.No. Course Code Free Elective-I
(IV B.Tech II-Sem)
1 UGCS8T0118 Internet of Things
2 UGCS8T0218 Human Computer Interaction
3 UGCS8T0318 High Performance Computing
4 UGCS8T0418 Computer Forensics
5 UGCS8T0518 Deep Learning
S.No. Course Code Free Elective-II
(IV B.Tech II-Sem)
1 UGCS8T0618 Social Networks and Semantic Web
2 UGCS8T0718 E-Commerce
3 UGCS8T0818 Mobile Application Development
4 UGCS8T0918 Scripting Languages
5 UGCS8T1018 Innovation and New Product Development
6 UGCS8T1118 Information Security Management
(Security Analyst-1)
S.No. Course Code Free Elective-III
(IV B.Tech II-Sem)
1 UGCS8T1218 Web Services
2 UGCS8T1318 Virtual Reality
3 UGCS8T1418 Mobile Adhoc and Sensor Networks
4 UGCS8T1518 Ethical Hacking
5 UGCS8T1618 Information Retrieval Systems
6 UGCS8T1718 Information Security Incident Response and
Management (Security Analyst -2)
SHRI VISHNU ENGINEERING COLLEGE FOR WOMEN (AUTONOMOUS) BHIMAVARAM - 534202
DEPARTMENT OF COMPUTER SCIENCE & ENGINEERING
Course Structure – R18 (With effect from 2018-2019)
The following courses are offered to the students of other departments.
S.No. Course Code Open Electives
1 UGCS0T0118 Computer Networks
2 UGCS0T0218 Computer Organization and Architecture
3 UGCS0T0318 Database Management Systems
4 UGCS0T0418 Data Science
5 UGCS0T0518 Design and Analysis of Algorithms
6 UGCS0T0618 Internet of Things
7 UGCS0T0718 Linux Programming
8 UGCS0T0818 Object Oriented Programming through C++
9 UGCS0T0918 Object Oriented Programming through Java
10 UGCS0T1018 Operating Systems
11 UGCS0T1118 Python Programming
Note: Each department will notify the list of Open Electives to be offered at the time of course registration.
SHRI VISHNU ENGINEERING COLLEGE FOR WOMEN:: BHIMAVARAM
(AUTONOMOUS)
OPEN ELECTIVES OFFERED BY DEPARTMENT OF CIVIL ENGINEERING
S.
No.
Subject
Code Subject Name L T P C I E TM
1 UGCE0T0118 RS & GIS and its Applications 3 - - 3 40 60 100
2 UGCE0T0218 Elements of Transportation
Engineering 3 - - 3 40 60 100
3 UGCE0T0318 Water Supply Engineering. 3 - - 3 40 60 100
4 UGCE0T0418 Sanitary Engineering 3 - - 3 40 60 100
5 UGCE0T0518 Environment Pollution. 3 - - 3 40 60 100
6 UGCE0T0618 Elements of Dam & Irrigation
Engineering. 3 - - 3 40 60 100
7 UGCE0T0718 Disaster Management 3 - - 3 40 60 100
8 UGCE0T0818 Basic Elements of Earthquake
Engineering 3 - - 3 40 60 100
SHRI VISHNU ENGINEERING COLLEGE FOR WOMEN:: BHIMAVARAM
(AUTONOMOUS)
OPEN ELECTIVES OFFERED BY DEPARTMENT OF ELECTRICAL & ELECTRONICS ENGINEERING
S.
No.
Subject
Code Subject Title L T P C I E TM
1 UGEE0T0118 Energy Studies 3 - - 3 40 60 100
2 UGEE0T0218 Energy Audit and
Conservation 3 - - 3 40 60 100
3 UGEE0T0318 Sensors & Applications 3 - - 3 40 60 100
4 UGEE0T0418 Industrial Electronics 3 - - 3 40 60 100
5 UGEE0T0518 Electrical Machines for EV’s 3 - - 3 40 60 100
6 UGEE0T0618 PLC & Applications 3 - - 3 40 60 100
7 UGEE0T0718 Solar Energy Appliances 3 - - 3 40 60 100
8 UGEE0T0818 Energy Storage
Technologies 3 - - 3 40 60 100
9 UGEE0T0918 MATLAB 3 - - 3 40 60 100
10 UGEE0T1018 AI Techniques 3 - - 3 40 60 100
SHRI VISHNU ENGINEERING COLLEGE FOR WOMEN:: BHIMAVARAM
(AUTONOMOUS)
OPEN ELECTIVES OFFERED BY DEPARTMENT OF MECHANICAL ENGINEERING
S.
No. Subject Code Subject Title L T P C I E TM
1 UGME0T0118 Metallurgy and Material
Science 3 - - 3 40 60 100
2 UGME0T0218 Basics of Mechanical
Engineering 3 - - 3 40 60 100
3 UGME0T0318 Engineering Mechanics 3 - - 3 40 60 100
4 UGME0T0418 Strength of Materials
3 - - 3 40 60 100
5 UGME0T0518 Fluid Machinery 3 - - 3 40 60 100
6 UGME0T0618 Nanotechnology 3 - - 3 40 60 100
7 UGME0T0718 Thermodynamics 3 - - 3 40 60 100
8 UGME0T0818 Thermal and Fluid
Engineering 3 3 40 60 100
9 UGME0T0918 Automobile Engineering 3 - - 3 40 60 100
10 UGME0T1018 Computer Aided
Engineering Drawing 2 - 2 3 40 60 100
11 UGME0T1118 Industrial Engineering
and Management 3 - - 3 40 60 100
12 UGME0T1218 Quality and Reliability
Engineering 3 - - 3 40 60 100
SHRI VISHNU ENGINEERING COLLEGE FOR WOMEN:: BHIMAVARAM
(AUTONOMOUS)
OPEN ELECTIVES OFFERED BY DEPARTMENT OF ELECTRONICS & COMMUNICATION ENGINEERING
S.
No. Subject Code Name of the Course L T P C I E T
1 UGEC0T0118 Basic Electronics Engineering 3 0 0 3 40 60 100
2 UGEC0T0218 Applications of Electronic Devices 3 0 0 3 40 60 100
3 UGEC0T0318 Analog & Digital Communication 3 0 0 4 40 60 100
4 UGEC0T0418 Data Communication 3 0 0 3 40 60 100
5 UGEC0T0518 Microprocessors and Multicore
Systems 3 0 0 3 40 60 100
6 UGEC0T0618 VLSI Design 3 0 0 3 40 60 100
7 UGEC0T0718 Image Processing 3 0 0 3 40 60 100
8 UGEC0T0818 Wavelet Transforms 3 0 0 3 40 60 100
9 UGEC0T0918 Embedded systems 3 0 0 3 40 60 100
10 UGEC0T1018 MEMS 3 0 0 3 40 60 100
11 UGEC0T1118 Electronic Instrumentation 3 0 0 3 40 60 100
SHRI VISHNU ENGINEERING COLLEGE FOR WOMEN:: BHIMAVARAM
(AUTONOMOUS)
OPEN ELECTIVES OFFERED BY DEPARTMENT OF INFORMATION TECHNOLOGY
S. No. Subject Code List of Open Electives L T P C IM EM TM
1 UGIT0T0118 Data Structures 3 - - 3 40 60 100
2 UGIT0T0218 Software Engineering 3 - - 3 40 60 100
3 UGIT0T0318 Web Technologies 3 - - 3 40 60 100
4 UGIT0T0418 Unix Programming 3 - - 3 40 60 100
5 UGIT0T0518 E-Commerce 3 - - 3 40 60 100
6 UGIT0T0618 Artificial Intelligence 3 - - 3 40 60 100
7 UGIT0T0718 Computer Graphics 3 - - 3 40 60 100
8 UGIT0T0818 Cloud computing 3 - - 3 40 60 100
9 UGIT0T0918 Machine Learning 3 - - 3 40 60 100
10 UGIT0T1018 Advanced Data Structures 3 - - 3 40 60 100
11 UGIT0T1118 Design and Analysis of
Algorithms 3 - - 3 40 60 100
12 UGIT0T1218 Parallel Computing 3 - - 3 40 60 100
13 UGIT0T1318 Bioinformatics 3 - - 3 40 60 100
14 UGIT0T1418 Advanced Java 3 - - 3 40 60 100
SHRI VISHNU ENGINEERING COLLEGE FOR WOMEN:: BHIMAVARAM
(AUTONOMOUS)
OPEN ELECTIVES OFFERED BY DEPARTMENT OF BASIC SCIENCE
S. No. Subject
Code List of Open Electives L T P C IM EM TM
1 UGBS0T0118 Probability and Statistics 3 - - 3 40 60 100
2 UGBS0T0218 Operations Research 3 - - 3 40 60 100
3 UGBS0T0318 Numerical Methods & Complex
Variables 3 - - 3 40 60 100
4 UGBS0T0418 Optimization Techniques (Open
Elective—I) 3 - - 3 40 60 100
5 UGBS0T0518 Optimization Techniques (Open
Elective—II) 3 - - 3 40 60 100
ENGLISH – I
(Common to All Branches)
Subject Code: UGBS1T0118 L T P C
I Year / I Semester 3 0 0 3
COURSE OBJECTIVES:
1. To train students in all LSRW skills in order to make them independent, lifelong
learners by availing of these four skills.
2. To prepare the students to face the emerging challenges of the world.
3. To inculcate the habit of reading beyond academics among students and to
enable them to be competent communicators on various platforms.
4. To expose students to different cultural contexts.
SYLLABUS:
UNIT-I 9hrs
Short Story:STEVE JOB’S SPEECH AT STANFORD GRADUATION CEREMONY
Grammar : Concord forms : Subject-verb agreement
Kinds of Verbs and Tenses
Speaking :Describing oneself and others, objects, places, processes and narrating
events and stories.
Listening :Listening to narratives, talks and conversations and answering
questions on them.
UNIT-II: THE MEANING OF LIFE By VIKTOR E.FRANKL 11 hrs
(from the book ‘Man’s Search for Meaning’)
Grammar : Articles and prepositions
Speaking : Framing appropriate questions and giving answers: exercises
Assignment-I:Each Student is required to present a report on a problem faced by
individuals or the society with an analysis and possible solutions. She
has to make an oral presentation of it in the class after the completion
of Unit-II Examination. It is mandatory for all the students. It is for
Internal Assessment.
UNIT-III: THE DAILY FIVE BY ROBIN SHARMA 10hrs
(from the book ‘THE LEADER WHO HAD NO TITLE’)
Vocabulary:Selected Etymological roots and word formation; prefixes and suffixes
derived from foreign languages to form derivatives in English.
Speaking :Speaking spontaneously on ideas using idiomatic expressions.
UNIT-IV :THE FESTIVAL OF THE SACRED TOOTH RELIC IN SRI LANKA
based on the travelogues of Fa Hien 12 hrs
Vocabulary: Synonyms and antonyms
Grammar : Transformation of sentences: Direct and Indirect Speech;
Active Voice and Passive Voice
Assignment-II: Each Student is required to present a report on a problem faced
by individuals or the society with an analysis and possible solutions.
She has to make an oral presentation of it in the class after the
completion of Unit-IV Examination. It is mandatory for all the
students. It is for Internal Assessment.
UNIT-V : SATYA NADELLA’S LETTER TO HIS EMPLOYEES IN JUNE 2015
Grammar : Simple, Compound and Complex Sentences 09hrs
Uses of Phrases and Clauses in Sentences
UNIT-VI: A REVIEW ON THE MOVIE ‘ THE MAN FROM THE EARTH’
(2007 release) 11hrs
Composition: Paragraph writing, e-mail writing
Listening : Listening comprehension
Assignment-III : Each Student is required to submit a critical review of the
prescribed movie in the syllabus.
COURSE OUTCOMES:
Upon the completion of the course, the student will be able to:
CO 1. Develop a meaningful general essay or an essay from the prescribed text.
CO 2. Illustrate, the kind and functions of verbs and their tenses, concord forms and appropriate articles and prepositions
CO 3. Build corpus of vocabulary through affixation and idioms.
CO 4. Utilize varying sentence structures with appropriate phrases and clauses,
identify the use of specific words and phrases in the test and convenience of transformation of sentences.
CO 5. Choose and maintain formal style and tone with varied syntax to create
clean and cognate paragraphs and emails.
Mapping of COs to POs:
POs 1 2 3 4 5 6 7 8 9 10 11 12
CO1 - - - - - - - - - 3 - 3
CO2 - - - - - - - - - 3 - 3
CO3 - - - - - - - - - 3 - 3
CO4 - - - - - - - - - 3 - 3
CO5 - - - - - - - - - 3 - 3
SOURCE BOOKS FOR ENGLISH- I
1. Man’s Search for Meaning by Viktor E.Frankl
2. The Leader who had no Title by Robin Sharma
3. Life, Language and Culture – Explorations –I .
Internet sources for:
Steve Job’s speech at Stanford Graduation Ceremony
Satya Nadella’s letter to his employees in June 2015
The Movie ‘ The Man from the Earth’ (2007 release )
BOOKS FOR FURTHER REFERENCE
1. The Oxford guide to Writing & Speaking – John Seely
2. A Practical English Grammar Exercises 2 (Thrid Edition) – A.J. Thomson and A.V.
Martinet, Oxford University Press, New Delhi, 2007.
3. The Students’ Companion – Wilfred D. Best (New Edition) – Harper, Collins
Publishers, 2012.
4. Col-Locate Your World, A store house of words & word-relations, their similarities
& dissimilarities – Ajay Singh, Arihant Publications (I) Pvt. Ltd., Meerut.
4. English Conversation Practice – Grant Taylor, Tata Mc Graw-Hill Publishing
Company Limited, New Delhi, 2007.
5. Verbal Workout – Intensive practice to boost your English Vocabulary,
Educational Software Technologies
6. The Official Cambridge Guide to IELTS, For Academic & General Training, (With
DVD-ROM), Student Book with Answers, 2015.
7. Immortal Speeches, Complied by Harshvardhan Dutta, Unicorn Books Pvt. Ltd.,
Distributors – Pustak Mahal, Delhi.
MATHEMATICS - I
(Common to All Branches)
Subject Code: UGBS1T0218 L T P C
I Year / I Semester 2 1 0 3
COURSE OBJECTIVES:
To prepare students to learn the concepts of Rank of a matrix, Eigen values,
Eigen vectors.
To Familiarize students with analytical methods to solve Ordinary differential
equations.
SYLLABUS:
UNIT-I: MATRICES 13hrs
Types of Matrices: Symmetric, skew-symmetric, orthogonal, Hermitian, Skew-
Hermitian, Unitary. Rank of a matrix by Echelon form and Normal form, Inverse of
Non-singular matrices by Gauss-Jordan method, System of linear equations - solving
system of Homogeneous and Non-Homogeneous equations by Gauss elimination
method.
UNIT-II: EIGEN VALUES AND EIGEN VECTORS 11hrs
Linear Transformation and Orthogonal Transformations, Eigen values and Eigen
vectors and their properties, Diagonalization of matrices; Cayley-Hamilton Theorem
(without proof).
UNIT -III: ORDINARY DIFFERENTIAL EQUATIONS OF FIRST ORDER AND
FIRST DEGREE 11hrs
Exact, Reducible to exact equations, Linear and Bernoulli’s equations.
UNIT –IV: ORDINARY DIFFERENTIAL EQUATIONS OF HIGHER ORDER 13hrs
Second and Higher order linear differential equations with constant coefficients, Non-
Homogeneous terms of the type , polynomials in , and
, Equations reducible to linear ODE with constant Coefficients, Legendre’s
equation and Cauchy-Euler equation.
UNIT-V: MEAN VALUE THEOREMS 11hrs
Rolle’s theorem, Mean value theorems, Taylor’s and Maclaurin theorems with
remainders
UNIT-VI: APPLICATIONS 9hrs
Finding the current in an Electrical Circuit by Gauss elimination method, Finding
inverse and powers of a matrix by Cayley-Hamilton Theorem, Orthogonal Trajectories,
Newton’s Law of Cooling, Law of Natural Growth and Decay, LCR Circuits.
Course Outcomes:
CO1: List various types of matrices and their properties.
CO2: Determine the rank, inverse and powers of a matrix.
CO3: Apply matrix techniques to model and solve system of linear equations.
CO4: Illustrate Eigen values, Eigen vectors, properties and diagonalization of a
given matrix.
CO5: Apply appropriate analytical technique to model and solve a given differential
equation.
CO6: Examine Mean value theorems for a given function.
CO7: Construct the Taylor’s and Maclaurin’s series from generalized mean value theorem.
Mapping of COs to POs:
POs 1 2 3 4 5 6 7 8 9 10 11 12
CO1 3 3 3 2 - - - - - - - 3
CO2 3 3 3 2 - - - - - - - 3
CO3 3 3 3 2 - - - - - - - 3
CO4 3 3 3 2 - - - - - - - 3
CO5 3 3 3 2 - - - - - - - 3
CO6 3 3 3 2 - - - - - - - 3
CO7 3 3 3 2 - - - - - - - 3
TEXT BOOKS:
1. B.S. Grewal, Higher Engineering Mathematics, Khanna Publishers, 43rd
Edition.
2. Ramana B.V., Higher Engineering Mathematics, Tata McGraw Hill New Delhi,
11th
Reprint, 2010.
3. N.P. Bali and Manish Goyal, A text book of Engineering Mathematics, Laxmi
Publications, Reprint, 2008.
REFERENCE BOOKS:
1. W. E. Boyce and R. C. DiPrima, Elementary Differential Equations and Boundary Value Problems, 9th Edn., Wiley India, 2009.
2. D. Poole, Linear Algebra: A Modern Introduction, 2nd Edition, Brooks/Cole,
2005. 3. Veerarajan T., Engineering Mathematics for first year, Tata McGraw-Hill, New
Delhi,2008. 4. G.B. Thomas and R.L. Finney, Calculus and Analytic geometry, 9th Edition,
Pearson, Reprint, 2002.
5. Erwin kreyszig, Advanced Engineering Mathematics, 9th Edition, John Wiley & Sons,2006.
SEMICONDUCTOR PHYSICS
Subject Code: UGBS1T0318 L T P C
I Year / I Semester 3 0 0 3
COURSE OBJECTIVES:
To highlight the hidden importance of physics concepts in Engineering &
Technology.
To facilitate the students with the aid of advanced insight in the applied
science.
To focus on the real time applications of physics in engineering fields.
To prepare the students to face the challenges in core fields with the support
of physics principles.
To motivate the students to understand the Engineering Principles through
basic ideas in Physics.
SYLLABUS:
UNIT-I: ELECTRONIC MATERIALS 11hrs
Free electron theory, Sommerfield theory. Band theory of solids. Energy bands in
solids, E-K diagram, Direct and indirect band gaps, Types of electronic materials:
metals, semiconductors, and insulators, Fermi-Dirac distribution.
UNIT-II:SEMICONDUCTORS 12hrs
Intrinsic and extrinsic semiconductors, Dependence of Fermi level on carrier-
concentration and temperature (equilibrium carrier statistics), Carrier generation
and recombination, Carrier Transport: diffusion and drift, P-N junction I-V
characteristics.
UNIT-III: LIGHT-SEMICONDUCTOR INTERACTION 8hrs
Optical transitions in bulk semiconductors: absorption, spontaneous emission, and
stimulated
emission; Transition rates (Fermi's Golden Rule), Optical loss and gain;
Photovoltaic effect, Exciton.
UNIT-IV : PHOTONIC DEVICES 8hrs
Light Emitting Diode, Semiconductor Laser, Photo Diode, Avalanche Photodiode,
PN junction solar cells.
UNIT-V:ENGINEERED SEMICONDUCTOR MATERIALS 8hrs
Homo and Hetero junctions and associated band-diagrams, special semiconducting
devices such as quantum wells, wires, and dots.
UNIT- VI : MEASUREMENTS 8hrs
Four-point probe and van der Pauw measurements for carrier density, resistivity,
and hall mobility; Hot-point probe measurement, capacitance-voltage
measurements, parameter Extraction from diode I-V characteristics.
COURSE OUTCOMES:
CO1: Distinguish the concepts of free electron motion in metals by classical and quantum theory. CO2: Classify solids on the basis of band theory.
CO3: Compare the Fermi energy levels of intrinsic and extrinsic semiconductors.
CO4: Apply the knowledge of carrier transport mechanisms to understand the characteristics of a P-N junction diode.
CO5: Explain the optical transitions in bulk semiconductors to understand optical loss and gain based on transition rates.
CO6: Apply the light -semiconductor interaction techniques to study the functioning of various photonic devices. CO7: Analyze the characterization techniques of low-dimensional special semiconducting devices. CO8: Make use of highly sophisticated methods including four-point probe, hot-point probe, and Van der Pauw method to measure the various electronic parameters.
Mapping of COs to POs:
POs 1 2 3 4 5 6 7 8 9 10 11 12
CO1 3 3 - - - - - - - - - -
CO2 3 3 - - - - - - - - - -
CO3 3 3 - - - - - - - - - -
CO4 3 2 - - - - - - - - - -
CO5 3 2 - - - - - - - - - -
CO6 3 3 - - - - - - - - - -
CO7 3 3 - 3 - - - - - - - -
CO8 3 3 - 3 - - - - - - - -
TEXT BOOKS:
1. P. Bhattacharya, Semiconductor Optoelectronic Devices, Prentice Hall of India
(1997).
2. J. Singh, Semiconductor Optoelectronics: Physics and Technology, McGraw-Hill
Inc. (1995)
REFERENCE BOOKS
1. B. E. A. Saleh and M. C. Teich, Fundamentals of Photonics, John Wiley & Sons,
Inc., (2007).
2. S. M. Sze, Semiconductor Devices: Physics and Technology, Wiley (2008).
3. A. Yariv and P. Yeh, Photonics: Optical Electronics in Modern Communications,
Oxford University Press, New York (2007).
4. Physics Volume II by Resnick, Halliday & Walker ( John Wiley & sons)
5. Engineering Physics by P. K. Palanisamy, SciTech Publishers
6. Engineering Physics by D. K. Bhattacharya, Oxford Publishers
7. Engineering Physics by M. N. Avadhanulu & Kshirsagar, S. Chand Publishers
8. Electrical Characterization of Semiconductor Materials and Devices, Jamal Deen
and Fabian Pascal
ENGINEERING DRAWING
Subject Code: UGME1T0118 L T P C
I Year / I Semester 2 0 2 3
COURSE OBJECTIVES:
1. To acquire basic skills in technical graphic communication and also get thorough
knowledge of various geometrical elements used in Engineering practice.
2. Impart and inculcate proper understanding of the theory of projection and
projection of one dimensional objects on 2D planes.
3. To impart knowledge on projecting two dimensional figures and to visualize the
different positions of planes.
4. To visualize and represent the 3D objects in 2D planes with proper dimensioning,
scaling.
5. To visualize and represent the pictorial views of two & three dimensional objects
with proper dimensioning and scaling.
6. Interpret and represent both two & three dimensional of objects
SYLLABUS:
UNIT-I: 36 hrs
Objective: Acquire basic skills in technical graphic communication and also get
thorough knowledge of various geometrical elements used in Engineering practice
INTRODUCTION TO THE ENGINEERING DRAWING, Polygons, Conic
sections: construction of ellipse, parabola and hyperbola by general method,
Introduction to scales.
INTRODUCTION TO ORTHOGRAPHIC PROJECTIONS: projections of points
UNIT-II: 9hrs
Objective: Impart and inculcate proper understanding of the theory of projection
and projection of one dimensional objects on 2D planes.
PROJECTIONS OF STRAIGHT LINES perpendicular to one and parallel to other,
parallel to both the planes, parallel to one plane and inclined to the other plane,
inclined to both the planes, determination of true lengths, angle of inclinations
and traces.
COURSE OUTCOMES:
CO 1: Familiarize how industry communicates, practices for accuracy in presenting
the technical information through drawing.
CO 2: Develop the engineering perspective essential for representing orthographic projections.
CO 3: Develop the engineering perspective essential for representing isometric projections.
CO 4: Improve their visualization skills to develop new designs.
Mapping of COs to POs:
COs POs PSOs
1 2 3 4 5 6 7 8 9 10 11 12 1 2
CO1 3 2 2 - - - - - - 3 - 2 - -
CO2 3 2 2 - - - - - - 3 - 2 - -
CO3 3 2 2 - - - - - - 3 - 2 - -
CO4 3 3 3 - - - - - - 3 - 3 - -
UNIT-III: 12hrs
Objective: To impart knowledge on projecting two dimensional figures and to
visualize the different positions of planes.
PROJECTIONS OF PLANES: regular planes perpendicular/parallel to one plane
and inclined to the other reference plane; inclined to both the reference planes
UNIT-IV: 15hrs
Objective: To visualize and represent the 3D objects in 2D planes with proper
dimensioning, scaling.
PROJECTIONS OF SOLIDS – Prisms, Pyramids, Cones and Cylinders with the
axis inclined to one of the reference plane.
UNIT-V: 12hrs
Objective: To visualize and represent the pictorial views of two & three
dimensional objects with proper dimensioning and scaling.
ISOMETRIC PROJECTIONS
UNIT-VI 12 hrs
Objective: Interpret and represent both two & three dimensional of objects.
Conversion of isometric views to orthographic views
Conversion of orthographic views to isometric views
TEXT BOOKS:
1. Engineering Drawing by N.D. Butt, Chariot Publications
2. Engineering Drawing by K.L.Narayana & P. Kannaiah, Scitech Publishers.
3. Engineering Graphics by PI Varghese, McGrawHill Publishers
4. Engineering Drawing + AutoCad – K Venugopal, V. Prabhu Raja, New Age
REFERENCES:
1. Engineering Graphics for Degree by K.C. John, PHI Publishers
2. Engineering Drawing by Agarwal & Agarwal, Tata McGraw Hill Publishers
3. Engineering Drawing by M.B.Shah&B.C.Rana,Pearson Publications
ENGLISH COMMUNICATION SKILLS LAB
(Common to All Branches)
Subject Code: UGBS1P0618 L T P C
I Year / I Semester 0 0 3 1.5
Laboratory objectives:
1. To expose students to different expressions and usage of English
2. To inculcate the basic skills of communication in English Language
3. To enable students to acquire right pronunciation of English words
4. To prepare students to acquire employability skills
English Lab Activities:
UNIT-I: Introduction to sounds of English – Phonetic Transcription (2 sessions)
UNIT-II: Introduction to Stress and Intonation
UNIT-III: English for Social Purposes- Role play/ Situational Dialogues & Just a
minute ( 4 sessions)
UNIT-IV: Body Language (2 sessions)
UNIT-V : PPT Presentation ( General topics) (3 sessions)
Practice Work
UNIT-VI: Debate ( 2 sessions)
Laboratory Outcomes:
Upon the completion of the course, the students will be able to:
C01: Make use of correct sounds of English through phonetic transcription,
appropriate stress, intonation in speech.
CO2: Construct role plays, situational dialogues and just a minute talk for effective
oral communication.
CO3: Demonstrate appropriate body language for effective oral communication.
CO4: Construct suitable PPTs and organize them for better oral presentation.
CO5: Take part in debates to develop argumentative skills in discussions.
Mapping of COs to POs:
POs 1 2 3 4 5 6 7 8 9 10 11 12
CO1 - - - - - - - - 3 3 - 3
CO2 - - - - - - - - 3 3 - 3
CO3 - - - - - - - - 3 3 - 3
CO4 - - - - - - - - 3 3 - 3
CO5 - - - - - - - - 3 3 - 3
SOURCE BOOKS:
1. Cambridge English for Job Hunting – Colin Downes, CUP, 2009
2. English for Presentations, Oxford University Press
3. Body Language – Allan & Barbara Pease
4. Strengthen Your Communication Skills – Maruthi Publications
SEMICONDUCTOR PHYSICS LAB
Subject Code: UGBS1P0718 L T P C
I Year / I Semester 0 0 3 1.5
LABORATORY OBJECTIVES:
1. To familiarize with the principles of semiconducting materials.
2. To strengthen students to understand physical concepts of semiconductors in a
better way.
3. To enhance analytical thinking and to improve to problem solving techniques
EXPERIMENTS: (Any Eight of the following to be done)
EXP1: Determination of single slit diffraction using Lasers.
EXP2: Study of I/V characteristics of PN junction diode
EXP3: Study of I/V characteristics of ZENER DIODE.
EXP4: L C R Series Resonance Circuit
EXP5: Energy Band gap of a Semiconductor p-n junction diode.
EXP6: Determine the Planck’s constant using photo-cell
EXP7: Characteristics of Thermistor
EXP8: Time constant of RC circuit.
EXP9: Bending losses of optical fibre
EXP10: STEWART AND GEE‟S APPARATUS
Magnetic field along the axis of a current carrying coil.
LABORATORY OUTCOMES:
CO-1: Apply the scientific knowledge to understand optical concepts
CO-2: Outline the characteristics of fundamental electronic devices to understand
their functioning
CO-3: Make of use of analytical knowledge and problem solving techniques to measure electronic parameters
CO-4: Compare the equivalence between theoretical and experimental values for electronic circuits
Mapping of COs to POs:
POs 1 2 3 4 5 6 7 8 9 10 11 12
CO1 3 2 - - - - - - - - - -
CO2 3 3 - - - - - - - - - -
CO3 3 3 - - - - - - - - - -
CO4 3 2 - 2 - - - - - - - -
WORKSHOP PRACTICE AND INNOVATION LAB
Subject Code: UGME1P0218 L T P C
I Year / I Semester 0 0 3 1.5
LABORATORY OBJECTIVES:
1. To develop and enhance relevant technical hand skills required by the technician
working in the various engineering industries and workshops.
2. To impart basic know-how of various hand tools and their use in different
sections of manufacturing.
3. To build the understanding of the complexity of the industrial job in
manufacturing processes and production technology.
4. To Emphasis on various practices involved in technology of workshop practices.
LIST OF EXPERIMENTS: Part A
Workshop Practice
S.NO TITLE
CARPENTRY
1 T-Lap Joint
2 Cross Lap Joint
FITTING
3 V—Fit
4 Square Fit
TIN SMITHY
5 Taper Tray
6 Rectangular Box without lid
HOUSE WIRING
7 a) Parallel / Series Connection of three bulbs
b) Staircase Wiring/ Two Lamps controlled by two SPST Switches
8 Florescent Lamp
Welding
9 To make Lap Joint by Gas Welding
10 To make Butt Joint by Arc Welding
Part B
Innovation Lab
During the due course, the students have to design/develop/manufacture any
product and/or improve the process capabilities for better quality.
COURSE OUTCOMES:
At the end of course the student will be able to:
CO1: Use various tools to prepare basic carpentry, fitting and welded joints.
CO2: Fabricate various objects using sheet metal.
CO3: Make basic house wiring connections.
CO4: Design/Develop a prototype/product.
Mapping of COs to POs:
COs POs PSOs
1 2 3 4 5 6 7 8 9 10 11 12 1 2
CO1 3 - - 3 - - - - - - - 2 - -
CO2 3 - - 3 - - - - - - - 2 - -
CO3 3 - - 3 - - - - - - - 2 - -
CO4 3 3 3 3 - - - - - - - 2 - -
ENVIRONMENTAL SCIENCE
Subject Code: UGBS1A1018 L T P C
I Year / I Semester 2 0 0 0
COURSE OBJECTIVES:
1. To educate students about environment, and its degradation.
2. To acquire awareness, sensitivity about biodiversity and understanding associate
problems.
3. To provide knowledge to solve environmental problems.
SYLLABUS:
12 hrs
UNIT-I: MULTIDISCIPLINARY NATURE OF ENVIRONMENTAL
STUDIES: Definition, Scope, Importance and sustainability - People,
institutions in the environment.
ECOSYSTEMS & BIODIVERSITY
Introduction to Ecosystem, types of Ecosystems ,Bio diversity its conservation:
Conservation of biodiversity: Insitu conservation, Exsitu conservation.
UNIT-II: ENERGY &WATER RESOURCES 6hrs
INTRODUCTION: Non-conventional energy resources (solar/wind/tidal) &
controlling in use of electricity and conventional energy sources( fossil fuels &
coal)Water management (rain water harvesting watershed management and
water conservation) Urban problems related to energy.
UNIT-III: ENVIRONMENTAL POLLUTION: 11hrs
Definition, Cause, effects and control measures of Air pollution, Water
pollution, Soil pollution, Noise pollution, nuclear hazards. Role of an individual
in prevention of pollution. – Pollution case studies. Global Environmental
Challenges: Stockholm and Rio Summit: Global warming and climate change,
acid rains, ozone layer depletion
SOLID WASTE MANAGEMENT: Sources, classification, effects and control
measures of urban and industrial solid wastes. Consumerism and waste
products.
UNIT-IV: SOCIAL ISSUES AND THE ENVIRONMENT: 6hrs
Resettlement and rehabilitation of people, its problems and concerns.
Environmental ethics: Environmental Protection Act –Air (Prevention and
Control of Pollution) Act. –Water Prevention and control of Pollution) Act –
Wildlife Protection Act –Forest Conservation Act-Issues involved in
enforcement of environmental legislation. –Public awareness
4hrs
UNIT-V: ENVIRONMENTAL MANAGEMENT: Impact Assessment and its
significance various stages of EIA, preparation of EMP and EIS, Environmental
audit. Ecotourism.
GREEN CHEMISTRY: Introduction & Principles. The student should submit a
report individually on any issues of Environmental Studies course and make a
power point presentation.
UNIT-VI 12hrs
I. Studying the nearest lake water/farm land/forest ecosystems and preparing
document and creating awareness programs among public in mitigating
pollution.
II.Conducting Mass level cycling for making aware of public in minimizing
use of fossil fuels.(ECO CLUB ACTIVITY)
III.Mass level plantation programs and involving students in government
Programs NEERU-CHETTU
IV.Poster presentation, involving the students in making aware of public
Avoiding the use of Non-biodegradable polythene covers, glasses,
bottles.
V. Involving the students in making aware of farmers use/preparing of natural
manure and avoiding use of Insecticides/pesticides and chemical fertilizers.
COURSE OUTCOMES:
CO 1: Create awareness towards environmental problems.
CO 2: Sensitize the students towards eco-friendly practices for the sustainable
development.
CO 3: Encourage the students to participate in environmental protection
activities.
Mapping of COs to POs:
POs PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO1 3 - - 3 - - 3 - - - - -
CO2 3 - - - - - 3 - - - - -
CO3 3 - - - - - 3 - - - - 3
TEXT BOOKS:
1. Environmental Studies by R. Rajagopalan, 2nd Edition, 2011, Oxford
University Press.
2. A Textbook of Environmental Studies by Shashi Chawla, TMH, New Delhi.
3. Environmental Studies by P.N. Palaniswamy, P. Manikandan, A.
GeethEnviroa, and K. Manjula Rani; Pearson Education, Chennai.
REFERENCE BOOKS:
1. Text Book of Environmental Studies by Deeshita Dave & P. Udaya
Bhaskar, Cengage Learning.
2. Environmental Studies by K.V.S.G. Murali Krishna, VGS
Publishers,Vijayawada.
3. Environmental Studies by Benny Joseph, Tata McGraw Hill Co, New Delhi.
4. Environmental Studies by Piyush Malaviya, Pratibha Singh, Anoop singh:
Acme Learning, New Delhi.
ENGLISH – II
(Common to All Branches)
Subject Code: UGBS2T0118 L T P C
I Year / II Semester 3 0 0 3
COURSE OBJECTIVES:
1. To train student in all LSRW skills in order to make them independent lifelong
learners by availing of these four skills.
2. To prepare students to face the emerging challenges of the world.
3. To inculcate the habit of reading beyond academics among students and to
enable them to
be competent communicators on various platforms.
4. To expose students to different cultural and social contexts.
SYLLABUS:
UNIT-I:The Rule of Law by Stephen Hawking (from Stephen Hawking’s ‘The
Grand Design’) 8hrs.
Letter writing: Official and Business letters
Phrasal verbs and idiomatic expressions
UNIT-II:Malala Yousafzai’s Speech at the U N General Assembly 14hrs.
One word substitutes, Précis writing
Extempore speaking
Assignment-I : Each Student is required to present a report on a problem faced by
individuals or the society with an analysis and possible solutions. She
has to make an oral presentation of it in the class after the completion
of UNIT-II Examination. It is mandatory for all the students. It is for
Internal Assessment.
UNIT-III:Next Sunday by R.K.Narayana from his book ‘NEXT SUNDAY’
Essay writing – Descriptive, Expository, analytical and Narrative
Providing examples or evidence in writing 8hrs.
UNIT-IV:‘Give Us A Role Model’ from ‘Ignited Minds’ by A P J Adbul Kalam
Preparing a Resume/ C.V.
Redundancies and clichés in writing 13hrs.
Assignment-II : Each Student is required to present a report on a problem faced
by individuals or the society with an analysis and possible solutions.
She has to make an oral presentation of it in the class after the
completion of Unit-IV Examination. It is mandatory for all the students.
It is for Internal Assessment.
UNIT-V:Sudha Murthy’s Letter to JRD TATA
Common errors in English 7hrs.
UNIT-VI:A Review on the Movie ‘ Cast Away’ 14 hrs.
Report Writing
Information Transfer
Assignment-III : Each Student is required to submit a critical review of the
prescribed movie in the syllabus
COURSE OUTCOMES:
Upon the completion of the course, the students will be able to:
CO1: Develop a meaningful general essay or an essay from the prescribed
text.
CO2: Construct official and business letters.
CO3: Choose phrasal verbs and idioms effectively in oral and written
communication.
CO4: Make use of one word substitutes in précis, construct resumes and different
types essays with examples or evidence in writing.
CO5: Identify redundancies or clichés in writing and common errors in English.
CO6: Develop reports and transform information into paragraph(s).
Mapping of COs to POs:
POs 1 2 3 4 5 6 7 8 9 10 11 12
CO1 - - - - - - - - - 3 - 3
CO2 - - - - - - - - 3 3 - 3
CO3 - - - - - - - - - 3 - 3
CO4 - - - - - - - - - 3 - 3
CO5 - - - - - - - - - 3 - 3
CO6 - - - - - - - - - 3 - 3
SOURCE BOOKS FOR ENGLISH-II
1. The Grand Design- Stephen Hawking
2. Next Sunday – R K Narayan
3. Ignited Minds – A P J Abdul Kalam
Internet sources for:
Malala Yousafzai’s speech at the UN General Assembly
Sudha Murthy’s letter to JRD TATA
The Movie ‘Cast Away”
BOOKS FOR FURTHER REFERENCE
1. The Oxford guide to Writing & Speaking – John Seely
2. A Practical English Grammar Exercises 2 (Thrid Edition) – A.J. Thomson and A.V.
Martinet, Oxford University Press, New Delhi, 2007.
3. The Students’ Companion – Wilfred D. Best (New Edition) – Harper, Collins
Publishers, 2012.
4. Col-Locate Your World, A store house of words & word-relations, their similarities
& dissimilarities – Ajay Singh, Arihant Publications (I) Pvt. Ltd., Meerut.
4. English Conversation Practice – Grant Taylor, Tata Mc Graw-Hill Publishing
Company Limited, New Delhi, 2007.
5. Verbal Workout – Intensive practice to boost your English Vocabulary,
Educational Software Technologies
6. The Official Cambridge Guide to IELTS, For Academic & General Training, (With
DVD-ROM), Student Book with Answers, 2015.
7. Immortal Speeches, Complied by Harshvardhan Dutta, Unicorn Books Pvt. Ltd.,
Distributors – Pustak Mahal, Delhi.
MATHEMATICS-II
(Common to All Branches)
Subject Code: UGBS2T0218 L T P C
I Year / II Semester 2 1 0 3
Course Objectives:
To assist the students in learning and applying the concepts of partial
differentiation to solve real world problems.
To train the students to deal with improper integrals and multiple integrals.
To prepare the students to learn the concepts of Vector calculus.
SYLLABUS:
Unit -I: Partial Differentiation 11hrs.
Partial Differentiation, Total derivative; Jacobian, Functional dependence, Maxima,
minima of functions of two and three variables, Lagrange method of undetermined
multipliers.
Unit -II: Special Functions 8hrs.
Definition of Improper integrals, Beta and Gamma functions and their properties.
Unit-III: Multiple Integrals 12hrs.
Evaluation of Double Integrals (Cartesian and polar coordinates), change of order of
integration (only Cartesian form). Evaluation of Triple Integrals: Change of variables
(Cartesian to polar) for double and triple integrals.
Unit-IV: Vector Differentiation 12hrs.
Vector point functions and scalar point functions. Gradient, Divergence and Curl,
Solenoidal and Irrotational Vectors. Directional derivative, Vector Identities.
Unit-V: Vector Integration 13 hrs.
Line, Surface and Volume Integrals. Green’s, Gauss and Stoke’s Theorems (without
proofs) and their applications involving cubes, sphere and rectangular
parallelepipeds.
Unit-VI: Applications 10hrs.
Areas (by double integrals) and volumes by (by double integrals, by triple integrals),
Centre of mass and Gravity (constant and variable densities) by double and triple
integrals, Scalar potential function.Work done by force as a line integral.
COURSE OUTCOMES:
Upon completion of the course the students will be able to
CO1: Apply the concepts of Partial differentiation to Jacobians and Extrema of several variable functions. CO2: Evaluate various kinds of improper integrals using Beta and Gamma functions. CO3: Evaluate double and triple integrals in Cartesian and Polar coordinates over
given regions.
CO4: Apply multiple integrals to find area, volume center of mass, center of gravity
of given region/object.
CO5: Determine the Gradient, Divergence of a vector field using vector
differentiation and prove identities relating to them.
CO6: Evaluate vector integrals (Line, surface, volume) and justify the relation
between them by integral theorems.
