7334UG CSE Syllabus 2
7334UG CSE Syllabus 2
in
Credit Point
Sl. No. Year
ODD EVEN
1 First 18.5 20.5
2 Second 23 19
3 Third 21 21
4 Fourth 19 18
77.5 82.5
Total Credit Point
160
2nd Semester
4th Semester
Sl No Course Code Course Title L T P C
1 CS – 206 Computer Organization & Architecture 3 1 0 4
2 CS – 207 Design and Analysis of Algorithm 3 1 0 4
3 CS – 208 Formal Language and Automata Theory 3 0 0 3
4 CS – 209 System Software and administration 2 0 0 2
5 MH – 206 Entrepreneurship 3 0 0 3
6 CS – 210 Computer Organization & Architecture Laboratory 0 0 2 1
7 CS – 211 Design and Analysis of Algorithm Laboratory 0 0 2 1
8 CS – 212 System Software and administration laboratory 0 0 2 1
Total Credits 14 2 6 19
5th Semester
Sl. No Course Code Course Title L T P C
1 CS – 301 Operating System 3 1 0 4
2 CS – 302 Compiler Design 3 0 0 3
3 EC – 302 Microprocessor & Interfacing 3 0 0 3
4 MA- 301 Optimization Methods 3 1 0 4
5 CS – 303 Signal and Data Communication 3 0 0 3
6 CS – 304 Operating System Laboratory 0 0 2 1
7 CS – 305 Compiler Design Laboratory 0 0 2 1
8 EC – 306 Microprocessor & Interfacing Laboratory 0 0 2 1
9 CS – 390 Summer Internship - I 0 0 0 1
Total Credit 15 3 6 21
6th Semester
Sl. No Course Code Course Title L T P C
1 CS – 306 Computer Networking 3 1 0 4
2 CS – 307 Software Engineering 3 0 0 3
3 CS – 308 Computer Graphics and Multimedia 3 0 0 3
4 CS – 309 Database management System 3 0 0 3
5 CS – 310 AI & Machine Learning 3 0 0 3
6 CS – 311 Computer Networking Laboratory 0 0 2 1
7 CS – 312 Database management System Laboratory 0 0 2 1
8 CS – 313 Computer Graphics and Multimedia 0 0 2 1
laboratory
9 CS – 314 Machine Learning laboratory 0 0 2 1
10 CS - 391 Summer Internship –II 0 0 0 1
Total Credit 15 3 6 21
7Th Semester
Sl. No Course Code Course Title L T P C
1 OE-XXX Open Elective 3 0 0 3
2 CS – 401 Internet and Web Technology 3 0 0 3
3 CS– 402 Cryptography & network Security 3 0 0 3
4 CS– 403X Elective-I 3 0 0 3
5 CS– 404 Pattern Recognition & Image Processing 3 0 0 3
6 CS – 405 Internet and Web Technology laboratory 0 0 2 1
7 CS – 406 Cryptography & Network Security 0 0 2 1
laboratory
8 CS – 407 Pattern Recognition & Image Processing 0 0 2 1
laboratory
9 CS– 492 Summer Internship-III 0 0 0 1
Total Credit 15 0 6 19
8th Semester
Sl. No Course Code Course Title L T P C
1 CS – 408 Elective-II (Swayam/ NPTEL) 3 0 0 3
2 CS– 409 Elective-III (Swayam/ NPTEL) 3 0 0 3
3 CS – 498 Grand Viva 0 0 4 2
4 CS–499 Project Phase-II & Dissertation 0 0 20 10
Total Credits 9 0 18 18
List of Subjects for Elective – I
Students are free to choose any subjects of their interest offered by Electrical
Engineering, Electronics and Communication Engineering, Civil Engineering,th
Mechanical Engineering, Humanities & Management and Basic science during 3 rd, 5
th
and 7 semester.
Courses will be of completely student‟s choice and should contain at least 20 video
lectures including tutorials which will be considered as 3 credit course.
The choice of courses should be from outside the core and electives offered by
department.
SUMMER INTERNSHIP:
At least three internships have to be done in Industry preferably during summer
vacation.
Second Semester
2nd Semester
A. Course Objectives:
The course is designed to:
a) Introducing the basic and fundamental components of computers and
programming language.
b) Teaching and training of different problems in prior of data structures course.
c) Guiding and training students to write efficient coding,
d) Guiding & training students to fragment problems into different functions or
units.
B. Course Content:
Introduction: The von Neumann architecture, machine language, assembly language,
high level programming languages, compiler, interpreter, loader, linker, text editors,
operating systems, flowchart.
C Fundamentals: Introduction to C, Data types, Constants and variable declaration, Scope,
Storage classes, Data input and output functions, Sample programs.
Operators & Expressions: Arithmetic, Relational, Logical, Bitwise operators,
Conditional, Assignment, Library functions.
Decision making: Simple if statement, if-else statement, nested if else statement, Switch
statement, nested switch, the operator, goto statement.
Decision making & branching: while statement, do-while statement, for statement.
Array: Declaration, Initialization and processing One-dimension array, Two-dimension array and
multi dimension array and their operations.
String & pointer: String: Operation on String without using library function and using
library function. Pointer: Declaration of pointer variables, accessing the variable by using
pointer, pointer increment and decrement operator, pointer and array
Functions: Basic functions, function type, function with no argument & no return value,
function with no argument but return value, function with argument & return value,
Storage class identifier, Call by reference, Recursive function. Pointer to function.
Structure & Union: Defining a structure, accessing of structure variable, structure and
array, array within structure. Nested structure, structure & functions, Pointer & structure,
Unions, Enum.
File management system: Advantage of using file, Open, close, read, write in the files,
Operation on files.
Dynamic memory Allocation: use of malloc, calloc, realloc, free. Library functions,
Implementation of Linked list and their various operations.
The pre-processor: macro statements.
C. Text Books:
1. Kerninghan and Ritchie, The 'C' programming language, 2nd Edition, Pearson, 2008.
2. Yashavant P. Kanetkar, Let Us C, 8th, Infinity Science Press, 2008.
3. Balaguruswamy, Programming In ANSI C, 7thEdition, Tata McGraw-Hill Education,
2017
D. Reference Books:
1. Yashavant P. Kanetkar, ―Let Us C, 16th Edition, BPB Publication, 2017.
2. Zed A. Shaw, Learn C the Hard Way: Pratical Exercises on Computational Subjects
You Keep Avoiding (Like C), 2015.
3. Deepali Srivastava and S.K Srivastava, C in Depth, BPB Publication, 2017.
4. Griffiths David and Dawn Griffiths, Head First C, A Brain Friendly Guide, 2012.
5. Grey Perry and Dean Miller, C Programming Absolute Beginner‟s Guide, 3 rd
Edition, 2013.
Name of the Module: Introduction to Computer Programming Laboratory
Module Code: CS - 113
Credit Value: 2 {L = 0, T = 0, P = 4}
A. Course Objectives:
The course is designed to:
b) The student will gain a thorough understanding of the fundamentals of C programming.
c) A student can code, compile and test C programs.
d) Could take Systems programming or Advanced C programming course.
e) Although this course does not deal with object-oriented programming methodology, it will assist
the student build the required foundations to undertake a course in OOP..
B. Course Content:
Module l: To write a C program in each case, to find the sum of individual digits of a positive
integer, generate the first n terms of the Fibanocci sequence and generate all the prime numbers
between 1 and n, where n is a value supplied by the user; to calculate the Sum =1-x 2 /2! +x4 /4!-x
6 /6!+x8 /8!-x 10/10!
Module 2: To write C programs that use both recursive and non-recursive functions, To find the
factorial of a given integer and To find the GCD (greatest common divisor) of two given integers;
Also, to write a C program, which takes two integer operands and one operator from the user,
performs the operation and then prints the result. (Consider the operators +,-,*, /, % and use Switch
Statement) and to write a C program that uses functions to perform the Addition of Two Matrices
and Multiplication of Two Matrices;
Module 3: To write a C program that uses functions to perform the operations: To insert a sub-
string in to a given main string from a given position; To delete n Characters from a given position
in a given string; To write a C program to determine if the given string is a palindrome or not; Also
to write a C program that displays the position or index in the string S where the string T begins, or
– 1 if S doesn‟t contain T; To write a C program to count the lines, words and characters in a given
text.
