You are on page 1of 49

PG DEPARTMENT OF COMPUTER SCIENCE

Sem Part

III

IV

VI

Sub Code

Title of the Paper

I
II
III
III
III
III
IV
IV

14GT3GS03
14GE3GS03
14CS3MC05
14CS3MC06
14CS3AC03
14CS3CP05
14CS3NE01
14CA3SKA1

Tamil
English
Programming in .Net
Computer Organization and Architecture
Optimization Techniques
Programming in .Net - Lab
Web Designing Lab **
Animation Lab**

I
II
III
III
III
III
III
IV
IV

14GT4GS04
14GE4GS04
14CS4MC07
14CS4CE1A
14CS4CE1B
14CS4AC04
14CS4CP06
14CS4NE02
14CA4SKA2

Tamil
English
Programming in Java
Data Structure and Computer Algorithm
Compiler Design
Computer Graphics
Programming in Java - Lab
VB Script Lab #, **
Computer Graphics Lab #, **

III
III
III
III
III
III
III
III
III
III

14CS5MC08
14CS5MC09
14CS5MC10
14CS5CE2A
14CS5CE2B
14CS5CP07
14CS5CP08
14CS5SK03
14CS5SS01
14CS5MP01

Java Server Pages (JSP)


Relational Database Management System
Software Engineering
Operating System
Distributed Computing and Parallel Processing
JSP Lab
RDBMS Lab
Scripting Languages Lab**
Self Study- Software Testing ##
Mini Project (15 days-Summer Holidays) #

III
III
III
III
III
III

14CS6MC11
14CS6MC12
14CS6MC13
14CS6CE3A
14CS6CE3B
14CS6SK04

III

14CS6PR01

Computer Networks
Data Mining
Mobile Computing
Cloud Computing
Internet Security
Internet Programming using Open Source Lab
(PHP)
Project

PROGRAMMING IN . NET
SEM

: III

HOURS

:4

CODE

: 14CS3MC05

CREDITS

:4

OBJECTIVES
o

To provide the basic knowledge of Visual Programming Concepts and


to develop the programming ability in Visual Basic.

To impart programming skills in Visual basic and develop the real time
application using Application Programming Interface.

UNIT I

10 Hours

Welcome to Visual Basic 2010: Event-Driven Programming Installing


Visual Basic 2010 The Visual Studio 2010 IDE Creating a Simple
Application. The Microsoft .NET Framework: Writing Software for
Windows Common Language Runtime The Common Type System and
Common Language Specification. Writing Software: Working with Variables
Comments and Whitespace - Data Types Storing Variables Methods.
UNIT II

10 Hours

Controlling the Flow: Making Decisions The If Statement Select Case


Loops. Working with Structures: Understanding Arrays Understanding
Enumerations Understanding Constants Structures Working with
ArrayLists Working with Collections.
UNIT III

10 Hours

Building Windows Applications: Responding to Events Building a Simple


Application Counting Characters Counting Words Creating More
Complex Applications Creating the Toolbar Creating the Status Bar
Creating an Edit Box Clearing the Edit Box Responding to Toolbar
Buttons Using Multiple Forms. Displaying Dialog Boxes: The MessageBox
The OpenFileDialog Control The SaveDialog Control The FontDialog
Control The ColorDialog Control The PrintDialog Control The
FolderBrowser DialogControl.

UNIT IV

15 Hours

Creating Menus: Understanding Menu Features Creating Menus Context


Menus. Debugging and Error Handling: Major Error Types Debugging
Error Handling. Creating Windows Forms User Controls: Windows Forms
Controls Creating and Testing a User Control Exposing Properties from
User Controls.

UNIT V

15 Hours

Accessing Databases: Data base - The SQL SELECT Statement Queries in


Access Data Access Components and Controls Data Binding. Data base
Programming with SQL Server and ADO.Net: ADO.NET - The ADO.NET
Classes in Action Data Binding.
TEXT BOOK
1. Beginning Microsoft Visual Basic 2010, Thearon Willis, Bryan Newsome,
Wiley India Edition, 2011.
Unit I

Chapters: 1, 2, 3
(Pg no: 1-20, 27-33, 39-80)

Unit II

Chapters: 4, 5
(Pg no: 83-120, 123-157)

Unit III

Chapters: 7, 8
(Pg no: 193-233, 237-275)

Unit IV

Chapters: 9, 10, 14
(Pg no: 277-297, 299-335, 435-447)

Unit V

Chapters: 15, 16
(Pg no: 463-479, 483-533)

REFERENCE BOOKS
1. Visual Basic .NET Programming, new Black Book, Steven Holzner,
Paraglyph Press Inc., 2013.
2.

Mastering Microsoft Visual Basic 2008, Evangelos Petroutsos, Mark


Ridgeway, Willey India Pvt. Ltd, 2010.

COMPUTER ORGANIZATION AND ARCHITECTURE


SEM

: III

HOURS

:4

CODE

: 14CS3MC06

CREDITS

:3

OBJECTIVES
o To provide the fundamental knowledge about Computers and its components.
o To understand the overall basic computer hardware structure including
peripheral devices.
o To know the structure and behavior of digital computers.
UNIT I

10 Hours

Digital Logic Circuits: Digital Computers- Logic Gates-Boolean AlgebraMap Simplification-Combinational Circuits-Flip Flops-Sequential Circuits.
UNIT II

15 Hours

Digital Components: Integrated Circuits Decoders Multiplexers


Registers - Shift Registers Binary Counters - Memory Unit. Data
Representation: Data Types Complements - Fixed Point Representation Floating-Point Representation - Other Binary Codes - Error Detection Codes.
UNIT III

15 Hours

Basic Computer Organization and Design: Instruction Codes-Computer


Registers-Computer

Instructions-Instruction

Cycle-Memory-

Reference

Instructions-Input-Output and Interrupt- Design of Basic Computer-Design of


Accumulator logic. Micro Programmed Control: Control Memory-Address
Sequencing-Micro Program Example - Design of Control Unit.
UNIT IV

10 Hours

Central Processing Unit: Introduction-General Register Organization-Stack


Organization-Instruction Formats-Addressing Modes-Data Transfer and
Manipulation-Program Control-Reduced Instruction Set Computer (RISC).
Pipeline and Vector Processing: Parallel Processing-Pipelining-Arithmetic
Pipeline - Instruction Pipeline-Vector Processing-Array processors.

UNIT V

10 Hours

Input Output Organization: Peripheral Devices - Input-Output Interface Modes of Transfer - Priority Interrupt- Direct Memory Access. Memory
Organization: Memory Hierarchy - Main Memory-Auxiliary MemoryAssociative Memory - Cache Memory-Virtual Memory.
TEXT BOOK
Computer System Architecture, III Edition, M. Morris Mano, Prentice
Hall of India Private Limited, New Delhi, 2011.
Unit
Unit
Unit

I
II
III

:
:
:

Chapter

Pg. No.

1- 40

Chapters

2, 3

Pg. No.

41-65,67-92

Chapters

5, 7

Pg. No.

125-137,141-169,
215-241

Unit

IV

Chapters

8, 9

Pg. No.

243-300,301-317,
321-334

Unit

Chapters

11.1-11.2, 11.4-11.6 & 12

Pg. No.

383-393,404-422,447-478

REFERENCE BOOKS
1. Computer Organization, Fifth Edition, V.Carl Hamacher, Zvonko
G.Vranesic, Safwat G.Zaky, 2013.
2. Computer Architecture and Organization, John P. Hayes, McGraw Hill
International Editions, Third Edition, 1998.

