Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

NBKR Institute of Science & Technology: Vidyanagar (Autonomous) Computer Science & Engineering

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 42

III/I (CSE -Scheme - 2019 Regulations)

NBKR INSTITUTE OF SCIENCE & TECHNOLOGY: VIDYANAGAR (AUTONOMOUS)


AFFILIATED TO JNTUA, ANANTAPURAMU
III YEAR OF FOUR YEAR B.TECH DEGREE COURSE – I SEMESTER
COMPUTER SCIENCE & ENGINEERING
SCHEME OF INSTRUCTION and EVALUATION
(With effect from the batch admitted in the academic year 2019-2020)
Evaluation
Instruction Credit Total
Course Title Max.
Hours/Week s Sessional Sessional Sessional End Semester
S. Course Total
Test-I Test-II Marks Examination
No Code Marks
(Max. 40)
Max. Max.
D/ Duration Duration Duration Max.
THEORY L T Marks Marks 100
P In Hours In Hours In Hours Marks
(24+6+10) (24+6+10)
1 19CS3101 Compiler Design 3 1 - 4 2 40 2 40 3 60 100
Object Oriented
2 19CS3102 3 - - 3 2 40 2 40 3 60 100
Analysis and Design
Cryptography and
3 19CS3103 3 - - 3 2 40 2 40 3 60 100
Network Security
0.8*Best of
Advanced Database
4 19CS3104 3 - - 3 2 40 2 40 two 3 60 100
Management Systems +
Professional Elective - 0.2*least of
1 two
19CS31E1 Software Architecture
5 3 - - 3 2 40 2 40 3 60 100
19CS31E2 Distributed system
19CS31E3 Web Technologies
19CS31E4 Cloud Computing
MC: Human Resource
Development and
6 3 - - - 2 40 2 40 3 60 100
Organizational
Behaviour
PRACTICALS
Object Oriented Day to Day
19CS31P Evaluation
7. 1
Analysis and Design - - 3 1.5 - - - 40 3 60 100
Lab and a test
8. 19CS31P Cryptography and - - 3 1.5 - - - 40 (40 Marks) 3 60 100
2 Network Security Lab
5
TOTAL 18 1 6 19 - 240 - 320 - 480 800

MC: Mandatory Course

6
19CS3101 - COMPILER DESIGN
Course Credits: 4
Professional Core
Category:
Course Theory Lecture-Tutorial-Practical: 3-1-0
Type:
Basics of Programming Sessional Evaluation: 40
Prerequisite: Languages and Theory of Univ. Exam Evaluation: 60
Computation. Total Marks: 100
 To make the student to understand the process involved in compilation.
 Creating awareness among students on various types of bottom up parsers.
Objectives
 Understand the syntax analysis, intermediate code generation, type checking, and
the role of symbol table etc.

Upon successful completion of the course, the students will be able to:
CO1 Understand the basics of Compiler Design and the role of Lexical Analyzer
CO2 Study various Syntax analyzers, grammar rules, SLR parsing techniques
CO3 Get exposure on syntax translation mechanisms to be motivated to develop
Course
interpreters or compiles.
Outcomes
CO4 Identify various storage allocation strategies, intermediate code generation and
their applicability
CO5 Acquire knowledge on code generation and Run-time storage Management
CO6 Explore the techniques for code optimization.
Course UNIT-I
Content Introduction to Compiling: Language Processors, Phases of a compiler, Cousins of the
Compiler. Grouping of phases, Compiler construction tools.

Lexical Analysis: Role of the Lexical analyzer, Input buffering, Specification of tokens,
Recognition of tokens, The Lexical analyzer Generator Lex.

UNIT-II
Syntax Analysis: Role of the parser, Context-free grammars, Writing a grammar, Top-
down parsing, Bottom-up parsing, Introduction to LR Parsing: Simple LR.

UNIT-III
Syntax Analysis: More Powerful LR Parsers, Using ambiguous grammars, Parser
generators.
Syntax-Directed Translation: Syntax-Directed Definitions, Evaluation Orders for
SDD's, Applications of Syntax-Directed Translation, Syntax-Directed Translation
Schemes, and Implementing L-Attributed SDD's.

UNIT-IV
Run-Time Environments: Storage organization, Stack Allocation of Space, Access to
Nonlocal Data on the Stack, Heap Management,Introduction to Garbage Collection.
Intermediate Code generation: Variants of Syntax Trees, Three-Address Code, Types
and Declarations, Type Checking.
UNIT-V
Code Generation: Issues in the Design of a code generator, The target Language, Run-
time storage management, Basic blocks and flow graphs, A simple code generator,
Register allocation and assignment.

5
UNIT-VI
Code Optimization: The principal source of optimization, Peephole Optimization,
Introduction to Data flow Analysis, Loops in flow graphs- Dominators, Depth-First
Ordering, Edges in a Depth- First Spanning Tree, Depth of a Flow Graph, Natural
Loops.
Text Books TEXT BOOKS
&
References 1. Compilers, Principles Techniques and Tools.Alfred V Aho, Monical S.
Books Lam, Ravi Sethi Jeffery D. Ullman,2nd edition,pearson,2007

REFERENCE BOOKS

1. Alfred V.Aho, Jeffrey D.Ullman, Principles of Compiler Design,Publications.


2. Compiler Design K.Muneeswaran, OXFORD
3. Principles of compiler design,2nd edition,Nandhini Prasad,Elsevier
4. Compiler Construction-Principles and Practice, Kenneth C Louden, Cengage
Learning

E-Resources 1. https://nptel.ac.in/courses
2. https://freevideolectures.com/university//iitm

6
19CS3102 - OBJECT ORIENTED ANALYSIS AND DESIGN

Course
Professional Core Credits: 3
Category:
Course Type: Theory Lecture - Tutorial - Practical: 3-0-0
Sessional Evaluation: 40
Require software engineering basics and
Prerequisite: Univ.Exam Evaluation: 60
fundamentals of object oriented features.
Total Marks: 100
 Specify, analyse and design the use case driven requirements for a particular
system.
 Model the event driven state of object and transform them into implementation
Objectives
specific layouts.
 Identify, analyse the subsystems, various components and collaborate them
interchangeably.

Upon successful completion of the course, the students will be able to:
CO1 Know the importance of modeling and principles, architecture and software
development life cycle.
CO2 Learn about the basics and advanced structural modeling techniques.
Course
CO3 Draw the class and object diagrams for various applications.
Outcomes
CO4 Gain knowledge about the basics of behavioral modeling and its applicability.
CO5 Learn the state, time and space issues and supporting applicability.
CO6 Study various component and deployment diagram properties for different
applications.
Course UNIT-I
Content Introduction to UML: The importance of modeling, Principles of modeling, Object
oriented modeling, A conceptual model of the UML, Architecture, Software
Development Life Cycle.

UNIT-II
Basic Structural Modeling: Classes, Relationships, Common Mechanisms and
Diagrams.

Advanced Structural Modeling1: Advanced Classes, Advanced Relationships.

UNIT-III
Advanced Structural Modeling2: Interfaces, Types and Roles, Packages.

Class & Object Diagrams: Terms and Concepts, Common Modeling techniques for
Class & Object Diagrams.

UNIT-IV
Basic Behavioral Modeling: Interactions, Interaction diagrams, Use cases, Use case
diagrams, Activity diagrams.

UNIT-V
Advanced Behavioral Modeling: Events and Signals, State machines, Process and
Threads, Time and Space, State chart diagrams.
5
UNIT-VI
Architectural Modeling: Components, Deployment, Component diagrams and
Deployment diagrams.
Text Books:
1. Grady Booch, James Rumbaugh, IvarJacobson: The Unified Modeling Language
Text Books User Guide, Pearson Education.
and Reference Books:
References: 1. Meilir Page-Jones: Fundamentals of Object Oriented Design in UML, Pearson
Education.
2. AtulKahate: Object Oriented Analysis & Design, The McGraw-Hill Companies.
1. https://nptel.ac.in/courses
E-Resources
2. https://freevideolectures.com/university/iitm

6
19CS3103 - CRYPTOGRAPHY & NETWORK SECURITY

Course
Professional Core Credits: 3
Category:
Course
Theory Lecture – Tutorial – Practical: 3-0-0
Type:
Knowledge in Computer security basics Sessional Evaluation: 40
Prerequisite: and counter attack mechanisms from Univ.Exam Evaluation: 60
Internet Threats. Total Marks: 100
 Understand OSI security architecture and classical encryption techniques.
 Acquire fundamental knowledge on the concepts of finite fields and number theory.
Objectives  Understand various block cipher and stream cipher models.
 Describe the principles of public key cryptosystems, hash functions, digital signature
and internet security.