Module 4: To write a C program to generate Pascal‟s triangle and also to construct a pyramid of
numbers; Also to write a C program that uses functions to perform the following operations on
singly linked list: Creation, Insertion, Deletion, Traversal;
Module 5: To write C programs that implements stack (its operations) using Arrays, Pointers and
that implements Queue (its operations) using Arrays, Pointers;
Module 6: To write a C program that implements the following sorting methods to sort a given list
of integers in ascending order using - Bubble sort, Selection sort; Also, to write C programs that use
both recursive and non-recursive functions to perform the following searching operations for a Key
value in a given list of integers- Linear search, Binary search;
Module 7: To write a C program that implements the following sorting method to sort a given list
of integers in ascending order- Quick sort; Also to write a C program that implements the following
sorting method to sort a given list of integers in ascending order Merge sort;
C. Text Books:
4. Kerninghan and Ritchie, The 'C' programming language, 2nd Edition, Pearson, 2008.
5. Yashavant P. Kanetkar, Let Us C, 8th, Infinity Science Press, 2008.
6. Balaguruswamy,Programming In ANSI C, 7thEdition, Tata McGraw-Hill Education,
2017
D. Reference Books:
6. Yashavant P. Kanetkar, ―Let Us C, 16th Edition, BPB Publication, 2017.
7. Zed A. Shaw, Learn C the Hard Way: Pratical Exercises on Computational Subjects
You Keep Avoiding(Like C), 2015.
8. Deepali Srivastava and S.K Srivastava, C in Depth, BPB Publication, 2017.
9. Griffiths David and Dawn Griffiths, Head First C, A Brain Friendly Guide, 2012.
10. Grey Perry and Dean Miller, C Programming Absolute Beginner‟s Guide, 3 rd
Edition, 2013.
Third Semester
3rd Semester
Sl. No Course Code Course Title L T P C
1. EC-203 Digital Logic Design 3 0 0 3
2. CS-201 Data Structure & Algorithm 3 0 0 3
3. MA-201 Probability and Statistics 3 1 0 4
4. MA- 202 Discrete Mathematics 3 1 0 4
5. MH-201 Introduction to Human values and Ethics 3 0 0 3
6. CS-202 Object Oriented Programming 3 0 0 3
7. CS-203 Data Structure & Algorithm Laboratory 0 0 2 1
8. EC-206 Digital Logic Design Laboratory 0 0 2 1
9. CS -204 Object Oriented Programming Laboratory 0 0 2 1
Total Credit 15 2 6 23
A. Course Objectives:
The course is designed to meet the objectives of:-
a) Designing principles of datastructures and learn the concept of analysis of algorithms.
b) Understand the basic concepts about linear and non-linear data structure and their
various operation.
c) Learning essential algorithms for computing.
d) Understanding generic data structures for common engineering problems problem.
B. Course Content:
C. Text Books:
1. S. Sahni, Data Structures, Algorithms, and Applications in C++, Silicon Press, 2/e, 2005.
2. T. H. Cormen, C. E. Leiserson, R. L. Rivest, and C. Stein, Introduction to Algorithms, MIT
Press, 3/e, 2009.
3. M. Tenenbaum, Y. Langsam, and M. J. Augenstein, Data Structures Using C and C++, Prentice
Hall, 2/e, 1995.
4. Horowitz, Sahni and Anderson-Freed, Fundamentals of Data Structures in C, Silicon Press, 2007.
5. Seymour Lipschutz, Data Structure, The McGrraw Hill, 2013
D. Reference Books:
1. AdamDrozdek,―DataStructuresandAlgorithmsinC++,CengageLearning,2012,4thed..
2. Heileman,―DataStructures,Algorithms&ObjectOrientedProgramming,TataMcgraw
-Hill Publishing CompanyLimited.
3. MariappaRadhakrishnan, ―Data Structures Using C, BPB Publications,2001.
4. MarkAllenWeiss,―Algorithms,DataStructures,andProblemSolvingwithC++,Addi
son- Wesley Publishing Company,1996.
5. HorowitzEllis&SartajSahni,―FundamentalsofDataStructures,GalgotriaPublications
6. AaronM. Tanenbaum,―Data Structures using C, Pearson Education.
7. Ajay Agarwal, ―Data structure Through C, Cyber Tech Publications,2005.
Name of the Module: Object Oriented Programming
Module Code: CS –202
Credit Value: 3{L = 3, T = 0, P =0}
A. Course Objectives:
The course is designed to meet the objectives of:
a) Learning to program in an object-oriented programming language, focusing
those who alreadyhave some experience with another programming language,
and who now wish to move on to an object-orientedone,
b) Learning object-oriented programming language namely,Java.
B. Course Content:
Introduction: Basic features & concepts of Object-Oriented Programming, (OOP),
Benefits, Languages and Applications of OOPs.
Java Basics: History of Java, Java buzzwords, datatypes, variables, scope and lifetime of
variables, arrays, operators, expressions, control statements, type conversion and costing,
simple java program, classes and objects – concepts of classes, objects, constructors,
methods, access control, this keyword, garbage collection, overloading methods and
constructors, parameter passing, recursion, string handling
Inheritance: Definition, single, multilevel, multiple, hierarchical and hybrid
inheritances, virtual base classes, abstract classes
PackagesandInterfaces:Defining,CreatingandAccessingaPackage,Understanding
CLASSPATH, importing packages, differences between classes and interfaces,
defining an interface, implementing an interface, applying interfaces, variables in an
interface and extending interfaces. Exploring packages – Java.io,java.util.
Exception handling and multithreading: Concepts of exception handling, benefits
of exception handling, Termination or resumptive models, exception hierarchy, usage
of try, catch, throw, throws and finally, built in exceptions, creating own exception
subclasses. Differences between multithreading and multitasking, thread life cycle,
creating threads, synchronizing threads, daemon threads, threadgroups.
Templates: Class templates, function templates, overloading of function templates,
member function templates
Strings: Creating and manipulating string objects, accessing characters in strings.
Applets: Concepts of Applets, differences between applets and applications, the life
cycle of an applet, types of applets, creating applets, passing parameters to applets.
Event Handling: Events, Event sources, Event classes, Event Listeners, Delegation
event model, handling mouse and keyboard events, Adapter classes, inner classes. The
AWT class hierarchy, user interface components- labels, button, canvas, scrollbars,
text components, checkbox, checkbox groups, choices, lists panels – scrollpane,
dialogues, menubar, graphics, layout manager – layout manager types – border, grid,
flow, card and grib bag.
C. Text Books:
1. Java 2: the complete reference, Herbert Schildt, Tata McGraw Hill, 5 thEdition
2. Programming with JAVA: a primer, E. Balagurusamy, Tata McGraw Hill, 4 th
Edition
D. Reference Books:
A. Course Objectives:
1. To demonstrate practical knowledge on Stacks, Queues, Linked lists, Trees Sorting and
Hashing Techniques.
2. To analyse suitable data structure to solve real world computing problems.
3. To design solutions for complex computational problems using linear and non-linear data
structures.
4. To solve for Complex computational problems by conducting explorative analysis.
5. To use C/C++/Python/Java language for implementing linear and non-linear data structures.
6. To apply contextual knowledge of data structures to design applications for societal
requirements.
B. Course Content:
List of Practical:
1. Write the program to understand the numbers of steps for execution of various
algorithms.
2. Write the program in Array to demonstrate various operation (eg. Searching: Linear
& Binary, Inserting, deleting, two dimensional and multidimensional arrayt, etc).
3. Write the program to implement the various operation in Linked list.
4. Write the program to implement the various operation in Stack and Queue
using static and dynamic memory allocation.
5. Write the program to perform the operation(Insert, delete, Traverse, Search. Etc.) in
non-linear data structure i.e. Tree.
6. Write the program to perform the various operationsin Graph i.e. BES, DFS,
Min. Cost Spanning Tree, All Pairs shortest path etc.
7. Write the program to implement the various sorting techniques (like: Bubble, Quick,
Insert, Selection,, etc...)
C. Text Books:
1. S. Sahni, Data Structures, Algorithms, and Applications in C++, Silicon Press, 2/e,
2005.
2. M. Tenenbaum, Y. Langsam, and M. J. Augenstein, Data Structures Using C and
C++, Prentice Hall, 2/e, 1995.
3. R. Lafore, Data Structures & Algorithms in Java, 2e, Pearson, 2007
4. GM. T. Goodrich, R. Tamassia, M. H. Goldwasser, Data Structures & Algorithms in
Java, 6ed, Wiley, 2014
5. M. T. Goodrich, R. Tamassia, M. H. Goldwasser, Data Structures and Algorithms in
Python, Wiley, 2016
6. M. T. Goodrich, R. Tamassia, M. H. Goldwasser, Data Structures and Algorithms in
C++, 2ed, Wiley, 2016
D. Reference Books:
1. J Gosling, B Joy, G L Steele and G Bracha, The Java Language Specification, 2/e, Addison-
Wesley,2000.
2. B Stroustrup, The C++ Programming Language, 3/e, Addison-Wesley Longman
ReadingMA,1997.
3. S B Lippman, C++ Primer, 2/e, Addison-Wesley,1991.
4. T Budd, C++ for Java Programmers, Addison Wesley,1999.
5. M C Daconta, Java for C/C++ programmers, John Wiley & Sons,1996.
Name of the Module: Object-Oriented Programming Laboratory
Module Code: CS –204
Credit Value: 1{L = 0, T = 0, P =2}
A. Course Objectives:
a) Identify the importance of object-oriented programming and the variation between
structured-oriented programming and object-oriented functions.
b) To use objects and classes for program creation.
c) To enhance the capabalities by using numerous object-
oriented methods to solve various problems.
d) Design, develop, test, and debug programs using object-oriented principles in
conjuncture with an integrated development environment using Java / C++.
