20XW11 CALCULUS AND ITS APPLICATIONS

3 2 0 4

LIMITS AND CONTINUITY: Standard functions –Graphs- Limit- continuity- piecewise continuity- periodic- differentiable functions - Riemann sum- integrable functions- fundamental theorem of calculus. (4+4)

SEQUENCES & SERIES: Sequences – increasing- decreasing- bounded- function limit properties - Series – convergence and divergence – alternating series test- absolute convergence – ratio test- power series- Taylor series (single variable). (8+6)

FUNCTIONS OF TWO VARIABLES: Models- partial derivative and its geometrical interpretation- Stationary points – maxima and minima- saddle points- Taylor series- Constrained maxima and minima – Lagrange multiplier method. (6+4)

MULTIPLE INTEGRALS: Evaluation of multiple integrals – Cartesian and polar forms- Change of order of integration - Applications of multiple integrals to find area and volume. (9+6)

ORDINARY DIFFERENTIAL EQUATIONS: Linear Differential Equations of first order - Exact differential equations- Integrating factors- Bernoulli equations -Linear Differential Equations of higher order with constant coefficients -Euler's equation with variable coefficients - Simultaneous equations - Method of variation of parameters. Modeling simple systems. (12+8)

VECTOR CALCULUS: Vector differentiation-gradient- divergence- curl- vector integration- Greens theorem- Stokes theorem- Gauss divergence theorem (Concepts only). (6+2)

Total L:45+T:30=75

TEXT BOOKS:
1. Thomas G B Jr., Maurice D Wier, Joel Hass, Frank R. Giordano, “Thomas’ Calculus”, Pearson Education, 2018.
2. Erwin Kreyszig, “Advanced Engineering Mathematics”, John Wiley, 2014.

REFERENCES:
1. Ben Orlin, “Change Is the Only Constant: The Wisdom of Calculus in a Madcap World”, Black Dog & Leventhal, 2019.
2. Ray Wyile C and Raymond Wyile C, “Advanced Engineering Mathematics”, McGraw Hill, 2013.
3. Ken F. Riley, Mike P. Hobson, Stephen J. Bence, “Mathematical Methods for Physics and Engineering”, Cambridge University Press, 2018.
4. Deborah Hughes-Hallett, Patti Frazer Lock, Andrew M. Gleason,”Applied Calculus”,Wiley, 2017.
5. Judith A. Beecher, Judith A. Penna, Marvin L. Bittinger, “College Algebra”, Pearson, 2016.

20XW12 ENGLISH FOR PROFESSIONAL SKILLS

3 0 0 3

Prerequisites:

  • Higher Secondary level proficiency in English language
  • COMMUNICATION SKILLS USING SCIENTIFIC TEXTS: Comprehension and critical evaluation of Scientific Essays – Focus on Language Style, Word Formation, Use of Prefixes and Suffixes, Synonyms, Antonyms, Abbreviations and Acronyms and Technical Vocabulary.(6)

    FOCUS ON GRAMMAR: Identifying Common Errors In Articles And Prepositions, Common Errors-Misplaced Modifiers-Tenses-Redundancies And Clichés-Practice Exercises In Common Errors. (6)

    READING: Reading and Importance-Techniques Of Effective Reading-Improving Comprehension Skills-Techniques For Good Comprehension-Skimming And Scanning-Comprehension-Intensive And Extensive Reading-Practice In Reading Comprehension.(4)

    WRITING: Formal Letters-Letter of Complaint, Requisition Letter- Job Application and Resume- Report Writing- Types Of Reports- Business And Technical Reports.(6)

    FOCUS ON SOFT SKILLS: Intra & Interpersonal Communication-Interview Techniques-Etiquette-Body Language-Telephone Conversation. (8)

    PRACTICALS: Presentations-Group Discussions-Listening Exercises-Mock Interviews. (15)

    Total L: 45

    TEXT BOOKS:
    1. N.P.Sudharshana, C. Savitha “English for Engineers”, Cambridge University Press, 2018.

    REFERENCES:
    1. Dhanavel, S.P, “English and Soft Skills”, Orient BlackSwan, Hyderabad, 2010.
    2. Lina Muhkopadhyay, et al., “English for Jobseekers”, Cambridge University Press, New Delhi, 2013.

    20XW13 APPLIED PHYSICS

    4 0 0 4

    Prerequisites:

  • Higher Secondary Physics
  • MECHANICS:Displacement. First, second and third order time-derivatives of displacement. Concept of generalised coordinates. Inertial mass, moment of inertia, force, torque. Equilibrium and principle of virtual work. 2D Motion in a gravitational field. Conservative and non-conservative force-fields. Conservation of momentum. Elastic and inelastic collisions. Energy loss and deformation in inelastic collisions. Energy absorbed in material fracture. Applications to packaging, protection and inspection of equipment. (12)

    MECHANICAL OSCILLATIONS:Hooke’s law. Characteristics of a spring and damper. Differential equation of a spring, mass and damper system and its solution. Natural frequency. Forced oscillations. Frequency response of the system and resonance. Damping and energy dissipation. Application to vibration control and shock absorbers. Considerations for mechanical isolation of equipment. Magneto-rheological fluids and application to adaptive dampers. (12)

    HEAT AND THERMAL CONTROL:Temperature, specific heat-capacity. Temperature and temperature gradient in heat flow. Temperature gradient due to internal and external heat sources. Thermal conductivity. Differential equation of one and two dimensional heat conduction. Boundary conditions and solutions. Thermal insulation. Principles of convective and radiative heat transfer. Heat sinks and heat pipes for heat removal from equipment. Forced air convection. (12)

    HYGROMETRY:Air and water-vapour mixtures. Saturation and condensation of moisture from air and its relation to temperature. Dew point. Moisture condensation in electronic equipment and its hazards. Relative humidity. Measurement of relative humidity by dry and wet bulb methods. Humidity sensors and software support for hygrometry. Need for humidity control in installations and equipment. Methods to control humidity. Humidifiers, driers and dessicators. (12)

    OPTICS:Light propagation through non-homogeneous refractive media. Fermat’s principle and determination of optical path. Application to light propagation through optical fibres. Numerical aperture. Step-index and graded-index fibres, single mode and multi-mode fibres. Multiplexing and modulation. Bandwidth advantage. Digital optical communication principles. Pulse-broadening in digital communication by optical fibres. Signal degradation due to attenuation and dispersion. Advantages of optical communication. (12)

    Total L:60

    TEXT BOOKS:
    1. Halliday, David, Robert Resnick, and Jearl Walker, “Fundamentals of Physics”, John Wiley & Sons, 2010
    2. Richard. Wolfson, ”Essential University Physics with Mastering Physics”, Pearson Education Limited, 2015
    3. Young, Hugh D., Roger A. Freedman, “University Physics with Modern Physics”, Pearson Education, 2017.

    REFERENCES:
    1. H C Verma, “Concepts of Physics : Vol 1 and Vol 2”, BhartiBhawan Publishers, 2015.
    2. BrijLal, M N Avadhanulu & N Subrahmanyam, “A Text Book of Optics”, S Chand Publishing, 2012.

    20XW14 ANALOG AND DIGITAL ELECTRONICS

    4 0 0 4

    Prerequisites:

  • Basics of Physics and Mathematics at higher secondary level
  • SEMICONDUCTOR DEVICES AND CIRCUITS:(Qualitative treatment only) Fundamental aspects of semiconductors - PN junction diode -Zener diode - Rectifiers - Zener voltage regulators - Filters - Bipolar Junction Transistors - Transistor Amplifiers - Field Effect Transistor.(7)

    NUMBER SYSTEM AND CODES:Binary - Octal - Hexadecimal - BCD - excess three - Gray codes - Error correcting and detecting codes.(7)

    DIGITAL CIRCUITS AND GATES:AND, OR, NOT, NAND and NOR gates - exclusive OR gates. Positive and negative logic systems - Digital integrated circuits-Characteristics -TTL and MOS logic circuits - Comparison.(6)

    BOOLEAN ALGEBRA AND KARNAUGH MAPS:Boolean relations - Laws and theorems - Simplifications - Karnaugh maps and simplifications - Don’t care conditions - NAND-NAND realizations.(7)

    COMBINATIONAL LOGIC:Design and Implementation of Half and Full adders - Subtractors - Parallel adders - Carry look ahead addition - Encoders and decoders - Multiplexers and De-multiplexers.(8)

    SEQUENTIAL LOGIC: R-S, J-K, D and T type Flip-Flops - Binary counters: Ripple and synchronous types - UP/DOWN counters - Decade counters - Shift registers - Ring counters.(7)

    OPERATIONAL AMPLIFIERS:Definition of terms - Inverting and non-inverting amplifiers, inverting summing amplifier, integrators and differentiators.(9)

    A/D AND D/A CONVERTORS:DACs: weighted and binary ladder types - ADCs: counter, dual slope, successive approximation types.(9)

    Total L: 60

    TEXT BOOKS:
    1. Donald P Leach, Albert Paul Malvino and Goutamsaha, “Digital Principles & Applications”, Tata McGraw Hill, 2011.
    2. Allen Mottershead, “Electronic devices and circuits – An Introduction”, Prentice Hall, 2009.

    REFERENCES:
    1. Gothmann H, “Digital Electronics: An Introduction to Theory and Practice”, Prentice Hall, 2001.
    2. ErwinPaul Horowitz and Winfield Hill, “The Art of Electronics”, Cambridge University Press, 2015.
    3. Hamacher C V, Vranesic Z G and Zaky S G, “Computer Organization”, McGraw Hill, 2011.

    20XW15 PROBLEM SOLVING AND C PROGRAMMING

    4 0 0 4

    Prerequisites:

  • Basic knowledge on problem solving
  • PROBLEM SOLVING: Introduction to Problem Solving- Program development- Analyzing and Defining the Problem- Algorithm-Flow Chart - Programming languages-Types of programming languages- Program Development Environment. (5)

    C LANGUAGE: Introduction to C Language - C Character Set - Identifiers and Keywords - Data Types – Literal Constants - Variables – l-value-r-value - Qualifiers – Modifiers - Operators and Expressions – Type conversions - Library Functions - Data Input and Output Functions – escape sequence characters – Formatted input and output. (6)

    CONTROL STATEMENTS: Making Decisions : If Statement – If/else Statement - If/else if Statement – Nested if Statements – dangling else - Switch Multiple Selection Statement– Repetition : Repetition Essentials - While Loop – do-While Loop – For Loop – Nested Loops – Breaking out of a Loop Continue statement – goto Statement. (6)

    FUNCTIONS: Modular Programming – Function Prototypes - Defining and Calling Functions –Function Call Stack and Activation Records - Passing Arguments to Functions – Returning a value from a function- Recursion – Recursion vs. Iteration – Scope and lifetime of variables – Memory layout of a C program - Storage Classes - Auto - Static - Extern and Register Variables. (8)

    ARRAYS: Defining Array –Array Initialization - Accessing array elements - Processing arrays - Arrays as function arguments - Multidimensional arrays – Memory address calculation of an array – Row major and column major order - String Handling. (8)

    POINTERS: Pointer Variable Definitions and Initializations – Passing Arguments to Functions by address – Pointer Expressions and Pointer Arithmetic - Relationship between Pointers and Arrays - Pointers and multidimensional arrays –Constant Pointer – Pointer to Constant –NULL pointer- dangling pointers - Pointers to functions - passing functions to other functions – Introduction to Stack and Heap Memory - Dynamic Memory Allocation. (10)

    STRUCTURES AND UNIONS: Structure Definitions – Initializing Structures – Accessing Structure Members - Processing a structure - typedef- Structures and pointers - Passing structures to functions – Self-Referential Structures- Bit fields - Unions – Enumeration Constants. (8)

    FILES: Files and Streams - Operations on Files – Types of Files, Various Read and Write Functions for Sequential-Access and Random-Access Files -Command Line Arguments. (5)

    PREPROCESSOR DIRECTIVES: #include Preprocessor Directive - #define Preprocessor Directive: Symbolic Constants - #define Preprocessor Directive : Macros - Conditional Compilation (4)

    Total L: 60

    TEXT BOOKS:
    1. Brian W. Kernighan and Dennis Ritchie, “The C Programming Language”, Pearson Education India, 2015
    2. R G Dromey, “How to solve it by computer”, Pearson 2008.

    REFERENCES :
    1. Herbert Schildt, “C The Complete Reference", McGraw Hill, 2017.
    2. Gottfried B, “Programming With C”, McGraw Hill, 2011.
    3. Peter Prinz and , “C in a Nutshell”, O′Reilly, 2016.

    20XW16 ENGINEERING GRAPHICS AND GEOMETRIC MODELLING

    0 0 4 2

    Prerequisites:

  • Basics of drawing at higher secondary level
  • INTRODUCTION: BIS specifications - lines, lettering, and dimensioning. Projection –types. (4)

    FIRST ANGLE PROJECTION: Introduction- Projection of points, lines, planes, and solids –parallel, perpendicular and inclined to planes. (8)

    ISOMETRIC PROJECTION:Introduction- prismatic and cylindrical components. (2)

    INTERACTIVE GRAPHICS:Parametric modeling –1D, 2D and 3D geometry – transformations - display – points, lines using software. (4)

    CURVES: Types- parametric curves generation-displaying - evaluating points on curves. (4)

    SURFACES: Types- parametric surface generation-displaying - evaluating points on surfaces. (5)

    SOLIDS:Generation of part models using Computer Aided Geometric Modeling software. (3)

    TEXT BOOKS:
    1. "A Primer on Engineering Drawing using Pro Engineer", Department of Production Engineering and CAD/CAM Centre, PSG College of Technology, 2012.
    2. Michael E. Mortensen, "Geometric Modeling (Digitized)", Industrial Press, 2011.

    REFERENCES:
    1. David F. Rogers, Alan Adams J., "Mathematical Elements in Computer Graphics (Digitized)", McGraw Hill, 2007.
    2. David Solomon, "Computer Graphics and Geometric Modeling", Springer, 2013.
    3. Michael E. Mortenson, "Geometric Modeling(Digitized)", Industrial Press, 2011.
    4. MarttiMantyla, "An Introduction to Solid Modeling (Digitized)", Computer Science Press, 2007.

    LABORATORY COMPONENT:
    Engineering Graphics using CAD
    1. Introduction to CAD Software.
    2. First angle projection of a. Points b. Lines
    3. Projection of a. Planes b. Solids
    4. Conversion of isometric to orthographic projection.
    5. Orthographic to isometric projection.
    6. Sectioning of regular solids.
    7. Perspective projection of simple solids.

    Geometric Modeling using a graphical programming language
    8. Modeling and displaying a point and line using orthographic projection and performing simple geometric transformation.
    9. Modeling and displaying of parametrically represented analytical curves
      a. Circle b. Ellipse
    10. Modeling and displaying of parametrically represented synthetic curves
      a. Bezier Curve b. B-spline
    11. Modeling and displaying of parametrically represented NURBS curve.
    12. Modeling and displaying of parametrically represented synthetic surface.
      a. Planar surface b. Ruled surface
    13. Modeling and displaying of Bezier surface.
    14. Modeling and displaying of B-Spline surface.

    Total P: 60

    20XW17 C PROGRAMMING LAB

    0 0 4 2

    1. Simple programs to understand the concepts of data types.
    2. Familiarizing conditional, control and repetition statements
    3. Usage of single and double dimensional arrays including storage operation
    4. Implementation of functions, recursive functions
    5. Defining and handling structures, array of structures and union
    6. Implementation of pointers, operation on pointers dynamic storage allocation
    7. Creating and processing data files.

    REFERENCES :
    1. Herbert Schildt, “C The Complete Reference", McGraw Hill, 2017.
    2. Gottfried B, “Programming With C”, McGraw Hill, 2011.
    3. Peter Prinz and , “C in a Nutshell”, O′Reilly, 2016.

    Total P: 60

    20XW18 APPLIED PHYSICS AND DIGITAL ELECTRONICS LAB

    0 0 4 2

    APPLIED PHYSICS LAB:
    1. Determination of the moment of inertia of a flywheel.
    2. Study of frequency of oscillation and determination of spring constant of spring-mass system.
    3. Determination of thermal conductivity of bad conductor - Lee's disc method.
    4. Determination of thermal conductivity of good thermal conductor-Forbes method.
    5. Determination of the relative humidity by using wet and dry bulb hygrometer.
    6. Determination of refractive index of liquids using hollow prism.

    DIGITAL ELECTRONICS LAB:
    1. Study of basic logic gates and realization of logic gates using universal gates.
    2. Multiplexer and demultiplexer.
    3. Half and full adder / subtractor.
    4. Encoder and decoder.
    5. Binary decade counter.
    6. BCD to seven segment decoder.
    7. Study of D/A converter.
    8. Crystal Oscillator using logic gates

    Total P: 60

    20XW21 LINEAR ALGEBRA

    3 2 0 4

    Prerequisites:

  • Basic knowledge of Matrix Algebra, Calculus, and Analytical Geometry
  • SYSTEM OF LINEAR EQUATIONS: System of linear equations, Gauss – elimination, Gauss-seIdal method- Application of Linear systems. (5+3)

    VECTOR SPACES: Vector spaces and subspaces – Span, Linear independence and dependence– Basis and dimension - Row space, Column space, and Null space– Rank and nullity- Change of basis– Similarity - Isomorphism. (10+7)

    INNER PRODUCT SAPCES: Inner products, Length and Angle in inner product spaces - Orthonormal bases, Gram Schmidt process - Orthogonal matrices- QR decomposition - Best Approximation and Least-squares. (10+7)

    LINEAR TRANSFORMATION: Introduction to linear transformations – General Linear Transformations – Kernel and range – Matrices of general linear transformation- Geometry of linear operators. (6+4)

    SPARSE MATRICES: Introduction – Storage Schemes – Basic sparse matrix operations – Sparse direct solutions – random walk problems. (4+2)

    EIGENVALUES AND EIGENVECTORS: Introduction to Eigenvalues Eigevectors, Complex Eigenvalues, - Diagonalization - Orthogonal diagonalization- Positive definite matrices - Quadratic forms - Quadric surfaces - Singular value decomposition. Applications to differential equations, dynamical systems. (10+7)

    Total L: 45+T: 30=75

    TEXT BOOKS:
    1. Howard Anton and Chris Rorres, “Elementary Linear Algebra” John Wiley &Sons, 2017.
    2. David C Lay, “Linear Algebra and its Applications “, Pearson Education, 2016.

    REFERENCES:
    1. Gilbert Strang, “Linear Algebra and its Applications”, Thomson Learning, 2016.
    2. Steven J. Leon, “Linear Algebra with Applications”, Prentice Hall, 2015.
    3. Yousef Saad, “Numerical methods for Large Eigenvalue Problems”, University Press, 2011.

    20XW22 PROBABILITY AND STATISTICS

    3 2 0 4

    Prerequisites:

  • 20XW11 CALCULUS AND ITS APPLICATIONS
  • MATHEMATICAL LOGIC: Proposition - Logical operators - Truth tables – Laws of Logic – Equivalences – Normal forms - Rules of inference - Validity of arguments – Consistency of specifications – Propositional Calculus – Quantifiers and universe of discourse. (10+7)

    PROOF TECHNIQUES: Introduction – Methods of proving theorems – Direct proofs, Indirect proofs – Mathematical induction – Strong mathematical induction and well ordering. (6+4)

    RELATIONS AND FUNCTIONS: Definition and properties of binary relations – Representing Relations – Closures of Relations – Composition of Relations – Equivalence Relations – Partitions and Covering of Sets – Partial Orderings – n-ary Relations and their Applications. Functions - Injective, Surjective, Bijective functions, Composition, Identity and Inverse. (10+7)

    COMBINATORICS: Basics of counting – The Pigeonhole principle - Permutations and Combinations with and without repetition, Permutations with indistinguishable elements, distribution of objects - Generating permutations and combinations in lexicographic order. (8+4)

    RECURRENCE RELATIONS: Some Recurrence Relation Models- Solutions of linear homogeneous recurrence relations with constant coefficients- solution of linear non-homogeneous recurrence relations by the method of characteristic roots. (5+4)

    LATTICES: Lattices as partially ordered set – Properties of Lattices– Lattices as algebraic system – Sublattices – Direct product and Homomorphism – Some special lattices. (6+4)

    Total L: 45+T: 30=75

    TEXT BOOKS:
    1. 1. Kenneth H Rosen, “Discrete Mathematics and its Applications”, Tata McGraw Hill, 2016.
    2. Judith L. Gersting, “Mathematical Structures for Computer Science”, W.H. Freeman and Company, 2014.
    3. Tremblay J P and Manohar R, “Discrete Mathematical Structures with Applications to Computer Science", Tata McGraw Hill, 2014.

    REFERENCES:
    1. Doerr Alan and Levasseur K, "Applied Discrete Structures for Computer Science", Galgotia Publications, 2010.
    2. Benard Kolman, Robert C Busby and Sharan Ross, "Discrete Mathematical Structures", Pearson Education, 2014.
    3. Ralph P Grimaldi, “Discrete and Combinatorial Mathematics – An Applied Introduction”, Addison Wesley, 2009.

    20XW23 DATA STRUCTURES AND ALGORITHMS

    3 0 0 3

    Prerequisites:

  • Logical and Analytical skills.
  • 20XW15 C PROGRAMMING
  • INTRODUCTION: Software Development process – Abstraction - Data structures - Abstract data Types - Primitive data structures - Analysis of algorithms - Best, worst and average case time complexities – Asymptotic notation – growth of functions. (4)

    ARRAYS: Operations - implementation of one, two, and multi dimension arrays – Sparse matrices –Applications; (3)

    STACKS: primitive operations - sequential implementation - Applications: Subroutine handling - Recursion – Expression Processing,Parentheses matching. (6)

    QUEUES: Primitive operations - Sequential implementation – Linear queue-Circular queue-Priority queues – Double ended queues – Applications. (4)

    LISTS: Primitive operations - Singly linked lists, Doubly linked lists, Circular lists, Multiply linked lists - Application: Addition of Polynomials – Linked Stacks - Linked queues. (7)

    TREES: Terminologies – Binary tree - Sequential and linked representation - Traversals - Expression trees - Infix, Postfix and Prefix expressions - Heaps - Max heap, Min heap and their operations. (7)

    BINARY SEARCH TREES: Searching – Insertion and deletion of elements – Analysis. (3)

    GRAPHS: Terminologies– Representations using Adjacency matrix, adjacency list – Graph Traversal Algorithms - Breadth first and Depth first – Time complexity Analysis. (4)

    HASH TABLE: Hash Function –Collision resolution techniques–Linear probing-Chaining. (3)

    SORTING: Insertion Sort, Selection Sort, Bubble Sort, Heap Sort, Radix Sort – Algorithms and time complexity analysis.(4)

    Total L:45

    TEXT BOOKS:
    1. Yedidyah Langsam, Moshe J Augenstein and Aaron M Tenenbaum, "Data structures using C and C++", Prentice Hall, 2016.
    2. Sartaj Sahni, "Data Structures, Algorithms and Applications in C++", Silicon Press, 2013.
    3. Michael T. Goodrich, Roberto Tamassia and David Mount, “Data Structures and Algorithms in C++”, John Wiley, 2016.

