M.Sc. (5 yrs) CS
M.Sc. (5 yrs) CS
Achieve excellence in the field of Computer Science and Information Technology with strong
Mathematical foundation by providing high quality teaching, research and training in Computer
Science and all related Engineering fields to our students where they can significantly contribute
to our society in all aspects
Contribute to the quality Personnel Development in Computer Science / Information Technology
through our effective Masters Programmes
MISSION
To provide determined computer science background to the students to hone their skills with
best-in-class emerging technologies across the globe.
1
ANNA UNIVERSITY, CHENNAI
UNIVERSITY DEPARTMENTS
REGULATIONS 2023
CHOICE BASED CREDIT SYSTEM
1. PROGRAMME EDUCATIONAL OBJECTIVES (PEOs):
1. To make the students have sufficient knowledge and understanding in the field of
computer science
2. To ensure the students have sufficient understanding in the fundamental and core
concepts of computer science and information technology, which serve as the basics of
computer science
3. To ensure the students are aware of the cutting edge technologies currently being used
in industries and provide them a platform to learn the same
4. To ensure the students work on multiple academic projects pertaining to different
domains, to have strong knowledge in the respective domain
5. To ensure this academic programme provides them learning to take leadership
positions in the industry and also initiate businesses offering innovative solutions
2
3. PEO / PO MAPPING:
1. ✓ ✓
2. ✓ ✓ ✓
3. ✓ ✓ ✓ ✓
4. ✓ ✓ ✓ ✓
5. ✓ ✓ ✓ ✓ ✓
3
4. MAPPING OF COURSE OUTCOME AND PROGRAMME OUTCOME
Functions
Object-Oriented Programming using C++ 3 2.2 3 - 1.2
Database Management Systems 2.8 1 1.2 1 2
Operating Systems 2.6 - 1.8 - 0.8
Microprocessor and Applications 2.4 0.4 0.4 - 0.2
Principles of Analog and Digital 3 0.6 1.6 - 0.4
YEAR 2
Communication Systems
Database Management Systems Laboratory 2.8 1 1.2 1 2
Discrete Structures 3 2 3 - -
Algebra and Number Theory 3 2 3 - -
Semester 4
Professional Elective – I
Web Technology Laboratory 3 2 3 1 2
Operations Research 3 2 3 - -
Semester 6
4
Professional Elective – II
Semester 7 Mini Project
Industrial Project
Sciences
Artificial Intelligence 3 1.8 2 - 0.4
Cyber Security 3 1.8 1.8 - 0.2
Professional Elective – III
Professional Elective – IV
Statistical Programming Laboratory using R
3 1.2 1.8 - 2
and Python
Numerical Methods 3 2 3 - -
Internet of Things 3 1.8 2 - 0.4
Semester 9
Semester 10
Project Work
5
ANNA UNIVERSITY, CHENNAI
UNIVERSITY DEPARTMENTS
PERIODS TOTAL
S. COURSE CATE PER WEEK CONTACT CREDITS
NO. CODE COURSE TITLE GORY
L T P PERIODS
THEORY
1. HS3152 Communicative English – I FC 3 0 2 5 4
2. MA3162 Matrices and Calculus FC 4 0 0 4 4
3. PH3152 Applied Physics FC 3 0 0 3 3
4. CY3152 Chemistry of Materials FC 3 0 0 3 3
5. XC3151 Digital Systems PCC 3 0 2 5 4
Problem Solving and C
6. XC3152 PCC 2 0 4 6 4
Programming
PRACTICAL
Computer Aided Engineering
7. GE3163 FC 0 0 4 4 2
Drawing Laboratory
TOTAL 18 0 12 30 24
SEMESTER II
PERIODS TOTAL
S. COURSE CATE PER WEEK CONTACT CREDITS
COURSE TITLE
NO. CODE GORY PERIODS
L T P
THEORY
1. HS3252 Communicative English – II FC 3 0 2 5 4
Basic Electrical and Electronics
2. EE3151 FC 3 0 2 5 4
Engineering
Ordinary Differential Equations
3. MA3253 FC 4 0 0 4 4
and Transform Techniques
4. XT3251 Python Programming PCC 2 0 4 6 4
5. XC3251 Data Structures PCC 3 0 0 3 3
6. XC3252 Computer Architecture PCC 3 0 0 3 3
PRACTICAL
7. XT3261 Data Structures Laboratory PCC 0 0 4 4 2
TOTAL 18 0 12 30 24
6
SEMESTER III
PERIODS TOTAL
S. COURSE CATE PER WEEK CONTACT CREDITS
COURSE TITLE
NO. CODE GORY L T P PERIODS
THEORY
Partial Differential Equations
1. MA3351 FC 4 0 0 4 4
and Complex Functions
Object-Oriented Programming
2. XT3351 PCC 3 0 2 5 4
using C++
Database Management
3. XT3352 PCC 3 0 0 3 3
Systems
4. XC3351 Operating Systems PCC 3 0 2 5 4
5. XC3352 Microprocessor and Applications PCC 3 0 2 5 4
Principles of Analog and Digital
6. XT3353 PCC 3 0 0 3 3
Communication Systems
PRACTICAL
Database Management
7. XT3361 PCC 0 0 4 4 2
Systems Laboratory
TOTAL 19 0 10 29 24
SEMESTER IV
PERIODS TOTAL
S. COURSE CATE PER WEEK CONTACT CREDITS
COURSE TITLE
NO. CODE GORY PERIODS
L T P
THEORY
1. MA3451 Discrete Structures FC 4 0 0 4 4
7
SEMESTER V
PERIODS TOTAL
S. COURSE CATE PER WEEK
COURSE TITLE CONTACT
NO. CODE GORY CREDITS
L T P PERIODS
THEORY
1. MA3551 Probability and Statistics FC 4 0 0 4 4
2. XC3501 Cryptography and Data Security PCC 3 0 2 5 4
3. XT3551 Data Warehousing and Mining PCC 3 0 2 5 4
4. XT3552 Web Technology PCC 3 0 0 3 3
5. XC3551 Theory of Computation PCC 4 0 0 4 4
6. Professional Elective – I PEC 3 0 0 3 3
PRACTICAL
7. XT3561 Web Technology Laboratory PCC 0 0 4 4 2
TOTAL 20 0 8 28 24
SEMESTER VI
PERIODS TOTAL
S. COURSE CATE PER WEEK
COURSE TITLE CONTACT
NO. CODE GORY CREDITS
L T P PERIODS
THEORY
1. MA3651 Operations Research FC 4 0 0 4 4
2. XC3601 Compiler Design PCC 3 0 0 3 3
3. XT3651 Machine Learning PCC 3 0 2 5 4
Design and Analysis of
4. XC3651 PCC 4 0 0 4 4
Algorithms
5. XC3652 Cloud Computing PCC 3 0 0 3 3
6. Professional Elective – II PEC 3 0 0 3 3
PRACTICAL
7. XC3611 Mini Project EEC 0 0 4 4 2
TOTAL 20 0 6 26 23
8
SEMESTER VII
PERIODS TOTAL
S. COURSE CATE PER WEEK
COURSE TITLE CONTACT
NO. CODE GORY CREDITS
L T P PERIODS
PRACTICAL
1. XC3711 Industrial Project EEC 0 0 32 32 16
TOTAL 0 0 32 32 16
SEMESTER VIII
PERIODS TOTAL
S. COURSE CATE PER WEEK
COURSE TITLE CONTACT
NO. CODE GORY CREDITS
L T P PERIODS
THEORY
Advanced Statistical Methods
1. MA3851 FC 4 0 0 4 4
for Computing
2. XC3801 Networking Technologies PCC 3 0 0 3 3
Principles of Management and
3. XT3851 PCC 3 0 0 3 3
Behavioural Sciences
4. XC3851 Artificial Intelligence PCC 3 0 0 3 3
5. XT3852 Cyber Security PCC 3 0 0 3 3
6. Professional Elective – III PEC 3 0 0 3 3
7. Professional Elective – IV PEC 3 0 0 3 3
PRACTICAL
Statistical Programming
8. XC3861 PCC 0 0 4 4 2
Laboratory using R and Python
TOTAL 22 0 4 26 24
9
SEMESTER IX
PERIODS TOTAL
S. COURSE CATE PER WEEK
COURSE TITLE CONTACT
NO. CODE GORY CREDITS
L T P PERIODS
THEORY
1. MA3951 Numerical Methods FC 4 0 0 4 4
2. XT3951 Internet of Things PCC 3 0 0 3 3
3. XC3901 Digital Forensics PCC 3 0 2 5 4
4. XC3951 Multimedia Technologies PCC 3 0 0 3 3
5. Professional Elective – V PEC 3 0 0 3 3
6. Professional Elective – VI PEC 3 0 0 3 3
PRACTICAL
7. XT3961 Internet of Things Laboratory PCC 0 0 4 4 2
8. XC3911 Creative and Innovative Project EEC 0 0 4 4 2
TOTAL 19 0 10 29 24
SEMESTER X
PERIODS TOTAL
S. COURSE CATE PER WEEK
COURSE TITLE CONTACT
NO. CODE GORY CREDITS
L T P PERIODS
PRACTICAL
1. XC3011 Project Work EEC 0 0 32 32 16
TOTAL 0 0 32 32 16
10
FOUNDATION CORE COURSES (FC)
COURSE CATE CONTACT
S.NO COURSE TITLE L T P C
CODE GORY PERIODS
1. HS3152 Communicative English - I FC 5 3 0 2 4
2. MA3162 Matrices and Calculus FC 4 4 0 0 4
3. PH3152 Applied Physics FC 3 3 0 0 3
4. CY3152 Chemistry of Materials FC 3 3 0 0 3
GE3163
5. Computer Aided Engineering FC
Drawing Laboratory 4 0 0 4 2
6. HS3252 Communicative English - II FC 5 3 0 2 4
Basic Electrical and
7. EE3151
Electronics Engineering FC 5 3 0 2 4
Ordinary Differential
8. MA3253 Equations and Transform FC 4 4 0 0 4
Techniques
11
15. XC3452 Java Programming PCC 3 3 0 0 3
16. XT3451 Computer Networks PCC 5 3 0 2 4
Environmental Sciences and
17. CY3251 PCC 2 2 0 0 2
Sustainability
18. XC3461 Java Programming Laboratory PCC 4 0 0 4 2
19. XC3501 Cryptography and Data Security PCC 5 3 0 2 4
20. XT3551 Data Warehousing and Mining PCC 5 3 0 2 4
21. XT3552 Web Technology PCC 3 3 0 0 3
22. XC3551 Theory of Computation PCC 4 4 0 0 4
23. XT3561 Web Technology Laboratory PCC 4 0 0 4 2
24. XC3601 Compiler Design PCC 3 3 0 0 3
25. XT3651 Machine Learning PCC 5 3 0 2 4
Design and Analysis of
26. XC3651 PCC 4 4 0 0 4
Algorithms
27. XC3652 Cloud Computing PCC 3 3 0 0 3
28. XC3801 Networking Technologies PCC 3 3 0 0 3
Principles of Management and
29. XT3851 PCC 3 3 0 0 3
Behavioural Sciences
30. XC3851 Artificial Intelligence PCC 3 3 0 0 3
31. XT3852 Cyber Security PCC 3 3 0 0 3
Statistical Programming
32. XC3861 PCC 4 0 0 4 2
Laboratory using R and Python
33. XT3951 Internet of Things PCC 3 3 0 0 3
34. XC3901 Digital Forensics PCC 5 3 0 2 4
35. XC3951 Multimedia Technologies PCC 3 3 0 0 3
36. XT3961 Internet of Things Laboratory PCC 4 0 0 4 2
Total 141 89 0 52 115
12
5. XC3073 Computational Finance PEC 3 3 0 0 3
6. XT3073 Computer Graphics PEC 3 3 0 0 3
7. XT3074 Database Administration PEC 3 3 0 0 3
8. XT3075 Database Tuning PEC 3 3 0 0 3
9. XT3076 Data Science and Analytics PEC 3 3 0 0 3
10. XC3074 Deep Learning PEC 3 3 0 0 3
11. XC3075 Digital Image Processing PEC 3 3 0 0 3
12. XC3076 E - Learning PEC 3 3 0 0 3
Enterprise Application
13. XT3077 PEC 3 3 0 0 3
Development
14. XC3077 Game Design and Development PEC 3 3 0 0 3
15. XT3078 Geographical Information System PEC 3 3 0 0 3
16. XT3079 Information Coding Techniques PEC 3 3 0 0 3
17. XT3080 Information Retrieval Techniques PEC 3 3 0 0 3
18. XT3081 Information Security PEC 3 3 0 0 3
19. XT3082 Marketing Analytics PEC 3 3 0 0 3
20. XC3078 Mobile Computing PEC 3 3 0 0 3
21. XC3079 Modelling and Simulation PEC 3 3 0 0 3
22. XT3083 Multimedia Analytics PEC 3 3 0 0 3
23. XC3080 Natural Language Processing PEC 3 3 0 0 3
24. XC3081 Network Science PEC 3 3 0 0 3
25. XT3084 Open Source Programming PEC 3 3 0 0 3
26. XT3085 Pattern Recognition PEC 3 3 0 0 3
27. XT3086 Personal Software Processes PEC 3 3 0 0 3
28. XC3082 Quantum Computing PEC 3 3 0 0 3
29. XT3087 Semantic Web PEC 3 3 0 0 3
30. XC3083 Social Psychology PEC 3 3 0 0 3
XT3088 Software Testing and Quality
31. PEC 3 3 0 0 3
Assurance
32. XT3089 Total Quality Management PEC 3 3 0 0 3
33. XC3084 Unix and Network Programming PEC 3 3 0 0 3
34. XT3090 User Interface Design PEC 3 3 0 0 3
35. XT3091 Web Analytics PEC 3 3 0 0 3
SUMMARY
13
HS3152 COMMUNICATIVE ENGLISH – I L T P C
3 0 2 4
OBJECTIVES:
To build lexical competency and accuracy that will help learners to use language
effectively
To learn various reading strategies that will enable learners to comprehend the different
modes of reading materials of varied levels of complexity
To comprehend the linguistic aspects of various rhetorical structures and functions of
Technical English and use them effectively in writing
To improve the communicative competence of learners
To help learners use language effectively in academic /work contexts
To use language efficiently in expressing their opinions via various media
To build lexical competency and accuracy that will help learners to use language
effectively
UNIT I BASICS OF COMMUNICATION 9+6
Listening – Listening to a Telephone conversation & Writing message, gap filling; Reading –
Telephone message, bio-note; Writing – Message, Self-introduction / Personal profile; Grammar
– Simple present tense, Present continuous tense, Asking questions (wh-questions); Vocabulary
– One word substitution, Synonyms, Abbreviations & Acronyms
LAB ACTIVITY: Introducing oneself – Self introduction; Telephone conversation, Relaying
telephone message – Role play
UNIT II NARRATION 9+6
Listening – Listening to a Travel podcast / Watching a travel documentary; Reading – Reading
an excerpt from a travelogue, Newspaper Report; Writing – Narrative writing – event, personal
experience; Grammar – Subject – verb, Simple past, Past continuous Tenses; Vocabulary –
Antonyms, Word formation (Prefix & Suffix)
LAB ACTIVITY: Narrating one’s personal experience in front of a group – formal and informal
context – first day in college / vacation / first achievement / failure etc.,
14
LAB ACTIVITY: Taking part in a group discussion on general topics – Debating on topics of
interest and relevance
TOTAL: (45+30) = 75 PERIODS
OUTCOMES:
CO 1 : Use grammar and vocabulary suitable for general context.
CO 2 : Comprehend the nuances of spoken and written communication.
CO 3 : Communicate effectively in formal and informal contexts.
CO 4 : Read different types of texts and comprehend their denotative and connotative
meanings.
CO 5 : Write different types of texts using appropriate formats.
REFERENCES:
1. “English for Science & Technology I” by Cambridge University Press, 2023
2. “English for Engineers and Technologists” Volume I by Orient Blackswan, 2022
3. “Interchange” by Jack C.Richards, Fifth Edition, Cambridge University Press, 2017
4. “English for Academic Correspondence and Socializing” by Adrian Wallwork, Springer, 2011.
5. “The Study Skills Handbook” by Stella Cortrell, Red Globe Press, 2019
6. www.uefap.com
CO – PO Mapping:
UNIT I MATRICES 12
Eigen values and Eigen vectors – Properties of Eigen values - Linear dependence and
independence of Eigen vectors - Cayley-Hamilton theorem (excluding proof), Reduction to
15
Diagonal form – Similarity transformation, Quadratic form – Reduction of Quadratic form to
canonical form, Nature of a Quadratic form
UNIT II DIFFERENTIAL CALCULUS 12
Functions of several variables, limit, continuity, partial derivatives, differentiability, total
differential, Errors and approximations - Taylor‘s formula for two variables - extreme values and
saddle points, constrained maxima and minima: Lagrange multipliers with single constraint
UNIT III INTEGRAL CALCULUS 12
Improper integrals of the first and second kind and their convergence – Differentiation under
integrals - Evaluation of integrals involving a parameter by Leibnitz rule – Beta and Gamma
functions – Properties – Evaluation of integrals using Beta and Gamma functions – Error functions
UNIT IV MULTIPLE INTEGRALS 12
Double integrals – Change of order of integration – Double integrals in polar coordinates – Area
enclosed by plane curves – Triple integrals – Volume of Solids – Change of variables in double
and triple integrals
UNIT V VECTOR CALCULUS 12
Gradient of a scalar field, directional derivative, divergence of a vector field, curl of a vector field.
Line integrals of scalar and vector fields – Surface integrals of scalar and vector fields -
Verification of Green‘s, Stoke’s and Gauss divergence theorems (without proof)
TOTAL: 60 PERIODS
OUTCOMES:
CO1 : The students will be able to Use the matrix algebra methods for solving practical
problems.
CO2 : The students will be able to use differential calculus ideas on several variable functions.
CO3 : The students will be able to apply different methods of integration in solving practical
problems by using Beta and gamma functions.
CO4 : The students will be able to apply multiple integral ideas in solving areas, volumes and
other practical problems.
CO5 : The students will be able to calculate grad, div and curl and use Gauss, Stokes and
Greens theorems to simplify calculations of integrals.
REFERENCES:
1. Joel Hass, Christopher Heil, Maurice D.Weir "‘Thomas‘ Calculus", Pearson Education.,
New Delhi, 2018.
2. Grewal B.S., “Higher Engineering Mathematics”, Khanna Publishers, 44 th Edition, New
Delhi, 2017.