List of practical:
Reference Books:
(i) Java 2: the complete reference, Herbert Schildt, Tata McGraw Hill, 5th Edition
(ii) Programming with JAVA : a primer, E. Balagurusamy, Tata McGraw Hill4th
Edition
(iii) Object oriented programming through JAVA, V. VijayaBhaskar& P. VenkataSubba
Reddy, Scitech
(iv) Teach yourself C++ , Herbert Schildt, Tata McGraw Hill
(v) Object Oriented Programming with C++, E. Balagurusamy, Tata McGraw Hill, 6th
Edition
Forth Semester
4th Semester
Sl No Course Code Course Title L T P C
1 CS – 206 Computer Organization & Architecture 3 1 0 4
2 CS – 207 Design and Analysis of Algorithm 3 1 0 4
3 CS – 208 Formal Language and Automata Theory 3 0 0 3
4 CS – 209 System Software and administration 2 0 0 2
5 MH – 206 Entrepreneurship 3 0 0 3
6 CS – 210 Computer Organization & Architecture Laboratory 0 0 2 1
7 CS – 211 Design and Analysis of Algorithm Laboratory 0 0 2 1
8 CS – 212 System Software and administration laboratory 0 0 2 1
Total Credits 14 2 6 19
A. Course Objectives:
The course is designed to meet the objectives of
1. Helping the students to develop an understand the nature and characteristics of the
organisation and design of the modern computer systems,
2. Focusing on the organisation & operation of the CPU
B. Course Content:
Fundamentals of Computers: Digital computers, layers in computer system, types of
computers, history of computers
Data representation and computer arithmetic: Data types, complement, fixed point
representation, floating point representation, multiplication and division of sign and
unsigned integers.
Micro operation and design of arithmetic logic unit: Register transfer micro operation,
bus transfer, memory transfer, arithmetic micro operation, logic micro operation, logic unit,
shift unit, design of arithmetic and logic unit.
Instruction set: Instruction code, register, computer instruction, timing and control,
instruction cycle, instruction formats, CPU organization, instruction length, addressing
standard, addressing mode, instruction set, RISC, CISC.
Design of control unit: hardware control design, micro programmed control.
Memory organization: memory hierarchy, main memory, cache memory, virtual memory.
Input-output organization: peripheral device, I/O interface and I/O driver, synchronous and
asynchronous data transfer, modes of data transfer, priority interrupt, DMA, input- output
processor.
Parallel processing: performance measurement of computer, parallel computer structure,
general classification of computer architecture, pipelining, vector processing, multiprocessor
system, flow computers.
C. Text Books:
1. W. Stallings, Computer Organization and Architecture: Designing for Performance,
8th Ed., Pearson Education India.2010.
2. D. A. Patterson and J. L. Hennessy, Computer Organization and Design, 4th Ed.,
Morgan Kaufmann, 2008.
3. A. S. Tanenbaum, Structured Computer Organization, 5th Ed., Prentice Hall of India,2009.
D. Reference Books:
1. M.M.Mano, ―ComputerSystemArchitecture‖, Pearson Education.
2. C. Hamacher, Z. Vranesic, ―Computer Organisation‖, Tata McgrawHill, 2011.
3. M. Jain, S.Jain, V. Pillai, ―ComputerOrganizationandSystemSoftware‖, BPBPublications,
2003.
4. P.PalChaudhuri,―ComputerOrganisation&Design‖,PHILearningPrivateLtd.,2009.
5. J. P.Hayes, ―Computer Architecture & Organisation‖, McGraw Hill,1998
6. T.K.Ghosh&A.J.Pal,―ComputerOrganization&Architecture‖,TataMcGraw-Hill,
7. M. Rafiquzzaman,‖Computer Architecture‖, Prentice HallofIndia.
Name of the Module: Design & Analysis of Algorithm
Module Code: CS – 207
Credit Value: 4{L = 3, T = 1, P =0}
A. Course Objectives:
The course is designed to meet the objectives of:
1. Ability to analyze the performance of algorithms.
2. Ability to choose appropriate algorithm design techniques for solving problems.
3. Ability to understand how the choice of data structures and the algorithm design
methods impact the performance of programs.
4. To clear up troubles the usage of set of rules design methods including the grasping
approach, divide and overcome, dynamic programming, backtracking and department
and certain.
5. To understand the variations among tractable and intractable problems.
6. To introduce p and np classes.
B. Course Content:
Greedy Method: Basic method, use, Examples: Knapsack problem, Job sequencing with
deadlines, minimum spanning tree (Prim's and Kruskal's algorithms), etc.
Lower Bound Theory: Bounds on sorting and sorting techniques using partial and total
orders.
Disjoint Set Manipulation: Set manipulation algorithm like UNION-FIND, union by
rank, Path compression.
Matrix manipulation algorithms: Different types of algorithms and solution of
simultaneous equations, DFT & FFT algorithm; integer multiplication schemes
Notion of NP-completeness: Non deterministic algorithm, COOK„s theorem, P class,
NP-hard class, NP-complete class, CNF Satisfiability problem, proof a problem to be NP
hard, Clique Decision Problem.
Approximation algorithms: Necessity of approximation scheme, performance
guarantee, Polynomial time approximation schemes: 0/1 knapsack problem
String Matching Algorithm
C. Text Books:
D. Reference Books:
A. Course Objectives:
The course is designed to meet with the objectives of:
1. providing a deeper understanding of programming languages design motivations and
semantics, facilitating students to select and use the most appropriate language for a
given task and write correct programs,
2. Illustrating language processing techniques: compilation and interpretation.
B. Course Content:
C. Text Books:
1. ShyamalenduKandar, Introduction to Automata Theory, Formal Languages and
Computation, Pearson Education India, 2013
2. J. E. Hopcroft and J. D. Ullman, Introduction to Automata Theory, Languages &
Computation, 2nd Edition, Pearson education.
3. K.L. P Mishra & N. Chandrasekharan, Theory of Computer Science: Automata,
Languages and Computation,3rd Edition, Prentice Hall India.
4. DasaradhRamaiah K., Introduction to Automata and Compiler Design, Prentice
Hall India Learning Private Limited
D. Reference Books:
1. Richard Y. Kain, "Theory ofAutomata& Formal Language", McGrawHill.
2. ZviKohavi, "Switching and Finite Automata Theory", 2nd edition, TataMcGraw-
Hill.
3. Peter Linz, "An Introduction to Formal Languages and Automata", Jones &
Bartlett Publishers.
4. Howard Straubing, "Finite Automata, Formal Logic, and Circuit Complexity",
Springer.
5. John Carroll and Darrell Long, "Theory of Finite Automata:With an Introduction
to Formal Languages", Prentice Hall,1989.
Name of the Module: System Software & Administration
Module Code: CS – 209
Credit Value: 2{L = 2, T = 0, P =0}
A. Course Objectives:
B. Students completing this course will be able to
1. Know/understand the working principle of compilers, interpreters, linkers, loaders
and hence, be able to create new ones.
2. Understand and create system softwares like firmware, bootloader, kernel, drivers,
kernel modules, filesystems and system libraries.
3. Know the instruction set of 8085/8086/80386 microprocessor and be able to make
programs for them with assembly language programming.
4. Operate on the command-line interface with shell scripting.
5. Administrate a Unix/Linux-based system.
6. Administrate a Windows/NT system
7. Develop software in a collaborative manner and manage it with distributed CVS.
8. Write documentation for developed software.
C. Course Content
Basic overview of a computer system: firmware, bootloader, kernel, userspace,
Functions of firmware. Types of firmware. Difference between kernel space and user
space. Difference between monolithic kernel and microkernel. Functions of kernel
modules. Functions of a driver.
Loader schemes: Compile and go loaders, absolute loaders, relocating loader, linking,
Reallocation: static & dynamic linking. Direct linking loaders, Binders, overlays, dynamic
binders; working principle of debuggers.
Windows Administration: Managing the server operating system, file and directory
services, software distribution and updates, profiling and monitoring assigned servers,
security and troubleshooting;
D. Text Books:
1. Andrew S. Tanenbaum, Todd Austin, ―Structured Computer Organization,
th
Pearson, 2013, 6 Edition, ISBN: 0132916525,9780132916523
2. Robert L. Britton, ―MIPS Assembly Language Programming, Pearson/Prentice
Hall, 2004, ISBN: 0131420445,9780131420441
3. L.L. Beck, ―System Software, (3rd Ed.), Pearson Education India, 1997, ISBN:
817758555X,9788177585551
4. L. Lamport, ―LaTeX: A Document Preparation System, 2nd Ed., Addison-
Wesley Series, 1994.
