0% found this document useful (0 votes)
16 views27 pages

5th 6th

324v 345435
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
16 views27 pages

5th 6th

324v 345435
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 27

Department of Computer Science & Engineering

Department of Computer Science & Engineering


6thSemester

6TH SEMESTER
Contact
Course
Course Code Course Hours Credit
Category
(L-T-P)
THEORY

ETCST309 E-Commerceand ERP PC 3-0-0 03


Advance Programming (C# / PhP /.Net
ETCST310 PC 3-1-0 03
/ Python /Java)
Data Communication and Computer
ETCST311 PC 3-0-0 03
Network
Professional Elective – II
(Systems)

ETCST312 Data Analytics

ETCST313 Parallel and Distributed Systems PE 3-0-0 3

ETCST314 Data Warehousing & Data Mining

ETCST315 Ad-Hoc and Sensor Network

Open Elective-I

ETMAT301 Numerical Methods


OE 2-1-0 2
ETCST324 Cyber Law and Ethics

ETECT324 Digital Signal Processing

SESSIONALS

ETCSS304 Seminar & Technical Report Writing-I Seminar 0-0-4 02

Business Communication & Skill for


ETHSS302 HSS 0-0-2 01
Interview
ETCSS305 Computer Networking Laboratory PC 0-0-3 02

ETCSS306 Advance Programming Laboratory PC 0-0-6 03

TOTAL CREDIT 22

24
Department of Computer Science & Engineering
6thSemester

ETCST309: E-COMMERCE AND ERP

TEACHING SCHEME: 3-0-0 (L-T-P) CREDIT: 3

COURSE OBJECTIVES:
To introduce the concept of electronic commerce, and to understand how electronic
commerce is affecting business enterprises, governments, consumers and people in general.

MODULE – I (12 Classes)


Introduction - Definition of Electronic Commerce, E-Commerce technology and prospects,
needs of E-Commerce, advantages and disadvantages, Impact of E-commerce on business, E-
commerce models. Network Infrastructure, Network Access Equipments, Broadband
telecommunication (ATM, ISDN, FRAME RELAY), Mobile Commerce: Introduction, Wireless
Application Protocol, WAP technology, Mobile Information device.

MODULE – II (08 Classes)


Internet and Intranet based E-commerce, Electronic Market, Business to Business E-
Commerce, Four C`s (Convergence, Collaborative Computing, Content Management and Call
Center), Wireless Application Protocol (WAP), Intranet and Extranets. Data Interchange (EDI),
Electronic Payment Systems, E-Security.

MODULE – III (08 Classes)


Web Security: Security Issues on web, Importance of Firewall, Transaction security, Security
Threats Security Threats, Network Security, Factors to consider in Firewall design, Limitation of
Firewalls.

MODULE – IV (12 Classes)


Overview of enterprise systems – Evolution - Risks and benefits - Fundamental technology -
Issues to consider in planning designing and implementation of cross functional integrated
ERPSystems, ERP Implementation -Planning, Evaluation and selection of ERP systems,
Implementation life cycle - ERP implementation, Methodology, Data Migration, Success and
Failure factors of ERP Implementation.

25
Department of Computer Science & Engineering
6thSemester

COURSE OUTCOMES:
At the end of the course, the student will be able to:
CO CODE CO STATEMENT COGNITIVE LEVEL
ETCST309.1 Explain the components and roles of the Electronic APPLY
Commerce environment.
ETCST309.2 Explain how businesses sell products and services on APPLY
the Web.
ETCST309.3 Describe the qualities of an effective Web business CREATE
presence
ETCST309.4 Explain how to meet the needs of Web site visitors APPLY
ETCST309.5 Understand legal and ethical issues related to E- UNDERSTAND
Commerce

TEXT BOOKS
1. Ravi Kalakota, Andrew Winston, “Frontiers of Electronic Commerce”, Addison Wesley.
2. Enterprise Resource Planning- Concepts and Practices; V K Garg and N K Venkatkrishna,
PHI.

REFERENCE BOOKS
1. E- Commerce and Enterprise Resource Planning: CSV Murthy, HPH.
2. Bajaj and Nag, “E-Commerce the cutting edge of Business”, TMH.
3. Pete Lohsin, John Vacca “Electronic Commerce”, New Age International.
4. Laudon, “E-Commerce: Business, Technology, Society”, Pearson Education.

26
Department of Computer Science & Engineering
6thSemester

ETCST310: ADVANCED PROGRAMING

TEACHING SCHEME:3-1-0 (L-T-P) CREDIT: 3

COURSE OBJECTIVES:
1. Describe the core syntax and semantics of Python programming language.
2. Discover the need for working with the strings and functions.
3. Illustrate the process of structuring the data using lists, dictionaries, tuples andsets.
4. Indicate the use of regular expressions and built-in functions to navigate the filesystem.
5. Infer the Object-oriented Programming concepts inPython.

Module I (10 Classes)


Introduction: Parts of Python Programming Language History of Python, Need of Python
Programming, Applications Basics of Python Programming Using the REPL(Shell), Running
Python Scripts, Variables, Assignment, Keywords, Input-Output, Statements and Expressions,
Variables, Operators, Precedence and Associativity, Data Types, Indentation, Comments,
Reading Input, Print Output, Type Conversions, The type() Function and Is Operator, Dynamic
and Strongly Typed Language.

