BE Computer Engeneering
BE Computer Engeneering
UNIVERSITY OF DELHI
NETAJI SUBHAS INSTITUTE OF TECHNOLOGY
SCHEME OF COURSES
FOR
B.E. COMPUTER ENGINEERING
"This B.E Computer Engineering Course has been passed in the meeting of Standing Committee on Academic
matters, University of Delhi, held on June 3, 2016." Page 1
218/Appendices/AC-Minutes/2016-17
Appendix - VI
1 PREAMBLE 3-14
2 PROGRAM OUTCOMES 15
"This B.E Computer Engineering Course has been passed in the meeting of Standing Committee on Academic
matters, University of Delhi, held on June 3, 2016." Page 2
219/Appendices/AC-Minutes/2016-17
Appendix - VI
PREAMBLE
I. INTRODUCTION
Higher education is very important for the growth and development of any country.
It is a living organ and requires continuous changes to ensure the quality of
education. National Knowledge Commission and University Grants Commission
have recommended many academic reforms to address the challenges of today’s
networked globalized world. People are coming together with the help of new
technologies which is resulting towards new aspirations, expectations,
collaborations and associations. The concept of “work in isolation” may not be
relevant and significant anymore. The UGC guidelines on adoption of Choice
Based Credit System may be an important step to revamp the processes, systems
and methodologies of Higher Educational Institutions (HEIs). The teacher centric
mode be changed to learner centric mode. Class room teaching and learning be
made effective, relevant and interesting. Concepts and theories be explained with
examples, experimentation and related applications.
The Choice Based Credit System supports the grading system which is considered
to be better than conventional marking system. It is followed in many reputed
institutions in India and abroad. The uniform grading system facilitates student
mobility across institutions within and across countries and also enables potential
employers to assess the performance of students. The Choice Based Credit System
"This B.E Computer Engineering Course has been passed in the meeting of Standing Committee on Academic
matters, University of Delhi, held on June 3, 2016." Page 3
220/Appendices/AC-Minutes/2016-17
Appendix - VI
The Indian Higher Education Institutions have been moving from the conventional
annual system to semester system. Currently many of the institutions have
already introduced the Choice Based Credit System. The semester system
accelerates the teaching-learning process and enables vertical and horizontal
mobility in learning. The credit based semester system provides flexibility in
designing curriculum and assigning credits based on the course content and
hours of teaching. The Choice Based Credit System provides a ‘cafeteria’ type
approach in which the students can take courses of their choice, learn at their
own pace, undergo additional courses to acquire more than the required credits
and adopt an interdisciplinary approach to learning.
This scheme and courses are related to four year Computer Engineering
programme with following Programme Educational Objectives (PEO).
1. Graduates of the program will have successful technical and
professional careers in industry, academia, govt. and
entrepreneurship.
2. Graduates of the program will hold strong professional ethics with
good team skills and communication
3. Graduates of the program will engage in lifelong learning to
acquire new knowledge in an evolving technological landscape.
B. Types of Courses
Courses are the subjects that comprise the Computer Engineering programme.
"This B.E Computer Engineering Course has been passed in the meeting of Standing Committee on Academic
matters, University of Delhi, held on June 3, 2016." Page 4
221/Appendices/AC-Minutes/2016-17
Appendix - VI
2. The learning outcomes of each course will be defined before the start of a
semester.
"This B.E Computer Engineering Course has been passed in the meeting of Standing Committee on Academic
matters, University of Delhi, held on June 3, 2016." Page 5
222/Appendices/AC-Minutes/2016-17
Appendix - VI
4. Each credit course contributes certain credits to the programme. A course can
be offered either as a full course (4 credits) or as a half course (2 credits). A
full course is conducted with 3 hours of lectures and either 1 hour of tutorial
or 2 hours of practical work per week. A half course is conducted with 2 hours
of lectures.
8. Apart from the above courses, Audit Courses may be offered. They do not carry
credits but aim at expanding knowledge or bridging deficiency in knowledge or
skill.
"This B.E Computer Engineering Course has been passed in the meeting of Standing Committee on Academic
matters, University of Delhi, held on June 3, 2016." Page 6
223/Appendices/AC-Minutes/2016-17
Appendix - VI
1. Letter Grades and Grade Points: A 10-point grading system shall be used
with the letter grades as given in Table 1.
2. Fail grade: A student obtaining Grade F shall be considered fail and will
be required to reappear in the examination. If the student does not want to
reappear in an elective course (that is, EG, ED, EO, FE but not CC or FC
courses) then he/she can re-register afresh for a new elective course.
3. Audit course: For audit courses, ‘Satisfactory’ or ‘Unsatisfactory’ shall be
indicated instead of the letter grade and this will not be counted for the
computation of SGPA/CGPA.
4. Fairness in assessment: The CBCS promotes continuous evaluation system
where the weightage of end semester examinations should not be more than
60%. The departments shall design its own methods for continuous
evaluation. It shall have the flexibility and freedom in designing the
examination and evaluation methods that best fits the curriculum, syllabi
and teaching-learning methods. In this regard, checks and balances will be
implemented to ensure fair and effective assessment and examination
process.
"This B.E Computer Engineering Course has been passed in the meeting of Standing Committee on Academic
matters, University of Delhi, held on June 3, 2016." Page 7
224/Appendices/AC-Minutes/2016-17
Appendix - VI
ii. The CGPA is also calculated in the same manner taking into
account all the courses taken by a student over all the semesters of
a programme, i.e.
where SPGA(Si) is the SGPA of the ith semester and Ci is the total
number of credits in that semester.
iii. The SGPA and CGPA shall be rounded off to 2 decimal points and
reported in the transcripts.
"This B.E Computer Engineering Course has been passed in the meeting of Standing Committee on Academic
matters, University of Delhi, held on June 3, 2016." Page 8
225/Appendices/AC-Minutes/2016-17
Appendix - VI
i. Biotechnology: BT
ii. Computer Engineering: CE
iii. Electronics and Communication Engineering: EC
iv. Instrumentation and Control Engineering: IC
v. Information Technology: IT
vi. Manufacturing Processes and Automation Engineering: MA
vii. Mechanical Engineering: ME
"This B.E Computer Engineering Course has been passed in the meeting of Standing Committee on Academic
matters, University of Delhi, held on June 3, 2016." Page 9
226/Appendices/AC-Minutes/2016-17
Appendix - VI
V. EVALUATION SCHEME
"This B.E Computer Engineering Course has been passed in the meeting of Standing Committee on Academic
matters, University of Delhi, held on June 3, 2016." Page 10
227/Appendices/AC-Minutes/2016-17
Appendix - VI
The Committee of Courses and Studies in each department shall appoint one or
more Evaluation-cum-Review Committees (ERC), each committee dealing with one
course or a group of courses. This ERC consists of all faculty members who are likely
to teach such course(s).
"This B.E Computer Engineering Course has been passed in the meeting of Standing Committee on Academic
matters, University of Delhi, held on June 3, 2016." Page 11
228/Appendices/AC-Minutes/2016-17
Appendix - VI
"This B.E Computer Engineering Course has been passed in the meeting of Standing Committee on Academic
matters, University of Delhi, held on June 3, 2016." Page 12
229/Appendices/AC-Minutes/2016-17
Appendix - VI
230/Appendices/AC-Minutes/2016-17
Appendix - VI
The curriculum will be updated regularly within a period of 5 to 10 years since last
revision, to keep pace with the advancements in the field of computer engineering.
1. Lay guidelines for executing all the provisions and stipulations of the programme
PROGRAM OUTCOMES
At the completion of the B.E. Computer Engineering Program, a student will
achieve the following outcomes:
1. Gain an ability to apply the knowledge of mathematics, science, Engineering
fundamentals and computer engineering in solving complex engineering
problems.
2. Acquire the ability to survey the literature, conduct experiments, interpret data
and analyze complex engineering problems.
"This B.E Computer Engineering Course has been passed in the meeting of Standing Committee on Academic
matters, University of Delhi, held on June 3, 2016." Page 14
231/Appendices/AC-Minutes/2016-17
Appendix - VI
"This B.E Computer Engineering Course has been passed in the meeting of Standing Committee on Academic
matters, University of Delhi, held on June 3, 2016." Page 15
232/Appendices/AC-Minutes/2016-17
Appendix - VI
FExxx Foundation
FE - - - 2 - - - - - _
1* Elective
23/25
20 subject
2*
1* : The course codes, LTP distribution and Evaluation Scheme for Foundation Electives are given in Table 3.
2*: The actual weekly load depends upon the elective chosen by the student under FE (Refer Table 3)
CA MS ES CA ES
FC006 FC Mathematics-I I 3 1 0 4 25 25 50 - - None
"This B.E Computer Engineering Course has been passed in the meeting of Standing Committee on Academic
matters, University of Delhi, held on June 3, 2016." Page 16
233/Appendices/AC-Minutes/2016-17
Appendix - VI
Discrete 3 1 0 None
CEC01 CC 4 25 25 50 - -
Structures
"This B.E Computer Engineering Course has been passed in the meeting of Standing Committee on Academic
matters, University of Delhi, held on June 3, 2016." Page 17
234/Appendices/AC-Minutes/2016-17
Appendix - VI
"This B.E Computer Engineering Course has been passed in the meeting of Standing Committee on Academic
matters, University of Delhi, held on June 3, 2016." Page 18
235/Appendices/AC-Minutes/2016-17
Appendix - VI
26/28 22
2*
1* : The course codes, LTP distribution and Evaluation Scheme for Foundation Electives (FE) are given in Table 3.
2*: The actual weekly load depends upon the elective chosen by the student under FE (Table 3).
CA MS ES CA ES
"This B.E Computer Engineering Course has been passed in the meeting of Standing Committee on Academic
matters, University of Delhi, held on June 3, 2016." Page 19
236/Appendices/AC-Minutes/2016-17
Appendix - VI
"This B.E Computer Engineering Course has been passed in the meeting of Standing Committee on Academic
matters, University of Delhi, held on June 3, 2016." Page 20
237/Appendices/AC-Minutes/2016-17
Appendix - VI
"This B.E Computer Engineering Course has been passed in the meeting of Standing Committee on Academic
matters, University of Delhi, held on June 3, 2016." Page 21
238/Appendices/AC-Minutes/2016-17
Appendix - VI
CA MS ES CA ES
CC Theory of
CEC15 3 1 0 4 25 25 50 0 0 None
Computation
CC High
CEC16 Performance 3 0 2 4 15 15 40 15 15 None
Computing
CC Compiler
CEC17 3 0 2 4 15 15 40 15 15 None
Construction
CC Modeling and
CEC18 3 0 2 4 15 15 40 15 15 None
Simulation
EO/EG/
1* Elective(s) - - - - - - - - - -
ED
16-28
2*
3*
1* : The LTP distribution, Evaluation Scheme and pre-requisite(s) for Elective courses are given in Tables 4, 5 and 6.
The course code will depend upon the elective(s) chosen by the student.
3*: The weekly load will depend upon the electives chosen by the student from Tables 3, 4, 5 and 6.
4*: A student may register for courses leading to a minimum of 16 credits and a maximum of 28 credits. Normally a
student registers for courses leading to 22 credits.
"This B.E Computer Engineering Course has been passed in the meeting of Standing Committee on Academic
matters, University of Delhi, held on June 3, 2016." Page 22
239/Appendices/AC-Minutes/2016-17
Appendix - VI
CA MS ES CA ES
Computer
CEC19 CC Control 3 1 0 4 25 25 50 - - None
Systems
CEC20 CC IT Law and 2 0 0 None
2 25 25 50 - -
Ethics
CEC21 CC Open Source 0 0 4 None
2 - - - 50 50
Technologies
1* EO/EG/
Elective(s) - - - - - - - - - -
ED
8-28
2*
3*
1* : The course code, LTP distribution, Evaluation Scheme and pre-requisite(s) for Elective courses under EO, EG and
ED will depend upon the electives chosen by the student as given in Tables 4, 5 and 6.
2*: The weekly load will depend upon the electives chosen by the student from Tables 4, 5 and 6.
3*: A student may register for courses leading to a minimum of 8 credits and a maximum of 28 credits. Normally a
student registers for courses leading to 22 credits.
"This B.E Computer Engineering Course has been passed in the meeting of Standing Committee on Academic
matters, University of Delhi, held on June 3, 2016." Page 23
240/Appendices/AC-Minutes/2016-17
Appendix - VI
Theory Practical
CA MS ES CA ES
CEC22
CC Training - - - 2 - - - 40 60 None
*1
*1: Students will undergo training in the industry / research organization / reputed Institute during the
Summer vacation after sixth Semester. This will be evaluated as a seventh Semester subject during end-
semester examination.
Training gives exposure to students on the working of the industry, on research directions and practical
applications of Computer Engineering and on work ethics.
"This B.E Computer Engineering Course has been passed in the meeting of Standing Committee on Academic
matters, University of Delhi, held on June 3, 2016." Page 24
241/Appendices/AC-Minutes/2016-17
Appendix - VI
Theory Practical
CA MS ES CA ES
CEC22 - - - None
CC Training 2 - - - 40 60
1*
CEC23 0 0 4 None
CC Project-I 4 0 0 0 40 60
2*
3* EO/EG/ED - - - - - - - - - -
Elective(s)
6-28
4*
5*
1*: The Training undertaken by students during the Summer vacation after VI Semester will be evaluated as a VII
Semester subject during end-semester examination.
2*: Project work is based on the students’ ability to understand, design and implement the fundamental concepts of
the basic sciences, mathematics, engineering subjects and human values.
3* : The Course code, LTP allocation, Evaluation Scheme and Pre-requisites for Electives will depend on the electives
chosen by the student as given in Tables 4, 5 and 6.
4*: The actual weekly load will depend upon the electives chosen by the student from Tables 4,5 and 6.
5*: A student may register for courses leading to a minimum of 6 credits and a maximum of 28 credits. Normally a
student registers for courses leading to 22 credits.
242/Appendices/AC-Minutes/2016-17
Appendix - VI
CA MS ES CA ES
CEC24 0 0 4 None
CC Project-II 4 0 0 0 40 60
1*
EO/EG/
2* Elective(s) - - - 4 - - - - - -
ED
4-28
3*
4*
1*: Project work is based on the students’ ability to understand, design and implement the fundamental concepts of
the basic sciences, mathematics, engineering subjects and human values.
2* : The Course code, LTP allocation, Evaluation Scheme and Pre-requisites for Electives will depend on the electives
chosen by the student as given in Tables 4, 5 and 6.
3*: The weekly load will depend upon the electives chosen by the student from Tables 4,5 and 6.
4*: A student may register for courses leading to a minimum of 4 credits and a maximum of 28 credits. Normally a
student registers for courses leading to 22 credits.
"This B.E Computer Engineering Course has been passed in the meeting of Standing Committee on Academic
matters, University of Delhi, held on June 3, 2016." Page 26
243/Appendices/AC-Minutes/2016-17
Appendix - VI
244/Appendices/AC-Minutes/2016-17
Appendix - VI
"This B.E Computer Engineering Course has been passed in the meeting of Standing Committee on Academic
matters, University of Delhi, held on June 3, 2016." Page 28
245/Appendices/AC-Minutes/2016-17
Appendix - VI
"This B.E Computer Engineering Course has been passed in the meeting of Standing Committee on Academic
matters, University of Delhi, held on June 3, 2016." Page 29
246/Appendices/AC-Minutes/2016-17
Appendix - VI
"This B.E Computer Engineering Course has been passed in the meeting of Standing Committee on Academic
matters, University of Delhi, held on June 3, 2016." Page 30
247/Appendices/AC-Minutes/2016-17
Appendix - VI
A Student may take any course offered by any department of the Institute under the
"This B.E Computer Engineering Course has been passed in the meeting of Standing Committee on Academic
matters, University of Delhi, held on June 3, 2016." Page 31
248/Appendices/AC-Minutes/2016-17
Appendix - VI
"This B.E Computer Engineering Course has been passed in the meeting of Standing Committee on Academic
matters, University of Delhi, held on June 3, 2016." Page 32
249/Appendices/AC-Minutes/2016-17
Appendix - VI
250/Appendices/AC-Minutes/2016-17
Appendix - VI
"This B.E Computer Engineering Course has been passed in the meeting of Standing Committee on Academic
matters, University of Delhi, held on June 3, 2016." Page 34
251/Appendices/AC-Minutes/2016-17
Appendix - VI
"This B.E Computer Engineering Course has been passed in the meeting of Standing Committee on Academic
matters, University of Delhi, held on June 3, 2016." Page 35
252/Appendices/AC-Minutes/2016-17
Appendix - VI
CA MS ES CA ES
Mathematics-
FC001 FC 3 1 0 4 25 25 50 - - None
I
COURSE OUTCOMES
1. By the end of this course, the student will be able to :
2. Analyze and test infinite series for its convergence.
3. Find Taylor’s series expansion, maxima & minima of functions of one and more
variables.
4. Calculate length, area, radius of curvature, surface of revolution and volume of
revolution.
5. Calculate area of a given region and volume enclosed by a surface.
COURSE CONTENT
Infinite Series: Tests for convergence of series (Comparison, Integral, Ratio’s, Raabe’s,
Logarithmic and nth root,), Alternating series, Absolute convergence, Conditional
convergence.