E. Reference Books:
List of practical:
Write a verliog code to implement S-R flipflop and also implement the testbench to verify
1 the outputs.
Write a verliog code to implement D- latch and also implement the testbench to verify the
2 outputs.
Write a verliog code to implement D- latch with reset asynchronous and also implement
3 the testbench to verify the outputs.
Write a verliog code to implement D- latch with reset synchronous and also implement
4 the testbench to verify the outputs.
Write a verliog code to T- flipflop with asynchronous reset and also implement the
5 testbench to verify the outputs.
Write a verliog code to T- flipflop with synchronous reset and also implement the testbench
6 to verify the outputs.
Write a verliog code to implement JK flipflop and also implement the testbench to verify
7 the outputs.
Write a verliog code to implement Counter also implement the testbench to verify the
8 outputs.
Write a verliog code to implement 8 bit Ripple carry adder and also implement the
9 testbench to verify the outputs.
Write a verliog code to design an ALU and also implement the testbench to verify the
10 outputs.
Books:
1. Verilog HDL: A Guide to Digital Design and Synthesis, Samir Palnitkar, 2nd edition,
Pearson.
2. A Verilog HDL Primer, Jayaram Bhaskar, 3rd edition, Star Galaxy Publishing.
3. The Verilog Hardware Description Language, Donald E. Thomas, Philip R. Moorby, 5th
edition, Springer.
Name of the Module: Design & Analysis of Algorithm Laboratory
Module Code: CSE - 211
Credit Value: 1 {L=0, T=0, P=2}
A. Course Objectives:
1. Ability to write programs in C/C++/Python/Java to solve the various realistic and engineering
problems using Divide and Conquer paradigm.
2. Ability to write programs in C/C++/Python/Java to solve the various realistic and engineering
problems using Greedy paradigm.
3. Ability to write programs in C/C++/Python/Java to solve the variousrealistic and engineering
problems using Dynamic programming.
4. Ability to write programs in C/C++/Python/Java to solve the variousrealistic and engineering
problems using backtracking Strategies.
5. Able to Write a Dynamic Programming algorithm for the 0/1 Knapsack problem and also
Dynamic Programming algorithm for the Optimal Binary Search Tree Problem.
B. Course Content:
1. Write the programs for solving Binary Search; Merge Sort; Quick Sort; Find Maximum and
Minimum element from an array of integer, etc…in Divide and Conquer Strategy.
2. Write the programs for solving the minimum number of scalar multiplication needed for chain
of matrix; all pair of Shortest path for a graph (Floyed Warshall Algorithm);Single Source
shortest Path for a graph (Dijkstra, Bellman Ford); Traveling Salesman Problem, etc… in
Dynamic Programming.
3. Write the programs for solving the 15 Puzzle Problems, etc… in branch and bound.
4. Write the programs forsolving8 Queen Problem; Graph Coloring Problem; Hamiltonian
Problem in Backtracking.
5. Write the programs for solving Knapsack Problem; Job sequencing with deadlines; Minimum
Cost Spanning Tree by Prim's Algorithm; Minimum Cost Spanning Tree by Kruskal's
Algorithm; etc…in Greedy Paradigm.
6. Write the programs for solving Breadth First Search (BFS); Depth First Search (DFS); etc. in
Graph Traversal Algorithm.
C. Text Books:
D. Reference Books:
1. J Gosling, B Joy, G L Steele and G Bracha, The Java Language Specification, 2/e,
Addison-Wesley,2000.
2. B Stroustrup, The C++ Programming Language, 3/e, Addison-Wesley Longman
ReadingMA,1997.
3. S B Lippman, C++ Primer, 2/e, Addison-Wesley,1991.
4. T Budd, C++ for Java Programmers, Addison Wesley,1999.
5. M C Daconta, Java for C/C++ programmers, John Wiley & Sons,1996.
List of practical:
5th Semester
Sl. No Course Code Course Title L T P C
1 CS – 301 Operating System 3 1 0 4
2 CS – 302 Compiler Design 3 0 0 3
3 EC – 302 Microprocessor & Interfacing 3 0 0 3
4 MA- 301 Optimization Methods 3 1 0 4
5 CS – 303 Signal and Data Communication 3 0 0 3
6 CS – 304 Operating System Laboratory 0 0 2 1
7 CS – 305 Compiler Design Laboratory 0 0 2 1
8 EC – 306 Microprocessor & Interfacing Laboratory 0 0 2 1
9 CS – 390 Summer Internship - I 0 0 0 1
Total Credit 15 3 6 21
A. Course Objectives:
The course is designed to meet the objectives of:
1. Appreciating the role of an operating system,
2. Making aware of the issues in management of resources like processor, memory and
input- output.
3. Selecting appropriate productivity enhancing tools or utilities for specific needs like
filters or version control.
4. Obtaining some insight into the design of an operating system.
B. Course Content:
Introduction: Introduction to Operating System: Operating system functions, evaluation
of Operating System, Different types of Operating System: batch, multi-programmed,
time-sharing, real-time, distributed, parallel.
System Structure: Computer system operation, I/O structure, storage structure, storage
hierarchy, different types of protections, operating system structure (simple, layered,
virtual machine), Operating System services, system calls.
Process Management: Processes: Concept of processes, process scheduling, operations
on processes, co-operating processes, inter- process communication. Threads: overview,
benefits of threads, user and kernel threads.
CPU Scheduling: Scheduling criteria: pre-emptive & non-pre-emptive scheduling,
scheduling algorithms (FCFS, SJF, RR, priority), algorithm evaluation, multi-processor
scheduling.
Process Synchronization: background, critical section problem, critical region,
synchronization hardware, classical problems of synchronization, semaphores.
Deadlocks: system model, deadlock characterization, methods for handling deadlocks,
deadlock prevention, deadlock avoidance, deadlock detection, recovery from deadlock.
Storage Management: Memory Management: background, logical vs. physical addresses
space, TLB, swapping, contiguous memory allocation, paging, segmentation,
segmentation with paging. Virtual Memory: background, demand paging, performance,
page replacement, page replacement algorithms (FCFS, LRU), allocation of frames,
thrashing.
File Systems: file concept, access methods, directory structure, file system structure,
allocation methods (contiguous, linked, indexed), free-space management (bit vector,
linked list, grouping), directory implementation (linear list, hash table), efficiency &
performance.
I/O Management: I/O hardware, polling, interrupts, DMA, application I/O interface
(block and character devices, network devices, clocks and timers, blocking and non
blocking I/O), kernel I/O subsystem (scheduling, buffering, caching, spooling and device
reservation, error handling), performance.
Disk Management: diskstructure, disk scheduling (FCFS, SSTF, SCAN, C-SCAN), disk
reliability, disk formatting, boot block, bad blocks.
Protection & Security: Goals of protection, domain of protection, security problem,
authentication, one time password, program threats, system threats, threat monitoring,
encryption.
Case Studies; Dos & Unix.
C. Text Books:
1. Abraham Silberschatz, Peter B.Galvin, Greg Gagne, Operating System Concepts,
Wiley, 2014, 9th ed., illustrated, revised.
2. Andrew S Tanenbaum, Albert S Woodhull, Operating System
Design & Implementation, Pearson Education, 2011, 3rd ed.
3. M. Dhamdhere, Operating Systems: A Concept-based Approach, Tata McGraw-
Hill Education, 2006, 2nded.
D. Reference Books:
A. Course Objectives:
The course is designed to meet with the objectives of
a. Providing a thorough introduction to the theory and practice of
programming language translation.
b. Introducing to the design and implementation of programming language translators.
B. Course Content:
Compilers, Analysis of the source program:The phases of the compiler.
The role of the lexical analyzer: Tokens, Patterns, Lexemes, Input buffering,
Specifications of token, Recognition of a tokens, Finite automata, Regular expression to
Finite Automata, Design of a lexical analyzer generator (LEX).
The role of a parser: Context free grammars, Writing a grammar, Top down Parsing,
Non- recursive Predictive parsing (LL), Bottom up parsing, Handles, Viable prefixes,
Operator precedence parsing, LR parsers (SLR, LALR), Parser generators (YACC).
Error recovery strategies for different parsing techniques.
Syntax director definitions: Construction of syntax trees, Bottom-up evaluation of S
attributed definitions, L attributed definitions, Bottom-up evaluation of inherited
attributes. Type systems, Specification of a simple type checker, Equivalence of type
expressions, Type conversions.
Sourcelanguageissues(Activationtrees,Controlstack,scopeofdeclaration,Bindingofnames
), Storage organization (Subdivision of run-time memory, Activation records), Storage
allocation
strategies,Parameterpassing(callbyvalue,callbyreference,copyrestore,callbyname),Symbo
l tables, dynamic storage allocationtechniques.
Intermediate languages: Graphical representation, Three-address code, Implementation
of three address statements (Quadruples, Triples, Indirect triples).
