Internet of Things 2024
Internet of Things 2024
REGULATION
BACHELOR OF TECHNOLOGY
CSE (Internet of Things)
COURSE STRUCTURE & SYLLABUS (R22)
(Batches admitted from the academic year 2022 - 2023)
Department of
COMPUTER SCIENCE & ENGINEERING
(EMERGING TECHNOLOGIES-IOT)
Updated Version: R22/V-2/22.07.2023
M R C E T CAMPUS
(Autonomous Institution – UGC, Govt. of India)
(Affiliated to JNTU, Hyderabad, Approved by AICTE - Accredited by NBA & NAAC – ‗A‘ Grade - ISO 9001:2015 Certified)
Maisammaguda, Dhulapally (Post Via. Kompally), Secunderabad – 500100, Telangana State, India.
Contact Number: 040-23792146/64634237, E-Mail ID: [email protected], website: www.mrcet.ac.in
Note: The regulations here under are subject to amendments as may be made by the
Academic Council of the College from time to time. Any or all such amendments will be
effective from such date and to such batches of candidates (including those already pursuing
the program) as may be decided by the Academic Council.
Academic Autonomy -‖means freedom to the College in all aspects of conducting its academic
programs, granted by the University for promoting excellence.
College – means Malla Reddy College of Engineering & Technology, Secunderabad unless
indicated otherwise by the context.
Program - means:
Bachelor of Technology (B.Tech) degree program
UG Degree Program: B.Tech
Branch means specialization in a program like B.Tech degree program in Computer Science
and Engineering, B.Tech degree program in Electronics & Communication Engineering etc.
Course or Subject means a theory or practical subject, identified by its course–number and
course-title, which is normally studied in a semester.
FOREWORD
The autonomy is conferred on Malla Reddy College of Engineering & Technology (MRCET) by
UGCbased on its performance as well as future commitment and competency to impart quality
education. It is a mark of its ability to function independently in accordance with the set norms
of the monitoring bodies like UGC and AICTE. It reflects the confidence of the UGC in the
autonomous institution to uphold and maintain standards it expects to deliver on its own
behalf and thus awards degrees on behalf of the college. Thus, an autonomous institution is
given the freedom to have its own curriculum, examination system and monitoring
mechanism, independent of the affiliating University but under its observance.
Malla Reddy College of Engineering & Technology (MRCET CAMPUS) is proud to win the
credence of all the above bodies monitoring the quality of education and has gladly accepted
the responsibility of sustaining, and also improving upon the values and beliefs for which it has
been striving for more than a decade in reaching its present standing in the arena of
contemporary technical education. As a follow up, statutory bodies like Academic Council and
Boards of Studiesare constituted with the guidance of the Governing Body of the College and
recommendations of the JNTU Hyderabad to frame the regulations, course structure and
syllabi under autonomous status.
The autonomous regulations, course structure and syllabi have been prepared after prolonged
and detailed interaction with several experts drawn from academics, industry and research, in
accordance with the vision and mission of the college which reflects the mindset of the
institutionin order to produce quality engineering graduates to the society.
All the faculty, parents and students are requested to go through all the rules and regulations
carefully. Any clarifications, if needed, are to be sought at appropriate time with principal of
the college, without presumptions, to avoid unwanted subsequent inconveniences and
embarrassments. The cooperation of all the stakeholders is sought for the successful
implementation of the autonomous system in the larger interests of the institution and
brighter prospects of engineering graduates.
PRINCIPAL
QUALITY POLICY
To pursue continual improvement of teaching learning process of
Undergraduate and Post Graduate programs in Engineering &
Management vigorously.
To provide state of art infrastructure and expertise to impart the quality
education and research environment to students for a complete
learning experiences.
Developing students with a disciplined and integrated personality
To offer quality relevant and cost effective programmes to produce
engineers as per requirements of the industry need.
IOT
COURSE STRUCTURE (R22)
(Batches admitted from the academic year 2022 - 2023)
MAX. MARKS
S.No Subject Code SUBJECT L T P C
INT EXT
1 R22A0503 Data Structures 3 0 0 3 40 60
2 R22A0504 Database Management Systems 3 0 0 3 40 60
3 R22A1261 Computer Organization & Architecture 3 1 0 4 40 60
4 R22A0509 Operating Systems 3 0 0 3 40 60
5 R22A0026 Probability, Statistics and Queuing Theory 3 1 0 4 40 60
6 R22A0583 Data Structures Lab 0 0 2 1 40 60
7 R22A0584 Database Management Systems Lab 0 0 2 1 40 60
8 R22A0587 Operating Systems Lab 0 0 2 1 40 60
9 *R22A0005 Foreign Language: French* 2 0 0 0 100 -
Total 17 2 6 20 420 480
*Mandatory course: Non-credit course, 50% of scoring is required for the award of the degree
MAX. MARKS
S.No Subject Code SUBJECT L T P C
INT EXT
1 R22A0507 Object Oriented Programming through Java 3 0 0 3 40 60
2 R22A0505 Software Engineering 3 0 0 3 40 60
3 R22A0028 Discrete Mathematics 3 0 0 3 40 60
4 R22A0506 Design and Analysis of Algorithms 3 1 0 4 40 60
5 R22A6902 Sensors and Devices 3 0 0 3 40 60
6 R22A6981 Sensors and Devices Lab 0 0 2 1 40 60
7 R22A0586 Object Oriented Programming through Java Lab 0 0 2 1 40 60
8 R22A6991 Industry Oriented Project 0 0 4 2 40 60
9 R22A0061 Public Policy and Governance* 2 0 0 0 40 60
Total 17 1 8 20 360 540
*Mandatory course: Non-credit course, 50% of scoring is required for the award of the degree
MAX. MARKS
S.No Subject Code SUBJECT L T P C
INT EXT
1 R22A0409 Microprocessors and Microcontrollers 3 0 0 3 40 60
2 R22A6601 Artificial Intelligence 3 0 0 3 40 60
3 R22A1207 Automata Theory and Compiler Design 3 0 0 3 40 60
4 Open Elective-I 3 0 0 3 40 60
Professional Elective-I
R22A0512 1. Computer Networks
5 R22A6201 2. Cyber Security Essentials 3 0 0 3 40 60
R22A0566 3. Web Programming
R22A6615 4. Human Computer Interaction
6 R22A0488 Microprocessors and Microcontrollers Lab 0 0 2 1 40 60
7 R22A6683 Artificial Intelligence Lab 0 0 2 1 40 60
8 R22A6992 Application Development –I 0 0 4 2 40 60
9 R22A0084 Professional Development Skills – I 0 0 2 1 40 60
Total 15 0 10 20 360 540
MAX. MARKS
S.No Subject Code SUBJECT L T P C
INT EXT
1 R22A6703 Data Analytics 3 0 0 3 40 60
2 R22A6602 Machine Learning 3 0 0 3 40 60
3 R22A6903 IoT System Architecture 3 0 0 3 40 60
4 Open Elective –II 3 0 0 3 40 60
Professional Elective-II
R22A1206 1. Mobile Application Development
5 R22A0514 2. Distributed Systems 3 0 0 3 40 60
R22A6904 3. Industrial IoT
R22A6701 4. Data Science and It’s Applications
6 R22A6982 Data Analytics Lab 0 0 2 1 40 60
7 R22A6681 Machine Learning Lab 0 0 2 1 40 60
8 R22A6993 Application Development –II 0 0 4 2 40 60
9 R22A0085 Professional Development Skills – II 0 0 2 1 40 60
Total 15 0 10 20 360 540
MAX. MARKS
S.No Subject Code SUBJECT L T P C
INT EXT
1 R22A0513 Full Stack Development 3 0 0 3 40 60
2 R22A6208 IoT Security & Privacy 3 0 0 3 40 60
3 R22A0520 Cloud Computing 3 1 0 4 40 60
Professional Elective-III:
R22A6621 1. Generative AI
4 R22A6214 2. Database Security 3 0 0 3 40 60
R22A6613 3. Computer Vision
R22A6203 4. Ethical Hacking
Professional Elective-IV:
R22A6907 1. IoT Automation
5 R22A0524 2. Blockchain Technology 3 0 0 3 40 60
R22A6905 3. Architecting Smart IoT Devices
R22A0523 4. DevOps
6 R22A0589 Full Stack Development Lab 0 0 2 1 40 60
7 R22A6994 Project Development (Phase-I) 0 0 6 3 40 60
Total 15 1 8 20 280 420
MAX. MARKS
S.No Subject Code SUBJECT L T P C
INT EXT
1 R22A0334 Innovation, Start-Up & Entrepreneurship 4 0 0 4 40 60
Professional Elective-V:
R22A6906 1. Programming Languages for IoT
2 R22A0530 2. Edge Computing 3 0 0 3 40 60
R22A6614 3. Expert Systems
R22A0528 4. Quantum Computing
Professional Elective-VI:
R22A6908 1. Smart Sensors Technologies
3 R22A0517 2. Augmented Reality & Virtual Reality 3 0 0 3 40 60
R22A0567 3. Wireless Networks
R22A6909 4. 5G and IoT Technologies
4 R22A6995 Project Development (Phase-II) 0 0 20 10 80 120
Total 10 0 20 20 200 300
OPEN ELECTIVE – II
SYLLABUS
(Batches admitted from the academic year 2022 - 2023)
Internet of
Things (IoT)
II Year B.Tech (R22)
SYLLABUS
(Batches admitted from the academic year 2022 - 2023)
MAX. MARKS
S.No Subject Code SUBJECT L T P C
INT EXT
1 R22A0503 Data Structures 3 0 0 3 40 60
2 R22A0504 Database Management Systems 3 0 0 3 40 60
3 R22A1261 Computer Organization & Architecture 3 1 0 4 40 60
4 R22A0509 Operating Systems 3 0 0 3 40 60
5 R22A0026 Probability, Statistics and Queueing Theory 3 1 0 4 40 60
6 R22A0583 Data Structures Lab 0 0 2 1 40 60
7 R22A0584 Database Management Systems Lab 0 0 2 1 40 60
8 R22A0587 Operating Systems Lab 0 0 2 1 40 60
9 *R22A0005 Foreign Language: French 2 0 0 0 100 -
Total 17 2 6 20 420 480
COURSE OBJECTIVES:
UNIT – II
Data Structures – Definition, Linear Data Structures, Non-Linear Data
Structures, Python Specific Data Structures, List, Tuples, Set, Dictionaries,
Comprehensions and its Types, Strings, slicing.
UNIT - III
Arrays - Overview, Types of Arrays, Operations on Arrays, Arrays vs List.
Searching - Linear Search and Binary Search.
Sorting - Bubble Sort, Selection Sort, Insertion Sort, Merge Sort, Quick Sort.
UNIT - IV
Linked Lists – Implementation of Singly Linked Lists, Doubly Linked Lists,
Circular Linked Lists.
Stacks - Overview of Stack, Implementation of Stack (List & Linked list),
Applications of Stack
Queues: Overview of Queue, Implementation of Queue(List & Linked list),
Applications of Queues, Priority Queues.
UNIT -V
Graphs - Introduction, Directed vs Undirected Graphs, Weighted vs
Unweighted Graphs, Representations, Breadth First Search, Depth First
Search.
Trees - Overview of Trees, Tree Terminology, Binary Trees: Introduction,
Implementation, Applications. Tree Traversals, Binary Search Trees:
Introduction, Implementation, AVL Trees: Introduction, Rotations,
Implementation.
TEXTBOOKS:
1. Data structures and algorithms in python by Michael T. Goodrich
2. Data Structures and Algorithmic Thinking with Python by
Narasimha Karumanchi
REFERENCE BOOKS:
COURSE OUTCOMES:
1. Examine Python syntax and semantics and apply Python flow control and
functions.
2. Create, run and manipulate Python Programs using core data structures
like Lists,
3. Apply Dictionaries and use Regular Expressions.
4. Interpret the concepts of Object-Oriented Programming as used in Python.
5. Master object-oriented programming to create an entire python project
using objects and classes
UNIT II:
Relational Algebra–Selection and projection set operations–renaming–
Joins–Division Examples of Algebra overviews – Relational calculus –
Tuple Relational Calculus (TRC) –Domain relational calculus(DRC).
