Академический Документы
Профессиональный Документы
Культура Документы
GR – I : Section A – D
GR – II : Section E – H
[1]
THIRD SEMESTER
Sl. No Sub. Code Subject L-T-P Credits
1 MA 03 Mathematics- III 3-0-0 3
2 CS 301 Data Structures 3-1-0 4
3 CS 302 Digital Logic Design 3-0-0 3
4 PH 331 Semiconductor Physics 3-0-0 3
5 EC 331 Linear Integrated Circuits 3-0-0 3
6 CS 351 Data Structures Laboratory 0-0-3 2
7 PH 381 Semiconductor Physics Laboratory 0-0-3 2
8 EC 381 Linear Integrated Circuits Laboratory 0-0-3 2
TOTAL 15-1-9 22
FOURTH SEMESTER
Sl. No Sub. Code Subject L-T-P Credits
1 CS 401 Microprocessor &its Applications 3-1-0 4
2 CS 402 Computer Organization and Architecture 3-0-0 3
3 CS 403 Discrete Structures 3-0-0 3
4 CS 404 Object Oriented Programming 3-0-0 3
5 EC 431 Communication Engineering 3-0-0 3
6 CS 451 Object Oriented Programming Laboratory 0-0-3 2
7 CS 452 Microprocessor Laboratory 0-0-3 2
8 EC 481 Communication Engineering Laboratory 0-0-3 2
TOTAL 15-1-9 22
FIFTH SEMESTER
Sl. No Sub. Code Subject L-T-P Credits
1 CS 501 Database Management Systems 3-1-0 4
2 CS 502 Theory of Computation 3-0-0 3
3 CS 503 Compiler Design 3-0-0 3
4 CS 504 Operating Systems 3-0-0 3
5 YY 54* Open Elective – I 3-0-0 3
6 CS 551 Database Management Systems Laboratory 0-0-3 2
7 CS 552 Compiler Design Laboratory 0-0-3 2
8 CS 553 Operating Systems Laboratory 0-0-3 2
TOTAL 15-1-9 22
SIXTH SEMESTER
Sl. No Sub. Code Subject L-T-P Credits
1 MS 631 Principles of Management 3-0-0 3
2 CS 601 Computer Networks 3-1-0 4
3 CS 602 Algorithm Analysis and Design 3-0-0 3
4 CS 603 Artificial Intelligence and Expert Systems 3-0-0 3
5 CS 604 Software Engineering 3-0-0 3
6 CS 651 Computer Networks Laboratory 0-0-3 2
7 CS 652 Software Engineering Laboratory 0-0-3 2
8 HS 681 Professional Communications 0-0-3 2
TOTAL 15-1-9 22
[2]
SEVENTH SEMESTER
Sl. No Sub. Code Subject L-T-P Credits
1 CS 701 Digital Image Processing 3-1-0 4
2 CS 702 Adv. Computer Architecture 3-0-0 3
3 CS 710-719 Departmental Elective I 3-0-0 3
4 CS 720-729 Departmental Elective II 3-0-0 3
5 CS 751 Artificial Intelligence Laboratory 0-0-3 2
6 CS 752 Image Processing Laboratory 0-0-3 2
7 CS 753 Seminar – I 0-0-2 1
8 CS 754 Project – I 0-0-6 3
9 CS 755 Vocational Training/Summer Internship 0-0-0 1
TOTAL 12-1-14 22
EIGHTH SEMESTER
Sl. No Sub. Code Subject L-T-P Credits
1 CS 810-19 Departmental Elective-III 3-0-0 3
2 CS 820-29 Departmental Elective-IV 3-0-0 3
3 YY 84* Open Elective -II 3-0-0 3
4 CS 851 CAD for VLSI Laboratory 0-0-3 2
5 CS 852 Internet Programming Laboratory 0-0-3 2
6 CS 853 Seminar – II 0-0-2 1
7 CS 854 Project – II 0-0-14 6
8 CS 855 Viva Voce 0-0-0 2
TOTAL 9-0-22 22
Departmental Electives I
Sub. Code Subject L-T-P Credits
CS 710 Soft Computing 3-0-0 3
CS 711 Computational Geometry 3-0-0 3
CS 712 Mobile Computing 3-0-0 3
CS 713 Complex Network Theory 3-0-0 3
CS 714 Distributed Systems 3-0-0 3
CS 715 Cryptography and Network Security 3-0-0 3
Departmental Elective II
Sub. Code SUBJECT L-T-P CREDIT
CS 720 Principles of Programming Languages 3-0-0 3
CS 721 CAD for VLSI 3-0-0 3
CS 722 Advanced Graph Theory 3-0-0 3
CS 723 Internet Technologies 3-0-0 3
CS 724 Parallel Computing 3-0-0 3
CS 725 Data Mining and Data Warehousing 3-0-0 3
Departmental Elective IV
Sub. Code SUBJECT L-T-P CREDIT
CS 820 VLSI Testing and Verification 3-0-0 3
CS 821 Pattern Recognition 3-0-0 3
CS 822 Embedded System Design 3-0-0 3
CS 823 High performance Computing 3-0-0 3
CS 824 Advanced Algorithms 3-0-0 3
CS 825 Symbolic logic and Logic Programming 3-0-0 3
Open Electives –I
Sub. Code SUBJECT L-T-P CREDI
T
CS 541 Data Structures 3-0-0 3
CS 542 Computer Organization 3-0-0 3
CS 543 Database Management Systems 3-0-0 3
CS 544 Object Oriented Programming 3-0-0 3
CS 545 Algorithm Design and Analysis 3-0-0 3
[4]
CS 652 Software Engineering Laboratory 0-0-3 2
CS 751 Artificial Intelligence Laboratory 0-0-3 2
CS 752 Image Processing Laboratory 0-0-3 2
CS 852 Internet Programming Laboratory 0-0-3 2
CS 681 Database Management system Laboratory 0-0-3 2
CS 381 Data structure Laboratory 0-0-3 2
CS 382 Programming & Data structure Laboratory 0-0-3 2
CS 383 Programming & Data structure Laboratory 0-0-3 2
SUMMARY OF COURSES
CS 01 INTRODUCTION TO 3-0-0 3 D. R.
COMPUTING KISKU/S.B.
Basic Anatomy of Computer System, Primary & Secondary Memory, Processing Unit,
Input and Output devices. [3]
Binary & Allied number systems representation of signed and unsigned numbers. BCD,
ASII. Binary Arithmetic and logic gates. [4]
Assembly language, high level language, compiler and assembler (basic concepts). [2]
Basic concepts of operating systems like MS DOS, MS WINDOW, UNIX, Algorithm and
flow chart. [2]
C Fundamentals: The C character set identifiers and keywords, data type and sizes,
variable names, declaration, statements. [3]
Operators & Expressions: Arithmetic operators, relational and logical operators, type,
conversion, increment and decrement operators, bit wise operators, assignment operators
and expressions, precedence and order of evaluation. Input and Output: Standard input
and output, formatted output -- printf, formatted input scanf. [3]
Flow of Control: Statement and blocks, if - else, switch, loops - while, for do while, break
and continue, go to and labels. [2]
[5]
returning values, functions not returning values, auto, external, static and register
variables, scope rules, recursion, function prototypes, C preprocessor, command line
arguments. [3]
Arrays and Pointers: One dimensional arrays, pointers and functions, memory map of one
and two dimensional arrays, multidimensional arrays. [4]
Structures Union and Files: Basic of structures, structures and functions, arrays of
structures, bit fields, formatted and unformatted files. [4]
TEXT BOOKS:
1. The C Programming Language (ANSI C), 2nd Edition by Brian W. Kernighan and Dennis
M. Ritchie, Prentice Hall, 1988.
2. C Programming: A Modern Approach, 2nd Edition 2nd Edition by K. N. King, W. W.
Norton & Company, 2008.
REFERENCE BOOKS:
1. C Programming in 12 Easy Lessons by Greg Perry, Sams, pp. 640, 1994.
2. C - Traps and Pitfalls by Andrew R. Koenig, Addison Wesley, pp. 160, 1989.
Introduction to Data Structures: Data, Data Types, String, Abstract Data Type (ADT) and
Data structures with examples. [4]
Arrays: Single and multi-dimensional arrays, Row and Column major Representation of
matrices, sparse matrices. [2]
Linked List: Creation, Display, Insertion and Deletion (in front, at end, and before and after
a specific node), Summation, average, maximum, minimum, Searching, Sorting,
Concatenation of two list (Circular and non-Circular),Doubly linked list, Application of
Linked List - polynomial, sparse matrix. [8]
Queue: Queue as an ADT, Queue operation, Array Representation of Queue and its
disadvantages, Linked Representation of Queue, Circular Queue, Priority Queue and its
applications. [3]
Tree: Basic trees concept, Binary tree representation, Binary tree operation, Binary tree
traversal, (Preorder, Inorder and Postorder), Copying a Tree, checking equivalency
between two Trees. [6]
[6]
Binary search tree (BST): Creation, search, insertion, and deletion. [4]
Sorting: Bubble sort, Selection sort, Insertion sort, Quick Sort. [8]
TEXT BOOKS:
1. Data Structures Using C, ISRD Group, Second Edition, Tata McGraw-Hill.
2. Data Structure Using C, Balaguruswamy.
REFERENCE BOOKS:
1. Data Structure using C & C++, Angenstein&Tanenbaum, PHI.
2. An introduction to Data Structure, Trembly& Sorensen, MCHILL.
Switching Circuits: Logic families: TTL, nMOS, CMOS, dynamic CMOS and pass transistor
logic (PTL) circuits, inverters and other logic gates, area, power And delay characteristics,
concepts of fan-in, fan-out and noise margin. [6]
Switching theory: Boolean algebra, logic gates, and switching functions, truth tables and
switching expressions, minimization of completely and incompletely specified switching
functions, Karnaugh map and Quine-McCluskey method, multiple output minimization,
representation and manipulation of functions Using BDDs, two-level and multi-level logic
circuit synthesis. [8]
Sequential circuits: Clocks, flip-flops, latches, counters and shift registers, finite-state
machine model, synthesis of synchronous sequential circuits, Minimization and state
assignment, asynchronous sequential circuit synthesis. [8]
ASM charts: Representation of sequential circuits using ASM charts, synthesis of output
and next state functions, data path control path partition-based design. [5]
TEXT BOOKS:
1.Digital Logic and Computer Design M. Morris Mano PHI
2.Digital Computer Fundamentals, Bartee Tata McGraw Hill
REFERENCE BOOKS:
1.Digital Computer Electronics, Malvino, Tata McGraw Hill, New Delhi
[7]
SUBJECT SUBJECT L-T-P CREDIT DEVELOPER
CODE
3. Interrupt in 8085: Implementation of interrupt using INTR line and RST instructions, RST
7.5, RST6.5, RST 5.5, and TRAP, Instruction RIM and SIM. [4]
5. The 8255 Programmable Peripheral Interface: Basic block diagram, Control word,
Different modes. [3]
TEXT BOOKS:
1.Microprocessor Architecture, Programming & Applications, Gaonkar, Ramesh,Penram
International Pub.(India)
2.Microprocessor, Ajit Pal, TMH
REFERENCE BOOKS:
1.Microprocessor Interfacing, Programming & Hardware, D.V.Hall, TMH
2.Microcomputer systems, Liu & Gibson, PHI
ALU Organisation: Combinational and Sequential ALU, ALU expansion strategies, Design
of Multipliers and Dividers, Wallace tree and Booth’s Multipliers, Floating Point Numbers
(IEEE754), Floating Point Operations. [8]
[8]
Control Unit Organisation: Internal Bus Organisation of CPU, Instruction Execution Steps,
Hardwired Control, Microprogrammed control. [8]
Main Memory Organization: Memory hierarchy, SRAM and DRAM, Internal organization of
Main Memory, Page Mode Access, Memory interleaving, Types of RAM, ROM and
secondary memory, Cache memory. [7]
I/O Organization: Addressing of I/O devices, Interrupts, DMA and DMA Controllers, I/O
interfacing schemes, Bus Arbitration Schemes. [7]
TEXT BOOKS:
1. Computer Organization by Hamacher, Vranesic and Zaky, McGraw Hill
2. Computer Architecture & Organization by J.P.Hayes, McGraw Hill
REFERENCE BOOKS:
1. Computer Organization and Architecture. by W.Stallings, Prentice Hall
2. Computer Organization & Design by Hennessey and Patterson, Morgan Kaufmann
[9]
TEXT BOOKS:
1.Kenneth H. Rosen, Discrete Mathematics and its Applications, Tata McGraw-Hill.
2.C. L. Liu, Elements of Discrete Mathematics, Tata McGraw-Hill.
REFERENCE BOOKS:
1. Ralph P. Grimaldi, Discrete and Combinatorial Mathematics, Pearson Education, Asia.
2. Douglas B. West, Introduction to Graph Theory, Prentice Hall, India
Pointer and references in C++, Constant – Pointers, References, new & delete operator,
dynamic allocation. [5]
Exception handling: Streams and formatted I/O - file handling - Standard template library.
[4]
TEXT BOOK:
1. Thinking in C++ (B. Eckel)
2. Essential C++ (S. Lippman)
REFERENCE BOOKS:
1. Effective C++ (S. Meyers)
2. C++ Programming Language (B. Stroustrup)
[10]
Entity Relationship (ER) Model: Basic concepts of ER model, various components of ER
diagram, Consistency constraints, various types of keys and its importance in database
design, Types of entity sets, ER diagram construction, special features of an ER diagram.
[4]
Relational Calculus: Basic concepts, Tuple relational calculus and Domain relational
calculus, query practice. [3]
Structured Query Language (SQL): Detailed query writing procedure for DDL, DML and
DCL, complex query including nested sub-query practice with examples. [4]
Index Structures: Indexing, various types of index structures such as primary, secondary,
clustered, multi-level, dynamic multi-level(B_tree & B+_tree) concepts, problem solving on
these structures. [3]
Normalization: Basic concepts on functional dependency (FD) and multivalued FD, Rules
over FDs, various properties such as closure of a set of FDs, canonical cover etc., Need of
normalization, Different normal forms (1NF, 2NF, 3NF, BCNF, 4NF, 5NF) and associated
problems, Lossless decomposition, dependency preservation. [6]
Distributed database: Basic concept on distributed database and its importance over
centralized database, Architecture of distributed database, Properties of distributed
database – fragmentation, allocation and replication. [2]
TEXT BOOKS:
1. A. Silberschatz, H. F. Korth, S. Sudarshan, Database System Concepts,McGraw Hill
Education.
REFERENCE BOOKS:
1. Navathe,Elmasri, Fundamentals Of Database Systems, Pearson Education.
2. C. J. Date, An Introduction to Database Systems,Addison-Wesley.
[11]
SUBJECT SUBJECT L-T-P CREDIT DEVELOPER
CODE
Introduction to theory of Automata, language theory, tokens, alphabets, NDFA and DFA,
Minimization of FA. Expressions, regular sets and regular grammar. [8]
Formal languages, grammar, production rules, sentences, concepts of type 0, type 1, type
2 and type 3 languages, properties of various types of grammars and operations on them.
[8]
Context free languages, Derivation trees, simplification of CFG, methods for null and unit
product elimination, context free grammar. [8]
Basic definition of Push down Automata (PDA), Acceptance by PDA, PDA and CFL,
constructing PDAs for given "CFG and vice-versa. [8]
Turing machine computability and Church's hypothesis, halting, problem & undesirability,
Universal Turing machine, Recursive functions. [8]
TEXT BOOKS:
1. Introduction to Automata Theory, Languages and Computation, Hopcroft, & Ullman,
AWL, New York, 2000.
2. Introduction to Languages and Theory of Computation, J.C. Martin, Tata McGraw Hill,
New Delhi, 2001.
REFERENCE BOOKS:
1. Automata Theory, Machines and Languages, R.Y. Kain, McGraw Hill International, New
York.
[12]
Intermediate Code Generator: Concept of Platform Independency -- Virtual Machine –
JVM -- Three Address Code – Triple – Quadruple – Conversion of HLL Stmts. Into
different Intermediate Codes. [5]
Error Handling: Lexical and Syntactic Errors – Error Handling in LL(1) and LR(0) Parsing –
Table Driven and Panic Mode Error Recoveries – Overheads of Recovery -- Semantic
Error Concepts, Examples and Recovery. [5]
TEXT BOOKS:
1. Principles of Compiler Design – Alfred V. Aho & Jefrey D. Ullman, Pearson Education.
REFERENCE BOOKS:
1. Compiler Design in C – Holub, Prentice Hall.
File Management : File allocation, Contiguous, Linked, Indexed, i-node, Free space
management, Disk Scheduling. [6]
TEXT BOOKS:
[13]
1. Silberschatz, Galvin, Gagne, Operating System Principles, Wiley India Pvt Ltd.
2. Andrew S. Tanenbaum, Modern Operating Systems, Prentice-Hall.
REFERENCE BOOKS:
1. Stalling, William, Operating Systems, Maxwell McMillan International Editions.
2. Dietel H. N., An Introduction to Operating Systems, Addison Wesle.
Network Model: Basic concepts of network model, OSI and TCP/IP models, functions in
brief of different layers of OSI model, different levels of addressing. [2]
Physical layer functions: Basic concept of signals, analog and digital signals, various
modulation techniques, various line coding techniques, noise and errors, different types of
transmission media and its applications. [4]
Switching techniques: Basic concepts of a switched networks and its importance, various
switching techniques (circuit, message, datagram approach, virtual circuit networks) with
examples, compare and contrast between various types of switching techniques. [3]
Data link layer functions : Framing, Error control techniques (Parity checking method,
Checksum, Cyclic redundancy check, Hamming code) with examples, Flow control
protocols and its importance, various flow control protocols such as stop-and-wait ARQ,
sliding window (Go-Back-N ARQ and Selective repeat ARQ) protocols,HDLC protocol,
Multiple access techniques and its importance, various multiple access techniques such
as ALOHA, slotted ALOHA, CSMA, CSMA/CD, CSMA/CA, polling, reservation, token
passing, FDMA, TDMA and CDMA techniques. [10]
Network layer functions: IP address and its classification, design of a network with sub
netting concept, IP protocol, transition from IPv4 to IPv6, NAT, ARP and RARP, Routing
and forwarding concepts, classification of routing protocols, distance vector, link state and
path vector routing protocols, various multicast routing protocols, congestion control
techniques, Quality of Service (QoS) in networks and its improvements. [10]
Transport layer functions: Basic concepts of socket address, socket programing. [3]
Network Security: Basic concepts of network security and RSA algorithm. [2]
[14]
TEXT BOOKS:
1. B. A. Forouzan, DATA COMMUNICATIONS AND NETWORKING.
REFERENCE BOOKS:
1. A. S. Tanenbaum, Computer Networks.
2. W. Stallings, Data and Computer Communications.
Introduction and basic concepts - Algorithm, Asymptotic notations (big-Oh, big Omega,
Theta, small-oh) and their significance, introduction to RAM model of computation,
complexity (Time Complexity, Space Complexity) analysis of algorithms, worst case and
average case. Solving Recurrences – Substitution method, Recurrence tree method and
Master Method, Finding maximum and minimum; Lower bound for sorting (comparison
based sorting), Amortized complexity analysis – storage allocation, binary counting, heap
sort. [9]
Divide and conquer Problem – Multiplication of two n-bit integers, Strassen’s Matrix
Multiplication problem, Closest pair of points, linear time median finding algorithm. [4]
The Greedy Algorithm - Interval scheduling, Interval partitioning, Minimizing the Lateness
of Intervals, Fractional Knapsack Problem. [4]
Graph Algorithm: Depth First Search, Breadth First Search, Dijkstra's Single Source
Shortest Path algorithm;All pair shortest path algorithm, Minimum Spanning Tree (Prim's
and Kruskal's algorithm). [5]
Randomized Algorithm- Las Vegas and Monte Carlo; Randomized Quick Sort algorithm
and Min Cut problem. [2]
TEXT BOOKS:
1. T. H. Cormen, C. E. Leiserson, R. L. Rivest and C. Stein, Introduction to Algorithms, by
Prentice Hall India
2. J. Kleinberg and Eva Tardo, Algorithm Design by Pearson Education (Indian edition)
[15]
REFERENCE BOOKS:
1. Michael T Goodrich and Roberto Tamassia, Algorithm Design: Foundations, Analysis,
and Internet Examples, Second Edition, Wiley, 2006
Game Playing: Game Tree, Minimax Search, Search Reduction by alpha and beta
cutoffs. [2]
Planning: Introduction to Planning, Goal Stack Planning, Nonlinear, Hierarchical and
Reactive Planning. [2]
Expert Systems (ES) and ES Shells: Definition of Expert Systems, Components of Expert
Systems. Types of ES – Manual, Semi-automatic, and Automatic ES, Techniques of
Knowledge Acquisition (KA) for ES.-- ES Shell. Advantages and disadvantages of ES
Shell over ES. [5]
Neural Networks : Symbolic vs. Neural Network AI, Hofield Network, Perceptron as a
model of neuron, Single and multiplayer Perceptron for classification and knowledge
representation, Back propagation Network, Supervised, Reinforcement and Unsupervised
Learning. [5]
TEXT BOOKS:
[16]
1. Artificial Intelligence -- Rich and Knight. -- Tata McGraw Hill.
2. Artificial Intelligence – A New Synthesis – Nilsson. -- Morgan Kaufmann Publishers.
REFERENCE BOOKS:
1. Artificial Intelligence and Expert Systems -- Paterson. PHI
2. Artificial Neural Networks – B. Yegnanarayanana. PHI
Concept of systems, its characteristics, the product, the process, Methods, Tools,
Software Process modules, Process technology, Project management concepts: People,
The problem, the process and the project. [6]
Software process and project metrics, Software measurement, Software project planning:
Observation on estimating, project planning objectives, software scope, resources, project
estimation, decomposition techniques. [6]
Project scheduling, basic concepts, Relationship between people and effort, defining task
set, refinement of major task, Software quality assurance: Quality concepts, Software
reviews, Software reliability. [7]
Software testing methods, Testing fundamentals, Test case design, Software Testing
strategies, strategic issues, Unit testing, Integration testing, Validation testing, system
testing. Object-oriented paradigm, concepts, elements of an object model, Management of
Object oriented software projects. object-oriented analysis concepts. [8]
TEXT BOOKS:
1. Software Engineering: A Practitioner's Approach, 5th Ed., Roger S. Pressman, Tata
McGraw Hill, New Delhi, 2001.
2. Software Engineering Concepts, Richard Fairley, Tata McGraw Hill, New Delhi, 2002.
REFERENCE BOOKS:
1. Classical and Object Oriented Software Engineering with C++/Java , 3rd Ed., S.R.
Schach, McGraw Hill International, New York, 1998
[17]
Digital Image Fundamentals: elements of visual perception, Light and electromagnetic
spectrum, Image sensing and acquisition, Image sampling and quantization, some basic
relationship between pixels, Linear and non-linear operations. [5]
Morphological image processing: Dilation and Erosion, Opening and closing, Hit-and-Miss
Transformations, Some basic morphological operations. [4]
TEXT BOOKS:
1. Digital Image Processing, by Rafael C. Gonzalez, Richard E. Woods, 3rd Edition,
Prentice Hall, 2007.
2. Fundamentals of Digital Image Processing by Anil K. Jain, 1st Edition, Prentice Hall,
1988.
REFERENCE BOOKS:
1. B. Chanda and D. Dutta Majumder, Digital Image Processing and Analysis 2nd Ed., PHI
Learning Pvt. Ltd., New Delhi, 2011.
2. Digital Image Processing, Jayaraman, Tata McGraw-Hill Education, pp. 723, 2011.
[18]
SUBJECT SUBJECT L-T-P CREDIT DEVELOPER
CODE
UNIT - 8 HARDWARE AND SOFTWARE FOR VLIW AND EPIC: Introduction: Exploiting
Instruction-Level Parallelism Statically; Detecting and Enhancing Loop-Level Parallelism;
Scheduling and Structuring Code for Parallelism; Hardware Support for Exposing
Parallelism: Predicated Instructions; Hardware Supportfor Compiler Speculation. [6]
TEXT BOOKS:
1. Computer Architecture, A Quantitative Approach – John L. Hennessey and David A.
Patterson; 4th edition, Morgan Kaufmann.
2. Advanced Computer Architecture Parallelism, Scalability, Programability – Kai Hwang;
Tata Mc- Graw Hill.
[19]
REFERENCE BOOKS:
1. Computer architecture and parallel processing – Kai Hwang and Fayé Alayé Briggs;
McGraw-Hill.
2. Parallel Computer Architecture, A Hardware / Software Approach – David E. Culler,
Jaswinder Pal Singh, Anoop Gupta; Morgan Kaufman.
TEXT BOOKS:
1. S. Rajsekharanand and VijayalakshmiPai, “Neural Networks, Fuzzy Logic and Genetic
Algorithm: Synthesis and Applications”, Prentice Hall of India.
2. Kumar Satish, “Neural Networks”, Tata Mc. Graw Hill.
[20]
REFERENCE BOOKS:
1. B. Yegnanarayana , “Artificial Neural Networks”
2. David E. Goldberg, “Genetic Algorithms in Search, Optimization, and Machine
Learning”, Addison-Wesley Publishing Company.
Line Segment Intersection: Line Segment Intersection, The Doubly-Connected Edge List,
Computing the Overlay of Two Subdivisions, Boolean Operations. [3]
Computing the Minimum Enclosing Disk of a point set & its application. [2]
Voronoi Diagram and Delaunay Triangulation: Definition and Basic Properties of Voronoi
Diagram, Computing the Voronoi Diagram: Fortune Sweep Algorithm, Divide and Conquer
Algorithm. Closest pair Problems. Triangulations of Planar Point Sets, The Delaunay
Triangulation, Computing the Delaunay Triangulation. [6]
Geometric Data Structure: Interval Trees, Priority Search Trees, Segment Trees . [4]
TEXT BOOKS:
1. Franco P. Preparata and Michael Ian Shamos, Computational Geometry- An
Introduction, Springer Verlag
2. Mark de Berg, Marc van Kreveld, Mark Overmars, Otfried Cheong, Computational
Geometry
REFERENCE BOOKS:
1. Joseph O' Rourke, Computational Geometry in C, Cambridge University Press
2. Lecture notes on Computational geometry by David Mount
[21]
SUBJECT SUBJECT L-T-P CREDIT DEVELOPER
CODE
Wireless LAN Overview: MAC issues, IEEE 802.11, Blue Tooth, Wireless multiple access
protocols, TCP over wireless, Mobile IP. [6]
Ad Hoc networks, localization, MAC issues: PAMAS, MACA, MACA/BI, BTMA, and
Reduced handshake based MAC protocols. [3]
Routing protocols, global state routing (GSR), Destination sequenced distance vector
routing (DSDV), Dynamic source routing (DSR), Ad Hoc on demand distance vector
routing (AODV), Temporary ordered routing algorithm (TORA), Associativity routing
protocols (ABR), LAR, ZRP, CSGR, WRP.QoS in Ad Hoc Networks and its applications.
[10]
TEXT BOOKS:
1. J. Schiller, Mobile Communications, Addison Wesley.
REFERENCE BOOKS:
1. P.K.Pattnaik and R.Mall, Fundamentals of Mobile Computing, PHI.
2. C. Perkins, Mobile IP, Addison Wesley.
Centrality measures, Node Poularity, Page Rank algorithm, Spectral Graph Theory. [5]
[22]
Community Structure Analysis
Basic concepts of network communities, various community finding approaches like
Girvan-Newman Algorithm, Spectral Bisection Algorithm, Radicchi Edge Clustering
Algorithm (for binary as well as weighted graphs), Wu-Hubermann Algorithm, and Random
Walk based Algorithm. [7]
Random Graphs
Poisson random graphs, generating functions, emergence of giant component, power-law
degree distribution, bipartite graph. [8]
TEXT BOOKS:
1. Guido Caldarelli, Scale-Free Networks, Oxford University Press, Oxford (2007)
2. S. N. Dorogovtsev and J. F. F. Mendes, Evolution of Networks, Oxford University Press,
Oxford (2003)
REFERENCE BOOKS:
1. M. E. J. Newman, The structure and function of complex networks, SIAM Review 45,
167-256 (2003).
2. R. Albert and A. L. Barabasi Statistical mechanics of complex networks. Rev. Mod.
Phys., Vol. 74, No. 1, January 2002.