Code optimization: Introduction, Basic blocks & flow graphs, Transformation of basic
blocks, DAG representation of basic blocks, The principle sources of optimization,
Loops in flow graph, Peephole optimization.
Issues in the design of code generator:a simple code generator, Register
allocation & assignment.
C. Text Books:
1. Aho,Sethi,Ullman-―CompilerPrinciples,TechniquesandTools-
PearsonEducation,ISBN 8131759024,9788131759028.
2. Holub-―CompilerDesigninC,Prentice-
HallofIndiaPvt.Limited,2006,ISBN812030778X, 9788120307780.
D. Reference Books:
3. Keith Cooper, Linda Torczon, Cooper and Torczon. Engineering a
compiler,Elsevier, 2011, ISBN 0080916619,9780080916613.
4. V. Raghavan, Principles of Compiler Design, McGrawHill,2010.
Name of the Module: Signal and Data Communication
Module Code: CS - 303
Credit Value: 3 [L=3, T=0, P=0]
A. Course Objectives:
1. To have a detailed study of various analog and digital modulation and
demodulation techniques.
2. To have a thorough knowledge of various multiplexing schemes and Data
communication protocols.
3. To know about the standards of the communication.
B. Course Content:
C. Text Books:
1. V. Oppenheim, A. S. Willsky and A. H. Nawab: Signals and Systems;PHI
2. W. Stallings: Data and Computer Communications; PearsonEd
3. S. Haykin and B. V. Veen: Signals and Systems;Willey.
D. Reference Books:
1. Das: Digital Communication: Principles and System Modelling;Springer.
2. Tarun Kumar Rawat: Signals and system, Oxford
3. R. L. Freeman: Practical Data Communications; Willey.
4. M. S. Roden: Digital and Data Communication Systems; PrenticeHall.
5. Ahmad: Data Communication Principles: For Fixed and Wireless Networks;Kluwer.
Name of the Module: Operating System Laboratory
Module Code: CS - 304
Credit Value: 1 {L=0, T=0, P=2}
List of practical:
B. Course Content:
Basic: Introduction to Networking and its origin, layered task, Protocol stack, OSI model,
TCP/IP model and brief functionality.
Physical layer and media: Data, Signals, Transmission, Digital transmission- digital to
digital conversion, Analog to digital conversion, bandwidth utilization and spread
spectrum.
Circuit and Packet Switching:- Switched Networks, Circuit-Switching Networks,
Switching Concepts, Routing in Circuit-Switched Networks, Control Signalling, Packet-
Switching Principles, Routing, Congestion Control, X.25 282. , structure of a switch.
Data link layer: Error correction and Detection, Data link control- framing, flow and
error control, Noise less channels- Simple Protocols, Stop and wait protocol, Noisy
channel protocol- Stop and Wait ARQ, Go and Back N ARQ, Selective Repeat
AutomaticRepeatRequest,HDLC-ConfigurationandTransfermode,MultipleAccess-
Random Access, Control access, Channelization, Wired Network (IEEE 802.3), Wireless
Network (IEEE 802.11), Virtual LAN, Virtual Circuit Networks-Frame relay and ATM
LANetc.
Network Layer: Logical Addressing, Internet Protocol (IP), Address mapping, Error
reporting, and multicasting- ARP, RARP, BOOTP, DHCP, ICMP,IGMP , Network
Address Translators (NAT) Network Delivery-Delivery, Forwarding and Routing, Unicast
routing protocol- Intra & inter domain routing, RIP, OSPF, BGP
Transportlayer:ProcesstoProcessdelivery-Connectionorientedandconnectionless service,
UDP, TCP, SCTP, error and flow controls, Congestion control and Quality of service-
Open loop congestion control, Closed loop congestion control, Congestion control in TCP
and in frame relay Quality of service-flow characteristics, flow cases, different techniques
to improve QoS, RSVP.
Application layer: Name Space, Domain in Namespace, Distribution of name space,
DNS- generic, country and inverse domain, Resolution: Resolver, Mapping name to
Address, Mapping address to names, recursive resolution. Remote logging- telnet,
Electronic mail-SMTP, POP, IMAP and file transfer- FTP architecture, commands of
FTP.WWWandHTML-Architecture,webdocuments,HTTP,Webservices.Uniform
Resource Locators (URL) and Universal Resource Identifier (URI). Multimedia protocols-
RTP, RTCP.
C. Text Books:
1. William Stallings, ― Data and Computer Communications, Eighth Edition, Pearson
Prentice Hall, 2016, ISBN 0132433109.
2. Behrouz A. Fourouzan, ―Data Communications and Networking‖, Tata McGraw-Hill
Education, 2006, ISBN 0070634149, 9780070634145.
3. Andrew S. Tanenbaum, ―Computer Networks‖, 4/e, Pearson education, 2003, ISBN
8131701980, 9788131701980
D. Reference Books:
1. James F. Kurose and Keith W. Ross, ―Computer Networking – A Top-Down Approach
Featuring the Internet‖, 3/e, Pearson Education India, 2005, ISBN 8177588788,
9788177588781.
2. S. Keshav, ―An Engineering Approach To Computer Networking: ATM Networks, The
Internet, And The Telephone Network‖, Pearson education, 2002, ISBN 8131711455,
9788131711453.
3. Halsall, Data Communication, ―Computer Networks and Open Systems‖, Pearson, 2003,
ISBN 8178080982, 9788178080987.
4. W.R.Stevens, Kevin R. Fall, ―TCP/IP Illustated‖, Volume 1, 2/e, Addison-Wesley, ISBN
0132808188, 9780132808187.
5. Gary R. Wright, W. Richard Stevens , ―TCP/IP Illustrated‖, Volume 2, Addison-Wesley
Professional, 1995, ISBN 0321617649, 9780321617644.
6. Douglas Comer, ―Internetworking with TCP/IP: Principles, protocols, and architecture‖
illustrated, Prentice Hall, 2006, ISBN 0131876716, 9780131876712.
7. Sam Halabi,―Internet Routing Architectures‖, Pearson Education India, 2008, ISBN
8131725944, 9788131725948.
8. Larry L. Peterson and Bruce S. Davie, ―Computer Networks: A System Approach‖,5,
revised, Elsevier, 2011, ISBN 0123850606, 9780123850607.
Name of the Module: Software Engineering
Module Code: CS - 307
Credit Value: 3 {L=3, T=0, P=0}
A. Course Objectives:
The course is designed to meet with the objectives of understanding:
1. The need of software engineering, its different life cycles and different phases,
2. To measure cost, efforts, time and team management etc,
3. Testing and maintenance techniques of big projects and different risks and its
management systems.
B. Course Content:
C. Text Books:
1. Roger S Pressman, ―Software Engineering – A practitioner„s approach, McGraw-Hill
HigherEducation, 2005, ISBN: 007301933X, 9780073019338
2. Rajiv Mall, ―Software Engineering, Prentice Hall of India. ISBN: 8120338197,
9788120338197
3. Carlo Ghezzi, Mehdi Jazayeri, Dino Mandrioli, ―Fundamentals of Software
Engineering, Prentice Hall, 2003,2nd Edition, ISBN: 013099183X, 9780130991836
D. Reference Books:
A. Course Objectives:
The course is designed to meet with the objectives of:
1. Introducing graphical techniques such as modelling, representation,
illumination, shadowing, rendering and texturing.
2. To learn two dimensional and three dimensional computer graphics with
comprehend advanced software tools of computer graphics.
3. To gain knowledge about multimedia components and characteristics.
B. Course Content:
Introduction to Computer Graphics & Graphics Systems: Overview of computer
graphics, representing pictures; color models; storage tube graphics display, Raster
scan display, printers etc.; Active & Passive graphics devices; Computer graphics
software.
Scan conversion: Points & lines, Line drawing algorithms; DDA algorithm,
Bresenham„s line algorithm, Circle generation algorithm; Ellipse generating
algorithm; scan line polygon, fill algorithm, boundary fill algorithm, flood fill
algorithm.
2D Transformation & Viewing: Basic transformations: translation, rotation,
scaling; Matrix representations & homogeneous coordinates, transformations
between coordinate systems; reflection shear; Transformation of points, lines,
parallel lines, intersecting lines; clipping operations, point clipping, line clipping,
clipping circles, polygons & ellipse.
3DTransformation&Viewing: 3Dtransformations: translation, rotation, scaling &
other transformations. Rotation about an arbitrary axis in space, reflection through
an arbitrary plane; general parallel projection transformation; clipping, viewport
clipping, 3D viewing.
Curves: Curve representation, surfaces, designs, Bezier curves, B-spline curves.
Hidden Surfaces: Depth comparison, Z-buffer algorithm, Back face detection, BSP
tree method, the Printer„s algorithm, scan-line algorithm; Hidden line elimination.
Introduction to Multimedia: Concepts, uses of multimedia, text representation;
Image, video and audio standards, compression techniques.
