Syllabus
Syllabus
FOR
B. TECH. PROGRAMME IN
COMPUTER SCIENCE AND ENGINEERING
3rd Semester
S. Course Course Hours Marks
Course Name Credits
No. Type Code L T P ISE ESE Total
1 PCC MTH30120 Discrete Mathematical Structures 3 - - 3 50 50 100
2 PCC CSE30220 Object Oriented Programming using Java 3 - - 3 50 50 100
3 PCC CSE30320 Database Management Systems 3 1 - 4 50 50 100
4 ESC ECE30420 Digital Systems Design 3 1 - 4 50 50 100
5 ESC ECE30520 Signals and Systems 3 - - 3 50 50 100
6 PCC CSE30220L Object Oriented Programming Lab - - 4 2 50 50 100
7 PCC CSE30320L Database Management Systems Lab - - 4 2 50 50 100
8 ESC ECE30420L Digital Systems Design Lab - - 2 1 50 50 100
Total: 27 22 400 400 800
4th Semester
S. Course Course Hours Marks
Course Name Credits
No. Type Code L T P ISE ESE Total
1 PCC MTH40120 Probability, Statistics and Queuing 3 - - 3 50 50 100
2 PCC CSE40220 Web Programming 3 - - 3 50 50 100
Computer Architecture and
3 PCC CSE40320 3 1 - 4 50 50 100
Organization
4 PCC CSE40420 Data Structures 3 1 - 4 50 50 100
5 ESC ECE40520 Communication Systems 3 - - 3 50 50 100
6 PCC CSE40220L Web Programming Lab - - 4 2 50 50 100
7 PCC CSE40420L Data Structures Lab - - 4 2 50 50 100
8 ESC ECE40520L Communication Systems Lab - - 2 1 50 50 100
Total: 27 22 400 400 800
5th Semester
Course Course Hours Marks
S. Course Name Credits
No. Type Code L T P ISE ESE Total
1 PCC CSE50120 Algorithm Analysis and Design 3 1 - 4 50 50 100
2 PCC CSE50220 Operating System 3 1 - 4 50 50 100
3 PCC CSE50320 Software Engineering 3 1 - 4 50 50 100
4 PCC CSE50420 Python Programming 2 - - 2 50 50 100
5 PCC CSE50520 Microprocessor 3 - 2 4 50 50 100
6 PCC CSE50120L Algorithm Analysis and Design Lab - - 4 2 50 50 100
7 PCC CSE50220L Operating System Lab - - 2 1 50 50 100
8 PCC CSE50420L Python Programming Lab - - 4 2 50 50 100
Total: 29 23 400 400 800
6th Semester
S. Course Course Hours Marks
Course Name Credits
No. Type Code L T P ISE ESE Total
1 PCC CSE60120 Theory of Computation 3 1 - 4 50 50 100
2 PCC CSE60220 Artificial Intelligence 3 - - 3 50 50 100
3 PCC CSE60320 Computer Networks 3 1 - 4 50 50 100
4 PCC CSE60420 Computer Graphics 3 1 - 4 50 50 100
5 PEC PEC6XX20 Elective-I 3 - 2 4 50 50 100
6 PCC CSE60220L Artificial Intelligence Lab - - 2 1 50 50 100
7 PCC CSE60320L Computer Networks Lab - - 2 1 50 50 100
8 PCC CSE60420L Computer Graphics Lab - - 2 1 50 50 100
9 SEM CSE60620 Seminar - - 2 1 50 - 50
Total: 28 23 450 400 850
7th Semester
S. Course Course Hours Marks
Course Name Credits
No. Type Code L T P ISE ESE Total
Cryptography and Network
1 PCC CSE70120 3 1 - 4 50 50 100
Security
2 PCC CSE70220 Compiler Design 3 - - 3 50 50 100
3 PEC PEC7XX20 Elective-II 3 - 2 4 50 50 100
4 PEC PEC7XX20 Elective-III 3 - 2 4 50 50 100
5 OEC OEC7X20 Open Elective-I 3 - - 3 50 50 100
6 PROJ CSE70320 Pre-Project work - 1 4 3 50 100 150
Cryptography and Network
7 PCC CSE70120L - - 2 1 50 50 100
Security Lab
8 PCC CSE70220L Compiler Design Lab - - 2 1 50 50 100
Total: 29 23 400 450 850
8th Semester
S. Course Course Hours Marks
Course Name Credits
No. Type Code L T P ISE ESE Total
1 PEC PEC8XX20 Elective-IV 3 - 2 4 50 50 100
2 PEC PEC8XX20 Elective-V 3 - 2 4 50 50 100
3 OEC OEC8X20 Open Elective-II 3 - - 3 50 50 100
4 PROJ CSE80120 Major Project work - 1 10 6 100 200 300
Industrial Training and Professional
5 IT CSE80220 - - 2 1 50 50 100
Viva
Total: 26 18 300 400 700
THIRD SEMESTER
List of Books
• Elements of Discrete Mathematics by C. L. Liu, 2nd Ed.Tata Mc-Graw Hill.
• Discrete Mathematical Structures, Kolman, Busby and Ross, 6th Ed.PHI (2009).
• Narsingh Deo: Graph Theory with Applications to Engineering and Computer Sciences,PHI.
• Murry R. Spiegel: Discrete Mathematics (Schaums Outline series) Tata McGraw Hill (2009).
• Kenneth H. Rosen: Discrete Mathematics and its applications,5th Ed. Tata McGrawHill.
• K.R Parthasarathy : basic Graph Theory, Tata Mc-Graw Hill.
Course Code: CSE30220 Course Title: Object Oriented Programming using Java
Scheme and Credits- L T P Credits
rd
Total marks: 100
Semester: 3 3 0 0 3
Course Objectives:
This course introduces fundamentals of object-oriented programming in Java including defining classes,
invoking methods, and using class libraries. Students will be able to design and develop java programs
with object-oriented paradigm including abstraction, encapsulation, inheritance and polymorphism.
List of Books
1. Head First Java, O’rielly publications.
2. Introduction to Java Programming (Comprehensive Version), Daniel Liang, Pearson.
3. Java: The complete reference, 12th edition, Herbert Schildt. McGraw Hill.
4. Thinking in Java by Bruce Eikel.
List of Books:
1. R. El. Masri and S. B. Navathe. Fundamentals of Data Base Systems, Benjamin Cummings.
2. H. F. Korth and A. Silberschatz. Database Concepts, 2nd Edition, Mcgraw Hill, 1991.
3. J. D. Ullman. Principles of Database and Knowledge Base Systems, Vol. I & II.
4. Database Systems: A Practical Approach to design, Implementation and Management”.
Thomas Connolly, Carolyn Begg; Third Edition, Pearson Education.
List of Books:
1. Malvino and Leach “Digital principles and Applications" Tata McGraw Hill.
2. Vahid, Frank. "Digital Design", any edition, John Wiley and Sons.
3. Mano M Morris, “Digital Design” Pearson Education.
4. James W. Bignell and Robert Donovan, “Digital Electronics"
5. Tokheim, Roger L. Digital Electronics: Principles and Applications, Student Text with
MultiSIMCD-ROM. McGraw-Hill, Inc., 2007.
6. J. Bhasker, “A VHDL Primer”, Pearson.
List of Books:
1. Signals, Systems & Communications - B.P. Lathi, BSP.
2. Signals and Systems - A.V. Oppenheim, A.S. Willsky and S.H. Nawabi.
3. Signals and Systems – Simon Haykin and Van Veen, Wiley.
4. Signals and Systems – A. Rama Krishna Rao, 2008, TMH.
5. Signals, Systems and Transforms - C. L. Philips, J.M.Parr and Eve A.Riskin, PE.
6. Signals and Systems – K. Deergha Rao, Birkhauser, 2018.
Course Code: CSE30220L Course Title: Object Oriented Programming using Java Lab
Scheme and Credits- L T P Credits
rd
Total marks: 100
Semester: 3 - - 4 2
Lab outcomes: After the completion of this course students will be able to:
• Implement object-oriented concepts with Java, including defining classes, invoking methods,
using class libraries, etc.