ModuleII (10 Classes)


Types, Operators, and Expressions: Types – Integers, Strings, Booleans; Operators- Arithmetic
Operators, Comparison (Relational) Operators, Assignment Operators, Logical Operators,
Bitwise Operators, Membership Operators, Identity Operators, Expressions and order of
evaluations ,Control Flow Statements,The if Decision Control Flow Statement, The if…else
Decision Control Flow Statement, The if…elif…else Decision Control Statement, Nested if
Statement, The while Loop, The for Loop, The continue and break Statements, for, while break,
continue, pass.

Module III (10 Classes)


Functions – Defining Functions, Calling Functions, Passing Arguments, Keyword Arguments,
Default Arguments, Variable-length arguments, Anonymous Functions, Fruitful Functions
(Function Returning Values), Scope of the Variables in a Function- Global and Local Built-In
Functions Used on Tuples, Default Parameters, Keyword Arguments, Command Line
Arguments.

27
Department of Computer Science & Engineering
6thSemester
Module IV (10 Classes)
Data Structures Lists – Dictionaries, Creating Dictionary, Accessing and Modifying key value
Pairs in Dictionaries, Built-In Functions Used on Dictionaries, Dictionary Methods, The del
Statement,Tuples and Sets,Creating Tuples, Basic Tuple Operations, Indexing and Slicing in
Tuples, Relation between Tuples and Lists, Relation between Tuples and Dictionaries, Tuple
Methods, Operations, Sequences. Comprehensions. Modules: Creating modules, import
statements, from. The import statement, namespacing, Python packages, Introduction to PIP,
Installing Packages via PIP, Using Python Packages

TEXT BOOK:
1. Gowrishankar S, Veena A,“Introduction to Python Programming”,1st
Edition,CRCPress/Taylor&Francis,2018.ISBN-13: 978-0815394372.
REFERENCE BOOKS / WEBLINKS:
1. Jake VanderPlas,“Python Data Science Handbook: Essential Tools for Working with
Data”,1st Edition, O'Reilly Media, 2016.ISBN-13:978-1491912058
2. AurelienGeron,“Hands-On Machine Learning with Scikit-Learn and TensorFlow: Concepts,
Tools, and Techniques to Build Intelligent Systems”,2nd Edition, O’Reilly Media, 2019.ISBN–
13:978-9352139057.
3. Wesley J Chun,“Core Python Applications Programming”,3rd Edition, Pearson Education
India, 2015.ISBN-13:978-9332555365
4. Miguel Grinberg,“Flask Web Development: Developing Web Applications with Python”,2nd
Edition, O'Reilly Media, 2018.ISBN-13:978-1491991732.

COURSE OUTCOMES:
At the end of the course, the student will be able to:
CO CODE CO STATEMENT COGNITIVE LEVEL
ETCST310.1 Interpret the fundamental Python syntax and
semantics and be fluent in the use of Python control Remembering
flow statements.
ETCST310.2 Express proficiency in the handling of strings and
Evaluate
functions.
ETCST310.3 Determine the methods to create and manipulate
Python programs by utilizing the data structures like Analyze
lists, dictionaries, tuples and sets.
ETCST310.4 Identify the commonly used operations involving file
Evaluate
systems and regular expressions.
ETCST310.5 Articulate the Object-Oriented Programming concepts
Analyze
such as encapsulation, inheritance and polymorphism.

28
Department of Computer Science & Engineering
6thSemester

ETCST311: DATA COMMUNICATION AND COMPUTER NETWORK


TEACHING SCHEME: 3-0-0 (L-T-P) CREDIT: 3

COURSE OBJECTIVES:
• Concept and implementation of computer networks; architecture, protocol layers,
internetworking and addressing; network application development.

Module – I (10 Hours)


Overview of Data Communication Networks, Protocols and standards, OSI Reference model,
TCP/IP Protocol. Physical Layer: Analog Signals, Digital Signals, Data Rate Limits,
Transmission Impairment, Data rate limit, Digital Transmission: Digital-to-Digital conversion,
Analog-to-Digital conversion, Transmission modes, Analog Transmission: Digital-to-Analog
conversion, Analog-to-Analog conversion, Multiplexing: Frequency Division Multiplexing (FDM),
Wave Division Multiplexing (WDM), Time Division Multiplexing (TDM), Transmission Media:
Guided Media (Twisted-Pair Cable, Coaxial Cable and Fiber-Optic Cable) and unguided media
(wireless), Switching: Circuit Switched Network, Datagram Network, Virtual-Circuit Network ,
Telephone Network

Module – II (10 Hours)


Error Detection and correction: Types of Errors, Error Detection mechanism (Linear codes,
CRC, Checksum), Error Correction mechanism: Hamming Encoding. Data Link Control and
Protocols: Flow and Error Control, Stop-and-Wait ARQ. Go-Back-N ARQ, Selective Repeat
ARQ, HDLC and Point-to-Point Protocol Multiple Access: Random Access (ALOHA, CSMA,
CSMA/CD, CSMA/CA), Controlled Access (Polling, Reservation, Token Passing),
Channelization (FDMA, TDMA, and CDMA). Wired LANs (Ethernet): Traditional Ethernet, Fast
Ethernet, and Gigabit Ethernet.

Module – III (10 Hours)


Wireless LANs: IEEE 802.11 and Bluetooth. Connecting Devices: Passive Hub, Repeater,
Active Hub, Bridge, Two layers Switch, Router, Three layers Switch, Gateway. Virtual Circuit
Networks: Frame Relay, Architecture & layers, ATM: Design goals, Architecture & layers.
Network Layer: IPV4 addresses, IPV6 addresses, Internet Protocol: Internetworking, IPV4
datagram, IPV6 packet format and advantages. Network Layer Protocols: ARP, RARP, IGMP
and ICMP. Routing: Unicast Routing Protocols and Multicast Routing Protocols.