C. Text Books:
B. Course Objectives:
The course is designed to meet with the objectives of
C. Course Content:
Introduction: Concept & Overview of DBMS, Data Models, Database
Languages, Database Administrator, Database Users, Three Schema architecture
of DBMS.
Entity-Relationship Model: Basic concepts, Design Issues, Mapping
Constraints, Keys, Entity-Relationship Diagram, Weak Entity Sets.
Relational Model: Structure of relational Databases, Relational Algebra,
Relational Calculus, Extended Relational Algebra Operations, Views,
Modifications of the Database.
File Organization & Index Structures: File & Record Concept, Placing file
records on Disk, Fixed and Variable sized Records, Types of Single-Level Index
(primary, secondary, clustering), Multilevel Indexes, Dynamic Multilevel
Indexes using B tree and B+ tree.
D. Text Books:
1. Henry F. Korth and Silberschatz Abraham, ―Database System Concepts,
Mc.GrawHil, 6th edition, ISBN: 0071289593,9780071289597.
2. ElmasriRamez and NovatheShamkant, ―Fundamentals of Database
Systems, Benjamin Cummings Publishing. Company, ISBN
8131716252,9788131716250.
3. Raghu Ramakrishnan, Johannes Gehrke, ―Database Management System,
McGraw-Hill, ISBN 0072465638,9780072465631.
E. Reference Books:
A. Course Objectives:
This introductory course gives an overview of many concepts, techniques, and
algorithms in machine learning related to classification and regression problems.
The course will give the student the basic ideas and intuition behind modern
machine learning methods as well as a bit more formal understanding of how, why,
and when they work.
The underlying theme in the course is statistical inference as it provides the
foundation for most of the methods covered.
Make use of Data sets in implementing the machine learning algorithms.
B. Course Content:
D. Reference Books:
1. Simon Haykin, Neural Networks and Learning Machines Third Edition, Pearson
Publisher
2. Christopher M. Bishop, Pattern Recognition and Machine Learning (Information
Science and Statistics), Springer, 2006
Name of the Module: Networking
Laboratory Module Code: CS – 311
Credit Value: 1 {L=0, T=0, P=2}
List of Practical:
Reference Books:
1. J Gosling, B Joy, G L Steele and G Bracha, The Java Language
Specification, 2/e, Addison-Wesley, 2000.
2. B Stroustrup, The C++ Programming Language, 3/e, Addison-Wesley
Longman ReadingMA,1997.
3. S B Lippman, C++ Primer, 2/e, Addison-Wesley,1991.
4. T Budd, C++ for Java Programmers, Addison Wesley,1999.
5. M C Daconta, Java for C/C++ programmers, John Wiley &
Sons,1996.
Name of the Module: Database Management System Laboratory
Module Code: CSE - 312
Credit Value: 1 {L=0, T=0, P=2}
List of Practicals:
6. Implementing Joins
Text Book:
Mastering Database Technologies, Ivan Bayross, BPB Publication
Name of the Module: Computer Graphics and Multimedia Laboratory
Module Code: CSE - 313
Credit Value: 1 {L=0, T=0, P=2}
Laboratory experiments will be based on the materials covered in the theory of this
paper, specially emphasize on the following topics.
Text Books:
1. Write a program to demonstrate the working of the decision tree based ID3
algorithm. Use an appropriate data set for building the decision tree and apply this
knowledge to classify a new sample.
2. Write a program to implement the naïve Bayesian classifier for a sample training
data set stored as a .CSV file. Compute the accuracy of the classifier, considering
few test data sets.
3. Write a program to construct a Bayesian network considering medical data. Use
this model to demonstrate the diagnosis of heart patients using standard Heart
Disease Data Set. You can use Java/Python ML library classes/API.
4. Build an Artificial Neural Network by implementing the Back propagation
algorithm and test the same using appropriate data sets.
5. Apply EM algorithm to cluster a set of data stored in a .CSV file. Use the same data
set for clustering using k-Means algorithm. Compare the results of these two
algorithms and comment on the quality of clustering. You can add Python ML
library in the program.
6. Write a program to implement k-Nearest Neighbour algorithm to classify the iris
data set. Print both correct and wrong predictions. Python ML library can be used
for this problem.
7. Implement the non-parametric Locally Weighted Regression algorithm in order to
fit data points. Select appropriate data set for your experiment and draw graphs.
Mini Projects:
7Th Semester
Sl. No Course Code Course Title L T P C
1 OE-XXX Open Elective 3 0 0 3
2 CS – 401 Internet and Web Technology 3 0 0 3
3 CS– 402 Cryptography & network Security 3 0 0 3
4 CS– 403X Elective-I 3 0 0 3
5 CS– 404 Pattern Recognition & Image Processing 3 0 0 3
6 CS – 405 Internet and Web Technology laboratory 0 0 2 1
7 CS – 406 Cryptography & Network Security 0 0 2 1
laboratory
8 CS – 407 Pattern Recognition & Image Processing 0 0 2 1
laboratory
9 CS– 492 Summer Internship-III 0 0 0 1
Total Credit 15 0 6 19
A. Course Objectives:
The course is designed to meet the objectives of:
a) To complete an in-depth knowledge of web technology,
b) Toknowandtohavetheideafordifferentwebapplicationthatmostwebdevelope
rsarelikelyto use.
c) To be aware of, and to have used, the enhancements of the web applications.
d) To know the different types of web application software.
B. Course Content:
Introduction to web technologies and architectures: Recent Web
technologies: A case study on WWW, web2.0 etc., Client/Server Computing:
C/S Computing, Middleware, Fat client VS Fat Servers, N-tiered Software
Architecture.
Commonly used protocols Protocols: HTTP, FTP, SMTP, POP etc.
Mark-language Markup Languages: SGML, DTD Resources, HTML, CSS,
XML, XSL, Query Languages for XML.
Basics of web-programming Programming: Client side scripting:
JAVASCRIPT, AJAX. Server side programming in PHP, Overview of Java,
JAVA Applet
Web Servers and Servlets: Tomcat web server, Introduction to Servelets:
Lifecycle of a Serverlet, JSDK, The Servlet API, The javax.servelet Package,
Reading Servelet parameters, and Reading Initialization parameters. The
javax.servelet HTTP package, Handling Http Request & Responses, Using
Cookies-Session Tracking, Security Issues,
Introduction to JSP: The Problem with Servelet. The Anatomy of a JSP Page,
JSP Processing. JSP Application Design with MVC Setting Up and JSP
Environment: Installing the Java Software Development Kit, Tomcat Server &
Testing Tomcat
JSP Application Development, Database Access: Database Programming
using JDBC, Studying Javax.sql.* package, Accessing a Database from a JSP
Page, Application - Specific Database Actions, Deploying JAVA Beans in a JSP
Page, Introduction to struts framework.
E-commerce applications E-business models, E-commerce and WWW, secure
electronic payment protocols, e-commerce payment systems, web-based
marketing, search engine and directory registration, e-commerce site designing
tools etc.
C. Text Books:
D. Reference Books:
A. Course Objectives:
The course is designed to meet with the objectives of:
1. Understanding the state-of-the-art of cryptography and their security goals.
2. Examining and studying of different cryptographic methods for
achieving confidentiality of date.
3. Examining and studying of different cryptographic methods for achieving
integrity of date.
4. Understanding message authentication and hash function
5. Understanding the various protocol in network security.
B. Course Content:
D. Reference Books:
1. MichaelErschloe,―InformationWarfare:HowtoSurviveCyberAttacks‖,
Osborne/McGraw-Hill,2001.
2. Brian Hatch, James Lee and George Kurtz, ―Hacking Exposed: Linux: Linux Security
Secrets and Solutions‖, Osborne McGraw-Hill,1983.
3. Kenneth R. Van Wyk, Richard Forno, ―Incident Response‖, O'Reilly,2001.
4. KevinMandia,ChrisProsise,―IncidentResponse:InvestigatingComputerCrime‖,
Osborne/McGraw-Hill,2001.
5. Mike Schiffman, ―Hacker's Challenge‖, McGraw Hill Professional,2002.
6. Julia Allen,―The CERT Guideto System and Network Security Practices‖ Addison-
Wesley, 2001.
7. RichardE.Smith―Authentication:FromPasswordstoPublicKeys‖,Addison-Wesley,2002.
8. StuartMcClure,SaumilShah,ShreerajShah,―WebHacking:AttacksandDefense‖, Addison-
Wesley Professional, 2003.
9. Mike Shema, Bradley C. Johnson, Keith J. Jones, ―Anti Hacker Tool Kit: Key Security
Tools and Configuration Techniques‖, San Val, Incorporated,2002.
Name of the Module: Pattern Recognition & Image Processing
Module Code: CS – 404
Credit Value: 3{L=3, T=0, P=0}
A. Course Objectives:
The course is designed to meet the objectives of:
1. To equip students with basic mathematical and statistical techniques commonly used
in pattern recognition and image processing.