Overview of the SQL Query Language – Basic Structure of SQL Queries,
Set Operations, Aggregate Functions–GROUPBY–HAVING, Nested
Subqueries, Views, Triggers, Procedures.
UNIT III:
Normalization – Introduction, Non loss decomposition and functional
dependencies, First, Second, and third normal forms – dependency
preservation, Boyce/Codd normal form.Higher Normal Forms -
Introduction, Multi-valued dependencies and Fourth normal form, Join
dependencies and Fifth normal form
UNIT IV:
Transaction Concept- Transaction State- Implementation of Atomicity
and Durability –Concurrent Executions – Serializability- Recoverability –
Implementation of Isolation –Testingforserializability-Lock–BasedProtocols–
TimestampBasedProtocols-Validation-BasedProtocols–MultipleGranularity.
UNIT V:
Recovery and Atomicity– Log– Based Recovery – Recovery with
Concurrent Transactions – Check Points – Buffer Management–Failure
with loss of non-volatile storage.
TEXTBOOKS:
1. DatabaseSystemConcepts,Silberschatz,Korth,McGrawhill,SixthEdition.
(All units except IIIrd)
2. Database Management Systems, Raghu Ramakrishnan, Johannes
Gehrke, TATA McGraw Hill 3rd Edition.
REFERENCEBOOKS:
1. Fundamentals of Database Systems, Elmasri Navathe Pearson
Education.
2. An Introduction to Database systems, C.J. Date, A.Kannan,
S.Swami Nadhan, Pearson, Eight Edition for UNITIII.
COURSE OUTCOMES:
At the end of this course, students will be able to:
1. Demonstrate the basic elements of a relational database management
system
2. Ability to identify the data models for relevant problems
3. Ability to design entity relationship and convert entity relationship
diagrams into RDBMS and formulate SQL queries.
4. Apply normalization for the given database
5. Understand the various Recovery Mechanisms
OBJECTIVES:
The students will be able to:
1. To understand the working of a Computer System and its basic
principles.
2. To learn the architecture and design of 8086 processor.
3. To know the concepts of Memory and corresponding technologies.
4. To understand the functional aspects of various peripheral devices.
5. To acquire knowledge about parallel processors.
UNIT - I:
Functional blocks of a computer: CPU, memory, input-output
subsystems, control unit. Computer Organization and Architecture - Von
Neumann
UNIT – II:
Introduction to x86 architecture.
UNIT – III:
Memory system design: Semiconductor memory technologies, memory
organization. Memory organization: Memory interleaving, concept of
hierarchical memory organization, Cache memory, cache size vs. block size,
mapping functions, Replacement algorithms, write policies.
UNIT – IV:
Peripheral devices and their characteristics: Input-output subsystems,
I/O device interface, I/O transfers – program controlled, interrupt driven
and DMA, privileged and non-privileged instructions, software interrupts
and exceptions. Programs and processes – role of interrupts in process state
transitions, I/O device interfaces – SCII, USB
UNIT – V:
Pipelining: Basic concepts of pipelining, throughput and speedup, pipeline
hazards.
Parallel Processors: Introduction to parallel processors, Concurrent access
to memory and cache coherency.
TEXT BOOKS:
1. “Computer Organization and Design: The Hardware/Software Interface”,
5th Edition by David A. Patterson and John L. Hennessy, Elsevier.
2. “Computer Organization and Embedded Systems”, 6th Edition by Carl
Hamacher, McGraw Hill Higher Education.
REFERENCE BOOKS:
1. “Computer Architecture and Organization”, 3rd Edition by John P.
Hayes, WCB/McGraw- Hill
2. “Computer Organization and Architecture: Designing for Performance”,
10th Edition by William Stallings, Pearson Education.
3. “Computer System Design and Architecture”, 2nd Edition by Vincent P.
Heuring and Harry F. Jordan, Pearson Education.
Course Outcomes :
At the end of the course, Students will be able to:
1. Illustrate the functional block diagram of a single bus architecture of a
computer.
2. Analyze the various instruction sets and addressing modes.
3. Design a memory module and analyze its operation by interfacing with
the CPU for a specific architecture.
4. Compare and contrast the peripherals and the related I/O transfers
5. Assess the performance, and apply design techniques to enhance
performance using pipelining & parallelism.
UNIT - I
Operating System-Introduction, Structures-Simple Batch, Multi-
programmed, Time-shared, Personal Computer, Parallel, Distributed
Systems, Real-Time Systems, System components, Operating System
services.
Introduction to Linux operating system, Linux file system, Linux Utilities
UNIT - II
Linux: Introduction to shell, Types of Shell's, example shell programs.
Process and CPU Scheduling - Process concepts and scheduling,
Operations on processes, Cooperating Processes, Threads, Scheduling
Criteria, Scheduling Algorithms, Multiple -Processor Scheduling.
UNIT - III
Deadlocks - System Model, Deadlocks Characterization, Methods for
Handling Deadlocks, Deadlock Prevention, Deadlock Avoidance, Deadlock
Detection and Recovery from Deadlock
Process Management and Synchronization - The Critical Section
Problem, Synchronization Hardware, Semaphores, and Classical Problems
of Synchronization, Critical Regions, Monitors.
UNIT - IV
Inter process Communication Mechanisms: IPC between processes on a
single computer system, IPC between processes on different systems, using
pipes, FIFOs, message queues, shared memory implementation in Linux.
Corresponding system calls.
Memory Management and Virtual Memory - Logical versus Physical
Address Space, Swapping, Contiguous Allocation, Paging, Segmentation,
Segmentation with Paging, Demand Paging, Page Replacement, Page
Replacement Algorithms.
UNIT - V
File System Interface and Operations -Access methods, Directory
Structure, Protection, File System Structure, Allocation methods, kernel
support for files, system calls for file I/O operations open, create, read,
write, close, lseek, stat, ioctl
Disk Management: Disk Scheduling Algorithms-FCFS, SSTF, SCAN, C-
SCAN
TEXT BOOKS:
REFERENCE BOOKS:
COURSE OUTCOMES:
Course Outcomes: After learning the contents of this paper the student
must be able to
1. Describe randomness in certain realistic situation which can be either
discrete or continuous type and compute statistical constants of these
random variables.
2. Provide very good insight which is essential for industrial applications
by learning probability distributions.
3. Make objective, data-driven decisions by using correlation and
regression.
4. Draw statistical inference using samples of a given size which is taken
from a population.
5. To design balanced systems that serve customers quickly and
efficiently but it is not cost effective.
COURSE OBJECTIVES:
1. To understand a range of Object-Oriented Programming, as well as in-
depth data and information processing techniques.
2. To know how linear data structures work
3. To implement non-linear data structures.
4. To simulate searching and sorting techniques.
5. To develop programs for performing operations on Trees and Graphs .
WEEK 1: Write a Python program for class, Flower, that has three instance
variables of type str, int, and float, that respectively represent the name of
the flower, its number of petals, and its price. Your class must include a
constructor method that initializes each variable to an appropriate value,
and your class should include methods for setting the value of each type,
and retrieving the value of each type.
COURSE OUTCOMES:
The students should be able to:
1. Examine Python syntax and semantics and apply Python flow control
and functions.
2. Create, run and manipulate Python Programs using core data
structures like Lists
3. Apply Dictionaries and use Regular Expressions.
4. Interpret the concepts of Object-Oriented Programming as used in
Python.
5. Master object-oriented programming to create an entire python
project using objects and classes
WEEK1:
Practice File handling utilities, Process utilities, Disk utilities, Networking
commands, Filters, Text processing utilities and Backup utilities.
WEEK2:
Write a shell script that receives any number of file names as arguments
checks if every argument supplied is a file or directory and reports
accordingly. Whenever the argument is a file it reports no of lines present in
it.
WEEK3:
Simulate the following CPU scheduling algorithms. a) FCFS b) SJF c) Round
Robin
d) Priority.
WEEK4:
Simulate Bankers Algorithm for Dead Lock Avoidance; Simulate Bankers
Algorithm for Deadlock Prevention.
WEEK5:
a) Write a C program to simulate the concept of Dining-philosophers
problem.
b) Write a C program to simulate producer-consumer problem using
Semaphores
WEEK6:
a) Write a C program to implement kill(),raise()and sleep()functions.
b) Write a C program to implement alarm(),pause()and abort()functions
c) Write a program that illustrate communication between two process
using unnamed pipes
WEEK7:
a) Write a program that illustrates communication between two process
using named pipes or FIFO.
b) Write a C program that receives a message from message queue and
display them.
WEEK8:
Write a C program that illustrates two processes communicating using
Shared memory.
WEEK9:
Simulate all page replacement algorithms a) FIFO b) LRU c) OPTIMAL
WEEK10:
Write a C program that takes one or more file/directory names as command
line input and reports following information A)File Type B)Number Of Links
C)Time of last Access D)Read, write and execute permissions
WEEK11
a) Implement In c language the following UNIX commands using system
calls i)cat
ii)ls iii) Scanning Directories(Ex: open dir(), read dir(),etc.)
b) Write a C program to create child process and allow parent process to
display “parent” and the child to display “child” on the screen
WEEK12:
Write a C program to simulate disk scheduling algorithms. a) FCFS b) SCAN
c) C-SCAN
TEXT BOOKS:
REFERENCE BOOKS:
COURSE OBJECTIVES:
1. Introduce ER data model, database design and normalization
2. Learn SQL basics for data definition and data manipulation
3. To enable students to use Non-Relational DBMS and understand the
usage of document oriented and distributed databases.
4. To enable the students to use TCL and DCL Commands and perform all
states of Transaction operations.
5. To familiarize issues of concurrency control and transaction
management
List of Experiments:
1. Concept design with E-R Model
2. Relational Model
3. Normalization
4. Practicing DDL commands
5. Practicing DML commands
6. A. Querying (using ANY, ALL, UNION, INTERSECT, JOIN, Constraints etc.)
B. Nested, Correlated subqueries
7. Queries using Aggregate functions, GROUP BY, HAVING and Creation
and dropping of Views.
8. Triggers (Creation of insert trigger, delete trigger, update trigger)
9. Procedures
10. Usage of Cursors
11. Installation of MySQL / MongoDB and practicing DDL, commands
TEXT BOOKS:
1. Database Management Systems, Raghurama Krishnan, Johannes
Gehrke, Tata Mc Graw Hill, 3 rd Edition
2. Database System Concepts, Silberschatz, Korth, McGraw Hill, V
edition.
REFERENCE BOOKS:
1. Database Systems design, Implementation, and Management, Peter Rob &
Carlos Coronel 7th Edition.
2. Fundamentals of Database Systems, Elmasri Navrate, Pearson Education
3. Introduction to Database Systems, C.J. Date, Pearson Education
4. Oracle for Professionals, The X Team, S. Shah and V. Shah, SPD.
5. Database Systems Using Oracle: A Simplified guide to SQL and PL/SQL,
Shah, PHI.
6. Fundamentals of Database Management Systems, M. L. Gillenson, Wiley
Student Edition.
COURSE OUTCOMES:
1. Design database schema for a given application and apply
normalization
2. Acquire skills in using SQL commands for data definition and data
manipulation.
