M.tech CSE CSE and CS R17 Course Structure and Syllabus
M.tech CSE CSE and CS R17 Course Structure and Syllabus
M.Tech II Semester
S.No Subject Subject L T P C
Code
1. 17D25201 Advances in Software Testing 4 - - 4
2. 17D58201 Big Data Analytics 4 - - 4
3. 17D58202 Mobile Application Development 4 - - 4
4. Elective-III 4 - - 4
17D58203 a. Internet of Things
17D58204 b. Distributed Computing
17D08102 c. Network Security & Cryptography
17D58205 d. NOSQL Databases
5. Elective-IV 4 - - 4
17D58206 a. Machine Learning
17D58207 b. Cloud Computing
17D25207 c. Software Configuration Management
d. Natural Language Processing
17D58208
6. 17D25209 Advances in Software Testing Lab - - 4 2
7. 17D58209 Map Reduce Programming Lab - - 4 2
8. 17D58210 Mobile Application Development Lab - - 4 2
Total 20 12 26
M.Tech III Semester
M.Tech IV Semester
A: Satisfactory
B: Not Satisfactory
JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY ANANTAPUR
M.Tech I semester (CSE & CS)
L T P C
4 0 0 4
(17D58101) ADVANCED DATA STRUCTURES AND ALGORITHMS
UNIT I : Overview of Data Structures - Arrays, Stacks, Queues, linked lists , Linked stacks
and Linked queues, Applications
UNIT II: Trees and Graphs – Basics of trees and binary trees, Representation of trees and
Binary trees, Binary tree Traversals, Threaded binary trees, Graphs, representation and
traversals.
Binary Search Trees, AVL Trees and B Trees - Binary Search Trees: Definition,
Operations and applications. AVL Trees: Definition, Operations and applications. B Trees:
Definition, Operations and applications.
UNIT III: Red – Black Trees, Splay Trees and Hash Tables - Red–Black Trees, Splay
Trees and their applications, Hash Tables, Hash Functions and various applications, File
Organizations.
UNIT IV: Divide – and – Conquer & Greedy Method - General Method, Binary Search,
Finding Maximum and Minimum, Quick Sort, Merge sort, Strassen’s Matrix Multiplication,
Greedy Method- General Method, Minimum Cost Spanning Trees, Single Source Shortest
Path.
Back Tracking and Branch – and – Bound - General Method, 8 – Queen’s Problem, Graph
Coloring. Branch – and – Bound: The Method, LC Search, Control Abstraction, Bounding, 0
/ 1 Knapsack Problem.
UNIT V: Dynamic Programming - General Method, All Pairs Shortest Path, Single Source
Shortest Path, 0 /1 Knapsack problem, Reliability Design, Traveling Sales Person’s Problem.
Text Books:
1. Data Structures and Algorithms Using C++ by Ananda Rao Akepogu and Radhika Raju
Palagiri, Pearson Education, 2010.
2. Classic Data Structures by D. Samanta, 2005, PHI
3. Data Structures and Algorithms by G.A.V. Pai, 2009, TMH.
4. Design and Analysis of Computer Algorithms by Aho, Hopcraft, Ullman 1998, PEA.
5. Introduction to the Design and Analysis of Algorithms by Goodman, Hedetniemi, TMG
6. Design and Analysis of Algorithms by E. Horowitz, S. Sahani, 3rd Edition, Galgotia.
7. Data Structures and Algorithms in C++ by Drozdek 2nd Edition, Thomson.
JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY ANANTAPUR
UNIT - I
Introduction, What Is Statistical Learning?, Why Estimate f?, How Do We Estimate f?, The
Trade-Off Between Prediction Accuracy and Model Interpretability, Supervised Versus
Unsupervised Learning, Regression Versus Classification Problems, Assessing Model
Accuracy, Measuring the Quality of Fit, The Bias-Variance Trade-of, The Classification
Setting, Introduction to R, Basic Commands, Graphics, Indexing Data, Loading Data,
Additional Graphical and Numerical Summaries.
UNIT – II
UNIT-III
UNIT- IV
Programming for basic computational methods such as Eigen values and Eigen vectors,
sparse matrices, QR and SVD, Interpolation by divided differences.
UNIT-V
Data Objects and Attribute Types, Basic Statistical Descriptions of Data, Data Visualization,
Measuring Data Similarity and Dissimilarity.
Data Warehouse: Basic Concepts, Data Warehouse Modeling: Data Cube and OLAP, Data
Warehouse Design and Usage, Data Warehouse Implementation, Data Generalization by
Attribute-Oriented Induction.
Text Books:
UNIT I
UNIT II
Introduction to Patterns - What is a Pattern? What makes a Pattern? Pattern Categories, Relationships
between Patterns, Pattern Description, Patterns and Software Architecture.
Architectural Patterns
Layers, Pipes and Filters, Blackboard, Broker, Microkernel, MVC, PAC, Reflection.
UNIT III
What is Design Pattern, Organizing catalogs, Role in solving design problems, Selection and Usage,
Creational Patterns - Abstract factory, builder, factory method, prototype, singleton,
UNIT IV
Structural Patterns - Adapter, bridge, composite, decorator, façade, flyweight, Proxy, Decorator,
façade, flyweight, Proxy.
UNIT V
Case Studies – Designing a Document Editor - Design issues of Lexi Editor in Deign Patterns, The
World Wide Web - a case study in interoperability
TEXT BOOKS:
1. Software Architecture in Practice, second edition, Len Bass, Paul Clements & Rick Kazman,
Pearson Education,2003.
