B.tech PT Cse r2018 Syllabus
B.tech PT Cse r2018 Syllabus
REGULATIONS 2018
&
CURRICULUM & SYLLABUS
CHOICE BASED CREDIT SYSTEM
(Applicable to the students admitted from July, 2018)
SEMESTER I
Sl. No. Contact
Course Code Category Course Title L T P C
Period
THEORY
1 PT18BSMA11 BS Engineering Mathematics 4 3 1 0 4
2
PT18PCCS11 PC Data Structures 3 3 0 0 3
SEMESTER II
Sl. No. Contact
Course Code Category Course Title L T P C
Period
THEORY
1 PT18BSMA22 BS Numerical methods 4 3 1 0 4
2 Database Management
PT18PCCS21 PC 3 0 0 3
System 3
3 PT18PCCS22 0
PC Computer Networks
3 3 0 3
4 Operating Systems
PC 3 0 0 3
PT18PCCS23 3
PRACTICAL
5 PT18PCCSL2 PC DBMS Laboratory 3 0 0 3 1.5
Total 16 12 1 3 14.5
SEMESTER III
Sl. No. Contact
Course Code Category Course Title L T P C
Period
THEORY
1 PT18BSMA31 BS Discrete Mathematics 4 3 1 0 4
2 Software Engineering
PT18PCCS31 PC 3 0 0 3
3
3 PT18PCCS32 Problem Solving & Python 0
PC
Programming 3 3 0 3
4
PC System Software 3 0 0 3
PT18PCCS33 3
PRACTICAL
5 Software Engineering 3
PT18PCCSL3 PC 0 0 3 1.5
Laboratory
Total 16 12 1 3 14.5
SEMESTER IV
Sl. No. Contact
Course Code Category Course Title L T P C
Period
THEORY
1 PC Microprocessors and its 3
PT18PCCS41 3 0 0 3
applications
2 PC Distributed Computing
PT18PCCS42 3 0 0 3
3
3 PT18PCCS43 PC Data Warehousing and 0
Data mining 3 3 0 3
4 PC Grid and Cloud
3 0 0 3
PT18PCCS44 Computing 3
PRACTICAL
5 Data Warehousing and 3
PT18PCCSL4 PC 0 0 3 1.5
Data mining Lab
6 Grid and Cloud Computing 3
PT18PCCSL5 PC 0 0 3 1.5
Lab
Total 18 12 0 6 15
SEMESTER V
Sl. No. Contact
Course Code Category Course Title L T P C
Period
THEORY
1 PC Mobile and Pervasive 3
PT18PCCS51 3 0 0 3
Computing
2 PT18PCCS52 PC Web Technology
3 0 0 3
3
3 HS Organizational Behavior 0
PT18HSBA51
3 3 0 3
4 PE
Professional Elective-I 3 0 0 3
3
PRACTICAL
5 PT18PCCSL6 PC Web Technology Lab 3 0 0 3 1.5
Total 18 12 0 6 13.5
SEMESTER VI
Sl. No. Contact
Course Code Category Course Title L T P C
Period
THEORY
1 PC Artificial Intelligence and 4
PT18PCCS61 3 1 0 4
Expert Systems
2 PE Professional Elective-II
3 0 0 3
3
3 PE Professional Elective-III 0
3 3 0 3
4 OE
Open Elective-I 3 0 0 3
3
PRACTICAL
5 PT18PCCSL8 PC C# and .Net Lab 3 0 0 3 1.5
Total 16 12 1 3 14.5
SEMESTER VII
Sl. No. Contact
Course Code Category Course Title L T P C
Period
THEORY
1 MO Open Elective – II 2
2 0 0 2
(MOOC)
2 PE Professional Elective-IV
3 0 0 3
3
3 PE Professional Elective-V 0
3 3 0 3
PRACTICAL
4 PT18PRCS7P Project 12 0 0 12
PR
1 6
Total 20 12 0 3 14
TOTAL CREDITS TO BE EARNED FOR THE AWARD OF DEGREE: 104
PROFESSIONAL ELECTIVE - I
Sl.No Contact
Code No. Category Course Title Periods L T P C
PROFESSIONAL ELECTIVE - II
Sl.No Contact
Code No. Category Course Title Periods L T P C
1 PT18PECS21 PE VHDL 3 3 0 0 3
PROFESSIONAL ELECTIVE - IV
Sl.No Contact
Code No. Category Course Title Periods L T P C
PROFESSIONAL ELECTIVE - V
Sl.No Contact
Code No. Category Course Title Periods L T P C
UNIT I MATRICES 12
Eigen values and Eigenvectors of a real matrix- Characteristic Equation- Properties of Eigen values
and Eigenvectors- Cayley-Hamilton theorem (without proof) - application and uses -
Diagonalization of matrices, by Orthogonal Transformation - Reduction of a Quadratic form to
Canonical form.
UNIT II DIFFERENTIATION AND INTEGRAL CALCULUS 12
Successive differentiation curvature – Evolution and Envelope – Multiple Integration – Cartesian
Co-ordinate – polar Co-ordinates – triple integral.
UNIT III DIFFERENTIAL EQUATION 12
First order – second order linear differential equation with constant coefficient methods – method of
variation of parameter, linear differential equation with variable coefficient – Euler form –
Legendre’s form, simultaneous equation of 1s t order.
TEXT BOOKS:
1. Bali N.P. and Manish Goyal, ‘Text book of Engineering Mathematics” , Third Edition,
2. Grewal B.S. Higher Engineering Mathematics, Khanna Publishers, 42nd Edition, Delhi 2012
Company , 2008.
COURSE OUTCOMES (COs)
On completion of the course, the students will be able to
CO1 Identify Eigen value problems from practical areas using transformations; Diagonal sing
the matrix would render the Eigen values.
CO2 To apply differential and integral calculus to notions of curvature
CO3 To apply knowledge of differential equation & Euler's function
CO4 Get the knowledge of analytic functions
CO5 To Understand the concept of Vector calculus & various theorems
OBJECTIVES
This course demonstrates familiarity with major algorithms and data structures and analyzes
performance of algorithms. It is used to choose the appropriate data structure and algorithm
design method for a specified application and determine which algorithm or data structure to
use in different scenarios.
UNIT- I INTRODUCTION 9
Data objects and structures- The linear list data structure-Array Representation- Vector
Representation – Performance analysis- Space complexity – Time complexity.
Trees – Binary trees – Properties of binary trees – Representation of binary trees – Binary tree
traversal – Priority queues- Linear lists – Heap – Binary search tree- Binary search tree
implementations –AVL trees -Graph – Graph search Methods.
Optimization problems – Greedy method – Applications – Divide and conquer - The method –
Applications – Lower bounds on complexity.
TOTAL NO OF PERIODS: 45
TEXT BOOK:
1. Sartaj Sahni, “Data Structures, Algorithms and Applications in C++”, Second Edition,
Universities Press.2005.