Upon successful completion of the course, the students will be able to:
Understand the basics of Computer Security and conventional encryption
CO1
issues.
Know the different types of Data Encryption models of Symmetric Cipher
CO2
Techniques and required basic number theory.
Course Gain the knowledge in Data Encryption models of Advanced Symmetric
CO3
Outcomes Cipher Techniques.
Learn and able to design different types of Data Encryption models of
CO4
Asymmetric Cipher Techniques and required basic number theory.
Study the Data Integrity, authentication protocols and classification of digital
CO5
signature standards.
Acquire the knowledge of the Mutual Trust with Internet related security
CO6
mechanisms.
Course UNIT - I
Content
Introduction: Overview of Computer Security, Security Attacks, Security Services,
Security Mechanisms, A Model for Network Security.

Symmetric Ciphers: Classical Encryption Techniques: Symmetric Cipher Model,


Substitution Techniques, Steganography.

UNIT – II
Number Theory: Euclidean Algorithm, Modular arithmetic, Block Ciphers and the
Data Encryption Standard: Block Cipher Principles, DES, Strength of DES.

UNIT – III
Advanced Encryption Standard: The Origins AES, AES Structure, AES Round
Functions, AES Key Expansion, Block Cipher Operation: Electronic Codebook Mode,
Cipher Block Chaining Mode, Cipher Feedback Mode, Output Feedback Mode, Counter
Mode.

UNIT – IV

5
Asymmetric Ciphers: Number Theory: Prime and Relatively Prime Numbers,
Fermat’s and Euler’s theorems, Testing for Primality, Chinese Remainder Theorem, and
Discrete Logarithms, Public Key Cryptography: Principles of Public-key
Cryptosystems, The RSA Algorithm, Diffie-Hellman Key exchange, ElGamal
Cryptosystem.

UNIT – V
Cryptographic Data Integrity Algorithms: Cryptographic Hash Functions:
Applications ofCryptographic Hash Functions, Secure Hash Algorithm (SHA), Message
Authentication Codes: Message Authentication Requirements, Message Authentication
functions, Message Authentication Codes, Digital Signatures: Digital Signatures,
Digital Signature Standard (DSS).

UNIT – VI
Mutual Trust: Key Management and Distribution: Symmetric keyDistribution using
Symmetric Encryption, Symmetric keyDistribution using Asymmetric Encryption,
Distribution of Public Keys, X.509 Certificates.

Network and Internet Security:Transport-Level Security: Web Security issues,


Secure Sockets Layer (SSL), Transport Layer Security (TLS), HTTPS, Secure Shell
(SSH).
1. Cryptography and Network Security: Principles and Practice-William Stallings,
Text Books
6th Edition, Prentice Hall.
1. Network Security Essentials (Applications and Standards) by William Stallings,
Pearson Education.
References 2. Fundamentals of Network Security, by Eric maiwald.
3. Principles of Information Security by Whitman, Thomson.
4. Network Security - The Complete Reference by Robert Bragg.
1. WilliamStallings.com/Crypto/Crypto5e.html
E-Resources
2. www.Tutorialspoint.com

6
19CS3104 - ADVANCED DATABASE MANAGEMENT SYSTEMS

Course
Professional Core Credits: 3
Category:
Course
Theory Lecture – Tutorial – Practical: 3-0-0
Type:
Sessional Evaluation: 40
Prerequisite Require basics of database management
Univ. Exam Evaluation: 60
: system concepts.
Total Marks: 100
 To explain and evaluate the fundamental requirements that influences the design of
modern database systems.
 To assess and apply database functions and packages suitable for enterprise
Course database development.
Objectives  To evaluate alternative designs and architectures for databases and data warehouses
 To discuss various advanced methods of storing, managing and interrogating
complex data

Upon successful completion of the course, the students will be able to:
CO1 Study various database systems architectures, merits and demerits
CO2 Analyze parallel Databases to study various operations
Course CO3 Understand Distributed databases types, supporting environment and storage
Outcomes CO4 Acquire knowledge on Object Based Databases to develop different applications
Know the Enhanced E-R features and Advanced Application Developments in
CO5
Database
Specifies the Temporal and spatial Databases, and various transaction processing
CO6
methods to apply for various domains
Course UNIT – I
Content
Database-System Architectures: Centralized and Client–Server Architectures, Server
System Architectures, Parallel Systems, Distributed Systems and Network Types.

UNIT – II
Parallel Databases: I/O Parallelism, Interquery Parallelism, Intraquery Parallelism,
Intraoperation Parallelism, Interoperation Parallelism and Query Optimization.

UNIT – III
Distributed Databases: Homogeneous and Heterogeneous Databases, Distributed Data
Storages, Distributed Transactions, Commit Protocols, Concurrency Control in
Distributed Databases, Distributed Query Processing, Heterogeneous Distribute
Databases.

UNIT – IV
Object-Based Databases: Overview, Complex Data Types, Structured Types and
Inheritance in SQL, Table Inheritance, Array and Multiset Types in SQL, Object-
Identity and Reference Types in SQL, Implementing O-R Features, Persistent
Programming Languages, Object-Relational Mapping, Object-Oriented versus Object-
Relational.

5
UNIT – V
Database Design and the E-R Model: Extended E-R Features, Alternative Notations for
Modeling Data, Other Aspects of Database Design.

Advanced Application Development: Performance Tuning, Performance Benchmarks,


Other Issues in Application Development Standardization.

UNIT – VI
Spatial and Temporal Data and Mobility: Motivation, Time in Databases, Spatial and
Geographic Data, Multimedia Databases, Mobility and Personal Databases.

Advanced Transaction Processing: Transaction-Processing, Monitors Transactional


Workflows, E-Commerce, Main Memory Databases, Real-Time Transaction Systems.

Text Book:
1. Abraham Silberschatz Henry F.Korth S.Sudarshan “Database System Concepts”
Text Books Sixth Edition, PHI.
and Reference Books:
References 1. Raghuram Krishnan and Johnnes Gherke “Database Management System” Second
Edition.
2. Peter Rob, CarlosCoronel, A.Ananda Rao - “Database Management Systems”.
1. http://www.nptelvideos.in/2012/11/database-management-system.html
E-
2. http://www.cse.iitb.ac.in/infolab/Data/Courses/CS632/
Resources

6
19CS31E1 - SOFTWARE ARCHITECTURE

Course
Professional Elective Credits: 3
Category:
Course Type: Theory Lecture – Tutorial – Practical: 3-0-0
Sessional Evaluation: 40
Need to know the fundamentals of
Prerequisite: Univ.Exam Evaluation: 60
Software engineering
Total Marks: 100
 Understand basic software architecture requirements, views and patterns etc.
 Evaluate software architecture and quality attributes
Objectives  Select and use appropriate architectural styles
 Explore appropriate key architectural structures,tactics and methods
 Defining guidelines for documenting software Architecture

Upon successful completion of the course, the students will be able to:
Understand the basics of software architectural requirements, views, patterns and
CO1
influences on business and technical issues
Analyze the quality attributes and to apply the same to prepare the documentation
CO2
Course based on the suitability of attributes
Outcomes Specify the key structures, tactics and patterns to design and specify the
CO3
architecture.
Study different methods of agility and understand the business goals using other
CO4
methods including various design strategies
CO5 Prepare a document for a given architecture using views
CO6 Identify the factors that influence the management and governance
Course UNIT – I
Content Introduction to Software Architecture: Definitions, Architectural Structures and
Views, Patterns, What Makes a “Good” Architecture.