• Develop java programs using the concepts of inheritance, abstract class, interfaces and
packages.
• Apply the concepts of multithreading and exception handling to develop efficient codes.
• Design event driven GUI applications.
List of experiments
1. Write a C++ program to declare a class, initialize and display the contents of the class member.
2. Use Eclipse or Net bean platform, familiarization with the various menus. Write a program in java
to find the sum of two numbers. Create and initializes an int array, calculate and display the average of
its values in average method.
3. Write a Program in java to implement inheritance. Create a class called Employee whose objects are
records for an employee. This class will be a derived class of the class Person.
4. Write a Java program to create an abstract class named Shape that contains two integers andan empty
method named print Area (). Provide three classes named Rectangle, Triangle, and Circle such that each
one of the classes extends the class Shape. Each one of the classes contains only the method print
Area () that prints the area of the given shape.
5. Write a program to create interface A. In this interface we have two method meth1 and meth2.
Implements this interface in another class named MyClass. Create a package named pl and implement
this package in c1 class.
6. Write a Java program that implements a multi-thread application that has three threads. First thread
generates random integer every 1 second and if the value is even, second thread computes the square of
the number and prints. If the value is odd, the third thread will print the value of cube of the number.
7. Write a Java program that creates a user interface to perform various mathematical operations. Use
exception handling for handling various errors.
8. Create a test project, add a test class and run it. See how you can use auto suggestions, auto fill. Try
code formatter and code refactoring like renaming variables, methods, and classes. Try debug step by
step with a small program which contains at least one if else condition and a forloop.
9. Write a Java program that works as a simple calculator. Use a grid layout to arrange buttons for the
digits and for the +, -,*, % operations. Add a text field to display the result. Handle any possible
exceptions like divided by zero.
10. Write a Java program that simulates a traffic light. The program lets the user select one of three
lights: red, yellow, or green with radio buttons. On selecting a button, an appropriate message with
“Stop” or “Ready” or “Go” should appear above the buttons in selected color.
11. Write a program to get the input from the user and store it into file.
12. Write a Java program that loads names and phone numbers from a text file where the data is
organized as one line per record and each field in a record are separated by a tab (\t). It takes
a name or phone number as input and prints the corresponding other value from the hash table.
13. Create a class to connect to the MySQL database and perform queries, inserts and deletes. It also
prints the metadata (table name, column names) of a query result.
14. Mini Project/Lab Assignment
Note: This is only a suggested list of lab exercise. Instructor may frame additional exercise relevant to
the course contents.
List of experiments
1. Familiarization with various DBMS: MySQL. Microsoft Access. Oracle. SQLite.
2. Data Definition Language: Data types, Creating Tables, Alter, Truncate, Rename, Drop.
Performing operations using SQL as well as GUI Interface.
3. Implementation of Constraints like Default Constraint, Primary Key, Foreign Key, Unique Key,
Not Null, Check. Implementing using SQL as well as GUI.
4. Data manipulation language: Retrieval of Rows using Select Command, Conditional retrieval of
Records, Insert Statement, Update Statement, Delete Statement, Working with Null Values, Matching
a Pattern from a Table, Ordering the Result of a Query, Aggregate Functions,
Grouping the Result of the Query.
5. Working with Joins: Cartesian product, Equi-Join, Inner Join and Outer Join, Self-join, Nested
Queries, Views.
6. Data Control Language: Database Security and Privileges through Grant and Revoke Commands.
Commit and Rollback Commands.
7. Implementation of Stored Procedures: Writing PL/SQL code, Stored Procedures.
8. Implementation of Triggers and cursors.
9. Demonstrate the working of No SQL: CRUD operations using MongoDB
10. Suitable Mini Project/Lab Assignment.
Note: This is only a suggested list of lab exercise. Instructor may frame additional exercise relevant to
the course contents.
List of experiments
1. Familiarization with various basic lab apparatus: DSO, Frequency Generators, Multimeters,
Breadboard, Trainer kits, etc.
2. Installation of simulation/design tools Xilinx, Multisim etc.
3. Study and verify the truth table of various logic gates, identify various ICs and their
specification.
4. Design of various combinational circuits like adders, encoders. Subtractors using gate IC’s
5. Verification of truth table of various circuits using corresponding IC’s for Multiplexers, De-
multiplexer, Flip Flops etc.
6. Design and simulation of various combinational circuits like adder, multiplexer, encoder,
decoder, etc. using simulation softwares.
7. Design and simulation of various code converter circuits like binary to grey, grey to binary, etc.
8. Design and simulation of various synchronous circuits like flip flops, counters, registers,
sequence detectors etc.
9. Verify the truth table of decoder driver 7447/7448 and operate a 7-segment display through a
counter using a low frequency clock.
10. Design and simulation of various simple combinational and sequential circuits using VHDL on
Xilinx environment: (Adder, Counters, Sequence detectors, Registers etc.)
11. Mini Project/Lab Assignment
Note: This is only a suggested list of the lab exercise. The instructor may frame additional exercises
relevant to the course contents.
FOURTH SEMESTER
List of Books:
1. Miller and Fread's Probability and statistics for engineers-Richard A Johnson, Pearson
EducationAsia/ PHI.
2. Fundamentals of Mathematical Statistics- S. C. Gupta and V. K. Kapoor, Sultan and Sons,
EasternEconomy Edition.
3. Introduction to Mathematical Statistics-Craig and Hogg, Pearson.
4. Probability and Statistics With Reliability, Queuing With Reliability, Queuing and
ComputerScience Application by Kishor S. Trivedi, PHI.
List of Books:
1. Kogent Learning Solutions Inc. “HTML 5 in simple steps”, Dreamtech Press
2. Murray,Tom/Lynchburg, “Creating a Web Page and Web Site”, College,2002
3. Griffiths, Adam. CodeIgniter 1.7 Professional Development. Packt Pub., 2010.
4. Steven M. Schafer HTML, XHTML, and CSS Bible, 5ed Wiley India
5. John Duckett Beginning HTML, XHTML, CSS, and JavaScript Wiley India
6. Sidik, Betha. "FRAMEWORK CODE IGNITER 3." (2018).
List of Books:
1. Computer System Architecture, M. Moris Mano, Pearson Education.
2. Computer Organisation and Architecture, William Stallings, Pearson Education.
3. Computer System Architecture, J. P. Hayes, Pearson Education.
4. David A. Patterson and John L. Hennessy, Computer Organization and Design:
The Hardware/Software Interface, Elsevier.
List of Books:
1. Fundamentals of Data Structures – Horowitz and Sahani, Galgotia Publication.
2. Data Structures Using C and C++ – Aaron M. Tenenbaum, Yedidyah Langsam and Moshe J.
Augenstein, PHI Publications.
3. An Introduction to Data Structures with applications – Jean Paul Trembley and Paul G. Sorenson,
McGraw Hill Publications.
4. Data Structures and Program Design in C – R. Kruse etal, Pearson Education.
5. Data Structures – Lipschutz, Schaum’s Outline Series, TMH.
List of Books:
1. B. P. Lathi and Z. Ding, Modern Digital and Analog Communication Systems, 4th Edition, Oxford
University Press, 2011.
2. S. Haykin, Communication Systems, 4th Edition, Wiley, 2006.
3. J. M. Wozencraft and I. M. Jacobs, Principles of Communication Engineering, Wiley, 1965.
4. Taub & Schilling: Principles of communication systems- McGraw-Hill Education (India).
List of experiments
1. Create a static web page demonstrating use of Text formatting tags, marquee, image tags, Inserting
Links, Lists, Tables, Frames, form elements.
2. Create static web pages demonstrating external CSS, internal CSS and inline CSS
3. Create static web pages demonstrating use of Text- pseudo classes, Selectors, Links, Backgrounds,
and Lists.
4. Design the front end for the examination/result system of any institute which includes the pages
given below: Sign up (complete form asking for the details), Log in page, The page for displaying the
Marks ineach subject.
5. Create a static web page demonstrating use of bootstrap functionalities like Grid system, Container
and container fluid, Alerts, Collapse, Dropdown, and Modals.
