+ All Categories
Home > Documents > Department of Information Technology COURSE · PDF fileDepartment of Information Technology...

Department of Information Technology COURSE · PDF fileDepartment of Information Technology...

Date post: 17-Mar-2018
Category:
Upload: nguyenxuyen
View: 220 times
Download: 1 times
Share this document with a friend
166
Department of Information Technology COURSE STRUCTURE &SYLLABUS B.Tech. 7 th semester Code Name of the Subject Lectures Tutorials Practical Credits IT4421 Artificial Intelligence 3 1 4 IT4422 Network Programming 3 1 4 CSE4423 Mobile Computing 3 1 4 Elective – III 3 1 4 IT4423 Information Retrieval Systems IT4424 Robotics & Automation IT4425 Software Design Methodologies Elective- IV 3 1 4 CSE4421 Middleware Technologies ECE Digital Image Processing CSE 3413 Information Security IT4226 Data Warehousing & Data Mining Lab 3 2 IT4227 Network Programming Lab 3 2 Internship 2 Mini Project 2 Total 15 5 28
Transcript

Department of Information Technology COURSE STRUCTURE &SYLLABUS B.Tech. 7th semester

Code Name of the Subject Lectures Tutorials Practical Credits

IT4421 Artificial Intelligence

3 1 4

IT4422 Network Programming 3 1 4

CSE4423 Mobile Computing 3 1 4

Elective – III 3 1 4

IT4423 Information Retrieval Systems

IT4424 Robotics & Automation

IT4425 Software Design Methodologies

Elective- IV 3 1 4

CSE4421 Middleware Technologies

ECE Digital Image Processing

CSE 3413 Information Security

IT4226 Data Warehousing & Data Mining Lab

3 2

IT4227 Network Programming Lab 3 2

Internship 2

Mini Project 2

Total 15 5 28

B.Tech. 8th semester

Code Name of the Subject Lectures Tutorials Practical Credits

HS3406 Management Science 3 1 - 4

Elective- V 3 1 - 4

CSE4424 Multimedia Systems

-

IT4428 Bio-metrics

-

IT4429 Network Management Systems

-

Elective –VI 3

1 4

CSE4426 Bioinformatics

-

IT4430 Design Patterns

-

IT4431 Human Computer Interaction

Main Project 12

Total 09 03 24

B.Tech7thSemester SYLLABUS

(Applicable to 2012-2013 Admitted batch)

Course Title: ARTIFICIAL INTELLIGENCE Course C ode: IT4421 L T P C 3 1 0 4 Course objectives: Students undergoing this course are expected to:

• Know the AI problems, techniques and the different heuristic search techniques. • Represent the knowledge in different forms and analyze their suitability to computer. • Know the different ways of planning and natural language understanding and how to apply to

computer. • Analyze different methods of learning and its applicability to computer. • Know about the architecture of an Expert System

Course outcomes: After undergoing the course, Students will be able to:

• Use the heuristic search techniques for AI related problems. • Represent knowledge in suitable forms for computer processing. • Apply the natural language processing techniques to solve real life problem. • Apply different m/c learning techniques to design computational models .

UNIT- I (12 + 4 Hours) Introduction: AI problems, AI techniques, defining problem as a state space search, production systems, problem characteristics, production system characteristics. Heuristic search techniques:Generate-and-test, hill climbing, best-first-search, problem reduction, constraint satisfaction, means-ends-analysis UNIT-II (11+ 3 Hours) Knowledge representation: Issues, predicate logic, resolution, representing knowledge using rules, forward versus backward reasoning, matching, control knowledge, weak slot and filler structure- semantic nets, frames, strong slot and filler structures-conceptual dependency, scripts UNIT- III (11+ 4 Hours) Game playing: mini-max search, alpha-beta cutoffs, planning system, goal stack planning, hierarchical planning, understanding as constraint satisfaction, waltz algorithm, natural language processing, syntactic processing, semantic analysis,case grammars. UNIT- IV (11+ 4 Hours) Learning: Rote learning, learning by taking advice, learning in problem solving, learning from examples, winston’s learning program, decision trees, perception, vision, speech recognition, navigation, manipulation, robot architecture, Expert systems, shell, explanation, knowledge acquisition. Text Books:

1. Artificial Intelligence, 3rd edition, E.Rich and K.Knight, TMH 2. Artificial Intelligence A modern Approach, RusselNorvig, Pearson Education

Reference Books:

1. Artificial Intelligence, third edition, Patrick henry Winston, Pearson Education Asia 2. Introduction to Artificial intelligence and Expert Systems, Dan W. Patterson, PHI

B.Tech7thSemester SYLLABUS

(Applicable to 2012-2013 Admitted batch) Subject Name :NETWORK PROGRAMMING Subject code:IT4422

L T P C 3 1 0 4

Course Objectives:

This course content enables students to:

1. Understand the intricacies in developing client server applications

2. Differentiate between various connection oriented and connectionless protocols

3. Analyze various SOCKETs in IPV4, IPV6 & ICMPV6 4. Implement applications using I/O Multiplexing and socket options

5. Gain and implement the concepts of Inter-process Communications

Course Outcomes:

After undergoing this course, students will be able to

1. Comprehend Networking concepts. 2. Differentiate various network protocols like TCP, UDP etc. 3. Compare SOCKETs in IPV4, IPV6 & ICMPV6 4. Implement different types of communications inLAN. 5. Demonstrate Inter Process Communication.

UNIT I

Python Basic (10+3) hrs

Installing python,Scope and uses of python, Accessing python interpreter,importing modules and getting helps,Basic data types: number, string, list, tuple, dictionary and sets. Python input and output, Decision making and looping in Python(if, elif, else, while, for). Functions, class and object, Exception handling, Files and Directories; reading and writing text files, creating and removing directories.

UNIT II

Network Programming Fundamentals (8+3) hrs

Network architecture, protocol stack and layering, ip addressing and subnet mask, OSI and TCP/IP model, Internet architecture, application programming interface (API), Network addressing, Standard ports, UNIX Networking Commands;

netstat, ifconfig, ping, traceroute, tcpdump, sock, telnet, rlogin,sshetc, client server concepts.

UNIT III

Sockets Programming (17+5) hrs

Introduction to sockets, Type of sockets(Steam and Datagram), address and port, TCP Socket call and UDP Socket call block diagram, Python Socket Module; socket, bind, listen, accept, connect, read, write, close , Basic example: TCP echoserver and TCP echoclient, UDP echoserver, UDP echoclient, Python Chat server and Chat client, Handling multiple clients at once; the select module, python Threading module.

UNIT IV

Advanced Network Programming (10+4) hrs

Python and the web, CGI, Twisted (networking framework for Python ), some popular python modules: smtplib, httplib, poplib, Programming for the Web; Retrieving web pages with http, Parsing HTML data, XML and XMLRPC, Electronic mail; sending mail, Developing Network server program.

Text Book:

1) Foundations of Python Network Programming by JOHN GOERZEN, APPRESS Publication

REFERENCE

1) Beginning Python By: James Payne, Wiley India Pvt. Ltd, Publication 2) Learning Python, By David Ascher, Mark Lutz, O'Reilly Publication

B.Tech7thSemester SYLLABUS

(Applicable to 2012-2013 Admitted batch)

Course Title : MOBILE COMPUTING Course Code :CSE4423

L T P C 3 1 0 4 Course Objectives: The course content enables students to:

� Differentiate between various medium access schemes � Understand the concept of Mobile IP and packet delivery � Know the importance of Wireless Sensor Networks � Configure an Ad hoc network using NS3

Course Outcomes: At the end of the course students are able to:

� Demonstrate knowledge of different voice and data communication standards � Analyze the need for optimizations in Mobile IP � Distinguish between proactive and reactive routing in an Ad hoc network � Develop simple app using Android

UNIT – I 12+4

Mobile Communications - Overview: Wireless transmission, voice and data communication standards – 1G/2G/3G/4G, WPAN, WLAN, applications, limitations, mobile computing architecture, overview on mobile devices and systems

Wireless Medium Access Control: Motivation for a specialized MAC (Hidden and exposed terminals, Near and far terminals, MACA), modulation, Spread spectrum, SDMA, FDMA, TDMA, CDMA

GSM: services, system architecture, radio interface, localization, call handling, handover, security, GPRS, EDGE

UNIT – II 10+3

Mobile Network Layer: Mobile IP, IP packet delivery, agent advertisement and discovery, registration, tunneling and encapsulation, optimizations, Dynamic Host Configuration Protocol

Mobile Transport Layer: Traditional TCP, Indirect TCP, Snooping TCP, Mobile TCP

UNIT – III 12+4

Mobile Ad hoc Network (MANET): Introduction, Properties, applications, limitations, routing issues, routing algorithms – proactive (DSDV & OLSR) and reactive (DSR & AODV)

Wireless Sensor Network (WSN): Introduction, architecture, applications, security in ad hoc networks

Wireless LAN: IEEE 802.11, System architecture, Protocol layers

UNIT – IV 11+4

Network Simulator: Overview on different network simulators (NS2,NS3,Qualnet, Omnet++, Netsim etc.), configuration of MANET and WSN on NS2/NS3 Mobile OS: Overview on different mobile Oss (Android OS, IOS, Windows 8, Blackberry OS etc.), Android OS architecture, app development examples Wireless Application Protocol (WAP): Introduction, architecture

Text Books:

1. Mobile Computing, Raj Kamal, Oxford press, Second Edition 2. Mobile Communications, Jochen Schiller, Pearson Education, Second Edition

Reference Books:

1. Mobile Computing, Asoke K Talukder, Hasan Ahmed and RoopaYavagal, McGraw Hill 2. Fundamentals of Mobile Computing, Prasant Kumar Pattnaik and Rajib Mall, PHI Learning 3. http://www.isi.edu/nsnam/ns/doc/ns_doc.pdf (NS2 manual)

B.Tech7thSemester SYLLABUS

(Applicable to 2012-2013 Admitted batch)

Course Title : INFORMATION RETRIEVAL SYSTEMS Course Code : IT4423

L T P C 3 1 0 4 Course Objectives: The course content enables students to:

� Understand the Functionalities of IRS � Create indices to extract data efficiently from Information Storage � Learn document management, retrieval and searching the web. � Apply Clustering for the data to be stored to IRS � Understand working of Search Engines and ways to improve them. � Know about hypermedia architectures, design and usability of IRS

Course outcomes:

At the end of the course the students are able to:

� Learn Classical and advanced techniques employed by Web Search engines � Know different ways of representation and retrieval of documents. � Apply techniques of preprocessing needed for IRS � Develop an IRS by using different user search techniques and text search algorithms

UNIT- I 11+3 Hrs Introduction : Definition, Objectives, Functional Overview, Relationship to DBMS, Digital libraries and Data Warehouses. Information Retrieval System Capabilities: Search, Browse, Miscellaneous. UNIT-II 12+4 Hrs Cataloging and Indexing: Objectives, Indexing Process, Automatic Indexing, Information Extraction. Data Structures: Introduction, Stemming Algorithms, Inverted file structures, N-gram data structure, PAT datastructure, Signature file structure, Hypertext data structure. UNIT- III 11+4 Hrs Automatic Indexing: Classes of automatic indexing, Statistical indexing, Natural language, Concept indexing, Hypertext linkages Document and Term Clustering: Introduction, Thesaurus generation, Item clustering, Hierarchy of clusters. UNIT IV 11+4 Hrs User Search Techniques: Search statements and binding, Similarity measures and ranking, Relevance feedback, Selective dissemination of information search, Searching the Internet and hypertext, Information Visualization

Text Search Algorithms : Introduction, Software text search algorithms, Hardware text search systems. Text Books:

1. Kowalski, Gerald, Mark T Maybury: Information Retrieval Systems: Theory and Implementation,

Kluwer Academic Press, 1997.

Reference Books:

1. Frakes, W.B., Ricardo Baeza-Yates: Information Retrieval Data Structures and Algorithms, Prentice

Hall, 1992.

2. Modern Information Retrieval By Yates Pearson Education.

3. Information Storage & Retrieval By Robert Korfhage – John Wiley & Sons.

B.Tech7thSemester SYLLABUS

(Applicable to 2012-2013 Admitted batch) Course Title: ROBOTICS AND AUTOMATIONCourse Code: IT4424

L T P C 3 1 0 4 COURSE OBJECTIVE(S):

The course content enables students to:

• Learn the basic concepts, parts of robots and types of robots. • Make familiar with the various drive systems for robot, sensors and their applications in robots

and programming of robots.

• Lean different Robot kinematics and dynamics, latest algorithms & analytical approaches • Know the various applications of robots, justification and implementation of robot.

COURSE OUTCOME(S):

At the end of the course students are able to :

• Design an Industrial robot with robotic control using the principle behind robotic drive system like dynamic constraints and programming.

• Choose the appropriate Sensor and Machine vision system for a given application. • Demonstrate an ability to apply spatial transformation to obtain forward kinematics equation of

robot manipulators. • Solve inverse kinematics of simple robot manipulators and obtain the Jacobian matrix and use

it to identify singularities in serial and parallel robots. • Demonstrate knowledge of robot controllers and to generate joint trajectory for motion

planning.

UNIT I 12+4 Hrs

INTRODUCTION: Specifications of Robots- Classifications of robots – Work envelope - Flexible automation versus Robotic technology – Applications of Robots

ROBOT KINEMATICS AND DYNAMICS: Positions, Orientations and frames, Mappings: Changing descriptions from frame to frame, Operators: Translations, Rotations and Transformations - Transformation Arithmetic - D-H Representation -Forward and inverse Kinematics of Six Degree of Freedom Robot Arm – Robot Arm dynamics

UNIT II 12+4 Hrs

ROBOT DRIVES AND POWER TRANSMISSION SYSTEMS Robot drive mechanisms, hydraulic – electric – servomotor- stepper motor - pneumatic drives, Mechanical transmission method - Gear transmission, Belt drives, cables, Roller chains, Link - Rod systems - Rotary-to-

Rotary motion conversion, Rotary-to-Linear motion conversion, Rack and Pinion drives, Lead screws, Ball Bearing screws

MANIPULATORS: Construction of Manipulators, Manipulator Dynamic and Force Control, Electronic and Pneumatic manipulators

UNIT III 12+4 Hrs

ROBOT END EFFECTORS: Classification of End effectors – Tools as end effectors. Drive system for grippers-Mechanical adhesive-vacuum-magnetic-grippers. Hooks & scoops. Gripper force analysis and gripper design, Active and passive grippers.

PATH PLANNING & PROGRAMMING: Trajectory planning and avoidance of obstacles, path planning, skew motion, joint integrated motion – straight line motion-Robot languages -.computer control and Robot software.

UNIT IV 9+3 Hrs

AUTOMATION: Automation in Manufacturing, Robot Application in Industry, Task Programming, Goals of AI Research, AI Techniques, Robot Intelligence and Task Planning, Modern Robots, Future Application and Challenges and Case Studies.

TEXT BOOKS:

1. “Robotics Technology and Flexible Automation”, Deb S. R. and Deb S., Tata McGraw Hill Education Pvt. Ltd, 2010. 2. “Introduction to Robotics”, John J. Craig , Pearson, 2009. 3. "Industrial Robots - Technology, Programming and Applications", Mikell P. Grooveret.al., McGraw Hill, New York, 2008. REFERENCES:

1. "Robotics Engineering – An Integrated Approach", Richard D Klafter, Thomas A Chmielewski, Michael Negin, Eastern Economy Edition, Prentice Hall of India Pvt. Ltd., 2006. 2. "Robotics : Control, Sensing, Vision and Intelligence", Fu K S, Gonzalez R C, Lee C.S.G, McGraw Hill, 1987.

B.Tech7thSemester SYLLABUS

(Applicable to 2012-2013 Admitted batch) Course Title: Software Design Methodologies Course Code: IT4425 L T P C 3 1 0 4

COURSE OBJECTIVE(S):

The course content enables students to :

� Learn about the art of design and quality parameters of software projects. � Know about software architectural models � Understand architectural available patterns � Identify proper design models for implementation – SAAM, and HASARD Models

COURSE OUTCOME(S): At the end of the course students will be able to :

� Implement Optimized level based design models at design phase. � Design various software architectures with visual notations � Evaluate the software design methods � Analyze different model based modules for minimizing faults at code phase

UNIT I (12+4) Basic concepts of Design: Introduction, Characteristics of design activities, Essential elements of designs Design Quality: Software quality models: Hierarchical models, Relational models,The effect of design on software quality: efficiency, Correctness and reliability,Portability, Maintainability, Reusability, Interoperability Quality attributes of software design: Witt, Baker and Merritt’s designobjectives ,Parnas and Weiss’s requirements of good designs, Quality of developmentprocess Design Principles: Basic rules of software design: Causes of difficulties, Vehicles toovercome difficulties, Basic rules of software design Design processes: The context of design in software development process, Genericdesign process: descriptive models, structure of software design methods UNIT II: Software Architecture: (10+4) The notion of architecture: Architecture in the discipline of buildings, Architecture inthe discipline of computer hardware, the general notion of architecture. The notion ofsoftware architecture: Prescriptive models, Descriptive models, Multiple view models,the roles of architecture in software design.

UNIT III (12+4) Typical Architectural Styles: Data flow- The general data flow styles, the pipeandfilter sub-style, the batch sequential processing sub-style. Independent components: the general independent components style, the eventbasedimplicit invocation systems sub-style Using Styles In Design: Choices of styles, Combinations of styles, Hierarchical heterogeneous styles,simultaneously heterogeneous styles, Locationally heterogeneous styles, Architectural Design space: Theory of design spaces: Structure of design spaces,solving design synthesis and analysis problems, Design space of architecturalelements: Behavior features, static features, Static features UNIT IV: (11+3) Analysis and Evaluation: The concept of scenario, scenarios for evaluating modifiability, Scenarios for evaluating reusability, specification of operational profiles,evaluation and analysis of performance, Scenarios for evaluating reusability. Analysis and Evaluation of Modifiability: The SAAM Method:The input and output, the process (Activities in SAAM Analysis) Model-Based Analysis: The HASARD Method: Representation of quality models,construction of quality models, Hazard identification, Cause- consequence analysis,assembling graphic model, Identification of quality concerns TEXT BOOK: 1. Software Design Methodology: From Principles to Architectural Styles ,Hongzhu, Elsevier,2009 REFERENCE BOOKS: 1. Software Architecture: Perspectives on an Emerging discipline, Shaw, M.,Garlan,PEA, 2008. 2. Software Architecture in Practice, Bass, L., Clements P,Kazman, PEA,2003 3. Evaluating Software Architectures: Methods and Case Studies, Clements,Kazman, Klien, PEA, 2002

B.Tech7thSemester SYLLABUS

(Applicable to 2012-2013 Admitted batch)

Course Title: MIDDLEWARE TECHNOLOGIESCourse Code: I T4421

L T P C 3 1 0 4 COURSE OBJECTIVES: The course content enables students to:

• Understand different types, benefits and pitfalls of client server computing models.

• Establish communication between client and server through java RMI and JDBC. • Implement C#.Net applications using Assemblies, and Callback Interfaces.

• Develop client server applications using heterogeneous programming languages with CORBA • Learn java bean component model with EJBS and CORBA.

COURSE OUTCOMES: At the end of the course students are able to:

• Choose appropriate client server computing model for given problem. • Design a dynamic remote application with RMI and JDBC Connectivity.

• Develop client server applications using C#.net • Select appropriate language for homogeneous and heterogeneous objects.

• Develop real time projects by combining CORBA and database interfacing UNIT – I 11+4 Introduction to client server computing: Evolution of corporate computing models from centralized toDistributed computing,client server models. Benefits of client server computing, pitfalls of client serverProgramming.

Advanced Java: Review of Java concept like RMI, and JDBC.

UNIT – II 11+4 Introducing C# and the .NET Platform; Understanding .NET Assemblies, Object –Oriented Programmingwith C#, Callback Interfaces.

Building c# applications: Type Reflection, Late Binding, and Data Access with ADO.NET.

UNIT-III 12+3 Core CORBA / Java: Two types of Client/ Server invocations-static, dynamic. The static CORBA, firstCORBA program, ORBlets with Applets, Dynamic CORBA-The portable count, the dynamic count

Existential CORBA: CORBA initialization protocol, CORBA activation services, Introduction to SOA

UNIT-IV 11+4 Java Bean Component Model: Events, properties, persistency, Introspection of beans, CORBABeans.

EJBs and CORBA: Object transaction monitors CORBA OTM’s, EJB and CORBA OTM’s, EJBcontainer frame work, Session and Entity Beans.

Text Books: 1. Client/Server programming with Java and CORBA Robert Orfali and Dan Harkey, John Wiley & Sons,SPD 2nd Edition

2. Java programming with CORBA 3rd Edition, G.Brose, A Vogel and K.Duddy, Wiley-dreamtech, IndiaJohn wiley and sons

Reference Books: 1. Distributed Computing, Principles and applications, M.L.Liu, Pearson Education 2. Client/Server Survival Guide 3rd edition Robert Orfali Dan Harkey& Jeri Edwards, John Wiley & Sons 3. C# Preciesely Peter Sestoft and Henrik I. Hansen, Prentice Hall of India

B.Tech7thSemester

SYLLABUS (Applicable to 2012-2013 Admitted batch)

Course Title: DIGITAL IMAGE PROCESSING Course Code: ECE 4431

L T P C 3 1 0 4

Course Objectives:

Students undergoing this course are expected to:

1. Be familiar with basic concepts , image manipulations and methodologies for digital image processing

2. Learn various image processing techniques like image enhancement, restoration 3. know segmentation ,image compression 4. Understand pseudo and full color processing 5. appreciate the usage of image transforms in image processing 6. Know about MATLAB tool for image processing

Course Outcomes:

After undergoing the course students will be able to

1. appreciate image manipulations and different digital image processing techniques in various fields.

2. Perform basic operations like – Enhancement, Image transform and restoration techniques on image.

3. make use of image segmentation , compression for various applications.

4. Analyze pseudo and full color image processing techniques.

5. Apply the various image transforms used in image processing

6. apply MATLAB to implement the image processing techniques.

UNIT I 18 hours

Digital Image Fundamentals: Fundamental steps in Digital image processing, Digital image representation, Elements of visual perception, light and electromagnetic spectrum, Image sensing and acquisition, Image sampling and quantization, basic relationships between pixels. An introduction to mathematical tools in digital image processing

Color Image Processing: Color fundamentals, color models, Pseudo color Image Processing, Full Color Image Processing , color transformations.

UNIT II 16 hours

Image transforms: : 2D DFT and its properties, Discrete cosine transform, STFT, Introduction to Wavelet. Image Enhancement : Enhancement in spatial domain, Intensity transformations, Histogram Processing, , smoothing and sharpening. Image Enhancement in Frequency Domain Filters, Smoothing Frequency Domain Filters, Sharpening Frequency Domain Filters,

UNIT III 12 hours

Color image enhancement: Image smoothing and sharpening-spatial domain and frequency domain

Image Restoration: A Model of the Image Degradation/Restoration Process, Linear Position-Invariant Degradations, Inverse filtering, Minimum Mean Square Error (Wiener) Filter, Constrained Least squares filtering.

UNIT IV 14 hours

Image segmentation: Fundamentals, point, Line and Edge detection, ,Thresholding, Region based Segmentation.

Image Compression: Fundamentals, Image Compression Models, Elements of Information Theory,Error Free Compression, Lossy Compression, Image compression using DCT and DWT, Introduction to Digital Image water marking.

Text Book:

1. RafelC.Gonzalez and Richard E.Woods, “Digital Image Processing”, Pearson Education,3 rd edition 2011

Reference Books:

1. Anil K. Jain, “Fundamentals of Digital Image Processing”, 2003, Pearson Education.

2. S.JayaramanS.EsakirajanT.Veerakaumar” Digital Image Processing” McGraw Hill publishres, 2009

3. S.Sridhar,” Digital Image Processing” oxford publishers, 2011

4. Chanda&Majumdar, “Digital Image Processing and Analysis” 2003, PHI.

5. M.Sonka,V. Hlavac, R. Boyle, “Image Processing, Analysis and Machine Vision”, Vikas

Publishing House

B.Tech7thSemester SYLLABUS

(Applicable to 2012-2013 Admitted batch)

Course Title: Information Security Course Code: CSE 3413 L T P C 3 1 0 4 Course Objectives:

The course content enables students to :

� Understand about various Conventional Encryption Principles designed for providing security.

� Learn public key cryptography, key management principles and Learn Pretty Good Privacy (PGP) which is a computer program that provides cryptographic privacy and authentication.

� Learn IP Security fundamentals, architecture and identifying the key features IP security system.

� Understand about general requirements for Web security, which focus on standardized schemes.

Course Outcomes:

At the end of the course students are able to :

� To analyze a given system with respect to security of the system. � To create an understanding of Authentication functions the manner in which Message

Authentication Codes and Hash Functions works. � To examine the issues and structure of Authentication Service and Electronic Mail Security � Understand conventional and public key cryptographic approaches used in message

encryption. � Able to identify various types of attacks and its effect over the networks.

UNIT – I: (12+3)

Introduction: Security Attacks (Interruption, Interception, Modification and Fabrication), Security Services (Confidentiality, Authentication, Integrity, Non-repudiation, access Control and Availability), TCP session hijacking, UDP hijacking, ARP attacks, & Man-in-the-Middle Attacks. OSI Security Architecture - Classical Encryption techniques – Cipher Principles. Conventional Encryption Principles: Conventional encryption algorithms - Data Encryption Standard (DES), Blowfish, CAST-128, Block Cipher Design Principles and cipher block Modes of Operation, Evaluation criteria for AES Cipher. UNIT-II: (11+4) Public Key Cryptography: Public key cryptography principles, public key cryptography algorithms, digital signatures. Digital Certificates, Certificate Authority and key management Authentication & Hash Function: Authentication requirements – Authentication functions – Message Authentication Codes – Hash Functions – Security of Hash Functions and MACs – MD5 message Digest algorithm - Secure Hash Algorithm –RIPEMD-HMAC Digital Signatures – Authentication Protocols – Digital Signature Standard.

