This action might not be possible to undo. Are you sure you want to continue?
CS-701 – Compiler Design
Unit-I Introduction to compiling & Lexical Analysis Introduction of Compiler, Major data Structure in compiler, BOOT Strapping & Porting, Compiler structure: analysis-synthesis model of compilation, various phases of a compiler, Lexical analysis: Input buffering , Specification & Recognition of Tokens, LEX. Unit-II Syntax Analysis &Syntax Directed Translation Syntax analysis: CFGs, Top down parsing, Brute force approach, recursive descent parsing, transformation on the grammars, predictive parsing, bottom up parsing, operator precedence parsing, LR parsers (SLR,LALR, LR),Parser generation.Syntax directed definitions: Construction of Syntax trees, Bottom up evaluation of S-attributed definition, L-attribute definition, Top down translation, Bottom Up evaluation of inherited attributes Recursive Evaluation, Analysis of Syntax directed definition. Unit-III Type Checking & Run Time Environment Type checking: type system, specification of simple type checker, equivalence of expression, types, type conversion, overloading of functions and operations, polymorphic functions. Run time Environment: storage organization, Storage allocation strategies, parameter passing, dynamic storage allocation , Symbol table Unit –IV Code Generation Intermediate code generation: Declarations, Assignment statements, Boolean expressions, Case statements, Back patching, Procedure calls Code Generation: Issues in the design of code generator, Basic block and flow graphs, Register allocation and assignment, DAG representation of basic blocks, peephole optimization, generating code from DAG. Unit –V Code Optimization Introduction to Code optimization: sources of optimization of basic blocks, loops in flow graphs, dead code elimination, loop optimization, Introduction to global data flow analysis, Code Improving transformations ,Data flow analysis of structure flow graph Symbolic debugging of optimized code. List of Experiments: Develop a lexical analyzer to recognize a few patterns. Write a programme to parse using Brute force technique of Topdown parsing. Develop LL (1) parser (Construct parse table also). Develop an operator precedence parser (Construct parse table also) Develop a recursive descent parser Write a program for generating for various intermediate code forms i) Three address code ii) Polish notation Write a program to simulate Heap storage allocation strategy Generate Lexical analyzer using LEX Generate YACC specification for a few syntactic categories. Given any intermediate code form implement code optimization techniques Study of an Object Oriented Compiler.
and J. Compiler Construction: Principles and Practice. Prentice-Hall Inc. 1993. D. V.. Willey Pub. 5. TMH Pub. Ullman. 3.14 References: 1. Pearson Education 2 Raghavan. Aho. A. . Holub. Cengage Learning 4. Sethi. Mak. R. Compilers: Principles. C. Techniques and Tools . Compiler Design. A. Louden.Grading System 2013 . writing compiler & Interpreters. Compiler Design in C .
Naming: . File Service Architecture. File Accessing Model. Unit-IV Distributed Scheduling And Deadlock Distributed Scheduling-Issues in Load Distributing. Distributed Computing. Consistency Model. Hardware and Software concepts. Advance Concept in Operating System. Design & Implementations issues In DSM System. RPC. McGraw Hill Attiya & Welch. Desirable features of good Distributed File System. Deadlock-Issues in deadlock detection & Resolutions. Advantages & Disadvantage distributed system. Task Migration and its issues. Goals of Distributed system. Distributed Operating System Concept & Design. Client Server Communication.Implementing RPC Mechanism. Components for Load Distributing Algorithms. Distributed System Concepts and Design. . Unit-II Distributed Share Memory And Distributed File System Basic Concept of Distributed Share Memory (DSM). File Sharing Semantics. Mutual Exclusion. RPC Messages. System Oriented Names.Characteristics of multimedia Data. Issues in designing Distributed System.Clock Synchronization.Features. Human Oriented Name. Quality of Service Managements. Distributed Deadlock Algorithms. PHI Coulouris & Dollimore. Pearson Pub Singhal & Shivratari. Unit-V Distributed Multimedia & Database system Distributed Data Base Management System(DDBMS). Deadlock Handling Strategy. File Catching Scheme. Synchronization: . File Model. Mach. Distributed Multimedia:. File Application & Fault tolerance. Stub Generation. Data Representation & Marshaling. Unit-III Inter Process Communication And Synchronization API for Internet Protocol.14 CS-702 – Distributed System Unit-I Introduction to distributed systems Architecture for Distributed System.Grading System 2013 . DSM Architecture & its Types.Amoeba. Different Types of Load Distributing Algorithms. Chorus References: Sinha. Object Locating Mechanism. Group Communication. Wiley Pub. Case Study of Distributed System:. and Thrashing. Distributed Computing Model. Election Algorithms:Bully & Ring Algorithms. Structure of Share Memory Space. Types of Distributed Database.
