UG 2018 Syllabus
UG 2018 Syllabus
Semester-I
S No Sub Code Subject Name L T P Hrs. Credits
1 BSMA-401 Engineering Mathematics I 3 1 0 4 4
2 BSPH-401 Applied Physics 3 1 0 4 4
Elements of Electrical
3 ESEE-401 2 1 0 3 3
Engineering
Elements of Computer
4 ESCS-401 2 0 0 2 2
Engineering
Elements of Electronics
5 ESEC-401 2 0 0 2 2
Engineering
6 BSPH-402 Applied Physics Lab 0 0 2 2 1
Elements of Electrical
7 ESEE-402 0 0 2 2 1
Engineering Lab
Elements of Computer
8 ESCS-402 0 0 4 4 2
Engineering Lab
Elements of Electronics
9 ESEC-402 0 0 2 2 1
Engineering Lab
Total 12 3 10 25 20
Semester-II A
1
Semester-IIB
Practical Training During Summer
1 TPIN-421 Vacations (In-house) 02 weeks 40 1 (S/US)
2 TPIN-422 Technical Competency 40 1 (S/US)
Semester-III
Semester-IVA
2
Semester-IVB
Semester-VA
S No Sub Code Subject Name L T P Hrs. Credits
1 PCCS-611 Discrete Mathematics 2 1 0 3 3
2 PCCS-612 Computer Networks 2 1 0 3 3
3 OECS-611 Open Elective-1 3 0 0 3 3
4 OECS-612 Open Elective-2 3 0 0 3 3
5 PECS-611 Professional Elective-1 3 0 0 3 3
6 HSMC-601 Technical Communication 2 0 0 2 2
7 PCCS-613 Computer Networks Lab 0 0 4 4 2
8 HSMC-602 Technical Communication Lab 0 0 2 2 1
Total 15 2 6 23 20
Semester-V B
Fractional credit course/Extra
1 EAA-611+ Academic Activity 40 1 (S/US)
+GROUP A/B/C
Semester-VI A
S No Sub Code Subject Name L T P Hrs. Credits
1 PCCS-621 Design and Analysis of Algorithm 2 1 0 3 3
Automata Theory and Formal
2 PCCS-622 2 1 0 3 3
Languages
3 OECS-621 Open Elective-3 3 0 0 3 3
4 OECS-622 Open Elective-4 3 0 0 3 3
5 PECS-621 Professional Elective-2 3 0 0 3 3
Engineering Economics and
6 3 0 0 3 3
HSMC-603 Entrepreneurship
Design and Analysis of Algorithm
7 PCCS-623 0 0 4 4 2
Lab
Total 16 2 4 22 20
Semester-VI B
1 TPID-621 Industrial Training 04 weeks 40 2 (S/US)
Fractional credit course/Extra
EAA-622+ Academic Activity 40 1 (S/US)
2 +GROUP A/B/C
3
Semester-VII
S No Sub Code Subject Name L T P Hrs. Credits
1 PCCS-711 Internet Programming 2 1 0 3 3
2 PCCS-712 Compiler Design 3 1 0 4 4
3 PECS-711 Professional Elective-3 3 0 0 3 3
4 PECS-712 Professional Elective-4 3 0 0 3 3
5 OECS-711 Open Elective-5 3 0 0 3 3
6 PCCS-713 Internet Programming Lab 0 0 4 4 2
7 PRCS-711 Project Stage I and Seminar 0 0 4 4 2
Total 14 2 8 24 20
Semester-VIII
S No Sub Code Subject Name L T P Hrs. Credits
1 PECS-721 Professional Elective-5 3 0 0 3 3
2 PECS-722 Professional Elective-6 3 0 0 3 3
3 PRCS-721 Project Stage II 0 0 12 12 6
Total 6 0 12 18 12
OR
S No Sub Code Subject Name L T P Hrs. Credits
1 INID-721 Internship in Industry 6
2 PRCS-721 Project Stage II 0 0 12 12 6
Total 0 0 12 12 12
4
LIST OF OPEN ELECTIVES
S. No Sub. Code Subject Name L T P Hrs. Credits
1 Open Elective-I 3 0 0 3 3
OECS-611A Software Engineering 3 0 0 3 3
OECS-611B Enterprise Resource Planning 3 0 0 3 3
OECS-611C Cyber Laws and Ethics 3 0 0 3 3
OECS-611D Programming Methodology 3 0 0 3 3
OECS-611E Data Preparation and Analysis 3 0 0 3 3
2 Open Elective-II 3 0 0 3 3
OECS-612A Software Project Management 3 0 0 3 3
OECS-612B Decision Support System 3 0 0 3 3
OECS-612C Computer Networks 3 0 0 3 3
OECS-612D Object Oriented Programming 3 0 0 3 3
OECS-612E Database Management System 3 0 0 3 3
3 Open Elective-III 3 0 0 3 3
OECS-621A Requirement Engineering 3 0 0 3 3
OECS-621B Management Information
3 0 0 3 3
System
OECS-621C System Installation and
3 0 0 3 3
Troubleshooting
OECS-621D Internet Programming 3 0 0 3 3
OECS-621E Database Integrity and Security 3 0 0 3 3
4 Open Elective-IV 3 0 0 3 3
OECS-622A Object Oriented Analysis and
Design 3 0 0 3 3
5
OECS-622B E-Commerce 3 0 0 3 3
OECS-622C Computer Network Security 3 0 0 3 3
OECS-622D Computer Graphics 3 0 0 3 3
OECS-622E Data Analytics 3 0 0 3 3
5 Open Elective-V 3 0 0 3 3
OECS-711A Software Reliability and Testing 3 0 0 3 3
OECS-711B Human Resource Management 3 0 0 3 3
OECS-711C Client Server Architecture 3 0 0 3 3
OECS-711D Multimedia and Animation 3 0 0 3 3
OECS-711E Data Mining 3 0 0 3 3
6
List of Professional Electives:
Sr.No Sub. Code Subject Name L T P Hrs. Credits
1 Professional Elective-I
PECS-611A Computer Graphics 3 0 0 3 3
PECS-611B Data Mining 3 0 0 3 3
PECS-611C Cyber Laws and Ethics 3 0 0 3 3
PECS-611D Software Engineering 3 0 0 3 3
PECS-611E Enterprise Resource Planning 3 0 0 3 3
PECS-611F Network Operating System 3 0 0 3 3
2 Professional Elective-II
PECS-621A Multimedia and Animation 3 0 0 3 3
PECS-621B Artificial Intelligence 3 0 0 3 3
PECS-621C Mobile Communication 3 0 0 3 3
PECS-621D Software Project Management 3 0 0 3 3
PECS-621E Decision Support System 3 0 0 3 3
Advanced Computer
PECS-621F 3 0 0 3 3
Architecture
3 Professional Elective-III
PECS-711A Image Processing 3 0 0 3 3
PECS-711B Soft Computing 3 0 0 3 3
PECS-711C Computer Network and Security 3 0 0 3 3
PECS-711D Requirement Engineering 3 0 0 3 3
Management Information
PECS-711E 3 0 0 3 3
System
PECS-711F Distributed System 3 0 0 3 3
7
4 Professional Elective-IV
PECS-712A Simulation and Modeling 3 0 0 3 3
PECS-712B Machine Learning 3 0 0 3 3
Adhoc and Wireless Sensor
PECS-712C 3 0 0 3 3
Networks
Object Oriented Analysis and
PECS-712D 3 0 0 3 3
Design
PECS-712E E-Commerce 3 0 0 3 3
PECS-712F Parallel Computing 3 0 0 3 3
5 Professional Elective-V
PECS-721A Digital Signal Processing 3 0 0 3 3
6 Professional Elective-VI
PECS-722A Python Programming 3 0 0 3 3
8
MINOR DEGREE
Semester-III
S
Sub Code Subject Name L T P Hrs. Credits
No
1 MDCS-511 Internet Technologies 3 1 0 4 4
Total 3 1 0 4 4
Semester-IV
S
Sub Code Subject Name L T P Hrs. Credits
No
1 MDCS-521 Operating System 3 1 0 4 4
Total 3 1 0 4 4
Semester-V
S
Sub Code Subject Name L T P Hrs. Credits
No
Application development using
1 MDCS-611 3 1 0 4 4
Python
Total 3 1 0 4 4
Semester-VI
S
Sub Code Subject Name L T P Hrs. Credits
No
1 MDCS-621 Artificial Intelligence 3 1 0 4 4
Total 3 1 0 4 4
Semester-VII
S
Sub Code Subject Name L T P Hrs. Credits
No
1 MDCS-711 Soft Computing 3 1 0 4 4
Total 3 1 0 4 4
9
HONORS DEGREE
Semester-V
S
Sub Code Subject Name L T P Hrs. Credits
No
1 HDCS-611 Data Analytics 3 1 0 4 4
2 HDCS-612 Internet of Things 3 1 0 4 4
Total 6 2 0 8 8
Semester-VI
S
Sub Code Subject Name L T P Hrs. Credits
No
1 HDCS-621 Optimization Techniques 3 1 0 4 4
Total 3 1 0 4 4
Semester-VII
S
Sub Code Subject Name L T P Hrs. Credits
No
Cryptography and Network
1 HDCS-711 3 1 0 4 4
Security
Total 3 1 0 4 4
Semester-VIII
S
Sub Code Subject Name L T P Hrs. Credits
No
1 PHCS-721 Project Hon's 0 0 08 08 4
Total 0 0 08 08 4
10
SEMESTER-I
11
Title of the course : Elements of Computer Engineering
Subject code : ESCS-401
Weekly load : 2 Hrs LTP 2-0-0
Credits :2
Course Outcomes: At the end of the course, the student will be able to:
CO1 Get acquainted with basics of computer system along with its various components
CO2 Know about various operating systems and memory
CO3 Study the C programming basics and learn the concept of operators
CO4 Understand the concept of decision statements and loops
CO5 Learn the use of functions, pointers, arrays, structures, union etc. for modular programming
Theory
Unit Main Topics Course outlines Lecture(
s)
Unit-1 1. Introduction Introduction and characteristics of computer system, 04
Generations, Classifications, Applications, Central Processing
Unit, Memory, I/O devices, Introduction to operating system
and its types, Algorithm, Flowchart.
2. C Basic program construction, Structure of a C program, 04
Programming Compilation process, preprocessor directives, Comments, Data
Basics types, Type conversions, Operators - Arithmetic, Relational,
Logical, Conditional, Increment/decrement, Library functions,
Header files.
3. Loops and for loop, while loop, do loop, Various forms of 04
Decision ifstatement,switch statement, break statement, continue state
Statements ment, go to statement.
4. Functions Defining functions, Passing arguments to functions, Returning 04
values from functions, Reference arguments, Storage classes.
12
Unit-2 5. Pointers Pointers, Pointers to pointers, Declaring and initializing 04
pointers, Pointer expressions, Pointers and arrays, Pointers and
strings.
6. Arrays Arrays and strings, Declaring an array, Initializing arrays, 04
Accessing the array elements, Working with multidimensional
arrays, Declaring and initializing string variables, String
handling functions.
7. Structures Declaring and initializing a structure, Accessing the members of 04
and Union a structure, Nested structures, Array of structures, Using
structures in functions, Pointers and structures, Declaring and
initializing a union.
8. Files Reading and writing to text and binary files, Character I/O, 04
String I/O, File pointers, Error handling, Redirection, Command
line arguments.
Total=32
Recommended Books:
1. Raja Raman V., Fundamentals of Computers, PHI.
2. Kernighan Brian W. and Ritchie, Dennis M., The C Programming language, Dorling
Kingsley.
3. Balagurusamy E., Programming in ANSI C, TMH Publications
13
Title of the course : Elements of Computer Engineering Lab
Subject Code : ESCS-402
Weekly load : 4 Hrs LTP 0-0-4
Credit :2
Course Outcomes: At the end of the course, the student will be able to:
CO1 Solve basic mathematical problems using programming
CO2 Demonstrate the use of loop statements to solve iteration problems
CO3 Implement the concept of modular programming and recursion using functions
CO4 Implementation of decision statements and loops
CO5 Create a file and add, append or retrieve data using file handling
LIST OF PRACTICALS
1. WAP to find multiplication and addition of two numbers.
2. WAP to swap two numbers without using third variable.
3. WAP to calculate temperature in Fahrenheit to Celsius using formula C= (F- 32)/1.8.
4. WAP to calculate Sum and Average of N numbers using sequence of statements.
5. WAP to implement the concept of switch and break statement.
6. WAP to find maximum out of 3 numbers a, b &c using Control Statements (if, else, nested if,
nested else).
7. WAP to find minimum out of 3 numbers a, b & c using Control Statements (if, else, nested if, else)
8. WAP to find whether entered number is palindrome or not.
9. WAP to check entered number is even or odd.
10. WAP to find whether entered year is leap year or not.
11. WAP to find factorial of positive integer using for loop.
14
12. WAP to input a number from 1 to 10 and print its table.
13. WAP to print all the number between 1 to 100 which are divisible by7 using the concept of loops.
14. WAP to generate Fibonacci series up to n using loops.
15. WAP to implement the concept of continue statements.
16. Write a program to calculate area of circle using function.
17. Write an iterative function to calculate factorial of given number.
18. Write a recursive function to calculate factorial of given number
19. WAP to find even & odd up to a given limit using the concept of array and loops.
20. WAP to calculate the addition of one dimensional array elements.
21. WAP to reverse a string.
22. WAP to find addition of two matrix of n*n order using the concept of 2 dimensional array
23. WAP to find multiplication of two matrix of n*n order using the concept of 2 dimensional
array.
24. WAP to study the concept of structure.
25. WAP to study the concept of union.
26. Write a program to study the concept of pointer.
27. WAP to create a data file, retrieve data from the file.
28. WAP to write and retrieve records from a file.
Note: The above mentioned list of experiments is suggested list. Teacher may add more programs/
experiments as per requirement.
15
SEMESTER-II
16
Title of the course : Elements of Computer Engineering
Subject code : ESCS-401
Weekly load : 2 Hrs LTP 2-0-0
Credits :2
Course Outcomes: At the end of the course, the student will be able to:
CO1 Get acquainted with basics of computer system along with its various components
CO2 Know about various operating systems and memory
CO3 Study the C programming basics and learn the concept of operators
CO4 Understand the concept of decision statements and loops
CO5 Learn the use of functions, pointers, arrays, structures, union etc. for modular programming
Theory
Unit Main Topics Course outlines Lecture(
s)
Unit-1 1. Introduction Introduction and characteristics of computer system, 04
Generations, Classifications, Applications, Central Processing
Unit, Memory, I/O devices, Introduction to operating system
and its types, Algorithm, Flowchart.
2. C Basic program construction, Structure of a C program, 04
Programming Compilation process, preprocessor directives, Comments, Data
Basics types, Type conversions, Operators - Arithmetic, Relational,
Logical, Conditional, Increment/decrement, Library functions,
Header files.
3. Loops and for loop, while loop, do loop, Various forms of if 04
Decision statement,switch statement, break statement, continue state
Statements ment, go to statement.
4. Functions Defining functions, Passing arguments to functions, Returning 04
values from functions, Reference arguments, Storage classes.
17
Unit-2 5. Pointers Pointers, Pointers to pointers, Declaring and initializing 04
pointers, Pointer expressions, Pointers and arrays, Pointers and
strings.
6. Arrays Arrays and strings, Declaring an array, Initializing arrays, 04
Accessing the array elements, Working with multidimensional
arrays, Declaring and initializing string variables, String
handling functions.
7. Structures Declaring and initializing a structure, Accessing the members of 04
and Union a structure, Nested structures, Array of structures, Using
structures in functions, Pointers and structures, Declaring and
initializing a union.
8. Files Reading and writing to text and binary files, Character I/O, 04
String I/O, File pointers, Error handling, Redirection, Command
line arguments.
Total=32
Recommended Books:
1. Raja Raman V., Fundamentals of Computers, PHI.
2. Kernighan Brian W. and Ritchie, Dennis M., The C Programming language, Dorling
Kingsley.
3. Balagurusamy E., Programming in ANSI C, TMH Publications
18
Title of the course : Elements of Computer Engineering Lab
Subject Code : ESCS-402
Weekly load : 4 Hrs LTP 0-0-4
Credit :2
Course Outcomes: At the end of the course, the student will be able to:
CO1 Solve basic mathematical problems using programming
CO2 Demonstrate the use of loop statements to solve iteration problems
CO3 Implement the concept of modular programming and recursion using functions
CO4 Implementation of decision statements and loops
CO5 Create a file and add, append or retrieve data using file handling
LIST OF PRACTICALS
1. WAP to find multiplication and addition of two numbers.
2. WAP to swap two numbers without using third variable.
3. WAP to calculate temperature in Fahrenheit to Celsius using formula C= (F- 32)/1.8.
4. WAP to calculate Sum and Average of N numbers using sequence of statements.
5. WAP to implement the concept of switch and break statement.
6. WAP to find maximum out of 3 numbers a, b &c using Control Statements (if, else, nested if,
nested else).
7. WAP to find minimum out of 3 numbers a, b & c using Control Statements (if, else, nested if, else)
8. WAP to find whether entered number is palindrome or not.
9. WAP to check entered number is even or odd.
10. WAP to find whether entered year is leap year or not.
11. WAP to find factorial of positive integer using for loop.
19
12. WAP to input a number from 1 to 10 and print its table.
13. WAP to print all the number between 1 to 100 which are divisible by7 using the concept of loops.
14. WAP to generate Fibonacci series up to n using loops.
15. WAP to implement the concept of continue statements.
16. Write a program to calculate area of circle using function.
17. Write an iterative function to calculate factorial of given number.
18. Write a recursive function to calculate factorial of given number
19. WAP to find even & odd up to a given limit using the concept of array and loops.
20. WAP to calculate the addition of one dimensional array elements.
21. WAP to reverse a string.
22. WAP to find addition of two matrix of n*n order using the concept of 2 dimensional array
23. WAP to find multiplication of two matrix of n*n order using the concept of 2 dimensional
array.
24. WAP to study the concept of structure.
25. WAP to study the concept of union.
26. Write a program to study the concept of pointer.
27. WAP to create a data file, retrieve data from the file.
28. WAP to write and retrieve records from a file.
Note: The above mentioned list of experiments is suggested list. Teacher may add more programs/
experiments as per requirement.
20
SEMESTER-III
21
Title of the course : Digital Electronics
Subject Code : PCCS-511
Weekly load : 3 Hrs LTP 3-0-0
Credit :3
Course Outcomes: At the end of the course, the student will be able to:
CO1 Perform conversions among different number systems, became familiar with basic logic
gates and understand Boolean algebra.
CO2 Simplify Boolean functions by using basicBoolean properties &K-Map.
CO3 Design of combinational circuits such as MUX, DEMUX, Encoder, Decoder etc.
CO4 Understand the design of sequential Circuits such as Flip-Flops, Registers, and Counters.
CO5 Obtain a basic level of Digital Electronics knowledge and set the stage to perform the analysis
and design of Complex Digital electronic Circuits.
Theory
22
Karnaugh Map Method; Don’t Care Conditions, Realization
of Boolean Functions Using Only NAND and NOR Gates.
4. Combinational Half & Full Adder; Half & Full Subtractor; Parity Generator 05
Logic Circuits and Checker; Code Converters; Carry look ahead generator;
Using Discrete Binary Multiplier; Majority Circuits, Magnitude
Logic Gates Comparator.
Total=48
Recommended Books:
1. Morris Mano: “Digital Logic and Computer Design”, PHI.
2. Bartee Thomas: “Digital Computer Fundamentals”, McGraw-Hill.
3. Richard Sandige: “Modern Digital Design”, McGraw-Hill.
4. Taub and Schilling: “Digital Integrated Electronics”, McGraw-Hill.
5. Fletcher W.I.: “Engineering Approach to Digital Design”, PHI.
6. Malvino& Leech: “Digital Principles & Applications”, TMH.
7. J. F. Wakerly: “Digital design: principles and practice package”, Pearson
23
Title of the course : Object Oriented Programming
Subject Code : PCCS-512
Weekly load : 3 Hrs LTP 2-1-0
Credit :3
Course Outcomes: At the end of the course, the student will be able to:
CO1 Understand the difference between object oriented programming and procedural programming
CO2 Choose data types and structures to solve mathematical and scientific problems
CO3 Write programs using C++ features such as composition of objects, operator overloading,
inheritance, polymorphism etc.
CO4 Simulate the real world problems into object-oriented programs
CO5 Illustrate the process of data file manipulations using C++
Theory
Unit Main Topics Course outlines Lecture(s)
1. Introduction Basic concepts of object-oriented programming, Characteristics 06
of object-oriented programming, Comparison between
procedural programming paradigm and object-oriented
programming paradigm.
2. Classes and Specifying a class, Creating class objects, Accessing class 06
Objects members, Access specifiers – public, private, and protected,
Unit-1 Static members variables and functions, Static class objects, The
const keyword, Friend functions, Friend classes, Empty classes,
Nested classes, Local classes, Abstract classes, Container
classes.
3. Constructors Need for constructors and destructors, Default constructor, 06
and Parameterized constructor, Copy constructor, Dynamic
Destructors constructors, Destructors, Constructors and destructors with
static members.
24
4. Inheritance Introduction, Defining derived classes, Forms of inheritance, 06
Ambiguity in multiple and multipath inheritance, Virtual base
class, Object slicing, Overriding member functions, Object
composition and delegation, Order of execution of constructors
and destructors.
5. Virtual Concept of Binding - Early binding and late binding, Virtual 06
Functions and functions, Pure virtual functions, Abstract classes, Virtual
Polymorphism destructors & polymorphism.
6. Operator Defining operator overloading, Rules for overloading operators, 06
Overloading Overloading of unary operators and binary operators,
and Type Overloading of new and delete operators, Type conversion -
Conversion Basic type to class type, Class type to basic type, Class type to
another class type.
7. Pointers and Understanding pointers, Accessing address of a variable, 06
Unit-2 Dynamic Declaring & initializing pointers, Accessing a variable through
Memory its pointer, Pointer arithmetic, Pointer to a pointer, Pointer to a
Management function, Dynamic memory management - new and
delete Operators, Pointers and classes, Pointer to an object,
Pointer to a member, this Pointer, Self-referential classes,
Possible problems with the use of pointers - Dangling/wild
pointers, Null pointer assignment, Memory leak and allocation
failures.
8. Exception Exception and its types, Exception handling mechanisms, File 06
Handling and streams, Hierarchy of file stream classes, Error handling during
Managing Data file operations, Reading/Writing of files, Accessing records
Files randomly, Updating files, Data formatting in memory buffers.
Total=48
Recommended Books:
1. Lippman, S.B. and Lajoie, J., C++Primer, Pearson Education.
2. Stroustrup, Bjarne, The C++ Programming Language, Pearson Education.
3. YashwantKanetkar, Let Us C++, BPB
4. Robert Lafore, Turbo C++, Pearson India
25
Title of the course : Data Structures and Algorithms
Subject Code : PCCS-513
Weekly load : 3Hrs LTP 2-1-0
Credit :3
Course Outcomes: At the end of the course, the student will be able to:
CO1 Introduce various techniques for representation of the data in the real world
CO2 To design and implement various data structure algorithms
CO3 Familiar with the utilization of the data structures in problem solving
CO4 Learn how to analyse the time and space requirements of a given algorithm
CO5 To develop application using various data structure algorithms.
Theory
Unit Main Topics Course Outlines Lecture(s)
1. Introduction Basic concepts and notations; Data structures and data 04
structure operations; Mathematical notation and functions;
Algorithmic complexity, time-space trade off and recursion.
26
5. Trees Binary trees; Complete binary trees; Extended binary tree; 06
Representation of binary tree; Insertion and deletion from
the binary tree; Tree traversals using in-order, pre-order and
Unit-2 post-orders; Applications of binary tree; search tree; Heap
tree, Balanced binary tree; B-trees.
6. Graphs Basic concepts &definitions; Representation of graph – 06
Adjacency list, Adjacency matrix; Path matrix, Graph
traversal– BFS, DFS; Shortest path algorithms.