Importance of Software Architecture: System’s Quality Attributes, change and


prediction, communication enhancement, Design Decisions, Constraints, Influences,
Evolutionary Prototyping, Improving Cost and Schedule Estimates, Transferable,
Reusable Model, Independently Developed Components, Vocabulary of Design
Alternatives and Training.

UNIT – II
Context of Software Architecture: Technical Context, Project Life-Cycle, Business,
Professional, Stakeholders and influences.

Quality Attributes:Understanding quality attributes, Availability, Interoperability,


Modifiability, Performance and Security.

UNIT – III
Architectural Tactics and Patterns: Architectural Patterns, Overview, Relationships
between Tactics and Patterns.

Quality Attribute Modeling and Analysis : Modeling Architectures, Attribute Analysis


and Checklists, Experiments, Simulations, and Prototypes, Different Stages of the Life.

5
UNIT – IV
Architecture in Agile Projects: Overview, Agility and Architecture Methods,
examples, Guidelines for the Agile.

Architecture and Requirements: Gathering ASRs from Requirements Documents,


Stakeholders, Understanding the Business Goals, Utility Tree and Methods.

Designing an Architecture: Design Strategy, The Attribute-Driven Design Method and


supporting steps.

UNIT – V
Documenting Software Architectures: Uses and Audiences for Architecture
Documentation, Notations, and Views, Choosing and Combining Views, Building the
Documentation Package, Documenting Behavior, Architecture Documentation and
Quality Attributes.

Architecture, Implementation, and Testing: Architecture and Implementation,


Architecture and Testing.

Architecture Reconstruction and Conformance: Architecture Reconstruction Process,


View Extraction, Database Construction, View Fusion, Finding Violations and
Guidelines.

UNIT – VI

Architecture Evaluation: Evaluation Factors, Architecture Tradeoff Analysis Method


and Evaluation.
Management and Governance: Planning, Organizing, Implementing, Measuring and
Governance.
Architecture in the cloud: Basic cloud definitions, Service models and deployment
options, Economic justification, Base mechanisms, Sample Technologies, Architecture in
a cloud environment.
Text Book:
1. Len Bass, Paul Clements, Rick Kazman “Software Architecture in Practice”, Third
Edition, Addison Wesley Publishers, 2013.

Reference Books:
1. Mary Show, David Garlan, “S/W Arch. Perspective: on an Emerging
Text Books Discipline”, 1996, PHI.
and 2. Jeff Garland, Richard Anthony, “Large-Scale Software Architecture A Practical
References: Guide using UML”, John Wiley and Sons Ltd, 2003.
3. Oliver Vogel, Ingo Arnold, ArifChughtai, TimoKehrer “Software Architecture A
Comprehensive Framework and Guide for Practitioners”, Springer Publishers,
2009.
4. Ian Gorton, “Essential Software Architecture”, Second Edition, Springer
Publishers, 2011.

1. https://nptel.ac.in/courses
E-
2. https://freevideolectures.com/university/iitm
Resources

6
19CS31E2 - DISTRIBUTED SYSTEMS

Course
Professional Elective Credits: 3
Category:
Course
Theory Lecture – Tutorial – Practical: 3-0-0
Type:
Sessional Evaluation: 40
Student needs to have basic knowledge of
Prerequisite: Univ. Exam Evaluation: 60
any operating systems and networking.
Total Marks: 100
Course
 Understand foundations of Distributed Systems.
Objectives
 Ability to communicate between distributed objects.
 Introduce the idea of peer to peer services and various file systems.
 Understand the Security techniques used in distributed systems.

Upon successful completion of the course, the students will be able to:
CO1 Underdstand the basic characterization of distributed systems.
Enabling the basics of networking and internetworking with interprocess
CO2
communication.
Course
CO3 Understand the Communication between distributed objects.
Outcomes
CO4 Explore the architecture of distributed file systems.
Understand the peer to peer services withtransactions and concurrency
CO5
control.
CO6 Exposure to concurrency control in distributed transactions and security.

Course
Content UNIT-I
Characterization Of Distributed Systems: Introduction, Examples Of Distributed
Systems, Resource Sharing And Web, Challenges, System Models: Introduction,
Architectural And Fundamental Models.
UNIT-II
Networking And Internetworking: Types Of Network, Network Principles, Internet
Protocols, Case Studies: Ethernet, Wifi, Bluetooth And Atm.
Interprocess Communication: The Api For The Internet Protocols, Client-Server
Communication,Group Communication, Case Study: Interprocess Communication In
Unix.
UNIT-III
Distributed Objects And Remote Invocation: Communication Between Distributed
Objects, Remote Procedure Call, Events And Notifications, Case Study: Java Rmi.
Distributed File Systems: Introduction, File Service Architecture, Case Study- Sun
Network File Systems.

5
UNIT-IV
Distributed File Systems: Introduction, File Service Architecture, Case Study- Sun
Network File Systems.
Name Services: Introduction, Name Services And The Domain Name System, Case
Study Of The Global Name Service.
UNIT-V
Peer To Peer Systems: Introduction, Napster And Its Legacy, Peer To Peer
Middleware, Routing Overlays.
Transactions And Concurrency Control: Introduction, Transactions, Nested
Transactions, Locks, Optimistic Concurrency Control, Timestamp Ordering,
Comparison Of Methods For Concurrency Control.

UNIT-VI
Distributed Transactions: Flat And Nested Distributed Transactions, Atomic Commit
Protocols, Concurrency Control In Distributed Transactions, Distributed Deadlocks,
Transaction Recovery.
Security: Introduction, Overview Of Security Techniques, Cryptographic Algorithms,
Digital Signatures, Case Studies-Kerberos, 802.11 Wifi.
Text Books:

1. Distributed Systems Concepts and Design, G Coulouris, J Dollimore and T


Kindberg, Fourth Edition, Pearson Education.
2. Distributed Systems, S.Ghosh, Chapman and  Hall/CRC, Taylor & Francis
Group, 2010.
Text Books
and
Reference Books:
References
1. Distributed Computing, S.Mahajan and S.Shah, Oxford University Press.
2. Distributed Operating Systems Concepts and Design, Pradeep K.Sinha, PHI.
3. Advanced Concepts in Operating Systems, M Singhal, N G Shivarathri, Tata
McGraw-Hill Edition.

1. https://nptel.ac.in/courses
E-Resources
2. https://freevideolectures.com/uiversity/iitm

6
19CS31E3 - WEB TECHNOLOGIES
Course
Professional Elective Credits: 3
Category:
Course Lecture – Tutorial –
Theory 3-0-0
Type: Practical:
Sessional Evaluation: 40
Prerequisite Need to have the knowledge of any one
Univ.Exam Evaluation: 60
: programming language.
Total Marks: 100
 To introduce PHP language for server-side scripting.
 To introduce XML and processing of XML Data with Java.
Course
 To introduce Server-side programming with Java Servlets and JSP.
Objectives
 To introduce Client-side scripting with Javascript and AJAX.

Upon successful completion of the course, the students will be able to:
gain knowledge of client-side scripting, validation of forms with PHP
CO1
programming
Course CO2 Understand server-side scripting with PHP language
Outcomes CO3 Understand what XML is and how to parse and use XML Data with Java.
CO4 gain knowledge of client-side scripting, validation of forms with JS
CO5 To introduce Server-side programming with Java Servlets.
CO6 To introduce Server-side programming with JSP.
Course UNIT – I
Content Introduction to PHP: Declaring variables, data types, arrays, strings, operators,
expressions, control structures, functions, Reading data from web form controls like text
boxes, radio buttons, and lists etc., Handling File Uploads. Connecting to database
(MySQL as reference), executing simple queries, handling results, Handling sessions and
cookies

UNIT – II
File Handling in PHP: File operations like opening, closing, reading, writing,
appending, deleting etc. on text and binary files, listing directories.

UNIT – III
HTML Common tags: List, Tables, images, forms, Frames; Cascading Style sheets;
XML: Introduction to XML, Defining XML tags, their attributes and values, Document
Type Definition, XML Schemes, Document Object Model, XHTML Parsing XML Data
– DOM and SAX Parsers in java.