Infrastructure Requirements . Secure Cloud Software Requirements. Third Party Cloud Services . Virtualization: Fundamental concepts of compute . Cloud Business Process Management. Unit-V Market Based Management of Clouds . Unit-IV Cloud Security: Cloud Information security fundamentals. Aneka List of Experiments: 1. 6. Using existing cloud characteristics & Service models . Cloud Offerings: Cloud Analytics. Service deployment & Usage over cloud. Cloud Computing Security Challenges.Overview of cloud applications: ECG Analysis in the cloud. Case study : Google App Engine. Installation and configuration of Hadoop/Euceliptus etc.Cloud Federation Stack .storage. Virtual Desktop Infrastructure.Conceps of Map reduce . 3. Virtualization security Management.Vision of Cloud Computing.Social networking . Scalability and Fault Tolerance. Unit-II Cloud Computing Architecture: Cloud Reference Model. networking. Microsoft Azure . Block and file level storage virtualization Hypervisor management software. Provisioning. Federated Clouds/Inter Cloud: Characterization & Definition . Performance evaluation of services over cloud . Types of Clouds. Characteristics of cloud computing as per NIST . Cloud Governance. Amazon . desktop and application virtualization .Grading System 2013 . Cloud Solutions: Cloud Ecosystem. Gene Expression Data Analysis . 2. High Availability and Disaster Recovery. Cloud Computing Secutity Architecture . 5. Asset management. Hadoop .CRM and ERP . Testing Under Control. Virtual LAN(VLAN) and Virtual SAN(VSAN) and their benefits . Cloud security services. Cloud Service Management. Cloud services requirements.Virtualization benefits. Design principles. Cloud Adoption and rudiments . Management of cloud resources.Satellite Image Processing . 4. Cloud computing reference model .14 CS-703 – Cloud Computing Unit-I Introduction: Historical development . Protein structure prediction.Cloud computing environments. . Unit –III Cloud Management & Virtualization Technology: Resiliency. Cloud Interoperability & Standards. Policy Implementation. Cloud Security Management. Cloud and dynamic infrastructure. server virtualization.
A Practical Approach” . Wiley Pub . Buyya. “Cloud Computing. Krutz . Velte. Sosinsky. “ Cloud Computing” . Wiley Pub 3.Grading System 2013 . “Cloud Computing” . “Cloud Security “ . Kumar Saurabh. Vines.” Mastering Cloud Computing “.TMH Pub 2.TMH Pub 5. Selvi .14 Recommended Text: 1. Wiley Pub 4.
