B.Sc. Engineering Program Ordinance
B.Sc. Engineering Program Ordinance
8. Undergraduate Program
University of Chittagong
Chittagong, Bangladesh.
Faculty of Engineering
Mffiil
7-----
666erA
Ordinance
For
Contents:
hge
1. Departments
3
) Degrees Offered
3
3. Duration of Course and Course Structure 5
4. Distribution of Coursr:s 4
5. Academic Calendar 5
6. Admission 5
7. Admission on Tiansfe r 6
B. Medical Examination at the time of Admission 6
9. Registration 6
10. Change of Departmen t 6
11. Attendance 6
72. Striking off the Names, and Readmission 7
15. Crading System 8
14. Marks and Credits Disribution 9
15. Conducting of Examination and Rules for Promotion 10
16. Award of Scholarships 11
17. Course Exemption 11
18. Class Tbst 11
19. Award of Degree and lhblication of Results 11
20. Improvement of Result 11
2t. Flailed Student 11
22. Examination Committr:e 72
25. Theoretical Examination 15
24. Laboratory Dxaminatic,n 15
25. Medium of Answers 15
26. Duties and Responsibitities of Question Setters and Dxaminers 15
27. Dligibility of the studerrt for appearing at the Examination t4
24. Amendment t4
D@artrnent of Comp.rter 5ci6lc€ and Er8inedins,
Unive6ity of ChittagorE
Page 29
FacuItY of Engineering
UniversitY of Chiffagong
Academic Ordinance for Undergraduate Programme
for the award of the degree of Bachelor of Science in Engineering
1. Departments
1.1 Degree Awarding DePartments
The Ficulty shall consisi ofthe following Degree Awarding Departments:
l I
l. D"p-ttn*t of Co.puter Science and Engineering (abbreviated as CSE)
1.1.2 Deparunent of epitied phlsics, Electronics and Communication Engineering (abbreviated as
APECE)
1.1.3 Any other department to be approved in future
2. Degree Offered
The Faculty shall offer courses leading to the award ofthe following degrees:
2.1 Bachelor ofScience in Engineering in Computff Science and Engineering
2.2 Bachelor ofScience in Engineering in Applied Physics, Electronics and Communication
2.3 Any other degree that may be awarded by a department or affiliated college on the approval of the
Syndicate on the recommendation ofthe Faculty ofEngineering and the Academic Council ofCU.
Contact hour
Nature of course No. of credits
(in a semester)
Theoretical Lecture I hour/week I
Laboratory 2 - 3 hours/week I
Project 4 - 6 hourVweek 2
Field work 2 weeks of field work I
3.5 Contact Hours/week: The t,)tal contact hours for the regular students including tecture, tutorid and
laboratory shall be between 24 - 48 periods per week, each period being 45 minutes in duration.
3.6 Course Adviser: In each deg:ee-awarding department, one of the teachers nominated by the Academic
Committee shall act as Course Adviser for each academic year (two consecutive odd and even
semesters).
3.7 With the approval ofAcadem c committee, Course Adviser will prepare and announce the class routine,
showing details ofthe lectures, course plan, class test, etc at the start ofeach semester.
3.8 Core Courses: In each discipline a number of courses will be identified as core courses by the
Committee of Courses and litudies of each department, which form the nucleus of the respctive
bachelor's degree programme A student has to complete all ofthe designated core courses to obain a
degree in his/her discipline. The course code of the core colrses shall be prefixed by the own
deparhnental letter code; for e:rample, CSE I I I is a core course in CSE department.
3.9 Pre-Engineering Courses: Some ofthe core courses are identified as pre-engineering courses. A pre
engineering course is one, which is required to be completed before some other courses can be hken.
Any such course, on which one or more subsequent courses build up may be offered in each of tle two
regular semesters.
3.10 Elective Courses: Apart ftonr the core courses, studentswill have to complete a number of elective
courses, as offered by the department. Students will have to choose the required number of corses
from a specified group/number ofcourses.
3.ll Course Designation: Each c lurse is designated by a course code and course title. A course code
consists ofa two to four lettel word usually identifies the course offering department and a threedigit
number. Course designation is generated with the following criteria
(a) The first digit will correspond to the semester in which the course is normally taken bythe
students
(b) The second digit will be reserved for departmental use for such things as to identif dif€rent
areas within a departm(nt
(c) The third digit will b€ odd for theoretical, even for laboratory courses
(d) The course title.
The system is illustrated by the following example.
L- Course title
4. Distribution of Courses
The programme of study for the B. lic. Engg. shall carry a total of4000 marks (40 mits. 160 credits)
Suggested distribution ofcourses is as follows:
Deparfn€nt of Computer S.rerrce and Englneerins, Unversity of Chiftagong Page 3l
Yo of Total Credits
Course qpe Units Marks
Marks
uHumanities t-3 100 300 2.5 - 7.5 4t2
-E\,I"th.""ti"s and Basic Sciences (with Lab) 6-9 | -
600 9oo - 22.5
15 24-36
Basic and Maj or Engineering 28-32 2800 3200 70-80 t1_2 128
( i) Basic Engineering I 3 100-300 2.5 7.5 412
with Lab
Distribution (ii) Major Engineering
(a) Theoretical t5 -24 1500 2400 37.5-60 60- 96
(b) Laboratory I 7 -12 700 1200 17.5 - 30 28 48
Total .10 I ,1000 100"/" 160
"Each department must include a course on English.
bEach
department must include courses on Physics, and Mathematics
5. Academic Calendar
5.1 The academic year shall be divided into two semesters each having duration of not less than 1l
teaching weeks.
5.2 There shall be final examinations at the end of each semester conducted by the respective
Examination Committee of the Departments.
5.3 An academic schedule for the academic year shall be announced for general notification before the
start of the academic year, on tle approval of the Academic Committee. The schedule may be
prepared accor to the followin delines
Semester-Odd (19 weeks) Number ofweeks
Teachirg I I (66 working days)
r-
Preparatory Leave 2 I
5.4 However, the academic committee may reschedule the above academic schedule if and when
necessary.
6. Admission
6.1 The four academic years of study for the degree of B. Sc. Engineering shall be designated as First,
Second, Third, Fourth, Fifth, Sixth, Seventh and Eighth semester in succeeding higher levels ofstudy.
Students shall generally be admitted into the First semester. In special cases, studsnts may be
admitted into a higher semester class on the recommendation of the appropriate Equivalence
Committee and concemed Departrnent, only in case of transferred shrdents.
6.2 An Admission Committee shall be formed as per statute of the University.
6.3 A candidate for admission into the First Semester, must have passed the HSC Examination (with a
minimum GPA as decided by the Admission Committee) from a Board of Secondary and Higher
Secondary Education in Bangladesh (after 12 years of Schooling) with Physics, Chemistry and
Mathematics as his/her subjects of Examination of the Higher Secondary level or examination
recognized as equivalent and must also fulfill all other requirements as may be prescribed by the
Admission Committee of the University.
D€parunqt of ConpJt€r Science ard Ergineenng UnrveGtty of ChittagorE Page 32
6.4 The rules and conditions for irdmission into different Departments shall be framed by the Academic
Council on the recommendation of the Admission Committee of the University.
6.5 All candidates for admissim into the courses of B. Sc. Engg. must be citizens of Bangladesh unless
the candidature is against thr seats that are reserved for foreigt students. Cardidates for all seats
except the reserved ones, if any, shall be selected on the basis of merit. The rules for admission into
the reserved seats shall be ftaned by the Academic Council on the recommendation ofthe Admission
Committee of the University.
6.6 No student shall ordinarily be admitted after the beginning of classes.
6.7 Admission test
6.7.1 The admission test shall be conducted by an admission Committee ofthe Faculty (or
as sugg€sted by the Central Admission Committee of the university)
6.7.2 The admission Comnittee of the Faculty shatl be formed as per guidelines given
below:
(a) Dean ofthe Faculty as Chief Coordinator,(Jnit Chairman
(b) Alt the Chairmen of the Departments as Coordinator/unit member and
(c) One teachq from each member Departmant (nominated by the concemed
Academic Committee) as Member if necessary.
6.7.3 The committee fonned under clause 6.7.2, shall form other necessary sub-
committee(s), appoin. question setters and take other necessary decisions.
6.7.4 A, merit list shall b( prepared based on candidates'GPA in SSC/equivalent and
HSC/equivalent exanrinations and admission test results, or as decided by the Cenfral
Admission Committe:.
6.7.5 Admission into different Departrnents of the Faculty shall be granted from the single
m€rit list according tr the position in the merit list and choice ofa candidate.
7. Admission on Transfer
A candidate seeking admissior on transfer from othel Institutes or Universities should apply to the
Registrar of the University. The Registrar will refer the case to the Chairman of the Departrnent
concerned and also to the Equivalence Committee. On receiving the opinions of the academic
committee and the Equivalencr: Committee, the matter will be placed before the Vice-Chancellor. The
Vice-Chancellor's decision will be communicated to the Chairman of the Departrnent and the
candidate.
9. Registration
9.1 University Registration: Ever y student admitted into the University shall be required to register on
payment ofthe prescribed fees within the stipulated time.
9.2 Course Registration: A stuc ent admitted into a deparftnent of the Faculty shall be required to
register his,4rer courses_in the department in each semestff within l0 days of semester
commencement.
11. Attendance
ll.l In order to be eligible for appearing as a regular candidate at the semester final examinations, a
sndent shall be required to have attended al least 1U/o of the total number of periods of
lectures/tutorialylaboratory clar;ses held during the semester in all courses as defined in the curricula.
The laboratory courses mean all laboratory/projecVfieldwork/in-plant training and any other simitar
courses.
ll.2 A student whose attendance frlls short of 707o but not below 600Z as mentioned above mav be
Depdrfnent oi Computer Sci€nce and Englneenng Unrversty of Chittagong Page 33
allowed to appear at the final examinations as tron-coltegiate student and helshe shall not be eligible
for the awari of any scholarship or stipend. A student, appearing at the examination under._the
prescribed
benefit ofthis provision shall haveio pay, in addition to the regulff fees' the requisite fine
by the s5,ndicate for the PurPose
l l.3 Tie Cou.se mentioned above shall mean a course of study as described in the curricula and it may
be a theoretical or a laboratory course.
I 1.4 ituJ*t. nuring less than 6byo at endance in lecture/tutoriay laboratory will not be allowed to
appear at the final examinations ofthe semester.
I 1.5 Ti," teacher for his/her Class shall prepare an attendance report ofthe students. The-
,"po., ,t utt be submitted to the chairman of the Deparftnent within three days of the last class of
"on""In"d.ourse
the course. Awarded marks for class attendance of the students shall also be prepared by the
concemed course teacher and submitted to the Chairman of the Examination Committee, in a sealed
envelope.
12. The names ofthe students shall b€ stuck offthe rolls on any of the following grorurds:
I l2.l.l Non-payment ofuniversity fees and dues within prescribed period, or failure to appear at the
semester final exarnination due to shortage of the minimum required percentage of class
attendance.
12.1.2 Faiture to eam required GPA to get himselt/herself promoted to the next higher semester or
failure to appear at the semester examination after depositing examination fees.
12.1.3 Forced to discontinue his/her studies mder disciplinary rules and
t2.1.4 Withdrawal of names from the rolls of the University on grounds acceptable to the Vice-
Chancellor ofthe University after having cleared all dues.
12.2 Readmission ofa student whose name has been struck off
12.2.1 In case a student. whose name has been struck offthe rolls under clause l2.l.l seeks
readmission before the start of that semester with the batch that immediately follows on
recommendation of and with the date fixed by the academic commitlee of the department on
payrnent ofall the fees and dues. But ifhe/she seeks readmission in any subsequent year, the
procedure for his/her readmission wil[ be the same as described rurder clause 12.2.4.
12.2.2 ln case a student. whose name has been struck offthe rolls under clause 12.1.2 seeks
readmission b€fore the start of next higher semester with the batch that immediately
follows on recommen&tion of and with the date fixed by the academic committee of the
department on paynent ofall the fees and dues.
12.2.3 ln cas€ a Studsnt, whose name has been struck offthe rolls by exercise ofthe clause 12.1.3,
seeking readmission after expiry of the suspension period, shall submit an application to the
Chairman of the Departrnent before the commencement of the semester to which he/she
seeks re-admission. The Chairman of the Department shall forward the application to the
Deputy Registrar (academic). In case the readmission is allowed, the student will be
readmitted on pa),rnent of all the fees and dues within l0 working days from the date of
permission given by the proper authority.
12.2.4 No student who has withdrawn his,ter name under clause 12.1.4 shall be given readmission.
12.3 In case any application for readmission is rejected, the student may appeal to the Academic Council
for re-consideration. The decision ofthe Academic Council shall be linal.
12.4 All re-admission should preferably be completed before the semester starts. The percentage of
attendance ofthe readmitted student shall be counted from the date ofreadmission.
12.5 The application of a student for readmission will only be considered if he/she applies within one
academic year from the date he/she discontinues his/her studies in the University. The maximum
period of studies for B. Sc. Engg. Degree under no circumstance ryill exceed six academic years.
12.6 Dropping out: Students failing to eam the required GPA after completing regular examinations and
subsequently fail again after retaking the examinations in any semester in the stipulated period shall
be dropped out of the programme. A student will also be dropped out if he/she fails to appear at the
examination twice in a particular semester or more than twice in the entire Progra.m.
Departnent of Computer k€nce dnd Engln€ennc , UnveEry of Chtttagorn Page 34
13.2 A Grade Point Average (GI'A) shall be calculated for each semester as follops
ZCoc,
CGPA-
+^
L'^
where, nr is the total number ofcourses offered, C1 is the number ofcredits allotted to the tth course
and G1 is the grade point eamt:d for that course.
13.4 Conversion of CGPA to per,:entrge of Marks: The following formulae for conversion of CGPA to
percentage of Marks are reconrmended.
Y:79 + 84 (x 3.75); 3.75<x 4.00
+
Y= 44 20 (x - 2); 2.25 3.75 x
Here, X :
Obtained CGPA 1 = Percentage of Marks
Thus the percentage of marks of [Name] having Rolt No [RolU of session [Session] of the
departsnent of [Deptl is [percr:ntage marksl 7o.
13.5 A Cumulative Grade Point Averaie (CGPA) shall be calculated at the end of 8'h semester and to be
communicated to the student! along with the GPAs. The individual grades of courses obtained by
them for an individual semestr:r will be communicated at the end ofthe semester by the Chairman of
the Examination Committee.
13.6 In GpA or CGPA calculation, if either of them com€s up with fractional part and non-zero value
appears in the 3d and/or +,n a S,(.) after the decimal poini, the 2"d digit should be round up to next
hiitrer aigit. Illustration: (i) srrppose, a total of 32 credits are offered in a class and a student eams
total point secured (TPS) of 1 13 in that class, then hisiher GPA will be 3.54 while the precise value is
3.53125, (ii) suppose, a total o'26 credits are offered in a class and a student eams total point secured
(TPS) of 84 in that class, then hi*/her GPA will be 3.24 while the precise value is 3.230769..., (iii)
suppose, a total of 160 credits are offered in a 4-1ear program and a student eams total point secured
(TPS) of 585 in that program, then his/her CGPA will be 3.66 while the precise value is 3.65625.
(oq.oe.qo!c sfir{ q6E ,c+fsft+ +tBfrrsr* a.tb s{ {sl:I q) l\ fi6.fs q<t 5e.oe.lo)c qfu{ WCBE
frffi? 8bs s{ {srr ei\ fr6t.s c"c$G-s)
13.7 Earned Credit: The credits assigned to the courses in which a student obtains 'D' or higher grade
will be counted as credits eanred by the student. Any course in which a student obtains ,F, or .I,
grade wilt not be counted towrds his/her earned credit. 'F' or 'I' grade will be counted for GPA
calculation alld will stay permar€ntly on the Grade Sheet and transcript.
Depdrtrn€nt of Computer kience and Er8ineenns, Unversity of Chittasons Page 35
21.3 If a failed student earns lequired GPA for promotion as an irregular candidate in any semester
examination, s,/he shall nor be allowed to appear in any course/s s/he scored B-, C+, C, D or F grade
to improve his/her GPA ur der any consideration.
21.4. \f a student fails to appea- or fails in a Laboratory course of a semester $he shall be allowed to
appear at the l-aboratory c()urses only once with the batch lhat irnmediately follows with permission
of Academic Committee lf the Deparhnent failing which an "F" grade will be recorded in his
transcript.
21.5 The failed student shall appear at each semester examination as an irregular candidate, gorerally as
per syllabus in force with(,ut any re-admission. If any drasfic changes in the syllabus are made, the
irregular candidate shall appear at the examination in
his/irer original syllabus on the
recommendation of the Academic Committee of the department.
21.6 After completing a semest -'r as an irregular candidate, the above categories ofstudents shall have to
be admitted provisionally to the next higher semester within the date fixed by the Academic
Committee of the concemed department. If the student fails at the respective examination, his/her
provisional admission shall automatically be cancelled.
21.7 Ifa student fails to appear at the examination twice in a particular semester or more than twice in
the entire programme, s/he shall be dropped out ofthe programme.
21.8 A student failing to eam n inimum GPA 2.20 in the Eighth semester examination shall be heated as
a failed student. Such a student is allowed to improve his/her GPA by appearing in the Eighth
semester examination with the immediate next batch only as an irregular candidate, but it must be
within six consecutive ac;rdemic years from the session of hiVher fust admission. Failing which
s,4re shall be dropped out c f the programme.
courses of examination by the syllabus prescribed and the textbook, if any, recommended by the
University fiom time to tinre.
26.9 All co[ections and alterations in the manuscripts, question papers, marks placed in the scripts and
marks entered in the mark sheets must invariably be initiated by the person making the correction.
Over-writing in the case of marks should be avoided. The wrong figures should be crossed out and the
correct figures wdtten in c(,nvenient places. Doubtful entries should be indicated by words as well.
26.t0 If in the course of examiting the answer scripts the examiners have reasons to suspect that ary
candidate has adopted unfat means, he/she should at once submit confidential report to the Chairman
ofthe respective Examination Cornmittee giving the grounds for his,&er suspicion.
26.1 I The marks of each course of examination or a section thereof entered in the mark sheets in ink are to
be submitted to the Chairman of the respective Examination Co[unittee. A copy should also be
submitted separately to the Sonholler ofExaminations ofthe University.
26.t2 Ifany examiner is unable t) examine answer script, he/she should return the packet ofanswer scripts
immediately to the Chairman of Examination Cornmittee.
