R16 Cse
R16 Cse
TU
       W
        or
             ld
JN
  TU
       W
        or
             ld
JN
  TU
       W
        or
             ld
JN
  TU
       W
        or
             ld
JN
  TU
       W
        or
             ld
JN
  TU
       W
        or
             ld
JN
  TU
       W
        or
             ld
JN
  TU
       W
        or
             ld
JN
  TU
       W
        or
             ld
JN
  TU
       W
        or
             ld
JN
  TU
       W
        or
             ld
JN
  TU
       W
        or
             ld
JN
  TU
       W
        or
             ld
JN
  TU
       W
        or
             ld
JN
  TU
       W
        or
             ld
JN
  TU
       W
        or
             ld
                                                                   w. e. f. AY 2016-17
I YEAR II SEMESTER
           Course
S. No                              Course Title               L      T    P    Credits
            Code
 1       PH201BS     Engineering Physics-II                   3      0    0       3
 2       MA202BS     Mathematics-II                           4      1    0       4
 3       MA203BS     Mathematics-III                          4      1    0       4
 4       CS204ES     Computer Programming in C                3      0    0       3
 5       ME205ES     Engineering Graphics                     2      0    4       4
 6       CH206BS     Engineering Chemistry Lab                0      0    3       2
 7       PH207BS     Engineering Physics Lab                  0      0    3       2
 8       CS208ES     Computer Programming in C Lab            0      0    3       2
 9      *EA209MC     NCC/NSO                                  0      0    0       0
                     Total Credits                            16     2    13     24
*Mandatory Course.
                          PH201BS: ENGINEERING PHYSICS - II
UNIT - I
Principles of Quantum Mechanics: Waves and particles, de-Broglie hypothesis, matter waves,
Davisson and Germer experiment, Heisenberg uncertainty principle, Schrodinger time
independent wave equation, physical significance of wave function, particle in 1-D potential
box, electron in periodic potential, Kronig-Penny model (qualitative treatment), E-K curve,
origin of energy band formation in solids.
UNIT - II
Semiconductor Physics: Fermi level in intrinsic and extrinsic semiconductors, calculation of
carrier concentration in intrinsic & extrinsic semiconductors, direct and indirect band gap
semiconductors, formation of PN junction, open circuit PN junction, energy diagram of PN
junction diode, solar cell: I-V characteristics and applications.
UNIT - III
Dielectric Properties: Electric dipole, dipole moment, dielectric constant, polarizability,
electric susceptibility, displacement vector, electronic, ionic and orientation polarizations and
calculation of their polarizabilitites, internal field, Clausius-Mossotti relation, Piezoelectricity,
pyroelectricity and ferroelectricity-BaTiO3 structure.
UNIT - IV
Magnetic Properties & Superconductivity: Permeability, field intensity, magnetic field
induction, magnetization, magnetic susceptibility, origin of magnetic moment, Bohr magneton,
classification of dia, para and ferro magnetic materials on the basis of magnetic moment,
hysteresis curve based on domain theory, soft and hard magnetic materials, properties of anti-
ferro and ferri magnetic materials,
Superconductivity: Superconductivity phenomenon, Meissner effect, applications of
superconductivity.
UNIT - V
Introduction to nanoscience: Origin of nanoscience, nanoscale, surface to volume ratio,
quantum confinement, dominance of electromagnetic forces, random molecular motion, bottom-
up fabrication: Sol-gel, CVD and PVD techniques, top-down fabrication: ball mill method,
characterization by XRD, SEM and TEM.
Text Books:
   1. Solid State Physics, A. J. Dekkar, Macmillan publishers Ind. Ltd.,
   2. Solid State Physics, Chales Kittel, Wiley student edition.
   3. Fundamentals of Physics, Alan Giambattisa, BM Richardson and Robert C Richardson,
      Tata McGraw hill Publishers.
Reference Books:
   1. Modern Engineering Physics, K. Vijaya Kumar, S. Chandralingam S. Chand & Co. Pvt.
      Ltd.,
   2. University Physics, Francis W. Sears, Hugh D. Young, Marle Zeemansky and Roger A
      Freedman, Pearson Education.
   3. Fundamentals of Acoustics, Kinster and Frey, John Wiley and Sons.
   4. Introduction to Quantum Mechanics Leonard I. Schiff McGraw-Hill
                      MA102BS/MA202BS: MATHEMATICS - II
                              (Advanced Calculus)
Course Outcomes: After learning the contents of this course the student must be able to
    use Laplace transform techniques for solving DE’s
    evaluate integrals using Beta and Gamma functions
    evaluate the multiple integrals and can apply these concepts to find areas, volumes,
      moment of inertia etc of regions on a plane or in space
    evaluate the line, surface and volume integrals and converting them from one to
      another
UNIT – I
Laplace Transforms: Laplace transforms of standard functions, Shifting theorems,
derivatives and integrals, properties- Unit step function, Dirac’s delta function, Periodic
function, Inverse Laplace transforms, Convolution theorem (without proof).
Applications: Solving ordinary differential equations (initial value problems) using Laplace
transforms.
UNIT - II
Beta and Gamma Functions: Beta and Gamma functions, properties, relation between Beta
and Gamma functions, evaluation of integrals using Beta and Gamma functions.
Applications: Evaluation of integrals.
UNIT – III
Multiple Integrals: Double and triple integrals, Change of variables, Change of order of
integration. Applications: Finding areas, volumes & Center of gravity (evaluation using Beta
and Gamma functions).
UNIT – IV
Vector Differentiation: Scalar and vector point functions, Gradient, Divergence, Curl and
their physical and geometrical interpretation, Laplacian operator, Vector identities.
UNIT – V
Vector Integration: Line Integral, Work done, Potential function, area, surface and volume
integrals, Vector integral theorems: Greens, Stokes and Gauss divergence theorems (without
proof) and related problems.
Text Books:
   1. Advanced Engineering Mathematics by R K Jain & S R K Iyengar, Narosa Publishers
   2. Engineering Mathematics by Srimanthapal and Subodh C. Bhunia, Oxford Publishers
References:
   1. Advanced Engineering Mathematics by Peter V. O. Neil, Cengage Learning
      Publishers.
   2. Advanced Engineering Mathematics by Lawrence Turyn, CRC Press
                                MA203BS: Mathematics - III
                             (Statistical and Numerical Methods)
Course Outcomes: After learning the contents of this course the student must be able to
   differentiate among random variables involved in the probability models which are
      useful for all branches of engineering
   calculate mean, proportions and variances of sampling distributions and to make
      important decisions s for few samples which are taken from a large data
   solve the tests of ANOVA for classified data
   find the root of a given equation and solution of a system of equations
   fit a curve for a given data
   find the numerical solutions for a given first order initial value problem
UNIT – I
Random variables and Distributions:
Introduction, Random variables, Discrete random variable, Continuous random variable,
Probability distribution function, Probability density function, Expectation, Moment
generating function, Moments and properties. Discrete distributions: Binomial and geometric
distributions. Continuous distribution: Normal distributions.
UNIT – II
Sampling Theory: Introduction, Population and samples, Sampling distribution of means ( 
Known)-Central limit theorem, t-distribution, Sampling distribution of means (  unknown)-
Sampling distribution of variances –       2 and F- distributions, Point estimation, Maximum
error of estimate, Interval estimation.
UNIT – III
Tests of Hypothesis: Introduction, Hypothesis, Null and Alternative Hypothesis, Type I and
Type II errors, Level of significance, One tail and two-tail tests, Tests concerning one mean
and proportion, two means-proportions and their differences-ANOVA for one-way classified
data.
UNIT – IV
Algebraic and Transcendental Equations & Curve Fitting: Introduction, Bisection
Method, Method of False position, Iteration methods: fixed point iteration and Newton
Raphson methods. Solving linear system of equations by Gauss-Jacobi and Gauss-Seidal
Methods.
Curve Fitting: Fitting a linear, second degree, exponential, power curve by method of least
squares.
UNIT – V
Numerical Integration and solution of Ordinary Differential equations: Trapezoidal rule-
Simpson’s 1/3rd and 3/8th rule- Solution of ordinary differential equations by Taylor’s series,
Picard’s method of successive approximations, Euler’s method, Runge-Kutta method (second
and fourth order)
Text Books:
   1. Probability and Statistics for Engineers by Richard Arnold Johnson, Irwin Miller and
      John E. Freund, New Delhi, Prentice Hall.
   2. Probability and Statistics for Engineers and Sciences by Jay L. Devore, Cengage
      Learning.
   3. Numerical Methods for Scientific and Engineering Computation by M. K. Jain, S. R.
      K. Iyengar and R. K. Jain, New Age International Publishers
References:
   1. Fundamentals of Mathematical Statistics by S. C. Guptha & V. K. Kapoor, S. Chand.
   2. Introductory Methods of Numerical Analysis by S. S. Sastry, PHI Learning Pvt. Ltd.
   3. Mathematics for engineers and scientists by Alan Jeffrey, 6th edition, CRC press.
                CS104ES/CS204ES: COMPUTER PROGRAMMING IN C
Course Objectives:
   To learn the fundamentals of computers.
   To understand the various steps in Program development.
   To learn the syntax and semantics of C Programming Language.
   To learn how to write modular and readable C Programs.
   To learn to write programs using structured programming approach in C to solve
      problems.
Course Outcomes:
   Demonstrate the basic knowledge of computer hardware and software.
   Ability to write algorithms for solving problems.
   Ability to draw flowcharts for solving problems.
   Ability to code a given logic in C programming language.
   Gain knowledge in using C language for solving problems.
UNIT - I
Introduction to Computers – Computer Systems, Computing Environments, Computer
Languages, Creating and running programs, Program Development, algorithms and flowcharts ,
Number systems-Binary, Decimal, Hexadecimal and Conversions, storing integers and real
numbers.
Introduction to C Language – Background, C Programs, Identifiers, Types, Variables,
Constants, Input / Output, Operators(Arithmetic, relational, logical, bitwise etc.), Expressions,
Precedence and Associativity, Expression Evaluation, Type conversions, Statements- Selection
Statements(making decisions) – if and switch statements, Repetition statements ( loops)-while,
for, do-while statements, Loop examples, other statements related to looping – break, continue,
goto, Simple C Program examples.
UNIT - II
Functions-Designing Structured Programs, Functions, user defined functions, inter function
communication, Standard functions, Scope, Storage classes-auto, register, static, extern, scope
rules, type qualifiers, recursion- recursive functions, Limitations of recursion, example C
programs.
Arrays – Concepts, using arrays in C, inter function communication, array applications- linear
search, binary search and bubble sort, two – dimensional arrays, multidimensional arrays, C
program examples.
UNIT - III
Pointers – Introduction (Basic Concepts), Pointers for inter function communication, pointers to
pointers, compatibility, Pointer Applications-Arrays and Pointers, Pointer Arithmetic and
arrays, Passing an array to a function, memory allocation functions, array of pointers,
programming applications, pointers to void, pointers to functions.
Strings – Concepts, C Strings, String Input / Output functions, arrays of strings, string
manipulation functions, string / data conversion, C program examples.
UNIT - IV
Enumerated, Structure and Union Types – The Type Definition (typedef), Enumerated types,
Structures –Declaration, initialization, accessing structures, operations on structures, Complex
structures-Nested structures, structures containing arrays, structures containing pointers, arrays
of structures, structures and functions, Passing structures through pointers, self referential
structures, unions,     bit fields, C programming examples, command–line arguments,
Preprocessor commands.
UNIT – V
Input and Output – Concept of a file, streams, text files and binary files, Differences between
text and binary files, State of a file, Opening and Closing files, file input / output functions
(standard library input / output functions for files), file status functions (error handling),
Positioning functions (fseek ,rewind and ftell), C program examples.
Text Books:
   1. Computer Science: A Structured Programming Approach Using C, B. A. Forouzan and
      R. F. Gilberg, Third Edition, Cengage Learning.
   2. Programming in C. P. Dey and M Ghosh , Second Edition, Oxford University Press.
Reference Books:
   1. The C Programming Language, B.W. Kernighan and Dennis M. Ritchie, Second
      Edition, Pearson education.
   2. Programming with C, B. Gottfried, 3rd edition, Schaum’s outlines, McGraw Hill
      Education (India) Pvt Ltd.
   3. C From Theory to Practice, G S. Tselikis and N D. Tselikas, CRC Press.
   4. Basic computation and Programming with C, Subrata Saha and S. Mukherjee,
      Cambridge University Press.
                    ME106ES/ME205ES: ENGINEERING GRAPHICS
Course objectives:
   To provide basic concepts in engineering drawing.
   To impart knowledge about standard principles of orthographic projection of objects.
   To draw sectional views and pictorial views of solids.
Course Outcomes:
   Ability to prepare working drawings to communicate the ideas and information.
   Ability to read, understand and interpret engineering drawings.
UNIT – I
Introduction To Engineering Drawing: Principles of Engineering Graphics and their
Significance, Conic Sections including the Rectangular Hyperbola – General method only.
Cycloid, Epicycloid and Hypocycloid Involute. Scales – Plain, Diagonal, and Vernier Scales.
UNIT - II
Orthographic Projections: Principles of Orthographic Projections – Conventions –
Projections of Points and Lines Projections of Plane regular geometric figures.—Auxiliary
Planes.
UNIT – III
Projections of Regular Solids – Auxiliary Views.
UNIT – IV
Sections or Sectional views of Right Regular Solids – Prism, Cylinder, Pyramid, Cone –
Auxiliary views – Sections of Sphere. Development of Surfaces of Right Regular Solids –
Prism, Cylinder, Pyramid, and Cone
UNIT – V
Isometric Projections: Principles of Isometric Projection – Isometric Scale – Isometric Views
– Conventions – Isometric Views of Lines, Plane Figures, Simple and Compound Solids –
Isometric Projection of objects having non- isometric lines. Isometric Projection of Spherical
Parts. Conversion of Isometric Views to Orthographic Views and Vice-versa – Conventions
Auto CAD: Basic principles only.
Text Books:
   1. Engineering Drawing / Basant Agrawal and Mc Agrawal/ Mc Graw Hill
   2. Engineering Drawing/ M.B. Shah, B.C. Rane / Pearson.
Reference Books:
   1. Engineering Drawing / N.S. Parthasarathy and Vela Murali/ Oxford
   2. Engineering Drawing N.D. Bhatt / Charotar
                     CH206BS: ENGINEERING CHEMISTRY LAB
LIST OF EXPERIMENTS
Volumetric Analysis:
   1. Estimation of Ferrous ion by Dichrometry.
   2. Estimation of hardness of water by Complexometric method using EDTA.
   3. Estimation of Ferrous and Ferric ions in a given mixture by Dichrometry.
   4. Estimation Ferrous ion by Permanganometry.
   5. Estimation of copper by Iodomery.
   6. Estimation of percentage of purity of MnO2 in pyrolusite
   7. Determination of percentage of available chlorine in bleaching powder.
   8. Determination of salt concentration by ion- exchange resin.
Preparation of Polymers:
   1. Preparation of Bakelite and urea formaldehyde resin.
Text Books:
   1. Vogel’s Text Book of Quantitative Chemical Analysis, 5th Edition (2015)
   2. G. H. Jeffery, J. Bassett, J. Mendham and R. C. Denney.
   3. A Text Book on experiments and calculations in Engineering Chemistry by S.S. Dara S.
      Chand & Company Ltd., Delhi (2003).
                  PH107BS/PH207BS: ENGINEERING PHYSICS LAB
LIST OF EXPERIMENTS
Course Objective:
   To write programs in C using structured programming approach to solve the problems.
Course Outcomes:
   Ability to design and test programs to solve mathematical and scientific problems.
   Ability to write structured programs using control structures and functions.
4.    a)    The least common multiple (LCM) of two positive integers a and b is the smallest
         integer that is evenly divisible by both a and b. Write a C program that reads two
         integers and calls LCM (a, b) function that takes two integer arguments and returns their
         LCM. The LCM (a, b) function should calculate the least common multiple by calling
         the GCD (a, b) function and using the following relation:
                     LCM (a, b) = ab / GCD (a, b)
     b) Write a C program that reads two integers n and r to compute the ncr value using the
        following relation:
              (n, r) = n! / r! (n-r)! . Use a function for computing the factorial value of an integer.
5.    a) Write C program that reads two integers x and n and calls a recursive function to
                  n
        compute x
     b) Write a C program that uses a recursive function to solve the Towers of Hanoi problem.
     c) Write a C program that reads two integers and calls a recursive function to compute
        value.
