This action might not be possible to undo. Are you sure you want to continue?
CS-701 – Compiler Design
Unit-I Introduction to compiling & Lexical Analysis Introduction of Compiler, Major data Structure in compiler, BOOT Strapping & Porting, Compiler structure: analysis-synthesis model of compilation, various phases of a compiler, Lexical analysis: Input buffering , Specification & Recognition of Tokens, LEX. Unit-II Syntax Analysis &Syntax Directed Translation Syntax analysis: CFGs, Top down parsing, Brute force approach, recursive descent parsing, transformation on the grammars, predictive parsing, bottom up parsing, operator precedence parsing, LR parsers (SLR,LALR, LR),Parser generation.Syntax directed definitions: Construction of Syntax trees, Bottom up evaluation of S-attributed definition, L-attribute definition, Top down translation, Bottom Up evaluation of inherited attributes Recursive Evaluation, Analysis of Syntax directed definition. Unit-III Type Checking & Run Time Environment Type checking: type system, specification of simple type checker, equivalence of expression, types, type conversion, overloading of functions and operations, polymorphic functions. Run time Environment: storage organization, Storage allocation strategies, parameter passing, dynamic storage allocation , Symbol table Unit –IV Code Generation Intermediate code generation: Declarations, Assignment statements, Boolean expressions, Case statements, Back patching, Procedure calls Code Generation: Issues in the design of code generator, Basic block and flow graphs, Register allocation and assignment, DAG representation of basic blocks, peephole optimization, generating code from DAG. Unit –V Code Optimization Introduction to Code optimization: sources of optimization of basic blocks, loops in flow graphs, dead code elimination, loop optimization, Introduction to global data flow analysis, Code Improving transformations ,Data flow analysis of structure flow graph Symbolic debugging of optimized code. List of Experiments: Develop a lexical analyzer to recognize a few patterns. Write a programme to parse using Brute force technique of Topdown parsing. Develop LL (1) parser (Construct parse table also). Develop an operator precedence parser (Construct parse table also) Develop a recursive descent parser Write a program for generating for various intermediate code forms i) Three address code ii) Polish notation Write a program to simulate Heap storage allocation strategy Generate Lexical analyzer using LEX Generate YACC specification for a few syntactic categories. Given any intermediate code form implement code optimization techniques Study of an Object Oriented Compiler.
1993.. Pearson Education 2 Raghavan. V. Compilers: Principles. Cengage Learning 4. 5. Compiler Construction: Principles and Practice. C. Ullman. Compiler Design.Grading System 2013 . Louden. R. D. Holub.14 References: 1. writing compiler & Interpreters. Willey Pub. Compiler Design in C . A. Prentice-Hall Inc. Mak. Aho. 3. A. . Sethi. and J. Techniques and Tools . TMH Pub.
Distributed Operating System Concept & Design. RPC. File Sharing Semantics.14 CS-702 – Distributed System Unit-I Introduction to distributed systems Architecture for Distributed System. Deadlock Handling Strategy. Advance Concept in Operating System. Structure of Share Memory Space. Desirable features of good Distributed File System. File Accessing Model. Election Algorithms:Bully & Ring Algorithms. Unit-III Inter Process Communication And Synchronization API for Internet Protocol. Wiley Pub. Pearson Pub Singhal & Shivratari. Unit-II Distributed Share Memory And Distributed File System Basic Concept of Distributed Share Memory (DSM). File Model. Distributed Multimedia:. Components for Load Distributing Algorithms.Implementing RPC Mechanism. Distributed System Concepts and Design. Object Locating Mechanism. Hardware and Software concepts. Naming: . Deadlock-Issues in deadlock detection & Resolutions. Different Types of Load Distributing Algorithms. Stub Generation. Quality of Service Managements.Characteristics of multimedia Data. Client Server Communication. Data Representation & Marshaling.Grading System 2013 . Mutual Exclusion. DSM Architecture & its Types. Synchronization: .Amoeba. Human Oriented Name. Distributed Computing Model. File Service Architecture. Unit-IV Distributed Scheduling And Deadlock Distributed Scheduling-Issues in Load Distributing. Mach. Advantages & Disadvantage distributed system. PHI Coulouris & Dollimore. Distributed Computing. Task Migration and its issues. System Oriented Names. Types of Distributed Database. . Unit-V Distributed Multimedia & Database system Distributed Data Base Management System(DDBMS). and Thrashing. McGraw Hill Attiya & Welch. Distributed Deadlock Algorithms. Design & Implementations issues In DSM System. Issues in designing Distributed System.Features. Chorus References: Sinha. Consistency Model. File Catching Scheme. RPC Messages. File Application & Fault tolerance.Clock Synchronization. Goals of Distributed system. Group Communication. Case Study of Distributed System:.