3. Develop solutions for database applications using procedures, cursors
and triggers
INTRODUCTION
COURSE OBJECTIVES
1. To inculcate the basic knowledge of the French language
2. To hone the basic sentence constructions in day to day
expressions for communication intheir vocation
3. To form simple sentences that aids in day-to-day communication
4. To prepare the students towards DELF A1
5. To develop in the student an interest towards learning languages.
UNIT - I:
Speaking: Introduction to the French language and culture –
Salutations - French alphabet -Introducing people
Writing: Understand and fill out a form
Grammar: The verbs “to be ' and “to have '' in the present tense of the
indicative
Vocabulary: The numbers from 1 to 20 - Professions- Nationalities
UNIT - II:
Speaking: Talk about one’s family – description of a person -
express his tastes and preferences - express possession - express
negation
Writing: Write and understand a short message
Grammar: Nouns (gender and number) - Articles - The–
erverbs in the present-Possessive adjectives - Qualifying adjectives
Vocabulary: The family – Clothes-Colors- The numbers from 1 to 100-
The classroom
UNIT - III
Speaking: Talk about your daily activities - be in time - ask and
indicate the date and time - talk about sports and recreation - express
the frequency
Writing: A letter to a friend
Grammar: The expression of time– The –ir verbs in the present- The
verbs do, go, take, come,- Adverbs-Reflexive verbs
Vocabulary: The days and months of the year- The sports-Hobbies
UNIT - IV
Speaking: Express the quantity - ask and give the price - express the
need, the will and the capacity - compare (adjective) - speak at the
restaurant / in the shops
Writing: A dialogue between a vendor and a customer at the
market
Grammar: Verbs “to want”, “to can”- Express capacity / possibility-
Express will / desire – thefuture tense
Vocabulary: The food – Meals-Fruits and vegetables– The parts of the
body
UNIT - V
Speaking: Express the prohibition and the obligation - describe an
apartment - talk about theweather / ask the weather - ask the opinion
- give your opinion - express your agreement or disagreement
Writing: Descriptions
Grammar: Demonstrative adjectives- Prepositions- The verb 'must'
to indicate obligation and necessity in the present
Vocabulary: Seasons – Holidays-The city– Furniture
NOTE: The students are exposed to simple listening and reading activities.
REFERENCE BOOKS
COURSE OUTCOMES
COURSE OBJECTIVES:
UNIT-I
Java Programming- History of Java, comments, Java Buzz words, Data
types, Variables, Constants, Scope and Lifetime of variables, Operators,
Type conversion and casting, Enumerated types, Control flow- block scope,
conditional statements, loops, break and continue statements, arrays,
simple java stand alone programs, class, object, and its methods
constructors, methods, static fields and methods, access control, this
reference, overloading constructors, recursion, exploring string class,
garbage collection.
UNIT – II
Inheritance – Inheritance types, super keyword, preventing inheritance,
final classes andmethods.
Polymorphism – method overloading and method overriding, abstract
classes and methods. Interfaces- Interfaces Vs Abstract classes, defining
an interface, implement interfaces, accessing implementations through
interface references, extending interface, inner class.
Packages- Defining, creating and accessing a package, importing
packages.
UNIT-III
Exception handling-Benefits of exception handling, the classification of
exceptions - exception hierarchy, checked exceptions and unchecked
exceptions, usage of try, catch, throw, throws and finally, creating own
exception subclasses.
Multithreading – Differences between multiple processes and multiple
threads, thread life cycle, creating threads, interrupting threads, thread
UNIT-IV
Collection Framework in Java – Introduction to java collections,
Overview of java collection framework, Commonly used collection classes-
Array List, Vector, Hash table, Stack, Lambda Expressions.
Files- Streams- Byte streams, Character streams, Text input/output,
Binary input/output, File management using File class.
Connecting to Database – JDBC Type 1 to 4 drivers, Connecting to a
database, querying a database and processing the results, updating data
with JDBC,Data Access Object (DAO).
UNIT-V
GUI Programming with Swing - The AWT class hierarchy, Introduction to
Swing, Swing Vs AWT, Hierarchy for Swing components, Overview of some
Swing components – Jbutton, JLabel, JTextField, JTextArea, simple Swing
applications, Layout management – Layout manager types – border, grid
and flow.
Event Handling- Events, Event sources, Event classes, Event Listeners,
Delegation event model, Examples: Handling Mouse and Key events,
Adapter classes.
TEXT BOOK:
1. Java Fundamentals–A Comprehensive Introduction, Herbert Schildt and
Dale Skrien,TMH.
2. Core Java: An Integrated Approach – Dr R Nageswara Rao
REFERENCE BOOKS:
1. Java for Programmers, P.J.Deitel and H.M.Deitel, PEA (or) Java: How to
Program ,P.J.Deitel and H.M.Deitel,PHI
2. ObjectOrientedProgrammingthroughJava,P.RadhaKrishna,Universities
Press.
3. Thinking in Java, Bruce Eckel,PE
4. Programming in Java, S. Malhotra and S. Choudhary, Oxford
Universities Press.
5. Design Patterns Erich Gamma, Richard Helm, Ralph Johnson and John
Vlissides.
COURSE OUTCOMES:
At the end of this course , students will be able to :
1. Understand the use of OOP’s Concepts.
2. Implement Packages and interfaces in java
3. Develop and Understand exception handling ,multithreaded applications
with synchronization
4. Understand the use of Collection Framework
5. Design GUI based applications using AWT and Swings
UNIT -I
Introduction to Software Engineering: The evolving role of software,
changing nature of software, software myths.
A Generic view of process: Software engineering-a layered technology, a
process framework, the capability maturity model integration(CMMI).
Process models: The waterfall model, Spiral model and Agile methodology
UNIT -II
Software Requirements: Functional and non- functional requirements,
user requirements, system requirements, interface specification, the
software requirements document.
Requirements engineering process: Feasibility studies, requirements
elicitation and analysis, requirements validation, requirements
management.
UNIT-III
Design Engineering: Design process and design quality, design concepts,
the design model. Creating an architectural design: software architecture,
data design, architectural styles and patterns, architectural design,
conceptual model of UML, basic structural modeling, class diagrams,
sequence diagrams, collaboration diagrams, usecase diagrams, component
diagrams.
UNIT-IV
Testing Strategies: A strategic approach to software testing, test
strategies for conventional software, black-box and white-box testing,
validation testing, system testing, the art of debugging.
Metrics for Process and Products: Software measurement, metrics for
software quality.
UNIT-V
Risk management: Reactive Vs proactive risk strategies, software risks,
risk identification, risk projection, risk refinement, RMMM.
Quality Management: Quality concepts, software quality assurance,
software reviews, formal technical reviews, statistical software quality
assurance, software reliability, the ISO 9000qualitystandards.
TEXTBOOKS:
1. SoftwareEngineering, Apractitioner’s Approach-Roger S.Pressman,
6th Edition, McGraw Hill International Edition.
2. SoftwareEngineering-Sommerville,7thedition,PearsonEducation.
Course Outcomes
1. Understand software development life cycle Ability to translate end-
user requirements into system and software requirements.
2. Structure the requirements in a Software Requirements Document and
Analyze Apply various process models for a project, Prepare SRS
document for a project
3. Identify and apply appropriate software architectures and patterns to
carry out high level design of a system and be able to critically
compare alternative choices.
4. Understand requirement and Design engineering process for a project
and Identify different principles to create an user interface
5. Identify different testing methods and metrics in a software
engineering project and Will have experience and/or awareness of
testing problems and will be able to develop a simple testing report
UNIT - I:
Introduction: Network, Uses of Networks, Types of Networks, Reference
Models: TCP/IP Model, The OSI Model, Comparison of the OSI and TCP/IP
reference model.
Physical Layer: Guided transmission media, Wireless transmission media,
Switching
UNIT - II:
Data Link Layer - Design issues, Error Detection & Correction,
Elementary Data Link Layer Protocols, Sliding window protocols
Multiple Access Protocols - ALOHA, CSMA, CSMA/CD, CSMA/CA, Collision
free protocols, Ethernet- Physical Layer, Ethernet MAC Sub layer.
UNIT - III:
Network Layer: Network Layer Design issues, store and forward packet
switching connection less and connection oriented networks, routing
algorithms: optimality principle, shortest path, flooding, Distance Vector
Routing, Count to Infinity Problem, Link State Routing, Path Vector
Routing, Hierarchical Routing; Congestion control algorithms,
IP addresses, CIDR, Sub netting, Super Netting, IPv4, Packet
Fragmentation, IPv6 Protocol, Transition from IPv4 to IPv6, ARP, RARP.
UNIT - IV:
Transport Layer: Services provided to the upper layers elements of
transport protocol, addressing, connection establishment, Connection
release, Error Control & Flow Control, Crash Recovery. The Internet
Transport Protocols: UDP, Introduction to TCP, The TCP Service Model, The
TCP Segment Header, The Connection Establishment, The TCP Connection
Release, The TCP Sliding Window, The TCP Congestion Control Algorithm.
UNIT - V:
Application Layer- Introduction, providing services, Applications layer
paradigms: Client server model, HTTP, E-mail, WWW, TELNET, DNS.
TEXT BOOKS:
1. Computer Networks - Andrew S Tanenbaum, 4th Edition, Pearson
Education.
2. Data Communications and Networking - Behrouz A. Forouzan, Fifth
Edition TMH, 2013.
REFERENCES BOOKS:
COURSE OUTCOMES:
The students will be able to:
1. Explore the basics of Computer Networks and Various Protocols.
2. Recall the World Wide Web concepts.
3. Interpret the working of TCP layer functionalities.
4. Describe the functionalities of application layer services.
5. Administrate a network and flow of information further.
COURSEOBJECTIVES:
UNIT-I
Introduction: Algorithms, Pseudocode for expressing algorithms,
performance analysis-Space complexity, Time Complexity, Asymptotic
notation- Big oh notation, omega notation, theta notation and little oh
notation.
Divide and Conquer: General method. Applications- Binary search,
Quick sort, merge sort, Strassen’s matrix multiplication.
UNIT-II
Disjoint set operations, Union and Find algorithms, AND/OR graphs,
Connected components, Bi-connected components.
Greedy method: General method, applications-Job sequencing with
deadlines, Knapsack problem, Spanning trees, Minimum cost spanning
trees, Single source shortest path problem.
UNIT-III
Dynamic Programming: General method, applications-Matrix chained
multiplication, Optimal binary search trees,0/1 Knapsack problem, All
pairs shortest path problem, Traveling sales person problem.
UNIT-IV
Backtracking: General method Applications-n-queues problem, Sum of
subsets problem, Graph coloring, Hamiltonian cycles.
UNIT-V
Branch and Bound: General method, applications- Travelling sales
person problem,0/I k Knapsack problem LC branch and Bound solution,
FIFO branch and bound solution.
NP-Hard and NP-Complete Problems: Basic concepts, Non
deterministic algorithms, NP-Hard and NP-Complete classes, NP-Hard
problems,Cook’stheorem.
TEXTBOOKS:
1. Fundamentals of Computer Algorithms, Ellis Horowitz, Satraj Sahni
and Rajasekharan, Universities press
2. Design and Analysis of Algorithms, P.h.Dave, 2nd Edition, Pearson
Education.
REFERENCES:
UNIT-I:
Introduction to Signals and systems - Brief introduction
UNIT-II:
IoT and M2M- Software defined networks, network function
virtualization, difference between SDN and NFV for IoT, Basics of IoT
System Management with NETCONF, YANG- NETCONF, YANG,
SNMP NETOPEER
UNIT-III:
IoT Physical Devices and Endpoints- Introduction to Arduino and
Raspberry Pi- Installation, Interfaces (serial, SPI, I2C)
UNIT-IV:
Sensors- Light sensor, temperature sensor with thermistor, voltage
sensor, ADC and DAC, Temperature and Humidity Sensor DHT11,
Motion Detection Sensors, Wireless Bluetooth Sensors, Level
Sensors, USB Sensors, Embedded Sensors, Distance
Measurement with ultrasound sensor
UNIT-V:
IoT Physical Servers and Cloud Offerings– Introduction to Cloud
Storage models and communication APIs Web Server – Web server
for IoT, Cloud for IoT, Python web application framework Designing
a RESTful web API
TEXT BOOKS:
1. Internet of Things - A Hands-on Approach, Arshdeep Bahga and Vijay
Madisetti, Universities Press, 2015, ISBN: 9788173719547
REFERENCE BOOKS:
1. Peter Waher, 'Learning Internet of Things', Packt Publishing, 2015 3.
Editors Ovidiu Vermesan
2. Peter Friess,'Internet of Things – From Research and Innovation to
Market Deployment', River Publishers, 2014
3. N. Ida, Sensors, Actuators and Their Interfaces, SciTech Publishers,
2014.
Course Outcomes:
1. Understand IoT value chain structure (device, data cloud),
application areas and technologies involved.