26.13 Immediately on receipt of :ach packet containing answer scripts of candidates, the examiner should
count the script and verify :he figures given in the statement (Top Sheet) regarding the details of the
answer scripts sent. Should any discrepancy be discovered, it should at once be brought to the notice
of the Chaiman of the Examination Committee with a report of the statement which shoutd be filled
in and rehrmed to the Chairnan of the Examination Committee immediately after receiving the answer
scripts, so that prompt action may be taken about the mattsr. If no report is received within three days
ofreceipt, it will be assumerl that the statement sent is accurate.
26.t1 Request to the question selters
26.14.1 To write the nranuscripts ofthe questions papers in English. To make sure that the
manuscripts ol questions are as clear and legible as possible, taking special care in
writing, so as t ) ensure accuracy in printing,
26.14.2 To retain no copy of the question paper fiamed by him,rher and to destroy all rough
draft and memorandum connected therewith immediately after being used properly,
and,
26.1.4.3 To sign at the tottom ofeach sheet ofthe manuscript question paper set by him-
28. Amendment
Any amendment ofthis ordinance sha I be proposed through the Faculty of Engineering and passed by the
Academic Council.
9s p"r -"cororannJrzlron ZcczJ"nr" CouncJ ";J" reso-/ultbn ao-66 Ae/J orz o?-o3-2o15 A
orf zzalA
tzpptttteJ 6y <9614,nee1,ng 9y' /A" SynJnale re'olulion no.4 Ae-lJ oa l3-o3-2o15
";c/"
(Professor Dr.Mohammed Kamrttl Huda )
Registrar
(In-.hargE)
University of Chittagong
&
Member Secretary
Ordinance Committee
oc.!t.to)s vlfrc{ q{68 teF{lRl q{qBiT )) E-{ TEtn rn"\ frfiEi fr.c{.fr- !&ffi.. qffirfrT{
q\r.{N+m^r{8:qffi qfrcthrjr{ qiT lgifri +*r qr rgfkft{lfrR-q{{rE-{ E-s,rs6+f{R.{dffr )e-e q|Tr
,{5rasftf rtBfrrrd \ttr v.[ qElir \rs i\ frqEe u-amrca-* e+i
oa.oo.foro #oq*{6.
qll )e.oe.\orc ql&a{;r vifi}s eer+o-* axu
sq rsll a{< frtEsq{a{fis {s
anfr.r-<r<*
r
First Semester
Computing Agents
CSE 113 Structured Progarnming Language 3
Second Semester
Third Semcster
Course Code Course Title Credits Hours/!Veek
Theory Laborator"v Theory Lqborato
CSE 3I I ect Oriented ho 3
CSE 312 ect Oriented ammln Lan Lab 2 1
EEE 32I tal c Desi 3 l
EEE 322 Digital Logic Design -ab I 1
Fourth Semester
Fifth Semester
Sixth Semester
Seventh Semester
Eighth Semester
Option -I
Option-II
DDTAILED SYLLABUS
First Semester
CSE 111 Introductlon to Computer Systems and Computing Agents
75 lelarks, 3 Credits, 3 lTourslWeek
Basic concepts: lntroduction, what is computer and computing agents, Types of
computers, History of computers, Generation of computers, and Specification of
computers; Computerization and Clobal Perspective, and Office Automation.
Ilardware Components: Basic organization and functional units of computers, Input
devices, Output devices, Central Processing Unit, Memory Devices, Basics of microprocessor.
Soft$,are Components: Types of software, System software, Application software; Introducing
Computer languages, Classification of computer language, machine language, Assembly language,
and high-level languages; Language translators - Interpreter, Compiler, and System Utilities.
Op€ratlng Systems: Introduction to Operating System and its Definition, Services, Component,
Associated Technology. Types of Operating Systems: Single User Systems, Multi-user System,
Graphical User Interface (GUl) Systems.
Computer Networks: Networking Basics, Uses of a lletwork, Simultaneous Access, Common 'l)pes
of Networks, Hybrid networks, Structure of networks, Network Topologies and protocols, Network
Media, Network Hardware; The Internet and World Wide Web, E-mail and Other Internet services.
Number Syst€m and Cod€: Binary, Decimal, Octal and Hexadecimal numbers, Conversions
between different number systems; Binary arithmetic, BCD and ASCII codes; Integer and Floating
number representation.
Loglc Gates and Boolean algebra: Different Types ofgates and their truth tables, Boolean
algebra, De-Morgan's theorem.
Computing Agents: Agents and Environments, Nature of Environments, structure of Agents;
Agent-based computing, micro-level and macro-level issues in agent-based systems; and the key
application areas for agent technologr.
Text Book:
1. Computer Fundamentals: M. Lutfur Rahman
Relerence Books
1. Introduction to Computers: Peter Norton
2. Computer Science: C.S. French.
3. Computer Science: Warford.
Tut Book:
l. Programming with C: Gottfried
Reference Books:
l. The C programming [anguage: B. Kernighan & D. Ritchie.
2. Teach yourself C: H.lchildt.
3. C how to Program: Deitel & Deitel.
4. Programming in ANI|I C: L. Balagurushami.
3. Electronic Devices and Circuit Theory,4th Edition, PHI: Boylestad & Nashelsky.
4. Engineering Circuit Analysis: Hal & Kemmerly.
5. Altering Currgnt Circuits: Korchner & Corcorn.
DDn n2 Electrical Engineering Lab
25 Marl<s, 1 Credit, 2 HoursMeek
(Recommended but not timited to the following topics)
. Implementation of KirchhofFs Voltage & Current law
. Maxwell Loop Current Technique using 2-3 Meshes and l-2 D.C. voltage sources
. Verification of Supper Position Theorem using 1-2 D.C. sources.
. Irnplementation of Thevenin's Theorem
. Irnplementation of Norton's Theorem
. Calculation of Current, Voltage and Power using Multi-meter.
. AC Transient Analysis, R, R-L, R-C & R-L-C
Tut Books:
l. A Textbook on Geometry and Vector Analysis: Rahaman & Bhattacharjee.
2. A Textbook of Matrices: Santi Narayan.
Reference Books:
l. Vector Analysis: S.A. Sattar.
2. Anallical Geometry of Conic Sections: C. Smith.
3. An Elementary Treatise on Solid Geometry: C. Smith.
4. Analyical Coordinate Geometry: S.L. Loney.
5. A Treatise on Three Dimensional Geometry: J.T. Bell.
6. Vector Analysis: M.R. Spiegel.
SECOND SEMESTER
CSE 211 Data Structures
75 Marks,3 Credits, 3 Hours/llteek
Basic: Basic Data Structues and R3presentation of Data. Data Structures Operations.
Linear Data Structwes: Arrays, llecords, Pointer, Linked Lists, Linked Lists with Sentinels, Stack
Queue, Dequeue and Priority Queur:, Recursion, Data Structues' Operations on Them.
Non Linear Data Structures
Trees: Binary Tree, Traversing Bir ary Trees, Inse ion Deletion and Searching, Binary Search Trees
B+ Trees, Indexing, Red-Black 'frees, Operations on Red-Black Trees, Heap, Heapsort, Heap
Property, Heapify, Building and Mr.intaining a Heap, Huffman's Algorithm, Binomial Heaps.
Graphs: Introduction to Graph, liequential and Linked Representation of a Graph on Memory,
Operations on Graph, Traversing a ,3raph,
Hashing Techniques: Characterisrics of Hash Functions, Collision Resolution, Probing Chaining
Perfect Hashing.
Data Structures for Disjoint Sets: Disjoint Set Operations, Linked List Representation of Disjoint
set, Disjoint Set Forests.
Augmenting Data Structures: Dy1amic order Statistics, How to Augment a Data Structure, Interva
Trees.
Searching and Sorting Techniques i r Different Structures.
T6t Book:
I I Data Structure: Silymour Lipschetz.
Reference Books:
I Introduction to Algorithms: T. Cormen et. al..
2 Fundamentals of d{ta structures in C++: Ellis Horowitz & Sartaj Sahni Mehta.
3 Data structwes in (l: Tanenbaurn
4 Fundamentals of C cmputer Algorithms: Etlis Horowitz & Sartaj Sahni.
5 Data Structures an<[Algorithms: Aho, Hopcroft, Ullman.
6 Algorithms. : Robert Sedgwick
Depdrtrn€nt of Computer Science and Engineerins, Unrversity of Chittasong
Page 49
Recommended Books:
l. Descriptive Geometry: S. Salaby.
2. Technical Drawing: Fredrick E. Giessecke, Alva Mitchell.
integrated-circuit Logic Famjlies: Digital IC Terminology, TTL Logic Family TTL Series
characteristics, open-collector TTL, Tristate TTL, ECL Family, MoS Digital lcs, MoSFET, cMoS
Characteristics, CMOS Tristate L rgic, TTL-CMOS-TTL Interfacing.
Text Book:
I Electronic devices E: circuit theory: Robert Boylestad & Louis Nashelsky.
Reference Books:
L Electronic Devices and Circuits: Abraham Bell.
2. Digital Electronics: '[aub & Schilling.
3. Digital Fundamentals: Floyd.
4. Pulse, Digital and Srvitching Waveform: Millman & Taub.
5. Integrated Electronirrs: Millman & Halkias.
6. Electronic principle: Albert Paul Malvino.
7. Digital Electronics: lt.P. Jain.
Text Book;
I Differential Calculus: Das & Mulherjee.
Reference Books:
l. Differential Calculus: Mohammmad & Bhattacharjee.
2. Differential Calculus: Ghosh & Maity.
3. Advanced Calculus: M.R. Spiegel.
4. Integral Calculus: Das & Mulherjee.
5. Integral Calculus: Mohammmad and Bhattacharjee.
6. Integral Calculus: Ghosh & Maity.
7. Integral Calculus: Md. Abu Yusuf.
Graphs: Representration, Isomlrphism, connectivity, Euler and Hamilton path, shortest path,
Planarity, Coloring.
Ilees: Introduction to Trees, Application of Trees, Tree Traversal, Spanning Trees, Minimum
Spanning Trees
Itlathematlcal Induction: Mathematical Induction, Recursive Definitions and structural Induction,
Strong Induction.
Text Bookgj
1. Discrete Mathematics and its Applications: Kenneth Rosen.
Reference Books:
1. Discrete Mathematics Structure with Applications to Computer S€ience: P. ftembly
& R.Monohar.
2. Sets, Lattice and Boolean Algebra: J.C. Abbott.
5. Introduction to friscrete Mathematics: Alan Doer.
4. Discret€ Mathematics: O. Nicodemi.
Gramman Grammatical hincipl:s, Modals, Phrases & Idioms, hefixes & Suffixes, Sentence
Structures, Wh & Yes/ No Questions, Conditional Sentences.
Vocabulary: Technical & Scientinc Vocabulary, Defining Terms.
Spoken Dnglish: Introduction Tc Phonetic Symbols, Dialogue, Responding To Particular Situations,
Extempore Speech.
Reading: Comprehension of Technical & Non-Technical Materials-Skimming, Scanning, Inferring
& Responding To Context.
Technical Writing: Paragraph 8l Composition Writing On Scientific & Other Themes, Report
Writing, Research Paper Writing, Library References.
Professional Communicatlon: E usiness Letter, Job Application, Memos, Quotations, Tender Notice
Text Books:
l. Technical Writing: John M. Lennon.
2. A Practical English Orammar: A.J. Thomson & A.V. Martinet.
Reference Books,
l. Oxford llandbooli of Commercial Correspondence: A. Ashley.
2. Writing Scientific English: J. Swales.
3, Complete Course in English: Robert J. Dixson.
4. Dssentials of Busin€ss Communications: Bajendra pal & J. S. Korlahalli.
Derf;/tlrfgnt of Cc/ilputet ScPJnce and Engneenrg, unMersry of Chittasons Page 55
TIIIRD SEMESTER
Introduction to Java: tlistory of Java, Java Class Libraries, lntroduction to Java Programming,
A Simple Program.
Developing Java Application: Introduction, Algorithms, Pseudo code, Control Structure, The If
/Else Selection Structure, The While Repetition Structure, Assignment Operators, Increment and
Decrement Operators, Primitive Data Types, Common Escape Sequence, Logical Operator
Control Structure: lntroduction, The For Structure, The Switch Structure, The Do/while
Structure, The Break and Continue Structure.
Itethods: Introduction, Program Module in Java, Math Class Methods, Method Definitions, Java
API Packages, Automatic Variables, Recursion, Method Overloading, Method of the Applet Class.
Arrays : Introduction, Arrays, Declaring and Allocating Arrays, Passing Arrays to Methods, Sorting
Arrays, Searching Anays, Multiple-Subscripted Arrays
Object-Based Programming: Introduction, lmplementing a Time Abstract DataType with a
Class, Class Scope, Controlling Access to Members, Utility Methods, Constructors, Using Overload
Constructor, Using Set and Get Method, Software Reusability, Friendly Members, Finalizers, Static
Class Members, Data Abstraction and Information Hiding
ObJ€ct-Oriented Programming: Introduction, Superclasses and Subclasses, Protected
Members, Using Constructor and Finalizers in Subclasses, Composition vs. Inheritance,
Introduction to polymorphism, Dynamic method building, Final Methods and Classes, Abstract
Superclasses and Concret€ Classes.
String and Characters, Graphics, Exception tlandling, Files and Stream, Java API, Utility Classes,
2D Graphics, CUI, Swing, Events.
Tertbok;
l. Java 2i The complete reference: Patrick Naughton & H. Schildt.
Referencc boks:
1. Java How to program: Deitel & Deitel. 2. Sun Java Tutorial.
Recommended Books:
l. Switching and Finite automata theory: Zvi Kohavi.
2. Digital systerns: R onald J. Tocci.
3. Digital Fundamentals: FloYd:.
Fourier Transformations: Fourier Series, Convergence of Fourier Series, Fourier Analysis, Fourier
Transformations and Fourier Integrals.
T& Books:
l. Theory of Mathernatics: Frank Ayres'
2. Mathematical PhYsics: RajPut.
Reference Books:
l. Complex Variable: M.R. SPiege[.
2. Functions ofa Conrplex Variable: B.S. Tyagi'
3. An Introduction to the Theory of Function ofa Cornplex Variable: E'T' Capson'
4. Theory ofFunction of Complex Variable: Shanti Narayan.
5. Complex Variable: V. Churchill.
6. Higher Engineering Mathematics: B.S. Grewall.
7. Mathematical Physics: RajPut.
8. Mathematical Physics: B.D. Gupta.
9. Laplace Transformation: M.R. Spiegel'
Text Book:
1. Economics: Blrons & Stone.
Reference Books:
l. Economics: Semuelson & Nordhous.
2. Modern Economic Theory: K. K.Deweft.
3. Advanced Economic Theory: H. L Ahuja.
4. Government ofBangladesh Various Five Year Plans.
Deparfir€nt ofComputer Scbrce at'd hginee E, Universlry af Chiftagon1 ?age 57
FOURTH SEMESTER
CSE 41l Design and Analysis of Algorithms
75 Marks, 3 Credits, 3 Hours./lVeek
Foundations: The Role of Algorithms in computing, Analyzing and Designing Algorithms, Time
and Space Complexity, Growth Of Functions. Notations For Describing Growth OfFunctions.
Recurrences: The Substitution Method, The Recursion-Tree Method, The Master Method, Proof Of
The Master Theorem.
Divide & Conquer Method: Binary Search. Finding The Maximum and Minimum. Merge Sort,.
Quicksort and Randomized Quicksort and Their Anallic Comparison.
The Greedy Method: Knapsack Problem. Minimum Cost Spanning Trees :Prim and Kruskal's
Algorithms. Single Source Shortest Paths - Dijkstra's Algorithm.
Dynamic Programming: Single Source Shortest Paths - Bellman-Ford Algorithm. All Pairs Shortest
Paths. 0/l Knapsack Problem. Matrix Chain Multiplication and Longest Common Subsequence
Algorithms.
Graph Algorithms: Breadth Ffust and Depth First Search in Graphs, topological Sod, Strongly
Connected Components,
Theory Of NP-Completeness. Coping with NP-Hardness. Approximation Algorithms. Heuristic
Algorithms,
TN BooK:
l. Introduction to Algorithms: T. Cormen et. al..
Reference Books:
1. Fundamentals of Computer Algorithms: Ellis Horowitz & Sartaj Sahni.
2. Algorithms: Robert Sedgwick.
3. The algorithm design manual; Steven Skiena.
4. Introduction to the Design and analysis of Alogrithms: Goodmann.
Database administrator, DatabasJ Users, Overall System Structue, Advantages and Disadvantage
ofa
Database Systems. Data Mining and analysis, Database Architecture, History of Database Systems
Relationship Entity-Model: Entities and Entity Sets, Relationships and Relationship Sets, Attributes,
composite and Multivalued Atrributes, Mapping constraints, Keys, Entity-Relationship Diagram,
Reducing of E-R Diagram to Ttbles, Generalization, Attribute Inheritance, Aggregation, Alternative
E-R Notatios, Design of an E-R l)atabase Scheme.
Relational Model: Structure ol Relational Database, Fundamental Relational Algebra Operations,
The Tuple Relational Calculus, l'he Domain Relational Calculus, Modifuing the Database.
Relational Commercial Language: SQL, Basic structure of SQL eueries, euery-by-Example,
Quel., Nested Sub queries, Conplex queries, Integrity Constraints, Authorizatioq Dynamic SeL,
Recursive Queries, Overview of .,L/SQL.
Relational Database Design: Pi.falls in Relational Database Design, Functional Dependency Theory,
Normalization using Functiona. Dependencies, Normalization using Multivalued Dependencies,
Normalization using join Dependencies, Database Design Process.
File and System Structure: Orerall System Structure, Physical Storage Media, File Organization,
RAID, Organization of Records into Blocks, Sequential Files, Mapping Relational Data to Files, Data
Dictionary Storage, Buffer Manatlement.
Indexing and Hashing: Basic Concepts, Ordoed Indices, B+ -Tree Index Files, B-Tree Index Files,
Static and Dynamic Hash Functi:n, Comparison of Indexing and Hashing, Index Definition in SQL,
Multiple Key Access.
Query Processing and Optimizrtion: Query Interpretation, Equivalence ofExpressions, Estimation
of Query-Processing Cost, Estimation of Costs of Access Using Indices, Join Strategies, Join
Strategies for parallel Processin;3, Structure of the query Optimizer, Transformation of Relational
Expression
Concurrency Control: Schedules, Testing for Serializability, Lock-Based Protocols, Timestamp-
Based Protocols, Validation Ter;hniques, Multiple Granularity, Multiversion Schemes, Insert and
Delete Operations, Deadlock Handling.