    REFERENCES:
    1. 1. Mark Allen Weiss, “Data Structures and Algorithm Analysis in C”, Addison-Wesley, 2017.
    2. Robert L Kruse, Bruce P Leung and Clovis L Tondo, “Data Structures and Program Design in C”, Pearson Education, 2013.
    3. Nell Dale, Chip Weems and and Tim Richards, “C++ Plus Data Structures”, Jones and Bartlett Learning, 2017.
    4. Alfred V. Aho, John E Hopcraft,JeffreyD. Ullman,”Data structures and Algorithms”,Pearson Education, 2011

    20XW24 OBJECT ORIENTED PROGRAMMING

    3 0 0 3

    Prerequisites:

  • 20XW15 C PROGRAMMING
  • PRINCIPLES OF OBJECT ENTED PRAMMING: Software crisis Software Evolution - Procedure Oriented Programming - Object Oriented Programming Paradigm - Basic Concepts and Benefits of OOP - Object Oriented Programming Language - Application of OOP - Structure of C++ - Tokens, Expressions and Control Structures - Operators in C++ - Manipulators. (6)

    FUNCTIONS IN C++: Function Prototyping - Call by Reference - Return by reference - Inline functions - Default, Const Arguments - Function - Overloading - Friend and Virtual Functions - Classes and Objects - Member functions - Nesting of Member functions - Private member functions - Memory allocation for Objects - Static data members - Static Member Functions - Arrays of Objects - Objects as Function Arguments - Friend Functions - Returning Objects - Const Member functions - Pointers to Members. (10)

    CONSTRUCTORS: Parameterized Constructors - Multiple Constructors in a Class - Constructors with Default Arguments - Dynamic Initialization of Objects - Copy and Dynamic Constructors – Destructors overloading . (5)

    OPERATOR OVERLOADING: Overloading Unary and Binary Operators - Overloading Binary Operators using Friend functions – Operator Type conversion (4)

    INHERITANCE: Defining Derived Classes - Single Inheritance - Making a Private Member Inheritable - Multiple Inheritance - Hierarchical Inheritance - Hybrid Inheritance - Virtual Base Classes - Abstract Classes - Constructors in Derived Classes - Member Classes - Nesting of Classes – Composition – Aggregation (9)

    POLYMORPHISM: Basics of polymorphism – Types of polymorphism - Compile and Run Time Polymorphism - Virtual function – Object Slicing – Virtual Destructor – Dynamic binding (4)

    TEMPLATES & EXCEPTION HANDLING: Introduction to Templates, Generic Functions and Generic Classes – Exception Handling – Examples. (3)

    STREAMS: String I/O -Character I/O - Object I/O - I/O with multiple Objects - File pointers - Disk I/O with member function (4)

    Total L:45

    TEXT BOOKS:
    1. Bjarne Stroustrup, “The C++ Programming Language”, Pearson Education, 2014.
    2. Stanley B Lippman, Josee Lajoie and Barbara E Moo, “The C++ Primer”, Pearson Education, 2013.

    REFERENCES :
    1. Harvey M Deitel, Paul J Deitel, “C++ How to Program”, Prentice Hall, 2014.
    2. Herbert Schildt, “C++ - The Complete Reference", Tata McGraw Hill, 2012.

    20XW25 COMPUTER ORGANIZATION

    3 0 0 3

    Prerequisites:

  • 20XW14 ANALOG AND DIGITAL ELECTRONICS
  • INTRODUCTION:Basic principles - Functional components of a computer system- CPU, Storage, I/O, Multimedia devices - Workstations, Servers,-Interaction among functional components -Bus organization -Data representation- Integer and floating point representation (6)

    PROGRAM EXECUTION:Processing of High Level Language Code-Assembler- Code generation,-Application binary interface-- Instruction set architecture of a simple CPU - Microarchitecture of CPU, Instruction codes-The hardware-software interface -Hardware features influenced by software requirements - Specifications of the performance of a system(6)

    BASIC PROCESSING UNIT:Fundamental Concepts-- Computer registers -Register transfer language -Generation and Execution of machine code- Hardware Components-Instruction Fetch and Execution Steps-Control Signals - Hardwired Control Processors (6)

    MEMORY SYSTEM :- Basic Concepts- Internal Organization of Memory - Semiconductor RAM Memories - Static and Dynamic RAMs - Read-only Memories - Flash Memory - Direct Memory Access - Cache Memories - Performance Considerations - Caches on the Processor Chip – Cache coherence - Virtual Memory - Segmentation (8)

    PIPELINING -:Basic Concept of pipelining - Pipeline Organization - Pipelining Issues - Data Dependencies - Operand Forwarding - Handling Data Dependencies in Software - Memory Delays- Branch Delays - Branch Prediction -Resource Limitations -Performance Evaluation(6)

    PARALLEL PROCESSING AND PERFORMANCE: Fylnns taxonomy- Classification – Instruction level parallelism and its exploitation - Data Level parallelism –Thread Level parallelism- Hardware multithreading – Multicore processors - Instruction Exceptions.-CISC and RISC Processors- instruction set architecture of x86 (8)

    INPUT/OUTPUT INTERFACES:Bus Structure - Operation - Synchronous and Asynchronous Bus - FireWire - PCI Bus - SCSI Bus - SATA - SAS - PCI Express - Interface Circuits- Parallel/Serial /Universal Serial Bus (USB) Program-Controlled I/O - I/O Interrupts - Handling Multiple Devices - Exception handling (7)

    Total L:45

    TEXT BOOKS:
    1. Computer Architecture and Organization Designing for Performance, William Stallings, Pearson Education series, 2014.
    2. Computer Organization and Design :The Hardware/Software Interface, David A. Patterson and John L. Hennessy, Morgan Kaufmann, 2013
    3. Morris Mano, "Computer Systems Architecture", Pearson Education, 2014.
    4. Barry B. Brey, "The Intel Microprocessors - 8086/88, and 80186, 80286, 80386, and 80486", Pearson Education, 2009.

    REFERENCES:
    1. John P. Hayes, “Computer Architecture and Organization”, Tata McGraw Hill, 2017.
    2. Hamachar V. C., Vranesic Z. G. and Zaky S. G., "Computer Organization", McGraw Hill, 2012.
    3. Douglus V. Hall, "Microprocessors and Interfacing", McGraw Hill, 2010.
    4. James L. Antonakos, “An Introduction to the Intel family of Microprocessors”, Pearson Education, 2007.

    20XW26 DATA STRUCTURES LAB

    0 0 4 2

    1. Time complexity based problems on arrays, matrices and strings.
    2. Sparse matrix operations using arrays.
    3. Stacks and queues using arrays.
    4. Linked Lists: Singly linked, Doubly linked and Circular lists.
    5. Linked Stacks Queues and priority queues.
    6. Binary trees and binary search tree.
    7. Graph traversal algorithms.
    8. Hash table with collision resolution.
    9. Sorting Algorithms.

    Total: P:60

    20XW27 OBJECT COMPUTING LAB

    0 0 4 2

    1. Implementation of Arithmetic operations using array of objects and dynamic data members.
    2. Creation of a class having read-only member function and processing the objects of that class.
    3. Creation of a class which keeps track of the member of its instances. Usage of static data member, constructor and destructor to maintain updated information about active objects.
    4. Illustration of a data structure using dynamic objects.
    5. Usage of static member to count the number of instances of a class.
    6. Illustration for the need of default arguments.
    7. Usage of a function to perform the same operation on more than one data type.
    8. Creation of a class with generic data member.
    9. Overloading the operators to do arithmetic operations on objects.
    10. Acquisition of the features of an existing class and creation of a new class with added features in it.
    11. Implementation of run time polymorphism.
    12. Overloading stream operators and creation of user manipulators.
    13. Implementation of derived class which has direct access to both its own and public members of the base class.
    14. Implementation of Streams to store and maintain Library system, with the features of Book Issue and Book Return.

    Total: P:60

    20XW28 PYTHON PROGRAMMING LAB

    0 0 4 2

    Prerequisites:

  • Object Oriented Programming
  • INTRODUCTION: Development Tools (IDE) – Python shell - Python Basics – Data types - Control flow.

    CORE PYTHON LANGUAGE: Lists - Tuples - Dictionaries - Strings – Regular expressions - Functions - File input/output – Exception handling.

    OBJECT-ORIENTED DESIGN: Inheritance – Polymorphism.

    PACKAGING AND DISTRIBUTION: Modules – Packages – Python standard libraries - pip.

    STANDARD PACKAGES: NumPy – Matplotlib – SciPy – SymPy – Pandas.

    TEXT BOOKS:
    1. Mark Lutz, “Learning Python”, O’Reilly Media, 2013.
    2. Tony Gaddis, “Starting out with Python”, Pearson, 2017.

    REFERENCES:
    1. Christian Hill, “Learning Scientific Programming with Python”, Cambridge University Press, 2016.
    2. Allen Downey, ‘Python for Software Design”, Cambridge University Press, 2009.

    EXERCISES:
    1. Test basic coding skills in Python using data types, control statements and iteration.
    2. Implement Python data structures like lists, tuples, dictionaries, and sets.
    3. General programming concepts such as functions, strings, regular expressions, reading / writing files and exceptions.
    4. Implement object oriented concepts.
    5. Packaging programs into reusable libraries.
    6. Use libraries for numerical programming and data visualization.

    Total: P:60

    20XW31 PROBABILITY AND STATISTICS

    3 2 0 4

    Prerequisites:

  • 20XW11 CALCULUS AND ITS APPLICATIONS
  • SAMPLE SPACE AND PROBABILITY: Sets, probabilistic models, conditional probability, total probability theorem and Bayes’ rule,independence, gamblers ruin problem. (6+4)

    DISCRETE RANDOM VARIABLES: Random variables concept- Probability mass function. Expectation, mean, and variance. Bernoulli, Binomial, Poisson and Geometric random variables. Joint probability mass function of multiple random variables, conditioning, independence. (6+4)

    CONTINUOUS RANDOM VARIABLES: Probability density function, cumulative distribution function, Uniform, Normal, Exponential, Weibull, and Gamma random variables. Joint probability density function of multiple random variables, conditioning, continuous Bayes’ rule. Sums of independent random variables, convolution, covariance, correlation, and conditional expectation. (6+4)

    LIMIT THEOREMS: Markov and Chebyshev inequalities, Weak Law of Large Numbers, Convergence in probability, Central Limit Theorem, Strong Law of Large Numbers. (5+3)

    SAMPLE AND POPULATION: Sample mean, confidence interval construction, estimating the variance of the sample mean, confidence intervals for population means, standard error estimates. (6+4)

    SIGNIFICANCE OF EVIDENCE: Significance, p-values, comparing the mean of two populations, other useful tests of significance (6+4)

    INFERRING PROBABILITY MODELS FROM DATA: Estimating model parameters with Maximum Likelihood, incorporating priors with Bayesian inference, Bayesian inference for Normal distributions. (6+4)

    REGRESSION: Regression to make predictions, to spot trends, linear regression and least squares, Producing Good Linear Regressions. (4+3)

    Total L: 45+T: 30=75

    TEXT BOOKS:
    1. Dimitri Bertsekas, John Tsitsiklis “Introduction to Probability”, Athena Scientific, 2008.
    2. David Forsyth, “Probability and Statistics for Computer Science”, Springer, 2018.
    3. Michael J Evans, Jeffrey S Rosenthal, “Probability and Statistics : The Science of Uncertainty”, W. H. Freeman, 2009.

    REFERENCES:
    1. SaeedGhahramani, “Fundamentals of Probability with Stochastic Processes”, Pearson Education, 2019.
    2. Sheldon M. Ross, “Introduction to Probability and Statistics for Engineers and Scientists”, Academic Press, 2017.
    3. Morris H Degroot, Mark J Schervish, “Probability and Statistics”, Addison Wesley, 2018.

    20XW32 DATABASE MANAGEMENT SYSTEM

    3 0 0 3

    Prerequisites:

  • 20XW23 DATA STRUCTURES AND ALGORITHMS
  • BASIC CONCEPTS: Introduction to databases – Conventional file processing – Purpose of database system – Characteristics of database approach – Advantages of using DBMS – Database concept and architecture – Data Abstraction – Data Models – Instances and Schema – Data Independence – Schema Architecture – Components of a DBMS. (7)

    DATA MODELING: Introduction – Data associations – Entities, attributes, relationships – Type role and structural constraints – Weak and Strong entity types – Design of Entity Relationship data models (ERD) – Generalization – Aggregation – Conversion of ERD into tables – Applications – Introduction to Network data model and Hierarchical data model. (7)

    FILE ORGANIZATION: Storage device characteristics – Constituents of a file – Operations on file – Serial files – Sequential files – Index sequential files – Direct files – Primary and Secondary Key Retrieval – Types of indexes - Indexing using Tree Structures. (6)

    RELATIONAL MODEL: Introduction to Relational Data Model – Basic concepts – Enforcing Data Integrity constraints – Relational Algebra Operations – Extended Relational Algebra Operations (3)

    RELATIONAL DATABASE MANIPULATION: Introduction to Structured Query Language (SQL) – SQL Commands for defining Database, Constructing database, Manipulations on database – Basic data retrieval operations – Advanced Queries in SQL – Functions in SQL – Aggregation – Categorization – Updates in SQL – Views in SQL –– PL/SQL Basics – Procedures – Functions – Triggers. (9)

    DATA BASE DESIGN THEORY: Data base design process – Relational Database Design – Relation Schema – Anomalies in a database – Functional dependencies – Axioms – Normal forms based on primary keys – Second Normal form, Third Normal form, Boyce – Codd Normal form – Examples – Multi-valued dependencies – Fourth Normal form – Reduction of an E-R schema to Tables – Practical database design tuning. (6)

    TRANSACTION PROCESSING AND CONCURRENCY CONTROL: Transactions, Locking techniques, Concurrent access, Deadlock handling (3)

    DATABASE SECURITY, INTEGRITY CONTROL: Security and Integrity threats – Defense mechanisms – Discretionary Access Control and Mandatory Access Control. (4)

    Total L: 45

    TEXT BOOKS:
    1. Elmasri R and Navathe SB, “Fundamentals of Database Systems”, Pearson Education, 2016.
    2. Silberschatz A, Korth H and Sudarshan S, “Database System Concepts”, McGraw Hill, 2019

    REFERENCES:
    1. Hector Garcia-Molina, Jeffrey D. Ullman, Jennifer Widom, ”Database Systems: The Complete Book,”, Pearson Education, 2011.
    2. Raghu Ramakrishnan and Johannes Gehrke, “Database Management System”, McGraw Hill, 2014

    20XW33 TRANSFORM TECHNIQUES

    3 2 0 4

    Prerequisites:

  • Basics of Analytical Geometry
  • 20XW11 Calculus and its applications
  • TRANSFORM METHODS: Basic waveforms and their properties, Operational calculus, concept of transformation, integral transforms, kernel of a transform, examples of transforms, linearity property. (2+1)

    LAPLACE TRANSFORM: Definition – Transforms of standard functions – Transform of unit step function – Dirac -Delta function- Transforms of derivatives and integrals – Transforms of Periodic functions – Inverse Laplace transform – Convolution theorem – Solving ordinary linear differential equations with constant coefficient by Laplace transform technique. Transfer functions, applications to linear systems. (12+7)

    FOURIER SERIES: Dirichlet’s conditions, statement of Fourier theorem, Fourier coefficients, change of scale, Even and odd functions, Half-range sine and cosine series, RMS value, Parseval’s theorem, Applications to signals and systems. (4+2)

    FOURIER TRANSFORM: Fourier integrals – Fourier transform – Infinite Fourier sine and Cosine transform – Transforms of standard functions – properties, Convolution theorem (Concept &Statement) – relation with Laplace transform. (7+5)

    DISCRETE FOURIER TRANSFORM: Discrete convolution – Periodic sequence and circular convolution –Decimation- in-time and decimation-in-frequency algorithms – Computation of inverse DFT. (6+4)

    Z-TRANSFORM: Z - transform of standard functions, inverse Z-transform – properties of Z – transform – Difference equations – Modeling, Solution of difference equations. (7+5)

    WAVELET TRANSFORM: Continuous wavelet transform, admissibility condition, Haar-wavelet, Mexican-hat-wavelet, Morlet-wavelet - Convolution - Inverse transform - Comparison with Fourier transform. Application – detection of signal changes. (8+5)

    Total L: 45+T: 30=75

    TEXT BOOKS:
    1. Anthony Croft, Robert Davison, Martin Hargreaves, “Engineering Mathematics - A Foundation for Electronic, Electrical, Communications & Systems Engineers”, Pearson Education, 2013.
    2. Hans-Georg Stark, Wavelets and Signal Processing, Springer, 2009.

    REFERENCES:
    1. Erwin Kreyszig, “Advanced Engineering Mathematics”, John Wiley, 2013.
    2. Lokenath Debnath and Dambaru Bhatta, Integral Transforms and Their Applications, Chapman & Hall/CRC, 2010.
    3. Michael D. Greenberg, “Advanced Engineering Mathematics”, Pearson Education, 2013.

    20XW34 DESIGN AND ANALYSIS OF ALGORITHMS

    3 0 0 3

    Prerequisites:

  • 20XW22 DISCRETE STRUCTURES
  • 20XW23 DATA STRUCTURES AND ALGORITHMS
  • INTRODUCTION: Review of analysis of algorithms – Average case time complexity - Analysis of recursive algorithms- Master’s Theorem. (5)

    AVL TREES: Height Properties – Searching – Insertion and deletion of elements – Analysis. (4)

    SPLAY TREES: Searching - Insertion and deletion of elements - Amortized analysis. (3)

    MULTIWAY SEARCH TREES: Indexed Sequential Access – M-way search trees – B-Tree – searching, insertion and deletion – B+Tree – Insertion and deletion. (5)

    DIVIDE AND CONQUER: Method – Merge sort, Quick sort, Binary Search – Large integer multiplication-Strassen’s matrix multiplication. (5)

    GREEDY METHOD: Optimization problems – Method – examples – Minimum cost spanning tree (Kruskal’s and prim’s algorithms), Topological sorting and Huffman codes. (5)

    DYNAMIC PROGRAMMING: Method – All pairs shortest path problem – longest common subsequence problem-Traveling salesman problem. (5)

    NP AND COMPUTATIONAL INTRACTABILITY: Basic concepts – Polynomial time reductions, efficient certification and NP, NP hard and NP complete problems (5)

    BACK TRACKING: Method – N-queen’s problem –Graph coloring-Hamiltonian Cycles. (4)

    BRANCH & BOUND: Method – 0/1 Knapsack,problem - Traveling Salesman problem. (4)

    Total L:45

    TEXT BOOKS:
    1. Thomas H. Cormen, Charles E Leiserson and Ronald L Rivest, “Introduction to Algorithms”, MIT Press, 2015.
    2. Alfred V Aho, John E Hopcraft, Jeffrey D Ullman, ”Data structures and Algorithms”, Pearson Education,2009.

    REFERENCES:
    1. SartajSahni, “Data Structures, Algorithms and Application in C++”, Silicon Press, 2013.
    2. AnanyLevitin, “Introduction to the Design and Analysis of Algorithms”, Pearson, Education, 2014.
    3. Parag H Dave, Himanshu B Dave, “Design and Analysis of Algorithms”, Pearson Education, 2014.
    4. Mark Allen Weiss, “Data Structures and Algorithm Analysis in C++”, Addison-Wesley, 2014.

    20XW35 MICROPROCESSOR AND EMBEDDED SYSTEMS

    3 0 0 3

    Prerequisites:

  • 20XW14 ANALOG AND DIGITAL ELECTRONICS
  • 20XW25 Computer Organization
  • INTRODUCTION TO MICROPROCESSORS: Evolution of Microprocessors - Microprocessor based systems - Advantages and limitations. (4)

    INTEL 8086/88 PROCESSOR: Block diagram of 8086 - Addressing modes – Instruction format - Instructions - assembler directives – Construction of Machine code. (5)

    ASSEMBLY LANGUAGE PROGRAMMING: Programs for multi precision addition, subtraction-block moves-array processing-string processing-procedures and macros. (5)

    8086 INTERRUPT SYSTEMS: Advantages and disadvantages of interrupts - Interrupt systems of 80x86 processors – Programmable Interrupt Controller, INT 21H. (4)

    PENTIUM PROCESSOR: Special Pentium Registers – Super scalar Architecture – Pipelining – Branch Prediction. (5)

    INTRODUCTION TO EMBEDDED SYSTEMS: Definition – Examples of Applications – Important characteristics of these applications – real-time system and definitions – real –time system – Common misconceptions – Overview of science of real-time systems and examples of research problems. (6)

    HARDWARE FUNDAMENTALS: Microprocessors –Programmable Array Logic (PAL) – Application Specific Integrated Circuit (ASIC) – Watch dog Timer. (4)

    EMBEDDED SYSTEM INTERRUPTS: Saving and Restoring the content - The Shared–data Problem – Shared–Data bug – Solving Atomic and Critical sections – Interrupt Latency. (6)

    EMBEDDED SOFTWARE ARCHITECTURE: Round – Robin with interrupts, Example – characteristics – Function- Queue- Scheduling Architecture – Real Time Operating System Architecture. (6)

    Total L: 45

    TEXT BOOKS:
    1. Barry B Brey, "The Intel Microprocessors - 8086/88, and 80186, 80286, 80386, and 80486", Prentice Hall,2009.
    2. Douglus V Hall, "Microprocessors and Interfacing", Tata McGraw Hill, 2010.
    3. David E Simon, “An Embedded Software Primer “, Pearson Education, 2002.
    4. Peter C Dibble, “Real –Time Java Platform Programming”, Books Surge, 2008.

    REFERENCES:
    1. Walter A. Triebel, Avtar Sing, “8088 and 8086 Microprocessors Programming”, Pearson Education, 2008.
    2. Jane W S Liu, “Real - time Systems”, Pearson Education, 2009.
    3. Andrew Wellings, “Concurrent and Real Time Programming in Java”, John Wiley, 2004.
    4. Albert M K Cheng, “Real-Time Systems Scheduling, Analysis and Verification”, John Wiley, 2003.

    20XW36 DESIGN AND ANALYSIS OF ALGORITHMS LAB

    0 0 4 2

    Implementation of the following problems:
    1. AVLtree including Rotations.
    2. Splay trees including rotations.
    3. Implementation of B Trees.
    4. Divide and Conquer versions of Merge sort, Quick sort and binary search.
    5. Greedy method implementation of Minimum cost spanning tree (Prim’s & Kruskal).
    6. Dynamic Programming implementation of Traveling Salesperson problem.
    7. Eight queen's problem, graph colouring application using backtracking.
    8. 0/1 knapsack and traveling salesman problem using branch and bound.

    Total: P:60

    20XW37 EMBEDDED SYSTEMS LAB

    0 0 4 2

    Implement the following for assembly language programming:
    1. Study of Assembler (Turbo) and Assembler Directives.
    2.Study of INT 21H functions for input and output.
    3.Multi-precision addition and subtraction.
    4.Packing and unpacking of BCD digits.
    5.Conversion of BCD numbers into ASCII characters and vice versa.
    6.Delay loop implementation.
    7.Arrangement of numbers in ascending and descending order.
    8.Checking whether a given character string is a PALINDROME.
    9.Usage of MACROS - Examples.
    10.BCD to Binary conversion and vice versa.
    11.To check whether a given string is a substring of another.
    12.Implementation of LEFT(), RIGHT(), SUBSTR() functions.
    13.To display the contents of the given memory locations.
    14.Encryption and decryption of a message.
    15.To find the Minimum and the Maximum number of a given array.

    Implement the following for assembly language programming:
    1.Study of ARM evaluation system
    2.Interfacing ADC and DAC.
    3.Interfacing LED and PWM.
    4.Interfacing real time clock and serial port.
    5.Interfacing keyboard and LCD.
    6.Interfacing EPROM and interrupt.
    7.Mailbox.
    8.Interrupt performance characteristics of ARM and FPGA.
    9.Flashing of LEDS.
    10.Interfacing stepper motor and temperature sensor.
    11.Implementing zigbee protocol with ARM.

    Total: P:60

    20XW38 RDBMS LAB

    0 0 4 2

    Implementation of the following problems:
    1. Working with DDL and DML commands of SQL for creation and manipulation of single, multiple tables.
    2. Working with Triggers and stored procedures.
    3. Developing a Package using a database.

    Total: P:60

    20XW41 ACCOUNTING AND FINANCIAL MANAGEMENT

    4 0 0 4

    Prerequisites:

  • Familiarity with basic Mathematics
  • COST ACCOUNTING: Cost classification - significance of overhead Cost - Preparation of Cost sheet - Concept of cost volume profit analysis - Concept of variance - Principles of Job Costing, batch costing and Process costing - Operating Costing - Modern techniques/concepts of Cost Control/ Cost Management. (14)

    FINANCIAL ACCOUNTING: Double Entry Book keeping concepts - Journalisation of Business Transactions - Subsidiary Books - Preparation of Profit and Loss Account and Balance sheet from Trial balance - Simple problems - Methods of depreciation.(16)

    FINANCIAL RATIO ANALYSIS: Uses and Nature - preparation of Liquidity Ratios - coverage Ratios and profitability Ratios from profit & Loss Account and Balance sheet - common size Income statement and common size Balance sheet. (11)

    GOALS AND FUNCTIONS OF FINANCIAL MANAGEMENT: Finance function - Importance of Corporation finance - objectives of Financial Management - organization of the finance function - concept of time value of money. (6)

    PRINCIPLES OF CAPTIAL BUDGETING: Kinds of capital Budgeting Decisions - Evaluation of proposals from the given cash inflows - Net present value versus Internal rate of return method problems. (6)

    WORKING CAPITAL MANAGEMENT: Definition and importance of working capital - factors affecting working capital - Inventory management - simple problems - Receivables Management - cash Budget Preparation - Estimate of overall working capital requirements - Various sources of financing . (7)

    Total L:60

    TEXT BOOKS:
    1. Khan M Y, Jain P K, "Cost Accounting and Financial Management", Tata McGraw Hill,2008.
    2. Gupta R L,RadhaswamyM, "Advanced Accountancy", Sultan Chand & Sons, 2009.