29
Department of Computer Science & Engineering
6thSemester
Module – IV (10 Hours)
Transport Layer: Process to Process Delivery, User Datagram Protocol (UDP) and
Transmission Control Protocol (TCP).Domain Name System (DNS): Name Space, Domain
Name Space, DNS in Internet, Resolution andDynamic Domain Name System (DDNS), Remote
logging, Electronic Mail (SMTP) and filetransfer (FTP), WWW: Architecture & Web document,
HTTP: Transaction & Persistent vs.Non-persistent connection.Introduction to Wi-Fi and Li-Fi
Technology.

COURSE OUTCOMES:
At the end of the course, the student will be able to:
CO CODE CO STATEMENT COGNITIVE LEVEL
ETCST311.1 Independently understand basic computer network Remembering
technology and Understand and explain Data
Communications System and its components.
ETCST311.2 Identify the different types of network topologies and Evaluating
protocols.
ETCST311.3 Identify the different types of network devices and their Evaluating
functions within a network
ETCST311.4 Understand and building the skills of sub-netting and Understanding
routing mechanisms
ETCST311.5 Familiarity with the basic protocols of computer Creating
networks, and how they can be used to assist in
network design and implementation.

Text Books:
1. Data Communications and Networking, Behrouz A. Forouzan, Tata McGraw-Hill.
2. Computer Networks, A. S. Tannenbum, D. Wetherall, Prentice Hall, Imprint of Pearson.

Reference Books:
1. Computer Networks A system Approach, Larry L, Peterson and Bruce S. Davie,
Elsevier.
2. Data Communication and Computer network ,Dr.SanjayaSharma,edited by Deeksha
Sharma and V. Sharma S.K Kataria and sons.
3. Data and Computer Communications, William Stallings, Prentice Hall, Imprint of Pearson.

30
Department of Computer Science & Engineering
6thSemester

ETCST312: DATA ANALYTICS


TEACHING SCHEME: 3-0-0 (L-T-P) CREDIT: 3

COURSE OBJECTIVES:
1. To introduce students to the fundamental concept of Big data.
2. To learn the different ways of Data Analysis.
3. To learn the concept of clustering.
4. Be familiar with Virtualization.

COURSE CONTENT:

MODULE – I (12 Classes)


Introduction to Big Data platform: Challenges of conventional system, web data, Evolution of
Analytic Scalability, Analytic process and tools, Analysis vs Reporting, Modern Data Analytics
tools, Statistical Concept: Sampling distribution, resampling, statistical inference, Prediction
error.

MODULE – II (12 Classes)


Predicative Analysis: supervised learning, Linear Regression Model and Least squares,
Subset Selection, Ridge Regression, Lasso Regression, Linear Discriminant Analysis, Logistic
Regression.
Neural Network: Fitting neural network, Back propagation, SVM for Classification, SVM for
regression.
Unsupervised Learning: Association rules, Cluster Analysis, Random forest and Analysis.

MODULE – III (10 Classes)


Prespective Analysis: Assessing performance of a Classification Algorithm(t-test, McNemar’s
test, Paired t-test, Paired F-test).

MODULE– IV (8 Classes)
Framework and Visualisation: MapReduce-Hadoop, MapR-sharding, No SQL Database, S3-
Hadoop, Distributed file system, Visualisation, Visual Data Analysis technique.

31
Department of Computer Science & Engineering
6thSemester
COURSE OUTCOMES:
At the end of the course, the student will be able to:
CO CODE CO STATEMENT COGNITIVE LEVEL
ETCST305.1 Design an efficient recommendation system. Create
ETCST305.2 Design the tools for visualization. Create

ETCST305.3 Working with Big Data tools and its analysis Apply
techniques.

ETCST305.4 Learn No SQL Database and management. Analyze

TEXT BOOKS:
1. AnandRajaraman and Jeffery David Ullman, Mining of Massive Datasets, Cambridge
University Press, 2012.
2. Trevor Hastie, Robert Tibshirani, Jerome Friedman,”The Element of Statical Learning-Data
mining, Inference and prediction”, 2nd Edition, Springer, Verlag,2009.
3. E. Alpaydin, Introduction to machine learning, Prentice Hall of India, 2010(Chapter-19).

REFERENCE BOOKS:
1. Michael Berthold, David J. Hand, Intelligent Data Analysis, Springer, 2007.
2. David Loshin, “Big Data Analytics: From strategic planning to Enterprise Integration with
Tools, Techniques, NoSQL and graph, 2013.

32
Department of Computer Science & Engineering
6thSemester

ETCST313: PARALLEL AND DISTRIBUTED SYSTEMS

TEACHING SCHEME: 3-0-0 (L-T-P) CREDIT: 3

COURSE OBJECTIVES:
To learn the advanced concepts of Parallel and Distributed Computing andits
implementation for assessment of understanding the course by the students

MODULE- I [10 Classes]


Scope, issues, applications and challenges of Parallel and Distributed Computing Parallel
Programming Platforms: Implicit Parallelism: Trends in Microprocessor Architectures,
Dichotomy of Parallel Computing Platforms, Physical Organization, Communication Costs in
Parallel Machines, Routing Mechanisms for Interconnection Networks, GPU, Co-processing.

MODULE- II [8 Classes]
Principles of Parallel Algorithm Design: Decomposition Techniques, Characteristics of Tasks
and Interactions, Mapping Techniques for Load Balancing.