3. Distributed State Detection. Global State. Consistent Cut. Global State recording
algorithm.Termination Detection. Credit based algorithm. Diffusion Computation
based algorithm. [3]
4. Distributed Mutual Exclusion. Token based and non-token based algorithms. [2]
[23]
Protocols.Distributed Commit Protocols. 2-phase commit. 3-phase commit.Election
Algorithms. Bully algorithm. Ring topology algorithm.Fault recovery. Backward and
Forward recovery. Log based recovery. Checkpoints. Shadow paging.Data
Replication. Quorum Algorithms. [10]
TEXT BOOKS:
1. Advanced Concepts in Operating Systems. Singhal and Sivaratri. McGraw Hill.
REFERENCE BOOKS:
1. Operating Systems : A Concept Based Approach. Dhamdhere. McGraw Hill.
2. Distributed Operating Systems : Concepts and Design. P.K.Sinha. Prentice Hall.
TEXT BOOKS:
1. Cryptography and Network security by William Stallings – Pearson Education Publisher
2. Cryptography and Network security by Forouzan - Tata McGraw-Hill Education
[24]
REFERENCE BOOKS:
1. Cryptography and Network security by Atul Kahate - Tata McGraw-Hill Education
Imperative and OO Languages: Names, their scope, life and binding. Control-flow, control
abstraction; in subprogram and exception handling. Primitive and constructed data types,
data abstraction, inheritance, type checking. [5]
TEXT BOOKS:
1. Glynn Winskel, A Formal Semantics of Programming Languages: An Introduction, MIT
Press.
REFERENCE BOOKS:
1. John C. Mitchell, Foundations for Programming Languages, MIT Press.
VLSI Design cycle. Design styles. System packaging styles. Fabrication of VLSI devices.
Design rules-overview. [2]
Scheduling in High Level Synthesis. ASAP and ALAP schedules. Time constrained and
Resource constrained scheduling. ILP Method. Force directed heuristic method. Iterative
refinement method. List scheduling. Simulated annealing approach. Relaxing Constraints.
[25]
[5]
Allocation and Binding. Datapath Architectures and Allocation tasks. Greedy approach.
Clique Partitioning Approach. Left-Edge algorithm. Weighted Bipartite Matching approach.
Iterative refinement approach. [5]
Global Routing. Maze Routing algorithms. Line probe algorithms. Shortest Path based
algorithms. Steiner’s Tree based algorithms. [4]
TEXT BOOKS:
1. Algorithms for VLSI Physical Design Automation. N.A.Sherwani. Kluwer Academic
Publishers.
2. High-Level Synthesis: Introduction to Chip and System Design. Gajskiet. al. . Kluwer
Academic Publishers.
REFERENCE BOOKS:
1. VLSI Physical Design Automation. Sadiq M. Sait and Habib Youssef. Kluwer Academic
Publishers.
2. Algorithms for VLSI Design Automation. Sabih H. Gerez. Wiley India
Connected graphs and shortest paths: Walks, trails, paths, connected graphs, distance,
cut-vertices, cut-edges, blocks, connectivity, weighted graphs, Menger’s theorem. [6]
[26]
[2]
Vertex coloring: Chromatic number and cliques, greedy coloring algorithm, Brook’s
theorem, chromatic partition, Uniquely colourable graph. [4]
TEXT BOOKS:
1. Graph Theory by N. Deo
2. Advanced Graph Theory by R. Deistel
REFERENCE BOOKS:
1. An Introduction to Graph Theory by S. Pirzaha
2. Introduction to Graph Theory by R.J.Wilson
Internet - Addressing and Routing: Internet Addressing - IPv4 and Ipv6, Internet Proxy,
Autonomous Systems (AS), Intra-AS Routing – OSPF, Inter-AS Routing – BGP. [5]
Transport Layer Protocols: TCP and its variants, UDP, Quality of Service (QoS)
Differentiated and Integrated, Real Time Transmission Protocol (RTP). [5]
Internet Applications: Data Services - HTTP, FTP, Telnet, Email, Chat, Multimedia
Services - VoIP, VoD. [5]
World Wide Web: Web Scripting - HTML and CGI, JavaScript, DHTM, XML, Multilingual
Internet. [5]
[27]
Internet Security: Symmetric and Asymmetric Key Encryption, Digital Signatures,
Authentication, HTTPS, SSH/SSL/TLS, Firewall. [5]
Next Generation Internet Architecture : Mobile Internet, Content Delivery Network (CDN),
Named Data Networking (NDN), Software Defined Networking (SDN), Internet-of-Things
(IoT), Context Aware Computing. [5]
TEXT BOOKS:
1. Internet and World Wide Web How to Program- by H. M. Dietel and P. J. Dietel
REFERENCE BOOKS:
1. TCP/IP Tutorial and Technical Overview, (IBM Redbook) - Download From
http://www.redbooks.ibm.com/abstracts/gg243376.html
2. TCP/IP Guide, Charles M. Kozierok, Available Online - http://www.tcpipguide.com/
Sorting: Sorting networks, Bubble sort, Quick sort, Bucket sort and CO1 Design and
analyze the parallel algorithms for real world problems and implement them on available
parallel computer systems. [4]
Design algorithms suited for Multicore processor systems using OpenCL, OpenMP,
Threading techniques. [3]
[28]
Graph algorithms: Minimum spanning tree, single source shortest paths, all-pairs shortest
paths, Transitive closure, connected components, algorithms for sparse graphs. [3]
TEXT BOOKS:
1. Ananth Grama, Anshul Gupta, George Karypis, Vipin Kumar : Introduction to Parallel
Computing, Second Edition Pearson Education – 2007
2. Michael J. Quinn (2004), Parallel Programming in C with MPI and OpenMP McGraw-Hill
REFERENCE BOOKS
Data Mining: Different Definitions of Data Mining, KDD vs. Data Mining, Stages of KDD ,
DBMS vs. DM, AI vs. DM, Classifications of Data Mining, Stages of KDD, DM Techniques
, Discovery Driven Tasks, Classification, Frequent Episodes, Discovery of Association
Rules , Clustering, Deviation Detection, Mining Problems, Applications of DM, Other
Mining Problems. [4]
Association Rules: Item set, Support, Confidence, Problem Decomposition, Frequent Item
Set, Maximal Frequent Set, Border Set, Applications of Data Mining, Spotting Fraudulent
Behaviour, Astronomy etc., Association Rules, Informal a priori Algorithm for Learning
Association Rules, Finding Frequent Sets and Association Rules, Formal a priori Algorithm
for Association Rule. [4]
Decision Trees: Inductive Learning, ID3 Program, Algorithm for Building Decision Trees ,
Advantages of Decision Trees for Classification Purpose, Development of Decision Trees
for Different Training Data Sets, Rule Extraction from Pattern Set, Covering the instances,
Extraction of rules, Instance Space, Covering Algorithm. [4]
Bayesian Belief Nets (DAG): K nearest Neighbour, ANN, Learning in ANN, Perceptron as
a model of neuron, Single and multiplayer Perceptron for classification and knowledge
representation, Back propagation Network, Supervised, Reinforcement and Unsupervised
Learning. [3]
[29]
Clustering: Partitioned and Hierarchical Clustering, k means Clustering, Fast k Means
Clustering, Fuzzy K means Clustering, Hierarchical Clustering, Agglomerative and Divisive
Hierarchical Clustering, Single Linkage, Complete Linkage and Average Linkage
Clustering. [4]
Clustering (Complex): Outlier Detection, Outlier vs. Cluster, Types of Outliers, Outlier
Detection Methodologies, Supervised, Unsupervised and Semi supervised detection ,
Statistical Approaches, Parametric and Non Parametric Methods, Proximity Based
Methods, Clustering Based Methods. [4]
Temporal and Spatial Data Mining: Temporal Data Mining, Tasks involved, Temporal
Association Rules, Sequence Mining, Episode Discovery, Spatial Mining, Tasks involved ,
Spatial Clustering. [2]
Web Mining: Web Mining Techniques, Web Content Mining, Web Structure Mining, Web
Usage Mining, Text Mining. [2]
TEXT BOOKS:
1. Data Mining Techniques – Arun K Pujari – Universities Press
2. Data Mining – Vikram Pudi, P. Radha Krishna – Oxford University Press
REFERENCE BOOKS:
1. Data Mining – J. Han, M. Kamber, J. Pei -- Elesvier
2. Data Mining – Hand, Mannila and Smith – PHI
Introduction, Different types of input/output devices, Raster, Raster Scan Display. [5]
Line drawing algorithm, Circle and Ellipse drawing algorithm, other types of line and curve
Drawing algorithm. [5]
Projections- Perspective and Parallel projection, Vanishing point, Composite transform. [5]
TEXT BOOKS:
1. Computer Graphics by Harn and Baker
2. Computer Graphics F Folley
[30]
REFERENCE BOOKS:
1. Interactive Graphics – F W Newman.
Introduction of Biometric traits and its aim, image processing basics, basic image
operations,filtering, enhancement, sharpening, edge detection, smoothening,
enhancement,thresholding, localization. Fourier series, DFT, inverse of DFT. [8]
TEXT BOOKS:
1. Guide to Biometrics,By: Ruud M.Bolle,SharathPankanti, Nalini K. Ratha,Andrew
W.Senior, Jonathan H. Connell,Springer 2009
2. J. Wayman, A. K. Jain, D. Maltoni, and D. Maio, Biometric Systems: Technology,
Design and Performance Evaluation, Springer-Verlag, 2005
REFERENCE BOOKS:
1. D. R. Kisku, P. Gupta and J. K. Sing (Eds.), "Advances in Biometrics for Secure Human
Authentication and Recognition", CRC Press, Taylor and Francis, pp. 352, 1st Edition,
December 2013
2. M. Nixon and A.Aguodo, Feature Extraction & Image Processing for Computer Vision,
3rd Edition, 2012
Introduction to security and privacy, Number theory, Formal analysis and design of
algorithms and protocols, Provably security, Cryptosystems. Privacy, Foundations of
privacy. [5]
Definitions and early uses, Privacy regulations, Noiseless differential privacy, Privacy
preserving, Data mining techniques. Measuring compliance with security and privacy
regulations and standards. [5]
[31]
Security and Privacy Metrics. Physical security, IT security, Personal Security, Operational
security. Security and privacy in social networks, Measurement of user behavior in social
networks. [10]
An effective user user-driven framework for selection of social networks, security aspect.
