You are on page 1of 20

Department of Computer Science and Engineering

The Department of Computer Science & Engineering (CSE) was started laboratory has been designed to accommodate 30-35 students per
in 1985 with a B. Tech degree program in Computer Science and Engg. session and has been equipped with the state of the art computer
Over the years, the department has developed to become a center of systems, with a total of about 380 Intel based Computers, with all
excellence providing in-depth technical knowledge and opportunities for necessary peripherals.
innovation and research with well equipped with state -of-the-art
computer facilities and dedicated faculty. Industry Interaction and Research Activities
The department has tie-up with Infosys, Microsoft, TCS, and EMC2
The department started Master of Technology (M.Tech) degree program Corporation. The department also offers Elective courses in
of two years in Computer Science & Engineering in 1989 and Computer collaboration with industries.
Science and Information Security in 2010 with the aim to develop core
competence and prepare the students to carry out development work, as 4 The elective course Data Mining and Business Analytics is offered in
well as take up the challenges in research. collaboration with Infosys
4 The elective course Information Storage Management is offered in
Besides these, the Department has strong research interest in diverse collaboration with EMC2
branches of Computer Science and offers a Doctor of Philosophy (Ph.D)
programme. The research activities of the staff and the students have resulted in more
than 350 publications in International conferences and Journals. Great
Academic programs offered emphasis is given on the emerging, interdisciplinary, cutting-edge areas
4 B.Tech. in Computer Science & Engineering (since 1985) of research within the department. Currently the department has the
4 M.Tech. in Computer Science & Engineering (since 1989) following research groups for the benefit of faculty and students.
4 M.Tech. in Computer Science & Information Security (since 2010)
4 Ph.D. 4 High Performance Computing System
4 Computer Vision
Infrastructural Facilities 4 Software Engineering
The department has 11 different laboratories, viz. Digital Systems Lab., 4 Knowledge Engineering
PG and Research Lab, Data base Systems Lab., Network Technology 4 Computer Networks & Security
Lab., Software Engineering Lab, Information Security Lab.,
Programming Lab, Project Lab., Operating Systems Lab., Language
Processor Lab and Computer Graphics Lab. with central air-
conditioning, UPS and special furniture for computer users. Each

105
Faculty list Mr. B. Kishore, MTech
Mr. Roshan David Jathanna, MTech
Professor & Head Ms C. Anita Marx, MTech
Dr Renuka A., Ph.D (NITK, Surathkal) Mr Gururaj, MTech
Mr Yusuf Haider M., MTech
Professor Ms Archana Praveen Kumar, Mtech
Dr N. V. Subba Reddy, Ph.D (Kuvempu University) Ms Tanuja Shailesh, MTech
Dr Prema K. V., Ph.D (Kuvempu University) Mr Murali Krishna S N, BE., MTech
Dr Dinesh Acharya U., Ph.D (Manipal University) Ms D. Cenitta, BE., MTech
Dr Gopalakrishna N. Kini, Ph.D (Manipal University) Mr Prakash K. Aithal, MTech
Dr Ashalatha Nayak G. D., Ph.D (IIT, Kharagpur) Mr Manoj R., MTech
Dr Geetha M., Ph.D (NITK, Surathkal) Ms Anjana S., MTech
Dr Harish S. V., Ph.D (NITK, Surathkal) Ms Rajashree Krishna, MTech
Dr Krishna Moorthi Makkithaya, Ph.D (Manipal University)
Assistant Professor
Associate Professor Ms Sucharitha Shetty, MTech
Dr Vivekananda Bhat K., Ph.D (IIT, Kharagpur) Ms Anita Kini, MTech
Dr P. C. Siddalingaswamy, Ph.D (Manipal University) Ms Shwetha Rai, MTech
Dr Srikanth Prabhu, Ph.D (IIT, Kharagpur) Mr Karanth Shyam Subraya, MTech
Dr Mamata Balachandra, Ph.D (Manipal University) Ms Radhika Kamath, MTech
Dr Vijaya Arjunan, Ph.D (SCSVMV, Kanchipuram) Ms Vidhya V., MTech
Ms Ancilla Juliet Pinto, MTech
Assistant Professor - Selection Grade Ms Praseeda, MTech
Ms Hemalatha S., MTech Mr N. Siva Selvan, MTech
Mr Shivaprasad G., MTech Mr Ganesh Babu C., MS
Mr Giridhar N. Shakarad, MTech Ms Jashma Suresh P., ME.
Mr Narendra V. G., Mtech Ms Priya Kamath B., MTech
Mr Manamohana K., MTech Ms Deepthi S., MTech
Mr Rajesh G., MTech Ms Roopashri Shetty, MTech
Ms Suma D., MTech Ms Jyothi Upadhya K., MTech
Ms Janani M., MTech
Assistant Professor - Senior Scale Ms Vidya Pai, MTech
Mr Chidananda Acharya, MTech Ms Vyshali Rao K. P., MTech
Mr Praveen Pai T., MTech Ms Josephine Veena D., MTech
Mr Ashwath Rao B., MTech Ms Jimcymol James, MTech
Mr Ahamed Shafeeq B. M., MTech Mr Bhargav J. Bhatkalkar, MTech
Mr Govardhan Hegde K., MTech Ms Praseetha M., MTech
Mr Dasharathraj K. Shetty, BE., MTech, MBA Ms Anu Jose, Mtech
Ms Shanthi P. B., MTech

106
B Tech in COMPUTER SCIENCE AND ENGINEERING

THIRD SEMESTER FOURTH SEMESTER

Year
Subject Code Subject Name L T P C Subject Code Subject Name L T P C
MAT 2105 Engineering Mathematics III 2 1 0 3 MAT2205 Engineering Mathematics IV 2 1 0 3
CSE 2101 Computer Organization & Design 3 1 0 4 CSE 2201 Formal Languages & Automata Theory 3 1 0 4
CSE 2102 Switching Circuits & Logic Design 2 1 0 3 CSE 2202 Design and Analysis of Algorithms 3 1 0 4
CSE 2103 Data Structures 3 1 0 4 CSE 2203 Microprocessors 2 1 0 3
II CSE 2104 Object Oriented Programming 3 1 0 4 CSE 2204 Database Systems 2 1 0 3
CSE 2111 Logic Design Lab 0 0 3 2 *** **** Open Elective I 3 0 0 3
CSE 2112 Data Structures Lab 0 0 3 2 CSE 2211 Microprocessors Lab 0 0 3 2
CSE 2113 Object Oriented Programming Lab 0 0 3 1 CSE 2212 Database Systems Lab 0 0 3 2
13 5 9 23 15 5 6 24
FIFTH SEMESTER SIXTH SEMESTER
CSE 3101 Computer Architecture 2 1 0 3 HUM 4002 Engineering Economics and Financial Management 2 1 0 3
CSE 3102 Operating Systems 3 1 0 4 CSE 3201 Compiler Design 2 1 0 3

107
CSE 3103 Computer Networks 3 1 0 4 CSE 3202 Parallel Computer Architecture and Programming 2 1 0 3
CSE 3104 Software Engineering 3 1 0 4 CSE **** Programme Elective II 3 0 0 3
III
CSE **** Programme Elective I 3 0 0 3 CSE **** Programme Elective III 3 0 0 3
CSE 3111 Operating Systems Lab 0 0 3 1 *** **** Open Elective II 3 0 0 3
CSE 3112 Algorithms Lab 0 0 3 1 CSE 3211 Compiler Design Lab 0 0 3 2
CSE 3113 Computer Networks Lab 0 0 3 2 CSE 3212 Parallel Programming Lab 0 0 3 2
14 4 9 22 15 3 6 22
SEVENTH SEMESTER EIGHTH SEMESTER
HUM 4001 Essentials of Management 2 1 0 3 CSE 4297 Seminar 1
CSE 4101 Internet Technologies 2 1 0 3 CSE 4298 Industrial Training 1
CSE 4102 Distributed and Cloud Computing 3 1 0 4 CSE 4299 Project Work/Practice School 12
IV CSE **** Programme Elective IV 3 0 0 3
CSE **** Programme Elective V 3 0 0 3
CSE **** Programme Elective VI 3 0 0 3
CSE 4111 Internet Technologies Lab 0 0 3 2
16 3 3 21 14
Minor Specialisations THIRD SEMESTER
I. Graphics and Image Processing
1. CSE 4001: Computer Graphics MAT 2105: ENGINEERING MATHEMATICS - III [2 1 0 3]
2. CSE 4002: Computer Vision Boolean Algebra: Partial ordering relations, Poset, Lattices, Basic
3. CSE 4003: Digital Image Processing Properties of Lattices. Distributive and complemented lattices, Boolean
4. CSE 4004: Multimedia Applications lattices and Boolean Algebra. Propositional and Predicate Calculus: Well
formed formula, connectives, quantifications, Inference theory of
II. Information Management and Analytics propositional and predicate calculus. Elementary configuration:
1. CSE 4005: Advanced Database Systems Permutations and Combinations, Generating function, Principle of
2. CSE 4006: Big Data Analytics inclusion and exclusion Partitions, compositions. ordering of
3. CSE 4007: Data Warehouse and Data Mining permutations :Lexicographical and Fikes. Graph theory: Basic
4. CSE 4008: Information Retrieval definitions, Degree, regular graphs, Eulerian and Hamiltonian graphs,
Trees and Properties, Center, radius and diameter of a graph, Rooted and
III. Intelligent Systems binary trees, Matrices associated with graphs, Algorithms for finding
1. CSE 4009: Artificial Intelligence shortest path, Algorithm. Group theory: Semi groups, Monoids, Groups-
2. CSE 4010: Machine Learning
subgroups, Normal Subgroups, Cosets, Lagrange's Theorem, Cyclic
3. CSE 4011: Natural Language Processing
groups.
4. CSE 4012: Social Network Analysis

IV. Network and Security References:


1. CSE 4013: Advanced Computer Networks 1. C. L. Liu, Elements of Discrete Mathematics, (2e),McGraw Hill,
2. CSE 4014: Information Security New Delhi,2007
3. CSE 4015: Principles of Cryptography 2. J. P. Trembaly and R. Manohar, Discrete Mathematics Structures with
4. CSE 4016: Wireless Networks application to Computer Science, Tata McGraw Hill, 2012.
3. E. S. Page and L. B. Wilson, An Introduction to Computational
V. Software Process Engineering Combinatroics , Cambridge Univ. Press, 1979
1. CSE 4017: Building Enterprise Application
4. Narasingh Deo, Graph theory with Applications to Computer
2. CSE 4018: Design Patterns
3. CSE 4019: Software Architecture Science, PHI, 2012
4. CSE 4020: Software Testing and Analysis
CSE 2101: COMPUTER ORGANIZATION AND DESIGN [3 1 0 4]
VI. Business Management Computer types, Functional units, Basic operational concepts, Bus
1. HUM 4011: Financial Management structures, Software, Performance, Numbers, arithmetic operations and
2. HUM 4012: Human Resource Management characters, Instruction set architecture, Memory locations and
3. HUM 4013: MarketingManagement addresses, Memory operations, Addressing modes, Addition and
4. HUM 4014: Operations and Systems Management subtraction of signed numbers, Design of Fast Adders, Multiplication of
positive numbers Signed operand multiplication, Fast multiplication,
Other Programme Electives Integer division, Floating point numbers and operations, Introduction,
1. CSE 4021: Advanced Data Structures and Algorithms Basic concepts, Design methods, Introduction, Basic of Caches,
2. CSE 4022: Advanced Java Programming
Measuring and Improving Cache Performance, Virtual Memory,
3. CSE 4023: Advanced Linux Programming
Common Framework for Memory Hierarchy, Accessing I/O devices,
4. CSE 4024: Business Intelligence and its Application
5. CSE 4025: Data Communications Interrupts, Direct memory access, Buses.
6. CSE 4026: Embedded Systems
7. CSE 4027: Mobile Application Development References:
8. CSE 4028: Parallel Algorithms 1. Carl Hamacher, ZvonkoVranesic and SafwatZaky, Naraig Manjikian,
9. CSE 4029: Principles of Programming Languages Computer Organization and Embedded Systems,(6e),McGraw Hill
10. CSE 4030: Product Realization with Publication, 2012
Hardware-Software Interface 2. D. A. Patterson and J. L. Hennessy, Computer Organization and
11. CSE 4031: Soft Computing Paradigms Design - The Hardware/Software Interface, (5e),Morgan
12. CSE 4032: Storage Device and Technology Kaufmann, 2011
13. CSE 4033: Virtual Reality Technologies
3. Mohammed Rafiquzzaman and Rajan Chandra, Modern
Computer Architecture, Galgotia Publications Pvt. Ltd. 2008.
Open Electives
1. CSE 3281: Database Management Systems 4. William Stallings, Computer Organization and Architecture
2. CSE 3282: Essentials of IT Designing for Performance, (8e), PHI, 2009.
3. CSE 3283: Essentials of Industrial Computing 5. J .P. Hayes, Computer Architecture and Organization, McGraw-
4. CSE 3284: Game Programming Hill, 1998.
5. CSE 3285: Introduction to Algorithms
6. CSE 3286: Linux Basics and Programming CSE 2102: SWITCHING CIRCUITS & LOGIC DESIGN [2 1 0 3]
7. CSE 3287: Principles of Soft computing Overview of Logic Gates and Boolean Algebra, Introduction to Verilog, K-
8. CSE 3288: Principles of Software Engineering Map Simplification, Incompletely Specified Functions, Multiple Output
9. CSE 3289: Programming in C#
Circuits Multilevel NAND and NOR Circuits, Arithmetic Circuits: Half
10. CSE 3290: Programming in Java
Adder, Full Adder, Ripple Carry Adder, Adder/Subtractor, BCD Adder, Fast
11. CSE 3291: Web Programming
Adders, Verilog for Arithmetic Circuits, Combinational Circuits:

108
Multiplexer, Decoder, Encoder, Code converter, Arithmetic Comparison References:
Circuits, Verilog for Combinational Circuits, Synchronous Sequential 1. Herbert Schildt and Dale Skrien, Java Fundamentals A
Circuits: Flip-Flops, Analysis and Design of Synchronous Sequential Comprehensive Introduction, (1e), McGrawHill, 2013.
Circuits, Ripple Counters, Registers, Shift Registers, Ring and Johnson 2. Herbert Schildt, The Complete Reference JAVA 2, (8e), Tata
Counters, Switching Circuits: Transistor Switches, NMOS, CMOS Logic McGrawHill, 2011.
Gates, Programmable Logic Devices, Noise Margin, Power dissipation, 3. Dietel and Dietel, Java How to Program, (9e), Prentice Hall India,
Fan-in, Fan-out Transmission Gates 2012.
4. Steven Holzner, Java 2 Programming Black Book, Dream Tech,
References: India, 2005.
1. Stephen Brown and Zvonko Vranesic, Fundamentals of Digital Logic
with VerilogDesign, (3e),Tata McGraw Hill Publishing Co. Ltd., 2014 CSE 2111: LOGIC DESIGN LAB [0 0 3 2]
2. M. Morris Mano, Digital Design, (2e),PHI Pvt. Ltd., 2000. Simulation of Logic Circuits Using Verilog: Verification of Logic Gates and
3. Donald D. Givone, Digital Principles and Design, Tata McGraw Hill Boolean Algebra Simplification of Expressions using Kmap: SOP and
Publishing Co. Ltd, 2003. POS Forms, Multilevel NAND, NOR Circuits, Arithmetic Circuits: Half
4. John F. Wakerly, Digital design - Principles and Practice, (4e), Adder, Full Adder, Multi-Bit Adder/Subtractor, BCD Adder, Multiplexers,
Pearson Education, 2013. Decoders and Encoders, Code Converters and Comparator, Flip-Flops:
D, JK, and T Flip-Flops, Registers: Shift Register, Ring Counter, Johnson
CSE 2103: DATA STRUCTURES [3 1 0 4] Counter, Binary and BCD Counters
Introduction - Pointers and Pointer Application, Accessing variables
through pointers, pointers to pointers, pointer arithmetic and arrays, References:
pointers and functions, Recursion- definition, recursive programs, 1. Stephen Brown and ZvonkoVranesic, Fundamentals of Digital Logic
efficiency of recursion, Stacks, queues, evaluation of expressions, with Verilog Design, (1e),Tata McGraw Hill Publishing Co. Ltd.,
multiple stacks and queues and its application, Linked lists 2014
representations- Singly, doubly, header node, circular along with the 2. J. Bhasker, A VHDL Primer, (3e), PHI Pvt. Ltd., 2005.
application, Trees-Binary trees, representation, recursive/ non recursive
inorder, preorder and post order tree traversal, level order traversal Binary CSE 2112: DATA STRUCTURES LAB [0 0 3 2]
search tree, creation, insertion deletion operations on binary search tree,
Reviewing the concepts of pointers and structures. Studying the
Optimal Binary Search Trees, Red-Black Trees, Splay Trees, mway
operation of stacks and queues and the associated application
search trees, B trees, Sorting, Graphs
programs. Creating dynamic allocation of memory for linked list and
applying it to examples using single, doubly, circular linked list.
References: Implementing sorting and searching techniques, Creation of trees and
1. Behrouz A. Forouzan, Richard F. Gilberg, A Structured Programming the application associated with the trees.
Approach Using C, (3e), Cengage Learning India Private Limited,
India, 2007. References:
2. Ellis Horowitz, Sartaj Sahni, Susan Anderson and Freed, 1. Behrouz A. Forouzan, Richard F. Gilberg, A Structured Programming
Fundamentals of Data Structures in C, (2e), Silicon Press, 2007. Approach Using C, (3e), Cengage Learning India Private Limited,
3. Richard F. Gilberg, Behrouz A. Forouzan, Data structures, A India, 2007.
Pseudocode Approach with C, (2e), Cengage Learning India Pvt. 2. Ellis Horowitz, Sartaj Sahni, Susan Anderson and Freed,
Ltd, India , 2009. Fundamentals of Data Structures in C, (2e), Universities Press,
4. Tenenbaum Aaron M., Langsam Yedidyah, Augenstein Moshe J., India, Reprint 2011.
Data structures using C, (1e), Pearson Prentice Hall of India Ltd., 3. Richard F. Gilberg, Behrouz A. Forouzan, Data structures, A
2007. Pseudocode Approach with C, (2e), Cengage Learning India Pvt.
5. Debasis Samanta, Classic Data Structures, (2e), PHI Learning Pvt. Ltd, India, 2009.
Ltd., India, 2010. 4. Robert Kruc & Bruce Lening, Data structures & Program Design in
C, (2e), Pearson, 2007.
CSE 2104: OBJECT ORIENTED PROGRAMMING [3 1 0 4] 5. Debasis Samanta, Classic Data Structures, (2e), PHI Learning Pvt.
Introduction, The Java Language, Attributes of Object Oriented Ltd., India, 2010
Programming, Programming Basics, Language Basics, Primitive Types,
Variables, Operators, Expressions, Input, Control Structures, Arrays and CSE 2113: OBJECT ORIENTED PROGRAMMING LAB [0 0 3 1]
Strings, Classes, Objects and Methods, new operator, Garbage
Programs on control statements, arrays, classes objects and methods,
Collection and Finalizers, this keyword, Controlling Access to Class
Inheritance, Interfaces, packages, exceptions, multithreading, Generics,
Members, Method Overloading, Overloading Constructors,
Strings, input-output streams, Appletsand swings.
Understanding static, Nested and Inner Classes, Variable Length
Arguments, Inheritance Basics, Creating Multilevel Hierarchy, Method
Overriding and Polymorphism, Using Abstract Classes, Using Final, The References:
Object Class. Interface Fundamentals, Package Fundamentals, 1. Herbert Schildt and Dale Skrien, Java Fundamentals A
Exception Handling Fundaments, Consequences of an Uncaught Comprehensive Introduction, (1e), McGrawHill, 2013.
Exception, Handling Errors through Exceptions, Multithreading 2. Herbert Schildt, The Complete Reference JAVA 2, (8e), Tata
Fundamentals, The Thread Class and Runnable Inter face, McGrawHill, 2011.
Synchronization, Generic Fundamentals, Applet Basics, Strings, Swings. 3. Dietel and Dietel, Java How to Program, (9e), Prentice Hall India,
2012.

109
4. Steven Holzner, Java 2 Programming Black Book, Dream Tech, Search, Topological Sorting. Transform and Conquer: Presorting, BST,
India, 2005. Heapsort. Space and Time tradeoffs: Input Enhancement in String
Matching. Dynamic Programming: Warshall's and Floyd's Algorithms,
The Knapsack Problem. Greedy Techniques: Prim's, Kruskal's and
FOURTH SEMESTER Dijkstra's Algorithm, Huffman Trees. Coping with limitations of
algorithmic power, Backtracking: nQueens problem, Hamiltonian Circuit
MAT 2206: ENGINEERING MATHEMATICS - IV [2 1 0 3] Problem, SubsetSum Problem. BranchandBound: Assignment Problem,
Basic Set theory, Axioms of probability, Sample space, conditional Knapsack Problem, TSP,P, NP,and NP-complete Problems.
probability, total probability theorem, Baye's theorem. One dimensional
and Two dimensional random variables, mean and variance, properties, References:
Chebyschev's inequality, correlation coefficient, Distributions, Binomial,
1. Anany Levitin, Introduction to the Design and Analysis of
Poisson, Normal and Chisquare. Functions of random variables: One
Algorithms, (3e), Pearson Education, India, 2011.
dimensional and Two dimensional, F & T distributions, Moment
2. Ellis Horowitz and Sartaj Sahni, Computer Algorithms/C++, (2e),
generating functions, Sampling theory, Central limit theorem, Point
estimation, MLE, Interval estimation, Test of Hypothesis: significance University Press, 2007.
level, certain best tests; Chi square test 3. Thomas H. Cormen, Charles E. Leiserson, Ronal L, Rivest, Clifford
Stein, Introduction to Algorithms, (2e), PHI, 2006.
References:
1. P. L. Meyer, Introduction to Probability and Statistical Applications, CSE 2203: MICROPROCESSORS [2 1 0 3]
(2e), 1980, Oxford and IBH publishing, Delhi. Introduction to microprocessors: 8086 internal architecture, 8086
2. Miller, Freund and Johnson, Probability and Statistics for instruction set and programming, Strings, Procedures and Macros,
Engineers, (8e), PHI, 2011. Interrupts and interrupt applications: Priority Interrupt Controller,
3. Hogg and Craig, Introduction to Mathematical Statistics, (6e), Programmable Parallel Peripheral Interface, Min and Max modes of
Pearson education, New Delhi, 2012 operation, Timing diagram, 80286, 80386, and 80486 Processors:
4. Ross Sheldon M, Introduction to Probability and Statistics for Architecture, Enhancement features-Protected mode operation,
Engineers and Scientists, Elseveir, 2010 Selectors, Descriptors, The memory system, Input/Output system, The
Pentium and Pentium pro microprocessors: Branch Prediction Logic,
CSE 2201: FORMAL LANGUAGES AND AUTOMATA Cache Structure, Superscalar Architecture, Special Pentium Registers,
THEORY [3 1 0 4] Internal Structure of the Pentium Pro, Special Pentium Pro Features, The
Mathematical Preliminaries and Notation, Three basic concepts, Pentium II, Pentium III, Pentium 4 and Core2 Microprocessors: Memory
Applications, Deterministic Finite Accepters, Nondeterministic Finite Interface, Register Set, Hyper-Threading Technology, Multiple Core
Accepters, Reduction of the Number of States in Finite Automata. Technology, CPUID, Model-Specific Registers, 64-Bit Extension
Regular Expressions, Identifying Nonregular Languages. Context-Free Technology.
grammars, Parsing and Ambiguity, Context-Free Grammars and
Programming Languages, Methods for Transforming Grammars, References:
Normal Forms. Nondeterministic Pushdown Automata, Deterministic 1. Douglas V. Hall, Microprocessors and its Interfacing,(3e Revised),
Pushdown Automata and Deterministic Context-Free Languages, The Tata McGraw Hill Publications Ltd., 2008.
Turing Machine, Linear Bounded Automata. Recursive and Recursively 2. Barry B. Brey, THE INTEL MICROPROCESSORS Architecture,
Enumerable Languages, Unrestricted Grammars, Context Sensitive Programming, and Interfacing, (8e), Prentice Hall India, 2009.
grammars and Languages. The Chomsky Hierarchy, Some Problems 3. Nilesh B Bahadure, Microprocessors The 8086/8088,
that cannot be Solved By TM's, Undecidable Problems for recursively 80186/80286, 80386/80486 and the Pentium Family, Prentice Hall
Enumerable Languages, The Post Correspondence Problem. India, 2010.
4. Kenneth Ayala, The 8086 Microprocessor: Programming &
References: Interfacing the PC, Ceneage learning India Pvt. Ltd., 2007.
1. Peter Linz, An Introduction to Formal Languages and Automata,
(5e), Jones & Bartlett Learning, 2011. CSE 2204: DATABASE SYSTEMS [2 1 0 3]
2. John C Martin, Introduction to Languages and the Theory of Database-System Applications, Relational Databases, Database Design,
Computation, (3e), McGraw Hill, 2007.
Transaction Management, Database Architecture. Relational Operations,
3. J E Hopcroft, Rajeev Motwani & Jeffrey D Ullman, Introduction to
The Relational-Algebra, Null Values, Modification of the Database. SQL
Automata Theory, Languages and Computation, (3e), Pearson
Education, 2006. Data Definition, SQL Data Types and Schemas, Integrity Constraints, Set
4. K. L. P. Mishra, N. Chandrashekharan, Theory of Computer Operations, Aggregate Functions, Overview of SQL Query Language,
Science, (3e),PHI publications, 2007. Basic Structure of SQL Queries, Join Expressions, Overview of the
5. Michael Sipser, Theory of Computation, Cengage Learning, 2007. Design Process, The Entity-Relationship Model, Constraints, Entity-
Relationship Diagrams, Entity-Relationship Design Issues, Removing
CSE 2202: DESIGN AND ANALYSIS OF ALGORITHMS [3 1 0 4] Redundant Attributes in Entity Sets, Extended E-R Features, Relational
Fundamentals of Algorithms, Important Problem Types, Analysis of Database Design, Atomic Domains and First Normal Form, Functional
algorithm efficiency. Analysis Framework: Asymptotic Notations and Dependency Theory, Algorithms for Decomposition, File Organization,
Basic Efficiency Classes, Mathematical Analysis of Nonrecursive and Static Hashing, Dynamic Hashing, Transaction Concept, Transaction
Recursive Algorithms. Brute force Techniques, Divide and Conquer, Atomicity and Durability, Recovery and Atomicity, Recovery algorithm.
Decrease and Conquer: Insertion Sort, Depth First Search, Breadth First

110
References: Software on Multicore, Multicore Organization, Intel x86 Multicore
1. Silberschatz, Korth, Sudarshan, Database System Concepts, (6e), Organization: Intel Core Duo, Intel Core i7.
McGrawHill, NewYork, 2011.
2. Ramez Elmasri and Shamkant Navathe, Durvasula V L N Somayajulu, References:
Shyam K Gupta, Fundamentals of Database Systems, 1. William Stallings, Computer Organization and Architecture
(6e),Pearson Education, United States of America,2011. Designing for Performance, (8e), Pearson Prentice Hall, 2010.
3. Thomas Connolly, Carolyn Begg, Database Systems A Practical 2. Kai Hwang and Faye A. Briggs, Computer Architecture and Parallel
Approach to Design, Implementation and Management, (4e), Processing, TMH Private Ltd., 2012.
Pearson Education, England, 2005. 3. John L. Hennessy & David A. Patterson, Computer Architecture A
4. Peter Rob, Carlos Coronel, Database Systems Design, Quantitative Approach, (5e), Morgan Kaufmann, 2014
Implementation and Management, (10e), Course Technology, 4. Rajiv Chopra, Advanced Computer Architecture (A Practical
Boston, 2013. Approach), (2e), S. Chand & Company Ltd, 2011.