    REFERENCES:
    1. Sharma R K and Shashi K Gupta, "Management Accounting - Principles and Practice", Kalyani Publishers, 2011.
    2. KuchalS C, "Financial Management",Chaitanya Publishing House,2006.

    20XW42 COMPUTER NETWORKS AND TCP/IP

    3 0 0 3

    Prerequisites:

  • 20XW25 COMPUTER ORGANIZATION
  • 20XW35 MICROPROCESSOR SYSTEMS AND PROGRAMMING
  • Introduction: Network goals - Applications of Networks - Design issues for the layers - OSI Reference Model - Types of Network - Network Topologies- Analog and Digital data transmission- Data encoding- Bandwidth and data rate-.Bit Rate, Baud Rate (5)

    DATA COMMUNICATION: Multiplexing - Synchronous and Asynchronous TDM – FDM –CDM - Switching, Circuit Switching, Packet Switching Transmission of Digital Data: Transmission Impairments - Single and Multiple bit error correction-Error Detection and Correction - Cyclic Redundancy Check Code - Hamming Code (6)

    Data Link Control and Protocols: Line Discipline - Flow Control - Sliding Window Protocol -Random Access protocols- Ethernet – Fast Ethernet – Gigabit Ethernet – Wireless LANs- Internetworking- LAN -LAN Connections – Repeaters- Hubs - Bridge – Spanning tree-Switches – Routers. (8)

    IP: TCP/IP Protocol Structure - Internet Protocol – IP addressing- ARP –ICMP ROUTING: Distance vector routing - Link state Routing – RIP – OSPF (8)

    TRANSPORT LAYER:- TCP concepts - Port number - UDP – TCP-Congestion control- Quality of services (9)

    Applications: DHCP, SNMP, SMTP - MIME , DNS, HTTP (9)

    Total L: 45

    TEXT BOOKS:
    1. Behrouz A Forouzan, “Data Communications and Networking”, Tata McGraw Hill, 2012
    2. Behrouz A Forouzan, “TCP/ IP Protocol Suite”, Tata McGraw Hill, 2010.

    REFERENCES:
    1. Kevin Fall R and Richard Stevens W, "TCP/IP Illustrated, Volume 1: The Protocols”, Addison-Wesley, 2011.
    2. , Keith Ross, “Computer Networking: A Top-Down Approach”, Pearson Addison-Wesley, 2017.
    3. Douglas Comer, “Internetworking with TCP/IP”, Prentice Hall, 2014.
    4. William Stallings, "Data and Computer Communications", Prentice Hall, 2014.

    20XW43 OPERATIONS RESEARCH

    4 0 0 4

    Prerequisites:

  • 20XW11 CALCULUS AND ITS APPLICATIONS
  • 20XW22 PROBABILITY AND STATISTICS
  • LINEAR PROGRAMMING: Introduction to Operations Research – Modeling with linear programming - Graphical method for two dimensional problems – Simplex Algorithm – Two Phase Simplex Method – Special cases of Simplex Method – Sensitivity analysis - Revised Simplex Method. (14)

    SIMPLEX MULTIPLIERS : Dual and Primal – Dual Simplex Method – Post Optimal Analysis – Transportation problem and its solution – Assignment problem and its solution by Hungarian method. (12)

    DECISION THEORY: Decision Analysis – Decision making under certainty, uncertainty and risk. (6)

    NON LINEAR PROGRAMMING (UNCONSTRAINED OPTIMIZATION): Introduction – Random search method – Univariate method – Pattern search methods – Hooke and Jeeves method – Indirect Search Methods – steepest descent method – Conjugate gradient method. (14)

    DYNAMIC PROGRAMMING: Introduction – multistage decision processes – Principles of optimality – Computation procedures. (8)

    CPM AND PERT: Critical path network model – CPM computations – PERT calculations. (6)

    Total L: 60

    TEXT BOOKS:
    1. Hamdy A Taha, “Operations Research – An introduction”, Pearson, 2016
    2. Hillier and Lieberman, “Introduction to Operations Research”, McGraw Hill, 2017.

    REFERENCES:
    1. Richard W. Cottle and Mukund N. Thapa , “Linear and Non linear optimization”, Springer-Verlag, 2017.
    2. Wayne L. Winston, “Operations Research: Applications and Algorithms”, Duxbery press, 2003.

    20XW44 SOFTWARE ENGINEERING TECHNIQUES

    3 2 0 4

    Prerequisites:

  • 20XW24 Object Oriented Programming
  • INTRODUCTION: Software application domains – Nature of software - Why Software engineering – problems and challenges. (3)

    MODELING THE PROCESS AND LIFE CYCLE: Software methodologies – Software lifecycle – Project Management - Software Teams – Unified process – Agile development – Capability Maturity Model. (3)

    PLANNING AND MANAGNG THE PROJECT: Software Estimation and Measurement. (3)

    UNDERSTANDING REQUIREMENTS: Requirements gathering – Use Cases – Software Requirement Specification. (3)

    REQUIREMENTS MODELING: Scenarios – Data modeling – Class-based modeling – Flow-oriented modeling – Behavioral model. (5)

    DESIGNING THE SYSTEM: Design concepts – Architectural design – Pattern-based design - User Interface design – Component-level design. (6)

    QUALITY MANAGEMENT: Quality concepts – Review techniques – Software quality assurance – Six Sigma. (5)

    SYSTEM TESTING: Unit testing – Integration testing - Test Cases – Debugging – Test-driven Development. (5)

    DELIVERING THE SYSTEM: Deployment - Software Reuse strategies – Maintenance – Software configuration management. (5)

    UML MODELING: Business Modeling workflow – Requirements workflow - Use Case diagrams - Analysis workflow – Analysis classes – Sequence diagrams – Collaboration diagrams - Design workflow – Class diagrams - State diagrams – Object diagrams – Component diagrams - Deployment workflow – Deployment diagram – Static vs. Dynamic modeling. (7)

    Total L:45

    TEXTBOOKS:
    1. Roger S Pressman, Bruce R Maxim, “Software Engineering: A Practitioner’s Approach”, McGraw Hill, 2019.
    2. Shari Lawrence Pfleeger, Joanne M Atlee, “Software Engineering: Theory and Practice”, Pearson, 2011.
    3. Craig Larman, “Applying UML and Patterns: An Introduction to Object-Oriented Analysis and Design and Iterative Development”, PHI Learning, 2004.

    REFERENCES:
    1. Ian Sommerville, “Software Engineering”, Pearson Education, 2016.

    20XW45 OPERATING SYSTEMS

    3 0 0 3

    Prerequisites:

  • 20XW23 DATA STRUCTURES AND ALGORITHMS
  • 20XW25 COMPUTER ORGANIZATION
  • 20XW35 MICROPROCESSOR SYSTEMS AND PROGRAMMING
  • INTRODUCTION: Abstract view of an operating system - Operating Systems Objectives and Functions – Evolution of Operating Systems - Dual-mode operation - System calls- Structure of Operating System. (3)

    PROCESS DESCRIPTION AND CONTROL: Process concepts - Process Creation – Process Termination - Process states - Process Description – Process Control. (3)

    PROCESS AND THREADS: Relationship between process and threads – Thread States – Thread Synchronization – Types of Thread – Multithreading model. (4)

    PROCESS SCHEDULING: Scheduling basics - CPU-I/O interleaving- (non-)preemption - context switching- Types of Scheduling – Scheduling Criteria - Scheduling Algorithms – Algorithm evaluation – Real-time scheduling. (5)

    PROCESS SYNCHRONIZATION: Concurrent Process – Principles of Concurrency – Race Condition - Mutual Exclusion – Critical section problems – Software support – Hardware Support – Operating System Support: Semaphore, Monitor – Classical problems of synchronization – Synchronization examples.(4)

    DEADLOCK:Principles- Characterization – Methods for handling deadlock - Deadlock prevention, Avoidance, Detection, and recovery. (4)

    MEMORY MANAGEMENT: Memory hierarchy –Memory Management requirements - Memory partitioning: Fixed partitioning, Dynamic partitioning, Buddy systems – Simple paging – Page table structures – Simple Segmentation – segmentation and paging. (6)

    VIRTUAL MEMORY MANAGEMENT: Need for Virtual Memory management – Demand Paging –Copy on write -Page Fault handling - Page replacement - Frame allocation- Thrashing - working set model. (5)

    I/O MANAGEMENT AND DISK SCULING: Organization of I/O function – Evolution of I/O function – Types of I/O devices – Logical Structure of I/O functions – I/O Buffering – Disk I/O – Disk Scheduling algorithms – RAID - Disk Cache. (4)

    FILE SYSTEM MANAGEMENT: Files – Access methods - File system architecture – Functions of file management –Directory and disk structure -Mounting - File sharing –File system implementation – Directory implementation - File Allocation – Free space management. (4)

    VIRTUALIZATION: Requirements for Virtualization - Type 1, Type 2 Hypervisors – Paravirtualization - Memory Virtualization - I/O Virtualization - Virtual machines on Multicore CPUs–Virtualization in Multiprocessor environment. (3)

    Total: L: 45

    TEXT BOOKS:
    1. Silberschatz A, Galvin, PB. and Gagne, G. “Operating System Concepts”, John Wiley & Sons, Inc.,2018.
    2. William Stallings, “Operating Systems: Internals and Design Principles”, Pearson Education, 2017.
    3. Andrew S Tanenbaum, "Modern Operating System", Prentice Hall,2018.

    REFERENCES:
    1. Elmasri, E., Carrick A.G. and Levine, D. “Operating Systems: A Spiral Approach”, McGraw Hill, 2014.
    2. McHoes, AM and Flynn, I.M. “Understanding Operating Systems”, Cengage Learning, 2016.
    3. Dhamdhere D M, “Operating Systems: A Concept-based Approach”, McGraw-Hill, 2015.

    20XW46 COMPUTER NETWORKS AND TCP/IP LAB

    0 0 4 2

    1. Familiarize with GNS3 simulator.
    2. Implement Hamming code and CRC.
    3. Implement a primitive email server.
    4. Familiarize with packet capturing tools in Java and Wireshark.
    5. Implement a simple firewall system.
    6. Analyse the existing routing protocols and implement any one of them.
    7. Write a program where a single entity can communicate with other entities by using IP-multicasting.
    8. Assignments using the network simulator.

    Total P: 60

    20XW47 MATHEMATICAL COMPUTING LAB (WITH R)

    0 0 4 2


    TRANSFORM TECHNIQUES:


    1. Programs on differentiation and integration.
    2. Finding Fourier series
    3. Solving ordinary differential equations using Laplace transform techniques.
    4. Evaluation of Discrete Fourier Transforms- DIT


    STATISTICS:


    1. Implementation of classification and tabulation of data and Graphical and diagrammatic presentation of data.
    2. Perform calculations that measure the central tendency and dispersion of data and Implementation of measures of Skewness, moments and kurtosis.
    3. Continuous and discrete distributions.
    4. Solving linear regression, polynomial regression and non-linear regression based problems and solving multiple regression and correlation analysis based problems.
    5. Solving the problems based on Time series analysis and forecasting
    6. ANOVA


    OPTIMIZATION TECHNIQUES:


    Exploring ‘R’ Packages
    1. To solve linear programming problems
    2. To perform sensitivity analysis
    3. To solve Transportation and Assignment problems
    4. To solve non linear programming problems by gradient search methods.

    Total P: 60

    20XW48 WEB DESIGNING LAB

    0 0 4 2

    INTRODUCTION: WWW – presentation / business logic layer-Browser architecture – HTTP architecture, Methods, Web Server Architecture.

    HTML: Basic Structure – HTML tags – Tables – Forms – Links – Frames – DOM – Styling Tags.

    CSS: Introduction – Types (Where to place CSS) – Rules – Selectors – Styling Fonts – Layouts – Positioning – Boot Strap.

    JavaScript: Scripting Languages – Syntax – Variables – Data Types – Operators – Expressions – Conditional Statements – Loops – Arrays – Functions – Event Handling – Enhancing HTML Documents with JavaScript - AngularJS

    PHP: of PHP – Basic Syntax – Variables – Constants – Data Types – Operator – Expression – Form Processing – Looping – Functions – Arrays – Strings – PHP Global Array - Sessions – Cookies - NoeJS

    WEB PUBLISHING / HOSTING: Host Registration – Domain Registering – Server FTP Upload – AJAX – JSON - MySQL

    Total L: 60

    TEXT BOOKS:
    1. Elizabeth Castro and Bruce Hyslop, “Visual Quickstart Guide: HTML5 and CSS3“, Peachpit Press, 2013.
    2. David Flanagan, ”JavaScript: The Definitive Guide”, O'Reilly Media, 2011.

    REFERENCES:
    1. Larry Ullman, ”PHP for the Web”, Peachpit Press, 2016.
    2. Luke Welling, “PHP and Web Development”, Addison Wesley, 2008.
    EXERCISES:
    1. Create a simple website using HTML.
    2. Create a website using CSS and JavaScript.
    3. Create a simple PHP page to get the name of the user.
    4. Create a form and receive the data using PHP.
    5. Create and upload a website to the web using FTP.

    20XW51 UNIX ARCHITECTURE AND PROGRAMMING

    3 0 0 3

    Prerequisites:

  • 20XW23 DATA STRUCTURES AND ALGORITHMS
  • 20XW25 COMPUTER ORGANIZATION
  • 20XW35 MICROPROCESSOR SYSTEMS AND PROGRAMMING
  • INTRODUCTION TO UNIX : File System – Essential Commands – Directory and File Commands - General Purpose Utilities - Bourne Shell – Shell Wild Cards – Simple Filters – Regular Expressions – Grep Family - Advanced filters – sed, awk- Process - Communication and Scheduling. (8)

    PROGRAMMING WITH SHELL: Shell Scripts – Command Line Arguments, Positional Parameters – Decision Making and Looping Constructs – Redirection – File System Architecture. (6)

    FILE SYSTEM STRUCTURE: Kernel architecture - Kernel data structure - Buffer Cache - Structure of Buffer pool - Scenarios for buffer retrieval - Reading and Writing disk blocks - Advantages and Disadvantages of buffer cache - Inode - Structure of regular file - Conversion of a pathname to an inode - Inode assignment to a new file - Allocation of disk blocks. (15)

    PROCESS SYSTEM : Process states and transitions - Context of a process - Saving the context of a process - Manipulating Process address space - Process creation and termination – Signals – Awaiting Process Termination - System Boot and INIT process - Process Scheduling – Functions of a Clock Interrupt Handler. (10)

    MEMORY MANAGEMENT: Swapping - Allocation of swap space – Swapping Processes Out – Swapping Processes in - Demand Paging - Data structures of demand paging - Page stealer Process - Page faults. (6)

    Total L: 45
    1. TEXT BOOKS:
    2. Sumitabha Das, "Unix System V.4 - Concepts and Applications", Tata McGraw Hill, 2014.
    3. Maurice J Bach, "Design of the UNIX Operating System", Pearson, 2015.

    REFERENCES:
    1. Sumitabha Das, “Your Unix the Ultimate Guide “, Tata McGraw Hill, 2012.
    2. Richard F Gilberg, Behrouz A Forouzan, “Unix and Shell Programming - A Text Book”, Cengage Learning India Private Limited, 2016.
    3. UreshVahalia, "UNIX Internals: The New Frontiers", Pearson Education, 2011.
    4. Keith Haviland, Dina Gray, “Unix System Programming”, Addison Wesley, 2007.

    20XW52 JAVA PROGRAMMING

    3 0 0 3

    Prerequisites:

  • 20XW15 C Programming
  • 20XW24 Object Oriented Programming
  • Java Programming: Introduction - Data Types - Operators - Declarations - Control Structures - Arrays and Strings - Input/Output.-Java Classes - Fundamentals - Methods - Constructors - Scope rules - this keyword - object based vs oriented programming.- -Inheritance-Reusability - Composing class - Method overloading - Abstract classes - Virtual Functions. (8)

    PACKAGES AND INTERFACES: Packages - Access protection - Importing packages - Interface - Defining and Implementing Interface - Applying Interface - Variables in Interfaces. (6)

    EXCEPTION HANDLING: Fundamentals - Exception types - Uncaught Exception - Using Try and Catch - Multiple catch clauses - Nested Try statements - Throw - Throws - Java Built-in Exception - Creating your own subclasses. (6)

    MULTI THREADED PROGRAMMING: Java thread model - Priorities - Synchronization - Messaging - Thread class and runnable Interface - Main thread - Creating the Thread - Synchronization - Interthread Communication – Deadlock. (10)

    I/O, APPLETS: I/O basics - Stream - Stream Classes - Predefined stream - Reading/Writing console input - Applet fundamentals - Native methods.- GUI Components - Applets - Java Scripts – Swing. (7)

    NEW FEATURES IN J2SE V5.0: Generics – Enhanced for Loop – Autobox – Auto unboxing – Enums – Varargs – Static import – Annotations – Collections Frameworks – List – Vector – Set – Array - Maps . (8)

    Total L: 45

    TEXT BOOKS:
    1. Herbert Schildt, "JAVA - The Complete Reference", Tata McGraw Hill, 2016.
    2. Horstmann, Cornell, “Core Java”, Pearson, 2013.
    3.

    REFERENCES:
    1. Harvey M Deitel,Paul J Deitel, "JAVA: How to Program", Prentice Hall, 2013.
    2. William Stanek, Peter Norton, "Peter Norton's Guide to Java Programming", Tech Media, 2008.
    3. Paul Deitel, Harvey Deitel, "Java for Programmers", Pearson Education, 2012.
    4. Ivor Horton, “Beginning Java 2 JDK”, Wiley Dreamtech, 2010.
    5. Herbert Schildt ,“Java 2 V.5.O (Tiger) New Features”, Tata McGraw Hill,2004.

    20XW53 MACHINE LEARNING

    3 0 0 3

    Prerequisites:

  • 20XW21 APPLIED LINEAR ALGEBRA
  • 20XW22 PROBABILITY AND STATISTICS
  • 20XW43 OPERATIONS RESEARCH
  • INTRODUCTION: Machine learning – Types – Supervised learning, unsupervised, Reinforcement learning, semi supervised learning - Regression – Linear – Polynomial – Multiple regression – Evaluation measures – Bias –variance – overfitting – under fitting – Regularization (10)

    Classification: – Linear classification – Logistic regression – linear discriminant analysis – Optimization – Convex set - Convex functions – Convexity checking - Loss functions for classification and regression - Gradient descent – variants – Perceptron - Support Vector Machines – Linear, Soft margin, Linearly non separable data - Kernel functions (10)

    Neural networks: – Multilayer perceptron - Back propagation – Training – Bayesian Classifier – Decision theory – Maximum A Posteriori estimate – maximum likelihood estimate - K nearest neighbour classifier (10)

    Decision trees: – Introduction – Purity measures – Entropy, cross entropy, information gain, gain ratio, Gini Index – Regression trees – ID3 – Pruning – Model selection – Bootstrapping and cross validation – Model evaluation – Performance Measures – Receiver operating characteristic curve (ROC) – AUC (8)

    UNSUPERVISED LEARNING:– Clustering –Types - K-means – EM - Mixture of Gaussians –Spectral clustering - Cluster validity measures – dimensionality reduction- extraction – PCA (Principal components analysis) - ICA (Independent components analysis) - Applications : image segmentation – Image compression –Outlier analysis (7)

    Total L: 45

    TEXT BOOKS:
    1. Christopher M Bishop, “Pattern Recognition and Machine Learning”, Springer, 2016.
    2. Richard O Duda, Peter E Hart and David G Stork, “Pattern Classification (Digitized)”, John Wiley, 2012.

    REFERENCES:
    1. David Barber, “Machine Learning: A Probabilistic Approach”, http://www.idiap.ch/~barber, 2006.
    2. Alpaydin Ethem, “Introduction to Machine Learning”, Massachusetts Institute of Technology Press, 2020.
    3. Trevor Hastie, Robert Tibshirani and Jerome Friedman, “The Elements of Statistical Learning”, Springer, 2013.

    20XW54 PRINCIPLES OF COMPILER DESIGN

    3 2 0 4

    Prerequisites:

  • 20XW23 Data structures and algorithms
  • 20XW24 Object oriented Programming
  • 20XW31 Mathematical Foundations Of Computing
  • SYSTEMS PROGRAMMING: Language Processors – Data Structures for Language Processing – Introduction to Assemblers, Macro processors, Interpreters – Linkers and Loaders. (7)

    COMPILERS: Introduction – phases of compiler – Bootstrapping – Compiler writing tools – FLEX – BISON – JavaCC – PLY. (2)

    LEXICAL ANALYSIS: Role of a lexical analyzer – finite automata –regular expressions to finite automata – minimizing the number of states of a deterministic finite automata – implementation of a lexical analyzer. (6)

    PARSING TECHNIQUES: Context free grammars – derivations and parse trees – ambiguity – capabilities of context free grammars. Top down and bottom up parsing – handles – shift reduce parsing – operator precedence parsing – recursive descent parsing – predictive parsing. (9)

    AUTOMATIC PARSING TECHNIQUES: LR parsers – canonical collection of LR (0) items – construction of SLR parsing tables – LR1 sets of items construction – CLR parser – LALR parser. (6)

    SYNTAX DIRECTED TRANSLATION AND INTERMEDIATE CODE: Semantic actions – Implementation of syntax directed translations – Syntax directed definitions - Postfix notation, Quadruples, triples, indirect triples, Translation of Expressions - control flow – Representing information in a symbol table (9)

    CODE OPTIMIZATION: Basic blocks – DAG representation – error detection and recovery - code generation. (6)

    TEXT BOOKS:
    1. Development of a Lexical Analyzer.
    2. RecursiveDesign and Implementation of a Symbol Table Manager.
    3. RecursiveImplementation of the following Parsing algorithms.
      a. Recursive descent Parser
      b. Shift reduce Parser.
    4. Implementation of a Syntax Directed Translation Engine to
      a. Simulate a Desk Calculator
      b. Generation of Postfix code.
    5. MichaelImplementation of Lexical Analyser using FLEX.
    6. ThomasImplementation of Syntax Analyser using BISON.
    7. Implementation of Lexical Analyser and Syntax Analyser using JavaCC.
    8. Implementation of Lexical Analyser and Syntax Analyser using PLY.

    Total L: 45 + P:30 =75

    TEXT BOOKS:
    1. John J Donovan, “Systems Programming”, Tata McGrawHill,2012.
    2. Dhamdhere D M, “Systems Programming”, Tata McGrawHill,2012.

    REFERENCES:
    1. Alfred V Aho, Monica S Lam, Ravi Sethi, Jeffrey D Ullman, “Compilers: Principles, Techniques and Tools”, Pearson,2013.
    2. Dhamdhere D M, “Compiler Construction Principles and Practice”, Macmillan,2008.
    3. Allen I Holub “Compiler Design in C (Digitized)”, Prentice Hall, 2015.
    4. , “System Software: An Introduction to Systems Programming”, Pearson India, 2002.

    20XW55 PROFESSIONAL ELECTIVE I

    20XW56 UNIX SHELL AND SYSTEM PROGRAMMING LAB

    0 0 4 2

    1. Simple Bash shell Programs with basic Unix Commands – Essential Commands, General Purpose Utilities, Filters, Process and Communication.
    2. Bash Shell Programs for Regular Expressions using grep family, sed and awk.
    3. Bash Shell Programs using advanced programming concepts like getopts.
    4. Low level File, Process and IPC System Calls using C.
    5. Implement a package using Shell Programming / System Calls

    Note: Separate Problem Sheets will be provided for Shell and System Calls.

