Professional Documents
Culture Documents
&
SYLLABI
for
Bachelor of Technology
(Computer Science & Engineering)
July, 2011 Onwards
1st Year
1st Semester
SN Course
No
1
MA-111
2
CH-101
3
MS-101
4
EC-101
5
CE-101
6
AR-101
Practicals
7
CH-101(P)
8
MS-101(P)
9
10
EC-101(P)
WS-102
2nd Semester
SN Course
No
1
MA-121
2
PH-101
3
CS-101
4
5
HS-101
ME-101
6
EE-101
Practicals
7
PH-101(P)
8
CS-101(P)
9
10
11
HS-101(P)
EE-101(P)
WS-101
Subject
L T
Hours Credits
Engineering Mathematics-I
Engineering Chemistry
Material Science and Engineering
Basic Electronics Engineering
Environmental Science and Disaster
Management
Engineering Drawing
3
3
3
3
3
1
1
1
1
1
0
0
0
0
0
4
4
4
4
4
4
4
4
4
4
3
2
3
2
2
1
0
0
0
0
0
1
0
0
Subject
L T
Hours Credits
Engineering Mathematics-II
Engineering Physics
Computer Fundamentals &
Programming
Communication Skills
Engineering Mechanics & Strength
of Materials
Basic Electrical Engineering
3
3
3
1
1
1
0
0
0
4
4
4
4
4
4
2
3
1
1
0
0
3
4
3
4
0
0
0
0
2
2
2
2
1
1
0
0
1
0
0
0
2
2
4
35
1
1
3
30
2 2
3 4
Total 35
2
2
3
Total
1
3
30
2nd Year
3rd Semester
SN Course
No
1.
MA-215
2
CS-211
3
CS-212
4
CS-213
5
CS-214
6
EC-212
7
HS-203
Practicals
8
CS-212(P)
9
CS-214(P)
10 EC-212(P)
Subject
L T
Hours Credits
3
3
3
3
3
3
1
1
1
1
1
1
1
0
0
0
0
0
0
0
0
4
4
4
4
4
4
1
4
4
4
4
4
4
1
0
0
0
0
0
0
2
2
2
2
2
2
1
1
1
Total 31
28
th
4 Semester
SN Course
No
1
CS-221
2
CS-222
3
CS-223
4
CS-224
5
CS-225
6
HS-201
7
ECA-201
Practicals
9
CS-221(P)
10 CS-222(P)
11 CS-223(P)
Subject
L T
Hours Credits
Computer Organization
Operating System
Object Oriented Paradigm
System Software
Theory of Computation
Managerial Economics
Extra Curricular Activity
3
3
3
3
3
3
0
1
1
1
1
1
1
0
0
0
0
0
0
0
2
4
4
4
4
4
4
2
4
4
4
4
4
4
1
0
0
0
0
0
0
2
2
2
32
1
1
1
28
2
2
2
Total
3rd Year
5th Semester
SN Course
No
1
2
CS-311
3
CS-312
4
CS-313
5
CS-314
6
EC-316
Practicals
7
CS-313(P)
8
CS-314(P)
6th Semester
SN Course
No
1
2
CS-321
3
CS-322
4
CS-323
5
CS-324
6
HS-301
Practicals
7
CS-321(P)
8
CS-326(P)
Subject
L T
Hours Credits
Open Elective-I
Modeling and Simulation
Analysis & Design of Algorithms
Data Base Management Systems
Unix Programming
Communication Engineering
3
3
3
3
3
3
0
1
1
1
1
1
0
0
0
0
0
0
3
4
4
4
4
4
0
0
0
0
Subject
L T
Hours Credits
Open Elective-II
Computer Networks
Software Engineering
Department Elective-I
Department Elective -II
Principles of Management
3
3
3
3
3
3
0
1
1
0
0
1
0
0
0
0
0
0
3
4
4
3
3
4
0
0
0
0
2 2
2 2
Total 27
2 2
2 2
Total 25
3
4
4
4
4
4
1
1
25
3
4
4
3
3
4
1
1
23
Final Year
7th Semester
SN Course
No
1
CS-411
2
CS-412
3
CS-413
4
CS-414
5
CS-415
Practicals
6
CS-496
7
CS-497
8
CS-498
9
CS-411(P)
10 CS-412(P)
8th Semester
SN Course
No
1
CS-421
2
CS-422
3
CS-423
4
CS-424
Practicals
5
CS-499
6
CS-421(P)
7
CS-425(P)
Subject
L T
Hours Credits
Information Security
Compiler Design
Advanced Computer Architecture