UNIT – IV
Client-side Scripting: Introduction to Javascript, Javascript language – declaring
variables, scope of variables, functions. event handlers (onclick, onsubmit etc.),
Document Object Model, Form validation.

UNIT – V
Introduction to Servlets: Common Gateway Interface (CGI), Life cycle of a Servlet,
deploying a servlet, The Servlet API, Reading Servlet parameters, Reading Initialization
parameters, Handling Http Request & Responses, Using Cookies and Sessions,
connecting to a database using JDBC.
UNIT-VI
Introduction to JSP: The Anatomy of a JSP Page, JSP Processing, Declarations,
5
Directives, Expressions, Code Snippets, implicit objects, Using Beans in JSP Pages,
Using Cookies and session for session tracking, connecting to database in JSP.

TEXT BOOKS:

1. Web Technologies, Uttam K Roy, Oxford University Press


2. The Complete Reference PHP — Steven Holzner, Tata McGraw-Hill

REFERENCES:
Text Books
1. Web Programming, building internet applications, Chris Bates 2″ edition, Wiley
and
Dreamtech
References:
2. Java Server Pages —Hans Bergsten, SPD O’Reilly,
3. Java Script, D.Flanagan
4. Beginning Web Programming-Jon Duckett WROX.
5. Programming world wide web, R.W.Sebesta, Fourth Edition, Pearson.
6. Internet and World Wide Web — How to program. Dietel and Nieto, Pearson.

1. https://nptel.ac.in/courses
E- 2. https://freevideolectures.com/university/iitm
Resources

6
19CS31E4 - CLOUD COMPUTING
Course
Professional Elective Credits: 3
Category:
Course
Theory Lecture – Tutorial – Practical: 3-0-0
Type:
.Operating Systems, Internet, Network Sessional Evaluation: 40
Prerequisite: Security, Parallel Processing, Databases Univ.Exam Evaluation: 60
and various computing. Total Marks: 100
 To introduce the broad perceptive of cloud architecture and model
 To understand the concept of Virtualizationand familiar with the lead players in
Course cloud.
Objectives  To understand the features of cloud simulator and apply different cloud
programming model as per need.
 To design of cloud Services and explore the trusted cloud Computing system

Upon successful completion of the course, the students will be able to:
CO1 Know basic idea about cloud computing vision and its developments.
Course CO2 To learn taxonomy of Virtualization techniques in Cloud.
Outcomes CO3 To understand categories of cloud and its collaborative services.
CO4 To study internal components and structure of Cloud models.
CO5 To acquire knowledge on Aneka Cloud Application Platform.
CO6 Explore various real time applications & cloud platforms in industry.
Course UNIT – I
Content
Introduction to Cloud: Cloud Computing at a Glance, The Vision of Cloud Computing,
Defining a Cloud, A Closer Look, Cloud Computing Reference Model. Characteristics
and Benefits, Challenges Ahead, Historical Developments.

UNIT – II
Virtualization: Introduction, Characteristics of Virtualized Environment, Taxonomy of
Virtualization Techniques, Virtualization and Cloud computing, Pros and Cons of
Virtualization, Technology Examples- VMware and Microsoft Hyper-V.

UNIT – III
Cloud Computing Architecture : Introduction, Cloud Reference Model, Architecture
,Infrastructure / Hardware as a Service, Platform as a Service, Software as a Service,
Types of Clouds, Public Clouds, Private Clouds, Hybrid Clouds, Community Clouds,
Economics of the Cloud, Open Challenges, Cloud Interoperability and Standards,
Scalability and Fault Tolerance.

UNIT – IV
Defining the Clouds for Enterprise: Storage as a service, Database as a service,
Process as a service, Information as a service, Integration as a service and Testing as a
service. Scaling a cloud infrastructure - Capacity Planning, Cloud Scale. Disaster
Recovery: Disaster Recovery Planning, Disasters in the Cloud, Disaster Management.

5
UNIT – V
ANEKA: Cloud Application Platform Framework Overview, Anatomy Of The Aneka
Container, From The Ground Up: Platform Abstraction Layer, Fabric Services,
Foundation Services, Application Services, Building Aneka Clouds, Infrastructure
Organization, Logical Organization, Private Cloud Deployment Mode, Public Cloud
Deployment Mode, Hybrid Cloud Deployment Mode

UNIT – VI
Cloud Applications: Scientific Applications – Health Care, Geoscience And Biology.
Business And Consumer Applications- Crm And Erp, Social Networking, Media
Applications And Multiplayer Online Gaming.
Cloud Platforms in Industry: Amazon Web Services- Compute Services, Storage
Services, Communication Services and Additional Services. Google App Engine-
Architecture and Core Concepts, Microsoft Azure- Azure Core Concepts, SQL Azure.
Text Book:
1. Mastering Cloud Computing by Rajkumar Buyya, Christian
Vecchiola,S.Thamarai Selvi from TMH 2013.
Text Books
Reference Books:
and
1. George Reese, “Cloud Application Architectures: Building Applications and
References:
Infrastructure in the Cloud” O'Reilly
2. Toby Velte, Anthony Velte, Robert Elsenpeter, “Cloud Computing, A Practical
Approach”, TMH, 2009.
1. https://nptel.ac.in/courses
E-Resources
2. https://freevideolectures.com/university/iitm

6
MC: HUMAN RESOURCE DEVELOPMENT AND ORGANIZATIONAL BEHAVIOUR

5
19CS31P1 - OBJECT ORIENTED ANALYSIS AND DESIGN LABORATORY
Course
Professional Core Credits: 1.5
Category:
Lecture – Tutorial –
Course Type: Laboratory 0-0-3
Practical:
Sessional Evaluation: 40
Knowledge in any object oriented programming
Prerequisite: Univ. Exam Evaluation: 60
language is required.
Total Marks: 100
To draw various UML diagrams and supporting relationships to explore the design
Objectives
and behavior of different applications

Upon the successful completion of the course, the students will be able to:
Course
Outcomes Develop suitable UML diagrams for various applications or domains as and when
CO1
required.

1. Student Marks Analysis System (Draw the Class diagram).


2. Library Management System (draw the Collaboration diagram).
3. Medical Expert System (Draw the Activity diagram).
Course
4. Course Registration System (Draw the Class and Activity diagram).
Content
5. Order Processing System (Draw the Sequence diagram).
6. Online Railway Ticket Reservation System (Draw the Class and
Sequence diagram).

TEXT BOOK(S):
1. Grady Booch, James Rumbaugh, IvarJacobson: The Unified Modeling Language
Text Books User Guide, Pearson Education.
and REFERENCE BOOKS:
References 1. Meilir Page-Jones: Fundamentals of Object Oriented Design in UML, Pearson
Education.
2. AtulKahate: Object Oriented Analysis & Design, The McGraw-Hill Companies.
1. https://nptel.ac.in/courses
E-Resources 2. https://freevideolectures.com/university/iitm

5
19CS31P2 - CRYPTOGRAPHY AND NETWORK SECURITY LABORATORY
Course
Professional Core Credits: 1.5
Category:
Course Type: Practical Lecture - Tutorial - Practical: 0-0-3
Sessional Evaluation: 40
Knowledge in Computer Fundamentals and Basic
Prerequisite: Univ.Exam Evaluation: 60
Mathematical Fundamentals.
Total Marks: 100

 To learn and practice the essentials of Encryption and Decryption Procedureof


Objectives
Cryptography.