PROGRAMMING IN .NET LAB


SEM

: III

HOURS

CODE

: 14CS3CP05

CREDITS : 2

1. Simple Programs using Controls


i) Arithmetic Operations.
2. Number Checking
i) Prime No, Perfect No, Armstrong No
3. Number Series Generation
i) Sum of Series, Fibnonacci Series
4. String Manipulation
5. Date and Time Function
6. Design a Scientific Calculator program using Control Array.
7. Sorting Programs
i)

Number Sorting

ii)

String Sorting

8. Simple program using Mouse Control


9. Design a Quiz program
10. Traffic control signal using Timer Control
11. Design a Text Editor Program.
12. Application using Menu Editor and MDI.
13. Design a Program for Electricity Bill Preparation.
14. Design a program for CIA Record Preparation.
15. Payroll processing using DAO Control.
16. Student Database Creation using OLEDB.
17. Microsoft Report Creation.
18. Crystal Report Creation.

: 2+1

WEB DESIGNING
SEM

: III

HOURS

CODE

: 14CS3NE01

CREDITS : 2

1. Working with Internet (Id Creation, Searching)


2. Simple Web Page using all Formatting
3. Working with Text and hyperlink
4. Web Page with Hyper Links
5. Web Page with Images
6. Web Page with Lists
7. Web Page with Table
8. Web Page with Frames
9. Application Form Resume Preparation using images
10. Working with Marquee tags

:2

2 D ANIMATION LAB
SEM

: III

HOURS

CODE

: 14CA3SKA1

CREDITS : 2

1. Working with Tools


2. Working with Panels
3. Creating symbols
4. Frame by frame animation
5. Motion Tweening
6. Shape Tweening
7. Animating text
8. Working with multiple layers
9. Working with Guide layers
10. Working with Mask layers
11. Short story creation with multiple scenes

:2

PROGRAMMING IN JAVA
SEM

: IV

HOURS

:4

CODE

: 14CS4MC07

CREDITS

:4

OBJECTIVES

To introduce the Object Oriented Programming principles through the


platform independent.

Learn the Java Programming language: its syntax, patterns and styles.

Learn the essentials of java class library.

UNIT I

15 Hours

Fundamentals of Object-Oriented Programming: Introduction- ObjectOriented Paradigm- Basic Concepts of OOP Benefits of OOP Applications
of OOP Overview of Java Language: Introduction-Simple Java Program
More of Java An Application With Two Classes Java Program Structure
Java Tokens Java Statements Implementing a Java Program Java Virtual
Machine Command Line Arguments Programming Style Constants,
Variables and Data Types: Introduction-Constants Variables Data Types
Declaration Of Variables Giving Values To Variables Scope of Variables
Symbolic Constants Type Casting Getting Values of Variables Standard
Default Values.
UNIT II

15 Hours

Operators and Expressions: Introduction-Arithmetic Operators Relational


Operators Logical Operators Assignment Operators Increment And
Decrement Operators Conditional Operator Bitwise Operators Special
Operators Arithmetic Expressions Evaluation of Expressions Precedence
of Arithmetic Operators Type Conversions in Expressions Operator
Precedence and Associativity Mathematical Functions- Decision Making and
Branching: Introduction - Decision Making With If Statement Simple If
Statement The If...Else Statement Nesting Of IfElse Statement The Else
If Ladder The Switch Statement The ?: Operator - Decision Making and
Looping: Introduction-While Statement Do Statement For Statement
Jumps in Loops Labeled Loops

UNIT III

15 Hours

Classes, Objects and Methods: Introduction -Defining A Class Fields


Declaration Methods Declaration Creating Objects Accessing Class
Members Constructors Methods Overloading Static Members Nesting of
Methods Inheritance: Extending a class Overriding Methods Final
Variables and methods Final Classes Finalizer Methods Abstract Methods
and Classes Methods with Varags Visibility Control - Arrays, Strings and
Vectors: Introduction -One-dimensional Arrays Creating an Array Twodimensional Arrays Strings Vectors Wrapper Classes Enumerated Types
Annotations Interfaces: Multiple Inheritance : Introduction- Defining
Interfaces Extending Interfaces Implementing Interfaces Accessing
Interface Variables Packages- Putting Classes Together: Introduction - Java
API Packages Using System Packages Naming Conventions Creating
Packages Accessing a Package Using a Package Adding a Class to a
Package Hiding Classes Static Import.
UNIT IV

15 Hours

Multithreaded Programming : Introduction - Creating Threads Extending


the Thread Class Stopping and Blocking a Thread Life Cycle of a Thread
Using Thread

Methods

Thread

Exceptions

Thread

Priority

Synchronization Implementing the Runnable Interface Inter-Thread


Communication. Managing Errors and Exceptions: Introduction - Types of
Errors Exceptions Syntax of Exception Handling Code Multiple Catch
Statements - Using Finally Statement throwing Our Own Exceptions
Improved Exception Handling in Java SE7- Using Exceptions for Debugging.
UNIT V

15 Hours

Applet Programming: Introduction - How Applets Differ From Applications Preparing to write Applets Building Applet Code Applet Life Cycle
Creating an Executable Applet Designing a Web Page Applet Tag Adding
Applet to HTML File Running the Applet More About Applet Tag Passing
Parameters to Applets Aligning the Displaying More about HTML Tags
Displaying Numerical Values Getting Input from The User-Event Handling.
Managing Input/Output Files In Java: Introduction -Concept of Streams

Stream Classes Byte Stream Classes Character Stream Classes Using


Streams Other Useful I/O Classes Using the File Class Input/Output
Exceptions Creation of Files Reading/Writing Characters Reading/Writing
Bytes Handling Primitive Data Types Concatenating and Buffering Files
Random Access Files Interactive Input and output Other Stream classes.
TEXT BOOK
Programming With JAVA A Primer, E. Balagurusamy, Tata McGrawHill
Publishing Company Limited New Delhi, Fifth Edition.
Unit I
Unit II
Unit III
Unit IV
Unit V

:
:
:
:
:

Chapters

: 1, 3, 4

Pg. No.

: 1-9,23-34,39-45,46-61

Chapters

: 5, 6, 7

Pg. No.

: 62-80,81-106,107-126

Chapters

: 8, 9, 10, 11

Pg. No.

: 127-152,153-179,180-189, 190-202

Chapters

: 12, 13

Pg. No.

: 203-233,234-249

Chapters

: 14, 16

Pg. No.

: 250-274,294-332

REFERENCE BOOKS
1. The Complete reference Java 2 Herbert Schildt, Fifth Edition, 2011.
2. Java Programming Paradigms , V. Vimala, S. Sunil Kumar , P.S. Smitha,
Sree Magnus Publications, 2011
3.

Programming with java Dr. C. Muthu, Vijay Nicole Imprints Pvt. Ltd.
2004.

DATA STRUCTURE AND COMPUTER ALGORITHM


SEM

: IV

HOURS

:4

CODE

: 14CS4CE1A

CREDITS

:3

OBJECTIVES

To provide knowledge in various concepts of data structures.

To provide basic knowledge of algorithm development and apply the


techniques to real life problems.

UNIT I

12 Hours

INTRODUCTION: Algorithm - Algorithm Specification - Pseudo code


Conventions - Recursive Algorithms - Performance Analysis: Space
Complexity - Time Complexity - Randomized Algorithms: Basics of
Probability Theory - Randomized Algorithms: An Informal Description Identifying the repeated element - Primality Testing - Advantages and
disadvantages.
UNIT II

12 Hours

ELEMENTARY DATA STRUCTURES - Stacks and Queues Trees :


Terminology - Binary Trees - Dictionaries: Binary Search Trees - Priority
Queues: Heaps - Heap Sort - Graphs: Introduction - Definitions - Graph
Representations.

Divide and Conquer:

Binary Search - Finding the

maximum and Minimum - Merge Sort - Quick Sort.


UNIT III
12 Hours
THE GREEDY METHOD- The General Method- The container Loading
- Knapsack Problem- Minimum Cost Spanning Trees: Prims AlgorithmKruskals

Algorithm-

Single

Source

Shortest

Paths.

DYNAMIC

PROGRAMMING: The General method-All Pairs Shortest Paths-Optimal


Binary Search Trees-The Traveling SalesPerson Problem.
UNIT IV
12 Hours
BASIC TRAVERSAL AND SEARCH TECHNIQUES- Techniques for
Binary Trees - Techniques for Graphs: Breadth First Search and TraversalDepth First Search and Traversal - Biconnected Components And DFS.