UNIT-III: (11+4) Network Security Authentication Applications: Kerberos – X.509 Authentication Service – Electronic Mail Security – PGP – S/MIME IP Security: IP Security Overview, IP Security Architecture, Authentication Header, Encapsulating Security Payload, Combining Security Associations and Key Management. UNIT – IV: (11+4) Web Security: Web Security Requirements, Secure Socket Layer (SSL) and Transport Layer Security (TLS), Secure Electronic Transaction (SET). System Level Security Intrusion detection – password management – Viruses and related Threats – Virus Counter measures – Firewall Design Principles – Trusted Systems. Text Books: 1. Network Security Essentials (Applications and Standards) by William Stallings Pearson Education. 2. Hack Proofing your network by Ryan Russell, Dan Kaminsky, Rain Forest Puppy, Joe Grand, David Ahmad, Hal Flynn IdoDubrawsky, Steve W.Manzuik and Ryan Permeh, wileyDreamtech. References: 1. AtulKahate, “Cryptography and Network Security”, Tata McGraw-Hill, 2003. 2. William Stallings, “Cryptography and Network Security – Principles and Practices”, PrenticeHallofIndia,ThirdEdition,2003 3. Charles B. Pfleeger, Shari LawrencePfleeger, “Security in Computing”, Third Edition, Pearson Education, 2003.

B.Tech7thSemester SYLLABUS

(Applicable to 2012-2013 Admitted batch) Course Title: DatawWarehousing and Data Mining LAB Course Code:IT2226 L T P C 0 0 3 2 COURSE OBJECTIVE(S): The course content enables students to:

• Conceptualize the data mining problem • Perform Preprocessing on different raw data sets • Analyze and visualize the data with data mining techniques • Perform predictive modeling • Generate association rules for business data

COURSE OUTCOME(S): At the end of the course students are able to:

• Implement the algorithms to solve data mining problem using WEKA tool • Identify an appropriate method to apply in a given situation • Communicate results in terms relevant to science, business etc. • Apply different clustering techniques to characterize subgroups.

Course Contents

Study and Implement the following by using WEKA/ Clementine

1. Introduction to Graphical User Interface (GUI) of WEKA 2. Perform Data Pre-processing on sample data sets 3. Introduction to IBM SPSS Modeler and nodes palette 4. Preparing the data for analysis using data audit node. 5. Automated data preparation using data audited node. 6. Perform Association Analysis to derive the association rules. 7. Implement the Classification using Decision Tree Induction. 8. Classification using Regression. 9. Bayesian Classification. 10. Classifying telecommunications churn by using Binomial Regression. 11. Market basket analysis using rule induction/C5.0. 12. Predicting Loan defaulters using Bayesian Networks. 13. K-means clustering. 14. Hierarchical clustering.

B.Tech7thSemester SYLLABUS

(Applicable to 2012-2013 Admitted batch) Course Title: NETWORK PROGRAMMING LABCourse Code:I T2227

L T P C 0 0 3 2 Course Objectives:

Thislab course content enables students to:

• Understand the basics concepts of socket programming.

• Analyze various concepts of network programming such as multiplexing, addressing, routing, reliable/unreliable transmission protocols.

• Develop high performance scalable applications using threads.

• Evaluate various network management protocols & practical issues.

Course Outcomes:

After undergoing this course, students will be able to

• Develop and implement distributed applications and protocols over intranet using Network Programming concepts.

• Apply contemporary theories, processes and tools in the development and evaluation of solutions to problems in network programming.

• Evaluate basic theories, processes and outcomes of network programming. • Apply theory, techniques and relevant tools to the specification, analysis, design,

implementation and testing of a simple network programs. • Carry out Research and development tasks in networking.

List of Experiments:

1. ImplementthefollowingformsofIPC.

a)Pipes

b)FIFO

2. Writeaprogramtocreateanintegervariableusingsharedmemoryconceptandecrementthevariablesimultaneously bytwoprocesses.Use semaphorestoavoidrace conditions.

3. Simple echo-server and echo-client implementing both TCP and UDP socket.

4. Write a program to obtain the Local & Remote Socket Address.

5. Write a program to create a Telnet Client.

6. Write a program to create an FTP Client

7. Implement basicchat server and client.

8. Write a program to obtain the Information about the (A) Host (B) Network (C) Protocols (D) Domains

9. Chat server and client with select and threading module.

10. To Design TCP client and server application to transfer file.

11. Design a RPC application to add and subtract a given pair of integers

12. Implement the web server.

Reference Books:

1) Foundations of Python Network Programming, 2nd Edition, The comprehensive guide to building network applications with Python by John Goerzen, Brandon Rhodes, Apress Publications.

2) Python Network Programming Cookbook by Dr M O FaruqueSarker, Packt Publishing. 3) Java Network Programming by Elliotte Rusty Harold 4) A Complete Treatment of Network Programming and Cryptography in Java by Merlin Hughes. 5) UNIX Network Programming: The Sockets Networking by Stevens W. Richard

B.Tech- 8th Semester

SYLLABUS

(Applicable to 2012-2013 Batch)

Course Title : Management Science Course Code: HS3406 L T P C 3 1 0 4 Course Objectives: The course content enables students to:

1. Understand the concepts of management, administration and organization 2. Know the concepts of work study and how it is carried out. 3. Gain the relevant knowledge in the field of staff selection procedure and training 4. Evaluate the environmental scanning 5. Avoid common pitfalls and mistakes in managing projects

Course Outcomes: At the end of the course students are able to:

1. Plan, organize, direct and control the functions and forms of an organization 2. Apply the knowledge of work study and its application in the day-to-day life 3. Synthesize information regarding the effectiveness of recruiting methods and the validity of

selection procedure, and make appropriate staffing decisions 4. Analyze companies’ internal and external resources and capabilities 5. Evaluate a project, develop the scope of work, provide accurate cost estimates and to plan the

various activities

UNIT- I: (12+3*) Introduction to Management: Concepts of Management – Nature, Importance and Functions of Management – Taylor’s Scientific Management Theory, Fayol’sTheory and its Principles of Management, Mayo’s Hawthorne Experiments, Maslow’s Theory of Human Needs, Douglas McGregor’s Theory X and Theory Y. Forms of Organization Structures: Types of organization structures: Line organization, Line and staff organization, Functional organization, Committee organization, matrix organization, structure and their merits and demerits.

UNIT- II : (11+4*) Operations Management: Principles and Types of Plant Layout – Methods of production: Job, batch and Mass Production – Work Study: Basic procedure involved in Method Study and Work Measurement. Materials Management: Objectives, Need for Inventory control, EOQ, ABC Analysis, Purchase Procedure, Stores Management and Stores Records. MarketingManagement:Functions of Marketing, Marketing strategies based on Product Life Cycle, Channels ofdistribution.

UNIT- III: (11+3*)

Human Resources Management (HRM) : Concepts of HRM – Basic functions of HR Manager: Manpower planning, Recruitment,Selection, Training and Development, Placement, Wage and Salary Administration, Promotion,Transfer,Separation, Performance Appraisal,Job Evaluation and Merit Rating.

Strategic Management: Mission, Goals, Objectives, Policy, Strategy, Programmes – Elements of Corporate Planning Process – Environmental Scanning, SWOT Analysis. UNIT- IV: (11+5*) Project Management: Introduction – Project Life Cycle and its phases – Role of Project Manager - Project Selection Methods and Criteria – Network Analysis, Programme Evaluation and Review Technique (PERT),Critical Path Method (CPM), Identifying critical path, Probability of Completing the project within given time, Project Cost Analysis, Project Crashing(simple problems) Contemporary Management Practices : Basic concepts of MIS, End User Computing, Materials Requirement Planning (MRP), Just-In-Time (JIT) System, Total Quality Management (TQM), Six sigma and Capability Maturity Model (CMM) Levels, Supply Chain Management, Enterprise Resource Planning (ERP), Performance Management, Business Process outsourcing (BPO). (Note: We will have only short questions from thispart.No essay questions) Text Books:

1. Dr. A R Aryasri : Management Science, TMH, New Delhi, 2013. 2. Dr P Vijaya Kumar &Dr N AppaRao Management Science Cengage, New Delhi 2012

Reference Books: 1. Koontz &Weihrich: Essentials of Management, 6/e, TMH, 2007 2. Principles and Practice of Management, L.M.Prasad, Sultan Chand and Sons, 2007 3. Phillips Kotler& Armstrong- Principles of Marketing- Pearson. 4. KanishkaBedi- Productionand Operations Management, Oxford University Press, New

Delhi 2011. 5. Project Management by R.B.Khanna, PHI Learning Pvt. Ltd. New Delhi, 2011. 6. Project Management by R. PanneerSelvam&P.Senthil Kumar, PHI Learning Pvt. Ltd. New

Delhi, 2009.

B.Tech- 8th Semester

SYLLABUS

(Applicable to 2012-2013 Batch)

Course Title : Multimedia Systems Course Code: CSE L T P C 3 1 0 4

Course Objective:

The course content enables students to:

� Employ different realizations of multimedia tools. � Put into practice various multimedia applications and Action scripts. � Examine various storage technologies. � Relate video compression Techniques for real time applications.

Course Outcome:

At the end of the course students are able to:

� Use different realizations of multimedia tools. � Implement various multimedia applications and Action scripts. � Analyze various storage technologies. � Apply video compression Techniques for real time applications.

UNIT-I 12+4

Fundamental concepts in Text and Image: Multimedia and hypermedia, World Wide Web, overview of multimedia software tools. Graphics and image data representation graphics/image data types, file formats, Color in image and video: color science, color models in images, color models in video. Fundamental concepts in video and digital audio: Types of video signals, analog video, digital video, digitization of sound, MIDI

UNIT – II 11+4 Action Script I: ActionScript Features, Object-Oriented ActionScript, Datatypes and Type Checking, Classes, Authoring an ActionScript Class. Action Script II: Inheritance, Authoring an ActionScript 2.0 Subclass, Interfaces, Packages, Exceptions.

UNIT – III 11+3 Application Development: An OOP Application Frame work, Using Components with ActionScript MovieClip Subclasses.

Multimedia data compression: Lossless compression algorithm: Run-Length Coding, Variable Length Coding, Dictionary Based Coding, and Arithmetic Coding.

UNIT – IV 11+4

Basic Video Compression Techniques: Introduction to video compression, video compression based on motion compensation, search for motion vectors, MPEG.

TEXT BOOKS: 1. Fudamentals of Multimedia by Ze-Nian Li and Mark S. Drew PHI/Pearson Education. 2. Essentials ActionScript 2.0, Colin Moock, SPD O, REILLY.

REFERENCES: 1. Digital Multimedia, Nigel chapman and jenny chapman, Wiley-Dreamtech 2. Macromedia Flash MX Professional 2004 Unleashed, Pearson. 3. Multimedia and communications Technology, Steve Heath, Elsevier(Focal Press).

B.Tech- 8th Semester

SYLLABUS

(Applicable to 2012-2013 Batch)

Course Title: BIO-METRICS Course Code:IT4428 L T P C 3 1 0 4 Course Objectives: This course content enables students to:

• Understand the basic concepts of biometric technologies • Analyze available biometric systems • Implement some of the biometrics authentication systems • Evaluate quality of the biometric systems. • Explore ways to improve some of the current techniques

Course Outcomes: After undergoing this course, students will be able to

• Comprehend the fundamentals of biometrics • Analyzethe flow of processing in various biometrics modalities • Implement some of the biometrics authentication • Investigate ways to improve some of the existing techniques • Synthesize some of the biometrics authentication systems

UNIT I (11 +3) Hrs

Introduction – Benefits of biometric security – Verification and identification – Basic working of biometric matching – Accuracy – False match rate – False non-match rate – Failure to enroll rate – Derived metrics – Layered biometric solutions. Finger scan – Features – Components – Operation (Steps)– Competing finger Scan technologies– Strength and weakness. Types of algorithms used for interpretation,

UNIT II (11 +4) Hrs

Facial Scan -Features –Components – Operation (Steps) –Competing facial Scan technologies – Strength andweakness.

Iris Scan - Features –Components – Operation (Steps) – Competing iris Scan technologies –Strength and weakness. Voice Scan - Features – Components – Operation (Steps) – Competing voice Scan (facial)technologies – Strength and weakness. UNIT III (11 +4) Hrs Other physiological biometrics – Hand scan – Retina scan– AFIS (Automatic Finger PrintIdentification Systems) – Behavioral Biometrics – Signature scan- keystroke scan. UNIT IV (12 +4) Hrs Biometrics Application – Biometric Solution Matrix – Bio privacy – Comparison of privacy factor indifferent biometrics technologies – Designing privacy sympathetic biometric systems. Biometricstandards – (BioAPI , BAPI) – Biometric middleware, Biometrics for Network Security, Statisticalmeasures of Biometrics, Biometric transactions. TEXT BOOKS:

1. Biometrics – Identity Verification in a Networked World – Samir Nanavati, Michael Thieme, Raj Nanavati, WILEY- Dream Tech

2. Biometrics for Network Security- Paul Reid, Pearson Education.

REFERENCE BOOK: 1. Biometrics- The Ultimate Reference- John D. Woodward, Jr. Wiley Dreamtech.

B.Tech- 8th Semester

SYLLABUS

(Applicable to 2012-2013 Batch)

Course Title: Network Management Systems Course Code: IT4429 L T P C 3 1 0 4 Course Objectives: The course content enables students to:

� Understand design principles, network management architecture and protocols used in computer and telecommunication networks

� Learn about security marketplace, decision making when multiple parties are involved � Demonstrate the Simple Network Management Protocol (SNMP) and Open Systems

Interconnection (OSI) protocols. � Understand advanced information processing techniques such as distributed object

technologies, software agents, and internet technologies used for Network Management.

Course Outcome: At the end of the course the students are able to:

� Understand the fundamentals of telecommunication systems necessary for the effective management of organizations that develop and operate them

� Take short-term and long-term business and technical decisions � Analyze and maintain communication networks � Design a network project plan for an organization

UNIT – I (12+4) Hrs Basic Foundations, Standards and models: Introduction to Network Management Standards, Communications protocols, Network Management: Goals, Organization, and Functions, Network and System Management, Network Management System Platform, Current Status and future of Network Management.

SNMPV1 Network Management: Organization and Information and Information Models. Managed network: The History of SNMP Management, The SNMP Model, The Organization Model, System Overview, and the Information Model.Communication and Functional Models. The SNMP Communication Model, Functional model.

UNIT – II (11+3) Hrs SNMP Management & SNMPv2/3: Major Changes in SNMPv2, SNMPv2 System Architecture, SNMPv2 Structure of Management Information, The SNMPv2 Management Information Base,

SNMPv2 Protocol, Compatibility With SNMPv1. SNMPv3 documentation and Architecture. RMON: What is Remote Monitoring? , RMON SMI and MIB, RMON1, RMON2, ATM Remote Monitoring.

UNIT-III (10+4) Hrs

Broadband Network Management & TMN: Broadband Networks and services, Broadband Access control and technologies, HFC technology, data over cable reference architecture, HFC management, DSL technology. Introduction to TMN, Operations Systems, TMN Conceptual Model, TMN Standards, TMN Architecture, TMN Management Service Architecture, An Integrated View of TMN, Implementation Issues.

UNIT-IV (12+4) Hrs Network Management Tools and Web-Based Management: Network Management Tools, Network Statistics Measurement Systems, Network Management Applications, Commercial Network management Systems like IP address tools, Configuration management, fault management and performance management includes open source tools-NMIS TOOL.

NMS with Web Interface and Web-Based Management, Web Interface to SNMP Management, Embedded Web-Based Management, Desktop management Interface, Web-Based Enterprise Management,

TEXT BOOK : 1. Network Management, Principles and Practice, Mani Subrahmanian, Pearson Education. REFERENCES : 1. Network management, Morris, Pearson Education. 2. A. Clem, Network Management fundamentals, 1 ed. : CICSOP Press. 3. Principles of Network System Administration, Mark Burges, Wiley Dreamtech.

B.Tech- 8th Semester

SYLLABUS

(Applicable to 2012-2013 Batch)

Course Title: BIOINFORMATICS Course Code:CSE4426

L T P C 3 1 0 4 Course objectives : Students undergoing this course are expected to:

• Understand the theoretical basis behind bioinformatics. • Search databases accessible on the WWW for literature relating to molecular biology and

biotechnology. Retrieve protein structures from databases.

• Find homologues, analyze sequences, construct and interpret evolutionary trees. • Understand homology modelling

Course outcomes: After complétion the course the studentsshouldbe able to :

• Extract information from different types of bioinformatics data (gene, protein, disease, etc.), including their biological characteristics and relationships

• Analyze processed data with the support of analytical and visualization tools • Carry out bioinformatics research under advisement, including systems biology, structural

bioinformatics and proteomics • Manipulate DNA and protein sequences using stand-alone PC programs and programs available on the

WWW

UNIT –I 10+3 hours

Introduction: Definitions, Sequencing, Biological sequence/structure, Genome Projects, Pattern recognition an prediction, Folding problem, Sequence Analysis, Homology and Analogy. Protein Information Resources: Biological databases, Primary sequence databases, Protein Sequence databases, Secondary databases, Protein pattern databases, and Structure classification databases. Unit-II 11+4 hours

Genome Information Resources :

DNA sequence databases, specialized genomic resources

DNA Sequence analysis : Importance of DNA analysis, Gene structure and DNA sequences, Features of DNA sequence analysis, EST (Expressed Sequence Tag) searches, Gene hunting, Profile of a cell, EST analysis, Effects of EST data on DNA databases

Unit-III 12+4 hours

Pair wise alignment techniques :Database searching, Alphabets and complexity, Algorithm and programs, Comparing two sequences, sub-sequences, Identity and similarity, The Dotplot, Local and global similarity, different alignment techniques, Dynamic Programming, Pair wise database searching. Multiple sequence alignment : Definition and Goal, The consensus, computational complexity, Manual methods, Simultaneous methods, Progressive methods, Databases of Multiple alignments and Searching Unit-IV 12+4 hours

Secondary database searching :Importance and need of secondary database searches, secondary database structure and building a sequence search protocol

Analysis packages :Analysis package structure, commercial databases, commercial software, comprehensive packages, packages specializing in DNA analysis, Intranet Packages, Internet Packages.

Text Books:

1. Introduction to Bioinformatics, by T K Attwood & D J Parry-Smith Addison Wesley Longman

2. Bioinformatics- A Beginner’s Guide by Jean-Michel Claveriw, CerdricNotredame, WILEY dreamlech India Pvt. Ltd

Reference Books:

1.Introduction to Bioinformatics by M.Lesk OXFORD publishers (Indian Edition)

B.Tech- 8th Semester

SYLLABUS

(Applicable to 2012-2013 Batch)

Course Title: DESIGN PATTERNS Course Code: IT4430 L T P C 3 1 0 4 Course Objectives: The course content enables students to: • Understand different types of Design patterns • Apply patterns in programming projects to make code more readable • Create an object-oriented design using design patterns • Learn advanced design techniques, principles, practices, and approaches in solving problems • Compare design patterns with object-oriented designs Course Outcome: At the end of the course students are able to:

• Classify and document design patterns

• Understand patterns to manage algorithms and assign responsibilities to objects

• Apply patterns to solve design problems Create new design patterns

UNIT – I (11+3) Hrs Introduction: What Is a Design Pattern? Design Patterns in Smalltalk MVC, Describing Design Patterns, The Catalog of Design Patterns, Organizing the Catalog, How Design Patterns Solve Design Problems, How to Select a Design Pattern, How to Use a Design Pattern. UNIT – II (12+4) Hrs Creational Patterns: Abstract Factory, Builder, Factory Method, Prototype, Singleton, Discussion of Creational Patterns. Structural Pattern Part-I: Adapter, Bridge, Composite. UNIT-III (11+4) Hrs Structural Pattern Part-II: Decorator, Façade, Flyweight, Proxy. Behavioral Patterns Part-I: Chain of Responsibility, Command, Interpreter, Iterator.

UNIT-IV

(11+4) Hrs Behavioral Patterns Part-II: Mediator, Memento, Observer, State, Strategy, Template Method,Visitor, Discussion of Behavioral Patterns. What to Expect from Design Patterns: A Brief History, the Pattern Community An Invitation, A Parting Thought. TEXT BOOK:

1. Design Patterns By Erich Gamma, Pearson Education

REFERENCES: 1. Pattern’s in JAVA Vol-I By Mark Grand ,WileyDreamTech. 2. JAVA Enterprise Design Patterns Vol-III By Mark Grand ,WileyDreamTech. 3. Head First Design Patterns By Eric Freeman-Oreilly-spd 4. Design Patterns Explained By Alan Shalloway,Pearson Education

B.Tech- 8th Semester

SYLLABUS

(Applicable to 2012-2013 Batch)

Course Title: Human Computer Interaction Course Code: IT4431 L T P C 3 1 0 4

COURSE OBJECTIVE(S):

The course content enables students to :

1. Understand core theories, models and methodologies of Interface design

2. Implement simple graphical user interfaces using the Java Swing toolkit.

3. Design, and evaluate usable graphical user interfaces. 4. Design user interfaces for physically challenged. 5. Explore current Challenges in the field of HCI.

COURSE OUTCOME(S):

At the end of the course students are able to :

• Define problem space and formulate conceptual models

• Interpret social mechanisms used in communication

• Implement user-centered approaches to interaction design

• Develop cognitive and information processing systems

• Deploy product assessments related to market analysis

UNIT I (12+3)Hrs

Introduction: Importance of user Interface, definition, importance of good design. Benefits of good design.Abrief history of Screen design. The graphical user interface: Popularity of graphics, the concept of direct manipulation, graphical system, Characteristics, Web user –interface popularity, characteristics- Principles of user interface.

UNIT II (11+4)Hrs

Design process: Human interaction with computers, importance of human characteristics, human consideration, Human interaction speeds, Screen Designing : Design goals, Screen planning and purpose, organizing screen elements, ordering of screen data and content, screen navigation and flow,

Visually pleasing composition, amount of information, focus and emphasis, presentation information simply and meaningfully, information retrieval on web, statistical graphics.

UNIT III (11+4)Hrs

Windows: Windows new and Navigation schemes selection of window, selection of devices based and screen based controls. Components :Components text and messages, Icons and increases, Multimedia, colors, uses problems,choosing colors.

UNIT IV (11+4)Hrs

Software tools : Specification methods, interface, Building Tools. Interaction Devices: Keyboard and function keys, pointing devices, speech recognition digitization and generation, image and video displays, drivers.

TEXT BOOKS :

1. Human Computer Interaction. 3/e, Alan Dix, Janet Finlay, Goryd, Abowd, Russell Beal, PEA,2004.

2. The Essential guide to user interface design,2/e, Wilbert O Galitz, Wiley DreamaTech.

REFERENCE BOOKS :

1. Designing the user interface. 4/e, Ben Shneidermann , PEA.

2. User Interface Design, SorenLauesen , PEA.

____@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@_______

Department of Information Technology

COURSE STRUCTURE & SYLLABUS with PRACTICE SCHOOL B.Tech 1st Semester

Code Name of the Subject Lecture Tutorial Practical Credits

HS 1401 English – I 3 1 - 4

MATH 1401 Mathematics – I 3 1 - 4

CHE 1401 Engineering Chemistry 3 1 - 4

EEE 1401 Elements of Electrical Engineering

3 1 - 4

CHEM 1401 Environmental Studies 3 1 - 4

HS 1203 English Lab - - 3 2

CHE 1202 Engineering chemistry Lab - - 3 2

ME 1203 Engineering Work Shop - - 3 2

Total 15 5 09 26

B.Tech2nd Semester

Code Name of the Subject Lecture Tutorial Practical Credits

HS 1401 English – II 3 1 - 4

MATH 1401 Mathematics – II 3 1 - 4

PHY 1401 Engineering Physics 3 1 - 4

ME 1401 Elements of Mechanical Engineering

3 1 - 4

CSE 1401 Fundamentals of Computer Programming

3 1 - 4

PHY 1202 Engineering Physics Lab - - 3 2

CSE 1202 Computer Programming Lab

- - 3 2

ME 1202 Engineering Drawing - - 3 2

Total 15 5 09 26

B.Tech 3rd Semester

Code Name of the Subject Lectures Tutorials Practical Credits

HS2404 Managerial Economics and Financial Analysis

3 1 - 4

IT 2401 Data Structures 3 1 - 4

ECE2406 Digital Logic Design 3 1 - 4

CSE2404 Discrete Structures and Graph Theory

3 1 - 4

IT 2402 Object Oriented Programming through JAVA

3 1 - 4

IT 2203 Data Structures Lab - - 3 2

IT 2204 Object Oriented Programming through JAVA Lab

- -

3 2

Total 15 5 06 24

B.Tech 4th Semester

Code Name of the Subject Lectures Tutorials Practical Credits

MATH2405 Probability and Statistics 3 1 - 4

CSE 2403 Computer Organization 3 1 - 4

IT 2405 Database Management 3 1 - 4

Systems

IT 2406 Design Analysis and Algorithms

3 1 - 4

CSE 2407 Operating Systems 3 1 - 4

IT 2207 Database Management Systems Lab

- -

3 2

IT 2208 Design and Analysis of Algorithms Lab

- -

3 2

Total 15 5 06 24

B.Tech. 5th Semester

Code Name of the Subject Lectures Tutorials Practical Credits

CSE3409 Software Engineering 3 1 - 4

IT3409 Compiler Design 3 1 - 4

Management Science 3 1 - 4

IT3410 Computer Networks 3 1 - 4

Elective-I

ECE3428 Microprocessors and Interfacing

Computer Graphics

Real Time Operating System

3 1

4

GMR30206 Term paper - - 3 2

IT3211 Computer Networks Lab - - 3 2

IT3212 OS and CD Lab

-

- 3 2

Total 15 5 09 26

B.Tech. 6th Semester

Code Name of the Subject Lectures Tutorials Practical Credits

IT3413 Data Warehousing and Mining 3 1 - 4

IT3414 Object Oriented Analysis and Design

3 1 - 4

IT3415 Web technologies 3 1 - 4

Elective – II

i) Distributed Databases

ii) Information Retrieval Systems

iii) Information Security

3 1

- 4

Elective - III (Open Elective)

IT3418

ECE3425

CHEM3425

ME3431

EEE3427

CSE3416

i) Cloud Computing ( IT)

ii) Disaster Management (Civil) iii) Fundamentals of Global

Positioning System (ECE) iv) Industrial Safety and Hazards

Management (Chem.) v) Operation Research (Mech.) vi) Renewable Energy Resources

(EEE) vii) Soft Computing (CSE)

3 1 - 4

GMR30001 Audit Course

Laboratories

IT3219 Object Oriented Analysis and

Design Lab

- 3 2

IT3220 Web Technologies Lab - 3 2

GMR30206 Mini project - 3 2

Total 15 05 9 26

B.Tech. 7th semester

Code Name of the Subject

Lectures Tutorials Practical Credits

Practice School

20

B.Tech. 8th semester

Code Name of the Subject Lectures Tutorials Practical Credits

Network Programming 3 1 4

Design Patterns 3 1 4

Elective – IV Artificial Intelligence 3 1 4 E-commerce Mobile Computing Elective- V

Middleware Technologies 3 1 4 Software Project Management Human Computer Interaction Network Programming Lab 3 2

Data Warehousing & Data Mining Lab

3 2

Total 12 4 6 20

B.Tech- 5th Semester

SYLLABUS (Applicable for 2013-14 admitted batch)

Course Title: SOFTWARE ENGINEERING Course Code: CSE3409 L T P C 3 1 0 4 COURSE OBJECTIVE(S): The course content enables students to :

• Learn about software myths ,generic view of the process and Understand about process models

• Learn how to perform feasibility study of the projects under the requirement engineering process and system models.