6. a) Write a C program to generate all the prime numbers between 1 and n, where n is a value
       supplied by the user using Sieve of Eratosthenes algorithm.
   b) Write a C program that uses non recursive function to search for a Key value in a given
       list of integers. Use linear search method.
7.   a) Write a menu-driven C program that allows a user to enter n numbers and then choose
        between finding the smallest, largest, sum, or average. The menu and all the choices
        are to be functions. Use a switch statement to determine what action to take. Display an
        error message if an invalid choice is entered.
     b) Write a C program that uses non recursive function to search for a Key value in a given
        sorted list of integers. Use binary search method.
8    a) Write a C program that implements the Bubble sort method to sort a given list of
        integers in ascending order.
     b) Write a C program that reads two matrices and uses functions to perform the following:
            1. Addition of two matrices
            2. Multiplication of two matrices
10. a) Write a C program to replace a substring with another in a given line of text.
          b) Write a C program that reads 15 names each of up to 30 characters, stores them
              in an array, and uses an array of pointers to display them in ascending (ie.
              alphabetical) order.
11. a) 2’s complement of a number is obtained by scanning it from right to left and
       complementing all the bits after the first appearance of a 1. Thus 2’s complement of
       11100 is 00100. Write a C program to find the 2’s complement of a binary number.
    b) Write a C program to convert a positive integer to a roman numeral. Ex. 11 is converted
       to XI.
12. a) Write a C program to display the contents of a file to standard output device.
    b) Write a C program which copies one file to another, replacing all lowercase characters
       with their uppercase equivalents.
13. a) Write a C program to count the number of times a character occurs in a text file. The file
       name and the character are supplied as command-line arguments.
    b) Write a C program to compare two files, printing the first line where they differ.
14. a) Write a C program to change the nth character (byte) in a text file. Use fseek function.
   b) Write a C program to reverse the first n characters in a file. The file name and n are
      specified on the command line. Use fseek function.
15. a) Write a C program to merge two files into a third file (i.e., the contents of the firs t file
       followed by those of the second are put in the third file).
    b) Define a macro that finds the maximum of two numbers. Write a C program that uses
       the macro and prints the maximum of two numbers.
Reference Books:
   1. Mastering C, K.R. Venugopal and S.R. Prasad, TMH Publishers.
   2. Computer Programming in C, V. Rajaraman, PHI.
   3. Programming in C, Stephen G. Kochan, Fourth Edition, Pearson Education.
   4. C++: The complete reference, H. Schildt, TMH Publishers.
      JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY HYDERABAD
                                                                           ld
     II YEAR I SEMESTER
             Course
    S. No                                 Course Title                L    T   P    Credits
              Code
                                                            or
     1      MA301BS       Mathematics – IV                            4    1   0      4
     2      CS302ES       Data Structures through C++                 4    0   0      4
            CS303ES       Mathematical Foundations of Computer
     3                                                                4    0   0      4
                          Science
     4       CS304ES      Digital Logic Design                        3    0   0      3
                                             W
     5       CS305ES      Object Oriented Programming through Java    3    0   0      3
     6       CS306ES      Data Structures through C++ Lab             0    0   3      2
     7       CS307ES      IT Workshop                                 0    0   3      2
             CS308ES      Object Oriented Programming through Java
     8                                                                0    0   3      2
                          Lab
     9      * MC300ES     Environmental Science and Technology        3    0   0       0
                     TU
                          Total Credits                               21   1   9      24
II YEAR II SEMESTER
              Course
    S. No                                 Course Title                L    T   P    Credits
JN
               Code
     1       CS401BS      Computer Organization                       4    0   0       4
     2       CS402ES      Database Management Systems                 4    0   0       4
     3       CS403ES      Operating Systems                           4    0   0       4
     4       CS404ES      Formal Languages and Automata Theory        3    0   0       3
     5       SM405MS      Business Economics and Financial Analysis   3    0   0       3
     6       CS406ES      Computer Organization Lab                   0    0   3       2
     7       CS407ES      Database Management Systems Lab             0    0   3       2
ll
     * Satisfactory/Unsatisfactory
                                MA301BS: MATHEMATICS - IV
                             (Complex Variables and Fourier Analysis)
                                                                                            ld
    Prerequisites: Foundation course (No Prerequisites).
                                                                     or
       evaluation of integrals using Cauchy’s integral formula
       Laurent’s series expansion of complex functions
       evaluation of integrals using Residue theorem
       express a periodic function by Fourier series and a non-periodic function by Fourier
          transform
                                                     W
       to analyze the displacements of one dimensional wave and distribution of one
          dimensional heat equation
    Course Outcomes: After learning the contents of this paper the student must be able to:
       analyze the complex functions with reference to their analyticity, integration using
          Cauchy’s integral theorem
                    TU
       find the Taylor’s and Laurent’s series expansion of complex functions
       the bilinear transformation
       express any periodic function in term of sines and cosines
       express a non-periodic function as integral representation
       analyze one dimensional wave and heat equation
JN
    UNIT – I
    Functions of a complex variable: Introduction, Continuity, Differentiability, Analyticity,
    properties, Cauchy, Riemann equations in Cartesian and polar coordinates. Harmonic and
    conjugate harmonic functions-Milne-Thompson method
    UNIT - II
    Complex integration: Line integral, Cauchy’s integral theorem, Cauchy’s integral formula,
    and Generalized Cauchy’s integral formula, Power series: Taylor’s series- Laurent series,
ll
    Singular points, isolated singular points, pole of order m – essential singularity, Residue,
    Cauchy Residue theorem (Without proof).
A
    UNIT – III
    Evaluation of Integrals: Types of real integrals:
                                     
                                                                    c  2
       a) Improper real integrals       f ( x) dx        (b)               f (cos ,sin  )d
                                                                c
                                    
                                                                              ld
    UNIT – V
    Applications of PDE: Classification of second order partial differential equations, method of
    separation of variables, Solution of one dimensional wave and heat equations.
                                                             or
    TEXT BOOKS:
      1. A first course in complex analysis with applications by Dennis G. Zill and Patrick
         Shanahan, Johns and Bartlett Publishers.
      2. Higher Engineering Mathematics by Dr. B. S. Grewal, Khanna Publishers.
                                             W
      3. Advanced engineering Mathematics with MATLAB by Dean G. Duffy
    REFERENCES:
      1. Fundamentals of Complex Analysis by Saff, E. B. and A. D. Snider, Pearson.
      2. Advanced Engineering Mathematics by Louis C. Barrett, McGraw Hill.
                   TU
JN
ll
A
                       CS302ES: DATA STRUCTURES THROUGH C++
Course Objectives:
                                                                                ld
       To understand the basic concepts such as Abstract Data Types, Linear and Non Linear
          Data structures.
       To understand the notations used to analyze the Performance of algorithms.
       To understand the behavior of data structures such as stacks, queues, trees, hash
                                                               or
          tables, search trees, Graphs and their representations.
       To choose an appropriate data structure for a specified application.
       To understand and analyze various searching and sorting algorithms.
       To learn to implement ADTs such as lists, stacks, queues, trees, graphs, search trees
          in C++ to solve problems.
                                              W
    Course Outcomes:
       Ability to choose appropriate data structures to represent data items in real world
          problems.
       Ability to analyze the time and space complexities of algorithms.
       Ability to design programs using a variety of data structures such as stacks, queues,
                    TU
          hash tables, binary trees, search trees, heaps, graphs, and B-trees.
          Able to analyze and implement various kinds of searching and sorting techniques.
    UNIT - I
    C++ Programming Concepts: Review of C, input and output in C++, functions in C++-
    value parameters, reference parameters, Parameter passing, function overloading, function
    templates, Exceptions-throwing an exception and handling an exception, arrays, pointers,
JN
    new and delete operators, class and object, access specifiers , friend functions, constructors
    and destructor, Operator overloading, class templates, Inheritance and Polymorphism..
    Basic Concepts - Data objects and Structures, Algorithm Specification-Introduction,
    Recursive algorithms, Data Abstraction, Performance analysis- time complexity and space
    complexity, Asymptotic Notation-Big O, Omega and Theta notations, Complexity Analysis
    Examples, Introduction to Linear and Non Linear data structures.
ll
    UNIT - II
    Representation of single, two dimensional arrays, sparse matrices-array and linked
    representations.
A
    Linear list ADT-array representation and linked representation, Singly Linked Lists-
    Operations-Insertion, Deletion, Circularly linked lists-Operations for Circularly linked lists,
    Doubly Linked Lists- Operations- Insertion, Deletion.
    Stack ADT, definition, array and linked implementations, applications-infix to postfix
    conversion, Postfix expression evaluation, recursion implementation, Queue ADT, definition,
    array and linked Implementations, Circular queues-Insertion and deletion operations.
    UNIT - III
    Trees – definition, terminology, Binary trees-definition, Properties of Binary Trees, Binary
    Tree ADT, representation of Binary Trees-array and linked representations, Binary Tree
                                                                              ld
    traversals, Threaded binary trees, Priority Queues –Definition and applications, Max Priority
    Queue ADT-implementation-Max Heap-Definition, Insertion into a Max Heap, Deletion
    from a Max Heap.
                                                             or
    UNIT - IV
    Searching - Linear Search, Binary Search, Hashing-Introduction, hash tables, hash functions,
    Overflow Handling, Comparison of Searching methods.
    Sorting-Insertion Sort, Selection Sort, Radix Sort, Quick sort, Heap Sort, Merge sort,
    Comparison of Sorting methods.
                                             W
    .
    UNIT - V
    Graphs–Definitions, Terminology, Applications and more definitions, Properties, Graph
    ADT, Graph Representations- Adjacency matrix, Adjacency lists, Graph Search methods -
    DFS and BFS, Complexity analysis,
    Search Trees-Binary Search Tree ADT, Definition, Operations- Searching, Insertion and
    Deletion, Balanced search trees-AVL Trees-Definition and Examples only, B-Trees-
                   TU
    Definition and Examples only, Red-Black Trees-Definitions and Examples only, Comparison
    of Search Trees.
    TEXT BOOKS:
      1. Data structures, Algorithms and Applications in C++, 2nd Edition, Sartaj Sahni,
         Universities Press.
JN
2. Data structures and Algorithms in C++, Adam Drozdek, 4th edition, Cengage learning.
    REFERENCE BOOKS:
      1. Data structures with C++, J. Hubbard, Schaum’s outlines, TMH.
      2. Data structures and Algorithms in C++, M.T. Goodrich, R. Tamassia and D. Mount,
         Wiley India.
      3. Data structures and Algorithm Analysis in C++, 3rd edition, M. A. Weiss, Pearson.
      4. Classic Data Structures, D. Samanta, 2nd edition, PHI.
ll
A
         CS303ES: MATHEMATICAL FOUNDATIONS OF COMPUTER SCIENCE
Course Objectives:
                                                                             ld
       To introduce the concepts of mathematical logic.
       To introduce the concepts of sets, relations, and functions.
       To perform the operations associated with sets, functions, and relations.
       To relate practical examples to the appropriate set, function, or relation model, and
                                                             or
          interpret the associated operations and terminology in context.
       To introduce generating functions and recurrence relations.
       To use Graph Theory for solving problems.
Course Outcomes
                                             W
       Ability to apply mathematical logic to solve problems.
       Understand sets, relations, functions, and discrete structures.
       Able to use logical notation to define and reason about fundamental mathematical
          concepts such as sets, relations, and functions.
       Able to formulate problems and solve recurrence relations.
       Able to model and solve real-world problems using graphs and trees.
                   TU
    UNIT - I
    Mathematical logic: Introduction, Statements and Notation, Connectives, Normal Forms,
    Theory of Inference for the Statement Calculus, The Predicate Calculus, Inference Theory of
    the Predicate Calculus.
JN
    UNIT - II
    Set theory: Introduction, Basic Concepts of Set Theory, Representation of Discrete
    Structures, Relations and Ordering, Functions.
    Algebraic Structures: Introduction, Algebraic Systems, Semi groups and Monoids, Groups,
    Lattices as Partially Ordered Sets, Boolean algebra.
    UNIT - III
    Elementary Combinatorics: Basics of Counting, Combinations and Permutations,
ll
Exclusion.
    UNIT - IV
    Recurrence Relations: Generating Functions of Sequences, Calculating Coefficients of
    generating functions, Recurrence relations, Solving recurrence relations by substitution and
    Generating functions, The method of Characteristic roots, Solutions of Inhomogeneous
    Recurrence Relations.
    UNIT - V
    Graphs: Basic Concepts, Isomorphisms and Subgraphs, Trees and their Properties, Spanning
    Trees, Directed Trees, Binary Trees, Planar Graphs, Euler’s Formula, Multigraphs and Euler
                                                                            ld
    Circuits, Hamiltonian Graphs, Chromatic Numbers, The Four-Color Problem.
    TEXT BOOKS:
      1. Discrete Mathematical Structures with Applications to Computer Science, J.P.
                                                           or
         Tremblay, R. Manohar, McGraw Hill education (India) Private Limited. (UNITS - I ,
         II )
      2. Discrete Mathematics for Computer Scientists & Mathematicians, Joe L. Mott,
         Abraham Kandel, Theodore P. Baker, Pearson , 2 nd ed. (Units - III, IV, V )
                                            W
    REFERENCE BOOKS:
      1. Discrete Mathematics and its Applications, Kenneth H. Rosen, 7th Edition, McGraw
         Hill education (India) Private Limited.
      2. Discrete Mathematics, D.S. Malik & M.K. Sen, Revised edition Cengage Learning.
      3. Elements of Discrete Mathematics, C. L. Liu and D. P. Mohapatra, 4th edition,
         McGraw Hill education (India) Private Limited.
      4. Discrete Mathematics with Applications, Thomas Koshy, Elsevier.
                   TU
      5. Discrete and Combinatorial Mathematics, R. P. Grimaldi, Pearson.
JN
ll
A
                              CS304ES: DIGITAL LOGIC DESIGN
                                                                               ld
       To understand the concepts of Boolean algebra.
       To understand the use of minimization logic to solve the Boolean logic expressions..
       To understand the design of combinational and sequential circuits.
       To understand the state reduction methods for Sequential circuits.
                                                              or
       To understand the basics of various types of memories.
    Course Outcomes:
       Able to understand number systems and codes.
       Able to solve Boolean expressions using Minimization methods.
                                              W
       Able to design the sequential and combinational circuits.
       Able to apply state reduction methods to solve sequential circuits.
    UNIT - I
    Digital Systems, Binary Numbers, Number base conversions, Octal, Hexadecimal and other
    base numbers, complements, signed binary numbers, Floating point number representation,
                    TU
    binary codes, Error detection and correction, binary storage and registers, binary logic,
    Boolean algebra and logic gates , Basic theorems and properties of Boolean Algebra,
    Boolean functions, canonical and standard forms, Digital Logic Gates.
    UNIT - II
    Gate–Level Minimization, The K-Map Method, Three-Variable Map, Four-Variable Map,
    Five-Variable Map , sum of products , product of sums simplification, Don’t care conditions ,
JN
    NAND and NOR implementation and other two level implementations, Exclusive-OR
    function.
    UNIT - III
    Combinational Circuits (CC), Analysis procedure, Design Procedure, Combinational circuit
    for different code converters and other problems, Binary Adder-Subtractor, Decimal Adder,
    Binary Multiplier, Magnitude Comparator, Decoders, Encoders, Multiplexers, De-
ll
multiplexers.
    UNIT - IV
A
                                                                              ld
    Shift Unit.
    TEXT BOOKS:
      1. Digital Design, M. Morris Mano, M.D.Ciletti, 5th edition, Pearson.(Units I, II, III, IV,
                                                             or
         Part of Unit V)
      2. Computer System Architecture, M.Morris Mano, 3rd edition, Pearson.(Part of Unit V)
    REFERENCE BOOKS:
      1. Switching and Finite Automata Theory, Z. Kohavi, Tata McGraw Hill.
                                             W
      2. Fundamentals of Logic Design, C. H. Roth, L. L. Kinney, 7th edition, Cengage
         Learning.
      3. Fundamentals of Digital Logic & Micro Computer Design, 5TH Edition, M.
         Rafiquzzaman, John Wiley.
                   TU
JN
ll
A
            CS305ES: OBJECT ORIENTED PROGRAMMING THROUGH JAVA
Course Objectives:
                                                                                ld
       To introduce the object oriented programming concepts.