and Protecting Digital Information. security and limitations of DAS.14 CS-704 – Information Storage & Management Unit-I Introduction to Storage Technology: Data proliferation. References: 1. NAS. SMI-S. Backup & Disaster Recovery: Principles Managing & Monitoring: Industry management standards (SNMP. Cloud Computing : Principles. Unit-II Storage Systems Architecture: Intelligent disk subsystems overview. and specifications. Essential characteristics of cloud computing. Rainer Wolafka. Nils Haustein. Information Lifecycle Management. Wiley India. Contrast of integrated vs. Cloud Computing. Unit-V Information storage on cloud :Concept of Cloud. Anthony T. Somasundaram & Alok Shrivastava (EMC Education Services) editors. Cloud Security and integration. Nick Antonopoulos. standards. CAS & SAN. and Robert Eltenpeter. Lee Gillam. Toby J. Velete. standard framework applications. Applications & services on cloud. modular arrays. security. 2. server. Architectural Framework. performance. connectivity. Rainer Erkens. Cloud Computing : Implementation . Wiley India. performance). Disk physical structure components. Wolfgang Mueller-Friedt. storage & appliances. availability. storage on Cloud. Front end to host storage provisioning. Data center concepts & requirements. G. network. Unit-III Introduction to Networked Storage: JBOD. Information Storage and Management: Storing. Cloud computing Evolution. Cloud benefits. TMH Pub. INFINIBAND and FCOE. Cloud Computing : Insight into New Era I . NAS.Grading System 2013 . management. iSESI. 5. CIM). Virtualization: Memory. Elements. Taylor Frances Pub. Springer. CRC Press. hot sparing. System & Application. 4. Key management metrics (Thresholds. Applications. John W. Cloud Vocabulary. Overview of storage infrastructure components. properties. Cloud service providers and Models. Unit -IV Hybrid Storage solutions. Data categorization. Rittinghouse and James F. 3. Storage Network explained : Basic and application of fiber channels. DAS. capacity.Velk. Managing. Ulf Troppens. evolution of various storage technologies. Management and Security. Saurabh . Component architecture of intelligent disk subsystems. 6. mapping and operation. RAID levels & parity algorithms. NAS. SAN. Cloud Computing : A practical Approach. Ransome. SAN & CAS evolution and comparision.
Sniffing. Misconfiguration attacks etc. spoofing. Data Encryption Standard (DES). Security Software Disablers). DiffieHellman key exchange. Intrusion Detection Tools . Spoofing v Hijacking. RC5. Infection Phase. Content-Injection Phishing. Teardrop Attack. SSH (Secure Shell). Cryptography Attacks. Authentication Requirements. SYN Attack. Phishing: Methods. elliptic curve cryptography. Public key cryptography. SQL Injection and other vulnerabilities Denial-of Service Attacks: Types of Attacks (Smurf Attack. Web Application Security. application level. RC6. Proxy Trojans. Buffer Overflow Attack. URL Obfuscation Attacks. Malware-Based Phishing. ECDSA. Applications. File System Indications Network Indications. Vulnerable Protocols. One-way Hash Functions. Algorithm: Signature Generation/Verification.Message Digest Functions. Kerberos. DDoS Attack(Distributed DoS Attack. Use of Cryptography. Viruses and Worms: Characteristics. Introduction to Intrusion. Authentication Functions. Working. Cryptographic Algorithms RSA. TCP/IP hijacking. Types of Penetration Testing. Disk Encryption.Indication of Intrusion: System Indications.Post attack IDS Measures & Evading IDS Systems. Standard. Types.). Risk Management. DNSBased Phishing. Trojans. Types of attacks (Operating System. Government Access to Keys (GAK) Digital Signature: Analysis. Data-Sending Trojans. Security Terminologies and Principle. CAPTCHA Protection . Deceptive Phishing. Penetration Testing. Cross-site Scripting. Destructive Trojans. Categories of security assessments. Ping of Death Attack.). Client-side Vulnerabilities. secured session management. Digital Certificates. EIgamal Signature Scheme. UNIT IV Trojans and Backdoors: Overt and Covert Channels. Code Breaking: Methodologies. SYN Flooding). Security Threats. Attacks Types (Man-in-the-Middle Attacks. Types of Intrusion Detection Systems. FTP Trojans. Components. Principles of Public key Cryptosystems. UNIT II Cryptography. Session Hijacking. Method. Cryptanalysis. Computer Securit y and Cyber Security. Algorithms and Security. Hidden Attacks. Brute-Force Attack.Grading System 2013 .Secured authentication mechanism. Encryption. Process. Search Engine Phishing). MD5. Intrusion Detection System (IDS).14 Elective –I (CS 7101 Network & Web Security) UNIT I Introduction to Network Security. Working. SSL (Secure Sockets Layer). Attack Phase. UNIT III Hash Functions. Shrink Wrap code. Vulnerability Assessment. Types (Remote Access Trojans. Decryption. Blowfish. SHA (Secure Hash Algorithm). Message Authentication codes . Classical Cryptographic Techniques. System Integrity Verifiers (SIVS). Sniffers: Definition. Key Management. Terminologies. RC4.