REFERENCES:
1. Horowitz, Sahni, Mehta, “Fundamentals of Data Structures in C++”, 2nd Edition,
Universities Press, 2007.
2. A.V.Aho, Hopcroft, Ullman, “Data Structures & Algorithms”, Pearson Education, 2005.
3. http://lib.mdp.ac.id/ebook/Karya%20Umum/Dsa.pdf
OBJECTIVES
The overall aim of the course is to provide an understanding of Methods, techniques and tools
for modeling, simulation and performance analysis of complex systems such as communication
and computer networks.
TEXT BOOKS:
1. Jerry Banks, Carson. J.S., and Nelson B.L., “Discrete Event System Simulation”, Prentice
Hall of India, New Delhi, 2006.
2. Karian, Z. A., Dudewicz, E. J. (112121), “Modern statistical systems, and GPSS
simulation: the first course”, W. H. Freeman and Company, New York, 2005.
REFERENCES
1. System Modelling and Simulation, V.P.Singh, New Age International Publishers,2009.
2 .https://shamsulsarip.files.wordpress.com/2015/07/system-modelling-and-simulation.pdf
CO2 Classify various simulation models and give practical examples for each category
CO3 Construct a model for a given set of data and motivate its validity
CO4 Generate and test random number varieties and apply them to develop simulation models.
CO5 Analyze output data produced by a model and test validity of the model.
OBJECTIVES:
To have a thorough understanding of the basic structure and operation of a digital computer.
To discuss in detail the operation of the arithmetic unit including the algorithms &
implementation of fixed-point and floating-point addition, subtraction, multiplication &
division.
TEXT BOOKS:
1.David A. Patterson and John L. Hennessy, “Computer Architecture-A Quantitative
Approach”, Elsevier, a division of reed India Private Limited, 5thedition, 2012
2. M. Mano, “Computer System Architecture”, Third Edition, Pearson Education,2008.
REFERENCE BOOKS:
1. Carl Hamacher, Zvonko Vranesic, Safwat Zaky, “Computer Organization”, McGraw-Hill,
5th Edition, Reprint 2012.
2. Ghosh T. K., “Computer Organization and Architecture”, Tata McGraw-Hill,3rd Edition,
2011
3. John P. Hayes, “Computer Architecture and Organization”, Tata McGraw Hill,3rd Edition,
1998
4. Behrooz Parahami, “Computer Architecture”, Oxford University Press, 8th Impression,
2011.
CO2 Explain the hierarchical memory system and data transfer with in a digital computer.
CO3 Outline the operation of Arithmetic unit.
CO5 Explain the ways of communication between a processor and I/O devices.
OBJECTIVES:
To get a basic understanding of how circuits and systems are designed with digital electronic
circuit elements and analyze and design circuits and systems made from digital electronic
circuit elements such as gates and flip-flops.
Review of binary, octal and Hexa decimal representations of numbers and their conversion,
Binary arithmetic; conversion algorithms. Weighted binary codes. Non weighted binary codes
error-detecting and error-correcting codes-Alphanumeric codes.
Introduction to Boolean algebra- The AND, OR and not operations. Laws of Boolean algebra
of Boolean expressions. Boolean expressions and logic diagrams. Universal building blocks.
Negative logic.
Basic latch circuits, De-bouncing switch. Flip-flops, truth table and excitation table. Shift
registers. Asynchronous and synchronous counters. Shift counters.
Analysis and Design of Asynchronous Sequential Circuits , Reduction of State and Flow
Tables ,Race-free State Assignment, Hazards.
TEXT BOOKS:
1. T. L Floyd & Jain, “Digital fundamentals”, Pearson Education,3rd edition,2011.
2. Morris Mano M., “Digital Logic and Computer Design”, Pearson Education,2010.
REFERENCE BOOKS:
1. Heiser Man, “Digital IC applications”, Pearson Education,2007.
2. Raj Kamal, “Digital Systems Principles and Design”, Pearson Education, First Edition,
2007.
3. CharlesH.Roth, Jr. and Larry L. Kinney, “Fundamentals of Logic Design”, CL Engineering,
7th Edition, 2013.
4. WilliamH. Gothmann, “Digital electronics: an introduction to theory and practice”,Prentice-
Hall,2006 .
5. http://www.b-u.ac.in/sde_book/digi_com.pdf.
CO2 Understand the hierarchical memory system and data transfer with in a digital computer.
CO3 Use Boolean simplification techniques to design a combinational hardware circuit.
CO4 Understand the concept of number system.
CO5 Learn the various gates like AND, OR, NOT, XOR.
TEXT BOOKS:
1. C.F. Gerald and P.O. Wheatley, ‘Applied Numerical Analysis’, Sixth Edition,
PearsonEducation Asia, New Delhi, 2002.
2. E. Balagurusamy, ‘Numerical Methods’, Tata McGraw Hill Pub.Co.Ltd, New Delhi, 1999.
REFERENCES:
1. P. Kandasamy, K. Thilagavathy and K. Gunavathy, ‘Numerical Methods’, S.Chand Co. Ltd.,
New Delhi, 2003.
2. R.L. Burden and T.D. Faires, ‘Numerical Analysis’, Seventh Edition, Thomson Asia Pvt. Ltd.,
Singapore, 2002.
3.https://www.math.ust.hk/~machas/numerical-Methods.pdf
UNIT-I INTRODUCTION 9
Introduction – Database System Applications-Purpose of Database Systems- View of Data-
Data Abstraction- Instances and Schemas- Data Models-Database Languages -Relational
Databases- Database Design- The Entity-Relationship Model - Data Storage and Querying -
Transaction Management - Database Architecture -Database Users and Administrators.
UNIT-IV TRANSACTIONS 9
Transactions-Transaction Concept-A Simple Transaction Model-Storage Structure-Transaction
Atomicity and Durability-Transaction Isolation-Serializability-Transaction Isolation and
Atomicity-Transaction Isolation Levels-Transactions as SQL Statements-Concurrency Control-
Lock-Based Protocols-Deadlock Handling-Multiple Granularity-Time Stamp-Based Protocols-
Validation Based Protocols-Hierarchical model - Basic Concepts - Data-Structure Diagrams-
Network model.
TEXT BOOKS:
1. Abraham Silberschatz, Henry. F. Korth and S. Sudharshan, “Database System Concepts”, 6 th
Edition, Tata McGraw Hill, 2011.
2. RamezElmasri, Shamkant B. Navathe, “Fundamentals of Database Systems", 6 th Edition,
Addison-Wesley,2010.
REFERENCE BOOKS:
1.PakhiraMalay.K, “Database Management System”,PHI publication,2012.
2.NarainGehani, “The Database Book – Principles and Practice Using MySQL”, Universities
Press,2008.
3. Hector Garcia - Molina, Jeff Ullman and Jennifer Widom, “Database systems: The
Complete Book” 2nd Edition, Pearson Education,2008.
4. C. J. Date, A. Kannan and S. Swamynathan, “An Introduction to Database Systems”,
Pearson Education, 8thEdition,2006.