       To understand object oriented programming concepts, and apply them in solving
          problems.
       To introduce the principles of inheritance and polymorphism; and demonstrate how
                                                               or
          they relate to the design of abstract classes
       To introduce the implementation of packages and interfaces
       To introduce the concepts of exception handling and multithreading.
       To introduce the design of Graphical User Interface using applets and swing controls.
                                               W
    Course Outcomes
       Able to solve real world problems using OOP techniques.
       Able to understand the use of abstract classes.
       Able to solve problems using java collection framework and I/o classes.
       Able to develop multithreaded applications with synchronization.
       Able to develop applets for web applications.
                    TU
       Able to design GUI based applications
    UNIT - I
    Object-oriented thinking- A way of viewing world – Agents and Communities, messages
    and methods, Responsibilities, Classes and Instances, Class Hierarchies- Inheritance, Method
    binding, Overriding and Exceptions, Summary of Object-Oriented concepts. Java buzzwords,
JN
    An Overview of Java, Data types, Variables and Arrays, operators, expressions, control
    statements, Introducing classes, Methods and Classes, String handling.
    Inheritance– Inheritance concept, Inheritance basics, Member access, Constructors, Creating
    Multilevel hierarchy, super uses, using final with inheritance, Polymorphism-ad hoc
    polymorphism, pure polymorphism, method overriding, abstract classes, Object class, forms
    of inheritance- specialization, specification, construction, extension, limitation, combination,
    benefits of inheritance, costs of inheritance.
ll
    UNIT - II
    Packages- Defining a Package, CLASSPATH, Access protection, importing packages.
    Interfaces- defining an interface, implementing interfaces, Nested interfaces, applying
A
                                                                              ld
    multitasking, Java thread model, creating threads, thread priorities, synchronizing threads,
    inter thread communication.
UNIT - IV
                                                             or
    The Collections Framework (java.util)- Collections overview, Collection Interfaces, The
    Collection classes- Array List, Linked List, Hash Set, Tree Set, Priority Queue, Array Deque.
    Accessing a Collection via an Iterator, Using an Iterator, The For-Each alternative, Map
    Interfaces and Classes, Comparators, Collection algorithms, Arrays, The Legacy Classes and
    Interfaces- Dictionary, Hashtable ,Properties, Stack, Vector
                                             W
    More Utility classes, String Tokenizer, Bit Set, Date, Calendar, Random, Formatter, Scanner
    UNIT - V
    GUI Programming with Swing – Introduction, limitations of AWT, MVC architecture,
    components, containers. Understanding Layout Managers, Flow Layout, Border Layout,
    Grid Layout, Card Layout, Grid Bag Layout.
    Event Handling- The Delegation event model- Events, Event sources, Event Listeners,
                   TU
    Event classes, Handling mouse and keyboard events, Adapter classes, Inner classes,
    Anonymous Inner classes.
     A Simple Swing Application, Applets – Applets and HTML, Security Issues, Applets and
    Applications, passing parameters to applets. Creating a Swing Applet, Painting in Swing, A
    Paint example, Exploring Swing Controls- JLabel and Image Icon, JText Field, The Swing
    Buttons- JButton, JToggle Button, JCheck Box, JRadio Button, JTabbed Pane, JScroll Pane,
JN
    TEXT BOOKS
      1. Java The complete reference, 9th edition, Herbert Schildt, McGraw Hill Education
         (India) Pvt. Ltd.
      2. Understanding Object-Oriented Programming with Java, updated edition, T. Budd,
         Pearson Education.
ll
    REFERENCE BOOKS
      1. An Introduction to programming and OO design using Java, J. Nino and F.A. Hosch,
         John Wiley & sons.
A
Course Objectives:
                                                                                ld
       To write and execute programs in C++ to solve problems using data structures such as
          arrays, linked lists, stacks, queues, trees, graphs, hash tables and search trees.
       To learn to write C++programs to implement various sorting and searching
          algorithms
                                                               or
    Course Outcomes:
       Able to identify the appropriate data structures and algorithms for solving real world
          problems.
       Able to implement various kinds of searching and sorting techniques.
       Able to implement data structures such as stacks, queues, Search trees, and hash
                                               W
          tables to solve various computing problems.
    3. Write a C++ program that uses stack operations to convert a given infix expression into its
JN
    4. Write a C++ program to implement a double ended queue ADT using an array, using a
       doubly linked list.
b) Traverse the above Binary search tree recursively in preorder, in order and post order,
    6. Write a C++ program that uses function templates to perform the following:
A
    7. Write a C++ program that implements Insertion sort algorithm to arrange a list of integers
       in ascending order.
    8. Write a template based C++ program that implements selection sort algorithm to arrange a
       list of elements in descending order.
    9. Write a template based C++ program that implements Quick sort algorithm to arrange a list
        of elements in ascending order.
                                                                                ld
    10. Write a C++ program that implements Heap sort algorithm for sorting a list of integers in
        ascending order.
11. Write a C++ program that implements Merge sort algorithm for sorting a list of integers
                                                               or
        in ascending order
12. Write a C++ program to implement all the functions of a dictionary (ADT) using hashing.
13. Write a C++ program that implements Radix sort algorithm for sorting a list of integers in
                                               W
        ascending order
    14. Write a C++ program that uses functions to perform the following:
        a) Create a binary search tree of integers.
        b) Traverse the above Binary search tree non recursively in inorder.
    15. Write a C++ program that uses functions to perform the following:
                    TU
       a) Create a binary search tree of integers.
       b) Search for an integer key in the above binary search tree non recursively.
       c) Search for an integer key in the above binary search tree recursively.
    REFERENCE BOOKS
      1. Data Structures using C++, D. S. Malik, 2 nd edition, Cengage learning.
JN
Course Objectives:
                                                                            ld
       The IT Workshop is a training lab course to get training on PC Hardware, Internet &
          World Wide Web, and Productivity tools for documentation, Spreadsheet
          computations, and Presentation.
       To introduce to a personal computer and its basic peripherals, the process of
                                                            or
          assembling a personal computer, installation of system software like MS Windows,
          Linux and the required device drivers, hardware and software level troubleshooting
          process.
       To introduce connecting the PC on to the internet from home and workplace and
          effectively usage of the internet, Usage of web browsers, email, newsgroups and
                                             W
          discussion forums. To get knowledge in awareness of cyber hygiene, i.e., protecting
          the personal computer from getting infected with the viruses, worms and other cyber
          attacks.
       To introduce the usage of Productivity tools in crafting professional word documents,
          excel spreadsheets and power point presentations using open office tools and LaTeX.
                   TU
    Course Outcomes:
       Apply knowledge for computer assembling and software installation.
       Ability how to solve the trouble shooting problems.
       Apply the tools for preparation of PPT, Documentation and budget sheet etc.
Students are suggested to work similar tasks in the Laptop scenario wherever possible.
    Problem 2: Every student should individually install operating system like Linux or MS
    windows on the personal computer. The system should be configured as dual boot with both
    windows and Linux.
A
    Problem 3: Hardware Troubleshooting: Students have to be given a PC which does not boot
    due to improper assembly or defective peripherals. They should identify the problem and fix
    it to get the computer back to working condition.
    Problem 4: Software Troubleshooting: Students have to be given a malfunctioning CPU due
    to system software problems. They should identify the problem and fix it to get the computer
    back to working condition.
                                                                              ld
    Local Area Network and access the Internet. In the process they configure the TCP/IP setting.
    Finally students should demonstrate how to access the websites and email.
Problem 6: Web Browsers, Surfing the Web: Students customize their web browsers with
                                                             or
    the LAN proxy settings, bookmarks, search toolbars and pop up blockers. Also, plug-ins like
    Macromedia Flash and JRE for applets should be configured.
    Problem 7: Search Engines & Netiquette: Students should know what search engines are and
    how to use the search engines. Usage of search engines like Google, Yahoo, ask.com and
                                             W
    others should be demonstrated by student.
    Problem 8: Cyber Hygiene: Students should learn about viruses on the internet and install
    antivirus software. Student should learn to customize the browsers to block pop ups, block
    active x downloads to avoid viruses and/or worms.
    Problem 9: Develop home page: Student should learn to develop his/her home page using
                   TU
    HTML consisting of his/her photo, name, address and education details as a table and his/her
    skill set as a list.
    Word as word Processors, Details of the three tasks and features that should be covered in
    each, using LaTeX and word – Accessing, overview of toolbars, saving files, Using help and
    resources, rulers, format painter.
    Problem 10: Using LaTeX and Word to create project certificate. Features to be covered:-
    Formatting Fonts in word, Drop Cap in word, Applying Text effects, Using Character
    Spacing, Borders and Colors, Inserting Header and Footer, Using Date and Time option in
    both LaTeX and Word.
ll
                                                                             ld
    linking, Count function, Sorting, Conditional formatting.
    Problem 15: Creating Power Point: Student should work on basic power point utilities and
    tools in Latex and Ms Office/equivalent (FOSS) which help them create basic power point
                                                             or
    presentation. PPT Orientation, Slide Layouts, Inserting Text, Formatting Text, Bullets and
    Numbering, Auto Shapes, Lines and Arrows, Hyperlinks, Inserting Images, Tables and
    Charts
REFERENCE BOOKS:
                                             W
      1. Introduction to Information Technology, ITL Education Solutions limited, Pearson
         Education.
      2. LaTeX Companion – Leslie Lamport, PHI/Pearson.
      3. Comdex Information Technology course tool kit Vikas Gupta, WILEY Dreamtech
      4. IT Essentials PC Hardware and Software Companion Guide Third Edition by David
         Anfinson and Ken Quamme. – CISCO Press, Pearson Education.
      5. PC Hardware and A+ Handbook – Kate J. Chase PHI (Microsoft)
                   TU
JN
ll
A
         CS308ES: OBJECT ORIENTED PROGRAMMING THROUGH JAVA LAB
Course Objectives:
                                                                               ld
       To write programs using abstract classes.
       To write programs for solving real world problems using java collection frame work.
       To write multithreaded programs.
       To write GUI programs using swing controls in Java.
                                                              or
       To introduce java compiler and eclipse platform.
       To impart hands on experience with java programming.
    Course Outcomes:
       Able to write programs for solving real world problems using java collection frame
                                             W
          work.
       Able to write programs using abstract classes.
       Able to write multithreaded programs.
       Able to write GUI programs using swing controls in Java.
    Note:
                   TU
       1. Use Linux and MySQL for the Lab Experiments. Though not mandatory, encourage
          the use of Eclipse platform.
       2. The list suggests the minimum program set. Hence, the concerned staff is requested to
          add more problems to the list as needed.
       1. Use Eclipse or Net bean platform and acquaint with the various menus. Create a test
          project, add a test class, and run it. See how you can use auto suggestions, auto fill.
JN
          Try code formatter and code refactoring like renaming variables, methods, and
          classes. Try debug step by step with a small program of about 10 to 15 lines which
          contains at least one if else condition and a for loop.
       2. Write a Java program that works as a simple calculator. Use a grid layout to arrange
          buttons for the digits and for the +, -,*, % operations. Add a text field to display the
          result. Handle any possible exceptions like divided by zero.
ll
             its factorial Value and returns it in another text field, when the button named
             “Compute” is clicked.
       4. Write a Java program that creates a user interface to perform integer divisions. The
          user enters two numbers in the text fields, Num1 and Num2. The division of Num1
       and Num 2 is displayed in the Result field when the Divide button is clicked. If Num1
       or Num2 were not an integer, the program would throw a Number Format Exception.
       If Num2 were Zero, the program would throw an Arithmetic Exception. Display the
       exception in a message dialog box.
5. Write a Java program that implements a multi-thread application that has three
                                                                                ld
       threads. First thread generates random integer every 1 second and if the value is even,
       second thread computes the square of the number and prints. If the value is odd, the
       third thread will print the value of cube of the number.
                                                              or
    6. Write a Java program for the following:
          i)      Create a doubly linked list of elements.
          ii)     Delete a given element from the above list.
          iii)    Display the contents of the list after deletion.
                                             W
    7. Write a Java program that simulates a traffic light. The program lets the user select
       one of three lights: red, yellow, or green with radio buttons. On selecting a button, an
       appropriate message with “Stop” or “Ready” or “Go” should appear above the buttons
       in selected color. Initially, there is no message shown.
    8. Write a Java program to create an abstract class named Shape that contains two
       integers and an empty method named print Area (). Provide three classes named
                 TU
       Rectangle, Triangle, and Circle such that each one of the classes extends the class
       Shape. Each one of the classes contains only the method print Area () that prints the
       area of the given shape.
    9. Suppose that a table named Table.txt is stored in a text file. The first line in the file is
       the header, and the remaining lines correspond to rows in the table. The elements are
JN
       separated by commas. Write a java program to display the table using Labels in Grid
       Layout.
    10. Write a Java program that handles all mouse events and shows the event name at the
        center of the window when a mouse event is fired (Use Adapter classes).
    11. Write a Java program that loads names and phone numbers from a text file where the
        data is organized as one line per record and each field in a record are separated by a
ll
        tab (\t). It takes a name or phone number as input and prints the corresponding other
        value from the hash table (hint: use hash tables).
A
    12. Write a Java program that correctly implements the producer – consumer problem
        using the concept of interthread communication.
    13. Write a Java program to list all the files in a directory including the files present in all
        its subdirectories.
       14. Write a Java program that implements Quick sort algorithm for sorting a list of names
           in ascending order
       15. Write a Java program that implements Bubble sort algorithm for sorting in descending
           order and also shows the number of interchanges occurred for the given set of
           integers.
                                                                             ld
    REFERENCE BOOKS
      1. Java for Programmers, P. J. Deitel and H. M. Deitel, 10th Edition Pearson education.
      2. Thinking in Java, Bruce Eckel, Pearson Education.
                                                            or
      3. Java Programming, D. S. Malik and P. S. Nair, Cengage Learning.
      4. Core Java, Volume 1, 9th edition, Cay S. Horstmann and G Cornell, Pearson.
                                             W
                   TU
JN
ll
A
               MC300ES: ENVIRONMENTAL SCIENCE AND TECHNOLOGY
Course Objectives:
                                                                               ld
       Understanding the importance of ecological balance for sustainable development.
       Understanding the impacts of developmental activities and mitigation measures
       Understanding the environmental policies and regulations
                                                              or
    Course Outcomes:
    Based on this course, the Engineering graduate will understand /evaluate / develop
    technologies on the basis of ecological principles and environmental regulations which in
    turn helps in sustainable development
                                              W
    UNIT - I
    Ecosystems: Definition, Scope and Importance of ecosystem. Classification, structure, and
    function of an ecosystem, Food chains, food webs, and ecological pyramids. Flow of energy,
    Biogeochemical cycles, Bioaccumulation, Biomagnification, ecosystem value, services and
    carrying capacity, Field visits.
                    TU
    UNIT - II
    Natural Resources: Classification of Resources: Living and Non-Living resources, water
    resources: use and over utilization of surface and ground water, floods and droughts, Dams:
    benefits and problems. Mineral resources: use and exploitation, environmental effects of
    extracting and using mineral resources, Land resources: Forest resources, Energy
    resources: growing energy needs, renewable and non renewable energy sources, use of
    alternate energy source, case studies.
JN
    UNIT - III
    Biodiversity And Biotic Resources: Introduction, Definition, genetic, species and ecosystem
    diversity. Value of biodiversity; consumptive use, productive use, social, ethical, aesthetic
    and optional values. India as a mega diversity nation, Hot spots of biodiversity. Field visit.
    Threats to biodiversity: habitat loss, poaching of wildlife, man-wildlife conflicts;
    conservation of biodiversity: In-Situ and Ex-situ conservation. National Biodiversity act.
ll
    UNIT - IV
    Environmental Pollution and Control Technologies: Environmental Pollution:
A
    Classification of pollution, Air Pollution: Primary and secondary pollutants, Automobile and
    Industrial pollution, Ambient air quality standards. Water pollution: Sources and types of
    pollution, drinking water quality standards. Soil Pollution: Sources and types, Impacts of
    modern agriculture, degradation of soil. Noise Pollution: Sources and Health hazards,
    standards, Solid waste: Municipal Solid Waste management, composition and characteristics
    of e-Waste and its management. Pollution control technologies: Wastewater Treatment
    methods: Primary, secondary and Tertiary.