• Understand about Function oriented design and Architectural styles • Get the knowledge of software testing and testing strategies, learn about risk management

plan and quality concepts.

COURSE OUTCOME(S): At the end of the course students are able to :

• Design and develop real-time software projects with effective cost estimation and plan • Make feasibility study of a project • Specify the design and architectural style of the software products • Propose testing strategy for a given software

UNIT I: (12+4)

Introduction : software engineering is discipline, software development projects, emergence of software engineering, Notable Changes in software development process. The evolving role of software, Changing Nature of Software, Software myths.

Software life cycle Models: need of life cycle model, classical and iterative waterfall model, Prototype, Evolutionary, spiral model, comparison of all the models.

UNIT II: (11+4)

Software Requirements:Functional and non-functional requirements, User requirements, System requirements, Interface specification, the software requirements document. Requirements engineering process:Feasibility studies, Requirements elicitation and analysis, Requirements validation, Requirements management. System models: Context Models, Behavioral model1, Data models, Object models, structured methods.

UNIT III: (11+4)

Function Oriented Design: Structured analysis, DFD and its Extension, structured design detailed design. Design Engineering: Design process and Design quality, Design concepts, the design model. Creating an architectural design: Software architecture, Data design, Architectural styles and patterns, Architectural Design

Unit IV: (12+4)

Performing User interface design: Golden rules, User interface analysis and design and steps Coding and Testing: coding and review, testing, Unit testing, integration testing black box and white box testing, debugging, system testing, object oriented programs testing,

Risk management: Reactive vs. Proactive Risk strategies, software risks, Risk identification, Risk projection, Risk refinement, RMMM, RMMM Plan. Software Quality: Reliability, quality and management system, Quality concepts, ISO, SEI CMMI,PSP, Six sigma. Quality assurance techniques.

TEXT BOOKS : 1.”Fundamentals of software Engineering” Rajib Mal 3rd edition, Eastern Economy Edition, ISBN-978-81-203-3819-7 2. Software Engineering, A practitioner’s Approach- Roger S. Pressman, 6th edition. McGraw-Hill International Edition. REFERENCE BOOK: 1. Software Engineering- Sommerville, 7th edition, Pearson education.

B.Tech- 5th Semester

SYLLABUS (Applicable for 2013-14 admitted batch)

Course Title: COMPILER DESIGN Course Code: IT3409 L T P C 3 1 0 4 Course Objectives: The course content enables students to:

• Understand the phases of compilation process, purpose and implementation approach of each phase.

• Apply aspects of theoretical computer science including Languages, Grammars and Machines in developing a compiler.

• Evaluate how the compiler does the code optimization effectively. • Create a project such as compiler construction by using prior programming language.

Course Outcome: At the end of the course the students are able to:

• Understand the requirement of compiler design. • Apply working skills in theory and application of finite state machines, recursive descent,

production rules, parsing, and language semantics. • Understand about powerful compiler generation tools. • Apply the ideas, the techniques, and the knowledge acquired for the purpose of other software

design.

UNIT – I (11+4) Hrs Finite automata: Definition and description of finite automata - NDFA –Conversion between DFA & NDFA- Minimization of Finite automata-Regular expressions - Overview of compilers- various phases of Compilers- Design of lexical analyser, Introduction to lex tool. UNIT – II (11+4) Hrs Syntax analyzer: Design of syntax analyser - Design of Parsers - Shift Reduce parsers - LR parser - SLR parser - LALR parser, Introduction to YACC tool. UNIT-III (11+3) Hrs

Syntax directed translation: Syntax directed translation and implementation - Intermediate code - Postfix notation - Parsing tree - Three addresses Code – Quadruples, Triples ,Indirect Triples. UNIT-IV (12+4) Hrs Intermediate code optimization: The principle sources of optimization - Loop Optimization - DAG - Global data flow analysis. Code generation: Problems - Machine model - A simple code generator - Register allocation and assignment - Code generation from DAG - Peep hole optimization. Text Books: 1. Principles of Compiler Design, by Alfred Aho and Jeffrey D. Ullman 2. Compiler Design by A.A.Puntambekar Reference Books: 1. Introduction to Automata Theory, Languages, and Computation by Hopcroft, John E., and Jeffrey D. Ullman

B.Tech- 5th Semester

SYLLABUS (Applicable for 2013-14 admitted batch)

Course Title : Management Science Course Code: HS3406 L T P C 3 1 0 4 Course Objectives: The course content enables students to:

6. Understand the concepts of management, administration and organization 7. Know the concepts of work study and how it is carried out. 8. Gain the relevant knowledge in the field of staff selection procedure and training 9. Evaluate the environmental scanning 10. Avoid common pitfalls and mistakes in managing projects

Course Outcomes: At the end of the course students are able to:

6. Plan, organize, direct and control the functions and forms of an organization 7. Apply the knowledge of work study and its application in the day-to-day life 8. Synthesize information regarding the effectiveness of recruiting methods and the validity of

selection procedure, and make appropriate staffing decisions 9. Analyze companies’ internal and external resources and capabilities 10. Evaluate a project, develop the scope of work, provide accurate cost estimates and to plan the

various activities

UNIT- I: (12+3*) Introduction to Management: Concepts of Management – Nature, Importance and Functions of Management – Taylor’s Scientific Management Theory, Fayol’sTheory and its Principles of Management, Mayo’s Hawthorne Experiments, Maslow’s Theory of Human Needs, Douglas McGregor’s Theory X and Theory Y.

Forms of Organization Structures: Types of organization structures: Line organization, Line and staff organization, Functional organization, Committee organization, matrix organization, structure and their merits and demerits.

UNIT- II : (11+4*) Operations Management: Principles and Types of Plant Layout – Methods of production: Job, batch and Mass Production – Work Study: Basic procedure involved in Method Study and Work Measurement. Materials Management: Objectives, Need for Inventory control, EOQ, ABC Analysis, Purchase Procedure, Stores Management and Stores Records. MarketingManagement:Functions of Marketing, Marketing strategies based on Product Life Cycle, Channels ofdistribution. UNIT- III: (11+3*)

Human Resources Management (HRM) : Concepts of HRM – Basic functions of HR Manager: Manpower planning, Recruitment,Selection, Training and Development, Placement, Wage and Salary Administration, Promotion,Transfer,Separation, Performance Appraisal,Job Evaluation and Merit Rating.

Strategic Management: Mission, Goals, Objectives, Policy, Strategy, Programmes – Elements of Corporate Planning Process – Environmental Scanning, SWOT Analysis. UNIT- IV: (11+5*) Project Management: Introduction – Project Life Cycle and its phases – Role of Project Manager - Project Selection Methods and Criteria – Network Analysis, Programme Evaluation and Review Technique (PERT),Critical Path Method (CPM), Identifying critical path, Probability of Completing the project within given time, Project Cost Analysis, Project Crashing(simple problems) Contemporary Management Practices : Basic concepts of MIS, End User Computing, Materials Requirement Planning (MRP), Just-In-Time (JIT) System, Total Quality Management (TQM), Six sigma and Capability Maturity Model (CMM) Levels, Supply Chain Management, Enterprise Resource Planning (ERP), Performance Management, Business Process outsourcing (BPO). (Note: We will have only short questions from thispart.No essay questions) Text Books:

3. Dr. A R Aryasri : Management Science, TMH, New Delhi, 2013. 4. Dr P Vijaya Kumar &Dr N AppaRao Management Science Cengage, New Delhi 2012

Reference Books: 7. Koontz &Weihrich: Essentials of Management, 6/e, TMH, 2007 8. Principles and Practice of Management, L.M.Prasad, Sultan Chand and Sons, 2007 9. Phillips Kotler& Armstrong- Principles of Marketing- Pearson. 10. KanishkaBedi- Productionand Operations Management, Oxford University Press, New

Delhi 2011. 11. Project Management by R.B.Khanna, PHI Learning Pvt. Ltd. New Delhi, 2011. 12. Project Management by R. PanneerSelvam&P.Senthil Kumar, PHI Learning Pvt. Ltd. New

Delhi, 2009.

B.Tech- 5th Semester

SYLLABUS (Applicable for 2013-14 admitted batch)

Course Title: COMPUTER NETWORKS Course Code: IT3410 L T P C 3 1 0 4 Course Objectives:

The course content enables students to :

• Understand basic network models and Different transmission used for data communication.

• Recognize the data link design issues and various data link protocols used for data transmission.

• Understand different routing algorithms used for data transmission from source to destination in a network layer.

• Know how internet address are installed and how internet protocols are used in connecting internet.

Course Outcomes: At the end of the course students are able to:

• Suggest appropriate network model for data communication. • Know how reliable data communication is achieved through data link layer. • Propose appropriate routing algorithm for data routing.

• Connect internet to the system and knowledge of trouble shooting.

UNIT I: INTRODUCTION (11+4) Hours Network Hardware, Network Software, and Reference Models: OSI, TCP/IP, The ARPANET, Network Topologies , Physical Layer: Transmission media: Magnetic Media, Twisted pair, Base band Coaxial Cable, Fiber optics, Wireless Transmission: Electromagnetic Spectrum, Radio Transmission, Microwave Transmission. UNIT II (12+4) Hours Data link layer: Design issues: framing, error detection and correction, CRC, Elementary Data link Protocols: Stop and wait, Sliding Window protocols: Go-back-n, Selective Repeat, Medium Access sub layer: Channel allocation methods, Multiple Access protocols: ALOHA, CSMA, IEEE Standard 802.3 and Ethernet, IEEE Standard 802.4: Token bus. UNIT – III: (10+3) Hours Network Layer: Network Layer design issues, Virtual circuit and Datagram subnets, Routing algorithms: Shortest path routing, Flooding, Hierarchical routing, Distance vector routing. Broad cast and Multi cast routing, Congestion Control: Congestion prevention policies. UNIT –IV: (12+4) Hours The Network layer in the internet: The IP Protocol, IP Addresses, and Internet Control Protocols. Transport Layer: Transport Services, Connection management, Elements of Transport Protocols, Internet Transport Protocols: UDP and TCP. Application Layer - Domain name system, Electronic Mail, WWW TEXT BOOK: 1. Computer Networks — Andrew S Tanenbaum, 4th Edition. Pearson Education /PHI REFERENCES: 1. Data Communications and Networking - Behrouz A. Forouzan. Third Edition TMH 2. Understanding communications and Networks, 3rd Edition, W.A. Shay, Thomson

B.Tech- 5th Semester SYLLABUS

(Applicable for 2013-14 admitted batch) Course Title: MICROPROCESSORS AND INTERFACINGCourse Code: ECE 3429

L T P C 3 1 0 4 Course objectives:

Students undergoing this course are expected to:

• Familiarize with the architecture of 8086 processor, assembling language programming and interfacing with various modules.

• Learn to Interface various I/O peripherals like ADC, DAC, Keyboard, stepper motor etc., with microprocessors using 8255 PPI.

• Do any type of industrial and real time applications by knowing the concepts of Microprocessors

• Understand 8251-USARTand serial communication concepts.

Course Outcomes:

After undergoing the course, students will be able to

• Understand the full internal workings of a typical simple CPU including the utilization of the various hardware resources during the execution of instructions.

• Introduce the design of basic I/O hardware and microprocessor interfacing: memory chip selection, memory expansion, I/O interfacing.

• Interface input and output devices like LCD, LED, Keyboards ADC, DAC and stepper motor to microprocessors.

• Design the home appliances and toys using Microprocessor chips.

UNIT- I

8086 Architecture: (12 hours)

8086-Functional Diagram, Register Organization, Signal description, Physical Memory Organization, Minimum and Maximum mode operations of 8086, Timing Diagrams.

UNIT- II

Instruction Set of 8086: ( 16 hour )

Addressing modes, Data Transfer Instructions, Arithmetic Instructions, Bit Manipulation Instructions, Branch Instructions, Processor Control Instructions and String Instructions.Assembler Directives, Procedures and macros, Assembly Language Programming Examples.

UNIT- III

Programmable devices and Interfacing of I/O with 8086: ( 16 hours)

Semiconductor Memory Interfacing, 8255 PPI-Various modes of operations, Stepper Motor interfacing, D/A and A/D Conversions, DMA Controller 8257.

UNIT-IV

8086 Interrupts and Serial Communication (16 hours)

8086 interrupts and Interrupt Vector Table (IVT), Programmable Interrupt Controller 8259A, Serial data transfer schemes. Asynchronous and Synchronous data transfer schemes, Programmable Communication Interface 8251 USART, TTL to RS 232C and RS232C to TTL conversion, Sample program of serial data transfer.

Text Books:

1. Ray and Bhurchandi, “ Advanced Microprocessors”, Tata McGraw-Hill 2nd edition 2007 2. D.V.Hall, “Microprocessor and Interfacing “, Tata McGraw-Hill.

Reference Books:

1. Microcomputer system 8086/8088 family architecture, programming and design Liu and GA Gibson, PHI second edition

B.Tech- 5th Semester SYLLABUS

(Applicable for 2013-14 admitted batch) Course Title: COMPUTER GRAPHICS Course Code: CSE3412 L T P C 3 1 0 4 Course Objectives: The course content enables students to:

• Learn basic principles and problems of computer graphics.

• Know application areas of computer graphics, different display devices and their characteristics to display an object.

• Understand background of the geometrical and mathematical foundations with algorithms for generating points, lines, circles, ellipses and different polygon curves and surfaces, Learn coordinate systems and different transformations of the object in 2D and 3D coordinate systems like rotation, translation, scaling and reflection.

• Understand 3D viewing, rendering, visible surface detection algorithms with animation fundamentals.

Course Outcomes: At the end of the course students are able to :

• Be familiarized with contemporary graphics hardware, the actual methodology and techniques to draw computer graphics, animations etc. for the real world presentation and how it is implemented in Computer graphics software

• Develop new kinds of graphics and animations.

• Design and develop graphics applications with the implementation of advanced methods such as ray tracing, texture mapping, illumination and shading and be able to build interactive user interface to manipulate objects in a 3D scene and also in the development of Web pages.

• Demonstrate the ability to develop an animation movie. UNIT – I (11+4) Introduction: Application of Computer Graphics, overview of graphics systems, raster scan systems, random scan systems, raster scan display processors. Output primitives : Points and lines, line drawing algorithms( Bresenham’s and DDA Line derivations and algorithms), mid-point circle and ellipse algorithms. Filled area primitives: Inside and outside tests, Scan line polygon fill algorithm, boundary-fill and flood-fill algorithms. UNIT – II (11+4) 2-D geometrical transforms: Translation, scaling, rotation, reflection and shear transformations, matrix representations and homogeneous coordinates, composite transforms, transformations between coordinate systems. 2-D viewing: The viewing pipeline, viewing coordinate reference frame, window to view-port coordinate transformation, viewing functions, Cohen-Sutherland and Cyrus beck line clipping algorithms, Sutherland –Hodgeman polygon clipping algorithm. UNIT-III (11+4) 3-D object representation: Polygon surfaces, quadric surfaces, spline representation, Hermite curve, Bezier curve and B-Spline curves, Bezier and B-Spline surfaces. 3-D Geometric transformations: Translation, rotation, scaling, reflection and shear transformations, composite transformations. 3D Viewing pipeline, clipping, projections (Parallel and Perspective). UNIT-IV (12+3) Visible surface detection methods: Classification, back-face detection, depth-buffer, scan-line, depth sorting, BSPtree methods, area sub-division and octree methods. Computer animation: Design of animation sequence, general computer animation functions, raster animation, computer animation languages, key frame systems, motion specifications. Text Books: 1. 1. Computer Graphics C version, Donald Hearn, M.Pauline Baker, Pearson 2. Computer Graphics with Virtual Reality Systems, Rajesh K Maurya, Wiley Reference Books: 1. Computer Graphics Principles & practice, 2/e, Foley, VanDam, Feiner, Hughes, Pearson 2. Computer Graphics, Peter, Shirley, CENGAGE

B.Tech- 5th Semester SYLLABUS

(Applicable for 2013-14 admitted batch) Course Title: Real Time Operating System Course Code:

L T P C 3 1 0 4 Course Objectives: The course content enables students to:

� Explain the concept of a real-time system and why these systems are usually implemented as concurrent processes

� Describe a design process for real-time systems. � Explain the role of a real-time operating system. � Introduce generic process architectures for monitoring and control and data acquisition systems

Course Outcomes:

At the end of the course students are able to:

� Present the mathematical model of the system and to develop real time algorithm for task scheduling.

� Understand capabilities Handling Resource Sharing and dependencies among Real-time Tasks � Generate a high-level analysis for Scheduling Real-time tasks in multiprocessor and distributed

systems � Understand the working of real time operating systems and real time database.

UNIT-I REAL-TIME SYSTEMS 11+4

Introduction: What is real time, Applications of Real-Time systems, A basic model of Real-time system, Characteristics of Real-time system, Safety and Reliability, Types of Real-time tasks, timing constraints, Modeling timing constraints Some important concepts, Types of Real-time tasks and their characteristics, Task scheduling, Clock-Driven scheduling, Hybrid schedulers, Event-Driven scheduling, Earliest Deadline First (EDF) scheduling. UNIT-II 11+ 4 Rate monotonic algorithm (RMA). Some issues associated with RMA. Issues in using RMA practical situations. Handling Resource Sharing and dependencies among Real-time Tasks: Resource sharing among real-time tasks.Priority inversion. Priority Inheritance Protocol (PIP), Highest Locker Protocol (HLP). Priority Ceiling Protocol (PCP).Different types of priority inversions under PCP.Important features of PCP. Some issues in using a resource sharing protocol. Handling task dependencies. UNIT-III 11+ 4 Scheduling Real-time tasks in multiprocessor and distributed systems: Multiprocessor task allocation, Dynamic allocation of tasks. Fault tolerant scheduling of tasks. Clock in distributed Real-time systems, Centralized clock synchronization Commercial Real-time operating systems: Time services, Features of a Real-time operating system, Unix as a Real-time operating system, Unix-based Real-time operating systems, Windows as a Real-time operating system, POSIX-RT, A survey of contemporary Real-time operating systems. Benchmarking real-time systems. UNIT-IV 11+ 4 Real-time Databases: Example applications of Real-time databases. Review of basic database concepts, Real-time databases, Characteristics of temporal data. Concurrency control in real-time databases.Commercial real-time databases. Real-time Communication: Basic concepts, Examples of applications, Real-time communication in a LAN an d Real-time communication over packet switched networks. Text Book: 1. Real-time Systems Theory and Practice by Rajib Mall, Pearson Publication, 2008. References Books: 1. Jane W. S. Liu, Real-Time Systems, Pearson Education, 2000. 2. C.M. Krishna and K.G. Shin, Real-Time Systems, TMH.

B.Tech- 5th Semester SYLLABUS

(Applicable for 2013-14 admitted batch) Course Title: COMPUTER NETWORKS LAB Course Code:IT3211 L T P C 0 0 3 2 COURSE OBJECTIVE(S): The course content enables students to:

• Understand basic network models and Different transmission media used for data communication.

• Understand the data link design issues and various data link protocols used for data transmission.

• Comprehend different routing algorithms used for data transmission from source to destination in a network layer.

• Know how internet addresses are configured and how internet protocols are used in connecting internet.

COURSE OUTCOME(S): At the end of the course students are able to:

• By learning models students suggest appropriate network model for data communication. • Know how reliable data communication is achieved through data link layer. • Suggest appropriate routing algorithm for the network.

• Provide internet connection to the system and its installation.

Course Contents

1. a. Familiarization with Networking Components and devices: LAN Adapters,

Hubs, Switches, Routers etc.

b. Familiarization with Transmission media and Tools: Co-axial cable, UTP

Cable, Crimping Tool, Connectors etc.

2. Preparing the UTP cable for cross and direct connections using crimping tool.

3. Implement the data link layer framing methods :

a) character stuffing b) bit Stuffing

4. Implement on a data set of characters the two CRC polynomials: CRC 12, CRC 16

5. Implement on a data set of characters the CRC polynomials: CRC CCIP .

6. Implementation of sliding window protocol: go back n sliding window protocol

7. Implement Dijkstra ‘s algorithm to compute the Shortest path thru a graph.

8. Take an example subnet graph with weights indicating delay between nodes. Now

Obtain Routing table art each node using distance vector routing algorithm.

9. Take an example subnet of hosts. Obtain broadcast tree for it

10. To configure the IP address for a computer connected to LAN and to configure

network parameters of a web browser for the same computer.

11. Configuration of TCP/IP Protocols in Windows .

12. a. Installing of internal modem and connecting to Internet.

b. To configure WiFi for your PC.

B.Tech- 5th Semester SYLLABUS

(Applicable for 2013-14 admitted batch) Course Title: OPERATING SYSTEMS & COMPILER DESIGN LABCourse Code: IT3212 L T P C 0 0 3 2 Course Objectives: The course aims to

• Understand concepts such as Scheduling, Memory Management, Multi-threading, required in the design of Operating Systems.

• Analyze the various scheduling algorithms, fitting strategies, deadlock detection. • Apply the knowledge of design various phases of compiler such as Lexical analyzer, syntax

analyzer, semantic analyzer, intermediate code generator, code optimizer and code generator. • Design compiler construction tools such as Lexical Analyzer and parser generator.

Course Outcomes: After completion of this course, the students would be able to

• Determining the reasons of deadlocks, and their remedial measures in an operating system • Comparing and analyzing different file systems being used in different operating systems. • Understand, and use Context free grammar, and parse tree construction • Evaluating the working of lex and yacc compiler for debugging of programs

Implement the following experiments:

1. Simulate the following CPU scheduling algorithms a) Round Robin b) SJF c) FCFS d) Priority

2. Simulate Peterson solution for the critical section problem. 3. Simulate Bankers Algorithm for Dead Lock Avoidance& Detection. 4. Simulate MVT and MFT 5. Simulate Paging Technique of memory management. 6. Simulate all page replacement algorithms

a) FIFO b) LRU c) LFU Etc. …

7. Simulate all file allocation strategies

a) Sequential b) Indexed c) Linked 8. Simulate all File Organization Techniques

a) Single level directory b) Two level 9. Design a Lexical Analyzer for a given Language. 10. Implement the Lexical Analyzer Using Lex Tool. 11. Design predictive parser for the given language. 12. Design a LALR bottom up parser using YACC tool.

B.Tech- 6th Semester

SYLLABUS (Applicable for 2013-14 admitted batch)

Course Title: DATAWAREHOUSING AND DATA MINING Course Code: IT3413 L T P C 3 1 0 4 Course Objectives The course content enables students to:

• Analyze the difference between On Line Transaction Processing and On Line analytical processing

• Create Multidimensional schemas suitable for data warehousing • Understand various data mining functionalities • Understand in detail about data mining algorithms

Course Outcomes At the end of the course students are able to:

• Design a data mart or data warehouse for any organization • Extract knowledge using data mining techniques • Adapt to new data mining tools • Explore recent trends in data mining such as web mining, multimedia mining

UNIT- I (11+4) Hrs Introduction: Fundamentals of data mining, Data Mining Functionalities, Major issues in Data Mining Data Preprocessing:Needs Preprocessing the Data, Data Cleaning, Data Integration andTransformation, Data Reduction, Data Warehouse and OLAP Technology for Data Mining Data Warehouse, Multi-dimensionalData Model, Data Warehouse Architecture UNIT-II (11+3) Hrs Data Mining Primitives, Languages, and System Architectures : Data MiningPrimitives, Data Mining Query Languages, Designing Graphical User Interfaces Based on aData Mining Query Language,Architectures of Data Mining Systems. Concepts Description: Characterization and Comparison: Data Generalization and Summarization-Based Characterization, Analytical Characterization: Analysis of AttributeRelevance, Mining Class Comparisons: Discriminating between Different Classes UNIT- III (11+4) Hrs Mining Association Rules in Large Databases: Association Rule Mining, Mining Single-Dimensional Boolean Association Rules from Transactional Databases, Mining MultilevelAssociation Rules fromTransaction Databases. Classification and Prediction: Issues Regarding Classification and Prediction,Classification by Decision Tree Induction, Bayesian Classification, Classification byBackpropagation, Prediction. UNIT IV (12+4) Hrs Cluster Analysis Introduction: Types of Data in Cluster Analysis, A Categorization ofMajor Clustering Methods, Partitioning Methods, Density-Based Methods, Grid-BasedMethods, Model-Based Clustering Methods, Outlier Analysis. Mining Complex Types of Data:Multidimensional Analysis and Descriptive Mining ofComplex, Data Objects, Mining Multimedia Databases, Mining Text Databases, Mining the World Wide Web.