3. James Stewart, "Calculus with Early Transcendental Functions", Cengage Learning, 6th
Edition, New Delhi,2013.
4. Erwin Kreyszig "Advanced Engineering Mathematics", Wiley India Pvt Ltd., New Delhi,
2015.
5. Greenberg M.D., “Advanced Engineering Mathematics”, Pearson Education2nd Edition, 5 th
Reprint, Delhi, 2009.
6. Jain R.K. and Iyengar S.R.K., “Advanced Engineering Mathematics”,Narosa Publications,
5th Edition, New Delhi, 2017.
7. Narayanan S. and Manicavachagom Pillai T. K., “Calculus" Volume I and II, S. Viswanathan
Publishers Pvt. Ltd., Chennai, 2009.
8. Peter V.O’Neil, “Advanced Engineering Mathematics”, Cengage Learning India Pvt., Ltd,
7th Edition, New Delhi , 2012.
9. Ramana B.V., “Higher Engineering Mathematics”, Tata McGraw Hill Co. Ltd., 11 th Reprint,
New Delhi, 2010.
16
CO – PO Mapping:
PROGRAMME OUTCOMES
Course
Outcomes PO1 PO2 PO3 PO4 PO5
CO1 3 2 3 - -
CO2 3 2 3 - -
CO3 3 2 3 - -
CO4 3 2 3 - -
CO5 3 2 3 - -
AVG 3 2 3 - -
17
UNIT V PHOTONICS AND FIBREOPTICS 9
Spontaneous and stimulated emission - population inversion, CO2 laser, semiconductor lasers -
homojunction and heterojunction lasers - industrial applications. Principle and propagation of light in
optical fibres – numerical aperture and acceptance angle - types of optical fibres (material, refractive
index, mode) – attenuation, dispersion, bending
TOTAL: 45 PERIODS
OUTCOMES:
CO 1 : Understand the concepts of properties of matter and thermal physics.
CO 2 : Apply the concepts of acoustics and ultrasonic.
CO 3 : Appreciate the importance of quantum physics.
CO 4 : Understand the importance of semiconductor physics.
CO 5 : Make use of photonic and fiber-optic devices.
REFERENCES:
1. G. Keiser, “Optical fiber communications”, McGraw Hill Co., New York, 1995.
2. Gaur R.K. and Gupta S.L., “Engineering Physics”, Dhanpat Rai Publications, Mumbai, 2013.
3. N. Garcia and A. Damask, “Physics for Computer Science Students”, Springer, New York,
2012.
4. Palanisamy, P. K. “Engineering Physics”, SCITECH Publications, Chennai, 2012.
5. Paul Tipler and Gene Mosca, Physics for Scientists and Engineers, W.H. Freeman, New
York,2007.
6. Pillai, S. O., “Solid State Physics”, New Age International Publishers, New Delhi, 2009.
7. Raymond Serway, John Jewett, “Physics for Scientists and Engineers”, Bostan,Brooks/Cole,
2014.
CO – PO Mapping:
18
UNIT I BATTERIES 9
Primary and Secondary – Requirements – Commercial batteries – Dry Cell, Lead acid, metal hydride,
Li-ion. Fuels cells – Classification - Hydrogen - oxygen fuel cell. UPS - Components and types of
UPS. Batteries used in UPS
UNIT II POLYMER IN ELECTRONICS 9
Basic concepts of polymers - degree of polymerization, functionality of monomer, classification of
polymer. Piezo and pyro electric polymers – Polyvinyl fluoride – Polyvinylidernefluoride – preparation,
properties and applications. Conducting polymers – Classifications – Polyparaphenylene and
polypyrrole. Potting – potting compounds – potting problems - encapsulation. Photoresists – Positive
and negative
TOTAL: 45 PERIODS
OUTCOMES:
CO 1 : Conversant in the theories involved in batteries and its applications.
CO 2 : Familiar in basic concepts in polymer and its application in the field of electronics.
CO 3 : Exposed to composites and their constituents.
CO 4 : Possess in-depth knowledge about speciality materials.
CO 5 : Conversant in the theories involved in batteries and its applications.
REFERENCES:
1. Dyson R.W. “Specialty Polymer”, Blackie Academic and Professional, Chennai, 2006.
2. Jain P.C and Monika Jain, “Engineering Chemistry”, DhanpetRai Publishing Company (P)Ltd.,
New Delhi,2013.
3. Khanna O.P.,” Material Science” NIH Publications, Maryland, 2007.
4. Sharma S.C. “Composite Materials”, Narosa Publishing House, New Delhi,2000.
5. Wong M.N., “Polymer for electronics and photonic applications”, John Wiley, New York, 2006.
19
CO – PO Mapping:
20
LAB PRACTICES:
1. Study of basic logic gates and realization of logic gates using universal gates
2. Multiplexer and demultiplexer
3. Half and full adder / subtractor
4. Encoder and decoder
5. Binary decade counter
6. BCD to seven segment decoder
TOTAL: (45+30)=75 PERIODS
OUTCOMES:
CO 1 : Apply knowledge of math, science and engineering.
CO 2 : Describe design constraints of digital systems.
CO 3 : Design digital circuitry, analyze and interpret data.
CO 4 : Combinational logic design implementation.
CO 5 : Sequential logic design implementation.
REFERENCES:
1. Charles H. Roth Jr., “Fundamentals of Logic Design”, Cengage Learning, 2021.
2. John F.Wakerly, “Digital Design Principles & Practices”, Pearson Education, 4th Edition, Noida,
India, 2016.
3. Mano, M.M. and Ciletti, M.D., “Digital Design”, Pearson Education, 6th Edition, New Jersey, 2018.
4. Neal S Widmer; Gregory L Moss; Ronald J Tocci, “Digital System: Principles and Applications”,
12th edition, Pearson, London, 2018.
CO – PO Mapping:
PROGRAMME OUTCOMES
Course
Outcomes PO1 PO2 PO3 PO4 PO5
CO 1 : 3 - - - -
CO 2 : 3 - 2 - -
CO 3 : 3 - - - 2
CO 4 : 3 1 - - 3
CO 5 : 3 1 - - 3
AVG: 3 0.4 0.4 - 1.6
21
UNIT I BASICS OF C PROGRAMMING 6+12
Architecture of Computer – Program design: Algorithm - Pseudocode and flow chart–
Introduction to programming paradigms –- Structure of C program - C programming: Data
Types - Constants - Keywords - Operators: Precedence and Associativity - Expressions
- Input/Output statements, Assignment statements - Decision making statements - Switch
statement.
PRACTICALS:
Designing algorithms for programs
Designing flowchart for programs
Programs using integer type, arithmetic operators and basic input/output.
Programs using other data types and operators.
Programs using decision making statements and switch
22
PRACTICALS:
Programs using file read operation
Programs using file write operation
Programs using file seek operation
Programs using macros
REFERENCES:
1. Anita Goel, “Computer Fundamentals”, Pearson Education, Noida, 2010.
2. E. Balagurusamy, “Programming in ANSI C”, McGraw Hill, 2019.
3. Ashok N. Kamthane, Raj Kamal, “Computer Programming and IT”, Pearson Education,2012.
4. Dromey, R.G, “How to solve it by Computer”, Pearson Education, New York,2008.
5. Kernighan, B. Wand Ritchie, D.M, “C Programming language”, Second Edition, Noida, Pearson
Education, 2015
6. Peter Norton, “Introduction to Computers”, Seventh Edition, McGraw Hill, New Delhi, 2017.
7. Byron Gottfired, “Programming with C”, 4th Edition, McGraw Hill, 2018.
8. Yashavant P. Kanetkar, “Let Us C”, 17 th Edition, BPB publications, New Delhi, 2020.
CO – PO Mapping:
PROGRAMME OUTCOMES
Course
Outcomes PO1 PO2 PO3 PO4 PO5
CO 1 : 3 3 3 - -
CO 2 : 3 2 3 - -
CO 3 : 3 2 3 - 2
CO 4 : 3 2 3 - 2
CO 5 : 3 2 3 - 2
AVG: 3 2.2 3 - 1.2
23
ISOMETRIC PROJECTION: Introduction to objects of symmetry with either or any one of the axes and
objects of revolution.
INTERACTIVE GRAPHICS: Parametric modeling –1D, 2D and 3D geometry – transformations -
display – points, lines, planes using software.
CURVES: Parametric curves generation methods -displaying - evaluating control points on curves.
SURFACES: Parametric surface generation methods -displaying - evaluating control points on
surfaces – Iso, sub and super parametric surfaces for FEA
SOLIDS: Generation of part models using Computer Aided Geometric Modeling software. (Autodesk
Fusion 360, CATIA)
GENERATIVE DESIGN: Important of AI, ML, Solid free form fabrication – Types and applications
TOTAL : 60 PERIODS
24
OUTCOMES:
CO 1 : Draw free hand sketching of basic geometrical shapes and multiple views of objects.
CO 2 : Draw orthographic projections of lines and planes
CO 3 : Draw orthographic projections of solids
CO 4 : Draw development of the surfaces of objects
CO 5 : Draw isometric and perspective views of simple solids.
CO – PO Mapping:
25
UNIT III PROBLEM AND SOLUTION 9+6
Listening – To group discussion (case study); Reading – Visual content (Pictures on social issues /
natural disasters) for comprehension; Editorial ; Writing Picture description; Problem & Solution Essay;
Grammar – Modal verbs; Relative pronoun; Vocabulary – Negative prefixes; Signal words for problem
& solution
LAB ACTIVITY: Discussions on Case Study to find solution for problems in professional context.
LAB ACTIVITY: Making presentation with a visual component (ppt) (job interview / project / Innovative
product presentation)
TOTAL: (45+30) = 75 PERIODS
OUTCOMES:
CO 1 : Listen effectively to various oral forms of conversation, lectures, discussion and understand
the main gist of the content.
CO 2 : Communicate effectively in formal and informal context.
CO 3 : Read and comprehend technical texts effortlessly.
CO 4 : Write reports and job application for internship or placement.
CO 5 : Participate effectively in formal group discussions and make formal presentations.
REFERENCES:
1. “English for Science & Technology” by Cambridge University Press, 2023.
2. “English for Engineers and Technologists” by Orient Blackswan, 2022.
3. “Communicative English for Engineers and Professionals” by Bhatnagar Nitin, Pearson India,
2010.
4. Take Off – Technical English for Engineering” by David Morgan, Garnet Education, 2008.
5. “Advanced Communication Skills” by Mathew Richardson, Charlie Creative Lab, 2020.
6. www.uefap.com
CO – PO Mapping:
PROGRAMME OUTCOMES
Course
Outcomes PO1 PO2 PO3 PO4 PO5
CO 1 : 3 - - - 2
CO 2 : 3 3 - - -
CO 3 : 3 2 - - -
CO 4 : 3 - 2 - 3
CO 5 : 3 3 - - 2
AVG: 3 1.6 0.4 - 1.4
26
EE3151 BASICS OF ELECTRICAL AND ELECTRONICS ENGINEERING L T P C
3 0 2 4
ELECTRICAL
1. Verification of ohms and Kirchhoff’s Laws.
2. Load test on DC Shunt Motor.
3. Load test on Single Phase Transformer.
4. Load test on 3 Phase Induction Motor.
ELECTRONICS
1. Half wave and full wave Rectifiers.
2. Application of Zener diode as shunt regulator.
3. Inverting and non-inverting amplifier using operational amplifier.
4. Astable multivibrator using IC 555.
TOTAL: 30 PERIODS
27
COURSE OUTCOMES
Upon successful completion of the course, students should be able to:
CO1: Compute and demonstrate the electric circuit parameters for simple problems.
CO2: Explain the working principles and characteristics of electrical machines, electronic devices and
measuring instruments.
CO3: Identify general applications of electrical machines, electronic devices and measuring
instruments.
CO4: Analyze and demonstrate the basic electrical and electronic circuits and characteristics of
electrical machines..
CO5: Explain the types and operating principles of sensors and transducers.
TEXT BOOKS:
1. Del Toro ‘Electrical Engineering Fundamentals’ Pearson Education, New Delhi, 2022.
2. Alan S. Moris, Principles of Measurements and Instruments, Prentice-Hall of India
Pvt. Ltd., New Delhi, 1988.
3. Smarjit Ghosh ‘Fundamentals of Electrical and Electronics Engineering, 2 nd Edition 2010.
REFERENCES:
1. Rajendra Prasad ‘Fundamentals of Electrical engineering’, Third Edition, Prentice Hall of India,
2014.
2. Sanjeev Sharma ‘Basics of Electrical Engineering’ Wiley, 2019.
3. John Bird, Electrical Circuits theory and Technology, Taylor & Francis Ltd, Seventh Edition,
2022.
4. Doebelin, E.O., Measurements Systems – Application and Design’, McGrawHill Pub-
lishing Co, 2019.
5. D.Roy Choudhury, Shail B. Jain, Linear Integrated Circuits, New age international
Publishers, 2018.
6. H.S. Kalsi, ‘Electronic Instrumentation’, Tata McGraw-Hill, New Delhi, 2010
28
MA3253 ORDINARY DIFFERENTIAL EQUATIONS AND TRANSFORM L T P C
TECHNIQUES 4 0 0 4
OBJECTIVES:
To acquaint the students with Differential Equations which are significantly used in
engineering problems
To make the students appreciate the purpose of using transforms to create a new domain in
which it is easier to handle the problem that is being investigated
To develop the analytic solutions for partial differential equations used in engineering by
Fourier series
To acquaint the student with Fourier transform techniques used in wide variety of situations
in which the functions used are not periodic
To develop Z- transform techniques which will perform the same task for discrete time
systems as Laplace Transform, a valuable aid in analysis of continuous time systems
29
CO4 : The students will be able to compute Fourier transforms of functions arise in engineering
applications.
CO5 : The students will be able to understand Z-transforms
REFERENCES:
1. Grewal B.S., “Higher Engineering Mathematics”, Khanna Publishers, 44 th Edition, New Delhi,
2017.
2. Erwin Kreyszig "Advanced Engineering Mathematics", Wiley India Pvt Ltd., New Delhi, 2015.
3. N.P. Bali and Manish Goyal, A text book of Engineering Mathematics, Laxmi Publications,
Reprint, 2008.
4. Greenberg M.D., “Advanced Engineering Mathematics”, Pearson Education2nd Edition, 5 th
Reprint, Delhi, 2009.
5. Jain R.K. and Iyengar S.R.K., “Advanced Engineering Mathematics”,Narosa Publications, 5 th
Edition, New Delhi, 2017.
6. Peter V.O’Neil, “Advanced Engineering Mathematics”, Cengage Learning India Pvt., Ltd, 7th
Edition, New Delhi , 2012.
7. Ramana B.V., “Higher Engineering Mathematics”, Tata McGraw Hill Co. Ltd., 11th Reprint,
New Delhi, 2010.
CO – PO Mapping:
PROGRAMME OUTCOMES
Course
Outcomes PO1 PO2 PO3 PO4 PO5
CO 1 : 3 2 3 - -
CO 2 : 3 2 3 - -
CO 3 : 3 2 3 - -
CO 4 : 3 2 3 - -
CO 5 : 3 2 3 - -
AVG: 3 2 3 - -
30
XT3251 PYTHON PROGRAMMING L T P C
2 0 4 4
OBJECTIVES:
To get introduced to Python and its environment
To develop Python programs with conditionals and loops
To define Python functions and use function calls
To use Python data structures - lists, tuples, dictionaries
To do input/output with files in Python
31
Write Python programs by applying functional programming concepts
Create, import, and use user-defined modules
Organize python code using Packages
REFERENCES:
1. Allen B. Downey, “Think Python: How to Think Like a Computer Scientist”, Second Edition,
Shroff/O‘Reilly Publishers, 2016.
2. Reema Thareja, “Python Programming: Using Problem Solving Approach”, Oxford University
Press, 2017.
3. Guido van Rossum, Fred L. Drake Jr., “An Introduction to Python – Revised and Updated for
Python 3.2”, Network Theory Ltd., 2011.
4. John V Guttag, “Introduction to Computation and Programming Using Python”, Revised and
Expanded Edition, MIT Press , 2013
5. Charles Dierbach, “Introduction to Computer Science using Python”, Wiley India Edition, 2016.
6. Timothy A. Budd, “Exploring Python”, Mc-Graw Hill Education (India) Private Ltd., 2015.
7. Kenneth A. Lambert, “Fundamentals of Python: First Programs”, Cengage Learning, 2012
CO – PO Mapping:
PROGRAMME OUTCOMES
Course
Outcomes PO1 PO2 PO3 PO4 PO5
CO 1 : 3 3 3 - -
CO 2 : 3 2 3 - -
CO 3 : 3 2 3 - 2
CO 4 : 3 2 3 - 2
CO 5 : 3 2 3 - 2
AVG: 3 2.2 3 - 1.2
32
XC3251 DATA STRUCTURES L T P C
3 0 0 3
OBJECTIVES:
To understand the concepts of array and linked list structures
To know the concepts of stack and queue data structure
To learn about non-linear tree data structures
To familiarize the concept of graph and graph-related algorithms
To know the concepts of sorting and hashing techniques
TOTAL: 45 PERIODS
OUTCOMES:
CO 1 : Solving real-time applications using a list data structure.
CO 2 : Know about the importance of stack and queue data structure in a wide range of
applications.
CO 3 : Implement the tree data structures.
CO 4 : Apply graph data structures for a real-world problem.
CO 5 : Use appropriate sort of algorithms for the task at hand.
REFERENCES:
1. Varsha H. Patil, “Data Structures using C++”, Oxford University Press, Noida, 2012.
2. Mark Allen Weiss, “Data Structures and Algorithm Analysis in C++”, 2nd Edition, Pearson
Education, 2014.
3. Narasimha Karumanchi, “Data Structures and Algorithms Made Easy”, CareerMonk, 2023.
33
4. Venkatesan R, and Loveyln Rose. S, “Data Structures”, Second Edition, Wiley, 2019.
5. Jean-Paul Tremblay, Paul Sorenson, “An Introduction to Data Structures With Applications”,
Second Edition, McGraw Hill, 2018.
6. Reema Thareja, “Programming in C”, Second Edition, Oxford University Press, 2016.
CO – PO Mapping:
PROGRAMME OUTCOMES
COURSE
OUTCOMES PO1 PO2 PO3 PO4 PO5
CO 1 : 3 1 2 - -
CO 2 : 3 - 2 - 1
CO 3 : 3 2 2 - -
CO 4 : 3 - 2 - 2
CO 5 : 3 - 2 2 1
AVG: 3 0.6 2 0.4 0.8
34
UNIT V INPUT OUTPUT ORGANIZATION AND ADVANCED ARCHITECTURE 9
Peripheral Devices – I/O Interface – Modes of Data Transfer – Interrupt Driven I/O – DMA –
SerialCommunication – Asynchronous Data Transfer – RISC – CISC - Parallel Processing –
Vector and Array Processing
TOTAL: 45 PERIODS
OUTCOMES:
CO 1 : Understand the basic structure of computer.