Upon successful completion of the course, the students will be able to:
Course
Outcomes CO1 Understand the basics of Encryption and Decryption Procedure of
Cryptography.
1. Write a Program for Caesar Cipher in Substitution Techniques.
5. Write a Program for Playfair Cipher in Substitution Techniques.
6. Write a Program for Hill Cipher in Substitution Techniques.
Course 7. Write a Program for One-Time pad in Substitution Techniques.
Content 8. Write a Program for RSA.
9. Write a Program for S-DES Algorithm.
10. Write a Program for Diffie-Hellman Algorithm.
11. Write a Program forElGamal Cryptosystem.
Text Books:
1. Cryptography and Network Security: Principles and Practice-William Stallings,
6th Edition, Prentice Hall
Text Books Reference Books:
and
References: 1. Network Security Essentials (Applications and Standards) by William Stallings,
Pearson Education.
2. Fundamentals of Network Security, by Eric maiwald.
3. Principles of Information Security by Whitman, Thomson.
4. Network Security - The Complete Reference by Robert Bragg

5
III/II (CSE - Scheme - 2019 Regulations)
NBKR INSTITUTE OF SCIENCE & TECHNOLOGY: VIDYANAGAR (AUTONOMOUS)
AFFILIATED TO JNTUA, ANANTAPURAMU
III YEAR OF FOUR YEAR B.TECH DEGREE COURSE – II SEMESTER
COMPUTER SCIENCE & ENGINEERING
SCHEME OF INSTRUCTION and EVALUATION
(With effect from the batch admitted in the academic year 2019-2020)
Evaluation
Instruction Credit Total
Course Title Max.
Hours/Week s Sessional Sessional Sessional End Semester
S. Course Total
Test-I Test-II Marks Examination
No Code Marks
(Max. 40)
Max. Max.
D/ Duration Duration Duration Max.
THEORY L T Marks Marks 100
P In Hours In Hours In Hours Marks
(24+6+10) (24+6+10)
1 Management Science 3 - - 3 2 40 2 40 3 60 100

2 19CS3201 Internet of Things 3 - - 3 2 40 2 40 3 60 100

3 19CS3202 Artificial Intelligence 3 1 - 4 2 40 2 40 3 60 100


0.8*Best of
Data Warehousing and
4 19CS3203 3 - - 3 2 40 2 40 two 3 60 100
Data Mining
+
Professional Elective - 0.2*least of
2 two
Software Project
19CS32E1
Management
5 3 - - 3 2 40 2 40 3 60 100
19CS32E2 R Programming
High Performance
19CS32E3
Computing
19CS32E4 Wireless Networks
AC-Professional Ethics
6 2 - - - 2 40 2 40 3 60 100
and Life Skills
PRACTICALS
19CS32M
7. P Mini Project - - 4 2 - - - 40 - 60 100
19CS32P Day to Day
8. 1 Internet of Things Lab - - 3 1.5 - - - 40 3 60 100
Evaluation
19CS32P Data Warehousing and and a test
9. - - 3 1.5 - - - 40 3 60 100
2 Data MiningLab (40 Marks)
TOTAL 17 1 10 21 - 240 - 360 - 540 00
6
AC:Audit Course

7
MANAGEMENT SCIENCE

8
19CS3201 - INTERNET OF THINGS

Course
Professional Core Credits: 3
Category:
Lecture – Tutorial –
Course Type: Theory 3-0-0
Practical:
Sessional Evaluation: 40
Require Data communication and
Prerequisite: Univ. Exam Evaluation: 60
networking fundamentals
Total Marks: 100
 To study about the fundamentals of Internet of Things, protocols used, its
applications, programming language used and the programming about Raspberry
Objectives
Pi kit.
 To study about the latest advancement in the Internet of Things

Upon the successful completion of the course, the students will be:
CO1 Knowing about the definition and characteristics of Internet of Things
Able to distinguish between IoT and M2M and also manages IoT Systems using
CO2
NETCONG protocol and YANG Data modeling Language
Designing an IoT system independent of any specific product / programming
Course CO3
language
Outcomes Knowledgeable about IoT Devices and Endpoints like Raspberry Pi, pcDuino,
CO4 Cubieboard etc. and also makes some case studies on IoT Role in Environment,
Agriculture etc.
Good at deciding which Framework / Cloud Service to use for a specific IoT
CO5
Application.
CO6 Well conversant with a few tools like Chef and Puppet used in IoT
Course
Content UNIT – I
Introduction and Concepts:
Introduction – Definition and characteristics of IoT, Physical design of IoT – IoT
protocols, Logical design of IoT – Functional Communication models, communication
API’s, IoT Enabling Technologies: Wireless Sensor Networks, Cloud Computing, Big
Data Analytics, Communication Protocols, Embedded Systems, IoT Levels &
Deployment (6 levels)

UNIT – II
IoT and M2M:
Introduction- Differences between IoT and M2M, Software Defined Networking and
Network Function Virtualization
IoT System Management:
Need for IoT Systems Management, SNMP and its limitations, Network Operator
Requirements, NECONF, YANG, IoT Systems Management with NETCONF-YANG,
NETOPPER Tools

UNIT – III

9
Design Methodology of IoT Platforms:
Introduction, Specification of: Purpose and Requirements, the process, Domain and
Information Models, Service, IoT Levels, Functional and Operational Views. Device
and Component Integration, Application Development. Weather Monitoring IoT
System: Case Study, Why Python Language for IoT?

UNIT – IV
IoT Physical Devices and Endpoints:
Basic building blocks of an IoT Device, Exemplary Device: Raspberry Pi, About the
Board, Linux on Raspberry Pi, Rapberry Pi Interfaces, Programming Raspberry Pi with
Python, other IoT devices – pcDuino, BeagleBone Black, Cubieboard.
Case Studies Illustrating IoT Design:Cities – Smart Parking, Environment – Air
Pollution Monitoring, Agriculture – Smart Irrigation

UNIT – V
IoT Physical Servers and Cloud Offerings:
Introduction, WAMP and AutoBahn Framework for IoT, Xively loud for IoT, Django
the WebApp Framework, Designing RESTful web API (Extension over Django),
Amazon Web Services for IoT – EC2 and AutoScaling, S3, RDS, SQS and EMR,
SkyNet IoT Messaging Platform.

UNIT – VI
Tools for IoT:
Python Packages of interest for IoT – JSON, XML, HTTPLib, & URLib, SMTPLib.
Tools For IoT: Setting up Chef and Puppet, Multi-tier Application Deployment creation
using Chef and Puppet (comprising of HAProxy, Load Balancer, Django App Server
and MongoDB Database Server). Steps for IoT Device Management with NETCONF-
YANG and Smart Irrigation Management Case Study with the same.

TEXT BOOK(S):
1. Vijay madisetti and ArshdeepBahga,”Internet of Things: Introduction to a New
Age of Intelligence”, First edition, Apress Publications 2013
Text Books
and
References REFERENCE BOOKS:
1. Jan Holler, Vlasios Tsiatsis, Catherine Mulligan, Stefan Avesnd, Stamatis
Kamouskos, Dvaid Boyle, “From Machine-toMachine to the Internet of Things:
Introduction to a New Age of Intelligence”, First edition, Academic Press, 2014
1. https://nptel.ac.in/courses/106105166/
E-Resources 2. https://onlinecourses.nptel.ac.in/noc17_cs22/preview

10
19CS3202 - ARTIFICIAL INTELLIGENCE

Course
Professional Core Credits: 4
Category:
Course Type: Theory Lecture – Tutorial – Practical: 3-1-0
Fundamentals of Networking, Analytical Sessional Evaluation: 40
Prerequisite: capabilities and logic orientations are Univ. Exam Evaluation: 60
required Total Marks: 100
 To apply knowledge of computing and mathematics appropriate to the discipline.
 To analyze a problem, and identify and define the computing requirements
Objectives appropriate to its solution.
 To design, implement, and evaluate a computer-based system, process, component,
or program to meet desired needs.

Upon the successful completion of the course, the students will be able to:
Understand the basics of AI and study different types of supporting agent
CO1
characteristics
Course Know various Problem solving agents and their behavior in real-world
CO2
Outcomes environment
CO3 Understand and apply the fundamentals of AI search algorithms
CO4 Know various knowledge representation techniques and its applicability
CO5 Observe different Learning techniques for future implementation
CO6 Know the concepts of Knowledge in explanation based learning and utilization
Course
Content UNIT – I

Introduction: Overview on A.I, History , The state of the Art, Intelligent Agents -
Agents and Environments, Good behavior, The nature of Environments, the Structure of
Agents.
UNIT – II

Problem Solving: Problem solving agents, toy problems, Real-world problems,


searching for solutions.
Uninformed Search strategies: BFS, DFS, Depth-limited search.