Mapping of COs to POs:
POs 1 2 3 4 5 6 7 8 9 10 11 12
CO1 3 3 3 2 - - - - - - - 3
CO2 3 3 3 2 - - - - - - - 3
CO3 3 3 3 2 - - - - - - - 3
CO4 3 3 3 2 - - - - - - - 3
CO5 3 3 3 2 - - - - - - - 3
CO6 3 3 3 2 - - - - - - - 3
TEXT BOOKS:
1. B.S. Grewal, Higher Engineering Mathematics, Khanna Publishers
2. Ramana B.V., Higher Engineering Mathematics, Tata McGraw Hill New Delhi, 11th
Reprint, 2010.
3. N.P. Bali and Manish Goyal, A text book of Engineering Mathematics, Laxmi
Publications, Reprint, 2008.
REFERENCE BOOKS:
1. W. E. Boyce and R. C. DiPrima, Elementary Differential Equations and Boundary
Value Problems, 9th Edn., Wiley India, 2009.
2. D. Poole, Linear Algebra: A Modern Introduction, 2nd Edition, Brooks/Cole,
2005.
3. Veerarajan T., Engineering Mathematics for first year, Tata McGraw-Hill, New
Delhi,2008.
4. G.B. Thomas and R.L. Finney, Calculus and Analytic geometry, 9th Edition,
Pearson,Reprint, 2002.
5. Erwin kreyszig, Advanced Engineering Mathematics, 9th Edition, John Wiley &
Sons, 2006.
APPLIED CHEMISTRY
(Common to CSE & IT)
Subject Code: UGBS2T0418 L T P C
I Year / II Semester 3 0 0 3
COURSE OBJECTIVES:
1. To provide basic building blocks of Engineering by coverage of Fundamental Chemistry Topics.
2. To Provide Information on exciting new materials now available in Engineering. 3. Technical growth that could motivate a new generation of Engineers.
SYLLABUS :
UNIT-I: ATOMIC AND MOLECULAR STRUCTURE 11hrs.
Molecular orbitals of diatomic molecules and plots of the multicenter orbitals. Energy
level diagrams of diatomic molecules (O2, Cl2, H2 and N2). Pi-molecular orbitals of
butadiene. Crystal field theory and the energy level diagrams for transition metal
ions (Octahedral-Mo(CO)6, [Co(NH3)6 ]+3) and their magnetic properties.
UNIT-II:ELECTRO CHEMISTRY AND CORROSION 10hrs.
EMF, Cell reactions, cell representation, cell potentials, Nernst equation and
applications. Conductance- specific, equivalent and molar conductance. Reference
electrode-SHE, calomel and glass electrode. Batteries-Primary cell, secondary cell (Li
ion and Pb-acid battery. Fuel cells- H2-O2, methanol-oxygen cell
Dry and wet corrosion and their mechanisms. Pilling - Bedworth Rule. Types of
Corrosion – galvanic corrosion, concentration cell corrosion, pitting corrosion and
stress corrosion. Factors influencing corrosion. Corrosion Prevention methods –
Cathodic protection – Sacrificial anodic method and Impressed current method.
Metallic coatings –galvanization, tinning and electroplating.
UNIT-III:ENGINEERING MATERIALS 8hrs.
Polymers-Definition and types–mechanism of free radical addition polymerization,
condensation polymerization-Terylene, conducting polymers classification with poly
acetylene, bio degradable polymers (Poly lactic acid, poly vinyl alcohol). Preparation
properties and applications of Bakelite, nylon-6,6 and Teflon. Rubbers and
elastomers-natural rubber, Thiokol. Nano Composites – Classification, Matrix face
and dispersed phase and applications
UNIT-IV : ORGANIC REACTIONS AND SPECTROSCOPY 5hrs.
Introduction to addition reactions, substitution reactions (SN1, SN2) and elimination
reactions (E1,E2) aliphatic only, Oxidation-Reduction reactions(K2Cr2O7, KMnO4,
hydrogenation, NaBH4 and LiAlH4).Principles of UV, IR, NMR, Mass – selection rules
and applications.Preparation of Drugs-Definition, Classification, Structure and uses
of Asprin and Ibuprofen.
UNIT-V:WATER TECHNOLOGY 8hrs.
Hardness of water – Types, Units and Numerical problems on hardness- EDTA
method, potable water treatment, steps involved in treatment. RO method, Ion-
exchange method. Boiler troubles-Sludge, scale, Priming, foaming, caustic
embrittlement and boiler corrosion their prevention.
UNIT-VI :STEREOCHEMISTRY 12hrs.
Representations of three dimensional structures-Newmann-Sawhorse
Representations, Structural Isomers-Chain-position-functional, Stereo Isomers-
Conformational isomerism (Ethane)-Configurations (Geometrical and Optical),
Elements of Symmetry-Plane of symmetry and centre of symmetry and Chirality,
Enantiomers, Diastereomers and Optical Activity of lactic acid.
COURSE OUTCOMES:
CO 1. Analyze microscopic chemistry in terms of atomic and molecular orbitals
and intermolecular forces.
CO 2. Summarize the basic concepts of electrochemistry and distinguish the
working principles of batteries and fuel cells.
CO 3. Distinguish the types of corrosion, and apply corrosion preventive methods
in the field of Engineering.
CO 4. Illustrate the types and properties of Polymers and their applications in
various industries.
CO 5. Distinguish the ranges of the electromagnetic spectrum used for exciting
different molecular energy levels in various spectroscopic techniques.
CO 6. Illustrate major chemical reactions that are used in the synthesis of
molecules.
CO 7. Summarize the boiler troubles due to hard water in boilers.
CO 8. Choose suitable method involved in water treatment depending on the
contaminants.
CO 9. Outline the spatial arrangement of atoms in the molecules.
Mapping of COs to POs:
POs PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO1 3 - - - - - - - - - - -
CO2 3 2 - - - - 3 - - - - -
CO3 3 2 - - - - 3 - - - - -
CO4 3 - - - - - 3 - - - - -
CO5 3 2 - - - - - - - - - -
CO6 3 - - - - - - - - - - -
CO7 3 - - - - - 3 - - - - -
CO8 3 - - - - - - - - - - -
CO9 - 2 - - - - - - - - - -
TEXT BOOKS
1. Text book of Engineering Chemistry by Jain & Jain. Dhanpat Rai Publishing Company, 16th Edn., 2015.
2. A Text book of Engineering Chemistry by Shashi Chawla. Dhanpat Rai Publications, 3rd Edn., 2013.
3. A text book of Organic Reactions Stereochemistry and Mechanism by P.S. Kalsi, 9th Edition, 2016.
4. A text book of Organic chemistry by Bahl and bahl, S. Chand Publications, 21st Edition, 2017.
5. A text book of Inorganic chemistry by J.D.Lee, Wiley india edition. REFERENCE BOOKS
1. A Text book of Engineering Chemistry by S.S.Dara. S.Chand & Company Ltd., 12th Edn.,2010.
2. A Text book of Engineering Chemistry Shika Agarwal, Cambridge, 2015 Edition 3. A text book of Engineering Chemistry by Rath, Rama Devi, Reddy, Cengage
Learning Indian pvt Ltd., 2016 4. A Text book of Chemistry, principles and applications by M.J.sienko and
R.A.Plane. 5. Fundamentals of molecular spectroscopy by C.N.Banwell 6. A Text book of Physical chemistry by P.W. Atkins 7. A Text book of Organic chemistry: structure and function by K.P.C.Volhardt and
N.E. Schore,5th edition 8. A text book of Inorganic chemistry by Dr.Wahid U.Malik, S.Chand publication, revised edition.
PROGRAMMING FOR PROBLEM SOLVING
(Common to All Branches)
Subject Code: UGCS2T0118 L T P C I Year / II Semester 3 0 0 3
Prerequisites: Basic knowledge in Mathematics and Logical Skills.
Course Objectives:
The students will learn about Computer components and program development
steps. They will understand the concepts of algorithms, flowcharts and basic
concepts in C Programming language like operators, control statements and loops.
They can develop modular and readable C programs using the concepts like
pointers, functions, structures and files.
Syllabus:
UNIT I: 7 hrs
Problem Solving: Basic Computer Organization, Algorithm, Pseudo code,
Flowchart, Program development steps, Computer Languages: Machine, Symbolic
and High-level languages.
UNIT II: 8 hrs
Basics of C: History of C, Structure of a C program, C tokens, Identifiers, Data
types, Constants, Variables, Input/Output Statements, Creating and running
programs, Operators, Precedence and order of evaluation, Type conversion.
Selection Statements: Simple If, If-else, Nested if-else, Else-if, Switch statement
and Examples.
UNIT III: 8 hrs
Loop Statements: While, Do-while, For, Continue, Break and Goto statements.
Arrays: Arrays declaration, Definition, Accessing elements, Storing elements, 1-D
arrays, 2-D arrays and Multidimensional Arrays. Searching and Sorting: Linear
and Binary Search, Bubble sort, Selection sort.
UNIT IV: 8 hrs
Functions: Basics, Categories of functions, Parameter passing mechanism, Passing
an Array to a Function, Scope rules, Storage Classes, C Pre-processor directives.
Recursion: Recursion versus Iterations, Recursive solutions for factorial, Fibonacci
series and GCD.
UNIT V: 8 hrs
Pointers: Introduction, Pointer Arithmetic, Array of Pointers, Pointers to Pointers,
Pointers to Functions, Dynamic memory allocation functions, Command-line
arguments.
Strings: Concepts, String Input/Output functions, Arrays of Strings, String
manipulation functions.
UNIT VI: 10 hrs
Structures: Declaration, definition and initialization of Structures, Accessing
Structures, Nested Structures, Arrays of Structures, Structures and Functions,
Pointers to Structures, Bit fields, Unions, Type definition (typedef), Enumerated
types.
Files: Introduction to Files, Types of Files, Modes of Files, Accessing Files, File
Input/Output functions, File handling functions, Applications of Files.
Course Outcomes:
Upon the completion of the course, the students will be able to:
CO1: Design algorithms for arithmetic and logical problems.
CO2: Apply basic programming skills for translating algorithms into programs.
CO3: Analyze complex problems and develop solutions by modularization.
CO4: Develop programs using pointers, strings, structures and files.
Mapping of COs to POs :
POs
PO 1
PO 2
PO 3
PO 4
PO 5
PO 6
PO 7
PO 8
PO 9
PO 10
PO 11
PO 12
CO1 3 3 3 3 - - - - - - - -
CO2 3 3 3 3 3 - - - - - - -
CO3 3 3 3 3 3 - - - - - - -
CO4 3 3 3 3 3 - - - - - - -
TEXT BOOKS :
1. Reema Thareja, Programming in C, OXFORD. 2. Dennis Ritchie and Brian Kernighan, The C programming Language, Prentice Hall.
REFERENCE BOOKS:
1. Herbert Schildt, C: The Complete Reference,4th Edition, Osborne Mc Graw Hill. 2. B. A. Forouzan and R. F. Gilberg, Computer Science: A Structured Programming Approach using C, 3rd Edition, Thomson Publications. 3. Yashawanth Kanethkar, Let us C, 8th Edition, Jones & Bartlett Publishers. 4. Stephen G. Kochan, Programming in C, 3rd Edition, Pearson Education Private Limited. 5. E. Balagurusamy, C Programming and Data Structures, TMH.
BASIC ELECTRICAL & ELECTRONICS ENGINEERING
Subject Code: UGEE2T0218 L T P C
I Year / II Semester 3 0 0 3
Prerequisites: Engineering Physics
Course Objective: The basic input to all engineering is the electric energy. A basic
course on Electrical Engineering is almost essential for all engineering students. This
course will offervarious features of Electrical & Electronics Engineering starting from
simple DC circuits, Transformers, various DC & AC machines, and Electronic devices.
SYLLABUS:
UNIT I: DC Circuits 10 hrs
Electrical circuit parameters (R, L and C), ohms law, Kirchhoff current and voltage
laws, voltage and current sources, series and parallel circuits, voltage and current
division rule, analysis of simple circuits with dc excitation (independent sources
only), Star to delta transformation
UNIT II: DC Machines 11 hrs
Construction, working of DC Generator, EMF Equation, types and characteristics of
DC generators, Principle of DC motor Torque Equation of Motor, types of DC Motors,
Torque-speed characteristic and speed control of DC motor.
UNIT III: Transformers 9 hrs
Construction, Principle of operation, types, EMF Equation of a Transformer, OC and
SC tests, efficiency and regulation, simple problems
UNIT IV: AC Machines 9 hrs
Construction and working of three-phase Induction motor, types, slip-torque
characteristics. Construction and working of Alternators, types, EMF equation,
regulation by synchronous impedance method
UNIT V: Electronic Devices 10 hrs
PN junction diodes, types, V-I characteristics. Transistors, types, characteristics.
Principle of operation of Half wave, Full wave rectifiers and bridge rectifiers,
Introduction to OP-AMPs
UNIT VI: Amplifiers and Oscillators 9 hrs
Biasing Methods, Classification of Amplifiers, Feedback Amplifiers, Transistor as an
Amplifier, frequency response of CE Amplifier, Principles of Oscillators – RC Phase
Shift, Wien Bridge.
COURSE OUTCOMES:
CO1: To Interpret and analyze basic electric circuits with DC excitation.
CO2: To demonstrate the working principles of DC machines.
CO3: To analyze the constructional features of Transformers and to study of its
working principle.
CO4: To explain the constructional features and study of AC machines.
CO5: To summarize the working principles of Diodes, Transistors and analyze their
characteristics.
CO6: To classify the working principles of the different types of Amplifiers &
Oscillators.
Mapping of COs to POs:
POs 1 2 3 4 5 6 7 8 9 10 11 12
CO1 3 3 - - - - - - - - - -
CO2 3 3 - - - - - - - - - -
CO3 3 3 - - - - - - - - - -
CO4 3 3 - - - - - - - - - -
CO5 3 3 - - - - - - - - - -
CO6 3 3 - - - - - - - - - -
TEXT BOOKS:
1. “Basic Electrical Engineering” by Nagsarkar,,Sukhija, 2nd edition, Oxford
University Press, 2005
2. “Basic Electrical Engineering” by M. S. Naidu & S. Kamaksiah, TMH publications
3. “Basic Electrical Engineering” by S. N. SINGH, PHI learning, 2011.
REFERENCE BOOKS:
1. “Basic Electrical Engineering” by C. L. Wadhwa, 4th edition, New Age Publishers,
2007.
2. “Basic Electrical Engineering”, by D. C. Kulshreshtha, 2nd edition, McGraw Hill,
2009.
3. “Basic Electrical Engineering”, D. P. Kothari and I. J. Nagrath, 3rd edition, Tata
McGraw Hill, 2010.
BUSINESS COMMUNICATION LAB
(Common to All Branches)
Subject Code: UGBS2P0618 L T P C
I Year / II Semester 0 0 3 1.5
LABORATORY OBJECTIVES:
1. To expose student to different situations for better communication
2. To inculcate the habit of learning vocabulary for effective communication
3. To enable students to acquire Business English communication
ENGLISH LAB ACTIVITIES:
UNIT – I: (2 sessions)
Listening: Listening to short conversations or monologues
Speaking: Giving information about oneself and their opinions and Giving a
short talk on business related topics
Reading: Reading short and simple texts to understand the central idea/theme.
Writing: Writing a piece of internal business communication of 30-40 words
(Email)
UNIT – II: (2 sessions)
Listening : Listening to a conversation/ monologue and taking notes
Speaking : Giving short talk on business related topics.
Reading: Matching descriptions of people to short texts. Matching statements to
Information given in a graph or graphs.
Writing : Writing a piece of internal business communication of 30-40 words
(Message)
UNIT – III (2 sessions)
Listening: Listening to longer conversations/interviews.
Speaking: Extempore
Reading : Reading a longer text and deciding whether the statements
about the text are right or wrong or if the information is not given.
Writing : Write a business letter or e-mail of 60-80 words, based on
an input text and some notes.
UNIT – IV (2 sessions)
Listening: Listening to TV news channels and taking notes.
Listening to songs and writing down the lyrics.
Speaking: Interview sessions
Reading: Read a longer text and answering questions. .
Writing: Writing a Business Report
UNIT – V: (2 sessions)
Listening: Watching short documentaries and making notes.
Speaking: Short plays, Presentations.
Reading : Read short texts and fill in a form using information from the texts.
Writing : Write a skit and enact.
UNIT – VI: (2 sessions)
Listening: Watching documentaries and making notes.
Speaking: Nail your point.
Reading : Critical Reading to know author’s perspective.
Writing : Write a skit and enact.
COURSE OUTCOMES:
Upon the completion of the course, the students will be able to:
CO1: Develop listening skills through short or long conversations, monologues,
interviews, TV news channels as well as watch documentaries and take
notes.
CO2: Demonstrate speaking skills through talking about oneself, opinions, about
business related topics and speak one’s opinion.
CO3: Examine speaking skills through giving extempore, participating in skits, short
plays, presentations and mock interviews.
CO4: Build reading skills through general or critical reading of simple or longer
texts to understand theme, to match statements correctly, to answer
questions and to know author’s perspective.
CO5: Apply writing skills with the practice of taking or making notes, emails or
messages with a maximum of 40 or 80 words.
CO6: Test for writing skills through reports or skits.
CO7: Develop Listening, Speaking, Reading and Speaking skills for effective
communicator in writing as well as speaking for business purposes.
Mapping of COs to POs:
POs 1 2 3 4 5 6 7 8 9 10 11 12
CO1 - - - - - - - - 3 3 - 3
CO2 - - - - - - - - 3 3 - 3
CO3 - - - - - - - - 3 3 - 3
CO4 - - - - - - - - 3 3 - 3
CO5 - - - - - - - - 3 3 - 3
CO6 - - - - - - - - 3 3 - 3
CO7 - - - - - - - - 3 3 - 3
REFERENCE BOOKS:
1. Cambridge English – Business English Certificate Preliminary
2. Suresh Kumar. E. & Sreehari P.A (2007), Handbook for English Language
Laboratories,
3. Cambridge University Press India Pvt. Ltd, New Delhi.
4. Mandal S. K (2006),Effective Communication & Public Speaking , Jaico
Publishing House, New Delhi.
5. Grant Taylor (2004), English Conversation Practice, Tata McGraw Hill, New Delhi.
6. Balasubramanian .T (2000), A text book of English Phonetics for Indian
Student, MacMillan Publishers, India.
7. Kamalesh Sadanand, Susheela Punitha (2008), Spoken English: A foundation
Course: Parts 1& 2, New Delhi, Orient Longman Pvt. Ltd
WEB REFERENCES: 1. www.cambridgeenglish.org. 2. www.esl-lab.com
APPLIED CHEMISTRY LAB
(Common to CSE & IT )
Subject Code: UGBS2P0818 L T P C
I Year / II Semester 0 0 3 1.5
LABORATORY OBJECTIVES:
1. To learn various analytical techniques for analyzing and solving engineering
problems.
2. To understand the principles associated with basics of engineering chemistry
and applications of these principles in avoiding common difficulties.
EXPERIMENTS:
Exp1: Introduction to chemistry laboratory – Quantitative analysis, Qualitative
analysis Molarity, Normality, Primary, Secondary standard solutions,
Volumetric titrations
Exp2: Determination of ferrous ion by dichromometry.
Exp3: Determination of total hardness of given water sample by EDTA method
Exp4: Conductometric Titrations between strong acid and strong base
Exp5: Potentiometric Titrations between strong acid and strong base
Exp6: Determination of surface tension of polymer/organic liquid
Exp7: Determination of Rate Constant of a reaction
Exp8: Adsorption of Acetic acid by Charcoal
Exp9: Thin Layer Chromatography
Exp10: Synthesis of Aspirin
Exp11: Synthesis of Urea-Formaldehyde
LABORATORY OUTCOMES :
CO 1: Apply the basic knowledge on volumetric and quantitative analysis.
CO 2: Analyse the parameters to measure the quality of water samples.
CO 3: Measure Physical and chemical properties of organic solvent sand solutions
used in Engineering.
CO 4: Apply the knowledge to synthesize a drug or a polymer.
Mapping of COs to POs:
POs PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO1 3 - - - - - - - - - - -
CO2 3 2 - - - - 3 - - - - -
CO3 3 2 - - - - - - - - - -
CO4 3 - - - - - - - - - - -
PROGRAMMING FOR PROBLEM SOLVING LAB
(Common to All Branches) Subject Code: UGCS2P0218 L T P C I Year / II Semester 0 0 3 1.5
Prerequisites: Basic knowledge in Mathematics and Logical Skills.
Course Objectives:
The students will learn to develop the programs for solving the basic problems using
Operators, Control statements and Loops. They will able to write programs using
concepts like Arrays, Strings, Pointers, Functions and Files.
List of Experiments:
EXP 1: a. Write a C program that will output your name and address using a separate
printf() statement for each line of output. b. Modify your solution for the previous program so that it produces all the
output using only one printf() statement.
c. Write a C program to output the following text exactly as it appears here: " C is just like sea……" she said. d. Write a C program that prompts the user to enter a distance in inches and
then outputs that distance in yards and feet.
e. Write a C program to convert the temperature from degree Centigrade to
Fahrenheit and vice versa.
EXP 2: a. Write a C program to find the largest of three numbers using nested if-else.
b. Write a C Program to swap two numbers without using a temporary variable.
c. Write a C simple program based on operators (pre, post increment, bitwise and, or, etc.).
d. Write a C simple program based on type conversions (from int to float and float to int).
EXP 3:
a. Write a C program that displays all the numbers from X to Y, that are divisible by a and b. (X,Y,a and b should be read from the key board)
b. Write a C program that reads an unspecified number of integers, determines
how many positive and negative values have been read, and computes the
total and average of the input values, not counting zeros. Your program ends
with the input 0. Display the average as a floating-point number. (For
example, if you entered 1, 2, and 0, the average should be 1.5.)
c. Write a C program for finding student Grade by reading marks as input.
EXP 4: a. The total distance travelled by vehicle in ‘t’ seconds is given by distance s =
ut+1/2at2 where ‘u’ and ‘a’ are the initial velocity (m/sec.) and acceleration (m/sec2). Write a C program to find the distance travelled at regular intervals of time given the values of ‘u’ and ‘a’. The program should provide the flexibility to the user to select his own time intervals and repeat the calculations for different values of ‘u’ and ‘a’.
b. Write a C program, which takes two integer operands and one operator from the user, performs the operation and then prints the result. (Consider the operators +,-,*, /, % and use Switch Statement)
c. Write a C Program to enter a decimal number, calculate and display the binary equivalent of that number.
EXP 5: a. Write a C program to find the sum of individual digits of a positive integer and
find the reverse of the given number. b. A Fibonacci sequence is defined as follows: the first and second terms in the
sequence are 0 and 1, Subsequent terms are found by adding the preceding two terms in the sequence. Write a C program to generate the first n terms of the sequence.
c. Write a C program to generate all the prime numbers between 1 and n, where n is a value supplied by the user.
EXP 6: a. Write a C program to check whether the given number is Armstrong number or not.
b. Write C programs for the following series:
c. Write a C program to find the roots of a Quadratic equation.
EXP 7:
a. Write C programs that use both recursive and non-recursive functions i. To find the factorial of a given integer. ii. To find the GCD (greatest common divisor) of two given integers.
b. Write C programs for implementing Storage classes: (Auto, register, static, extern)
EXP 8:
a. Write a C program to find the minimum and maximum integer of an Array. b. Write a C program that uses functions to perform the following:
i. Addition of Two Matrices ii. Multiplication of Two Matrices
EXP 9:
a. Write a C program to construct the following pyramid of numbers.
1 1 2 1 2 3
*
* *
* * *
1
2 3
4 5 6
A B B C C C D D D D E E E E E
EXP 10:
a. Write a C program to swap two numbers using call by reference method. b. Write a C program that uses a pointer to read and display Array elements. c. Write a C program to create an array with calloc(), store the values into it and
find their sum. EXP 11:
a. Write a C program to find length of the given string without using strlen(). b. Write a C program that uses functions to perform the following operations:
i. To insert a sub-string in to a given main string from a given position. ii. To delete n Characters from a given position in a given string.
c. Write a C program to determine if the given string is a palindrome or not. EXP 12:
a. Write a C program to implement Linear search. b. Write a C program to implement sorting of an array using Bubble sort.
EXP 13:
a. Examples which explores the use of structures, union and other derived data types.
EXP 14:
a. Write a C program which copies the contents of one file to another. b. Write a C program to count the number of characters and number of lines in
a file. c. Write a C Program to merge two files into a third file. The names of the files
must be entered using command line arguments. d. Write a C program that copies the characters from position X to position Y
from one file to another file.
Course Outcomes:
Upon completion of course, the students will be able to:
CO 1. Test and execute the programs and correct syntax and logical errors. CO 2. Develop programs for the basic mathematical and general problems. CO 3. Analyze complex problems and break them into logical modules and
interpret the results.
Mapping of COs to POs :
POs
PO 1
PO 2
PO 3
PO 4
PO 5
PO 6
PO 7
PO 8
PO 9
PO 10
PO 11
PO 12
CO1 3 3 3 3 3 - - 3 3 3 - -
CO2 3 3 3 3 3 - - 3 3 3 - -
CO3 3 3 3 3 3 - - 3 3 3 - -
TEXT BOOKS:
1. Byron Gottfried, Jitender Chhabra, Programming with C (Schaum's Outlines
Series), Mc Graw Hill Publishers.
2. Yashwanth Kanetkar, Let us C, 8th Edition, Jones & Bartlett Publishers.
REFERENCE BOOKS:
1. Herbert Schildt, C: The Complete Reference, 4th Edition, Mc Graw Hill.
2. B. A. Forouzan and R. F. Gilberg, Computer Science: A Structured
Programming Approach using C, 3rd Edition, Thomson Publications.
INDIAN CONSTITUTION
Subject Code: UGBS2A1118 L T P C
I Year / II Semester 2 0 0 0
COURSE OBJECTIVES:
1. To train students in understanding the basic structure of Indian Constitution
2. To prepare students to live better and happily with other fellow beings through
the application of Fundamental Rights in their lives.
SYLLABUS:
UNIT-I: Introduction to Indian Constitution
Meaning of the term Indian Constitution –Preamble- Constituent Assembly- Salient
Features of Indian Constitution
UNIT-II: Fundamental Rights
Fundamental Rights -Fundamental Duties -The Directive Principles of State Policy
UNIT-III: Union Government
Union Government -Union Legislature (Parliament) -Lok Sabha and Rajya Sabha (with Powers and Functions) -Union Excecutive -President of India (with Powers and Functions) -Prime Minister of India (with Powers and Functions) -Union Judiciary (Supreme Court) -Jurisdiction of the Supreme Court
UNIT-IV State Government
State Government -State Legislature (Legislative Assembly / Vidhan Sabha,
Legislative Council / Vidhan Parishad) -Powers and Functions of the State
Legislature -State Executive-Governor of the State (with Powers and Functions) -The
Chief Minister of the State (with Powers and Functions) -State Judiciary (High
Courts)
UNIT-V: Local Self Governance
Powers and functions of Municipalities, Panchyats, ZP’s and Co – Operative Societies
UNIT-VI: Sovereign Bodies
Election Commission of India (with Powers and Functions) -The Union Public Service
Commission (with Powers and Functions)
COURSE OUTCOMES:
Upon the completion of the course, the student will be able to:
CO1: Examine salient features of Indian Constitution and live accordingly in society.
CO2: Interpret the meaning of Fundamental Rights and Directive Principles of State
Policy and, develop an attitude which paves the way for better living
conditions.
CO3: Discover various aspects of Union Government legislation and live up to the
expectations of the rules.
CO4: Critically examine State Government legislation and improve your living
standards by following the rules strictly.
CO5: Examine powers and functions of local bodies such as Muncipalities and
Panchayats and,take advantage of available resources for better living.
CO6: Analyze the powers and functions of Election Commission and The Union
Public Service Commission and decide upon it for safe and secured life.
Mapping of COs to POs:
POs 1 2 3 4 5 6 7 8 9 10 11 12
CO1 3 - - - - - - - - - - -
CO2 - 3 - - - - - - - - - -
CO3 - - 3 - - - - - - - - -
CO4 - - - 3 - - - - - - - -
CO5 - - - - 3 - - - - - - -
CO6 - - - - - 3 - - - - - -
BOOKS: 1. Introduction to constitution of India, Durga Das Basu, Lexis Nexis Publications
2. Constitution of India by PRFESSIONAL BOOK PUBLISHERS
3. The Constitution of India by Arun K Tiru vengadam, Blooms bury publishers.
4. The constitution of India by PM Bakshi, Universal law publishing co
5. The Constitution of India by S.R. Bhansali, Universal law publishing co
PROBABILITY AND STATISTICS
Subject Code: UGBS3T0318 L T P C
II Year / I Semester 3 0 0 3
Prerequisites: Basic knowledge in Mathematics.
Course Objectives:
To expose students to present the theory and methods of ‘probability and statistics’ needed to support Engineering decision making.
To prepare students to create an understanding on various types of sampling distribution and their applications in Engineering.
To train students the basic principles of Statistical Inference.
Syllabus: UNIT I: (9 lectures)
Basic Statistics
Measures of Central Tendency: Mean, Median, Mode Measures of Dispersion: Variance, Standard deviation, Skewness and Kurtosis.
UNIT II: (8 lectures)
Basic Probability
Introduction to Probability, Conditional Probability, Baye’s Theorem on Probability;
Random Variables: Discrete and continuous - Probability function – density and
distribution function, Expectation of a Random Variable, Moments, Chebychev's
Inequality (Without proof).
UNIT III: (7 lectures)
Probability Distributions
Probability distributions: Binomial, Poisson and Normal - Evaluation of statistical
parameters: Mean, Variance and their properties, Introduction to Exponential,
Gamma and Weibull distributions.
UNIT IV: (7 lectures)
Bivariate Distributions
Curve fitting by the method of Least squares- Fitting of straight line, parabola and exponential curves, Simple Correlation and Regression – Rank correlation.
UNIT V: (7 lectures)
Sampling Distribution And Estimation
Introduction – Sampling distribution of means with known and unknown standard
deviation.
Estimation: Criteria of a good estimator, point and interval estimators for means and
proportions.
UNIT VI: (10 lectures)
Tests Of Hypothesis
Introduction-Type-I, Type-II Errors, Maximum Error, one –tail, two-tail tests,Test of significance: Large sample test for single proportion, difference of proportions, single mean, difference of means. Test of significance: Small sample test for single mean, difference of means and test of ratio of variances (F-Test) - Chi-square test for goodness of fit and independence of attributes.
Course Outcomes: Upon completion of this course, the students will be able to: CO 1. Evaluate various measures of central tendency and dispersion of real data CO 2. Apply basic theorems of probability and Baye’s theorem to solve real time
Problems. CO 3. Classify the Random variable and Probability distribution involved in a given
problem and examine the relevant probabilities and parameters. CO 4. Construct a suitable curve to the given data using least squares method CO 5. Determine the Correlation and Regression of two variable quantities CO 6. Demonstrate the concepts of statistical estimation CO 7. Apply the principles of Hypothesis testing to draw conclusions about real time
data.
Mapping of COs to POs: POs/
COs PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO1 3 3 2 3 - - - - - - - 3
CO2 3 3 2 3 - - - - - - - 3
CO3 3 3 2 3 - - - - - - - 3
CO4 3 3 2 3 - - - - - - - 3
CO5 3 3 2 3 - - - - - - - 3
CO6 3 3 2 3 - - - - - - - 3
CO7 3 3 2 3 - - - - - - - 3
TEXT BOOKS: 1. Dr.T.S.R.Murthy, Probability and Statistics for Engineers, BS Publications. 2. Ronald E. Walpole, Sharon L. Mayers and Keying Ye, Probability and Statistics for Engineers and Scientists, Pearson Education. 3. Miller, John E. Freund, Probability and Statistics for Engineers, PHI.
REFERENCE BOOKS:
1. Dr.T.S.R.Murthy, Probability and Statistics, I.K. International Publishing. 2. S.C.Gupta &V.K.Kapoor, Fundamentals of Mathematical Statistics, Sultan Chand. 3. Murugesan, Probability, Statistics and Random Processes, Anuradha Publishers. 4. S.C.Guptha, Fundamentals of Statistics, Himalaya Publishing.
DATA STRUCTURES
Subject Code: UGCS3T0118 L T P C
II Year / I Semester 3 0 0 3
Prerequisites: The students must have thorough knowledge on the concepts of arrays, pointers, structures and functions along with basic constructs of C language to implement the data structure algorithms. Course Objectives: The course is intended to provide the foundations of the Data Structures and to emphasize the importance of Data Structures for efficient algorithms. The objective is to ensure that the student able study design and implement major linear and non-linear data structures along with performance analysis.
Syllabus: UNIT I: (9 Lectures)
Recursion and Linear Search: Preliminaries of algorithm, Algorithm analysis and
complexity. Recursion: Definition, Design Methodology and Implementation of recursive
algorithms, Linear and binary recursion, recursive algorithms for factorial function, GCD
computation, Fibonacci sequence, Towers of Hanoi, Tail recursion, List Searches using
Linear Search, Binary Search.
UNIT II: (8 Lectures)
Sorting Techniques: Basic concepts, Bubble Sort, Insertion sort, selection sort, quick
sort, radix sort , and merge sort Algorithms.
UNIT III: (8 Lectures)
Stacks: Basic Stack Operations, Representation of a Stack using Arrays, Stack
Applications: Infix- to postfix Transformation, Evaluating Arithmetic Expressions.
Queues: Basic Queues Operations, Representation of a Queue using array,
Implementation of Queue Operations, Applications of Queues-Round robin Algorithm,
Circular Queues.
UNIT IV: (8 Lectures)
Linked Lists: Introduction, single linked list, representation of a linked list in memory,
Operations on a single linked list, Reversing a single linked list, applications of single
linked list: Representing polynomial expressions, Linked List representation of Stack and
Queue, Circular linked list, Double linked list.
UNIT V: (8 Lectures)
Trees: Basic tree concepts, Binary Trees: Properties, Representation of Binary Trees
using arrays and linked lists, Binary Search Trees, operations on a Binary Search trees,
Binary Tree Traversals in recursive fashion, Creation of binary tree from in-order and
pre/post order traversals, Binary Heaps and heap sort, Balanced trees: Definition and
need.
UNIT VI: (7 Lectures)
Graphs: Definitions, Properties, Applications, Representation of Unweighted Graphs,
Weighted Graphs, Graph Search Methods: BFS, DFS Implementation.
Course Outcomes: Upon completion of this course, the students will be able to:
CO 1. Understand the principles, working methodologies and operations of both linear and nonlinear data structures.
CO 2. Demonstrate the design methodology and implementation of recursive and iterative algorithms to solve complex problems.
CO 3. Apply the techniques of data structures for formulating solutions to real world problems.
CO 4. Analyze time and space complexities to design searching and sorting algorithms for building optimal solutions.
CO 5. Compare performance analysis and choose suitable data structure for developing efficient applications.
Mapping of COs to POs:
POs/
COs
PO
1
PO
2
PO
3
PO
4
PO
5
PO
6
PO
7
PO
8
PO
9
PO
10
PO
11
PO
12
PSO
1
PSO
2
CO1 3 3 - - - - - - - - - - 3 -
CO2 3 3 3 3 - - - - - - - - 3 -
CO3 3 3 3 3 - 3 - - - - - 3 3 -
CO4 3 3 3 3 - - - - - - - - 3 -
CO5 3 3 3 3 - 3 - - - - - 3 3 -
TEXT BOOKS: 1.Richard F, Gilberg, Forouzan, Data Structures, 2nd edition, Cengage.
2. Aaron M. Tenenbaum, YedidyahLangsam, Moshe J Augenstein, Data Structures
usingC, Pearson.
3. Mark Allen Weiss, Data structures and Algorithm Analysis in C, 2nd edition, Pearson
Education. Ltd.
REFERENCE BOOKS: 1.Jean-Paul Tremblay Paul G. Sorenson, An Introduction to Data Structures with
Applications, 2nd edition, Mc Graw Hill Higher Education.
2.Seymour Lipschutz, Data Structure with C, TMH.
3.Reema Thareja, Data Structures using C, 2nd edition, Oxford.
DIGITAL ELECTRONICS
Subject Code: UGCS3T0218 L T P C
II Year / I Semester 3 0 0 3
Prerequisites: Basic knowledge in Boolean Algebra.
Course Objectives: This course helps students to acquire basic knowledge on number systems, logic gates, gate level minimization, combinational and sequential logic circuits, registers and counters and PLA’s.
Syllabus: UNIT I: (9 Lectures)
Number Systems: Digital Systems, Binary, Decimal, Octal and Hexadecimal
Numbers, Conversion of Numbers from One Radix to another Radix, r’s Complement
and (r-1)’s Complements of Numbers, Signed Binary Numbers, Binary Codes.
UNIT II: (8 Lectures)
Logic Gates and Boolean algebra: Basic Gates NOT, AND, OR, Boolean
Theorems, Complement And Dual of Logical Expressions, Universal Gates, XOR and
XNor Gates, SOP,POS, Minimizations of Logic Functions Using Boolean Theorems,
Two level Realization of Logic Functions Using Universal Gates.
Gate- Level Minimization: Karnaugh Map Method (K-Map): Minimization of
Boolean Functions maximum up to Four Variables, POS And SOP, Simplifications
With Don’t Care Conditions Using K-Map.
UNIT III: (8 Lectures)
Combinational Logic Circuits: Design of Half Adder, Full Adder, Half Subtractor,
Full Subtractor, Ripple Adders and Subtractors, Ripple Adder/Subtractor Using Ones
and Twos Complement Method. Design of Decoders, Encoders, Multiplexers, De-
multiplexers, Higher Order De-multiplexers and Multiplexers, Priority Encoder, Code
Converters, Magnitude Comparator.
UNIT IV: (9 Lectures)
Introduction to Sequential Logic Circuits: Classification of Sequential Circuits,
Basic Sequential Logic Circuits: Latch and Flip-Flop, RS- Latch Using NAND and NOR
Gates, Truth Tables. RS, JK, T and D Flip Flops, Truth and Excitation Tables,
Conversion of Flip Flops. Flip Flops With Asynchronous Inputs (Preset and Clear).
UNIT V: (8 Lectures)
Registers and Counters:Design of Registers, Buffer Register, Control Buffer
Registers, Bidirectional Shift Registers, Universal Shift Register, Design of Ripple
Counters, Synchronous Counters and Variable Modulus Counters, Ring Counter,
Johnson Counter.
UNIT VI: (8 Lectures)
Introduction to RAM and Programmable Logic Devices (PLDs): Introduction
to RAM: Read and Write operations, PLA, PAL, PROM, Realization of Switching
Functions using PROM, PAL and PLA. Comparison of PLA, PAL and PROM.
Course Outcomes:
Upon completion of this course, the students will be able to: CO 1 Summarize various number systems for computer arithmetic.
CO 2 Apply Boolean algebra principles to simplify the Boolean expressions.
CO 3 Interpret and design the combinational and sequential circuits.
CO 4 Distinguish various types of PLDs and recognize its relationship with switching
functions.
Mapping of COs to POs: POs/
COs PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9
PO1
0
PO1
1
PO1
2
PSO
1
PSO
2
CO1 3 3 - - - - - - - - - - - -
CO2 3 3 - - - - - - - - - - - -
CO3 3 3 3 - - - - - - - - - - -
CO4 3 3 3 - - - - - - - - - - -
TEXT BOOKS:
1. M. Morris Mano, Michael D Ciletti, Digital Design , 5/e, Pearson. 2. Roth, Fundamentals of Logic Design, 5/e, Cengage.
REFERENCE BOOKS: 1. Kohavi, Jha, Switching and Finite Automata Theory, 3/e, Cambridge. 2. Leach, Malvino, Saha, Digital Logic Design, TMH. 3. R.P.Jain,Modern Digital Electronics, TMH.
DISCRETE MATHEMATICS
Subject Code: UGCS3T0318 L T P C
II Year / I Semester 3 0 0 3
Prerequisites: Basic knowledge in Mathematics.
Course Objectives: This course will introduce various methods of representation and
manipulations of data. These methods in subsequent courses will be used in design and
analysis of algorithms, computability theory, digital logic gates, and software engineering
and computer systems.
Syllabus:
UNIT I: (10 Lectures)
Objectives: Acquiring the relevance of statements, inferences and predicates
in computer science
Mathematical Logic:
Propositional Calculus: Statements and Notations, Connectives, Truth Tables,
Tautologies, Equivalence of Formulas, Duality law, Tautological Implications, Normal
Forms, Theory of Inference for Statement Calculus, Consistency of Premises, Indirect
Method of Proof.
Predicate calculus: Predicative Logic, Statement Functions, Variables and Quantifiers,
Free & Bound Variables, Inference theory for predicate calculus.
UNIT II: (8 Lectures)
Objectives: Overview of number theory, basic algorithms in number theory
and mathematical induction
Number Theory & Induction: Properties of integers, Division Theorem, The Greatest
Common Divisor, Euclidean Algorithm, Least Common Multiple(without proofs), Testing
for Prime Numbers, The Fundamental Theorem of Arithmetic, Modular Arithmetic.
Mathematical Induction: Principle of Mathematical Induction, Examples.
UNIT III: (8 Lectures)
Objectives: Focuses on sets and relations and their operations
Set Theory:
Introduction, Operations on Binary Sets, Principle of Inclusion and Exclusion.
Relations: Properties of Binary Relations, Relation Matrix and Digraph, Operations on
Relations, Partition and Covering, Transitive Closure, Equivalence, Compatibility and
Partial Ordering Relations, Hasse Diagrams, The Principles of Inclusion – Exclusion,
Pigeonhole Principle and its Application.
UNIT IV: (7 Lectures)
Objectives: Functions, Types of Functions
Functions: Bijective Functions, Composition of Functions, Inverse Functions,
Permutation Functions, Recursive Functions.
UNIT V: (9 Lectures)
Objectives: Exposure of graphs, their representation, types, trees and tree
variants
Graph Theory: Basic Concepts of Graphs, Sub graphs, Matrix Representation of Graphs:
Adjacency Matrices, Incidence Matrices, Isomorphic Graphs, Paths and Circuits, Eulerian
and Hamiltonian Graphs, Multigraphs, (Problems and Theorems without proofs) Planar
Graphs, Euler’s Formula, Graph Colouring and Covering, Chromatic Number, (Problems
and Theorems without proofs) Trees, Directed trees, Binary Trees, Decision Trees.
