FirstRanker Logo

FirstRanker.com - FirstRanker's Choice is a hub of Question Papers & Study Materials for B-Tech, B.E, M-Tech, MCA, M.Sc, MBBS, BDS, MBA, B.Sc, Degree, B.Sc Nursing, B-Pharmacy, D-Pharmacy, MD, Medical, Dental, Engineering students. All services of FirstRanker.com are FREE

📱

Get the MBBS Question Bank Android App

Access previous years' papers, solved question papers, notes, and more on the go!

Install From Play Store

Download JNTUK M.Tech R19 CSE M.Tech Computer Science Course Structure And Syllabus

Download JNTU Kakinada (Jawaharlal Nehru Technological University, Kakinada) M.Tech (Master of Technology) R19 CSE M.Tech Computer Science Course Structure And Syllabus

This post was last modified on 16 March 2021




DEPARTMENT OF COMPUTER SCIENCE & ENGINEERING

--- Content provided by FirstRanker.com ---


COURSE STRUCTURE & SYLLABUS M.Tech CSE for
COMPUTER SCIENCE PROGRAMME

(Applicable for batches admitted from 2019-2020)

--- Content provided by FirstRanker.com ---





JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY KAKINADA

--- Content provided by FirstRanker.com ---



M. Tech. (CS) I SEMESTER
Course
Cate
S.No

--- Content provided by FirstRanker.com ---

Courses
L T P C
Code
gory
Program Core-1

--- Content provided by FirstRanker.com ---

1
MTCS1101
PC
3 0 0 3
Mathematical Foundations of Computer Science

--- Content provided by FirstRanker.com ---

Program Core-2
2
MTCS1102
PC
3 0 0 3

--- Content provided by FirstRanker.com ---

Advanced Data Structures
Program
Elective-1

3
MTCS1103

--- Content provided by FirstRanker.com ---

1. Advanced Operating Systems
PE
3 0 0 3
2. Advanced Computer Architecture
3. Parallel Computing

--- Content provided by FirstRanker.com ---

Program Elective-2
1. Advanced Data Bases
4
MTCS1104
PE

--- Content provided by FirstRanker.com ---

3 0 0 3
2. Advanced Computer Networks
3. Object Oriented Software Engineering
5
MTCS1105

--- Content provided by FirstRanker.com ---

Research Methodology and IPR
CC
0 2
Laboratory-1
6

--- Content provided by FirstRanker.com ---

MTCS1106
LB 0 0 4 2
Advanced Data Structures Lab
Laboartory-2
7

--- Content provided by FirstRanker.com ---

MTCS1107
LB 0 0 4 2
Advanced Computing Lab-1
8
MTCS1108

--- Content provided by FirstRanker.com ---

Audit Course-1*
AC 2 0 0 0
Total Credits
18
*Student has to choose any one audit course listed below.

--- Content provided by FirstRanker.com ---

II SEMESTER
Course
Cate
S.No
Courses

--- Content provided by FirstRanker.com ---

L T P C
Code
Gory
Program Core-3
1

--- Content provided by FirstRanker.com ---

MTCS1201
PC
3
0 0 3
Advance Algorithms

--- Content provided by FirstRanker.com ---

Program Core-4
2
MTCS1202
PC
3

--- Content provided by FirstRanker.com ---

0 0 3
Data Science through Python Programming
Program Elective-3
1. Machine Learning
3

--- Content provided by FirstRanker.com ---

MTCS1203
2.
PE
3
0 0 3

--- Content provided by FirstRanker.com ---

Ad hoc and Sensor Networks
3. Internet of Things
Program Elective-4
1. Cryptography and network Security
4

--- Content provided by FirstRanker.com ---

MTCS1204
PE
3
0 0 3
2. Cloud Computing

--- Content provided by FirstRanker.com ---

3. Web Technologies
Laboratory-3
5
MTCS1205
LB

--- Content provided by FirstRanker.com ---

0
0 4 2
Advance Algorithms Lab
Laboartory-4
6

--- Content provided by FirstRanker.com ---

MTCS1206
LB
0
0 4 2
Advanced Computing Lab-2

--- Content provided by FirstRanker.com ---

7
MTCS1207
Mini Project with Seminar
MP 2
0 0 2

--- Content provided by FirstRanker.com ---

8
MTCS1208
Audit Course-2*
AC
2

--- Content provided by FirstRanker.com ---

0 0 0
Total Credits
18
*Student has to choose any one audit course listed below.

--- Content provided by FirstRanker.com ---




Audit Course 1 & 2:

1. English for Research Paper Writing
5. Constitution of India

--- Content provided by FirstRanker.com ---

2. Disaster Management
6. Pedagogy Studies
3. Sanskrit for Technical Knowledge
7. Stress Management by Yoga
4. Value Education

--- Content provided by FirstRanker.com ---

8. Personality Development through Life
Enlightenment Skills
III SEMESTER
Course
Cate

--- Content provided by FirstRanker.com ---

S.No
Courses
L T P C
Code
gory

--- Content provided by FirstRanker.com ---

Program Elective-5
PE
1. Mobile Applications and Development
2. Big Data Analytics
1

--- Content provided by FirstRanker.com ---

MTCS2101
3 0 0 3
3. MOOCs-1 through NPTEL/ SWAYAM- 12
Week Program related to the programme which
is not listed in the course structure

--- Content provided by FirstRanker.com ---

Open Elective
OE
1. MOOCs-2 Through NPTEL /SWAYAM - Any
12 week course on Engineering/ Management/
2

--- Content provided by FirstRanker.com ---

MTCS2102
Mathematics offered by other than parent
3 0 0 3
department
2. Course offered by other departments in the

--- Content provided by FirstRanker.com ---

college
3
MTCS2103
Dissertation-I/Industrial Project #
PJ

--- Content provided by FirstRanker.com ---

0 0 20 10
Total Credits
16
#Students going for Industrial Project/Thesis will complete these courses through MOOCs
IV SEMESTER

--- Content provided by FirstRanker.com ---

Course
Cate
S.No
Courses
L T P C

--- Content provided by FirstRanker.com ---

Code
gory
1
MTCS2201
Dissertation-II

--- Content provided by FirstRanker.com ---

PJ
0
0 32 16
Total Credits
16

--- Content provided by FirstRanker.com ---

Open Electives offered by the Department of Computer Science and Engineering for other
Departments students

1. Python Programming
2. Data Science
3. Bioinformatics

--- Content provided by FirstRanker.com ---

4. Digital Forensics
5. Web Security
6. Machine Learning


L

--- Content provided by FirstRanker.com ---

T
P
C
I Year - I Semester

--- Content provided by FirstRanker.com ---

3
0
0
3
Mathematical Foundations of Computer Science (MTCSE1101)

--- Content provided by FirstRanker.com ---

Course Objectives:
? To understand the mathematical fundamentals that are vital many courses in the field of Computer
Science.
? To develop the understanding of the mathematical and logical basis to many modern techniques in
information technology like machine learning, programming language design, and concurrency.

--- Content provided by FirstRanker.com ---

? To study various sampling and classification problems.
Course Outcomes: After completion of course, students would be able to
? Demonstrate skills in solving mathematical problems.
? Comprehend mathematical principles and logic.
? Demonstrate knowledge of mathematical modeling and proficiency in using mathematical

--- Content provided by FirstRanker.com ---

software
? Manipulate and analyze data numerically and/or graphically using appropriate Software.
? Communicate effectively mathematical ideas/results verbally or in writing.

UNIT I: Mathematical Logic
-Propositional Calculus: Statements and Notations, Connectives, Well

--- Content provided by FirstRanker.com ---

Formed Formulas, Truth Tables, Tautologies, Equivalence of Formulas, Duality Law, Tautological
Implications, Normal Forms, Theory of Inference for Statement Calculus, Consistency of Premises,
Indirect Method of Proof. Predicate Calculus: Predicative Logic, Statement Functions, Variables and
Quantifiers, Free and Bound Variables, Inference Theory for Predicate Calculus.

--- Content provided by FirstRanker.com ---

UNIT II: Set Theory-
Introduction, Operations on Binary Sets, Principle of Inclusion and Exclusion,
Relations: Properties of Binary Relations, Relation Matrix and Digraph, Operations on Relations,
Partition and Covering, Transitive Closure, Equivalence, Compatibility and Partial Ordering Relations,
Hasse Diagrams, Functions: Bijective Functions, Composition of Functions, Inverse Functions,
Permutation Functions, Recursive Functions, Lattice and its Properties.

--- Content provided by FirstRanker.com ---

UNIT III: Algebraic Structures and Number Theory- Algebraic Structures: Algebraic Systems,
Examples, General Properties, Semi Groups and Monoids, Homomorphism of Semi Groups and
Monoids, Group, Subgroup, Abelian Group, Homomorphism, Isomorphism, Number Theory: Properties
of Integers, Division Theorem, The Greatest Common Divisor, Euclidean Algorithm, Least Common
Multiple, Testing for Prime Numbers, The Fundamental Theorem of Arithmetic, Modular Arithmetic

--- Content provided by FirstRanker.com ---

(Fermat's Theorem and Euler's Theorem)
UNIT IV: Combinatorics- Basic of Counting, Permutations, Permutations with Repetitions, Circular
Permutations, Restricted Permutations, Combinations, Restricted Combinations, Generating Functions of
Permutations and Combinations, Binomial and Multinomial Coefficients, Binomial and Multinomial
Theorems, The Principles of Inclusion?Exclusion, Pigeonhole Principle and its Application.

--- Content provided by FirstRanker.com ---

UNIT V: Recurrence Relations-
Generating Functions, Function of Sequences, Partial Fractions,
Calculating Coefficient of Generating Functions, Recurrence Relations, Formulation as Recurrence
Relations, Solving Recurrence Relations by Substitution and Generating Functions, Method of
Characteristic Roots, Solving Inhomogeneous Recurrence Relations, Graph Theory: Basic Concepts of
Graphs, Sub graphs, Matrix Representation of Graphs: Adjacency Matrices, Incidence Matrices,

--- Content provided by FirstRanker.com ---

Isomorphic Graphs, Paths and Circuits, Eulerian and Hamiltonian Graphs, Multigraphs, Planar Graphs,
Euler's Formula, Graph Colouring and Covering, Chromatic Number, Spanning Trees, Algorithms for
Spanning Trees (Problems Only and Theorems without Proofs).
Text Books:
1. Discrete Mathematical Structures with Applications to Computer Science, J. P. Tremblay and P.

--- Content provided by FirstRanker.com ---

Manohar, Tata McGraw Hill.
2. Elements of Discrete Mathematics-A Computer Oriented Approach, C. L. Liu
and D. P. Mohapatra, 3rd Edition, Tata McGraw Hill.
3. Discrete Mathematics and its Applications with Combinatorics and Graph

Theory, K. H. Rosen, 7th Edition, Tata McGraw Hill.

--- Content provided by FirstRanker.com ---


Reference Books:
1. Discrete Mathematics for Computer Scientists and Mathematicians, J. L. Mott, A. Kandel, T. P. Baker,
2nd Edition, Prentice Hall of India.
2. Discrete Mathematical Structures, Bernand Kolman, Robert C. Busby, Sharon Cutler Ross, PHI.

--- Content provided by FirstRanker.com ---

3. Discrete Mathematics, S. K. Chakraborthy and B.K. Sarkar, Oxford, 2011.


L
T
P

--- Content provided by FirstRanker.com ---

C
I Year - I Semester

3
0

--- Content provided by FirstRanker.com ---

0
3
Advanced Data Structures ( MTCS1102)

Course objectives:

--- Content provided by FirstRanker.com ---

? To be familiar with basic techniques of object oriented principles and exception handling using C++
? To be familiar with the concepts like Inheritance, Polymorphism
? Solve problems using data structures such as linear lists, stacks, queues, hash tables
? Be familiar with advanced data structures such as balanced search trees, AVL Trees, and B Trees.

--- Content provided by FirstRanker.com ---

Course outcomes:

? Select appropriate data structures as applied to specified problem definition.
? Apply advanced data structure strategies for exploring complex data structures.
? Implement all data structures like stacks, queues, trees, lists and graphs and compare their
Performance and trade offs

--- Content provided by FirstRanker.com ---

? Implement operations like searching, insertion, and deletion, traversing mechanism etc. on various
data structures.
? Incorporate data structures into the applications such as binary search trees, AVL, Red Black, splay
and B Trees
? Determine and analyze the complexity of given Algorithms

--- Content provided by FirstRanker.com ---


UNIT I: Arrays
Abstract Data Types and the C++ Class, The Array as an Abstract Data Type, The
Polynomial Abstract Data type, Spares Matrices, Introduction- Sparse Matrix Representation-
Transposing a Matrix- Matrix Multiplication, Representation of Arrays. Stacks And Queues- Templates
in C++, The Stack Abstract Data Type, The Queue Abstract Data Type, Subtyping and Inheritance in

--- Content provided by FirstRanker.com ---

C++, Evaluation of Expressions, Expression- Postfix Notation- Infix to Postfix.

UNIT II: Linked Lists
Single Linked List and Chains, Representing Chains in C++, The Template
Class Chain, Circular Lists, Available Space Lists, Linked Stacks and Queues, Polynomials, Equivalence
Classes, Sparse Matrices, Doubly Linked Lists, Generalized Lists, Representation of Generalized Lists,

--- Content provided by FirstRanker.com ---

Trees Introduction, Binary Trees, Binary Tree Traversal and Tree Iterators-Introduction, Inorder,
Preorder, Postorder Traversal, Thread Binary Trees, Heaps, Binary Search Trees.
UNIT III: Graphs The Graph Abstract Data Type, Elementary Graph Operation, Minimum Cost
Spanning Trees, Shortest Paths and Transitive Closure, Hashing- Introduction, Static Hashing, Dynamic
Hashing

--- Content provided by FirstRanker.com ---





UNIT IV: Priority Queues
Binomial heaps, Fibonacci Heaps, Symmetric Min-Max Heaps, Efficient
Binary Search Trees
Optimal Binary Search Trees, AVL trees, Red-Black Trees, Splay Trees.

--- Content provided by FirstRanker.com ---

UNIT V: Multyway Search Trees m-way Search Trees, B- Trees, B+- Trees Digital Search Trees
Digital Search Trees, Binary Tries and Patricia, Multiway Tries

Text Books:
1. Data structures, Algorithms and Applications in C++, S.Sahni, 2nd edition, Universities Press, Pvt. Ltd.

--- Content provided by FirstRanker.com ---

2. Data structures and Algorithm Analysis in C++, Mark Allen Weiss, Pearson Education. Ltd., Second
Edition.
3. Data structures and Algorithms in C++, Michael T.Goodrich, R.Tamassia and Mount, Wiley student
edition, John Wiley and Sons.
Reference Books:

--- Content provided by FirstRanker.com ---

1. Data structures and algorithms in C++, 3rd Edition, Adam Drozdek, Thomson
2. Data structures using C and C++, Langsam, Augenstein and Tanenbaum, PHI.
3. Problem solving with C++, The OOP, Fourth edition, W.Savitch, Pearson education.


L

--- Content provided by FirstRanker.com ---

T
P
C
I Year - I Semester

--- Content provided by FirstRanker.com ---

3
0
0
3
Advanced Operating Systems ( MTCS11XX)

--- Content provided by FirstRanker.com ---


Course Objectives:
This course is aimed at enabling the students to
? provide comprehensive and up-to-date coverage of the major developments in distributed Operating
System, Multi-processor Operating System and Database Operating System and to cover important

--- Content provided by FirstRanker.com ---

theoretical foundations including Process Synchronization, Concurrency, Event ordering, Mutual
Exclusion, Deadlock, Agreement Protocol, Security, Recovery and fault tolerance.

Course Outcomes:
After the completion of the course, student will be able to

--- Content provided by FirstRanker.com ---

? Illustrate on the fundamental concepts of distributed operating systems, its architecture and
distributed mutual exclusion.
? Analyze on deadlock detection algorithms and agreement protocols.
? Make use of algorithms for implementing DSM and its scheduling.
? Apply protection and security in distributed operating systems.

--- Content provided by FirstRanker.com ---

? Elaborate concurrency control mechanisms in distributed database systems.
UNIT I: Introduction- Architectures of Distributed Systems - System Architecture types - issues in
distributed operating systems - communication networks - communication primitives. Theoretical
Foundations - inherent limitations of a distributed system - lamp ports logical clocks - vector clocks -
casual ordering of messages - global state - cuts of a distributed computation - termination detection.