MODULE- III [10 Classes]


Analytical Modeling of Parallel Programs: Sources of Overhead in Parallel Programs,
Performance Metrics for Parallel Systems, The Effect of Granularity on Performance, Scalability
of Parallel Systems, Minimum Execution Time and Minimum Cost-Optimal Execution Time

MODULE -IV [12 Classes]


Dense Matrix Algorithms: Matrix-Vector Multiplication, Matrix-Matrix Multiplication, Issues
inSorting on Parallel Computers, Bubble Sort and Variants, Quick Sort, Other Sorting Algorithms
GraphAlgorithms: MinimumSpanning Tree: Prim's Algorithm, Single-Source Shortest
Paths:Dijkstra'sAlgorithm, All-Pairs Shortest Paths, Transitive Closure, Connected Components,
Algorithms for Sparse Graph Search Algorithms for Discrete Optimization Problems: Sequential
Search Algorithms, Parallel Depth-First Search, Parallel Best-First Search, Speedup Anomalies
in Parallel Search Algorithms.

33
Department of Computer Science & Engineering
6thSemester
COURSE OUTCOMES:
At the end of the course, the student will be able to:
CO CODE CO STATEMENT COGNITIVE LEVEL
ETCST313.1 Students will be knowledgeable in concept of Parallel Create
systems.
ETCST313.2 Students will be knowledgeable with different Apply
Parallel Programming Methods
ETCST313.3 Students will be fluent in different types of calculation Apply
related to Parallel Models.
ETCST313.4 Students will be apply different Graph and Search Apply
algorithms to solve various Problems

TEXT BOOK
1. A Grama, AGupra, G Karypis, V Kumar. Introduction to Parallel Computing (2nd ed.).
Addison Wesley, 2003

REFERENCE BOOKS
1. C Lin, L Snyder. Principles of Parallel Programming. USA: Addison-Wesley Publishing
Company, 2008.
2. J Jeffers, J Reinders. Intel Xeon Phi Coprocessor High-Performance Programming. Morgan
Kaufmann Publishing and Elsevier, 2013.
3. T Mattson, B Sanders, B Massingill. Patterns for Parallel Programming. Addison-Wesley
Professional, 2004.

34
Department of Computer Science & Engineering
6thSemester

ETCST314: DATA WAREHOUSING & DATA MINING


TEACHING SCHEME: 3-0-0 (L-T-P) CREDIT: 3

COURSE OBJECTIVES:
This course will introduce the concepts of data ware house and data mining, which gives
a complete description about the principles, used, architectures, applications, design and
implementation of data mining and data ware housing concepts.

COURSE CONTENT:
MODULE – I (10 Classes)
Introduction: Fundamentals of data mining, Data Mining Functionalities, Classification of Data
Mining systems, Data Mining Task Primitives, Integration of a Data Mining System with a
Database or a Data Warehouse System, Major issues in Data Mining. Data Preprocessing:
Need for Preprocessing the Data, Data Cleaning, Data Integration and Transformation, Data
Reduction, Discretization and Concept Hierarchy Generation.

MODULE – II (14 Classes)


Data Warehouse and OLAP Technology for Data Mining: Data Warehouse, Multidimensional
Data Model, Data Warehouse Architecture, Data Warehouse Implementation, Further
Development of Data Cube Technology, From Data Warehousing to Data Mining Data Cube
Computation and Data Generalization: Efficient Methods for Data Cube Computation, Further
Development of Data Cube and OLAP Technology, Attribute-Oriented Induction.
Mining Frequent Patterns, Associations and Correlations: Basic Concepts, Efficient and
Scalable Frequent Item set Mining Methods, Mining various kinds of Association Rules, From
Association Mining to Correlation Analysis, Constraint-Based Association Mining

MODULE – III (16 Classes)


Classification and Prediction: Issues Regarding Classification and Prediction, Classification by
Decision Tree Induction, Bayesian Classification, Rule-Based Classification, Classification by
Back propagation, Support Vector Machines, Associative Classification, Lazy Learners, Other
Classification Methods, Prediction, Accuracy and Error measures, Evaluating the accuracy of a
Classifier or a Predictor, Ensemble Methods.

35
Department of Computer Science & Engineering
6thSemester
Cluster Analysis Introduction :Types of Data in Cluster Analysis, A Categorization of Major
Clustering Methods, Partitioning Methods, Hierarchical Methods, Density-Based Methods, Grid-
Based Methods, Model-Based Clustering Methods, Clustering High-Dimensional Data,
Constraint-Based Cluster Analysis, Outlier Analysis

COURSE OUTCOMES:
At the end of the course, the student will be able to:
CO CODE CO STATEMENT COGNITIVE LEVEL
1 Understand the functionality of the various data mining Understand
and data warehousing component Knowledge
2 Appreciate the strengths and limitations of various data Apply, Create
mining and data warehousing models Apply
3 Explain the analyzing techniques of various data Analyze
Analyze
4 Describe different methodologies used in data mining Analyze
and data ware housing.
5 Compare different approaches of data ware housing Evaluating
and data mining with various technologies.

TEXT BOOKS:
1. Data Mining-Concepts and Techniques- Jiawei Han, MichelineKamber, Morgan Kaufmann
Publishers, Elsevier, 2 Edition, 2006.
2. Introduction to Data Mining, Pang-Ning Tan, Vipin Kumar, Michael Steinbanch, Pearson
Education.

REFERENCE BOOKS:
1. Data Mining Techniques, Arun K Pujari, 3rd Edition, Universities Press.
2. Data Ware Housing Fundamentals, PualrajPonnaiah, Wiley Student Edition.
3. The Data Ware House Life Cycle Toolkit- Ralph Kimball, Wiley Student Edition.
4. Data Mining, VikaramPudi, P Radha Krishna, Oxford University.