Unit-IV Cloud Security: Cloud Information security fundamentals. Testing Under Control. Cloud Security Management. Cloud and dynamic infrastructure. Unit-II Cloud Computing Architecture: Cloud Reference Model. Secure Cloud Software Requirements.Cloud Federation Stack . Amazon . Service deployment & Usage over cloud.Virtualization benefits. Cloud security services. 3. High Availability and Disaster Recovery. Scalability and Fault Tolerance. Cloud Adoption and rudiments . 5. Block and file level storage virtualization Hypervisor management software. Microsoft Azure . Protein structure prediction. Case study : Google App Engine. Installation and configuration of Hadoop/Euceliptus etc.CRM and ERP . networking.Conceps of Map reduce . Cloud Service Management. Virtual Desktop Infrastructure. Policy Implementation.14 CS-703 – Cloud Computing Unit-I Introduction: Historical development . Unit –III Cloud Management & Virtualization Technology: Resiliency. Virtualization security Management. Types of Clouds. Using existing cloud characteristics & Service models . Third Party Cloud Services . Cloud Solutions: Cloud Ecosystem. Federated Clouds/Inter Cloud: Characterization & Definition . Cloud services requirements. desktop and application virtualization . Cloud Computing Security Challenges.storage. Cloud Offerings: Cloud Analytics. Aneka List of Experiments: 1. Gene Expression Data Analysis . 4.Overview of cloud applications: ECG Analysis in the cloud. Cloud Interoperability & Standards. Characteristics of cloud computing as per NIST . 6. Hadoop . server virtualization. Unit-V Market Based Management of Clouds . Provisioning. Performance evaluation of services over cloud . Cloud Business Process Management.Vision of Cloud Computing. Cloud Governance. Management of cloud resources. 2. Cloud computing reference model . Cloud Computing Secutity Architecture . Asset management. Design principles. Virtualization: Fundamental concepts of compute .Satellite Image Processing .Grading System 2013 . Virtual LAN(VLAN) and Virtual SAN(VSAN) and their benefits .Cloud computing environments. Infrastructure Requirements . .Social networking .
Krutz .A Practical Approach” .TMH Pub 2. Wiley Pub . Vines.14 Recommended Text: 1. Wiley Pub 3. “ Cloud Computing” . “Cloud Computing” . “Cloud Security “ . Velte. “Cloud Computing. Buyya. Selvi .TMH Pub 5.Grading System 2013 .” Mastering Cloud Computing “. Wiley Pub 4. Sosinsky. Kumar Saurabh.