Departmental Elective-III
Departmental Elective-IV
3
3
3
3
3
1
1
1
0
0
0
0
0
0
0
4
4
4
3
3
4
4
4
3
3
0
0
0
0
0
0
0
0
0
0
0
3
6
2
2
31
2
2
3
1
1
27
Subject
L T
Hours Credits
3
3
3
3
1
1
0
0
0
0
0
0
4
4
3
3
4
4
3
3
Major Project-II
Data Ware Housing and Data Mining
Lab
Software Lab-II
0
0
0
0
6
2
6
2
3
1
0
3
6
2
2
Total
2 2
Total 24
1
19
OPEN ELECTIVES
CS-310 (Open Electives-I) (Offered to other departments)
CS-310(a)
CS-310(b)
L
3
3
T
0
0
P
0
0
H
3
3
C
3
3
L
3
T
0
P
0
H
3
C
3
DEPARTMENT ELECTIVES
CS-323 Department Elective-I
CS-323(a)
Web Technologies
CS-323(b)
Digital Arithmetic
CS-323(c)
CAD of Digital Systems
CS-323(d)
Artificial Intelligence
CS-324 Department Elective-II
CS-324(a)
Management Information System
CS-324(b)
Advanced Microprocessors
CS-324(c)
Digital Image Processing
CS-324(d)
Parallel Algorithms
CS-414 Department Elective-III
CS-414(a)
Information Retrieval
CS-414(b)
Distributed Databases
CS-414(c)
Advances in Algorithms
CS-414(d)
Programming Language Security
CS-415 Department Elective-IV
CS-415(a)
Distributed Systems
CS-415(b)
Agent Based Systems
CS-415(c)
Web Based Application Security
CS-415(d)
Quantum Computing
CS-423 Department Elective-V
CS-423(a)
Client Server Computing
CS-423(b)
Reconfigurable Computing
CS-423(c)
System and Network Administration
CS-423(d)
Software Quality Assurance
CS-424 Department Elective-VI
CS-424(a)
Formal Verification
CS-424(b)
E-Commerce
CS-424(c)
Storage Technologies
CS-424(d)
Security Protocol Analysis
L
3
3
3
3
T
0
0
0
0
P
0
0
0
0
H
3
3
3
3
C
3
3
3
3
3
3
3
3
0
0
0
0
0
0
0
0
3
3
3
3
3
3
3
3
3
3
3
3
0
0
0
0
0
0
0
0
3
3
3
3
3
3
3
3
3
3
3
3
0
0
0
0
0
0
0
0
3
3
3
3
3
3
3
3
3
3
3
3
0
0
0
0
0
0
0
0
3
3
3
3
3
3
3
3
3
3
3
3
0
0
0
0
0
0
0
0
3
3
3
3
3
3
3
3
In addition to these electives, any other core/elective floated for M.Tech., Computer Science &
Engineering, and M.Tech., Mobile Computing may also be floated as elective for B.Tech.,
Computer Science & Engineering.
1
CS-426*
L
3
T
1
P
0
C
4
L
3
T
1
P C
0 4
J. P. Tremblay and R Manohar, Discrete Mathematical structures with applications to Computer Science,
McGraw Hill.
C.L. Liu, Elements of Discrete Mathematics, McGraw Hill.
Scheinerman, Edward, Mathematics: A Discrete Introduction, Cengage.
Roman, Steven. An Introduction to Discrete Mathematics, Saunders, NY.
Rosen, Kenneth h. Discrete Mathematics and Its Applications, McGraw/Hill
Barnett, Steven. Discrete Mathematics, Addison Wesley
Dossey, John A. et al, Discrete Mathematics, Addison-Wesley,
Semyour Lipscdutz, Marc Lipson, Discrete Mathematics, Schaums outlines, Tata McGraw- Hills.
L
3
T
1
P
0
C
4
J.P. Tremblay and P.G. Sorenson, An Introduction to Data Structures with applications, Tata McGraw
Hill.
S.Sahni, Data structures, Algorithms ad Applications in C++, WCB/McGraw Hill.
Aho ,Ullman and Hopcroft, Data Structures and Algorithms.