CSE 2211: MICROPROCESSORS LAB [0 0 3 2] CSE 3102: OPERATING SYSTEMS [3 1 0 4]


Basics of Assembly Programming, Simple Programs using Addition, Operating System Structures, Virtual Machines, Process Scheduling,
Subtraction and Branching Instructions, Operations on BCD and ASCII Operations on Processes, Interprocess Communication, Multithreaded
data (Packing, Unpacking, Conversion between BCD and ASCII), Models, Scheduling Algorithms, Critical Section Problem, Peterson's
Multiplication and Division, List Operations (Arrays), String Operations, Solution, Synchronization Hardware, Semaphores, Classical Problems
DOS and BIOS interrupts String Operations, DOS interrupts Integer of Synchronization, Monitors, Deadlock Characterization, Methods for
Operations and file operations, Logic Controller Interfacing, DAC handling deadlocks, Logical Versus Physical Address Space, Swapping,
Interfacing, Keyboard Interfacing, Seven Segment Display Interfacing, Contiguous Memory Allocation, Paging, Segmentation, Demand Paging,
Stepper Motor, ADC Interfacing, Elevator Interfacing Page Replacement, Allocation of Frames, Thrashing, Allocation Kernel
Memory, File Concept, Access Methods, Directory Structure, File
References: System Mounting, Sharing, Protection. Disk Scheduling, Goals of
Protection, Principles of Protection, Domain of Protection,
1. Douglas V. Hall, Microprocessors and its Interfacing, (3e
implementation of Access Matrix, Case Study- Linux Systems, Design
Revised), Tata McGraw Hill Publications Ltd., 2008.
Principles, Process and Memory Management, Scheduling in Linux
2. Barry B. Brey, THE INTEL MICROPROCESSORS Architecture,
System, Kernel modules.
Programming, and Interfacing, (8e), Prentice Hall India, 2009.
References:
CSE 2212: DATABASE SYSTEMS LAB [0 0 3 2]
1. A. Silberschatz, P. B. Galvin and G. Gagne, Operating System
Concepts, (8e), Wiley and Sons(Asia) Pt. Ltd., 2009.
Implementation of ER diagrams using DIA tool, Designing the different 2. Mclen Milenkovic, Operating systems: Concepts and Design,
databases and working with queries using SQL. Working with Advanced McGraw Hill, New York, 1987.
SQL like, Exceptions Cursors, Procedures, Functions and Packages, 3. H. M. Dietel, An Introduction to Operating Systems, Addison
Mini-Project work using Java as front end and Oracle/PostgresSQL as Wesley, 1990.
back end. 4. Andrew S. Tanenbaum, Operating System: Design and
Implementation, Prentice Hall of India, 1991.
References: 5. Maurice J Bach, Design of Unix Operating System, Prentice Hall of
1. Thomas Connolly, Carolyn Begg, Database Systems A Practical India, 1988
Approach to Design, Implementation and Management, (4e), .
Pearson Education, England, 2005. CSE 3103: COMPUTER NETWORKS [3 1 0 4]
2. Peter Rob, Carlos Coronel, Database Systems Design, Overview of the Internet Protocol Layering, Internet History, Introduction
Implementation and Management, (10e), Course Technology, to Application Layer, Client Server Paradigm, Standard Client Server
Boston, 2013. Applications, Socket Interface Programming, Introduction to Transport
3. Ivan Bayross, SQL, PL/SQL, (4e), BPB Publications, USA, 2009. Layer, Transport layer Protocols, UDP, TCP, Introduction to Network
Layer, Network Layer Protocols, Unicast and Multicast Routing, Next
Generation IP, Introduction to Data Link Layer: Wired Networks, Data Link
FIFTH SEMESTER Control, Multiple Access Protocols, Link Layer Addressing, Wired LANS
Ethernet Protocols, Wireless LANS, Other Wireless Networks, Mobile IP,
CSE 3101: COMPUTER ARCHITECTURE [2 1 0 3] Data and Signals, Digital Transmission, Bandwidth Utilization,
Organization and Architecture, Processor Organization, The Instruction Transmission Media.
Cycle, Introduction to Parallel processing, Parallel Computer Structures,
Architectural Classification Schemes, Pipelining, Instruction Level References:
Parallelism, SIMD Computer Organizations, SIMD interconnection 1. Behrouz A. Forouzan, Computer Networks A Top Down Approach,
networks, Parallel Algorithms for Array processors, Symmetric McGraw Hill Edition,2012
Multiprocessor Organization, Cache Coherence and the MESI Protocol, 2. Behrouz A. Forouzan, TCP/IP Protocol Suite, (5e), McGraw Hill
Multithreading and Chip Multiprocessors, Synchronization, Models of Publication, 2010.
Memory Consistency, Clusters, Operating System Design Issues, 3. William Stalllings, Data and Computer Communications, (8e), PHI
Cluster Computer Architecture, Blade Servers, Clusters Compared to Publication, 2011.
SMP, Multicore Computers, Hardware Performance Issues: Increase in 4. W. Richard Stevens, UNIX Network Programming, (3e), PHI
Parallelism, Power Consumption, Software Performance Issues: Publication, 2003.

111
5. Larry L.Peterson, Bruce S. Davie, Computer Networks, (5e), 3. Thomas H. Cormen, Charles E. Leiserson, Ronal L, Rivest, Clifford
Morgan Kaufmann Publication, 2011. Stein, Introduction to Algorithms, (2e), PHI, 2006.

CSE 3104: SOFTWARE ENGINEERING [3 1 0 4] CSE 3113: COMPUTER NETWORKS LAB [0 0 3 2]


Introduction: Evolution from an art form to an engineering discipline, Review of Linux system calls and working with UNIX Network
Software development Projects, Exploratory style of software commands, UDP Based Client Server Programs, TCP Based Client
development, Emergence of software Engineering, Notable changes in Server Programs, Concurrent TCP Servers, Implement the various TCP
software development practices. Computer Systems Engineering, Protocols- Simple, Go Back N, Selective Reject, Link State Routing,
Software Life Cycle Models: A few basic concepts, Waterfall model and Shortest Path Routing, Distance Vector Routing, Checking the class of
its extensions, Rapid Application Development, Agile development IPv4 Addresses, Encapsulation and Decapsulation of IP Packets,
models, Spiral Model , A Comparison of different Life Cycle models, Fragmentation, Calculating Cyclic Redundancy Check and Frame
Software Project Management, Requirement Analysis And Sorting, Synchronous Multiplexing using SELECT System Call.
Specifications: Requirement Gathering and Analysis, Software
Requirement Specifications, Formal System Specification, Axiomatic References:
Specification, Algebraic Specification, Executable Specification and 1. Behrouz A. Forouzan, Computer Networks A Top Down Approach,
4GL, Software Design, Function oriented software design, Object Tata McGraw Hill Publication 2012.
modelling using UML, User Interface Design, Coding and Testing. 2. W. Richard Stevens, UNIX Network Programming, (3e), PHI
Publication, 2003.
References: 3. Behrouz A. Forouzan, TCP/IP Protocol Suite, (5e), McGraw Hill
1. Rajib Mall, Fundamentals of Software Engineering, (4e), PHI Publication, 2010.
Learning PVT. LTD, 2014 4. William Stalllings, Data and Computer Communication, (8e), PHI
2. Roger S. Pressman, Software Engineering - A Practitioner's Publication, 2011.
Approach, (7e),McGrawHill International Edition, 2010.
3. Hans Van Vliet, Software Engineering: Principles and Practice,
(3e), Wiley India, 2012. SIXTH SEMESTER
4. Bernd Bruegge, Allen H. Dutoit, Object-Oriented Software
Engineering using UML Patterns and Java, (2e) ,Pearson HUM 4002: ENGINEERING ECONOMICS AND FINANCIAL
Publication, 2011. MANAGEMENT [2 1 0 3]
5. Ian Sommerville, Software Engineering, (9e), Addison-Wesley, Nature and significance, Micro & macro differences, Law of demand and
2011. supply, Elasticity & equilibrium of demand & supply. Time value of
money, Interest factors for discrete compounding, Nominal & effective
CSE 3111: OPERATING SYSTEMS LAB [0 0 3 1] interest rates, Present and future worth of single, Uniform gradient cash
Implementing UNIX commands and learn the usage of VI editor, flow. Bases for comparison of alternatives, Present worth amount,
Illustration of Shell Commands, Shell programming, CPU Scheduling Capitalized equivalent amount, Annual equivalent amount, Future worth
Algorithms, Deadlock Detection and Avoidance Algorithms, Page amount, Capital recovery with return, Rate of return method, Incremental
replacement and allocation algorithms, Disk Scheduling Algorithms, approach for economic analysis of alternatives, Replacement analysis.
Inter Process Communication by using Pipes, Sockets and Messages Break even analysis for single product and multi product firms, Break
even analysis for evaluation of investment alternatives. Physical &
References: functional depreciation, Straight line depreciation, Declining balance
method of depreciation, Sum-of-the-years digits method of depreciation,
1. Graham Glass, King Ables, Pearson, Unix for Programmers and
Sinking fund and service output methods, Costing and its types Job
Users, (3e), Prentice-Hall, 2003.
costing and Process costing, Introduction to balance sheet and profit &
2. Maurice J Bach, Design of Unix Operating System, Prentice Hall of
loss statement. Ratio analysis - Financial ratios such as liquidity ratios,
India, 1988
Leverage ratios, Turn over ratios, and profitability ratios
3. A. Silberschatz, P. B. Galvin and G. Gagne, Operating System
Concepts, (8e), Wiley and Sons (Asia) Pvt. Ltd., 2009.
References:
4. Rachel Morgan, Unix System V, McGrawHill, 1987.
1. Blank Leland T. Tarquin Anthony J, Engineering Economy, McGraw
Hill, New Delhi, 2002.
CSE 3112: ALGORITHMS LAB [0 0 3 1]
2. Chan S. Park, Contemporary Engineering Economics, Pearson
Implement a doubly linked list & BST, GCD Techniques, Bubble sort, Education, Inc, 2010.
Selection sort, Linear search, String Matching, Merge Sort, Quick sort,
3. Raman B. S, Advanced Accountancy, United publications,
binary search, insertion sort, DFS, BFS, topological sorting, AVL tree, 2-
Bangalore, 1993
3 tree, heap sort, Horspool algorithm, Open hash table, Floyd's
4. T. Ramachandran, Accounting and Financial Management, Scitech
algorithm, Warshall's algorithm, Prim's algorithm, Kruskal's algorithm,
Publications Pvt. Ltd. India, 2001.
Dijkstra's algorithm, N queens problem, subset-sum problem, branch
and bound technique. 5. Thuesen G. J & Thuesen H. G, Engineering Economics, Prentice
Hall of India, New Delhi, 2005
References:
CSE 3201: COMPILER DESIGN [2 1 0 3]
1. AnanyLevitin, Introduction to The Design and Analysis of
Algorithms,(3e), Pearson Education, India, 2012. Introduction, Language Processors, The Structure of a Compiler, Lexical
Analysis: Role of the Lexical Analyzer, Input Buffering, Recognition of
2. Ellis Horowitz and Sartaj Sahni, Computer Algorithms/C++, (2e),
Tokens, Design of Lexical Analyzer Generator, Syntax Analysis:
University Press, 2007.