7. Sorting & Linear search; Binary search; Bubble sort; Insertion sort; 06
Searching Quick sort; Selection sort; Merge sort; Heap sort; Selection
sort, Hashing Techniques.
8. File File streams, Hierarchy of file stream classes, Error handling 06
Handling during file operations, Reading/Writing of files, Accessing
records randomly, Updating files,
Total=48
Recommended Books:
1. Lipschutz,Schaum Series, Data Structures ,TMH.
2. A.M. Tanenbaum, Data Structures using C and C++, Pearson Education.
3. Trembley Sorenson, Introduction to Data Structures with Applications, TMH.
27
Title of the course : Digital Electronics Lab
Subject Code : PCCS-514
Weekly load : 2 Hrs LTP 0-0-2
Credit :1
Course Outcomes: At the end of the course, the student will be able to:
CO1 Implement the various logic gates such as AND, OR, NOT, NAND, NOR, XOR
CO2 Simplify the given expression and realize it using basic gates and universal gates.
CO3 Design and implement the various combinational such as adder and subtractorusing logic gates
CO4 Design and implement the multiplexer and demultiplexer circuits using NAND gates
CO5 Design and implement the various sequential circuits such as flip-flops using logic gates.
LIST OF PRACTICALS
1. Study of Logic gates- AND, OR, NOT,NAND,NOR,XOR on different inputs.
2. To simplify the given expression and to realize it using Basic gates and Universal gates.
3. Design and realization of Half adder/Substractor using NAND gates.
4. Design and realization of Full adder using Logic gates.
5. Realization of R-S Flip-flop.
6. Realization of J-K Flip-flop.
7. To design and set up the following circuit
a. 4:1 Multiplexer (MUX) using only NAND gates.
b. 1:4 Demultiplexer(DE-MUX) using only NAND gates.
28
Note: The above mentioned list of experiments is suggested list. Teacher may add more programs/
experiments as per requirement.
Course Outcomes: At the end of the course, the student will be able to:
CO1 Understand the basic concepts of writing a program in C++.
CO2 Apply various object-oriented features like classes, inheritance and polymorphism to solve
various computing problems using C++ language.
CO3 Solve mathematical and scientific problems using object oriented concepts.
CO4 Understanding the concepts of pointers and dynamic memory managements.
CO5 Create a file and perform the operation like addition, deletion, append or retrieve data using
file handling
LIST OF PRACTICALS
1. WAP to check a given number is even or odd using function.
2. WAP to generate Fibonacci series up to n using loops
3. Write an iterative function to calculate factorial of given number.
4. Write a recursive function to calculate factorial of given number.
5. Write a program using function to calculate the addition of array elements.
6. Write a program that uses a class where the member functions are defined inside a class.
7. Write a program that uses a class where the member functions are defined outside a class.
8. WAP to create a Class Employee with the following specifications:
29
private members: name [20] characters,
Employee_ ID int,
Basic, DA, HRA Float
salary Float
calculate_sal() function computes the salary and returns it. Salary is the
sum of Basic, DA and HRA.
public members: Readdata() function accepts the data values and invokes the calculate()
function.Display () function shows the results on screen.
Note: The above mentioned list of experiments is suggested list. Teacher may add more programs/
experiments as per requirement.
30
Title of the course : Data Structures and Algorithms
Subject Code : PCCS-516
Weekly load : 4Hrs LTP 0-0-4
Credit :2
Course Outcomes: At the end of the course, the student will be able to:
CO1 To impart the basic concepts of data structures and algorithms
CO2 Design, implement, test, and debug programs using a variety of data structures including
linked lists, stacks, queues, binary search trees, heaps and graphs
CO3 Familiar with the utilization of the data structures in problem solving
CO4 Implement and know when to apply standard algorithms for searching and sorting
CO5 Learn to choose the appropriate data structure and algorithm design method for a specified
application
LIST OF PRACTICALS
1) WAP that insert an element in beginning of Linear Link List.
2) WAP that delete an element from the beginning of the Linear Link List.
3) WAP that delete an element from the end of the Linear Link List.
4) WAP that delete an element after a given element of the given Linear Link List.
5) WAP that reverse the element of the Linear Link List.
6) WAP that concatenate two Linear Linked List.
7) WAP to Insert and remove the Top element of Stack.
8) WAP to insertan element at the end of queue and remove the first element of the queue.
9) WAP to insert and delete an element in a circular queue.
31
10) WAP of implementation of queue using stack.
11) WAP to create a Tower of Hanoi.
12) WAP to illustrate the implementation of Binary Search Tree.
13) WAP to sort an array of integer in Ascending Order using Bubble Sort.
14) WAP to sort an array of integer in Ascending Order using Insertion Sort.
15) WAP to sort an array of integer in Ascending Order using Quick Sort.
16) WAP to search an element using Linear Search Method.
17) WAP to search an element using Binary Search Method.
Note: The above mentioned list of experiments is suggested list. Teacher may add more programs/
experiments as per requirement.
32
Subject Name : Internet Technologies
Course Outcomes: At the end of the course, the student will be able to:
CO1 Understanding of Web fundamentals and its working around the world
CO2 Understanding and Web Development skills using different flavours of HTML along with
CSS technology and interactive validations of different elements using JavaScript/ vbscript
CO3 Understanding E-commerce market and being aware of prime security issues while
developing applications
CO4 Understanding the programming skills using java as Internet programming tool,
developing client-server applications, Swings & Events Exception Handling, Servletand
JDBC applications
CO5 The Practicability of all above contents is covered in Lab-Sessions
Theory
33
2. E-Commerce Definition, Types of E-commerce, merits & demerits, 08
Problems and issues related to Internet based E-commerce,
Unit-1 M-Commerce, E-commerce laws & forms of agreements, E-
governance & role of government.
Recommended Books:
1. Uttam K. Roy, Web technologies; Oxford.
2. Zak Ruvalcaba& Anne Boehm, Murach’s HTML5 and CSS3; SPD.
3. FiruzaAibara, HTML5 for beginners; SPD.
4. Jim Farley and William Crawford, Java Enterprise in a nutshell; SPD-O’reilly.
5. Michael Morrison, Head First Java Script; SPD-O’reilly.
34
SEMESTER-IV
35
Title of the course : Computer Organization and Architecture
Subject Code : PCCS-521
Weekly load : 3Hrs LTP 3-0-0
Credit :3
Course Outcomes: At the end of the course, the student will be able to:
CO1 Understand the evolution and trends of Computer Architecture and Organization
CO2 Understand the micro-operations executed in the system and thereby construction of ALU
CO3 Understand the instruction format, classification and execution in the system
CO4 Understand the organization of CPU and Control Unit
CO5 Understand the process of input/output in the system which includes the interfacing of I/O
devices
Theory
36
Unit-1 2. Register Register transfer language, Register transfer language, Bus & 06
Transfer memory transfer, arithmetic, logic and shift micro-operations,
Language and constructing an arithmetic logic shift unit.
Micro-
Operations
3. Basic Computer registers, Instructions, Instruction codes, Instruction 07
Computer formats, Instruction classifications, Memory reference
Architecture instruction, Register reference instruction, Input/Output&
and Design Interrupts Instruction set completeness, Instruction Execution
cycle, Interrupts, interrupt cycle, Timing & control unit,
complete computer description & design of basic computer
4. Central General Register Organization. Stack Organized CPU. 05
Processing Addressing Modes. Data Transfer and Manipulation. RISC Vs
Unit CISC. Introduction to Parallelprocessing and Pipeline
Processing
5. Control Hardwired and micro-programmed control organization. 06
Organization Horizontal and Vertical Microprogramming.
6. Input Output I/O interfacing, Asynchronous data transfer, Modes of transfer, 06
Organization Priority interrupt, DMA, Input Output processor
7. Memory Memory Systems: principle of locality, principles of memory 06
Unit-2 Organization hierarchy Caches, associative memory, main memory, Virtual
memory, Paging and Segmentation
8. Case Studies Case studies of the contemporary architecture for processors of 06
families like Intel and AMD
Total=48
Recommended Books:
1. Hamacher, Vranesic “Computer Organization”, McGraw Hill.
2. Stalling , “Computer Organization, TMH.
3. John. P. Hays, “Computer Architecture and Organization,McGraw Hill.
4. Carpirdli, “Computer Architecture & Organization, Pearson Education Asia
5. M. Mano, “Computer Architecture & Organization”, PHI
37
Title of the course : Operating System
Subject Code : PCCS-522
Weekly load : 3 Hrs LTP 3-0-0
Credit :3
Course Outcomes: At the end of the course, the student will be able to:
CO1 Learn basic concepts of Operating System along with implementation of scheduling
algorithms in process management
CO2 Analyze critical section problem in Inter process communication and use of memory
management techniques
CO3 Implement page replacement algorithms and use virtual memory concepts
CO4 Know about file structure, file management and disk management
CO5 Learn the concept of deadlock and implement various algorithms used for its detection and
recovery
Theory
38
Multiprocessing, Time-sharing systems and real time
systems etc.), concept of virtual machine, case study on
UNIX and windows operating system.
Total=48
Recommended Books:
1. Silberschatz A & Galvin, Operating System Concepts, John Wiley & Sons
2. W. Stallings, Operating Systems: Internals and Design Principles, Pearson Pub.
3. Andrew S Tanenbaum, Operating Systems - Design and Implementation, PHI
4. Crawley, Operating Systems - An Object oriented Approach, McGraw Hill
39
Title of the course : Database Management System
Subject Code : PCCS-523
Weekly load : 3 Hrs LTP 2-1-0
Credit :3
Course Outcomes: At the end of the course, the student will be able to:
CO1 Gain a good understanding of the architecture and functioning of database management
systems as well as associated tools and techniques
CO2 Understand principles of data modelling using entity relationship to develop a good database
design and normalization techniques to normalize a database
CO3 Understand and use structured query language to query, update, and manage a database
CO4 Evaluate and optimize queries
CO5 Understand transaction processing, backup and recovery techniques
Theory
Unit Main Topics Course outlines Lecture(s)
Unit-1 1. Introduction: Data, data processing requirement, desirable characteristics of 04
an ideal data processing system, traditional file based system,
its drawback, concept of data dependency, Def of database,
database management system.
40
2. Database 3-schema architecture: external-conceptual-internal, database 06
concepts terminology, benefits of DBMS, Database development
process - conceptual data modeling, logical database design,
physical database design, database implementation, database
maintenance.
3. Database Conceptual data modeling using E-R data model -entities, 06
Analysis attributes, relationships, generalization, specialization,
specifying constraints: total and partial participation. 5 – 6
practical problems based on E-R data model.
4. Database Logical database design and relational data model: 08
Design Introduction to relational database theory: def of relation,
relational model operators, relational model integrity rules,
Normalization- 1NF, 2NF, 3NF, 4NF, BCNF & practical
problems based on these forms. Denormalization
Unit-2 5. Database Introduction to SQL, DDL aspect of SQL, DML aspect of 08
Implementati SQL – update, insert, delete & various form of SELECT-
on simple, using special operators, aggregate functions, group by
clause, sub query, joins, co-related sub query, union clause.
6. Query Introduction, Query plan,ways of evaluating a given query, 06
optimization Overview of optimization process, expression transformation,
database statistics, A divide and conquer strategy.
7. Transaction Transaction concept, transaction state, Implementation of 04
processing atomicity and durability, concurrent execution, Serializability,
recoverability, Implementation of isolation, transaction
definition in SQL.
8. Overview of Failure classification, Storage structure, recovery and 06
backup and atomicity, log based recover , shadow paging, recovery with
recovery concurrent transaction, buffer management, failure with loss of
process non- volatile storage, advance recovery techniques.
Total=48
Recommended Books:
1. A Silberschatz, H. F. Korth, and S Sudarshan, Database System Concepts, TMH.
2. McFadden, F.Hoffer, M. B Modern database management, Prescott.
3. C.J Date, An Introduction to Database Systems, Addison, Wesley.
4. Raghu Ramakrishnan and Gehrke,Database Management System, McGraw-Hill.
5. Margaret.H.Dunham , Data Mining. Introductory and advanced topics, Pearson.
41
Title of the course : Operating System Lab
Subject Code : PCCS-524
Weekly load : 4 Hrs LTP 0-0-4
Credit :2
Course Outcomes: At the end of the course, the student will be able to:
CO1 Implement CPU scheduling algorithms
CO2 Implement Page replacement algorithms
CO3 Implement Deadlock handling algorithms
CO4 Implement various memory management techniques
CO5 Implement various file allocation strategies
LIST OF PRACTICALS
1. WAP to implement following CPU scheduling algorithms:
• FCFS
• SJF
• Priority
• Round Robin
2. WAP to implement MVT and MFT.
3. WAP to implement Bankers algorithm for deadlock avoidance.
42
4. WAP to implement Bankers algorithm for deadlock prevention.
5. WAP to implement following page replacement algorithms:
• FIFO
• LRU
6. WAP to implement paging technique of memory management.
7. WAP to implement following file allocation strategies:
• Sequential
• Indexed
• Linked
Note: The above mentioned list of experiments is suggested list. Teacher may add more programs/
experiments as per requirement.
CO1 Understand, analyze and apply common SQL statements including DDL, DML and DCL statements to
perform different operations.
CO2 Apply various constraints on database tables using different keys.
CO3 Implement relational algebra and relational calculus query.
CO4 Develop programs using PL/SQL.
CO5 Create views, forms and reports.
LIST OF PRACTICALS
1. Introduction to various constraints such as Primary key, secondary key, Super key, etc.
2. To implement Data Definition Commands (create, drop).
3. To implement Data Manipulation Commands (insert, delete, update, select)
4. To implement Data Control Commands (Commit, revoke, rollback, connect, execute)
5. Create Table, SQL for Insertion, Deletion, Update and Retrieval using aggregating
43
functions.
6. Write Programs in PL/SQL, Understanding the concept of Cursors.
7. Write Program for Join, Union & intersectionetc.
8. Creating Views, Writing Assertions, and Triggers.
9. Creating Forms, Reports etc.
10. WAP in PL/SQL for adding two numbers.
11. WAP in PL/SQL for reversing the number. For e.g. the number is 12345 and reverse
number will be 54321)
12. WAP in PL/SQL to find the number is even or odd.
13. WAP in PL/SQL to count numbers from 1 to 100.
14. WAP to test MAX, MIN, GROUP BY and ORDER BY commands.
Note: The above mentioned list of experiments is suggested list. Teacher may add more programs/
experiments as per requirement.
Course Outcomes: At the end of the course, the student will be able to:
CO1 Learn basic concepts of Operating System along with implementation of scheduling
algorithms in process management
CO2 Analyze critical section problem in Inter process communication and use of memory
management techniques
CO3 Implement page replacement algorithms and use virtual memory concepts
CO4 Know about file structure, file management and disk management
CO5 Learn the concept of deadlock and implement various algorithms used for its detection and
recovery
Theory
44
Unit Main Topics Course outlines Lecture(s)
Unit-1 1. Basic Concept Evolution of operating system, operating system 06
of Operating classifications, structure of operating system, types of
System operating system (Batch, Multiprogramming,
Multiprocessing, Time-sharing systems and real time
systems etc.), concept of virtual machine, case study on
UNIX and windows operating system.
Total=48
Recommended Books:
1. Silberschatz A & Galvin, Operating System Concepts, John Wiley & Sons
2. W. Stallings, Operating Systems: Internals and Design Principles, Pearson Pub.
3. Andrew S Tanenbaum, Operating Systems - Design and Implementation, PHI
4. Crawley, Operating Systems - An Object oriented Approach, McGraw Hill
45
SEMESTER-V
46
CO/PO Mapping : (Strong(3)/Medium(2)/Weak(1) indicates strength of correlation):
Programme Outcomes (POs)
Cos
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2
CO1 3 3 3 3 3 2 0 0 2 0 2 3 2 2
CO2 3 2 3 2 3 2 0 0 2 0 2 3 2 2
CO3 3 3 3 3 3 2 0 0 2 0 2 3 3 2
CO4 3 3 2 2 2 2 0 0 2 0 2 3 3 2
47
CO5 3 3 2 2 2 2 0 0 2 0 2 3 2 2
Theory:
Unit Main Topics Course outlines Lecture(s)
1. Introduction to Introduction, Combinations of sets, Finite and infinite
Sets and sets, Mathematical induction, Principle of inclusion and 04
Propositions exclusion, Multisets, Ordered sets, Propositions.
2.Basic principles Counting Principles: Basics of counting, Pigeonhole
of counting Principle, Permutations, Combinations, Generation of 05
permutations and combinations.
Unit-1 3.Basic principles Discrete probability, Conditional probability, Information
and mutual information. 03
of probability
4.Relations and Introduction, A relational model for data bases, Properties
Functions of binary relations, Equivalence relations and partitions,
Partial ordering relations and lattices, Definition & 05
properties of Lattice, Sub lattice, Distributive & Boolean
algebra, a job scheduling problem.
5. Mathematical Propositions, logical operators & propositional algebra.
03
logic
6. Graphs and Introduction, Basic terminology, Multigraphs and
Planer graphs weighted graphs, Paths and Circuits, Shortest paths in 04
weighted graphs, Eulerian paths and circuits.
7. Recurrence Introduction, Linear recurrence relations with constant
Unit-2 Relations and coefficients, Homogeneous solutions, Particular
Recursive solutions, Total solutions, Solutions by the method of 04
Algorithms generating functions, Recursive definitions, Recursive
algorithms.
8. Groups, rings Group rings and Boolean algebra: Binary operations, semi
and Boolean groups and monoids, integers, groups, subgroups, rings 04
algebra and fields, principle of duality, Boolean lattices.
Total=32
Recommended Books:
1. Liu C.L., “Elements of Discrete Mathematics”, MGH.
2. Joshi , “Maths Foundation of Discrete Mathematics”, Wiley Eastern
3. Kolman B., Busby R.C. & Ross S., “Discrete Mathematical Structure”, 5/E, PHI.
4. DeoNarsingh., “Graph theory with applications to Engineering & Computer Science”,
PHI.
48
Title of the course : Computer Networks
Subject Code :PCCS-612
Weekly load : 3 Hrs LTP 2-1-0
Credit : 3 (Lecture 3)
Course Outcomes: At the end of the course, the student will be able to:
CO1 Understand basics of computer networks
CO2 Learn use of physical and datalink layer in networking
CO3 Understand the concept of MAC and Network layer
CO4 Learn various protocols used in transport and application layer
CO5 Understand OSI and TCP/IP models
49
Theory
Unit Main Topics Course outlines Lecture(s)
1. Introduction Need & Evolution of Computer Networks, Description of
LAN, MAN, WAN and wireless Networks, OSI and TCP/IP
Unit-1 models with description of Data Encapsulation & peer to 06
peer communication, Comparison of OSI and TCP/IP.
4. Data link Framing, Error control and Flow control, Data link control
Layer and protocols – Simplex protocol, Sliding window protocol 06
50
addressed classes. Subnetting – Sub network, Subnet mask.
Routing algorithm – optimality Principle, Shortest path
routing, Hierarchical routing, Broadcast routing, Multicast
routing, tunneling Fragmentation and DHCP. Routing
Protocol – RIP, IGRP, OSPF and EIGRP.
Total=48
Recommended Books:
1. Tanenbaum, Computer Network, Prentice Hall India
2. William Stalling, Data and Computer Communication, Prentice Hall
3. Douglas E. Comer, Internetworking with TCP/IP Volume – I, Prentice Hall India
4. W. Richard Stevens, TCP/IP Illustrated Volume-I, Pub. Addison Wesley
5. B. Forouzan, Data Communication And Networking, TMH
51
CO3 Configure different wireless networks.
CO4 Implement the connection between different nodes by using different topologies
CO5 Understand how to share resources on the network.
LIST OF PRACTICALS
1. Introduction to LAN with its cables, network connectors and topologies.
2. Making of a network cable (straight thru and cross over twisted pair) to connect two
personnel computer.
3. Introduction to motherboard and installation of LAN card and Wi-fi dongle.
4. Case study of Ethernet (10 base 5,10 base 2,10 base T).
5. Create a simple network with two PCs using a hub.
a. Identify the proper cable to connect the PCs to the hub
b. Configure workstation IP address information.
c. Test connectivity using the Ping command
d. Installation and working of Telnet.
6. Configuration of Wireless Access point.
7. Punching of information outlet (I/O box) using punching tool.
8. Procedure to share hardware resources over network.
9. Various troubleshooting tools used in computer network.
Note: The above mentioned list of experiments is suggested list. Teacher may add more programs/
experiments as per requirement.
52
CO1 Provide comprehensive introduction about computer graphics system and design algorithms
CO2 Familiar with two dimensional and three dimensional transformations
CO3 Familiar with techniques of clipping, hidden surface removal and shading
CO4 Provide information about Projections and shading techniques
CO5 To recognize the software utilized in constructing computer graphics applications.
Theory:
Unit Main Topics Course outlines Lecture(s)
1. Overview of Display devices, physical input and output devices:
Unit-1 graphics systems storage tube graphic displays, Raster Refresh, 04
Plasma Panel Displays, Liquid Crystals
53
4. Computer Graphics, Sinha&Udai, Mcgraw Hill
54
Credit :3
Course Outcomes: On successful completion of this course, students will be able to:
CO1 Design a data mart for any organization
CO2 Develop skills to write queries using DMQL
CO3 Extract knowledge using data mining techniques
CO4 Adapt to new data mining tools
CO5 Explore recent trends in data mining such as web mining, spatial-temporal mining
Theory
55
6. Cluster Types of data in Clustering Analysis, Categorization of
Analysis Major Clustering methods, Hierarchical methods, Density-
based methods, Grid-based methods, Model-based 08
Clustering methods
Total=48
Recommended Books:
1. Jiawei Han and MichelineKamber, “Data Mining: Concepts and Techniques”, Morgan
Kaufmann Publishers, 2000 (ISBN: 1-55860-489-8).
2. Ian H. Witten and Eibe Frank, “Data Mining: Practical Machine Learning Tools and
Techniques with Java implementations”, Morgan Kaufmann Publishers, San Fransisco,
CA (2000).
3. Dorian Pyle, “Data Preparation for Data Mining”, Morgan Kaufmann, (1999)
4. Korth, Silbertz, Sudarshan, “Database Concepts”, McGraw Hill
5. Elmasri, Navathe, “Fundamentals Of Database Systems”, Addision Wesley
56
Subject code : PECS-611C
Weekly load : 3 Hrs LTP 3-0-0
Credit :3
Course Outcomes: At the end of the course, the student will be able to:
CO1 To identify and analyze statutory, regulatory, constitutional, and organizational laws that
affects the information technology professional.
CO2 To locate and apply case law and common law to current legal dilemmas in the technology
field.
CO3 To understand the basics of the four primary forms of intellectual property rights.
CO4 To compare and contrast the different forms of intellectual property protection in terms of
their key differences and similarities.
C05 To understand the basics of Copyright & Related Rights and protection from copyright.
57
6. Patents Macro-economic impact of the patent system, Patent and kind of
inventions protected by a patent, Patent document How to 06
protect your inventions?, Granting of patent, Rights of a patent.
7. Copyright Copyright, latest editions, duration of copyright last, how to
& Related protect copyright. Related rights and its distinction with 06
Rights copyright.
8. Trademarks Trademark and rights of trademark, kind of signs can be used as
trademarks, types of trademark,trademark protection and 06
registration process.
Total=48
Recommended Books:
1. AnirudhRastogi. Cyber Law-Law Of Information Technology And Internet, LexisNexis.
2. Vakul Sharma. Information Technology Law and Practice Cyber Laws and LawsRelating to
E-Commerce, Universal Law Publishing.