Y. Langsam, M. J. Augenstein and A. M. Tenenbaum, Data Structures using C, Pearson Education
Richard F. Gilberg, Behrouz A. Forouzan, Data Structures A Pseudocode Approach with C, Thomson
Brooks / COLE
L
3
T
1
P
0
C
4
L
3
T
1
P
0
C
4
L
3
T
1
P
0
C
4
L
3
T
1
P
0
C
4
L
3
T
1
P
0
C
4
L
3
T
1
P
0
C
4
System Software
Distinction between system software and application software, Components of System
Software, Evolution of System Software, H/W Independent features of System Software, General
features of a System Software, Layered Organization of System Software, Overview of Compilers and
Interpreters.
Machine Language and Microprocessor
Defining and Usage of Macro Expression, Macro Definition Language: Macro generation,
Positional Parameters and Keyword parameters, Conditional Macro expansion, Macro Calls within
Macros and its implementation, Macro Instructions Defining Macros, One-Pass Macro Processor.
Assembler
Machine Structure, Machine Languages, Elements of Assembly language Programming,
Machine Independent features: Instructions, Program location, Command to Loader, Machine
Dependent features: Literals, Symbol defining statements, Expressions, Program Block, Control
section and program linking, Design of Two-Pass Assembler, Data Structures Format of Databases,
Algorithm, A Single-Pass Assembler.
Loaders
Object Code, Function to be performed by Object Code, Machine dependent Features:
Location, Linking, Machine Independent features: Automatic Library Search, Loader options, Overlay
program, Loader Schemes: Compile and go Loaders, Absolute Loaders, Relocatability: NonRelocating Program, Relocatable Program, Self-Relocating Programs, Algorithms for Relocating
Loaders Using Relocation bit, Algorithm for Relocating loader Using Relocatable Location table,
design of BSS Loader, Linking Schemes.
System Software Tools
Elements of System software Tools, Text Editor: Line and Stream Editor, Screen Editor,
Structure Editor, Word Processor, Editor Structure, Debug Monitor, Programming Environment, DOS
functions, Keyboard Management, Screen Management, Window or Display management, Text or
Graphics, Overlayed or Tiled, Transcription and Image Buffer process per Window, Multi Tasking
Window System, Machine and Assembly language Programming Interface. Device Driver
Programming
Virus
Classification of Virus, Virus Detection and Control System, Virus in other environment, case
studies.
Text and Reference Books
1. John J. Donovan, System Programming, TMH
2. D. M. Dhamdhere, System Software and Operating System, TMH.
3. Leland L. Black, System Software-An Introduction to System Programming, Addison
Wesley.
4. Intel Users manual for 8086, 80386 & 80486, Pentium & Pentium pro.
L
3
T
1
P
0
C
4
John E. Hopcroft, Jeffery Ullman, Introduction to Automata theory, Langauges & computation, Narosa
Publishers.
E.V. Krishnamurthy, Introductory Theory of Computer science. East West Press
K.L.P. Mishra, Theory of computer Science, Prentice Hall of India Pvt. Ltd.
L
3
T
1
P
0
C
4
L
3
T
1
P
0
C
4
L
3
T
1
P
0
C
4
L
3
T
1
P
0
C
4
L
3
T
1
P
0
C
4
L
3
T
1
P
0
C
4
L
3
T
1
P
0
C
4
L
3
T
1
P
0
C
4
Alfred Aho, Ravi Sethi, Jeffrey D Ullman, Compilers Principles, Techniques and Tools, Pearson
Education
Allen I. Holub Compiler Design in C, Prentice Hall of India,
C. N. Fischer and R. J. LeBlanc, Crafting a compiler with C, Benjamin Cummings,
J.P. Bennet, Introduction to Compiler Techniques, Tata McGraw-Hill
Henk Alblas and Albert Nymeyer, Practice and Principles of Compiler Building with C, PHI.
Kenneth C. Louden, Compiler Construction: Principles and Practice, Thompson Learning
L
3
T
1
P
0
C
4
David A Patterson & John L Hennessy, Computer Organization & Design: A Harware/Software Interface,
Morgan Kaufmann Publishers.
John L Hennessy & David A Patterson, Computer Architecture: A Quantitative Approach, Morgan
Kaufmann Publishers.
L
3
T
1
P
0
C
4
L
3
T
1
P
0
C
4
Introduction
Challenges in mobile computing, coping with uncertainties, resource poorness, bandwidth, etc.
Cellular architecture, co-channel interference, frequency reuse, capacity increase by cell splitting.
Medium Access Control
Motivation for a specialized MAC: Hidden and Exposed terminals. Near and Far terminals;
SDMA, FDMA, TDMA: Fixed TDM, Classical Aloha, Slotted Aloha, Carrier sense multiple access,
Demand assigned multiple access, PRMA packet reservation multiple access, Reservation TDMA,
Multiple access with collision avoidance, Polling, Inhibit sense multiple access; CDMA: Spread Aloha
multiple access.
