Professional Documents
Culture Documents
B. TECH
1|Page
PROGRAMME SCHEME
SCHOOL OF COMPUTING & IT
Fourth Semester
End
Term
Course
Course Name L T P C Exam. Relative weightage (%)
Code
Durati
on
CW PR MT ET PR
Th P
S S E E E
*HS1401 Economics 3 0 0 3 3 30 - 30 40 -
MA1406 Engineering Mathematics-IV 3 0 0 3 3 30 - 30 40 -
2|Page
ABBREVIATIONS
L Lecture
T Tutorial
P Practical
C Number of Credits
3|Page
Fifth Semester
End
Term
Course Code Course Name L T P C Relative weightage (%)
Exam.
Duration
Th P CWS PRS MTE ETE PRE
CS1501 Design & Analysis of Algorithms 3 1 0 4 3 30 - 30 40 -
CC1501 Cryptography and Security 3 1 0 4 3 30 - 30 40 -
Total 18 4 4 24
4|Page
Sixth Semester
End Term
Course Code Course Name L T P C Exam. Relative weightage (%)
Duration
Th P CWS PRS MTE ETE PRE
MB15XX Management 3 0 0 3 3 30 - 30 40 -
5|Page
Seventh Semester
End Term
Course Code Course Name L T P C Exam. Relative weightage (%)
Duration
Th P CWS PRS MTE ETE PRE
CC1701 Network Security 3 1 0 4 3 30 - 30 40
CC1702 Machine Learning 3 1 0 4 3 30 - 30 40 -
CC17xx Program Elective- III 3 0 0 3 3 30 - 30 40 -
CC17xx Program Elective- IV 3 0 0 3 3 30 - 30 40
CC17xx Program Elective- V 3 0 0 3 3 30 - 30 40
--- Open Elective-IV 3 0 0 3 3 30 - 30 40 -
CC1730 Network Security Lab 0 0 2 1 2 70 30
CC1731 Machine Learning Lab 0 0 2 1 2 70 30
Total 18 2 4 22
Eighth Semester
End Term
Course Code Course Name L T P C Exam. Relative weightage (%)
Duration
Th P CWS PRS MTE ETE PRE
CC1881 Major Project - - - 12 12 30 40 30 -
Total - - - 12
ABBREVIATIONS
L Lecture
T Tutorial
P Practical
C Number of Credits
CWS Class Work Sessional
MTE Mid-Term Exam
PRE End Term Practical Exam
PRS Practical Sessional
ETE End Term Exam
6|Page
Course Code Program Electives-III
CC1751 Compiler Design
CC1752 Networks on Chip
CS1757 Advanced Data Structure
IT1753 Mobile Computing
CS1756 Advanced Computer Networks
Course Code Program Electives-IV
CC1753 Principles of Web Services
CC1754 Software Testing
IT1760 Natural Language Processing
IT1759 Social Network Analysis
CS1758 Real Time System
Course Code Program Electives-V
CC1755 Wireless Sensors and Adhoc Networks
CC1756 Human Computer Interaction
IT1762 Semantic Web
CS1759 Information Retrieval
CS1760 Principles of Distributed Computing
Course Code Open Electives-IV
CC1791 Introduction to IoT
7|Page
Syllabus
III SEMESTER
Values: Meaning of value education, Three Gunas and their relevance, Nature and kinds
of value, Understanding Harmony at various Levels: Nature, in existence; Ethics and
Business: Values and attitudes for professional accountants, Legal frameworks,
regulations and standards for business, Nature of ethics and its relevance; Rules-based and
framework approaches to ethics; Personal development and lifelong learning; Personal
qualities; Ethical principles; Concepts of independence, skepticism, accountability and
social responsibility; Ethical Conflict: Relationship between ethics, governance, the law
and social responsibility, Unethical behaviour, Ethical dilemmas and conflicts of interest;
Corporate Governance: The role and key objectives of organizattional governance in
relation to ethics and the law; development of organizattional governance internationally;
the role of directors in relation to corporate governance; the role of the board, Types of
board structures and corporate governance issues, Policies and procedures for ‘best
practice’ companies, Rules and principles based approaches to corporate governance
Text / Reference Books:
1. Gaur R.R., Sangal R. and. Bagaria, G.P: ”A Foundation Course in Human Values
Professional Ethics,” Excel Books, 2010.
2. Sadri S & Sadri, J Business Excellence Through Ethics & Governance, 2nd edition,
2015.
3. Mathur, U C Corporate Governance and business ethics, MacMillan India Ltd, 2009.
4. Baxi, C V: Corporate Governance, Excel Books, 2009
5. Sadri S, Sinha A K and Bonnerjee, P: Business Ethics: concepts and cases, TMH,
1998.
8|Page
MA1307 Engineering Mathematics III [3 0 0 3]
Sets, relations and functions: Sets and set operations, functions, binary relations, partial ordering
relations and Hasse diagram, equivalence relations. Principle of mathematical induction. Basic
counting techniques: pigeon-hole principle, inclusion and exclusion principle, permutations and
combinations. Discrete numeric functions, recurrence relations and generating function.
Propositional Calculus: propositions and logical operations, conditional statements, logical
equivalence of statements, tautology and contradiction, Predicates and Quantifiers, rules of
inference. Algebraic structures: Semi-group, monoid, group, cyclic group, permutation group,
Boolean algebra. Introduction to graph theory: Graphs and graph models, graph terminology
and types of graphs, Handshaking theorem, regular graph, complete graph, bipartite graph, graph
isomorphism, subgraphs, walk, path, cycle, Eulerian graph.
Text Books:
1. K. H. Rosen, “Discrete Mathematics and its applications”, Seventh Edition, McGraw Hill,
2014.
2. N. Deo, “Graph Theory with applications to engineering and Computer Science”, PHI,
2004.
Reference Books:
1. R. Diestel, “Graph Theory”, Springer International Edition, 2005.
2. B. Kolman, R. C. Busby, S. C. Ross, “Discrete Mathematical Structures”, Pearson
Education, 2004.
3. J.P. Tremblay, R. Manohar, “Discrete Mathematical Structures with Applications to
Computer Science”, Tata McGraw-Hill, 2006.
9|Page
CS1301 COMPUTER ORGANIZATION AND ARCHITECTURE [3 1 0 4]
Basic Structure of computers: Computer types, functional units, basic operational concepts, bus
structures, software, performance; Machine Instructions and programs: Numbers, arithmetic
operations and characters, Memory locations and addresses; Memory operations, Addressing
modes; Arithmetic: Addition and subtraction of signed numbers, Adders, ALU design, Bit slice
processor, Multiplication of positive numbers Signed operand multiplication, Fast multiplication,
Integer division, Floating point numbers and operations; Memory Systems: Introduction, Basic
concepts, Design methods; RAM memories, Read only memories, Speed size and cost, Cache
memories, Performance considerations, Virtual memories, Memory, Management Requirements,
Secondary storage; Input / Output organization: Accessing I/O devices, Interrupts, Direct
memory access, Buses, Interface circuits; Introduction to Parallel Processing: Flynn
Classification, Multi-Core Architecture, Pipelining.
Text Books:
1. C. Hamacher, Z. Vranesic, “Computer Organization”, Tata McGraw Hill (TMH), 5th Edition,
2002.
Reference Books:
1. David A. Patterson and John L. Hennessy, “Computer Organization and Design: The
Hardware/Software Interface”, 2003.
2. John P. Hayes, “Computer Architecture and Organization”, Tata McGraw Hill (TMH)
Publication, TMH, 3rd Edition, 1998.
10 | P a g e
CS1302 SWITCHING THEORY & LOGIC DESIGN [3 1 0 4]
Introduction to logic circuits: Variables and functions, Inversion, Truth tables, Logic gates and
networks, Boolean algebra, Introduction to VHDL: Optimized implementation of logic
functions, Synthesis using AND OR and NOT gates, Karnaugh map, Strategy for minimization,
Minimization of POS forms, Incompletely Specified Functions, Multiple output circuits NAND
and NOR logic networks, multilevel NAND and NOR circuits, Analysis of multilevel circuits;
Number representation and arithmetic circuits: Positional number representation, Addition of
unsigned numbers, Signed numbers, Fast adders, Design of arithmetic circuits using VHDL, BCD
representation; Combinational-Circuit building blocks: Multiplexer, decoder, Encoder, Code
converter, Arithmetic comparison circuits, VHDL for Combinational Circuits; Flip Flops,
Registers, Counters; Overview of semiconductor diode: BJT, MOSFET, TTL–standard, High
speed, low-power, low-power scotty, CMOS logic-NAND, NOR
Text Books:
1. S. Brown , Z. Vranesic, “Fundamentals of Digital Logic with VHDL Design”, TMH, 2000.
Reference Books:
1. P. Leach, A. Malvino and G. Saha, “Digital Principles and Applications”, TMH, 6th Edition,
2006.