Distributed Database: Structure of Distributed Databases, Trade-off in Distributing the Database,
Design of Distributed Databas,:, Transparancy and Autonomy, Distributed Query Processing,
Recovery in Distributed Syste,ms, Commit Protocols, Concurrency Control, Shared Server
Configuration.
Data Mining: Data analysis anc. OLAP, Data Warehouse, Data Mining, Overview of Data Mining
Techniques Information Retrieval and Structured Data. Basic of Ontology.
Administrative Functionalities: Architecture of a Database, Concept of Physical and Logical
Databases Tablespaces, D,rtabase Creation, Maintaining Data Dictionary, Database
Backup./Recovery, Database maintaining and Performance Tuning, Data Guard- Physical, logical and
Standby Database.
Tul Book:
l. Database System (loncepts (5th edition): Abraham Silberschratz, Henry K. Korth, S.
Sudarshan.
Reference Books:
l. OCA Oracle l0g ,a dministration l, BpB publications: Chip Dawes, Bob Bryla et al.
2. Fundamentals of Database Systems 1994: Benjamin/Cummings.
3. Database Principler;, Programmi ng, 1994. performance: Morgin Kaufmann.
4. A First Course in fratabase Systems, 1997: prentice Hall.
5. Database Managenrent Systems, 1996: McGraw Hil[.
6. Data Mining conctpts and Techniques: Jiawei Han, Micheline Kambsr.
Jian pei.
D@artrnent of Computer Science dnd Engin€ering Unrversity of Chittogons Page 59
CSE 4f 5 Microprocessors
75 Marks, 3 Credits, 3 Hours/Week
Information Representation, Measuring Performance.
instructions and Data Access Methods: Operations and Operands of Computer Hardware,
Representing instruction, Addressing Styles.
Arithmetic Logic Unit (ALU) Design: Arithmetic and Logical Operations, Floating Point
Operations, Designing ALU.
Processor Design: Datapaths-Single Cycle and Multicycle Implementations.
Control Unit Design - Hardwared and Microprogrammed, Hazards, Exceptions, Pipeline: Pipetined
Datapath and Control, Superscalar and Dynamic Pipelining.
Memory Organization: Cache, Virtual Memory, Channels, DMA and interrupts, Buses.
Multiprocessors: Types of Multiprocessors, Performance, Single Bus Multiprocessors,
Multiprocessors Connected By Network, Clusters.
TdBook:
1. Intel microprocessors: Architecture, Programming and Interfacing: Berry & Brey.
Reference Books:
l. Microprocessor and System Design: Gibson & Cheu.
2. Microprocessor and Computer based System Design: Md. Rafiquzzaman.
3. Microprocessor Fundamentals: Tokhein.
4. Microprocessor and Interfacing: D.V. Hall.
T&Book:
1. Applied Numerical arralysis: Gerald & Whitney.
Reference Books:
1 NumericalMethod:,3alagnrrsamy.
2 Information Technology and Numerical Method: Kahate.
3 Numerical Method For Engineers: Chapra.
FIFTH SEMESTER
CSE 5Il Operating Systems
75 Marks, 3 Credits, 3 Hours/lleek
Text Book:
ISoftware Engineering: I. Sommerville.
Reference Books:
ISoftware Engineering: Principles and Practice written by Waman S Jawadekar
2A Practitioner's approach: R. Pressrnan & Software Engineering
3Java Design Patterns, A Programmer Approach : Pankaj Kumar
4Object-Oriented Analysis and Design Using UML : Mahesh P. Matha
5Java: How to Progranq 8th Edition, written by Paul Deitel and Harvey Deitel
Text Book:
I Computer Organization & Architecture: William Stallings.
Reference Books:
l.Computer System Architecture: M. Morris Mano.
2.Digital Logic and Conrputer Design : M. Morris Mano
3.Computer Organization: V.C. Hamacher, Z.G. Vranesic & S.G. Zaky
4.Computer Architectur,: and Organization: J.P. Hayes.
5.Structured Computer Organization: A.S. Tanenbaum.
6.Computer System Architectue: M.M. Mano.
7.Computer Architecturt:: Whang.
Text Book:
l. Cyber security: Nina Gobole & Sunit Belapune; Pub: Wiley India
Reference Book:
I. Cyber law text & cases: Gerald R. Ferrera.
ACC 59f Accounting and Management
75 Marks, 3 Credits, 3 Hours/lleek
Introduction: Meaning Nature, Evaluation, Frurctions, Principles of Management, knpact of Environment On
Management.
Planning: Meaning Importance Types- Premises-Limitation of Planning.
Organization: Theory and Principle ofOrganizing- Division of Works-Decentralization- Span ofManagemenl-
Dalyation of Authority-Committee- Decentralization-Coordination-Conholling.
Personnel Management: Meaning, Importance, Scope, Functions of Personal Management: Motivation,
Participation Managemenq Selection, Promotion-Training, Wages and incentives. Groups-Management of
Organizational Change and Confl icts-Leadership.
Cost & Financial Management: Elements of Costs of Products {alculation of Cost of Production-Cost
Volume- Profit Anal)sis- Relevant Cost For Decision Making, Budget and Budgetary Control.
Marketing Management: Concept-Natue-Function-Marketing, Mix Stralegy, Patents Law.
Technology Management: Management of innovation, Technology Life Cycle.
industrial Law in Bangladesh: Factories Act, industrial Relation Ordinance, Workmen's Compensation Act.
Principles of Accounting: Transactions, Ledger Books, Cash Book, Accounting hocedures, Trial Balance,
Financial Statements, Single Entry Slstem, Company Final Accounts.
Teg Books:
I Management: Robbins.
2 Management: Griffin.
Reference Books:
l. Advanced Accounting: Md. Muinuddin Khan.
2. Bangladesh Labor and Industrial Law: Prof. A.A. Khan.
3. Cost accounting- a managerial emphasis: Horengren.
4. Marketing Management: Kotler.
De-partrr'€nt of CoinFder Science and Engine€riE, i_lnivelsity of Ch,ttogong Page 66
SIXTH SEMESTER
CSE 611 Computer Interfacirrg and Microcontroller
75 Marks, 3 Credits, 3 Hours/ll'eek
Interface Components and Their Characteristics, Microprocessor UO. Microprocessor Bus Signals.
Hardware and Software Intemrpt r\pplicatiors.
Digital Interfacing: Programminll Parallel Ports and VO Handshaking. Interfacing Microprocessor to
Keyboards, Interfacing to Alphanumeric Displays. SCSI. Serial Interface Principles, Asynchronous
and Synchronous, RS232 and EIA.562 Standards.
Analog Interfacing and Control: Op-Amp Characteristics and Circuits, Sersors and Transducers.
D/A and A,/D Converters - T)?es r)perations, Interfacing and Applications.
PCI, ISA Architectures.
Microcomputer System Periphelals: Microcomputer Displays, Computer Vision. Disk Data Storage
Systems. Disk Controllers and Inttrfaces, Magnetic Disk Format, Organization and Head Positioning.
Optical Disks - Optical Positionirg, CD-ROM and DVD Disks. Printer Mechanism and Interfacing.
Speech Synthesis. Barcode.
Texl Book:
l.
Microprocessors and irrterfacing: Hardware and Software: Dauglas V. Hall.
Reference Book:
2.Computer peripherals: Barry M. Cook.
Servers, Network Security: cryptography, DES, IDEA, Public Key Algorithm; Authentication:
Digital Signatures.
Text Book:
1. Computer Network: Andrew S' Tanenbaum'
Relerence Books:
1. Computer Networking: A top down approach: Kuross'
2.
t-ocai Area Networks and Distributed Processing: James Martin'
3. Locat Area Network: Johan E. McNamara.
4. Computer Networks and their Protocols: D'W' Davies'
6. Linked Data: Evol ring the web into a Globar Data Space, Morgan & claypool,20l 1:
Tom Heath,Christi rn Bizer.
IIoT,:Eo9 Technology: HTML, XI{TML, XML. CSS Styling, Layout, Selector, Documenr Object
M_odel and Javascript. crient-I'rogramming: web Apis witl
Javascript 1E*"-pr"-,- C"ogr" aj*
API). MVC: Understanding Molel, View and Controllei Model.
Understanding Web Apis: RESIT, XML, JSON, RSS parsing.
Javascript Exercise: The Goal of rhis Assignment Is To Allow you To Explore and Use As
Many of
Javascript's Objects, Methods, and Propoties As Possible in A Snrall Assignment. Some Functions
Must Be
Written From Scratch. Other Funcrions, Appropriately Attribute( May Be Downloaded From The
Web and
Used As A Part of The Systern Or As The Basis For your Own Frmctions.
PHP Exercise: Build A Sa ofPHP Scripts That Perform Some Dynamic Server Side Functionality.
Understanding Plug-ins: Develqr A Firefox Extension.
Recommended Book:
l. Internet & World Wide Web How To Program: Deitel & Deitel.
Regular Languages: Finite Aut,rmaton, Examples of Finite Automata, Designing Finite automata,
Equivalence of NFAs and DFAs, The Regular Operations - Closure under the Regular Operations.
Regular Expressions. Equivalence with Finite Automata. Non-Regu,"r Languages - The Pumping
Lemma for Regular Lang,rages, Regular Grammar.
Context-Free Languages: Forrnal definition of a Context-Free Grammar (CFG) - Examples of
CFGs. Ambiguity, Chomsky Norral Form. Efficient CFG Parsing with CYK Algorithm, Pushdown
Automata, Formal Definition of a Pushdown Automaton, Examples of Pushdown Automata,
Equivalence with CFG, The Pumping Lemma for Context Free Languages.
Computability Theory: The Church-Turing Thesis. Turing machine, Nondeterministic Turing
Machines, Hilbert's problems.
Decidability: Decidable Languagt:s, Halting Problem - Diagonalization Method.
Complexity Theory: The Classes P, NP, Examples of Problems in these Classes. The P Versus NP
Question. NP-Completeness, Poll nomial Time Reducibility, The Cook-Levin Theorem. Examples of
NP-Complete Problems: The Verlex Cover Problem - The Hamiltonian Path Problem - The Subset
Sum Problem. Approximation Alg,nithm, Probabilistic Algorithms.
T*t Book:
I . Introduction to the theory of computation: Michael Sipser.
Reference Book:
1. Introduction to Autonnta Theory, Languages and Computation: Hopcroft, Motwani &
Ullman.
2. Elements of the theory of computation: Lewis & papadimitriou.
3. An introduction to forrnal languages and automata: peter Linz.
4. Switching and Finite Automata Theory: Zvi Kohavi.
Departrnent of Co.nputer Science and Engi,re€ing Unrversrty of Chittagong
Page 69
Reference Book:
2. Communication Engineering: J.S.Chitode.
Language Laboratory Practice: I. Introductory Lecture to help the students get a clear idea of
Technical Communication & the need of Language Laboratory Practice Sessions. II) Conversation
Practice Sessions: (To be done as real life interactions) a) Training the students by using Language
Lab Device/Recommended Texts/cassettes /cd's to get their Listening Skill & Speaking Skill honed b)
Introducing Role Play & honing over all Communicative Competence III) Group Discussion
Sessions: a) Teaching Strategies of Group Discussion. b) Introducing Different Models & Topics of
Dep6rtrn€nt of Computer Sc€nce and Er8in€erir8, Unverst/ of Chttasore Pa ge 70
Group Discussion c) Exploring Live /Recorded GD Sessions for mending students' attitude/approach
& for taking remedial meirsure. Interview Sessions: a) Training students to face Job Interviews
confidently and successfully b) Arranging Mock Interviews and Practice Sessions for integrating
Listening Skill with Speaking Skill in a formal situation for effective communication I\.)
Presentation: l)Teaching Presentation as a skill Strategies and Standard Practices of Individual /Group
Presentation II)Media & Means cf Presentation: OHP/POWER POINT/ Other Audio-Visual Aids. V)
Competitive Examination: a) It4aking the students aware of Provincial Nationaylnternational
Competitive Examinations b) Sh ategies/Tactics for success in Competitive Examinations c) SWOT
Analysis and its Applicatioa ia f;1ing Target
Text Book
English Langulge Laboratory: A Comprehensive Manual PHI Learning. 201l:
l.
Nira Konar.
Reference Book
I . Advanced Martual for Communication Laboratories & Technical Report Writing
Pearson Educaticn (W.B. edition), 201l: D. Sudharani.
Depdrtnent of Cornputer Scierre drd Engineenng Unwersiv of Chitt€o.rg Page 7l
SE VENTTI SEMESTER
InlrOdUCtiOn toComputu Graphics. Display Devices and Software. Basic Raster Graphics Algorithms
Viewing, Clipping and
io. n"Ung 2D primitiva: Two Dimensional and Tfuee Dimensional Polygon Surfacg B-Spline
Transformations, Projections; Three Dimensional Object Representation:
curves and Surfaces, BSP Trees, octrees. Fractal Geometry Methods;
visible Surface Detection
Methods: Z-Buffer Method, BSP Tree Metho4
Rendering, Ray
nay Castng fvfethod: Illumination Models, Surface Rendering Methods,: Polygon
Details with Texture Mapping;
f.,i"i"gt*ii, Visualisation with Height Mapping, Modeling Surface
Color and Shading Models;
Text Book:
1. Principles and practices in C: James Foley et al: Computer Graphics'
Reference Books:
1 .
Procedural Elements of Computer Graphics: David F' Rogers'
Theory and Problems of Computer Graphics: A. Plastock & G' Iklley'
2.
3.
Computer Graphics A Programming Approach: Steven Hanin$on'
4.
Pattern Recognition Principle: Gonzaleg.
5.
Principle of Interactive Computu Graphics: Newman-Sprocell
6.
Computer Graphics: Roy A. Plastocl Gordon Kalley.
o Draw a wire-cube using slope independent (scan conversion) mid-point line draw
algorithm and projection matrix (using glVertex2i0))
r Draw interactively animated RGB color cube (e.g., mouse dragging based rotating cube).
o Draw interactively animated RGB color cube (e.g., Keyboard controlled based rotating
cube)
o Draw animated RGB color cube, where the rotation and translation is calculated using
geometric transformation matrices
o Draw a solid spher{s), where different type of illumination / reflection property is
controlled by keyboard
o Draw a solid sphere(s), where position of point light source is controlled by mouse
motion.
o Draw a texture mapped solid cube (each face is mapped with diffuent textures)
o Draw animated circl(s) using (scan convosion) mid-point circle draw algorithm (e.g.,
slowly moving from left to right)
o Draw animated ellipse(s) using (scan conversion) mid-point circle draw algorithm (e.g.,
slowly moving from left to righ|
. Draw a texture mapped solid sphae(s)
o Draw a wheel using slope independent (scan conversion) mid-point line draw algorithm
and mid-point circle draw algorithm
o Draw an animate( ball tlropping on a floor (apply effect of gravity on the ball)
D€porurRrt of ComNter Scierce ard ErEineeins, UniveGity of ChittasorE
Page 711
The knowledge unils in this area c.ollectively encompess thefollowing: f, Recognition that security is
risk management and inherently includes tradeoffs, (ii) Familiarity"witi the iiptications
of hostile
users and misuse cases, (iii) A framework for understanding algorithms and
other technological
measures for enhancing security, and (iv) Strategic and tactical design issues in
information security.
History' overview, and principles: State examples of famous security breaches and denials of
service, Discuss common comp rter crime cost estimates and the difficulty of estimating
them,
Discuss the professional's role in security and the tradeoffs involved, Explain
and defend the use of
each of various security princirles, Explain and defend the use of each of various security
mechanisrns, for example least privilege, fail-saf'e defaults, complete mediation, separation
ol
privilege, and psychological acceptability.
Relevant tools, standards, andror engineering constraints: Discuss the major provisions of a
relevant law such as HIPAA or tre EU Data Protection Directive, Summarize inteliectual property
and export control laws affectin.3 security, especially encryption, Articulate some challengis oi
computer forensics.
Data security and integrity: De{ine confidentiality and integrity, Give examples of systems where
integrity alone is sufficient, Define "perfect forward secrecy" and explain why ii is deshable.
Vulnerabilities and exploitation: Define misuse cases and explain its role in information security,
Perform a simple fault tree analysis, Explain the types of errors that fuzz testing can reveal, Discuss
issues related to the difficulty ofupdating deployed systems, Explain the role code reviews in system
security, Define the problem of insecure defaults, Explain the tradeoffs inherent in responsible
disclosure,
Resource protection models: Explain the pros and cons of various discretionary and mandatory
resource protection models, Illustlate an access control matrix model, Define the Bell-LaPadula
model,
Secret and public key cryptography: State the motivation for putting all encryption algorithm
variability in the keys, Discuss the effect of processing power on the effectiveness of cryptography,
Explain the meaning of and relationship between the thee basic classes of cryptographic attacks:
ciphertext only, known plaintext, chosen plaintext, Discuss the similarities and differences among the
three basic ttpes of cryptographic functions: (zero-, one-, and two-key): hastr, secret key, and public
key, Discuss block and key length irisues related to secret key cryptography, Demonstrate and discuss
the motivations and weaknesses in various methods for applying secret key (block) encrlption to a
message stream such as cipho block chaining (CBC), cipher feedback mode (CFB), and counter
mode (CTR).
Message authentication codes: Explain why hashes need to be rougbly twice as long as secret keys
using the birthday problenr, Discuss the uses of hashes for fingerprinting and signing, Discuss the key
properties of a cryptographic hash function contrasted with a general hash function
Network and web security: Describe the goals of Transport layer security (TLS) and how they are
attained using secret and public key methods along with certificates, Discuss the reasons for using a
firewall, various topologies, and firswall limitations. Describe the basic structure of URLs, HTTP
requests, and HTTP digest authentic'rtion as they relate to security, Explain the use of HTTP cookies
including session cookies, expirati<'n, and re-authentication for key operations, Define cross-site
scripting, Explain an SQL injection attack and various methods of remediation.
EIGHTH SEMESTER
CSE 800 Project / Thesis
100 Marks, 4 Credits, S Hours/Week
Distributed Object Based Systems: CORBA, Distributed COM. Distributed File Systems: SUN,
CODA, Plan 9. Distributed Document Based Systems: WWW. Distributed Coordination Based
System : SETI@Home, Grid Computing.