3. Dr. S.K. Singh. Intellectual Property Rights, Central Law Agency.
58
Subject Code :PECS-611D
Weekly load : 3 Hrs LTP 3-0-0
Credit :3
Course Outcomes: At the end of the course, the student will be able to:
CO1 Gain understanding of software development life cycle
CO2 Prepare SRS document for a software project
CO3 Apply software design and development techniques
CO4 Apply estimation techniques for software development
CO5 Implement testing at each phase of SDLC
CO/PO Mapping : (Strong(3)/Medium(2)/Weak(1) indicates strength of correlation):
Program Outcomes (PO's)/ Program Specific Outcomes (PSO's)
Cos
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2
CO1 3 3 3 2 1 1 0 0 2 0 3 3 1 1
CO2 3 3 3 2 2 1 0 0 2 0 2 2 2 2
CO3 3 0 3 2 2 1 0 0 2 0 2 2 2 3
CO4 2 0 2 2 2 2 0 0 2 0 3 2 2 3
CO5 3 0 2 3 2 2 0 0 2 0 2 2 2 3
Theory
Unit Main Topics Course outlines Lecture(s)
Unit-1 1. Evolving role of Introduction to Software Engineering, importance of 06
Software Software, The Software Evolution, Software
Characteristics, Software Applications
2.Software Waterfall model, Prototyping Model, RAD Model, 06
Development Life Incremental Model, Spiral Model, Selection of a life
Cycle Models cycle model
3. S/W scope Resources, estimation, decomposition techniques, 06
empirical estimation models. Project scheduling
4. Software reliability Software reliability models, Software quality, software 06
quality ISO standards, Capability Maturity Model,
requirement analysis, analysis principles
Unit-2 5. Software Testing Software testing Fundamentals, Test Case design, White 06
box testing, Basis path testing, Black box testing.
6. Post implementation Review plan. S/W maintenance and enhancement 06
review procedure.
7. Reverse Scope, Levels of reverse engineering, tools, software re- 06
Engineering engineering, documentation
8.Control Measures Threats & control measures, disaster/recovery planning, 06
ethics in system development, ethics codes & standard
of behavior.
Total=48
Recommended Books:
59
1. Roger S. Pressman, Software Engineering, A Practitioner’s
Approach, McGrawHill International Edition.
2. Ian Sommerville, Software Engineering, Addison-Wesley Publishing Company
3. James F. Peter, Software Engineering - An Engineering Approach, John Wiley
4. Pankaj Jalote, An integrated Approach to Software Engineering, Narosa.
60
Subject Code : PECS-611E
Weekly load : 3 Hrs LTP 3-0-0
Credit :3
Course Outcomes: At the end of the course, the student will be able to:
CO1 Learn fundamental concepts of ERP system and ERP related technologies.
CO2 Acquire knowledge of different ERP modules and manufacturing perspectives of ERP
CO3 Use ERP system in different business organizations by having knowledge of latest scenario
of ERP market in e-business.
CO4 Understand the concept of ERP implementation strategies and use the ERP module in real
time projects.
CO5 Develop skills necessary for building and managing relationships with customers, and
stakeholders.
CO/PO Mapping : (Strong(3)/Medium(2)/Weak(1) indicates strength of correlation):
Program Outcomes (PO's)/ Program Specific Outcomes (PSO's)
Cos
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2
CO1 3 2 1 3 2 2 0 1 3 3 3 2 1 2
CO2 3 2 1 3 2 2 0 1 3 3 3 2 2 1
CO3 3 2 1 3 2 2 0 1 3 3 3 2 1 3
CO4 1 1 1 2 2 2 0 1 2 2 3 2 1 2
CO5 2 2 2 3 2 2 0 1 3 3 3 3 1 2
Theory
Unit Main Topics Course outlines Hour(s)
1. Introduction to Introduction and evolution of ERP, Reasons for the growth 04
ERP of the ERP market, Advantages of ERP, Introduction to
ERP packages
2. Enterprise- An Integrated Management information, Business Modeling, 04
overview Integrated Data Model.
Unit-1 3. ERP and Related BRP (Business Process Reengineering), MIS (Management 08
Technologies Information System), DSS (Decision Support System), EIS
(Executive Information system), Data Warehousing, Data
Mining, OLAP (On-Line Analytical Processing), Supply
Chain Management.
4. ERP-A ERP, CAD/CAM, MRP (Material Requirement Planning), 08
Manufacturing BOM (Bill of Material), Closed loop MRP, MRP-II, DRP
Perspective (Distributed Requirement Planning), PDM (Product Data
Management) and its benefits, Data Management, MTO,
MTS, ATO, ETO, CTO
5. ERP Modules Finance, Plant Maintenance, Quality Management, Material 06
Management.
6. Benefits of ERP Benefits of ERP, SAP, BAAN, Oracle Corporation, People 06
Unit-2 and ERP Market Soft
61
7. ERP ERP Implementation Life Cycle, In-house Implementation 06
Implementation – pros & cons, Vendors, Consultants, End-users.
8. Future directions in Future Directions in ERP and ERP Case Studies 06
ERP
Total=48
Recommended Books:
1. Alexis Leon “Enterprise Resource Planning”, TMH.
62
Subject Code :PECS-611F
Weekly load : 3 Hrs LTP 3-0-0
Credit :3
Course Outcomes: At the end of the course, the student will be able to:
CO1 Study the basics of Linux based Operating System.
CO2 Learn the installation, configuring and setup of Linux Operating System.
CO3 Develop the skill of shell programming in Linux.
CO4 Access advanced configuration and system management features of Linux.
CO5 Learn GUI features including Applications Manager, Text Editor, printing
CO/PO Mapping : (Strong(3)/Medium(2)/Weak(1) indicates strength of correlation):
Program Outcomes (PO's)/ Program Specific Outcomes (PSO's)
Cos
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2
CO1 0 3 0 0 0 0 0 0 0 3 0 3 1 2
CO2 0 3 2 2 0 0 0 0 0 3 0 3 3 3
CO3 0 3 2 3 0 0 0 0 0 3 0 3 2 2
CO4 0 3 0 2 0 0 0 0 0 3 0 3 2 1
CO5 0 2 1 0 0 3 0 2 1 1 0 1 2 2
Theory
Unit Main Topics Course outlines Lecture(s)
Unit-1 1. Introduction History of Linux and Unix, Linux overview, Linux releases, 06
toLinuxOperatin Open Linux
g System
2. Installing Hardware, software and information requirements; opening 06
Linux disk space for Linux partitions; creating the open Linux
install disks; installing Linux;
Unit-2 5. Shell The command line: special characters and file arguments; 06
standard input/ output and redirection; pipes; redirecting
and piping with standard errors; shell scripts; jobs.
6. Linux file Linux files; file structure; listing, displaying and printing 06
Structure
63
files; managing directories; file and directory operations
64
Title of the course : Software Engineering
Subject Code : OECS-611A
Weekly load : 3 Hrs LTP 3-0-0
Credit :3
Course Outcomes: At the end of the course, the student will be able to:
CO1 Gain understanding of software development life cycle
CO2 Prepare SRS document for a software project
CO3 Apply software design and development techniques
CO4 Apply estimation techniques for software development
CO5 Implement testing at each phase of SDLC
Theory
Unit Main Topics Course outlines Lecture(s)
Unit-1 1. Evolving role of Introduction to Software Engineering, importance of 05
Software Software, The Software Evolution, Software Characteristics,
Software Applications, Software Crisis: Problem and
Causes.
2.Software Build and fix model, Waterfall model, Prototyping Model, 07
Development RAD Model, Incremental Model, Spiral Model, Selection of
Life Cycle a life cycle model
Models
3. S/W scope Resources, estimation, decomposition techniques, empirical 06
estimation models. Project scheduling, refinement of major
tasks, scheduling project plan,
4. Software Software reliability models, Software quality, software 06
reliability quality ISO standards, Capability Maturity Model, The
system engineering hierarchy information engineering,
information strategy planning, requirement analysis,
analysis principles
Unit-2 5. Software Software testing Fundamentals, Test Case design, White 08
Testing box testing, Basis path testing, Control structure testing,
Black box testing.
6. Post Review plan. S/W maintenance and enhancement 05
65
implementation procedure. System security.
review
7. Reverse Scope, Levels of reverse engineering, tools, software re- 05
Engineering engineering, documentation
Recommended Books:
1. Roger S. Pressman, Software Engineering, A Practitioner’sApproach, McGrawHill International
Edition.
2. Ian Sommerville, Software Engineering, Addison-Wesley Publishing Company
3. James F. Peter, Software Engineering - An Engineering Approach, John Wiley
4. Pankaj Jalote, An integrated Approach to Software Engineering, Narosa.
66
Title of the course : Enterprise Resource Planning
Subject Code : OECS-611B
Weekly load : 3 Hrs LTP 3-0-0
Credit :3
Course Outcomes: At the end of the course, the student will be able to:
CO1 Learn fundamental concepts of ERP system and ERP related technologies.
CO2 Acquire knowledge of different ERP modules and manufacturing perspectives of ERP
CO3 Use ERP system in different business organizations by having knowledge of latest scenario
of ERP market in e-business.
CO4 Understand the concept of ERP implementation strategies and use the ERP module in real
time projects.
CO5 Develop skills necessary for building and managing relationships with customers, and
stakeholders.
CO/PO Mapping : (Strong(3)/Medium(2)/Weak(1) indicates strength of correlation):
Program Outcomes (PO's)/ Program Specific Outcomes (PSO's)
Cos
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2
CO1 3 2 1 3 2 2 0 1 3 3 3 2 1 2
CO2 3 2 1 3 2 2 0 1 3 3 3 2 2 1
CO3 3 2 1 3 2 2 0 1 3 3 3 2 1 3
CO4 1 1 1 2 2 2 0 1 2 2 3 2 1 2
CO5 2 2 2 3 2 2 0 1 3 3 3 3 1 2
Theory
Unit Main Topics Course outlines Hour(s)
1. Introduction to Introduction and evolution of ERP, Reasons for the growth 04
ERP of the ERP market, Advantages of ERP, Introduction to
ERP packages
2. Enterprise- An Integrated Management information, Business Modeling, 04
overview Integrated Data Model.
3. ERP and Related BRP (Business Process Reengineering), MIS (Management 08
Technologies Information System), DSS (Decision Support System), EIS
Unit-1 (Executive Information system), Data Warehousing, Data
Mining, OLAP (On-Line Analytical Processing), Supply
Chain Management.
4. ERP-A ERP, CAD/CAM, MRP (Material Requirement Planning), 08
Manufacturing BOM (Bill of Material), Closed loop MRP, MRP-II, DRP
Perspective (Distributed Requirement Planning), PDM (Product Data
Management) and its benefits, Data Management, MTO,
MTS, ATO, ETO, CTO
5. ERP Modules Finance, Plant Maintenance, Quality Management, Material 06
Management.
6. Benefits of ERP Benefits of ERP, SAP, BAAN, Oracle Corporation, People 06
Unit-2 and ERP Market Soft
67
7. ERP ERP Implementation Life Cycle, In-house Implementation 06
Implementation – pros & cons, Vendors, Consultants, End-users.
8. Future directions Future Directions in ERP and ERP Case Studies 06
in ERP
Total=48
Recommended Books:
1. Alexis Leon “Enterprise Resource Planning”, TMH.
68
Title of the course : Cyber Laws and Ethics
Subject code : OECS-611C
Weekly load : 3 Hrs LTP 3-0-0
Credits :3
Course Outcomes: At the end of the course, the student will be able to:
CO1 To identify and analyze statutory, regulatory, constitutional, and organizational laws that
affects the information technology professional.
CO2 To locate and apply case law and common law to current legal dilemmas in the technology
field.
CO3 To understand the basics of the four primary forms of intellectual property rights.
CO4 To compare and contrast the different forms of intellectual property protection in terms of
their key differences and similarities.
CO5 To understand the basics of Copyright & Related Rights and protection from copyright.
Theory
Unit Main Topics Course outlines Lecture(s)
1. Introduction Overview of Computer and Web Technology, Need for Cyber 06
Law, CyberJurisprudence at International and Indian Level,
Jurisdictional Aspects in CyberLaw Issues of jurisdiction in
cyberspace, Types of jurisdiction, MinimumContacts Theory,
Sliding Scale Theory, Effects Test and International targeting,
Jurisdiction under IT Act, 2000.
2. Jurisdiction Jurisdictional Aspects in CyberLaw Issues of jurisdiction in 06
cyberspace, Types of jurisdiction, MinimumContacts Theory,
Unit-1 Sliding Scale Theory, Effects Test and International targeting,
Jurisdiction under IT Act, 2000.
3. Cyber Cyber Crimes against Individuals, Institution and State, 06
Crimes Hacking, Digital Forgery, Cyber Stalking/Harassment, Ethics
and Etiquettes of Cyber World, Cyber Pornography, Identity
Theft & Fraud, Cyber Terrorism, Cyber Defamation.
4. Legal Right to Privacy and Data Protection on Internet, Concept of 06
Framework privacy, Threat to privacy on internet, Self-regulation approach
69
to privacy.
5. Intellectual Introduction and the need for intellectual property right (IPR), 06
Property IPR in India – Genesis and Development IPR in abroad.
6. Patents Macro-economic impact of the patent system, Patent and kind of 06
inventions protected by a patent, Patent document How to
protect your inventions?, Granting of patent, Rights of a patent.
Unit-2 7. Copyright Copyright, latest editions, duration of copyright last, how to 06
& Related protect copyright. Related rights and its distinction with
Rights copyright.
8. Trademarks Trademark and rights of trademark, kind of signs can be used as 06
trademarks, types of trademark,trademarkprotection and
registration process.
Total=48
Recommended Books:
1. AnirudhRastogi. Cyber Law-Law Of Information Technology And Internet, LexisNexis.
2. Vakul Sharma. Information Technology Law and Practice Cyber Laws and LawsRelating to
E-Commerce, Universal Law Publishing.
3. Dr. S.K. Singh. Intellectual Property Rights, Central Law Agency.
70
Title of the course : Programming Methodology
Subject Code : OECS-611D
Weekly load : 3 Hrs LTP 3-0-0
Credit :3
Course Outcomes: At the end of the course, the student will be able to:
CO1 Understand the different problem representation, flow chart, algorithm etc.
CO2 Choose data types and operators to solve mathematical and scientific problems
CO3 Understand the flow control of program
CO4 Basic knowledge of object-oriented programs and file handling in c
CO5 To understand the use of pointer in real time problems.
Total=48
Recommended Books:
72
Title of the course : Data Preparation and Analysis
Subject Code : OECS-611E
Weekly load : 3Hrs LTP 3-0-0
Credit :3
Course Outcomes: On successful completion of this course, students will be able to:
CO1 Learn how to prepare data for analysis, perform exploratory data analysis, and develop
meaningful data visualization.
CO2 Learn how to prepare data sets for analysis by cleaning and reformatting.
CO3 Learn to apply a variety of data exploration techniques.
Recommended Books:
1. Making sense of Data: A practical Guide to Exploratory Data Analysis and Data mining, by
Glenn J. myatt
73
Title of the course : Software Project Management
Subject Code : OECS-612A
Weekly load : 3 Hrs LTP 300
Credit :3
Course Outcomes: At the end of the course, the student will be able to:
Theory
74
Network, Time Estimation, Forward and backward Pass,
Critical Path and Activities. Introduction to project risk
Unit-2 management, Risk categories, identification, assessment,
planning, management, Software Configuration Management
Process: Version Control, Change Control management,
PERT and CPM Models, project implementation
Total=48
Recommended Books:
1. Bob Hughes, Mike Cotterell, “Software Project Management”, Tata McGraw Hill.
2. Prasanna Chandra, “Projects: Panning, Analysis, Selection, Financing, Implementation
and Review”, Tata McGraw Hill Publication.
3. Jeffrey K. Pinto, “Project Management”, Pearson Publications.
75
Title of the course : Decision Support System
Subject Code : OECS-612B
Weekly load : 3 Hrs LTP 3-0-0
Credit :3
Course Outcomes: At the end of the course, the student will be able to:
CO1 Understand fundamental concepts associated with DSS
CO2 Develop skill in the system analysis, design and implementation of computerized DSS
CO3 Learn various knowledge representation techniques
CO4 Learn different types of Data warehouse, different framework of datamining
CO5 To understand the concept of Business Analytics,Knowledge Discovery in Databases
Theory
CO/PO Mapping : (Strong(3)/Medium(2)/Weak(1) indicates strength of correlation):
Programme Outcomes (POs)
Cos
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2
CO1 3 2 2 2 3 1 0 2 3 3 3 2 1 1
CO2 3 2 2 2 3 1 0 2 3 3 3 2 1 1
CO3 3 2 2 2 3 1 0 2 3 3 3 2 1 2
CO4 3 2 1 2 2 1 0 1 1 1 2 2 1 2
CO5 3 2 1 2 2 1 0 1 1 1 2 2 1 2
Unit Main Topics Course outlines Hour(s)
1. Introduction to Concepts of Data, Information, Information Systems & End 06
DSS Users, Systems Concepts: Open System, Closed System;
Information Systems and Systems Concept
2. Building System Analysis and Design – Systems Development Cycle 06
Information (Identification of Requirements, Feasibility Study, System
Unit-1 System Analysis, Design And Implementation), Prototyping
3. Decision Making Introduction and Definitions, Simons Decision Making 06
Model, How Decisions are Supported, DSS Configurations,
DSS Characteristics and Capabilities
4. Components of DSS Classifications DSS Modeling-Static and Dynamic 06
DSS Models, Certainty, Uncertainty, and Risk, Sensitivity
Analysis, What-IF, and Goal Seeking
5. Knowledge Definition and types of Knowledge, Frame work for 06
Management Knowledge Management, Knowledge Representation
System Techniques: Rules, Frames, Semantic Networks
6. Data Warehouse Data Warehousing Definitions and Concepts, Types of 06
and Data Mining Data warehouse, Data Mining Concepts and Applications,
Unit-2 Framework of datamining, Text Mining, Web Mining
Usage, Benefits, and Success of Business Analytics
7. Business Online Analytical Processing (OLAP), Reporting and 06
Analytics Queries, Multidimensionality, Knowledge Discovery in
Databases(KDD), framework of KDD
8. Future directions Future Directions in DSS and DSS Case Studies 06
Total=48
76
Recommended Books:
1. Turban, Efrain : Decision Support & Business Intelligent Systems(8e)- Pearson Education
2. Marakas, George.M. : Decision Support Systems in the 21st century – Pearson Education
3. Mallach, EfremG. : Decision Support & data Warehouse Systems – Tata McGraw-Hill
77
Title of the course : Computer Networks
Subject Code :OECS-612C
Weekly load : 3 Hrs LTP 3-0-0
Credit :3
Course Outcomes: At the end of the course, the student will be able to:
CO1 Understand basics of computer networks
CO2 Learn use of physical and datalink layer in networking
CO3 Understand the concept of MAC and Network layer
CO4 Learn various protocols used in transport and application layer
CO5 Understand OSI and TCP/IP models
Theory
78
4. Data link Framing, Error control and Flow control, Data link control 06
Layer and protocols – Simplex protocol, Sliding window protocol
Total=48
Recommended Books:
1. Tanenbaum, Computer Network, Prentice Hall India
2. William Stalling, Data and Computer Communication, Prentice Hall
3. Douglas E. Comer, Internetworking with TCP/IP Volume – I, Prentice Hall India
4. W. Richard Stevens, TCP/IP Illustrated Volume-I, Pub. Addison Wesley
5. B. Forouzan, Data Communication And Networking, TMH
79
Title of the course : Object Oriented Programming
Subject Code : OECS-612D
Weekly load : 3 Hrs LTP 3-0-0
Credit :3
Course Outcomes: At the end of the course, the student will be able to:
CO1 Understand the difference between object oriented programming and procedural programming
CO2 Choose data types and structures to solve mathematical and scientific problems
CO3 Write programs using C++ features such as composition of objects, operator overloading,
inheritance, polymorphism etc.
CO4 Simulate the real world problems into object-oriented programs
CO5 Illustrate the process of data file manipulations using C++
Theory
Unit Main Topics Course outlines Lecture(s)
1. Introduction Basic concepts of object-oriented programming, Characteristics 06
of object-oriented programming, Comparison between
procedural programming paradigm and object-oriented
programming paradigm.
2. Classes and Specifying a class, Creating class objects, Accessing class 06
Objects members, Access specifiers – public, private, and protected,
Unit-1 Static members variables and functions, Static class objects, The
const keyword, Friend functions, Friend classes, Empty classes,
Nested classes, Local classes, Abstract classes, Container
classes.
3. Constructors Need for constructors and destructors, Default constructor, 06
and Parameterized constructor, Copy constructor, Dynamic
Destructors constructors, Destructors, Constructors and destructors with
static members.
4. Inheritance Introduction, Defining derived classes, Forms of inheritance, 06
Ambiguity in multiple and multipath inheritance, Virtual base
class, Object slicing, Overriding member functions, Object
composition and delegation, Order of execution of constructors
and destructors.
80
5. Virtual Concept of Binding - Early binding and late binding, Virtual 06
Functions and functions, Pure virtual functions, Abstract classes, Virtual
Polymorphism destructors & polymorphism.
6. Operator Defining operator overloading, Rules for overloading operators, 06
Overloading Overloading of unary operators and binary operators,
and Type Overloading of new and delete operators, Type conversion -
Conversion Basic type to class type, Class type to basic type, Class type to
another class type.
7. Pointers and Understanding pointers, Accessing address of a variable, 06
Unit-2 Dynamic Declaring & initializing pointers, Accessing a variable through
Memory its pointer, Pointer arithmetic, Pointer to a pointer, Pointer to a
Management function, Dynamic memory management - new and
delete Operators, Pointers and classes, Pointer to an object,
Pointer to a member, this Pointer, Self-referential classes,
Possible problems with the use of pointers - Dangling/wild
pointers, Null pointer assignment, Memory leak and allocation
failures.
8. Exception Exception and its types, Exception handling mechanisms, File 06
Handling and streams, Hierarchy of file stream classes, Error handling during
Managing Data file operations, Reading/Writing of files, Accessing records
Files randomly, Updating files, Data formatting in memory buffers.
Total=48
Recommended Books:
1. Lippman, S.B. and Lajoie, J., C++Primer, Pearson Education.
2. Stroustrup, Bjarne, The C++ Programming Language, Pearson Education.
3. YashwantKanetkar, Let Us C++, BPB
4. Robert Lafore, Turbo C++, Pearson India
81
Title of the course : Database Management System
Subject Code : OECS-612E
Weekly load : 3 Hrs LTP 3-0-0
Credit :3
Course Outcomes: At the end of the course, the student will be able to:
CO1 Gain a good understanding of the architecture and functioning of database management
systems as well as associated tools and techniques
CO2 Understand principles of data modeling using entity relationship to develop a good database
design and normalization techniques to normalize a database
CO3 Understand and use structured query language to query, update, and manage a database
CO4 Evaluate and optimize queries
CO5 Understand transaction processing, backup and recovery techniques
Theory
Unit Main Topics Course outlines Lecture(s)
1. Introduction Data, data processing requirement, desirable characteristics of
an ideal data processing system, traditional file based system,
04
its drawback, concept of data dependency, Def of database,
database management system.
2. Database 3-schema architecture: external-conceptual-internal, database
concepts terminology, benefits of DBMS, Database development process
- conceptual data modeling, logical database design, physical 06
database design, database implementation, database
maintenance.
Unit-1
3. Database Conceptual data modeling using E-R data model -entities,
Analysis attributes, relationships, generalization, specialization,
06
specifying constraints: total and partial participation. 5 – 6
practical problems based on E-R data model.
4. Database Logical database design and relational data model:
Design Introduction to relational database theory: def of relation,
relational model operators, relational model integrity rules, 08
Normalization- 1NF, 2NF, 3NF, 4NF, BCNF & practical
problems based on these forms. Denormalization.
82
5. Database Introduction to SQL, DDL aspect of SQL, DML aspect of SQL
Implementat – update, insert, delete & various form of SELECT- simple,
ion using special operators, aggregate functions, group by clause, 08
sub query, joins, co-related sub query, union clause.
6. Query Introduction, Query plan,ways of evaluating a given query,
optimization Overview of optimization process, expression transformation, 06
database statistics, A divide and conquer strategy.