Text Books: 1. Data Mining – Concepts and Techniques - Jiawei Han &MichelineKamber Harcourt, India. 2. Data Mining Techniques – Arun K Pujari, University Press. Reference Books: 1. Data Mining Introductory and advanced topics –Margaret H Dunham, Pearson Education 2. Data Warehousing in the Real World – Sam Anahory& Dennis Murray. Pearson Edn 3. Data Warehousing Fundamentals – PaulrajPonnaiah Wiley Student Edition.

B.Tech- 6th Semester

SYLLABUS (Applicable for 2013-14 admitted batch)

Course Title: OBJECT ORIENTED ANALYSIS AND DESIGN Course Code: IT3414 L T P C 3 1 0 4 Course objectives: Students undergoing this course are expected to:

• Develop the different UML diagrams for a software system based on the given requirements. • Apply forward engineering to convert diagram to code and reverse engineering to convert code

to diagram. • Analyze & design a s/w system in object oriented approach, using unified modeling language. • Select appropriate models for a s/w system depending upon the complexity of the system

Course outcomes: After undergoing the course, students will be able to understand:

• Understand the use of unified modeling language for object oriented analysis and design • Know the syntax of different UML diagrams. • Develop different models for a software system. • Apply object oriented analysis and design to build a software system • Apply forward and reverse engineering for a software system.

UNIT – I (11+3) Hrs Introduction to UML : Importance of modeling, principles of modeling, object oriented modeling, conceptual model of the UML, Architecture, Software Development Life Cycle. Basic Structural Modeling: Classes, Relationships, common Mechanisms, and diagrams, forward & Reverse Engineering. Advanced Structural Modeling: Advanced classes, advanced relationships, Interfaces, Types and Roles, Packages. UNIT – II (12+4)Hrs Class & Object Diagrams: Terms, concepts, modeling techniques for Class & Object Diagrams. Basic Behavioral Modeling-I: Interactions, Interaction diagrams. UNIT-III (11+4) Hrs Basic Behavioral Modeling-II: Use cases, Use case Diagrams, Activity Diagrams. Advanced Behavioral Modeling: Events and signals, state machines, processes and Threads, time and space, state chart diagrams. UNIT-IV (11+4) Hrs Architectural Modeling : Component, Deployment, Component diagrams and Deployment diagrams. Case Study: The Unified Library application. Text Books: 1. Grady Booch, James Rumbaugh, IvarJacobson : The Unified Modeling Language User Guide, Pearson Education. 2. Hans-Erik Eriksson, Magnus Penker, Brian Lyons, David Fado: UML 2 Toolkit, WILEY-Dreamtech India Pvt. Ltd.

Reference Books: 1. Meilir Page-Jones: Fundamentals of Object Oriented Design in UML, Pearson Education. 2. AtulKahate: Object Oriented Analysis & Design, The McGraw-Hill Companies. 3. Gandharba Swain: Object Oriented Analysis & Design Through Unified Modeling Language, Lakshmi Publications Pvt. Ltd , New Delhi.

B.Tech- 6th Semester SYLLABUS

(Applicable for 2013-14 admitted batch) Course Title: WEB TECHNOLOGIES Course Code: IT3415 L T P C 3 1 0 4 Course Objectives: The course content enables students to:

• understand best technologies for solving web client/server problems • analyze and design real time web applications

• use Javascript for dynamic effects and to validate form input entry • Analyze to Use appropriate client-side or Server-side applications

Course Outcomes: At the end of the course students are able to:

• Choose, understand, and analyze any suitable real time web application.

• Integrate java and server side scripting languages to develop web applications. • To develop and deployreal time webapplications in web servers and in the cloud. • Extend this knowledge to .Net platforms.

UNIT – I (12+4) Hrs HTML Common tags- List, Tables, images, forms, Frames, Links and Navigation, Introduction to HTML5 CSS: Introduction, CSS Properties, Controlling Fonts, Text Formatting, Pseudo classes, Selectors, introduction to CSS3. Java Script: Learning Java script: Variables, operators, Functions, Control structures, Events, , Validations, plugins. UNIT – II (11+3) Hrs PHP Programming: Introducing PHP: Creating PHP script, Running PHP script. Working with Variables and constants: Using variables, Using constants, Data types, Operators. Controlling program flow: Conditional statements, Control statements, Arrays, functions.Working With forms.

UNIT-III (12+4) Hrs AJAX : Introduction, AJAX with XML Servlets: introduction to servlets, Life cycle of servlets, JSDK, The servlet API, the javax.servlet package, Reading servlet parameters and initialization parameters, The javax.servlet HTTP package, Handling Http request and responses, Using cookie, session tracking, Introduction to JSP: The problem with servlet, the anatomy of JSP page, JSP processing, JSP application design with MVC, Tomcat server and testing tomcat, Generic dynamic content, using scripting elements implicit JSP objects,

UNIT-IV (10+4) Hrs JSP application development: Conditional processing display values using an expression to set an attribute, Declaring variables and methods, sharing data between JSP pages, Requests and users passing control and data between pages, Sharing sessions and application data, memory usage considerations JDBC connectivity in JSP: Data base programming using JDBC, Studying javax.sql.* package, Accessing a database from a JSP page, Application specific database actions, Deploying JAVA beans in JSP page. Text Books :

1. Web Technolgies, Uttam Roy, OXFORD University press 2. Web programming with HTML, XHTML and CSS, 2e, Jon Duckett, Wiley India

Reference Books:

1. Web programming Bai, Michael Ekedahl, CENAGE Learning , India edition. 2. An Introduction to Web Design + Programming, Paul S.Wang, India Edition

B.Tech- 6th Semester SYLLABUS

(Applicable for 2013-14 admitted batch)

Course Title: DISTRIBUTED DATABASES Course Code: IT3416 L T P C 3 1 0 4 Course Objectives: This course is intended to

• Inculcate knowledge on Centralized and Distributed Databases. • Understand Transparency and Fragmentation in Distributed Databases • Apply transaction management, concurrency control, and reliability in Distributed Databases. • Analyze the features of Object Oriented databases and Create awareness on the major technical

challenges in distributed systems design and implementation.

Course Outcomes: At the end of the course the student will be able to:

• Decompose global relations into fragments. • Apply DDBMS in Data Warehousing, web-based databases and pull/push based technologies. • Analyze the principles applied in contemporary distributed database systems. • Evaluation of CORBA architecture for interoperable databases.

UNIT – I (12+4) Hrs Features of Distributed versus Centralized Databases, Levels of Distribution Transparency, Reference Architecture, Data Fragmentation, Integrity Constraints.Functions& Components of Distributed DBMSs, Translation of Global Queries to Fragment Queries. UNIT – II (10+4) Hrs Optimization of Access Strategies, A Framework for Query Optimization, Join Queries, General Queries. The Management of Distributed Transactions, A Framework for Transaction Management, Supporting Atomicity of Distributed Transactions, Concurrency Control for Distributed Transactions. UNIT-III (11+4) Hrs Concurrency Control, Foundation of Distributed Concurrency Control, Distributed Deadlocks, Timestamps, Optimistic Methods. Reliability, Non blocking Commitment Protocols, Determining a Consistent View of the Network, Detection and Resolution of Inconsistency, Checkpoints and Cold Restart. UNIT-IV (12+3) Hrs Architectural Issues, Object Management, Distributed Object Storage, Object Query Processing, Database Interoperability, Database Integration, Query Processing, Transaction Management, Object Orientation and Interoperability. Text Books: 1. Distributed Database Principles & Systems, Stefano Ceri, Giuseppe Pelagatti McGraw-Hill 2. Principles of Distributed Database Systems, M.TamerOzsu, Patrick Valduriez Reference Books: 1. Distributed Database Systems, Chhanda Ray, Pearson Education

2. Distributed Database Systems, D. David Arthur Bell, Jane B. Grimson, Addison-Wesley

B.Tech- 6th Semester SYLLABUS

(Applicable for 2013-14 admitted batch) Course Title : INFORMATION RETRIEVAL SYSTEMS Course Code : IT4423

L T P C 3 1 0 4 Course Objectives: The course content enables students to:

� Understand the Functionalities of IRS � Create indices to extract data efficiently from Information Storage � Learn document management, retrieval and searching the web. � Apply Clustering for the data to be stored to IRS � Understand working of Search Engines and ways to improve them. � Know about hypermedia architectures, design and usability of IRS

Course outcomes:

At the end of the course the students are able to:

� Learn Classical and advanced techniques employed by Web Search engines � Know different ways of representation and retrieval of documents. � Apply techniques of preprocessing needed for IRS � Develop an IRS by using different user search techniques and text search algorithms

UNIT- I 11+3 Hrs Introduction : Definition, Objectives, Functional Overview, Relationship to DBMS, Digital libraries and Data Warehouses. Information Retrieval System Capabilities: Search, Browse, Miscellaneous. UNIT-II 12+4 Hrs Cataloging and Indexing: Objectives, Indexing Process, Automatic Indexing, Information Extraction. Data Structures: Introduction, Stemming Algorithms, Inverted file structures, N-gram data structure, PAT datastructure, Signature file structure, Hypertext data structure. UNIT- III 11+4 Hrs Automatic Indexing: Classes of automatic indexing, Statistical indexing, Natural language, Concept indexing, Hypertext linkages Document and Term Clustering: Introduction, Thesaurus generation, Item clustering, Hierarchy of clusters. UNIT IV 11+4 Hrs User Search Techniques: Search statements and binding, Similarity measures and ranking, Relevance feedback, Selective dissemination of information search, Searching the Internet and hypertext, Information Visualization Text Search Algorithms: Introduction, Software text search algorithms, Hardware text search systems.

Text Books:

1. Kowalski, Gerald, Mark T Maybury: Information Retrieval Systems: Theory and Implementation,

Kluwer Academic Press, 1997.

Reference Books:

1. Frakes, W.B., Ricardo Baeza-Yates: Information Retrieval Data Structures and Algorithms, Prentice

Hall, 1992.

2. Modern Information Retrieval By Yates Pearson Education.

3. Information Storage & Retrieval By Robert Korfhage – John Wiley & Sons.

B.Tech- 6th Semester

SYLLABUS (Applicable for 2013-14 admitted batch)

Course Title: Information Security Course Code: CSE 3413 L T P C 3 1 0 4 Course Objectives:

The course content enables students to :

� Understand about various Conventional Encryption Principles designed for providing security.

� Learn public key cryptography, key management principles and Learn Pretty Good Privacy (PGP) which is a computer program that provides cryptographic privacy and authentication.

� Learn IP Security fundamentals, architecture and identifying the key features IP security system.

� Understand about general requirements for Web security, which focus on standardized schemes.

Course Outcomes:

At the end of the course students are able to :

� To analyze a given system with respect to security of the system. � To create an understanding of Authentication functions the manner in which Message

Authentication Codes and Hash Functions works.

� To examine the issues and structure of Authentication Service and Electronic Mail Security � Understand conventional and public key cryptographic approaches used in message

encryption.

� Able to identify various types of attacks and its effect over the networks.

UNIT – I: (12+3)

Introduction: Security Attacks (Interruption, Interception, Modification and Fabrication), Security Services (Confidentiality, Authentication, Integrity, Non-repudiation, access Control and Availability), TCP session hijacking, UDP hijacking, ARP attacks, & Man-in-the-Middle Attacks. OSI Security Architecture - Classical Encryption techniques – Cipher Principles. Conventional Encryption Principles: Conventional encryption algorithms - Data Encryption Standard (DES), Blowfish, CAST-128, Block Cipher Design Principles and cipher block Modes of Operation, Evaluation criteria for AES Cipher. UNIT-II: (11+4) Public Key Cryptography: Public key cryptography principles, public key cryptography algorithms, digital signatures. Digital Certificates, Certificate Authority and key management Authentication & Hash Function: Authentication requirements – Authentication functions – Message Authentication Codes – Hash Functions – Security of Hash Functions and MACs – MD5 message Digest algorithm - Secure Hash Algorithm –RIPEMD-HMAC Digital Signatures – Authentication Protocols – Digital Signature Standard.

UNIT-III: (11+4) Network Security Authentication Applications: Kerberos – X.509 Authentication Service – Electronic Mail Security – PGP – S/MIME IP Security: IP Security Overview, IP Security Architecture, Authentication Header, Encapsulating Security Payload, Combining Security Associations and Key Management. UNIT – IV: (11+4) Web Security: Web Security Requirements, Secure Socket Layer (SSL) and Transport Layer Security (TLS), Secure Electronic Transaction (SET). System Level Security Intrusion detection – password management – Viruses and related Threats – Virus Counter measures – Firewall Design Principles – Trusted Systems. Text Books: 1. Network Security Essentials (Applications and Standards) by William Stallings Pearson Education. 2. Hack Proofing your network by Ryan Russell, Dan Kaminsky, Rain Forest Puppy, Joe Grand, David Ahmad, Hal Flynn IdoDubrawsky, Steve W.Manzuik and Ryan Permeh, wileyDreamtech. References: 1. AtulKahate, “Cryptography and Network Security”, Tata McGraw-Hill, 2003. 2. William Stallings, “Cryptography and Network Security – Principles and Practices”, PrenticeHallofIndia,ThirdEdition,2003 3. Charles B. Pfleeger, Shari LawrencePfleeger, “Security in Computing”, Third Edition, Pearson Education, 2003.

B.Tech- 6th Semester SYLLABUS

(Applicable for 2013-14 admitted batch)

Course Title: CLOUD COMPUTING Course Code: IT3418 L T P C 3 1 0 4 Course Objectives

• Design an API and a distributed platform that are hardware, vendor agnostic, a unified resource representation.

• Implement an agent system for negotiation of Cloud services. • Adapt tests and benchmarks for Cloud services and applications. • Evaluate features Private-Cloud and Design innovative cloud infrastructure.

Course Outcomes

• Articulate the main concepts, key technologies, strengths, and limitations of cloud computing and the possible applications for state-of-the-art cloud computing.

• Identify the architecture and infrastructure of cloud computing, including SaaS, PaaS, IaaS, public cloud, private cloud, hybrid cloud, etc.

• Identify problems, and explain, analyze, and evaluate various cloud computing solutions. • Attempt to generate new ideas, innovations in cloud computing and Collaboratively research

and write a research paper, and present the research online. UNIT I: (13+3) Hrs Understanding Cloud Computing: Cloud computing: Introduction, Cloud application architectures, Value of cloud computing, Cloud Infrastructure models, Cloud Services, History of Cloud Computing, Advantages of Cloud Computing, Disadvantages of Cloud Computing, Companies in the Cloud Today, Amazon Web Services, Google services, IBM Cloud, Windows Azure Before the move into the cloud: Know Your Software Licenses, The Shift to a Cloud Cost Model, Service Levels for Cloud Applications Ready for the cloud: Web Application Design, Machine Image Design, Privacy Design, Design, Database Management UNIT-II: (10+5) Hrs Virtual Machines and Virtualization of Clusters and Data Centers: Implementation Levels of Virtualization, Virtualization Structures/Tools and Mechanisms, Virtualization of CPU, Memory, and I/O Devices, Virtual Clusters and Resource Management, Virtualization for Data-Center Automation Case Studies: Cloud centers in detail, Comparing approaches, Xen, Eucalyptus, CloudStack, OpenStack UNIT III: (10+3) Hrs Scaling a Cloud Infrastructure: Capacity Planning, Cloud Scale. Cloud Security: Data Security, Network Security, Host Security, Compromise Response Disaster Recovery: Disaster Recovery Planning, Disasters in cloud, Cloud Disaster Management

UNIT IV: (12+4) Hrs Cloud Computing Software Security Fundamentals -Cloud information Security Objectives, Cloud Security Services, Relevant Cloud Security Design Principles, Secure Cloud Software Requirements, Approaches to Cloud Software Requirements Engineering, Cloud Security Policy Implementation Cloud Computing Risk Issues: The CIA Triad, Privacy and Compliance Risks, Threats to Infrastructure Data and Access Control, Cloud Access Control Issues, Cloud Service Provider Risks TEXT BOOKS: 1. Cloud Application Architectures, George Reese, O’Reilly (Units I,II, III) 2. Cloud Security, Ronald L. Krutz and Russell Dean Vines, Wiley Publishing (Unit IV) REFERENCE BOOKS: 1. Distributed & Cloud Computing From Parallel Processing to the Internet of Things, Kai Hwang.

Geoffrey C. Fox, Jack J.Dongarra, Morgan Kauffman Publishers 2. Michael Miller, Cloud Computing: Web-Based Applications That Change the Way You Work and

Collaborate Online, Que Publishing 3. Cloud Computing and SOA Convergence in Your Enterprise: A Step-by-Step Guide David S.

Linthicum Addison-Wesley Professional.

B.Tech- 6th Semester SYLLABUS

(Applicable for 2013-14 admitted batch) Course Title: OBJECT ORIENTED ANALYSIS AND DESIGN L AB Course Code: IT3219

L T P C 0 0 3 2

Course Objectives: Students undergoing this course are expected to

• Know the practical issues of the different Object oriented analysis and design concepts.

• Inculcate the art of object oriented software analysis and design.

• Apply forward and reverse engineering of a software system.

• Carry out the analysis and design of a system in an object oriented fashion.

Course Outcomes:At the end of the course students will be able to

• Know the syntax of different UML diagrams.

• Create different UML diagrams for a software system

• Identify appropriate models to represent a software system.

• Analyze and design a software system in an object oriented style using tools like Rational

Rose.

List of Experiments

1. The student should take up the case study of Unified Library application which is mentioned in

the theory, and Model it in different views i.e. Use case view, logical view, component view,

Deployment view, Database design, forward and Reverse Engineering, and Generation of

documentation of the project.

2. Student has to take up another case study of his/her own interest and do the same whatever

mentioned in first problem. Some of the ideas regarding case studies are given in reference

books which were mentioned in theory syllabus can be referred for some idea. The following

list of case recommended are: ATM System, POS system, Student Information system,

Railway reservation system etc

Reference Books:

1. Meilir Page-Jones: Fundamentals of Object Oriented Design in UML, Pearson Education.

2. Pascal Roques: Modeling Software Systems Using UML2, WILEY-Dreamtech India Pvt. Ltd.

3. AtulKahate: Object Oriented Analysis & Design, The McGraw-Hill Companies.

4. Mark Priestley: Practical Object-Oriented Design with UML,TATAMcGrawHill

5. Gandharba Swain: Object Oriented Analysis & Design Through Unified Modeling Language,

Lakshmi

Publications Pvt.Ltd , New Delhi.

B.Tech- 6th Semester SYLLABUS

(Applicable for 2013-14 admitted batch)

Course Title: WEB TECHNOLOGIES LAB Course Code: IT3220 L T P C 0 0 3 2 Course Objectives: This course is designed to enable the students to:

• Understand the web technologies to create adaptive web pages for web application. • use CSS to implement a variety of presentation effects to the web application • know the concept and implementation of cookies as well as related privacy concerns

• Develop a sophisticated web application that employs the MVC architecture.

Course Outcomes: At the end of this course the student can answer how to:

• Integrate frontend and backend web technologies in distributed systems. • Facilitate interface between frontend and backend of a web application. • Debug, test and deploy web applications in different web servers. • Migrate the web applications to the other platforms like .Net

Experiment1: Design the following static web pages required for a Training and placement cell web site.

1) Home Page 2) Login Page 3) Registration page 2)

Experiment2: 4) Company Details Page 5) Alumni Details Page 6) Placement Staff Details Page Experimen3: 7) Student personal Info Page 8) Student Academic Info page 9) Semester Wise Percentage & their Aggregate page Experiment4: Validate login page and registration page using regular expressions. Experiment5: Apply different font styles, font families, font colors and other formatting styles to the above static web pages. Experiment6: Install wamp server and tomcat server, access above developed static web pages using these servers. Experiment7: Write a servlet/PHP to connect to the database, Insert the details of the users who register with the web site, whenever a new user clicks the submit button in the registration. Experiment8: Write a JSP/PHP to connect to the database, Insert the details of the student academic information with student academic info page. Experiment9: User Authentication:

Assume four users user1user2, user3 and user4 having the passwords pwd1, pwd2, pwd3 and pwd4 respectively. Write a servlet for doing the following. 1. Create a Cookie and add these four user id’s and passwords to this Cookie. 2. Read the user id and passwords entered in the Login form (week1) and authenticate with the values (user id and passwords) available in the cookies. If he is a valid user (i.e., user-name and password match) you should welcome him by name (user-name) else you should display “You are not an authenticated user “. Use init-parameters to do this. Store the user-names and passwords in the webinf.xml and access them in the servlet by using the getInitParameters() method. Experiment10: Write a JSP which does the following job: Authenticate the user when he submits the login form using the user name and password from the database. Experiment11: write a JSP to insert the student’s semester wise percentages and calculate aggregate and insert into database. Experiment12: write a JSP to search the students according to their aggregate and produce sorted list or according to their Enroll number.

B.Tech- 8th Semester SYLLABUS

(Applicable for 2013-14 admitted batch)

Subject Name :NETWORK PROGRAMMING Subject code:IT4422

L T P C 3 1 0 4

Course Objectives:

This course content enables students to:

6. Understand the intricacies in developing client server applications

7. Differentiate between various connection oriented and connectionless protocols

8. Analyze various SOCKETs in IPV4, IPV6 & ICMPV6 9. Implement applications using I/O Multiplexing and socket options

10. Gain and implement the concepts of Inter-process Communications

Course Outcomes:

After undergoing this course, students will be able to

6. Comprehend Networking concepts. 7. Differentiate various network protocols like TCP, UDP etc. 8. Compare SOCKETs in IPV4, IPV6 & ICMPV6 9. Implement different types of communications inLAN. 10. Demonstrate Inter Process Communication.

UNIT I

Python Basic (10+3) hrs

Installing python,Scope and uses of python, Accessing python interpreter,importing modules and getting helps,Basic data types: number, string, list, tuple, dictionary and sets. Python input and output, Decision making and looping in Python(if, elif, else, while, for). Functions, class and object, Exception handling, Files and Directories; reading and writing text files, creating and removing directories.

UNIT II

Network Programming Fundamentals (8+3) hrs

Network architecture, protocol stack and layering, ip addressing and subnet mask, OSI and TCP/IP model, Internet architecture, application programming interface (API), Network addressing, Standard ports, UNIX Networking Commands;

netstat, ifconfig, ping, traceroute, tcpdump, sock, telnet, rlogin,sshetc, client server concepts.

UNIT III

Sockets Programming (17+5) hrs

Introduction to sockets, Type of sockets(Steam and Datagram), address and port, TCP Socket call and UDP Socket call block diagram, Python Socket Module; socket, bind, listen, accept, connect, read, write, close , Basic example: TCP echoserver and TCP echoclient, UDP echoserver, UDP echoclient, Python Chat server and Chat client, Handling multiple clients at once; the select module, python Threading module.

UNIT IV

Advanced Network Programming (10+4) hrs

Python and the web, CGI, Twisted (networking framework for Python ), some popular python modules: smtplib, httplib, poplib, Programming for the Web; Retrieving web pages with http, Parsing HTML data, XML and XMLRPC, Electronic mail; sending mail, Developing Network server program.