UNIT – III

Informed Search strategies: GBFS, A* search, Local search algorithms: Hill-climbing.


Constraint Satisfaction Problems: Constraint Satisfaction Problems, Backtracking
Search for CSPs, Local search for CSPs.

UNIT – IV

Adversarial Search: Games, optimal decision in games, Alpha-Beta pruning, Imperfect,


Real-Time Decisions, Knowledge and reasoning: Logical Agents: Knowledge -based
Agents, The WUMPUS world, Logic, Propositional Logic, Reasoning Patterns in
Propositional logic. First-order Logic: Syntax and Semantics of First-Order Logic.

11
UNIT – V

Learning: Learning from Observations- Forms of Learning, Inductive Learning,


Learning Decision Trees, and Ensemble Learning.

UNIT – VI

Knowledge in Learning: A Logical formulation of learning, knowledge in learning,


Explanation-Based Learning, Learning using Relevance Information.
TEXT BOOK(S):
1. Artificial Intelligence- A Modern Approach, Stuart Russell, Peter Norvig (Person
Education), 2nd edition.
Text Books REFERENCE BOOKS:
and
References 1. Artificial Intelligence- Rich E & Knight K (TMH), 4th edition.
2. Artificial Intelligence Structures and Strategies complex problem Solving –
George F. Lugar Pearson Education.
3. D.W. Patterson, “Introduction to AI and Expert Systems”, PHI, 1992...
4. R.J. Schalkoff, “Artificial Intelligence - an Engineering Approach”, McGraw Hill
Int. Ed., Singapore, 1992.
1. https://nptel.ac.in/courses
E-Resources
2. https://freevideolectures.com/university/iitm

12
19CS3203 - DATA WAREHOUSING AND DATA MINING

Course
Professional Core Credits: 3
Category:
Course Type: Theory Lecture – Tutorial – Practical: 3-0-0
Sessional Evaluation: 40
Require knowledge on Database
Prerequisite: Univ. Exam Evaluation: 60
Management System concepts.
Total Marks: 100
 Learn the basic concepts of data warehousing and data preprocessing concepts
Objectives  Explore the data mining and data classification, prediction and clustering
techniques for various applications.

Upon the successful completion of the course, the students will be able to:
CO1 Know the importance of Data warehousing and Development methodologies
Explore on Data warehousing design and modeling concepts for application
CO2
development
Course CO3 Learn the Implementation of ETL Process.
Outcomes CO4 Understand data mining and data-preprocessing techniques
Identify the importance of Mining Frequent Patterns. to study various
CO5
regression methods
Study the classification and prediction, Cluster analysis and supporting major
CO6 categories including outer analysis concepts to explore on various
applications
Course UNIT – I
Content
Introduction to Data Warehousing: Introduction, Data Warehouse, Data
Warehousing, Framework of the Data Warehouse, Data Warehouse Options,
Developing Data Warehouses, The Data Warehouse Development Life Cycle, Data
Warehouse Development Methodologies.

UNIT – II
Data Warehouse Design & Modeling: Defining Dimensional Model, Granularity of
Facts, Additivity of Facts, Functional Dependency of the Data, Slowly changing
dimensions types, implementing rapidly changing Dimensions, Multi-use Dimensions,
Designing: Identifying the source, Data Warehouse Architecture (ETL process).

UNIT – III
Implementation of ETL Process: Extract Processing, Interface Processing, Load into
Staging, Transform and Prepare for Load, Load Process, Post Load Processing, Generic
warehouse Population function.

UNIT – IV
Introduction to Data Mining: Data Mining, Architecture of Data Mining, Data
Mining Functionalities, Classification of Data Mining Systems, Data Mining Task
Primitives, Major issues in Data Mining.

Data Pre-processing: Data Cleaning, Data Integration and Transformation, Data


Reduction, Discretization and Concept Hierarchy Generation.
13
UNIT – V
Attribute-Oriented Induction: Characterization and Discrimination: Attribute-
Oriented Induction for Data Characterization, mining class discriminations,
presentation of both characterization and discrimination.

Mining Frequent Patterns, Associations and Correlations: Basic concepts and a


Road Map, the Apriori Algorithm, Generating Association Rules, improving the
efficiency of Apriori, Mining Frequent Item sets without Candidate Generation.

UNIT – VI
Classification and Prediction: Issues regarding Classification and prediction,
Decision Tree induction, Bayes’ theorem, Naive Bayesian classification, Regression
Methods.
Cluster Analysis: Types of Data in clustering, Classification of Major Clustering
Methods.
Outlier Analysis: Types of Outliers, Classification of Major Outlier Analysis.

TEXT BOOKS:
1. Data Warehousing Design, Development and Best Practices, Soumendra
Mohanty, TMH.
2. Data Mining Concepts and Techniques, Jiawei Han and Micheline Kamber,
Text Books Morgan Kaufman Publications, 2nd Edition.
and REFERENCE BOOKS:
References 1. Data Mining Introductory and Advanced Topics, Margaret H Dunhan, Pearson
Education.
2. Data Mining, Ian H. Witten Eibe Frank, Morgan Kaufman Publications.
3. The Data Warehouse Life Cycle Toolkit, Ralph Kimball, WILEY Computer
publishing.
1. https://nptel.ac.in/courses
E-Resources 2. https://freevideolectures.com/university/iitm

14
19CS32E1 - SOFTWARE PROJECT MANAGEMENT

Course
Professional Elective Credits: 3
Category:
Course
Theory Lecture – Tutorial – Practical: 3-0-0
Type:
Student need to have knowledge in Sessional Evaluation: 40
Prerequisite: Univ. Exam Evaluation: 60
Software engineering Total Marks: 100
 To study how to plan and manage projects at each stage of the software
development life cycle (SDLC)
 To train software project managers and other individuals involved in software
Objectives project planning and tracking and oversight in the implementation of the
software project management process.
 To understand successful software projects that support organization’s strategic
goals

Upon successful completion of the course, the students will be able to:
Understand the basics of software organization as related to project and
CO1
process management.
Course CO2 Recognize the basic capabilities of software project.
Outcomes CO3 Procure the basic steps of project planning and project management.
CO4 Compare and differentiate organization structures and project structures
CO5 Employ the responsibilities for tracking the software projects.
CO6 Able to track the process automation and project control.
Course UNIT – I
Content
Conventional Software Management: The waterfall model, conventional software
Management performance.

Evolution of Software Economics: Software Economics, pragmatic software cost


estimation.
UNIT – II
Improving Software Economics: Reducing Software product size, improving software
processes, improving team effectiveness, improving automation, Achieving required
quality, peer inspections.

The old way and the new: The principles of conventional software Engineering,
principles of modern software management, transitioning to an iterative process.

UNIT – III
Life cycle phases: Engineering and production stages, inception, Elaboration,
construction, transition phases.

Artifacts of the process: The artifact sets, Management artifacts, Engineering artifacts,
programmatic artifacts.

UNIT – IV

15
Model based software architectures: A Management perspective and technical
perspective.

Work Flows of the process: Software process workflows, Iteration workflows.


Checkpoints of the process: Major mile stones, Minor Milestones, Periodic status
assessments.

UNIT – V
Iterative Process Planning: Work breakdown structures, planning guidelines, cost and
schedule estimating, Iteration planning process, Pragmatic planning.

Project Organizations And Responsibilities: Line-Of-Business Organizations, Project


Organizations, Evolution Of Organizations.

UNIT –VI
Process Automation: Automation Building Blocks, The Project Environment.
Tailoring The Process: Process Discriminants.
Project Control And Process Instrumentation: The Seven Core Metrics, Management
Indicators, Quality Indicators, Life Cycle Expectations, Pragmatic Software Metrics,
Metrics Automation.

Text Books:
1. Software Project Management, Walker Royce: Pearson Education, 2005.

Text Books Reference Books:


and 1. Software Project Management, Bob Hughes and Mike Cotterell: Tata McGraw-
References:
Hill Edition.
2. Software Project Management, Joel Henry, Pearson Education.
3. Software Project Management in practice, Pankaj Jalote, Pearson
Education.2005.

1. https://nptel.ac.in/courses
E-Resources
2. https://freevideolectures.com/university/iitm

16
19CS32E2 - R PROGRAMMING

Course
Professional Elective Credits: 3
Category:
Lecture – Tutorial –
Course Type: Theory 3-0-0
Practical:
Require fundamental knowledge in any Sessional Evaluation: 40
Prerequisite: programming language, mathematics and Univ. Exam Evaluation: 60
statistical techniques Total Marks: 100
 Gain a foundational understanding of R Programming basics
Course
 Master the R programming and understand how various constructs are
Objectives
implemented in complex problems and applications

Upon the successful completion of the course, the students will be able to:
CO1 Understand the fundamental building blocks of R programming
CO2 Learn some of the commands and packages to develop simple programs
Course CO3 Acquire knowledge of Various storage and retrieval techniques and applicability
Outcomes Study various types of viewing and forms of data objects for application
CO4
development
CO5 Adapt different types of testing methodologies and supporting comparative study
Get the clear view of how to analyze methods using graphical representations
CO6
based on statistical data
Course
Content UNIT – I

Introduction to R programming: History of R programming, Reserved words of R,


Variables and constants of R, Operators of R, precedence and association of R, data
types in R. Decision making statements in R programming. Iterative statements
,functions ,strings, arrays, vectors, lists, matrices, factors ,data frames, data reshaping
and data interfacing.

UNIT – II

R-command packages: Standard Command Packages, Getting Extra Packages of R


Commands-Installing Extra Packages for Windows, Running and Manipulating
Packages , Loading Packages, Windows-Specific Package Commands.

UNIT – III

Simple Math: Use R Like a Calculator, Storing the Results of Calculations.


Reading and Getting Data into R: Using the combine Command for Making Data,
Entering Numerical and Text Items as Data, Scan Command for Making Data.
Reading Bigger Data Files: read.csv () Command, Other Commands for Reading Data
in R, Missing Values in Data Files.

UNIT – IV

Viewing Named Objects: Viewing Previously Loaded Named-Objects-Viewing All


Objects, Viewing Only Matching Names and Removing Objects from R.
Manipulating Objects: Manipulating Vectors, Manipulating Matrix and Data Frames,
Manipulating Lists.
17
Constructing Data Objects: Making Lists, Making Data Frames, Making Matrix
Objects.
Forms of Data Objects: Testing and Converting , Testing to See What Type of Object
You Have , Converting from One Object Form to Another , Convert a Matrix to a Data
Frame, Convert a Data Frame into a Matrix, Convert a Data Frame into a List and
Convert a Matrix into a list.

UNIT – V

Simple Hypothesis Testing: Using the Student’s t-test, Two-Sample t-Test with
Unequal Variance, Two-Sample t-Test with Equal Variance, One-Sample t-Testing,
Using Directional Hypothesis Formula, Syntax and Sub setting Samples in the T-Test.
The Wilcoxon U-Test (Mann-Whitney): Two-Sample U-Test, One-Sample U-Test,
Using Directional Hypotheses, and Formula Syntax and Sub setting Samples in the U-
test.
Paired t- and U-Tests : Correlation and Covariance , Simple Correlation, Covariance,
Significance Testing in Correlation Tests and Formula Syntax

UNIT – VI

Introduction to Graphical Analysis:


Box-whisker Plots :Basic Box plots, Customizing Box plots, Horizontal Box plots,
Scatter Plots: 2 Basic Scatter Plots, Adding Axis Labels, www. Plotting Symbols,
Setting Axis Limits, Using Formula Syntax, Adding Lines of Best-Fit to Scatter Plots.
Pairs Plots: (Multiple Correlation Plots) Line Charts , Line Charts Using Numeric
Data , Line Charts Using Categorical Data, Pie Charts , Cleveland Dot Charts . Bar
Charts: Single-Category Bar Charts and Multiple Category Bar Charts.

TEXT BOOK(S):
1. Beginning R, the statistical programming language by Dr Mark Gardener.
REFERENCE BOOKS:
Text Books 1. “R Programming for Beginners: Fast and Easy Learning” by Steven
and Keller,Kindle Edition.
References
2. “A Handbook of Statistical Analyses Using R” by Brian Everitt and Torsten
Hothorn.
3. “R Graphics Cookbook” by Winston Chang.
1. https://nptel.ac.in/courses
E-Resources 2. https://freevideolectures.com/university/iitm

18
19CS32E3 - HIGH PERFORMANCE COMPUTING

Course
Professional Elective Credits: 3
Category:
Course Type: Theory Lecture – Tutorial – Practical: 3-0-0
Sessional Evaluation: 40
Need to have a basic knowledge in parallel
Prerequisite: Univ. Exam Evaluation: 60
and computing techniques.
Total Marks: 100
 Understanding basic concepts, architecture and theoretical models of parallel
computers.
Objectives
 Importance of compiler transformations, key issues and performance evaluation
in parallel operating systems.

Upon the successful completion of the course, the students will be able to:
CO1 Explore the need for parallel computers and supporting types of instructions
Course CO2 Create awareness of structure of parallel computers
Outcomes CO3 Study different types of parallel algorithms and their applicability
CO4 Acquire knowledge on compiler transformations for parallel computers.
CO5 Understand various operating systems for parallel computers
CO6 Study the performance evaluation of parallel computers
Course
Content UNIT – I

Introduction – Introduction to Parallel Computers, Utilizing Temporal Parallelism,


Utilizing Data Parallelism, Comparison, Data Parallel Processing with Specialized
Processors.
Instruction Level Parallel Processing - Pipelining, Delays, Difficulties, Superscalar
Processors, Multithreaded Processors, Future Processor Architecture.

UNIT – II

Structure of Parallel Computer - Classifications, Vector Supercomputer, Array


Processors, Systolic Array Processors, Shared Memory Parallel Computers,
Interconnection Networks, Distributed Shared Memory Parallel Computers, Message
Passing Parallel Computers, Cluster of Workstations.

UNIT – III

Parallel Algorithms- Models of Computation, Analysis of Parallel Algorithms, Prefix


Computation, Sorting, Searching, Matrix Operations, Practical Models of Parallel
Computations.

UNIT – IV

Compiler Transformations for Parallel Computers - Issues in Compiler


Transformations, Target Architecture, Dependence Analysis, Transformations,
Transformations for Parallel Computers, Fine Grained Parallelism, Transformation
Framework, Parallelizing compilers.

19
UNIT – V

Operating Systems for Parallel Computers - Resource Management, Process


Management, Process Synchronization, Interprocess Communication, Memory
Management, Input / Output Disk Arrays.

UNIT – VI

Performance Evaluation of Parallel Computers - Basics of Performance Evaluation,


Sources of Parallel Overhead, Speedup Performance Laws, Scalability Metric, and
Performance Analysis.
TEXT BOOK:
1. Parallel Computers: Architecture and Programming, V.Rajaraman and C.Sivaram
Murthy, Prentice-Hall of India private Ltd., 2000.
Text Books
REFERENCES:
and
1. The Design and Analysis of Parallel Algorithms, SelimG.Akl, Prentice Hall
References
International Inc, 1989.
2. Computer Architecture and Parallel Processing, Hwang K. Briggs F.A.McGraw
Hill – 1985.
1. https://nptel.ac.in/courses
E-Resources 2. https://freevideolectures.com/university/iitm

20
19CS32E4 - WIRELESS NETWORKS

Course
Professional Elective Credits: 3
Category:
Course Type: Theory Lecture – Tutorial – Practical: 3-0-0
Sessional Evaluation: 40
Need to have basics of computer
Prerequisite: Univ.Exam Evaluation: 60
networks
Total Marks: 100
Course  To make the student understand the concepts of Wireless networks
Objectives  To make the student take up further research as part of his higher studies

Upon successful completion of the course, the students will be able to:
CO1 Understand the basics of wireless networks
Course CO2 Learn various types of wireless networks
Outcomes CO3 Study the basics of wireless internet & Ad Hoc wireless networks
CO4 Expose to the Quality of service standards in wireless network
CO5 Deal with energy management issues wireless network
CO6 Have Awareness on Recent Advances In Wireless Networks
Course UNIT – I
Content
Introduction: Fundamentals, Characteristics, Modulation techniques, Multiple access
techniques, voice coding, error control, computer networks, Computer network
architecture, IEEE 802 standard, wireless network.
UNIT – II
Wireless Wans And Mans: Introduction, The Cellular Concept, Cellular Architecture,
The First-Generation Cellular Systems, The Second-Generation Cellular Systems, The
Third-Generation Cellular Systems, Wireless In Local Loop IEEE 802.16 Standard, Hi per
access.
UNIT – III
Wireless Internet: Introduction, What Is Wireless Internet, Mobile IP, TCP In Wireless
Domain, WAP, Optimizing Web Over Wireless.
Ad Hoc Wireless Networks: Introduction: Cellular and Ad Hoc Wireless networks,
Applications of Ad Hoc Wireless networks, Issues, Ad hoc wireless internet.
UNIT – IV
Quality Of Service In Ad Hoc Wireless Networks: Introduction, Issues And Challenges
In Providing QOS In Ad Hoc Wireless , Networks, Classifications Of QOS Solutions,
MAC layer Solutions, Network Layer Solutions, QOS Frameworks For Ad Hoc Wireless
Networks.
UNIT – V
Energy Management In Ad Hoc Wireless Networks: Introduction, Need For Energy
Management In Ad Hoc Wireless Networks, Classification Of Energy Management
Schemes, Battery Management Schemes, Transmission Power Management Schemes,

21
System Power Management Schemes.
UNIT – VI
Recent Advances In Wireless Networks: Introduction, Ultra-Wide-Band Radio
Communication, Wireless Fidelity Systems, Optical Wireless Networks, The Multimode
802.11, The Meghadoot Architecture.
Text Books:
1. Ad Hoc Wireless Networks: Architectures and Protocols – C. Siva Ram Murthy
and B.S.Manoj, 2004, PHI.
Text Books
and Reference Books:
References: 1. Wireless Ad- hoc and Sensor Networks: Protocols, Performance and Control –
JagannathanSarangapani, CRC Press
2. Holger Karl & Andreas Willig, “Protocols And Architectures for Wireless Sensor
Networks”, John Wiley, 2005.
E- 1. https://nptel.ac.in/courses
Resources 2. https://freevideolectures.com/university/iitm

22
19CS32MP - MINI PROJECT

Course
Professional Core Credits: 2
Category:
Course Type: Implementation and Documentation Lecture - Tutorial - Practical: 0-0-4
Sessional Evaluation: 40
Require the fundamental knowledge in a few
Prerequisite: Univ.Exam Evaluation: 60
core computing areas
Total Marks: 100
Objectives  To apply the programming knowledge into a real-world situation/simple problem

Upon successful completion of the course, the students will be able to:
Course
Outcomes Identify, analyze, formulate and handle programming projects with a
CO1
comprehensive and systematic approach.
Course GUIDELINE/INSTRUCTION
Guidelines  The mini project must be done alone.
and  Submit an early proposal with 1 or 2 page(s) report as per the schedule,
Evaluation description of functionality and how the final product will be.

PROCEDURE
 Formulate a real world problem and gather its requirements, and develop a design
solution
 Test and validate the conformance of the developed prototype against the original
requirements of the problem
 Work as a responsible member and possibly a leader of a team in developing
software solutions
 Participate in and possibly moderate, discussions that lead to making decisions
 Express technical ideas, strategies and methodologies in written form to prepare
and conduct oral presentations
 Self-learning tools, algorithms, and/or techniques that contribute to the software
solution of the project must be exposed
 Generate alternative solutions, compare them and select the optimum one.

INTERNAL ASSESSMENT (40):


 The internal examination will be conducted by the department and the
performance shall be evaluated by the concerned guide and two other senior
faculty members act as examiners based on the reviews/reports.

EXTERNAL ASSESSMENT(60):
 The end examination will be conducted jointly by the Guide and another
Examiner nominated by Principal/Director as per list given recommended from
department

REPORT :
A report must be prepared based on the following contents:
 Abstract/Synopsis
 Introduction
 SRS – An agreement between Developer and Customer or end user (Refer any
standard template followed by industry, Organization and any Institute as per

23
current trends)
 System Design – Description of modules/functions and basic UML diagrams to
support the behaviour of the system
 Detailed Design – Supporting UML diagrams to expose different levels of
representations including behaviour, Interaction and partial implementation
 Implementation details – Coding and Testing
 Bibliography – Reference books, web sites and journals ( if any)
Refer any standard document/template which may be suitable for current development
References:
based on organization/Industry or Institute through various web sites.
Visit any software industry sites or Google for downloading sample formats/templates
E-Resources
suitable to your project.

24
19CS32P1- INTERNET OF THINGS LABORATORY

Course
Professional Core Credits 1.5
Category:
Course Type: Laboratory Practical: 0-0-3
Sessional Evaluation: 40
Python Programming and Knowledge about Linux
Prerequisite: Univ. Exam Evaluation: 60
operating system is required
Total Marks: 100
 To design various simple programs using Raspberry Pi kit.
Objectives
 To develop and implement applications using IoT kit

Upon the successful completion of the course, the students will be able to :
Course Know about the definition and characteristics of Internet of Things,
Outcomes CO1 Establishment of communication, connecting various devices and components
to support different operating systems for application development
1. Study of Raspberry Pi kit and Installation of NOOBS
2. Writing Hello World program
3. Connecting LED and changing its color
4. Connecting a Push Switch and toggling the switch to Raspberry Pi
5. Connecting a buzzer and touch sensor to Raspberry Pi
Course 6. Sending SMS from a Python kit on the Raspberry Pi
Content 7. Measuring the Humidity and Temperature using appropriate sensors
(DHT22/AM2302)
8. Send email from a Linux terminal on the Raspberry Pi
9. Setting up a Web Server on Raspberry Pi
10. Setting up Wireless Access Point using Raspberry Pi
11. Controlling Raspberry Pi GPIO Pins using Telegram App
1. Raspberry Pi toolkit
2. Memory card
3. DHT22/AM2302 sensor
Components 4. Bread board
Required 5. Jumper cables
6. Buzzer
7. Multi colored LEDs
8. Any
1. For Telegram GPIO Experiment
https://circuitdigest.com/microcontroller-projects/control-raspberry-pi-gpio-
with-telegram
2. For Webserver on RaspberryPi
https://thepi.io/how-to-set-up-a-web-server-on-the-raspberry-pi/
References
3. For configuring a Raspberry as an Access point
https://circuitdigest.com/microcontroller-projects/setting-up-wireless-access-
point-using-raspberry-pi
4. A link for Good number of IoT Projects
https://circuitdigest.com/simple-raspberry-pi-projects-for-beginners
1. www.w3schools.com
E-Resources 2. http://nptel.ac.in/courses

25
19CS32P2 - DATA WAREHOUSING AND DATA MINING LABORATORY

Course
Professional Core Credits: 1.5
Category:
Course
Practical Lecture – Tutorial – Practical: 0-0-3
Type:
Knowledge in Fundamental concepts of Sessional Evaluation: 40
Prerequisite: Univ.Exam Evaluation: 60
Data Warehouse and Data Mining. Total Marks: 100
The course is designed to provide knowledge on Data Warehouse and Data Mining
Objectives
algorithms..

Course Upon successful completion of the course, the students will be able to acquire
Outcomes knowledge on Data Warehouse and Data Mining algorithms.
1. To create data in .csv format
2. To create data in .arff format
3. Preprocessing in Weka
4. Data Reduction Strategy – Dimensionality Reduction or Attribute
Removal
5. Data Normalization
6. Classification in Weka Using Decision Trees
7. Decision Tree Induction Using J48 Classifier
Course
Content 8. Classification using Multilayer Perceptron
9. Classification using Naïve Bayes Classifier
10. Evaluating the Performance of IBK Classifier
11. Clustering using k-means algorithm
12. Association Rule Generation using Apriori
13. Data Discretization – To convert numeric data to categorical.
14. Weka Experiment Environment Using Simple Mode
.

26

You might also like