Unit-2 7. Transaction Transaction concept, transaction state, Implementation of
processing atomicity and durability, concurrent execution, Serializability,
recoverability, Implementation of isolation, transaction 04
definition in SQL.
8. Overview of Failure classification, Storage structure, recovery and atomicity,
backup and log based recover , shadow paging, recovery with concurrent
06
recovery transaction, buffer management, failure with loss of non-
process volatile storage, advance recovery techniques.
Total=48
Recommended Books:
1. A Silberschatz, H. F. Korth, and S Sudarshan, Database System Concepts, TMH.
2. McFadden, F.Hoffer, M. B Modern database management, Prescott.
3. C.J Date, An Introduction to Database Systems, Addison, Wesley.
4. Raghu Ramakrishnan and Gehrke,Database Management System, McGraw-Hill.
5. Margaret.H.Dunham , Data Mining. Introductory and advanced topics, Pearson.
83
Title of the course : Application Development using Python
Subject code : MDCS-611
Weekly load : 4 Hrs LTP 3-1-0
Credits :4
Course Outcomes: At the end of the course, the student will be able to:
CO1 Understand why Python is a useful scripting language for developers.
CO2 Learn how to design and program Python applications.
CO3 Learn how to use lists, tuples, and dictionaries in Python programs.
CO4 Learn how to design object‐oriented programs with Python classes.
CO5 Learn how to use exception handling in Python applications for error handling.
Theory
Unit Main Topics Course outlines Lecture(s)
Unit 1. Fundamental Concept of an algorithm, program, programming languages, need 09
-1 concepts of of programming, scenario, development of code from an algorithm,
the concept, need and use of pseudo code, variables, datatypes,
programming operators, implicit/explicit type conversion, functions in programs.
2. Control Selection and iteration control statements: if, else, nested if else, for 09
statements while and nested loops; break, continue, pass
3. Testing and Unit testing (path coverage and boundary value analysis), 05
debugging introduction of debugging, introduction of Eclipse: basic, tip to
handle infinite loop
Unit 4. Collections Introduction to collections, list, array, tuple, string, set, dictionary, 09
-2 basic operations and built-in method/function of: list, array, tuple,
string, set, dictionary
5. Function Definition of function, arguments, argument behavior, types of 09
argument, variables and its scope, function calling, types of
function, recursive function, revisiting function
6. Exception Introduction and need of Exception handling in code 02
handling
7. Modules and Introduction to modules, package, libraries, introduction to math, 05
libraries random, combination, itertools, Numpy library
Total=48
84
Recommended Books:
1. Mark Lutz, Learning Python, O’Reilly.
2. David Beazley and Brian K. Jones, Python Cookbook, O’Reilly.
3. David Beazley, Python Essential Reference, Developer’s Library.
4. John V. Guttag, Introduction to Computation and Programming Using Python, The MIT
Press.
5. Zed Shaw, Learn Python the Hard Way, Pearson.
85
Title of the course : Big Data Analytics
Subject Code : HDCS-611
Weekly load : 4 Hrs LTP 3-1-0
Credit :4
Course Outcomes: At the end of the course, the student will be able to:
CO1 Summarize the workflow of analytics process model, its requirements and applications.
CO2 Apply suitable data pre-processing techniques for the given dataset.
CO3 Demonstrate different predictive, Descriptive and text analytic models.
CO4 Examine Survival Analysis model and learn through Social Network Analytics.
CO5 Define the Text Analytics method, Text Analytics Metrics and their applications
CO/PO Mapping : (Strong(3)/Medium(2)/Weak(1) indicates strength of correlation):
Program Outcomes (PO's)/ Program Specific Outcomes (PSO's)
Cos
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2
CO1 1 1 0 0 0 0 0 0 1 0 0 0 1 1
CO2 1 1 1 0 2 0 0 0 1 1 0 0 3 2
CO3 2 1 1 0 3 0 0 2 2 2 0 0 1 2
CO4 3 2 2 1 3 1 0 1 2 2 0 0 2 1
CO5 1 1 1 0 2 0 0 2 1 1 0 0 1 2
Theory
86
4. MapReduce MapReduce workflows, unit tests with MRUnit, test data and 08
local tests, anatomy of MapReduce job run, classic Map-
reduce, YARN, failures in classic Map-reduce and YARN,
job scheduling, shuffle and sort, task execution, MapReduce
types, input formats, output formats
Unit-2 Hbase, data model and implementations,Hbaseclients, Hbase
5. Hbase and 08
Cassandra examples, praxis Cassandra, Cassandra data model, Cassandra
examples, Cassandra clients, Hadoop integration
6. High Level Pig, Grunt, pig data model, Pig Latin, developing and testing 08
utilities(Pig, Pig Latin scripts.Hive, data types and file formats, HiveQL
Grunt, Hive) data definition, HiveQL data manipulation, HiveQL queries.
Total=48
Recommended Books:
1. Michael Minelli, Michelle Chambers, and AmbigaDhiraj, "Big Data, Big Analytics: Emerging
2. Business Intelligence and Analytic Trends for Today's Businesses", Wiley, 2013.
3. P. J. Sadalage and M. Fowler, "NoSQL Distilled: A Brief Guide to the Emerging World of
Polyglot Persistence", Addison-Wesley Professional, 2012.
4. Tom White, "Hadoop: The Definitive Guide", Third Edition, O'Reilley, 2012.
5. Eric Sammer, "Hadoop Operations", O'Reilley, 2012.
6. E. Capriolo, D. Wampler, and J. Rutherglen, "Programming Hive", O'Reilley, 2012.
7. Lars George, "HBase: The Definitive Guide", O'Reilley, 2011.
8. Eben Hewitt, "Cassandra: The Definitive Guide", O'Reilley, 2010.
9. Alan Gates, "Programming Pig", O'Reilley, 2011.
87
Title of the course : Internet of Things
Subject Code : HDCS-612
Weekly load :4 LTP 310
Credit :4
Course Outcomes: At the end of the course, the student will be able to:
CO1 Effective usage of IoT deployment for different sectors.
CO2 Developing and modifying code for various sensor based applications using wireless
sensor modules and working with variety of modules like environmental and security
module.
CO3 Exploring the features of predictive data analytics for IoT applications.
CO4 Modular hands on training will enable participants to conduct IoT related activities in
academic environment and initiate new projects in Industrial sectors.
CO5 Design a simple IoT system comprising sensors, edge devices and wireless network
connections involving prototyping, programming and data analysis.
89
SEMESTER-VI
90
Title of the course : Design and Analysis of Algorithms
Subject code : PCCS-621
Weekly load : 3 Hrs LTP 2-1-0
Credits :3
Course Outcomes: At the end of the course, the student will be able to:
CO1 Understand about algorithm complexities
CO2 Have an understanding of elementary and advanced data structures
CO3 Acquire knowledge about various advanced design and analysis techniques such as divide-
and-conquer, greedy algorithms, dynamic programming, branch-and-bound
CO4 Know the concept of tractable and intractable problems and the P, NP, NP-complete
problems
CO5 Utilize data structures and/or algorithmic design techniques for developing efficient
computer algorithm for solving real-world problems
Theory
Unit Main Topics Course Outline Lecture(s)
Unit-1 1. Introduction Notion of an algorithm; Fundamentals of algorithmic problem 06
solving; Performance analysis: space complexity, time
complexity; Asymptotic notations: big-oh notation (O), omega
notation (Ω), theta notation (Θ);Mathematical analysis of non-
recursive algorithms; Mathematical analysis of recursive
algorithmsthrough recurrence relations (substitution method,
iteration method, recursion tree method,Master’s theorem)
2. Searching and Searching: linear search, binary search; Sorting: insertion sort, 02
Sorting selection sort, quick sort, merge sort; priority queues; heaps
3. Graphs and Graphs:Introduction; Graph exploration: BFS, DFS; 06
Search Trees Applications of BFS: shortest path for unweighted graph,
cycle detection in undirected graph, finding all nodes within
one connected component; Applications of DFS: cycle
detection in a graph, finding strongly connected components
of a graph; Directed acyclic graphs; Network flow algorithm;
Search trees: Introduction; Traversals; Insertions; Deletions;
Balancing (AVL trees)
91
4. Divide and Introduction; Median of two sorted arrays; Counting 02
Conquer inversions; Nearest pair of points; Quick sort vs. merge sort
Unit-2 5. Greedy Introduction; Finding minimum number of coins; Knapsack 04
Method problem; Job sequencing problem; Minimum cost spanning
trees: Prim’s algorithm, Kruskal’s algorithm; Single source
shortest paths: Dijkstra’s algorithm; Optimal tree problem:
Huffman coding
6. Dynamic Memorization; General method with examples; Coin change 06
Programming problem; Edit distance; Longest ascending subsequence;
Matrix multiplication; All-pairs shortest paths: Floyd’s
algorithm; Knapsack problem; Bellman-Ford algorithm
7. Backtracking Backtracking:General method; N-queens problem; Sum of 04
and Branch subsets problem; Graph coloring; Hamiltonian cycles; Branch
and Bound and bound:Job assignment problem;Travelling salesperson
problem; 0/1 knapsack problem
8. Tractable and Computability of algorithms; Computability classes – P,NP, 02
Intractable NP-complete and NP-hard; Cook’s theorem; Standard NP-
Problems complete problems and reduction techniques.
Total=32
Recommended Books:
1. Thomas H. Cormen, Charles E. Leiserson, Ronald L. Rivest, and Clifford Stein,
Introduction to Algorithms, The MIT Press.
2. Alfred V. Aho, John E. Hopcroft, and Jeffrey D. Ullman, The Design and Analysis of
Computer Algorithms, Addison-Wesley Pub. Co.
3. Jon Kleinberg, and EvaTardos, Algorithm Design, Pearson Education.
4. Ellis Horowitz, and Sartaj Sahni, Fundamentals of Computer Algorithms, Galgotia
Publications.
5. Robert Sedgewick, and Kevin Wayne, Algorithms, Addison-Wesley Pub. Co.
6. S. Dasgupta, C. H. Papadimitriou, and U. V. Vazirani, Algorithms, McGraw-Hill
Education.
92
Title of the course : Automata Theory and Formal Languages
Subject Code : PCCS-622
Weekly load : 3 Hrs LTP 2-1-0
Credit :3
Course Outcomes: At the end of the course, the student will be able to:
CO1 Understand basic properties of deterministic and nondeterministic finite automata
CO2 Understand the relation between types of languages and types of finite automata
CO3 Design grammars and recognizers for different formal languages
CO4 Prove or disprove theorems in automata theory using its properties
CO5 Determine the decidability and intractability of computational problems
93
6. Properties of The pumping Lemma for context free languages, closure 06
Context free properties of context free languages, decision algorithms for
Languages context free languages, Coke-Kasmi-Young algorithm.
Recommended Books:
1. Daniel A. Cohen, Introduction to Computer Theory, John Wiley and Sons (1996)
2. Hopcroft John E., Ullman Jeffrey D. and Motwani R., Introduction to Automata Theory,
Languages and Computation, Pearson Education (2006).
3. Michael Sipser, Introduction to the Theory of Computation, Thomson (2007).
4. Lewis Harry R., Elements of Theory of Computation, PHI (1997).
5. K.L.P. Mishra, N. Chandrasekaran, “Theory of Computer Science: Automata.
94
Title of the course : Design and Analysis of Algorithms Lab
Subject Code : PCCS-623
Weekly load : 4 Hrs LTP 0-0-4
Credit :2
Course Outcomes: At the end of the course, the students will be able to:
CO1 Learn how to analyse a problem and design a solution for the problem
CO2 Acquire hands-on skills to implement various advanced algorithm design such as divide-
and-conquer, greedy algorithms
CO3 implement Quick sort ,Merge sort algorithm, BFS and DFS algorithms
CO4 Implement Dynamic Programming algorithm for the 0/1 Knapsack problem
CO5 Utilize data structures and/or algorithmic design techniques for developing efficient
computer algorithm for solving real-world problems
LIST OF PRACTICALS
1. Use divide and conquer method to recursively implement:
a) Binary search
b) Linear search
2. Sort a given set of elements using the insertion sort method.
3. Sort a given set of elements using the selection sort method.
4. Sort a given set of elements using the quick sort method and determine the time required to sort
the elements. Repeat the experiment for different values of n, the number of elements in the list
to be sorted and plot a graph of the time taken versus n. The elements can be read from a file or
can be generated using the random number generator.
5. Implement merge sort algorithm to sort a given set of elements and determine the time
required to sort the elements. Repeat the experiment for different values of n, the number of
elements in the list to be sorted and plot a graph of the time taken versus n. The elements can
95
be read from a file or can be generated using the random number generator.
6. Sort a given set of elements using the heap sort method and determine the time required to
sort the elements. Repeat the experiment for different values of n, the number of elements in
the list to be sorted and plot a graph of the time taken versus n. The elements can be read
from a file or can be generated using the random number generator.
7. From a given vertex in an unweighted connected graph, find shortest paths to other vertices
using BFS.
8. Given an undirected graph, use BFS to check if there is a cycle in the graph.
9. Use BFS to find all connected components in a graph and finding all vertices within a
connected component.
10. Given a directed graph, use DFS to check if there is a cycle in the graph.
11. Check whether a given graph is connected or not using DFS method.
12. Use DFS to find all strongly connected components in a directed graph.
13. Obtain the topological ordering of vertices in a given directed graph.
14. For a given set of elements, construct an AVL Tree and also display balance factor for
each node.
15. Find the median of the two sorted arrays of different sizes using divide and conquer
approach.
16. Count the number of inversions in an array with the help of merge sort.
17. Find out the closest pair of points in the array using divide and conquer approach.
18. Given a value V, if we want to make change for V Rs., and we have infinite supply of each
of the denominations in Indian currency, i.e., we have infinite supply of {1, 2, 5, 10, 20, 50,
100, 200, 2000} valued coins/notes, what is the minimum number of coins and/or notes
needed to make the change? Implement the greedy algorithm to find minimum number of
coins.
19. Find the minimum cost spanning tree of a given undirected graph using:
a) Kruskal’s algorithm
b) Prim’s algorithm
20. From a given vertex in a weighted connected graph, find shortest paths to other vertices
using Dijkstras’s algorithm.
21. Implement the longest ascending subsequence problem using dynamic programming.
96
22. Implement matrix chain multiplication problem using dynamic programming.
23. Implement 0/1 Knapsack problem using dynamic programming.
24. Write a program to find the shortest path using Bellman-Ford algorithm.
25. Implement branch and bound scheme to find the optimal solution for:
a) Job assignment problem
b) Traveling salesperson problem.
Note: The above mentioned list of experiments is suggested list. Teacher may add more programs/
experiments as per requirement.
97
Title of the course : Multimedia and Animation
Subject Code : PECS- 621A
Weekly load : 3 Hrs LTP 3-0-0
Credit :3
Course Outcomes: At the end of the course, the student will be able to:
CO1 Understand all the basic in the multimedia technologies.
CO2 with all phases like digital images, digital audio & video, compression & standards etc.
CO3 Use and apply tools for image processing, video, sound and animation.
CO4 Apply methodology to develop a multimedia system.
CO5 Understand the fundamental principles of animation in addition to an invaluable
appreciation for observational techniques & the art of planning.
Theory
Unit Main Topics Course outlines Lecture(s)
Unit-1 1. Introduction Introduction to Multimedia, Design Processes, Hypertext, Links, 08
Frames, Files, HTML, HGML, Morphing, and Media Control
interfaces. Multimedia Tools, Elements of Multimedia, Sound
Input, Video Input, Data Automation, General Devices.
2. Text and Types of text, Font, insertion, compression, File formats. Types 08
Image of images, color models, Basic steps for image processing,
principle and working of scanner and digital camera, Gamma
and gamma correction.
3. Audio and Fundamental characteristics of sound, sensors for TV cameras, 08
Video color fundamentals, additive and subtractive color mixing,
technology Liquid crystal display (LCD), Plasma Display Panel (PDP), file
formats , Video for Window, QuickTime
Unit-2 4. Multimedia Overview, multimedia authoring metaphor, multimedia 08
presentation production, presentation and automatic authoring, Design
and authoring paradigms and user interface, overview of tools like adobe
premiere, director, flash and Dreamweaver.
98
5. Animation Introduction and examples of Animation. Types of Animation 08
Cel Animation, Stop Motion Animation, Computer Animation,
2-D Animation, 3-D Animation.
6. Basic Illusion of Life, straight action and pose to pose Timing, 08
Principles of Exaggeration, Drama and Psychological Effect, Fade in and
Animation Fade out, Squash and Stretch, Anticipation, staging, follow
through and overlapping action, Arcs, Solid Drawing ,Appeal,
slow in and slow out, Secondary Action.
Total=48
Recommended Books:
1.Principles of Multimedia by Ranjan Parekh. Tata McGraw-Hill
2.Multimedia technologies by Ashok banerji
3.Prabhat K. Andleigh and Kiran Thakrar, “Multimedia Systems Design”, PHI publication
4.John F. Koegal Buford, “Multimedia systems”, Pearson Education.
5. The complete animation course by Chris Patmore Pub.-Baron’s Educational Series.(New York)
Animation Unleashed by Ellen Bessen, Michael Weise Productions,2008(U.S.A)
99
Title of the course : Artificial Intelligence
Subject code : PECS-621B
Weekly load : 3 Hrs LTP 3-0-0
Credit :3
Course Outcomes: At the end of the course, the student will be able to:
CO1 Solve a problem as a state space problem.
CO2 Apply suitable search technique for a random search problem.
CO3 Understand probabilistic reasoning.
CO4 Understand optimization and inference algorithms for model learning
CO5 Design and develop programs for an agent to learn and act in a structured environment.
Theory
Unit Main Topics Course Outline Lecture(s)
Unit-1 1. Introduction Concept of AI, history, current status, scope, agents, 08
environments, Problem Formulations, Review of tree and graph
structures, State space representation, Search graph and Search
tree.
2. Search Random search, Search with closed and open list, Depth first 08
Algorithms and Breadth first search, Heuristic search, Best first search, A*
algorithm, Game Search.
3. Probabilistic Probability, conditional probability, Bayes Rule, Bayesian 08
Reasoning Networks-representation, construction and inference, temporal
model, hidden Markov model.
Unit-2 4. Markov MDP formulation, utility theory, utility functions, value 12
Decision iteration, policy iteration and partially observable MDPs.
process
5. Reinforcement Passive reinforcement learning, direct utility estimation, 12
Learning adaptive dynamic programming, temporal difference learning,
active reinforcement learning-Q learning.
Total=48
100
Recommended Books:
1. Stuart Russell and Peter Norvig, “Artificial Intelligence: A Modern Approach”,
3rdEdition, Prentice Hall.
2. Elaine Richand Kevin Knight, “Artificial Intelligence”, Tata McGraw Hill.
3. Trivedi, M.C., “A Classical Approach to Artificial Intelligence”, Khanna Publishing
House, Delhi.
4. Saroj Kaushik, “Artificial Intelligence”, Cengage Learning India, 2011.
5. David Poole and Alan Mackworth, “Artificial Intelligence: Foundations for
Computational Agents”, Cambridge University Press 2010.
101
Title of the course : Mobile Communication
Subject Code : PECS-621C
Weekly load : 3 Hrs LTP 3-0-0
Credit :3
Course Outcomes: At the end of the course, the student will be able to:
CO1 Make students familiar with fundamentals of mobile communication systems.
CO2 Identify the requirements of mobile communication as compared to static communication.
CO3 Identify the limitations of 2G and 3G wireless mobile communication and use design of 4G
and beyond mobile communication systems.
CO4 Outline cellular mobile communication standards.
CO5 Analyze various methodologies to improve the cellular capacity
Theory
Unit Main Topics Course outlines Lecture(s)
Unit-1 1.Introduction History of wireless communication, Need of mobility, 06
Application of wireless communication, Cellular concept
2.First Generation Advanced Mobile Phone System (AMPS) and Nordic 08
(1G) Mobile Mobile Telephony (NMT), frequency allocation, channels,
Systems modulation, multiple access scheme, network operation.
3.Second Network architecture, channels and operation of GSM, 10
Generation (2G) CDMAOne (IS-95), and IS-41, mobility management,
Mobile Systems Network operations of GPRS, CDMATwo (IS-95B),
CDPD, and HCSD.
Unit-2 4.Third 3G spectrum requirements, enabling technologies, service 12
Generation (3G) classes, applications and radio access standards (WCDMA
Mobile Systems and CDMA2000), Introduction to EDGE and WLAN.
Introduction to 4G.
102
5.Network Layer Mobile IP, Goals, Assumptions and requirements, Entities 12
Mobility and terminology, IP packet delivery, Agent advertisement
and discovery, Registration, Tunnelling and Encapsulation
, Optimisation , Reserve Tunnelling, ipv6 Protocol,
Dynamic Host configuration Protocol(DHCP), Micro-
mobility.
Total=48
Recommended Books:
1. J.Schiller, Mobile Communications, Pearson Education.
2. Pomportsis, Wireless Networks, John Wiley and Sons.
103
Title of the course : Software Project Management
Subject Code : PECS-621D
Weekly load : 3 Hrs LTP 3-0-0
Credit :3
Course Outcomes: At the end of the course, the student will be able to:
Theory
104
Configuration Management Process: Version Control, Change
Control management
Total=48
Recommended Books:
1. Bob Hughes, Mike Cotterell, “Software Project Management”, Tata McGraw Hill.
2. Prasanna Chandra, “Projects: Panning, Analysis, Selection, Financing, Implementation
and Review”, Tata McGraw Hill Publication.
3. Jeffrey K. Pinto, “Project Management”, Pearson Publications.
105
Title of the course : Decision Support System
Subject Code : PECS-621E
Weekly load : 3 Hrs LTP 3-0-0
Credit :3
Course Outcomes: At the end of the course, the student will be able to:
CO1 Understand fundamental concepts associated with DSS
CO2 Develop skill in the system analysis, design and implementation of computerized DSS
CO3 Learn various knowledge representation techniques
CO4 Identify decision support tools that can aid decision making.
CO5 Develop a functional prototype of a decision support system for a given case.
CO/PO Mapping : (Strong(3)/Medium(2)/Weak(1) indicates strength of correlation):
Program Outcomes (PO's)/ Program Specific Outcomes (PSO's)
COs
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2
CO1 3 2 2 2 3 1 0 2 3 3 3 2 1 1
CO2 3 2 2 2 3 1 0 2 3 3 3 2 2 2
CO3 3 2 2 2 3 1 0 2 3 3 3 2 2 3
CO4 3 2 2 2 3 1 0 2 3 3 3 2 2 2
CO5 3 2 2 1 3 2 0 2 3 3 2 1 2 2
Theory
Unit Main Topics Course outlines Hour(s)
1. Introduction to Concepts of Data, Information, Information Systems & End 06
DSS Users, Systems Concepts: Open System, Closed System;
Information Systems and Systems Concept
2. Building System Analysis and Design – Systems Development Cycle 06
Information (Identification of Requirements, Feasibility Study, System
Unit-1 System Analysis, Design And Implementation), Prototyping
3. Decision Making Introduction and Definitions, Simons Decision Making 06
Model, How Decisions are Supported, DSS Configurations,
DSS Characteristics and Capabilities
4. Components of DSS Classifications DSS Modeling-Static and Dynamic 06
DSS Models, Certainty, Uncertainty, and Risk, Sensitivity
Analysis, What-IF, and Goal Seeking
5. Knowledge Definition and types of Knowledge, Frame work for 06
Management Knowledge Management, Knowledge Representation
System Techniques: Rules, Frames, Semantic Networks
6. Data Warehouse Data Warehousing Definitions and Concepts, Types of 06
and Data Mining Data warehouse, Data Mining Concepts and Applications,
Unit-2 Framework of datamining, Text Mining, Web Mining
Usage, Benefits, and Success of Business Analytics
7. Business Online Analytical Processing (OLAP), Reporting and 06
Analytics Queries, Multidimensionality, Knowledge Discovery in
Databases(KDD), framework of KDD
8. Future directions Future Directions in DSS and DSS Case Studies 06
Total=48
106
Recommended Books:
1. Turban, Efrain : Decision Support & Business Intelligent Systems(8e)- Pearson Education
2. Marakas, George.M. : Decision Support Systems in the 21st century – Pearson Education
3. Mallach, Efrem G. : Decision Support & data Warehouse Systems – Tata McGraw-Hill
107
Title of the course : Advance Computer Architecture
Subject Code : PECS-621F
Weekly load : 3 Hrs LTP 3-0-0
Credit :3
Course Outcomes: At the end of the course, the student will be able to:
CO1 Understand uniprocessor and multiprocessor system
CO2 Design issues of vector and pipeline computers
CO3 Learn SIMD computer design and its effects on computation
CO4 Understand inter-processing element communication
CO5 Interpret performance of different pipelined processors.