112
Introduction, Writing a Grammar, Top Down Parsing, Bottom Up Parsing, 3. Vinu V. Das, Compiler Design using FLEX and YACC, Prentice-Hall,
Introduction to LR parsing, More powerful LR parsers, Using Ambiguous 2007.
Grammars, Syntax Directed Definitions, Evaluation order for SDD's,
Application of Syntax- Directed Translation, Intermediate Code CSE 3212: PARALLEL PROGRAMMING LAB [0 0 3 2]
Generation: Variants of Syntax Trees, Three Address Code, Types and Study of Working Environment of Visual Studio, MPI Programs using
Declarations, Translation of Expressions, Code Generation: Issues in Point to Point communication, MPI Programs using Collective
Design of Code Generator, The Target Language, Basic Blocks and Flow communication, Error Handling in MPI, OpenCL program to perform
Graphs, Optimization of Basic Blocks, Peephole Optimization, Register Vector Addition, Matrix Multiplication, Sorting, String reverse, String
Allocation and Assignment, Run Time Environment: Storage sorting, Transpose of Matrix, Benchmarking parallel performance,
Organization, Stack Allocation of Space, Theory of FLEX, Theory of Simple CUDA programs to perform operations on Vectors and Matrices.
YACC.
References:
References: 1. D. Kirk and W. Hwu, Programming Massively Parallel Processors A
1. Alfred V. Aho, Monica S. Lam, Ravi Sethi, Jeffrey D. Ullman, Hands-on approach, (1e), Elsevier Inc., 2010.
Compilers Principles, Techniques and Tools, (2e), Pearson 2. Michael J. Quinn, Parallel Programming in C with MPI and
Education, 2010. OpenMP, McGraw Hill Edition, 2003.
2. Kenneth C. Louden, Compiler Construction - Principles and 3. Benedict R. Gaster, Lee Howes, David R, Perhaad Mistry, Dana
Practice, (1e), Thomson, 2007. Schaa, Heterogeneous Computing with OpenCL, (1e),Elsevier
3. Vinu V. Das, Compiler Design using FLEX and YACC, Prentice-Hall, Inc., 2012.
2007. 4. Shane Cook, CUDA Programming: A developer's guide to parallel
computing with GPUs, Morgan Kaufman Publication, Elsevier,
CSE 3202: PARALLEL COMPUTER ARCHITECTURE AND 2013.
PROGRAMMING [2 1 0 3] 5. CUDA C Programming Guide, Nvidia, 2012.
GPUs as parallel computers, Architecture of a modern GPU, Need for
parallelism, Parallel programming languages and models, History of SEVENTH SEMESTER
GPU Computing, Message passing model, MPI basic data types and
functions, Point-to-point communication, Collective communication,
HUM 4001: ESSENTIALS OF MANAGEMENT [2 1 0 3]
Benchmarking parallel performance, MPI error handling functions,
OpenCL Architecture, OpenCL execution model, Program and Kernel Definition of management and systems approach, Nature & scope, The
Object, Memory model, Writing Kernels, OpenCL Device Architecture, functions of managers, Corporate social responsibility. Planning: Types
OpenCL APIs, OpenCL programs, Data Parallelism, CUDA Program of plans, Steps in planning, Process of MBO, How to set objectives,
Structure, Matrix-Matrix Multiplication, Device memories and Data Strategies, Policies & planning premises, Strategic planning process and
transfer, Kernel functions and Threads, Importance of Memory Access tools. Nature & purpose of organising, Span of management, factors
Efficiency, CUDA Device Memory types, Parallel Virtual Machines, determining the span, Basic departmentalization, Line & staff concepts,
Process Management, Communication functions, Comparison of Functional authority, Art of delegation, Decentralisation of authority. HR
parallel programming models. planning, Recruitment, Development and training. Theories of
motivation, Special motivational techniques. Leadership - leadership
behaviour & styles, Managerial grid. Basic Control Process, Critical
References:
Control Points & Standards, Budgets, Non-budgetary control devices.
1. D. Kirk and W. Hwu , Programming Massively Parallel Processors A Profit & loss control, Control through ROI, Direct, Preventive control.
Hands-on approach, (1e), Elsevier Inc., 2010 Managerial practices in Japan & USA & application of Theory Z. The
2. Michael J. Quinn, Parallel Programming in C with MPI and nature & purpose of international business & multinational corporations,
OpenMP, McGraw Hill Edition, 2003. unified global theory of management. Entrepreneurial traits, Creativity,
3. Benedict R. Gaster, Lee Howes, David R, Perhaad Mistry, Dana Innovation management, Market analysis, Business plan concepts,
Schaa, Heterogeneous Computing with OpenCL, (1e),Elsevier Development of financial projections
Inc., 2012
4. V. Rajaraman, C. Siva Ram Murthy, Parallel Computers Architecture References:
and Programming, Prentice-Hall India, 2000. 1. Koontz D., Essentials of Management, McGraw Hill, New York,
5. Shane Cook, CUDA Programming: A developer's guide to parallel 2004.
computing with GPUs, Morgan Kaufman Publication, Elsevier, 2013 2. Peter Drucker, Management, Task and Responsibility, Allied
Publishers, 2006.
CSE 3211: COMPILER DESIGN LAB [0 0 3 2] 3. Peter Drucker, The practice of Management, Butterworth Hein
Preliminary Scanning Applications, Identification of Tokens in a given Mann, 2003.
Program, Design of Lexical Analyzer, Design of Parser, Design of Code
Generator, Usage of LEX and YACC. CSE 4101: INTERNET TECHNOLOGIES [2 1 0 3]
Basics of WWW, HTTP, XHTML, HTML5 and CSS3, Client Side Scripting
References: Vs Server Side Scripting, PHP, Java Web Technologies, ASP.NET, The C#
1. Alfred V. Aho, Monica S. Lam, Ravi Sethi, Jeffrey D. Ullman, Language, The Anatomy of an Web Application, Introducing Server
Compilers Principles, Techniques and Tools, (2e), Pearson Control, The Page Class, Application Events, Web Controls, Error
Education, 2010 Handling, Logging and Tracing, State Management, Validation, Styles,
2. Kenneth C. Louden, Compiler Construction - Principles and Themes and Master Pages, The Data Provider Model, Direct Data
Practice, (1e), Thomson, 2007. Access, Disconnected Data Access, Data Binding, Data Source

113
Controls, The Grid View, Files and Streams, XML, Understanding 4. Adam Freeman, Matthew MacDonald, Mario Szpuszta, Pro ASP.NET
Security, Authentication and Authorization, Forms Authentication, 4.5 in C#, Apress, 2013.
Windows Authentication, Understanding Caching, Output Caching, Data 5. Elliotte Rusty Harold and W. Scott Means, XML In a nutshell, (3e),
Caching, Understanding the Need of Ajax, Building ASP.NET AJAX O'Reilly, 2005.
Applications, ASP.NET AJAX's Server-Side Controls, Using Multiple
UpdatePanel Controls, jQuery.
EIGHTH SEMESTER
References:
CSE 4297: SEMINAR
1. Achyut Godbole, AtulKahate, Web Technologies, (3e), McGraw
Hill, 2013. 4 Each student has to present a seminar individually, on any technical
topic of current interest / latest advancement / topics not covered in
2. Jason N. Gaylord, Christian Wenz, Pranav Rastogi, Todd Miranda,
the syllabus.
Scott Hanselman, Professional ASP.NET 4.5 in C# and VB, Wrox,
2013. 4 The topic has to approved by the Department and a report of the
same has to be submitted a week before the day of the presentation.
3. Matthew MacDonald, Beginning ASP.NET 4.5 in C#, Apress, 2012.
4. Jennifer Niederst Robbins, Learning Web Design: A Beginner's
Guide to HTML, CSS, JavaScript, and Web Graphics, (4e), O'Reilly CSE 4298: INDUSTRIAL TRAINING
2012. 4 Each student has to undergo industrial training for a minimum period
5. Jon Duckett, HTML and CSS: Design and Build Websites, (1e), of 4 weeks. This may be taken in a phased manner during the
Wiley, 2011. vacation starting from the end of third semester.
4 Student has to submit to the department a training report in the
prescribed format and also make a presentation of the same. The
CSE 4102: DISTRIBUTED AND CLOUD COMPUTING [3 1 0 4]
report should include the certificates issued by the industry.
Distributed System Architecture: Characterization of Distributed systems
Examples of distributed systems, Challenges System models,
Architecture and fundamental models Inter Process Communication- CSE 4299: PROJECT WORK / PRACTICE SCHOOL
External Data Representation, Group Communication, distributed object 4 The project work may be carried out in the institution/industry/
and remote Invocation, Communication between Distributed Object, research laboratory or any other competent institutions.
Remote Procedure call, Event and notifications, Synchronization, Logical 4 The duration of the project work shall be a minimum of 16 weeks
clocks, Mutual Exclusion, Election algorithms. Consistency and which may be extended up to 24 weeks.
replication, Data-centric and Client-Centric Consistency Models, 4 A mid-semester evaluation of the project work shall be done after
Protocols, Introduction to Cloud Computing: What's cloud computing, about 8 weeks.
Properties & Characteristics, Service models, Deployment models. 4 An interim project report on the progress of the work shall be
Infrastructure as a Service (IaaS): Introduction, Cloud resource submitted to the department during the mid-semester evaluation.
virtualization, Virtual Machines Provisioning and Migration Services. The 4 The final evaluation and viva-voice will be conducted after
mapreduce programming model and implementations, SLA submission of the final project report in the prescribed form.
management in cloud computing. 4 Student has to make a presentation on the work carried out, before
the department committee as part of project evaluation.
References:
1. George Coulouris, Jean Dollimore, TimKindberg, Distributed MINOR SPECIALISATIONS
Systems, Concepts and Design, (4e),Pearson Education, 2009.
2. Andrew S. Tannenbaum, Maarteen Van Steen, Distributed Systems, I. GRAPHICS AND IMAGE PROCESSING
Principles and Paradigms, (2e), PHI (EEE), 2009.
3. Rajkumar Buyya, James Broberg, Andrzej Goscinski, Cloud CSE 4001: COMPUTER GRAPHICS [3 0 0 3]
Computing Principles and Paradigms, Wiley Publications , 2013. Introduction, Graphics Hardware, Algorithms for Drawing 2D Primitives:
4. Dan C. Marinescu, Cloud Computing Theory and Practice, Morgan Overview, Scan Converting Lines, Circles and Ellipse, Filling Rectangles
Kaufmann, 2013. and Polygons, Clipping Lines and Polygons, Geometrical
5. Mei- Ling Liu, Distributed Computing: Principles and Application, Transformations, Projections, Input devices, Interaction Hardware, Basic
Pearson Education, Inc. New Delhi. 2004. and composite Interaction Tasks, Interaction techniques, Dialogue
design, Representing curves and surfaces, Parametric Cubic Curves,
CSE 4111: INTERNET TECHNOLOGIES LAB [0 0 3 2] Solid Modelling, Achromatic and colored light, Achromatic Light,
HTML Tags, C# Programming Language Constructs, Web Forms and Chromatic Color, Color Models for Raster Graphics, The quest for visual
Web Controls, State Management, Validation, Styles, Themes and realism, Visual surface determination: Techniques for Efficient Visible
Master Pages, Working with Data, Data Controls, Files and Streams, Surface Algorithms, Algorithm for Visible Line Determination, The z-
XML, AJAX, Mini Project. Buffer algorithm, List Priority algorithm, Scan Line algorithm, Area
Subdivision algorithm, Algorithms for Octrees, Illumination and shading:
References: Illumination Models, Shading Models for polygon, Animation.
1. Matthew MacDonald, Beginning ASP.NET 4.5 in C#, Apress, 2012.
2. Jason N. Gaylord, Christian Wenz, Pranav Rastogi, Todd Miranda, References:
Scott Hanselman, Professional ASP.NET 4.5 in C# and VB, Wrox, 1. Foley J. D., Van Dam A., Feiner S. K., Hughes J. F., Computer
2013. Graphics, Principles and Practice,(2e), Addision-Wesley, 2004.
3. Stephen Walther, Nate Scott Dudek, ASP.NET 4.5 Unleashed, 2. Donald Hearn, Pauline Baker M., Computer Graphics, (2e),
Pearson Education Inc., 2013. Pearson Education, 2004.

114
3. Peter Shirley Steve Marschner, Fundamentals of Computer synchronization, Basic synchronization issues, Synchronization
Graphics, (3e), A K Peters/CRC Press; 2009. Reference model, Synchronization in a Distributed Environment,
4. Donald Hearn, Pauline Baker M., Computer Graphics with OpenGL, Multimedia Synchronization Specification Methods Collaboration
(3e), Pearson Education, 2010. dimensions, Group Communication Architectures, Session
5. Edward Angel, Interactive Computer Graphics- A top down Management. Quality of Multimedia data transmission, QoS for IP
approach using OpenGL, (5e), Pearson Education, 2009. protocols, Prioritized delivery. Multimedia over IP, Internet Telephony,
Multimedia over ATM networks, Transport of MPEG-4, Movie on
CSE 4002: COMPUTER VISION [3 0 0 3] Demand, Broadcast schemes for video on demand.
Introduction to computer vision, Advantages of computer vision,
Cameras, Pinhole, CCD, Radiometry-Measuring light, Radiosity, References:
Specularity, Sources, Shadows and Shading, Light sources, Local and 1. Ze-Nian Li and Mark.S.Drew, Fundamentals of Multimedia,
global shading models, photometric stereo, Linear filters, Convolution, Pearson Education,2004.
Sampling, Spatial frequency, Fourier transforms, Geometry of multiple 2. Fred Halshal, Multimedia Communications-Applications,
views, Two views, Three views, Image reconstruction and rectification, Networks, Protocols and Standards, Pearson Education,2001
Human stereopsis, Model-based vision, Binocular fusion, Finding 3. Ralf Steinmetz and Klara Nahrstedt, Multimedia: Computing,
templates using classifiers, Class histograms, Feature selection, Neural Communications and Applications, Pearson Education,2009
networks, Support vector machine, Recognition by relations between 4. Ralf Steinmetz and Klara Nahrstedt, Multimedia Fundamentals-
templates, Finding objects by voting and relations between templates, Volume 01 Mediacoding and content processing, Pearson
Relational reasoning using probabilistic models and search, Geometric Publication, 2003.
templates from spatial relations, Object recognition, Application: Image 5. K R Rao, Zoran S Bojkovic and Dragorad A Milovanovic,
based rendering, Construction of 3D models, Approaches to image Introduction to Multimedia Communications, Wiley Publications,
based rendering. 2006.

References: II. INFORMATION MANAGEMENT AND ANALYTICS


1. David A. Forsyth, Computer Vision A Modern Approach, PHI
learning, 2009.
CSE 4005: ADVANCED DATABASE SYSTEMS [3 0 0 3]
2. Sonka, Hlavac, Boyle, Digital Image Processing and Computer
Query processing and optimization, Measures of Query Cost, Evaluation
Vision, CENGAGE Learning, 2008.
of Expressions, Transformation of Relational Expressions, Estimating
Statistics of Expression Results, Materialized Views. Concurrency
CSE 4003: DIGITAL IMAGE PROCESSING [3 0 0 3] Control and Recovery System, Lock-Based Protocols, Multiple
Introduction to Digital Image Processing, components of an image Granularity, Timestamp-Based Protocols, Validation-Based Protocols.
processing system, Spatial domain- Gray level transformations, Parallel and distributed Databases , I/O Parallelism ,Complex Data types,
histogram processing, spatial filtering, smoothing spatial filters, Structured Data Types and Inheritance in SQL, Object Identity and
sharpening spatial filters, combining spatial enhancement methods, Reference Types in SQL, Data storage, Distributed transactions, Commit
Filtering in the frequency domain- Introduction to the Fourier transform, protocols, Concurrency control in distributed Databases, Availability,
frequency domain, the basics of filtering in the frequency domain, image Distributed Query processing, Cloud Based Database, , XML Document
smoothing and image sharpening using frequency domain filters. Image Schema, Querying and Transaction, Storage of XML Data, Transaction-
restoration- Noise models, restoration using spatial filtering, periodic Processing Monitors, Transactional Workflows, Motivation, Spatial and
noise reduction by frequency domain filtering, estimating the geographic Data, multimedia Database, Mobility and Personal Database.
degradation function. Morphological image processing- Preliminaries,
dilation and erosion, opening and closing, the hit-or-miss References:
transformation, basic algorithms, extension to gray-scale images, Image
1. Silberschatz, Korth, Sudarshan, Database System Concepts, (6e),
segmentation- Point, line, and edge detection, Thresholding, region-
McGrawHill, New York, United States of America, 2011.
based segmentation, segmentation using morphological watersheds,
2. Ramez Elmasri and Shamkant Navathe, Durvasula V L N Somayajulu,
motion in segmentation.
Shyam K Gupta, Fundamentals of Database Systems, (6e),
Pearson Education, United States of America,2011.
References:
3. Ceri S and Pelagatti G, Distributed Databases Principles and
1. Rafael C. Gonzalez, Richard E. Woods, Digital Image Processing Systems, (2e), McGraw Hill, New York, United States of America,
(3e), Pearson Prentice Hall, 2008. 1999.
2. Rafael C. Gonzalez, Richard E. Woods, Steven L. Eddins, Digital 4. Raghu Ramakrishnan and Johannes Gehrke: Database
Image Processing Using MATLAB, (2e), Tata McGraw Hill Management Systems, (3e), McGraw-Hill, United States of
Publication, 2010. America, 2003
3. Sonka, Hlavac, Boyle, Digital Image Processing and Computer
Vision, CENGAGE Learning, 2008.
CSE 4006: BIG DATA ANALYTICS [3 0 0 3]
Big Data, Characteristics of Big data, Data in warehouse and data in
CSE 4004: MULTIMEDIA APPLICATIONS [3 0 0 3] Hadoop, Importance of Big Data, Big data use cases, Map Reduce,
Introduction to Multimedia, Multimedia information representation, Distributed File System, Algorithms using Map Reduce, Communication
Multimedia networks, Multimedia Applications, Application and Cost model, Complexity Theory, Meet Hadoop, Comparison with other
networking Terminology, Multimedia information representation, systems, The Hadoop Distributed File System, Hadoop I/O, File Based Data
Digitization Principles, Compression Principles, Text Compression, structures, Developing a Map Reduce Application, Inverted Index for Text
Image Compression, Audio Compression, Video Compression. Notion of Retrieval, Graph Algorithms, Page Rank, Stream Data Model: A Data-