2. Pattern-Oriented Software Architecture”, A System of Patterns, Frank Buschmann Regine
Meunier, Hans Rohnert, Peter Sommerlad and Michael Stal, WlLEY.
3. Design Patterns: Elements of Reusable Object-Oriented Software, Erich Gamma, Pearson
Education.
REFERENCE BOOKS:
Software process and Process Models, Choice of Process models, mental delivery, Rapid
Application development, Agile methods, Extreme Programming, SCRUM, Managing
interactive processes, Basics of Software estimation, Effort and Cost estimation techniques,
COSMIC Full function points, COCOMO II A Parametric Productivity Model, Staffing
Pattern.
Framework for Management and control, Collection of data Project termination, Visualizing
progress, Cost monitoring, Earned Value Analysis- Project tracking, Change control-
Software Configuration Management, Managing contracts, Contract Management.
1. Bob Hughes, Mike Cotterell and Rajib Mall: Software Project Management – Fifth
Edition, Tata McGraw Hill, New Delhi, 2012.
References Books:
Unit-I
Computer Security concepts, The OSI Security Architecture, Security attacks, Security
services and Security mechanisms, A model for Network Security
Classical encryption techniques- symmetric cipher model, substitution ciphers, transposition
ciphers, Steganography.
Modern Block Ciphers: Block ciphers principles, Data encryption standard (DES), Strength
of DES, linear and differential cryptanalysis, block cipher modes of operations, AES, RC4.
Unit-II
Introduction to Number theory – Integer Arithmetic, Modular Arithmetic, Matrices, Linear
Congruence, Algebraic Structures, GF(2n) Fields, Primes, Primality Testing, Factorization,
Chinese remainder Theorem, Quadratic Congruence, Exponentiation and Logarithm.
Public-key cryptography - Principles of public-key cryptography, RSA Algorithm, Diffie-
Hellman Key Exchange, ELGamal cryptographic system, Elliptic Curve Arithmetic, Elliptic
curve cryptography
Unit-III
Cryptographic Hash functions: Applications of Cryptographic Hash functions, Requirements
and security, Hash functions based on Cipher Block Chaining, Secure Hash Algorithm (SHA)
Message Authentication Codes: Message authentication Requirements, Message
authentication functions, Requirements for Message authentication codes, security of MACs,
HMAC, MACs based on Block Ciphers, Authenticated Encryption
Digital Signatures-RSA with SHA & DSS
Unit-IV
Key Management and distribution: Symmetric key distribution using Symmetric Encryption,
Symmetric key distribution using Asymmetric, Distribution of Public keys, X.509
Certificates, Public key Infrastructure.
User Authentication: Remote user Authentication Principles, Remote user Authentication
using Symmetric Encryption, Kerberos, Remote user Authentication using Asymmetric
Encryption, Federated Identity Management, Electronic mail security: Pretty Good Privacy
(PGP), S/MIME.
Unit-V
Security at the Transport Layer (SSL and TLS) : SSL Architecture, Four Protocols, SSL
Message Formats, Transport Layer Security, HTTPS, SSH
Security at the Network layer (IPSec): Two modes, Two Security Protocols, Security
Association, Security Policy, Internet Key Exchange.
System Security: Description of the system, users, Trust and Trusted Systems, Buffer
Overflow and Malicious Software, Malicious Programs, worms, viruses, Intrusion Detection
System(IDS), Firewalls
Text books:
2.“Cryptography and Network Security: Principals and Practice”, William Stallings, Pearson
Education , Fifth Edition, 2013.
References:
TEXT BOOKS:
(Elective-I)
UNIT – I
UNIT II
UNIT III
UNIT IV
UNIT V
Text Books:
(Elective-II)
UNIT-I:
UNIT-II:
Software Licenses, Copyright, Contract, Patent, Free Software and Open Source Software,
MIT License, BSD, License, GNU General Public License, GNU Lesser General Public
License, Q Public License, Proprietary License, Sun Community License.
UNIT-III:
Software Contracts:
Basics of Software Contracts, Extent of liability, Contract for the supply of custom-built
software at a fixed price, other types of software service Contract, Liability for defective
software.
UNIT-IV:
UNIT-V:
Data Protection Regulations, Data Protection and Privacy, The impact of the Internet, Factors
Influencing the Regulation of Data Processing, Convergence of Data Protection Practice,
Defamation and the protection of Reputation.
REFERENCES:
1. Andrew M. St. Laurent, “Open Source and Free Software Licensing”, O’Reilly,
Publications.
2. Frank Bott, et. al, “Professional Issues in Software Engineering”, Taylor &
JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY ANANTAPUR
Unit – I
Foundations of AI: What is AI, History of AI, Strong and weak AI, The State of the Art.
Intelligent Agents: Agents and Environments, Good Behavior: The Concept of Rationality,
The Nature of Environments, The Structure of Agents.
Unit – II
Unit – III
Unit – IV
Unit – V
Text Books :
(Elective-II)
Introduction to kernel- Architecture of the UNIX operating system, System Concepts, Data structures.
Buffer Cache: Buffer header, Structure of buffer pool, Reading and writing disk blocks. Files
INODES, Structure of a regular file, Directories, Super block, Inode assignment.
System calls- OPEN, READ, CLOSE, WRITE, CREATE, CHMOD, CHOWN, Pipes, Mounting and
Unmounting. Process Layout the system memory, context, process control, process creation, signals,
process scheduling, time, clock.