5. Database%20Management%20Systems%203Rd%20Edition.pdf
OBJECTIVES
Computer Networking is the vital part of any organization these days. This course provides a
foundation to understand various principles, protocols and design aspects of Computer
Networks and also helps to achieve the fundamental purpose of computer networks in the form
of providing access to shared resources.
TEXT BOOKS:
1. Andrew S. Tanenbaum, “Computer Networks”, Pearson Education, 5th edition 2010.
2. Behrouz A. Forouzan, “Data and Computer Communications”, 4th Edition, McGraw
Hill,2007.
REFERENCE BOOKS:
1.WilliamStallings,“Data and Computer Communications”,8th Edition, Pearson Education,2006
2. Douglas E. Comer, “Internetworking with TCP/IP, Volume-I”, 6 th Edition, Pearson
Education, 2013.
3.http://tocs.ulb.tu-darmstadt.de/49378155.pdf
OBJECTIVES:
Every computer professional should have a basic understanding of how an operating system
controls the computing resources and provide services to the users. This course provides an
introduction to the operating system functions, design and implementation.
UNIT- VLINUX 9
Secondary Storage Management: Disk Structure – Disk Scheduling – Disk Management –
Swap Space management-Case Study: Linux System – Components of Linux Systems –
Process Management – Process Scheduling – Security.
TEXT BOOKS:
1. Silberschatz, Galvin, Gagne, “Operating System Concepts”, 8 thedition, John Wiley & Sons,
Inc., 2009.
2.William Stallings, “Operating Systems”, Pearson Education, 6th Edition. 2006.
REFERENCS:
1. D.M.Dhamdhere, “Operating Systems: A Concept-Based Approach”, 2 nd Edition, Tata
McGraw Hill, 2006.
2. Andrew S. Tanenbaum, “Modern Operating Systems”, Pearson Education, 3 rd
Edition.2005.
https://it325blog.files.wordpress.com/2012/09/operating-system-concepts-7-th-edition.pdf
OBJECTIVES: The main objective is students gain knowledge about databases for storing the
data and to share the data among different kinds of users for their business operations.
LIST OF EXPERIMENTS
1. Data Definition, Manipulation of base tables and views
2. High level programming language extensions.
3. Front end tools.
4. Forms-Triggers-Menu Design.
5. Reports.
6. Database Design and implementation
7. An exercise using Open Source Software like MySQL.
OBJECTIVES:
Reason Mathematically about basic data types and structures (such as numbers, sets, graphs,
and trees) used in computer algorithms and systems. Distinguish rigorous definitions and
conclusions from merely plausible ones; synthesize elementary proofs, especially proofs by
induction. Model and analyze computational processes using analytic and combinatorial
Methods.
UNIT-I LOGIC 12
Statements - Truth Tables - Connectives - Normal forms - Properties calculus - Inference
theory for statement Calculus and Predicate Calculus.
UNIT-II COMBINATORIES 12
Review of Permutation and Combination - Mathematical Induction - Pigeon hole Principle -
Principle of inclusion and exclusion - Generating function -Recurrence relations.
UNIT-III GROUPS 12
Semigroups- Monoids-Groups-Permutation group-Consets-Lagrange's theorem - Group
homomorphism- Kernal - Rings and Fields (Definitions and Examples only)
UNIT-IV LATTICES 12
Partial ordering - Posets - Hasse diagram - Lattices - Properties of Lattices - Sub Lattices -
Special Lattices - Boolean, Algebra
UNIT-V GRAPHS 12
Introduction of Graphs - Graph terminology - Representation of Graphs - Graph Isomorphism-
Connectivity- Euler and Hamilton Paths.
TEXT BOOKS:
1. Tremblay J.P and Manohar R, “Discrete Mathematical Structures with Application to
Computer Science”, McGraw Hill Book Company, International Edition, 1987, Sections 1
2,1 to 1-2,4; 1-2, 6 to 1-2,14; 1-3,1 to 1-3,5; 1-4,1 to 1-4,3; 1-5,- to 1-5,5:1-6, 4 and 1-6,5
for logic. Section 3:- 1,1 to 3-2, 3; 3-5,1 to 3-5, 5 for Groups Rings and Fields. Sections: 2,
3-8 and 2-3, 9; 4-1, 1 to 4-2, 2 for Lattices.
2. Kenneth H. Rosen, “Discrete Mathematics and its applications”, McGraw Hill Book
Company 1999, Section 3, 3, 4, 3, 6, 1, 6, 2, 6, 4, 6, 5, 7, 1-7, 5, 8, 1-8, 5
REFERENCE BOOKS:
1. Ralph P., Grimaldi, “Discrete and Combinatorial Mathematics”, Pearson Education, Fifth
Edition,2008
2. Venkataraman M.K, Discrete Mathematics”, The National Publishing Company 2000.
3. Iyengar S. N, Chandrasekaran V. M, Venkatesan K.A. and Arunachalam PS., “Discrete
Mathematics”, Vikas Publishing House Pvt. Ltd,2003.
4. http://www.cse.iitd.ernet.in/~bagchi/courses/discrete-book/fullbook.pdf
OBJECTIVES:
This course is intended to provide the students with an overall view over Software Engineering
discipline and with insight into the processes of software development.
UNIT- I INTRODUCTION 9
Software Engineering Process paradigms - Project management - Process and Project Metrics –
software estimation - Empirical estimation models - Planning - Risk analysis - Software project
scheduling.
TEXT BOOK:
1.Roger Pressman .S, Software Engineering, A Practitioner's Approach”, 7thEdition, McGraw
Hill, 2010.
REFERENCE BOOKS:
1. I. Sommerville, “Software Engineering”, Eighth Edition, Pearson Education, 2007
2. Pfleeger, “Software Engineering-Theory & Practice”, 3rd Edition, Pearson Education, 2009
3. Carlo Ghezzi, Mehdi Jazayari, Dino Mandrioli, “Fundamentals of Software Engineering”,
Pearson Education, 2003.
4.http://www.vumultan.com/Books/CS605-Software%20Engineering%20Practitioner
%E2%80%99s%20Approach%20%20by%20Roger%20S.%20Pressman%20.pdf
OBJECTIVES:
To gain fundamental knowledge of algorithmic problem solving and python programming.
TEXT BOOKS:
1. Allen B. Downey, ‘Think Python: How to Think Like a Computer Scientist’, 2nd edition,
Updated for Python3, Shroff/O‘Reilly Publishers, 2016.
2. Guido van Rossum and Fred L. Drake Jr, ― An Introduction to Python – Revised and updated
for Python 3.2, Network Theory Ltd., 2011.
REFERENCES
1. John V Guttag, ―Introduction to Computation and Programming Using Python‘‘, Revised and
expanded Edition, MIT Press , 2013
2. Robert Sedgewick, Kevin Wayne, Robert Dondero, ―Introduction to Programming in Python:
An Inter-disciplinary Approach, Pearson India Education Services Pvt. Ltd., 2016.