[5]
TEXT BOOKS:
1. J. Thomas Shaw, “Information Security Privacy”, ABA, 2012.
2. Matthew Bailey, “Complete Guide to Internet Privacy, Anonymity and Security”, Nerel
Online, 2011.
REFERENCE BOOKS:
1. D. S. Herrmann, “A complete guide to security and privacy metrics”, Auerbach Publisher
(Taylor and Francis Group), 2007
2. A. Abraham, “Computational Social Networks: security and privacy”, Springer, 2012
Virtual Topology Design: Physical and Virtual topology, Traffic routing over virtual
topology, Limitations on virtual topology, Virtual topology problem formulation, Virtual
topology design heuristics. [5]
[32]
Traffic grooming algorithms for Ring and Mesh WDM networks. [4]
Optical Multicast Routing: Multicast routing problem, architecture of Light spliting node and
MI node, Network with full splitting and sparse splitting, Multicast routing and wavelength
assignment based on lightpath, light-tree. [4]
TEXT BOOKS:
1. WDM OPTICAL NETWORKS Concepts, Design and algorithms -- C. Siva Ram Murthy
and Mohan Gurusamy (PHI)
2. OPTICAL COMMUNICATION NETWORKS -- Biswanath Mukherjee (Mc Graw-Hill)
REFERENCE BOOKS:
1. OPTICAL NETWORKS Third Generation Transport Systems -- Uyless Black (Pearson
Education)
2. OPTICAL NETWORKING & WDM -- Walter Goralski (Tata Mc Graw-Hill)
The image model and acquisition, image shape, sampling, intensity images, color images,
range images, image capture, scanners. Statistical and spatial operations. [5]
Segmentation and Edge detection, region operations, Basic edge detection, second order
detection, crack edge detection, edge following, gradient operators, compass & Laplace
operators. [5]
Representation and Description, Object Recognition, 3-D vision and Geometry, Optical
flow. [10]
3D Motion planning, Image feature selection and classifications using machine learning
Algorithm. [5]
TEXT BOOKS:
1. D. A. Forsyth, J. Ponce, Computer Vision: A Modern Approach, PHI Learning 2009.
2. Milan Soanka, Vaclav Hlavac and Roger Boyle, Digital Image Processing and Computer
Vision, Cengage Learning.
REFERENCE BOOKS:
1. R.C. Gonzalez and R.E. Woods, Digital Image Processing, Pearson Education
[33]
SUBJECT SUBJECT L-T-P CREDIT DEVELOPER
CODE
Fault Avoidance and Fault Elimination Role of specification (the Z language), programming
standards, inspection and testing. [5]
Advanced Topics, Dependability evaluation techniques and tools: fault trees, Markov
chains; fault tolerance in distributed systems; Information Redundancy. [6]
TEXT BOOKS:
1. Fundamentals of Dependable John KnightChapman & Hall/CRC
REFERENCE BOOKS:
1. Fault Tolerance: Principles and Practice: Peter A. Lee, Thomas Anderson Springer
Volume 3 (Dependable Computing and Fault-Tolerant Systems)
Introduction to VLSI testing and verification. Logic and Event Driven Simulation. Delay
Models. [3]
Fault Modeling. Single Stuck-at Fault model. Fault Collapsing. Fault Equivalence. Fault
Domination. Checkpoint Theorem. [3]
Design for Testability. Adhoc approaches. Scan based Design. Random Scan. Scan FF
design. LSSD. Scan-Hold FF. [5]
[34]
Built-in Self Test. Pseudo-Random Pattern Generation. LFSR. [4]
TEXT BOOKS:
1. Essentials of Electronic Testing for Digital, Memory and Mixed Signal VLSI Circuits.
Bushnell and Agrawal. Kluwer Academic Publishers.
2. Digital Systems Testing and Testable Design. Abramovici et.al. Jaico Publications.
REFERENCE BOOKS:
1. Model Checking. Clarke et. al. MIT Press.
2. VLSI Test Principles and Architectures. LT Wang et.al. Morgan Kaufman.
Pattern and Pattern Class: Design of a Pattern Recognition System, Syntactic and
Decision Theoretic Approach, Bayesian Decision Theory, Continuous Features, Error,
Risk and Loss. [5]
Parametric and Non Parametric Methods: Histogram Method – Kernel Based Methods – K
- Nearest Neighbor Method -- Probabilistic Neural Network base on Parzon Window –
PNN Learning. [4]
Basics of ANN: Instar, Outstar, Groups of Instar and Outstar, Different types of Memories.
[1]
FF ANN: Pattern Association Network, Hebb’s Law, Pattern Classification Network. [2]
Complex PR Tasks: RBF, RBF Network for Pattern Classification, Advantages of RBF
over MLFF ANN, CPN Network. [2]
Single and Multilayer Network: Gradient Descent Procedure, Newton’s Algorithm, Fixed
[35]
Increment Learning, Variable Increment Learning, Support Vector Machine(SVM),
Multilayer Neural Networks, Unsupervised Learning. [ 5]
TEXT BOOKS:
1. Pattern Classification – Duda, Hart & Stork – J. Wiley & Sons.
2. Artificial Neural Networks – B. Yegnanarayana – PHI
REFERENCE BOOKS:
1. Neural Networks for Pattern Recognition – C.M. Bishop – Oxford
Input-output design and I/O communication protocols; design space exploration for
constraint satisfaction. [8]
Real Time operating system issues with respect to embedded system applications; time
constraints and performance analysis. [8]
TEXT BOOKS:
1. Peter Marwedel, Embedded System Design, Kluwer.
2. Wayne Wolf, Computers as Components: Principles of Embedded Computing Systems
Design, Morgan-Kaufmann.
REFERENCE BOOKS:
1. Frank Vahid and Tony Givargis, Embedded System Design: A Unified
Hardware/Software Introduction, John Wiley
[36]
Parallel algorithm design: Preliminaries, decomposition techniques, tasks and interactions,
load balancing, methods for reducing interaction overheads, parallel algorithm models. [4]
TEXT BOOKS:
1. Ananth Grama, Anshul Gupta, George Karypis, Vipin Kumar : Introduction to Parallel
Computing, Second Edition Pearson Education, 2007
2. Benedict R Gaster, Lee Howes, David R Kaeli Perhaad Mistry Dana Schaa,
Heterogeneous Computing with OpenCL McGraw-Hill, Inc. Newyork , 2011
REFERENCE BOOKS:
1. Michael J. Quinn, Parallel Programming in C with MPI and OpenMP McGraw-Hill
International Editions, Computer Science Series, 2004
2. Jason Sanders, Edward Kandrot, CUDA By Example – An IntroJason Sanders, Edward
Kandrot, CUDA By Example – An Introduction to GeneralPurpose GPU Programming,
Addison Wesley, 2011.
[37]
Karp algorithm, Push-relabel algorithm, Maximum bipartite matching, Hopcroft-Karp
algorithm. [6]
Linear Programming: Framework, Simplex algorithm, Duality, LP rounding and vertex
cover, Randomized LP rounding. [5]
TEXT BOOKS:
1. T. H. Cormen, C. E. Leiserson, R. L. Rivest and C. Stein, Introduction to Algorithms, by
Prentice Hall India
2. Michael T Goodrich and Roberto Tamassia, Algorithm Design: Foundations, Analysis,
and Internet Examples, Second Edition, Wiley, 2006
REFERENCE BOOKS:
1. Mark de Berg, Mark van Kreveld, Mark Overmars and Otfried Shwarzkopf (Cheong),
Computational Geometry: Algorithms and Applications, Third edition, Springer-Verlag,
2008
2. Vijay V Vazirani, Approximation Algorithms, Springer-Verlag, 2001
Functional programming: functions as first class objects, data types, list, applicative list
processing, recursion, lambda functions, closures. [10]
Logic programming: clause (fact, rule, goal), declarative and procedural aspects of logic
programming, list processing, recursion, control structures in Prolog (cut, negation, inputs,
outputs, repetition). [10]
[38]
Real examples of application of functional and logic programming. [5]
TEXT BOOKS:
1. Ivan Bratko. Prolog Programming for Artificial Intelligence, third edition, Addison-
Wesley, 2001.