--- Content provided by FirstRanker.com ---

Distributed Mutual Exclusion - introduction - the classification of mutual exclusion and associated
algorithms - a comparative performance analysis.
UNIT II: Distributed Deadlock Detection -Introduction - deadlock handling strategies in distributed
systems - issues in deadlock detection and resolution - control organizations for distributed deadlock
detection - centralized and distributed deadlock detection algorithms -hierarchical deadlock detection

--- Content provided by FirstRanker.com ---

algorithms. Agreement protocols - introduction-the system model, a classification of agreement problems,
solutions to the Byzantine agreement problem, applications of agreement algorithms. Distributed resource
management: introduction-architecture - mechanism for building distributed file systems - design issues -
log structured file systems.

--- Content provided by FirstRanker.com ---




UNIT III:
Distributed shared memory-Architecture- algorithms for implementing DSM - memory
coherence and protocols - design issues. Distributed Scheduling - introduction - issues in load distributing
- components of a load distributing algorithm - stability - load distributing algorithm - performance

--- Content provided by FirstRanker.com ---

comparison - selecting a suitable load sharing algorithm - requirements for load distributing -task
migration and associated issues. Failure Recovery and Fault tolerance: introduction- basic concepts -
classification of failures - backward and forward error recovery, backward error recovery- recovery in
concurrent systems - consistent set of check points - synchronous and asynchronous check pointing and
recovery - check pointing for distributed database systems- recovery in replicated distributed databases.

--- Content provided by FirstRanker.com ---

UNIT IV: Protection and security -preliminaries, the access matrix model and its implementations.-safety
in matrix model- advanced models of protection. Data security - cryptography: Model of cryptography,
conventional cryptography- modern cryptography, private key cryptography, data encryption standard-
public key cryptography - multiple encryption - authentication in distributed systems.
UNIT V: Multiprocessor operating systems - basic multiprocessor system architectures - inter connection

--- Content provided by FirstRanker.com ---

networks for multiprocessor systems - caching - hypercube architecture. Multiprocessor Operating
System - structures of multiprocessor operating system, operating system design issues- threads- process
synchronization and scheduling. Database Operating systems :Introduction- requirements of a database
operating system Concurrency control : theoretical aspects - introduction, database systems - a
concurrency control model of database systems- the problem of concurrency control - serializability

--- Content provided by FirstRanker.com ---

theory- distributed database systems, concurrency control algorithms - introduction, basic synchronization
primitives, lock based algorithms-timestamp based algorithms, optimistic algorithms - concurrency
control algorithms, data replication.
Text Books:
1. Mukesh Singhal, Niranjan G.Shivaratri, "Advanced concepts in operating systems: Distributed,

--- Content provided by FirstRanker.com ---

Database and multiprocessor operating systems", TMH, 2001
2. Distributed principles, Algorithms and Systems Computing Reissue Edition, Kindle Edition by Ajay
D. Kshemkalyani , Mukesh Singhal
Reference Books:
1. Andrew S.Tanenbaum, "Modern operating system", PHI, 2003.

--- Content provided by FirstRanker.com ---

2. Pradeep K.Sinha, "Distributed operating system-Concepts and design", PHI, 2003.
3. Andrew S.Tanenbaum, "Distributed operating system", Pearson education, 2003




--- Content provided by FirstRanker.com ---

L
T
P
C
I Year - I Semester

--- Content provided by FirstRanker.com ---


3
0
0
3

--- Content provided by FirstRanker.com ---

Advanced Computer Architecture
Course Objective:
? Understand the Concept of Parallel Processing and its applications.
? Implement the Hardware for Arithmetic Operations.
? Analyze the performance of different scalar Computers.

--- Content provided by FirstRanker.com ---

? Develop the Pipelining Concept for a given set of Instructions.
? Distinguish the performance of pipelining and non pipelining environment in a processor.
Course Outcomes:
After the completion of the course, student will be able to
? know the types of computers, and new trends and developments in computer architecture.

--- Content provided by FirstRanker.com ---

? Understand pipelining, instruction set architectures, memory addressing.
? Understand exploiting ILP using dynamic scheduling, multiple issue, and speculation.
? Understand the various techniques to enhance a processors ability to exploit Instruction-level
parallelism (ILP), and its challenges.
? Understand multithreading by using ILP and supporting thread-level parallelism (TLP).

--- Content provided by FirstRanker.com ---


UNIT I:
Fundamentals of Computer Design-Fundamentals of Computer design, Changing faces of
computing and task of computer designer, Technology trends, Cost price and their trends, Measuring and
reporting performance, Quantitative principles of computer design, Amdahl's law, Instruction set
principles and examples- Introduction, Classifying instruction set- Memory addressing- type and size of

--- Content provided by FirstRanker.com ---

operands, Operations in the instruction set.
UNIT II: Pipelines- Introduction, Basic RISC instruction set, Simple implementation of RISC instruction
set, Classic five stage pipe lined RISC processor, Basic performance issues in pipelining, Pipeline
hazards, Reducing pipeline branch penalties, Memory Hierarchy Design- Introduction, Review of ABC
of cache, Cache performance, Reducing cache miss penalty, Virtual memory.

--- Content provided by FirstRanker.com ---

UNIT III: Instruction Level Parallelism the Hardware Approach: Instruction- Level parallelism,
Dynamic scheduling, Dynamic scheduling using Tomasulo's approach, Branch prediction, high
performance instruction delivery- hardware based speculation.
UNIT IV: ILP Software
Approach Basic compiler level techniques, Static branch prediction, VLIW approach, Exploiting ILP,

--- Content provided by FirstRanker.com ---

Parallelism at compile time, Cross cutting issues -Hardware verses Software.
UNIT V: Multi Processors and Thread Level Parallelism:
Multi Processors and Thread level Parallelism- Introduction, Characteristics of application domain,
Systematic shared memory architecture, Distributed shared ? memory architecture, Synchronization,
Inter Connection and Networks- Introduction, Interconnection network media, Practical issues in

--- Content provided by FirstRanker.com ---

interconnecting networks, Examples of inter connection, Cluster, Designing of clusters, Intel
Architecture-
Intel IA-64 ILP in embedded and mobile markets Fallacies and pit falls.
Text Books:
1. John L. Hennessy, David A. Patterson ? Computer Architecture: A Quantitative Approach, 3rd
Edition, An Imprint of Elsevier.

--- Content provided by FirstRanker.com ---


References:

1. John P. Shen and Miikko H. Lipasti ? Modern Processor Design : Fundamentals of Super Scalar
Processors
2. Computer Architecture and Parallel Processing ? Kai Hwang, Faye A.Brigs., MC Graw Hill.

--- Content provided by FirstRanker.com ---

3. Advanced Computer Architecture ? A Design Space Approach ? Dezso Sima, Terence Fountain,

Peter Kacsuk , Pearson Ed


L
T

--- Content provided by FirstRanker.com ---

P
C
I Year - I Semester

3

--- Content provided by FirstRanker.com ---

0
0
3
Parallel Computing ( MTCS11XX)
Course Objective: Students will demonstrate an understanding of concepts, algorithms, and design

--- Content provided by FirstRanker.com ---

principles underlying parallel computing, develop algorithm design and implementation skills, and gain
practical experience in programming large scale parallel machines.
Course Outcomes:
After the completion of the course, student will be able to
? Describe different parallel architectures; inter-connect networks, programming models, and

--- Content provided by FirstRanker.com ---

algorithms for common operations such as matrix-vector multiplication.
? Develop an efficient parallel algorithm to solve it.
? Analyze a parallel algorithm time complexity as a function of the problem size and number of
processors.
? Analyze parallel code performance, determine computational bottlenecks, and optimize the

--- Content provided by FirstRanker.com ---

performance of the code.
? Implement parallel algorithm using MPI, OpenMP, pthreads, or a combination of MPI and
OpenMP.
UNIT I: History- Introduction, Modern Scientific Method, Evolution of Supercomputing , Modem
Parallel Computers, Seeking Concurrency, Data Clustering, Programming Parallel Computers. Parallel

--- Content provided by FirstRanker.com ---

Architectures:
Introduction, Interconnection Networks, Processor Arrays, Multiprocessors, Multi
computers, Flynn's Taxonomy
UNIT II: Parallel Algorithm Design- Introduction, The Task/Channel Model, Foster's Design
Methodology, Boundary Value Problem ,Finding the Maximum, The n-Body Problem, Adding Data
Input, Message-Passing Programming- Introduction, The Message-Passing Model, The Message-

--- Content provided by FirstRanker.com ---

Passing Interface , Circuit Satisfiability, Introducing Collective Communication, Benchmarking Parallel
Performance.
UNIT III: The Sieve of Eratosthenes-Introduction, Sequential Algorithm, Sources of Parallelism, Data
Decomposition options, Developing the Paralle1 Algorithm, Analysis of Parallel Sieve Algorithm,
Documenting the Parallel Program, Benchmarking, Improvements, Performance Analysis- Introduction,

--- Content provided by FirstRanker.com ---

Speedup and Efficiency, Amdahl's Law, Gustafson-Barsis's Law, The Karp-Flatt Metric, The Iso-
efficiency Metric.
UNIT IV: Matrix Multiplication, Introduction, Sequential Matrix Multiplication, Row wise Block-
Striped Parallel Algorithm, Cannon's Algorithm, Solving Linear Systems, Back Substitution, Gaussian
Elimination, Iterative Methods, Sorting Introduction, Quick sort, A Parallel Quick sort Algorithm, Hyper

--- Content provided by FirstRanker.com ---

quick sort Algorithm, Parallel Sorting by Regular Sampling.
UNIT V: Shared-Memory Programming ? Introduction, The Shared-Memory Model, Parallel for
Loops, Declaring Private Variables, Critical section, Reductions, Performance Improvements, More
General Data Parallelism, Functional Parallelism, Combining MPI and OpenMP -Introduction,
Conjugate Gradient Method, Jacobi Method.

--- Content provided by FirstRanker.com ---


Text Books:

1. Parallel Programming in C with MPI and OpenMP Michael J, Quinn Oregon State University.
Reference books:
1. Distributed and Cloud Computing: From Parallel Processing to the Internet of Things 1st Edition, Kai

--- Content provided by FirstRanker.com ---

Hwang , Jack Dongarra, Geoffrey C. Fox





L

--- Content provided by FirstRanker.com ---

T
P
C
I Year - I Semester

--- Content provided by FirstRanker.com ---

3
0
0
3
ADVANCED DATABASES ( MTCS11XX)

--- Content provided by FirstRanker.com ---

Course Objectives:
? Design and implement advanced queries using Structured Query Language
? To study the usage and applications of Object Oriented database
? To acquire knowledge on variety of NoSQL databases
? To attain inquisitive attitude towards research topics in NoSQL databases

--- Content provided by FirstRanker.com ---


Course Outcomes:

? Understand Distributed Database Process, Architecture, and Design Principles.
? Apply Distributed Query Optimization Techniques and Algorithms.
? Analyze and apply Concurrency Control and Reliability Techniques,

--- Content provided by FirstRanker.com ---

? Analyze Need of Complex Data type like ORDBMS and OODBMS
? Identify Emerging Database Models.

UNIT I: Database Analysis and Design Techniques: Review of basic Database Concepts, Database
Design Methodologies. ER Modeling: Specialization, Generalization, Aggregation, Normalization

--- Content provided by FirstRanker.com ---

Theory. Database Implementation using UML: Introduction to UML, Structure diagrams, behavioral
diagrams, object oriented analysis, class diagram, Advanced Transaction Processing and Concurrency
Control: Transaction Concepts, Concurrency Control: Locking Methods, Time stamping Methods,
Optimistic Methods for Concurrency Control, Concurrency Control in Distributed Systems.
UNIT II: Query Compiler: Introduction, parsing, generating logical query plan from parse tree. Query

--- Content provided by FirstRanker.com ---

Processing: Physical-Query-plan Operators. Operations: selection, sorting, join, project, set. Query
Evaluation: Introduction, Approaches to QE, Transformation of relational expressions in Query
optimization, heuristic optimization, cost estimation for various operations, transformation rule.
UNIT III: Distributed Database Centralized DBMS and Distributed DBMS, functions and architecture of
a DDBMS, Distributed Data Storage, Transparency issues in DDBMS, Query Processing DDBMS,

--- Content provided by FirstRanker.com ---

Distributed transaction Management and Protocols, Distributed Concurrency Control and Deadlock
Management.
UNIT IV: Object Oriented Database Limitations of RDBMS, Need of Complex Datatype, Data
Definition, ODBMS Fundamentals, issues in OODBMS, Object-oriented database design. Comparison of
ORDBMS and OODBMS.

--- Content provided by FirstRanker.com ---

UNIT V: Emerging Database Models, Technologies and Applications Multimedia database-Emergence,
difference from other data types, structure, deductive databases, GIS and spatial databases, Knowledge
database, Information Visualization, Wireless Networks and databases, Personal database, Digital
libraries, web databases, case studies.

--- Content provided by FirstRanker.com ---

Text Books:

1. Advanced database management system by RiniChkrabarti and Shibhadra Dasgupta, Dreamtech.
2. Distributed Databases by Ozsu and Valduriez ,Pearson Education.

Reference Books
:

--- Content provided by FirstRanker.com ---

1. Fundamentals of Database Systems by Ramez Elmasri, Shamkant Navathe, Pearson Education
2. Database System Concepts by Abraham Silberschatz, Henry F. Korth, S.
Sudarshan, Tata McGraw-Hill.


L

--- Content provided by FirstRanker.com ---

T
P
C
I Year - I Semester

--- Content provided by FirstRanker.com ---

3
0
0
3
Advanced Computer Networks ( MTCS11XX)

--- Content provided by FirstRanker.com ---

Course Objectives:
? The course is aimed at providing basic understanding of Protocols at Network layers with special
emphasis on IP, TCP & UDP and Routing algorithms.
? Implementation Routing and Addressing.
? Provide the mathematical background of routing protocols.

--- Content provided by FirstRanker.com ---

? Aim of this course is to develop some familiarity with current research problems and research
methods in advance computer networks.
Course Outcomes:
? Understand the functionality and services provided by the network layer, analyze and apply
routing algorithms.

--- Content provided by FirstRanker.com ---

? Analyze how to assign the IP addresses for the given network.
? Select the transport protocol appropriate for a given application
? Select appropriate quality of service mechanisms for a give computer network
? Analyze emerging trends and security issues
UNIT I: Network layer-Network Layer design issues: store-and forward packet switching, services

--- Content provided by FirstRanker.com ---

provided transport layers, implementation connection less services, implementation connection oriented
services, comparison of virtual ?circuit and datagram subnets. Routing Algorithm ?shortest path routing,
flooding, distance vector routing, link state routing, Hierarchical routing, Broadcast routing, Multicasting
routing, routing for mobiles Hosts, routing in Adhoc networks, Congestion control algorithms-Load
shedding, Congestion control in Data gram Subnet.

--- Content provided by FirstRanker.com ---


UNIT II: IPV4 Address
address space, notations, classful addressing, classless addressing network
addressing translation(NAT) , IPV6 Address structure address space, Internetworking need for network
layer internet as a data gram, internet as connection less network. IPV4 datagram, Fragmentation,
checksum, options. IPV6 Advantages, packet format, extension Headers, Transition form IPV4 to IPV6

--- Content provided by FirstRanker.com ---


UNIT III: Process to process delivery:
client/server paradigm, multiplexing and demultiplexing,
connectionless versus connection oriented services, reliable versus reliable. UDP: well known ports for
UDP, user data gram, check sum, UDP operation, and uses of UDP TCP: TCP services, TCP features,
segement, A TCP connection, Flow control, error control, congestion control. SCTP: SCTP services

--- Content provided by FirstRanker.com ---

SCTP features, packet format, An SCTP association, flow control, error
control. Congestion control: open loop congestion control, closed loop congestion control, Congestion
control in TCP, frame relay, Quality Of Service: flow characteristics, flow classes Techniques To
Improve QOS
: scheduling, traffic shaping, resource reservation, admission control.
UNIT IV: Multimedia- introduction digital a audio , Audio compression, streaming audio, internet radio,

--- Content provided by FirstRanker.com ---

voice over IP, introduction to video, video compression, video on demand, the MBone-the multicast back
bone
UNIT V: Emerging trends Computer Networks- Mobile Ad hoc networks: applications of Ad hoc
networks, challenges and issues in MANETS,MAC layers issues, routing protocols in MANET, transport
layer issues, Ad Hoc networks security. Wireless sensors networks: WSN functioning, operation system

--- Content provided by FirstRanker.com ---

support in sensor devices, WSN Characteristics, sensor network operation, sensor Architecture: cluster
management; Wireless mesh networks WMN design, Issues in WMNs;
Text Books:
1. Data communications and networking 4th edtion Behrouz A Fourzan, TMH
2. Computer networks 4th editon Andrew S Tanenbaum, Pearson

--- Content provided by FirstRanker.com ---

3. Computer networks, Mayank Dave, CENGAGE


Reference Books:
1. Computer Networks, A system Approach, 5th ed, Larry L Peterson and Bruce S Davie, Elsevier

L

--- Content provided by FirstRanker.com ---

T
P
C
I Year - I Semester

--- Content provided by FirstRanker.com ---

3
0
0
3
Object Oriented Software Engineering ( MTCS11XX)

--- Content provided by FirstRanker.com ---


Course Objectives:

? To elicit, analyze and specify software requirements through a productive working relationship with
various stakeholders of the project.
? To understand the what software life cycle is, how software projects are planned and managed, types

--- Content provided by FirstRanker.com ---

of resources involved in software development projects, risks are identified and assessed, predictions
and assessments are made.
? To identify, formulate, and solve software engineering problems, including the specification, design,
implementation, and testing of software systems that meet specification, performance, maintenance
and quality requirements

--- Content provided by FirstRanker.com ---

Course Outcomes:
After the completion of the course, student will be able to
? Apply the Object Oriented Software-Development Process to design software
? Analyze and Specify software requirements through a SRS documents.
? Design and Plan software solutions to problems using an object-oriented strategy.