2. Understand IoT sensors and technological challenges faced by IoT
devices, with a focus on wireless, energy, power, and sensing
modules
3. Market forecast for IoT devices with a focus on sensors
4. Explore and learn about Internet of Things with the help of
preparing projects designed for Raspberry Pi
Course Outcomes:
List of Experiments
1. Implement the data link layer framing methods such as character, character-
stuffing and bit stuffing.
2. Write a program to compute CRC code for the polynomials CRC-12, CRC-16 and
CRC CCIP
3. Develop a simple data link layer that performs the flow control using the sliding
window protocol,
and loss recovery using the Go-Back-N mechanism.
4. Implement Dijsktra’s algorithm to compute the shortest path through a network
5. Take an example subnet of hosts and obtain a broadcast tree for the subnet.
6. Implement distance vector routing algorithm for obtaining routing tables at each
node.
7. Implement data encryption and data decryption
8. Write a program for congestion control using Leaky bucket algorithm.
TEXT BOOKS:
1. Computer Networks, Andrew S Tanenbaum, David. j. Wetherall, 5th Edition.
Pearson Education/PHI
REFERENCE BOOKS:
1. An Engineering Approach to Computer Networks, S.Keshav, 2nd Edition,
Pearson Education
2. Data Communications and Networking – Behrouz A. Forouzan. 3rd Edition,
TMH.
TEXT BOOKS:
1. Internet of Things - A Hands-on Approach, ArshdeepBahga and Vijay
Madisetti, Universities Press, 2015, ISBN: 9788173719547
2. Getting Started with Raspberry Pi, Matt Richardson & Shawn Wallace,
O'Reilly (SPD), 2014, ISBN: 9789350239759
3. Raspberry Pi Cookbook, Software and Hardware Problems and solutions,
Simon Monk, O'Reilly (SPD), 2016, ISBN 7989352133895
COURSE OBJECTIVES:
1. To prepare students to become familiar with the Standard Java
technologies ofJ2SE
2. To provide Students with a solid foundation in OOP fundamentals
required to solve programming problems and also to learn Advanced
Java topics like J2ME, J2EE, JSP, JavaScript
3. To train Students with good OOP programming breadth so as to
comprehend, analyze, design and create novel products and solutions for
the real life problems.
4. To inculcate in students professional and ethical attitude,
multidisciplinary approach and an ability to relate java programming
issues to broader application context.
5. To provide student with an academic environment aware of excellence,
written ethical codes and guidelines and lifelong learning needed for a
successful professional career
Week 1:
a) Write a java program to find the Fibonacci series using recursive and
non-recursive functions
b) Write a program to multiply two given matrices.
c) Write a program for Method overloading and Constructor overloading
Week 2:
a) Write a program to demonstrate execution of static blocks ,static
variables & static methods.
b) Write a program to display the employee details using Scanner class
c) Write a program for sorting a given list of names in ascending order
Week 3:
a) Write a program to implement single and Multi level
inheritance
b) Write a program to implement Hierarchical Inheritance.
c) Write a program to implement method overriding.
Week 4:
a) Write a program to create an abstract class named Shape that
contains two integers and an empty method named printArea (). Provide
three classes named Rectangle, Triangle and Circle such that each one of
the classes extends the class Shape. Each one of the classes contains only
the method printArea () that prints the area of the given shape.
b) Write a program to implement Interface .
Week 5:
a) Write a program to create inner classes
b) Write a program to create user defined package and demonstrate various
access modifiers.
c) Write a program to demonstrate the use of super and final keywords.
Week 6 :
a) Write a program if number is less than 10 and greater than 50 it generate
the exception out of range. else it displays the square of number.
b) Write a program with multiple catch Statements.
c) write a program to implement nested try
Week 7:
a) Write a Program to implement simple Thread by extending
Thread class and implementing runnable interface.
b) Write a program that implements a multi-thread application that
has three threads
c) write a program to set and print thread priorities
Week 8:
Write a program to implement following collections
a)array List b) Vector c)Hash table d)Stack
Week 9:
a) Write a program to demonstrate lambda expressions.
b)Write a program for producer and consumer problem using
Threads
Week 10:
a) Write a program to list all the files in a directory including the
files present in all its subdirectories.
b) Write a Program to Read the Content of a File Line by Line
Week 11:
a) Write a program that connects to a database using JDBC
display all records in a table.
b) Write a program to connect to a database using JDBC and
insert values into it.
c) Write a program to connect to a database using JDBC and
delete values from it
Week 12:
Write a program that works as a simple calculator. Use a Grid
Layout to arrange Buttons for digits and for the + - * %
operations. Add a text field to display the result.
COURSE OUTCOMES:
Upon successful completion of this course, the students will be able to:
1. Analyze the necessity for Object Oriented Programming paradigm and
over structured programming and become familiar with the fundamental
concepts in OOP.
2. Demonstrate an ability to design and develop Java programs, analyze,
and interpret object oriented data and report results.
3. Analyze the distinguish between various types of inheritance.
4. Demonstrate an ability to design an object oriented system, AWT
components or multithreaded process as per needs and specifications.
5. Demonstrate an ability to visualize and work on laboratory and
multidisciplinary tasks like console and windows applications for
standalone programs.
Course objectives:
1. To make the students understand in-depth analysis of public policy
and to solve its ills prevailing in the society.
2. To provide an opportunity for the students to learn the basic areas of
public policy analysis, implementation and evaluation.
3. To make understand the process and various approaches in public
policy making.
4. To understand the theories and issues of social coordination and the
nature of all patterns of rule.
5. To make the students understand the techniques of governance and
emerging trends in public and private governance its policy-making
and implementation.
Unit-I
Introduction of Public Policy: Definition, Nature, Scope and Importance of
Public Policy, Evolution of Public Policy and Policy Sciences, Public Policy
and Public Administration. Approaches to Public Policy Analysis: The
Process Approach, The Logical Positivist Approach, The Phenomenological
Approach, The Participatory Approach and Normative Approach
Unit-II
Theories and Process of Public Policy Making: Theories and Models of
Policy Making, Perspectives of Policy Making Process, Institutions of Policy
Making.
Unit-III
Policy Implementation and Evaluation: Concept of Policy
Implementation, Techniques of Policy Implementation, Concept of Policy
Evaluation, Constraints of Public Policy Evaluation
Unit-IV
Introduction of Governance: Definitions, Issues and Controversies,
Reinventing Government, Reforming Institutions: The State, Market and
Public domain. State and Governance: Origin and types of State,
Democratic State and Democratic Administration, Neo-Liberalism and
Rolling Back State and Governance as Government.
Unit-V
Citizen and Techniques of Governance: Rule of Law and Human Rights,
Accountability, Participation, Representation. Techniques of Governance:
Openness and Transparency, Citizen Charter, Social Audit. Emerging
COURSE OUTCOMES
After completion of the course, student will be able to
1. Understand public policy analysis and they will be able to understand
policy evaluation and implementation.
2. Understand the public policy and governance on the largest gamut of
its canvas.
3. Students will understand the what are emerging trends in public and
private governance and various theories in public policy making
Internet of
Things (IoT)
III Year B.Tech (R22)
SYLLABUS
(Batches admitted from the academic year 2022 - 2023)
Course Structure of III Year B. Tech - CSE (Internet of Things) – I Semester- R22 Regulation
MAX. MARKS
S.No Subject Code SUBJECT L T P C
INT EXT
1 R22A62xx Microprocessors and Microcontrollers 3 0 0 3 40 60
2 R22A73xx Artificial Intelligence 3 0 0 3 40 60
3 R22A12xx Automata and Compiler Design 3 1 0 4 40 60
4 Open Elective-I 3 0 0 3 40 60
Professional Elective-I
R22A05xx 1. Discrete Mathematics
5 R22A62xx 2. Cyber Security Essentials 3 0 0 3 40 60
R22A05xx 3. Web Programming
R22A66xx 4. Human Computer Interaction
6 R22A62xx Microprocessors and Microcontrollers Lab 0 0 2 1 40 60
7 R22A73xx Artificial Intelligence Lab 0 0 2 1 40 60
8 R22A62xx Application Development -I 0 0 4 2 40 60
Total 15 1 8 20 320 480
* The Detailed Syllabus from III Year Onwards is subject to Internal Dept. AAC and BoS Approval
Internet of
Things (IoT)
III Year B.Tech (R22)
SYLLABUS
(Batches admitted from the academic year 2022 - 2023)
Course Structure of III Year B. Tech - CSE (IoT) – I Semester- R22 Regulation
MAX. MARKS
S.No Subject Code SUBJECT L T P C
INT EXT
1 R22A0409 Microprocessor and Microcontrollers 3 0 0 3 40 60
2 R22A6601 Artificial Intelligence 3 0 0 3 40 60
3 R22A1207 Automata Theory and Compiler Design 3 0 0 3 40 60
4 Open Elective-I 3 0 0 3 40 60
Professional Elective-I
R22A6201 1. Cyber Security Essentials
5 R22A0512 2. Computer Networks 3 0 0 3 40 60
R22A0566 3. Web Programming
R22A6615 4. Human Computer Interaction
6 R22A0488 Microprocessor and Microcontrollers Lab 0 0 2 1 40 60
7 R22A6683 Artificial Intelligence Lab 0 0 2 1 40 60
8 R22A6792 Application Development – I 0 0 4 2 40 60
9 R22A0084 Professional Development Skills – I 0 0 2 1 40 60
Total 15 0 10 20 360 540
COURSE OBJECTIVES:
UNIT –I
8086 ARCHITECTURE: Architecture of 8086, Register Organization, Physical Memory
Organization, Signal descriptions of 8086- Common Function Signals, Minimum and
Maximum mode signals, Timing diagrams.
UNIT –II
INSTRUCTION SET AND ASSEMBLY LANGUAGE PROGRAMMING OF 8086:
TEXT BOOKS:
1. D. V. Hall, Microprocessors and Interfacing, TMGH, 2nd Edition2006.
2. Kenneth. J. Ayala, The 8051 Microcontroller, 3rd Ed., CengageLearning.
3. ARM System Developer‘s Guide: Designing and Optimizing System Software-
Andrew N. Sloss, Dominic Symes, Chris Wright, Elsevier Inc.,2007
REFERENCE BOOKS:
1. Advanced Microprocessors and Peripherals – A. K. Ray and K.M. Bhurchandani,
TMH, 2nd Edition2006.
2. The 8051Microcontrollers, Architecture and Programming and Applications -K.Uma
Rao, Andhe Pallavi, Pearson, 2009.
3. Micro Computer System 8086/8088 Family Architecture, Programming and
Design – Liu and GA Gibson, PHI, 2ndEd.
4. Microcontrollers and Application – Ajay. V. Deshmukh, TMGH,2005.
COURSE OUTCOMES:
After going through this course, the student will
1. Learn the internal organization of popular
8086/8051microprocessors/microcontrollers.
2. Learn hardware and software interaction and integration.
3. Learn the Assembly level language programming
4. Learn the Memory andInterfacing of different external peripheral devices with
microprocessors and micro controllers
5. Learn thedeveloping an assembly language program for specified application
COURSE OBJECTIVES:
UNIT - I:
Introduction: AI problems, Agents and Environments, Structure of Agents, Problem
Solving Agents Basic Search Strategies: Problem Spaces, Uninformed Search (Breadth-
First, Depth-First Search, Depth-first with Iterative Deepening), Heuristic Search (Hill
Climbing, Generic Best-First, A*), Constraint Satisfaction (Backtracking, Local Search)
UNIT - II:
Advanced Search: Constructing Search Trees, Stochastic Search, AO* Search
Implementation, Minimax Search, Alpha-Beta Pruning Basic Knowledge
Representation and Reasoning: Propositional Logic, First-Order Logic, Forward
Chaining and Backward Chaining, Introduction to Probabilistic Reasoning, Bayes
Theorem
UNIT - III:
Advanced Knowledge Representation and Reasoning: Knowledge Representation
Issues, Nonmonotonic Reasoning, Other Knowledge Representation Schemes
Reasoning Under Uncertainty: Basic probability, Acting Under Uncertainty, Bayes‘
Rule, Representing Knowledge in an Uncertain Domain, Bayesian Networks
UNIT - IV:
Learning: What Is Learning? Rote Learning, Learning by Taking Advice, Learning in
Problem Solving, Learning from Examples, Winston‘s Learning Program, Decision
Trees.