3. Timothy A. Budd, ―Exploring Python‖, Mc-Graw Hill Education (India) Private Ltd.,, 2015.
4. Kenneth A. Lambert, ―Fundamentals of Python: First Programs‖, CENGAGE Learning, 2012.
5. Charles Dierbach, ―Introduction to Computer Science using Python: A Computational
Problem-Solving Focus, Wiley India Edition, 2013.
6. Paul Gries, Jennifer Campbell and Jason Montojo, ―Practical Programming: An Introduction to
Computer Science using Python 3‖, Second edition, Pragmatic Programmers, LLC, 2013.
CO3 To gain knowledge regarding control flow and functions associated with python.
CO4 Use Python data structures – lists, tuples & dictionaries for representing compound data.
CO5 To gain knowledge on files, exception, modules and packages in Python for solving problems.
OBJECTIVES:
The objective of this course is some of the major tasks of the system software of a computer
system, focusing on internal working of the Hardware and Software interface of a typical
system.
UNIT- II ASSEMBLERS 9
Functions - Features - Machine dependent - Machine independent - Design options - One pass
- Multipass - Implementation – Examples-Basic Assembler Function - A Simple SIC
Assembler, Assembler Algorithm and Data Structures, Machine Dependent Assembler
Features - Instruction Formats & Addressing Modes, Program Relocation.
TEXT BOOKS:
1.L. Beck, “System Software - An Introduction to System Programming”, 3rd Edition, Pearson
Education, 2005.
2.John.R.Levine, Tony Mason and Doug Brown: Lex and Yacc, O'Reilly, SPD, 1998.
REFERENCES:
1.D.M. Dhamdhere, “System Programming and Operating Systems”, Tata McGraw Hill Company,
1999.
2http://uotechnology.edu.iq/ce/Lectures/Dr-Shaima-Sys-Prog/lec1-2-3-4.pdf
3.https://books.google.co.in/books?
id=s7zgF7InxIgC&printsec=frontcover&source=gbs_ge_summary_r&cad=0#v=onepage&q&f=fals
e.
OBJECTIVE:
The Main objective of this Software Engineering Lab is known about various phases in
software development.
LIST OF EXPERIMENTS
1. Library System
2. Course Registration System
3. Quiz System
4. Student marks analyzing system
5. Online ticket reservation system
6. Stock maintenance
OBJECTIVES:
Become proficient in the functional and technological characteristics of microprocessor
architectures. Understand and write assembly language programs, Learn about memory
components, peripheral support devices and their interface logic.
TEXT BOOK:
1.RameshS.Gaonkar, “Microprocessor Architecture, Programming and Applications with the
8085”,6th edition, Penram International Publishing (India) Pvt. Ltd., 2013
REFERENCE BOOKS:
1. A.P.Mathur, “Introduction to Microprocessors”, Third Edition, Tata McGraw Hill,2006
2. Rafiquzzaman, “Microprocessors and Microcomputer Development Systems: Designing
Microprocessor-Based Systems”, John Wiley & Sons Inc,2005
3. N.K. Srinath, “8085 Microprocessor: Programming and Interfacing”, PHI Learning,
2010.
OBJECTIVES:
The differences among concurrent, networked, distributed, and mobile, Resource allocation
and deadlock detection and voidance techniques.
UNIT- I INTRODUCTION 9
Characterization of Distributed Systems – Examples – Resource Sharing and the Web –
Challenges – System Models – Architectural and Fundamental Models – Networking and
Internetworking – Types of Networks – Network Principles – Internet Protocols – Case
Studies.
TEXT BOOKS:
1.George Coulouris, Jean Dollimore and Tim Kindberg, “Distributed Systems Concepts and
Design”, 3rd Edition, Pearson Education, 2002.
2.Andrew S. Tanenbaum, Maartenvan Steen, Distributed Systems, “Principles and Pardigms”,
Pearson Education, 2002.
REFERENCES :
1.SapeMullender, “Distributed Systems”, 2nd Edition, Addison Wesley, 1993.
2.Albert Fleishman, Distributes Systems, “Software Design and Implementation”, Springer,
Verlag, 1994.
3.M. L. Liu, “Distributed Computing Principles and Applications”, Pearson Education, 2004.
4.MugeshSinghal, Niranjan ,GShivaratri, “Advanced Concepts in Operating Systems”, Tata
McGraw Hill Edition, 2001.
OBJECTIVES:
Dramatic advances in data capture, processing power, data transmission, and storage
capabilities are enabling organizations to integrate their various databases into data
warehouses, Data mining is primarily used by the companies with a strong consumer focus. It
enables these companies to determine the factors such as price, product positioning, or staff
skills, and economic indicators, competition, and customer demographics.
UNIT- I DATAWAREHOUSE 9
Data Warehouse Roles and Structures – What is a Data Warehouse? – Multi
Dimensional Data Model- Data Stores, Warehouses and Marts - The Data Warehouse
Environment – Data Warehouse Characteristics - The Data Warehouse Architecture – Meta
Data, Metadata Extraction - Implementing the Data Warehouse - OLAP Engine - Data
Warehouse Backend Process – Data Warehouse Project Success Factors.
Basic Data Mining Tasks, Data Mining versus Knowledge Discovery in Data Bases, Data
Mining Issues, Data Mining Metrics. Social Implications of Data Mining.Data Mining from a
Database Perspective.
UNIT-III CLASSIFICATION 9
Introduction - Statistical Based Algorithms- Distance Based Algorithms – Decision Tree
Based Algorithms - Neural Networks Based Algorithms – Rule Based Algorithms –
Combining Techniques.
Introduction-Web Mining – Web Content Mining –Crawlers, Harvest System, Virtual Web
View -Web Structure Mining –Page Rank, Web Usage Mining-Preprocessing, Data structures,
Pattern Discovery and Pattern Analysis.
TEXT BOOKS:
1. ArunK.Pujari.,“Data Mining Techniques”, Universities Press,2013.
2. Margaret H. Dunham ,S.Sridhar, “Data Mining Introductory and Advanced Topics”, Pearson
Education,2006.
3. K.P.Soman,ShyamDiwakar,V.Ajay,”Data Mining: Theory And Practice” , PHI Learning
Pvt. Ltd., 2006.
REFERENCE BOOKS:
1. “Express Learning - Data Warehousing and Data Mining”, ITL ESL,Pearson Education,
2012.
2. N.Venkatesan,S.Prabhu,”Data Mining and WareHousing”, New Age International (P)
Limited, 2010.
3. George M. Marakas, “Modern Data Warehousing, Mining and Visualization: Core
concepts”, Pearson Education,2003.
4.http://www.essi.upc.edu/~aabello/publications/11.IGIBook1.pdf
OBJECTIVES:
Identify the technical foundations of cloud systems architectures, Analyze the problems and
solutions to cloud application problem, Apply principles of best practice in cloud application
design and management. Identify and define technical challenges for cloud applications and
assess their importance.