NAS. Cloud Computing. Information Storage and Management: Storing. Wiley India. TMH Pub. mapping and operation. Velete. storage & appliances. Key management metrics (Thresholds. DAS. 5. Anthony T. Elements. Cloud Computing : Insight into New Era I . modular arrays.Grading System 2013 . Ransome. standard framework applications. Cloud benefits. 2. availability. Virtualization: Memory. Nils Haustein. iSESI. 3. Backup & Disaster Recovery: Principles Managing & Monitoring: Industry management standards (SNMP. Cloud Computing : Implementation . Cloud computing Evolution. 4. standards. security. INFINIBAND and FCOE. connectivity. NAS. Cloud service providers and Models. server. Toby J. hot sparing. SMI-S. Saurabh . and Robert Eltenpeter. storage on Cloud. CIM). Component architecture of intelligent disk subsystems. Taylor Frances Pub. Data center concepts & requirements. Cloud Computing : A practical Approach. properties. Essential characteristics of cloud computing. Applications & services on cloud. Wiley India. network. Applications. References: 1. RAID levels & parity algorithms. performance. CRC Press. Rainer Wolafka. Overview of storage infrastructure components. Contrast of integrated vs. Architectural Framework. Springer. SAN. Cloud Security and integration. Rittinghouse and James F. Rainer Erkens. Disk physical structure components. performance). Cloud Vocabulary. SAN & CAS evolution and comparision. CAS & SAN. 6. Management and Security. Somasundaram & Alok Shrivastava (EMC Education Services) editors. Storage Network explained : Basic and application of fiber channels. Unit-III Introduction to Networked Storage: JBOD. capacity. Lee Gillam. Unit-II Storage Systems Architecture: Intelligent disk subsystems overview. security and limitations of DAS. Information Lifecycle Management. Nick Antonopoulos. Data categorization. and Protecting Digital Information. G. System & Application. management. Wolfgang Mueller-Friedt. and specifications. John W. Front end to host storage provisioning.14 CS-704 – Information Storage & Management Unit-I Introduction to Storage Technology: Data proliferation. evolution of various storage technologies. Unit -IV Hybrid Storage solutions. NAS. Unit-V Information storage on cloud :Concept of Cloud. Cloud Computing : Principles. Managing.Velk. Ulf Troppens.
).Post attack IDS Measures & Evading IDS Systems. TCP/IP hijacking. EIgamal Signature Scheme. SQL Injection and other vulnerabilities Denial-of Service Attacks: Types of Attacks (Smurf Attack. Buffer Overflow Attack. Spoofing v Hijacking. Types. Decryption. Teardrop Attack. MD5. Content-Injection Phishing. Cryptography Attacks. DDoS Attack(Distributed DoS Attack. UNIT IV Trojans and Backdoors: Overt and Covert Channels. Applications. Security Terminologies and Principle. Data Encryption Standard (DES). Misconfiguration attacks etc. Proxy Trojans. Types (Remote Access Trojans. Attacks Types (Man-in-the-Middle Attacks. Viruses and Worms: Characteristics. Algorithms and Security.Message Digest Functions. Attack Phase. Digital Certificates.Secured authentication mechanism. Session Hijacking. UNIT II Cryptography. Working. Phishing: Methods. Computer Securit y and Cyber Security. DiffieHellman key exchange. Message Authentication codes . Ping of Death Attack. Sniffing. Method.Grading System 2013 . Trojans. application level. Web Application Security.Indication of Intrusion: System Indications. DNSBased Phishing. RC5. Principles of Public key Cryptosystems. Disk Encryption. URL Obfuscation Attacks. Kerberos. SHA (Secure Hash Algorithm). Types of Intrusion Detection Systems. Penetration Testing. Types of attacks (Operating System. Cryptanalysis. Categories of security assessments. SSH (Secure Shell). Risk Management. Security Software Disablers). Government Access to Keys (GAK) Digital Signature: Analysis. SYN Flooding). SYN Attack. Algorithm: Signature Generation/Verification. FTP Trojans. Malware-Based Phishing. RC4. Key Management.14 Elective –I (CS 7101 Network & Web Security) UNIT I Introduction to Network Security. Authentication Functions. Terminologies. Infection Phase. Shrink Wrap code. Process. Vulnerability Assessment. CAPTCHA Protection . RC6. SSL (Secure Sockets Layer). Encryption. Sniffers: Definition. secured session management. UNIT III Hash Functions.). Client-side Vulnerabilities. Code Breaking: Methodologies. Blowfish. spoofing. Intrusion Detection System (IDS). Components. Vulnerable Protocols. Public key cryptography. Classical Cryptographic Techniques. System Integrity Verifiers (SIVS). elliptic curve cryptography. Authentication Requirements. Search Engine Phishing). Introduction to Intrusion. File System Indications Network Indications. Security Threats. One-way Hash Functions. ECDSA. Brute-Force Attack. Hidden Attacks. Destructive Trojans. Standard. Intrusion Detection Tools . Types of Penetration Testing. Use of Cryptography. Data-Sending Trojans. Working. Deceptive Phishing. Cryptographic Algorithms RSA. Cross-site Scripting.