6. Write a JavaScript demonstrating control structures, loops, Alert and prompt and confirm
statement, Validation of form data.
7. Design the following modules of the examination/result system using Bootstrap and JavaScript.
• Student selecting the various subjects at the time of submitting his examination form
• Display the prompt if the credentials (static) are wrong
• After submitting the form successfully, the prompt should display, “the form has been successfully
submitted”.
8. Installation and configuration of XAMP server, Code ignitor
9. Write a PHP code demonstrating use of comments, variables, echo and print, PHP operators, data
types, Branching statements, Loops, Arrays.
10. Write a PHP code demonstrating use of PHP functions, passing information between pages,
$_GET, $_POST, $_REQUEST, String functions, include and require, Error handling in PHP
11. Demonstrate use of MySQL datatypes, SQL commands-CREATE, UPDATE, INSERT, DELETE,
SELECT, PHP functions for MySQL connectivity and operation- mysql_connect, mysql_select_db,
mysql_query, Updation and deletion of data using PHP, displaying data from MySQL in webpage,
Displaying data from MySQL in webpage.
12. Design the backend of the web pages you have designed in Sr. No. 4 and 7.
• The data of the student should be stored in the database.
• The database should be designed for each table showing the relations between the tables.
• The validation on the data should be done properly.
13. Use Code igniter to demonstrate the implementation of Model, view and controller, working with
database covering CRUD operations, Form validation and routing of views.
14. Use Code igniter to demonstrate pagination of data from database, cookie and session management,
File uploading and Error handling, Adding JSS and CSS, Sending Email.
15. Develop the examination/result system modules in code Igniter.
Note: This is only a suggested list of lab exercise. Instructor may frame additional exercise relevant to
the course contents.
List of experiments
1. Arrays: Program to implement insertion and deletion operations in arrays
2. Stacks:
• Static and dynamic implementation of push, pop and traversal operations in stacks using
both arrays and linked list.
• Implementation of stack to convert infix to postfix expression.
• Evaluating mathematical expressions using stack.
3. Queues: Static and dynamic implementation of enqueue and dequeue operations in queues.
4. Linked List:
• Implementation of searching, insertion and deletion operations in linked list.
• Program to implement searching, insertion and deletion operations in doubly linked list.
• Implementation of singly circular and doubly circular linked list.
5. Recursion:
• Demonstrate concept of recursions with problem of tower of Hanoi.
• Implement recursive sorting techniques- merge sort, quick sort.
6. Trees:
• Program to create and traverse a binary tree recursively.
• Program to implement insertion and deletion operations in BST.
• Program to implement insertion and deletion operations in Heaps and Heap Sort.
• Program to implement insertion and deletion operations in AVL (all rotationsmust be
included).
7. Searching:
• Program to implement different searching techniques - linear and binary searchand compare
their time complexities.
• Implement Binary search using recursion.
8. Sorting: Implementation of different sorting techniques like bubble, selection, insertion, merge,
quick and heap sort.
9. Graph: Implement different representations of graph (Adjacency list and adjacencymatrix).
Graph Traversal: Program to implement DFS/BFS of a graph.
10. Hashing:
• Program to implement linear probing.
• Program to implement quadratic probing.
• Program to implement double hashing.
• Program to implement all the functions of a dictionary using hashing.
Note: This is only a suggested list of lab exercise. Instructor may frame additional exercise relevant to
the course contents.
List of experiments
1. Familiarization with various Communication Techniques/Technologies using various Trainer
Kits like ST22XX, DCSXX.
2. Familiarization with MATLAB, basic programming- matrix addition, subtraction,
multiplication, transpose, graph plotting.
3. Verify different cases of AM modulation index. Plotting different waveforms with different
modulation index(µ) when µ<1, µ=1, µ>1.
4. Generation and detection of frequency Modulation (FM) signal using hardware kit and
MATLAB simulation software. Observing various waveform and their spectrum analysis
behaviour.
5. Generation of Phase Shift Keying, Amplitude Shift Keying and Frequency Shift Keying using
MATLAB. Observing various waveform and their spectrum analysis behaviour.
6. To observe the spectrum of a different line coding techniques-unipolar, polar, bipolar with the
communication trainer kit and MATLAB.
7. To verify the Encoding process of Delta Modulator and corresponding waveform using
hardware trainer kit and MATLAB.
8. Verify the sampling theorem for different modulating frequencies fs< 2fm, fs= 2fm and fs>2fm.
Reconstruct the original signal from the sampled signal.
9. To study the effect of Companding and compute the quantization SNR using MATLAB.
10. To study generation of Pulse Code Modulation (PCM) and reconstruction of the original analog
signal.
11. Implementation of shannon fano coding using MATLAB.
12. Implementation of Huffman coding algorithm using MATLAB.
13. Mini-Project/Lab Assignment.
Note: This is only a suggested list of lab exercise. Instructor may frame additional exercise relevant
tothe course contents.
FIFTH SEMESTER
List of Books:
1. Introduction to Algorithms, 4TH Edition, Thomas H Cormen, Charles E Lieserson, Ronald L Rivest
and Clifford Stein, MIT Press/McGraw-Hill.
2. Fundamentals of Algorithms – E. Horowitz et al.
3. Algorithm Design, 1ST Edition, Jon Kleinberg and Éva Tardos, Pearson.
4. Algorithm Design: Foundations, Analysis, and Internet Examples, Second Edition, Michael T
Goodrich and Roberto Tamassia, Wiley.
List of Books:
1. J. Peterson, A. Silberschatz, and P. Galvin. Operating System Concepts, Addison Wesley,
Edition.
2. M. J. Bach. Design of the Unix Operating System, Prentice Hall of India,1986.
3. Silberschatz, Galvin, Gagne, "Operating System Concepts", John Wiley and Sons.
4. Modern operating systems by A. S. Tanenbaum, PHI
5. Operating system by Milan Milenkovie: Tata McGraw Hill.
List of Books:
1. Software Engineering, A practitioner’s Approach- Roger S. Pressman, Mc Graw Hill International
Edition.
2. Software Engineering- Sommerville, Pearson Education.
3. The unified modeling language user guide Grady Booch, James Rambaugh, Ivar Jacobson, Pearson
Education.
List of Books:
1. Python Programming: A Modern Approach, Vamsi Kurama, Pearson.
2. Learning Python, Mark Lutz, Orielly.
3. Think Python, Allen Downey, Green Tea Press.
4. Core Python Programming, W.Chun, Pearson.
5. Introduction to Python, Kenneth A. Lambert, Cengage.
List of Books:
1. Gaonkar R. S., “Microprocessor Architecture, Programming and Applications”, 5th Ed., Penram
International, 2007.
2. Hall D. V., “Microprocessor and Interfacing-Programming and Hardware”, 2nd Ed., Tata
McGraw-Hill Publishing Company Limited, 2008.
3. Stewart J, “Microprocessor Systems- Hardware, Software and Programming”, Prentice Hall
International Edition, 1990.
4. Mathur, Sunil, “Microprocessor 8086 - Architecture, Programming and Interfacing”, PHI Learning
Pvt. Ltd.
5. Muhammad Ali Mazidi, ARM Assembly Language Programming & Architecture.
Course Code: CSE50120L Course Title: Algorithm Analysis and Design Lab
Scheme and Credits- L T P Credits
th
Total marks: 100
Semester: 5 0 0 4 2
Lab outcomes: After the completion of this course students will be able to,
• To analyze the running time of asymptotic algorithm.
• To develop algorithms for sorting, searching, insertion and matching.
• To identify and apply the concept of computational intractability.
• To acquire knowledge in NP Hard and complete problem
List of experiments
1. Perform the priori and posterior analysis of below given algorithms and identify the best,
average and worst-case complexities. In addition to it, map the complexity with their execution
time (Priori vs Posterior).
i. Linear search and binary search.
ii. Bubble sort and selection sort.
iii. Merge sort and quick sort.
2. Greedy method
i. Implement knapsack problem and analyze its complexity.
ii. Implement Minimum Cost Spanning tree using Kruskal’s Algorithm.
iii. Implement Minimum Cost Spanning tree using Prim’s Algorithm.
iv. Compare the complexities of both algorithms on dense and sparse graphs.