Windows Operating System- versions, concepts and tools, Windows internals, System architecture,
requirements and design goals, operating system model, architecture overview, key system
components. System mechanisms- Trap dispatching, object manager, synchronization, system worker
threads, windows global flags, local procedural calls, kernel event tracing.
Windows management mechanisms- the registry, registry usage, registry data types, local structure,
trouble shooting registry problems, registry internals, services, applications, accounts, service control
manager, windows management instrumentation, processes, threads and jobs: Process internals, flow
of create process, thread internals, examining thread creation, thread scheduling, job objects.
TEXT BOOKS:
1. Maurice J. Bach, The design of the UNIX operating system, Prentice hall of India,1991
2. Mark E. Russinovich and David A. Solomon, Microsoft Windows Internals, Microsoft Press,
2004.
REFERENCE BOOKS:
1. William Stallings, “Operating Systems: Internals and Design Principles”, 5th Edition,
Prentice Hall, 2005.
UNIT - I
UNIT - II
Multicore programming Model – Shared memory model, message passing model, transaction
model – OpenMP and MPI Programming. PowerPC architecture – RISC design, PowerPC
ISA, PowerPC Memory Management - Power 5 Multicore architecture design, Power 6
Architecture.
UNIT - III
Cell Broad band engine architecture, PPE (Power Processor Element), SPE (Synergistic
processing element), Cell Software Development Kit, Programming for Multicore
architecture.
UNIT - IV
PRAM Model – PRAM Algorithms – Parallel Reduction – Prefix Sums – List Ranking –
Preorder Tree Traversal – Merging Two Sorted Lists – Graph Coloring – Reducing Number
of Processors – NC Class. Classifying MIMD Algorithms – Hypercube SIMD Model –
Shuffle Exchange SIMD Model – 2D Mesh SIMD Model – UMA Multiprocessor Model –
Broadcase – Prefix Sums. Enumeration Sort – Lower Bound on Parallel Sorting – Odd-Even
Transposition Sort –Bitonic Merge – Parallel Quick Sort – Complexity of Parallel Search –
Searching on Multiprocessors.
UNIT - V
P-Depth Search – Breadth Death Search – Breadth First Search – Connected Components –
All pair Shortest Path – Single Source Shortest Path – Minimum Cost Spanning Tree. Matrix
Multiplication on 2-D Mesh, Hypercube and Shuffle Exchange SIMD Models – Algorithms
for Multiprocessors – Algorithms for Multicomputers – Mapping Data to Processors.
REFERENCES
1. Hennessey and Pateterson, “Computer Architecture A Quantitative Approach”,
Harcourt Asia, Morgan Kaufmann, 1999.
2. Joseph JaJa, “Introduction to Parallel Algorithms”, Addison-Wesley, 1992.
3. Kai Hwang, “Advanced Computer Architecture: Parallelism, Scalability and
Programmability” McGraw-Hill, 1993.
4. Richard Y. Kain, “Advanced Computer Architecture: A System Design Approach”,
PHI, 1999.
5. Rohit Chandra, Ramesh Menon, Leo Dagum, and David Kohr, “Parallel Programming
in OpenMP”, Morgan Kaufmann, 2000.
6. Michael J. Quinn, “Parallel Computing: Theory & Practice”, Tata McGraw Hill
Edition, 2003.
7. Ananth Grame, George Karpis, Vipin Kumar and Anshul Gupta, “Introduction to
8. Parallel Computing”, 2nd Edition, Addison Wesley, 2003.
JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY ANANTAPUR
2. Write C++ programs to implement the following using a singly linked list.
3. Write C++ programs to implement the deque (double ended queue) ADT using a
doubly linked list and an array.
5. Write C++ programs that use recursive functions to traverse the given
binary tree in
6. Write C++ programs that use non-recursive functions to traverse the given
binary tree in
7. Write C++ programs for the implementation of bfs and dfs for a given graph.
11. Write a C++ program to implement all the functions of a dictionary (ADT)
using hashing.
12. Write a C++ program for implementing Knuth-Morris- Pratt pattern matching
algorithm.
References::
1. Data Structures and Algorithms Using C++ by Ananda Rao Akepogu and Radhika Raju
Palagiri, Pearson Education, 2010.
2. Classic Data Structures by D. Samanta, 2005, PHI
3. Data Structures and Algorithms by G.A.V. Pai, 2009, TMH.
4. Design and Analysis of Computer Algorithms by Aho, Hopcraft, Ullman 1998, PEA.
5. Introduction to the Design and Analysis of Algorithms by Goodman, Hedetniemi, TMG
6. Design and Analysis of Algorithms by E. Horowitz, S. Sahani, 3rd Edition, Galgotia.
7. Data Structures and Algorithms in C++ by Drozdek 2nd Edition, Thomson.
8. Fundamentals of Computer Algorithms by Ellis Horowitz, Sartaj Sahni and Sanguthevar
Rajasekaran, 2nd edition, University Press
JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY ANANTAPUR
Introduction to Data Types (Why Data Structures?, Types of Data Structures in R),
Vectors, Matrices, Arrays, Lists, Factors, Data Frames, Importing and Exporting
Data.