Telecommunication Systems
GSM: Mobile services, System architecture, Radio interface, Protocols, Localization And
Calling, Handover, Security, New data services; DECT: System architecture, Protocol architecture;
TETRA, UMTS and IMT-2000: UMTS Basic architecture, UTRA FDD mode, UTRA TDD mode.
Wireless LAN
Infrared vs. Radio transmission, Infrastructure and Ad hoc Networks, IEEE 802.11: System
architecture, Protocol architecture, Physical layer, Medium access control layer, MAC management,
Future development.
HIPERLAN
Protocol architecture, Physical layer, Channel access control. Sublayer, Medium access control
Sublayer, Information bases And Networking.
Bluetooth
User scenarios, Physical layer, MAC layer, Networking. Security, Link management.
Mobile Network Layer
Mobile IP: Goals, assumptions and requirements, Entities and Terminology, IP packet
delivery, Agent advertisement and discovery, Registration, Tunneling and Encapsulation,
Optimizations, Reverse tunneling, Ipv6; Dynamic host configuration protocol, Ad hoc networks:
Routing.
Mobile Transport Layer
Traditional TCP: Congestion control, Slow start, Fast retransmit/fast recovery, Implications on
mobility; Indirect TCP, Snooping TCP, Mobile TCP, Fast retransmit/fast recovery,
Transmission/timeout freezing, Selective retransmission, Transaction oriented TCP.
Data Dissemination and Management
Challenges, Data dissemination, Mobile data replication, Mobile data caching, Mobile cache
maintenance, mobile web caching, caching in ad hoc networks.
Context Aware Computing
Ubiquitous computing, concept of context, context aware computing and applications,
middleware support.
Mobile Middleware
Service discovery, adaptation, mobile agents.
Wireless security
Traditional security issues, mobile and wireless security issues, Problems in ad hoc networks.
Text and Reference Books
1.
Frank Adelstein, S.K.S. Gupta, Golden G. Richard III and Loren Schwiebert, Fundamentals of Mobile and
Pervasive Computing, McGraw-Hill Professional.
2.
3.
4.
5.
L
3
T
0
P
0
C
3
L
3
T
0
P
0
C
3
L
3
T
0
P
0
C
3
L
3
T
0
P
0
C
3
L
3
T
0
P
0
C
3
Event Model On check On load Onerror Mouse related events Form processing
Event Bubblers. CSS- Inline styles Embedded Style Sheet Linking External Style Sheets
Positioning of Elements-Drop Down Menus Text shadows Multiple Background Images
Multimedia
Audio and video speech synthesis and recognition, Electronic Commerce, EBusiness Model,
E- Marketing, Online Payments and Security, Web Servers, HTTP request types, System Architecture,
Client Side Scripting and Server side Scripting, Accessing Web servers, IIS, Apache web server.
XML
Structure in Data Name spaces DTD Vocabularies DOM methods.
Servlets and JSP
Introduction, Servlet Overview Architecture, Handling HTTP Requests, Get and post requests,
redirecting request, multi-tier applications, JSP, Overview, Objects, scripting, Standard Actions,
Directives.
Deitel & Deitel, Goldberg, Internet and world wide web How to Program, Pearson Education Asia.
Paul Deitel , Harvey Deitel, Abbey Deitel ,Internet and world wide web How to Program, Prentice
Hall
L
3
T
0
P
0
C
3
L
3
T
0
P
0
C
3
L
3
T
0
P
0
C
3
L
3
T
0
P
0
C
3
L
3
T
0
P
0
C
3
MIPS
Architecture,
The MIPS
Earlier
MIPS
L
3
T
0
P
0
C
3
L
3
T
0
P
0
C
3
L
3
T
0
P
0
C
3
Kowalski, Gerald, Mark T Maybury: Information Retrieval Systems: Theory and Implementation, Kluwer
Academic Press,
Ian Witten, Marco Gori, Teresa Numerico, Web Dragons: Inside the Myths of Search Engine Technology,
Morgan Kauffman.
Christopher D. Manning, Prabhakar Raghavan and Hinrich Schtze, Introduction to Information Retrieval
by Cambridge University Press.
Frakes, W.B., Ricardo Baeza-Yates: Information Retrieval Data Structures and Algorithms, Prentice Hall,
Robert Korfhage, Information Storage & Retieval, John Wiley & Sons.