Steganography using tools: Tool: Merge Streams. Footprinting. Scanning for vulnerabilities using (Angry IP. Neal. Hacking. Radia Perlman. FSMax. Classes of Hacker (Black hats. Global Network Inventory Scanner.”Cryptography and Network Security” Mc Graw Hill 6. List of Experiments: 1. Scanning (Types-Port. Mike Speciner. Panther2. Jim Mellander “INTRUSION DETECTION & PREVENSION” TMH 7. “Cryptography and Network Security: Principles and Practice” Pearson 2. Suggested Reading: 1. Targa. Lan Scanner using look@LAN. wireshark. Some Trouble. Introduction to Network Security. “Cryptography & Network Security” TMH 4. TCPView.Stego Detection Tool.Grading System 2013 . Design Principles. 6. HPing2.) 3. STools. Whois. 4. Footprinting using footprinting tools(Open Source & Free)(ex-nslookup. Eugene Schultz. Image Hide. Web Security. Bubonic. NetBIOS Enumeration Using NetView Tool. 8. white hats.Cengage Learning . E-Mail Spiders. Michael Speciner. “ Network Security Private communication in a public world” TMH 3. IPScanner. Atul Kahate.14 UNIT V IP Security. Nbtstat Enumeration Tool (Open Source). Objectives. suicide hackers). Computer Network Security. Process Viewer. Firewalls: Types. William Stallings. Stealth Files. UDP Flood. Crazy Pinger.) 2. . Overview of System Hacking Cycle. Vulnerability).Stego Watch. Carl Endorf. Steganos. Krawetz. Springer International Edition 5. Understanding DoS Attack Tools. Trusted Systems. Stegdetect. How to Detect Trojans by using – Netstat. grey hats. Need. Pretty Good Envelop. Steganalysis . 5. Operation. Net Tools Suite Pack. Blindside. Charlie Kaufman. CurrPorts Tool. ARIN. Joseph Migga Kizza. Network. Incident Handling.. 7.Jolt2 .c. Google Earth etc. Land and LaTierra. Steghide.. StegSpy.Stages & Steps of Forensic Investigation in Tracking Cyber Criminals. fPort. Nemesy Blast. Fourozon. Computer Forensics.