3. Implement the Graphical Analysis using R
Creating a simple graph (Using plot() command), Modifying the points and lines of a
graph (Using type, pch, font, cex, lty, lwd, col arguments in plot() command),
Modifying Title and Subtitle of graph (Using main, sub, col.main, col.sub, cex.main,
cex.sub, font.main, font.sub arguments in plot() command), Modifying Axes of a
Graph (Using xlab, ylab, col.lab, cex.lab, font.lab, xlim, ylim, col.axis, cex.axis,
font.axis arguments and axis() command), Adding Additional Elements to a Graph
(Using points(), text(), abline(), curve() commands), Adding Legend on a Graph
(Using legend() command), Special Graphs (Using pie(), barplot(), hist() commands),
Multiple Plots (Using mfrow or mfcol arguments in par() command and layout
command).
4. Implement the Descriptive Statistics using R.
5. In memory Data Analytics: Window and text functions in SQL; Advanced SQL
functions
6. MongoDB: Installation of MongoDB, Features of MongoDB: CRUD operations;
import and export functions, indexes, aggregate functions, dealing with Nulls, count,
limit, skip and sort functions and cursors
7. Experiments on Hive and Pig
Data Wrangling using R
Open refine tool for handling messy data
JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY ANANTAPUR
Course Objectives:
Construct UML diagrams for static view and dynamic view of the system.
Course Outcomes:
1. Identify the application where you can use single pattern and implement it.
6. User gives a print command from a word document. Design to represent this chain of
7. User gives a print command from a word document. Design to represent this
it.
9. Identify the application where you can use multiple structural patterns and implement
it.
10. Identify the application where you can use multiple behavioral patterns and
implement it.
11. Identify the application where you can use architectural patterns and implement it.
References:
Course objectives:
• Study the significance of testing
• Study the testing to be done at various levels
• Understand the procedure for designing test cases
Course Outcomes:
• Ability to systematically test the applications
• Ability to write the test cases
• Ability to use testing tools effectively
UNIT I
Control flow graph – basic blocks, flow graphs, paths, basic paths, path conditions and
domains, Dominators and post-dominators; Program dependence graph – data dependence,
control dependence, call graph,
Tests generation - Test selection Problem, equivalence partitioning, Equivalence class
partitioning, boundary value analysis and category partitioning method.
UNIT II
Finite state machines (FSM) - properties of FSM, Conformance testing, test generation, test
optimization, Fault detection. Combinatorial designs – combinatorial test design process.
Pairwise design: Binary factors and multi-valued factors. Orthogonal arrays and multi level
orthogonal arrays.
UNIT III
Test Adequacy: Basics, measurement of test adequacy, infeasibility and test adequacy.
Adequacy criteria based control – statement, block, conditions and decisions coverage
techniques. Basics of Junit tool for Java.
Metrics
Importance of Metrics in Testing - Effectiveness of Testing – Defect Density – Defect
Leakage Ratio – Residual Defect Density – Test Team Efficiency – Test Case Efficiency.
UNIT IV
Regression Testing
What is Regression Testing? Regression test process. Regression test selection techniques:
Test all, Random selection, modification traversing tests, using execution trace. Test
minimization and prioritization.
UNIT V
Non-functional testing
Load testing, performance testing, GUI testing, Security testing techniques and tools.
Automation: Case studies functional test automation using Selenium.
Text Books:
1. Aditya P Mathur, Foundations of software testing, 2nd edition, Pearson , 2013.
2. Boris Beizer, “Software Testing Techniques”, 2nd Edition, Dream tech press, 2003.
Reference Books:
1. M G Limaye, “Software Testing – Principles, Techniques and Tools”, Tata McGraw
Hill, 2009.
2. Edward Kit, “Software Testing in the Real World - Improving the Process”, Pearson
Education, 2004.
3. William E. Perry, “Effective methods for software testing”, 2nd Edition, John Wiley,
2000.
JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY ANANTAPUR
Objectives:
Outcomes:
• Analyze the big data analytics techniques for useful business application.
• Design efficient algorithms for mining the data from large volumes.
• Analyze the HADOOP and Map Reduce technologies associated with big data
analytics.
UNIT-I
UNIT- II
Hadoop
UNIT – IV
Hadoop Environment
Setting up a Hadoop Cluster – Cluster specification – Cluster Setup and Installation –Hadoop
Configuration – Security in Hadoop – Administering Hadoop – HDFS – Monitoring –
Maintence – Hadoop Benchmarks – Hadoop in the Cloud.
UNIT –V
Frameworks
Applications on Big Data Using Pig and Hive – Data Processing operators in Pig – Hive
Services – HiveQL – Querying Data in Hive – fundamentals of HBase and Zookeeper – IBM
Info Sphere Big Insights and Streams. Visualization - Visual data analysis techniques,
interaction techniques; Systems and applications.
Text Books:
Reference Books:
1. Bill Franks, Taming the big Data tidal Wave: Finding Opportunities in Huge Data
Streams with Advanced Analytics, John Wiley & sons, 2012.
2. Glenn J. Myatt, Making Sense of Data , John Wiley & Sons, 2007 Pete Warden,
Big Data Glossary, O’Reilly, 2011.
3. Jiawei Han, MichelineKamber, Data Mining Concepts and Techniques, Second
Edition.
4. Elsevier, Reprinted 2008. Da Ruan, Guoquing Chen, Etienne E.Kerre, Geert Wets,
Intelligent Data Mining, Springer, 2007.
5. Paul Zikopoulos, Dirk deRoos, Krishnan Parasuraman, Thomas Deutsch, James
Giles, David Corrigan, Harness the Power of Big Data the IBM Big Data
Platform, Tata McGraw Hill Publications, 2012.