--- Content provided by FirstRanker.com ---

? Model the object oriented software systems using Unified Modeling Language (UML)
? Estimate the cost of constructing object oriented software.



--- Content provided by FirstRanker.com ---

UNIT I:
Introduction to Software Engineering: Software, Software Crisis, Software Engineering
definition, Evolution of Software Engineering Methodologies, Software Engineering Challenges.
Software Processes: Software Process, Process Classification, Phased development life cycle, Software
Development Process Models- Process, use, applicability and Advantages/limitations.

--- Content provided by FirstRanker.com ---

UNIT II:
Object oriented Paradigm, Object oriented Concepts, Classes, Objects, Attributes, Methods and
services, Messages, Encapsulation, Inheritance, Polymorphism, Identifying the elements of object model,
management of object oriented Software projects, Object Oriented Analysis, Domain Analysis, Generic
Components of OOA model,, OOA Process, Object Relationship model, Object Behavior Model, Object
Oriented Design: Design for Object- Oriented systems, The Generic components of the OO design model,

--- Content provided by FirstRanker.com ---

The System design process, The Object design process, Design Patterns, Object Oriented Programming.

UNIT III: Object Oriented testing: Broadening the view of Testing, Testing of OOA and OOD models,
Object-Oriented testing strategies, Test case design for OO software, testing methods applicable at the
class level, Interclass test case design

--- Content provided by FirstRanker.com ---


UNIT IV:
Technical Metrics for Object Oriented Systems: The Intent of Object Oriented metrics, The
distinguishing Characteristics, Metrics for the OO Design model, Class-Oriented metrics, Operation-
Oriented Metrics, Metrics foe Object Oriented testing, Metrics for Object Oriented projects
UNIT V:
Computer-Aided Software Engineering: What is CASE?, Building blocks for CASE, A

--- Content provided by FirstRanker.com ---

taxonomy of CASE tools, Integrated CASE environments, The Integration Architecture, The CASE
Repository

Text Books:

1. Object Oriented and Classical Software Engineering, 7/e, Stephen R. Schach, TMH.

--- Content provided by FirstRanker.com ---

2. Object oriented and Classical Software Engineering, Timothy Lethbridge, Robert Laganiere, TMH
3. Software Engineering by Roger S Pressman, Tata McGraw Hill.
Reference Books:

1. Component based Software Engineering: ivica Crnkovic, Springer.

L

--- Content provided by FirstRanker.com ---

T
P
C
I Year - I Semester

--- Content provided by FirstRanker.com ---

2
0
0
2
RESEARCH METHODOLOGY AND IPR (MTCS1105)

--- Content provided by FirstRanker.com ---


UNIT 1:

Meaning of research problem, Sources of research problem, Criteria Characteristics of a good research
problem, Errors in selecting a research problem, Scope and objectives of research problem. Approaches
of investigation of solutions for research problem, data collection, analysis, interpretation, Necessary

--- Content provided by FirstRanker.com ---

instrumentations
UNIT 2:
Effective literature studies approaches, analysis Plagiarism, Research ethics, Effective technical writing,
how to write report, Paper Developing a Research Proposal, Format of research proposal, a presentation
and assessment by a review committee

--- Content provided by FirstRanker.com ---

UNIT 3:
Nature of Intellectual Property: Patents, Designs, Trade and Copyright. Process of Patenting and
Development: technological research, innovation, patenting, development. International Scenario:
International cooperation on Intellectual Property. Procedure for grants of patents, Patenting under PCT.
UNIT 4:

--- Content provided by FirstRanker.com ---

Patent Rights: Scope of Patent Rights. Licensing and transfer of technology. Patent information and
databases. Geographical Indications.
UNIT 5:
New Developments in IPR: Administration of Patent System. New developments in IPR; IPR of
Biological Systems, Computer Software etc. Traditional knowledge Case Studies, IPR and IITs.

--- Content provided by FirstRanker.com ---

REFERENCES:

(1) Stuart Melville and Wayne Goddard, "Research methodology: an introduction for science &
engineering students'"
(2) Wayne Goddard and Stuart Melville, "Research Methodology: An Introduction"
(3) Ranjit Kumar, 2nd Edition, "Research Methodology: A Step by Step Guide for beginners"

--- Content provided by FirstRanker.com ---

(4) Halbert, "Resisting Intellectual Property", Taylor & Francis Ltd ,2007.
(5) Mayall, "Industrial Design", McGraw Hill, 1992.
(6) Niebel, "Product Design", McGraw Hill, 1974.
(7) Asimov, "Introduction to Design", Prentice Hall, 1962.
(8) (8) Robert P. Merges, Peter S. Menell, Mark A. Lemley, " Intellectual Property in New

--- Content provided by FirstRanker.com ---

Technological Age", 2016.
(9) T. Ramappa, "Intellectual Property Rights Under WTO", S. Chand, 2008


L
T

--- Content provided by FirstRanker.com ---

P
C
I Year - I Semester

0

--- Content provided by FirstRanker.com ---

0
4
2
Advanced Data Structures Lab (MTCS1106)

--- Content provided by FirstRanker.com ---

Course Objectives:
Students will try:
? Understand and remember algorithms and its analysis procedure.
? Introduce the concept of data structures through ADT including List, Stack, Queues.
? To design and implement various data structure algorithms.

--- Content provided by FirstRanker.com ---

? To introduce various techniques for representation of the data in the real world.
? To develop application using data structure algorithms.
? Compute the complexity of various algorithms.

Course Outcomes:

--- Content provided by FirstRanker.com ---

?
Develop solutions for a range of problems using object oriented programming.
?
Implement complex problems using advanced data structures (like arrays, stacks, queues, linked
lists, graph and trees.).

--- Content provided by FirstRanker.com ---

?
Implement operations like searching, insertion, and deletion, traversing mechanism etc. on various
data structures.
?
Incorporate data structures into the applications such as binary search trees, AVL and B Trees

--- Content provided by FirstRanker.com ---

List of Experiments
Experiment 1:
Write a program to implement Polynomial additions using Arrays.

Experiment 2:

--- Content provided by FirstRanker.com ---

Write a program to implement Polynomial additions using linked lists.

Experiment 3:
Write a program to implement Multi Stack ADT using Arrays with the basic operations as Create(),
IsEmpty(), Push(), Pop(), IsFull() with appropriate prototype to a functions.

--- Content provided by FirstRanker.com ---


Experiment 4:
Write a program to implement Queue ADT using Linked list with the basic functions of Create(),
IsEmpty(), Insert(), Delete() and IsFull() with suitable prototype to a functions.

--- Content provided by FirstRanker.com ---

Experiment 5:
Write a program to transfer data from stack to queue.

Experiment 6:
Write a program to implement the following ADT using Linked list with the basic functions of Create(),

--- Content provided by FirstRanker.com ---

IsEmpty(), Insert(), Delete() and IsFull() with suitable prototype to a functions.
i) Double Ended Queue (Dequeues)
ii) Circular Queues

Experiment 7:

--- Content provided by FirstRanker.com ---

Write a program to generate the binary tree from the given inorder, preorder and postorder traversal.

Experiment 8:
Write a program to implement insertion, deletion and display operation in Min-Max Heap for the given
data as integers.

--- Content provided by FirstRanker.com ---


Experiment 9:
Write a program for Binary Search Tree to implement following operations:
a) Insertion
b) Deletion
i.

--- Content provided by FirstRanker.com ---

Delete node with only child
ii.
Delete node with both children
c) Finding an element
d) Finding Min element

--- Content provided by FirstRanker.com ---

e) Finding Max element
f) Left child of the given node
g) Right child of the given node
h) Finding the number of nodes, leaves nodes, full nodes, ancestors, descendants

--- Content provided by FirstRanker.com ---

Experiment 10:
Write a program to implement BFS and DFS for a Graph.
Experiment 11:
Write a program to implement to generate a min-cost spanning tree
a) Krushkal's algorithm

--- Content provided by FirstRanker.com ---

b) Prims algorithm

Experiment 12:
Write a program to store k keys into an array of size n at the location computed using a hash function, loc
= key % n, where k<=n and k takes values from [1 to m], m>n. To handle the collisions use the following

--- Content provided by FirstRanker.com ---

collision resolution techniques,
a) Linear probing
b) Quadratic probing
c) Double hashing/rehashing
Experiment 13:

--- Content provided by FirstRanker.com ---

Write a program for AVL Tree to implement following operations:
(For nodes as integers)
a) Insertion: Test program for all cases (LL, RR, RL, LR rotation)
b) Deletion: Test Program for all cases (R0, R1, R-1, L0, L1, L-1)
c) Display: using set notation

--- Content provided by FirstRanker.com ---


Experiment 14:
Write a program to generate the B-tree of order 2-3 for a given list of integers.

Experiment 15:

--- Content provided by FirstRanker.com ---

Write a program to perform string matching using Boyer-Moore algorithm.

L
T
P

--- Content provided by FirstRanker.com ---

C
I Year - I Semester

0
0

--- Content provided by FirstRanker.com ---

4
2
Advanced Computing Lab-1
Note: Lab programs based on elective taken by student may be offered.

--- Content provided by FirstRanker.com ---

ADVANCED OPERATING SYSTEMS

Course Outcomes:

? Implement deadlock avoidance and detection algorithms in a distributed environment.
? Implement efficient clock synchronization and election algorithms.

--- Content provided by FirstRanker.com ---

? Describe Client server architecture.


Experiment 1:
Write a program to implement Deadlocks through Simulation.
Experiment 2:

--- Content provided by FirstRanker.com ---

Write Case Study of 3 tier client server architecture.
Experiment 3:
Write Case study on Client and RMI Server.
Experiment 4:
Write a program to implement any one Election algorithms.

--- Content provided by FirstRanker.com ---

Experiment 5:
Write a program to show the software simulation for Clock Synchronization in Distributed System using
Lamport's Algorithm.
Experiment 6:
Write a program to implement Banker's Algorithm for avoiding Deadlock.

--- Content provided by FirstRanker.com ---

PARALLEL COMPUTING
Course Outcomes:
? Develop an efficient parallel algorithm to solve it.
? Implement parallel algorithm using MPI, OpenMP, pthreads, or a combination of MPI and
OpenMP.

--- Content provided by FirstRanker.com ---

Experiment 1:
Write a parallel program that computes the sum 1+2+------+ in the following manner. Each process I
assigns the value i+1 to an integer, and then the processes perform a sum reduction. As a way of double-
checking the result, process 0 should also compute and print the value p(p+1)/2.

--- Content provided by FirstRanker.com ---




Experiment 2:

A print number is a positive integer evenly divisible by exactly two positive integers: itself and .The first
five prime numbers are 2,3,5,7 and 11. Sometimes two consecutive odd numbers are both prime. For

--- Content provided by FirstRanker.com ---

example, the odd integers following 3,5 and 11 are all prime numbers. However, the odd integer
following 7 is not a prime number. Write a parallel program to determine, for all integers less then
1,000,000, the number of times that two consecutive odd integers are both prime.
Experiment 3:
Write a program implementing the parallel matrix multiplication algorithm.

--- Content provided by FirstRanker.com ---

Experiment 4:
Write a MPI program implementing consecutive gradient.

Experiment 5:

Write a MPI program to implementing Quick sort.

--- Content provided by FirstRanker.com ---





L
T

--- Content provided by FirstRanker.com ---

P
C
I Year - I Semester

0

--- Content provided by FirstRanker.com ---

0
4
2
Advanced Computing Lab-1
ADVANCED COMPUTER NETWORKS

--- Content provided by FirstRanker.com ---


Course Outcomes:

? Implements various routing protocols
? Implement sub netting and addressing IP
? Implement emerging trends and security issues in computer Networks

--- Content provided by FirstRanker.com ---


Experiment 1:
Configuration of IP addressing for a given scenario for a given set of topologies.

Experiment 2:

--- Content provided by FirstRanker.com ---

Configure a DHCP Server to serve contiguous IP addresses to a pool of four IP devices with a default
gateway and a default DNS address. Integrate the DHCP server with a BOOTP demon to automatically
serve Windows and Linux OS Binaries based on client MAC address.
Experiment 3:
Configure, implement and debug the following: Use open source tools for

--- Content provided by FirstRanker.com ---

debugging and diagnostics.
a) ARP/RARP protocols
b) RIP routing protocols
c) BGP routing
d) OSPF routing protocols

--- Content provided by FirstRanker.com ---

e) Static routes (check using netstat)

OBJECT ORIENTED SOFTWARE ENGINEERING

Course Outcome:

--- Content provided by FirstRanker.com ---

? Design and Plan software solutions to problems using an object-oriented strategy.
? Able to Model the object oriented software systems using Unified Modeling Language (UML)

Experiments 1:
Do the following for the given project

--- Content provided by FirstRanker.com ---

a) Write the problem statement, Software Requirement Specification, entity relationship diagram,
b) dataflow diagrams for level 0 and level 1,
c) Draw use-case diagram
d) Draw the activity diagram of all use cases.
e) Draw sequence diagram of all use cases

--- Content provided by FirstRanker.com ---

f) Draw collaboration diagram of all use cases, and Assign objects in Sequence diagram to
classes and make class diagrams




--- Content provided by FirstRanker.com ---

Project 1:
A payroll application is to be developed which is required to perform the following functions:
i) It must provide a user in employee mode with the details of an employee, which includes his
name, department, date of joining and salary.
ii) It must validate an user to enter in administrator mode using password. It must provide a user to

--- Content provided by FirstRanker.com ---

enter in administrator mode to view or modify an employee's details using his employee ID. It
must also allow the user to add a new employee and generate the payroll.
Project 2:
Develop an automated banking system, which is required to perform the following functions:
i) The customer logs into the system using card number and pin number. The system checks for

--- Content provided by FirstRanker.com ---

validation.
ii) The system queries the customer for the type of account either fixed deposit or credit account.
After getting the type of account the system shows the balance left.
iii) The system queries the customer for the transaction type either withdrawal or deposit and the
required amount. The user enters the amount and the transaction if carries out

--- Content provided by FirstRanker.com ---


L
T
P
C
I Year - II Semester

--- Content provided by FirstRanker.com ---


3
0
0
3

--- Content provided by FirstRanker.com ---

Advanced Algorithms
COURSE OBJECTIVE
? Introduce students to the advanced methods of designing and analyzing algorithms.
? The student should be able to choose appropriate algorithms and use it for a specific problem.
? To familiarize students with basic paradigms and data structures used to solve advanced

--- Content provided by FirstRanker.com ---

algorithmic problems.
? Students should be able to understand different classes of problems concerning their computation
difficulties.
? To introduce the students to recent developments in the area of algorithmic design.
COURSE OUTCOMES

--- Content provided by FirstRanker.com ---

After completion of course, students would be able to:
? Analyze the complexity/performance of different algorithms.
? Determine the appropriate data structure for solving a particular set of problems.
? Categorize the different problems in various classes according to their complexity.
? Students should have an insight of recent activities in the field of the advanced data structure.

--- Content provided by FirstRanker.com ---

Syllabus:
UNIT I: Sorting:
Review of various sorting algorithms, topological sorting Graph: Definitions and
Elementary Algorithms: Shortest path by BFS, shortest path in edge-weighted case (Dijkasra's), depth-
first search and computation of strongly connected components, emphasis on correctness proof of the
algorithm and time/space analysis, example of amortized analysis.