3. With the help of a program compare the time complexity of Fibonacci series using
recursion and dynamic programming.
4. Single source shortest path
i. Implement single source shortest path using Dijiktra’s algorithm.
ii. Implement single source shortest path using Bellman Ford algorithm.
iii. Compare the run time complexities of both the algorithms. Identify the ways forimproving
the performance of these algorithms.
5. All pair shortest path
i. Implement all pairs shortest path using Floyd Warshall’s Algorithm.
ii. Compare single source shortest path and all pair shortest path and analyse their
performance. [Hint: apply APSP on all the source nodes of the algorithm and thenapply
SSSP on the same graph].
6. Implement LCS problem using Dynamic programming.
7. Implement Knapsack problem using backtracking.
8. Implement Knapsack problem using Branch and bound, Compare the time complexities of the
problem using all the three techniques.
9. Implement Job scheduling algorithm using branch and bound.
10. Implement topological sorting of a DAG.
11. Mini Project/Lab assignment.
Note: This is only a suggested list of lab exercise. Instructor may frame additional exercise relevant to
the course contents.
List of experiments
1. Execution of basic UNIX commands:
• File/Directory Handling commands.
• Explore system variables such as PATH, HOME.
• Modifying File Access Permissions and identify different types users in UNIX.
2. Filters and I/O Redirection:
• Demonstrate all features of awk, sed and grep commands. Compare theresults of these
commands.
• Execute commands related to inode, I/O redirection, piping.
3. Shell Programming: shell script exercise based on following:
• Interactive shell script, Positional parameters, Arithmetic and Logical operators, If structure
• While, for, until loop, Meta characters.
4. Inter-process Communication:
• Write a program to demonstrate a one-way pipe between two Processes.
• Write a program to illustrate IPC through pipe and fork system calls –Printing only odd
numbers.
5. Simulation of scheduling algorithms:
Write a shell program to implement the following process scheduling algorithms
• First Come First Serve
• Shortest Remaining Job First
• Round Robin
6. Producer-Consumer Problem: Implement the Producer – Consumer problem using
semaphores (using UNIX system calls).
7. Banker’s Algorithm: Write a program to simulate banker’s algorithm for deadlock
avoidance.
8. Paging and Segmentation:
Write a program to simulate the following memory management techniques: Paging and
Segmentation.
9. Mini Project/Lab Assignment.
Note: This is only a suggested list of lab exercise. Instructor may frame additional exercise
relevant to the course contents.
List of experiments
1. Installing and configuring the latest version of python and understanding the various differences
between the earlier versions.
2. Program set I:
• Write a python program to find the square root of a number (Newton’s method).
• Write a python program of exponentiation (power of a number).
• Write a python program to compute the GCD of two numbers.
• Write a python program first N prime numbers.
3. Program set II:
• Write a python program to compute the factorial of a number using recursion.
• Write a program to understand call by reference and call by value in python.
• Write a program to compute the result of the student. (grading system).
• Write a program to implement linear search and binary search.
4. Program set III.
• To create, slice, change, delete and index elements using list, string and tuple.
• To change, delete, add and remove elements in a Dictionary.
• To create a text file , write some data on it and find the most frequent words in that text file.
• To demonstrate the different inbuilt functions in list, tuple, strings and dictionary.
5. To demonstrate the operations using numpy arrays. array creation routines, arrays fromexisting
data, indexing, Slicing, binary operators, mathematical functions, statistical functions, sort, search
and counting functions.
6. To demonstrate the various operations using pandas library: Data frames and operations,
Operations with CSV files.
7. Data refining, applying descriptive statistics (mean, mode, standard deviation.
8. Hands on Python code executing environments like Anaconda/Jupyter Notebook/Spyder or
Google colab.
9. Creating the class and objects and working with constructors, Inheritance, Compile time
polymorphism vs run time polymorphism, Function overloading and overriding.
10. To demonstrate the visualization of data using matplotlib: Bar Graph, Histogram, Scatter Plot,
Area Plot, Pie Chart, subplot.
11. To demonstrate the visualization of data using seaborn. Plotting a Displot, Distplot Without the
Histogram, KDE, Facet grid and pair grid.
12. To demonstrate the operations using of ScikitLearn Library.
13. To demonstrate the operations using of TensorFlow.
14. To demonstrate the operations using of PyTorch.
15. To demonstrate the operations using OpenCV.
16. To demonstrate the operations using nltk.
17. Suitable mini project/Lab Assignment.
Note: This is only a suggested list of lab exercise. Instructor may frame additional exercise
relevant to the course contents.
SIXTH SEMESTER
List of Books:
1. Introduction to Automata Theory, Languages, and Computation, 3nd Edition, John E. Hopcroft,
Rajeev Motwani, Jeffrey D. Ullman, Pearson Education.
2. Introduction to Languages and The Theory of Computation, John C Martin, TMH.
3. Introduction to the Theory of Computation, Michael Sipser, 3rd edition, Cengage Learning.
4. P. Linz, “Introduction to Formal Languages and Automata”, PWS Publishing Company.
5. C. Papadimitrou and C. L. Lewis. Elements of Theory of Computation, Prentice-Hall.
List of Books:
1. Artificial Intelligence by Kevin Knight, Elaine Rich, B. Shivashankar Nair, Mc Graw Hill.
2. Artificial Intelligence: A Modern Approach by Stuart Russel, Peter Norvig, Pearson.
3. Artificial Intelligence with Python by Prateek Joshi, Packt Publishing.
4. Neural Networks, Fuzzy Logis and Genetic Algorithms: Synthesis, and Applications, S.
Rajasekaran, and G. A. Vijayalakshmi Pai, Prentice Hall of India.
5. An Introduction to Genetic Algorithms, Melanie Mitchell, MIT Press.
List of Books:
1. William Stallings: Data and Computer Communications, PHI
2. D.P Bertsekas “Data Networks” Prentice Hall
3. Andrew Tanenbaum, “Computer Networks”, Pearson.
4. J. F. Kurose “Computer Networking” Addison-Wesley
5. Douglas E. Comer, “Internetworking with TCP/IP, Volume1”, PHI.
6. Douglas E. Comer, “Client-Server Programming with TCP/IP, Volume3”, PHI.
7. Peterson and Davie, “Computer Networks”, Morgan Kaufman
List of experiments
1. Write a Program to Implement Tic-Tac-Toe game using adversarial searching algorithm.
2. Implementation of Knowledge representation schemes.
3. Write a program to solve 8 queens problem using genetic algorithm.
4. Implementation of TSP using heuristic approach.
5. Implementation of A* Algorithm.
10. Create a decision tree from dataset using ID3 algorithm (using standard data sets).
11. Given a dataset which is linearly separable, classify the data points using SVM.
12. Neural network for classification task (using standard data sets).
Note: This is only a suggested list of lab exercise. Instructor may frame additional exercise
relevant to the course contents.
List of experiments
1. Introduction of LANs and Network Wire Crimping.
2. Experimental study of common protocols such as HTTP, FTP, SMTP, using network packetsniffers.
3. Experiments with packet sniffers to study the TCP/IP protocols.
4. Introduction of Network Simulators.
5. Introduction to NS2 (network simulator) - small simulation exercises to study behaviour ofvarious
protocols.
6. Experiments with NS2 to study behaviour (especially performance) of various protocols.
7. Setting up a small IP network: Configure interfaces, IP addresses and routing protocols.
8. Small exercises in socket programming in C/C++/Java.
Note: This is only a suggested list of lab exercise. Instructor may frame additional exercise
relevant to the course contents.
List of experiments
1. Study of Fundamental Graphics Functions in C Language.
2. Implementation of line generation using slope’s method, DDA and Bresenhem’s algorithms.
3. Implementation of circle generation using Mid-point method and Bresenhem’s algorithm.
4. Implementation of ellipse generation using Mid-point method.
5. Implementation of polygon filling using Flood-fill, Boundary fill and Scan-line algorithms.
6. Implementation of 2D transformation: Translation, Scaling, Rotation, Mirror Reflection and
Shearing.