BACK TRACKING - The 8 Queens Problem - Sum of Subsets - Hamiltonian


Cycles - Knapsack Problem.
UNIT V
12 Hours
BRANCH AND BOUND- The Method : Least Cost (LC) Search -The 15puzzle:An Example - Control Abstractions for LC-Search - Bounding - FIFO
Branch-And-Bound LC Branch-And-Bound - Traveling Sales Person
TEXT BOOK
Fundamentals of Computer Algorithms, Ellis Horowitz and Sartaj Sahni and
Sangathevar Rajesekaran, 2nd Edition, Universities Press (India) Private Limited, 2007
Unit I

Unit II :
Unit III :

Chapters

: 1.1, 1.2, 1.3 (1.3.1, 1.3.2), 1.4

Pg. No.

: 1-28, 62-74

Chapters

: 2.1-2.4, 2.6, 3.3-3.6

Pg. No.

: 79-108,121-132, 145-177

Chapters

: 4.1-4.3,4.6 (4.6.1,4.6.2),4.9, 5.1,5.3,5.5,5.9

Pg. No.

: 210-222,236-244,260-266272-276), (284-287),
293-300, 318-320

Unit IV :

Unit V :

Chapters

: 6.1,6.2, 6.4

Pg. No.

: 333-344, 349-356

Chapters

: 7.2,7.3,7.5,7.6.

Pg. No.

: 373-379, 384-392

Chapters

: 8.1, 8.3-8.4

Pg. No.

: 399-412, 422-434

REFERENCE BOOKS
1. An Introduction to Data Structure with applications, Jean Paul
Tremblay Paul G.Sorenson, Tata McGraw-Hill publication, Second Edition,
40th reprint, 2010.
2. Data Structures and Algorithms, Alfred V. Aho, John E. Hopcroft,
Jeffrey D. Ullman, Pearson Education in South Asia, 2008.

COMPILER DESIGN
SEM

: IV

HOURS

:4

CODE

: 14CS4CE1B

CREDITS

:3

OBJECTIVES
o To give a basic knowledge of issues in computer architecture and
programming knowledge principles
o To learn the construction of basic blocks, generation of code from
expressions and basic blocks, and register allocation techniques and to
learn the basic idea for generating the intermediate code for a typical
programming languages.
UNIT I

12 Hours

Introduction: Language Processors-The structure of a compiler-the evolution


of programming languages-the science of building a compiler-applications of
compiler technology-Programming language basics. A Simple syntaxDirected

Translator:

Introduction-Syntax

translation-Parsing-Lexical

analysis-Symbol

definition-syntax

directed

tables-Intermediate

Code

generation.
UNIT II

12 Hours

Lexical Analysis : The role of the Lexical analyzer-input bufferingspecification of tokens-recognition of tokens- the lexical analyzer generator
Lex- Finite automata- Form regular expressions to automata design of a
lexical analyzer generator optimization of DFA based pattern matchers.
UNIT III

12 Hours

Syntax analysis : Introduction Context-Free Grammars Writing a


grammar Top-down parsing bottom up parsing Introduction to LR
Parsing: Simple LR- Parser Generators.

UNIT IV

12 Hours

Intermediate Code Generation : Variants of Syntax Trees Three address


code Types and declarations translations of expressions type checking
control flow backpatching Switch statements Intermediate code for
procedures.
UNIT V

12 Hours

Code generation : Issues in the Design of a code generator The target


language address in the target code basics blocks and flow graphs
optimization of basic blocks a simple code generator Peephole
optimization register allocation and assignment instruction selection by
tree rewriting optimal code generation for expressions-dynamic
programming code generation.
TEXT BOOK
1. Compilers Principles, Techniques and Tools, Alfred V.Aho, Monica
S.Lam, Ravi Sethi, Jeffrey

D. Ullman, Pearson Education, Dorling

Kindersley (India) Pvt. Ltd , Second Edition, Nineth Impression 2012.


UNIT I

: Chapter
Pg. No.

: 1-38

Chapter

: 2 (2.1-2.4,2.6-2.9)

Pg. No.

: 39-68,76-107

UNIT II : Chapter
Pg. No.
UNIT III : Chapter
Pg. No.
UNIT IV : Chapter
UNIT V :

: 1 (1.1-1.7)

: 3 (3.1-3.10)
: 109-189
: 4 (4.1-4.6, 4.9-4.10)
: 191-259,287-300
: 6 ( 6.1-6.10)

Pg. No.

: 357-425

Chapter

: 8 (8.1-8.12)

Pg. No.

: 505-579

REFERENCE BOOK
1. Crafting a Compiler with C, Charles N.Fischer, Richard J. LeBlanc,
Jr. Pearson Education, Fourth Impression 2011.

COMPUTER GRAPHICS
SEM

: III

HOURS: 5

CODE

: 14CS4AC04

CREDITS: 4

OBJECTIVES
To give a broader understanding of the basics of graphical devices and

Application areas and to implement the process of algorithms and to


illustrate the graphics applications.
o To explore the features of PHIGS and PHIGS+ functions in the C Programs.
UNIT I

15 Hours

A Survey of computer Graphics: Computer-Aided design Presentation


Graphics Computer Art Entertainment Education and Training
Visualization Image Processing Graphical user Interface - Overview of
Graphics Systems: Video Display Devices Raster Scan Systems Random
Scan Systems Graphics Monitors and Workstations - Input devices Hardcopy Devices - Graphics Software.
UNIT II

15 Hours

Output Primitives: Points and Lines - Line Drawing Algorithms - Loading


the Frame Buffer Line Function Circle Generating Algorithms - Ellipse
Generating Algorithms Other Curves -Parallel Curve Algoritms Curve
Functions Pixel Addressing - Filled - Area Primitives Fill-Area Functions Cell Array -Character Generation..
UNIT III

15 Hours

Attributes of Output Primitives: Line Attributes - Curve Attributes Color


and Grayscale Levels - Area Fill Attributes Character Attributes - Bundled
Attributes - Inquiry Functions Antialiasing. Two-Dimensional Geometric
Transformations: Basic Transformations. - Matrix Representations and
Homogeneous

Coordinates

Composite

Transformations-Other

Transformations Transformations Between Coordinate Systems Affine


Transformations Transformations.

Transformation Functions - Raster Methods for

UNIT IV

15 Hours

Two-Dimensional Viewing : The Viewing Pipeline Viewing Coordinate


Reference Frame Window-to-View Port Coordinate Transformation - Two
Dimensional Viewing Functions - Clipping Operations - Point Clipping - Line
Clipping - Polygon Clipping - Curve Clipping - Text Clipping - Exterior
Clipping.
Structures and Hierarchical Modeling: Structure Concepts - Editing
Structures - Basic Modeling Concepts - Hierarchical Modeling with
Structures.
UNIT V

15 Hours

Graphical User Interfaces and Interactive Input Methods: The User


Dialogue - Input of Graphical Data - Input Functions - Initial Values for InputDevice Parameters-Interactive Picture-Construction Techniques Virtual
Reality Environments. Three Dimensional Concepts: Three Dimensional
Display Methods Three Dimensional Graphics Packages. Computer
Animation: Design of Animation Sequences General Computer Animation
Functions Raster Animations Computer Animation Languages Key
frame systems Motion Specifications.
TEXT BOOK
1. Computer Graphics C Version, Donald Hearn, M. Pauline Baker,
Pearson Education, Dorling Kindersley (India) Pvt. Ltd , Second Edition,
2013
UNIT I

UNIT II :
UNIT III :
UNIT IV :
UNIT V :

REFERENCE BOOKS

Chapters

: 1, 2

Pg. No.

: 22 54, 55 - 102

Chapter

:3

Pg. No.

: 103 162

Chapters

: 4 ,5

Pg. No.