    Overview of air pollution control technologies, Concepts of bioremediation. Global
    Environmental Problems and Global Efforts: Climate change and impacts on human
    environment. Ozone depletion and Ozone depleting substances (ODS). Deforestation and
    desertification. International conventions / Protocols: Earth summit, Kyoto protocol, and
                                                                            ld
    Montréal Protocol.
    UNIT - V
    Environmental Policy, Legislation & EIA: Environmental Protection act, Legal aspects
                                                           or
    Air Act- 1981, Water Act, Forest Act, Wild life Act, Municipal solid waste management and
    handling rules, biomedical waste management and handling rules, hazardous waste
    management and handling rules. EIA: EIA structure, methods of baseline data acquisition.
    Overview on Impacts of air, water, biological and Socio-economical aspects. Strategies for
    risk assessment, Concepts of Environmental Management Plan (EMP). Towards
                                            W
    Sustainable Future: Concept of Sustainable Development, Population and its explosion,
    Crazy Consumerism, Environmental Education,             Urban Sprawl, Human health,
    Environmental Ethics, Concept of Green Building, Ecological Foot Print, Life Cycle
    assessment (LCA), Low carbon life style.
    TEXT BOOKS:
      1. Textbook of Environmental Studies for Undergraduate Courses by Erach Bharucha
                   TU
         for University Grants Commission.
      2. Environmental Studies by R. Rajagopalan, Oxford University Press.
    REFERENCE BOOKS:
       1. Environmental Science: towards a sustainable future by Richard T. Wright. 2008
          PHL Learning Private Ltd. New Delhi.
JN
    Course Objectives:
       To understand basic components of computers.
                                                                            ld
       To understand the architecture of 8086 processor.
       To understand the instruction sets, instruction formats and various addressing modes
          of 8086.
       To understand the representation of data at the machine level and how computations
                                                            or
          are performed
          at machine level.
       To understand the memory organization and I/O organization.
       To understand the parallelism both in terms of single and multiple processors.
                                             W
    Course Outcomes:
       Able to understand the basic components and the design of CPU, ALU and Control
          Unit.
       Ability to understand memory hierarchy and its impact on computer
          cost/performance.
       Ability to understand the advantage of instruction level parallelism and pipelining for
                   TU
          high performance Processor design.
       Ability to understand the instruction set, instruction formats and addressing modes of
          8086.
       Ability to write assembly language programs to solve problems.
    UNIT - I
JN
    UNIT - II
    Central Processing Unit: The 8086 Processor Architecture, Register organization, Physical
    memory organization, General Bus Operation, I/O Addressing Capability, Special Processor
A
                                                                             ld
    UNIT - IV
    Computer Arithmetic: Introduction, Addition and Subtraction, Multiplication Algorithms,
    Division Algorithms, Floating - point Arithmetic operations.
    Input-Output Organization: Peripheral Devices, Input-Output Interface, Asynchronous
                                                             or
    data transfer, Modes of Transfer, Priority Interrupt, Direct memory Access, Input –Output
    Processor (IOP),Intel 8089 IOP.
    UNIT - V
    Memory Organization: Memory Hierarchy, Main Memory, Auxiliary memory, Associate
                                             W
    Memory, Cache Memory.
    Pipeline and Vector Processing: Parallel Processing, Pipelining, Arithmetic Pipeline,
    Instruction Pipeline, RISC Pipeline, Vector Processing, Array Processors.
    Multi Processors: Characteristics of Multiprocessors, Interconnection Structures, Inter
    processor arbitration, Inter processor communication, and synchronization.
    TEXT BOOKS:
                   TU
       1. Computer System Architecture, M. Moris Mano, Third Edition, Pearson. (UNIST-I
          , IV , V)
       2. Advanced Microprocessors and Peripherals, K M Bhurchandi, A.K Ray ,3 rd edition,
          McGraw Hill India Education Private Ltd. (UNITS - II, III).
    REFERENCE:
JN
Course Objectives:
                                                                           ld
       To understand the basic concepts and the applications of database systems.
       To master the basics of SQL and construct queries using SQL.
       To understand the relational database design principles.
       To become familiar with the basic issues of transaction processing and concurrency
                                                           or
          control.
       To become familiar with database storage structures and access techniques.
    Course Outcomes:
       Demonstrate the basic elements of a relational database management system.
                                            W
       Ability to identify the data models for relevant problems.
       Ability to design entity relationship model and convert entity relationship diagrams
          into RDBMS and formulate SQL queries on the data.
       Apply normalization for the development of application software.
    UNIT - I
                   TU
    Introduction: Database System Applications, Purpose of Database Systems, View of Data,
    Database Languages – DDL, DML, Relational Databases, Database Design, Data Storage
    and Querying, Transaction Management, Database Architecture, Data Mining and
    Information Retrieval, Specialty Databases, Database Users and Administrators, History of
    Database Systems.
    Introduction to Data base design: Database Design and ER diagrams, Entities, Attributes
    and Entity sets, Relationships and Relationship sets, Additional features of ER Model,
JN
    Conceptual Design with the ER Model, Conceptual Design for Large enterprises.
    Relational Model: Introduction to the Relational Model, Integrity Constraints over
    Relations, Enforcing Integrity constraints, Querying relational data, Logical data base
    Design: ER to Relational, Introduction to Views, Destroying /Altering Tables and Views.
    UNIT - II
    Relational Algebra and Calculus: Preliminaries, Relational Algebra, Relational calculus –
ll
    Tuple relational Calculus, Domain relational calculus, Expressive Power of Algebra and
    calculus.
    SQL: Queries, Constraints, Triggers: Form of Basic SQL Query, UNION,INTERSECT, and
A
UNIT - IV
                                                                            ld
    Transaction Management: Transactions, Transaction Concept, A Simple Transaction
    Model, Storage Structure, Transaction Atomicity and Durability, Transaction Isolation,
    Serializability, Transaction Isolation and Atomicity Transaction Isolation Levels,
    Implementation of Isolation Levels.
                                                           or
    Concurrency Control: Lock–Based Protocols, Multiple Granularity, Timestamp-Based
    Protocols, Validation-Based Protocols, Multiversion Schemes.
    Recovery System-Failure Classification, Storage, Recovery and Atomicity, Recovery
    Algorithm, Buffer Management, Failure with loss of nonvolatile storage, Early Lock Release
    and Logical Undo Operations, Remote Backup systems.
                                            W
    UNIT - V
    Storage and Indexing: Overview of Storage and Indexing: Data on External Storage, File
    Organization and Indexing, Index Data Structures, Comparison of File Organizations.
    Tree-Structured Indexing: Intuition for tree Indexes, Indexed Sequential Access Method
    (ISAM), B+ Trees: A Dynamic Index Structure, Search, Insert, Delete.
    Hash- Based Indexing: Static Hashing, Extendible hashing, Linear Hashing, Extendible vs.
                   TU
    Linear Hashing.
    TEXT BOOKS:
       1. Data base Management Systems, Raghu Ramakrishnan, Johannes Gehrke, McGraw
          Hill Education (India) Private Limited, 3rd Edition. (Part of UNIT-I, UNIT-II,
          UNIT-III, UNIT-V)
JN
    REFERENCE BOOKS:
       1. Database Systems, 6th edition, R Elmasri, Shamkant B.Navathe, Pearson
          Education.
       2. Database System Concepts, Peter Rob & Carlos Coronel, Cengage Learning.
ll
Course Objectives:
                                                                            ld
           To understand the OS role in the overall computer system
           To study the operations performed by OS as a resource manager
           To understand the scheduling policies of OS
           To understand the different memory management techniques
                                                           or
           To understand process concurrency and synchronization
           To understand the concepts of input/output, storage and file management
           To understand the goals and principles of protection
           Introduce system call interface for file and process management
           To study different OS and compare their features.
                                            W
    Course Outcomes:
           Apply optimization techniques for the improvement of system performance.
           Ability to design and solve synchronization problems.
           Learn about minimization of turnaround time, waiting time and response time and
             also maximization of throughput by keeping CPU as busy as possible.
                   TU
           Ability to change access controls to protect files.
           Ability to compare the different operating systems.
    UNIT - I
    Overview-Introduction-Operating system objectives, User view, System view, Operating
    system definition ,Computer System Organization, Computer System Architecture, OS
JN
    UNIT - II
    Process and CPU Scheduling - Process concepts-The Process, Process State, Process Control
    Block, Threads, Process Scheduling-Scheduling Queues, Schedulers, Context Switch,
ll
                                                                                  ld
    memory in Windows..
    UNIT - IV
    Storage Management-File System- Concept of a File, System calls for file operations - open
                                                                or
    (), read (), write (), close (), seek (), unlink (), Access methods, Directory and Disk Structure,
    File System Mounting, File Sharing, Protection.
    File System Implementation - File System Structure, File System Implementation, Directory
    Implementation, Allocation methods, Free-space Management, Efficiency, and Performance.
    Mass Storage Structure – Overview of Mass Storage Structure, Disk Structure, Disk
                                                W
    Attachment, Disk Scheduling, Disk Management, Swap space Management
    UNIT - V
    Deadlocks - System Model, Deadlock Characterization, Methods for Handling Deadlocks,
    Deadlock Prevention, Deadlock Avoidance, Deadlock Detection, and Recovery from
    Deadlock.
    Protection – System Protection, Goals of Protection, Principles of Protection, Domain of
                    TU
    Protection, Access Matrix, Implementation of Access Matrix, Access Control, Revocation of
    Access Rights, Capability-Based Systems, Language-Based Protection.
    TEXT BOOKS:
      1. Operating System Concepts , Abraham Silberschatz, Peter B. Galvin, Greg Gagne, 9th
         Edition, Wiley, 2016 India Edition
JN
    REFERENCE BOOKS:
      1. Modern Operating Systems, Andrew S Tanenbaum, 3rd Edition, PHI
      2. Operating Systems: A concept-based Approach, 2nd Edition, D.M. Dhamdhere,
         TMH.
      3. Principles of Operating Systems, B. L. Stuart, Cengage learning, India Edition.
ll
Course Objectives:
                                                                           ld
           To provide introduction to some of the central ideas of theoretical computer
             science from the perspective of formal languages.
           To introduce the fundamental concepts of formal languages, grammars and
             automata theory.
           Classify machines by their power to recognize languages.
                                                           or
           Employ finite state machines to solve problems in computing.
           To understand deterministic and non-deterministic machines.
           To understand the differences between decidability and undecidability.
Course Outcomes:
                                            W
           Able to understand the concept of abstract machines and their power to recognize
             the languages.
           Able to employ finite state machines for modeling and solving computing
             problems.
           Able to design context free grammars for formal languages.
           Able to distinguish between decidability and undecidability.
           Able to gain proficiency with mathematical tools and formal methods.
                   TU
    UNIT - I
    Introduction to Finite Automata, Structural Representations, Automata and Complexity, the
    Central Concepts of Automata Theory – Alphabets, Strings, Languages, Problems.
    Deterministic Finite Automata, Nondeterministic Finite Automata, an application: Text
    Search, Finite Automata with Epsilon-Transitions.
JN
    UNIT - II
    Regular Expressions, Finite Automata and Regular Expressions, Applications of Regular
    Expressions, Algebraic Laws for Regular Expressions, Properties of Regular Languages-
    Pumping Lemma for Regular Languages, Applications of the Pumping Lemma, Closure
    Properties of Regular Languages, Decision Properties of Regular Languages, Equivalence
    and Minimization of Automata.
    UNIT - III
ll
    Languages.
    Push Down Automata,: Definition of the Pushdown Automaton, the Languages of a PDA,
    Equivalence of PDA's and CFG's, Deterministic Pushdown Automata.
    UNIT - IV
    Normal Forms for Context- Free Grammars, the Pumping Lemma for Context-Free
    Languages, Closure Properties of Context-Free Languages. Decision Properties of CFL's -
    Complexity of Converting among CFG's and PDA's, Running time of conversions to
    Chomsky Normal Form.
    Introduction to Turing Machines-Problems That Computers Cannot Solve, The Turing
                                                                         ld
    Machine, Programming Techniques for Turing Machines, Extensions to the basic Turing
    machine, Restricted Turing Machines, Turing Machines, and Computers
UNIT - V
                                                          or
    Undecidability: A Language that is Not Recursively Enumerable, An Undecidable Problem
    That is RE, Undecidable Problems about Turing Machines, Post's Correspondence Problem,
    Other Undecidable Problems, Intractable Problems: The Classes P and NP, An NP-Complete
    Problem.
                                           W
    TEXT BOOKS:
      1. Introduction to Automata Theory, Languages, and Computation, 3 nd Edition, John E.
         Hopcroft, Rajeev Motwani, Jeffrey D. Ullman, Pearson Education.
      2. Introduction to the Theory of Computation, Michael Sipser, 3rd edition, Cengage
         Learning.
    REFERENCE BOOKS:
                  TU
      1. Introduction to Languages and The Theory of Computation, John C Martin, TMH.
      2. Introduction to Computer Theory, Daniel I.A. Cohen, John Wiley.
      3. A Text book on Automata Theory, P. K. Srimani, Nasir S. F. B, Cambridge
         University Press.
      4. Introduction to Formal languages Automata Theory and Computation Kamala
         Krithivasan, Rama R, Pearson.
      5. Theory of Computer Science – Automata languages and computation, Mishra and
         Chandrashekaran, 2nd edition, PHI.
JN
ll
A
             SM405ES: BUSINESS ECONOMICS AND FINANCIAL ANALYSIS
Course Objective: To learn the basic Business types, impact of the Economy on Business
                                                                            ld
    and Firms specifically. To analyze the Business from the Financial Perspective.
    Course Outcome: The students will understand the various Forms of Business and the
    impact of economic variables on the Business. The Demand, Supply, Production, Cost,
    Market Structure, Pricing aspects are learnt. The Students can study the firm’s financial
                                                            or
    position by analysing the Financial Statements of a Company.
    UNIT – I
    Introduction to Business and Economics:
    Business: Structure of Business Firm, Theory of Firm, Types of Business Entities, Limited
                                             W
    Liability Companies, Sources of Capital for a Company, Non-Conventional Sources of
    Finance.
    Economics: Significance of Economics, Micro and Macro Economic Concepts, Concepts
    and Importance of National Income, Inflation, Money Supply in Inflation, Business Cycle,
    Features and Phases of Business Cycle. Nature and Scope of Business Economics, Role of
    Business Economist, Multidisciplinary nature of Business Economics.
                   TU
    UNIT – II
    Demand and Supply Analysis:
    Elasticity of Demand: Elasticity, Types of Elasticity, Law of Demand, Measurement and
    Significance of Elasticity of Demand, Factors affecting Elasticity of Demand, Elasticity of
    Demand in decision making, Demand Forecasting: Characteristics of Good Demand
    Forecasting, Steps in Demand Forecasting, Methods of Demand Forecasting.
JN
    UNIT- III
    Production, Cost, Market Structures & Pricing:
    Production Analysis: Factors of Production, Production Function, Production Function with
    one variable input, two variable inputs, Returns to Scale, Different Types of Production
    Functions.
ll
    Cost analysis: Types of Costs, Short run and Long run Cost Functions.
    Market Structures: Nature of Competition, Features of Perfect competition, Monopoly,
    Oligopoly, and Monopolistic Competition.
A
    Pricing: Types of Pricing, Product Life Cycle based Pricing, Break Even Analysis, and Cost
    Volume Profit Analysis.
    UNIT - IV
    Financial Accounting: Accounting concepts and Conventions, Accounting Equation,
    Double-Entry system of Accounting, Rules for maintaining Books of Accounts, Journal,
    Posting to Ledger, Preparation of Trial Balance, Elements of Financial Statements, and
    Preparation of Final Accounts.
                                                                               ld
    UNIT - V
    Financial Analysis through Ratios: Concept of Ratio Analysis, Liquidity Ratios, Turnover
    Ratios, Profitability Ratios, Proprietary Ratios, Solvency, Leverage Ratios (simple problems).
    Introduction to Fund Flow and Cash Flow Analysis (simple problems).
                                                              or
    TEXT BOOKS:
      1. D. D. Chaturvedi, S. L. Gupta, Business Economics - Theory and Applications,
         International Book House Pvt. Ltd. 2013.
      2. Dhanesh K Khatri, Financial Accounting, Tata McGraw Hill, 2011.
      3. Geethika Ghosh, Piyali Gosh, Purba Roy Choudhury, Managerial Economics, 2e,
                                              W
         Tata McGraw Hill Education Pvt. Ltd. 2012.