Function of Single Variable: Hyperbolic functions,Taylor’s and Maclaurin’s theorems
with remainder terms, Polar Curves, Angle between tangent and radius vector,
Curvature and Radius of Curvature, Asymptotes, Curve tracing, Applications of
definite integral to area, arc length, surface area and volume of revolution (in
Cartesian, parametric and polar co-ordinates).
Function of Several Variables: Partial Derivatives, Differentiability, Total differential,
Euler’s theorem, Jacobian, Taylor’s theorem, Maxima and Minima for functions of two
or more variables, Extreme values, Lagrange’s method of undetermined multipliers,
"This B.E Computer Engineering Course has been passed in the meeting of Standing Committee on Academic
matters, University of Delhi, held on June 3, 2016." Page 36
253/Appendices/AC-Minutes/2016-17
Appendix - VI
SUGGESTED READINGS
1. G. B. Thomas and R. L. Finney,“Calculus and Analytic Geometry,” Pearson
Education.
2 R. K. Jain and S. R. K. Iyenger, “Advanced Engineering Mathematics,” Narosa.
3 Erwin Kreyszig, “Advanced Engineering Mathematics”, Wiley.
4 Michael Greenberg, “Advanced Engineering Mathematics”, Pearson Education.
Course Pre-
Type Subject L T P Credits CA MS ES CA ES
Code Requisites
Computer 3 0 2 None
FC002 FC 4 15 15 40 15 15
Programming
COURSE OUTCOMES
1. To understand the basic terminology and program structures used in computer
programming to solve real world problems.
2. To learn the process of representing problems and writing, compiling and
debugging programs.
3. To develop programming skills in using different types of data, decision structures,
loops functions, pointers, data files and dynamic memory allocation/de-allocation.
4. To understand the need for continuing to learn new languages to solve complex
problems in different domains.
"This B.E Computer Engineering Course has been passed in the meeting of Standing Committee on Academic
matters, University of Delhi, held on June 3, 2016." Page 37
254/Appendices/AC-Minutes/2016-17
Appendix - VI
Linked List: Dynamic memory allocation, singly link list, traversing, searching,
insertion, deletion.
Files: Types of files, working with files, usage of file management functions.
"This B.E Computer Engineering Course has been passed in the meeting of Standing Committee on Academic
matters, University of Delhi, held on June 3, 2016." Page 38
255/Appendices/AC-Minutes/2016-17
Appendix - VI
SUGGESTED READINGS
1. B. W. Kernighan and D.M. Ritchie, “The C programming language”, Prentice Hall.
2. Herbert Schildt and Tata McGraw Hill ,“The Complete Reference”,.
3. Yashwant Kanitkar, “Let us C”, BPB Publication
4. Byron Gottfried, Schaum Series, Tata McGraw Hill,“Schaum's Outline of Programming
with C”,
5. Addison Wesley, “Object Oriented Programming”, Budd.
6. D Samantha, “Object oriented Programming in C++ and Java “, PHI.
Stroustrup,”Programming in C++”, Special Edition, Addison Wesley.
"This B.E Computer Engineering Course has been passed in the meeting of Standing Committee on Academic
matters, University of Delhi, held on June 3, 2016." Page 39
256/Appendices/AC-Minutes/2016-17
Appendix - VI
Electrical and
FC003 FC Electronics 3 0 2 4 15 15 40 15 15 None
Engineering
COURSE OUTCOMES
1. To understand the basic concepts of magnetic, AC & DC circuits
2. To learn the basics of semiconductor diodes, BJTs
3. Will be able to analyze basic electrical and electronic circuits
COURSE CONTENT
D.C. Circuits and Theorems: Ohm’s Law, KCL, KVL Mesh and Nodal Analysis, Circuit
parameters, energy storage aspects, Superposition, Thevenin’s, Norton’s, Reciprocity,
Maximum Power Transfer Theorem, Millman’s Theorem, Star-Delta Transformation.
Application of theorem to the Analysis of dc circuits.
A.C.Circuits: R-L, R-C, R-L-C circuits (series and parallel), Time Constant, Phasor
representation, Response of R-L, R-C and R-L-C circuit to sinusoidal input Resonance-
series and parallel R-L-C Circuits, Q-factor, Bandwidth.
"This B.E Computer Engineering Course has been passed in the meeting of Standing Committee on Academic
matters, University of Delhi, held on June 3, 2016." Page 40
257/Appendices/AC-Minutes/2016-17
Appendix - VI
Bias Stabilization: Need for stabilization, fixed bias, emitter bias, self bias, bias
stability with respect to variation in lco VBE & β, Stabilization factors, thermal stability.
SUGGESTED READINGS
(1) Vincent Del Toro , “Electrical Engineering Fundamentals,”
(2) Basic Electrical Engineering: Mittle and Mittal, TMH
(3) Electronic Devices and Circuit Theory: Boylestad and Nashelsky, 10 th Edition,
Pearson.
(4) Microelectronics: Millman & Grabel. TMH.
CA ES Pre-
Course L T P
Type Subject Credits CA MS ES Requisites
Code
COURSE OUTCOMES
1. Knowing important concepts and phenomena linked to relativity, waves and
oscillations and be able to do analytical and numerical calculations for faithful
measurements, observations and gravitational wave communications.
2. The course is helpful to the students in understanding various optical wave
phenomena which are required for optical & electromagnetic wave communications
and in optical devices.
3. Concepts of Laser and Optical Fiber for modern developments in physics which are
helpful in designing and developing new devices used in optical communications,
medicine, environment, industries and related physics.
"This B.E Computer Engineering Course has been passed in the meeting of Standing Committee on Academic
matters, University of Delhi, held on June 3, 2016." Page 41
258/Appendices/AC-Minutes/2016-17
Appendix - VI
259/Appendices/AC-Minutes/2016-17
Appendix - VI
SUGGESTED READINGS
1. Arthur Beiser, Shobhit Mahajan, “Concepts of Modern Physics,” McGraw Hill
2. Serwey , Moses, Moyer, “Modern Physics,” Cengage Learning
3. S Chand & co., “Mechanics”, D S Mathur
4. Jenkins and White, “Fundamentals of Optics”, McGraw Hill
5. N. Subramaniam and Brij Lal (S Chand), “A Text Book of Optics”
6. Indu Prakash, “A Text Book of Practical Physics, Volume-1”, Kitab Mahal
Publication.
Course Pre-
Type Subject L T P Credits CA MS ES CA ES requisites
Code
COURSE OUTCOMES
1. The course will focus on the four integral skills of language, improving the
proficiency levels in all of them and to learn to use language as a tool for effective
communication.
2. This course will widen the understanding of the learners in all genres of literature
(short stories, poetry, autobiographies..) with the help of expository pieces .
3. The course will strive to equip the learner with the ability to express oneself and be
understood by others with clarity and precision, in both written and spoken forms.
4. This course will encourage creative use of language through translation,
paraphrasing and paragraph writing.
5. Along with the above, the course will also build confidence and encourage the
students to use a standard spoken form of English in order to prepare them to face
job interviews, workplace and in higher studies.
"This B.E Computer Engineering Course has been passed in the meeting of Standing Committee on Academic
matters, University of Delhi, held on June 3, 2016." Page 43
260/Appendices/AC-Minutes/2016-17
Appendix - VI
SUGGESTED READINGS
1. Margaret M Maison, “Examine Your English”
"This B.E Computer Engineering Course has been passed in the meeting of Standing Committee on Academic
matters, University of Delhi, held on June 3, 2016." Page 44
261/Appendices/AC-Minutes/2016-17
Appendix - VI
Evaluation Scheme
(Percentage weights)
Course Pre-
Type Subject L T P Credits
Code Theory Practical requisites
CA MS ES CA ES
FC006 FC Mathematics-II 3 1 0 4 25 25 50 - - None
COURSE OUTCOMES
1. By the end of this course, the student will be able to solve system of equations and
know the concepts of eigenvalue and eigenvector.
2. Know the concepts of Ordinary Differential Equations and its applications.
3. Know the concepts of Special Functions.
4. Know the concepts of Laplace Transforms and its application to solve Differential
Equations
COURSE CONTENT
Matrices: Rank, inverse and normal form of a matrix using elementary
transformations, consistency of linear system of equations; linear dependence/
independence, linear transformations, eigenvalues and eigenvectors of a matrix,
Cayley-Hamilton theorem, diagonalization.
Ordinary Differential Equations: Second & higher order linear differential equation
with constant coefficients, general solution of homogenous and non- homogenous
equations, Euler-Cauchy equation, Application to mass- spring system and electrical
circuits. Power series method.
Special Functions: Beta and Gamma functions, Dirichlet’s Integral. Legendre
equation, Legendre polynomials and its properties, Bessel equation, and Bessel
function of first kind and its properties, ber and bei functions.
Laplace Transforms: Basic properties, Laplace transform of derivatives and
integrals. Laplace of periodic functions. Laplace transforms solution of IVP and
simultaneous linear differential equations, unit step function, Dirac-Delta function.
"This B.E Computer Engineering Course has been passed in the meeting of Standing Committee on Academic
matters, University of Delhi, held on June 3, 2016." Page 45
262/Appendices/AC-Minutes/2016-17
Appendix - VI
SUGGESTED READINGS
1. G. B. Thomas and R. L. Finney, “Calculus and Analytic Geometry”, Pearson
Education.
2. R. K. Jain and S. R. K. Iyenger, “Advanced engineering mathematics”, Narosa.
3.Erwin Kreyszig, “Advanced engineering mathematics,” Wiley.
4.Michael Greenberg, “Advanced engineering mathematics”, Pearson Education.
Course Pre-
Type Subject L T P Credits CA MS ES CA ES requisites
Code
COURSE OUTCOMES
1. The course will focus on the four integral skills of language, improving the
proficiency levels in all of them and to learn to use language as a tool for effective
communication.
2. This course will widen the understanding of the learners in all genres of literature
(short stories, poetry, autobiographies..) with the help of expository pieces .
3. The course will strive to equip the learner with the ability to express oneself and be
understood by others with clarity and precision, in both written and spoken forms.
4. This course will encourage creative use of language through translation,
paraphrasing and paragraph writing.
5. Along with the above, the course will also build confidence and encourage the
students to use a standard spoken form of English in order to prepare them to face
job interviews, workplace and in higher studies.
COURSE CONTENT
Literature
1. Anton Chekov: The Bet
2. Guy de Maupassant: The Necklace
3. D H Lawrence: Odour of Chrysanthemums
4. R K Narayan: Malgudi Days
"This B.E Computer Engineering Course has been passed in the meeting of Standing Committee on Academic
matters, University of Delhi, held on June 3, 2016." Page 46
263/Appendices/AC-Minutes/2016-17
Appendix - VI
Language Skills
1. Translation, paragraph writing, paraphrasing, summarizing,
2. Comprehension
3. Presentations/book reviews/reading exercises
SUGGESTED READINGS
1. Martin Hewing, “Advanced English Grammar”:
2. Meenakshi Raman & Sangeeta Sharma, “Technical Communication”
3. Renu Gupta, “A Course in Academic Writing”
"This B.E Computer Engineering Course has been passed in the meeting of Standing Committee on Academic
matters, University of Delhi, held on June 3, 2016." Page 47
264/Appendices/AC-Minutes/2016-17
Appendix - VI
SEMESTER II
Course Pre-
Type Subject L T P Credits CA MS ES CA ES requisites
Code
Discrete 3 1 0 None
CEC01 CC 4 25 25 50 - -
Structures
COURSE OUTCOMES
1. To be able to analyze and compute time and space complexity of various
computing problems.
2. To be able to design algorithms for solving various problems using the concepts of
discrete mathematics.
3. To apply the concepts and algorithms learnt in developing large scale applications
and modify them.
COURSE CONTENT
Number Theory: Infinity and Natural numbers, Integers, Divisibility and Euclidean
algorithm, Prime numbers, Congruence, Modular arithmetic, Euler function, Public
key cryptosystems and RSA.
Counting: Counting and analysis of algorithms, Permutations, Combinations,
"This B.E Computer Engineering Course has been passed in the meeting of Standing Committee on Academic
matters, University of Delhi, held on June 3, 2016." Page 48
265/Appendices/AC-Minutes/2016-17
Appendix - VI
SUGGESTED READINGS
1. Keneth H. Rosen, “Discrete Mathematics and Its Applications”, TMH.
2. C.L. Liu, “Elements of Discrete Mathematics”, TMH.
3. Kolman, Busby & Ross, “Discrete Mathematical Structures”, PHI.
4. Narsingh Deo, “Graph Theory With Application to Engineering and Computer
Science”, PHI.
5. Charles S. Grimmstead, J. Laurie Snell “Introduction to Probability”.
6. Kai Lai Chung, “A Course in probability theory”.
Course Pre-
Type Subject L T P Credits CA MS ES CA ES requisites
Code
Data 3 0 2 None
CEC02 CC 4 15 15 40 15 15
Structures
COURSE OUTCOMES
1. Candidate will be able to choose the appropriate data structure for a specified
problem and determine the same in different scenarios of real world problems.
2. Become familiar with writing recursive methods and reducing larger problems
"This B.E Computer Engineering Course has been passed in the meeting of Standing Committee on Academic
matters, University of Delhi, held on June 3, 2016." Page 49
266/Appendices/AC-Minutes/2016-17
Appendix - VI
COURSE CONTENT
Introduction: Basic Terminology: Elementary Data Organization, Data Structure
Operations, Algorithms Complexity and Time-Space Trade off.
Arrays: Array Definition and Analysis, Representation of Linear Arrays in Memory,
Traversing, Insertion And Deletion in Array, Single Dimensional Arrays, Two
Dimensional Arrays, Bubble Sorting, Selection Sorting, Linear Search, Binary Search,
Multidimensional Arrays, Function Associated with Arrays, Character String in C,
Character String Operations, Arrays as parameters, Implementing One Dimensional
Array.
Stacks and Queues: Introduction to Operations Associated with Stacks Push & Pop,
Array representation of stacks, Operation associated with stacks: Create, Add, Delete,
Application of stacks recursion polish expression and their compilation conversion of
infix expression to prefix and postfix expression, Tower of Hanoi problem,
Representation of Queues, Operations of queues: Create, Add, Delete, Front, Empty,
Priority Queues and Heaps, Dequeue.
Recursion: Recursive thinking, Recursive Definition of Mathematical Formulae,
Recursive Array Search, Recursive Data Structure, Problem Solving With Recursion,
Back Tracking
Linked Lists:More operations on linked list, polynomial addition, Header nodes,
doubly linked list, generalized list, circular linked lists.
Trees:Trees – mathematical properties, Binary Search Trees and their representation,
expression evaluation, Complete Binary trees, Extended binary trees, Traversing
binary trees, Searching, Insertion and Deletion in binary search trees, Complexity of
searching algorithm, Path length, Huffman’s algorithm, General trees, AVL trees,
Threaded trees, B trees, Trie data structure
Sorting: Insertion Sort, Quick sort, two-way Merge sort, Heap sort, sorting on
different keys, External sorting.
Graphs: Sequential representation of graphs, Adjacency matrices, Search and
"This B.E Computer Engineering Course has been passed in the meeting of Standing Committee on Academic
matters, University of Delhi, held on June 3, 2016." Page 50
267/Appendices/AC-Minutes/2016-17
Appendix - VI
"This B.E Computer Engineering Course has been passed in the meeting of Standing Committee on Academic
matters, University of Delhi, held on June 3, 2016." Page 51
268/Appendices/AC-Minutes/2016-17
Appendix - VI
COURSE OUTCOMES
COURSE CONTENT
Introduction to Digital Systems
Number Systems and Codes: Binary, octal and hexadecimal number systems,
Number-Base Conversions, Complements of Numbers, Signed numbers, Fixed and
floating point numbers, Binary Arithmetic, Binary Codes: BCD, Gray, Excess-3,
ASCII, Error detection and correction codes - parity check codes and Hamming code.
Combinatorial Logic Systems: Basic logic operation, Logic gates and Truth tables,
Positive and Negative Logic, Boolean Algebra: Basic postulates and fundamental
theorems, SOP and POS forms, Min terms, Max terms, Canonical Form, Gate level
Minimization: K-map and Quine-McCluskey tabular methods, NAND/NOR
implementations
Design Concepts using Hardware Description Language: VHDL Programming
Structure, Model, Test Bench, Simulation Tool
Combinational Logic Modules, their applications and VHDL Modeling: Decoders,
encoders, multiplexers, demultiplexers, Parity circuits, Comparators, Code
Converters, Arithmetic modules- adders, subtractors, BCD Adder, ALU and
multipliers, Implementing boolean function with multiplexers / decoders
Introduction to different logic families: Operational characteristics of BJT and
MOSFET as switch, Structure and operations of TTL and CMOS gates, Electrical
"This B.E Computer Engineering Course has been passed in the meeting of Standing Committee on Academic
matters, University of Delhi, held on June 3, 2016." Page 52
269/Appendices/AC-Minutes/2016-17
Appendix - VI
Guidelines for Practical Work: In the practical portion of this course, students will
use VHDL to model digital systems in a simulator. Students will model basic gates,
combinational circuits, sequential circuits, memory and state machine based
designs.