Text Book:

2) Foundations of Python Network Programming by JOHN GOERZEN, APPRESS Publication

REFERENCE

3) Beginning Python By: James Payne, Wiley India Pvt. Ltd, Publication 4) Learning Python, By David Ascher, Mark Lutz, O'Reilly Publication

B.Tech- 8th Semester SYLLABUS

(Applicable for 2013-14 admitted batch)

Course Title: DESIGN PATTERNS Course Code: IT4430 L T P C 3 1 0 4 Course Objectives: The course content enables students to: • Understand different types of Design patterns • Apply patterns in programming projects to make code more readable • Create an object-oriented design using design patterns • Learn advanced design techniques, principles, practices, and approaches in solving problems • Compare design patterns with object-oriented designs Course Outcome: At the end of the course students are able to:

• Classify and document design patterns

• Understand patterns to manage algorithms and assign responsibilities to objects

• Apply patterns to solve design problems • Create new design patterns

UNIT – I (11+3) Hrs Introduction: What Is a Design Pattern? Design Patterns in Smalltalk MVC, Describing Design Patterns, The Catalog of Design Patterns, Organizing the Catalog, How Design Patterns Solve Design Problems, How to Select a Design Pattern, How to Use a Design Pattern. UNIT – II (12+4) Hrs Creational Patterns: Abstract Factory, Builder, Factory Method, Prototype, Singleton, Discussion of Creational Patterns. Structural Pattern Part-I: Adapter, Bridge, Composite. UNIT-III (11+4) Hrs Structural Pattern Part-II: Decorator, Façade, Flyweight, Proxy. Behavioral Patterns Part-I: Chain of Responsibility, Command, Interpreter, Iterator. UNIT-IV

(11+4) Hrs Behavioral Patterns Part-II: Mediator, Memento, Observer, State, Strategy, Template Method,Visitor, Discussion of Behavioral Patterns. What to Expect from Design Patterns: A Brief History, the Pattern Community An Invitation, A Parting Thought. TEXT BOOK:

2. Design Patterns By Erich Gamma, Pearson Education

REFERENCES: 1. Pattern’s in JAVA Vol-I By Mark Grand ,WileyDreamTech. 2. JAVA Enterprise Design Patterns Vol-III By Mark Grand ,WileyDreamTech. 3. Head First Design Patterns By Eric Freeman-Oreilly-spd 4. Design Patterns Explained By Alan Shalloway,Pearson Education

B.Tech- 8th Semester

SYLLABUS (Applicable for 2013-14 admitted batch)

Course Title: ARTIFICIAL INTELLIGENCE Course C ode: IT4421 L T P C

3 1 0 4 Course objectives: Students undergoing this course are expected to:

• Know the AI problems, techniques and the different heuristic search techniques. • Represent the knowledge in different forms and analyze their suitability to computer. • Know the different ways of planning and natural language understanding and how to

apply to computer • Analyze different methods of learning and its applicability to computer. • Know about the architecture of an Expert System

Course outcomes: After undergoing the course, Students will be able to:

• Use the heuristic search techniques for AI related problems. • Represent knowledge in suitable forms for computer processing. • Apply the natural language processing techniques to solve real life problem. • Apply different m/c learning techniques to design computational models .

UNIT- I (12 + 4 Hours) Introduction: AI problems, AI techniques, defining problem as a state space search, production systems, problem characteristics, production system characteristics Heuristic search techniques:Generate-and-test, hill climbing, best-first-search, problem reduction, constraint satisfaction, means-ends-analysis UNIT-II (11+ 3 Hours) Knowledge representation: Issues, predicate logic, resolution, representing knowledge using rules, forward versus backward reasoning, matching, control knowledge, weak slot and filler structure- semantic nets, frames, strong slot and filler structures-conceptual dependency, scripts UNIT- III (11+ 4 Hours) Game playing: mini-max search, alpha-beta cutoffs, planning system, goal stack planning, hierarchical planning, understanding as constraint satisfaction, waltz algorithm, natural language processing, syntactic processing, semantic analysis,case grammars UNIT- IV (11+ 4 Hours) Learning: Rote learning, learning by taking advice, learning in problem solving, learning from examples, winston’s learning program, decision trees, perception, vision, speech recognition, navigation, manipulation, robot architecture, Expert systems, shell, explanation, knowledge acquisition. Text Books:

3. Artificial Intelligence, 3rd edition, E.Rich and K.Knight, TMH 4. Artificial Intelligence A modern Approach, RusselNorvig, Pearson Education

Reference Books: 3. Artificial Intelligence, third edition, Patrick henry Winston, Pearson Education Asia

4. Introduction to Artificial intelligence and Expert Systems, Dan W. Patterson, PHI

B.Tech- 8th Semester

SYLLABUS (Applicable for 2013-14 admitted batch)

Course Title: E – Commerce Course Code: CSE4427 L T P C 3 1 0 4

COURSE OBJECTIVES: The course content enables students to: • Acquaint with fundamental terms and concepts of e-commerce. • Compare and contrast the types of business models and e-commerce models • Analyze important strategic planning factors when implementing e-commerce initiatives. • Recommend appropriate technical resources for e-commerce projects. COURSE OUTCOMES: At the end of the course students are able to:

• Examine some typical distributed applications.

• Detail some of the problems that are encountered when developing distributed applications.

• Understand some of the technologies that are used to support distributed applications.

• Illustrate some of the business models used in the internet. UNIT - I 11+3 Electronic Commerce-Frame work, anatomy of E-Commerce applications, E-Commerce Consumer applications, E-Commerce organization applications. Consumer Oriented Electronic commerce - Mercantile Process models. UNIT - II 11+4 Electronic payment systems - Digital Token-Based, Smart Cards, Credit Cards, Risks in Electronic Payment systems. Inter Organizational Commerce - EDI, EDI Implementation, Value added networks UNIT - III 12+4 Intra Organizational Commerce - work Flow, Automation Customization and internal Commerce, Supply chain Management Corporate Digital Library - Document Library, digital Document types, corporate Data Warehouses. Advertising and Marketing - Information based marketing, Advertising on Internet, on-line marketing process, market research. UNIT-IV 11+4 Consumer Search and Resource Discovery - Information search and Retrieval, Commerce Catalogues, Information Filtering Multimedia - key multimedia concepts, Digital Video and electronic Commerce, Desktop video processing, Desktop video conferencing. TEXT BOOK: 1. Frontiers of electronic commerce – Kalakata, Whinston, Pearson.

REFERENCES: 1. E-Commerce fundamentals and applications Hendry Chan, Raymond Lee, Tharam Dillon, Ellizabeth Chang, John Wiley. 2. E-Commerce, S.Jaiswal – Galgotia.

B.Tech- 8th Semester

SYLLABUS (Applicable for 2013-14 admitted batch)

Course Title : MOBILE COMPUTING Course Code : CSE4423

L T P C 3 1 0 4 Course Objectives: The course content enables students to:

� Differentiate between various medium access schemes � Understand the concept of Mobile IP and packet delivery � Know the importance of Wireless Sensor Networks � Configure an Ad hoc network using NS3

Course Outcomes: At the end of the course students are able to:

� Demonstrate knowledge of different voice and data communication standards � Analyze the need for optimizations in Mobile IP � Distinguish between proactive and reactive routing in an Ad hoc network � Develop simple app using Android

UNIT – I 12+4

Mobile Communications - Overview: Wireless transmission, voice and data communication standards – 1G/2G/3G/4G, WPAN, WLAN, applications, limitations, mobile computing architecture, overview on mobile devices and systems

Wireless Medium Access Control: Motivation for a specialized MAC (Hidden and exposed terminals, Near and far terminals, MACA), modulation, Spread spectrum, SDMA, FDMA, TDMA, CDMA

GSM: services, system architecture, radio interface, localization, call handling, handover, security, GPRS, EDGE

UNIT – II 10+3

Mobile Network Layer: Mobile IP, IP packet delivery, agent advertisement and discovery, registration, tunneling and encapsulation, optimizations, Dynamic Host Configuration Protocol

Mobile Transport Layer: Traditional TCP, Indirect TCP, Snooping TCP, Mobile TCP

UNIT – III 12+4

Mobile Ad hoc Network (MANET): Introduction, Properties, applications, limitations, routing issues, routing algorithms – proactive (DSDV & OLSR) and reactive (DSR & AODV)

Wireless Sensor Network (WSN): Introduction, architecture, applications, security in ad hoc networks

Wireless LAN: IEEE 802.11, System architecture, Protocol layers

UNIT – IV 11+4

Network Simulator: Overview on different network simulators (NS2,NS3,Qualnet, Omnet++, Netsim etc.), configuration of MANET and WSN on NS2/NS3 Mobile OS: Overview on different mobile Oss (Android OS, IOS, Windows 8, Blackberry OS etc.), Android OS architecture, app development examples Wireless Application Protocol (WAP): Introduction, architecture

Text Books:

3. Mobile Computing, Raj Kamal, Oxford press, Second Edition 4. Mobile Communications, Jochen Schiller, Pearson Education, Second Edition

Reference Books:

4. Mobile Computing, Asoke K Talukder, Hasan Ahmed and RoopaYavagal, McGraw Hill 5. Fundamentals of Mobile Computing, Prasant Kumar Pattnaik and Rajib Mall, PHI Learning 6. http://www.isi.edu/nsnam/ns/doc/ns_doc.pdf (NS2 manual)

B.Tech- 8th Semester SYLLABUS

(Applicable for 2013-14 admitted batch)

Course Title: MIDDLEWARE TECHNOLOGIESCourse Code: I T4421 L T P C

3 1 0 4 COURSE OBJECTIVES: The course content enables students to:

• Understand different types, benefits and pitfalls of client server computing models.

• Establish communication between client and server through java RMI and JDBC. • Implement C#.Net applications using Assemblies, and Callback Interfaces.

• Develop client server applications using heterogeneous programming languages with CORBA • Learn java bean component model with EJBS and CORBA.

COURSE OUTCOMES: At the end of the course students are able to:

• Choose appropriate client server computing model for given problem. • Design a dynamic remote application with RMI and JDBC Connectivity.

• Develop client server applications using C#.net • Select appropriate language for homogeneous and heterogeneous objects.

• Develop real time projects by combining CORBA and database interfacing UNIT – I 11+4 Introduction to client server computing: Evolution of corporate computing models from centralized toDistributed computing,client server models. Benefits of client server computing, pitfalls of client serverProgramming.

Advanced Java: Review of Java concept like RMI, and JDBC.

UNIT – II 11+4 Introducing C# and the .NET Platform; Understanding .NET Assemblies, Object –Oriented Programmingwith C#, Callback Interfaces.

Building c# applications: Type Reflection, Late Binding, and Data Access with ADO.NET.

UNIT-III 12+3 Core CORBA / Java: Two types of Client/ Server invocations-static, dynamic. The static CORBA, firstCORBA program, ORBlets with Applets, Dynamic CORBA-The portable count, the dynamic count

Existential CORBA: CORBA initialization protocol, CORBA activation services, Introduction to SOA

UNIT-IV 11+4 Java Bean Component Model: Events, properties, persistency, Introspection of beans, CORBABeans.

EJBs and CORBA: Object transaction monitors CORBA OTM’s, EJB and CORBA OTM’s, EJBcontainer frame work, Session and Entity Beans.

Text Books: 1. Client/Server programming with Java and CORBA Robert Orfali and Dan Harkey, John Wiley & Sons,SPD 2nd Edition

2. Java programming with CORBA 3rd Edition, G.Brose, A Vogel and K.Duddy, Wiley-dreamtech, IndiaJohn wiley and sons

Reference Books: 1. Distributed Computing, Principles and applications, M.L.Liu, Pearson Education 2. Client/Server Survival Guide 3rd edition Robert Orfali Dan Harkey& Jeri Edwards, John Wiley & Sons 3. C# Preciesely Peter Sestoft and Henrik I. Hansen, Prentice Hall of India

B.Tech- 8th Semester SYLLABUS

(Applicable for 2013-14 admitted batch)

Course Title: Software Project ManagementCourse Code:

Course Objectives: The course content enables students to:

� Overview of software project evaluationand the project planning. It also covers the Step Wise framework in project planning.

� Evaluate and assess the projects and to find the cost of the project using cost benefit evaluation techniques.

� To produce an activity plan for a project and to estimate the overall duration of the project by analyzing the risks involved in it.

� Identifying the factors that influence people’s behavior in a project environment and project quality.

� Overview of project possible change management and review of some free open source project management tools.

Course Outcomes: At the end of the course students are able to:

� Apply and practice Project Management principles while developing a software. � Defining and implementing software project planning. � Analyzing software risks and risk management strategies � Defining the concepts of software quality and reliability on the basis of international quality

standards. � Knowing and implementing the software project management tools

UNIT-1 Project Evaluation and Planning 14+4 Activities in Software Project Management, Overview Of Project Planning, Stepwise planning, contract management, Software processes and process models. Cost Benefit Analysis, Cash Flow Forecasting, Risk Evaluation. Project costing, Function point analysis, COCOMO 2, Staffing pattern, Effect of schedule compression, Putnam’s equation, Capers Jones estimating rules of thumb.

UNIT-2 Monitoring and Control 11+4 Project Sequencing and Scheduling Activities, work breakdown structure, Gantt chart, Scheduling resources, Critical path analysis, Network Planning.

Collecting Data, Visualizing Progress, Cost Monitoring, review techniques, project termination review, Earned Value analysis, Change Control, Software Configuration Management (SCM), Managing Contracts, Types Of Contracts, Stages In Contract Placement, Typical Terms of A Contract, Contract Management and Acceptance.

UNIT-3 Quality Management and People Management 10+4 Risk Management, Nature and Types of Risks, Managing Risks, Hazard Identification, Hazard Analysis, Risk Planning and Control, PERT and Monte Carlo Simulation techniques.

Introduction, Understanding Behavior, Organizational Behaviour, Selecting The Right Person For The Job, Motivation, The Oldman – Hackman Job Characteristics Model , Working in Groups, Organization and team structures, Decision Making, Leadership, Organizational Structures, ISO and CMMI models,

UNIT-4 Project Change Management 10+3 Introduction, Impact of change, Change as a process, Emotional behavior pattern of change, Change Management plan, dealing with resistance and conflict. Closure of a Project: Introduction, Project Implementation, Administrative closure, Project Evaluation. Testing, and Software reliability, test automation, Overview of project management tools: open-source tools Ganttproject or similar tools

Text Book

1. Bob Hughes, Mike Cotterell and Rajib Mall: Software Project Management – Fifth

Edition, Tata McGraw Hill, New Delhi, 2012.

Reference Books:

1. PankajJalote, “Software Project Management in Practice”, 2002, Pearson, Education Asia. 2. Jack T Marchewka, “Information Technology Project Management”, Third Edition

(International Student Version) , Wiley India 3. Samuel J mantel et.el “Project Management- Core Textbook”, First India Edition,

Wiley India 4. Robert K. Wysocki, Effective Software Project Management, Wiley, 2009

B.Tech- 8th Semester SYLLABUS

(Applicable for 2013-14 admitted batch) Course Title: Human Computer Interaction Course Code: IT4431 L T P C 3 1 0 4

COURSE OBJECTIVE(S):

The course content enables students to :

6. Understand core theories, models and methodologies of Interface design

7. Implement simple graphical user interfaces using the Java Swing toolkit.

8. Design, and evaluate usable graphical user interfaces. 9. Design user interfaces for physically challenged. 10. Explore current Challenges in the field of HCI.

COURSE OUTCOME(S):

At the end of the course students are able to :

• Define problem space and formulate conceptual models

• Interpret social mechanisms used in communication

• Implement user-centered approaches to interaction design

• Develop cognitive and information processing systems

• Deploy product assessments related to market analysis

UNIT I (12+3)Hrs

Introduction: Importance of user Interface, definition, importance of good design. Benefits of good design.Abrief history of Screen design. The graphical user interface: Popularity of graphics, the concept of direct manipulation, graphical system, Characteristics, Web user –interface popularity, characteristics- Principles of user interface.

UNIT II (11+4)Hrs

Design process: Human interaction with computers, importance of human characteristics, human consideration, Human interaction speeds, Screen Designing : Design goals, Screen planning and purpose, organizing screen elements, ordering of screen data and content, screen navigation and flow,

Visually pleasing composition, amount of information, focus and emphasis, presentation information simply and meaningfully, information retrieval on web, statistical graphics.

UNIT III (11+4)Hrs

Windows: Windows new and Navigation schemes selection of window, selection of devices based and screen based controls. Components :Components text and messages, Icons and increases, Multimedia, colors, uses problems,choosing colors.

UNIT IV (11+4)Hrs

Software tools : Specification methods, interface, Building Tools. Interaction Devices: Keyboard and function keys, pointing devices, speech recognition digitization and generation, image and video displays, drivers.

TEXT BOOKS :

1. Human Computer Interaction. 3/e, Alan Dix, Janet Finlay, Goryd, Abowd, Russell Beal, PEA,2004.

2. The Essential guide to user interface design,2/e, Wilbert O Galitz, Wiley DreamaTech.

REFERENCE BOOKS :

1. Designing the user interface. 4/e, Ben Shneidermann , PEA.

2. User Interface Design, SorenLauesen , PEA.

B.Tech- 8th Semester SYLLABUS

(Applicable for 2013-14 admitted batch)

Course Title: NETWORK PROGRAMMING LAB Course Code: IT2227

L T P C 0 0 3 2 Course Objectives:

Thislab course content enables students to:

• Understand the basics concepts of socket programming. • Analyze various concepts of network programming such as multiplexing, addressing, routing,

reliable/unreliable transmission protocols. • Develop high performance scalable applications using threads.

• Evaluate various network management protocols & practical issues.

Course Outcomes:

After undergoing this course, students will be able to

• Develop and implement distributed applications and protocols over intranet using Network Programming concepts.

• Apply contemporary theories, processes and tools in the development and evaluation of solutions to problems in network programming.

• Evaluate basic theories, processes and outcomes of network programming. • Apply theory, techniques and relevant tools to the specification, analysis, design,

implementation and testing of a simple network programs.

• Carry out Research and development tasks in networking.

List of Experiments:

1. ImplementthefollowingformsofIPC.

a)Pipes

b)FIFO

2. Writeaprogramtocreateanintegervariableusingsharedmemoryconceptandecrementthevariablesimultaneously bytwoprocesses.Use semaphorestoavoidrace conditions.

3. Simple echo-server and echo-client implementing both TCP and UDP socket.

4. Write a program to obtain the Local & Remote Socket Address.

5. Write a program to create a Telnet Client.

6. Write a program to create an FTP Client

7. Implement basicchat server and client.

8. Write a program to obtain the Information about the (A) Host (B) Network (C) Protocols (D) Domains

9. Chat server and client with select and threading module.

10. To Design TCP client and server application to transfer file.

11. Design a RPC application to add and subtract a given pair of integers

12. Implement the web server.

Reference Books:

6) Foundations of Python Network Programming, 2nd Edition, The comprehensive guide to building network applications with Python by John Goerzen, Brandon Rhodes, Apress Publications.

7) Python Network Programming Cookbook by Dr M O FaruqueSarker, Packt Publishing. 8) Java Network Programming by Elliotte Rusty Harold 9) A Complete Treatment of Network Programming and Cryptography in Java by Merlin Hughes. 10) UNIX Network Programming: The Sockets Networking by Stevens W. Richard

B.Tech- 8th Semester SYLLABUS

(Applicable for 2013-14 admitted batch)

Course Title: DatawWarehousing and Data Mining LAB Course Code:IT2226 L T P C 0 0 3 2 COURSE OBJECTIVE(S): The course content enables students to:

• Conceptualize the data mining problem

• Perform Preprocessing on different raw data sets • Analyze and visualize the data with data mining techniques

• Perform predictive modeling • Generate association rules for business data

COURSE OUTCOME(S): At the end of the course students are able to:

• Implement the algorithms to solve data mining problem using WEKA tool

• Identifyan appropriate method to apply in a given situation • Communicate results in terms relevant to science, business etc. • Apply different clustering techniques to characterize subgroups.

Course Contents

Study and Implement the following by using WEKA/ Clementine

15. Introduction to Graphical User Interface (GUI) of WEKA 16. Perform Data Pre-processing on sample data sets 17. Introduction to IBM SPSS Modeler and nodes palette 18. Preparing the data for analysis using data audit node. 19. Automated data preparation using data audited node. 20. Perform Association Analysis to derive the association rules. 21. Implement the Classification using Decision Tree Induction. 22. Classification using Regression. 23. Bayesian Classification. 24. Classifying telecommunications churn by using Binomial Regression. 25. Market basket analysis using rule induction/C5.0. 26. Predicting Loan defaulters using Bayesian Networks. 27. K-means clustering. 28. Hierarchical clustering.

--------

@@@@@@@@@@@@@@@@@@@END@@@@@@@@@@@@--------

--

Department of Information Technology

COURSE STRUCTURE & SYLLABUS without PRACTICE SCHOOL B.Tech 1st Semester

Code Name of the Subject Lecture Tutorial Practical Credits

HS 1401 English – I 3 1 - 4

MATH 1401 Mathematics – I 3 1 - 4

CHE 1401 Engineering Chemistry 3 1 - 4

EEE 1401 Elements of Electrical Engineering

3 1 - 4

CHEM 1401 Environmental Studies 3 1 - 4

HS 1203 English Lab - - 3 2

CHE 1202 Engineering chemistry Lab - - 3 2

ME 1203 Engineering Work Shop - - 3 2

Total 15 5 09 26

B.Tech2nd Semester

Code Name of the Subject Lecture Tutorial Practical Credits

HS 1401 English – II 3 1 - 4

MATH 1401 Mathematics – II 3 1 - 4

PHY 1401 Engineering Physics 3 1 - 4

ME 1401 Elements of Mechanical Engineering

3 1 - 4

CSE 1401 Fundamentals of Computer Programming

3 1 - 4

PHY 1202 Engineering Physics Lab - - 3 2

CSE 1202 Computer Programming Lab

- - 3 2

ME 1202 Engineering Drawing - - 3 2

Total 15 5 09 26

B.Tech 3rd Semester

Code Name of the Subject Lectures Tutorials Practical Credits

HS2404 Managerial Economics and Financial Analysis

3 1 - 4

IT 2401 Data Structures 3 1 - 4

ECE2406 Digital Logic Design 3 1 - 4

CSE2404 Discrete Structures and Graph Theory

3 1 - 4

IT 2402 Object Oriented Programming through JAVA

3 1 - 4

IT 2203 Data Structures Lab - - 3 2

IT 2204 Object Oriented Programming through JAVA Lab

- -

3 2

Total 15 5 06 24

B.Tech 4th Semester

Code Name of the Subject Lectures Tutorials Practical Credits

MATH2405 Probability and Statistics 3 1 - 4

CSE 2403 Computer Organization 3 1 - 4

IT 2405 Database Management Systems

3 1 - 4

IT 2406 Design Analysis and Algorithms

3 1 - 4

CSE 2407 Operating Systems 3 1 - 4

IT 2207 Database Management - - 3 2

Systems Lab

IT 2208 Design and Analysis of Algorithms Lab

- -

3 2

Total 15 5 06 24

B.Tech. 5th Semester

Code Name of the Subject Lectures Tutorials Practical Credits

CSE3409 Software Engineering 3 1 - 4

IT3409 Compiler Design 3 1 - 4

CSE3412 Management Science 3 1 - 4

IT3410 Computer Networks 3 1 - 4

Elective-I

ECE3428 Microprocessors and Interfacing

Computer Graphics

Real Time Operating System

3 1

- 4

GMR30206 Term paper - - 3 2

IT3211 Computer Networks Lab - - 3 2

IT3212 OS and CD Lab

-

- 3 2

Total 15 5 09 26

B.Tech. 6th Semester

Code Name of the Subject Lectures Tutorials Practical Credits

IT3413 Data Warehousing and Mining 3 1 - 4

IT3414 Object Oriented Analysis and 3 1 - 4

Design

IT3415 Web technologies 3 1 - 4

Elective – II

i) Distributed Databases

ii) Information Retrieval

Systems

iii) Information Security

3 1

- 4

Elective - III (Open Elective)

IT3418

ECE3425

CHEM3425

ME3431

EEE3427

CSE3416

viii) Cloud Computing ( IT)

ix) Disaster Management (Civil) x) Fundamentals of Global

Positioning System (ECE) xi) Industrial Safety and Hazards

Management (Chem.) xii) Operation Research (Mech.) xiii) Renewable Energy Resources

(EEE) xiv) Soft Computing (CSE)

3 1 - 4

GMR30001 Audit Course

Laboratories

IT3219 Object Oriented Analysis and

Design Lab

- 3 2

IT3220 Web Technologies Lab - 3 2

GMR30206 Mini project - 3 2

Total 15 05 9 26

B.Tech. 7th semester

Code

Name of the Subject

Lectures

Tutorials

Practical

Credits

Network Programming

3 1

4

Elective – IV

3 1

4

Artificial Intelligence

E-commerce

Mobile Computing

Elective- V

3 1

4

Digital

Image Processing

Software Project Management

Human Computer Interaction

Network Programming Lab

3

2

Data Warehousing & Data Mining

3

2

Lab

Total 09

3 6 16

B.Tech. 8th semester

Code Name of the Subject Lectures Tutorials Practical Credits

Middleware Technologies

3 1 - 4

Design Patterns

3 1 4

Elective- VI 3 1 - 4

Multimedia Systems

-

Biometrics

-

Network Management Systems

-

Main Project 12

Total 09 03 24

B.Tech- 5th Semester

SYLLABUS (Applicable for 2013-14 admitted batch)

Course Title: SOFTWARE ENGINEERING Course Code: CSE3409 L T P C 3 1 0 4

COURSE OBJECTIVE(S): The course content enables students to :

• Learn about software myths ,generic view of the process and Understand about process models

• Learn how to perform feasibility study of the projects under the requirement engineering process and system models.

• Understand about Function oriented design and Architectural styles • Get the knowledge of software testing and testing strategies, learn about risk management

plan and quality concepts.

COURSE OUTCOME(S): At the end of the course students are able to :

• Design and develop real-time software projects with effective cost estimation and plan • Make feasibility study of a project • Specify the design and architectural style of the software products • Propose testing strategy for a given software

UNIT I: (12+4)

Introduction : software engineering is discipline, software development projects, emergence of software engineering, Notable Changes in software development process. The evolving role of software, Changing Nature of Software, Software myths.

Software life cycle Models: need of life cycle model, classical and iterative waterfall model, Prototype, Evolutionary, spiral model, comparison of all the models.

UNIT II: (11+4)

Software Requirements:Functional and non-functional requirements, User requirements, System requirements, Interface specification, the software requirements document. Requirements engineering process:Feasibility studies, Requirements elicitation and analysis, Requirements validation, Requirements management. System models: Context Models, Behavioral model1, Data models, Object models, structured methods.

UNIT III: (11+4)

Function Oriented Design: Structured analysis, DFD and its Extension, structured design detailed design. Design Engineering: Design process and Design quality, Design concepts, the design model. Creating an architectural design: Software architecture, Data design, Architectural styles and patterns, Architectural Design

Unit IV: (12+4)

Performing User interface design: Golden rules, User interface analysis and design and steps Coding and Testing: coding and review, testing, Unit testing, integration testing black box and white box testing, debugging, system testing, object oriented programs testing,

Risk management: Reactive vs. Proactive Risk strategies, software risks, Risk identification, Risk projection, Risk refinement, RMMM, RMMM Plan. Software Quality: Reliability, quality and management system, Quality concepts, ISO, SEI CMMI,PSP, Six sigma. Quality assurance techniques.