    REFERENCES:
      1. Paresh Shah, Financial Accounting for Management 2e, Oxford Press, 2015.
      2. S. N. Maheshwari, Sunil K Maheshwari, Sharad K Maheshwari, Financial
         Accounting, 5e, Vikas Publications, 2013.
                    TU
JN
ll
A
                        CS406ES: COMPUTER ORGANIZATION LAB
                                                                            ld
       1. Implement Logic gates using NAND and NOR gates
       2. Design a Full adder using gates
       3. Design and implement the 4:1 MUX, 8:1 MUX using gates /ICs.
       4. Design and Implement a 3 to 8 decoder using gates
                                                            or
       5. Design a 4 bit comparator using gates/IC
       6. Design and Implement a 4 bit shift register using Flip flops
       7. Design and Implement a Decade counter
                                            W
    1. Write assembly language programs to evaluate the expressions:
               i) a = b + c – d * e
               ii) z = x * y + w – v +u / k
         a. Considering 8-bit, 16 bit and 32 bit binary numbers as b, c, d, e.
         b. Considering 2 digit, 4 digit and 8 digit BCD numbers.
           Take the input in consecutive memory locations and also Display the results by using
                   TU
          “int xx” of 8086. Validate program for the boundary conditions.
    2. Write an ALP of 8086 to take N numbers as input. And do the following operations on
       them.
           a. Arrange in ascending and descending order.
    3. Write an ALP of 8086 to take N numbers as input. And do the following operations on
       them.
JN
           b. Find it is Palindrome or n.
       Considering 8-bit, 16 bit binary numbers and 2 digit, 4digit and 8 digit BCD numbers.
       Display the results by using “int xx” of 8086. Validate program for the boundary
A
conditions.
    5. Write an ALP of 8086 to take a string of as input (in ‘C’ format) and do the following
       Operations on it.
         a. Find whether given string substring or not.
    6. Write an ALP of 8086 to take a string of as input (in ‘C’ format) and do the following
       Operations on it
          a. Find the Armstrong number
          b. Find the Fibonacci series for n numbers
         Display the results by using “int xx” of 8086.
                                                                             ld
    7. Write the ALP to implement the above operations as procedures and call from the main
       procedure.
    8. Write an ALP of 8086 to find the factorial of a given number as a Procedure and call from
       the main program which display the result.
                                                             or
    REFERENCE BOOKS:
      1. Switching theory and logic design –A. Anand Kumar PHI, 2013
      2. Advanced microprocessor & Peripherals-A. K. Ray and K. M. Bherchandavi, TMH,
         2nd edition.
                                             W
      3. Switching and Finite Automatic theory-Zvi Kohavi, Niraj K.Jha Cambridge, 3rd
         edition
      4. Digital Design –Morris Mano, PHI, 3rd edition
      5. Microprocessor and Interfacing –Douglas V. Hall, TMGH 2nd edition.
                   TU
JN
ll
A
                   CS407ES: DATABASE MANAGEMENT SYSTEMS LAB
Course Objectives: This lab enables the students to practice the concepts learnt in the subject
                                                                                ld
    DBMS by developing a database for an example company named “Roadway Travels” whose
    description is as follows. The student is expected to practice the designing, developing and
    querying a database in the context of example database “Roadway travels”. Students are
    expected to use “Mysql” database.
                                                               or
    Course Outcomes:
       Ability to design and implement a database schema for given problem.
       Apply the normalization techniques for development of application software to
          realistic problems.
       Ability to formulate queries using SQL DML/DDL/DCL commands.
                                              W
    Roadway Travels: "Roadway Travels" is in business since 1997 with several buses
    connecting different places in India. Its main office is located in Hyderabad.
    In the process of computerization of Roadway Travels you have to design and develop a
    Database which consists the data of Buses, Passengers, Tickets, and Reservation and
    cancellation details. You should also develop query’s using SQL to retrieve the data from the
    database.
    The above process involves many steps like 1. Analyzing the problem and identifying the
    Entities and Relationships, 2. E-R Model 3. Relational Model 4. Normalization 5.
ll
    Creating the database 6. Querying. Students are supposed to work on these steps week wise
    and finally create a complete “Database System” to Roadway Travels. Examples are given
    at every experiment for guidance to students.
A
                                                                                   ld
                                3. Bus_NO (Bus Entity)
    Apart from the above mentioned entities you can identify more. The above mentioned are
    few.
    Note: The student is required to submit a document by writing the Entities and Keys to the
                                                                  or
        lab teacher.
                                                 W
    incorporate generalization, aggregation, specialization etc wherever required.
                    Bus NO                    Source
                    TU
                                  BUS                               Destination
                                                                           Date of
                    Departu                                                Journey
                    re Time                               Reserv
JN
                                        Ticket            ation
                                        NO                                   Sex
                                                                                             Destinati
                                    Source                                                   on
                                                         Ticket
                                                                             Departu
                                             Age                             re Time
ll
    Note: The student is required to submit a document by drawing the E-R Diagram to the lab
       teacher.
A
                                                                                  ld
                                                                    Ticket
                                                                    _id
                                                                or
    Note: The student is required to submit a document by Represent relationships in a tabular
       fashion to the lab teacher.
                                                W
    Experiment 4: Normalization
    Database normalization is a technique for designing relational database tables to minimize
    duplication of information and, in so doing, to safeguard the database against certain types of
    logical or structural problems, namely data anomalies. For example, when multiple instances
    of a given piece of information occur in a table, the possibility exists that these instances will
    not be kept consistent when the data within the table is updated, leading to a loss of data
                    TU
    integrity. A table that is sufficiently normalized is less vulnerable to problems of this kind,
    because its structure reflects the basic assumptions for when multiple instances of the same
    information should be represented by a single instance only.
    For the above table in the First normalization we can remove the multi valued attribute
    Ticket_id and place it in another table along with the primary key of passenger.
JN
    First Normal Form: The above table can be divided into two tables as shown below.
    Passenger
     Name             Age            Sex             Address              Passport ID
ll
     Passport ID              Ticket_id
A
    You can do the second and third normal forms if required. Any how Normalized tables are
    given at the end.
    Experiment 5: Installation of Mysql and practicing DDL commands
    Installation of MySql. In this week you will learn Creating databases, How to create tables,
    altering the database, dropping tables and databases if not required. You will also try
    truncate, rename commands etc.
                                                                             ld
    CREATE TABLE Passenger (
      Passport_id INTEGER PRIMARY KEY,
      Name VARCHAR (50) Not NULL,
      Age Integer Not NULL,
                                                                  or
      Sex Char,
      Address VARCHAR (50) Not NULL);
                                                W
    Note: Detailed creation of tables is given at the end.
                                                                             ld
       2. Display all the names of male passengers.
       3. Display the ticket numbers and names of all the passengers.
       4. Find the ticket numbers of the passengers whose name start with ‘r’ and ends with ‘h’.
       5. Find the names of passengers whose age is between 30 and 45.
       6. Display all the passengers names beginning with ‘A’
                                                             or
       7. Display the sorted list of passengers names
                                             W
       1. Write a Query to display the Information present in the Passenger and cancellation
          tables. Hint: Use UNION Operator.
       2. Display the number of days in a week on which the 9W01 bus is available.
       3. Find number of tickets booked for each PNR_no using GROUP BY CLAUSE. Hint:
          Use GROUP BY on PNR_No.
       4. Find the distinct PNR numbers that are present.
       5. Find the number of tickets booked by a passenger where the number of seats is greater
                   TU
          than 1. Hint: Use GROUP BY, WHERE and HAVING CLAUSES.
       6. Find the total number of cancelled seats.
                                                                                ld
    BEGIN
    DECLARE v_id INT;
    DECLARE v_name VARCHAR (30);
    DECLARE c1 CURSOR FOR SELECT stdId,stdFirstname FROM students WHERE
                                                               or
       stdId=in_customer_id;
    OPEN c1;
    FETCH c1 into v_id, v_name;
    Close c1;
    END;
                                              W
    Tables
    BUS
    Bus No: Varchar: PK (public key)
    Source : Varchar
    Destination : Varchar
    Passenger
                    TU
    PPNO: Varchar (15)) : PK
    Name: Varchar (15)
    Age : int (4)
    Sex:Char (10) : Male / Female
    Address: VarChar (20)
    Passenger_Tickets
JN
    Cancellation
    PNR_No: Numeric(9) : FK
    Journey_date : datetime(8)
    No_of_seats : int (8)
    Address : Varchar (50)
    Contact_No: Numeric (9) --> Should not be less than 9 and Should not accept any other
        character other than Integer
    Status: Char (2) : Yes / No
    Ticket
    Ticket_No: Numeric (9): PK
                                                                        ld
    Journey_date : datetime(8)
    Age : int (4)
    Sex:Char(10) : Male / Female
    Source : Varchar
                                                        or
    Destination : Varchar
    Dep_time : Varchar
    REFERENCE BOOKS:
      1. Introduction to SQL, Rick F. Vander Lans, Pearson education.
                                          W
      2. Oracle PL/SQL, B. Rosenzweig and E. Silvestrova, Pearson education.
      3. SQL & PL/SQL for Oracle 10 g, Black Book, Dr. P. S. Deshpande, Dream Tech.
      4. Oracle Database 11 g PL/SQL Programming, M. Mc Laughlin, TMH.
                   TU
JN
ll
A
                           CS408ES: OPERATING SYSTEMS LAB
                                                                            ld
       To implement the scheduling algorithms.
       To implement page replacement algorithms
       To implement file allocation methods.
       To understand and implement ipc mechanism using named and unnamed pipes.
       To develop solutions for synchronization problems using semaphores.
                                                            or
    Course Outcomes:
       Ability to develop application programs using system calls in Unix.
       Ability to implement interprocess communication between two processes.
       Ability to design and solve synchronization problems.
       Ability to simulate and implement operating system concepts such as scheduling,
                                            W
          deadlock management, file management, and memory management.
12. Write C programs to implement ipc between two unrelated processes using named pipe.
    REFERENCE BOOKS:
A
                                                                             ld
          India.
       To provide a critical perspective on the socialization of men and women.
       To introduce students to information about some key biological aspects of genders.
       To expose the students to debates on the politics and economics of work.
                                                             or
       To help students reflect critically on gender violence.
       To expose students to more egalitarian interactions between men and women.
    Course Outcomes:
       Students will have developed a better understanding of important issues related to
                                             W
          gender in contemporary India.
       Students will be sensitized to basic dimensions of the biological, sociological,
          psychological and legal aspects of gender. This will be achieved through discussion of
          materials derived from research, facts, everyday life, literature, and film.
       Students will attain a finer grasp of how gender discrimination works in our society
          and how to counter it.
       Students will acquire insight into the gendered division of labour and its relation to
                   TU
          politics and economics.
       Men and women students and professionals will be better equipped to work and live
          together as equals.
       Students will develop a sense of appreciation of women in all walks of life.
       Through providing accounts of studies and movements as well as the new laws that
          provide protection and relief to women, the textbook will empower students to
JN
    UNIT - I
    UNDERSTANDING GENDER
    Gender: Why Should We Study It? (Towards a World of Equals: Unit -1)
    Socialization: Making Women, Making Men (Towards a World of Equals: Unit -2)
    Introduction. Preparing for Womanhood. Growing up Male. First lessons in Caste. Different
ll
Masculinities.
    UNIT - II
A
                                                                               ld
    Conditions of Work.
    UNIT-IV
    ISSUES OF VIOLENCE
                                                              or
    Sexual Harassment: Say No! (Towards a World of Equals: Unit -6)
     Sexual Harassment, not Eve-teasing- Coping with Everyday Harassment- Further Reading:
    “Chupulu”.
    Domestic Violence: Speaking Out (Towards a World of Equals: Unit -8)
     Is Home a Safe Place? -When Women Unite [Film]. Rebuilding Lives. Additional Reading:
                                              W
    New Forums for Justice.
    Thinking about Sexual Violence (Towards a World of Equals: Unit -11)
     Blaming the Victim-“I Fought for my Life….” - Additional Reading: The Caste Face of
    Violence.
    UNIT - V
    GENDER: CO - EXISTENCE
                    TU
    Just Relationships: Being Together as Equals (Towards a World of Equals: Unit -12)
    Mary Kom and Onler. Love and Acid just do not Mix. Love Letters. Mothers and Fathers.
    Additional Reading: Rosa Parks-The Brave Heart.
    TEXTBOOK
    All the five Units in the Textbook, “Towards a World of Equals: A Bilingual Textbook on
JN
    Note: Since it is an Interdisciplinary Course, Resource Persons can be drawn from the fields
    of English Literature or Sociology or Political Science or any other qualified faculty who has
    expertise in this field from engineering departments.
ll
    REFERENCE BOOKS:
      1. Menon, Nivedita. Seeing like a Feminist. New Delhi: Zubaan-Penguin Books, 2012
      2. Abdulali Sohaila. “I Fought For My Life…and Won.”Available online at:
A
         http://www.thealternative.in/lifestyle/i-fought-for-my-lifeand-won-sohaila-abdulal/
                                                                        R16 B.TECH CSE.
                                                                        ld
     III YEAR I SEMESTER
             Course
    S. No                             Course Title                  L   T    P   Credits
              Code
                                          or
     1      CS501PC    Design and Analysis of Algorithms           4    0    0      4
     2      CS502PC    Data Communication and Computer Networks    4    0    0      4
     3      CS503PC    Software Engineering                        4    0    0      4
     4      SM504MS    Fundamentals of Management                  3    0    0      3
     5                 Open Elective –I                            3    0    0      3
                                         W
     6       CS505PC   Design and Analysis of Algorithms Lab       0    0    3      2
     7       CS506PC   Computer Networks Lab                       0    0    3      2
     8       CS507PC   Software Engineering Lab                    0    0    3      2
     9      *MC500HS   Professional Ethics                         3    0    0      0
                       Total Credits                               21   0    9     24
                   TU
     III YEAR II SEMESTER
             Course
    S. No                             Course Title                  L   T    P   Credits
              Code
     1      CS601PC    Compiler Design                             4    0    0         4
     2      CS602PC    Web Technologies                            4    0    0         4
JN
     During Summer Vacation between III and IV Years: Industry Oriented Mini Project
A
                                                                             R16 B.TECH CSE.
Professional Elective – I
                                                                             ld
    CS615PE      Introduction to Analytics (Associate Analytics - I)
*Open Elective – Students should take Open Electives from the List of Open Electives
                                               or
     Offered by Other Departments/Branches Only.
     Ex: - A Student of Mechanical Engineering can take Open Electives from all other
     departments/branches except Open Electives offered by Mechanical Engineering Dept.
                                              W
                    TU
JN
ll
A
                                                                              R16 B.TECH CSE.
Course Objectives
                                                                            ld
       To analyze performance of algorithms.
       To choose the appropriate data structure and algorithm design method for a specified
          application.
       To understand how the choice of data structures and algorithm design methods
                                             or
          impacts the performance of programs.
       To solve problems using algorithm design methods such as the greedy method, divide
          and conquer, dynamic programming, backtracking and branch and bound.
       To understand the differences between tractable and intractable problems.
       To introduce P and NP classes.
                                            W
    Course Outcomes:
       Ability to analyze the performance of algorithms.
       Ability to choose appropriate algorithm design techniques for solving problems.
       Ability to understand how the choice of data structures and the algorithm design
          methods impact the performance of programs.
                   TU
    UNIT - I
    Introduction-Algorithm definition, Algorithm Specification, Performance Analysis-Space
    complexity, Time complexity, Randomized Algorithms.
    Divide and conquer- General method, applications - Binary search, Merge sort, Quick sort,
    Strassen’s Matrix Multiplication.
JN
    UNIT - II
    Disjoint set operations, union and find algorithms, AND/OR graphs, Connected Components
    and Spanning trees, Bi-connected components Backtracking-General method, applications-
    The 8-queen problem, sum of subsets problem, graph coloring, Hamiltonian cycles.
    UNIT - III
    Greedy method- General method, applications- Knapsack problem, Job sequencing with
ll
deadlines, Minimum cost spanning trees, Single source shortest path problem.
    UNIT - IV
A
    UNIT - V
    Branch and Bound- General Method, applications-0/1 Knapsack problem, LC Branch and
    Bound solution, FIFO Branch and Bound solution, Traveling sales person problem.