Text Book:
1. Distributed Systerns: Concepts and paradigms: Andrew S Tanenbaum.
Reference Book:
1. Distributed Systems - Concepts and Design: G. Coulouris, J. Dollimore & T. Kindberg:
Clustering and Unsupervised Learning: Leaming From Unclassified Data. Clustering. Hierarchical
Aglomoative Clustering. K-Means Paditional Clustering. Expectation Maximization @M) For Soft
Clustering. Semi-Supervised Leaming with EM Using Labeled and Unlabled Data.
Dimensionatity Reduction: Principle Component Analysis (PCA). Kernel PCA, Linear Discrimirnnt
tunlysis(LDA).
Experimental Evaluation of [,earning Algorithms: Evaluation of performance of a classifia: Holdout
method, Random sanpling Cross-validatioq Bootstrap. Estimating a confidence interval for accuracy.
Conparing the perfornrance of two models. Conparing the performance of two classifiers.
Tat Book:
1. Introduction to machine leaming (2nd edition), MIT Press, 2010: Alpaydin & Ethem.
Reference Books:
I .Machine Leaming, McGraw Hill, 1997: Tom_Mitchell.
2.An Introduction to Support Vector Machines and Other Kernel-based Leaming Methods,
Cambridge University Press: Nello Cristianini & John Shawe-Taylor.
3.Pattern Recognition and Machine Leaming: Chirstopher M. Bishop.
Te* Book:
l. Ftzzy logic with engneering applications: Timothy J. Ross, John Wiley and Sons.
Depatrnent of Computer Sclenc€ and Ensineerins, University of Chittagons Page 79
Reference Books:
l. "Neural Networks, Fttzzy Logic and Genetic Algorithms", PHI: S- Rajasekaran and
G.A.V.Pai.
2. Principles of Soft Computing: S N SivanandanL S. Sumathi, John Wiley & Sons
3. Genetic Algorithms in search, Optimization & Machine Learning: David E. Goldberg
4. Neuro-Fuzzy and Soft conrputing, Jang, Sun, Mizutani, PHI
5. Neural Networks: A Classroom Approach,l/e by Kumar Satish, TMH,
6. Genetic Algorithms in search, Optimization & Machine Learning: David E. Goldberg,
Pearson/PHI
7. A beginners approach to Soft Computing, Samir Roy & Udit Chalaaborty, Pearson
8. Flzzy Sets and Fuzzy Logic Theory and Applications, George J. Klt and Bo Yuan,
Prentice Hall
9. Neural Networks: A Comprehensive Foundation (2nd Edition), Simon Haykin, Prentice
Hall.
From Business to E-Business: E-Commerce Vs. E-Business, B2B Vs B2C, Business Models,
Community Building, Auctions and E-Cards. Starting Site: Distributed Applications, Software
Requirements,
Building The Object Model: Components and Framework. Structudng Online Store:Design,
Maintenance and Administration. Checkout. Order Processing:Building Pipeline, Creating Extranet,
Security and Authentication: Credit Card Authorization, Finalizing and Canceling An Order. Secure
Communications: Cryptography, Obtaining A Certificate. Hosting, Development and Deployment:
Privacy Statements, Guidelines, Protection. Customer Services. Search tool.
Integration with Other Systems; XML. WAP and Immerging Technologies; Products and Services;
Cell Phone, PDA and Other Handheld Devices. Marketing: Tracking Success, Search Engines,
Banner Advertising, Other Marketing Opportunities.
E-Governance: Governance Via Information Systems. Opportunities and Technical Challenges.
Appropriate Technologies. E-Govemance In Practice: Case Studies; Pitfalls.
Tut Book:
l. E- Commerce, with VE|, ASP,SQL, server 7 and MTS, Wrok press Ltd: Matthew
Reynolds.
Reference Book:
l. E-Commerce 2Ol1 (7th Edition) (Pearson Custom Business Resowces): Kenneth C.
Laudon.
CSE 7f 9 Robotics
75 Marl<s, 3 Credits, 3 Hours/Ileek
Basics: Introduction, Recursive State Estirnation, Gaussian Filters, Nonparametric Filters, Robot
Motion, Robot Perception.
Localization: Mobile Robot Localization: Markov and Gaussian, Mobile Robot Locatzation: Grid
and Monte Carlo .
Mapping: Occupancy Grid Mapping, The Graphslam Algorithnl The Fastslam Algorithrn
Planning and Control: Markov Decision Processes.
Social Robots (Sociable Creatures): Historical Backgrounds (Cognitive Robotics), Cognitive
Science (Situated CognitiorL Embodied Cognitiorq Ecological Approach,Socio-Cultural Approach),
Studies In Social Interaction @thno Methodologies, Conversation Analysis), Survey of Socially
Interactive Robots, Desigrring Sociable Robots, , Human-Dependent Robots, Interactive Robots In
Autism Therapy.
DepartrrEnt of Cornpner Science and Ensinee ing UnMe6rty of Chrtt€ons Page 80
Tqt Book:
l. Sebastian Thrun, W:lfram Burgard and Dieter Fox: Probabilistics Robotics, The MIT
press, 2006
Reference Book:
1. Human-Robot Interaction in Social Robotics: CRC Press,September 26,2012: Takaytki
Kanda; HAoshi Ishiguro.
Elgamal
Cr,?tosystem and Discrete Logs, Merkle-Hellman Knapsack System; Signature Sche-mes:
Sig"atuie Schemes, Digital SiBararure Standar4 Fail-Stop Signatures; Hash Functions: Signatures and
Hash Functions, Collision-Free Hash Functions, Birthday Attack; Key Distribution and Key
Agreement: Key Predistribution, Kerboros, Diffie-Hellman Key Exchange; Identification Schemes.
Nc:twork Security Practice: E-Mail Security, DNS Security, Wireless Security, Ipsec, Web Security,
System Security, Attacks, Intruders, Firewalls.
Querying DW: MDX query, S{)L query, Comparison of MDX and SeL query, OLAp tools.
Physical DW design: Physical nodeling of DW, Materialized views, Data cube maintenance.
Extraction, Transformation, and Loading @TL): Business process modelling notation (BPMN),
Conceptual ETL design using BPMN, Integation services and PDI (Kettle).
Exploratory OLAP: DW and the Semantic Web (SW), SPARQL, RDF representation of
multidimensional data, RDF QB vocabulary, QB4OLAP vocabulary, SETL tool.
Text Book:
1 . Data Warehouse Systems Design and Implementation: Alejandro Vaisman, Esteban
Zimanyi
2. Data Warehouse l)esign Modern Principles and Methodologies: Matteo Golfarelli,
Stefano Rizzi.
3. Multidimensional ftatabases and Data Warehousing: Christian S. Jensen, Torben Bach
Pedersen, Christian lhomsen.
Introduction to Management Inlormation System and Strategic Information Systenr, Hardware and
Software Evaluation In Busineris Environment, Introduction to Telecommunication and Database,
End-User Computing, Decision Support Systenr, Information Reporting Systenr, and Executive
Information System: Business S'rstem Design, Information Ethics and Other Related Issues.
Text book:
l.Management Infor nation System: Charles Parker.
Reference Book:
1. Management Infor mation Systems, Fourth Edition, Prentice Hall, 1996: Kenneth C.
Laudon & Jane P. .-audon.
Simulation Modeling Basics: S ystems, Models and Simulation; Classification of Simulation Models;
Steps In A Simulation Study; Cr,ncepts In Discrete-Event Simulation: Event-Scheduling Vs. Process-
Interaction Approaches, Time-l.dvance Mechanisr4 Organization of A Discrete-Event Simulation
Model; Continuous Simulation Models; Combined Discreet-Continuous Models; Monte Carlo
Simulation; Simulation of Queuitg Systems.
Buitding Valid and Credible Simulation Models: Validation Principles and Techniques, Statistical
Procedures for Conparing Rqrl-World Observations and Simulation Outputs, Input Modeling;
Generating Random Numbers and Random Variates; Output Analysis. Simulation Languages;
Analysis and Modeling of Some Practical Systems.
Text Book:
l. System Simulation: (ieofhey Gordon.
Reference Book:
l. Discrete-event Systern Simulation: Banks J. & Carson JS.
Text Books
l."Pervasive Computing", Burkhardt, Pearson
2."Mobile Communication", J. Schiller, Pearson
3."Wireless and Mobile Networks Architectures", Yi-Bing Lin & Imrich Chlamtac,
John Wiley & Sons, 2001
4."Mobile and Personal Communication systems and services", Raj Pandya, Prentice
Hall of India, 2001.
Reference Books :
1. "Guide to Designing and Implementing wireless LANs", Mark Ciarnpa, Thomson
leaming, Vikas Publishing House, 2001.
2. "Wireless Web Development", Ray Rischpater, Springer Publishing,
3. "The Wireless Application Protocol", Sandeep Singhal, Pearson .
4. "Third Generation Mobile Telecommunication systerns", by P.Stalronlakis,
Springer Publishers
The Application of Geographical Information Systems: Purpose and Users of GIS, Public Utilities,
Resources Analysis, Urban Pla:rning and Decision Support. Global Scale Applications: Intemational
Initiatives; Global Data Capture and Referencing. GIS In Practice, Map Analysis, Spatial Data
Searches Etc. cost and Benelits of GIS. GIS and Global Science. GIS and spatial cognition.
Knowledge Based Techniques In GIS.
Text Book:
IDavis: GIS- A Visual Approach.
Reference Books:
L Principles of Geogr aphic Information Systems: O. Huisman, R.A de
2. Application of Geographic Information Systems: Bhuiyan Monwar Alam.
Text Book:
l. Parallel Computing -Theory and Practice -Michael J. Quirm (McGraw Hill Inc.)
Reference Book:
l.
Design and Analysis of Parallel Algorithms- S.G. Akl (PH)
Text Book:
l.
Data Science for Business: Fundamental principles of data mining and data
analytic thinking: Provost & Fawcett.
Reference Book:
l. Doing data science: O'Reilly Media.
Human Perception, Ergonomics, Cognition, and Psychology, Task Analysis, User Interface Design,
Interface Programming, System Evaluation, virtual reality, usability engineering.
T*t Book:
l.
Human Computer Interaction: Alan Dix, Janet Finlay.
Reference Book:
l. Designing the User Interface, 5'h Edition: Ben Shneiderman and Catherine Plaisant.
CSE 817 Wireless Sensor Network
75 Marks, i Credits, 3 Hours/Week
Introduction of ad-hoc/sensor networks, Key definitions of ad-hoc/sensor networks, Advantages of
ad-hoc/sensor networks, Unique constraints and challenges, Driving Applications, Wireless
Communications,/Radio Characteristics, Ad-Hoc wireless networks, Media Access Control (MAC)
Protocols, Issues in designing MAC protocols, Classifications of MAC protocols, MAC protocols,
Routing Protocols, Issues in designing routing protocols, Classification of routing protocols,
Networking Sensors, Unique featues, Deployment of ad-hoc/sensor networh Sensor tasking and
control, Transport layer and security protocols, Sensor Network Platforms and Tools, Berkley Motes,
Sensor network programming challenges, Embedded Operating System, Simulators, Applications of
Ad-Hoc/Sensor Network and Future Directions, tlltra wide band radio communication, Wireless
fidelity systems.
Text Book:
l.Protocols and Architectures for Wireless Sensor Networks WILEY (ISBN: 0-470-09510-5):
Holger Karl and Andreas Willig.
Reference Books:
l. Ad Hoc Wireless Networks: Architectures and Protocols: C. Siva Ram Murthy and B. S.
Manoj (Prentice Hall, 2004)
Departnent of Computer ScEnce and Engtn(tenns, Unversity of Chttdgons Page A6
graphical, DFT/IDFT and matrix methods, linear filtering using DFT, aliasing error, filtering of long
data sequences - Overlap-Save and Overlap-Add methods with examples and exercises.
Fast Fourier Transform:
Radix-2 algorithm, decimation-in-time, decimation-in-frequency algorithms, signal flow gaphs,
Butterflies, computations in one place, bit reversal, examples for DIT & DIF FFT Butterfly
computations and exercises.
Filter Design:
Basic concepts of IIR and FIR filters, difference equations, design of Buttoworth IIR analog filter
using impulse invariant and bilinear transforrns, design of linear phase FIR filters, no. of taps,
rectangular, Hamming and Blackrnan windows.
Digital Signal Processorl
Elementary idea about the architecture and important instruction sets of TMS320C 541616713
processor, writing of small programs in Assembly Language.
FPGA:
Architecture, different sub-systems, design flow for DSP system design, mapping of DSP algorithms
onto FPGA. 3L
Text Book:
l. Digital Signal Processing - Principles, Algorithms and Applications: J.G.proakis &
D.G.Manolakis, Pearson Ed.
Reference Books:
1. Digital Signal processing -A Computer Based Approach: S.K.Mitra,TMH publishing
Co.
2. Digtal Signal Processing Signals, Systems and Filters: A. Antoniou, TMH publishing
Co.
3. \ILSI Digital Sigral Processing Systems Design and Implementation,Wiley
Intemational Publication.
4. Digltal Signal Processing with Field Programmable Gate Arrays: U.Meyer-Baese,
Springer.
5. Digital Signal Processing: P. Rameshbabu, Scitech publications (India).
6. Digital Sigral Processing: S.Salivahanan, A.Vallabraj & C. Gnanapriya, TMH
Publishing Co.
9. PostgraduatePrograrn
9.1. Ordinance ofthe NLS. Engineering program
flniversity of Chittagong
Faculty of Engineering
Academic Ordinance for the degree of Master of Science in Engineering
rlbbreviated as M.S. Engg.
(\o.or.to!8 qRF{\TiOvlfiffirq{srB:oqrEE tn\frqE € r.s.ob.to)8 qfu@e qffirrtr ffi& nqf{ 8il ffwcqfitqr{{
w*r attfr tg o< c+treft-+4tEfur rErs ffi rrftF q{rflfrq)
1. DEFINITIONS
2.1 M.S. Engg. programme w.ll consists of three semesters with a thesis or project and shall be
completed by a student in not more than 3 (three) academic years.
2.2 The curricula ofthe M.S. Engg. degree in different departments shall be as proposed by the
Committee of Courses and Studies and approved by the Syndicate on the recommendation of
the Academic Council.
2.3 The Committee of Courses and Studies of each department shall review the curricula at least
once in two consecutive Academic Years and recommend changes and revisions if any and
must be approved by the raculty. The committee of courses will also recommend a list of
courses along with their rnarks and credits. The recommendations of the Faculty will be
placed to the Academic Council for approval.
2.4 Teaching of the courses ir; reckoned in terms of credits and the credits allotted to various
courses will be determined by the Cornmittee of Courses under the following guidelines:
hour.
Nature ofcourse No. ofcredits .contact
(rn a semester)
Theoretical Lecture : 1 I hour/week
Project : 8 24 hours/week
Thesis : 12 36 hours/week
2.5 Contact Hours/week: Th: total contact hours for the regular students including lecture,
tutorial, class tests etc. shrrll be between 12 - 36 periods per week, each period being 45
minutes in duration. The academic committee of the concerned department will allocate
courses from the approved list of courses in each semester considering the available expert
faculties of the department.
Deportment of ComMer Scrence dnd En3neerins, Unrversty of Ch ttasons Page B9
4. DEGREES OFFERED
The Faculty shall offer programmes leading to the award of the following degrees
4.3 Any other degree that may be awarded by a depadment on the approval ofthe Syndicate
on the recommendation of the Faculty of Engineering and the Academic Counci[ of the
University.
5. BRANCHES
There shall be not more than four branches in a Department. The number ofbranches will be decided by
the Academic Committee of the concemed Department on the basis of the diversity of the courses and
the availability of sufficient number ofbranch related teachers.
6. ADMISSION
The qualification for admission to the M.S. Engg. programme is four-year B.Sc. Engg. degree
obtained in the same department from this University. The candidates who have appeared at the 4th
year B.Sc. Engg. examination may be admitted provisionally to the M.S. Engg. programme. The
confirmation of admission of such students into the M.S. Engg. Programme is subject to their
passing the B.Sc. Engg. examination. Student who has not been admitted within two academic years
after obtaining their four-year B.Sc. Engg. degree is not eligible for admission to this programme.
7. REGISTRATION
7.1 University Registration: Every student admitted into the University shall be required to
register on payment of the prescribed fees within the stipulated time.
7.2 Course Registration: A student admitted into a department of the Faculty shall be
required to register his/her courses in the department in each semester within 2 weeks of
semester commencement.
7.2.1 A candidate shall attain studentship ofthe Univosity on admission to a programme as per
rules. S/he shall be required to be registered separately with the University through such
processes and on payment of such fees as determined by the Univosity from time to time
and it will be valid for two years.
D@arfrEnt of Compder Sctence 6nd Ergineer ng Univeryt/ of ChittasorB Page 9O
7.2.2 A, student shall never take admission in more than one department other than
certificate/diploma ,)ourses. If it is so
reported./found, his/her studentship and
examinations, even il appeared, shall be immediately cancelled-
8. GROUPS
Each department/branch will ha,/e two groups: Project Group and Thesis Group. Considering the
facilities and the number ofteaclers in the department, a limited number of students, on the basis of
merit, may be taken in Thesis goup. The number of students and minimum CGPA of B.Sc. Engg.
required for thesis will be deciderl by the Academic Committee of the Department in every academic
year. Students willing to undertrLke thesis shall apply to the Chairman through the Supervisor for
approval of the Academic Comrrittee of the concerned Department within four weeks from the
beginning of the programme. Thr: students who are not considered in the thesis group will be in the
project goup.
Each course shall be de;ignated by three to five letters for the department/discipline as
decided by the concerned depart nent followed by a three digit number starting with M e.g. CSE
Ml01 for the a course in Computer Science and Engineering; APECE M203 for a course in Applied
Physics, Electronics and Communication Engineering.
10.1 The M.S. Engg. prograrxne shall be carrying a total of 900 marks as distributed below:
First Second Third First Second 'I hird ]'l arks creaits
Semester I
4 credits for
12 credits 12 credits
Project for course for course + 8 credits 300 300 300 150 900
work or y work orily lor project
**Please note that credits allocated for any theoretical course must not be more than 4
and less than 2.