2. Lisp, by Guy L. Steele
REFERENCE BOOKS:
1. ANSI Common Lisp by Paul Graham. Prentice Hall, 1996
2. Lisp, by Patrick Henry Winston and Berthold Horn
Introduction to Data Structures:Data, Data Types, String, Abstract Data Type (ADT) and
Data structures with examples. [3]
Arrays: Single and multi-dimensional arrays, Row and Column major Representation of
matrices, sparse matrices. [2]
Linked List: Creation, Display, Insertion and Deletion (in front, at end, and before and after
a specific node), Summation, average, maximum, minimum, Searching, Sorting,
Concatenation of two list (Circular and non-Circular),Doubly linked list, Application of
Linked List - polynomial, sparse matrix. [5]
Queue: Queue as an ADT, Queue operation, Array Representation of Queue and its
disadvantages, Linked Representation of Queue, Circular Queue, Priority Queue and its
applications[3]
Tree: Basic trees concept, Binary tree representation, Binary tree operation, Binary tree
traversal, (Preorder, Inorder and Postorder), Copying a Tree, checking equivalency
between two Trees. [3]
Binary search tree (BST): Creation, search, insertion, and deletion. [3]
Sorting: Bubble sort, Selection sort, Insertion sort, Quick Sort. [7]
TEXT BOOKS:
1. Data Structures Using C, ISRD Group, Second Edition, Tata McGraw-Hill.
[39]
2. Data Structure Using C, Balaguruswamy.
REFERENCE BOOKS:
1. Data Structure using C & C++, Angenstein&Tanenbaum, PHI.
2. An introduction to Data Structure, Trembly& Sorensen, MCHILL.
Fundamental concepts of the processing Unit: Fetching and Storing words, Register
Transfer, Execution of instruction, hardwired controls and Micro operation, Register
transfer language, register transfer, bus and memory transfer, arithmatic microoperations,
logic microoperations, shift microoperations , Arithmetic Logic shift Unit. [6]
TEXT BOOKS:
1. Mano, M “Computer System and Architecture”, (3rd edition) Prentice Hall of India,
2. Stallings,W “Computer Organization & Architecture”, fifth edition, 2000 PHI.
REFERENCE BOOKS:
1. P.Pal Choudhury “ Computer Organization and Design” PHI., New Delhi 1994.
2. Hwang & Briggs “ Computer Architecture” International Edition McGraw Hill.
[40]
SUBJECT SUBJECT L-T-P CREDIT DEVELOPER
CODE
Relational Calculus: Basic concepts, Tuple relational calculus and Domain relational
calculus, query practice. [3]
Structured Query Language (SQL): Detailed query writing procedure for DDL, DML and
DCL, complex query including nested sub-query practice with examples. [4]
Index Structures: Indexing, various types of index structures such as primary, secondary,
clustered, multi-level, dynamic multi-level(B_tree & B+_tree) concepts, problem solving on
these structures. [3]
Normalization: Basic concepts on functional dependency (FD) and multivalued FD, Rules
over FDs, various properties such as closure of a set of FDs, canonical cover etc., Need of
normalization, Different normal forms (1NF, 2NF, 3NF, BCNF, 4NF, 5NF) and associated
problems, Lossless decomposition, dependency preservation. [6]
Distributed database: Basic concept on distributed database and its importance over
centralized database, Architecture of distributed database, Properties of distributed
database – fragmentation, allocation and replication. [2]
TEXT BOOKS:
1. A. Silberschatz, H. F. Korth, S. Sudarshan, Database System Concepts,McGraw Hill
Education.
REFERENCE BOOKS:
1. Navathe,Elmasri, Fundamentals Of Database Systems, Pearson Education.
2. C. J. Date, An Introduction to Database Systems,Addison-Wesley.
[41]
SUBJECT SUBJECT L-T-P CREDIT DEVELOPER
CODE
Pointer and references in C++, Constant – Pointers, References, new & delete operator,
dynamic allocation. [6]
TEXT BOOKS:
1. Thinking in C++ (B. Eckel)
2. Essential C++ (S. Lippman)
REFERENCE BOOKS:
1. Effective C++ (S. Meyers)
2. C++ Programming Language (B. Stroustrup)
Introduction and basic concepts - Algorithm, Asymptotic notations (big-Oh, big Omega,
Theta, small-oh) and their significance, introduction to RAM model of computation,
complexity (Time Complexity, Space Complexity) analysis of algorithms. Solving
Recurrences – Substitution method, Recurrence tree method and Master Method, Finding
maximum and minimum. [9]
Searching: Binary search trees, balanced binary search trees- AVL trees. [5]
Sorting: Comparison based sorting- quick sort, heap sort, merge sort. Decision tree model
[42]
and (worst case) lower bound on sorting. [5]
Graph Algorithm : Depth First Search, Breadth First Search, Dijkstra's Single Source
Shortest Path algorithm; Minimum Spanning Tree. [5]
TEXT BOOKS:
1. T. H. Cormen, C. E. Leiserson, R. L. Rivest and C. Stein, Introduction to Algorithms, by
Prentice Hall India
2. J. Kleinberg and Eva Tardo, Algorithm Design by Pearson Education (Indian edition)
REFERENCE BOOKS:
1. Michael T Goodrich and Roberto Tamassia, Algorithm Design: Foundations, Analysis,
and Internet Examples, Second Edition, Wiley, 2006
[43]
Decoding, Population Initialization, Objective/fitness Function, Applications: TSP. [6]
TEXT BOOKS:
1. S. Rajsekharanand and VijayalakshmiPai, “Neural Networks, Fuzzy Logic and Genetic
Algorithm: Synthesis and Applications”, Prentice Hall of India.
2. Kumar Satish, “Neural Networks”, Tata Mc. Graw Hill.
REFERENCE BOOKS:
1. B. Yegnanarayana , “Artificial Neural Networks”
2. David E. Goldberg, “Genetic Algorithms in Search, Optimization, and Machine
Learning”, Addison-Wesley Publishing Company
[44]
Matrix, Implementation of the Access Matrix, Access Control. [2]
Security: The Security Problem, Program Threats, System and Network Threats,
Cryptography as a Security Tool, User Authentication. [3]
TEXT BOOKS:
1. Operating System Concepts by Abraham Silberschatz, Peter B. Galvin, Greg Gagne,
8th Edition, Wiley, July 2008.
2. Modern Operating System by Andrew S. Tanenbaum, 3rd Edition, Pearson, December
2007.
REFERENCE BOOKS:
1. Operating Systems by DhananjayDhamdhere, 1st Edition, McGraw-Hill Education,
January 2008.
2. Operating Systems by Deitel, Deitel, and Choffnes, Prentice Hall; 3rd Edition, pp. 1272,
2003.
Network Model: Basic concepts of network model, OSI and TCP/IP models, functions in
brief of different layers of OSI model, different levels of addressing. [2]
Physical layer functions: Basic concept of signals, analog and digital signals, various
modulation techniques, various line coding techniques, noise and errors, different types of
transmission media and its applications. [2]
Switching techniques: Basic concepts of a switched networks and its importance, various
switching techniques (circuit, message, datagram approach, virtual circuit networks) with
examples, compare and contrast between various types of switching techniques. [3]
Data link layer functions: Framing, Error control techniques (Parity checking method,
Checksum, Cyclic redundancy check, Hamming code) with examples, Flow control
protocols and its importance, various flow control protocols such as stop-and-wait ARQ,
sliding window (Go-Back-N ARQ and Selective repeat ARQ) protocols,HDLC protocol,
Multiple access techniques and its importance, various multiple access techniques such
as ALOHA, slotted ALOHA, CSMA, CSMA/CD, CSMA/CA, polling, reservation, token
passing, FDMA, TDMA and CDMA techniques. [10]
Network layer functions: IP address and its classification, design of a network with sub
netting concept, IP protocol, transition from IPv4 to IPv6, NAT, ARP and RARP, Routing
and forwarding concepts, classification of routing protocols, distance vector, link state and
[45]
path vector routing protocols, various multicast routing protocols, congestion control
techniques, Quality of Service (QoS) in networks and its improvements. [10]
Transport layer functions: Basic concepts of socket address, socket programing. [3]
TEXT BOOKS:
1. B. A. Forouzan, DATA COMMUNICATIONS AND NETWORKING.
REFERENCE BOOKS:
1. A. S. Tanenbaum, Computer Networks.
2. W. Stallings, Data and Computer Communications.
Concept of systems, its characteristics, the product, the process, Methods, Tools,
Software Process modules, Process technology, Project management concepts: People,
The problem, the process and the project. [5]
Software process and project metrics, Software measurement, Software project planning:
Observationon estimating, project planning objectives, software scope, resources, project
estimation, decomposition techniques. [6]
Project scheduling, basic concepts, Relationship between people and effort, defining task
set, refinement of major task, Software quality assurance: Quality concepts, Software
reviews, Software reliability. [6]
1. Software testing methods, Testing fundamentals, Test case design, Software Testing
strategies, strategic issues, Unit testing, Integration testing, Validation testing, system
testing. Object-oriented paradigm, concepts, elements of an object model, Management of
Object oriented software projects.object-oriented analysis concepts. [8]
TEXT BOOKS:
1. Software Engineering: A Practitioner's Approach, 5th Ed., Roger S. Pressman, Tata
McGraw Hill, New Delhi, 2001.
2. Software Engineering Concepts, Richard Fairley, Tata McGraw Hill, New Delhi, 2002.
REFERENCE BOOKS:
1. Classical and Object Oriented Software Engineering with C++/Java , 3rd Ed., S.R.
Schach, McGraw Hill International, New York, 1998
[46]
SUBJECT SUBJECT L-T-P CREDIT DEVELOPER
CODE
Distributed State Detection. Global State. Consistent Cut. Global State recording
algorithm. Termination Detection. Credit based algorithm. Diffusion Computation based
algorithm. [3]
Distributed Mutual Exclusion. Token based and non-token based algorithms. [2]
Distributed File systems. Mechanisms. Stateful and Stateless servers. Scalability. Naming
and Name Servers. [5]
TEXT BOOKS:
1. Advanced Concepts in Operating Systems. Singhal and Sivaratri. McGraw Hill.
REFERENCE BOOKS:
1. Operating Systems : A Concept Based Approach. Dhamdhere. McGraw Hill.
2. Distributed Operating Systems : Concepts and Design. P.K.Sinha. Prentice Hall.
Arrays: Array definition, representation and analysis, single and multidimensional arrays,
address calculation, application of arrays, character string in c, character string operation,
array as parameters, ordered list, sparse matrices and vectors. [3]
[47]
AND pop, array representation of stack, linked representation of stack, operations
associated with stacks, application of stack: conversion of infix to prefix and postfix
expressions, evaluation of postfix expression using stack. [4]
Linked list: Representation and implementation of singly linked lists, two-way header list,
traversing and searching of linked list, overflow and underflow, insertion and deletion
to/from linked lists, insertion and deletion algorithms, doubly linked list, linked list in array,
polynomial representation and addition, generalized linked list, garbage collection and
compaction. [5]
Trees: Basic terminology, binary trees, binary tree representation, algebraic expressions,
complete binary tree, extended binary trees, array and linked representation of binary
trees, traversing binary trees, threaded binary trees, traversing threaded binary trees,
Huffman algorithm. [3]
Searching and Hashing: Sequential search, binary search, comparison and analysis, hash
table, hash functions, collision resolution strategies, hash table implementation. [4]
Sorting: Insertion Sort, Bubble Sorting, Quick Sort, Merge Sort, Heap Sort, sorting on
different keys, practical consideration for internal sorting. [4]
Binary Search Trees: Binary Search Tree (BST), Insertion and Deletion in BST,
Complexity of Search Algorithm, Path Length, AVL Trees, B-trees. [4]
TEXT BOOKS:
1. Horowitz and Sahani, “Fundamentals of data Structures”, Galgotia Publication Pvt. Ltd.,
New Delhi.