    NP-Hard and NP-Complete problems- Basic concepts, Non-deterministic algorithms, NP -
    Hard and NP- Complete classes, Cook’s theorem.
                                                                           ld
    TEXT BOOKS:
      1. Fundamentals of Computer Algorithms, 2nd Edition, Ellis Horowitz, Sartaj Sahni and
         S. Rajasekharan, Universities Press.
      2. Design and Analysis of Algorithms, P. H. Dave, H.B.Dave,2nd edition, Pearson
                                             or
         Education.
    REFERENCE BOOKS
      1. Algorithm Design: Foundations, Analysis and Internet examples, M. T. Goodrich and
         R. Tomassia, John Wiley and sons.
                                            W
      2. Design and Analysis of Algorithms, S. Sridhar, Oxford Univ. Press
      3. Design and Analysis of algorithms, Aho, Ullman and Hopcroft, Pearson Education.
      4. Foundations of Algorithms,, R. Neapolitan and K. Naimipour, 4th edition, Jones and
         Bartlett Student edition.
      5. Introduction to Algorithms,3 rd Edition, T. H. Cormen, C. E.Leiserson, R. L. Rivest,
         and C. Stein, PHI
                   TU
JN
ll
A
                                                                              R16 B.TECH CSE.
Course Objectives:
                                                                            ld
       To introduce the fundamental various types of computer networks.
       To demonstrate the TCP/IP and OSI models with merits and demerits.
       To explore the various layers of OSI Model.
       To introduce UDP and TCP Models.
                                              or
    Course Outcomes:
       Students should be understand and explore the basics of Computer Networks and
          Various Protocols. He/She will be in a position to understand the World Wide Web
          concepts.
                                             W
       Students will be in a position to administrate a network and flow of information
          further he/she can understand easily the concepts of network security, Mobile and ad
          hoc networks.
    UNIT – I
    Data Communications: Components – Direction of Data flow – Networks – Components
    and Categories – Types of Connections – Topologies –Protocols and Standards – ISO / OSI
                   TU
    model, Example Networks such as ATM, Frame Relay, ISDN Physical layer: Transmission
    modes, Multiplexing, Transmission Media, Switching, Circuit Switched Networks, Datagram
    Networks, Virtual Circuit Networks.
    UNIT – II
    Data link layer: Introduction, Framing, and Error – Detection and Correction – Parity – LRC
JN
    – CRC Hamming code, Flow and Error Control, Noiseless Channels, Noisy Channels,
    HDLC, Point to Point Protocols. 111 Medium Access sub layer: ALOHA, CSMA/CD, LAN
    – Ethernet IEEE 802.3, IEEE 802.5 – IEEE 802.11, Random access, Controlled access,
    Channelization.
    UNIT – III
    Network layer: Logical Addressing, Internetworking, Tunneling, Address mapping, ICMP,
    IGMP, Forwarding, Uni-Cast Routing Protocols, Multicast Routing Protocols.
ll
    UNIT – IV
    Transport Layer: Process to Process Delivery, UDP and TCP protocols, Data Traffic,
A
    UNIT – V
    Application Layer: Domain name space, DNS in internet, electronic mail, SMTP, FTP,
    WWW, HTTP, SNMP.
    TEXT BOOKS:
      1. Data Communications and Networking, Behrouz A. Forouzan , Fourth Edition TMH,
                                                                      ld
         2006.
      2. Computer Networks, Andrew S Tanenbaum, 4th Edition. Pearson Education, PHI.
REFERENCES:
                                          or
      1. Data communications and Computer Networks, P.C .Gupta, PHI.
      2. An Engineering Approach to Computer Networks, S. Keshav, 2 nd Edition, Pearson
         Education.
      3. Understanding communications and Networks, 3 rd Edition, W.A. Shay, Cengage
         Learning.
                                         W
      4. Computer Networking: A Top-Down Approach Featuring the Internet. James F.
         Kurose & Keith W. Ross, 3 rd Edition, Pearson Education.
      5. Data and Computer Communication, William Stallings, Sixth Edition, Pearson
         Education, 2000
                  TU
JN
ll
A
                                                                                 R16 B.TECH CSE.
SOFTWARE ENGINEERING
Course Objectives:
                                                                               ld
       To understanding of software process models such as waterfall and evolutionary
          models.
       To understanding of software requirements and SRS document.
       To understanding of different software architectural styles.
                                               or
       To understanding of software testing approaches such as unit testing and integration
          testing.
       To understanding on quality control and how to ensure good quality software.
Course Outcomes:
                                              W
       Ability to identify the minimum requirements for the development of application.
       Ability to develop, maintain, efficient, reliable and cost effective software solutions
       Ability to critically thinking and evaluate assumptions and arguments.
    UNIT- I
    Introduction to Software Engineering: The evolving role of software, Changing Nature of
                    TU
    Software, legacy software, Software myths.
    A Generic view of process: Software engineering- A layered technology, a process
    framework, The Capability Maturity Model Integration (CMMI), Process patterns, process
    assessment, personal and team process models.
    Process models: The waterfall model, Incremental process models, Evolutionary process
    models, Specialized process models, The Unified process.
JN
    UNIT- II
    Software Requirements: Functional and non-functional requirements, User requirements,
    System requirements, Interface specification, the software requirements document.
    Requirements engineering process: Feasibility studies, Requirements elicitation and analysis,
    Requirements validation, Requirements management.
    System models: Context Models, Behavioral models, Data models, Object models, structured
    methods.
ll
    UNIT- III
    Design Engineering: Design process and Design quality, Design concepts, the design model,
A
UNIT- IV
                                                                               ld
    Testing Strategies: A strategic approach to software testing, test strategies for conventional
    software, Black-Box and White-Box testing, Validation testing, System testing, the art of
    Debugging.
    Product metrics: Software Quality, Frame work for Product metrics, Metrics for Analysis
                                               or
    Model, Metrics for Design Model, Metrics for source code, Metrics for testing, Metrics for
    maintenance.
    Metrics for Process and Products: Software Measurement, Metrics for software quality.
UNIT- V
                                              W
    Risk management: Reactive vs Proactive Risk strategies, software risks, Risk identification,
    Risk projection, Risk refinement, RMMM, RMMM Plan.
    Quality Management: Quality concepts, Software quality assurance, Software Reviews,
    Formal technical reviews, Statistical Software quality Assurance, Software reliability, The
    ISO 9000 quality standards.
    TEXT BOOKS:
                    TU
      1. Software engineering A practitioner’s Approach, Roger S Pressman, sixth edition
         McGraw Hill International Edition.
      2. Software Engineering, Ian Sommerville, seventh edition, Pearson education.
    REFERENCE BOOKS:
      1. Software Engineering, A Precise Approach, Pankaj Jalote, Wiley India, 2010.
JN
FUNDAMENTALS OF MANAGEMENT
                                                                            ld
    Practical aspects of business and development of Managerial Skills.
                                             or
    Management Practices in their domain area.
    UNIT - I
    Introduction to Management: Definition, Nature and Scope, Functions, Managerial Roles,
    Levels of Management, Managerial Skills, Challenges of Management; Evolution of
                                            W
    Management- Classical Approach- Scientific and Administrative Management; The
    Behavioral approach; The Quantitative approach; The Systems Approach; Contingency
    Approach, IT Approach.
    UNIT - II
    Planning and Decision Making: General Framework for Planning - Planning Process, Types
                   TU
    of Plans, Management by Objectives; Development of Business Strategy. Decision making
    and Problem Solving - Programmed and Non Programmed Decisions, Steps in Problem
    Solving and Decision Making; Bounded Rationality and Influences on Decision Making;
    Group Problem Solving and Decision Making, Creativity and Innovation in Managerial
    Work.
    UNIT - III
JN
    UNIT - IV
    Leading and Motivation: Leadership, Power and Authority, Leadership Styles; Behavioral
A
    UNIT - V
    Controlling: Control, Types and Strategies for Control, Steps in Control Process, Budgetary
                                                                            ld
    and Non- Budgetary Controls. Characteristics of Effective Controls, Establishing control
    systems, Control frequency and Methods.
Text Books:
                                             or
     1. Management Fundamentals, Robert N Lussier, 5e, Cengage Learning, 2013.
     2. Fundamentals of Management, Stephen P. Robbins, Pearson Education, 2009.
    References:
     1. Essentials of Management, Koontz Kleihrich, Tata McGraw Hill.
                                            W
     2. Management Essentials, Andrew DuBrin, 9e, Cengage Learning, 2012.
                   TU
JN
ll
A
                                                                              R16 B.TECH CSE.
Course Objectives:
                                                                            ld
       To write programs in java to solve problems using divide and conquer strategy.
       To write programs in java to solve problems using backtracking strategy.
       To write programs in java to solve problems using greedy and dynamic programming
          techniques.
                                             or
    Course Outcomes:
        Ability to write programs in java to solve problems using algorithm design techniques
            such as Divide and Conquer, Greedy, Dynamic programming, and Backtracking.
                                            W
    List of Experiments:
       1. Write a java program to implement Quick sort algorithm for sorting a list of integers
           in ascending order
       2. Write a java program to implement Merge sort algorithm for sorting a list of integers
           in ascending order.
       3. i) Write a java program to implement the dfs algorithm for a graph.
                   TU
       4. ii) Write a. java program to implement the bfs algorithm for a graph.
       5. Write a java programs to implement backtracking algorithm for the N-queens
           problem.
       6. Write a java program to implement the backtracking algorithm for the sum of subsets
           problem.
       7. Write a java program to implement the backtracking algorithm for the Hamiltonian
           Circuits problem.
JN
       8. Write a java program to implement greedy algorithm for job sequencing with
           deadlines.
       9. Write a java program to implement Dijkstra’s algorithm for the Single source shortest
           path problem.
       10. Write a java program that implements Prim’s algorithm to generate minimum cost
           spanning tree.
       11. Write a java program that implements Kruskal’s algorithm to generate minimum cost
ll
           spanning tree
       12. Write a java program to implement Floyd’s algorithm for the all pairs shortest path
           problem.
A
       13. Write a java program to implement Dynamic Programming algorithm for the 0/1
           Knapsack problem.
       14. Write a java program to implement Dynamic Programming algorithm for the Optimal
           Binary Search Tree Problem.
                                                                              R16 B.TECH CSE.
    REFERENCE BOOKS
       1. Data structures, Algorithms and Applications in java, 2nd Edition, S. Sahani,
          Universities Press.
       2. Data structures and Algorithms in java, 3rd edition, A. Drozdek, Cengage Learning.
       3. Data structures with Java, J. R. Hubbard, 2nd edition, Schaum’s Outlines, TMH.
       4. Data structures and algorithms in Java, 2 nd Edition, R. Lafore, Pearson Education.
                                                                            ld
       5. Data Structures using Java, D. S. Malik and P.S. Nair, Cengage Learning.
                                             or
                                            W
                   TU
JN
ll
A
                                                                             R16 B.TECH CSE.
Course Objectives:
                                                                           ld
       To Understand the functionalities of various layers of OSI model
       To understand the operating System functionalities
Course Outcomes:
                                             or
       Ability to understand the encryption and decryption concepts in Linux environment
       Ability to apply appropriate algorithm for the finding of shortest route.
       Ability to configure the routing table
                                            W
        Intel based desktop PCs LAN CONNECTED with minimum of 166 MHZ or faster
          processor with at least 64 MB RAM and 100 MB free disk space
Course Objectives:
                                                                               ld
       To understand the software engineering methodologies involved in the phases for
          project development.
       To gain knowledge about open source tools used for implementing software
          engineering methods.
                                               or
       To exercise developing product-startups implementing software engineering methods.
       Open source Tools: StarUML / UMLGraph / Topcased
    Prepare the following documents and develop the software project startup, prototype model,
    using software engineering methodology for at least two real time scenarios or for the sample
                                              W
    experiments.
          Problem Analysis and Project Planning -Thorough study of the problem – Identify
           Project scope, Objectives and Infrastructure.
          Software Designing - Develop use case diagrams and activity diagrams, build and test
           class diagrams, sequence diagrams and add interface to class diagrams.
The SRS and prototype model should be submitted for end semester examination.
         A grade book where faculty can record grades and each student can view his or her
           grades
         An integrated email tool allowing participants to send announcement email messages
           to the entire class or to a subset of the entire class
         A chat tool allowing synchronous communication among class participants
                                                                                   R16 B.TECH CSE.
    In addition, a CMS is typically integrated with other databases in the university so that
    students enrolled in a particular course are automatically registered in the CMS as
    participants in that course.
                                                                                 ld
    The Course Management System (CMS) is a web application for department personnel,
    Academic Senate, and Registrar staff to view, enter, and manage course information formerly
    submitted via paper.
                                                or
    Departments can use CMS to create new course proposals, submit changes for existing
    courses, and track the progress of proposals as they move through the stages of online
    approval.
2. Easy Leave
                                               W
    This project is aimed at developing a web based Leave Management Tool, which is of
    importance to either an organization or a college.
    The Easy Leave is an Intranet based application that can be accessed throughout the
    organization or a specified group/Dept. This system can be used to automate the workflow of
    leave applications and their approvals. The periodic crediting of leave is also automated.
    There are features like notifications, cancellation of leave, automatic approval of leave, report
    generators etc in this Tool.
                    TU
    Functional components of the project:
    There are registered people in the system. Some are approvers. An approver can also be a
    requestor. In an organization, the hierarchy could be Engineers/Managers/Business
    Managers/Managing Director etc. In a college, it could be Lecturer/Professor/Head of the
    Department/Dean/Principal etc.
JN
         apply for leave, specifying the from and to dates, reason for taking leave, address for
           communication while on leave and his/her superior's email id
         see his/her current leave applications and the leave applications that are submitted to
A
          get help about the leave system on how to use the different features of the system
          As soon as a leave application /cancellation request /withdrawal /approval /rejection
           /password-change is made by the person, an automatic email should be sent to the
           person and his superior giving details about the action
          The number of days of leave (as per the assumed leave policy) should be
           automatically credited to everybody and a notification regarding the same be sent to
                                                                                   ld
           them automatically
          An automatic leave-approval facility for leave applications which are older than 2
           weeks should be there. Notification about the automatic leave approval should be sent
           to the person as well as his superior
                                                 or
    3. E-Bidding
    Auctions are among the latest economic institutions in place. They have been used since
    antiquity to sell a wide variety of goods, and their basic form has remained unchanged. In this
    dissertation, we explore the efficiency of common auctions when values are interdependent-
                                                W
    the value to a particular bidder may depend on information available only to others-and
    asymmetric. In this setting, it is well known that sealed-bid auctions do not achieve efficient
    allocations in general since they do not allow the information held by different bidders to be
    shared.
    Typically, in an auction, say of the kind used to sell art, the auctioneer sets a relatively low
                     TU
    initial price. This price is then increased until only one bidder is willing to buy the object, and
    the exact manner in which this is done varies. In my model a bidder who drops out at some
    price can "reenter" at a higher price.
    With the invention of E-commerce technologies over the Internet the opportunity to bid from
    the comfort of one’s own home has seen a change like never seen before. Within the span of
    a few short years, what may have began as an experimental idea has grown to an immensely
JN
    popular hobby, and in some cases, a means of livelihood, the Auction Patrol gathers
    tremendous response every day, all day. With the point and click of the mouse, one may bid
    on an item they may need or just want, and in moments they find that either they are the top
    bidder or someone else wants it more, and you're outbid! The excitement of an auction all
    from the comfort of home is a completely different experience.
    Society cannot seem to escape the criminal element in the physical world, and so it is the
ll
    same with Auction Patrols. This is one area where in a question can be raised as to how safe
    Auction Patrols.
A
    Proposed system
    To generate the quick reports
    To make accuracy and efficient calculations
    To provide proper information briefly
    To provide data security
                                                                                 R16 B.TECH CSE.
                                                                               ld
    look to the user interfaces and to implement all the banking transactions like:
         Supply of Account Information
         New Account Creations
         Deposits
                                               or
         Withdraws
         Cheque book issues
         Stop payments
         Transfer of accounts
         Report Generations.
                                              W
    Proposed System:
    The development of the new system contains the following activities, which try to automate
    the entire process keeping in view of the database integration approach.
         User friendliness is provided in the application with various controls.
         The system makes the overall project management much easier and flexible.
                    TU
         Readily upload the latest updates, allows user to download the alerts by clicking the
            URL.
         There is no risk of data mismanagement at any level while the project development is
            under process.