TEXTBOOKS:
1. Joshy Joseph & Craig Fellenstein, “Grid Computing”, PHI, PTR-2003(UNIT I)
2.Kai Hwang, Geoffrey C Fox,Jack G Dongarra “Distributed and Cloud Computing ,From
parallel processing to the Internet of Things” Morgan Kaufmann Publishers,2012(Unit-II
to Unit-V)
REFERENCE BOOKS:
1. John W.Rittinghouse and James F.Ransome, “Cloud Computing Implementation,
Management and Security”, CRC Press, 2010
2. Toby Velte, Anthony Velte, Robert Elsenpeter,”Cloud Computing, A Practical Approach”,
TMH, 2009.
3. Kumar Saurabh,”Cloud Computing –Insights into New-Era Infrastructure “, Wiley India,
2011
4. George Reese, “Cloud Applications Architectures: Building Applications and Infrastructure
in the Cloud” O’Reilly.
5. https://benzology.files.wordpress.com/2013/05/grid-computing-joshy-joseph-ebook.pdf
6.http://cloudipedia.com/files/2009/11/cloud_computing_made_easy.pdf
OBJECTIVES:
Data mining is primarily used by the companies with a strong consumer focus. It enables these
companies to determine the factors such as price, product positioning, or staff skills, and
economic indicators, competition, and customer demographics.
LIST OF EXPERIMENTS:
1. Listing applications for mining
2. File format for data mining
3. conversion of various data files
4. Training the given dataset for an application
5. Testing the given dataset for an application
6. Generating accurate models
7. Data pre-processing – data filters
8. Feature selection
9. Web mining
10. Text mining
11. Design of fact & dimension tables
12. Generating graphs for star schema.
LIST OF EXPERIMENTS:
1.Connecting Zonal Server with JVishwa.
2.Find the Prime Number for largest interval using Grid Computing.
3.Calculate the Matrix multiplication using Grid Computing.
4. Find procedure to run the virtual machine of different configuration. Check how many
virtual machines can be utilized at particular time Find the missing dataset using hadoop and
map reduce.
5.Find procedure to attach virtual block to the virtual machine and check whether it holds the
data even after the release of the virtual machine Classification using Naïve bayes approach.
6.Install a C++ compiler in the virtual machine and execute a sample program.
7.Show the virtual machine migration based on the certain condition from one node to the
other.
8.Find procedure to install storage controller and interact with it.
9.Write a word count program to demonstrate the use of Map and Reduce tasks.
OBJECTIVES
This course discuss about knowledge and skills about a new trend in mobile Computing.
TEXT BOOKS:
1. Jochen Schiller, “Mobile Communications”, PHI, Second Edition, 2003.
2. Jochen Burkhardt, Pervasive Computing: Technology and Architecture of MobileInternet A
pplications, Addison Wesley Professional; 3rd edition 2007.
REFERENCES:
1.Frank Adelstein, Sandeep KS Gupta, Golden Richard, Fundamentals of Mobile andPervasive
Computing, McGraw-Hill 2005
2. Debashis Saha, Networking Infrastructure for Pervasive Computing:
st
EnablingTechnologies, Kluwer Academic Publisher, Springer; 1 edition, 2002
3. Introduction to Wireless and Mobile Systems by Agrawal and Zeng, Brooks/
Cole(Thomson Learning),1st edition, 2002
4.Uwe Hansmann, Lothar Merk, Martin S. Nicklons and Thomas Stober, Principlesof
Mobile Computing, Springer, New York, 2003.
5.http://media.techtarget.com/searchMobileComputing/downloads/
Mobile_and_pervasive_computing_Ch06.pdf
OBJECTIVES
This course discuss about various concepts using to develop web programming.
UNIT- I INTRODUCTION 9
Internet principles – Basic Web concepts – Client/Server model – Retrieving data from Internet
– HTML and Scripting Languages – Standard Generalized Markup language-Next Generation
Internet - Protocols and applications.
TEXT BOOKS:
1. Paul Deitel, “Internet & World Wide Web: How to Program”, Prentice Hall, 4 th Edition,
2007.
2. E-Business and E-Commerce Management : S: Strategy, Implementation and Practice by
Dave Chaffey, Pearson Education,2013.
REFERENCE BOOKS:
1. Jeff Frantzen and Sobotka, “Java Script”, Tata McGraw Hill, 2002.
2. Eric Ladd, Jim O’Donnell, “Using HTML 4, XML and JAVA”, Prentice Hall of India –
QUE, 1999.
3. N.P.Gopalan&J.Akilandeswari, “Web Technology: A Developer’s Perspective”, PHI
Learning,2008.
4. http://www.icrar.org/__data/assets/pdf_file/0010/1439686/Web-Technology.pdf
OBJECTIVES:
Demonstrate the role of languages like HTML, DHTML, CSS, XML, Java script, ASP and
protocols in the workings of the web and web applications.
LIST OF EXPERIMENTS
1. Create a HTML page, which has properly aligned paragraphs with image along with it.
2. Write a program to display list of items in different styles.
3. Create both client side and server side image maps.
4. Create your own style sheets and use them in your web page.,
5. Create a form with various fields and appropriate front and validations using any one of
the scripting languages.
6. Write a program to store the form fields in a database, use any appropriate Server Slide
Scripting.
7. Create a web page using XML.
8. Write a program to connect a XML web page to any database engine.
OBJECTIVES
The purpose of this course is to impart concepts of Artificial Intelligence and Expert System.
UNIT- II REASONING 12
Symbolic Reasoning Under Uncertainty- Statistical Reasoning - Weak Slot-And-Filler-
Structure - Semantic nets – Frames- Strong Slot-And-Filler Structure-Conceptual Dependency-
Scripts- CYC.
TEXT BOOKS:
1.Elaine rich, Kevin knight, “Artificial Iintelligence”, 3/e, Tata Mcgraw Hill, 2009.
2.Russell , “ Artificial Intelligence :A Modern Approach , Pearson education ,3rd edition,2013
REFERENCE BOOKS
1.Artificial Intelligence and Expert system by V.Daniel hunt, Springer press,2011.
2. Nilsson N.J., ”Principles of Artificial Intelligence”, Morgan Kaufmann.1998.
3. http://www.ggu.ac.in/download/Class-Note13/Artificial%20Intelligence %20and%20Expert
%20System24.10.13.pdf
LIST OF EXPERIMENTS
1. Classes and objects
2. Inheritance
3. Operator overloading
4. Threading
5. Events and delegates
6. Working with windows forms controls
7. Validating data
8. Creating custom dialog box
9. Designing an MDI application with menu
10. Retrieving data from a SQL database
11. Manipulating data in a connected environment
12. Manipulating data in a disconnected environment
PROFESSIONAL ELECTIVE - I
OBJECTIVES:
To know about the components and building block hypothesis of Genetic algorithm.
understand the features of neural network and its applications.