36
Department of Computer Science & Engineering
6thSemester

ETCST315: ADHOC AND SENSOR NETWORK


TEACHING SCHEME: 3-0-0 (L-T-P) CREDIT: 3

COURSE OBJECTIVES:
1. Understand the design issues in ad hoc and sensor networks.
2. Learn the different types of MAC protocols.
3. Be familiar with different types of Adhocrouting protocols.
4. Be expose to the TCP issues in Adhocnetworks.
5. Learn the architecture and protocols of wireless sensor networks.

MODULE – I (8 Classes)
INTRODUCTION
Fundamentals of Wireless Communication Technology – The Electromagnetic Spectrum –
Radiopropagation Mechanisms – Characteristics of the Wireless Channel -mobile ad hoc
networks(MANETs) and wireless sensor networks (WSNs):Concepts and architectures,
Applications of Ad Hoc and Sensor networks. Design Challenges in Ad hoc and Sensor
Networks.

MODULE ─ II (12 classes)


MAC PROTOCOLS FOR AD HOC WIRELESS NETWORKS
Issues in designing a MAC Protocol- Classification of MAC Protocols- Contention based
protocols-Contention based protocols with Reservation Mechanisms- Contention based
protocols withScheduling Mechanisms – Multi channel MAC-IEEE 802.11
ROUTING PROTOCOLS AND TRANSPORT LAYER IN AD HOC WIRELESS NETWORKS:
Issues in designing a routing and Transport Layer protocol for Ad hoc networks- proactive
routing,reactive routing (on-demand), hybrid routing- Classification of Transport Layer solutions-
TCP overAd hoc wireless Networks.

MODULE ─III (10 classes)


WIRELESS SENSOR NETWORKS (WSNS) AND MAC PROTOCOLS
Single node architecture: hardware and software components of a sensor node – WSN
Network architecture: typical network architectures-data relaying and aggregation strategies -
MAC layer protocols: self-organizing, Hybrid TDMA/FDMA and CSMA based MAC- IEEE
802.15.4.
37
Department of Computer Science & Engineering
6thSemester
MODULE ─IV (10 Classes)
WSN ROUTING, LOCALIZATION & QOS
Issues in WSN routing – OLSR-Localization – Indoor and Sensor Network Localization-absolute
andrelative localization, triangulation-QOS in WSN-Energy Efficient Design-Synchronization-
Transport Layer issues.

COURSE OUTCOMES:
At the end of the course, the student will be able to:
CO CODE CO STATEMENT COGNITIVE LEVEL
ETCST315.1 Explain the concepts, network architectures and Apply
applications of ad hoc and wireless sensor networks
ETCST315.2 Analyze the protocol design issues of ad hoc and Apply
sensor networks
ETCST315.3 Design routing protocols for ad hoc and wireless Apply
sensor networks with respect to some protocol design
issues
ETCST315.4 Evaluate the QoS related performance measurements Apply
of ad hoc and sensor networks

TEXT BOOK:
1. C. Siva Ram Murthy, and B. S. Manoj, “Ad Hoc Wireless Networks: Architectures and
Protocols “,Prentice Hall Professional Technical Reference, 2008.

REFERENCE BOOKS:
1. Carlos De MoraisCordeiro, Dharma Prakash Agrawal “Ad Hoc & Sensor Networks:Theory
and Applications”, World Scientific Publishing Company, 2006.
2. Feng Zhao and LeonidesGuibas, “Wireless Sensor Networks”, Elsevier Publication –2002.
3. Holger Karl and Andreas Willig “Protocols and Architectures for Wireless Sensor
Networks”,Wiley, 2005
4. KazemSohraby, Daniel Minoli, &TaiebZnati, “Wireless Sensor Networks-
Technology,Protocols, and Applications”, John Wiley, 2007.
5. Anna Hac, “Wireless Sensor Network Designs”, John Wiley, 2003.

38
Department of Computer Science & Engineering
6thSemester

ETMAT301: NUMERICAL METHODS

TEACHING SCHEME: 2-1-0 (L-T-P) CREDIT: 2

COURSE OBJECTIVES:
1. This course is an introduction to a broad range of numerical methods for solving
mathematical problems that arise in Science and Engineering.
2. The goal is to provide a basic understanding of the derivation, analysis, and use of
these numerical methods along with a rudimentary understanding of finite precision.
3. This will help to choose, develop and apply the appropriate numerical techniques for
day to day problems. Moreover, it interprets the results and assesses accuracy.

COURSE CONTENT

MODULE-I (10 hours)

System of Linear Equations: Introduction, Gauss Elimination, Gauss Jordon Elimination,


Gauss Jacobi and Gauss Seidal method, convergence condition, LU decomposition, Matrix
Inversion.

MODULE-II (10 hours)

Single Variable Optimization: Optimality Criterion, Bracketing methods - Exhaustive Search


Method, Bounding Phase Method, Region Elimination Method - Interval Halving Method,
Fibonacci Search Method, Golden Section Search Method, Point Estimation Method -
Successive quadratic estimation method, Gradient based methods - Newton Raphson Method,
Bisection Method, Secant Method, Cubic Search Method, Root Finding Method using
Optimization Technique.