         It provides high level of security with different level of authentication
JN
ll
A
                                                                                   R16 B.TECH CSE.
PROFESSIONAL ETHICS
Course Objective: To enable the students to imbibe and internalize the Values and Ethical
                                                                                ld
    Behaviour in the personal and Professional lives.
    Course Outcome: The students will understand the importance of Values and Ethics in their
    personal lives and professional careers. The students will learn the rights and responsibilities
                                                or
    as an employee, team member and a global citizen.
    UNIT - I
    Introduction to Professional Ethics: Basic Concepts, Governing Ethics, Personal &
    Professional Ethics, Ethical Dilemmas, Life Skills, Emotional Intelligence, Thoughts of
                                               W
    Ethics, Value Education, Dimensions of Ethics, Profession and professionalism, Professional
    Associations, Professional Risks, Professional Accountabilities, Professional Success, Ethics
    and Profession.
    UNIT - II
    Basic Theories: Basic Ethical Principles, Moral Developments, Deontology, Utilitarianism,
    Virtue Theory, Rights Theory, Casuist Theory, Moral Absolution, Moral Rationalism, Moral
                    TU
    Pluralism, Ethical Egoism, Feminist Consequentialism, Moral Issues, Moral Dilemmas,
    Moral Autonomy.
    UNIT - III
    Professional Practices in Engineering: Professions and Norms of Professional Conduct,
    Norms of Professional Conduct vs. Profession; Responsibilities, Obligations and Moral
JN
    Values in Professional Ethics, Professional codes of ethics, the limits of predictability and
    responsibilities of the engineering profession.
    Central Responsibilities of Engineers - The Centrality of Responsibilities of Professional
    Ethics; lessons from 1979 American Airlines DC-10 Crash and Kansas City Hyatt Regency
    Walk away Collapse.
    UNIT - IV
    Work Place Rights & Responsibilities, Ethics in changing domains of Research, Engineers
ll
    misconduct, research misconduct distinguished from mistakes and errors, recent history of
    attention to research misconduct, the emerging emphasis on understanding and fostering
    responsible conduct, responsible authorship, reviewing & editing.
                                                                              R16 B.TECH CSE.
    UNIT - V
    Global issues in Professional Ethics: Introduction – Current Scenario, Technology
    Globalization of MNCs, International Trade, World Summits, Issues, Business Ethics and
    Corporate Governance, Sustainable Development Ecosystem, Energy Concerns, Ozone
    Deflection, Pollution, Ethics in Manufacturing and Marketing, Media Ethics; War Ethics; Bio
    Ethics, Intellectual Property Rights.
                                                                            ld
    TEXT BOOKS:
      1. Professional Ethics: R. Subramanian, Oxford University Press, 2015.
      2. Ethics in Engineering Practice & Research, Caroline Whitbeck, 2e, Cambridge
                                             or
         University Press 2015.
    REFERENCES:
      1. Engineering Ethics, Concepts Cases: Charles E Harris Jr., Michael S Pritchard,
         Michael J Rabins, 4e , Cengage learning, 2015.
                                            W
      2. Business Ethics concepts & Cases: Manuel G Velasquez, 6e, PHI, 2008.
                   TU
JN
ll
A
                                                                                R16 B.TECH CSE.
COMPILER DESIGN
Course Objectives:
                                                                           ld
       To understand the various phases in the design of a compiler.
       To understand the design of top-down and bottom-up parsers.
       To understand syntax directed translation schemes.
       To introduce lex and yacc tools.
                                             or
       To learn to develop algorithms to generate code for a target machine.
    Course Outcomes:
       Ability to design, develop, and implement a compiler for any language.
       Able to use lex and yacc tools for developing a scanner and a parser.
                                            W
       Able to design and implement LL and LR parsers.
       Able to design algorithms to perform code optimization in order to improve the
          performance of a program in terms of space and time complexity.
       Ability to design algorithms to generate machine code
    UNIT - I
                   TU
    Introduction: Language Processors, the structure of a compiler, the science of building a
    compiler, programming language basics.
    Lexical Analysis: The Role of the Lexical Analyzer, Input Buffering, Recognition of
    Tokens, The Lexical-Analyzer Generator Lex, Finite Automata, From Regular Expressions to
    Automata, Design of a Lexical-Analyzer Generator, Optimization of DFA-Based Pattern
    Matchers.
JN
    UNIT - II
    Syntax Analysis: Introduction, Context-Free Grammars, Writing a Grammar, Top-Down
    Parsing, Bottom-Up Parsing, Introduction to LR Parsing: Simple LR, More Powerful LR
    Parsers, Using Ambiguous Grammars, Parser Generators.
    UNIT - III
    Syntax-Directed Translation: Syntax-Directed Definitions, Evaluation Orders for SDD's,
ll
    UNIT - IV
    Run-Time Environments: Storage organization, Stack Allocation of Space, Access to
    Nonlocal Data on the Stack, Heap Management, Introduction to Garbage Collection,
    Introduction to Trace-Based Collection.
    Code Generation: Issues in the Design of a Code Generator, The Target Language,
    Addresses in the Target Code, Basic Blocks and Flow Graphs, Optimization of Basic Blocks,
                                                                           ld
    A Simple Code Generator, Peephole Optimization, Register Allocation and Assignment,
    Dynamic Programming Code-Generation.
UNIT - V
                                             or
    Machine-Independent Optimizations: The Principal Sources of Optimization, Introduction
    to Data-Flow Analysis, Foundations of Data-Flow Analysis, Constant Propagation, Partial-
    Redundancy Elimination, Loops in Flow Graphs.
TEXT BOOKS
                                            W
      1. Compilers: Principles, Techniques and Tools, Second Edition, Alfred V. Aho, Monica
         S. Lam, Ravi Sethi, Jeffry D. Ullman, Pearson.
    REFERENCE BOOKS
      1. Compiler Construction-Principles and Practice, Kenneth C Louden, Cengage
         Learning.
      2. Modern compiler implementation in C, Andrew W Appel, Revised edition,
                   TU
         Cambridge University Press.
      3. The Theory and Practice of Compiler writing, J. P. Tremblay and P. G. Sorenson,
         TMH
      4. Writing compilers and interpreters, R. Mak, 3rd edition, Wiley student edition.
      5. lex & yacc – John R. Levine, Tony Mason, Doug Brown, O’reilly
JN
ll
A
                                                                                 R16 B.TECH CSE.
WEB TECHNOLOGIES
Course Objectives:
                                                                               ld
        To introduce PHP language for server side scripting
        To introduce XML and processing of XML Data with Java
        To introduce Server side programming with Java Servlets and JSP
        To introduce Client side scripting with Javascript and AJAX.
                                               or
    Course Outcomes:
        gain knowledge of client side scripting, validation of forms and AJAX programming
        have understanding of server side scripting with PHP language
        have understanding of what is XML and how to parse and use XML Data with Java
                                              W
       To introduce Server side programming with Java Servlets and JSP
    UNIT - I
    Introduction to PHP: Declaring variables, data types, arrays, strings, operators, expressions,
    control structures, functions, Reading data from web form controls like text boxes, radio
    buttons, lists etc., Handling File Uploads, Connecting to database (MySQL as reference),
                    TU
    executing simple queries, handling results, Handling sessions and cookies
    File Handling in PHP: File operations like opening, closing, reading, writing, appending,
    deleting etc. on text and binary files, listing directories
    UNIT - II
    XML: Introduction to XML, Defining XML tags, their attributes and values, Document Type
    Definition, XML Schemas, Document Object Model, XHTML
JN
    UNIT - III
    Introduction to Servlets: Common Gateway Interface (CGI), Lifecycle of a Servlet,
    deploying a servlet, The Servlet API, Reading Servlet parameters, Reading Initialization
    parameters, Handling Http Request & Responses, Using Cookies and Sessions, connecting to
    a database using JDBC.
ll
    UNIT - IV
    Introduction to JSP: The Anatomy of a JSP Page, JSP Processing, Declarations, Directives,
A
    Expressions, Code Snippets, implicit objects, Using Beans in JSP Pages, Using Cookies and
    session for session tracking, connecting to database in JSP.
                                                                                R16 B.TECH CSE.
    UNIT- V
    Client side Scripting: Introduction to Javascript: Javascript language - declaring variables,
    scope of variables, functions, event handlers (onclick, onsubmit etc.), Document Object
    Model, Form validation. Simple AJAX application.
TEXT BOOKS:
                                                                              ld
      1. Web Technologies, Uttam K Roy, Oxford University Press
      2. The Complete Reference PHP – Steven Holzner, Tata McGraw-Hill
REFERENCE BOOKS:
                                              or
      1. Web Programming, building internet applications, Chris Bates 2 nd edition, Wiley
         Dreamtech
      2. Java Server Pages –Hans Bergsten, SPD O’Reilly
      3. Java Script, D. Flanagan, O’Reilly,SPD.
      4. Beginning Web Programming-Jon Duckett WROX.
                                             W
      5. Programming World Wide Web, R. W. Sebesta, Fourth Edition, Pearson.
      6. Internet and World Wide Web – How to program, Dietel and Nieto, Pearson.
                   TU
JN
ll
A
                                                                              R16 B.TECH CSE.
Course Objectives:
                                                                            ld
       Explain the objectives of information security
       Explain the importance and application of each of confidentiality, integrity,
          authentication and availability
       Understand various cryptographic algorithms.
                                              or
       Understand the basic categories of threats to computers and networks
       Describe public-key cryptosystem.
       Describe the enhancements made to IPv4 by IPSec
       Understand Intrusions and intrusion detection
       Discuss the fundamental ideas of public-key cryptography.
                                             W
       Generate and distribute a PGP key pair and use the PGP package to send an encrypted
          e-mail message.
       Discuss Web security and Firewalls
    Course Outcomes:
       Student will be able to understand basic cryptographic algorithms, message and web
                   TU
          authentication and security issues.
       Ability to identify information system requirements for both of them such as client
          and server.
       Ability to understand the current legal issues towards information security.
    UNIT – I
    Security Concepts: Introduction, The need for security, Security approaches, Principles of
JN
    security, Types of Security attacks, Security services, Security Mechanisms, A model for
    Network Security
    Cryptography Concepts and Techniques: Introduction, plain text and cipher text,
    substitution techniques, transposition techniques, encryption and decryption, symmetric and
    asymmetric key cryptography, steganography, key range and key size, possible types of
    attacks.
ll
    UNIT – II
    Symmetric key Ciphers: Block Cipher principles, DES, AES, Blowfish, RC5, IDEA, Block
    cipher operation, Stream ciphers, RC4.
A
    Asymmetric key Ciphers: Principles of public key cryptosystems, RSA algorithm, Elgamal
    Cryptography, Diffie-Hellman Key Exchange, Knapsack Algorithm.
                                                                             R16 B.TECH CSE.
    UNIT – III
    Cryptographic Hash Functions: Message Authentication, Secure Hash Algorithm (SHA-
    512), Message authentication codes: Authentication requirements, HMAC, CMAC, Digital
    signatures, Elgamal Digital Signature Scheme.
    Key Management and Distribution: Symmetric Key Distribution Using Symmetric &
    Asymmetric Encryption, Distribution of Public Keys, Kerberos, X.509 Authentication
                                                                           ld
    Service, Public – Key Infrastructure
    UNIT – IV
    Transport-level Security: Web security considerations, Secure Socket Layer and Transport
                                             or
    Layer Security, HTTPS, Secure Shell (SSH)
    Wireless Network Security: Wireless Security, Mobile Device Security, IEEE 802.11
    Wireless LAN, IEEE 802.11i Wireless LAN Security
UNIT – V
                                            W
    E-Mail Security: Pretty Good Privacy, S/MIME IP Security: IP Security overview, IP
    Security architecture, Authentication Header, Encapsulating security payload, Combining
    security associations, Internet Key Exchange
    Case Studies on Cryptography and security: Secure Multiparty Calculation, Virtual
    Elections, Single sign On, Secure Inter-branch Payment Transactions, Cross site Scripting
    Vulnerability.
                   TU
    TEXT BOOKS:
      1. Cryptography and Network Security - Principles and Practice: William Stallings,
         Pearson Education, 6 th Edition
      2. Cryptography and Network Security: Atul Kahate, Mc Graw Hill, 3 rd Edition
    REFERENCE BOOKS:
JN
                                   MOBILE COMPUTING
                               (PROFESSIONAL ELECTIVE - I)
                                                                          ld
    Course Objectives:
       To make the student understand the concept of mobile computing paradigm, its novel
          applications and limitations.
       To understand the typical mobile networking infrastructure through a popular GSM
                                            or
          protocol
       To understand the issues and solutions of various layers of mobile networks, namely
          MAC layer, Network Layer & Transport Layer
       To understand the database issues in mobile environments & data delivery models.
       To understand the ad hoc networks and related concepts.
                                           W
       To understand the platforms and protocols used in mobile environment.
    Course Outcomes:
       Able to think and develop new mobile application.
       Able to take any new technical issue related to this new paradigm and come up with a
          solution(s).
                   TU
       Able to develop new ad hoc network applications and/or algorithms/protocols.
       Able to understand & develop any existing or new protocol related to mobile
          environment
    UNIT - I
    Introduction: Mobile Communications, Mobile Computing – Paradigm, Promises/Novel
    Applications and Impediments and Architecture; Mobile and Handheld Devices, Limitations
JN
    UNIT – II
    (Wireless) Medium Access Control (MAC): Motivation for a specialized MAC (Hidden
    and exposed terminals, Near and far terminals), SDMA, FDMA, TDMA, CDMA, Wireless
ll
    LAN/(IEEE 802.11)
    Mobile Network Layer: IP and Mobile IP Network Layers, Packet Delivery and Handover
    Management, Location Management, Registration, Tunneling and Encapsulation, Route
A
Optimization, DHCP.
    UNIT – III
    Mobile Transport Layer: Conventional TCP/IP Protocols, Indirect TCP, Snooping TCP,
    Mobile TCP, Other Transport Layer Protocols for Mobile Networks.
                                                                           R16 B.TECH CSE.
    Database Issues: Database Hoarding & Caching Techniques, Client-Server Computing &
    Adaptation, Transactional Models, Query processing, Data Recovery Process & QoS Issues.
    UNIT - IV
    Data Dissemination and Synchronization: Communications Asymmetry, Classification of
    Data Delivery Mechanisms, Data Dissemination, Broadcast Models, Selective Tuning and
                                                                         ld
    Indexing Methods, Data
    Synchronization – Introduction, Software, and Protocols
UNIT - V
                                            or
    Mobile Adhoc Networks (MANETs): Introduction, Applications & Challenges of a
    MANET, Routing, Classification of Routing Algorithms, Algorithms such as DSR, AODV,
    DSDV, etc. , Mobile Agents, Service Discovery.
    Protocols and Platforms for Mobile Computing: WAP, Bluetooth, XML, J2ME, Java
    Card, Palm OS, Windows CE, Symbian OS, Linux for Mobile Devices, Android.
                                           W
    TEXT BOOKS:
      1. Jochen Schiller, “Mobile Communications”, Addison-Wesley, Second Edition, 2009.
      2. Raj Kamal, “Mobile Computing”, Oxford University Press, 2007, ISBN: 0195686772.
    REFERENCE BOOKS:
       1. Jochen Schiller, “Mobile Communications”, Addison-Wesley, Second Edition, 2004.
                  TU
       2. Stojmenovic and Cacute, “Handbook of Wireless Networks and Mobile Computing”,
          Wiley, 2002, ISBN 0471419028.
       3. Reza Behravanfar, “Mobile Computing Principles: Designing and Developing
          Mobile Applications with UML and XML”, ISBN: 0521817331, Cambridge
          University Press, Oct 2004.
JN
ll
A
                                                                             R16 B.TECH CSE.
                                    DESIGN PATTERNS
                               (PROFESSIONAL ELECTIVE - I)
                                                                           ld
    Prerequisites
       1. A Course on Software Engineering”
       2. A Course on “Object Oriented Programming Through Java”
                                             or
    Course Objectives:
       The aim of the course is to appreciate the idea behind Design Patterns in handling
          common problems faced during building an application
       This course covers all pattern types from creational to structural, behavioral to
          concurrency and highlights the scenarios when one pattern must be chosen over
                                            W
          others.