TEXTBOOKS:
1. Kai Hwang, “Advanced Computer Architecture, Parallel Scalability Programmability”-
Tata McGraw Hill,2012.
2. Parallel computing: theory and practice, Michael Quinn, TMH Edition, 2002.
3.http://www-users.cs.umn.edu/~karypis/parbook/Lectures/GK-CS5451/Chapter
%202%20-%20Parallel%20Programming%20Platforms.pdf
OBJECTIVES:
Develop in depth understanding of the key technologies in data science and business analytics:
data mining, machine learning, visualization techniques, predictive modeling, and statistics.
TEXTBOOKS:
1. 1. Introduction to Data Science, with Introduction to R Jeffrey Stanton 2012.
2. Georg Hager, Gerhard Wellein, Introduction to High Performance Computing, CRC Press,
2011.
REFERENCES:
1. Wagner, S., Steinmetz, M., Bode, A., Müller, M.M. (Eds.),, High Performance Computing
in Science and Engineering, Garching/Munich, Springer Verlog, 2010.
2. https://ischool.syr.edu/media/documents/2012/3/DataScienceBook1_1.pdf
OBJECTIVES:
Explain how system reliability can be measured and how reliability growth models can be used
for reliability prediction.
Fault Avoidance - Passive Fault detection - Active Fault Detection - Fault Tolerance - Fault
Recovery - Fault Treatment.
TEXT BOOKS:
1. John D. Musa, "Software Reliability", McGraw Hill, 1985
2. Glenford J. Myers, "Software Reliability", Wiley Interscience Publication, 1976
3. Michael Berthold, David J. Hand,” Intelligent Data Analysis”, Springer, 2007.
REFERENCES:
1. Patric D. T.O Connor, "Practical Reliability Engineering", 4th Edition, John Wesley & sons,
2003.
2.http://2014.issre.net/sites/2014.issre.net/files/Tutorial_Williams_Slides.pdf
PROFESSIONAL ELECTIVE – II
PT18PECS21 VHDL L T P C
Total Contact Periods – 45 3 0 0 3
Prerequisite – Digital Computer Fundamentals, System Modelling and
Simulation.
Course Designed by – Dept. of Computer Science & Engineering
Category PE
Approval 47th Academic Council Meeting held in Aug, 2018
OBJECTIVES:
Code in VHDL for synthesis, Decompose a digital system into a controller (FSM) and data path,
and code accordingly ,Write VHDL test benches, Synthesize and implement digital systems on
FPGAs.
CPU: Synthesis Description - ALU, Comp, Control, Reg. Register array Shift, TRIREG-CPU:
RTL Simulation-Test benches - CPU Simulation - CPU: Synthesis Results - Place and Route
process-placing and routing the Device-CPU: VITAL Simulation - VITAL Library - VITAL
Simulation Overview- VITAL Implementation Simple VITAL Model -VITAL Architecture -
SDF File – Back - Annotated Simulation.
TEXT BOOKS:
1. Douglas Perry, “VHDL”, McGraw Hill, 3rd Edition, 1999
2. J. Bhasker, “A VHDL Primer”, Pearson Education, 3rd Edition, 2005.
REFERENCE:
1. http://www.edutechlearners.com/download/books/A%20VHDL%20Primer%20-
%20Jayaram%20Bhasker.pdf
OBJECTIVES
The basics of Analytics – Concepts, Data preparation – merging, managing missing numbers
sampling, Data visualization, Basic statistics.
9
Analytics – Nuances of big data – Value – Issues – Case for Big data – Big data options Team
challenge – Big data sources – Acquisition – Nuts and Bolts of Big data. Features of Big Data -
Security, Compliance, auditing and protection - Evolution of Big data – Best Practices for Big
Data Analytics - Big data characteristics - Volume, Veracity, Velocity, Variety – Data
Appliance and Integration tools – Greenplum – Informatica.
IBM for Big Data – Map Reduce Framework - Hadoop – Hive - – Sharding – NoSQL
Databases - S3 -Hadoop Distributed file systems – Hbase – Impala – Analyzing big data with
twitter – Big data for Ecommerce– Big data for blogs.
TEXT BOOKS:
1. Frank J Ohlhorst, “Big Data Analytics: Turning Big Data into Big Money”, Wiley and SAS
BusinessSeries, 2012.
2. Colleen Mccue, “Data Mining and Predictive Analysis: Intelligence Gathering and Crime
Analysis”,Elsevier, 2007
3. Michael Berthold, David J. Hand,” Intelligent Data Analysis”, Springer, 2007.
REFERENCES:
1. AnandRajaraman and Jeffrey David Ullman, Mining of Massive Datasets, Cambridge
UniversityPress, 2012.
2.http://www.mosaic.geo-strategies.com/wp-content/uploads/2013/10/Big-Data-for-
Dummies.pdf
OBJECTIVES
The Objective of this Course is covers the foundations of software quality assurance and the
development of appropriate quality assurance strategies via the application of current
standards, models and measurement techniques.
UNIT –I INTRODUCTION TO SQA 9
Introduction to software quality – Software modelling – Scope of the software quality program
–Establishing quality goals – Purpose, quality of goals – SQA planning software – Productivity
and documentation.
UNIT- IV METHODOLOGIES 9
Tools, Techniques and methodologies, Code control, Media control, Supplier control, Records
Collection, Maintenance and retention, Training and risk management.
TEXT BOOKS:
1. Mordechai Ben – Meachem and Garry S.Marliss, “Software Quality – Producing
Practical, Consistent Software”, International Thompson Computer Press, 1997.
2.Watt. S. Humphrey, “Managing Software Process”, Addison – Wesley, 1998.
REFERENCES:
1. Philip.B.Crosby, “Quality is Free: The Art of making quality certain”, Mass Market, 1992.
2.http://www.cipl.net.in/courses/PDF/QA.pdf
OBJECTIVES:
Able to understand Hough Transform and its applications to detect lines, circles, ellipses
9
Review of image processing techniques – classical filtering operations – thresholding
techniques – edge detection techniques – corner and interest point detection – mathematical
morphology – texture.
Binary shape analysis – connectedness – object labeling and counting – size filtering – distance
functions – skeletons and thinning – deformable shape analysis – boundary tracking procedures
– active contours – shape models and shape recognition – centroidal profiles – handling
occlusion – boundary length measures – boundary descriptors – chain codes – Fourier
descriptors – region descriptors – moments.
UNIT –VAPPLICATIONS 9
Application: Photo album – Face detection – Face recognition – Eigen faces – Active
appearance and 3D shape models of faces Application: Surveillance – foreground-background
separation – particle filters – Chamfer matching, tracking, and occlusion – combining views
from multiple cameras – human gait analysis Application: In-vehicle vision system: locating
roadway – road markings – identifying road signs – locating pedestrians.