115
Stream-Management System, Sampling Data in a Stream, Filtering Streams, 2. Stefan Buttcher, Charles L. A. Clarke , Gordon V. Cormack,
Distinct Elements in a Stream, NOSQL Models, Understanding Storage Information Retrieval - Implementing and Evaluating Search
Architecture, Performing CURD operations, Querying NOSQL Stores Engines, (6e), MIT Press, 2011.
3. Baeza-Yates and Ribeiro-Neto, Modern Information Retrieval, (2e),
References: Addison Wesley, 2010.
1. Anand Rajaraman and Jeffrey David Ullman, Mining of Massive 4. Soumen Charabarti, Mining the Web, Morgan-Kaufmann, 2003.
Datasets, Cambridge University Press, 2011. 5. David A Grossman, OphitFrieder, Information Retrieval Algorithms
2. Tom White, Hadoop: The definitive guide, (3e), O'reilly, Yahoo and Heuristics, (2e), Springer, 2004.
Press, 2012.
3. Shashank Tiwari, Professional NOSQL, Wiley India Pvt. Ltd., 2012 III. INTELLIGENT SYSTEMS
4. Jimmy Lin, Chris Dyer, Data Intensive Text Processing with
MapReduce, (1e), Morgan & Claypool Publishers, 2010. CSE 4009: ARTIFICIAL INTELLIGENCE [3 0 0 3]
5. Paul C Zikopoulos, Chris Eaton, Dirk Deroos, Thomas Deutch, George Foundations of Artificial Intelligence, History of Artificial Intelligence, The
Lapis, Understanding Big Data, McGraw Hill, 2012. state of the Art, Agents and Environments, The concept of Rationality,
The Nature of Environments, The structure of Agents, Problem Solving
CSE 4007: DATA WAREHOUSE AND DATA MINING [3 0 0 3] agents, Example Problems, Searching for Solutions, Uninformed search
Introduction to Data warehouse and Data Mining, Data Warehouse strategies, Informed (Heuristic) search strategies, Heuristic functions,
Building Blocks, Principles of Dimension Modelling, Advanced Topics in Games, Optimal decision in games, Alpha Beta Pruning, Knowledge
Dimension Modelling, ETL, Data Quality, OLAP, Data Pre-processing, based agents, The Wumpus World, Logic, Propositional logic,
Data cleaning, Data Integration and Transformation, Knowledge Propositional Theorem Proving, Representation revisited, Syntax and
discovery in databases, Data mining techniques, Association rules semantics of First order logic, Using First order logic, Ontological
mining, Algorithms for mining frequent patterns, Apriori Algorithm, FP
Engineering, Categories and objects, Reasoning systems for categories,
Growth without generating candidate generation, From association
The internet shopping world. Acting under uncertainty, Basic probability
mining to correlation analysis, Pattern Evaluation Methods, Introduction
notation, Inference using full joint distributions, independence, Baye's
to classification, Decision Tree Induction, Bayesian Classification, Rule
Rule and its use, representing knowledge in an uncertain domain, the
Based Classification, Back-propagation, Lazy Learners, Model
Evaluation and Selection, Ensemble methods, Introduction to cluster semantics of Bayesian networks.
analysis, Partitioning methods, Hierarchical methods, Density-Based
methods, Evaluation of Clustering, Outlier analysis. References:
1. Stuart Russell and Peter Norvig, Artificial Intelligence A Modern
References: Approach, (3e), Pearson Education, 2010
1. Jiawei Han and Micheline Kamber, Data Mining- Concepts and 2. Elaine Rich, Kevin Knight, Shivashankar B. Nair, Artificial
Techniques, (3e), Morgan Kaufmann Publishers, 2011 Intelligence, (3e), Tata McGraw Hill Edition, 2008.
2. Paulraj Ponniah, Data Warehousing, (2e), Wiley India Pvt. Ltd., 3. Saroj Kaushik, Artificial Intelligence, (1e),Cengage Learning
2010 Publications, 2011.
3. H. Witten and E. Frank, Data Mining: Practical Machine Learning 4. Don W. Patterson,Introduction to Artificial Intelligence and Expert
Tools and Techniques, Morgan Kaufmann, 2000. Systems, PHI Publication,2006.
4. M. H. Dunham, Data Mining: Introductory and Advanced Topics,
Pearson Education 2006. CSE 4010: MACHINE LEARNING [3 0 0 3]
5. W. H. Inmon, Building the Data Warehouse, (4e),Wiley India Pvt. Introduction to Machine learning and its applications, Bayesian decision
Ltd., 2005. theory, Maximum likelihood ratio, parametric classification, regression,
Multivariate methods, K- nearest neighbor classification, Linear
CSE 4008: INFORMATION RETRIEVAL [3 0 0 3] discrimination, Gradient descent, Logistic discrimination, Single layer
Introduction to Information Retrieval, Information Retrieval Systems, Perceptron, Training a perceptron, Multilayer perceptron, Decision trees,
Information Retrieval Strategies, Web search basics-Web Support vector machines, Clustering, K-Means clustering, Hierarchial
characteristics, Boolean Retrieval and Postings List, Information clustering, Competitive learning, Radial basis functions, Nave Bayes
Retrieval Problem, Document delineation and character sequence classifier, Hidden markov model, Linear regression, Belief propagation,
decoding, Dictionaries and tolerant retrieval, Search structures for Generating diverse learners, Voting, Error correcting output codes,
dictionaries, Index Construction, Types of indexes, Index Compression, Bagging, Boosting.
Types of compression, Parametric and zone indexes, Vector space
model, Evaluation in Information Retrieval, Relevance assessment, References:
Probabilistic Information Retrieval, Binary independence model,Text 1. Ethem Alpaydin, Introduction to Machine Learning, (2e), MIT
Classification-Classification problems, Classification models,Clustering Press. 2010.
in information retrieval,Clustering models, Evaluation in clustering,XML
2. Peter Harrington, Machine Learning in Action, Manning
retrieval: Challenges and Evaluation of XML retrieval, XML retrieval
Publications, 2012.
strategies, Web Crawling and Link Analysis.
3. Christopher M. Bishop, Pattern Recognition and Machine
Learning, Springer, 2007.
References:
4. Richard O. Duda, Peter E. Hart, David G. Stork, Pattern
1. Christopher D Manning, Prabhakar Raghavan and Hinrich Schutze,
Classification, (2e), Wiley, 2001.
Introduction to Information Retrieval, Cambridge University
Press, 2008.

116
CSE 4011: NATURAL LANGUAGE PROCESSING [3 0 0 3] Examples. PSTN, Basics and Signaling: Analog Circuit Basic Call Setup,
Introduction to Language Processing, Ambiguity, Models and Algorithm, ISDN, VOIP, Role of Digital Signal Processing, Role of Microprocessor,
Survey of English Morphology, Building a Finite-State Lexicon, FSTs for Network problems, IP signaling Protocol, SIP, RTP/RTCP,SDP VoiceOver
Morphological Parsing, Lexicon-Free FSTs: The Porter Stemmer, IP Applied, PSTN Numbering Plan, Dial-Peer, CISCO Voice Products
Detecting and Correcting Spelling Errors, Minimum Edit Distance,
Unsmoothed N-Grams, Evaluating N-Grams - Perplexity, Smoothing, References:
Interpolation, Backoff, English Word Classes, Part-of-Speech Tagging, 1. Todd Lammle, CCNA Cisco Certified Network Associate Study
Rule-based and HMM Part-of-Speech Tagging, Transformation-based Guide, (7e).
Tagging, The Noisy Channel Model for Spelling, Constituency, Some 2. Mauricio Arregoces and Maurizio Por tolani, Datacenter
Grammar Rules for English, Treebanks, Dependency Grammars, Fundamentals, Cisco Press.
Dynamic Programming Parsing Methods, Probabilistic Context-Free 3. Danielle Ruest, Nelson Ruest, Virtualization, A Beginner's Guide,
Grammars, Evaluating Parsers, Information Extraction, Question McGrawHill 2009.
Answering and Summarization, Classical MT, Statistical MT
4. Jim Geir, Wireless Networks First-Step, CISCO Press, 2004.
5. Jonathan Davidson, et al., VoIP Fundamentals, (2e), Cisco Press.
References:
1. Daniel Jurafsky and James H. Martin, Speech and Language
CSE 4014: INFORMATION SECURITY [3 0 0 3]
Processing, 2000.
Introduction to security, Characteristics of Information, Components of
2. Akshar Bharati, Rajeev Sangal and Vineet Chaitanya, Natural
an Information System, Security System Development Lifecycle, The
Language Processing: A Paninian Perspective, Prentice-Hall of
Need for Security-Business Needs first, Threats, Attacks, Intruders,
India, New Delhi, 1995.
Intrusion Detection, Malicious Software-Types, Viruses, Viruses
3. Steven Bird, Ewan Klein, Edward Loper, Natural Language Countermeasures, Worms, Introduction to Database Security, SQL
Processing with Python Analysing Text with natural language Injection, Reliability and Integrity, Sensitive Data, Inference, Multilevel
toolkit, O'Reilly Media, 2009 Databases, Proposals for Multilevel Security, Designs of Multilevel
4. Chris Manning, Hinrich Schutze, Foundations of Statistical Natural Secure Databases, Transport-Level Security- Web Security Issues, SSL,
Language Processing, MIT Press, Cambridge, 1999 TLS, Pretty Good Privacy (PGP), S/MIME, IP Security, IP Security Policy,
Encapsulating Security Payload, Internet Key Exchange, The Need for
CSE 4012: SOCIAL NETWORK ANALYSIS [3 0 0 3] Firewalls, Firewall Characteristics, Types of Firewalls,Cyber Crimes and
Introduction to Social Web, Nodes, Edges and Network measures, Hackers- Cybercrimes, Cyber criminals, Hackers, Hacking topologies,
Describing Nodes and Edges, Describing Networks, Layouts, Visualizing Types of Attacks, Dealing with the rising tide of cybercrimes, Indian
Network features, The role of Tie Strength, Measuring Tie Strength, Tie Cyber Law Offences.
Strength and Network Structure, Tie Strength and Network Propagation,
Link Prediction, Entity Resolution, Link Prediction: Case Study Friend References:
Recommendation, Introduction to Community Discovery, Communities 1. William Stallings, Cryptography and Network Security: Principles
in Context, Quality Functions, The Kernighan-Lin algorithm, and Practice, (5e), Prentice Hall, 2010.
Agglomerative Algorithms, Spectral Algorithms, Multi-level Graph 2. Michael E. Whitman and Herbert J. Mattord, Principles of
Partitioning, Markov Clustering, Other Approaches, Introduction to Information Security, (4e), Cengage Learning India Publication,
Social Influence, Influence Related Statistics, Social Similarity and 2011
Influence, Homophily, Existential Test for Social Influence, Influence and
3. Charles P Pfleeger and Shari Lawrence Pfleeger, Security in
Actions, Influence and Interaction, Influence Maximization in Viral
Computing, (4e), PHI, 2009.
Marketing
4. Joseph Migga Kizza, A Guide to Computer Network Security,
Springer International edition, 2009.
References:
1. Jennifer Goldbeck, Analyzing the Social Web, Morgan Kaufmann
CSE 4015: PRINCIPLES OF CRYPTOGRAPHY [3 0 0 3]
Publications, 2013.
Introduction-Security Goals, Attacks, Services and Mechanisms,
2. Charu C. Aggarwal, Social Network Data Analytics, Springer
Classical Encryption Techniques- Symmetric Cipher Model,
Publications, 2011.
Transposition Techniques, The Data Encryption Standard, Block Cipher
3. John Scott, Social Network Analysis, (3e), SAGE Publications Operation, Multiple Encryption and Triple DES, Modes of operation,
Limited, 2013. Mathematics Of Cryptography- Modular Arithmetic, Fermat's and Euler's
4. Jay Goldman, Facebook Cookbook, O'Reilly, 2009. Theorems, The Chinese Remainder Theorem, AES-Structure, Round
5. Shamanth Kumar, Fred Morstatter, Huan Liu, Twitter Data Analytics, Functions, Key Expansion, Pseudorandom Number Generators, Stream
Springer Publications, 2013. Ciphers, RC4, Public-Key Cryptosystems, RSA Algorithm, Diffie-
Hellman Key Exchange, ElGamal Cryptosystem, Cryptographic Hash
IV. NETWORK AND SECURITY Functions-Applications, Hash Functions Based on Cipher Block
Chaining, Secure Hash Algorithm, Message Authentication Function,
CSE 4013: ADVANCED COMPUTER NETWORKS [3 0 0 3] Message Authentication Codes, Digital Signatures
Introduction to Internetworking, Switching concepts and STP, Vlan and
VTP concepts, Routing concepts and structure of the router, Interior References:
Routing Protocols, Overview of Data Centers, Server Architecture 1. William Stallings, Cryptography and Network Security: Principles
Overview, Application Architectures Overview, Data Center Design, Data and Practice, (5e), Prentice Hall, 2010.
Center Security ,Server Load Balancing, Virtualization, Benefits of 2. Behrouz A. Forouzan and Debdeep Mukhopadhyay, Cryptography
Virtualization, Virtualization Implementation, Virtualization challenges, and Network Security, (2e), McGraw Hill, 2008.