UNIT VI: (8 Lectures)
Objectives: Overview of algebraic structures, Group theory
Algebraic Structures, Lattice: Properties, Lattices as Algebraic Systems, Algebraic
Systems with one Binary Operation, Properties of Binary operations, Semi groups and
Monoids: Homomorphism of Semi groups and Monoids, Groups: Abelian Group,
Cosets, Subgroups (Definitions and Examples of all Structures) Algebraic Systems with
two Binary Operations, Rings.
Course Outcomes: Upon completion of this course, the students will be able to: CO1: Demonstrate inference theory of mathematical logic and basic algorithms of
number theory.
CO2: Illustrate the fundamentals of set theory, relations, functions and graphs.
CO3: Select appropriate methods for providing solutions using mathematical logic.
CO4: Identify principles of number theory, set theory for framing different algebraic
structures.
CO5: Apply various graph algorithms to real time problems.
CO6: Analyze mathematical logic statements and number theory concepts.
CO7: Classify algebraic structures based on the concepts of set theory, relations
and functions.
CO8: Compare various graph theory concepts to suit to real time applications
Mapping of COs to POs:
POs/
COs
PO
1
PO
2
PO
3
PO
4
PO
5
PO
6
PO
7
PO
8
PO
9
PO
10
PO
11
PO
12
PSO
1
PSO
2
CO1 3 3 3 3 - - - - - - - - - -
CO2 3 3 3 3 2 2 - - - - - - - -
CO3 3 3 3 3 - - - - - - - - - -
CO4 3 3 3 3 - - - - - - - - - -
CO5 3 3 3 3 2 2 - - - - - - - -
CO6 3 3 3 3 - - - - - - - - - -
CO7 3 3 3 3 - - - - - - - - - -
CO8 3 3 3 3 2 2 - - - - - - - -
TEXT BOOKS:
1. Tremblay, Manohar, Discrete Mathematical Structures with Applications to Computer
Science, TMH.
2. Mott, Kandel, Baker, Discrete Mathematics for Computer Scientists & Mathematicians,
2/e, PHI.
3. Swapan Kumar Chakrborthy, Bikash Kanti Sarkar, Discrete Mathematics, Oxford.
4. Biswal, Discrete Mathematics and Graph theory, 3rd ed, PHI.
REFERENCE BOOKS:
1. CRC Press, Discrete Mathematics, Proofs, Structures and applications, 3rd ed.
2. S.Santha, Discrete Mathematics, Cengage.
3. JK Sharma, Discrete Mathematics, 2/e, Macmillan.
OBJECT ORIENTED PROGRAMMING
Subject Code: UGCS3T0418 L T P C
II Year / I Semester 3 0 0 3
Prerequisites: Knowledge in C programming language.
Course Objectives: To teach the basic concepts and techniques which form the
object oriented programming paradigm. Student completing the course should know
the model of object oriented programming, Fundamental features of Java such as
class, object, interface, exception, multithreading and libraries of object collections
and build applications using Applet and swing components.
Syllabus: UNIT I: (8 Lectures) Introduction to OOP: Need of object oriented programming, principles of object oriented languages, OOP languages and Applications, history of JAVA, Java Virtual Machine, Java features. Programming Constructs: Primitive data types, Identifiers- Naming Conventions, Keywords, Literals, Operators- Binary, Unary and Ternary, Expressions, Primitive Type conversion and casting, Control statements. UNIT II: (8 Lectures) Classes and Objects- Classes, Objects, Creating objects, methods, constructors- constructor overloading, cleaning up unused objects- Garbage collector, class variable and methods, method overloading, static keyword, this keyword, arrays, Command line arguments, String and StringTokenizer.
UNIT III: (8 Lectures) Inheritance: Types of Inheritance, Deriving classes using extends keyword, super keyword, method overriding, abstract class, final keyword. Interfaces: Creating Interface, Extending Interface, Interface Vs Abstract class. Packages: Creating Packages, using Packages, Access protection. Exceptions: Introduction, Exception handling techniques-try…catch, throw, throws, finally block, user defined Exception.
UNIT IV: (9 Lectures) Multithreading: Java.lang.Thread, the main Thread, creation of new Threads, multiple Threads, using isAlive() and join(),Thread priority, Synchronization, Communication between Threads, suspending and resuming Threads.
UNIT V: (8 Lectures) Applets- Applet class, Applet structure, an example Applet program, Applet life cycle, paint() and repaint(). Event Handling- Introduction, Delegation Event Model, Events, Event Sources, Event Listeners, Adapter classes, Inner classes.
UNIT VI: (8 Lectures) Swing Components: Introduction, Swing Components hierarchy, Layout
Managers, JFrame, JPanel, JButton, JTextField, JPasswordField, JTextArea, JList,
JCombobox, JCheckBox, JRadioButton, JScrollPane, JSplitPane, JTabbedPane,
JOptionPane, JProgressBar.
Course Outcomes: Upon completion of this course, the students will be able to:
CO 1. Understand the object oriented programming principles and various java
programming constructs.
CO 2. Design the GUI applications for the end users using applets and swings
with event handling.
CO 3. Apply the concepts of classes, objects and their relationship in solving the
computational problems.
CO 4. Analyze the usage of interfaces, packages, exception handling and
multithreading.
Mapping of COs to POs:
POs/
COs
PO
1
PO
2
PO
3
PO
4
PO
5
PO
6
PO
7
PO
8
PO
9
PO
10
PO
11
PO
12
PSO
1
PSO
2
CO1 3 3 - - - - - - - - - - - -
CO2 - 3 3 - - - - - - - - - 3 -
CO3 3 3 3 - - - - - - - - - - -
CO4 3 3 3 - - - - - - - - - - -
TEXT BOOKS: 1.Herbert Schildt, Java The Complete Reference, McGraw Hill. REFERENCE BOOKS: 1. P.J.Dietel, Java for Programming, Pearson Education.
2. P.Radha Krishna, Object Oriented Programming through Java, Universities Press.
3. Bruce Eckel, Thinking in Java, Pearson Education.
4. S.Malhotra and S.Choudhary, Programming in Java, Oxford University Press.
DATA STRUCTURES LAB
Subject Code: UGCS3P0518 L T P C
II Year / I Semester 0 0 3 1.5
Prerequisites: Students should have the familiarity with the concepts of programming along with basic constructs of C language to implement the data structure algorithms. Course Objectives: The course is designed to introduce various techniques for representation of the data. Further, develop skills to design and analyze simple linear and non-linear data structures, to Strengthen the ability to identify and apply the suitable data structure for the given real-world problem, to Gain knowledge in practical applications of data structures. List of Experiments:
Exercise 1:
a) Write a recursive C program to calculate Factorial of an integer.
b) Write a recursive C program which computes the nth Fibonacci number, for
appropriate values of n.
Exercise 2:
a) Write a recursive C program to calculate GCD (n, m).
b) Write a recursive C program for Towers of Hanoi: N disks are to be transferred
from peg S to peg D with Peg I as the intermediate peg.
Exercise 3:
a) Write a C program that implements Selection sort, to sort a given list of integers
in ascending order.
b) Write a C program that implements Insertion sort, to sort a given list of integers
in ascending order.
Exercise 4:
a) Write a C program that implements Quick sort, to sort a given list of integers in
ascending order.
b) Write a C program that implements Radix sort, to sort a given list of integers in
ascending order.
c) Write a C program that implements Merge sort, to sort a given list of integers in
ascending order.
Exercise 5:
a) Write a C program that implements Stack (its operations) using arrays.
b) Write a C program that uses Stack operations to convert infix expression into
postfix expression.
Exercise 6:
a) Write a C program that implements Queue (its operations) using arrays.
b) Write a C program that implements Circular Queue (its operations) using arrays.
Exercise 7:
a) Write a C program that uses functions to create a singly linked list and its
operations(insert, delete, search).
b) Write a C program to reverse elements of a singly linked list.
Exercise 8:
a) Write a C program that implements Stack (its operations) using Linked list.
b) Write a C program that implements Queue (its operations) using Linked list.
Exercise 9:
a) Write a C program to create a Circular Linked list and its operations(insert,
delete, search).
b) Write a C program to create a Doubly Linked list and its operations( insert,
delete, search).
Exercise 10:
a) Write a C program to create a Binary Search Tree and its operations.
b) Write a recursive C program for traversing a Binary Search Tree in preorder,
inorder and postorder.
Exercise 11:
a) Write a C program to perform BFS traversal on given graph.
b) Write a C program to perform DFS traversal on given graph.
Course Outcomes: Upon completion of this course, the students will be able to:
CO 1. Apply recursive and iterative methodologies to solve complex engineering problems.
CO 2. Solve searching and sorting techniques and evaluate time & space complexities.
CO 3. Develop solutions to create and implement operations of linear and nonlinear data structures.
CO 4. Identify and apply suitable data structure for a given real time problem. Mapping of COs to POs:
POs/
COs
PO
1
PO
2
PO
3
PO
4
PO
5
PO
6
PO
7
PO
8
PO
9
PO
10
PO
11
PO
12
PSO
1
PSO
2
CO1 3 3 3 3 - - - 3 3 3 - 3 3 -
CO2 3 3 3 3 - - - 3 3 3 - 3 3 -
CO3 3 3 3 3 - - - 3 3 3 - 3 3 -
CO4 3 3 3 3 - - - 3 3 3 - 3 3 -
TEXT BOOKS:
1. Richard F, Gilberg, Forouzan, Data Structures, 2nd edition, Cengage
2. Aaron M. Tenenbaum, YedidyahLangsam, Moshe J Augenstein, Data Structures
usingC, Pearson.
3. Mark Allen Weiss, Data structures and Algorithm Analysis in C, 2nd edition,
Pearson Education. Ltd.
REFERENCE BOOKS:
1. Jean-Paul Tremblay Paul G. Sorenson, An Introduction to Data Structures with
Applications, 2nd edition, Mc Graw Hill Higher Education
2. Seymour Lipschutz, Data Structure with C, TMH
3. Reema Thareja, Data Structures using C, 2nd edition, Oxford
OBJECT ORIENTED PROGRAMMING LAB
Subject Code: UGCS3P0618 L T P C
II Year / I Semester 0 0 3 1.5
Prerequisites: Student should have problem solving skills where knowledge in C is
added advantage.
Course Objectives: The main objective of this course is to teach student how to use
java compiler and get familiarity with any IDE(Netbeans, Eclipse) to develop solutions
for practical problems. Understanding the usage of different keywords in programming
and build GUI based applications using applet and swing.
List of Experiments:
1. Write a JAVA program to display default value of all primitive data types of JAVA.
2. Write a JAVA program to displays the roots of a quadratic equation ax2+bx+c =0. Calculate the discriminate D and basing on the value of D, describe the nature of roots.
3. Write a JAVA program to check the compatibility for multiplication, if compatible multiply two matrices.
4. Write a JAVA program to give the example for ‘this’ operator. And also use the ‘this’ keyword as return statement.
5. Write a JAVA program to demonstrate static variables, methods, and blocks. 6. Write a JAVA program that illustrates simple inheritance. 7. Write a JAVA program that illustrates multi-level inheritance. 8. Write a JAVA program to give the example for ‘super’ keyword. 9. Write a JAVA program demonstrating the difference between method
overloading and method overriding. 10. Write a JAVA program demonstrating the difference between method
overloading and constructor overloading. 11. Write a program to accept a string from the console and count the number of
vowels, digits, characters in that string.
12. Write a JAVA program, using StringTokenizer class, which reads a line of
integers and then displays each integer and the sum of all integers.
13. Write a JAVA program to create an abstract class named Shape, that contains an empty method named numberOfSides(). Provide three classes named Trapezoid, Triangle and Hexagon, such that each one of the classes contains only the methodnumberOfSides(), that contains the number of sides in the given geometrical figure.
14. Write a JAVA program illustrating multiple inheritance using interfaces. 15. Write a JAVA program to create a package named p1 and implement this
package in ex1 class. 16. Write a JAVA program to read array of integer values and formulate to create
both “division by zero” exception and “array index out of bound” exception. 17. Write a JAVA program to read two numbers, and sum these two values if the
first value is positive number, otherwise generate a user define exception. 18. Write a JAVA program to implement a Queue and handle its exceptions using
throw, throws mechanisms. 19. Write a JAVA program to illustrate creation of threads using Runnable
Interface(start method start each of the newly created thread. Inside the run method there is sleep () for suspend the thread for 500 milliseconds).
20. Write a JAVA program to illustrate creation of threads using extends Thread class(start method start each of the newly created thread. Inside the run method there is sleep () for suspend the thread for 1000 milliseconds).
21. Write a Java program that correctly implements producer consumer problem using the concept of inter thread communication.
22. Write a JAVA program that describes the life cycle of an applet. 23. Write a JAVA program to create a simple calculator. 24. Write a JAVA program that displays the x and y position of the cursor
movement using Mouse. 25. Write a program to display selected image on left panel. Design the GUI using
JSplitPane and JScrollPane.
Course Outcomes: Upon completion of this course, the students will be able to: CO1: Implement the programs using various basic programming constructs related to
language.
CO2: Apply the concepts of Object oriented programming using Java to design the
solutions of various problems.
CO3: Develop the applications by using different exception handling mechanisms and
also multithreading
CO4: Write simple GUI interfaces for computer applications to interact with users, and
to understand the event-based GUI handling principles
Mapping of COs to POs:
POs/ COs
PO 1
PO 2
PO 3
PO 4
PO 5
PO 6
PO 7
PO 8
PO 9
PO 10
PO 11
PO 12
PSO 1
PSO 2
CO1 3 2 3 - - - - 3 3 3 - - 3 -
CO2 3 3 3 - - - - 3 3 3 - - 3 -
CO3 3 3 3 - - - - 3 3 3 - - 3 -
CO4 3 3 3 - 3 - - 3 3 3 - - 3 -
TEXT BOOKS: 1. Herbert schildt and Dale skrien, Java Fundamentals- A Comprehensive introduction, TMH. 2. P.J.Dietel and H.M.Dietel, Java: How to Program , PHI. REFERENCE BOOKS: 1. P.Radha Krishna, Object Oriented Programming through java, Universities Press. 2. Bruce Eckel, Thinking in Java, Pearson Education. 3. S.Malhotra and S.Choudhary, Programming in Java, Oxford University Press.
ESSENCE OF INDIAN TRADITIONAL KNOWLEDGE
Subject Code: UGBS3A0718 L T P C
II Year / I Semester 2 0 0 0
Syllabus:
UNIT-1: INDIAN PHILOSOPHY & MODERN SCIENCE Origin of Indian philosophy- philosophy of Charvaka, Samkhya, Nyaya, Mimensa, Buddist and Jaina. Modern science in India. UNIT-2: MODERN SCIENCE IN JAIN GRANTHAS Introduction, Jain Ethics and Mortality, Non-violence and its facts: Root of non-violence, Meditation, Food, Thirthankars, Ritus, Ganadharas. UNIT-3: TRADITION OF INDIAN SCIENCE Historical evolution of medical tradition in ancient India. Ayurveda: Principles of Ayurvedic Healing -Treating diseases to restore health. Environmental Knowledge: Nature, flora and fauna, Manusmriti. UNIT-4: TRADITION OF INDIAN MATHS Early Historical period, Classical period, Vedic mathematics, Baskaracharya, Lilavati Bijaganitha, Srinivasa Ramanujan - Magic squares. UNIT-5: HOLISTIC HEALTH History, Holistic approach: Enhance living – Mind fullness skills- Spirituality and Healing, Stress Management - Food—Work and Life style. UNIT-6: PURE DIET AND PURE BODY Macro Nutrients: Carbohydrates, Proteins and Lipids. Micro Nutrients: Vitamins and Minerals, Diet plans for individuals. Yoga –Healthy Body: Introduction to Yoga, - Pranayamam, Surya Namaskara and Personality Development. Course Outcomes: Upon completion of this course, the students will be able to:
CO 1. Summarize the Essence of Indian philosophy, Jain philosophy and Buddist philosophy. CO 2. Outline the evaluation process of Ayurvedic healing to restore health and tradition of
Indian mathematics. CO 3. Make use of holistic health practices, spirituality ,stress management techniques for
healthy life Style. CO 4. Relate with proper diet plans and Yoga practices to attain good personality.
Mapping of COs to POs:
POs/
COs
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO1 - - - - - - - - - - - 1
CO2 - - - - - - - - - - - 1
CO3 - - - - - - - - - - - 1
CO4 - - - - - - - - - - - 1
REFERENCES
1. S. Radhakrishna, Indian Philosophy, Vol. 1 (London: George Allen and Unwin,1962), 287. 2. J. P. Jain, Religion and Culture of the Jains (Delhi: Bhartiya Jnanpith, 1977) 168 3. D. P. Sen Gupta, Current Science, 78 (12), 1569 (2000) 4. C.N.Srinivasa Iyengar, History of Indian Mathematics, World Press, Calcutta, 1967. 5. G. H Hardy, Ramanujan (Cambridge, 1940). 6. Nutritive Value of Indian Foods, C.Gopalan, B.V.Raman Sastri & S.C. Balasubramanian. 7. George Feuerstein: The Yoga Tradition (Its history, literature, philosophy and practice) 8. Swami Sivananda, Practice of Karma Yoga (The Divine Life Society, Shivananda Nagar,
P.O., U.P., Himalayas, India)
COMPUTER ORGANIZATION AND ARCHITECTURE
Subject Code: UGCS4T0118 L T P C
II Year / II Semester 3 0 0 3 Prerequisites: Familiarity with Digital Electronics.
Course Objectives: Main objective of the course is to familiarize students about hardware design including logic design, basic structure and behavior of the various functional modules of the modern computer and how they interact to provide the processing needs of the user. It will cover machine level representation of data, instruction sets, computer arithmetic, CPU structure and functions, memory system organization and architecture, system input/output, multiprocessors, and digital logic. Syllabus:
UNIT I: (8 Lectures)
Basic Structure of Computers: Computer Types, functional unit, basic operational concepts, bus structures. Data Representation: Data types, Complements, fixed point representation, floating- point representation. UNIT II: (8 Lectures) Register Transfer Language and Micro Operations: Register Transfer Language. Register Transfer Bus and memory transfers, Arithmetic Micro operations, logical micro operations, shift micro operations, Arithmetic logic shift unit. Basic Computer Organization and Design: Instruction codes, Computer
Register, Computer Instructions, Timing and Control, Instruction cycle, Memory-
Reference Instructions. Input-Output and Interrupt, Design of basic computer,
Design of Accumulator Logic.
UNIT III: (9 Lectures)
Central Processing Unit: General Register Organization, STACK Organization,
Instruction formats, Addressing modes, DATA Transfer and manipulation, Program
control, Reduced Instruction Set Computer.
Micro Programmed Control: Control memory, Address sequencing, micro
program example, design of control unit.
UNIT IV: (9 Lectures)
Computer Arithmetic: Addition and subtraction, multiplication algorithms, division
algorithms, floating- point arithmetic operations.
UNIT V: (8 Lectures)
The Memory System: Memory Hierarchy, Main memory, Auxiliary memory,
Associative memory, Cache memory, Virtual memory.
UNIT VI: (8 Lectures)
Input- Output Organization: Peripheral Devices, Input- Output Interface,
Asynchronous data transfer, modes of transfer, priority interrupts, direct memory
access. Introduction to Multi Processors: Characteristics, Inter connection structures
and Cache coherency. Introduction to pipelining.
Course Outcomes:
Upon completion of this course, the students will be able to: CO 1. Understand basic structures, functions of CPU, and Input /Output organization
in computer system. CO 2. Make use of RTL for various classes of instruction types such as data
movement, arithmetic, logical and flow control and study about various control unit design
CO 3. Apply numerous algorithms to perform arithmetic operations and propose suitable hardware for them.
CO 4. Analyze and emphasize various communication media in the basic computer system using design of numerous memory structures and multiprocessor systems.
CO 5. Identify the different types of memory technologies and organization, and thereby discuss the cost-performance trade offs
Mapping of COs to POs:
POs/
COs
PO
1
PO
2
PO
3
PO
4
PO
5
PO
6
PO
7
PO
8
PO
9
PO
10
PO
11
PO
12
PSO
1
PSO
2
CO1 3 3 3 - - - - - - - - - - -
CO2 3 3 3 3 - - - - 2 2 - 3 - -
CO3 3 3 3 3 - - - - 2 2 - 3 - -
CO4 3 3 3 - - - - - 2 2 - 3 - -
CO5 3 3 3 - - - - - 2 2 - 3 - -
TEXT BOOKS: 1. M. Moris Mano, Computer System Architecture, 3rd ed, Pearson/PHI. 2. Carl Hamacher, Zvonks Vranesic, SafeaZaky, Computer Organization, 5th ed,
McGraw Hill. 3. William Stallings,Computer Organization and Architecture, 6th ed, Pearson/PHI. 4. B. Ram, Computer Fundamentals Architecture and Organization, 5th ed., New
Age International Publications. REFERENCE BOOKS: 1. Andrew S. Tanenbaum, Structured Computer Organization, 4th ed. PHI/ Pearson. 2. Sivaraama Dandamudi, Fundamentals or Computer Organization and Design,
Springer Int. Edition. 3. John L.Hennessy and David A.Patterson, Computer Organization a quantitative
approach, 4th ed, Elsevier.
DATABASE MANAGEMENT SYSTEMS
Subject Code: UGCS4T0218 L T P C
II Year / II Semester 3 0 0 3
Prerequisites: Familiarity with Data Structures, concepts of file storage and accessing. Course Objectives: Databases form the backbone of all major applications today. This course introduces relational data model, entity-relationship modeling, SQL, normalization and database design. This course would examine transaction management, concurrency control, recovery, file organizations and indexing. Syllabus: UNIT I: (10 Lectures) Introduction: Database System Applications, Database System Vs File System, View of Data, Data Abstraction, Instances and Schemas, Data Models, ER Model, Relational Model, Object Oriented Model, Semi-Structured Model, Database Access from Applications Programs, Database Users and Administrator, Database System Structure, Storage Manager, the Query Processor, History of database systems. Database Design with E-R Model: Database design, Beyond ER Design, Entities, Attributes and Entity sets, Relationships and Relationship sets, Additional features of ER Model, Conceptual Design with the ER Model. Conceptual Design for Large Enterprises.
UNIT II: (6 Lectures) Relational Model: Introduction, Integrity Constraints over relations, Enforcing Integrity constraints, Querying relational data, Logical database Design, Introduction to Views , Destroying /altering Tables and Views. Relational Algebra: Selection and Projection, Set operations, Renaming, Joins, Division, Examples of Algebra queries.
UNIT III: (9 Lectures) Form of Basic SQL Query: Examples of Basic SQL Queries, Introduction to Nested Queries, Correlated Nested Queries, Set Comparison Operators, Aggregative Operators, NULL values , Comparison using Null values, Logical connectives AND, OR and NOT, Impact on SQL Constructs , Outer Joins, Disallowing NULL values, Complex Integrity Constraints in SQL, Triggers and Active Databases. UNIT IV: (7 Lectures) Schema Refinement: Problems Caused by redundancy, Decompositions, Problem related to decomposition, Functional dependencies, Reasoning about FDS, FIRST, SECOND, THIRD Normal forms, BCNF, Lossless Join Decomposition, Dependency Preserving Decomposition, Schema Refinement in Database Design. Multivalued dependencies, Fourth normal form, Fifth normal form. UNIT V: (9 Lectures)
Transaction Management: The ACID Properties, Transactions and Schedules, Concurrent Execution of Transactions, Lock Based Concurrency Control. Concurrency Control: Serializability, and Recoverability, Introduction to Lock
Management, Dealing with Deadlocks. Concurrency Control without Locking. Crash Recovery: Introduction to ARIES, the Log, other Recovery related Structures, the Write-Ahead Log Protocol, Check pointing, Recovering from a System Crash. UNIT VI: (9 Lectures) Overview of Indexing: File organizations and Indexing, Clustered and Unclustered Indexes, Primary and Secondary Indexes, Index specification in SQL. Tree Structured Indexing: Intuitions for tree Indexes, Indexed Sequential Access Methods (ISAM), B+ Trees: Format of a Node, Search, Insert and Delete. Hash Based Indexing: Static Hashing, Extendable hashing, Linear Hashing, Extendable vs. Linear hashing. Course Outcomes:
Upon completion of this course, the students will be able to: CO1: Demonstrate the database system design and its functionality.
CO2: Utilize the knowledge of SQL and PL/SQL to construct the queries and
programmatic constructs for efficient data access and manipulation.
CO3: Inspect database problems and utilize the normalization theory to refine the
database schema.
CO4: Analyse and solve the transaction processing issues through concurrency control
and recovery mechanisms.
CO5: Illustrate different Indexing mechanisms for efficient data access.
Mapping of COs to POs:
POs/
COs
PO
1
PO
2
PO
3
PO
4
PO
5
PO
6
PO
7
PO
8
PO
9
PO
10
PO
11
PO
12
PSO
1
PSO
2
CO1 3 3 3 - - - - - - - - - - -
CO2 - 2 3 - 3 - - - - - - - - -
CO3 2 3 3 - 3 - - - - - - - - -
CO4 2 2 - - - - - - - - - - - -
CO5 2 3 - 3 - - - - - - - - - -
TEXT BOOKS:
1. Raghurama Krishnan, Johannes Gehrke, Database Management Systems, 3rd
Edition, TATA McGraw hill.
2. Silberschatz, Korth, Database System Concepts, 5th Edition,TATA McGraw hill. REFERENCE BOOKS:
1. C.J.Date, Introduction to Database Systems, 8th Edition, Pearson Education. 2. Peter ROB and Carlos Coronel, Database System Concepts, Cengage Learning. 3. Ramez Elmasri , Shamkant B. Navathe , Fundamentals of Database Systems, 5th
Edition,Pearson Education.
DESIGN AND ANALYSIS OF ALGORITHMS
Subject Code: UGCS4T0318 L T P C
II Year / II Semester 3 0 0 3
Prerequisites: Familiarity with Problem Solving Skills, Discrete Mathematics and Data
Structures.
Course Objectives: Upon completion of this course, students will be able to do
the analyze the asymptotic performance of algorithms, write precise correctness proofs
for algorithms, demonstrate a familiarity with major algorithms and data structures,
and apply important algorithmic design paradigms and methods of analysis.
Syllabus: UNIT I: (8 Lectures) Introduction: Algorithm, Pseudo Code for Expressing Algorithms, Performance
Analysis, Space Complexity, Time Complexity, Asymptotic Notation- Big Oh Notation,
Omega Notation, Theta Notation and Little Oh Notation, probabilistic analysis,
Amortized analysis.
UNIT II: (8 Lectures) Disjoint Sets: Disjoint Sets, Disjoint Set Operations, Union and Find Algorithms,
Connected Components and Bi-Connected Components. Divide and Conquer:
General method, Applications Binary Search, Quick sort, Merge Sort, Strassen‘s Matrix
Multiplication.
UNIT III: (8 Lectures) Greedy Method: General Method, Applications-Job Sequencing with Deadlines,
Knapsack Problem, Minimum Cost Spanning Trees, Single Source Shortest Path
Problem.
UNIT IV: (12 Lectures)
Dynamic Programming: General Method, Applications-Matrix Chain Multiplication,
0/1 Knapsack Problem, All Pairs Shortest Path Problem, Travelling Sales Person
Problem, Reliability Design
UNIT V: (8 Lectures) Backtracking: General Method, Applications-N-Queen Problem, Sum of Subsets
Problem, Graph Coloring, Hamiltonian Cycles. Branch and Bound: General Method,
Applications, Travelling Sales Person Problem, 0/1 Knapsack Problem, LC Branch and
Bound Solution, FIFO Branch and Bound Solution.
UNIT VI: (6 Lectures) NP-Hard and NP-Complete Problems: Basic Concepts, Non Deterministic
Algorithms, NP Hard and NP Complete Classes, Cook‘s Theorem.
Course Outcomes: Upon completion of this course, the students will be able to: CO 1. Understand the fundamentals of algorithmic design steps, performance analysis concepts and various algorithm design methods. CO 2. Apply the algorithm design techniques to design efficient algorithms for different kinds of computing problems. CO 3. Analyze the asymptotic performance of algorithms and write formal correctness proof for algorithms. CO 4. Classify a problem as computationally tractable or intractable and discuss the strategies to address intractable.
CO 5. Apply the algorithms and design techniques to solve real time problems and analyze the complexities of problems in different domains.
Mapping of Cos to Pos:
POs/
COs
PO
1
PO
2
PO
3
PO
4
PO
5
PO
6
PO
7
PO
8
PO
9
PO
10
PO
11
PO
12
PSO
1
PSO
2
CO1 3 2 2 3 2 - - - - - - 2 2 3
CO2 3 3 3 3 2 2 2 2 - - - 3 3 2
CO3 2 3 3 3 2 3 - - - - - 3 3 3
CO4 2 3 3 3 2 - - - - - - 2 2 2
CO5 3 3 3 3 3 3 2 2 2 - 2 3 3 3
TEXT BOOKS: 1. Ellis Horowitz, Satraj Sahni and Rajasekharan, Fundamentals of Computer
Algorithms, Galgotia publications Pvt. Ltd.
2. S Sridhar, Design and Analysis of Algorithms, Oxford.
3. T.H.Cormen, C.E.Leiserson, R.L.Rivest,and C.Stein, Introduction to Algorithms, 2nd
edition, Pearson Education.
REFERENCE BOOKS: 1. M.T.Goodrich, R.Tomassia, Algorithm Design: Foundations, Analysis and Internet
examples, John wiley and sons. 2. R.C.T.Lee, S.S.Tseng, R.C.Chang and T.Tsai, Introduction to Design and Analysis of
Algorithms A strategic approach, Mc Graw Hill.
3. Allen Weiss, Data structures and Algorithm Analysis in C++, Second edition,
Pearson education.
4. Aho, Ullman and Hopcroft, Design and Analysis of algorithms, Pearson education.
5. Richard Johnson Baugh and Marcus Schaefer,Algorithms –Pearson Education.
FORMAL LANGUAGES AND AUTOMATA THEORY
Subject Code: UGCS4T0418 L T P C
II Year / II Semester 3 0 0 3
Prerequisites: Familiarity with Discrete Mathematics.
Course Objectives: This course serves as an introduction to the basic theory of Computer Science & formal methods of computation which will develop an ability to design grammars and automata (recognizers) for different language classes. Syllabus: UNIT I: (8 Lectures) Fundamentals: Strings, Alphabet, Language, Operations, Chomsky Hierarchy of
Languages, Finite State Machine, Definitions, Finite Automaton Model, Acceptance
of Strings and Languages, Deterministic Finite Automaton and Non Deterministic
Finite Automaton, Transition Diagrams and Language Recognizers.
UNIT II: (8 Lectures)
Finite Automata: NFA with ɛ Transitions - Significance, Acceptance of Languages.
Conversions and Equivalence : Equivalence between NFA with and without ɛ
Transitions, NFA to DFA Conversion, Minimization of FSM, Equivalence Between Two
FSM‘s, Finite Automata With Output- Moore And Melay Machines.
UNIT III: (10 Lectures) Regular Languages: Regular Sets, Regular Expressions, Identity Rules,
Constructing Finite Automata for a given Regular Expressions, Conversion of Finite
Automata to Regular Expressions. Pumping Lemma of Regular Sets, Closure
Properties of Regular Sets (Proofs Not Required).
Grammar Formalism: Regular Grammars -Right Linear and Left Linear Grammars,
Equivalence between Regular Linear Grammar and FA, Inter-Conversion.
UNIT IV: (8 Lectures) Context Free Grammars: Context Free Grammar, Derivation Trees, Sentential Forms, Right Most and Leftmost Derivation of Strings. Ambiguity in Context Free Grammars. Minimization of Context Free Grammars. Chomsky Normal Form, Greiback Normal Form, Pumping Lemma For Context Free Languages. Enumeration of Properties Of CFL (Proofs Omitted). UNIT V: (8 Lectures) Push Down Automata: Push Down Automata, Definition, Model, Acceptance of
CFL, Acceptance by Final State and Acceptance by Empty State and Its Equivalence.
Equivalence of CFL and PDA, InterConversion. (Proofs Not Required). Introduction
to DCFL and DPDA.
UNIT VI: (8 Lectures) Turing Machine: Turing Machine, Definition, Model, Design of TM, Computable
Functions, Recursively Enumerable Languages, Church’s Hypothesis, Counter
Machine, Types of Turing Machines (Proofs Not Required), Linear Bounded
Automata and Context Sensitive Languages.
Course Outcomes: Upon completion of this course, the students will be able to: CO 1. Summarize the fundamental concepts of automata and hierarchy of formal
languages.
CO 2. Develop variants of finite automata and convert one form of automata to other form of automata.
CO 3. Construct grammars and automata for different language classes.
CO 4. Develop abstract machines that demonstrate the properties of physical machines and able to specify the possible inputs, processes and outputs of their machines.
Mapping of COs to POs :
POs/
COs
PO 1
PO 2
PO 3
PO 4
PO 5
PO 6
PO 7
PO 8
PO 9
PO 10
PO 11
PO 12
PSO1 PSO2
CO1 3 2 2 - - - - - - - - - - -
CO2 3 3 3 2 - - - - - - - - - -
CO3 3 2 3 2 - - - - - - - - - -
CO4 3 3 3 2 - - - - - - - - - -
TEXT BOOKS:
1. Hopcroft H.E, Ullman J. D ,Introduction to Automata Theory Languages and
Computation.. Pearson Education.
2. Nasir S.F.B, P.K. Srimani, A text book on Automata Theory, Cambridge University Press.
3. Sipser, Introduction to Theory of Computation, Second Edition. REFERENCE BOOKS: 1. Daniel I.A. Cohen, Introduction to Computer Theory, John Wiley. 2. John C Martin, Introduction to languages and the Theory of Computation , TMH 3. Lewis H.P. & Papadimition C.H ,Elements of Theory of Computation,
Pearson/PHI. 4. Mishra and Chandrashekaran Theory of Computer Science – Automata
Languages and Computation, 2nd Edition, PHI.
SOFTWARE ENGINEERING Subject Code: UGCS4T0518 L T P C
II Year / II Semester 3 0 0 3
Prerequisites: Basic concepts of programming and algorithm design. Course Objectives: This course enables the learners to have exposure towards software development life cycle and its phases. It focuses on various principles and methods related to identifying project requirements, transforming requirements into design, product development models, product testing and deployment. Learners will get exposure to various real time practices and approaches of the software industry through this course. Syllabus: UNIT I: (6 Lectures) Introduction to Software Engineering: The evolving role of software, Changing Nature of Software, Software myths. The software problem: Cost, schedule and quality, Scale and change.
UNIT II: (10 Lectures) Software Process: Process and project, component software process, Software development process models : Waterfall model, prototyping, iterative development, relational unified process, time boxing model, Extreme programming and agile process, using process models in a project, Project management process.
UNIT III: (8 Lectures)
Software requirement analysis and specification: Value of good SRS, requirement process, requirement specification, functional specifications with use-cases, other approaches for analysis, validation. UNIT IV: (8 Lectures)
Planning a software project: Effort estimation, project schedule and staffing, quality planning, risk management planning, project monitoring plan, detailed scheduling.
UNIT V: (10 Lectures)
Software Architecture and Design: Role of software architecture, architecture views, components and connector view, architecture styles for C & C view, documenting architecture design, evaluating architectures. Characteristics of Good Design, Design Principles, Modular Design, Design Methodologies, Detailed design, Design Verification. UNIT VI: (8 Lectures) Software Implementation and Testing: Structured coding Techniques, Coding Styles, Standards and Guidelines, Documentation Guidelines, Software Quality, CMM Levels, Testing Concepts, Testing Process, Black-Box and White- Box Testing Techniques, Art of Debugging.
Course Outcomes: Upon completion of this course, the students will be able to: CO 1. Interpret the basic principles of software development and process models in
its life cycle. CO 2. Construct the software requirements specifications with relevant use-cases. CO 3. Identify the project management strategies and various components to build
the architecture using suitable design strategies. CO 4. Classify best coding standards and testing strategies to develop high-quality
software products. Mapping of COs to POs: POs/ COs
PO 1
PO 2
PO 3
PO 4
PO 5
PO 6
PO 7
PO 8
PO 9
PO 10
PO 11
PO 12
PSO 1
PSO 2
CO1 3 - 3 - - 2 - - - - - 2 - -
CO2 2 - 2 - 2 2 - - 2 2 - 2 - -
CO3 3 - 3 - 2 2 - - 2 2 3 2 - -
CO4 2 - 2 - 2 2 - - - - - 2 - -
TEXT BOOKS:
1. Pankaj Jalote, A Concise Introduction to Software Engineering (Undergraduate Topics in Computer Science), Springer International Edition.
2. Roger S Pressman, “Software Engineering – A Practitioner’s Approach”, 7th Edition, McGrawHill.
3. Ugrasen Suman, Software Engineering Concepts and Practices, Cengage Learning Publications.
4. Ian Sommerville, “Software Engineering”, 9th Edition, Pearson Education.
REFERENCE BOOKS:
1. K.K.Agarwal & Yogesh Singh. Software Engineering, New Age International Publishers.
2. Rajesh Naik and Swapna Kishore: Software Requirements and Estimation, 1st edition, Tata Mc Graw Hill.
3. Waman S Jawadekar , Software Engineering Principles and Practice, Tata Mc Graw Hill.
DATABASE MANAGEMENT SYSTEMS LAB
Subject Code: UGCS4P0618 L T P C
II Year / II Semester 0 0 3 1.5
Prerequisites: Basic knowledge in Programming. Course Objectives:
The major objective of the DBMS lab is to provide a strong formal foundation in database concepts, technology and practice to the participants to groom them into well-informed database application developers. List of Experiments: Experiment 1: Working with ER Diagram Example: ER Diagram for Sailors Database Entities:
1. Sailor 2. Boat
Relationship: Reserves Primary Key Attributes:
1. SID (Sailor Entity) 2. BID (Boat Entity)
Experiment 2: Working with DDL, DML, DCL and Key Constraints Creating, Altering and Dropping of Tables and Inserting Rows into a Table (Use Constraints While Creating Tables), Examples using Select command. Experiment 3: Working with Queries and Nested Queries Queries (along with sub Queries) using ANY, ALL, IN, EXISTS, NOTEXISTS, UNION, INTERSECT and Constraints. Experiment 4: Working with Queries using Aggregate Operators & Views Queries using Aggregate Functions (COUNT, SUM, AVG, MAX and MIN), GROUP BY, HAVING, Creation and Dropping of Views. Experiment 5: Working with Conversion Functions & String Functions Queries using Conversion Functions (to_char, to_number and to_date), String Functions (Concatenation, lpad, rpad, ltrim, rtrim, lower, upper, initcap, length, substr and instr), Date Functions (Sysdate, next_day, add_months, last_day, months_between, least, greatest, trunc, round, to_char, to_date). Experiment 6: Working with Triggers using PL/SQL Develop programs using BEFORE and AFTER Triggers, Row and Statement Triggers and INSTEAD OF Triggers. Experiment 7: Working with PL/SQL Procedures Develop programs using Procedures, passing Parameters IN and OUT of Procedures. Experiment 8: Working with Loops using PL/SQL and Exception Handling
Develop programs using WHILE loops, FOR loops, Nested loops using ERROR handling, BUILT-IN Exceptions, USER defined Exceptions, and RAISE_APPLICATION_ERROR. Experiment 9: Working with Functions using PL/SQL Develop programs using stored Functions, invoke Functions in SQL statements and write complex Functions. Experiment 10: Working with Cursors using PL/SQL Develop programs using Cursors, parameters in a Cursor, FOR UPDATE Cursor, WHERE CURRENT OF clause and Cursor variables. Course Outcomes: Upon completion of this course, the students will be able to:
CO 1. Demonstrate the database design using ER Diagrams.
CO 2. Develop SQL Queries to manipulate the data in the database.
CO 3. Inspect and handle errors using exception handling mechanism.
CO 4. Apply Procedural Language constructs to execute block of SQL statements.
Mapping of COs to POs:
POs/ COs
PO 1
PO 2
PO 3
PO 4
PO 5
PO 6
PO 7
PO 8
PO 9
PO 10
PO 11
PO 12
PSO 1
PSO 2
CO1 3 2 2 2 - - - 3 3 3 - - - -
CO2 3 2 - 3 3 - - 3 3 3 - - - -
CO3 3 - - - 3 - - 3 3 3 - - - -
CO4 2 - 2 2 3 - - 3 3 3 - - - -
TEXT BOOKS: 1. Benjamin Rosenzweig, Elena Silvestrova Rakhimov, Oracle PL/SQL by Example,
3rd Edition,Pearson Education. 2. Scott Urman, Ron Hardman,Michael Mclaughlin,Oracle Database 10G PL/SQL
Programming, Tata Mc-Graw Hill. 3. Dr .P.S. Deshpande,SQL and PL/SQL for Oracle 11g, Black Book.
OBJECT ORIENTED ANALYSIS AND DESIGN LAB
Subject Code: UGCS4P0718 L T P C
II Year / II Semester 2 0 3 3.5
Prerequisites: Basic understanding of Software Engineering and Object Oriented
Programming paradigms.
Course Objectives: The focus of the course is to give basic knowledge on the
concepts of Object Oriented Analysis & Design and provide deep insight into the
importance of Modeling in Software Development Life Cycle. It will facilitate the
students to learn Unified Modeling Language that enables to create UML Diagrams
to visualize, specify, construct, and document the artifacts of a real world software
intensive system in Multiple Views.