TEXT BOOKS:
1. E. R. Davies, “Computer & Machine Vision”, Fourth Edition, Academic Press, 2012.
2. R. Szeliski, “Computer Vision: Algorithms and Applications”, Springer 20113.
3. Simon J. D. Prince, “Computer Vision: Models, Learning, and Inference”, Cambridge
University Press, 2012.
REFERENCES:
1. D. L. Baggio et al., “Mastering Open CV with Practical Computer Vision Projects”, Packet
Publishing, 2012.
2.http://szeliski.org/Book/drafts/SzeliskiBook_20100903_draft.pdf
OBJECTIVES:
To learn how natural and biological systems influence computational field.
UNIT- I INTRODUCTION 9
What is Life? - Life and Information - The Logical Mechanisms of Life - What is
Computation? Universal Computation and Computability - Computational Beauty of Nature
(fractals, L-systems, Chaos) - Bio-inspired computing - Natural computing -Biology through
the lens of computer science.
Complex Systems and Artificial Life - Complex Networks - Self-Organization and Emergent
Complex Behavior - Cellular Automata - Boolean Networks - Development and
Morphogenesis - Open-ended evolution.
9
Collective Behavior and Swarm Intelligence - Social Insects - Stigmergy and Swarm
Intelligence; Competition and Cooperation - zero- and nonzero-sum games - iterated prisoner’s
dilemma - stable strategies - ecological & spatial models - Communication and Multi-Agent
simulation – Immuno computing.
TEXT BOOKS:
1. Leandro Nunes De Castro, Fernando Jose Von Zuben, “Recent Developments in
Biologically Inspired Computing”, Idea Group Publishing, 2005.
2. Leandro Nunes De Castro , “Fundamentals of Natural Computing: Basic concepts,
Algorithms and Applications”, Chapman & Hall/ CRC Computer & Information Science
Series, 2006.
REFERENCES:
1. Dario Floreano, Claudio Mattiussi, “Bio-Inspired Artificial Intelligence: Theories, Methods
and Technologies”, MIT Press, 2008.
2.http://www.bioinspiredcomputation.com/self-archived-bookNeumannWitt.pdf
3.http://www.dschool.ir/files/
__Bio_Inspired_Artificial_Intelligence__Theories__MethodsTechnologies__Intelligent_Ro
botics_and_Autonomous_Agents_.pdf
OBJECTIVES:
The Objective of this course student should know basic skills in software testing by
implementing various strategies of software testing in their project. They need to bring out the
ways and means of controlling and monitoring testing activity.
UNIT –I TESTING BASICS 9
Testing as an engineering activity –Role of process in software quality –Testing as a process –
Basic definitions –Software testing principles –The tester’s role in a software development
organization –Origins of defects –Defect classes – The defect repository and test design –
Defect examples –Developer / Tester support for developing a defect repository.
The need for levels of testing – Unit test – Unit test planning – Designing the unit tests – The
class as a testable unit – The test harness – Running the unit tests and recording results –
Integration tests – Designing integration tests – Integration test planning – System test – The
different types – Regression testing – Alpha, beta and acceptance tests.
TEXT BOOKS:
1. Srinivasan Desikan, Gopalaswamy Ramesh, “Software Testing: Principles and Practices”,
Pearson 2012.
2.Aditya P. Mathur, “Foundations of Software Testing”, Pearson, 2008.
3.Paul Ammann, Jeff Offutt, “Introduction to Software Testing”, Cambridge University Press,
2008.
REFERENCES:
1. Paul C. Jorgensen, “Software Testing: A Craftsman's Approach”, Auerbach Publications,
2008.
2.http://www.tutorialspoint.com/software_testing/software_testing_tutorial.pdf
PROFESSIONAL ELECTIVE-IV
OBJECTIVES:
To provide a solid foundation for understanding the communication process of the Internet
exposure to fundamental concepts of computer networking in the context of the TCP/IP model
and protocols.
UNIT- I INTRODUCTION 9
Protocols and standards - OSI model - TCP/ IP protocol suite - addressing -Version -
Underlying technologies.
TEXT BOOKS:
1.Behrouz A. Forouzan, “TCP/IP Protocol Suite”, 4th edition, McGraw Hill, 2013.
2.Douglas E. Comer, “Internetworking with TCP/IP: principles, protocols and architecture”
(Volume1), 6th Edition, PHI Learning, 2013.
REFERENCES:
1. Douglas E. Comer, David L. Stevens, “Internetworking with TCP/IP, design,
implementation and internals Volume 2, 3rdEdition, PHI Learning, 2009.
2. Ed Tittel, Laura Chappell, “TCP/IP”, 1st Edition, Cengage Learning, 2008.
3. Dr. SidnieFeit, TCP/IP, architecture, protocols and implementation with IPv6 and IP
Security, Tata McGraw-Hill, 2008.
4.http://cpe.rmutt.ac.th/network/images/cn/
[3]Comer_Douglas_Internetworking_with_TCP_IP_Vol.1.pdf
OBJECTIVES:
To understand the mathematical foundations needed for performance evaluation of computer
Systems.
TEXT BOOKS
1. MorHarchol - Balter, “Performance Modeling and Design of Computer Systems –
Queueing Theory in Action”, Cambridge University Press, 2013.
2. LievenEeckhout, “Computer Architecture Performance Evaluation Methods”, Morgan and
Claypool Publishers, 2010.
REFERENCES
1. Paul J. Fortier and Howard E. Michel, “Computer Systems Performance Evaluation and
Prediction”, Elsevier, 2003.
2. http://barbie.uta.edu/~jli/Resources/Resource%20Provisoning&Performance
%20Evaluation/17.pdf
OBJECTIVES:
The objective of Advanced Computer Networks is to cover theoretical topics in the areas of
advanced networking technologies, distributed computing.
REFERENCES:
1. Behrouz A. Forouzan, Data Communications and Networking, Fourth Ed., Tata McGraw
Hill, 2006.
2. Larry L. Peterson and Bruce S. Davie, Computer Networks: A Systems Approach, Fourth
Ed., Morgan Kaufmann, 2007.
3. Markus Hoffmann and Leland R. Beaumont, Content Networking: Architecture, Protocols,
and Practice, Morgan Kauffman, 2005.
4.http://www.cs.wayne.edu/~hzhang/courses/7290/Lectures/0-0%20-%20Course%20
plan.pdf
PROFESSIONAL ELECTIVE-V
OBJECTIVES:
The objective of This course is designed to all student understand about Medium Access
Control (MAC), Wireless LAN, Bluetooth.
UNIT – I INTRODUCTION 9
Medium access control – Telecommunication systems – Broadcast systems-SDMA-TDMA-
FDMA-TCP/IP-UDP.
UNIT – II STANDARDS 9
Wireless LAN: Features-Security standards –Protocol Stack- IEEE 802.11: Standards-
Architecture-Frame format-Features –HIPERLAN: Architecture-Standards – Bluetooth and Its
Application.