UNIT - V:
Expert Systems: Representing and Using Domain Knowledge, Shell, Explanation,
Knowledge Acquisition.
TEXT BOOKS:
1. Russell, S. and Norvig, P, Artificial Intelligence: A Modern Approach, Third Edition,
PrenticeHall, 2010.
REFERENCES:
1. Artificial Intelligence, Elaine Rich, Kevin Knight, Shivasankar B. Nair, The McGraw
Hill publications, Third Edition, 2009. 2. George F. Luger,
2. Artificial Intelligence: Structures and Strategies for Complex Problem Solving,
Pearson Education, 6th ed., 2009.
COURSE OUTCOMES:
1. Understand the informed and uninformed problem types and apply search strategies
to solve them.
2. Apply difficult real life problems in a state space representation so as to solve those
using AI techniques like searching and game playing.
3. Design and evaluate intelligent expert models for perception and prediction from
intelligent environment.
4. Formulate valid solutions for problems involving uncertain inputs or outcomes by
using decision making techniques.
5. Demonstrate and enrich knowledge to select and apply AI tools to synthesize
information and develop models within constraints of application area
COURSE OBJECTIVES:
This course will enable the students :
UNIT - II
Introduction To Compiler: Phases of Compilation, ambiguity LL(K) grammars
and LL(1) parsing Bottom up parsing handle pruning LR Grammar Parsing,
LALR parsing, parsing ambiguous grammars, YACC programming specification.
Semantics: Syntax directed translation, S-attributed and L-attributed
grammars.
UNIT - III
Intermediate code: abstract syntax tree, translation of simple statements and
control flow statements. Context Sensitive features -Chomsky hierarchy of
languages and recognizers. Type checking, type conversions, equivalence of type
expressions, overloading of functions and operations.
UNIT - IV
Run time storage: Storage organization, storage allocation strategies scope
access to now local names. Code optimization: Principal sources of optimization,
optimization of basic blocks, peephole optimization.
UNIT - V
Code generation: Machine dependent code generation, object code forms,
generic code generation algorithm, Register allocation and assignment. Using
DAG representation of Block.
TEXT BOOKS:
1. Introduction to Theory of computation Sipser, 2nd Edition, Thomson.
2. Compilers Principles, Techniques and Tools Aho, Ullman, Ravisethi, Pearson
Education.
REFERENCE BOOKS:
1. Modern Compiler Implementation in C- Andrew N. Apple, Cambridge University
Press.
2. Lex & yacc – John R. Levine, Tony Mason, Doug Brown, O‘reilly Modern
Compiler Design- Dick Grune, Henry E. Bal, Cariel T. H. Jacobs, Wiley
dream tech.
3. Engineering a Compiler-Cooper & Linda, Elsevier.
4. Compiler Construction, Louden, Thomson.
5. Introduction to Automat a Theory Languages and Computation‖. Hopcroft
H.E. and UllmanJ.D.Pearson Education.
COURSE OUTCOMES:
Upon completion of this course, the student should be able to:
1. Explain deterministic and non-deterministic machines.
2. Design a deterministic finite-state machine to accept a specified language.
3. Determine a language‘s location in the Chomsky hierarchy (regular
sets, context-free, context-sensitive, and recursively enumerable
languages).
4. Explain how a compiler can be constructed for a simple context free language.
5. Apply the code optimization & code generation techniques.
Course Outcomes:
1. Analyze and evaluate the cyber security needs of an organization.
2. Understand Cyber Security Regulations and Roles of International Law.
3. Design and develop a security architecture for an organization.
4. Understand fundamental concepts of data privacy attacks
COURSE OBJECTIVES:
UNIT – II:
Data Link Layer - Design issues, Error Detection & Correction, Elementary Data Link
Layer Protocols, Sliding window protocols Multiple Access Protocols - ALOHA,
CSMA,CSMA/CD, CSMA/CA, Collision free protocols, Ethernet- Physical Layer,
Ethernet Mac Sub layer.
UNIT – III:
Network Layer: Network Layer Design issues, store and forward packet switching
connection less and connection oriented networks-routing algorithms-optimality
principle, shortest path, flooding, Distance Vector Routing, Count to Infinity Problem,
Link State Routing, Path Vector Routing, Hierarchical Routing; Congestion control
algorithms, IP addresses, CIDR, Subnetting, SuperNetting, IPv4, Packet Fragmentation,
IPv6 Protocol, Transition from IPv4 to IPv6, ARP, RARP.
UNIT – IV:
Transport Layer: Services provided to the upper layers elements of transport protocol
addressing connection establishment, Connection release, Error Control & Flow
Control, Crash Recovery. The Internet Transport Protocols: UDP, Introduction to TCP,
The TCP Service Model, The TCP Segment Header, The Connection Establishment, The
TCP Connection Release, The TCP Sliding Window, The TCP Congestion Control
Algorithm.
UNIT – V:
TEXT BOOKS:
COURSE OUTCOMES:
At the end of this course, students will be able to:
1. Understand basics of Computer Networks and Reference Models.
2. Understand the Data link Layer Concepts
3. Know allotment of IP addresses, best routing path calculations in network.
4. Analyze TCP,UDP working and know how to handle congestion
5. Get an idea of various things in Application Layer.
Course Objectives:
1. To understand the technologies used in Web Programming.
2. To know the importance of object-oriented aspects of Scripting.
3. To understand creating database connectivity using JDBC.
4. To learn about applet techniques
5. To learn the concepts of web-based application using sockets.
UNIT – II JAVA
Introduction to object-oriented programming-Features of Java – Data types, variables
and arrays – Operators – Control statements – Classes and Methods – Inheritance.
Packages and Interfaces – Exception Handling – Multithreaded Programming –
Input/Output – Files – Utility Classes – String Handling.
UNIT – IV APPLETS
Java applets- Life cycle of an applet – Adding images to an applet – Adding sound to an
applet. Passing parameters to an applet. Event Handling. Introducing AWT: Working
with Windows Graphics and Text. Using AWT Controls, Layout Managers and Menus.
Servlet – life cycle of a servlet. The Servlet API, Handling HTTP Request and Response,
using Cookies, Session Tracking. Introduction to JSP.
TEXT BOOKS:
1. Harvey Deitel, Abbey Deitel, Internet and World Wide Web: How To Program 5th
Edition.
2. Herbert Schildt, Java - The Complete Reference, 7th Edition. Tata McGraw- Hill
Edition.
3. Michael Morrison XML Unleashed Tech media SAMS.
REFERENCE BOOKS:
1. John Pollock, Javascript - A Beginners Guide, 3rd Edition –- Tata McGraw-Hill
Edition.
2. Keyur Shah, Gateway to Java Programmer Sun Certification, Tata McGraw Hill,
2002.
Course Outcomes:
1. Design web pages.
2. Use technologies of Web Programming.
3. Apply object-oriented aspects to Scripting.
4. Create databases with connectivity using JDBC.
5. Build web-based application using sockets.
Course Objectives:
1. To gain an overview of Human-Computer Interaction (HCI), with an understanding of
user interface design
2. Able to apply models from cognitive psychology to predicting user performance in
various human-computer interaction tasks and recognize the limits of human
performance as they apply to computer operation;
3. To Familiar with a variety of both conventional and non-traditional user interface
paradigms, the latter including virtual and augmented reality, mobile and wearable
computing, and ubiquitous computing;
4. To understand the social implications of technology and their ethical
responsibilities as engineers in the design of technological systems.
5. Finally, working in small groups on a product design from start to finish will
provide you with invaluable team-work experience.
UNIT - I
Introduction: Importance of user Interface – definition, importance of good design.
Benefits of good design. A brief history of Screen design.
The graphical user interface – popularity of graphics, the concept of direct
manipulation, graphical system, Characteristics, Web user – Interface popularity,
characteristics- Principles of user interface.
UNIT - II
Design process – Human interaction with computers, importance of human
characteristics human consideration, Human interaction speeds, understanding
business junctions.
Screen Designing: Design goals – Screen planning and purpose, organizing screen
elements, orderingof screen data and content – screen navigation and flow – Visually
pleasing composition – amount of information – focus and emphasis – presentation
information simply and meaningfully – information retrieval on web – statistical
graphics – Technological consideration in interface design.
UNIT- III
Windows – New and Navigation schemes selection of window, selection of devices
based and screen- based controls. Components – text and messages, Icons and
increases – Multimedia, colors, uses problems, choosing colors.
UNIT- IV
HCI in the software process, The software life cycle Usability engineering Iterative
design and prototyping Design Focus: Prototyping in practice Design rationale Design
rules Principles to support usability Standards Golden rules and heuristics HCI
UNIT- V
Cognitive models Goal and task hierarchies Design Focus: GOMS saves money
Linguistic models The challenge of display-based systems Physical and device models
Cognitive architectures Ubiquitous computing and augmented realities Ubiquitous
computing applications research Design Focus: Ambient Wood – augmenting the
physical Virtual and augmented reality Design Focus: Shared experience Design
Focus: Applications of augmented reality Information and data visualization Design
Focus: Getting the size right.
TEXT BOOKS:
1. The essential guide to user interface design, Wilbert O Galitz, Wiley Dream Tech.
Units 1, 2, 3
2. Human – Computer Interaction. Alan Dix, Janet Fincay, Gre Goryd, Abowd,
Russell Bealg,Pearson Education Units 4,5
REFERENCE BOOKS:
1. Designing the user interface. 3rd Edition Ben Shneidermann, Pearson
Education Asia.
2. Interaction Design Prece, Rogers, Sharps. Wiley Dreamtech.
3. User Interface Design, Soren Lauesen , Pearson Education.
4. Human –Computer Interaction, D. R. Olsen, Cengage Learning.
5. Human –Computer Interaction, Smith - Atakan, Cengage Learning.
Course Outcomes:
Ability to apply HCI and principles to interaction design.
Ability to design certain tools for blind or PH people.
COURSE OBJECTIVES
The Following programs/experiments are to be written for assembler and execute the
same with 8086 and 8051 kits.
1. Programs for 16-bit arithmetic operations using 8086 (using Various Addressing
Modes).
2. Program for sorting an array using 8086.
3. Program for searching a number or character in a string using 8086.
COURSE OUTCOMES
Week 8
Write a program to implement Hill Climbing Algorithm.
Week 9
Write a program to implement A* Algorithm.
Week 10
Write a program to implement Tic-Tac-Toe game.
Week 11
Write a program to implement Water Jug Problem.
LAB OUTCOMES:
Upon completion of the course, students will be able to
1. Apply various AI search algorithms (uninformed, informed, heuristic, constraint
satisfaction)
2. Understand the fundamentals of knowledge representation, inference.
3. Understand the fundamentals of theorem proving using AI tools.
4. Demonstrate working knowledge of reasoning in the presence of incomplete
and/or uncertain information
OBJECTIVES:
1. To strengthen the students with the professional skill set.
2. To make the students recognize the role of technical English in their academic
and professional fields.
3. To improve language proficiency and to develop the required professional ethics.
4. To equipstudents, organize, comprehend, write, and present, short and long
forms of any technical work within the broad framework of the Scientific Method.
5. To facilitate communication about projects and ideas throughout the industry
and also to the non-technical people.
SYLLABUS
UNIT- I:
Communication Skills: Verbal & Non-verbal communication
Body Language: Facial expressions, Gestures, Eye Contact, Shrugging, and
Standing Postures
Writing: Letter Writing: requisition, complaint, Enquiry and response
Exploring Career Opportunities
UNIT-2:
Self-Introduction
Ice-Breaking
Writing: E-Mail Writing, Email Etiquette
Social and Cultural Etiquette
UNIT-3:
Oral Presentation Skills: PPTs, Paper Presentation, Poster Presentation etc.,
JAM Session
Writing: Paragraph writing and Types of Paragraph Writing (descriptive, narrative,
expository, and persuasive)
Ethics and Integrity
UNIT-4:
Describing People, Places, things etc.