Atul Kahate. . Stealth Files.. Design Principles. Process Viewer. Computer Forensics. StegSpy. Whois. Overview of System Hacking Cycle. fPort. Krawetz. Land and LaTierra. 7. Incident Handling. 5. Image Hide. Footprinting. Understanding DoS Attack Tools. Stegdetect. Fourozon.”Cryptography and Network Security” Mc Graw Hill 6. “ Network Security Private communication in a public world” TMH 3. 6. Crazy Pinger. Steghide.Cengage Learning . 4. Scanning (Types-Port. Eugene Schultz. Need.) 2. Joseph Migga Kizza. CurrPorts Tool.. Trusted Systems.14 UNIT V IP Security. Blindside. Bubonic. Net Tools Suite Pack. Web Security. wireshark. Hacking. NetBIOS Enumeration Using NetView Tool.c. Lan Scanner using look@LAN. Nbtstat Enumeration Tool (Open Source). HPing2. suicide hackers). Pretty Good Envelop. Firewalls: Types. TCPView.Jolt2 . Suggested Reading: 1. Steganography using tools: Tool: Merge Streams. STools.Stages & Steps of Forensic Investigation in Tracking Cyber Criminals. Some Trouble. William Stallings. Classes of Hacker (Black hats. UDP Flood. How to Detect Trojans by using – Netstat. Nemesy Blast. Introduction to Network Security. Panther2. Operation. ARIN.) 3. Targa. Objectives. Neal. grey hats. Network. Radia Perlman. E-Mail Spiders. 8. Michael Speciner. Charlie Kaufman. Scanning for vulnerabilities using (Angry IP.Grading System 2013 . Carl Endorf. Springer International Edition 5.Stego Watch. Mike Speciner. Jim Mellander “INTRUSION DETECTION & PREVENSION” TMH 7. Steganos.Stego Detection Tool. “Cryptography & Network Security” TMH 4. IPScanner. Vulnerability). FSMax. Computer Network Security. white hats. Global Network Inventory Scanner. List of Experiments: 1. Footprinting using footprinting tools(Open Source & Free)(ex-nslookup. “Cryptography and Network Security: Principles and Practice” Pearson 2. Google Earth etc. Steganalysis .