11 | P a g e
CS1303 DATA STRUCTURES [3 1 0 4]
Text Books:
Reference Books:
1. E. Horowitz, S. Sahni, “Fundamentals of Data Structures in C”, Silicon Press, 2nd Ed., 2007.
12 | P a g e
CS1304 OBJECT ORIENTED PROGRAMMING USING JAVA [3 1 0 4]
The History and Evolution of java: The Creation of Java, how java changed the internet, Java’s
Magic, Servlets, The java Buzzwords; An Overview of Java, arrays; Introduction to classes:
Class fundamentals, declaring objects, Assigning Object reference variables, Introduction to
methods, Constructors, this keyword, Garbage collection, finalize() method, Overloading, objects
as parameters, argument passing, returning objects, recursion, access control, final, nested and
inner classes, string class; I/O Basics: Reading Console Input, Writing Console Output, Files,
Applet fundamentals; Inheritance: basics, super, multilevel hierarchy, overriding, abstract
classes, final with inheritance; Packages and Interfaces: Exception Handling, Multithreaded
programming; String Handling, Applet Class, Event Handling; Introduction to AWT: Classes,
component, Container, Panel, Window, frame, Canvas, working with frame, working with
Graphics, using AWT Controls.
Text Books:
1. H. Schildt, “The Complete Reference Java Eight Edition”, Tata McGraw-Hill, reprint 2011.
Reference Books:
1. S. Holzner, “Java 2 programming black book”, Dream Tech, New Delhi, reprint: 2005.
13 | P a g e
CS1331 DATA STRUCTURES LAB [0 0 1 1]
Review of C and programs on Recursion, Stacks, Stacks, Queues, lists, Trees, Graphs, using C
language.
Control statements and arrays, Stacks and Lists, Strings, Classes and methods, Inheritance,
Packages, Interfaces, Exception Handling, Threads, Input/Output, Event Handling, Applets,
involving AWT, Programs involving AWT
14 | P a g e
IV SEMESTER
HS1401 ECONOMICS [3 0 0 3]
Definition, nature and scope of Economics. Introduction to Micro and Macro Economics. Law of
demand and supply, Elasticity of demand and supply. Cardinal and ordinal approaches of Utility.
Production: Laws of production, Cost and revenue analysis various market situations, Break-even
analysis, Capital Budgeting Macro Economics: National Income and it’s Concepts, Value of
money and its Changes, Foreign Exchange Rate, Monetary and fiscal Policies and other Macro
concepts (Balance of Payment, Business Cycle etc.)
Text Book:
References:
1. P L Mehta, “Managerial Economics”, Sultan Chand & Sons New Delhi (Latest Edition).
2. G. J. Tuesen, H. G. Tuesen, “Engineering Economy”, PHI, New Delhi (Latest Edition).
15 | P a g e
MA1406 Engineering Mathematics IV [3 0 0 3]
Statistics: Probability, Random variables and generating functions, probability distributions:
binomial, Poisson, normal, gamma and exponential distributions. Sampling distributions: t and F
distributions. Testing of hypotheses. Markov chain, Queuing Theory. Integral Transforms: Laplace
transforms of elementary functions, inverse transforms, convolution theorem, Application in
solving ordinary and partial differential equations. Fourier transforms. Numerical Methods:
Interpolation, Numerical differentiation, Numerical integration: Trapezoidal, Simpson’s 1/3 and
3/8 Rule. Solution of system of linear algebraic equations: Gauss Jacobi, Gauss-Seidel methods.
Text Books:
1. V. Sundarapandian, “Probability, Statistics and Queuing Theory”, PHI, 2013.
2. B. S. Grewal, “Higher Engineering Mathematics”, Khanna Publishers, Delhi, 2006
3. E. Kreyszig, “Advanced Engineering Mathematics”, Wiley India Eastern, 2006.
Reference Books:
1. S. Pal, S. C. Bhunia, “Engineering Mathematics”, Oxford University Press, 2015.
2. P. Kousalya, “Probability, Statistics and Random Processes”, Pearson, 2013.
3. R. A. Johnson, C.B. Gupta, “Probability and Statistics for Engineers”, Pearson Education,
2009.
4. S. S. Sastry, “Introductory Methods of Numerical Analysis”, PHI, 2005
16 | P a g e
CS1401 OPERATING SYSTEMS [3 1 0 4]
Text Books:
Reference Books:
17 | P a g e
CS1402 RELATIONAL DATABASE MANAGEMENT SYSTEMS [3 1 0 4]
Text Books:
Reference Books:
18 | P a g e
CS1403 MICROPROCESSOR & MICROCONTROLLER SYSTEMS [3 0 0 3]
8086: internal architecture, programming the 8086, Addressing modes, Flags; Instruction Set:
assembler and Assembler directives, Simple sequence programs, Jumps and conditional jumps,
Loop instructions, Instruction timing and delay loops; String instructions, Writing and Using
Procedures and Macros, 8255: Programmable Parallel ports and Handshake Input/ Output;
Interrupts and Interrupt Responses: 8259 Priority Interrupt Controller, 8254 Software-
Programmable Timer/counter; Software interrupts, Intel 8096-16-bitMicrocontroller: Overview;
Instruction Set and Programming; Hardware features, , iRMX, ARM processor, Real-Time
Executive: iRTX
Text Books:
4. Y. Liu, G.A. Gibson, “Microcomputer Systems- The 8086/8088 Family”, PHI Learning
private Ltd., 2011.
Reference Books:
1. B. B. Brey, “The Intel Microprocessors”, Seventh Edition, Prentice Hall India, 2005.
19 | P a g e
CS1431 OPERATING SYSTEMS LAB [0 0 1 1]
Testing the use of UNIX commands, UNIX shell commands, Basics of Shell Programming, UNIX
System Calls, CPU Scheduling Algorithms, Deadlock Detection Algorithms, Deadlock Avoidance
Algorithms, Page Replacement Algorithms, Memory Allocation Algorithms, Disk Scheduling
Algorithms, and UNIX Inter Process Communication.
DB application development with MS Access, Experiments on DDL and Basic SQL, Advanced
SQL, ER diagrams using DIA tool, Data Integrity Constraints and Built-in Functions, Design and
Implementing the data requirements of a simple DB application, Experiments on Basic PL/SQL,
PL/SQL Exceptions and Transactions, PL/SQL Cursors, PL/SQL Procedures, Functions and
Packages, DB application development with Java as front end
Data and Address transfer Instructions, Simple Arithmetic Instructions, Arithmetic Instructions,
BIT Manipulation Instructions: Program execution transfer Instructions, Program execution
transfer Instructions, Array operations, String Operations
20 | P a g e
OPEN ELECTIVES
Introduction: UNIX System Overview, Program and Processes, Error Handling, User Identification,
Signals, System Calls and Library Functions.: File I/O: File Descriptors, Function for File
Modification, I/O Efficiency, File Sharing, Atomic Operations.; Directories: Stat, Fstat, and Lstat
Functions, File Types, Set-User-ID and Set-Group-ID, File Access Permissions , Function for
modifying file permission and ownership, Symbolic Links, System Data Files and Information:
Password File, Shadow Passwords and Other Data Files.; Process Environment: Process Termination,
Memory Layout of a C Program, Memory Allocation, setjmp and longjmp Functions.; Process
Control: fork Function, vfork Function, exit Functions, wait and waitpid Functions, Race Conditions,
Changing User IDs and Group IDs.; Process Relationship: Logins, Process Groups, Sessions,
Controlling Terminal, Job Control.; Signals: Signal Concepts, Functions to raise and handle Signals,
Program Termination, abort and system functions.; Threads: Thread Concepts, Creation, Termination
and Synchronization, Threads Control, Threads and Signals, Threads and fork, Threads and I/O.;
Text Books:
1. W. R. Steven, S. A. Rago “Advanced Programming in the Unix environment”, Addison Wesley,
2011
Reference Books:
1. Y. P. Kanetkar “Unix Shell Programming”. BPB Publication, 2009.
21 | P a g e
CS 1491 OOPS USING JAVA [3 0 0 3]
Introduction to OOP: Features of Java, How Java is different from C++, Data types, Control
Statements, identifiers, arrays, and operators. Inheritance: Multilevel hierarchy, method overriding,
abstract classes, Final classes, String Class. Packages and Interfaces: Defining, Implementing and
Importing Packages. Exceptions: Fundamentals, Types, Uncaught Exceptions, Multiple catch Clauses,
Java’s Built-in Exception. Multithreading: Creating, Implementing and Extending thread, thread
priorities, synchronization suspending, resuming and stopping Threads. String: String Constructors,
Various Types of String Operations. Basic Packages of Java: Java. Lang, Java.util, Java.i.o. Event
Handling: Event Model, Event Classes, Sources of Events, Event Listener Interfaces AWT: Working
with Windows, AWT Controls, Layout Managers Applet Class, Architecture, Skeleton, Display
Methods. Swings: Japplet, Icons, labels, Text Fields, Buttons, Combo Boxes.