CO 2 : Perform computer arithmetic operations.
CO 3 : Understand the control unit operations.
CO 4 : Understand the concept of cache mapping techniques.
CO 5 : Understand the concept of I/O organization.
REFERENCES:
1. Douglas E. Comer, “Essentials of Computer Architecture”, 1st Edition, Education, London,
2011.
2. Miles Murdocca, Vincent Heuring, “Computer Architecture and Organization: An integrated
approach”, Wiley, New Jersey, 2013.
3. Morris Mano, “Computer System Architecture”, 3rd Edition, Pearson Education, 2017.
4. William Stallings, “Computer Organization and Architecture: Designing for Performance”,
Pearson Education, 2016.
CO – PO Mapping:
PROGRAMME OUTCOMES
COURSE
OUTCOMES PO1 PO2 PO3 PO4 PO5
CO 1 : 2 - - - -
CO 2 : 3 - - - -
CO 3 : 3 - - - 2
CO 4 : 3 - 2 - -
CO 5 : 3 - 2 - 1
AVG: 2.8 - 0.8 - 0.6
35
XT3261 DATA STRUCTURES LABORATORY L T P C
0 0 4 2
LIST OF EXPERIMENTS
1. Operation on Array
2. Matrix Manipulation using dynamic memory allocation
3. Linear Search and Binary Search
4. Linked List, Doubly Linked List
5. Circular Linked List
6. Polynomial Addition using Linked List
7. Implementation of Stack using Arrays and Linked List
8. Checking well-formed parenthesis
9. Infix to postfix and prefix conversion
10. Evaluation of Expression
11. Implementation of Queue using Arrays and Linked List
12. Double Ended Queue and Priority Queue
13. Bubble, Insertion, Selection, and Shell sort
14. Binary Search Tree
15. Graph Traversals
TOTAL : 60 PERIODS
OUTCOMES:
CO 1 : Implementation of arrays and linked lists
CO 2 : Implementation of stack and queue data structure in a wide range of applications.
CO 3 : Implement the tree data structures.
CO 4 : Apply graph data structures for a real-world problem.
CO 5 : Use of appropriate sorting algorithms for the task at hand.
CO – PO Mapping:
PROGRAMME OUTCOMES
Course
Outcomes PO1 PO2 PO3 PO4 PO5
CO 1 : 3 2 2 - 2
CO 2 : 3 2 2 - 2
CO 3 : 3 2 2 - 2
CO 4 : 3 2 2 - 2
CO 5 : 3 2 2 2 2
AVG: 3 2 2 0.4 2
36
MA3351 PARTIAL DIFFERENTIAL EQUATIONS AND COMPLEX L T P C
FUNCTIONS 4 0 0 4
OBJECTIVES:
To introduce the effective mathematical tools for the solutions of partial differential equations
that model physical processes
To familiarize the students in the field of partial differential equations and to solve boundary
value problems associated with engineering applications
To develop an understanding of the standard techniques of complex variable theory in
particular analytic function
To familiarize complex mappings and its mapping property
To familiarize the students with complex integration techniques and contour integration
techniques which can be used in real integrals
37
REFERENCES:
1. Erwin Kreyszig “Advanced Engineering Mathematics” John Wiley & Sons., New Delhi, 2015.
2. Wylie C. R. and Barrett L. C “Advanced Engineering Mathematics” Tata McGraw-Hill., New
Delhi, 2019.
3. Grewal B.S., “Higher Engineering Mathematics”, Khanna Publishers, 44th Edition, New
Delhi, 2017.
4. Mathews J. H. and Howell R. W “Complex Analysis for Mathematics and Engineering”,
Narosa Publishing House., New Delhi, 2012.
5. Peter V.O Neil “Advanced Engineering Mathematics”, Cengage., New Delhi, 2016.
6. Dennis G Zill, “Advanced Engineering Mathematics”, Jones & Bartlett India P Ltd., New
Delhi, 2017.
7. Dean G Duffy “Advanced Engineering Mathematics with MATLAB”, CRC., USA.
CO – PO Mapping:
PROGRAMME OUTCOMES
COURSE
OUTCOMES PO1 PO2 PO3 PO4 PO5
CO 1 : 3 2 3 - -
CO 2 : 3 2 3 - -
CO 3 : 3 2 3 - -
CO 4 : 3 2 3 - -
CO 5 : 3 2 3 - -
AVG: 3 2 3 - -
OBJECTIVES:
To get a clear understanding of object-oriented concepts
To give an introduction about objects and classes
To understand the concept of inheritance and polymorphism
To have knowledge about templates and exception handling
To have insights into I/O operations and manipulators
UNIT I OOP AND C++ FUNDAMENTALS 9
Object-oriented paradigm - Elements of object-oriented programming – Characteristics of OOP - C++
operators – data types - Pointers - References - Enumeration – Functions – Function prototype
– Default arguments – Inline functions.
38
UNIT III INHERITANCE AND POLYMORPHISM 9
Derived class - Single Inheritance - Multiple Inheritance - Hierarchical Inheritance - Hybrid Inheritance
– Virtual base class - Constructors in Derived class – Nesting of classes - Polymorphism – Compile
and Run time polymorphism – Function overloading - Operator Overloading – Virtual Functions
LIST OF EXPERIMENTS
1. Create a complex number class with all possible operators
2. Static members, Friend functions
3. Operator overloading, overloading of assignment operator
4. Type conversions such as integer to complex, double to complex, and complex to double
5. Constructor, Destructor, Copy constructor
6. Virtual functions
7. Matrix class with operator overloading
8. Single, Multiple, and Hybrid Inheritance
9. Polymorphism
10. Exception Handling
11. Input/Output file handling
REFERENCES:
1. Herbert Schildt, “C++ A Beginner’s Guide”, Second Edition, McGraw Hill, 2003.
2. Bjarne Stroustrup, “C++ Programming Language”, Addison-Wesley Educational Publishers Inc,
Fourth Edition 2013.
3. Balagurusamy, “Object-Oriented Programming with C++”, Eighth Edition, McGraw Hill, 2020.
4. Dietel & Dietel, “C++ How to Program”, Ninth Edition, Pearson, Education 2017.
39
CO – PO Mapping:
PROGRAMME OUTCOMES
COURSE
OUTCOMES PO1 PO2 PO3 PO4 PO5
CO 1 : 3 3 3 - -
CO 2 : 3 2 3 - -
CO 3 : 3 2 3 - 2
CO 4 : 3 2 3 - 2
CO 5 : 3 2 3 - 2
AVG: 3 2.2 3 - 1.2
40
UNIT IV NORMALIZATION 9
Functional Dependency – Inference Rules for Functional Dependencies – Need for Database
Normalization – First Normal Form – Second Normal Form – Third Normal Form – Boyce- Codd
Normal Form – Fourth Normal Form – Fifth Normal Form – Properties of Relational Decomposition
– Minimal Cover – Equivalence between Functional Dependencies
TOTAL : 45 PERIODS
OUTCOMES:
CO 1 : Distinguish unary, binary, and ternary relationships and give a common example of
each.
CO 2 : Compare and contrast the object-oriented model with the E-R and EER models.
CO 3 : Understand the various concepts of the data storage.
CO 4 : Use normalization to decompose our relation with anomalies into well-structured
relations.
CO 5 : Understand about the concept of transactions with concurrency control and deadlock.
REFERENCES:
1. Abrahan Silberschatz, Henry. F. Korth, S. Sudarsan “Database System Concepts”,
McGraw Hill, Seventh Edition, Indian Edition, 2021.
2. C. J. Date, A. Kannan, S. Swamynathan, “An Introduction to Database Systems”, Eighth
Edition, Pearson Education, 2006.
3. Raghu Ramakrishnan, Johannes Gehrke , “Database Management Systems”,
McGrawHill, Third Edition, Boston, 2014.
4. Ramez Elmasri, Shamkant B. Navathe, “Fundamentals of Database Systems”, Pearson /
Addision Wesley, Seventh Edition, Boston, 2015.
CO – PO Mapping:
COURSE PROGRAMME OUTCOMES
OUTCOMES PO1 PO2 PO3 PO4 PO5
CO 1 : 3 - - - -
CO 2 : 3 3 - - -
CO 3 : 3 2 - - -
CO 4 : 2 - 2 - -
CO 5 : 3 - - - 2
AVG: 2.8 1 0.4 - 0.4
41
XC3351 OPERATING SYSTEMS L T P C
3 0 2 4
OBJECTIVES:
To provide a clear understanding of the concepts that underlies operating systems
Fundamental concepts and algorithms that will be covered are based on those used in
existing commercial operating systems
To present these topics in a general setting that is not tied to one particular operating
system.
To understand the concept of file and directory structures
Throughout the course, practical aspects that pertain to the most popular operating
systems such as Unix/Linux and Windows, and some instructional operating systems will
be studied as well
LIST OF EXPERIMENTS
1. Basic LINUX commands
2. Filters – grep, sed, awk
3. Process management - Fork, Exec commands, Wait
4. Inter-Process Communication
5. Semaphores
6. CPU Scheduling algorithms
7. Deadlocks
8. Page replacement Algorithms
42
OUTCOMES:
CO 1 : Gain extensive knowledge on principles and modules of operating systems.
CO 2 : Compare performance of processor scheduling algorithms and produce algorithmic
solutions to process synchronization problems.
CO 3 : Understand process management, concurrent processes, memory management and
deadlocks.
CO 4 : Understand the concept of file and directory structures with storage management.
CO 5 : Use modern operating system calls such as Linux process and synchronization
libraries.
REFERENCES:
1. Andrew S. Tanenbaum, “Distributed Operating Systems”, Pearson Education, 1st Edition,
Noida, 2002.
2. Dhamdhere, D.M., “Operating Systems : A concept Based Approach”, McGraw Hill
Publication, 3rd Edition, 2017.
3. Pramod Chandra P. Bhatt, “An introduction to Operating Systems: Concepts and
Practice”, Prentice Hall of India, 5th Edition, New Delhi, 2019.
4. Silberschatz, A. Galvin, P.B. and Gagne, G., “Operating System Concepts”, John Wiley,
10th Edition, New Jersey, 2021.
5. William Stallings, “Operating Systems”, Pearson Education 2020.
CO – PO Mapping:
PROGRAMME OUTCOMES
COURSE
OUTCOMES PO1 PO2 PO3 PO4 PO5
CO 1 : 3 - - - 1
CO 2 : 3 - 2 - -
CO 3 : 3 - 3 - -
CO 4 : 2 - 2 - 2
CO 5 : 2 - 2 - 1
AVG: 2.6 - 1.8 - 0.8
43
XC3352 MICROPROCESSOR AND APPLICATIONS L T P C
3 0 2 4
OBJECTIVES:
To know about the architecture and related aspects of 8085
To know about the architecture and related aspects of 16-bit processor 8086
Learn to write simple programs for both 8086 and 8085 processors
To develop an in-depth understanding of interfacing techniques
To understand about different interfacing IC’s available
44
LIST OF EXPERIMENTS
Assembly Language Programming of 8085 and 8086
1. Programs for 8 / 16 bit Arithmetic, Sorting, Searching and String operations,
2. Programs for Digital clock, Interfacing ADC and DAC
3. Interfacing and programming 8279, 8259, and 8253
4. Serial Communication between two microprocessors kits using 8251
5. Interfacing Stepper Motor, Speed control of DC Motor
6. Parallel communication between two microprocessors kits using Mode 1 and Mode 2 of
8255
7. Macro assembler Programming for 8086
REFERENCES:
1. Charles M. Gilmore, “Microprocessor: Principles and Applications”, McGraw Hill
International, 2nd Edition, New York, 1995.
2. Mohammed Ali Mazidi, Jancie Gillispie Mazidi and Rolin K. Mckinlay, “The 805
Microcontroller and Embedded Systems”, Pearson Education Ltd., 2nd Edition, New Delhi,
2007.
3. Mohammed Rafiquzzaman, “Microprocessors – Theory and Applications: Intel and
Motorola”, Prentice Hall, Rev Edition, New Delhi, 1992-2007.
4. Mohammed Rafiquzzaman, “Microprocessors and Micro-computer Based System Design”,
CRC Press, 2nd Edition, Boca Raton, 1995.
CO – PO Mapping:
PROGRAMME OUTCOMES
Course
Outcomes PO1 PO2 PO3 PO4 PO5
CO 1 : 2 - - - -
CO 2 : 2 1 - - -
CO 3 : 3 - 2 - -
CO 4 : 2 - - - 1
CO 5 : 3 1 - - -
AVG: 2.4 0.4 0.4 - 0.2
45
XT3353 PRINCIPLES OF ANALOG AND DIGITAL COMMUNICATION L T P C
SYSTEMS 3 0 0 3
OBJECTIVES:
To understand the concepts of signals and systems used communication signal analysis
To design simple systems for generating and demodulating frequency modulated signals
To understand basics of information theory and channel coding
To understand analog to digital conversion techniques and coding techniques
To understand the digital modulation and transmission techniques
TOTAL : 45 PERIODS
OUTCOMES:
CO 1 : Understand fundamentals techniques used to analyse the spectrum of modulated
signals and properties of LTI systems.
CO 2 : Understand the analog modulation demodulation principles.
CO 3 : Understand the information, source coding and channel coding principles.
CO 4 : Understand the principles of analog to digital conversion and transmission techniques
of voice signals.
CO 5 : Understand the digital modulation demodulation principles.
REFERENCES:
1. H.Taub, D.L Schilling, GoutamSaha, “Principles of Communication Systems”, McGraw Hill
Education, 4 th Edition, New Delhi, 2017.
2. B.P.Lathi and Zhi Ding, “Modern Digital and Analog Communication Systems”, Oxford
University Press, 5th Edition, New York, 2019.
3. John G.Proakis, Masoud Salehi, “Fundamentals of Communication Systems”, Pearson
Education, Delhi, 2nd Edition, 2008.
46
CO – PO Mapping:
PROGRAMME OUTCOMES
Course
Outcomes PO1 PO2 PO3 PO4 PO5
CO 1 : 3 - - - -
CO 2 : 3 - 2 - -
CO 3 : 3 - 2 - -
CO 4 : 3 - 2 - 1
CO 5 : 3 - 2 - 1
AVG: 3 - 1.6 - 0.4
CO – PO Mapping:
PROGRAMME OUTCOMES
Course
Outcomes PO1 PO2 PO3 PO4 PO5
CO 1 : 3 1 1 1 2
CO 2 : 3 1 1 1 2
CO 3 : 3 1 1 1 2
CO 4 : 2 1 2 1 2
CO 5 : 3 1 1 1 2
AVG: 2.8 1 1.2 1 2
47
MA3451 DISCRETE STRUCTURES L T P C
4 0 0 4
OBJECTIVES:
To introduce Mathematical Logic, Inference Theory and proof methods
To provide fundamental principles of combinatorial counting techniques
To introduce the algebraic structures and their properties
To introduce graph models, their representation, connectivity and traversability
To provide exposure to trees and demonstrate their utility
UNIT V TREES 12
Trees – Characterization of trees - Rooted trees – sorting – weighted Trees and Prefix codes -
Shortest path problem - Minimum Spanning Tree Problem.
TOTAL : 60 PERIODS
OUTCOMES:
CO 1 : Understand the validity of the logical arguments, mathematical proofs and correctness of the
algorithm.
CO 2 : Apply combinatorial counting techniques in solving combinatorial related problems.
CO 3 : Understand the significance of algebraic structural ideas used in coding theory and
Cryptography.
CO 4 : Use graph models and their connectivity, traversability in solving real world problems.
CO 5 : Apply trees and their utilities.
REFERENCES:
1. Grimaldi R.P., “Discrete and Combinatorial Mathematics”, Pearson Education Pvt. Ltd., 5th
Edition, Singapore, 2004.
2. Kenneth H. Rosen, “ Discrete Mathematics and its Applications”, Tata Mc Graw Hill Pub. Co.
Ltd., Seventh Edition, Special Indian Edition, New Delhi, 2011.
3. Tremblay J. P. and Manohar R, “ Discrete Mathematical Structures with Applications to
Computer Science”, Tata McGraw Hill Pub. Co. Ltd., Third Edition, New Delhi, 2013.
4. Thomas Koshy,” Discrete Mathematics with Applications”, Elsevier Publications, Boston,
2004.
5. Seymour Lipschutz and Mark Lipson, ”Discrete Mathematics”, Schaum‘s Outlines, Tata
McGraw Hill Pub. Co. Ltd., Third Edition, New Delhi, 2013.
6. Douglas B. West, “Introduction to Graph Theory”, Prentice Hall, 2th Edition, New Jersy, 2001.
48
CO – PO Mapping:
PROGRAMME OUTCOMES
COURSE
OUTCOMES PO1 PO2 PO3 PO4 PO5
CO 1 : 3 2 3 - -
CO 2 : 3 2 3 - -
CO 3 : 3 2 3 - -
CO 4 : 3 2 3 - -
CO 5 : 3 2 3 - -
AVG: 3 2 3 - -
OBJECTIVES:
To introduce the basic notions of groups, subgroups which will then be used to solve related
problems
To introduce the basic notions of rings and integral domain which will then be used to solve
related problems
To introduce the basic notions of polynomial rings, Finite Fields and factorization techniques
which will then be used to solve related problems
To understand the key points in the theory of numbers
To understand the concepts involved in congruence and Diophantine equations
UNIT I GROUPS 9
Groups: Definition and examples - Properties – Permutation groups – Symmetric groups – cyclic
groups – subgroups: Definition and examples – cosets – Lagrange’s theorem - Homomorphism -
Isomorphism – Cayley theorem
UNIT II RINGS 9
Rings: Definition and examples – properties – subrings – integral domain – homomorphism – ideals
and quotient ring – Euclidean ring – Unique factorization theorem
49
UNIT V DIOPHANTINE EQUATIONS, CONGRUENCES AND MULTIPLICATIVE 9
FUNCTION
Linear Diophantine Equations – Congruence‘s – Linear Congruence‘s - Applications: Divisibility tests,
Round Robin tournaments, The perpetual calendar - Euler‘s Phi Functions – Tau and Sigma Functions
TOTAL : 45 PERIODS
OUTCOMES:
CO 1 : Explain the important mathematical concepts in abstract algebra such as group, subgroup,
cyclic group and Abelian group.