6. Michael Minelli (Author), Michele Chambers (Author), AmbigaDhirraj (Author),
Big Data, BigSnalytics.
JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY ANANTAPUR
Objectives:
• To understand fundamentals of android operating systems.
• Illustrate the various components, layouts and views in creating android applications
• To understand fundamentals of android programming.
Out comes:
• Create data sharing with different applications and sending and intercepting SMS.
• Develop applications using services and publishing android applications.
• To demonstrate their skills of using Android software development tools
Unit 1:
Introduction to Layouts, Linear Layout, Relative Layout, Absolute Layout, Using Image
View, Frame Layout, Table Layout, Grid Layout, Adapting to Screen orientation.
Utilizing Resources and Media Resources, Creating Values Resources, Using Drawable
Resources, Switching States with Toggle Buttons, Creating an Images Switcher Application,
Scrolling Through Scroll View, playing Audio, Playing Video, Displaying Progress with
Progress Bar, Using Assets
Using List View, Using the Spinner control, Using the GridView Control, Creating an Image
Gallery Using the ViewPager Control, Using the Debugging Tool: Dalvik Debug Monitor
Service(DDMS), Debugging Application, Using the Debug Perspective.
Displaying And Fetching Information Using Dialogs and Fragments: What Are Dialogs?,
Selecting the Date and Time in One Application, Fragments, Creating Fragments with java
Code, Creating Special Fragments
Unit 4: Building Menus:Creating Interface Menus and Action Bars, Menus and Their Types,
Creating Menus Through XML, Creating Menus Through Coding, Applying a Context Menu
to a List View, Using the Action Bar, Replacing a Menu with the Action Bar, Creating a
Tabbed Action Bar, Creating a Drop-Down List Action Bar
Using the SQLiteOpenHelperclasss, Accessing Databases with the ADB, Creating a Data
Entry Form.
Understanding Broadcast Receivers, Using the Notification System, Sending SMS Messages
with Java Code, Receiving SMS Messages, Sending Email, Working With Telephony
Manager.
Text Books
1. Android Programming by B.M Harwani, Pearson Education, 2013.
1. Android application Development for Java Programmers, James C Sheusi, Cengage Learning
2. Android In Action by w.Frank Ableson, Robi Sen, Chris King, C. Enrique Ortiz., Dreamtech.
3. Professional Android 4 applications development, Reto Meier, Wiley India, 2012.
4. Beginning Android 4 applications development, Wei- Meng Lee, Wiley India,2013
5. PawPrints Learning Technologies, Beginning Android Development: Create Your Own
Android Apps Today, 2014.
6. Erik Hellman, Android Programming: Pushing the Limits, John Wiley and sons ltd, 2014.
7. Neil Smyth, Android Studio Development Essentials.
8. Joseph Annuzzi,Jr, Lauren Darcey, Introduction to Android Application Development,
Addison-Wesley, Fourth Edition.
JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY ANANTAPUR
Objectives
• Makes clear view over physical computing, ubiquitous computing, or the Internet of Things,
it's a hot topic in technology.
• It discusses design concepts that will make IOT products eye-catching and appealing.
Outcomes
• Ability to combine sensors, servos, robotics, Arduino chips, and more with various or the
Internet, to create interactive, cutting-edge devices.
• Better idea of the overview of necessary steps to take the idea of IOT concept through
production.
UNIT 1
UNIT 2
UNIT 3
UNIT 4
Text Books:
• Broad and detailed coverage of the theory is balanced with practical systems-related issues
such as mutual exclusion, deadlock detection, authentication, and failure recovery.
• Gives clear understanding of the fundamental principles and models underlying the theory,
algorithms and systems aspects of distributed computing.
Outcomes
• Provides solid understanding of the design problems and the theoretical and practical aspects
of their solutions.
• Simple explanations and illustrations are used to elucidate the algorithms.
Unit 1
Unit 2
Global state and snapshot recording algorithms - System model and definitions - Snapshot
algorithms for FIFO channels - Variations of the Chandy–Lamport algorithm - Snapshot
algorithms for non-FIFO channels - Snapshots in a causal delivery system - Monitoring
global state - Terminology and basic algorithms - Topology abstraction and overlays -
Classifications and basic concepts - Complexity measures and metrics.
Unit 3
Unit 5
Text Book
Course Objectives:
• Extensive, thorough and significant understanding of the concepts, issues, principles
and theories of computer network security
• Identifying the suitable points for applying security features for network traffic
• Understanding the various cryptographic algorithms and implementation of the same
at software level
• Understanding the various attacks, security mechanisms and services
Course Outcomes:
• Protect the network from both internal and external attacks
• Design of new security approaches
• Ability to choose the appropriate security algorithm based on the requirements.
UNIT I
Computer Security Concepts, The OSI Security Architecture, Security Attacks, Security
Services And Security Mechanisms, Classical Encryption Techniques- Symmetric Cipher
Model, Substitution Ciphers, Transposition Ciphers, Steganography, Modern Block Ciphers,
Modern Stream Ciphers.
Modern Block Ciphers: Block Ciphers Principles, Data Encryption Standard (DES), Linear
And Differential Cryptanalysis, Block Cipher Modes Of Operations, AES.
UNIT II
Public-Key Cryptography :Principles Of Public-Key Cryptography, RSA Algorithm,
Diffie-Hellman Key Exchange, Elgamal Cryptographic System, Elliptic Curve Arithmetic,
Elliptic Curve Cryptography
Cryptographic Hash Functions: Applications Of Cryptographic Hash Functions,
Requirements And Security, Hash Functions Based On Cipher Block Chaining, Secure Hash
Algorithm (SHA).