Text Books:
1. H. Schildt, “Java the Complete Reference”, 8th Edition, TMH, 2008.
2. E. Balaguruswamy, “Introduction to JAVA Programming”, TMH, 2009.
Reference Books:
1. D. Young, “Introduction to JAVA Programming”, PHI, 2008.
22 | P a g e
CS 1492 DATA STRUCTURES AND ALGORITHMS [3 0 0 3]
Introduction, Algorithm specification; Performance Analysis: Time and Space Complexity,
Asymptotic notation; pointer declaration and definition, memory allocation functions, array of
pointers; The type definition, enumerated types, accessing structures, complex structures, arrays
of structures, structures and functions; Recursion: Recursive definition & processes, Recursion in
C, writing recursive programs efficiency of recursion, Example of Tower of Hanoi, GCD,
Fibonacci Definition and examples, Representing stacks in C, Evaluation of expressions, multiple
stacks and queues; Applications: infix, postfix and prefix and their conversions Linked lists
representations, Singly, doubly, header node, circular, Applications: linked stacks and queues,
polynomial and long integer arithmetic, union, intersection, Basic terminologies, binary tree
representation, recursive/ non recursive, Binary search tree, AVL trees; Applications: Expression
trees, inserting, deleting, searching, height of BST Terminology and representations, Graph
operations, spanning trees, minimum cost spanning tree, shortest path and transitive closure,
Binary and linear search, insertion, quick, merge, heap, radix sort Static Hashing
TEXT BOOKS:
1. S. Lipschutz, “Data Structures with C”, Tata McGraw Hill Education, 2010
REFERENCES:
23 | P a g e
CS 1492 DATABASES & ERP [3 0 0 3]
Introduction to Databases and Transactions: What is database system, purpose of database
system, view of data, relational databases, database architecture, transaction management; Data
Models: The importance of data models, Basic building blocks, Business rules, The evolution of
data models, Degrees of data abstraction; Database Design ,ER-Diagram and Unified Modeling
Language: Database design and ER Model: overview, ER-Model, Constraints, ER-Diagrams,
ERD Issues, weak entity sets, Codd’s rules, Relational Schemas; Relational Database design:
features of good relational database design, atomic domain and Normalization (1NF, 2NF, 3NF,
BCNF); Relational Algebra and Calculus: What is constraints, types of constrains, Integrity
constraints; SQL: data definition, aggregate function, Null Values, nested sub queries, Joined
relations. Triggers; Transaction management and Concurrency control: Transaction
management, ACID properties, Serializability and concurrency control, Lock based concurrency
control (2PL, Deadlocks),Time stamping methods, optimistic methods, database recovery
management; ERP an Overview: Enterprise – An Overview, Benefits of ERP, Origin, Evolution
and Structure: Conceptual Model of ERP, the Evolution of ERP, the Structure of ERP. ERP and
Related Technologies, Business Process Reengineering (BPR).
TEXT BOOKS:
1. S. Korth, “Database System Concepts”, Mc-GrawHill, 6th Edition, 2011.
2. R. Elmasri and S. Navathe, “Fundamentals of Database Systems”, Pearson Education,
2006.
3. A. Leon, “ERP Demystified”, Tata McGraw Hill, New Delhi, 2000
REFERENCES:
24 | P a g e
V SEMESTER
Syllabus:
Algorithm Analysis: A priori and a posteriori Analysis, Time Space Tradeoff, Asymptotic
Notations, Properties of asymptotic notations, Recurrence equations, Solving recurrence
equations using Substitution method and Master’s method; Trees: B-Tree, Red Black Tree;
Divide and Conquer: Binary Search, Finding Maximum and Minimum, Merge Sort, Quick
Sort, Matrix Multiplication; Greedy Algorithms: Knapsack Problem, Job Sequencing with
deadline, Optimal Merge Pattern, Single Source Shortest Path, Minimum Cost Spanning tree;
Dynamic Programming: Multistage Graphs, Matrix Chain Multiplication, All-Pair shortest
paths, Optimal binary search trees, 0/1 Knapsack, Travelling salesperson problem, Graph
Traversals, Connected Components, Spanning Trees, Bi-connected components; Complexity
Classes: Introduction to NP-Hard and NP-Completeness; Approximation Algorithm,
Randomized Algorithm.
Text Book(s):
1. E. Horowitz, S. Sahni, S. Rajasekaran, “Computer Algorithms”, 2nd Edition, University
Press, 2007.
2. T. H. Cormen, C. E. Leiserson, R. L. Rivest, C. Stein, "Introduction to Algorithms", 3rd
Edition, MIT Press, 2009.
Reference(s):
1. A. V. Aho, J. E. Hopcroft, J. D. Ullman, "The Design and Analysis of Computer
Algorithms", 1st Edition, Pearson Education, 1999.
25 | P a g e
CC1501 CRYPTOGRAPHY AND SECURITY [3 1 0 4]
Prerequisites: None
Syllabus:
Introduction: Number theory and finite fields, Shannon ciphers and perfect security,
computational ciphers and semantic security: Computer Security Concepts: the OSI security
architecture, security attacks, security services and mechanisms; Block Cipher: DES, triple-
DES; Block Cipher AES: AES structure, AES transformation functions, AES key expansions,
AES implementation; electronic codebook mode, cipher block chaining mode, cipher feedback
mode, output feedback mode, counter mode; Pseudorandom Number Generation: Principles
of pseudorandom number generation, pseudorandom number generators, pseudorandom number
generation using block ciphers and stream ciphers, stream ciphers, cryptographic hash functions,
message authentication codes, digital signatures; Public-Key Cryptography: Components of
public-key cryptography, RSA algorithm, Diffee-Hellman key exchange, ElGamal
cryptographic system, Elliptic curve arithmetic, Elliptic curve cryptography, pseudorandom
number generation based on a public-key cryptosystem; Operating Systems. Security
capabilities of different platforms, Identification and authentication. Passwords, choosing,
managing, spoofing attacks. User accounts, file permissions, backups, Access Control and
Firewalls, ownership, Assessing and Securing a system, Information Warfare, Security
Administration, Insider Threat; Corporate Espionage.
Text Book(s):
Reference(s):
1. B. A. Forouzan, “Cryptography and Network Security”, 3rd Edition, McGraw Hill, 2015.
26 | P a g e
CC 1502 FORMAL LANGUAGES AND AUTOMATA THEORY [3 1 0 4]
Prerequisites: None
Syllabus:
Text Book(s):
Reference(s):
1. P. Linz, “An Introduction to Formal Languages and Automata”, 5th Edition, Narosa
Publishing House, 2010.