7. Implementation of Line Clipping using Cohen-Sutherland algorithm and Bisection Method.
8. Implementation of Polygon Clipping using Sutherland Hodgeman algorithm.
9. Implementation of 3D geometric transformations: Translation, Scaling and rotation.
10. Implementation of Curve generation using Interpolation methods.
11. Implementation of Curve generation using B-spline and Bezier curves.
Note: This is only a suggested list of lab exercise. Instructor may frame additional exercise
relevant to the course contents.
Objective:
The seminar is aimed to develop confidence and effective communication skills in students for
presenting state-of-the-art computer related technologies. Each student shall identify a topic, get
approval of the faculty concerned and present the same before an audience comprising of the faculty
members and other students. Students are expected to collect enough literature on their chosen
topic, study it thoroughly, prepare a power point presentation and write a report.
Evaluation:
The seminar shall be evaluated by the Departmental Committee based on the quality of the content
presented and effectiveness of presentation. The emphasis should be on fluent expression, non-
verbal gestures and confident answering of audience queries.
SEVENTH SEMESTER
List of Books:
1. Cryptography and Network Security-William Stallings, Pearson Education.
2. Cryptography and Network Security-Behrouz A. Forouzan, Tata McGraw-Hill.
3. Network Security- Charlie Kaufman, Radia Perlman, Mike Speciner.
4. Applied Cryptography, Protocols, Algorithms, and Souce Code in C. Schneier, Wiley
Description:
• In the Pre-project, students are expected to choose a problem and perform its requirement analysis. The
same work shall be continued, and its complete implementation carried out in the Major Project during
the final (8th) semester.
• In the beginning of the 7th semester, students shall be asked to submit synopses/proposals for their
projects. The project shall, in very broad terms, involve problem solving through design and
development of some IT solution or any theoretical aspect of computing.
• Students may also be specifically encouraged to come up with any novel idea which addresses some
local/regional problem such as
• Solution or a step towards solution to institutional/departmental issues.
• Solution/procedure towards efficiency in an existing business process of socio-economic
importance like agriculture, art, tourism, healthcare etc.
• Solution/procedure towards efficient delivery of various public services (e-Governance).
• Students shall submit their project synopses in groups rather than individually. Formation of groups by
students is essential for developing attributes of team-work and sharing of responsibilities.
• The final allocation of project guides shall be finalized by the Departmental Committee after receiving
and analysing all the synopses.
• Students shall devote time to their project work and consult their project guide/s on a regular basis. The
time table shall contain slots exclusively for the same.
Evaluation:
• Out of the 50 marks stipulated for Internal Semester Evaluation (ISE), 25 shall be awarded on the basis
of continuous assessment by the respective Supervisor, while the remaining 25 marks shall be evaluated
during the project presentation to be held before the Departmental Committee.
• The External Semester Evaluation (ESE) shall be held by an approved external examiner. The External
Semester Evaluation (ESE) shall be of 100 marks. The break-up of 100 marks shall be as follows:
Presentation: 20 marks
Viva-voce: 50 marks
Report writing based on State of art, fundamentals of topic and its viability: 30 marks
Course Code: CSE70120L Course Title: Cryptography and Network Security Lab.
Scheme and Credits- L T P Credits
Total marks: 100
Semester: 7th 0 0 2 1
Lab outcomes: The students would be able to implement various encryption techniques. The students
will also be able to configure and understand firewall features.
List of experiments
1. Configure and demonstrate use of Traffic monitoring tool such as Wireshark with security
perspective.
2. Implement the following encryption and decryption techniques using high level programming
languages
a. Ceaser cipher b. Substitution cipher c. Hill Cipher
3. Implementation of modern block ciphers like DES, AES.
4. Implementation and study of vulnerabilities in RSA algorithm.
5. Implement the Diffie-Hellman Key Exchange mechanism using HTML and JavaScript.
6. Calculate the message digest of a text using the SHA-1 algorithm in JAVA.
7. Calculate the message digest of a text using the MD5 algorithm in JAVA.
8. Study of the features of firewall in providing network security and configuration of Firewall Security
in various platforms (Windows/Linux).
9. Implement web security with Open SSL tool kit.
10. Study of different types of vulnerabilities in websites/ Web Applications/Email.
Note: This is only a suggested list of lab exercise. Instructor may frame additional exercise
relevant to the course contents.
EIGHTH SEMESTER
Description:
• In the Major Project, students shall carry out complete implementation of their projects chosen in the
pre- project. The main focus shall be towards exposing students to latest technologies/tools having
relevance to current market trends.
• The progress of the project work shall be evaluated on a regular basis both by the project guide as well
through Departmental presentations.
• Students shall devote time to their project work and consult their project guide/s regularly. The time
table shall contain slots exclusively for the same.
• Students who fail to clear the internal project evaluation won’t be eligible for the external project
evaluation.
• Students must follow the basic principles of programming such as modularity, clarity and liberal use of
comments along with precise documentation.
• The work shall culminate in a project report. Students shall prepare their project reports as per the
prescribed format following all guidelines issued in this regard.
Evaluation:
• Out of the 100 marks stipulated for Internal Semester Evaluation (ISE), 50 shall be awarded on the basis
of continuous assessment by the respective Supervisor, while the remaining 50 marks shall be evaluated
during the project presentation to be held before the Departmental Committee.
• The External Semester Evaluation (ESE) shall be held by an external examiner. The External Semester
Evaluation (ESE) shall be of 200 marks. The break-up of 200 marks shall be as follows:
Course Code: CSE80220 Course Title: Industrial Training and Professional Viva
Scheme and Credits: L T P Credits
Total marks: 100
Semester: 8th - - 2 1
Objective:
The students are required to go for internship/industrial training of 4 to 6 weeks duration at the end of the
5th or 7th semester after the examinations are over. Internships are educational and career development
opportunities, providing practical experience in a field or discipline. They are structured, short-term,
supervised placements often focused around particular tasks or projects with defined timescales. An
internship will expose computer engineering students to the real IT industry environment, which cannot be
simulated in the classroom and hence create competent professionals for the industry. The internship will
Expose students to the current technological developments relevant to the subject area of training. It will
make students Understand the social, economic and administrate considerations that influence the working
environment of IT organisations.
The student will give a seminar based on training report, before an expert committee constituted by the
concerned department and the evaluation be done on the basis of:
● Quality of content presented.
● Proper planning for presentation.
● Effectiveness of presentation.
● Depth of knowledge and skills.
ELECTIVE-I
UNIT-I No of Lectures: 14
Introduction: Role of Algorithms in computing, Order Notation, Recurrences, Probabilistic Analysis
and Randomized Algorithms. Sorting and Order Statistics: Heap sort, Quick sort and Sorting in Linear
Time.
Advanced Design and Analysis Techniques: Dynamic Programming- Matrix chain Multiplication,
Longest common Subsequence and optimal binary Search trees.
UNIT-II No of Lectures: 15
Greedy Algorithms: Huffman Codes, Activity Selection Problem. Amortized Analysis. Graph
Algorithms: Topological Sorting, Minimum Spanning trees, Single Source Shortest Paths, Maximum
Flow algorithms.
Divide and Conquer: Sorting Algorithms, Lower Bounds, Median in Linear time, Maximum Sub-array
and Closest Pair of points, Decrease and Conquer variants.
UNIT-III No of Lectures: 15
Sorting Networks: Comparison Networks, Zero-one principle, Bitonic Sorting Networks, Merging
Network, Sorting Network. Matrix Operations- Strassen's Matrix Multiplication, Inverting matrices,
Solving system of linear Equations.
String Matching: Naive String Matching, Rabin-Karp algorithm, matching with finite Automata, Knuth
Morris - Pratt algorithm.
UNIT-IV No of Lectures: 12
NP-Completeness and Approximation Algorithms: Polynomial time, polynomial time verification,
NP-Completeness and reducibility, NP-Complete problems.
Approximation Algorithms- Vertex cover Problem, Travelling Sales person problem.