Telephonic Conversation: Telephonic Expressions, and Etiquette
Writing: Essay writing and Types of Essay Writing
Digital Literacy and Social Media
UNIT-5:
Extempore
Role play and Situational dialogues
Writing: Memo Writing
Digital Ethics and Cyber Security
OUTCOMES:
Students will be able to
1. Understand information which assists in completion of the assigned job tasks
more successfully
2. Market them with the rich professional skills that they acquire.
3. Adhere to ethical norms of scientific communication
4. Strengthen their individual and collaborative work strategies
5. Successfully market them and sell themselves to the employer of their choice.
REFERENCE BOOKS:
1. Curriculum and Guide line for Life Skills, By UGC, August 2023
2. David F. Beer and David McMurrey, Guide to writing as an Engineer, John
Willey. New York, 2004
3. Diane Hacker, Pocket Style Manual, Bedford Publication, New York, 2003. (ISBN
0312406843)
4. Shiv Khera, You Can Win, Macmillan Books, New York, 2003.
5. Raman Sharma, Technical Communications, Oxford Publication, London, 2004.
6. Meenakshi Raman, Prakash Singh, Business communication, Oxford
Publication, New Delhi 2012.
7. Dale Jung k, Applied Writing for Technicians, McGraw Hill, New York, 2004.
(ISBN: 07828357-4)
8. Sharma, R. and Mohan, K. Business Correspondence and Report Writing, TMH
New Delhi 2002.
9. Xebec, Presentation Book, TMH New Delhi, 2000. (ISBN 0402213)
MAX. MARKS
S.No Subject Code SUBJECT L T P C
INT EXT
1 R22A6703 Data Analytics 3 0 0 3 40 60
R22A6602 Machine Learning 3
2 3 0 0 40 60
m,
3 R22A6903 IoT System Architecture 3 0 0 3 40 60
4 Open Elective –II 3 0 0 3 40 60
Professional Elective-II
R22A1206 1. Mobile Application Development
5 R22A0514 2. Distributed Systems 3 0 0 3 40 60
R22A6904 3. Industrial IoT
R22A6701 4. Data Science and It’s Applications
6 R22A6982 Data Analytics Lab 0 0 2 1 40 60
7 R22A6681 Machine Learning Lab 0 0 2 1 40 60
8 R22A6993 Application Development –II 0 0 4 2 40 60
9 R22A0085 Professional Development Skills – II 0 0 2 1 40 60
Total 15 0 10 20 360 540
Course Objectives:
1. To explore the fundamental concepts of data analytics.
2. To learn the principles and methods of statistical analysis
3. To gain the knowledge on various regression analysis.
4. Discover interesting patterns, analyze supervised and unsupervised models
and estimate the accuracy of the algorithms.
5. To understand the various search methods and visualization techniques.
UNIT - I Data Management: Design Data Architecture and manage the data for
analysis, understand various sources of Data like Sensors/Signals/GPS etc.
Data Management, Data Quality (noise, outliers, missing values, duplicate data)
and Data Processing & Processing.
TEXT BOOKS:
1. Student‘s Handbook for Associate Analytics – II, III.
2. Data Mining Concepts and Techniques, Han, Kamber, 3rd Edition, Morgan
Kaufmann Publishers.
REFERENCE BOOKS:
1. Introduction to Data Mining, Tan, Steinbach and Kumar, Addision Wisley,
2006.
2. Data Mining Analysis and Concepts, M. Zaki and W. Meira 3. Mining of
Massive Datasets, Jure Leskovec Stanford Univ. Anand Rajaraman Milliway
Labs Jeffrey D Ullman Stanford Univ.
Course Outcomes: After completion of this course students will be able to:
1. Understand the impact of data analytics for business decisions and strategy
2. Carry out data analysis/statistical analysis
3. To carry out standard data visualization and formal inference procedures
4. Design Data Architecture; Understand various Data Sources
UNIT – I
Introduction: Introduction to Machine learning, Supervised learning,
Unsupervised learning, Reinforcement learning. Deep learning. Feature
Selection: Filter, Wrapper , Embedded methods. Feature Normalization:- min-
max normalization, z-score normalization, and constant factor normalization
Introduction to Dimensionality Reduction : Principal Component Analysis(PCA),
Linear Discriminant Analysis(LDA)
UNIT-II
Supervised Learning – I (Regression/Classification)
Regression models: Simple Linear Regression, multiple linear Regression. Cost
Function, Gradient Descent, Performance Metrics: Mean Absolute
Error(MAE),Mean Squared Error(MSE) R-Squared error, Adjusted R Square.
Classification models: Decision Trees-ID3,CART, Naive Bayes, K-Nearest-
Neighbours (KNN), Logistic Regression, Multinomial Logistic Regression Support
Vector Machines (SVM) - Nonlinearity and Kernel Methods
UNIT – III
Supervised Learning – II (Neural Networks) Neural Network Representation –
Problems – Perceptrons , Activation Functions, Artificial Neural Networks (ANN) ,
Back Propagation Algorithm.
Classification Metrics: Confusion matrix, Precision, Recall, Accuracy, F-Score,
ROC curves.
UNIT – IV
Model Validation in Classification : Cross Validation - Holdout Method, K-Fold,
Stratified K-Fold, Leave-One-Out Cross Validation. Bias-Variance tradeoff,
Regularization , Overfitting, Underfitting.
Ensemble Methods: Boosting, Bagging, Random Forest.
UNIT – V
Unsupervised Learning : Clustering-K-means, K-Modes, K-Prototypes, Gaussian
Mixture Models, Expectation-Maximization.
Reinforcement Learning: Exploration and exploitation trade-offs, non-associative
learning, Markov decision processes, Q-learning
Text Book(s)
1. Machine Learning – Tom M. Mitchell, -MGH
2. Kevin Murphy, Machine Learning: A Probabilistic Perspective, MIT Press,2012
3. R. S. Sutton and A. G. Barto. Reinforcement Learning - An Introduction. MIT
Press.1998
Reference Books
1. Trevor Hastie, Robert Tibshirani, Jerome Friedman, The Elements of
Statistical Learning, Springer2009
2. Christopher Bishop, Pattern Recognition and Machine Learning,
Springer,2007.
3. Machine Learning Yearning, AndrewNg.
4. Data Mining–Concepts and Techniques -Jiawei Han and Micheline
Kamber,Morgan Kaufmann
Course Objectives:
Knowledge on concepts of IoT applications and IoT architectures, Event
driven analysis and security testing IoT systems
Course Outcomes:
UNIT - I:
The IoT Landscape: What Is IoT? Applications, Architectures, Wireless
Networks, Devices, Security and Privacy, Event-Driven Systems. IoT
System Architectures: Introduction, Protocols Concepts, IoT- Oriented
Protocols, Databases, Time Bases, Security.
UNIT - II:
IoT Devices & Event-Driven System Analysis: The IoT Device Design
Space, Cost of Ownership and Power Consumption, Cost per Transistor
and Chip Size, Duty Cycle and Power Consumption, Platform Design.
Event-Driven System Analysis: Introduction, Motivating Example, IoT
Network Model, Events, Networks, Devices and Hubs, Single-Hub
Networks, Multi-hub Networks, Network Models and Physical
Networks, IoT Event Analysis, Event Populations, Stochastic Event
Populations, Environmental Interaction Modeling, Event Transport and
Migration.
UNIT – III:
Industrial Internet of Things: Introduction, Industry 4.0, Industrial
Internet of Things (IIoT), IIoT Architecture, Basic Technologies,
Applications and Challenges.
UNIT - IV:
Security and Safety: Introduction, Systems Security, Network Security,
Generic Application Security, Application Process Security and Safety,
Reliable-and-Secure-by-Design IoT Applications, Run-Time Monitoring,
The ARMET Approach, Privacy and Dependability.
UNIT - V:
Security Testing IoT Systems: Introduction, Fuzz Testing for Security,
White-Box Fuzzing, Black-Box Fuzzing, Fuzzing Industrial Control
Network Systems, Fuzzing Modbus, The Modbus Protocol,
Modbus/TCP Fuzzer.
TEXT BOOKS:
1. Dimitrios Serpanos, Marilyn Wol, Internet-of-Things (IoT)
Systems Architectures, Algorithms, Methodologies, ISBN 978-3-
319-69714-7.
REFERENCE BOOKS:
1. Internet of Things – A hands-on approach, Arshdeep Bahga,
Vijay Madisetti, Universities Press, 2015.
2. The Internet of Things – Key applications and Protocols, Olivier
Hersent, David Boswarthick, Omar Elloumi and Wiley, 2012 (for
Unit 2).
3. ―From Machine-to-Machine to the Internet of Things –
Introduction to a New Age of Intelligence‖, Jan Holler, Vlasios
Tsiatsis, Catherine Mulligan, Stamatis, Karnouskos, Stefan
Avesand. David Boyle and Elsevier, 2014.
4. IoT Fundamentals: Networking Technologies, Protocols and Use
Cases for Internet of Things, David Hanes, Gonzalo Salgueiro,
Patrick Grossetete, Rob Barton and Jerome Henry, Cisco Press,
2017.
Course Outcomes: Upon completion of this course, the students will be able to:
UNIT - I:
Introduction to Industrial Internet and Use-Cases: Industrial Internet- Key
IIoT Technologies- Innovation and the IIoT -Key Opportunities and Benefits -
The Digital and Human Workforce - Logistics and the Industrial Internet- IOT
Innovations in Retail.
UNIT – II:
The Technical and Business Innovators of The Industrial Internet: Cyber
Physical Systems (CPS) – IP Mobility – Network Virtualization - SDN (Software
Defined Networks)- The Cloud and Fog – Role of Big Data in IIOT - Role of
Machine learning and AI in IIOT.
UNIT - III:
IIOT Reference Architecture: Industrial Internet Architecture Framework
(IIAF) -Industrial Internet Viewpoints -. Architectural Topology: The Three-Tier
Topology- Key System Characteristics- Data Management- Advanced data
analytics.
UNIT - IV:
Protocols for Industrial Internet Systems: Legacy Industrial Protocols -
Modern Communication Protocols-Proximity Network Communication
Protocols- Wireless Communication Technologies- Gateways: industrial
gateways - CoAP (Constrained Application Protocol) - NFC.
UNIT - V:
Middleware Software Patterns and IIOT Platforms: Publish/Subscribe Pattern:
MQTT, XMPP, AMQP, DDS- Middleware Architecture- SigFox- LoRaWAN
Augmented reality- Real-World Smart Factories
Application of IIOT: Case study: Health monitoring, Iot smart city, Smart
irrigation, Robot surveillance
TEXT BOOKS:
1. Gilchrist, Alasdair, ―Industry 4.0 The Industrial Internet of Things‖, Apress,
2017.
2. Zaigham Mahmood, ―The Internet of Things in the Industrial Sector:
Security and Device connectivity, smart environments and Industry
4.0 (Springer), 2019.
REFERENCE BOOKS
1. Sabina Jeschke, Christian Brecher, Houbing Song, Danda B. Rawat
―Industrial Internet of Things: Cyber manufacturing Systems‖
(Springer), 2017.
2. Industrial IoT Challenges, Design Principles, Applications, and Security by
Ismail Butun (editor)
3. Vijay Madisetti and Arshdeep Bahga, ―Internet of Things (A Hands-on-
Approach)‖, 1st Edition, VPT, 2014
4. Michahelles, ―Architecting the Internet of Things‖, ISBN 978-3- 642-19156-5
e-ISBN 978-3-642-
19157-2, Springer
5. Francis daCosta, ―Rethinking the Internet of Things: A Scalable
Approach to Connecting Everything‖, 1st Edition, Apress Publications,
20132 Cuno Pfister, Getting Started with the Internet of Things, O‟
Reilly Media, 2011, ISBN: 978-1-4493-9357-1
E-BOOK:
1. https://www.apress.com/gp/book/9781484220467
COURSE OBJECTIVES:
1. To learn the principles, architectures, algorithms and programming models used in distributed
systems.