2. R. Kruse etal, “Data Structures and Program Design in C”, Pearson Education Asia,
Delhi-2002
REFERENCE BOOKS:
1. Bruno R Preiss, “Data Structures and Algorithms with Object Oriented Design Pattern in
C++”, Jhon Wiley & Sons, Inc.
2. Adam Drozdek, “Data Structures and Algorithms in C++”, Thomson Asia Pvt.
Ltd.(Singapore)
[48]
SUBJECT SUBJECT L-T-P CREDIT DEVELOPER
CODE
Arrays – Single and multi dimensional arrays, Row and Column major Representation of
matrices,
Sparse matrices [4]
Linked List
Linked List as an ADT, Linked List Vs. Arrays, Memory Allocation & de-allocation for a
Linked List, Linked List operations and Implementation: Creation, Display, Insertion and
Deletion (in front, at end, and before and after a specific node), Summation, average,
maximum, minimum, Searching, Sorting etc., Concatenation of two list, (Circular and non
Circular) Doubly linked list: Creation, Insertion, Deletion and Display, Application of Linked
List – addition of two polynomials, very large numbers [8]
Stack
The Stack as an ADT, Stack operation, Array Representation of Stack, Link
Representation of Stack
Applications – Recursion, Function call, Conversion from infix to postfix notation,
Evaluation of postfix expression, Checking validity of a parenthesized expression. [5]
Queue
The Queue as an ADT, Queue operation, Array Representation of Queue and its
disadvantages,
Linked Representation of Queue, Circular Queue, Priority Queue and its applications. [3]
Tree - Basic concept of trees, Binary tree representation, Binary tree operation, Binary
tree, traversal (Preorder, Inorder and Postorder), Copying a Tree, checking equivalence
between two Trees [6]
Binary search tree (BST)- Creation, search and insertion in a BST. [2]
Sorting - Bubble sort, Selection sort, Insertion sort, Quick Sort, Merge Sort, Radix Sort, [6]
TEXT BOOKS:
1. Data Structures Using C, ISRD Group, Second Edition, Tata McGraw-Hill.
2. Data Structure Using C, Balaguruswamy.
REFERENCE BOOKS:
1. Data Structure using C & C++, Angenstein & Tanenbaum, PHI.
[49]
2. An introduction to Data Structure, Trembly & Sorensen, MCHILL.
Algorithm, Complexity of algorithm, Different notation: Big ohh (O), Big omega (Ω), Big
theta (Θ). Concept of data structure with example. Concept of dynamic memory
allocation through C language. [4]
Array: 1-D, 2-D, 3-D and Multi-dimensional arrays and memory representation of these
arrays, Row and Column major representation of matrices, Sparse matrices, lower
triangular, upper triangular, tri-diagonal sparse matrices. [6]
Sorting and Searching: Bubble sort, Selection sort, Insertion sort, Merge sort, Quick sort,
Radix sort. Sequential search, and binary search. [5]
Linked List:Linear, doubly, and circular linked lists. Different operation: insertion, deletion,
searching, and modification of a node. Application of linked list. [6]
Stack: Implementation of stack using array and linked list. Applications: Sub routine call,
recursion, conversion of infix to postfix expression, evaluation of postfix expression, etc.
[5]
Queue: Implementation of queue using array and linked list. Circular queue and priority
queue. [3]
Tree: Basic terminology, Binary tree and its implementation, Tree traversal techniques,
Binary search tree – creation, insertion, and deletion. [5]
TEXT BOOKS:
1. “Data Structures and Program Design In C”, 2/E by Robert L. Kruse, Bruce P. Leung.
2. “Data Structures” by S. Lipschutz.
REFERENCE BOOKS:
1. “Fundamentals of Data Structures of C” by Ellis Horowitz, Sartaj Sahni, Susan
Anderson-freed.
2. “Introduction to Algorithms” by Thomas H. Cormen, Charles E. Leiserson, Ronald L.
Rivest, Clifford Stein.
[50]
Function of DBA, Data Independence, Data Model & Various types of data models. [4]
Relational Calculus: Basic concepts, Tuple relational calculus and Domain relational
calculus, query practice. [3]
Structured Query Language (SQL): Detailed query writing procedure for DDL, DML and
DCL, complex query including nested sub-query practice with examples. [4]
Index Structures: Indexing, various types of index structures such as primary, secondary,
clustered, multi-level, dynamic multi-level (B_tree & B+_tree) concepts, problem solving on
these structures. [3]
Normalization: Basic concepts on functional dependency (FD) and multivalued FD, Rules
over FDs, various properties such as closure of a set of FDs, canonical cover etc., Need of
normalization, Different normal forms (1NF, 2NF, 3NF, BCNF, 4NF, 5NF) and associated
problems, Lossless decomposition, dependency preservation. [6]
Distributed database: Basic concept on distributed database and its importance over
centralized database, Architecture of distributed database, Properties of distributed
database – fragmentation, allocation and replication. [2]
TEXT BOOKS:
1. A. Silberschatz, H. F. Korth, S. Sudarshan, Database System Concepts,McGraw Hill
Education.
REFERENCE BOOKS:
1. Navathe,Elmasri, Fundamentals Of Database Systems, Pearson Education.
2. C. J. Date, An Introduction to Database Systems,Addison-Wesley.
[51]
Laboratory Courses
------------------------------------------------------
1. Write a c program to convert the string from upper case to lower case.
2. Write a c program to convert the string from lower case to upper case.
3. Write a c program to delete the all consonants from given string.
4. Write a c program to count the different types of characters in given string.
5. Write a c program to sort the characters of a string.
6. Write a c program for concatenation two strings without using string.h header file.
7. Write a c program to find the length of a string using pointer.
8. Write a c program which prints initial of any name.
9. Write a c program to print the string from given character.
10. Write a c program to reverse a string
[52]
11. Reverse a string using recursion in c
12. String concatenation in c without using strcat
13. How to compare two strings in c without using strcmp
14. String copy without using strcpy in c
15. Convert a string to ASCII in c
---------------------------------------------------------
-----------------------------------------------------------------
----------------------------------------------------------------------
-----------------------------------------------------------------------
TEXT BOOKS:
REFERENCE BOOKS:
[53]
SUBJECT SUBJECT L-T-P CREDIT
CODE
TEXT BOOKS:
1. Data Structure Using C, Balagurusamy
2. Data Structure using C & C++, Angenstein&Tanenbaum, PHI
REFERENCE BOOKS:
1. Data Structures Using C & C++, Rajesh K. Shukla, Wiley- India
2. Data Structures Using C, ISRD Group, Second Edition, Tata McGraw-Hill
[54]
SUBJECT SUBJECT L-T-P CREDIT
CODE
Problems on basic C++ syntax, loops, functions, assert macro, enum, etc
Number pyramids, Conversion of unindented code (storted in file) to indented code,
Determinant of a matrix, addition/multiplication/factorial of VERY LARGE (represent using
string) numbers, expression evaluation
TEXT BOOKS:
REFERENCE BOOKS:
The List of Assignments to be covered in the Microprocessor and its Applications Lab:
1. Addition of two 8-bit numbers.
2. Find out 1's and 2's complement of a 8-bit number.
3. Calculate the sum of a list of N 8-bit numbers.
4. Addition of two 16-bit numbers.
5. Find out 1's and 2's complement of a 16-bit number.
6. Count the number of 1s in a 8-bit number.
7. Count the number of 1s in a 16-bit number.
Subtraction of two 8-bit numbers. (output both the sign & magnitude)
Subtraction of two 16-bit numbers. (output both the sign & magnitude)
Multiplication of two 8-bit unsigned numbers.
Multiplication of two 16-bit unsigned numbers.
Find out maximum & minimum of a list of N 8-bit numbers.
[55]
Test whether a given 8-bit number is palindrome or not.
Test whether a given 16-bit number is palindrome or not.
Sort a list of N 8-bit numbers.
Division of two 8-bit unsigned numbers.
Division of two 16-bit unsigned numbers.
Write a program to find the summation of the following series.
S= 1 + 2 +3+4+…………up to N nos.
S= 2+4+6+8+…………..up to N nos.
S= 1+2+3+5+8+……….up to N nos.
S= 2+3+5+7+11+……….up to N nos.
S= 2-4+6-8………….up to N nos.
Write a program to find the Fibonacci series
Write a program for blinking a message using monitor program. Extend it to roll the
message (Rolling display).
Design a digital clock using monitor program.
TEXT BOOKS:
1. Microprocessor Architecture, Programming & Applications, Gaonkar, Ramesh,Penram
International Pub.(India)
2. Microprocessor, B.Ram, Galgotia
REFERENCE BOOKS:
1. Microprocessors, Rafiquzzumman, Galgotia
Study of DBMS, RDBMS and ORDBMS: Definition of DBMS, RDBMS and ORDBMS,
Features of DBMS, RDBMS and ORDBMS, advantages of each.
To study Data Definition language statements: SQL schema update statements (DDL)
such as Delete or Modify table (Alter, Create, Drop commands).