--- Content provided by FirstRanker.com ---

UNIT II: Matroids: Introduction to greedy paradigm, algorithm to compute a maximum weight maximal
independent set. Application to MST. Graph Matching: Algorithm to compute maximum matching.
Characterization of maximum matching by augmenting paths, Edmond's Blossom algorithm to compute
augmenting path.
UNIT III: Flow-Networks: Maxflow-mincut theorem, Ford-Fulkerson Method to compute maximum

--- Content provided by FirstRanker.com ---

flow, Edmond-Karp maximum-flow algorithm.
Matrix Computations:
Strassen's algorithm and introduction to divide and conquer paradigm, inverse of
a triangular matrix, relation between the time complexities of basic matrix operations, LUP-
decomposition.
UNIT IV: Shortest Path in Graphs: Floyd-Warshall algorithm and introduction to dynamic

--- Content provided by FirstRanker.com ---

programming paradigm. More examples of dynamic programming. Modulo Representation of
integers/polynomials:
Chinese Remainder Theorem, Conversion between base-representation and
modulo-representation. Extension to polynomials. Application: Interpolation problem.
Discrete Fourier Transform (DFT): In complex field, DFT in modulo ring. Fast Fourier Transform
algorithm. Schonhage-Strassen Integer Multiplication algorithm

--- Content provided by FirstRanker.com ---

UNIT V:Linear Programming: Geometry of the feasibility region and Simplex algorithm. NP-
completeness:
Examples, proof of NP-hardness and NP-completeness. One or more of the following
topics based on time and interest Approximation algorithms, Randomized Algorithms, Interior Point
Method,Advanced Number Theoretic AlgorithmRecent Trands in problem solving paradigms using
recent searching and sorting techniques by applying recently proposed data structures.

--- Content provided by FirstRanker.com ---

Text Books:

1. "Introduction to Algorithms",3rd Edition, by Cormen, Leiserson, Rivest, Stein, PHP,
2017.
2. "The Design and Analysis of Computer Algorithms" 1st edition by Aho, Hopcroft, Ullman,pearson,1974.
3."Algorithms " Robert Sedgewick, Addison wisely publications,1983

--- Content provided by FirstRanker.com ---

Reference Books:
1."Algorithm Design"1st Edition by Kleinberg and Tardos, Pearson 2013.


L
T

--- Content provided by FirstRanker.com ---

P
C
I Year - II Semester

3

--- Content provided by FirstRanker.com ---

0
0
3
Data Science through Python Programming
Course Objective:

--- Content provided by FirstRanker.com ---

? Provide you with the knowledge and expertise to become a proficient data scientist.
? Demonstrate an understanding of statistics and machine learning concepts that are vital for data
science.
? Produce Python code to statistically analyze a dataset.
? Critically evaluate data visualizations based on their design and use for communicating stories from

--- Content provided by FirstRanker.com ---

data.

Course Outcomes:
After the completion of the course, student will be able to
? Explain how data is collected, managed and stored for data science.

--- Content provided by FirstRanker.com ---

? Understand the key concepts in data science, including their real-world applications and the toolkit
used by data scientists.
? Implement data collection and management scripts using Python Pandas.
Syllabus:
UNIT I:
PYTHON Basics and Programming Concepts: Introducing Python, Types and Operations -

--- Content provided by FirstRanker.com ---

Numbers, Strings, Lists, Tuples, Dictionaries, Files, Numeric Types, Dynamic Typing; Statements and
Syntax - Assignments, Expressions, Statements, Loops, iterations, comprehensions; Functions - Function
Basics, Scopes, Arguments, Advanced Functions; Modules - Module Coding Basics, Module Packages,
Advanced Module Topics; Classes and OOP - Class, Operator Overloading, Class Designing; Exceptions
and Tools - Exception Basics, Exception Coding Details, Exception Objects, Designing With Exceptions,

--- Content provided by FirstRanker.com ---

Parallel System Tools
UNIT II: GUI Programming: Graphical User Interface - Python gui development options, Adding
Widgets, GUI Coding Techniques, Customizing Widgets; Internet Programming - Network Scripting,
Client-Side scripting, Pymailgui client, server-side scripting, Pymailcgi server; Tools and Techniques -
databases and persistence, data structures, text and language, python/c integration

--- Content provided by FirstRanker.com ---

UNIT III: Pandas and NumPy: Numpy Basics - Fast Element wise array functions, Multidimensional
Array, Data Processing using arrays, file i/o with arrays; Pandas - Data Structures, Essential
Functionality, Summarizing and Computing Descriptive Statistics, Handling Missing Data, Hierarchical
Indexing

--- Content provided by FirstRanker.com ---

UNIT IV: Data Preprocessing:
Data Loading, Storage, and FileFormats - Reading and Writing data in
text format, binary data formats, interacting with html and web apis, interacting with databases; Data
Wrangling: Clean, Transform, Merge, Reshape - Combining and Merging Data Sets, Reshaping and
Pivoting, Data Transformation, String Manipulation; Data Aggregation and Group Operations ? Group by
Mechanics, Data Aggregation, Groupby Operations and and Transformations, Pivot Tables and Cross-

--- Content provided by FirstRanker.com ---

Tabulation





--- Content provided by FirstRanker.com ---

UNIT V: Data Visualization:
A Brief matplotlib API Primer, Plotting Functions in pandas, Time Series,
Financial and Economic Data Applications
Text Books:
1. Learning Python , OReilly, Mark Lutz
2. Programming Python, OReilly, Mark Lutz

--- Content provided by FirstRanker.com ---

3. Python For Data Analysis ( O Reilly, Wes Mckinney)
Reference Text Books:
1. Python: The Complete Reference, Martin C. Brown, McGraw Hill Education
2. Head First Python, Paul Barry, OReilly

--- Content provided by FirstRanker.com ---


L
T
P
C
I Year - II Semester

--- Content provided by FirstRanker.com ---


3
0
0
3

--- Content provided by FirstRanker.com ---

Machine Learning
Course Objectives:
Machine Learning course will
? Develop an appreciation for what is involved in learning from data.
? Demonstrate a wide variety of learning algorithms.

--- Content provided by FirstRanker.com ---

? Demonstrate how to apply a variety of learning algorithms to data.
? Demonstrate how to perform evaluation of learning algorithms and model selection.

Course Outcomes:
After the completion of the course, student will be able to

--- Content provided by FirstRanker.com ---

Domain Knowledge for Productive use of Machine Learning and Diversity of Data.
Demonstrate on Supervised and Computational Learning
Analyze on Statistics in learning techniques and Logistic Regression
Illustrate on Support Vector Machines and Perceptron Algorithm
Design a Multilayer Perceptron Networks and classification of decision tree

--- Content provided by FirstRanker.com ---

UNIT-I: Introduction-Towards Intelligent Machines, Well posed Problems, Example of Applications in
diverse fields, Data Representation, Domain Knowledge for Productive use of Machine Learning,
Diversity of Data: Structured / Unstructured, Forms of Learning, Machine Learning and Data Mining,
Basic Linear Algebra in Machine Learning Techniques.
UNIT-II: Supervised Learning- Rationale and Basics: Learning from Observations, Bias and Why

--- Content provided by FirstRanker.com ---

Learning Works: Computational Learning Theory, Occam's Razor Principle and Overfitting Avoidance
Heuristic Search in inductive Learning, Estimating Generalization Errors, Metrics for assessing
regression, Metris for assessing classification.
UNIT-III: Statistical Learning- Machine Learning and Inferential Statistical Analysis, Descriptive
Statistics in learning techniques, Bayesian Reasoning: A probabilistic approach to inference, K-Nearest

--- Content provided by FirstRanker.com ---

Neighbor Classifier. Discriminant functions and regression functions, Linear Regression with Least
Square Error Criterion, Logistic Regression for Classification Tasks, Fisher's Linear Discriminant and
Thresholding for Classification, Minimum Description Length Principle.
UNIT-IV: Support Vector Machines (SVM)- Introduction, Linear Discriminant Functions for Binary
Classification, Perceptron Algorithm, Large Margin Classifier for linearly seperable data, Linear Soft

--- Content provided by FirstRanker.com ---

Margin Classifier for Overlapping Classes, Kernel Induced Feature Spaces, Nonlinear Classifier,
Regression by Support vector Machines.
Learning with Neural Networks: Towards Cognitive Machine, Neuron Models, Network Architectures,
Perceptrons, Linear neuron and the Widrow-Hoff Learning Rule, The error correction delta rule.
UNIT -V: Multilayer Perceptron Networks and error back propagation algorithm, Radial Basis Functions

--- Content provided by FirstRanker.com ---

Networks. Decision Tree Learning: Introduction, Example of classification decision tree, measures of
impurity for evaluating splits in decision trees, ID3, C4.5, and CART decision trees, pruning the tree,
strengths and weakness of decision tree approach.
Textbooks:
1. Applied Machine Learning,1e, M.Gopal, Mc Graw Hill Education, 2018

--- Content provided by FirstRanker.com ---

Reference Books
1. Kevin Murphy, Machine Learning: A Probabilistic Perspective, MIT Press, 2012
2. Trevor Hastie, Robert Tibshirani, Jerome Friedman, The Elements of Statistical Learning, Springer 2009
(freely available online)
3. Christopher Bishop, Pattern Recognition and Machine Learning, Springer, 2007.

--- Content provided by FirstRanker.com ---


L
T
P
C
I Year - II Semester

--- Content provided by FirstRanker.com ---


3
0
0
3

--- Content provided by FirstRanker.com ---

Ad Hoc & Sensor Networks

Course Objectives:

? Acquire the knowledge of various techniques in mobile networks/Adhoc networks and sensor based
networks.

--- Content provided by FirstRanker.com ---

? The objective of this course is to facilitate the understanding of Infrastructure less networks and their
importance in the future directions for wireless communications

Course Outcomes:
? Explain the Fundamental Concepts and applications of ad hoc and wireless sensor networks

--- Content provided by FirstRanker.com ---

? Describe the MAC protocol issues of ad hoc networks
? Describe routing protocols for ad hoc wireless networks with respect to TCP design issues
? Explain the concepts of network architecture and MAC layer protocol for WSN
? Discuss the WSN routing issues by considering QoS measurements
UNIT I: Introduction : Fundamentals of Wireless Communication Technology, The Electromagnetic

--- Content provided by FirstRanker.com ---

Spectrum, Radio propagation Mechanisms ,Characteristics of the Wireless channel mobile ad hoc
networks (MANETs), Wireless Sensor Networks (WSNs): concepts and architectures, Applications of
Ad Hoc and Sensor Networks, Design Challenges in Ad hoc and Sensor Networks.
UNIT II: MAC Protocols For Ad Hoc Wireless Networks: Issues in designing a MAC Protocol,
Issues in Designing a MAC Protocol for Ad Hoc Wireless Networks, Design Goals of a MAC Protocol

--- Content provided by FirstRanker.com ---

for Ad Hoc Wireless Networks, Classification of MAC Protocols, Contention based protocols, Contention
based protocols with Reservation Mechanisms, Contention based protocols with Scheduling Mechanisms,
Multi channel MAC - IEEE 802.11.
UNIT III: Routing Protocols And Transport Layer In Ad Hoc Wireless Networks
: Routing Protocol:
Issues in designing a routing protocol for Ad hoc networks, Classification, proactive routing, reactive

--- Content provided by FirstRanker.com ---

routing (on-demand), hybrid routing, Transport Layer protocol for Ad hoc networks, Design Goals of a
Transport Layer Protocol for Ad Hoc Wireless Networks, Classification of Transport Layer solutions-
TCP over Ad hoc wireless, Network Security, Security in Ad Hoc Wireless Networks, Network Security
Requirements.
UNIT IV: Wireless Sensor Networks (WSNS) And Mac Protocols: Single node architecture -

--- Content provided by FirstRanker.com ---

hardware and software components of a sensor node, WSN Network architecture: typical network
architectures, data relaying and aggregation strategies, MAC layer protocols: self-organizing, Hybrid
TDMA/FDMA and CSMA based MAC -IEEE 802.15.4.

UNIT V: WSN Routing, Localization & Qos:
Issues in WSN routing, OLSR, Localization, Indoor and

--- Content provided by FirstRanker.com ---

Sensor Network Localization, absolute and relative localization, triangulation, QOS in WSN, Energy
Efficient Design, Synchronization.




--- Content provided by FirstRanker.com ---

Text Books:
1. "Ad Hoc Wireless Networks: Architectures and Protocols ", C. Siva Ram Murthy, and B. S. Manoj,
Pearson Education, 2008
2. "Wireless Adhoc and Sensor Networks", Labiod. H, Wiley, 1st edition-2008
3. "Wireless ad -hoc and sensor Networks: theory and applications", Li, X, Cambridge University Press,

--- Content provided by FirstRanker.com ---

fifth edition-2008.
Reference Books:
4. "Ad Hoc & Sensor Networks: Theory and Applications", 2nd edition, Carlos De MoraisCordeiro,
Dharma Prakash Agrawal ,World Scientific Publishing Company, 2011
5. "Wireless Sensor Networks", Feng Zhao and LeonidesGuibas,Elsevier Publication 2nd edition-2004

--- Content provided by FirstRanker.com ---

6. "Protocols and Architectures for Wireless Sensor Networks", Holger Karl and Andreas Willig,Wiley,
2005 (soft copy available)
7. "Wireless Sensor Networks Technology, Protocols, and Applications", KazemSohraby, Daniel
Minoli, &TaiebZnati, John Wiley, 2007. (soft copy available)

L

--- Content provided by FirstRanker.com ---

T
P
C
I Year - II Semester

--- Content provided by FirstRanker.com ---

3
0
0
3
Internet of Things

--- Content provided by FirstRanker.com ---


Course Objectives:
? To Understand Smart Objects and IoT Architectures.
? To learn about various IOT-related protocols
? To build simple IoT Systems using Arduino and Raspberry Pi.

--- Content provided by FirstRanker.com ---

? To understand data analytics and cloud in the context of IoT
? To develop IoT infrastructure for popular applications.
Course Outcomes:
After the completion of the course, student will be able to
? Summarize on the term 'internet of things' in different contexts.

--- Content provided by FirstRanker.com ---

? Analyze various protocols for IoT.
? Design a PoC of an IoT system using Rasperry Pi/Arduino
? Apply data analytics and use cloud offerings related to IoT.
? Analyze applications of IoT in real time scenario
UNIT I:

--- Content provided by FirstRanker.com ---

FUNDAMENTALS OF IoT:
Evolution of Internet of Things, Enabling Technologies, IoT
Architectures,oneM2M, IoT World Forum ( IoTWF ) and Alternative IoT models, Simplified IoT Architecture and
Core IoT Functional Stack, Fog, Edge and Cloud in IoT, Functional blocks of an IoT ecosystem, Sensors,
Actuators, Smart Objects and Connecting Smart Objects

--- Content provided by FirstRanker.com ---

UNIT II:
IoT PROTOCOLS:
IT Access Technologies: Physical and MAC layers, topology and Security of IEEE 802.15.4,
802.15.4g, 802.15.4e, 1901.2a, 802.11ah and Lora WAN, Network Layer: IP versions, Constrained Nodes and
Constrained Networks, Optimizing IP for IoT: From 6LoWPAN to 6Lo, Routing over Low Power and Lossy
Networks, Application Transport Methods: Supervisory Control and Data Acquisition, Application Layer

--- Content provided by FirstRanker.com ---

Protocols: CoAP and MQTT. Bluetooth Smart Connectivity-Overview, Key Versions, BLE-Bluetooth Low Energy
Protocol, Low Energy Architecture.

UNIT III:
DESIGN AND DEVELOPMENT:
Design Methodology, Embedded computing logic, Microcontroller, System

--- Content provided by FirstRanker.com ---

on Chips, IoT system building blocks, Arduino, Board details, IDE programming, Raspberry Pi, Interfaces and
Raspberry Pi with Python Programming.

UNIT IV:
Arm Based Embedded System Design:
ARM Cortex-A class processor, Embedded Devices-ARM Cortex-M

--- Content provided by FirstRanker.com ---

Class processor, Networking-Bluetooth Smart Technology

Introduction to embedded systems
: CPUs vs MCU's vs Embedded Systems, Examples, Options for Building
Embedded Systems, Features of Embedded Systems, Building Embedded Systems, Building Embedded Systems
using MCUs, Introduction to mbedTM Platform

--- Content provided by FirstRanker.com ---


UNIT V:
CASE STUDIES/INDUSTRIAL APPLICATIONS:
Cisco IoT system, IBM Watson IoT platform,
Manufacturing, Converged Plant wide Ethernet Model (CPwE), Power Utility Industry, Grid Blocks Reference
Model, Smart and Connected Cities: Layered architecture, Smart Lighting, Smart Parking Architecture and Smart

--- Content provided by FirstRanker.com ---

Traffic Control.

Text Books:

1. IoT Fundamentals: Networking Technologies, Protocols and Use Cases for Internet of Things, David Hanes,
Gonzalo Salgueiro, Patrick Grossetete, Rob Barton and Jerome Henry, Cisco Press, 2017

--- Content provided by FirstRanker.com ---

2. The Definative Guide to ARM Cortex-MR3 and M4 Processor, 3rd Edition, Joseph Yiu
Reference Books:
1. Internet of Things ? A hands-on approach, Arshdeep Bahga, Vijay Madisetti, Universities Press, 2015

2. The Internet of Things ? Key applications and Protocols, Olivier Hersent, David Boswarthick, Omar Elloumi and
Wiley, 2012 (for Unit 2).