1. Stephen Brown and Zvonko Vranesic, "Fundamentals of Digital Logic with VHDL
Design", 3rd Edition, McGraw-Hill
2. R.J. Tocci., N.S.Widmer, G.L. Moss, “Digital Systems, Principles and
Applications”,11th Edition, Pearson Education
3. M. Morris Mano and Michael D. Ciletti,"Digital Design", 5th Edition, Pearson
"This B.E Computer Engineering Course has been passed in the meeting of Standing Committee on Academic
matters, University of Delhi, held on June 3, 2016." Page 53
270/Appendices/AC-Minutes/2016-17
Appendix - VI
Pre-
Course requisi
Type Subject L T P Credits CA MS ES CA ES
Code tes
COURSE OUTCOMES
1. To gain an understanding of the scientific principles, working and applications of
communication systems
2. To gain an understanding of modulation techniques
3. To acquire the skills needed to design communication systems for different
applications
COURSE CONTENT
Representation of signals and systems: Fourier Series,Fourier transform and its
properties, Hilbert transform, pre-envelope representation, representation of band
pass signals.
Analog communication: Elements of communication, amplitude modulation &
demodulation, DSB-SC Modulation & demodulation, SSB-SC Modulation &
demodulation, frequency modulation (direct method only), NBFM, WBFM, frequency
demodulation (balanced slope detector and phase discriminator).
Probability theory and random process: probability theory random variables and
transformations random processes, mean, correlation, covariance, moments, power
spectral density, Gaussian process, Stationarity, Central limit theorem.
Sampling and pulse communication: Sampling theorem , types of sampling, PAM ,
"This B.E Computer Engineering Course has been passed in the meeting of Standing Committee on Academic
matters, University of Delhi, held on June 3, 2016." Page 54
271/Appendices/AC-Minutes/2016-17
Appendix - VI
CA MS ES CA ES
Design and
CEC05 CC Analysis of 3 0 2 4 15 15 40 15 15 None
Algorithms
COURSE OUTCOMES
1. To be able to analyze a problem in terms of processing steps, time and space
complexity.
2. To be able to design and implement the algorithms for any given application.
3. To be able to develop software applications using various programming languages in
collaborative groups.
4. To apply the principles learnt in solving problems encountered in career or real life
situations.
CONTENTS
Introduction: Algorithm Design paradigms- motivation, concept of algorithmic efficiency,
"This B.E Computer Engineering Course has been passed in the meeting of Standing Committee on Academic
matters, University of Delhi, held on June 3, 2016." Page 55
272/Appendices/AC-Minutes/2016-17
Appendix - VI
273/Appendices/AC-Minutes/2016-17
Appendix - VI
SUGGESTED READINGS
1. Berman. Paul, “Algorithms, Cengage Learning”.
2. Richard Neopolitan, Kumar SS Naimipour, “Foundations of Algorithms”
3. T .H . Cormen, C .E .Leiserson, R .L .Rivest “Introduction to Algorithms”, PHI.
4. E. Horowitz, S. Sahni, and S. Rajsekaran, “Funadmentals of Computer Algorithms,”
Galotia Publication
Course Pre-
Type Subject L T P Credits CA MS ES CA ES requisites
Code
Database
CEC06 CC Management 3 0 2 4 10 20 40 15 15 None
Systems
COURSE OUTCOMES
1. At the end of the course students would be able to learn about various database
models, tools for databases.
2. Students would be able to recognize and use contemporary logical design methods and
develop sophisticated queries to extract information from large datasets.
3. Understand and evaluate the role of database management systems in information
technology applications within organizations.
COURSE CONTENT
Introduction: Database administrator & Database Users, Characteristics of the Database,
Database Systems and Architecture, Data Models, Schemes & Instances, DBMS
Architecture & Data Independence, Database Languages & Interfaces, DDL, DML, DCL,
Overview of Hierarchical, Network & Relational Data Base Management Systems
Data Modeling: Data modeling using The Entity-Relationship Model – Entities, Attributes
and Relationships, Cardinality of Relationships, Strong and Weak Entity Sets,
"This B.E Computer Engineering Course has been passed in the meeting of Standing Committee on Academic
matters, University of Delhi, held on June 3, 2016." Page 57
274/Appendices/AC-Minutes/2016-17
Appendix - VI
"This B.E Computer Engineering Course has been passed in the meeting of Standing Committee on Academic
matters, University of Delhi, held on June 3, 2016." Page 58
275/Appendices/AC-Minutes/2016-17
Appendix - VI
Course Pre-requisites
Type Subject L T P Credits CA MS ES CA ES
Code
Object 3 0 2 None
CEC07 CC 4 15 15 40 15 15
Orientation
COURSE OUTCOMES
1. To be able to visualize and analyze complex real life problems in an object oriented
manner
2. To be able to code using any state of the art object oriented language like Java or python
3. To be able to appreciate the relevance of object oriented paradigm in software engineering
for reducing cost and effort involved in software development
COURSE CONTENT
Object Oriented Principles: Modeling and Design: Concepts of object orientation: object
classes, encapsulation, complex objects, object identity, inheritance and multiple
inheritance, Persistence, overloadingand polymorphism
Object Oriented Languages: Detailed discussion and comparison of a Object Oriented
Programming language such as Java/ Python (any one)
276/Appendices/AC-Minutes/2016-17
Appendix - VI
"This B.E Computer Engineering Course has been passed in the meeting of Standing Committee on Academic
matters, University of Delhi, held on June 3, 2016." Page 60
277/Appendices/AC-Minutes/2016-17
Appendix - VI
SUGGESTED READINGS
1, Betrand Meyer, “Object oriented software Construction” Prentice hall.
2.Grady Booch, “Object oriented Analysis and Design, 2nd edition, Bejamin / cummings,”
Course Pre-
Type Subject L T P Credits CA MS ES CA ES requisites
Code
Computer
Architecture 3 1 0 None
CEC08 CC 4 25 25 50 - -
and
Organization
COURSE OUTCOMES
1. To understand the architecture of modern processors and organization of its
components, and relationship between hardware and software in digital machines.
2. To design instructions and corresponding logic circuits for a simple CPU with its
essential components such as ALU, a register file, memory and input-output.
3. To appreciate the evolving technology that governs the evolution of modern computers
and continue to keep abreast of state-of-art in computing technology
COURSE CONTENT
Overview of computer organization: Characteristics of a general purpose computer, The
stored program concept, von Neumann architecture, Harvard architecture, Programmer’s
model - the Instruction set architecture (ISA), ISA design and performance criteria, Basic
computer organization with CPU, memory and IO subsystems, Interconnect busses,
Evolution of CISC and RISC based processors and their merging.
Instruction Set Architectures: Machine instruction, Machine cycle and Instruction cycles,
"This B.E Computer Engineering Course has been passed in the meeting of Standing Committee on Academic
matters, University of Delhi, held on June 3, 2016." Page 61
278/Appendices/AC-Minutes/2016-17
Appendix - VI
SUGGESTED READINGS
1. William stallings, “Computer Organization and Architectue, PHI”
"This B.E Computer Engineering Course has been passed in the meeting of Standing Committee on Academic
matters, University of Delhi, held on June 3, 2016." Page 62
279/Appendices/AC-Minutes/2016-17
Appendix - VI
Course M Pre-requisites
Type Subject L T P Credits CA ES CA ES
Code S
CC Analog 3 0 2 None
CEC09 4 15 15 40 15 15
Electronics
COURSE OUTCOMES
1. To understand the physics governing the working of basic electronic devices and
describe the working of devices and circuits mathematically.
2. To use devices to design, build and experimentally evaluate electronic circuits
3. To acquire the skills needed to develop complex electronic circuits using components
such as amplifiers, oscillators and OP-Amps.
COURSE CONTENT
"This B.E Computer Engineering Course has been passed in the meeting of Standing Committee on Academic
matters, University of Delhi, held on June 3, 2016." Page 63
280/Appendices/AC-Minutes/2016-17
Appendix - VI
SUGGESTED READINGS
1.Millman and Halkias, Integrated Circuits, Tata McGraw Hill
2.A. S. Sedra, K.S. Smith, Microelectronic Circuits
Theory Practical
CA MS ES CA ES
COURSE OUTCOMES
1. To acquire insight into architectural details of microprocessors, assembly language
programming, and different bus structures and standards.
2. To understand and implement the interfacing of external devices to the processor.
3. To analyze the hardware/software tradeoffs involved in the design of
microprocessor and microcontrollers based systems and apply this knowledge to
create novel products and solutions for real time problems.
"This B.E Computer Engineering Course has been passed in the meeting of Standing Committee on Academic
matters, University of Delhi, held on June 3, 2016." Page 64
281/Appendices/AC-Minutes/2016-17
Appendix - VI
COURSE CONTENTS
Introduction: General definitions of mini computers, microprocessors, micro
controllers and digital signal processors. Overview of 8085 Microprocessor-Pin
description, Internal architecture.
Overview of instruction set of 8085-Data transfer, arithmetic, logical, branch, stack and
machine control groups of instruction set.
Programming – Basic arithmetic operations, Stacks and Subroutines, Counters and
Time delays.
Architecture of 8086 Microprocessor: Overview of 8086 microprocessor-Functional
Diagram, Register Organization, Memory Segmentation, Signal Descriptions-Common
Function Signals, Minimum and Maximum Mode Signals, Timing Diagrams, Interrupts
of 8086.
Assembly language of 8086: Instruction Set, Addressing Modes, Assembler directives,
8086 Assembly Programming- simple programs involving logical, branch and call
instructions, sorting, evaluating arithmetic expressions, string manipulations.
Interfacing with 8086: Interfacing with RAMs, ROMs along with the explanation of
timing diagrams. Interfacing with peripheral ICs like programmable peripheral interface
8255, programmer DMA controller 8237, programmable Keyboard controller 8279,
programmable interrupt controller 8259 and 8253 programmable timer. Interfacing
with key boards, LEDs, LCDs, ADCs, and DACs. Math co-processor 8087.
High end processors: Introduction to 80386 and 80486-The 32 bit processors,
Register Organization, Addressing Modes, Data Types, Real Address Mode, Protected
Mode, Segmentation, Paging, Virtual 8086 Mode, Introduction to Pentium Processors.
Guidelines for Practical work:
- Assembly language programs: Interchange two blocks of data in memory, Basic
arithmetic operations: (a) square and cube of an 8 bit number. (b) LCM of a 16
bit no. (c) GCD of two 16 bit unsigned integers. (d) factorial of an 8 bit number,
16 bit multiplication for signed and unsigned numbers, 32 bit Division, Sorting a
given set of 16 bit unsigned integers in ascending/descending order using
bubble sort algorithm.
- Code Conversions: ASCII to Binary conversion
- Programs on String Manipulation: (a) Transfer a given source string to
destination using string instructions. (b) Reverse a string. (c) Check if the given
string is a palindrome or not (d) Scan a string of characters for “FF” (e)
"This B.E Computer Engineering Course has been passed in the meeting of Standing Committee on Academic
matters, University of Delhi, held on June 3, 2016." Page 65
282/Appendices/AC-Minutes/2016-17
Appendix - VI
COURSE OUTCOMES
1.Understand that software development cannot be done in an adhoc fashion and has
to follow a disciplined systematic approach for timely development of software within
budget.
2. Learn various techniques used for software project management, software
estimation and software testing.
COURSE CONTENT
Introduction: Importance of software engineering as a discipline, The Software
evolution, Software characteristics, Software components, Software applications, Crisis-
Problem and causes.
Software development life-cycle: Requirement analysis, software design, coding,
testing and maintenance and types of maintenance.
"This B.E Computer Engineering Course has been passed in the meeting of Standing Committee on Academic
matters, University of Delhi, held on June 3, 2016." Page 66
283/Appendices/AC-Minutes/2016-17
Appendix - VI
SUGGESTED READDINGS
1. R . S. Pressman, “Software Engineering – A practitioner’s approach”, 5th Ed., McGraw
Hill Int. Ed., 2001
2. K. K. Aggarwal&Yogesh Singh, “Software Engineering”, 2nd Ed., New Age
"This B.E Computer Engineering Course has been passed in the meeting of Standing Committee on Academic
matters, University of Delhi, held on June 3, 2016." Page 67
284/Appendices/AC-Minutes/2016-17
Appendix - VI
COURSE OUTCOMES
1. To understand the underlying mathematics for output primitives and to incorporate
with programming in drawing those primitive.
2. To use graphics primitives in drawing real life objects and to learn how to incorporate
characteristics such as shading and animation.
3. To work in collaboration to carry out graphic projects.
COURSE CONTENT
Introduction to computer graphics: Raster Graphics, Graphics hardware, Graphics
Libraries and an overview of any one of them such as OpenGL.
Scan Conversion: Line DDA, Midpoint and Bresenham’s algorithms, circle, ellipse,
parabola, hyperbola.
Line Clipping-Cohen Sutherland, Cyrus Beck, Midpoint Subdivision, Liang-Barsky,
Nicholl-Lee-Nicholl
Polygon clipping -Sutherland Hodgman, Weiler Atherton
Polygon Filling-Seed fill, Scanline Approach
"This B.E Computer Engineering Course has been passed in the meeting of Standing Committee on Academic
matters, University of Delhi, held on June 3, 2016." Page 68
285/Appendices/AC-Minutes/2016-17
Appendix - VI
SUGGESTED READINGS
1. Foley Van Dam, “Principle of Computer Graphics”,
2. Hearne and Baker, “Computer Graphics”
COURSE OUTCOMES
1. To acquire a thorough understanding of the state-of-the-art in modern network
architecture, protocols, networked systems and applications
2. To become proficient to develop software for modern networking devices
3. To have sufficient background knowledge to conduct networking research and
develop innovative ideas.
COURSE CONTENT
Introduction: Fundamentals of Digital Communication, Network Classification, Protocol
"This B.E Computer Engineering Course has been passed in the meeting of Standing Committee on Academic
matters, University of Delhi, held on June 3, 2016." Page 69
286/Appendices/AC-Minutes/2016-17
Appendix - VI
Programming assignments based on the concepts learned in the theory will be given
involving the usage of network status and control commands, real life network analyzer
tools (Wireshark), application development using network APIs available in operating
systems (Linux) and network simulators (ns2/Opnet). Briefly these will cover the
following:
1. Students will develop programs using system calls for process management, inter-
process communication, process synchronization, memory management and file
"This B.E Computer Engineering Course has been passed in the meeting of Standing Committee on Academic
matters, University of Delhi, held on June 3, 2016." Page 70
287/Appendices/AC-Minutes/2016-17
Appendix - VI
SUGGESTED READINGS
1. Andrew S. Tanenbaum, “Computer Networks”, 5th Edition, Pearson Education
2.William Stallings, “Data and Computer Communication”, 10th Edition, Pearson
Education
3. James F. Kurose & Keith W. Ross, “Computer Networking: A Top –down approach”,
6th Edition, Pearson Education
4. Behrouz A. Forouzan, “Data Communications and Networking”, 5th Edition,
McGraw-Hill Education
"This B.E Computer Engineering Course has been passed in the meeting of Standing Committee on Academic
matters, University of Delhi, held on June 3, 2016." Page 71
288/Appendices/AC-Minutes/2016-17
Appendix - VI
COURSE CONTENT
Overview: Operating systems – structure, operations, components, types, services,
user interfaces. System calls, system programs, system boot.
Process management: Processes – concept, scheduling, operations on processes,
interprocess communications. Threads – single- and multi-threaded processes. CPU
scheduling – criteria, algorithms, multiple-processor scheduling. Process
synchronization – critical-section problem, semaphores, classic synchronization
problems, monitors. Deadlocks – characterization, deadlock prevention, deadlock
avoidance, deadlock detection, recovery from deadlock.
Memory management: Main memory – memory allocation schemes, paging,
segmentation. Virtual memory – demand paging, page replacement, frame allocation,
thrashing.
Storage management: File system – files and directories, structure and
implementation of file systems, mounting and unmounting, storage allocation
methods, free-space management. Disk – structure, scheduling, management.
I/o management: i/o hardware, i/o interface, kernel i/o subsystem.
Protection and security: Access matrix, security threats.
"This B.E Computer Engineering Course has been passed in the meeting of Standing Committee on Academic
matters, University of Delhi, held on June 3, 2016." Page 72
289/Appendices/AC-Minutes/2016-17
Appendix - VI
SUGGESTED READINGS:
1. Silberschatz, A., Galvin P. B., and Gagne, G. 2005, “Operating System Principles
(7th ed.), Wiley”.
2. Stallings, W. 2014,“Operating Systems: Internals and Design Principles (8th ed.)”,
Pearson.
3. Tanenbaum, “A. S. 2007. Modern Operating Systems (3rd ed.)”, Pearson.
CA MS ES CA ES
Theory of
CEC15 CC 3 1 0 4 15 15 40 15 15 None
Computation
COURSE OUTCOMES
1. Acquire knowledge of Regular Languages, FA, CFG, Push Down Automata and Turing
recognizable languages
2. Be able to get a broad overview of the theoretical foundations of computer science
"This B.E Computer Engineering Course has been passed in the meeting of Standing Committee on Academic
matters, University of Delhi, held on June 3, 2016." Page 73
290/Appendices/AC-Minutes/2016-17
Appendix - VI
COURSE CONTENT
Finite Automata: Deterministic FA, Non deterministic FA, Regular expressions,
Finite Automaton with €- moves, Regular Expression, Regular Languages and Kleen’s
theorem– Conversion of NFA to DFA, Equivalence of finite Automaton and regular
expressions, Minimization of DFA, Pumping Lemma for Regular sets, Problems based
on Pumping Lemma.