Principles used in modeling Static and Dynamic physical models. Representation of Time Delays.Generalization of growth models . Continuous system simulation languages . Spectral Analysis and Autoregressive Processes. program control statements . Continuous Uniformly Distributed Random Numbers.Real Time simulations. Generating Discrete distributions. Simulate congestion control algorithms. Time Series Analysis . Simulate a Manufacturing shop and write a program in GPSS.Hybrid simulation . Analog and Hybrid computers. Succession of events.Disadvantages and pitfalls of Simulation. Simulate Telephone system model and write a program in SIMSCRIPT. 5. concept of simulation. Rejection Method. Normal Distribution Queuing Disciplines. Exponential distribution. Simulate CPU scheduling algorithm using queueing system a) FCFS b) SJF c) Priority Algo 2. Unit-IV Simulation of Queueing Systems and Discrete System Simulation Poisson arrival patterns. Comparision of analytical and Simulation methods. Discrete and Continuous probability functions. Components of a simulation study. Static and Dynamic Mathematical models Introduction to Static and Dynamic System simulation . Generation of a Random numbers. Distributed Lag Models. Batch Means .Grading System 2013 . Names & Labels. Gathering statistics. Estimation methods . Conditional transfers. Systems . Simulation programming tasks. Unit-V Introduction to Simulation languages and Analysis of Simulation output GPSS: Action times. Unit-II System Simulation and Continuous System Simulation Types of System Simulation. Multi segment models . 4. Continuous and Discrete Systems. Simulate multiplexer/concentrator using queuing system 3. Numerical Computation techniques for Continuous and Discrete Models.14 Elective –I (CS 7102 Simulation & Modelling) Unit-I Introduction to Modeling and Simulation Nature of Simulation. Advantages . Monte Carlo Method. logistic curves . Discrete Events . Simulate disk scheduling algorithms. system modeling. Measuring occupancy and Utilization. List of Experiments:1. SIMSCRIPT statements . 6. SIMSCRIPT: Organization of SIMSCRIPT Program. Cobweb Model. DigitalAnalog Simulators. Simulation of single and two server queue. Non-Uniform Continuously Distributed Random Numbers. Regenerative techniques .Generation of arrival patterns. Application of queuing theory in computer system. Models and Simulation. System dynamics diagrams. Service times. Choice of paths. Unit –III System Dynamics & Probability concepts in Simulation Exponential growth and decay models. Relication of Runs. Continuous System models. . Recording Distributions and Transit times .
PHI Harrington. Willey Pub . Prentice Hall.Grading System 2013 . McGraw Hill Severance. Cengage Learning Law . System simulation. Simulation Modeling.Simulation Modeling And Analysis.14 References: Gorden G. “ System Modeling & Simulation. Seila. Simulation Modeling methods.. System Simulation with Digital Computer. McGraw Hill Deo..
Architecture Design. Real Time Embeded System & 7. errors & Failure. Willey Indi . Disassembler / Decompiler.14 Elective –I (CS 7103 Embedded Computer System) Unit – I Introduction to Embedded systems Embedded Systems Vs General Computing Systems. VLSI & Integrated circuit design. Different phases of EDLC . Communication Interface. PCB layout Design and its fabrication . Types of files Generated on Cross.Compilation . TMH 4. Embeded System.Wiley 5. Embedded firmware.Programming in Embedded C . Iterative Model . Embedded OS Trends .Designing with 8051 microcontroller Different addressing modes supported by 8051 . Embeded System. Shibu. Major application areas of Embedded Systems.Objectives of EDLC . Unit – III Embedded Hardware & Firmware Design and Development Analog &Digital Electronic components. Development Language trends Open Standards. Integration and testing of Embedded Hardware and Firmware . Emulators and Debugging. Memory.Grading System 2013 . Unit – V Embedded Product Development Lifecycle(EDLC) and Trends in Embedded Industry What is EDLC . TMH 2. Frameworks and Alliances . References: 1. Reliability. Balbno. Safe & robust Design. Faults. Electronic Design Automation tools . PCB and Passive Components. Bottlenecks. Purpose of Embedded systems .Givargis . Fundamental issues in Hardware Software Co-Design . Peckol. Computational models in Embedded Design . Spiral Model . Instruction set for 8051 microcontroller.Core of the Embedded system. Unit -IV Embedded System Development Environment Integrated Development Environment (IDE) . Boundary Scan. EDLC Approaches-Linear or waterfall model .Embedded Systems :Design and Applications .Embedded firmware design approaches . Characteristics and Quality attributes of a Embedded System . Embedded firmware Development Languages . Functional Design. Siewert. Classification of Embedded Systems. Sensors and Actuators. Embedded Micro Computer System Cengage Learning 6. Rajkamal. Vahid .Embedded System Design . Introduction to Embedded System:. Processor trends in Industry . Unit – II Design of Embedded Systems with 8bit Microcontrollers-8051 Factors for considering in selecting a Controller . Simulators.Pearson Education 3. Prototyping/Evolutionary Model. Barrett . Prototyping.