--- Content provided by FirstRanker.com ---

2. "From Machine-to-Machine to the Internet of Things ? Introduction to a New Age of Intelligence", Jan Ho? ller,
Vlasios Tsiatsis, Catherine Mulligan, Stamatis, Karnouskos, Stefan Avesand. David Boyle and Elsevier, 2014.
3. Architecting the Internet of Things, Dieter Uckelmann, Mark Harrison, Michahelles and Florian (Eds),
Springer, 2011.
4. Recipes to Begin, Expand, and Enhance Your Projects, 2nd Edition, Michael Margolis, Arduino Cookbook and

--- Content provided by FirstRanker.com ---

O'Reilly Media, 2011.
5. Cortex?A
series
Programmer's
Guide

--- Content provided by FirstRanker.com ---

for
ARMv7-A
by
Arm
http://infocenter.arm.com/help/index.jsp?topic=/com.arm.doc.den0013d/index.htmlc

--- Content provided by FirstRanker.com ---


L
T
P
C
I Year - II Semester

--- Content provided by FirstRanker.com ---


3
0
0
3

--- Content provided by FirstRanker.com ---

Cryptography and Network Security
Course Objectives:
From the course the student will learn
? To explore the working principles and utilities of various cryptographic algorithms including
secret key cryptography, hashes.

--- Content provided by FirstRanker.com ---

? To explore message digests, public key algorithms, design issues.
? To explore working principles of various authentication protocols.
? To explore various secure communication standards including Kerberos, IPsec, and SSL/TLS.

Course Outcomes (COs)
:

--- Content provided by FirstRanker.com ---

? Explain different security threats and countermeasures and foundation course of cryptography
mathematics.
? Classify the basic principles of symmetric key algorithms and operations of some symmetric key
algorithms and asymmetric key cryptography.
? Revise the basic principles of Public key algorithms and Working operations of some Asymmetric

--- Content provided by FirstRanker.com ---

key algorithms such as RSA, ECC and some more.
? Design applications of hash algorithms, digital signatures and key management techniques.
? Determine the knowledge of Application layer, Transport layer and Network layer security
Protocols such as PGP, S/MIME, SSL,TSL, and IPsec.
UNIT-I: Basic Principles- Security Goals, Cryptographic Attacks, Services and Mechanisms,

--- Content provided by FirstRanker.com ---

Mathematics of Cryptography- Integer Arithmetic, Modular Arithmetic, Matrices Linear Congruence,
Algebraic Structures, GF(2n) Fields, Symmetric Encryption- Mathematics of Symmetric Key
Cryptography- Primes, Primality Testing, Factorization, Chinese Remainder Theorem, Quadratic
Congruence, Exponentiation and Logarithm, Introduction to Modern Symmetric Key Ciphers, Data
Encryption Standard, Advanced Encryption Standard.

--- Content provided by FirstRanker.com ---


UNIT-II: Asymmetric Encryption-
Mathematics of Asymmetric Key Cryptography, Asymmetric Key
Cryptography- Introduction, RSA Cryptosystem, RABIN Cryptosystem, ELGAMAL Cryptosystem,
Elliptic Curve Cryptosystems.

--- Content provided by FirstRanker.com ---

UNIT-III: Data Integrity, Digital Signature Schemes & Key Management-
Message Integrity and
Message Authentication, Cryptographic Hash Functions, Digital Signature, Key Management.

UNIT-IV: Network Security-I-
Security at application layer: PGP and S/MIME, Security at the
Transport Layer: SSL and TLS, Network Security-II- Security at the Network Layer: IPSec, System

--- Content provided by FirstRanker.com ---

Security, Security at Transport Layer- SSL and TLS.
UNIT-V:
Abstract Models for BLOCKCHAIN, GARAY model, RLA Model, Proof of Work (PoW) as
random oracle, formal treatment of consistency, liveness and fairness, Proof of Stake ( PoS) based
Chains, Hybrid models ( PoW + PoS). Bitcoin, Wallet, Blocks, Merkley Tree, hardness of mining,
transaction verifiability, anonymity, forks, double spending, mathematical analysis of properties of

--- Content provided by FirstRanker.com ---

Bitcoin.
Text Books:
1. Cryptography and Network Security, 3rd Edition, Behrouz A Forouzan, Deb deep Mukhopadhyay,
McGraw Hill
2. Cryptography and Network Security,6th Edition, William Stallings, Pearson

--- Content provided by FirstRanker.com ---

3. Bitcoin and cryptocurrency technologies: A comprehensive introduction, Arvind Narayanan, Joseph
Bonneau, Edward Felten, Andrew Miller, and Steven Goldfeder, Princeton University Press, 2016
4. Everyday Cryptography, Keith M.Martin, Oxford

Reference Books:
1. Network Security and Cryptography, Bernard Meneges, Cengage Learning

--- Content provided by FirstRanker.com ---






--- Content provided by FirstRanker.com ---



L
T
P
C

--- Content provided by FirstRanker.com ---

I Year - II Semester

3
0
0

--- Content provided by FirstRanker.com ---

3
Cloud Computing

Course Objectives:

? To implement Virtualization

--- Content provided by FirstRanker.com ---

? To implement Task Scheduling algorithms.
? Apply Map-Reduce concept to applications.
? To build Private Cloud.
? Broadly educate to know the impact of engineering on legal and societal issues involved.

--- Content provided by FirstRanker.com ---

Course Outcomes
: At the end of the course, student will be able to
? Interpret the key dimensions of the challenge of Cloud Computing
? Examine the economics, financial, and technological implications for selecting cloud
computing for own organization.
? Assessing the financial, technological, and organizational capacity of employer's for actively

--- Content provided by FirstRanker.com ---

initiating and installing cloud-based applications
? Evaluate own organizations' needs for capacity building and training in cloud computing-
related IT areas.
? To Illustrate Virtualization for Data-Center Automation.
SYLLABUS:

--- Content provided by FirstRanker.com ---

UNIT I: Introduction:
Network centric computing, Network centric content, peer-to ?peer systems,
cloud computing delivery models and services, Ethical issues, Vulnerabilities, Major challenges for cloud
computing. Parallel and Distributed Systems: Introduction, architecture, distributed systems,
communication protocols, logical clocks, message delivery rules, concurrency, model concurrency with
Petri Nets.

--- Content provided by FirstRanker.com ---

UNIT II: Cloud Infrastructure:
At Amazon, The Google Perspective, Microsoft Windows Azure, Open
Source Software Platforms, Cloud storage diversity, Inter cloud, energy use and ecological impact,
responsibility sharing, user experience, Software licensing, Cloud Computing : Applications and
Paradigms: Challenges for cloud, existing cloud applications and new opportunities, architectural styles,
workflows, The Zookeeper, The Map Reduce Program model, HPC on cloud, biological research.

--- Content provided by FirstRanker.com ---


UNIT III: Cloud Resource virtualization:
Virtualization, layering and virtualization, virtual machine
monitors, virtual machines, virtualization- full and para, performance and security isolation, hardware
support for virtualization, Case Study: Xen, vBlades, Cloud Resource Management and Scheduling:
Policies and Mechanisms, Applications of control theory to task scheduling, Stability of a two-level

--- Content provided by FirstRanker.com ---

resource allocation architecture, feedback control based on dynamic thresholds, coordination, resource
bundling, scheduling algorithms, fair queuing, start time fair queuing, cloud scheduling subject to
deadlines, Scheduling Map Reduce applications, Resource management and dynamic application scaling.

UNIT IV: Storage Systems:
Evolution of storage technology, storage models, file systems and database,

--- Content provided by FirstRanker.com ---

distributed file systems, general parallel file systems. Google file system. Apache Hadoop, Big Table,
Megastore (text book 1), Amazon Simple Storage Service(S3) (Text book 2), Cloud Security: Cloud
security risks, security ? a top concern for cloud users, privacy and privacy impact assessment, trust, OS
security, Virtual machine security, Security risks.

--- Content provided by FirstRanker.com ---

UNIT V: Cloud Application Development:
Amazon Web Services : EC2 ? instances, connecting
clients, security rules, launching, usage of S3 in Java, Installing Simple Notification Service on Ubuntu
10.04, Installing Hadoop on Eclipse, Cloud based simulation of a Distributed trust algorithm, Cloud
service for adaptive data streaming ( Text Book 1), Google: Google App Engine, Google Web Toolkit
(Text Book 2), Microsoft: Azure Services Platform, Windows live, Exchange Online, Share Point

--- Content provided by FirstRanker.com ---

Services, Microsoft Dynamics CRM (Text Book 2).


Text Books:
1. Cloud Computing, Theory and Practice, Dan C Marinescu, MK Elsevier
2. Cloud Computing, A Practical Approach, Anthony T Velte, Toby J Velte, Robert Elsenpeter, TMH

--- Content provided by FirstRanker.com ---


Reference book:

1. Mastering Cloud Computing, Foundations and Application Programming, Raj Kumar Buyya, Christen
vecctiola, S Tammarai selvi, TMH

L

--- Content provided by FirstRanker.com ---

T
P
C
I Year - II Semester

--- Content provided by FirstRanker.com ---

3
0
0
3
Web Technologies

--- Content provided by FirstRanker.com ---

Course Objectives:
? The objective of this lab is to To develop an ability to design and implement static and dynamic
website
Course Outcomes:
? Design and implement dynamic websites with good aesthetic sense of designing and latest technical

--- Content provided by FirstRanker.com ---

know-how's
? Have a Good grounding of Web Application Terminologies, Internet Tools, E ? Commerce and
other web services
? Get introduced in the area of Online Game programming.
Syllabus:

--- Content provided by FirstRanker.com ---

UNIT-I: Java script-
The Basic of Java script: Objects, Primitives Operations and Expressions, Screen
Output and Keyboard Input, Control Statements, Object Creation and Modification, Arrays, Functions,
Constructors, Patttern Matching using Regular Expressions

UNIT-II: XML-
Document type Definition, XML schemas, Document object model, XSLT, DOM and

--- Content provided by FirstRanker.com ---

SAX Approaches, AJAX A New Approach: Introduction to AJAX, Integrating PHP and AJAX.
UNIT-III: PHP Programming- Introducing PHP: Creating PHP script, Running PHP script. Working
with variables and constants:
Using variables, Using constants, Data types, Operators. Controlling
program flow:
Conditional statements, Control statements, Arrays,functions.Working with forms and
Databases such as MySQL.

--- Content provided by FirstRanker.com ---


UNIT-IV:
PERL- Introduction to PERL, Operators and if statements, Program design and control
structures, Arrays, Hashs and File handling, Regular expressions, Subroutines, Retrieving documents
from the web with Perl.

--- Content provided by FirstRanker.com ---

UNIT-V:
RUBY: Introduction to Ruby, Variables, types, simple I/O, Control, Arrays, Hashes, Methods,
Classes, Iterators, Pattern Matching. Overview of Rails.

TEXT BOOKS:
1. Programming the World Wide Web, Robet W Sebesta, 7ed, Pearson.

--- Content provided by FirstRanker.com ---

2. Web Technologies, Uttam K Roy, Oxford
Reference Book:
1. The Web Warrior Guide to Web Programming, Bai, Ekedahl, Farrelll, Gosselin, Zak, Karparhi,
Maclntyre, Morrissey, Cengage
2. Programming world wide web-Sebesta, Pearson Education ,2007.

--- Content provided by FirstRanker.com ---

Core SERVLETS ANDJAVASERVER PAGES VOLUME 1: CORE TECHNOLOGIES By Marty Hall
and Larry Brown Pearson Internet and World Wide Web ? How to program by Dietel and Nieto
PHI/Pearson Education Asia.


L

--- Content provided by FirstRanker.com ---

T
P
C
I Year - II Semester

--- Content provided by FirstRanker.com ---

0
0
4
2
Advanced algorithms Lab

--- Content provided by FirstRanker.com ---

Course Objectives:
From the course the student will learn
? Knowing about oops concepts for a specific problem.
? Various advanced data structures concepts like arrays, stacks, queues, linked lists, graphs and trees.

--- Content provided by FirstRanker.com ---

Course Outcomes
:
? Identify classes, objects, members of a class and relationships among them needed for a specific
problem.
? Examine algorithms performance using Prior analysis and asymptotic notations.
? Organize and apply to solve the complex problems using advanced data structures (like arrays,

--- Content provided by FirstRanker.com ---

stacks, queues, linked lists, graphs and trees.)
? Apply and analyze functions of Dictionary

List of Experiments
Experiment 1:

--- Content provided by FirstRanker.com ---

Write a java program to implement Multi stacks.

Experiment 2:
Write a java program to implement Double Ended Queue (Dequeues) & Circular Queues.
Experiment 3:

--- Content provided by FirstRanker.com ---

Write a java program to implement various Recursive operations on Binary Search Tree.
Experiment 4:
Write a java program to implement various Non-Recursive operations on Binary Search Tree.
Experiment 5:
Write a java program to implement BFS for a Graph

--- Content provided by FirstRanker.com ---

Experiment 6:
Write a java program implement DFS for a Graph.
Experiment 7:
Write a java program to implement Merge & Heap Sort of given elements.
Experiment 8:

--- Content provided by FirstRanker.com ---

Write a java program to implement Quick Sort of given elements.
Experiment 9:
Write a java program to implement various operations on AVL trees.
Experiment 10:
Write a java program to implement B: Tree operations.

--- Content provided by FirstRanker.com ---

Experiment 11:
Write a java program to implementation of Binary trees and Traversals (DFT, BFT)
Experiment 12:


Write a java program to implement Krushkal's algorithm to generate a min-cost spanning tree.
Experiment 13:

--- Content provided by FirstRanker.com ---

Write a java program to implement Prim's algorithm to generate a min-cost spanning tree.
Experiment 14:
Write a java program to implement functions of Dictionary using Hashing.



--- Content provided by FirstRanker.com ---


L
T
P
C

--- Content provided by FirstRanker.com ---

I Year - II Semester

0
0
4

--- Content provided by FirstRanker.com ---

2
Advanced Computing Lab-2

List of Experiments
Machine Learning Lab

--- Content provided by FirstRanker.com ---

Course Objectives:

? Identify problems that are amenable to solution by AI methods, and which AI methods may be suited to
solving a given problem.
? Formalize a given problem in the language/framework of different AI methods (e.g., as a search problem, as
a constraint satisfaction problem, as a planning problem, as a Markov decision process, etc).

--- Content provided by FirstRanker.com ---

? Implement basic AI algorithms (e.g., standard search algorithms or dynamic programming).
? Design and carry out an empirical evaluation of different algorithms on problem formalization, and state the
conclusions that the evaluation supports.

Course Outcomes:

--- Content provided by FirstRanker.com ---

After the completion of the course, student will be able to
? Explain the definition and usage of the term 'the internet of things' in different contexts.
? Demonstrate on various network protocols used in IoT.
? Analyze on various key wireless technologies used in IoT systems, such as WiFi, 6LoWPAN, Bluetooth and
ZigBee.

--- Content provided by FirstRanker.com ---

? Illustrate on the role of big data, cloud computing and data analytics in IoT system.
? Design a simple IoT system made up of sensors, wireless network connection, data analytics and
display/actuators, and write the necessary control software.

Experiment 1:

--- Content provided by FirstRanker.com ---

Write a program to demonstrate the working of the decision tree based ID3 algorithm. Use an
appropriate data set for building the decision tree and apply this knowledge to classify a new
sample.
Experiment 2:
Build an Artificial Neural Network by implementing the Back propagation algorithm and test the

--- Content provided by FirstRanker.com ---

same using appropriate data sets.
Experiment 3:
Write a program to implement the na?ve Bayesian classifier for Iris data set. Compute the accuracy
of the classifier, considering few test data sets.

--- Content provided by FirstRanker.com ---

Experiment 4:
Write a program to construct a Bayesian network considering medical data. Use this model to
demonstrate the diagnosis of heart patients using standard Heart Disease Data Set. You can use
Java/Python ML library classes/API.