Context Free Grammer: Grammar, Types of Grammar, Context Free Grammars and
Languages, Derivations, Ambiguity, Relationship between derivation and derivation
trees, Simplification of CFG, Elimination of Useless symbols - Unit productions - Null
productions, Chomsky normal form (CNF), Greibach Normal form (GNF), Problems
related to CNF and GNF.
Pushdown Automata: Moves, Instantaneous descriptions, Deterministic pushdown
automata, Equivalence of Pushdown automata and CFL, pumping lemma for CFL,
problems based on pumping Lemma.
Turing Machine: Definitions of Turing machines, Computable languages and
functions, Techniques for Turing machine construction, Multi head and Multi tape
Turing Machines, The Halting problem, Partial Solvability, Problems about Turing
machine- Chomsky hierarchy of languages.
Difficult problems: Unsolvable Problems and Computable Functions, Primitive
recursive functions, Recursive and recursively enumerable languages, Universal
Turing machine, Measuring and classifying complexity - Tractable and Intractable
problems, Tractable and possibly intractable problems, P and NP completeness,
Polynomial time reductions, NP-complete problems from other domains: graphs
(clique, vertex cover, independent sets, Hamiltonian cycle), number problem
(partition), set cover.
SUGGESTED READINGS
1. Hopcroft J.E., Motwani R. and Ullman J.D, “Introduction to Automata Theory,
Languages and Computations”, Second Edition, Pearson Education.
2. John C Martin, “Introduction to Languages and the Theory of Computation”, Third
Edition, Tata McGraw Hill Publishing Company, New Delhi
"This B.E Computer Engineering Course has been passed in the meeting of Standing Committee on Academic
matters, University of Delhi, held on June 3, 2016." Page 74
291/Appendices/AC-Minutes/2016-17
Appendix - VI
COURSE OUTCOMES
1. To understand the capabilities, limitations and performance of high performance
architectures and their applications in solving challenging problems.
2. Develop the skills to decompose parallelizable problems effectively, write parallel
algorithms and use parallel programming paradigms to implement them.
3. Appreciate the multidisciplinary approach for developing and utilizing high
performance systems.
4. Keep abreast of the latest developments in high performance computing
environments
COURSE CONTENT
Introduction: Flynn’s classification of parallel architectures, Kinds of parallelism-
Temporal, data and mixed parallelism , Dependencies and hazards - data, control
and resource dependencies, PRAM models.
Parallel Programming paradigms: Granularity and Communication overheads,
Program decomposition techniques, Shared Memory Programming (pthreads), SPMD
model, Message Passing Programming (MPI/Open MP), Parallel sorting, even-odd
transposition/ parallel multiplication/ Parallel matrix operations on PRAM models.
High Performance Architectures: Instruction level parallelism-Delays in instruction
pipelining, mechanisms to tackle pipeline stalls, superscalar, superpipelined
"This B.E Computer Engineering Course has been passed in the meeting of Standing Committee on Academic
matters, University of Delhi, held on June 3, 2016." Page 75
292/Appendices/AC-Minutes/2016-17
Appendix - VI
SUGGESTED READINGS
1.Kai Hwang, “Advanced Computer Architecture”, McGrawHill
2.V. Rajaraman and C. Siva Ram Murthy,“Parallel Computers, architecture and
programming, PHI
3.Michael J Quinn, “Parallel Programming in C wit h MPI and OpenMP”, McGrawHill
Edu.
4.Peter Pacheco, “An introduction to parallel programming”.
"This B.E Computer Engineering Course has been passed in the meeting of Standing Committee on Academic
matters, University of Delhi, held on June 3, 2016." Page 76
293/Appendices/AC-Minutes/2016-17
Appendix - VI
COURSE OUTCOMES
1. Understand the internal organization and behavior of compilers and other
language processors.
2. Applythe formal constructs for designing a compiler.
3. Gain an ability to design simple domain-specific languages (DSLs) using
compiler construction tools.
COURSE CONTENT
Introduction: Language processors, structure of a compiler, compiler-construction
tools, evolution of programming languages, applications of compiler technology, T-
diagrams, bootstrapping, just-in-time compilation.
Lexical analysis: Input buffering, specification and recognition of tokens, lexical-
analyzer generator.
Syntax analysis: Specification of syntax using grammar. Top-down parsing –
recursive-descent, predictive. Bottom-up parsing – shift-reduce, SLR, CLR, LALR.
Parser generator.
Intermediate-code generation: Syntax-directed translation. Three-address code.
Translation of declarations, expressions, control flow. Backpatching.
Runtime environment: Activation trees and records.
Code optimization: Sources of optimization, basic blocks, optimization of basic
blocks, data-flow analysis, loop optimizations.
Code generation: Issues, register allocation and assignment, peephole optimization.
"This B.E Computer Engineering Course has been passed in the meeting of Standing Committee on Academic
matters, University of Delhi, held on June 3, 2016." Page 77
294/Appendices/AC-Minutes/2016-17
Appendix - VI
SUGGESTED READINGS
1. Aho, A. V., Lam, M. S., Sethi, R. and Ullman J. D. 2006,“Compilers – Principles,
Techniques and Tools (2nd ed.)”, Pearson.
2. Chattopadhyay, S. 2005,“Compiler Design, PHI”.
3. Appel, A. W. 200,“Modern Compiler Implementation in C", Cambridge University
Press.
"This B.E Computer Engineering Course has been passed in the meeting of Standing Committee on Academic
matters, University of Delhi, held on June 3, 2016." Page 78
295/Appendices/AC-Minutes/2016-17
Appendix - VI
COURSE OUTCOMES
1. Understand and apply thetechniques for probabilistic and statistical modeling.
2. Analyze and model real world problems and simulate their working using Markov
models, queuing models, Monte Carlo and event driven simulation.
3. Estimate the cost and benefits of computer simulation, generation of meaningful
results, decision making, and risks and be able to formulate judgments and
synthesize conclusions through research of a simulation topic.
COURSE CONTENT
296/Appendices/AC-Minutes/2016-17
Appendix - VI
SUGGESTED READINGS
1. Norm Matloff, “Probabilistic and statistical modeling in Computer Science”, Open
book, http://heather.cs.ucdavis.edu/probstatbook, From algorithms to Z scores
2. Simulation Modeling and Analysis Third Edition By Law Kelton (Mc-Graw Hill).
COURSE OUTCOMES
1. Understanding of Control system and its various applications.
2. To understands time response analysis and frequency response analysis of
systems.
3. To understand supervisory control and data acquisition system (SCADA).
4. Understanding of digital control systems and exposure of related examples.
COURSE CONTENT
Feed Back Characteristics of Control Systems:
Feedback and Non-feedback Systems, Reduction of Parameter Variations by use of
Feedback, Control Over System Dynamics by use of Feedback, Control of Effects of
"This B.E Computer Engineering Course has been passed in the meeting of Standing Committee on Academic
matters, University of Delhi, held on June 3, 2016." Page 80
297/Appendices/AC-Minutes/2016-17
Appendix - VI
"This B.E Computer Engineering Course has been passed in the meeting of Standing Committee on Academic
matters, University of Delhi, held on June 3, 2016." Page 81
298/Appendices/AC-Minutes/2016-17
Appendix - VI
COURSE OUTCOMES
1. An understanding of the law that governs the development and dissemination of
software.
2. An understanding of the law that governs the dissemination of digitized information.
3. An understanding of ethics related to the IT profession.
COURSE CONTENT
Definition, Applicability, Nature of Intellectual Property: Patents, Trademarks and
copyright, Process of Patenting and Development: technological research, Innovation,
Patenting, development, International Cooperation on Intellectual Properly, Procedure
for grants of patents.
Scope of Patent Rights, government rules for licensing and transfer of technology
within country, government rules for licensing and transfer of technology from other
country, Patent information and documentation, Legal framework infringement
actions and remedies.
Administration of Patent system, New Development in IPR, IPR of Biological systems,
"This B.E Computer Engineering Course has been passed in the meeting of Standing Committee on Academic
matters, University of Delhi, held on June 3, 2016." Page 82
299/Appendices/AC-Minutes/2016-17
Appendix - VI
SUGGESTED READINGS
1. Introduction to intellectual property: Theory and Practice, By World Intellectual
Property Organization.
2. Intellectual Property Rights: Innovation, Governance and the Institutional
Environment, Birgitte Andersen, Edward Elgar Publishing Limited.
3. Cristine Greenhalgh, Mark Rogers, “Innovation, Intellectual Property, and Economic
Growth”.
4. The global challenge of intellectual property rights, Robert C. Bird, Subhash
Chander Jain.
5. Digital Media and Intellectual Property, Nicola Lucchi.
COURSE OUTCOMES
1. Understand the importance of open source software in developing software
collaboratively, cost saving, localization, vender independence and security.
2. Develop the skills to use and develop various open source technologies.
COURSE CONTENT
This course will train students on various open source technologies with practical
work.
"This B.E Computer Engineering Course has been passed in the meeting of Standing Committee on Academic
matters, University of Delhi, held on June 3, 2016." Page 83
300/Appendices/AC-Minutes/2016-17
Appendix - VI
SUGGESTED READINGS
1. Discover and Open source world, https://opensource.com
2. Ubuntu Linux, “The complete reference”.
3. Benvenuti, “Understanding the Linux network internals”
"This B.E Computer Engineering Course has been passed in the meeting of Standing Committee on Academic
matters, University of Delhi, held on June 3, 2016." Page 84
301/Appendices/AC-Minutes/2016-17
Appendix - VI
COURSE OUTCOMES
1. Gain an understanding of the design issues, methodologies and platforms for
embedded systems.
2. Equip oneself with software and hardware development skills needed to model
and implement embedded systems.
3. Develop full hardware software embedded applications.
COURSE CONTENT
Embedded Systems & HW-SW Co-Design: Introduction to embedded systems:
Evolution, Issues and Challenges, Co-design Flow methodologies, Design
exploration, Co-specification, Co-verification, Validation and testing, Co-
simulation, Physical design.
Embedded System Platforms:Microcontroller Architecture based on
8051/AVR/ARM with interfacing of Memory and Peripheral Devices,
Interrupts Processing, Interfacing with sensors and actuators. (ii) Alternative
architectures: Programmable Logic Devices (PLD), Application Specific
Integrated Circuits (ASIC), Application Specific Instruction Processors
(ASIP), Field Programmable Gate Arrays (FPGA), Reconfigurable devices,
Systems On Chip (SOC), VLIW architectures.
Embedded System Software: Modeling UML and RT-UML, Software Development:
Flow, Environments and Tools; RTOS Fundamentals
Embedded System Design issues: Performance Analysis and Optimization:
"This B.E Computer Engineering Course has been passed in the meeting of Standing Committee on Academic
matters, University of Delhi, held on June 3, 2016." Page 85
302/Appendices/AC-Minutes/2016-17
Appendix - VI
Emerging Trends.
L T P CA MS ES Int ES
3 0 2 10 20 40 15 15
CED02 Big Data and Analytics CEC02, CEC06
COURSE OUTCOMES
1. Gain a conceptual understanding of big data analytics concepts, algorithms,
data management tools and statistical analysis.
2. Acquire tools to manage various aspects of big data such as Hadoop, HDFS,
Map-Reduce based HBase, Cassandra, Pig, Hive etc.
"This B.E Computer Engineering Course has been passed in the meeting of Standing Committee on Academic
matters, University of Delhi, held on June 3, 2016." Page 86
303/Appendices/AC-Minutes/2016-17
Appendix - VI
COURSE CONTENT
Introduction to Big Data:Databases and their evolution,convergence of key
trends, unstructured data, industry examples of big data, web analytics, big data
and marketing, fraud and big data, risk and big data,credit risk management, big
data and algorithmic trading, big data and healthcare, big data in medicine,
advertising and big data, big data technologies, introduction to Hadoop, open
source technologies, cloud and big data mobile business intelligence, Crowd
sourcing analytics,inter and trans firewall analytics.
NoSql Data Management: Introduction to NoSQL, Types of NoSQL, aggregate data
models, aggregates, key-value, document data models, relationships, graph
databases, schema less databases, materialized views. Overview of MongoDB.
MapReduce, partitioning and combining, composing map-reduce calculations,
MapReduce examples such as matrix multiplication.
Hadoop: Introduction to Hadoop,Data format, analyzing data with Hadoop, scaling
out, Hadoop streaming, Hadoop pipes, Hadoop distributed file system (HDFS),
HDFS concepts, data flow,Hadoop I/O, data integrity, compression, serialization,
Avro file-based data structures, Map Reduce workflows, unit tests with MRUnit,
test data and local tests – anatomy of Map Reduce job run, classic Map-reduce,
YARN, failures in classic Map-reduce and YARN, job scheduling, shuffle and sort,
task execution, MapReduce types, input formats, output formats.
Hadoop Related Tools: Hbase,data model and implementations, Hbaseclients,
Hbase examples – praxis. Cassandra, Cassandra data
model,Cassandraexamples,Cassandraclients, Hadoop integration. Pig,Grunt, pig
data model, Pig Latin, developing and testing Pig Latin scripts. Hive, data types
and file formats,HiveQL data definition,HiveQL data manipulation – HiveQL
queries, Overview of spark.
Data Analysis: Overview of R programming language,Regression Modeling,
Multivariate Analysis, Bayesian Modeling, Inference and Bayesian Networks,
Support Vector and Kernel Methods, Analysis of Time Series, Linear Systems
Analysis, Nonlinear Dynamics, Rule Induction, Neural Networks, Learning And
Generalization, Competitive Learning, Principal Component Analysis and Neural
Networks, Fuzzy Logic: Extracting Fuzzy Models from Data, Fuzzy Decision Trees,
Stochastic Search Methods.
"This B.E Computer Engineering Course has been passed in the meeting of Standing Committee on Academic
matters, University of Delhi, held on June 3, 2016." Page 87
304/Appendices/AC-Minutes/2016-17
Appendix - VI
SUGGESTED READINGS
1. Michael Minelli, Michelle Chambers, and AmbigaDhiraj, "Big Data, Big
Analytics, “Emerging Business Intelligence and Analytic Trends for Today's
Businesses", Wiley.
2. Big-Data Black Book, DT Editorial Services, Wiley India
3. Massive Online Open Courses (MOOCS): Big Data University, Udacity and
Coursera.
4. P. J. Sadalage and M. Fowler, "NoSQL Distilled: A Brief Guide to the Emerging
World of Polyglot Persistence", Addison-Wesley Professional, 2012.
5. Tom White, "Hadoop: The Definitive Guide", Third Edition, O'Reilley, 2012.
6. Eric Sammer, "Hadoop Operations", O'Reilley, 2012.
7. E. Capriolo, D. Wampler, and J. Rutherglen, "Programming Hive", O'Reilley,
2012.
8. Lars George, "HBase: The Definitive Guide", O'Reilley, 2011. 8. Eben Hewitt,
"Cassandra: The Definitive Guide", O'Reilley, 2010. 9. Alan Gates,
"Programming Pig", O'Reilley, 2011
L T P CA MS ES Int ES
3 0 2 10 20 40 15 15
CED03 Software Testing CEC11
COURSE OUTCOMES
1. Learn the various concepts and methods that can be used to test software
before it is delivered to the end user.
2. Learn about various challenges and difficulties faced during the process of
software testing and approach for tackling them.
"This B.E Computer Engineering Course has been passed in the meeting of Standing Committee on Academic
matters, University of Delhi, held on June 3, 2016." Page 88
305/Appendices/AC-Minutes/2016-17
Appendix - VI
Emerging Trends.
"This B.E Computer Engineering Course has been passed in the meeting of Standing Committee on Academic
matters, University of Delhi, held on June 3, 2016." Page 89
306/Appendices/AC-Minutes/2016-17
Appendix - VI
SUGGESTED READINGS
1. Yogesh Singh , “Software Testing”, Cambridge University Press
2. Aditya P. Mathur, “Foundations of Software Testing, fundamental
Algorithms and Techniques”, Pearson Education
3. Naresh Chauhan, “Software Testing Principles and Practices”,
OxfordUniversity Press.
4. Ramesh Desikan, “Software Testing Principles and Practices”,Pearson
Education
L T P CA MS ES Int ES
3 0 2 10 20 40 15 15
CED04 Mobile Ad-hoc Networks CEC08, CEC13
COURSE OUTCOMES
1. Describe the unique issues in ad hoc wireless networks, current technology
trends for the implementation and deployment of ad hoc wireless networks.
2. Understand the routing algorithms used in mobile ad hoc network.
3. Learn the issues in QoS solutions and Energy Management Schemes in
"This B.E Computer Engineering Course has been passed in the meeting of Standing Committee on Academic
matters, University of Delhi, held on June 3, 2016." Page 90
307/Appendices/AC-Minutes/2016-17
Appendix - VI
COURSE CONTENT
Introduction to adhoc networks: Definition, characteristics features,
applications. Characteristics of Wireless channel, Adhoc Mobility Models:- Indoor
and outdoor models.
Medium access protocols MAC: design issues, goals and classification.
Contention based protocols- with reservation, scheduling algorithms, protocols
using directional antennas. IEEE standards: 802.11a, 802.11b, 802.11g, 802.15.
HIPERLAN.
Network protocols Routing Protocols: Design issues, goals and classification.