Grading System 2013 . System dynamics diagrams. system modeling.14 Elective –I (CS 7102 Simulation & Modelling) Unit-I Introduction to Modeling and Simulation Nature of Simulation. Simulation programming tasks. Application of queuing theory in computer system. Principles used in modeling Static and Dynamic physical models. 6. Generation of a Random numbers. Representation of Time Delays. List of Experiments:1. Estimation methods . 5.Generalization of growth models . Batch Means . SIMSCRIPT statements . Succession of events. Advantages . Choice of paths. Simulation of single and two server queue. Analog and Hybrid computers. Continuous Uniformly Distributed Random Numbers. Simulate Telephone system model and write a program in SIMSCRIPT. Unit –III System Dynamics & Probability concepts in Simulation Exponential growth and decay models. Distributed Lag Models. Simulate multiplexer/concentrator using queuing system 3. Continuous system simulation languages . Unit-V Introduction to Simulation languages and Analysis of Simulation output GPSS: Action times. Simulate a Manufacturing shop and write a program in GPSS. Numerical Computation techniques for Continuous and Discrete Models. DigitalAnalog Simulators. Time Series Analysis . Names & Labels. Service times. Gathering statistics. Relication of Runs. Static and Dynamic Mathematical models Introduction to Static and Dynamic System simulation . Regenerative techniques . concept of simulation. SIMSCRIPT: Organization of SIMSCRIPT Program. Simulate CPU scheduling algorithm using queueing system a) FCFS b) SJF c) Priority Algo 2. Recording Distributions and Transit times . Comparision of analytical and Simulation methods.Disadvantages and pitfalls of Simulation. Unit-IV Simulation of Queueing Systems and Discrete System Simulation Poisson arrival patterns. Unit-II System Simulation and Continuous System Simulation Types of System Simulation.Generation of arrival patterns.Hybrid simulation . Non-Uniform Continuously Distributed Random Numbers. Monte Carlo Method. Systems . Simulate congestion control algorithms. Generating Discrete distributions. logistic curves . Models and Simulation. Rejection Method. Conditional transfers. Simulate disk scheduling algorithms. Cobweb Model. Discrete Events .Real Time simulations. Multi segment models . Components of a simulation study. Measuring occupancy and Utilization. Discrete and Continuous probability functions. Continuous System models. Continuous and Discrete Systems. Normal Distribution Queuing Disciplines. 4. Exponential distribution. Spectral Analysis and Autoregressive Processes. program control statements . .
System Simulation with Digital Computer. McGraw Hill Severance.Simulation Modeling And Analysis. System simulation. Willey Pub . Simulation Modeling.. Simulation Modeling methods.Grading System 2013 .. Seila. McGraw Hill Deo. PHI Harrington.14 References: Gorden G. Cengage Learning Law . “ System Modeling & Simulation. Prentice Hall.
Iterative Model . Functional Design. Integration and testing of Embedded Hardware and Firmware .Wiley 5. Computational models in Embedded Design . Electronic Design Automation tools . Willey Indi . PCB and Passive Components. Purpose of Embedded systems . Boundary Scan. errors & Failure.Givargis . Safe & robust Design. Disassembler / Decompiler. Embedded firmware. Major application areas of Embedded Systems. Embeded System. Processor trends in Industry . Bottlenecks. Peckol. Unit – III Embedded Hardware & Firmware Design and Development Analog &Digital Electronic components.Designing with 8051 microcontroller Different addressing modes supported by 8051 . TMH 4. Shibu. Frameworks and Alliances . Embedded firmware Development Languages . PCB layout Design and its fabrication . Unit – V Embedded Product Development Lifecycle(EDLC) and Trends in Embedded Industry What is EDLC .Core of the Embedded system. Memory. Types of files Generated on Cross.Embedded firmware design approaches . Classification of Embedded Systems.Pearson Education 3. Sensors and Actuators. Fundamental issues in Hardware Software Co-Design . Characteristics and Quality attributes of a Embedded System . Unit – II Design of Embedded Systems with 8bit Microcontrollers-8051 Factors for considering in selecting a Controller . Embedded OS Trends . Vahid . Real Time Embeded System & 7. Prototyping/Evolutionary Model. VLSI & Integrated circuit design.14 Elective –I (CS 7103 Embedded Computer System) Unit – I Introduction to Embedded systems Embedded Systems Vs General Computing Systems. Simulators. EDLC Approaches-Linear or waterfall model . Unit -IV Embedded System Development Environment Integrated Development Environment (IDE) . Embedded Micro Computer System Cengage Learning 6. Prototyping. Rajkamal.Embedded Systems :Design and Applications . Communication Interface. Instruction set for 8051 microcontroller. TMH 2.Programming in Embedded C . Emulators and Debugging. Spiral Model .Grading System 2013 . Balbno.Compilation .Embedded System Design . Introduction to Embedded System:. Reliability. Faults. Siewert. References: 1. Different phases of EDLC . Development Language trends Open Standards. Architecture Design. Barrett .Objectives of EDLC . Embeded System.