10.2 The Committee of Corrses and Studies of the concerned department shall prepare the
syllabus.
lO.3 25yo marks of each thecretical course of both project and thesis group students shall be
awarded by the coursc teacher on the basis of attendance, class tests, assignments,
presentation or any other style as deemed appropriate by the course teacher. The rcst i5vo
marks of each theoreticrrl course shall be evaluated by a written examination of 4 hours
duration for courses of .i or 4 credits and 3 hours duration of courses of 2 credits by two-
D€portriEnt ot Compder Scierrce and En9ineenng Unrversit/ of Chittagong Page 91
examiner system (one internal and the other external). The paper setters will be from the
panel of examiners usually from public universities. Ifthe difference of marks given by two
examiners is more than 15% (difference of marks 8,12 or 15 fot 50, 75 or 100 marks
courses respectively) then the course wilt have to be examined by the third examiner. The
average of the closest two marls will be taken. Medium of instruction and answer in the
examination script will be in English.
10.4 The courses may be chosen from sets of choices to be determined by the Academic
Committee of the concerned Department, if applicable.
10.5 For project group, 35% of the marks allotted shall be awarded on the basis of the class
performance during the project (to be evaluated by the supervisor), 35%o of the project
marks shall be awarded on the basis of viva-voce performance to be conducted by the
examination committee at the final examination, and the rest 30% of the project marks on
the basis of performance / result / display or any other way to be determined and evaluated
by the examination committee.
10.6 For thesis group, 30% of the thesis marks shall be awarded on the basis of viva-voce
examination to be conducted by the concerned examination committee at the final
examination and the rest 70% ofthe thesis marks will be awarded by averaging marks given
by two external examiners. If the difference of marks given by two external examiners is
more than l5% then the thesis will have to be examined by the third external examiner. The
average ofthe closest two marks will be taken. Examination script will be in English.
Theoretical / projecVthesis of50, 75, 100, 200 and 300 marks are equivalent to 2, 3, 4, 8 and 12
credits respectively.
12.1 The academic progratnme shall be divided into three semesters. There shall be two
semesters in an academic year.
12.2 There shall be final examinations at the end of each semester conducted by the respective
Examination Committee of the Departments.
Academic calendar for the academic year shall be announced for general notification before the start
of the academic year, on the approval of the Academic Committee. The calender may be prepared
according to the following guidelines:
Deparbnart of Cornputer Sciace and Ensineering Un,\€rstt/ of ChittngorE Page 92
However the academic committee may reschedule the above academic calendar if and when
necessary.
13.1 In order to be eligible for appearing as a regular candidate at the semester final
examinations, a student shall have to attend an average ofat least 70oZ ofthe total number
of lectures held in all <rourses during a semester.
13.2 A student whose attendance falls short of 70% but not a below 60%o in arry course as
mentioned above ma1 be allowed to appear at the final examinations as non-collegiate
student and he/she shall not be eligible for the award of any scholarship or stipend. A
student, appearing at t.'le examination under the benefit ofthis provision shall have to pay,
in addition to the relplar fees, the requisite fine prescribed by rhe syndicate for the
purpose.
13.3 The Course mentionel above shall mean a course of study as described in the curricula
and it is a theoretical course.
13.4 Students having less than 607o attendance in lecture of any course will not be allowed
to appear at the final r:xaminations ofthe semester.
hrun€nt of Cornputer Science and Engir€?rns, Universlv of Chitt€or€
Page 95
13.5 The conoerned course teacher for a course shall prepare an attendance rcport of the
students. The reporr will be submitted to the chairman of the Department within tttlee
days of the last class ofthe course.
l4.lThenamesofthestudentsshallbestruckofftherollsonlhefollowinggtounds:period, or
14.1.1 l.to.r_puy-""i or university fees and dues within the prescribed of the
failure to appear at the semester examination due to shortage
minimum required percentage of class attendance'
14.1.2 Failure to eam required GPA to get himself,iherself promoted to the next
higher semester oi failo." to appear at the semester examination after
depositing examination fees.
14.t.4 Withdrawal of names from the rolls of the University on grounds acceptable
to the Vice-Chancellor of the University after having cleared all dues.
14.2 In case a student, whose name has been struck off the rolls under clause l4.l.l seeks
readmission before the start of that semester with the batch that immediately follows
on recommendation of and with the date fixed by the academic committee of the
department on payment ofall the fees and dues.
14.3 In case a student, whose name has been struck off the rolls under clause 14.1.2 seeks
readmission before the start of next higher semester with the batch that immediately
follows on recommendation of and with the date fixed by the academic committee of the
department on payment of all the fees and dues.
14.4 In case a Student, whose name has been struck off the rolls by exercise of the clause
14.1.3, seeking readmission alier expiry of the suspension period, shall submit an
application to the Chairman of the Department before the commencement of the semester
to which hdshe seeks re-admission. The Chairman of the Department shall forward the
application to the Deputy Registrar (academic). In case the readmission is allowed, the
student will be readmitted on payment of all the fees and dues within l0 working days
from the date ofpermission given by the proper authority.
14.5 In case any application for readmission is rejected the student may appeal to the
Academic Council for re-consideration. The decision ofthe Academic Council shall be
final.
14.6 No student who has withdrawn his/her name under clause 14.1.4 shall be given
readmission-
14.7 All re-admission should preferably be completed before the semester starts. The
percentage of attendance of the readmitted student shall be counted from the date of
readmission.
14.8 The application of a student for readmission will only be considered if helshe applies
within one year from the date he/she discontinues his/her studies in the University. The
maximum period of studies for M.S. Engg. degree under no clrcumstance will exceed
three academic years.
14.9 Dropping out: candidates failing to earn the required GpA after completing regular
examinations and subsequently fail again after taking readmission in the iame iemester
shall be dropped out of the programme. A candidati
win be dropped out if he/she fairs
twice within two academic years.
Deparanent of Co(Itrx(6 SciT€e ard En$n:aing UnN€Grty of Chttagong
Page 94
l5.l The letter grade system for assessing the performance ofthe students shall be as follows:
I
Numerical grad( Letter Grade Grade Point Cr€dit Credit point
(LG) (GP) = GP x Credit
80o% or above 4.00 1 16.00
75% to less than 807, 3.7 5 4 15.00
70oZ to less than 75ol, 3.50 4 14.00
650% to less than 7ffi, B+ 3.25 4 13.00
607o to less than 65Yo B 3.00 4 12.00
55%o to less than 60%0 B 2.7 s 4 I1.00
5070 to less than 55% C+ 2.50 4 10.00
450lo to less than 50olo C 2.2s 4 9.00
40o% to less than 45oZ D 2.00 -1 8.00
less than 40olo F 0.00 -1 0.00
Incom lete/Absent x x 4 x
15.2 A Grade Point Averrrge (GPA) shall be calculated for each semester as follows
GPA=
TotalCreditPoints
-
lc
i=l
G
(D
TotalCreditOffered S.
?''
where, z is the number ofcourses offered duing the semester, Ci is the numb€r of credits
auotted to a particular t;ourse and G1 is the grade point eamed for that course'
15.3 The cumulative Grade Point Average (CGPA) giving the cumulative perforrnance of
the students of the whole programme will be calculated as follows:
it*o*
k=t; (iD
CGPA=
Ic*
k=1
where, rz is the total number of courses offered in the whole programme, Ct is the
number of credits allotte d to a particular course and Gr is the grade point earned in that
course,
15.4 A Grade Point Average (GPA) shall be calculated at the end ofeach semester'
15.5 GpA, CGPA will be rounded up to the second place of decimal for reporting if the 3'd
digit is 5. For instance, CGPA=2.215 shall be rounded off as CGPA:2'22'
obtains
theoretical course in which a student
-*;;d-;y
15.6 Earned Credit: The creCits assigned to a Anv course in which a
the student
minimum'D'will be ""'"t"0 "it i'Jaiit t<rwards his/her' earned credit
'F' grade will
student obtains 'F' grade will ""iU" ""'"'"a
not be counted for Cpe .uf"rrfoil"rr-t-.'rt
*iit .tuy ot ttr" Grade Sheet and transcripts'
part and non-
either of them comes up with fractional
|s.7 In GPA or CGPA calcul rtion' if affer the decimal point' the 2"" digit
zero value appears in tt" l'J u"oo' +;'digiiio
'J::,{Ti'i#.i1ql:xaF*$#J:ll#l;i'liiik#:'iliil#;H:
wh
hisftrer GPA will be 3'52
O€partm€nt of Computer kierrce dnd Ergr€eing, Unrversity of Chttagong Page 95
f -- irediis-are offie[in
a c] andistudent earns total point secured (TP S) of 84 in that
class, then his/her GPA will be 3.24 while the precise value is 3.230769..., (iii) suppose,
a total of 160 credits are offered in a 4-year program and a student earns total point
secured (TPS) of 585 in that program, then his/her CGPA will be 3.66 while the precise
value is 3.65625. (ol.oe.\o)c srkrrt qf6v ,!41rsfi-{ TlBfrrf,{ t\b, \e-{ IEr{ 1) {( fr51g {n\
)e.oe.to)c Etfrr{ q6o fiffi< ebs sr T\,-K 84( fr6re c\rqlGu)
puration of Theoretical examination of different courses at the end of each semest er shall be of 41
hours duration for courses of 3 or 4 credits and 3 hours duration of courses of 2 credits
I
17.1 An academic year shall be divided into two semesters (details are given in Section 12 of
the Ordinance). I
17.2 There shall be final examinations conducted by the concerned Examination Committee
of the Departments at the end of each semester.
17.3 The results shall be finalized at the end of each semester. Individual course grades and
GPA shall be announced within a date ordinarily not later than four weeks after the end
of the semester final examinations.
17.4 Minimum passing grade: The minimum passing grade in a tbeoretical course will be D.
t7.5 Examination for backlog and/or improvement:
17.5.1 If a student does not appear or fail in a course or intends to improve his,iher
grade of a concerned paper then he./she must appear at the semester final
examination with the batch that immediately follows as the case may be;
provided that the student will not get more than B grade in that course.
However, if the candidate fails to improve the grade of the course then the
grade obtained by him/her at the immediate past examination will be retained.
t7 .5.2 Grades obta red by a student in the courses in which he/she appeared at the
backlog courses will be recorded for final assessment and the grade obtained
by him/her in those courses at the regular final examination shall
automatically be treated cancelled.
t7 .5.3 A re-admitted student shall not be allowed to irnprove results under any
consideration.
t7 .5.4 No improvement shall be allowed in project / thesis and viva-voce
examination.
t7 .5.5 For improvement of hisiher results, the student shall apply to the Chairman of
the Department at least 4 weeks before the start ofthe next examination.
student must eam minimum GPA 2.20 to be promoted to next higher semqster.
fA,
9. PUBLICATION OF RESULTS
19.1 A student must successfully complete the courses of all the semesters within a maximum
ofthree academic years as outlined by the Committee of Courses in order to be eligible
for the award of M. Sc. Engineering degree. The student must earn CGPA 2,25 or
higher and he/she must have to earn 32 credits.
19.3 Honours: Candidatr:s for Master's degree in engineering will be awarded the degree with
Honours if their CGPA is 3.75 or higher.
19.4 Recording of Result: The overall results of a successful student covering all semester's
examinations shall be declared on the basis of CGPA with the corresponding letter grade
(LG). The transcrip.s in English will show the course designation, course title, credit,
Ietter grade and gracle point of individual courses. GPA of each semester, CGPA for the
overall result.
For the M.S. Engg degree, l student shall require to fulfill the following conditions:
22.1 A student must earn minirnum GPA 2.20 to be promoted to next higher semester.
A student must eam a mirimum CGPA2.25 failing which s,/he shall be declared failed in the
22.2
programme.
22.3 A student must eam a minimumGP 2.25 at the thesis/project.
22.4 A student eaming CGPA 4.00 shall be awarded M.Sc. Engg. with distinction and citation so
made in the academic transcript.
23.1 If a student fails to earn required GPA in a semester, s,/tre will be treated as failed. The
failed student shall be allowed to appear in the failed course/s with the batch that
immediately follovzs as an irregular candidate, failing which s/he shall be dropped out of
the programrne.
23.2 If a student fails t: appear at the examination after depositing examination fees, s/he
shall be allowed to appear at the examination with the batch that immediately follows as
an irregular candidate without re-admission, failing which s,/he shall be dropped out of
the programme.
23.3 The failed student Irhall appear at the examination as an irregular candidate, generally as
Dep6rtrn€nt of Cornputer Scierrce dnd Engin€€nng Unrv€rsit/ of Chjftdsor€ Page 97
per syllabus in effect \,\.ithout re-admission. If any drastic changes in the syllabus are
made, the irregular candidate shall appear at the examination in his/her original syllabus
on the recommendation of the Academic Committee of the Department.
23.3 A student failing to eam required GP in thesis/project shall have to resubmit it and
reappear at the thesis/project viva-voce examination with the irnmediate oext batch only
as an irregular candidate, failing which s,/he shall he declared failed in the progamme.
24. READMISSION
If a student fails to appear at the examination due to shortage of required percentage of class
attendance or any other reason, he/she shall have to get himselflherself re-admitted as an irregular
student with the batch that irnmediately follows on recommendation of and within the date fixed by
the Academic Committee of the Department. S,tre must have to fulfill the requisite class attendance
for appearing at the examination as an irregular candidate. The student shall be allowed to appear at
the examination only once with the batch that immediately follows as an irregular candidate, failing
which s,4re shall be dropped out of the programme.
26. GENERAL RULES AND LREGULATIONS FOR THE B.Sc. Engg., M.S. Engg. ,
M. PhiI. AND AI{Y OTHER DEGREE/CERTIFICATE/DIPLOMA EXAMINATIONS
OF THE UNIVERSITY
26.1 Functions of the Academic Committee/Chairman/Director of the Departments/Institutes
shall be according to General rules and regulations no, l.
26.2 Functions of the Examination Committee shall be according to General rules and
regulations no. 2
26.3 Functions of the Chairman of the Examination Committee shall be according to General
rules and regulations no. 3.
26.4 Functions of the course teacher/examiner shall be according to General rules and
regulations no. 4.
26.5 Functions of the tabulators for finalization of the results shall be according to General
rules and regulations no. 5.
26.6 Functions of the Controller of Examinations regarding examinations and publication of
results shall be according to General rules and regulations no. 6.
Second Semester
ect Grou
Course Code Course Title Credits HourVWeek
CSE M3NN Coursel-SelectedL NC 4 4
CSE M398 ect 8
Total Credits and Contact Ho!rs / Week for this Semester t2 28
Cumulative Grand Total ( Theory + Projeco I 35 52
Thesis G
Course Code Cr urse Title Credits Hours/Week
CSE M399 Thesis l2 36
Total Credits and Contad Hours / Week forthis Semester l2 36
Cumulative Grand Total ( Theory + Thesis) 36 60
D@rtrnent of Co.npjter sc€nce and ErEin€glnsi Unrversity of Chittdsf,rlg ?age 99
2. List of Courses
The list ofcourses consists of different wings ofthe Computer Science and Engineering. The
academic committee of the department shall choose different cowses from the list of courses
to offer in different semesters. During course offering in a semester, the course code will be
{tnalized for respective semesters based on the following principle.
Principle for Course Code: The course code format is CSE MXNN where 'CSE' stands for
name of the Department of Computer Science and Engineering, 'M' stands for Master, 'X'
stands for semester, e.g., 'X' is ' I ' for first semester, '2' for second semester and '3' for
third semester, and 'NN' stands for course identification number, it has range from 00 to 99.
Suppose course code "CSE MX3 l " with course title "Advanced Database Systems" is
selected to offer in the fnst semester, then the course code of the course title "Advanced
Database Systems" shall be "CSE M I 3 1". The course format is shown in below.
CSE M x N N
! f
Oor voo
;g * ah
ld,
;E8 t
9> ji6
-.+.E cl oo
E5B z xd zi
zz
Thesis / Project
Course Code Course Title Marks Credit
CSE M398 Proj ect 200 8
CSE M399 Thesis 300 t2
D@artrn€nt of Computer Scierce and kgin€enng Unrverst/ of ChrttasorE Page 1,02
Algorithms: Definitions, Notation and Description (pseudo.code, structured English) Analysis of algorithms
Coordinate System and Transformz.tion. Cartesian, polar and global coordinate systerq latitude and longitude,
storing coordinates, precision, Rot rtion, translation, scaling, reflectiorl affine transformation in GIS, rubber
sheeting. Representation of spatial data as objects. Definition of objecl4pes: Points, lines, polygons. Arc
based data structures, representi.tion of topology. Geographic Entity Types and Definitions. Zizes
Generalization: Elements of line (]eneralization and Linear Simplification Algorithm. Algorithms for Line
Interseclion'. The intersection of two lines, Algorithms and heuristics, Simple lines, special cases and
complex lines. Algotilhnts fot Pt'lygons: Area, Centroid, Point-in polygon. Polygon overlay: Operations
requiring overlay, General conceptl;, Computational complexity and sliver removal. Formal models ofspatial
relations: Intersection model, region-region relations, Line-region relations, higherJevel concepts and
cognitive perspective. Digital Elevtion models: Data sources, Estimating elevation, slope and aspect and
determining drainage networks. A'lditional Algorithm for Gridded DEMS: Determining drainage networks
and visible aras. The TIN (Triangulated lrregular Network) Data Model: Choosing vertices, Triangulation
algorithms, Storing TINs, Contouri rg and other algorithms. Temporal and three dimensional representations:
Temporal dimensions of geogapt.ic phenomena, Methods of representation for 3-D. Hierarchical data
structutes: Quad{rees, Indexing pixels, run-encoding, scan order and decoding. Quad-trees algoilhms and
spalial indices: Area, overlay, adjacency and overlay, vectorization etc. Spartal Interpohrton I: Surface and
fields, point-based Interpolation, Thread surfaces, distance-weighted averages, etc. Spatial Interpolalion II:
Areal Intopolation and other Interpolation issues. Parallel Processing Algorithm for GIS: Concepts,
Terminology and techniques.
Reference Boolcs :
Reference Books:
The Sociologt & psychologt of electronic cornrnunitiesi Building, recognizing, managing and
making use of online communities in web-based env onments( such as communities of practice,
communities ofpurpose). Theories of online presence and cooperation. A Guide to e-commerce in
General: How to differentiate e -commerce today from e-commerce yesterday. Current problems of
e-commerce. Interesting solutions and approaches to those problems. A guide to knowledge
Commerce: Understanding Knowledge as a commodity and as a process, and representing it in web
-based environments. fir'eb architecturc: Structural design of e-commerce systems. Clienfserver
architecture ,2-,3-,n-tie design,server farms, sealebility. Integration oflegacy systems. Java Beans,
Enterprise Java Beans (EJB),Ja'la Server Pages(JSP). Data interchange: Exchanging data over the
Intemet XML, style sheets, dor;ument types definition (DTD); metadata and document discovery.