List of Books:
1. Introduction to Algorithms, by Cormen, Leiserson, Rivest, and Stein.
2. Computer Algorithms, by Horowitz, Sahni, and Rajasekaran.
3. Algorithm Design, by Kleinberg and Tardos.
4. Algorithm Design: Foundations, Analysis and Internet examples, M.T. Goodrich and R. Tomassia,
John Wiley and sons.
5. Data structures and Algorithm Analysis in C++, Allen Weiss, Second edition, Pearson education.
Text Book:
1. Desikan and G. Ramesh, “Software Testing: Principles and Practices”, Pearson Education.
2. Aditya P. Mathur, “Fundamentals of Software Testing”, Pearson Education.
3. Naik and Tripathy, “Software Testing and Quality Assurance”, Wiley
4. K. K. Aggarwal and Yogesh Singh, “Software Engineering”, New Age International Publication
UNIT-I No of Lectures: 14
Fundamentals of Embedded System: Core of the embedded system, Memory, Sensors (resistive,
optical, position, thermal) and Actuators (solenoid valves, relay/switch, opto-couplers), Communication
Interface, Embedded firmware (RTOS, Drivers, Application programs), Power-supply (Battery
technology, Solar), PCB and Passive components, Safety and reliability, environmental issues. Ethical
practice.
Characteristics and quality attributes (Design Metric) of embedded system. Real time system’s
requirements, real time issues, interrupt latency.
Embedded Product development life cycle, Program modelling concepts- DFG, FSM, Petri-net.
UNIT-II No of Lectures: 12
Embedded Hardware and Design:
Introduction to ARM-v7-M (Cortex-M3), ARM-v7-R (CortexR4) and comparison in between them.
UNIT-III No of Lectures: 14
Embedded Serial Communication: Study of basic communication protocols like SPI, SCI (RS232,
RS485), I2C, 10 CAN, Field-bus (Profibus), USB (v2.0), Bluetooth, Zig-Bee, Wireless sensor network.
UNIT-IV No of Lectures: 14
Embedded Software, Firmware Concepts and Design: Embedded C-programming concepts (from
embedded system point of view).
Real time operating system: Need of RTOS in Embedded system software, RTOS services in contrast
with traditional OS.
List of Books:
1. Introduction to Embedded Systems: Shibu K. V. (TMH)
2. Embedded System Design – A unified hardware and software introduction: F. Vahid (John Wiley)
3. Embedded Systems: Rajkamal (TMH)
4. Embedded System design: S. Heath (Elsevier)
5. Embedded Microcontroller and processor design: G. Osborn (Pearson)
6. Embedded Systems: Frank Vahid , Wiley India, 2002
7. Embedded Microcomputer Systems – Real Time Interfacing – Jonathan W. Valvano; Cengage
Learning; Third or later edition.
List of Books:
1. Jiawei Han, Micheline Kamber, Jian Pei (2012), Data Mining: Concepts and Techniques, 3rd
edition, Elsevier, United States of America.
2. Margaret H Dunham (2006), Data Mining Introductory and Advanced Topics, 2nd edition, Pearson
Education, New Delhi, India.
3. Amitesh Sinha (2007), Data Warehousing, Thomson Learning, India.
4. Xingdong Wu, Vipin Kumar (2009), the Top Ten Algorithms in Data Mining, CRC Press, UK.
5. Alex Berson and Stephen J. Smith “Data Warehousing, Data Mining & OLAP”, Tata McGraw –
Hill Edition, Tenth Reprint 2007.
6. G. K. Gupta “Introduction to Data Mining with Case Studies”, Easter Economy Edition, Prentice
Hall of India, 2006.
7. Pang-Ning Tan, Michael Steinbach and Vipin Kumar “Introduction to Data Mining”, Pearson
Education, 2007.
UNIT-I No of Lectures: 14
Understanding Java EE: Enterprise Application, Java enterprise edition, Java EE Technologies, Java EE
Architecture. Server and Containers: Types of System Architecture, Java EE Server, Java EE Containers.
Introduction to Java Servlets: The Need for Dynamic Content, Java Servlet Technology. Servlet API and
Lifecycle: Java Servlet API, The Servlet Skeleton, The Servlet Life Cycle. Using Annotations Instead of
Deployment Descriptor. Working with Databases: JDBC Architecture, Accessing Database, The Servlet
GUI and Database Example.
UNIT-II No of Lectures: 14
Request Dispatcher: Requestdispatcher Interface, Methods of Requestdispatcher,
Requestdispatcher Application. Cookies: Kinds of Cookies, Creating Cookies Using Servlet. Session:
Lifecycle of Http Session, Session Tracking with Servlet API, A Servlet Session Example.
Working with Files: Uploading Files, Creating an Upload File Application, Downloading Files,
Creating a Download File Application. Working with Non-Blocking I/O: Creating a Non-Blocking
Read Application
UNIT-III No of Lectures: 12
Java Server Pages: Java Server Pages, Use, Merits, Life Cycle of a JSP Page, Comments, JSP
Document, JSP Elements, JSP GUI Example. Action Elements; Implicit Objects, Scope and El
Expressions; Java Server Pages Standard Tag Libraries.
UNIT-IV No of Lectures: 16
Introduction to Enterprise Javabeans: Enterprise Bean Architecture: Benefits of Enterprise Bean,
Types of Enterprise Bean, Accessing Enterprise Beans, Enterprise Bean Application, Packaging. Working
with Session Beans: Example of Stateful Session Bean, Example of Stateless Session Bean, Example of
Singleton Session Beans. Working with Message Driven Beans: Lifecycle of a Message Driven Bean,
Uses of Message Driven Beans, The Message Driven Beans Example.
Introduction to Hibernate: Writing hibernate applications.
List of Books:
1. Black Book “Java server programming” J2EE, Dream Tech Publishers, Kathy Walrath.
2. Complete Reference J2EE by James Keogh mcgraw publication.
3. Deitel & Deitel, “Java How to program”, Prentice Hall.
4. Professional Java Server Programming by Subrahmanyam Allamaraju, Cedric Buest Wiley
Publication.
5. Beginning JSP, JSF and Tomcat, Giulio Zambon, Apress
ELECTIVE-II
&
ELECTIVE-III
List of Books:
1. Shalev- Shwartz,S., Ben-David,S., (2014), Understanding Machine Learning: From Theory to
Algorithms, Cambridge University Press.
2. R. O. Duda, P. E. Hart, D. G. Stork (2000), Pattern Classification, Wiley-Blackwell, 2nd Edition
3. Python machine learning by sebastian raschka, packt publishing.
4. Mitchell Tom (1997). Machine Learning, Tata McGraw-Hill.
5. Learning scikit-learn: machine learning in python by raul garreta, guillermo moncecchi, packt
publishing.
UNIT-I No of Lectures: 14
Introduction to Software project management: Software project versus other types,Nature of software
production, Activities by Software Project Management, Key objectives of effectivemanagement,
Problems with software projects, Risk reduction, Meaning of project, Software ProjectVersus Other
Types, Nature of software production, Importance of software project management.
Stepwise Project planning: Project scope, Objectives, Business Planning: determining objectives,
Infrastructure, forecasting demand for product, Characteristics, Proposal writing, Effort estimation,
Requirement analysis, Risk identification, Legal issues, Risk identification.
UNIT-II No of Lectures: 14
Cost Estimation and Life Cycle Models: Meaning, managing allocation of resources, Creating
programme, Individual projects, Program management, Risk evaluation, Cost benefit analysis, Evaluation
of individual projects, Introduction to the life cycle models.
Effort Estimation: Meaning, Problems with Estimation Basis, Estimation Techniques Albrecht Function
Point Analysis, Functions Mark II, COCOMO Model, COCOMO extensions.
UNIT-III No of Lectures: 14
Activity Planning: Objectives, Project Schedule.\, Managing the task, managing the plan, Network
Planning Model, Time Dimension, Identifying Critical Path, managing change, readjusting goals and
milestones.