    Total P: 60

    20XW57 JAVA PROGRAMMING LAB

    0 0 4 2

    1. To create runtime polymorphism using abstract class, interface
    2. To create callback feature using interface.
    3. To create a program for interface inheritance
    4. To implement a user defined package
    5. To implement a user defined checked exception and unchecked exception
    6. To create threads, thread groups
    7. To create inter-thread communication using shared memory, piper stream.
    8. To implement socket connections (UDP, TCP).

    Total P: 60

    20XW58 MACHINE LEARNING LAB

    0 0 4 2

    Download the datasets from UCI machine learning repository / www.kaggle.com for classification and clustering; Evaluate Performance measures for classification / clustering.
    1. Implement linear, polynomial and multiple regression.
    2. Implement the following Classification algorithms for the above datasets.
      a. Naïve Bayes Algorithm
     b. Decision tree
     c. SVM
     d. K nearest neighbour
     e. Perceptron
     f. Multi-Layer Perceptron
    3. Do tenfold cross validation experiments and statistical validation using t-test and ANOVA.
    4. Implement different clustering techniques : K means, AGNES

    Total P: 60

    20XW61 MOBILE COMPUTING

    3 0 0 3

    Prerequisites:

  • 20XW42 COMPUTER NETWORKS AND TCP/IP
  • 20XW52 JAVA PROGRAMMING
  • INTRODUCTION: Introduction to mobile and wireless devices - wireless networking, Advantages and disadvantages of wireless networking, Evolution of mobile communication generations- Challenges in mobile computing – Vertical and horizontal mobile applications - Wireless LAN and Wireless WAN. (5)

    CELLULAR CONCEPT: Wireless transmission - Frequencies for radio transmission - Regulations - Signals , Antennas , Signal propagation ,Path loss of radio signals , Additional signal propagation effects - Multi-path propagation - Multiplexing - Space division multiplexing - Frequency division multiplexing -Time division multiplexing - Code division multiplexing - Spread spectrum - Direct sequence spread spectrum - Frequency hopping spread spectrum. (10)

    CELLULAR NETWORK : Cellular Concepts – Factors determining cell size and shape - GSM-Mobile services - System architecture -- Handover – GPRS – Mobile services – System architecture – Location Management strategies – Eager caching Vs lazy caching - LTE Network architecture and interfaces (10)

    MOBILE APPLICATIONS ARCHITECTURE: Smart Client – Smart Client Architecture – Messaging Architecture – The Model-View-Controller Model- Delegate Pattern- Building Smart Client Applications-Design, Development, implementation, testing and deployment phase- MVVM mobile architecture design. (6)

    MOBILE APPLICATION DEVELOPMENT: Introduction to Android Platform – Android architecture overview - Application life cycle - UI design for Android - Different types of layouts – Widgets – List view and Adapters - Dialogs and Toasts – Intent filters - Files and database – SQLite on Android - Security model – Comparison with IOS application development -Building cross-platform applications using React Native. (14)

    Total L: 45

    TEXT BOOKS:
    1. Jochen Schiller, “Mobile Communications”, Pearson Education, 2012.
    2. Martyn Mallick, “Mobile and Wireless Design Essentials”, Wiley, 2003
    3. Bill Philips, Kristin Marsicano and Chris Stewart, “Android Programming : The big Nerd Ranch guide”, O’Reilly, 2017.

    REFERENCES:
    1. Andreas F.Mohisch, “Wireless Communications”, Wiley, 2010.
    2. David Taniar, “Mobile computing concepts, methodologies, tools and applications”, IGI Global, 2009.
    3. Ronan Schwarz, Phil Dutson, James Steele and Nelson To, “The Android Developer's Cookbook -Building Applications with the Android SDK”, Addison Wesley, 2013.

    20XW62 ARTIFICIAL INTELLIGENCE

    3 2 0 4

    PREREQUISITE

  • 20XW31 MATHEMATICAL FOUNDATIONS OF COMPUTING
  • 20XW22 PROBABILITY AND STATISTICS
  • 20XW23 DATA STRUCTURES AND ALGORITHMS
  • KNOWLEDGE REPRESENTATION AND REASONING: Knowledge representation - Logics - bivalent logic - inference - Fuzzy logic: membership - Fuzzy rules and reasoning - Fuzzy inference (8)

    UNCERTAIN KNOWLEDGE AND PROBABILISTIC REASONING: Uncertainty - Probabilistic reasoning - Semantics of Bayesian network - Exact inference in Bayesian network- Approximate inference in Bayesian network - Probabilistic reasoning over time – Inference in temporal models - Hidden Markov Models – Dynamic Bayesian Networks (10)

    DECISION-MAKING: Basics of utility theory, Utility functions - Sequential decision problems - Markov decision process - Value iteration - Policy iteration - Decisions in Multi agent system: Multi agent decision theory - Group decision making (10)

    TUTORIAL PRACTICE:
    1. Search Techniques: A* algorithm for 8 – puzzle and Missionaries and Cannibals problem, Hill climbing, genetic algorithm and Constraint satisfaction techniques
    2. Simple games – minimax and expectimax
    3. Logic based exercises, Fuzzy Inference System.
    4. Decision making: Implementing HMM models, sequential and multi agent decision making

    Total: L: 45+T: 30 = 75

    TEXT BOOKS:
    1. Stuart Russell and Peter Norvig, “Artificial Intelligence: A Modern Approach”, Pearson Education, 2020.
    2. David Pool and Alan Mackworth, “Artificial Intelligence: Foundations of Computational agents”, Cambridge University Press, 2017.
    3. Timothy Ross, “ Fuzzy Logic with Engineering Applications”, John Wiley and sons, 2016.
    4. Tsang and Edward, “Foundations of Constraint Satisfaction: The Classic Text”, Academic Press, 2014.

    REFERENCES:
    1. Christopher M.Bishop, “Pattern Recognition and Machine Learning”, Springer, 2013.
    2. Nils J. Nilsson, “The Quest for Artificial Intelligence: A History of Ideas and achievements”, Cambridge University Press, 2010.

    20XW63 SOFTWARE PATTERNS

    3 2 0 4

    Prerequisites:

  • 20XW24 Object Oriented Programming
  • 20XW44 Software Engineering Techniques
  • INTRODUCTION TO PATTERNS: Reusable object oriented software, Motivation, Best design practices of object oriented software, Coupling and Cohesion, Types of Cohesion and Coupling, Benefits of patterns, Definition of a Pattern, Types, Pattern description, Pattern Language, IDIOMS, Framework, Architecture. (6)

    DESIGN PATTERNS: Creational patterns – Abstract factory, Builder, Factory method, Prototype, Singleton, Structural patterns – Adapter, Bridge, Composite, Decorator, Façade, Flyweight, Proxy, Behavioral patterns – Command, Interpreter, Iterator, Mediator, Memento, Observer, State, Strategy, Template method, Visitor, Chain of Responsibility, Case Studies.(15)

    ARCHITECTURAL PATTERNS: From Mud to Structure – Layers, Pipes and Filters, Blackboard, Distributed systems – Broker, Interactive Systems – Model View Controller (MVC), Presentation Abstraction Control, Adaptable Systems – Reflection, Microkernel. Anti-Patterns. (13)

    REFACTORING: What is refactoring, Principles in refactoring, Bad smells in code, Refactoring Techniques - Composing methods, Moving features between objects, Organizing data, Simplifying conditional expressions, Making method calls simpler, Dealing with generalization. Design Refactoring – Technical Debt, Design Smells, Abstraction Smells, Encapsulation Smells, Modularization Smells, Hierarchy Smells, Architectural Refactoring. Refactoring Tools. (11)

    TUTORIAL PRACTICE:
    1. Developing object oriented systems using Design Patterns.
    2. Designing and giving architectural solutions to real time systems using Architectural Patterns.
    3. Refactoring open source projects using Refactoring tools.
    4. Developing simple refactoring tools.
    5. Adopt new refactoring techniques to make the implementation more reusable.

    Total L: 45+T: 30=75

    TEXT BOOKS:
    1. Erich Gamma, Richard Helm, Ralph Johnsons and John Vlissides, “Design Patterns: Elements of Reusable Object-Oriented Software”, Pearson Education, 2009.
    2. Frank Buschman, RegineMeunier, Hans Rohnert, Peter Sommerlad and Michael Stal, “Pattern-Oriented SoftwareArchitecture: A System of Patterns”, John Wiley, 2011.
    3. Martin Fowler, Kent Beck, William Opdyke, Don Roberts, “Refactoring: Improving the Design of Existing Code”, Addison-Wesley Longman, 2012.

    REFERENCES:
    1. SherifYacoub, HanyAmmar, “Pattern-Oriented Analysis and Design: Composing Patterns to Design Software Systems”, Pearson Addison-Wesley, 2003.
    2. GirishSuryanarayana, Ganesh Samarthyam, Tushar Sharma, “Refactoring for Software Design Smells: Managing Technical Debt”, Morgan Kaufmann Publishers, Elsevier Inc., 2014.

    20XW64 SECURITY IN COMPUTING

    3 2 0 4

    Prerequisites:

  • 20XW33 OPERATING SYSTEMS
  • 20XW42 Computer Networks and TCP/IP
  • SECURITY BASICS:Overview of security principles –Threats - Attacks - vulnerabilities - Services and Mechanisms - Classical cryptosystem – Symmetric key and Asymmetric key cryptosystem – AES and RSA – Attacks on RSA- Data Integrity - Hashing - Properties- Digital signatures – DSS algorithm. (7)

    AUTHENTICATION AND ACCESS CONTROL: Types of authentication – Challenge response protocol –Fiat Shamir protocol - Zero knowledge protocol – Access control - models (4)

    SOFTWARE SECURITY AND TRUSTED SYSTEMS: Malicious and non-Malicious programs – Buffer overflows - Fast flux - Covert channels -Defense mechanisms – Operating system security -Security Policies - Types - Trusted Computing - Trusted OS design -Virtualization security -containers (6)

    OPERATING SYSTEM SECURITY : Windows security - Understanding User Authentication- Securing Access with Permissions - Unix Security Overview -Achieving Unix Security - Protecting User Accounts and Strengthening Authentication - Limiting Super user Privileges - Securing Local and Network File Systems - Network Configuration - Hardening Linux and Unix. (8)

    SECURITY AT NETWORK LAYER: Network layer threats and security controls –Security problems in TCP/IP protocol suite – DNS Cache poisoning - IPSec – modes – security protocols – SA – Internet key exchange (6)

    ETHICAL HACKING AND PENETRATION TESTING : Principles of Intrusion detection – types– Architecture - Intrusion Detection and response - Network penetration testing- reconnaissance – scanning- Exploitation (8)

    WEB APPLICATION SECURITY : Email security – PGP –– S/MIME – Web Security – Cross site scripting – SQL injection attacks – Defense methods- Session integrity for web applications- SSL Architecture – Secure session management-- Session hijacking - securing a web server (6)

    TUTORIAL PRACTICE:
    1. Design of a Client server application for a basic cryptosystem
    2. Performing a frequency analysis attack on a cipher text enciphered with Affine cipher
    3. Detection of a Buffer overflow attack
    4. Packet Sniffing using Wireshark Tool to perform the traffic analysis attack
    5. Generation of keys using pseudorandom generators
    6. Implementation of RSA cryptosystem
    7. Key distribution using RSA( KDC) – Key hacking
    8. Key exchange using Diffie- Hellman technique – MITM attack
    9. Authentication of File transfer using Hashing / Message digest
    10. Digital signature, generation and verification
    11. Password authentication
    12. Transaction security using SQL Injection attacks
    13. Security testing for applications.
    14. Packages using the concepts of IPSec, SSL and Query control

    Total L: 45+T: 30=75

    TEXT BOOKS:
    1. Roberta Bragg, Mark Rhodes, Keith Strass Berg J, “Network Security - The complete reference”, Tata McGraw Hill, 2017.
    2. John r. Vacca , “Network and system security”, Syngress Elsevier, 2014.
    3. Patrick Engebretson ,David Kennedy , “The Basics of Hackingand Penetration Testing”, Syngress Elseiver, 2013.
    4. , “Microsoft Windows Security Essentials”, Wiley, 2011.
    5. Behrouz A. Forouzan, “Cryptography and Network Security”, Tata McGraw Hill, 2010.

    REFERENCES:
    1. William Stallings, “Cryptography and Network Security: Principles and Practice”, Pearson Education, 2014.
    2. Charles P. Pfleeger and Lawrence Pfleeger,”Security in Computing”, Pearson Education, 2006
    3. Jaegar A, “Operating Systems Security – Synthesis Lectures on Information Security, Privacy and Trust”, Morgan & Claypool Publishers, 2008.
    4. Matt Bishop, “Introduction to Computer Security”, Pearson Education, 2009
    5. Joseph MiggaKizza, “A guide to Computer Network Security”, Springer, 2009.

    20XW65 PROFESSIONAL ELECTIVE II

    20XW66 MOBILE COMPUTING LAB

    0 0 4 2

    1. Android SDK installation and study
    2. Defining Layouts
    3. Single Activity Application, Application with multiple activities, using intents to Launch Activities
    4. Application using GUI Widgets
    5. Application with Notifications
    6. Creating and Saving Shared Preferences and Retrieving Shared Preferences
    7. Usage of SQLite Databases for storage
    8. Working with Retrofit library in Android Applications
    9. Android Automated Testing Frameworks
    10. Case Study: Dagger Framework for Android

    Total P: 60

    20XW67 ARTIFICIAL INTELLIGENCE LAB

    0 0 4 2

    1. Search Techniques: A* algorithm for 8 – puzzle and Missionaries and Cannibals problem, Hill climbing, genetic algorithm and Constraint satisfaction techniques
    2. Simple games – minimax and expectimax
    3. Logic based exercises, Fuzzy Inference System.
    4. Decision making: Implementing HMM models, sequential and multi agent decision making

    Note:Separate Problem Sheets will be provided.

    Total P: 60

    20XW68 DISTRIBUTED ENTERPRISE COMPUTING LAB

    0 0 4 2

    DISTRIBUTED MULTI-TIER COMPUTING: Introduction – Basis of distributed computing - Centralized vs Distributed systems – Distributed operation system – Single System image – transparencies– decomposition approaches – layers and tiers.

    CLIENT/SERVER COMPUTING: Approaches to client server computing –enterprise architectural overview - component based software development for enterprise – java enterprise system - operating system services for client – server types – server side scripting – operating system services for server – client and server software requirements

    MIDDLEWARE: Architecture – classification of middleware – database middleware – drivers, connection, statements - communication middleware – transaction middleware – isolation – interfacing.

    ENTERPRISE WEB COMMUNICATION: Java servlets – HTTP Servlet, generic servlets, Java server pages – elements of JSP – JSTL.

    MULTI-TIER ENTERPRISE COMPUTING: Middleware services – development and deployment - Enterprise Java Beans – types – lifecycle – entities – POJO – POJI – Java persistent query language - accessing ejbs using JSP – XML processing APIs

    DISTRIBUTED ENTERPRISE COMMUNICATION: RMI – CORBA – DCOM – Java Messaging Service – Message oriented middleware services – publish/subscribe messaging – AJAX – JSON

    JAVA WEB SERVICES: Web service standards – Describing and publishing – JAX-WS – SOAP

    DISTRIBUTED ENTERPRISE SYSTEMS: Services using EJB: Naming Services, Directory and Trading services, Activation Services, Transaction Services, Security Services

    FRAMEWORKS: Struts - Java Server Faces – Spring – Hibernate – Ruby on Rails

    Total L: 60

    Exercise:

    1. Develop a host application and install it in another system.
    2. Convert the developed application to two, three and multi-tiered application using the latest front and back end technologies.
    3. Migrate the application to distributed environment.
    4. Demonstrate the communication between the tiers using interfaces.
    5. Session beans.
    6. Entity and Message Driven Beans.
    7. RMI communication between two applications.
    8. Web Service with its client.
    9. Conversion of entity bean to web service.
    10. Java Transaction API.
    11. Application using any one of the frameworks.

    TEXT BOOKS:
    1. Robert Orfali, Dan Harkey and Jeri Edwards, “Client / Server survival Guide”, Wiley, 2011.
    2. Rima Patel Sriganesh, Gerald Brose and Micah Silverman, Mastering Enterprise JavaBeans 3.0”, Wiley, 2006.
    3. Rod Johnson, Juergen Hoeller, Alef Arendsen, Thomas Risberg and Colin Sampaleanu, “Professional Java Development with the Spring Framework”, Wiley, 2008.

    REFERENCES:
    1. George Reese, “Database programming, with JDBC and Java", O’Reilly, 2013.
    2. Dustin R. Callaway - "Inside Servlets " Pearson Education, 2009.
    3. Sam Ruby, Dave Thomas, David Heinemeier Hansson, “Agile Web Development with Rails (Pragmatic Programmers)”, Pragmatic Bookshelf, 2011.
    4. Dave Minter and Jeff Linwood, ““Beginning Hibernate: From Novice to Professional”, Apress, 2010.
    5. Ted Husted, Cedric Dumoulin, George Franciscus, David Winterfeldt, and Craig R McClanahan, “Struts in Action: Building Web Applications with the Leading Java Framework”, Manning Publications, 2006.
    6. Craig Walls and Ryan Breidenbach, “Spring in Action”, Dreamteach, 2008.
    7. Mike Keith and Merrick Schincariol, “Pro EJB 3: Java Persistence API ( Experts Voice in Java)”, APress, 2006.

    20XWP1 PROJECT WORK I

    20XW81 INFORMATION RETRIEVAL

    3 0 0 3

    Prerequisites:

  • 20XW32 DATABASE MANAGEMENT SYSTEM
  • 20XW23 DATA STRUCTURES AND ALGORITHMS
  • INTRODUCTION: Overview of IR Systems - Historical Perspectives - Goals of IR - The impact of the web on IR - The role of artificial intelligence (AI) in IR. (3)

    TEXT REPRESENTATION: Statistical Characteristics of Text: Zipf's law; Porter stemmer; morphology; index term selection; using thesauri. Basic Tokenizing, Indexing: Simple tokenizing, stop-word removal, and stemming; inverted indices; Data Structure and File Organization for IR - efficient processing with sparse vectors. (6)

    RETRIEVAL MODELS: Similarity Measures and Ranking - Boolean Matching – Extended Boolean models - Ranked retrieval - Vector Space Models -, text-similarity metrics - TF-IDF (term frequency/inverse document frequency) weighting - cosine similarity, Probabilistic Models, Evaluations on benchmark text collections. (8)

    QUERY PROCESSING: Query Operations and Languages- Query expansion; Experimental Evaluation of IR: Performance metrics: recall, precision, and F-measure. (5)

    TEXT CATEGORIZATION AND CLUSTERING: Categorization: Rocchio; Naive Bayes, kNN; Clustering: Agglomerative clustering; k-means; Expectation Maximization (EM); Dimension Reduction: LSI, (6)

    WEB SEARCH: IR Systems and the WWW - Search Engines: Spidering, Meta Crawlers and near duplicate pages, Question answering, Link analysis: Hubs and Authorities, Google PageRank, Duplicate Detection. (5)

    INFORMATION FILTERING TECHNIQUES: introduction to Information Filtering, Relevance Feedback - Applications of Information Filtering: RECOMMENDER SYSTEMS: Collaborative filtering and Content-Based recommendation of documents and products. (6)

    INFORMATION EXTRACTION AND INTEGRATION: Extracting data from text; Basic Techniques: Named Entity Recognition, Co-reference Resolution, Relation Extraction, Event Extraction; Extracting and Integrating specialized information on the Web, Web Mining and Its Applications. (6)

    Total L: 45

    TEXT BOOKS:
    1. Christopher D. Manning, Prabhakar Raghavan and Hinrich Schütze, “Introduction to Information Retrieval”, Cambridge University Press, 2012.
    2. Stefan Büttcher, Charles L. A. Clarke, Gordon V. Cormack, “ Information Retrieval – Implementing and Evaluating Search Engines “, The MIT Press, 2016
    3. B.Croft, D. Metzler, T. Strohman, Information Retrieval in Practice, Pearson Education, 2015. (Digitized)

    REFERENCES:
    1. Stephan Buttcher, Charles L.A. Clarke, and Gordon V. Gormack, “ Information Retrieval Implementing and Evaluating Search Engines”, MIT Press, 2010.
    2. Ricardo Baeza-Yates and Berthier Ribeiro-Neto, “Modern Information Retrieval”, Pearson Education, 2010.
    3. Francesco Ricci, Lior Rokach, Bracha Shapira, Paul B. Kantor, Recommender Systems – Handbook, Springer, 2011.

    20XW82 DATA MINING

    3 0 0 3

    Prerequisites:

  • 20XW53 MACHINE LEARNING
  • INTRODUCTION: Motivation for Data Mining – Importance – Definition – Kinds of data for Data Mining – Data Mining functionalities – Patterns – Classification of Data Mining Systems – Major issues in Data Mining-Overview of Data Mining Techniques. PREPROCESSING: Types of data, Data cleaning-Smoothing, Handling missing values- Feature subset selection Sampling methods.(10)

    DATA WAREHOUSE and OLAP TECHNOLOGY: Overview- Need for Data Warehouse- multidimensional data model-Data Warehouse architecture -Data warehousing Schemas - Data Warehousing to Data mining (4)

    MINING FREQUENT PATTERNS, ASSOCIATIONS AND CORRELATIONS: Basic concepts – Efficient and Scalable Frequent Itemset Mining methods – Apriori, FP Tree. CLASSIFICATION AND PREDICTION: Overview of Classification techniques –Ensemble Learning-bagging, boosting, cascading, stacking. CLUSTERING: Hierarchical – Density based(10)

    INCREMENTAL & STREAM DATA MINING:Incremental Algorithms for Data Mining, Characteristics of Streaming Data, Issues and Challenges, Streaming Data Mining Algorithms, Any time stream Mining(7)

    Sequence Mining: Characteristics of Sequence Data, Problem Modeling, Sequential Pattern Discovery, Timing Constraints, Applications in Bioinformatics Multivariate Time Series (MVTS) Mining: Importance of MVTS data - Sources of MVTS data - Mining MVTS data (8)

    APPLICATIONS AND TRENDS IN DATA MINING: Spatial Data Mining –Graph Mining- Web Mining –Text Mining.(6)

    Total L:45

    TEXT BOOKS:
    1. Jiawei Han and Micheline Kamber , “Data Mining – Concepts and Techniques”, Morgan Kaufmann Publishers, 2012.
    2. Tan, Steinbach and Kumar, “Introduction to Data Mining”, Pearson Education, 2014.

    REFERENCES:
    1. Anand Rajaraman, Jeffrey Ullman, “Mining Massive Data sets”, Cambridge University Press, 2014.
    2. Trevor Hastie, Robert Tibshirani and Jerome Freidman,”The Elements of Statistical Learning: Data Mining, Inference, and Prediction”, Springer Series in Statistics, 2011.
    3. Ian Witten, Frank Eibe and Mark A Hall, "Data Mining: Practical Machine Learning Tools and Techniques”, Elsevier, 2011.

    20XW83 SOFTWARE PROJECT MANAGEMENT

    3 0 0 3

    Prerequisites:

  • 20XW44 Software Engineering Techniques
  • Introduction: Software Projects various other types of projects - Problems with software projects - an overview of project planning - Project evaluation - Project Analysis and technical planning - Project estimates - Preparation of Estimates - COCOMO model - Function Point Analysis - Putnam Model - Non-development overheads. (10)

    Activity planning: Project schedules - Sequencing and scheduling projects - Network planning models - Shortening project duration - Identifying critical activities. (9)

    Risk management: Resource allocation - Monitoring and Control - Managing people and organizing teams - Planning for small projects - Handling large projects - Divide and Conquer - Software Project survival. (9)

    Software configuration management: Basic functions, responsibilities, standards, configuration Management, Prototyping - Models of prototyping. (9)

    Case study using Project management tools.

    Total L: 45

    TEXT BOOKS:
    1. Mike Cotterell and Bob Hughes, "Software Project Management - Inclination", Tata McGraw Hill, 2017.
    2. Robert K Wysocki, Robert Beck Jr and David B Crane, "Effective Project Management", John Wiley, 2015.

    REFERENCES:
    1. Steve McConnell, "Software Project Survival Guide", Microsoft Press, 2014.
    2. Gerald M Weinberg, "Quality Software Management: Systems Thinking“, Dorset House, 2014.
    3. Gerald M. Weinberg," Quality Software Management: First Order Measurement”, Dorset House, 2019.
    4. Pressman R S, "Software Engineering - A Practitioner's Approach", Tata McGraw Hill,2019.
    5. Darrel Ince, "An Introduction to S/W Quality Assurance and its Implementation", Tata McGraw Hill, 2015.