CO 2 : Demonstrate accurate and efficient use of algebraic techniques such as rings, subrings and
integral domain.
CO 3 : Know the fundamental concepts in field theory, polynomial rings and GF.
CO 4 : Explain the concept of divisibility, prime numbers and fundamental theorem of arithmetic.
CO 5 : Interpret the concept of LDE, Congruence and its applications.
REFERENCES:
1. Herstein I. N., “Topics in Algebra”, John Wiley & Sons, 2012.
2. Joseph A. Gallian, “Contemporary Abstract Algebra’ , Brooks/Cole, 2013.
3. Grimaldi. R.P and Ramana, B.V.,” Discrete and combinatorial mathematics”, Pearson
Education, Fifth Edition, 2007.
4. Tremblay J. P. and Manohar R., “Discrete Mathematical Structures with Applications to
Computer Science”, Tata McGrawHill, 2017.
5. Thomas Koshy “Elementary Number Theory with Applications”, Elsevier Publications, 2002.
6. Niven .I, Zuckerman. H.Sand Montgomery. H.L., “An Introduction to Theory of Numbers”, John
Wiley and Sons, 2004.
CO – PO Mapping:
PROGRAMME OUTCOMES
Course
Outcomes PO1 PO2 PO3 PO4 PO5
CO 1 : 3 2 3 - -
CO 2 : 3 2 3 - -
CO 3 : 3 2 3 - -
CO 4 : 3 2 3 - -
CO 5 : 3 2 3 - -
AVG: 3 2 3 - -
50
XC3451 SOFTWARE ENGINEERING L T P C
3 0 2 4
OBJECTIVES:
To assist the student in understanding the basic theory of software engineering
To apply these basic theoretical principles to a group software development project
To understand the importance of analysis and design
To stress the need for testing before deployment
To familiarize the functions of a software project manager
LIST OF EXPERIMENTS
1. Feasibility Study
2. Requirements Engineering
3. Requirements Analysis
4. Software Design using UML
5. Software Implementation
6. Software Testing
A mini project comprising of the above-mentioned phases of software development.
REFERENCES:
1. Pressman, R.S. “Software Engineering: A Practitioner Approach”, 8 th Edition Revised, McGraw
Hill, Chennai, 2019.
2. Sommerville, I. “Engineering Software Products”, Global Edition, Pearson Education, 2021.
51
3. Sommerville, I. “Software Engineering, Global Edition”, 10 th Edition, Pearson Higher Education,
New Jersey, 2016.
4. Carlo Ghezzi, Mehdi Jazayeri and Dino Mandrioli, “Software Engineering”, Prentice Hall India,
New Delhi, 2010.
5. Pankaj Jalote, ”Software Engineering : A Precise Approach”, Wiley India, New Delhi, 2010.
CO – PO Mapping:
PROGRAMME OUTCOMES
COURSE
OUTCOMES PO1 PO2 PO3 PO4 PO5
CO 1 : 3 3 - - -
CO 2 : 3 - 3 - -
CO 3 : 3 2 3 - -
CO 4 : 3 2 2 - 2
CO 5 : 3 - 3 2 3
AVG: 3 1.4 2.2 0.4 1
52
UNIT III POLYMORPHISM IN JAVA 9
Polymorphism - Abstract Classes and Methods - Varieties of Polymorphism – Polymorphic Variables
– Overloading and Overriding – Pure Polymorphism - Polymorphic Processing, Operator instance of
and Down Casting - final Methods and Classes – Clone Class - Interface – Implementation –
Multithreading
TOTAL : 45 PERIODS
OUTCOMES:
CO 1 : Understand the fundamentals of object-oriented programming in Java.
CO 2 : Understand the appropriate roles of subtyping and inheritance, and use them effectively.
CO 3 : Implement polymorphic code and handle run time errors using exception handling
CO 4 : Implement concurrent applications using threads. Identify the generic classes and methods
to implement an application. Use streams to store and retrieve data from database / files.
CO 5 : Create user-interface applications using GUI components and to understand the event
handling principles.
REFERENCES:
1. Timothy Budd, "An Introduction to Object-Oriented Programming”, Third Edition, Pearson
Education, 2008.
2. Paul Deitel and Harvey Deitel, "Java How to Program (Early Objects)”, Tenth Edition, Pearson,
2017.
3. MARC Loy, Patrick Niemeyer, Daniel Leuck, "Learning Java”, Fifth Edition, O'Reilly, 2020.
4. Joshua Bloch, "Effective Java”, Third Edition, Pearson, 2022.
CO – PO Mapping:
PROGRAMME OUTCOMES
COURSE
OUTCOMES PO1 PO2 PO3 PO4 PO5
CO 1 : 3 3 3 - -
CO 2 : 3 2 3 - -
CO 3 : 3 2 3 - 2
CO 4 : 3 2 3 - 2
CO 5 : 3 2 3 - 2
AVG: 3 2.2 3 - 1.2
53
XT3451 COMPUTER NETWORKS L T P C
3 0 2 4
OBJECTIVES:
To understand the division of network functionality into layers
To understand the TCP/IP protocol suite
To understand the flow of data between the nodes and building blocks of networks
To Learn flow control and congestion control algorithms
To understand the network addressing techniques
UNIT I FUNDAMENTALS 9
Data communication – Network Topologies – INTERNET – Protocols and Standards – Layered
Architecture – Responsibilities of the Layers – Addressing – Transmission Media – Multiplexing –
Switching
LIST OF EXPERIMENTS
1. Familiarize with the layered approach of the protocol stack
2. Familiarize with packet capturing tools in Java and Wireshark
3. Familiarize with IP addressing and subnetting concepts
4. Analyze the existing routing protocols and implement any one of them
5. Implement client server programs using sockets which has multiple clients
6. Implement a simple firewall system
TOTAL: (45+30) 75 PERIODS
OUTCOMES:
CO 1 : Identify the components required to build different types of networks.
CO 2 : Trace the flow of information from one node to another node in the network.
CO 3 : Identify the classes of Network address.
CO 4 : Choose functionalities at each layer for different applications.
CO 5 : Evaluate the protocols in network layer from QOS perspective.
REFERENCES:
1. Andrew S. Tanenbaum, Nick Feamster, David Wetherall” Computer Networks”, Pearson, 2021.
2. Behrouz. A. Forouzan, “Data communications and Networking “, Fifth Edition, McGraw-Hill
Publishers, New York, 2017.
3. Behrouz. A. Forouzan,“TCP/IP Protocol Suite”, McGraw-Hill Publishers, 2021.
54
4. James F. Kurose, Keith W. Ross, “Computer Networking: A Top-Down Approach Featuring the
Internet “, Pearson, Education, 2022.
5. Larry L. Peterson, Bruce S. Davie, “Computer Networks: A System Approach”, Morgan
Kaufmann Publishers, 5th Edition, Amsterdam, 2012.
6. M. Barry Dumas, Morris Schwartz, “Principles of Computer Networks and communications”,
Pearson, 1st Edition, New Jersey, 2013.
7. W. Richard Stevens, G.Gabrani, “TCP/IP Illustrated, Volume 1”, Pearson, Boston, 2009.
CO – PO Mapping:
PROGRAMME OUTCOMES
COURSE
OUTCOMES PO1 PO2 PO3 PO4 PO5
CO 1 : 3 - - - -
CO 2 : 3 3 2 - -
CO 3 : 3 3 3 - -
CO 4 : 3 3 3 - 2
CO 5 : 3 3 3 - -
AVG: 3 2.4 2.2 - 0.4
55
UNIT II ENVIRONMENTAL POLLUTION 6
Causes, Effects and Preventive measures of Water, Soil, Air and Noise Pollutions. Solid, Hazardous
and E-Waste management. Case studies on Occupational Health and Safety Management system
(OHASMS). Environmental protection, Environmental protection acts
TEXTBOOKS:
1. Anubha Kaushik and C. P. Kaushik’s “Perspectives in Environmental Studies”, 6th Edition, New Age
International Publishers , 2018.
2. Benny Joseph, ‘Environmental Science and Engineering’, Tata McGraw-Hill, New Delhi, 2016.
3. Gilbert M.Masters, ‘Introduction to Environmental Engineering and Science’, 2nd edition, Pearson
Education, 2004.
4. Allen, D. T. and Shonnard, D. R., Sustainability Engineering: Concepts, Design and Case Studies,
Pearson; 1st edition, 2011.
5. Bradley. A.S; Adebayo, A.O., Maria, P. Engineering applications in sustainable design and
development, CL Engineering; International edition, 2015.
6. Environment Impact Assessment Guidelines, Notification of Government of India, 2006.
7. Mackenthun, K.M., Basic Concepts in Environmental Management, Lewis Publication, London,
1998.
56
REFERENCES :
CO – PO Mapping:
COURSE PROGRAMME OUTCOMES
OUTCOMES PO1 PO2 PO3 PO4 PO5
CO 1 : 2 - - - 1
CO 2 : 2 - 2 1 1
CO 3 : 2 - - - 2
CO 4 : 2 - 2 - 1
CO 5 : 2 - 2 - 2
AVG: 2 - 1.2 0.2 1.4
LIST OF EXPERIMENTS
1. To create runtime polymorphism using abstract class, interface
2. To create callback feature using interface
3. To create a program for interface inheritance
4. To implement a user defined package
5. To implement a user defined checked exception and unchecked exceptions
6. To create inter-thread communication using shared memory, piper stream
7. To implement socket connections (UDP, TCP)
TOTAL: 60 PERIODS
OUTCOMES:
CO 1 : Implement fundamentals of object-oriented programming in Java.
CO 2 : Implement callback feature using interface and interface inheritance.
CO 3 : Implement user defined package, user defined check exceptions.
CO 4 : Create inter-thread communications.
CO 5 : Implement socket connections.
57
CO – PO Mapping:
PROGRAMME OUTCOMES
COURSE
OUTCOMES PO1 PO2 PO3 PO4 PO5
CO 1 : 3 3 3 1 2
CO 2 : 3 2 3 1 2
CO 3 : 3 2 3 1 2
CO 4 : 3 2 3 1 2
CO 5 : 3 2 3 1 2
AVG: 3 2.2 3 1 2
58
OUTCOMES:
CO 1 : It enables the students to understand the nature and properties of density functions and
hence determine the moments and moment generating functions of any random variable.
CO 2 : It helps the students to choose appropriate distribution for the real time problems and hence
interpret the analysis mathematically.
CO 3 : It make the students to obtain the value of the point estimators using the method of
moments and method of maximum likelihood.
CO 4 : It imparts the knowledge of various test statistics used in hypothesis testing for mean and
variances of large and small samples.
CO 5 : It equips the students to determine the regression line using the method of least square
and also to calculate the partial and multiple correlation coefficient for the given set of data
points.
REFERENCES:
1. Gupta S. C. and Kapoor V. K. (2002), “Fundamentals of Mathematical Statistics”, Sultan
Chand and Sons, 11th Edition, New Delhi, 2002.
2. Jay L. Devore, “Probability and Statistics for Engineers”, CENGAGE Learning India Private
Ltd., Boston, 2008.
3. John E. Freund ,” Mathematical Statistics with Applications”, 8th Edition, Pearson Education,
New Delhi, 2017.
4. Richard A. Johnson, Irwin Miller and John Freund, “Miller and Freund’s Probability and
Statistics for Engineers”, 8th edition, Pearson Education, New Delhi, 2015.
CO – PO Mapping:
OBJECTIVES:
To introduce the students the basic number theory concepts and algorithms related to
cryptography
Learn the existing crypto-systems and develop problem-solving skills for cryptographic
problems and applications
To introduce the science and study of methods related to data protection in computer
and communication systems from unauthorized disclosure and modification
To show how to develop techniques for verification, identification, key safeguarding
schemes and key distribution protocols
Learn various methods of encrypting data for security purposes
59
UNIT I INTRODUCTION TO NUMBER THEORY 9
Modular arithmetic – Euclid’s algorithm – Extended Euclid’s Algorithm - Fermat Theorem –
Euler’s theorem - Chinese Remainder Theorem, Modular Exponentiation – Groups, Rings and
Fields – Galois Fields – Discrete Logarithms – Primality Testing Using Miller-Rabin Algorithm
UNIT II CONVENTIONAL ENCRYPTION 9
Conventional encryption model – Cryptanalysis and brute force attack – Substitution Techniques
– Caesar cipher, Mono alphabetic cipher, Playfair cipher, Hill Cipher, Poly-alphabetic ciphers,
one-Time pad – Transposition Techniques
LIST OF EXPERIMENTS
The following exercises may be implemented using C, Java, or Tutors’ convenience
1.
Implementation of Encryption and Decryption using Caesar Cipher
2.
Implementation of One Time Pad
3.
Implementation of Hill Cipher
4.
Implementation of Transposition and Double Transposition Cipher
5.
Implementation of Stream Cipher
6.
Implementation of Diffie Hellman Algorithm
7.
Implementation of RSA algorithm (Encryption, Decryption, Key exchange)
8.
Implementation of El-Gamal Cryptographic algorithm
9.Case Study: DES, AES
TOTAL: (45+30) 75 PERIODS
OUTCOMES:
CO1: Explain basic concepts in number theory and apply modular arithmetic in problem solving.
CO2: Understand the setups, the protocols, and the security issues of some existing
cryptosystems.
CO3: Examine the security of a given cryptosystem.
CO4: Implement some simple cryptographic schemes.
CO5: Have knowledge about digital signatures and its standards.
REFERENCES:
1. Wade Trappe, Lawrence Washington, “Introduction to Cryptography with coding Theory”,
Pearson Education, 2015.
2. Behrouz A. Forouzan and Debdeep Mukhopadhyay ”Cryptography & Network Security”,
McGraw-Hill, Education, 2015.
3. Biham, E., and Shamir, A., “Differential Crypt analysis of the data encryption standard”, Springer
Verlag, New York, 2012.
60
4. Neal Kobilitz, N., “A course in Number Theory and Cryptography”, Springer Verlag, New York,
2012.
5. William Stallings “Cryptography and Network Security: Principles and Practice”, Upper Saddle
River, Pearson, New Jersey, 2022.
CO – PO Mapping:
PROGRAMME OUTCOMES
COURSE
OUTCOMES PO1 PO2 PO3 PO4 PO5
CO 1 : 3 - 2 - -
CO 2 : 3 3 2 - -
CO 3 : 3 2 2 - -
CO 4 : 3 - 2 - -
CO 5 : 3 - 2 - 1
AVG: 3 1 2 - 0.2
61
UNIT IV CLUSTERING AND FREQUENT ITEMSET MINING 9
Cluster Analysis – Partitioning Methods – Hierarchical Methods – Density-Based Methods –
Grid-Based Methods–Evaluation of Clustering. Mining Frequent Patterns, Associations, and
Correlations: Basic Concepts – Frequent itemset, Closed Itemset, and association rules –Frequent
Itemset Mining Methods–Apriori – FP Growth – Pattern Evaluation Methods: From Association
Analysis to Correlation Analysis
UNIT V OUTLIER DETECTION, APPLICATIONS, AND TRENDS 9
Outlier Detection: Outliers and Outlier Analysis - Statistical Approaches -Proximity-Based Approach:
Distance-based Outlier Detection – Clustering–Based Approaches - Classification-Based
Approaches. Mining Complex Data Types - Other Methodologies of Data Mining- Data Mining
Applications
LIST OF EXPERIMENTS
1. Creation of a data warehouse
2. Exploration of any two data mining tools
3. Exploration of Python packages for data mining task
4. Exercises related to Exploratory Data Analysis
5. Implementation of the Apriori Algorithm
6. Implementation of FP-Growth Algorithm
7. Implementation of Decision Tree
8. Implementation of Naïve Bayes
9. Implementation of K-means
10. Implementation of Hierarchical and DBSCAN clustering
REFERENCES:
1. Alex Berson and Stephen J. Smith “Data Warehousing, Data Mining & OLAP”, McGraw – Hill
Education, 2017.
2. G. K. Gupta “Introduction to Data Mining with Case Studies”, Third Edition, Easter Economy
Edition, Prentice Hall of India, New Delhi, 2014.
3. Jiawei Han, Jian Pei, Hanghang Tong,” Data Mining: Concepts and Techniques”, Fourth
Edition, Elsevier, Reprinted, Morgan Kaufmann, 2022.
4. Pang-Ning Tan, Michael Steinbach, and Vipin Kumar “Introduction to Data Mining”, Pearson
Education, 2016.
62
CO – PO Mapping:
PROGRAMME OUTCOMES
Course
Outcomes PO1 PO2 PO3 PO4 PO5
CO 1 : 3 - 2 - -
CO 2 : 3 2 2 - 1
CO 3 : 3 2 3 - 2
CO 4 : 3 2 3 - 1
CO 5 : 3 2 2 1 -
AVG: 3 1.6 2.4 0.2 0.8
63
UNIT IV SERVER-SIDE SCRIPTING WITH SERVLETS AND JSP 9
Server-Side Programming : Java Servlets- Life Cycle- Parameter Data- State Management -
Sessions-Cookies-URL Rewriting- Event Driven Tracking – Databases and Java Servlets. JSP
Technology: Introduction-JSP and Servlets – Basic JSP – Running JSP Applications - JavaBeans
Classes and JSP -Tag Libraries and Files-Support for the Model-View-Controller Paradigm -
Databases and JSP
TOTAL: 45 PERIODS
OUTCOMES:
CO 1 : Design simple web pages using markup languages like HTML and XHTML.
CO 2 : Formatting the document using CSS and data using XML.
CO 3 : Create dynamic web pages using DHTML and JavaScript that are easy to navigate.
CO 4 : Program server-side web pages using Servlets and JSP that must process requests from
client-side web pages.
CO 5 : Design web pages using PHP with MySQL.
REFERENCES:
1. Jeffrey C. Jackson, "Web Technologies--A Computer Science Perspective", Pearson
Education,2012.
2. Uttam K. Roy, “Web Technologies” – Oxford University Press, 2011.
3. Robin Nixon, “Learning Php, MySQL & JavaScript”, Fifth Edition, O’Reilly, 2018.
4. Harvey Deitel, Paul Deitel, and Abbey Deitel, “Internet & World Wide Web How to Program”,
Fifth Edition, Pearson Education, 2018.
5. N. P. Gopalan, T.A. Adikesavan, “Web Technology: A Developers Perspective”, PHI Learning
2014.