27 | P a g e
IT1504 DATA COMMUNICATIONS [3 1 0 4]
Prerequisites: None
Syllabus:
Data Transmission: Concepts and Terminology, Analog and Digital Data Transmission,
Transmission Impairments, Channel Capacity; Transmission Media: Guided Transmission
Media, Wireless Transmission, Wireless Propagation, Line-of-Sight Transmission; Signal
Encoding Techniques: Analog and Digital Signals, Digital-To-Digital Conversion: Line
Coding Schemes, Block Coding, Scrambling, Analog-To-Digital Conversion: Pulse Code
Modulation, Delta Modulation; Digital Data Communication Techniques: Asynchronous and
Synchronous Transmission, Types of Errors, Error Detection, Error Correction, Line
Configurations; Data Link Control Protocols: Flow Control, Error Control, High-Level Data
Link Control (HDLC); Multiplexing: Frequency-Division Multiplexing (FDM), Time-Division
Multiplexing (TDM), Code-Division Multiple Access (CDMA); Space Division Multiplexing;
Spread Spectrum: The Concept of Spread Spectrum, Frequency Hopping Spread Spectrum
(FHSS), Direct Sequence Spread Spectrum (DSSS); Cellular Wireless Communication
Techniques: Introduction, Generations: 1G, 2G, 3G, 4G, and 5G.
Text Book(s):
1. W. Stallings, “Data and Computer Communications”, 8th Edition, Pearson Education,
2007.
2. B. Forouzan, “Data Communications & Networking”, 5th Edition, McGraw Hill, 2012.
Reference(s):
1. T. Bertsekas, K. Dimitri, G. Gallager, T. Robert, “Data Networks”, 2nd Edition, Prentice
Hall of India, 2011.
2. L. Peterson, T. Davie “Computer Networks: A Systems Approach”, 5th Edition, Morgan
Kaufmann Publishers, 2012.
28 | P a g e
CS1530 DESIGN AND ANALYSIS OF ALGORITHMS LAB [0 0 2 1]
Syllabus:
Sorting & Searching Algorithm –insertion sort, selection sort, binary search. Basic data
structures stacks and queues, graphs and trees, binary trees. Algorithmic paradigms -
Recursion, divide-and-conquer – Merge sort, Quick sort, Greedy – Knapsack, Huffman
encoding, Dynamic programming, lower bounds and optimal algorithms. Heaps - Heaps,
priority queues, min-max heaps, heap sort. Dynamic search structures - Binary search trees,
height balancing, B-trees, skip lists, hashing. Algorithms on arrays - Linear-time median
finding, sorting in linear time (counting sort, radix sort, bucket sort), String matching (Rabin-
Karp and Knuth-Morris-Pratt algorithms). Graph algorithms Traversal (BFS, DFS,
topological sort), Minimum spanning trees (Prim and Kruskal algorithms), shortest paths
(Dijkstra’s and Floyd-Warshal algorithms); Mini-Projects & Case Studies.
Text Book(s):
1. E. Horowitz, S. Sahni, S. Rajasekaran, “Computer Algorithms”, 2nd Edition, University
Press, 2007.
2. T. H. Cormen, C. E. Leiserson, R. L. Rivest, C. Stein, "Introduction to Algorithms", 3rd
Edition, MIT Press, 2009.
Reference(s):
1. A. V. Aho, J. E. Hopcroft, J. D. Ullman, "The Design and Analysis of Computer
Algorithms", 1st Edition, Pearson Education, 1999.
29 | P a g e
CC1530 DATA COMMUNICATIONS LAB [0 0 2 1]
Prerequisites: None
Syllabus:
PC to PC and PC to Peripherals Communication: Serial communication using RS-232C,
RS-485, Parallel Communication using 8 bit parallel cable; LAN topologies: Star, Token bus
and Token ring; Signal Encoding Techniques: Analog and Digital Signals, Analog -To-
Digital Conversion: Line Coding Schemes; Signal Modulation Techniques: ASK, PSK, FSK,
Pulse Code Modulation and Delta Modulation; Medium Access Control protocols: Aloha,
Slotted Aloha, CSMA, CSMA/CD, CSMA/CA, Wireless LAN-IEEE 802.11, BLUETOOTH;
Network Devices configuration: Hub, Repeaters, Bridges, Switches, Gateways and Routers.
Text Book(s):
1. W. Stallings, “Data and Computer Communications”, 10th Edition, Pearson Education,
2011.
2. Bertsekas, Dimitri, Gallager, Robert, “Data Networks”, 2nd Edition, Prentice Hall of
India, 2004.
Reference(s):
1. L. Peterson, B. Davie, “Computer Networks: A Systems Approach”, 5th Edition, Morgan
Kaufmann, 2011.
2. F. A. Behrouz, “Data communications & networking”, 5th Edition, McGraw-Hill, 2012.
3. L. Kleinrock ,“Queueing Systems - Vol. 1: Theory”, Wiley, 2013.
4. A. S. Tanenbaum, “Computer Networks”, 5th Edition, Pearson Education, 2014.
30 | P a g e
DEPARTMENT ELECTIVES
Fundamentals: Processes in Linux, I/O system calls, select and poll Functions, Filters and
redirection, Linux File system navigation, Directory access, File system implementation,
Hard links and symbolic links; Asynchronous events: Manipulating signal masks and signal
sets, Catching and ignoring signals, Waiting for signals; Inter-process communication:
Sockets, Remote procedure calls, Network file system; Concurrency: POSIX thread
attributes, Synchronization functions, Mutex locks, Condition variables, Signal handling and
threads; Character device driver development: Driver concepts, Writing character drivers,
Interrupt handling, Interfacing with hardware; Shell scripting: Loops, Conditional
statements, Command line arguments, test command, expr command,; Advanced scripting
techniques: Providing command line options to scripts, Exporting variables, Arrays,
Remote shell execution, Connecting to MySQL using shell, Essential System Administration
jobs.
Text Books:
1. W. R. Stevens and S. A. Rago, “Advanced Programming in the UNIX Environment”,
3rd Edition, Addison-Wesley, 2013.
2. S. Das, “Unix Concepts and Applications”, 4th Edition, McGraw Hill, 2006.
Reference Books:
31 | P a g e
CS1553 Digital Image Processing [3 0 0 3]
Fundamentals of Image Processing: Steps in image processing, Image file formats, Basic
relationships between pixels. Image Histogram. Color fundamentals & models – RGB, HSI
YIQ; Image Enhancement and Restoration; Spatial domain enhancement: Point Operations-
Log transformation, Power-law transformation. Frequency domain enhancement:
introduction to image transform, Fourier transform, 2D DFT. Restoration: Noise models,
Restoration using Inverse filtering and Wiener filtering; Image Coding and Compression
Lossless compression, Lossy compression, JPEG, MPEG; Image Segmentation and
Representation and descriptions : Grey level features edges and lines: Similarity and
correlation, Template matching, Edge detection using templates; Representation scheme,
Boundary Descriptors, Regional Descriptors; Overview of Applications: Biometric
Authentication.
Text Books:
1. R. C. Gonzalez and R. E. Woods, “Digital Image Processing”, 3rd Edition, Pearson
Education, 2009.
2. A.K Jain, “Fundamentals of Digital Image Processing”, Prentice Hall of India, 1994.
Reference Books:
1. K. R. Castleman, “Digital Image Processing”, 1st Ed. Pearson Education, 2007.
32 | P a g e
IT 1551 Graph Theory [3 0 0 3]
Syllabus:
Text Books:
1. D. B. West, “Introduction to Graph Theory”, Prentice Hall of India, 2012
2. N. Deo, “Graph Theory with Applications to Engineering and Computer Science”,
Prentice-Hall, 2009
Reference Books:
1. R. Ahuja, T. Magnanti, et al., “Network Flows: Theory, Algorithms, and
pplications”, Prentice-Hall, 2009
33 | P a g e
IT 1552 Python Programming [3 0 0 3]
Syllabus:
Text books:
1. Martelli, “Python in a Nutshell”, Second Edition., 2012
2. J. Georzen, T. Bower, B. Rhodes, “Foundations of Python Network Programming:
The comprehensive guide to building network applications with Python”, APress,
2010.