TEXT BOOKS : 1.”Fundamentals of software Engineering” Rajib Mal 3rd edition, Eastern Economy Edition, ISBN-978-81-203-3819-7 2. Software Engineering, A practitioner’s Approach- Roger S. Pressman, 6th edition. McGraw-Hill International Edition. REFERENCE BOOK: 1. Software Engineering- Sommerville, 7th edition, Pearson education.

B.Tech- 5th Semester

SYLLABUS (Applicable for 2013-14 admitted batch)

Course Title: COMPILER DESIGN Course Code: IT3409 L T P C

3 1 0 4 Course Objectives: The course content enables students to:

• Understand the phases of compilation process, purpose and implementation approach of each phase.

• Apply aspects of theoretical computer science including Languages, Grammars and Machines in developing a compiler.

• Evaluate how the compiler does the code optimization effectively. • Create a project such as compiler construction by using prior programming language.

Course Outcome: At the end of the course the students are able to:

• Understand the requirement of compiler design. • Apply working skills in theory and application of finite state machines, recursive descent,

production rules, parsing, and language semantics. • Understand about powerful compiler generation tools. • Apply the ideas, the techniques, and the knowledge acquired for the purpose of other software

design.

UNIT – I (11+4) Hrs Finite automata: Definition and description of finite automata - NDFA –Conversion between DFA & NDFA- Minimization of Finite automata-Regular expressions - Overview of compilers- various phases of Compilers- Design of lexical analyser, Introduction to lex tool. UNIT – II (11+4) Hrs Syntax analyzer: Design of syntax analyser - Design of Parsers - Shift Reduce parsers - LR parser - SLR parser - LALR parser, Introduction to YACC tool. UNIT-III (11+3) Hrs Syntax directed translation: Syntax directed translation and implementation - Intermediate code - Postfix notation - Parsing tree - Three addresses Code – Quadruples, Triples ,Indirect Triples. UNIT-IV (12+4) Hrs Intermediate code optimization: The principle sources of optimization - Loop Optimization - DAG - Global data flow analysis. Code generation: Problems - Machine model - A simple code generator - Register allocation and assignment - Code generation from DAG - Peep hole optimization. Text Books: 1. Principles of Compiler Design, by Alfred Aho and Jeffrey D. Ullman 2. Compiler Design by A.A.Puntambekar Reference Books: 1. Introduction to Automata Theory, Languages, and Computation by Hopcroft, John E., and Jeffrey D. Ullman

B.Tech- 5th Semester

SYLLABUS (Applicable for 2013-14 admitted batch)

Course Title : Management Science Course Code: HS3406

L T P C 3 1 0 4 Course Objectives: The course content enables students to:

11. Understand the concepts of management, administration and organization 12. Know the concepts of work study and how it is carried out. 13. Gain the relevant knowledge in the field of staff selection procedure and training 14. Evaluate the environmental scanning 15. Avoid common pitfalls and mistakes in managing projects

Course Outcomes: At the end of the course students are able to:

11. Plan, organize, direct and control the functions and forms of an organization 12. Apply the knowledge of work study and its application in the day-to-day life 13. Synthesize information regarding the effectiveness of recruiting methods and the validity of

selection procedure, and make appropriate staffing decisions 14. Analyze companies’ internal and external resources and capabilities 15. Evaluate a project, develop the scope of work, provide accurate cost estimates and to plan the

various activities

UNIT- I: (12+3*) Introduction to Management: Concepts of Management – Nature, Importance and Functions of Management – Taylor’s Scientific Management Theory, Fayol’sTheory and its Principles of Management, Mayo’s Hawthorne Experiments, Maslow’s Theory of Human Needs, Douglas McGregor’s Theory X and Theory Y. Forms of Organization Structures: Types of organization structures: Line organization, Line and staff organization, Functional organization, Committee organization, matrix organization, structure and their merits and demerits.

UNIT- II : (11+4*) Operations Management: Principles and Types of Plant Layout – Methods of production: Job, batch and Mass Production – Work Study: Basic procedure involved in Method Study and Work Measurement. Materials Management: Objectives, Need for Inventory control, EOQ, ABC Analysis, Purchase Procedure, Stores Management and Stores Records. MarketingManagement:Functions of Marketing, Marketing strategies based on Product Life Cycle, Channels ofdistribution. UNIT- III: (11+3*)

Human Resources Management (HRM) : Concepts of HRM – Basic functions of HR Manager: Manpower planning, Recruitment,Selection, Training and Development, Placement, Wage and Salary Administration, Promotion,Transfer,Separation, Performance Appraisal,Job Evaluation and Merit Rating.

Strategic Management: Mission, Goals, Objectives, Policy, Strategy, Programmes – Elements of Corporate Planning Process – Environmental Scanning, SWOT Analysis. UNIT- IV: (11+5*) Project Management: Introduction – Project Life Cycle and its phases – Role of Project Manager - Project Selection Methods and Criteria – Network Analysis, Programme Evaluation and Review Technique (PERT),Critical Path Method (CPM), Identifying critical path, Probability of Completing the project within given time, Project Cost Analysis, Project Crashing(simple problems) Contemporary Management Practices : Basic concepts of MIS, End User Computing, Materials Requirement Planning (MRP), Just-In-Time (JIT) System, Total Quality Management (TQM), Six sigma and Capability Maturity Model (CMM) Levels, Supply Chain Management, Enterprise Resource Planning (ERP), Performance Management, Business Process outsourcing (BPO). (Note: We will have only short questions from thispart.No essay questions) Text Books:

5. Dr. A R Aryasri : Management Science, TMH, New Delhi, 2013. 6. Dr P Vijaya Kumar &Dr N AppaRao Management Science Cengage, New Delhi 2012

Reference Books: 13. Koontz &Weihrich: Essentials of Management, 6/e, TMH, 2007 14. Principles and Practice of Management, L.M.Prasad, Sultan Chand and Sons, 2007 15. Phillips Kotler& Armstrong- Principles of Marketing- Pearson. 16. KanishkaBedi- Productionand Operations Management, Oxford University Press, New

Delhi 2011. 17. Project Management by R.B.Khanna, PHI Learning Pvt. Ltd. New Delhi, 2011. 18. Project Management by R. PanneerSelvam&P.Senthil Kumar, PHI Learning Pvt. Ltd. New

Delhi, 2009.

B.Tech- 5th Semester

SYLLABUS (Applicable for 2013-14 admitted batch)

Course Title: COMPUTER NETWORKS Course Code: IT3410

L T P C 3 1 0 4 Course Objectives:

The course content enables students to :

• Understand basic network models and Different transmission used for data communication.

• Recognize the data link design issues and various data link protocols used for data transmission.

• Understand different routing algorithms used for data transmission from source to destination in a network layer.

• Know how internet address are installed and how internet protocols are used in connecting internet.

Course Outcomes: At the end of the course students are able to:

• Suggest appropriate network model for data communication.

• Know how reliable data communication is achieved through data link layer. • Propose appropriate routing algorithm for data routing.

• Connect internet to the system and knowledge of trouble shooting.

UNIT I: INTRODUCTION (11+4) Hours Network Hardware, Network Software, and Reference Models: OSI, TCP/IP, The ARPANET, Network Topologies , Physical Layer: Transmission media: Magnetic Media, Twisted pair, Base band Coaxial Cable, Fiber optics, Wireless Transmission: Electromagnetic Spectrum, Radio Transmission, Microwave Transmission. UNIT II (12+4) Hours Data link layer: Design issues: framing, error detection and correction, CRC, Elementary Data link Protocols: Stop and wait, Sliding Window protocols: Go-back-n, Selective Repeat, Medium Access sub layer: Channel allocation methods, Multiple Access protocols: ALOHA, CSMA, IEEE Standard 802.3 and Ethernet, IEEE Standard 802.4: Token bus. UNIT – III: (10+3) Hours Network Layer: Network Layer design issues, Virtual circuit and Datagram subnets, Routing algorithms: Shortest path routing, Flooding, Hierarchical routing, Distance vector routing. Broad cast and Multi cast routing, Congestion Control: Congestion prevention policies. UNIT –IV: (12+4) Hours The Network layer in the internet: The IP Protocol, IP Addresses, and Internet Control Protocols. Transport Layer: Transport Services, Connection management, Elements of Transport Protocols, Internet Transport Protocols: UDP and TCP. Application Layer - Domain name system, Electronic Mail, WWW TEXT BOOK:

1. Computer Networks — Andrew S Tanenbaum, 4th Edition. Pearson Education /PHI REFERENCES: 1. Data Communications and Networking - Behrouz A. Forouzan. Third Edition TMH 2. Understanding communications and Networks, 3rd Edition, W.A. Shay, Thomson

B.Tech- 5th Semester SYLLABUS

(Applicable for 2013-14 admitted batch)

Course Title: MICROPROCESSORS AND INTERFACINGCourse Code: ECE 3429

L T P C 3 1 0 4 Course objectives:

Students undergoing this course are expected to:

• Familiarize with the architecture of 8086 processor, assembling language programming and interfacing with various modules.

• Learn to Interface various I/O peripherals like ADC, DAC, Keyboard, stepper motor etc., with microprocessors using 8255 PPI.

• Do any type of industrial and real time applications by knowing the concepts of Microprocessors

• Understand 8251-USARTand serial communication concepts.

Course Outcomes:

After undergoing the course, students will be able to

• Understand the full internal workings of a typical simple CPU including the utilization of the various hardware resources during the execution of instructions.

• Introduce the design of basic I/O hardware and microprocessor interfacing: memory chip selection, memory expansion, I/O interfacing.

• Interface input and output devices like LCD, LED, Keyboards ADC, DAC and stepper motor to microprocessors.

• Design the home appliances and toys using Microprocessor chips.

UNIT- I

8086 Architecture: (12 hours)

8086-Functional Diagram, Register Organization, Signal description, Physical Memory Organization, Minimum and Maximum mode operations of 8086, Timing Diagrams.

UNIT- II

Instruction Set of 8086: ( 16 hour )

Addressing modes, Data Transfer Instructions, Arithmetic Instructions, Bit Manipulation Instructions, Branch Instructions, Processor Control Instructions and String Instructions.Assembler Directives, Procedures and macros, Assembly Language Programming Examples.

UNIT- III

Programmable devices and Interfacing of I/O with 8086: ( 16 hours)

Semiconductor Memory Interfacing, 8255 PPI-Various modes of operations, Stepper Motor interfacing, D/A and A/D Conversions, DMA Controller 8257.

UNIT-IV

8086 Interrupts and Serial Communication (16 hours)

8086 interrupts and Interrupt Vector Table (IVT), Programmable Interrupt Controller 8259A, Serial data transfer schemes. Asynchronous and Synchronous data transfer schemes, Programmable Communication Interface 8251 USART, TTL to RS 232C and RS232C to TTL conversion, Sample program of serial data transfer.

Text Books:

3. Ray and Bhurchandi, “ Advanced Microprocessors”, Tata McGraw-Hill 2nd edition 2007 4. D.V.Hall, “Microprocessor and Interfacing “, Tata McGraw-Hill.

Reference Books:

1. Microcomputer system 8086/8088 family architecture, programming and design Liu and GA Gibson, PHI second edition

B.Tech- 5th Semester

SYLLABUS (Applicable for 2013-14 admitted batch)

Course Title: COMPUTER GRAPHICS Course Code: CSE3412 L T P C 3 1 0 4 Course Objectives: The course content enables students to:

• Learn basic principles and problems of computer graphics.

• Know application areas of computer graphics, different display devices and their characteristics to display an object.

• Understand background of the geometrical and mathematical foundations with algorithms for generating points, lines, circles, ellipses and different polygon curves and surfaces, Learn coordinate systems and different transformations of the object in 2D and 3D coordinate systems like rotation, translation, scaling and reflection.

• Understand 3D viewing, rendering, visible surface detection algorithms with animation fundamentals.

Course Outcomes: At the end of the course students are able to :

• Be familiarized with contemporary graphics hardware, the actual methodology and techniques to draw computer graphics, animations etc. for the real world presentation and how it is implemented in Computer graphics software

• Develop new kinds of graphics and animations.

• Design and develop graphics applications with the implementation of advanced methods such as ray tracing, texture mapping, illumination and shading and be able to build interactive user interface to manipulate objects in a 3D scene and also in the development of Web pages.

• Demonstrate the ability to develop an animation movie. UNIT – I (11+4) Introduction: Application of Computer Graphics, overview of graphics systems, raster scan systems, random scan systems, raster scan display processors. Output primitives : Points and lines, line drawing algorithms( Bresenham’s and DDA Line derivations and algorithms), mid-point circle and ellipse algorithms. Filled area primitives: Inside and outside tests, Scan line polygon fill algorithm, boundary-fill and flood-fill algorithms. UNIT – II (11+4) 2-D geometrical transforms: Translation, scaling, rotation, reflection and shear transformations, matrix representations and homogeneous coordinates, composite transforms, transformations between coordinate systems. 2-D viewing: The viewing pipeline, viewing coordinate reference frame, window to view-port coordinate transformation, viewing functions, Cohen-Sutherland and Cyrus beck line clipping

algorithms, Sutherland –Hodgeman polygon clipping algorithm. UNIT-III (11+4) 3-D object representation: Polygon surfaces, quadric surfaces, spline representation, Hermite curve, Bezier curve and B-Spline curves, Bezier and B-Spline surfaces. 3-D Geometric transformations: Translation, rotation, scaling, reflection and shear transformations, composite transformations. 3D Viewing pipeline, clipping, projections (Parallel and Perspective). UNIT-IV (12+3) Visible surface detection methods: Classification, back-face detection, depth-buffer, scan-line, depth sorting, BSPtree methods, area sub-division and octree methods. Computer animation: Design of animation sequence, general computer animation functions, raster animation, computer animation languages, key frame systems, motion specifications. Text Books: 1. 1. Computer Graphics C version, Donald Hearn, M.Pauline Baker, Pearson 2. Computer Graphics with Virtual Reality Systems, Rajesh K Maurya, Wiley Reference Books: 1. Computer Graphics Principles & practice, 2/e, Foley, VanDam, Feiner, Hughes, Pearson 2. Computer Graphics, Peter, Shirley, CENGAGE

B.Tech- 5th Semester SYLLABUS (Applicable for 2013-14 admitted batch)

Course Title: Real Time Operating System Course Code:

L T P C 3 1 0 4 Course Objectives: The course content enables students to:

� Explain the concept of a real-time system and why these systems are usually implemented as concurrent processes

� Describe a design process for real-time systems. � Explain the role of a real-time operating system. � Introduce generic process architectures for monitoring and control and data acquisition systems

Course Outcomes:

At the end of the course students are able to:

� Present the mathematical model of the system and to develop real time algorithm for task scheduling.

� Understand capabilities Handling Resource Sharing and dependencies among Real-time Tasks � Generate a high-level analysis for Scheduling Real-time tasks in multiprocessor and distributed

systems � Understand the working of real time operating systems and real time database.

UNIT-I REAL-TIME SYSTEMS 11+4 Introduction: What is real time, Applications of Real-Time systems, A basic model of Real-time system, Characteristics of Real-time system, Safety and Reliability, Types of Real-time tasks, timing constraints, Modeling timing constraints Some important concepts, Types of Real-time tasks and their characteristics, Task scheduling, Clock-Driven scheduling, Hybrid schedulers, Event-Driven scheduling, Earliest Deadline First (EDF) scheduling. UNIT-II 11+ 4 Rate monotonic algorithm (RMA). Some issues associated with RMA. Issues in using RMA practical situations. Handling Resource Sharing and dependencies among Real-time Tasks: Resource sharing among real-time tasks.Priority inversion. Priority Inheritance Protocol (PIP), Highest Locker Protocol (HLP). Priority Ceiling Protocol (PCP).Different types of priority inversions under PCP.Important features of PCP. Some issues in using a resource sharing protocol. Handling task dependencies. UNIT-III 11+ 4 Scheduling Real-time tasks in multiprocessor and distributed systems: Multiprocessor task allocation, Dynamic allocation of tasks. Fault tolerant scheduling of tasks. Clock in distributed Real-time systems, Centralized clock synchronization Commercial Real-time operating systems: Time services, Features of a Real-time operating system, Unix as a Real-time operating system, Unix-based Real-time operating systems, Windows as a Real-time operating system, POSIX-RT, A survey of contemporary Real-time operating systems. Benchmarking real-time systems.

UNIT-IV 11+ 4 Real-time Databases: Example applications of Real-time databases. Review of basic database concepts, Real-time databases, Characteristics of temporal data. Concurrency control in real-time databases.Commercial real-time databases. Real-time Communication: Basic concepts, Examples of applications, Real-time communication in a LAN an d Real-time communication over packet switched networks. Text Book: 1. Real-time Systems Theory and Practice by Rajib Mall, Pearson Publication, 2008. References Books: 1. Jane W. S. Liu, Real-Time Systems, Pearson Education, 2000. 2. C.M. Krishna and K.G. Shin, Real-Time Systems, TMH.

B.Tech- 5th Semester

SYLLABUS (Applicable for 2013-14 admitted batch)

Course Title: COMPUTER NETWORKS LAB Course Code:IT3211 L T P C 0 0 3 2 COURSE OBJECTIVE(S): The course content enables students to:

• Understand basic network models and Different transmission media used for data communication.

• Understand the data link design issues and various data link protocols used for data transmission.

• Comprehend different routing algorithms used for data transmission from source to destination in a network layer.

• Know how internet addresses are configured and how internet protocols are used in connecting internet.

COURSE OUTCOME(S): At the end of the course students are able to:

• By learning models students suggest appropriate network model for data communication. • Know how reliable data communication is achieved through data link layer.

• Suggest appropriate routing algorithm for the network. • Provide internet connection to the system and its installation.

Course Contents

1. a. Familiarization with Networking Components and devices: LAN Adapters,

Hubs, Switches, Routers etc.

b. Familiarization with Transmission media and Tools: Co-axial cable, UTP

Cable, Crimping Tool, Connectors etc.

2. Preparing the UTP cable for cross and direct connections using crimping tool.

3. Implement the data link layer framing methods :

b) character stuffing b) bit Stuffing

4. Implement on a data set of characters the two CRC polynomials: CRC 12, CRC 16

5. Implement on a data set of characters the CRC polynomials: CRC CCIP .

6. Implementation of sliding window protocol: go back n sliding window protocol

7. Implement Dijkstra ‘s algorithm to compute the Shortest path thru a graph.

8. Take an example subnet graph with weights indicating delay between nodes. Now

Obtain Routing table art each node using distance vector routing algorithm.

9. Take an example subnet of hosts. Obtain broadcast tree for it

10. To configure the IP address for a computer connected to LAN and to configure

network parameters of a

web browser for the same computer.

11. Configuration of TCP/IP Protocols in Windows .

12. a. Installing of internal modem and connecting to Internet.

b. To configure WiFi for your PC.

B.Tech- 5th Semester SYLLABUS

(Applicable for 2013-14 admitted batch)

Course Title: OPERATING SYSTEMS & COMPILER DESIGN LABCourse Code: IT3212 L T P C 0 0 3 2 Course Objectives: The course aims to

• Understand concepts such as Scheduling, Memory Management, Multi-threading, required in the design of Operating Systems.

• Analyze the various scheduling algorithms, fitting strategies, deadlock detection. • Apply the knowledge of design various phases of compiler such as Lexical analyzer, syntax

analyzer, semantic analyzer, intermediate code generator, code optimizer and code generator. • Design compiler construction tools such as Lexical Analyzer and parser generator.

Course Outcomes: After completion of this course, the students would be able to

• Determining the reasons of deadlocks, and their remedial measures in an operating system • Comparing and analyzing different file systems being used in different operating systems. • Understand, and use Context free grammar, and parse tree construction • Evaluating the working of lex and yacc compiler for debugging of programs

Implement the following experiments:

13. Simulate the following CPU scheduling algorithms a) Round Robin b) SJF c) FCFS d) Priority

14. Simulate Peterson solution for the critical section problem. 15. Simulate Bankers Algorithm for Dead Lock Avoidance& Detection. 16. Simulate MVT and MFT 17. Simulate Paging Technique of memory management. 18. Simulate all page replacement algorithms

a) FIFO b) LRU c) LFU Etc. … 19. Simulate all file allocation strategies

a) Sequential b) Indexed c) Linked 20. Simulate all File Organization Techniques

a) Single level directory b) Two level 21. Design a Lexical Analyzer for a given Language. 22. Implement the Lexical Analyzer Using Lex Tool. 23. Design predictive parser for the given language. 24. Design a LALR bottom up parser using YACC tool.

B.Tech- 6th Semester

SYLLABUS (Applicable for 2013-14 admitted batch)

Course Title: DATAWAREHOUSING AND DATA MINING Course Code: IT3413 L T P C 3 1 0 4 Course Objectives The course content enables students to:

• Analyze the difference between On Line Transaction Processing and On Line analytical processing

• Create Multidimensional schemas suitable for data warehousing • Understand various data mining functionalities • Understand in detail about data mining algorithms

Course Outcomes At the end of the course students are able to:

• Design a data mart or data warehouse for any organization • Extract knowledge using data mining techniques • Adapt to new data mining tools • Explore recent trends in data mining such as web mining, multimedia mining

UNIT- I (11+4) Hrs Introduction: Fundamentals of data mining, Data Mining Functionalities, Major issues in Data Mining Data Preprocessing:Needs Preprocessing the Data, Data Cleaning, Data Integration andTransformation, Data Reduction, Data Warehouse and OLAP Technology for Data Mining Data Warehouse, Multi-dimensionalData Model, Data Warehouse Architecture UNIT-II (11+3) Hrs Data Mining Primitives, Languages, and System Architectures : Data MiningPrimitives, Data Mining Query Languages, Designing Graphical User Interfaces Based on aData Mining Query Language,Architectures of Data Mining Systems. Concepts Description: Characterization and Comparison: Data Generalization and Summarization-Based Characterization, Analytical Characterization: Analysis of AttributeRelevance, Mining Class Comparisons: Discriminating between Different Classes UNIT- III (11+4) Hrs Mining Association Rules in Large Databases: Association Rule Mining, Mining Single-Dimensional Boolean Association Rules from Transactional Databases, Mining MultilevelAssociation Rules fromTransaction Databases. Classification and Prediction: Issues Regarding Classification and Prediction,Classification by Decision Tree Induction, Bayesian Classification, Classification byBackpropagation, Prediction. UNIT IV (12+4) Hrs Cluster Analysis Introduction: Types of Data in Cluster Analysis, A Categorization ofMajor Clustering Methods, Partitioning Methods, Density-Based Methods, Grid-BasedMethods, Model-Based Clustering Methods, Outlier Analysis. Mining Complex Types of Data:Multidimensional Analysis and Descriptive Mining ofComplex, Data Objects, Mining Multimedia Databases, Mining Text Databases, Mining the World Wide Web.

Text Books: 1. Data Mining – Concepts and Techniques - Jiawei Han &MichelineKamber Harcourt, India. 2. Data Mining Techniques – Arun K Pujari, University Press. Reference Books: 1. Data Mining Introductory and advanced topics –Margaret H Dunham, Pearson Education 2. Data Warehousing in the Real World – Sam Anahory& Dennis Murray. Pearson Edn 3. Data Warehousing Fundamentals – PaulrajPonnaiah Wiley Student Edition.

B.Tech- 6th Semester

SYLLABUS (Applicable for 2013-14 admitted batch)

Course Title: OBJECT ORIENTED ANALYSIS AND DESIGN Course Code: IT3414 L T P C 3 1 0 4 Course objectives: Students undergoing this course are expected to:

• Develop the different UML diagrams for a software system based on the given requirements. • Apply forward engineering to convert diagram to code and reverse engineering to convert code

to diagram. • Analyze & design a s/w system in object oriented approach, using unified modeling language. • Select appropriate models for a s/w system depending upon the complexity of the system

Course outcomes: After undergoing the course, students will be able to understand:

• Understand the use of unified modeling language for object oriented analysis and design • Know the syntax of different UML diagrams. • Develop different models for a software system. • Apply object oriented analysis and design to build a software system • Apply forward and reverse engineering for a software system.

UNIT – I (11+3) Hrs Introduction to UML : Importance of modeling, principles of modeling, object oriented modeling, conceptual model of the UML, Architecture, Software Development Life Cycle. Basic Structural Modeling: Classes, Relationships, common Mechanisms, and diagrams, forward& Reverse Engineering. Advanced Structural Modeling: Advanced classes, advanced relationships, Interfaces, Types and Roles, Packages. UNIT – II (12+4)Hrs Class & Object Diagrams: Terms, concepts, modeling techniques for Class & Object Diagrams. Basic Behavioral Modeling-I: Interactions, Interaction diagrams. UNIT-III (11+4) Hrs Basic Behavioral Modeling-II: Use cases, Use case Diagrams, Activity Diagrams. Advanced Behavioral Modeling: Events and signals, state machines, processes and Threads, time and space, state chart diagrams. UNIT-IV (11+4) Hrs Architectural Modeling : Component, Deployment, Component diagrams and Deployment diagrams. Case Study: The Unified Library application. Text Books: 1. Grady Booch, James Rumbaugh, IvarJacobson : The Unified Modeling Language User Guide, Pearson Education. 2. Hans-Erik Eriksson, Magnus Penker, Brian Lyons, David Fado: UML 2 Toolkit, WILEY-Dreamtech India Pvt. Ltd.