To study Data Manipulation Statements: SQL Data update statements (DML) such as
insert, delete and update statements.
Study of SELECT command with different clauses: Select, from and where clauses with
use of several keywords.
Study of SINGLE ROW functions (character, numeric, Data functions):Number Functions,
Concatenation and column alias, Single- Row Character Manipulation Functions and
Single- Row Date Functions.
Study of GROUP functions: Aggregate functions such as avg, count, max, min, Sum,
group by function.
Study of various type of SET OPERATORS: Union, Intersect, Minus.
Study of various type of Integrity Constraints: Primary key and foreign key assign.
Study of Various type of JOINS:Equality Join, Outer Join, Staff Join and Inequality Join.
To study Views and Indices:Create index statement and create view statement.
To study nested sub-query: set membership, set comparison.
PL/SQL: Make Use of PL/SQL Language Components, Make Use of PL/SQL Variables,
Handle PL/SQL Reserved Words, Make Use of Identifiers in PL/SQL, Make Use of
[56]
Anchored Data Types, Declare and Initialize Variables, Understand the Scope of a Block,
Nested Blocks, and Labels, Loop structures.
TEXT BOOKS:
1. Ivan Bayross, SQL, PL/SQL: The Programming Language of Oracle,BPB Publications.
REFERENCE BOOKS:
1. John Garmany, Easy Oracle PL/SQL Programming, RAMPAUT TECHPRESS.
2. B. Rosenzweig and E. Silvestrova, Fundamentals of Programming in PL/SQL,
PEARSON
Programs on LEX
Programs on Yacc
TEXT BOOKS:
REFERENCE BOOKS:
TEXT BOOKS:
1. Richard Stevens, Unix Network Programming, Volume 1 and 2, Addison-Wesley
Professiona
2. Neil matthew and Richard Stones, Beginning Linux Programming, Wrox Publishers, 4th
Edition.
REFERENCE BOOKS:
Prepare the following documents for three of the experiments listed below using software
engineering methodology.
1. Program Analysis and Project Planning: Thorough study of the problem – Identify
project scope, Objectives, Infrastructure.
2. Software requirement Analysis: Describe the individual Phases / Modules of the project,
Identify deliverables.
3. Software Design: Use work products – Data dictionary, Use case diagrams and activity
diagrams, build and test class diagrams, Sequence diagrams and add interface to class
diagrams, DFD, ER diagrams
4. Software Development and Debugging using any Front end and Back end tool
5. Software Verification and Validation procedures: Implementation Program on Java and
testing using Java.
TEXT BOOKS:
REFERENCE BOOKS:
[58]
SUBJECT SUBJECT L-T-P CREDIT
CODE
Write a LISP Program to search, insert and delete element from a list. [6]
Write a program in MATLAB to implement DFS algorithm. The input to the program should
be a problem in production system representation and specified a Goal. The output should
indicate success or failure to arrive at the Goal. If the Goal is arrived at, it will indicate the
search path to have arrived at the goal. [6]
Write a program in MATLAB to implement AND-OR graph with AO* heuristics. Input
should be Production System Representation. [3]
Write a program in MATLAB to implement a game of 8-puzzle. The input should be any
initial board position and output should be any other board position. The output should
indicate the search path to go about the solution. The heuristic to be used is Steepest
Ascend Hill Climbing. The evolution Function/ heuristic function is the total number of
misplaced times. [6]
Write a program in MATLAB to implement the game of Rubik’s cube using Steepest
Ascend Hill Climbing. The evolution function/ heuristic function are the total number of
colour difference in each face of the original cube. The rule is to move each sub cube a
step of 90 degrees. [6]
TEXT BOOKS:
1. COMMON LISP: A Gentle Introduction to Symbolic Computation, David S. Touretzky,
Carnegie Mellon University
REFERENCE BOOKS:
ASSIGNMENT SET – I: Read and display an image, pixel replication, nearest neighbour
interpolation, shrinking the given image using row column deletion and point processing
based image enhancement using thresholding, image negative and contrast stretching. [3]
ASSIGNMENT SET – II: Point processing based image enhancement using log and
inverse log transformation, Gamma correction (power law) with different – ve and + ve
[59]
values of Gamma, point processing based image enhancement using gray level slicing
and bit plane slicing. [3]
ASSIGNMENT SET – IV: Perform image subtraction operation, image averaging and
division of gray image by a constant. Enhancement of gray level image by smoothing
(averaging) filters of size 3×3 and 5×5, box filter, weighted averaging filter 3×3.
Enhancement of gray level image by using median filter of size 3×3 and 5×5, Sobel
gradient operator and Robert cross gradient operator. [3]
ASSIGNMENT SET – V: Enhance the gray level image by using Laplacian filter of size
3×3 with and without diagonal neighbour and high boost filter. Detect the horizontal line,
vertical line and ±450 line in a gray level image. Detect the Prewitt, Sobel and Laplacian of
Gaussian (Mexican Hat) filters in a gray level image. Convert a RGB image into gray level
image. [6]
ASSIGNMENT SET – VI: Huffman coding technique, test on two different images and
compute the compression ratios. Arithmetic coding technique, test on two different images
and compute the compression ratios. Perform DCT transform on every block of an image
having 8×8 sub blocks. Perform inverse DCT. Combine the block and display the image.
Calculate the compression ratio. Apply on two different images for m = 8, 4, 2 and 1. [6]
TEXT BOOKS:
1. Digital Image Processing, by Rafael C. Gonzalez, Richard E. Woods, 3rd Edition,
Prentice Hall, 2007.
2. Fundamentals of Digital Image Processing by Anil K. Jain, 1st Edition, Prentice Hall,
1988.
REFERENCE BOOKS:
1. B. Chanda and D. Dutta Majumder, Digital Image Processing and Analysis 2nd Ed., PHI
Learning Pvt. Ltd., New Delhi, 2011.
2. Digital Image Processing, Jayaraman, Tata McGraw-Hill Education, pp. 723, 2011.
Basics of HTML –table, hyperlink, form :ordered and unordered list, text box, text area
box, check box, radio button, password field, submit and reset button. [3]
HTML frame – create frame set : use frame tags, create vertical frames, horizontal frames,
[60]
use hyperlink tag to target displaying a HTML page to another frame. [3]
Form validation – validate the fields of a form, implement exception handling, program on
image rollover, prompt, alert, array, looping, validate email, phone number using regular
expression. [3]
CSS – colors, backgrounds, borders, margins, padding, height- width, text, fonts, links, list,
tables, position, image. [3]
Create a web page that contain login information, after successful login user can search
records, insert new entry, can modify existing information, delete unnecessary information.
[ 2]
TEXT BOOKS:
1. Core Web Programming, 2nd Edition (Marty Hall)
REFERENCE BOOKS:
Study of DBMS, RDBMS and ORDBMS: Definition of DBMS, RDBMS and ORDBMS,
Features of DBMS, RDBMS and ORDBMS, advantages of each.
To study Data Definition language statements: SQL schema update statements (DDL)
such as Delete or Modify table (Alter, Create, Drop commands).
To study Data Manipulation Statements: SQL Data update statements (DML) such as
insert, delete and update statements.
Study of SELECT command with different clauses: Select, from and where clauses with
use of several keywords.
Study of SINGLE ROW functions (character, numeric, Data functions):Number Functions,
Concatenation and column alias, Single- Row Character Manipulation Functions and
Single- Row Date Functions.
Study of GROUP functions: Aggregate functions such as avg, count, max, min, Sum,
group by function.
Study of various type of SET OPERATORS: Union, Intersect, Minus.
Study of various type of Integrity Constraints: Primary key and foreign key assign.
Study of Various type of JOINS:Equality Join, Outer Join, Staff Join and Inequality Join.
[61]
To study Views and Indices:Create index statement and create view statement.
To study nested sub-query: set membership, set comparison.
PL/SQL: Make Use of PL/SQL Language Components, Make Use of PL/SQL Variables,
Handle PL/SQL Reserved Words, Make Use of Identifiers in PL/SQL, Make Use of
Anchored Data Types, Declare and Initialize Variables, Understand the Scope of a Block,
Nested Blocks, and Labels, Loop structures.
TEXT BOOKS:
1. Ivan Bayross, SQL, PL/SQL: The Programming Language of Oracle,BPB Publications.
REFERENCE BOOKS:
1. John Garmany, Easy Oracle PL/SQL Programming, RAMPAUT TECHPRESS.
2. B. Rosenzweig and E. Silvestrova, Fundamentals of Programming in PL/SQL,
PEARSON.
TEXT BOOKS:
1. “Data Structures and Program Design In C”, 2/E by Robert L. Kruse, Bruce P. Leung.
2. “Data Structures Using C” by Reema Thareja.
[62]
REFERENCE BOOKS:
1. “Fundamentals of Data Structures of C” by Ellis Horowitz, Sartaj Sahni, Susan
Anderson-freed.
2. “Data Structures in C” by Aaron M. Tenenbaum.
TEXT BOOKS:
1. “Data Structures and Program Design In C”, 2/E by Robert L. Kruse, Bruce P. Leung.
2. “Data Structures Using C” by Reema Thareja.
REFERENCE BOOKS:
1. “Fundamentals of Data Structures of C” by Ellis Horowitz, Sartaj Sahni, Susan
Anderson-freed.
2. “Data Structures in C” by Aaron M. Tenenbaum.
[63]
SUBJECT SUBJECT L-T-P CREDIT
CODE
TEXT BOOKS:
1. Data Structure Using C, Balagurusamy
2. Data Structure using C & C++, Angenstein&Tanenbaum, PHI
REFERENCE BOOKS:
1. Data Structures Using C & C++, Rajesh K. Shukla, Wiley- India
2. Data Structures Using C, ISRD Group, Second Edition, Tata McGraw-Hill
[64]