2. To understand the algorithms of mutual exclusion, election & multicast communication.
3. To learn the different mechanisms for Inter process communication and remote invocations.
4. To acquire knowledge and implement sample distributed systems.
5. To learn transactions and concurrency control mechanisms in different distributed environments
UNIT-II Time and Global States: Introduction, Clocks Events and Process States,
Synchronizing Physical Clocks, Logical Time and Logical Clocks, Global States,
Distributed Debugging. Coordination and Agreement: Introduction, Distributed Mutual
Exclusion, Elections, Multicast Communication, Consensus and Related Problems.
UNIT-III Inter Process Communication: Introduction, The API for the Internet Protocols,
External Data Representation and Marshalling, Client-Server Communication, Group
Communication, Case Study: IPC in UNIX. Distributed Objects and Remote Invocation:
Introduction, Communication between Distributed Objects, Remote Procedure Call,
Events and Notifications, Case Study: JAVA RMI.
UNIT-IV Distributed File Systems: Introduction, File Service Architecture, Case Study
1: Sun Network File System, Case Study 2: The Andrew File System. Name Services:
Introduction, Name Services and the Domain Name System, Directory Services, Case
Study of the Global Name Services. Distributed Shared Memory: Introduction, Design
and Implementation Issues, Sequential Consistency and IVY case study, Release
Consistency, Munin Case Study, Other Consistency Models.
TEXT BOOKS:
1. Distributed Systems, Concepts and Design, George Coulouris, J Dollimore and Tim
Kindberg, Pearson Education, Edition. 2009. REFERENCE BOOKS
REFERENCES:
1. Distributed Systems, Principles and paradigms, Andrew S.Tanenbaum, Maarten Van
Steen, Second Edition,PHI.
2. Distributed Systems,An Algorithm Approach, Sikumar Ghosh, Chapman & Hall/CRC
Taylor & Fransis Group,2007.
I. COURSE OVERVIEW:
The course is designed to introduce to the basics of data science and use R for
statistical programming, data exploration, applications of data science and
various tools available for the data science. The main objective of the course is
to teach a range of topics and concepts related to the data science process. This
course reaches to student by power point presentations, lecture notes, and lab
which will give you the chance to apply knowledge of data science process.
Unit-IV Data Science Applications - Data Science and it‘s various applications
– Data Science Applications in Uses Cases Applications of Data Science - In
Search Engines, Social Media, Transportation, Banking, Financial Services and
Insurance (BFSI), Business and E-Commerce & Retail Applications, Health Care
Sector, Targeting Recommendation, Gaming Technology, Medicine and Drug
Development and Telecom etc.Introduction-Collecting and Analyzing Twitter
Data and YouTube Data.
Unit-V: Data Science Toolkit: Brief Introduction to data science tools: SaS,
Apache Spark, BigML, Excel, R-Programming, TensorFlow, KNIME, Tableau,
PowerBI etc with advantages and disadvantages.
VI. E BOOKS
1. https://www.programmer-books.com/introducing-data-science-pdf/
2. https://www.cs.uky.edu/~keen/115/Haltermanpythonbook.pdf
3. https://innovacion-tecnologia.com/wp-content/uploads/2020/09/DATA-
SCIENCE-FROM-SCRATCH.pdf
4. https://covid19.uthm.edu.my/wp-content/uploads/2020/04/Data-
Science-from-Scratch-First-Principles-with-Python-by-Joel-Grus-z-
lib.org_.epub_.pdf
UNIT-I
Introduction to Android Operating System: Android OS and Features – Android
development framework;
Installing and running applications on Android Studio, Creating AVDs, Types of
Android application; Creating Activities, Activity Life Cycle, Activity states,
monitoring state changes;
UNIT - II
Android application components – Android Manifest file, Externalizing recourses
like Simple Values, Drawables, Layouts, Menus, etc,
Building User Interfaces: Fundamental Android UI design, Layouts – Linear,
Relative, Grid and Table Layouts. User Interface (UI) Components
UNIT-III
Fragments – Creating fragments, Lifecycle of fragments, Fragment states, Adding
fragments to Activity, adding, removing and replacing fragments with fragment
transactions, interfacing between fragments and Activities,
UNIT-IV
Intents and Broadcasts: Using intents to launch Activities, Types of Intents,
Passing data to Intents, Getting results from Activities, Broadcast Receivers –
Using Intent filters to service implicit Intents, Resolving Intent filters;
UNIT-V
Database: Introduction to SQLite database, creating and opening a database,
creating tables, inserting retrieving and deleting data;
TEXT BOOKS:
1. Professional Android 4 Application Development, Reto Meier, Wiley India,
(Wrox), 2012
2. Android Application Development for Java Programmers, James C Sheusi,
Cengage Learning, 2013
REFERENCES:
1. Beginning Android 4 Application Development, Wei-Meng Lee, Wiley India
(Wrox), 2013
2. Android Application Development (with Kitkat Support), Black Book, Pradeep
Kothari, 2014, Dreamtech Press publisher, Kogent Learning Inc.,2014
3. Android Programming: Pushing the Limits, Erik Hellman, 1st Edition,Wiley
Publications, 2014
Course Outcomes:
Students will be able to :
1. Install and configure Android studio
2. Analyze architecture of android and current trends in mobile operating systems.
3. Apply suitable software tools and APIs for the development of User Interface for
a particular mobile application.
4. Apply in tents and broadcast receivers in android application.
5. Develop and design apps for mobile devices using SQLite Database.
Course Objectives:
List of Experiments:
TEXT BOOKS:
2. Data Mining Concepts and Techniques, Han, Kamber, 3rd Edition, Morgan
Kaufmann Publishers.
REFERENCE BOOKS:
1. Introduction to Data Mining, Tan, Steinbach and Kumar, Addison Wesley, 2006.
Course Outcomes:
Understand linear regression and logistic regression
Understand the functionality of different classifiers
Implement visualization techniques using different graphs
Apply descriptive and predictive analytics for different types of data
To introduce the basic concepts and techniques of Machine Learning and the need
of Machine Learning techniques in real-world problems.
To provide understanding of various Machine Learning algorithms and the way to
evaluate performance of the Machine Learning algorithms.
To apply Machine Learning to learn, predict and classify the real-world problems in
the Supervised Learning paradigms as well as discover the Unsupervised Learning
paradigms of Machine Learning.
To inculcate in students professional and ethical attitude, multidisciplinary
approach and an ability to relate real-world issues and provide a cost effective
solution to it by developing ML applications.
.
Week 3:
a) Creation and Loading different types of datasets in Python using the required
libraries.
i. Creation using pandas
ii. Loading CSV dataset files using Pandas
iii. Loading datasets using sklearn
Week 5: Write a program to demonstrate the working of the decision tree based ID3
algorithm by considering a dataset.
Week 6: Consider a dataset, use Random Forest to predict the output class. Vary the
number of trees as follows and compare the results:
i. 20
ii. 50
iii. 100
iv. 200
v. 500
Week 7: Write a Python program to implement Simple Linear Regression and plot the
graph.
Week 8: Write a Python program to implement Logistic Regression for iris using
sklearn and plot confusion matrix
Week 9: Build KNN Classification model for a given dataset. Vary the number of k
values as follows and compare the results:
i. 1
ii. 3
iii. 5
iv. 7
v. 11
Week 10: Implement Support Vector Machine for a dataset and compare the accuracy
by applying the following kernel functions:
i. Linear
ii. Polynomial
iii. RBF
Week 11: Write a python program to implement K-Means clustering Algorithm. Vary
the number of k values as follows and compare the results:
i. 1
ii. 3
iii. 5
Lab Outcomes:
Upon successful completion of this course, the students will be able to:
Understand the basic concepts and techniques of Machine Learning and the need of
Machine Learning techniques in real-world problems.
Understand various Machine Learning algorithms and the way to evaluate performance of
the Machine Learning algorithms
Apply Machine Learning to learn, predict t and classify the real-world problems in the
Supervised Learning paradigms as well as discover the Unsupervised Learning paradigms of
Machine Learning.
OBJECTIVES:
UNIT- I:
Inter-personal & Intra-Personal Communication
Sub Skill of Reading: Skimming
Writing: Resume Writing: Functional, Chronological, Targeted
Innovative Leadership and Design Thinking
UNIT-2:
Group Discussion: Factual, Opinion-Based, Abstract
Sub Skill of Reading: Scanning
Writing: Cover Letter
Trust and Collaboration
UNIT-3:
Debate
Sub Skill of Reading: Intensive Reading
Writing: Report Writing: Research Report, Analytical and Projects
Managing Personal Finance
UNIT-4:
Interview skills
Sub Skill of Reading: Extensive reading
Writing: PrécisWriting
Leadership and Managerial Skills
UNIT-5:
Mock Interviews
Reading: Cloze-Test
Writing: Mini Projects
Entrepreneurial Skills
1. Curriculum and Guide line for Life Skills, By UGC, August 2023
2. David F. Beer and David McMurrey, Guide to writing as an Engineer, John
Willey. New York, 2004
3. Diane Hacker, Pocket Style Manual, Bedford Publication, New York, 2003. (ISBN
0312406843)
4. Shiv Khera, You Can Win, Macmillan Books, New York, 2003.
5. Raman Sharma, Technical Communications, Oxford Publication, London, 2004.
6. Meenakshi Raman, Prakash Singh, Business communication, Oxford
Publication, New Delhi 2012.
7. Dale Jung k, Applied Writing for Technicians, McGraw Hill, New York, 2004.
(ISBN: 07828357-4)
8. Sharma, R. and Mohan, K. Business Correspondence and Report Writing, TMH
New Delhi 2002.
9. Xebec, Presentation Book, TMH New Delhi, 2000. (ISBN 0402213)
OUTCOMES:
Students will be able to
UNIT - I
Introduction: Distributed Data Processing, Distributed Database System, Promises of
DDBSs,Problem areas.
Distributed DBMS Architecture: Architectural Models for Distributed DBMS, DDMBS
Architecture. Distributed Database Design: Alternative Design Strategies,
Distribution Design issues, Fragmentation, Allocation.
UNIT - II
Query processing and decomposition: Query processing objectives, characterization
of query processors, layers of query processing, query decomposition, localization of
distributed data.
Distributed query Optimization: Query optimization, centralized query optimization,
distributed queryoptimization algorithms.
UNIT - III
Transaction Management: Definition, properties of transaction, types of transactions,
distributed concurrency control: serializability, concurrency control mechanisms &
algorithms, time - stamped & optimistic concurrency control Algorithms, deadlock
Management.
UNIT - IV
Distributed DBMS Reliability: Reliability concepts and measures, fault-tolerance in
distributed systems, failures in Distributed DBMS, local & distributed reliability
protocols, site failures and network partitioning.
Parallel Database Systems: Parallel database system architectures, parallel data
placement, parallel query processing, load balancing, database clusters.
UNIT - V
Distributed object Database Management Systems: Fundamental object concepts
and models, object distributed design, architectural issues, object management,
distributed object storage, object query Processing.
Object Oriented Data Model: Inheritance, object identity, persistent programming
languages,persistence of objects, comparison OODBMS and ORDBMS
TEXT BOOKS:
1. M. Tamer OZSU and Patuck Valduriez: Principles of Distributed Database
Systems, Pearson Edn. Asia, 2001.
2. Stefano Ceri and Giuseppe Pelagatti: Distributed Databases, McGraw Hill.
REFERENCE BOOK:
1. Hector Garcia-Molina, Jeffrey D. Ullman, Jennifer Widom: ―Database
Systems: The Complete Book‖, Second Edition, Pearson International Edition
COURSE OUTCOMES:
1. Understand theoretical and practical aspects of distributed database systems.
2. Study and identify various issues related to the development of distributed
database system.
3. Understand the design aspects of object-oriented database system and
relateddevelopment.
UNIT - I:
Introduction to Big Data: Big Data and its Importance – Four V‘s of Big Data – Drivers
for Big Data – Introduction to Big Data Analytics – Big Data Analytics applications.