Theory
108
Unit-2 5. Array Processors SIMD Array Processors, SIMD Interconnection Networks 08
and Static & Dynamic Networks, Mesh Connected Network,
Interconnection Cube interconnection networks
networks
6. Parallel SIMD matrix multiplication, Parallel sorting for array 08
Algorithms for processors, Associative Array Processing
Array Processors
7. Multi-processor Functional Structures, Multi stage networks for 08
Architecture multiprocessors, Parallel Memory Organization
Total - 48
Recommended Books
1. Hawang Kai, Briggs F.A, “Computer Architectures and Parallel Processing”, McGraw-
Hill.
2. Kain Richard Y, “Advanced Computer Architecture”, PHI
3. Hwang Kai, “Advanced Computer Architecture”, McGraw-Hill
4. Mano M. “Computer System Architecture”, PHI
109
Title of the course : Requirement Engineering
Subject Code : OECS-621A
Weekly load : 3 Hrs LTP 300
Credit :3
Course Outcomes: At the end of the course, the student will be able to:
Theory
110
analysis & Entity relationship diagrams, software prototyping, Software
specifications requirement specifications, nature of SRS, characteristics,
organization of SRS, introduction, overall description,
Unit-2
specific requirements, change management process,
approvals, supporting information.
4. Design Conceptual design and technical design, modularity, design 12
concepts strategy, bottom up design, top down design, hybrid design,
function-oriented design, object-oriented design, steps to
analyze object-oriented design
Total=48
Recommended Books:
111
Title of the course : Management Information System
Subject Code : OECS-621B
Weekly load : 3Hrs LTP 3-0-0
Credit :3
Course Outcomes: At the end of the course, the student will be able to:
CO1 Describe relationship between concept of information system, organization, management
and strategies
CO2 Evaluate the role of information system in today's competitive business environment
CO3 Effectively communicate strategic alternatives to facilitate decision making
CO4 Explain how enterprise systems and industrial networks create new efficiencies for
businesses.
CO5 Analyze the principal causes of information system failure.
CO/PO Mapping : (Strong(S)/Medium(M)/Weak(W) indicates strength of correlation):
Program Outcomes (PO's)/ Program Specific Outcomes (PSO's)
COs
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2
CO1 2 3 3 0 3 0 0 2 3 3 3 2 1 3
CO2 2 3 3 0 3 1 1 2 3 3 3 2 2 3
CO3 2 3 3 2 3 1 0 2 3 3 3 2 2 3
CO4 0 0 0 3 0 0 2 1 0 0 2 1 2 2
CO5 0 0 1 0 0 3 2 0 0 1 0 0 3 2
Theory
Unit Main Topics Course outlines Hour(s)
1. Understanding Introduction to Management Information Systems, History 06
MIS of MIS, Impact of MIS, Role and Importance, MIS
Categories, Managers and Activities in IS, Types of
Computers Used by Organizations in Setting up MIS,
Hardware support for MIS
Unit-1 2. Conceptual Introduction, The Decision Making Process, System 06
Foundations Approach to Problem Solving, The Structure of
Management Information System, Types of Management
Systems Concepts of Management Organization
3. MIS Planning, Introduction, Differences between planning and control 06
Control and information, Systems Analysis, Systems Design,
Development Development
4. MIS and BPR Introduction, Business Process Re – Engineering, 06
Improving a process in BPR, Object Oriented
methodology, BPR – Current Focus
5. MIS Organization Introduction, MIS at Management levels, Strategic Level 06
Structure Planning, Operational Level Planning, Economic and
Behavior Theories
112
6. MIS – Support Introduction, Philosophy of Modeling, DSS: Deterministic 06
Models Systems, Market Research Methods, Ratio Analysis for
Unit-2 and Knowledge Financial Assessment, Management Science Models
Management
7. Strategic Introduction, Background, Performance, Product 06
Management differentiation and Value Chain, How IT influences
Information Organizations’ goals, The five levels, Governance Modes
System in the use of IT
8. Security, Ethical Introduction, Control Issues in Management Information 06
Issues and Case Systems, Security Hazards, Ethical Issues, Technical
Studies solutions for Privacy Protection and MIS Case Studies
Total=48
Recommended Books:
1. Kenneth C. Laudon : Management Information Systems- Pearson Education
2. Kenneth C. Laudon : Essentials of Management Information System – Pearson Education
113
Title of the course : System Installation and Troubleshooting
Subject Code : OECS-621C
Weekly load : 3Hrs LTP 3-0-0
Credit :3
Course Outcomes: At the end of the course, the student will be able to:
CO1 Understand the functioning of various hardware components of computer and the installation
procedure of operating systems & drives required for functioning of the devices.
CO2 Understand the installation procedure of the latest software, peripheral devices and the
modems.
CO3 Understand about computer hardware and the installation procedure of system software and
application software.
CO4 A hands-on approach will be used to provide the student with a basic skill level to work on a
computer
CO5 Recognition and solution of common hardware-software problems including the replacement
or upgrading of components will be addressed
Theory
Unit Main Topics Course outlines Lecture(s)
Unit-1 1.Introduction & Functioning of various hardware components i.e. CPU, 06
functioning RAM, ROM, Mother Board (AT, ATX, NLX), power supply
2. Introduction Ports (serial, parallel, USB etc), CD-ROM drive, sound card 06
& functioning , LAN card
114
various drives VGA or (Graphics Acceleration Card).
Total=48
Recommended Books:
1. W. L. Rosch, Hardware Bible, Que
2. Muller &Zacker, Upgrading and Repairing PC’s, PHI
115
Title of the course : Internet Programming
Subject Code : OECS-621D
Weekly load : 3 Hrs LTP 3-0-0
Credit : 3 (Lecture 3)
Course Outcomes: At the end of the course, the student will be able to:
CO1 Understand the concept of object oriented programming
CO2 Learn data type and variables of Java
CO3 Write programs using various features of Java
CO4 Understand the concept of applet and multi-threading
CO5 Learn the concept of AWT and event handling
Theory
Unit Main Topics Course outlines Lecture(s)
Unit-1 1. Introduction Programming; Need of Programming; Representation of 8
to Algorithms; Need for OOP; Class and Objects; Abstraction;
Programming Association; Composition; Aggregation; Inheritance: simple
and OOP inheritance, hierarchical inheritance, multilevel inheritance,
Basics hybrid inheritance; Encapsulation; Polymorphism: static
polymorphism, dynamic polymorphism;
2. Introduction Introduction to Java; Environment variables; JAVA-Home 8
to Java directory; Steps to develop a Java Program; Command line
arguments, Variables: value type, reference type;
Identifiers; Data Types: primitive data types, abstract data
types; Instance variables and Local Variables; Access
Specifiers; Access Modifiers; Keywords.
3. Operators, Unary Operators; Binary Operators; Types of Operators: 8
Classes and arithmetic operator, relational operator, logical operator,
Methods assignment operator, increment operator, decrement
operator, negation operator, bitwise operator, shift operator,
concatenation operator, new operator, instance operator;
Type Casting: implicit type casting, explicit type casting;
Methods and Parameters; Constructors; Overloading
Constructors; Overloading member functions; Abstract
class; Final class; Variables, Interfaces, Object;
116
Constructors: default constructor, parameterized
constructor; Wrapper classes; Adapter Classes; Anonymous
Classes; Utility Classes; Generics.
Recommended Books:
1. Bert bates, Kathy Sierra, Head First Java, O’Reilly Media.
2. Steven Holzer, Java 8 programming, Dreamtech Press.
117
Title of the course : Database Integrity and Security
Subject Code : OECS-621E
Weekly load : 3 Hrs LTP 3-0-0
Credit :3
Course Outcomes: On successful completion of this course, students will be able to:
CO1 Describe the three schema architecture of DBMS.
CO2 Explain the join dependency and its types with an example.
CO3 Illustrate the role of different components in Data Base system environment.
CO4 Discuss the categories classified for data base management systems.
CO5 Review where and how the database users and passwords are maintained.
Theory
118
Authorization Securing database-to-database communications,
Unit-2 Authentication and Password Security
6. Granular Advances in Access Control - Managing and Querying 08
Access Encrypted Data –Database Watermarking - Copyright
Control and Protection, Regulations and Compliance
Encryption
7. Trust Trust Negotiation - Auditing Categories - Auditing 07
Management Architectures
and Auditing
Total=48
Recommended Books:
1. Elamsri, Navathe, Somayajulu and Gupta, Database Concepts, Pearson Edu, 2006.
2. Michael Gertz, Sushil Jajodia, Handbook of Database Security: Applications and Trends,
Springer,2008.
3. Nilesh Shah, “Database Systems using Oracle”, 2nd edition, Prentice Hall of India Pvt
Ltd,2007.
4. Ron Ben Natan, “Implementing Database Security and Auditing”, Elsevier, 2005.
5. Alfred Basta, Melissa Zgola, Dana Bullaboy, Thomas L.Whitlock Sr.,” Database
Security”,Cencage Learning, 2012.
6. Bhavani Thuraisingham, “Database and Applications security – Integrating Information
security and Data Management”, Taylor & Francis Group, 2005.
119
Title of the course : Object Oriented Analysis and Design
Subject Code : OECS-622A
Weekly load : 3 Hrs LTP 300
Credit :3
Course Outcomes: At the end of the course, the student will be able to:
CO1 Understand the concept of object-oriented development and create a static object model and
a dynamic behavioural model and a functional model of the system.
CO2 Understand the approaches to system design and object design, and the techniques of
translating design to implementation.
CO3 Implement the object-oriented modelling and design patterns to provide solutions to the
real-world software design problems.
CO4 Become familiar with the Unified modelling Language.
CO5 Understand the difference between writing programs for the software and doing analysis
and design.
Theory
120
5. System Design and Subsystems concurrency; Allocating subsystems to 06
Object Design processors and tasks; Management of data stores;
Handling global resources; Handling boundary
conditions; Setting trade-off priorities; Overview of
object design; Combining the three models; Designing
algorithms; Design optimization; Implementation of
control; Adjustment of inheritance; Design of
associations; Object representation; Physical
packaging; Document design decisions.
Total=48
Recommended Books:
1. James E. Rumbaugh, “Object Oriented Modeling and Design”, Pearson Education.
2. Bernd Oestereich, “Developing Software With UML”, Pearson Education.
3. Grady Booch, “Object Oriented Analysis and Design”, Addison Wesley.
4. Pierre-Alain, Muller, “Instant UML”, Shroff Publishers.
5. Grady Booch, James Rumbaugh, Lvar Jacobson, “The Unified Modeling Language User
Guide”, Addison Wesley.
6. Grady Booch, James Rumbaugh, Lvar Jacobson, “The Unified Modeling Language
Reference Manual”, Addison Wesley.
7. Rebecca Wirfs-Brock, “Design Object Oriented Software”, PHI.
8. E. Charnaik, D. McDermott, “Introduction to Artificial Intelligence”, Addison-Wesley
Publishing Company.
9. Nils J. Nilsson, “Principles of Artificial Intelligence”, Narosa Publishing Co.
121
Title of the course : E-Commerce
Subject Code : OECS-622B
Weekly load : 3Hrs LTP 3-0-0
Credit :3
Course Outcomes: At the end of the course, the student will be able to:
CO1 Understand the concept of evolution of E-commerce
CO2 Analyze various E-commerce process models
CO3 Identify current issues and case studies in E-commerce
CO4 Categorize advantages and disadvantages of different online payment options
CO5 Assess e-commerce strategies and applications, including online marketing, e-government,
e-learning and global e-commerce
CO/PO Mapping : (Strong(3)/Medium(2)/Weak(1) indicates strength of correlation):
Program Outcomes (PO's)/ Program Specific Outcomes (PSO's)
COs
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2
CO1 2 3 3 0 3 0 0 2 3 3 3 2 1 2
CO2 2 3 3 0 3 1 1 2 3 3 3 2 2 2
CO3 2 3 3 2 3 1 0 2 3 3 3 2 1 3
CO4 0 0 0 1 1 2 1 0 0 0 1 3 2 2
CO5 0 0 1 0 0 2 2 1 0 1 0 0 3 2
Theory
Unit Main Topics Course outlines Hour(s)
1. Introduction to E- Introduction, E-commerce or Electronic Commerce- An 06
commerce Overview, Electronic Commerce– Cutting edge,
Electronic Commerce Framework
2. Evolution of E- Introduction, History of Electronic Commerce, Advantages 06
commerce and Disadvantage of E-commerce, Roadmap of e-
Unit-1 commerce in India
3. E-commerce Introduction, E-commerce Infrastructure-An Overview, 06
Infrastructure Hardware, Server Operating System, Software, Network
Website
4. Managing the e- Introduction, e-Enterprise, Managing the e-Enterprise, E- 06
Enterprise business Enterprise, Comparison between Conventional
Design and E-organization, Organisation of Business in an
e-Enterprise
5. e-Commerce Introduction, Business Models, E-business Models Based 06
Process Models on the Relationship of Transaction Parties, e-commerce
Sales Life Cycle (ESLC) Model
6. Electronic Electronic Payment Systems, Electronic Cash, Smart Cards 06
Payment Systems and Electronic Payment Systems, Credit Card Based
Unit-2 Electronic Payment Systems, Risks and Electronic
Payment Systems
122
7. Electronic Data The Meaning of EDI, History of EDI, EDI Working 06
Interchange Concept, Implementation difficulties of EDI, Financial
EDI, EDI and Internet
8. E-Marketing, The scope of E-Marketing, Internet Marketing 06
Current issues and
Case Studies Techniques, Current issues in E-commerce and Case
studies on E-commerce
Total=48
Recommended Books:
1. Kenneth C. Laudon: E-Commerce: Business, Technology, Society, 4th Edition, Pearson
2. S. J. Joseph, E-Commerce: An Indian perspective, PHI
123
Title of the course : Computer Network Security
Subject Code : OECS-622C
Weekly load : 3 Hrs LTP 3-0-0
Credit :3
Course Outcomes: At the end of the course, the student will be able to:
CO1 Comprehend and implement various cryptographic algorithms to protect the confidential
data.
CO2 Identify network vulnerabilities and apply various security mechanisms to protect networks
from security attacks.
CO3 Apply security tools to locate and fix security leaks in a computer network/software.
CO4 Secure a web server and web application.
CO5 Configure firewalls and Intrusion Detection System
Theory
124
Unit-2 5. Web Security: Phishing attack, SQL Injection, Securing databases and 08
database access, Cross Site Scripting Attacks, Cookies,
Session Hijacking, E-commerce security
6. System Security: Firewalls, Types: Packet filter (stateless, stateful), 08
Application layer proxies, Firewall Location and
Configurations, Intruders, Intrusion Detection System,
Anomaly and misuse detection.
7. Wireless IEEE 802.11i Wireless LAN Security, Wireless 08
Network Application Protocol Overview, Wireless Transport
Security: Layer Security, WAP End-to-End Security
Total=48
Recommended Books:
1. Stallings, W., Network Security Essentials, Prentice Hall (2017) 6th Edition.
2. Cheswick, R., W., Bellovin, M., S., and Rubin, D., A., Firewalls and Internet Security,
AddisonWesley Professional (2003) 2nd Edition.
3. Graves, K., Certified Ethical Hacking Study Guide,Sybex (2010) 1st Edition.
4. Stallings, W., Cryptography and Network Security, Prentice Hall (2013), 6th Edition.
125
Title of the course : Computer Graphics
Subject Code : OECS-622D
Weekly load : 3 Hrs LTP 3-0-0
Credit : 3 (Lecture 3)
Course Outcomes: At the end of the course, the student will be able to:
CO1 Provide comprehensive introduction about computer graphics system and design
algorithms
CO2 Familiar with two dimensional and three dimensional transformations
CO3 Familiar with techniques of clipping, hidden surface removal and shading
CO4 Provide information about Projections and shading techniques
CO5 Render projected objects to naturalize the scene in 2D view and use of illumination
models for this
CO/PO Mapping : (Strong(3)/Medium(2)/Weak(1) indicates strength of correlation):
Program Outcomes (PO's)/ Program Specific Outcomes (PSO's)
COs
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2
CO1 2 0 2 0 2 0 0 0 0 0 0 2 3 2
CO2 2 0 2 2 1 0 0 0 0 0 0 2 3 2
CO3 2 3 2 2 2 0 0 0 2 0 2 2 3 3
CO4 2 3 2 2 2 0 0 0 2 0 2 2 3 2
CO5 2 3 2 2 2 0 0 0 2 0 2 2 3 2
Theory
Unit Main Topics Course outlines Lecture(s)
1. Overview of Display devices, physical input and output 06
graphics systems devices: storage tube graphic displays, Raster
Refresh, Plasma Panel Displays, Liquid Crystals
2. Output Point plotting, Line Drawing algorithms – Slope 06
Primitives Line Method, DDA algorithms, Bresenham’s
Line algorithm
3. Two-dimensional Basic transformations-translation, scaling, 06
Unit-1 Transformations rotation, Matrix representation and homogenous
coordinates, composite transformations, Rotation
about an arbitrary point, scaling relative to a fixed
point
4. Windowing and Windowing concepts, clipping algorithms-Line 06
Clipping clipping– Cohen-Sutherland algorithm, Polygon
Clipping algorithms, Text Clipping.
Techniques
5.Three- dimensional Scaling, Rotation, Translation, Rotation about 06
Transformations arbitrary axis.
126
Unit 2 6. Projections Parallel projections, perspective projections 06
7. Surface Detection Back face removal method, Depth-buffer method, 06
and Hidden- Scan-line method
Surface Removal
8. Shading Overview Polygon shading methods: Flat shading, Gouraud 06
Shading, Phong Shading.
Total=48
Recommended Books:
1. Computer Graphics, Hearn & Baker, PHI
2. Principles of Interactive Graphics, Newman & Sproul, Mcgraw Hill
3. Computer Graphics-A Programming Approach, Steven Harrington, Mcgraw Hill
4. Computer Graphics, Sinha &Udai, Mcgraw Hill
127
Title of the course : Data Analytics
Subject Code : OECS-622E
Weekly load : 3 Hrs LTP 3-0-0
Credit :3
Course Outcomes: At the end of the course, the student will be able to:
CO1 Summarize the workflow of analytics process model, its requirements and applications.
CO2 Apply suitable data pre-processing techniques for the given dataset.
CO3 Demonstrate different predictive, Descriptive and text analytic models.
CO4 Examine Survival Analysis model and learn through Social Network Analytics.
CO5 Acquire fundamental enabling techniques and scalable algorithms data analytics.
Theory
Unit Main Topics Course outlines Lecture(s)
1. Data Analytics Process Model – Analytics – Analytical Model 04
Analytics an Requirements.
Overview
128
Unit-2 6. Text Overview, key terms used – Text Analytics Methods – Text 06
Analytics Analytics Metrics – Applications.
Total=48
Recommended Books:
1. Bart Baesens, “Analytics in a Big Data World”, The Essential Guide to Data Science and its
Applications, Wiley, First edition, 2014.
2. Jesus Rogel- Salazar, “Data Science and Analytics with Python “, CRC Press, First Edition,
2017.
3. Michael Berthold, David J. Hand, “Intelligent Data Analysis”, Springer, Second edition,
2007.
4. Thomas H. Davenport, Jeanne G. Harris, “Competing on Analytics: The New Science of
Winning”, Harvard Business Review Press ,First edition,2007
5. Paul C. Zikopoulos, Chris Eaton, “Understanding Big Data”, McGraw-Hill, 2012 (eBook
from IBM)
6. Chris Eaton, Dirk DeRoos, Tom Deutsch, George Lapis, Paul Zikopoulos, “Understanding
Big Data: Analytics for Enterprise Class Hadoop and Streaming Data”, McGraw-Hill
Publishing, 2012.
129
Title of the course : Artificial Intelligence
Subject code : MDCS-621
Weekly load : 4 Hrs LTP 3-1-0
Credits :4
Course Outcomes: At the end of the course, the student will be able to:
CO1 Solve a problem as a state space problem.
CO2 Apply suitable search technique for a random search problem.
CO3 Understand probabilistic reasoning.
CO4 Understand optimization and inference algorithms for model learning
CO5 Design and develop programs for an agent to learn and act in a structured environment.
Theory
Unit Main Topics Course Outline Lecture(s)
1. Introduction Concept of AI, history, current status, scope, agents, 03
environments, Problem Formulations, Review of tree and graph
structures, State space representation, Search graph and Search
tree.
2. Search Random search, Search with closed and open list, Depth first 09
Unit-1 Algorithms and Breadth first search, Heuristic search, Best first search, A*
algorithm, Game Search.
3. Probabilistic Probability, conditional probability, Bayes Rule, Bayesian 12
Reasoning Networks-representation, construction and inference, temporal
model, hidden Markov model.
4. Markov MDP formulation, utility theory, utility functions, value 12
Decision iteration, policy iteration and partially observable MDPs.
process
5. Reinforcement Passive reinforcement learning, direct utility estimation, 12
Unit-2 Learning adaptive dynamic programming, temporal difference learning,
active reinforcement learning-Q learning.
Total=48
130
Recommended Books:
1. Stuart Russell and Peter Norvig, “Artificial Intelligence: A Modern Approach”,
3rdEdition, Prentice Hall.
2. Elaine Richand Kevin Knight, “Artificial Intelligence”, Tata McGraw Hill.
3. Trivedi, M.C., “A Classical Approach to Artificial Intelligence”, Khanna Publishing
House, Delhi.
4. Saroj Kaushik, “Artificial Intelligence”, Cengage Learning India, 2011.
5. David Poole and Alan Mackworth, “Artificial Intelligence: Foundations for
Computational Agents”, Cambridge University Press 2010.
131
Title of the course : Optimization Techniques
Subject code : HDCS-621
Weekly load : 4 Hrs LTP 3-1-0
Credits :4
Course Outcomes: At the end of the course, the student will be able to:
CO1 Describe clearly a problem, identify its parts and analyze the individual functions.
Feasibility study for solving an optimization problem.
CO2 Becoming a mathematical translation of the verbal formulation of an optimizationproblem.
CO3 To design algorithms, the repetitive use of which will lead reliably to finding an
approximate solution.
CO4 Evaluate and measure the performance of an algorithm. Discovery, study and solve
optimization problems.
CO5 Understand optimization techniques using algorithms. Investigate, study, develop, organize
and promote innovative solutions for various applications.
Theory
Unit Main Topics Course outlines Lecture(s)
Unit-1 1. Introduction and Historical Development; Engineering applications of 08
Basic Concepts Optimization; Art of ModelingObjective function;
Constraints and Constraint surface; Formulation of design
problems as mathematical programming problems
Classification of optimization problems. Optimization
techniques – classical and advanced techniques
2. Optimization Stationary points; Functions of single and two variables; 08
using Calculus Global OptimumConvexity and concavity of functions of
one and two variablesOptimization of function of one
variable and multiple variables; Gradient vectors;
132
Examples
Optimization of function of multiple variables subject to
equality constraints; Lagrangian functionOptimization of
function of 1 multiple variables subject to equality
constraints; Hessian matrix formulation; Eigen values
Kuhn-Tucker Conditions; Examples
3.Linear Standard form of linear programming (LP) problem; 08
Programming Canonical form of LP problem; Assumptions in LP
Models; Elementary operationsGraphical method for two
variable optimization problem; Examples Motivation of
simplex method, Simplex algorithm and construction of
simplex tableau; Simplex criterion; Minimization versus
maximization problems
4. Linear Use of software for solving linear optimization problems
Programming using graphical and simplex methodsExamples for
Applications transportation, assignment, water resources, structural and
other optimization problems
Unit-2 5. Dynamic Sequential optimization; Representation of multistage 12
Programming decision process; Types of multistage decision problems;
Concept of sub optimization and the principle of
optimality Recursive equations – Forward and backward
recursions; 2 Computational procedure in dynamic
programming (DP) D
6. Dynamic Problem formulation and application in Design of 06
Programming continuous beam and Optimal geometric layout of a truss
Applications Water allocation as a sequential process.