--- Content provided by FirstRanker.com ---

Experiment 5:
Write a program to implement k-Nearest Neighbor algorithm to classify the iris data set. Print both
correct and wrong predictions.
Web Technologies lab
Course Objectives:

--- Content provided by FirstRanker.com ---

? The objective of this lab is to To develop an ability to design and implement static and dynamic website
Course Outcomes:
? Design and implement dynamic websites with good aesthetic sense of designing and latest technical
know-how's

? Have a Good grounding of Web Application Terminologies, Internet Tools, E ? Commerce and

--- Content provided by FirstRanker.com ---

other web services
? Get introduced in the area of Online Game programming.
Experiment 6:
Write a JavaScript programs on EventHandling
? Validation of registration form

--- Content provided by FirstRanker.com ---

? Open a window from the current window
? Change color of a back ground at each click of button or refresh of a page
? Display calendar for the month and year selected from combo box
? On Mouse over event
Experiment 7:

--- Content provided by FirstRanker.com ---

Write an XML file which will display the Book information which includes the following:
1) Title of the book
2) Author Name
3) ISBN number
4) Publisher name

--- Content provided by FirstRanker.com ---

5) Edition
6) Price
Write a Document Type Definition (DTD) to validate the above XML file.
Experiment 8:
Do the following Ruby programs:

--- Content provided by FirstRanker.com ---

? Write a Ruby program to read a number and calculates the factorial value of it and prints the same.
? Write a Ruby program which counts number of lines in a text file using its regular expressions facility.
? Write a Ruby program that uses iterator to find out the length of a string.
? Write Ruby program which uses Math module to find area of a triangle.
Experiment 9:

--- Content provided by FirstRanker.com ---

Do the following Perl programs
? Write a program which illustrates the use of associative arrays in perl.
? Write perl program takes a set names along the command line and prints whether they are regular files or
special files
Experiment 10:

--- Content provided by FirstRanker.com ---

Example PHP program for registering users of a website and login.
Cloud Computing Lab
Course Objectives:

? To implement Virtualization
? Apply Map-Reduce concept to applications.

--- Content provided by FirstRanker.com ---

? Broadly educate to know the impact of engineering on legal and societal issues involved.

Course Outcomes
: At the end of the course, student will be able to
? Assessing the financial, technological, and organizational capacity of employer's for actively
initiating and installing cloud-based applications

--- Content provided by FirstRanker.com ---

? Evaluate own organizations' needs for capacity building and training in cloud computing-related
IT areas.
? To Illustrate Virtualization for Data-Center Automation.
Experiment 11:
To study & Implement Web services in SOAP for JAVA Applications

--- Content provided by FirstRanker.com ---

Experiment 12:
Implementation of Para-Virtualization using VM Ware`s Workstation/
Oracle`s Virtual Box and Guest O.S.
Experiment 13:
Installation and Configuration of Hadoop

--- Content provided by FirstRanker.com ---


Experiment 14:
Create an application (Ex: Word Count) using Hadoop Map/Reduce
Experiment 15:
Case Study: PAAS (Face book, Google App Engine)

--- Content provided by FirstRanker.com ---



L
T
P
C

--- Content provided by FirstRanker.com ---

II Year - I Semester

3
0
0

--- Content provided by FirstRanker.com ---

3
Mobile Applications And Development
Course Objectives:
? To understand fundamentals of android operating systems.
? Illustrate the various components, layouts and views in creating android

--- Content provided by FirstRanker.com ---

? applications
? To understand fundamentals of android programming.
Course Outcomes:
? Create data sharing with different applications and sending and intercepting SMS.
? Develop applications using services and publishing android applications.

--- Content provided by FirstRanker.com ---

? To demonstrate their skills of using Android software development tools

Unit I: Introduction to Android:
The Android 4.1 jelly Bean SDK, Understanding the Android
Software Stack, installing the Android SDK, Creating Android Virtual Devices, Creating the First
Android Project, Using the Text view Control, Using the Android Emulator, The Android Debug

--- Content provided by FirstRanker.com ---

Bridge(ADB), Launching Android Applications on a Handset.

Unit II: Basic Widgets:
Understanding the Role of Android Application Components, Understanding the
Utility of Android API, Overview of the Android Project Files, Understanding Activities, Role of the
Android Manifest File, Creating the User Interface, Commonly Used Layouts and Controls, Event

--- Content provided by FirstRanker.com ---

Handling, Displaying Messages Through Toast, Creating and Starting an Activity, Using the Edit Text
Control, Choosing Options with Checkbox, Choosing Mutually Exclusive Items Using Radio Buttons

Unit III: Building Blocks for Android Application Design:
Introduction to Layouts, Linear Layout,
Relative Layout, Absolute Layout, Using Image View, Frame Layout, Table Layout, Grid Layout,

--- Content provided by FirstRanker.com ---

Adapting to Screen orientation. Utilizing Resources and Media Resources, Creating Values Resources,
Using Drawable Resources, Switching States with Toggle Buttons, Creating an Images Switcher
Application, Scrolling Through Scroll View, playing Audio, Playing Video, Displaying Progress with
Progress Bar, Using Assets.
Unit IV: Using Selection widgets and Debugging: Using List View, Using the Spinner control, Using

--- Content provided by FirstRanker.com ---

the GridView Control, Creating an Image Gallery Using the ViewPager Control, Using the Debugging
Tool: Dalvik Debug Monitor Service(DDMS), Debugging Application, Using the Debug Perspective.
Displaying And Fetching Information Using Dialogs and Fragments: What Are Dialogs?, Selecting the
Date and Time in One Application, Fragments, Creating Fragments with java Code, Creating Special
Fragments

--- Content provided by FirstRanker.com ---

Unit V: Building Menus and Storing Data: Creating Interface Menus and Action Bars, Menus and
Their Types, Creating Menus Through XML, Creating Menus Through Coding, Applying a Context
Menu to a List View, Using the Action Bar, Replacing a Menu with the Action Bar, Creating a Tabbed
Action Bar, Creating a Drop-Down List Action Bar Using Databases: Using the
SQLiteOpenHelperclasss, Accessing Databases with the ADB, Creating a Data Entry Form,

--- Content provided by FirstRanker.com ---

Communicating with SMS and Emails: Understanding Broadcast Receivers, Using the Notification
System, Sending SMS Messages with Java Code, Receiving SMS Messages, Sending Email, Working
With Telephony Manager.


--- Content provided by FirstRanker.com ---



Text Books
1. Android Programming by B.M Harwani, Pearson Education, 2013.

References Text Books:

--- Content provided by FirstRanker.com ---

1. Android application Development for Java Programmers, James C Sheusi, Cengage Learning
2. Android In Action by w.Frank Ableson, Robi Sen, Chris King, C. Enrique Ortiz., Dreamtech.
3. Professional Android 4 applications development, Reto Meier, Wiley India, 2012.
4. Beginning Android 4 applications development, Wei- Meng Lee, Wiley India,2013

L

--- Content provided by FirstRanker.com ---

T
P
C
II Year - I Semester

--- Content provided by FirstRanker.com ---

3
0
0
3
Big Data Analytics

--- Content provided by FirstRanker.com ---


Course Objectives: This course is aimed at enabling the students to
? To provide an overview of an exciting growing field of big data analytics.
? To introduce the tools required to manage and analyze big data like Hadoop, NoSQL, Map Reduce,
HIVE, Cassandra, Spark.

--- Content provided by FirstRanker.com ---

? To teach the fundamental techniques and principles in achieving big data analytics with scalability
and streaming capability.
? To optimize business decisions and create competitive advantage with Big Data analytics

Course Outcomes:

--- Content provided by FirstRanker.com ---

After the completion of the course, student will be able to
? Illustrate on big data and its use cases from selected business domains.
? Interpret and summarize on No SQL, Cassandra
? Analyze the HADOOP and Map Reduce technologies associated with big data analytics and explore
on Big Data applications Using Hive.

--- Content provided by FirstRanker.com ---

? Make use of Apache Spark, RDDs etc. to work with datasets.
? Assess real time processing with Spark Streaming.
Syllabus:
UNIT I:
What is big data, why big data, convergence of key trends, unstructured data, industry examples
of big data, web analytics, big data and marketing, fraud and big data, risk and big data, credit risk

--- Content provided by FirstRanker.com ---

management, big data and algorithmic trading, big data and healthcare, big data in medicine, advertising
and big data, big data technologies, introduction to Hadoop, open source technologies, cloud and big data,
mobile business intelligence, Crowd sourcing analytics, inter and trans firewall analytics.
UNIT II: Introduction to NoSQL, aggregate data models, aggregates, key-value and document data
models, relationships, graph databases, schema less databases, materialized views, distribution models,

--- Content provided by FirstRanker.com ---

sharding, master-slave replication, peer- peer replication, sharding and replication, consistency, relaxing
consistency, version stamps, Working with Cassandra ,Table creation, loading and reading data.
UNIT III: Data formats, analyzing data with Hadoop, scaling out, Architecture of Hadoop distributed file
system (HDFS), fault tolerance ,with data replication, High availability, Data locality , Map Reduce
Architecture, Process flow, Java interface, data flow, Hadoop I/O, data integrity, compression,

--- Content provided by FirstRanker.com ---

serialization. Introduction to Hive, data types and file formats, HiveQL data definition, HiveQL data
manipulation, Logical joins, Window functions, Optimization, Table partitioning, Bucketing, Indexing,
Join strategies.


--- Content provided by FirstRanker.com ---



UNIT IV:
Apache spark- Advantages over Hadoop, lazy evaluation, In memory processing, DAG, Spark
context, Spark Session, RDD, Transformations- Narrow and Wide, Actions, Data frames ,RDD to Data
frames, Catalyst optimizer, Data Frame Transformations, Working with Dates and Timestamps, Working
with Nulls in Data, Working with Complex Types, Working with JSON, Grouping, Window Functions,

--- Content provided by FirstRanker.com ---

Joins, Data Sources, Broadcast Variables, Accumulators, Deploying Spark- On-Premises Cluster
Deployments, Cluster Managers- Standalone Mode, Spark on YARN , Spark Logs, The Spark UI- Spark
UI History Server, Debugging and Spark First Aid

UNIT V:
Spark-Performance Tuning, Stream Processing Fundamentals, Event-Time and State full

--- Content provided by FirstRanker.com ---

Processing - Event Time, State full Processing, Windows on Event Time- Tumbling Windows, Handling
Late Data with Watermarks, Dropping Duplicates in a Stream, Structured Streaming Basics - Core
Concepts, Structured Streaming in Action, Transformations on Streams, Input and Output.
Text Books:
1. Big Data, Big Analytics: Emerging, Michael Minnelli, Michelle Chambers, and Ambiga Dhiraj

--- Content provided by FirstRanker.com ---

2. SPARK: The Definitive Guide, Bill Chambers & Matei Zaharia, O'Reilley, 2018 Edition
3. Business Intelligence and Analytic Trends for Today's Businesses", Wiley, 2013
4. P. J. Sadalage and M. Fowler, "NoSQL Distilled: A Brief Guide to the Emerging World Polyglot
Persistence", Addison-Wesley Professional, 2012
5. Tom White, "Hadoop: The Definitive Guide", Third Edition, O'Reilley, 2012

--- Content provided by FirstRanker.com ---


Reference Books:
1. "Hadoop Operations", O'Reilley, Eric Sammer, 2012
2. "Programming Hive", O'Reilley, E. Capriolo, D. Wampler, and J. Rutherglen, 2012
3. "HBase: The Definitive Guide", O'Reilley, Lars George, 2011

--- Content provided by FirstRanker.com ---

4. "Cassandra: The Definitive Guide", O'Reilley, Eben Hewitt, 2010
5. "Programming Pig", O'Reilley, Alan Gates, 2011


L
T

--- Content provided by FirstRanker.com ---

P
C
II Year - I Semester

3

--- Content provided by FirstRanker.com ---

0
0
3
Python Programming

--- Content provided by FirstRanker.com ---

ourse Objectives:
? To acquire programming skills in core Python.
? To acquire Object Oriented Skills in Python.
? To develop the skill of designing Graphical user Interfaces in Python.
? To develop the ability to write database applications in Python.

--- Content provided by FirstRanker.com ---


Course Outcomes(COs):
At the end of the course, student will be able to
? Understand and comprehend the basics of python programming.
? Demonstrate the principles of structured programming and be able to describe, design, implement,
and test structured programs using currently accepted methodology.

--- Content provided by FirstRanker.com ---

? Explain the use of the built-in data structures list, sets, tuples and dictionary.
? Make use of functions and its applications.
? Identify real-world applications using oops, files and exception handling provided by python.
UNIT ? I:
Introduction:
History of Python, Need of Python Programming, Applications Basics of Python

--- Content provided by FirstRanker.com ---

Programming Using the REPL(Shell), Running Python Scripts, Variables, Assignment, Keywords, Input-
Output, Indentation.
UNIT ? II:
Types, Operators and Expressions:
Types - Integers, Strings, Booleans; Operators- Arithmetic
Operators, Comparison (Relational) Operators, Assignment Operators, Logical Operators, Bitwise

--- Content provided by FirstRanker.com ---

Operators, Membership Operators, Identity Operators, Expressions and order of evaluations Control
Flow- if, if-elif-else, for, while, break, continue, pass

UNIT ? III:
Data Structures-
Lists- Operations, Slicing, Methods, Tuples, Sets, Dictionaries, Sequences,

--- Content provided by FirstRanker.com ---

Comprehensions.

UNIT ? IV:
Functions
- Defining Functions, Calling Functions, Passing Arguments, Keyword Arguments, Default
Arguments, Variable-length arguments, Anonymous Functions, Fruitful Functions (Function Returning

--- Content provided by FirstRanker.com ---

Values), Scope of the Variables in a Function - Global and Local Variables, Modules: Creating modules,
import statement, from. Import statement, name spacing, Python packages, Introduction to PIP,
Installing Packages via PIP, Using Python Packages

UNIT ? V:

--- Content provided by FirstRanker.com ---

Object Oriented Programming OOP in Python
: Classes, 'self variable', Methods, Constructor Method,
Inheritance, Overriding Methods, Data hiding, Error and Exceptions: Difference between an error and
Exception, Handling Exception, try except block, Raising Exceptions, User defined Exceptions, Brief
Tour of the Standard Library
- Operating System Interface - String Pattern Matching, Mathematics,
Internet Access, Dates and Times, Data Compression, Multithreading, GUI Programming, Turtle

--- Content provided by FirstRanker.com ---

Graphics, Testing: Why testing is required ?, Basic concepts of testing, Unit testing in Python, Writing
Test cases, Running Tests.



--- Content provided by FirstRanker.com ---



Text Books:

1. Fundamentals of Python First Programs, Kenneth. A. Lambert, Cengage
2. Introduction to Programming Using Python, Y. Daniel Liang, Pearson
Reference Books:

--- Content provided by FirstRanker.com ---

1. Introduction to Python Programming, Gowrishankar.S, Veena A, CRC Press
2. Think Python, Allen Downey, Green Tea Press
3. Core Python Programming, W. Chun, Pearson

L
T

--- Content provided by FirstRanker.com ---

P
C
II Year - I Semester

3

--- Content provided by FirstRanker.com ---

0
0
3
Data Science
Course Objective:

--- Content provided by FirstRanker.com ---

? Provide you with the knowledge and expertise to become a proficient data scientist.
? Demonstrate an understanding of statistics and machine learning concepts that are vital for data
science.
? Produce Python code to statistically analyze a dataset.
? Critically evaluate data visualizations based on their design and use for communicating stories from

--- Content provided by FirstRanker.com ---

data.

Course Outcomes:
After the completion of the course, student will be able to
? Explain how data is collected, managed and stored for data science.
? Understand the key concepts in data science, including their real-world applications and the toolkit

--- Content provided by FirstRanker.com ---

used by data scientists.
? Implement data collection and management scripts using MongoDB.
Syllabus:
Unit -I:
Introduction to core concepts and technologies: Introduction, Terminology, data science process,
data science toolkit, Types of data, Example applications.

--- Content provided by FirstRanker.com ---


UNIT -II:
Data collection and management: Introduction, Sources of data, Data collection and APIs,
Exploring and fixing data, Data storage and management, Using multiple data sources

UNIT -III:
Data analysis: Introduction, Terminology and concepts, Introduction to statistics, Central

--- Content provided by FirstRanker.com ---

tendencies and distributions, Variance, Distribution properties and arithmetic, Samples/CLT, Basic
machine learning algorithms, Linear regression, SVM, Naive Bayes.

UNIT -IV:
Data visualization-Introduction, Types of data visualization, Data for
Visualization- Data types, Data encodings, Retinal variables, Mapping variables

--- Content provided by FirstRanker.com ---

to encodings, Visual encodings.
UNIT -V: Applications of Data Science, Technologies for visualization, Bokeh (Python), Recent trends
in various data collection and analysis techniques, various visualization techniques, application
development methods of used in data science.
References:

--- Content provided by FirstRanker.com ---

1. Cathy O'Neil and Rachel Schutt. Doing Data Science, Straight Talk From The
Frontline. O'Reilly.
2. Jure Leskovek, Anand Rajaraman and Jeffrey Ullman. Mining of Massive
Datasets. v2.1, Cambridge University Press.
References:

--- Content provided by FirstRanker.com ---

1. Data science and analytics, 1st edition, V.K.Jain, Khanna Publlications,2018.


L
T
P

--- Content provided by FirstRanker.com ---

C
II Year - I Semester

3
0

--- Content provided by FirstRanker.com ---

0
3
BIO INFORMATICS
Course Objectives:
? To understand Bio informatics from computing perspective.