Reference Books: 1. Meilir Page-Jones: Fundamentals of Object Oriented Design in UML, Pearson Education. 2. AtulKahate: Object Oriented Analysis & Design, The McGraw-Hill Companies. 3. Gandharba Swain: Object Oriented Analysis & Design Through Unified Modeling Language, Lakshmi Publications Pvt. Ltd , New Delhi.

B.Tech- 6th Semester SYLLABUS

(Applicable for 2013-14 admitted batch) Course Title: WEB TECHNOLOGIES Course Code: IT3415 L T P C 3 1 0 4 Course Objectives: The course content enables students to:

• understand best technologies for solving web client/server problems • analyze and design real time web applications

• use Javascript for dynamic effects and to validate form input entry • Analyze to Use appropriate client-side or Server-side applications

Course Outcomes: At the end of the course students are able to:

• Choose, understand, and analyze any suitable real time web application.

• Integrate java and server side scripting languages to develop web applications. • To develop and deployreal time webapplications in web servers and in the cloud. • Extend this knowledge to .Net platforms.

UNIT – I (12+4) Hrs HTML Common tags- List, Tables, images, forms, Frames, Links and Navigation, Introduction to HTML5 CSS: Introduction, CSS Properties, Controlling Fonts, Text Formatting, Pseudo classes, Selectors, introduction to CSS3. Java Script: Learning Java script: Variables, operators, Functions, Control structures, Events, , Validations, plugins. UNIT – II (11+3) Hrs PHP Programming: Introducing PHP: Creating PHP script, Running PHP script. Working with Variables and constants: Using variables, Using constants, Data types, Operators. Controlling program flow: Conditional statements, Control statements, Arrays, functions.Working With forms.

UNIT-III (12+4) Hrs AJAX : Introduction, AJAX with XML Servlets: introduction to servlets, Life cycle of servlets, JSDK, The servlet API, the javax.servlet package, Reading servlet parameters and initialization parameters, The javax.servlet HTTP package, Handling Http request and responses, Using cookie, session tracking, Introduction to JSP: The problem with servlet, the anatomy of JSP page, JSP processing, JSP application design with MVC, Tomcat server and testing tomcat, Generic dynamic content, using scripting elements implicit JSP objects, UNIT-IV (10+4) Hrs

JSP application development: Conditional processing display values using an expression to set an attribute, Declaring variables and methods, sharing data between JSP pages, Requests and users passing control and data between pages, Sharing sessions and application data, memory usage considerations JDBC connectivity in JSP: Data base programming using JDBC, Studying javax.sql.* package, Accessing a database from a JSP page, Application specific database actions, Deploying JAVA beans in JSP page. Text Books :

3. Web Technolgies, Uttam Roy, OXFORD University press 4. Web programming with HTML, XHTML and CSS, 2e, Jon Duckett, Wiley India

Reference Books:

3. Web programming Bai, Michael Ekedahl, CENAGE Learning , India edition. 4. An Introduction to Web Design + Programming, Paul S.Wang, India Edition

B.Tech- 6th Semester SYLLABUS

(Applicable for 2013-14 admitted batch)

Course Title: DISTRIBUTED DATABASES Course Code: IT3416 L T P C 3 1 0 4 Course Objectives: This course is intended to

• Inculcate knowledge on Centralized and Distributed Databases. • Understand Transparency and Fragmentation in Distributed Databases • Apply transaction management, concurrency control, and reliability in Distributed Databases. • Analyze the features of Object Oriented databases and Create awareness on the major technical

challenges in distributed systems design and implementation.

Course Outcomes: At the end of the course the student will be able to:

• Decompose global relations into fragments. • Apply DDBMS in Data Warehousing, web-based databases and pull/push based technologies. • Analyze the principles applied in contemporary distributed database systems. • Evaluation of CORBA architecture for interoperable databases.

UNIT – I (12+4) Hrs Features of Distributed versus Centralized Databases, Levels of Distribution Transparency, Reference Architecture, Data Fragmentation, Integrity Constraints.Functions& Components of Distributed DBMSs, Translation of Global Queries to Fragment Queries. UNIT – II (10+4) Hrs Optimization of Access Strategies, A Framework for Query Optimization, Join Queries, General Queries. The Management of Distributed Transactions, A Framework for Transaction Management, Supporting Atomicity of Distributed Transactions, Concurrency Control for Distributed Transactions. UNIT-III (11+4) Hrs Concurrency Control, Foundation of Distributed Concurrency Control, Distributed Deadlocks, Timestamps, Optimistic Methods. Reliability, Non blocking Commitment Protocols, Determining a Consistent View of the Network, Detection and Resolution of Inconsistency, Checkpoints and Cold Restart. UNIT-IV (12+3) Hrs Architectural Issues, Object Management, Distributed Object Storage, Object Query Processing, Database Interoperability, Database Integration, Query Processing, Transaction Management, Object Orientation and Interoperability. Text Books: 1. Distributed Database Principles & Systems, Stefano Ceri, Giuseppe Pelagatti McGraw-Hill 2. Principles of Distributed Database Systems, M.TamerOzsu, Patrick Valduriez Reference Books:

1. Distributed Database Systems, Chhanda Ray, Pearson Education 2. Distributed Database Systems, D. David Arthur Bell, Jane B. Grimson, Addison-Wesley

B.Tech- 6th Semester SYLLABUS

(Applicable for 2013-14 admitted batch) Course Title : INFORMATION RETRIEVAL SYSTEMS Course Code : IT4423

L T P C 3 1 0 4 Course Objectives: The course content enables students to:

� Understand the Functionalities of IRS � Create indices to extract data efficiently from Information Storage � Learn document management, retrieval and searching the web. � Apply Clustering for the data to be stored to IRS � Understand working of Search Engines and ways to improve them. � Know about hypermedia architectures, design and usability of IRS

Course outcomes:

At the end of the course the students are able to:

� Learn Classical and advanced techniques employed by Web Search engines � Know different ways of representation and retrieval of documents. � Apply techniques of preprocessing needed for IRS � Develop an IRS by using different user search techniques and text search algorithms

UNIT- I 11+3 Hrs Introduction : Definition, Objectives, Functional Overview, Relationship to DBMS, Digital libraries and Data Warehouses. Information Retrieval System Capabilities: Search, Browse, Miscellaneous. UNIT-II 12+4 Hrs Cataloging and Indexing: Objectives, Indexing Process, Automatic Indexing, Information Extraction. Data Structures: Introduction, Stemming Algorithms, Inverted file structures, N-gram data structure, PAT datastructure, Signature file structure, Hypertext data structure. UNIT- III 11+4 Hrs Automatic Indexing: Classes of automatic indexing, Statistical indexing, Natural language, Concept indexing, Hypertext linkages Document and Term Clustering: Introduction, Thesaurus generation, Item clustering, Hierarchy of clusters. UNIT IV 11+4 Hrs User Search Techniques: Search statements and binding, Similarity measures and ranking, Relevance feedback, Selective dissemination of information search, Searching the Internet and hypertext, Information Visualization

Text Search Algorithms : Introduction, Software text search algorithms, Hardware text search systems. Text Books:

1. Kowalski, Gerald, Mark T Maybury: Information Retrieval Systems: Theory and Implementation,

Kluwer Academic Press, 1997.

Reference Books:

1. Frakes, W.B., Ricardo Baeza-Yates: Information Retrieval Data Structures and Algorithms, Prentice

Hall, 1992.

2. Modern Information Retrieval By Yates Pearson Education.

3. Information Storage & Retrieval By Robert Korfhage – John Wiley & Sons.

B.Tech- 6th Semester SYLLABUS

(Applicable for 2013-14 admitted batch) Course Title: Information Security Course Code: CSE 3413 L T P C 3 1 0 4 Course Objectives:

The course content enables students to :

� Understand about various Conventional Encryption Principles designed for providing security.

� Learn public key cryptography, key management principles and Learn Pretty Good Privacy (PGP) which is a computer program that provides cryptographic privacy and authentication.

� Learn IP Security fundamentals, architecture and identifying the key features IP security system.

� Understand about general requirements for Web security, which focus on standardized schemes.

Course Outcomes:

At the end of the course students are able to :

� To analyze a given system with respect to security of the system. � To create an understanding of Authentication functions the manner in which Message

Authentication Codes and Hash Functions works.

� To examine the issues and structure of Authentication Service and Electronic Mail Security � Understand conventional and public key cryptographic approaches used in message

encryption.

� Able to identify various types of attacks and its effect over the networks.

UNIT – I: (12+3)

Introduction: Security Attacks (Interruption, Interception, Modification and Fabrication), Security Services (Confidentiality, Authentication, Integrity, Non-repudiation, access Control and Availability), TCP session hijacking, UDP hijacking, ARP attacks, & Man-in-the-Middle Attacks. OSI Security Architecture - Classical Encryption techniques – Cipher Principles. Conventional Encryption Principles: Conventional encryption algorithms - Data Encryption Standard (DES), Blowfish, CAST-128, Block Cipher Design Principles and cipher block Modes of Operation, Evaluation criteria for AES Cipher. UNIT-II: (11+4) Public Key Cryptography: Public key cryptography principles, public key cryptography algorithms, digital signatures. Digital Certificates, Certificate Authority and key management Authentication & Hash Function: Authentication requirements – Authentication functions – Message Authentication Codes – Hash Functions – Security of Hash Functions and MACs – MD5 message Digest algorithm - Secure Hash Algorithm –RIPEMD-HMAC Digital Signatures – Authentication Protocols – Digital Signature Standard.

UNIT-III: (11+4) Network Security Authentication Applications: Kerberos – X.509 Authentication Service – Electronic Mail Security – PGP – S/MIME IP Security: IP Security Overview, IP Security Architecture, Authentication Header, Encapsulating Security Payload, Combining Security Associations and Key Management. UNIT – IV: (11+4) Web Security: Web Security Requirements, Secure Socket Layer (SSL) and Transport Layer Security (TLS), Secure Electronic Transaction (SET). System Level Security Intrusion detection – password management – Viruses and related Threats – Virus Counter measures – Firewall Design Principles – Trusted Systems. Text Books: 1. Network Security Essentials (Applications and Standards) by William Stallings Pearson Education. 2. Hack Proofing your network by Ryan Russell, Dan Kaminsky, Rain Forest Puppy, Joe Grand, David Ahmad, Hal Flynn IdoDubrawsky, Steve W.Manzuik and Ryan Permeh, wileyDreamtech. References: 1. AtulKahate, “Cryptography and Network Security”, Tata McGraw-Hill, 2003. 2. William Stallings, “Cryptography and Network Security – Principles and Practices”, PrenticeHallofIndia,ThirdEdition,2003 3. Charles B. Pfleeger, Shari LawrencePfleeger, “Security in Computing”, Third Edition, Pearson Education, 2003.

B.Tech- 6th Semester SYLLABUS

(Applicable for 2013-14 admitted batch)

Course Title: CLOUD COMPUTING Course Code: IT3418 L T P C 3 1 0 4 Course Objectives

• Design an API and a distributed platform that are hardware, vendor agnostic, a unified resource representation.

• Implement an agent system for negotiation of Cloud services. • Adapt tests and benchmarks for Cloud services and applications. • Evaluate features Private-Cloud and Design innovative cloud infrastructure.

Course Outcomes

• Articulate the main concepts, key technologies, strengths, and limitations of cloud computing and the possible applications for state-of-the-art cloud computing.

• Identify the architecture and infrastructure of cloud computing, including SaaS, PaaS, IaaS, public cloud, private cloud, hybrid cloud, etc.

• Identify problems, and explain, analyze, and evaluate various cloud computing solutions. • Attempt to generate new ideas, innovations in cloud computing and Collaboratively research

and write a research paper, and present the research online. UNIT I: (13+3) Hrs Understanding Cloud Computing: Cloud computing: Introduction, Cloud application architectures, Value of cloud computing, Cloud Infrastructure models, Cloud Services, History of Cloud Computing, Advantages of Cloud Computing, Disadvantages of Cloud Computing, Companies in the Cloud Today, Amazon Web Services, Google services, IBM Cloud, Windows Azure Before the move into the cloud: Know Your Software Licenses, The Shift to a Cloud Cost Model, Service Levels for Cloud Applications Ready for the cloud: Web Application Design, Machine Image Design, Privacy Design, Design, Database Management UNIT-II: (10+5) Hrs Virtual Machines and Virtualization of Clusters and Data Centers: Implementation Levels of Virtualization, Virtualization Structures/Tools and Mechanisms, Virtualization of CPU, Memory, and I/O Devices, Virtual Clusters and Resource Management, Virtualization for Data-Center Automation Case Studies: Cloud centers in detail, Comparing approaches, Xen, Eucalyptus, CloudStack, OpenStack UNIT III: (10+3) Hrs Scaling a Cloud Infrastructure: Capacity Planning, Cloud Scale. Cloud Security: Data Security, Network Security, Host Security, Compromise Response

Disaster Recovery: Disaster Recovery Planning, Disasters in cloud, Cloud Disaster Management UNIT IV: (12+4) Hrs Cloud Computing Software Security Fundamentals -Cloud information Security Objectives, Cloud Security Services, Relevant Cloud Security Design Principles, Secure Cloud Software Requirements, Approaches to Cloud Software Requirements Engineering, Cloud Security Policy Implementation Cloud Computing Risk Issues: The CIA Triad, Privacy and Compliance Risks, Threats to Infrastructure Data and Access Control, Cloud Access Control Issues, Cloud Service Provider Risks TEXT BOOKS: 3. Cloud Application Architectures, George Reese, O’Reilly (Units I,II, III) 4. Cloud Security, Ronald L. Krutz and Russell Dean Vines, Wiley Publishing (Unit IV) REFERENCE BOOKS: 4. Distributed & Cloud Computing From Parallel Processing to the Internet of Things, Kai Hwang.

Geoffrey C. Fox, Jack J.Dongarra, Morgan Kauffman Publishers 5. Michael Miller, Cloud Computing: Web-Based Applications That Change the Way You Work and

Collaborate Online, Que Publishing 6. Cloud Computing and SOA Convergence in Your Enterprise: A Step-by-Step Guide David S.

Linthicum Addison-Wesley Professional.

B.Tech- 6th Semester SYLLABUS

(Applicable for 2013-14 admitted batch) Course Title: OBJECT ORIENTED ANALYSIS AND DESIGN L AB Course Code: IT3219

L T P C 0 0 3 2 Course Objectives: Students undergoing this course are expected to

• Know the practical issues of the different Object oriented analysis and design concepts.

• Inculcate the art of object oriented software analysis and design.

• Apply forward and reverse engineering of a software system.

• Carry out the analysis and design of a system in an object oriented fashion.

Course Outcomes:At the end of the course students will be able to

• Know the syntax of different UML diagrams.

• Create different UML diagrams for a software system

• Identify appropriate models to represent a software system.

• Analyze and design a software system in an object oriented style using tools like Rational

Rose.

List of Experiments

3. The student should take up the case study of Unified Library application which is mentioned in

the theory, and Model it in different views i.e. Use case view, logical view, component view,

Deployment view, Database design, forward and Reverse Engineering, and Generation of

documentation of the project.

4. Student has to take up another case study of his/her own interest and do the same whatever

mentioned in first problem. Some of the ideas regarding case studies are given in reference

books which were mentioned in theory syllabus can be referred for some idea. The following

list of case recommended are: ATM System, POS system, Student Information system,

Railway reservation system etc

Reference Books:

1. Meilir Page-Jones: Fundamentals of Object Oriented Design in UML, Pearson Education.

2. Pascal Roques: Modeling Software Systems Using UML2, WILEY-Dreamtech India Pvt. Ltd.

3. AtulKahate: Object Oriented Analysis & Design, The McGraw-Hill Companies.

4. Mark Priestley: Practical Object-Oriented Design with UML,TATAMcGrawHill

5. Gandharba Swain:

Object Oriented Analysis & Design Through Unified Modeling Language,

Lakshmi Publications Pvt.Ltd , New Delhi.

B.Tech- 6th Semester SYLLABUS

(Applicable for 2013-14 admitted batch)

Course Title: WEB TECHNOLOGIES LAB Course Code: IT3220 L T P C 0 0 3 2 Course Objectives: This course is designed to enable the students to:

• Understand the web technologies to create adaptive web pages for web application. • use CSS to implement a variety of presentation effects to the web application • know the concept and implementation of cookies as well as related privacy concerns

• Develop a sophisticated web application that employs the MVC architecture.

Course Outcomes: At the end of this course the student can answer how to:

• Integrate frontend and backend web technologies in distributed systems. • Facilitate interface between frontend and backend of a web application. • Debug, test and deploy web applications in different web servers. • Migrate the web applications to the other platforms like .Net

Experiment1: Design the following static web pages required for a Training and placement cell web site.

3) Home Page 2) Login Page 3) Registration page 4)

Experiment2: 4) Company Details Page 5) Alumni Details Page 6) Placement Staff Details Page Experimen3: 7) Student personal Info Page 8) Student Academic Info page 9) Semester Wise Percentage & their Aggregate page Experiment4: Validate login page and registration page using regular expressions. Experiment5: Apply different font styles, font families, font colors and other formatting styles to the above static web pages. Experiment6: Install wamp server and tomcat server, access above developed static web pages using these servers. Experiment7: Write a servlet/PHP to connect to the database, Insert the details of the users who register with the web site, whenever a new user clicks the submit button in the registration.

Experiment8: Write a JSP/PHP to connect to the database, Insert the details of the student academic information with student academic info page. Experiment9: User Authentication: Assume four users user1user2, user3 and user4 having the passwords pwd1, pwd2, pwd3 and pwd4 respectively. Write a servlet for doing the following. 1. Create a Cookie and add these four user id’s and passwords to this Cookie. 2. Read the user id and passwords entered in the Login form (week1) and authenticate with the values (user id and passwords) available in the cookies. If he is a valid user (i.e., user-name and password match) you should welcome him by name (user-name) else you should display “You are not an authenticated user “. Use init-parameters to do this. Store the user-names and passwords in the webinf.xml and access them in the servlet by using the getInitParameters() method. Experiment10: Write a JSP which does the following job: Authenticate the user when he submits the login form using the user name and password from the database. Experiment11: write a JSP to insert the student’s semester wise percentages and calculate aggregate and insert into database. Experiment12: write a JSP to search the students according to their aggregate and produce sorted list or according to their Enroll number.

B.Tech- 7th Semester SYLLABUS

(Applicable for 2013-14 admitted batch)

Subject Name :NETWORK PROGRAMMING Subject code:IT4422

L T P C 3 1 0 4

Course Objectives:

This course content enables students to:

11. Understand the intricacies in developing client server applications

12. Differentiate between various connection oriented and connectionless protocols

13. Analyze various SOCKETs in IPV4, IPV6 & ICMPV6 14. Implement applications using I/O Multiplexing and socket options

15. Gain and implement the concepts of Inter-process Communications

Course Outcomes:

After undergoing this course, students will be able to

11. Comprehend Networking concepts. 12. Differentiate various network protocols like TCP, UDP etc. 13. Compare SOCKETs in IPV4, IPV6 & ICMPV6 14. Implement different types of communications inLAN. 15. Demonstrate Inter Process Communication.

UNIT I

Python Basic (10+3) hrs

Installing python,Scope and uses of python, Accessing python interpreter,importing modules and getting helps,Basic data types: number, string, list, tuple, dictionary and sets. Python input and output, Decision making and looping in Python(if, elif, else, while, for). Functions, class and object, Exception handling, Files and Directories; reading and writing text files, creating and removing directories.

UNIT II

Network Programming Fundamentals (8+3) hrs

Network architecture, protocol stack and layering, ip addressing and subnet mask, OSI and TCP/IP model, Internet architecture, application programming interface (API), Network addressing, Standard ports, UNIX Networking Commands;

netstat, ifconfig, ping, traceroute, tcpdump, sock, telnet, rlogin,sshetc, client server concepts.

UNIT III

Sockets Programming (17+5) hrs

Introduction to sockets, Type of sockets(Steam and Datagram), address and port, TCP Socket call and UDP Socket call block diagram, Python Socket Module; socket, bind, listen, accept, connect, read, write, close , Basic example: TCP echoserver and TCP echoclient, UDP echoserver, UDP echoclient, Python Chat server and Chat client, Handling multiple clients at once; the select module, python Threading module.

UNIT IV

Advanced Network Programming (10+4) hrs

Python and the web, CGI, Twisted (networking framework for Python ), some popular python modules: smtplib, httplib, poplib, Programming for the Web; Retrieving web pages with http, Parsing HTML data, XML and XMLRPC, Electronic mail; sending mail, Developing Network server program.

Text Book:

3) Foundations of Python Network Programming by JOHN GOERZEN, APPRESS Publication

REFERENCE

5) Beginning Python By: James Payne, Wiley India Pvt. Ltd, Publication 6) Learning Python, By David Ascher, Mark Lutz, O'Reilly Publication

B.Tech- 7th Semester SYLLABUS

(Applicable for 2013-14 admitted batch) Course Title: ARTIFICIAL INTELLIGENCE Course C ode: IT4421

L T P C 3 1 0 4 Course objectives: Students undergoing this course are expected to:

• Know the AI problems, techniques and the different heuristic search techniques. • Represent the knowledge in different forms and analyze their suitability to computer. • Know the different ways of planning and natural language understanding and how to

apply to computer • Analyze different methods of learning and its applicability to computer. • Know about the architecture of an Expert System

Course outcomes: After undergoing the course, Students will be able to:

• Use the heuristic search techniques for AI related problems. • Represent knowledge in suitable forms for computer processing. • Apply the natural language processing techniques to solve real life problem. • Apply different m/c learning techniques to design computational models .

UNIT- I (12 + 4 Hours) Introduction: AI problems, AI techniques, defining problem as a state space search, production systems, problem characteristics, production system characteristics Heuristic search techniques:Generate-and-test, hill climbing, best-first-search, problem reduction, constraint satisfaction, means-ends-analysis UNIT-II (11+ 3 Hours) Knowledge representation: Issues, predicate logic, resolution, representing knowledge using rules, forward versus backward reasoning, matching, control knowledge, weak slot and filler structure- semantic nets, frames, strong slot and filler structures-conceptual dependency, scripts UNIT- III (11+ 4 Hours) Game playing: mini-max search, alpha-beta cutoffs, planning system, goal stack planning, hierarchical planning, understanding as constraint satisfaction, waltz algorithm, natural language processing, syntactic processing, semantic analysis,case grammars UNIT- IV (11+ 4 Hours) Learning: Rote learning, learning by taking advice, learning in problem solving, learning from examples, winston’s learning program, decision trees, perception, vision, speech recognition,

navigation, manipulation, robot architecture, Expert systems, shell, explanation, knowledge acquisition. Text Books:

5. Artificial Intelligence, 3rd edition, E.Rich and K.Knight, TMH 6. Artificial Intelligence A modern Approach, RusselNorvig, Pearson Education

Reference Books: 5. Artificial Intelligence, third edition, Patrick henry Winston, Pearson Education Asia 6. Introduction to Artificial intelligence and Expert Systems, Dan W. Patterson, PHI

B.Tech- 7th Semester SYLLABUS

(Applicable for 2013-14 admitted batch)

Course Title: E – Commerce Course Code: CSE4427 L T P C 3 1 0 4

COURSE OBJECTIVES: The course content enables students to: • Acquaint with fundamental terms and concepts of e-commerce. • Compare and contrast the types of business models and e-commerce models • Analyze important strategic planning factors when implementing e-commerce initiatives. • Recommend appropriate technical resources for e-commerce projects. COURSE OUTCOMES: At the end of the course students are able to:

• Examine some typical distributed applications.

• Detail some of the problems that are encountered when developing distributed applications.

• Understand some of the technologies that are used to support distributed applications.

• Illustrate some of the business models used in the internet. UNIT - I 11+3 Electronic Commerce-Frame work, anatomy of E-Commerce applications, E-Commerce Consumer applications, E-Commerce organization applications. Consumer Oriented Electronic commerce - Mercantile Process models. UNIT - II 11+4 Electronic payment systems - Digital Token-Based, Smart Cards, Credit Cards, Risks in Electronic Payment systems. Inter Organizational Commerce - EDI, EDI Implementation, Value added networks UNIT - III 12+4 Intra Organizational Commerce - work Flow, Automation Customization and internal Commerce, Supply chain Management Corporate Digital Library - Document Library, digital Document types, corporate Data Warehouses. Advertising and Marketing - Information based marketing, Advertising on Internet, on-line marketing process, market research. UNIT-IV 11+4 Consumer Search and Resource Discovery - Information search and Retrieval, Commerce

Catalogues, Information Filtering Multimedia - key multimedia concepts, Digital Video and electronic Commerce, Desktop video processing, Desktop video conferencing. TEXT BOOK: 1. Frontiers of electronic commerce – Kalakata, Whinston, Pearson. REFERENCES: 1. E-Commerce fundamentals and applications Hendry Chan, Raymond Lee, Tharam Dillon, Ellizabeth Chang, John Wiley. 2. E-Commerce, S.Jaiswal – Galgotia.