    20XW84 PROFESSIONAL ELECTIVE III

    20XW85 OPEN ELECTIVE I

    20XW86 INFORMATION RETRIEVAL LAB

    0 0 4 2

    EXERCISES

    1. Building a web crawler
    2. HITS/PageRank for ranking of Web Pages
    3. Spam detection personal mails in R
    4. Build a simple recommender system
    5. Designing a personalized Search Engine
    6. Identifying near duplicates in web pages
    7. Extracting information from web pages
    8. Designing a Desktop search engine

    Total P: 60

    20XW87 DATA MINING LAB

    0 0 4 2

    1. Implementation of data mining techniques using WEKA.
    2. Implementation of Association rule mining using Apriori algorithm and FP Growth algorithm
    3. Classification rules using Decision Tree classifier, Ensemble of Classifiers.
    4. Implementation of clustering algorithms
    5. Case studies using R programming
    6. A Package using data mining techniques based on research papers.

    Total P: 60

    20XW88 CAPSTONE PROJECT LAB

    0 0 4 2

    A multi-faceted project that can be chosen by the student based on his/her area of interest / Assigned by the faculty.

    Total P: 60

    20XW91COMPUTER VISION AND IMAGE ANALYSIS

    3 0 0 3

    Prerequisites:

  • 20XW21 APPLIED LINEAR ALGEBRA
  • 20XW22 PROBABILITY AND STATISTICS
  • 20XW23 DATA STRUCTURES AND ALGORITHMS
  • OVERVIEW: Computer Imaging Systems: Image formation and Sensing, Color representation, Image Acquisition, Image digitization, Noise, Image Representation. (4)

    DIGITAL IMAGE ANALYSIS: Preprocessing, Binary Image Analysis, Edge detection - First order derivative, Second order detection, Color edge detection, Pyramid edge detection, Edge linking and boundary detection, Segmentation - Region based segmentation, clustering techniques, boundary detection, thresholding. (8)

    IMAGE ENHANCEMENT: Gray-Scale Modification, Image Sharpening, Image Smoothing - Image Restoration - Noise Models, Noise removal using spatial filters, frequency domain filters, Geometric transforms, Image Reconstruction. (6)

    IMAGE TRANSFORMS: Overview of discrete transforms, Fourier Transform, Discrete Cosine transform, Discrete Haar transform, Principal components transform, Discrete Wavelet Transform, Filtering. (6)

    IMAGE FEATURE ANALYSIS: Overview, Feature Extraction - Shape, histogram, color, spectral, textural features, feature Analysis. Image Compression - Overview, Lossless compression methods, lossy compression methods. (5)

    MORPHOLOGICAL OPERATIONS: - Binary Dilation, Erosion, Opening and Closing, Hit-or-Miss Transform, Basic Morphological Algorithms, Extension to Gray-Scale Images. (4)

    IMAGE COMPRESSION: - Basic requirements, Types of compression, Coding Algorithms. (4)

    APPLICATIONS: – CBIR, CBVR, Activity Recognition, computational photography, Biometrics, stitching and document processing; Modern trends - super-resolution; GPU, Augmented Reality; cognitive models, fusion and SR&CS. (8)

    Total L: 45

    TEXT BOOKS:
    1. Umbaugh, S. E., “Digital image processing and analysis: human and computer vision applications with CVIP tools”, CRC press, 2010.
    2. Nagabhushan S, “Computer Vision and Image Processing”, New Age International, 2005.

    REFERENCES:
    1. Richard Szeliski, “Computer Vision: Algorithms and Applications”, Springer-Verlag, 2011.
    2. Richard Hartley and Andrew Zisserman, “Multiple View Geometry in Computer Vision”, Cambridge University Press, 2004.
    3. R.C. Gonzalez and R.E. Woods, “Digital Image Processing”, Addison- Wesley, 2014.

    20XW92 SOFTWARE TESTING

    3 0 0 3

    Prerequisites:

  • 20XW15 C Programming
  • 20XW24 Object Oriented Programming
  • Introduction:Need for testing – Psychology of testing – Testing economies – Types of testing – SDLC and testing – VerificationandValidation. (6)

    Developing a Test Approach: Defining a software system testing strategy - Developing software system testing tactics - Testing tools – Test Plan and Test Cases. (4)

    Testing a software using a life cycle methoogy: Requirements phase testing - Design phase testing - Program phase testing - Desk debugging and program peer view test tools - Evaluating test results - Installation phase testing - Acceptance testing. (10)

    Testing methodology for software maintenance: Testing the correctness of the installing a software change - Testing the validity of a software cost estimate - Testing the progress of the software system - Inspecting test plan and test cases - Software Inspection - Costs and Benefits - Overview - The Inspection Process. (8)

    TESTING OBJECT ORIENTED SOFTWARE: Challenges – Differences from testing non-OO software – Class testing strategies – class modality – State based testing. (3)

    TESTING METHODLOGIES : Testing Rapid Application Development– Testing Adequacy of System Documentation – Testing Web based systems-Testing off the shelf Software – Testing in Multi-platform environment – Testing Security – Testing Data warehouse – Testing Metrics – Evaluating test effectiveness (10)

    TECHNIQUES FOR AUTOMATING TEST EXECUTION: Testing and test automation – Tool support for lifecycle Testing - Common problems of test automation – limitations of automating software testing. (4)

    TotalL: 45

    TEXT BOOKS:
    1. William Perry, "Effective Methods for Software Testing", JohnWiley,2019.

    REFERENCES:
    1. John Watkins, “Testing IT: An off the shelf Software Testing Process”, Cambridge Press,2014.
    2. John Watkins, “Agile Testing: How to succeed in an extreme Testing environment”, Cambridge Press, 2019.
    3. Boris Beizer, “Software Testing Techniques”, Dream Tech Press, 2016.

    20XW93 DEEP LEARNING

    3 2 0 4

    Prerequisites:

  • 20XW53 MACHINE LEARNING
  • Introduction: – Basic concepts – Convex sets, convex functions – loss functions – Gradient descent – Variants - Perceptron – Activation functions - Geometric representation – Perceptron Convergence theorem (4)

    A:Feed Forward Networks - Multi layer Perceptron – back propagation - Learning XOR – Auto encoder - Deep neural networks (6)

    Training neural Networks: Optimization methods for neural networks - Adagrad, Adadelta, rmsprop, adam, NAG - second order methods for training, Saddle point problem in neural networks, Regularization methods - dropout, batch normalization, Ridge and Lasso (10)

    Convolutional networks: –structure – properties – Region based CNN - LeNet – Alex net (5)

    Recurrent networks: – Recurrent neural networks(RNN) – Gated Recurrent unit – Long Short Term Memory - Bidirectional RNNs - Deep recurrent network – Methodology – Applications (8)

    TUTORIAL PRACTICE:
    1. Collect data sets from the url : http://deeplearning.net/datasets/
    2. Use TensorFlow library for visualization of data sets in different domains and analysis:
     a. Music
     b. Image processing
     c. Image captioning
     d. Text analysis (Next word prediction,etc)
     e.  Speech processing
     f. OCR
     g. Machine translation

    Total L:45 =45

    TEXT BOOKS:
    1. Ian Goodfellow, Yoshua Bengio, and Aaron Courville ,, The MIT Press, 2016.
    2. Yoshua Bengio, Learning Deep Architectures for AI, Foundations & Trends in Machine Learning, 2009.

    20XW94 PROFESSIONAL ELECTIVE IV

    20XW95 OPEN ELECTIVE II

    20XW96 DEEP LEARNING LAB

    0 0 4 2

    1. Collect data sets from the url : http://deeplearning.net/datasets/
    2. Use TensorFlow library for visualization of data sets in different domains and analysis:
     a. Given a set of images of handwritten digits from MNIST, classify the images into digits
     b. Do image captioning using RCNN
     c. Text classification using CNN
     d. Language modeling using RNN
     e. Speech processing
     f. Optical character recognition using CNN and RNN
     g. Sentiment analysis and classification using LSTM
     h. Document classification / Radiology reports classification
     i. Visualization of CNN and RNN parameters
     j. POS tagging using RNN
     k. Dimensionality reduction using Autoencoders

    Total P: 60

    20XW97 COMPUTER VISION LAB

    0 0 4 2

    EXERCISES:

    1. Implementation of Image segmentation and edge detection.
    2. Implementation of feature extraction.
    3. Implementation of image classification and clustering.
    4. Developing simple image analysis applications

    Note:Separate Problem Sheets will be provided.

    Total P: 60

    20XW98 FUNCTIONAL PROGRAMMING LAB

    0 0 4 2

    INTRODUCTION: What is FP – Functional Programming in Scala – Functional data structures – Handling error without exceptions – Strictness and laziness – Purely functional state..

    FUNCTIONAL DESIGN AND COMBINATOIR LIBRARIES: Purely functional parallelism – Property-based testing – Parser combinators.

    COMMON STRUCTURES IN FUNCTIONAL DESIGN: Monoids – Monads – Applicative and traversable functors.

    EFFECTS AND I/O: External Effects and I/O – Local effects and mutable state – Stream processing and incremental I/O.

    Total L: 60

    TUTORIAL PRACTICE:

    • Write well-typed functional programs using the language ML (Meta Language).
    • Develop specifications and prove program correctness using rigorous techniques.
    • Apply equational, evaluational, and compositional reasoning techniques, and use mathematical and structural induction in proofs.
    • Analyze sequential and parallel running time of programs using the concepts of work and span.
    • Develop cost graphs and recurrences from programs, and use them to derive asymptotic bounds on work and span.
    • Use abstract types and modules to structure code with clear and well-designed interfaces.
    • Identify opportunities for parallelism in code and exploit parallelism by choosing appropriate data structures and function designs.
    • Manual Code Review Process and recording the defects in specified format.
    • Testing the software package using open source Testing tools.
    • Creating a test plan document for the package and preparation of the test data for validation testing.
    • Using Rational Test Manager to design the test cases. Specification of test pre-conditions, post-conditions and acceptance criteria.
    • Using Rational Robot for recording and playback of test script related with the package.
    • Setting Debug options in Robot and playing back a script. Debugging compiler errors using Robot.
    • Testing the package for Load Testing with available testing tool.
    • Testing the package for Coverage Analysis using Rational Pure Coverage.
    • Testing the package for Reliability Testing using Rational Test Factory.
    • Testing the Package for Memory management errors using Rational Purify and elimination of those defects.

    TEXT BOOKS:
    1. Paul Chiusano, Rúnar Bjarnason, "Functional Programming in Scala", Manning Publications,2014.
    2. Alvin Alexander, “Functional Programming, Simplified”, Createspace Independent, 2017.

    REFERENCES:
    1. Daniel HigginBotham, “Clozure for the Brave and True”, No Starch Press, 2015.
    2. Kit Eason, “Stylish F#: Crafting Elegant Functional Code for .NET and .NET Core”, Apress, 2018.

    20XWP2 PROJECT WORK II

    20XWA1 MODELLING AND SIMULATION

    3204

    Prerequisites:

  • 20XW24 Object Oriented Programming
  • PRINCIPLE OF COMPUTER MODELLING AND SIMULATION: Monte Carlo simulation. Nature of computer modeling and simulation.Limitations of simulation, areas of application. (3)

    SYSTEM AND ENVIRONMENT: Components of a system - discrete and continuous systems. Models of a system - A variety of modelling approaches. (4)

    DATA-DRIVEN MODELS: Empirical Models-Introduction - Linear Empirical Model- Predictions-Linear Regression - Nonlinear One-Term Model - Multiterm Models - Advanced Fitting with Computational Tools (4)

    RANDOM NUMBER GENERATION: Techniques for generating random numbers - Midsquare method - The midproduct method - Constant multiplier technique - Additive congruential method - Linear congruential method - Tauswarthe method - Tests for random numbers - The Kolmogorov_Smirnov test - The Chi-square test. (5)

    RANDOM VARIABLE GENERATION: Inverse transform technique - Exponential distribution - Uniform distribution - Weibull distribution. Empirical continuous distribution - generating approximate normal variates - Erlang distribution. Empirical Discrete distribution - Discrete Uniform distribution - Poisson distribution - Geometric distribution - Acceptance - Rejection technique for Poisson distribution - Gamma distribution. (7)

    DESIGN AND EVALUATION OF SIMULATION EXPERIMENTS: Input - Output analysis - variance reduction techniques - Antithetic variables - verification and validation of simulation models. (5)

    DISCRETE EVENT SIMULATION: Concepts in discrete-event simulation, manual simulation using event scheduling, single channel queue, two server queue, simulation of inventory problem. (7)

    SIMULATION LANGUAGES: - GPSS - SIMSCRIPT - SIMULA - SIMPLE_1, Programming for Discrete event systems in GPSS, SIMPLE_1 and C. (5)

    CASE STUDIES: Simulation of LAN - Manufacturing system - Hospital system. (5)

    TUTORIAL PRACTICE:
    1. Implement variance reduction.
    2. Implement event scheduling.
    3. Simulate inventory problem.
    4. Simulate a manufacturing system.

    Total L: 45+T: 30=75

    TEXT BOOKS:
    1. Jerry Banks and John S. Carson, "Discrete Event System Simulation", Prentice Hall, 2013.
    2. AngelaB.ShifletandGeorge W. Shiflet, “ Introduction to Computational Science: Modeling and Simulation for theSciences”, Princeton University Press, 2014

    REFERENCES:
    1. Mohsen Guizani, AmmarRayes, Bilal Khan, Ala Al-Fugaha, “Network Modelling and Simulation - A Practical Perspective”, John Wiley, 2010.
    2. Averil M Law , "Simulation Modelling and Analysis", Tata McGraw Hill,2014.

    20XWA2 BIG DATA AND MODERN DATABASE SYSTEMS

    3 2 0 4

    Prerequisites:

  • 20XW32 DATABASE MANAGEMENT DESIGN
  • 20XW34 DESIGN AND ANALYSIS OF ALGORITHMS
  • OBJECT AND SPATIAL DATABASES: Object Oriented Databases - Complex data types - Structured types and Inheritance - Query Processing in Object databases - Spatial Databases : Geometric Information System - Spatial Data Types – Spatial Queries - Spatial indexing techniques (6)

    PARALLEL AND DISTRIBUTED DATABASES: Architecture of parallel databases – Parallel query evaluation, Parallel query optimization – Distributed DBMS Architecture, Distributed Database Design, Distributed Query Processing (5)

    DATA MODELING FOR BIG DATA: Big Data and Challenges, Big Data models, NoSQL data models, Basic principles of NoSQL models, BASE properties, CAP Theorem, SQL databases Vs NoSQL databases - MAP-REDUCE: Apache Hadoop and HDFS, SPARK (10)

    NOSQL DATABASES (PART 1): Key - Value Stores: Amazon DynamoDB, Key -Value Stores (in-memory) : Redis , Column Oriented Store: Google BigTable , Apache Cassandra - Hbase. (10)

    NOSQL DATABASES (PART 2): Document Oriented Stores – MongoDB - Apache CouchDB - Graph databases: Neo4J - OrientDB (9)

    DATABASE INTEGRATION: Data warehousing, Virtual Data Integration - Schema directed data integration - Schema mapping and information preservation (5)

    PROJECT WORK IN:
    1. DeterminationORDB, Spatial databases,.Distribution using Map-Reduce on Big Data (Hadoop).
    2. BehrouzData Integration from heterogeneous Databases.
    3. No-SQL databases- DynamoDB, MongoDB, Cassendra, Neo4J, Redis.

    Total L:45+T:30=75

    TEXT BOOKS:
    1. Pramod J. Sadalage and Martin Fowler, “NoSQL Distilled - Brief Guide to the Emerging World of Polyglot Persistence”, Pearson Education, 2013.
    2. Guy Harrison, “Next generation Databases: NoSQL and BigData”, Apress, 2015.
    3. Kristina Chodorow, “MongoDB: The Definitive Guide”, O’Reilly Media, 2019
    4. Holden Karau, Andy Konwinski, Patrick Wendell, Matei Zaharia, “Learning Spark: Lightning-Fast Big Data Analysis”, O'Reilly Media, 2015

    REFERENCES:
    1. Ramez Elmasri and Shamkrant Navathe, “Fundamentals of Database Systems”, Addison Wesley, 2013.
    2. M.Tamer Ozsu, Patrick Valduriez, “Principles of Distributed Database Systems”, 2011.
    3. Anhai Doan, Alon Halevy, Zachary Ives, “Principles of data integration”, Morgan Kaufmann, 2012.

    20XWA3 SOFTWARE METRICS

    3 2 0 4

    Prerequisites:

  • 20XW22 PROBABILITY & STATISTICS
  • 20XW44 SOFTWARE ENGINEERING TECHNIQUES
  • Fundamentals of Measurement: Measurement in Software Engineering-Scope of Software Metrics - Measurement and Models-Measurement scales and scale types-Classifying software measures - Software Measurement validation - Software Metrics Data collection - Analyzing software measurement data. (10)

    Measuring internal product attributes: Size and Structure - Measuring external product attributes. (5)

    Software Reliability: Measurement and prediction - Parametric Reliability Growth models - The recalibration of software reliability growth predictions. (10)

    Resource Measurement: Productivity, teams and tools- Making process predictions - Good estimates - Models of effort and cost - Dealing with Problems of current estimation methods. (10)

    Measurement and Management: Planning - Measurement program - Measurement tools-Measurers - analysts - audience - Measurement in practice. (10)

    TUTORIAL PRACTICE:
    1. Complete the time recording log and Defect Recording log.
    2. PSP Programming assignment.
    3. Assess the Quality of the Student’s PSP Data and record your observations in the specified format.
    4. Estimate the size of the program using PSP Techniques and record it in the specified format.
    5. Design Review Exercise.
    6. Code Review exercise.
    7. Exercise for measuring process and product quality.
    8. Development of Project Plan.
    9. Measurement of the quality of Team’s process and Product.

    Total L: 45+T: 30=75

    TEXT BOOKS:
    1. NormanE Fenton and Shari Lawrence Pfleeger, "Software Metrics", Thomson Brooks/Cole, 2018.

    REFERENCES:
    1. Stephen H Khan, "Metrics and Models in Software Quality Engineering", Pearson Education, 2015.
    2. Dick B Simmons and Newton C Ellis, "Software Measurement", Prentice Hall, 2014.

    20XWA4 PARALLEL AND DISTRIBUTED COMPUTING

    3 2 0 4

    Prerequisites:

  • 20XW25 Computer Organization
  • 20XW35 MICROPROCESSOR SYSTEMS AND PROGRAMMING
  • 20XW33 OPERATING SYSTEMS
  • INTRODUCTION : Forms of Computing – Monolithic – Distributed – Parallel-Cooperative - Computational demands of parallel processing, Flynn’s classification – Terminology. (5)

    PARALLEL COMPUTER ARCHITECTURES: Classification – Inter connection networks – Vector computers – Shared memory parallel computers – Cache coherence – Distributed shared memory parallel computers – Message passing parallel computers – Cluster of workstations. (5)

    PARALLEL PROGRAMMING MODELS: Shared memory model, Message passing model - Synchronous and Asynchronous message passing models, Leader-Election algorithm, Breadth-First Search. Shortest Paths, Broadcast and Converge cast, Data Parallel model. (7)

    PARALLEL ALGORITHMS : Models of parallel computation including PRAM - CRCW, CREW, ERCW, EREW models, Design and analysis of Parallel algorithms: : Automatic vs. Manual Parallelization – Understand the Problem and the Program – Partitioning – Communications – Synchronization – Data Dependencies – Load Balancing – Granularity – I/O – Limits and Costs of Parallel Programming – Performance Analysis and Tuning – Parallel Examples – Array Processing Matrix multiplication, Sorting, Searching, Merging, Minimum spanning tree, Prime numbers. (10)

    DISTRIBUTED PROGRAMMING ALGORITHMS: Fundamental issues and concepts - Synchronization, Mutual Exclusion, Termination Detection, Clocks, Event ordering, Locking - Distributed Computing Tools & Technologies (CORBA, JavaRMI, Web Services). (5)

    EMERGING AREAS OF PARALLEL AND DISTRIBUTED SYSTEMS: Grid computing, Peer-to-peer systems, Overlay networks, Edge computing and Ad-hoc networks. (5)

    TUTORIAL PRACTICE:
    1. Analyze Parallel algorithms to predict performance.
    2. Implement Dekker’s algorithm.
    3. Implement Dinning philosopher algorithm.
    4. Implement Array processing.
    5. Implement Matrix Computation, Searching and Sorting algorithms using parallel processing.
    6. Implement parallel algorithms using MPI.
    7. Analyze the implementation of the above algorithms in a distributed environment.

    Total L: 45+T: 30=75

    TEXT BOOKS:
    1. Quinn Michael J, "Designing Efficient Algorithms for Parallel Computers", Tata McGraw Hill, 2004.
    2. Wilkinson B and Allen M, “Parallel Programming: Techniques and Applications Using Networked Workstations and Parallel Computers”, Prentice Hall, 2005.

    REFERENCES:
    1. Hariri and Parashar, “Tools and Environments for Parallel and Distributed Computing”, John Wiley, 2004.
    2. Jean Dollimore,TimKindberg and George Coulouris, “Distributed Systems: Concepts and Design”, Addison Wesley, 2011.
    3. Michael J Quinn, “Parallel Computing: Theory and Practice”, Tata McGraw-Hill, 2004.
    4. Joel M.Crichlow, “Distributed And Parallel Computing”, Prentice Hall Of India, 2004.
    5. Andrew S Tannenbaum and Maarten Van Steen, “Distributed Systems, Principles and Paradigm” Prentice Hall, 2013.
    6. Vijay K Garg,”Elements of Distributed Computing”, John Wiley, 2014.

    20XWA5 DATA COMPRESSION

    3 2 0 4

    Prerequisites:

  • 20XW22 PROBABILITY AND STATISTICS
  • 20XW23 DATA STRUCTURES AND ALGORITHMS
  • 20XW33 TRANSFORM TECHNIQUES
  • DATA COMPRESSION LEXICON: Introduction to Data Compression - Dawn Age - Coding - Lossy Compression. (4)

    MINIMUM REDUNDANCY CODING (THE DAWN AGE): The Shannon - Fano Algorithm, The Huffman Algorithm - Into the Huffman Code : Counting the Symbols, Building the tree . (5)

    ADAPTIVE HUFFMAN CODING: Adaptive Coding - Updating the Huffman Tree - Escape code. (5)

    ARITHMETIC HUFFMAN CODING: Arithmetic Coding with floating point data type – Arithmetic coding with integral data type.(6)

    STATISTICAL MODELING: Higher-order Modeling - Finite Context Modeling – Order one modeling – Order two Modeling. (5)

    SPEECH COMPRESSION: Digital Audio Concepts - Lossless Compression of Sound.(5)

    VIDEO COMPRESSION: JPEG Compression - Implementing DCT - Complete Code Listing.(5)

    DICTIONARY-BASED COMPRESSION: LZ77 Compression and Decompression - LZSS Compression and Decompression - LZ78 Compression and Decompression - LZW Compression and Decompression – LZMW Compression and Decompression - LZAP Compression and Decompression – LZY Compression and Decompression.(10)

    TUTORIAL PRACTICE:
    1. Implement Shannon Fano algorithm and Huffman algorithm.
    2. Design compression and decompression program using adaptive Huffman coding.
    3. Implement arithmetic coding algorithm.
    4. Design compression program using statistical modeling upto 3 order.
    5. Design compression and decompression program using LZ77 algorithm.