Pradhan.14 Elective –I (CS 7104 Real Time Fault Tolerant Systems) Unit-I Structure of Real Time System. Error Detection. Prentice Hall. Hardware design” PHI 1985. Recovery blocks.validation of fault tolerant systems. Task Assignments. TMH 3. Real Time Communication Unit-II Fault Tolerance. Pearson Edu. REFERENCES :1. Parag K. Data audits. multithreaded programs Application: VAX. Error Recovery. Tata McGraw Hill .Grading System 2013 . Fault injection based .PHI 1989. Heartbeats. Network fault tolerance: Reliable communication protocols. robust data structures.synchronous and asynchronous fail safe circuits. Error models: General coding scheme Error detection techniques: Watchdog processors.Application: Ad-hoc wireless network .K. Data Bases for Hard Real Time System. Control-flow checking. Modelling for performance. Fault tolerant software: Design-N-version programming recovery block . 2. Damage Confinement. Lala. Ashok K. 7. Real Time System.Fault Tolerant Scheduling. N version programming. Software fault tolerance: Process pairs. Error control coding. Shem . Assertions. Redundancy. Siewert. Fault Prevention.acceptance tests-fault trees. Fault Treatment. Performance Measure for real time system. K. Cengage Learning.1989.Application: NASA Remote Exploration & Experimentation System Architecture: Fault tolerant computers general purpose commercial systems-fault tolerant multiprocessor and VLSI based communication architecture. Fault-Error-Failure. queues. “Fault Tolerant computing theory and techniques” volume III. reliability block diagrams). 4.Application: Ultra SAN Unit-V Practical Systems for Fault Tolerance: . 5. Application: DHCP Unit-III Fault tolerance: Coding technique-fault tolerant self checking and fail safe circuits-fault tolerance in combinatorial and sequential circuits. Anderson and Lee. dependability and perform ability: dependability-specific methods (fault trees. Agreement protocols. consistency and capability checking. stochastic Petri nets and stochastic activity networks . “Fault Tolerant and Fault Testable. Replica consistency & reintegration.Agarwala . anticipated and unanticipated Faults.Application: NFTAPE fault injector . Real Time Vs General purpose Data Bases. Rajiv Mall. “Fault Tolerant principles and practice” . IRIX Checkpoints Unit-IV Experimental Evaluation: Modelling and simulation based. “Fault Tolerant System design”. Krishna. 6. Real Time Embeded System. Database commit protocols -Application: Distributed SQL server Check pointing & Recovery Application: Micro check pointing. toy Levei . Real Time System.
Training Report 25 2. Initiative and participative attitude during training 10 4. (a) Term work In Industry Marks allotted 1. SCHEME OF EXAMINATION For the assessment of industrial training undertaken by the students.P. 1. Seminar and cross questioning (defense) 25 -----------------------------------------------------------------------------------------------------------TOTAL 50 -----------------------------------------------------------------------------------------------------------Marks of various components in industry should be awarded to the students. following components are considered with their weightage.14 CS 705. in consultations with the Training and Placement Officer/Faculty of Institute and I/c of training from Industry.Industrial Training SCHEME OF STUDIES Duration: 6 weeks after the VI semester in the summer break. During training students will prepare a first draft of training report in consultation with section in-charge.1 OBJECTIVE OF INDUSTRIAL TRAINING The objective of undertaking industrial training is to provide work experience so that student’s engineering knowledge is enhanced and employment prospects are improved./Faculty of the institute. . Industrial training of the students is essential to bridge the wide gap between the classroom and industrial environment. Daily diary Maintenance 10 3. Then they will present a seminar on their training and they will face viva-voce on training in the institute. Industrial training also provides an opportunity to students to select an engineering problem and possibly an industry guide for their Major Project in final semester. This will enrich their practical learning and they will be better equipped to integrate the practical experiences with the classroom learning process. Attendance and General Discipline 10 2. Assessment of training by Industrial Supervisor 20 -----------------------------------------------------------------------------------------------------------TOTAL 50 -----------------------------------------------------------------------------------------------------------(b) Practical/Oral Examination (Viva-Voce) In Institution Marks allotted 1. Assessment in VII semester.Grading System 2013 . The student should take this course as a window to the real World of Work and should try to learn as much as possible from real life experiences by involving and interacting with industry staff.O. After training they will prepare final draft with the help of T.