List of Case Studies: 1) ATM System 2) Online Reservation System 3) Online Quiz System 4) Banking System 5) Stock Maintenance System 6) Student Marks Analysis System 7) Course Registration System 8) Library Management System 9) Real-time Scheduler List of Experiments: 1) Draw Use case diagrams for all case studies. 2) Draw Class diagrams for all case studies. 3) Draw Object diagrams for all case studies. 4) Draw Sequence diagrams for all case studies. 5) Draw Collaboration diagrams for all case studies. 6) Draw Activity diagrams for all case studies. 7) Draw State chart diagrams for all case studies. 8) Draw Component diagrams for all case studies. 9) Draw Deployment diagrams for all case studies. Course Outcomes: Upon completion of this course, the students will be able to: CO 1. Interpret software requirements of various real-time applications. CO 2. Construct structural elements of the application in terms of object-oriented-
design. CO 3. Classify the modelling of interaction diagrams of the application to represent
functionalities of a software system.
Mapping of COs to POs:
POs/ COs
PO 1
PO 2
PO 3
PO 4
PO 5
PO 6
PO 7
PO 8
PO 9
PO 10
PO 11
PO 12
PSO 1
PSO 2
CO1 3 3 3 - 3 2 - 3 3 3 - 2 - -
CO2 3 3 3 - 3 2 - 3 3 3 - 2 - -
CO3 3 3 3 - 3 2 - 3 3 3 - 2 - -
TEXT BOOKS: 1. Grady Booch, James Rumbaugh, Ivar Jacobso, The Unified Modeling Language
User Guide, Pearson Education. REFERENCE BOOKS: 1. Meilir Page-Jones, Fundamentals of Object-oriented Design in UML,
Pearson Education. 2. Martina Seidl, Marion Scholz, Christian Huemer, Gerti Kappel,
UML@Classroom - An introduction to Object-Oriented Modeling, Springer.
MINI PROJECT-1
Subject Code: UGCS4J0818 L T P C
II Year / II Semester 0 1 2 2
Course Objectives :
Mini project will let the students apply the programming knowledge into a real world
situation or problem and expose the students to how programming skill will help
them develop a product.
Guidelines/Instructions :
Group of students can form as a team and the team has to submit the Mini Project
abstract to the Project Coordinator by consulting with the guide at the beginning of
the semester.
The team has to implement the Mini Project and submit the Mini Project report in
the prescribed format at the end of the semester to the department. The Viva–Voce
shall be conducted along with respective semester lab external examinations.
Course Outcomes:
Upon completion of this course, the students will be able to:
CO 1. Aquire practical knowledge within the chosen area of technology for project
development.
CO 2. Identify, analyse, formulate and handle projects with a systematic approach.
CO 3. Contribute as an individual or in a team in development of technical projects.
CO 4. Develop effective communication skills for presentation of project related
activities.
Mapping of COs to POs:
POs/ COs
PO 1
PO 2
PO 3
PO 4
PO 5
PO 6
PO 7
PO 8
PO 9
PO 10
PO 11
PO 12
PSO 1
PSO 2
CO1 3 3 3 3 3 3 3 - - - 3 3 3 -
CO2 3 2 3 3 3 3 3 3 - - 3 - 3 -
CO3 - - - - 3 2 2 3 3 3 3 3 3 -
CO4 - - - - - - - 3 3 3 - 3 - -
Effective Technical Communication
Subject Code: UGBS4A0318 L T P C
II Year / II Semester 2 0 0 0
COURSE OBJECTIVES:
To expose students to different contexts through right vocabulary.
To inculcate the habit of reading and understanding any text.
To enable students to acquire the ability of writing for business purposes.
To enable students to acquire interview skills and group discussion dynamics.
UNIT I: (2 sessions)
Selected High GRE Words, Idioms & Phrases – Discourse Skills – using visuals –
Synonyms and antonyms, word roots, one word substitutes, prefixes and suffixes,
study of word origin, business vocabulary, analogy, idioms and phrases, collocations
& usage of vocabulary.
UNIT II: (2 sessions)
Reading Comprehension – General Vs Local Comprehension, reading for facts,
guessing meanings from context, scanning, skimming, inferring meaning.
UNIT III: (2 sessions)
Writing Skills – Structure of Resume writing – Portfolio writing –Short Report Writing
Business/Technical).
UNIT IV:
Presentations (Technical).
UNIT V: (2 sessions)
Group Discussion – Dynamics of Group Discussion, Intervention, summarizing,
modulation of voice, body language, relevance, fluency and organization of ideas
and rubrics for evaluation.
UNIT VI: (3 sessions)
Interview Skills – Concept and process – pre-interview planning, opening strategies,
answering strategies, interview through teleconference & video-conference and
mock interviews.
COURSE OUTCOMES:
Upon completion of this course, the students will be able to: CO 1. Develop skills in analogy, a wide range of vocabulary including business
vocabulary for academic purpose. CO 2. Analyze various types of reading comprehension through different methods of
reading. CO 3. Construct resumes, portfolio writing and short business/technical
reports. CO 4. Make use of skills through presentations, rubrics of group discussion and
Interview skills through teleconference, video conference and mock interviews.
Mapping of COs to POs:
POs/
COs PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO1 - - - - - - - - 3 3 - 3
CO2 - - - - - - - - 3 3 - 3
CO3 - - - - - - - - 3 3 - 3
CO4 - - - - - - - - 3 3 - 3
SUGGESTED SOFTWARE:
1. K-Van solutions Software with CD 2. The Rosetta stone English library. 3. Clarity pronunciation power –part I. 4. Oxford advanced learner’s compass, 7th Edition. SUGGESTED READING: 1. Technical Communication by Meenakshi Raman & Sangeeta Sharma, Oxford
University Press 2009. 2. Business and Professional Communiction: Keys for Workplace Excellence. Kelly
M.Quintanilla & Shawn T. Wahl. Sage South Asia Edition. Sage Publications. 2011.
3. English Vocabulary in Use Series, Cambridge University Press 2008. 4. Communication Skills by Leena Sen, PHI Learning Pvt. Ltd., New Delhi, 2009. 5. A Course Book of Advanced Communication Skills Lab published by University
Press, Hyderabad.
COMPILER DESIGN
Subject Code: UGCS5T0118 L T P C
III Year / I Semester 3 0 0 3
Prerequisites: Familiarity with Formal Languages and Automata Theory, and Data
Structures.
Course Objectives: This course introduces the basic principles of compiler and depicts the phases of the compilation process with implementation approach of each phase. Syllabus: UNIT I: (8 Lectures) Overview of language processing, pre-processors, compiler, assembler, interpreters, pre-processors, linkers & loaders, structure of a compiler, phases of a compiler, Lexical Analysis, Role of Lexical Analysis, Lexical Analysis Vs Parsing, Token, patterns and Lexemes, Lexical Errors, Regular Expressions, Regular definitions for the language constructs, Strings, Sequences, Comments, Transition
diagram for recognition of tokens, Reserved words and identifiers, Examples.
UNIT II: (8 Lectures) Syntax Analysis, discussion on CFG, LMD,RMD, parse trees, Role of a parser, classification of parsing techniques, Brute force approach, left recursion, left factoring, Top down parsing, First and Follow, LL(1) Grammars, Non-Recursive predictive parsing, Error recovery in predictive parsing. UNIT III: (10 Lectures) Bottom up parsing, Types of Bottom up approaches, Introduction to simple LR, Why LR Parsers, Model of LR Parsers, Operator Precedence, Shift Reduce Parsing, Difference between LR and LL Parsers, Construction of SLR Tables,More powerful LR parses, construction of CLR (1), LALR Parsing tables, Dangling ELSE Ambiguity, Error recovery in LR Parsing, Comparison of all bottom up approaches with all top down approaches. UNIT IV: (8 Lectures) Semantic analysis, SDT Schemes, evaluation of semantic rules. Intermediate code, three address code, quadruples, triples, abstract syntax trees. Types and declarations, type Checking. UNIT V: (8 Lectures) Symbol tables: use and need of symbol tables. Runtime Environment: storage organization, stack allocation, access to non-local data, heap management, parameter passing mechanisms, introduction to garbage collection, Reference counting garbage collectors. Code generation: Issues, target language, Basic blocks & flow graphs, Simple
code generator, Peephole optimization, Register allocation and assignment.
UNIT VI: (8 Lectures) Machine independent code optimization, semantic preserving transformations, global common sub expression elimination, copy propagation, dead code elimination, constant folding, strength reduction, loop optimization. Instruction scheduling, inter procedural optimization. Course Outcomes:
Upon the completion of the course, the students will be able to:
CO 1 Demonstrate an understanding of the design of a compiler including its
phases and components.
CO 2 Distinguish the lexical, syntactic and semantic analysis into meaningful
phases for a compiler to undertake language translation.
CO 3 Analyze the runtime structures used to represent language constructs and
typical programming languages.
CO 4 Analyze the techniques used for intermediate code generation and
optimization.
CO 5 Apply appropriate parsing techniques to design a parser for the given
language.
Mapping of COs to POs:
POs/
COs
PO
1
PO
2
PO
3
PO
4
PO
5
PO
6
PO
7
PO
8
PO
9
PO
10
PO
11
PO
12
PSO
1
PSO
2
CO1 3 2 3 3 2 - - - - - - - - -
CO2 3 2 3 2 2 - - - - - - - - -
CO3 3 2 3 2 - - - - - - - - - -
CO4 3 2 3 2 - - - - - - - - - -
CO5 3 3 3 2 2 - - - - - - - - -
TEXT BOOKS: 1. Alfred V Aho, Monica S Lam, Ravi Sethi, Jeffrey D. Ullman ,Compilers Principles
Techniques and Tools-,2nd ed, Pearson. 2. Kenneth C Louden, Compiler construction, Principles and Practice, CENGAGE. REFERENCE BOOKS: 1. K. Muneeswaran, Compiler Design, Oxford. 2. Keith D.Cooper & Linda Torczon, Engineering a compiler, 2nd edition, Morgan
Kaufman. 3. http://www.nptel.iitm.ac.in/downloads/106108052/ 4. V. Raghavan, Principles of compiler design, 2nd ed, TMH. 5. Yunlinsu, Implementations of Compiler, A new approach to Compilers including
the algebraic methods, SPRINGER.
COMPUTER NETWORKS
Subject Code: UGCS5T0218 L T P C
III Year / I Semester 3 0 0 3
Prerequisites: Familiarity with Computer Organization and Architecture.
Course Objectives: Students will be able to master in the computer network terminology and concepts of the OSI model and the TCP/IP model, summarize with wired and wireless networking concepts and routing protocols, and solve current issues in networking technologies.
Syllabus: UNIT I: (8 Lectures) Data Communication: Components, Representation of data and its flow, Networks, Various connection topologies, Protocols and Standards, OSI model, TCP/IP Model. Physical Layer: Guided media (copper, twisted pair, coaxial, fiber optic cable), Unguided media (Electromagnetic spectrum). Data performance, Multiplexing- Frequency division, Time division. UNIT II: (9 Lectures) Data Link Layer: Framing methods, Error Detection and Error Correction - Fundamentals, Block coding, Hamming code, CRC, Checksum, Flow Control and Error control. Wired LANs, Wireless LANs, Bridge, Switch. UNIT III: (8 Lectures) Medium Access Sub Layer: Protocols - Stop and Wait, Go back – N ARQ, Selective Repeat ARQ, Sliding Window, Piggybacking, Random Access, Multiple access protocols -Pure ALOHA, Slotted ALOHA, CSMA/CD, CDMA/CA, bridges. UNIT IV: (8 Lectures) Network Layer: Switching, Logical addressing – IPV4, IPV6; Address mapping –
ARP, RARP, BOOTP and DHCP–Delivery, ICMP, Routing algorithms - shortest path
routing, Flooding, Hierarchical routing, Broadcast routing, Multicast and distance
vector routing, Firewall.
UNIT V: (8 Lectures) Transport Layer: Process to Process Communication, User Datagram Protocol (UDP), Transmission Control Protocol (TCP), SCTP Congestion Control; Quality of Service, QoS improving techniques: Leaky Bucket and Token Bucket algorithm. UNIT VI: (9 Lectures) Application Layer: Domain Name Space (DNS), TELNET(Remote Login), EMAIL(SMTP,POP3), File Transfer Protocol (FTP), HTTP.
Course Outcomes: Upon completion of this course, the students will be able to: CO 1. Explain the principles of networking protocols and standards; and Identify
different concepts of layered architectures in networking. CO 2. Identify the design issues and Classify the different framing methods and
various multiple access protocols. CO 3. Compare and contrast the different routing algorithms to analyze the
optimum routing path. CO 4. Describe the functionality of transport layer and to demonstrate how to
control the congestion. CO 5. Illustrate some basic tools/utilities for network analysis and Employ basic
techniques and protocols to connect devices. Mapping of COs to POs:
POs/
COs PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9
PO
10
PO
11
PO
12 PSO1 PSO2
CO1 3 2 3 3 3 2 3 - - - - 3 2 3
CO2 3 3 2 3 2 3 2 - - - - 2 2 2
CO3 3 3 3 3 3 3 2 - - - - 3 3 3
CO4 3 3 3 3 2 2 3 - - - - 2 3 2
CO5 3 3 3 3 3 3 2 2 2 3 3 3 3 3
TEXT BOOKS: 1. Andrew S. Tanenbaum, Computer Networks, 8th Edition, Pearson New
International Edition. 2. Behrouz A. Forouzan, Data Communication and Networking, 4th Edition, McGraw-
Hill. REFERENCE BOOKS: 1. William Stallings, Data and Computer Communication, 8th Edition, Pearson
Prentice Hall India. 2. Douglas Comer, Internetworking with TCP/IP, Volume 1, 6th Edition, Prentice Hall
of India. 3. W. Richard Stevens, TCP/IP Illustrated, Volume 1, Addison-Wesley, United States
of America.
MICROPROCESSORS AND MICROCONTROLLERS
Subject Code: UGCS5T0318 L T P C
III Year / I Semester 3 0 0 3
Prerequisites: Familiarity with Digital Electronics and Computer Organization.
Course Objectives: The Students will gain the knowledge of 8086 microprocessor
architecture, functionalities and exposure towards instruction set of 8086. Develop
application programs for 8086 microprocessor and interrupt service routines, as well
as data processing tasks and its applications. Gain the knowledge of 8051
microcontroller and its programming.
SYLLABUS:
UNIT I: (8 lectures)
Overview of microcomputer structure and operation: execution of a three
instruction program, microprocessor evolution and types, the 8086 micro processor
family , 8086 internal architecture, introduction to programming the 8086.
8086 family assembly language programming: Program development steps,
constructing the machine codes for 8086 instructions, writing programs for use with
an assembler, assembly language program development tools.
UNIT II: (8 lectures)
Implementing standard program structures in 8086 assembly language:
Simple sequence programs, jumps, flags and conditional jumps, if-then, if-then-else
and multiple if-then-else programs, while-do programs, repeat-until programs,
instruction timing and delay loops.
UNIT III: (8 lectures)
Strings, procedures and macros: The 8086 string instructions, writing and using
procedures, writing and using assembler macros.
8086 instruction descriptions and assembler directives : Instruction
descriptions, assembler directives , DB, DD, DQ, DT, DW, end-program, endp, ends,
equ ,even-align on even memory address, extrn , global, public / extrn, group,
include, label, length- not implemented IBM MASM, name – off set, ORG, proc, ptr,
segment, short, type.
UNIT IV: (10 lectures)
8086 interrupts and interrupt applications: 8086 interrupts and interrupt
responses, hardware interrupt applications, Software Interrupts, priority of
interrupts, software interrupt applications, programming.
8086 assembly language programs - Bit & Logic operations, strings, procedures,
Macros, Number Format, Conversions, ASCII operations, signed Numbers Arithmetic,
Programming using High level language constructs.
UNIT V: (8 lectures)
8051 Microcontroller: Introduction to microcontrollers, Understand the basic
building blocks of microcontroller, CISC and RISC processors, Harvard and Von
Neumann architectures, 8051 Microcontroller architecture. Pin description, Memory
organization, Register organization of 8051.
UNIT VI: (8 lectures)
Programming with 8051 Microcontroller: Addressing modes of 8051,
Instruction set of 8051, Interrupts, timers & counters, serial communication,
Interrupt structure of 8051, Basic Assembly language programs.
Course Outcomes:
Upon completion of this course, the students will be able to: CO 1. Recall and apply a basic concept of digital fundamentals to Microprocessor
based personal computer system.
CO 2. identify a detailed s/w & h/w structure of the Microprocessor.
CO 3. illustrate how Arithmetic, Logical and modular programming work in
Microprocessors.
CO 4. Distinguish and analyze the properties of Microprocessors & Microcontrollers.
CO 5. Analyze the data transfer information and interrupts of Microcontrollers.
Mapping of COs to POs:
POs/ COs
PO 1
PO 2
PO 3
PO 4
PO 5
PO 6
PO 7
PO 8
PO 9
PO 10
PO 11
PO 12
PSO 1
PSO 2
CO1 3 3 3 - 3 - - - - - - - - -
CO2 3 3 3 - 3 - - - - - - - - -
CO3 3 3 3 - 3 - - - - - - - - -
CO4 3 3 3 - 3 - - - - - - - - -
CO5 3 3 3 - 3 - - - - - - - - -
TEXT BOOKS:
1. Douglas V Hall, Microprocessors and Interfacing, Revised 2nd ed, TMH.
2. Barry Bray,The Intel Microprocessors, Architecture, programming and interfacing,
8th ed, Pearson.
3. Lyla B Das, The X86 Microprocessors, architecture, Programming and Interfacing
(8086 to Pentium), PEA.
4. AJAY V Deshmukh, Microcontroller, TATA McGraw Hill publications.
REFERENCE BOOKS:
1. Walter A Triebel, Avtar Singh, The 8088 and 8086 Microprocessors, Programming, Interfacing, Hardware and Applications,4th ed,Pearson.
2. Liu,Micro Computer System 8086/8088 Family Architecture, Programming and Design, Prentice Hall.
3. Muhammad Ali Mazdi, 8051 Microcontrollers & Embedded Systems, Pearson
Education.
OPERATING SYSTEMS
Subject Code: UGCS5T0418 L T P C
III Year / I Semester 3 0 0 3
Prerequisites: Familiarity with Data Structures and Computer Organization & Architecture. Course Objectives: The course teaches the basic operating system abstractions, mechanisms, and their implementations. The core of the course contains concurrent programming (threads and synchronization), inter process communication. Also, gives insight to the concepts including file systems, virtual memory and disk management.
Syllabus:
UNIT I: (9 lectures)
Introduction: Concept of Operating Systems, Operating Systems Objectives and
Functions, Generations of Operating systems, Types of Operating Systems, OS
Services, System Calls, Structure of an OS - Layered, Case study on UNIX and
WINDOWS Operating System.
UNIT II: (8 lectures)
Process Management: Process concept, process scheduling, operations, inter
process communication, Multi Thread programming model, Process scheduling
criteria and algorithms (FCFS, SJF, Priority, RR, Multilevel queue Scheduling), and
their evaluation.
UNIT III: (8 lectures)
Process synchronization: the critical- section problem, Peterson’s Solution,
synchronization Hardware, semaphores, classic problems of synchronization,
monitors, Producer Consumer problem, Readers & Writers Problem, Dining
Philosopher Problem.
UNIT IV: (8 lectures)
Deadlocks: Definition, Necessary and sufficient conditions for Deadlock, Deadlock
Prevention, Deadlock Avoidance: Banker’s algorithm, Deadlock detection and
Recovery.
UNIT V: (8 lectures) Memory Management : Swapping, contiguous memory allocation, paging, structure of the page table, segmentation, Virtual memory, demand paging, page replacement algorithms, allocation of Frames, Thrashing. UNIT VI: (8 lectures) File Management: Concept of File, Access methods, File types, File operation, Directory structure, File System structure, Allocation methods (contiguous, linked,
indexed), Free-space management (bit vector, linked list, grouping), directory implementation (linear list, hash table), efficiency and performance. Disk Management: Disk structure, Disk scheduling - FCFS, SSTF, SCAN, C-SCAN,
Disk reliability, Disk formatting, Boot-block, Bad blocks.
Course Outcomes: Upon completion of the course the students able to:
CO 1. Understand the fundamental concepts of operating systems and its services.
CO 2. Demonstrate the principles of process management and analyze performance of process scheduling algorithms.
CO 3. Illustrate the importance of process coordination and solve process synchronization problems to avoid deadlocks.
CO 4. Analyze various memory allocation and access time by making use of
various memory management techniques.
Mapping of COs to POs:
POs/
COs
PO
1
PO
2
PO
3
PO
4
PO
5
PO
6
PO
7
PO
8
PO
9
PO
10
PO
11
PO
12
PSO
1
PSO
2
CO1 3 3 - - - - - - - - - - - -
CO2 3 3 3 - - - - - - - - - - -
CO3 3 3 3 3 - - - - - - - 3 - -
CO4 3 3 3 3 - - - - - - - 3 - -
TEXT BOOKS: 1. Abraham Silberchatz, Peter B. Galvin, Greg Gagne, Operating System Concepts,
9th edition, John Wiley. 2. Stallings, Operating Systems-Internal and Design Principles, 6th edition, Pearson
education. REFERENCE BOOKS: 1. http://nptel.iitm.ac.in/courses/Webcourse-contents/IISc-
BANG/Operating%20Systems /New_index1.html
2. D.M.Dhamdhere, Operating systems- A Concept based Approach, 2ndedition,
TMH.
3. Crowley, Operating System A Design Approach, 1st edition, TMH.
4. Andrew S Tanenbaum, Modern Operating Systems, 3rd edition, PHI.
5. Gary J. Nutt, Operating Systems: A Modern Perspective, 2nd Edition, Addison-
Wesley.
ADVANCED DATABASES
(Professional Elective-I)
Subject Code: UGCS5T0518 L T P C
III Year / I Semester 3 0 0 3
Prerequisites: Familiarity with Database Management Systems.
Course Objective: The objective of this course presents new developments in
database technology and summarizes the impact of emerging database standards
and introduces Distributed databases to implement emerging technologies and
applications.
Syllabus:
UNIT I: (7 Lectures)
Query Processing and Optimization: Translating SQL Queries into Relational
Algebra, Basic Algorithms for Executing Query Operations, Query Optimization Using
Heuristics, Using Selectivity and Cost Estimates, Semantic Query Optimization.
UNIT II: (7 Lectures)
Database Recovery Techniques: Recovery Techniques Based on Deferred
Update, Immediate Update, Shadow Paging, Aries Recovery Algorithm, Recovery in
Multidatabase Systems, Database Backup And Recovery From Catastrophic Failures.
Database Security and Authorizations: Discretionary Access Control Based on
Privileges, Mandatory Access Control for Multilevel Security, Statistical Database
Security.
UNIT III: (9 Lectures)
Concepts for Object Oriented Database: Overview, Object identity, Structure
and Type Constructors, Encapsulation of Operations, Methods and Persistence. Type
Hierarchies and Inheritance, Complex Objects. Object Database Standards
Languages and Design: Overview of ODMG, Object Definition Language, Object
Query Language, C++ Language Binding, Object Database Conceptual Design,
Examples of ODBMS.
UNIT IV: (9 Lectures)
Distributed DBMS Architecture: DBMS Standardization, Architectural Model,
DDBMS Architecture, Global Directory Issues. Distributed Database Design:
Alternative Design Strategies, Distribution Design Issues, Fragmentation, Allocation.
Semantic Data Control: View Management, Data Security, Semantic Integrity
Control.
UNIT V: (9 Lectures)
Overview of Query Processing: Query Processing Problem, Objectives,
Complexity of Relational Algebra, Characterization of Query Processors, Layers of
Query Processing. Query Decomposition and Data Localization, Optimization
of Distributed Queries: Query Optimization, Centralized Query Optimization, Join
Ordering in Fragment Queries, Distributed Query Optimization Algorithms.
UNIT VI: (9 Lectures)
Introduction to Transaction Management: Definition, Properties and Types of
Transactions, Architecture. Distributed Concurrency Control: Serializability
Theory, Taxonomy of Concurrency Control Mechanisms, Locking Based Concurrency
Control, Time-Stamp Based, Optimistic Algorithms, Deadlock Management and
Relaxed Concurrency Control.
Course Outcomes:
Upon completion of this course, the students will be able to: CO1: Apply query evaluation and query optimization techniques.
CO2: Propose, implement and maintain database security mechanisms.
CO3: Identify, describe and categorize database objects.
CO4: Design transaction processing system with concurrency control.
Mapping of COs to POs:
POs/
COs
PO
1
PO
2
PO
3
PO
4
PO
5
PO
6
PO
7
PO
8
PO
9
PO
10
PO
11
PO
12
PSO
1
PSO
2
CO1 3 3 3 2 - - - - - - - 3 -
CO2 3 2 3 - - - - - 2 - - - - 2
CO3 3 3 2 - - - 2 - - - - 2 -
CO4 3 3 2 3 2 - - 2 - - - - - 2
TEXT BOOKS:
1. Elmasri Ramez & Navathe Shamkant ,Fundamentals of Database Systems,3rd
Edition, Addison-Wesley-Longman.
2. Ozsu,M.Tamer,Valduriez& Patrick,Principles of Distributed database systems, 2nd
Edition, Pearson.
REFERENCE BOOKS:
1. Fred R.McFadden, Jeffrey A.Hoffer, Mary B.Prescott, Modern Database
Management, 5th Edition, Addison Wesley .
2. Raghuramakrishnan, Johannes Gehrke, Database Management Systems, 3rd
edition, Mc Graw Hill Education.
COMPUTER GRAPHICS
(Professional Elective-I)
Subject Code: UGCS5T0618 L T P C
III Year / I Semester 3 0 0 3
Prerequisites: Basic knowledge in Mathematics and Computer Organization.
Course Objectives: The objective of this course presents the basic concepts, the
tasks of computer graphics and its main algorithms and models. The course
examines the principles of functioning of graphic devices and the various limitations,
description of the geometric objects and their presentation in the computer, the
main functions of graphics package.
Syllabus:
UNIT I: (7 Lectures) Introduction: Application areas of Computer Graphics. Overview of graphics systems: video-display devices, raster-scan systems, random scan systems, graphics monitors and work stations, input devices. UNIT II: (8 Lectures) Output primitives: Points and lines, line drawing algorithms, mid-point circle algorithm, Bresenham's circle algorithm and midpoint ellipse algorithms. Filled area primitives: Scan line polygon fill algorithm, boundary-fill algorithm, flood-fill algorithms, Inside-outside tests.
UNIT III: (9 Lectures) 2-D geometric transformations: Translation, scaling, rotation, reflection and shear transformations, matrix representations and homogeneous coordinates, composite transformations, Other transformations, transformations between coordinate systems, affine transformations. 2-D viewing: The viewing pipeline, viewing coordinate reference frame, window to view-port coordinate transformation, viewing functions, Cohen-Sutherland and Cyrus-beck line clipping algorithms, Sutherland –Hodgeman polygon clipping algorithm. UNIT IV: (10 Lectures) 3-D object representation: Polygon surfaces, quadric surfaces, spline representation, Hermite curve, Bezier curve and B-Spline curves, Bezier and B-Spline
surfaces.
UNIT V: (7 Lectures) 3-D geometric transformations: Translation, rotation, scaling, reflection and shear transformations, composite transformations. 3-D viewing: Viewing pipeline, viewing coordinates, projection, view volumes and general projection
transformations and clipping.
UNIT VI: (8 Lectures)
Visible surface detection methods: Classification, back-face detection, depth-
buffer, A-buffer, scan-line, depth sorting, BSP-tree, area sub-division, octree and
ray-casting methods. Computer animation: Design of animation sequence,
general computer animation functions, raster animation, computer animation
languages, key frame systems, motion specifications.
Course Outcomes:
Upon completion of this course, the students will be able to: 1. Understand the graphical system by explaining various concepts and algorithms.
2. Analyze the relationship between algebra and geometry for developing
computational algorithms.
3. Compare various visible surface detection methods and apply the algorithms to
create an animated graphical display.
Mapping of COs to POs:
POs/
COs
PO
1
PO
2
PO
3
PO
4
PO
5
PO
6
PO
7
PO
8
PO
9
PO
10
PO
11
PO
12
PSO
1
PSO
2
CO1 3 2 - - - - - - - - - - - -
CO2 3 3 3 2 - - - - 2 2 - 2 - -
CO3 3 2 3 3 3 - - - - - - - 2 3
TEXT BOOKS:
1. Donald Hearn and M.Pauline Baker, Computer Graphics C version, 2nd edition,
Pearson Education.
2. Foley, VanDam, Feiner and Hughes, Computer Graphics Principles & practice,
second edition in C, Pearson Education.
REFERENCE BOOKS:
1. Neuman and Sproul, Principles of Interactive Computer Graphics, TMH.
2. Steven Harrington, Computer Graphics,TMH.
ARTIFICIAL INTELLIGENCE
(PROFESSIONAL ELECTIVE–I)
Subject Code: UGCS5T0718 L T P C
III Year / I Semester 3 0 0 3
Prerequisites: Familiarity with Discrete Mathematics, Linear Algebra and
Probability.
Course Objectives: The objective of the course is to present an overview of artificial intelligence principles and approaches.
Syllabus:
UNIT I: (7 Lectures)
Introduction to artificial intelligence: Introduction, history, intelligent systems,
foundations of AI, applications, tic-tac-toe game playing, development of AI
languages, current trends in AI. Problem solving: state-space search and
control strategies: Introduction, general problem solving, characteristics of
problem.
UNIT II: (9 Lectures)
Search Strategies: exhaustive searches, heuristic search techniques, iterative-
deepening a*, constraint satisfaction. Problem reduction and game playing:
Introduction, problem reduction, game playing, alpha-beta pruning, two-player
perfect information games.
UNIT III: (10 Lectures)
Logic concepts: Introduction, propositional calculus, proportional logic, natural
deduction system, axiomatic system, semantic tableau system in proportional logic,
resolution refutation in proportional logic, predicate logic.
UNIT IV: (8 Lectures)
Knowledge representation: Introduction, approaches to knowledge
representation, knowledge representation using semantic network, extended
semantic networks for KR, knowledge representation using frames. Advanced
knowledge representation techniques: Introduction, conceptual dependency
theory, script structure, cyc theory.
UNIT V: (8 Lectures)
Expert system and applications: Introduction phases in building expert systems,
expert system versus traditional systems, rule-based expert systems blackboard
systems truth maintenance systems, application of expert systems, list of shells and
tools.
UNIT VI: (8 Lectures)
Uncertainty measure: probability theory: Introduction, probability theory, Bayesian belief networks, certainty factor theory, dempster-shafer theory. Fuzzy
sets and fuzzy logic: Introduction, fuzzy sets, fuzzy set operations, types of membership functions, multi valued logic, fuzzy logic, linguistic variables and hedges, fuzzy propositions, inference rules for fuzzy propositions, fuzzy systems.
Course Outcomes:
Upon completion of this course, the students will be able to: CO 1 Summarize and formulate appropriate logic concepts and AI methods for
solving a problem. CO 2 Applying various searching, game playing, and knowledge representation
techniques to solve the real world problems. CO 3 Analyze different expert systems and its applications. CO 4 Explain the concepts of probability theory, fuzzy sets and fuzzy logic for
uncertainty measure.
Mapping of COs to POs:
POs/ COs
PO1
PO2
PO3
PO4
PO5
PO6
PO7
PO8
PO9
PO10
PO11
PO12
PSO1
PSO2
CO1 3 - - - - - - - - - - - - -
CO2 3 3 3 - - - - - - - - - - -
CO3 2 3 - - - - - - - - - - - -
CO4 3 - - - - - - - - - - - - -
TEXT BOOKS: 1. Saroj Kaushik, Artificial Intelligence, CENGAGE Learning. 2. Stuart Russel, Peter Norvig, Artificial intelligence, A modern Approach, 2nd ed,
PEA. 3. Rich, Kevin Knight, Shiv Shankar B Nair, Artificial Intelligence, 3rd ed, TMH. 4. Patterson, Introduction to Artificial Intelligence, PHI.
REFERENCE BOOKS: 1. George F Lugar ,Artificial intelligence, structures and Strategies for Complex
problem solving, 5th ed, PEA.
2. Ertel, Wolf Gang, Introduction to Artificial Intelligence, Springer.
3. Nils J Nilsson, A new Synthesis Artificial Intelligence, Elsevier.
LINUX PROGRAMMING
(PROFESSIONAL ELECTIVE-I)
Subject Code: UGCS5T0818 L T P C
III Year / I Semester 3 0 0 3
Prerequisites: Familiarity with general Operating System concepts, Computer
Architecture and knowledge in Computer Networks.
Course Objectives:
This course provides Linux utilities and Shell scripting language (bash) to solve
Problems. Develops the skills necessary for systems programming including files,
process and signal management, and interprocess communication.
Syllabus:
UNIT I: (9 Lectures)
Linux Utilities: File handling utilities, Security by file permissions, Process
utilities, Disk utilities, Networking commands, Filters, Text processing utilities
and Backup utilities, Sed – scripts, operation, addresses, commands, applications,
awk – execution, fields and records, scripts, operation, patterns, actions, functions,
system commands in awk.
UNIT II: (8 Lectures)
Working with the Bourne Again Shell (Bash): Introduction, shell
responsibilities, pipes and Redirection, here documents, running a shell script, the
shell as a programming language, shell meta characters, file name substitution, shell
variables, command substitution, shell commands, the environment, quoting, test
command, control structures, arithmetic in shell, shell script examples, interrupt
processing, functions, debugging shell scripts.
UNIT III: (9 Lectures)
Linux Files: File Concept, File System Structure, File metadata-Inodes, File types,
Kernel support for files, system calls for file I/O operations- open, create, read,
write, close, lseek,dup2, file status information- stat family, file and record locking-
fcntl function, file permission-chmod, fchmod,file ownership-chown, lchown,fchown,
links- soft links & hard links - unlink, link, symlink.
Directories: creating, removing and change Directories (mkdir, rmdir, chdir),
obtaining current working directory(getcwd), Directory contents, Scanning
Directories (opendir, readdir, closedir,rewinddir, seekdir, telldir functions).
UNIT IV: (8 Lectures)
Linux Process: Process concept, Layout of C program image in main memory,
Process environment- environment list, environment variables, getenv, setenv,
Kernel support for process, process identification, process control - process creation,
replacing a process image, waiting for a process, process termination, zombie
process, orphan process, system call interface for process management-fork, vfork,
exit, wait, waitpid, exec family, Process groups, Session and Controlling Terminals,
Difference between threads and processes.
UNIT V: (8 Lectures)
Linux Signals: Introduction to signals, Signal generation and handling, Kernel
support for signals, Signal function, unreliable signals, reliable signals, kill, raise,
alarm, pause, abort, sleep functions.
Interprocess Communication: Introduction to IPC, IPC between processes on a
single computer system, IPC between processes on different systems, pipes-
creation, IPC between related processes using unnamed pipes, FIFOs- creation, IPC
between related processes using FIFOs, difference between unnamed and named
pipes, popen, pclose functions.
UNIT VI: (8 Lectures)
Message Queues: Kernel support for messages, Linux APIs for messages,
client/server example. Semaphores: Kernel support for semaphores, file locking
with semaphores. Shared Memory: Kernel support for shared memory, shared
memory example. Sockets: Introduction to Sockets, Client Server Model.
Course Outcomes:
Upon completion of this course, the students will be able to
CO 1. Understand the basic commands of Linux operating System and can
implement Shell Script.
CO 2. Build file system and directories and perform different operations on them.
CO 3. Construct processes background and foreground by using fork() system calls.
CO 4. Make use of shared memory segments, pipes, semaphores and message
queues and exercise on interprocess communication.
CO 5. Develop various client server applications using Sockets.
Mapping of COs to POs:
POs/ COs
PO 1
PO 2
PO 3
PO 4
PO 5
PO 6
PO 7
PO 8
PO 9
PO 10
PO 11
PO 12
PSO 1
PSO 2
CO1 2 - - 3 - - - - - - - 2 - -
CO2 2 - 3 3 - - - - - - - 2 - -
CO3 2 - 3 3 - - - - - - - 3 - -
CO4 3 - 2 3 - - - - - - - 3 - -
CO5 3 - 3 2 - - - - - - - 3 - -
TEXT BOOKS:
1) N.Matthew, R.Stones, Beginning Linux Programming, 4th edition,Wiley Publishing.
2) Mark G. Sobell, A Practical Guide to Linux Commands, Editors, and Shell
Programming, 3rd edition, Pearson Education.
3) Robert Love, Linux System Programming, 1st edition, O’Reilly, SPD.
REFERENCE BOOKS:
1) Stephen G. Kochan, Patrick Wood, Shell Programming - In Unix, Linux and OS X,
4th edition, Pearson.
2) https://www.coursera.org/learn/unix
3) https://www.pluralsight.com/courses/linux-systems-programming
4) https://www.edx.org/course/introduction-linux-linuxfoundationx-lfs101x-1
SOFTWARE TESTING METHODOLOGIES
(PROFESSIONAL ELECTIVE–I)
Subject Code: UGCS5T0918 L T P C
III Year / I Semester 3 0 0 3
Prerequisites: Basic concepts of software engineering and real-time problem
analytical skills.
Course Objectives:
This course enables the learners to have a higher level knowledge related to
software testing methodologies of a product in IT industry. It focuses on various
principles, methods and techniques related to various types of software testing as
well as efficient testing strategies, software quality management, and automation &
testing tools. Learners will get exposure to various real time testing practices testing
different types of software through this course.
Syllabus:
UNIT I: (9 Lectures)
SOFTWARE TESTING
Introduction, Evolution, Myths & Facts, Goals, Psychology, Definition, Model for
testing, Effective Vs Exhaustive Software Testing.
Software Testing Terminology and Methodology: Software Testing
Terminology, Software Testing Life Cycle, relating test life cycle to development life
cycle, Software Testing Methodology.
UNIT II: (9 Lectures)
VERIFICATION AND VALIDATION
Verification & Validation Activities, Verification, Verification of Requirements, High
level and low level designs, How to verify code, Validation.
Dynamic Testing I: Black Box testing techniques: Boundary Value Analysis,
Equivalence class Testing, State Table based testing, Decision table based testing,
Cause-Effect Graphing based testing, Error guessing.
UNIT III: (7 Lectures)
DYNAMIC TESTING II
White-Box Testing: need, Logic coverage criteria, Basis path testing, Graph
matrices, Loop testing, data flow testing, mutation testing.
Static Testing: inspections, Structured Walkthroughs, Technical reviews.
UNIT IV: (9 Lectures)
VALIDATION ACTIVITIES
Unit testing, Integration Testing,. Function testing, system testing, acceptance
testing.
Regression testing: Progressives Vs regressive testing, Regression testability,
Objectives of regression testing, When regression testing done?, Regression testing
types, Regression testing techniques.
UNIT V: (8 Lectures)
EFFICIENT TEST SUITE MANAGEMENT
Test case design Why does a test suite grow, Minimizing the test suite and its
benefits, test suite prioritization, Types of test case prioritization, prioritization
techniques, measuring the effectiveness of a prioritized test suite.
Software Quality Management: Software Quality metrics, SQA models
Debugging: process, techniques, correcting bugs, Basics of testing management
tools, test link and Jira.
UNIT VI: (8 Lectures)
AUTOMATION AND TESTING TOOLS
Need for automation, categorization of testing tools, selection of testing tools, Cost
incurred, Guidelines for automated testing, overview of some commercial testing
tools.
Testing Object Oriented Software: basics, Object oriented testing
Testing Web based Systems: Challenges in testing for web based software,
quality aspects, web engineering, testing of web based systems, Testing mobile
systems.
Course Outcomes:
Upon completion of this course, the students will be able to: CO 1. Interpret the basic principles of software testing and its process.
CO 2. Classify different types of verification & validation techniques to ensure the
functioning of a software system.
CO 3. Build efficient test suites with regression techniques to assess the quality of
software applications.
CO 4. Apply automation testing tools on software applications in various domains.
Mapping of COs to POs:
POs/ COs
PO 1
PO 2
PO 3
PO 4
PO 5
PO 6
PO 7
PO 8
PO 9
PO 10
PO 11
PO 12
PSO 1
PSO 2
CO1 2 - 2 - - - - - - - - 2 - -
CO2 3 - 3 - 2 2 - - 2 2 - 2 - -
CO3 3 - 3 - 2 2 - - 2 2 - 2 - -
CO4 3 - 3 - 2 2 - - - - - 2 - -
TEXT BOOKS:
1. Naresh Chauhan, Software Testing Principles and Practices, Oxford. 2. Aditya P Mathur, Foundations of Software Testing, 2nd Edition, Pearson.
3. Yogesh Singh, Software Testing, Cambridge.
REFERENCE BOOKS:
1. Baris Beizer, Software Testing Techniques , 2nd Edition, International Thomson
Computer Press.
2. M G Limaye, Software Testing, Principles, Techniques and Tools, TMH.
3. Willian E Perry, Effective Methods for Software testing, 3rd Edition, Wiley.
COMPILER DESIGN LAB
Subject Code: UGCS5P1018 L T P C
III Year / I Semester 0 0 3 1.5
Prerequisites: Familiarity with C or Java Programming.
Course Objectives: This course is aimed at providing the implementation of basic
parsers and tools of compiler design. List of Programs:
1. Write a Program to implement Lexical Analyzer.
2. Write a Program to implement the Lexical Analyzer using LEX Tool.
3. Write a Program for implementation of Predictive Parser.
4. Write a Program to compute FIRST of Non-Terminals.
5. Write a Program to compute FOLLOW of Non-Terminals.
6. Write a Program to implement Top-Down Parser for a given Grammar.
7. Write a Program to implement LL(1) Parser for a given Grammar.
8. Write a Program to implement the LALR Parser for a given Grammar.
9. Write a Program to convert Infix Expression to Post Expression.
10. Write a Program to construct the Predictive Parser for a given Grammar.
11. Write a Program to construct the Shift-Reduce Parser for a given Grammar.
12. Write a Program to construct the CLR Parser for a given Grammar.
13. Generate the Three Address Code for a given Expression.
14. Generate the optimized Three Address Code for a given Expression.
Course Outcomes:
Upon completion of this course, the students will be able to: CO 1. Apply the algorithms and design techniques to solve problems. CO 2. Design parser generator using compiler constructor tools to build a simple
Compiler. Mapping of COs to POs:
POs/ COs
PO 1
PO 2
PO 3
PO 4
PO 5
PO 6
PO 7
PO 8
PO 9
PO 10
PO 11
PO 12
PSO 1
PSO 2
CO1 - 3 3 2 3 - - 3 3 3 - 1 3 -
CO2 - 3 3 2 3 - - 3 3 3 - 1 3 -
TEXT BOOKS: 1. Alfred V Aho, Monica S Lam, Ravi Sethi, Jeffrey D. Ullman ,Compilers Principles
Techniques and Tools-,2nd ed, Pearson. 2. Kenneth C Louden, Compiler construction, Principles and Practice, CENGAGE. REFERENCE BOOKS: 1. K. Muneeswaran, Compiler Design, Oxford. 2. Keith D.Cooper & Linda Torczon, Engineering a compiler, 2nd edition, Morgan
Kaufman.