    Course Outcomes:
       Create software designs that are scalable and easily maintainable
       Understand the best use of Object Oriented concepts for creating truly OOP programs
       Use creational design patterns in software design for class instantiation
       Use structural design patterns for better class and object composition
                   TU
       Use behavioral patterns for better organization and communication between the
          objects
       Use refactoring to compose the methods for proper code packaging
       Use refactoring to better organize the class responsibilities of current code
    UNIT - I
    Introduction: What is a design pattern? design patterns in Smalltalk MVC, Describing
JN
    Design Patterns, The Catalog of Design Patterns, Organizing the Catalog, How Design
    Patterns Solve Design Problems, How to Select a Design Pattern, How to Use a Design
    Pattern.
    UNIT - II
    Designing a Document Editor: Design Problems, Document Structure, Formatting,
    Embellishing the User Interface, Supporting Multiple Look-and-Feel Standards, Supporting
ll
Multiple Window Systems, User Operations Spelling Checking and Hyphenation, Summary
    UNIT - III
A
    UNIT - IV
    Structural Pattern: Adapter, Bridge, Composite, Decorator, Façade, Flyweight, Proxy
                                                                           R16 B.TECH CSE.
    UNIT - V
    Behavioral Patterns: Chain of Responsibility, Command, Interpreter, Iterator, Mediator,
    Memento, Observer, State, Strategy, Template Method, Visitor.
    TEXT BOOK:
      1. Design Patterns, Erich Gamma, Pearson Education
                                                                         ld
    REFERENCE BOOKS:
      1. Pattern’s in Java, Vol –I, Mark Grand, Wiley Dream Tech.
      2. Patterns in Java, Vol-II, Mark Grand, Wiley Dream Tech.
                                            or
      3. Java Enterprise Design Patterns Vol-III, Mark Grand, Wiley Dream Tech.
      4. Head First Design Patterns, Eric Freeman, O’reily publications
                                           W
                  TU
JN
ll
A
                                                                                R16 B.TECH CSE.
                                 ARTIFICIAL INTELLIGENCE
                                   (Professional Elective - I)
                                                                              ld
    Course Objectives:
       To learn the difference between optimal reasoning vs human like reasoning
       To understand the notions of state space representation, exhaustive search, heuristic
          search along with the time and space complexities
                                              or
       To learn different knowledge representation techniques
       To understand the applications of AI: namely Game Playing, Theorem Proving,
          Expert Systems, Machine Learning and Natural Language Processing
Course Outcomes:
                                             W
       Possess the ability to formulate an efficient problem space for a problem expressed in
          English.
       Possess the ability to select a search algorithm for a problem and characterize its time
          and space complexities.
       Possess the skill for representing knowledge using the appropriate technique
       Possess the ability to apply AI techniques to solve problems of Game Playing, Expert
                   TU
          Systems, Machine Learning and Natural Language Processing
    UNIT - I
    Introduction, History, Intelligent Systems, Foundations of AI, Sub areas of AI, Applications.
    Problem Solving - State-Space Search and Control Strategies: Introduction, General Problem
    Solving, Characteristics of Problem, Exhaustive Searches, Heuristic Search Techniques,
    Iterative-Deepening A*, Constraint Satisfaction. Game Playing, Bounded Look-ahead
JN
    UNIT - II
    Logic Concepts and Logic Programming: Introduction, Propositional Calculus, Propositional
    Logic, Natural Deduction System, Axiomatic System, Semantic Tableau System in
    Propositional Logic, Resolution Refutation in Propositional Logic, Predicate Logic, Logic
    Programming.
ll
    UNIT - III
    Expert System and Applications: Introduction, Phases in Building Expert Systems, Expert
    System Architecture, Expert Systems Vs Traditional Systems, Truth Maintenance Systems,
    Application of Expert Systems, List of Shells and Tools.
                                                                               R16 B.TECH CSE.
    UNIT-IV
    Machine-Learning Paradigms: Introduction. Machine Learning Systems. Supervised and
    Unsupervised Learning. Inductive Learning. Learning Decision Trees (Text Book 2),
                                                                             ld
    Deductive Learning. Clustering, Support Vector Machines.
    Artificial Neural Networks: Introduction, Artificial Neural Networks, Single-Layer Feed-
    Forward Networks, Multi-Layer Feed-Forward Networks, Radial-Basis Function Networks,
    Design Issues of Artificial Neural Networks, Recurrent Networks.
                                              or
    UNIT-V
    Advanced Knowledge Representation Techniques: Case Grammars, Semantic Web
    Natural Language Processing: Introduction, Sentence Analysis Phases, Grammars and
    Parsers, Types of Parsers, Semantic Analysis, Universal Networking Knowledge.
                                             W
    TEXT BOOKS:
      1. Saroj Kaushik. Artificial Intelligence. Cengage Learning. 2011
      2. Russell, Norvig: Artificial intelligence, A Modern Approach, Pearson Education,
         Second Edition. 2004
    REFERENCE BOOK:
                   TU
      1. Rich, Knight, Nair: Artificial intelligence, Tata McGraw Hill, Third Edition 2009.
      2. Introduction to Artificial Intelligence by Eugene Charniak, Pearson.
      3. Introduction to Artificial Intelligence and expert systems Dan W.Patterson. PHI.
      4. Artificial Intelligence by George Fluger rearson fifth edition.
JN
ll
A
                                                                             R16 B.TECH CSE.
                                                                           ld
    Course Objectives:
       To introduce the terminology, technology and its applications
       To introduce the concept of Security Analyst
       To introduce the tools, technologies & programming languages which are used in day
          to day security analyst job role
                                             or
    UNIT - I
    Information Security Management: Information Security Overview, Threats and Attack
    Vectors, Types of Attacks, Common Vulnerabilities, and Exposures (CVE), Security Attacks,
    Fundamentals of Information Security, Computer Security Concerns, Information Security
    Measures etc.
                                            W
    Manage your work to meet requirements (NOS 9001)
    UNIT - II
    Fundamentals of Information Security: Key Elements of Networks, Logical Elements of
    Network, Critical Information Characteristics, Information States etc.
    Work effectively with Colleagues (NOS 9002)
                   TU
    UNIT - III
    Data Leakage: What is Data Leakage and statistics, Data Leakage Threats, Reducing the
    Risk of Data Loss, Key Performance Indicators (KPI), Database Security etc.
    UNIT - IV
    Information Security Policies, Procedures, and Audits: Information Security Policies-
JN
    UNIT - V
    Information Security Management – Roles and Responsibilities: Security Roles &
    Responsibilities, Accountability, Roles, and Responsibilities of Information Security
    Management, team-responding to emergency situation-risk analysis process etc.
ll
    TEXT BOOKS:
      1. Management of Information Security by Michael E. Whitman and Herbert J. Mattord
A
    REFERENCES:
      1. http://www.iso.org/iso/home/standards/management-standards/iso27001.htm
      2. http://csrc.nist.gov/publications/nistpubs/800-55-Rev1/SP800-55-rev1.pdf
                                                                                  R16 B.TECH CSE.
                                                                                ld
    Course Objectives:
       To introduce the terminology, technology and its applications
       To introduce the concept of Analytics for Business
       To introduce the tools, technologies & programming languages which is used in day
                                                or
          to day analytics cycle
    UNIT - I
    Introduction to Analytics and R programming (NOS 2101): Introduction to R, R Studio
    (GUI): R Windows Environment, introduction to various data types, Numeric, Character,
                                               W
    date, data frame, array, matrix etc., Reading Datasets, Working with different file types .txt,.
    csv etc. Outliers, Combining Datasets, R Functions and loops.
    Manage your work to meet requirements (NOS 9001): Understanding Learning
    objectives, Introduction to work & meeting requirements, Time Management, Work
    management & prioritization, Quality & Standards Adherence,
    UNIT - II
                    TU
    Summarizing Data & Revisiting Probability (NOS 2101): Summary Statistics -
    Summarizing data with R, Probability, Expected, Random, Bivariate Random variables,
    Probability distribution. Central Limit Theorem etc.
    Work effectively with Colleagues (NOS 9002): Introduction to work effectively, Team
    Work, Professionalism, Effective Communication skills, etc.
JN
    UNIT - III
    SQL using R Introduction to NoSQL, Connecting R to NoSQL databases. Excel and R
    integration with R connector.
    UNIT - IV
    Correlation and Regression Analysis (NOS 9001): Regression Analysis, Assumptions of
    OLS Regression, Regression Modelling. Correlation, ANOVA, Forecasting,
    Heteroscedasticity, Autocorrelation, Introduction to Multiple Regression etc.
ll
    UNIT - V
    Understand the Verticals - Engineering, Financial and others (NOS 9002)
A
    TEXT BOOK:
      1. Student’s Handbook for Associate Analytics.
    REFERENCE BOOKS:
      1. Introduction to Probability and Statistics Using R, ISBN: 978-0-557-24979-4, is a
         textbook written for an undergraduate course in probability and statistics.
                                                                              ld
      2. An Introduction to R, by Venables and Smith and the R Development Core Team.
         This may be downloaded for free from the R Project website (http://www.r-
         project.org/, see Manuals). There are plenty of other free references available from the
         R Project website.
                                              or
      3. Montgomery, Douglas C., and George C. Runger, Applied statistics and probability
         for engineers. John Wiley & Sons, 2010
      4. Time Series Analysis and Mining with R. Yanchang Zhao.
                                             W
                   TU
JN
ll
A
                                                                              R16 B.TECH CSE.
1. Write a C program that contains a string (char pointer) with a value ‘Hello world’.
                                                                            ld
          The program should XOR each character in this string with 0 and displays the result.
       2. Write a C program that contains a string (char pointer) with a value ‘Hello world’.
          The program should AND or and XOR each character in this string with 127 and
          display the result.
                                             or
       3. Write a Java program to perform encryption and decryption using the following
          algorithms
              a. Ceaser cipher b. Substitution cipher c. Hill Cipher
                                            W
       5. Write a C/JAVA program to implement the Blowfish algorithm logic.
       7. Write the RC4 logic in Java Using Java cryptography; encrypt the text “Hello world”
          using Blowfish. Create your own key using Java key tool.
                   TU
       8. Write a Java program to implement RSA algorithm.
       10. Calculate the message digest of a text using the SHA-1 algorithm in JAVA.
JN
       11. Calculate the message digest of a text using the MD5 algorithm in JAVA.
ll
A
                                                                                  R16 B.TECH CSE.
Course Objectives:
                                                                                ld
        To enable the student to program web applications using the following technologies
          HTML, Javascript , AJAX, PHP, Tomcat Server, Servlets, JSP
    Course Outcomes:
        Use LAMP Stack for web applications
                                               or
        Use Tomcat Server for Servlets and JSPs
        Write simple applications with Technologies like HTML, Javascript, AJAX, PHP,
          Servlets and JSPs
        Connect to Database and get results
        Parse XML files using Java (DOM and SAX parsers)
                                              W
    Note:
       1. Use LAMP Stack (Linux, Apache, MySQL and PHP) for the Lab Experiments.
          Though not mandatory, encourage the use of Eclipse platform wherever applicable
       2. The list suggests the minimum program set. Hence, the concerned staff is requested to
          add more problems to the list as needed
                   TU
    1. Install the following on the local machine
        Apache Web Server (if not installed)
        Tomcat Application Server locally
        Install MySQL (if not installed)
        Install PHP and configure it to work with Apache web server and MySQL (if not
JN
already configured)
    2. Write an HTML page including javascript that takes a given set of integer numbers and
       shows them after sorting in descending order.
    3. Write an HTML page including any required Javascript that takes a number from one text
       field in the range of 0 to 999 and shows it in another text field in words. If the number is
       out of range, it should show “out of range” and if it is not a number, it should show “not a
ll
    4. Write an HTML page that has one input, which can take multi-line text and a submit
A
       button. Once the user clicks the submit button, it should show the number of characters,
       words and lines in the text entered using an alert message. Words are separated with
       white space and lines are separated with new line character.
                                                                                      R16 B.TECH CSE.
    5. Write an HTML page that contains a selection box with a list of 5 countries. When the
       user selects a country, its capital should be printed next to the list. Add CSS to customize
       the properties of the font of the capital (color, bold and font size).
    6. Create an XML document that contains 10 users information. Write a Java program,
       which takes User Id as input and returns the user details by taking the user information
                                                                                    ld
       from the XML document using (a) DOM Parser and (b) SAX parser
Implement the following web applications using (a) PHP, (b) Servlets and (c) JSP:
                                                 or
    7. A user validation web application, where the user submits the login name and password
       to the server. The name and password are checked against the data already available in
       Database and if the data matches, a successful login page is returned. Otherwise a failure
       message is shown to the user.
    8. Modify the above program to use an xml file instead of database.
                                                W
    9. Modify the above program to use AJAX to show the result on the same page below the
       submit button.
    10. A simple calculator web application that takes two numbers and an operator (+, -, /, * and
        %) from an HTML page and returns the result page with the operation performed on the
        operands.
                    TU
    11. Modify the above program such that it stores each query in a database and checks the
        database first for the result. If the query is already available in the DB, it returns the value
        that was previously computed (from DB) or it computes the result and returns it after
        storing the new query and result in DB.
JN
    12. A web application takes a name as input and on submit it shows a hello <name> page
        where <name> is taken from the request. It shows the start time at the right top corner of
        the page and provides a logout button. On clicking this button, it should show a logout
        page with Thank You <name> message with the duration of usage (hint: Use session to
        store name and time).
    13. A web application that takes name and age from an HTML page. If the age is less than
        18, it should send a page with “Hello <name>, you are not authorized to visit this site”
ll
        message, where <name> should be replaced with the entered name. Otherwise it should
        send “Welcome <name> to this site” message.
A
        If name matches and password doesn't match, then serves “password mismatch” page
        If name is not found in the database, serves a registration page, where user’s full name is
        asked and on submitting the full name, it stores, the login name, password and full name
        in the database (hint: use session for storing the submitted login name and password)
15. A web application that lists all cookies stored in the browser on clicking “List Cookies”
                                                                                ld
        button. Add cookies if necessary.
    REFERENCE BOOKS:
      1. The Complete Reference PHP – Steven Holzner, Tata McGraw-Hill
                                               or
      2. Web Programming, building internet applications, Chris Bates 2nd edition, Wiley
         Dreamtech
      3. Java Server Pages –Hans Bergsten, SPD O’Reilly
      4. Java Script, D.Flanagan, O’Reilly, SPD.
      5. Internet and World Wide Web – How to program, Dietel and Nieto, Pearson.
                                              W
                   TU
JN
ll
A
                                                                                 R16 B.TECH CSE.
                                                                               ld
    Introduction
    A course on Advanced English Communication Skills (AECS) Lab is considered essential at
    the third year level of B.Tech and B.Pharmacy courses. At this stage, the students need to
    prepare themselves for their career which requires them to listen to, read, speak and write in
    English both for their professional and interpersonal communication. The main purpose of
                                               or
    this course is to prepare the students of Engineering for their placements.
    Course Objectives: This Lab focuses on using multi-media instruction for language
    development to meet the following targets:
        To improve students’ fluency in spoken English
                                              W
        To enable them to listen to English spoken at normal conversational speed
        To help students develop their vocabulary
        To read and comprehend texts in different contexts
        To communicate their ideas relevantly and coherently in writing
        To make students industry-ready
        To help students acquire behavioral skills for their personal and professional life
                    TU
        To respond appropriately in different socio-cultural and professional contexts
    Syllabus
    The following course activities will be conducted as part of the Advanced English
    Communication Skills (AECS) Lab:
        1. Inter-personal Communication and Building Vocabulary - Starting a Conversation
           – Responding Appropriately and Relevantly – Using Appropriate Body Language –
ll
                                                                           ld
          Pre-interview Planning, Opening Strategies, Answering Strategies, Interview through
          Tele-conference & Video-conference and Mock Interviews.
                                             or
    Laboratory shall have the following infrastructural facilities to accommodate at least 35
    students in the lab:
         Spacious room with appropriate acoustics
         Eight round tables with five movable chairs for each table.
         Audio-visual aids
                                            W
         LCD Projector
         Public Address system
         Computer with suitable configuration
    Suggested Software: The software consisting of the prescribed topics elaborated above
    should be procured and used.
                   TU
        Oxford Advanced Learner’s Compass, 8th Edition
        DELTA’s key to the Next Generation TOEFL Test: Advanced Skill Practice.
    REFERENCES:
      1. Kumar, Sanjay and Pushp Lata. English for Effective Communication, Oxford
         University Press, 2015.
      2. Konar, Nira. English Language Laboratories – A Comprehensive Manual, PHI
JN