Interchange ofprocesses using'MSDL and SOAP (as example). Usabilily: User interface design for
web-sites. Use of HCI methodologies in evaluating user interface. Electronic payments.
technologies that support the processing of electronic payments. Characteristics and properties of
electronic payment systems. Irormalisms of correctness. Mass personalitralion and the virtual
customer: Automation of the crLstomer relationship. Use of data to customize the web experience.
Cookies and their risks. Obtaining and using personal information. Rule- based filtering, implicit
profiling, collabomtive fi ltering.
Reference Books:
1. Gary Schneider: Electronic Commerce
2. Kenneth C. Laudon anl Carol Traver: E-Commerce 2014 (lfth Edition)
3. Mehdi Khosrow-Pour: Cases on Electronic Commerce Technologies and Applications
(Cases on Informatiorr Technology Series)
4. Zongqng Zhou: E-Cornmerce and Information Technology in Hospitality and Tourism
CSE MX09 Process Modeling
100 Marl<s, 4 Credits, 4 Hours/W'eek
Reference Boolc:
l. Suresh G. Advani and E. Murat Sozer: Process Modeling in Composites
Manufacturing, Second Edition
2. B. Wayne Boquette: Process Control: Modeling, Design and Simulation
3. Suresh G. Advani, E. Murat Sozer: Process Modeling in Conposites Manufacturing
4. Morton M. Denn: Process modeling
5. Ian T. CamerorL Katalin Hangos: Process Modelling and Model Analysis
CSE MX10 Modeling and Simuhtion for Systems Engineering
100 Marl<s,4 Credits, 4 Hours/Week
Introdaction lo Srstem Simulation: Introduction to Simulation, Simulation Exanples, Genoal Principles,
Simulation Software. Malhernatical and Stafisrtcd Models: Slatistical Models il Simulatioq Queueing
Models. Random Numbers: Random-Number Generation, Random-Variate Generation. Analysis of
Simulalion Data: lnput Modeling, Verification and Validation of Simulation Models, Output Analysis for a
Single Model, Comparison and Evaluation of Altanative System Designs. Applications: Simulation of
Manufacturing and Material-Handling Systems, Simulation of Computer Systems, Simulation of Computer
Network.
Reference Book:
l. Discrete-Event System Simulation (5th Edition) by Jerry Bank, John S. Carson II, Barry L.
Nelson, David M. Nicol; Prentice Hall.
2. Devendra K. Chaturvedi: Modeling and Simulation of Systems Using MATLAB and
Simulink
3. Dean C. Kamopp and Donald L. Margolis: System Dynamics: Modeling, Simulatiorq and
Control of Mechatronic Systems
4. Averill Law and W. David Kelton: Simulation Modeling and Analysis (Industrial
Engineering and Management Science Series)
5. Byoung Kyu Choi and DongHun Kang: Modeling and Simulation of Discrete Event Systerns
Generalization; Use and functiorL of the Global Positioning System (GPS) in GIS. Ilre Application of
Geographical Informalion Syslemst Who uses them and what for public utilities, resources analysis, urban
planning and decision support. C lobal scale application: international initiatives; global data capture and
referencing. The actual use of GIli, map analysis, spatial data searches etc. Cost and benefit ofGIS. GIS and
Global science. GIS and Spatial Cognition. Knowledge based techniques in GIS.
Reference Boola:
Reference book:
Introduction lo real time systerL emb,:dded systems and reactive systems; Hard and Soft Real Time Systems;
Handling real time; Specification and Modelling; Design methods; Real Time operating systerns; Validation
and Verification; Real time Process arrd Applications; Distributed Real Time Systems.
Introduction to gaphs and digraphs; Fundamental concepts: isomorphisn! adjacency and connectivity; Trees,
spanning ,.""", ko*"., paths, distances in graphs; t{amiltonian aod Eulerian graphs, Travelling
Salesman
pioble-l Chinese Postman problem; Matching and covers: Hall's theorenr, marriage theorerq optimal
assignment, veitex covers, edge covers; Connectivity and cuts: vertex and edge connectivity, Menger's
theoiem, Max-flow Min-cut theorem in networks; Graph coloring: vertex coloring and edge coloring, k-
chromatic graphs, application to scheduling; Planar graphs: embeddings, dual graphs, Euler's formula,
Kuratowski's theorem; Perfect graphs.
CSEMX1S CombinatorialOptimization
100 Marl<s, 4 Credits, 4 Hours/llreek
Introduction to Optimization; Linear Programming: Diffoent forms. Simplex Method Primal-Dual theory;
Max-Flow: The Max-Flow-Min-Cut Theorern Ford-Fulkerson Labeling Algorithr4 Dijktra's Algorithrq The
Floyd-Warshall Algorithm; SOME-Network Flow Algorithms: The Minimum Cost Network Flow Method,
Transportation; Problem; Capacitated Transportation ProblenL Assignment Problem; Integer Linear
Programming; Relaxation; Cutting-Plane Algorithm; Branch and Bound Technique; Dynamic Programmingl
NP Completeness; TSP and Heuristics; Approximation.
Overview : This course will cover NP-completeness, diagonalization, oracle computations, space complexity,
Turing machines with alternating quantifies, Boolean circuits and circuit lower bounds, randomized
[email protected]€nt of Comgner krerce 6nd ErBin€ang, Universv of Chrttagor€ Page 1O8
Ref*ence Books:
L S. Arora and B. Barak, Computational Complexity: A Modem Approach, Cambridge
University Press, 11009
Introduction to HCI methods. Interaction styles and general design. Various user interfaces and interaction
strategies. Programming usable irterfaces. Software architectures for user interface. Human factors of
interface design. Interface maaphors and conceptual models. Screen design, HCI and World Wide Web. Task
analysis. Usability evaluation. Collaborative systems. Groupware and Coordination technologies.
Reference Book:
Perfornance and Programming Sry/e: What is Performance? , Improving Performance, Programrning Tips
and Tricls. Persistence in Java: Serialization, Java Database Connectivity (JDYC). Common Objea Request
Broker Architectare (CORBA)'. C ORBA and IIOP, Hello Worl4 Interface Definition Language (IDL),
Mapping to Java, Host Implementation. Reflection and JavaBeans: Inspecting Classes at Run Time, Working
with Inspected Classes. What is a Software Component?, Implementing Software Components. "I4va
Foundation Class (JFC): Swing Components, Swing Feature, Accessibility, JTC and the Abstract
Windowing Toolkit (AWT). Remote Method Invocation (RMI): RMI Architecture, RMI API. Java Native
Inle{ace (JNI): Callng Native Functions from Java, Calling Java Methods from Native Code.
Manipulating Java objects in Nativ: Code, Garbage Collection and JNI, Invoking a Virtual Machine from
Native code. SecuiE: Security Olerview, jar - Managing Java Archives, key tool - Managing Keys and
certificates, jar signer - Signing and veri$ing JAR Files, policy tool - Managrng Security policies.
Overview of Oprtonal Packages: The Optional Packages, Otho players.
Reference Books:
Overview : This course is an in-depth investigation of the theory ofprogramming languages. The course
covers the fundamental tools used in the analysis and design ofprogamming languages, including semantics,
type theory, abshact interpretation, metaprogrammi ng, and partial evaluation. We will also consider their
appticationio imperative, functional, and object-oriented languages. Topics to be covued include: Semantics:
opiational, denotational, axiomatic Lambda calculus and domain theory Typing safety, subtyping, recursive
types, polymorphism Data abstraction, objects, inheritance, mixirs Additional topics may include concurrent
languages, continuations, and metaprogranrming
Reference Boolcs:
l. Types and Programming Languages. Benjamin C. Pierce, The MIT Press, 2002.
Reference Bool<s:
Multivariate Data And Multivariate Statistics: Introduction, Types of Data - nominal, ordinal, interval,
ratio missing observations, Basic Multivariate Statistics - mean, variance, covariance, correlation, The Aims
of Multivariate Analysis data exploration, inference.
Exploring Multivariate Data Graphically: Introduction, The scatterplot, Scatterplot Matrix, Enhanced
Scatterplots - bubble plots, smoothing, density estimates, bivariate boxplots, Coplots and Trellis Graphics -
conditioning plots, dimension reduced graphs, Probability Plots- Quantile and normal plots, Other Plots - 3-
D spir, Star plots, Chernoff Faces.
Principal Components Analysis: Introduction and Motivation- data dimension reduction, linear
combination of variables, Presentation of Method- eigenvalues and vectors, loadings, scores, Extensions,
Graphical Methods- biplots, Applications and Examples.
Correspondence Analysis: Introduction and Motivation - categorical scatter plots and maps, A Simple
Exanple, Two-Dimensional Tables - correspondence analysis, Applications, Multiple Correspondence
Analysis.
Multidimensional Scaling (MDS): Inhoduction and Motivation, Proximity Matrices, Classical MDS, Metric
LS MDS, Non-metric MDS, Non-Euclidean metrics, Three-way MDS, Inference in MDS.
Cluster Analysis: Introduction and Motivation - classificatioq Agglomerative Hierarchical
Clustering Techniques -inter-cluster dissimilarity, single linkage, complete linkage, Optimization Methods -
total, within and between group dispersion, Finite Mixture Models for Cluster Analysis- mixture distributions.
The Generalized Linear Models (GLM): Linear Models, Non-linear Models, Link Functions, Error
Distributions.
Regression and MAIIOVA: Introduction and Motivation, LS Estirnation and ANOVA models, Direct and
Indirect Effects-path diagams.
Log-Linear snd Logistic Models: Introduction and Motivation-categorical, binary response, MLE -
Departrnent of Computer Science and Ergineetng, Unvectty of Chltt€ons
Page 11O
sampling scherne, likelihood function, model selection, Transition Models - longitudinal study, Markov
chains.
Multivariate Response Models: Introduction and Motivation - multivariate response vs. multivariate
explanatory variables, Repeated lleasures, Multivariate Tests, Random Effects, Logistic Models binary
response, Marginal Models for Binary Response, Marginal Modelling, Generalized Random Effects.
Discrimination, Classilicatiorq and Pattern Recognition: Introduction and Motivation,
Exanrple, Allocation Rules, Fisher's Discriminant Function, Assessing Discriminant Function, Quadratic
Discriminant Functior! More thzn Two Groups, Logistic Discrimination, Variable Selection, Other
Methods,Pattern Recoglitior! Neur ll Networks.
Exploratory Factor Analysis: Intrcduction to Factor Analysis-latent variable, Basic Factor Analysis Model-
factors, factor loadings, commu ralities, factor scores, Estimation of the FA Model, Rotation of
Factors, Estimating Factor Scores, I'actor Analysis vs. PCA
Conlirmatory Factor Analysis and Structural Equations Models: Introduction, Path Analysis and Path
Diagrams. Structural Equations Mo,lels (SEM's), Assessment of Fit.
Object-based Databases : Data Mocel, Design, Languages; Object Relational Database: Complex data types,
Querying with complex data types, Design; XML : Query Processing and Optimization: Database System
Architectures : Parallel Databases : Different ty?es ofparallelisnl Design ofparallel database; Distributed
:
Databases Levels of distribution transparency, Translation of global queries to fiagment queries.
Optimization of access strategies, N{anagement of distributed transactions, Coacurrency control, Reliability,
Administration; Data Warehousing and Mining : Basic Concepts and algolithms. Spatial and Temporal
Data and Mobility: Multimedia Databases. Multimedia Database Systems Basic concepts, Design,
Optimization of access strategies, Management of Multimedia Database Systems, Reliability.
Reference Books :
Data warehousing requirements. Dalabase technology underpinning data warehousing and data mining. Data
warehouse architectures. Data warthouse logical design: star schemas, fact tables, dimensions, snou'flake
schemas, dimension hierarchies. OI,AP architectures, OLAP operations. SQL extensions for OLAP. Data
warehouse physical design: partiti rning, parallelisnq cornpression, indexes, materialized views, column
stot6. Data warehouse conslruclion: data extraction, transformation, loading and refreshing. Data warehouse
support in Oracle. Warehouse metzdata. Specialized warehouse architectures. MapReduce and warehouse
architectures: Hive. Data mining introduction, Classification: decision trees, Bayesian classifiers, support
vector machines. Cluster analysis: k means and its variants, hierarchical and density based clustering. Clusta
evaluation. Association analysis using item sets and association rules. Evaluation ofassociation patterns. Data
mining tools and applications, Data visualization. Anomaly Detection, Web Mining, Data Mining
applications.
Reference Bool<s:
D@artrnent of Cornpder scie,rc€ and EngrneeriE, Uni!€rstt/ of chittasorE Page 111
l. Kimball, Ross, Thomthwaitg Mundy & Becker: The Data Warehouse Lifecycle Toolkit (2nd
ed.)
2. Jiawei Han, Micheline Kamber, Jian Pei: Data Mining: Concepts and Techniques (3rd ed.)
3. Mclaren & Mclaren: Data Warehousing and Data Mining.
4. Efiem G Mallach: Decision Support and Data Warehouse Systems.
5. Michael J. A. Berry, Gordon S. Linoff: Mastering Data Mining
6. Marakas: Modem Data Warehousing Minning, and Visualization Core Concepts
7. Dunham: Data Mining: Introductory and Advance Topics
Introduction; Data warehousing and OLAP technology for data mining; Data preprocessing; Data mining,
primitives, languages and systems; Descriptive data mining- characterization and comparison; Association
analysis; Classification and prediction; Cluster analysis; Mining complex types of data; Applications and
trends in data mining. Big data and API: Distributed file systems, Map/reduce, Hadoop (what's that? when
is it useful?). Related big data technologies/platforms: Pig, HBase Programmatic access to get (and post) data.
Example: get data from web source, process locally, visualize using visualization API. Predictive models I:
Data representation for predictive modeling, models, data-driven-model applications. Evaluating models,
metrics for model Quality. Predictive models II: Learning models from data. Training. How does that work
for selected models? Overfitting, holdout evaluation, cross-validation, overfitting avoidance.
Reference Book:
l. Data Science for Business: Fundamental principles of data mining and data analyic thinking:
Provost & Fawcett.
2. Doing data science: O'Reilly Media.
Overview: Defmition and characteristics (elasticity, multi-tenant, on-demand ubiquitous access, usage
metering, self-service, sla-monitoring); Cloud Conputing and Service Oriented Architecture; Enterprise
Cloud drivers and adoption trends; Typical Cloud Enterprise workloads; Cloud service models/types (public,
private, hybrid, and community clouds); Cloud deployment models; Cloud ROI models; Cloud reference
architectures; Cloud standards ; Technology providers vs. Cloud providers vs. Cloud vendors; Planning Cloud
transformations (suitability assessment, future state definitioq financial assessment and platform selection,
roadmap definition). Infrastructure As A Service (Iaas): Evolulion of infrastructure migration approaches
(viroalization, adaptive virtualization, Cloud Computing and on-demand resource provisioning); Cloud
lnfrastructure services (storage, compute, services management, cloud brokers); IaaS vendor solutions; IaaS
mainstream offerings. Platform As A Service (Paas): Evolution of computing paradigms and related
components (dishibuted corputing, utility computing, Cloud computing, grid computing); Cloud platform
services (monitoring and management, application servers, messaging, data management, development and
testing, integration, business intelligence); PaaS vendor solutions; PaaS mainstream offerings. Software As A
D@artn€nt of ComoJter Sci:nce and Ergine rng Univeryty of ChittngorE Page 17,2
Service (Saas): Cloud application development lifecycle SaaS platform sovices (application development,
application migation, SaaS implernentation, business intelligence - Cloud-based,/big data/real time analyics);
SaaS vendor horizontal solutiorx; SaaS vendor vertical solutions; SaaS mainstream offerings. Business
Process As A Service (Bpaas): BPM on the Cloud and BpaaS sample solutions; BPaaS platform services;
BPaaS vendor solutions; BPaaS mainstream offerings.Cloud Security: Cloud security challenges; Cloud
security approaches: encr)?tion, t:kenization/obfuscation, cloud security alliance; standards, cloud security
models and related patterns; Clorrd security in mainstream vendor solutions; Mainstream Cloud security
offerings. Enterprise Cloud-Based High Performance Computing Applications: High Performance Computing
(HPC) on Cloud; Enterprises HPC apptications (high-performance grid computing, high-performance big data
computing/analytics, high perfornance reasoning); HPC Cloud vendor solutions: compute grids (Windows
HPC, Hadoop, Platform Symphony, Gridgain), data grids (Oracle coherence, IBM Object gid, Cassendra,
Ilbase, Memcached, HPC hardwar,:; HPC on Cloud mainstream offerings.
Reference Book:
The Client server model and softvare desig4 concunent processing in client-server software, Application
interface to protocols, The socket,rtPL, Algorithm in client software desiga, Iterative connectionless servers
(JDP), Concurrent connection ori(:nted server (TCP), Multi service serv€r (TCPruDP ), RPC concept and
protocols, Telnet programs.
Reference Bool<s:
l. Robert ffali
and Drrn Harkey: Client/Serva Programming with Java and CORBA (2nd ed.)
2. Ray Horak: Commu'rications Systerns and Networks
3. Anthony T. Holdener III: Ajax: The Definitive Guide
Large-scale distributed systems: pr(,perties and examples; search requirements in service discovery, peer-to-
peer content sharing and distributed XML databases, unstructured techniques: intelligent flooding, hinlbased
routin& etc-i basic structured techniques: Chord. CAN, Tapestry, Kademlia, etc.; advanced structured
techniques: pSearch Squi( SkipN et, etc.; Signature search techliques using Bloom Filters; Distributed
Pattem Matching (DPM) problem and its applications; distributed crawling and indexing techniques.
Design Theory for Relational Database: Functional Dependencies, Decomposition of Relation schemes,
Normal Forms for Relatiors. Schemes, Multivalued and other kinds of Dependencies'
of Selections in
Quuy Optimization: Basic Optimization Shategies, Algebraic Manipulation, Optimization
Syrt"rr,, t^u"r Optimization ior a Subset of Relational Queries, Optimization under Weak Equivalence.
Database Protection: Integrity, Constraints in Quoy-by-Exarnple, Security, Security in query-by-Example,
Security in Statislical Databases. Concurrent Operations on the Database: Basic Concepts, A simple
Transaction Model, Model with Read- and write-Locls, Read-only, write-only Model, concurrency for
Hierarchically Structured Iterns, Protection against Crashes, Optimistic Concurrency Control. Principles of
Distributed Data Bases, Framework for distribution. Translation of global queries into fragment queries.