Proactive Vs reactive routing, Unicast routing algorithms, Multicast routing
algorithms, hybrid routing algorithm, Energy aware routing algorithm, Hierarchical
Routing, QoS aware routing.
End-end delivery and security Transport layer : Issues in designing- Transport
layer classification, adhoc transport protocols. Security issues in adhoc networks:
issues and challenges, network security attacks, secure routing protocols.
Cross layer design and integration of adhoc for 4G Cross layer Design: Need for
cross layer design, cross layer optimization, parameter optimization techniques,
Cross layer cautionary perspective. Integration of adhoc with Mobile IP networks.
Emerging Trends.
SUGGESTED READING
1. C.Siva Ram Murthy and B.S.Manoj, “Ad hoc Wireless Networks Architectures
and protocols,” 2nd edition, Pearson Education
2. Charles E. Perkins, “Ad hoc Networking,” Addison – Wesley
3. Stefano Basagni, Marco Conti, Silvia Giordano and Ivan stojmenovic, Mobile, “Ad
"This B.E Computer Engineering Course has been passed in the meeting of Standing Committee on Academic
matters, University of Delhi, held on June 3, 2016." Page 91
308/Appendices/AC-Minutes/2016-17
Appendix - VI
L T P CA MS ES Int ES
3 0 2 10 20 40 15 15
CED05 Advanced Data Structures CEC01, CEC02
COURSE OUTCOMES
1. Understand and apply amortized analysis on data structures, including binary
search trees, meargable heaps, and disjoint sets.
2. Understand the implementation and complexity analysis of fundamental
algorithms such as RSA, primality testing, max flow, discrete Fourier
transform.
3. Develop applications using concepts learnt such as of linear programming,
string matching and game-theory.
COURSE CONTENT
This course extends the core concepts of data structures and introduces new data
structures and algorithms that address emerging challenges in computing. Topics
include:
- Handling multiple stacks and queues.
- Alternative hashing methods: Division method, middle square method,
Fibonacci method, Multiplication method.
- String matching algorithms.
- Trees and Heap structures: Red-black trees and operations, operations on
AVL trees, B trees, min-max heap, Binomial heap and Fibonacci heap.
- New tree structures: Palindrome trees , VP Trees, Weak B Trees.
- Succinct data structures: Trie, Patricia Trie, Suffix Trie, Suffix arrays,
succinct representation of tree, Cardinal trees and ordinal tree.
- Cache oblivious data structures and algorithms.
Emerging Trends.
309/Appendices/AC-Minutes/2016-17
Appendix - VI
SUGGESTED READINGS
1. Thomas H. Cormen, Charles E. Leiserson, RonaldL. Rivest, and Clifford
Stein,“Introduction to Algorithms,” Third Edition. MIT Press and PHI, 2010.
2. Sartaj Sahni,“Data Structures and Applications, Chapman and Hall/CRC
Press”.
3. Palindrome trees: http://adilet.org/blog/25-09-14/
4. Vantage Point (VP) trees: http://stevehanov.ca/blog/index.php?id=130
http://www.dcc.uchile.cl/~gnavarro/ps/spire12.4.pdf
5. Ian Munro, Succinct data structures
https://cs.uwaterloo.ca/~imunro/cs840/SuccinctDS.pdf
6. Remco van der Hofstad, Random graphs and complex networks.
7. Eric D Demaine, Cache Oblivious algorithms and data structures,
http://erikdemaine.org/papers/BRICS2002/paper.pdf
L T P CA MS ES Int ES
3 0 2 10 20 40 15 15
CED06 Natural Language Processing CEC02, CEC05
COURSE OUTCOMES
1. Understand the basic properties of human languages and descriptive and
theoretical frameworks for handling these properties;
2. Understand the design of tools for basic NLP tasks such as tagging and
partial parsing and be able to apply them to text and evaluate their
performance;
"This B.E Computer Engineering Course has been passed in the meeting of Standing Committee on Academic
matters, University of Delhi, held on June 3, 2016." Page 93
310/Appendices/AC-Minutes/2016-17
Appendix - VI
COURSE CONTENT
Introduction:NLP tasks in syntax, semantics, and pragmatics. Applications such
as information extraction, question answering, and machine translation. The
problem of ambiguity. The role of machine learning. Brief history of the field.
Regular Expressions: Chomsky hierarchy, regular languages, and their
limitations. Finite-state automata. Practical regular expressions for finding and
counting language phenomena. Word morphology.
Language modeling and Naive Bayes: Probabilistic language modeling and its
applications. Markov models. N-grams. Estimating the probability of a word, and
smoothing. Generative models of language.
Part of Speech Tagging, Sequence Labeling and Syntactic Parsing Lexical syntax.
Hidden Markov Models. Maximum Entropy Models. Conditional Random Fields,
Grammar formalisms and Treebanks. Efficient parsing for context-free grammars
(CFGs). Statistical parsing and probabilistic CFGs (PCFGs). Lexicalized PCFGs.
Semantic Analysis: Lexical semantics and word-sense disambiguation, Multi
word expressions. Compositional semantics. Semantic Role Labeling and Semantic
Parsing, Discourse Analysis
Emerging Trends.
SUGGESTED READINGS
"This B.E Computer Engineering Course has been passed in the meeting of Standing Committee on Academic
matters, University of Delhi, held on June 3, 2016." Page 94
311/Appendices/AC-Minutes/2016-17
Appendix - VI
L T P CA MS ES Int ES
3 0 2 10 20 40 15 15
CED07 Information and Network CEC13, CEC14
Security
COURSE OUTCOMES
1. Understand the principles, techniques and tools used for designing secure
information systems.
2. Design, implement and maintain secure computer networks.
3. Safely recover an information system or network from a security attack.
COURSE CONTENT
Computer Security Concepts: Threats, Attacks, and Assets, Security Functional
Requirements, Fundamental Security Design Principles, Information Security:
Confidentiality, Integrity, Availability, Identification and Authentication,
Authorization and Access control, Accountability and Auditing.
Cryptography for Data Security: Basic Concepts and Historical Overview,
Mathematical Foundations of Cryptography, Symmetric Encryption Techniques,
Asymmetric Key Encryption Techniques, Public Key Infrastructure (PKI),
Authentication, Message Digest & Digital Signature, Kerberos Key Exchange,
Encryption standards and case studies.
Types of Attacks: Malicious programs (e.g., viruses, worms, Trojan horses), Buffer
overflow attack, Hacking methods and software tools, Denial-of-service attacks and
distributed denial-of-service attacks, IP Spoofing, Routing Protocol attacks, “Spam”
Email, DNS and the DNS Cache Poisoning Attack, Windows and Unix
"This B.E Computer Engineering Course has been passed in the meeting of Standing Committee on Academic
matters, University of Delhi, held on June 3, 2016." Page 95
312/Appendices/AC-Minutes/2016-17
Appendix - VI
Emerging Trends.
SUGGESTED READING
1. William Stallings ,"Cryptography and Network Security: Principles and
Practice", 6th Edition, Prentice Hall
2. Behrouz A. Forouzan,"Cryptography & Network Security", 2nd Edition, McGraw
Hill
3. Michael E. Whitman, Herbert J. Mattord, "Principles of Information Security"
5th Edition, Cengage Learning
"This B.E Computer Engineering Course has been passed in the meeting of Standing Committee on Academic
matters, University of Delhi, held on June 3, 2016." Page 96
313/Appendices/AC-Minutes/2016-17
Appendix - VI
COURSE OUTCOMES
1. Understand the characteristics and limitations of mobile hardware devices
including their user-interface modalities.
2. Interface a mobile computing system to hardware and networks.
3. Program applications on a mobile computing system and interact with servers
and database systems.
4. Develop an awareness of professional and ethical issues, in particular those
relating to security and privacy of user data and user behavior.
COURSE CONTENT
Introduction: Overview of Wireless Telephony, Wireless and Mobile Computing
Architecture – Limitations of wireless and mobile communication – Wireless
Telecommunication Networks: Digital cellular Systems, TDMA - CDMA – Wireless
Networking Techniques –Mobility Bandwidth Tradeoffs – Portable Information
Appliances.
Wireless LAN Overview: MAC issues, IEEE 802.11, Blue Tooth, Wireless multiple
access protocols, TCP over wireless, Wireless applications, data broadcasting, WAP:
Architecture, protocol stack, application environment, applications.
"This B.E Computer Engineering Course has been passed in the meeting of Standing Committee on Academic
matters, University of Delhi, held on June 3, 2016." Page 97
314/Appendices/AC-Minutes/2016-17
Appendix - VI
SUGGESTED READING
1. Mobile Communication 2nd edition by Jochen Schiller, Pearson education
2. Mobile Computing by Asoke Talukder, Roopa Yavagal (Tata McGraw Hill)
L T P CA MS ES Int ES
3 0 2 10 20 40 15 15
CED09 Advanced Networks CEC08, CEC13
COURSE OUTCOMES
1. To acquire knowledge so as to become familiar with the state of the art in
modern day computer networks: network architecture, protocols and systems.
2. To gain knowledge of various analytical methods used in the design and
engineering of next-generation networks and use simulations to evaluate the
"This B.E Computer Engineering Course has been passed in the meeting of Standing Committee on Academic
matters, University of Delhi, held on June 3, 2016." Page 98
315/Appendices/AC-Minutes/2016-17
Appendix - VI
COURSE CONTENT
Networking review and challenges in modern day networks :Traffic
Engineering: Latest techniques of Congestion Control and Flow Control, Routing:
Secure, Scalability, Reliability.
Disruption Tolerant networking: high packet loss, frequent interruptions,
mobility, high latency, and unpredictable conditions.
Distributed Computing networks : (Grids), Data Center networking, Networking
and Virtualization, Peer to Peer and Overlay networking, Opportunistic networks,
Software-defined networking, Content based Network Architectures: Wireless
Sensor networks, Internet of Things and other content based paradigms, Network
Security.
Advanced topics based on recent research publications on future generation
computer networks
SUGGESTED READINGS
There is no required textbook. Required reading material for this course will come
in the form of research papers.
"This B.E Computer Engineering Course has been passed in the meeting of Standing Committee on Academic
matters, University of Delhi, held on June 3, 2016." Page 99
316/Appendices/AC-Minutes/2016-17
Appendix - VI
COURSE OUTCOMES
1. To understand knowledge systems and problem solving
2. To acquire logic programming skills
COURSE CONTENT
Concepts: Logic and control, problem solving, knowledge representation
Prolog: Introduction, example programs in prolog, compiling prolog programs,
prolog data structures, dataflow and recursion, list processing, graphs in prolog,
negation, database clauses, assert and retract operations, advanced features.
Variants of logic programming such as: abductive, constraint, concurrent,
inductive, higher order, linear, object oriented, transactional logic programming.
SUGGESTED READING
L T P CA MS ES Int ES
3 0 2 10 20 40 15 15
"This B.E Computer Engineering Course has been passed in the meeting of Standing Committee on Academic
matters, University of Delhi, held on June 3, 2016." Page 100
317/Appendices/AC-Minutes/2016-17
Appendix - VI
COURSE CONTENT
Web Technologies: TCP/IP, HTTP, HTTPs, Telnet, FTP, WWW, URL, Email,
Domain Name Service, Web Browsers, Search Engines-Architecture, Crawlers,
Type of crawlers, search tools; Chat & Bulletin Board Services, SNMP, VPN, VoIP
&Internet Telephony.
Security: Concept of Internet security, Firewall-Functioning, types of Firewall, IP
Security- Architecture, Authentication header, Encapsulating security payloads,
combining security associations. Sniffing, spoofing, viruses, worms, Trojan horses,
and their security. Physical security, Biometric systems, Data security, systems,
security, Computer System security, communication security.
Cyber Laws: Introduction, The rights the various parties have with respect to
creating, modifying, distributing, storing and copying digital data- concurrent
responsibilities and potential liabilities.
Web Design: Key issues in web site design, Use of Different HTML tags in web
pages, Building HTML documents, Cascading Style Sheets-Internal, Inline and
external style sheets, Java Script, Dynamic HTML with Java Script, XML
technologies –XML, DTD, XSD, XSLT, XQuery, XPath.
Web programming, PHP, database connectivity with MySQL, security and
identity.
1. Exercise based on developing websites and portals using HTML, CSS, Java
Script.
2. Exercise based on implementation of XML technologies.
3. Projects based on PHP and MySQL to be implemented.
"This B.E Computer Engineering Course has been passed in the meeting of Standing Committee on Academic
matters, University of Delhi, held on June 3, 2016." Page 101
318/Appendices/AC-Minutes/2016-17
Appendix - VI
L T P CA MS ES CA ES
3 0 2 10 20 40 15 15
CED12 Emerging Programming CEC07
Paradigms
COURSE OUTCOMES :
1.To acquire knowledge of emerging paradigms like agile software development,
design patterns and component based development.
2.To be able to apply the concepts for designing complex object oriented solutions
in a collaborative environment
3. To imbibe the habit of continuous process of learning new and emerging
technologies in the field of programming languages
COURSE CONTENTS
The contents of this course will be based on current state of art technologies like
aspect oriented requirements engineering, design and architectural patterns software
and collaborative agile software development.
"This B.E Computer Engineering Course has been passed in the meeting of Standing Committee on Academic
matters, University of Delhi, held on June 3, 2016." Page 102
319/Appendices/AC-Minutes/2016-17
Appendix - VI
L T P CA MS ES CA ES
3 0 2 10 20 40 15 15
CED13 Wireless Technologies CEC09, CEC13
COURSE OUTCOMES
1. Develop an understanding of the basics of wireless communication and how
communication takes place in wireless networks.
2. Discuss about cellular communication.
3. Understand the nuances of GSM and CDMA technologies.
4. Understand the emerging wireless technologies.
COURSE CONTENT
Evolution Of Mobile Cellular Networks, Global System for Mobile
Communications, GPRS, PCs, WLAN, UMTS, IMT2000, cdma2000 evolution, LTE
Origins of Ad Hoc: Packet Radio Networks: Challenges, Architecture, Component
of Packet Radios, Routing in PRNETs, Route Calculation, Pacing Techniques,
Media Access, Flow Acknowledgements
Ad-Hoc Wireless Networks: Mobile Devices, Wireless Sensor Networks, Traffic
Profiles, Types of Ad Hoc Mobile Communications, Types of Mobile Host
Movements.
Ad-Hoc Wireless Media Access Protocols: Introduction, Challenges in Channel
access, Receiver Initiated MAC Protocols, Sender Initiated MAC Protocols,
Protocols-MACA, MACA-BI, PAMAS, DBTMA, MARCH
Overview of Ad Hoc Routing Protocols: Table Driven approaches, DSDV,WRP,
"This B.E Computer Engineering Course has been passed in the meeting of Standing Committee on Academic
matters, University of Delhi, held on June 3, 2016." Page 103
320/Appendices/AC-Minutes/2016-17
Appendix - VI
SUGGESTED READING
1. Wireless Networks by Clint Smith and Daniel Collins (2014)
2. Wireless Networking Absolute Beginner’s Guide by Michael Miller (2013)
3. 802.11 Wireless Networks: The Definitive Guide , Second Edition by Matthew
S. Gast (2005)
4. Designing and Deploying 802.11n Wireless Networks by Jim Geier (2010)
5. Wireless Communications & Networks (2nd Edition) by William Stallings (2004)
L T P CA MS ES CA ES
3 0 2 10 20 40 15 15
CED14 Advanced algorithms CEC01, CEC02, CEC05
COURSE OUTCOMES
1. Candidate will be able to understand paradigms and approaches used to
analyze and design algorithms and to appreciate the impact of algorithm design
in practice with asymptotic notations.
2. Able to use different computational models (e.g., divide-and-conquer, greedy
approach, dynamic programming, back tracking, branch and bound) with their
complexity measures like running time, disk space for solving real life complex
"This B.E Computer Engineering Course has been passed in the meeting of Standing Committee on Academic
matters, University of Delhi, held on June 3, 2016." Page 104
321/Appendices/AC-Minutes/2016-17
Appendix - VI
COURSE CONTENT
"This B.E Computer Engineering Course has been passed in the meeting of Standing Committee on Academic
matters, University of Delhi, held on June 3, 2016." Page 105
322/Appendices/AC-Minutes/2016-17
Appendix - VI
SUGGESTED READINGS
1.A.V. Aho, J.E. Hopcroft, and J.D. Ullman, “DataStructures and Algorithms,”
Addison Wesley, Reading Massachusetts, USA,
2.Donald Knuth, “The Art of Computer Programming: Fundamental Algorithms,”
Addison-Wesley .
3.Donald Knuth,“The Art of Computer Programming,” Volume 3: Sorting and
Searching, Third Edition. Addison-Wesley.
4.Thomas H. Cormen, Charles E. Leiserson, RonaldL. Rivest, and Clifford Stein,
“Introduction to Algorithms,”.
5.Sartaj Sahni,“DataStructures and Applications,” Chapman and Hall/CRC Press.
"This B.E Computer Engineering Course has been passed in the meeting of Standing Committee on Academic
matters, University of Delhi, held on June 3, 2016." Page 106
323/Appendices/AC-Minutes/2016-17
Appendix - VI
COURSE OUTCOMES
1. To appreciate that fault tolerant design methods are needed tackle various
hardware and software faults that affect realistic computing systems
2. To be able to design fault tolerant computing systems in a cost effective manner
for different applications
3. To apply various quality metrics to evaluate fault tolerant systems such as
reliability, availability and dependability.