MODULE-III (10 hours)

Curve Fitting and Regression Analysis: Least square method, Linear regression, Polynomial
regression, Fouries regression, Non linear regression, Interpolation – Newton’s forward and
backward interpolation, Newton’s divided difference interpolation, Lagrange’s interpolation,
Gauss’s central difference interpolation

39
Department of Computer Science & Engineering
6thSemester
MODULE-IV (10 hours)

Partial Differential Equations: Introduction to PDE Elliptic, Parabolic & Hyperbolic Equation,
Finite Difference Schemes, Forward, Backward and Central Difference, Application to Laplace &
Poisson’s Equation, Iterative & Relaxation Techniques, Laplacian Operator in Cartesian, polar
and other coordinate systems. Solution of Parabolic Equations, Implicit & Explicit Schemes,
Crank Nicholson, ADI scheme. Solution of Hyperbolic Equations.

COURSE OUTCOMES:
At the end of the course, the student will be able to:
CO CODE CO STATEMENT COGNITIVE LEVEL
ETMAT301.1 Implement these methods for solving algebraic, Apply
transcendental and linear equations.
ETMAT301.2 Select these methods for solving single variable Evaluate
optimization problems.
ETMAT301.2 Use these methods for fitting different curves using Apply
regression and interpolation techniques.
ETMAT301.3 Design the methods for solving ordinary and partial Create
differential equations and design computer programs
for the various numerical methods in order to solve
engineering problems.

TEXT BOOKS:
1. Numerical Analysis9th Edition, by Richard L. Burden , J. Douglas Faires,Annette M. Burden,
Cengage Publication
2. Optimization for Engineering Design - Algorithms and Examples, Kalyanmayi Deb, PHI Pvt.
Ltd

REFERENCE BOOKS:
1. Numerical Methods by Engineers by Steven Chapra and Raymond P Canale, TMH
Publications.
2. Numerical Methods for Engineers and Scientists, J D Hoffman, Marcel Dekker.
3. Numerical Methods, B. S. Grewal, Khanna Publishers Ltd.

40
Department of Computer Science & Engineering
6thSemester

ETCST324: CYBER LAWS AND ETHICS


TEACHING SCHEME: 3-0-0 (L-T-P) CREDIT: 3

COURSE OBJECTIVES:
1. Understand privacy, intellectual property rights, contracts & licenses as well as common
criminal issues.
2. Understand the legal obligations of a computer professional.
3. Understand computer ethics and the importance of professional codes of conduct.

COURSE CONTENT:

Module I (15 Classes)


Introduction: Overview of Computer and Web Technology, Need for Cyber Law,Cyber
Jurisprudence at International and Indian Level. Jurisdictional Aspects in Cyber Law ,Issues of
jurisdiction in cyberspace,Types of jurisdiction ,The Test evolved - Minimum Contacts Theory ,
Sliding Scale Theory ,Effects Test and International targeting , Jurisdiction under IT Act, 2000.

Module II (15 Classes)


Cyber Crimes& Legal Framework : Cyber Crimes against Individuals, Institution and
State,Hacking,Digital Forgery, Cyber Stalking/Harassment, Cyber Pornography, Identity Theft &
Fraud ,Cyber Terrorism, Cyber Defamation , Right to Privacy and Data Protection on Internet :
Concept of privacy Threat to privacy on internet - Self-regulation approach to privacy -
Ingredients to decide confidentiality of information - Breach of sensitive personal information
and confidentiality under IT Act and penalties for the same. Right of Interception under IT Act.

Module III (10 Classes)


Concept of public key and private key - Certification authorities and their role - Creation and
authentication of digital signature - Concept of electronic signature certificates,Electronic
Governance - Concept of electronic records and electronic signatures - Rules for attribution,
acknowledgement and dispatch of such records. Intellectual Property Issues in Cyber
Space,Interface with Copyright Law,Interface with Patent Law, Trademarks &Domain Names
Related issues, Dispute Resolution in Cyberspace.

41
Department of Computer Science & Engineering
6thSemester
COURSE OUTCOMES:
At the end of the course, the student will be able to:
CO CODE CO STATEMENT COGNITIVE LEVEL
HST 301-1 1. Students identify and analyze statutory, regulatory, Analyze ,Apply
constitutional, and organizational laws that affect the
information technology professional.
HST 301-2 2. Students locate and apply case law and common Analyze
law to current legal dilemmas in the technology field.
HST 301-3 3. Students apply diverse viewpoints to ethical Apply
dilemmas in the information technology field and
recommend appropriate actions.
HST 301-4 4. Students distinguish enforceable contracts from Analyze
non-enforceable contracts.

TEXT BOOKS:
1. Karnika Seth, Computers, Internet and New Technology Laws, Lexis
NexisButterworthsWadhwa Nagpur.
2. Justice YatindraSingh,Cyber Laws, Universal Law Publishing Co, New Delhi, (2012).

REFERENCES BOOKS:
1. SudhirNaib, The Information Technology Act, 2005: A Handbook, OUP, New York, (2011)
2. S. R. Bhansali, Information Technology Act, 2000, University Book House Pvt. Ltd., Jaipur
(2003).

42
Department of Computer Science & Engineering
6thSemester

ETECT324: DIGITAL SIGNAL PROCESSING


TEACHING SCHEME: 2-1-0 (L-T-P) CREDIT: 2

COURSE OBJECTIVES:
1. To provide a thorough understanding of various transform used in digital signal
processing.
2. To understand the concept of design, implementation and analysis of Digital filters as
well as discrete time system.

