4RT Sem
4RT Sem
PYTHON PROGRAMMING
Course Outcome ( CO) Bloom’s Knowledge Level (KL)
Python Program Flow Control Conditional blocks: if, else and else if, Simple for loops in
II python, For loop using ranges, string, list and dictionaries. Use of while loops in python,
05
Loop manipulation using pass, continue, break and else. Programming using Python
conditional and loop blocks.
Python Complex data types: Using string data type and string operations, Defining list
and list slicing, Use of Tuple data type. String, List and Dictionary, Manipulations Building
III blocks of python programs, string manipulation methods, List manipulation. Dictionary 04
manipulation, Programming using string, list and dictionary in-built functions. Python
Functions, Organizing python codes using functions.
Python File Operations: Reading files, Writing files in python, Understanding read
IV functions, read(), readline(), readlines(). Understanding write functions, write() and 04
writelines() Manipulating file pointer using seek Programming, using file operations.
Python packages: Simple programs using the built-in functions of packages matplotlib,
V numpy, pandas etc. GUI Programming: Tkinter introduction, Tkinter and 04
PythonProgramming, Tk Widgets, Tkinter examples. Python programming with IDE.
Text books:
1. Wesley J. Chun, “Core Python Applications Programming”, 3rd Edition , Pearson Education, 2016
2. Lambert, Fundamentals of Python: First Programs with MindTap, 2nd 1st edition , Cengage Learning publication
3. Charles Dierbach, “Introduction to Computer Science using Python”, Wiley, 2015
4. Jeeva Jose &P.SojanLal, “Introduction to Computing and Problem Solving with PYTHON”, Khanna Publishers, New Delhi,
2016
5. Downey, A. et al., “How to think like a Computer Scientist: Learning with Python”, John Wiley, 2015
6. Mark Lutz, “Learning Python”, 5th edition, Orelly Publication, 2013, ISBN 978- 1449355739
7. John Zelle, “Python Programming: An Introduction to Computer Science”, Second edition, Course Technology Cengage
Learning Publications, 2013, ISBN 978- 1590282410
8. Michel Dawson, “Python Programming for Absolute Beginers” , Third Edition, Course Technology Cengage Learning
Publications, 2013, ISBN 978-1435455009
9. David Beazley, Brian Jones., “Python Cookbook”, Third Edition, Orelly Publication, 2013, ISBN 978-1449340377
Mathematics –IV
(PDE, Probability and Statistics)
Computer/Electronics/Electrical & Allied Branches, CS/IT, EC/IC, EE/EN,
Mechanical& Allied Branches, (ME/AE/AU/MT/PE/MI/PL)
Textile/Chemical & Allied Branches, TT/TC/CT, CHE/FT
Subject Code BAS303/ BAS303H/ BAS403/BAS403H
Category Basic Science Course
Subject Name MATHEMATICS-IV(PDE, Probability and Statistics)
Theory Sessional
L-T-P Total Credit
Scheme and Credits Marks Test Assig/Att.
3—1—0 70 20 10 100 4
Pre- requisites (if any) Knowledge of Mathematics I and II of B. Tech or equivalent
Course Outcomes
The objective of this course is to familiarize the students with partial differential equation,
their application and statistical techniques. It aims to present the students with standard
concepts and tools at an intermediate to superior level that will provide them well towards
undertaking a variety of problems in the discipline.
The students will learn:
The idea of partial differential equation and its different types of solution.
The concept ofmethod of separation of variables and Fourier transform to solve
partial differential equations.
The basic ideas of statistics including measures of central tendency, correlation,
regression and their properties.
The idea of probability, random variables, discrete and continuous probability
distributions and their properties.
The statistical methods of studying data samples, hypothesis testing and statistical
quality control.
Text Book:
1. Dr. B.S. Grewal, “Higher Engineering Mathematics”, 44thEdition, Khanna Publishers,
New Dehli.
Reference Book:
1. Peter V. O’Neil, “Advance Engineering Mathematics”, SI Edition 8th Edition,
Cengage Learning, 2017.
2. B. V. Ramana, Higher Engineering Mathematics, McGraw-Hill Publishing Company
Ltd., 2017.
3. S. S. Sastry, “Introductory methods of Numerical solutions”, 4th Edition , Prentice
Hall of India.
4. Erwin Kreyszig , “Advanced Engineering Mathematics”, John Wiley Publications,
1999.
5. R.K.Jain&S.R.K.Iyengar, “Numerical Methods” , New Age International ( P )
Limited
6. James F. Epperson Mathematical Reviews “An Introduction To Numerical Methods
And Analysis” Second Edition, Wiley;
https://perhuaman.files.wordpress.com/2014/07/metodos-numericos.pdf
BAS301/BAS401 Technical Communication L: T: P: 3: 0:0
BAS301H/BAS401H
Course Objectives:
• Students will be able to UNDERSTAND the nature and objective of Technical Communication relevant for
the work place as Engineers.
• Students will b e ab le to DEVELOP an understanding of key concepts of writing, designing and
speaking.
• Students will be ab le to UTILIZE the technical writing skills for the purposes of Technical
Communication and its exposure in various dimensions.
• Students will be able BUILD UP interpersonal communication traits that will make the transition
from institution to workplace smoother and help them to excel in their jobs.
• Students will be able to APPLY technical communication to build their personal brand and handle
crisis communication.