2. To introduce students to a variety of pattern recognition algorithms.
3. Introduce the student to analytical tools which are currently used in digital image
processing as applied to image information for human viewing.
4. To apply knowledge of different image processing schemes for real time applications.
B. Course Content:
C. Text Books:
1. Digital Image Processing by R.C. Gonzalez & R.E. Woods, Addison Wesley.
2. Pattern Recognition Principles J.T.TOU.R.C. Gonzalez, Addison Wesley.
3. Fundamentals of Digital Image Processing by A.K. Jain, PHI Pearson Education
D. Reference Books:
1. DaishengLuo, ―Pattern Recognition and Image Processing, Horwood, 1998
2. Cornelius T. Leondes, ―Image Processing and Pattern Recognition, Elsevier
3. Frank Y. Shih, Image Processing and Pattern Recognition: Fundamentals and
Techniques, John Wiley & Sons
4. James C. Bezdek, James Keller, Raghu Krisnapuram, Nikhil R. Pal, Fuzzy
Models and Algorithms for Pattern Recognition and Image Processing, Springer
5. Ashish Ghosh, Sankar K. Pal, ―Soft Computing Approach to Pattern
Recognition and Image Processing, World Scientific Publishing Co. Pte. Ltd.
6. Jun Shen, Patrick Shen-pei Wang, Tianxu Zhang, ―Multispectral Image
Processing and PatternnRecognition, World Scientific Publishing Co. Pte. Ltd.
7. Tzay Y. Young, ―Handbook of pattern recognition and image processing‖,
Academic Press, 1994.
Name of the Module: Internet and Web Technology
Laboratory Module Code: CS - 405
Credit Value: 1 {L=0, T=0, P=2}
A. Course Objectives:
a) Implement interactive web page(s) using HTML, CSS and JavaScript.
b) Design a responsive web site using HTML5 and CSS3.
c) Demonstrate Rich Internet Application.
d) Build Dynamic web site using server side Servlet, JSP Programming and Database
connectivity.
e) Describe and differentiate different Web Extensions and Web Services.
B. List of practical’s:
1. ExperimentalstudyofapplicationprotocolssuchasHTTP,FTP,SMTP,usingnetwork
packet
sniffersandanalyzerssuchasEthereal.SmallexercisesinsocketprogramminginC/C+
+/Java.
2. Experiments with packet sniffers to study the TCP protocol. Using OS (netstat,
etc) tools to understandTCP protocol FSM, retransmission timer behaviour
congestion controlbehavior.
3. Introduction to ns2 (network simulator) - small simulation exercises to study
TCP behaviour under differentscenarios.
4. Setting up a small IP network - configure interfaces, IP addresses and routing
protocols to set up a small IP network. Study dynamic behaviour using
packetsniffers.
5. Experimentswithns2tostudybehaviour(especiallyperformanceof)linklayerprotoco
lssuch as Ethernet and 802.11 wirelessLAN.
6. Practical on Server Configuration Example, Web Server, Mail Server, FTP Serveretc.
7. Practice on Cisco Packet Tracersimulator.
8. Basic use of HTML tag, linking image table, frame, formdesign.
9. DHTML- inline styles, creating style sheets with the style element, linking
external style sheet, positioning elements, user stylesheet.
10. Creating eventhandlerthat respondsto mouse andkeyboardevent:
Onload, onmouseover, onmouse out, onfocus, onblur, onsubmit, onresult,
onclick,onchange.
11. Structuring data with xml, xml parser, extensible style language (xsl);
customising markuplanguage.
12. Configuring apache-tomcat server. 6. Building simple jsp: Declaring variables
and methods in jsp, inserting java expression in jsp, processing request from
user, generating a dynamic response for the user. Accessing database from jsp,
inserting applet intojsp
E. Text Books:
Laboratory is mainly based on the materials taught i.e. development of code for
Classical Cryptosystems, DES, AES, IDEA, RSA, MD5, SHA, DSA etc. and do
experimentation. Mini projects may be given in small groups.
List of practical:
List of practical:
Mini Projects
Lab 7: Take a hand written document, perform preprocessing and try to segment into
characters
A. Course Objectives:
The course is designed to meet the objectives of:
1. Introduce the fundamentals concepts of Data Compression,
2. Equip students with the knowledge and skills of coding Theory,
3. Explore the different paradigms of image and data compression.
B. Course Content:
Introduction: Compression Techniques: Loss less compression, Lossy
Compression, Measures of performance, Modeling and coding, Mathematical
Preliminaries for Lossless compression: A brief introduction to information
theory, Models: Physical models, Probability models, Markov models, composite
source model, Coding: uniquely decodable codes, Prefix codes.
C. Text Books:
1. Khalid Sayood, ―Introduction to Data Compression‖, Morgan Kaufmann
Publishers
2. Ida MengyiPu, ―Fundamental Data Compression‖, Butterworth-Heinemann, 2005
3. Adam Drozdek, ―Elements of Data Compression‖, Brooks/Cole-Thomson
Learning, 2002
D. Reference Books:
A. Course Objectives:
The course is designed to meet the objectives of:
1. Deliver successful software projects that support organization's strategicgoals,
2. Match organizational needs to the most effective software developmentmodel,
3. Plan and manage projects at each stage of the software development life cycle(SDLC),
4. Create project plans that address real-world managementchallenges,
5. Develop the skills for tracking and controlling softwaredeliverables.
B. Course Content:
Fundamentals: Conventional Software Management – Evolution of Software
Economics – Improving Software Economics – Conventional versus Modern Software
Project Management.
Managed And Optimized Process: Data Gathering and Analysis – Principles of Data
Gathering – Data Gathering Process – Software Measures – Data Analysis – Managing
Software Quality – Defect Prevention. Case Studies: COCOMO Cost Estimation Model –
Change Metrics – CCPDS– R.
C. Text Books:
D. Reference Books:
1. Robert T. Futrell, Donald F. Shafer, Linda Shafer , ―Quality Software Project Management,
Prentice Hall Professional, 2002
2. Robert Bruce Kelsey, ―Software Project Management: Measures for Improving
Performance,Management Concepts, 2006
3. S. A. KELKAR, ―SOFTWARE PROJECT MANAGEMENT: A CONCISE STUDY‖, PHI
Learning Pvt. Ltd., 2012
Name of the Module: Real Time Operating Systems
Module Code: CS – 403C
Credit Value: 3{L=3, T=0, P=0}
A. Course Objectives:
The course is designed to meet the objectives of:
1. Participant with basics of real-time operating systems
2. Give the participant knowledge and skills necessary to develop software for
embedded computer systems using a real-time operating system.
B. Course Content:
Introduction to Operating System: Computer Hardware Organization, BIOS and Boot
Process, Multi-threading concepts, Processes, Threads, Scheduling.
Basics of real-time concepts: Terminology: RTOS concepts and definitions,
real-time design issues, examples, Hardware Considerations: logic states, CPU,
memory, I/O, Architectures, RTOS building blocks, Real-Time Kernel
C. Text Books:
D. Reference Books:
A. Course Objectives:
The course is designed to meet the objectives of:
1.To acquaint students with the basic concepts of parallel and distributed computing.
2.The course aims to the general principles of parallel and distributed
algorithms and their time complexity.
3.To Study different aspects of Parallel Models
4.To Study different aspects of Interconnection Architecture
5.Analyse fundamental parallel algorithms from various application domains.
B. Course Content:
Sequential model, need of alternative model, parallel computational models such as
PRAM, LMCC, Hypercube, Cube Connected Cycle, Butterfly, Perfect Shuffle
Computers, Tree model, Pyramid model, Fully Connected model, PRAM-CREW,
EREW models, simulation of one model from another one.
Parallel Searching Algorithm, Kth element, Kth element in X+Y on PRAM, Parallel
Matrix Transportation and Multiplication Algorithm on PRAM, MCC, Vector-Matrix
Multiplication, Solution of Linear Equation, Root finding. Graph Algorithms -
Connected Graphs, search and traversal, Combinatorial Algorithms- Permutation,
Combinations, Derrangements
C. Text Books:
D. Reference Books:
A. Course Objectives:
The course is design to meet the objectives of:
The student will learn about the cloud environment, building software systems
and components that scale to millions of users in modern internet, cloud concepts
capabilities across the various cloud service models including Iaas, Paas, Saas, and
developing cloud based software applications on top of cloud platforms
B. Course Content:
Introduction Definitions, Characteristics of cloud computing, Advantages and disadvantages of
cloud computing, Cloud computing Vs Grid computing, Cloud computing Vs Distributed
computing, Cloud computing Vs Cluster Computing.
Virtualization Basic concept– Hypervisor- Types of virtualization- hardware, operating
system, server, storage- Features of virtualization- Advantages and disadvantages of different
types of virtualization.
Cloud Architecture Types of deployment models-Private, Public , Hybrid, Community, Types
of service models-Iaas, PaaS, SaaS.