    Total: L: 45+T: 30 = 75

    TEXT BOOK:
    1. Khalid Sayood, “Introduction to Data Compression”, Morgan Kaufmann, 2013.
    2. David Salomon, “Data Compression: The Complete Reference”, Springer, 2014

    REFERENCES:
    1. 1. Charles K. Chui, Qingtang Jiang, "Applied Mathematics: Data Compression, Spectral Methods, Fourier Analysis, Wavelets and Applications", Atlantic Press, 2013

    20XWA6 COMPUTER GRAPHICS AND VISUALIZATION

    3 2 0 4

    Prerequisites:

  • MATHEMATICS FOR COMPUTER SCIENCE
  • 20XW15 C PROGRAMMING
  • 20XW23 DATA STRUCTURES AND ALGORITHMS
  • 20XW24 OBJECT ORIENTED PROGRAMMING
  • GRAPHICS INPUT - OUTPUT DEVICES: Raster scan Displays - Random scan displays - Direct view storage tubes - Flat panel displays - Mouse - Track Ball - Joy Stick - Digitizers - Touch panels - LCD. GRAPHICAL USER INTERFACE AND INTERACTIVE INPUT METHODS: The user dialog - Input of graphical data - Input function - Interactive picture construction techniques - Virtual reality environments. (3)

    OPENGL: Architecture, The OpenGL API, Primitives and Attributes, Color, Viewing, Control Functions, Programming Event-Driven Input, Transformations, OpenGL Extensions.(3)

    TWO DIMENSIONAL GRAPHICS: Basic transformations - Matrix representation and homogeneous coordinates - Composite transformations - Line drawing algorithms: DDA and Bresenham's algorithms - Circle generation algorithms: Mid point circle algorithm - Point clipping - Line clipping: Cohen Sutherland algorithm - Polygon clipping: Sutherland Hodgeman algorithm - Line covering.(7)

    RASTER GRAPHICS: Fundamentals: generating a raster image, representing a raster image, scan converting a line drawing, displaying characters, speed of scan conversion, natural images - Solid area scan conversion: Scan conversion of polygons, Y-X algorithm, properties of scan conversion algorithms - Interactive raster graphics: painting model, moving parts of an image, feed back images. (7)

    CURVES AND SURFACES: Parametric representation of curves - Bezier curves – B-Spline curves - Parametric representation of surfaces - Bezier surfaces - Curved surfaces - Ruled surfaces - Quadric surfaces – Concatenation of two curve segments – Order of Continuity. (7)

    IMAGE PROCESSING FUNDAMENTALS: Sampling and Quantization, Image Enhancement - Histogram Processing, Filtering (8)

    THREE DIMENSIONAL GRAPHICS: 3D transformations - Viewing 3D graphical data - Orthographic, oblique, perspective projections - Hidden lines and hidden surface removal. (6)

    FRACTAL-GEOMETRY METHODS: Tiling the plane - Recursively defined curves - Koch curves - C curves - Dragons - Space filling curves - Fractals - Grammar based models - Graftals - Turtle graphics - Ray tracing. (4)

    Note: Algorithms in have to be implemented by using C++/ OpenGL.

    TUTORIAL PRACTICE:
    1. Implementation of Simple transformations.
    2. Implementation of Line drawing algorithms.
    3. Windowing and Line Clipping.
    4. Polygon clipping.
    5. Implementation of an Analog Clock.
    6. Polygon filling algorithms.
    7. Merging of a circle and square.
    8. Fractal drawing.
    9. Image Processing Functions

    Total L: 45+T: 30=75

    TEXT BOOKS:
    1. Donald Hearn and Pauline Baker M, “Computer Graphics with OpenGL", Pearson Education, 2014.
    2. William M. Newmann and Robert F Sproull, “Principles of Interactive Computer Graphics”, Tata McGraw Hill, 2011.

    REFERENCES:
    1. Foley James D, VandamAndries and Hughes John F, "Computer Graphics: Principles and Practice", Addison Wesley, 2013.
    2. Rafael C Gonzalez., and Richard Eugene Woods, “Digital Image Processing”, Prentice Hall, 2009.
    3. Anil K Jain, “Fundamentals of Digital Image Processing”, Prentice Hall, 2010.
    4. Angel, “Interactive Computer Graphics- A top down approach with OpenGL”, AddisonWesley, 2011.
    5. Francis S. Hill, Stephen M. Kelley , “Computer Graphics”, Prentice Hall, 2007.

    20XWA7 PRINCIPLES OF PROGRAMMING LANGUAGES

    3 2 0 4

    INTRODUCTION: The Role of Programming Languages: Toward Higher-level Languages, Problems of Scale, Programming Paradigms, Language Implementation Bridging the Gap - Language Description:- Syntactic Structure: Expression Notations, Abstract Syntax Trees, Lexical Syntax, Context -Free Grammars, Grammars for Expressions, Variants of Grammars. (9)

    IMPERATIVE PROGRAMMING: Statements: Structured Programming:- The Need for Structured Programming, Syntax-Directed Control Flow, Design Considerations: Syntax, Handling Special Cases in Loops, Programming with invariants, Proof Rules for Partial Correctness, Control flow in C - Types: Data Representation:- The Role of Types, Basic Types, Arrays Sequences of Elements, Records: Named Fields, Unions and variant Records, Sets, Pointers: Efficiency and Dynamic Allocation, Two String Tables, Types and Error Checking - Procedure Activations:- Introduction to Procedures, Parameter-passing Methods, Scope Rules for Names, Nested Scopes in the Source Text, Activation Records, Lexical Scope: Procedures as in C, Lexical Scope: Nested Procedures and Pascal. (12)

    OBJECT ORIENTED PROGRAMMING: Groupings of Data and Operations:- Constructs fro Program Structuring, Information Hiding, Program Design with Modules, Modules and Defined Types, Class Declarations in C++, Dynamic Allocation I C++, Templates: Parameterized Types, Implementation of Objects in C++. - Object-Oriented Programming:- What is an Object?, Object-Oriented Thinking - Objects in Smalltalk. (6)

    FUNCTIONAL PROGRAMMING: Elements of Functional Programming:- A little Language of expressions, Types : Values and Operations, Function declarations, Approaches to Expression Evaluation, Lexical Scope, Type Checking - Functional Programming in a Typed Languages:- Exploring a List, Function Declaration by Cases, Functions as First-Class Values, ML: Implicit Types, Data Types, Exception Handling in M, Little quit in Standard ML - Functional Programming with Lists:- Scheme, a Dialect of Lisp, The Structure of Lists, List Manipulation, A Motivating Example: Differentiation, Simplification of Expressions, Storage Allocation for Lists. (10)

    OTHER PARADIGMS: Logic Programming:- Computing with Relations, Introduction to Prolog, Data Structures in Prolog, Programming techniques, Control in Prolog, Cuts - An Introduction to Concurrent Programming:- Parallelism in Hardware, Streams: Implicit Synchronization, Concurrency as interleaving, Liveness Properties, Safe Access to Shared Data, Concurrency in Ada, Synchronized Access to Shared variables. (8)

    TUTORIAL PRACTICE:
    1. Language tools like LEX, YACC.
    2. Inter – Intra sequence control mechanism.
    3. Parameter passing mechanism in C, C++.
    4. Comparing Object oriented concepts in C++, Java.
    5. List Operations in Prolog.
    6. Fact finding & Theorem proving in Prolog.
    7. Recursive functions in Functional programming language.
    8. Expression evaluation in functional programming language.

    Total L: 45+T: 30=75

    TEXT BOOKS:
    1. Terrence W Pratt, Marvin VSelkowitz and TVGopal, “Programming Languages Design and Implementation”, Pearson Education, 2006.
    2. Robert Harber, “Programming in standard ML”, Carnegie Mellon University, 2005.

    REFERENCES:
    1. Ravi Sethi, “Programming Languages Concepts and Constructs “, Pearson Education, 2009.
    2. Robert W Sebesta, “Concepts of Programming Languages”, Pearson Education, 2009.
    3. Al Kelley and Ira Pohl, “A Book on C “, Pearson Education,2009.

    20XWA8 AGILE SOFTWARE DEVELOPMENT

    3 2 0 4

    Prerequisites:

  • 20XW44 Software Engineering Techniques
  • AGILE COMPUTING: - An Introduction– The Problem with parsing experience-Three levels of listening Cooperative game of Invention and Communication-Individuals-Overcoming Failure modes-Working Better in some ways than others - Drawing on Success modes. (9)

    AGILE PROCESS MODELS: – Extreme programming, ASD, DSDM, Scrum, Crystal, FDD, Agile Modeling       (9)

    TEAM COMMUNICATION: -Communicating and Cooperating teams – Convection currents of information-Jumping communication gaps-Teams as communities-Teams as Ecosystems                                                                (10)

    AGILE METHODOLOGIES: -Agile and self-adapting-The crystal methodologies-Crystal orange web-The agile software development manifesto-The agile alliance-Peter Naur, Programming as TheoryBuilding.              (12)

    Case Studies (5)

    TUTORIAL PRACTICE:
    1. Exercise for modular development.
    2. Exercise for Incremental delivery approach.
    3. Development of Metaphor.
    4. Exercise for proving the productivity using pair programming approach.
    5. Exercise for understanding the concept of “Simple Design”.
    6. Exercise to understand “Test first “technique.
    7. Writing user stories.
    8. Creation of vision card.
    9. Writing acceptance tests.
    10. Exercise for refactoring the code.

    Total L: 45+T: 30=75

    TEXT BOOKS:
    1. Alistair Cockburn, “Agile Software Development”, Pearson Education, 2019.

    REFERENCES:
    1. Craig Larman, “Agile and Iterative Development”, Pearson Education, 2017.
    2. Mike Cohn, “Agile Estimating and Planning”, Pearson Education,2018.

    20XWA9 DEVOPS

    3 2 0 4

    Prerequisites:

  • 20XW44 SOFTWARE ENGINEERING TECHNIQUES
  • WHAT IS DEVOPS?: - An Introduction – Why DevOps? - DevOps Perspective - DevOps and Agile - Team Structure – Barriers (3)

    THE CLOUD AS A PLATFORM: Introduction – Features of Cloud – DevOps Consequences of the unique cloud Features (3)

    OPERATIONS: Introduction – Operations Services – Operations and DevOps – Overall Architecture Structure (3)

    BUILDING AND TESTING: Moving a System through Deployment pipeline – Production – Incidents – Deployment – Monitoring. (9)

    SECURITY AND SECURITY AUDITS: Security Threats – Identity Management – Access Control – Repeatability – Performance – Reliability – Recoverability – Interoperability – Testability – Modifiability Measurement and compliance to DevOps practices - Points of Interaction between Dev and Ops (10)

    SUPPORTING MULTIPLE DATACENTERS: Implementing a continuous deployment pipeline for Enterprises - Migrating to Microservices - Operators as a process - The Future of DevOps (12)

    CASE STUDIES: Tools – Jenkins – Kamatera – Docker. (5)

    TUTORIAL PRACTICE:
    1. Continuous Deployment - using VSTS Release Management
    2. Infrastructure as Code - using PowerShell Desired State Configuration
    3. Configuration Management using Azure Automation and PowerShell
    4. Deployment Pipelines using Jenkins and Visual Studio Release Management
    5. Cloud hosting on both Azure and AWS
    6. Automated Testing using Visual Studio
    7. Automated Monitoring using OMS, Application Insights
    8. Phoenix Project Simulation

    Total L: 45+T: 30=75

    TEXT BOOKS:
    1. Len Bass, Ingo Weber, Liming Zhu, “DevOps: A Software Architect’s Perspective”, Addison-Wesley Professional, 2015.
    2. Gene Kim, John Willis, Patrick Debois, Jez Humble, John Allspaw, “DevOps Handbook”, IT Revolution Press, 2016.

    REFERENCES:
    1. Gene Kim, George Spafford, Kevin Behr, “The Phoenix Project: A Novel about IT, DevOps and Helping your Business Win”, IT Revolution Press, 2013.
    2. Joakim Verona, “Practical DevOps”, Ingram short title, 2018.

    20XWAA CLOUD COMPUTING

    3 2 0 4

    Prerequisites:

  • 20XW42 COMPUTER NETWORKS AND TCP/IP
  • 20XW57 JAVA PROGRAMMING LAB
  • 20XW68 DISTRIBUTED ENTERPRISE COMPUTING
  • INTRODUCTION TO PARALLEL AND DISTRIBUTED COMPUTING: Introduction, Architecture and Distributed computing models and technologies SOA, Web Services (5)

    GRID, CLUSTER AND UTILITY COMPUTING: Introduction, Architecture, Pros & Cons, Real time applications. (4)

    INTRODUCTION TO CLOUD COMPUTING: Definition, History, Comparison of Cloud Computing with Grid, Cluster and Utility Computing, Deployment models – Private, Public, Hybrid and Community - Pros and Cons of Cloud Computing. SaaS, PaaS, IaaS etc. (8)

    VIRTUALIZATION: Types of Virtualization, Tools for Virtualization, Architecture of VMM, Virtualization for Cloud. (4)

    ADVANCED WEB TECHNOLOGIES: AJAX and Mashup – Programing examples using applications. (4)

    MAP REDUCE PARADIGMS: Introduction, GFS Architecture, HDFS Architecture, Hbase, Google big Table, Amazon’s (key value) pair storage and Microsoft’s Azure infrastructure, Map reduce programming examples. (6)

    CLOUD COMPUTING FRAMEWORK: Amazon EC3, S3 storage revises, Aneka frame work, IBM blue Cloud. (7)

    APPLICATIONS: Distributed search engine and distributed data mining in the cloud. (7)

    TUTORIAL PRACTICE:
    1. Parallel programming using pvm on Linux platform
    2. Develop web services using Eclipse or similar tools
    3. Virtualization (VM Ware, VCloud, Hyper V)
    4. Develop a Mashup website based on 2 or more existing websites
    5. Build Private cloud compatible with AWS API using Eucalyptus
    6. Build Cloud platform using Openstack
    7. Package development using tools supported by cloud providers as a free service

    Total L: 45+T: 30=75

    TEXT BOOKS:
    1. Anthony TVelte, Toby JVelte and Robert Elsenpeter, “Cloud Computing : A Practical Approach”, Tata McGraw Hill, 2010

    REFERENCES:
    1. Liu M L, “Distributed Computing Principles and Applications”, Pearson Education, 2009
    2. Ron Schmelzer, ”XML and Web Services Unleashed”, Pearson Education, 2008.
    3. Dean J and Ghemawat S, “ MapReduce: Simplified Data Processing on Large Clusters” OSDI, 2004.
    4. DeCandia, DenizHastorun, MadanJampani, GunavardhanKakulapati, AvinashLakshman, Alex Pilchin, SwaminathanSivasubramanian, Peter Vosshall and Werner Vogels, ” Dynamo Amazon’s Highly Available Key-Value Store”, SOSP, 2007.
    5. Ghemawat S, Gobioff H and Leung S T, ”The Google File System”,SOSP, 2003.

    20XWAB SOCIAL NETWORK ANALYSIS

    3 2 0 4

    Prerequisites:

  • 20XW53 MACHINE LEARNING
  • INTRODUCTION: Motivation - different sources of network data - types of networks - tools for visualizing network data - review of graph theory basics. (9)

    GRAPH THEORETIC PROPERTIES OF SOCIAL NETWORKS: Notions of centrality - Strong and weak ties – Homophily - Structural Balance. (5)

    DYNAMIC PROPERTIES OF NETWORKS: Information diffusion - networks effects on information diffusion - maximizing influence spread - power law and heavy tail - preferential attachment models - small world phenomenon - cascading behavior on networks - Epidemics. (11)

    BEHAVIORAL PROPERTIES ON NETWORKS: Network economics - Bargaining and power in networks - Sponsored search markets. (10)

    MINING GRAPHS: Community and cluster detection: random walks - spectral methods - link analysis for web mining. (10)

    TUTORIAL PRACTICE:
    1. Getting acquainted with UCINET and Netdraw.
    2. Implementing graph-theoretic/social network metrics using UCINET.
    3. Working with Visualization, Ego networks, Centrality, Community Detection etc.

    Total L: 45+T: 30=75

    TEXTBOOKS:
    1. David Easley and Jon Kleinberg, “Networks, Crowds, and Markets: Reasoning About a Highly Connected World”, Cambridge University Press, Cambridge, 2010.

    REFERENCES:
    1. Stanley Wasserman, Katherine Faust, “Social network analysis: methods and applications”, Cambridge University Press, Cambridge,1998.
    2. Peter R. Monge, Noshir S. Contractor, “Theories of communication networks”, Oxford University Press, 2003.
    3. Duncan J Watts. “Six degrees: the science of a connected age”, Norton, 2004.
    4. Narahari, Y., Garg, D., Ramasuri, N., and Prakash, H, “Game Theoretic Problems in Network Economics and Mechanism Design Solutions”, Springer-Verlag, 2008.

    20XWAC PREDICTIVE ANALYTICS

    3 2 0 4

    LINEAR REGRESSION: Coefficient of determination, Significance test, Residual analysis, Confidence and Prediction intervals. (10)

    LOGISTIC AND MULTINOMIAL REGRESSION: Logistic function, Estimation of probability using Logistic regression, Variance, Wald Test, Hosmer Lemshow Test, Classification Table, Gini Co-efficient.(5)

    DECISION TREES: introduction, CHI-Square Automatic Interaction Detectors (CHAID), Classification and Regression Tree(CART), Analysis of Unstructured data (5)

    FORECASTING: Moving average, Exponential Smoothing, Casual Models. (5)

    TIME SERIES ANALYSIS: Moving Average Models, ARMA, ARIMA models , Multivariate Models (5)

    CASE STUDIES (5)

    Total L: 45+T: 30=75

    TEXT BOOKS:
    1. Max Kuhn Kjell Johnson, “Applied Predictive Modeling”, Springer, 2014.
    2. Thomas W.Miller, “Modeling Techniques in Predictive Analytics with Python and R: A guide to Data Science”, Pearson Education, 2014.

    REFERENCES:
    1. Richard A. Johnson, Irwin Miller and John Freund, “Probability and Statistics for Engineers”, Pearson Education, 2014.
    2. Ronald E. Walpole, Raymond H. Meyers, Sharon L. Meyers, “Probability and Statistics for Engineers and Scientists”, Pearson Education, 2014.

    20XWAD ADVANCED COMPUTER GRAPHICS

    3 2 0 4

    Prerequisites:

  • 20XW23 DATA STRUCTURES AND ALGORITHMS
  • 20XW24 OBJECT ORIENTED PROGRAMMING
  • GEOMETRICAL TRANSFORMATIONS: 2D Transformations- Homogeneous Coordination and metric representation – Composition of 2D transformations – Window to view port transport, Efficiency- Matrix representation of 3D transformations – Composition of 3D transformation – Transformation as a change in coordinate system. (3)

    VIEWING IN 3D: Projections – specifying arbitrary 3D viewing – The Mathematics of planar geometric projections – implementing planar geometric projections, Coordinate systems.(3)

    OBJECT HIERARCHY: Geometric modeling- Characteristics of retained – mode graphics packages – Defining and displaying structure – Modeling transformations, Hierarchical structure networks. (3)

    INPUT DEVICES – INTERACTION TECHNIQUES AND INTERACTION TASKS: Interaction hardware – Basic interaction tasks – Composite interaction tasks.(3)

    DIALOGUE DESIGN : The form and content of user-computer dialogues – User interface styles – Important design considerations – Modes and syntax – Visual design – The design methodology (3)

    USER INTERFACE SOFTWARE: Basic interaction – handling models - window management systems – output handling in window systems – Input handling in windows systems – Interaction –technique toolkits – User-interface management systems. (3)

    REPRESENTING CURVES AND SURFACES: Polygon meshing – parametric cubic curves, parametricbicubic surfaces, quadric surfaces. (3)

    VISIBLE SURFACE DETERMINATION : Function of two variables – Techniques for efficient visible surface algorithms – Algorithms for visible line determination – The z-buffer algorithm – List – priority Algorithm – Area subdivision algorithms – Algorithms for octrees – Algorithms for curved surfaces – Visible ray tracing. (3)

    REALISM: Fundamental difficulties – Rendering techniques for line drawing – Rendering techniques for shaded images – Improved object models – Dynamics – steropsis – Improved displays – Interacting with our other senses – Aliasing and antialiasing.(3)

    ACHROMATIC AND COLORED LIGHT: Achromatic light – Chromatic color – Color Models for Raster Graphics – Reproducing Color – Using Color in Computer Graphics. (3)

    ILLUMINATIONS AND SHADING : Illumination models – Shading models for polygons – Surface detail – Shadows – Transparency – Inter object reflections – Physically based illumination models – Extended light sources – Spectral sampling – Improved camera model – Global Illumination algorithms – Recursive ray tracing – Radiosity methods – The rendering pipeline. (4)

    ANIMATION : Conventional and Computer assisted Animation – Animation languages – Methods of controlling animation - Basic rules of animation – Problems peculiar to animation. (3)

    TUTORIAL PRACTICE :
    1. Implement the following using the OpenGL library in VC++
    2. Using glRect function, draw : a) A flurry b) A checkerboard
    3. Write the window to view port mapping functions, and use it to draw the sine curve in real world coordinates.
    4. Using user defined lineTo and moveTo functions, plot the Fibonacci series.
    5. Write the Canvas class and its supporting classes. Use the Canvas class to draw a simple meander.
    6. Write functions to change the background and foreground colors.
    7. Write a function to draw an n-sided polygon (using the basic Canvas class and line To and move To functions)
    8. A program to draw the Sierpinski gasket.
    9. A program to draw the graph of a given mathematical function f(x).
    10. A program to read a data file that contains a collection of Polylines in the appropriate format and draw each polyline.
    11. A parameterized function to display a house and call it many times by passing different values to form a village.
    12. A program that displays a colored triangle and rectangle and rotates them at different angles along two axis.

    Total L: 45+T: 30=75

    TEXT BOOK:
    1. Foley, Andries van Dam, Feinerand Hughes “Computer Graphics Principles & Practice”, Addison Wesley, 2013.

    REFERENCE:
    1. Donald Hearn and Pauline Baker M, Warren Karithers, “Computer Graphics with OPENGL”, Pearson Education, 2014.

    20XWAE BIG DATA ANALYTICS

    3 2 0 4

    Prerequisites:

  • 20XW32 DATABASE MANAGEMENT SYSTEM
  • OVERVIEW:– Big Data era – characteristics - Definition of data features – Big data value – Development – Challenges – Intelligent data analysis - .Nature of data - Evolution of database - Limitations of existing solutions. (4)

    RELATED TECHNOLOGIES:–Cloud computing – Relationship between cloud computing and big data - Internet of Things (IOT): IOT preliminaries – relationship between IOT and Big data; Data Centre – Hadoop – Preliminaries and Big Data – NoSQL - Hadoop eco system - Data loading techniques – Flume - Sqoop– Hive - Pig Latin - Mahout – HDFS- Map Reduce. (12)

    BIG DATA GENERATIONAND ACQUISITION:– Enterprise data – IOT data – Internet data – Biomedical data – Data generation from fields - Data Collection – Transportation - Preprocessing. (8)

    DATA STREAMS: Stream Concepts – Stream data model and architecture – stream computing – sampling data in a stream – filtering streams – counting distinct elements in a stream – estimating moments – Real time analytics platform (RTAP) applications.

    MASSIVE DATA ANALYTICS: Map-reduce for machine learning, Nearest Neighbor classifier, Multi-task learning, Topic model. (3)

    APPLICATIONS: – Application evolution – Fields: Structured, Text, Web, Multimedia, Network, Mobile traffic; Social Network – Healthcare and medical – Collective intelligence – smart grid. (7)

    TUTORIAL PRACTICE :
    1. Implementation oflarge scale machine learningalgorithms using Hadoop and Mapreduce.
    2. Problems using data streams.
    3. Developing applications using heterogeneous data sets (Text, Web, Graph, Image, IOT) .

    Total L: 45+T: 30=75

    TEXT BOOKS:
    1. Min Chen, Shiven Mao, Yin Zhang, Victor CM Leung, “Big Data: Related Technologies, Challenges and Future Prospects”,Google(ebook), Springer, 2014.
    2. EMC2 Education Services, “Data Science and Big Data Analytics: Discovering, Analyzing, Visualizing and Presenting Data”, Wiley, 2015
    3. Adrian McEwen, Hakim Cassimally, “Designing the Internet of Things”, Wiley, 2013
    4. VlasiosTsiatsis, IoannisFikouras, Stefan Avesand, “From Machine-to-Machine to the Internet of Things: Introduction to a New Age of Intelligence”, Academic Press Inc, 2014

    REFERENCES:
    1. Ravi Kannan, John Hopcroft, “Foundations of Data Science”, 2013.
    2. Richard Szeliski, “Computer Vision: Algorithms and Applications”, Springer-Verlag, 2011.
    3. Richard Hartley, Andrew Zisserman, “Multiple View Geometry in Computer Vision”, Cambridge University Press, 2004.
    4. Olivier Hersent, David Boswarthick, “The Internet of Things: Key Applications and Protocols”, Wiley, 2012.
    5. AnandRajaraman, Jeffrey David Ullman, “Mining of Massive Datasets”, Cambridge University Press, 2011.