References books:
1. D. M. Beazley, “Python Essential Reference”, Amazon Books, 2010.
2. M. Lutz, “Programming Python, 4th Edition”, O'Reilly Media, 2010
34 | P a g e
CC1551 WEB TECHNOLOGIES [3 0 0 3]
Prerequisites: None
Syllabus:
Introduction: Overview of Internet and the sub network “the Web”, History, and Other sub
networks, Web System Architecture, Web Clients and Web Servers, Application Servers. HTTP
– Basics of HTTP Request and Response, HTTP Methods, headers, content transport (PUSH
and PULL), Drawbacks HTTP1.0, Introduction to HTTP1.1, HTTPS, SSL, and Generation of
Dynamic Web pages, Extension Mechanisms; Client side programming: Web application
Design Life-cycle, Web Markup Languages – What is markup, why markup, Intro to HTML
and Deficiencies of HTML, Using XHTML – Basic syntax and semantics, fundamental
elements, URLs – Inter-page and Intra-page Linking, Lists, Tables, Frames and Forms., HTML
Document Object Model (DOM), Styling with CSS, Introduction to HTML5 and CSS3;
Scripting: Client side dynamic programming with JavaScript – Basics, Primitives, Loops,
Decision Statements, Screen Output and Keyboard Input, Arrays and Functions, Event
Handling, Pattern Matching and Form Validation with Regular Expressions; Server side
Programming : Three Tier Model, PHP –Basics, Form Validation, -Sessions and Session
Tracking techniques, ASP, JSP; Advanced technologies: XML – Syntax and Semantics,
Document Structure, DTDs, Need for Namespaces-eCommerce Basics, Models and
Architecture; ecommerce - WAP and Mobile Agents.
Text Book(s):
1. J. C. Jackson, “Web Technologies: A Computer Science Perspective”, Pearson
Education, 2007.
2. H. Chan, R. Lee, T. Dillon, E. Chang, “E-commerce, Fundamentals and Applications”,
John Wiley & Sons, 2007.
Reference(s):
1. DT Editorial Services, “HTML 5 Black Book”, 2nd Edition, Wiley India, 2016.
2. Treese, G. Winfield, L. C. Stewart, “Designing Systems for Internet Commerce”, 2nd
Edition, Addison-Wesley Professional, 2003.
3. X. Bai, M. Ekedahl, “The Web Warrior Guide to Web Programming”, 1st Edition, Course
Technology Inc, 2003.
35 | P a g e
CC1552 EMBEDDED SYSTEMS [3 0 0 3]
Prerequisites: Switching Theory and Logic Design, Data Structures, Computer Architecture
Syllabus:
Introduction: what is embedded system, its characteristics, variety-with kernel (Embedded
windows, embed Linux), with RTK, with/without communication, battery –
chargeable/storage, examples; Design Requirements and implementation: typical
requirements and their representation, generation of specifications, executable specs,
behavioral models, hardware software partitioning, embedded software synthesis, mapping of
hardware to standard micros; Building blocks of embedded systems: variants of micros,
architectures-RISC/CISC, multicore, typical building blocks of micros, memory – RAM,
ROM, Cache, timers, I/O, PIC, ADC, DAC, MUX, i/o-Serial, USB, I2C, CAN, SPI etc., RF
controllers-Bluetooth, ZigBee, Wifi, Adhoc wireless, Ethernet, custom building blocks like
TDC, FFT, DCT, etc., FPGAs/PLDs, sensors and actuator, displays, low power modes, battery
mgmt. etc. Sample Design examples; Programming of micros: IDEs, Emulators, debuggers,
programmers, Instructions, instruction set emulators, MISRA, WELMEC, etc., developing
using Matlab, LabView etc., Low-end applications-custom manager, kernels- winCE,
embedded Linux, android etc. embedding Real time capabilities – RTK, RTOS. Multi-tasking,
Scheduler etc., Networked Embedded Systems, Wireless Sensor Networks and IOT, Case
Studies and Projects.
Text Book(s):
1. K. V. Shibu, “Introduction to Embedded Systems”, McGraw Hill, 2013.
2. D. E. Simon, “An Embedded Software Primer”, Pearson Education Asia, 2001
Reference(s):
1. F. Vahid, T. Givargis, “Embedded System Design”, Wiley, 2002.
2. S. Heath, “Embedded System Design”, 2nd Edition, Elsevier, 2004.
36 | P a g e
VI SEMESTER
Syllabus:
Network Layer: Network layer design issues, routing algorithms, congestion control
algorithms, Quality of service, MPLS. Classfull addressing, Sub-netting, Classless addressing,
variable length blocks, address allocation; Protocols: ARP & DHCP: Introduction, Packet
Format, message types, IPV4 header format, fragmentation, options, checksum. ICMP:
Message format, message types. Dynamic routing protocols: RIP, OSPF & BGP, Multicasting
Protocol: IGMP, Introduction to IPV6. Transport Layer: Transport services, state diagram,
Elements of Transport Protocols: addressing, Connection establishment, connection release,
Error control and Flow Control, Multiplexing, Congestion Control: Bandwidth allocation,
regulating the sending rate, UDP: UDP header, TCP: TCP service model, TCP segment header,
TCP connection establishment, TCP connection release, TCP window management, Timer
management; Application Layer: DNS: Name space, domain resource records, Electronic
Mail: SMTP, POP, IMAP, MIME, HTTP, HTTPS, SNMP; Network Security: Security Goals,
Attacks, Attack prevention techniques, Firewall, IDS, DMZ, IPsec.
Text Book(s):
1. A. S. Tanenbaum, “Computer Networks”, 5th Edition, Pearson, 2010.
2. B. A. Forouzan, “TCP/IP Protocol Suite”, 4th Edition, McGraw Hill, 2010.
Reference(s):
1. D E. Comer, “Internetworking with TCP/IP Principles, Protocols and Architecture,” 6th
Edition, Pearson Education, 2013.
37 | P a g e
CC1601 WIRELESS COMMUNICATIONS [3 0 1 4]
Prerequisites: Data Communications
Syllabus:
Introduction: Types of Services, Requirements for the services, Multipath propagation,
Parameters of mobile multipath channels, Spectrum Limitations, Noise and Interference limited
systems, Principles of Cellular networks, Multiple Access Schemes. Large scale path loss, Path
Loss Models, Signal Fading: Fast Fading, Slow Fading, Fading due to Doppler Spread. Wireless
Propagation Channels: Propagation Mechanisms (Qualitative treatment), Propagation effects
with mobile radio, Channel Classification, Link calculations, Narrowband and Wideband
models; Wireless Transceivers: Structure of a wireless communication link, Modulation and
demodulation – Quadrature Phase Shift Keying (QPSK), p/4-Differential Quadrature Phase
Shift Keying (DQPSK), Offset-Quadrature Phase Shift Keying, Binary Frequency Shift Keying,
Minimum Shift Keying, Gaussian Minimum Shift Keying, Power spectrum and Error
performance in fading channels; Signal Processing In Wireless Systems: Principle of
Diversity, Macro diversity, Micro-diversity, transmitter diversity, receiver diversity, spatial
multiplexing, Signal Combining Techniques, Transmit diversity, Equalizers- Linear and
Decision Feedback equalizers, Review of Channel coding and Speech coding techniques;
Advanced Transceiver Schemes: Spread Spectrum Systems- Cellular Code Division Multiple
Access Systems- Principle, Power control, Effects of multipath propagation on Code Division
Multiple Access, Orthogonal Frequency Division Multiplexing – Principle, Cyclic Prefix,
Transceiver implementation, Second Generation (GSM, IS–95) and Third Generation Wireless
Networks and Standards.
Text Book(s):
1. T. S. Rappaport, “Wireless Communications - Principle and Practice”, 2nd Edition,
Prentice Hall of India, 2015.
2. W. Stallings, “Wireless Communication and Network”, 2nd Edition, Prentice Hall of
India, 2010.
Reference(s):
1. R. Pandya, “Mobile and Personal Communication systems and services”, Prentice Hall
of India, 2004.
2. M. Ciampa, “Guide to Designing and Implementing wireless LANs”, 2nd Edition,
Thomson learning, 2005.
3. K. Garg, “Mobile Computing”, Pearson Education, 2010.
38 | P a g e
CS1631 COMPUTER NETWORKS LAB [0 0 2 1]
Prerequisites: None
Syllabus:
Flow control protocols, error detection and correction techniques, Bit stuffing and character
stuffing. Implementation of link state routing protocol, distance vector routing protocol and
other routing protocols. TCP and UDP socket programming. Remote method invocation
(RMI). Packet analyzer- Wireshark. Network Simulator - 3 Tool.
Text Book(s):
1. A. S. Tanenbaum, “Computer Networks”, 5th Edition, Pearson, 2010.
2. B. A. Forouzan, “TCP/IP Protocol Suite”, 4th Edition, McGraw Hill, 2010.
Reference(s):
1. L. Chappell, J. Aragon, G. Combs, “Troubleshooting with Wireshark: Locate the
Source of performance Problems”, Laura Chappell University, 2014.