CO – PO Mapping:
PROGRAMME OUTCOMES
COURSE
OUTCOMES PO1 PO2 PO3 PO4 PO5
CO 1 : 3 2 3 - -
CO 2 : 3 2 3 - 1
CO 3 : 3 2 3 - -
CO 4 : 3 2 3 1 1
CO 5 : 3 2 3 1 -
AVG: 3 2 3 0.4 0.4
64
XC3551 THEORY OF COMPUTATION L T P C
4 0 0 4
OBJECTIVES:
To introduce finite state automata as language acceptor of regular sets.
To introduce context free grammars and context free languages and their normal forms.
To explain pushdown automata as the language acceptor of context-free language.
To demonstrate Turing machine as a mathematical model of language acceptor of recursively
enumerable language and computer of computing number theoretic functions.
To explain the Chomsky hierarchy among the formal languages.
UNIT I REGULAR SETS AND FINITE STATE AUTOMATA 12
Finite state automata - Deterministic and non-deterministic model – Languages accepted by
Finite State Automata - Regular Expression - Pumping Lemma for regular set.
REFERENCES:
1. Hopcroft J.E. and Ullman J.D. “Introduction to Automata Theory, Languages and Computation”,
Narosa Publishing House,2002.
2. Hopcroft, J.E., Rajeev Motwani and Ullman, J.D. “Introduction to Automata Theory, Languages,
and Computation”, Pearson Education, Second Edition, Harlow, 2014.
3. Mishra K.L.P and Chandrasekaran. N, “Theory of Computer Science: Automata, Languages
and Computation”, Prentice Hall of India, Third Edition, New Delhi, 2010.
4. Peter Linz, “An Introduction to Formal Languages and Automata”, Jones and Bartlett
Publishers, Fifth Edition, Burlington, 2012.
65
CO – PO Mapping:
TOTAL : 60 PERIODS
OUTCOMES:
CO 1 : Design simple web pages using markup languages like HTML and XHTML.
CO 2 : Formatting the document using CSS and data using XML.
CO 3 : Create dynamic web pages using DHTML and JavaScript that are easy to navigate.
CO 4 : Program server-side web pages using Servlets and JSP that must process requests from
client-side web pages.
CO 5 : Design web pages using PHP with MySQL.
CO – PO Mapping:
COURSE PROGRAMME OUTCOMES
OUTCOMES PO1 PO2 PO3 PO4 PO5
CO 1 : 3 2 3 1 2
CO 2 : 3 2 3 1 2
CO 3 : 3 2 3 1 2
CO 4 : 3 2 3 1 2
CO 5 : 3 2 3 1 2
AVG: 3 2 3 1 2
66
MA3651 OPERATIONS RESEARCH L T P C
4 0 0 4
OBJECTIVES:
To introduce linear programming and their methods
To provide integer programming algorithms
To give exposure to non-linear programming with applications
To explain the significance of decision and game theory
To provide dynamic programming with applications
UNIT I LINEAR PROGRAMMING 12
Introduction of OR - Formulation of linear programming models - assumptions of linear programming
problems - Graphical solution – Solutions to LPP using simplex algorithm – Two phase method – Big
M method - Transportation and Assignment problems
UNIT II INTEGER PROGRAMMING 12
Introduction – Cutting plane Algorithm – Branch and Bound Algorithm – Zero-one Programming- Goal
programming
UNIT III NON-LINEAR PROGRAMMING 12
Lagrange multipliers – Equality constraints – Inequality constraints – Kuhn-Tucker conditions –
Quadratic programming - Replacement models - Inventory Problems
UNIT IV DECISION AND GAME THEORY 12
Decision making under certainty – Decision making under risk – Decision making under uncertainty
– Decision tree analysis - Game Theory – Two person zero sum games, pure and mixed strategies –
Theory of dominance - Graphical Solution – Solving by LP
UNIT V DYNAMIC PROGRAMMING 12
Dynamic programming technique – stage coach problem – reliability problem- capital budgeting
problem- manpower planning problem – inventory problem - linear programming – integer
programming problem
TOTAL: 60 PERIODS
OUTCOMES:
CO 1 : Develop the skills to consider real-world problems and determine whether or not linear
programming is an appropriate modeling framework
CO 2 : Understand of the role of algorithmic thinking in the solution of operations research
problems
CO 3 : Able to build and solve Transportation Models and Assignment Models
CO 4 : Understand Operations Research models and apply them to real-life problems
CO 5 : Interpret the solutions and infer solutions to the real-world problems.
REFERENCES:
1. F.S. Hillier and G.J. Lieberman, “Introduction to Operations Research”, Tata McGraw Hill, 8 th
Edition, New Delhi, 2005.
2. H.A. Taha, “Operations Research: An Introduction”, Pearson Education,10 th Edition, New Delhi,
2019.
3. J.K. Sharma, “Operations Research: Theory and Applications”, Macmillan India Ltd., 5 th Edition,
New Delhi, 2012.
4. Mokhtar S. Bazaraa, John J. Jarvis and Hanif D. Sherali, “Linear Programming and Network
Flows”, 2nd Edition, Wiley India Pvt ltd, New Delhi, 2008.
5. Philips, Ravindran and Solberg, “Operations Research: Principles and Procatice”, Wiley India
Pvt ltd, 2nd Edition, 2007.
6. Pradeep Prabhakar Pai, “Operations Research and Practice”, Oxford University Press, New
Delhi, 2012.
7. Richard Bronson and Govindasami Naadimuthu, “Operations Research” (Schaum’s Outlines –
TMH edition), Tata McGraw Hill Publishing Company Ltd., 2 nd Edition, New Delhi, 2004.
67
CO – PO Mapping:
68
OUTCOMES:
CO 1 : Understand the phases of compiler and the concept of Lexical Analysis.
CO 2 : Understand the concept of parsing and construction of a parser and also develop an
intermediate code generator.
CO 3 : Understand the management of stack, heap, and garbage collector.
CO 4 : Understand the language and design of the target machine.
CO 5 : Understand the optimization techniques and obtain the knowledge to construct a simple
compiler.
REFERENCES:
1. Alfred Aho, Monica S. Lam, V. Ravi Sethi and Jeffery Ullman, “Compiler Principles,
Techniques and Tools”, Pearson Education, 2nd Edition, Uttar Pradesh, 2020.
2. Allen Holub, “Compiler design in C”, Prentice Hall of India, NewDelhi, 2006.
3. Parag H. Dave, Himanshu B. Dave ”Compilers Principles and Practice”, Pearson, New Delhi,
2012.
4. Steven S.Muchnick, “Advanced compiler design implementation”, Morgan Koffman, Harcourt,
2000.
CO – PO Mapping:
69
XT3651 MACHINE LEARNING L T P C
3 0 2 4
OBJECTIVES:
To introduce students to the basic concepts and techniques of Machine Learning.
To have a thorough understanding of the Supervised and Unsupervised learning techniques.
To study the various probability based learning techniques
To understand graphical models of machine learning algorithms
To work on real life case studies and process data sets to extract knowledge
Practicals: 1) Cross validation and Bootstrap: Validation set approach – Bootstrap. 2) Linear
models and regularization methods: Subset selection methods – Ridge regression and the
lasso 3) Beyond linearity: Polynomial regression and step functions – GAM
70
Practicals: 1) Unsupervised learning: PCA – Clustering. 2) Suitable Application Problems from
Kaggle
TOTAL : (45+30) 75 PERIODS
OUTCOMES:
CO 1 : set up a well-defined learning problem for a given task
CO 2 : select and define a representation for data to be used as input to a machine learning
algorithm
CO 3 : compare different algorithms according to the properties of their inputs and outputs
CO 4 : compare different algorithms in terms of similarities and differences in the
computational methods used
CO 5 : develop and describe algorithms to solve a learning problem in terms of the inputs,
outputs and computational methods used.
REFERENCES:
1. James, G., Witten, D., Hastie, T., Tibshirani, R., & Taylor, J., “An Introduction to Statistical
Learning with applications in Python” (1st ed.). Springer. 2023
2. The Elements of Statistical Learning. Trevor Hastie, Robert Tibshirani and Jerome
Friedman. Second Edition. 2017
3. Christopher Bishop, “Pattern Recognition and Machine Learning” Springer, reprint of the 1st
edition, New York, 2006.
4. Tom Mitchell, "Machine Learning", McGraw-Hill, Singapore, 1997.
5. Shai Shalev-Shwartz and Shai Ben-David, “Understanding Machine Learning”, Cambridge
University Press. 2017
CO – PO Mapping:
71
XC3651 DESIGN AND ANALYSIS OF ALGORITHMS L T P C
4 0 0 4
OBJECTIVES:
To introduce asymptotic notations and growth of functions for understanding of running time
of algorithms
To explain the design of sorting algorithms with correctness and complexity
To provide details of design, correctness and the complexity of fundamental Graph Algorithms
To introduce string matching algorithms with correctness and complexity
To explain classification of problems based on the computational complexity
UNIT II SORTING 12
Insertion sort – Quick sort – Divide and Conquer – Merge sort – Heap sort – Lower bounds for sorting
UNIT V NP COMPLETENESS 12
Polynomial time – The complexity class NP – NP-Completeness – Reducibility – NP-Complete
problems – CLIQUE and Traveling salesman problem
TOTAL: 60 PERIODS
OUTCOMES:
CO 1 : Describe the complexity of algorithm with appropriate asymptotic notations.
CO 2 : Use efficient sorting algorithms with comparison as the basic operation for solving sorting
problems.
CO 3 : Use the fundamental graph algorithms in solving optimization problems.
CO 4 : Use efficient string matching algorithms in string matching problems.
CO 5 : Able to recognize the complexity class of the given computational problems.
REFERENCES:
1. Baase, S. “Computer Algorithms: Introduction to Design and Analysis”, 3rd Edition, Addison
and Wesley, Boston, 2008.
2. Cormen, T.H., Leiserson, C.E. and Rivest, R.L. “Introduction to Algorithms”, 2nd Edition,
Prentice Hall of India, New Delhi (2009).
3. Levitin, A., “Introduction to the Design & Analysis of Algorithms”, 3rd Edition, Pearson
Education (Asia) Pvt. Ltd., Chennai, 2011.
72
CO – PO Mapping:
PROGRAMME OUTCOMES
COURSE
OUTCOMES PO1 PO2 PO3 PO4 PO5
CO 1 : 3 3 3 - 2
CO 2 : 3 3 3 - 2
CO 3 : 3 3 3 - 2
CO 4 : 3 3 3 - 2
CO 5 : 3 3 3 - 2
AVG: 3 3 3 - 2
UNIT II VIRTUALIZATION 9
Basics of Virtual Machines - Process Virtual Machines – System Virtual Machines - Taxonomy of
Virtual Machines. Virtualization - Storage Virtualization – Network Virtualization - Desktop
Virtualization – Application Virtualization - Server Virtualization
73
UNIT V CLOUD STORAGE AND SECURITY 9
Overview of cloud storage - Cloud storage providers - Cloud Software Environments -Eucalyptus,
Open Nebula, Open Stack, Nimbus - Cloud Infrastructure security: network, host and application level
– aspects of data security, provider data and its security, Identity and access management
architecture, IAM practices in the cloud - Key privacy issues in the cloud –Cloud Security and Trust
Management
TOTAL : 45 PERIODS
OUTCOMES:
CO 1 : Understand the basics of distributed computing.
CO 2 : Gain knowledge on virtualization.
CO 3 : Understand and apply storage and network virtualization.
CO 4 : Develop new cloud platform architectures.
CO 5 : Work with cloud storage providers using real time scenarios.
REFERENCES:
1. Ajay D. Kshemkalyani and Mukesh Singhal, “Distributed Computing: Principles, Algorithms, and
Systems”, Cambridge, 2020.
2. Kai Hwang, Geoffrey C Fox, Jack G Dongarra, "Distributed and Cloud Computing, From
Parallel Processing to the Internet of Things”, Elsevier, Burlington, 2013.
3. Rajkumar Buyya, Christian Vecchiola, and Thamarai Selvi, “Mastering Cloud Computing”,
Elsevier Science, Amsterdam, 2013.
4. Sunita Mahajan and Seema Shah, “Distributed Computing”, 2nd edition, Oxford Univ. Press,
New Delhi, 2013
CO – PO Mapping:
PROGRAMME OUTCOMES
COURSE
OUTCOMES PO1 PO2 PO3 PO4 PO5
CO 1 : 3 - 1 - -
CO 2 : 3 1 1 - 1
CO 3 : 3 2 2 - -
CO 4 : 3 2 2 - 1
CO 5 : 3 2 2 - 2
AVG: 3 1.4 1.6 - 0.8
74
MA3851 ADVANCED STATISTICAL METHODS FOR COMPUTING L T P C
4 0 0 4
OBJECTIVES:
This course provides a sound and rigorous treatment of the basic principles for a proper
understanding of the subject matter and for confidence in applying these principles to practical
problem solving
This course provides a solid undergraduate foundation in Time series Analysis and provides an
indication of the relevance and importance of the theory in solving real world problems
To enable the students to use the concepts of multivariate normal distribution and principle
components analysis
To provide information about Estimation theory and regression lines
To enable the students to use the concepts of design of experiments and factorial design
75
REFERENCES:
1. Dallas E Johnson et al., “Applied multivariate methods for data analysis”, Thomson
and Duxbury press, Singapore, 1998.
2. Gupta S.C. and Kapoor V.K. ”Fundamentals of Mathematical Statistics”, Sultan and
Sons, NewDelhi, 2001.
3. Jay L. Devore, “Probability and Statistics for Engineering and the Sciences”, Thomson
and Duxbury, Singapore, 2002.
4. Johnson, R.A. and Gupta, C.B., “Miller and Freund’s Probability and Statistics for
Engineers”, Pearson Education, Asia, 8th Edition, 2011.
5. Richard A. Johnson and Dean W. Wichern, “Applied Multivariate Statistical Analysis”,
Pearson Education, Fifth Edition, New Jersey, 2002.
6. Miller I. and Miller M., “John E. Freund’s Mathematical Statistics with Applications”,
Pearson, 8thEdition, New York City, 2019.
7. Krishnaiah, K. and Shahabudeen, P. “Applied Design of Experiments and Taguchi
Methods”,Prentice Hall of India, New Delhi, 2012.
CO – PO Mapping:
76
UNIT III CELLULAR NETWORKS 9
GSM – Mobility Management and call control – GPRS – Network Elements – Radio Resource
Management – Mobility Management and Session Management – Small Screen Web Browsing over
GPRS and EDGE – MMS over GPRS – UMTS – Channel Structure on the Air Interface–UTRAN –
Core and Radio Network Mobility Management – UMTS Security
UNIT IV 4G NETWORKS 9
LTE – Network Architecture and Interfaces – FDD Air Interface and Radio Networks –Scheduling–
Mobility Management and Power Optimization – LTE Security Architecture – Interconnection with
UMTS and GSM – LTE Advanced (3GPPP Release 10) – 4G Networks and Composite Radio
Environment – Protocol Boosters – Hybrid 4G Wireless Networks Protocols – Green Wireless
Networks – Physical Layer and Multiple Access – Channel Modelling for 4G – Introduction to 5G &XG
networks
REFERENCES:
1. William Stallings, “High Speed Networks and Internets: Performance and Quality of
Service”, Prentice Hall, Second Edition, 2002.
2. Martin Sauter, “From GSM to LTE, An Introduction to Mobile Networks and Mobile
Broadband”, Wiley, 2014.
3. Savo G Glisic, “Advanced Wireless Networks – 4G Technologies”, John Wiley & Sons,
2007.
4. Jonathan Rodriguez, “Fundamentals of 5G Mobile Networks”, Wiley, 2015.
5. Naveen Chilamkurti, SheraliZeadally, HakimaChaouchi, “Next-Generation Wireless
Technologies”, Springer, 2013.
6. Erik Dahlman, Stefan Parkvall, Johan Skold, “4G: LTE/LTE-Advanced for Mobile
Broadband”, Academic Press, 2013.
CO – PO Mapping:
PROGRAMME OUTCOMES
Course
Outcomes PO1 PO2 PO3 PO4 PO5
CO 1 : 3 - 3 - -
CO 2 : 3 2 2 - -
CO 3 : 3 2 2 - 2
CO 4 : 3 3 2 - 1
CO 5 : 3 3 2 - 1
AVG: 3 2 2.2 - 0.8
77
XT3851 PRINCIPLES OF MANAGEMENT AND BEHAVIOURAL SCIENCES L T P C
3 0 0 3
OBJECTIVES:
To know about the basic functions of management and organization environment
To understand the growth of industries and different forms of business organizations
To understand the group and organizational behavior
To study globalization and workforce diversity in management
To study the introduction of Human Resource Management
UNIT IV GLOBALISATION 9
Issues for global competitiveness, proactive and reactive forces of globalization - Cross-cultural
management – Management of workforce diversity
78
CO – PO Mapping:
PROGRAMME OUTCOMES
Course
Outcomes PO1 PO2 PO3 PO4 PO5
CO 1 : 2 - 2 - -
CO 2 : 2 - 2 - -
CO 3 : 2 - 2 - -
CO 4 : 2 - 2 - 1
CO 5 : 3 - 2 2 -
AVG: 2.2 - 2 0.4 0.2
TOTAL : 45 PERIODS
79
OUTCOMES:
CO 1 : Understand the different AI systems.
CO 2 : Use appropriate search algorithms for any AI problem.
CO 3 : Represent a problem using first order and predicate logic.
CO 4 : Provide the appropriate agent strategy to solve a given problem.
CO 5 : Design software agents to solve a problem.
REFERENCES:
1. David L. Poole and Alan K. Mackworth, ”Artificial Intelligence: Foundations of
Computational Agents”, Cambridge University Press, Second Edition, 2017.
2. M. Tim Jones, ”Artificial Intelligence: A Systems Approach (Computer Science)” , Jones
and Bartlett Publishers, Inc.; First Edition, Burlington, 2008.
3. Michael Negnevitsky, “Artificial Intelligence: A Guide to Intelligent Systems”, Third Edition,
Pearson Education, Canada, 2011.
4. S. Russell and P. Norvig, “Artificial Intelligence: A Modern Approach”, 4th Edition, Pearson
Education, 2022.
CO – PO Mapping:
PROGRAMME OUTCOMES
Course
Outcomes PO1 PO2 PO3 PO4 PO5
CO 1 : 3 1 2 - -
CO 2 : 3 2 2 - -
CO 3 : 3 2 2 - -
CO 4 : 3 2 2 - 1
CO 5 : 3 2 2 - 1
AVG: 3 1.8 2 - 0.4
80
UNIT II ML FOR SIGNATURE & ANOMALY DETECTION 9
Misuse/Signature Detection -Machine Learning in Misuse/Signature Detection -Machine-Learning
Applications in Misuse Detection – Malware Analysis. Anomaly Detection - Introduction – Machine
Learning in Anomaly Detection Systems -Machine-Learning Applications in Anomaly Detection-
Supervised Anomaly Detection - Spam Detection - Unsupervised Anomaly Detection
REFERENCES:
1. Anand Shinde, “Introduction to Cyber Security Guide to the World of Cyber Security”,
Notion Press, 2021.