B.Tech- 7th Semester SYLLABUS

(Applicable for 2013-14 admitted batch)

Course Title : MOBILE COMPUTING Course Code : CSE4423

L T P C 3 1 0 4 Course Objectives: The course content enables students to:

� Differentiate between various medium access schemes � Understand the concept of Mobile IP and packet delivery � Know the importance of Wireless Sensor Networks � Configure an Ad hoc network using NS3

Course Outcomes: At the end of the course students are able to:

� Demonstrate knowledge of different voice and data communication standards � Analyze the need for optimizations in Mobile IP � Distinguish between proactive and reactive routing in an Ad hoc network � Develop simple app using Android

UNIT – I 12+4

Mobile Communications - Overview: Wireless transmission, voice and data communication standards – 1G/2G/3G/4G, WPAN, WLAN, applications, limitations, mobile computing architecture, overview on mobile devices and systems

Wireless Medium Access Control: Motivation for a specialized MAC (Hidden and exposed terminals, Near and far terminals, MACA), modulation, Spread spectrum, SDMA, FDMA, TDMA, CDMA

GSM: services, system architecture, radio interface, localization, call handling, handover, security, GPRS, EDGE

UNIT – II 10+3

Mobile Network Layer: Mobile IP, IP packet delivery, agent advertisement and discovery, registration, tunneling and encapsulation, optimizations, Dynamic Host Configuration Protocol

Mobile Transport Layer: Traditional TCP, Indirect TCP, Snooping TCP, Mobile TCP

UNIT – III 12+4

Mobile Ad hoc Network (MANET): Introduction, Properties, applications, limitations, routing issues, routing algorithms – proactive (DSDV & OLSR) and reactive (DSR & AODV)

Wireless Sensor Network (WSN): Introduction, architecture, applications, security in ad hoc networks

Wireless LAN: IEEE 802.11, System architecture, Protocol layers

UNIT – IV 11+4

Network Simulator: Overview on different network simulators (NS2,NS3,Qualnet, Omnet++, Netsim etc.), configuration of MANET and WSN on NS2/NS3 Mobile OS: Overview on different mobile Oss (Android OS, IOS, Windows 8, Blackberry OS etc.), Android OS architecture, app development examples Wireless Application Protocol (WAP): Introduction, architecture

Text Books:

iv) Mobile Computing, Raj Kamal, Oxford press, Second Edition v) Mobile Communications, Jochen Schiller, Pearson Education, Second Edition

Reference Books:

7. Mobile Computing, Asoke K Talukder, Hasan Ahmed and RoopaYavagal, McGraw Hill 8. Fundamentals of Mobile Computing, Prasant Kumar Pattnaik and Rajib Mall, PHI Learning 9. http://www.isi.edu/nsnam/ns/doc/ns_doc.pdf (NS2 manual)

B.Tech- 7th Semester SYLLABUS

(Applicable for 2013-14 admitted batch)

Course Title: DIGITAL IMAGE PROCESSING Course Code: ECE 4431

L T P C 3 1 0 4

Course Objectives:

Students undergoing this course are expected to:

7. be familiar with basic concepts , image manipulations and methodologies for digital image processing

8. Learn various image processing techniques like image enhancement, restoration 9. know segmentation ,image compression 10. Understand pseudo and full color processing 11. appreciate the usage of image transforms in image processing 12. Know about MATLAB tool for image processing

Course Outcomes:

After undergoing the course students will be able to

7. appreciate image manipulations and different digital image processing techniques in various fields.

8. Perform basic operations like – Enhancement, Image transform and restoration techniques on image.

9. make use of image segmentation , compression for various applications.

10. Analyze pseudo and full color image processing techniques.

11. Apply the various image transforms used in image processing

12. apply MATLAB to implement the image processing techniques.

UNIT I 18 hours

Digital Image Fundamentals: Fundamental steps in Digital image processing, Digital image representation, Elements of visual perception, light and electromagnetic spectrum, Image sensing and acquisition, Image sampling and quantization, basic relationships between pixels. An introduction to mathematical tools in digital image processing

Color Image Processing: Color fundamentals, color models, Pseudo color Image Processing, Full Color Image Processing , color transformations.

UNIT II 16 hours

Image transforms: : 2D DFT and its properties, Discrete cosine transform, STFT, Introduction to Wavelet. Image Enhancement : Enhancement in spatial domain, Intensity transformations, Histogram Processing, , smoothing and sharpening. Image Enhancement in Frequency Domain Filters, Smoothing Frequency Domain Filters, Sharpening Frequency Domain Filters,

UNIT III 12 hours

Color image enhancement: Image smoothing and sharpening-spatial domain and frequency domain

Image Restoration: A Model of the Image Degradation/Restoration Process, Linear Position-Invariant Degradations, Inverse filtering, Minimum Mean Square Error (Wiener) Filter, Constrained Least squares filtering.

UNIT IV 14 hours

Image segmentation: Fundamentals, point, Line and Edge detection, ,Thresholding, Region based Segmentation.

Image Compression: Fundamentals, Image Compression Models, Elements of Information Theory,Error Free Compression, Lossy Compression, Image compression using DCT and DWT, Introduction to Digital Image water marking.

Text Book:

2. RafelC.Gonzalez and Richard E.Woods, “Digital Image Processing”, Pearson Education,3 rd edition 2011

Reference Books:

4. Anil K. Jain, “Fundamentals of Digital Image Processing”, 2003, Pearson Education.

5. S.JayaramanS.EsakirajanT.Veerakaumar” Digital Image Processing” McGraw Hill publishres, 2009

6. S.Sridhar,” Digital Image Processing” oxford publishers, 2011

4. Chanda&Majumdar, “Digital Image Processing and Analysis” 2003, PHI.

5. M.Sonka,V. Hlavac, R. Boyle, “Image Processing, Analysis and Machine Vision”, Vikas

Publishing House

B.Tech- 7th Semester SYLLABUS

(Applicable for 2013-14 admitted batch)

Course Title: Software Project Management Course Code:

Course Objectives: The course content enables students to:

� Overview of software project evaluationand the project planning. It also covers the Step Wise framework in project planning.

� Evaluate and assess the projects and to find the cost of the project using cost benefit evaluation techniques.

� To produce an activity plan for a project and to estimate the overall duration of the project by analyzing the risks involved in it.

� Identifying the factors that influence people’s behavior in a project environment and project quality.

� Overview of project possible change management and review of some free open source project management tools.

Course Outcomes: At the end of the course students are able to:

� Apply and practice Project Management principles while developing a software. � Defining and implementing software project planning. � Analyzing software risks and risk management strategies � Defining the concepts of software quality and reliability on the basis of international quality

standards. � Knowing and implementing the software project management tools

UNIT-1 Project Evaluation and Planning 14+4 Activities in Software Project Management, Overview Of Project Planning, Stepwise planning, contract management, Software processes and process models. Cost Benefit Analysis, Cash Flow Forecasting, Risk Evaluation. Project costing, Function point analysis, COCOMO 2, Staffing pattern, Effect of schedule compression, Putnam’s equation, Capers Jones estimating rules of thumb.

UNIT-2 Monitoring and Control 11+4 Project Sequencing and Scheduling Activities, work breakdown structure, Gantt chart, Scheduling resources, Critical path analysis, Network Planning.

Collecting Data, Visualizing Progress, Cost Monitoring, review techniques, project termination review, Earned Value analysis, Change Control, Software Configuration Management (SCM), Managing Contracts, Types Of Contracts, Stages In Contract Placement, Typical Terms of A Contract, Contract Management and Acceptance.

UNIT-3 Quality Management and People Management 10+4 Risk Management, Nature and Types of Risks, Managing Risks, Hazard Identification, Hazard Analysis, Risk Planning and Control, PERT and Monte Carlo Simulation techniques.

Introduction, Understanding Behavior, Organizational Behaviour, Selecting The Right Person For The Job, Motivation, The Oldman – Hackman Job Characteristics Model , Working in Groups, Organization and team structures, Decision Making, Leadership, Organizational Structures, ISO and CMMI models,

UNIT-4 Project Change Management 10+3 Introduction, Impact of change, Change as a process, Emotional behavior pattern of change, Change Management plan, dealing with resistance and conflict. Closure of a Project: Introduction, Project Implementation, Administrative closure, Project Evaluation. Testing, and Software reliability, test automation, Overview of project management tools: open-source tools Ganttproject or similar tools

Text Book

2. Bob Hughes, Mike Cotterell and Rajib Mall: Software Project Management – Fifth

Edition, Tata McGraw Hill, New Delhi, 2012.

Reference Books:

5. PankajJalote, “Software Project Management in Practice”, 2002, Pearson, Education Asia. 6. Jack T Marchewka, “Information Technology Project Management”, Third Edition

(International Student Version) , Wiley India 7. Samuel J mantel et.el “Project Management- Core Textbook”, First India Edition,

Wiley India 8. Robert K. Wysocki, Effective Software Project Management, Wiley, 2009

B.Tech- 7th Semester

SYLLABUS (Applicable for 2013-14 admitted batch)

Course Title: Human Computer Interaction Course Code: IT4431 L T P C 3 1 0 4

COURSE OBJECTIVE(S):

The course content enables students to :

11. Understand core theories, models and methodologies of Interface design

12. Implement simple graphical user interfaces using the Java Swing toolkit.

13. Design, and evaluate usable graphical user interfaces. 14. Design user interfaces for physically challenged. 15. Explore current Challenges in the field of HCI.

COURSE OUTCOME(S):

At the end of the course students are able to :

• Define problem space and formulate conceptual models

• Interpret social mechanisms used in communication

• Implement user-centered approaches to interaction design

• Develop cognitive and information processing systems

• Deploy product assessments related to market analysis

UNIT I (12+3)Hrs

Introduction: Importance of user Interface, definition, importance of good design. Benefits of good design.Abrief history of Screen design. The graphical user interface: Popularity of graphics, the concept of direct manipulation, graphical system, Characteristics, Web user –interface popularity, characteristics- Principles of user interface.

UNIT II (11+4)Hrs

Design process: Human interaction with computers, importance of human characteristics, human consideration, Human interaction speeds, Screen Designing : Design goals, Screen planning and purpose, organizing screen elements, ordering of screen data and content, screen navigation and flow,

Visually pleasing composition, amount of information, focus and emphasis, presentation information simply and meaningfully, information retrieval on web, statistical graphics.

UNIT III (11+4)Hrs

Windows: Windows new and Navigation schemes selection of window, selection of devices based and screen based controls. Components :Components text and messages, Icons and increases, Multimedia, colors, uses problems,choosing colors.

UNIT IV (11+4)Hrs

Software tools : Specification methods, interface, Building Tools. Interaction Devices: Keyboard and function keys, pointing devices, speech recognition digitization and generation, image and video displays, drivers.

TEXT BOOKS :

1. Human Computer Interaction. 3/e, Alan Dix, Janet Finlay, Goryd, Abowd, Russell Beal, PEA,2004.

2. The Essential guide to user interface design,2/e, Wilbert O Galitz, Wiley DreamaTech.

REFERENCE BOOKS :

1. Designing the user interface. 4/e, Ben Shneidermann , PEA.

2. User Interface Design, SorenLauesen , PEA.

B.Tech- 7th Semester SYLLABUS

(Applicable for 2013-14 admitted batch)

Course Title: NETWORK PROGRAMMING LAB Course Code: IT2227

L T P C 0 0 3 2 Course Objectives:

Thislab course content enables students to:

• Understand the basics concepts of socket programming. • Analyze various concepts of network programming such as multiplexing, addressing, routing,

reliable/unreliable transmission protocols. • Develop high performance scalable applications using threads. • Evaluate various network management protocols & practical issues.

Course Outcomes:

After undergoing this course, students will be able to

• Develop and implement distributed applications and protocols over intranet using Network Programming concepts.

• Apply contemporary theories, processes and tools in the development and evaluation of solutions to problems in network programming.

• Evaluate basic theories, processes and outcomes of network programming. • Apply theory, techniques and relevant tools to the specification, analysis, design,

implementation and testing of a simple network programs.

• Carry out Research and development tasks in networking.

List of Experiments:

1. ImplementthefollowingformsofIPC.

a)Pipes

b)FIFO

2.

Writeaprogramtocreateanintegervariableusingsharedmemoryconceptandecrementthevariablesimultaneously bytwoprocesses.Use semaphorestoavoidrace conditions.

3. Simple echo-server and echo-client implementing both TCP and UDP socket.

4. Write a program to obtain the Local & Remote Socket Address.

5. Write a program to create a Telnet Client.

6. Write a program to create an FTP Client

7. Implement basicchat server and client.

8. Write a program to obtain the Information about the (A) Host (B) Network (C) Protocols (D) Domains

9. Chat server and client with select and threading module.

10. To Design TCP client and server application to transfer file.

11. Design a RPC application to add and subtract a given pair of integers

12. Implement the web server.

Reference Books:

11) Foundations of Python Network Programming, 2nd Edition, The comprehensive guide to building network applications with Python by John Goerzen, Brandon Rhodes, Apress Publications.

12) Python Network Programming Cookbook by Dr M O FaruqueSarker, Packt Publishing. 13) Java Network Programming by Elliotte Rusty Harold 14) A Complete Treatment of Network Programming and Cryptography in Java by Merlin Hughes. 15) UNIX Network Programming: The Sockets Networking by Stevens W. Richard

B.Tech- 7th Semester SYLLABUS

(Applicable for 2013-14 admitted batch)

Course Title: DatawWarehousing and Data Mining LAB Course Code:IT2226 L T P C 0 0 3 2 COURSE OBJECTIVE(S): The course content enables students to:

• Conceptualize the data mining problem

• Perform Preprocessing on different raw data sets • Analyze and visualize the data with data mining techniques

• Perform predictive modeling • Generate association rules for business data

COURSE OUTCOME(S): At the end of the course students are able to:

• Implement the algorithms to solve data mining problem using WEKA tool • Identifyan appropriate method to apply in a given situation

• Communicate results in terms relevant to science, business etc. • Apply different clustering techniques to characterize subgroups.

Course Contents

Study and Implement the following by using WEKA/ Clementine

29. Introduction to Graphical User Interface (GUI) of WEKA 30. Perform Data Pre-processing on sample data sets 31. Introduction to IBM SPSS Modeler and nodes palette 32. Preparing the data for analysis using data audit node. 33. Automated data preparation using data audited node. 34. Perform Association Analysis to derive the association rules. 35. Implement the Classification using Decision Tree Induction. 36. Classification using Regression.

37. Bayesian Classification.

38. Classifying telecommunications churn by using Binomial Regression. 39. Market basket analysis using rule induction/C5.0. 40. Predicting Loan defaulters using Bayesian Networks. 41. K-means clustering. 42. Hierarchical clustering.

B.Tech- 8th Semester SYLLABUS

(Applicable for 2013-14 admitted batch)

Course Title: MIDDLEWARE TECHNOLOGIESCourse Code: I T4421 L T P C

3 1 0 4 COURSE OBJECTIVES: The course content enables students to:

• Understand different types, benefits and pitfalls of client server computing models.

• Establish communication between client and server through java RMI and JDBC. • Implement C#.Net applications using Assemblies, and Callback Interfaces.

• Develop client server applications using heterogeneous programming languages with CORBA • Learn java bean component model with EJBS and CORBA.

COURSE OUTCOMES: At the end of the course students are able to:

• Choose appropriate client server computing model for given problem. • Design a dynamic remote application with RMI and JDBC Connectivity.

• Develop client server applications using C#.net • Select appropriate language for homogeneous and heterogeneous objects.

• Develop real time projects by combining CORBA and database interfacing UNIT – I 11+4 Introduction to client server computing: Evolution of corporate computing models from centralized toDistributed computing,client server models. Benefits of client server computing, pitfalls of client serverProgramming.

Advanced Java: Review of Java concept like RMI, and JDBC.

UNIT – II 11+4 Introducing C# and the .NET Platform; Understanding .NET Assemblies, Object –Oriented Programmingwith C#, Callback Interfaces.

Building c# applications: Type Reflection, Late Binding, and Data Access with ADO.NET.

UNIT-III 12+3 Core CORBA / Java: Two types of Client/ Server invocations-static, dynamic. The static CORBA, firstCORBA program, ORBlets with Applets, Dynamic CORBA-The portable count, the dynamic count

Existential CORBA: CORBA initialization protocol, CORBA activation services, Introduction to SOA

UNIT-IV 11+4 Java Bean Component Model: Events, properties, persistency, Introspection of beans, CORBABeans.

EJBs and CORBA: Object transaction monitors CORBA OTM’s, EJB and CORBA OTM’s, EJBcontainer frame work, Session and Entity Beans.

Text Books: 1. Client/Server programming with Java and CORBA Robert Orfali and Dan Harkey, John Wiley & Sons,SPD 2nd Edition

2. Java programming with CORBA 3rd Edition, G.Brose, A Vogel and K.Duddy, Wiley-dreamtech, IndiaJohn wiley and sons

Reference Books: 1. Distributed Computing, Principles and applications, M.L.Liu, Pearson Education 2. Client/Server Survival Guide 3rd edition Robert Orfali Dan Harkey& Jeri Edwards, John Wiley & Sons 3. C# Preciesely Peter Sestoft and Henrik I. Hansen, Prentice Hall of India

B.Tech- 8th Semester SYLLABUS

(Applicable for 2013-14 admitted batch)

Course Title: DESIGN PATTERNS Course Code: IT4430 L T P C 3 1 0 4 Course Objectives: The course content enables students to: • Understand different types of Design patterns • Apply patterns in programming projects to make code more readable • Create an object-oriented design using design patterns • Learn advanced design techniques, principles, practices, and approaches in solving problems • Compare design patterns with object-oriented designs Course Outcome: At the end of the course students are able to:

• Classify and document design patterns

• Understand patterns to manage algorithms and assign responsibilities to objects

• Apply patterns to solve design problems • Create new design patterns

UNIT – I (11+3) Hrs Introduction: What Is a Design Pattern? Design Patterns in Smalltalk MVC, Describing Design Patterns, The Catalog of Design Patterns, Organizing the Catalog, How Design Patterns Solve Design Problems, How to Select a Design Pattern, How to Use a Design Pattern. UNIT – II (12+4) Hrs Creational Patterns: Abstract Factory, Builder, Factory Method, Prototype, Singleton, Discussion of Creational Patterns. Structural Pattern Part-I: Adapter, Bridge, Composite. UNIT-III (11+4) Hrs

Structural Pattern Part-II: Decorator, Façade, Flyweight, Proxy. Behavioral Patterns Part-I: Chain of Responsibility, Command, Interpreter, Iterator. UNIT-IV

(11+4) Hrs Behavioral Patterns Part-II: Mediator, Memento, Observer, State, Strategy, Template Method,Visitor, Discussion of Behavioral Patterns. What to Expect from Design Patterns: A Brief History, the Pattern Community An Invitation, A Parting Thought. TEXT BOOK:

3. Design Patterns By Erich Gamma, Pearson Education

REFERENCES: 1. Pattern’s in JAVA Vol-I By Mark Grand ,WileyDreamTech. 2. JAVA Enterprise Design Patterns Vol-III By Mark Grand ,WileyDreamTech. 3. Head First Design Patterns By Eric Freeman-Oreilly-spd 4. Design Patterns Explained By Alan Shalloway,Pearson Education

B.Tech- 8th Semester SYLLABUS

(Applicable for 2013-14 admitted batch) Course Title: Multimedia Systems Course Code:

Course Objective:

The course content enables students to:

� Employ different realizations of multimedia tools.

� Put into practice various multimedia applications and Action scripts.

� Examine various storage technologies.

� Relate video compression Techniques for real time applications.

Course Outcome:

At the end of the course students are able to:

� Use different realizations of multimedia tools.

� Implement various multimedia applications and Action scripts.

� Analyze various storage technologies.

� Apply video compression Techniques for real time applications.

UNIT-I 12+4

Fundamental concepts in Text and Image: Multimedia and hypermedia, World Wide Web, overview

of multimedia software tools. Graphics and image data representation graphics/image data types,

file formats, Color in image and video: color science, color models in images, color models in

video. Fundamental concepts in video and digital audio: Types of video signals, analog video, digital

video, digitization of sound, MIDI

UNIT – II 11+4

Action Script I: ActionScript Features, Object-Oriented ActionScript, Datatypes and Type

Checking, Classes,

Authoring an ActionScript Class.

Action Script II: Inheritance, Authoring an ActionScript 2.0 Subclass, Interfaces, Packages, Exceptions.

UNIT – III 11+3

Application Development: An OOP Application Frame work, Using Components with

ActionScript MovieClip Subclasses.

Multimedia data compression: Lossless compression algorithm: Run-Length Coding, Variable

Length Coding, Dictionary Based Coding, and Arithmetic Coding.

UNIT – IV 11+4

Basic Video Compression Techniques: Introduction to video compression, video compression based

on motion compensation, search for motion vectors, MPEG.

TEXT BOOKS:

1. Fudamentals of Multimedia by Ze-Nian Li and Mark S. Drew PHI/Pearson Education.

2. Essentials ActionScript 2.0, Colin Moock, SPD O, REILLY.

REFERENCES:

1. Digital Multimedia, Nigel chapman and jenny chapman, Wiley-Dreamtech

2. Macromedia Flash MX Professional 2004 Unleashed, Pearson.

3. Multimedia and communications Technology, Steve Heath, Elsevier(Focal Press).

B.Tech- 8th Semester SYLLABUS

(Applicable for 2013-14 admitted batch) Course Title: BIO-METRICS Course Code:IT4428 L T P C 3 1 0 4 Course Objectives: This course content enables students to:

• Understand the basic concepts of biometric technologies • Analyze available biometric systems • Implement some of the biometrics authentication systems • Evaluate quality of the biometric systems. • Explore ways to improve some of the current techniques

Course Outcomes: After undergoing this course, students will be able to

• Comprehend the fundamentals of biometrics • Analyzethe flow of processing in various biometrics modalities • Implement some of the biometrics authentication • Investigate ways to improve some of the existing techniques • Synthesize some of the biometrics authentication systems

UNIT I (11 +3) Hrs

Introduction – Benefits of biometric security – Verification and identification – Basic working of biometric matching – Accuracy – False match rate – False non-match rate – Failure to enroll rate – Derived metrics – Layered biometric solutions.

Finger scan – Features – Components – Operation (Steps)– Competing finger Scan technologies– Strength and weakness. Types of algorithms used for interpretation,

UNIT II (11 +4) Hrs

Facial Scan -Features –Components – Operation (Steps) –Competing facial Scan technologies – Strength andweakness. Iris Scan - Features –Components – Operation (Steps) – Competing iris Scan technologies –Strength and weakness. Voice Scan - Features – Components – Operation (Steps) – Competing voice Scan (facial)technologies – Strength and weakness. UNIT III (11 +4) Hrs Other physiological biometrics – Hand scan – Retina scan– AFIS (Automatic Finger PrintIdentification Systems) – Behavioral Biometrics – Signature scan- keystroke scan. UNIT IV (12 +4) Hrs Biometrics Application – Biometric Solution Matrix – Bio privacy – Comparison of privacy factor indifferent biometrics technologies – Designing privacy sympathetic biometric systems. Biometricstandards – (BioAPI , BAPI) – Biometric middleware, Biometrics for Network Security, Statisticalmeasures of Biometrics, Biometric transactions. TEXT BOOKS:

3. Biometrics – Identity Verification in a Networked World – Samir Nanavati, Michael Thieme, Raj Nanavati, WILEY- Dream Tech

4. Biometrics for Network Security- Paul Reid, Pearson Education.

REFERENCE BOOK: 1. Biometrics- The Ultimate Reference- John D. Woodward, Jr. Wiley Dreamtech.

B.Tech- 8th Semester SYLLABUS

(Applicable for 2013-14 admitted batch) Course Title: Network Management Systems Course Code: IT4429 L T P C 3 1 0 4 Course Objectives: The course content enables students to:

� Understand design principles, network management architecture and protocols used in computer and telecommunication networks

� Learn about security marketplace, decision making when multiple parties are involved � Demonstrate the Simple Network Management Protocol (SNMP) and Open Systems

Interconnection (OSI) protocols. � Understand advanced information processing techniques such as distributed object

technologies, software agents, and internet technologies used for Network Management.

Course Outcome: At the end of the course the students are able to:

� Understand the fundamentals of telecommunication systems necessary for the effective management of organizations that develop and operate them

� Take short-term and long-term business and technical decisions � Analyze and maintain communication networks � Design a network project plan for an organization

UNIT – I (12+4) Hrs Basic Foundations, Standards and models: Introduction to Network Management Standards, Communications protocols, Network Management: Goals, Organization, and Functions, Network and System Management, Network Management System Platform, Current Status and future of Network Management.

SNMPV1 Network Management: Organization and Information and Information Models. Managed network: The History of SNMP Management, The SNMP Model, The Organization Model,

System Overview, and the Information Model.Communication and Functional Models. The SNMP Communication Model, Functional model.

UNIT – II (11+3) Hrs SNMP Management & SNMPv2/3: Major Changes in SNMPv2, SNMPv2 System Architecture, SNMPv2 Structure of Management Information, The SNMPv2 Management Information Base, SNMPv2 Protocol, Compatibility With SNMPv1. SNMPv3 documentation and Architecture. RMON: What is Remote Monitoring? , RMON SMI and MIB, RMON1, RMON2, ATM Remote Monitoring.

UNIT-III (10+4) Hrs

Broadband Network Management & TMN: Broadband Networks and services, Broadband Access control and technologies, HFC technology, data over cable reference architecture, HFC management, DSL technology. Introduction to TMN, Operations Systems, TMN Conceptual Model, TMN Standards, TMN Architecture, TMN Management Service Architecture, An Integrated View of TMN, Implementation Issues.

UNIT-IV (12+4) Hrs Network Management Tools and Web-Based Management: Network Management Tools, Network Statistics Measurement Systems, Network Management Applications, Commercial Network management Systems like IP address tools, Configuration management, fault management and performance management includes open source tools-NMIS TOOL.

NMS with Web Interface and Web-Based Management, Web Interface to SNMP Management, Embedded Web-Based Management, Desktop management Interface, Web-Based Enterprise Management,

TEXT BOOK : 1. Network Management, Principles and Practice, Mani Subrahmanian, Pearson Education. REFERENCES : 1. Network management, Morris, Pearson Education. 2. A. Clem, Network Management fundamentals, 1 ed. : CICSOP Press. 3. Principles of Network System Administration, Mark Burges, Wiley Dreamtech.

---

@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@---


Recommended