Fault Prevention. Cengage Learning. Software fault tolerance: Process pairs. Parag K. TMH 3. Tata McGraw Hill . Fault tolerant software: Design-N-version programming recovery block . Real Time System.validation of fault tolerant systems. Real Time System. Redundancy. K.Application: Ultra SAN Unit-V Practical Systems for Fault Tolerance: . 6. Performance Measure for real time system. Recovery blocks. Application: DHCP Unit-III Fault tolerance: Coding technique-fault tolerant self checking and fail safe circuits-fault tolerance in combinatorial and sequential circuits. 2.1989.Agarwala . 5. Data Bases for Hard Real Time System.acceptance tests-fault trees. Pearson Edu. Assertions. dependability and perform ability: dependability-specific methods (fault trees. “Fault Tolerant System design”.Fault Tolerant Scheduling. Siewert. Fault Treatment. REFERENCES :1. Error Detection. IRIX Checkpoints Unit-IV Experimental Evaluation: Modelling and simulation based. Control-flow checking.synchronous and asynchronous fail safe circuits. “Fault Tolerant and Fault Testable. Real Time Communication Unit-II Fault Tolerance. Shem .Application: Ad-hoc wireless network . anticipated and unanticipated Faults.Application: NASA Remote Exploration & Experimentation System Architecture: Fault tolerant computers general purpose commercial systems-fault tolerant multiprocessor and VLSI based communication architecture. Damage Confinement. robust data structures.PHI 1989. “Fault Tolerant computing theory and techniques” volume III. Real Time Embeded System. Task Assignments. queues.K.Pradhan. Fault injection based . Error Recovery. reliability block diagrams). 4. Network fault tolerance: Reliable communication protocols. Data audits. toy Levei . Replica consistency & reintegration. Ashok K. Prentice Hall.Application: NFTAPE fault injector . N version programming. Real Time Vs General purpose Data Bases. consistency and capability checking.Grading System 2013 . Modelling for performance. multithreaded programs Application: VAX. Krishna. Fault-Error-Failure. Rajiv Mall. Lala. Hardware design” PHI 1985. Anderson and Lee. Error control coding. stochastic Petri nets and stochastic activity networks . Heartbeats. 7.14 Elective –I (CS 7104 Real Time Fault Tolerant Systems) Unit-I Structure of Real Time System. Error models: General coding scheme Error detection techniques: Watchdog processors. “Fault Tolerant principles and practice” . Agreement protocols. Database commit protocols -Application: Distributed SQL server Check pointing & Recovery Application: Micro check pointing.
following components are considered with their weightage. Industrial training of the students is essential to bridge the wide gap between the classroom and industrial environment. Assessment of training by Industrial Supervisor 20 -----------------------------------------------------------------------------------------------------------TOTAL 50 -----------------------------------------------------------------------------------------------------------(b) Practical/Oral Examination (Viva-Voce) In Institution Marks allotted 1./Faculty of the institute. The student should take this course as a window to the real World of Work and should try to learn as much as possible from real life experiences by involving and interacting with industry staff. After training they will prepare final draft with the help of T.P. SCHEME OF EXAMINATION For the assessment of industrial training undertaken by the students. Initiative and participative attitude during training 10 4.Industrial Training SCHEME OF STUDIES Duration: 6 weeks after the VI semester in the summer break. . This will enrich their practical learning and they will be better equipped to integrate the practical experiences with the classroom learning process. During training students will prepare a first draft of training report in consultation with section in-charge. Then they will present a seminar on their training and they will face viva-voce on training in the institute.Grading System 2013 .14 CS 705. in consultations with the Training and Placement Officer/Faculty of Institute and I/c of training from Industry.1 OBJECTIVE OF INDUSTRIAL TRAINING The objective of undertaking industrial training is to provide work experience so that student’s engineering knowledge is enhanced and employment prospects are improved. Industrial training also provides an opportunity to students to select an engineering problem and possibly an industry guide for their Major Project in final semester. 1. Daily diary Maintenance 10 3. Assessment in VII semester. Attendance and General Discipline 10 2. Training Report 25 2. Seminar and cross questioning (defense) 25 -----------------------------------------------------------------------------------------------------------TOTAL 50 -----------------------------------------------------------------------------------------------------------Marks of various components in industry should be awarded to the students. (a) Term work In Industry Marks allotted 1.O.