Quoy optimization and management of distributed transaction. Concurrency control and reliability in
distributed databases.
Administration of Distributed Data Bases. Example Systems.
Reference Books:
Introduction to Parallel Computing: Supercomputus and grand challenge problems, Modern Parallel
Computers, Data Dependence Graph, Data Parallelisrq Functional Parallelisnr, Pipelining and Data
Clustering. Interconnection Network: Switch Network Topologies, Direct and Indtect Network Topology,
Bus, Star, Ring, Mesh, Tree, Binary Tree Networ( Hyper Tree Networlq Hybri4 Hypercube, Perfect Shufile
Network, Torus and Buttafly Network. Performance Analysis: Introduction, Execution Time, Speedup,
Linear and Superlinear Speedup, Efficacy and Efficiency, Amdahl's Law and Amdahl Effect, Gustafson-
Barsis's [aw, Minsky's Conjecture, The Karp-Flatt
Metric, The Isoefiiciency Metric, Isoefliciency Relatioq Cost and Scalability. Parallel Computational
Models: Flynn's Taxonomy, PRAM, EREW, CREW, ERCW, CRCW, Simulating CRCW, CREW & EREW,
PRAM algorithms. Introduction to Parallel Algorithms: Parallel Programming Models, PVM, MPI
Paradigms, Parallel Programming Language, Brent's Theoren! Simple parallel programs in MPI
environments, Parallel algorithms on networlg Addition of Matices, Multiplication of Matrices. Distributed
Systems, Communication in distributed systerns, processes and processors in distributed systems. Threads,
systems Models, Process allocation, scheduling in distributed systems, fault tolerance, real-time distributed
systems. Theoretical issues in distributed systems: Logical cloclg mutual exclusion, deadlock detection,
agreement protocols, resource security and protection, concurrency contol. Distributed File System: Design
and implementation, trends. Distributed shared Memory, consistency models, page-based distributed shared
memory, shared variable distributed shared memory, objecrbased distributed shared memory. Multiprocessor
OS, Database OS: General features and theoretical issues. Case Studies: Amoeba, Mac[ chorus, DCE, etc.
Multimedia Opoating Systems: Proccs scheduling, File system, caching, Disk scheduling for multimedia.
Reference Books:
1. Hwang and Briggs, Computo Architecture and Parallel Processing, McGraw Hill.
2. Crichlow, Introduction to Distributed and Parallel Computing, PHI.
3. M.J.Quinn, Designing Efficient Algorithms for Parallel Cornputers, McGraw-Hill.
4. A.S. Tanenbaunr, Distributed Operating Systenq Prentice-Hall, 1995.
5. M. Singhal and N. G. Shivaratri, , Advance Concepts in Opoating Systems, McGraw-Hill,
1994.
Deparunent of cornpder sc@nce and Engineanng unr./erst/ of chittogons Page 114
Reference Books:
Foundations of software project mlnagement; organization structure and staffing; motivation, authority and
influence; conflict management; proposal preparation; a large engineoing software system management;
client management; managing soffware project teams; project planning and scheduling; risk management;
configuration management; pricing estimation and cost control; quality assurance and accreditation; factors
affecting software quality; softwar: quality assurance plans; business context and [ega[ issues for software
projects; software measurement: t:sting, upgrading and maintenance; network systems; and international
project management.
Definition and concept of software quality assurance (SQA); quality models; specification of quality
requirements; product development & delivery issues; software developmant processes & maturity; software
quality management process: total luality management, improvement cycle, SQA planning & management,
organizing the SQA effort; softwar; verification and validation; tlpical software development errors; Fagan
inspections; software audit; softw,rre testing: testing objectives & testing fundamentals, testing theory,
coverage criteria, equivalence clasr testing, value-based testing, decision table, syntax & state transition
testing, statement & path testing, branch & condition testing, data flow testing, thread-based testing,
integration & integration testin& system testing; testing in object-oriented systems; test tools & test
automation; test management; probl rm reporting & conective action.
Networks Architectare: layering z.nd protocols, OSL Architecture, TCP/P conccpt, technologics and
protocoh: Address resolution proto)ol (ARP), LJDP, ICMP, SIV{TP, SNMP, MIME, HTIP, DNS, Routing
protocols: RIP, IGRP, BGP, OSPF. )'P address: IPv4 and IPv6.
Reference Books:
L Asoke K Talukdo and Roopa Yavagal : Mobile Computing: Technology, Applications, and
Service Creation (McGraw-Hill Communications Engineering)
2. Frank Adelstein and Sandeep KS Gupta: Fundamentals of Mobile and Pervasive Conputing
CSE MX53 Distributed Systems and Internet Technology
100 Marlrs, 4 Credits, 4 Hours,rWreek
Capabilities and limitations of the intemet. An understanding of the basic internet technologies Interfacing
Internet Server applications to corporate databases XML as a universal data language XML transformations.
Refermce Books;
l. Ram Ramanujanr, Srini Ramaswamy: Distributed Computing and Internet Technology
2. Sushil K. Prasad, Mahadeo P. Jaiswal, Bundit Thipakorq Sartaj Sahn! Hanick M. Vin:
Information Systerns, Technology and Management
3. Kenneth P. Birman: Reliable Distributed Systems: Technologies, Web Services, and
Applications
Reference Book:
1. Cryptography anrl Network Security: Principles and pyactice (6th ed.)
2. Behrouz Forouzan: Cryptography & Network Security
5. Christof Paar and Jan Pelzl: Understanding Cryptography: A Textbook for Students and
hactitioners
The knowledge units in thb arca collectiuely encompass the following: (i) Recognition that security
is risk management and inherently includes tradeoffs, (ii) Familiarity with the implications of hostile
users and misuse cases, (iii) A framework for understanding algorithms and other technological
measures for enhancing security, and (iv) Strategic and tactical design issues in information security.
nistory, overview, and prlnclples: State examples of famous security breaches and denials of
service, Discuss common computer crime cost estimates and the difftculty of estimating them, Discuss the
professional's role in security and the tradeoffs involved, Explain and defend the use of each of various
security principles, Explain and defend the use ofeach ofvarious security mechanisms, for example least
privilege, fail-safe defaults, complete mediation, separation of privilege, and psychological acceptability,
Relevant tools, standards, and/or englneerlng constraints: Discuss the major provisions of
a rele\ant law such as HIPAA or the EU Data Protection Directive, Summarize intellectual property and export
control laws affecting security, esp€cially encryption, Articulate some challenges ofcomputer forensics.
Data s€curity and tntegrtty: Define conlidentiality and integrity, Cive examples of systems where
integrity alone is suflicient, Define "perfect forward secrec/' and explain why it is desirable.
Vulnerabillties and €xploitatlon: Define misuse cases and explain its role in information security,
Perform a simple fault tree analysis, Explain the types of enors that fuzz testing can reveal, Discuss issues
related to the difftculty of updating deployed systems, Explain the role code reviews in system security,
Define the problem of insecure defaults, Explain the tradeoffs inherent in responsible disclosure,
Resource protection models: Explain the pros and cons of various discretionary and mandatory
resource protection models, ustrate an access control matrix model, Define the Bell-LaPadula model,
Secret and publlc key cryptography: State the motivation for putting all encryption algorithm
variability in the keys, Discuss the effect of processing power on the effectiveness of cryptography,
Explain the meaning ofand relationship between the three basic classes of cryptographic attacks:
ciphertext only, known plaintext, chosen plaintext, Discuss the similarities and differences among the
three basic types of cryptographic functions: (zero-, one-, and two-key): hash, secret key, and public key,
Discuss block and key length issues related to secret key cryptography, Demonstrate and discuss the
motivations and weaknesses in various methods for applying secret key (block) encryption to a message
stream such as cipher block chainins (CBC), cipher feedMck mode (CFB), and counter mode (CTR).
I[essage authentlcatlon codes: Explain why hashes need to be roughly twice as long as secret
keys using the birthday problem, Discuss the uses ofhashes for fingerprinting and signing, Discuss the
key properties ofa cryptographic hash function contrasted with a general hash function.
Network and veb securlty: Describe the goals of Transport layer security (TLS) and how they are
attained using secret and public key methods along with certificates, Discuss the reasons for using a
firewall, various topologies, and firewall limitations. Describe the basic structure of URLS, HTTP requests,
and flTTP digest authentication as they relate to security, Dxplain the use of IITTP cookies including
session cookies, expiration, and re-authentication for key operations, Define cross-site scripting, Explain
an SQL iqjection attack and larious methods of remediation.
Digital irnage fundamentals: imagi) digitization, sampling and quantization image resolution, color perception
& processing, image processing: pxel based transformation, geometric transformation,
local processing (edge detection subpixel location estimation) restoration (degradation, inverse fitting &
Wiener filtering) binary image processing: thresholding, run length encoding, distance transforms, medial
axis transforms, morphological operations, region segmentation & representation- split & merge algorithnr,
region growing image filtering- histogram modification, linear and Gaussian filters, contours - digital
curves, polyling splitting. Hop- lJong algorithm Conic & Splines Hough transfornl Fourier description,
textures: statistical syntactic and model based methods, image transforms - Fourier, Hadamard, discrete
cosine. wavelets and other ortho;;onal transforms, conpression image (predictive compression methods,
vector quantization, hioarchical & progressive methods, JPEG & MPEG), case studies.
Reference Books:
l. Digital Innge Pro<ressing: Pearson Education Asia: Rafael C. Conzalez & Richard E. Woods.
2. Non-Linear Digital Filter: Principles and Applications, K|r',ver Academic Publications: I.
Pitas & A. N. Ven,:tsanopoulos.
Gruphics Devices: the characterist cs and mode of operation of vector and raster display devices, pointing
devices and hardcopy devices. The concept of workstations, segmentation and the output and input
primitives. Scan convercion algor.ilhms: the generation of rasterised images of lines, arcs, text and filled
aras. Object representalion and nanipulation: the representation of objects in two and tkee dimensional
co-ordinate space; the implementation of clipping; and segment and viewing transforrnations ( rotation,
scaling, translation and projection) in two and tkee dimensions. Graphics libraries: two systems will be
compared and contrasted: Open GL and Direct X. Image rendering: hidden line and surface elimination,
sirple and interpolative shading models, Z-buffer and scan line algorithms, ray-tracing; color and shading,
texrure mapping, Virtual envftonme 1ts.
Reference Books :
l. Haim Levkowitz: Oolor Theory and Modeling for Conrputer Graphics, Visualization, and
multimedia applications
2. Richard S. Gallagl,o, Solomon Press: Computer Visualization: Graphics Techniques for
Engineering and Sc entific engineering analysis
3. Tamiya Onodera, liatoru Kawa: A Formal Model of Visualization in Computer Graphics
Systerns
D€partment of Computer Science and Englneenng, Unversiry of Chrttagor8
Page 119
Overview to Multimedia Systems, Multimedia storage, Data compression techniques for audio and video'
Synckonization, Multimedia networking and protocols, QoS principles. video streams on ATM, Mobile
multimedia communications, Operating iystem support for multimedia. Hypermedia system. Standards for
multimedia, Multimedia database and Multimedia Applications.
Image Formation: Camera models, Colors, Lenses, projection, sensing, texture descriptors. Image
processingt Preprocessing, image correction, Enhancing features and corecting impafections, Addressing
noise, lens distortion, filtering, bluning. Grouping arul Jitting: Finding edges and lines, Gradients, zero
crossing detectors, line models, Boundary tracing, line fitting, Hough transforrq Guzman, Clowes and
Huffman, Waltz. Geometric Calibralionz Interior and exterior calibration, rectification, epipolar geometry,
correspondence, triangulation, Two-view and multi-view stereo reconstruction. Feature eulraclion'. Shape,
histogranr, color, spectral, texture. Featue analysis, distance /similarity measures. 3D Shape: Parts, Skeleton,
Surface models, Aspect Graphs. Representing the environment and Matching: Clouds, generalized
cylinders, Semantic nets, Matching line and region groups to object representations (high-level).
Recognition: SIFT & Single Object Recognition, Bag-of-Words Models, Object classification and detection:
a part-based generative model (Constellation model), a Part-based Discriminative Model (Latent S\&{), Face
Detection & Recognition: Viola-Jones Descriptor, Scene Analysis & Understanding. Segmentation: With
low-level features, high-level semantics, using machine learning-based approaches. Object Tracking:
Kalman filter, condensation, tracking humans. Structure from Motion: Multiframe reconstruction under
affine and puspective projection geometry. Mobile Robols: Sinrple robot control, planning for navigation.
Reference Books:
Digital Image & Video, Image And Video Compression Fundamentals, Coding Standards: Jpeg And Mpeg,
Video Coding Standards- H.261, H.263 And H.261, Motion Estimation And Compensatioq Transform
Coding, Entropy Coding, Pre - and Post-Processing, Rate, Distortion And Complexity, Trarxmission Of
Coded Video, Platforms, Video Codec Design, and Future Developments.
Reference Book:
1. Iain E. G. Richardson: Video Codec Design, Developing Image and Video Compression
System
2. Madhuri A. Joshi and Mehul S. Raval: Image and Video Compression: Fundamentals,
Techniques, and Applications
3. John W. Woods: Multidimensional Signal, Image, and Video Processing and Coding, Second
Edition
4. Roger J. Clarke: Digital Compression of Still Images and Video (Signal Processing and its
Applications)
D@argn€nt of Cqmute. Science ard ErEineer r|g Uni\€Gtt/ of Chittagorg
Page 12O
Reference Books:
training and testing algorithrns; Connectionist approaches: Neural networks, leaming algorithms;
Applications: Dictation systems, voice-based communications, system control, security systems, speaker
verification.
l. Daniel Graupe: Principles of Artificial Neural Network (Advanced Series in Circuits and
Systems)
2. B. Yegnanarayan: Artificial Neural Networks
3. George A. Alastassiou: Intelligent Systems: Approximation by tutificial Neural Networks
4. Nestor A. Schmajuk: Alimal Learning and Cognition: A Neural Network Approach
5. Rabuial, Juan R.: Artificial Neural Networks in Real-Life Applications
CSE MX72 Advanced Neuro.Fuzzy Systems
100 Marks, 4 Credits,4 HoursMeek
Overview of artificial neural networks; Nzuro-Models; Simple neural networls; Multi-layer neural network:
Multilayer Perceptions (MLP), logistic activation functioq backpropagation algorithm; Neural network
applications; Overview of fuzzy system; Crisp sets to fuzzy sets; Operations on fuzzy sets, fuzzy arithmetic,
fuzzy relations; Applications.
Introduction: Statistical versus structured natural language processing (NLP), basic statistics and statistical
model, linguistics essentials, corpus-based NLP; Models and techniques: Collocations, statistical Inferance,
word sense disambiguation, lexical acquisition, Markov models; Grammar: Part-of-speech tagging,
probabilistic context free grammars, probabilistic parsing Applications and techniques: Statistical alignment,
clustoing, information retrieval, text categorization.
Departsnent of Compder Sc ence dnd Engin€en i9 UnMe6ty of Chittagons Page 1,22
Decision making, systems, modeling and support , knowledge based decision support and Artificial
Intelligence; Fundamentals of exp€rt systems; Knowledge engineering, acquisition and representation;
Reasoning in knowledge based syst(ms; Basic concepts of fuzzy set theory; fuzzy decision making; basic
concepts of neural network: structur,), supervised and unsupervised leaming; application in decision making;
Hybrid intelligent systems: fuzzy neural networks, co-operative neuro-fuzzy models; Basic concepts of
genetic algorithms: evolutionary algo.'ithms, evaluation, optimization problems.
Reference Books:
methodology to model causal relationships on offshore safety assessment focusing on human and organizational
factors, Group-based ER-AHP system for producl project screening, Ship selection using a multiple criteria synthesis
approach, An evidential reasoning-interval based method for new product design assessment, Self-tuning offuzzy
beliefrule bases for engineering system safety analysis, Development ofa fuzzy FMEA Based Product Design System,
An algorithm for training parameters in beliefrule bases based on the gradient and dichotomy methods, Evidential
reasoning based preference programming for multiple attribute decision analysis under uncertainty, The scheduling of
deliveries in a production-distribution system with multiplebtyers, Design of inlegrated manufacturing planning,
scheduling awl contrcl systemi a new framework for automation, Consistence and grouping consistence ofstatistical
inference in the Dempster-Shafer theory ofevidence, Entropy-based complexity measures for dynamic decision-
making, A Bayesian network approach for offshore risk analysis through linguistic variable, Measuring the
performance of decision making unils using interval efficiencies, Three new models for preference voting and
aggregation, Assessment ofstrategic R&D project for car manufactures based on the evidential reasoning approach,
Application of intelligent decision system to nuclear waste depository option analysis, Self-assessment of conflict
management in client-supplier collaborative new product development, Measuring the performance ofdecision r4akmg
units using geometric average efficiency, Optimization models for training beliefrule based systems. Facilitation
practices in decision workshops, Dealing with Heterogeneous Information in Engineering Evaluation Processes, On the
Combination and Normalization of interval valued Belief structures, ltrference and learning methodology of belief rule
based expert system for pipeline leak detection, Retum policy model of supply chain managemenl for single-period
products, Intelligent decision system and its application im business innovative capability assessment, The evidential
reasoning approach for multiple attribute decision analysis using interval beliefdegrees, Environmental Impact
Assessment Using the Evidential Reasoning Approach, The ER approach for multi-attribute decision analysis under
inierval uncertainties, On the centroids offuzzy numben.
Reference Bool<s :
L Agoston E. Eiben, James E. Smith: Introduction to Evolutionary Computing
2. Ian C. Pamee: Evolutionary and Adaptive Computing in Engineering Design
3. T.Y. Lin and N. Cercone: Rouglr Sets and Data Mining: Analysis oflmprecis€ Datr
Inhoduction to AI, Problem Space Representation, Heuristic Search Techniques, Knowledge Representation, Predicate
Logic Reasoning Under Uncertainty, Statistical Reasoning, Game Playing, Planning, Leaming, Expert System Design,
Expert Syslem Shell. Case Studies ofTypical Expert Systems, PROLOG.