UNIT-IVNETWORK ISSUES 9
Mobile IP - DHCP - Mobile transport layer - Indirect TCP - Snooping TCP -Mobile TCP -
Transmission time-out freezing - Selective retransmission -Transaction oriented TCP.
TEXTBOOKS:
1. J. Schiller, “Mobile Communications”, 2nd Edition, Pearson Education, 2005.
2. William Stallings, “Wireless Communications and Networks”, Pearson Education, 2002
REFERENCES:
1. KavehPahlavan, PrasanthKrishnamoorthy, “Principles of Wireless Networks”, 1 stEdition,
Pearson Education, 2003.
2. UweHansmann, LotharMerk, Martin S. Nicklons and Thomas Stober, “Principles ofMobile
Computing”, Springer, 2003.
3. C.K.Toh, “AdHoc Mobile Wireless Networks”, First Edition, Pearson Education, 2002.
4. https://sgar91.files.wordpress.com/2011/10/mobile_communications_schiller_2e.pdf
OBJECTIVES:
The objective of the course is to provide students with a sound technical exposure to the
concepts, principles, Methods, and best practices in Database Design.
TEXT BOOKS:
1. C.S.R. Prabhu,”Object-Oriented Database Systems: Approaches and Architectures”, 2nd
edition., Prentice-Hall Of India Pvt. Limited, 2005.
2. Jan L. Harrington,”Object-oriented Database Design Clearly
Explained”,MorganKaughman,2000.
REFERENCES:
1. Abraham Silberschatz, Henry F.Korth, S. Sudharson, “Database System Concepts”, 6th
Edition, Tata McGraw Hill, 2011.
2.http://web.cs.wpi.edu/~cs561/s12/Lectures/2-3/OO.pdf
OBJECTIVES:
This course builds web applications using ASP and client side script technologies use with
Microsoft’s IIS.
UNIT – I FUNDAMENTALS 9
Introduction to the Web-Web enabling Technologies-Web Service Protocol-web Design
Concepts- Examining Good and Bad Web Design-Page Design Resources.
TEXT BOOK:
1. Deitel and Deitel, “Internet and World Wide Web-How to Program”, 3rd Edition, Pearson
Education, 2005.
REFERENCES:
1.N.P.Gopalan&J.Akilandeswari, “Web Technology: A Developer’s Perspective”, PHI
Learning,2008
2.JeffFrantzen and Sobotka, “Java Script”, Tata McGraw Hill, 2002.
3.JustinHunter,William Crawford, ”Java Servlet Programming”, O’Reilly Publications, 2 nd
Edition, 2001.
4.http://cdn.oreillystatic.com/oreilly/booksamplers/9781449319274_sampler.pdf
COURSE OUTCOMES (COs)
On completion of the course, the students will be able to
CO1 Create richly interactive environments natively within browsers.
CO2 Build web application frameworks which facilitate rapid application development.
CO3 Integrate web applications easily into other server-side web procedures, such as email and
searching.
CO4 Understand about web design concepts.
CO5 Learn various tools and concepts using to build web applications.
OPEN ELECTIVE-I
OBJECTIVES:
This course gives all students exposure to basics of PHP and gives knowledge on session
tracking and graphics using PHP.
TEXT BOOKS:
1. Matt Doyle,” Beginning PHP 5.3”,Wiley,2011.
2.AshishWilfred,Meeta Gupta and KartikBhatnagar with NIIT, ”PHP Professional Projects”,
Prentice Hall of India, 2002.
REFERENCES:
1. Kevin Tatroe, Peter MacIntyre, RasmusLerdorf ,”Programming PHP”,O’Rielley,2013.
2.RasmusLerdorf and Kevin Tatroe, “Programming in PHP”, O’Reilly and Associates, 2002.
3.http://www.infoap.utcluj.ro/multi/programming_PHP.pdf
OBJECTIVES:
This course gives Design a virtual environment and compelling virtual reality experience.
REFERENCES:
1. John Vince, “Virtual Reality Systems”, Pearson Education, 2005.
2. Adams, “Visualization of Virtual Reality”, Tata McGraw Hill, 2000.
3.http://www.cs.tut.fi/kurssit/SGN-5406/lectures/VR1-introduction.pdf
PT18OECS03 E COMMERCE L T P C
Total Contact Periods – 45 3 0 0 3
Prerequisite – Internet Programming ,Web Technology
Course Designed by – Dept. of Computer Science & Engineering
Category OE
Approval 47th Academic Council Meeting held in Aug, 2018
OBJECTIVES:
This course Discuss the current drivers and inhibitors facing the business world in adopting
and using Ecommerce.
REFERENCE BOOKS:
1. Kamlesh K Bajaj, Debjani Nag, “E-Commerce – The Cutting Edge of Business”, Tata
McGraw Hill, Second Edition, 2006
2. David Whitley, “E-Commerce: Strategy, Technologies and applications”, McGraw Hill,
2000.
3. Ravi Kalakota and Andrew B. Whinston, “Frontiers of Electronic commerce”, Pearson
Education, 2005.
4. Pete Loshin, Paul A. Murphy, “Electronic Commerce”, Jaico Publisher.
5. https://books.google.co.in/books?
id=Co8iBAAAQBAJ&printsec=frontcover&source=gbs_ge_summary_r&cad=0#v=o
nepage&q&f=false
OBJECTIVES:
This course gives an overview of High speed computer networks and TCP/IP protocols. It also
discusses the security and network management aspects.
UNIT-I HIGH SPEED NETWORKS 9
Introduction-frame relay networks –ATM protocol architecture-ATM logical connection –
ATM cells-ATM service categories -AAL- high speed LANS: the emergence of high speed
LANS-Ethernets-fiber channel-wireless LAN.
TEXTBOOKS:
1. Williams Stallings, ”High Speed networks and Internet Performance and Quality of
Service”, Pearson Second Edition, 2002.
2. KavenPahlavan and PrashantKrishnamoorthy, “Principles of Wireless Network”, Prentice
Hall Of India, 2010
3. Adrian Farrel,” The Internet and Its Protocols”, Elsevier Publications, 2011.
REFERNCES:
1. Behrouz A. Forouzan, “Data Communication and Computer Networking”, 4thedition, 2011.
2. Larry L. Peterson and Bruce S.Davie, ”Computer Networks”, Third edition, Elsevier
Publications, 2003.
3. http://www.kiv.zcu.cz/~ledvina/vyuka/PDS/PDS-tut/HighSpeedNetworks/hsn0101.pdf
OBJECTIVES:
To import knowledge of signal processing techniques for wireless communication.
TEXT BOOK:
1. K. Feher, Wireless Digital Communication, Prentice Hall of India, New Delhi, 1995.
REFERENCES:
1.T.S. Rappaport, Wireless Communication; Principles and Practice, Prentice Hall, NJ, 1996.
2. W.C.Y. Lee, Mobile Communication Engineering; Theory and Application, Second Edition,
McGraw-Hill International, 1998.
3. http://www.wileyindia.com/media/pdf/0471457124.pdf