7. Integer Integer linear programming; Concept of cutting plane 06
Programming methodMixed integer programming; Solution algorithms;
Examples
Total=48
Recommended Books:
1. Kapoor, V.K.: Operation Research, Sultan Chand & Co., New Delhi.
2. Manmohan Gupta, P.K.: Operation Research, Sultan Chand & Co., New Delhi.
3. Pronsen, Richard: Theory and Problems of Operation Research, McGraw Hill, 1983.
4. Hiller, F.S. & Liberman, G.J., 1974: Introduction to Operations Research, 2nd Edn. Holden
5. Rao, S. S., 1978: Introduction to Optimization: Theory & Applications, Wiley Eastern.
6. Srinath, L.S.: Linear Programming, East-West, New Delhi.
133
SEMESTER-VII
134
Title of the course : Internet Programming
Subject code : PCCS-711
Weekly load : 3 Hrs LTP 2-1-0
Credits :3
Course Outcomes: At the end of the course, the student will be able to:
CO1 Understand the concept of object oriented programming
CO2 Learn data type and variables of Java
CO3 Write programs using various features of Java
CO4 Understand the concept of applet and multi-threading
CO5 Learn the concept of AWT and event handling
Theory
Unit Main Topics Course outlines Lecture(s)
Unit-1 1. Introduction Programming; Need of Programming; Representation of 8
to Algorithms; Need for OOP; Class and Objects; Abstraction;
Programming Association; Composition; Aggregation; Inheritance: simple
and OOP inheritance, hierarchical inheritance, multilevel inheritance,
Basics hybrid inheritance; Encapsulation; Polymorphism: static
polymorphism, dynamic polymorphism;
2. Introduction Introduction to Java; Environment variables; JAVA-Home 8
to Java directory; Steps to develop a Java Program; Command line
arguments, Variables: value type, reference type;
Identifiers; Data Types: primitive data types, abstract data
types; Instance variables and Local Variables; Access
Specifiers; Access Modifiers; Keywords.
3. Operators, Unary Operators; Binary Operators; Types of Operators: 8
Classes and arithmetic operator, relational operator, logical operator,
Methods assignment operator, increment operator, decrement
operator, negation operator, bitwise operator, shift operator,
concatenation operator, new operator, instance operator;
Type Casting: implicit type casting, explicit type casting;
Methods and Parameters; Constructors; Overloading
Constructors; Overloading member functions; Abstract
135
class; Final class; Variables, Interfaces, Object;
Constructors: default constructor, parameterized
constructor; Wrapper classes; Adapter Classes; Anonymous
Classes; Utility Classes; Generics.
Unit-2 4. Programming Selection control Structures; Iteration control Structure; 12
using Java Arrays: array initialization, array creation, multidimensional
array; Strings; Recursion; Regular Expression; Packages;
Exception Handling: errors in software engineering,
exception classes, keywords used in exception handling,
hierarchy of run time exception; Multithreading: life cycle
of a thread, creation of child thread, working with multiple
child thread, thread priorities, thread synchronization, and
monitors; Abstract Window Toolkit; Event Handling;
Window listener; Working With Menus; Dialog box; Card
Layout; Applets; Collections; Framework; Loading an
Image onto the Frame and Applet; Insets.
5. Debugging, Debugging; Code Analysis using Programming Mistake 12
Code Analysis Detector (PMD); Unit Testing using JUnit and Code
and Unit coverage
Testing
Total=48
Recommended Books:
1. Bert bates, Kathy Sierra, Head First Java, O’Reilly Media.
2. Steven Holzer, Java 8 programming, Dreamtech Press.
136
Title of the course : Compiler Design
Subject Code : PCCS-712
Weekly load : 3Hrs LTP 2-1-0
Credit :3
Course Outcomes: At the end of the course, the student will be able to:
CO1 Introduce the major concept areas of language translation and compiler design
CO2 Enrich the knowledge in various phases of compiler ant its use, code optimization
techniques, machine code generation, and use of symbol table
CO3 Extend the knowledge of parser by parsing LL parser and LR parser
CO4 Provide practical programming skills necessary for constructing a compiler
CO5 Understands Intermediate Code Generation and Code Optimization
CO1 2 1 2 0 2 2 0 0 1 0 1 2 3 3
CO2 2 2 2 2 2 2 0 0 2 0 2 2 2 2
CO3 3 2 2 2 2 2 0 0 2 2 2 3 2 2
CO4 3 2 2 2 2 3 0 0 2 2 2 2 2 2
CO5 3 2 2 2 2 2 0 0 3 0 1 2 2 2
Theory
137
6. Error Detection Errors, Lexical-phase errors, syntactic-phase 06
& Recovery: errors,semantic errors.
Total=48
Recommended Books:
1. Aho A. V., Ullman J. D., Sethi R., Compilers Principles, Techniques and Tools, Pearson
Education.
2. John Levine, Tony Mason, Doug Brown, Lex and Yacc, O’REILLY.
3. Kenneth C. Louden, Compiler Construction and Practice, Thomson Publication.
4. Dhamdhere, Compiler Construction, Macmillan Publication.
138
Title of the course : Internet Programming Lab
Subject Code : PCCS-713
Weekly load : 4 Hrs LTP 0-0-4
Credit :2
Course Outcomes: At the end of the course, the students will be able to:
CO1 Implement programs using various control structure
CO2 Implement command line argument and various input methods
CO3 Write programs using various features of Java like vector, string, string buffer class
CO4 Implement programs using applet and multi-threading
CO5 Develop applications using applet, AWT and event handling
LIST OF PRACTICALS
1. Write a Java program to print Unicode characters.
2. Write a Java program to find the largest of three numbers.
3. Write a Java program for multi-dimensional array initialization and perform various
operations (such as insertion, deletion, and searching).
4. Write a Java program to find a number of command line Arguments and to display them.
5. Write a Java program to find the sum of two numbers using command line arguments.
6. Write a Java program for converting a string to any numeric type (parsing).
7. Design a class with the name employee which contains three member data (empno, ename, sal)
and two methods (getData() and setData).
8. Write a program to show the concept of function overloading by defining the methods with
same name and different arguments within a class.
9. Design a program having two classes B and A. Class B is a child class of class A and class A is
superclass of B. The object of class B can invoke the member data and member function of its
139
own class and that of super class A.
10. Design a program where same method signatures are defined in the child class and also in the
super class (overriding member function).
11. Write a Java program to show the usage of different access specifiers (public, private protected,
and default) and access modifiers (final, static, transient, volatile, and abstract).
12. Write a Java program that shows the implementation of abstract class.
13. Design an interface that tells us that whichever classes are implemented form the interface has
got the functionalities of adding two numbers and subtracting two numbers.
14. Write a Java program to show the inheritance in interface.
15. Write a program with the class “Nums” contains two methods i.e. to add two numbers and to
subtract two numbers. Nums.class should be placed in the user defined package “Pack1”.
16. Write a Java program to use the functionalities of Nums.class present in the package Pack1.
17. Write a Java program to show different types exception defined in java.lang…..(Arithmetic,
ArrayIndexOutofBounds, numberFormat, StringIndexOutofBounds, and NullPointer) and
keywords used in java language for exception handling (try, catch, finally, throw, and
throws).
18. Design a user defined exception class with name “InvalidPEException” and place it “Payroll
package”.
19. Write a program to check the presence of a thread in the Java application.
20. Design a program to create a child thread that should display 1 to 10 and the main thread
should also display 1 to 10.
21. Design a java application to demonstrate a stop and watch (counter), that should be executed
by two threads, one with low priority and other with high priority for 10 seconds.
22. Write a program to display all the Java files present in C:/CJava directory (Dir *.java)
23. Write a Java program to implement the DOS COPY command.
24. Write a Java program to save the empno, salary and working status of an employee in a file
called “Emp.txt” and to read the data.
25. Write a Java program to read the contents of the file line by line.
26. Write a Java program to read the data from the keyboard at runtime.
27. Implement abstract window toolkit (awt) GridLayout, button, checkbox, ItemListener,
choice, list, combo box, drop down list box, scrollbar, working with menus, dialog, file
140
dialog, card layout, text listener, event Mouse Listener, Mouse Motion Listener, and Mouse
Wheel Listener.
28. Implement collection framework (list, set, Map, sorted set, and sorted map) and utility
classes (date, string tokenizer,, stack, arrays, Random, currency, properties, timer and timer
task, vector, enumeration, iterator, hash table).
29. Write a Java program to show working of user defined Generic classes.
30. Write a simple Java program to show multiple type parameters in java generics.
31. Write a program for loading an image onto the frame.
32. Write a program for loading an image into an applet.
Note: The above mentioned list of experiments is suggested list. Teacher may add more programs/
experiments as per requirement.
141
Title of the course : Image Processing
Subject Code : PECS-711A
Weekly load : 3 Hrs LTP 3-0-0
Credit :3
Course Outcomes: At the end of the course, the student will be able to:
CO1 Learn the fundamental concepts and applications of image processing
CO2 Cover the basic theory and algorithms that are widely used in image processing
CO3 Provide mathematical foundations for digital manipulation of images such as image
acquisition, segmentation, Fourier transformation and compression
CO4 Understand the basic concepts of performing Image restoration, Image compression, Color
image processing, Image segmentation and Object Recognition
CO5 Understand and review image transforms
142
8. Image Detection edge detection and boundary detection, shareholding, 06
Total=48
Recommended Books:
1. Rafacl C. Gonzalez, Digital image processing, Addison Wesley.
2. Jain Tenber, Digital Image Processing, PHI
143
Title of the course : Soft Computing
Subject code : PECS-711 B
Weekly load : 3 Hrs LTP 3-0-0
Credits :3
Course Outcomes: At the end of the course, the student will be able to:
CO1 Understand fuzzy logic and its applications.
CO2 Acquire knowledge of artificial neural networks and their applications.
CO3 Solve single-objective optimization problems using genetic algorithms.
CO4 Apply soft computing to solve problems in varieties of application domains.
CO5 To familiarize with soft computing concepts.
CO2 3 3 3 3 3 2 0 0 3 2 2 3 2 3
CO3 3 3 3 2 2 2 0 0 3 3 3 3 3 2
CO4 3 3 3 2 2 3 0 0 3 3 3 3 3 3
CO5 2 3 2 2 2 3 0 0 3 3 3 2 3 3
Theory
Unit Main Topics Course outlines Lecture(s)
1. Introduction Concept of computing systems; “Soft” computing versus 02
to Soft “Hard” computing; Characteristics of soft computing; Some
Computing applications of soft computing techniques
2. Fuzzy Logic Introduction to fuzzy logic; Fuzzy sets and membership 10
functions; Operations on fuzzy sets; Fuzzy relations, rules,
Unit-1 propositions, implications and inferences; Defuzzification
techniques; Fuzzy logic controller design; Some applications
of fuzzy logic
3. Genetic Concept of “Genetics” and “Evolution” and its application to 12
Algorithms probabilistic search techniques; Basic GA framework and
(GAs) different GA architectures; GA operators: encoding,
crossover, selection, mutation, etc.; Solving single-objective
optimization problems using GAs
4. Artificial Biological neurons and their working; Simulation of 12
Unit- biological neurons to problem solving; Different ANN
Neural
II architectures; Training techniques for ANNs; Applications of
Networks
ANNs to solve some real-life problems
144
5. Unsupervised Competitive learning networks;Kohonen self-organizing 12
Learning networks; Hebbian learning; The Hopfield network
Total=48
Recommended Books:
1. F. Martin McNeill, and Ellen Thro, Fuzzy Logic: A Practical Approach, Morgan
Kaufmann Pub.
2. Timothy J. Ross, Fuzzy Logic with Engineering Applications, Wiley.
3. Nikola K. Kasabov, Foundations of Neural Networks, Fuzzy Systems, and Knowledge
Engineering, MIT Press.
4. Melanie Mitchell, An Introduction to Genetic Algorithms, MIT Press.
5. David E. Goldberg, Genetic Algorithms in Search, Optimization and Machine Learning,
Pearson Education.
6. S. Rajasekaran, and G. A. Vijayalakshmi Pai, Neural Networks, Fuzzy Logic and Genetic
Algorithms: Synthesis, and Applications, Prentice Hall of India.
7. D. K. Pratihar, Soft Computing, Narosa, 2008.
145
Title of the course : Computer Network and Security
Subject Code : PECS-711C
Weekly load : 3 Hrs LTP 3-0-0
Credit :3
Course Outcomes: At the end of the course, the student will be able to:
Theory
Unit Main Topics Course outlines Lecture(s)
Unit-1 1. Introduction Computer Network & Security: Data and Computer 06
Communication Networks, Data Communication,
Transmission Methodologies, Data Link Layer, Multiple
Access & Local Area Networks.
146
6. Database Data management technologies, Information security, 06
Security: Information Management Technologies, Security policies,
Policy enforcement & related issues, Design principles,
Multilevel relational data models, Security impact on
database function, inference problem.
Recommended Books:
1. Tanenbaum, Computer Network, Prentice Hall India
2. William Stalling, Data and Computer Communication, Prentice Hall
3. Douglas E. Comer, Internetworking with TCP/IP Volume – I, Prentice Hall India
4. W. Richard Stevens, TCP/IP Illustrated Volume-I, Pub. Addison Wesley
5. B. Forouzan, Data Communication And Networking, TMH
147
Title of the course : Requirement Engineering
Subject Code : PECS-711D
Weekly load : 3 Hrs LTP 300
Credit :3
Course Outcomes: At the end of the course, the student will be able to:
Theory
148
Unit-2 3. Requirement Requirements analysis, data flow diagrams, data dictionaries, 12
analysis & Entity relationship diagrams, software prototyping, Software
specifications requirement specifications, nature of SRS, characteristics,
organization of SRS, introduction, overall description,
specific requirements, change management process,
approvals, supporting information.
Total=48
Recommended Books:
149
Title of the course : Management Information System
Subject Code : PECS-711E
Weekly load : 3Hrs LTP 3-0-0
Credit :3
Course Outcomes: At the end of the course, the student will be able to:
CO1 Describe relationship between concept of information system, organization, management and
strategies
CO2 Evaluate the role of information system in today's competitive business environment
CO3 Effectively communicate strategic alternatives to facilitate decision making
CO4 Understand the leadership role of Management Information Systems in achieving business
competitive advantage through informed decision making.
CO5 Effectively communicate strategic alternatives to facilitate decision making.
CO/PO Mapping : (Strong(3)/Medium(2)/Weak(1) indicates strength of correlation):
Program Outcomes (PO's)/ Program Specific Outcomes (PSO's)
Cos PSO1 PSO2
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO1 3 2 2 2 3 1 0 2 3 3 3 2 1 1
CO2 3 2 2 2 3 1 0 2 3 3 3 2 2 2
CO3 3 2 2 2 3 1 0 2 3 3 3 2 2 3
CO4 3 2 2 2 3 1 0 2 3 3 3 2 2 2
CO5 3 2 2 1 3 2 0 2 3 3 2 1 2 2
Theory
Unit Main Topics Course outlines Hour(s)
1. Understanding Introduction to Management Information Systems, History 06
MIS of MIS, Impact of MIS, Role and Importance, MIS
Categories, Managers and Activities in IS, Types of
Computers Used by Organizations in Setting up MIS,
Hardware support for MIS
Unit-1 2. Conceptual Introduction, The Decision Making Process, System 06
Foundations Approach to Problem Solving, The Structure of
Management Information System, Types of Management
Systems Concepts of Management Organization
3. MIS Planning, Introduction, Differences between planning and control 06
Control and information, Systems Analysis, Systems Design,
Development Development
4. MIS and BPR Introduction, Business Process Re – Engineering, 06
Improving a process in BPR, Object Oriented
methodology, BPR – Current Focus
5. MIS Organization Introduction, MIS at Management levels, Strategic Level 06
Structure Planning, Operational Level Planning, Economic and
Behavior Theories
150
6. MIS – Support Introduction, Philosophy of Modeling, DSS: Deterministic 06
Models Systems, Market Research Methods, Ratio Analysis for
Unit-2 and Knowledge Financial Assessment, Management Science Models
Management
7. Strategic Introduction, Background, Performance, Product 06
Management differentiation and Value Chain, How IT influences
Information Organizations’ goals, The five levels, Governance Modes
System in the use of IT
8. Security, Ethical Introduction, Control Issues in Management Information 06
Issues and Case Systems, Security Hazards, Ethical Issues, Technical
Studies solutions for Privacy Protection and MIS Case Studies
Total=48
Recommended Books:
1. Kenneth C. Laudon : Management Information Systems- Pearson Education
2. Kenneth C. Laudon : Essentials of Management Information System – Pearson Education
151
Title of the course : Distributed Systems
Subject Code : PECS-711F
Weekly load : 3 Hrs LTP 3-0-0
Credit :3
Course Outcomes: At the end of the course, the student will be able to:
CO1 Understand the components of distributed computing, its networks, protocols,
communication and interconnection architecture
CO2 Recognize the inherent difficulties that arise due to distributed-ness of computing resources
CO3 Learn and explore mobile & wireless computing and their applications to real world
problems
CO4 Understand the basics of distributed object & file based system. Also familiarize with the
design, implementation and security issues of distributed system
CO5 To develop a simple distributed system.
Theory
Unit Main Topics Course outlines Lecture(s)
Unit-1 1. Introduction to Definition of distributed systems, their objectives, types, 06
Distributed hardware and software concepts, architecture.
Systems
2. Web Services Introduction to XML, SOAP, Web and Grid services 06
Concepts concepts.
3. Communication Inter process communication, Remote Procedure Call 08
(RPC), Remote Method Invocation (RMI), Remote Object
Invocation, and Message Oriented Communication.
4. Processes Introduction to threads, Threads in distributed and non 06
distributed systems, Client side software, Design issues for
Servers, Software agents.
Unit-2 5. Naming General issues with respect to naming, Name resolution, 06
implementation of a name space, Domain name Systems,
X.500 name space.
152
6. Security Introduction to security in distributed systems, General 08
issues in authentication and access control, Security
management: Key management, secure group
management, authorization management; examples:
Kerberos, x.509 certificates.
7. Distributed Introduction to distributed object based systems, Overview 04
Object-based of CORBA and DCOM and their comparison.
Systems
8. Distributed File Introduction to distributed file system, distributed 04
System and document-based systems, their examples.
Document Based
Systems
Total=48
Recommended Books:
1. Andrew S Tanenbaum, Principles and Paradigms of Distributed Sytsems, Pearson Education.
2. George Coulouris, Distributed Systems, Addison Wesley.
153
Title of the course : Simulation and Modelling
Subject Code : PECS-712A
Weekly load : 3 Hrs LTP 3-0-0
Credit :3
Course Outcomes: At the end of the course, the student will be able to:
CO1 Analyze the system and its behavior so that the physical behavior of a system can
transform into a mathematical model that can in turn transform into an efficient algorithm
for simulation purpose.
CO2 Understand the methodology for modeling& simulation of continuous, discrete and
combined systems using simulation languages.
CO3 Have basic knowledge on simulation software and use it in solving of engineering
problems, analysis and validation of the results.
CO4 Understand how simulation modeling can aid in effective decision-making.
CO5 Knowledge about a system and develop the capability to apply the same to study systems
through available software.
154
5. Design and Experimental layout and validation. Simulation Languages: 08
Evaluation of Continuous and discrete simulation languages, Block-
Simulation Structured continuous simulation languages, expression
Experiments: based languages,
6. Discrete Discrete system simulation languages, simscript, GPSS, 08
simulation SIMULA, Simpack, GASP IV, CSIM, factors in selection of
languages a discrete system simulation languages.
Total=48
Recommended Books:
1. Narsingh Deo, System Simulation with Digital Computer, Prentice-Hall of India.
2. Gordon, System Simulation, Prentice Hall of India.
155
Title of the course : Machine Learning
Subject code : PECS-712 B
Weekly load : 3 Hrs LTP 3-0-0
Credits :3
Course Outcomes: At the end of the course, the student will be able to:
CO1 Understand about machine learning algorithms.
CO2 Learn the concept of how to learn patterns and concepts from data without being explicitly
programmed in various IOT nodes.
CO3 Explore supervised and unsupervised learning paradigms of machine learning.
CO4 Explore Deep learning technique and various feature extraction strategies.
CO5 To mathematically analyze various machine learning approaches and paradigms.
Theory
Unit Main Topics Course Outline Lecture(3)
1. Supervised Learning Basic Methods: Distance-based methods, Nearest- l0
(Regression/Classificat Neighbours,Decision Trees, Naïve Bayes. Linear
ion) models: Linear Regression, Logistic Regression,
Generalized Linear models. support Vector machines,
Nonlinearity and Kernelmethods. Beyond Binary
Classification: multi-class/structured
Outputs,Ranking.
Unit-l 2. Unsupervised Learning Clustering: K-means/KernelK-means. Dimensionality 07
Reduction: PCA and kernelPCA. matrix Factorization
and matrixCompletion. Generative models (mixture
models and latent factormodels).
3. Evaluations of Evaluating machine Learning algorithms and model 07
machine learning selection, Introduction to statistical Learning Theory,
techniques Ensemble methods (Boosting, Bagging, Random
Forests)
156
4. modeling & deep sparse modeling and Estimation, modeling 09
learning sequence/Time-series Data, Deep Learning and
Feature Representation Learning
5. Other machine Learning scalable machine Learning (Online and Distributed 09
Techniques Learning). A selection from some other advanced
topics, e.g., semi-supervised Learning, Active
Unit- Learning, Reinforcement Learning, Inference in
2 Graphical models, Introduction to Bayesian Learning
and Inference
6. Recent Trends in Recent trends in various learning techniques of 06
learning techniques machine learning and classification methods for IOT
applications. Various models for IOT applications.
Total=48
Recommended Books:
1. Kevin murphy, machine Learning: A Probabilistic Perspective, IT Press.
2. Trevor Hastie, Robert Tibshirani, Jerome Friedman, The Elements of statistical
Learning, springer (freely availableonline)
3. Christopher Bishop, Pattern Recognition and machine Learning, springer.
157
Title of the course : Adhoc and Wireless Sensor Networks
Subject Code : PECS-712C
Weekly load : 3 Hrs LTP 3-0-0
Credit :3
Course Outcomes: At the end of the course, the student will be able to:
CO1 To understand the basics of Adhoc networks and sensor based networks.
CO2 To understand the challenges in designing routing and transport protocols for wireless Ad-
hoc/sensor networks.
CO3 To analyzeadhoc& sensor based networks and compute various parameters associated with
it.
CO4 Discuss the challenges in designing MAC.
CO5 Comprehend the various sensor network Platforms, tools and applications.
Theory
Unit Main Topics Course outlines Lecture(s)
Unit-1 1. Introduction Introduction to ad hoc wireless networks: characteristics of 06
MANETs, Application of MANETs, challenges, topology
based routing protocols, positions based routing.
2. Routing Issues in designing a routing and Transport Layer protocol 08
Protocols for Ad hoc networks- proactive routing, reactive routing
(on-demand), hybrid routing- Classification of Transport
Layer solutions-TCP over Ad hoc wireless Networks.
3. Data Data Transmission In Manets: The broadcast storm 06
Transmission multicasting, geo-casting.
4. TCP over Tcp Over Ad Hoc Networks: TCP protocol overview, TCP 06
Ad-hoc and MANETs, solutions for TCP over Ad-Hoc.