117
3. Atul Kahate, Cryptography and Network Security, Tata McGraw- Facade, Flyweight, Proxy, Behavioral Patterns-Chain of Responsibility,
Hill Publishing, 2008 Command, Interpreter, Iterator, Mediator, Memento, Observer, State,
4. Bruce Schneier, Applied Cryptography, (2e), John Wiley & Sons, Strategy, Template Method, Visitor, Conclusion, History, The Pattern
Inc., 1996. Community.

CSE 4016: WIRELESS NETWORKS [3 0 0 3] References:


Introduction to Wireless Networks, 1G cellular systems- AMPS, 2G 1. Erich Gamma, Richard Helm, Ralph Johnson and John Vlissides,
cellular systems- DAMPS, CDMA, GSM, CDPD, GPRS, Cordless Design Patterns: Elements of Reusable Object-Oriented Software,
telephony, Wireless application Protocol (WAP), 3G cellular systems- Pearson Education, 2004.
service classes and standards, IMT 2000, 4G systems and beyond- 2. Mark Grand, Patterns in JAVA Vol-3 JAVA Enterprise Design
OFDM and services, Challenges, Fixed wireless access systems- WLL, Patterns, Wiley, 2002.
IEEE 802.16 standards, WLAN- concepts, applications, topology, 3. Elisabeth Freeman, Head First Design Patterns, Oreilly, 2004.
requirements, physical and MAC layers, IEEE 802.11a,b and g, Wireless 4. Alan Shalloway and James R Trott, Design Patterns Explained,
ATM and Ad Hoc routing- ATM architecture, HIPERLAN architecture, Pearson Education, 2004.
Routing in Wireless Ad Hoc Networks, Personal area networks(PAN)- 5. Steve Holzner, Design Patterns for Dummies, Wiley, 2006.
Bluetooth and Home RF, Wireless Geolocation Systems- architecture, E-
911 services CSE 4019: SOFTWARE ARCHITECTURE [3 0 0 3]
Understanding Software Architecture, Definitions of Software
References: Architecture, Introducing the Case Study, Requirements Overview,
1. R Nicopolitidis et. al., Wireless Networks, (1e), Wiley, 2009. Project Context, Software Quality Attributes, Performance, Scalability,
2. Kaveh Pahlavan, P Krishnamurthy, Wireless networks, (1e), Modifiability, Middleware Architecture and Technologies, Technology
PHI, 2009. Classification, Application Servers, Software Architecture Process,
3. Ivan Stojmenovic, Handbook of Wireless Networks and Mobile Process Outline, Architecture Design, Documenting Software
Computing, (1e), Wiley, 2010. Architecture, Using UML 2.0, Architecture Views, Case Study Design,
4. WCY Lee, Cellular and Mobile Communication Systems, (2e), ICDE Technical Issues, The Challenges of Complexity, Aspect Oriented
MGH, 2004. Architectures, Aspects for ICDE Development, Model Driven
Architecture, Definition for MDA, Reasons for MDA, Service Oriented
V. SOFTWARE PROCESS ENGINEERING Architectures and Technologies, Service Oriented Architecture for ICDE,
Background, The Semantic Web, ICDE and the Semantic Web.
CSE 4017:BUILDING ENTERPRISE APPLICATION [3 0 0 3]
Introduction, software engineering methodologies, life cycle of raising References:
enterprise applications, Incepting Enterprise applications, Enterprise 1. Gorton Ian, Essential Software Architecture, Springer International
analysis, Business modeling, requirements elicitation and analysis, use Edition, 2011.
case modeling, prototyping, nonfunctional requirements, requirements 2. Bosch Jan, Design and Use of Software Architectures, Addison
validation, planning and estimation, Architecting and Designing Wesley, 2000.
Enterprise applications, Architectures, views and viewpoints, Logical 3. Rozanski Nick & Woods Eoin, Software Systems Architecture,
architecture, Technical architecture, data architecture and design Addison Wesley, 2005.
infrastructure architecture and design elements, policies for 4. Bass Len, Clements Paul and Kazman Rick, Software Architecture in
infrastructure management, deployment strategy, construction Practice, (2e), Pearson education, 2003.
readiness, Introduction to concept of software construction maps,
methodologies of code review Testing and rolling out Enterprise CSE 4020: SOFTWARE TESTING AND ANALYSIS [3 0 0 3]
applications, Types and methods of testing an enterprise application, Preliminaries: Software Testing, Humans, Errors and Testing, Software
testing levels and testing approaches, testing environments Quality, Requirements, Behavior and Correctness, Correctness Versus
Reliability, Testing and Debugging, Functional Testing: Boundary Value
References: Testing, Equivalence Class Testing, Decision Table Based Testing, Test
1. Anubhav Pradhan, Satheesha B. Nanjappa, Senthil K. Nallasamy, adequacy basics, Adequacy criteria based on control flow, concepts
Veerakumar Esakimuthu, Raising Enterprise Applications, John based on Data Flow, Adequacy criteria based on Data Flow, Introduction,
Wiley, 2011. Mutation and Mutants, Test Assessment using Mutation, Test Selection,
2. Brett McLaughlin, Building Java Enterprise Applications, O'Reilly Minimization and Prioritization for Regression Testing: Regression Test
Media, 2000. Process, Selecting Regression Tests, Unit Testing: Introduction, Context,
3. Marnie L. Hutcheson, Software Testing Fundamentals: Methods Test Design, Using JUnit, Stubs and Mocks, Tools, Integration Testing:
and Metrics, Wiley Dreamtech India Pvt. Ltd., 2003. Introduction, Integration errors, Dependence, OO Versus Non-OO
programs, Integration Hierarchy.
CSE 4018: DESIGN PATTERNS [3 0 0 3]
Introduction - The Catalog of Design Patterns, Describing Design References:
Patterns, The Catalog of Design Patterns, Organizing the Catalog, 1. Aditya P Mathur, Foundationsof Software Testing, (2e), Pearson
Solving Design Problems using Design Patterns, Selecting a Design Education 2008.
Pattern, Using a Design Pattern, A Case Study: Designing a Document 2. Paul C. Jorgensen, Software Testing A Craftsman's Approach,
Editor, Design Problems, Document Structure, User Interface, Creational (3e), 2013.
Patterns - Abstract Factory, Builder, Factory Method, Prototype, 3. Mauro Pezze, Michal Young, Software Testing and Analysis:
Singleton, Structural Patterns- Adapter, Bridge, Composite, Decorator, Process, Principles and Techniques, John Wiley & Sons, 2008.

118
4. Gopalaswamy Ramesh, Srinivasan Desikan, Software testing HUM 4014: OPERATIONS AND SYSTEMS MANAGEMENT [2 1 0 3]
Principles and Practices, (2e), Pearson, 2007. Types of production activities, Production consumption cycle, Functions
of production and operations management, Importance and uses of
VI. BUSINESS MANAGEMENT forecasting, Product development and design: Product life cycle,
Process design, Process charts, Flow diagrams and Man machine
HUM 4011: FINANCIAL MANAGEMENT [2 1 0 3] charts, Capacity planning, Aggregate planning, Scheduling, Operations
Introduction to financial management, Principle of accountancy, Sources strategy, Operation performance Frontier and productivity, Systems
of long term finance, Valuation of securities, Leverages, Working capital thinking, Systems engineering and its management, Systems decision
management, Capital budgeting, Cost of capital, Cash management, and process. Systems thinking, structure, classification, boundaries,
Dividend decisions. visibility, System life cycle models, System dynamics and its importance
in system thinking.System dynamics modeling process.
References:
References:
1. Prasanna Chandra, Fundamentals of Financial Management, Tata
McGraw Hill, Delhi, 2006. 1. Monks Joseph G., Operations Management, Tata McGraw-Hill
Publishing Co. Ltd., New Delhi, 2004.
2. I M Pandey, Financial Management, Vikas Publishing house, Delhi,
2007. 2. Krajewski Lee J. and Ritzman Larry P., Operations Management,
Pearson Education (Singapore) Pvt. Ltd., Delhi, 2005.
3. Subir Kumar Banerjee, Financial Management, Sultan Chand &
Co., Delhi, 1999. 3. Mieghem J., Operations Strategy: Principles and Practices,
Dynamic Ideas, ISBN: 0-9759146-6-9, 2008.
4. ICFAI, Corporate Financial Management, ICFAI, Hyderabad, 2003.
4. Sterman J.D., Business Dynamics - Systems Thinking and
5. Maheshwari S. N., Financial Management, Sultan Chand & Co.,
Modeling for A Complex World, McGraw Hill, International Edition,
Delhi, 2002.
2004.
5. Senge Peter, The Fifth Discipline, Currency Doubleday, New York,
HUM 4012: HUMAN RESOURCE MANAGEMENT [2 1 0 3]
1990.
Evolution and development, HRD Organization and responsibilities.
Evolution of HRM, Theories of HRM. Human resource planning, Human
OTHER PROGRAMME ELECTIVES
Resources Inventory, Forecast, Job analysis, Job description, Job
specification, Job evaluation, Employment stability.Human Resource
Planning and Recruiting, Induction, & socialization, Training and CSE 4021: ADVANCED DATA STRUCTURES AND
development, Performance management and appraisal. ALGORITHMS [3 0 0 3]
Amortized Analysis - Aggregate analysis, The accounting method, The
References: potential method, Binomial Heaps - Binomial trees and Binomial heaps,
1. T. V. Rao and Pereira D.F., Recent experiences in Human Resources Operations on Binomial heaps. Fibonacci Heaps - Structure of Fibonacci
Development, Oxford and IBH Publishing, 1986. heaps, Mergeable heap operations, decreasing a key and deleting a
node. vanEmde Boas Trees- Preliminary approaches, A recursive
2. Subbrao A., Essentials of Human Resource Management and
structure, The van Emde Boas Tree. Data structures for Disjoint sets
industrial Relations, Himalaya Publishing House, 1999.
Disjoint-set operations, Linked-list representation of disjoint sets,
3. N G Nair and Latha Nair, Personnel Management and Industrial
Disjoint set forests. Minimum spanning trees - Growing a minimum
Relations, S. Chand Company, 1995.
spanning tree, algorithms for single source shortest paths - The
4. Virmani B R; Rao Kala, Economic restructuring technology transfer Bellman-Ford algorithm, Directed acyclic Graphs, Graphs with non-
and human resource development, Response books, 1997. negative edges.. All-pairs shortest paths - Shortest paths and matrix
5. Pareek Udai et al., Human Resource Development in Asia: Trends multiplication, The Floyd-Warshall algorithm, Maximum Flow- Flow
and Challenges, Oxford and IBH Publishing, 2002. Networks, The Ford-Fulkerson method. Johnson's algorithm for sparse
graphs
HUM 4013: MARKETING MANAGEMENT [2 1 0 3]
Understanding marketing management, Assessing market opportunities References:
and customer value, Adapting marketing to the New Economy, Building 1. Cormen T. H., Leiserson C. E, Rivest R.L. and Stein C., Introduction
Customer Satisfaction, Value, and Retention, Market Demand, Scanning to Algorithms, (3e), Prentice-Hall India, 2009.
the Marketing Environment, Consumer Markets, Business Markets, 2. Cormen T. H., Leiserson C. E, Rivest R. L. and Stein C., Introduction
Dealing with the Competition, Market Segments, Product Life Cycle, New to Algorithms, (2e), Prentice-Hall India, 2001.
Market Offerings, Designing and Managing Services, Price Strategies,
3. Baase Sara and Gelder A.V, Computer Algorithms Introduction to
Retailing, Wholesaling, Integrated Marketing Communications.
Design and Analysis, (3e), Pearson Education, 2000.
4. Peter Brass, Advanced Data Structures, Cambridge University
References: Press, ISBN 978-0-521-88037-4 , 2008.
1. Philip Kotler, Marketing Management Analysis, Planning,
Implementation and Control, Prentice Hall of India Private Limited,
CSE 4022: ADVANCED JAVA PROGRAMMING [3 0 0 3]
New Delhi, 2000.
Java basics, applets, J2EE and J2SE, J2EE multitier architecture, design
2. ICFAI,Marketing Management, ICFAI, Hyderabad, 2003.
patterns, J2EE Database, database schema, jdbc driver types, jdbc
3. Varshney R.L. and Gupta S.L., Marketing Management, Sultan packages, brief overview of jdbc process, statement objects and result
Chand & Sons, New Delhi, 2004. set, HTML, XML, XHTML, generating an XML document, parsing XML,
4. Adrian Palmer, Principles of Marketing, Oxford University Press, Java servlets and common gateway interface programming, HTTP
New York, 2000. request headers, HTTP response header and cookies, sessions, JSP