Cloud storage architecture Evolution of storage technology, storage models, file systems and
database, distributed file systems, general parallel file systems. Google file system, Apache
Hadoop, BigTable, Megastore, Amazon Simple Storage Service(S3).
Cloud Security Cloud vulnerabilities-Threats to cloud confidentiality-VM cross attack,
Malicious Sys Admin- Defense mechanism-Co residency detection, No Hype-Threats to cloud
integrity- data loss/manipulation, dishonest computation- Defense Mechanism-Provable Data
Possession (PDP), Proof of Retrievability, Dynamic PDP.
C. Text Books:
1. Distributed and Cloud Computing, Kai Hwang, Geoffry C. Fox, Jack J. Dongarra MK
Elsevier.
2. Cloud Computing, Theory and Practice, Dan C Marinescu, MK Elsevier.
3. Cloud Computing, A Hands on approach, ArshadeepBahga, Vijay Madisetti, University Press
C. Reference Books:
1. Cloud Computing, A Practical Approach, Anthony T Velte, Toby J Velte, Robert Elsenpeter,
TMH
2. Mastering Cloud Computing, Foundations and Application Programming, Raj Kumar Buyya,
Christen vecctiola, S Tammaraiselvi, TMH
A. Course Objectives:
The student should be made to:
1. Learn the various soft computing frameworks
2. Be familiar with design of various neural networks
3. Be exposed to fuzzy logic
4. Learn genetic programming.
B. Course Content:
INTRODUCTION: Artificial neural network: Introduction, characteristics- learning methods –
taxonomy – Evolution of neural networks- basic models – important technologies – applications.
Fuzzy logic: Introduction – crisp sets- fuzzy sets – crisp relations and fuzzy relations: cartesian
product of relation – classical relation, fuzzy relations, tolerance and equivalence relations, non-
iterative fuzzy sets. Genetic algorithm- Introduction – biological background – traditional
optimization and search techniques – Genetic basic concepts.
1. S.N. Sivanandam and S.N.Deepa, “Principles of Soft Computing”, Wiley India Pvt
Ltd, 2011.
2. J.S.R.Jang, C.T. Sun and E.Mizutani, “Neuro-Fuzzy and Soft Computing”, PHI /
Pearson Education 2004.
3. S. Rajasekaran and G.A. Vijayalakshmi Pai, “Neural Networks, Fuzzy Logic and
Genetic Algorithm: Synthesis & Applications”, Prentice-Hall of India Pvt. Ltd., 2006.
D. Reference Books:
1. George J. Klir, Ute St. Clair, Bo Yuan, “Fuzzy Set Theory: Foundations and
Applications” Prentice Hall, 1997.
2. David E. Goldberg, “Genetic Algorithm in Search Optimization and Machine
Learning” Pearson Education India, 2013.
3. James A. Freeman, David M. Skapura, “Neural Networks Algorithms, Applications,
and Programming Techniques, Pearson Education India, 1991.
Name of the Module: Natural Language Processing
Module Code: CS – 403G
Credit Value: 3{L=3, T=0, P=0}
A. Course Objectives:
The course is designed to meet the objectives of:
1. To provide a general introduction including the use of state automata for
language processing,
2. To provide the fundamentals of syntax including a basic parse,
3. To explain advanced feature like feature structures and realistic parsing methodologies,
4. To explain basic concepts of remotes processing,
5. To give details about a typical natural language processing applications.
B. Course Content:
Introduction: Introduction: Knowledge in speech and language processing –
Ambiguity – Models and Algorithms – Language, Thought and Understanding.
Regular Expressions and automata: Regular expressions – Finite-State automata.
Morphology and Finite-State Transducers: Survey of English morphology – Finite-
State Morphological parsing – Combining FST lexicon and rules – Lexicon-Free
FSTs: The porter stammer – Human morphological processing
Syntax :Word classes and part-of-speech tagging: English word classes – Tagsets for
English – Part-of-speech tagging – Rule-based part-of-speech tagging – Stochastic part-of-
speech tagging – Transformation-based tagging – Other issues. Context-Free Grammars for
English: Constituency –Context-Free rules and trees – Sentence-level constructions – The
noun phrase – Coordination – Agreement – The verb phase and sub categorization –
Auxiliaries – Spoken language syntax – Grammars equivalence and normal form – Finite-
State and Context-Free grammars – Grammars and human processing. Parsing with
Context-Free Grammars: Parsing as search A Basic Top-Down parser – Problems with the
basic Top-Down parser – The early algorithm – Finite-State parsing methods.
C. Text Books:
1. Daniel Jurafsky& James H.Martin, ― Speech and Language Processing, Pearson
Education (Singapore) Pte. Ltd., 2002.
2. James Allen, ―Natural Language Understanding, Pearson Education, 2003.
3. HinrichSchütze, ―Foundations of Statistical Natural Language Processing, MIT press
4. Steven Bird, Ewan Klein, Edward Loper, ―Natural Language Processing with Python,
O„ Reilly
D. Reference Books:
A. Course Objectives:
The course is designed to meet the objectives of:
1. understand classical models and algorithms in data warehousing and data mining,
2. enable students to analyse the data, identify the problems, and choose the relevant
models and algorithms to apply,
3. Assess the strengths and weaknesses of various methods and algorithms and to
analyse their behaviour.
B. Course Content:
Business Analysis: Reporting and Query tools and Applications Tool Categories The
Need for Applications Cognos Impromptu Online Analytical Processing (OLAP) Need
Multidimensional Data Model OLAP Guidelines Multidimensional versus Multi
relational OLAP Categories of Tools OLAP Tools and the Internet.
Data Mining: Introduction Data Types of Data, Data Mining Functionalities
Interestingness of Patterns, Classification of Data Mining Systems, Data Mining Task
Primitives, Integration of a Data Mining System with a Data Warehouse, Issues Data
Preprocessing.
C. Text Books:
D. Reference Books:
1. The Data Warehouse Toolkit: The Definitive Guide to Dimensional Modeling, 3rd Edition, John
Wiley & Sons, 2013, by Ralph Kimball &Margy Ross. ISBN: 978-1-118-73228-1
2. The Data Webhouse Toolkit: Building the Web-Enabled Data Warehouse, John Wiley & Sons, 1st
Edition, by Ralph Kimball & Richard Merz. ISBN: 978-0-471-37680-4.
Name of the Module: Distributed Operating System
Module Code: CS – 403I
Credit Value: 3 {L=3, T=0, P=0}
A. Course Objectives:
The course is design to meet the objectives of:
B. Course Content:
Introduction: Function of an operating system, Design approaches, concepts of processes,
threats, Critical Section problem, Other synchronization problem, Communicating sequential
processes. Process Deadlocks: Introduction, Preliminaries, Models of Deadlocks, Models of
resources, A graph theoretic models of System State, Necessary and sufficient conditions for a
Deadlocks. Detection, Prevention and Avoidance.
Distributed Operating Systems: Introduction, System Architectures, issues in Distributed Operating
Systems, Communication Networks, and Limitations of Distributed OS.
AgreementProtocol:Systemmodel,Classificationofagreementproblems,ApplicationofAgreement
Protocol.
Distributed File Systems: Mechanisms for building Distributed File Systems, Design Issues,
Case Studies- Sun Network File System, The Sprite File Systems, Apollo Domain Distributed
File System, Coda, Log Structure File Systems, and Disk Space Management.
Distributed Shared Memory: Architecture and Motivation, Algorithm for Implementing of
DMS, Memory Coherence, Coherence Protocol, Case Studies- IVY, Mirage, Clouds.
Distributed Scheduling: Issues in load Distributing, Components of Load Distributing
Algorithm, Stability, Load Distributing Algorithm, Performance Comparison, Selecting a
Suitable Load Sharing Algorithm, Load Sharing Policies.
Failure Recovery: Classification of Failures, Backward and Forward Error recovery, Recovery
in concurrent systems, Check points.
Fault Tolerance: Atomic Action and Committing, Commit Protocols, Non-Blocking Commit
Protocols, Voting Protocols, Dynamic Voting Protocols, Case studies-Fault Tolerance under
UNIX. Multiprocessor System Architecture: Motivations, Basic Architecture, Caching,
Hypercube Architecture,
Multiprocessor Operating Systems: Structure, Multiprocessor Design issues, Threats,
Process, Synchronization, Processor Scheduling, Memory Management, Reliability/Fault
Tolerance
C. Text Books:
1. Singhal, “Advanced Concepts In Operating Systems”, Tata McGraw-Hill Education,
2001.
2. W. Richard Stevens, Stephen A. Rago, “Advanced Programming in the UNIX
Environment, Addison-Wesley Professional Computing Series”, Addison-Wesley,
2013.
3. Andrew S. Tanenbaum, “Distributed Operating Systems", Pearson Education India,
1995.
4. Wiseman, Yair, “Advanced Operating Systems and Kernel Applications: Techniques
and Technologies: Techniques and Technologies”, IGI Global, 2009
D. Reference Books: