Computer Scienceand Engineering
Computer Scienceand Engineering
(Formerly Uttarakhand Technical University, Dehradun Established by Uttarakhand State Govt. wide Act no. 415 of 2005)
Suddhowala, PO-Chandanwadi, Premnagar, Dehradun, Uttarakhand (Website- www.uktech.ac.in)
SYLLABUS
Approved in 13th Meeting of Executive Council held
on 27th March 2023 subsequent to the 14th Meeting
of Academic Council held on 20th March 2023
Syllabus
SYLLABUS
For
B.TECH
(Computer Science and Engineering)
2ND Year
Syllabus
SEMESTER-III
Evaluation Scheme
Subject
Subject Periods Sessional
S. NO. ESE Total Credit
Codes Category Subject Exam
L T P CT TA Total TE PE
AHT-006/ Advanced Applied Mathematics /
1 BSC/ ESC 3 1 0 30 20 50 100 150 4
ECT-033 Digital Electronics
AHT-
Technical Communication/
2 007/AHT- HSC 2 1 0 30 20 50 100 150 3
Universal Human Value
008
3 CST-002 DC Discrete Structure 3 1 0 30 20 50 100 150 4
Abbreviations: L-No. of Lecture hours per week, T-No. of Tutorial hours per week, P-No. of Practical hours per week, CT-
Class Test Marks, TA-Marks of teacher’s assessment including student’s class performance and attendance, PS-Practical
Sessional Marks, ESE-End Semester Examination, TE- Theory Examination Marks, PE- Practical External Examination Marks
Minor Courses (Optional) **: Select any subject from Annexure – II from other departments
Syllabus
SEMESTER-IV
Evaluation Scheme
Subject
Subject Periods Sessional
S. NO. ESE Total Credit
Codes Category Subject Exam
L T P CT TA Total TE PE
AHT-006/ Advanced Applied Mathematics /
1 BSC/ ESC 3 0 0 30 20 50 100 150 3
ECT-033 Digital Electronics
AHT-
Technical Communication/ 2 1 0 150 3
2 007/AHT- HSC 30 20 50 100
Universal Human Value 150 4
008
Computer Organization and
3 CST-007 DC 3 1 0 30 20 50 100 150 4
Architecture
4 CST-008 DC JAVA Programming 3 1 0 30 20 50 100 150 4
Formal Languages & Automata
5 CST-009 DC 3 1 0 30 20 50 100 150 4
Theory
Computer Organization and
6 CSP-007 DLC 0 0 2 25 25 25 50 1
Architecture Lab
7 CSP-008 DLC JAVA Programming Lab 0 0 2 25 25 25 50 1
8 CSP-009 DLC UNIX/LINUX Lab 0 0 2 25 25 25 50 1
CST-005/ Python Programming/ Cyber
9 MC 2 0 0 15 10 25 50
CST-006 Security
10 GP-004 NC General Proficiency 50
Total 900 22
11 Minor Course (Optional) 3 1 0 30 20 50 100 4
To be completed at the end of the fourth semester
DLC Internship-II/Mini Project-II*
(during the Summer).
MOOCs course
Abbreviations: L-No. of Lecture hours per week, T-No. of Tutorial hours per week, P-No. of Practical hours per week, CT-
Class Test Marks, TA-Marks of teacher’s assessment including studentss class performance and attendance, PS-Practical
Sessional Marks, ESE-End Semester Examination, TE- Theory Examination Marks, PE- Practical External Examination Marks
Minor Courses (Optional) **: Select any subject from Annexure – II from other departments
Syllabus
COURSE OUTCOMES:
1. Remember the concept of Laplace transform and apply in solving real life problems.
2. Apply the concept of Fourier transform to evaluate engineering problems.
3. Understand to evaluate roots of algebraic and transcendental equations.
4. Solve the problem related interpolation, differentiation, integration and the solution of differential
equations.
5. Understand the concept of correlation, regression, moments, skewness and kurtosis and curve fitting.
Definition of Laplace transform, Existence theorem, Laplace transforms of derivatives and integrals, Initial and
final value theorems, Unit step function, Dirac- delta function, Laplace transform of periodic function, Inverse
Laplace transform, Convolution theorem, Application to solve linear differential equations.
Fourier integral, Fourier sine and cosine integral, Complex form of Fourier integral, Fourier transform,Inverse
Fouriertransforms, Convolution theorem, Fourier sine and cosine transform, Applications of Fourier transform to
simple one dimensional heat transfer equations.
Number and their accuracy, Solution of algebraic and transcendental equations: Bisection method, Iteration
method, Newton-Raphson method and Regula-Falsi method. Rate of convergence of these methods (without
proof), Interpolation: Finite differences, Relation between operators, Interpolation using Newton’s forward and
backward difference formula, Interpolation with unequal intervals: Newton’s divided difference and Lagrange’s
formula.
Syllabus
Numerical Differentiation, Numerical integration: Trapezoidal rule, Simpson’s 1/3rd and 3/8 rule,Runge-Kutta
method of fourth order for solving first order linear differential equations, Milne’s predicator-corrector method.
Introduction: Measures of central tendency, Moments, Skewness, Kurtosis, Curve fitting: Method of least
squares, Fitting of straight lines, Fitting of second degree parabola, Exponential curves. Correlation and rank
correlation, Regression analysis: Regression lines of y on x and x on y, Regression coefficients, Properties of
regressions coefficients and non-linear regression.
Reference Books:
Syllabus
UNIT 1: MINIMIZATION OF LOGIC FUNCTIONS: Review of logic gate and Boolean algebra,
DeMorgan’s Theorem, SOP & POS forms, canonical forms, don’t care conditions, K-maps up to 6
variables, Quine-McClusky’s algorithm, X-OR & X-NOR simplification of K-maps, binary codes, code
conversion.
UNIT 2: COMBINATIONAL CIRCUITS: Combinational circuit design, half and full adders, subtractors,
serial and parallel adders, code converters, comparators, decoders, encoders, multiplexers, de-multiplexer,
parity checker, driver &multiplexed display, BCD adder, Barrel shifter and ALU.
UNIT 3: SEQUENTIAL CIRCUITS: Building blocks like S-R, JK and master-slave JK FF, edge
triggered FF, ripple and synchronous counters, shift registers, finite state machines, design of synchronous
FSM, algorithmic state machines charts, designing synchronous circuits like pulse train generator, pseudo
random binary sequence generator, clock generation
UNIT 4: LOGIC FAMILIES & SEMICONDUCTOR MEMORIES: TTL NAND gate, specifications,
noise margin, propagation delay, fan-in, fan-out, tri-state TTL, ECL, CMOS families and their interfacing,
memory elements, concept of programmable logic devices like FPGA, logic implementation using
programmable devices.
UNIT 5: VLSI DESIGN FLOW: Design entry: schematic, FSM & HDL, different modelling styles in
VHDL, data types and objects, dataflow, behavioral and structural modelling, synthesis and simulation
VHDL constructs and codes for combinational and sequential circuits.
Syllabus of B.TECH – Computer Science and Engineering PAGE 6
VEER MADHO SINGH BHANDARI UTTARAKHAND TECHNICAL UNIVERSITY, DEHRADUN
Syllabus
BOOKS:
Syllabus
1. Produce technical documents that use tools commonly employed by engineering and computer
science professionals.
2. Communicate effectively in a professional context, using appropriate rhetorical approaches for
technical documents, adhering to required templates, and complying with constraints on
document format.
3. Clarify the nuances of phonetics, intonation and pronunciation skills.
4. Get familiarized with English vocabulary and language proficiency.
COURSE OUTCOMES: On successful completion of the course, the student will be able to:
1. Students will be enabled to understand the nature and objective of Technical Communication
relevant for the work place as Engineers.
2. Students will utilize the technical writing for the purposes of Technical Communication and its
exposure in various dimensions.
3. Students would imbibe inputs by presentation skills to enhance confidence in face of diverse
audience.
4. Technical communication skills will create a vast know-how of the application of the learning
to promote their technical competence.
5. It would enable them to evaluate their efficacy as fluent & efficient communicators by learning
the voice-dynamics.
Syllabus
Reference Books
1. Technical Communication – Principles and Practices by Meenakshi Raman & Sangeeta Sharma,
Oxford Univ. Press, 2007, New Delhi.
2. Business Correspondence and Report Writing by Prof. R.C. Sharma & Krishna Mohan, Tata
McGraw Hill & Co. Ltd., 2001, New Delhi.
3. Practical Communication: Process and Practice by L.U.B. Pandey; A.I.T.B.S. Publications India
Ltd.; Krishan Nagar, 2014, Delhi.
4. Modern Technical Writing by Sherman, Theodore A (et.al); Apprentice Hall; New Jersey; U.S.
5. A Text Book of Scientific and Technical Writing by S.D. Sharma; Vikas Publication, Delhi.
6. Skills for Effective Business Communication by Michael Murphy, Harward University, U.S.
Business Communication for Managers by Payal Mehra, Pearson Publication, Delhi.
Syllabus
1. Expected to become more aware of themselves, and their surroundings (family, society,
nature)
2. Become more responsible in life, and in handling problems with sustainable solutions, while
keeping human relationships and human nature in mind.
3. Have better critical ability.
4. Become sensitive to their commitment towards what they have understood (human values,
human relationship and human society).
5. Able to apply what they have learnt to their own self in different day-to- day settings in real
life, at least a beginning would be made in this direction.
COURSE TOPICS: The course has 28 lectures and 14 practice sessions in 5 modules:
Syllabus
Harmony in the nature. Four orders of nature; existence as co-existence, harmony at all levels of
existence.
TEXT BOOK
1. Human Values and Professional Ethics by R R Gaur, R Sangal, G P Bagaria, Excel Books, New Delhi, 2010
REFERENCE BOOKS
Syllabus
COURSE OUTCOMES: On successful completion of the course, the student will be able to:
1. Develop new models to represent and interpret the data.
2. Apply knowledge of mathematics, probability & statistics, graph theory and logics.
3. Interpret statements presented in disjunctive normal form and determine their validity by applying the
rules and methods of propositional calculus.
4. Reformulate statements from common language to formal logic using the rules of propositional and
predicate calculus.
5. Apply graph theory in solving computing problems.
Unit 1- Set Theory: Introduction to set theory, set operations, Algebra of Sets, Combination of sets, Duality, Finite and
infinite sets, Classes of sets, Power sets, Multi sets, Cartesian Product, Representation of relations, Types of relation, Binary
relation, Equivalence relations and partitions, Mathematics Induction.
Function and its types: Composition of function and relations, Cardinality and inverse relations, Functions, logic and
proofs injective, surjective and bijective functions.
Unit 2- Propositional Calculus: Basic operations; AND(^), OR(v), NOT(~), True value of a compound statement,
propositions, tautologies, and contradictions. Partial ordering relations and lattices.
Lattice theory: Partial ordering, posets, lattices as posets, properties of lattices as algebraic systems, sublattices, and some
special lattices.
Unit 3-Combinations: The Basic of Counting, Pigeonhole Principles, Permutations and Combinations, Principle of
Inclusion and Exclusion.
Syllabus of B.TECH – Computer Science and Engineering PAGE 12
VEER MADHO SINGH BHANDARI UTTARAKHAND TECHNICAL UNIVERSITY, DEHRADUN
Syllabus
Recursion and Recurrence Relation: linear recurrence relation with constant coefficients, Homogeneous solutions,
Particular solutions, and Total solution of a recurrence relation using generating functions.
Unit 4- Algebraic Structures: Definition, elementary properties of Algebraic structures, examples of a Monoid,
sunmonoid, semigroup, groups and rings, Homomorphism, Isomorphism and automorphism, Subgroups and Normal
subgroups, Cyclic groups, Integral domain and fields, Rings, Division Ring.
Unit 5- Graphs and Trees: Introduction to graphs, Directed and undirected graphs, Homomorphic and Isomorphic graphs,
Subgraphs, cut points and bridges, Multigraph and Weighted graphs, Paths and circuits, Shortest path in a weighted graph,
Eulerian path and circuits, Hamilton paths and circuits, Planar graphs, Euler’s formula, Trees, Rooted trees, Spanning trees
and cut-sets, Binary trees and its traversals.
TEXTBOOKS:
1. Discrete and combinatorial mathematics-An applied introduction-5th edition- Ralph P. Grimaldi, Pearson
Education.
2. Discrete Mathematics for Computer Scientists & Mathematicians, J.L. Mott. A. Kandel, T.P. Baker, Prentice Hall.
REFERENCE BOOKS:
1. Discrete mathematical with graph theory, edgar G. Goodaire, 3rd Edition, Pearson Education.
2. Discrete Mathematics and its Applications, Kenneth H. Rosen, Fifth Edition. TMH.
3. Mathematical foundations of computer science-Dr S. Chandra sekharaiah-Prism books Prv. Lt.
4. Discrete mathematical structures Theory and applications-malik & Sen.
5. Logic and Discrete Mathematics, Grass Mann & Trembley, Person Education.
6. Discrete mathematical structures with applications to Comp. Science- J. P. Tremblay and R. Manohar,
Tata-McGraw-Hill publications.
7. Elements of DISCRETE MATHEMATICS – A computer-oriented Approach – C L Liu, D P Mohapatra.
Third Edition, Tata McGraw Hill
Syllabus
1. Introduce the fundamentals of Data Structures, Abstract concepts and how these concepts are useful in
problem-solving.
2. Analyze step by step and develop algorithms to solve real-world problems.
3. Implement various data structures, viz. Stacks, Queues, Linked Lists, Trees and Graphs.
4. Understand various searching & sorting techniques
Course Outcomes: On successful completion of the course, the student will be able to:
1. Compare functions using asymptotic analysis and describe the relative merits of worst-case, average-
case, and best-case analysis.
2. Become familiar with a variety of sorting algorithms and their performance characteristics (e.g., running
time, stability, space usage) and be able to choose the best one under a variety of requirements.
3. Understand and identify the performance characteristics of fundamental algorithms and data structures
and be able to trace their operations for problems such as sorting, searching, selection, operations on
numbers, and graphs.
4. Solve real-world problems using arrays, stacks, queues, and linked lists.
5. Become familiar with the major graph algorithms and their analyses. Employ graphs to model
engineering problems when appropriate.
Unit 1-Introduction: Basic Terminologies: Elementary Data Organizations, Data Structure Operations:
insertion, deletion, traversal etc.; Analysis of an Algorithm, Asymptotic Notations, Time-Space trade-off.
Searching: Linear Search and Binary Search Techniques and their complexity analysis.
Unit 2-Stacks and Queues: ADT Stack and its operations: Algorithms and their complexity analysis,
Applications of Stacks: Expression Conversion and evaluation – corresponding algorithms and complexity
analysis. ADT queue, Types of Queues: Simple Queue, Circular Queue, Priority Queue; Operations on each type
of Queues: Algorithms and their analysis.
Unit 3-Linked Lists: Singly linked lists: Representation in memory, Algorithms of several operations:
Traversing, Searching, Insertion into, Deletion from the linked list; Linked representation of Stack and Queue,
Header nodes, Doubly linked list: operations on it and algorithmic analysis; Circular Linked Lists: all operations
their algorithms and complexity analysis.
Syllabus
Unit 4-Trees and Graphs: Basic Tree Terminologies, Different types of Trees: Binary Tree, Threaded Binary
Tree, Binary Search Tree, AVL Tree; Tree operations on each of the trees and their algorithms with complexity
analysis. Applications of Binary Trees. B Tree, B+ Tree: definitions, algorithms and analysis.
Graphs: Basic Terminologies and Representations, Graph search and traversal algorithms and complexity
analysis.
Unit 5-Sorting and Hashing: Objective and properties of different sorting algorithms: Selection Sort,
Bubble Sort, Insertion Sort, Quick Sort, Merge Sort, Heap Sort; Performance and Comparison among all
the methods,
TEXTBOOKS:
1. An Introduction to Data Structures with Applications. by Jean-Paul Tremblay & Paul G. Sorenson
Publisher-Tata McGraw Hill.
2. Ritika Mehra, Data Structures Using C, Pearson Education.
3. Data Structures using C & C++ -By Ten Baum Publisher – Prentice-Hall International.
REFERENCE BOOKS:
1. Schaum’s Outlines Data structure Seymour Lipschutz Tata McGraw Hill 2nd Edition.
2. Fundamentals of Computer Algorithms by Horowitz, Sahni, Galgotia Pub. 2001 ed.
3. Fundamentals of Data Structures in C++-By Sartaj Sahani.
4. Data Structures: A Pseudo-code approach with C -By Gilberg&Forouzan Publisher-Thomson Learning.
Syllabus
COURSE OUTCOMES: On successful completion of the course, the student will be able to:
1. Recognize features of object-oriented design such as encapsulation, polymorphism, inheritance, and
composition of systems based on object identity.
2. Apply some common object-oriented design patterns.
3. Specify simple abstract data types and design implementations using abstraction functions to document
them.
4. Design a convenient way for the handling problems using templates and use simple try-catch blocks for
Exception Handling.
5. Manage I/O streams and File I/O oriented interactions.
Unit 1- Object Oriented Programming Concepts: Classes and Objects, Methods and Messages, Abstraction and
Encapsulation, Inheritance, Abstract Classes, Polymorphism. Introduction to C++: Classes and Objects, Structures and
Classes, Unions and Classes, Friend Functions, Friend Classes, Inline Functions, Static Class Members, Scope Resolution
Operator, Nested Classes, Local Classes, Passing Objects to Functions, Returning objects, object assignment. Arrays,
Pointers, References, and the Dynamic Allocation Operators: Arrays of Objects, Pointers to Objects, Type Checking, this
Pointer, Pointers to Derived Types, Pointers to Class Members, References, Dynamic Allocation Operators.
Unit 2- Function Overloading and Constructors: Function Overloading, Constructors, parameterized constructors, Copy
Constructors, Overloading Constructors, Finding the Address of an Overloaded Function, Default Function Arguments,
Function Overloading and Ambiguity. Operator overloading: Creating member Operator Function, Operator Overloading
Using Friend Function, Overloading New and Delete, Overloading Special Operators, Overloading Comma Operator.
Unit 3- Inheritance and Polymorphism: Inheritance: Base-Class Access Control, Inheritance and Protected Members,
Inheriting Muitiple Base Classes, Constructors, Destructors and Inheritance, Granting Access, Virtual Base Classes.
Polymorphism: Virtual Functions, Virtual Attribute and Inheritance, Virtual Functions and Hierarchy, Pure Virtual
Syllabus
Functions, Early vs. Late Binding, Run-Time Type ID and Casting Operators: RTTI, Casting Operators, Dynamic Cast.
Unit 4- Templates and Exception Handling: Templates: Generic Functions, Applying Generic Functions, Generic
Classes, The type name and export Keywords, Power of Templates, Exception Handling: Fundamentals, Handling Derived
Class Exceptions, Exception Handling Options, Understanding terminate() and unexpected(), uncaught_exception ()
Function, exception and bad_exception Classes, Applying Exception Handling.
Unit 5- I/O System Basics: Streams and Formatted 1/O. File I/O: File Classes, File Operations. Namespaces: Namespaces,
std Namespace. Standard Template Library: Overview, Container Classes, General Theory of Operation, Lists, string Class,
Final Thoughts on STL.
TEXTBOOKS:
1. Object Oriented Programming with C++ by E. Balagurusamy, McGraw-Hill Education (India).
2. ANSI and Turbo C++ by Ashoke N. Kamthane, Pearson Education
REFERENCE BOOKS:
1. Big C++ - Wiley India.
2. C++: The Complete Reference- Schildt, McGraw-Hill Education (India).
3. C++ and Object Oriented Programming – Jana, PHI Learning.
4. Object Oriented Programming with C++ - Rajiv Sahay, Oxford.
5. Mastering C++ - Venugopal, McGraw-Hill Education (India)
Syllabus
Course Outcomes: On successful completion of the course, the student will be able to:
1. Develop programs using dynamic memory allocation and linked list ADT.
2. Apply Stack and Queue to solve problems.
3. Implement the concept of hashing in real-time dictionaries.
4. Identify and implement suitable data structures for the given problem.
5. Solve real-world problems by finding the minimum spanning tree and the shortest path algorithm.
LIST OF EXPERIMENTS:
1. Write programs to implement the following using an array.
a) Stack ADT
b) Queue ADT
2. Write programs to implement the following using a singly linked list.
a) Stack ADT
b) Queue ADT
3. Write a program to implement the deque (double-ended queue) ADT using a doubly linked list.
4. Write a program to perform the following operations:
a) Insert an element into a binary search tree.
b) Delete an element from a binary search tree.
c) Search for a key element in a binary search tree.
5. Write a program to implement circular queue ADT using an array.
6. Write a program to implement all the functions of a dictionary (ADT) using hashing.
7. Write a program to perform the following operations on B-Trees and AVL-trees:
a) Insertion.
b) Deletion.
8. Write programs for implementing BFS and DFS for a given graph.
9. Write programs to implement the following to generate a minimum cost-spanning tree:
Syllabus
a) Prim’s algorithm.
b) Kruskal’s algorithm.
10. Write a program to solve the single source shortest path problem.
(Note: Use Dijkstra’s algorithm).
11. Write a program that uses non-recursive functions to traverse a binary tree in:
a) Pre-order.
b) In-order.
c) Post-order.
12. Write programs for sorting a given list of elements in ascending order using the following sorting methods:
a) Quick sort.
b) Merge sort.
Syllabus
COURSE OUTCOMES: On successful completion of the course, the student will be able to:
1. Design object-oriented programs with static members and friend functions using C++.
2. Implement C++ programs with operator overloading and type conversions.
3. Develop class templates for various data structures like stack, queue and linked list.
4. Create classes with necessary exception handling
5. Construct simple test applications using polymorphism.
LIST OF EXPERIMENTS
1. Design C++ classes with static members, methods with default arguments, and friend functions. (For
example, design matrix and vector classes with static allocation, and a friend function to do matrix-vector
multiplication).
2. Implement Matrix class with dynamic memory allocation and necessary methods. Give proper
constructor, destructor, copy constructor, and overloading of the assignment operator.
3. Implement complex number class with necessary operator overloading and type conversions such as
integer to complex, double to complex, complex to double etc.
4. Overload the new and delete operators to provide a custom dynamic allocation of memory.
5. Develop C++ class hierarchy for various types of inheritances.
6. Design a simple test application to demonstrate dynamic polymorphism and RTTI.
7. Develop a template of the linked-list class and its methods.
8. Develop templates of standard sorting algorithms such as bubble sort, insertion sort and quick sort.
9. Design stack and queue classes with necessary exception handling.
Syllabus
10. Write a C++ program that randomly generates complex numbers (use previously designed Complex
class) and write them two per line in a file along with an operator (+, -, *, or /). The numbers are written
to file in the format (a + ib). Write another program to read one line at a time from this file, perform the
Syllabus
COURSE OUTCOMES: On successful completion of the course, the student will be able to:
1. Demonstrate the basic concepts of python programming with the help of data types, operators and
expressions, and console input/output.
2. Apply the concept of Control Structures in Python to solve any given problem.
3. Demonstrate operations on built-in container data types (list, tuple, set, dictionary) and strings.
4. Ability to explore python, especially the object-oriented concepts and the built-in objects of Python.
5. Implement the concepts of file handling using packages.
LIST OF PROGRAMS:
Exercise 1 - Basics
a) Running instructions in Interactive interpreter and a Python Script
b) Write a program to purposefully raise Indentation Error and Correct it
Exercise 2 - Operations
a) Write a program to compute distance between two points taking input from the user (Pythagorean Theorem)
b) Write a program add.py that takes 2 numbers as command line arguments and prints its sum.
Exercise - 3 Control Flow
a) Write a Program for checking whether the given number is a even number or not.
b) Using a for loop, write a program that prints out the decimal equivalents of 1/2, 1/3, 1/4, . . . ,1/10
c) Write a program using a for loop that loops over a sequence.
d) Write a program using a while loop that asks the user for a number, and prints a countdown from that number to zero.
Syllabus
Syllabus
COURSE OUTCOMES: On successful completion of the course, the student will be able to:
1. Understand organizational issues and their impact on the organization and employees.
2. Identify industrial problems and suggest possible solutions.
3. Relate, apply and adapt relevant knowledge, concepts and theories within an industrial organization,
practice and ethics.
4. Apply technical knowledge in an industry to solve real world problems.
5. Demonstrate effective group communication, presentation, self-management, and report writing skills.
Syllabus
Course Outcomes: On successful completion of the course, the student will be able to:
1. Develop essential programming skills in computer programming concepts like data types.
2. Examine Python syntax and semantics and be fluent in the use of Python flow control and functions.
3. Illustrate the process of structuring the data using lists, tuples, and dictionaries.
4. Demonstrate using built-in functions and operations to navigate the file system.
5. Interpret the concepts of modules and user-defined functions in Python.
UNIT – I: Introduction and Syntax of Python Program: Features of Python, Interactive, Object-oriented, Interpreted,
platform-independent, Python building blocks -Identifiers, Keywords, Indention, Variables, Comments, Python
environment setup – Installation and working of IDE, Running Simple Python scripts to display a welcome message, Python
variables.
Python Data Types: Numbers, String, Tuples, Lists, Dictionary. Declaration and use of datatypes, Built-in Functions.
UNIT – II: Python Operators and Control Flow statements: Basic Operators: Arithmetic, Comparison/ Relational,
Assignment, Logical, Bitwise, Membership, Identity operators, Python Operator Precedence.
Control Flow: Conditional Statements (if, if...else, nested if), Looping in python (while loop, for loop, nested loops), loop
manipulation using continue, pass, break, else.
UNIT – III: Data Structures in Python: String: Concept, escape characters, String special operations, String formatting
operator, Single quotes, Double quotes, Triple quotes, Raw String, Unicode strings, Built-in String methods.
Lists: Defining lists, accessing values in lists, deleting values in lists, updating lists, Basic List Operations, and Built-in List
functions.
Tuples: Accessing values in Tuples, deleting values in Tuples, and updating Tuples, Basic Tuple operations, and Built-in
Tuple functions.
Sets: Accessing values in Set, deleting values in Set, and updating Sets, Basic Set operations, Built-in Set functions.
Syllabus
Dictionaries: Accessing values in Dictionary, deleting values in Dictionary, and updating Dictionary, Basic Dictionary
operations, Built-in Dictionaries functions.
UNIT – IV: Python Functions, modules, and Packages: Use of Python built-in functions (e.g., type/data conversion
functions, math functions etc.),
user-defined functions: Function definition, Function call, function arguments and parameter passing, Return statement,
Scope of Variables: Global variable and Local Variable.
Modules: Writing modules, importing modules, importing objects from modules, Python built-in modules (e.g., Numeric,
mathematical module, Functional Programming Module), Packages.
UNIT – V: File Handling: Opening files in different modes, accessing file contents using standard library functions,
Reading, and writing files, closing a file, Renaming, and deleting files, File related standard functions.
TEXTBOOKS:
1. Charles R. Severance, “Python for Everybody: Exploring Data Using Python 3”, 1st Edition, CreateSpace
Independent Publishing Platform, 2016.
2. Allen B. Downey, "Think Python: How to Think Like a Computer Scientist”, 2 nd Edition, Green Tea Press, 2015.
3. Ch Satyanarayana, “Python Programming”, 1st Edition, universities press (India) private limited 2018.
REFERENCE BOOKS:
1. Charles Dierbach, "Introduction to Computer Science Using Python", 1st Edition, Wiley India Pvt Ltd.
ISBN-13: 978-8126556014
2. Mark Lutz, “Programming Python”, 4th Edition, O’Reilly Media, 2011.ISBN-13: 978-9350232873
3. Wesley J Chun, “Core Python Applications Programming”, 3rd edition, Pearson Education India, 2015.
ISBN-13: 978-9332555365
4. Roberto Tamassia, Michael H Goldwasser, Michael T Goodrich, “Data Structures and Algorithms in
Python”,1stEdition, Wiley India Pvt Ltd, 2016. ISBN-13: 978- 8126562176
5. Reema Thareja, “Python Programming using problem-solving approach”, Oxford university press,
2017.
Syllabus
Course Outcomes: On successful completion of the course, the student will be able to:
1. Understand cyber-attacks and types of cybercrimes, and familiarity with cyber forensics
2. Realize the importance of cyber security and various forms of cyber-attacks and countermeasures.
3. Get familiar with obscenity and pornography in cyberspace and understand the violation of the Right to
privacy on the Internet.
4. Appraise cyber laws and how to protect themselves and, ultimately, the entire Internet community from
such attacks.
5. Elucidate the various chapters of the IT Act 2008 power of the Central and State Governments to make
rules under IT Act 2008.
UNIT – I: Introduction to Cyber Security: Basic Cyber Security Concepts, layers of security, Vulnerability,
threat, Harmful acts, the motive of attackers, active attacks, passive attacks, Software attacks, hardware attacks,
Spectrum of attacks, Taxonomy of various attacks, IP spoofing, Methods of defense, Security Models, risk
management, Cyber Threats-Cyber Warfare, Cyber Crime, Cyber terrorism, Cyber Espionage, etc., CIA Triad
UNIT – II: Cyber Forensics: Introduction to cyber forensic, Historical background of Cyber forensics, Digital
Forensics Science, The Need for Computer Forensics, Cyber Forensics and Digital evidence, Forensics Analysis
of Email, Digital Forensics Lifecycle, Forensics Investigation, Challenges in Computer Forensics, Special
Techniques for Forensics Auditing.
UNIT – III: Cybercrime (Mobile and Wireless Devices): Introduction, Proliferation of Mobile and Wireless
Devices, Trends in Mobility, Credit card Frauds in Mobile and Wireless Computing Era, Security Challenges
Posed by Mobile Devices, Registry Settings for Mobile Devices, Authentication service Security, Attacks on
Mobile/Cell Phones, Mobile Devices: Security Implications for Organizations, Organizational Measures for
Syllabus
Handling Mobile, Organizational Security Policies and Measures in Mobile Computing Era, Laptops and
desktop.
UNIT – IV: Cyber Security (Organizational Implications): Introduction cost of cybercrimes and IPR issues,
web threats for organizations, security and privacy implications, social media marketing: security risks and perils
for organizations, social computing, and the associated challenges for organizations.
Cybercrime and Cyber terrorism: Introduction, intellectual property in cyberspace, the ethical dimension of
cybercrimes, the psychology, mindset and skills of hackers and other cybercriminals.
UNIT – V: Cyberspace and the Law &Miscellaneous provisions of IT Act.: Introduction to Cyber Security
Regulations, International Law. The INDIAN Cyberspace, National Cyber Security Policy. Internet Governance
– Challenges and Constraints, Computer Criminals, Assets and Threats. Other offences under the Information
Technology Act in India, The role of Electronic Evidence and miscellaneous provisions of the IT Act.2008.
TEXTBOOKS:
1. Nina Godbole and SunitBelpure, Cyber Security Understanding Cyber Crimes, Computer Forensics and
Legal Perspectives, Wiley.
2. B. B. Gupta, D. P. Agrawal, Haoxiang Wang, Computer and Cyber Security: Principles, Algorithm,
Applications, and Perspectives, CRC Press, ISBN 9780815371335, 2018.
REFERENCE BOOKS:
1. Cyber Security Essentials, James Graham, Richard Howard and Ryan Otson, CRC Press.
2. Introduction to Cyber Security, Chwan-Hwa(john) Wu,J. David Irwin, CRC Press T&F Group.
3. Debby Russell and Sr. G.T Gangemi, "Computer Security Basics (Paperback)”, 2ndEdition, O’ Reilly
Media, 2006.
4. Wenbo Mao, “Modern Cryptography – Theory and Practice”, Pearson Education, New Delhi, 2006.
5. Cyberspace and Cybersecurity, George Kostopoulos, Auerbach Publications, 2012.
6. Cyber Forensics: A Field Manual for Collecting, Examining, and Preserving Evidence of Computer
Crimes, Second Edition, Albert Marcella, Jr., Doug Menendez, Auerbach Publications, 2007.
7. Cyber Laws and IT Protection, Harish Chander, PHI, 2013.
Syllabus
COURSE OUTCOMES: On successful completion of the course, the student will be able to:
1. Draw the functional block diagram of a single bus architecture of a computer and describe the function
of the instruction execution cycle, RTL interpretation of instructions.
2. Given a CPU organization and instruction, design a memory module and analyze its operation by
interfacing with the CPU.
3. Design the connection between I/O address from the CPU and the I/O interface.
4. Understand the concept of Pipelining and multiprocessor.
5. Draw a flowchart for concurrent access to memory and cache coherency in parallel processors.
Unit 1- Functional Blocks of a Computer: CPU, Memory, Input-Output Subsystems, Control Unit. Instruction Set
Architecture of a CPU – Registers, Instruction Execution Cycle, RTL Representation and Interpretation of Instructions,
Addressing Modes, Instruction Set. Case Study – Instruction Sets of Some Common CPUs, RISC and CISC Architecture.
Unit 2- Basic Processing Unit: Signed Number Representation, Fixed Point Arithmetic, Addition and Subtraction of
Signed Numbers, Multiplication of Positive Numbers, Signed Operand Multiplication Algorithm, Booth Multiplication
Algorithm, division algorithm, floating point numbers and its arithmetic operation. Fundamental Concepts: Execution of a
Complete Instruction, Multiple Bus Organization, Hardwired Control, Micro Programmed Control.
Unit 3- Peripheral Devices and their Characteristics: Input-Output Subsystems, I/O Device Interface, I/O Transfers–
Program Controlled, Interrupt Driven and DMA, Software Interrupts and Exceptions, Programs and Processes – Role of
Interrupts in Process State Transitions, I/O Device Interfaces – SCII, USB.
Unit 4- Pipelining& Multiprocessor: Basic Concepts of Pipelining, Throughput and Speedup, Instruction Pipeline,
Pipeline Hazards, Introduction to Parallel Processors, Symmetric Shared Memory and Distributed Shared Memory
Multiprocessors, Performance Issues of Symmetric and Distributed Shared Memory, Synchronization.
Syllabus
Unit 5- Memory Organization: Basic Concepts, Concept of Hierarchical Memory Organization, Main Memory: RAM,
ROM, Speed, Size and cost, Cache Memory and its Mapping, Replacement Algorithms, Write Policies, Virtual Memory,
Memory Management Requirements, Associative Memory, Secondary storage devices.
TEXTBOOKS:
1. William Stallings, Computer Organization and architecture, 11th edition (2022), Pearson Education.
2. David A. Patterson and John L. Hennessy “Computer Organization and Design: The Hardware/Software
Interface” , 5th Edition, Elsevier.
3. M. Morris Mano, “Computer System Architecture”, Third Edition, Pearson Education.
REFERENCE BOOKS:
1. Microprocessor Architecture, Programming, and Applications with the 8085 -Ramesh S. Gaonkar Pub:
Penram International.
2. CarlHamacher“ Computer Organization and EmbeddedSystems”, 6th Edition, McGraw Hill
HigherEducation.
3. Miles Murdoccaa and Vincent Heuring“Computer Architecture and Organization: An integrated
Approach” 2ndedition,Wiley Publication.
Syllabus
COURSE OUTCOMES: On successful completion of the course, the student will be able to:
1. Write Java programs with properly designed constants, variables, objects, methods and reusability
functionality
2. Learn how and where to implement interface and exception-handling concepts.
3. Write multi-threaded programming concepts for concurrency control based applications.
4. Construct GUI based JAVA enterprise applications
5. Develop web applications using JDBC, RMI and Servlet methodologies.
Unit 1- Java Basics and Inheritance: The Genesis of Java, Overview of Java, Data Types, Variables, and Arrays,
Operators, Control Statements, Introducing Classes, Methods and Classes,Type Casting, String Handling, Abstract Class,
Method overriding.
Inheritance: Basics, Using Super, Creating a Multilevel Hierarchy, Problem with Multiple Inheritance.
Unit 2- Packages, Interfaces and Exception Handling: Packages- Packages, Access Protection, Importing Packages,
Exception Handling- Types, Try and Catch, Throw and Finally statements.
Unit 3- Multi Threading and File Handling: Multithreaded Programming, Thread Life Cycle Creating Threads, Creating
Multiple Threads, Thread Priorities, Synchronization, Inter Thread Communication, Suspending, Resuming and Stopping
Threads.
File Handling: I/O Basics, Reading Console Input, Writing Console output, I/ O Classes and Interfaces.
Syllabus
Unit 4- Applets, Event Handling and AWT: Applet Basics, Applet Architecture, Applet Display Methods, Passing
parameters to Applets,
Event Handling: Delegation Event Model, Event Classes, Event Listener Interfaces,
AWT: Working with Windows, Graphics, Colors and Fonts, Using AWT Controls, Layout Managers and Menus.
Unit 5- JDBC, RMI And Servlets: JDBC-JDBC Architecture, The Structured Query Language, JDBC Configuration,
Executing SQL, RMI Architecture, A simple client/server application using RMI, Servlets- Life cycle of a Servlet, Servlet
packages ,Handling HTTP Requests and Responses.
TEXTBOOKS:
1. Herbert Schildt, ―Java The complete reference, 8th Edition, McGraw Hill Education, 2011.
2. Cay S. Horstmann, Gary cornell, ―Core Java Volume –I Fundamentals, 9th Edition, Prentice Hall, 2013.
REFERENCES:
1. Paul Deitel, Harvey Deitel, ―Java SE 8 for programmers, 3rd Edition, Pearson, 2015.
2. Steven Holzner, ―Java 2 Black book, Dreamtech press, 2011.
3. Timothy Budd, ―Understanding Object-oriented programming with Java, Updated Edition, Pearson
Education, 2000.
Syllabus
COURSE OUTCOMES: On successful completion of the course, the student will be able to:
1. Apply the knowledge of automata theory, grammars & regular expressions for solving the problem.
2. Analyze the give automata, regular expression & grammar to know the language it represents.
3. Design Automata & Grammar for pattern recognition and syntax checking.
4. Distinguish between decidability and un-decidability of problems.
5. Identify limitations of some computational models and possible methods of proving them.
Unit 1- Introduction: Alphabets, Strings and Languages; Automata and Grammars, Deterministic finite Automata (DFA)-
Formal Definition, Simplified notation: State transition graph, Transition table, Language of DFA, Nondeterministic finite
Automata (NFA), NFA with epsilon transition, Language of NFA, Equivalence of NFA and DFA, Minimization of Finite
Automata, Distinguishing one string from other, Myhill-Nerode Theorem
Unit 2- Regular Expressions: Definition, Operators of regular expression and their precedence, Algebraic laws for Regular
expressions, Kleen’s Theorem, Regular expression to FA, DFA to Regular expression, Arden Theorem, Non Regular
Languages, Pumping Lemma for regular Languages. Application of Pumping Lemma, Closure properties of Regular
Languages, Decision properties of Regular Languages, FA with output: Moore and Mealy machine, Equivalence of Moore
and Mealy Machine, Applications and Limitation of FA.
Unit 3- Context-free languages and pushdown automata: Context-free grammars (CFG) and languages (CFL),
Chomsky and Greibach normal forms, nondeterministic pushdown automata (PDA) and equivalence with CFG, parse
trees, ambiguity in CFG, pumping lemma for context-free languages, deterministic pushdown automata, closure properties
of CFLs.
Unit 4- Context-sensitive languages: Context-sensitive grammars (CSG) and languages, linear bounded automata and
equivalence with CSG. Turing machines: The basic model for Turing machines (TM), Turing- recognizable (recursively
enumerable) and Turing-decidable (recursive) languages and their closure properties, variants of Turing machines,
nondeterministic TMs and equivalence with deterministic TMs, unrestricted grammars and equivalence with Turing
machines, TMs as enumerators.
Syllabus
TEXTBOOKS:
1. Introduction to Automata Theory, Languages, and Computation, 3nd Edition, John E. Hopcroft, Rajeev
Motwani, Jeffrey D. Ullman, Pearson Education.
2. Theory of Computer Science – Automata languages and computation, Mishra and Chandrashekaran, 2nd
edition, PHI.
REFERENCE BOOKS:
1. Introduction to Languages and The Theory of Computation, John C Martin, TMH.
2. Introduction to Computer Theory, Daniel I.A. Cohen, John Wiley.
3. A Textbook on Automata Theory, P. K. Srimani, Nasir S. F. B, Cambridge University Press.
4. Introduction to the Theory of Computation, Michael Sipser, 3rd edition, Cengage Learning.
5. Introduction to Formal languages Automata Theory and Computation Kamala Krithivasan, Rama R,
Pearson.
Syllabus
COURSE OUTCOMES: On successful completion of the course, the student will be able to:
LIST OF EXPERIMENTS
Syllabus
LIST OF EXPERIMENTS
1. Develop a java program to find the sum of odd and even numbers in an array.
2. Develop a java program to print the prime numbers between n1 to n2 using class, objects and methods.
3. Develop a program for calculating the age of a person and display the age in the form of years, months and
days.
4. Demonstrate a program for method overloading. Consider the different types of transaction modes used for
transferring money. (Credit card, Debit card, Net banking etc).
5. Create a Abstract class and calculate the area of different shapes by overriding methods.
6. Develop a Library application using multiple inheritances. Consider Book, Magazines and Journals as base
classes and Library as derived class. In the Book class, perform the operations like Search Book, Issue Book,
Return Book, Renew Book, and Fine Calculation. In the Magazines and Journals classes, perform issue and
return operations.
7. Develop a program for banking application with exception handling. Handle the exceptions in following
cases:
a) Account balance <1000
b) Withdrawal amount is greater than balance amount
c) Transaction count exceeds 3
d) One day transaction exceeds 1 lakh.
8. Create a student database and store the details of the students in a table. Perform the SELECT, INSERT,
UPDATE and DELETE operations using JDBC connectivity.
Syllabus
9. Design a login page using servlets and validate the username and password by comparing the details stored
in the database.
10. Mini project (Anyone)
(Front End: Java, Back End: Oracle, define classes for the application and assign responsibilities)
a) Central Library OPAC Engine
b) ATM Banking
c) Online Shopping
d) E-Ticketing System
e) Student Information Management System
f) City Info Browser
g) E-mail Server
Syllabus
COURSE OUTCOMES: On successful completion of the course, the student will be able to:
2. Demonstrate the basic knowledge of Linux commands and file-handling utilities by using a Linux shell
environment.
3. Evaluate the concept of shell scripting programs by using AWK and SED commands.
4. Use tracing mechanisms for debugging.
5. Compile source code into an object and executable modules.
6. Use advanced network tools.
LIST OF EXPERIMENTS
1. Study of Unix/Linux general purpose utility command list (man, who, cat, cd, cp, ps, ls, mv, rm, mkdir,
rmdir, echo, more, date, time, kill, history, chmod, chown, finger, pwd, cal, logout, shutdown etc.), vi
editor, .bashrc, /etc/bashrc and environment variables.
2. Write a shell script program to: a) display list of user currently logged in; b) to copy contents of one file
to another.
3. Write a program using sed command to print duplicated lines of Input.
4. Write a grep/egrep script to find the number of words character, words and lines in a file.
5. Write an awk script to: a). develop a Fibonacci series; b) display the pattern of given string or number.
6. Write a shell script program to a) display the process attributes; b) change priority of processes; c)
change the ownership of processes; d)to send back a process from foreground ; e) to retrieve a process
from background ; f) create a Zombie process
7. Write a program to create a child process and allow the parent to display “parent” and the child to
display “child” on the screen
8. Write a makefile to compile a C program.
9. Study to execute programs using gdb to utilize its various features like breakpoints, conditional
breakpoints. Also write a shell script program to include verbose and xtrace debug option for
debugging.
Syllabus
10. Study to use ssh, telnet, putty, ftp, ncftp and other network tools.
SYLLABUS
For
B.TECH
(Computer Science and Engineering)
3RD Year
SEMESTER-V
Evaluation Scheme
Subject
Subject Periods Sessional
S. NO. ESE Total Credit
Codes Category Subject Exam
L T P CT TA Total TE PE
Design and Analysis of
1 CST-010 DC 3 1 0 30 20 50 100 150 4
Algorithms
2 CST-011 DC Database Management System 3 1 0 30 20 50 100 150 4
3 CST-012 DC Compiler Design 3 1 0 30 20 50 100 150 4
Abbreviations: L-No. of Lecture hours per week, T-No. of Tutorial hours per week, P-No. of Practical hours per
week, CT-Class Test Marks, TA-Marks of teacher’s assessment including student’s class performance and
attendance, PS-Practical Sessional Marks, ESE-End Semester Examination, TE- Theory Examination Marks, PE-
Practical External Examination Marks
Minor Courses (Optional) **: Select any subject from Annexure – II from other departments
SEMESTER-VI
Evaluation Scheme
Subject
Subject Periods Sessional
S. NO. ESE Total Credit
Codes Category Subject Exam
L T P CT TA Total TE PE
Departmental Elective-3
S. No. Subject Code Subject Name
1 CST-024 Internet of Things
2 CST-025 Quantum Computing
3 CST-026 Augmented Reality
4 CST-027 Web Technology
5 CST-028 Reliable Computing
Open Elective-1
Subject
S. No. Subject Name
Code
1 AHT-011 Total Quality Management
Managing E-Commerce and Digital
2 AHT-012
Communication
3 AHT-013 Industrial safety and Hazard Management
Abbreviations: L-No. of Lecture hours per week, T-No. of Tutorial hours per week, P-No. of Practical hours per
week, CT-Class Test Marks, TA-Marks of teacher’s assessment including student’s class performance and
attendance, PS-Practical Sessional Marks, ESE-End Semester Examination, TE- Theory Examination Marks, PE-
Practical External Examination Marks
Minor Courses (Optional) **: Select any subject from Annexure – II from other departments
1 Hr Lecture 1 Hr Tutorial 2 or 3 Hr Practical
1 Credit 1 Credit 1 Credit
COURSE OUTCOMES: On successful completion of the course, the student will be able to:
1. Analyze worst-case running times of algorithms based on asymptotic analysis and justify the
correctness of algorithms.
2. Describe the greedy paradigm and explain when an algorithmic design situation calls for it.
For a given problem develop the greedy algorithms.
3. Describe the divide-and-conquer paradigm and explain when an algorithmic design situation
calls for it. Synthesize divide-and-conquer algorithms. Derive and solve recurrence relation.
4. Describe the dynamic-programming paradigm and explain when an algorithmic design
situation calls for it.
5. Analyze randomized algorithms and approximation algorithms.
Analysis of recursive algorithms through recurrence relations: Substitution method, Recursion tree method
and master’s theorem.
Unit 2- Fundamental Algorithmic Strategies: Brute-Force, Greedy, Dynamic Programming, Branch- and-
Bound and Back tracking methodologies for the design of an algorithms, Illustrations of these techniques for
Problem-Solving, Knapsack, Matrix Chain Multiplication, Activity selection and LCS Problem.
Unit 3- Graph and Tree Algorithms: Traversal algorithms: Depth First Search (DFS) and Breadth First
Search (BFS), Shortest path algorithms, Minimum Spanning Tree, Topological sorting, Network Flow
Algorithm, Binomial Heap and Fibonacci Heap.
Unit 4- Tractable and Intractable Problems: Computability of Algorithms, Computability classes – P, NP,
NP-complete and NP-hard, Standard NP-complete problems and Reduction techniques.
Unit 5- Advanced Topics: Approximation algorithms and Randomized algorithms, Distributed Hash Table
TEXTBOOKS:
1. Thomas H Cormen, Charles E Lieserson, Ronald L Rivest and Clifford Stein, Introduction to
Algorithms, 4TH Edition, MITPress/McGraw-Hill.
2. Ellis Horowitz, Sartaj Sahni and SanguthevarRajasekaran, Computer Algorithms/ C++, Second Edition,
Universities Press, 2007.
REFERENCE BOOKS:
1. Jon Kleinberg and ÉvaTardos,Algorithm Design, 1ST Edition, Pearson.
2. Michael T Goodrich and Roberto Tamassia,Algorithm Design: Foundations, Analysis, and Internet
Examples, Second EditionWiley.
3. Anany Levitin, ―Introduction to the Design and Analysis of Algorithms, Third Edition, Pearson
Education, 2012.
COURSE OUTCOMES: On successful completion of the course, the student will be able to:
1. Write relational algebra expressions for that query and optimize the developed expressions.
2. Design the databases using E-R method and normalization.
3. Understand the concepts of function dependencies and various normal forms.
4. Understand the concept of transaction atomicity, consistency, isolation, and durability properties in
context of real life examples.
5. Develop the understanding of query processing and advanced databases.
.
Database models: Entity-relationship model, network model, relational and object oriented data models,
integrity constraints, data manipulation operations.
Unit 2-Relational Model: Structure of relational database, Relational Algebra: Fundamental operations,
Additional Operations, Extended Relational-Algebra operations, Tuple Relational Calculus – Domain Relational
Calculus. SQL: Basic structure, Set operations, Aggregate functions, Null Values, Nested subqueries, Views,
Data Definition Language, Embedded SQL, Dynamic SQL, Domain Constraints, Referential Integrity and
Triggers.
Unit 3-Relational database design: Functional Dependencies, First, Second, Third Normal Forms, Closure,
Armstrong’s Axioms, Canonical cover, Decomposition, Properties of Decomposition, Dependency Preservation,
Boyce-Codd Normal Form, Fourth Normal Form, Fifth Normal Form.
Unit 4-Transaction processing: Transaction Concepts, ACID Properties, Two-Phase Commit, Save Points,
Concurrency Control techniques: Locking Protocols, Two Phase Locking, timestamp-based protocol, Multi-
version and optimistic Concurrency Control schemes, Database recovery.
Unit 5-Storage Structure, Query Processing and Advanced database: Storage structures: RAID. File
Organization: Organization of Records, Indexing, Ordered Indices, B+ tree Index Files, B tree Index Files.
Advanced Database: Object-oriented and object-relational databases, logical databases, web databases,
distributed databases, data warehousing and data mining.
TEXTBOOKS:
1. Abraham Silberschatz, Henry F. Korth, S. Sudharshan, ―Database System Concepts, Sixth Edition,
Tata McGraw Hill, 2011.
2. RamezElmasri, Shamkant B. Navathe, ―Fundamentals of Database Systems, Sixth Edition, Pearson
Education, 2011.
REFERENCE BOOK:
1. C.J.Date, A.Kannan, S.Swamynathan, ―An Introduction to Database Systems, Eighth Edition,
Pearson Education, 2006.
2. Raghu Ramakrishnan, ―Database Management Systems, Fourth Edition, McGraw-Hill College
Publications, 2015.
3. G.K.Gupta,"Database Management Systems, Tata McGraw Hill, 2011.
OUTCOMES: On successful completion of the course, the student will be able to:
UNIT - I
INTRODUCTION TO COMPILERS: Structure of a compiler – Lexical Analysis – Role of Lexical Analyzer
– Input Buffering – Specification of Tokens – Recognition of Tokens – Lex – Finite Automata – Regular
Expressions to Automata – Minimizing DFA.
UNIT- II
SYNTAX ANALYSIS: Role of Parser – Grammars – Error Handling – Context-free grammars – Writing a
grammar – Top Down Parsing - General Strategies, Recursive Descent Parser, Predictive Parser-LL(1) Parser-
Shift Reduce Parser-LR Parser-LR (0)Item Construction of SLR Parsing Table - Introduction to LALR Parser -
Error Handling and Recovery in Syntax Analyzer-YACC.
UNIT- III
SYNTAX-DIRECTED TRANSLATION: Syntax-Directed Definitions, Evaluation Orders for SDD's,
Applications of Syntax-Directed Translation, Syntax-Directed Translation Schemes, Implementing L-Attributed
SDD's.
UNIT- IV
RUN-TIME ENVIRONMENTS: Stack Allocation of Space, Access to Nonlocal Data on the Stack, Heap
Management, Introduction to Garbage Collection, Introduction to Trace-Based Collection.
CODE GENERATION: Issues in the Design of a Code Generator, The Target Language, addresses in the
Target Code, Basic Blocks and Flow Graphs, Optimization of Basic Blocks, A Simple Code Generator,
Peephole Optimization, Register Allocation and Assignment, Dynamic Programming Code-Generation.
UNIT- V
MACHINE-INDEPENDENT OPTIMIZATION: The Principal Sources of Optimization, Introduction to
Data-Flow Analysis, Foundations of Data-Flow Analysis, Constant Propagation, Partial-Redundancy
Elimination, Loops in Flow Graphs, peep-hole optimization.
TEXTBOOKS:
1. Compilers Principles, Techniques and Tools, Alfred V. Aho, Ravi Sethi, Jeffrey D. Ullman, PEA.
2. Introduction to Automata Theory Languages & Computation, 3rd Edition, Hopcroft, Ullman, PEA
REFERENCE BOOKS:
1. Theory of Computer Science, Automata Languages and Computation, 2nd Edition, Mishra, Chandra
Shekaran, PHI.
2. Elements of Compiler Design, A.Meduna, Auerbach Publications, Taylor and Francis Group.
COURSE OUTCOMES: On successful completion of the course, the student will be able to:
UNIT I: INTRODUCTION: Introduction to Graphs, Basic definition – Application of graphs – finite, infinite
and bipartite graphs – Incidence and Degree – Isolated vertex, pendant vertex and Null graph. Paths and circuits
– Isomorphism, sub graphs, walks, paths and circuits, connected graphs, disconnected graphs and components.
UNIT II: EULERIAN AND HAMILTONIAN GRAPHS : Euler graphs, Operations on graphs, Hamiltonian
paths and circuits, Travelling salesman problem. Directed graphs – types of digraphs, Digraphs and binary
relation, Directed paths and connectedness – Euler graphs.
UNIT III TREES AND GRAPH ALGORITHMS : Trees – properties, pendant vertex, Distance and centres
in a tree - Rooted and binary trees, counting trees, spanning trees, Prim’s algorithm and Kruskal’s algorithm,
Dijkstra’s shortest path algorithm, Floyd-Warshall shortest path algorithm.
UNIT IV CONNECTIVITY AND PLANAR GRAPHS : Vertex Connectivity, Edge Connectivity, Cut set
and Cut Vertices, Fundamental circuits, Planar graphs, Kuratowski’s theorem (proof not required), Different
representations of planar graphs, Euler's theorem, Geometric dual.
TEXTBOOKS:
1. Narsingh Deo, "Graph Theory with Application to Engineering and Computer Science", Prentice-Hall
of India Pvt.Ltd, 2003.
2. L.R.Foulds, "Graph Theory Applications", Springer ,2016.
REFERENCES:
1. Bondy, J. A. and Murty, U.S.R., "Graph Theory with Applications", North Holland Publication,2008.
2. West, D. B., ―Introduction to Graph Theory, Pearson Education, 2011.
3. John Clark, Derek Allan Holton, ―A First Look at Graph Theory, World Scientific Publishing
Company, 1991.
4. Diestel, R, "Graph Theory", Springer,3rd Edition,2006. Kenneth H.Rosen, "Discrete Mathematics and
Its Applications", Mc Graw Hill , 2007.
COURSE OUTCOME: On successful completion of the course, the student will be able to:
Unit 1- Introduction to computer graphics & graphics systems: Overview of computer graphics,
representing pictures, preparing, presenting & interacting with pictures for presentations, Visualization & image
processing, RGB color model, direct coding, lookup table, storage tube graphics display, Raster scan display,
3D viewing devices, Plotters, printers, digitizers, Light pens etc., Active & Passive graphics devices, Computer
graphics software.
Unit 2- Points & lines: Line drawing algorithms; DDA algorithm, Bresenhan’s line algorithm, Circle
generation algorithm; Ellipse generating algorithm; scan line polygon, fill algorithm, boundary fill algorithm,
flood fill algorithm.
Unit 3- 2D transformation & viewing Basic transformations: Translation, rotation, scaling, Matrix
representations & homogeneous coordinates, transformations between coordinate systems, reflection shear,
Transformation of points, lines, parallel lines, intersecting lines. Viewing pipeline, Window to viewport co-
ordinate transformation , clipping operations , point clipping , line clipping, clipping circles, polygons & ellipse.
Unit 4- 3D transformations: Translation, rotation, scaling & other transformations. Rotation about an arbitrary
axis in space, reflection through an arbitrary plane, general parallel projection transformation, clipping, viewport
clipping, 3D viewing.
Unit 5- Curves representation: Surfaces, designs, Bezier curves, B-spline curves, end conditions for periodic
B-spline curves, rational B-spline curves. Hidden surfaces Depth comparison, Z-buffer algorithm, Back face
detection, BSP tree method, the Printer’s algorithm, scan-line algorithm; Hidden line elimination, wire frame
methods, fractal - geometry.
Color & shading models Light & color model, interpolative shading model and Texture
TEXTBOOKS:
1. Donald Hearn and Pauline Baker M, ―Computer Graphics, Prentice Hall, New Delhi, 2007.
2. Andleigh, P. K and Kiran Thakrar, ―Multimedia Systems and Design, PHI, 2003.
REFERENCES:
1. Judith Jeffcoate, ―Multimedia in practice: Technology and Applications, PHI, 1998.
2. Foley, Vandam, Feiner and Hughes, ―Computer Graphics: Principles and Practice, 2nd
Edition, Pearson Education, 2003.
3. Jeffrey McConnell, ―Computer Graphics: Theory into Practice, Jones and Bartlett Publishers,2006.
4. Hill F S Jr., "Computer Graphics", Maxwell Macmillan , 1990.
5. Peter Shirley, Michael Ashikhmin, Michael Gleicher, Stephen R Marschner, Erik Reinhard,
KelvinSung, and AK Peters, ―Fundamentals of Computer Graphics, CRC Press, 2010.
6. William M. Newman and Robert F.Sproull, ―Principles of Interactive Computer Graphics, Mc Graw
Hill 1978.
COURSE OUTCOMES: On successful completion of the course, the student will be able to
Unit 2- Software Requirement Analysis: Structured analysis, object-oriented analysis, software requirement
specification, and validation.
Unit 3- Design and Implementation of Software: software design fundamentals, design methodology
(structured design and object-oriented design), design verification, monitoring and control coding.
Unit 4- Testing:Testing fundamentals, white box and black box testing, software testing strategies: unit testing,
integration testing, validation testing, system testing, debugging.
Unit 5- Software Reliability: Metric and specification, fault avoidance and tolerance, exception handling,
defensive programming.Software Maintenance – maintenance characteristics, maintainability, maintenance
tasks, maintenance side effects. CASE tools, software certification- requirement, types of certifications, third
part certification. Software Re-Engineering, reverse software Engineering. Software Configuration Management
Activities, Change Control Process, Software Version Control, CASE: introduction, levels of case, architecture,
case building blocks, objectives, case repository, characteristics of case tools, categories, Estimation of Various
Parameters such as Cost, Efforts, Schedule/Duration, Constructive Cost Models (COCOMO), Resource
Allocation Models, Software Risk Analysis and Management.
TEXTBOOKS:
1. Roger Pressman, ―Software Engineering: A Practitioner ‘s Approach, McGraw Hill, ISBN 007–
337597–7.
2. Ian Sommerville, ―Software Engineering, Addison and Wesley, ISBN 0-13-703515-2.
REFERENCE BOOKS:
1. Carlo Ghezzi, ―Fundamentals of Software Engineering, Prentice Hall India, ISBN-10: 0133056996.
2. Rajib Mall, ―Fundamentals of Software Engineering, Prentice Hall India, ISBN-13: 9788120348981.
3. Pankaj Jalote, ―An Integrated Approach to Software Engineering, Springer, ISBN 13:
9788173192715.
4. S K Chang, ―Handbook of Software Engineering and Knowledge Engineering, World Scientific, Vol
I, II, ISBN: 978-981-02-4973-1.
5. Tom Halt, ―Handbook of Software Engineering, ClanyeInternational ISBN- 10: 1632402939.
L:T:P:: 3:0:0
Credits-03
COURSE OUTCOMES: On successful completion of this course, the students shall be able to
1. Have a fundamental knowledge of the basic concepts of probability.
2. Have a well-founded knowledge of various probability distributions which can describe real-life
phenomena.
3. Acquire skills in estimating expected values of variables and handling situations involving more than
one random variable and functions of random variables.
4. Understand the stochastic processes and phenomena which evolve concerning time in a probabilistic
manner.
5. Expose the basic characteristic features of Markov chains, queuing systems and queuing models.
Unit 1- Probability Models: Sample Space, Events and their algebra, graphical methods of representing events,
Probability Axioms and their applications, Condition probability, Independence of Events, Bayes' Rule and
Bernoulli Trials.
Unit 2- Random variables, and their event spaces: Probability mass function, Distribution functions, some
discrete distributions (Bernoulli, Binomial, Geometric, Poisson, uniform, Probability Generating Function,
Discrete random vectors, Continuous random variables: pdf some continuous distributions (Gamma, Normal),
Exponential functions of random variables, joint1y distributed random variables.
Unit 3- Expectation: Expectation of functions of more than one random variable, Moments and transforms of
some distributions (Uniform, Bernoulli, Binomial, Geometric, Poisson. Exponential, Gamma, Normal),
Computation of mean time to failure.
Unit 4- Stochastic Processes: Classification of stochastic processes, the Bernoulli process, renewal process,
renewal model of program behavior.
Unit 5- Markov Chains: Computation of n-step transition probabilities, State classification and limiting
distributions, Irreducible finite chains with aperiodic states, M/G/l queuing system, Discrete parameter
BirthDeath processes, Analysis of program execution time. Continuous parameter Markov Chains, Birth-Death
process with special cases, Non-Birth-Death Processes.
TEXTBOOKS:
1. Gross, D., Shortle, J.F, Thompson, J.M and Harris. C.M., ―Fundamentals of Queueing Theory", Wiley
Student 4th Edition, 2014.
2. Ibe, O.C., ―Fundamentals of Applied Probability and Random Processes", Elsevier, 1st Indian
Reprint, 2007.
REFERENCE BOOK:
1. Hwei Hsu, "Schaum‘s Outline of Theory and Problems of Probability, Random Variables and Random
Processes", Tata McGraw Hill Edition, New Delhi, 2004.
2. Taha, H.A., "Operations Research", 9th Edition, Pearson India Education Services, Delhi, 2016.
3. Trivedi, K.S., "Probability and Statistics with Reliability, Queueing and Computer Science
Applications", 2nd Edition, John Wiley and Sons, 2002.
4. Yates, R.D. and Goodman. D. J., "Probability and Stochastic Processes", 2nd Edition, Wiley India Pvt.
Ltd., Bangalore, 2012.
L:T:P:: 3:0:0
Credits-03
COURSE OBJECTIVES: The objectives of this course are to
1. Understand fault-tolerant design principles.
2. Identify the requirement of fault-tolerant systems.
3. Understand fault-tolerant distributed systems and its requirement.
4. Design algorithms for fault-tolerant systems.
COURSE OUTCOMES: On successful completion of the course, the student will be able to
1. Understand research problems and challenges in fault tolerance computing.
2. Identify the state-of-the-art techniques and tools to address research problems and challenges.
3. Develop strong technical reviewing, writing, and presentation skills.
4. Design more reliable systems that can tolerate S/W faults.
5. Design more reliable systems that can tolerate H/W faults.
Unit 1- Basics of Fault Tolerance: Fault Classification, Types of Redundancy, Basic Measures of Fault
Tolerance, Reliability concepts, Failures & faults, Reliability and Failure rate, Relation between reliability and
mean time between failure, maintainability and availability, Fault Tolerant Design: Basic concepts-static,
dynamic, hybrid, triple modular redundant system (TMR), Data redundancy, Time redundancy and software
Redundancy concepts.
Unit 2- Hardware Fault Tolerance: canonical and Resilient Structures- Series and Parallel Systems, Non-
Series/Parallel Systems, M-of-N Systems, Voters, Variations on N-Modular Redundancy, Duplex Systems,
Other Reliability Evaluation Techniques-Poisson Processes, Markov Models, Fault-Tolerance Processor-Level
Techniques, Watchdog Processor, Simultaneous Multithreading for Fault Tolerance, Byzantine Failures,
Byzantine Agreement with Message Authentication.
Unit 3- Testability for Hardware: testability for combinational circuits: Basic concepts of Testability,
Controllability and observability, The Reed Muller’s expansion technique, use of control and syndrome testable
designs. Design for testability by means of scan: Making circuits Testable, Testability Insertion, Full scan DFT
technique- Full scan insertion, flip-flop Structures, Full scan design and Test, Scan Architectures full scan
design, Shadow register DFT, Partial scan methods, multiple scan design, other scan designs.
Unit 4- Software Fault Tolerance: Acceptance Tests Single-Version Fault Tolerance- Wrappers, Software
Rejuvenation, Data Diversity, Software Implemented Hardware Fault Tolerance (SIHFT), N-Version
Programming- Consistent Comparison Problem, Version Independence, Recovery Block Approach- Basic
Principles, Success Probability Calculation, Distributed Recovery Blocks, Preconditions, Postconditions, and
Assertions, Exception-Handling- Requirements from Exception-Handlers, Basics of Exceptions and Exception-
Handling, Language Support, Software Reliability Models- Jelinski–Moranda Model, Littlewood–Verrall
Model, Musa–Okumoto Model, Model Selection and Parameter Estimation, Fault-Tolerant Remote Procedure
TEXTBOOKS:
1. Israel Koren And C. Mani Krishna, “Fault-Tolerant Systems, Morgan Kaufmann publisher
2. Parag K. Lala, “Fault Tolerant & Fault Testable Hardware Design”, 1984, PHI
REFERENCE BOOKS:
1. Fault Tolerant Computer System Design, D. K. Pradhan, Prentice Hall, 1996.
2. Probability and Statistics with Reliability, Queuing and Computer Science Applications, Kishor S.
Trivedi, John Wiley & Sons Inc., 2016.
3. ZainalabedinNavabi, “Digital System Test and Testable Design using HDL models and
Architectures”, Springer International Edition.
4. MironAbramovici, Melvin A. Breuer and Arthur D. Friedman, “Digital Systems Testing and Testable
Design”, Jaico Books
COURSE OUTCOMES: On successful completion of the course, the student will be able to
1. Grasp a fundamental understanding of goals, components, and evolution of real time systems.
2. Explain the concepts of real time scheduling.
3. Learn the scheduling policies of modern operating systems.
4. Understand the resource access control techniques in real time systems.
5. Understand the concept of real time communication.
Unit 1-Introduction: Definition, Typical Real Time Applications: Digital Control, High Level Controls, Signal
Processing etc., Release Times, Deadlines, and Timing Constraints, Hard Real Time Systems and Soft Real
Time Systems, Reference Models for Real Time Systems: Processors and Resources, Temporal Parameters of
Real Time Workload, Periodic Task Model, Precedence Constraints and Data Dependency.
Unit 2-Real Time Scheduling: Common Approaches to Real Time Scheduling: Clock Driven Approach,
Weighted Round Robin Approach, Priority Driven Approach, Dynamic Versus Static Systems, Optimality of
Effective-Deadline-First (EDF) and Least-Slack-Time-First (LST) Algorithms, Offline Versus Online
Scheduling, Scheduling Aperiodic and Sporadic jobs in Priority Driven and Clock Driven Systems.
Unit 3-Resources Access Control: Effect of Resource Contention and Resource Access Control (RAC), Non-
preemptive Critical Sections, Basic Priority-Inheritance and Priority-Ceiling Protocols, Stack Based Priority-
Ceiling Protocol, Use of Priority-Ceiling Protocol in Dynamic Priority Systems, PreemptionCeiling Protocol,
Access Control in Multiple-Unit Resources, Controlling ConcurrentAccesses to Data Objects.
Unit 4-Multiprocessor System Environment: Multiprocessor and Distributed System Model, Multiprocessor
Priority-Ceiling Protocol,Schedulability of Fixed-Priority End-to-End Periodic Tasks, Scheduling Algorithms
for End-to-End Periodic Tasks, End-to-End Tasks in Heterogeneous Systems, Predictability andValidation of
Dynamic Multiprocessor Systems, Scheduling of Tasks with Temporal Distance Constraints.
Unit 5-Real Time Communication: Model of Real Time Communication, Priority-Based Service and
Weighted Round-Robin Service Disciplines for Switched Networks, Medium Access Control Protocols for
Broadcast Networks, Internet and Resource Reservation Protocols, Real Time Protocols,Communication in
Multicomputer System, An Overview of Real Time Operating Systems.
TEXTBOOKS:
1. Real Time Systems – Jane W. S. Liu, Pearson Education Publication.
2. Real-Time Systems Design and Analysis, Phillip. A. Laplante, second edition, PHI, 2005.
REFERENCE BOOKS:
1. Real Time Systems – Mall Rajib, Pearson Education
2. Real-Time Systems: Scheduling, Analysis, and Verification – Albert M. K. Cheng, Wiley.
COURSE OUTCOMES: On Successful completion of the course, the students will be able to
1. Acquire the theoretical and conceptual foundations of distributed computing.
2. Conceptualize the ideas of distributed operating systems and their issues.
3. Understand the issues involved in distributed resource environment.
4. Realize the importance of transaction and how to recovery the system from deadlocks.
5. Explore the principles of fault tolerance and its protocols.
Unit 1- Distributed Environment: Introduction, Limitations, Remote Procedure Call, Remote Object
Invocation, Message-Oriented Communication, Unicasting, Multicasting and Broadcasting, Group
Communication.
Unit 2-Distributed Operating Systems: Issues in Distributed Operating Systems, Threads in Distributed
Systems, Clock Synchronization, Causal Ordering, Global States, Election Algorithms, Distributed Mutual
Exclusion, Distributed Deadlock, Agreement Protocols
Unit 3- Distributed Resource Management: Distributed Shared Memory, Data-Centric Consistency Models,
Client-Centric Consistency Models, Distributed File Systems, Sun NFS.
Unit 5- Fault Tolerance and Consensus: Introduction to Fault Tolerance, Distributed Commit Protocols,
Byzantine Fault Tolerance, Impossibilities in Fault Tolerance.
TEXTBOOK(S):
1. Develop the fundamental concepts such as fuzzy sets, operations and fuzzy relations.
2. Lean about scalar variables' fuzzification and membership functions' defuzzification.
3. Learn three different inference methods to design fuzzy rule-based system.
4. Develop fuzzy decision making by introducing some concepts and also Bayesian decision methods.
5. Learn different fuzzy classification methods.
COURSE OUTCOMES: On successful completion of the course, the students will be able to
1. Understand the basic ideas of fuzzy sets, operations and properties of fuzzy sets, and fuzzy relations.
2. Understand the basic features of membership functions, fuzzification process and defuzzification
process.
3. Design fuzzy rule-based system.
4. Know about combining fuzzy set theory with probability to handle random and non-random
uncertainty, and the decision-making process.
5. Gain the knowledge about fuzzy C-Means clustering.
Unit – I: Classical Sets: Operations and properties of classical sets, Mapping of classical sets to the functions.
Fuzzy sets - Membership functions, Fuzzy set operations, Properties of fuzzy sets.
Classical and Fuzzy Relations: Cartesian product, crisp relations-cardinality, operations, and properties of
crisp relations. Fuzzy relations-cardinality, operations, properties of fuzzy relations, fuzzy Cartesian product and
composition, Fuzzy tolerance and equivalence relations, value assignments and other format of the composition
operation.
UNIT II: Fuzzification and Defuzzification : Features of the membership functions, various forms,
fuzzification, defuzzification to crisp sets, l- cuts for fuzzy relations, Defuzzification to scalars. Fuzzy logic and
approximate reasoning, other forms of the implication operation.
UNIT III : Fuzzy Systems : Natural language, Linguistic hedges, Fuzzy (Rule based) System, Aggregation of
fuzzy rules, Graphical techniques of inference, Membership value assignments: Intuition, Inference, rank
ordering, Fuzzy Associative memories.
UNIT IV: Fuzzy Decision Making: Fuzzy synthetic evaluation, Fuzzy ordering, Preference and consensus,
Multi
objective decision making, Fuzzy Bayesian, Decision method, Decision making under Fuzzy states and fuzzy
actions.
UNIT V: Fuzzy Classification: Classification by equivalence relations-crisp relations, Fuzzy relations, Cluster
analysis, Cluster validity, C-Means clustering, Hard C-Means clustering, Fuzzy C-Means algorithm,
Classification metric, Hardening the Fuzzy C-Partition.
TEXTBOOK(s):
1. Timothy J.Ross - Fuzzy logic with engineering applications, 3rd edition, Wiley,2010.
2. George J.KlirBo Yuan - Fuzzy sets and Fuzzy logic theory and Applications, PHI, New Delhi,1995.
REFERENCE BOOK(s):
1. S.Rajasekaran, G.A.Vijayalakshmi - Neural Networks and Fuzzy logic and Genetic Algorithms,
Synthesis and Applications, PHI, New Delhi,2003.
COURSE OUTCOMES: Upon successful completion of the course, the students will be able to
1. Solve recurrence equations by considering time and space complexity.
2. Analyse the complexities of various problems in different domains.
3. Solve the problems that comprises of shortest route issue.
4. Solve the problems that address the issue of dynamic programming
5. Synthesize efficient algorithms in common engineering design situations.
LIST OF EXCERCISES
11. Write a program that uses dynamic programming algorithm to solve the optimal binary search tree
problem.
12. Write a program for solving traveling salespersons problem using the following:
a) Dynamic programming algorithm.
b) The back tracking algorithm.
c) Branch and bound.
COURSE OUTCOMES: On successful completion of the course, the students will be able to
1. Understand, appreciate, and effectively explain the concepts of database Technologies.
2. Declare and enforce integrity constraints on a database using RDBMS.
3. Devise a complex query using SQL DML/DDL commands.
4. Create views and use in-built functions to query a database.
5. Write PL/SQL programs including stored procedures, stored functions and triggers.
LIST OF EXPERIMENTS
1. Build the following database schemas and perform the manipulation operations on these schemas using
SQL DDL,DML,TCL and DCL commands.
(I) Database Schema for a customer-sale scenario
Customer(Custid : integer, cust_name: string)
Item(item_id: integer, item_name: string, price: integer)
Sale(bill_no: integer, bill_data: date, cust_id: integer, item_id: integer, qty_sold: integer)
COURSE OUTCOMES: On successful completion of the course, the students will be able to
1. Understand the basic concepts; ability to apply automata theory and knowledge on formal languages.
2. Understand the basic concepts and application of Compiler Design
3. Apply their basic knowledge Data Structure to design Symbol Table, Lexical Analyser, Intermediate
Code Generation, Parser (Top Down and Bottom-Up Design) and will able to understand strength of
Grammar and Programming Language.
4. Understand various code optimization techniques and error recovery mechanisms.
5. Understand and Implement a Parser.
LIST OF PRACTICALS:
1. Design a lexical analyzer for given language and the lexical analyzer should ignore redundant spaces,
tabs and new lines. It should also ignore comments. Although the syntax specification states that
identifiers can be arbitrarily long, you may restrict the length to some reasonable value. Simulate the
same in C language
2. Write a C program to identify whether a given line is a comment or not
3. Write a C program to test whether a given identifier is valid or not.
4. Write a C program to simulate lexical analyzer for validating operators.
5. To Study about Lexical Analyzer Generator(LEX) and Flex(Fast Lexical Analyzer)
6. Implement following programs using Lex:
a) Create a Lexer to take input from text file and count no of characters, no. of lines & no. of words.
b) Write a Lex program to count number of vowels and consonants in a given input string.
7. Implement following programs using Lex.
a) Write a Lex program to print out all numbers from the given file.
b) Write a Lex program to printout all HTML tags in file.
c) Write a Lex program which adds line numbers to the given file and display the same onto the
standard output.
8. Write a Lex program to count the number of comment lines in a given C program. Also eliminate them
and copy that program into separate file.
9. Write a C program for implementing the functionalities of predictive parser for the mini language.
Syllabus of B.TECH – Computer Science and Engineering PAGE 30
VEER MADHO SINGH BHANDARI UTTARAKHAND TECHNICAL UNIVERSITY, DEHRADUN
COURSE OUTCOMES: At the end of internship/mini project, the students will be able to
1. Understand organizational issues and their impact on the organization and employees.
2. Identify industrial problems and suggest possible solutions.
3. Relate, apply and adapt relevant knowledge, concepts and theories within an industrial organization,
practice and ethics.
4. Apply technical knowledge in an industry to solve real world problems.
5. Demonstrate effective group communication, presentation, self-management, and report writing skills.
COURSE OUTCOMES
On successful completion of the course, the students will be able to
council of ministers, Parliament, Supreme court and so on), Framework for state
government (Governor, Chief Minister, state legislature, High court and so on) and
Framework for local self government (Panchayatiraj, Municipalities) and Union
Territories.
Unit-5 Constitutional, Non-Constitutional and other bodies
Discussion on Various constitutional bodies like Election Commission, UPSC, SPSC,
Finance commission, NCSC, NCST, NCBC, CAG and AGI. Discussion on Various non-
constitutional bodies like NITI Aayog, NHRC, CIC, CVC, CBI, Lokpal and Lokayukta.
Discussion on Various other constitutional bodies like Co- operative societies, Official
Language, Tribunals etc.
Text/Reference books-
1. M. Laxmikanth, “Indian Polity”, McGraw- Hill, 6th edition, 2020
st
2. D.D. Basu, “Introduction to the Indian Constitution”, LexisNexis, 21 edition, 2020
3. S.C. Kashyap, “ Constitution of India”, Vitasta publishing Pvt. Ltd., 2019
1. To facilitate the students with the concepts of Indian traditional knowledge and to
make them understand the Importance of roots of knowledge system.
2. To make the students understand the traditional knowledge and analyses it and apply
it to their day to day life.
3. To make the students know the need and importance of protecting traditional
knowledge.
4. To make the students understand the concepts of Intellectual property to protect the
traditional knowledge.
5. This course is also concentrating on various acts in protecting the environment and
Knowledge management impact on various sectors in the economy development of
the country.
COURSE OUTCOMES:
On successful completion of the course, the students will be able to
Text/Reference Books:
1. Traditional Knowledge System in India by Amit Jha Atlantic publishers, 2002.
2. "Knowledge Traditions and Practices of India" Kapil Kapoor1, Michel Danino2.
3. Traditional Knowledge System in India, by Amit Jha, 2009.
4. Satya Prakash, “Founders of Sciences in Ancient India”, Vijay Kumar Publisher,
1989
5. Traditional Knowledge System and Technology in India by Basanta Kumar Mohanta
and Vipin Kumar Singh Pratibha Prakashan 2012.
Unit 1- Data communication Components: Representation of data and its flow Networks, Various Connection
Topology, Protocols and Standards, OSI model, Transmission Media, LAN: Wired LAN, Wireless LANs,
Connecting LAN and Virtual LAN, Techniques for Bandwidth utilization: Multiplexing - Frequency division,
Time division and Wave division, Concepts on spread spectrum.
Unit 2- Data Link Layer and Medium Access Sub Layer: Error Detection and Error Correction -
Fundamentals, Block coding, Hamming Distance, CRC; Flow Control and Error control protocols - Stop and
Wait, Go back – N ARQ, Selective Repeat ARQ, Sliding Window, Piggybacking, Random Access,
Multiple access protocols- Pure ALOHA, Slotted ALOHA, CSMA/CD, CDMA/CA, high level data link
control(HDLC), Point To Point protocol (PPP).
Unit 3- Network Layer: Repeater, Hub, Switches, Bridges, Gateways, Switching, Logical addressing – IPV4,
IPV6, Address mapping – ARP, RARP, BOOTP and DHCP–Delivery, Forwarding and Unicast Routing
protocols.
Unit 4- Transport Layer: Process to Process Communication, User Datagram Protocol (UDP), Transmission
Control Protocol (TCP), SCTP Congestion Control; Quality of Service, QoS improving techniques: Leaky
Bucket and Token Bucket algorithm.
Unit 5- Application Layer: Domain Name Space (DNS), DDNS, TELNET, EMAIL, File Transfer Protocol
Syllabus of B.TECH – Computer Science and Engineering PAGE 37
VEER MADHO SINGH BHANDARI UTTARAKHAND TECHNICAL UNIVERSITY, DEHRADUN
(FTP), WWW, HTTP, SNMP, Bluetooth, Firewalls, Basic concepts of Cryptography , Digital Signature.
TEXTBOOK:
1. Behrouz A. Forouzan, Data Communications and Networking, Fifth Edition TMH, 2013.
REFERENCE BOOKS:
1. Larry L. Peterson, Bruce S. Davie, Computer Networks: A Systems Approach, Fifth Edition, Morgan
Kaufmann Publishers Inc., 2012.
2. William Stallings, Data and Computer Communications, Tenth Edition, Pearson Education, 2013.
3. Nader F. Mir, Computer and Communication Networks, Second Edition, Prentice Hall, 2014.
4. Ying-Dar Lin, Ren-Hung Hwang and Fred Baker, Computer Networks: An Open Source Approach,
McGraw Hill Publisher, 2011.
5. James F. Kurose, Keith W. Ross, Computer Networking, A Top-Down Approach Featuring the
Internet, Sixth Edition, Pearson Education, 2013
COURSE OUTCOMES: On successful completion of the course, the students will be able to
1. Build intelligent agents for search and games
2. Solve AI problems through programming with Python.
3. Learn optimization and inference algorithms for model learning.
4. Design and develop programs for an agent to learn and act in a structured environment.
5. Possess the ability to apply AI techniques to solve problems of Game Playing, Expert Systems and
machine learning.
Unit 1- Introduction: What is AI, Foundations of AI, History of AI, The State of the Art, AI Techniques,
Problem Solving: Problem solving agents, uniformed search strategies, Informed search strategies, Constraint
Satisfaction Problems.
Unit 2- Knowledge Representation: Approaches and issues in knowledge representation, Knowledge Based
Agents, Propositional Logic, Predicate Logic- Unification and Resolution, Weak slot –Filler Structure, Strong
slot- Filler structure.
Unit 3- Probabilistic Reasoning: Probability, conditional probability, Bayes Rule, Bayesian Networks-
representation, construction and inference, Brief introduction of Neural Networks, Fuzzy Logic and Genetic
Algorithms
Unit 4- Planning and Learning: Planning with state space search, conditional planning, continuous planning,
Multi-Agent planning. Forms of learning, Inductive Learning, Statistical learning method and Reinforcement
learning.
Unit 5- Advanced Topics: Expert Systems- Representation- Expert System shells- Knowledge Acquisition
with examples.
Game Playing-Minimax Search Procedure, Alpha-Beta Pruning, Imperfect, Real-Time Decisions.
Swarm Intelligent Systems- Ant Colony System, Development, Application and Working of Ant Colony
System.
TEXTBOOKS:
1. S. Russell and P. Norvig, "Artificial Intelligence: A Modern Approach, Prearson Education,
4thEdition, 2022.
2. Michael Negnevitsky, Artificial Intelligence, 3rd edition, Pearson Education.
3. I. Bratko, ―Prolog: Programming for Artificial Intelligence, Fourth edition, Addison-Wesley
Educational Publishers Inc., 2011.
REFERENCE BOOKS:
1. George F Luger, Artificial Intelligence, 6th edition, Pearson Education.
2. M. Tim Jones, ―Artificial Intelligence: A Systems Approach(Computer Science), Jones and Bartlett
Publishers, Inc.; First Edition, 2008.
3. Nils J. Nilsson, ―The Quest for Artificial Intelligence, Cambridge University Press, 2009.
4. William F. Clocksin and Christopher S. Mellish, Programming in Prolog: Using the ISO Standard, Fifth
Edition, Springer, 2003.
5. Gerhard Weiss, ―Multi Agent Systems, Second Edition, MIT Press, 2013.
6. David L. Poole and Alan K. Mackworth, ―Artificial Intelligence: Foundations of Computational
Agents, Cambridge University Press, 2010.
Unit 1- Introduction: Concept of Operating Systems, Generations of Operating systems, Types of Operating
Systems, OS Services, System Calls, Structure of an OS -Layered, Microkernel Operating Systems, Concept
of Virtual Machine.
Processes: Definition, Process Relationship, Different states of a Process, Process State transitions, Process
Control Block (PCB), Context switching
Thread: Definition, Various states, Benefits of threads, Types of threads, Concept of multi threads
Unit 2- Process Scheduling: Foundation and Scheduling objectives, Types of Schedulers, Scheduling criteria:
CPU utilization, Throughput, Turnaround Time, Waiting Time, Response Time; Scheduling algorithms: Pre-
emptive and Non-preemptive, FCFS, SJF, RR; Multiprocessor scheduling: Real-Time scheduling: RM and EDF.
Inter-process Communication: Critical Section, Race Conditions, Mutual Exclusion, Hardware Solution,
Strict Alternation, Peterson’s Solution, The Producer-Consumer Problem, Semaphores, Monitors, Message
Passing, Classical IPC Problems: Reader’s & Writer Problem, Dinning Philosopher Problem etc.
Unit 3- Deadlocks: Definition, Necessary and sufficient conditions for Deadlock, Deadlock Prevention,
Deadlock Avoidance: Banker’s algorithm, Deadlock detection and Recovery.
Memory Management: Basic concept, Logical and Physical address map, Memory allocation: Contiguous
Memory allocation–Fixed and variable partition– Internal and External fragmentation and Compaction; Paging:
Principle of operation – Page allocation –Hardware support for paging, Protection and sharing, Disadvantages
of paging.
Unit 4- Virtual Memory: Basics of Virtual Memory – Hardware and control structures – Locality of reference,
Page fault, Working Set, Dirty page/Dirty bit – Demand paging, Page Replacement algorithms: Optimal, First in
First Out (FIFO), Second Chance (SC), Not recently used (NRU) and Least Recently used(LRU).
Unit 5- File Management: Concept of File, Access methods, File types, File operation, Directory structure, File
System structure, Allocation methods (Contiguous, linked, indexed).
Disk Management: Disk structure, Disk scheduling - FCFS, SSTF, SCAN, C-SCAN, Disk reliability.
TEXTBOOKS:
1. AviSilberschatz, Peter Galvin, Greg Gagne , Operating System Concepts Essentials, 9th Edition by,
Wiley Asia Student Edition.
2. William Stallings , Operating Systems: Internals and Design Principles, 9th Edition (2022), Prentice
Hall of India.
Reference Books:
1. RamazElmasri, A. Gil Carrick, David Levine, ―Operating Systems – A Spiral Approach, Tata
McGraw Hill Edition, 2010.
2. Achyut S.Godbole, Atul Kahate, ―Operating Systems, McGraw Hill Education, 2016.
3. Andrew S. Tanenbaum, ―Modern Operating Systems, Second Edition, Pearson Education, 2004.
Unit 1-INTRODUCTION TO IOT: Internet of Things - Physical Design- Logical Design- IOT Enabling
Technologies - IOT Levels & Deployment Templates - Domain Specific IOTs - IOT and M2M - IoT System
Management with NETCONF-YANG- IoT Platforms Design Methodology
Unit 2-IOT ARCHITECTURE: M2M high-level ETSI architecture - IETF architecture for IoT - OGC
architecture - IoT reference model - Domain model - information model - functional model - communication
model - IoT reference architecture
Unit 3-IOT PROTOCOLS: Protocol Standardization for IoT – Efforts – M2M and WSN Protocols – SCADA
and RFID Protocols – Unified Data Standards – Protocols – IEEE 802.15.4 – BACNet Protocol – Modbus–
Zigbee Architecture – Network layer – 6LowPAN - CoAP - Security
Unit 4-BUILDING IOT WITH RASPBERRY PI & ARDUINO: Building IOT with RASPERRY PI- IoT
Systems - Logical Design using Python – IoT Physical Devices & Endpoints - IoT Device -Building blocks -
Raspberry Pi -Board - Linux on Raspberry Pi - Raspberry Pi Interfaces -Programming Raspberry Pi with Python
- Other IoT Platforms - Arduino.
Unit 5-CASE STUDIES AND REAL-WORLD APPLICATIONS: Real world design constraints -
Applications - Asset management, Industrial automation, smart grid, Commercial building automation, Smart
cities - participatory sensing - Data Analytics for IoT – Software & Management Tools for IoT, Cloud Storage
Models & Communication APIs - Cloud for IoT - Amazon Web Services for IoT
TEXTBOOK:
1. David Hanes, Gonzalo Salgueiro, Patrick Grossetete, Rob Barton and Jerome Henry, ―IoT
Fundamentals: Networking Technologies, Protocols and Use Cases for Internet of Things, Cisco Press,
2017
REFERENCE BOOKS:
1. ArshdeepBahga, Vijay Madisetti, ―Internet of Things – A hands-on approach, Universities
Press, 2015.
2. Olivier Hersent, David Boswarthick, Omar Elloumi , ―The Internet of Things – Key applications and
Protocols, Wiley, 2012.
3. Jan Ho¨ ller, VlasiosTsiatsis , Catherine Mulligan, Stamatis , Karnouskos, Stefan Avesand. David
Boyle, "From Machine-to-Machine to the Internet of Things - Introduction to a New Age of
Intelligence", Elsevier, 2014.
4. Dieter Uckelmann, Mark Harrison, Michahelles, Florian (Eds), ―Architecting the Internet of
Things, Springer, 2011.
5. Michael Margolis, Arduino Cookbook, Recipes to Begin, Expand, and Enhance Your Projects, 2nd
Edition, O'Reilly Media, 2011.
1. Impart knowledge about the quantum-mechanical phenomena such as superposition and entanglement
to perform computation.
3. Enable the students to understand the quantum computing and quantum information in depth.
COURSE OUTCOMES: On successful completion of the course, the students will be able to
1. Explain the working of Quantum Computing program.
Unit 1- Introduction to Quantum Computing: Motivation for studying Quantum Computing, Major players
in the industry (IBM, Microsoft, Rigetti, D-Wave etc.) Origin of Quantum Computing, Overview of major
concepts in Quantum Computing, Qubits and multi-qubits states, Bloch Sphere representation, Quantum
Unit 2-Math Foundation for Quantum Computing: Matrix Algebra: basis vectors and orthogonality, inner
product and Hilbert spaces, matrices, and tensors, unitary operators and projectors, Dirac notation, Eigen values
Unit 3-Building Blocks for Quantum Program: Architecture of a Quantum Computing platform, Details of q-
bit system of information representation: Block Sphere, Multi-qubits States, Quantum superposition of qubits
(valid and invalid superposition), Quantum Entanglement ,Universal quantum gates, Quantum Fourier
Transform.
Unit 4-Quantum Algorithms: Basic techniques exploited by quantum algorithms. The quantum search
algorithm, Quantum Walks, Major Algorithms, Shor’s Algorithm, Grover’s Algorithm Deutsch’s
Unit 5-Toolkits: OSS Toolkits for implementing Quantum program, IBM quantum experience, Microsoft Q,
RigettiPyQuil (QPU/QVM)
TEXTBOOKS:
1. Eric R. Johnston, Nic Harrigan, Mercedes and Gimeno-Segovia “Programming Quantum Computers:
Essential Algorithms And Code Samples, SHROFF/ O’Reilly.
2. Dr. Christine Corbett Moran, Mastering Quantum Computing with IBM QX: Explore the world of
quantum computing using the Quantum Composer and Qiskit, Kindle Edition Packt
REFERENCE BOOKS:
2. Michael A. Nielsen and Issac L. Chuang, “Quantum Computation and Information”, Cambridge
(2002).
3. Riley Tipton Perry, “Quantum Computing from the Ground Up”, World Scientific Publishing Ltd
(2012).
1. Gain the knowledge of historical and modern overviews and perspectives on virtual reality.
2. Learn the fundamentals of sensation, perception, and perceptual training.
3. Have the scientific, technical, and engineering aspects of augmented and virtual reality systems.
4. Learn the technology of augmented reality and implement it to have practical knowledge.
COURSE OUTCOME: On successful completion of the course, the students will be able to
1. Understand geometric modelling and Virtual environment.
2. Study about Virtual Hardware and Software
3. Present geometric model for VR systems
4. Identify which type hardware and software is suitable to design their own VR systems
5. Develop Virtual Reality applications.
Unit 1-Introduction to Virtual Reality: Virtual Reality and Virtual Environment: Introduction, Computer
graphics, Real time computer graphics, Flight Simulation, Virtual environment requirement, benefits of
virtual reality, Historical development of VR, Scientific Landmark,3D Computer Graphics: Introduction, The
Virtual world space, positioning the virtual observer, the perspective projection, human vision, stereo
perspective projection, 3D clipping, Colour theory, Simple 3D modelling, Illumination models,
Reflection models, Shading algorithms, Radiosity, Hidden Surface Removal, Realism-Stereographic image.
Unit 2-Geometric Modelling: Geometric Modelling: Introduction, From 2D to 3D, 3D space curves, 3D
boundary representation Geometrical Transformations: Introduction, Frames of reference, Modelling
transformations, Instances, Picking, Flying, Scaling the VE, Collision detection Generic VR system:
Introduction, Virtual environment, Computer environment, VR technology, Model of interaction, VR Systems.
Unit 3-Virtual Environment: Animating the Virtual Environment: Introduction, The dynamics of numbers,
Linear and Non-linear interpolation, the animation of objects, linear and non-linear translation. Physical
Simulation: Introduction, Objects falling in a gravitational field, Rotating wheels, Elastic collisions, projectiles,
simple pendulum, springs, Flight dynamics of an aircraft.
Unit 4-VR Hardware and Software: Human factors: Introduction, the eye, the ear, the somatic senses.
VR Hardware: Introduction, sensor hardware, Head-coupled displays, Acoustic hardware, Integrated VR
systems. VR Software: Introduction, Modelling virtual world, Physical simulation, VR toolkits, Introduction to
VRML
Unit 5-VR Applications: Introduction, Engineering, Entertainment, Science, Training. The Future: Virtual
environment, modes of interaction.
TEXTBOOKS:
1. Coiffet, P., Burdea, G. C., (2003), “Virtual Reality Technology,” Wiley-IEEE Press, ISBN:
9780471360896
2. Schmalstieg, D., Höllerer, T., (2016), “Augmented Reality: Principles & Practice,” Pearson, ISBN:
9789332578494
3. Norman, K., Kirakowski, J., (2018), “ Wiley Handbook of Human Computer Interaction,” Wiley-
Blackwell, ISBN: 9781118976135
4. LaViola Jr., J. J., Kruijff, E., McMahan, R. P., Bowman, D. A., Poupyrev, I., (2017), “3D User
Interfaces: Theory and Practice,” Pearson, ISBN: 9780134034324
5. Fowler, A., (2019), “Beginning iOS AR Game Development: Developing Augmented Reality Apps
with Unity and C#,” Apress, ISBN: 9781484246672
6. Hassanien, A. E., Gupta, D., Khanna, A., Slowik, A., (2022), “Virtual and Augmented Reality for
Automobile Industry: Innovation Vision and Applications,” Springer, ISBN: 9783030941017
REFERENCE BOOKS:
1. Craig, A. B., (2013), “Understanding Augmented Reality, Concepts and Applications,” Morgan
Kaufmann, ISBN: 9780240824086
2. Craig, A. B., Sherman, W. R., Will, J. D., (2009), “Developing Virtual Reality Applications,
Foundations of Effective Design,” Morgan Kaufmann, ISBN: 9780123749437
3. John Vince, J., (2002), “Virtual Reality Systems, “ Pearson, ISBN: 9788131708446
4. Anand, R., “Augmented and Virtual Reality,” Khanna Publishing House
5. Kim, G. J., (2005), “Designing Virtual Systems: The Structured Approach”, ISBN: 9781852339586
6. Bimber, O., Raskar, R., (2005), “Spatial Augmented Reality: Merging Real and Virtual Worlds,” CRC
Press, ISBN: 9781568812304
7. O'Connell, K., (2019), “Designing for Mixed Reality: Blending Data, AR, and the Physical World,”
O'Reilly, ISBN: 9789352138371
8. SanniSiltanen, S., (2012), “Theory and applications of marker-based augmented reality,” Julkaisija –
Utgivare Publisher, ISBN: 9789513874490
L:T:P:: 3:0:0
Credits-03
COURSE OBJECTIVES: The objectives of this course are to
COURSE OUTCOMES: On successful completion of this course, the student will be able to:
1. Design simple web pages using mark-up languages like HTML and XHTML.
2. Create dynamic web pages using DHTML and java script that is easy to navigate and use.
3. Program server-side web pages that have to process request from client side web pages.
4. Represent web data using XML and develop web pages using JSP.
5. Understand various web services and how these web services interact.
UNIT-I Introduction to HTML: HTML Common tags- List, Tables, images, forms, Frames; Cascading Style
sheets;
Introduction to JavaScript: Scripts, Objects in Java Script, Dynamic HTML with Java Script
XML: Document type definition, XML Schemas, Document Object model, Presenting XML, Using XML
Processors: DOM and SAX
UNIT-II Java Beans: Introduction to Java Beans, Advantages of Java Beans, BDK Introspection, Using Bound
properties, Bean Info Interface, Constrained properties Persistence, Customizes, Java Beans API, Introduction to
EJB’s
UNIT-III Web Servers and Servlets: Tomcat web server, Introduction to Servelets: Lifecycle of a Serverlet,
JSDK, The Servelet API, Thejavax.servelet Package, Reading Servelet parameters, Reading Initialization
parameters. The javax.servelet HTTP package, Handling Http Request & Responses, Using Cookies-Session
Tracking, Security Issues.
UNIT-IV Introduction to JSP: The Problem with Servelet. The Anatomy of a JSP Page, JSP Processing. JSP
Application Design with MVC Setting Up and JSP Environment: Installing the Java Software Development Kit,
Tomcat Server & Testing Tomcat
UNIT-V JSP Application Development: Generating Dynamic Content, Using Scripting Elements Implicit JSP
Objects, Conditional Processing – Displaying Values Using an Expression to Set an Attribute, Declaring
Variables and Methods Error Handling and Debugging Sharing Data Between JSP pages, Requests, and Users
Passing Control and Date between Pages – Sharing Session and Application Data – Memory Usage
Considerations.
TEXT BOOK:
1. Jeffrey C. Jackson, "Web Technologies--A Computer Science Perspective", Pearson Education, 2006.
REFERENCE BOOK:
1. Robert. W. Sebesta, "Programming the World Wide Web", 8thEdition(2022), Pearson Education, 2007.
2. Deitel, Deitel, Goldberg, "Internet & World Wide Web How To Program", Third Edition, Pearson
Education, 2006.
3. Marty Hall and Larry Brown, Core Web Programming Second Edition, ‖ ‖ Volume I and II, Pearson
Education, 2001.
4. Bates, ―Developing Web Applications‖, Wiley, 2006
COURSE OUTCOMES: O successful completion of this course, the students will be able to
1. Understand the risk of computer failures and their comparison with other equipment failures.
2. Analyze hardware and software fault-tolerant or non-fault-tolerant on the basis of dependability
requirements.
3. Know the different advantages and limits of fault avoidance and fault tolerance techniques.
4. Understand the principles behind reliability
5. Gain knowledge in sources of faults and their prevention and forecasting.
6. Learn the programming tools in designing reliable systems
Unit 1-Reliability& fault: Definition, System reliability, Parameter values, Reliability models for hardware
redundancy, Testing: Various testing methods, Definition, Fault types, Detection, Redundancy, Data diversity,
Reversal checks, Byzantine failures, Integrated failure handling.
Unit 2- Hardware Fault Tolerance:-Definition, Fault types, Detection, Redundancy, Data diversity, Reversal
checks, Byzantine failures, Integrated failure handling, canonical and Resilient Structures- Series and Parallel
Systems, Non-Series/Parallel Systems, M-of-N Systems, Voters, Variations on N-Modular Redundancy, Duplex
Systems, Other Reliability Evaluation Techniques-Poisson Processes, Markov Models, Fault-Tolerance
Processor-Level Techniques, Watchdog Processor, Simultaneous Multithreading for Fault Tolerance, Byzantine
Failures, Byzantine Agreement with Message Authentication.
Unit 3-Testability for Hardware: testability for combinational circuits: Basic concepts of Testability,
Controllability and observability, The Reed Muller’s expansion technique, use of control and syndrome testable
designs. Design for testability by means of scan: Making circuits Testable, Testability Insertion, Full scan DFT
technique- Full scan insertion, flip-flop Structures, Full scan design and Test, Scan Architecturesfull scan
design, Shadow register DFT, Partial scan methods, multiple scan design, other scan designs.
Unit 4- Software Fault Tolerance:Acceptance Tests Single-Version Fault Tolerance- Wrappers, Software
Rejuvenation, Data Diversity, Software Implemented Hardware Fault Tolerance (SIHFT), N-Version
Programming- Consistent Comparison Problem, Version Independence, Recovery Block Approach- Basic
Principles, Success Probability Calculation, Distributed Recovery Blocks, Preconditions, Postconditions, and
Unit 5-Programming Languages and Tools: Desired Language Characteristics, Data typing, control
structures, Hierarchical decomposition, Packages, Exception handling, Over loading and Generics, Multi-
tasking, Task scheduling, Timing specification., Flex, Euclid, Environments, Run time support.
Text Book:
Reference Book:
1. Probability and Statistics with Reliability, Queuing and Computer Science Applications, Kishor S.
Trivedi, John Wiley & Sons Inc., 2016.
Course Objectives:
Course Outcomes:
Upon successful completion of the course, the student will be able to:
1. Identify the significance of quality in an organization.
2.Describe how to manage quality improvement teams.
3. Describe how to organize management and quality policies in TQM.
4. Apply the tools of quality improvement programs in an organization.
5. Assess the benefits of implementing TQM Program in an organization.
COURSE OBJECTIVES:
COURSE OUTCOMES
Upon successful completion of the course, the student will be able to:
1. Understand strategies used in digital marketing.
2. Apply interactive marketing communications to gratify online buyer.
3. Apply digital promotion techniques for marketing of product and services.
4. Evaluate the role of web analytics in social media marketing.
5. Apply and design various e commerce models for e-business.
4. Understanding Digital Marketing: Marketing Strategies for Engaging the Digital Generation
by Damian Rya Publisher.
5. Marketing 4.0: Moving from Traditional to Digital by Philip Kotler, Publisher Wiley.
COURSE OBJECTIVES:
The course should enable the students:
1. To impart knowledge about various aspects of industrial safety and occupational health.
2. To impart knowledge about Occupational Health and Toxicology.
3. To enable the students to identity hazard and assess risk.
4. To understand Acts and Rules of industrial safety and hazard management.
5. To teach about various safety acts and rules along with safety education and training.
COURSE OUTCOMES
Upon successful completion of the course, the student will be able to:
1. Identify the key aspects of industrial safety and mitigating them.
2. Describe various types of solution to problems arising in safety operations and hygiene.
3.Apply principles of OSHA in controlling industrial disasters and losses.
4. Identify various Acts and Rules of industrial safety and hazard management.
5. Assess the overall performance of safety protocols of chemical industries and hazard
management.
2. Safety Management in industry by NV. Krishnan, Jaico Publishing House, Bombay, 1997.
3. Loss Prevention in Process Industries by FP Lees, Butterworth London, 1990.
4. Safety at Work by J.R. Ridey Butterwort London 1983.
L:T:P:: 0:0:2
Credits-01
1. Equip the students with a general overview of the concepts and fundamentals of computer networks.
2. Familiarize the students with the standard models for the layered approach to communication between
machines in a network and the protocols of the various layers.
LIST OF PRACTICALS
1. Understand the various characteristics of Intelligent agents and implement the different search
strategies in AI.
2. Learn to represent knowledge in solving AI problems
3. Design the different ways of designing software agents.
4. Identify the various applications of AI.
COURSE OUTCOMES: On successful completion of the course, the students will be able to
1. Implement the Artificial Intelligence techniques for building well engineered and efficient intelligent
systems.
2. Describe the nature of AI problem and provide the solution as a particular type.
3. Learn optimization and inference algorithms for model learning.
4. Solve game challenging problems
5. Design and develop programs for an agent to learn and act in a structured environment.
LIST OF PRACTICALS
1. Write a python program to implement simple Chatbot ?
2. Implementation of following algorithms:
a. A* and Uniform cost search algorithms.
b. Implement AO* Search algorithm.
c. Write a python program to implement Breadth First Search Traversal.
d. Implementation of TSP using heuristic approach.
3. Implementation of Hill-climbing to solve 8- Puzzle Problem.
4. Write a python program to implement Water Jug Problem?
5. Write a program to implement Hangman game using python.
6. Write a program to implement Tic-Tac-Toe game using python.
7. Write a Program for Expert System by Using Forward Chaining.
8. Write a python program to remove stop words for a given passage from a text file using NLTK?
9. Write a python program to implement stemming for a given sentence using NLTK?
10. Write a python program to implement Lemmatization using NLTK.
11. Write a program to demonstrate the working of the decision tree based ID3 algorithm. Use an
appropriate data set for building the decision tree and apply this knowledge to classify a new sample.
12. Write a program to implement the naïve Bayesian classifier for a sample training data set stored as a
.CSV file. Compute the accuracy of the classifier, considering few test data sets.
COURSE OUTCOMES: On successful completion of the course, the students will be able to
1. Understand the system calls and I/O system calls in UNIX
2. Evaluate the process scheduling algorithms FCFS, SJF, Priority and Round robin
3. Simulate the process of communication through various techniques
4. Simulate memory management schemes
5. Simulate File Allocation Techniques
LIST OF EXPERIMENTS
1. Write programs using the following system calls of UNIX operating system: fork, exec, getpid, exit,
wait, stat, opendir, readdir
2. Write programs using the I/O system calls of UNIX operating system (open, read, write, etc)
3. Write C programs to simulate UNIX commands like ls, grep, etc.
4. Given the list of processes, their CPU burst times and arrival times, display/print the Gantt chart for
FCFS and SJF. For each of the scheduling policies, compute and print the average waiting time and
average turnaround time (2 sessions)
5. Given the list of processes, their CPU burst times and arrival times, display/print the Gantt chart for
Priority and Round robin. For each scheduling policy, compute and print the average waiting and
turnaround times (2 Sessions).
6. Developing Applications using Inter Process communication (using shared memory and pipes)
7. Simulate the Producer-Consumer problem using semaphores (using UNIX system calls).
8. Simulate First fit, best fit and Worst fit memory management algorithms.
9. Simulate Page Replacement Algorithms (FIFO, LRU and Optimal)
10. Simulate the Paging memory management scheme
1. To obtain a basic understanding of Positive emotions, strengths and virtues; the concepts and
determinants of happiness and well-being.
2. To bring an experience marked by predominance of positive emotions and informing them
about emerging paradigm of Positive Psychology
3. Build relevant competencies for experiencing and sharing happiness as lived experience and
its implication.
4. To become aware of contextual and cultural influences on health and happiness.
COURSE OUTCOMES: On successful completion of the course, the students will be able to
1. Provide an insight to see the importance of positive emotions, Strength and Virtues in
everyday life and society.
2. Use the strength and virtues in improving human behavior and mental health.
3. Understand the biological, social, psychological and spiritual determinants of Happiness and
well-being.
4. Light on research findings related to effects of happiness and well-being on mental illness and
stress.
5. Give an insight of the Indian philosophy of happiness and life satisfaction in context of
Karma, Moksha and destiny and role of socio-demographic and cultural factors in Happiness
and well-being.
6. Establish work life balance in an individual’s life.
Indian philosophy of happiness and life satisfaction. – Karma, Moksha and destiny. theory of
happiness and wellbeing in Taittiriya Upanishad, Role of socio-demographic and cultural factors in
Happiness and well-being. Health and Happiness in contemporary India – rural and urban differences
and similarities.
SUGGESTED READINGS:
SYLLABUS
For
B.TECH
(Computer Science and Engineering)
4TH Year
SEMESTER-VII
Evaluation
Scheme Subject
Subject Periods
S. NO. Sessional Total Credit
Codes Category Subject ESE
Exam
L T P CT TA Total TE PE
AHT-015 Rural Development Administration
1 /AHT- HSC and Planning/ Project Management 3 1 0 30 20 50 100 150 3
016 and Entrepreneurship
CST-
2 DE DepartmentalElective-4 3 0 0 30 20 50 100 150 3
0XX
CST-
3 DE DepartmentalElective-5 3 0 0 30 20 50 100 150 3
0XX
CSO-
4 OE Open Elective-2 3 0 0 30 20 50 100 150 3
0XX
5 CSP-017 DLC Machine Learning Lab 0 0 2 25 25 25 50 1
6 CSP-018 DLC Project Seminar 0 0 2 50 50 1
7 CSP-019 DLC Design Project 0 0 4 100 100 2
8 CSP-020 DLC Mini Project-III or Internship-III* 0 0 2 50 50 1
9 AHT-017 MC Disaster Management 2 0 0 50 50 50 100 2
10 AHT-018 NC Innovations and Problem Solving 2 1 0 15 10 25 50
11 GP-007 NC General Proficiency 50
Total 12 1 12 900 19
12 Minor Course (Optional)** 3 1 0 30 20 50 100 4
*The Internship-III (4-6weeks) will be conducted during summer break after the VI semester and will be assessed
during VII semester.
MOOCs course
Open Elective -2 (This course can be taken only by the students of branches other than CSE and
specialized branches of CSE in VIIth semester. Students of CSE and specialized branches of CSE
shall opt open electives floated by other departments)
OpenElective-2
S. No. Subject Code Subject Name
1 CSO-051 Computer Network
Abbreviations: L-No. of Lecture hours per week, T-No. of Tutorial hours per week, P-No. of Practical hours per
week, CT-Class Test Marks, TA-Marks of teacher’s assessment including student’s class performance and
attendance, PS-Practical Sessional Marks, ESE-End Semester Examination, TE- Theory Examination Marks, PE-
Practical External Examination Marks
Minor Courses (Optional) **: Select any subject from Annexure – II from other departments
1 Hr Lecture 1 Hr Tutorial 2 or 3 Hr Practical
1 Credit 1 Credit 1 Credit
SEMESTER-VIII
Evaluation Scheme
Subject
Subject Periods Sessional
S. NO. ESE Total Credit
Codes Category Subject Exam
L T P CT TA Total TE PE
AHT-015 / Rural Development
AHT-016 Administration and Planning/
1 HSC 3 0 0 30 20 50 100 150 3
Project Management and
Entrepreneurship
2 CST-0XX DE DepartmentalElective-6 3 0 0 30 20 50 100 150 3
Total 12 0 12 900 18
7 Minor Course (Optional)** 3 1 0 30 20 50 100 4
MOOCs course
DepartmentalElective-6
S. No. Subject Code Subject Name
1 CST-039 Soft Computing
2 CST-040 Software Project Management
3 CST-041 Cyber and Digital Forensics
4 CST-042 Digital Image Processing
5 CST-043 Big Data Analytics
and Open Elective-4 (This course can be taken only by the students of branches other
Open Elective-3
than CSE and specialized branches of CSE in VIII th semester. Students of CSE and specialized
branches of CSE shall opt open electives floated by other departments)
Abbreviations: L-No. of Lecture hours per week, T-No. of Tutorial hours per week, P-No. of Practical hours per
week, CT-Class Test Marks, TA-Marks of teacher’s assessment including student’s class performance and
attendance, PS-Practical Sessional Marks, ESE-End Semester Examination, TE- Theory Examination Marks, PE-
Practical External Examination Marks
Minor Courses (Optional) **: Select any subject from Annexure – II from other departments
Course Objectives
This course enables the students to:
1. Gain knowledge on the concepts related to administration, its importance and various
approaches of Development Administration.
2. Gain skills on New Public Management, Public Grievances and Redressal
Mechanisms, Accountability and Transparency in Administration and e-governance in
the rural development sector.
3. Develop their competency on the role of Bureaucracy in Rural Development.
Course Outcomes
After completion of the course student will be able to:
1. Students can understand the definitions, concepts and components of Rural
Development.
2. Students will know the importance, structure, significance, resources of Indian rural
economy.
3. Students will have a clear idea about the area development programmes and its
impact.
4. Students will be able to acquire knowledge about rural entrepreneurship.
5. Students will be able to understand about the using of different methods for human
resource planning.
Course Contents
UNIT-I: (8 hours)
Rural Planning & Development: Concepts of Rural Development, Basic elements of rural
Development, and Importance of Rural Development for creation of Sustainable Livelihoods,
An overview of Policies and Programmes for Rural Development- Programmes in the
agricultural sector, Programmes in the Social Security, Programmes in area of Social Sector.
UNIT-II: (8 hours)
Rural Development Programmes: Sriniketan experiment, Gurgaon experiment,
Marthandam experiment, Baroda experiment, Firkha development scheme, Etawapilot
project, Nilokheri experiment, approaches to rural community development: Tagore, Gandhi
etc.
UNIT-III: (8 hours)
Panchayati Raj & Rural Administration: Administrative Structure: bureaucracy, structure
of administration; Panchayati Raj Institutions Emergence and Growth of Panchayati Raj
Institutions in India; People and Panchayati Raj; Financial Organizations in Panchayati Raj
Institutions, Structure of rural finance, Government & Non-Government Organizations /
Community Based Organizations, Concept of Self help group.
UNIT-IV: (8 hours)
Human Resource Development in Rural Sector: Need for Human Resource Development,
Elements of Human Resource Development in Rural Sector Dimensions of HRD for rural
development-Health, Education, Energy, Skill Development, Training, Nutritional Status
access to basic amenities – Population composition.
UNIT-V: (8 hours)
Rural Industrialization and Entrepreneurship: Concept of Rural Industrialization,
Gandhian approach to Rural Industrialization, Appropriate Technology for Rural Industries,
Entrepreneurship and Rural Industrialization- Problems and diagnosis of Rural
Entrepreneurship in India, with special reference to Women Entrepreneurship; Development
of Small Entrepreneurs in India, need for and scope of entrepreneurship in Rural area.
Text Books/References:
COURSE OBJECTIVES:
COURSE OUTCOMES:
UNIT-I: (8 hours)
Entrepreneurship: Entrepreneurship: need, scope , Entrepreneurial competencies & traits,
Factors affecting entrepreneurial development, Entrepreneurial motivation (Mc Clellend’s
Achievement motivation theory), conceptual model of entrepreneurship , entrepreneur vs.
intrapreneur; Classification of entrepreneurs; Entrepreneurial Development Programmes.
UNIT-II (8 hours)
Entrepreneurial Idea and Innovation: Introduction to Innovation, Entrepreneurial Idea
Generation and Identifying Business Opportunities, Management skills for Entrepreneurs and
managing for Value Creation, Creating and Sustaining Enterprising Model & Organizational
Effectiveness.
UNIT-III: (8 hours)
Project Management: Project management: meaning, scope & importance, role of project
manager; project life-cycle Project appraisal: Preparation of a real time project feasibility
report containing Technical appraisal, Environmental appraisal, Market appraisal (including
market survey for forecasting future demand and sales) and Managerial appraisal.
UNIT-IV (8 hours)
Project Financing: Project cost estimation & working capital requirements, sources of
funds, capital budgeting, Risk & uncertainty in project evaluation , preparation of projected
financial statements viz. Projected balance sheet, projected income statement, projected funds
& cash flow statements, Preparation of detailed project report, Project finance.
UNIT-V: (8 hours)
Social Entrepreneurship: Social Sector Perspectives and Social Entrepreneurship, Social
Entrepreneurship Opportunities and Successful Models, Social Innovations and
Sustainability, Marketing Management for Social Ventures, Risk Management in Social
Enterprises, Legal Framework for Social Ventures.
Case study and presentations: Case study of successful and failed entrepreneurs. Power
point presentation on current business opportunities..
Text Book:
1. Innovation and Entrepreneurship by Drucker, P.F.; Harperand Row.
2. Business, Entrepreneurship and Management: Rao, V.S.P.;Vikas
3. Entrepreneurship: Roy Rajeev.
4. TextBookofProjectManagement:Gopalkrishnan,P.andRamamoorthy,V.E.;McMill.
5. Project Management for Engineering, Business and Technology: Nicholas, J.M., and
Steyn, H.;PHI.
6. Project Management: The Managerial Process: Gray, C.F., Larson, E.W. and Desai,
G.V.;MGH.
COURSE OUTCOMES: On successful completion of this course, the students will be able to
1. Impart the trends in emerging field of wireless ad hoc and sensor networking.
2. Focus on layered communication modeling, such as the media access control and network layer.
3. Understand the basic concept of QoS and Multicast routing protocol.
4. Address quality of service issues and network reliability for transmission of real-time information.
5. Learn the various routing protocols of ad hoc and sensor networks
Characteristics of the Wireless Channel, IEEE 802.11a/b Standard, Origin of Ad-hoc Packet Radio Networks,
Unit 2- ADHOC NETWORK ROUTING PROTOCOLS: Introduction -to designing a Routing Protocol,
Classifications of Routing Protocols, Destination Sequenced Distance Vector (DSDV), Dynamic Source
Routing (DSR), Zone Routing Protocol (ZRP), Wireless Routing Protocol (WRP), Source—Initiated On—
Unit 3- QoS AND Multicast Routing Protocol in MANET: Issues and challenges in providing QoS in Adhoc
Wiress Networks, Introduction to QoS in Ad hoc Wireless Networks, Classifications of QoS Solutions,
technologies for wireless sensor networks, Advantages of sensor networks, Sensor network applications.
Unit 5- WSN PROTOCOLS: Communication protocols, MAC protocaols, Namlng and Addressing-Routing
TEXT BOOKS:
1. C. Siva Ram Murthy and B. S. Manoj, ―Ad Hoc Wireless Networks Architectures and Protocols,
Prentice Hall, PTR, 2004.
2. Holger Karl , Andreas willig, ―Protocol and Architecture for Wireless Sensor Networks, John wiley
publication, Jan 2006.
REFERENCE BOOKS:
1. Feng Zhao, Leonidas Guibas, ―Wireless Sensor Networks: an information processing approach,
Elsevier publication, 2004.
2. Charles E. Perkins, ―Ad Hoc Networking, Addison Wesley, 2000.
3. I.F. Akyildiz, W. Su, Sankarasubramaniam, E. Cayirci, ―Wireless sensor networks: a survey,
computer networks, Elsevier, 2002, 394 - 422.
1. Understand the need for machine learning for various problem solving.
2. Study the various supervised, semi-supervised and unsupervised learning algorithms in machine
learning.
3. Learn and design the appropriate machine learning algorithms for problem solving.
COURSE OUTCOME: On successful completion of this course, the students will be able to
1. Learn the basics of learning problems with hypothesis and version spaces.
2. Understand the machine learning algorithms as supervised learning and unsupervised learning and
Apply and analyze the various algorithms of supervised and unsupervised learning.
3. Analyze the concept of neural networks for learning linear and non-linear activation functions.
4. Learn the concepts in tree, probability and graphical based models and methods.
5. Understand the fundamental concepts of Genetic Algorithm and Analyze and design the genetic
algorithms for optimization engineering problems.
Unit 1- INTRODUCTION: Learning – Types of Machine Learning – Supervised Learning – The Brain and
the Neuron – Design a Learning System – Perspectives and Issues in Machine Learning – Concept Learning
Task – Concept Learning as Search – Finding a Maximally Specific Hypothesis – Version Spaces and the
Candidate Elimination Algorithm – Linear Discriminants – Perceptron – Linear Separability – Linear
Regression.
Unit 2- LINEAR MODELS: Multi-layer Perceptron – Going Forwards – Going Backwards: Back Propagation
Error – Multilayer Perceptron in Practice – Examples of using the MLP – Overview – Deriving Back
Propagation – Radial Basis Functions and Splines – Concepts – RBF Network – Curse of Dimensionality –
Interpolations and Basis Functions – Support Vector Machines.
Unit 3- TREE AND PROBABILISTIC MODELS: Learning with Trees – Decision Trees – Constructing
Decision Trees – Classification and Regression Trees – Ensemble Learning – Boosting – Bagging – Different
ways to Combine Classifiers – Probability and Learning – Data into Probabilities – Basic Statistics – Gaussian
Mixture Models – Nearest Neighbor Methods – Unsupervised Learning – K means Algorithms – Vector
Quantization – Self Organizing Feature Map
Learning – Genetic algorithms – Genetic Offspring: - Genetic Operators – Using Genetic Algorithms –
Reinforcement Learning – Overview – Getting Lost Example – Markov Decision Process
Unit 5- GRAPHICAL MODELS: Markov Chain Monte Carlo Methods – Sampling – Proposal Distribution –
Markov Chain Monte Carlo – Graphical Models – Bayesian Networks – Markov Random Fields – Hidden
Markov Models – Tracking Methods
TEXT BOOK:
1. Tom M. Mitchell, ―Machine Learning, McGraw-Hill Education (India) Private Limited, 2013.
2. Jason Bell, ―Machine learning – Hands on for Developers and Technical Professionals‖, First Edition,
Wiley, 2014
3. Peter Flach, ―Machine Learning: The Art and Science of Algorithms that Make Sense of Data, First
Edition, Cambridge University Press, 2012.
REFERENCE BOOKS:
1. EthemAlpaydin, ―Introduction to Machine Learning 3e (Adaptive Computation and Machine
Learning Series) Third Edition, MIT Press, 2014
2. Ethem Alpaydin, ―Introduction to Machine Learning (Adaptive Computation and Machine Learning),
The MIT Press 2004.
3. Stephen Marsland, ―Machine Learning: An Algorithmic Perspective, CRC Press, 2009.
4. Stephen Marsland, ―Machine Learning – An Algorithmic Perspective‖, Second Edition, Chapman and
Hall/CRC Machine Learning and Pattern Recognition Series, 2014.
COURSE OUTCOME: On successful completion of this course, the students will be able to
Unit 1- Introduction: Issues, Challenges, and benefits of Mobile Computing, IEEE 802.11 & Bluetooth,
Unit 2- Data Management Issues: Wireless computing, nomadic computing, ubiquitous computing and
tunneling, data replication for mobile computers, adaptive Clustering for Mobile Wireless networks, LEACH
and TORA, mobile TCP (M-TCP) Spooning TCP, Frequency for radio transmission.
Unit 3- Distributed location Management: pointer forwarding strategies, Process communication techniques,
Socket Programming, RPC, RMI, Mobile IP, TCP Over wireless. Hidden and exposed terminal problems.
Unit 4- Routing Protocols: Routing Protocol, Dynamic State Routing (DSR), Ad hoc On-Demand Distance
Vector (AODV), and Destination Sequenced Distance – Vector Routing (DSDV), Cluster Based Routing
Protocol (CBRP).
Unit 5- Fault tolerance and security: Security and fault tolerance, transaction processing in Mobile computing
environment. Mobile Agent Systems: Aglets, PMADE, Case Studies, agent failure scenarios, node failure
TEXT BOOKS:
1. Jochen Schiller, ―Mobile Communications, PHI, Second Edition, 2003.
2. Prasant Kumar Pattnaik, Rajib Mall, ―Fundamentals of Mobile Computing, PHI Learning Pvt. Ltd,
New Delhi – 2012
REFERENCE BOOKS:
1. Dharma Prakash Agarval, Qing and An Zeng, "Introduction to Wireless and Mobile systems, Thomson
Asia Pvt Ltd, 2005.
2. Uwe Hansmann, Lothar Merk, Martin S. Nicklons and Thomas Stober, ―Principles of Mobile
Computing, Springer, 2003.
3. William.C.Y.Lee,―Mobile Cellular Telecommunications-Analog and Digital Systems, Second
Edition,TataMcGraw Hill Edition ,2006.
4. C.K.Toh, ―AdHoc Mobile Wireless Networks, First Edition, Pearson Education, 2002.
COURSE OUTCOMES: On successful completion of this course, the students will be able to
1. Interpret the contribution of data warehousing and data mining to the decision-support level of
organizations
2. Evaluate different models used for OLAP and data preprocessing
3. Categorize and carefully differentiate between situations for applying different data-mining techniques:
frequent pattern mining, association, correlation, classification, prediction, and cluster and outlier
analysis
4. Design, implement and evaluate the performance of different data-mining algorithms
5. Propose data-mining solutions for different applications
Unit 1- DATA WAREHOUSE: Data Warehousing - Operational Database Systems vs Data Warehouses -
Multidimensional Data Model - Schemas for Multidimensional Databases – OLAP operations – Data
Warehouse Architecture – Indexing – OLAP queries & Tools.
Unit 2- DATA MINING & DATA PREPROCESSING: Introduction to KDD process – Knowledge
Discovery from Databases - Need for Data Pre-processing – Data Cleaning – Data Integration and
Transformation – Data Reduction – Data Discretization and Concept Hierarchy Generation.
Unit 3- ASSOCIATION RULE MINING: Introduction - Data Mining Functionalities - Association Rule
Mining - Mining Frequent Item sets with and without Candidate Generation - Mining Various Kinds of
Association Rules - Constraint – Based Association Mining.
Unit 5- CLUSTERING: Cluster Analysis - Types of Data in Cluster Analysis – A Categorization of Major
Clustering Methods – Partitioning Methods – Hierarchical methods – Density-Based Methods – Grid-Based
Methods – Model-Based Clustering Methods – Clustering High- Dimensional Data – Constraint-Based Cluster
Analysis – Outlier Analysis.
Data Visualization: Principles, Parallel Coordinates, Visualization Neural Networks, Visualization of trees.
TEXTBOOKS:
1. Data Mining – Concepts and Techniques – Jiawei Han & Micheline Kamber, 3rd Edition Elsevier.
2. Data Mining, pang-ning tan and Michael steinbach, second edition, Pearson Education.
3. Data Mining Introductory and Advanced topics – Margaret H Dunham, PEA.
4. Ian H. Witten and Eibe Frank, Data Mining: Practical Machine Learning Tools and Techniques
(Second Edition), Morgan Kaufmann, 2005.
REFERENCE BOOKS:
1. K.P. Soman, ShyamDiwakar and V. Ajay, “Insight into Data mining Theory and Practice”, Easter
Economy Edition, Prentice Hall of India, 2006.
2. G. K. Gupta, “Introduction to Data Mining with Case Studies”, Easter Economy Edition
BLOCKCHAIN (CST-033)
L:T:P:: 3:0:0 Credits-03
COURSE OUTCOMES: On successful completion of this course, the students will be able to
Unit 1-Introduction: Overview of Blockchain, Public Ledgers, Bitcoin, Smart Contracts, Block in a
Blockchain, Transactions, Distributed Consensus, Public vs Private Blockchain, Understanding Crypto currency
toBlockchain, Permissioned Model of Blockchain, Overview of Security aspects of Blockchain. Basic Crypto
Primitives: Cryptographic Hash Function, Properties of a hash function, Hash pointer and Merkle tree, Digital
Signature, Public Key Cryptography, A basic cryptocurrency.
Unit 2-Understanding Blockchain with Crypto currency: Bitcoin and Blockchain: Creation of coins,
Payments and double spending, Bitcoin Scripts, Bitcoin P2P Network, Transaction in Bitcoin Network, Block
Mining, Block propagation and block relay. Working with Consensus in Bitcoin: Distributed consensus in
open environments, Consensus in a Bitcoin network, Proof of Work (PoW) – basic introduction, HashcashPoW,
BitcoinPoW, Attacks on PoW and the monopoly problem, Proof of Stake, Proof of Burn and Proof of Elapsed
Time, The life of a Bitcoin Miner, Mining Difficulty, Mining Pool.
Unit 3-Understanding Blockchain for Enterprises: Permissioned Block chain: Permissioned model and use
cases, Design issues for Permissioned Blockchains, Execute contracts, State machine replication, Overview of
Consensus models for permissioned Blockchain- Distributed consensus in closed environment, Paxos, RAFT
Consensus, Byzantine general problem, Byzantine fault tolerant system, Lamport-Shostak-Pease BFT
Algorithm, BFT over Asynchronous systems.
Unit 4-Enterprise application of Blockchain: Cross border payments, Know Your Customer (KYC), Food
Security, Mortgage over Block chain, Block chain enabled Trade, We Trade – Trade Finance Network,
Unit 5-Blockchain application development: Hyperledger Fabric- Architecture, Identities and Policies,
Membership and Access Control, Channels, Transaction Validation, Writing smart contract using Hyperledger
Fabric, Writing smart contract using Ethereum, Overview of Ripple and Corda
TEXT BOOKS:
1. Melanie Swan, “Block Chain: Blueprint for a New Economy”, O‟Reilly, first edition – 2015.
2. Daniel Drescher, “Block Chain Basics”, Apress; 1stedition, 2017.
3. Anshul Kaushik, “Block Chain and Crypto Currencies”, Khanna Publishing House, Delhi.
4. Imran Bashir, “Mastering Block Chain: Distributed Ledger Technology, Decentralization and Smart
Contracts Explained”, Packt Publishing, first edition – 2012.
REFERENCE BOOKS:
1. Ritesh Modi, “Solidity Programming Essentials: A Beginner‟s Guide to Build Sma Ethereum and
Block Chain”, Packt Publishing.
2. Antony Lewis, “The Basics of Bitcoins and Blockchains: An Introduction to Cryptocurrencies and the
Technology that Powers Them (Cryptography, Crypto Trading, Digital Assets)”, Mango Publications.
3. Melanie Swan, “Blockchain: Blueprint for a New Economy”, O’Reilly, 2015.
1. Learn concepts, techniques and tools they need to deal with various facets of data science practice,
including data collection and integration.
2. Understand the basic types of data and basic statistics.
3. Identify the importance of data reduction and data visualization techniques
COURSE OUTCOMES: On successful completion of this course, the students will be able to
1. Demonstrate the mathematical foundations needed for data science.
2. Collect, explore, clean and manipulate data.
3. Demonstrate the basic concepts of machine learning.
4. Implement models such as k-nearest Neighbors, Naive Bayes, linear and logistic regression,
decision trees, neural networks and clustering.
5. Build data science applications using Python based toolkits.
Unit 1-Introduction to Data Science: Concept of Data Science, Traits of Big data, Web Scraping, Analysis vs
Reporting
Unit 2-Introduction to Programming Tools for Data Science: Toolkits using Python: Matplotlib, NumPy,
Scikit-learn, NLTK Visualizing Data: Bar Charts, Line Charts, Scatterplots Working with data: Reading Files,
Scraping the Web, Using APIs (Example: Using the Twitter APIs), Cleaning , Manipulating Data, Rescaling,
Dimensionality Reduction
Unit 3-Mathematical Foundations: Linear Algebra: Vectors, Matrices, Statistics: Describing a Single Set
of Data, Correlation, Simpson’s Paradox, Correlation and Causation Probability: Dependence and
Independence, Conditional Probability, Bayes’s Theorem, Random Variables, Continuous Distributions, The
Normal Distribution
Unit 4-Machine Learning: Overview of Machine learning concepts – Over fitting and train/test splits,
Types of Machine learning – Supervised, Unsupervised, Reinforced learning, Introduction to Bayes Theorem,
Linear Regression- model assumptions, regularization (lasso, ridge, elastic net), Classification and
Regression algorithms- Naïve Bayes, K-Nearest Neighbors, logistic regression, support vector machines
(SVM), decision trees, and random forest, Classification Errors, Analysis of Time Series- Linear
Systems Analysis, Nonlinear Dynamics, Rule Induction, Neural Networks- Learning and Generalization,
Overview of Deep Learning.
Unit 5-Case Studies of Data Science Application: Weather forecasting, Stock market prediction, Object
TEXT BOOKS:
1. Doing Data Science, Straight Talk from The Frontline. Cathy O’Neil and Rachel Schutt, O’Reilly,
2014.
2. Jiawei Han, Micheline Kamber and Jian Pei. Data Mining: Concepts and Techniques, 3rd ed. The
Morgan Kaufmann Series in Data Management Systems.
3. K G Srinivas, G M Siddesh, “Statistical programming in R”, Oxford Publications.
REFERENCE BOOKS:
1. Introduction to Data Mining, Pang-Ning Tan, Vipin Kumar, Michael Steinbanch, Pearson Education.
2. Brain S. Everitt, “A Handbook of Statistical Analysis Using R”, Second Edition, 4 LLC, 2014.
3. Dalgaard, Peter, “Introductory statistics with R”, Springer Science & Business Media, 2008.
4. Paul Teetor, “R Cookbook”, O’Reilly, 2011.
1. Explain the importance and application of each of confidentiality, integrity, authentication and
availability.
2. Understand various cryptographic algorithms and basic categories of threats to computers and
networks.
3. Describe the enhancements made to IPv4 by IPSec.
4. Understand Intrusions, intrusion detection, Web security and Firewalls.
COURSE OUTCOMES: On Successful completion of this course, the students will be able to
1. Identify the various attacks and its issues.
2. Learn usage of cryptographic algorithms for avoiding basic level threats.
3. Comprehend the issues involved in Integrity, Authentication and Key Management techniques.
4. Realize the importance of user authentication and Kerberos concepts.
5. Acquire the knowledge of network and system security domain.
Unit 2- Number Theory and Public Key Encryption: Fermat's and Euler's Theorem, Primality Testing,
Chinese Remainder Theorem , Public-Key Cryptography: Principles of Public-Key Cryptosystems, RSA
Algorithm.
Unit 3- Key Management: Key Management scenario in secret key and public key cryptography, Diffie
Hellman Key Exchange algorithm, OAKLEY and ISAKMP key management protocol, Elliptic Curve
Cryptography
Unit 4-Hash Functions: Message Authentication and Hash Functions: Authentication Requirements,
Authentication Functions, Message Authentication Codes, Hash Function Birthday Attacks, Security of Hash
Function and MACS, MD5 Message Digest Algorithm, Secure Hash Algorithm (SHA), Digital Signatures,
Digital Signature Standard (DSS).
Unit 5- Network and System Security: Authentication Applications: Kerberos, X.509, Electronic Mail
Security, Pretty Good Privacy (PGP),S/Mine Security: Architecture, Authentication Header, Encapsulating
Security Payloads, Combining Security Associations, Key Management, Web Security: Secure Socket Layer
and Transport Layer Security, Secure Electronic Transaction (SET), System Security: Intruders, Viruses,
Firewall Design Principles, Trusted Systems.
TEXT BOOKS:
1. Cryptography and Network Security - Principles and Practice: William Stallings, Pearson Education,
6th Edition.
2. Cryptography and Network Security: Atul Kahate, Mc Graw Hill, 3rd Edition.
REFERENCE BOOKS:
1. Cryptography and Network Security: C K Shyamala, N Harini, Dr T R Padmanabhan, Wiley India, 1st
Edition.
2. Cryptography and Network Security: Forouzan Mukhopadhyay, Mc Graw Hill, 3rd Edition.
3. Information Security, Principles, and Practice: Mark Stamp, Wiley India.
4. Principles of Computer Security: WM. Arthur Conklin, Greg White, TMH.
5. Introduction to Network Security: Neal Krawetz, CENGAGE Learning.
6. Network Security and Cryptography: Bernard Menezes, CENGAGE Learning.
DEVOPS (CST-036)
COURSE OUTCOMES: On successful completion of this course, the students will be able to
1. Identify components of Devops environment.
2. Describe Software development models and architectures of DevOps.
3. Apply different project management, integration, testing and code deployment tool.
4. Investigate different DevOps Software development models.
5. Assess, collaborate, and adopt Devops in real-time projects
Unit 1-Introduction: Introduction, Agile development model, DevOps, and ITIL. DevOps process and
Continuous Delivery, Release management, Scrum, Kanban, delivery pipeline, bottlenecks, examples.
Unit 2-Software development models and DevOps: DevOps Lifecycle for Business Agility, DevOps, and
Continuous Testing.
DevOps influence on Architecture: Introducing software architecture, The monolithic scenario, Architecture
rules of thumb, The separation of concerns, Handling database migrations, Microservices, and the data tier,
DevOps, architecture, and resilience.
Unit 3-Introduction to project management: The need for source code control, The history of source code
management, Roles and code, source code management system and migrations, Shared authentication, Hosted
Git servers, Different Git server implementations, Docker intermission, Gerrit, The pull request model, GitLab.
Unit 4-Integrating the system: Build systems, Jenkins build server, Managing build dependencies, Jenkins
plugins, and file system layout, The host server, Build slaves, Software on the host, Triggers, Job chaining and
build pipelines, Build servers and infrastructure as code, Building by dependency order, Build phases,
Alternative build servers, Collating quality measures.
Unit 5-Testing Tools and automation: Various types of testing, Automation of testing Pros and cons,
Selenium - Introduction, Selenium features, JavaScript testing, Testing backend integration points, Test-driven
development, REPL-driven development
Deployment of the system: Deployment systems, Virtualization stacks, code execution at the client, Puppet
master and agents, Ansible, Deployment tools: Chef, Salt Stack and Docker
TEXTBOOKS:
1. Joakim Verona. Practical Devops, Second Edition. Ingram short title; 2nd edition (2018). ISBN10:
1788392574.
2. Deepak Gaikwad, Viral Thakkar. DevOps Tools from Practitioner's Viewpoint. Wiley publications.
ISBN: 9788126579952
REFERENCE BOOK:
1. Len Bass, Ingo Weber, Liming Zhu. DevOps: A Software Architect's Perspective. Addison Wesley;
ISBN-10.
COURSE OUTCOMES: Upon completion of this course, the students will be able to
1. Impart the knowledge of cloud computing and technologies, issues in cloud computing etc.
2. Design and develop cloud and implement various services on cloud.
3. To develop an understating of virtualization technology and its different dimensions.
4. Investigate the issues and challenges in implementing cloud security.
5. Compare and contrast various open and proprietary cloud platforms
Unit 1- Introduction to Cloud Computing: Definition, Characteristics, Components, Cloud provider, SAAS,
PAAS, IAAS and Others, Organizational scenarios of clouds, Administering & Monitoring cloud services,
benefits and limitations, Deploy application over cloud.
Cloud computing platforms: Infrastructure as service: Amazon EC2, Platform as Service: Google App Engine,
Microsoft Azure, Utility Computing, Elastic Computing
Unit 2- Introduction to Cloud Technologies: Study of Hypervisors, Web services: SOAP and REST, SOAP
versus REST, AJAX: asynchronous 'rich' interfaces, Mashups: user interface services.
Virtualization Technology: Virtual machine technology, Virtual Machine migration, virtualization applications
in enterprises, Pitfalls of virtualization.
Multitenant software: Multi-entity support, Multi-schema approach, Multi-tenancy using cloud data stores,
Data access control for enterprise applications,
Unit 3- Data and Security in the cloud: Relational databases, Cloud file systems: GFS and HDFS, Big Table,
HBase and Dynamo. Map-Reduce and extensions: Parallel computing, Map-Reduce model, Enterprise batch
processing using Map-Reduce.
Cloud computing security challenges: Virtualization security management- virtual threats, VM Security
Recommendations, VM-Specific Security techniques, Secure Execution Environments and Communications in
cloud
Unit 4- Service Management and Monitoring in Cloud: Traditional Approaches to SLO Management, Types
of SLA, Life Cycle of SLA, SLA Management in Cloud.
Monitoring in cloud: Implementing real time application over cloud platform, Cloud Federation, QOS Issues in
Cloud, Dependability, data migration, streaming in Cloud. Cloud Middleware, load balancing, resource
optimization, resource dynamic reconfiguration,
Unit 5- Cloud computing platforms: Installing cloud platforms and performance evaluation Features and
functions of cloud platforms: Xen Cloud Platform, Eucalyptus, OpenNebula, Nimbus, T-Platform, Apache
Virtual Computing Lab (VCL), Enomaly Elastic Computing Platform
TEXT BOOK:
1. Kai Hwang, Geoffrey C. Fox and Jack J. Dongarra, “Distributed and cloud computing from Parallel
Processing to the Internet of Things”, Morgan Kaufmann, Elsevier, 2012.
2. Rittinghouse, John W., and James F. Ransome, “Cloud Computing: Implementation, Management and
Security”, CRC Press, 2017.
REFERENCE BOOK:
1. Rajkumar Buyya, Christian Vecchiola, S. ThamaraiSelvi, “Mastering Cloud Computing”, Tata Mcgraw
Hill, 2013.
2. Toby Velte, Anthony Velte, Robert Elsenpeter, “Cloud Computing – A Practical Approach, Tata
Mcgraw Hill, 2009.
3. Barrie Sosinsky, “Cloud Computing Bible” John Wiley & Sons, 2010.
4. Tim Mather, Subra Kumaraswamy, and Shahed Latif, “Cloud Security and Privacy An Enterprise
Perspective on Risks and Compliance”, O'Reilly, 2009.
1. Understand natural language processing and learn how to apply basic algorithms in this field.
2. Acquire the basic concepts and algorithmic description of the main language levels: morphology,
syntax, semantics, and pragmatics.
3. Design and implement applications based on natural language processing.
COURSE OUTCOMES: On successful completion of this course, the students will be able to
1. Have a broad understanding of the capabilities and limitations of current natural language
technologies.
2. Able to model linguistic phenomena with formal grammars.
3. Be able to Design, implement and test algorithms for NLP problems.
4. Understand the mathematical and linguistic foundations underlying approaches to the various areas in
NLP.
5. Able to apply NLP techniques to design real world NLP applications such as machine translation, text
categorization, text summarization, information extraction...etc.
UNIT - I
Introduction: History of NLP, Generic NLP system, levels of NLP, Knowledge in language processing,
Ambiguity in Natural language, stages in NLP, challenges of NLP ,Applications of NLP.
UNIT - II
Word Level Analysis: Morphology analysis –survey of English Morphology, Inflectional morphology &
Derivational morphology, Lemmatization, Regular expression, finite automata, finite state transducers (FST),
Morphological parsing with FST, Lexicon free FST Porter stemmer. N –Grams- N-gram language model, N-
gram for spelling correction.
UNIT - III
Syntax Analysis: Part-Of-Speech tagging (POS)- Tag set for English (Penn Treebank) , Rule based POS
tagging, Stochastic POS tagging, Issues –Multiple tags & words, Unknown words. Introduction to CFG,
Sequence labeling: Hidden Markov Model (HMM), Maximum Entropy, and Conditional Random Field (CRF).
UNIT - IV
Semantic Analysis: Lexical Semantics, Attachment for fragment of English- sentences, noun phrases, Verb
phrases, prepositional phrases, Relations among lexemes & their senses –Homonymy, Polysemy, Synonymy,
Hyponymy, WordNet, Robust Word Sense Disambiguation (WSD), Dictionary based approach.
Pragmatics: Discourse reference resolution, reference phenomenon, syntactic & semantic constraints on co
reference
UNIT – V
Applications (preferably for Indian regional languages): Machine translation, Information retrieval,
Question answers system, categorization, summarization, sentiment analysis, Named Entity Recognition.
TEXTBOOKS:
1. Daniel Jurafsky, James H. Martin ―Speech and Language Processing‖ Second Edition, Prentice Hall,
2008.
2. Christopher D.Manning and Hinrich Schutze, ― Foundations of Statistical Natural Language
Processing ―, MIT Press, 1999.
REFERENCE BOOKS:
1. Siddiqui and Tiwary U.S., Natural Language Processing and Information Retrieval, Oxford University
Press (2008).
2. Daniel M Bikel and Imed Zitouni ― Multilingual natural language processing applications Pearson,
2013.
3. Alexander Clark (Editor), Chris Fox (Editor), Shalom Lappin (Editor) ― The Handbook of
Computational Linguistics and Natural Language Processing ― ISBN: 978-1-118-.
4. Steven Bird, Ewan Klein, Natural Language Processing with Python, O ‘Reilly.
5. Brian Neil Levine, An Introduction to R Programming.
6. Niel J le Roux, Sugnet Lubbe, A step by step tutorial: An introduction into R application and
programming
Unit 1- Data communication Components: Representation of data and its flow Networks, Various Connection
Topology, Protocols and Standards, OSI model, Transmission Media, LAN: Wired LAN, Wireless LANs,
Connecting LAN and Virtual LAN, Techniques for Bandwidth utilization: Multiplexing - Frequency division,
Time division and Wave division, Concepts on spread spectrum.
Unit 2- Data Link Layer and Medium Access Sub Layer: Error Detection and Error Correction -
Fundamentals, Block coding, Hamming Distance, CRC; Flow Control and Error control protocols - Stop and
Wait, Go back – N ARQ, Selective Repeat ARQ, Sliding Window, Piggybacking, Random Access,
Multiple access protocols- Pure ALOHA, Slotted ALOHA, CSMA/CD, CDMA/CA, high level data link
control(HDLC), Point To Point protocol (PPP).
Unit 3- Network Layer: Repeater, Hub, Switches, Bridges, Gateways, Switching, Logical addressing – IPV4,
IPV6, Address mapping – ARP, RARP, BOOTP and DHCP–Delivery, Forwarding and Unicast Routing
protocols.
Unit 4- Transport Layer: Process to Process Communication, User Datagram Protocol (UDP), Transmission
Control Protocol (TCP), SCTP Congestion Control; Quality of Service, QoS improving techniques: Leaky
Bucket and Token Bucket algorithm.
Unit 5- Application Layer: Domain Name Space (DNS), DDNS, TELNET, EMAIL, File Transfer Protocol
(FTP), WWW, HTTP, SNMP, Bluetooth, Firewalls, Basic concepts of Cryptography , Digital Signature.
TEXTBOOK:
1. Behrouz A. Forouzan, Data Communications and Networking, Fifth Edition TMH, 2013.
REFERENCE BOOKS:
1. Larry L. Peterson, Bruce S. Davie, Computer Networks: A Systems Approach, Fifth Edition, Morgan
Kaufmann Publishers Inc., 2012.
2. William Stallings, Data and Computer Communications, Tenth Edition, Pearson Education, 2013.
3. Nader F. Mir, Computer and Communication Networks, Second Edition, Prentice Hall, 2014.
4. Ying-Dar Lin, Ren-Hung Hwang and Fred Baker, Computer Networks: An Open Source Approach,
McGraw Hill Publisher, 2011.
5. James F. Kurose, Keith W. Ross, Computer Networking, A Top-Down Approach Featuring the
Internet, Sixth Edition, Pearson Education, 2013
COURSE OUTCOME: On successful completion of this course, the students shall be able to
1. Make use of Data sets in implementing the machine learning algorithms.
2. Understand the implementation procedures for the machine learning algorithms.
3. Design Java/Python programs for various Learning algorithms.
4. Apply appropriate data sets to the Machine Learning algorithms.
5. Identify and apply Machine Learning algorithms to solve real world problems.
Lab Experiments:
1. Implement and demonstrate the FIND-Salgorithm for finding the most specific hypothesis based on a
given set of training data samples. Read the training data from a .CSV file.
2. For a given set of training data examples stored in a .CSV file, implement and demonstrate the Candidate-
Elimination algorithm to output a description of the set of all hypotheses consistent with the training
examples.
3. Write a program to demonstrate the working of the decision tree based ID3 algorithm. Use an appropriate
data set for building the decision tree and apply this knowledge to classify a new sample.
4. Build an Artificial Neural Network by implementing the Backpropagation algorithm and test the same
using appropriate data sets.
5. Write a program to implement the naïve Bayesian classifier for a sample training data set stored as a .CSV
file. Compute the accuracy of the classifier, considering few test data sets.
6. Assuming a set of documents that need to be classified, use the naïve Bayesian Classifier model to perform
this task. Built-in Java classes/API can be used to write the program. Calculate the accuracy, precision, and
recall for your data set.
7. Write a program to construct a Bayesian network considering medical data. Use this model to demonstrate
the diagnosis of heart patients using standard Heart Disease Data Set. You can use Java/Python ML library
classes/API.
8. Apply EM algorithm to cluster a set of data stored in a .CSV file. Use the same data set for clustering using
k-Means algorithm. Compare the results of these two algorithms and comment on the quality of clustering.
You can add Java/Python ML library classes/API in the program.
9. Write a program to implement k-Nearest Neighbour algorithm to classify the iris data set. Print both
correct and wrong predictions. Java/Python ML library classes can be used for this problem.
10. Implement the non-parametric Locally Weighted Regression algorithm in order to fit data points. Select
appropriate data set for your experiment and draw graphs.
COURSE OUTCOME: On successful completion of this course, the students shall be able to
1. Prepare and develop practically applicable business plan for an innovative project with consideration of
addressed issues.
2. Develop the sub-skills required for business plans of innovation projects presentation and group
discussions.
3. Acquire the soft skills and interpersonal skills which will help them in their workplace needed for these
functions.
4. Develop planning skills of the innovative projects and business ideas in order to improve professional
competencies.
5. Make presentation on the topic, answer the queries/questions that come forward, clarify, and
supplement if necessary, and submit a report.
Project introduction includes an introductory session where students will understand how to apply specific
tools and models in innovation project management, as well as how to manage teamwork. Also, during this
topic, the ideas of projects will be introduced with taking into account appropriate cases of specific projects
across different industries. The session ends with the choice of core stream for which students will be asked to
prepare a project.
Project environment allows students to learn market analysis, including identification of current trends in the
industry by using suitable strategic planning tools, and evaluating external/internal risk factors. In addition, the
competition analysis and the estimation of risks in innovative projects will be introduced.
Project assessment provides understanding and practical knowledge of assessment and forecasting of potential
markets by using various approaches within the innovation project management, as well as cost analysis and
assessment of the impact of innovation on the cost structure.
Project presentation assumes that students will apply learned knowledge and skills by developing business
plans of innovation projects, its discussions, and presentations. An oral defense will be held at the last class
(final colloquium), in which students present the developed business plan of the innovation project with
consideration of addressed issues.
1. Develop skills in doing literature survey, technical presentation, and report preparation.
2. Enable project identification and execution of preliminary works on final semester project.
COURSE OUTCOMES: On successful completion of this course, the students shall be able to
1. Discover potential research areas in the field of information technology.
2. Create very precise specifications of the IT solution to be designed.
3. Have introduction to the vast array of literature available about the various research challenges in the
field of IT.
4. Use all concepts of IT in creating a solution for a problem.
5. Have a glimpse of real world problems and challenges that need IT-based solutions.
COURSE OUTCOMES: At the end of Industrial Training, the students will be able to
1. Understand organizational issues and their impact on the organization and employees.
2. Identify industrial problems and suggest possible solutions.
3. Relate, apply, and adapt relevant knowledge, concepts and theories within an industrial organization,
practice and ethics.
4. Apply technical knowledge in an industry to solve real world problems.
5. Demonstrate effective group communication, presentation, self-management, and report writing
skills.
COURSE OBJECTIVES:
COURSE OUTCOMES:
Text/Reference Books:
PREREQUISITE:
Basic Engineering Aptitude
COURSE OBJECTIVES:
This subject aims to inculcate critical thinking abilities and application of knowledge for
problem solving. It will expose the students with various simple methods and practices that
are essential to development of new systems, problem formulation and problem solving in
technical and non-technical fields. This course will stimulate the work environment of the
modern day engineers and technologists by familiarizing them with the state-of-the art
results, design and analysis tools in various disciplines, the ability to extract relevant
information to formulate and solve problems arising in practice.
COURSE OUTCOMES:
The course will enable students to,
1. Identify the market and value proposition
2. Carry out rigorous and accessible formulation to problems
3. Solutions via reducing the search space
4. Eliminating tradeoffs to reduce dimension of optimization problems
5. Execution through developing strategies for experiment, construction and
monetization.
6. Simulate the work environment of the modern engineer or knowledge worker in
general.
Unit – I 8 Hrs
Introduction to Critical Design Thinking
● Understanding critical thinking, creative thinking, and problem solving through
examples.
● New ways to solve problems.
Unit – II 8 Hrs
Theory of Inventive Problem Solving
● Examples of inventive problem solving,
● Era of technical systems,
● Science of inventing,
● Art of inventing,
● Amazing world of tasks
Unit – IV 8 Hrs
Modeling for Problem Solving
● Moving from problem to ideal final result,
● Tradeoffs and inherent contradictions,
● Invisible reserves,
● Law of increasing ideality,
● Evaluation of solutions,
● Enriching models for problem solving.
Unit – V 8 Hrs
Principles for Innovation
● General review,
● Segmentation, Separation,
● Local quality, symmetry change, merging and multifunctionality,
● Nested doll and weight compensation,
● Preliminary counteraction, preliminary action, and beforehand compensation,
● Equipotentiality, the other way around and curvature increase,
● Dynamic parts, partial or excessive actions, dimensionality change, mechanical
vibration
● Periodic action, continuity of useful action, and hurrying,
● Blessing in disguise, feedback, and intermediary,
● Self service, copying, cheap disposables, and mechanical interaction substitution
● Pneumatics and hydraulics, flexible shells and thin films, and porous materials,
● Optical property changes, homogeneous, and discarding and recovering,
● Parameter changes, phase transitions, and thermal expansion,
● Strong oxidants, inert atmosphere, and composite materials,
● How to select most suitable principle out of 40 ways to create good solutions
References
1. ABC-TRIZ Introduction to Creative Design Thinking with Modern TRIZ Modeling
by Michael A. Orloff
2. TRIZ And Suddenly the Inventor Appeared TRIZ, the Theory of Inventive Problem
Solving by GenrichAltshuller
3. TRIZ for Engineers Enabling Inventive Problem Solving by Karen Gadd
4. Simplified TRIZ New Problem Solving Applications for Engineers and
Manufacturing Professionals by Rantanen K., Domb E.
Unit 1- Introduction to Genetic Algorithm: Introduction to soft computing, soft computing vs hard
computing, Genetic Operators and Parameters, Genetic Algorithms in Problem Solving, Theoretical
Foundations of Genetic Algorithms, Implementation Issues, challenges and applications of G.A.
Unit 2- Artificial Neural Networks & Learning :Introduction to Learning concept: Supervised Learning,
Unsupervised Learning and Reinforcement Learning, Neural Model and Network Architectures, Model of
Artificial Neuron, Different Activation Functions, Perceptron network, Perceptron Learning, Supervised
Hebbian Learning, Adaptive Linear Neuron, Backpropagation network, Backpropogation learning,
Fundamentals of Associative Memory, Associative memory models, Auto associative memory, Bi-directional
hetero associative memory.
Unit 4- Introduction to Fuzzy Sets: Introduction to fuzzy sets, difference between fuzzy sets and crisp sets
theory, Operations on Fuzzy sets, Fuzzy properties, Fuzzy Relations, Fuzzy Measures, Applications of Fuzzy
Set Theory to different branches of Science and Engineering.
Unit 5- Knowledge discovery in databases: KDD process, star schema, snowflack schema, Data mining and
web mining using soft computing techniques. new datawarehouse architecture, database vs datawarehouse
bioinformatics, amazon redshift, google big query, panoply.
TEXT BOOKS:
1. E – Neuro Fuzzy and Soft computing – Jang J.S.R., Sun C.T and Mizutami, Prentice hall New Jersey,
1998
2. Fuzzy Logic Engineering Applications – Timothy J.Ross, McGraw Hill, NewYork, 1997.
3. Fundamentals of Neural Networks – Laurene Fauseett, Prentice Hall India, New Delhi, 1994.
REFERENCE BOOKS:
1. Introduce the primary important concepts of project management related to managing software
development projects.
2. Become familiar with the different activities involved in Software Project Management
3. Know how to successfully plan and implement a software project management activity, and to
complete a specific project in time with the available budget.
COURSE OUTCOMES: Upon completion of this course, the students will be able to
1. Identify the different project contexts and suggest an appropriate management strategy.
2. Practice the role of professional ethics in successful software development.
3. Identify and describe the key phases of project management.
4. Determine an appropriate project management approach through an evaluation of the business context
and scope of the project
5. Manage the people and control the defects.
Unit 1- Basic Concepts: Product, Process and Project, Definition, Components of Software Project
Management(SPM), Challenges and Opportunities, Tools and Techniques, Managing Human Resource and
Technical Resource, Costing and pricing of projects, Training and development, Project management
Unit 2- Format Process Models and Their Use: Definition and Format Model for a Process, ISO 9001 and
CMM Models and their relevance to Project Management, Other Emerging Models like People CMM
Unit 3- Umbrella Activities In Projects: Metrics, Methods and Tools for Metrics, Issues of Metrics in
multiple Projects, Configuration Management, Software Quality Assurance, Quality Standards and
Certifications, Process and Issues in obtaining Certifications, Risk issues in Software Development and
Implementation, Identification of Risks , Resolving and Avoiding risks, Tools and Methods for Identifying Risk
Management.
Unit 4- Instream Activities In Project: Project Initiation, Project Planning, Execution and Tracking, Project
Unit 5- Engineering And Issues In Project Management: Requirements, Design, Development, Testing,
Maintenance, Deployment, Engineering Activities and Management Issues in Each Phase, Special
TEXT BOOK(S)
1. Royce and Walker, “Software Project Management”, 2nd Edition, Pearson Education, 2002.
REFERENCES
1. Bob Hughes and Mike Cotterell, “Software Project Management”, 5th Edition, Tata McGrawHill,
2011.
2. Kelker, S. A, “Software Project Management”, 2nd Edition, Prentice Hall, 2003.
3. Gopalaswamy Ramesh, "Managing Global Projects", 1st Reprint Edition, Tata McGraw Hill,2006.
4. Robert K. Wysocki, “Executive's Guide to Project Management”, 2nd Edition, John Wiley &Sons,
2011.
5. Teresa and luckey, Joseph Phillips, “Software project Management for dummies”, 3 rdEdition, Wiley
publishing Inc., 2006.
COURSE OUTCOMES: Upon completion of this course, the students will be able to
1. Understand the concept of cybercrime and emerging crime threats and attacks in cyberspace.
2. Demonstrate the various types of cyber laws and their applicability.
3. Apply the forensic science techniques to data acquisition and evidence collection
4. Get the practical exposure to forensic tools from the scenarios of passive and active attacks.
5. Demonstrate the use of anti-malware tools for enhancing system network protection.
Unit 1: Introduction to IT laws & Cyber Crimes: Internet, Hacking, Cracking, Viruses, Virus Attacks,
Pornography, Software Piracy, Intellectual property, Legal System of Information Technology, Social
Engineering, Mail Bombs, Bug Exploits, and Cyber Security.
Legal and Ethical Principles: Introduction to Forensics – The Investigative Process – Code of Ethics, Ethics of
Investigations, Evidence Management – Collection, Transport, Storage, access control, disposition
Unit 2- Forensic Science: Principles and Methods –Scientific approach to Forensics, Identification and
Classification of Evidence, Location of Evidence, Recovering Data, Media File Forensic Steps, Forensic
Analysis – Planning, Case Notes and Reports, Quality Control .
Unit 3- Digital Forensics: Hardware Forensics – Hidden File and Anti- forensics - Network Forensics –
Virtual Systems - Mobile Forensics Digital Watermarking Protocols: A Buyer-Seller Watermarking Protocol, an
Efficient and Anonymous Buyer-Seller Watermarking Protocol, Extensions of Watermarking Protocols,
Protocols for Secure Computation
Unit 4- Application Forensics, Tools and Report Writing – Application Forensics, Email and Social Media
Investigations, Cloud Forensics, Current Digital Forensic Tools, Report Writing for Investigations.
Unit 5- Counter Measures: Defensive Strategies for Governments and Industry Groups, Tactics of the
Military, Tactics of Private Companies, Information Warfare Arsenal of the future, and Surveillance Tools for
Information Warfare of the Future.
TEXT BOOKS:
1. Bill Nelson, Christopher Steuart, Amelia Philips, “Computer Forensics and Investigations”, Delmar
Cengage Learning; 5th edition January 2015.
2. Chuck Eastom, “Certified Cyber Forensics Professional Certification”, McGraw Hill, July 2017.
3. Nilakshi Jain, Dhananjay Kalbande, “Digital Forensic: The fascinating world of Digital Evidence”
Wiley India Pvt Ltd 2017.
4. John R.Vacca, “Computer Forensics: Computer Crime Scene Investigation”, Laxmi Publications, 2015.
REFERENCE BOOKS:
1. MarjieT.Britz, “Computer Forensics and Cyber Crime”: An Introduction”, 3rd Edition, Prentice Hall,
2013.
2. Clint P Garrison “Digital Forensics for Network, Internet, and Cloud Computing A forensic evidence
guide for moving targets and data , Syngress Publishing, Inc. 2010.
1. Understand the image fundamentals and mathematical transforms necessary for image
processing.
2. Expose students to current applications in the field of digital image processing.
Unit 1-Introduction: Digital Image Processing, The origins of Digital Image Processing, Examples of Digital
Image Processing application, Fundamental steps in Digital Image processing, Components of Image Processing
system Fundamentals: Elements of Visual Perception, Light and Electromagnetic Spectrum, Image Sensing and
Acquisition, Image Sampling and Quantization, Some basic Relationships between Pixels, Linear and Nonlinear
Operations, An introduction to mathematical tool used in digital image processing.
Unit 2-Image Enhancement in the spatial domain: Background, some basic gray level transformation,
Introduction of Histogram processing, Enhancement using Arithmetic/Logic operations, Basics of spatial
filtering, smoothing spatial filters, Sharpening spatial filters, Concept of Sampling.
Unit 3-Image Restoration: Model of the Image Degradation/Restoration process, Noise Models, Restoration in
the presence of noise only spatial filtering, Inverse filtering, Minimum Mean Square Error (Wiener) filtering,
Geometric mean filter.
Unit 4-Image Compression: Fundamentals, Lossy Compression, Lossless Compression, Image Compression
models, Error-free Compression: Variable length coding, LZW coding, Bit plane coding, Run length coding,
Introduction to JPEG, introduction to color image processing, color fundamentals, color models, Pseudo color
image processing.
Unit 5-Morphology and Segmentation: Erosion, Dilation, Duality, Opening and Closing, Hit-and Miss
transform, Morphological Algorithms: Boundary Extraction, Hole filling, Extraction of connected components,
Convex Hull, Concept of Thinning and Thickening.
TEXT BOOK:
1. Rafael C. Gonzalez, Richard E. Woods, ‗Digital Image Processing‘, Pearson, Third Edition, 2010.
2. Anil K. Jain, ‗Fundamentals of Digital Image Processing‘, Pearson, 2002.
REFERENCE BOOKS:
1. Kenneth R. Castleman, ‗Digital Image Processing‘, Pearson, 2006.
2. Rafael C. Gonzalez, Richard E. Woods, Steven Eddins, ‗Digital Image Processing using MATLAB‘,
Pearson Education, Inc., 2011.
3. D,E. Dudgeon and RM. Mersereau, ‗Multidimensional Digital Signal Processing‘, Prentice Hall
Professional Technical Reference, 1990.
4. William K. Pratt, ‗Digital Image Processing‘, John Wiley, New York, 2002
5. Milan Sonka et al ‗Image processing, analysis and machine vision‘, Brookes/Cole, Vikas Publishing
House, 2nd edition, 1999.
1. Make students comfortable with tools and techniques required in handling large amounts of
datasets.
2. Uncover various terminologies and techniques used in Big Data.
3. Use several tools publicly available to illustrate the application of these techniques.
4. Know about the research that requires the integration of large amounts of data.
COURSE OUTCOMES: On successful completion of this course, the students will be able to
UNIT – I
Introduction to big data: Introduction to Big Data Platform – Challenges of Conventional Systems - Intelligent
data analysis – Nature of Data - Analytic Processes and Tools - Analysis vs Reporting.
UNIT – II
Mining data streams: Introduction to Streams Concepts – Stream Data Model and Architecture - Stream
Computing - Sampling Data in a Stream – Filtering Streams –Counting Distinct Elements in a Stream –
Estimating Moments – Counting Oneness ina Window – Decaying Window - Real time Analytics
Platform(RTAP) Applications – Case Studies - Real Time Sentiment Analysis- Stock Market Predictions.
UNIT – III
Hadoop: History of Hadoop- the Hadoop Distributed File System – Components of Hadoop Analyzing the Data
with Hadoop- Scaling Out- Hadoop Streaming- Design of HDFS-Java interfaces to HDFS Basics- Developing a
Map Reduce Application-How Map Reduce Works-Anatomy of a Map Reduce Job Run-Failures-Job
Scheduling-Shuffle and Sort – Task execution - Map Reduce Types and Formats- Map Reduce Features-Hadoop
environment.
UNIT – IV
Frameworks: Applications on Big Data Using Pig and Hive – Data processing operatorsin Pig – Hive services
– HiveQL – Querying Data in Hive - fundamentals of HBase and Zookeeper - IBM Infosphere Big Insights and
Streams.
UNIT – V
Predictive Analytics- Simple linear regression- Multiple linear regression- Interpretation of regression
coefficients. Visualizations - Visual data analysis techniques- interaction techniques - Systems and applications.
TEXTBOOKS:
REFERENCE BOOKS:
1. Michael Minelli, Michele Chambers, and Ambiga Dhiraj, Big Data, Big Analytics: Emerging Business
Intelligence and Analytic Trends for Today’s Businesses, Wiley,2013.
2. Frank J. Ohlhorst, Big Data Analytics: Turning Big Data into Big Money, Wiley, 2012.
3. Arvind Sathi, Big Data Analytics: Disruptive Technologies for Changing the Game, MC Press, 2012.
4. Glenn J. Myatt, “Making Sense of Data”, John Wiley & Sons, 2007.
5. Pete Warden, “Big Data Glossary”, O’Reilly, 2011.
6. Jeffrey Aven, Hadoop in 24 hours, person education 2018.
7. Jiawei Han, Micheline Kamber “Data Mining Concepts and Techniques”, 2 nd Edition, Elsevier,
Reprinted 2008.
8. Da Ruan, Guoquing Chen, Etienne E.Kerre, Geert Wets, “Intelligent Data Mining”, Springer, 2007.
9. Paul Zikopoulos, Dirkde Roos, Krishnan Parasuraman, Thomas Deutsch, James Giles , David
Corrigan, “Harness the Power of Big Data The IBM Big Data Platform”, Tata McGraw Hill
Publications, 2012.
10. Arshdeep Bahga, Vijay Madisetti, “Big Data Science & Analytics: A Hands- On Approach “,VPT,
2016
11. Bart Baesens “Analytics in a Big Data World: The Essential Guide to Data Science and its
Applications (WILEY Big Data Series)”, John Wiley & Sons,2014.
COURSE OUTCOMES: On successful completion of the course, the student will be able to
Unit 2- Software Requirement Analysis: Structured analysis, object-oriented analysis, software requirement
specification, and validation.
Unit 3- Design and Implementation of Software: software design fundamentals, design methodology
(structured design and object-oriented design), design verification, monitoring and control coding.
Unit 4- Testing:Testing fundamentals, white box and black box testing, software testing strategies: unit testing,
integration testing, validation testing, system testing, debugging.
Unit 5- Software Reliability: Metric and specification, fault avoidance and tolerance, exception handling,
defensive programming.Software Maintenance – maintenance characteristics, maintainability, maintenance
tasks, maintenance side effects. CASE tools, software certification- requirement, types of certifications, third
part certification. Software Re-Engineering, reverse software Engineering. Software Configuration Management
Activities, Change Control Process, Software Version Control, CASE: introduction, levels of case, architecture,
case building blocks, objectives, case repository, characteristics of case tools, categories, Estimation of Various
Parameters such as Cost, Efforts, Schedule/Duration, Constructive Cost Models (COCOMO), Resource
Allocation Models, Software Risk Analysis and Management.
TEXTBOOKS:
1. Roger Pressman, ―Software Engineering: A Practitioner ‘s Approach, McGraw Hill, ISBN 007–
337597–7.
2. Ian Sommerville, ―Software Engineering, Addison and Wesley, ISBN 0-13-703515-2.
REFERENCE BOOKS:
1. Carlo Ghezzi, ―Fundamentals of Software Engineering, Prentice Hall India, ISBN-10: 0133056996.
2. Rajib Mall, ―Fundamentals of Software Engineering, Prentice Hall India, ISBN-13: 9788120348981.
3. Pankaj Jalote, ―An Integrated Approach to Software Engineering, Springer, ISBN 13:
9788173192715.
4. S K Chang, ―Handbook of Software Engineering and Knowledge Engineering, World Scientific, Vol
I, II, ISBN: 978-981-02-4973-1.
Tom Halt, ―Handbook of Software Engineering, ClanyeInternational ISBN- 10: 1632402939
COURSE OUTCOMES: On successful completion of the course, the student will be able to:
1. Recognize features of object-oriented design such as encapsulation, polymorphism, inheritance, and
composition of systems based on object identity.
2. Apply some common object-oriented design patterns.
3. Specify simple abstract data types and design implementations using abstraction functions to
document them.
4. Design a convenient way for the handling problems using templates and use simple try-catch blocks
for Exception Handling.
5. Manage I/O streams and File I/O oriented interactions.
Unit 1- Object Oriented Programming Concepts: Classes and Objects, Methods and Messages, Abstraction
and Encapsulation, Inheritance, Abstract Classes, Polymorphism. Introduction to C++: Classes and Objects,
Structures and Classes, Unions and Classes, Friend Functions, Friend Classes, Inline Functions, Static Class
Members, Scope Resolution Operator, Nested Classes, Local Classes, Passing Objects to Functions, Returning
objects, object assignment. Arrays, Pointers, References, and the Dynamic Allocation Operators: Arrays of
Objects, Pointers to Objects, Type Checking, this Pointer, Pointers to Derived Types, Pointers to Class
Members, References, Dynamic Allocation Operators.
Unit 3- Inheritance and Polymorphism: Inheritance: Base-Class Access Control, Inheritance and Protected
Members, Inheriting Muitiple Base Classes, Constructors, Destructors and Inheritance, Granting Access, Virtual
Base Classes. Polymorphism: Virtual Functions, Virtual Attribute and Inheritance, Virtual Functions and
Hierarchy, Pure Virtual Functions, Early vs. Late Binding, Run-Time Type ID and Casting Operators: RTTI,
Casting Operators, Dynamic Cast.
Unit 4- Templates and Exception Handling: Templates: Generic Functions, Applying Generic Functions,
Generic Classes, The type name and export Keywords, Power of Templates, Exception Handling:
Fundamentals, Handling Derived Class Exceptions, Exception Handling Options, Understanding terminate() and
unexpected(), uncaught_exception () Function, exception and bad_exception Classes, Applying Exception
Handling.
Unit 5- I/O System Basics: Streams and Formatted 1/O. File I/O: File Classes, File Operations. Namespaces:
Namespaces, std Namespace. Standard Template Library: Overview, Container Classes, General Theory of
Operation, Lists, string Class, Final Thoughts on STL.
TEXTBOOKS:
1. Object Oriented Programming with C++ by E. Balagurusamy, McGraw-Hill Education (India).
2. ANSI and Turbo C++ by Ashoke N. Kamthane, Pearson Education
REFERENCE BOOKS:
1. Big C++ - Wiley India.
2. C++: The Complete Reference- Schildt, McGraw-Hill Education (India).
3. C++ and Object Oriented Programming – Jana, PHI Learning.
4. Object Oriented Programming with C++ - Rajiv Sahay, Oxford.
5. Mastering C++ - Venugopal, McGraw-Hill Education (India)
PROJECT (CSP-021)
L:T:P:: 0:0:12 Credits-06
COURSE OBJECTIVE:
The objective of Project is to enable the student to extend further the investigative study taken up under project
either fully theoretical/practical or involving both theoretical and practical work, under the guidance of a
Supervisor from the Department alone or jointly with a Supervisor drawn from R&D laboratory/Industry. This
is expected to provide a good training for the student(s) in R&D work and technical leadership.
COURSE OUTCOME: On successful completion of this course, the students shall be able to
1. Review and finalize the approach to the problem relating to the assigned topic and prepare an action
plan for preparing conducting the investigation and assign responsibilities for teamwork
2. Conduct detailed analysis, modeling, simulation, design, problem solving, or experiment as needed on
the assigned topic
3. Develop product/process, test, draw results and conclusions, and give direction for future research and
prepare a paper for conference presentation/publication in journals, if possible
4. Prepare a project report in the standard format for being evaluated by the Department and make final
presentation on the project before a Departmental Committee.
Page 1 of 2
3 B. Tech. in branch name Biotechnology CSE Data Science
with Minor in “Data Bio Chemical Engineering 1. Information
Science” Chemical Engineering Management
” Civil Engineering 2. Scalable Data Science
Electrical Engineering 3. Data Science for
Electrical & Electronics Engineering Engineers
Electronics & Communication Engineering 4. Business Analytics and
Mechanical Engineering data mining Modeling
Mechanical Engineering (Manufacturing using R
Engineering) 5. Data Visualization
Production Engineering 6. Big Data Analysis
Manufacturing Engineering
Power Plant Engineering
4 B. Tech. in branch name Biotechnology CSE Internet of Things
with Minor in “Internet of Bio Chemical Engineering 1. Sensor Technology
Things” Chemical Engineering 2. Cloud Architectures
” Civil Engineering 3. Microcontrollers and
Electrical Engineering interfacing (using embedded
Electrical & Electronics Engineering C)
Electronics & Communication Engineering 4. Machine Learning
Mechanical Engineering 5. Computer Programming in
Mechanical Engineering (Manufacturing Python
Engineering) 6. Embedded System Design
Production Engineering
Manufacturing Engineering
Power Plant Engineering
*If required the student may opt requisite fundamental course/s for a minor specialization as audit course.
Page 2 of 2
VEER MADHO SINGH BHANDARI UTTARAKHAND TECHNICAL UNIVERSITY, DEHRADUN
Introduction to AI
AIML-001
1 & Machine 3 0 0 30 20 50 100 150 3 III
Learning
Introduction to
AIML-002
2 Data Analytics 3 0 0 30 20 50 100 150 3 IV
Deep Learning and
AIML-003
3 Neural Network 3 0 0 30 20 50 100 150 3 V
Specific topics in
AIML-004 Artificial
4 3 0 0 30 20 50 100 150 3 VI
Intelligence
5 AIML-005 Applications of AI 3 0 0 50 100 150 3 VII
30 20
Introduction to AI
AIMLP-001 & Machine 25
6 0 0 2 25 25 50 1 III
Learning Lab
Introduction to
AIMLP-002 25
7 Data Analytics 0 0 2 25 25 50 1 IV
Lab
Deep Learning and
AIMLP-003 Neural Network 25
8 0 0 2 25 25 50 1 V
Lab
Abbreviation Used:-
L: Lecture, T: Tutorial, P: Practical, TA: Teacher Assessment, TE: Theory End Semester Exam., PE:
Practical End Semester Exam.
Syllabus of B. TECH in VMSB Uttarakhand Technical University, Dehradun for admissions in (2022-23) and onwards PAGE 1
VEER MADHO SINGH BHANDARI UTTARAKHAND TECHNICAL UNIVERSITY, DEHRADUN
L: T: P: : 3: 0: 0 Credits – 3
Unit 1- Introduction to AI: Defining Artificial Intelligence, Defining Al techniques, Using Predicate Logic,
and Representing Knowledge as Rules, Representing simple facts in logic, Computable functions, and
predicates, Procedural vs Declarative knowledge, Logic Programming, Mathematical foundations: Matrix
Theory and Statistics for Machine Learning.
Unit 2- Idea of Machine Learning: Idea of Machines learning from data, Classification of problem -
Regression and Classification, Supervised and Unsupervised learning.
Unit 3- Linear Regression: Model representation for single variable, Single variable Cost Function, Gradient
Decent for Linear Regression, Gradient Decent in practice.
Unit 5- Clustering Algorithms: Discussion on clustering algorithms and use-cases centered around clustering
and classification.
TEXTBOOKS:
REFERENCE BOOKS:
Syllabus of B. TECH in VMSB Uttarakhand Technical University, Dehradun for admissions in (2022-23) and onwards PAGE 2
VEER MADHO SINGH BHANDARI UTTARAKHAND TECHNICAL UNIVERSITY, DEHRADUN
Syllabus of B. TECH in VMSB Uttarakhand Technical University, Dehradun for admissions in (2022-23) and onwards PAGE 3
VEER MADHO SINGH BHANDARI UTTARAKHAND TECHNICAL UNIVERSITY, DEHRADUN
L: T: P: : 3: 0: 0 Credits – 3
Unit 1- Introduction to Data Science: Introduction to Data Science, Different Sectors using Data
science, Purpose and Components of Python in Data Science.
Unit 2- Processes of Data Analytics: Data Analytics Process, Knowledge Check, Exploratory Data Analysis
(EDA), EDA- Quantitative technique, EDA- Graphical Technique, Data Analytics Conclusion, and Predictions.
Unit 3- Feature Generation and Selection: Feature Generation and Feature Selection (Extracting Meaning
from Data)- Motivating application: user (customer) retention- Feature Generation (brainstorming, the role of
domain expertise, and place for imagination)- Feature Selection algorithms.
Unit 4- Data Visualization: Data Visualization- Basic principles, ideas and tools for data visualization,
Examples of inspiring (industry) projects- Exercise: create your own visualization of a complex dataset.
Unit 5- Application of Data Science: Applications of Data Science, Data Science and Ethical Issues-
Discussions on privacy, security, ethics- A look back at Data Science- Next-generation data scientists.
TEXTBOOKS:
1. Jure Leskovek, Anand Rajaraman and Jeffrey Ullman. Mining of Massive Datasets. v2.1, Cambridge
University Press.
Syllabus of B. TECH in VMSB Uttarakhand Technical University, Dehradun for admissions in (2022-23) and onwards PAGE 4
VEER MADHO SINGH BHANDARI UTTARAKHAND TECHNICAL UNIVERSITY, DEHRADUN
2. Jake Vander Plas, Python Data Science Handbook , Shroff Publisher /O'Reilly Publisher Media.
3. Philipp Janert, Data Analysis with Open Source Tools, Shroff Publisher /O'Reilly Publisher Media.
REFERENCE BOOKS:
1. Joel Grus, Data Science from Scratch, Shroff Publisher /O'Reilly Publisher Media.
2. Annalyn Ng, Kenneth Soo, Numsense! Data Science for the Layman, Shroff Publisher.
Syllabus of B. TECH in VMSB Uttarakhand Technical University, Dehradun for admissions in (2022-23) and onwards PAGE 5
VEER MADHO SINGH BHANDARI UTTARAKHAND TECHNICAL UNIVERSITY, DEHRADUN
Unit 1- NEURAL NETWORK: Characteristics of Neural Networks, Structure and working of a biological
neural network, artificial neural network: terminology, models of neurons: McCulloch Pitts model, Perceptron
model, Adaline model, topology, Basic learning laws. Functional Units for Artificial Neural Network for Pattern
Recognition Task.
Unit 2- TRAINING NEURAL NETWORK: Initialization, batch normalization, Hyper parameter optimization
,Optimization algorithms:-SGD, Nesterov Momentum, Adagrad, RMS Prop, Adam. Regularization methods:
dropouts, ensembles, data augmentation, update rules, transfer learning.
Unit 4- RECURRENT NEURAL NETWORK: Recurrent Neural Networks (RNN) and Long Short-Term
Memory (LSTM). Applications of Recurrent Neural Networks in real world: word prediction ,Chatbots, Image
captioning.
Unit 5- TENSORFLOW AND KERAS: Creating and deploying networks using TensorFlow- open source
machine learning platform and Keras-python deep learning API.
TEXTBOOKS:
1. John Paul Mueller, Luca Massaron, Deep Learning for Dummies, John Wiley & Sons.
2. Adam Gibson, Josh Patterson, Deep Learning, A Practitioner’s Approach, Shroff Publisher /O’Reilly
Publisher Media.
Syllabus of B. TECH in VMSB Uttarakhand Technical University, Dehradun for admissions in (2022-23) and onwards PAGE 6
VEER MADHO SINGH BHANDARI UTTARAKHAND TECHNICAL UNIVERSITY, DEHRADUN
REFERENCE BOOKS:
1. Christopher M. Bishop, Neural Networks for Pattern Recognition, Oxford.
AIML-004: SPECIFIC TOPICS IN ARTIFICIAL INTELLIGENCE
L: T: P: : 3: 0: 0 Credits – 3
Unit 1- INTRODUCTION TO DEEP LEARNING: Bayesian Filtering; Recurrent Neural Networks, Deep
Neural Networks, Deep Reinforcement Learning.
Unit 2- SPECIAL NETWORKS: Self- Play Networks, Generative Adversarial Networks, Learning from
Concept-Drifting Data Streams.
Unit 3- SIGNAL PROCESSING: Audio Signal Processing Basics, mir toolbox contains many useful audios
processing library functions, VOICEBOX: Speech Processing Toolbox for MATLAB, Audio processing in
MATLAB.
Unit 5- NEUROCOMPUTING: An introduction to neurocomputing and its possible role in Al, The role of
uncertainty measures and principles in Al.
TEXTBOOKS:
1. Dr. Nilakshi Jain, Artificial Intelligence: Making a System Intelligent, John Wiley &Sons.
2. Artificial Intelligence & Soft Computing for Beginners, 3rd Edition-2018, by Anindita Das, Shroff
Publisher.
REFERENCE BOOKS:
Syllabus of B. TECH in VMSB Uttarakhand Technical University, Dehradun for admissions in (2022-23) and onwards PAGE 7
VEER MADHO SINGH BHANDARI UTTARAKHAND TECHNICAL UNIVERSITY, DEHRADUN
1. New Artificial Intelligence (Advanced), Takashi Mae da and Furnia Aoki, Ohmsha Publisher.
AIML-005: APPLICATIONS OF AI
L: T: P: : 3: 0: 0 Credits – 3
Unit 1- NATURAL LANGUAGE PROCESSING: Linguistic aspects of natural language processing, A.I.
And Quantum Computing, Applications of Artificial Intelligence (AI) in business.
Unit 2- APPLICATIONS TO REAL LIFE: Emotion Recognition using human face and body language, Al-
based system to predict the diseases early, Smart Investment analysis, Al in Sales, and Customer Support.
Unit 3- ROBOTICS PROCESSES: Robotic Processes Automation for supply chain management.
Unit 4- AI MODELLING: AI-Optimized Hardware, Digital Twin i.e., Al Modelling, Information Technology
& Security using Al.
Unit 5- RECENT TOPICS IN AL/ ML: Al/ML in Smart solutions, Al/ML in Social Problems handling,
Blockchain and Al.
TEXTBOOKS:
1. Sameer Dhanrajani, AI and Analytics, Accelerating Business Decisions, John Wiley & Sons.
2. Life 3.0: Being Human in the Age of Artificial Intelligence by Max Tegmark, published July 2018.
REFERENCE BOOKS:
1. Artificial Intelligence in Practice: How 50 Successful Companies Used AI and Machine Learning to
Solve Problems, Bernard Marr, Matt Ward , Wiley.
2. Homo Deus: A Brief History of Tomorrow by Yuval Noah Harari, published March 2017
Syllabus of B. TECH in VMSB Uttarakhand Technical University, Dehradun for admissions in (2022-23) and onwards PAGE 8
VEER MADHO SINGH BHANDARI UTTARAKHAND TECHNICAL UNIVERSITY, DEHRADUN
L: T: P: : 0: 0: 2 Credits – 1
Syllabus of B. TECH in VMSB Uttarakhand Technical University, Dehradun for admissions in (2022-23) and onwards PAGE 9
VEER MADHO SINGH BHANDARI UTTARAKHAND TECHNICAL UNIVERSITY, DEHRADUN
L: T: P: : 0: 0: 2 Credits – 1
1. Program on Numpy Aggregations: Min, Max, and etc. Example What Is the Average Height of prime
ministers of india?
2. Program using Numpy Comparisons, Masks, and Boolean Logic example: Counting Rainy Days.
3. Program using Numpy Fancy Indexing example: Selecting Random Points.
4. Write a NumPy program to create a 3x3 identity matrix.
5. Write a NumPy program to create a vector of length 10 with values evenly distributed between 5 and
50.
6. Program using Pandas to Combining Datasets: Join.
7. Program using Pandas on Pivot Tables.
8. Program using Pandas to Vectorized String Operations.
9. Program using Pandas to Work with Time Series Example: Visualizing Seattle Bicycle Counts.
10. Write a NumPy program to swap rows and columns of a given array in reverse order.
11. Write a NumPy program to compute the mean, standard deviation, and variance of a given array along
the second axis.
12. Write a NumPy program to sort the student id with increasing height of the students from given
students id and height. Print the integer indices that describes the sort order by multiple columns and
the sorted data.
Syllabus of B. TECH in VMSB Uttarakhand Technical University, Dehradun for admissions in (2022-23) and onwards PAGE 10
VEER MADHO SINGH BHANDARI UTTARAKHAND TECHNICAL UNIVERSITY, DEHRADUN
1. Implementation of MP model.
2. Implementation of feed forward neural network.
3. Implementation of back propagation neural network.
4. Implement all activation function of neural network for any pattern recognition application.
5. Implement any one oflmageNet or GoogLeNet.
6. Construct and implement multi-layer feed forward neural network for handwritten digit classification
problem.
7. Classify images appropriately using CNN.
8. Implement LSTM Neural Network for Time Series Prediction.
9. Perform splitting of data for training, testing, and validation using k-fold cross validation.
10. Implement a binary and multi class image classification using Convolution Neural Network.
11. Perform hyper parameter tuning using Bayesian optimization technique for a Convolution Neural
Network.
12. Analyze the effectiveness of various optimization algorithms with an image classification problem.
13. Solve the overfitting problem in a neural architecture using DropOut technique.
14. Study the efficiency of the transfer learning approach for a classification problem on the following
architectures: VGG-16, Alexnet, and Inception-V3.
Syllabus of B. TECH in VMSB Uttarakhand Technical University, Dehradun for admissions in (2022-23) and onwards PAGE 11
VEER MADHO SINGH BHANDARI UTTARAKHAND TECHNICAL UNIVERSITY, DEHRADUN
15. Solve a seq2seq problem (machine translation) using LSTM Recurrent Neural Architecture.
16. Solve a time series forecasting (stock prediction) using LSTM RNN.
17. Implement the image dimensionality reduction problem using a AutoEncoder architecture.
L: T: P: : 0: 0: 4 Credits – 2
COURSE OBJECTIVES: The main objective of Capstone Project is to let the students apply the knowledge of
theoretical concepts which they have learnt as a part of the curriculum of the minor degree using real time
problems or situations.
COURSE OUTCOMES: On successful completion of the course, the student will be able to:
1. Understand, plan, and execute a Capstone Project with team.
2. Acquired knowledge within the chosen area of technology for project development.
3. Identify, discuss, and justify the technical aspects of the chosen project with a comprehensive and
systematic approach.
4. Communicate and report effectively project related activities and findings.
5. Expose the world of research, technology, and innovation.
COURSE GUIDELINES:
The Capstone project is desirable to be done in a group of 2 students. Each group has to prepare a title related to
any engineering discipline, and the title must emulate any real world problem.
Submit an early proposal. This proposal is a 1-2page(s) report, describes what the project is about and the final
product's output. The project proposal will be submitted to the respective guide.
Every individual student will be assigned a faculty to guide them. There will be three major reviews which will
be carried out as listed below.
Mark Weightage
Review # Requirement Internal External
0 Area / Title selection - -
The assessment of term work shall be done on the basis of the following.
Syllabus of B. TECH in VMSB Uttarakhand Technical University, Dehradun for admissions in (2022-23) and onwards PAGE 12
VEER MADHO SINGH BHANDARI UTTARAKHAND TECHNICAL UNIVERSITY, DEHRADUN
1. Continuous assessment
2. Performing the experiments in the laboratory
3. Oral examination conducted on the syllabus and term work mentioned above.
Syllabus of B. TECH in VMSB Uttarakhand Technical University, Dehradun for admissions in (2022-23) and onwards PAGE 13
VEER MADHO SINGH BHANDARI UTTARAKHAND TECHNICAL UNIVERSITY, DEHRADUN
Syllabus
SYLLABUS
For
B.TECH
(Computer Science and Engineering)
2ND Year
Syllabus
SEMESTER-III
Evaluation Scheme
Subject
Subject Periods Sessional
S. NO. ESE Total Credit
Codes Category Subject Exam
L T P CT TA Total TE PE
AHT-006/ Advanced Applied Mathematics /
1 BSC/ ESC 3 1 0 30 20 50 100 150 4
ECT-033 Digital Electronics
AHT-
Technical Communication/
2 007/AHT- HSC 2 1 0 30 20 50 100 150 3
Universal Human Value
008
3 CST-002 DC Discrete Structure 3 1 0 30 20 50 100 150 4
Abbreviations: L-No. of Lecture hours per week, T-No. of Tutorial hours per week, P-No. of Practical hours per week, CT-
Class Test Marks, TA-Marks of teacher’s assessment including student’s class performance and attendance, PS-Practical
Sessional Marks, ESE-End Semester Examination, TE- Theory Examination Marks, PE- Practical External Examination Marks
Minor Courses (Optional) **: Select any subject from Annexure – II from other departments
Syllabus
SEMESTER-IV
Evaluation Scheme
Subject
Subject Periods Sessional
S. NO. ESE Total Credit
Codes Category Subject Exam
L T P CT TA Total TE PE
AHT-006/ Advanced Applied Mathematics /
1 BSC/ ESC 3 0 0 30 20 50 100 150 3
ECT-033 Digital Electronics
AHT-
Technical Communication/ 2 1 0 150 3
2 007/AHT- HSC 30 20 50 100
Universal Human Value 150 4
008
Computer Organization and
3 CST-007 DC 3 1 0 30 20 50 100 150 4
Architecture
4 CST-008 DC JAVA Programming 3 1 0 30 20 50 100 150 4
Formal Languages & Automata
5 CST-009 DC 3 1 0 30 20 50 100 150 4
Theory
Computer Organization and
6 CSP-007 DLC 0 0 2 25 25 25 50 1
Architecture Lab
7 CSP-008 DLC JAVA Programming Lab 0 0 2 25 25 25 50 1
8 CSP-009 DLC UNIX/LINUX Lab 0 0 2 25 25 25 50 1
CST-005/ Python Programming/ Cyber
9 MC 2 0 0 15 10 25 50
CST-006 Security
10 GP-004 NC General Proficiency 50
Total 900 22
11 Minor Course (Optional) 3 1 0 30 20 50 100 4
To be completed at the end of the fourth semester
DLC Internship-II/Mini Project-II*
(during the Summer).
MOOCs course
Abbreviations: L-No. of Lecture hours per week, T-No. of Tutorial hours per week, P-No. of Practical hours per week, CT-
Class Test Marks, TA-Marks of teacher’s assessment including studentss class performance and attendance, PS-Practical
Sessional Marks, ESE-End Semester Examination, TE- Theory Examination Marks, PE- Practical External Examination Marks
Minor Courses (Optional) **: Select any subject from Annexure – II from other departments
Syllabus
COURSE OUTCOMES:
1. Remember the concept of Laplace transform and apply in solving real life problems.
2. Apply the concept of Fourier transform to evaluate engineering problems.
3. Understand to evaluate roots of algebraic and transcendental equations.
4. Solve the problem related interpolation, differentiation, integration and the solution of differential
equations.
5. Understand the concept of correlation, regression, moments, skewness and kurtosis and curve fitting.
Definition of Laplace transform, Existence theorem, Laplace transforms of derivatives and integrals, Initial and
final value theorems, Unit step function, Dirac- delta function, Laplace transform of periodic function, Inverse
Laplace transform, Convolution theorem, Application to solve linear differential equations.
Fourier integral, Fourier sine and cosine integral, Complex form of Fourier integral, Fourier transform,Inverse
Fouriertransforms, Convolution theorem, Fourier sine and cosine transform, Applications of Fourier transform to
simple one dimensional heat transfer equations.
Number and their accuracy, Solution of algebraic and transcendental equations: Bisection method, Iteration
method, Newton-Raphson method and Regula-Falsi method. Rate of convergence of these methods (without
proof), Interpolation: Finite differences, Relation between operators, Interpolation using Newton’s forward and
backward difference formula, Interpolation with unequal intervals: Newton’s divided difference and Lagrange’s
formula.
Syllabus
Numerical Differentiation, Numerical integration: Trapezoidal rule, Simpson’s 1/3rd and 3/8 rule,Runge-Kutta
method of fourth order for solving first order linear differential equations, Milne’s predicator-corrector method.
Introduction: Measures of central tendency, Moments, Skewness, Kurtosis, Curve fitting: Method of least
squares, Fitting of straight lines, Fitting of second degree parabola, Exponential curves. Correlation and rank
correlation, Regression analysis: Regression lines of y on x and x on y, Regression coefficients, Properties of
regressions coefficients and non-linear regression.
Reference Books:
Syllabus
UNIT 1: MINIMIZATION OF LOGIC FUNCTIONS: Review of logic gate and Boolean algebra,
DeMorgan’s Theorem, SOP & POS forms, canonical forms, don’t care conditions, K-maps up to 6
variables, Quine-McClusky’s algorithm, X-OR & X-NOR simplification of K-maps, binary codes, code
conversion.
UNIT 2: COMBINATIONAL CIRCUITS: Combinational circuit design, half and full adders, subtractors,
serial and parallel adders, code converters, comparators, decoders, encoders, multiplexers, de-multiplexer,
parity checker, driver &multiplexed display, BCD adder, Barrel shifter and ALU.
UNIT 3: SEQUENTIAL CIRCUITS: Building blocks like S-R, JK and master-slave JK FF, edge
triggered FF, ripple and synchronous counters, shift registers, finite state machines, design of synchronous
FSM, algorithmic state machines charts, designing synchronous circuits like pulse train generator, pseudo
random binary sequence generator, clock generation
UNIT 4: LOGIC FAMILIES & SEMICONDUCTOR MEMORIES: TTL NAND gate, specifications,
noise margin, propagation delay, fan-in, fan-out, tri-state TTL, ECL, CMOS families and their interfacing,
memory elements, concept of programmable logic devices like FPGA, logic implementation using
programmable devices.
UNIT 5: VLSI DESIGN FLOW: Design entry: schematic, FSM & HDL, different modelling styles in
VHDL, data types and objects, dataflow, behavioral and structural modelling, synthesis and simulation
VHDL constructs and codes for combinational and sequential circuits.
Syllabus of B.TECH – Computer Science and Engineering PAGE 6
VEER MADHO SINGH BHANDARI UTTARAKHAND TECHNICAL UNIVERSITY, DEHRADUN
Syllabus
BOOKS:
Syllabus
1. Produce technical documents that use tools commonly employed by engineering and computer
science professionals.
2. Communicate effectively in a professional context, using appropriate rhetorical approaches for
technical documents, adhering to required templates, and complying with constraints on
document format.
3. Clarify the nuances of phonetics, intonation and pronunciation skills.
4. Get familiarized with English vocabulary and language proficiency.
COURSE OUTCOMES: On successful completion of the course, the student will be able to:
1. Students will be enabled to understand the nature and objective of Technical Communication
relevant for the work place as Engineers.
2. Students will utilize the technical writing for the purposes of Technical Communication and its
exposure in various dimensions.
3. Students would imbibe inputs by presentation skills to enhance confidence in face of diverse
audience.
4. Technical communication skills will create a vast know-how of the application of the learning
to promote their technical competence.
5. It would enable them to evaluate their efficacy as fluent & efficient communicators by learning
the voice-dynamics.
Syllabus
Reference Books
1. Technical Communication – Principles and Practices by Meenakshi Raman & Sangeeta Sharma,
Oxford Univ. Press, 2007, New Delhi.
2. Business Correspondence and Report Writing by Prof. R.C. Sharma & Krishna Mohan, Tata
McGraw Hill & Co. Ltd., 2001, New Delhi.
3. Practical Communication: Process and Practice by L.U.B. Pandey; A.I.T.B.S. Publications India
Ltd.; Krishan Nagar, 2014, Delhi.
4. Modern Technical Writing by Sherman, Theodore A (et.al); Apprentice Hall; New Jersey; U.S.
5. A Text Book of Scientific and Technical Writing by S.D. Sharma; Vikas Publication, Delhi.
6. Skills for Effective Business Communication by Michael Murphy, Harward University, U.S.
Business Communication for Managers by Payal Mehra, Pearson Publication, Delhi.
Syllabus
1. Expected to become more aware of themselves, and their surroundings (family, society,
nature)
2. Become more responsible in life, and in handling problems with sustainable solutions, while
keeping human relationships and human nature in mind.
3. Have better critical ability.
4. Become sensitive to their commitment towards what they have understood (human values,
human relationship and human society).
5. Able to apply what they have learnt to their own self in different day-to- day settings in real
life, at least a beginning would be made in this direction.
COURSE TOPICS: The course has 28 lectures and 14 practice sessions in 5 modules:
Syllabus
Harmony in the nature. Four orders of nature; existence as co-existence, harmony at all levels of
existence.
TEXT BOOK
1. Human Values and Professional Ethics by R R Gaur, R Sangal, G P Bagaria, Excel Books, New Delhi, 2010
REFERENCE BOOKS
Syllabus
COURSE OUTCOMES: On successful completion of the course, the student will be able to:
1. Develop new models to represent and interpret the data.
2. Apply knowledge of mathematics, probability & statistics, graph theory and logics.
3. Interpret statements presented in disjunctive normal form and determine their validity by applying the
rules and methods of propositional calculus.
4. Reformulate statements from common language to formal logic using the rules of propositional and
predicate calculus.
5. Apply graph theory in solving computing problems.
Unit 1- Set Theory: Introduction to set theory, set operations, Algebra of Sets, Combination of sets, Duality, Finite and
infinite sets, Classes of sets, Power sets, Multi sets, Cartesian Product, Representation of relations, Types of relation, Binary
relation, Equivalence relations and partitions, Mathematics Induction.
Function and its types: Composition of function and relations, Cardinality and inverse relations, Functions, logic and
proofs injective, surjective and bijective functions.
Unit 2- Propositional Calculus: Basic operations; AND(^), OR(v), NOT(~), True value of a compound statement,
propositions, tautologies, and contradictions. Partial ordering relations and lattices.
Lattice theory: Partial ordering, posets, lattices as posets, properties of lattices as algebraic systems, sublattices, and some
special lattices.
Unit 3-Combinations: The Basic of Counting, Pigeonhole Principles, Permutations and Combinations, Principle of
Inclusion and Exclusion.
Syllabus of B.TECH – Computer Science and Engineering PAGE 12
VEER MADHO SINGH BHANDARI UTTARAKHAND TECHNICAL UNIVERSITY, DEHRADUN
Syllabus
Recursion and Recurrence Relation: linear recurrence relation with constant coefficients, Homogeneous solutions,
Particular solutions, and Total solution of a recurrence relation using generating functions.
Unit 4- Algebraic Structures: Definition, elementary properties of Algebraic structures, examples of a Monoid,
sunmonoid, semigroup, groups and rings, Homomorphism, Isomorphism and automorphism, Subgroups and Normal
subgroups, Cyclic groups, Integral domain and fields, Rings, Division Ring.
Unit 5- Graphs and Trees: Introduction to graphs, Directed and undirected graphs, Homomorphic and Isomorphic graphs,
Subgraphs, cut points and bridges, Multigraph and Weighted graphs, Paths and circuits, Shortest path in a weighted graph,
Eulerian path and circuits, Hamilton paths and circuits, Planar graphs, Euler’s formula, Trees, Rooted trees, Spanning trees
and cut-sets, Binary trees and its traversals.
TEXTBOOKS:
1. Discrete and combinatorial mathematics-An applied introduction-5th edition- Ralph P. Grimaldi, Pearson
Education.
2. Discrete Mathematics for Computer Scientists & Mathematicians, J.L. Mott. A. Kandel, T.P. Baker, Prentice Hall.
REFERENCE BOOKS:
1. Discrete mathematical with graph theory, edgar G. Goodaire, 3rd Edition, Pearson Education.
2. Discrete Mathematics and its Applications, Kenneth H. Rosen, Fifth Edition. TMH.
3. Mathematical foundations of computer science-Dr S. Chandra sekharaiah-Prism books Prv. Lt.
4. Discrete mathematical structures Theory and applications-malik & Sen.
5. Logic and Discrete Mathematics, Grass Mann & Trembley, Person Education.
6. Discrete mathematical structures with applications to Comp. Science- J. P. Tremblay and R. Manohar,
Tata-McGraw-Hill publications.
7. Elements of DISCRETE MATHEMATICS – A computer-oriented Approach – C L Liu, D P Mohapatra.
Third Edition, Tata McGraw Hill
Syllabus
1. Introduce the fundamentals of Data Structures, Abstract concepts and how these concepts are useful in
problem-solving.
2. Analyze step by step and develop algorithms to solve real-world problems.
3. Implement various data structures, viz. Stacks, Queues, Linked Lists, Trees and Graphs.
4. Understand various searching & sorting techniques
Course Outcomes: On successful completion of the course, the student will be able to:
1. Compare functions using asymptotic analysis and describe the relative merits of worst-case, average-
case, and best-case analysis.
2. Become familiar with a variety of sorting algorithms and their performance characteristics (e.g., running
time, stability, space usage) and be able to choose the best one under a variety of requirements.
3. Understand and identify the performance characteristics of fundamental algorithms and data structures
and be able to trace their operations for problems such as sorting, searching, selection, operations on
numbers, and graphs.
4. Solve real-world problems using arrays, stacks, queues, and linked lists.
5. Become familiar with the major graph algorithms and their analyses. Employ graphs to model
engineering problems when appropriate.
Unit 1-Introduction: Basic Terminologies: Elementary Data Organizations, Data Structure Operations:
insertion, deletion, traversal etc.; Analysis of an Algorithm, Asymptotic Notations, Time-Space trade-off.
Searching: Linear Search and Binary Search Techniques and their complexity analysis.
Unit 2-Stacks and Queues: ADT Stack and its operations: Algorithms and their complexity analysis,
Applications of Stacks: Expression Conversion and evaluation – corresponding algorithms and complexity
analysis. ADT queue, Types of Queues: Simple Queue, Circular Queue, Priority Queue; Operations on each type
of Queues: Algorithms and their analysis.
Unit 3-Linked Lists: Singly linked lists: Representation in memory, Algorithms of several operations:
Traversing, Searching, Insertion into, Deletion from the linked list; Linked representation of Stack and Queue,
Header nodes, Doubly linked list: operations on it and algorithmic analysis; Circular Linked Lists: all operations
their algorithms and complexity analysis.
Syllabus
Unit 4-Trees and Graphs: Basic Tree Terminologies, Different types of Trees: Binary Tree, Threaded Binary
Tree, Binary Search Tree, AVL Tree; Tree operations on each of the trees and their algorithms with complexity
analysis. Applications of Binary Trees. B Tree, B+ Tree: definitions, algorithms and analysis.
Graphs: Basic Terminologies and Representations, Graph search and traversal algorithms and complexity
analysis.
Unit 5-Sorting and Hashing: Objective and properties of different sorting algorithms: Selection Sort,
Bubble Sort, Insertion Sort, Quick Sort, Merge Sort, Heap Sort; Performance and Comparison among all
the methods,
TEXTBOOKS:
1. An Introduction to Data Structures with Applications. by Jean-Paul Tremblay & Paul G. Sorenson
Publisher-Tata McGraw Hill.
2. Ritika Mehra, Data Structures Using C, Pearson Education.
3. Data Structures using C & C++ -By Ten Baum Publisher – Prentice-Hall International.
REFERENCE BOOKS:
1. Schaum’s Outlines Data structure Seymour Lipschutz Tata McGraw Hill 2nd Edition.
2. Fundamentals of Computer Algorithms by Horowitz, Sahni, Galgotia Pub. 2001 ed.
3. Fundamentals of Data Structures in C++-By Sartaj Sahani.
4. Data Structures: A Pseudo-code approach with C -By Gilberg&Forouzan Publisher-Thomson Learning.
Syllabus
COURSE OUTCOMES: On successful completion of the course, the student will be able to:
1. Recognize features of object-oriented design such as encapsulation, polymorphism, inheritance, and
composition of systems based on object identity.
2. Apply some common object-oriented design patterns.
3. Specify simple abstract data types and design implementations using abstraction functions to document
them.
4. Design a convenient way for the handling problems using templates and use simple try-catch blocks for
Exception Handling.
5. Manage I/O streams and File I/O oriented interactions.
Unit 1- Object Oriented Programming Concepts: Classes and Objects, Methods and Messages, Abstraction and
Encapsulation, Inheritance, Abstract Classes, Polymorphism. Introduction to C++: Classes and Objects, Structures and
Classes, Unions and Classes, Friend Functions, Friend Classes, Inline Functions, Static Class Members, Scope Resolution
Operator, Nested Classes, Local Classes, Passing Objects to Functions, Returning objects, object assignment. Arrays,
Pointers, References, and the Dynamic Allocation Operators: Arrays of Objects, Pointers to Objects, Type Checking, this
Pointer, Pointers to Derived Types, Pointers to Class Members, References, Dynamic Allocation Operators.
Unit 2- Function Overloading and Constructors: Function Overloading, Constructors, parameterized constructors, Copy
Constructors, Overloading Constructors, Finding the Address of an Overloaded Function, Default Function Arguments,
Function Overloading and Ambiguity. Operator overloading: Creating member Operator Function, Operator Overloading
Using Friend Function, Overloading New and Delete, Overloading Special Operators, Overloading Comma Operator.
Unit 3- Inheritance and Polymorphism: Inheritance: Base-Class Access Control, Inheritance and Protected Members,
Inheriting Muitiple Base Classes, Constructors, Destructors and Inheritance, Granting Access, Virtual Base Classes.
Polymorphism: Virtual Functions, Virtual Attribute and Inheritance, Virtual Functions and Hierarchy, Pure Virtual
Syllabus
Functions, Early vs. Late Binding, Run-Time Type ID and Casting Operators: RTTI, Casting Operators, Dynamic Cast.
Unit 4- Templates and Exception Handling: Templates: Generic Functions, Applying Generic Functions, Generic
Classes, The type name and export Keywords, Power of Templates, Exception Handling: Fundamentals, Handling Derived
Class Exceptions, Exception Handling Options, Understanding terminate() and unexpected(), uncaught_exception ()
Function, exception and bad_exception Classes, Applying Exception Handling.
Unit 5- I/O System Basics: Streams and Formatted 1/O. File I/O: File Classes, File Operations. Namespaces: Namespaces,
std Namespace. Standard Template Library: Overview, Container Classes, General Theory of Operation, Lists, string Class,
Final Thoughts on STL.
TEXTBOOKS:
1. Object Oriented Programming with C++ by E. Balagurusamy, McGraw-Hill Education (India).
2. ANSI and Turbo C++ by Ashoke N. Kamthane, Pearson Education
REFERENCE BOOKS:
1. Big C++ - Wiley India.
2. C++: The Complete Reference- Schildt, McGraw-Hill Education (India).
3. C++ and Object Oriented Programming – Jana, PHI Learning.
4. Object Oriented Programming with C++ - Rajiv Sahay, Oxford.
5. Mastering C++ - Venugopal, McGraw-Hill Education (India)
Syllabus
Course Outcomes: On successful completion of the course, the student will be able to:
1. Develop programs using dynamic memory allocation and linked list ADT.
2. Apply Stack and Queue to solve problems.
3. Implement the concept of hashing in real-time dictionaries.
4. Identify and implement suitable data structures for the given problem.
5. Solve real-world problems by finding the minimum spanning tree and the shortest path algorithm.
LIST OF EXPERIMENTS:
1. Write programs to implement the following using an array.
a) Stack ADT
b) Queue ADT
2. Write programs to implement the following using a singly linked list.
a) Stack ADT
b) Queue ADT
3. Write a program to implement the deque (double-ended queue) ADT using a doubly linked list.
4. Write a program to perform the following operations:
a) Insert an element into a binary search tree.
b) Delete an element from a binary search tree.
c) Search for a key element in a binary search tree.
5. Write a program to implement circular queue ADT using an array.
6. Write a program to implement all the functions of a dictionary (ADT) using hashing.
7. Write a program to perform the following operations on B-Trees and AVL-trees:
a) Insertion.
b) Deletion.
8. Write programs for implementing BFS and DFS for a given graph.
9. Write programs to implement the following to generate a minimum cost-spanning tree:
Syllabus
a) Prim’s algorithm.
b) Kruskal’s algorithm.
10. Write a program to solve the single source shortest path problem.
(Note: Use Dijkstra’s algorithm).
11. Write a program that uses non-recursive functions to traverse a binary tree in:
a) Pre-order.
b) In-order.
c) Post-order.
12. Write programs for sorting a given list of elements in ascending order using the following sorting methods:
a) Quick sort.
b) Merge sort.
Syllabus
COURSE OUTCOMES: On successful completion of the course, the student will be able to:
1. Design object-oriented programs with static members and friend functions using C++.
2. Implement C++ programs with operator overloading and type conversions.
3. Develop class templates for various data structures like stack, queue and linked list.
4. Create classes with necessary exception handling
5. Construct simple test applications using polymorphism.
LIST OF EXPERIMENTS
1. Design C++ classes with static members, methods with default arguments, and friend functions. (For
example, design matrix and vector classes with static allocation, and a friend function to do matrix-vector
multiplication).
2. Implement Matrix class with dynamic memory allocation and necessary methods. Give proper
constructor, destructor, copy constructor, and overloading of the assignment operator.
3. Implement complex number class with necessary operator overloading and type conversions such as
integer to complex, double to complex, complex to double etc.
4. Overload the new and delete operators to provide a custom dynamic allocation of memory.
5. Develop C++ class hierarchy for various types of inheritances.
6. Design a simple test application to demonstrate dynamic polymorphism and RTTI.
7. Develop a template of the linked-list class and its methods.
8. Develop templates of standard sorting algorithms such as bubble sort, insertion sort and quick sort.
9. Design stack and queue classes with necessary exception handling.
Syllabus
10. Write a C++ program that randomly generates complex numbers (use previously designed Complex
class) and write them two per line in a file along with an operator (+, -, *, or /). The numbers are written
to file in the format (a + ib). Write another program to read one line at a time from this file, perform the
Syllabus
COURSE OUTCOMES: On successful completion of the course, the student will be able to:
1. Demonstrate the basic concepts of python programming with the help of data types, operators and
expressions, and console input/output.
2. Apply the concept of Control Structures in Python to solve any given problem.
3. Demonstrate operations on built-in container data types (list, tuple, set, dictionary) and strings.
4. Ability to explore python, especially the object-oriented concepts and the built-in objects of Python.
5. Implement the concepts of file handling using packages.
LIST OF PROGRAMS:
Exercise 1 - Basics
a) Running instructions in Interactive interpreter and a Python Script
b) Write a program to purposefully raise Indentation Error and Correct it
Exercise 2 - Operations
a) Write a program to compute distance between two points taking input from the user (Pythagorean Theorem)
b) Write a program add.py that takes 2 numbers as command line arguments and prints its sum.
Exercise - 3 Control Flow
a) Write a Program for checking whether the given number is a even number or not.
b) Using a for loop, write a program that prints out the decimal equivalents of 1/2, 1/3, 1/4, . . . ,1/10
c) Write a program using a for loop that loops over a sequence.
d) Write a program using a while loop that asks the user for a number, and prints a countdown from that number to zero.
Syllabus
Syllabus
COURSE OUTCOMES: On successful completion of the course, the student will be able to:
1. Understand organizational issues and their impact on the organization and employees.
2. Identify industrial problems and suggest possible solutions.
3. Relate, apply and adapt relevant knowledge, concepts and theories within an industrial organization,
practice and ethics.
4. Apply technical knowledge in an industry to solve real world problems.
5. Demonstrate effective group communication, presentation, self-management, and report writing skills.
Syllabus
Course Outcomes: On successful completion of the course, the student will be able to:
1. Develop essential programming skills in computer programming concepts like data types.
2. Examine Python syntax and semantics and be fluent in the use of Python flow control and functions.
3. Illustrate the process of structuring the data using lists, tuples, and dictionaries.
4. Demonstrate using built-in functions and operations to navigate the file system.
5. Interpret the concepts of modules and user-defined functions in Python.
UNIT – I: Introduction and Syntax of Python Program: Features of Python, Interactive, Object-oriented, Interpreted,
platform-independent, Python building blocks -Identifiers, Keywords, Indention, Variables, Comments, Python
environment setup – Installation and working of IDE, Running Simple Python scripts to display a welcome message, Python
variables.
Python Data Types: Numbers, String, Tuples, Lists, Dictionary. Declaration and use of datatypes, Built-in Functions.
UNIT – II: Python Operators and Control Flow statements: Basic Operators: Arithmetic, Comparison/ Relational,
Assignment, Logical, Bitwise, Membership, Identity operators, Python Operator Precedence.
Control Flow: Conditional Statements (if, if...else, nested if), Looping in python (while loop, for loop, nested loops), loop
manipulation using continue, pass, break, else.
UNIT – III: Data Structures in Python: String: Concept, escape characters, String special operations, String formatting
operator, Single quotes, Double quotes, Triple quotes, Raw String, Unicode strings, Built-in String methods.
Lists: Defining lists, accessing values in lists, deleting values in lists, updating lists, Basic List Operations, and Built-in List
functions.
Tuples: Accessing values in Tuples, deleting values in Tuples, and updating Tuples, Basic Tuple operations, and Built-in
Tuple functions.
Sets: Accessing values in Set, deleting values in Set, and updating Sets, Basic Set operations, Built-in Set functions.
Syllabus
Dictionaries: Accessing values in Dictionary, deleting values in Dictionary, and updating Dictionary, Basic Dictionary
operations, Built-in Dictionaries functions.
UNIT – IV: Python Functions, modules, and Packages: Use of Python built-in functions (e.g., type/data conversion
functions, math functions etc.),
user-defined functions: Function definition, Function call, function arguments and parameter passing, Return statement,
Scope of Variables: Global variable and Local Variable.
Modules: Writing modules, importing modules, importing objects from modules, Python built-in modules (e.g., Numeric,
mathematical module, Functional Programming Module), Packages.
UNIT – V: File Handling: Opening files in different modes, accessing file contents using standard library functions,
Reading, and writing files, closing a file, Renaming, and deleting files, File related standard functions.
TEXTBOOKS:
1. Charles R. Severance, “Python for Everybody: Exploring Data Using Python 3”, 1st Edition, CreateSpace
Independent Publishing Platform, 2016.
2. Allen B. Downey, "Think Python: How to Think Like a Computer Scientist”, 2 nd Edition, Green Tea Press, 2015.
3. Ch Satyanarayana, “Python Programming”, 1st Edition, universities press (India) private limited 2018.
REFERENCE BOOKS:
1. Charles Dierbach, "Introduction to Computer Science Using Python", 1st Edition, Wiley India Pvt Ltd.
ISBN-13: 978-8126556014
2. Mark Lutz, “Programming Python”, 4th Edition, O’Reilly Media, 2011.ISBN-13: 978-9350232873
3. Wesley J Chun, “Core Python Applications Programming”, 3rd edition, Pearson Education India, 2015.
ISBN-13: 978-9332555365
4. Roberto Tamassia, Michael H Goldwasser, Michael T Goodrich, “Data Structures and Algorithms in
Python”,1stEdition, Wiley India Pvt Ltd, 2016. ISBN-13: 978- 8126562176
5. Reema Thareja, “Python Programming using problem-solving approach”, Oxford university press,
2017.
Syllabus
Course Outcomes: On successful completion of the course, the student will be able to:
1. Understand cyber-attacks and types of cybercrimes, and familiarity with cyber forensics
2. Realize the importance of cyber security and various forms of cyber-attacks and countermeasures.
3. Get familiar with obscenity and pornography in cyberspace and understand the violation of the Right to
privacy on the Internet.
4. Appraise cyber laws and how to protect themselves and, ultimately, the entire Internet community from
such attacks.
5. Elucidate the various chapters of the IT Act 2008 power of the Central and State Governments to make
rules under IT Act 2008.
UNIT – I: Introduction to Cyber Security: Basic Cyber Security Concepts, layers of security, Vulnerability,
threat, Harmful acts, the motive of attackers, active attacks, passive attacks, Software attacks, hardware attacks,
Spectrum of attacks, Taxonomy of various attacks, IP spoofing, Methods of defense, Security Models, risk
management, Cyber Threats-Cyber Warfare, Cyber Crime, Cyber terrorism, Cyber Espionage, etc., CIA Triad
UNIT – II: Cyber Forensics: Introduction to cyber forensic, Historical background of Cyber forensics, Digital
Forensics Science, The Need for Computer Forensics, Cyber Forensics and Digital evidence, Forensics Analysis
of Email, Digital Forensics Lifecycle, Forensics Investigation, Challenges in Computer Forensics, Special
Techniques for Forensics Auditing.
UNIT – III: Cybercrime (Mobile and Wireless Devices): Introduction, Proliferation of Mobile and Wireless
Devices, Trends in Mobility, Credit card Frauds in Mobile and Wireless Computing Era, Security Challenges
Posed by Mobile Devices, Registry Settings for Mobile Devices, Authentication service Security, Attacks on
Mobile/Cell Phones, Mobile Devices: Security Implications for Organizations, Organizational Measures for
Syllabus
Handling Mobile, Organizational Security Policies and Measures in Mobile Computing Era, Laptops and
desktop.
UNIT – IV: Cyber Security (Organizational Implications): Introduction cost of cybercrimes and IPR issues,
web threats for organizations, security and privacy implications, social media marketing: security risks and perils
for organizations, social computing, and the associated challenges for organizations.
Cybercrime and Cyber terrorism: Introduction, intellectual property in cyberspace, the ethical dimension of
cybercrimes, the psychology, mindset and skills of hackers and other cybercriminals.
UNIT – V: Cyberspace and the Law &Miscellaneous provisions of IT Act.: Introduction to Cyber Security
Regulations, International Law. The INDIAN Cyberspace, National Cyber Security Policy. Internet Governance
– Challenges and Constraints, Computer Criminals, Assets and Threats. Other offences under the Information
Technology Act in India, The role of Electronic Evidence and miscellaneous provisions of the IT Act.2008.
TEXTBOOKS:
1. Nina Godbole and SunitBelpure, Cyber Security Understanding Cyber Crimes, Computer Forensics and
Legal Perspectives, Wiley.
2. B. B. Gupta, D. P. Agrawal, Haoxiang Wang, Computer and Cyber Security: Principles, Algorithm,
Applications, and Perspectives, CRC Press, ISBN 9780815371335, 2018.
REFERENCE BOOKS:
1. Cyber Security Essentials, James Graham, Richard Howard and Ryan Otson, CRC Press.
2. Introduction to Cyber Security, Chwan-Hwa(john) Wu,J. David Irwin, CRC Press T&F Group.
3. Debby Russell and Sr. G.T Gangemi, "Computer Security Basics (Paperback)”, 2ndEdition, O’ Reilly
Media, 2006.
4. Wenbo Mao, “Modern Cryptography – Theory and Practice”, Pearson Education, New Delhi, 2006.
5. Cyberspace and Cybersecurity, George Kostopoulos, Auerbach Publications, 2012.
6. Cyber Forensics: A Field Manual for Collecting, Examining, and Preserving Evidence of Computer
Crimes, Second Edition, Albert Marcella, Jr., Doug Menendez, Auerbach Publications, 2007.
7. Cyber Laws and IT Protection, Harish Chander, PHI, 2013.
Syllabus
COURSE OUTCOMES: On successful completion of the course, the student will be able to:
1. Draw the functional block diagram of a single bus architecture of a computer and describe the function
of the instruction execution cycle, RTL interpretation of instructions.
2. Given a CPU organization and instruction, design a memory module and analyze its operation by
interfacing with the CPU.
3. Design the connection between I/O address from the CPU and the I/O interface.
4. Understand the concept of Pipelining and multiprocessor.
5. Draw a flowchart for concurrent access to memory and cache coherency in parallel processors.
Unit 1- Functional Blocks of a Computer: CPU, Memory, Input-Output Subsystems, Control Unit. Instruction Set
Architecture of a CPU – Registers, Instruction Execution Cycle, RTL Representation and Interpretation of Instructions,
Addressing Modes, Instruction Set. Case Study – Instruction Sets of Some Common CPUs, RISC and CISC Architecture.
Unit 2- Basic Processing Unit: Signed Number Representation, Fixed Point Arithmetic, Addition and Subtraction of
Signed Numbers, Multiplication of Positive Numbers, Signed Operand Multiplication Algorithm, Booth Multiplication
Algorithm, division algorithm, floating point numbers and its arithmetic operation. Fundamental Concepts: Execution of a
Complete Instruction, Multiple Bus Organization, Hardwired Control, Micro Programmed Control.
Unit 3- Peripheral Devices and their Characteristics: Input-Output Subsystems, I/O Device Interface, I/O Transfers–
Program Controlled, Interrupt Driven and DMA, Software Interrupts and Exceptions, Programs and Processes – Role of
Interrupts in Process State Transitions, I/O Device Interfaces – SCII, USB.
Unit 4- Pipelining& Multiprocessor: Basic Concepts of Pipelining, Throughput and Speedup, Instruction Pipeline,
Pipeline Hazards, Introduction to Parallel Processors, Symmetric Shared Memory and Distributed Shared Memory
Multiprocessors, Performance Issues of Symmetric and Distributed Shared Memory, Synchronization.
Syllabus
Unit 5- Memory Organization: Basic Concepts, Concept of Hierarchical Memory Organization, Main Memory: RAM,
ROM, Speed, Size and cost, Cache Memory and its Mapping, Replacement Algorithms, Write Policies, Virtual Memory,
Memory Management Requirements, Associative Memory, Secondary storage devices.
TEXTBOOKS:
1. William Stallings, Computer Organization and architecture, 11th edition (2022), Pearson Education.
2. David A. Patterson and John L. Hennessy “Computer Organization and Design: The Hardware/Software
Interface” , 5th Edition, Elsevier.
3. M. Morris Mano, “Computer System Architecture”, Third Edition, Pearson Education.
REFERENCE BOOKS:
1. Microprocessor Architecture, Programming, and Applications with the 8085 -Ramesh S. Gaonkar Pub:
Penram International.
2. CarlHamacher“ Computer Organization and EmbeddedSystems”, 6th Edition, McGraw Hill
HigherEducation.
3. Miles Murdoccaa and Vincent Heuring“Computer Architecture and Organization: An integrated
Approach” 2ndedition,Wiley Publication.
Syllabus
COURSE OUTCOMES: On successful completion of the course, the student will be able to:
1. Write Java programs with properly designed constants, variables, objects, methods and reusability
functionality
2. Learn how and where to implement interface and exception-handling concepts.
3. Write multi-threaded programming concepts for concurrency control based applications.
4. Construct GUI based JAVA enterprise applications
5. Develop web applications using JDBC, RMI and Servlet methodologies.
Unit 1- Java Basics and Inheritance: The Genesis of Java, Overview of Java, Data Types, Variables, and Arrays,
Operators, Control Statements, Introducing Classes, Methods and Classes,Type Casting, String Handling, Abstract Class,
Method overriding.
Inheritance: Basics, Using Super, Creating a Multilevel Hierarchy, Problem with Multiple Inheritance.
Unit 2- Packages, Interfaces and Exception Handling: Packages- Packages, Access Protection, Importing Packages,
Exception Handling- Types, Try and Catch, Throw and Finally statements.
Unit 3- Multi Threading and File Handling: Multithreaded Programming, Thread Life Cycle Creating Threads, Creating
Multiple Threads, Thread Priorities, Synchronization, Inter Thread Communication, Suspending, Resuming and Stopping
Threads.
File Handling: I/O Basics, Reading Console Input, Writing Console output, I/ O Classes and Interfaces.
Syllabus
Unit 4- Applets, Event Handling and AWT: Applet Basics, Applet Architecture, Applet Display Methods, Passing
parameters to Applets,
Event Handling: Delegation Event Model, Event Classes, Event Listener Interfaces,
AWT: Working with Windows, Graphics, Colors and Fonts, Using AWT Controls, Layout Managers and Menus.
Unit 5- JDBC, RMI And Servlets: JDBC-JDBC Architecture, The Structured Query Language, JDBC Configuration,
Executing SQL, RMI Architecture, A simple client/server application using RMI, Servlets- Life cycle of a Servlet, Servlet
packages ,Handling HTTP Requests and Responses.
TEXTBOOKS:
1. Herbert Schildt, ―Java The complete reference, 8th Edition, McGraw Hill Education, 2011.
2. Cay S. Horstmann, Gary cornell, ―Core Java Volume –I Fundamentals, 9th Edition, Prentice Hall, 2013.
REFERENCES:
1. Paul Deitel, Harvey Deitel, ―Java SE 8 for programmers, 3rd Edition, Pearson, 2015.
2. Steven Holzner, ―Java 2 Black book, Dreamtech press, 2011.
3. Timothy Budd, ―Understanding Object-oriented programming with Java, Updated Edition, Pearson
Education, 2000.
Syllabus
COURSE OUTCOMES: On successful completion of the course, the student will be able to:
1. Apply the knowledge of automata theory, grammars & regular expressions for solving the problem.
2. Analyze the give automata, regular expression & grammar to know the language it represents.
3. Design Automata & Grammar for pattern recognition and syntax checking.
4. Distinguish between decidability and un-decidability of problems.
5. Identify limitations of some computational models and possible methods of proving them.
Unit 1- Introduction: Alphabets, Strings and Languages; Automata and Grammars, Deterministic finite Automata (DFA)-
Formal Definition, Simplified notation: State transition graph, Transition table, Language of DFA, Nondeterministic finite
Automata (NFA), NFA with epsilon transition, Language of NFA, Equivalence of NFA and DFA, Minimization of Finite
Automata, Distinguishing one string from other, Myhill-Nerode Theorem
Unit 2- Regular Expressions: Definition, Operators of regular expression and their precedence, Algebraic laws for Regular
expressions, Kleen’s Theorem, Regular expression to FA, DFA to Regular expression, Arden Theorem, Non Regular
Languages, Pumping Lemma for regular Languages. Application of Pumping Lemma, Closure properties of Regular
Languages, Decision properties of Regular Languages, FA with output: Moore and Mealy machine, Equivalence of Moore
and Mealy Machine, Applications and Limitation of FA.
Unit 3- Context-free languages and pushdown automata: Context-free grammars (CFG) and languages (CFL),
Chomsky and Greibach normal forms, nondeterministic pushdown automata (PDA) and equivalence with CFG, parse
trees, ambiguity in CFG, pumping lemma for context-free languages, deterministic pushdown automata, closure properties
of CFLs.
Unit 4- Context-sensitive languages: Context-sensitive grammars (CSG) and languages, linear bounded automata and
equivalence with CSG. Turing machines: The basic model for Turing machines (TM), Turing- recognizable (recursively
enumerable) and Turing-decidable (recursive) languages and their closure properties, variants of Turing machines,
nondeterministic TMs and equivalence with deterministic TMs, unrestricted grammars and equivalence with Turing
machines, TMs as enumerators.
Syllabus
TEXTBOOKS:
1. Introduction to Automata Theory, Languages, and Computation, 3nd Edition, John E. Hopcroft, Rajeev
Motwani, Jeffrey D. Ullman, Pearson Education.
2. Theory of Computer Science – Automata languages and computation, Mishra and Chandrashekaran, 2nd
edition, PHI.
REFERENCE BOOKS:
1. Introduction to Languages and The Theory of Computation, John C Martin, TMH.
2. Introduction to Computer Theory, Daniel I.A. Cohen, John Wiley.
3. A Textbook on Automata Theory, P. K. Srimani, Nasir S. F. B, Cambridge University Press.
4. Introduction to the Theory of Computation, Michael Sipser, 3rd edition, Cengage Learning.
5. Introduction to Formal languages Automata Theory and Computation Kamala Krithivasan, Rama R,
Pearson.
Syllabus
COURSE OUTCOMES: On successful completion of the course, the student will be able to:
LIST OF EXPERIMENTS
Syllabus
LIST OF EXPERIMENTS
1. Develop a java program to find the sum of odd and even numbers in an array.
2. Develop a java program to print the prime numbers between n1 to n2 using class, objects and methods.
3. Develop a program for calculating the age of a person and display the age in the form of years, months and
days.
4. Demonstrate a program for method overloading. Consider the different types of transaction modes used for
transferring money. (Credit card, Debit card, Net banking etc).
5. Create a Abstract class and calculate the area of different shapes by overriding methods.
6. Develop a Library application using multiple inheritances. Consider Book, Magazines and Journals as base
classes and Library as derived class. In the Book class, perform the operations like Search Book, Issue Book,
Return Book, Renew Book, and Fine Calculation. In the Magazines and Journals classes, perform issue and
return operations.
7. Develop a program for banking application with exception handling. Handle the exceptions in following
cases:
a) Account balance <1000
b) Withdrawal amount is greater than balance amount
c) Transaction count exceeds 3
d) One day transaction exceeds 1 lakh.
8. Create a student database and store the details of the students in a table. Perform the SELECT, INSERT,
UPDATE and DELETE operations using JDBC connectivity.
Syllabus
9. Design a login page using servlets and validate the username and password by comparing the details stored
in the database.
10. Mini project (Anyone)
(Front End: Java, Back End: Oracle, define classes for the application and assign responsibilities)
a) Central Library OPAC Engine
b) ATM Banking
c) Online Shopping
d) E-Ticketing System
e) Student Information Management System
f) City Info Browser
g) E-mail Server
Syllabus
COURSE OUTCOMES: On successful completion of the course, the student will be able to:
2. Demonstrate the basic knowledge of Linux commands and file-handling utilities by using a Linux shell
environment.
3. Evaluate the concept of shell scripting programs by using AWK and SED commands.
4. Use tracing mechanisms for debugging.
5. Compile source code into an object and executable modules.
6. Use advanced network tools.
LIST OF EXPERIMENTS
1. Study of Unix/Linux general purpose utility command list (man, who, cat, cd, cp, ps, ls, mv, rm, mkdir,
rmdir, echo, more, date, time, kill, history, chmod, chown, finger, pwd, cal, logout, shutdown etc.), vi
editor, .bashrc, /etc/bashrc and environment variables.
2. Write a shell script program to: a) display list of user currently logged in; b) to copy contents of one file
to another.
3. Write a program using sed command to print duplicated lines of Input.
4. Write a grep/egrep script to find the number of words character, words and lines in a file.
5. Write an awk script to: a). develop a Fibonacci series; b) display the pattern of given string or number.
6. Write a shell script program to a) display the process attributes; b) change priority of processes; c)
change the ownership of processes; d)to send back a process from foreground ; e) to retrieve a process
from background ; f) create a Zombie process
7. Write a program to create a child process and allow the parent to display “parent” and the child to
display “child” on the screen
8. Write a makefile to compile a C program.
9. Study to execute programs using gdb to utilize its various features like breakpoints, conditional
breakpoints. Also write a shell script program to include verbose and xtrace debug option for
debugging.
Syllabus
10. Study to use ssh, telnet, putty, ftp, ncftp and other network tools.
SYLLABUS
For
B.TECH
(Computer Science and Engineering)
3RD Year
SEMESTER-V
Evaluation Scheme
Subject
Subject Periods Sessional
S. NO. ESE Total Credit
Codes Category Subject Exam
L T P CT TA Total TE PE
Design and Analysis of
1 CST-010 DC 3 1 0 30 20 50 100 150 4
Algorithms
2 CST-011 DC Database Management System 3 1 0 30 20 50 100 150 4
3 CST-012 DC Compiler Design 3 1 0 30 20 50 100 150 4
Abbreviations: L-No. of Lecture hours per week, T-No. of Tutorial hours per week, P-No. of Practical hours per
week, CT-Class Test Marks, TA-Marks of teacher’s assessment including student’s class performance and
attendance, PS-Practical Sessional Marks, ESE-End Semester Examination, TE- Theory Examination Marks, PE-
Practical External Examination Marks
Minor Courses (Optional) **: Select any subject from Annexure – II from other departments
SEMESTER-VI
Evaluation Scheme
Subject
Subject Periods Sessional
S. NO. ESE Total Credit
Codes Category Subject Exam
L T P CT TA Total TE PE
Departmental Elective-3
S. No. Subject Code Subject Name
1 CST-024 Internet of Things
2 CST-025 Quantum Computing
3 CST-026 Augmented Reality
4 CST-027 Web Technology
5 CST-028 Reliable Computing
Open Elective-1
Subject
S. No. Subject Name
Code
1 AHT-011 Total Quality Management
Managing E-Commerce and Digital
2 AHT-012
Communication
3 AHT-013 Industrial safety and Hazard Management
Abbreviations: L-No. of Lecture hours per week, T-No. of Tutorial hours per week, P-No. of Practical hours per
week, CT-Class Test Marks, TA-Marks of teacher’s assessment including student’s class performance and
attendance, PS-Practical Sessional Marks, ESE-End Semester Examination, TE- Theory Examination Marks, PE-
Practical External Examination Marks
Minor Courses (Optional) **: Select any subject from Annexure – II from other departments
1 Hr Lecture 1 Hr Tutorial 2 or 3 Hr Practical
1 Credit 1 Credit 1 Credit
COURSE OUTCOMES: On successful completion of the course, the student will be able to:
1. Analyze worst-case running times of algorithms based on asymptotic analysis and justify the
correctness of algorithms.
2. Describe the greedy paradigm and explain when an algorithmic design situation calls for it.
For a given problem develop the greedy algorithms.
3. Describe the divide-and-conquer paradigm and explain when an algorithmic design situation
calls for it. Synthesize divide-and-conquer algorithms. Derive and solve recurrence relation.
4. Describe the dynamic-programming paradigm and explain when an algorithmic design
situation calls for it.
5. Analyze randomized algorithms and approximation algorithms.
Analysis of recursive algorithms through recurrence relations: Substitution method, Recursion tree method
and master’s theorem.
Unit 2- Fundamental Algorithmic Strategies: Brute-Force, Greedy, Dynamic Programming, Branch- and-
Bound and Back tracking methodologies for the design of an algorithms, Illustrations of these techniques for
Problem-Solving, Knapsack, Matrix Chain Multiplication, Activity selection and LCS Problem.
Unit 3- Graph and Tree Algorithms: Traversal algorithms: Depth First Search (DFS) and Breadth First
Search (BFS), Shortest path algorithms, Minimum Spanning Tree, Topological sorting, Network Flow
Algorithm, Binomial Heap and Fibonacci Heap.
Unit 4- Tractable and Intractable Problems: Computability of Algorithms, Computability classes – P, NP,
NP-complete and NP-hard, Standard NP-complete problems and Reduction techniques.
Unit 5- Advanced Topics: Approximation algorithms and Randomized algorithms, Distributed Hash Table
TEXTBOOKS:
1. Thomas H Cormen, Charles E Lieserson, Ronald L Rivest and Clifford Stein, Introduction to
Algorithms, 4TH Edition, MITPress/McGraw-Hill.
2. Ellis Horowitz, Sartaj Sahni and SanguthevarRajasekaran, Computer Algorithms/ C++, Second Edition,
Universities Press, 2007.
REFERENCE BOOKS:
1. Jon Kleinberg and ÉvaTardos,Algorithm Design, 1ST Edition, Pearson.
2. Michael T Goodrich and Roberto Tamassia,Algorithm Design: Foundations, Analysis, and Internet
Examples, Second EditionWiley.
3. Anany Levitin, ―Introduction to the Design and Analysis of Algorithms, Third Edition, Pearson
Education, 2012.
COURSE OUTCOMES: On successful completion of the course, the student will be able to:
1. Write relational algebra expressions for that query and optimize the developed expressions.
2. Design the databases using E-R method and normalization.
3. Understand the concepts of function dependencies and various normal forms.
4. Understand the concept of transaction atomicity, consistency, isolation, and durability properties in
context of real life examples.
5. Develop the understanding of query processing and advanced databases.
.
Database models: Entity-relationship model, network model, relational and object oriented data models,
integrity constraints, data manipulation operations.
Unit 2-Relational Model: Structure of relational database, Relational Algebra: Fundamental operations,
Additional Operations, Extended Relational-Algebra operations, Tuple Relational Calculus – Domain Relational
Calculus. SQL: Basic structure, Set operations, Aggregate functions, Null Values, Nested subqueries, Views,
Data Definition Language, Embedded SQL, Dynamic SQL, Domain Constraints, Referential Integrity and
Triggers.
Unit 3-Relational database design: Functional Dependencies, First, Second, Third Normal Forms, Closure,
Armstrong’s Axioms, Canonical cover, Decomposition, Properties of Decomposition, Dependency Preservation,
Boyce-Codd Normal Form, Fourth Normal Form, Fifth Normal Form.
Unit 4-Transaction processing: Transaction Concepts, ACID Properties, Two-Phase Commit, Save Points,
Concurrency Control techniques: Locking Protocols, Two Phase Locking, timestamp-based protocol, Multi-
version and optimistic Concurrency Control schemes, Database recovery.
Unit 5-Storage Structure, Query Processing and Advanced database: Storage structures: RAID. File
Organization: Organization of Records, Indexing, Ordered Indices, B+ tree Index Files, B tree Index Files.
Advanced Database: Object-oriented and object-relational databases, logical databases, web databases,
distributed databases, data warehousing and data mining.
TEXTBOOKS:
1. Abraham Silberschatz, Henry F. Korth, S. Sudharshan, ―Database System Concepts, Sixth Edition,
Tata McGraw Hill, 2011.
2. RamezElmasri, Shamkant B. Navathe, ―Fundamentals of Database Systems, Sixth Edition, Pearson
Education, 2011.
REFERENCE BOOK:
1. C.J.Date, A.Kannan, S.Swamynathan, ―An Introduction to Database Systems, Eighth Edition,
Pearson Education, 2006.
2. Raghu Ramakrishnan, ―Database Management Systems, Fourth Edition, McGraw-Hill College
Publications, 2015.
3. G.K.Gupta,"Database Management Systems, Tata McGraw Hill, 2011.
OUTCOMES: On successful completion of the course, the student will be able to:
UNIT - I
INTRODUCTION TO COMPILERS: Structure of a compiler – Lexical Analysis – Role of Lexical Analyzer
– Input Buffering – Specification of Tokens – Recognition of Tokens – Lex – Finite Automata – Regular
Expressions to Automata – Minimizing DFA.
UNIT- II
SYNTAX ANALYSIS: Role of Parser – Grammars – Error Handling – Context-free grammars – Writing a
grammar – Top Down Parsing - General Strategies, Recursive Descent Parser, Predictive Parser-LL(1) Parser-
Shift Reduce Parser-LR Parser-LR (0)Item Construction of SLR Parsing Table - Introduction to LALR Parser -
Error Handling and Recovery in Syntax Analyzer-YACC.
UNIT- III
SYNTAX-DIRECTED TRANSLATION: Syntax-Directed Definitions, Evaluation Orders for SDD's,
Applications of Syntax-Directed Translation, Syntax-Directed Translation Schemes, Implementing L-Attributed
SDD's.
UNIT- IV
RUN-TIME ENVIRONMENTS: Stack Allocation of Space, Access to Nonlocal Data on the Stack, Heap
Management, Introduction to Garbage Collection, Introduction to Trace-Based Collection.
CODE GENERATION: Issues in the Design of a Code Generator, The Target Language, addresses in the
Target Code, Basic Blocks and Flow Graphs, Optimization of Basic Blocks, A Simple Code Generator,
Peephole Optimization, Register Allocation and Assignment, Dynamic Programming Code-Generation.
UNIT- V
MACHINE-INDEPENDENT OPTIMIZATION: The Principal Sources of Optimization, Introduction to
Data-Flow Analysis, Foundations of Data-Flow Analysis, Constant Propagation, Partial-Redundancy
Elimination, Loops in Flow Graphs, peep-hole optimization.
TEXTBOOKS:
1. Compilers Principles, Techniques and Tools, Alfred V. Aho, Ravi Sethi, Jeffrey D. Ullman, PEA.
2. Introduction to Automata Theory Languages & Computation, 3rd Edition, Hopcroft, Ullman, PEA
REFERENCE BOOKS:
1. Theory of Computer Science, Automata Languages and Computation, 2nd Edition, Mishra, Chandra
Shekaran, PHI.
2. Elements of Compiler Design, A.Meduna, Auerbach Publications, Taylor and Francis Group.
COURSE OUTCOMES: On successful completion of the course, the student will be able to:
UNIT I: INTRODUCTION: Introduction to Graphs, Basic definition – Application of graphs – finite, infinite
and bipartite graphs – Incidence and Degree – Isolated vertex, pendant vertex and Null graph. Paths and circuits
– Isomorphism, sub graphs, walks, paths and circuits, connected graphs, disconnected graphs and components.
UNIT II: EULERIAN AND HAMILTONIAN GRAPHS : Euler graphs, Operations on graphs, Hamiltonian
paths and circuits, Travelling salesman problem. Directed graphs – types of digraphs, Digraphs and binary
relation, Directed paths and connectedness – Euler graphs.
UNIT III TREES AND GRAPH ALGORITHMS : Trees – properties, pendant vertex, Distance and centres
in a tree - Rooted and binary trees, counting trees, spanning trees, Prim’s algorithm and Kruskal’s algorithm,
Dijkstra’s shortest path algorithm, Floyd-Warshall shortest path algorithm.
UNIT IV CONNECTIVITY AND PLANAR GRAPHS : Vertex Connectivity, Edge Connectivity, Cut set
and Cut Vertices, Fundamental circuits, Planar graphs, Kuratowski’s theorem (proof not required), Different
representations of planar graphs, Euler's theorem, Geometric dual.
TEXTBOOKS:
1. Narsingh Deo, "Graph Theory with Application to Engineering and Computer Science", Prentice-Hall
of India Pvt.Ltd, 2003.
2. L.R.Foulds, "Graph Theory Applications", Springer ,2016.
REFERENCES:
1. Bondy, J. A. and Murty, U.S.R., "Graph Theory with Applications", North Holland Publication,2008.
2. West, D. B., ―Introduction to Graph Theory, Pearson Education, 2011.
3. John Clark, Derek Allan Holton, ―A First Look at Graph Theory, World Scientific Publishing
Company, 1991.
4. Diestel, R, "Graph Theory", Springer,3rd Edition,2006. Kenneth H.Rosen, "Discrete Mathematics and
Its Applications", Mc Graw Hill , 2007.
COURSE OUTCOME: On successful completion of the course, the student will be able to:
Unit 1- Introduction to computer graphics & graphics systems: Overview of computer graphics,
representing pictures, preparing, presenting & interacting with pictures for presentations, Visualization & image
processing, RGB color model, direct coding, lookup table, storage tube graphics display, Raster scan display,
3D viewing devices, Plotters, printers, digitizers, Light pens etc., Active & Passive graphics devices, Computer
graphics software.
Unit 2- Points & lines: Line drawing algorithms; DDA algorithm, Bresenhan’s line algorithm, Circle
generation algorithm; Ellipse generating algorithm; scan line polygon, fill algorithm, boundary fill algorithm,
flood fill algorithm.
Unit 3- 2D transformation & viewing Basic transformations: Translation, rotation, scaling, Matrix
representations & homogeneous coordinates, transformations between coordinate systems, reflection shear,
Transformation of points, lines, parallel lines, intersecting lines. Viewing pipeline, Window to viewport co-
ordinate transformation , clipping operations , point clipping , line clipping, clipping circles, polygons & ellipse.
Unit 4- 3D transformations: Translation, rotation, scaling & other transformations. Rotation about an arbitrary
axis in space, reflection through an arbitrary plane, general parallel projection transformation, clipping, viewport
clipping, 3D viewing.
Unit 5- Curves representation: Surfaces, designs, Bezier curves, B-spline curves, end conditions for periodic
B-spline curves, rational B-spline curves. Hidden surfaces Depth comparison, Z-buffer algorithm, Back face
detection, BSP tree method, the Printer’s algorithm, scan-line algorithm; Hidden line elimination, wire frame
methods, fractal - geometry.
Color & shading models Light & color model, interpolative shading model and Texture
TEXTBOOKS:
1. Donald Hearn and Pauline Baker M, ―Computer Graphics, Prentice Hall, New Delhi, 2007.
2. Andleigh, P. K and Kiran Thakrar, ―Multimedia Systems and Design, PHI, 2003.
REFERENCES:
1. Judith Jeffcoate, ―Multimedia in practice: Technology and Applications, PHI, 1998.
2. Foley, Vandam, Feiner and Hughes, ―Computer Graphics: Principles and Practice, 2nd
Edition, Pearson Education, 2003.
3. Jeffrey McConnell, ―Computer Graphics: Theory into Practice, Jones and Bartlett Publishers,2006.
4. Hill F S Jr., "Computer Graphics", Maxwell Macmillan , 1990.
5. Peter Shirley, Michael Ashikhmin, Michael Gleicher, Stephen R Marschner, Erik Reinhard,
KelvinSung, and AK Peters, ―Fundamentals of Computer Graphics, CRC Press, 2010.
6. William M. Newman and Robert F.Sproull, ―Principles of Interactive Computer Graphics, Mc Graw
Hill 1978.
COURSE OUTCOMES: On successful completion of the course, the student will be able to
Unit 2- Software Requirement Analysis: Structured analysis, object-oriented analysis, software requirement
specification, and validation.
Unit 3- Design and Implementation of Software: software design fundamentals, design methodology
(structured design and object-oriented design), design verification, monitoring and control coding.
Unit 4- Testing:Testing fundamentals, white box and black box testing, software testing strategies: unit testing,
integration testing, validation testing, system testing, debugging.
Unit 5- Software Reliability: Metric and specification, fault avoidance and tolerance, exception handling,
defensive programming.Software Maintenance – maintenance characteristics, maintainability, maintenance
tasks, maintenance side effects. CASE tools, software certification- requirement, types of certifications, third
part certification. Software Re-Engineering, reverse software Engineering. Software Configuration Management
Activities, Change Control Process, Software Version Control, CASE: introduction, levels of case, architecture,
case building blocks, objectives, case repository, characteristics of case tools, categories, Estimation of Various
Parameters such as Cost, Efforts, Schedule/Duration, Constructive Cost Models (COCOMO), Resource
Allocation Models, Software Risk Analysis and Management.
TEXTBOOKS:
1. Roger Pressman, ―Software Engineering: A Practitioner ‘s Approach, McGraw Hill, ISBN 007–
337597–7.
2. Ian Sommerville, ―Software Engineering, Addison and Wesley, ISBN 0-13-703515-2.
REFERENCE BOOKS:
1. Carlo Ghezzi, ―Fundamentals of Software Engineering, Prentice Hall India, ISBN-10: 0133056996.
2. Rajib Mall, ―Fundamentals of Software Engineering, Prentice Hall India, ISBN-13: 9788120348981.
3. Pankaj Jalote, ―An Integrated Approach to Software Engineering, Springer, ISBN 13:
9788173192715.
4. S K Chang, ―Handbook of Software Engineering and Knowledge Engineering, World Scientific, Vol
I, II, ISBN: 978-981-02-4973-1.
5. Tom Halt, ―Handbook of Software Engineering, ClanyeInternational ISBN- 10: 1632402939.
L:T:P:: 3:0:0
Credits-03
COURSE OUTCOMES: On successful completion of this course, the students shall be able to
1. Have a fundamental knowledge of the basic concepts of probability.
2. Have a well-founded knowledge of various probability distributions which can describe real-life
phenomena.
3. Acquire skills in estimating expected values of variables and handling situations involving more than
one random variable and functions of random variables.
4. Understand the stochastic processes and phenomena which evolve concerning time in a probabilistic
manner.
5. Expose the basic characteristic features of Markov chains, queuing systems and queuing models.
Unit 1- Probability Models: Sample Space, Events and their algebra, graphical methods of representing events,
Probability Axioms and their applications, Condition probability, Independence of Events, Bayes' Rule and
Bernoulli Trials.
Unit 2- Random variables, and their event spaces: Probability mass function, Distribution functions, some
discrete distributions (Bernoulli, Binomial, Geometric, Poisson, uniform, Probability Generating Function,
Discrete random vectors, Continuous random variables: pdf some continuous distributions (Gamma, Normal),
Exponential functions of random variables, joint1y distributed random variables.
Unit 3- Expectation: Expectation of functions of more than one random variable, Moments and transforms of
some distributions (Uniform, Bernoulli, Binomial, Geometric, Poisson. Exponential, Gamma, Normal),
Computation of mean time to failure.
Unit 4- Stochastic Processes: Classification of stochastic processes, the Bernoulli process, renewal process,
renewal model of program behavior.
Unit 5- Markov Chains: Computation of n-step transition probabilities, State classification and limiting
distributions, Irreducible finite chains with aperiodic states, M/G/l queuing system, Discrete parameter
BirthDeath processes, Analysis of program execution time. Continuous parameter Markov Chains, Birth-Death
process with special cases, Non-Birth-Death Processes.
TEXTBOOKS:
1. Gross, D., Shortle, J.F, Thompson, J.M and Harris. C.M., ―Fundamentals of Queueing Theory", Wiley
Student 4th Edition, 2014.
2. Ibe, O.C., ―Fundamentals of Applied Probability and Random Processes", Elsevier, 1st Indian
Reprint, 2007.
REFERENCE BOOK:
1. Hwei Hsu, "Schaum‘s Outline of Theory and Problems of Probability, Random Variables and Random
Processes", Tata McGraw Hill Edition, New Delhi, 2004.
2. Taha, H.A., "Operations Research", 9th Edition, Pearson India Education Services, Delhi, 2016.
3. Trivedi, K.S., "Probability and Statistics with Reliability, Queueing and Computer Science
Applications", 2nd Edition, John Wiley and Sons, 2002.
4. Yates, R.D. and Goodman. D. J., "Probability and Stochastic Processes", 2nd Edition, Wiley India Pvt.
Ltd., Bangalore, 2012.
L:T:P:: 3:0:0
Credits-03
COURSE OBJECTIVES: The objectives of this course are to
1. Understand fault-tolerant design principles.
2. Identify the requirement of fault-tolerant systems.
3. Understand fault-tolerant distributed systems and its requirement.
4. Design algorithms for fault-tolerant systems.
COURSE OUTCOMES: On successful completion of the course, the student will be able to
1. Understand research problems and challenges in fault tolerance computing.
2. Identify the state-of-the-art techniques and tools to address research problems and challenges.
3. Develop strong technical reviewing, writing, and presentation skills.
4. Design more reliable systems that can tolerate S/W faults.
5. Design more reliable systems that can tolerate H/W faults.
Unit 1- Basics of Fault Tolerance: Fault Classification, Types of Redundancy, Basic Measures of Fault
Tolerance, Reliability concepts, Failures & faults, Reliability and Failure rate, Relation between reliability and
mean time between failure, maintainability and availability, Fault Tolerant Design: Basic concepts-static,
dynamic, hybrid, triple modular redundant system (TMR), Data redundancy, Time redundancy and software
Redundancy concepts.
Unit 2- Hardware Fault Tolerance: canonical and Resilient Structures- Series and Parallel Systems, Non-
Series/Parallel Systems, M-of-N Systems, Voters, Variations on N-Modular Redundancy, Duplex Systems,
Other Reliability Evaluation Techniques-Poisson Processes, Markov Models, Fault-Tolerance Processor-Level
Techniques, Watchdog Processor, Simultaneous Multithreading for Fault Tolerance, Byzantine Failures,
Byzantine Agreement with Message Authentication.
Unit 3- Testability for Hardware: testability for combinational circuits: Basic concepts of Testability,
Controllability and observability, The Reed Muller’s expansion technique, use of control and syndrome testable
designs. Design for testability by means of scan: Making circuits Testable, Testability Insertion, Full scan DFT
technique- Full scan insertion, flip-flop Structures, Full scan design and Test, Scan Architectures full scan
design, Shadow register DFT, Partial scan methods, multiple scan design, other scan designs.
Unit 4- Software Fault Tolerance: Acceptance Tests Single-Version Fault Tolerance- Wrappers, Software
Rejuvenation, Data Diversity, Software Implemented Hardware Fault Tolerance (SIHFT), N-Version
Programming- Consistent Comparison Problem, Version Independence, Recovery Block Approach- Basic
Principles, Success Probability Calculation, Distributed Recovery Blocks, Preconditions, Postconditions, and
Assertions, Exception-Handling- Requirements from Exception-Handlers, Basics of Exceptions and Exception-
Handling, Language Support, Software Reliability Models- Jelinski–Moranda Model, Littlewood–Verrall
Model, Musa–Okumoto Model, Model Selection and Parameter Estimation, Fault-Tolerant Remote Procedure
TEXTBOOKS:
1. Israel Koren And C. Mani Krishna, “Fault-Tolerant Systems, Morgan Kaufmann publisher
2. Parag K. Lala, “Fault Tolerant & Fault Testable Hardware Design”, 1984, PHI
REFERENCE BOOKS:
1. Fault Tolerant Computer System Design, D. K. Pradhan, Prentice Hall, 1996.
2. Probability and Statistics with Reliability, Queuing and Computer Science Applications, Kishor S.
Trivedi, John Wiley & Sons Inc., 2016.
3. ZainalabedinNavabi, “Digital System Test and Testable Design using HDL models and
Architectures”, Springer International Edition.
4. MironAbramovici, Melvin A. Breuer and Arthur D. Friedman, “Digital Systems Testing and Testable
Design”, Jaico Books
COURSE OUTCOMES: On successful completion of the course, the student will be able to
1. Grasp a fundamental understanding of goals, components, and evolution of real time systems.
2. Explain the concepts of real time scheduling.
3. Learn the scheduling policies of modern operating systems.
4. Understand the resource access control techniques in real time systems.
5. Understand the concept of real time communication.
Unit 1-Introduction: Definition, Typical Real Time Applications: Digital Control, High Level Controls, Signal
Processing etc., Release Times, Deadlines, and Timing Constraints, Hard Real Time Systems and Soft Real
Time Systems, Reference Models for Real Time Systems: Processors and Resources, Temporal Parameters of
Real Time Workload, Periodic Task Model, Precedence Constraints and Data Dependency.
Unit 2-Real Time Scheduling: Common Approaches to Real Time Scheduling: Clock Driven Approach,
Weighted Round Robin Approach, Priority Driven Approach, Dynamic Versus Static Systems, Optimality of
Effective-Deadline-First (EDF) and Least-Slack-Time-First (LST) Algorithms, Offline Versus Online
Scheduling, Scheduling Aperiodic and Sporadic jobs in Priority Driven and Clock Driven Systems.
Unit 3-Resources Access Control: Effect of Resource Contention and Resource Access Control (RAC), Non-
preemptive Critical Sections, Basic Priority-Inheritance and Priority-Ceiling Protocols, Stack Based Priority-
Ceiling Protocol, Use of Priority-Ceiling Protocol in Dynamic Priority Systems, PreemptionCeiling Protocol,
Access Control in Multiple-Unit Resources, Controlling ConcurrentAccesses to Data Objects.
Unit 4-Multiprocessor System Environment: Multiprocessor and Distributed System Model, Multiprocessor
Priority-Ceiling Protocol,Schedulability of Fixed-Priority End-to-End Periodic Tasks, Scheduling Algorithms
for End-to-End Periodic Tasks, End-to-End Tasks in Heterogeneous Systems, Predictability andValidation of
Dynamic Multiprocessor Systems, Scheduling of Tasks with Temporal Distance Constraints.
Unit 5-Real Time Communication: Model of Real Time Communication, Priority-Based Service and
Weighted Round-Robin Service Disciplines for Switched Networks, Medium Access Control Protocols for
Broadcast Networks, Internet and Resource Reservation Protocols, Real Time Protocols,Communication in
Multicomputer System, An Overview of Real Time Operating Systems.
TEXTBOOKS:
1. Real Time Systems – Jane W. S. Liu, Pearson Education Publication.
2. Real-Time Systems Design and Analysis, Phillip. A. Laplante, second edition, PHI, 2005.
REFERENCE BOOKS:
1. Real Time Systems – Mall Rajib, Pearson Education
2. Real-Time Systems: Scheduling, Analysis, and Verification – Albert M. K. Cheng, Wiley.
COURSE OUTCOMES: On Successful completion of the course, the students will be able to
1. Acquire the theoretical and conceptual foundations of distributed computing.
2. Conceptualize the ideas of distributed operating systems and their issues.
3. Understand the issues involved in distributed resource environment.
4. Realize the importance of transaction and how to recovery the system from deadlocks.
5. Explore the principles of fault tolerance and its protocols.
Unit 1- Distributed Environment: Introduction, Limitations, Remote Procedure Call, Remote Object
Invocation, Message-Oriented Communication, Unicasting, Multicasting and Broadcasting, Group
Communication.
Unit 2-Distributed Operating Systems: Issues in Distributed Operating Systems, Threads in Distributed
Systems, Clock Synchronization, Causal Ordering, Global States, Election Algorithms, Distributed Mutual
Exclusion, Distributed Deadlock, Agreement Protocols
Unit 3- Distributed Resource Management: Distributed Shared Memory, Data-Centric Consistency Models,
Client-Centric Consistency Models, Distributed File Systems, Sun NFS.
Unit 5- Fault Tolerance and Consensus: Introduction to Fault Tolerance, Distributed Commit Protocols,
Byzantine Fault Tolerance, Impossibilities in Fault Tolerance.
TEXTBOOK(S):
1. Develop the fundamental concepts such as fuzzy sets, operations and fuzzy relations.
2. Lean about scalar variables' fuzzification and membership functions' defuzzification.
3. Learn three different inference methods to design fuzzy rule-based system.
4. Develop fuzzy decision making by introducing some concepts and also Bayesian decision methods.
5. Learn different fuzzy classification methods.
COURSE OUTCOMES: On successful completion of the course, the students will be able to
1. Understand the basic ideas of fuzzy sets, operations and properties of fuzzy sets, and fuzzy relations.
2. Understand the basic features of membership functions, fuzzification process and defuzzification
process.
3. Design fuzzy rule-based system.
4. Know about combining fuzzy set theory with probability to handle random and non-random
uncertainty, and the decision-making process.
5. Gain the knowledge about fuzzy C-Means clustering.
Unit – I: Classical Sets: Operations and properties of classical sets, Mapping of classical sets to the functions.
Fuzzy sets - Membership functions, Fuzzy set operations, Properties of fuzzy sets.
Classical and Fuzzy Relations: Cartesian product, crisp relations-cardinality, operations, and properties of
crisp relations. Fuzzy relations-cardinality, operations, properties of fuzzy relations, fuzzy Cartesian product and
composition, Fuzzy tolerance and equivalence relations, value assignments and other format of the composition
operation.
UNIT II: Fuzzification and Defuzzification : Features of the membership functions, various forms,
fuzzification, defuzzification to crisp sets, l- cuts for fuzzy relations, Defuzzification to scalars. Fuzzy logic and
approximate reasoning, other forms of the implication operation.
UNIT III : Fuzzy Systems : Natural language, Linguistic hedges, Fuzzy (Rule based) System, Aggregation of
fuzzy rules, Graphical techniques of inference, Membership value assignments: Intuition, Inference, rank
ordering, Fuzzy Associative memories.
UNIT IV: Fuzzy Decision Making: Fuzzy synthetic evaluation, Fuzzy ordering, Preference and consensus,
Multi
objective decision making, Fuzzy Bayesian, Decision method, Decision making under Fuzzy states and fuzzy
actions.
UNIT V: Fuzzy Classification: Classification by equivalence relations-crisp relations, Fuzzy relations, Cluster
analysis, Cluster validity, C-Means clustering, Hard C-Means clustering, Fuzzy C-Means algorithm,
Classification metric, Hardening the Fuzzy C-Partition.
TEXTBOOK(s):
1. Timothy J.Ross - Fuzzy logic with engineering applications, 3rd edition, Wiley,2010.
2. George J.KlirBo Yuan - Fuzzy sets and Fuzzy logic theory and Applications, PHI, New Delhi,1995.
REFERENCE BOOK(s):
1. S.Rajasekaran, G.A.Vijayalakshmi - Neural Networks and Fuzzy logic and Genetic Algorithms,
Synthesis and Applications, PHI, New Delhi,2003.
COURSE OUTCOMES: Upon successful completion of the course, the students will be able to
1. Solve recurrence equations by considering time and space complexity.
2. Analyse the complexities of various problems in different domains.
3. Solve the problems that comprises of shortest route issue.
4. Solve the problems that address the issue of dynamic programming
5. Synthesize efficient algorithms in common engineering design situations.
LIST OF EXCERCISES
11. Write a program that uses dynamic programming algorithm to solve the optimal binary search tree
problem.
12. Write a program for solving traveling salespersons problem using the following:
a) Dynamic programming algorithm.
b) The back tracking algorithm.
c) Branch and bound.
COURSE OUTCOMES: On successful completion of the course, the students will be able to
1. Understand, appreciate, and effectively explain the concepts of database Technologies.
2. Declare and enforce integrity constraints on a database using RDBMS.
3. Devise a complex query using SQL DML/DDL commands.
4. Create views and use in-built functions to query a database.
5. Write PL/SQL programs including stored procedures, stored functions and triggers.
LIST OF EXPERIMENTS
1. Build the following database schemas and perform the manipulation operations on these schemas using
SQL DDL,DML,TCL and DCL commands.
(I) Database Schema for a customer-sale scenario
Customer(Custid : integer, cust_name: string)
Item(item_id: integer, item_name: string, price: integer)
Sale(bill_no: integer, bill_data: date, cust_id: integer, item_id: integer, qty_sold: integer)
COURSE OUTCOMES: On successful completion of the course, the students will be able to
1. Understand the basic concepts; ability to apply automata theory and knowledge on formal languages.
2. Understand the basic concepts and application of Compiler Design
3. Apply their basic knowledge Data Structure to design Symbol Table, Lexical Analyser, Intermediate
Code Generation, Parser (Top Down and Bottom-Up Design) and will able to understand strength of
Grammar and Programming Language.
4. Understand various code optimization techniques and error recovery mechanisms.
5. Understand and Implement a Parser.
LIST OF PRACTICALS:
1. Design a lexical analyzer for given language and the lexical analyzer should ignore redundant spaces,
tabs and new lines. It should also ignore comments. Although the syntax specification states that
identifiers can be arbitrarily long, you may restrict the length to some reasonable value. Simulate the
same in C language
2. Write a C program to identify whether a given line is a comment or not
3. Write a C program to test whether a given identifier is valid or not.
4. Write a C program to simulate lexical analyzer for validating operators.
5. To Study about Lexical Analyzer Generator(LEX) and Flex(Fast Lexical Analyzer)
6. Implement following programs using Lex:
a) Create a Lexer to take input from text file and count no of characters, no. of lines & no. of words.
b) Write a Lex program to count number of vowels and consonants in a given input string.
7. Implement following programs using Lex.
a) Write a Lex program to print out all numbers from the given file.
b) Write a Lex program to printout all HTML tags in file.
c) Write a Lex program which adds line numbers to the given file and display the same onto the
standard output.
8. Write a Lex program to count the number of comment lines in a given C program. Also eliminate them
and copy that program into separate file.
9. Write a C program for implementing the functionalities of predictive parser for the mini language.
Syllabus of B.TECH – Computer Science and Engineering PAGE 30
VEER MADHO SINGH BHANDARI UTTARAKHAND TECHNICAL UNIVERSITY, DEHRADUN
COURSE OUTCOMES: At the end of internship/mini project, the students will be able to
1. Understand organizational issues and their impact on the organization and employees.
2. Identify industrial problems and suggest possible solutions.
3. Relate, apply and adapt relevant knowledge, concepts and theories within an industrial organization,
practice and ethics.
4. Apply technical knowledge in an industry to solve real world problems.
5. Demonstrate effective group communication, presentation, self-management, and report writing skills.
COURSE OUTCOMES
On successful completion of the course, the students will be able to
council of ministers, Parliament, Supreme court and so on), Framework for state
government (Governor, Chief Minister, state legislature, High court and so on) and
Framework for local self government (Panchayatiraj, Municipalities) and Union
Territories.
Unit-5 Constitutional, Non-Constitutional and other bodies
Discussion on Various constitutional bodies like Election Commission, UPSC, SPSC,
Finance commission, NCSC, NCST, NCBC, CAG and AGI. Discussion on Various non-
constitutional bodies like NITI Aayog, NHRC, CIC, CVC, CBI, Lokpal and Lokayukta.
Discussion on Various other constitutional bodies like Co- operative societies, Official
Language, Tribunals etc.
Text/Reference books-
1. M. Laxmikanth, “Indian Polity”, McGraw- Hill, 6th edition, 2020
st
2. D.D. Basu, “Introduction to the Indian Constitution”, LexisNexis, 21 edition, 2020
3. S.C. Kashyap, “ Constitution of India”, Vitasta publishing Pvt. Ltd., 2019
1. To facilitate the students with the concepts of Indian traditional knowledge and to
make them understand the Importance of roots of knowledge system.
2. To make the students understand the traditional knowledge and analyses it and apply
it to their day to day life.
3. To make the students know the need and importance of protecting traditional
knowledge.
4. To make the students understand the concepts of Intellectual property to protect the
traditional knowledge.
5. This course is also concentrating on various acts in protecting the environment and
Knowledge management impact on various sectors in the economy development of
the country.
COURSE OUTCOMES:
On successful completion of the course, the students will be able to
Text/Reference Books:
1. Traditional Knowledge System in India by Amit Jha Atlantic publishers, 2002.
2. "Knowledge Traditions and Practices of India" Kapil Kapoor1, Michel Danino2.
3. Traditional Knowledge System in India, by Amit Jha, 2009.
4. Satya Prakash, “Founders of Sciences in Ancient India”, Vijay Kumar Publisher,
1989
5. Traditional Knowledge System and Technology in India by Basanta Kumar Mohanta
and Vipin Kumar Singh Pratibha Prakashan 2012.
Unit 1- Data communication Components: Representation of data and its flow Networks, Various Connection
Topology, Protocols and Standards, OSI model, Transmission Media, LAN: Wired LAN, Wireless LANs,
Connecting LAN and Virtual LAN, Techniques for Bandwidth utilization: Multiplexing - Frequency division,
Time division and Wave division, Concepts on spread spectrum.
Unit 2- Data Link Layer and Medium Access Sub Layer: Error Detection and Error Correction -
Fundamentals, Block coding, Hamming Distance, CRC; Flow Control and Error control protocols - Stop and
Wait, Go back – N ARQ, Selective Repeat ARQ, Sliding Window, Piggybacking, Random Access,
Multiple access protocols- Pure ALOHA, Slotted ALOHA, CSMA/CD, CDMA/CA, high level data link
control(HDLC), Point To Point protocol (PPP).
Unit 3- Network Layer: Repeater, Hub, Switches, Bridges, Gateways, Switching, Logical addressing – IPV4,
IPV6, Address mapping – ARP, RARP, BOOTP and DHCP–Delivery, Forwarding and Unicast Routing
protocols.
Unit 4- Transport Layer: Process to Process Communication, User Datagram Protocol (UDP), Transmission
Control Protocol (TCP), SCTP Congestion Control; Quality of Service, QoS improving techniques: Leaky
Bucket and Token Bucket algorithm.
Unit 5- Application Layer: Domain Name Space (DNS), DDNS, TELNET, EMAIL, File Transfer Protocol
Syllabus of B.TECH – Computer Science and Engineering PAGE 37
VEER MADHO SINGH BHANDARI UTTARAKHAND TECHNICAL UNIVERSITY, DEHRADUN
(FTP), WWW, HTTP, SNMP, Bluetooth, Firewalls, Basic concepts of Cryptography , Digital Signature.
TEXTBOOK:
1. Behrouz A. Forouzan, Data Communications and Networking, Fifth Edition TMH, 2013.
REFERENCE BOOKS:
1. Larry L. Peterson, Bruce S. Davie, Computer Networks: A Systems Approach, Fifth Edition, Morgan
Kaufmann Publishers Inc., 2012.
2. William Stallings, Data and Computer Communications, Tenth Edition, Pearson Education, 2013.
3. Nader F. Mir, Computer and Communication Networks, Second Edition, Prentice Hall, 2014.
4. Ying-Dar Lin, Ren-Hung Hwang and Fred Baker, Computer Networks: An Open Source Approach,
McGraw Hill Publisher, 2011.
5. James F. Kurose, Keith W. Ross, Computer Networking, A Top-Down Approach Featuring the
Internet, Sixth Edition, Pearson Education, 2013
COURSE OUTCOMES: On successful completion of the course, the students will be able to
1. Build intelligent agents for search and games
2. Solve AI problems through programming with Python.
3. Learn optimization and inference algorithms for model learning.
4. Design and develop programs for an agent to learn and act in a structured environment.
5. Possess the ability to apply AI techniques to solve problems of Game Playing, Expert Systems and
machine learning.
Unit 1- Introduction: What is AI, Foundations of AI, History of AI, The State of the Art, AI Techniques,
Problem Solving: Problem solving agents, uniformed search strategies, Informed search strategies, Constraint
Satisfaction Problems.
Unit 2- Knowledge Representation: Approaches and issues in knowledge representation, Knowledge Based
Agents, Propositional Logic, Predicate Logic- Unification and Resolution, Weak slot –Filler Structure, Strong
slot- Filler structure.
Unit 3- Probabilistic Reasoning: Probability, conditional probability, Bayes Rule, Bayesian Networks-
representation, construction and inference, Brief introduction of Neural Networks, Fuzzy Logic and Genetic
Algorithms
Unit 4- Planning and Learning: Planning with state space search, conditional planning, continuous planning,
Multi-Agent planning. Forms of learning, Inductive Learning, Statistical learning method and Reinforcement
learning.
Unit 5- Advanced Topics: Expert Systems- Representation- Expert System shells- Knowledge Acquisition
with examples.
Game Playing-Minimax Search Procedure, Alpha-Beta Pruning, Imperfect, Real-Time Decisions.
Swarm Intelligent Systems- Ant Colony System, Development, Application and Working of Ant Colony
System.
TEXTBOOKS:
1. S. Russell and P. Norvig, "Artificial Intelligence: A Modern Approach, Prearson Education,
4thEdition, 2022.
2. Michael Negnevitsky, Artificial Intelligence, 3rd edition, Pearson Education.
3. I. Bratko, ―Prolog: Programming for Artificial Intelligence, Fourth edition, Addison-Wesley
Educational Publishers Inc., 2011.
REFERENCE BOOKS:
1. George F Luger, Artificial Intelligence, 6th edition, Pearson Education.
2. M. Tim Jones, ―Artificial Intelligence: A Systems Approach(Computer Science), Jones and Bartlett
Publishers, Inc.; First Edition, 2008.
3. Nils J. Nilsson, ―The Quest for Artificial Intelligence, Cambridge University Press, 2009.
4. William F. Clocksin and Christopher S. Mellish, Programming in Prolog: Using the ISO Standard, Fifth
Edition, Springer, 2003.
5. Gerhard Weiss, ―Multi Agent Systems, Second Edition, MIT Press, 2013.
6. David L. Poole and Alan K. Mackworth, ―Artificial Intelligence: Foundations of Computational
Agents, Cambridge University Press, 2010.
Unit 1- Introduction: Concept of Operating Systems, Generations of Operating systems, Types of Operating
Systems, OS Services, System Calls, Structure of an OS -Layered, Microkernel Operating Systems, Concept
of Virtual Machine.
Processes: Definition, Process Relationship, Different states of a Process, Process State transitions, Process
Control Block (PCB), Context switching
Thread: Definition, Various states, Benefits of threads, Types of threads, Concept of multi threads
Unit 2- Process Scheduling: Foundation and Scheduling objectives, Types of Schedulers, Scheduling criteria:
CPU utilization, Throughput, Turnaround Time, Waiting Time, Response Time; Scheduling algorithms: Pre-
emptive and Non-preemptive, FCFS, SJF, RR; Multiprocessor scheduling: Real-Time scheduling: RM and EDF.
Inter-process Communication: Critical Section, Race Conditions, Mutual Exclusion, Hardware Solution,
Strict Alternation, Peterson’s Solution, The Producer-Consumer Problem, Semaphores, Monitors, Message
Passing, Classical IPC Problems: Reader’s & Writer Problem, Dinning Philosopher Problem etc.
Unit 3- Deadlocks: Definition, Necessary and sufficient conditions for Deadlock, Deadlock Prevention,
Deadlock Avoidance: Banker’s algorithm, Deadlock detection and Recovery.
Memory Management: Basic concept, Logical and Physical address map, Memory allocation: Contiguous
Memory allocation–Fixed and variable partition– Internal and External fragmentation and Compaction; Paging:
Principle of operation – Page allocation –Hardware support for paging, Protection and sharing, Disadvantages
of paging.
Unit 4- Virtual Memory: Basics of Virtual Memory – Hardware and control structures – Locality of reference,
Page fault, Working Set, Dirty page/Dirty bit – Demand paging, Page Replacement algorithms: Optimal, First in
First Out (FIFO), Second Chance (SC), Not recently used (NRU) and Least Recently used(LRU).
Unit 5- File Management: Concept of File, Access methods, File types, File operation, Directory structure, File
System structure, Allocation methods (Contiguous, linked, indexed).
Disk Management: Disk structure, Disk scheduling - FCFS, SSTF, SCAN, C-SCAN, Disk reliability.
TEXTBOOKS:
1. AviSilberschatz, Peter Galvin, Greg Gagne , Operating System Concepts Essentials, 9th Edition by,
Wiley Asia Student Edition.
2. William Stallings , Operating Systems: Internals and Design Principles, 9th Edition (2022), Prentice
Hall of India.
Reference Books:
1. RamazElmasri, A. Gil Carrick, David Levine, ―Operating Systems – A Spiral Approach, Tata
McGraw Hill Edition, 2010.
2. Achyut S.Godbole, Atul Kahate, ―Operating Systems, McGraw Hill Education, 2016.
3. Andrew S. Tanenbaum, ―Modern Operating Systems, Second Edition, Pearson Education, 2004.
Unit 1-INTRODUCTION TO IOT: Internet of Things - Physical Design- Logical Design- IOT Enabling
Technologies - IOT Levels & Deployment Templates - Domain Specific IOTs - IOT and M2M - IoT System
Management with NETCONF-YANG- IoT Platforms Design Methodology
Unit 2-IOT ARCHITECTURE: M2M high-level ETSI architecture - IETF architecture for IoT - OGC
architecture - IoT reference model - Domain model - information model - functional model - communication
model - IoT reference architecture
Unit 3-IOT PROTOCOLS: Protocol Standardization for IoT – Efforts – M2M and WSN Protocols – SCADA
and RFID Protocols – Unified Data Standards – Protocols – IEEE 802.15.4 – BACNet Protocol – Modbus–
Zigbee Architecture – Network layer – 6LowPAN - CoAP - Security
Unit 4-BUILDING IOT WITH RASPBERRY PI & ARDUINO: Building IOT with RASPERRY PI- IoT
Systems - Logical Design using Python – IoT Physical Devices & Endpoints - IoT Device -Building blocks -
Raspberry Pi -Board - Linux on Raspberry Pi - Raspberry Pi Interfaces -Programming Raspberry Pi with Python
- Other IoT Platforms - Arduino.
Unit 5-CASE STUDIES AND REAL-WORLD APPLICATIONS: Real world design constraints -
Applications - Asset management, Industrial automation, smart grid, Commercial building automation, Smart
cities - participatory sensing - Data Analytics for IoT – Software & Management Tools for IoT, Cloud Storage
Models & Communication APIs - Cloud for IoT - Amazon Web Services for IoT
TEXTBOOK:
1. David Hanes, Gonzalo Salgueiro, Patrick Grossetete, Rob Barton and Jerome Henry, ―IoT
Fundamentals: Networking Technologies, Protocols and Use Cases for Internet of Things, Cisco Press,
2017
REFERENCE BOOKS:
1. ArshdeepBahga, Vijay Madisetti, ―Internet of Things – A hands-on approach, Universities
Press, 2015.
2. Olivier Hersent, David Boswarthick, Omar Elloumi , ―The Internet of Things – Key applications and
Protocols, Wiley, 2012.
3. Jan Ho¨ ller, VlasiosTsiatsis , Catherine Mulligan, Stamatis , Karnouskos, Stefan Avesand. David
Boyle, "From Machine-to-Machine to the Internet of Things - Introduction to a New Age of
Intelligence", Elsevier, 2014.
4. Dieter Uckelmann, Mark Harrison, Michahelles, Florian (Eds), ―Architecting the Internet of
Things, Springer, 2011.
5. Michael Margolis, Arduino Cookbook, Recipes to Begin, Expand, and Enhance Your Projects, 2nd
Edition, O'Reilly Media, 2011.
1. Impart knowledge about the quantum-mechanical phenomena such as superposition and entanglement
to perform computation.
3. Enable the students to understand the quantum computing and quantum information in depth.
COURSE OUTCOMES: On successful completion of the course, the students will be able to
1. Explain the working of Quantum Computing program.
Unit 1- Introduction to Quantum Computing: Motivation for studying Quantum Computing, Major players
in the industry (IBM, Microsoft, Rigetti, D-Wave etc.) Origin of Quantum Computing, Overview of major
concepts in Quantum Computing, Qubits and multi-qubits states, Bloch Sphere representation, Quantum
Unit 2-Math Foundation for Quantum Computing: Matrix Algebra: basis vectors and orthogonality, inner
product and Hilbert spaces, matrices, and tensors, unitary operators and projectors, Dirac notation, Eigen values
Unit 3-Building Blocks for Quantum Program: Architecture of a Quantum Computing platform, Details of q-
bit system of information representation: Block Sphere, Multi-qubits States, Quantum superposition of qubits
(valid and invalid superposition), Quantum Entanglement ,Universal quantum gates, Quantum Fourier
Transform.
Unit 4-Quantum Algorithms: Basic techniques exploited by quantum algorithms. The quantum search
algorithm, Quantum Walks, Major Algorithms, Shor’s Algorithm, Grover’s Algorithm Deutsch’s
Unit 5-Toolkits: OSS Toolkits for implementing Quantum program, IBM quantum experience, Microsoft Q,
RigettiPyQuil (QPU/QVM)
TEXTBOOKS:
1. Eric R. Johnston, Nic Harrigan, Mercedes and Gimeno-Segovia “Programming Quantum Computers:
Essential Algorithms And Code Samples, SHROFF/ O’Reilly.
2. Dr. Christine Corbett Moran, Mastering Quantum Computing with IBM QX: Explore the world of
quantum computing using the Quantum Composer and Qiskit, Kindle Edition Packt
REFERENCE BOOKS:
2. Michael A. Nielsen and Issac L. Chuang, “Quantum Computation and Information”, Cambridge
(2002).
3. Riley Tipton Perry, “Quantum Computing from the Ground Up”, World Scientific Publishing Ltd
(2012).
1. Gain the knowledge of historical and modern overviews and perspectives on virtual reality.
2. Learn the fundamentals of sensation, perception, and perceptual training.
3. Have the scientific, technical, and engineering aspects of augmented and virtual reality systems.
4. Learn the technology of augmented reality and implement it to have practical knowledge.
COURSE OUTCOME: On successful completion of the course, the students will be able to
1. Understand geometric modelling and Virtual environment.
2. Study about Virtual Hardware and Software
3. Present geometric model for VR systems
4. Identify which type hardware and software is suitable to design their own VR systems
5. Develop Virtual Reality applications.
Unit 1-Introduction to Virtual Reality: Virtual Reality and Virtual Environment: Introduction, Computer
graphics, Real time computer graphics, Flight Simulation, Virtual environment requirement, benefits of
virtual reality, Historical development of VR, Scientific Landmark,3D Computer Graphics: Introduction, The
Virtual world space, positioning the virtual observer, the perspective projection, human vision, stereo
perspective projection, 3D clipping, Colour theory, Simple 3D modelling, Illumination models,
Reflection models, Shading algorithms, Radiosity, Hidden Surface Removal, Realism-Stereographic image.
Unit 2-Geometric Modelling: Geometric Modelling: Introduction, From 2D to 3D, 3D space curves, 3D
boundary representation Geometrical Transformations: Introduction, Frames of reference, Modelling
transformations, Instances, Picking, Flying, Scaling the VE, Collision detection Generic VR system:
Introduction, Virtual environment, Computer environment, VR technology, Model of interaction, VR Systems.
Unit 3-Virtual Environment: Animating the Virtual Environment: Introduction, The dynamics of numbers,
Linear and Non-linear interpolation, the animation of objects, linear and non-linear translation. Physical
Simulation: Introduction, Objects falling in a gravitational field, Rotating wheels, Elastic collisions, projectiles,
simple pendulum, springs, Flight dynamics of an aircraft.
Unit 4-VR Hardware and Software: Human factors: Introduction, the eye, the ear, the somatic senses.
VR Hardware: Introduction, sensor hardware, Head-coupled displays, Acoustic hardware, Integrated VR
systems. VR Software: Introduction, Modelling virtual world, Physical simulation, VR toolkits, Introduction to
VRML
Unit 5-VR Applications: Introduction, Engineering, Entertainment, Science, Training. The Future: Virtual
environment, modes of interaction.
TEXTBOOKS:
1. Coiffet, P., Burdea, G. C., (2003), “Virtual Reality Technology,” Wiley-IEEE Press, ISBN:
9780471360896
2. Schmalstieg, D., Höllerer, T., (2016), “Augmented Reality: Principles & Practice,” Pearson, ISBN:
9789332578494
3. Norman, K., Kirakowski, J., (2018), “ Wiley Handbook of Human Computer Interaction,” Wiley-
Blackwell, ISBN: 9781118976135
4. LaViola Jr., J. J., Kruijff, E., McMahan, R. P., Bowman, D. A., Poupyrev, I., (2017), “3D User
Interfaces: Theory and Practice,” Pearson, ISBN: 9780134034324
5. Fowler, A., (2019), “Beginning iOS AR Game Development: Developing Augmented Reality Apps
with Unity and C#,” Apress, ISBN: 9781484246672
6. Hassanien, A. E., Gupta, D., Khanna, A., Slowik, A., (2022), “Virtual and Augmented Reality for
Automobile Industry: Innovation Vision and Applications,” Springer, ISBN: 9783030941017
REFERENCE BOOKS:
1. Craig, A. B., (2013), “Understanding Augmented Reality, Concepts and Applications,” Morgan
Kaufmann, ISBN: 9780240824086
2. Craig, A. B., Sherman, W. R., Will, J. D., (2009), “Developing Virtual Reality Applications,
Foundations of Effective Design,” Morgan Kaufmann, ISBN: 9780123749437
3. John Vince, J., (2002), “Virtual Reality Systems, “ Pearson, ISBN: 9788131708446
4. Anand, R., “Augmented and Virtual Reality,” Khanna Publishing House
5. Kim, G. J., (2005), “Designing Virtual Systems: The Structured Approach”, ISBN: 9781852339586
6. Bimber, O., Raskar, R., (2005), “Spatial Augmented Reality: Merging Real and Virtual Worlds,” CRC
Press, ISBN: 9781568812304
7. O'Connell, K., (2019), “Designing for Mixed Reality: Blending Data, AR, and the Physical World,”
O'Reilly, ISBN: 9789352138371
8. SanniSiltanen, S., (2012), “Theory and applications of marker-based augmented reality,” Julkaisija –
Utgivare Publisher, ISBN: 9789513874490
L:T:P:: 3:0:0
Credits-03
COURSE OBJECTIVES: The objectives of this course are to
COURSE OUTCOMES: On successful completion of this course, the student will be able to:
1. Design simple web pages using mark-up languages like HTML and XHTML.
2. Create dynamic web pages using DHTML and java script that is easy to navigate and use.
3. Program server-side web pages that have to process request from client side web pages.
4. Represent web data using XML and develop web pages using JSP.
5. Understand various web services and how these web services interact.
UNIT-I Introduction to HTML: HTML Common tags- List, Tables, images, forms, Frames; Cascading Style
sheets;
Introduction to JavaScript: Scripts, Objects in Java Script, Dynamic HTML with Java Script
XML: Document type definition, XML Schemas, Document Object model, Presenting XML, Using XML
Processors: DOM and SAX
UNIT-II Java Beans: Introduction to Java Beans, Advantages of Java Beans, BDK Introspection, Using Bound
properties, Bean Info Interface, Constrained properties Persistence, Customizes, Java Beans API, Introduction to
EJB’s
UNIT-III Web Servers and Servlets: Tomcat web server, Introduction to Servelets: Lifecycle of a Serverlet,
JSDK, The Servelet API, Thejavax.servelet Package, Reading Servelet parameters, Reading Initialization
parameters. The javax.servelet HTTP package, Handling Http Request & Responses, Using Cookies-Session
Tracking, Security Issues.
UNIT-IV Introduction to JSP: The Problem with Servelet. The Anatomy of a JSP Page, JSP Processing. JSP
Application Design with MVC Setting Up and JSP Environment: Installing the Java Software Development Kit,
Tomcat Server & Testing Tomcat
UNIT-V JSP Application Development: Generating Dynamic Content, Using Scripting Elements Implicit JSP
Objects, Conditional Processing – Displaying Values Using an Expression to Set an Attribute, Declaring
Variables and Methods Error Handling and Debugging Sharing Data Between JSP pages, Requests, and Users
Passing Control and Date between Pages – Sharing Session and Application Data – Memory Usage
Considerations.
TEXT BOOK:
1. Jeffrey C. Jackson, "Web Technologies--A Computer Science Perspective", Pearson Education, 2006.
REFERENCE BOOK:
1. Robert. W. Sebesta, "Programming the World Wide Web", 8thEdition(2022), Pearson Education, 2007.
2. Deitel, Deitel, Goldberg, "Internet & World Wide Web How To Program", Third Edition, Pearson
Education, 2006.
3. Marty Hall and Larry Brown, Core Web Programming Second Edition, ‖ ‖ Volume I and II, Pearson
Education, 2001.
4. Bates, ―Developing Web Applications‖, Wiley, 2006
COURSE OUTCOMES: O successful completion of this course, the students will be able to
1. Understand the risk of computer failures and their comparison with other equipment failures.
2. Analyze hardware and software fault-tolerant or non-fault-tolerant on the basis of dependability
requirements.
3. Know the different advantages and limits of fault avoidance and fault tolerance techniques.
4. Understand the principles behind reliability
5. Gain knowledge in sources of faults and their prevention and forecasting.
6. Learn the programming tools in designing reliable systems
Unit 1-Reliability& fault: Definition, System reliability, Parameter values, Reliability models for hardware
redundancy, Testing: Various testing methods, Definition, Fault types, Detection, Redundancy, Data diversity,
Reversal checks, Byzantine failures, Integrated failure handling.
Unit 2- Hardware Fault Tolerance:-Definition, Fault types, Detection, Redundancy, Data diversity, Reversal
checks, Byzantine failures, Integrated failure handling, canonical and Resilient Structures- Series and Parallel
Systems, Non-Series/Parallel Systems, M-of-N Systems, Voters, Variations on N-Modular Redundancy, Duplex
Systems, Other Reliability Evaluation Techniques-Poisson Processes, Markov Models, Fault-Tolerance
Processor-Level Techniques, Watchdog Processor, Simultaneous Multithreading for Fault Tolerance, Byzantine
Failures, Byzantine Agreement with Message Authentication.
Unit 3-Testability for Hardware: testability for combinational circuits: Basic concepts of Testability,
Controllability and observability, The Reed Muller’s expansion technique, use of control and syndrome testable
designs. Design for testability by means of scan: Making circuits Testable, Testability Insertion, Full scan DFT
technique- Full scan insertion, flip-flop Structures, Full scan design and Test, Scan Architecturesfull scan
design, Shadow register DFT, Partial scan methods, multiple scan design, other scan designs.
Unit 4- Software Fault Tolerance:Acceptance Tests Single-Version Fault Tolerance- Wrappers, Software
Rejuvenation, Data Diversity, Software Implemented Hardware Fault Tolerance (SIHFT), N-Version
Programming- Consistent Comparison Problem, Version Independence, Recovery Block Approach- Basic
Principles, Success Probability Calculation, Distributed Recovery Blocks, Preconditions, Postconditions, and
Unit 5-Programming Languages and Tools: Desired Language Characteristics, Data typing, control
structures, Hierarchical decomposition, Packages, Exception handling, Over loading and Generics, Multi-
tasking, Task scheduling, Timing specification., Flex, Euclid, Environments, Run time support.
Text Book:
Reference Book:
1. Probability and Statistics with Reliability, Queuing and Computer Science Applications, Kishor S.
Trivedi, John Wiley & Sons Inc., 2016.
Course Objectives:
Course Outcomes:
Upon successful completion of the course, the student will be able to:
1. Identify the significance of quality in an organization.
2.Describe how to manage quality improvement teams.
3. Describe how to organize management and quality policies in TQM.
4. Apply the tools of quality improvement programs in an organization.
5. Assess the benefits of implementing TQM Program in an organization.
COURSE OBJECTIVES:
COURSE OUTCOMES
Upon successful completion of the course, the student will be able to:
1. Understand strategies used in digital marketing.
2. Apply interactive marketing communications to gratify online buyer.
3. Apply digital promotion techniques for marketing of product and services.
4. Evaluate the role of web analytics in social media marketing.
5. Apply and design various e commerce models for e-business.
4. Understanding Digital Marketing: Marketing Strategies for Engaging the Digital Generation
by Damian Rya Publisher.
5. Marketing 4.0: Moving from Traditional to Digital by Philip Kotler, Publisher Wiley.
COURSE OBJECTIVES:
The course should enable the students:
1. To impart knowledge about various aspects of industrial safety and occupational health.
2. To impart knowledge about Occupational Health and Toxicology.
3. To enable the students to identity hazard and assess risk.
4. To understand Acts and Rules of industrial safety and hazard management.
5. To teach about various safety acts and rules along with safety education and training.
COURSE OUTCOMES
Upon successful completion of the course, the student will be able to:
1. Identify the key aspects of industrial safety and mitigating them.
2. Describe various types of solution to problems arising in safety operations and hygiene.
3.Apply principles of OSHA in controlling industrial disasters and losses.
4. Identify various Acts and Rules of industrial safety and hazard management.
5. Assess the overall performance of safety protocols of chemical industries and hazard
management.
2. Safety Management in industry by NV. Krishnan, Jaico Publishing House, Bombay, 1997.
3. Loss Prevention in Process Industries by FP Lees, Butterworth London, 1990.
4. Safety at Work by J.R. Ridey Butterwort London 1983.
L:T:P:: 0:0:2
Credits-01
1. Equip the students with a general overview of the concepts and fundamentals of computer networks.
2. Familiarize the students with the standard models for the layered approach to communication between
machines in a network and the protocols of the various layers.
LIST OF PRACTICALS
1. Understand the various characteristics of Intelligent agents and implement the different search
strategies in AI.
2. Learn to represent knowledge in solving AI problems
3. Design the different ways of designing software agents.
4. Identify the various applications of AI.
COURSE OUTCOMES: On successful completion of the course, the students will be able to
1. Implement the Artificial Intelligence techniques for building well engineered and efficient intelligent
systems.
2. Describe the nature of AI problem and provide the solution as a particular type.
3. Learn optimization and inference algorithms for model learning.
4. Solve game challenging problems
5. Design and develop programs for an agent to learn and act in a structured environment.
LIST OF PRACTICALS
1. Write a python program to implement simple Chatbot ?
2. Implementation of following algorithms:
a. A* and Uniform cost search algorithms.
b. Implement AO* Search algorithm.
c. Write a python program to implement Breadth First Search Traversal.
d. Implementation of TSP using heuristic approach.
3. Implementation of Hill-climbing to solve 8- Puzzle Problem.
4. Write a python program to implement Water Jug Problem?
5. Write a program to implement Hangman game using python.
6. Write a program to implement Tic-Tac-Toe game using python.
7. Write a Program for Expert System by Using Forward Chaining.
8. Write a python program to remove stop words for a given passage from a text file using NLTK?
9. Write a python program to implement stemming for a given sentence using NLTK?
10. Write a python program to implement Lemmatization using NLTK.
11. Write a program to demonstrate the working of the decision tree based ID3 algorithm. Use an
appropriate data set for building the decision tree and apply this knowledge to classify a new sample.
12. Write a program to implement the naïve Bayesian classifier for a sample training data set stored as a
.CSV file. Compute the accuracy of the classifier, considering few test data sets.
COURSE OUTCOMES: On successful completion of the course, the students will be able to
1. Understand the system calls and I/O system calls in UNIX
2. Evaluate the process scheduling algorithms FCFS, SJF, Priority and Round robin
3. Simulate the process of communication through various techniques
4. Simulate memory management schemes
5. Simulate File Allocation Techniques
LIST OF EXPERIMENTS
1. Write programs using the following system calls of UNIX operating system: fork, exec, getpid, exit,
wait, stat, opendir, readdir
2. Write programs using the I/O system calls of UNIX operating system (open, read, write, etc)
3. Write C programs to simulate UNIX commands like ls, grep, etc.
4. Given the list of processes, their CPU burst times and arrival times, display/print the Gantt chart for
FCFS and SJF. For each of the scheduling policies, compute and print the average waiting time and
average turnaround time (2 sessions)
5. Given the list of processes, their CPU burst times and arrival times, display/print the Gantt chart for
Priority and Round robin. For each scheduling policy, compute and print the average waiting and
turnaround times (2 Sessions).
6. Developing Applications using Inter Process communication (using shared memory and pipes)
7. Simulate the Producer-Consumer problem using semaphores (using UNIX system calls).
8. Simulate First fit, best fit and Worst fit memory management algorithms.
9. Simulate Page Replacement Algorithms (FIFO, LRU and Optimal)
10. Simulate the Paging memory management scheme
1. To obtain a basic understanding of Positive emotions, strengths and virtues; the concepts and
determinants of happiness and well-being.
2. To bring an experience marked by predominance of positive emotions and informing them
about emerging paradigm of Positive Psychology
3. Build relevant competencies for experiencing and sharing happiness as lived experience and
its implication.
4. To become aware of contextual and cultural influences on health and happiness.
COURSE OUTCOMES: On successful completion of the course, the students will be able to
1. Provide an insight to see the importance of positive emotions, Strength and Virtues in
everyday life and society.
2. Use the strength and virtues in improving human behavior and mental health.
3. Understand the biological, social, psychological and spiritual determinants of Happiness and
well-being.
4. Light on research findings related to effects of happiness and well-being on mental illness and
stress.
5. Give an insight of the Indian philosophy of happiness and life satisfaction in context of
Karma, Moksha and destiny and role of socio-demographic and cultural factors in Happiness
and well-being.
6. Establish work life balance in an individual’s life.
Indian philosophy of happiness and life satisfaction. – Karma, Moksha and destiny. theory of
happiness and wellbeing in Taittiriya Upanishad, Role of socio-demographic and cultural factors in
Happiness and well-being. Health and Happiness in contemporary India – rural and urban differences
and similarities.
SUGGESTED READINGS:
SYLLABUS
For
B.TECH
(Computer Science and Engineering)
4TH Year
SEMESTER-VII
Evaluation
Scheme Subject
Subject Periods
S. NO. Sessional Total Credit
Codes Category Subject ESE
Exam
L T P CT TA Total TE PE
AHT-015 Rural Development Administration
1 /AHT- HSC and Planning/ Project Management 3 1 0 30 20 50 100 150 3
016 and Entrepreneurship
CST-
2 DE DepartmentalElective-4 3 0 0 30 20 50 100 150 3
0XX
CST-
3 DE DepartmentalElective-5 3 0 0 30 20 50 100 150 3
0XX
CSO-
4 OE Open Elective-2 3 0 0 30 20 50 100 150 3
0XX
5 CSP-017 DLC Machine Learning Lab 0 0 2 25 25 25 50 1
6 CSP-018 DLC Project Seminar 0 0 2 50 50 1
7 CSP-019 DLC Design Project 0 0 4 100 100 2
8 CSP-020 DLC Mini Project-III or Internship-III* 0 0 2 50 50 1
9 AHT-017 MC Disaster Management 2 0 0 50 50 50 100 2
10 AHT-018 NC Innovations and Problem Solving 2 1 0 15 10 25 50
11 GP-007 NC General Proficiency 50
Total 12 1 12 900 19
12 Minor Course (Optional)** 3 1 0 30 20 50 100 4
*The Internship-III (4-6weeks) will be conducted during summer break after the VI semester and will be assessed
during VII semester.
MOOCs course
Open Elective -2 (This course can be taken only by the students of branches other than CSE and
specialized branches of CSE in VIIth semester. Students of CSE and specialized branches of CSE
shall opt open electives floated by other departments)
OpenElective-2
S. No. Subject Code Subject Name
1 CSO-051 Computer Network
Abbreviations: L-No. of Lecture hours per week, T-No. of Tutorial hours per week, P-No. of Practical hours per
week, CT-Class Test Marks, TA-Marks of teacher’s assessment including student’s class performance and
attendance, PS-Practical Sessional Marks, ESE-End Semester Examination, TE- Theory Examination Marks, PE-
Practical External Examination Marks
Minor Courses (Optional) **: Select any subject from Annexure – II from other departments
1 Hr Lecture 1 Hr Tutorial 2 or 3 Hr Practical
1 Credit 1 Credit 1 Credit
SEMESTER-VIII
Evaluation Scheme
Subject
Subject Periods Sessional
S. NO. ESE Total Credit
Codes Category Subject Exam
L T P CT TA Total TE PE
AHT-015 / Rural Development
AHT-016 Administration and Planning/
1 HSC 3 0 0 30 20 50 100 150 3
Project Management and
Entrepreneurship
2 CST-0XX DE DepartmentalElective-6 3 0 0 30 20 50 100 150 3
CSO-0XX
3 OE OpenElective-3 3 0 0 30 20 50 100 150 3
Total 12 0 12 900 18
7 Minor Course (Optional)** 3 1 0 30 20 50 100 4
MOOCs course
DepartmentalElective-6
S. No. Subject Code Subject Name
1 CST-039 Soft Computing
2 CST-040 Software Project Management
3 CST-041 Cyber and Digital Forensics
4 CST-042 Digital Image Processing
5 CST-043 Big Data Analytics
and Open Elective-4 (This course can be taken only by the students of branches other
Open Elective-3
than CSE and specialized branches of CSE in VIII th semester. Students of CSE and specialized
branches of CSE shall opt open electives floated by other departments)
Abbreviations: L-No. of Lecture hours per week, T-No. of Tutorial hours per week, P-No. of Practical hours per
week, CT-Class Test Marks, TA-Marks of teacher’s assessment including student’s class performance and
attendance, PS-Practical Sessional Marks, ESE-End Semester Examination, TE- Theory Examination Marks, PE-
Practical External Examination Marks
Minor Courses (Optional) **: Select any subject from Annexure – II from other departments
Course Objectives
This course enables the students to:
1. Gain knowledge on the concepts related to administration, its importance and various
approaches of Development Administration.
2. Gain skills on New Public Management, Public Grievances and Redressal
Mechanisms, Accountability and Transparency in Administration and e-governance in
the rural development sector.
3. Develop their competency on the role of Bureaucracy in Rural Development.
Course Outcomes
After completion of the course student will be able to:
1. Students can understand the definitions, concepts and components of Rural
Development.
2. Students will know the importance, structure, significance, resources of Indian rural
economy.
3. Students will have a clear idea about the area development programmes and its
impact.
4. Students will be able to acquire knowledge about rural entrepreneurship.
5. Students will be able to understand about the using of different methods for human
resource planning.
Course Contents
UNIT-I: (8 hours)
Rural Planning & Development: Concepts of Rural Development, Basic elements of rural
Development, and Importance of Rural Development for creation of Sustainable Livelihoods,
An overview of Policies and Programmes for Rural Development- Programmes in the
agricultural sector, Programmes in the Social Security, Programmes in area of Social Sector.
UNIT-II: (8 hours)
Rural Development Programmes: Sriniketan experiment, Gurgaon experiment,
Marthandam experiment, Baroda experiment, Firkha development scheme, Etawapilot
project, Nilokheri experiment, approaches to rural community development: Tagore, Gandhi
etc.
UNIT-III: (8 hours)
Panchayati Raj & Rural Administration: Administrative Structure: bureaucracy, structure
of administration; Panchayati Raj Institutions Emergence and Growth of Panchayati Raj
Institutions in India; People and Panchayati Raj; Financial Organizations in Panchayati Raj
Institutions, Structure of rural finance, Government & Non-Government Organizations /
Community Based Organizations, Concept of Self help group.
UNIT-IV: (8 hours)
Human Resource Development in Rural Sector: Need for Human Resource Development,
Elements of Human Resource Development in Rural Sector Dimensions of HRD for rural
development-Health, Education, Energy, Skill Development, Training, Nutritional Status
access to basic amenities – Population composition.
UNIT-V: (8 hours)
Rural Industrialization and Entrepreneurship: Concept of Rural Industrialization,
Gandhian approach to Rural Industrialization, Appropriate Technology for Rural Industries,
Entrepreneurship and Rural Industrialization- Problems and diagnosis of Rural
Entrepreneurship in India, with special reference to Women Entrepreneurship; Development
of Small Entrepreneurs in India, need for and scope of entrepreneurship in Rural area.
Text Books/References:
COURSE OBJECTIVES:
COURSE OUTCOMES:
UNIT-I: (8 hours)
Entrepreneurship: Entrepreneurship: need, scope , Entrepreneurial competencies & traits,
Factors affecting entrepreneurial development, Entrepreneurial motivation (Mc Clellend’s
Achievement motivation theory), conceptual model of entrepreneurship , entrepreneur vs.
intrapreneur; Classification of entrepreneurs; Entrepreneurial Development Programmes.
UNIT-II (8 hours)
Entrepreneurial Idea and Innovation: Introduction to Innovation, Entrepreneurial Idea
Generation and Identifying Business Opportunities, Management skills for Entrepreneurs and
managing for Value Creation, Creating and Sustaining Enterprising Model & Organizational
Effectiveness.
UNIT-III: (8 hours)
Project Management: Project management: meaning, scope & importance, role of project
manager; project life-cycle Project appraisal: Preparation of a real time project feasibility
report containing Technical appraisal, Environmental appraisal, Market appraisal (including
market survey for forecasting future demand and sales) and Managerial appraisal.
UNIT-IV (8 hours)
Project Financing: Project cost estimation & working capital requirements, sources of
funds, capital budgeting, Risk & uncertainty in project evaluation , preparation of projected
financial statements viz. Projected balance sheet, projected income statement, projected funds
& cash flow statements, Preparation of detailed project report, Project finance.
UNIT-V: (8 hours)
Social Entrepreneurship: Social Sector Perspectives and Social Entrepreneurship, Social
Entrepreneurship Opportunities and Successful Models, Social Innovations and
Sustainability, Marketing Management for Social Ventures, Risk Management in Social
Enterprises, Legal Framework for Social Ventures.
Case study and presentations: Case study of successful and failed entrepreneurs. Power
point presentation on current business opportunities..
Text Book:
1. Innovation and Entrepreneurship by Drucker, P.F.; Harperand Row.
2. Business, Entrepreneurship and Management: Rao, V.S.P.;Vikas
3. Entrepreneurship: Roy Rajeev.
4. TextBookofProjectManagement:Gopalkrishnan,P.andRamamoorthy,V.E.;McMill.
5. Project Management for Engineering, Business and Technology: Nicholas, J.M., and
Steyn, H.;PHI.
6. Project Management: The Managerial Process: Gray, C.F., Larson, E.W. and Desai,
G.V.;MGH.
COURSE OUTCOMES: On successful completion of this course, the students will be able to
1. Impart the trends in emerging field of wireless ad hoc and sensor networking.
2. Focus on layered communication modeling, such as the media access control and network layer.
3. Understand the basic concept of QoS and Multicast routing protocol.
4. Address quality of service issues and network reliability for transmission of real-time information.
5. Learn the various routing protocols of ad hoc and sensor networks
Characteristics of the Wireless Channel, IEEE 802.11a/b Standard, Origin of Ad-hoc Packet Radio Networks,
Unit 2- ADHOC NETWORK ROUTING PROTOCOLS: Introduction -to designing a Routing Protocol,
Classifications of Routing Protocols, Destination Sequenced Distance Vector (DSDV), Dynamic Source
Routing (DSR), Zone Routing Protocol (ZRP), Wireless Routing Protocol (WRP), Source—Initiated On—
Unit 3- QoS AND Multicast Routing Protocol in MANET: Issues and challenges in providing QoS in Adhoc
Wiress Networks, Introduction to QoS in Ad hoc Wireless Networks, Classifications of QoS Solutions,
technologies for wireless sensor networks, Advantages of sensor networks, Sensor network applications.
Unit 5- WSN PROTOCOLS: Communication protocols, MAC protocaols, Namlng and Addressing-Routing
TEXT BOOKS:
1. C. Siva Ram Murthy and B. S. Manoj, ―Ad Hoc Wireless Networks Architectures and Protocols,
Prentice Hall, PTR, 2004.
2. Holger Karl , Andreas willig, ―Protocol and Architecture for Wireless Sensor Networks, John wiley
publication, Jan 2006.
REFERENCE BOOKS:
1. Feng Zhao, Leonidas Guibas, ―Wireless Sensor Networks: an information processing approach,
Elsevier publication, 2004.
2. Charles E. Perkins, ―Ad Hoc Networking, Addison Wesley, 2000.
3. I.F. Akyildiz, W. Su, Sankarasubramaniam, E. Cayirci, ―Wireless sensor networks: a survey,
computer networks, Elsevier, 2002, 394 - 422.
1. Understand the need for machine learning for various problem solving.
2. Study the various supervised, semi-supervised and unsupervised learning algorithms in machine
learning.
3. Learn and design the appropriate machine learning algorithms for problem solving.
COURSE OUTCOME: On successful completion of this course, the students will be able to
1. Learn the basics of learning problems with hypothesis and version spaces.
2. Understand the machine learning algorithms as supervised learning and unsupervised learning and
Apply and analyze the various algorithms of supervised and unsupervised learning.
3. Analyze the concept of neural networks for learning linear and non-linear activation functions.
4. Learn the concepts in tree, probability and graphical based models and methods.
5. Understand the fundamental concepts of Genetic Algorithm and Analyze and design the genetic
algorithms for optimization engineering problems.
Unit 1- INTRODUCTION: Learning – Types of Machine Learning – Supervised Learning – The Brain and
the Neuron – Design a Learning System – Perspectives and Issues in Machine Learning – Concept Learning
Task – Concept Learning as Search – Finding a Maximally Specific Hypothesis – Version Spaces and the
Candidate Elimination Algorithm – Linear Discriminants – Perceptron – Linear Separability – Linear
Regression.
Unit 2- LINEAR MODELS: Multi-layer Perceptron – Going Forwards – Going Backwards: Back Propagation
Error – Multilayer Perceptron in Practice – Examples of using the MLP – Overview – Deriving Back
Propagation – Radial Basis Functions and Splines – Concepts – RBF Network – Curse of Dimensionality –
Interpolations and Basis Functions – Support Vector Machines.
Unit 3- TREE AND PROBABILISTIC MODELS: Learning with Trees – Decision Trees – Constructing
Decision Trees – Classification and Regression Trees – Ensemble Learning – Boosting – Bagging – Different
ways to Combine Classifiers – Probability and Learning – Data into Probabilities – Basic Statistics – Gaussian
Mixture Models – Nearest Neighbor Methods – Unsupervised Learning – K means Algorithms – Vector
Quantization – Self Organizing Feature Map
Learning – Genetic algorithms – Genetic Offspring: - Genetic Operators – Using Genetic Algorithms –
Reinforcement Learning – Overview – Getting Lost Example – Markov Decision Process
Unit 5- GRAPHICAL MODELS: Markov Chain Monte Carlo Methods – Sampling – Proposal Distribution –
Markov Chain Monte Carlo – Graphical Models – Bayesian Networks – Markov Random Fields – Hidden
Markov Models – Tracking Methods
TEXT BOOK:
1. Tom M. Mitchell, ―Machine Learning, McGraw-Hill Education (India) Private Limited, 2013.
2. Jason Bell, ―Machine learning – Hands on for Developers and Technical Professionals‖, First Edition,
Wiley, 2014
3. Peter Flach, ―Machine Learning: The Art and Science of Algorithms that Make Sense of Data, First
Edition, Cambridge University Press, 2012.
REFERENCE BOOKS:
1. EthemAlpaydin, ―Introduction to Machine Learning 3e (Adaptive Computation and Machine
Learning Series) Third Edition, MIT Press, 2014
2. Ethem Alpaydin, ―Introduction to Machine Learning (Adaptive Computation and Machine Learning),
The MIT Press 2004.
3. Stephen Marsland, ―Machine Learning: An Algorithmic Perspective, CRC Press, 2009.
4. Stephen Marsland, ―Machine Learning – An Algorithmic Perspective‖, Second Edition, Chapman and
Hall/CRC Machine Learning and Pattern Recognition Series, 2014.
COURSE OUTCOME: On successful completion of this course, the students will be able to
Unit 1- Introduction: Issues, Challenges, and benefits of Mobile Computing, IEEE 802.11 & Bluetooth,
Unit 2- Data Management Issues: Wireless computing, nomadic computing, ubiquitous computing and
tunneling, data replication for mobile computers, adaptive Clustering for Mobile Wireless networks, LEACH
and TORA, mobile TCP (M-TCP) Spooning TCP, Frequency for radio transmission.
Unit 3- Distributed location Management: pointer forwarding strategies, Process communication techniques,
Socket Programming, RPC, RMI, Mobile IP, TCP Over wireless. Hidden and exposed terminal problems.
Unit 4- Routing Protocols: Routing Protocol, Dynamic State Routing (DSR), Ad hoc On-Demand Distance
Vector (AODV), and Destination Sequenced Distance – Vector Routing (DSDV), Cluster Based Routing
Protocol (CBRP).
Unit 5- Fault tolerance and security: Security and fault tolerance, transaction processing in Mobile computing
environment. Mobile Agent Systems: Aglets, PMADE, Case Studies, agent failure scenarios, node failure
TEXT BOOKS:
1. Jochen Schiller, ―Mobile Communications, PHI, Second Edition, 2003.
2. Prasant Kumar Pattnaik, Rajib Mall, ―Fundamentals of Mobile Computing, PHI Learning Pvt. Ltd,
New Delhi – 2012
REFERENCE BOOKS:
1. Dharma Prakash Agarval, Qing and An Zeng, "Introduction to Wireless and Mobile systems, Thomson
Asia Pvt Ltd, 2005.
2. Uwe Hansmann, Lothar Merk, Martin S. Nicklons and Thomas Stober, ―Principles of Mobile
Computing, Springer, 2003.
3. William.C.Y.Lee,―Mobile Cellular Telecommunications-Analog and Digital Systems, Second
Edition,TataMcGraw Hill Edition ,2006.
4. C.K.Toh, ―AdHoc Mobile Wireless Networks, First Edition, Pearson Education, 2002.
COURSE OUTCOMES: On successful completion of this course, the students will be able to
1. Interpret the contribution of data warehousing and data mining to the decision-support level of
organizations
2. Evaluate different models used for OLAP and data preprocessing
3. Categorize and carefully differentiate between situations for applying different data-mining techniques:
frequent pattern mining, association, correlation, classification, prediction, and cluster and outlier
analysis
4. Design, implement and evaluate the performance of different data-mining algorithms
5. Propose data-mining solutions for different applications
Unit 1- DATA WAREHOUSE: Data Warehousing - Operational Database Systems vs Data Warehouses -
Multidimensional Data Model - Schemas for Multidimensional Databases – OLAP operations – Data
Warehouse Architecture – Indexing – OLAP queries & Tools.
Unit 2- DATA MINING & DATA PREPROCESSING: Introduction to KDD process – Knowledge
Discovery from Databases - Need for Data Pre-processing – Data Cleaning – Data Integration and
Transformation – Data Reduction – Data Discretization and Concept Hierarchy Generation.
Unit 3- ASSOCIATION RULE MINING: Introduction - Data Mining Functionalities - Association Rule
Mining - Mining Frequent Item sets with and without Candidate Generation - Mining Various Kinds of
Association Rules - Constraint – Based Association Mining.
Unit 5- CLUSTERING: Cluster Analysis - Types of Data in Cluster Analysis – A Categorization of Major
Clustering Methods – Partitioning Methods – Hierarchical methods – Density-Based Methods – Grid-Based
Methods – Model-Based Clustering Methods – Clustering High- Dimensional Data – Constraint-Based Cluster
Analysis – Outlier Analysis.
Data Visualization: Principles, Parallel Coordinates, Visualization Neural Networks, Visualization of trees.
TEXTBOOKS:
1. Data Mining – Concepts and Techniques – Jiawei Han & Micheline Kamber, 3rd Edition Elsevier.
2. Data Mining, pang-ning tan and Michael steinbach, second edition, Pearson Education.
3. Data Mining Introductory and Advanced topics – Margaret H Dunham, PEA.
4. Ian H. Witten and Eibe Frank, Data Mining: Practical Machine Learning Tools and Techniques
(Second Edition), Morgan Kaufmann, 2005.
REFERENCE BOOKS:
1. K.P. Soman, ShyamDiwakar and V. Ajay, “Insight into Data mining Theory and Practice”, Easter
Economy Edition, Prentice Hall of India, 2006.
2. G. K. Gupta, “Introduction to Data Mining with Case Studies”, Easter Economy Edition
BLOCKCHAIN (CST-033)
L:T:P:: 3:0:0 Credits-03
COURSE OUTCOMES: On successful completion of this course, the students will be able to
Unit 1-Introduction: Overview of Blockchain, Public Ledgers, Bitcoin, Smart Contracts, Block in a
Blockchain, Transactions, Distributed Consensus, Public vs Private Blockchain, Understanding Crypto currency
toBlockchain, Permissioned Model of Blockchain, Overview of Security aspects of Blockchain. Basic Crypto
Primitives: Cryptographic Hash Function, Properties of a hash function, Hash pointer and Merkle tree, Digital
Signature, Public Key Cryptography, A basic cryptocurrency.
Unit 2-Understanding Blockchain with Crypto currency: Bitcoin and Blockchain: Creation of coins,
Payments and double spending, Bitcoin Scripts, Bitcoin P2P Network, Transaction in Bitcoin Network, Block
Mining, Block propagation and block relay. Working with Consensus in Bitcoin: Distributed consensus in
open environments, Consensus in a Bitcoin network, Proof of Work (PoW) – basic introduction, HashcashPoW,
BitcoinPoW, Attacks on PoW and the monopoly problem, Proof of Stake, Proof of Burn and Proof of Elapsed
Time, The life of a Bitcoin Miner, Mining Difficulty, Mining Pool.
Unit 3-Understanding Blockchain for Enterprises: Permissioned Block chain: Permissioned model and use
cases, Design issues for Permissioned Blockchains, Execute contracts, State machine replication, Overview of
Consensus models for permissioned Blockchain- Distributed consensus in closed environment, Paxos, RAFT
Consensus, Byzantine general problem, Byzantine fault tolerant system, Lamport-Shostak-Pease BFT
Algorithm, BFT over Asynchronous systems.
Unit 4-Enterprise application of Blockchain: Cross border payments, Know Your Customer (KYC), Food
Security, Mortgage over Block chain, Block chain enabled Trade, We Trade – Trade Finance Network,
Unit 5-Blockchain application development: Hyperledger Fabric- Architecture, Identities and Policies,
Membership and Access Control, Channels, Transaction Validation, Writing smart contract using Hyperledger
Fabric, Writing smart contract using Ethereum, Overview of Ripple and Corda
TEXT BOOKS:
1. Melanie Swan, “Block Chain: Blueprint for a New Economy”, O‟Reilly, first edition – 2015.
2. Daniel Drescher, “Block Chain Basics”, Apress; 1stedition, 2017.
3. Anshul Kaushik, “Block Chain and Crypto Currencies”, Khanna Publishing House, Delhi.
4. Imran Bashir, “Mastering Block Chain: Distributed Ledger Technology, Decentralization and Smart
Contracts Explained”, Packt Publishing, first edition – 2012.
REFERENCE BOOKS:
1. Ritesh Modi, “Solidity Programming Essentials: A Beginner‟s Guide to Build Sma Ethereum and
Block Chain”, Packt Publishing.
2. Antony Lewis, “The Basics of Bitcoins and Blockchains: An Introduction to Cryptocurrencies and the
Technology that Powers Them (Cryptography, Crypto Trading, Digital Assets)”, Mango Publications.
3. Melanie Swan, “Blockchain: Blueprint for a New Economy”, O’Reilly, 2015.
1. Learn concepts, techniques and tools they need to deal with various facets of data science practice,
including data collection and integration.
2. Understand the basic types of data and basic statistics.
3. Identify the importance of data reduction and data visualization techniques
COURSE OUTCOMES: On successful completion of this course, the students will be able to
1. Demonstrate the mathematical foundations needed for data science.
2. Collect, explore, clean and manipulate data.
3. Demonstrate the basic concepts of machine learning.
4. Implement models such as k-nearest Neighbors, Naive Bayes, linear and logistic regression,
decision trees, neural networks and clustering.
5. Build data science applications using Python based toolkits.
Unit 1-Introduction to Data Science: Concept of Data Science, Traits of Big data, Web Scraping, Analysis vs
Reporting
Unit 2-Introduction to Programming Tools for Data Science: Toolkits using Python: Matplotlib, NumPy,
Scikit-learn, NLTK Visualizing Data: Bar Charts, Line Charts, Scatterplots Working with data: Reading Files,
Scraping the Web, Using APIs (Example: Using the Twitter APIs), Cleaning , Manipulating Data, Rescaling,
Dimensionality Reduction
Unit 3-Mathematical Foundations: Linear Algebra: Vectors, Matrices, Statistics: Describing a Single Set
of Data, Correlation, Simpson’s Paradox, Correlation and Causation Probability: Dependence and
Independence, Conditional Probability, Bayes’s Theorem, Random Variables, Continuous Distributions, The
Normal Distribution
Unit 4-Machine Learning: Overview of Machine learning concepts – Over fitting and train/test splits,
Types of Machine learning – Supervised, Unsupervised, Reinforced learning, Introduction to Bayes Theorem,
Linear Regression- model assumptions, regularization (lasso, ridge, elastic net), Classification and
Regression algorithms- Naïve Bayes, K-Nearest Neighbors, logistic regression, support vector machines
(SVM), decision trees, and random forest, Classification Errors, Analysis of Time Series- Linear
Systems Analysis, Nonlinear Dynamics, Rule Induction, Neural Networks- Learning and Generalization,
Overview of Deep Learning.
Unit 5-Case Studies of Data Science Application: Weather forecasting, Stock market prediction, Object
TEXT BOOKS:
1. Doing Data Science, Straight Talk from The Frontline. Cathy O’Neil and Rachel Schutt, O’Reilly,
2014.
2. Jiawei Han, Micheline Kamber and Jian Pei. Data Mining: Concepts and Techniques, 3rd ed. The
Morgan Kaufmann Series in Data Management Systems.
3. K G Srinivas, G M Siddesh, “Statistical programming in R”, Oxford Publications.
REFERENCE BOOKS:
1. Introduction to Data Mining, Pang-Ning Tan, Vipin Kumar, Michael Steinbanch, Pearson Education.
2. Brain S. Everitt, “A Handbook of Statistical Analysis Using R”, Second Edition, 4 LLC, 2014.
3. Dalgaard, Peter, “Introductory statistics with R”, Springer Science & Business Media, 2008.
4. Paul Teetor, “R Cookbook”, O’Reilly, 2011.
1. Explain the importance and application of each of confidentiality, integrity, authentication and
availability.
2. Understand various cryptographic algorithms and basic categories of threats to computers and
networks.
3. Describe the enhancements made to IPv4 by IPSec.
4. Understand Intrusions, intrusion detection, Web security and Firewalls.
COURSE OUTCOMES: On Successful completion of this course, the students will be able to
1. Identify the various attacks and its issues.
2. Learn usage of cryptographic algorithms for avoiding basic level threats.
3. Comprehend the issues involved in Integrity, Authentication and Key Management techniques.
4. Realize the importance of user authentication and Kerberos concepts.
5. Acquire the knowledge of network and system security domain.
Unit 2- Number Theory and Public Key Encryption: Fermat's and Euler's Theorem, Primality Testing,
Chinese Remainder Theorem , Public-Key Cryptography: Principles of Public-Key Cryptosystems, RSA
Algorithm.
Unit 3- Key Management: Key Management scenario in secret key and public key cryptography, Diffie
Hellman Key Exchange algorithm, OAKLEY and ISAKMP key management protocol, Elliptic Curve
Cryptography
Unit 4-Hash Functions: Message Authentication and Hash Functions: Authentication Requirements,
Authentication Functions, Message Authentication Codes, Hash Function Birthday Attacks, Security of Hash
Function and MACS, MD5 Message Digest Algorithm, Secure Hash Algorithm (SHA), Digital Signatures,
Digital Signature Standard (DSS).
Unit 5- Network and System Security: Authentication Applications: Kerberos, X.509, Electronic Mail
Security, Pretty Good Privacy (PGP),S/Mine Security: Architecture, Authentication Header, Encapsulating
Security Payloads, Combining Security Associations, Key Management, Web Security: Secure Socket Layer
and Transport Layer Security, Secure Electronic Transaction (SET), System Security: Intruders, Viruses,
Firewall Design Principles, Trusted Systems.
TEXT BOOKS:
1. Cryptography and Network Security - Principles and Practice: William Stallings, Pearson Education,
6th Edition.
2. Cryptography and Network Security: Atul Kahate, Mc Graw Hill, 3rd Edition.
REFERENCE BOOKS:
1. Cryptography and Network Security: C K Shyamala, N Harini, Dr T R Padmanabhan, Wiley India, 1st
Edition.
2. Cryptography and Network Security: Forouzan Mukhopadhyay, Mc Graw Hill, 3rd Edition.
3. Information Security, Principles, and Practice: Mark Stamp, Wiley India.
4. Principles of Computer Security: WM. Arthur Conklin, Greg White, TMH.
5. Introduction to Network Security: Neal Krawetz, CENGAGE Learning.
6. Network Security and Cryptography: Bernard Menezes, CENGAGE Learning.
DEVOPS (CST-036)
COURSE OUTCOMES: On successful completion of this course, the students will be able to
1. Identify components of Devops environment.
2. Describe Software development models and architectures of DevOps.
3. Apply different project management, integration, testing and code deployment tool.
4. Investigate different DevOps Software development models.
5. Assess, collaborate, and adopt Devops in real-time projects
Unit 1-Introduction: Introduction, Agile development model, DevOps, and ITIL. DevOps process and
Continuous Delivery, Release management, Scrum, Kanban, delivery pipeline, bottlenecks, examples.
Unit 2-Software development models and DevOps: DevOps Lifecycle for Business Agility, DevOps, and
Continuous Testing.
DevOps influence on Architecture: Introducing software architecture, The monolithic scenario, Architecture
rules of thumb, The separation of concerns, Handling database migrations, Microservices, and the data tier,
DevOps, architecture, and resilience.
Unit 3-Introduction to project management: The need for source code control, The history of source code
management, Roles and code, source code management system and migrations, Shared authentication, Hosted
Git servers, Different Git server implementations, Docker intermission, Gerrit, The pull request model, GitLab.
Unit 4-Integrating the system: Build systems, Jenkins build server, Managing build dependencies, Jenkins
plugins, and file system layout, The host server, Build slaves, Software on the host, Triggers, Job chaining and
build pipelines, Build servers and infrastructure as code, Building by dependency order, Build phases,
Alternative build servers, Collating quality measures.
Unit 5-Testing Tools and automation: Various types of testing, Automation of testing Pros and cons,
Selenium - Introduction, Selenium features, JavaScript testing, Testing backend integration points, Test-driven
development, REPL-driven development
Deployment of the system: Deployment systems, Virtualization stacks, code execution at the client, Puppet
master and agents, Ansible, Deployment tools: Chef, Salt Stack and Docker
TEXTBOOKS:
1. Joakim Verona. Practical Devops, Second Edition. Ingram short title; 2nd edition (2018). ISBN10:
1788392574.
2. Deepak Gaikwad, Viral Thakkar. DevOps Tools from Practitioner's Viewpoint. Wiley publications.
ISBN: 9788126579952
REFERENCE BOOK:
1. Len Bass, Ingo Weber, Liming Zhu. DevOps: A Software Architect's Perspective. Addison Wesley;
ISBN-10.
COURSE OUTCOMES: Upon completion of this course, the students will be able to
1. Impart the knowledge of cloud computing and technologies, issues in cloud computing etc.
2. Design and develop cloud and implement various services on cloud.
3. To develop an understating of virtualization technology and its different dimensions.
4. Investigate the issues and challenges in implementing cloud security.
5. Compare and contrast various open and proprietary cloud platforms
Unit 1- Introduction to Cloud Computing: Definition, Characteristics, Components, Cloud provider, SAAS,
PAAS, IAAS and Others, Organizational scenarios of clouds, Administering & Monitoring cloud services,
benefits and limitations, Deploy application over cloud.
Cloud computing platforms: Infrastructure as service: Amazon EC2, Platform as Service: Google App Engine,
Microsoft Azure, Utility Computing, Elastic Computing
Unit 2- Introduction to Cloud Technologies: Study of Hypervisors, Web services: SOAP and REST, SOAP
versus REST, AJAX: asynchronous 'rich' interfaces, Mashups: user interface services.
Virtualization Technology: Virtual machine technology, Virtual Machine migration, virtualization applications
in enterprises, Pitfalls of virtualization.
Multitenant software: Multi-entity support, Multi-schema approach, Multi-tenancy using cloud data stores,
Data access control for enterprise applications,
Unit 3- Data and Security in the cloud: Relational databases, Cloud file systems: GFS and HDFS, Big Table,
HBase and Dynamo. Map-Reduce and extensions: Parallel computing, Map-Reduce model, Enterprise batch
processing using Map-Reduce.
Cloud computing security challenges: Virtualization security management- virtual threats, VM Security
Recommendations, VM-Specific Security techniques, Secure Execution Environments and Communications in
cloud
Unit 4- Service Management and Monitoring in Cloud: Traditional Approaches to SLO Management, Types
of SLA, Life Cycle of SLA, SLA Management in Cloud.
Monitoring in cloud: Implementing real time application over cloud platform, Cloud Federation, QOS Issues in
Cloud, Dependability, data migration, streaming in Cloud. Cloud Middleware, load balancing, resource
optimization, resource dynamic reconfiguration,
Unit 5- Cloud computing platforms: Installing cloud platforms and performance evaluation Features and
functions of cloud platforms: Xen Cloud Platform, Eucalyptus, OpenNebula, Nimbus, T-Platform, Apache
Virtual Computing Lab (VCL), Enomaly Elastic Computing Platform
TEXT BOOK:
1. Kai Hwang, Geoffrey C. Fox and Jack J. Dongarra, “Distributed and cloud computing from Parallel
Processing to the Internet of Things”, Morgan Kaufmann, Elsevier, 2012.
2. Rittinghouse, John W., and James F. Ransome, “Cloud Computing: Implementation, Management and
Security”, CRC Press, 2017.
REFERENCE BOOK:
1. Rajkumar Buyya, Christian Vecchiola, S. ThamaraiSelvi, “Mastering Cloud Computing”, Tata Mcgraw
Hill, 2013.
2. Toby Velte, Anthony Velte, Robert Elsenpeter, “Cloud Computing – A Practical Approach, Tata
Mcgraw Hill, 2009.
3. Barrie Sosinsky, “Cloud Computing Bible” John Wiley & Sons, 2010.
4. Tim Mather, Subra Kumaraswamy, and Shahed Latif, “Cloud Security and Privacy An Enterprise
Perspective on Risks and Compliance”, O'Reilly, 2009.
1. Understand natural language processing and learn how to apply basic algorithms in this field.
2. Acquire the basic concepts and algorithmic description of the main language levels: morphology,
syntax, semantics, and pragmatics.
3. Design and implement applications based on natural language processing.
COURSE OUTCOMES: On successful completion of this course, the students will be able to
1. Have a broad understanding of the capabilities and limitations of current natural language
technologies.
2. Able to model linguistic phenomena with formal grammars.
3. Be able to Design, implement and test algorithms for NLP problems.
4. Understand the mathematical and linguistic foundations underlying approaches to the various areas in
NLP.
5. Able to apply NLP techniques to design real world NLP applications such as machine translation, text
categorization, text summarization, information extraction...etc.
UNIT - I
Introduction: History of NLP, Generic NLP system, levels of NLP, Knowledge in language processing,
Ambiguity in Natural language, stages in NLP, challenges of NLP ,Applications of NLP.
UNIT - II
Word Level Analysis: Morphology analysis –survey of English Morphology, Inflectional morphology &
Derivational morphology, Lemmatization, Regular expression, finite automata, finite state transducers (FST),
Morphological parsing with FST, Lexicon free FST Porter stemmer. N –Grams- N-gram language model, N-
gram for spelling correction.
UNIT - III
Syntax Analysis: Part-Of-Speech tagging (POS)- Tag set for English (Penn Treebank) , Rule based POS
tagging, Stochastic POS tagging, Issues –Multiple tags & words, Unknown words. Introduction to CFG,
Sequence labeling: Hidden Markov Model (HMM), Maximum Entropy, and Conditional Random Field (CRF).
UNIT - IV
Semantic Analysis: Lexical Semantics, Attachment for fragment of English- sentences, noun phrases, Verb
phrases, prepositional phrases, Relations among lexemes & their senses –Homonymy, Polysemy, Synonymy,
Hyponymy, WordNet, Robust Word Sense Disambiguation (WSD), Dictionary based approach.
Pragmatics: Discourse reference resolution, reference phenomenon, syntactic & semantic constraints on co
reference
UNIT – V
Applications (preferably for Indian regional languages): Machine translation, Information retrieval,
Question answers system, categorization, summarization, sentiment analysis, Named Entity Recognition.
TEXTBOOKS:
1. Daniel Jurafsky, James H. Martin ―Speech and Language Processing‖ Second Edition, Prentice Hall,
2008.
2. Christopher D.Manning and Hinrich Schutze, ― Foundations of Statistical Natural Language
Processing ―, MIT Press, 1999.
REFERENCE BOOKS:
1. Siddiqui and Tiwary U.S., Natural Language Processing and Information Retrieval, Oxford University
Press (2008).
2. Daniel M Bikel and Imed Zitouni ― Multilingual natural language processing applications Pearson,
2013.
3. Alexander Clark (Editor), Chris Fox (Editor), Shalom Lappin (Editor) ― The Handbook of
Computational Linguistics and Natural Language Processing ― ISBN: 978-1-118-.
4. Steven Bird, Ewan Klein, Natural Language Processing with Python, O ‘Reilly.
5. Brian Neil Levine, An Introduction to R Programming.
6. Niel J le Roux, Sugnet Lubbe, A step by step tutorial: An introduction into R application and
programming
Unit 1- Data communication Components: Representation of data and its flow Networks, Various Connection
Topology, Protocols and Standards, OSI model, Transmission Media, LAN: Wired LAN, Wireless LANs,
Connecting LAN and Virtual LAN, Techniques for Bandwidth utilization: Multiplexing - Frequency division,
Time division and Wave division, Concepts on spread spectrum.
Unit 2- Data Link Layer and Medium Access Sub Layer: Error Detection and Error Correction -
Fundamentals, Block coding, Hamming Distance, CRC; Flow Control and Error control protocols - Stop and
Wait, Go back – N ARQ, Selective Repeat ARQ, Sliding Window, Piggybacking, Random Access,
Multiple access protocols- Pure ALOHA, Slotted ALOHA, CSMA/CD, CDMA/CA, high level data link
control(HDLC), Point To Point protocol (PPP).
Unit 3- Network Layer: Repeater, Hub, Switches, Bridges, Gateways, Switching, Logical addressing – IPV4,
IPV6, Address mapping – ARP, RARP, BOOTP and DHCP–Delivery, Forwarding and Unicast Routing
protocols.
Unit 4- Transport Layer: Process to Process Communication, User Datagram Protocol (UDP), Transmission
Control Protocol (TCP), SCTP Congestion Control; Quality of Service, QoS improving techniques: Leaky
Bucket and Token Bucket algorithm.
Unit 5- Application Layer: Domain Name Space (DNS), DDNS, TELNET, EMAIL, File Transfer Protocol
(FTP), WWW, HTTP, SNMP, Bluetooth, Firewalls, Basic concepts of Cryptography , Digital Signature.
TEXTBOOK:
1. Behrouz A. Forouzan, Data Communications and Networking, Fifth Edition TMH, 2013.
REFERENCE BOOKS:
1. Larry L. Peterson, Bruce S. Davie, Computer Networks: A Systems Approach, Fifth Edition, Morgan
Kaufmann Publishers Inc., 2012.
2. William Stallings, Data and Computer Communications, Tenth Edition, Pearson Education, 2013.
3. Nader F. Mir, Computer and Communication Networks, Second Edition, Prentice Hall, 2014.
4. Ying-Dar Lin, Ren-Hung Hwang and Fred Baker, Computer Networks: An Open Source Approach,
McGraw Hill Publisher, 2011.
5. James F. Kurose, Keith W. Ross, Computer Networking, A Top-Down Approach Featuring the
Internet, Sixth Edition, Pearson Education, 2013
COURSE OUTCOME: On successful completion of this course, the students shall be able to
1. Make use of Data sets in implementing the machine learning algorithms.
2. Understand the implementation procedures for the machine learning algorithms.
3. Design Java/Python programs for various Learning algorithms.
4. Apply appropriate data sets to the Machine Learning algorithms.
5. Identify and apply Machine Learning algorithms to solve real world problems.
Lab Experiments:
1. Implement and demonstrate the FIND-Salgorithm for finding the most specific hypothesis based on a
given set of training data samples. Read the training data from a .CSV file.
2. For a given set of training data examples stored in a .CSV file, implement and demonstrate the Candidate-
Elimination algorithm to output a description of the set of all hypotheses consistent with the training
examples.
3. Write a program to demonstrate the working of the decision tree based ID3 algorithm. Use an appropriate
data set for building the decision tree and apply this knowledge to classify a new sample.
4. Build an Artificial Neural Network by implementing the Backpropagation algorithm and test the same
using appropriate data sets.
5. Write a program to implement the naïve Bayesian classifier for a sample training data set stored as a .CSV
file. Compute the accuracy of the classifier, considering few test data sets.
6. Assuming a set of documents that need to be classified, use the naïve Bayesian Classifier model to perform
this task. Built-in Java classes/API can be used to write the program. Calculate the accuracy, precision, and
recall for your data set.
7. Write a program to construct a Bayesian network considering medical data. Use this model to demonstrate
the diagnosis of heart patients using standard Heart Disease Data Set. You can use Java/Python ML library
classes/API.
8. Apply EM algorithm to cluster a set of data stored in a .CSV file. Use the same data set for clustering using
k-Means algorithm. Compare the results of these two algorithms and comment on the quality of clustering.
You can add Java/Python ML library classes/API in the program.
9. Write a program to implement k-Nearest Neighbour algorithm to classify the iris data set. Print both
correct and wrong predictions. Java/Python ML library classes can be used for this problem.
10. Implement the non-parametric Locally Weighted Regression algorithm in order to fit data points. Select
appropriate data set for your experiment and draw graphs.
COURSE OUTCOME: On successful completion of this course, the students shall be able to
1. Prepare and develop practically applicable business plan for an innovative project with consideration of
addressed issues.
2. Develop the sub-skills required for business plans of innovation projects presentation and group
discussions.
3. Acquire the soft skills and interpersonal skills which will help them in their workplace needed for these
functions.
4. Develop planning skills of the innovative projects and business ideas in order to improve professional
competencies.
5. Make presentation on the topic, answer the queries/questions that come forward, clarify, and
supplement if necessary, and submit a report.
Project introduction includes an introductory session where students will understand how to apply specific
tools and models in innovation project management, as well as how to manage teamwork. Also, during this
topic, the ideas of projects will be introduced with taking into account appropriate cases of specific projects
across different industries. The session ends with the choice of core stream for which students will be asked to
prepare a project.
Project environment allows students to learn market analysis, including identification of current trends in the
industry by using suitable strategic planning tools, and evaluating external/internal risk factors. In addition, the
competition analysis and the estimation of risks in innovative projects will be introduced.
Project assessment provides understanding and practical knowledge of assessment and forecasting of potential
markets by using various approaches within the innovation project management, as well as cost analysis and
assessment of the impact of innovation on the cost structure.
Project presentation assumes that students will apply learned knowledge and skills by developing business
plans of innovation projects, its discussions, and presentations. An oral defense will be held at the last class
(final colloquium), in which students present the developed business plan of the innovation project with
consideration of addressed issues.
1. Develop skills in doing literature survey, technical presentation, and report preparation.
2. Enable project identification and execution of preliminary works on final semester project.
COURSE OUTCOMES: On successful completion of this course, the students shall be able to
1. Discover potential research areas in the field of information technology.
2. Create very precise specifications of the IT solution to be designed.
3. Have introduction to the vast array of literature available about the various research challenges in the
field of IT.
4. Use all concepts of IT in creating a solution for a problem.
5. Have a glimpse of real world problems and challenges that need IT-based solutions.
COURSE OUTCOMES: At the end of Industrial Training, the students will be able to
1. Understand organizational issues and their impact on the organization and employees.
2. Identify industrial problems and suggest possible solutions.
3. Relate, apply, and adapt relevant knowledge, concepts and theories within an industrial organization,
practice and ethics.
4. Apply technical knowledge in an industry to solve real world problems.
5. Demonstrate effective group communication, presentation, self-management, and report writing
skills.
COURSE OBJECTIVES:
COURSE OUTCOMES:
Text/Reference Books:
PREREQUISITE:
Basic Engineering Aptitude
COURSE OBJECTIVES:
This subject aims to inculcate critical thinking abilities and application of knowledge for
problem solving. It will expose the students with various simple methods and practices that
are essential to development of new systems, problem formulation and problem solving in
technical and non-technical fields. This course will stimulate the work environment of the
modern day engineers and technologists by familiarizing them with the state-of-the art
results, design and analysis tools in various disciplines, the ability to extract relevant
information to formulate and solve problems arising in practice.
COURSE OUTCOMES:
The course will enable students to,
1. Identify the market and value proposition
2. Carry out rigorous and accessible formulation to problems
3. Solutions via reducing the search space
4. Eliminating tradeoffs to reduce dimension of optimization problems
5. Execution through developing strategies for experiment, construction and
monetization.
6. Simulate the work environment of the modern engineer or knowledge worker in
general.
Unit – I 8 Hrs
Introduction to Critical Design Thinking
● Understanding critical thinking, creative thinking, and problem solving through
examples.
● New ways to solve problems.
Unit – II 8 Hrs
Theory of Inventive Problem Solving
● Examples of inventive problem solving,
● Era of technical systems,
● Science of inventing,
● Art of inventing,
● Amazing world of tasks
Unit – IV 8 Hrs
Modeling for Problem Solving
● Moving from problem to ideal final result,
● Tradeoffs and inherent contradictions,
● Invisible reserves,
● Law of increasing ideality,
● Evaluation of solutions,
● Enriching models for problem solving.
Unit – V 8 Hrs
Principles for Innovation
● General review,
● Segmentation, Separation,
● Local quality, symmetry change, merging and multifunctionality,
● Nested doll and weight compensation,
● Preliminary counteraction, preliminary action, and beforehand compensation,
● Equipotentiality, the other way around and curvature increase,
● Dynamic parts, partial or excessive actions, dimensionality change, mechanical
vibration
● Periodic action, continuity of useful action, and hurrying,
● Blessing in disguise, feedback, and intermediary,
● Self service, copying, cheap disposables, and mechanical interaction substitution
● Pneumatics and hydraulics, flexible shells and thin films, and porous materials,
● Optical property changes, homogeneous, and discarding and recovering,
● Parameter changes, phase transitions, and thermal expansion,
● Strong oxidants, inert atmosphere, and composite materials,
● How to select most suitable principle out of 40 ways to create good solutions
References
1. ABC-TRIZ Introduction to Creative Design Thinking with Modern TRIZ Modeling
by Michael A. Orloff
2. TRIZ And Suddenly the Inventor Appeared TRIZ, the Theory of Inventive Problem
Solving by GenrichAltshuller
3. TRIZ for Engineers Enabling Inventive Problem Solving by Karen Gadd
4. Simplified TRIZ New Problem Solving Applications for Engineers and
Manufacturing Professionals by Rantanen K., Domb E.
Unit 1- Introduction to Genetic Algorithm: Introduction to soft computing, soft computing vs hard
computing, Genetic Operators and Parameters, Genetic Algorithms in Problem Solving, Theoretical
Foundations of Genetic Algorithms, Implementation Issues, challenges and applications of G.A.
Unit 2- Artificial Neural Networks & Learning :Introduction to Learning concept: Supervised Learning,
Unsupervised Learning and Reinforcement Learning, Neural Model and Network Architectures, Model of
Artificial Neuron, Different Activation Functions, Perceptron network, Perceptron Learning, Supervised
Hebbian Learning, Adaptive Linear Neuron, Backpropagation network, Backpropogation learning,
Fundamentals of Associative Memory, Associative memory models, Auto associative memory, Bi-directional
hetero associative memory.
Unit 4- Introduction to Fuzzy Sets: Introduction to fuzzy sets, difference between fuzzy sets and crisp sets
theory, Operations on Fuzzy sets, Fuzzy properties, Fuzzy Relations, Fuzzy Measures, Applications of Fuzzy
Set Theory to different branches of Science and Engineering.
Unit 5- Knowledge discovery in databases: KDD process, star schema, snowflack schema, Data mining and
web mining using soft computing techniques. new datawarehouse architecture, database vs datawarehouse
bioinformatics, amazon redshift, google big query, panoply.
TEXT BOOKS:
1. E – Neuro Fuzzy and Soft computing – Jang J.S.R., Sun C.T and Mizutami, Prentice hall New Jersey,
1998
2. Fuzzy Logic Engineering Applications – Timothy J.Ross, McGraw Hill, NewYork, 1997.
3. Fundamentals of Neural Networks – Laurene Fauseett, Prentice Hall India, New Delhi, 1994.
REFERENCE BOOKS:
1. Introduce the primary important concepts of project management related to managing software
development projects.
2. Become familiar with the different activities involved in Software Project Management
3. Know how to successfully plan and implement a software project management activity, and to
complete a specific project in time with the available budget.
COURSE OUTCOMES: Upon completion of this course, the students will be able to
1. Identify the different project contexts and suggest an appropriate management strategy.
2. Practice the role of professional ethics in successful software development.
3. Identify and describe the key phases of project management.
4. Determine an appropriate project management approach through an evaluation of the business context
and scope of the project
5. Manage the people and control the defects.
Unit 1- Basic Concepts: Product, Process and Project, Definition, Components of Software Project
Management(SPM), Challenges and Opportunities, Tools and Techniques, Managing Human Resource and
Technical Resource, Costing and pricing of projects, Training and development, Project management
Unit 2- Format Process Models and Their Use: Definition and Format Model for a Process, ISO 9001 and
CMM Models and their relevance to Project Management, Other Emerging Models like People CMM
Unit 3- Umbrella Activities In Projects: Metrics, Methods and Tools for Metrics, Issues of Metrics in
multiple Projects, Configuration Management, Software Quality Assurance, Quality Standards and
Certifications, Process and Issues in obtaining Certifications, Risk issues in Software Development and
Implementation, Identification of Risks , Resolving and Avoiding risks, Tools and Methods for Identifying Risk
Management.
Unit 4- Instream Activities In Project: Project Initiation, Project Planning, Execution and Tracking, Project
Unit 5- Engineering And Issues In Project Management: Requirements, Design, Development, Testing,
Maintenance, Deployment, Engineering Activities and Management Issues in Each Phase, Special
TEXT BOOK(S)
1. Royce and Walker, “Software Project Management”, 2nd Edition, Pearson Education, 2002.
REFERENCES
1. Bob Hughes and Mike Cotterell, “Software Project Management”, 5th Edition, Tata McGrawHill,
2011.
2. Kelker, S. A, “Software Project Management”, 2nd Edition, Prentice Hall, 2003.
3. Gopalaswamy Ramesh, "Managing Global Projects", 1st Reprint Edition, Tata McGraw Hill,2006.
4. Robert K. Wysocki, “Executive's Guide to Project Management”, 2nd Edition, John Wiley &Sons,
2011.
5. Teresa and luckey, Joseph Phillips, “Software project Management for dummies”, 3 rdEdition, Wiley
publishing Inc., 2006.
COURSE OUTCOMES: Upon completion of this course, the students will be able to
1. Understand the concept of cybercrime and emerging crime threats and attacks in cyberspace.
2. Demonstrate the various types of cyber laws and their applicability.
3. Apply the forensic science techniques to data acquisition and evidence collection
4. Get the practical exposure to forensic tools from the scenarios of passive and active attacks.
5. Demonstrate the use of anti-malware tools for enhancing system network protection.
Unit 1: Introduction to IT laws & Cyber Crimes: Internet, Hacking, Cracking, Viruses, Virus Attacks,
Pornography, Software Piracy, Intellectual property, Legal System of Information Technology, Social
Engineering, Mail Bombs, Bug Exploits, and Cyber Security.
Legal and Ethical Principles: Introduction to Forensics – The Investigative Process – Code of Ethics, Ethics of
Investigations, Evidence Management – Collection, Transport, Storage, access control, disposition
Unit 2- Forensic Science: Principles and Methods –Scientific approach to Forensics, Identification and
Classification of Evidence, Location of Evidence, Recovering Data, Media File Forensic Steps, Forensic
Analysis – Planning, Case Notes and Reports, Quality Control .
Unit 3- Digital Forensics: Hardware Forensics – Hidden File and Anti- forensics - Network Forensics –
Virtual Systems - Mobile Forensics Digital Watermarking Protocols: A Buyer-Seller Watermarking Protocol, an
Efficient and Anonymous Buyer-Seller Watermarking Protocol, Extensions of Watermarking Protocols,
Protocols for Secure Computation
Unit 4- Application Forensics, Tools and Report Writing – Application Forensics, Email and Social Media
Investigations, Cloud Forensics, Current Digital Forensic Tools, Report Writing for Investigations.
Unit 5- Counter Measures: Defensive Strategies for Governments and Industry Groups, Tactics of the
Military, Tactics of Private Companies, Information Warfare Arsenal of the future, and Surveillance Tools for
Information Warfare of the Future.
TEXT BOOKS:
1. Bill Nelson, Christopher Steuart, Amelia Philips, “Computer Forensics and Investigations”, Delmar
Cengage Learning; 5th edition January 2015.
2. Chuck Eastom, “Certified Cyber Forensics Professional Certification”, McGraw Hill, July 2017.
3. Nilakshi Jain, Dhananjay Kalbande, “Digital Forensic: The fascinating world of Digital Evidence”
Wiley India Pvt Ltd 2017.
4. John R.Vacca, “Computer Forensics: Computer Crime Scene Investigation”, Laxmi Publications, 2015.
REFERENCE BOOKS:
1. MarjieT.Britz, “Computer Forensics and Cyber Crime”: An Introduction”, 3rd Edition, Prentice Hall,
2013.
2. Clint P Garrison “Digital Forensics for Network, Internet, and Cloud Computing A forensic evidence
guide for moving targets and data , Syngress Publishing, Inc. 2010.
1. Understand the image fundamentals and mathematical transforms necessary for image
processing.
2. Expose students to current applications in the field of digital image processing.
Unit 1-Introduction: Digital Image Processing, The origins of Digital Image Processing, Examples of Digital
Image Processing application, Fundamental steps in Digital Image processing, Components of Image Processing
system Fundamentals: Elements of Visual Perception, Light and Electromagnetic Spectrum, Image Sensing and
Acquisition, Image Sampling and Quantization, Some basic Relationships between Pixels, Linear and Nonlinear
Operations, An introduction to mathematical tool used in digital image processing.
Unit 2-Image Enhancement in the spatial domain: Background, some basic gray level transformation,
Introduction of Histogram processing, Enhancement using Arithmetic/Logic operations, Basics of spatial
filtering, smoothing spatial filters, Sharpening spatial filters, Concept of Sampling.
Unit 3-Image Restoration: Model of the Image Degradation/Restoration process, Noise Models, Restoration in
the presence of noise only spatial filtering, Inverse filtering, Minimum Mean Square Error (Wiener) filtering,
Geometric mean filter.
Unit 4-Image Compression: Fundamentals, Lossy Compression, Lossless Compression, Image Compression
models, Error-free Compression: Variable length coding, LZW coding, Bit plane coding, Run length coding,
Introduction to JPEG, introduction to color image processing, color fundamentals, color models, Pseudo color
image processing.
Unit 5-Morphology and Segmentation: Erosion, Dilation, Duality, Opening and Closing, Hit-and Miss
transform, Morphological Algorithms: Boundary Extraction, Hole filling, Extraction of connected components,
Convex Hull, Concept of Thinning and Thickening.
TEXT BOOK:
1. Rafael C. Gonzalez, Richard E. Woods, ‗Digital Image Processing‘, Pearson, Third Edition, 2010.
2. Anil K. Jain, ‗Fundamentals of Digital Image Processing‘, Pearson, 2002.
REFERENCE BOOKS:
1. Kenneth R. Castleman, ‗Digital Image Processing‘, Pearson, 2006.
2. Rafael C. Gonzalez, Richard E. Woods, Steven Eddins, ‗Digital Image Processing using MATLAB‘,
Pearson Education, Inc., 2011.
3. D,E. Dudgeon and RM. Mersereau, ‗Multidimensional Digital Signal Processing‘, Prentice Hall
Professional Technical Reference, 1990.
4. William K. Pratt, ‗Digital Image Processing‘, John Wiley, New York, 2002
5. Milan Sonka et al ‗Image processing, analysis and machine vision‘, Brookes/Cole, Vikas Publishing
House, 2nd edition, 1999.
1. Make students comfortable with tools and techniques required in handling large amounts of
datasets.
2. Uncover various terminologies and techniques used in Big Data.
3. Use several tools publicly available to illustrate the application of these techniques.
4. Know about the research that requires the integration of large amounts of data.
COURSE OUTCOMES: On successful completion of this course, the students will be able to
UNIT – I
Introduction to big data: Introduction to Big Data Platform – Challenges of Conventional Systems - Intelligent
data analysis – Nature of Data - Analytic Processes and Tools - Analysis vs Reporting.
UNIT – II
Mining data streams: Introduction to Streams Concepts – Stream Data Model and Architecture - Stream
Computing - Sampling Data in a Stream – Filtering Streams –Counting Distinct Elements in a Stream –
Estimating Moments – Counting Oneness ina Window – Decaying Window - Real time Analytics
Platform(RTAP) Applications – Case Studies - Real Time Sentiment Analysis- Stock Market Predictions.
UNIT – III
Hadoop: History of Hadoop- the Hadoop Distributed File System – Components of Hadoop Analyzing the Data
with Hadoop- Scaling Out- Hadoop Streaming- Design of HDFS-Java interfaces to HDFS Basics- Developing a
Map Reduce Application-How Map Reduce Works-Anatomy of a Map Reduce Job Run-Failures-Job
Scheduling-Shuffle and Sort – Task execution - Map Reduce Types and Formats- Map Reduce Features-Hadoop
environment.
UNIT – IV
Frameworks: Applications on Big Data Using Pig and Hive – Data processing operatorsin Pig – Hive services
– HiveQL – Querying Data in Hive - fundamentals of HBase and Zookeeper - IBM Infosphere Big Insights and
Streams.
UNIT – V
Predictive Analytics- Simple linear regression- Multiple linear regression- Interpretation of regression
coefficients. Visualizations - Visual data analysis techniques- interaction techniques - Systems and applications.
TEXTBOOKS:
REFERENCE BOOKS:
1. Michael Minelli, Michele Chambers, and Ambiga Dhiraj, Big Data, Big Analytics: Emerging Business
Intelligence and Analytic Trends for Today’s Businesses, Wiley,2013.
2. Frank J. Ohlhorst, Big Data Analytics: Turning Big Data into Big Money, Wiley, 2012.
3. Arvind Sathi, Big Data Analytics: Disruptive Technologies for Changing the Game, MC Press, 2012.
4. Glenn J. Myatt, “Making Sense of Data”, John Wiley & Sons, 2007.
5. Pete Warden, “Big Data Glossary”, O’Reilly, 2011.
6. Jeffrey Aven, Hadoop in 24 hours, person education 2018.
7. Jiawei Han, Micheline Kamber “Data Mining Concepts and Techniques”, 2 nd Edition, Elsevier,
Reprinted 2008.
8. Da Ruan, Guoquing Chen, Etienne E.Kerre, Geert Wets, “Intelligent Data Mining”, Springer, 2007.
9. Paul Zikopoulos, Dirkde Roos, Krishnan Parasuraman, Thomas Deutsch, James Giles , David
Corrigan, “Harness the Power of Big Data The IBM Big Data Platform”, Tata McGraw Hill
Publications, 2012.
10. Arshdeep Bahga, Vijay Madisetti, “Big Data Science & Analytics: A Hands- On Approach “,VPT,
2016
11. Bart Baesens “Analytics in a Big Data World: The Essential Guide to Data Science and its
Applications (WILEY Big Data Series)”, John Wiley & Sons,2014.
COURSE OUTCOMES: On successful completion of the course, the student will be able to
Unit 2- Software Requirement Analysis: Structured analysis, object-oriented analysis, software requirement
specification, and validation.
Unit 3- Design and Implementation of Software: software design fundamentals, design methodology
(structured design and object-oriented design), design verification, monitoring and control coding.
Unit 4- Testing:Testing fundamentals, white box and black box testing, software testing strategies: unit testing,
integration testing, validation testing, system testing, debugging.
Unit 5- Software Reliability: Metric and specification, fault avoidance and tolerance, exception handling,
defensive programming.Software Maintenance – maintenance characteristics, maintainability, maintenance
tasks, maintenance side effects. CASE tools, software certification- requirement, types of certifications, third
part certification. Software Re-Engineering, reverse software Engineering. Software Configuration Management
Activities, Change Control Process, Software Version Control, CASE: introduction, levels of case, architecture,
case building blocks, objectives, case repository, characteristics of case tools, categories, Estimation of Various
Parameters such as Cost, Efforts, Schedule/Duration, Constructive Cost Models (COCOMO), Resource
Allocation Models, Software Risk Analysis and Management.
TEXTBOOKS:
1. Roger Pressman, ―Software Engineering: A Practitioner ‘s Approach, McGraw Hill, ISBN 007–
337597–7.
2. Ian Sommerville, ―Software Engineering, Addison and Wesley, ISBN 0-13-703515-2.
REFERENCE BOOKS:
1. Carlo Ghezzi, ―Fundamentals of Software Engineering, Prentice Hall India, ISBN-10: 0133056996.
2. Rajib Mall, ―Fundamentals of Software Engineering, Prentice Hall India, ISBN-13: 9788120348981.
3. Pankaj Jalote, ―An Integrated Approach to Software Engineering, Springer, ISBN 13:
9788173192715.
4. S K Chang, ―Handbook of Software Engineering and Knowledge Engineering, World Scientific, Vol
I, II, ISBN: 978-981-02-4973-1.
Tom Halt, ―Handbook of Software Engineering, ClanyeInternational ISBN- 10: 1632402939
COURSE OUTCOMES: On successful completion of the course, the student will be able to:
1. Recognize features of object-oriented design such as encapsulation, polymorphism, inheritance, and
composition of systems based on object identity.
2. Apply some common object-oriented design patterns.
3. Specify simple abstract data types and design implementations using abstraction functions to
document them.
4. Design a convenient way for the handling problems using templates and use simple try-catch blocks
for Exception Handling.
5. Manage I/O streams and File I/O oriented interactions.
Unit 1- Object Oriented Programming Concepts: Classes and Objects, Methods and Messages, Abstraction
and Encapsulation, Inheritance, Abstract Classes, Polymorphism. Introduction to C++: Classes and Objects,
Structures and Classes, Unions and Classes, Friend Functions, Friend Classes, Inline Functions, Static Class
Members, Scope Resolution Operator, Nested Classes, Local Classes, Passing Objects to Functions, Returning
objects, object assignment. Arrays, Pointers, References, and the Dynamic Allocation Operators: Arrays of
Objects, Pointers to Objects, Type Checking, this Pointer, Pointers to Derived Types, Pointers to Class
Members, References, Dynamic Allocation Operators.
Unit 3- Inheritance and Polymorphism: Inheritance: Base-Class Access Control, Inheritance and Protected
Members, Inheriting Muitiple Base Classes, Constructors, Destructors and Inheritance, Granting Access, Virtual
Base Classes. Polymorphism: Virtual Functions, Virtual Attribute and Inheritance, Virtual Functions and
Hierarchy, Pure Virtual Functions, Early vs. Late Binding, Run-Time Type ID and Casting Operators: RTTI,
Casting Operators, Dynamic Cast.
Unit 4- Templates and Exception Handling: Templates: Generic Functions, Applying Generic Functions,
Generic Classes, The type name and export Keywords, Power of Templates, Exception Handling:
Fundamentals, Handling Derived Class Exceptions, Exception Handling Options, Understanding terminate() and
unexpected(), uncaught_exception () Function, exception and bad_exception Classes, Applying Exception
Handling.
Unit 5- I/O System Basics: Streams and Formatted 1/O. File I/O: File Classes, File Operations. Namespaces:
Namespaces, std Namespace. Standard Template Library: Overview, Container Classes, General Theory of
Operation, Lists, string Class, Final Thoughts on STL.
TEXTBOOKS:
1. Object Oriented Programming with C++ by E. Balagurusamy, McGraw-Hill Education (India).
2. ANSI and Turbo C++ by Ashoke N. Kamthane, Pearson Education
REFERENCE BOOKS:
1. Big C++ - Wiley India.
2. C++: The Complete Reference- Schildt, McGraw-Hill Education (India).
3. C++ and Object Oriented Programming – Jana, PHI Learning.
4. Object Oriented Programming with C++ - Rajiv Sahay, Oxford.
5. Mastering C++ - Venugopal, McGraw-Hill Education (India)
PROJECT (CSP-021)
L:T:P:: 0:0:12 Credits-06
COURSE OBJECTIVE:
The objective of Project is to enable the student to extend further the investigative study taken up under project
either fully theoretical/practical or involving both theoretical and practical work, under the guidance of a
Supervisor from the Department alone or jointly with a Supervisor drawn from R&D laboratory/Industry. This
is expected to provide a good training for the student(s) in R&D work and technical leadership.
COURSE OUTCOME: On successful completion of this course, the students shall be able to
1. Review and finalize the approach to the problem relating to the assigned topic and prepare an action
plan for preparing conducting the investigation and assign responsibilities for teamwork
2. Conduct detailed analysis, modeling, simulation, design, problem solving, or experiment as needed on
the assigned topic
3. Develop product/process, test, draw results and conclusions, and give direction for future research and
prepare a paper for conference presentation/publication in journals, if possible
4. Prepare a project report in the standard format for being evaluated by the Department and make final
presentation on the project before a Departmental Committee.
Principles of
CSET-001
1 Information 3 0 0 30 20 50 100 150 3s III
Security
Foundations of
CSET-002
2 Cyber Security 3 0 0 30 20 50 100 150 3 IV
Ethical Hacking
CSET-003
3 Fundamentals 3 0 0 30 20 50 100 150 3 V
Abbreviation Used:-
L: Lecture, T: Tutorial, P: Practical, TA: Teacher Assessment, TE: Theory End Semester Exam., PE:
Practical End Semester Exam.
Syllabus of B. TECH in VMSB Uttarakhand Technical University, Dehradun for admissions in (2022-23) and onwards PAGE 1
VEER MADHO SINGH BHANDARI UTTARAKHAND TECHNICAL UNIVERSITY, DEHRADUN
L: T: P: : 3: 0: 0 Credits – 3
Unit 2- Introduction to Cryptography: Integer Arithmetic, Modular Arithmetic, Traditional Symmetric Key
Ciphers, Data Encryption Standard (DES), Advanced Encryption Standard (AES).
Primes, Primality Testing, Factorization, Chinese Remainder Theorem, Asymmetric Cryptography:
Introduction, RSA Cryptosystem, Elliptic Curve Cryptosystem.
Unit 3- Message Integrity and Message Authentication: Message Authentication Code (MAC), SHA-512 -
Digital Signatures.
Unit 4- Security at the Application Layer: PGP and S/MIME. Security at Transport Layer: SSL and TLS. -
Principles of IDS and Firewalls.
Unit 5- Applications of Information Security: Intrusion detection – password management – Viruses and
related Threats – Virus Counter measures – Firewall Design Principles – Trusted Systems.
TEXTBOOKS:
1. Computer Networks, Andrew S Tanenbaum, David J. Wetherall, 5th Edition, Pearson Education/PHI.
2. Cryptography & Network Security, Behrouz A. Forouzan, Special Indian Edition, TMH.
REFERENCE BOOKS:
Syllabus of B. TECH in VMSB Uttarakhand Technical University, Dehradun for admissions in (2022-23) and onwards PAGE 2
VEER MADHO SINGH BHANDARI UTTARAKHAND TECHNICAL UNIVERSITY, DEHRADUN
1. Network Security Essentials (Applications and Standards), William Stallings, Pearson Education.
2. Cryptography and Network Security – Principles and Practices, William
Stallings, 4th Edition, Prentice Hall of India, 2005.
3. Security in Computing, Charles B. Pfleeger, Shari Lawrence Pfleeger, 3rd Edition, Pearson Education,
2003.
Syllabus of B. TECH in VMSB Uttarakhand Technical University, Dehradun for admissions in (2022-23) and onwards PAGE 3
VEER MADHO SINGH BHANDARI UTTARAKHAND TECHNICAL UNIVERSITY, DEHRADUN
L: T: P: : 3: 0: 0 Credits – 3
COURSE OUTCOMES: On successful completion of the course, the student will be able to:
1. Categorize security threats and able to implement access control strategies.
2. Understand different types of malicious software and threats.
3. Apply methods to protect from denial-of- service attacks.
4. Analyze intrusion detection systems and configure firewalls.
5. Develop secure coding, infrastructure security.
Unit 1- Overview: Computer Security Concepts, Threats, Attacks, and Assets, Security Functional
Requirements, Fundamental Security Design Principles, Attack Surfaces and Attack Trees, Computer
Security Strategy.
Access Control: Access Control Principles, Subjects, Objects, and Access Rights, Discretionary
Access Control, Example: UNIX File Access Control, Role-Based Access Control, Attribute-Based
Access Control, Identity, Credential, and Access Management, Trust Frameworks, Case Study:
RBAC System for a Bank.
Unit 2- Malicious Software: Types of Malicious Software (Malware), Advanced Persistent Threat,
Propagation—Infected Content—Viruses, Propagation—Vulnerability Exploit—Worms, Propagation—Social
Engineering—Spam E-Mail, Trojans, Payload— System Corruption, Payload—Attack Agent— Zombie, Bots,
Payload—Information Theft—Keyloggers, Phishing, Spyware, Payload—Stealthing—Backdoors, Rootkits,
Counter measures.
Unit 4- Intrusion Detection: Intruders, Intrusion Detection, Analysis Approaches, Host-Based Intrusion
Detection, Network-Based Intrusion Detection, Distributed or Hybrid Intrusion Detection, Intrusion Detection
Syllabus of B. TECH in VMSB Uttarakhand Technical University, Dehradun for admissions in (2022-23) and onwards PAGE 4
VEER MADHO SINGH BHANDARI UTTARAKHAND TECHNICAL UNIVERSITY, DEHRADUN
Exchange Format, Honeypots, Example System: Snort. Firewalls and Intrusion Prevention Systems: The Need
for Firewalls, Firewall Characteristics and Access Policy, Types of Firewalls, Firewall Basing, Firewall
Location and Configurations, Intrusion Prevention Systems, Example: Unified Threat Management Products.
Unit 5- Software Security: Software Security Issues, Handling Program Input, Writing Safe Program Code,
Interacting with the Operating System and Other Programs, Handling Program Output. Physical and
Infrastructure Security: Overview, Physical Security Threats, Physical Security Prevention and Mitigation
Measures, Recovery from Physical Security Breaches, Example: A Corporate Physical Security Policy,
Integration of Physical and Logical Security.
TEXTBOOKS:
1. Computer Security: Principles and Practice, William Stallings, Prentice Hall; 2014
2. Foundations of Security: What Every Programmer Needs to Know by Neil Daswani, Christoph Kern
and Anitha Kesavan, Apress publisher, 2007.
REFERENCE BOOKS:
1. The ethical hacking guide to corporate security, Ankit Fadia, McMillan India.
2. Software Security: Building Security In, G. McGraw, Addison Wesley, 2006.
Syllabus of B. TECH in VMSB Uttarakhand Technical University, Dehradun for admissions in (2022-23) and onwards PAGE 5
VEER MADHO SINGH BHANDARI UTTARAKHAND TECHNICAL UNIVERSITY, DEHRADUN
COURSE OUTCOMES: On successful completion of the course, the student will be able to:
1. Demonstrate the knowledge of Computer Networks, Cryptography, Information security concepts and
its applications.
2. Apply the knowledge of tools available to support an ethical hacking.
3. Implement the knowledge of interpreting the results of a controlled attack.
4. Understand the role of politics, inherent & imposed limitations, and metrics for planning of a test.
5. Evaluate techniques related for the enumeration and exploitation.
Unit 1 Introduction: Hacking Impacts, The Hacker Framework: Planning the test, Sound Operations,
Reconnaissance, Enumeration, Vulnerability Analysis, Exploitation, Final Analysis, Deliverable, Integration.
Information Security Models: Computer Security, Network Security, Service Security, Application Security,
Security Architecture.
Information Security Program: The Process of Information Security, Component Parts of Information
Security Program, Risk Analysis and Ethical Hacking.
Unit 2- The Business Perspective: Business Objectives, Security Policy, Previous Test Results, Business
Challenges Planning for a Controlled Attack: Inherent Limitations, Imposed Limitations, timing is Everything,
Attack Type, Source Point, Required Knowledge, Multi-Phased Attacks, Teaming and Attack Structure,
Engagement Planner, The Right Security Consultant, The Tester, Logistics, Intermediates, Law Enforcement.
Unit 3- Preparing for a Hack: Technical Preparation, Managing the Engagement Reconnaissance: Social
Engineering, Physical Security, Internet Reconnaissance.
Enumeration: Enumeration Techniques, Soft Objective, Looking Around or Attack, Elements of Enumeration,
Preparing for the Next Phase.
Unit 4- Exploitation: Intuitive Testing, Evasion, Threads and Groups, Operating Systems, Password Crackers,
RootKits, applications, Wardialing, Network, Services and Areas of Concern.
Unit 5- Deliverable: The Deliverable, The Document, Overall Structure, Aligning Findings, Presentation
Integration: Integrating the Results, Integration Summary, Mitigation, Defense Planning, Incident Management,
Security Policy, Conclusion.
Syllabus of B. TECH in VMSB Uttarakhand Technical University, Dehradun for admissions in (2022-23) and onwards PAGE 6
VEER MADHO SINGH BHANDARI UTTARAKHAND TECHNICAL UNIVERSITY, DEHRADUN
TEXTBOOKS:
1. The Ethical Hack: A Framework for Business Value Penetration Testing, James S. Tiller, Auerbach
Publications, CRC Press.
REFERENCE BOOKS:
1. Ethical Hacking and Countermeasures Attack Phases, EC-Council, Cengage Learning
2. Hands-On Ethical Hacking and Network Defense, Michael Simpson, Kent Backman, James Corley,
Cengage Learning.
Syllabus of B. TECH in VMSB Uttarakhand Technical University, Dehradun for admissions in (2022-23) and onwards PAGE 7
VEER MADHO SINGH BHANDARI UTTARAKHAND TECHNICAL UNIVERSITY, DEHRADUN
L: T: P: : 3: 0: 0 Credits – 3
COURSE OUTCOMES: On successful completion of the course, the student will be able to:
1. Understand relevant legislation and codes of ethics.
2. Apply the methods of computer forensics, digital detective, policies, and procedures.
3. Implement the approaches of E-evidence, tools, and environment.
4. Evaluate the methodologies of e-mail, web forensics and network forensics.
5. Apply the concepts of legal aspects of digital forensics.
Unit 1- Digital Forensics Science: Forensics science, computer forensics, and digital forensics.
Computer Crime: Criminalistics as it relates to the investigative process, analysis of cyber criminalistics area,
holistic approach to cyber-forensics.
Unit 2- Cyber Crime Scene Analysis: Discuss the various court orders etc., methods to search and seizure
electronic evidence, retrieved and un-retrieved communications, Discuss the importance of understanding what
court documents would be required for a criminal investigation.
Unit 3- Evidence Management & Presentation: Create and manage shared folders using operating system,
importance of the forensic mindset, define the workload of law enforcement, explain what the normal case
would look like, define who should be notified of a crime, parts of gathering evidence, Define and apply
probable cause.
Unit 4- Computer Forensics: Prepare a case, begin an investigation, understand computer forensics,
workstations and software, conduct an investigation, complete a case, Critique a case.
Network Forensics: open-source security tools for network forensic analysis, requirements for preservation of
network data.
Syllabus of B. TECH in VMSB Uttarakhand Technical University, Dehradun for admissions in (2022-23) and onwards PAGE 8
VEER MADHO SINGH BHANDARI UTTARAKHAND TECHNICAL UNIVERSITY, DEHRADUN
Unit 5- Legal Aspects of Digital Forensics: IT Act 2000, amendment of IT Act 2008. Recent trends in mobile
forensic technique and methods to search and seizure electronic evidence.
TEXTBOOKS:
REFERENCE BOOKS:
1. Learn Computer Forensics: A Beginner's Guide to Searching, Analyzing, and Securing Digital
Evidence, William Oettinger, 1st Edition, Packt Publishing, 2020, ISBN: 1838648178.
2. Cybercrime and Digital Forensics: An Introduction, Thomas J. Holt, Adam M. Bossler, Kathryn C.
Seigfried-Spellar, Routledge.
Syllabus of B. TECH in VMSB Uttarakhand Technical University, Dehradun for admissions in (2022-23) and onwards PAGE 9
VEER MADHO SINGH BHANDARI UTTARAKHAND TECHNICAL UNIVERSITY, DEHRADUN
L: T: P: : 3: 0: 0 Credits – 3
COURSE OUTCOMES: On successful completion of the course, the student will be able to:
1. Understand network security, security incidence response and relation with security operations.
2. Evaluate about malwares, dynamic malware analysis and restoration of affected systems & attacks.
3. Analyze the malwares detection techniques using signatures and recovery process with response tools.
4. Apply techniques for information security Incident Management & data backup with identification
and detection.
5. Remembers the policies, procedures and guidelines for handling incident and troubleshooting of
network security..
Unit 1- Introduction: Definition of network security, Application of Security, Evaluation of net- work security,
principles, Information Security Services, characteristics of network security, definitions of security incident
response, IP addressing, relation of incident response to the rest of security operations, incident response phases
- preparation, identification, recovery, follow-up, Identifying Unauthorized Devices.
Unit 2- Introduction to malware: OS security concepts, malware threats, evolution of mal- ware, malware
types viruses, worms, rootkits, Trojans, bots, spyware, adware, logic bombs, malware analysis, static malware
analysis, dynamic malware analysis. Eradication: Actual removal and restoration of affected systems, removal
of attack artifacts, scanning of other systems to ensure complete eradication, use of IOCs on other systems and
local networks, understand the attack.
Unit 3- Malware Detection Techniques: Signature-based techniques: malware signatures, packed malware
signature, metamorphic and polymorphic malware signature non-signature- based techniques: similarity-based
techniques, machine-learning methods, invariant inferences. Recovery: Test and validate systems before putting
back into production, monitoring of system behavior, ensuring that another incident will not be created by the
recovery process, response Management, incident response tool, support investigations.
Syllabus of B. TECH in VMSB Uttarakhand Technical University, Dehradun for admissions in (2022-23) and onwards PAGE 10
VEER MADHO SINGH BHANDARI UTTARAKHAND TECHNICAL UNIVERSITY, DEHRADUN
Unit 4- Information Security Incident Management & Data Backup: Information Security Incident
Management overview- Handling-Response, Incident Response Roles and Responsibilities, Incident Response
Process etc. Data Back introduction, Types of Data Backup and its techniques, Developing an Effective Data
Backup Strategy and Plan, Security Policy for Back Procedures. Identification: Detection, incident triage,
information gathering and reporting, incident classification.
Unit 5- Policies and procedures: incident workflows, guidelines, incident handling forms, principles of
malware analysis, log analysis, threat intelligence, vulnerability management, penetration testing,
Troubleshooting Network Devices and Services: Introduction & Method- ology of Troubleshooting,
Troubleshooting of Network security, Connectivity-Network Devices- Network Slowdowns-Systems-Modems.
TEXTBOOKS:
1. Managing Information Security Risks, The Octave Approach by Christopher Alberts, and Audrey
Dorofee.
2. ‘Cryptography and Network Security (4th Edition) by (Author) William Stallings.
3. “Incident Response & Computer Forensics, Third Edition” by Jason T. Luttgens and Matthew Pepe.
REFERENCE BOOKS:
1. Blue Team Handbook: Incident Response Edition: A condensed field guide for the Cyber Security
Incident Responder”, by Don Murdoch.
2. Practical malware analysis The Hands-On Guide to Dissecting Malicious Software by Michael Sikorski
and Andrew Honig ISBN-10: 159327-290-1, ISBN-13: 978-1-59327- 290-6, 2012 2
3. Computer viruses: from theory to applications by Filiol, Eric Springer Science & Business Media,
2006.
4. https://www.sans.org/reading-room/whitepapers/incident/security-incident-handling-small-
organizations-32979
Syllabus of B. TECH in VMSB Uttarakhand Technical University, Dehradun for admissions in (2022-23) and onwards PAGE 11
VEER MADHO SINGH BHANDARI UTTARAKHAND TECHNICAL UNIVERSITY, DEHRADUN
L: T: P: : 0: 0: 2 Credits – 1
COURSE OUTCOMES: On successful completion of the course, the student will be able to:
1. Examine the authenticity of the messages, communicate securely, and investigate non-repudiation
2. Implement various encryption and decryption algorithms.
3. Identify the emerging areas in information security.
4. Interpret good security practices for information security.
5. Demonstrate the process of data protection from various threats.
1. Write a program to perform encryption and decryption using the following substitution ciphers.
a) Caeser cipher.
b) Play fair cipher.
c) Hill Cipher.
3. Write a program to implement the DES algorithm.
4. Write a program to implement RSA algorithm.
5. Calculate the message digest of a text using the SHA-1 algorithm.
6. Working with sniffers for monitoring network communication (Wireshark).
7. Configuring S/MIME for email communication.
8. Using Snort, perform real time traffic analysis and packet logging.
Syllabus of B. TECH in VMSB Uttarakhand Technical University, Dehradun for admissions in (2022-23) and onwards PAGE 12
VEER MADHO SINGH BHANDARI UTTARAKHAND TECHNICAL UNIVERSITY, DEHRADUN
L: T: P: : 0: 0: 2 Credits – 1
COURSE OUTCOMES: On successful completion of the course, the student will be able to:
1. Understand the basic concepts of enumerations in Ethical Hacking.
2. Identify the importance of advanced hacking techniques and their countermeasures.
3. Gain the knowledge of the use and availability of tools to support an ethical hack.
4. Gain the knowledge of interpreting the results of a controlled attack.
5. Apply various tools to provide security against attacks.
Syllabus of B. TECH in VMSB Uttarakhand Technical University, Dehradun for admissions in (2022-23) and onwards PAGE 13
VEER MADHO SINGH BHANDARI UTTARAKHAND TECHNICAL UNIVERSITY, DEHRADUN
COURSE OUTCOMES: On successful completion of the course, the student will be able to:
1. Learn the importance of a systematic procedure for investigation of data found on digital storage
media that might provide evidence of wrongdoing.
2. Learn the file system storage mechanisms and retrieve files in hidden format.
3. Learn the use of computer forensics tools used in data analysis.
4. Learn how to find data that may be clear or hidden on a computer disk, find the open ports for the
attackers through network analysis, Registry analysis.
5. Evaluate the methodologies of e-mail, web forensics and network forensics.
1. Perform email analysis using the tools like Exchange EDB viewer, MBOX viewer and View user
mailboxes and public folders, Filter the mailbox data based on various criteria, Search for particular
items in user mailboxes and public folders.
2. Perform Browser history analysis and get the downloaded content, history saved logins, searches,
websites visited etc using Foxton Forensics tool, Dumpzilla.
3. Perform mobile analysis in the form of retrieving call logs, SMS log, all contacts list using the
forensics tool like SAFT.
4. Perform Registry analysis and get boot time logging using process monitor tool.
5. Perform Disk imaging and cloning the using the X-way Forensics tools.
6. Perform Data Analysis i.e History about open file and folder, and view folder actions using List view
activity tool.
7. Perform Network analysis using the Network Miner tool.
8. Perform information for incident response using the crowd Response tool.
9. Perform File type detection using Autopsy tool.
Syllabus of B. TECH in VMSB Uttarakhand Technical University, Dehradun for admissions in (2022-23) and onwards PAGE 14
VEER MADHO SINGH BHANDARI UTTARAKHAND TECHNICAL UNIVERSITY, DEHRADUN
10. Perform Memory capture and analysis using the Live RAM capture or any forensic tool.
L: T: P: : 0: 0: 4 Credits – 2
COURSE OBJECTIVES: The main objective of Capstone Project is to let the students apply the knowledge of
theoretical concepts which they have learnt as a part of the curriculum of the minor degree using real time
problems or situations.
COURSE OUTCOMES: On successful completion of the course, the student will be able to:
1. Understand, plan, and execute a Capstone Project with team.
2. Acquired knowledge within the chosen area of technology for project development.
3. Identify, discuss, and justify the technical aspects of the chosen project with a comprehensive and
systematic approach.
4. Communicate and report effectively project related activities and findings.
5. Expose the world of research, technology, and innovation.
COURSE GUIDELINES:
The Capstone project is desirable to be done in a group of 2 students. Each group has to prepare a title related to
any engineering discipline, and the title must emulate any real world problem.
Submit an early proposal. This proposal is a 1-2page(s) report, describes what the project is about and the final
product's output. The project proposal will be submitted to the respective guide.
Every individual student will be assigned a faculty to guide them. There will be three major reviews which will
be carried out as listed below.
Mark Weightage
Review # Requirement Internal External
0 Area / Title selection - -
The assessment of term work shall be done on the basis of the following.
1. Continuous assessment
2. Performing the experiments in the laboratory
Syllabus of B. TECH in VMSB Uttarakhand Technical University, Dehradun for admissions in (2022-23) and onwards PAGE 15
VEER MADHO SINGH BHANDARI UTTARAKHAND TECHNICAL UNIVERSITY, DEHRADUN
3. Oral examination conducted on the syllabus and term work mentioned above.
Syllabus of B. TECH in VMSB Uttarakhand Technical University, Dehradun for admissions in (2022-23) and onwards PAGE 16
Annexure - II
List of Minor Courses offered by Computer Sc. & Engineering Department to B.Tech. Programme
Page 1 of 2
3 B. Tech. in branch name Biotechnology CSE Data Science
with Minor in “Data Bio Chemical Engineering 1. Information
Science” Chemical Engineering Management
” Civil Engineering 2. Scalable Data Science
Electrical Engineering 3. Data Science for
Electrical & Electronics Engineering Engineers
Electronics & Communication Engineering 4. Business Analytics and
Mechanical Engineering data mining Modeling
Mechanical Engineering (Manufacturing using R
Engineering) 5. Data Visualization
Production Engineering 6. Big Data Analysis
Manufacturing Engineering
Power Plant Engineering
4 B. Tech. in branch name Biotechnology CSE Internet of Things
with Minor in “Internet of Bio Chemical Engineering 1. Sensor Technology
Things” Chemical Engineering 2. Cloud Architectures
” Civil Engineering 3. Microcontrollers and
Electrical Engineering interfacing (using embedded
Electrical & Electronics Engineering C)
Electronics & Communication Engineering 4. Machine Learning
Mechanical Engineering 5. Computer Programming in
Mechanical Engineering (Manufacturing Python
Engineering) 6. Embedded System Design
Production Engineering
Manufacturing Engineering
Power Plant Engineering
*If required the student may opt requisite fundamental course/s for a minor specialization as audit course.
Page 2 of 2