Risk Management: Risk, Categories of Risk, Dealing with Risk, Risk Identification, Risk Assessment,
Risk Planning, Risk Management, Evaluating Risk to the Schedule, Applying the PERT Technique
UNIT-IV No of Lectures: 14
Resource Allocation, Monitoring and Control: Resource allocation introduction, identifying resource
requirements, Scheduling resources, Resource allocation, Publishing the resource & cost schedule,
scheduling sequence, creating frameworks, Data collection, Visualizing progress, Status reports, Milestone
analysis, Cost monitoring, change control, Cost (direct and indirect), Earned value analysis, Performance
ratio.
Software quality & small projects: Introduction, Defining software quality., Software Quality: IS09126,
Software measures, Product versus process quality., Management of external standards,Problems with
student projects, Content of project plan.
List of Books:
1. Software Project Management by Bob hughes, Mike cotterell, Rajibmall, McGraw hill
education.
2. Software Project Management By Mohapatra Dr Sanjay, Cengage Learning.
3. Software Project Management: A Real-World Guide To Success By JoelHenry, Pearson.
4. Software Project Management By Subramanian Chandramouli, SaikatDutt, Pearson.
UNIT-I No of Lectures: 14
Digital Image Fundamentals: Fundamentals of image processing, applications of image processing,
elements of visual perception, image sampling and quantization, basic relationship between pixels, basic
geometric transformation.
Transformations: Introduction to Fourier Transform, properties of 2D Fourier Transform, FFT,
separable image transforms-Walsh, Hadamard, Discrete Cosine Transform and Haar Transform.
UNIT-II No of Lectures: 14
Image Enhancement: Spatial domain methods- Basic grey level transformation, Histogram equalization,
Image subtraction, Image averaging. Spatial filtering: Smoothing, sharpening filters, Laplacian filters.
Frequency domain filters: Smoothing, Sharpening filters. Homomorphic filtering.
UNIT-III No of Lectures: 14
Image Degradation and Restoration: Model of Image degradation and restoration process, noise
models, inverse filtering, Least mean square filtering, constrained least mean square filtering, blind image
restoration, pseudo inverse, singular value decomposition.
UNIT-IV No of Lectures: 14
Image Compression: Lossless Compression- Variable length coding, LZW coding, bit plane coding,
predictive coding. Lossy Compression- Transform coding, wavelet coding. Basic image compression
standards- JPEG, MPEG.
Edge Detection and Segmentation: Edge detection, thresholding, region-based segmentation Boundary
representation: chair codes- Polygonal approximation, boundary segments, boundary descriptors: simple
descriptors Fourier descriptors, regional descriptors, simple descriptors, texture.
List of Books:
1. Digital Image Processing By Rafael C. Gonzalez, Richard Eugene Woods.
2. Fundamentals of Image Processing by Anil K. Jain Prentice Hall.
3. Kenneth R. Castleman, Digital Image Processing ‘, Pearson, 2006
4. Rafael C. Gonzalez, Richard E. Woods, Steven Eddins, Digital Image Processing using MATLAB,
Pearson Education, Inc., 2011.
5. William K. Pratt, Digital Image Processing ‘, John Wiley, New York, 2002
UNIT-I No of Lectures: 12
IoT & Web Technology: Introduction to IoT, Concept and Terminology of the Internet of Things,
History of IoT, Requirements of IoT, Internet of Things Vision, Challenges in IoT, IoT Strategic
Research and Innovation Directions, Future Internet Technologies, Security, Privacy & Trust
UNIT-II No of Lectures: 12
M2M to IoT: Introduction, Some Definitions, M2M Value Chains, IoT Value Chains, An emerging
industrial structure for IoT, IoT enabling technologies- Sensors, Actuators, Gateways, Local and Global
connectivity, Introduction to wireless communication network, MANET
UNIT-III No of Lectures: 14
IoT -State of the Art: Reference Architecture Model- Introduction, IoT reference Model, IoT Protocols
Functional View, Information View, Deployment and Operational View, Other Relevant architectural views.
Security and Governance: Introduction, Overview of Governance, Privacy and Security Issues,
Contribution from FP7 Projects, Security, Privacy and Trust in IoT-Data-Platforms for Smart Cities
UNIT-IV No of Lectures: 16
IoT Applications for Value Creations: Introduction, IoT applications for industry: Future Factory
Concepts, Brownfield IoT, Smart Objects, Smart Applications
IoT In Industry: Four Aspects in your Business to Master IoT, IoT for Retailing Industry, IoT For Oil
and Gas Industry
Developing IoTs: Introduction to Python, Introduction to different IoT tools, developing applications
through IoT tools, developing sensor-based application through embedded system platform,
Implementing IoT concepts with python
List of Books:
1. Vijay Madisetti, Arshdeep Bahga, Internet of Things: A Hands-On Approach, Orient Blackswan
Pvt. Ltd.- New Delhi, First Edition, 2015.
2. Waltenegus Dargie, Christian Poellabauer, Fundamentals of Wireless Sensor Networks: Theory and
Practice, Wiley-Blackwell, July 2010.
3. Francis da Costa, Rethinking the Internet of Things: A Scalable Approach to Connecting Everything,
1st Edition, Apress Publications, 2013
4. Jan Holler, Vlasios Tsiatsis, Catherine Mulligan, Stefan Avesand, Stamatis Karnouskos, David Boyle,
From Machine-to-Machine to the Internet of Things: Introduction to a New Age of Intelligence, 1st
Edition, Academic Press, 2014.
Text Book:
1. Michael Berthold, David J. Hand, “Intelligent Data Analysis”, Springer, 2007.
2. Tom White “Hadoop: The Definitive Guide” Third Edition, O’reilly Media, 2012.
3. Anand Rajaraman and Jeffrey David Ullman, “Mining of Massive Datasets”, CUP, 2012.
4. Bill Franks, “Taming the Big Data Tidal Wave: Finding Opportunities in Huge Data Streams
with Advanced Analytics”, John Wiley& sons, 2012.
5. Glenn J. Myatt, “Making Sense of Data”, John Wiley & Sons, 2007.
MPLS: Benefits of MPLS, MPLS architecture, forwarding labelled packets, LDP overview.
UNIT-II No. of Lectures: 14
Routing: Overview of routing algorithms, features of a routing algorithm, classification, shortest path
algorithm, Dijkstra algorithm, distance vector and link state algorithm, routing between peers (BGP)
Multicast: IGMP, PIM, DVMRP, mobility, mobile IP.
UNIT-III No. of Lectures: 12
Flow and Congestion Control: Window and rate-based schemes, decbit. ATM-ABR;
Quality of Service: IETF integrated services model, differentiated services model.
List of Books:
1. Beginning android programming with android studio by J. F. Dimarzio, Wiley.
2. Beginning android programming: develop and design by Chris Haseman, Pearson Education
India.
3. Android programming unleashed by B.M Harwani, Pearson Education India.
4. Hello, Android: Introducing Google's Mobile Development Platform by Ed Burnett.
List of Books:
1. Krishna Rungta , “Learn AngularJS in 1 Day: Complete Angular JS Guide with
Examples”
2. Asim Hussain “Angular: From Theory To Practice”
3. Matt Frisbie “Angular 2 Cookbook”
List of Books:
1. James Evan, Business Analytics- Methods, Models, and Decisions (2nd Edition).
2. Pearson, 2013 Gert H. N. Laursen, Business Analytics for Managers: Taking Business
Intelligence Beyond Reporting, Wiley (2nd Edition),2010.
3. S. Christian Albright and Wayne L. Winston, Analytics: Data Analysis and Decision Making,
Sixth Edition, 2014.
4. Grus, Joel. Data science from scratch: first principles with python. O'Reilly Media, 2019.
List of Books:
1. John G. Proakis, Dimitris, G. Manolakis, “Digital Signal Processing: Principles, Algorithms and
Applications”, PHI.
2. S.Salivahanan, A.Vallavaraj and C. Gnanapriya, “Digital Signal Processing”, TMH, 2000.
3. A.V. Oppenheim and R.W.Schafer, Englewood, “Digital Signal Processing”, Prentice-Hall Inc,
1975.
4. B.Venkatramani & M.Bhaskar, “Digital Signal Processors architecture, programming and
applications”,TMH, 2002.