: 163 235

Chapters

: 6, 7

Pg. No.

: 236 - 288

Chapters

: 8 ,9, 16

Pg. No.

: 291 323, 603 - 616

1. Computer Graphics by Chennakesava R. Alavala, PHI Learning Private


Limited, New Delhi, 2009.
2. Computer Graphics Principles & Practice by James D. Foley, Andries
Van Dam, Steven K. Feiner, John F. Hughes, Second Edition in C, Pearson
Education, 2009.

PROGRAMMING IN JAVA LAB


SEM

: IV

HOURS

:3

CODE

: 14CS4CP06

CREDITS

:2

1. Programs using simple class


1.1 Number Checking (Prime, Perfect, Palindrome, Armstrong, Adam)
1.2 Number Generation( Prime, Perfect, Palindrome, Fibonacci)
2. Programs using Arrays and control structures
2.1 Number Sorting and Searching
2.2 Matrix Manipulation ( Addition, Subtraction, Multiplication and
Transpose)
2.3 Stack and Queue operations.
3. Programs using Constructors and Method overloading
3.1 Electricity Bill preparation
3.2 Complex Number operation
4. Programs using String Methods
4.1 String Sorting and Searching
4.2 Program using string methods
5. Programs using Inheritance
5.1 Staff information System
5.2 Railway Reservation.
6. Programs using Package & Interface
6.1 Bank transaction
6.2 Mark Sheet Processing
6.3 Employee Details using Interface
7. Programs using Exception Handling and Threads
7.1 Programs using built in and user defined Exceptions
7.2 Program using Multithreading
8. Programs using Files
8.1 Counting no of lines, words and characters in a file
8.2 CIA record preparation for n students.
9. Programs using Applet and AWT components
9.1 Scientific Calculator
9.2 Programs using all AWT components.

VB SCRIPT
SEM

: IV

HOURS

:2

CODE

: 14CS4NE02

CREDITS

: 2

1. Displaying Date and Time.


2. Arithmetic operation.
3. Program using decision making statements
4. Program using Loops (For, Do Loop, Do While).
5. Program using selection statement.
6. Program using functions.
7. Program using forms
8. Program using frames.
9. Number generation ( odd, even, Fibonacci, prime and palindrome)
10. Multiplication Table creation using VBScript.
11. String Manipulation.
12. Validating form elements.

GRAPHICS LAB
SEM

: IV

HOURS

:2

CODE

: 14CS4SKA2

CREDITS

: 2

Line
1. Program to draw a Line using DDA Line Algorithm
2. Program to draw a Line using Bresenham's Line Algorithm
Circle
3. Program to draw a Circle using
a. Mid - Point Circle Algorithm
b. Bresenham's Circle Algorithm
c. Direct Algorithm
4. Program to draw a Circle having Changing its Color and Design
Ellipse
5. Program to draw an Ellipse using
a. Mid - Point Ellipse Algorithm
b. Different Colours
c. Showing Two Axis
6. Program to draw Polar Ellipse
Miscellaneous
7. Program to Make and Move a Fish
8. Program to Make a Flag
9. Program to Make a Hut
10. Program to Make a Kite
11. Program of Road Animation
12. Program of Scaling Transformation
13. Program to Move a Person
14. Program of Translation Transformation

JAVA SERVER PAGES


SEM

:V

HOURS

:5

CODE

: 14CS5MC08

CREDITS

:5

OBJECTIVES
o To introduce the basic concepts of Java Server Pages
o To impart programming skills in server-side Java application development
and deployment.
UNIT I

15 Hours

Introduction to Servlets: Servlet Lifecycle- Example- Servlet ClassesThreading Models-HTTP Sessions. JSP Overview: How JSP works- A Basic
Example.
UNIT II

15 Hours

Elements of JSP: JSP syntax and semantics- The JSP development ModelComponents of a JSP Page- A Complete Example- Expressions, Scriptlets
and Declarations: Expressions, Scriptlets- Declarations
UNIT III

15 Hours

Request Dispatching: Anatomy of Request Processing- Including other


Resources-The include Directive- The <jsp:include> Action-Which method to
use- Forwarding Requests- The RequestDispatcher Object- Model1 vs
Model2- Session and Thread Management: Session Tracking- The Session
API- Thread Management- Servlet Threading Models. Application Event
Listeners: Beyond Session Binding Listeners- Event Scope- Event Listener
Interfaces- Examples of Application Event Listeners.
UNIT IV

15 Hours

Introduction to Custom Tags: custom Tags- Developing your First custom


Tag- How Tag Handlers work- Tag Libraries- The Tag Handler API- The Tag
Handler Lifecycle- Defining Tag Attributes- The Iteration Tag interface-The
Body Tag Handler API. Expression Language: EL- EL syntax- Functions.
The JSP Standard Tag Library (JSTL): Getting started with JSTL-Core
Tags-XML Tags- SQL Tags- formatting tags.

UNIT V

15 Hours

Database Access with JDBC: Overview of JDBC- JDBC DriversConnecting to a Database with DriverManager- Connecting to a Database
using JNDI DataSource- The Statement Interfaces- Result Sets -Using
Metadata.
TEXT BOOK
The Complete Reference JSP 2.0, Phil Hanna, Tata McGraw-Hill Edition.,
2008.
Unit I

Unit II

Unit III
Unit IV
Unit V

:
:
:

Chapters

: 3, 4

Pg. No.

: 21- 57

Chapters

: 5, 6

Pg. No.

: 61-129

Chapters

: 7, 8, 9

Pg. No.

: 131-223, 233-255

Chapters

: 11, 12, 13

Pg. No.

: 297-382

Chapters

: 15

Pg. No.

: 401-471

REFERENCE BOOKS
1. Java for the Web with Servlets, JSP and EJB-A developers Guide to
scalable

J2EE Solutions, Budi Kurniawan, Techmedia, First Edition

2002.
2. Java Server Pages, Hans Bergsten, OReilly, Shroff Publishers &
Distributers Pvt Ltd, Third Edition.

RELATIONAL DATABASE MANAGEMENT SYSTEM


SEM

:V

HOURS

:5

CODE

: 14CS5MC09

CREDITS

:5

OBJECTIVES
o To give a deep knowledge on the concepts of relational Database, Structured
Query Language and Database security.
o To enable the students to understand the data base applications.
o To provide an insight into the architecture and components of a database
system.
UNIT I

15 Hours

Introduction To Database Management System: Introduction- Database


Characteristics Of Data In A Database - Database Management SystemDBMS-

Types

Of

DBMS.

Introduction

to

Relational

Database

Management Systems (RDBMS): Introduction - RDBMS Terminology - The


Relational Data Structure - Relational Data Integrity - Relational Data
Manipulation- CODDs Rule. Database Architecture And Data Modeling:
Introduction - Conceptual, Physical and Logical Database Models - Database
Design - Design Constraints - Functional Dependencies.
UNIT II

15 Hours

Entity Relationship (E- R) Modeling: Introduction-ER Model-Components


of an ER Model-ER Modeling Symbols. Enhanced Entity Relationship
(EER) Model : Introduction - Super class and Subclass Entity types
Attribute Inheritance - Specialization Generalization -Categorization. Data
Normalization: Introduction First Normal Form- Second Normal Form
Third Normal Form-Boyce Codd Normal Form(BCNF) - Fourth Normal Form
Fifth Normal Form Domain Key Normal Form(DKNF) Denormalization.
UNIT III

15 Hours

Relational Algebra and Relational Calculus: Relational Algebra - Relational


Calculus. Introduction to Structure Query Language (SQL): IntroductionHistory of SQL - Characteristics of SQL- Advantages of SQL- SQL in ActionSQL Data types and Literals - Types of SQL Command - SQL Operators Arithmetic Operators - Comparison Operators - Logical Operators - Set