39 | P a g e
CC1630 UNIX SHELL PROGRAMMING LAB [0 0 2 1]
Prerequisites: C programming
Syllabus:
General Unix Commands: as cal, date, echo, printf, bc, script, mailx, passwd,who; File
System: file handling commands such as cat, cp, rm, mv, more, wc, cmp, diff, gzip ,gunzip,
tar, zip, unzip, mkdir, rmdir, pwd, cd, File attributes, ownerships, permissions; The Process
Basics, ps, Internal and external commands, Process states and zombies, nice, at, mesg, cron,
time, top; Network Commands: Telnet, ipconfig, ping, netstat, firewalls, System
configurations. The vi editor Basics, Input mode and The ex-mode, Navigation, Editing text;
The Shell and Shell programming: The Shell’s interpretive cycle, Shell offering, Pattern
Matching, Three Standard Files, Two special files, pipes, tee, Shell scripts. Debuggers and
compilers
Text Book(s):
1. S. Das, “Unix Concepts and Applications”, 4th Edition, McGraw Hill, 2006.
2. T. H. Cormen, C. E. Leiserson, R. L. Rivest, C. Stein, "Introduction to Algorithms", 3rd
Edition, MIT Press, 2009.
Reference(s):
1. W. R. Stevens, B. Fenner, “UNIX Network Programming, Volume 1: The Sockets
Networking API”, 3rd Edition, Pearson Education, 2003
2. W. R. Stevens, S. A. Rago, “Advanced Programming in the UNIX Environment”, 3rd
Edition, Addison-Wesley, 2013.
40 | P a g e
CC1634 Minor Project [0 0 6 3]
Description:
In this practical course, each group consisting of two/three members is expected to design and
develop practical solutions to real life problems related to industry, institutions and computer
science research. Software life cycle should be followed during the development. The theoretical
knowledge, principles and practices gained from various subjects would be applied to develop
effective solutions to various computing problems. The knowledge gained to work with various
software tools, Designing tools, programming languages, operating systems, etc. would be utilized
in various stages of project. Structured/ Object Oriented design techniques may be used for the
project. Software Requirements Specification (SRS), Modeling Techniques, Design and Testing
strategies would be part of document of the work. A committee consisting of minimum three
faculty members shall perform internal assessment of the minor projects. A report on minor project
would be submitted for evaluation, Project work would be presented and demonstrated before the
panel of examiners.
Execution Plan:
S. No Month Phase Outcome/Deliverable Assessment
Continuous
2. Second Design and Implementation Project Version 1.0
Assessment-II
Continuous
3. Third Testing and Debugging Project final Version
Assessment-III
41 | P a g e
DEPARTMENT ELECTIVES
42 | P a g e
CC1652 ADVANCED INTERNET TECHNOLOGIES [3 0 0 3]
Prerequisites: Web Technologies
Syllabus:
Introduction: Need for web, Basic concepts, web design fundamentals, website Strategy and
planning, web testing tools, web server structure, maintenance, Criteria for navigation of web
pages, development and development of the web pages, AJAX, Web sockets, WebRTC; XML:
Xml basics, document object model, DTD and schemas, xml namespaces, xml for representation
and for display – path and XSLT, xml DOM, XML manipulation, XML Ajax, xml DTD XSD
schema XSD, complex XSD data; Web/Application/Database Servers: Structure,
Architecture of web servers with working (IIS , Apache) , Installation and configuration of Web
Servers, Security Aspects, Deployment of Web Pages, Maintenance and monitoring of Web
pages; Case study: IIS / Apache / Tomcat / MSSQL/Apache/ LAMP/ WAMP/ MySQL Servers.
App development issues, challenges, solutions, simulators, Tools for designing web
applications; Client side technologies: Client Side Architecture, Browsers (IE, Mozilla,
Firefox), Browser Extensions – Mime Types, Plugins, Controls, add-ons, XHTML, CSS,
JavaScript, Generation and Handling of Dynamic Web pages, Action script, Silver light,
HTML5 and CSS3, Ajax, Session Tracking Techniques on Client-side, Security issues, Rich
Internet Applications; Advanced topics: E-Commerce Basics, Models and Architecture; m-
Commerce: WAP and Mobile Agents, Search Engines and Search Engine Optimization,
Introduction to Web Services.
Text Book(s):
1. J C Jackson, “Web Technologies – A Computer Science Perspective”, 1st Edition,
Pearson Education, 2011.
2. R. Kamal, “Web Technology”, 2nd Edition, McGraw-Hill, 2001.
Reference(s):
1. D. Goldberg, “Internet and World Wide Web - How to Program”, 4th Edition, Pearson
Education, 2001.
2. A. Moller, I. Michael , “An Introduction to XML and Web Technologies”, Addison-
Wesley, 2006.
3. X. Bai, M. Ekedahl, “The Web Warrior Guide to Web Programming”, 1st Edition, Course
Technology Inc, 2003.
4. G. Alonso, “Web Services - Concepts, Architectures and Applications Series: Data-
Centric Systems and Applications”, Springer, 2004.
43 | P a g e
CC1653 INTERNET OF THINGS [3 0 0 3]
Prerequisites: C programming
Syllabus:
Introduction: read data sheet, analog and digital signals, serial communication, RF and sensors;
Introduction to JSON/XML; Database Basics: create database, tables, SQL queries;
Programming on Development Boards: Understanding of the board, tool chain and
development environment setup; Sensors and Actuators: Understanding and using analog,
digital, SPI, UART, I2C; Nodes and communication protocols: Understanding usage of nodes
and gateways for sensor communication and external communication, RF, Zigbee, BT, WI-FI,
GSM; IoT Cloud Platform, Cloud using Web Services, Cloud Computing Services for Sensor
Management, Python Script; Big Data Analytics: Mongo DB, Map Reduce, Using cloud APIs
for analytics, Visualization, NVD3, Mobile interfacing.
Text Book(s):
1. V. Madisetti, A. Bahga, “Internet of Things: A Hands-On- Approach”, 1st Edition, VPT,
2014.
Reference(s):
1. A. McEwen, “Designing the Internet of Things”, 2nd Edition, Wiley, 2013.
2. D. Kellmereit, “The Silent Intelligence: The Internet of Things”, 1st Edition, DND
Ventures LLC, 2013.
3. T. H. Davenport, “Big Data at Work: Dispelling the Myths, Uncovering the
Opportunities”, 1st Edition, Harvard Business Review Press, 2014.
4. EMC Education Services, “Data Science and Big Data Analytics: Discovering,
Analyzing, Visualizing and Presenting Data Hardcover”, 1st Edition, John Wiley & Sons,
2015.
44 | P a g e
CS1653 Distributed Databases [3 0 0 3]
Text Book:
Reference Book:
45 | P a g e
CS1653 Cloud Computing & Infrastructure Services [3 0 0 3]
Text Books
Reference Books
1. B. Jackson and K. Saurabh, “Cloud Computing”, 2nd Edition, Wiley India, 2012.
2. V. Joysula, M. Orr and G. Page, “Cloud Computing: Automating the Virtualized Data
Center”, Cisco Press, 2012.
3. R. K. Buyya, “Cloud Computing: Principles and Paradigms”, Wiley Press, 2011.
46 | P a g e
CS1655 Agile Methodology [3 0 0 3]
Text Book:
1. Stellman and J.P. Greene, “Learning Agile: Understanding Scrum, XP, Lean, and
Kanban”, O'Reilly Media, Incorporated, 2014.
47 | P a g e
IT 1652 SOFTWARE QUALITY & ASSURANCE [3 0 0 3]
Syllabus:
Software Metrics : Definition , categories of Metrics , Token Count, Data Structure Metrics,
Informational Flow Metrics, Object Oriented Metrics, Project Metrics, Metrics Analysis; Case
Study on Metrics Software Reliability: Basic concept, Failures and Faults, Reliability Models-
Basic Execution Time Model, Logarithmic Poisson Execution Time Model, Calendar Time
component, The Jelinski-Moranda Model. Reliability Metrics, Case Study on Reliability;
Software Quality - Quality attribute, Quality Criteria, Boehm Model, ISO 9126, Bug Seeding
Model, Capability Maturity Model; Software Testing, Structural Testing, Top Down and Bottom
up integration: System integration, Scenario Testing, Defect Bash, Functional versus
Nonfunctional testing, Design/Architecture verification, Deployment testing, Beta testing,
Scalability testing, Reliability testing, Stress testing; Acceptance Testing, Regression testing,
Regression test process, Sanity test, Selection of regression tests, Execution Trace, Dynamic
Slicing, Test Minimization, Tools for regression testing; Ad hoc Testing; Software Test
Automation: Scope of automation, Design & Architecture for automation, Generic requirements
for test tool framework, Test tool selection, Testing in Object Oriented Systems, Case Study on
software testing. Software Certification.