Introductioni Goals and applications ofmachine learning. Aspects ofdeveloping a learning system: training data,
function approximatiot Induclive Classificationl Conceptleaming as search lhrough a hypothesis space. General-to-
specific ordering of hypotheses. Finding maximally specific hypotheses. Learning conjunctive concepts. The
importance ofinductive bias. Decisioz Tree Learning; Picking the best splitting attribute: entropy and information
gain. Searching for simple trees and computational complexity. Occam's razor. Overfitting and pnning. Ensemble
Leaming: Using committees of multiple hypotheses. Bagging, boosting, and DECORATE . Expeimental Evaluation
of Learning Algorilims: Measuring the accuracy of learned hypotheses. Comparing learning algorithms: cross-
validation, leaming curves, and statistical hypothesrs testing. Compulational Leaming Theory: Leaming in the limit;
probably approximately correct (PAC) learning. Quantifying the number of examples needed to PAC learn.
Computational complexity oftraining. Sample complexity for finite hypothesis spaces. Rule Leaning: Translating
decision trees into rules. Heuristic rule induction using separate and conquer and information gain. Learning recursive
rules. Artiftcial Neural Nelworkst Perceptrons: representational limitation and gradient descent training. Multilayer
networks and backpropagation. Hidden layers and constructing inlermediate, distributed representations. Leaming
network structure, recurrent networks. Supporl Vector Maciizes: Maximum margin linear separators. Quadractic
programming solution to hnding maximum margin separators. Kernels for leaming non-linear functions. EaJssiar
Learning; Probability theory and Bayes rule. Naive Bayes leaming algorithm. Parameter smoothing. Generative vs.
discriminative training. Logisitic regression. Bayes nets and Markov
Deparunent of Cornputer Sctence and Engine(:nns, Untversty of Chittasoos Page 124
nets for representing dependencier;. Instance-Based Learning: Corstttcting explicit generalizatiors versus
comparing to past specific exam:les. k-Nearest-neighbor algorithm. Text Classificatioa: Bag of words
representation. Vector space morlel and cosine similarity. Relevance feedback and Rocchio algorithm.
Versions of nearest neighbor and Naive Bayes for text. Clustering arul Unsupemised Learningt Leaming
from unclassified data. Clustering. Hierarchical Aglomerative Clustering. k-means partitional clustering.
Expectation maximization (EM) frr soft clustering. Semi-supovised leaming with EM using labeled and
unlabled data. Language Learninl,: Word-sense disambiguation, sequence labeling. Hidden Markov models
(HMMb). Forward-backward EM,lgorithm for training the parameters of HMM's. Use of HMM's for speech
recognition, part-of-speech tagging and information extraction. Conditional random fields (CRF's).
Reference Book:
1. Richard Duda, Pe:er Hart and David Stork, Pattem Classification, 2nd ed. John Wiley &
Sons. 2001.
2. Tom Mitchell, Machine Leaming. McGraw-Hill, 1997.
3. Trevor Hastie, Robert Tibshirani and Jerome Friedman. The Elements of Statistical
Leaming. Springer, 2009
Introduction to
Social Network Analysis: The Social Network Perspective, Historical Foudations,
Fundamental Conc epts in Network Analysis, Distinctive Features of Social Networlq Related statistical tools
of Social Network Mathematical Representation of Social Networks: Notation for Social Network Data,
Graph Theoretic Notation, Sociometric Notation, Algebraic Notation, Graphs and Manices Graphic
Techniques for Exploring Social lletwork Data and Centrality: Degree centrality, Betweenness centrality,
Closeness centrality, Igenvector ,)entrality, Transitivity and Reciprocity Software for Social Network
Analysis: Introduction to the Tools :fSocial Networks,
Overview on Gephi and Netlogo ivlodels and Methods in Social Network Analysis: Random Graph Model,
Small World Model, Preferential 1\ttachment Model and powerJaws Diftrsion on Networks: Information
Dilirsion and Cascade Model, Epidemics SIR & SIS Model, Threshold Model, Simple and complex
contagion Application of Data Mining in Social Networks: Overview or: Data Mining and its various
techniques, Overview on Web Mining Recommendation system: Concept, Content-based method,
Collaborative fi ltering, Applicatioru.
Reference Book:
1. David Easley and J:n Kleinbog, Networks, Crowds, and Markets: Reasoning
about a Highly Connected World, Cambridge University Press, 2010
2. Zafaruni, Abbasi ar.d Liu, Social Media Mining: An Introduction, Cambridge
University Press, 2{)14
Reference Boolcs:
L Sebastian Thrun, Wolfram Burgard and Dieter Fox: Probabilistics Robotics, The MIT press,
2006
2. Human-Robot Interaction in Social Robotics: cRC Press,september 26,2012: Takayuki Kanda;
Hiroshi Ishiguro.
Fuzzy sets and Fuzzy logic systems: Classical Sets and Fuzzy Sets and Fuzzy relations : Operations on Classical sets,
properties of classical sets, Fuzzy set )perations,properties of fuzzy sets, cardinality, operations, and properties of firzzy
relations.Membership functions : F3atues of membership functions, standard forms and boundaries, different
fuzzificatioEr methods.
Fuzzy to Crisp conversions: Lambda luts for fuzzy sets, fuzzy Relations, Defuzzification methods.Classical Logic and
Fuzzy Logic: Classical predicate logi,:, Fuzzy Logic, Approximate reasoning and Fuzzy Imptication.Fuzzy Rule based
Systems: Linguistic Hedges, Fuzzy Rr le based system - Aggregation of firzzy Rules, Fuzzy Inference System-Mamdani
Fuzzy Models - Sugeno Fuzzy Model;. Applications ofFuzzy Logic: How Fuzzy Logic is applied in Home Appliances,
General Fuzzy Logic controllers, Basir: Medical Diagnostic systems and Weather forecasting.
Neural Network: InEoduction to fleual Networks: Advent of Modern Neuroscience, Classical AI and Neural
Networks, Biological Neurons and Alificial neural network; model of artificial neuron.Leaming Medrods : Hebbian,
competitive, Boltzman etc.,Neural Ne:work models: Perceptron, Adaline and Madatine networks; single layer network;
Back-propagation and multi layernetnorks.Competitive leaming networks: Kohonen self organizing networks, Hebbian
leaming; Hopfield Networks.Neuo-Fuzzy modelling: Applications of Neural Net'works: Pattern Recognition and
classification.
Geretic Algorithms: Simple GA, cro! sover and mutation, Multi-objective Genetic Atgorithm (MOGA). Applications of
Genetic Algorithm: genetic algorithms in search and optimization, GA based clustering Algorithm, Image processiog
and pattem Recognition.
Other Soft Computing techniques: Sinrulated Annealing, Tabu search, Ant colony optimization (ACO), Particle Swarm
Optimization (PSO).
Reference Bool<s :
t. Fuzzy logic with enljneering applications: Timothy J. Ross, John Wiley and Sons.
2. Principtes of Soft Computing: S N Sivanandam, S. Sumathi, John Wiley & Sons
3. Genetic Algorithms in search, Optimization & Machine t€aming: David E. Goldberg
4. NeureFuzzy and Scft computing, Jang, Sun, Mizutani, PHI
5. Neural Networks: A Classroom Approach,l/e by Kumar Satish, TMH,
6. A beginners approach to Soft Computing, Samir Roy & Udit Chakaborty, P€arson
7. Fuzzy Sets and F'tzzy Logic Theory and Applications, George J. Klir and Bo Yuan, Prentice Hall.
CSE MX83 Automata and \atural Language Processing
100 Mqrks, 4 Credits,4 Hours/Week
Module-l: Deterministic finite automuton and non-deterministic finite automaton. Transition diagrams and Language
Recognizers. Finite Automata: NFA with i transitions Significance, acceptance of languages. Conversions and
^-
Equivalence: Equivalence between NFA. with and without I transitions. NFA to DFA conversion. Minimization of FSM,
Limitations of FSM.
Module-2: Regular l,anguages: Regulx sets. Regular expressions, identity rules. Constructing finite Automata for a
giyen regular expressions, Regular saing accepted by NFA,/DFA Pumping lemma of regular sets. Closue properties of
regular sets. Grammar Formalism: Regular grammars-right linear and left linear grammars. Equivalence between regular
linear grammar and FA.
Module-3: Context Free Grammar and Constituency, Some common CFG phenomena for English, Top-Down and
Bottom-up parsing, hobabilislic Cor text Free Gramrnar, Dependency Parsing Push down Automata: Push down
automata, definition. Turing Machine: luring Machine, definition, Design ofTM
Module 4: Regular Expressions and 'l'okenization Introduction to NLP Word Tokenization, Normalization, Sentence
Segmentation, Named Entity Recognition, Multi Word Extraction, Spell Checking Bayesian Approach, Minimum Edit
Distance Morphology, Morphology - Inflectional and Derivational Morphology, Finite State Morphological Parsing,
The Lexicon and Morphotactics, Mo4rhological Parsing with Finite State Transducers, Orthographic Rules and Finite
State Transducers, Porter Stemmer
Module 5: Introduction to N-grams, Chain Rule, Smoothing - Add-One Smoothing, Witten-Bell
Discounting; Backofl Deleted Interpol rtion, N-grams for Spelling and Word hediction, Evaluation of language models.
Module 6: Text Classification, Naive Blyes' Text Classification, Evaluation, Sentiment Anallsis
Opinion Mining and Emotion Analysis. Resources and Techniques.
Module 7: Introduction to Lexical Semrmtics - Homonlmy, Polysemy, Sl,nonyny, Thesaurus -
WordNet, Computational Lexical, Semrrntics Thesaurus based and Distributional Word Similarity
Reference Books:
1. Hopcroft H.E. and Ullman J. D., Introduction to Automata Theory Language and
2. Computation, Pearson.
3. Mishra and Chandrashekaran, Theory of Computer Science, Automata
4. Languages and comprtation, PHI
D@ttn€]lt of CdWJter kience and tuEineeirg, Unrve6,ty of Chttasong PageJ 127
Introduction to Biology, Introduction to Biology the cenfal dogma, Introduction to genomics, Biology databases, Data
capture, Capturing micro-array data, Proteomics seminar, The gene ontology, Resource meta-data, Data delivery, HCI
and bioinformatics, Dealing with heterogeneous, distributed data, Bioinformatics and gnd Data analysis, Integrated
approaches to post-genome data.
Reference Books:
Introduction to the genome: DNA, RNA, amino acids, and proteins; lnformation flow ftom the genome: genes,
transcription, and translation; Integration of biological data: data integration systems, biological queries, query
processing, data warehouses, and data visualization; Genome and protein sequencing and analysis, spectrum gaphs;
Clustering and classificalim: microarrays, gene expression analysis, hierarchical clustering, k-means clustering,
clustering and classification algorithms; Drug discovery: technologies and shategies, identification of drug target
molecules, drug design approaches.
Re/erence Books :
Thesis / Project
10. The General rules for B.Sc. Engg., M.S. Engg., M.Phil and PhD
program
IJniversity of Chittagong
GENERAL RULES AN]) REGULATIONS FOR HONOURS, MASTERS, M.PHIL.
AND ANY OTHER DEGII.EE/CERTIFICATE/DIPLOMA EXAMINATIONS OF THE
IJNIVERSITY OF CHITTAGONG.
I FTJNCTION (IT THE ACADEMIC COMMITTEE/CHAIR}IAN/DIRECTOR OF
THE DEPARI'MENTS/INSTITUTES REGARDING EXAMINATION
dEfuqr postponed exar ination and it shall be circulated by the Chairrnan/Dkector of the
\'1ll Students having l:ss than 70% class attendance will be aeated as non-collegiate and sball have to
pay non-collegiate fee ofTk=600.00 students having less then 60% ofclass attendance will not
be allowed to sit f,rr the examination.
l. The intemal merr bers of the Examination Committee will recommend for the appointment of
"paper setters" an,i "script examiners" fiom the panel of examiners as prepared by Committee of
Courses and Studi,:s ofthe Departments/lrstitutes and approved by the concerned authorities ofthe
University to the ('ontroller ofExaminations ofthe University.
"There shall be tro paper setters and two sc pt examiners to be called Ist and 2nd Examiner for
each course 2nd E <aminer prefarably from other public University/Go!'t. Research Institules/Go!1.
Research Organisations."
Departrnalt of Compute, kierr.e at:d Engireqtng Unir€rity of ChrthgoaB Page 729
u The Examination Committee will moderate question papers, fix dates to conduct practical
examination, seminar and viva-voce and prepare the results. The members from the
related/langUage course will moderate question papers of related{angttage courses and conduct
practical examinations of related courses only.
The Examination Committee will finalize all the sessional (tutorial, tsmr paper, class test, field
works, field tour, study tour, class attendance etc.) marks for tabulation.
The Examination Committee shall post the class performance marks of practical course to the
answer script of respective practical examination.
The Examination Committee will recommend the name of three tabulators (at least two tabulators
shatl be from the members of the Examination Committee) to the Controller of Examinations for
appointrnent.
vl The Examination Committee shall take decision for third examination of scripts of the unmarked
answer/s which will report by the tabulators in a meeting.
vll The Examination Commifiee shall take decision on tabulators report, regarding third examination
of scripts of course/courses in a meeting presided over by the Chairman and recommend to the
Controller of Examinations the name ofa relevant third examiner for each course for appointment
from the panel of examiners other than a memhr of the Examination Committee or tabulators,
provided further that he/she was not an examiner ofthis course.
vlll The Examination Committee shall compare tabulation sheet and finalize the results submitted by
tabulators with all documents. The same tabulation sheets duly signed by the Chairman and
Members of the Committee shall be submitted to the Controller of Examinations for publication of
results.
lx The Examination Committee shall recommend the name of preparer and comparer of Grade
Sheet/Academic Transcript who will be the members of the Committee to the Conholler of
Examinations. The Grade Sheet/Academic Transcript will prepare showing course-wise grades and
the GPA,/CGPA of the candidate.
x The results of the examination shall be finalised for publication within 30 days (for semester) and
45 days (for annual system) from the date of last theoretical course examination.
xl The answer scripts of candidates at University examination shall not be re-examined.
\rl1 Code the answer script and give it to lst script examiner and on receipt Aom lst script examiner
shall distribute to the 2nd examiner along with necessary papers for eyaluations ifthe 2nd examiner
within this University.
vl[. Hand over all documents for tabulating the results to the tabulators.
lx Present all kinds ofreport from the tabulators regarding tabulation ofthe results in a meeting ofthe
Examination Conunittee.
x. Send tbree copi€r tabulated results in final form and Cnade SheetvAcademic Transqipt sheets to
the Controller of lxaminations for the announcement ofthe finalresults along with a set of copies
of all documents.
xl Or hiVher nominr:e (committee member) compares the result sheet of that examinatiqr which will
be prepared by thr: Controller ofExaminations and then sign in the Fepared result sheet.
xll Hand over a set oi copies of all documents after publication ofresults regarding examination of the
year to the Chairnran/Director of the Departaenulnstitutes.
xlll Preserve the exanined scripts up to thre€ months. The evaluated scripts shall not be handed over to
any other authority outside the University within three months. After that, scripts shall be disposed
offto the office ol the Controller of Examinations ofthis University.
q-i6-s ll The course teacher shall conduct and evaluate the script or tutorial, term paper, class test, field
,4TIrcfi-s works, field torx, study tour etc. and he/she shall sign on the scripts of these examinations.
Tutorial, term papq, class test shall be taken according to the syllabus in force.
slBffrf{
lle s{ 111. The course teach r shall take at least three class tests/tutodal examinations in theoretical paxt of a
course and shall rrubmit four copies ofthe average ofall sessional (tutorial, term pap€r, class test,
cqir t) 4\
field works, fielc tour, study tour, class attendance etc.) mark to the Chaiman/Director of the
frqtg.{<\
Department/ln stitutes.
e.)).{o!!
qfo.{ The course teachtrs will give theoretical (if any) and practical marks to the students on the basis of
q{6t their class performance and four copies of mark sheets submitted to ChairmaniDirector of the
lx. Two examiners neither of whom shall be aware ofthe marks assigned by the other examiner shall
independently examine each script.
x. Each examiner should give his total marks in round figure and not in fiactions. If there be a
be increased to the next whole
fraCtiOn in the sum total of marks assigned to a candidate it should
number.
xl Ifthere is any excess answer in the scripts, the last answer will be cancelled.
For the irregular and improvement categories, tabulators will individually post the improved marks
along with all other marks ofa particular candidate ftom the previous year's tabulation sheet to the
current tabulation sheet and hand over to the Chairman of the Examination Committee.
vll. Tabulators shall deposit the tabulation sheets after finishing the tabulation to the Chairman of the
Examination Commi$ee duly signed by them along with all documents and their comments for
fi nalization of results.
The ConEoller of Examinations will issue appointment letters to the Chairman and members of the
Examination Committee, paper setters, script examiners, tabulators, and who will prepare and
compare the grade sheet/academic transcript subject to the approval of the authority.
It If the script examiners are from outside of this University, the Controller of Examinations shall
distibute the answer scripts to the 2nd examiner appointed from other University.
111. The Contoller of Examinations will prepare three different R?es of tabulation sheets for the
regular, irregular/improvement categories of students in each examination or as decided by the
University Authority from time to time. These tabulation sheet and grade sheeuacademic tanscript
should be in English.
I
tv. The Controller of Examrnations will receive three copies tabulated results in final form from the
Chairman of the Examinrtion Committee for the annormcement of the final results along with a set
ofcopies ofall cormectetl working papers including grade/academic transcript sheets.
The Controller of Exanrinations may compare the result submitted by the Chairmaa of the
Examination Committee. If there is any discr€pancy may send back to the respective Chairman of
the Examination Commitlee for necessary correction.
The Controller of Exarrinations shall prepare result sheet of each examination that will be
compared by the Chairaan of the Examination Committee or his/her nominee (committee
member)
vll The Controller of Examirations shall publish the results of the programme and shall provide the
grade sheet/academic transcript showing course-wise grades and the GPA./CGPA of the
candidates.
vlll The Conaoller of Examinations shall publish final results of each examination provisionally
subject to approval ofthe Vice-Chancellor and report to the Syndicate and thereafter send a copy
of the tabulation sheet duly signed by him/her with date to the Chaiman/Dtector of the concerned
DepartmentYlnstitutes.
7 The above rules and re 3ulations are also applicable to the affrliated colleges/institutes of
the Chittagong Univers: ty.
The above rules and regulations framed herein and being passed by the appropriate
authority shall come into force immediately and anything in any ordinance of the
University for any Dq;ree/Certificate/Diploma contrary to the provision herein shall
be deemed cancelled and invalid.