COURSE CONTENT:
Module – I (12 Hrs)
Review of Z-Transform , Discrete Fourier Transform and Implementation of Discrete-Time
Systems:The Z-Transform: The Direct Z-Transform, The Inverse Z-Transform; Properties of the
Z-Transform, The Discrete Fourier Transform, Inverse Discrete Fourier, Properties of the DFT:
Periodicity, Linearity, and Symmetry Properties, Multiplication of Two DFTs and Circular
Convolution, Structure for the Realization of Discrete-Time Systems, Structure for FIR Systems:
Direct-Form Structure, Cascade-Form Structures, Structure for IIR Systems: Direct-Form
Structures, Signal Flow Graphs and Transposed Structures, Cascade-Form Structures, Parallel-
Form Structures.
Module –II (10 Hrs)
Design of Digital Filters: General Considerations: Causality and Its Implications, Characteristics
of Practical Frequency-Selective Filters; FIR Filters, Design of Linear-Phase FIR Filters by using
Windows, Design of Linear-Phase FIR Filters by the Frequency-Sampling Method; Design of IIR
Filters from Analog Filters: IIR Filter Design by Impulse Invariance, IIR Filter Design by the
Bilinear Transformation, Design of Butterworth IIR Digital Filters.
Module –III (10 Hrs)
Efficient Computation of the DFT: Fast Fourier Transform Algorithms: Efficient Computation of
the DFT: FFT Algorithms: Direct Computation of the DFT, Radix-2 FFT Algorithms: Decimation-
In-Time (DIT), Decimation-In-Time (DIF); Use of the FFT Algorithm in Linear Filtering and
Correlation.
Module – IV (08 Hrs)
Adaptive Filters:Application of Adaptive Filters: System Identification or System Modeling,
Adaptive Channel Equalization, Adaptive Line Enhancer, Adaptive Noise Cancelling; Adaptive
Direct-Form FIR Filters-The LMS Algorithm: Minimum Mean Square Error Criterion, The LMS
Algorithm, Introduction to multirate signal processing.

43
Department of Computer Science & Engineering
6thSemester
COURSE OUTCOMES:
At the end of the course, the student will be able to:
CO CODE CO STATEMENT COGNITIVE LEVEL
ETECT324.1 Recall signals mathematically in continuous and Remember
discrete time and frequency domain
ETECT324.2 Use concepts of trigonometry, complex algebra, Apply
Fourier transform, z-transform to analyze the
operations on signals and acquire knowledge about
Systems
ETECT324.3 Design implementation, analysis and comparison of Create
digital filters for processing of discrete time signals
ETECT324.4 Distinguish FIR and IIR filter design and its Analyze
applications.

Text Books:
1. Digital Signal Processing, Principles, Algorithms and Applications,J. G. Proakis and D.
G. Manolakis, 4th Edition, Pearson Education ,India. 2007
2. Digital Signal Processing, a Computer-Based Approach ,Sanjit K. Mitra, 4th Edition,
TMH. 2013

Reference Books:
1. Digital Signal Processing,S. Salivahan, A. Vallavraj and C. Gnanapriya, 2ndEdition,TMH.
2007
2. Digital Signal Processing,A Modern Introduction , Ashok Ambardar, 1st Edition ,Cengage
Learning. 2007
3. Digital Signal Processing, A MATLAB-Based Approach ,Vinay K. Ingle and John G.
Proakis, 3rd Edition, Cengage Learning,2011.
.

44
Department of Computer Science & Engineering
6thSemester

ETHSS302: BUSINESS COMMUNICATION AND SKILL FOR INTERVIEW

TEACHING SCHEME: 0-0-2 (L-T-P) CREDIT: 1

COURSE OBJECTIVES:
1. To develop communication competence in prospective engineers.
2. To enable them to convey thoughts and ideas with clarity and focus.
A

3. To develop report writing skills.


4. To equip them to face interview & Group Discussion.
5. To inculcate critical thinking process.
6. To prepare them on problem solving skills.
7. To provide symbolic, verbal, and graphical interpretations of statements in a problem
description.
8. To understand team dynamics & effectiveness.
9. To create an awareness on Engineering Ethics and Human Values.
10. To install Moral and Social Values, Loyalty and also to learn to appreciate the rights of
others.
11. To learn leadership qualities and practice them.

COURSE CONTENT:

Module-I (9 Hours)
Communication Skill: Introduction to Communication, The Process of Communication, Barrier to
Communication, Listening Skills, Writing Skills, Technical Writing, Letter Writing, Job
Application, Report Writing, Non-verbal Communication and Body Language, Interview Skills,
Group Discussion.

Module-II (9 Hours)
Presentation Skills, Technology-based Communication.
Critical Thinking & Problem Solving: Creativity, Lateral thinking, Critical thinking,
MultipleIntelligence, Problem Solving, Six thinking hats, Mind Mapping & Analytical Thinking.
Teamwork: Groups, Teams, Group Vs Teams, Team formation process, Stages of Group,
Group Dynamics, Managing Team Performance & Team Conflicts.

45
Department of Computer Science & Engineering
6thSemester
Module-III (9 Hours)
Ethics, Moral & Professional Values: Human Values, Civic Rights, Engineering Ethics,
Engineering as Social Experimentation, Environmental Ethics, Global Issues, Code of Ethics
like ASME, ASCE, IEEE.

Module-IV (9Hours)
Leadership Skills: Leadership, Levels of Leadership, Making of a leader, Types of leadership,
Transactions Vs Transformational Leadership, VUCA Leaders, DART Leadership, Leadership
Grid & leadership Formulation.