    20XWAF NATURAL LANGUAGE PROCESSING

    3 2 0 4

    Prerequisites:

  • 120XW53MACHINE LEARNING
  • 120XW62 ARTIFICIAL INTELLIGENCE
  • INTRODUCTION :Natural language processing techniques - analysis in NLP: morphological – syntactic, semantic - pragmatic - Applications (2)

    WORDS : Regular expressions – Automata – Morphology – Finite state Transducers – Finite state morphological parsing – Combining FST lexicon and rules – Porter Stemmer Algorithm – Probabilstic models for Spelling – Bayes method, Minimum edit distance - N-Grams – Counting words in Corpora – Simple n-grams – Smoothing – Evaluating language models : Entropy, Perplexity- Part of Speech Tagging (POS) – Rule based tagging – Stochastic based tagging – Transformation based tagging - Context Free Grammars - Top down parser – Earley Algorithm – Bottom-up parsing – CYK parser – Probabilistic parsing. (12)

    SEMANTICS & PRAGMATICS: First order predicate calculus – Syntax driven sematic analysis – Attachments for a fragment of English – Word Sense Disambiguation – Machine learning approaches – Dictionary based approaches – Pragmatics : Discourse –Textcoherence. (10)

    DEEP LEARNING in NLP : Text representation – Word2Vec models – Recurrent neural network (RNN) – Long short term memory (LSTM ) (6)

    NATURAL LANGUAGE GENERATION : Architecture of NLG Systems- Generation Tasks and Representations- Application of NLG. Machine Translation: Language similarities and differences – The transfer metaphor – Direct translation – Statistical translation - Translation involvingIndianLanguages. (11)

    CASE STUDIES : Mail spam, web spam detection, Fake news detection - Sentiment Analysis - Information extraction - Automatic summarization - Question answering - Named entity recognition and relation extraction - IE using sequence labeling - Open problems (4)

    TUTORIAL PRACTICE:
    1. Sentiment analysis and classification using n gram models, RNN andLSTM
    2. Document classification / Radiology reports classification using RNN and LSTM
    3. Visualization of text data
    4. POS tagging on text data using HMM
    5. Language modeling using n gram models
    6. Machine translation using Deep learning and HMM
    7. Optical character recognition using
    8. Word sense disambiguation

    Total: L:45

    TEXT BOOKS:
    1. Daniel Jurafsky and James H. Martin, “Speech and Language Processing: An Introduction to Natural Language Processing, Computational Linguistics and Speech Recognition”, Prentice Hall,2014.

    REFERENCES:
    1. Christopher Manning and Hinrich Schütze, , MIT Press,2008.
    2. James Allen, Addison Wesley,1995.

    NLP Lab / Tutorials Paractice
    1. Sentiment analysis and classification using n gram models, RNN andLSTM
    2. Document classification / Radiology reports classification using RNN and LSTM
    3. Visualization of text data
    4. POS tagging on text data using HMM
    5. Language modeling using n gram models
    6. Machine translation using Deep learning and HMM
    7. Optical character recognition using
    8. Word sense disambiguation

    20XWAG INTERNET OF THINGS

    3 2 0 4

    Prerequisites:

  • 20XW35 MICROPROCESSOR AND EMBEDDED SYSTEMS
  • 20XW42 COMPUTER NETWORKS AND TCP/IP
  • INTRODUCTION TO IoT: Introduction to Internet of Things (IoT) – Machine to Machine (M2M) –- Features and Definition of IoT– Recent Trends in the Adoption of IoT – Societal Benefits. (2)

    IoT ARCHITECTURE: Functional Requirements - IoT Enabling Technologies – IPv6 - Basic Architecture - Components of IoT: Embedded Computation Units, Microcontrollers, System on Chip (SoCs) - Sensors – Actuators – Communication Interfaces. (7)

    RF COMMUNICATION TECHNOLOGIES IN IoT: Wireless Sensor Networks (WSN): Overview, Fault Tolerance - RFID – NFC - Low Power Personal Area networks (LowPAN): Overview, 6LowPAN, IEEE 802.15.4, BLE, Zigbee, Zwave, and Thread - Wi-Fi - Low Power Wide Area Networks (LPWAN): Concepts and features, SigFox, LoraWAN, LPWAN-3GPP, Comparing different LPWAN technologies. (7)

    APPLICATION LAYER PROTOCOLS IN IoT: Rest Architecture - HTTP – CoAP: Architecture, Features, Applications - MQTT: Architecture, Feature, Applications - Comparing different IoT Application Layer Protocols. (7)

    MODERN NETWORKING: Cloud Computing: Introduction to the Cloud Computing, Cloud service options, Cloud Deployment models, Load balancing, Hypervisors, Comparison of Cloud providers - Software Defined Networking(SDN): Overview, Architecture, Rule placement, OpenFlow Protocol, Relevance of SDN to IoT. (8)

    SECURITY IN IoT: IEEE 802.11 Wireless Networks Attacks: Basic Types, WEP Key Recovery Attacks, Keystream Recovery Attacks against WEP – RFID Security – Security Issues in ZigBEE: Eavesdropping Attacks, Encryption Attacks – Bluetooth Security: Threats to Bluetooth Devices and Networks – Blockchain in IoT security. (10)

    PROTOTYPING: Prototyping embedded devices - Open Source versus Closed Source - Embedded Computing Basics - Arduino - Raspberry Pi - Implementation. (2)

    APPLICATIONS IN IoT: Smart homes – Energy – Health Care – Smart Transportation – Smart Living – Smart Cities- Smart Grid – Smart Agriculture. (2)

    TUTORIAL PRACTICE:
    1. Simulating Wireless Sensor Networks
    2. Connected Vehicle applications
    3. Traffic Signal Monitoring & Control System
    4. Smart home automation
    5. IOT Based Person/Wheelchair Fall Detection
    6. Gas Pipe Leakage Detector using Robot
    7. Smart Energy Meter Monitoring
    8. IOT Based Fire Department Alerting System

    Total L: 45+P: 30=75

    TEXT BOOKS:
    1. Dieter Uckelmann, Mark Harrison, Florian Michahelles, “Architecting the Internet of Things”, Springer, New York, 2011
    2. Adrian McEwen and Hakim Cassimally, “Designing the Internet of Things”, John Wiley and Sons Ltd, UK, 2014.
    3. Thomas Erl, Dr. Zaigham Mahmood, Professor Ricardo Puttini,"Cloud Computing: Concepts, Technology & Architecture", PHI, 2013
    4. Brian Russell, Drew Van Duren, "Practical Internet of Things Security", Packt Publishing, 2016

    REFERENCES:
    1. Olivier Hersent, David Boswarthick and Omar Elloumi, “The Internet of Things: Key Applications and Protocols”, John Wiley and Sons Ltd., UK 2012.
    2. Kai Hwang, Geoffery C.Fox, Jack J.Dongarra, “Distributed and Cloud Computing”, Elsevier, 2012.
    3. William Stallings, “Foundations of Modern Networking: SDN, NFV, QoE, IoT, and Cloud” Addison-Wesley, 2015
    4. Jim Doherty, “SDN and NFV Simplified: A Visual Guide to Understanding Software Defined Networks and Network Function Virtualization”, Addison-Wesley, 2016
    5. Johnny Cache, Joshua Wright and Vincent Liu, “Hacking Exposed Wireless: Wireless Security Secrets and Solutions”, Tata McGraw Hill,, 2010.

    20XWAH ADVANCED SYSTEMS PROGRAMMING

    3 2 0 4

    Prerequisites:

  • 20XW15 C PROGRAMMING
  • 20XW45 OPERATING SYSTEMS
  • Linux System: Design Principles – Kernel Modules – Process Management Scheduling – Memory Management – Input-Output Management – File System – Interprocess Communication. iOS and Android: Architecture and SDK Framework – Media Layer – Services Layer – Core OS Layer. (6)

    Overview of system calls: - anatomy of a system call and x86 mechanisms for system call implementation - MMU/memory translation, segmentation, and hardware traps interact - create kernel-user context separation – virtualization. (6)

    The kernel execution and programming context: Live debugging and tracing – Hardware and software support for debugging – Dtrace: programming, implementation/design, internals – Kprobes and SysTrace: Linux catching up.(7)

    Linking and loading: – Executable and Linkable Format (ELF) – Internals of linking and dynamic linking – Internals of effective spinlock implementations on x86. (4)

    Process and thread kernel data structures: – process table traversal – lookup, allocation and management of new structures - /proc internals – optimizations. (4)

    Virtual File System and the layering of a file system call from API to driver :– Object-orientation patterns in kernel code – a review of OO implementation generics (C++ vtables, etc). (8)

    Kmem and Vmem allocators: OO approach to memory allocation – Challenges of multiple CPUs and memory hierarchy – Overview of the kernel network stack implementation – Path of a packet through a kernel – Berkeley Packet Filter architecture – Linux Netflter architecture. (10)

    TUTORIAL PRACTICE:
    1. Case Studies

    Total L: 45+P: 30=75

    TEXT BOOK:
    1. Robert Love, “Linux System Programming”, O’Reilly, 2013

    REFERENCES:
    1. Yang Lixiang, Liang Wenfeng, “The Art of Kernel Linux design”, CRC Press, 2016
    2. Rami Rosen, “Linux Kernel Networking : Implementation and Theory”, Apress, 2014.

    20XWAI STATISTICAL LEARNING

    3 2 0 4

    Prerequisites:

  • 20XW21 APPLIED LINEAR ALGEBRA
  • 20XW53 MACHINE LEARNING
  • THEORETICAL FOUNDATIONS : Review of Statistical Inference, Review of Probability, Testing of Hypothesis – Introduction to Function Spaces – Vector Spaces - Metric Spaces – Cauchy Sequence – Complete Metric Space – Normed Space, Inner Product Space – Banach Space - Hilbert Space – Sobolev – Examples - Mercer Kernels - Reproducing Kernel Hilbert Space (RKHS), Concentration of Measure : Measures of Complexity - Rademacher Complexity. (10)

    LINEAR REGRESSION: Simple, Multiple, Other Considerations in the Regression Model – Resampling Methods – Cross-Validation, Bootstrap – Linear Model Selection & Regularisation – Subset Selection, Shrinkage Methods – Ridge, Lasso, Dimension Reduction Methods. (8)

    NON-LINEAR REGRESSION: Polynomial Estimators, Step Functions, Basis Functions, Regression Spline, Smoothing Splines, Local Regression, Generalised Additive Models. (4)

    LINEAR CLASSIFICATION: Review of Classification Models, Logistic Regression, Linear Discriminant Analysis, Quadratic Discriminant Analysis, Comparison of Classification Methods. (6)

    TREE BASED METHODS: Regression Trees, Classification Trees,Bagging, Random Forests, Boosting. (9)

    support vector machines: Maximal Margin Classifier – Support Vector Classifiers - Support Vector Machines – Non-linear Decision Boundaries – SVMs with more than 2 classes. (4)

    UNSUPERVISED LEARNING: Principal Components Analysis – Clustering Methods – K-Means Clustering, Hierarchical Clustering.(4)

    TUTORIAL PRACTICE:
    1. Solve the following problems using R
    2. Simple Regression, Multiple Regression, Ridge Regression and Lasso Regression.
    3. Non-linear Regression, Splines and Additive Models
    4. Linear Classification,
    5. Tree based methods
    6. Support Vector machines
    7. Clustering Methods

    Total L: 45+P: 30 = 75

    TEXT BOOKS:
    1. Gareth James, Daniela Witten, Trevor Hastie, Robert Tibshirani, “An introduction to Statistical learning”, Springer, 2013.
    2. Trevor Hastie, Robert Tibshirani, Jerome Friedman, “Elements of Statistical Learning: Data Mining, Inference and Prediction”, Springer, 2013.

    REFERENCES:
    1. Vladimir N Vapnik, “Statistical learning theory”, Wiley, 1998.
    2. Robert Schapire, Yoav Freund, “Boosting : Foundations and Algorithms”, The MIT Press, 2012.

    20XWAJ VIRTUAL AND AUGMENTED REALITY

    3 2 0 4

    Prerequisites:

  • 20XWA6 COMPUTER GRAPHICS AND VISUALIZATION
  • INTRODUCTION TO VR AND AR: Overview of class, logistics, history of VR/AR. (5)

    THE GRAPHICS PIPELINE AND OPENGL: Overview and Transformations: rotation, translation, scaling, model view matrix, projection matrix, Lighting and Shading. (7)

    OPENGL SHADING LANGUAGE (GLSL):GLSL vertex and fragment shaders. (5)

    THE HUMAN VISUAL SYSTEM: Perception of depth, color, contrast, resolution, Stereo Rendering. (5)

    HEAD MOUNTED DISPLAY OPTICS: Magnifier designs, stereo rendering for HMDs, lens distortion correction, advanced HMD optics. (7)

    INERTIAL MEASUREMENTS UNITS: gyros, accelerometers, magnetometers, sensor fusion, complementary filter, Arduino (6)

    POSITIONAL TRACKING: Tracking with the light house, advanced positional tracking. SPATIAL SOUND. (5)

    PANORAMIC IMAGING AND CINEMATIC VR: VR Engines and Other Aspects of VR (latency, eye tracking, post-rendering warp) (5)

    TUTORIAL PRACTICES:
    1. 1. Lab: Hello, WebGL!
    2. 2. Lighting and shading with GLSL
    3. 3. Stereo rendering, anaglyph
    4. 4. Building Own Head Mounted Display
    5. 5. Build Your Own IMU, Arduino Programming
    6. 6. Positional Tracking
    7. 7. Spatial Sound
    8. 8. Content creation with unity (Optional)

    Total L: 45+P: 30=75

    TEXT BOOKS:
    1. Marschner, Shirley, “Fundamentals of Computer Graphics”, CRC Press, 2016.
    2. La Valle, “Virtual Reality”, Cambridge University Press, 2016.

    REFERENCES:
    1. Jos Dirksen, "Learning Three.js: The JavaScript 3D Library for WebGL", Packt Publishing, 2013
    2. enJacobo Rodriguez, "GLSL Essentials: Enrich your 3D scenes with the power of GLSL!", Packt Publishing, 2013.

    20XWAK COMPUTER FORENSICS

    3 2 0 4

    Prerequisites:

  • 20XW42 COMPUTER NETWORKS AND TCP/IP
  • 20XW45 OPERATING SYSTEMS
  • COMPUTER AND FORENSICS: Introduction – Stand-alone computer crimes –Computer evidence – Computer Forensics evidence and courts –Internet laws and statutes; Forensics process – Securing evidence – Law enforcement and methodology. (8)

    FORENSICS EVIDENCE: Sources – Seizure – Collection – Integrity – Handling; Acquisition and Duplication of data. (8)

    DATA ANALYSIS: Metadata extraction – File Signature analysis – System analysis – Examining unallocated space – Data carving – Recovering deleted data and partitions(6)

    WINDOWS FORENSICS: Registry Analysis – Executable file analysis – Recycle Bin Forensics – Evidence Recovery from Print and Spool files. (5)

    INTERNET FORENSICS: Domain Name Ownership Investigation – Email Forensics – Messenger Forensics – Browser Forensics.(6)

    MOBILE DEVICE FORENSICS: Hand-held devices and Forensics – Reconstructing user’s activities and deleted data.(4)

    MEMORY FORENSICS AND MALWARE ANALYSIS: Memory data collection and Examination – Analyzing Windows and Linux systems for malware – Reverse Engineering tools and techniques.(6)

    ANTI-FORENSICS: Erasing Evidence.(2)

    TUTORIAL PRACTICE:
    5. Implementation of data analysis techniques.
    6. Implementation of system analysis concepts.
    7. Implementation of email forensics concepts.
    8. Implementation of hand-held device forensics activities.

    Total L: 45+T: 30=75

    TEXT BOOKS:
    1. Marjie T. Britz, "Computer Forensics and Cyber Crime: An Introduction", Pearson Education, 2013.
    2. Linda Volonino, Reynaldo Anzaldua, Jana Godwin, "Computer Forensics: Principles and Practices", Pearson/Prentice Hall, 2007

    REFERENCES:
    1. Chuck Easttom, "System Forensics, Investigation, and Response", Jones & Bartlett Publishers, 2014.
    2. SatishBommisetty, RohitTamma, Heather Mahalik, "Practical Mobile Forensics", Packt Publishing Ltd, 2014.
    3. Robert Jones, "Internet Forensics ", O'Reilly Media, 2005.

    20XWAL WIRELESS NETWORKS

    3 2 0 4

    Prerequisites:

  • 20XW42 COMPUTER NETWORKS AND TCP/IP
  • WIRELESS NETWORK OVERVIEW:Wired and wireless Networks- Effect of mobility on systems- Introduction to wireless technologies- RF Overview - Wireless Signal Propagation-Signal-to-Noise Ratio – Modulation - ISM Spectrum - Frequency Hopping Spread Spectrum (FHSS) - Direct Sequence Spread Spectrum (DSSS)- Orthogonal Frequency Division Multiplexing (OFDM) -Coordination mechanisms and MAC protocols for multi-user network access (6)

    WLAN TECHNOLOGIES: IEEE 802.11 Standard--WPA(Wi- Fi Protected Access)-WPA2- WEP (wired Equivalence Privacy)- Static WEP Wireless Architecture- Bluetooth –Zigbee Wireless data networks-Personal Area Networks-GPRS architecture (12)

    AD HOC AND SENSOR NETWORKS: Ad hoc Network- Characteristics- Table-driven and Source-initiated On Demand routing protocols, Hybrid protocols -. Wireless Sensor networks- Classification, MAC and Routing Protocols. (8)

    MOBILE NETWORK AND TRANSPORT LAYERS: Mobile IP – Dynamic Host Configuration Protocol-Mobile Ad Hoc Routing Protocols–Multicast routing-TCP over Wireless Networks – Indirect TCP – Snooping TCP – MobileTCP – Fast Retransmit / Fast Recovery – Transmission/Timeout Freezing-Selective Retransmission – Transaction Oriented TCP- TCP over 2.5 / 3G wireless Networks.

    Wireless Threats and Risks:Security breaches on wireless Networks- Eavesdropping-Jamming - RF interference -Covert wireless channels-Traffic Analysis Spoofing- DOS attack - Malicious Code -Cryptographic threats- Rogue Access Points - MAC Filtering Attacks - Attack on MiC - RADIUS Vulnerabilities – WPA and 802.1x Vulnerabilities - Attacks on Wireless Gateways(8)

    TUTORIAL PRACTICE:
    1. Study of OMNET++/NS-2 simulator.
    2. Simulation of a IEEE 802.11 LAN under various conditions using chosen simulator.
    3. Simulation of a priority MAC protocol using chosen simulator.
    4. Simulation of different routing protocols using simulators.
    5. Simulation of TCP over error-prone wireless network using simulator.
    6. Development of Mobile application using blue tooth.

    Total L: 45+T: 30 = 75

    TEXT BOOKS:
    1. William Stallings, “Wireless Communication and Networks”, Pearson Education, 2016.
    2. Gary. S. Rogers and John Edwards, “An Introduction to Wireless Technology”, Pearson Education, 2012.
    3. SivaRam Murthy C and B.S Manoj, “Ad hoc Wireless Networks Architecture and Protocols”, Pearson Education, 2012.
    4. Kaveh Pahlavan, Prashant K. Krishnamurthy, “Principles of Wireless Networks : A Unified Approach”, John Wiley, 2011.

    REFERENCES:
    1. Dharma Prakash Agrawal and Qing-An Zeng, “Introduction to Wireless and Mobile Systems”, Thomson Press, 2007.
    2. Feng Zhao and Leonidas Guibas, “Wireless Sensor Networks-An Information Processing Approach”, Elsevier, 2004.
    3. Ivan Stojmenovic, “Handbook of Wireless Networks and Mobile Computing”, John wiley, 2006.
    4. SavoGlisic, “Advanced Wireless Communications 4G Technologies”, Wiley Publications, 2006.

    20XWAM NETWORK FORENSICS

    3 2 0 4

    Prerequisites:

  • 20XW42 COMPUTER NETWORKS AND TCP/IP
  • 20XW45 OPERATING SYSTEMS
  • INTRODUCTION :Footprints  -  Concepts in Digital Evidence - Network Forensics Investigative Methodology (OSCAR) - Sources of Network-Based Evidence  - Evidence Acquisition  (6)

    TRAFFIC ANALYSIS:Protocol Analysis - Packet Analysis  - Flow Analysis – Higher Layer Traffic Analysis   (8)

    STATISTICAL FLOW ANALYSIS: Process Overview – Sensors - Flow Record Export protocols - Collection and Aggregation – Analysis.   (7)

    NETWORK INTRUSION DETECTION AND ANALYSIS: Why Investigate NIDS/NIPS? -Typical NIDS/NIPS Functionality - Modes of Detection - Types of NIDS/NIPSs  - NIDS/NIPS Evidence Acquisition  - Comprehensive Packet Logging - Snort   (9)

    EVENT LOG AGGREGATION, CORRELATION, AND ANALYSIS:  Sources of Logs  - Network Log Architecture - Collecting and Analyzing Evidence – Switch Evidence – Router Evidence – Firewall Evidence (6)

    WEB PROXIES:Why Investigate Web Proxies? - Web Proxy Functionality  - Evidence - Squid  - Web Proxy Analysis - Encrypted Web Traffic  (9)

    TUTORIAL PRACTICE:
    1. Analysis of the packets and flow analysis using Wireshark and tshark.
    2. Analysis of higher level protocols like DHCP, DNS, SMTP
    3. Familiarize with various tools like netflow, silk for flow analysis
    4. Familiarize with Network Intrusion detection tools like Snort
    5. Log analysis and event correlation
    6. Web proxy analysis.

    Total L: 45+T: 30=75

    TEXT BOOKS:
    1. Davidoff, Sherri, and Jonathan Ham, “ Network forensics: tracking hackers through cyberspace” Vol. 2014. Upper Saddle River: Prentice hall, 2012.

    REFERENCES:
    1. Investigating Network Intrusions and Cybercrime, EC Council, 2016.
    2. Jessy Bullock, Jeff Parker, Wireshark for Security Professionals: Using Wireshark and the Metasploit Framework , Wiley, 2017.
    3. Bejtlich, Richard. The practice of network security monitoring: understanding incident detection and response. No Starch Press, 2013.

    20XWAN RANDOMIZED ALGORITHMS

    3 2 0 4

    INTRODUCTION: Randomized algorithms, randomized quick sort, Karger’s min-cut algorithm Las Vegas and Monte Carloalgorithms, computational models and complexity classes. (5)

    MOMENT, DEVIATION AND TAIL INEQUALITIES: Occupancy problem, Markov and Chebyshev inequalities- randomized selection- coupon collector’s problem, the Chernoff bound- routing in a parallel computer- a wiring problem. (7)

    PROBABILISTIC METHODS: Overview of the method-maximum satisfiability - finding a large cut, Expander graphs. (5)

    MARKOV CHAINS AND RANDOMWALKS: Markov chains, Random walk on graphs - connectivity in undirected graphs – Expanders and rapidly mixing random walks. (6)

    DATA STRUCTURES AND GRAPH ALGORITHMS: Random Treaps, hashing – hash tables – perfect hashing, skip lists - Fast in-cut. (6)

    ONLINE ALGORITHMS: Paging problem-adversary models- paging against an oblivious adversary-relating the adversaries-the adaptive online adversary, k-server problem.(5)

    PARALLEL AND DISTRIBUTED ALGORITHMS: Sorting on a PRAM – Maximal Independent sets. (4)

    NUMBER THEORETIC ALGORITHMS:, Polynomial roots and factoring, primality testing. (3)

    DERANDOMIZATION: The method of Conditional Probabilities – Derandomizing max-cut algorithm – Constructing pairwise independent values modulo a prime - Pairwise independent – large cut. (4)

    TUTORIAL PRACTICE:
    1. Implementation of randomized quick sort and solve real time problems using it.
    2. Find solution for s-t min-cut problem adapting min cut algorithm.
    3. Implementation of randomized selection and problems related to it.
    4. Implementation of treap data structure.
    5. Problems using randomized hash table.
    6. Implement the shortest path and fast min-cut algorithms.
    7. Implementation of randomized primality testing.
    8. Implement the K-server on-line algorithms.