UNIT - II:
Big Data Technologies: Hadoop‘s Parallel World – Data discovery – Open-source
technology for Big Data Analytics – cloud and Big Data –Predictive Analytics – Mobile
Business Intelligence and Big Data
UNIT - III:
Introduction Hadoop: Big Data – Apache Hadoop & Hadoop Eco System – Moving Data
in and out of Hadoop – Understanding inputs and outputs of MapReduce - Data
Serialization
UNIT - IV:
Hadoop Architecture: Hadoop: RDBMS Vs Hadoop, Hadoop Overview, Hadoop
distributors, HDFS, HDFS Daemons, Anatomy of File Write and Read., Name Node,
Secondary Name Node, and Data Node, HDFS Architecture, Hadoop Configuration,
Map Reduce Framework, Role of HBase in Big Data processing, HIVE, PIG.
UNIT - V:
Data Analytics with R Machine Learning: Introduction, Supervised Learning,
Unsupervised Learning, Collaborative Filtering, Social Media Analytics, Mobile
Analytics, Big Data Analytics with BigR.
TEXT BOOKS:
1. Big Data Analytics, Seema Acharya, Subhasini Chellappan, Wiley 2015.
2. Big Data, Big Analytics: Emerging Business Intelligence and Analytic Trends for
Today‘s Business, Michael Minelli, Michehe Chambers, 1st Edition, Ambiga Dhiraj,
Wiely CIO Series, 2013
3. Hadoop: The Definitive Guide, Tom White, 3rd Edition, O‟Reilly Media, 2012.
REFERENCE BOOKS:
1. Big Data and Business Analytics, Jay Liebowitz, Auerbach Publications, CRC press
(2013).
2. Professional Hadoop Solutions, Boris lublinsky, Kevin t. Smith, Alexey Yakubovich,
Wiley, ISBN: 9788126551071, 2015.
3. Understanding Big data, Chris Eaton, Dirk deroos et al. McGraw Hill, 2012.
COURSE OUTCOMES:
1. Ability to explain the foundations, definitions, and challenges of Big Data and
various Analytical tools
2. Ability to program using HADOOP and Map reduce, NOSQL
3. Ability to understand the importance of Big Data in social media and Mining.
COURSE OBJECTIVES:
UNIT-I
Introduction: Innovations in Design, Engineering Design Process, Prescriptive
and integrativemodels of design, Design Review and societal considerations.
Identification of Customer Need: Evaluating Customer requirements and
survey on customer needs, Conversion of customer needs into technical
Specifications, Information sources.
UNIT-II
Theory of Inventive Problem solving (TRIZ), Creativity and Problem solving,
Functional Decomposition of the problem for innovative concept development,
Introduction to Axiomatic Design, Concept evaluation and decision making.
UNIT-III
Design for Manufacturing: Technical estimating, design of experiments, design
for manufacturability, statistical process control, Introduction to FMEA (failure
modes and effects analysis), and Case study of design for manufacturing:
Manufacturing System Design Based on Axiomatic Design: Case of Assembly Line
UNIT-IV
Design for Assembly: Assembly Principles, Process, Worksheet, Assumptions.
Case study of design for Assembly: Manufacturing System Design Based on
Axiomatic Design: Case of Assembly Line
UNIT-V
Design for Environment: Design for recycling; Design for disassembly, Design
for energy Efficiency, Design for remanufacture, Design for disposability,
Hazardous material minimization. Case study of design for Environment.
TEXT BOOKS:
REFERENCE BOOKS
COURSE OUTCOMES:
UNIT - I
Cloud Computing Fundamentals: Definition of Cloud computing, Roots of Cloud
Computing , Layers and Types of Clouds, Desired Features of a Cloud, Cloud
Infrastructure Management, Infrastructure as a Service Providers, Platform as a
Service Providers. Computing Paradigms: High-Performance Computing, Parallel
Computing, Distributed Computing, Cluster Computing, Grid Computing.
UNIT- II
Migrating into a Cloud: Introduction, Broad Approaches to Migrating into the
Cloud, the Seven-Step Model of Migration into a Cloud.
Virtualization: Virtual Machines and Virtualization of Clusters and data centers-
Implementation Levels of Virtualization -Virtualization Structures/Tools and
Mechanisms- Virtualization of CPU, Memory, and I/O Devices-Virtual Clusters and
Data Centers
UNIT- III
Infrastructure as a Service (IAAS) & Platform (PAAS): Virtual machines
provisioning and Migration services, Virtual Machines Provisioning and
Manageability, Virtual Machine Migration Services, VM Provisioning and Migration in
Action. On the Management of Virtual machines for Cloud Infrastructures- Aneka—
Integration of Private and Public Clouds.
UNIT- IV
Software as a Service (SAAS) &Data Security in the Cloud: Software as a Service
SAAS), Google App Engine – Centralizing Email Communications- Collaborating via
Web- Based Communication Tools-An Introduction to the idea of Data Security.
UNIT- V
SLA Management in cloud computing: Traditional Approaches to SLO Management,
Types of SLA, Life Cycle of SLA, SLA Management in Cloud.
TEXT BOOKS:
1. Cloud Computing Principles and Paradigms, by Rajkumar Buyya
2. Essentials of cloud Computing: K. Chandrasekhran, CRC press, 2014
3. Michael Miller, Cloud Computing: Web-Based Applications That Change the
Way You Workand Collaborate Online, Que Publishing, August 2008.
REFERENCE BOOKS:
COURSEOUTCOMES:
1. Ability to analyze various service delivery models of cloud computing
2. Ability to interpret the ways in which the cloud can be programmed and deployed.
3. Ability to comprehend the virtualization and cloud computing concepts
4. Assess the comparative advantages and disadvantages of Virtualization technology
5. Analyze security issues in cloud computing
COURSE OBJECTIVES:
UNIT II: IoT PROTOCOLS- IoT Access Technologies: Physical and MAC layers,
topology and Security of IEEE 802.15.4, 802.11ah and Lora WAN, Network Layer: IP
versions, Constrained Nodes and Constrained Networks,6LoWPAN, Application
Transport Methods: SCADA, Application Layer Protocols: CoAP and MQTT.
TEXT BOOKS:
1. 6LoWPAN:TheWirelessEmbeddedInternet,ZachShelby,CarstenBormann,Wiley
2. Internet of Things: Converging Technologies for Smart Environments and
Integrated Ecosystems,Dr.Ovidiu Vermesan, Dr.Peter Friess, RiverPublishers
3. Interconnecting Smart Objects with IP: The Next Internet, Jean-Philippe Vasseur,
Adam Dunkels, Morgan Kuffmann
REFERENCE BOOKS:
COURSE OUTCOMES:
At the end of the course, the student will be able to
1) Understand IoT Networking Core
2) Understand IoT related network fundamentals
3) Understand IoT Architecture.
4) Understand IoT Application Development procedure
5) Understand various case studies and IoT applications.
TEXT BOOKS:
1. Nano Materials – A.K. Bandyopadhyay/ New Age Publishers
2. Nanocrystals: Synthesis, Properties and Applications – C.N.R. Rao, P. John Thomas
and G. U. Kulkarni, Springer Series in Materials Science
3. Nano Essentials- T. Pradeep/TMH
REFERENCES:
UNIT-I:
Introduction Overview of Electric Vehicles in India, India‘s EV program, Charging
and Swapping Infrastructure, brief introduction of batteries, Lithium for batteries,
EV Subsystems.
UNIT-II:
Vehicle Dynamics: Forces acting when a vehicle move, Aerodynamic drag,
Rolling Resistance and Uphill Resistance, Power and Torque to accelerate.
Drive Cycle: Concept of Drive Cycle, Drive Cycles and Energy used per km.
UNIT-III:
EV Power train: Design of EV Drive Train, Introduction to Battery Parameters, Why
Lithium Ion Battery? Batteries in Future, Li-Ion Battery Cells, SoH and SoC
estimation and Self Discharge, Battery Pack Development, Computation of
Effective cost of battery, Charging Batteries.
Fundamentals of EV Battery Pack design: Mechanical, Thermal and Electrical
Design, BMS Design of Electric Vehicle.
UNIT-IV:
EV Motors and Controllers: Fundamentals and Design, Understanding Flow of
Electricity, Magnetism and Heat, Power and Efficiency, Torque Production, Speed
and Back EMF, the d-q Equivalent circuit, Field-oriented Control, Understanding
Three phase AC and DC to AC conversion systems, Understanding the thermal
design of the motors, Engineering Considerations, Future Frontiers.
UNIT-V:
EV Charging: Introduction, Slow or Fast EV Chargers, Battery Swapping,
Standardization and On board Chargers, Public Chargers, Bulk Chargers/Swap
Stations, Economics of Public Chargers in context, Analytics and Tools for EV
systems.
TEXT BOOKS:
1. Electric Power train- Energy Systems, Power electronics and drives for Hybrid,
electric and fuel cell vehicles by John G. Hayes and A. Goodarzi, Wiley
Publication
2. MehrdadEhsani,YimiGao,SebastianE.Gay,AliEmadi,ModernElectric,Hybrid Electric
and Fuel Cell Vehicles: Fundamentals, Theory and Design, CRC Press, 2004
3. Iqbal Hussein, Electric and Hybrid Vehicles: Design Fundamentals,
CRCPress,2003
REFERENCE BOOKS:
1. James Larminie, John Lowry, Electric Vehicle Technology Explained, Wiley,2003
COURSE OUTCOMES:
Course Objectives:
1. To learn Principles of Cyber Security.
2. To learn various types of attacks and the precautions.
3. To gain the knowledge of security and governance measurements
4. To learn the analyticals and various security compliance in Cyber Security
through governance.
5. To gain the knowledge of various countries Cyber Security Principles and
Governance.
UNIT - I:
Principles of cyber-security governance, Assessment of cyber security maturity,
Theories of governance – introduction, Governance – definitions and typologies,
Tools, methods and processes,
UNIT - II:
Vulnerability management, Threat management, Endpoint management , Intrusion
detection and prevention system (IDPS), Security incident management, Security
operations center (SOC) and related concepts.
UNIT - III:
Measurement of governance: Metrics – concepts, Application security metrics,
Network security metrics, Security incident metrics, Vulnerability metrics, Service
level objectives / agreement (SLO / SLA), NIST metrics
UNIT - IV:
Basics of security analytics, Threat intelligence and governance, Data driven security
governance, Impact of cognitive security on security governance, Industry specific
security compliance
UNIT - V:
Cyber security governance India and Other countries, NIST mandates for compliance,
Security reporting basics, CISO – role and organization structure
TEXT BOOKS:
1. Hayden, Lance. IT Security Metrics: A Practical Framework for Measuring
Security & Protecting Data. McGraw-Hill Education Group, 2010.
2. Jacobs, Jay, and Bob Rudis. Data-driven security: analysis, visualization and
dashboards. John Wiley & Sons, 2014
3. Collins, Michael. Network Security Through Data Analysis: From Data to Action. ‖
O‘Reilly Media, Inc.‖, 2017.
4. Jaquith, Andrew. Security metrics: replacing fear, uncertainty, and doubt.
Pearson Education, 2007.
REFERENCE BOOKS:
1. Cybersecurity, Critical Infrastructure. ―Framework for Improving Critical
Infrastructure Cybersecurity.‖ Framework 1 (2014): 11.
Course Outcomes:
1. Students will be able to understand the basis of cyber-security.
2. Students will be able to know various governance principles
3. Students will learn about various types of attacks and threats in Security
4. Students will gain the knowledge of other countries standards, methods in
governance.
MAX. MARKS
S.No Subject Code SUBJECT L T P C
INT EXT
1 R22A0513 Full Stack Development 3 0 0 3 40 60
2 R22A6208 IoT Security & Privacy 3 0 0 3 40 60
3 R22A0520 Cloud Computing 3 1 0 4 40 60
Professional Elective-III:
R22A6621 1. Generative AI
4 R22A6214 2. Database Security 3 0 0 3 40 60
R22A6613 3. Computer Vision
R22A6203 4. Ethical Hacking
Professional Elective-IV:
R22A6907 1. IoT Automation
5 R22A0524 2. Blockchain Technology 3 0 0 3 40 60
R22A6905 3. Architecting Smart IoT Devices
R22A0523 4. DevOps
6 R22A0589 Full Stack Development Lab 0 0 2 1 40 60
7 R22A6994 Project Development (Phase-I) 0 0 6 3 40 60
Total 15 1 8 20 280 420