UNIT III
Message Authentication Codes: Message Authentication Requirements, Message
Authentication Functions, Requirements For Message Authentication Codes, Security Of
Macs, HMAC, Macs Based On Block Ciphers, Authenticated Encryption.
Digital Signatures and Authentication Protocols: Digital Signatures, Authentication Protocols.
UNIT IV
Key Management And Distribution: Symmetric Key Distribution Using Symmetric
Encryption, Symmetric Key Distribution Using Asymmetric, Distribution Of Public Keys,
X.509 Certificates, Public Key Infrastructure.
Electronic Mail Security: Pretty Good Privacy (PGP), S/MIME
UNIT V
Security At The Transport Layer(SSL And TLS) : SSL Architecture, Four Protocols, SSL
Message Formats, Transport Layer Security, HTTPS, SSH
Security At The Network Layer (Ipsec): Two Modes, Two Security Protocols, Security
Association, Security Policy, Internet Key Exchange.
Text Books :
1. Cryptography and Network Security: Principals and Practice, William Stallings, Fifth
Edition, Pearson Education.
2. Cryptography and Network Security, Behrouz A. Frouzan and Debdeep
Mukhopadhyay, 2nd edition, Mc Graw Hill Education
Reference Books :
1. Network Security and Cryptography, Bernard Menezes , Cengage Learning.
2. Cryptography and Security, C.K. Shymala, N. Harini and Dr. T.R. Padmanabhan,
Wiley-India.
3. Applied Cryptography, Bruce Schiener, 2nd edition, John Wiley & Sons.
4. Cryptography and Network Security, Atul Kahate, TMH.
5. Introduction to Cryptography, Buchmann, Springer.
6. Number Theory in the Spirit of Ramanujan, Bruce C.Berndt, University Press
7. Introduction to Analytic Number Theory, Tom M.Apostol, University Press
JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY ANANTAPUR
Course Objectives:
• Understand the basic difference between traditional relational databases and NoSQL
• Explore the fundamentals of NoSQL Databases
• Understanding the storage architecture
• Learn various NoSQL systems and their features
• To understand variety of NoSQL database tools
Course Outcomes:
Students who complete this course will be able to
• Examine issues on data storing , accessing from MongoDB, Redis, HBase and query
processing and can develop suitable solutions.
• Able to apply the features of NoSQL tand analyze the datasets
• Compare and Contrast NoSQL databases with Relational Database Systems
• Critically analyze and evaluate variety of NoSQL databases
• Able to design and implement advanced queries using MangoDB, Redis, and HBase
UNIT I:
NOSQL: WHAT IT IS AND WHY YOU NEED IT: Big Data ,Scalability, Sorted Ordered
Column-Oriented Stores: Key/Value Stores, Document Databases Graph Databases
Examples,
INTERFACING AND INTERACTING WITH NOSQL: Storing and Accessing Data,
Storing Data In and Accessing Data from MongoDB, Querying MongoDB, Storing Data In
and Accessing Data from Redis Querying Redis, Storing Data In and Accessing Data from
HBase, Querying HBase Storing Data In and Accessing Data from Apache Cassandra,
Querying Apache Cassandra,
UNIT II:
Language Bindings for NoSQL Data Stores:Language Bindings for Java Language
Bindings for Python, Language Bindings for Ruby, Language Bindings for PHP
UNDERSTANDING THE STORAGE ARCHITECTURE: Working with Column-
Oriented Databases, Contrasting Column Databases with RDBMS, Column Databases as
Nested Maps of Key/Value Pairs, Laying out the Web table, HBase Distributed Storage
Architecture Document Store Internals , Storing Data in Memory-Mapped Files, Guidelines
for Using Collections and Indexes in MongoDB, MongoDB Reliability and Durability
,Horizontal Scaling, Understanding Key/Value Stores in Memcached and Redis Under the
Hood of Memcached Redis Internals , Eventually Consistent Non-relational Databases
Consistent Hashing Object Versioning, Gossip-Based Membership and Hinted Handoff
UNIT III:
PERFORMING CRUD OPERATIONS: Creating Records, Creating Records in a
Document-Centric Database, Using the Create Operation in Column-Oriented Databases,
Using the Create Operation in Key/Value Maps Accessing Data, Accessing Documents from
MongoDB, Accessing Data from HBase, Querying Redis, Updating and Deleting Data ,
Updating and Modifying Data in MongoDB, HBase, and Redis, Limited Atomicity and
Transactional Integrity
QUERYING NOSQL STORES: Similarities between SQL and MongoDB Query Features,
Map Reduce in MongoDB, Accessing Data from Column-Oriented Databases like HBase,
Querying Redis Data Stores, Changing Document Databases, Schema-less Flexibility,
Exporting and Importing Data from and into MongoDB, Schema Evolution in Column-
Oriented Databases, HBase Data Import and Export, Data Evolution in Key/Value Stores
UNIT IV:
INDEXING AND ORDERING DATA SETS: Essential Concepts Behind a Database
Index, Indexing and Ordering in MongoDB, Creating and Using Indexes in MongoDB,
Indexing and Ordering in CouchDB, Indexing in Apache Cassandra.