    Total: L: 45+T: 30 = 75

    TEXT BOOKS:
    1. Motwani R and RaghavanP,“Randomized Algorithms”, Cambridge University Press, 2010.
    2. Michael Mitzenmacher and Eli Upfal, “Probability & Computing: Randomized Algorithms and Probabilistic Analysis”, Cambridge University Press, 2009.

    REFERENCES:
    1. Thomas H Cormen, Charles E Leiserson and Ronald L Rivest, “Introduction to Algorithms”, MIT Press, 2009.
    2. AnanyLevitin, “Introduction to Design and Analysis of Algorithms”, Pearson Education, 2011.

    20XWAO REINFORCEMENT LEARNING

    3 2 0 4

    Prerequisites: :

  • 20XW62 ARTIFICIAL INTELLIGENCE
  • 20XW53 MACHINE LEARNING
  • REINFORCEMENT PROBLEM: Introduction - Elements of RL, History of RL- Evaluative feedback -Goals and rewards – Returns -Bandit learning: Upper-confidence - bound algorithms - Thompson sampling, online learning - Multi agent reinforcement learning (6)

    MARKOV DECISION PROCESS (MDP) :– Value functions - Optimality Criterion in MDPs.- Partially Observed Markov Decision Process (4)

    DYNAMIC PROGRAMMING (DP): Policy Evaluation- Policy Improvement - Value Iteration, asynchronous DP- Efficiency of DP- Stochastic DP. (5)

    MONTE CARLO METHODS: Policy Evaluation- Policy Improvement- On-policy and off- policy Monte Carlo controls-Incremental implementation. (8)

    TEMPORAL DIFFERENCE LEARNING (TD): TD-prediction- Optimality of TD - Sarsa- Q-Learning – R- Learning-Actor-Critic Model- Unifying Monte Carlo and TD-Traces- Games. (8)

    FUNCTION APPROXIMATION:- Value prediction and control – Gradient Descent methods-Linear methods – Artificial Neural Network based approximation- lazy learning - Policy Gradient methods- REINFORCE algorithm, exact gradient methods, estimating gradients, approximate policy gradient algorithms, actor-critic methods - Deep Q Learning - Inverse RL (9)

    PLANNING AND LEARNING: Model based learning and planning - prioritized sweeping-Heuristic search. (5)

    TUTORIAL PRACTICE:
    1. Ranking of nodes of a graph using Q-Learning (PageRank, TrustRank, DistanceRank, focused crawler).
    2. Applying n-armed Bandits in real world problems.
    3. Finding shortest paths in graphs using RL.(Online algorithms)
    4. RL for Stochastic grid word.
    5. Multi-agent system and games.
    6. Distributed RL.
    7. Policy Search algorithms.

    Total L: 45+T:30 = 75

    TEXT BOOKS
    1. Sutton R. S. and Barto A. G., "Reinforcement Learning: An Introduction", MIT Press, 2018.
    2. Dimitri P. Bertsekas, "Reinforcement Learning and Optimal Control”, Athena Scientific, 2019
    3. Csaba Szepesvári, “Algorithms for Reinforcement Learning”, Morgan & Claypool, 2013.
    4. Masashi Sugiyama, “Statistical Reinforcement Learning : Modern Machine Learning Approaches”, CRC Press, Taylor & Francis Group, 2015

    REFERENCES
    1. Lattimore, T. and Szepesvári, C.” Bandit Algorithms”, Cambridge University Press, 2018.
    2. Stuart Russell and Peter Norvig, “Artificial Intelligence: A Modern Approach”, Prentice Hall, 2014.

    20XWO1 PRINCIPLES OF MANAGEMENT AND BEHAVIOURAL SCIENCES

    3 2 0 4

    PRINCIPLES OF MANAGEMENT: Meaning, Definition and Significance of Management, Basic Functions of Management – Planning, Organizing, Staffing, Directing and Controlling. Organizational Environment – Social, Economic, Technological and Political. Corporate Social Responsibility - Case discussion (8)

    INDUSTRIAL AND BUSINESS ORGANIZATION: Growth of Industries (Small Scale, Medium Scale and Large Scale Industries). Forms of Business Organizations. Resource Management – Internal and External Sources. (7)

    ORGANIZATIONAL BEHAVIOUR: Significance of OB, Impact of culture on organization. Role of leadership and leadership styles. Personality and Motivational Theories. Attitudes, Values and Perceptions at work - Case discussion (7)

    GROUP BEHAVIOUR: Group dynamics, Group formation and development, group structure and group cohesiveness. Informal organization – Sociometry – Interaction analysis - Exercises (8)

    GLOBALISATION: Issues for global competitiveness, proactive and reactive forces of globalization. Cross cultural management – Management of work force diversity. (5)

    HUMAN RESOURCE MANAGEMENT: Objectives and Functions, Selection and Placement, Training and Development – Conflict management – Stress management - Human resource management in global environment - Human resource information system(HRIS) - Case discussion. (10)

    Total L:45

    TEXT BOOKS:
    1. Harold Koontz, Heinz Weihrich and Ramachandra Aryasri, “Principles of Management”, Tata McGraw Hill, 2014.
    2. Mamoria CB, “Personnel Management”, Sultan Chand & Sons, 2005.

    REFERENCES:
    1. John W Newstrom and Keith Davis, “Organizational Behavior”, Tata McGraw Hill, 2010.
    2. Stephen P Robbins, ”Organisational behavior”, Prentice Hall, 2010.
    3. Khanna O P, “Industrial Engineering & Management”, Dhanpat Rai Publications, 2010.

    20XWO2 ENTERPRENEURSHIP

    3 2 0 4

    INTRODUCTION TO ENTREPRENEURSHIP: Definition – Characteristics and Functions of an Entrepreneur – Common myths about entrepreneurs – Importance or Entrepreneurship. Seminar in R5 & R6. (5)

    CREATIVITY AND INNOVATION: The role of creativity – The innovation Process – Sources of New Ideas – Methods of Generating Ideas – Creative Problem Solving – Entrepreneurial Process. (6)

    DEVELOPING AN EFFECTIVE BUSINESS MODEL: The Importance of a Business Model – Starting a small scale industry - Components of an Effective Business Model. (5)

    APPRAISAL OF PROJECTS: Importance of Evaluating Various options and future investments- Entrepreneurship incentives and subsidies – Appraisal Techniques. (8)

    FORMS OF BUSINESS ORGANIZATION: Sole Proprietorship – Partnership – Limited liability partnership - Joint Stock Companies and Cooperatives. (4)

    FINANCING THE NEW VENTURE:Determining Financial Needs – Sources of Financing – Equity and Debt Funding – Case studies in Evaluating Financial Performance. (8)

    THE MARKETING FUNCTION: Industry Analysis – Competitor Analysis – Marketing Research for the New Venture – Defining the Purpose or Objectives – Gathering Data from Secondary Sources – Gathering Information from Primary Sources – Analyzing and Interpreting the Results – The Marketing Process. (5)

    INTELLECTUAL PROPERTY PROTECTION AND ETH ICS: Patents – Copyright - Trademark- Geographical indications – Ethical and social responsibility and challenges. (4)

    TUTORIAL PRACTICE:
    1. Case studies

    Total L: 45+T: 30=75

    TEXT BOOKS:
    1. Donald F.Kuratko and Richard M.Hodgetts, “Entrepreneurship”, South-Western, 2003.
    2. The Dynamics of Entrepreneurial Development and Management, Vasant Desai, Himalaya Publishing House, 2010.

    REFERENCES:
    1. S.L.Gupta, Arun Mittal, “Entrepreneurship Development”, International Book House, 2012.
    2. G. S. Sudha, “Management and Entrepreneurship Development”, Indus Valley Publication, 2009.
    3. V. Badi, N. V. Badi , Business Ethics, R, Vrinda Publication, 2012.
    4. Prasanna Chandra Projects- Planning, Analysis, Financing, Implementation andreview, TATA McGraw Hill, 2012.

    20XWO3 APPLIED GRAPH THEORY

    3 2 0 4

    Prerequisites:

  • 20XW22 PROBABILITY AND STATISTICS
  • 20XW31 MATHEMATICAL FOUNDATIONS OF COMPUTING
  • BASIC CONCEPTS: Graphs - directed and undirected, subgraphs, graph models, degree of a vertex, degree sequence, Havel-Hakimi theorem, Hand-shaking lemma. Connectivity, walk, path, distance, diameter. Isomorphic graphs. Common classes of graphs – regular, complete, petersen, cycle, path, tree, k-partite, hypercube, Spanning trees – Matrix tree theorem, graph decomposition. (6)

    CONNECTIVITY: Vertex and edge connectivity, Vertex and edge cuts, relationship between vertex and edge connectivity, bounds for connectivity. Harary’s construction of k-connected graphs. (8)

    EULERIAN AND HAMILTONIAN GRAPHS:Eulerian graphs, Route inspection problem, Hamiltonian graphs, Gray codes and Hypercubes, Travelling sales person problem. (8)

    MATCHING, VERTEX-COLORING AND DOMINATION: Matching (unweighted), Perfect matching, Hall’s theorem, assignment problem, augmenting path algorithm. Vertex-coloring – bounds, assignment of frequencies, fast register allocation, scheduling problem. Dominating set, domination number, bounds, connected dominating set in Ad Hoc Networks. (11)

    PLANAR GRAPHS: Properties, Kuratowski’s theorem, Hopcroft Tarjan Planarity testing algorithm. (5)

    RANDOM GRAPHS: Random graph – Definitions of G(n, p) and G(n, M) models, power law degree distribution, Web graph models, applications to social networks. (7)

    TUTORIAL PRACTICE:
    1. Case Studies

    Total L:45+T:30=75

    TEXT BOOKS:
    1. Anthony Bonato, “A Course on Web Graphs”, American Mathematical Society, 2008.
    2. Haynes T W, Hedetniemi and Slater P J, “Fundamentals of Domination in Graphs”, CRC Press, 2015.
    3. Jonathan Gross and Jay Yellen, “Graph Theory and its Applications”, Press, 2005.

    REFERENCES:
    1. Douglas B West, “Graph Theory”, Prentice Hall, 2009.
    2. Bondy J A, Murty U S R, “Graph Theory”, Springer, 2013.

    20XWO4 ENVIRONMENTAL SCIENCE AND GREEN COMPUTING

    3 2 0 4

    NATURAL RESOURCES, ECOSYSTEMS AND BIODIVERSITY: Environment, Definition, Scope and importance, Forest resources, Use and overexploitation, Water resources: Use and over utilization. Eco system; Structure and functions of an eco system, energy flow in the eco system. Bio Diversity; values of biodiversity, biodiversity at global, national and local levels – threats to bio diversity. Conservation of bio diversity – In-situ & Ex-situ conservation. (9)

    ENERGY SOURCES: Growing energy needs, Renewable and non renewable energy sources, Hydro power, Solar Power: Photovoltaic Energy – Motivation for going Solar – Solar Electricity – PV cells. Wind Power: – Using the Wind: Generating Power at Remote Sites,– Measuring the Wind – Estimating the output. Use of alternate energy sources. (9)

    SOCIAL ISSUES AND THE ENVIRONMENT: From unsustainable to sustainable development, Urban problems related to energy, Water conservation, Rain water harvesting, Watershed management, Environment and human health, Role of information technology in environment and human health. Environment Protection Act: Air (Prevention and Control of Pollution) Act – Water Act, Forest Conservation Act, Wildlife Protection Act, Introduction to EIA and ISO 14000. (9)

    ENVIRONMENTAL POLLUTION AND DISASTER MANAGEMENT: Definition – causes, effects and control measures of air pollution, water pollution, soil pollution, noise pollution, thermal pollution and nuclear hazards. Disaster management - floods, earthquake, cyclone and landslides. Solid waste management - causes, effects and control measures of municipal solid wastes (Biomedical wastes, hazardous wastes). Role of an individual in prevention of pollution. (9)

    GLOBAL ATMOSPHERIC CHANGE& GREEN FUNDAMENTALS: The Atmosphere of Earth – Global Temperature – Global Energy Balance , The Greenhouse Effect - Environmental Issues and Green Computing, Electronic waste management: Introduction;- Environment and society, producer responsibility legislation – the Waste Electrical and Electronic Equipment (WEEE) directive, Materials Composition of WEEE: Mobile Phones – Television – Washing Machines, - Current and new electronic waste recycling technology- Future perspectives of electronic scrap. (9)

    TUTORIAL PRACTICE:
    1. Case Studies

    Total L: 45+T: 30=75

    TEXT BOOKS:
    1. Mackenzie L. Davis, and David A. Cornwell, “Introduction to Environmental Engineering”, Tata McGraw Hill, 2010.
    2. Chetan Singh Solanki, “Solar Photovoltaics”, PHI, 2011.
    3. Siraj Ahmed, “Wind Energy : Theory and Practice”, PHI, 2011.
    4. Mahajan S. P. Pollution Control in Process Industries, Tata McGraw Hill, 1985.
    5. R. E. Hester and R. M. Harrison, “Electronic Waste Management”, Royal Society of Chemistry, 2009.

    REFERENCES:
    1. William W. Nazarodd and Lisa Alvarez-Cohen, “Environmental Engineering Science”, Wiley-India, 2010
    2. AnubhaKaushik and Kaushik C P, “Environmental Science and Engineering”, New Age International, 2005.
    3. Martha Maeda, “How to Solar Power your Home”, Atlantic Publishing Group, 2011.
    4. Paul Gipe, “Wind Power – Renewable Energy for Home, Farm and Business”, Sterling Hill Publications, 2008.
    5. Klaus Hieronymi, RamzyKahhat, Eric Williams, “E-Waste Management : From Waste to resource”, Routledge – Taylor and Fransis, New York, 2012.
    6. Diane GowMcdilda, “The Everything Green Living Book”, Adams Media, 2007.

    20XWO5 QUANTUM MECHANICS AND FUNDAMENTALS OF QUANTUM COMPUTATION

    3 2 0 4

    WAVE MECHANICAL CONCEPTS AND FORMALISM: wave nature of particles – Interpretation of wave function- principle of super position- wave packet- uncertainty principle - Schrödinger’s time dependent and independent wave equations – Postulates of quantum mechanics – vector space-Linear and Hermitian operators - simultaneous measurability of observable (7)

    ONE DIMENSIONAL ENERGY EIGEN VALUE PROBLEMS: Square well potential with rigid walls- Square well potential with finite walls- Square potential barrier – Linear Harmonic Oscillator (6)

    THREE DIMENSIONAL ENERGY EIGEN VALUE PROBLEMS: Schrödinger’s equation in spherical polar coordinates- The hydrogen atom- Angular momentum-spin (8)

    QUANTUM COMPUTATION: History of quantum computation and quantum information-qubits-qubit gates-quantum circuits-quantum teleportation-quantum entanglement (12)

    QUANTUM COMPUTER-PHYSICAL REALIZATION: Guiding principles-conditions for quantum computation-Harmonic oscillator and optical photon quantum computer-physical apparatus -quantum computation-drawbacks (12)

    TUTORIAL PRACTICE:
    1. Graphical visualisation with MATLAB
    2. Square well potential with rigid walls
    3. Square well potential with finite walls
    4. Square potential barrier
    5. Linear Harmonic Oscillator

    Total L: 45 + T:30=75

    TEXT BOOKS:
    1. David J Griffiths, “Introduction to Quantum Mechanics”, Cambridge University Press, 2017
    2. Aruldhas G, “Quantum Mechanics”, PHI, 2011.
    3. Micheal A Nielsen, Isaac L Chuang, “Quantum Computation and Quantum Information”, Cambridge University Press, 2010.

    REFERENCES:
    1. Mathews P M and Venkatesan K, “A Text book of Quantum Mechanics”, Tata McGraw Hill, 2007.
    2. Dirac P A M, “Principles of Quantum Mechanics”, Oxford University Press, 2006.
    3. Edward L Wolf, “Quantum Nanoelectronics”, Wiley Vch Verlag GmbH & Co, Weinheim, 2009.
    4. Eisberg R, and Resnick R. “Quantum Physics of Atoms, Molecules, Solids”, Nuclei and Particles, Wiley-India, 2007.

    20XWO6 COMPUTATIONAL FOUNDATIONS FOR ROBOTICS

    3 2 0 4

    INTRODUCTION: Robots and their applications in industry, mobile and service applications, Configurations of industrial and mobile robots.Robot controllers, drives, actuators and sensors, Spatial descriptions and Transformations: Positions, orientations and frames, Mappings, translations, rotations and transformations, transformation arithmetic, Transform equations, representation of orientation, free vector transformation, Introduction to ROS. (8)

    FORWARD AND INVERSE KINEMATICS: Link co-ordinates, D-H Representation, Arm equation -Two axis and three axis, robots, Inverse kinematics of two axis and three axis robots, Maneuverability – Workspace – Control. (9)

    LOCALIZATION AND MAPPING: Challenges in mobile robots, Introduction - Bayes filter – Kalman Filter - Extended Kalman Filter - Information Filter - Histogram Filter - Particle Filter –Localization- Map Representation- Probabilistic Map based Localization-Monte carlo localization- Landmark based navigation-Globally unique localization- Positioning beacon systems- Route based localization – Mapping - Metrical maps - Grid maps - Sector maps – Hybrid Maps – SLAM (10)

    DECISION MAKING: Discrete planning and dynamic programming principles, Configuration space abstraction, Sampling-based planners for mobile robots, Feedback-based planning for mobile robots- Feedback in discrete spaces, wave-front functions, Potential and navigation functions for mobile robots. (9)

    PLANNING AND NAVIGATION: Overview of the three computational components and their interaction, sensing, planning, and control - Global path planning – A* Algorithm - local path planning - Road map path planning- Cell decomposition path planning-Potential field path planning-Obstacle avoidance – Path control. Markov Decision Process (MDP) in discrete spaces, optimal control and steering methods- Nonlinear optimization and gradient methods. (9)

    TUTORIAL PRACTICE:
    1. Robot Operation System (ROS) basics
    2. Localization
    3. Path planning and navigation
    4. Multi-robot coordination

    Total L: 45 + T: 30 = 75

    TEXT BOOKS:
    1. 1. John J. Craig, ”Introduction to Robotics: Mechanics and Contro”, Pearson Education, 2008
    2. 2. , “Planning Algorithms”, Cambridge University Press, 2006.
    3. 3. Howie Choset, Kevin M. Lynch, Seth Hutchinson, George A. Kantor, Wolfram Burgard, Lydia E. Kavraki, and Sebastian Thrun, “Principles of Robot Motion:Theory, Algorithms, and Implementations”, (PRMTAI), MIT Press, 2005.

    REFERENCES:
    1. Mark W. Spong, Seth Hutchinson, and M. Vidyasagar, “Robot Modeling and Control”, Wiley, 2006.
    2. Kevin M. Lynch and Frank C. Park, “Modern Robotics: Mechanics, Planning, and Control”, Cambridge University Press, 2017.
    3. Roland Siegwart, Illah Reza Nourbakhsh and DavideScaramuzza, “Introduction to Autonomous Mobile Robots”, MIT Press, 2004.

    20XWO7 MATHEMATICAL MODELLING

    3 2 0 4

    INTRODUCTION TO MODELING: Modeling process, Overview of different kinds of model. (3)

    EMPIRICAL MODELING WITH DATA FITTING: Error function, least squares method; fitting data with polynomials and splines.(4)

    CAUSAL MODELING AND FORECASTING: Introduction, Modeling the causal time series, forecasting by regression analysis, predictions by regression. Planning, development and maintenance of linear models, trend analysis, modeling seasonality and trend, trend removal and cyclical analysis, decomposition analysis. Modeling financial time series. Econometrics and time series models. Non seasonal models: ARIMA process for univariate and multivariate. (8)

    INVENTORY MODELS: Classic Economic Order Quantity (EOQ)Model, EOQ with price breaks, Multi-item EOQ with Storage limitation, Dynamic EOQ , Probabilistic EOQ model , No setup model, Setup model (s-S Policy). (7)

    PORTFOLIO MODELING AND ANALYSIS: Portfolios, returns and risk, risk-reward analysis, asset pricing models, mean variance portfolio optimization, Markowitz model and efficient frontier calculation algorithm, Capital Asset Pricing Models (CAPM). (8)

    MODELING WITH BIOINFORMATICS: Introduction, Biological data- types, mode of collection, documentation and submission. Sequence alignment- Definition, significance, dot matrix method, dynamic programming- Global and local alignment tools, scoring matrices and gap penalties. Multiple sequence alignment: Iterative methods. Hidden Markovian models, statistical methods, position specific scoring matrices. (15)

    TUTORIAL PRACTICE:
    1. Algebraic Models: Linear, Quadratic, and Exponential.
    2. Polynomial curve fitting and cubic spline curve fitting.
    3. Time series analysis and forecasting models.
    4. Portfolio optimization models.
    5. Cox-Ross-Rubinstein (CRR) model.
    6. Risk analysis models.
    7. Pair wise sequence alignment using dynamic programming.
    8. Multiple sequence alignment using Hidden Markovian models

    Total L: 45+P: 30=75

    TEXT BOOKS:
    1. Giordano F R, Weir M D and Fox W P,“A First Course in Mathematical Modeling”, Brooks/Cole, 2008.
    2. Mount, DW, “Bioinformatics Sequence and genome analysis”, Cold Spring Harbor Laboratory, 2004.

    REFERENCES:
    1. Hamdy A Taha, “Operation Research- An Introduction”, Pearson Education, 2014.
    2. Christoffersen P, “ Elements of Financial Risk Management”, Academic Press, 2012.
    3. Capinski M. and Zastawniak T,“Mathematics for Finance: An Introduction to Financial Engineering”, Springer, 2010.
    4. Alexander Isaev, Introduction to Mathematical Methods in Bioinformatics, Springer, 2006.

    20XWO8 COMPUTATIONAL FINANCE

    3 2 0 4

    MATHEMATICAL PRELIMINARIES: Conditional expectation – Sigma Algebra – Filtrations, Stochastic Calculus - Random walk – Brownian motion – Martingales – Ito’s Lemma. (5)

    FINANCIAL DERIVATIVES: Law of one price – Risk neutral pricing – Arbitrage and Hedging – Financial Products and capital markets – Futures, Forwards and options – Options pricing problem. Risk free assets – risky assets. (8)

    BASIC OPTIONS THEORY: Definitions – Pay off diagrams – Single period binomial options theory – Multi period binomial options theory – Real options – American options, Simulation methods for options pricing – Random variable generation – simulation of stochastic processes. Black Schole’s formula. (11)

    PORTFOLIO THEORY: Introduction - Portfolio theory with matrix algebra - Review of constrained optimization methods, Markowitz algorithm, Markowitz Algorithm using the solver and matrix algebra – Portfolio choice and linear pricing – Statistical analysis of efficient portfolios. Sharpe’s single index model. (11)

    THE CAPITAL ASSET PRICING (CAP) AND RISK BUDGETING: Mean variance portfolio theory – Asset returns – Variance as a risk measure - The one and two fund theorems, The capital market line – CAP as a pricing formula – Systematic and unsystematic risk – Euler’s theorem – Asset contributions to volatility – beta as a measure of portfolio risk , Limitations of mathematical models in finance. (10)

    TUTORIAL PRACTICE:
    1. Problems using Capital Asset Pricing model.
    2. Plot time series data and find outliers
    3. Monte Carlo Simulation of options pricing
    4. Sharpe’s single index model
    5. Black Schole’s model
    6. CAP model

    Total L: 45+T:30 = 75

    REFERENCES:
    1. Marek Capinski, Tomasz Zastawniak, “Mathematics for Finance: A Introduction to Financial engineering”, Springer, 2011.
    2. David Ruppert, “Statistics and Data Analysis for Financial Engineering”, Springer-Verlag, 2011.
    3.  Edwin J. Elton, Martin J. Gruber, Stephen J. Brown and William N. Goetzmann “Modern Portfolio Theory and Investment Analysis”, Wiley, 2014.
    4.  Simon Benninga, “Financial Modeling”, MIT Press, 2014.
    5. Steven E Shreve, “Stochastic Calculus for Finance – I” , Springer, 2012
    6. Glasserman Paul, “Monte Carlo Methods in financial Engineering”, Springer Science and Business media, 2013.