. Solving problems at the work place.) 4.their working and specifications. monitoring and control. Presenting a seminar. . keeping in view the need of the contents. which is spread to 6 weeks’ duration. Undertaking a short action research work. 2) authorities of the work place and 3) supervising faculty members. Students are supposed to acquire the knowledge on above by 1. . Consulting current technical journals and periodicals in the library. 11. . retrieval and analysis of the gathered data. Gathering primary and secondary data/ information through various sources.Product development procedures and phases.Quality control and assurance. Study of Literature at the workplace (e.Maintenance system. standards.Roles and responsibilities of different categories of personnel. .Industrial environment and work culture.2 LEARNING THROUGH INDUSTRIAL TRAINING During industrial training students must observe following to enrich their learning: . 13. . 9. Storage. . 10. . 7. .Organisational structure and inter personal communication. Discussing and preparing students for the training for which meetings with the students has to be planned.g. 6.Problems related to various areas of Work etc. Interaction with officials at the workplace 3. . . User Manual. Faculty and TPO are supposed to plan industrial training in such a manner that students get exposure on most of the above arena in the field (world of work). .Customer services.2 GUIDANCE TO THE FACULTY/TPO FOR PLANNING AND IMPLEMENTING THE INDUSTRIAL TRAINING The industrial training programme. Following are some of the salient points: Spelling out the objectives of the industrial training in behavioral terms and same is informed in advance to the 1) students. 12. Undertaking / assisting project work. etc. Assisting officials and managers in their working. 2. "Hand's on" experience 5.Machines/ equipment/ instruments . .Stores and purchase systems.14 1. Observation. Discussions with peers. 1.Project planning.Grading System 2013 .Costing system. 8. has to be designed in consultation with the authorities of the work place.Layout of Computer/ EDP/MIS centres. Participating in-group meeting/ discussion. maintenance schedules.
writing weekly reports. Finalization of Training report 11. how to gather information from the workplace. how to interact with various categories of industrial personnel.No.Grading System 2013 . Scrutinizing individual training plan of students 7.4 ACTION PLAN FOR PLANNING STAGES AT THE INSTITUTION LEVEL -----------------------------------------------------------------------------------------------------------S. Guiding students to make individual plans (week wise/ day wise) to undertake industrial training Developing a system of maintaining training records. First monitoring of industrial training 9. Inviting industrial personnel to deliver lectures on some aspects of training. 1. Correspondence with the authorities of the work place. Commencement of industrial training 8. Meeting with Principal 2. by teachers for every batch of students for convenient retrieval. ethics etc. Meeting with Colleagues 3. how to behave and undertake responsibilities. Activity Commencing Week Finishing week Remarks -----------------------------------------------------------------------------------------------------------1. Evaluation of performance at Industry level 12. Orientation classes for students on how to make the training most beneficial monitoring daily diary. Second monitoring of industrial training 10. Correspondence with work place (Industries concerned) 4. Orientation of students for industrial training 6. Evaluation of industrial programme in the institution .14 Meeting with industrial personnel and orienting them regarding the objective of the training and the expectations of the programme. Meeting with authorities of work place 5.
This action might not be possible to undo. Are you sure you want to continue?