--- Content provided by FirstRanker.com ---

? To comprehend bio informatics databases, file formats and its applications.
? To understand the applications of Bio informatics
UNIT I:History of bioinformatics-History of Bioinformatics-role of Bioinformatics in biological
sciences- scope of bioinformatics -introduction to internet-WWW- network basics- LAN & WAN
standards-network topologies and protocols- FTP- HTTP - division of Bioinformatics- Bioinformatics and

--- Content provided by FirstRanker.com ---

internet-challenges in Bioinformatics.
UNIT II:Databases in bioinformatics-Databases in Bioinformatics- Genbank- NCBI- EMBL- DDBJ -
UniGene- SGD- EMI Genomes- -protein databases-PIR- SWISSPROT-TrEMBL-Prosite- PRINTS -
structural databases-PDB- SCOP- CATH- PDB_SELECT- PDBSUM- DSSP- FSSPDALI- PRODOM-
protein families & pattern databases-Pfam- KEGG - sequence storage sequence accuracy-EST-STS-

--- Content provided by FirstRanker.com ---

sequence retrieval systems- Entrez-SRS- sequence query refinement using Boolean operators- limits-
preview- history and index.
UNIT
III:Sequence
submission-Sequence

--- Content provided by FirstRanker.com ---

submission
tools-BANKIT-SEQUIN-WEBIN-
SAKURAliterature databases-PubMed and medline. Data mining and its techniques- data warehousing-
Sequence annotation- principles of genome annotation- annotation tools & resources.
UNIT IV:Applications of bioinformatics-Applications of Bioinformatics-phylogenetic analysissteps in

--- Content provided by FirstRanker.com ---

phylogenetic analysis-microarrays-DNA and protein microarrays- Bioinformatics in pharmaceutical
industry- informatics & drug- discovery ? pharma informatics resources drug discovery and designing-
SNP.
UNIT V:File formats-File formats-raw/plain format-NCBI-Genbank flat file format-ASN.1-
GCGFASTA- EMBL- NBRF- PIR-swissprot sequence formats- PDB format-Introduction to structure

--- Content provided by FirstRanker.com ---

prediction methods.
References:
1. Attwood T.K, Parry-Smith, "Introduction to Bioinformatics", Addison Wesley
Longman, 1999.
2. David W Mount, "Bioinformatics: Sequence and Genome Analysis", 2nd

--- Content provided by FirstRanker.com ---

edition, CBS Publishers, 2004.
3. Arun Jagota, "Data Analysis and Classification for Bioinformatics", Pine
Press, 2001.
4. Des Higgins and Willie Taylor, "Bioinformatics Sequence, Structures and
Databanks", Oxford University Press, 2000.

--- Content provided by FirstRanker.com ---

5. Jason T.L.Wang, Mohammed J. Zaki, Hannu T.T. Toivonene and Dennis
Shasha, "Data Mining in Bioinformatics", Springer International Edition,
2005.
6. K. Erciyes, "Distributed and Sequential Algorithms for Bioinformatics",
Springer, 2015.

--- Content provided by FirstRanker.com ---

L
T
P
C
II Year - I Semester

--- Content provided by FirstRanker.com ---


3
0
0
3

--- Content provided by FirstRanker.com ---

Digital Forensics

Course Objective:
? Provides an in-depth study of the rapidly changing and fascinating field of computer
? Combines both the technical expertise and the knowledge required to investigate, detect
and prevent digital crimes.

--- Content provided by FirstRanker.com ---

? Knowledge on digital forensics legislations, digital crime, forensics processes and procedures, data
acquisition and validation, e-discovery tools
? E-evidence collection and preservation, investigating operating systems and file systems, network
forensics, art of steganography and mobile device forensics

--- Content provided by FirstRanker.com ---

Course Outcomes:
After completion of course, students would be
? Understand relevant legislation and codes of ethics
? Computer forensics and digital detective and various processes, policies and procedures
? E-discovery, guidelines and standards, E-evidence, tools and environment.
? Email and web forensics and network forensics

--- Content provided by FirstRanker.com ---

UNIT -I: Digital Forensics Science: Forensics science, computer forensics, and digital forensics,
Computer Crime: Criminalistics as it relates to the investigative process, analysis of cyber-criminalistics
area, holistic approach to cyber-forensics.
UNIT -II: Cyber Crime Scene Analysis:
Discuss the various court orders etc., methods to
search and seizure electronic evidence, retrieved and un-retrieved

--- Content provided by FirstRanker.com ---

communications, Discuss the importance of understanding what court
documents would be required for a criminal investigation.
UNIT -III: Evidence Management & Presentation: Create and manage shared folders
using operating system, importance of the forensic mindset, define the workload
of law enforcement, Explain what the normal case would look like, Define who

--- Content provided by FirstRanker.com ---

should be notified of a crime, parts of gathering evidence, Define and apply
probable cause.
UNIT -IV: Computer Forensics: Prepare a case, Begin an investigation, Understand
computer forensics workstations and software, Conduct an investigation,
Complete a case, Critique a case,

--- Content provided by FirstRanker.com ---

Network Forensics: open-source security tools for network forensic analysis,
requirements for preservation of network data.
UNIT -V: Mobile Forensics: mobile forensics techniques, mobile forensics tools.
Legal Aspects of Digital Forensics: IT Act 2000, amendment of IT Act 2008, Recent trends in mobile
forensic technique and methods to search and seizure

--- Content provided by FirstRanker.com ---

electronic evidence.
Text Book:
1. John Sammons, 2e, The Basics of Digital Forensics, Elsevier, 2014
Reference Books:
1. Digital Forensics: The Fascinating world of digital evidences, 1st Edition, Nilakshi Jain, Dhananjay R.

--- Content provided by FirstRanker.com ---

kalbande, wiley- 2016

2.
L
T
P

--- Content provided by FirstRanker.com ---

C
II Year - I Semester

3
0

--- Content provided by FirstRanker.com ---

0
3
Web Security

Course Objectives:

--- Content provided by FirstRanker.com ---

? Underlying security principles of the web
? Overview of concrete threats against web applications
? Insights into common attacks and countermeasures
? Current best practices for secure web applications

--- Content provided by FirstRanker.com ---

Course Outcomes
: At the end of the course, student will be able to
? Demonstrate security concepts, security professional roles, and security resources in the context of
systems and security development life cycle
? Justify applicable laws, legal issues and ethical issues regarding computer crime
? Explain the business need for security, threats, attacks, top ten security vulnerabilities, and secure

--- Content provided by FirstRanker.com ---

software development
? Apply information security policies, standards and practices, the information security blueprint
? Analyze and describe security requirements for typical web application scenario
Syllabus:
UNIT?I: Introduction
-A web security forensic lesson, Web languages, Introduction to different web

--- Content provided by FirstRanker.com ---

attacks. Overview of N-tier web applications, Web Servers-Apache, IIS.
UNIT-II: Securing the Communication Channel-
Understanding the dangers of an insecure
communication channel. Practical advice on deploying HTTPS, and dealing with the impact on your
application. Insights into the latest evolutions for HTTPS deployments.
UNIT?III: Web Hacking Basics- HTTP & HTTPS URL, Web under the Cover Overview of Java

--- Content provided by FirstRanker.com ---

security Reading the HTML source, Applet Security Servlets Security Symmetric and Asymmetric
Encryptions, Network security Basics, Firewalls & IDS.

UNIT?IV: Securely Handling Untrusted Data-Investigation of injection attacks over time.
Understanding the cause behind both server-side and client-side injection attacks. Execution of common

--- Content provided by FirstRanker.com ---

injection attacks, and implementation of various defenses..
UNIT?V: Preventing Unauthorized Access-Understanding the interplay between authentication,
authorization and session management. Practical ways to secure the authentication process, prevent
authorization bypasses and harden session management mechanisms, Securing Large Applications, Cyber
Graffiti.

--- Content provided by FirstRanker.com ---


Text Books:
1. McClure, Stuart, Saumil Shah, and Shreeraj Shah. Web Hacking: attacks and defense. Addison
Wesley. 2003.
2. Garms, Jess and Daniel Somerfield. Professional Java Security. Wrox. 2001.

--- Content provided by FirstRanker.com ---






Web Reference Books:
:

--- Content provided by FirstRanker.com ---

1. Collection
of
Cryptography
Web
Sites,

--- Content provided by FirstRanker.com ---

Publications,
FAQs,
and
Reference
Books::http://world.std.com/~franl/crypto.html

--- Content provided by FirstRanker.com ---

2. FAQ: What is TLS/SSL? http://www.mail.nih.gov/user/faq/tlsssl.htm
3. The Open SSL Project (SDKs for free download): http://www.openssl.org/
4. Windows & .NET security updates Web site: http://www.ntsecurity.net/
5. Preventing Unauthorized access Web site: https://www.edx.org/course/web-security-fundamentals

L

--- Content provided by FirstRanker.com ---

T
P
C
II Year - I Semester

--- Content provided by FirstRanker.com ---

3
0
0
3
Machine Learning

--- Content provided by FirstRanker.com ---

Course Objectives:
Machine Learning course will
? Develop an appreciation for what is involved in learning from data.
? Demonstrate a wide variety of learning algorithms.
? Demonstrate how to apply a variety of learning algorithms to data.

--- Content provided by FirstRanker.com ---

? Demonstrate how to perform evaluation of learning algorithms and model selection.

Course Outcomes:
After the completion of the course, student will be able to
Domain Knowledge for Productive use of Machine Learning and Diversity of Data.

--- Content provided by FirstRanker.com ---

Demonstrate on Supervised and Computational Learning
Analyze on Statistics in learning techniques and Logistic Regression
Illustrate on Support Vector Machines and Perceptron Algorithm
Design a Multilayer Perceptron Networks and classification of decision tree

--- Content provided by FirstRanker.com ---

UNIT-I: Introduction-
Towards Intelligent Machines, Well posed Problems, Example of Applications in
diverse fields, Data Representation, Domain Knowledge for Productive use of Machine Learning,
Diversity of Data: Structured / Unstructured, Forms of Learning, Machine Learning and Data Mining,
Basic Linear Algebra in Machine Learning Techniques.
UNIT-II: Supervised Learning- Rationale and Basics: Learning from Observations, Bias and Why

--- Content provided by FirstRanker.com ---

Learning Works: Computational Learning Theory, Occam's Razor Principle and Overfitting Avoidance
Heuristic Search in inductive Learning, Estimating Generalization Errors, Metrics for assessing
regression, Metris for assessing classification.
UNIT-III: Statistical Learning- Machine Learning and Inferential Statistical Analysis, Descriptive
Statistics in learning techniques, Bayesian Reasoning: A probabilistic approach to inference, K-Nearest

--- Content provided by FirstRanker.com ---

Neighbor Classifier. Discriminant functions and regression functions, Linear Regression with Least
Square Error Criterion, Logistic Regression for Classification Tasks, Fisher's Linear Discriminant and
Thresholding for Classification, Minimum Description Length Principle.
UNIT-IV: Support Vector Machines (SVM)- Introduction, Linear Discriminant Functions for Binary
Classification, Perceptron Algorithm, Large Margin Classifier for linearly seperable data, Linear Soft

--- Content provided by FirstRanker.com ---

Margin Classifier for Overlapping Classes, Kernel Induced Feature Spaces, Nonlinear Classifier,
Regression by Support vector Machines.
Learning with Neural Networks: Towards Cognitive Machine, Neuron Models, Network Architectures,
Perceptrons, Linear neuron and the Widrow-Hoff Learning Rule, The error correction delta rule.
UNIT -V: Multilayer Perceptron Networks and error back propagation algorithm, Radial Basis Functions

--- Content provided by FirstRanker.com ---

Networks. Decision Tree Learning: Introduction, Example of classification decision tree, measures of
impurity for evaluating splits in decision trees, ID3, C4.5, and CART decision trees, pruning the tree,
strengths and weakness of decision tree approach.
Textbooks:
1. Applied Machine Learning, 1st edition M.Gopal, Mc Graw Hill Education,2018

--- Content provided by FirstRanker.com ---

References:
1. Kevin Murphy, Machine Learning: A Probabilistic Perspective, MIT Press, 2012
2. Trevor Hastie, Robert Tibshirani, Jerome Friedman, The Elements of Statistical
Learning, Springer 2009 (freely available online)
3. Christopher Bishop, Pattern Recognition and Machine Learning, Springer, 2007.

--- Content provided by FirstRanker.com ---



AUDIT 1 and 2: ENGLISH FOR RESEARCH PAPER WRITING


Course objectives:

--- Content provided by FirstRanker.com ---

Students will be able to:
1. Understand that how to improve your writing skills and level of readability
2. Learn about what to write in each section
3. Understand the skills needed when writing a Title Ensure the good quality of paper at very first-
time submission

--- Content provided by FirstRanker.com ---


Syllabus
Units

CONTENTS
Hours

--- Content provided by FirstRanker.com ---


1
Planning and Preparation, Word Order, Breaking up long sentences, 4
Structuring Paragraphs and Sentences, Being Concise
and Removing Redundancy, Avoiding Ambiguity and Vagueness

--- Content provided by FirstRanker.com ---

2
Clarifying Who Did What, Highlighting Your Findings, Hedging and 4
Criticising, Paraphrasing and Plagiarism, Sections of a Paper,
Abstracts. Introduction
3

--- Content provided by FirstRanker.com ---

Review of the Literature, Methods, Results, Discussion,
4
Conclusions, The Final Check.
4
key skills are needed when writing a Title, key skills are needed when 4

--- Content provided by FirstRanker.com ---

writing an Abstract, key skills are needed when writing an
Introduction, skills needed when writing a Review of the Literature,
5
skills are needed when writing the Methods, skills needed when writing the 4
Results, skills are needed when writing the Discussion,

--- Content provided by FirstRanker.com ---

skills are needed when writing the Conclusions
6
useful phrases, how to ensure paper is as good as it could possibly
4
be the first- time submission

--- Content provided by FirstRanker.com ---


Suggested Studies:

1. Goldbort R (2006) Writing for Science, Yale University Press (available on Google Books)
2. Day R (2006) How to Write and Publish a Scientific Paper, Cambridge University Press
3. Highman N (1998), Handbook of Writing for the Mathematical Sciences, SIAM.

--- Content provided by FirstRanker.com ---

Highman'sbook .
4. Adrian Wallwork , English for Writing Research Papers, Springer New York Dordrecht
Heidelberg London, 2011


--- Content provided by FirstRanker.com ---


JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY: KAKINADA
KAKINADA ? 533 003, Andhra Pradesh, India

AUDIT 1 and 2: DISASTER MANAGEMENT
Course Objectives: -Students will be able to:

--- Content provided by FirstRanker.com ---

1. learn to demonstrate a critical understanding of key concepts in disaster risk reduction and
humanitarian response.
2. critically evaluate disaster risk reduction and humanitarian response policy and practice from
multiple perspectives.
3. develop an understanding of standards of humanitarian response and practical relevance in specific

--- Content provided by FirstRanker.com ---

types of disasters and conflict situations.
4. critically understand the strengths and weaknesses of disaster management approaches, planning
and programming in different countries, particularly their home country or the countries
they work in
Syllabus

--- Content provided by FirstRanker.com ---

Units CONTENTS

Hours
1
Introduction
4

--- Content provided by FirstRanker.com ---

Disaster: Definition, Factors And Significance; Difference Between Hazard And
Disaster; Natural And Manmade Disasters: Difference,
Nature, Types And Magnitude.
2
Repercussions Of Disasters And Hazards: Economic Damage, Loss Of

--- Content provided by FirstRanker.com ---

4
Human And Animal Life, Destruction Of Ecosystem.
Natural Disasters: Earthquakes, Volcanisms, Cyclones, Tsunamis, Floods,
Droughts And Famines, Landslides And Avalanches, Man- made disaster:
Nuclear Reactor Meltdown, Industrial Accidents, Oil Slicks And Spills,

--- Content provided by FirstRanker.com ---

Outbreaks Of Disease And Epidemics, War And
Conflicts.
3
Disaster Prone Areas In India
4

--- Content provided by FirstRanker.com ---

Study Of Seismic Zones; Areas Prone To Floods And Droughts, Landslides And
Avalanches; Areas Prone To Cyclonic And Coastal Hazards With Special
Reference To Tsunami; Post-Disaster Diseases
And Epidemics
4

--- Content provided by FirstRanker.com ---

Disaster Preparedness And Management
4
Preparedness: Monitoring Of Phenomena Triggering A Disaster Or Hazard;
Evaluation Of Risk: Application Of Remote Sensing, Data From Meteorological
And Other Agencies, Media Reports:

--- Content provided by FirstRanker.com ---

Governmental And Community Preparedness.
5
Risk Assessment
4
Disaster Risk: Concept And Elements, Disaster Risk Reduction, Global And

--- Content provided by FirstRanker.com ---

National Disaster Risk Situation. Techniques Of Risk Assessment, Global Co-
Operation In Risk Assessment And Warning, People's
Participation In Risk Assessment. Strategies for Survival.
6
Disaster Mitigation

--- Content provided by FirstRanker.com ---

4
Meaning, Concept And Strategies Of Disaster Mitigation, Emerging
Trends In Mitigation. Structural Mitigation And Non-Structural Mitigation,
Programs Of Disaster Mitigation In India.
Suggested Readings:

--- Content provided by FirstRanker.com ---

1. R. Nishith, Singh AK, "Disaster Management in India: Perspectives, issues and strategies
"'New Royal book Company.
2. Sahni, PardeepEt.Al. (Eds.)," Disaster Mitigation Experiences And Reflections", Prentice Hall
Of India, New Delhi.
3. Goel S. L. , Disaster Administration And Management Text And Case Studies" ,Deep &Deep

--- Content provided by FirstRanker.com ---

Publication Pvt. Ltd., New Delhi.

JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY: KAKINADA
KAKINADA ? 533 003, Andhra Pradesh, India


--- Content provided by FirstRanker.com ---

AUDIT 1 and 2: SANSKRIT FOR TECHNICAL KNOWLEDGE

Course Objectives

1. To get a working knowledge in illustrious Sanskrit, the scientific language in the world
2. Learning of Sanskrit to improve brain functioning

--- Content provided by FirstRanker.com ---

3. Learning of Sanskrit to develop the logic in mathematics, science & other subjects
enhancing the memory power
4. The engineering scholars equipped with Sanskrit will be able to explore the huge
knowledge from ancient literature
Syllabus

--- Content provided by FirstRanker.com ---


Unit Content
Hours
1
Alphabets in Sanskrit,

--- Content provided by FirstRanker.com ---

4
Past/Present/Future Tense,
Simple Sentences
2
Order

--- Content provided by FirstRanker.com ---

4
Introduction of roots
Technical information about Sanskrit Literature
3
Technical concepts of Engineering-Electrical,

--- Content provided by FirstRanker.com ---

4
4
Technical concepts of Engineering - Mechanical.
4
5

--- Content provided by FirstRanker.com ---

Technical concepts of Engineering - Architecture.
4
6
Technical concepts of Engineering ? Mathematics.
4

--- Content provided by FirstRanker.com ---


Suggested reading

1. "Abhyaspustakam" ? Dr.Vishwas, Samskrita-Bharti Publication, New Delhi
2. "Teach Yourself Sanskrit" Prathama Deeksha-Vempati Kutumbshastri, Rashtriya Sanskrit
Sansthanam, New Delhi Publication

--- Content provided by FirstRanker.com ---

3. "India's Glorious Scientific Tradition" Suresh Soni, Ocean books (P) Ltd., New Delhi.
Course Output
Students will be able to
1. Understanding basic Sanskrit language
2. Ancient Sanskrit literature about science & technology can be understood

--- Content provided by FirstRanker.com ---

3. Being a logical language will help to develop logic in students



JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY: KAKINADA
KAKINADA ? 533 003, Andhra Pradesh, India

--- Content provided by FirstRanker.com ---


AUDIT 1 and 2: VALUE EDUCATION

Course Objectives
Students will be able to

--- Content provided by FirstRanker.com ---

1. Understand value of education and self- development
2. Imbibe good values in students
3. Let the should know about the importance of character
Syllabus

--- Content provided by FirstRanker.com ---

Unit Content
Hours
1
Values and self-development ?Social values and individual attitudes. Work ethics, 4
Indian vision of humanism.

--- Content provided by FirstRanker.com ---

Moral and non- moral valuation. Standards and principles.
Value judgements
2
Importance of cultivation of values.
4

--- Content provided by FirstRanker.com ---

Sense of duty. Devotion, Self-reliance. Confidence, Concentration. Truthfulness,
Cleanliness.
Honesty, Humanity. Power of faith, National Unity.
Patriotism.Love for nature ,Discipline
3

--- Content provided by FirstRanker.com ---

Personality and Behavior Development - Soul and Scientific attitude. Positive 4
Thinking. Integrity and discipline.
Punctuality, Love and Kindness.
Avoid fault Thinking.
4

--- Content provided by FirstRanker.com ---

Free from anger, Dignity of labour.
4
Universal brotherhood and religious tolerance.
True friendship.
Happiness Vs suffering, love for truth.

--- Content provided by FirstRanker.com ---

Aware of self-destructive habits.
Association and Cooperation.
Doing best for saving nature
5
Character and Competence ?Holy books vs Blind faith.

--- Content provided by FirstRanker.com ---

4
Self-management and Good health.
Science of reincarnation.
Equality, Nonviolence ,Humility, Role of Women.
6

--- Content provided by FirstRanker.com ---

All religions and same message.
4
Mind your Mind, Self-control.
Honesty, Studying effectively

--- Content provided by FirstRanker.com ---

Suggested reading
1 Chakroborty, S.K. "Values and Ethics for organizations Theory and practice", Oxford
University Press, New Delhi
Course outcomes
Students will be able to 1.Knowledge of self-development

--- Content provided by FirstRanker.com ---

2.Learn the importance of Human values 3.Developing the overall personality

JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY: KAKINADA
KAKINADA ? 533 003, Andhra Pradesh, India

AUDIT 1 and 2: CONSTITUTION OF INDIA

--- Content provided by FirstRanker.com ---


Course Objectives:
Students will be able to:
1. Understand the premises informing the twin themes of liberty and freedom from a civil rights
perspective.

--- Content provided by FirstRanker.com ---

2. To address the growth of Indian opinion regarding modern Indian intellectuals' constitutional
role and entitlement to civil and economic rights as well as the emergence of nationhood in the
early years of Indian nationalism.
3. To address the role of socialism in India after the commencement of the Bolshevik Revolution
in 1917 and its impact on the initial drafting of the Indian Constitution.

--- Content provided by FirstRanker.com ---

Syllabus
Units

Content
Hours
History of Making of the Indian Constitution:

--- Content provided by FirstRanker.com ---

1
History
4
Drafting Committee, ( Composition & Working)
Philosophy of the Indian Constitution:

--- Content provided by FirstRanker.com ---

2
Preamble Salient Features
4
Contours of Constitutional Rights & Duties:
Fundamental Rights

--- Content provided by FirstRanker.com ---

Right to Equality
Right to Freedom
3
Right against Exploitation
4

--- Content provided by FirstRanker.com ---

Right to Freedom of Religion
Cultural and Educational Rights
Right to Constitutional Remedies
Directive Principles of State Policy
Fundamental Duties.

--- Content provided by FirstRanker.com ---

Organs of Governance:
Parliament
Composition
Qualifications and Disqualifications
Powers and Functions

--- Content provided by FirstRanker.com ---

4
Executive
4
President
Governor

--- Content provided by FirstRanker.com ---

Council of Ministers
Judiciary, Appointment and Transfer of Judges, Qualifications
Powers and Functions
Local Administration:
District's Administration head: Role and Importance,

--- Content provided by FirstRanker.com ---

5
Municipalities: Introduction, Mayor and role of Elected Representative, CE of
Municipal Corporation.
4
Pachayati raj: Introduction, PRI: ZilaPachayat.

--- Content provided by FirstRanker.com ---

Elected officials and their roles, CEO ZilaPachayat: Position and role.
Block level: Organizational Hierarchy (Different departments),
Village level: Role of Elected and Appointed officials,
Importance of grass root democracy

JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY: KAKINADA

--- Content provided by FirstRanker.com ---

KAKINADA ? 533 003, Andhra Pradesh, India

Election Commission:
Election Commission: Role and Functioning.
6

--- Content provided by FirstRanker.com ---

Chief Election Commissioner and Election Commissioners.
4
State Election Commission: Role and Functioning.
Institute and Bodies for the welfare of SC/ST/OBC and women.

--- Content provided by FirstRanker.com ---

Suggested reading

1. The Constitution of India, 1950 (Bare Act), Government Publication.
2. Dr. S. N. Busi, Dr. B. R. Ambedkar framing of Indian Constitution, 1st Edition, 2015.
3. M. P. Jain, Indian Constitution Law, 7th Edn., Lexis Nexis, 2014.
4. D.D. Basu, Introduction to the Constitution of India, Lexis Nexis, 2015.

--- Content provided by FirstRanker.com ---

Course Outcomes:
Students will be able to:
1. Discuss the growth of the demand for civil rights in India for the bulk of Indians before the
arrival of Gandhi in Indian politics.
2. Discuss the

--- Content provided by FirstRanker.com ---

intellectual
origins of
the
framework
of

--- Content provided by FirstRanker.com ---

argument
that
informed
the conceptualization of social reforms leading to revolution in
India.

--- Content provided by FirstRanker.com ---

3. Discuss the circumstances surrounding the foundation of the Congress Socialist Party [CSP]
under the leadership of Jawaharlal Nehru and the eventual failure of the proposal of direct
elections through adult suffrage in the Indian Constitution.
4. Discuss the passage of the Hindu Code Bill of 1956.

--- Content provided by FirstRanker.com ---




JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY: KAKINADA
KAKINADA ? 533 003, Andhra Pradesh, India

--- Content provided by FirstRanker.com ---

AUDIT 1 and 2: PEDAGOGY STUDIES

Course Objectives:
Students will be able to:
4. Review existing evidence on the review topic to inform programme design and policy

--- Content provided by FirstRanker.com ---

making undertaken by the DfID, other agencies and researchers.
5. Identify critical evidence gaps to guide the development.
Syllabus
Units Content

Hours

--- Content provided by FirstRanker.com ---

Introduction and Methodology:

Aims and rationale, Policy background, Conceptual framework and terminology
1
Theories of learning, Curriculum, Teacher education.

--- Content provided by FirstRanker.com ---

4
Conceptual framework, Research questions.
Overview of methodology and Searching.
Thematic overview: Pedagogical practices are being used by teachers in formal
2

--- Content provided by FirstRanker.com ---

and informal classrooms in developing countries.
4
Curriculum, Teacher education.
3
Evidence on the effectiveness of pedagogical practices

--- Content provided by FirstRanker.com ---

Methodology for the in depth stage: quality assessment of included studies.
How can teacher education (curriculum and practicum) and the school curriculum
and guidance materials best support effective pedagogy?
4
Theory of change.

--- Content provided by FirstRanker.com ---

Strength and nature of the body of evidence for effective pedagogical practices.
4
Pedagogic theory and pedagogical approaches.
4
Teachers' attitudes and beliefs and Pedagogic strategies.

--- Content provided by FirstRanker.com ---

Professional development: alignment with classroom practices and follow-up
support
Peer support
4
5

--- Content provided by FirstRanker.com ---

Support from the head teacher and the community.
Curriculum and assessment
Barriers to learning: limited resources and large class sizes
6
Research gaps and future directions

--- Content provided by FirstRanker.com ---

4
Research design
Contexts
Pedagogy
Teacher education

--- Content provided by FirstRanker.com ---

Curriculum and assessment
Dissemination and research impact.



JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY: KAKINADA

--- Content provided by FirstRanker.com ---

KAKINADA ? 533 003, Andhra Pradesh, India


Suggested reading

--- Content provided by FirstRanker.com ---

1. Ackers J, Hardman F (2001) Classroom interaction in Kenyan primary schools, Compare,
31 (2): 245-261.
2. Agrawal M (2004) Curricular reform in schools: The importance of evaluation, Journal of
Curriculum Studies, 36 (3): 361-379.
3. Akyeampong K (2003) Teacher training in Ghana - does it count? Multi-site teacher

--- Content provided by FirstRanker.com ---

education research project (MUSTER) country report 1. London: DFID.
4. Akyeampong K, Lussier K, Pryor J, Westbrook J (2013) Improving teaching and learning of
basic maths and reading in Africa: Does teacher preparation count? International Journal
Educational Development, 33 (3): 272?282.
5. Alexander RJ (2001) Culture and pedagogy: International comparisons in primary

--- Content provided by FirstRanker.com ---

education. Oxford and Boston: Blackwell.
6. Chavan M (2003) Read India: A mass scale, rapid, `learning to read' campaign.
7. www.pratham.org/images/resource%20working%20paper%202.pdf.

Course Outcomes:

--- Content provided by FirstRanker.com ---

Students will be able to understand:
1. What pedagogical practices are being used by teachers in formal and informal classrooms
in developing countries?
2. What is the evidence on the effectiveness of these pedagogical practices, in what
conditions, and with what population of learners?

--- Content provided by FirstRanker.com ---

3. How can teacher education (curriculum and practicum) and the school curriculum and
guidance materials best support effective pedagogy?

JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY: KAKINADA
KAKINADA ? 533 003, Andhra Pradesh, India

--- Content provided by FirstRanker.com ---

AUDIT 1 and 2: STRESS MANAGEMENT BY YOGA

Course Objectives

1. To achieve overall health of body and mind
2. To overcome stress

--- Content provided by FirstRanker.com ---

Syllabus
Unit Content
Hours
1 Definitions of Eight parts of yog. ( Ashtanga )
5

--- Content provided by FirstRanker.com ---

2 Yam and Niyam. Do`s and Don't's in life.
5
Ahinsa, satya, astheya, bramhacharya and aparigraha
3 Yam and Niyam. Do`s and Don't's in life.
5

--- Content provided by FirstRanker.com ---

Shaucha, santosh, tapa, swadhyay, ishwarpranidhan
4 Asan and Pranayam
5
Various yog poses and their benefits for mind & body
5 Regularization of breathing techniques and its effects-Types of pranayam

--- Content provided by FirstRanker.com ---

4

Suggested reading

1. `Yogic Asanas for Group Tarining-Part-I" : Janardan Swami YogabhyasiMandal, Nagpur
2. "Rajayoga or conquering the Internal Nature" by Swami Vivekananda, Advaita

--- Content provided by FirstRanker.com ---

Ashrama (Publication Department), Kolkata
Course Outcomes:
Students will be able to:
1. Develop healthy mind in a healthy body thus improving social health also
2. Improve efficiency

--- Content provided by FirstRanker.com ---






JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY: KAKINADA

--- Content provided by FirstRanker.com ---

KAKINADA ? 533 003, Andhra Pradesh, India



AUDIT 1 and 2: PERSONALITY DEVELOPMENT THROUGH LIFE

--- Content provided by FirstRanker.com ---

ENLIGHTENMENT SKILLS
Course Objectives
1. To learn to achieve the highest goal happily
2. To become a person with stable mind, pleasing personality and determination
3. To awaken wisdom in students

--- Content provided by FirstRanker.com ---

Syllabus
Unit
Content
Hours
1

--- Content provided by FirstRanker.com ---

Neetisatakam-Holistic development of personality
4
Verses- 19,20,21,22 (wisdom)
Verses- 29,31,32 (pride & heroism)
Verses- 26,28,63,65 (virtue)

--- Content provided by FirstRanker.com ---

2
Neetisatakam-Holistic development of personality
4
Verses- 52,53,59 (dont's)
Verses- 71,73,75,78 (do's)

--- Content provided by FirstRanker.com ---

3
Approach to day to day work and duties.
4
Shrimad Bhagwad Geeta : Chapter 2-Verses 41, 47,48,
4

--- Content provided by FirstRanker.com ---

Chapter 3-Verses 13, 21, 27, 35, Chapter 6-Verses 5,13,17, 23, 35,
4
Chapter 18-Verses 45, 46, 48.
5
Statements of basic knowledge.

--- Content provided by FirstRanker.com ---

4
Shrimad Bhagwad Geeta: Chapter2-Verses 56, 62, 68
Chapter 12 -Verses 13, 14, 15, 16,17, 18
6
Personality of Role model. Shrimad Bhagwad Geeta: Chapter2-Verses 4

--- Content provided by FirstRanker.com ---

17, Chapter 3-Verses 36,37,42,
Chapter 4-Verses 18, 38,39
Chapter18 ? Verses 37,38,63
Suggested reading
1. "Srimad Bhagavad Gita" by Swami Swarupananda Advaita Ashram (Publication Department),

--- Content provided by FirstRanker.com ---

Kolkata
2. Bhartrihari's Three Satakam (Niti-sringar-vairagya) by P.Gopinath, Rashtriya Sanskrit
Sansthanam, New Delhi.
Course Outcomes
Students will be able to

--- Content provided by FirstRanker.com ---

1. Study of Shrimad-Bhagwad-Geeta will help the student in developing his personality and
achieve the highest goal in life
2. The person who has studied Geeta will lead the nation and mankind to peace and prosperity
3. Study of Neetishatakam will help in developing versatile personality of students
***

--- Content provided by FirstRanker.com ---