119
Installation, JSP tags, Tomcat, Request string, user sessions, cookies, References:
session objects, Enterprise java beans and JAR files, deployment 1. R N Prasad, Seema Acharya, Fundamentals of Business Analytics,
descriptors, Struts Architecture, writing and executing struts Wiley India, 2011.
application, Model View Controller layers, Validator and Tiles, Java Mail 2. David Loshin, Business Intelligence, Morgan Kaufmann
API, Java remote method invocation, Java message service, SOAP. Publishers, 2003.
3. Brain Larson, Delivering Business Intelligence with Microsoft SQL
References: server 2008,McGraw Hill Companies, 2009.
1. James Keogh, The Complete Reference J2EE, Tata McGraw-Hill, 4. Stephen Few, Information Dashboard Design, O'Reilly Media,
2002. 2006.
2. James Holmes, Struts: The Complete Reference, (2e), Tata 5. Mike Biere, Business Intelligence for the Enterprise, (2e), IBM
McGraw-Hill, 2007. Press, 2003.
3. Kogent Learning Solutions Inc., Java Server Programming Java
Black Book, Dreamtech Press, Platinum edition, 2010. CSE 4025: DATA COMMUNICATIONS [3 0 0 3]
4. Richard Monson Haefel, J2EE web services, (1e), Pearson, 2004. Introduction to Data Communication, Components, Data
5. Bryan Basham, Bert Bates, Kathy Sierra, Head First Servlets and Representation, Data Flow, Network Criteria, Physical Structure of
JSP, (2e), OReilly, 2011. Network, Network Types: LAN, WAN, Switching ,Data Networking, and
the Internet, Data Transmission- analog and digital, Transmission Media-
CSE 4023: ADVANCED LINUX PROGRAMMING [3 0 0 3] guided and wireless, Signal Encoding Techniques- digital and analog,
Advanced UNIX Programming with Linux: Getting Started with Digital Data Communication Techniques- asynchronous and
emacs, GDB, GCC, automation with GNU make, Writing Good synchronous, Data Link Control Protocols-flow and error control, HDLC,
GNU/Linux Software, Processes, Interprocess Communication, Multiplexing-FDM, synchronous TDM and statistical TDM, Spread
Devices, The /proc file System, Linux System Calls, Security, File Spectrum-FHSS, DSSS, CDMA, Circuit Switching and Packet Switching,
system permission, authenticating users, Python: Built-in Data Asynchronous Transfer Mode(ATM).
Types, Simple Statements, Compound statement, Functions and
Classes, Parsing, Applications and Recipes, Guidance on Packages References:
and Modules. Bash Programming: Bash and bash scripts, Writing and 1. William Stallings, Data and Computer Communications, (10e),
debugging scripts, The Bash environment, The GNU sed stream Prentice Hall, 2014.
editor, Regular expressions, Grep, Pattern Matching, Conditional 2. Behrouz A. Fourouzan, Data Communication and Networking,
statements, I/O redirection, repetitive tasks, interactive editing, non- (5e), Tata McGrawHill, 2013.
interactive editing, Writing interactive scripts, Functions, Catching
Signals, Inter Process Communications, Semaphores, Shared CSE 4026: EMBEDDED SYSTEMS [3 0 0 3]
Memories, Sockets, Programing GNOME using GTK+ . Introduction to Embedded systems, classification of Embedded
systems, RISC and ARM design philosophy, ARM processors
References: fundamentals and instruction set, Real-time operating systems (RTOS),
1. Mark Mitchell, Jeffrey Oldham, and Alex Samuel, Advanced Linux Schedulers, Performance metric in scheduling models for periodic,
Programming, New Riders Publishing, 2001. sporadic, Aperiodic tasks, synchronization between the processes, OS
functions and tasks and for resource management, embedded Linux
2. Dave Kuhlman, A Python Book: Beginning Python, Advanced
Internals, OS security issues, RTOS programming tools- MICRO C/OS-II
Python, and Python Exercises, Rexx Publishers, 2012.
AND VxWORKS, Embedded project management cycle, Embedded
3. Machtelt Garrels, Bash Guide for Beginners, Fultus Corporation system design and co-design issues in system development process,
Publishers, 2004. use of scopes and logic analyzers for system hardware tests, Issues in
4. Daniel P. Bovet, Marco Cesati, Understanding the Linux Kernel, Embedded System Design, Overview of 8/16/32-bit microcontroller,
(2e), O'Reilly Publication, 2002. RISC and CISC based systems.
5. Niel Matthew, Rick Stone, Beginning Linux Programming, (4e),
Wiley Publications, 2007. References:
1. Raj Kamal, Embedded Systems, Tata McGraw Hill, 2008.
CSE 4024:BUSINESS INTELLIGENCE AND ITS 2. Sloss, Symes, Wright, ARM System Developer's Guide, Elsevier,
APPLICATION [3 0 0 3] Morgan Kaufmann Publishers, 2011.
Introduction to Business Intelligence, Types of digital data; Introduction 3. Shibu K V, Introduction to Embedded Systems, (6e),
to OLTP and OLAP, Evolution of BI, Applications, Components, TataMcGrawHill, 2011.
Framework, Roles & Responsibilities, Data integration, Data quality, 4. Wayne Wolf, Computers as Components: Principles of
Data profiling and applications, Data flow and transformations, SSIS Embedded Computing Systems, (2e), Morgan Kaufmann
Architecture, Introduction to ETL using SSIS; Integration Services Publishers, 2008.
objects; Data flow components, Data and dimension modeling,
multidimensional data model, Concepts of dimensions, facts, cubes, CSE 4027: MOBILE APPLICATION DEVELOPMENT [3 0 0 3]
attribute, hierarchies, star and snowflake schema, Measures, Metrics, Mobile platforms, Mobile apps development, Android platform, setting
KPIs and Performance Management, Introduction to enterprise up the mobile app development environment, case study, App user
reporting, concepts of dashboards, balanced scorecards, Introduction interface mobile UI resources, Activity- states and life cycle, interaction
to SSRS Architecture, enterprise reporting using SSRS. amongst activities, App functionality- Threads, Async task, Services
states and life cycle, Notifications, Broadcast receivers, Telephony and
SMS APIs, Native data handling on-device file I/O, shared preferences,

120
mobile databases, and enterprise data access, Content Providers, Principles and Paradigms, (2e), TMH, 2010.
Graphics and animation custom views, canvas, animation APIs, 3. Terrence W. Pratt, Marvin V. Zelkowitz, Programming Languages:
multimedia audio/video playback and record, images and camera, Design and Implementation, (4e), 2001.
Location based services, native hardware access, Debugging, White
box testing, Black box testing, and test automation, JUnit, Robotium, CSE 4030: PRODUCT REALIZATION WITH
MonkeyTalk, Versioning, signing and packaging mobile apps, HARDWARE-SOFTWARE INTERFACE [3 0 0 3]
distributing apps on mobile market place.
The Product Realization Process, Developing Engineering
Requirements, Innovation, An Introduction to the Raspberry Pi,
References: Raspberry Pi GPIO, Writing software for the Arduino, Arduino and Home
1. AnubhavPradhan, Anil V Deshpande, Composing Mobile Apps, Automation, Setting up the Raspberry Pi, Connecting Raspberry Pi,
learn, explore apply using Android, (1e), Wiley India Pvt. Ltd., India, Compiling and testing, Setting up Raspberry Pi to Arduino Bridge Shield,
2014. Case: Implementation-A Basic Thermometer, An introduction to
2. Zigurd Mednieks, Laird Dornin, G. Blake Meike, and Masumi Makefiles, Case: Implementation from Thermometer to Thermostat
Nakamura, Programming Android, (2e), O'Reilly, CA, USA, Building upon First Project, arduPi a library for our Raspberry Pi and
2012 Arduino shield, Testing Arduino shield for database, Case
3. Barry Burd, Android Application Development All in one for Implementation of Temperature Storage, Setting up a Database to Store
Dummies, (2e), John Wiley and Sons Inc. New Jersey, Canada, Results, Apache web server, Case Implementation of Curtain
2012. Automation, Pulse Width Modulation
4. Lauren Darcey, Shane Conder, Teach Yourself Android
Application Development in 24 Hours, (2e), Sams Publications, References:
USA, 2012. 1. Goyal, Ulrich, Product Design & Development (SIE), (4e), Tata
McGraw Hill Education Private, 2009.
CSE 4028: PARALLEL ALGORITHMS [3 0 0 3] 2. Andrew K. Dennis, Raspberry Pi Home Automation with Arduino,
Parallel Algorithm Design, Parallel Processing Terminology, Sieve of Packt Publishing, 2013
Eratosthenes, Control parallel and data parallel approach, PRAM model
of Parallel Computation, PRAM Algorithms, Parallel Reduction, Tree CSE 4031: SOFT COMPUTING PARADIGMS [3 0 0 3]
Traversal, Merging sorted Lists, Graph Coloring, Scaled Speedup and Artificial Neural Networks-Definition, benefits, terminology, neuron
Parallelizability, Amdahl's Law, Gustafson-Barsis's Law, Karp-Flat models, activation functions, learning process, types of learning, error-
Metric, Isoefficiency Metric, Elementary Parallel Algorithms, Parallel correction, memory based, Hebbian, competitive, and Boltzmann
Algorithms for Processor Arrays, Parallel Algorithms for learning, Feed forward neural network- Single and multilayer perceptron,
Multiprocessors, Parallel Algorithms for Multicomputers, Monte Carlo limitations, back propagation algorithm, practical considerations, radial
Methods of Parallel Random Number Generators, Case studies, Solving basis function network, Recurrent networks-Hopfield network, NARX
Linear Systems, Back Substitution, Odd-Even Reduction, Gaussian model, state space model, recurrent multilayer perceptron, second order
Elimination, Iterative Methods, Multigrid Methods, Sorting: Lower networks, learning algorithms, Self-organizing map, principal
Bounds on Parallel Sorting, Bitonic Merge sort algorithms. component analysis, Neural network applications, Fuzzy Logic- Basic
concepts, operations and properties, relations, logic, fuzzy quantifiers,
References: inference, rules, fuzzification and defuzzification, Fuzzy Logic
1. Michael J Quinn, Parallel Computing- Theory and Practice, Applications, Genetic Algorithms - basic concepts, principles, gene
McGraw-Hill Inc., 2008. encoding, genetic operators, genetic programming, Neuro fuzzy
2. Michael J Quinn, Parallel Programming in C with MPI and systems applications.
OpenMP, McGraw Hill Education Private Limited, 2012.
3. Ananth Grama, George Karypis, Vipin Kumar and Anshul Gupta, References:
Introduction to Parallel Computing, Pearson Education, 2003. 1. Simon S. Haykin, Neural Networks- A Comprehensive Foundation,
Prentice Hall, 2005.
CSE 4029: PRINCIPLES OF PROGRAMMING LANGUAGES [3 0 0 3] 2. Li Min Fu, Neural Networks in Computer Intelligence, Tata McGraw
Abstractions in Programming Languages, Computational Paradigms, Hill Edition, 2008.
Language Definition, Language Translation, History and Design Criteria, 3. S. Rajsekaran, G. A. Vijayalaxmi Pai, Neural Networks, Fuzzy Logic
Efficiency, Regularity, Further Language Design Principles, Lexical and Genetic Algorithms: Synthesis and Application, Prentice Hall,
Structure of Programming Languages, CFGs and BNFs, Parse Trees and 2010.
Abstract Syntax Trees, Ambiguity, Associativity, and Precedence, 4. Timothy J. Ross, Fuzzy Logic with Engineering Applications, (3e),
EBNFs and Syntax Diagrams, Attributes, Binding, and Semantic John Wiley& Sons, 2010.
Functions, Declarations, Blocks, Name Resolution and Overloading,
Allocation, Lifetimes, and the Environment, Variables and Constants, CSE 4032: STORAGE DEVICE AND TECHNOLOGY [3 0 0 3]
Aliases, Dangling References, and Garbage, Expressions and Introduction to Information Storage and Management, Data center
Statements, Object-Oriented Programming, Functional Programming, infrastructure, Information Life cycle, Storage System Environment,
Logic Programming, Parallel Programming. Data Protection, RAID, RAID levels, Intelligent Storage System, EMC
CLARIION, Direct Attached Storage and Introduction to SCSI, Storage
References: Area Networks, Network Attached Storage, Content Addressed Storage,
1. Kenneth C. Louden, Kenneth A. Lambert, Programming Languages Architecture, Examples, Storage Virtualization, Configuration,
Principles and Practice, (3e), Cengage Learning, 2012. Challenges, Storage Area Networks, Zoning, Business Continuity,
2. Allen B. Tucker, Robert E. Noonan, Programming Languages Information Availability, Business Impact Analysis, Backup and