COURSE CONTENT
Fundamental Concepts
Faults and errors, fault classification, fault assumptions, fault tolerant attributes
and system structure.
Hardware Fault-Tolerant Design Techniques
Hardware redundancy, standby sparing, NMR and combined approaches, time
redundancy.
Self-checking concepts, error-detecting codes for digital circuits such as Berger
codes, two-rail codes, AN codes, m-out-of- codes.
Information redundancy, error detecting and correcting codes for data
communication.
Dependability Evaluation Techniques: Reliability and availability models: -
Combinatorial techniques, Fault-Tree models, Graceful degradability and
Continuous Time Markov Chain models, Reliability importance metrics such as
structural importance and Birnbaum importance, Performability Models.
"This B.E Computer Engineering Course has been passed in the meeting of Standing Committee on Academic
matters, University of Delhi, held on June 3, 2016." Page 107
324/Appendices/AC-Minutes/2016-17
Appendix - VI
SUGGESTED READINGS
1. D.K. Pradhan, “Fault-Tolerant Computer System Design,”.
2. B.W.Johnson, “Design and Analysis of Fault-Tolerant Digital Systems,” Addison-
Wesley.
3. D.K. Pradhan, “Fault-Tolerant Computing, Theory and Techniques,”Prentice Hall.
4. D.P.Siewiorek and R.S.Swartz, “Reliable Computer Systems: Design and
Evaluation,“ Digital Press.
5. K.S.Trivedi,“Probability and Statistics with Reliability, Queueing and Computer
Science Application,” Prentice Hall.
L T P CA MS ES CA ES
3 1 0 25 25 50 - -
Code Name of Elective Pre-Requisites
CED16 Artificial Intelligence CEC02, CEC05
COURSE OUTCOMES
1. Distinguish between a conventional system and an intelligent system
2. Explain Artificial Intelligence concept and its applications
3. Represent knowledge using various different techniques
"This B.E Computer Engineering Course has been passed in the meeting of Standing Committee on Academic
matters, University of Delhi, held on June 3, 2016." Page 108
325/Appendices/AC-Minutes/2016-17
Appendix - VI
COURSE CONTENTS
Foundational issues in intelligent systems
What is Artificial Intelligence? The AI problems, Underlying assumption, AI
technique, Criteria for success,
Problems, Problem Spaces and Search Defining problem as a state space search,
production systems, problem characteristics, production system characteristics
Generate and test, hill climbing, Best first search, best first- A * algorithm, AO*
algorithm problem reduction, constraint satisfaction, means and ends analysis
Game Playing: Overview, Mini-max search procedure, Alpha-beta cutoffs
Knowledge representation issues: Representations and mappings, approaches to
knowledge representation, issues in knowledge representation
Using Predicate Logic:Representing simple facts in logic, representing instance
and Isa relationships, computable functions and predicates, resolution,
Representing knowledge using rules:Procedural vs. declarative knowledge, logic
programming, forward vs. backward reasoning
Nets and Frames
Reasoning under uncertainty and Machine Learning: Non-monotonic reasoning,
Bayesian networks, Fuzzy logic, Dempster-Shafer theory
Planning: Overview, blocks world problem, components of planning system, goal
stack planning
Fundamental concepts of Artificial Neural Networks: Models of ANNs;
Feedforward & feedback networks; learning rules; Hebbian learning rule, perception
learning rule, delta learning rule, Widrow-Hoff learning rule, correction learning
rule, Winner –lake all learning rule, etc.
Introduction to Natural Language Programming
Overview of Expert System Technology: Rule based Expert Systems, Expert
system shells
Current trends and Projects: Current trends in AI, Presentation and discussion of
projects
AI programming Languages:Languages and Programming Techniques for AI-
Introduction to PROLOG and LISP, Search strategies and Logic Programming in
LISP, Production System examples in PROLOG.
Outline of practical work:
"This B.E Computer Engineering Course has been passed in the meeting of Standing Committee on Academic
matters, University of Delhi, held on June 3, 2016." Page 109
326/Appendices/AC-Minutes/2016-17
Appendix - VI
SUGGESTED READING
1. S Russel and P Norvig, “ Artificial Intelligence- A Modern Approach,” Pearson
Education.
2. E. Rich and K.Knight, “Artificial Intelligence,” Tata McGraw Hill.
3. Simon Haykin, “Neural Networks :A Comprehensive formulation,” AW.
4. Nils J Nilsson, “Artificial Intelligence a new Synthesis,” Elsevier.
5. Ivan Bratko, “Prolog Programming for Artificial Intelligence,” Addison Wesley.
6. George F Luger, “Artificial Intelligence- Structures and Strategies for Complex
Problem Solving,” Pearson Education.
L T P CA MS ES CA ES
3 1 0 25 25 50 - -
"This B.E Computer Engineering Course has been passed in the meeting of Standing Committee on Academic
matters, University of Delhi, held on June 3, 2016." Page 110
327/Appendices/AC-Minutes/2016-17
Appendix - VI
COURSE CONTENT
328/Appendices/AC-Minutes/2016-17
Appendix - VI
L T P CA MS ES CA ES
3 1 0 25 25 50 - -
CED18 Computer Vision CEC02,CEC05, CEC12
COURSE OUTCOMES
1. To develop an understanding of the fundamentals of image formation, camera
imaging geometry, feature detection and matching, multiview geometry including
"This B.E Computer Engineering Course has been passed in the meeting of Standing Committee on Academic
matters, University of Delhi, held on June 3, 2016." Page 112
329/Appendices/AC-Minutes/2016-17
Appendix - VI
COURSE CONTENT
Digital Image Formation and low-level processing: Overview and State-of-the-
art, Fundamentals of Image Formation, Transformation: Orthogonal, Euclidean,
Affine, Projective, etc; Fourier Transform, Convolution and Filtering, Image
Enhancement, Restoration, Histogram Processing.
Depth estimation and Multi-camera views: Perspective, Binocular Stereopsis:
Camera and Epipolar Geometry; Homography, Rectification, DLT, RANSAC, 3-D
reconstruction framework; Auto-calibration.
Feature Extraction: Edges - Canny, LOG, DOG; Line detectors (Hough
Transform), Corners - Harris and Hessian Affine, Orientation Histogram, SIFT,
SURF, HOG, GLOH, Scale-Space Analysis- Image Pyramids and Gaussian
derivative filters, Gabor Filters and DWT.
Image Segmentation: Region Growing, Edge Based approaches to segmentation,
Graph-Cut, Mean-Shift, MRFs, Texture Segmentation; Object detection
Pattern Analysis: Clustering: K-Means, K-Medoids, Mixture of Gaussians,
Classification: Discriminant Function, Supervised, Un-supervised, Semi-
supervised; Classifiers: Bayes, KNN, ANN models; Dimensionality Reduction: PCA,
LDA, ICA; Non-parametric methods.
Motion Analysis: Background Subtraction and Modeling, Optical Flow, KLT,
Spatio-Temporal Analysis, Dynamic Stereo; Motion parameter estimation.
Shape from X: Light at Surfaces; Phong Model; Reflectance Map; Albedo
estimation; Photometric Stereo; Use of Surface Smoothness Constraint; Shape
from Texture, color, motion and edges.
Miscellaneous: Applications: CBIR, CBVR, Activity Recognition, computational
photography, Biometrics, stitching and document processing; Modern trends -
super-resolution; GPU, Augmented Reality; cognitive models, fusion and SR&CS.
"This B.E Computer Engineering Course has been passed in the meeting of Standing Committee on Academic
matters, University of Delhi, held on June 3, 2016." Page 113
330/Appendices/AC-Minutes/2016-17
Appendix - VI
SUGGESTED READINGS
1. Richard Szeliski, “Computer Vision: Algorithms and Applications,” Springer-
Verlag London Limited.
2. D. A. Forsyth, J. Ponce, “Computer Vision: A Modern Approach,”Pearson
Education.
3. Richard Hartley and Andrew Zisserman, “Multiple View Geometry in Computer
Vision,” Cambridge University Press.
4. K. Fukunaga; “Introduction to Statistical Pattern Recognition,” Second Edition,
Academic Press, Morgan Kaufmann.
L T P CA MS ES CA ES
3 1 0 25 25 50 - -
COURSE OUTCOMES
1. Identify the component technologies of the Semantic Web and understand the
concept of Linked Web.
2. Illustrate the design principles of the Ontology and Semantic for developing
technologies
3. Understand certain limitations of the Semantic Web technologies, and be aware of
the kinds of services it can and cannot deliver.
COURSE CONTENT
Overview and Introduction: Knowledge Representation, Ontologies and
Description Logic, Semantic Web in Depth: RDF and RDF Schema, Semantic Web
in Depth: OWL
Writing OWL ontologies: Protégé, Semantic Web Methodologies and Design
"This B.E Computer Engineering Course has been passed in the meeting of Standing Committee on Academic
matters, University of Delhi, held on June 3, 2016." Page 114
331/Appendices/AC-Minutes/2016-17
Appendix - VI
SUGGESTED READING
1. A Semantic Web Primer, third edition, MIT Press, 2012, Grigoris Antoniou, Paul
Groth, Frank van Harmelen and Rinke Hoekstra
2. Allemang, D., & Hendler, J. (2011). Semantic Web for the working Ontologist.
2nd Edition, Morgan &Kaufmann Publisher. [ISBN:978-0-12-385965-5]
3. Heath, T., & Bizer, C. (2011). Linked Data: Evolving the Web into a Global Data
Space. Morgan&Claypool Publisher. (Free copy
:http://linkeddatabook.com/editions/1.0/http://linkeddatabook.com/editions/
1.0/)
L T P CA MS ES CA ES
3 1 0 25 25 50 - -
CED20 Advanced databases CEC02, CEC06
COURSE OUTCOMES
1. To get acquainted with new models and optimization techniques in digital
databases
COURSE CONTENT
Database system architecture: query processing and optimization, transaction
processing concepts, concurrency control techniques, database recovery
techniques, database security and authorization, enhanced data models for
"This B.E Computer Engineering Course has been passed in the meeting of Standing Committee on Academic
matters, University of Delhi, held on June 3, 2016." Page 115
332/Appendices/AC-Minutes/2016-17
Appendix - VI
SUGGESTED READING
1. Nabil R. Adam, Bharat K. Bhargava, “Advanced database systems, Lecture Notes
in Computer Science,”
2. Jan L. Harrington, Morgan Kaufmann, “Object Oriented databases clearly
explained,”
3. Carlo Zanialo, “Advanced database systems,” Morgan Kauffmann.
L T P CA MS ES CA ES
3 1 0 25 25 50 - -
COURSE OUTCOMES
1. To design full connected-product experiences by integrating Internet services and
physical objects.
2. To analyze, design and develop prototypes of Internet-connected products using
appropriate tools.
3.To identify, classify and describe different kinds of Internet-connected product
concepts.
4. To analyze the challenges and applying adequate patterns for user-interaction
with connected-objects.
COURSE CONTENT
Introduction to the internet of things: Origins. Early concepts and products.
Examples of current products and value propositions. Architectures and design
"This B.E Computer Engineering Course has been passed in the meeting of Standing Committee on Academic
matters, University of Delhi, held on June 3, 2016." Page 116
333/Appendices/AC-Minutes/2016-17
Appendix - VI
SUGGESTED READINGS
1. Mike Kuniavsky, “Smart Things: Ubiquitous Computing User Experience Design,”
Morgan Kaufmann Publishers.
2. “Designing the Internet of Things,”
3. Adrian McEwen, Hakim Cassivalli, Wiley.
4. Massimo Banzi, “Getting Started with Arduino (Make: Projects),”O'Reilly Media.
5. Donald A. Norman, “Emotional Design: Why We Love (or Hate) Everyday Things.
Basic Books,”.
6. Tom Igoe, Dan O'Sullivan, “Physical Computing: Sensing and Controlling the
Physical World with Computers,” Premier Press.
L T P CA MS ES CA ES
3 1 0 25 25 50 - -
CED22 Software Quality CEC11
"This B.E Computer Engineering Course has been passed in the meeting of Standing Committee on Academic
matters, University of Delhi, held on June 3, 2016." Page 117
334/Appendices/AC-Minutes/2016-17
Appendix - VI
COURSE CONTENT
Introduction to Quality: The Quality Tradition: Origins of Quality Movement:
Deming and Crosby’s view of quality, Different Views of Quality: Transcendental,
User, Manufacturing, Product, Value based, Total Quality Movement (TQM),
Application of TQM to Software Engineering.
Why does software fail, Software quality: definition, how is software quality
different? Static quality attributes, Dynamic quality attributes.
Software Quality Models: McCalls, Boehms, ISO9126, GQM, Gilb’s template
Quality Management, Quality assurance Standards, ISO standards, CMM, CMMI,
3 Sigma, 6 Sigma Statistical Process Control (SPC).
Seven tools of quality control:Pareto Charts, Graphs, Check sheets, histograms,
Scatter Plots, Cause and Effect Diagrams.
Business Process Redesign (BPR): Benefits of BPR in software development, TQM
and BPR poised opposite to each other, Quality Function Deployment (QFD),
Application of Seven Management and Planning tools for Software
Requirements Capturing: Affinity diagrams, Interrelationship diagraphs,
hierarchy diagrams,, Matrix diagram, Matrix data analysis, process decision
program chart, arrow Diagram/Precedence Diagram, Computer Aided quality
engineering (CAQE) and tools for quality management.
MetricsSoftware: Definition, Types of Software Metrics, Organisation, Project,
Process, Product, Product Complexity metrics, Halsteads Software Science Metrics,
OO Metrics: Chidamber and Kemrer, OO metrics suite.
"This B.E Computer Engineering Course has been passed in the meeting of Standing Committee on Academic
matters, University of Delhi, held on June 3, 2016." Page 118
335/Appendices/AC-Minutes/2016-17
Appendix - VI
L T P CA MS ES CA ES
3 1 0 25 25 50 - -
CED23 Requirements Engineering CEC11
COURSE OUTCOMES
1.To appreciate the importance of Requirements Engineering in the Software
development Life Cycle
2. To model the real life problem with the help of requirements engineering
techniques.
3. To learn about representation of requirements through various requirements
engineering techniques.
COURSE CONTENT
Introduction: Basics of Requirements engineering, Requirements management,
Requirements and software life cycle.
Processes in Requirements Engineering: Framework for describing
requirements engineering process.Conceptual foundation of elicitation, System
Analysis techniques used for elicitation. Requirements specification,
Requirements validation.
Modeling Principles and Techniques for Requirements Engineering:
Requirements specification from the enterprise view. Representation of with
functional and non-functional view of the requirements.
Tools: Concept –Method –Tool view of Requirements Engineering, Role of CASE in
Requirements Engineering.
Emerging Trends
"This B.E Computer Engineering Course has been passed in the meeting of Standing Committee on Academic
matters, University of Delhi, held on June 3, 2016." Page 119
336/Appendices/AC-Minutes/2016-17
Appendix - VI
SUGGESTED READING
1.P. Loucopoulos and V. Karakostas,“System Requirements Engineering,” McGraw-
Hill.
2. K.Weigers, “Software Requirements,”Microsoft Press.
3. Ian Sommerville and P Sawyer, “Requirements engineering a good practice Guide,”
Wiley India.
L T P CA MS ES CA ES
3 1 0 25 25 50 - -
CED24 Digital watermarking and CEC02, CEC05
Steganography
COURSE OUTCOMES
COURSE CONTENT
Digital Watermarking: Introduction to Watermarking techniques. A Survey of
Current Watermarking Techniques, Watermark detection and analysis, Application of
cryptography in digital watermarking.
Classification of watermarking techniques: Robust and Fragile Watermarking.
Techniques for protection of multimedia data and databases, Security Analysis of
watermarking techniques.
Applications of digital watermarking: Copyright protection, Intellectual property
issues, Digital Signatures, Authentication.
Steganography: History of Steganography, Principles of Steganography,
"This B.E Computer Engineering Course has been passed in the meeting of Standing Committee on Academic
matters, University of Delhi, held on June 3, 2016." Page 120
337/Appendices/AC-Minutes/2016-17
Appendix - VI
SUGGESTED READINGS
1. Katzenbeisser and Petitcolas ,”Information Hiding: Techniques for steganography
and digital watermarking,” Artech House.
2. Johnson, Duric, and Jajodia, ”Information Hiding – Steganography and
Watermarking – Attacks and Countermeasures,” Kluwer Academics publishers.
3. Cox, Miller, and Bloom, “Digital Watermarking,” Academic Press.
4. Jeng-Shyang Pan, Hsiang-Cheh Huang, Lakhmi C. Jain, “Information Hiding and
Applications,” Springer.
5. Michael Konrad Arnold, Martin Schmucker, Stephen D. Wolthusen, “Techniques
and applications of digital watermarking and content protection”, Artech House.
6. Research papers on digital watermarking and steganography of refereed journals.
L T P CA MS ES CA ES
3 1 0 25 25 50 - -
CED25 Service Oriented Architectures CEC13, CEC14
COURSE OUTCOMES
1. Understandthe basic principles of service orientation and service oriented
analysis techniques
2. Gain an insight in the technology underlying the service design and learn
advanced concepts such as service composition, orchestration and
choreography
3. Acquire skills to apply various components of service oriented architecture such
as SOAP, Entity-centric business service design, application service design etc
and their combination to implement the solutions.