Operators - Operator Precedence. Tables, Views and Indexes - Queries and


Sub Queries.
UNIT IV

15 Hours

Aggregate

Function

Introduction-General

Rules-

COUNT()

and

COUNT(*)-SUM()-AVG()-MAX() and MIN(). Insert, Update and Delete


Operations -

Cursors: Introduction-Cursor Operations-Cursor Positions-

Cursor Coding Guidelines. Join and Unions: Joins-Unions. Programming


with SQL: Introduction- Query Processing - Embedded SQL- Dynamic SQL.
Triggers: Introduction- Triggers - Types of Triggers - Trigger syntaxCombining Trigger Types- Setting Inserted Values-Disabling and Enabling
Triggers-Replacing Triggers-Dropping Triggers-Advantages and Limitations
of Triggers.
UNIT V

15 Hours

Database Security : Introduction, Database Environment - Data Security


Risks Complex user management requirements - Dimensions of Database
Security, Data Security Requirements, Database Users Protecting the data
within the database Granting and Revoking privileges and roles - Data
Encryption, Database integrity system availability factors - Best Security
Practices, Network Security Authenticating users to the database security
auditing. Data Integrity - Transaction Management And Concurrency
Control Backup and Recovery.
TEXT BOOKS
1. Database Management System - Alexis Leon & Mathews Leon (A
division of Win Leon Publishing Pvt Ltd)
Unit I
Unit II
Unit III

:
:
:

Chapters

5, 7, 8.

Pg. No.

99-125,159 - 194

Chapters

9, 10, 11.

Pg. No.

195 - 262)

Chapters

12, 14,15,17.

Pg. No.

263-282, 291-318-340,
355- 383.

Unit IV

Chapters

18, 19, 20, 21, 22, 25

Pg. No.

385- 456, 485-495

Unit V

Chapters

27, 28, 29 , 30

Pg. No.

537 - 638

REFERENCE BOOKS
1. Data Base System Concepts Abraham SillberSchatz, Hendry F. Korth, S.
Sundrashan, 5th Edition, The McGraw-Hill Companies, 2006.
2. Data Base Management System Rakesh saini, M.M.S.Rauthan, Abhay
Saxena, Bindu sharma, Vayu Education of India, First Edition, 2010.

SOFTWARE ENGINEERING
SEM

:V

HOURS

:4

CODE

: 14CS5MC10

CREDITS

:4

OBJECTIVES
o To impart software engineering skills such as Planning, System Analysis,
Design, Implementation, Testing and Software Maintenance.
o To give basic knowledge of software engineering skills in software
development.
UNIT I

15 Hours

Introduction to Software Engineering: Some Definitions-Some Size


Factors- Quality and Productivity Factors-Managerial Issues. Planning a
Software Project: Defining the Problem- Developing a Solution StrategyPlanning the Development Process- Planning an Organizational StructureOther Planning Activities.
UNIT II

15 Hours

Software Cost Estimation: Software Cost Factors- Software Cost Estimation


Techniques- Staffing- Level Estimation- Estimating Software Maintenance
Costs. Software Requirements Definition: The Software Requirement
Specification-Formal Specification Techniques.
UNIT III
Software

15 Hours
Design:

Fundamental

Design

Concepts-

Modules

and

Modularization Criteria- Design Notations-Design Techniques- Detailed


Design Considerations- Real-Time and Distributed System Design - Test Plans
- Milestones, Walkthroughs and Inspections - Design Guidelines.

UNIT IV

15 Hours

Implementation Issues: Structured Coding Techniques - Coding StyleStandards and Guidelines- Documentation Guidelines. Verification and
Validation Techniques: Quality Assurance - Walkthroughs and Inspections Static Analysis - Symbolic Execution- Unit Testing and Debugging - System
Testing - Formal Verification.

UNIT V

15 Hours

Software Maintenance: Enhancing Maintainability During DevelopmentManagerial Aspects of Software Maintenance- Configuration ManagementSource Code Metrics- Other Maintenance Tools and Techniques.
TEXT BOOK
1. Software Engineering Concepts, Richard Fairley, TATA McGraw-Hill
Education Private Limited, New Delhi.
UNIT I
UNIT II
UNIT III
UNIT IV
UNIT V

:
:
:
:
:

Chapters

1, 2

Pg. No.

1-29, 30-63

Chapters

3,4

Pg. No.

64 87, 88 - 103

Chapters

Pg. No.

137 190

Chapter

6, 8

Pg. No.

192 -227, 267 - 310

Chapter

Pg. No.

311 - 329

REFERENCE BOOKS
1. Software Engineering, Ian Sommer Ville, Pearson Education, Nineth
Edition, 2014.
2. Software Engineering a Practitioners Approach, Roger S. Pressman,
Sixth Edition, Mc-Graw Hill International Edition, 2006,Reprint 2013.

OPERATING SYSTEM
SEM

:V

HOURS

:4

CODE

: 14CS5CE2A

CREDITS

:3

OBJECTIVES
o To give a deep knowledge in the fundamental concepts of Operating
System.

UNIT I

o To provide a clear description of the design principles of Operating


systems.
15 Hours

Operating System Overview: Operating System Objectives and functions


The Evolution of Operating System Major Achievements Microsoft
Windows Overview Traditional/Unix Systems Modern Unix System Linux. Process Description and Control: Process Process States Process
Description Process Control.
UNIT II

15 Hours

Concurrency: Mutual Exclusion and Synchronization: Principles of


Concurrency Mutual Exclusion: Hardware Support - Semaphores Message
Passing

Readers/Writers

Problem.

Concurrency:

Deadlock

and

Starvation: Principles of Deadlock Deadlock Prevention - Deadlock


Avoidance Deadlock Detection An Integrated Deadlock Strategy - Dining
Philosophers Problem.
UNIT III

15 Hours

Memory Management: Memory management requirements Memory


Partitioning - Paging Segmentation. Virtual Memory: Hardware and
Control Structures Operating System Software.
UNIT IV

15 Hours

Uniprocessor Scheduling: Types of Processor Scheduling Scheduling


Algorithms.

Multiprocessor and Real Time Scheduling: Multiprocessor

Scheduling Real Time Scheduling. I/O Management and Disk Scheduling:


I/O Devices Organization of the I/O Function Disk Scheduling.

UNIT V

15 Hours

File Management: Overview File Organization and Access B-Trees - File


Directories File Sharing Record Blocking. Computer Security Threats:
Computer Security Concepts Threats, Attacks, and Assets Intruders
Malicious Software Overview Viruses, Worms and Bots - Rootkits.
TEXT BOOK
1. Operating Systems Internals and Design Principles, William Stallings.
Pearson Education Inc. 7th Edition, Dorling Kindersley (India) Pvt Ltd. 2014.
Unit I
Unit II
Unit III
Unit IV
Unit V

: Chapters

1 (1-3, 7-10), 2 (1-4).

Pg. No.

4-26, 36-56, 66-97

: Chapters

4(1-3, 5, 6), 5(1-6)

Pg. No.

161-186, 193-203, 221-243

: Chapters

6 (1-4), 7(1-2)

Pg. No

269-288, 305-343

: Chapters

8 (1-2), 9(1-2),10 (1-2, 5).

Pg No

361-386, 397-423, 443-448, 455-462

: Chapter

11(1-6) , 13(1-6)

Pg no

492-513, 578-605

REFERENCE BOOKS
1. Operating System, Harvey M. Deitel, Paul J. Deitel, David R. Choffness,
Pearson Education, 3rd Edition, Tenth Impression, 2013.
2. Operating System Concepts, Abraham SilberSchatz, Peter Baer Galvin,
Greg Gagne, Willy India (P) Ltd, 8th Edition, 2011.