TREC: Experiment and Evaluation in Information Retrieval. Ellen M. Voorhees and Donna K. Harman,
editors. Cambridge, Massachusetts: MIT Press
L
3
T
0
P
0
C
3
L
3
T
0
P
0
C
3
Algorithmic paradigms
Dynamic Programming, Greedy, Branch-and-bound; Asymptotic complexity, Amortized
analysis;
Graph Algorithms
Shortest paths, Flow networks; NP-completeness; Approximation algorithms; Randomized
algorithms;
Linear Programming
Special topics: Geometric algorithms (range searching, convex hulls, segment intersections,
closest pairs), Numerical algorithms (integer, matrix and polynomial multiplication, FFT, extended
Euclid's algorithm, modular exponentiation, primality testing, cryptographic computations)
Internet Algorithms
Text pattern matching, tries, information retrieval, data compression, web caching.
Quantum Algorithms
Qubits, superposition, and measurement, quantum Fourier transform, Periodicity Quantum
circuits, Factoring as periodicity quantum algorithm for factoring.
L
3
T
0
P
0
C
3
L
3
T
0
P
0
C
3
L
3
T
0
P
0
C
3
L
3
T
0
P
0
C
3
Oppliger, Rolf. Security Technologies for the World Wide Web, Second Edition. Artech House Publishers.
Garms, Jess and Daniel Somerfield. Professional Java Security. Wrox
Garms, Jess and Daniel Somerfield. Professional Java Security. Wrox
L
3
T
0
P
0
C
3
L
3
T
0
P
0
C
3
Robert Orfali and Dan Harkey , Client/Server programming with Java and CORBA, John Wiley &
Sons,SPD.
G.Brose, A Vogel and K.Duddy, Java programming with CORBA, Wiley-dreamtech, India John wiley
and sons.
M.L.Liu, Distributed Computing, Principles and applications, Pearson Education.
Robert Orfali Dan Harkey & Jeri Edwards , Client/Server Survival Guide, John Wiley & Sons.
D T Dewire , Client/Server Computing, TMH.
Ron Ben Natan Ori Sasson ,IBM Webspere Starter Kit, TMH.
L
3
T
0
P
0
C
3
L
3
T
0
P
0
C
3
Mark Burgessm, Principles of Network and System Administration , John Wiley and Sons Ltd.
Craig Hunt, TCP/IP Network Administration, O Reilly and Associates Inc.
George Splading, Windows 2000 Administration, McGraw-Hill.
Olaf Kirch and Terry Dawson, Linux Network Administrators Guide, O Reilly and Associates Inc.
(Shroff Publishers and Distributors).
Software Requirements: Microsoft Windows 2000, Linux, Perl/Python.
L
3
T
0
P
0
C
3
Galin Daniel. Quality Assurance, From theory to implementation. Pearson Education, Ltd,
Patton Ron, Software Testing. SAMS Publishing.
Kan Stephen H. Metrics and Models in Software Quality Engineering, Pearson Education Inc.
Fenton, Norman E., Pfleeger, Shari L. Software Metrics: A Rigorous & Practical Approach.
IEEE Standards: Software Engineering, Volumes OneFour.
Pressman Roger S. Software Engineering: Practitioner's Approach. McGraw-Hill Inc.,
L
3
T
0
P
0
C
3
L
3
T
0
P
0
C
3
CS-424(b) E-COMMERCE
Electronic Commerce
Frame work, anatomy of E-Commerce applications, E-Commerce Consumer applications, ECommerce organization applications.
Consumer Oriented Electronic commerce
Mercantile Process models.
Electronic payment systems
Digital Token-Based, Smart Cards, Credit Cards, Risks in Electronic Payment systems.
Inter Organizational Commerce
EDI, EDI Implementation, Value added networks.
Intra Organizational Commerce
Work Flow, Automation Customization and internal Commerce, Supply chain Management.
Corporate Digital Library
Document Library, digital Document types, corporate Data Warehouses. Advertising and
Marketing - Information based marketing, Advertising on Internet, on-line marketing process, market
research.
Consumer Search and Resource Discovery
Information search and Retrieval, Commerce Catalogues, Information Filtering.
Multimedia
Key multimedia concepts, Digital Video and electronic Commerce, Desktop video
processings, Desktop video conferencing.
L
3
T
0
P
0
C
3
L
3
T
0
P
0
C
3
P.Y.A. Ryan and S.A. Snyder, Modeling and analysis of security protocols, Addison-Wesley.
L
3
T
1
P
0
C
4