2. Dua, Sumeet, and Xian Du. “Data Mining and Machine Learning in Cyber Security”, CRC
Press, 2016.
3. William Stallings, Lawrie Brown, “Computer Security Principles and Practice”, Third Edition,
Pearson Education, 2015.
4. Patrick Engebretson, “The Basics of Hacking and Penetration Testing: Ethical Hacking and
Penetration Testing Made Easy”, Elsevier, 2011.
5. Stolfo, Salvatore J., Bellovin S M, Hershkop S., Keromytis, A.D., Sinclair S, Smith. S,
“Insider Attack and Cyber Security: Beyond the Hacker”, Springer, 2008.
6. Bhattacharyya, Dhruba Kumar, and Jugal Kumar Kalita. “Network Anomaly Detection: A
Machine Learning Perspective”, CRC Press, 2013.
81
CO – PO Mapping:
CO – PO Mapping:
82
MA3951 NUMERICAL METHODS L T P C
4 0 0 4
OBJECTIVES:
To provide the mathematical foundations of numerical techniques for solving Eigen value
problems and linear system of equations
To apply the techniques of interpolation for equal and unequal intervals for the given data
To understand and apply the techniques of numerical integration and differentiation for
solving ODE in applying day-to-day life
To be familiar with solving initial value problems and ODE for given initial and boundary
conditions
To demonstrate the utility of Numerical techniques for solving Partial Differential Equations
in Heat and Fluid problems
UNIT II INTERPOLATION 12
Newton’s divided difference formula, and Lagrange’s formula. Newton’s forward and backward
difference formulae, Natural Cubic Spline
UNIT III NUMERICAL DIFFERENTIATION AND INTEGRATION 12
Numerical differentiation with interpolating polynomials, Numerical integration by Trapezoidal and
Simpson’s 1/3rd rule – Double integrals using Trapezoidal and Simpson’s rules
UNIT IV INITIAL VALUE PROBLEMS FOR ORDINARY DIFFERENTIAL 12
EQUATIONS
Single Step Methods-Taylor Series Euler and Modified Euler, methods for first order differential
equations, Runge-Kutta method of order four for first and second order differential equations. Multistep
Methods – Milne and Adam’s-Bash for the predictor and corrector methods for first-order differential
equations
83
REFERENCES:
1. Grewal,B.S, and Grewal J.S., “Numerical Methods in Engineering and
Science”,39thEdition, Khanna Publishers, New Delhi,2005.
2. John H. Mathews, “Numerical Methods for Mathematics, Science and Engineering”,2 rdEdition,
Prentice-Hall of India, New Delhi,2005.
3. Sankara Rao,K., “Numerical methods for scientists and Engineers”, 3 rdEdition, Prentice-Hall
of India, New Delhi,2008.
4. Sastry,S.S., “Introductory Methods of Numerical Analysis”, 3 rdEdition, Prentice-Hall of India,
New Delhi, 2004.
5. Veerarajan T. and Ramachandran T., “Numerical Methods with Programming in C”, Tata
McGraw-Hill Publishing Company Limited, New Delhi,2009.
CO – PO Mapping:
PROGRAMME OUTCOMES
Course
Outcomes PO1 PO2 PO3 PO4 PO5
CO 1 : 3 2 3 - -
CO 2 : 3 2 3 - -
CO 3 : 3 2 3 - -
CO 4 : 3 2 3 - -
CO 5 : 3 2 3 - -
AVG: 3 2 3 - -
84
UNIT III APPLICATION LAYER PROTOCOLS IN IoT 9
Rest Architecture - HTTP – CoAP: Architecture, Features, Applications-MQTT: Architecture,
Feature, Applications – Comparing different IoT Application Layer Protocols
REFERENCES:
1. Dieter Uckelmann, Mark Harrison, Florian Michahelles, “Architecting the Internet of
Things”, Springer, 2011.
2. Adrian McEwen and Hakim Cassimally, “Designing the Internet of Things”, John Wiley and
Sons, 2014.
3. Olivier Hersent, David Boswarthick and Omar Elloumi, “The Internet of Things: Key
Applications and Protocols”, John Wiley & Sons, 2012.
4. Michael Miller, "The Internet of Things", Pearson Education, 2015.
5. Massimo Banzi, "Getting Started with Arduino", Shroff Publishers & Distributors, 2014.
6. Simon Monk, "Programming Arduino: getting started with sketches" Mc Graw Hill, 2012.
7. Vedat Coskun, Kerem Ok, Busra Ozdenizci, "Near Field Communication from theory to
practice", John Wiley & Sons, 2011.
8. A Richard Wentk, "Teach yourself visually Raspberry Pi", John Wiley& Sons, 2014.
CO – PO Mapping:
85
XC3901 DIGITAL FORENSICS L T P C
3 0 2 4
OBJECTIVES:
To understand the basic digital forensics and evidence
To know how to conduct a forensic examination on digital devices
To understand how to acquire the digital evidence
To learn how the evidence on documented in the file system
To know about open source digital forensics tools
LAB EXERCISE:
1. Digital and Cyber Forensic Case Documentation
2. Study and Analysis of Network
3. Network Scanning
4. Windows/ Linux Log Analysis
5. Listing and Tracking Network Related Process
TOTAL : (45 +30) 75 PERIODS
OUTCOMES:
CO 1 : Get knowledge about computer crimes, forensics and evidence.
CO 2 : Able to proceed with the investigation by following the procedures.
CO 3 : Able to acquire the evidence using best acquisition method.
CO 4 : Have knowledge about the file system to document the evidence.
CO 5 : Know how to apply forensic analysis tools to recover important evidence for identifying
computer crime.
REFERENCES:
1. Warren G. Kruse II and Jay G. Heiser, “Computer Forensics: Incident Response
Essentials”, Addison Wesley, 2002.
2. Nelson, B, Phillips, A, Enfinger, F, Stuart, C., “Guide to Computer Forensics and
Investigations’’, 6th Edition, Cengage Learning, 2018.
86
3. Kavrestad, “Fundamentals of Digital Forensic Theroy and Methods and Real Life
applications”, 2ndedition , Springer, 2020.
4. Nilakshi Jain, Dhananjay R. Kalbande, “Digital Forensic”, Wiley, 2019.
5. William Oettinger, “Learn Computer Forensics”, Packt Publishing Limited, 2020.
CO – PO Mapping:
PROGRAMME OUTCOMES
Course
Outcomes PO1 PO2 PO3 PO4 PO5
CO 1 : 3 2 1 - -
CO 2 : 3 2 1 - -
CO 3 : 3 2 1 - -
CO 4 : 3 2 1 - -
CO 5 : 3 2 1 - 1
AVG: 3 2 1 - 0.2
87
UNIT IV AUGMENTED REALITY CONTENT 9
Augmented Reality – Relationship between augmented reality and other technologies–Augmented
reality concepts – major hardware components for augmented reality systems – major software
components for augmented reality systems - Contents of augmented reality - creating visual content
– creating audio content – Interaction in Augmented Reality – Mobile Augmented Reality – Augmented
Reality Applications
UNIT V VIRTUAL REALITY KEY ELEMENTS & SYSTEMS 9
Virtual Reality – Key elements of virtual reality – communication through medium – common issues of
Human Communication Media – Interface to the Virtual World - input – user monitoring – world
monitoring – output – visual displays
TOTAL: 45 PERIODS
OUTCOMES:
CO 1 : Understand working basic elements of multimedia.
CO 2 : Use and apply authoring tools for web and e-learning.
CO 3 : Implement various multimedia applications.
CO 4 : Develop contents for augmented reality applications.
CO 5 : Apply monitoring techniques in virtual reality systems.
REFERENCES:
1. Alan B. Craig, “Understanding Augmented Reality: Concepts and Applications”. Morgan
Kaufhann, Amsterdam, 2013.
2. Burdea, G. C. and P. Coffet. “Virtual Reality Technology”, 3rd Edition. Wiley-IEEE Press,
NewYork, 2023.
3. Fei GAO. “Design and Development of Virtual Reality Application System”, Tsinghua
Press, Regina, March 2012.
4. Greg Kipper, Joseph Rampolla, “Augmented Reality: An Emerging Technologies Guide to
AR“, Syngress, Elsevier, 2013.
5. Guangran LIU. “Virtual Reality Technology”, Tsinghua Press, Beijing, Jan. 2011.
6. Sherman, William R. and Alan B. Craig. “Understanding Virtual Reality – Interface,
Application, and Design”, Morgan Kaufmann, Cambridge, 2018.
7. Nigel Chapman and Jenny Chapman, “Digital Multimedia”, John Wiley & Sons, Third
Edition, Chichester, 2013.
8. Parag Havaldar and Gerard Medioni, “Multimedia Systems - Algorithms, Standards and
Industry Practices”, Course Technology, Course Technology Cengage Learning, Boston,
2010.
9. Ralf Steinmetz and Klara Nahrstedt, “Multimedia Computing, Communications and
Applications”, Dorling Kindersley Pvt Lt, New Delhi, 2013.
10. Ze - Nian Li, Mark S Drew and Jiangchuan Liu, “Fundamentals of Multimedia”, Springer-
Verlag, Second Edition, New York, 2016.
CO – PO Mapping:
88
XT3961 INTERNET OF THINGS LABORATORY L T P C
0 0 4 2
LIST OF EXPERIMENTS
Working with Arduino – configuring basic sensors – getting data from sensors – processing the data
– Working with Raspberry Pi – Activating lights/actuators/motors based on the sensor data.
Suggested list of applications:
1. Automatic Street Lighting system
2. Smart Water Monitoring system
3. Automatic Smart Parking system.
4. Multi Room Music Player using IoT
5. Smart Home Monitoring system
TOTAL: 60 PERIODS
OUTCOMES:
CO 1 : Hands on with Arduino board.
CO 2 : Hands on with Raspberry Pi.
CO 3 : Configuration of basic sensors.
CO 4 : Processing of sensor data.
CO 5 : Develop IoT application for real world scenarios.
CO-PO Mapping:
PROGRAMME OUTCOMES
Course
Outcomes PO1 PO2 PO3 PO4 PO5
CO 1 : 3 1 2 1 1
CO 2 : 3 2 2 1 1
CO 3 : 3 2 2 1 1
CO 4 : 3 2 2 1 1
CO 5 : 3 2 2 1 1
AVG: 3 1.8 2 1 1
OBJECTIVES:
To gain knowledge of MANET and routing mechanisms
To gain knowledge of the 802.11Wireless LAN (Wi-Fi) and Bluetooth standards
To gain knowledge of routing mechanisms and the three classes of approaches: proactive,
on-demand and hybrid
To gain knowledge about wireless sensor nodes
To gain knowledge about energy management and security mechanism in ad-hoc sensor
network
89
UNIT I INTRODUCTION TO MANET AND ROUTING 9
Introduction to MANET – Applications of MANETS – Challenges – Routing – Unicast –
Proactive – reactive – Position-based and QoS routing – Multicasting and Geocasting
REFERENCES:
1. Carlos de morais cordeiro and Dharma Prakash Agarwal, “Adhoc and Sensor Networks:
Theory and Applications”, World Scientific Publications, Second Edition,
Chennai, 2011.
2. Kazem Sohraby, Daniel Minoli, Taieb Znati,” Wireless Sensor Networks: Technology,
Protocols and Applications”, Wiley, New Jersey, 2010.
3. Sivaram Murthy C. and Manoj B.S., “Adhoc Wireless Networks – Architecture and
Protocols”, Pearson Education, Delhi, 2011.
4. Rohtash Ghuriya, “Wireless Ad Hoc and Sensor Networks” Gazelle Book Services,2017.
5. Bill, Fenner, M. Andrew,” Unix Network Programming? the Sockets And Networking”, 3 rd
Edition, Phi Learning Pvt Ltd, 2010.
90
XT3071 BIG DATA ANALYTICS L T P C
3 0 0 3
OBJECTIVES:
Introduce big data analytics concepts, its life cycle, challenges, application areas, tools
and platforms
To study classification and clustering techniques for analyzing big data
To introduce analytical theory and methods and recommendation system
To study in detail about Hadoop and data management for big data
To know about graphical analysis for big data using case studies
UNIT I INTRODUCTION TO BIG DATA ANALYTICS 9
Big Data Overview - State of the Practice in Analytics - Key Roles for the New Big Data Ecosystem -
Data Analytics Lifecycle Overview – Phases of life cycle – GINA – Big data Challenges – Application
area – Application Tools and Platforms
91
4. Dietmar Jannach and Markus Zanker, "Recommender Systems: An Introduction”, Cambridge
University Press, Cambridge, 2012.
5. Nitin Sawant and Himanshu shah, “Big data application Architecture Q & A : A problem solution
approach”, Dordrecht : Springer, 2014.
6. Wen – Chen Hu and Naima Kaabouch (eds), “Big data management, technology, and
Applications”, IGI Global, Hershey, 2014.
92
REFERENCES:
1. Eiben,A.E.,Smith,James E, "Introduction to Evolutionary Computing", Springer 2015.
2. Helio J.C. Barbosa, "Ant Colony Optimization - Techniques and Applications", Intech 2013.
3. Xin-She Yang , Jaao Paulo papa, "Bio-Inspired Computing and Applications in Image
Processing",Elsevier 2016.
4. Xin-She Yang, "Nature Ispired Optimization Algorithm,Elsevier First Edition 2014.
5. Yang ,Cui,XIao,Gandomi,Karamanoglu ,"Swarm Intelligence and Bio-Inspired Computing",
Elsevier First Edition 2013.
TOTAL: 45 PERIODS
93
OUTCOMES:
CO 1 : Understand the technology components of Blockchain and how it works behind the
scenes.
CO 2 : Identify different approaches to developing decentralized applications.
CO 3 : Understand Bitcoin and its limitations by comparing it with other alternative coins.
CO 4 : Devise a solution using the Ethereum model.
CO 5 : Understand and use Hyperledger and its development framework.
REFERENCES:
1. Imran Bashir, “Mastering Blockchain: Distributed Ledger Technology, Decentralization, and
Smart Contracts Explained”, Second Edition, Packt Publishing, 2018.
2. Roger Wattenhofer, “The Science of the Blockchain” CreateSpace Independent Publishing,
2016.
3. Arshdeep Bahga, Vijay Madisetti, “Blockchain Applications: A Hands-On Approach”, VPT,
2017.
4. A. Narayanan, J. Bonneau, E. Felten, A. Miller, S. Goldfeder, “Bitcoin and Cryptocurrency
Technologies: A Comprehensive Introduction”, Princeton University Press, 2016.
5. Alex Leverington, “Ethereum Programming” Packt Publishing, 2017.
6. Imran Bashir, “Mastering Blockchain: Distributed Ledger Technology, Decentralization, and
Smart Contracts Explained”, Second Edition, Packt Publishing, 2018.
7. Andreas Antonopoulos, Satoshi Nakamoto, “Mastering Bitcoin”, O’Reilly Media, 2014.
94
UNIT IV BASIC OPTIONS THEORY 9
Definitions – Pay off diagrams – Single period binomial options theory – Multi period binomial options
theory – Real options – American options, Simulation methods for options pricing – Random variable
generation – simulation of stochastic processes
OUTCOMES:
CO 1 : Introduce to the basics of computational finance
CO 2 : Familiarize with the mathematical preliminaries
CO 3 : Understand portfolio theory
CO 4 : Get an overview of basic options theory
CO 5 : Understand capital asset pricing and risk budgeting
REFERENCES:
1. David Ruppert, “Statistics and Data Analysis for Financial Engineering”, Springer-Verlag,
2011.
2. Edwin J. Elton, Martin J. Gruber, Stephen J. Brown and William N. Goetzmann “Modern
Portfolio Theory and Investment Analysis”, John Wiley& Sons, 2017.
3. Simon Benninga, Tal Mofkadi, “Financial Modeling”, 5 th Edition, MIT Press, 2022.
4. Steven E Shreve, “Stochastic Calculus for Finance – I” , Springer, 2009.
95
UNIT III VIEWING AND VISUAL REALISM 9
Three-Dimensional Viewing – Hidden Surface Removal – Illumination Models-Depth Cueing –
Perspective Projections of 3D Objects – Introduction to Shading Models – Flat Shading and Smooth
Shading – Adding Texture to Faces – Morphing – To Add Shadows of Objects – OPENGL Shading
Language – Manipulating Pixmaps – Manipulating Symbolically Defined Regions – Aliasing and
Anti Aliasing Techniques – Creating More Shades and Colours
UNIT V ANIMATIONS 9
Design of Animation Sequence – Animation Function – Raster Animation – Key Frame Systems –
Motion Specification – Morphing – Tweening – Types of Animation – Fractals – Tools for Animation
Creations
TOTAL: 45 PERIODS
OUTCOMES:
CO 1 : Articulate the concepts and techniques used in three-dimensional graphics.
CO 2 : Understand and Implement algorithms related to graphics creation.
CO 3 : Design and model graphical structures.
CO 4 : Understand and comprehend the graphical algorithms.
CO 5 : Design and develop simple and realistic animations.
REFERENCES:
1. F. S. Hill, Jr., Stephen M. Kelley, Jr., “Computer graphics using OpenGL”, Pearson Prentice
Hall, Third Edition, 2007.
2. Donald D. Hearn, M. Pauline Baker, W. Carithers., “Computer Graphics with Open GL”,
Fourth Edition, Pearson Eduction, 2010.
3. Tay Vaughan., “Multimedia: Making it Work”, Ninth Edition, McGraw-Hill Education, 2014.
4. Alan Watt, “3D Computer Graphics”, Third Edition, Pearson Addison Wesley, 2000.
5. Ralf Steinmetz, Klara Nahrstedt, “Multimedia Systems”, Springer, 2004.
96
UNIT I CREATING THE DATABASE ENVIRONMENT 9
DBMS Architectures-DBMS Clustering-DBMS Proliferation-Hardware Issues - Cloud Database
Systems-Installing the DBMS-DBMS Installation Basics-Hardware Requirements-Storage
Requirements-Memory Requirements -Configuring the DBMS-Installing and upgrading various
database packages (MS SQL Server, Oracle, MySQL)-Connecting the DBMS to Supporting
Infrastructure Software-Installation Verification-Database standards and Procedures
TOTAL : 45 PERIODS
OUTCOMES:
CO 1 : Impart the knowledge to use of different definition language to write query for a
database.