SOFTWARE PROJECT MANAGEMENT


SEM

:V

HOURS

:4

CODE

: 14CS5CE2B

CREDITS

:3

OBJECTIVES

To understand the concepts of Software processes and models

o To get a basic knowledge in Software project management and tools


UNIT I
Introduction to Software Project Management: Introduction-Importance of
Software Project management project- Software projects versus other types
of project- contract management and technical project management- activities
covered by software project management- plans-methods and methodologiessome ways of categorizing software projects-stakeholders-setting objectivesthe business case - project success and failure-management - Management
control. Traditional versus Modern Project Management Practices-Project
Evaluation and Programme management: Introduction-A Business caseProject portfolio management- Evaluation of individual projects- Cost-benefit
evaluation techniques- risk evaluation-programme management- managing the
allocation

of

resources

within

programmes-

strategic

programme

management- creating a programme- aids to programme management- some


reservations about programme management- benefits management.
UNIT II
An overview of project planning-Introduction to Step Wise project planningStep 0: Select project - Step 1: Identify project scope and objectives - Step 2:
Identify project Infrastructure - Step 3: Analyze project characteristics - Step
4: Identify project products and activities - Step 5: Estimate effort for each
activity - Step 6: Identify activity risks- Step 7: Allocate resources- Step 8:
Review/publicize plan- Steps 9 and 10: Execute plan/lower levels of planning.
Selection of an appropriate project approach : Introduction- Build or buy?Choosing methodologies and technologies software processes and process
models - Choice of process models - Structure versus speed of delivery - The
waterfall model- The spiral model - Software prototyping - Other ways of
categorizing prototypes- Incremental delivery -Atern/Dynamic Systems
Development Method - Rapid Application Development - Agile methods -

Extreme programming (XP)- Scrum - Managing iterative processes - Selecting


the most appropriate process model
UNIT III
Software Effort Estimation: Introduction - Where are estimates done? Problems with over- and underestimates - The basis for software estimating Software effort estimation techniques - Bottom-up estimating - The top-down
approach and parametric models - Expert judgement - Estimating by analogyAlbrecht function point Analysis- Function points Mark II - COSMIC full
function points -COCOMO II: a parametric productivity model-Cost
estimation- Staffing Pattern-Activity planning: Introduction-The objectives of
activity planning - When to plan - Project schedules - Projects and activitiesSequencing and scheduling activities- Network planning models- Formulating
a network model- Adding the time dimension- The forward pass -The
backward pass- Identifying the critical path- Activity float- Shortening the
project duration- Identifying critical activities- Activity-on-arrow networks.
UNIT IV
Risk management: Introduction - Risk - Categories of risk- A framework for
dealing with risk- Risk identification - Risk assessment- Risk planning- Risk
management- Evaluating risks to the schedule- Applying the PERT techniqueMonte Carlo simulation - Critical chain concepts. Resource Allocation:
Introduction- The nature of resources - Identifying resource requirements Scheduling resources.
UNIT V
Resource Allocation: Creating critical paths- Counting the cost - Being
specific Publishing the resource schedule- Cost schedules- The scheduling
sequence. Software Quality: Introduction - The place of software quality in
project planning- The importance of software quality- Defining software
quality- ISO 9126- Product and Process metrics - Product versus process
quality management - Quality management systems- Process capability
models- Techniques to help enhance software quality- Testing- Software
reliability- Quality plans.

TEXT BOOK
Software Project Management Bob Huges, Mike Cotterell, Rajib Mall, Fifth
edition, Tata McGraw Hill Education Private Limited, Eighth reprint 2013.
Unit I
Unit II
Unit III
Unit IV
Unit V

:
:
:
:
:

Chapters

: 1, 2 (1.1-1.15,2.1-2.13)

Pg. No.

: 1-44

Chapters

: 3, 4 (3.1-3.11, 4.1-4.18)

Pg. No.

: 47-66, 68-94

Chapters

: 5, 6 (5.1- 5.15, 6.1- 6.16)

Pg. No.

: 97-118,126-153

Chapters

: 7, 8 (7.1-7.12, 8.1- 8.4)

Pg. No.

: 155-180,183-191

Chapters

: 8, 13 (8.5-8.10, 13.1-13.13)

Pg. No.

: 191-199,288-321

REFERENCE BOOKS
1. Software Project Management Kieron Conway, Paraglyph press, Edition
2007
2. Software Project Management Kit for Dummies Greg Mandanis with
Allen Wyatt, First Edition 2000.

JAVA SERVER PAGES LAB


SEM

:V

HOURS

:5

CODE

: 14CS5CP07

CREDITS

:3

1. Simple Servlet Program


2. Simple JSP program without HTML
3. Simple JSP with HTML
4. Displaying Dynamic Message with JSP elements
5. JSP program with implicit objects.
6. JSP program with Action element.
7. JSP program with RequestDispatcher Object
8. JSP program to validate user entries in a form
9. JSP with Applet.
10. JSP with Java Bean.
11. Cookies in JSP.
12. Session tracking in JSP.
13. JSP with Custom Tags
14. JSP program using JDBC.
15. Website Development and Administration using JSP.

RDBMS LAB
SEM

:V

HOURS

:5

CODE

: 14CS5CP08

CREDITS

:3

1. Working with DDL, DML and TCL Commands.


2. Retrieving rows with logical, comparison, conjunctive and arithmetic
Operators
3. Retrieving rows and columns with relational and special operators
4. Retrieving rows with Character, Number and Date functions.
5. Working with Aggregate functions.
6. Working with group function
7. Join Operation & Sub queries
8. Working with Sequence and Index
9. Working with Views
10. Simple PL/SQL programs
11. Working with stored procedures
12. Working with functions
13. Working with Triggers
14. PL/SQL with exception handling
15. Working with implicit and explicit cursor.
16. Exception Handling
17. Working with packages

2 D ANIMATION LAB
SEM

: III

HOURS

CODE

: 14CA5SK03

CREDITS : 2

1. Working with Tools


2. Working with Panels
3. Creating symbols
4. Frame by frame animation
5. Motion Tweening
6. Shape Tweening
7. Animating text
8. Working with multiple layers
9. Working with Guide layers
10. Working with Mask layers
11. Movie clip creation
12. Movie control using simple action scripts.
13. Transform objects using Button
14. Short story creation with multiple scenes

:2

SOFTWARE TESTING
SEM

:V

HOURS

:-

CODE

: 14CS5SS01

CREDITS

:2

OBJECTIVES
o To improvise the Software under Development with Various testing
Techniques.
o To provide basic knowledge of testing with test cases.
UNIT I
Software Development Life Cycle Models: Phases of Software ProjectQuality, Quality Assurance and Quality controlTesting, Verification and
Validation Life Cycle Models Spiral and Iterative Model The V ModelModified V Model Comparison of Various Life Cycle Models.
UNIT II
Types of Testing: White Box Testing: White Box Testing Static Testing
Structural Testing Challenges in White Box Testing Black Box Testing :
Black Box Testing Why Black Box Testing When to do Black Box
Testing- How to do Black Box Testing .
UNIT III
Integration Testing What is Integration Testing Integration Testing as a
type of Testing Integration Testing as a phase of Testing Scenario Testing
Defect Bash. Performance Testing : Methodology for Performance Testing
Tools for Performance Process for Performance Testing
UNIT IV
System and Acceptance Testing: System Testing Overview Functional
System Testing Non Functional Testing Acceptance Testing. Regression
Testing: Regression Testing- Types of Regression Testing-When to do
Regression Testing?-How to do Regression Testing? - Best Practices in
Regression Testing.

UNIT V
Organization Structures for Testing Teams : Dimensions of Organization
Structures Structures in Single Product Companies Structures for MultiProduct Companies Effects of Globalization and Geographically Distributed
Teams on Product Testing Testing Services Organizations Success Factors
for Testing Organization.
TEXT BOOK
1. Software Testing Principles and Practices, Srinivasan Desikan and
Gopalaswamy Ramesh , Dorling Kindersley(India) Pvt Ltd, Pearson
Education in South Asia, 2013.
Unit I :
Unit II
Unit III
Unit IV
Unit V

Chapter
:2
Pg. No.
:
Chapters
Pg. No.
:
Chapters
Pg. No.
:
Chapters
Pg. No.
:
Chapter
Pg. No.