Unit-2 5. Wireless Basics of wireless sensors and applications: The Mica 06
Sensor Mote, Sensing and Communication Range, Design Issues,
Networks Energy consumption, clustering of Sensors, Applications.
158
6. Classification Data retrieval in sensor networks: classification of WSNs, 06
and Data MAC layer routing layer, high level application layer
Retrieval support, adapting to the inherent dynamic nature of WSNs.
7. Security 10. SECURITY: security in ad-hoc wireless networks, key 06
management, secure routing cooperation in MANETs,
instruction detection system.
8. Sensor 11. Sensor network platforms and tools: Sensor network 04
Programming hardware, sensor network programming challenges, Node-
Level software Platforms.
Total=48
Recommended Books:
1. C. Siva Ram Murthy, and B. S. Manoj, "Ad Hoc Wireless Networks: Architectures and
Protocols ", Prentice Hall Professional Technical Reference, 2008.
2. Wireless Ad Hoc Mobile wireless Networks- principle, protocols and applications, Subir
Kumar Sarkar , et al.,Auerbach publications, Taylor & Francis Group, 2008
159
Title of the course : Object Oriented Analysis and Design
Subject Code : PECS-712D
Weekly load : 3 Hrs LTP 300
Credit :3
Course Outcomes: At the end of the course, the student will be able to:
CO1 Understand the concept of object-oriented development and create a static object model and
a dynamic behavioural model and a functional model of the system.
CO2 Understand the approaches to system design and object design, and the techniques of
translating design to implementation.
CO3 Implement the object-oriented modelling and design patterns to provide solutions to the
real-world software design problems.
CO4 To develop robust object-based models for Systems
CO5 To inculcate necessary skills to handle complexity in software design
CO1 3 3 3 0 0 0 0 0 2 0 3 3 2 1
CO2 3 3 3 2 2 0 0 0 0 0 2 2 3 1
CO3 3 0 3 1 1 0 0 0 0 0 1 2 3 2
CO4 0 0 0 3 0 2 2 0 1 1 0 1 2 2
CO5 0 0 0 2 2 1 0 0 2 2 1 0 2 3
Theory
160
Methodology and modeling; Adding operations; Iterating the analysis.
Analysis
5. System Design and Subsystems concurrency; Allocating subsystems to 06
Object Design processors and tasks; Management of data stores;
Handling global resources; Handling boundary
conditions; Setting trade-off priorities; Overview of
object design; Combining the three models; Designing
algorithms; Design optimization; Implementation of
control; Adjustment of inheritance; Design of
associations; Object representation; Physical
packaging; Document design decisions.
Total=48
Recommended Books:
1. James E. Rumbaugh, “Object Oriented Modeling and Design”, Pearson Education.
2. Bernd Oestereich, “Developing Software With UML”, Pearson Education.
3. Grady Booch, “Object Oriented Analysis and Design”, Addison Wesley.
4. Pierre-Alain, Muller, “Instant UML”, Shroff Publishers.
5. Grady Booch, James Rumbaugh, Lvar Jacobson, “The Unified Modeling Language User
Guide”, Addison Wesley.
6. Grady Booch, James Rumbaugh, Lvar Jacobson, “The Unified Modeling Language
Reference Manual”, Addison Wesley.
7. Rebecca Wirfs-Brock, “Design Object Oriented Software”, PHI.
8. E. Charnaik, D. McDermott, “Introduction to Artificial Intelligence”, Addison-Wesley
Publishing Company.
9. Nils J. Nilsson, “Principles of Artificial Intelligence”, Narosa Publishing Co.
161
Title of the course : E-Commerce
Subject Code : PECS-712E
Weekly load : 3Hrs LTP 3-0-0
Credit :3
Course Outcomes: At the end of the course, the student will be able to:
CO1 Understand the concept of evolution of E-commerce
CO2 Analyze various E-commerce process models
CO3 Identify current issues and case studies in E-commerce
CO4 Understand the processes of developing and implementing information systems
CO5 Be aware of the ethical, social, and security issues of information systems.
CO/PO Mapping : (Strong(3)/Medium(2)/Weak(1) indicates strength of correlation):
Program Outcomes (PO's)/ Program Specific Outcomes (PSO's)
Cos PO PS01 PSO
PO1 PO2 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
3 2
CO1 3 2 2 2 3 1 0 2 3 3 3 2 1 1
CO2 3 2 2 2 3 1 0 2 3 3 3 2 2 2
CO3 3 2 2 2 3 1 0 2 3 3 3 2 2 3
CO4 3 2 2 2 3 1 0 2 3 3 3 2 2 2
CO5 3 2 2 1 3 2 0 2 3 3 2 1 2 2
Theory
Unit Main Topics Course outlines Hour(s)
1. Introduction to E- Introduction, E-commerce or Electronic Commerce- An 06
commerce Overview, Electronic Commerce– Cutting edge,
Electronic Commerce Framework
2. Evolution of E- Introduction, History of Electronic Commerce, Advantages 06
commerce and Disadvantage of E-commerce, Roadmap of e-
Unit-1 commerce in India
3. E-commerce Introduction, E-commerce Infrastructure-An Overview, 06
Infrastructure Hardware, Server Operating System, Software, Network
Website
4. Managing the e- Introduction, e-Enterprise, Managing the e-Enterprise, E- 06
Enterprise business Enterprise, Comparison between Conventional
Design and E-organization, Organisation of Business in an
e-Enterprise
5. e-Commerce Introduction, Business Models, E-business Models Based 06
Process Models on the Relationship of Transaction Parties, e-commerce
Sales Life Cycle (ESLC) Model
162
6. Electronic Electronic Payment Systems, Electronic Cash, Smart Cards 06
Payment Systems and Electronic Payment Systems, Credit Card Based
Unit-2 Electronic Payment Systems, Risks and Electronic
Payment Systems
7. Electronic Data The Meaning of EDI, History of EDI, EDI Working 06
Interchange Concept, Implementation difficulties of EDI, Financial
EDI, EDI and Internet
8. E-Marketing, The scope of E-Marketing, Internet Marketing 06
Current issues and
Case Studies Techniques, Current issues in E-commerce and Case
studies on E-commerce
Total=48
Recommended Books:
1. Kenneth C. Laudon:E-Commerce: Business, Technology, Society, 4th Edition, Pearson
2. S. J. Joseph, E-Commerce: An Indian perspective, PHI
163
Title of the course : Parallel Computing
Subject Code : PECS-712F
Weekly load : 3 Hrs LTP 3 0 0
Credit :3
Course Outcomes: At the end of the course, the student will be able to:
CO1 Understand the concepts related to parallel computing
CO2 Learn how to measure the performance of parallel computers
CO3 Understand the advanced processor technology and memory hierarchy
CO4 Learn the concepts behind multithreaded architecture and multicore programming
CO5 Analyse the efficiency of a parallel processing system and evaluate the types of
application for which parallel programming is useful.
Theory
Unit Main Topics Course outlines Lecture(s)
Unit-1 1. Parallel The State of Computing, Multiprocessors and 06
Computer Multicomputers, Multivector and SIMD Computers,
Models Architectural Development Tracks.
2. Program and Conditions of Parallelism, Program Partitioning and 06
Network Scheduling, Program Flow Mechanisms, System
Properties Interconnect Architecture.
3. Metrics and Performance Metrics and Measures, Parallel Processing 06
Scalability Applications, Speedup Performance Laws, Scalability
Analysis and Approaches.
4. Advanced Processor Technology, Superscalar and Vector 06
ProcessorHierarc Processors.
hy
Unit-2 5. Memory Memory Hierarchy Technology, Virtual Memory 06
Hierarchy Technology.
6. Bus, Cache, and Bus Systems, Cache Memory Organizations, Shared-
Shared Memory Memory Organizations, Sequential and Weak Consistency
Models, Cache Coherence and Synchronization
164
Mechanisms, Message-Passing Mechanisms.
165
Title of the course : Software Reliability & Testing
Subject Code : OECS-711A
Weekly load : 3 Hrs LTP 3-0-0
Credit :3
Course Outcomes: At the end of the course, the student will be able to:
CO1 Understand the concept of reliability and access the difference between H/W & S/W
reliability and evaluate different S/W engineering technologies
CO2 Understand and anticipate the possible causes of failure and knowledge of how to prevent
them and know about various parameter determination methods
CO3 Analyze and test a S/W system, when it is evolved to accommodate a set of change
requirements such as adding new functionalities, bug fixing etc
CO4 How to test software appropriately and effectively and have hands-on experience with test
generation and test automation.
CO5 Design reliability models for software systems.
Theory
166
6. Project Unobserved Failures, Failure Time Measurement, Evolving 08
Specific Programs, Changes in Environment, Other Consideration.
Techniques
Total=48
Recommended Books:
1. Pressman, Software Engineering concepts, TMH.
167
Title of the course : Human Resource Management
Subject Code : OECS-711B
Weekly load : 3Hrs LTP 3-0-0
Credit :3
Course Outcomes: At the end of the course, the student will be able to:
CO1 Identify scope and importance of human resource management in industry.
CO2 Facilitate and support effective employee and labour relations in both non-union and union
environments.
CO3 Define strategic HR planning and the HRM process to the organization’s strategic management
and decision-making process
CO4 Research and support the development and communication of the organization's total
compensation plan.
CO5 List training and development processes as well as future trends for HRM globalization
Theory
Unit Main Topics Course outlines Hour(s)
1. Introduction Introduction to Human Resource Management and its 06
definition, functions of Human Resource Management &
its relation to other managerial functions. Nature, Scope
and Importance of Human Resource Management in
Industry, Role & position of Personnel function in the
Unit-1 organization.
2. Procurement and Need for Human Resource Planning; Process of Human 06
Placement Resource Planning; Methods of Recruitment;
Psychological tests and interviewing; Meaning and
Importance of Placement and Induction, Employment
Exchanges (Compulsory Notification of vacancies) Act
1959, The Contract Labour (Regulation & Abolition) Act
1970.
3. Training & Difference between training and Development; Principles 06
Development of Training; Employee Development; Promotion-Merit v/s
seniority Performance Appraisal, Career Development &
Planning.
168
4. Job analysis & Job Analysis: Job Description & Job Description, Job 06
Design Specification.
5. Job Satisfaction Job satisfaction and its importance; Motivation, Factors 06
affecting motivation, introduction to Motivation Theory;
Workers ' Participation, Quality of work life.
6. The Compensation Basic concepts in wage administration, company’s wage 06
Function policy, Job Evaluation, Issues in wage administration,
Unit-2 Bonus & Incentives, Payment of Wages Act-1936,
Minimum Wages Act-1961
7. Integration Human Relations and Industrial Relations; Difference 06
between Human Relations and Industrial Relations, Factors
required for good Human Relation Policy in Industry;
Employee Employer relationship Causes and Effects of
Industrial disputes; Employees Grievances & their
Redressal.
8. Maintenance Fringe & retirement terminal benefits, administration of 06
welfare amenities, Meaning and Importance of Employee
Safety, Accidents-Causes & their Prevention, Future
challenges for Human Resource Management.
Total=48
Recommended Books:
1. T.N.Chhabra- Human Resource Management (Dhanpat Rai & Co.)
2. Lowin B. Flippo - Principles of personnel Management (McGraw-Hill)
169
Title of the course : Client Server Architecture
Subject Code : OECS-711C
Weekly load : 3Hrs LTP 3-0-0
Credit :3
Course Outcomes: At the end of the course, the student will be able to:
CO1 Understand distributed computing and client-server architecture
CO2 Analyze the need of distributed computing and remote-method invocation
CO3 Understand Java IDL technology for distributed objects
CO4 Understand fundamental concepts of Web Services
CO5 Analyze the contents the packet contents of different protocols.
Theory
Unit Main Topics Course outlines Lecture(s)
Unit-1 1. Fundamental Client/Server technology an introduction, Classification – 06
of Distributed Mainframe, File sharing, Client/Server,
Systems: Distributed/Collaborative architecture, Distributed
Computing Environment–DCE architecture, Type of
Client/Server Architecture – Two- tier architecture, Three-
tier architecture, Distributed/Collaborative enterprise
architecture.
2. Technologies Complementary Technologies to 3-tier – Object – oriented 06
Design, Database Two Phase Commit Processing, Remote
Procedure Call, Message Oriented Middleware.
3. Distributed Structure – Client/Server Model, Defining distributed 08
Computing Environment, Motivation for Distributed Computing,
Environment: Developing the Distributed Computing Architecture
Remote Framework, Fundamental Technologies & Design
Method Mechanism.
Invocation:
4. Remote Distributed Object Model, RMI System Overview, Client 06
Method interfaces, Registry interfaces, Remote object interface, Stub
Invocation interface, Exception in RMI.
170
Unit-2 5. Distributed The DCOM Architecture, Component & Reuse, Location 06
Component Independence, Language Neutrality, Connection
Object Model Management, Scalability, Performance, Bandwidth &
Latency, Security, Local Balancing, Fault Tolerance, Ease of
Deployment, Protocol Neutrality, Platform Neutrality,
6. Integration Seamless Integration with other Internet Protocols. 04
7. The Common Overview of CORBA, The object request Broker, OMG 08
Object Interface Definition Language, Language Mapping, Interface
Request Repository, Stubs & Skeletons, Dynamic Invocation &
Broker Dispatch, Object Adapters
8. Case study Java IDL (Interface Definition Language). 04
Total=48
Recommended Books:
1. P.M. Heinchieus, Object-oriented Design Architecture and Implementation, Addison
Wesley .
171
Title of the course : Multimedia and Animation
Subject Code : OECS-711D
Weekly load : 3 Hrs LTP 3-0-0
Credit :3
Course Outcomes: At the end of the course, the student will be able to:
CO1 Understand all the basic in the multimedia technologies.
CO2 with all phases like digital images, digital audio & video, compression & standards etc.
CO3 Understand the fundamental principles of animation in addition to an invaluable
appreciation for observational techniques & the art of planning.
CO4 To learn and understand technical aspect of Multimedia Systems.
CO5 To develop multimedia application and analyze the performance of the same
Theory
172
Panel (PDP), file formats , Video for Window, QuickTime
4. Image Image fundamentals and representations 10 Hrs. Colour 06
fundamenta Science , Colour, Colour Models, Colour palettes,
ls and Dithering, 2D Graphics, Image Compression and File
representati Formats :GIF, JPEG, JPEG 2000, PNG, TIFF, EXIF, PS,
ons PDF, Basic Image Processing, Use of image editing
software, White balance correction, Dynamic range
correction, Gamma correction, Photo Retouching.
Unit- 5. Multimedia Overview, multimedia authoring metaphor, multimedia 06
2 presentation production, presentation and automatic authoring, Design
and authoring paradigms and user interface, overview of tools like adobe
premiere, director, flash and Dreamweaver.
6. Animation Introduction and examples of Animation. Types of 06
Animation Cel Animation, Stop Motion Animation,
Computer Animation, 2-D Animation, 3-D Animation.
7. Basic Illusion of Life, straight action and pose to pose Timing, 06
Principles of Exaggeration, Drama and Psychological Effect, Fade in and
Animation Fade out, Squash and Stretch, Anticipation, staging, follow
through and overlapping action, Arcs, Solid Drawing
,Appeal, slow in and slow out, Secondary Action.
8. Various Animation Drawings/Cels, Rough Drawings , Clean ups, 06
Terms Color reference drawings, Layout, Model Sheet, Key
Drawings and in Betweens, Master Background, Concept
Piece, Character drawing , Story Board.
Total=48
Recommended Books:
1.Principles of Multimedia by Ranjan Parekh. Tata McGraw-Hill
2.Multimedia technologies by Ashok banerji
3.Prabhat K. Andleigh and Kiran Thakrar, “Multimedia Systems Design”, PHI publication
4.John F. Koegal Buford, “Multimedia systems”, Pearson Education.
173
Title of the course : Data Mining
Subject Code : OECS-711E
Weekly load : 3 Hrs LTP 3-0-0
Credit :3
Course Outcomes: On successful completion of this course, students will be able to:
CO1 Design a data mart for any organization
CO2 Develop skills to write queries using DMQL
CO3 Extract knowledge using data mining techniques
CO4 Adapt to new data mining tools
CO5 Explore recent trends in data mining such as web mining, spatial-temporal mining
Theory
174
by Back Propagation, k-Nearest Neighbor Classifiers, Genetic
algorithms, Rough Set & Fuzzy Set approaches
6. Cluster Types of data in Clustering Analysis, Categorization of Major 06
Analysis Clustering methods, Hierarchical methods, Density-based
methods, Grid-based methods, Model-based Clustering
methods
7. Mining Multidimensional analysis & Descriptive mining of Complex 06
Complex data objects, Mining Spatial Databases, Mining Multimedia
Types of Data Databases, Mining Time-series & Sequence data, Mining Text
databases, Mining World -Wide Web
8. Data Mining Massive Datasets/Text mining, Agent-Based Mining 06
Applications
and Trends in
Data Mining
Total=48
Recommended Books:
1. Jiawei Han and Micheline Kamber, “Data Mining: Concepts and Techniques”, Morgan
Kaufmann Publishers, 2000 (ISBN: 1-55860-489-8).
2. Ian H. Witten and Eibe Frank, “Data Mining: Practical Machine Learning Tools and
Techniques with Java implementations”, Morgan Kaufmann Publishers, San Fransisco, CA
(2000).
3. Dorian Pyle, “Data Preparation for Data Mining”, Morgan Kaufmann, (1999)
4. Korth, Silbertz, Sudarshan, “Database Concepts”, McGraw Hill
5. Elmasri, Navathe, “Fundamentals Of Database Systems”, Addision Wesley
175
Title of the course : Project Stage I and Seminar
Subject code : PRCS-711
Weekly load : 4 Hrs LTP 0-0-4
Credits :2
Course Outcomes: At the end of the course, the student will be able to:
CO1 Evaluate social impact of technology.
CO2 Evaluate environmental impact of technology.
CO3 design system for real-life applications.
CO4 To understand need of project management.
CO5 To understand project scheduling concept and risk.
CO1 3 3 2 2 2 2 0 0 2 2 2 2 2 2
CO2 3 3 2 2 2 2 0 0 2 2 2 2 2 2
CO3 3 2 2 2 2 2 0 0 1 2 2 3 2 2
CO4 2 2 3 2 2 0 0 0 2 2 3 2 3 2
CO5 3 2 2 3 2 0 0 0 2 0 2 2 3 3
Project Stage I and Seminar Evaluation: In this, the student must select an area from emerging
technologies and specify the objectives to be achieved. Evaluation criteria will be based on
objective stated and achieved.
176
Title of the course : Soft Computing
Subject code : MDCS-711
Weekly load : 4 Hrs LTP 3-1-0
Credits :4
Course Outcomes: At the end of the course, the student will be able to understand:
CO1 Understand fuzzy logic and its applications.
CO2 Acquire knowledge of artificial neural networks and their applications.
CO3 Solve single-objective optimization problems using genetic algorithms.
CO4 Apply soft computing to solve problems in varieties of application domains.
CO5 Introduce students to artificial neural networks and fuzzy theory from an engineering
perspective.
Theory
Unit Main Topics Course outlines Lecture(s)
Unit-1 1. Introduction Concept of computing systems; “Soft” computing versus 02
to Soft “Hard” computing; Characteristics of soft computing; Some
Computing applications of soft computing techniques
2. Fuzzy Logic Introduction to fuzzy logic; Fuzzy sets and membership 10
functions; Operations on fuzzy sets; Fuzzy relations, rules,
propositions, implications and inferences; Defuzzification
techniques; Fuzzy logic controller design; Some applications
of fuzzy logic
3. Genetic Concept of “Genetics” and “Evolution” and its application to 12
Algorithms probabilistic search techniques; Basic GA framework and
(GAs) different GA architectures; GA operators: encoding,
crossover, selection, mutation, etc.; Solving single-objective
optimization problems using GAs
4. Artificial Biological neurons and their working; Simulation of 12
Unit- biological neurons to problem solving; Different ANN
Neural
II architectures; Training techniques for ANNs; Applications of
Networks
ANNs to solve some real-life problems
177
5. Unsupervised Competitive learning networks; Kohonen self-organising 12
Learning networks; Hebbian learning; The Hopfield network
Total=48
Recommended Books:
1. F. Martin McNeill, and Ellen Thro, Fuzzy Logic: A Practical Approach, Morgan
Kaufmann Pub.
2. Timothy J. Ross, Fuzzy Logic with Engineering Applications, Wiley.
3. Nikola K. Kasabov, Foundations of Neural Networks, Fuzzy Systems, and Knowledge
Engineering, MIT Press.
4. Melanie Mitchell, An Introduction to Genetic Algorithms, MIT Press.
5. David E. Goldberg, Genetic Algorithms in Search, Optimization and Machine Learning,
Pearson Education.
6. S. Rajasekaran, and G. A. Vijayalakshmi Pai, Neural Networks, Fuzzy Logic and Genetic
Algorithms: Synthesis, and Applications, Prentice Hall of India.
7. D. K. Pratihar, Soft Computing, Narosa, 2008.
178
Title of the course : Cryptography and Network Security
Subject Code : HDCS-711
Weekly load : 4 Hrs LTP 3-1-0
Credit :4
Course Outcomes: At the end of the course, the student will be able to:
CO1 Know about information security, which includes an overview of public and secret key
Cryptosystems
CO2 Comprehend and apply authentication services and mechanisms
CO3 Identify system vulnerabilities of communication protocols
CO4 Apply the knowledge and skills obtained to study further concepts in information security
CO5 To learn about how to maintain the Confidentiality, Integrity and Availability of a data.
Theory
Unit Main Topics Course outlines Lecture(s)
Unit1 1. Introduction Terminology: Security, Security Attacks, Security Services, 06
Security Mechanisms, OSI Security Architecture, A Model
for Internetwork Security, Internet Standards.
2. Symmetric Symmetric Cipher model, substitution techniques, 06
Ciphers Transposition techniques, Rotor machines, Steganography,
Block Cipher principles,
3. Data Data Encryption standard, Strength of DES, Differential and 05
Encryption Linear Cryptoanalysis, Block Cipher Design principles
4. Advanced Evaluation Criteria for AES, The AES Cipher, Multiple 05
Encryption Encryption, Triple DES, Block Cipher modes of Operation.
Standard
Unit2 5. Key Public Key Cryptography Principles, PublicKey 12
Encryption Cryptography Algorithms, Key Management, DiffieHellman
and Hash Key exchange, Digital Signatures, Digital signature standard,
functions: Authentication protocols, Cryptography and Message
Authentication, Approaches to Message Authentication,
6. Hash Secure Hash Functions and HMAC. 04
Functions
179
7. Network Authentication Applications, Kerberos, X.509 Directory 08
Security Authentication Service, Public Key Infrastructure, Kerberos
Applications Encryption Techniques Electronic Mail Security, Pretty Good
Privacy (PGP), S/MIME, Introduction to Firewalls.
8. Firewalls Introduction to Firewalls, Various types of Firewall 02
Total=48
Recommended Books:
1. William Stallings, Cryptography and Network Security, Principles and practices, PHI.
2. William Stallings, Network Security Essentials ,PHI
180
SEMESTER-VIII
181
Title of the course : Digital Signal Processing
Subject Code : PECS-721A
Weekly load : 3 Hrs LTP 3-0-0
Credit :3
Course Outcomes: At the end of the course, the student will be able to:
CO1 To understand the basics of discrete time signals, systems and their classifications.
CO2 To analyze the discrete time signals in both time and frequency domain.
CO3 To design lowpass digital IIR filters according to predefined specifications based on
analog filter theory and analog-to-digital filter transformation.