. . Observation. 7. Faculty and TPO are supposed to plan industrial training in such a manner that students get exposure on most of the above arena in the field (world of work).Project planning. Consulting current technical journals and periodicals in the library. has to be designed in consultation with the authorities of the work place. Gathering primary and secondary data/ information through various sources.Roles and responsibilities of different categories of personnel.Machines/ equipment/ instruments . . Undertaking / assisting project work. Solving problems at the work place.Quality control and assurance.2 LEARNING THROUGH INDUSTRIAL TRAINING During industrial training students must observe following to enrich their learning: .Maintenance system.2 GUIDANCE TO THE FACULTY/TPO FOR PLANNING AND IMPLEMENTING THE INDUSTRIAL TRAINING The industrial training programme. Presenting a seminar. .) 4.g. keeping in view the need of the contents.Product development procedures and phases. maintenance schedules.Customer services. which is spread to 6 weeks’ duration. Participating in-group meeting/ discussion. Interaction with officials at the workplace 3. etc. Undertaking a short action research work. . . 2. Assisting officials and managers in their working. Study of Literature at the workplace (e.Industrial environment and work culture. 13. .Costing system. 9. .14 1.Organisational structure and inter personal communication. 1. 12. standards. Discussions with peers. Storage. retrieval and analysis of the gathered data.Stores and purchase systems. monitoring and control. Students are supposed to acquire the knowledge on above by 1. 8.their working and specifications. .Problems related to various areas of Work etc. .Layout of Computer/ EDP/MIS centres. . . 6. Discussing and preparing students for the training for which meetings with the students has to be planned. 10.Grading System 2013 . "Hand's on" experience 5. 11. 2) authorities of the work place and 3) supervising faculty members. Following are some of the salient points: Spelling out the objectives of the industrial training in behavioral terms and same is informed in advance to the 1) students. User Manual. .
how to behave and undertake responsibilities. Guiding students to make individual plans (week wise/ day wise) to undertake industrial training Developing a system of maintaining training records. Second monitoring of industrial training 10. Finalization of Training report 11. how to interact with various categories of industrial personnel. Evaluation of performance at Industry level 12. Evaluation of industrial programme in the institution . Inviting industrial personnel to deliver lectures on some aspects of training. Orientation classes for students on how to make the training most beneficial monitoring daily diary. First monitoring of industrial training 9.No. Correspondence with work place (Industries concerned) 4. by teachers for every batch of students for convenient retrieval. Meeting with authorities of work place 5. Scrutinizing individual training plan of students 7. 1.Grading System 2013 .14 Meeting with industrial personnel and orienting them regarding the objective of the training and the expectations of the programme.4 ACTION PLAN FOR PLANNING STAGES AT THE INSTITUTION LEVEL -----------------------------------------------------------------------------------------------------------S. Orientation of students for industrial training 6. writing weekly reports. how to gather information from the workplace. Correspondence with the authorities of the work place. ethics etc. Meeting with Principal 2. Commencement of industrial training 8. Meeting with Colleagues 3. Activity Commencing Week Finishing week Remarks -----------------------------------------------------------------------------------------------------------1.
This action might not be possible to undo. Are you sure you want to continue?