Text Books:
Reference Books:
48 | P a g e
IT 1653 Artificial intelligence [3 0 0 3]
Syllabus:
Introduction: What is Artificial Intelligence, Current Trends in AI, Intelligent Agents: Agent v/s
Software Program, Classification of Agents, Working of an Agent, Single and Multi-Agent
System, Performance Evaluation of Agents, Architecture of Intelligent Agents, AI Problems-
Problem Space, Problem analysis, Problem Solving Techniques: Heuristic search Techniques,
Knowledge Representation: Semantic Networks, Propositional and Predicate Logic:
Propositional and Predicate calculus, semantics for predicate calculus, theorem prover, inference
rules, unification, Resolution, Refutation in predicate logic, Natural Language Processing:
ntroduction, parsing using context free grammars, Chomsky hierarchy, case grammar, Learning-
Supervised, unsupervised, Symbolic learning: Rote Learning, learning by taking, learning by
example, explanation based learning, learning by parameter adjustment, Soft Computing: Neural
Networks: Perceptron, Back Propagation, Hop-field Networks, Introduction to Genetic
lgorithms-a simple GA algorithm, Application to GA - robot path Planning, optimization
Text Books:
1. E. Rich, K. Knight, and S.B. Nair, “Artificial Intelligence”, 3rd Ed., Tata McGraw Hill,
2009.
2. S. Russell, and P. Norvig, “Artificial Intelligence: A Modern Approach”, Prentice Hall,
2011.
Reference Books:
1. N. J. Nilsson , “Artificial Intelligence: A New Synthesis”, Morgan, 2009.
49 | P a g e
IT 1654 Data Science [3 0 0 3]
Syllabus:
Text-books:
1. H. Trevor et al., “the elements of statistical learning”, Vol. 2. No.1.New York, Springer,
2009.
References Books:
1. C. Douglas and C. George, “Applied Statistics and Probability for Engineers”, John Wiley
and Sons, 2010
50 | P a g e
VII Semester
CC1701 NETWORK SECURITY [3 1 0 4]
Syllabus:
Basics of Network Security: Attacks, services and mechanisms; Network Security
Applications: Kerberos, IPSec, SSL, TLS and VPN; Internet Security: Digital Certificate,
PKI, Secure Electronic Payment System and Protocols, iKP protocol; Issues in Network
Security and Tools: Man in the middle attack, Replay, ARP poisoning, DNS poisoning, web
based attacks ; Firewalls and IDS: Need of firewalls, firewall characteristics and access
policy, type of firewall, firewall basing, firewall location and configuration, Types of Intrusion
detection System, working of IDS and policies; Malware, Virus, Worm, Trojan Horse:
Introduction and working of malwares, Identifications and remedies.
Text Book(s):
1. W. Stallings, "Cryptography and Network Security Principles and Practice", 7th Edition,
Pearson education, 2017
Reference(s):
1. Y. Qian, D. Tipper, P. Krishnamurthy, J. Joshi, “Information Assurance Dependability &
Security in Networked Systems”, 1st Edition, Morgan Kaufmann, 2010.
51 | P a g e
C1702 MACHINE LEARNING [3 1 0 4]
Syllabus:
Introduction: Introduction and applications of machine learning;
Supervised learning: perceptron network, Adaptive linear neuron, multiple Adaptive linear
neuron, Back propagation network, Generative learning algorithms. Gaussian discriminant
analysis, Naive Bayes, Support vector machine, KNN algorithm, basic/variance tradeoff, linear
regression and feature selection;
Text Book(s):
1. M. Mohri, A. Rostamizadeh, A. Talwalker, “Foundations of Machine Learning”, MIT
Press, Cambridge, MA, 2012.
2. T.M. Mitchell, “Machine learning”, 1st Indian Edition, McGraw-Hill India, 2013.
Reference(s):
1. T. Hastie, R. Tibshirani, J. Friedman, “The Elements of Statistical Learning”, 2nd Edition,
Springer, 2009.
2. C.M. Bishop, “Pattern Recognition and Machine Learning”, 1st Edition, Springer Verlag,
2010.
3. S.N. Sivanandam, S.N. Deepa, “Principles of Soft Computing”, 2nd Edition, Wiley, 2011.
52 | P a g e
CC1730 NETWORK SECURITY LAB [0 0 2 1]
Syllabus:
Implementation of Symmetric Key Algorithms: SDES, DES, AES; Implementation of
Asymmetric Key Algorithms: RSA, Elgamal; Implementation of Key Management
Algorithms: Diffie Helman, Certification Authority; Implementation of Security Protocols:
Mutual Authentication, Digital Signature, Hash Functions, MAC; Open Source Security Tools:
Wireshark, Ethercap, Penetration Testing tools; Mini project Implementation.
Text Book(s):
1. W. Stallings, "Cryptography and Network Security Principles and Practice", 6th Edition,
Pearson Education, 2014
Reference(s):
1. D. Hook, “Beginning Cryptography with Java”, 1st Edition, John Wiley & Sons, 2005.
Syllabus:
Text Book(s):
1. T.M. Mitchell, “Machine learning”, 1st Indian Edition, McGraw-Hill India, 2013.
Reference(s):
1. S. Marsland, “Machine Learning: An Algorithmic Perspective”, 1st Edition,
Chapman & Hall/CRC Machine Learning & Pattern Recognition, 2009.
53 | P a g e
PROGRAM ELECTIVES
Syllabus:
Computability and Complexity Theory, Introduction to Compilers: Analysis of the source
program, phases of a compiler; Lexical Analysis: The role of lexical analyzer, specification and
recognition of tokens; Syntax Analysis : Various types of parsing, Syntax Directed Translations
and Type Checking; Runtime Environments: Storage organization and allocation strategies,
Intermediate code generation; Code generation: Issues in design of a code generator; Code
Optimization : The principle sources of optimization, optimization of basic blocks, loops in
flow graphs, efficient data flow algorithms.
Text Book(s):
2. M. Sipser, “Introduction to the Theory of Computation”, 3rd Edition, Cenage Learning,
2013.
3. A. V. Aho, M. S. Lam, R. Sethi, J. D. Ullman, "Compilers – Principles, Techniques and
Tools", 2nd Edition, Pearson Education, 2007.
Reference(s):
1. J. Martin, “Introduction to Languages and the Theory of Computation”, 4th Edition, Tata
McGraw Hill, 2010.
2. A. I. Holub, “Compiler Design in C”, Pearson Education, 2015.
54 | P a g e
CC1752 NETWORKS ON CHIP [3 0 0 3]
Syllabus:
Introduction: The Advent of the Multi-core, Communication Demands of Multi-Core
Architectures , On-chip vs. Off-Chip Networks; Network Basics: A Quick Primer Evolution to
On-Chip Networks; Shared Memory Networks in Chip Multiprocessors: Impact of
Coherence Protocol; Design Requirements for On-Chip Network: NoC Synthesis, Case
Studies; Routing: Types of Routing Algorithms, Deadlock Avoidance, turn models; Logic
Based Distributed Routing; Selection Methods; Flow Control: Basis units of flow control,
different types of flow control, Virtual Channels Deadlock-Free Flow Control, Escape VCs,
Buffer, Backpressure; Router Microarchitecture: Virtual Channel Router Microarchitecture,
Pipeline; Switch Design: Crossbar Designs, Crossbar Speedup; Fault tolerance in router;
Simulations of various strategies of on chip networks by varying different parameters.
Text Book(s):
1. N. D. E. Jerger, T. Krishna, L.S. Peh, “On-chip Networks”, 2nd Edition, Morgan &
Claypool, June 2009.
2. M. Palesi , M. Daneshtalab, “Routing algorithms in networks-on-chip”, Springer, 2014.
Reference(s):
1. W. J. Dally, B. P. Towels, “Principles and Practices of Interconnection Networks”, 2nd
Edition, Morgan Kaufmann, 2004.
2. J. Duato, S. Yalamanchili, L. Ni, “Interconnection Networks: An Engineering Approach”,
2nd Edition, Morgan Kaufmann, 2003.