CO4 To design Linear phase digital FIR filters using fourier method, window technique
CO5 To Understanding of spectral analysis of the signals
CO/PO Mapping : (Strong(3)/Medium(2)/Weak(1) indicates strength of correlation):
Program Outcomes (PO's)/ Program Specific Outcomes (PSO's)
COS
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2
CO1 2 3 1 1 0 0 0 0 0 0 0 2 2 3
CO2 3 3 3 2 2 0 0 0 0 0 0 3 2 1
CO3 3 3 3 3 2 0 0 0 1 0 0 3 1 1
CO4 3 3 3 3 3 1 1 0 1 0 0 3 1 1
CO5 2 1 3 2 0 0 1 2 0 0 1 2 1 2
Unit 5. Filter Design Design of Discrete-Time IIR filters from Continuous-Time filters 06
-2 Techniques Approximation by derivatives, Impulse invariance and Bilinear
Transformation methods; Design of FIR filters by windowing
techniques.
6. Finite Impulse Linear Phase FIR filter–Phase delay–Group delay–Realization of 06
Response FIR filter–Design of Causal and Non-causal FIR filters (LPF,
Filters HPF, BPF and BRF) using Window method (Rectangular,
Hamming window, Hanning window) –Frequency Sampling
Technique.
7. Applications Multirate Signal Processing: Decimation, Interpolation, Spectrum 06
Of DSP of the sampled signal –Processing of Audio and Radar signal.
8. Architecture of Hardwired architecture, pipelining, Multiplier-accumulator 06
DSP (MAC) hardware, architectures of fixed and floating point
Processors & (TMSC6000) DSP processors. Applications
applications
Total=48
Recommended Books:
1. “Digital Signal Processing: Principles, Algorithm & Application”, 4th edition, Proakis,
Manolakis, Pearson
2. “Discrete Time Signal Processing”:Oppeheim, Schafer, Buck Pearson education publication,
2nd Edition, 2003.
3. Digital Signal Processing fundamentals and Applications,Li Tan , Jean Jiang, Academic
Press,2nd edition,2013
4. Digital Signal Processing – A computer based Approach, S.K.Mitra, Tata McGraw Hill,3rd
edition,2006 5. Fundamentals of digital Signal Processing –Lonnie c.Ludeman, Wiley
183
Title of the course : Neural Networks and Deep Learning
Subject code : PECS-721 B
Weekly load : 3 Hrs LTP 3-0-0
Credits :3
Course Outcomes: At the end of the course, the student will be able to:
CO1 Identify the deep learning algorithms which are more appropriate for various types of
learning tasks in various domains.
CO2 Implement deep learning algorithms and solve real-world problems.
CO3 Implement, train and evaluate neural network using existing software libraries.
CO4 Explain different network architecture and how these are used in current applications.
CO5 Present and critically assess current research on neural network and their applications.
CO1 3 3 3 0 0 0 0 0 2 0 3 3 3 3
CO2 3 3 3 2 2 0 0 0 0 0 2 2 3 3
CO3 3 3 3 0 0 0 0 0 2 0 3 3 2 1
CO4 3 3 3 2 2 0 0 0 0 0 2 2 3 2
CO5 3 1 2 0 0 0 1 2 3 0 2 2 1 1
Theory
184
5. Deep Deep Feed Forward network, regularizations, training deep 8
Learning models, dropouts, Convolutional Neural Network, Recurrent
Neural Network, Deep Belief Network.
6. Probabilistic Hopfield Net, Boltzman machine, RBMs, Sigmoid net,
Neural Autoencoders 6
Network
7. Deep Object recognition, sparse coding, computer vision, natural 6
Learning language processing
research
8. Deep Caffe, Theano, Torch 4
Learning
Tools
Total=48
Recommended Books:
1. Yegnananrayana, B., Artificial Neural Networks PHI Learning Pvt. Ltd, 2009.
2. Golub, G.,H., and Van Loan, C.,F., Matrix Computations, JHU Press, 2013.
3. Satish Kumar, Neural Networks: A Classroom Approach, Tata McGraw-Hill Education, 2004.
185
Title of the course : Client Server Architecture
Subject Code : PECS-721C
Weekly load : 3 Hrs LTP 3-0-0
Credit :3
Course Outcomes: At the end of the course, the student will be able to:
Theory
Unit Main Topics Course outlines Lecture(s)
Unit-1 1. Fundamental Client/Server technology an introduction, Classification – 06
of Distributed Mainframe, File sharing, Client/Server,
Systems: Distributed/Collaborative architecture, Distributed
Computing Environment–DCE architecture, Type of
Client/Server Architecture – Two- tier architecture, Three-
tier architecture, Distributed/Collaborative enterprise
architecture.
2. Technologies Complementary Technologies to 3-tier – Object – oriented 06
Design, Database Two Phase Commit Processing, Remote
Procedure Call, Message Oriented Middleware.
186
3. Distributed Structure – Client/Server Model, Defining distributed 08
Computing Environment, Motivation for Distributed Computing,
Environment: Developing the Distributed Computing Architecture
Remote Framework, Fundamental Technologies & Design
Method Mechanism.
Invocation:
4. Remote Distributed Object Model, RMI System Overview, Client 06
Method interfaces, Registry interfaces, Remote object interface, Stub
Invocation interface, Exception in RMI.
Unit-2 5. Distributed The DCOM Architecture, Component & Reuse, Location 06
Component Independence, Language Neutrality, Connection
Object ModelManagement, Scalability, Performance, Bandwidth &
Latency, Security, Local Balancing, Fault Tolerance, Ease of
Deployment, Protocol Neutrality, Platform Neutrality,
6. Integration Seamless Integration with other Internet Protocols. 04
7. The Common Overview of CORBA, The object request Broker, OMG 08
Object Interface Definition Language, Language Mapping, Interface
Request Repository, Stubs & Skeletons, Dynamic Invocation &
Broker Dispatch, Object Adapters
8. Case study Java IDL (Interface Definition Language). 04
Total=48
Recommended Books:
1. P.M. Heinchieus, Object-oriented Design Architecture and Implementation, Addison
Wesley.
2. Alex Berson, Client/Server Architecture, McGraw-Hill Computer Communications
Series
3. Patrick Smith, Steve Guengerich, Client/Server Computing, PHI
187
Title of the course : Software Reliability & Testing
Subject Code : PECS-721D
Weekly load : 3 Hrs LTP 3-0-0
Credit :3
Course Outcomes: At the end of the course, the student will be able to:
CO1 Understand the concept of reliability and access the difference between H/W & S/W
reliability and evaluate different S/W engineering technologies
CO2 Understand and anticipate the possible causes of failure and knowledge of how to prevent
them and know about various parameter determination methods
CO3 Analyze and test a S/W system, when it is evolved to accommodate a set of change
requirements such as adding new functionalities, bug fixing etc
CO4 Understand different time dependent and time independent software reliability models.
CO5 Design reliability models for software systems.
Theory
188
6. Project Unobserved Failures, Failure Time Measurement, Evolving 08
Specific Programs, Changes in Environment, Other Consideration.
Techniques
Total=48
Recommended Books:
1. Pressman, Software Engineering concepts, TMH.
189
Title of the course : Business Management System
Subject Code : PECS-721E
Weekly load : 3Hrs LTP 3-0-0
Credit :3
Course Outcomes: At the end of the course, the student will be able to:
CO1 Understand the concepts related to Business.
CO2 Recognize the various roles of managers and types of business management
CO3 Understand methods to plan, incorporate innovation and build strategies for global management
CO4 Identify the fundamentals of managing and organizing environments
CO5 Understand the complexities associated with management of human resources in the
organizations and integrate the learning in handling these complexities.
CO/PO Mapping : (Strong(S)/Medium(M)/Weak(W) indicates strength of correlation):
Program Outcomes (PO's)/ Program Specific Outcomes (PSO's)
COS PS01 PSO2
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO1 2 3 3 0 3 0 0 2 0 3 3 2 1 2
CO2 2 3 3 0 3 1 1 2 3 3 3 2 1 3
CO3 2 3 3 2 3 1 0 2 3 3 3 2 1 2
CO4 1 1 2 2 0 0 1 2 1 2 2 0 2 3
CO5 2 1 3 2 1 1 0 0 1 2 1 2 3 1
Theory
Unit Main Topics Course outlines Hour(s)
1. Introduction to Introduction, Management roles, Management functions, 06
Business Managerial levels, Managerial types, Managerial
management knowledge, Managerial abilities and skills
system
2. The Planning Value of planning cycle, Mission and Vision Statements, 06
Unit-1 Function Assessing the environment, Operational and Short term
plans, SWOT Analysis, Determining organization goals
3. The Organizing Job design, Departmentalization, Managerial concerns, 06
Function completing the organization structure, structural
configuration, Organization goals in structure design
4. The Staffing Nature of Staffing, Legal aspects of staffing, Strategic 06
Function human resource management, Job design and human
resource planning, Employee placement, Employee
development and Employee environment
5. The Leading Leading vs Managing, Leadership theories, Leadership and 06
Function Power, Leadership and Motivation, Process theories of
Motivation, Content theories of Motivation
190
6. Group, Teams and Types of Groups and Teams, Stages of team development, 06
Communication Leading and Effective Teamwork, Leading and individual
Unit-2 communication, Overcoming interpersonal communication
barriers
7. The controlling Constant controls, Periodic controls, Functional area 06
Function controls, Accounting and Financial controls, Ratio
Analysis, Ratio Budgeting Process
8. Case studies and Future Directions in business management system and 06
Future trends
related Case Studies
Total=48
Recommended Books:
1. Donald Baack,The five function of Effective Management, 2th Edition, Bridgepoint
Education.
2. R.C. Bhatia, Business Organization and Management, Atlantic Publishers.
191
Title of the course : Cloud Computing
Subject Code : PECS-721F
Weekly load :3 LTP 300
Credit :3
Course Outcomes: At the end of the course, the student will be able to:
CO1 To create a brief understanding of cloud computing and other related technologies
(Grid/cluster etc.).
CO2 To understand cloud service models, deployment models and service inception through
virtualization in cloud.
CO3 To understand various security issues in cloud as well as an overview of the basic
architectures of cloud computing.
CO4 To understand the basic architecture of cloud computing
CO5 To understand the advanced cloud architecture
CO3 3 2 2 1 3 0 0 0 0 3 0 2 3
CO4 3 2 2 3 3 1 2 0 3 0 0 3 3
CO5 3 3 3 3 3 2 1 1 2 2 0 2 1
Theory
Unit Main Topics Course outlines Lecture(s)
Unit-1 1. Understanding Background of cloud computing, enabling technologies and 08
Cloud technology innovations, introduction to cloud computing
Computing including benefits, challengers and risks. Reference
Architecture: cloud consumer, cloud service provider, cloud
broker, cloud Auditor, cloud carrier. Boundaries of cloud
computing.
2. Service Cloud Characteristics, Cloud service model, cloud 08
deployment deployment models. Virtualization concepts: types of
Models and virtualization, benefits of virtualization, introduction to
various virtualization operating systems.
Virtualization
3. Cloud Security Security concepts: Confidentiality, privacy, integrity, 08
authenticity, availability, access control, non-repudiation,
192
Threat, Vulnerability, Risk, Security Controls, Virtualization
Attack: Guest hopping, attacks on the VM, VM migration
attack. Legal and compliance issues: responsibility,
ownership of data, right to penetration test, compliance for
cloud provider vs. compliance for the customer.
Unit-2 4. Cloud Fundamental Cloud Architectures: Architecture of 08
Computing Workload Distribution, Resource Pooling, Dynamic
Architecture Scalability, Capacity, Service Load Balancing.
5. Advance cloud Hypervisor Clustering, Load Balanced Virtual Server 08
computing Instances, Zero Downtime, Cloud Balancing, Resource
architecture Reservation, Dynamic Failure Detection and Recovery,
Storage Workload Management
6. Case study Public cloud environment: Understanding and exploring 08
Amazon web services, managing and creating EC2
instances.
Total=48
Recommended Books:
193
Title of the course : Python Programming
Subject Code : PECS-722A
Weekly load : 3 Hrs LTP 3-0-0
Credit :3
Course Outcomes: At the end of the course, the student will be able to:
CO1 Understand why Python is a useful scripting language for developers.
CO2 Learn how to design and program Python applications.
CO3 Learn how to use lists, tuples, and dictionaries in Python programs.
CO4 Learn how to design object‐oriented programs with Python classes.
CO5 Learn how to use exception handling in Python applications for error handling.
Theory
Unit Main Topics Course outlines Lecture(s)
Unit 1. Fundamental Concept of an algorithm, program, programming languages, need 09
-1 concepts of of programming, scenario, development of code from an algorithm,
the concept, need and use of pseudo code, variables, datatypes,
programming operators, implicit/explicit type conversion, functions in programs.
2. Control Selection and iteration control statements: if, else, nested if else, for 09
statements while and nested loops; break, continue, pass
3. Testing and Unit testing (path coverage and boundary value analysis), 05
debugging introduction of debugging, introduction of Eclipse: basic, tip to
handle infinite loop
Unit 4. Collections Introduction to collections, list, array, tuple, string, set, dictionary, 09
-2 basic operations and built-in method/function of: list, array, tuple,
string, set, dictionary
5. Function Definition of function, arguments, argument behavior, types of 09
argument, variables and its scope, function calling, types of
function, recursive function, revisiting function
6. Exception Introduction and need of Exception handling in code 02
handling
7. Modules and Introduction to modules, package, libraries, introduction to math, 05
libraries random, combination, itertools, Numpy library
Total=48
194
Recommended Books:
1. Mark Lutz, Learning Python, O’Reilly.
2. David Beazley and Brian K. Jones, Python Cookbook, O’Reilly.
3. David Beazley, Python Essential Reference, Developer’s Library.
4. John V. Guttag, Introduction to Computation and Programming Using Python, The MIT
Press.
195
Title of the course : Computer Vision
Subject code : PECS-722 B
Weekly load : 3 Hrs LTP 3-0-0
Credits :3
Course Outcomes: At the end of the course, the student will be able to:
CO1 Identify basic concepts, terminology, theories, models and methods in the field of computer
vision,
CO2 Describe known principles of human visual system
CO3 Understand and implement Image representation and modeling
CO4 Describe basic methods of computer vision related to multi-scale representation, edge detection
and detection of other primitives, stereo, motion and object recognition,
CO5 Design of face detection and recognition algorithms
CO2 3 2 3 1 2 0 0 0 3 3 0 3 2 2
CO3 2 2 2 0 1 2 2 3 1 2 1 2 1 3
CO4 1 2 2 2 0 1 3 0 0 1 2 3 2 1
CO5 2 1 2 3 0 2 3 1 2 0 0 2 1 1
Theory
Unit Main Topics Course outlines Lecture(s)
Unit-1 1. Digital Image Overview and State-of-the-art, Fundamentals of Image 6
Formation and Formation, Transformation: Orthogonal, Euclidean, Affine,
low level Projective, etc; Fourier Transform, Convolution and Filtering,
processing Image Enhancement, Restoration Histogram Processing
196
4. Image Region Growing, Edge Based approaches to segmentation, 6
Segmentation Graph-Cut, Mean-Shift, MRFs, Texture Segmentation; Object
detection.
5. Pattern Clustering: K-Means, K-Medoids, Mixture of Gaussians, 8
Analysis Classification: Discriminant Function, Supervised, Un-
supervised, Semi-supervised; Classifiers: Bayes, KNN, ANN
models; Dimensionality Reduction: PCA, LDA, ICA; Non-
parametric methods
6. Motion Background Subtraction and Modeling, Optical Flow, KLT,
Analysis Spatio-Temporal Analysis, Dynamic Stereo; Motion 8
parameter estimation.
7. Shape from X Light at Surfaces; Phong Model; Reflectance Map; Albedo 6
estimation; Photometric Stereo; Use of Surface Smoothness
Constraint; Shape from Texture, color, motion and edges
Total=48
Recommended Books:
197
Title of the course : High Speed Communication Network
Subject Code : PECS-722C
Weekly load : 3 Hrs LTP 3-0-0
Credit :3
Course Outcomes: At the end of the course, the student will be able to:
CO1 Understand the latest high speed communication technologies.
CO2 Analyse the need of Fibre, ISDN and B-ISDN.
CO3 Analyse and Set up protocol designing issues for Communication networks.
CO4 Apply various network layer techniques for designing subnets and supernets and analyse packet
CO5 flow on basistheofrouting
Understand routingalgorithm
protocols.for high speed networks.
Theory
198
4. Frame Relay High Speed WAN 06
Protocol architecture, frame format, routing, congestion
control.
199
Title of the course : Software Quality Assurance
Subject Code : PECS 722D
Weekly load : 3 Hrs LTP 300
Credit :3
Course Outcomes: At the end of the course, the student will be able to:
CO1 3 3 3 0 0 0 1 2 2 0 3 3 1 2
CO2 3 3 3 2 2 0 2 1 0 0 2 2 1 2
CO3 2 1 0 1 2 3 2 1 0 2 3 1 2 1
CO4 1 0 3 1 1 0 0 0 0 0 1 2 1 1
CO5 2 0 1 0 0 0 0 0 0 0 3 1 2 3
Theory
Unit Main Topics Course outlines Lecture(s)
Unit-1 1. Introduction Introduction of Software Engineering - Evolution of 12
to software Software Engineering, Goals of software engineering,
engineering & Software Development vs. Software Engineering. Software
principles Process - Software Process, Models Waterfall, Spiral,
Prototyping, Software Requirements Analysis - Analysis
Principles, SRS, Components of SRS.
200
quality of Project Management, Software Project Planning
and its characteristics, Types of metrics, Effort Estimation-
FP, LOC, FP vs. LOC, Schedule & Cost Estimation
ModelsActivity Networks- PERT/CPM, COCOMO-I,
COCOMO-II Model.
Total=48
Recommended Books:
1. Kshirasagar Naik and PriyadarshiTripathy, ‘Software Testing and Quality Assurance: Theory
and Practice’, 1st Edn., Wiley, 2008.
2. Jeff Tian, ‘Software Quality Engineering: Testing, Quality Assurance, and Quantifiable,
Improvement’, 1st Edn., Wiley, 2005.
3. Roger S. Pressman,
SoftwareEngineering, A Practitioner’sApproach, McGrawHill International Edition.
201
Title of the course : Human Resource Management
Subject Code : PECS-722E
Weekly load : 3Hrs LTP 3-0-0
Credit :3
Course Outcomes: At the end of the course, the student will be able to:
CO1 Identify scope and importance of human resource management in industry.
CO2 Facilitate and support effective employee and labour relations in both non-union and union environments.
CO3 Define strategic HR planning and the HRM process to the organization’s strategic management and
decision-making process
CO4 Research and support the development and communication of the organization's total compensation plan.
CO5 List training and development processes as well as future trends for HRM globalization
Theory
Unit Main Topics Course outlines Hour(s)
1. Introduction Introduction to Human Resource Management and its 06
definition, functions of Human Resource Management &
its relation to other managerial functions. Nature, Scope
and Importance of Human Resource Management in
Industry, Role & position of Personnel function in the
Unit-1 organization.
2. Procurement and Need for Human Resource Planning; Process of Human 06
Placement Resource Planning; Methods of Recruitment;
Psychological tests and interviewing; Meaning and
Importance of Placement and Induction, Employment
Exchanges (Compulsory Notification of vacancies) Act
1959, The Contract Labour (Regulation & Abolition) Act
1970.
3. Training & Difference between training and Development; Principles 06
Development of Training; Employee Development; Promotion-Merit v/s
seniority Performance Appraisal, Career Development &
Planning.
4. Job analysis & Job Analysis: Job Description & Job Description, Job 06
Design Specification.
202
5. Job Satisfaction Job satisfaction and its importance; Motivation, Factors 06
affecting motivation, introduction to Motivation Theory;
Workers ' Participation, Quality of work life.
6. The Compensation Basic concepts in wage administration, company’s wage 06
Function policy, Job Evaluation, Issues in wage administration,
Unit-2 Bonus & Incentives, Payment of Wages Act-1936,
Minimum Wages Act-1961
7. Integration Human Relations and Industrial Relations; Difference 06
between Human Relations and Industrial Relations, Factors
required for good Human Relation Policy in Industry;
Employee Employer relationship Causes and Effects of
Industrial disputes; Employees Grievances & their
Redressal.
8. Maintenance Fringe & retirement terminal benefits, administration of 06
welfare amenities, Meaning and Importance of Employee
Safety, Accidents-Causes & their Prevention, Future
challenges for Human Resource Management.
Total=48
Recommended Books:
1. T.N.Chhabra- Human Resource Management (Dhanpat Rai & Co.)
2. Lowin B. Flippo - Principles of personnel Management (McGraw-Hill)
203
Title of the course : Embedded Systems
Subject Code : PECS-722F
Weekly load : 3 Hrs LTP 3-0-0
Credit :3
Course Outcomes: At the end of the course, the student will be able to:
CO1 Identify embedded hardware
CO2 Describe the differences between the general computing system and the embedded system,
also recognize the classification of embedded systems..
CO3 Understand microprocessor architecture, interrupts and interface
CO4 Understand software development and tools for embedded systems
CO5 Understand use of RTOS in designing of embedded systems
Theory
Unit Main Topics Course outlines Lecture(s)
Unit-1 1. Introduction Terminology, Gates, Timing Diagram, Memory, 06
Review of Microprocessor Buses, Direct Memory Access, Interrupts,
Embedded Built instructions on the Microprocessor.
Hardware
2. Interrupts Conventions used on Schematic, Interrupts, Microprocessor 05
Architecture, Interrupt Basic, Shared Data Problem, Interrupt
Latency.
3. PIC Micro Introduction, CPU Architecture, Registers, Instruction Sets, 08
controller Addressing Modes, Programs, Interfacing Methods, Parallel
I/O Interface, Parallel Port Interface,
4. Interfacing Memory Interfacing, High Speed I/O Interfacing, Interrupts – 08
Interrupt Service Routine – features of Interrupts – Interrupt
vector & Priority, Timing Generation & Measurements, Input
Capture, Output Compare, Frequency Measurement, Serial
I/O Device RS232, RS845, Analog Interfacing, Applications.
Unit-2 5. Software Embedded System Evolution Trends, Round – Robin, Robin 08
Development with Interrupts, Function Scheduling architecture, Algorithms,
& Tools Introduction to assembler, Compiler and Cross compilers and
204
Integrated Development Environment IDE,
6. Concepts of Object Oriented Interfacing, Recursion, Debugging Strategies, 05
OOI and and Simulators.
Simulator
7. Real Time Task And Task States, Tasks and Data, Semaphores and 08
Operating shared data, operating system services, Message queues,
Systems Timer Function, Events, Memory Management, Interrupt
Routines in an RTOS Environment, Basic Design Using
RTOS.
Total=48
Recommended Books:
1. D.D. Gajski, F. Vahid, J. Gong, S. Narayan, Specification and Design of embedded
Systems, Prentice Hall.
2. Steve Heath, Newnes, Embedded Systems Design.
205
Title of the course : Project Stage II
Subject code : PRCS-721
Weekly load : 12 Hrs LTP 0-0-12
Credits :6
Course Outcomes: At the end of the course, the student will be able to:
CO1 Demonstrate a sound technical knowledge of their selected project topic.
CO2 Undertake problem identification, formulation and solution.
CO3 Design engineering solutions to complex problems utilizing a system approach.
CO4 Communicate with engineers and the community at large in written and oral forms.
CO5 Demonstrate the knowledge, skills and attitudes of a professional engineer.
Project stage II Evaluation: In this, the student must select an area from emerging technologies
and specify the objectives to be achieved. Evaluation criteria will be based on objectives stated
and achieved.
206
Title of the course : Project Hon’s
Subject code : PHCS-721
Weekly load : 8 Hrs LTP 0-0-8
Credits :4
Course Outcomes: At the end of the course, the student will be able to:
CO1 Demonstrate a sound technical knowledge of their selected project topic.
CO2 Undertake problem identification, formulation and solution.
CO3 Design engineering solutions to complex problems utilizing a system approach.
CO4 Communicate with engineers and the community at large in written and oral forms.
CO5 Demonstrate the knowledge, skills and attitudes of a professional engineer.
ProjectHon’s Evaluation: In this, the student must select an area from emerging technologies and
specify the objectives to be achieved. Evaluation criteria will be based on objectives stated and
achieved.
207