: 25-43
: 3,4
: 47-103
: 5,7
: 107-125,169-191
: 6,8
: 127-162,193-208
: 14
: 320-345

REFERENCE BOOKS
1. Software Testing Techniques, Boris Beizer ,Dreamtech Publications.
2. Software Testing: Effective Methods, Tools and Techniques,
Renu Rajani and Pradeep Oak, Tata-McGraw-Hill Publishing
Company Limited.
3. Foundations of Software Testing, Aditya P.Mathur, Dorling
Kindersley

(India) Pvt Ltd, Seventh Impression 2012.

COMPUTER NETWORKS
SEM

: VI

HOURS

:5

CODE

: 14CS6MC11

CREDITS

:5

OBJECTIVES
o To give a wide knowledge on the Computer Network concepts and its
implementation details in the recent networks.
o To understand the concepts of Network processes and models with real
time applications.
UNIT I

15 Hours

Introduction: Uses of Computer Networks Network Hardware Network


Software

Reference

Models

Example

Networks

Network

Standardization
UNIT II

15 Hours

The Physical Layer: The Theoretical Basis for Data Communication


Guided Transmission Media Wireless Transmission - Communication
satellites The Public Switched Telephone Network The Mobile telephone
system - Cable Television.
UNIT III

15 Hours

The Data Link Layer: Data Link Layer Design Issues Error Detection and
Correction Elementary Data Link Protocols Sliding window protocols
Protocol Verification - The Medium Access Control Sub layer: The Channel
Allocation Problem Multiple Access protocols - Ethernet Wireless LANS
Broadband wireless - Bluetooth Data Link Layer Switching.
UNIT IV

15 Hours

Network Layer: Network layer Design Issues Routing Algorithms


Congestion Control Algorithms Quality of service Internetworking - The
Transport Layer: The Transport Service Elements of Transport Protocols A Simple transport Protocol The internet transport protocols :UDP - The
internet transport protocols : TCP

UNIT V

15 Hours

The Application Layer: DNS (The Domain Name System) Electronic Mail
The World Wide Web Multimedia. Network Security: Cryptography
Symmetric key Algorithms - Public key Algorithms Digital Signatures
Management of public keys Communication Security.
TEXT BOOK
1. Computer Networks Andrew S. Tanenbaum, , Pearson Prentice Hall,
An imprint of Pearson Education and Dorling Kindersley (India) Pvt
Limited, Fourth Edition, 2009.
UNIT I

UNIT II :
UNIT III :
UNIT IV :
UNIT V :

Chapter

: 1 ( 1.1 1.6)

Pg. No.

: 1-77

Chapter

:2

Pg. No.

: 85-177 ( 2.1 2.8)

Chapters

: 3 ( 3.1- 3.5) , 4 ( 4.1 4.8)

Pg. No.

: 183- 234, 247-338

Chapters

: 5 ( 5.1 5.5 ),6 ( 6.1 6.5)

Pg. No.

: 343 431, 481 556

Chapters

: 7 (7.1-7.5), 8 (8.1-8.6)

Pg. No.

: 579 715, 721 - 785)

REFERENCE BOOKS
1. Computer Networks, Larry L. Peterson and Bruce S.Davie, II Edition,
2000.
2. Computer Networking, S. Pankaj, A.P.H Publishing Corporation,
New Delhi 110002, 2009.

DATA MINING
SEM

: VI

HOURS

:5

CODE

: 14CS6MC12

CREDITS

:5

OBJECTIVES

To provide a solid foundation on basic concepts and recent trends in


Datamining.
To give a basic knowledge in Research and case study

UNIT I

15 Hours

Introduction : Introduction-Data mining as a subject. Data warehousing:


Introduction-Data

warehouse

Architecture-Dimensional

Modelling-

Categorisation of Hierarchies - Aggregate Function -OLAP OperationsLattice of Cuboids- OLAP Server- ROLAP-MOLAP.
UNIT II

15 Hours

Data Mining : Introduction- data mining- Data mining definitions-KDD vs.


Data mining DBMS vs. DM Other related Areas- DM Techniques- Other
mining problems-Issues and challenges in DM-DM Application Areas -DM
Applications case studies. Association Rules: Introduction-Association rule Methods to discover association rules-Apriori Algorithm- Partition AlgorithmPincer-Search Algorithm-Dynamic Itemset Counting Algorithm-FP-tree
Growth Algorithm.
UNIT III

15 Hours

Clustering Techniques:
Algorithms-k-Medoid

Introduction-Clustering Paradigms-Partitioning
algorithm-CLARA-CLARANS-Hierarchical

Clustering-DBSCAN-BIRCH- CURE - Categorical Clustering AlgorithmsSTIRR-ROCK-CACTUS.


UNIT IV

15 Hours

Decision Trees: Introduction- Decision tree-Tree Construction Principle-Best


Split- Splitting Indices-Splitting Criteria- Decision Tree Construction
Algorithms-CART-

ID3-

C4.5-

CHAID-Pruning

Technique.

Genetic

Algorithm: Introduction- Basic steps of GA- Selection- crossover- mutationData Mining Using GA.

UNIT V

15 Hours

Web Mining: Introduction-Web mining-web content mining- web structure


mining web usage mining text mining -Temporal and Spatial Data
Mining: Introduction- Temporal Data mining- Sequence mining Time Series
Analysis-Spatial Mining.
TEXT BOOK
1. Data Mining Techniques, by Arun K. Pujari, Universities press (India)
Private Ltd. Third Edition, 2013.
Unit I

Unit II

Unit III

Unit IV

Unit V

CHAPTERS
Pg. No.
CHAPTERS
Pg. No.
CHAPTERS
Pg. No.
CHAPTERS
Pg No.
CHAPTERS
Pg. No

: 1, 2.1- 2.5, 2.8- 2.11.


:
1-4, 7- 28, 34-52
: 3.1- 3.11, 4.1-4.8.
: 98-118, 122-152
:5
: 170-200
: 6.1 6.11, 6.18, 8.1- 8.6.
: 206-225, 239-242, 275-286
: 10.1-10.6,11.1-11.4,11.11, 11.12.
: 310- 320, 330- 337, 348-352

REFERENCE BOOKS
1. Data mining Concepts and Techniques by Jiawei Han and Micheline
Kamber, Jian Pei, Third Edition, Morgan Kaufman Publishers, 2013.
2. Insight into Data Mining Theory and Practice K.P. Soman, Shyam
Diwakar, V. Ajay, PHI learning Private Limited, Sixth Printing, 2012.

MOBILE COMPUTING
SEM

: VI

HOURS

:4

CODE

: 14CS6MC13

CREDITS

:4

OBJECTIVES
o To understand the basic concepts of new operating systems.
o To understand the concepts of Mobile Ad-Hoc and Wireless Sensor
Networks
UNIT I
INTRODUCTION: Mobile Computing- Dialogue Control- NetworksMiddleware and Gateways- Application and Services- Developing Mobile
Computing Applications- Security in Mobile Computing Mobile Computing
Architecture : Architecture for Mobile Computing- Three-tier ArchitectureMobile Computing through telephony : Satellite Communication SystemsMobile Computing Through Telephone.
UNIT II
GLOBAL SYSTEM FOR MOBILE COMMUNICATIONS: Global
System

for mobile Communications- GSM Architecture-

Entities- Call Routing in

GSM- PLMN Interfaces- GSM Address and

Identifiers- Network Aspects in


Computing over

GSM

GSM- Short message services : Mobile

SMS- Short Message Service-General packet Radio

Service- Introduction-

GPRS and

Packet Data Network- GPRS

Network Architecture- GPRS Network Operations- Data

Services in GPRS-

Applications for GPRS- Limitations of GPRS- CDMA and 3G : CDMA


versus GSM.
UNIT III
WIRELESS MEDIUM ACCESS CONTROL, CDMA, 3G and 4G
COMMUNICATIONS:

Modulation- Multiplexing- Spread Spectrum-

Frequency Hopping Spread

Spectrum- High Speed Packet Access 3G

Network- Broad Band Wireless Access- 4G Networks.