55 | P a g e
CC1753 PRINCIPLES OF WEB SERVICES [3 0 0 3]
Syllabus:
Evolution and Emergence of Web Services: Emergence of Web Services and Service Oriented
Architecture (SOA). Introduction to Web Services –model of web services, tools and
technologies enabling web services, benefits and challenges of using web services; Web Service
Architecture: characteristics, web services communication, WSDL, Brief Over View of XML;
SOA Design implementation, Managing SOA Environment: service-oriented design
process, design activities, determine services and tasks based on business process model,
implementing SOA; SOAP : Simple Object Access Protocol: SOAP as a messaging protocol,
UDDI Architecture and Implementation, UDDI with WSDL, UDDI specification; REST:
Representational State Transfer: Messages, HTTP Request and format, HTTP Response and
format, Query Parameters, Protocol Semantics of HTTP(GET, PUT, POST, DELETE, HEAD,
OPTIONS, TRACE) , REST vs SOAP.
Text Book(s):
1. S. Allamaraju, “RESTful Web Services Cookbook: Solutions for Improving Scalability
and Simplicity”, Yahoo Press, 1st Edition, 2010.
2. L. Richardson and S. Ruby, “RESTful Web Services”, O'Reilly Media, 1st Edition, 2007.
Reference(s):
1. M. Kalin, “Java Web Services: Up and Running: A Quick, Practical, and Thorough
Introduction”, 2nd Edition, O'Reilly Media, 2013
2. J. Sandoval, “RESTful Java Web Services: Master Core REST Concepts and Create
RESTful Web Services in Java”, Packt Publishing Limited, 2009
3. S. Gulabani, “Developing Restful Web Services with Jersey 2.0”, Packt Publishing
Limited ,1st edition, 2013
56 | P a g e
CC1754 SOFTWARE TESTING [3 0 0 3]
Syllabus:
Basics of software testing: Introduction to software Testing, Testing and debugging, Test
metrics and measurements, Verification, Validation and Testing, Types of testing, Software
defect tracking; Structural testing techniques: Path testing, DD-Paths, Cyclomatic
Complexity, Graph Metrics, Data Flow Testing; Functional testing techniques: Boundary
Value Analysis, Equivalence Class Testing, Decision Table Based Testing, Cause Effect
Graphing Technique, Ad hoc Testing; Top down and Bottom up integration: Bi-directional
integration, System integration, Scenario Testing, Defect Bash, Design/Architecture
verification, Deployment testing, Beta testing, Scalability testing, Reliability testing, Stress
testing; Acceptance testing; Regression testing, Test Planning; Software Test Automation:
Scope of automation, Design & Architecture for automation, Generic requirements for test tool
framework, Test tool selection, Testing in Object Oriented Systems, Case Study on software
testing; Advanced Topics on Testing: Functional and Non-Functional Testing, Prioritizing
the Test-cases, Testing Web Applications, Testing Off-the-shelf component, Testing security,
Testing Data-warehouse.
Text Book(s):
1. P. C. Jorgenson, “Software Testing: A Craftsman’s Approach”, 4th Edition, CRC Press,
2014.
2. A. P. Mathur, “Fundamentals of Software Testing”, 2nd Edition, Pearson Education, 2014.
Reference(s):
1. Rajib Mall, “Fundamentals of Software Engineering”, Fourth Edition, PHI Learning,
2014
2. K. K. Aggarwal, Y. Singh, “Software Engineering”, 3rd Edition, New Age International
Publication, 2008.
3. K. Perry, “Effective Methods for Software Testing”, 3rd Edition, Wiley, 2006.
4. B. Beizer, “Software Testing Techniques”, 2nd Edition, Wiley India, 2008.
5. S. Desikan, G. Ramesh, “Software Testing: Principles and Practices”, Pearson
Education, 2006.
57 | P a g e
CC1755 WIRELESS SENSORS AND ADHOC NETWORKS [3 0 0 3]
Syllabus:
Text Book(s):
1. C. M. Cordeiro, D. P. Aggarwal, “Ad Hoc and Sensor Networks — Theory and
Applications”, 2nd Edition, World Scientific Publications, 2011.
2. F. Zhao,L. Guibas, “Wireless Sensor Networks: An Information Processing Approach”,
1st Edition, Morgan Kauffman Publishers, 2004.
Reference(s):
1. C.S.R. Murthy, B.S. Manoj, “Adhoc Wireless Networks — Architectures and
Protocols”, 1st Edition, Pearson Education, 2006.
2. F. Hu,X. Cao, “Wireless Sensor Networks — Principles and Practice”, An Auerbach
Publications, CRC Press, Taylor & Francis Group, 2010.
3. C.E. Perkins, “Ad hoc Networking”, Addison-Wesley, 2008.
58 | P a g e
CC1756 HUMAN COMPUTER INTERACTION [3 0 0 3]
Syllabus:
Introduction, Human Perception and Cognition, Designing an HCI System, Methodology for
designing user-computer interfaces, Prototyping user interfaces, Guidelines for designing user
interfaces, Implementing and Evaluating an HCI System; User experience levels, Styles,
tasks, techniques, and devices, Testing and evaluation of interfaces, Hypothesis testing,
Statistical analysis, models and theories, visual performance and graphics design, online
documentation and help systems, HCI and the World Wide Web, Human Information
Processing; Designing to fit human capabilities; Groupware, ubiquitous computing,
collaborative systems, groupware, and coordination technology, Research Trends in Human-
Computer Interaction; Voice, Gesture, Wearable and mobile, tactile and non-tactile
interfaces, Concepts of Virtual and Augmented Reality, Models for Dynamic Learning in
HCI; Bayesian Networks, Hidden Markov Model.
Text Book(s):
1. B. Shneiderman, C. Plaisant, “Designing the User Interface: Strategies for Effective
Human-Computer Interaction”, Addison-Wesley, 6th Edition, 2017.
2. J. Preece, H. Sharp, Y. Rogers, “Interaction Design: Beyond Human-Computer
Interaction”, John Wiley & Sons, 4th Edition, 2015.
3. T.M. Mitchell, “Machine learning”, McGraw-Hill India, 2014.
Reference(s):
1. A. Dix, J. Finlay, G. Abowd,R. Beale, “Human Computer Interaction”, Pearson
Education, 3rd Edition, 2004.
2. J. M. Carroll, “HCI Models, Theories, and Frameworks: Toward a Multidisciplinary
Science”, Elsevier, 1st Edition, 2003.
3. R. Duda, P. Hart, D. Stork, “Pattern Classification”, John Willey and Sons, 2nd
Edition, 2001.
59 | P a g e
SCHOOL OF COMPUTING AND IT
LIST OF SPECIALIZATION
1. Operating 7. Artificial 8. Image
3. Web 4. Embedded 5. High 9. Geomatics 10. Software Engg
Systems & 6. Data Intelligence & Processing &
2. Networks (SJ) Technology Systems & IOT Performance & Remote and Project Mgmt.
Virtualization Analytics (RB) Soft Computing Computer
(VSD) (RSS) Computing (DPS) Sensing (PM) (DP/DS)
(SCK) (RSS) Vision (SS)
LINUX System & Advanced Web Embedded Parallel Python Artificial Digital Image
Fundamentals Software Engg
Shell Programming Networking Technologies Systems Programming Programming Intelligence Processing
of GIS Fundamentals
(CS1551) Concepts (CC1552) (CC1553) (CS1654) (IT1552) (IT1653) (CS1553)
High
Real Time Data Mining & Bio-Inspired Multimedia
Cloud Computing Performance Remote Software Quality
Web Services Systems Data Computing Communicatio
(CS1653) Computer Sensing Assurance (IT1652)
(IT1755) Warehousing Methods ns
Networks
Computer
Distributed Cryptography & Developing for Wearable Information Natural Language Technologies Proj Mgmt (Dr.
Grid Computing Vision and
Operating Systems Network Security Web Computing Retrieval Processing for Smart Cities Devesh)
Virtual Reality
Automated
Wireless Game Theory and Guided 3D Modelling DevOps Concepts
Networks on Big Data
Sensors and Bioinformatics Decision Support Vehicles (AGV) & Virtual (Dr. Devesh -
Chip (NOC) Analytics
Adhoc Networks Systems & Driver less Reality 30.Oct.17)
Cras
Distributed
Databases
Graph Theory
(IT 1551)
60 | P a g e