COURSE OUTCOMES:
At the end of the course, the student will be able to:
CO CODE CO STATEMENT COGNITIVE LEVEL
ETHSS302.1 Communicateeffectively. Evaluate
ETHSS302.2 Make effectivepresentations. Create
ETHSS302.3 Write different types ofreports. Analyze
ETHSS302.4 Face interview & groupdiscussion. Analyze
ETHSS302.5 Critical think on a particular problem. Solve problem. Evaluate
ETHSS302.6 Work in Group & Teams Apply
ETHSS302.7 Handle Engineering Ethics and Human Values. Remember
ETHSS302.8 Become an effective leader. Apply

References:
1. Barun K. Mitra; (2011), “Personality Development & Soft Skills”, First Edition; Oxford
Publishers.
2. Tatyana; (2015) ”Soft Skill for Managers”; First Edition; Wiley Publishing Ltd.
3. Larry James (2016); "The First Book of Life Skills"; First Edition; Embassy Books.
4. ShaliniVerma (2014); “Development of Life Skills and Professional Practice"; First Edition;
Sultan Chand (G/L) & Company
5. John C. Maxwell (2014); ‘be 5 Levels of Leadership", Centre Street, A division

46
Department of Computer Science & Engineering
6thSemester

ETCSS305: COMPUTER NETWORKING LABORATORY


TEACHING SCHEME: 0-0-3 (L-T-P) CREDIT: 2

COURSE OBJECTIVES:
1. To understand the working principle of various communication protocols.
2. To analyze the various routing algorithms.
3. To know the concept of data transfer between nodes.

COURSE CONTENT:
1. Study of LAN Topology and various Network devices
2. IP address configuration and LAN setup
3. Build class A, B and C Network using router in Network tool
4. Implement Sub-netting concept using Network tool
5. Write a program to find out class of a given IP address, sub-net mask, first &Last IP
address of that subnet
6. Installation & Configuration of NS2 in Linux environment
7. Basic wired & wireless topology in NS2
8. Congestion Control: Stop & Wait, Sliding Window & Selective Repeat, GoBack N and
Throughput analysis
9. IP Addressing, Static and Dynamic Routing
10. Write a program to build client-server model on different computers
11. Socket Programming, Network Management/ Monitoring Tools
12. DHCP, DNS, FTP Server configuration.

COURSE OUTCOMES:
At the end of the course, the student will be able to:
CO CODE CO STATEMENT COGNITIVE LEVEL
ETCSS305.1 Develop programs for client-server applications Creating
ETCSS305.2 Perform packet sniffing and analyze packets in Creating
network traffic
ETCSS305.3 Implement error detecting and correcting codes Creating

47
Department of Computer Science & Engineering
6thSemester

ETCSS306 : ADVANCE PROGRAMING LAB

(PYTHON)
TEACHING SCHEME:3-0-0 (L-T-P) CREDIT: 3

COURSE OBJECTIVES:
1. To understand why Python is a useful scripting language for developers.
2. To learn how to design and program Pythonapplications.
3. To learn how to use lists, tuples, and dictionaries in Python programs.

COURSE CONTENT:

Session1: Introduction To Python Installation and Working with Python Understanding Python
variables Python basic Operators Understanding python blocks

Session 2:Python Data Types Declaring and using Numeric data types: int, float, complex
Using string data type and string operations Defining list and list slicing Use of
Tuple data type

Session 3:Python Program Flow Control Conditional blocks using if, else and elif Simple for
loops in python For loop using ranges, string, list and dictionaries Use of while
loops in python Loop manipulation using pass, continue, break and else
Programming using Python conditional and loops block

Session4:Python Functions, Modules And Packages Organizing python codes using functions
Organizing python projects into modules Importing own module as well as
external modules Understanding Packages Powerful Lamda function in python
Programming using functions, modules and external packages

Session5:Python String, List And Dictionary Manipulations Building blocks of python programs
Understanding string in build methods List manipulation using in build methods
Dictionary manipulation Programming using string, list and dictionary in build
functions

Session 6:Python File Operation Reading config files in python Writing log files in
pythonUnderstanding read functions, read(), readline() and readlines()
Understanding write functions, write() and writelines() Manipulating file pointer
using seek Programming using file operations

48
Department of Computer Science & Engineering
6thSemester
Session7: Python Object Oriented Programming – Oops Concept of class, object and
instances Constructor, class attributes and destructors Real time use of class in
live projects Inheritance , overlapping and overloading operators Adding and
retrieving dynamic attributes of classes Programming using Oops support.

Session8: Python Regular Expression Powerful pattern matching and searching Power of
pattern searching using regex in python Real time parsing of networking or
system data using regex Password, email, url validation using regular expression
Pattern finding programs using regular expression

Session 9: Python Exception Handling Avoiding code break using exception handling Safe
guarding file operation using exception handling Handling and helping developer
with error code Programming using Exception handling

Session 10:Python Database Interaction SQL Database connection using python Creating and
searching tables Reading and storing config information on database
Programming using database connections

Session 11:Python Multithreading Understanding threads Forking threads Synchronizing the


threads Programming using multithreading

Session 12:Contacting Use r Through Emails Using Python Installing smtp python module
Sending email Reading from file and sending emails to all users addressing them
directly for marketing

Session 13: Python CGI Introduction Writing python program for CGI applications Creating
menus and accessing files. Server client program

Session14:Sample Project

References:
1. Python-(Mark Lutz)
2. Python Training Guide (BPB Publications)

COURSE OUTCOMES:
At the end of the course, the student will be able to:
CO CODE CO STATEMENT COGNITIVE LEVEL
ETCSS306.1 Problem solving and programming capability. Analyze ,Apply
ETCSS306.2 Computation to enhance implements programs in Analyze ,Apply
Python.

49

You might also like