COMPUTER NETWORKS AND OPERATING SYSTEMS LAB
Subject Code: UGCS5P1118 L T P C
III Year / I Semester 0 0 3 1.5
Prerequisites: Familiarity with C or Java Programming.
Course Objectives: The students will learn and implement the Various Error correction, Detection Mechanisms, concepts of routing algorithms, and OS concepts like Processor scheduling and Deadlock mitigation Techniques and Analyze Various file, disk and memory management mechanisms.
List of Experiments:
PART A: Computer Networks Lab
Week 1: Implement the Data Link Layer Framing methods such as Character Stuffing and Bit Stuffing. Week 2: Implement CRC and checksum methods. Week 3: Implement one bit error correction in the received frame using Hamming code. Week 4: Write a program to implement distance vector routing algorithm. Week 5: Write a program to implement Broad cast routing algorithm. Week 6: a. Write a program to develop a simple Chat TCP application. b. Write a program to develop a simple Chat UDP application.
PART B: Operating Systems Lab
Week 7: Simulate the following CPU Scheduling Algorithms a. FCFS b. SJF c. Priority Week 8: Simulate Bankers Algorithm for Deadlock Avoidance. Week 9: Simulate the following Page Replacement Algorithms
a. FIFO b. LRU
Week 10: Simulate the following File Allocation Strategies
a. Sequential b. Indexed Week 11: Simulate the following disk scheduling algorithms a. SCAN b. SSTF
Course Outcomes: Upon completion of this course, the students will be able to: CO 1. Implement various techniques for error free transmission.
CO 2. Identify and apply the algorithm best suited for finding the optimal path.
CO 3. Design an application by selecting the appropriate service and protocols.
CO 4. Apply the appropriate algorithm to address the processor scheduling and
deadlock situation.
CO 5. Implement various algorithms for memory management.
Mapping of COs to POs:
POs/ COs
PO 1
PO 2
PO 3
PO 4
PO 5
PO 6
PO 7
PO 8
PO 9
PO 10
PO 11
PO 12
PSO 1
PSO 2
CO1 3 3 3 3 2 - - 3 3 3 - 3 2 3
CO2 3 3 3 3 2 - - 3 3 3 - 3 3 3
CO3 3 3 3 3 2 3 2 3 3 3 3 3 3 3
CO4 3 3 3 3 2 - - 3 3 3 - 3 3 2
CO5 3 3 3 - 2 - - 3 3 3 - 3 3 3
TEXT BOOKS: 1. Behrouz A. Forouzan, Data Communications and Networking, 5th Edition, TMH,
2013.
2. A.S. Tanenbaum, Computer Networks, 4th Edition, Pearson Education.
3. Abraham Silberchatz, Peter B.Galcin,Greg Gagne,Operating System Concepts,
8th Edition, John Wiley.
4. Stallings, Operating systems-internals and design principles, sixth Edition,
Pearson education -2009.
MICROPROCESSORS AND MICROCONTROLLERS LAB
Subject Code: UGCS5P1218 L T P C
III Year / I Semester 0 0 3 1.5
Prerequisites: Familiarity with Digital Electronics and Assembly Language
Programming.
COURSE OBJECTIVES: In this laboratory the students get the opportunity to apply the theoretical
knowledge they acquired in their microprocessor course to real hardware and
software. The course uses a TASM as a development platform tool, so students can
experience assembly language programming techniques. They also Learn the
programming with ADRUINO UNO.
List of Experiments: Write 8086 microprocessor - Assembly Language Programs (ALP) for the following list of experiments using TASM/MASM. 1. ALP to display the String ‘Hello, welcome to SVECW’. 2. ALP to add two 16-bit integer numbers. 3. ALP to compute average of two 16-bit integer numbers. 4. ALP to multiply two 16-bit integer numbers. 5. ALP to divide two 16-bit integer numbers. 6. ALP to swap two numbers. 7. ALP to check whether a given number is odd or even number. 8. ALP to find GCD of two numbers. 9. ALP to find LCM of two numbers. 10. ALP to convert a unpacked BCD numbers into packed BCD number. 11. ALP to find the sum of numbers in an array. 12. ALP to copy a string from one location to another location. 13. ALP to reverse a string. 14. ALP Evaluate an arithmetic expression. 15. ALP to find the largest number in the given list of numbers. 16. ALP to find the Factorial of a given number. 17. ALP to perform Linear Search in a given list of numbers. 18. ALP to perform Binary Search in a given list of numbers. 19. ALP to perform Bubble Sort in a given list of numbers. 20. ALP to implement Macros for computing square of a given number. 21. ALP to convert binary to decimal and decimal to binary formats. Getting started with ARDUINO UNO 1. Perform a basic experiment to switch on buzzer and LED according to the input. 2. Perform a basic experiment to read temperature from the sensor with arduino using and display on LCD.
3. Perform a basic experiment to control the speed of DC motor.
Course Outcomes:
Upon completion of this course, the students will be able to:
CO 1. Develop assembly language programs using Arithmetic, Logic and Shift instructions. CO 2. Design Applications that uses Decision, Repetitive and Modular structures. CO 3. Create Programs for various applications to use with ARDUINO UNO.
Mapping of COs to POs:
POs/ COs
PO 1
PO 2
PO 3
PO 4
PO 5
PO 6
PO 7
PO 8
PO 9
PO 10
PO 11
PO 12
PSO 1
PSO 2
CO1 3 3 3 - 3 - - 3 3 3 - - - -
CO2 3 3 3 - 3 - - 3 3 3 - - - -
CO3 3 3 3 - 3 - - 3 3 3 - - - -
TEXT BOOKS: 1. Douglas V Hall, Microprocessors and Interfacing,Revised 2nd ed, TMH.
2. Barry Bray,The Intel Microprocessors, Architecture, programming and
interfacing, 8th ed, Pearson.
3. Lyla B Das, The X86 Microprocessors, architecture, Programming and Interfacing
(8086 to Pentium), PEA.
4. AJAY V Deshmukh,Microcontrollers, TATA McGraw Hill publications.
REFERENCE BOOKS: 1. Walter A Triebel, Avtar Singh, The 8088 and 8086 Microprocessors,
Programming, Interfacing, Hardware and Applications,4th ed,Pearson.
2. Liu,Micro Computer System 8086/8088 Family Architecture, Programming and
Design, Prentice Hall.Muhammad Ali Mazdi, 8051 Microcontrollers & Embedded
Systems, Pearson Education.
LOGICAL REASONING
Subject Code: UGBS5A0218 L T P C
III Year / I Semester 2 0 0 0
Course Objectives:
To train students to critically evaluate various real life situations by resorting to
logical analysis of key issues and factors.
To prepare students to read between the lines and understand various sentence
structures.
Chapter 1 : Probability Basic problems - Addition theorem of probability for 2, 3, or 4 events - Conditional Probability. Chapter 2 : Permutations & Combinations Sum & Product Rules, Permutations and Combinations without repetitions, with repetitions and with constrained repetitions – ncr, npr & n! formulas – Binomial coefficients – Principle of inclusion and exclusion. Chapter 3 : Coding, Decoding, Letter and Number Series Letter Coding, Direct Letter coding, Number / Symbol coding, Substitution Coding, Deciphering message word coding and its types, Number series, Letter Series, Analogy.
Chapter 4 : Calendar Odd days - Ordinary year-Leap year - Day for given date - Years with same Calendar. Chapter 5 : Clocks Minute divisions - Angle between two hands - Time in the Clock for given Angle – Incorrect Clock-Direction of Minute/Hour hand at given Time-Mirror time. Chapter 6 : Directions Direction Names - Starting Direction - Ending Direction – Distance. Chapter 7 : Data Analysis and Interpretation Tabulation- Pie Charts – Bar Diagrams – Line Graphs.
Course Outcomes:
Upon completion of this course, the students will be able to: CO 1. Distinguish the basic elements of arguments and recognize the different types
of arguments. CO 2. Construct natural language statements in the language of propositional and
predicate logic. CO 3. Examine logical relations among statements; and analyze logically complex
statements into their truth- functional or quantificational components. CO 4. Distinguish valid deductive arguments from invalid ones CO 5. Make use of appropriate arithmetic formulae to draw conclusions on logical
problems Mapping of COs to POs:
POs/COs
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO 10
PO 11
PO 12
CO1 - - - - - -
- - - - - 2
CO2 - - - - - - - - - - - 2
CO3 - - - - - - - - - - - 2
CO4 - - - - - - - - - - - 2
CO5 - - - - - - - - - - - 2
REFERENCE BOOKS: 1. M.Tyra, Magical book on Quicker Maths, BSC Publishing Co. Pvt. Ltd. 2. R.S. Aggarwal, A modern approach to Logical reasoning, S. Chand Publications. 3. Edgar Thorpe, Test of reasoning for competitive Examinations, TMH publications. 4. R.V. Praveen, Quantitative Aptitude and Reasoning, 3rd ed., PHI publications.
DATA WAREHOUSING AND DATA MINING
Subject Code: UGCS6T0118 L T P C
III Year / II Semester 3 0 0 3
Prerequisites: Familiarity with Database Management Systems. Course Objectives: The objective of this course is to teach the basic data mining concepts with
particular emphasis on the association, classification, prediction and clustering
techniques. Students will be enabled to understand and implement classical models
and algorithms in data warehousing and data mining. They will learn how to analyze
the data, identify the problems and choose the relevant algorithms for different
kinds of data.
Syllabus:
UNIT I: (8 Lectures)
Introduction: Fundamentals of data mining, Data mining functionalities,
Classification of Data mining Systems, Data mining primitives, Major issues in data
mining.
Data Preprocessing: Needs for preprocessing the Data, Data Cleaning, Data
Integration and Transformation, Data Reduction, Data Discretization and Concept
Hierarchy Generation.
UNIT II: (6 Lectures)
Data Warehouse: Introduction, Multidimensional Data Model, Data Warehouse
Architecture, Data Warehouse Implementation, From Data Warehousing to Data
mining.
UNIT III: (10 Lectures)
Mining Association Rules in Large Databases: Basic Concepts, Frequent item set
Mining Methods, Mining Multilevel Association Rules, Mining Multidimensional
Association Rules from Relational Databases and Data Warehouses, From
Association Mining to Correlation Analysis.
UNIT IV: (10 Lectures)
Classification and Prediction: Issues Regarding Classification and Prediction,
Classification by Decision Tree Induction, Bayesian Classification, Classification by
Back propagation, Associate Classification, Prediction, Accuracy and measures,
Evaluating the accuracy.
UNIT V: (10 Lectures)
Cluster Analysis: Introduction, Types of Data in Cluster Analysis, A Categorization of
Major Clustering Methods, Partitioning Methods, Hierarchical Methods, Model-Based
Clustering Methods, Outlier Analysis.
UNIT VI: (6 Lectures)
Mining Different Kinds of Data: Mining Time-Series and Sequence Data, Social
Network Analysis, Mining Text Databases, Mining the World Wide Web.
Course Outcomes: Upon completion of this course, the students will be able to: CO 1. Outline data mining functionalities and use data preprocessing techniques to
improve the overall quality of the pattern mined from the data. CO 2. Apply data warehouse computation techniques on large data set. CO 3. Experiment with association, classification and clustering algorithms on
different kinds of data to extract knowledge.
Mapping of COs to POs:
POs/ COs
PO 1
PO 2
PO 3
PO 4
PO 5
PO 6
PO 7
PO 8
PO 9
PO 10
PO 11
PO 12
PSO 1
PSO 2
CO1 3 3 3 3 3 - - - 2 2 - 3 - 3
CO2 3 3 3 3 3 - - - 2 2 - 3 - 3
CO3 3 3 3 3 3 - - - 2 2 - 3 - 3
TEXT BOOKS:
1. Jiawei Han, Jian Pei & MichclineKamber, Data Mining - Concepts and Techniques,
3rd edition, Morgan Kauffman Publishers. 2. Pang- Ning tan, Michael Steinbach, Vipin Kumar, Introduction to Data Mining,
1st edition, Pearson.
REFERENCE BOOKS:
1. Margaret H.Dunham, Data Mining: Introductory and Advanced Topics, 1st
edition Pearson.
2. Arun K Pujari, Data Mining Techniques, Universities Press.
3. Paulraj Ponniah, Data Warehousing Fundamentals, Wiley Student Edition.
INFORMATION SECURITY
Subject Code: UGCS6T0218 L T P C
III Year / II Semester 3 0 0 3
Prerequisites: Familiarity with Probability & Statistics and Computer Networks.
Course Objectives: The students will able to learn the different attacks,
confidentiality, integrity, authentication and availability, and how to detect and
prevent the various attacks.
Syllabus: UNIT I: (10 Lectures) Introduction: Security Attacks, Security Services, Security Mechanisms, and a Model for Network Security. Non-Cryptographic Protocol Vulnerabilities-DoS, DDoS, Session Hijacking and Spoofing, Software Vulnerabilities- Phishing, Buffer Overflow, Format String Attacks, SQL Injection. Basics of Cryptography – Steganography, Symmetric Cipher Model, Substitution Techniques, Transportation Techniques, Other Cipher Properties- Confusion, Diffusion, Block and Stream Ciphers.
UNIT II: (8 Lectures)
Secret Key Cryptography: S-DES, Data Encryption Standard (DES), Strength of DES, Block Cipher Design Principles and Modes of Operations, Triple DES, AES. Number Theory: Divisibility and the Division Algorithm, Prime and Relatively Prime Numbers, Modular Arithmetic, Fermat’s and Euler’s Theorems, the Chinese Remainder Theorem, Discrete Logarithms.
UNIT III: (8 Lectures) Public Key Cryptography: Principles of Public Key Cryptosystems, RSA Algorithm, Diffie-Hellman Key Exchange, Introduction to Elliptic Curve Cryptography. Cryptographic Hash Functions: Applications of Cryptographic Hash Functions, Secure Hash Algorithm, Message Authentication Codes – Message Authentication Requirements and Functions, HMAC, Digital signatures, Digital Signature Standards. UNIT IV: (10 Lectures)
Authentication Applications: Kerberos, Key Management and Distribution, X.509 Directory Authentication service, Public Key Infrastructure, Electronic Mail Security: Pretty Good Privacy.
UNIT V: (7 Lectures)
IP Security: Overview, Architecture, Authentication Header, Encapsulating Security Payload, Combining security Associations, Internet Key Exchange. Web Security: Web Security Considerations, Secure Sockets Layer and Transport
Layer Security, Electronic Payment.
UNIT VI: (7 Lectures) System Security: Malicious Software – Types, Viruses, Virus Countermeasures, Worms. Firewalls: Characteristics, Types of Firewalls, Placement of Firewalls, Firewall Configuration, Trusted systems. Course Outcomes: Upon completion of this course, the students will be able to: CO 1. Identify the basic concepts of cryptography. CO 2. Analyze the various algorithms to ensure the security services. CO 3. Compare and contrast the systems for encryption and hashing. CO 4. Associate algorithms for better security. CO 5. Apply security mechanisms to detect and prevent various attacks.
Mapping of COs to POs: POs/
COs
PO
1
PO
2
PO
3
PO
4
PO
5
PO
6
PO
7
PO
8
PO
9
PO
10
PO
11
PO
12
PSO
1
PSO
2
CO1 3 2 - - - - - 2 - - - 2 - -
CO2 3 3 2 2 2 - - - - - - 3 3 3
CO3 3 3 3 3 3 - - - - - - 2 - -
CO4 3 3 3 3 - - - - - - - 2 - -
CO5 3 3 3 3 2 - - 2 - - - 3 3 3
TEXT BOOKS: 1. William Stallings, Cryptography and Network Security, 4th Edition, Pearson
Education,. 2. Atul Kahate, Cryptography and Network Security, 2nd Edition, Mc Graw Hill. REFERENCE BOOKS: 1. Mark Stamp, Information Security - Principles and Practice, Wiley India. 2. Forouzan Mukhopadhyay, Cryptography and Network Security, 2nd Edition, Mc
Graw Hill. 3. C K Shyamala, N Harini, Dr T R Padmanabhan, Cryptography and Network
Security: 1st Edition, Wiley India.
WEB TECHNOLOGIES
Subject Code: UGCS6T0318 L T P C
III Year / II Semester 3 0 0 3
Prerequisites: Familiarity with OOPs concepts, core Java concepts and Internet.
Course Objectives: The student will be familiar with client-server architecture and
able to develop a web application using HTML, JavaScript, PHP, Servlets, JSP, JDBC
and also AJAX. The Students will acquire the necessary skills and techniques needed
for developing Web based Projects.
Syllabus: UNIT I: (8 Lectures) HTML: Tags, Lists, Tables, Images, forms, Frames. CSS: Introduction, CSS Properties, Controlling Fonts, Text Formatting, Pseudo classes, Selectors, CSS for Links, Lists, Tables. UNIT II: (8 Lectures) JavaScript: Variables, Operators, Functions, Control structures, Events, Objects, Form validations, Dynamic HTML with JavaScript. Working with XML: Document type Definition, XML schemas, Document object model, XSLT, DOM and SAX.
UNIT III: (8 Lectures) PHP: Creating PHP script, Running PHP script, Using variables, Using constants,
Data types, Operators, Conditional statements, Control statements, Arrays,
functions, working with forms and Database.
UNIT IV: (8 Lectures) Web Servers and Servlets: Tomcat web server, Introduction to Servlets: Lifecycle of a Servlet, JSDK, The Servlet API, The javax.servlet Package, Reading Servlet parameters, and Reading Initialization parameters, The javax.servlet HTTP package, Handling Http Request & Responses, Using Cookies-Session Tracking, Security
Issues.
UNIT V: (8 Lectures) Introduction to JSP: The Problem with Servlet, The Anatomy of a JSP Page, JSP Processing, JSP Application Design with MVC. JSP Application Development: Generating Dynamic Content, Using Scripting Elements Implicit JSP Objects, Conditional Processing – Displaying Values Using an Expression to Set an Attribute, Declaring Variables and Methods Error Handling and Debugging Sharing Data between JSP pages, Requests, and Users Passing Control and Date between Pages – Sharing Session and Application Data.
UNIT VI: (10 Lectures) Database Access: Database Programming using JDBC, Studying Javax.sql.* package, Accessing a Database from a Servlets and JSP Page, Application – Specific
Database Actions, Deploying JAVA Beans in a JSP Page, Introduction to struts framework. AJAX A New Approach: Introduction to AJAX, Integrating PHP and AJAX. Consuming WEB services in AJAX: (SOAP, WSDL, UDDI).
Course Outcomes:
Upon completion of this course, the students will be able to: CO 1. Develop interactive WebPages with improved GUI.
CO 2. interpret scripting language techniques using cross platform language.
CO 3. Acquire knowledge on server side scripting language.
CO 4. Apply knowledge to access different databases using web services.
Mapping of COs to POs:
POs/ Cos
PO 1
PO 2
PO 3
PO 4
PO 5
PO 6
PO 7
PO 8
PO 9
PO 10
PO 11
PO 12
PSO 1
PSO 2
CO1 - - 3 - 3 - - - 3 - 3 - 3 -
CO2 - - 3 - 3 - - - 3 - 3 - 3 -
CO3 - - 3 - 3 - - - 3 - 3 - 3 -
CO4 - - 3 - 3 - - - 3 - 3 - 3 -
TEXT BOOKS:
1. Web Technologies – Black Book, Kogent Learning solutions Inc sol. Dreamtech
press. (Units- 1,2,3,8)
2. Patrick Naughton and Herbert Schildt, The complete Reference Java 2, 7th
Edition. TMH (Units- 4,5,6,7)
3. Wang, Katila, An Introduction to Web Design + Programming, CENGAGE.
REFERENCE BOOKS:
1. Uttam K Roy , Web Technologies, – Oxford.
2. Dietel and Nieto, Internet and World Wide Web – How to program, PHI/Pearson
Education Asia.
3. Wang-Thomson, An Introduction to web Design and Programming.
4. Robert W Sebesta, Programming the World Wide Web – Pearson publications,
Fourth edition.
5. Godbole, Atul Kahate , Web Technologies, TCP/IP Architecture and Java
programming- 2nd ed, TMH.
6. N P Gopalan, Akhilandeswari,Web Technologies, A developer’s Perspective, PHI.
BIG DATA TECHNOLOGIES
(PROFESSIONAL ELECTIVE–II)
Subject Code: UGCS6T0418 L T P C
III Year / II Semester 3 0 0 3
Prerequisites: The student should have knowledge of high level programming
languages and SQL for analyzing the data.
Course Objectives: The student will be able to understand Big Data as a popular
term used to describe the exponential growth, availability and use of information,
both structured and unstructured. It is imperative that organizations and IT leaders
focus on the ever-increasing volume, variety and velocity of information that forms
Big Data. Hadoop is the core platform for structuring BigData, and solves the
problem of making it useful for Analytics.
Syllabus: UNIT I: (9 Lectures)
Introduction to Big Data - What is Big Data and where it is produced? Rise of Big Data, Compare Hadoop vs traditional systems, Limitations and Solutions of existing Data Analytics Architecture, Attributes of Big Data, Types of data, other technologies vs Big Data. Hadoop Architecture and HDFS: Topics - What is Hadoop? Hadoop History,
Distributing Processing System, Core Components of Hadoop, HDFS Architecture,
Hadoop Master – Slave Architecture, Daemon types - Learn Name node, Data node,
Secondary Name node.
UNIT II: (8 Lectures)
Hadoop Clusters and the Hadoop Ecosystem- What is Hadoop Cluster? Pseudo
Distributed mode, Type of clusters, Hadoop Ecosystem, Pig, Hive, Oozie, Flume,
SQOOP.
HadoopMapReduce Framework- Overview of MapReduce Framework,
MapReduce Architecture, Learn about Job tracker and Task tracker, Use cases of
MapReduce, Anatomy of MapReduce Program.
MapReduce programs in Java- Basic MapReduce API Concepts, Writing
MapReduce Driver, Mappers, and Reducers in Java, Speeding up Hadoop
Development by Using Eclipse, Unit Testing MapReduce Programs, and Demo on
word count example.
UNIT III: (8 Lectures)
Hive and HiveQL- What is Hive?, Hive vs MapReduce, Hive DDL –
Create/Show/Drop Tables, Internal and External Tables, Hive DML – Load Files &
Insert Data, Hive Architecture & Components, Difference between Hive and RDBMS,
Partitions in Hive.
UNIT IV: (8 Lectures)
PIG - PIG vs MapReduce, PIG Architecture & Data types, Shell and Utility
components, PIG Latin Relational Operators, PIG Latin: File Loaders and UDF,
Programming structure in UDF, PIG Jars Import, limitations of PIG.
UNIT V: (8 Lectures)
Apache SQOOP, Flume: Why and what is SQOOP? SQOOP Architecture, Benefits
of SQOOP, Importing Data Using SQOOP, Apache Flume Introduction, Flume Model
and Goals, Features of Flume, Flume Use Case.
UNIT VI: (8 Lectures)
NoSQL Databases- What is HBase? HBase Architecture, HBase Components,
Storage Model of HBase, HBase vs RDBMS, Introduction to Mongo DB, CRUD,
Advantages of MongoDB over RDBMS, Use case.
Oozie and Zookeeper-Oozie – Simple/Complex Flow, Oozie Workflow, Oozie
Components, Demo on Oozie Workflow in XML, What is Zookeeper? Features of
Zookeeper, Zookeeper Data Model.
Course Outcomes:
Upon completion of this course, the students will be able to: CO 1. Outline importance of big data in solving real time problems in data analytics.
CO 2. Make use of distributed systems and Hadoop and can write mapreduce
programs to solve complex problems.
CO 3. Explain Hadoop Ecosystem and its components.
CO 4. Compare NoSQL Databases and traditional databases and understand the
importance of NoSQL databases.
Mapping of COs to POs:
POs/ COs
PO 1
PO 2
PO 3
PO 4
PO 5
PO 6
PO 7
PO 8
PO 9
PO 10
PO 11
PO 12
PSO 1
PSO 2
CO1 3 3 3 3 3 - - - - - - - 3 3
CO2 3 3 3 3 3 - - 3 - - - - 3 3
CO3 - - 3 3 3 - - - - - - - 3 3
CO4 - - 3 3 3 - - - - - - - 3 3
TEXT BOOKS:
1. Tom White, Hadoop : The Definitive Guide, 3rd Edition, O’reilly
2. Chuck Lam, Hadoop in Action by MANNING Publications.
3. Dirk deRoos, Paul C.Zikopoulos, Roman B.Melnyk, Bruce Brown, Rafael Coss, Hadoop for
Dummies, Wiley Brand.
REFERENCE BOOKS:
1. Alex Holmes, Hadoop in Practice, MANNING Publications.
2. Srinath Perera, Thilina Gunarathne, Hadoop MapReduce Cookbook, Packt publishing.
IMAGE PROCESSING
(PROFESSIONAL ELECTIVE–II)
Subject Code: UGCS6T0518 L T P C
III Year / II Semester 3 0 0 3
Prerequisites: Basic knowledge in Mathematics and Computer Graphics.
Course Objectives: The course objective is to provide introduction to basic
concepts and methodologies to digital image processing, and to develop a
foundation that can be used as the basis for further study and research in this field.
Syllabus:
UNIT I: INTRODUCTION (8 Lectures)
Introduction to Digital Image Processing, Fundamental steps in image processing
systems, Image acquisition, Sampling and quantization, Basic relationship between
pixels, Mathematical tools used in image processing, Camera model of Image, Need
for image transform and spatial frequencies in image processing, 2-D DFT, DCT,
DST transforms.
UNIT II: IMAGE ENHANCEMENT (8 Lectures)
Some basic intensity transformation functions, Histogram processing, Fundamentals
of spatial filtering –smoothing spatial filters and sharpening spatial filters, Combining
spatial enhancement methods, Transformation and spatial filtering, Image
smoothing using frequency domain filters Selective filtering and implementation.
UNIT III: IMAGE RESTORATION & RE-CONSTRUCTION (9 Lectures)
Image degradation/restoration model, Noise models, Restoration in the presence of
noise, linear Position invariant degradation, Estimation of degradation function and
inverse filtering, Wiener filtering, Constrain least square filtering.
UNIT IV: COLOR IMAGE PROCESSING (9 Lectures)
Color fundamentals, Color models, Pseudo color Image Processing, Basics of full
color image processing, Color transformations, Smoothing and sharpening.
UNIT V: IMAGE COMPRESSION AND WATER MARKING (8 Lectures)
Lossless Compression: Variable length coding, Dictionary-based coding, LZW
compression, Lossy Compression, Image Compression standards, JPEG, JPEG 2000,
Digital Water Marking, Frequency Domain Water Marking, Security Attacks.
UNIT VI: SEGMENTATION & MORPHOLOGICAL PROCESSING (7 Lectures)
Erosion and Dilation, Opening and closing, Hit or miss transformation, some basic
Morphological algorithms, Gray-Scale Morphology, Point , line and edge detection,
Thresholding, Region oriented segmentation, Segmentation using morphological
watersheds, Use of motion in segmentation.
Course Outcomes:
Upon completion of this course, the students will be able to:
CO 1. Understand the fundamentals steps in image processing.
CO 2. Analyze different filters and transformations for the enhancement of an
image.
CO 3. Apply image processing techniques for restoration, reconstruction and
compression of images.
CO 4. Compare various color models to perform color image processing.
CO 5. Explain the concepts of segmentation and distinguish basic morphological
algorithms.
Mapping of COs to POs:
POs/ COs
PO 1
PO 2
PO 3
PO 4
PO 5
PO 6
PO 7
PO 8
PO 9
PO 10
PO 11
PO 12
PSO 1
PSO 2
CO1 3 2 - - - - - - - - - - - -
CO2 3 3 2 - 2 - - - - - - - - -
CO3 3 - 2 2 2 - - - 2 2 - 2 2 3
CO4 2 2 - - 3 - - - 2 2 - 2 2 3
CO5 2 2 2 - 2 - - - - - - - - -
TEXT BOOKS:
1. Rafael C. Gonzalez and Richard E. Woods, Digital Image Processing, 2011,
Pearson Education.
2. Anil K jain, Fundementals of Digital Image Processing, 2012, Prentice Hall of
India.
REFERENCE BOOKS:
1. S.Jayaraman,S,Esakkirajan,T.Veerakumar, Digital Image Processing, 2009,
McGraw Hill Publisher.
2. B.Canda and D DuttaMjumder, Digital Image Processing and analysis, 2011/12,
Prentice Hall of india.
NATURAL LANGUAGE PROCESSING
(PROFESSIONAL ELECTIVE-II)
Subject Code: UGCS6T0618 L T P C
III Year / II Semester 3 0 0 3
Prerequisites: Familiarity with Compiler Design.
Course Objectives: The main objective of the course is to learn how to develop
practical computer systems capable of performing intelligent tasks on natural
language analyze, understand and generate written text.
Syllabus:
UNIT I: (8 Lectures)
Introduction: What is Natural Language Processing, NLP tasks in syntax,
semantics, and pragmatics. Applications such as information extraction, question
answering, and machine translation. The problem of ambiguity. The role of machine
learning. Brief history of the field.
UNIT II: (8 Lectures)
N-gram Language Models: The role of language models, Simple N-gram models.
Estimating parameters and smoothing. Evaluating language models.
Part of Speech Tagging and Sequence Labeling: Lexical syntax. Hidden
Markov Models. Maximum Entropy Models. Conditional Random Fields.
UNIT III: (8 Lectures)
Syntactic Parsing: Grammar formalisms and tree banks. Efficient parsing for
context-free grammars (CFGs). Statistical parsing and probabilistic CFGs (PCFGs).
Lexicalized PCFGs.
UNIT IV: (10 Lectures)
Semantic Analysis: Lexical semantics and word-sense disambiguation.
Compositional semantics. Semantic Role Labeling and Semantic Parsing.
UNIT V: (8 Lectures)
Information Extraction (IE) and Machine Translation (MT): Named entity
recognition and relation extraction. IE using sequence labeling. Basic issues in MT.
Statistical translation, word alignment, phrase-based translation, and synchronous
grammars. Dialogues: Turns and utterances, grounding, dialogue acts and
structures.
UNIT VI: (8 Lectures)
Natural Language Generation: Introduction to language generation,
architecture, discourse planning (text schemata, rhetorical relations).
Course Outcomes:
Upon completion of this course, the students will be able to: CO 1. Relate the basics of NLP and study the role of machine learning in processing
NLP.
CO 2. Analyze various Language Models and process part of speech tagging for
static NLP.
CO 3. Discover how to analyze the words and extract meaning from the text.
CO 4. Identify various ways to draw inferences from text and language translation.
CO 5. Summarize the mechanisms to generate natural language.
Mapping of COs to POs:
POs/ COs
PO 1
PO 2
PO 3
PO 4
PO 5
PO 6
PO 7
PO 8
PO 9
PO 10
PO 11
PO 12
PSO 1
PSO 2
CO1 - 2 1 - - - - - - - - - - -
CO2 - 3 2 3 - 3 - - - - - 3 - -
CO3 - 3 3 - - 3 - - - - - 3 - -
CO4 - 3 3 - - 2 - - 1 - - 3 - 3
CO5 - 2 2 2 - - - - 1 - - 3 - 3
TEXT BOOKS:
1. D. Jurafsky, J. H. Martin, Speech and Language Processing- An introduction to
Language Processing, Computational Linguistics, and Speech Recognition,
Pearson Education.
2. Manning and Schutze, Foundations of Statistical Natural Language Processing,
MIT Press.
REFERENCE BOOKS:
1. Allen, James Benjamin/Cummings, Natural Language Understanding, Benjamin-
Cummings Publishing Co, 2ed.
2. Bharathi, A., Vineet Chaitanya and Rajeev Sangal, Natural Language Processing-
A Pananian Perspective, Prentice Hll India, Eastern Economy Edition.
CLOUD COMPUTING
(PROFESSIONAL ELECTIVE–II)
Subject Code: UGCS6T0718 L T P C
III Year / II Semester 3 0 0 3
Prerequisites: Familiarity with Operating Systems, Computer Networks and Database
Management Systems.
Course Objectives: The objective of this course is to provide students with the
comprehensive and in-depth knowledge of Cloud Computing concepts, technologies,
architecture and applications.
Syllabus:
UNIT I: (10 Lectures)
Introduction to Cloud Computing: Trends in Computing - Distributed Computing, Grid
Computing, Cluster Computing, Utility Computing, Cloud Computing, Definition of Cloud
Computing, Characteristics, Service Models, Deployment Models, Cloud Service Models
Providers, Advantages and Disadvantages of Cloud Computing , Cloud-based Services &
Applications.
UNIT II: (8 Lectures)
Cloud Concepts & Technologies: Virtualization and its types, Software Defined
Networking, Network Function Virtualization(NFV).
Cloud Services: Compute Services, Storage Services, Database Services, Application
Services.
UNIT III: (8 Lectures)
Cloud Application Design: Design Considerations for Cloud Applications, Reference
Architectures for Cloud Applications, Cloud Application Design Methodologies: SOA, Cloud
Component Model, and MVC, Data Storage Approaches.
UNIT IV: (8 Lectures)
Cloud Security: Cloud Security Architecture(CSA), Authentication, Authorization, Identity &
Access Management, Data Security, Key Management.
UNIT V: (7 Lectures)
Migrating into a Cloud: Broad Approaches to Migrating into the Cloud, The Seven-Step
Model of Migration into a Cloud, Migration Risks and mitigation, Phases of Migrating to
Cloud, benefits and risks of Migrating to Cloud.
UNIT VI: (9 Lectures)
SLA Management in Cloud Computing: Service Level Agreements(SLA), Considerations
for SLA, SLA Requirements, Types of SLA, Life Cycle of SLA, SLA Management in Cloud.
Case Study: Amazon AWS: EC2, Amazon Simple DB, Amazon S3, Amazon Cloud Front and
Amazon SQS.
Course Outcomes:
Upon completion of this course, the students will be able to: CO 1. Illustrate key technologies, strengths, and limitations of cloud computing and the
possible applications for state-of-the-art cloud computing.
CO 2. Choose the appropriate methodologies and considerations for Cloud application
design.
CO 3. Interpret the core issues of Cloud Computing such as security, Privacy and
Interoperability.
Mapping of COs to POs:
POs/ COs
PO 1
PO 2
PO 3
PO 4
PO 5
PO 6
PO 7
PO 8
PO 9
PO 10
PO 11
PO 12
PSO 1
PSO 2
CO1 3 2 2 2 - - - - - - - - - 3
CO2 3 3 2 2 - - - - - - - - - 3
CO3 3 3 - 3 - 2 - - - - - - - 3
TEXT BOOKS:
1. Arshdeep Bahga, Vijay Madisetti, Cloud Computing : A Hands-on Approach, Universities Press.
2. Rajkumar Buyya, James Brogerg, Andrzej Goscinski, Cloud Computing : Principles and Paradigms, WILEY Publication.
REFERENCE BOOKS:
1. Michael Miller, “Cloud Computing – Web Based Applications That Change the way you Work and Collaborate Online”, Pearson Education.
2. Anthony T. Velte Toby J. Velte, Robert Elsenpeter, “Cloud Computing : A Practical Approach”, McGraw-Hill,(2010).
3 Arshdeep B, Vijay M, “Cloud computing: A Hands-on Approach”, Universities Press.
SOFTWARE PROJECT MANAGEMENT
(PROFESSIONAL ELECTIVE-II)
Subject Code: UGCS6T0818 L T P C
III Year / II Semester 3 0 0 3
Prerequisites: Basic concepts of Software Engineering.
Course Objectives: This course enables the learners to understand the importance of software
project management in a product life cycle in IT industry. It focuses on various
principles and methods related to management of cost, time, human resources,
risks, procurement, monitoring and controlling related to a product development.
Learners will get exposure to various real time project management practices to
build quality products with in time through this course.
Syllabus:
UNIT I: (7 Lectures)
INTRODUCTION TO SOFTWARE PROJECT MANAGEMENT
Project Stakeholders, Project Management Knowledge Areas, Project Management
Tools and Techniques, Program and Project Portfolio Management, the Role of the
Project Manager, the Project Management Profession, Project Phases and the
Project Life Cycle.
UNIT II: (12 Lectures)
SOFTWARE PROJECT TIME AND COST MANAGEMENT
Time management The Importance of Project Schedules, Estimating Activity
Resources, Estimating Activity Durations, Developing the Schedule, Controlling the
Schedule, Using Software to Assist in Project Time Management. Cost management:
The Importance of Project Cost Management, Basic Principles of Cost Management,
Estimating Costs, Types of Cost Estimates, Cost Estimation Tools and Techniques,
Determining the Budget, Controlling Costs.
UNIT III: (7 Lectures)
HUMAN RESOURCES MANAGEMENT
The Importance of Human Resource Management, Keys to Managing People,
Developing the Human Resource Plan, Acquiring the Project Team, Developing the
Project Team, Managing the Project Team, Using Software to Assist in Human
Resource Management.
UNIT IV: (12 Lectures)
RISK MANAGEMENT
Planning Risk Management, Common Sources of Risk on Information Technology
Projects, Identifying Risks, Performing Qualitative Risk Analysis, Performing
Quantitative Risk Analysis, Planning Risk Responses, Monitoring and Controlling
Risks, sing Software to Assist in Project Risk Management.
UNIT V: (7 Lectures)
PROJECT INTEGRATION MANAGEMENT
Strategic Planning and Project Selection, Developing a Project Charter, Developing a
Project Management Plan, Directing and Managing Project Execution.
UNIT VI: (5 Lectures)
MONITORING AND CONTROLLING
Project Work, Performing Integrated Change Control, Closing Projects or Phases.
Course Outcomes:
Upon completion of this course, the students will be able to: CO 1. Interpret the importance of software project management with roles and
responsibilities of the team in the real-time project life cycle.
CO 2. Classify different methods required in project management related to
time, cost and human resource management.
CO 3. Identify risks in project life cycle and plan for risk management strategies.
CO 4. Develop a project charter by integrating all the project management
knowledge areas.
Mapping of COs to POs:
POs/ COs
PO 1
PO 2
PO 3
PO 4
PO 5
PO 6
PO 7
PO 8
PO 9
PO 10
PO 11
PO 12
PSO 1
PSO 2
CO1 2 - - - - - - - - - 3 2 - -
CO2 3 3 - - 3 - - - 2 2 3 2 - -
CO3 2 2 - - 2 - - - 2 2 3 2 - -
CO4 3 3 - - - - - - - - 3 2 - -
TEXT BOOKS:
1. Kathy Schwalbe, Information Technology Project Management, 6th edition, Cengage Learning, 2011.
2. Walker Royce, Software Project Management A Unified Framework, Pearson Edition.
REFERENCE BOOKS:
1. Ramesh, Gopalaswamy, "Managing Global Projects", Tata McGraw Hill, 2001.
2. Jalote, “Software Project Management in Practice”, Pearson Education, 2002.
INTRODUCTION TO ANALYTICS (ASSOCIATE ANALYTICS – I)
(PROFESSIONAL ELECTIVE-II)
Subject Code: UGCS6T0918 L T P C
III Year / II Semester 3 0 0 3
Prerequisites: Familiarity with Database Management Systems and Data
Warehousing & Data Mining.
Course Objectives:This course gives insight about how to apply analytics on data
using R. Statistical data can be summarized and revisited easily using R and
connecting NoSQL databases easily. Through this course can become professional
and build projects for business applications using R and also learn soft skills which
helps to work effectively in the Industry. Associate analysts are basically involved in
the research and investigation for a specific business process or a department. Their
findings help the senior staff to take further decisions for a process or project.
Syllabus:
UNIT I: SQL using R & Correlation and Regression Analysis (8 Lectures)
Introduction to NoSQL, Connecting R to NoSQL databases, Excel and R integration
with R connector, Regression Analysis, Assumptions of OLS Regression, Regression
Modelling, Correlation, ANOVA, Forecasting, Heteroscedasticity, Autocorrelation,
Introduction to Multiple Regression etc.
UNIT II: Understand the Verticals (9 Lectures)
Understanding systems viz. Engineering Design, Manufacturing, Smart Utilities,
Production lines, Automotive, Technology etc., Understanding Business problems
related to various businesses.
UNIT III: Manage your work to meet requirements (9 Lectures)
Understanding Learning objectives, Introduction to work & meeting requirements,
Time Management, Work management & prioritization, Quality & Standards
Adherence. Work effectively with Colleagues : Introduction to work effectively,
Team Work, Professionalism, Effective Communication skills, etc.
UNIT IV: Data Management & Introduction to Big Data Tools (8 Lectures)
Design Data Architecture and manage the data for analysis, Understand various
sources of Data like Sensors/signal/GPS etc.Export all the data onto Cloud ex.
AWS/Rackspace etc. Introduction to Big Data tools like Hadoop, Spark, Impala etc.,
Data ETL process, Identify gaps in the data and follow-up for decision making.
UNIT V: Big Data Analytics & Machine Learning Algorithms (8 Lectures)
Run descriptive to understand the nature of the available data, collate all the data
sources to suffice business requirement, Run descriptive statistics for all the
variables and observe the data ranges, Outlier detection and elimination, Hypothesis
testing and determining the multiple analytical methodologies, Train Model on 2/3
sample data using various Statistical/Machine learning algorithms, Test model on
1/3 sample for prediction etc.
UNIT VI: Data Visualization (8 Lectures)
Prepare the data for Visualization, Use tools like Tableau, QlickView and D3, Draw
insights out of Visualization tool.
Course Outcomes:
Upon completion of this course, the students will be able to: CO 1. Apply appropriate regression model by getting awareness on both relational
and distributed databases. CO 2. Relate the verticals in engineering, financials in pursuit for excellence and
adhere quality and standard in both time and work management. CO 3. Outline various data design architectures and sources of data, by getting
exposed to big data tools. CO 4. Apply descriptive statistics on all available data sources, for model prediction
by using machine learning algorithms. CO 5. Draw insights out of Visualization tool and prepare the data for Visualization.
Mapping of COs to POs:
POs/ COs
PO 1
PO 2
PO 3
PO 4
PO 5
PO 6
PO 7
PO 8
PO 9
PO 10
PO 11
PO 12
PSO 1
PSO 2
CO1 3 3 3 - 3 - - - - - - - 2 -
CO2 3 3 3 - - 3 3 3 3 3 3 3 - -
CO3 3 3 3 - 3 - - - 3 3 - 3 - -
CO4 3 3 3 3 3 - - - - - - - - 3
CO5 3 3 3 3 3 - - - - - - - - 3
TEXT BOOKS:
1. G. Jay Kerns, Introduction to Probability and Statistics Using R, 1e, IPSUR. 2. Associate analytics-1
https://drive.google.com/open?id=0B_ySwMoI8wFWMjlGSXE0MmZ4STA 3. Venables and Smith, An Introduction to R, R Development Core Team.
REFERENCE BOOKS:
1. Montgomery, Douglas C., and George C. Runger, Applied statistics and probability for engineers. John Wiley & Sons.
2. Yanchang Zhao, Time Series Analysis and Mining with R. 3. The Basic Concepts of Time Series Analysis.
http://anson.ucdavis.edu/~azari/sta137/AuNotes.pdf
DATA WAREHOUSING AND DATA MINING LAB
Subject Code: UGCS6P1018 L T P C
III Year / II Semester 0 0 3 1.5
Prerequisites: Familiarity with DBMS and C or Java Programming .
Course Objective: The students can understand data warehouse & data mining principles and aware the environment of WEKA Tool. In addition to that, they can perform various data mining activities through available preprocessing and data mining algorithms on various data sets and will perform qualitative analysis on them.
List of Experiments:
1. Performing preprocessing on dataset student.arff. 2. Performing preprocessing on dataset labor.arff. 3. Performing Association rule mining on dataset contactlenses.arff using apriori Algorithm. 4. Performing classification on dataset student.arff using j48 algorithm. 5. Performing classification on dataset employee.arff using id3 algorithm. 6. Performing classification on dataset employee.arff using naïve bayes algorithm. 7. Performing clustering on dataset student.arff using simple k-means. 8. Implementation of Apriori algorithm. 9. Implementation of Decision tree classification algorithm. 10. Implementation of K-Means clustering algorithm. 11. Implementation of K-Medoids clustering algorithm.
Course Outcomes: Upon completion of this course, the students will be able to: CO 1. Describe all components of WEKA Tool. CO 2. Develop data in different formats and apply pre-processing and association
rules to find hidden patterns and interestingness in data. CO 3. Analyze and discover knowledge in different datasets using classification and
clustering algorithms. Mapping of COs to POs:
POs/
COs
PO
1
PO
2
PO
3
PO
4
PO
5
PO
6
PO
7
PO
8
PO
9
PO
10
PO
11
PO
12
PSO
1
PSO
2
CO1 3 3 3 - 3 - - - - - - - - -
CO2 3 3 3 3 3 - - 3 3 3 - 3 - 3
CO3 3 3 3 3 3 - - 3 3 3 - 3 - 3
TEXT BOOK:
1. Lan H. Witten & Eibe Frank, Data Mining Practical Machine Learning Tools and
Technology, 2nd edition, Elsevier.
INFORMATION SECURITY LAB Subject Code: UGCS6P1118 L T P C
III Year / II Semester 0 0 3 1.5
Prerequisites: Familiarity with C or Java Programming .
Course Objectives: The students will able to create the different attacks, protect the data by using data confidentiality, integrity and authentication. List of Experiments:
1. Simulate Buffer Overflow. 2. Simulate Denial of Service attack. 3. Simulate Sniffing and Spoofing attacks. 4. Simulate Web Based Password Capturing. 5. Implementation of Chinese Remainder Theorem. 6. Implementation of Diffie-Hellman Key Exchange. 7. Implementation of DES algorithm for data encryption. 8. Implementation of RSA algorithm. 9. Implementation of Simple server for Secure socket. 10. Implementation of digital signatures using RSA algorithm.
Course Outcomes: Upon completion of this course, the students will be able to: CO 1. Deploy various information and network attacks. CO 2. Analyze the symmetric key algorithms for data confidentiality and
authentication in various scenarios. CO 3. Implement asymmetric encryption systems for data confidentiality,
authentication and integrity. CO 4. Simulate the scenario of Security communication among two or more entities. Mapping of COs to POs:
POs/ COs
PO 1
PO 2
PO 3
PO 4
PO 5
PO 6
PO 7
PO 8
PO 9
PO 10
PO 11
PO 12
PSO 1
PSO 2
CO1 3 3 3 3 3 - - 3 3 3 - - - -
CO2 3 3 3 3 3 - - 3 3 3 - - 2 3
CO3 3 3 3 3 3 3 - 3 3 3 - - 3 3
CO4 3 3 3 3 3 3 - 3 3 3 - - 3 3
TEXT BOOKS: 1. William Stallings, Cryptography and Network Security, 4th Edition, Pearson Education. 2. Atul Kahate, Cryptography and Network Security, 2nd Edition, Mc Graw Hill. REFERENCE BOOKS: 1. C K Shyamala, N Harini, Dr T R Padmanabhan, Cryptography and Network Security: 1st Edition, Wiley India. 2. Mark Stamp, Information Security, Principles and Practice, Wiley India.
WEB TECHNOLOGIES LAB
Subject Code: UGCS6P1218 L T P C
III Year / II Semester 0 0 3 1.5
Prerequisites: Familiarity with OOPs concepts, core Java concepts and Internet.
Course Objectives: The students will learn to develop web applications using the
technologies HTML, Java Script, PHP, XML, Servlets, JSP and database programming
using JDBC.
List Of Experiments: Week-1: Design the following static web pages required for an online book store website. 1) HOME PAGE: The static home page must contain three frames. Top frame : Logo and the website name and links to Home page, Login page, Registration page, Catalogue page and Cart page (the description of these pages will be given below). Left frame: At least four links for navigation, which will display the catalogue of respective links. For e.g.: When you click the link “CSE” the catalogue for CSE Books should be displayed in the Right frame. Right frame: The pages to the links in the left frame must be loaded here. Initially this page contains description of the website.
2) LOGIN PAGE: This page looks like below:
Logo
Website Name
Home
Login
Registration
Catalogue
Cart
CSE ECE EEE
CIVIL
Description of the Website
Logo Website Name
Home Login Registration Catalogue Cart
CSE
ECE
EEE
Civil
Login : Password:
Reset Submit
3) CATOLOGUE PAGE: The catalogue page should contain the details of all the books available in the Website in a table. The details should contain the following:
1. Snapshot of Cover Page 2. Book Name 3. Author Name 4. Publisher 5. Price 6. Add to cart button
Logo Website Name
Home Login Registration Catalogue Cart
CSE
ECE
EEE
CIVIL
Book : XML Bible Author : Winston Publication : Wiely Book : AI Author : S.Russell Publication : Princeton hall Book : Java 2 Author : Watson Publication: BPB Publications Book : HTML in 24 hours Author : Sam Peter Publication : Sam publication
$ 40.5 $ 63 $ 35.5 $ 50
Note: Week 2 contains the remaining pages and their description. Week-2: 4) CART PAGE: The cart page contains the details about the books which are added to the cart. The cart page should look like this:
Logo Website Name
Home Login Registration Catalogue Cart
CSE
ECE
EEE
CIVIL
Book name Price Quantity Amout Java 2 $35.0 2 $70
XML bible $40.5 1 $40.5
Total Amount - $110.5
5) REGISTRATION PAGE: Create registration“ form “with the following fields
1) Name (Text field) 2) Password (password field) 3) E-mail id (text field) 4) Phone number (text field) 5) Sex (radio button) 6) Date of birth (3 select boxes) 7) Languages known (check boxes – English, Telugu, Hindi, Tamil) 8) Address (text area)
Week-3: Design a web page using CSS (Cascading Style Sheets) which includes the following: 1) Use different font, styles: In the style definition you define how each selector should work (font, color etc.). Then, in the body of your pages, you refer to these selectors to activate the styles. For example:>
<HEAD><style type=
<HTML> <HEAD> <style type="text/css"> B.headline {color:red. font-size:22px. font-family:arial. text-decoration:underline} </style> </HEAD> <BODY> <b>This is normal bold</b><br> Selector {cursor:value} For example: <html> <head> <style type="text/css"> .xlink {cursor:crosshair} .hlink{cursor:help} </style> </head> <body> <b> <a href="mypage.htm" class="xlink">CROSS LINK</a> <br> <a href="mypage.htm" class="hlink">HELP LINK</a> </b> </body> </html> <b class="headline">This is headline style bold</b> </BODY> </HTML>
text/css">headline { <body>
2) Set a background image for both the page and single elements on the page. You can define the background image for the page like this:
BODY {background-image:url(myimage.gif).}
3) Control the repetition of the image with the background-repeat property. As background-repeat tiles the image until the entire page is filled, just like an ordinary background image in plain HTML.
4) Define styles for links as
A:link A:visited A:active A:hover
Example: <style type="text/css"> A:link {text-decoration: none} A:visited {text-decoration: none} A:active {text-decoration: none} A:hover {text-decoration: underline. color: red.} </style>
5) Work with layers: For example:
LAYER 1 ON TOP: <div style="position: relative. font-size:50px. z-index:2.">LAYER 1</div> <div style="position: relative. top:-50. left:5. color: red. font-size:80px.z-index:1">LAYER 2</div>
LAYER 2 ON TOP: <div style="position: relative. font-size:50px. z-index:3.">LAYER 1</div> <div style="position: relative. top:-50. left:5. color: red. font-size:80px.z-index:4">LAYER 2</div> 6) Add a customized cursor:
Selector {cursor:value} For example:
<html>
<head >
BODY {background-image:url(myimage.gif).}
<html>
<head> <style type="text/css"> .xlink {cursor:crosshair} .hlink{cursor:help} </style> </head> <body> <b> <a href="mypage.htm" class="xlink">CROSS LINK</a> <br> <a href="mypage.htm" class="hlink">HELP LINK</a> </b> </body> </html>
WEEK 4: VALIDATION: Write JavaScript to validate the following fields of the above registration page.
1. Name (Name should contains alphabets and the length should not be less than 6 characters).
2. Password (Password should not be less than 6 characters length). 3. E-mail id (should not contain any invalid and must follow the standard
pattern [email protected]) 4. Phone number (Phone number should contain 10 digits only).
Note : You can also validate the login page with these parameters. Week-5:
Write an XML file which will display the Book information which includes the following:
1) Title of the book 2) Author Name 3) ISBN number 4) Publisher name 5) Edition 6) Price
Write a Document Type Definition (DTD) to validate the above XML file.
Display the XML file as follows. The contents should be displayed in a table. The header of the table should be in color GREY. And the Author names column should be displayed in one color and should be capitalized and in bold. Use your own colors for remaining columns. Use XML schemas XSL and CSS for the above purpose. Note: Give at least for 4 books. It should be valid syntactically. Hint: You can use some xml editors like XML-spy.
Week-6: Develop PHP script for
1) Event Handling with forms. 2) Connect Form with Web Server. 3) Connect Form with Mysql for data transfer.
Week-7:
1. Install TOMCAT web server and APACHE.
While installation assign port number 4040 to TOMCAT and 8080 to APACHE. Make sure that these ports are available i.e., no other process is using this port.
2. Access the above developed static web pages for books web site, using these servers by putting the web pages developed in week-1 and week-2 in the document root. Access the pages by using the urls : http://localhost:4040/rama/books.html (for tomcat)
Week-8: User Authentication: Assume four users user1, user2, user3 and user4 having the passwords pwd1, pwd2, pwd3 and pwd4 respectively. Write a servelet for doing the following. 1. Create a Cookie and add these four user id’s and passwords to this Cookie. 2. Read the user id and passwords entered in the Login form (week1) and authenticate with the values (user id and passwords) available in the cookies. If he is a valid user (i.e., user-name and password match) you should welcome him by name(user-name) else you should display “ You are not an authenticate Use init-parameters to do this. Store the user-names and passwords in the webinf.xml and access them in the servelet by using the getInitParameters() method. Week-9:
Install a database (Mysql or Oracle).
Create a table which should contain at least the following fields: name, password, email-id, phone number (these should hold the data from the registration form).
Practice 'JDBC' connectivity. Write a java program/servelet/JSP to connect to that database and extract data from the tables and display them. Experiment with various SQL queries. Insert the details of the users who register with the web site, whenever a new user clicks the submit button in the registration page (week2).
Week-10: Write a JSP which does the following job: Insert the details of the 3 or 4 users who register with the web site (week9) by using registration form. Authenticate the user when he submits the login form using the user name and password from the database ( similar to week8 instead of cookies). Week-11: Create tables in the database which contain the details of items (books in our case like Book name , Price, Quantity, Amount ) of each category. Modify your catalogue page (week 2) in such a way that you should connect to the database and extract data from the tables and display them in the catalogue page using JDBC.
Course Outcomes:
Upon completion of this course, the students will be able to: CO 1. Analyze and apply the role of languages in the working of web applications.
CO 2. Create dynamic web applications using server side application programs.
CO 3. Design database connectivity for different data sources.
Mapping of COs to POs:
POs/ COs
PO 1
PO 2
PO 3
PO 4
PO 5
PO 6
PO 7
PO 8
PO 9
PO 10
PO 11
PO 12
PSO 1
PSO 2
CO1 - - 3 - 3 - - 3 3 3 3 - 3 -
CO2 - - 3 - 3 - - 3 3 3 3 - 3 -
CO3 - - 3 - 3 - - 3 3 3 3 - 3 -
TEXT BOOKS:
1. Achyut S Godbole and Atul Kahate, “Web Technologies”, Second Edition, Tata McGraw Hill.
2. HTML 5, Black Book, Dreamtech Press. 3. Herbert Schildt , The Complete Reference Java, 7th edition, Tata McGraw Hill. 4. Steven Holzner, “The Complete Reference - PHP”, Tata McGraw Hill. 5. Mike Mcgrath, “PHP & MySQL in easy Steps”, Tata McGraw Hill. 6. Hans Bergsten, Java Server Pages, SPD O’Reilly.
REFERENCE BOOKS:
1. David Flanagan, “JavaScript: The Definitive Guide, Sixth Edition”, O'Reilly Media, 2011.
2. Chris Bates , Web Programming , building internet applications, 2nd edition, Wiley Dreamtech.
3. Beginning PHP and MySQL: From Novice to Professional, Fourth Edition, Dreamtech Press, 2010.
MINI PROJECT-2
Subject Code: UGCS6J1318 L T P C
III Year /II Semester 0 1 2 2
Course Objectives :
Mini project will let the students apply the programming knowledge into a real world
situation or problem and expose the students to how programming skill will help
them develop a product.
Guidelines/Instructions :
Group of students can form as a team and the team has to submit the Mini Project
abstract to the Project Coordinator by consulting with the guide at the beginning of
the semester.
The team has to implement the Mini Project and submit the Mini Project report in
the prescribed format at the end of the semester to the department. The Viva–Voce
shall be conducted along with respective semester lab external examinations.
Course Outcomes:
Upon completion of this course, the students will be able to:
CO 1. Aquire practical knowledge within the chosen area of technology for project
development.
CO 2. Identify, analyse, formulate and handle projects with a systematic approach.
CO 3. Contribute as an individual or in a team in development of technical projects.
CO 4. Develop effective communication skills for presentation of project related
activities.
Mapping of COs to Pos:
POs/ COs
PO 1
PO 2
PO 3
PO 4
PO 5
PO 6
PO 7
PO 8
PO 9
PO 10
PO 11
PO 12
PSO 1
PSO 2
CO1 3 3 3 3 3 3 3 - - - 3 3 3 3
CO2 3 2 3 3 3 3 3 3 - - 3 - 3 3
CO3 - - - - 3 2 2 3 3 3 3 3 3 3
CO4 - - - - - - - 3 3 3 - 3 - -
QUANTITATIVE ABILITY
Subject Code: UGBS6A0118 L T P C
III Year / II Semester 2 0 0 0
Course Objectives: To train students to critically evaluate various real life situations by resorting to
Analysis of key issues and factors. To prepare students to learn various principles involved in solving arithmetic
problems. Chapter 1 : Ratio, Proportion & Variation Ratio-Duplicate, Triplicate, Sub-Duplicate, Sub-Triplicate and Inverse Ratio-Proportion - Mean, Third and Fourth Proportionals - Rules of Proportion, Variation-Direct, Inverse and Joint variations.
Chapter 2 : Percentages Percentage-Conversion of fraction to percentage and Percentage to Fraction-percentage excess & shortness, Effect of percentage change on a number-Effect of two step change-Effect of percentage change on product.
Chapter 3 : Simple & Compound Interest Simple Interest-Effect of change in principal, Rate of interest or Time period-Interest as Multiples of principal-equal installment to repay-Compound Interest-Conversion period-Formula for EMI.
Chapter 4 : Profit, Loss &Discount Cost price, Selling price-Gain-Loss-Percentage-Relation among Cost price & selling price, Gain %, Loss %-Discount-Marked price-Use of False Scale, %Gain or % Loss on Selling Price.
Chapter 5 : Partnership Partners-Managing-sleeping – investment ratio - profit ratio - Investment for different durations.
Chapter 6 : Time & Distance Speed - Average Speed - problems on trains - Relative speed - Boats and streams – Races - Flat & Circular.
Chapter 7 : Mixtures & Alligation Ratio of Mixtures-Mean price-Rule of Alligations.
Chapter 8 : Time & Work Rate of work - Work as a single unit - No. of persons working together - No. of man days. Pipes & Cisterns: Pipe – Drain - Amount of work done-Time to fill tank.
Course Outcomes: Upon completion of this course, the students will be able to: CO 1. Build a strong base in fundamentals of Arithmetic. CO 2. Illustrate the approaches and strategies to solve problems with speed and
accuracy. CO 3. Develop appropriate skills to succeed in the selection process for recruitment.
Mapping of COs to POs:
POs/COs
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO 10
PO 11
PO 12
CO1 - - - - - - - - - - - 2
CO2 - - - - - - - - - - - 2
CO3 - - - - - - - - - - - 2
REFERENCE BOOKS: 1. Abhijit Guha, Quantitative Aptitude for Competitive Examinations, 4th ed., TMH
Publications. 2. Dinesh Khattar, The Pearson guide to Quantitative Aptitude for Competitive
Exams, 3rd ed., Pearson. 3. R.S. Aggarwal, Quantitative Aptitude, S.Chand Publications. 4. R.S. Aggarwal, Objective Arithmetic, S. Chand Publications. 5. M.Tyra, Magical book on Quicker Maths, BSC Publishing Co. Pvt. Ltd.
MANAGEMENT SCIENCE
Subject Code: UGMB7T0118 L T P C
IV Year / I Semester 3 0 0 3
Prerequisites: General awareness about principles of Management and insight
about Management concepts.
Course Objectives:
1. To create awareness about different Managerial concepts like Management,
Production, Marketing, Human Resource and Strategic Management.
2. To make the students equip with knowledge on techniques of PERT and CPM
in project management.
Syllabus:
UNIT I: (10 Lectures)
Introduction to Management : Concept and importance of Management,
Functions of management, Evaluation of Management thought, Fayol’s principles of
Management, Maslow’s need hierarchy & Herzberg’s two factor theory of
Motivation, Decision making process, Designing organizational structure, Principles
of Organization, Types of organization structures.
UNIT II: (9 Lectures)
Operations management: Principles and types of plant Layout , Work study, Statistical Quality control. Charts – R Chart, c chart, p chart, Simple problems on R, c and p charts, Materials Management: Objectives - Need for inventory control- Inventory control techniques EOQ , ABC , HML, SDE, VED and FSN analysis.
UNIT III: (8 Lectures)
Human Resources management (HRM): Concepts of HRM,HRD & Personnel
management and industrial relations, Basic functions of HR manager ,Wage
payment plans (simple problems), Job Evaluation and Merit Rating.
UNIT IV: (7 Lectures)
Marketing Management: Functions of marketing , Marketing Mix, Marketing
strategies based on Product life cycle, Channels of distribution.
UNIT V: (8 Lectures)
Project Management(PERT/CPM): Network analysis, Programme Evaluation
and Review Technique (PERT), Critical path method(CPM) - Identifying critical
path, Difference between PERT & CPM, Project Crashing (simple problems).
UNIT VI: (8 Lectures)
Strategic Management: Mission, Goals, objectives, policy, strategy, Elements of
corporate planning process, Environmental scanning, SWOT analysis Steps in
strategy formulation and implementation Generic strategy alternatives.
Course Outcomes:
Upon completion of this course, the students will be able to: CO1: Understand the Fundamentals of Management with specific insight as its
function and role.
CO2: Learn the Concepts of production, Management of human Resources and
Management of Marketing activities along with business environment.
CO3: Apply the problem solving skills to demonstrate logical solution to real life
problems.
CO4: Explain the business strategies to deal with the dynamic business
environment.
Mapping of COs to POs:
POs/
COs
PO
1
PO
2
PO
3
PO
4
PO
5
PO
6
PO
7
PO
8
PO
9
PO
10
PO
11
PO
12
PSO
1
PSO
2
CO1 - - - - - - - - 2 - - - - -
CO2 - - - - - 2 - - - - - - - -
CO3 - - - - - - - - - - 2 - - -
CO4 - - - - - - - - - - 2 - - -
TEXT BOOKS:
1. Dr. Arya Sri, “Management Science”, TMH 2011.
2. L.M.Prasad, “Principles & Practices of Management”, Sultan chand & Sons, 2007.
REFERENCE BOOKS:
1. K.Aswathappa and K.Sridhara Bhat, “Production and Operations Management”,
Himalaya Publishing House, 2010.
2. Philip Kotler, Kevin Keller, Mairead Brady, Malcolm Goodman,Torben Hansen,
“Marketing Management” Pearson Education Limited, 05-May-2016.
DATA SCIENCE
Subject Code: UGCS7T0118 L T P C
IV Year / I Semester 3 0 0 3
Prerequisites: Basic knowledge in Probability & Statistics and Data Mining.
Course Objectives: Data Science course is specially designed to provide the requisite knowledge and skills to become a successful analytics professional. The course covers practical implementation of issues in statistical computing, concepts such as linear and logistic regression, cluster analysis, and forecasting with predictive data analytics, hypothesis testing, Data Manipulation, Exploratory Data Analysis, Ensemble of Decision trees, Collaborative filtering etc. to make students industry ready. Syllabus: UNIT I: (9 Lectures) Introduction, How to run R, R Sessions and Functions, Basic Math, Variables, Data Types, Vectors, Conclusion, Advanced Data Structures, Data Frames, Lists, Matrices, Arrays, Classes. R Programming Structures, Control Statements, Loops, - Looping Over Nonvector Sets,- If-Else, Arithmetic and Boolean Operators and values, Default Values for Argument, Return Values, Deciding Whether to explicitly call return- Returning Complex Objects, Functions are Objective, No Pointers in R, Recursion. UNIT II: (8 Lectures) Basic Data Analytics using R, R Graphical User Interfaces, Data Import and Export, Attribute and Data Types, Descriptive Statistics, Exploratory Data Analysis, Visualization Before Analysis, Dirty Data, Visualizing a Single Variable, Examining Multiple Variables, Data Exploration Versus Presentation. Discover R’s packages to do graphics and create own data visualizations. Graphics, Creating Graphs, The Workhorse of R Base Graphics, the plot() Function, Customizing Graphs, Saving Graphs to Files. Doing Math and Simulation in R, Math Function, Extended Example. UNIT III: (9 Lectures) Calculating Probability- Cumulative Sums and Products-Minima and Maxima- Calculus, Functions Fir Statistical Distribution, Sorting, Linear Algebra Operation on Vectors and Matrices, Extended Example: Vector cross Product- Extended Example: Finding Stationary Distribution of Markov Chains. Probability Distributions, Normal Distribution- Binomial Distribution- Poisson Distributions Other Distribution, Basic Statistics, Correlation and Covariance, T-Tests, ANOVA. UNIT IV: (8 Lectures) Introduction of Data Science, Exploring data, cleaning and munging, manipulating data, rescaling, data wrangling, dimensionality reduction, PCA, overfitting, under fitting, bias-variance, trade-off, feature extraction and selection, association rule mining, outlier analysis.
UNIT V: (8 Lectures) Linear Models, Simple Linear Regression, Multiple Regression, Generalized Linear Models, Logistic Regression, Poisson Regression, other Generalized Linear Models, Survival Analysis, Nonlinear Models, Splines, Decision- Random Forests. UNIT VI: (8 Lectures) Overview of Clustering, K-means, Perform K-means Analysis using R, Classification, Decision Trees, Evaluating a Decision Tree, Decision Tree in R, Bayes’ Theorem, Naïve Bayes Classifier, Smoothing, Naïve Bayes in R, and k-nearest neighborhood algorithm. Course Outcomes:
Upon completion of this course, the students will be able to: CO 1. Acquire the knowledge on exploratory data analysis, statistics, regression
models, machine learning and R language. CO 2. Analyze the real word datasets presented in different formats using R
libraries to perform exploratory data analysis. CO 3. Build testable hypotheses for the given dataset by selecting appropriate
tests. CO 4. Apply the principles of the different regression, machine-learning
techniques to predict and forecast the outcome of real-world problem. Mapping of COs to POs:
POs/
COs
PO
1
PO
2
PO
3
PO
4
PO
5
PO
6
PO
7
PO
8
PO
9
PO
10
PO
11
PO
12
PSO
1
PSO
2
CO1 3 3 3 3 - - - - 2 2 - 3 3 3
CO2 3 3 3 - - - - - 2 2 - - - -
CO3 3 3 3 - - - - - 2 2 - - - -
CO4 3 3 3 3 - - - - 2 2 - 3 3 3
TEXT BOOKS: 1. Norman Matloff, The Art of R Programming, Cengage Learning. 2. David Dietrich, Barry Heller and Beibei Yang, Data Science and Big Data
Analytics: Discovering, Analyzing, Visualizing and Presenting Data, Wiley.
REFERENCE BOOKS: 1. Rob Kabacoff, R in Action, Manning. 2. Nathan Marz and James Warren, Big Data-Principles and best practices of
scalable real-time data systems, DreamTech Press. 3. http://www.rdatamining.com/docs
MACHINE LEARNING
Subject Code: UGCS7T0218 L T P C
IV Year / I Semester 3 0 0 3
Prerequisites:
Basic programming skills (in Python), algorithm design and basics of probability &
statistics.
Course Objectives:
The main objective of this course is to understand the key algorithms and theory
that form the foundation of machine learning and computational intelligence, as well
as to Identify and apply the appropriate machine learning technique for
classification, pattern recognition, optimization and decision problems.
Syllabus:
UNIT I: (8 Lectures)
Introduction : Well-posed learning problems, Designing a learning system,
Perspectives and issues in machine learning. Concept learning and the general to
specific ordering – Introduction, A concept learning task, Concept learning as
search, Find- S: finding a maximally specific hypothesis, Version spaces and the
candidate elimination algorithm, Remarks on version spaces and candidate
elimination, Inductive bias.
UNIT II: (8 Lectures)
Linear Regression & Logistic Regression: Predicting numeric values: regression
– Finding the best fit lines with linear regression, Locally weighted linear regression,
Shrinking Coefficients, The bias / Variance tradeoff. Logistic Regression:
Classification with logistic regression and the sigmoid function, Using optimization to
find the best regression coefficients.
UNIT III: (8 Lectures)
Decision Tree Learning: Decision tree representation, appropriate problems for
decision tree learning, basic decision tree learning algorithm, and hypothesis space
search in decision tree learning, inductive bias in decision tree learning, and issues
in decision tree learning.
UNIT IV: (10 Lectures)
Artificial Neural Networks: Introduction, Neural network representation,
Appropriate problems for neural network learning, Perceptions, Multilayer networks
and the back propagation algorithm, Remarks on the back propagation algorithm,
An illustrative example face recognition, Advanced topics in artificial neural
networks.
UNIT V: (8 Lectures)
Support Vector Machines & Dimensionality Reduction Techniques:
Separating data with the maximum margin, finding the maximum margin, efficient
optimization with SMO algorithm, speeding up optimization with full platt SMO,
Using Kernels for more Complex data. Dimensionality Reduction techniques:
Principal Component analysis, Example.
UNIT VI: (8 Lectures)
Instance-Based Learning - Introduction, k -Nearest Neighbor Learning, Locally
Weighted Regression, Radial Basis Functions, Case-Based Reasoning, Remarks on
Lazy and Eager Learning.
Course Outcomes:
Upon completion of this course, the students will be able to:
CO 1. Summarize the concepts and methods related to machine learning such as classification, regression, clustering, bias/variance, kernel functions, and optimization.
CO 2. Predict the expected outcome of the problem based on the training data by applying specific machine learning algorithm.
CO 3. Implement and compare the relevant algorithms using performance metrics. CO 4. Design and build the model using various machine learning algorithms in a
range of real-world applications.
Mapping of COs to POs:
POs/COs
PO1
PO2
PO3
PO4
PO5
PO6
PO7
PO8
PO9
PO10
PO11
PO12
PSO1
PSO2
CO1 3 - - - - - - - - - - - - 3
CO2 3 3 - - - - - - - - - - - 3
CO3 3 3 3 - - - - - - - - - - 3
CO4 3 3 3 - - - - - - - - - - 3
TEXT BOOKS:
1. Tom M. Mitchell, Machine Learning, MGH.
2. Peter Harington, Machine Learning in Action, Cengage.
3. Sebastian Raschka, Python Machine Learning, Packt Publishing.
REFERENCE BOOKS:
1. Ethem Alpaydin, Introduction to Machine Learning, PHI.
2. Drew Conway & John Miles Wine, Machine Learing for Hackers, O'Reilly Media.
BLOCKCHAIN TECHNOLOGIES
(PROFESSIONAL ELECTIVE–III)
Subject Code: UGCS7T0318 L T P C
IV Year / I Semester 3 0 0 3
Prerequisites: Familiarity with Information Security and Computer Networks.
Course Objectives: This course introduces the fundamentals and implementation
issues of Block Chain Technologies.
Syllabus:
UNIT I: (8 Lectures)
Grasping Blockchain Fundamentals
Tracing Blockchain’s Origin, The shortcomings of current transaction systems,The
emergence of bitcoin,The birth of blockchain,Revolutionizing the Traditional
Business Network,Exploring a blockchain application, Recognizing the key business
benefits, Building trust with blockchain.
UNIT II: (8 Lectures)
Taking a Look at How Blockchain Works
Why It’s Called “Blockchain”, What Makes a Blockchain Suitable for Business?,
Shared ledger, Permissions, Consensus, Smart contracts ,Identifying Participants
and Their Roles.
UNIT III: (10 Lectures)
Propelling Business with Blockchains
Recognizing Types of Market Friction, Information frictions, Interaction frictions,
Innovation frictions, Moving Closer to Friction-Free Business Networks, Reducing
information friction, Easing interaction friction, Easing innovation friction,
Transforming Ecosystems through Increased Visibility.
UNIT IV: (8 Lectures)
Blockchain in Action: Use Cases
Financial Services,Commercial financing,Trade finance,Cross-border transactions,
Insurance, Government, Supply Chain Management, Healthcare, Electronic medical
records Healthcare payments pre-authorization, The Internet of Things. (IoT)
UNIT V: (8 Lectures)
Hyperledger, a Linux Foundation Project
Hyperledger Vision,Hyperledger Fabric,How Can IBM Help Developers Innovate With
Blockchain? Offering an easily accessible cloud anddevelopment
platform,Individualized attention and industry expertise.
UNIT VI: (8 Lectures)
Problems with Block chain
Security and Safeguards, Protection from attackers, Hacks on exchanges, What is
stopping adoption?, Scalability problems , Network attacks to destroy bitcoin , Case
Study: Failed currencies & blockchain.
Course Outcomes:
Upon completion of this course, the students will be able to: CO 1. Infer and summarize the fundamentals of Block chain.
CO 2. Analyze the working of Block Chain.
CO 3. Explain how business can be easily made with Block chain.
CO 4. Interpret how Block Chain can be integrated with various current
technologies.
CO 5. Examine and test the Block chain strength in providing solutions.
CO 6. Investigate and understand the Problems with Block chain.
Mapping of COs to POs:
POs/ COs
PO 1
PO 2
PO 3
PO 4
PO 5
PO 6
PO 7
PO 8
PO 9
PO 10
PO 11
PO 12
PSO 1
PSO 2
CO1 3 3 - - - - - - - - - - - -
CO2 3 2 3 3 - - - - - - - - - -
CO3 3 3 3 3 - - - - - - - 3 - -
CO4 3 2 3 3 - - - - - 3 - 3 - -
CO5 3 3 3 3 2 - - - - - - 3 - 3
CO6 3 3 3 3 3 - - - - - - 3 - 3
TEXT BOOKS:
1. Manav Gupta, Blockchain for Dummies, IBM Limited Edition, John Wiley & Sons.
REFERENCE BOOKS:
1. Swan, Melanie. Blockchain: Blueprint for a new economy. O'Reilly Media, Inc.
PATTERN RECOGNITION
(PROFESSIONAL ELECTIVE-III)
Subject Code: UGCS7T0418 L T P C
IV Year / I Semester 3 0 0 3
Prerequisites: Familiarity with Probability & Statistics and Image Processing.
Course Objectives: The objective of the course is to make students learn the
fundamentals of pattern recognition and its relevance to classical and modern
problems. To be able to identify where, when and how pattern recognition can be
applied.
Syllabus:
UNIT I: (8 Lectures) Introduction: Is Pattern Recognition Important features, feature vectors, and classifiers, supervised, unsupervised and semi supervised learning. Bayes Decision Theory: Introduction, Bayes Decision Theory. discriminant
functions and decision surfaces. Bayesian classification for normal distributions- the
Gaussian probability density function, the Bayesian classifier for normally distributed
classes.
UNIT II: (9 Lectures) Linear & Non linear Classifiers: Introduction, linear discriminant functions and
decision hyper planes, the perceptron algorithm, Nonlinear Classifiers: introduction,
the xor problem, the two-layer perceptron -classification capabilities of the two-layer
perceptron. three-layer perceptron.
UNIT III: (8 Lectures) Feature Selection: Introduction, Preprocessing- outlier removal, data
normalization, missing data. the peaking phenomenon. class separability measures-
divergence, chernoff bound and Bhattacharya distance scatter matrices.
UNIT IV: (8 Lectures) Supervised Learning: Introduction, error-counting approach, exploiting the finite
size of the data set. a case study from medical imaging. semi supervised learning-
generative models, graph-based methods, and transductive support vector
machines.
UNIT V: (7 Lectures) Un-supervised learning and clustering: Introduction, mixture densities and
identifiability, maximum likelihood estimates, application to normal mixtures, K-
means clustering. Date description and clustering – similarity measures, criteria
function for clustering.
UNIT VI: (9 Lectures) Graph-based methods: Introduction, Hyper graph matching and Algorithms,
Parquet graphs-similarity function, Local Feature Detectors.
Course Outcomes:
Upon completion of this course, the students will be able to: CO 1. Summarize various learning mechanisms, understand Bayesian classification
and concept of Perceptron.
CO 2. Analyze the concept of supervised learning using a case study.
CO 3. Apply the concepts of unsupervised learning and clustering.
CO 4. Compare various graph-based methods in the implementation of pattern
recognition techniques.
Mapping of COs to POs:
POs/ COs
PO 1
PO 2
PO 3
PO 4
PO 5
PO 6
PO 7
PO 8
PO 9
PO 10
PO 11
PO 12
PSO 1
PSO 2
CO1 3 2 3 2 3 - - - 2 2 - 2 - -
CO2 3 3 2 3 2 - - - 2 2 - 2 - -
CO3 3 2 2 3 2 - - - - - - - - -
CO4 3 3 2 2 3 - - - - - - - 2 2
TEXT BOOKS:
1. Sergios Theodoridis, Konstantinos Koutroumbas, Pattern Recognition, Fourth
Edition, Elsevier.
2. Horst Bunke, Abrahmkadel, MarksLast, Applied Pattern Recognition, 2008,
Springer –Verlag Berlin Heidelberg.
REFERENCE BOOKS:
1. Devi & Murthy, Pattern Recognition, Universities Press. 2. Gose, Johnsonbaugh, Jost, Pattern Recognition and Image Analysis, PHI.
SOFT COMPUTING
(PROFESSIONAL ELECTIVE–III)
Subject Code: UGCS7T0518 L T P C
IV Year / I Semester 3 0 0 3
Prerequisites: Basic knowledge in Mathematics and Artificial Intelligence.
Course Objectives The main objective of the course is to expose the students to
soft computing, various types of soft computing techniques and applications of soft
computing.
Syllabus:
UNIT I: (8 Lectures)
Introduction: Neuron, Nerve Structure and Synapse, Artificial Neuron and its Model, Activation Functions.
UNIT II: (8 Lectures)
Neural Network Architecture: Single Layer and Multilayer Feed Forward
Networks, Recurrent Networks. Various Learning Techniques, Perception and
Convergence Rule, Auto-Associative and Hetro-Associative Memory.
UNIT III: (10 Lectures)
Backpropagation Networks Architecture: Perceptron Model, Solution, Single Layer Artificial Neural Network, Multilayer Perception Model, Back Propogation Learning Methods, Effect of Learning Rule Co-Efficient, Back Propagation Algorithm, Factors Affecting Backpropagation Training, Applications. UNIT IV: (8 Lectures)
Fuzzy Logic Introduction: Basic Concepts of Fuzzy Logic, Fuzzy Sets and Crisp Sets, Fuzzy Set Theory and Operations, Properties of Fuzzy Sets, Fuzzy and Crisp Relations, Fuzzy to Crisp Conversion.
UNIT V: (8 Lectures)
Fuzzy Membership and Rules: Membership Functions, Interference in Fuzzy Logic, Fuzzy If-Then Rules, Fuzzy Implications and Fuzzy Algorithms, Fuzzyfications and Defuzzificataions, Fuzzy Controller, Industrial Applications.
UNIT VI: (8 Lectures)
Genetic Algorithms: Basic Concepts, Working Principle, Procedures of GA, Flow Chart of GA, Genetic Representations, (Encoding) Initialization and Selection, Genetic Operators, Mutation, Generational Cycle, Applications.
Course Outcomes:
Upon completion of this course, the students will be able to: CO 1. Demonstrate the nomenclature and basics of soft computing. CO 2. Explain the architecture of Neural Network.
CO 3. Identify the significance of Back propagation Networks Architecture.
CO 4. Analyze the importance of Fuzzy Logic in addressing various real time
problems.
CO 5. Evaluate the fuzziness in the terms of rules and various other parameters.
CO 6. Implement and understand the basics of genetic algorithms.
Mapping of COs to POs:
POs/ COs
PO 1
PO 2
PO 3
PO 4
PO 5
PO 6
PO 7
PO 8
PO 9
PO 10
PO 11
PO 12
PSO 1
PSO 2
CO1 3 2 3 - - - - - - - - - - -
CO2 3 3 3 - - - - - - - - - - -
CO3 3 2 3 - - - - - - - - - - -
CO4 3 3 3 3 - - - - - - - 3 - 3
CO5 3 3 3 3 3 - - - - - - 3 - 3
CO6 3 3 3 3 3 - - - - - 2 3 2 3
TEXT BOOKS:
1. S. Rajsekaran, G.A.Vijayalakshmi Pai ,Neural Networks,Fuzzy Logic and Genetic Algorithm:Synthesis and Applications, , Prentice Hall of India.
2. N.P Padhy ,Artificial Intelligence and Intelligent Systems, Oxford University Press.
REFERENCE BOOKS:
1. Simon Haykin, Neural Networks, Prentice Hall of India. 2. Timothy J.Ross ,Fuzzy Logic with Engineering Applications, McGraw-Hill. 3. Davis E.Goldberg, Genetic Algorithms: Search, Optimization and Machine
Learning, , Addison Wesley, N.Y.
CYBER SECURITY
(PROFESSIONAL ELECTIVE–III)
Subject Code: UGCS7T0618 L T P C
IV Year / I Semester 3 0 0 3
Prerequisites: Familiarity with Computer Networks and Information Security.
Course Objectives: The course will focus on the models, tools, and the
techniques for enforcement of cyber security policies, with some emphasis on the
use of cryptography.
Syllabus:
UNIT I: (8 Lectures)
Introduction to Computer Security: Definition, Threats to security, Government
requirements, Information Protection and Access Controls, Computer security
efforts, Standards, Computer Security mandates and legislation, Privacy
considerations, International security activity.
UNIT II: (7 Lectures)
Cyber Crime Issues: Unauthorized Access to Computers, Computer Intrusions,
White collar Crimes, Viruses and Malicious Code, Internet Hacking and Cracking,
Virus Attacks, Pornography, Software Piracy, Intellectual Property, Mail Bombs,
Exploitation, Stalking and Obscenity in Internet, Digital laws and legislation, Law
Enforcement Roles and Responses.
UNIT III: (10 Lectures)
Secure System Planning and administration: Introduction to the orange book,
Security policy requirements, accountability, assurance and documentation
requirements, Network Security, The Red book and Government network
evaluations.
UNIT IV: (10 Lectures)
Information security policies and procedures: Corporate policies- Tier 1, Tier
2 and Tier3 policies - process management-planning and preparation-developing
policies-asset classification policy-developing standards.
UNIT V: (8 Lectures)
Information security: fundamentals-Employee responsibilities- information
classification Information handling- Tools of information security- Information
processing-secure program administration.
UNIT VI: (7 Lectures)
Organizational and Human Security: Adoption of Information Security
Management Standards, Human Factors in Security- Role of information security
professionals.
Course Outcomes:
Upon completion of this course, the students will be able to: CO 1. Specify tools and architectures to help secure computer and information
systems both proactively and reactively.
CO 2. Describe how cyber attacks against an organization can be monitored and
investigated for actionable intelligence.
CO 3. Apply skills and knowledge to create new responses to emerging cyber
security problems so that they can respond to new attacks as they evolve.
CO 4. Identify components of a modern information system and the threats that
Challenge their security.
CO 5. Identify the risks an organization faces due to cyber threats and recommend
steps to combat those risks.
POs/ COs
PO 1
PO 2
PO 3
PO 4
PO 5
PO 6
PO 7
PO 8
PO 9
PO 10
PO 11
PO 12
PSO 1
PSO 2
CO1 3 2 2 - - 3 2 2 - - - 3 3 3
CO2 3 2 2 2 2 3 3 3 - - - 2 - -
CO3 3 3 3 3 2 3 2 3 - - - 3 3 3
CO4 3 2 2 - 2 2 2 2 - - - 3 - -
CO5 3 2 2 3 2 3 3 2 - - - 3 - 3
TEXT BOOKS:
1. Debby Russell and Sr. G.T Gangemi, "Computer Security Basics (Paperback)”,
2ndEdition, O’ Reilly Media, 2006.
2. Nelson Phillips and Enfinger Steuart, “Computer Forensics and Investigations”,
Cengage Learning, New Delhi, 2009.
3. Thomas R. Peltier, “Information Security policies and procedures: A Practitioner’s
Reference”, 2nd Edition, Prentice Hall.
REFERENCE BOOKS:
1. Kenneth J. Knapp, “Cyber Security and Global Information Assurance: Threat
Analysis and Response Solutions”, IGI Global, 2009.
2. Thomas R Peltier, Justin Peltier and John blackley, ”Information Security
Fundamentals”, 2nd Edition, Prentice Hall.
3. Kevin Mandia, Chris Prosise, Matt Pepe, “Incident Response and Computer
Forensics “, Tata McGraw -Hill, New Delhi, 2006.
DESIGN PATTERNS
(PROFESSIONAL ELECTIVE–III)
Subject Code: UGCS7T0718 L T P C
IV Year / I Semester 3 0 0 3
Prerequisites: Basic knowledge in Software Engineering and Object Oriented
Analysis & Design.
Course Objectives:
This course enables the learners to understand the importance of design patterns
and its principles in object oriented design. It focuses on various principles and
methods related to Identification, functionalizing and summarizing of various
patterns in executing real time problems.
Syllabus:
UNIT I: (7 Lectures)
Introduction: What Is a Design Pattern?, Design Patterns in Smalltalk MVC,
Describing Design Patterns, The Catalogue of Design Patterns, Organizing the
Catalogue, How Design Patterns Solve Design Problems, How to Select a Design
Pattern, How to Use a Design Pattern.
UNIT II: (8 Lectures)
Creational Patterns: Abstract Factory, Builder, Factory Method, Prototype,
Singleton, Double Checked Locking Pattern, Object Pool Pattern Management of
Objects.
UNIT III: (9 Lectures)
Structural Patterns: Adapter, Bridge, Composite. Decorator, Façade, Flyweight,
Proxy.
UNIT IV: (8 Lectures)
Behavioral Patterns - 1: Chain of Responsibility, Command, Interpreter, Iterator,
Mediator.
UNIT V: (9 Lectures)
Behavioral Patterns - 2: Memento, Observer, State, Strategy, Template Method,
Visitor.
UNIT VI: (7 Lectures)
A Case Study: Designing a Document Editor: Design Problems, Document
Structure, Formatting, Embellishing the User Interface, Supporting Multiple Look-
and-Feel Standards, Supporting Multiple Window Systems, User Operations Spelling
Checking and Hyphenation.
Course Outcomes:
Upon completion of this course, the students will be able to: CO 1. Identify the design patterns to solve object oriented design problems.
CO 2. Determine Creational and Structural Patterns for given Application.
CO 3. Evaluate Design Solutions by using Behavioral Patterns.
CO 4. Design new patterns by Analyzing and Combining existing patterns in
software design.
Mapping of COs to POs:
POs/ COs
PO 1
PO 2
PO 3
PO 4
PO 5
PO 6
PO 7
PO 8
PO 9
PO 10
PO 11
PO 12
PSO 1
PSO 2
CO1 3 3 3 - - - - - - - - - - -
CO2 3 3 3 3 3 - 1 2 - - - - - -
CO3 3 3 3 - 3 - 1 2 - - - - 2 2
CO4 3 3 3 - 3 - - 2 3 2 3 2 3 2
TEXT BOOKS:
1. Erich Gamma, Richard Helm, Ralph Johnson and John Vlissides, Design Patterns, Pearson Education.
2. Eric Freeman, Kathy Sierra, Head First Design Patterns, 1st Edition, O'Reilly Media.
3. Jason McColm Smith, Elemental design Patterns, 1st Edition, Pearson Education.
REFERENCE BOOKS:
1. Mark Grand, Pattern’s in JAVA Vol-I, Wiley DreamTech. 2. Mark Grand, Pattern’s in JAVA Vol-II, Wiley DreamTech. 3. Mark Grand, JAVA Enterprise Design Patterns Vol-III, Wiley DreamTech. 4. Alan Shalloway, James R.Trott, Design Patterns Explained, 2nd Edition, Pearson
Education.
DATA ANALYTICS (ASSOCIATE ANALYTICS – II)
(PROFESSIONAL ELECTIVE–III)
Subject Code: UGCS7T0818 L T P C
IV Year / I Semester 3 0 0 3
Prerequisites: Familiarity with Database Management Systems and Data
Warehousing & Data Mining.
Course Objectives: This course provides an introduction to big data analytics for
all business professionals, including those with no prior analytics experience.
Students will learn how data analysts describe, predict, and inform business
decisions in the specific areas of marketing, human resources, finance, and
operations, and students will develop basic data literacy and an analytic mindset
that will help you make strategic decisions based on data.
Syllabus:
UNIT I: Maintain Healthy, Safe & Secure Working Environment
(8 Lectures)
Introduction, workplace safety, Report Accidents & Emergencies, Protect health &
safety as your work, course conclusion, assessment.
UNIT II: Provide Data/Information in Standard Formats (8 Lectures)
Introduction, Knowledge Management, Standardized reporting & compliances,
Decision Models, course conclusion, Assessment.
UNIT III: Introduction to Predictive Analytics & Linear Regression
(9 Lectures)
What and Why Analytics, Introduction to Tools and Environment, Application of
Modelling in Business, Databases & Types of data and variables, Data Modelling
Techniques, Missing imputations etc.Need for Business Modelling, Regression –
Concepts, Blue property assumptions-Least Square Estimation, Variable
Rationalization, and Model Building etc.
UNIT IV: Logistic Regression Objective Segmentation (9 Lectures)
Model Theory, Model fit Statistics, Model Conclusion, Analytics applications to
various Business Domains etc, Regression Vs Segmentation – Supervised and
Unsupervised Learning, Tree Building – Regression, Classification, Overfitting,
Pruning and complexity, Multiple Decision Trees etc.
UNIT V: Time Series Mothods/Forecasting, Feature Extraction
(9 Lectures)
Arima, Measures of Forecast Accuracy, STL approach, Extract features from
generated model as Height, Average, Energy etc and Analyze for prediction.
Develop Knowledge, Skill and Competences: Introduction to Knowledge skills
& competences, Training & Development, Learning & Development, Policies and
Record keeping, etc.
Unit VI: Working with Documents (7 Lectures)
Standard Operating Procedures for documentation and knowledge sharing, Defining
purpose and scope documents, Understanding structure of documents – case
studies,articles, white papers, technical reports, minutes of meeting etc., Style and
format, Intectual Property and Copyright, Document preparation tools – Visio,
PowerPoint, Word, Excel etc., Version Control, Accessing and updating corporate
knowledge base, Peer review and feedback.
Course Outcomes:
Upon completion of this course, the students will be able to: CO 1. Understand and apply the procedures in knowledge managements, reporting
& compliances and practice how to maintain healthy, safe & secure working
environment.
CO 2. Experiment with tools and environment to conduct predictive analysis and
regression on different types of databases and variables.
CO 3. Build models with statistical fit using regression, segmentation, supervised
and unsupervised learning methods for applications to various business
domains.
CO 4. Model time series analysis, feature extraction with prediction accuracy, and
develop knowledge, skill and competence towards policy making and record
keeping.
CO 5. Summarize operating procedures for documentation, copyright, IPR with case
studies.
Mapping of COs to POs:
POs/
COs
PO
1
PO
2
PO
3
PO
4
PO
5
PO
6
PO
7
PO
8
PO
9
PO
10
PO
11
PO
12
PSO
1
PSO
2
CO1 3 3 - - - 3 3 3 2 2 - - - -
CO2 3 3 3 3 3 - - - - - - 3 - 3
CO3 3 3 3 3 3 - - - - - - - - 3
CO4 3 3 3 3 3 - - - - - - - - -
CO5 3 3 3 3 - 3 - 3 - 3 - - - 3
TEXT BOOKS:
1. Tan, Steinbach and Kumar, Introduction to Data Mining, Addison Wesley. 2. M. Zaki and W. Meira, Data Mining Analysis and Concepts,
http://www.dataminingbook.info/uploads/book.pdf
REFERENCE BOOKS:
1. Jure Leskovec, Anand Rajaraman, Milliway Labs, Jeffrey D. Ullman, Mining of
Massive Datasets, Stanford Univ.
2. http://www.vistrails.org/index.php/Course:_Big_Data_Analysis.
DATA SCIENCE WITH R LAB
Subject Code: UGCS7P0918 L T P C
IV Year / I Semester 0 0 3 1.5
Prerequisites: Familiarity with R programming and Data Mining.
Course Objectives: Data Science with R labs lets students learn R programming language that is deployed for varied purposes like graphics representation, statistical analysis and reporting. With this R Programming lab students will be able to get a clear understanding of the core concepts, import data in various formats for statistical computing, data manipulation, business analytics, machine learning algorithms and data visualization. They will learn about the various functions, data structures, variables and flow of control. List of Programs:
1. Write a program to illustrate the working of Countdown function. 2. Write a program to Simulate Random Number Game. 3. Calculate the median of number using Vector. 4. Write a pogrom to compute Matrix Multiplication . 5. Write a program which simulates Filtering of Data using R. 6. Write a program which simulates Match and Sample in R. 7. Implement Linear Regression in R. 8. Write a program to write into CSV in R. 9. Write a program to Illustrate READING of .CSV FILE. 10. Write a program to Illustrate the use of cat() function with R code. 11. Write a program to Illustrate to save a plot as pdf image. 12. Perform k-means clustering algorithm. 13. Perform naïve bayes classifier algorithm. 14. Perform decision tree algorithm. 15. Perform PCA in R.
Course Outcomes:
Upon completion of this course, the students will be able to: CO 1. Demonstrate R language constructs and data visualization tools by applying
on various data files.
CO 2. Experiment with available pre-processing techniques in R language packages.
CO 3. Implement association, classification and clustering technique to discover
knowledge in datasets.
Mapping of COs to POs:
POs/ COs
PO 1
PO 2
PO 3
PO 4
PO 5
PO 6
PO 7
PO 8
PO 9
PO 10
PO 11
PO 12
PSO 1
PSO 2
CO1 3 3 3 3 3 - - 3 3 3 - - 3 -
CO2 3 3 3 3 3 - - 3 3 3 - 3 3 3
CO3 3 3 3 3 3 - - 3 3 3 - 3 3 3
TEXT BOOKS: 1. Robert I. Kabacoff, R in Action-Data analysis and graphics with R, 2e, Manning
Publications 2. David Dietrich, Barry Heller, and Beibei Yang, Data Science & Big Data Analytics:
Discovering, Analyzing, Visualizing and Presenting Data, EMC Education Services, John Wiley & Sons, Inc.
REFERENCE BOOKS: 1. Garrett Grolemund, Hands-On Programming with R, Orielly. 2. Paul Teetor, R Cookbook, O’Reill.
MACHINE LEARNING LAB
Subject Code: UGCS7P1018 L T P C
IV Year / I Semester 0 0 3 1.5
Prerequisites: Familiarity with Python programming.
Course Objectives: This course helps the students to implement various machine
learning techniques.
List of Experiments:
Week 1:
Introduction to numpy
1. Write a python program to check whether two random arrays A and B are
equal or not.
2. Write a python program to get the n largest values of an array.
Week 2:
Introduction to pandas
1. Load the energy data from the file ‘Energy%20Indicators.xls’
(http://unstats.un.org/unsd/environment/excel_file_tables/2013/Energy%20I
ndicators.xls), which is a list of indicators of energy supply and renewable
electricity production for the year 2013, into a DataFrame with name
‘energy’.
2. Write a python program to build the cartesian product (every combinations of
every item) for given arbitrary number of vectors.
Week 3:
Linear Algebra
1. Write a python program to get value of x for given linear equations.
2. Write a python program to find Eigen analysis for given a matrix.
Week 4:
Linear Regression
1. Write a python program to predict the age of abalone by using MNIST data
set.
Week 5:
Logistic Regression
1. Write a python program to estimate horse fatalities from collc by using
MNIST data set.
Week 6:
Decision Tree Learning
1. Write a python program to get contact lens type(MNIST data set) by using
decision tree.
Week 7:
Introduction to Tensorflow
1. Write a python program for Handwritten Digit Recognition(MNIST data set)
by using ANN.
Week 8:
Introduction to Scikit-learn
1. Write a python program for Handwritten Digit Recognition(MNIST data set)
by using KNN.
Course Outcomes: Upon completion of this course, the students will be able to: CO 1. Perform experiments in Machine Learning using real-world data. CO 2. Apply preprocessing techniques on data sets using python libraries. CO 3. Design the neural network model for specific problem using both tensorflow
and scikit-learn libraries and compare their efficiency. CO 4. Interpret and present the predicted outcome of a problem after applying a
machine learning model on the training data.
Mapping of COs to POs:
POs/ COs
PO1
PO2
PO3
PO4
PO5
PO6
PO7
PO8
PO9
PO 10
PO 11
PO 12
PSO1
PSO2
CO1 3 3 3 - 3 - - 3 3 3 - - - 3
CO2 3 3 3 - 3 - - 3 3 3 - - - 3
CO3 3 3 3 - 3 - - 3 3 3 - - - 3
CO4 - 3 3 - 3 - - 3 3 3 - - - 3
TEXT BOOKS:
1. Tom M. Mitchell ,Machine Learning , MGH.
2. Peter Harington ,Machine Learning in Action, Cengage.
3. Sebastian raschka ,Python Machine Learning, Packt Publishing.
REFERENCE BOOKS:
1. Ethem Alpaydin, Introduction to Machine Learning, PHI.
2. Drew Conway & John Miles Wine ,Machine Learing for Hackers, O'Reilly Media.
INTERNET OF THINGS
(FREE ELECTIVE-I)
Subject Code: UGCS8T0118 L T P C
IV Year / II Semester 3 0 0 3
Prerequisites: Familiarity with Microprocessors and Microcontrollers.
Course Objectives: Students will be explored to the interconnection and
integration of the physical world and the cyber space. They are also able to design
& develop IOT enabled Devices.
Syllabus:
UNIT I: (8 Lectures)
Introduction to Internet of Things: Introduction: Definition of IoT,
Fundamental Characteristics of IoT, Design Considerations for IoT Applications.
UNIT II: (8 Lectures)
Basic layered architecture for IoT: Device Layer, Network Layer, Service and
Application Support Layer, Application Layer, Structure of IoT, Logical design of IoT.
UNIT III: (8 Lectures)
Key enabling Technologies: Platforms: Hardware, SoC, Sensors, Bluetooth, BT-
LE, iBeacon. Protocols: Identification and Tracking Technologies: RFID, NFC,
Zigbee and GPS Communication Technologies: Wireless Networks, WSN, 3G, LTE,
IPv6. IoT protocols: HTTP, CoAp, Websocket, MQTT, XMPP, DDS, AMQP, SDN and
NFV for IoT.
UNIT IV: (8 Lectures)
Services and attributes for IoT: Gateway, Raspberry Pi, Arduino, Cloud
Computing and IoT, Big-Data Analytics and Visualization, Dependability, Security,
Localization, Maintainability.
UNIT V: (8 Lectures)
Internet of Things in Practice: IoT levels and Deployment templates, IoT for
Smart Cities, IoT for Agriculture, IoT for Traffic Management and Transportation, Iot
in the Home, Iot in Retail, IoT in Healthcare, IoT in Sports.
UNIT VI: (10 Lectures)
Challenges and Future Trends: Research challenges: Technical Challenges,
Standardization, Information Security and Privacy Protection, Research Trends.
Course Outcomes:
Upon completion of this course, the students will be able to: CO 1. Explain the fundamentals of IOT.
CO 2. Interpret the architectural layered view of the IOT.
CO 3. Analyze the basic protocols of IOT.
CO 4. Design IOT applications in various domains and able to analyze the
performance.
CO 5. Integrate IOT Applications with Embedded Platform to enhance the future.
Mapping of COs to POs:
POs/
Cos
PO
1
PO
2
PO
3
PO
4
PO
5
PO
6
PO
7
PO
8
PO
9
PO
10
PO
11
PO
12
PSO
1
PSO
2
CO1 3 3 - - 3 - - - - - - - - -
CO2 3 3 - - 3 - - - - - - - - -
CO3 3 3 - - 3 - - - - - - - - 2
CO4 3 3 2 3 3 2 - 2 2 2 2 - - 2
CO5 3 3 3 3 3 3 2 2 3 2 3 3 - 3
TEXT BOOKS:
1. Arshadeep Bhaga, Vijay madisetti, IoT A hands on approach,University Press.
2. Ovidiu Vermesan, Peter Friess, Internet of Things – From Research and
Innovation to Market Deployment, River Publishers.
3. Ovidiu Vermesan, Peter Friess, Internet of Things – Converging Technologies for
Smart Environments and Integrated Ecosystems, River Publishers.
REFERENCE BOOKS:
1. Olivier Hersent, David Boswarthick, Omar Elloumi, The Internet of Things: Key
Applications and Protocols, Wiley.
2. Ovidiu Vermesan, Peter Friess, Building the Hyperconnected Society, River
Publishers.
HUMAN COMPUTER INTERACTION
(FREE ELECTIVE–I)
Subject Code: UGCS8T0218 L T P C
IV Year / II Semester 3 0 0 3
Prerequisites: Basic concepts of system analysis and design and exposure to
various user interface designs related to web and mobile.
Course Objectives: This course enables the learners to have skills towards
principles and theories influencing the human computer interaction and different
ways to select an effective style for a specific application. It focuses on concepts like
managing design processes, different user interface elements and commands,
interaction devices, quality of service, balancing function and fashion, user
documentation and online help information search, information visualization for an
effective applications design.
Syllabus:
UNIT I: (8 Lectures) Introduction: Importance of user Interface – definition, importance of good design, Benefits of good design, A brief history of Screen design. UNIT II: (9 Lectures) The graphical user interface – popularity of graphics, the concept of direct manipulation, graphical system, Characteristics, Web user – Interface popularity, characteristics- Principles of user interface. UNIT III: (9 Lectures) Design process – Human interaction with computers, importance of human characteristics human consideration, Human interaction speeds, understanding business junctions. UNIT IV: (8 Lectures) Screen Designing: Design goals – Screen planning and purpose, organizing screen elements, ordering of screen data and content – screen navigation and flow – Visually pleasing composition – amount of information – focus and emphasis – presentation information simply and meaningfully – information retrieval on web – statistical graphics – Technological consideration in interface design. UNIT V: (8 Lectures) Windows – New and Navigation schemes, selection of window, selection of devices based and screen based controls. UNIT VI: (8 Lectures) Components – text and messages, Icons and increases – Multimedia, colors, uses problems, choosing colors. Software tools – Specification methods, interface – Building Tools.
Course Outcomes:
Upon completion of this course, the students will be able to:
CO 1. Interpret the basic principles of user interface & GUI design concepts. CO 2. Apply interactive design principles in real-time application development with
client and system requirements. CO 3. Classify various interface design components by using modern tools.
Mapping of COs to POs:
POs/
COs
PO
1
PO
2
PO
3
PO
4
PO
5
PO
6
PO
7
PO
8
PO
9
PO
10
PO
11
PO
12
PSO
1
PSO
2
CO1 3 - - - - - - - - - - 3 - -
CO2 3 - 3 - 3 3 - - 3 3 3 3 - -
CO3 3 - 3 - 3 3 - - - - - 3 - -
TEXT BOOKS:
1. Wilbert O Galitz, “The Essential Guide To User Interface Design”, Wiley DreamaTech.
2. Ben Shneidermann, “Designing The User Interface”, 3rd Edition, Pearson Education Asia.
REFERENCE BOOKS:
1. Alan Dix, Janet Fincay, Gre Goryd, Abowd, Russell Bealg, “Human Computer
Interaction”, Pearson.
2. Prece, Rogers, Sharps, “Interaction Design”, Wiley Dreamtech.
3. Soren Lauesen, “User Interface Design”, Pearson Education.
HIGH PERFORMANCE COMPUTING (FREE ELECTIVE–I)
Subject Code: UGCS8T0318 L T P C
IV Year / II Semester 3 0 0 3
Prerequisites: Familiarity with Computer Organization and Architecture.
Course Objectives: This course covers the design of advanced modern computing
systems. In particular, the design of modern microprocessors, characteristics of the
memory hierarchy, and issues involved in multi-threading and multi-processing.
Syllabus:
UNIT I: (8 Lectures)
Introduction to Parallel hardware and software, need for high performance systems
and Parallel Programming, SISD, SIMD, MISD, MIMD models, Performance issues.
UNIT II: (8 Lectures)
Processors, PThreads, Thread Creation, Passing arguments to Thread function,
Simple matrix multiplication using Pthreads, critical sections, mutexes, semaphores,
barriers and conditional variables, locks, thread safety, simple programming
assignments.
UNIT III: (10 Lectures)
Open MP Programming: introduction, reduction clause, parallel for-loop scheduling,
atomic directive, critical sections and locks, private directive, Programming
assignments, n body solvers using openMP.
UNIT IV: (8 Lectures)
Introduction to MPI programming: MPI primitives such as MPI_Send, MPI-Recv,
MPI_Init, MPI-Finalize, etc., Application of MPI to Trepizoidal rule, Collective
Communication primitives in MPI, MPI derived datatypes, Performance evaluation of
MPI programs, Parallel sorting algorithms, Tree search solved using MPI,
Programming Assignments.
UNIT V: (8 Lectures)
Introduction to GPU computing, Graphics pipelines, GPGPU, Data Parallelism and
CUDA C Programming, CUDA Threads Organization, Simple Matrix multiplication
using CUDA, CUDA memories.
UNIT VI: (8 Lectures)
Bench Marking and Tools for High Performance Computing Environments, Numerical
Linear Algebra Routines BLAS for Parallel Systems evaluation.
Course Outcomes:
Upon completion of this course, the students will be able to: CO 1. Demonstrate the need of high performance Computing systems.
CO 2. Relate Process synchronization concepts and tools for high performance
Computing systems.
CO 3. Summarize the architectural features in the GPU computing.
CO 4. Illustrate the techniques of MP and MPI programming.
Mapping of COs to POs:
POs/
COs
PO
1
PO
2
PO
3
PO
4
PO
5
PO
6
PO
7
PO
8
PO
9
PO
10
PO
11
PO
12
PSO
1
PSO
2
CO1 3 3 - - - 1 - - 2 - - 2 - 3
CO2 3 3 - - 3 1 - 1 2 - - 2 - 3
CO3 3 3 3 3 3 1 2 - 2 - - 2 - 3
CO4 3 3 3 3 3 1 - - 2 - 3 2 - 3
TEXT BOOKS:
1. Peter S Pacheco ,An Introduction to Parallel Programming, Elsevier.
2. Kirk & Hwu ,Programming Massively Parallel Processors, Elsevier.
REFERENCE BOOKS:
1. Jason, Sanders, . Edward Kandrit, CUDA by example: An introduction to General
Purpose GPU Programming, Perason.
2. Shame Cook ,CUDA Programming, Elsevier.
3. Jack Dongarra, Alexey & Lastovetsky ,High Performance Heterogeneous
Computing, Wiley.
4. Michel J.Quinn ,Parallel computing theory and practice, TMH.
COMPUTER FORENSICS
(FREE ELECTIVE–I)
Subject Code: UGCS8T0418 L T P C
IV Year / II Semester 3 0 0 3
Prerequisites: Basic knowledge in Data Mining, Probability and Statistics.
Course Objectives: The aim of this course is to provide students with a
comprehensive overview of collecting, investigating, preserving, and presenting
evidence of cyber-crime left in digital storage devices. This course introduce topics
of forensic data examination of computers and digital storage media, understand file
system basics to locate hidden files, extract data and preserve it for analysis. Also,
students will get awareness of tools for e-discovery, Legal aspects for different types
of investigations.
Syllabus:
UNIT I: (9 Lectures)
Introduction: Introduction to Computer Forensics, Uses of Digital Forensics-
Criminal Investigations, Civil Litigation, Intelligence, Benefits of Professional
Forensics Methodology, Phases of Computer Forensics, Locard's Exchange Principle,
Scientific Method, Organizations of Note- SWGDE, AAFS, ASCLD/LAB, NIST, ASTM,
Role of the Forensic Examiner in the Judicial System.
UNIT II: (7 Lectures)
Evidence Collection: Why Collect Evidence? Collections Options, Obstacles, Types
of Evidence, The Rules of Evidence, Collecting Evidence-Crime Scenes and Collecting
Evidence, Documenting the Scene, Chain of Custody, Cloning, Live System versus
Dead System, Hashing, Final Report.
UNIT III: (7 Lectures)
Duplication and Preservation of Digital Evidence: : Preserving the Digital
Crime Scene, Computer Evidence Preserving Processing Steps, Legal Aspects of
Collecting and Preserving Computer Forensic Evidence. Computer Image
Verification and Authentication: Special Needs of Evidential Authentication,
Practical Consideration.
UNIT IV: (9 Lectures)
Windows System Artifacts-Introduction, Deleted Data, Hibernation File (Hiberfile.Sys), Registry, Print Spooling, Recycle Bin, Metadata, Thumbnail Cache, Most Recently Used (MRU), Restore Points and Shadow Copy, Prefetch, Link Files. Current Computer Forensic Tools: Evaluating Computer Forensic Tool Needs, Computer Forensics Software Tools, Computer Forensics Hardware Tools, Validating and Testing Forensics Software. Computer Forensics Analysis and Validation: Validating Forensic Data, Addressing Data-Hiding Techniques, Performing Remote Acquisitions.
UNIT V: (9 Lectures)
Network Forensics: Network Forensics Overview, Performing Live Acquisitions,
Developing Standard Procedures for Network Forensics, Using Network Tools,
Examining the Honeynet Project. Capturing Network Traffic: Using
tcpdump/WinDump, Using Wireshark, Using SPAN Ports or Taps, Using Fiddler,
Firewalls, Decipherment of a TCP Segment, Network Forensics Evidence Generated
with Snort.
UNIT VI: (9 Lectures)
Email Investigations: Exploring the Role of E-Mail in Investigation, Exploring the
Role of Client and Server in E-Mail, Investigating E-Mail Crimes and Violations,
Understanding E-Mail Servers, Using Specialized E-Mail Forensic Tools. Cell Phone
and Mobile Device Forensics: Understanding Mobile Device Forensics,
Understanding Acquisition Procedures for Cell Phones and Mobile Devices.
Course Outcomes:
Upon completion of this course, the students will be able to: CO 1. Develop and implement computer forensics investigative procedures. CO 2. Conduct and evaluate the systematic collection of evidence at private-sector
incident scenes. CO 3. Discuss and analyze computer forensics findings. CO 4. Illustrate the use of computer forensics tools used in data analysis, such as
searching, absolute disk sector viewing and editing, recovery of files, password cracking, etc. CO 5. Implement and evaluate numbers of methodologies for validating and testing
computer forensics tools and evidence. CO 6. Exhibit forensics ethical behavior and comply with professional conduct
requirements.
Mapping of COs to POs:
POs/
COs
PO
1
PO
2
PO
3
PO
4
PO
5
PO
6
PO
7
PO
8
PO
9
PO
10
PO
11
PO
12
PSO
1
PSO
2
CO1 3 3 3 - - 3 3 3 - 3 3 3 3 3
CO2 3 2 2 2 2 3 3 3 - 2 3 3 2 2
CO3 3 3 3 3 2 3 2 3 3 - 3 3 2 3
CO4 3 2 2 - 2 2 2 2 - 3 3 3 2 2
CO5 3 2 3 3 2 3 3 2 - - 3 3 2 3
CO6 3 3 2 - - 3 3 3 3 - 2 3 3 3
TEXT BOOKS:
1. John Sammons, The Basics of Digital Forensics: The Primer for Getting Started in
Digital Forensics, Syngress Media.
2. Phillips Nelson, Steuart, Guide to Computer Forensics and Investigations, 3rd
Edition CENGAGE Learning.
3. JhonR.Vacca, Computer Forensics, Computer crime investigation, Firewall Media.
REFERENCE BOOKS:
1. Clint P. Garrison, Digital Forensics for network, Internet and Cloud Computing-A
Forensic Evidence Guide for moving Targets and Data, Syngress publications.
2. Christopher L. T. Brown, Computer Evidence: Collection and Preservation, 2nd
Edition, Cengage Learning.
3. Keith J. Jones, Richard Bejtlich, Curtis W. Rose, Real Digital Forensics, Addison-
Wesley Pearson Education.
4. Tony Sammes and Brian Jenkinson, Forensic Compiling, A Practitioner’s Guide,
Springer International edition.
5. Christopher L.T. Brown, Computer Evidence Collection & Presentation, Firewall
Media.
6. Robert M.Slade, Software Forensics Collecting Evidence from the Scene of a
Digital Crime, TMH, Wiley India Edition.
DEEP LEARNING
(FREE ELECTIVE–I)
Subject Code: UGCS8T0518 L T P C
IV Year / II Semester 3 0 0 3
Prerequisites: Familiarity with Probability & Statistics, Design and Analysis of
Algorithms.
Course Objectives: The objective of the course is to provide exposure to these
advances and facilitate in depth discussions on deep learning.
Syllabus:
UNIT I: (8 Lectures)
Machine Learning Basics
Learning Algorithms, Capacity, Over fitting and Under fitting , Hyper parameters and
Validation Sets , Estimators, Bias and Variance , Maximum Likelihood ,Estimation
Bayesian Statistics.
Supervised Learning Algorithms ,Unsupervised Learning Algorithms , Stochastic
Gradient Descent , Building a Machine Learning Algorithm , Challenges Motivating
Deep Learning.
UNIT II: (8 Lectures)
Deep Feedforward Networks
Example: Learning XOR, Gradient-Based Learning, Hidden Units, Architecture
Design, Back-Propagation and Other Differentiation Algorithms.
UNIT- III: (8 Lectures)
Regularization for Deep Learning
Parameter Norm Penalties, Norm Penalties as Constrained Optimization,
Regularization and Under-Constrained Problems, Dataset Augmentation, Noise
Robustness, Semi-Supervised Learning, Multitask Learning.
UNIT IV: (8 Lectures)
Optimization for Training Deep Models
How Learning Differs from Pure Optimization, Challenges in Neural Network
Optimization, Basic Algorithms, Parameter Initialization Strategies, Algorithms with
Adaptive Learning Rates, Approximate Second-Order Methods, Optimization
Strategies and Meta-Algorithms.
UNIT V: (10 Lectures)
Convolutional Networks
The Convolution Operation, Motivation, Pooling, Convolution and Pooling as an
Infinitely Strong Prior, Efficient Convolution Algorithms, Random or Unsupervised
Features, The Neuroscientific Basis for Convolutional Networks.
UNIT VI: (8 Lectures)
Sequence Modeling: Recurrent and Recursive Nets
Unfolding Computational Graphs, Recurrent Neural Networks, Bidirectional RNNs,
Deep Recurrent Networks, Recursive Neural Networks, The Challenge of Long-Term
Dependencies, Optimization for Long-Term Dependencies, Explicit Memory.
Course Outcomes: Upon completion of this course, the students will be able to: CO 1. Demonstrate the basics of Machine Learning.
CO 2. Analyze the importance of deep feed forward networks.
CO 3. Summarize the significance of regularization for Deep Learning.
CO 4. Implement optimization in DL.
CO 5. Perceive the importance of Convolutional Networks and its significance.
CO 6. Illustrate the knowledge on Sequence Modeling.
Mapping of COs to POs:
POs/
COs
PO
1
PO
2
PO
3
PO
4
PO
5
PO
6
PO
7
PO
8
PO
9
PO
10
PO
11
PO
12
PSO
1
PSO
2
CO1 3 3 3 - - - - - - - - - - -
CO2 3 3 3 2 - - - - - - - - - -
CO3 3 3 3 - - - - - - - - - - -
CO4 3 3 3 2 3 - - - - 3 - 3 - 3
CO5 3 3 3 3 - - - 3 - - - 3 - 3
CO6 3 3 3 3 - - - - - - - - - -
TEXT BOOKS:
1. Goodfellow, I., Bengio, Y., Courville, A., & Bengio, Y. Deep learning,Vol. 1. Cambridge: MIT press.
2. François Duval , Deep Learning: Deep Learning for Beginners. Practical Guide with Python and Tensorflow, Data Sciences Publishing.
REFERENCE BOOKS: 1. Sebastian Raschka, Vahid Mirjalili,Python Machine Learning: Machine. Learning
and Deep Learning with Python, scikit-learn, and TensorFlow, 2nd Edition, Packt
Publishing.
SOCIAL NETWORKS AND SEMANTIC WEB
(FREE ELECTIVE–II)
Subject Code: UGCS8T0618 L T P C
IV Year / II Semester 3 0 0 3
Prerequisites: Familiarity with Computer Networks and Data Mining.
Course Objectives: The objective of this course is to make understand the
students about the context based semantic integration of multiple Web resources
and expose semantically enriched social data to the public domain. In order to turn
these objectives into reality, the students will be taught with concepts such as
knowledge representation, management, extraction, integration and analysis, to
address and fix the challenging issues in social networking and semantic web.
Syllabus:
UNIT I: (8 Lectures)
The Semantic web: Limitations of the current Web, The semantic solution,
Development of the Semantic Web, The emergence of the social web.
UNIT II: (9 Lectures)
Social Network Analysis: What is network analysis?, Development of Social Network
Analysis, Key concepts and measures in network analysis. Electronic sources for
network analysis: Electronic discussion networks, Blogs and online communities,
Web-based networks.
UNIT III: (9 Lectures)
Knowledge Representation on the Semantic Web: Ontologies and their role in the
Semantic Web, Ontology languages for the semantic Web.
UNIT IV: (8 Lectures)
Modeling and Aggregating Social Network Data: State of the art in network data
representation, Ontological representation of Social individuals, Ontological
representation of social relationships, Aggregating and reasoning with social
network data.
UNIT V: (8 Lectures)
Developing social semantic applications: Building Semantic Web applications with
social network features, Flink- the social networks of the Semantic Web community,
Open academia: distributed, semantic-based publication management.
UNIT VI: (8 Lectures)
Evaluation of Web-Based Social Network Extraction: Differences between survey
methods and electronic data extraction, context of the empirical study, Data
collection, Preparing the data, Optimizing goodness of fit, Comparison across
methods and networks, Predicting the goodness of fit, Evaluation through analysis.
Course Outcomes:
Upon completion of this course, the students will be able to: CO 1. Demonstrate key concepts of semantic web and revolutionize the WWW. CO 2. Build knowledge base for semantic web using ontology engineering and
develop social semantic applications. CO 3. Illustrate social network analysis and model social network data.
CO 4. Analyze social network data to predict goodness of fit.
Mapping of COs to POs:
POs/
COs
PO
1
PO
2
PO
3
PO
4
PO
5
PO
6
PO
7
PO
8
PO
9
PO
10
PO
11
PO
12
PSO
1
PSO
2
CO1 3 3 3 3 - - - - - - - - - -
CO2 3 3 - - - - - - - - - 3 - 3
CO3 3 3 3 - - - - - - - - 3 - 3
CO4 3 3 3 3 - - - - - - - 3 - 3
TEXT BOOKS:
1. Peter Mika, Social Networks and the Semantic Web,Springer,2007.
2. J.Davies,Rudi Studer, and Paul Warren, Semantic Web Technologies,Trends and
Research in Ontology Based Systems, John Wiley & Sons.
REFERENCE BOOKS:
1. Liyang Lu Chapman and Hall, Semantic Web and Semantic Web Services, CRC
Publishers. (Taylor & Francis Group)
2. Heiner Stuckenschmidt and Frank Van Harmelen, Information Sharing on the
semantic Web, Springer Publications.
E-COMMERCE
(FREE ELECTIVE–II)
Subject Code: UGCS8T0718 L T P C
IV Year / II Semester 3 0 0 3
Prerequisites: Basic concepts of business approach, marketing, project
management, computer architecture, computer algorithms and online business
transactional process.
Course Objectives:
This course enables the learners to have exposure towards modern e-business and
e-commerce systems in the present era. It focuses on various principles, challenges
and implementation processes related to electronic payment systems, inter-
organizational commerce, corporate digital library, consumer search and resource
discovery, and multimedia. Learners will get exposure to various real-time practices
and approaches of the e-commerce systems through this course.
Syllabus:
UNIT I: (12 Lectures)
Electronic Commerce: Frame work, anatomy of E-Commerce applications, E-
Commerce Consumer applications, E-Commerce organization applications,
Consumer Oriented Electronic commerce, Mercantile Process models.
UNIT II: (5 Lectures)
Electronic Payment Systems: Smart Cards, Credit Cards, Risks in Electronic
Payment systems.
UNIT III: (8 Lectures)
Inter Organizational Commerce: EDI, EDI Implementation, Value added
networks, Intra Organizational Commerce - work Flow, Automation Customization
and internal Commerce, Supply chain Management.
UNIT IV: (10 Lectures)
Corporate Digital Library: Document Library, digital Document types, corporate Data Warehouses, Advertising and Marketing - Information based marketing, Advertising on Internet, on-line marketing.
UNIT V: (8 Lectures)
Consumer Search and Resource Discovery: Information search and Retrieval,
Commerce Catalogues, Information, Filtering.
UNIT VI: (7 Lectures)
Multimedia - key multimedia concepts, Digital Video and electronic Commerce,
Desktop video processings, Desktop video conferencing.
Course Outcomes:
Upon completion of this course, the students will be able to: CO 1. Interpret the basic principles of e-commerce systems and its applications
from different perspectives. CO 2. Classify different types of electronic payment systems and inter-
organizational commerce. CO 3. Make use of technology trends, consumer search and resource discovery to
manage e-commerce. CO 4. Interpret different multimedia concepts applicable in e-business. Mapping of COs to POs:
POs/
COs
PO
1
PO
2
PO
3
PO
4
PO
5
PO
6
PO
7
PO
8
PO
9
PO
10
PO
11
PO
12
PSO
1
PSO
2
CO1 3 - - - 2 - - - - - - 2 - -
CO2 3 - - - 2 - - - 2 2 - 2 - -
CO3 2 - 2 - 3 2 - - 2 2 - 2 - -
CO4 2 - 2 - 2 2 - - - - - 2 - -
TEXT BOOKS:
1. Kalakata and Whinston, Frontiers of electronic commerce , Pearson.
REFERENCE BOOKS:
1. Hendry Chan, Raymond Lee, Tharam Dillon and Ellizabeth Chang, E-Commerce Fundamentals and Applications, John Wiley.
2. S.Jaiswal, E-Commerce, Galgotia. 3. Efrain Turbon, Jae Lee, David King, H.Michael Chang, E-Commerce, Pearson. 4. Gary P.Schneider , Electronic Commerce, Thomson.
MOBILE APPLICATION DEVELOPMENT
(FREE ELECTIVE–II)
Subject Code: UGCS8T0818 L T P C
IV Year / II Semester 3 0 0 3
Prerequisites: Familiarity with Computer Networks, Operating Systems and
Database Management Systems.
Course Objectives: The objective of this course is to understand how android
applications work, their life cycle, manifest, intents, and using external resources. To
design and develop useful android applications with compelling user interfaces by
using, extending and creating your own layouts and views and using menus. To
explain the differences between android and other mobile development
environments to build android apps.
Syllabus: UNIT I: (9 Lectures) Mobile Communications - Overview: Wireless transmission, voice and data communication standards – 1G/2G/3G/4G, WPAN, WLAN, applications, limitations, mobile computing architecture, overview on mobile devices and systems. GSM: services, system architecture, radio interface, localization, call handling, handover, security, GPRS, EDGE. UNIT II: (7 Lectures) Introduction to Android- Overview of Android, Android Architecture, Exploring the designer,Adding Components, Applying behaviors, Android- SDK, Emulators – What is an Emulator/Android AVD, Android Emulation – Creation and set up, First Android Application. UNIT III: (9 Lectures) Android Activities and GUI Design Concepts – Enabling buttons, Reading Text Input, Inserting images, painting canvas, picking list items, checking boxes, storing data, Intent, Activity, Activity Lifecycle and Manifest, Creating Application and new Activities, Activity and implicit intents. Controlling Progress- Composing Programs, Defining variables, performing operations, branching flow, providing alternatives, Notifying messages, Looping Concepts. UNIT IV: (8 Lectures) Advanced UI Programming- Input Controls, Alerts and Pickers, using an option with Menu and Radio buttons, using the App bar and Tabs for Navigation, Drawables, Styles and themes, Material Design: Lists, Cards and Colors. UNIT V: (9 Lectures) Working in the background- Background tasks- create an AsyncTask, connect to the AsyncTask and AsyncTaskLoader, Broadcast receivers, Triggering, Scheduling and Optimizing Background Tasks.
UNIT VI: (8 Lectures) Toast, Menu, Dialog, List and Adapter- Menu: Basics, Custom v/s System Menus, Create and Use Handset menu Button (Hardware), Dialog : Creating and Altering Dialogs, Basic operation of SQLite Database, Android Application Priorities. Course Outcomes:
Upon completion of this course, the students will be able to: CO 1. Demonstrate knowledge of different voice and data communication
standards.
CO 2. Outline the android architecture.
CO 3. Identify the various features and the processes to develop the android
application.
CO 4. Design and develop the android applications by considering the legal and
Security issues.
Mapping of COs to POs:
POs/
COs
PO
1
PO
2
PO
3
PO
4
PO
5
PO
6
PO
7
PO
8
PO
9
PO
10
PO
11
PO
12
PSO
1
PSO
2
CO1 3 3 - - - - - - - - - - - -
CO2 3 - - - - - - - - - - - - -
CO3 3 3 - 3 3 - - - - - - - - -
CO4 3 3 3 3 3 2 - 2 - - - - 3 -
TEXT BOOKS:
1. Raj Kamal, Mobile Computing, Second Edition, Oxford press. 2. Mike Mcgrath, Building Android Apps in easy steps, McGraw-Hill Education.
REFERENCE BOOKS:
1. Reto Meier, Professional Android 2 Application Development, Wiley India Pvt Ltd.
2. Mark L Murphy, Beginning Android, Wiley India Pvt Ltd.
3. Android Developer Fundamental Course, Practical Workbook, developed by
Google Developer Training Team.
4. https://developer.android.com/guide/platform/index.html.
SCRIPTING LANGUAGES
(FREE ELECTIVE–II)
Subject Code: UGCS8T0918 L T P C
IV Year / II Semester 3 0 0 3
Prerequisites: Familiarity with programming language constructs of Java, HTML
and JavaScript.
Course Objectives: This course demonstrates an in depth understanding of the
tools and the scripting languages necessary for design and development of
applications.
Syllabus:
UNIT I: (9 Lectures)
Introduction to Scripting and PERL: Scripts and Programs, Origin of Scripting,
Scripting Today, Characteristics of Scripting Languages, Uses of Scripting
Languages, Web Scripting and the Universe of Scripting Languages. PERL- Names
and Values, Variables, Scalar Expressions, Control Structures, Arrays, List, Hashes,
Strings, Pattern and Regular Expressions, Subroutines.
UNIT II: (8 Lectures)
Advanced PERL: Finer Points of Looping, Pack and Unpack, File System, Eval,
Data Structures, Packages, Modules, Objects, Interfacing to the Operating System,
Creating Internet Ware Applications, Dirty Hands Internet Programming, Security
Issues.
UNIT III: (8 Lectures)
BootStrap: The Framework, BootStrap Grid, Components: Glyphicons, Button
Groups, NavBar, Pagination, BreadCrumb, Thumbnail.
jQuery- Introduction, Syntax, Selectors, Events, Jquery CSS Classes, Traversing.
UNIT IV: (7 Lectures)
Advanced JavaScript: Browser Management and Media Management, Classes,
Constructors, Object-Oriented Techniques in JavaScript, Object Constructor and
Prototyping , Sub Classes and Super Classes and JSON.
UNIT V: (8 Lectures)
TCL: TCL Structure, Syntax, Variables and Data in TCL, Control Flow, Data
Structures, Input/Output, Procedures, Strings, Patterns, Files, Advance TCL-Eval,
Source, Exec and Uplevel Commands, Namespaces, Trapping Errors, Event Driven
Programs, Making Applications Internet Aware, Nuts and Bolts Internet
Programming, Security Issues, C Interface. Tk-Visual Tool Kits, Fundamental
Concepts of Tk, Tk By Example, Events and Binding , Perl-Tk.
UNIT VI: (8 Lectures)
AngularJS: Introduction, MVC Architecture, Simple Application, Directives,
Expressions, Controllers, Filters, Tables, HTML DOM, Modules, Forms, Events, Input,
Validation, Http, Includes, Views, Scopes, Services and Custom Directives.
Course Outcomes:
Upon completion of this course, the students will be able to: CO 1. Analyze requirements of software systems for the purpose of determining the
suitability of implementing scripts in Perl.
CO 2. Build Responsive Web Applications using Bootstrap and jQuery.
CO 3. Experiment with JavaScript to construct dynamic applications and JSON to
upload data to a back-end web server.
CO 4. Explain fundamental concepts and various scripting constructs of TCL/TK
and run scripts using TCL/TK.
CO 5. Develop an Angular JS application from scratch.
Mapping of COs to POs:
POs/
COs
PO
1
PO
2
PO
3
PO
4
PO
5
PO
6
PO
7
PO
8
PO
9
PO
10
PO
11
PO
12
PSO
1
PSO
2
CO1 3 - - - 3 - - - - - - - 2 -
CO2 3 - 3 - - - - - - - - - 2 -
CO3 3 3 3 - - - - - - 3 - - 2 -
CO4 3 3 3 - 3 - - - - 3 - - 3 -
CO5 3 3 3 - 3 - - - - - - - 3 -
TEXT BOOKS:
1. David Barron, The World of Scripting Languages, Wiley Publications.
REFERENCE BOOKS:
1. Thomas A Powell, Fritz Schneider, JavaScript: The Complete Reference, Third
Edition, TataMcGraw Hill.
2. Riwanto Megosinarso, Step By Step Bootstrap 3: A Quick Guide to Responsive
Web Development Using Bootstrap.
3. Learning AngularJS: A Guide to AngularJS Development 1st Edition, Kindle
Edition.
INNOVATION AND NEW PRODUCT DEVELOPMENT
(FREE ELECTIVE–II)
Subject Code: UGCS8T1018 L T P C
IV Year / II Semester 3 0 0 3
Prerequisites: Basic concepts of various products and their models, problem-
solving skills, critical thinking and business approach.
Course Objectives:
The objective of this course is to introduce a new product development approach to
learners. It includes concepts like innovation management, fuzzy front-end of
innovation, product design, project management development and launching.
Learners will get exposure of exhibiting their creativity in terms of a innovative
product development in a structured process through this course.
Syllabus:
UNIT I: (6 Lectures)
Introduction to New Product Development (NPD): Creativity, Innovation and
Invention - differences; Creativity types; Innovation types - Jugaad Innovation,
Social Innovation, Sustaining Innovation, Disruptive Innovation, Open Innovation.
UNIT II: (7 Lectures)
Innovation Management: Causes of failure in NPD; Structured process of
innovation; Stage-GateTM process of Innovation - 5 stages and 4 gates model -
Opportunity Identification stage, Concept generation stage, Concept Evaluation
stage, Development stage and Commercialization stage.
UNIT III: (10 Lectures)
Fuzzy Front-End of Innovation: Opportunity Identification - Internal and
External sources - Market Opportunity Analysis (MOA); Concept Generation - Brain
Storming, Problem Analysis, Scenario Analysis, Convergent and Divergent Thinking.
UNIT IV: (10 Lectures)
Product Design: Usability and User experience design; Product Architecture;
Industrial Design; Design for Manufacturing. Concept Evaluation: Estimating
revenues for the innovation using Sales Forecasting ATAR model, Concept Testing.
UNIT V: (10 Lectures)
Project Management: Triple Constraint, Work Breakdown Structure, Gantt chart
and Risk Management; Typical metrics used in NPD.
UNIT VI: (7 Lectures)
Development and Launch: Manufacturing planning for pilot production; Sales &
Service planning.
Course Outcomes:
Upon completion of this course, the students will be able to: CO 1. Interpret the basic principles & types of innovation in new product
development.
CO 2. Apply innovation process management with opportunity identification and
concept generation.
CO 3. Analyze innovative product design and study it’s working.
CO 4. Apply project management strategies in new product development,
production and its launch.
Mapping of COs to POs:
POs/
COs
PO
1
PO
2
PO
3
PO
4
PO
5
PO
6
PO
7
PO
8
PO
9
PO
10
PO
11
PO
12
PSO
1
PSO
2
CO 1 3 2 2 3 - 2 2 - - - - 2 3 3
CO 2 3 3 3 3 3 3 3 - 2 2 - 2 3 3
CO 3 3 3 3 3 3 3 3 - 2 2 - 2 3 3
CO 4 3 2 2 3 - 2 2 - - - 2 2 3 3
TEXT BOOKS:
1. Anthony Di Benedetto and Merle Crawford, New Products Management, Tata
McGraw Hill.
2. Clayton Christensen, Innovators Dilemma, Harper Collins Publishers.
REFERENCE BOOKS:
1. Karl T Ulrich, Steven D Eppinger and Anita Goyal, Product Design &
Development, Tata McGraw Hill.
2. List of web sites suggested to enrich student's learning on NPD:
a. http://www.pdma.org
b. http://www.ennovient.com (Read FREE online courses on Creativity and
Innovation)
INFORMATION SECURITY MANAGEMENT (SECURITY ANALYST – I)
(FREE ELECTIVE–II)
Subject Code: UGCS8T1118 L T P C
IV Year / II Semester 3 0 0 3
Prerequisites: Familiarity with Computer Networks.
Course Objectives: The Students learn different types of threats and attacks, data
leakage, prevent them by applying policies, roles and responsibilities of information
security, in addition to that security audits, mechanisms for auditing, generating of
audit reports and post audit actions to be taken, and social engineering.
Syllabus:
UNIT I: Information Security Management (8 Lectures) Information Security Overview, Threats and Attack Vectors, Types of Attacks, Common Vulnerabilities and Exposures (CVE), Security Attacks, Computer Security Concerns, Information Security Measures etc., Key Elements of Networks, Logical
Elements of Network, Critical Information Characteristics, Information States.
UNIT II: Data Leakage (8 Lectures) What is Data Leakage and statistics, Data Leakage Threats, Reducing the Risk of Data Loss, Key Performance Indicators (KPI), and Database Security.
UNIT III: Information Security Policies, Procedures and Audits (7 Lectures)
Information Security Policies necessity key elements & characteristics, Security Policy Implementation, Configuration, Security Standards-Guidelines & Frameworks. Security Roles & Responsibilities, Accountability, Roles and Responsibilities of Information Security Management, team-responding to emergency situation-risk
analysis process.
UNIT IV: Information Security Performance Metrics and Audit (9 Lectures)
Security Metrics and Reporting, Common Issues and Variances of Performance Metrics, Introduction to Security Audit, Servers and Storage devices, Infrastructure and Networks, Communication Routes, Information Security Methodologies (Black-box, White-box, Grey-box), Phases of Information Security Audit and Strategies,
Ethics of an Information Security Auditor.
UNIT V: Information Security Audit Tasks, Reports and Post Auditing Actions (8 Lectures) Pre-audit checklist, Information Gathering, Vulnerability Analysis, External Security Audit, Internal Network Security Audit, Firewall Security Audit, IDS Security Auditing, Social Engineering Security Auditing, Web Application Security Auditing, Information Security Audit Deliverables & Writing Report, Result Analysis, Post Auditing Actions, Report Retention.
UNIT VI: Vulnerability Management (10 Lectures) Information Security Vulnerabilities – Threats and Vulnerabilities, Human-based Social Engineering, Computer-based Social Engineering, Social Media Countermeasures, Vulnerability Management – Vulnerability Scanning, Testing,
Threat management, Remediation etc.
Course Outcomes:
Upon completion of this course, the students will be able to: CO 1. Identify and analyze the types of threats and vulnerabilities, security policies
and data leak.
CO 2. Critically evaluate security audits methodologies and post audit actions to be
taken.
CO 3. Analyze and identify the threats and vulnerabilities of the system at network
and web application levels.
CO 4. Classify protection mechanisms for different types of social engineering.
CO 5. Protect the website from attacks by using vulnerability management.
Mapping of COs to POs:
POs/ COs
PO 1
PO 2
PO 3
PO 4
PO 5
PO 6
PO 7
PO 8
PO 9
PO 10
PO 11
PO 12
PSO 1
PSO 2
CO1 3 3 3 - - - - - - - - - - -
CO2 3 3 3 3- - - - - - - - - - -
CO3 3 3 3 3 - - - - - - - - - 3
CO4 3 3 3 3 - - - - - - - - -
CO5 2 3 3 2 - - - - - - - 2 - -
CO6 2 3 3 2 - - - - - - - 2 - -
TEXT BOOKS:
1. Michael E.Whitman and Herbert J.Mattord, Management of Information Security ,
2nd edition from course Technology.
2. A Vladimirov, K.Gavrilenko, and A.Michajlowski, Assessing Information Security
(strategies, tactics, logic and framework) , BPB publications.
REFERENCE BOOKS:
1. Peter Szor, “The Art of Computer Virus Research and Defense.” Addison-Wesley
Professional, 2005.
2. Richard O'Hanley, James S. Tiller, Information Security Management Handbook,
Sixth Edition, CRC Press.
3. Harold F. Tipton, Micki Krause Nozaki, Information Security Management
Handbook, Sixth Edition, CRC Press.
WEB SERVICES
(FREE ELECTIVE–III)
Subject Code: UGCS8T1218 L T P C
IV Year / II Semester 3 0 0 3
Prerequisites: The student should have knowledge in Java programming, Software
architecture and design.
Course Objectives: This course is concerned with the evolution, emergence, design, implementation and deployment of web services. The course covers theory with an emphasis on SOAP based web services and associated standards such as XML, WSDL and UDDI. The study of SOAP based Web Services is complemented by coverage of REST based Web Services. Syllabus: UNIT I: (8 Lectures) Evolution and Emergence of Web Services: Evolution of distributed computing, core distributed computing technologies- Client/server, COBRA, JAVA, RMI, Microsoft DCOM, MOM, challenges in distributed computing, role of J2EE and XML in distributed computing, Common characteristics of contemporary SOA, Emergence of web services and Service Oriented Architecture(SOA). Introduction to Web Services: The definition of web services, How a Web Service Works , Basic operational model of web services, Tools and technologies enabling web services, Benefits and challenges of using web services. UNIT II: (7 Lectures) Web Services Architecture: Web Services Architecture and its characteristics, Core building blocks of web services, Standards and technologies available for implementing web services, Web services communication models, Basic steps of implementing web services. Describing Web Services: WSDL- WSDL in the world of Web Services, Web Services life cycle, anatomy of WSDL definition document, WSDL bindings, WSDN tools, limitation of WSDL, Introduction to RESTful WS. UNIT III: (8 Lectures) Core Fundamentals of SOAP: SOAP message structure, SOAP encoding, SOAP message exchange models, SOAP communication and messaging, SOAP security. Developing Web Services using SOAP: Building SOAP Web Services, developing SOAP Web Services using java and Axis, limitations of SOAP, Advanced messaging. UNIT IV: (9 Lectures) Discovering Web Services: Service discovery, role of services discovery in a SOA, Service discovery mechanisms, UDDI- UDDI Registries, uses of UDDI Registry, Programming with UDDI, UDDI data structures, Publishing API, publishing, Searching and deleting information in a UDDI Registry, Limitations of UDDI. UNIT V: (8 Lectures) Web Services Interoperability: Means of ensuring interoperability, Overview of .NET, creating an .NTE client for an Axis web service, creating java client for a web service, Challenges in web services interoperability. Web Services Security: XML
security frame work, goals of cryptography, hash cipher, symmetric cipher, asymmetric cipher, XML encryption, digital signature, digital certificate, XML encryption, SAML, structure. UNIT VI: (8 Lectures) Overview of Service Oriented Architecture: SOA concepts, key service characteristics, Technical Benefits of SOA. SOA and Web Services: Web services Platform, service–level data models, discovery, Security and interaction patterns, Atomic and composite services, Service-level communication and alternative transports. Course Outcomes:
Upon completion of this course, the students will be able to: CO 1. Critically evaluate different architectural alternatives, techniques and
methodologies for composing Web services.
CO 2. Analyze the Core Fundamentals of SOAP for developing web service Communication model.
CO 3. Design web service by Understand UDDI registry. CO 4. Discover the web services interoperability along with web services security. CO 5. Infer the knowledge of SOA concepts and characteristics its technical benefits
and the importance of SOA and web services in solving business problems.
Mapping of COs to POs:
POs/
COs
PO
1
PO
2
PO
3
PO
4
PO
5
PO
6
PO
7
PO
8
PO
9
PO
10
PO
11
PO
12
PSO
1
PSO
2
CO1 3 3 3 - 3 - - - 3 - 3 - 3 -
CO2 3 3 2 - 3 - - - 3 - 3 - 3 -
CO3 3 3 3 - 3 - - - 3 - 3 - 3 -
CO4 3 3 3 - 3 - - - 3 - 3 - 3 -
CO5 3 3 3 - 3 - - - 3 - 3 - 3 -
TEXT BOOKS:
1. R.Nagappan, R.Skoczylas, R.P.Sriganesh, Developing java web services,Wiley India.
2. Eric Newcomer and Greg Lomow, Understanding SOA with web services, Pearson Edition.
3. James McGovern, Sameer Tyagi, Michael Stevens Sunil Mathew, Java web service architecture, Morgan Kaufmann Publishers.
REFERENCE BOOKS:
1. S.Graham and others, Building web services with java, 2nd Edition, Pearson Edition.
2. D.A.Chappell and T.Jewell, Java web services, O’Reilly. 3. Richard Monson-Haefel, J2EE web services, Pearson Education. 4. G.Alonso, F.Casati and others, Web services, Springer-2005. 5. S.Chatterjee, J.Webber, Developing enterprise web services, Pearson
Education. 6. F.P.Coyle, XML, web services and data revolution, Pearson Education.
VIRTUAL REALITY
(FREE ELECTIVE–III)
Subject Code: UGCS8T1318 L T P C
IV Year / II Semester 3 0 0 3
Prerequisites: Familiarity with Computer Graphics and Pattern Recognition.
Course Objectives: This course introduces virtual reality, emphasizing basic
applications in education and other fields. Students can select special projects
according to their interests, and build a virtual environment.
Syllabus:
UNIT I: (7 Lectures)
Introduction: The three I’s of virtual reality, commercial VR technology and the
five components of a VR system.
UNIT II: (7 Lectures)
Input Devices: (Trackers, Navigation and Gesture Interfaces): Three- dimensional
position trackers, navigation and manipulation, interfaces and gesture interfaces.
Output Devices: Graphics displays, sound displays and haptic feedback.
UNIT III: (8 Lectures)
Modeling: Geometric modeling, kinematics modeling, physical modeling, behavior
modeling, model management.
UNIT IV: (8 Lectures)
Human Factors: Methodology and terminology, user performance studies, VR
health and safety issues.
UNIT V: (8 Lectures)
Applications: Medical applications, military applications, robotics applications.
UNIT VI: (11 Lectures)
VR Programming-I: Introduction JAVA 3D, loading and manipulating external
models, using a lathe to make shapes. VR Programming-II: 3D Sprites, animated
3D sprites, particle systems.
Course Outcomes: Upon completion of this course, the students will be able to: CO 1. Illustrate the fundamental techniques, processes used in virtual reality.
CO 2. Identify the required input/output devices and human factors for developing
VR applications.
CO 3. Analyse various modeling techniques in Virtual reality and its management for
different application domains.
CO 4. Demonstrate various applications of VR environment through VR
Programming.
Mapping of COs to POs:
POs/
COs
PO
1
PO
2
PO
3
PO
4
PO
5
PO
6
PO
7
PO
8
PO
9
PO
10
PO
11
PO
12
PSO
1
PSO
2
CO1 3 2 - - - - - - - - - - - -
CO2 2 3 3 - - - - - - - - - - -
CO3 2 2 3 - - - - - - - - - - -
CO4 2 3 - - - 2 - - - - - - - -
TEXT BOOKS: 1. Gregory C. Burdea & Philippe Coiffet, Virtual Reality Technology, Second
Edition, John Wiley & Sons Inc. 2. Andrew Davison, Killer Game Programming in Java, Oreilly-SPD.
REFERENCE BOOKS:
1. William R.Sherman, Alan Craig, Understanding Virtual Reality, interface,
Application and Design, Elsevier (Morgan Kaufmann).
2. Bill Fleming, 3D Modeling and surfacing, Elsevier (Morgan Kauffman).
MOBILE ADHOC AND SENSOR NETWORKS
(FREE ELECTIVE-III)
Subject Code: UGCS8T1418 L T P C
IV Year / II Semester 3 0 0 3
Prerequisites: Familiarity with Computer Networks.
Course Objectives: Upon completion of this course, students will be able to know
the characteristics of adhoc and sensor networks, study various MAC and routing
protocols, and provide security to MANET and WSN.
Syllabus: UNIT I: (8 Lectures) Introduction: Fundamentals of Wireless Communication Technology, The Electromagnetic Spectrum, Radio propagation Mechanisms, Characteristics of the Wireless Channel, mobile adhoc networks (MANETs) and wireless sensor networks (WSNs) :concepts and architectures, Applications of adhoc and Sensor networks. Design Challenges in adhoc and Sensor Networks. UNIT II: (7 Lectures) MAC Protocols for Adhoc Wireless Networks: Issues in designing a MAC Protocol, Classification of MAC Protocols, Contention based protocols, Contention based protocols with Reservation Mechanisms, Contention based protocols with Scheduling Mechanisms, Multichannel MAC Protocol. UNIT III: (9 Lectures) Routing Protocols and Transport Layer in Ad-hoc Wireless Networks: Issues in designing a routing and Transport Layer protocol for adhoc networks, proactive routing, reactive routing (on-demand), hybrid routing, Classification of Transport Layer solutions, TCP over Adhoc wireless Networks. UNIT IV: (9 Lectures) Wireless Sensor Networks (WSNS) and MAC Protocols: hardware and software components of a sensor node, WSN Network architecture, data dissemination, data gathering, MAC layer protocols: self-organizing, Hybrid TDMA based MAC- IEEE 802.15.4. UNIT V: (8 Lectures) WSN Routing, Localization and WSN QOS: Issues in WSN routing, LEACH, CBRP, Localization-Based Routing, QOS in WSN. UNIT VI: (8 Lectures) Security in MANETS and WSNS: Security issues in mobile adhoc networks (MANETs), Key management mechanisms in MANETs, Security issues in wireless sensor networks (WSNs), Key management mechanisms in WSNs.
Course Outcomes:
Upon completion of this course, the students will be able to: CO 1. Distinguish the various concepts and architectures of adhoc networks and
the analyze the challenges at various layers and applications. CO 2. Summarize the protocols used at the MAC layer and develop MAC and routing
protocols for sensor and mobile networks. CO 3. Outline various information dissemination protocols for sensor and mobile
Networks. CO 4. Describe the principles of wireless sensor networks and mobile adhoc
and their impact on protocol design. CO 5. Illustrate the various mechanisms needed to address the issue of the security
in adhoc networks.
POs/
COs
PO
1
PO
2
PO
3
PO
4
PO
5
PO
6
PO
7
PO
8
PO
9
PO
10
PO
11
PO
12
PSO
1
PSO
2
CO1 3 3 3 - - 3 - 2 - - - 3 - 3
CO2 3 2 3 2 2 3 3 3 - - - 3 - 2
CO3 3 3 3 3 3 3 2 3 - - - 3 3 3
CO4 3 2 2 - 3 2 2 2 - - - 3 2 3
CO5 3 2 2 3 2 3 3 2 - - - 3 3 3
TEXT BOOKS: 1. C. Siva Ram Murthy, and B. S. Manoj, AdHoc Wireless Networks: Architectures
and Protocols, Prentice Hall Professional Technical Reference, 2008. 2. Carlos De Morais Cordeiro, Dharma Prakash Agrawal, AdHoc & Sensor Networks:
Theory and Applications, World Scientific Publishing Company, 2006. REFERENCE BOOKS: 1. Feng Zhao and Leonides Guibas,Wireless Sensor Networks, Elsevier Publication
– 2002. 2. Holger Karl and Andreas Willig, Protocols and Architectures for Wireless Sensor
Networks, John Wiley, 2005. 3. Kazem Sohraby, Daniel Minoli, & Taieb Znati, Wireless Sensor Networks-
Technology, Protocols, and Applications, John Wiley, 2007.
ETHICAL HACKING
(FREE ELECTIVE–III)
Subject Code: UGCS8T1518 L T P C
IV Year / II Semester 3 0 0 3
Prerequisites: Familiarity with Computer Networks and Information Security.
Course Objectives: This course introduces the concepts of Ethical Hacking and
gives the students the opportunity to learn about different tools and techniques in
hacking and security. This makes students to understand how perimeter defenses
work, escalate privileges and lead them to know about scanning and attacking of
networks. Students will also learn about Intrusion Detection, Policy Creation, Social
Engineering, DDoS Attacks, Buffer Overflows and Virus Creation.
Syllabus:
UNIT I: Introduction (9 Lectures) Hacking (Effects, Types, Purpose, advantages and disadvantages), Types of Hackers, Types of Cybercrimes, Ethical Hacking, Types of Data Stolen from the Organizations and its protection, Elements of Information Security (Confidentiality, Integrity, Availability, Authentication, Non – repudiation and Access control), Information Security Challenges, Penetration Testing (Objectives, Types, preliminary knowledge of Process), Role of Security Penetration Tester, Benefits of a Penetration Testing Methodology, Penetration Testing Methodology, Networking and Computer Attacks and its protection. UNIT II: Malicious Software (7 Lectures) Protection and detection of malicious software (Virus, Macro virus, Worms, Trojan programs, Spyware & Adware), Protection against from all Malware, Intruder Attacks on Networks and Computers (including Proxy and Packet Filtering, Denial of Service, Sniffer.), Addressing Physical Security, Key Loggers and its types, Back Doors. UNIT III: Pre – Attack Phase (9 Lectures) Foot Printing: Web Tools for Foot Printing (Purpose, Types, Techniques), Conducting Competitive Intelligence and Techniques, Google Hacking, Scanning (Types and Methodologies), Steps of Scanning, Types of port scanning, Scanning Tools: NMAP, Angry IP Scanner, Advanced IP Scanner, Types of Pings, Enumeration and its different tools. Social Engineering: Shoulder Surfing, Dumpster Driving, Piggybacking. UNIT IV: Data Security (8 Lectures) Physical Security - Attacks and Protection, Steganography – Methods, Attacks and Measures, Cryptography – Methods and Types of Attacks, Wireless Hacking, Windows Hacking, Linux Hacking.
UNIT V: Network Protection System (9 Lectures) Routers, Firewalls & Honeypots, Web Filtering, Vulnerability, Penetration, Testing, Session Hijacking, Web Servers, SQL Injection, Cross Site Scripting, Exploit Writing, Buffer Overflow, Reverse Engineering, E-mail Hacking, Bluetooth Hacking, Mobile Phone Hacking. UNIT VI: Ethical Hacking Laws and Tests (8 Lectures) Legal, Professional and Ethical Issues, Ethical Responsibilities, Professional Integrity, Host Reconnaissance, Session Hijacking, Hacking Web servers, Databases, Password Cracking, Methodical Penetration Testing.
Course Outcomes:
Upon completion of this course, the students will be able to: CO 1. Interpret several types of hacking, elements and challenges in information
security, penetration testing methodology for data protection.
CO 2. Learn techniques to detect and protect networks and computers from
malicious software’s by using Foot Printing and Scanning Tools.
CO 3. Summarize data protection techniques and network protection systems.
CO 4. Choose relevant legal and ethical hacking laws to apply on Hackers and
Intruders.
Mapping of COs to POs:
POs/
COs
PO
1
PO
2
PO
3
PO
4
PO
5
PO
6
PO
7
PO
8
PO
9
PO
10
PO
11
PO
12
PSO
1
PSO
2
CO1 3 3 - - 3 3 - 3 2 2 - 3 - -
CO2 3 3 - - 3 - - 3 2 2 - 3 - 3
CO3 3 3 - - - - - 3 2 2 - 3 - -
CO4 3 3 - - 3 3 - 3 2 2 - 3 - -
TEXT BOOKS:
1. Michael T. Simpson, Kent Backman, James E Corley, Hand-On Ethical
Hacking and Network Defense, Second Edition, CENGAGE Learning.
REFERENCE BOOKS:
1. Manthandesai, Basics of Ethical hacking, Hacking for beginners, Hacking
Tech.
2. Patrick Engebretson, The Basics of Hacking and Penetration Testing
Ethical Hacking and Penetration Testing Made Easy, Syngress –Elsevier.
INFORMATION RETRIEVAL SYSTEMS
(FREE ELECTIVE–III)
Subject Code: UGCS8T1618 L T P C
IV Year / II Semester 3 0 0 3
Prerequisites: Basic concepts of Database Management Systems, Data Mining
and Web.
Course Objectives:
The course focuses on learning the difference between Information Retrieval and
Data Base Management Systems. The course focuses on the basic concepts of
Information Retrieval systems and its working principles. It focuses concepts of
cataloging and indexing, Inverted Files, signature files, automatic indexing, user
search and visualization techniques, text search algorithms, information system
evaluation. It also provides an emphasis on various real time applications of the IRS.
Syllabus:
UNIT I: (6 Lectures)
Introduction: Definition, Objectives, Functional Overview, Relationship to DBMS,
Digital libraries and Data Warehouses, Information Retrieval System Capabilities -
Search, Browse, Miscellaneous.
UNIT II: (8 Lectures)
Cataloging and Indexing: Objectives, Indexing Process, Automatic Indexing,
Information Extraction.
UNIT III: (8 Lectures)
Data Structures: Introduction, Stemming Algorithms, Inverted file structures, N-
gram data structure, PAT data structure, Signature file structure, Hypertext data
structure. Automatic Indexing: Classes of automatic indexing, Statistical indexing.
UNIT IV: (8 Lectures)
Automatic Indexing: Natural language, Concept indexing, Hypertext linkages.
Document and Term Clustering: Introduction, Thesaurus generation, Item
clustering, Hierarchy of clusters.
UNIT V: (12 Lectures)
User Search Techniques: Search statements and binding, Similarity measures
and ranking, Relevance feedback, Selective dissemination of information search,
Weighted searches of Boolean systems, Searching the Internet and hypertext.
Information Visualization: Introduction, Cognition and perception, Information
visualization technologies.
UNIT VI: (8 Lectures)
Text Search Algorithms: Introduction, Software text search algorithms, Hardware
text search systems. Information System Evaluation: Introduction, Measures
used in system evaluation, Measurement example – TREC results.
Course Outcomes:
Upon completion of this course, the students will be able to: CO 1. Interpret the basic principles of information retrieval systems.
CO 2. Relate the indexing process and data structures used in real-time IRS
CO 3. Relate the implementation of automatic indexing; document & term
clustering in IRS.
CO 4. Analyze user search techniques and information visualization in the IRS.
CO 5. Interpret the implementation of text search algorithms along with the
evaluation of information retrieval.
Mapping of COs to POs:
POs/ COs
PO 1
PO 2
PO 3
PO 4
PO 5
PO 6
PO 7
PO 8
PO 9
PO 10
PO 11
PO 12
PSO 1
PSO 2
CO1 2 - - - - - - - - - - 2 - 2
CO2 3 3 - - - - - - 2 2 - 2 - 2
CO3 3 3 3 3 - - - - 2 2 - 2 - 2
CO4 3 3 3 3 3 - - - 2 2 - 2 - 2
CO5 3 3 3 3 3 - - - - - - 2 - 2
TEXT BOOKS:
1. Kowalski, Gerald, Mark T May bury Kluwer , Information Storage and
Retrieval Systems: Theory and Implementation, Academic Press (Chapter
1,2- Unit I, Chapter 3,4-Unit-II,Chapter 5,6-Unit-III, Chapter 7,8 Unit-IV,
Chapter 9,11 Unit-V).
2. David A Grossman and Ophir Frieder, Information Retrieval: Algorithms and
Heuristics, 2nd Edition, Springer International Edition (Chapter 3 Unit-II,
Chapter 3 Unit III).
REFERENCE BOOKS:
1. William B Frakes, Ricardo Baeza-Yates, Information Retrieval Data Structures
and Algorithms, Pearson Education.
2. Robert Korfhage , Information Storage & Retrieval, John Wiley & Sons.
3. Christopher D. Manning and Prabhakar Raghavan, Introduction to
Information Retrieval, Cambridge University Press, 2008.
INFORMATION SECURITY INCIDENT RESPONSE & MANAGEMENT
(SECURITY ANALYST–2)
(FREE ELECTIVE–III)
Subject Code: UGCS8T1718 L T P C
IV Year / II Semester 3 0 0 3
Prerequisites: Familiarity with Computer Networks.
Course Objectives: The Students will learn the Vulnerability Assessment with
phases, the configuration network devices, router, banner, firewall, VPN,
identification of unauthorized devices, strategy for incident management and data
backup policies, and malicious codes and its handling incidents.
Syllabus: UNIT I: Information Security Assessments (10 Lectures)
Vulnerability Assessment, Classification, Types of Vulnerability Assessment, Vulnerability Assessment Phases, Vulnerability Analysis Stages, Characteristics of a Good Vulnerability Assessment Solutions &Considerations, Vulnerability Assessment Reports – Tools and choosing a right Tool, Information Security Risk Assessment, Risk Treatment, Residual Risk, Risk Acceptance, Risk Management Feedback Loops. UNIT II: Configuration Reviews (7 Lectures)
Introduction to Configuration Management, Configuration Management Requirements-Plan-Control, Development of configuration Control Policies, Testing Configuration Management. Managing Information Security Services: Configuring Network Devices, Identifying Unauthorized Devices, Testing the Traffic Filtering Devices, Configuring Router, Configuring Modes – Router/Global/Interface/Line/Privilege EXEC/ROM/User EXEC, Configuring a banner/Firewall/Bastion Host/VPN server. UNIT III: Troubleshooting Network Devices and Services (7 Lectures)
Introduction & Methodology of Troubleshooting, Troubleshooting of Network Communication-Connectivity-Network Devices-Network Slowdowns-Systems-Modems. Information Security Incident Management & Data Backup: Information Security Incident Management overview-Handling-Response, Incident Response Roles and Responsibilities, Incident Response Process. Data Back introduction, Types of Data Backup and its techniques, Developing an Effective Data Backup Strategy and Plan, Security Policy for Back Procedures. UNIT IV: Log Correlation (8 Lectures)
Computer Security Logs, Configuring& Analyzing Windows Logs, Log Management-Functions & Challenges, Centralized Logging and Architecture, Time Synchronization – NTP/NIST. UNIT V: Handling Network Security Incidents (8 Lectures)
Network Reconnaissance Incidents, Network Scanning Security Incidents, Network Attacks and Security Incidents, Detecting DoS Attack, DoS Response Strategies, Preventing/stopping a DoS Incident etc.
UNIT VI: Handling Malicious Code Incidents (10 Lectures)
Incident Handling Preparation, Incident Prevention, Detection of Malicious Code, Containment Strategy, Evidence Gathering and Handling, Eradication and Recovery, Recommendations etc.
Course Outcomes:
Upon completion of this course, the students will be able to: CO 1. Demonstrate critical thinking and systematically apply Risk Management
concepts to address strategic organisational IS/IT/Information security issues.
CO 2. Critically reflect on and evaluate the challenges and impact of a multitude of
factors to IS/IT/Information Security management.
CO 3. Evaluate the mechanisms of data backups and Identify different types
security logs.
CO 4. Analyze network security incidents from attacks and their presentation.
CO 5. Identification & removal of malicious code and recommendation for
recovering the system.
Mapping of COs to POs:
POs/ COs
PO 1
PO 2
PO 3
PO 4
PO 5
PO 6
PO 7
PO 8
PO 9
PO 10
PO 11
PO 12
PSO 1
PSO 2
CO1 3 3 - - - - - - - - - - - -
CO2 3 2 3 3 - - - - - - - 3 - 3
CO3 3 3 3 2 3 - - - - - - 3 - 3
CO4 3 3 3 3 3 - - - - - - 3 - 3
CO5 2 3 3 3 3 - - - - - - 2 - 3
TEXT BOOKS:
1. Leighton R. Johnson, Computer Incident Response and Forensics Team
Management:Conducting a Successful Incident Response, Syngress.
2. Gerard Johansen, Digital Forensics and Incident Respons, Packt Publishing Limited.
REFERENCE BOOKS:
1. Peter Szor, “The Art of Computer Virus Research and Defense.” Addison-Wesley Professional, 2005.
2. Richard O'Hanley, James S. Tiller, Information Security Management Handbook, Sixth Edition, CRC Press.
3. Harold F. Tipton, Micki Krause Nozaki, Information Security Management Handbook, Sixth Edition, CRC Press.
MAJOR PROJECT
Subject Code: UGCS8J1818 L T P C
IV Year / II Semester 0 0 10 5
Course Objectives: The objective of this course is to apply the knowledge gained by the students in the previous courses to develop a project in their interested domain.
Guidelines/Instructions:
Group of students can form as a team and the team has to submit the Project
abstract to the Project Coordinator by consulting with the guide at the beginning of
the semester. The team has to implement the Project and submit the Project report
in the prescribed format at the end of the semester to the department.
Students shall prefer the latest technologies like Artificial Intelligence, IOT, Big Data
Analytics, Cyber Security, Augmented Reality etc in implementing their projects. The
Internal evaluation marks shall be on the basis of two seminars given by each
student on the topic of her project. The Viva–Voce shall be conducted before
semester end examinations.
Course Outcomes:
Upon completion of this course, the students will be able to: CO 1. Apply the domain specific knowledge to sove a real world problem. CO 2. Choose appropriate development procedure and implement requirements at
various phases of Software development. CO 3. Develop and test the solution at every stage. CO 4. Interpret the ideas and discuss the project outcomes in oral and written form
Mapping of COs to POs:
POs/ COs
PO 1
PO 2
PO 3
PO 4
PO 5
PO 6
PO 7
PO 8
PO 9
PO 10
PO 11
PO 12
PSO 1
PSO 2
CO1 3 3 3 3 - 3 3 3 3 3 3 3 3 3
CO2 3 3 3 3 - 3 - - 3 3 3 3 3 3
CO3 3 3 3 3 3 3 3 - - - - 3 3 3
CO4 - - - - 3 - - 3 3 3 - 3 - -
SEMINAR
Subject Code: UGCS8S1918 L T P C
IV Year / II Semester 0 2 0 2
Course Objectives :
Seminar will let the students expose to emerging trends and market needs and also
train the students towards best presentation skills.
Guidelines/Instructions:
Each student shall collect the information on a specialized topic from IEEE/ACM
journals and it should be different from the project work. The topic must be selected
from latest trends and technologies in the IT field, which has to be approved by the
department. The student has to submit the seminar abstract to the Seminar
Coordinator by consulting with the guide at the beginning of the semester.
The student has to submit the seminar report(showing her understanding over the
topic) in the prescribed format at the end of the semester to the department and
the student has to give the presentation before the Departmental Committee.
Course Outcomes:
After completion of this course, the students will be able to:
CO 1. Identify and gain knowledge on the state of art of recent advances in
computer science & engineering domains.
CO 2. Utilize the technical resources effectively for the preparation of presentation
and documentation.
CO 3. Elaborate well-organized technical presentations with effective oral
communications.
CO 4. Solve the queries raised by the group of audience with their technical skills.
Mappng of COs to POs:
POs/
COs PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2
CO1 3 3 - 3 - 3 - 3 3 3 3 3 3 3
CO2 3 - - - 3 - - 3 3 3 - 3 3 3
CO3 3 3 3 - - - - 3 3 3 - 3 - -
CO4 3 3 3 - - - 3 3 3 3 - 3 - -
Internship/Certification Course/EPICS/Foreign Languages/Yoga
Subject Code: UGCS8I2018 L T P C
IV Year / II Semester 0 0 0 3
Course Objective:
This course will enable students to develop competencies expected by the industry.
Guidelines/Instructions:
The student can do anyone of the following courses at anytime from first year to fourth year.
Internship
Certification Course
EPICS
Foreign Language
Yoga
Internship: The student should do the Internship in a reputed company which is approved by the department. The minimum period of Internship shall be one month. However it can be completed in 3 to 4 slots/intervals which shall be a minimum of five days slot.
Certification Course: The student shall be permitted to take certification courses preferably from NPTEL/Swayam/Coursera or any other standard platform, which has to be approved by the department and it must be at least for a period of 8 weeks.
EPICS: EPICS is a service-learning design program in which teams of students partner with local and global community organizations to address human, community, and environmental needs. EPICS was founded at Purdue University in Fall 1995. Students who are interested can register for this program and should get completion certificate from Purdue University.
Foreign Languages: The student shall learn any Foreign Language and get certified from EFLU or a standard organization which has to be approved by the college.
Yoga: The student shall undergo training on Yoga for a period of 2 months and get certified by a standard organization which has to approved by the college.
Course Outcomes:
Upon completion of this course, the students will be able to: CO 1. Prove personal commitment to ethical behaviour, competent practice, taking
responsibility for their own work and acknowledging the work of others. CO 2. Appropriate engagement with relevant stakeholders, and identify, assess and
manage risk. CO 3. Demonstrate effective communication, initiative, effective work practices in a
multi-disciplinary team. CO 4. Develop proficient application and exploration of real-world problems and
evaluation of the outcomes and impact of their work.
Mapping of COs to POs:
POs/ COs
PO 1
PO 2
PO 3
PO 4
PO 5
PO 6
PO 7
PO 8
PO 9
PO 10
PO 11
PO 12
PSO 1
PSO 2
CO1 - - - - - 3 3 3 3 3 - 3 - -
CO2 3 3 - 3 - 3 3 3 3 3 3 3 - -
CO3 - 3 3 3 - 3 3 - 3 3 - 3 3 3
CO4 3 3 3 3 3 3 3 - - - - 3 3 3