4. Ability to plan , analyze and design enterprise software applications based on
"This B.E Computer Engineering Course has been passed in the meeting of Standing Committee on Academic
matters, University of Delhi, held on June 3, 2016." Page 121
338/Appendices/AC-Minutes/2016-17
Appendix - VI
COURSE CONTENT
Introduction:Roots of SOA, Characteristics of SOA ,Comparing SOA to client-
server and distributed internet architectures, Anatomy of SOA, How components in
an SOA interrelate, Principles of service orientation
Web services: Service descriptions, Messaging with SOAP, Message exchange
Patterns, Coordination ,Atomic Transactions, Business activities, Orchestration,
Choreography, Service layer abstraction, Application Service Layer, Business
Service Layer, Orchestration Service Layer
Service oriented analysis: Business-centric SOA, Deriving business services,
service modeling, Service Oriented Design, WSDL basics, SOAP basics, SOA
composition guidelines, Entity-centric business service design, Application service
design, Task- centric business service design
SOA platform basics: SOA support in J2EE, Java API for XML-based web services
(JAX-WS), Java architecture for XML binding (JAXB), Java API for XML Registries
(JAXR) , Java API for XML based RPC (JAX-RPC).
WS-BPEL basics: WS-Coordination overview ,WS-Choreography, WS-Policy, WS-
Security
Emerging trends
SUGGESTED READING
1. Thomas Erl, “Service-Oriented Architecture: Concepts, Technology, and Design,”
Pearson Education.
2. Papazoglou, Mike , “Web Services & SOA: Principles and Technology ,” Pearson –
Prentice Hall.
3. Bell, Michael , “Service-Oriented Modeling (SOA): Service Analysis, Design, and
Architecture,” Wiley.
4. Erl, Thomas , “SOA Design Patterns,” Prentice Hall .
"This B.E Computer Engineering Course has been passed in the meeting of Standing Committee on Academic
matters, University of Delhi, held on June 3, 2016." Page 122
339/Appendices/AC-Minutes/2016-17
Appendix - VI
COURSE OUTCOMES
1. Understand the real time system requirements and design analysis.
2. Understand the architectures, operating systems and performance issues of real
time systems.
3. Design a real time multi-tasking system or an embedded system controller.
COURSE CONTENT
Introduction: Real time systems models and classification, real time task
characterization, performance measures and estimation techniques.
Real-time process management: Task Scheduling for uniprocessor systems-
Rate monotonic, EDF, handling priorities with critical sections and interrupts,
reward based scheduling for accuracy-driven tasks
Advanced task scheduling: Scheduling for multiprocessor systems, adaptive
scheduling techniques, fault tolerant scheduling
Programming environment: RTOS, Programming languages, tools and
techniques .
Real-time system design: Design techniques for reliability, fault tolerance and
other application-specific quality considerations.
Real time communication: Communication media, network topologies,
protocols.
Recent developments: Trends in real-time systems design and development
SUGGESTED READINGS
1. Phillip A. Laplante, “Real time systems design and analysis,” Wiley India.
2. Jane, W.S. Liu, “Real Time Systems,”
"This B.E Computer Engineering Course has been passed in the meeting of Standing Committee on Academic
matters, University of Delhi, held on June 3, 2016." Page 123
340/Appendices/AC-Minutes/2016-17
Appendix - VI
"This B.E Computer Engineering Course has been passed in the meeting of Standing Committee on Academic
matters, University of Delhi, held on June 3, 2016." Page 124
341/Appendices/AC-Minutes/2016-17
Appendix - VI
COURSE OUTCOMES
1. Demonstrate systematic understanding of the concepts of security at the level of
policy and strategy in a computer system.
2. Identify and analyze the stages an ethical hacker requires to take in order to
compromise the target system.
3. Acquire knowledge of ethical laws and tests.
COURSE CONTENT
Introduction:Brief history of hacking, Nature of modern IT and its vulnerabilities,
Hacking methodologies, Penetration Testing, Legal and Ethical Considerations,
Creating and Implementing a Test Plan.
Strategy of Attack:Foot-printing and Social Engineering, Host Reconnaissance,
Port Scanning, Enumeration of Services, Gaining Access to a System, Trojans,
Viruses, Worms and Covert Channels, Sniffing and Evasion.
Attacking a System: Session Hijacking, Web Server Attacks, Database Attacks,
Password Cracking, Network Devices & Attacks, Wireless Network Attacks, Trojans
and Backdoor Applications, OS Specific Attacks, Buffer Overflows, Denial of Service
Attacks, Smashing the stack, Maintaining access and roadblocks, Evading
Intrusion Detection Systems, Firewalls and Honeypots, Social Engineering Attacks,
Physical Penetration Attacks.
Report Generation of Attacks:Developing a penetration testing report
Cryptography, Protecting Networks with Security Devices, Defending Against Social
Engineering and Physical Penetrations Attacks
Emerging Trends.
Outline of Project Work:Students will be assigned a semester wise study project to
explore the advancements in this area and present their work at the end of the
course.
SUGGESTED READINGS
"This B.E Computer Engineering Course has been passed in the meeting of Standing Committee on Academic
matters, University of Delhi, held on June 3, 2016." Page 125
342/Appendices/AC-Minutes/2016-17
Appendix - VI
L T P CA MS ES CA ES
3 1 0 25 25 50 - -
CED28 Digital Forensic CEC02, CEC05, CEC13
COURSE OUTCOMES
1. Understanding digital investigations that conform to accepted professional and
ethical standards of conduct, including impartiality and the protection of
personal privacy and are based on the standard investigative process:
identification, preservation, examination, analysis and reporting.
2. Acquire the ability to identify and document potential security breaches of
computer data that suggest violations of legal, ethical, moral, policy and/or social
standards.
3. Ability to apply a solid foundational grounding in computer networks, operating
systems, file systems, hardware and mobile devices to digital investigations and
to the protection of computer network resources from unauthorized activity.
4. Acquiring skills to work collaboratively with clients, management and/or law
enforcement to advance digital investigations or protect the security of digital
resources.
COURSE CONTENT
Introduction: History of forensics, Types of investigations, The Forensic Process,
Traditional Digital Forensic Process
Concepts of Computer Security: Security Incidents and Response, Real life
examples of Computer Crime, Digital Forensics rules, Procedures, and Challenging
"This B.E Computer Engineering Course has been passed in the meeting of Standing Committee on Academic
matters, University of Delhi, held on June 3, 2016." Page 126
343/Appendices/AC-Minutes/2016-17
Appendix - VI
Outline of Project Work: Students will be allotted a study project that will require
them to explore the new dimensions in this area and present their work at the end of
course.
SUGGESTED READINGS
1. Bill Nelson, Christopher Steuart, Amelia Phillips , "Guide to Computer Forensics
and Investigations," Cengage.
2. John Sammons, "The Basics of Digital Forensics: The Primer for Getting Started
in Digital Forensics," Syngress Media.
3. Eoghan Casey, "Digital Evidence and Computer Crime: Forensic Science,
Computers, and the Internet," Academic Press Inc.
"This B.E Computer Engineering Course has been passed in the meeting of Standing Committee on Academic
matters, University of Delhi, held on June 3, 2016." Page 127
344/Appendices/AC-Minutes/2016-17
Appendix - VI
COURSE OUTCOMES
1. To understand the VLSI design flow and the automation tasks involved in this
flow.
2. To implement algorithms for various steps of the process such as partitioning,
placement, routing, floor planning etc.
3. To use hardware definition languages and CAD tool to design, simulate and test
digital circuits and systems.
COURSE CONTENT
Overview of CMOS circuits and characteristics: CMOS Logic, The inverter,
Combinational Logic, NAND gate, NOT Gate, Compound Gates, Multiplexers,
Memory-Latches and Registers. Switching Characteristics - analytic delay models,
empirical delay model, gate delay. Power Dissipation - Static dissipation, Dynamic
dissipation, short-circuit dissipation, total power dissipation.
VLSI design process: VLSI design flow, Hardware Definition Languages – Verilog/
VHDL: their use in modeling, synthesis, simulation and writing test benches.
Logic synthesis: Two-level and multilevel gate optimization, Partitioning,
scheduling, allocation, technology mapping.
Physical Design: Placement, Routing, Floorplanning, clock routing.
Design Verification: Informal, semi-formal and formal verification, Languages for
verification, Simulation for Functional testing, Timing verification and Delay
estimation, power estimation.
Design for testability: Introduction, Automatic test generation,Built in self test
(BIST), Boundary scan.
Emerging Trends: CAD for FPGA design and other topics
SUGGESTED READINGS
"This B.E Computer Engineering Course has been passed in the meeting of Standing Committee on Academic
matters, University of Delhi, held on June 3, 2016." Page 128
345/Appendices/AC-Minutes/2016-17
Appendix - VI
L T P CA MS ES CA ES
3 1 0 25 25 50 - -
CED30 Middleware Technologies CEC13, CEC14
COURSE OUTCOMES
COURSE CONTENT
Introduction: Moving to e-business, what is IT architecture? Why is this different
from what we did before? Rewrite or evolve? , Who develops the architecture? Early
days, Preliminaries, Remote procedure calls, Remote database access, Distributed
transaction processing, Message queuing, Message queuing versus distributed
transaction processing, what happened to all this technology?
Objects,Components and Web: Using object middleware, Transactional component
middleware, COM, EJB, Final comments on TCM, Internet Applications. Web
services: Service concepts, Web services, and Using Web services: A pragmatic
"This B.E Computer Engineering Course has been passed in the meeting of Standing Committee on Academic
matters, University of Delhi, held on June 3, 2016." Page 129
346/Appendices/AC-Minutes/2016-17
Appendix - VI
Emerging Trends
SUGGESTED READINGS
1. Chris Britton and Peter Eye, “IT Architectures and Middleware: Strategies for
Building Large, Integrated Systems,” Pearson Education.
2. Qusay H. Mahmoud, “Middleware for Communications,” John Wiley and Sons.
3. Michah Lerner, “Middleware Networks: Concept, Design and Deployment of Internet
Infrastructure,”Kluwer Academic Publishers.
"This B.E Computer Engineering Course has been passed in the meeting of Standing Committee on Academic
matters, University of Delhi, held on June 3, 2016." Page 130
347/Appendices/AC-Minutes/2016-17
Appendix - VI
L T P CA MS ES CA ES
3 1 0 25 25 50 - -
CED31 Multimedia Applications CEC12
COURSE OUTCOME
1. Understanding range of concepts, techniques and tools for creating and editing
interactive multimedia applications.
2. Identify both theoretical and practical aspects in designing multimedia systems.
3. Gain ability to develop multimedia applications using contemporary hardware
and software technologies.
COURSE CONTENT
Fundamentals of multimedia: media and data streams, sound/audio, image,
graphics, video and animation.
Data compression: coding requirements, source, entropy, and hybrid coding,
JPEG, H.261, MPEG, MP3 and etc.
Multimedia communication architecture: multimedia workstations, cache
systems, storage systems and optical storage.
Multimedia operating system: real-time operation, resource management, process
management, file systems and Multimedia networking.
Multimedia synchronization: presentation requirements, reference model and
synchronization techniques.
Multimedia database: data organization, management, indexing, storage and
retrieval.
Multimedia applications: digital libraries, system software, toolkits, conferencing
paradigms, structured interaction support, and examples from
video/audio/graphics conferencing.
Emerging Trends in Web technologies
Guidelines for project based work:Semester long projects/presentations/ research
work/ term papers based on the above topics.
"This B.E Computer Engineering Course has been passed in the meeting of Standing Committee on Academic
matters, University of Delhi, held on June 3, 2016." Page 131
348/Appendices/AC-Minutes/2016-17
Appendix - VI
SUGGESTED READINGS
1. Li , Ze - Nian, “Fundamentals of Multimedia,” PHI.
2. Ramesh Yerraballi, “Multimedia Systems Concepts Standards and Practice,”PHI.
3. “Multimedia Communications: Applications, networks, protocols and
standards,” Pearson.
L T P CA MS ES CA ES
3 1 0 25 25 50 - -
CED32 Human Computer Interfacing CEC03, CEC12
COURSE OUTCOMES
1. To be able to understand the importance of designing interactive products that are
usable.
2. To be able to communicate effectively about requirements, design, and evaluation
activities relating to interactive products.
3. Evaluate an interactive product using suitable techniques.
COURSE CONTENT
Importance of user Interface – definition, importance of good design. Benefits of
good design. A brief history of Screen design.
The graphical user interface – popularity of graphics, the concept of direct
manipulation, graphical system, Characteristics, Web user – Interface popularity,
characteristics- Principles of user interface.
Design process – Human interaction with computers, importance of human
characteristics human consideration, Human interaction speeds, understanding
business junctions.
Screen Designing : Design goals – Screen planning and purpose, organizing screen
elements, ordering of screen data and content – screen navigation and flow –
"This B.E Computer Engineering Course has been passed in the meeting of Standing Committee on Academic
matters, University of Delhi, held on June 3, 2016." Page 132
349/Appendices/AC-Minutes/2016-17
Appendix - VI
SUGGESTED READINGS
1. Galitz, “The Essential Guide to User Interface Design: An Introduction to GUI
Design Principles and Techniques,” Wiley.
2. Dix, A. Finlay, J., Abowd, G. and Beale, “Human-Computer Interaction,” Prentice
Hall.
3. Preece, J., Sharp, H. and Rogers, “Interaction Design: Beyond Human-Computer
Interaction,” Wiley.
L T P CA MS ES CA ES
3 1 0 25 25 50 - -
CED33 Emerging Applications of CEC02,CEC05
Computing
COURSE OUTCOMES
1. Appreciate and apply state of the arttechnologies in different fields of computing.
2. Continue to learn new approaches, tools and applications in the field of
computing.
"This B.E Computer Engineering Course has been passed in the meeting of Standing Committee on Academic
matters, University of Delhi, held on June 3, 2016." Page 133
350/Appendices/AC-Minutes/2016-17
Appendix - VI
SUGGESTED READING
Will be decided according to students’ interests and field of expertise of the faculty.
L T P CA MS ES CA ES
3 1 0 25 25 50 - -
CED34 Cryptography CEC01
COURSE OUTCOMES
1. To learn the mathematics, logic and science underlying the principles of
cryptography.
2. To implement the cryptographic algorithms and use them in developing
applications.
COURSE CONTENT
Classical ciphers: Cryptanalysis of classical ciphers, Probability theory, Perfect
security
Block ciphers: DES, AES, Block cipher modes of operation
Private-key encryption: Chosen plaintext attacks,, Randomised encryption
Pseudo randomness, Chosen cyphertext attacks
Message authentication codes : Private-key authentication, CBC-MAC,
Pseudorandom functions, CCA-secure private-key encryption
Hash functions: Integrity ,Pre-image resistance,2nd pre-image resistance, Collision
freeness, SHA-256,NMAC/HMAC
Key distribution : Key distribution centres,Modular arithmetic and group theory
Diffie-Hellman key exchange
"This B.E Computer Engineering Course has been passed in the meeting of Standing Committee on Academic
matters, University of Delhi, held on June 3, 2016." Page 134
351/Appendices/AC-Minutes/2016-17
Appendix - VI
SUGGESTED READINGS
1. Christof Paar, Jan Pelzl, “Understanding Crytography,” Springer.
2. Niel Ferguson, “Cryptography Engineering- Design principles and practical
application,” Wiley.
3. William Stallings, “Cryptography and network security – principles and practice ,”
Pearson.
L T P CA MS ES CA ES
3 1 0 25 25 50 - -
CED35 Information Theory and coding CEC01
COURSE OUTCOMES
1. To learn about the basic principles of information theory
2. To acquire the skills to apply various coding techniques in information theory
COURSE CONTENT
"This B.E Computer Engineering Course has been passed in the meeting of Standing Committee on Academic
matters, University of Delhi, held on June 3, 2016." Page 135
352/Appendices/AC-Minutes/2016-17
Appendix - VI
SUGGESTED READINGS:
1. R Ash, “Information Theory,” Dover Science Publications.
2. Cover and Thomas,“Element of Information Theory,” John Wiley & Sons.
3. Shulin& Daniel J. Costello Jr, “Error Control coding: Fundamental &
Application,”Prentice Hall. Simon Haykin,“IncCommunication Systems,” Wiley
Student Edition
L T P CA MS ES CA ES
3 1 0 25 25 50 - -
CED36 Rough Set Theory CEC01
COURSE OUTCOME
1. To understand the need for approximate analysis and computation methods in the
context of real-life sophisticated applications
2. To use the tenets of rough set theory in developing applications.
"This B.E Computer Engineering Course has been passed in the meeting of Standing Committee on Academic
matters, University of Delhi, held on June 3, 2016." Page 136
353/Appendices/AC-Minutes/2016-17
Appendix - VI
SUGGESTED READING
1.Jan Komorowski et al, “Rough Set
Tutorial,”http://eecs.ceas.uc.edu/~mazlack/dbm.w2011/Komorowski.RoughSets.tut
or.pdf
2. Polowski Lech, “Rough Set- Mathematical; foundation,” Springer.
"This B.E Computer Engineering Course has been passed in the meeting of Standing Committee on Academic
matters, University of Delhi, held on June 3, 2016." Page 137
354/Appendices/AC-Minutes/2016-17
Appendix - VI
L T P CA MS ES CA ES
3 1 0 25 25 50 - -
CED37 Cloud Computing CEC13, CEC14
COURSE OUTCOMES
COURSE CONTENT
Types of cloud architectures: Public, Private, Hybrid, Design issues with cloud:
scalability, fault tolerance, security, trust, privacy.