CO 2 : Understand the role of various database users including data base administrator.
CO 3 : Examine the fragmentation, loading and unloading of data.
CO 4 : Understand the techniques for data backup and maintenance.
CO 5 : Learn the user management, controlling and auditing user access of database.
REFERENCES:
1. Craig S. Mullins, “Database Administration: The Complete Guide to Practices and
Procedures”, Addison-Wesley, 2nd Edition, 2012.
2. Sam R. Alapati, Expert Oracle Database 11g Administration, Apress, 1 st Edition, 2009.
3. Adam Jorgensen, Jorge Segarra, Patrick Leblanc, Jose Chinchilla and Aaron Nelson,
Microsoft SQL server bible 2012, Wiley India Pvt.Ltd, 1 st Edition, 2012.
4. RoopeshRamklass, OCA Oracle Database12c, oracle press, McGraw Hill Education, 2014.
5. Tom Best, Maria Billings, Oracle Database 10g: Administration Workshop I, Oracle Press,
Edition 3.1, 2008.
97
XT3075 DATABASE TUNING L T P C
3 0 0 3
OBJECTIVES:
To get the feel of basics of database tuning
To learn concepts behind database design optimization
To write procedures involving query planning
To understand how troubleshooting is done
To formulate new indexing methods
UNIT I FUNDAMENTALS OF TUNING 9
Review of Relational Databases – Relational Algebra - Locking and Concurrency Control –
Correctness Consideration – Lock Tuning – Transaction Chopping – Logging and the Recovery
Subsystem – Principles of Recovery – Tuning the Recovery Subsystem – Recovery Tuning–
Operating Systems Considerations – Hardware Tuning
UNIT V TROUBLESHOOTING 9
Query Plan Explainers – Performance Monitors – Event Monitors – Finding ―Suspicious Queries –
Understanding Access Plans – Analyzing a Query‘s Access Plan – Profiling a Query Execution –
Analyzing DBMS Subsystems and Hardware Resources – SQL performance Analyzer – Time Series
Databases – Configuration Parameters: Oracle; SQL Server; DB2UDB
TOTAL : 45 PERIODS
OUTCOMES:
CO 1 : Design databases involving normalization.
CO 2 : Write optimized code for accessing multiple databases.
CO 3 : Use tuning tools for different database operations.
CO 4 : Troubleshoot database issues.
CO 5 : Use benchmark databases for demonstrating concepts behind database tuning.
REFERENCES:
1. Dennis Shasha and Philippe Bonnet ―Database Tuning, Principles, Experiments, and
Troubleshooting Techniques, Morgan Kaufmann: An Imprint of Elsevier, San Francisco,
2003.
2. Peter Gulutzan and Trudy Pelzer, ―SQL Performance Tuning, Addison-Wesley, First
Edition, Boston, 2002.
3. Richard Niemiec, ―Oracle Database 11g Release 2 Performance Tuning Tips and
Techniques, McGraw Hill Osborne, New York, 2012.
4. Thomas Connolly and Carolyn Begg, ―Database Systems: A Practical Approach to Design,
Implementation and Management, Fifth Edition, Pearson Education, Boston, 2009.
98
XT3076 DATA SCIENCE AND ANALYTICS L T P C
3 0 0 3
OBJECTIVES:
To know the fundamental concepts of data science and analytics
To learn fundamental data analysis using R
To understand various data modeling techniques
To learn the basic and advanced features of open source big data tools and frameworks
To study various analytics on stream data
OUTCOMES:
CO 1 : Convert real world problems to hypothesis and perform statistical testing.
CO 2 : Work with big data platform and its analysis techniques.
CO 3 : Select and employ mechanisms for tracking the software projects and maintaining quality.
CO 4 : Write efficient MapReduce programs for small problem-solving methods.
CO 5 : Implement suitable data analysis for stream data.
99
REFERENCES:
1. Bill Franks, “Taming the Big Data Tidal Wave: Finding Opportunities in Huge Data Streams
with Advanced Analytics”, John Wiley & sons, 2012.
2. Umesh R Hodeghatta, Umesha Nayak, “Business Analytics Using R – A Practical Approach”,
Apress, 2017.
3. Anand Rajaraman, Jeffrey David Ullman, “Mining of Massive Datasets”, Cambridge
University Press, 2012.
4. Nishant Garg, “HBase Essentials”, Packt, 2014.
5. Rachel Schutt, Cathy O'Neil, “Doing Data Science”, O'Reilly, 2013.
6. Foster Provost, Tom Fawcet, “Data Science for Business”, O'Reilly, 2013.
7. Bart Baesens, “Analytics in a Big Data World: The Essential Guide to Data Science and its
Applications”, Wiley, 2014.
100
UNIT V APPLICATIONS OF DEEP LEARNING 9
Case studies (one in each) in Computer Vision, Speech Processing, Natural Language Processing
TOTAL : 45 PERIODS
OUTCOMES:
CO 1 : Understanding the basics concepts of deep learning.
CO 2 : Understanding of CNN and RNN to model for real world applications.
CO 3 : Emphasizing knowledge on various deep learning algorithms.
CO 4 : Analyse the deep learning algorithms which are more appropriate for various types of
learning tasks in various domains.
CO 5 : Solve real-world problems by implementing deep learning algorithms.
REFERENCES:
1. Ian Goodfellow, Yoshua Bengio, Aaron Courville, Deep Learning, MIT Press, 2016
2. Yoshua Bengio, “Learning Deep Architectures for AI, Foundations & Trends in Machine
Learning”, Now Publishers, 2009
3. Josh Patterson, Adam Gibson, Deep Learning: A Practitioner’s Approach, O’Reilly Media, 2017.
4. Li Deng, Dong Yu, “Deep Learning: Methods and Applications”, Now Publishers 2014.
5. Nikhil Buduma, “Fundamentals of Deep Learning: Designing Next-Generation Machine
Intelligence Algorithms”, O’Reilly publications.2017.
6. Jon Krohn, “Deep Learning for Natural Language Processing: Applications of Deep Neural
Networks to Machine Learning Tasks”, Addison-Wesley, 2017.
101
UNIT III IMAGE RESTORATION AND MULTIRESOLUTION ANALYSIS 9
Image Restoration – Image Degradation Model – Noise Modeling – Blur – Order Statistic Filters –
Image Restoration Algorithms -Multi Resolution Analysis: Image Pyramids – Multi Resolution
Expansion – Wavelet Transforms
TOTAL : 45 PERIODS
OUTCOMES:
CO 1 : Understand the fundamentals of image and implement basic image processing
operations.
CO 2 : Apply filtering techniques in the areas of image enhancement.
CO 3 : Apply image restoration algorithms and analyze the image.
CO 4 : Understand the image segmentation algorithms and extract features from images.
CO 5 : Apply image processing techniques in various fields.
REFERENCES:
1. Sridhar. S, “Digital Image Processing”, Oxford University Press, 2nd Edition, New Delhi,
2016.
2. Rafael C. Gonzalez and Richard E. Woods, “Digital Image Processing”, Pearson Education,
4th Edition, New York, 2018.
3. Anil K. Jain, “Fundamentals of Digital Image Processing”, Pearson Education, New Delhi,
2009.
4. Milan Sonka, Vaclav Hlavac, and Roger Boyle, “Image Processing, Analysis, and Machine
Vision”, Cengage Learning, 4th Edition, Stanford, 2015.
102
XC3076 E-LEARNING L T P C
3 0 0 3
OBJECTIVES:
To get an overview about e-learning
To understand the importance of psychological background in e-learning
To completely understand the models of e-learning
To get updated about the recent trends in e-learning
To familiarize with the current technologies in e-learning
UNIT I Concept of E-Learning 9
Meaning, Evolution of E-Learning –Generations of distance education, Components of ELearning –
Virtual classroom: Tele conferencing, Audio and Video conferencing tools. Advantages &
disadvantages, E-learning in education versus corporate sector
TOTAL : 45 PERIODS
OUTCOMES:
CO 1 : Get an overview about e-learning.
CO 2 : Understand the importance of psychological background in e-learning.
CO 3 : Completely understand the models of e-learning.
CO 4 : Get updated about the recent trends in e-learning.
CO 5 : Familiarize with the current technologies in e-learning.
REFERENCES:
1. Mahmut Sinecen, “Trends in E Learning”, Intech Open London, UK, 2018.
2. Badrul H.Khan and Mohammad Ally, “International and book of Learning, Volume I Theoretical
Perspectives and Research” ,Routledge, UK, 2015.
3. Boykaand Gradinarova, “E-Learning Instructional Design, Organizational Strategy and
Management”, Intech Open, UK, 2015.
4. Mohamed Hamada, “E-Learning –New Technology, Applications and Future Trends”, Nova
Science Publishers, 2013.
5. Diane Elkins and Desiree , “E Learning Fundamentals: A Practical Guide”, Pinder, 2015.
6. Book Depository, UK. Michael Allenn “Guide to E Learning”, II Edition, John Wiley & Sons,
New Jersey, 2016.
103
XT3077 ENTERPRISE APPLICATION DEVELOPMENT L T P C
3 0 0 3
OBJECTIVES:
To introduce the basics and benefits of enterprise resource planning
To learn the ERP implementation and its methodology
To know the ERP technologies used for online businesses
To learn the business modules in the ERP
To know the future trends in the ERP
TOTAL : 45 PERIODS
OUTCOMES:
CO 1 : To know the strategic importance of Enterprise Resource Planning.
CO 2 : To know the implementation of ERP.
CO 3 : To understand the ERP technology and how its supports for online business.
CO 4 : To understand and implement ERP in various sectors.
CO 5 : To understand the current and future trends in ERP.
REFERENCES:
1. Vinod Kumar Grag and N.K. Venkitakrishnan, ERP- Concepts and Practice, Prentice Hall of
India, 2nd edition, 2006.
2. Alexis Leon, “ERP Demystified”, Tata McGraw Hill, New Delhi, 2014.
3. Alexis Leon, Enterprise Resource Planning, Fourth edition, Tata McGraw-Hill, 2019.
4. Jagan Nathan Vaman, ERP in Practice, Tata McGraw-Hill, 2008.
5. Joseph A Brady, Ellen F Monk, Bret Wagner, “Concepts in Enterprise Resource Planning”,
Thompson Course Technology, USA, 2001.
6. Mahadeo Jaiswal and Ganesh Vanapalli, “ERP”, Macmillan Publishers India Limited, 2009.
104
XC3077 GAME DESIGN AND DEVELOPMENT L T P C
3 0 0 3
OBJECTIVES:
To know the basics of 2D and 3D graphics for game development
To know the stages of game development
To understand the basics of game engine
To survey the gaming development environment and toolkits
To learn and develop simple games using Pygame environment
TOTAL: 45 PERIODS
OUTCOMES:
CO 1 : Have knowledge on the concepts of 2D and 3D graphics.
CO 2 : Prepare game design documents.
CO 3 : Understand the implementation of gaming engines.
CO 4 : Survey gaming environments and frameworks.
CO 5 : Implement a simple game in Pygame.
REFERENCES:
1. Sanjay Madhav, “Game Programming Algorithms and Techniques: A Platform Agnostic
Approach”, Addison-Wesley Professional, 2013.
2. Will McGugan, “Beginning Game Development with Python and Pygame: From Novice to
Professional”,Apress Publishers, 2007.
3. Paul Craven, “Python Arcade games”,Apress Publishers, 2016.
4. David H. Eberly, “3D Game Engine Design: A Practical Approach to Real-Time Computer
Graphics”, Second Edition, CRC Press, 2006.
5. Jung Hyun Han, “3D Graphics for Game Programming”, Chapman and Hall/CRC, 2011.
105
XT3078 GEOGRAPHICAL INFORMATION SYSTEM LT PC
3 0 03
OBJECTIVES:
To Develop an understanding of the world’s quickly-growing spatial data infrastructure
To study how to put GIS to work for producing location-based information
To Identify the relevant spatial characteristics of diverse application areas enabling professionals
to integrate spatial thinking
To study GIS analysis into their careers
To have an ability to use geospatial technologies to gain a significant advantage in the
information technology field
UNIT I GIS OVERVIEW 9
GIS – Definition -History of GIS -Basic Components of GIS – Hardware, Software, Data, Methods,
People – List of GIS Software: Popular software, Open Source software
TOTAL : 45 PERIODS
OUTCOMES:
CO 1 : How to describe what GIS is; name the major GIS software available; know where to find
more information.
CO 2 : How to explain the components and functionality of a GIS and the differences between GIS
and other information systems.
CO 3 : The nature of geographic information and explain how it is stored in computer (including
map projection) and the two types of GIS data structure.
CO 4 : How to conduct simple spatial analysis using GIS software.
CO 5 : How to design and complete a GIS project from start to finish (data capture, data storage
and management, analysis, and presentation).
106
REFERENCES:
1. Lo, C.P. and Yeung, Albert K.W.,” Concepts and Techniques of Geographic Information
Systems”, Pearson, Second Edition, 2016.
2. Peter A. Burrough, Rachael A. McDonnell, “Principles of GIS”, Oxford University Press, Third
Edition,2015.
3. Robert Laurini and Derek Thompson, “Fundamentals of Spatial Information Systems”,
Academic Press, 1992.
4. Paul Longley, Geographic Information Systems and Science, John Wiley & Sons Inc, ,Third
Edition, 2010.
TOTAL : 45 PERIODS
107
OUTCOMES:
CO 1 : Understand the fundamentals of information.
CO 2 : Know the basic notions of information and channel capacity.
CO 3 : Convolutional and block codes, decoding techniques.
CO 4 : Understand how error control coding techniques are applied in communication systems.
CO 5 : Compression techniques for text, image, audio and video.
REFERENCES:
1. Amitabha Bhattacharya,” Digital Communication”, Tata McGraw-Hill, New Delhi,2015.
2. Fred Halsall, “Multimedia Communications: Applications, Networks, Protocols and
Standards”, Pearson Education Asia, Delhi, 2001.
3. K. Sayood, “Introduction to Data Compression”, Third Edition, Elsevier, San Francisco, 2010.
4. R. Bose, “Information Theory, Coding and Cryptography”, Tata McGraw-Hill, New Delhi,
2008.
5. S. Gravano, “Introduction to Error Control Codes”, Oxford University Press, Oxford, 2007.
UNIT I MODELLING 9
Taxonomy of information retrieval models – Formal characterization of IR models – Classic
Information Retrieval – Alternative Set Theoretic Models – Alternative Algebraic Models – Alternative
Probabilistic Models – Structured Text Retrieval Models – Models for Browsing
UNIT V MULTIMEDIA IR 9
Data modelling – Query languages – Generic Multimedia Indexing approach – One-dimensional time
series – Two-dimensional color images – Automatic feature extraction
TOTAL: 45 PERIODS
108
OUTCOMES:
CO 1 : Use an open source search engine framework and explore its capabilities.
CO 2 : Represent documents in different ways and discuss its effect on similarity calculations
and on search.
CO 3 : Design and implement an innovative feature in a search engine.
CO 4 : Build an IR model.
CO 5 : Enhance an existing IR model.
REFERENCES:
1. Ricardo Baeza-Yates and Berthier Ribeiro-Neto, “Modern Information Retrieval”, Pearson ,
Second Edition, England, 2011.
2. Bruce Croft, Donald Metzler and Trevor Strohman, “Search Engines: Information Retrieval in
Practice”, Pearson, Boston, 2010.
3. C. Manning, P. Raghavan and H. Schütze, “Introduction to Information Retrieval”, Cambridge
University Press, Cambridge, 2008.
4. Stefan Buettcher, Charles L. A. Clarke and Gordon V. Cormack, “Information Retrieval:
Implementing and Evaluating Search Engines”, The MIT Press, Cambridge, 2016.
OUTCOMES:
CO 1 : Identify both external and internal vulnerabilities to enterprise computer infrastructures and
sensitive digital assets and devise a mitigation plan against them.
109
CO 2 : Have comprehensive information about security policies, establishing necessary
organizational processes/functions for information security and will be able to arrange
necessary resources.
CO 3 : Differentiating among the models, architectures, challenges and global legal constraints of
secure electronic commerce technologies used to ensure transmission, processing and
storage of sensitive information.
CO 4 : About cyber law and ethics.
CO 5 : About recent information security threats and preventive measures.
REFERENCES:
1. Matt Bishop, Elisabeth Sullivan; Michelle Ruppel “Computer Security Art and Science”,
Addison- Wesley, 2nd Edition, Boston, 2019.
2. Michael E Whitman and Herbert J Mattord, “Principles of Information Security”, Mass. :
Cengage Learning, 6th Edition, Boston, 2018.
3. Micki Krause, Harold F. Tipton, “Information Security Management Handbook 3”, CRC Press,
6th Edition, Boca Raton,.2009.
4. Stuart Mc Clure, Joel Scrambray, George Kurtz, “Hacking Exposed”, Tata McGraw-Hill, 7th
Edition, New York, 2012.
110
UNIT V SALES ANALYTICS 9
E-Commerce sales mode, sales metrics, profitability metrics and support metrics
TOTAL : 45 PERIODS
OUTCOMES:
CO 1 : Get an overview of models and metrics.
CO 2 : Understand competitive analysis and business strategy.
CO 3 : Understand product, service and price analytics.
CO 4 : Familiarize with distribution and promotion analytics.
CO 5 : Understanding about sales analytics.
REFERENCES:
1. Stephan Sorger, “Marketing Analytics – Strategic Models and Metrics”, Admiral Press, 2013.
2. Simon Kingsnorth, “Digital Marketing Strategy: An Integrated Approach to Online Marketing”,
Kogan Page, 2019.
3. Wayne L. Winston, “Marketing Analytics: Data-Driven Techniques with Microsoft Excel”,
Wiley, 2014.
4. Simon Kingsnorth, “Digital Marketing Strategy: An Integrated Approach to Online Marketing”,
Kogan Page, 2019.
111
UNIT III PERVASIVE COMPUTING 9
Introduction - Principles, Characteristics- interaction transparency, context aware, automated
experience capture. Architecture for pervasive computing - Pervasive devices-embedded controls -
smart sensors and actuators -Context communication and access services
UNIT IV PROTOCOLS 9
Open protocols- Service discovery technologies- SDP, Jini, SLP, UpnP protocols–data
synchronization- SyncML framework - Context aware mobile services - Context aware sensor
networks, addressing and communications- Context aware security
TOTAL : 45 PERIODS
OUTCOMES:
CO 1 : To deploy better strategies for radio and signal transmission.
CO 2 : To develop suitable scripts and applications for recent networks.