MANAGING TRANSACTIONS AND DATA INTEGRITY: RDBMS and ACID,
Upholding CAP, Consistency Implementations in a Few NoSQL Products
UNIT V:
USING NOSQL IN THE CLOUD: Google App Engine Data Store, Amazon SimpleDB
SCALABLE PARALLEL PROCESSING WITH MAP REDUCE: Understanding
MapReduce, MapReduce with Hbase, MapReduce Possibilities and Apache Mahout.
ANALYZING BIG DATA WITH HIVE: Hive Basics, Back to Movie Ratings, Good Old
SQL, JOIN(s) in Hive QL,
SPEECH ENHACEMENT: Nature of inter fearing sounds, Speech enhancement
techniques, Spectral subtraction, Enhancement by re-synthesis.
TEXT BOOKS:
1. Sashank Thiwari, Professional NoSQL, Wiley- August 2011
REFERENCE BOOKS:
1. Dan MC Creary and Ann Kelly, Making Sense of NoSQL: A guide for Managers and
the Rest of Us, Dreamtech Press, 2013
2. David Hows, Peter Membrey, Eelco Plugge, Tim Hawkins, The Definitive Guide: A
Complete Guide to Dealing with Big Data Using MongoDB to MongoDB, Second
Edition, Apress, 2013.
3. Guy Harrison, Next Generation Databases: NoSQL, NewSQL, and Big Data, Apress,
2015.
4. Adam Fowler, “Nosql for Dummies”, Wiley.
Objectives:
Course Outcomes:
UNIT I INTRODUCTION
Learning Problems – Perspectives and Issues – Concept Learning – Version Spaces and
Candidate Eliminations – Inductive bias – Decision Tree learning – Representation –
Algorithm – Heuristic Space Search.
Learning Sets of Rules – Sequential Covering Algorithm – Learning Rule Set – First Order
Rules – Sets of First Order Rules – Induction on Inverted Deduction – Inverting Resolution –
Analytical Learning – Perfect Domain Theories – Explanation Base Learning – FOCL
Algorithm – Reinforcement Learning – Task – Q-Learning – Temporal Difference Learning
TEXT BOOKS:
REFERENCE BOOKS
Objectives
Outcomes
UNIT-I
Introduction to cloud computing – The Evolution of cloud computing – Hardware Evolution-
Internet Software Evolution – Server Virtualization – Web Services Deliver from the cloud–
Communication-as-a-service–Infrastructure-as-a-service–Monitoring-as-a-service–Platform-
as-a-Service - Software-as-a-service – Building Cloud Network.
UNIT-II
Federation in the cloud – presence in the cloud – Privacy and its Relation to cloud-Based
Information Systems– Security in the cloud – Common Standards in the cloud-End-User
Access to the cloud Computing.
UNIT-III
UNIT-IV
Software Utility Application Architecture – Characteristics of a SaaS – Software Utility
Applications – Cost Versus Value – Software Application Services Framework – Common
Enablers – Conceptual view to Reality – Business profits – Implementing Database System
for Multitenant Architecture.
UNIT-V
Other Design Consideration – Design of a Web Services Metering Interface – Application
Monitoring Implementation – A Design for an update and Notification Policy – Transforming
to Software as a Service – Application Transformation Program – Business Model Scenarios
– Virtual Services for Organizations – The Future.
Text Books:
1. Guy Bunker and Darren Thomson, Delivering utiliy Computing, John Wiley & Sons
Ltd, 2012.
References Books:
Elective-IV
Course Objectives:
• To learn the changing nature of software and need for change management.
Course Outcomes:
• Establishing & maintaining integrity of these items and providing accurate status of
items to relevant stakeholders (like developers, end users, and customers) throughout
the Software Development Lifecycle.
UNIT I
SCM: Concepts and definitions – SCM Plan – Software development life cycle models –
SDLC Phases – Need and importance of Software configuration management – Increased
complexity and demand – Changing nature of software and need for change management –
Lower maintenance costs and better quality assurance – Faster problem identification and bug
fixes - SCM: Basic concepts – Baselines – Check-in and Check-out- Versions and Variants –
System Building – Releases.
UNIT II
UNIT III
When, what and who of auditing - Functional Configuration audit – Physical Configuration
audit – Auditing the SCM System – Role of SCM Team in configuration audits – SCM plan
and the incremental approach – SCM Plan and SCM Tools – SCM Organization.
UNIT IV
Advantages of SCM tools – Reasons for the increasing popularity of SCM tools – SCM Tools
and SCM Functions – SCM tool selection – Role of Technology –Selection criteria – Tool
implementation – SCM implementation plan –implementation strategy – SCM
Implementation team.
UNIT V
SCM in different scenarios – SCM and project size – SCM in integrated development
environments – SCM In distributed environments – SCM and CASE Tools - Trends in SCM -
Hardware and Software Management – Better integration with IDE’S and CASE
environments – Customization – Better decision making capabilities – Reduction in SCM
Team size – Market snapshot.
REFERENCES
3. Robert Aiello and Leslie Sachs Configuration Management Best Practices: Practical
Methods that work in Real World, , Addison-Wesley Professional; 1 edition, 2010.
Objectives
Upon completion, students will be able to explain and apply fundamental algorithms and techniques
in the area of natural language processing (NLP). In particular, students will:
Outcomes:
• Apply fundamental algorithms and techniques in the area of natural language
processing (NLP)
• Describe approaches to syntax and semantics in NLP.
UNIT – I
UNIT II
UNIT III
Introduction to Machine Translation: History, Rule Based MT, Direct Transfer &
INTERLINGUA Approaches, MT Evaluation.