"This B.E Computer Engineering Course has been passed in the meeting of Standing Committee on Academic
matters, University of Delhi, held on June 3, 2016." Page 138
355/Appendices/AC-Minutes/2016-17
Appendix - VI
SUGGESTED READINGS
1. K. Chandrasekaran, “Essentials of Cloud Computing,”
2. T. Velte, A. Velte and R. Estenpeter, “Cloud Computing – A practical approach,”
3. U.S. Pandey, Kavita Choudhary, “Cloud Computing,”
4. S. Chand,R. Buyya, C. Vecchiola, S.T. Selvi, “Mastering Cloud Computing,”
L T P CA MS ES CA ES
3 1 0 25 25 50 - -
CED38 Soft Computing CEC02,CEC05
COURSE OUTCOMES
1. Understand the complexity of current information systems due their inherent
uncertainty and imprecision.
2. Ability to use methodologies that can exploit the tolerance for imprecision to
develop robust and cheap solutions for intelligent systems.
3. Develop skills to apply various components of soft computing such as fuzzy logic,
evolutionary computing, probabilistic computing etc and their combination to
implement the solutions.
COURSE CONTENT
Foundations of soft computing: Computational issues in intelligent information
systems.
Approximation theories: Overview of Fuzzy set theory, Rough Set theory, granular
computing, Mixed approaches.
Neural networks: learning process, single layer perceptrons, back propagation
algorithm, support vector machines
Evolutionary Algorithms: Overview and theory of genetic algorithms, genetic
operations, selection methods, tackling multi-objective functions, extensions
Swarm optimization: Techniques based on nature-driven optimization such as ant
"This B.E Computer Engineering Course has been passed in the meeting of Standing Committee on Academic
matters, University of Delhi, held on June 3, 2016." Page 139
356/Appendices/AC-Minutes/2016-17
Appendix - VI
SUGGESTED READINGS
1. N.K. Sinha and M.M. Gupta, “Soft computing and Intelligent systems,” Elsevier
2. Eva Volna, “Introduction to soft computing,” Free e-book.
3. Andrea G. B. Tettamanzi, Marco Tomassini, “Soft Computing:
IntegratingEvolutionary, Neural and Fuzzy Systems,”
L T P CA MS ES CA ES
3 1 0 25 25 50 - -
COURSE OUTCOMES
1.Understand the concepts of distributed computing systems along with design and
implementation issues.
2. Acquire skills to analyze design and implement distributed algorithms
COURSE CONTENT
Distributed computing systems (DCS):Introduction, DCS design goals:
Transparencies, Fundamental issues
Distributed Coordination: Temporal ordering of events, Lamport's logical clocks,
Vector clocks; Ordering of messages, Physical clocks, Global state detection
Process synchronization: Distributed mutual exclusion algorithms, Performance
matrix, Inter-process communication
Deadlocks, Load scheduling and balancing techniques: Deadlock in distributed
"This B.E Computer Engineering Course has been passed in the meeting of Standing Committee on Academic
matters, University of Delhi, held on June 3, 2016." Page 140
357/Appendices/AC-Minutes/2016-17
Appendix - VI
SUGGESTED READINGS
1. G. Coulouris, J. Dollimore, “Distributed Systems Concepts and Design,” Addison
Wesley.
2. Hwang & Dongarra & Fox,“Distributed and Cloud Computing, From Parallel
Processing to the Internet of Things,”
3. M. Singhal, N.G. Shivarathri , “Advanced Operating Systems,”, McGraw Hill.
4. Randy Chow, T. Johnson, “Distributed Operating Systems and Algorithms,” Addison
Wesley.
5. A.S. Tanenbaum,“Distributed Operating Systems,” Prentice Hall.
6. M. Tamer Ozsu, PatrickValduriez, “Principles of Distributed Database Systems,”
Prentice Hall International
"This B.E Computer Engineering Course has been passed in the meeting of Standing Committee on Academic
matters, University of Delhi, held on June 3, 2016." Page 141
358/Appendices/AC-Minutes/2016-17
Appendix - VI
3 1 0 25 25 50 - -
COURSE CONTENT
Introduction: Patterns andMotivation for using patterns
Design patterns: Façade, adaptor, strategy, bridge, decorator, publisher-subscriber,
factory method, factory, template, singleton, object pool and their implementation in
Object Oriented languages such as C#/Java.
Architectural patterns: Architectural patterns used in various applications such as
interactive applications (Model View Controller MVC and Presentation-Abstraction-
Control PAC) ,distributed architectures (Broker, pipes and filters), Adaptable systems
(Reflection), Communication (Proxy) and other architectural patterns.
Guidelines for project work: Project/ Seminars/ Talks/presentations/ research
work/ term papers based on the above topics.
"This B.E Computer Engineering Course has been passed in the meeting of Standing Committee on Academic
matters, University of Delhi, held on June 3, 2016." Page 142
359/Appendices/AC-Minutes/2016-17
Appendix - VI
L T P CA MS ES CA ES
3 1 0 25 25 50 - -
COURSE OUTCOMES
1. Understand the basic knowledge representation, problem solving, and learning
methods.
2. Develop intelligent systems by assembling solutions to concrete computational
problems.
3. Understand the role of knowledge representation, problem solving, and rule based
learning in intelligent-system engineering.
COURSE CONTENT
Overview: Rule based Reasoning, Production systems, Rule-based Systems, Review
of propositional and first order logic, Skolemisation, unification and its algorithms,
Goals and sub-goals, forward and backward chaining.
Intelligent Agents: Agents and Environments, Good Behavior: The Concept of
Rationality, The Nature of Environments, The Structure of Agents, How the
components of agent programs work.
Solving Problems: Solving problems by Searching, Problem-Solving Agents,
"This B.E Computer Engineering Course has been passed in the meeting of Standing Committee on Academic
matters, University of Delhi, held on June 3, 2016." Page 143
360/Appendices/AC-Minutes/2016-17
Appendix - VI
SUGGESTED READINGS
1. Russell, Stuart J., and Peter Norvig,“Artificial intelligence: a modern approach,”
Prentice Hall.
2. Patrick Henry Winston , “Artificial intelligence,” Addition Wesley.
3. Elain Rich and Kevin Knight, “Artificial Intelligence,” TMH.
"This B.E Computer Engineering Course has been passed in the meeting of Standing Committee on Academic
matters, University of Delhi, held on June 3, 2016." Page 144
361/Appendices/AC-Minutes/2016-17
Appendix - VI
"This B.E Computer Engineering Course has been passed in the meeting of Standing Committee on Academic
matters, University of Delhi, held on June 3, 2016." Page 145
362/Appendices/AC-Minutes/2016-17
Appendix - VI
"This B.E Computer Engineering Course has been passed in the meeting of Standing Committee on Academic
matters, University of Delhi, held on June 3, 2016." Page 146
363/Appendices/AC-Minutes/2016-17
Appendix - VI
"This B.E Computer Engineering Course has been passed in the meeting of Standing Committee on Academic
matters, University of Delhi, held on June 3, 2016." Page 147
364/Appendices/AC-Minutes/2016-17
Appendix - VI
365/Appendices/AC-Minutes/2016-17
Appendix - VI
"This B.E Computer Engineering Course has been passed in the meeting of Standing Committee on Academic
matters, University of Delhi, held on June 3, 2016." Page 149
366/Appendices/AC-Minutes/2016-17
Appendix - VI
"This B.E Computer Engineering Course has been passed in the meeting of Standing Committee on Academic
matters, University of Delhi, held on June 3, 2016." Page 150
367/Appendices/AC-Minutes/2016-17
Appendix - VI
"This B.E Computer Engineering Course has been passed in the meeting of Standing Committee on Academic
matters, University of Delhi, held on June 3, 2016." Page 151
368/Appendices/AC-Minutes/2016-17
Appendix - VI
369/Appendices/AC-Minutes/2016-17
Appendix - VI
370/Appendices/AC-Minutes/2016-17
Appendix - VI
"This B.E Computer Engineering Course has been passed in the meeting of Standing Committee on Academic
matters, University of Delhi, held on June 3, 2016." Page 154
371/Appendices/AC-Minutes/2016-17
Appendix - VI
372/Appendices/AC-Minutes/2016-17
Appendix - VI
373/Appendices/AC-Minutes/2016-17
Appendix - VI
"This B.E Computer Engineering Course has been passed in the meeting of Standing Committee on Academic
matters, University of Delhi, held on June 3, 2016." Page 157
374/Appendices/AC-Minutes/2016-17
Appendix - VI
"This B.E Computer Engineering Course has been passed in the meeting of Standing Committee on Academic
matters, University of Delhi, held on June 3, 2016." Page 158
375/Appendices/AC-Minutes/2016-17
Appendix - VI
"This B.E Computer Engineering Course has been passed in the meeting of Standing Committee on Academic
matters, University of Delhi, held on June 3, 2016." Page 159
376/Appendices/AC-Minutes/2016-17
Appendix - VI
377/Appendices/AC-Minutes/2016-17
Appendix - VI
378/Appendices/AC-Minutes/2016-17
Appendix - VI
"This B.E Computer Engineering Course has been passed in the meeting of Standing Committee on Academic
matters, University of Delhi, held on June 3, 2016." Page 162
379/Appendices/AC-Minutes/2016-17
Appendix - VI
"This B.E Computer Engineering Course has been passed in the meeting of Standing Committee on Academic
matters, University of Delhi, held on June 3, 2016." Page 163
380/Appendices/AC-Minutes/2016-17
Appendix - VI
381/Appendices/AC-Minutes/2016-17
Appendix - VI
382/Appendices/AC-Minutes/2016-17
Appendix - VI
383/Appendices/AC-Minutes/2016-17
Appendix - VI
384/Appendices/AC-Minutes/2016-17
Appendix - VI
"This B.E Computer Engineering Course has been passed in the meeting of Standing Committee on Academic
matters, University of Delhi, held on June 3, 2016." Page 168
385/Appendices/AC-Minutes/2016-17
Appendix - VI
386/Appendices/AC-Minutes/2016-17
Appendix - VI
387/Appendices/AC-Minutes/2016-17
Appendix - VI
"This B.E Computer Engineering Course has been passed in the meeting of Standing Committee on Academic
matters, University of Delhi, held on June 3, 2016." Page 171
388/Appendices/AC-Minutes/2016-17
Appendix - VI
"This B.E Computer Engineering Course has been passed in the meeting of Standing Committee on Academic
matters, University of Delhi, held on June 3, 2016." Page 172
389/Appendices/AC-Minutes/2016-17
Appendix - VI
390/Appendices/AC-Minutes/2016-17
Appendix - VI
391/Appendices/AC-Minutes/2016-17
Appendix - VI
392/Appendices/AC-Minutes/2016-17
Appendix - VI
393/Appendices/AC-Minutes/2016-17
Appendix - VI
394/Appendices/AC-Minutes/2016-17
Appendix - VI
395/Appendices/AC-Minutes/2016-17
Appendix - VI
"This B.E Computer Engineering Course has been passed in the meeting of Standing Committee on Academic
matters, University of Delhi, held on June 3, 2016." Page 179
396/Appendices/AC-Minutes/2016-17
Appendix - VI
"This B.E Computer Engineering Course has been passed in the meeting of Standing Committee on Academic
matters, University of Delhi, held on June 3, 2016." Page 180
397/Appendices/AC-Minutes/2016-17
Appendix - VI
"This B.E Computer Engineering Course has been passed in the meeting of Standing Committee on Academic
matters, University of Delhi, held on June 3, 2016." Page 181
398/Appendices/AC-Minutes/2016-17
Appendix - VI
399/Appendices/AC-Minutes/2016-17
Appendix - VI
400/Appendices/AC-Minutes/2016-17
Appendix - VI
401/Appendices/AC-Minutes/2016-17
Appendix - VI
402/Appendices/AC-Minutes/2016-17
Appendix - VI
"This B.E Computer Engineering Course has been passed in the meeting of Standing Committee on Academic
matters, University of Delhi, held on June 3, 2016." Page 186
403/Appendices/AC-Minutes/2016-17
Appendix - VI
"This B.E Computer Engineering Course has been passed in the meeting of Standing Committee on Academic
matters, University of Delhi, held on June 3, 2016." Page 187
404/Appendices/AC-Minutes/2016-17
Appendix - VI
"This B.E Computer Engineering Course has been passed in the meeting of Standing Committee on Academic
matters, University of Delhi, held on June 3, 2016." Page 188
405/Appendices/AC-Minutes/2016-17
Appendix - VI
406/Appendices/AC-Minutes/2016-17
Appendix - VI
407/Appendices/AC-Minutes/2016-17
Appendix - VI
"This B.E Computer Engineering Course has been passed in the meeting of Standing Committee on Academic
matters, University of Delhi, held on June 3, 2016." Page 191
408/Appendices/AC-Minutes/2016-17
Appendix - VI
409/Appendices/AC-Minutes/2016-17
Appendix - VI
"This B.E Computer Engineering Course has been passed in the meeting of Standing Committee on Academic
matters, University of Delhi, held on June 3, 2016." Page 193
410/Appendices/AC-Minutes/2016-17
Appendix - VI
"This B.E Computer Engineering Course has been passed in the meeting of Standing Committee on Academic
matters, University of Delhi, held on June 3, 2016." Page 194
411/Appendices/AC-Minutes/2016-17
Appendix - VI
"This B.E Computer Engineering Course has been passed in the meeting of Standing Committee on Academic
matters, University of Delhi, held on June 3, 2016." Page 195
412/Appendices/AC-Minutes/2016-17
Appendix - VI
413/Appendices/AC-Minutes/2016-17
Appendix - VI
414/Appendices/AC-Minutes/2016-17
Appendix - VI
415/Appendices/AC-Minutes/2016-17
Appendix - VI
416/Appendices/AC-Minutes/2016-17
Appendix - VI
417/Appendices/AC-Minutes/2016-17
Appendix - VI
"This B.E Computer Engineering Course has been passed in the meeting of Standing Committee on Academic
matters, University of Delhi, held on June 3, 2016." Page 201
418/Appendices/AC-Minutes/2016-17
Appendix - VI
419/Appendices/AC-Minutes/2016-17
Appendix - VI
"This B.E Computer Engineering Course has been passed in the meeting of Standing Committee on Academic
matters, University of Delhi, held on June 3, 2016." Page 203
420/Appendices/AC-Minutes/2016-17
Appendix - VI
421/Appendices/AC-Minutes/2016-17
Appendix - VI
"This B.E Computer Engineering Course has been passed in the meeting of Standing Committee on Academic
matters, University of Delhi, held on June 3, 2016." Page 205
422/Appendices/AC-Minutes/2016-17
Appendix - VI
423/Appendices/AC-Minutes/2016-17
Appendix - VI
"This B.E Computer Engineering Course has been passed in the meeting of Standing Committee on Academic
matters, University of Delhi, held on June 3, 2016." Page 207
424/Appendices/AC-Minutes/2016-17
Appendix - VI
425/Appendices/AC-Minutes/2016-17
Appendix - VI
COURSE CONTENT:
1. Transmission line and waveguide
Interpretation of wave equations; Rectangular wave guide | TE and TM modes, power
transmission, excitation of modes; Circular waveguide | TE, TM and TEM modes,
power transmission, excitation of modes. Microstrip lines | characteristic impedance,
loss and Q of microstrip lines, coplanar strip lines and shielded strip lines.
2. Component
Scattering parameter and scattering matrix, properties of S-parameter; Quality factor
and Q-value of a cavity resonator, Q-value of a coupled cavity; Wave guide tees, magic
tee, hybrid ring, couplers; Ferrites and Faraday's rotation, gyrator, circulator, isolator
and terminator; λ/4 section filter, tuner and sliding short.
3. Measurement
Smith chart, single stub and double stub matching; Microwave bridge, measurement
of frequency, attenuation and phase; Measurement of dielectric parameters of
amorphous solids | dielectric constant, ac conductivity, resistivity, insertion loss,
return loss, shielding coefficient. Measurement of microstrip line parameters.
4. Source
Conventional sources & their limitations.
(a) Vacuum tube sources | Klystron, reex klystron, travelling wave tubes and
switching tubes;
Magnetrons, FWCFA and Gyrotrons.
(b) Microwave transistors and FETs, Gunn, IMPATT, TRAPATT and parametric devices.
(c) Laser | Laser processes, Pockels-Cell; Laser modulators, infrared radiation and
sources.
"This B.E Computer Engineering Course has been passed in the meeting of Standing Committee on Academic
matters, University of Delhi, held on June 3, 2016." Page 209
426/Appendices/AC-Minutes/2016-17
Appendix - VI
427/Appendices/AC-Minutes/2016-17
Appendix - VI
428/Appendices/AC-Minutes/2016-17
Appendix - VI
"This B.E Computer Engineering Course has been passed in the meeting of Standing Committee on Academic
matters, University of Delhi, held on June 3, 2016." Page 212
429/Appendices/AC-Minutes/2016-17