UNIT IV
MOBILE AD-HOC AND WIRELESS SENSOR NETWORKS:
Introduction

to mobile Ad-Hoc Network- MANET- Security in Ad-Hoc

Network- Wireless

Sensor Networks- Sensor Network Applications-

Distributed Network and Characteristics- Mobile Wireless Short range


networks and mobile Internet : IrDA Protocols- ZigBee.
UNIT V
MOBILE APPLICATION LANGUAGES XML AND JAVA: Mobile
Application Development Mobile Application Development Platforms:
Windows Mobile and CE- Windows Phone 7- Android - Symbian
TEXT BOOK
1. Mobile Computing Technology, Applications and Service creations
Asoke k Thalukder, Hasan Ahmed, Roopa R Yavagal, Second Edition, Tata
McGraw Hill Education Private Limited, 2010.
UNIT I :

UNIT II :

Chapters

1,2,3

Pg. No.

5 18 , 28 40 , 63- 70

Chapters

5 (5.1- 5.7) ,6 (6.1 6.2) ,7(7.1 7.7),


9 (9.4)

Pg. No.

116- 130, 145 151, 174 188,


235-236

2. Mobile Computing Raj Kamal, Second Edition, Oxford University

Press, 2012.
UNIT III :

Chapters

4 (4.1 4. 2 , 4.4 4.5, 4.13,


4.16-

Pg. No.

4.17

147- 154,159-177, 208- 212,


214-220

UNIT IV :

Chapters

11 (11.1,11.2, 11.4 11.7) ,


2 (12.7 12.8)

UNIT V :

Pg. No.

468- 476, 485-492 , 540 - 550

Chapters

13 (13.1) , 14 (14.2-14.5)

Pg. No.

550- 551 , 589 - 613

REFERENCE BOOKS
1. Jochen Schillar Mobile Communications Pearson Education second
Edition, Dorling Kindersley Pvt. Ltd, Second Impression 2012.
2. Pei Zheng, Larry L. Peterson, Bruce S. Davie, Adrian Farrell Wireless
Networking Complete Morgan Kaufmann Series in Networking .
3. Vijay K Garg Wireless Communications & Networking Morgan
Kaufmann Series, 2010

CLOUD COMPUTING
SEM

: VI

HOURS

:4

CODE

: 14CS6CE3A

CREDITS

:3

OBJECTIVES
o To impart Cloud Computing skills such as Developing Our Own
Applications,

Security Concerns, Business Development and

Practices.
o To introduce the basic concepts of Cloud computing and its Various
Applications and Technologies to impart basic skills of Cloud
Computing.
UNIT I

15 Hours

Understanding Cloud Computing : Beyond the Desktop Computing in the


Cloud Developing Cloud Services
UNIT II

15 Hours

Cloud Computing for Every one : Cloud Computing for the family- Cloud
Computing For the Community Cloud Computing For the Corporation.
UNIT III

15 Hours

Using cloud services: Collaborating on Calendars, Schedules and task


management - Collaborating on Event management - Collaborating on contact
management - Collaborating on Project management - Collaborating on Word
Processing.
UNIT IV

15 Hours

Using cloud services: Collaborating on Spread Sheets - Collaborating on


Databases - Collaborating on Presentations Storing and Sharing Files and
other On-Line Content Sharing Digital Photograph Controlling It All with
Web Based Desktops.
UNIT V

15 Hours

Outside the Cloud : Other Ways To Collaborate On-Line : Collaborating


Via Web based communication tools Collaborating via Social Networks and
GroupWare Collaborating via Blogs and Wikis.

TEXT BOOK
1. Cloud Computing : Web based Applications That change the Way
You Work and Collaborate On-Line , Michael Miller , Pearson
Education , 2008.
Unit I
Unit II
Unit III
Unit IV
Unit V

:
:
:
:
:

Chapters

1, 2, 3

Pg. No.

5 - 47

Chapters

4, 5, 6

Pg. No.

49 -81

Chapters

7,8,9,10,11

Pg. No.

85 -164

Chapters

12, 13, 14, 15, 16, 17

Pg. No.

65 - 243

Chapters

8, 19, 20

Pg. No.

245 - 284

REFERENCE BOOKS
1. Cloud Computing: A Practical Approach, Velte T. Antony, Velte J.
Toby, Elsenpeter Robert, , Tata McGraw Hil, 2010
2. Cloud Computing Principles and Paradigms-Rajkumar Buyya,
James Broberg, Andrzej Goscinski , Wiley- India Pvt. Ltd. 2013.
3. Cloud Computing Bible-Barrie Sosinsky, Wiley- India Pvt. Ltd, 2013.

INFORMATION SECURITY
SEM: VI

HOURS: 5

CODE: 14CS6CE2B

CREDITS: 4

OBJECTIVES
o To protect information from hackers is an art in the field of Computer
Science.
o This subject will give an idea about Information security and principles
of cryptography.
o To provide a review of the entire field of information security,
background on many related elements and also give an enough detail
to facilitate an understanding of the information security.
UNIT I

15 Hours
Information Security: An Introduction: Introduction The History of

Information Security Security CNSS Security Model Components of an


Information system Balancing Information Security and Access
Approaches to Information Security Implementation - The Systems
Development Life Cycle The Security Systems Development Life Cycle
Why Security is needed :Introduction Business Needs First Threats
Attacks Secure Software Development.
UNIT II

15 Hours

Managing IT Risk : Introduction An Overview of Risk Management - Risk


Identification Risk Assessment Risk Control Strategies Selecting a Risk
Control Strategy Quantitative Versus Qualitative Risk Control Practices Risk management Discussion points.
UNIT III

15 Hours

How to plan for Security: Introduction Information Security Planning and


Governance - Information Security Policy, Standards and Practices The
Information Security Blueprint Security Education, Training and Awareness
Program Continuity Strategies - Security Technology: Wireless, VPNs
and Firewalls : Introduction Access Control Fire Walls Protecting
Remote Connections.

UNIT IV

15 Hours

Security Technology: Prevention Systems, Intrusion Detection and Other


Security Tools: Introduction Intrusion Detection and Prevention Systems
Honey Pots, Honey Nets and Padded cell Systems - Scanning and Analysis
Tools Biometric Access Controls..
UNIT V

15 Hours

Using Encryption : Introduction Fundamentals of Cryptology - Cipher


Methods - Cryptographic Algorithms - Cryptographic Tools Protocols for
Secure Communications Attacks on Cryptosystems.
TEXT BOOK
1. Principles of Information Security , Michael E. Whitman and
Herbert J. Mattord, Fourth Edition .Cengage Learning India Private Ltd,
New Delhi ,2014.
UNIT I

UNIT II :
UNIT III :
UNIT IV :
UNIT V :

Chapters

1, 2

Pg. No.

1 29, 37 - 85

Chapter

Pg. No.

115 166

Chapters

5, 6

Pg. No.

167 236, 237 -279

Chapter

Pg. No.

281 -336

Chapter

Pg. No.

337 - 382

REFERENCE BOOKS
1. Information Security Theory and Practice Dhiren R. Patel, Prentice
Hall of India Private Ltd, New Delhi , Eastern Economy Edition, 2008.
2. Introduction to Computer Security, Matt Bishop, Pearson Education,
Dorling Kindersley (India) Pvt. Ltd , First Edition, 2011.

WEB DESIGNING USING OPEN SOURCE LAB (PHP)


SEM

: VI

HOURS

:2

CODE

: 14CS6SK04

CREDITS

:2

1. Creating simple webpage using PHP


2. Use of conditional statements in PHP
3. Use of looping statements in PHP
4. Creating different types of arrays
5. Usage of array functions
6. Creating user defined functions
7. Creation of files
8. File manipulation using PHP
9. Creation of sessions
10. Creation of cookies
11. Creating simple applications using PHP
12. Validating input
13. Formatting the output.
14. Database connectivity in PHP with MySQL

You might also like