CO 3 : To use context aware sensor and mesh networks to develop mobile computing
environment.
CO 4 : To develop better protocols and effective communication mechanism for mobile and
context aware computing.
CO 5 : To develop more system model by using different simulators and design an appropriate
mechanism to evaluate the system performance.
REFERENCES:
1. Jochen Burkhardt, Stefan Heper, Klaus Rindtorf, Thomas Schaeck, ”Pervasive Computing-
Technology and Architecture of Mobile Internet Application”, Pearson Education, Indian
Edition, 2012.
2. Jochen Schiller, “Mobile Communications”, Pearson, Second Edition, 2012.
3. Seng Loke, Context-Aware Computing Pervasive Systems, Auerbach Pub., New York, 2007.
4. Uwe Hansman etl ,Pervasive Computing, 2nd Edition,Springer, New York,2003.
112
UNIT I INTRODUCTION TO SYSTEMS 9
Simulation – Advantages and Disadvantages – Applications of Simulation – Systems and System
Environment – Components of a system – Discrete and Continuous systems – Model of a system–
Types of models – Discrete-Event system simulation – Steps in a simulation study
REFERENCES:
1. Jerry Banks John S. Carson II, Barry L. Nelson, and David M.Nicol, “Discrete -Event System
Simulation”, 5 th Edition, Pearson, India, 2013
2. Geoffrey Gordon, “System Simulation”, 2nd Edition, PHI Learning, 2013.
3. Narsingh Deo, “System Simulation with Digital Computer, “Prentice Hall, India, 2004.
4. Shannon, R.E. “Systems simulation, The art and science”, Prentice Hall, 1998.
5. Thomas J. Schriber, “Simulation using GPSS”, Krieger Publishing Company, 1990.
113
XT3083 MULTIMEDIA ANALYTICS L T P C
3 0 0 3
OBJECTIVES:
To introduce the basics of multimedia databases and its architecture
To deal with multimedia databases include text, image and video analysis
To learn the techniques of text mining in multimedia
To learn architectural support of multimedia data mining and video retrieval in video mining
To design content-based image and video retrieval system
OUTCOMES:
CO 1 : To understand the basics of the multimedia database and its architecture.
CO 2 : To extract and deal with the text, image and the video data from multimedia database.
CO 3 : To predict from text, classification and pattern recognition from text.
CO 4 : To understand the approaches and techniques used in data and audio mining.
CO 5 : To deal with the content-based image and video retrieval system.
114
REFERENCES:
1. Dunckley Lynne, Multimedia Databases: An Object Relational Approach, Pearson
Education, 2003.
2. Sholom M. Weiss, NitinIndurkhya, Tong Zhang and Fred Damerau, “Text Mining:
Predictive Methods for Analyzing Unstructured”, Springer, 2010.
3. Oge Marques and BorkoFurht, “Content-Based Image and Video Retrieval”, 2012.
4. Robertson, L. Methods and innovations for multimedia database content
management/current trends and future practices for digital literacy and competence,
Information Science Reference, 2013.
5. Djeraba, C. Multimedia mining: a highway to intelligent multimedia documents (Vol. 22).
Springer Science, Business Media, 2012.
UNIT II SPEECH 9
Speech – Phonetics - Speech Synthesis - Automatic Speech Recognition - Speech Recognition: -
Advanced Topics - Computational Phonology
UNIT V APPLICATIONS 9
Information Extraction - Question Answering and Summarization - Dialogue and Conversational
Agents - Machine Translation
TOTAL : 45 PERIODS
115
OUTCOMES:
CO 1 : Tag a given text with basic Language features.
CO 2 : Design an innovative application using NLP components.
CO 3 : Implement a rule based system to tackle morphology/syntax of a language.
CO 4 : Design a tag set to be used for statistical processing for real-time applications.
CO 5 : Compare and contrast use of different statistical approaches for different types of NLP
applications.
REFERENCES:
1. Daniel Jurafsky, “Speech and Language Processing: An Introduction to Natural Language
Processing, Computational Linguistics and Speech”, Dorling Kindersley Pvt, Ltd., 2nd Edition,
India, 2016.
2. Breck Baldwin, Krishna Dayanidhi, “Language Processing with Java and LingPipe Cookbook”,
Packt Publishing Limited, London, 2014.
3. Nitin Indurkhya and Fred J. Damerau, “Handbook of Natural Language Processing”, Chapman
& Hall/CRC, Second Edition, Boca Raton, 2010.
4. Richard M Reese, “Natural Language Processing with Java”, Packt Publishing, 2nd Edition,
Birmingham, 2018.
5. Steven Bird, Ewan Klein and Edward Loper, “Natural Language Processing with Python”,
O‘Reilly Media, First Edition, Beijing , 2009.
116
UNIT V NETWORK ROBUSTNESS 9
Percolation theory, robustness of scale-free networks, attack tolerance, cascading failures,
modeling cascading failures, building robustness
TOTAL : 45 PERIODS
OUTCOMES:
CO 1 : Understand the concept of random networks
CO 2 : Examine the model of Barabási-Albert.
CO 3 : Investigate the scale-free network with its properties.
CO 4 : Understand the degree correlation in real networks.
CO 5 : Examine the network robustness with cascading failures.
REFERENCES:
1. Albert-László Barabási, “Network Science”, Cambridge University Press, 2020
2. Filippo Menczer, Santo Fortunato, Clayton A. Davis, “A First Course in Network Science”,
Cambridge University Press, 2020.
3. Estrada, E., Fox, M., Higham, D.J. and Oppo, G.L., “Network Science - Complexity in Nature
and Technology”, Springer, 2010.
4. Ted G. Lewis, “Network Science: Theory and Practice”, John Wiley& Sons, 2013.
5. Guido Caldarelli, Alessandro Chessa, “Data Science and Complex Networks: Real Case
Studies with Python”, Oxford University Press, 2016.
117
UNIT IV OPEN-SOURCE WEB SERVER 9
Web Server - Feature – Architectures - Case Study: Apache Web Server - Configuring and Using
Web Server - Comparison of Apache Web Server with Commercial Web Servers
OUTCOMES:
CO 1 : Understand how to install and run open-source operating systems.
CO 2 : Apply the security concept in open-source database.
CO 3 : Contribute software to and interact with Free and Open-Source software development
projects.
CO 4 : Build and modify one or more Free and Open-Source web server’s configuration.
CO 5 : Use a version control system.
REFERENCES:
1. Brian D Foy, “Mastering Perl”, O’Reilly Media, Second Edition, California, 2014.
2. Christopher Negus and Christine Bresnahan, “Linux Bible”, Wiley, 8th Edition, Washington,
2015.
3. Julie Meloni, “Teach Yourself PHP, MySQL and Apache All in One”, Sams Publishers, Fifth
Edition, Indiana, 2012.
4. Kailash Vadera and Bhavyesh Gandhi, “Open Source Technology”, University Science Press,
First Edition, New Delhi, 2009.
5. Sandeep Koranne, “Handbook of Open Source Tools”, Springer Science, Business Media,
Heidelberg, 2015.
118
UNIT III FEATURE EXTRACTION AND STRUCTURAL PATTERN RECOGNITION 9
KL Transforms – feature selection through functional approximation – Binary selection – Elements
of formal grammars, syntactic description, stochastic grammars, Structural representation
UNIT IV AI TECHNIQUES 9
Search and control strategies – Uniformed search – Informed search – searching AND/OR graphs
- Matching techniques – Knowledge for recognition and Classification process – Visual image
understanding - Expert system architectures
TOTAL: 45 PERIODS
OUTCOMES:
CO 1 : Classify data and identifying patterns.
CO 2 : Extract feature set and select the features from given data set.
CO 3 : Apply graph theory approaches to pattern clustering.
CO 4 : Apply AI techniques.
CO 5 : Apply Fuzzy logic and neural pattern rules.
REFERENCES:
1. Andrew Webb, Keith D Copsey, “Statistical Pattern Recognition”, John Wiley & Sons, Third
Edition, Hoboken, 2011.
2. Dan Patterson, “Introduction to artificial Intelligence and Expert Systems”, Pearson
Education, 1 st Edition, New Delhi, 2015.
3. Richard O Duda, Peter E Hart, David G Stork, “Pattern Classification and Scene Analysis”,
John Wiley, 2nd Edition, New York, 2012.
4. Earl Gose, Richard Johnson baugh, Stene Jost, “Pattern Recognition and Image analysis”,
Pearson India Education, Indian Edition, Noida, 2015.
5. Elaine Rich, Kevin Knight, “Artificial Intelligence”, Tata Mcgraw Hill Education, 3rd Edition,
NewDelhi, 2011.
119
XT3086 PERSONAL SOFTWARE PROCESSES L T P C
3 0 0 3
OBJECTIVES:
To study how to manage and track the time for software processes and personal life
To study how to plan a product and how to measure size of a product
To learn how to schedule a process and how to be committed in work
To learn about software Development process and how to produce defect free product
To learn how to estimate the product and process quality
UNIT I OVERVIEW AND PLANNING PROCESS 9
Overview of Software Development Life cycle – Overview of PSP – Different levels of PSP –
Importance of Statistical data - Why do planning? – Size and Time – Process and sequencing –
Tracking – Making the plan – Common planning tools – Software size
120
XC3082 QUANTUM COMPUTING L T P C
3 0 0 3
OBJECTIVES:
To understand the building blocks of a quantum computer
To Implement the simple quantum algorithms and information channels in the quantum circuit model
To understand the principles of quantum information
To understand the applications and limitations of quantum operations formalizing
To simulate a simple quantum error-correcting code
121
XT3087 SEMANTIC WEB L T P C
3 0 0 3
OBJECTIVES:
To learn the fundamentals of semantic web and to conceptualize and depict Ontology for
semantic web
To make a study of languages for semantic web
To learn about the ontology learning algorithms and to utilize in the development of an application
To know the fundamental concepts of management of ontology
To understand the working of ontology models
UNIT I THE QUEST FOR SEMANTICS 9
Building Models - Calculating with Knowledge - Exchanging Information - Semantic Web Technologies
– Layers – Architecture - Components –Types – Ontological Commitments – Ontological Categories –
Philosophical Background - Sample Knowledge Representation Ontologies –Top Level Ontologies –
Linguistic Ontologies – Domain Ontologies – Semantic Web – Need – Foundation
UNIT II LANGUAGES FOR SEMANTIC WEB AND ONTOLOGIES 9
Web Documents in XML – RDF - Schema – Web Resource Description using RDF - RDF Properties
–Topic Maps and RDF – Overview – Syntax Structure – Semantics – Pragmatics - Traditional Ontology
Languages – LOOM - OKBC – OCML – F-Logic Ontology Markup Languages – SHOE – OIL - DAML
+ OIL - OWL
UNIT III ONTOLOGY LEARNING FOR SEMANTIC WEB 9
Taxonomy for Ontology Learning – Layered Approach – Phases of Ontology Learning –Importing and
Processing Ontologies and Documents – Ontology Learning Algorithms -Evaluation
UNIT IV ONTOLOGY MANAGEMENT AND TOOLS 9
Overview – Need for management – development process – target ontology – ontology mapping – Skills
management system – Ontological class – Constraints – Issues. Evolution –Development of Tools and
Tool Suites – Ontology Merge Tools – Ontology based Annotation Tools
UNIT V APPLICATIONS 9
Web Services – Semantic Web Services - Case Study for specific domain – Security issues – Web Data
Exchange and Syndication - Semantic Wikis - Semantic Portals - Semantic Metadata in Data Formats -
Semantic Web in Life Sciences - Ontologies for Standardizations - RIF Applications
TOTAL: 45 PERIODS
OUTCOMES:
CO 1 : Create Ontology for a given domain.
CO 2 : Develop an application using ontology languages and tools.
CO 3 : Perform ontology management effectively.
CO 4 : Evaluate different ontology models.
CO 5 : Design and develop web service applications using semantic portals.
REFERENCES:
1. Alexander Maedche, ― Ontology Learning for the Semantic Web,Springer; New York 1
edition, 2012.
2. Dean Allemang(Author),James Hendler(Author) ―Semantic Web for the Working Ontologist:
Effective Modeling in RDFS and OWL (Paperback), Morgan Kaufmann, Burlington,
Massachusetts 2008.
3. Grigoris Antoniou, Frank van Harmelen, ―A Semantic Web Primer (Cooperative Information
Systems), The MIT Press, Cambridge ,Massachusetts, 2004.
4. John Davies, Dieter Fensel, Frank Van Harmelen, ―Towards the Semantic Web: Ontology –
Driven Knowledge Management, John Wiley & Sons Ltd. West Sussex, 2003.
122
5. Michael C. Daconta, Leo J. Obrst, Kevin T. Smith, ―The Semantic Web: A Guide to the Future
of XML, Web Services, and Knowledge Management, Wiley, Indianapolis, 2003.
OUTCOMES:
CO 1 : The fundamentals of social psychology.
CO 2 : Social perception and impression management.
CO 3 : Social cognition and comparison.
CO 4 : Social Identity and interpersonal attraction and relations.
CO 5 : Social influence and the application of social psychology.
REFERENCES:
1. Baron, Byrne and Brascombe, “Social Psychology”, 14th Edition, Pearson, 2017.
2. David G. Myers, “Social Psychology”, 11th Edition, McGraw Hill, 2021.
3. Baron and Byrne, “Social Psychology”, 8th Edition, PHI, 2006.
123
XT3088 SOFTWARE TESTING AND QUALITY ASSURANCE L T P C
3 0 0 3
OBJECTIVES:
To present the concepts software processes methodologies and quality Standards
To understand the models and metrics of software quality and reliability
To know the behavior of the testing techniques
To design test cases to detect the errors in the software
To enable students to gain a working knowledge of techniques for management of testing
projects
REFERENCES:
1. Edward Kit, Susannah Finzi, “Software Testing in the Real World – Improving the Process”,
Addison-Wesley, Reprinted, Harlow , 1999.
2. Elfriede Dustin, “Effective Software Testing”, Addison-Wesley, 5th printing, Boston, 2006.
124
3. Ilene Burnstein, “Practical Software Testing - a process-oriented approach”, Springer-Verlag,
New York, 2010.
4. M G Limaye, “Software Testing – Principles, Techniques and Tools”, Tata McGraw-Hill
Education, New Delhi, 2009.
5. Milind Limaye, “Software Quality Assurance”, Tata McGraw Hill Education, New Delhi, 2011.
6. Rajani and Pradeep Oak, “Software Testing – Effective Methods, Tools and Techniques”,
Tata McGraw Hill, New Delhi, 2007.
7. Stephen Kan, “Metrics and Models in Software Quality”, Addison-Wesley, 2nd Edition, Boston,
2008.
8. Yogesh Singh, “Software Testing” Cambridge University Press, Cambridge, 2013.
TOTAL : 45 PERIODS
125
OUTCOMES:
CO 1 : Develop and understand the quality management philosophies and frameworks.
CO 2 : Develop in-depth knowledge on various tools and techniques of quality management.
CO 3 : Learn the applications of quality tools and techniques used in both manufacturing and
service industry.
CO 4 : Develop analytical skills for investigating and evaluating the quality management issues
in the industry.
CO 5 : Measure exactly where an organization stands on quality management with respect to the
ISO 9000 quality management standard and the Baldrige Award criteria.
REFERENCES:
1. Janakiraman, Band Gopal, R.K, “Total Quality Management – Text and Cases”, Prentice
Hall (India) Pvt. Ltd., New Delhi, 2006.
2. Dale H. Besterfiled, et.al., “Total Quality Management”, Pearson Education Asia, 5 th Edition,
2018.
3. James R. Evans and William M. Lindsay, “The Management and Control of Quality”, 8 th Edition,
Cengage Learning India Private Limited, 2012.
4. Shridhava Bhat,”Total Quality Management” Himalaya Publishing house,1 s Edition, 2010.
5. Suganthi, L and Anand Samuel, “Total Quality Management”, Pearson Publishing, 2018.
126
UNIT IV SOCKETOPTIONS,ELEMENTARY UDPSOCKETS 9
Socket options – getSocket and setSocket functions – generic socket options – IP socket
options –ICMP socket options – TCP socket options – Elementary UDP sockets – UDP echo
Server – UDP echoClient – Multiplexing TCP and UDP sockets – Domain name system
gethostbyname function Ipv6support in DNS – gethostbyaddr function – getservbyname and
getservbyport functions
TOTAL: 45 PERIODS
OUTCOMES:
CO 1 : The idea about the UNIX Operating System and Inter-Process Communication.
CO 2 : Ability to do socket programming using TCP and UDP.
CO 3 : Knowledge about EchoServer, DayTimeServer, and I/O multiplexing.
CO 4 : Knowledge of various socket options and able implement socket programming.
CO 5 : Ability to create and implement raw sockets.
REFERENCES:
1. Richard Stevens.W, Bill Fenner, Andrew M Rudoff, “Unix Network Programming –The Sockets
and Networking API Volume1”, Addison-Wesley, 3rdEdition, Boston, 2012.
2. W. Richard Stevens, “Unix Network Programming – Volume2 Inter-process communication”,
Prentice Hall International, Upper Saddle River,2009.
3. W. Richard Stevens, Stephen A. Rago, “Advanced Programming in The UNIX Environment ”,
Addison Wesley, Third Edition, Upper Saddle River,2014.
127
UNIT III SYSTEM MENUS AND NAVIGATION SCHEMES 9
Structures of menus, Functions of menus, Contents of menus, Formatting of menus, Phrasing
the menu, Selecting menu choices, Navigating menus, Kinds of graphical menus
UNIT IV WINDOWS 9
Windows - Characteristics, Components of window, Window presentation styles, Types of window,
Window management, Organizing window functions, Window operations, Web systems,
Characteristics of device based controls
128
UNIT IV WEB ANALYTICS TOOLS 9
Content organization tools –Process measurement tools – Visitor segmentation tools – Campaign
analysis tools – Commerce measurement tools – Google analytics – Omniture – Web trends – Yahoo!
Web analytics
REFERENCES:
1. Bernard J. Jansen, “Understanding User-Web Interactions via Web analytics”, Morgan and
Claypool, 2009.
2. Avinash Kaushik, “Web Analytics2.0”, John Wiley & Sons, 2010.
3. Brian Clifton, “Advanced web metrics with Google analytics”, John Wiley & Sons, 2012.
4. Jerri L. Ledford, Joe Teixeira and Mary E. Tyler, “Google Analytics”, John Wiley & Sons, 2013.
5. Sterne J., “Web Metrics : Proven methods for measuring web site success”, 1 st Edition, John
Wiley and Sons 2002.
129