Thesis and Project Report Writing, Technical Proposal Writing, How to Pitch an Idea: Process, Preparation and
Structure, Elements of Speech Delivery: Passion, Poise & Illustrations.
Unit 4 : Communication and Leadership Development
Leadership Communication, Communication and Social competence: context, feelings, intentions, behaviors,
Providing and Receiving feedback, Difference between Tact and Intelligence, Emotional Intelligence: Trust through
Communication, Thinking Skills: Meaning and Types.
Unit 5 : Digital Communication and Personality Making
Content Creation for Social Media: Emails, Webinars, podcasts, Blogs. Effective and Ethical use of Social Media by
Text and Technique, Speech and Personality, Personality Analysis: Types of Personality; Concept of Personality:
Maslow, Freud, Vivekananda, Jung Typology &Personality Assessment.
Prescribed Books:
1. Technical Communication – Principles and Practices by Meenakshi Raman & Sangeeta Sharma, Oxford
Univ. Press, 2018, New Delhi
2. Personality Development and Soft Skills by Barun K. Mitra, OUP, 2012, New Delhi.
3. Technical Communication, by Pfeiffer, 6th edn (Pearson)
4. Soft Skills & Employability, Sabina Pillai and Agna Fernandez Cambridge University Press 2018.
5. Practical Communication: Process and Practice by L.U.B. Pandey; A.I.T.B.S.Publications India Ltd.;
Krishan Nagar, 2014, Delhi.
FOURTH SEMESTER (DETAILED SYLLABUS)
CO 1
Develop the object-oriented programming concepts using Java K3, K4
CO 2
Implement exception handling, file handling, and multi-threading in Java K2,K4
CO 3
Apply new java features to build java programs. K3
CO 4
Analyse java programs with Collection Framework K4
Test web and RESTful Web Services with Spring Boot using Spring Framework
CO 5 concepts K5
Packages: Defining Package, CLASSPATH Setting for Packages, Making JAR Files for
Library Packages, Import and Static Import Naming Convention For Packages
Exception Handling: The Idea behind Exception, Exceptions & Errors, Types of Exception, Control
Flow in Exceptions, JVM Reaction to Exceptions, Use of try, catch, finally, throw, throws in
Exception Handling, In-built and User Defined Exceptions, Checked and Un-Checked Exceptions.
II
Input /Output Basics: Byte Streams and Character Streams, Reading and Writing File in Java. 08
Multithreading: Thread, Thread Life Cycle, Creating Threads, Thread Priorities, Synchronizing
Threads, Inter-thread Communication.
Java New Features: Functional Interfaces, Lambda Expression, Method References, Stream API,
III Default Methods, Static Method, Base64 Encode and Decode, ForEach Method, Try-with- 08
resources, Type Annotations, Repeating Annotations, Java Module System, Diamond Syntax with
Inner Anonymous Class, Local Variable Type Inference, Switch Expressions, Yield Keyword, Text
Blocks, Records, Sealed Classes
Text Books
1. Study of hardware and software requirements of different operating systems (UNIX,LINUX,WINDOWS XP,
WINDOWS7/8
2. Execute various UNIX system calls for
i. Process management
ii. File management
iii. Input/output Systems calls
3. Implement CPU Scheduling Policies:
i. SJF
ii. Priority
iii. FCFS
iv. Multi-level Queue
4. Implement file storage allocation technique:
i. Contiguous(using array)
ii. Linked –list(using linked-list)
iii. Indirect allocation (indexing)
5. Implementation of contiguous allocation techniques:
i. Worst-Fit
ii. Best- Fit
iii. First- Fit
6. Calculation of external and internal fragmentation
i. Free space list of blocks from system
ii. List process file from the system
7. Implementation of compaction for the continually changing memory layout and calculate total movement
of data
8. Implementation of resource allocation graph RAG)
9. Implementation of Banker‟s algorithm
10. Conversion of resource allocation graph (RAG) to wait for graph (WFG) for each type of method used for
storing graph.
11. Implement the solution for Bounded Buffer (producer-consumer)problem using inter process
communication techniques-Semaphores
12. Implement the solutions for Readers-Writers problem using inter process communication technique -
Semaphore
1. Use Java compiler and eclipse platform to write and execute java program.
2. Creating simple java programs using command line arguments
3. Understand OOP concepts and basics of Java programming.
4. Create Java programs using inheritance and polymorphism.
5. Implement error-handling techniques using exception handling and multithreading.
6. Create java program with the use of java packages.
7. Construct java program using Java I/O package.
8. Create industry oriented application using Spring Framework.
9. Test RESTful web services using Spring Boot.
10. Test Frontend web application with Spring Boo t
1. SQL Injection: Use DVWA to practice SQL injection attacks. Demonstrate how an attacker can
manipulate input fields to extract, modify, or delete database information.
2. Cross-Site Scripting (XSS): Exploit XSS vulnerabilities in DVWA to inject malicious scripts into web pages.
Show the potential impact of XSS attacks, such as stealing cookies or defacing websites.
3. Cross-Site Request Forgery (CSRF): Set up a CSRF attack in DVWA to demonstrate how attackers can
manipulate authenticated users into performing unintended actions.
4. File Inclusion Vulnerabilities: Explore remote and local file inclusion vulnerabilities in DVWA. Show how
attackers can include malicious files on a server and execute arbitrary code.
5. Brute-Force and Dictionary Attacks: Use DVWA to simulate login pages and demonstrate brute-force
and dictionary attacks against weak passwords. Emphasize the importance of strong password policies.