5. Digital Image Processing, Rafael C Gonzalez, Richard E.Woods, Second Edition, Pearson
Education/PHI
ELECTIVE-IV
&
ELECTIVE-V
List of Books:
1. Deng & Yu, Deep Learning: Methods and Applications, Now Publishers, 2013.
2. Ian Goodfellow, Yoshua Bengio, Aaron Courville, Deep Learning, MIT Press, 2016.
3. Michael Nielsen, Neural Networks and Deep Learning, Determination Press, 2015.
4. Hands–On Machine Learning with Scikit–Learn and TensorFlow 2e: Concepts, Tools, and
Techniques to Build Intelligent Systems by Aurelien Geron.
List of Books:
1. R.K.Mittal and I.J.Nagrath, Robotics and Control, Tata McGraw Hill, New Delhi,4th Reprint,
2005.
2. John J.Craig , Introduction to Robotics Mechanics and Control, Third edition, Pearson Education,
3. M.P.Groover, M.Weiss, R.N. Nageland N. G.Odrej, Industrial Robotics, McGraw-Hill
Singapore, 1996.
4. Ashitava Ghoshal, Robotics-Fundamental Concepts and Analysis’, Oxford University Press,
Sixth impression, 2010.
5. B.K.Ghosh, Control in Robotics and Automation: Sensor Based Integration, Allied
Publishers,Chennai, 1998
6. S.Ghoshal, “ Embedded Systems & Robotics” – Projects using the 8051 Microcontroller”,
Cengage Learning, 2009.
UNIT-I No of Lectures: 14
Computing Paradigms: High-Performance Computing, Parallel Computing, Distributed Computing,
Cluster Computing, Grid Computing, Cloud Computing, Bio computing, Mobile Computing, Quantum
Computing, Optical Computing, Nano computing.
Cloud Computing Fundamentals: Motivation for Cloud Computing, The Need for Cloud Computing,
Defining Cloud Computing, Definition of Cloud computing, Cloud Computing as a Service, Cloud
Computing as a Platform, Principles of Cloud computing, Five Essential Characteristics, Four Cloud
Deployment Models
UNIT-II No of Lectures: 14
Cloud Computing Architecture and Management: Cloud architecture, Layer, Anatomy of the
Cloud, Network Connectivity in Cloud Computing, Applications on the Cloud, Managing the Cloud,
Managing the Cloud Infrastructure, Managing the Cloud applications, Migrating Application to Cloud,
Phases of Cloud Migration Approaches for Cloud Migration.
UNIT-III No of Lectures: 14
Cloud Service Models: Infrastructure as a Service, Characteristics of IaaS. Suitability of IaaS, Pros and
Cons of IaaS, Summary of IaaS Providers, Platform as a Service, Characteristics of PaaS, Suitability of
PaaS, Pros and Cons of PaaS, Summary of PaaS Providers, Software as a Service, Characteristics of
SaaS, Suitability of SaaS, Pros and Cons of SaaS, Summary of SaaS Providers, Other Cloud Service
Models.
UNIT-IV No of Lectures: 14
Cloud Service Providers: EMC, EMC IT, Captiva Cloud Toolkit, Google, Cloud Platform, Cloud
Storage, Google Cloud Connect, Google Cloud Print, Google App Engine, Amazon Web Services,
Amazon Elastic Compute Cloud, Amazon Simple Storage Service, Amazon Simple Queue ,service,
Microsoft, Windows Azure, Microsoft Assessment and Planning Toolkit, SharePoint, IBM, Cloud
Models, IBM Smart Cloud, SAP Labs, SAP HANA Cloud Platform, Virtualization Services Provided by
SAP, Sales force, Sales Cloud, Service Cloud: Knowledge as a Service, Rack space, VMware, Manjra
soft, Aneka Platform
List of Books:
1. Ricardo Puttini, Thomas Erl, and Zaigham Mahmood, “Cloud Computing, Concepts,
Technology and Architecture”.
2. M. J. Kevis, “Architecting The Cloud”, Wiley.
3. R.Yeluri, “Building the Infrastructure for Cloud Security”, Apress Open.
4. B. Sosinsky, “Cloud Computing Bible”.
5. Cloud Security and Privacy: An Enterprise Perspective on Risks and Compliance, Tim Mather,
Subra Kumaraswamy, Shahed Latif, O’Reilly, SPD, rp 2011
List of Books:
1. Computer Architecture: A Quantitative Approach by John Hennessy & David Patterson,
Morgan Kaufmann publication.
2. Computer Organization and Design: A Hardware/Software Interface by David Patterson and
John Hennessy, Morgan Kaufmann.
3. Computer Architecture & Parallel Processing by Hwang & Briggs, Tata McGraw Hill.
4. Computer Organization & Architecture: Designing for Performance by William Stallings,
Pearson
List of Books:
1. Daniel Jurafsky James H., An Introduction to Natural Language Processing, Third Edition,
Tata McGraw- Hill
2. James H. Martin, Computational Linguistics, and Speech Recognition
3. James A. Natural language Understanding, Pearson Education
List of Books:
1. Jochen, Schiller. "Mobile communications." (2003). Pearson Education
2. Stallings, William. Wireless communications & networks. Pearson Education India, 2009.
3. Rappaport, Theodore S. "Wireless Communications--Principles and Practice, (The Book End).”
(2002):
4. Yi-Bing, Imrich Chlamtac, and I. M. R. I. C. H. Chlamtac. "Wireless and Mobile Network
Architecture." (2001).
5. Tse, David, and Pramod Viswanath. Fundamentals of wireless communication. Cambridge
university press, 2005.
List of Books:
1. R in A Nutshell By Joseph Adler, O'reilly
2. R Programming for Beginners By Sandip Rakshit, Mc Graw Hill
3. Hands on Programming With R: Write Your Own Functions and Simulations By Garrett
Grolemund, O'reilly
List of Books:
1. Douglas B. West, Introduction to Graph Theory, Prentice Hall India Ltd., 2001 2.
2. Narasingh Deo, Graph theory, PHI, 1979. 3. Robin J. Wilson,
3. Introduction to Graph Theory, Longman Group Ltd., 2010.
4. R. Diestel, Graph Theory, free online edition, 2016.
OPEN ELECTIVES
List of Books:
1. Ravi Kalakota, Andrew Winston, "Frontiers of Electronic Commerce", Addison-Wesley.
2. Laudon, "E-Commerce: Business, Technology, Society", Pearson Education.
3. S. Bajaj and Nag, "E-Commerce the cutting edge of Business", TMH.
4. Turban, "Electronic Commerce 2004: A Managerial Perspective", Pearson Education.
List of Books:
1. Kottwitz, S., LaTeX Beginner's Guide, Packt Publishing, 2011.
2. Kopka, H., Daly, P.W., Guide to LaTeX, Addison-Wesley Professional; 4th edition, 2003.
3. Grätzer, G., More Math Into LaTeX, Springer, Revised 5th edition, 2016.
List of Books:
1. Ram Chandran, ‘Entrepreneurial Development’, Tata McGraw Hill, New Delhi
2. Badhai, B ‘Entrepreneurship for Engineers’, Dhanpat Rai & co. (p) Ltd.
3. Desai, Vasant, ‘ Project Management and Entrepreneurship’, Himalayan Publishing House,
Mumbai, 2002.
4. Ramaswamy V S and NamaKumari : Marketing Management, McMillan India Ltd
5. Philip Kotler and Abraham Koshy : Principles of Marketing, Pearson Education, New Delhi
6. McShane, S.L. and Von Glinow, M.A., Organizational Behaviour, New Delhi, Tata McGrawHill
Publishing company ltd.
7. P. Jyothi, P. and Venkatesh, D.N., Human Resource Management, New Delhi, Oxford University
Press.
List of Books:
1. Multimedia System Design, Andleigh and Thakarar , PHI
2. Multimedia Technology & Application, David Hillman, Galgotia Publications.
3. Multimedia Computing Communication and Application, Steinmetz, Pearson Education.
4. Virtual Reality Systems, John Vince, Pearson Education.
5. Fundamentals of Computer Graphics and Multimedia, D.P. Mukherjee, PHI