121
Recovery, Backup purpose, Considerations, Granularity, Technologies, 3. Thomas Connolly, Carolyn Begg, Database Systems A Practical
Local Replication, Remote Replication, Concepts in practice. Approach to Design, Implementation and Management, (4e),
Pearson Education, England, 2005.
References: 4. Peter Rob, Carlos Coronel, Database Systems Design,
1. G. Somasundaram, Alok Shrivastava, Information Storage and Implementation and Management, (10e), Course Technology,
Management-Storing, March 2009. Boston, 2013.
2. Managing and Protecting Digital Information, EMC Education
Services, Wiley India Edition, 2009. CSE 3282: ESSENTIALS OF IT [3 0 0 3]
3. Marc Farley, Storage Networking Fundamentals, (1e), CISCO Computer Hardware and Software concepts. Introduction to Operating
Systems, 2004. System, basic concept of multiprogramming, multitasking and
4. Gupta Mena, Storage Area Network Fundamentals, Pearson Ed. multiprocessing. Memory and Process Management, Scheduling
2005. Algorithms, Inter process Communication, Threads, Concurrency,
Critical section, Mutual Exclusion, Deadlocks and prevention, File and
device Management- I/O channels, interrupts. Relational Database
CSE 4032: VIRTUAL REALITY TECHNOLOGIES [3 0 0 3]
Management System Concepts - Introduction to E-R modeling,
Introduction, Input Devices, Output Devices, Displays, Computing
notations, functional dependency, and basic Normalization techniques.
Architectures for VR, The Rendering Pipeline, PC Graphics Architecture,
Structured Query Language - DDL, DML, DCL statements. Concept of
Workstation-Based Architectures, Distributed VR Architectures,
Order By, Group By, Having clauses and Aggregate functions. Joins -
Modeling, Geometric Modeling, Kinematics Modeling, Physical
Introduction to the concept of independent and correlated sub queries,
Modeling, Behavior Modeling, Model Management, VR Programming
Views and Embedded SQL
Toolkits and Scene Graphs, World Toolkit, Java 3D, General Haptics
Open Software Toolkit, Peopleshop, Human Factors in VR Methodology
and Terminology, User Performance Studies, VR Health and Safety References:
Issues, VR and Society, Traditional VR Applications: Medical 1. Sivasubramanyam Y., Deepak Ranjan Shenoy, Nagendra R Shetty
Applications of VR, Education, Arts and Entertainment, Military VR and Raghavendra N., Campus Connect Foundation Program Vol.
Applications, Emerging Applications of VR, VR Applications in 1, Education and Research, Infosys Technologies, 2006.
Manufacturing, Applications of VR in Robotics, Information 2. Hanumesh V. J., Seema Acharya, Nagendra R Shetty and Meera
Visualization. Gayathri Dharmalingam, Campus Connect Foundation Program
Vol. 2, Education and Research, Infosys Technologies, 2006.
References: 3. A. Silberschatz, P.B. Galvin and G. Gagne, Operating System
1. Grigore C. Burdea, Philippe Coiffet, Virtual Reality Technology, Principles, (7e), Wiley & Sons (Asia), 2006.
Wiley-IEEE Press, 2003. 4. Henry F. Korth, Abraham Silberschatz and Sudarshan, Database
2. Sherman, W. R. & A. Craig, Understanding, Virtual Reality: system concepts, (5e), McGraw-Hill, 2006.
Interface, Application and Design, Morgan Kaufmann, San
Francisco, CA, 2003. CSE 3283: ESSENTIALS OF INDUSTRIAL COMPUTING [3 0 0 3]
3. Philippe Fuchs, Guillaume Moreau, Pascal Guitton, Virtual Reality: Analysis of Algorithms: Introduction to Analysis of algorithms, code
Concepts and Technologies, CRC Press, 2011. tuning techniques, analysis of some well-known algorithms, intractable
problems. Object oriented concepts: programming techniques,
OPEN ELECTIVES advanced concepts in object oriented technology, object oriented design
methodology, recent trends in OO technology. System development
methodology: Evaluation of software, software development models,
CSE 3281: DATABASE MANAGEMENT SYSTEMS [3 0 0 3]
requirement analysis and design, software construction, software
Database System Applications, Database Languages, Relational testing and software quality. Introduction to web technologies:
Databases, Data Storage and Querying, Database Architecture, Internetworking concepts, architecture and protocol, the World Wide
Database Users and Administrators, Structure of Relational Databases, Web, web applications, security in applications and issues in web based
Relational Query Languages, Relational Operations, The Entity- applications.
Relationship Model, Constraints, Entity-Relationship Design Issues,
Reduction to Relational Schemas, SQL Data Types and Schemas,
References:
Integrity Constraints, Set Operations, Aggregate Functions, Nested
Subqueries, Modification of the Database. Join Expressions, Views, 1. Hanumesh V. J, Seema Acharya, Nagendra R Shetty and Meera
Transaction. Features of Good Relational Design, Decomposition Using Gayathri Dharmalingam, Campus Connect Foundation Program,
Functional Dependencies, Functional Dependency Theory, Algorithms Vol 2, Education and Research, Infosys Technologies, 2006.
for Decomposition, Decomposition Using Multivalued Dependencies, 2. Sundar K. S, Seema Acharya, Nagendra R Shetty, Sivasubramanyam
Transaction Concept, A simple Transaction model, Storage Structure, Y, and Sujith Samuel Mathew, Campus Connect Foundation
Transaction Atomicity and Durability, Transaction isolation, Program, Vol 3, Education and Research, Infosys Technologies,
Serializability. 2006.
3. Comer Douglas E, Computer Networks and Internets, (5e),
References: Prentice Hall, 2011.
1. Silberschatz, Korth, Sudarshan, Database System Concepts, (6e),
McGrawHill, New York, 2011. CSE 3284: GAME PROGRAMMING [3 0 0 3]
2. Ramez Elmasri and Shamkant Navathe, Durvasula V L N Somayajulu, Basic Elements of Game Design: Games and Video Games, What is a
Shyam K Gupta, Fundamentals of Database Systems, (6e), Game, Conventional Games and Video Games, Key Components of
Pearson Education, United States of America, 2011. Video Games, The Structure of a Video Game, Stages of the Design

122
Process Game World, User Interface and Gameplay, The Hierarchy of References:
Challenges, Skills, Stress and Absolute Difficulty, Making PvP Games Fair, 1. Sumitabha Das, UNIX Concepts and Applications, (4e),Tata
Making PvE Fair, Managing Difficulty, The Genres of Games: Action McGraw Hill Publications, 2011.
Games, Strategy Games, Role Playing Games, Sports Games, Vehicle 2. Neil Matthew and Richard Stones, Beginning Linux Programming,
Simulation, Adventure Games, Online Gaming, World of Warcraft, Java (4e), Wrox Publication, 2008.
for Games Programming, An Animation Framework, The Worm-Chasing 3. Behrouz A Forouzan and Richard F Gilbery, UNIX and Shell
Application, Worm Chase as an Applet, Java Imaging and Sound: AWT Programming, CENGAGE Learning India Edition New Delhi, 2004.
Imaging Model, , Java 2D, Image Loading, Visual Effects and Animation, 4. Eric Foster Johnson, John C Welch, Micah Anderson, Beginning
Java Sounds, Sprites:, Defining and Coding a Sprite, Case Study: An Shell Scripting, Wrox Publication, 2005.
Isometric Tile Game and A 3D Checker Board
CSE 3287: PRINCIPLES OF SOFT COMPUTING [3 0 0 3]
References: Soft computing- Definition, Conception, Importance, Development
1. Ernest Adams, Fundamentals of Game Design, (2e), New Riders history; Neural networks: Neuron models, Activation functions, Network
(Pearson), 2010. architectures, Types of learning: error-correction, memory based,
2. Andrew Davison, Killer Game Programming in Java, O'Reilly, 2005. Hebbian, competitive, and Boltzmann learning. Feed forward neural
3. Tony Gaddis, Starting Out with Games & Graphics in C++, (2e), network: Single layer perceptron, Multi layer perceptron, Back
Addison-Wesley, 2012. propagation algorithm, Radial basis function network. Self-organizing
4. Mike McShaffry, David Graham, Game Coding Complete, (4e), map, Principal component analysis, Applications. Fuzzy logic: Fuzzy set
Cengage Learning PTR, 2012. theory: Fuzzy versus Crisp, Fuzzy set and Crisp set, Fuzzy relations and
Crisp relations. Fuzzy systems: Crisp logic, Predicate logic, Fuzzy logic,
CSE 3285: INTRODUCTION TO ALGORITHMS [3 0 0 3] Fuzzy rule based system, Defuzzification methods, Applications;
Fundamentals of Algorithms, Important Problem Types, Analysis of Genetic algorithms: Basic concepts, Working principle, Encoding,
algorithm efficiency, Analysis Framework: Asymptotic Notations and Fitness function, Reproduction, Crossover, Mutation operators,
Basic Efficiency Classes, Mathematical Analysis of Nonrecursive and Applications; Hybrid Intelligent systems: Combination of Neural
Recursive Algorithms, Bruteforce Techniques: Selection Sort and Bubble networks, Fuzzy logic and Genetic algorithms
Sort, Sequential Search and String Matching, Exhaustive Search. Divide
and Conquer: Mergesort, Quicksort and Binary search. Decrease and References:
Conquer: Insertion Sort, Depth First Search, Breadth First Search, 1. Eva Volna, Introduction to Soft computing, (1e), Bookboon.com,
Topological Sorting. Transform and Conquer: Presorting, Balanced 2013.
Search Trees, Heaps and Heapsort, Problem Reduction. Space and Time 2. S. Rajasekaran, G. A. Vijayalakshmi Pai, Neural Networks, Fuzzy
tradeoffs: Sorting by Counting, Input Enhancement in String Matching, Logic and Genetic Algorithm: Synthesis and Applications, PHI,
Hashing. Dynamic Programming: Computing a Binomial Coefficient, 2011.
Warshall's and Floyd's Algorithms and the Knapsack Problem. Greedy 3. S. N. Sivanandam, S. N. Deepa, Principles of Soft Computing,
Techniques: Prim's Algorithm, Kruskal's Algorithm, Dijkstra's Algorithm, Wiley Pub., 2010.
Huffman Trees. 4. Simon S. Haykin, Neural Networks- A Comprehensive
Foundation, Prentice Hall, 2005.
References: 5. Timothy J Ross, Fuzzy Logic with Engineering Applications, (2e),
1. Anany Levitin, Introduction to the Design and Analysis of McGrawHill, 2004.
Algorithms, (3e), Pearson Education, India, 2012.
2. Ellis Horowitz and Sartaj Sahni, Computer Algorithms/C++, (2e), CSE 3288: PRINCIPLES OF SOFTWARE ENGINEERING [3 0 0 3]
University Press, India, 2007. Introduction, The problem domain, The Software Engineering
3. Thomas H. Cormen, Charles E. Leiserson, Ronal L, Rivest, Clifford Challenges, Software Processes, Desired Characteristics of Software
Stein, Introduction to Algorithms, (2e), PHI, India, 2006. Process, Software Development Process Models, Software
Requirements Analysis And Specifications, Software Requirements,
CSE 3286: LINUX BASICS AND PROGRAMMING [3 0 0 3] Problem Analysis, Requirement Specifications, SRS, Planning a
Introduction to UNIX Operating System, UNIX Architecture and Command Software Project , Process Planning, Effort Estimation, Project
Usage, General Purpose Utilities, The File System, Absolute Pathnames, Scheduling and Staffing, Software Configuration Management Plan,
Relative Pathnames, Handling Ordinary Files, Compressing and Function Oriented Design, Design Principle, Module Level Concepts,
Decompressing Files, Basic File Attributes, File Ownership, File Design Notations and Specifications, DFDs, Object Oriented Design, OO
Permissions, Changing File Permissions, The vi Editor, Working With gdb Analysis and Design ,OO Concepts, UML Diagrams, Coding
Debugger, The Shell, Pattern matching, File Redirection, Escaping and ,Programming Principles and Guidelines,Coding Process, Testing,
Quoting, Pipes, Shell Variables, The Process Basics, Mechanism of Testing Fundamentals, Types of Testing.
Process creation , Process States and Zombies, Running Process in
Background, Killing Process with Signals, Customizing The Environment, References:
Environment Variables, File Systems and Inodes, Hard Links, Symbolic 1. Pankaj Jalote, An Integrated approach to Software Engineering,
Links, Umask, Simple Filters, Filters Using Regular Expression grep and (3e), Narosa 2005.
sed, Essential shell programming, Developing shell scripts, Debugging 2. Rajib Mall, Fundamentals of Software Engineering, (3e), PHI
shell scripts, Interrupting a program, Essential Linux System learning 2009.
Administration 3. Roger S. Pressman, Software Engineering A Practioner's
Approach, (6e), McGraw-Hill, 2005.
4. Ian Sommerville, Software Engineering, (9e), Pearson, 2010.

123
CSE 3289: PROGRAMMING IN C# [3 0 0 3] References:
C#'s Family Tree- C, C# Relation to the .NET Framework, Introduction 1. Herbert Schildt, The Complete Reference Java, (8e), TataMcGraw
to .NET Framework, Managed vs. Unmanaged Code, The Common Hill, 2011
Language Specification, Object-Oriented Programming- 2. Deitel and Deitel, Java How to Program, (10e), Pearson Edu., 2011
Encapsulation, Polymorphism, Inheritance, The C# Keywords, 3. Steven Holzner, Java 2 programming black book, Dream Tech, New
Identifiers, The .NET Framework Class Library, C#'s Value Types, Delhi, reprint:2005.
Integers, Floating-Point Types, The decimal Type, Characters, The bool 4. Pratik Patel and KarlMoss, Java Database programming with
Type, Literals- Character Escape Sequences, String Literals, The JDBC, (2e), DreamTech, New Delhi, 2000.
Scope and Lifetime of Variables, Type Conversion and Casting,
Operators, Operator Precedence, Program Control Statements, CSE 3291: WEB PROGRAMMING [3 0 0 3]
Introducing Classes and Objects- Garbage Collection and Destructors, Traditional HTML, XHTML, Loose Syntax Returns, Presentational Markup
Arrays and Strings, A Closer Look at Methods and Classes, Removed and Redefined, HTML5 Document Structure Changes, Adding
Inheritance, Interfaces, Structures, Enumerations, The System, Semantics, HTML5's Open Media Effort, Client Side Graphics, HTML5
Exception Class, Exception- Handling Fundamentals. Form Changes, Emerging Elements and Attributes to Support Web
Applications, HTML5 Metadata Changes, Client side Programming using
References: Javascript, Statements, Loops and Functions, Client side Programming
1. Herbert Schildt, C# 4.0: The Complete Reference, Tata McGraw using jQuery, Events, Animations and Effects, PHP History, General PHP
Hill Publication, 2010. Language Features, Configuring the Environment, Embedding PHP Code
2. E Balagurusamy, Programming in C# A Primer, (3e), Tata McGraw in Web Pages, String Interpolation, Control Structures, Functions, Arrays,
Hill Publication, 2010. Object-Oriented PHP, Advanced OOP Features, Working with HTML
3. Harsh Bhasin, Programming in C#, Oxford University Press, 2014. Forms.
4. Joseph Albahari and Ben Albahari, C# 4.0 In A Nutshell, (4e),
O'Reilly Media Inc., 2010. References:
1. Thomas A. Powell, HTML & CSS: The Complete Reference, (5e),
CSE 3290: PROGRAMMING IN JAVA [3 0 0 3] McGraw-Hill, 2010.
Object Oriented Programming, Byte Code Concept, Data Types, Variables 2. David Sawyer McFarland, JavaScript & jQuery The Missing
and Arrays, Operators, Control Statements, Classes and Methods, Manual, (2e), O'Reilly, 2011.
Inheritance, String Handling, Packages, Access Protection, Importing 3. W. Jason Gilmore, Beginning PHP and MySQL from Novice to
Packages, Interface, Exception Handling, Using Try And Catch, Professional, (4e),Apress,2010.
Multithreaded Programming, File Handling, standard streams, Byte 4. Elizabeth Castro and Bruce Hyslop, HTML5& CSS3 Visual Quick
Streams, File Input/Output Streams, Character Streams, Serialization, Start Guide, (7e),Pearson, 2012.
Applets-Architecture, display methods, passing parameters Event 5. Adriaan de Jonge and Phillip Dutson, jQuery, jQuery UI, and jQuery
Handling mechanisms, delegation modes, classes, Event Listeners, Mobile: Recipes and Examples, Pearson Education, 2013.
Adapter Classes, Inner Classes, AWT Classes, Window Fundamentals,
Working With Frame Windows, Introduction to Databases: JDBC
Connectivity.

124

You might also like