UNIT IV
Statistical MT: Parallel Corpus and Alignment, Lexical Translation Model, Decoding
Algorithms.
UNIT V
Reference Books:
2. Bharati A., Sangal R., Chaitanya V.. Natural language processing: a Paninian
perspective, PHI, 2000
3. Siddiqui T., Tiwary U. S.. Natural language processing and Information retrieval,
OUP, 2008
JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY ANANTAPUR
Course Objectives:
To learn to use the following (or Similar) automated testing tools to automate testing:
Course Outcomes:
• Test the software applications using standard tools available in the market
2. A program written in C language for Matrix Multiplication fails. Introspect the causes
for its failure and write down the possible reasons for its failure.
3. Consider ATM System and Study its system specifications and report the various
bugs.
Understand the Automation Testing Approach, Benefits, Workflow, Commands and Perform
References:
2. Edward Kit, “Software Testing in the Real World - Improving the Process”, Pearson
Education, 2004.
3. William E. Perry, “Effective methods for software testing”, 2nd Edition, John Wiley,
2000.
JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY ANANTAPUR
Objectives:
1. Getting familiar with Hadoop distributions, configure Hadoop and perform File
Management Tasks
2. To understand Map Reduce in Hadoop works
3. To implement Map Reduce programs
4. Understanding Map Reduce support for debugging
5. Understanding new approaches for building Hadoop Map Reduce programs for real-time
applications
Outcomes:
1. Configure Hadoop and perform File Management Tasks
2. Applying Map Reduce programs to real time issues like word count, weather dataset and
sales of a company
3. Critically analyze huge data set using hadoop distributed file systems and mapreduce
programs
8. Write a map reduce program to find the number of products sold in each
country by considering sales data containing fields like
Transaction_ Payment_ Account_ Last_
Product Price Name City State Country Latitude Longitude
date Type Created Login
9. Write a map reduce program to find the tags associated with each movie by
analyzing movielens data?
10. XYZ.com is an online music website where users listen to various tracks,
the data gets collected like shown below.
The data is coming in log files and looks like as shown below.
UserId | TrackId | Shared | Radio |
Skip
111115 | 222 | 0 | 1 |0
111113 | 225 | 1 | 0 |0
111117 | 223 | 0 | 1 |1
111115 | 225 | 1 | 0 |0
Write a map reduce program to get the following
• Number of unique listeners
• Number of times the track was shared with others
• Number of times the track was listened to on the radio
• Number of times the track was listened to in total
• Number of times the track was skipped on the radio
11. Write a map reduce program to find the frequency of books published each
year and find in which year maximum number of books were published using
the following data?
Title Author Published year Author country Language No of pages
12. Write a map reduce program to analyze Titanic data and to find
The average age of the people (both male and female) who died in the
tragedy
How many persons survived – traveling class wise.
The titanic data will be..
Column 1 : PassengerId Column 2 : Survived (survived=0 &
died=1)
Column 3 : Pclass Column 4 : Name Column 5 : Sex
13. Write a map reduce program to analyze Uber data set to find the days on
which each basement has more trips using the following dataset
The Uber dataset consists of four columns they are
dispatching_base_number, date, active_vehicles and trips.
Reference:
Course Objective:
• In this lab, a student is expected to design, implement, document and present a mobile
client/server system using standard Java and Java 2 Micro Edition (J2ME) platform.
• MC will be written in J2ME, MIDP 2.0, while PS will be written in standard Java. It is
necessary to use a mobile phone emulator to develop and demonstrate the experiments.
• It may be necessary to use other components or existing resources (servers) as needed.
For instance a database local to PS or a web service available on the Internet that can
be invoked by the PS.
Course Outcomes:
1. Design and develop an Mobile App for smart phones The Easy Unit Converter using
Android. This application should have approximately 20 categories to be used in your
daily life. It includes following units: Acceleration, Angle, Area, Circle, Capacitor,
Cooking, Data Size, Density, Data Transfer rate, Electric Current, Energy, Flow Rate,
and Force.
2. Design and develop an Mobile App for smart phones Currency Converter. .This
applications should synchronize online as you run it and sends you back the latest and
most reliable exchange rates possible.
This application should support following conversions:
EUR->Euro
GBP->British Pound
USD->United States Dollar
AUD->Australian Dollar
CAD->Canadian Dollar
CHF->Swiss Franc
CNY->Chinese Yuan
HKD->Hong Kong Dollar
IDR->Indonesian Rupiah
INR->Indian Rupee
JPY->Japanese Yen
THB->Thai Bah
3. Design and develop an Mobile App game for smart phones The Tic Tac Toe using
Android.
4. Design and develop an Mobile App for smart phones ,The Health Monitoring System
using Android. This App should record Biochemistry Lab Parameters and if abnormal
shold send an SMS to doctor for Medications.
5. Design and develop an Mobile App for smart phones The Expense Manager using
Android. This is an application for managing your expenses and incomes: Tracking
expenses and incomes by week, month and year as well as by categories, Multiple
accounts in multiple currencies, Schedule the payments and recurring payments, Take
a picture of receipt, Payment alerts, Budget by day, week, month and year, Search and
reports, Import and export account activities in CSV for desktop software, Customize
expense categories, payer/payer, payment methods, date format, white or black
background, button style etc, Account transfer, Convenient tools such calculator,
currency converter, tip calculator, sales and tax calculator and credit card calculator.
References:
*****